Warning: Permanently added '[localhost]:54927' (ECDSA) to the list of known hosts. 2026/02/15 15:05:53 fuzzer started 2026/02/15 15:05:53 dialing manager at localhost:34089 syzkaller login: [ 35.764888] cgroup: Unknown subsys name 'net' [ 35.767510] cgroup: Unknown subsys name 'net_prio' [ 35.769742] cgroup: Unknown subsys name 'devices' [ 35.771562] cgroup: Unknown subsys name 'blkio' [ 35.830091] cgroup: Unknown subsys name 'hugetlb' [ 35.831635] cgroup: Unknown subsys name 'rlimit' 2026/02/15 15:06:06 syscalls: 2215 2026/02/15 15:06:06 code coverage: enabled 2026/02/15 15:06:06 comparison tracing: enabled 2026/02/15 15:06:06 extra coverage: enabled 2026/02/15 15:06:06 setuid sandbox: enabled 2026/02/15 15:06:06 namespace sandbox: enabled 2026/02/15 15:06:06 Android sandbox: enabled 2026/02/15 15:06:06 fault injection: enabled 2026/02/15 15:06:06 leak checking: enabled 2026/02/15 15:06:06 net packet injection: enabled 2026/02/15 15:06:06 net device setup: enabled 2026/02/15 15:06:06 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 2026/02/15 15:06:06 devlink PCI setup: PCI device 0000:00:10.0 is not available 2026/02/15 15:06:06 USB emulation: enabled 2026/02/15 15:06:06 hci packet injection: enabled 2026/02/15 15:06:06 wifi device emulation: enabled 2026/02/15 15:06:06 802.15.4 emulation: enabled 2026/02/15 15:06:06 fetching corpus: 50, signal 24573/26398 (executing program) 2026/02/15 15:06:07 fetching corpus: 100, signal 36573/40080 (executing program) 2026/02/15 15:06:07 fetching corpus: 150, signal 50505/55453 (executing program) 2026/02/15 15:06:07 fetching corpus: 200, signal 56894/63344 (executing program) 2026/02/15 15:06:07 fetching corpus: 250, signal 65837/73590 (executing program) 2026/02/15 15:06:07 fetching corpus: 300, signal 71764/80804 (executing program) 2026/02/15 15:06:07 fetching corpus: 350, signal 77330/87623 (executing program) 2026/02/15 15:06:07 fetching corpus: 400, signal 81417/93023 (executing program) 2026/02/15 15:06:07 fetching corpus: 450, signal 87683/100390 (executing program) 2026/02/15 15:06:07 fetching corpus: 500, signal 90167/104115 (executing program) 2026/02/15 15:06:08 fetching corpus: 550, signal 92171/107367 (executing program) 2026/02/15 15:06:08 fetching corpus: 600, signal 95170/111564 (executing program) 2026/02/15 15:06:08 fetching corpus: 650, signal 98658/116113 (executing program) 2026/02/15 15:06:08 fetching corpus: 700, signal 100406/119078 (executing program) 2026/02/15 15:06:08 fetching corpus: 750, signal 101802/121671 (executing program) 2026/02/15 15:06:08 fetching corpus: 800, signal 104211/125150 (executing program) 2026/02/15 15:06:08 fetching corpus: 850, signal 106546/128555 (executing program) 2026/02/15 15:06:08 fetching corpus: 900, signal 108095/131230 (executing program) 2026/02/15 15:06:08 fetching corpus: 950, signal 110576/134719 (executing program) 2026/02/15 15:06:09 fetching corpus: 1000, signal 113558/138563 (executing program) 2026/02/15 15:06:09 fetching corpus: 1050, signal 114916/140966 (executing program) 2026/02/15 15:06:09 fetching corpus: 1100, signal 116492/143553 (executing program) 2026/02/15 15:06:09 fetching corpus: 1150, signal 118952/146792 (executing program) 2026/02/15 15:06:09 fetching corpus: 1200, signal 121301/150012 (executing program) 2026/02/15 15:06:09 fetching corpus: 1250, signal 123449/153005 (executing program) 2026/02/15 15:06:09 fetching corpus: 1300, signal 124911/155386 (executing program) 2026/02/15 15:06:09 fetching corpus: 1350, signal 126297/157717 (executing program) 2026/02/15 15:06:10 fetching corpus: 1400, signal 128834/160944 (executing program) 2026/02/15 15:06:10 fetching corpus: 1450, signal 130190/163193 (executing program) 2026/02/15 15:06:10 fetching corpus: 1500, signal 131920/165793 (executing program) 2026/02/15 15:06:10 fetching corpus: 1550, signal 133400/168081 (executing program) 2026/02/15 15:06:10 fetching corpus: 1600, signal 134346/169943 (executing program) 2026/02/15 15:06:10 fetching corpus: 1650, signal 135946/172287 (executing program) 2026/02/15 15:06:10 fetching corpus: 1700, signal 137729/174759 (executing program) 2026/02/15 15:06:10 fetching corpus: 1750, signal 138556/176501 (executing program) 2026/02/15 15:06:10 fetching corpus: 1800, signal 139387/178235 (executing program) 2026/02/15 15:06:11 fetching corpus: 1850, signal 140447/180117 (executing program) 2026/02/15 15:06:11 fetching corpus: 1900, signal 141855/182208 (executing program) 2026/02/15 15:06:11 fetching corpus: 1950, signal 143331/184349 (executing program) 2026/02/15 15:06:11 fetching corpus: 2000, signal 144023/185906 (executing program) 2026/02/15 15:06:11 fetching corpus: 2050, signal 145406/187950 (executing program) 2026/02/15 15:06:11 fetching corpus: 2100, signal 147126/190246 (executing program) 2026/02/15 15:06:11 fetching corpus: 2150, signal 147982/191847 (executing program) 2026/02/15 15:06:11 fetching corpus: 2200, signal 148804/193476 (executing program) 2026/02/15 15:06:12 fetching corpus: 2250, signal 149374/194899 (executing program) 2026/02/15 15:06:12 fetching corpus: 2300, signal 150636/196760 (executing program) 2026/02/15 15:06:12 fetching corpus: 2350, signal 151797/198512 (executing program) 2026/02/15 15:06:12 fetching corpus: 2400, signal 152956/200320 (executing program) 2026/02/15 15:06:12 fetching corpus: 2450, signal 154774/202496 (executing program) 2026/02/15 15:06:12 fetching corpus: 2500, signal 155845/204208 (executing program) 2026/02/15 15:06:12 fetching corpus: 2550, signal 156929/205909 (executing program) 2026/02/15 15:06:12 fetching corpus: 2600, signal 158812/208101 (executing program) 2026/02/15 15:06:12 fetching corpus: 2650, signal 159770/209673 (executing program) 2026/02/15 15:06:13 fetching corpus: 2700, signal 161055/211385 (executing program) 2026/02/15 15:06:13 fetching corpus: 2750, signal 161922/212861 (executing program) 2026/02/15 15:06:13 fetching corpus: 2800, signal 162764/214312 (executing program) 2026/02/15 15:06:13 fetching corpus: 2850, signal 163295/215593 (executing program) 2026/02/15 15:06:13 fetching corpus: 2900, signal 164454/217272 (executing program) 2026/02/15 15:06:13 fetching corpus: 2950, signal 165639/218911 (executing program) 2026/02/15 15:06:13 fetching corpus: 3000, signal 166376/220235 (executing program) 2026/02/15 15:06:13 fetching corpus: 3050, signal 167426/221755 (executing program) 2026/02/15 15:06:14 fetching corpus: 3100, signal 168843/223468 (executing program) 2026/02/15 15:06:14 fetching corpus: 3150, signal 169680/224824 (executing program) 2026/02/15 15:06:14 fetching corpus: 3200, signal 170600/226246 (executing program) 2026/02/15 15:06:14 fetching corpus: 3250, signal 171449/227576 (executing program) 2026/02/15 15:06:14 fetching corpus: 3300, signal 172767/229149 (executing program) 2026/02/15 15:06:14 fetching corpus: 3350, signal 173720/230488 (executing program) 2026/02/15 15:06:14 fetching corpus: 3400, signal 174586/231821 (executing program) 2026/02/15 15:06:14 fetching corpus: 3450, signal 175444/233102 (executing program) 2026/02/15 15:06:14 fetching corpus: 3500, signal 175975/234202 (executing program) 2026/02/15 15:06:15 fetching corpus: 3550, signal 176536/235296 (executing program) 2026/02/15 15:06:15 fetching corpus: 3600, signal 177344/236578 (executing program) 2026/02/15 15:06:15 fetching corpus: 3650, signal 178350/237958 (executing program) 2026/02/15 15:06:15 fetching corpus: 3700, signal 178998/239053 (executing program) 2026/02/15 15:06:15 fetching corpus: 3750, signal 179657/240165 (executing program) 2026/02/15 15:06:15 fetching corpus: 3800, signal 180363/241310 (executing program) 2026/02/15 15:06:15 fetching corpus: 3850, signal 180838/242377 (executing program) 2026/02/15 15:06:15 fetching corpus: 3900, signal 181348/243416 (executing program) 2026/02/15 15:06:16 fetching corpus: 3950, signal 182072/244546 (executing program) 2026/02/15 15:06:16 fetching corpus: 4000, signal 182441/245512 (executing program) 2026/02/15 15:06:16 fetching corpus: 4050, signal 182974/246551 (executing program) 2026/02/15 15:06:16 fetching corpus: 4100, signal 183657/247660 (executing program) 2026/02/15 15:06:16 fetching corpus: 4150, signal 184158/248655 (executing program) 2026/02/15 15:06:16 fetching corpus: 4200, signal 184894/249746 (executing program) 2026/02/15 15:06:16 fetching corpus: 4250, signal 185684/250855 (executing program) 2026/02/15 15:06:16 fetching corpus: 4300, signal 186006/251764 (executing program) 2026/02/15 15:06:17 fetching corpus: 4350, signal 186358/252664 (executing program) 2026/02/15 15:06:17 fetching corpus: 4400, signal 186953/253690 (executing program) 2026/02/15 15:06:17 fetching corpus: 4450, signal 187573/254682 (executing program) 2026/02/15 15:06:17 fetching corpus: 4500, signal 188269/255686 (executing program) 2026/02/15 15:06:17 fetching corpus: 4550, signal 188714/256593 (executing program) 2026/02/15 15:06:17 fetching corpus: 4600, signal 189595/257647 (executing program) 2026/02/15 15:06:17 fetching corpus: 4650, signal 189917/258516 (executing program) 2026/02/15 15:06:17 fetching corpus: 4700, signal 190482/259490 (executing program) 2026/02/15 15:06:17 fetching corpus: 4750, signal 191126/260463 (executing program) 2026/02/15 15:06:17 fetching corpus: 4800, signal 191568/261346 (executing program) 2026/02/15 15:06:18 fetching corpus: 4850, signal 192170/262269 (executing program) 2026/02/15 15:06:18 fetching corpus: 4900, signal 192695/263163 (executing program) 2026/02/15 15:06:18 fetching corpus: 4950, signal 193326/264127 (executing program) 2026/02/15 15:06:18 fetching corpus: 5000, signal 193794/265010 (executing program) 2026/02/15 15:06:18 fetching corpus: 5050, signal 194546/265959 (executing program) 2026/02/15 15:06:18 fetching corpus: 5100, signal 195050/266835 (executing program) 2026/02/15 15:06:18 fetching corpus: 5150, signal 195399/267641 (executing program) 2026/02/15 15:06:18 fetching corpus: 5200, signal 195985/268524 (executing program) 2026/02/15 15:06:19 fetching corpus: 5250, signal 196729/269470 (executing program) 2026/02/15 15:06:19 fetching corpus: 5300, signal 197115/270274 (executing program) 2026/02/15 15:06:19 fetching corpus: 5350, signal 197563/271077 (executing program) 2026/02/15 15:06:19 fetching corpus: 5400, signal 198115/271914 (executing program) 2026/02/15 15:06:19 fetching corpus: 5450, signal 198763/272766 (executing program) 2026/02/15 15:06:19 fetching corpus: 5500, signal 199251/273540 (executing program) 2026/02/15 15:06:19 fetching corpus: 5550, signal 199766/274371 (executing program) 2026/02/15 15:06:19 fetching corpus: 5600, signal 200527/275258 (executing program) 2026/02/15 15:06:20 fetching corpus: 5650, signal 200903/275981 (executing program) 2026/02/15 15:06:20 fetching corpus: 5700, signal 201431/276805 (executing program) 2026/02/15 15:06:20 fetching corpus: 5750, signal 201818/277587 (executing program) 2026/02/15 15:06:20 fetching corpus: 5800, signal 202485/278435 (executing program) 2026/02/15 15:06:20 fetching corpus: 5850, signal 203183/279235 (executing program) 2026/02/15 15:06:20 fetching corpus: 5900, signal 203563/279952 (executing program) 2026/02/15 15:06:20 fetching corpus: 5950, signal 203910/280698 (executing program) 2026/02/15 15:06:20 fetching corpus: 6000, signal 204469/281445 (executing program) 2026/02/15 15:06:21 fetching corpus: 6050, signal 204800/282132 (executing program) 2026/02/15 15:06:21 fetching corpus: 6100, signal 205383/282872 (executing program) 2026/02/15 15:06:21 fetching corpus: 6150, signal 205707/283600 (executing program) 2026/02/15 15:06:21 fetching corpus: 6200, signal 206116/284300 (executing program) 2026/02/15 15:06:21 fetching corpus: 6250, signal 206378/284952 (executing program) 2026/02/15 15:06:21 fetching corpus: 6300, signal 206655/285654 (executing program) 2026/02/15 15:06:21 fetching corpus: 6350, signal 207027/286355 (executing program) 2026/02/15 15:06:21 fetching corpus: 6400, signal 207461/287030 (executing program) 2026/02/15 15:06:22 fetching corpus: 6450, signal 207835/287725 (executing program) 2026/02/15 15:06:22 fetching corpus: 6500, signal 208179/288371 (executing program) 2026/02/15 15:06:22 fetching corpus: 6550, signal 208538/289043 (executing program) 2026/02/15 15:06:22 fetching corpus: 6600, signal 209165/289747 (executing program) 2026/02/15 15:06:22 fetching corpus: 6650, signal 209559/290397 (executing program) 2026/02/15 15:06:22 fetching corpus: 6700, signal 210072/291033 (executing program) 2026/02/15 15:06:22 fetching corpus: 6750, signal 210728/291698 (executing program) 2026/02/15 15:06:22 fetching corpus: 6800, signal 211199/292355 (executing program) 2026/02/15 15:06:22 fetching corpus: 6850, signal 211793/293033 (executing program) 2026/02/15 15:06:23 fetching corpus: 6900, signal 212116/293668 (executing program) 2026/02/15 15:06:23 fetching corpus: 6950, signal 212406/294262 (executing program) 2026/02/15 15:06:23 fetching corpus: 7000, signal 212801/294853 (executing program) 2026/02/15 15:06:23 fetching corpus: 7050, signal 213434/295492 (executing program) 2026/02/15 15:06:23 fetching corpus: 7100, signal 213686/296077 (executing program) 2026/02/15 15:06:23 fetching corpus: 7150, signal 214167/296653 (executing program) 2026/02/15 15:06:23 fetching corpus: 7200, signal 214459/297255 (executing program) 2026/02/15 15:06:24 fetching corpus: 7250, signal 215020/297875 (executing program) 2026/02/15 15:06:24 fetching corpus: 7300, signal 215233/298473 (executing program) 2026/02/15 15:06:24 fetching corpus: 7350, signal 215572/299025 (executing program) 2026/02/15 15:06:24 fetching corpus: 7400, signal 215871/299557 (executing program) 2026/02/15 15:06:24 fetching corpus: 7450, signal 216161/300094 (executing program) 2026/02/15 15:06:24 fetching corpus: 7500, signal 216524/300669 (executing program) 2026/02/15 15:06:24 fetching corpus: 7550, signal 216983/300965 (executing program) 2026/02/15 15:06:24 fetching corpus: 7600, signal 217397/300965 (executing program) 2026/02/15 15:06:24 fetching corpus: 7650, signal 217627/300965 (executing program) 2026/02/15 15:06:24 fetching corpus: 7700, signal 217969/300965 (executing program) 2026/02/15 15:06:25 fetching corpus: 7750, signal 218397/300965 (executing program) 2026/02/15 15:06:25 fetching corpus: 7800, signal 218957/300965 (executing program) 2026/02/15 15:06:25 fetching corpus: 7850, signal 219298/300965 (executing program) 2026/02/15 15:06:25 fetching corpus: 7900, signal 219560/300965 (executing program) 2026/02/15 15:06:25 fetching corpus: 7950, signal 219809/300965 (executing program) 2026/02/15 15:06:25 fetching corpus: 8000, signal 220255/300965 (executing program) 2026/02/15 15:06:25 fetching corpus: 8050, signal 220517/300965 (executing program) 2026/02/15 15:06:25 fetching corpus: 8100, signal 221087/300965 (executing program) 2026/02/15 15:06:26 fetching corpus: 8150, signal 221694/300965 (executing program) 2026/02/15 15:06:26 fetching corpus: 8200, signal 222065/300965 (executing program) 2026/02/15 15:06:26 fetching corpus: 8250, signal 222337/300965 (executing program) 2026/02/15 15:06:26 fetching corpus: 8300, signal 222647/300965 (executing program) 2026/02/15 15:06:26 fetching corpus: 8350, signal 223095/300965 (executing program) 2026/02/15 15:06:26 fetching corpus: 8400, signal 223431/300965 (executing program) 2026/02/15 15:06:26 fetching corpus: 8450, signal 223847/300965 (executing program) 2026/02/15 15:06:26 fetching corpus: 8500, signal 224242/300965 (executing program) 2026/02/15 15:06:27 fetching corpus: 8550, signal 224636/300965 (executing program) 2026/02/15 15:06:27 fetching corpus: 8600, signal 225271/300965 (executing program) 2026/02/15 15:06:27 fetching corpus: 8650, signal 225558/300965 (executing program) 2026/02/15 15:06:27 fetching corpus: 8700, signal 225914/300965 (executing program) 2026/02/15 15:06:27 fetching corpus: 8750, signal 226154/300965 (executing program) 2026/02/15 15:06:27 fetching corpus: 8800, signal 226336/300965 (executing program) 2026/02/15 15:06:27 fetching corpus: 8850, signal 226608/300965 (executing program) 2026/02/15 15:06:27 fetching corpus: 8900, signal 226948/300965 (executing program) 2026/02/15 15:06:28 fetching corpus: 8950, signal 227251/300965 (executing program) 2026/02/15 15:06:28 fetching corpus: 9000, signal 227605/300965 (executing program) 2026/02/15 15:06:28 fetching corpus: 9050, signal 227831/300965 (executing program) 2026/02/15 15:06:28 fetching corpus: 9100, signal 228138/300965 (executing program) 2026/02/15 15:06:28 fetching corpus: 9150, signal 228381/300965 (executing program) 2026/02/15 15:06:28 fetching corpus: 9200, signal 228665/300965 (executing program) 2026/02/15 15:06:28 fetching corpus: 9250, signal 228869/300965 (executing program) 2026/02/15 15:06:28 fetching corpus: 9300, signal 229144/300965 (executing program) 2026/02/15 15:06:28 fetching corpus: 9350, signal 229483/300965 (executing program) 2026/02/15 15:06:29 fetching corpus: 9400, signal 229842/300965 (executing program) 2026/02/15 15:06:29 fetching corpus: 9450, signal 230023/300965 (executing program) 2026/02/15 15:06:29 fetching corpus: 9457, signal 230103/300965 (executing program) 2026/02/15 15:06:29 fetching corpus: 9457, signal 230103/300965 (executing program) 2026/02/15 15:06:31 starting 8 fuzzer processes 15:06:31 executing program 0: getsockopt$IP_SET_OP_VERSION(0xffffffffffffffff, 0x1, 0x53, &(0x7f0000000000), &(0x7f0000000040)=0x8) sendmsg$NL80211_CMD_TESTMODE(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x2c, 0x0, 0x200, 0x70bd26, 0x25dfdbfc, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_TESTDATA={0x4}, @NL80211_ATTR_TESTDATA={0xb, 0x45, "7f59118492c38e"}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10000}, 0x80) sendmsg$NL80211_CMD_DEAUTHENTICATE(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000180), 0xc, &(0x7f0000000300)={&(0x7f00000001c0)={0x140, 0x0, 0x508, 0x70bd25, 0x25dfdbfd, {{}, {@val={0x8}, @val={0xc, 0x99, {0x0, 0x1c}}}}, [@NL80211_ATTR_REASON_CODE={0x6, 0x36, 0x4}, @NL80211_ATTR_IE={0x2e, 0x2a, [@ht={0x2d, 0x1a, {0x10, 0x1, 0x0, 0x0, {0x10001, 0x6, 0x0, 0x3, 0x0, 0x1, 0x1, 0x3, 0x1}, 0x800, 0x6a, 0x8}}, @chsw_timing={0x68, 0x4, {0x45, 0x7}}, @mesh_id={0x72, 0x6}]}, @NL80211_ATTR_IE={0xdc, 0x2a, [@tim={0x5, 0x9b, {0x49, 0x4, 0xf2, "4360e2ea517fd9cd8052af0108200785ef4ed69c43c004d6c30f746d34d5c25fa8c27fcace2f48bc6ff75731d26e083b31788a008fd4f93baff70fde352ce556a34a453a5014ed05e559c8b749ea235265784741f920af00d69dc9e442548cf6d17c87227014537d39c56ca30c70d717ac58dca9d0279a5d5f5b2e69719274cc575ec88b46053b8162b0daa498bee319d88823add38410c2"}}, @prep={0x83, 0x25, @ext={{}, 0x7f, 0x9b, @broadcast, 0x1073f4d4, @device_a, 0xff, 0x5, @device_b, 0xa8}}, @link_id={0x65, 0x12, {@from_mac=@device_b}}]}, @NL80211_ATTR_LOCAL_STATE_CHANGE={0x4}]}, 0x140}, 0x1, 0x0, 0x0, 0x8000}, 0x440c5) r0 = syz_genetlink_get_family_id$nl80211(&(0x7f00000003c0), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000400)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_TDLS_CANCEL_CHANNEL_SWITCH(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000440)={0x64, r0, 0x400, 0x70bd2c, 0x25dfdbfc, {{}, {@val={0x8, 0x3, r1}, @void}}, [@NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_MAC={0xa}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa}]}, 0x64}, 0x1, 0x0, 0x0, 0x20800}, 0x4801) r2 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NL80211_CMD_JOIN_MESH(r2, &(0x7f0000000600)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000005c0)={&(0x7f0000000580)={0x30, r0, 0x300, 0x70bd29, 0x25dfdbfc, {{}, {@void, @void}}, [@NL80211_ATTR_CONTROL_PORT_OVER_NL80211={0x4}, @NL80211_ATTR_MESH_ID={0xa}, @NL80211_ATTR_HANDLE_DFS={0x4}, @chandef_params=[@NL80211_ATTR_CENTER_FREQ1={0x8, 0xa0, 0x6}]]}, 0x30}, 0x1, 0x0, 0x0, 0x8014}, 0x4000801) read(r2, &(0x7f0000000640)=""/4096, 0x1000) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000001680)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_DEL_PMKSA(r2, &(0x7f0000001780)={&(0x7f0000001640)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000001740)={&(0x7f00000016c0)={0x60, r0, 0x4, 0x70bd2d, 0x25dfdbfc, {{}, {@val={0x8, 0x3, r3}, @void}}, [@NL80211_ATTR_MAC={0xa}, @NL80211_ATTR_PMK_LIFETIME={0x8, 0x11f, 0x4}, @NL80211_ATTR_PMKID={0x14, 0x55, "44b4d28bad7be0d2a0d6cf7e32632241"}, @NL80211_ATTR_PMK_LIFETIME={0x8}, @NL80211_ATTR_PMKID={0x14, 0x55, "7ee3b32e5b7855af67bb7a025aba3768"}]}, 0x60}}, 0x4000) sendmsg$NL80211_CMD_DEL_PMK(r2, &(0x7f0000001880)={&(0x7f00000017c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000001840)={&(0x7f0000001800)={0x40, r0, 0x300, 0x70bd27, 0x25dfdbfd, {{}, {@val={0x8, 0x3, r1}, @void}}, [@NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa}]}, 0x40}, 0x1, 0x0, 0x0, 0x4040845}, 0x4024001) sendmsg$IPCTNL_MSG_CT_GET(r2, &(0x7f00000019c0)={&(0x7f00000018c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000001980)={&(0x7f0000001900)={0x64, 0x1, 0x1, 0x101, 0x0, 0x0, {0xa, 0x0, 0x9}, [@CTA_NAT_DST={0x20, 0xd, 0x0, 0x1, [@CTA_NAT_V6_MINIP={0x14, 0x4, @dev={0xfe, 0x80, '\x00', 0x12}}, @CTA_NAT_V4_MAXIP={0x8, 0x2, @local}]}, @CTA_LABELS_MASK={0x10, 0x17, [0x80000001, 0x0, 0x10000]}, @CTA_ZONE={0x6, 0x12, 0x1, 0x0, 0x4}, @CTA_NAT_DST={0x4}, @CTA_SEQ_ADJ_ORIG={0x14, 0xf, 0x0, 0x1, [@CTA_SEQADJ_CORRECTION_POS={0x8, 0x1, 0x1, 0x0, 0x2}, @CTA_SEQADJ_OFFSET_AFTER={0x8, 0x3, 0x1, 0x0, 0x4}]}]}, 0x64}, 0x1, 0x0, 0x0, 0x800}, 0x40040) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r2, 0xc018937b, &(0x7f0000001a00)={{0x1, 0x1, 0x18, r2, {0x0, 0xee01}}, './file0\x00'}) sendmsg$NL80211_CMD_LEAVE_OCB(r4, &(0x7f0000001b00)={&(0x7f0000001a40)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000001ac0)={&(0x7f0000001a80)={0x1c, r0, 0x10, 0x70bd28, 0x25dfdbfc, {{}, {@val={0x8, 0x3, r1}, @void}}, ["", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x10008810}, 0x4040001) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_MGMT_C_VERSION(r5, &(0x7f0000001c40)={&(0x7f0000001b40)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000001c00)={&(0x7f0000001b80)={0x54, 0x0, 0x4, 0x70bd2c, 0x25dfdbfb, {}, [@NLBL_MGMT_A_IPV6ADDR={0x14, 0x5, @remote}, @NLBL_MGMT_A_IPV6MASK={0x14, 0x6, @local}, @NLBL_MGMT_A_IPV4ADDR={0x8, 0x7, @broadcast}, @NLBL_MGMT_A_IPV4MASK={0x8, 0x8, @empty}, @NLBL_MGMT_A_IPV4ADDR={0x8, 0x7, @broadcast}]}, 0x54}}, 0x48044) sendmsg$IEEE802154_LLSEC_DEL_DEVKEY(r5, &(0x7f0000001d80)={&(0x7f0000001c80)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000001d40)={&(0x7f0000001cc0)={0x44, 0x0, 0x400, 0x70bd29, 0x25dfdbfb, {}, [@IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x3}, @IEEE802154_ATTR_SHORT_ADDR={0x6, 0x4, 0xaaa3}, @IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x3}, @IEEE802154_ATTR_LLSEC_KEY_SOURCE_EXTENDED={0xc, 0x2d, {0xaaaaaaaaaaaa0002}}, @IEEE802154_ATTR_LLSEC_KEY_SOURCE_EXTENDED={0xc, 0x2d, {0xaaaaaaaaaaaa0102}}]}, 0x44}, 0x1, 0x0, 0x0, 0x20000840}, 0x800) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000001dc0)) syz_io_uring_setup(0x2e68, &(0x7f0000001fc0)={0x0, 0xabd3, 0x10, 0x1, 0x124, 0x0, r2}, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000002040), &(0x7f0000002080)) 15:06:31 executing program 2: r0 = semget$private(0x0, 0x3, 0x10) semctl$SEM_STAT_ANY(r0, 0x7, 0x14, &(0x7f0000000000)=""/123) r1 = semget$private(0x0, 0x1, 0x108) r2 = semget$private(0x0, 0x0, 0x300) semctl$SEM_STAT_ANY(r2, 0x2, 0x14, &(0x7f0000000080)=""/163) semctl$SETALL(r1, 0x0, 0x11, &(0x7f0000000140)=[0xfff9, 0x1, 0x1, 0x1000, 0x570, 0x1, 0x10, 0x8, 0x6]) semctl$SEM_STAT_ANY(r1, 0x1a251e5dabb32006, 0x14, &(0x7f0000000180)=""/107) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) semtimedop(0x0, &(0x7f0000000200)=[{0x4, 0x1, 0x800}, {0x2, 0x800}, {0x1, 0xfeff, 0x1800}, {0x1, 0x4, 0x800}, {0x6, 0x2}, {0x1, 0x81, 0x1000}, {0x4, 0x8, 0x1000}], 0x7, &(0x7f0000000280)={r3, r4+60000000}) semtimedop(r0, &(0x7f00000002c0)=[{0x4, 0x2, 0x1000}, {0x6, 0xa96b, 0x1000}, {0x1, 0x401, 0x1000}, {0x2, 0xffff}, {0x2, 0x6, 0x1000}, {0x3, 0x6, 0x800}, {0x4, 0x4, 0x1000}, {0x2, 0x1000, 0x1800}], 0x8, &(0x7f0000000300)) r5 = semget$private(0x0, 0x2, 0x402) clock_gettime(0x0, &(0x7f0000000380)={0x0, 0x0}) semtimedop(0xffffffffffffffff, &(0x7f0000000340)=[{0x2, 0x4, 0x1800}, {0x3, 0x4}], 0x2, &(0x7f00000003c0)={r6, r7+10000000}) ppoll(&(0x7f0000000400)=[{0xffffffffffffffff, 0x2}], 0x1, &(0x7f0000000440)={0x77359400}, &(0x7f0000000480)={[0x100000000]}, 0x8) semget$private(0x0, 0x2, 0x149) semop(0xffffffffffffffff, &(0x7f00000004c0)=[{0x0, 0x9, 0x800}, {0x4, 0x3, 0x800}], 0x2) semtimedop(r5, &(0x7f0000000500)=[{0x4, 0x9, 0x1000}, {0x3, 0xbda, 0x1000}, {0x3, 0x401, 0x1000}, {0x2, 0x81, 0x1800}, {0x4, 0x3, 0x800}, {0x2, 0x1000}, {0x4, 0x5, 0x800}], 0x7, &(0x7f0000000540)) r8 = semget$private(0x0, 0x0, 0x400) semctl$GETVAL(r8, 0x1, 0xc, &(0x7f0000000580)=""/94) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000600)=@IORING_OP_MADVISE={0x19, 0x5, 0x0, 0x0, 0x0, &(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0x1}, 0x780) 15:06:31 executing program 1: r0 = inotify_init1(0x80800) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$BTRFS_IOC_DEV_REPLACE(r1, 0xca289435, &(0x7f0000000040)={0x0, 0x100, @status={[0xffffffff, 0xa7, 0x1, 0x3, 0x1, 0x2]}, [0x8e, 0x6, 0xfffffffffffffff9, 0xffffffffffffffff, 0x9, 0x6, 0x7, 0x7f, 0xfffffffffffffffd, 0x8001, 0x2, 0xd3, 0x7, 0xffffffffffff5b5c, 0x0, 0x40, 0x7cc20b72, 0xec94, 0x9, 0x0, 0x400, 0x0, 0x2, 0x9, 0x9, 0x0, 0x6, 0x7fff, 0xffffffff00000000, 0x80000000, 0x8, 0x2, 0x1000, 0x0, 0x960, 0x5, 0x9, 0x80, 0x8, 0x2, 0x93b, 0x131c, 0x4, 0x1, 0x400, 0x3, 0xff, 0xfffffffffffffff7, 0x7ff, 0x2, 0xfea5, 0x80, 0x7, 0x4, 0x6, 0xbc, 0x2, 0x4, 0x10000, 0x8, 0x0, 0x0, 0x9, 0x2]}) write$binfmt_elf64(r0, &(0x7f0000000a80)={{0x7f, 0x45, 0x4c, 0x46, 0x7, 0x2, 0x0, 0x2, 0x7fff, 0x2, 0x6, 0x1, 0x102, 0x40, 0x2eb, 0x2, 0x8, 0x38, 0x2, 0x8a, 0x7f, 0x6}, [{0x5, 0x4, 0x8, 0x4, 0x19f, 0x800, 0x4, 0x2}], "8eaa37e78d3b511bb798766e987f6e7266bf196fce75952457d456669d74765281df72c023ebf6b630d75cbfe80b9463a2e82b84169a5b61dfc4792f9fd4d720d6884dced850fa24a1af8828712f8746cded7320c9f99133ef94a30a65dfa71fe2f89071bc46f98faf62d5c80c61dd5b05ead6bc92e95dd4ac8d1f53a8108db68b1d34c55040673ed816f5bd0ae5243e255575b108b9a87a41732f33c19db274afd440e4a44ff6a3563a0b66f3edf1ba34e8f0", ['\x00', '\x00']}, 0x32b) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = syz_mount_image$iso9660(&(0x7f0000000dc0), &(0x7f0000000e00)='./file0\x00', 0xad6, 0xa, &(0x7f00000023c0)=[{&(0x7f0000000e40)="f7f39e11809021cb7797cd2ed2af4fe29a22c7c1684aa13188729cc540b8b4a06379bc19d8879cb2b988ed9918fb7a0a99ecfcd43a3c3aaf4d5b967c2a50d3cbefd8b44ae8ac3b70c459c86f0ebdfb62d3973503e8b0f718bd63e7d1d3036bbfc919b25bb779a345ff67be71101b6f1866e1ff19845510f2c392a593909b86bff3dfb8597925bf4635ffc0224f8b07192337060c61ca42b88df0306b4e3626d5317edf4a39e8cca188cf96247e0a642ec73f1d4bd8a5bfd6391fda0b6371d6bac054384fa33dd7e0fa8355037f178ef9e6533373fb67eb3b99732589cc80f4cef3f9fbedcab81701e0de", 0xea, 0x1f}, {&(0x7f0000000f40)="cb5f2de9b0579dfdc765af901c29d7047ed80bdc9c7373cd85d8c8ee64fb297cf9b4f51209bd93cb63bc860ed088b0043f528038b225ca5300e746cfafcd03f63212b970ad5fa65399708a106c6987e9443d03b767fba42c74c2dcf434d140c3939bd12f1fe60b763193db8d03bf366ca4791f981fbf803c6acd1a31215ecb3e863600d344f6f81b62dbb32ef6b4e3948ec3bb3d9e2d14ae5c2b06091f3e61511f1993948dbcca2418f6", 0xaa, 0x9}, {&(0x7f0000001000)="ebd48b66a383a76142aaf50ee0c6e18233656ce33be33176e9f73a03039f5ff3d42573982733447bbaeb9a47e9489a053d165ea1d98cb644982221f3d88e73156b8bd9a7819203d4eba249012fd05401d7a175a9ea3eb24dc41e940ae1fe9836e993f23af1bedcd6dd5b6c9a024d1629d34dbde4561bee0ff808fcaf01ad9e2bcef4dab758b336", 0x87, 0x6}, {&(0x7f00000010c0)="6a38284281aa6f02f62eeebeaf256c834570689ebb1d7836b3852ebcd5c0ac18e6d538285535cb8c9b7ac811c6ec276f524424bc9da7b7b43a48e0e3bd272686f7d4ef1b5020925c467c2381ba959a1be4160dd3b28ccce391345d56bdc8e3b0b7cfcafe6b8bfac491d8adffd2f8f7f2ab3acc550359e68439", 0x79, 0x1}, {&(0x7f0000001140)="37e3ed48c98b557a65ad6abf27932199fbd7aa6b4afa554191580fa0e403b8e349e517362bccc7d41741aa8d27a2a2142bfc5d93a09aae05cf9f3b452ade9bd5e0ae436697b2fe510a12777a800f1b8ee9a343fd7980633158284c5c49fe4a71dba96a2c5acbc93f47b4152dee3b9dba67ab", 0x72, 0x6}, {&(0x7f00000011c0)="8601e20334219993b92f732a7e3d03a39396e0fbb96635f13f4361891139f46f4f8f2007174f", 0x26, 0xfff}, {&(0x7f0000001200)="35bfd9fe98b197bee114c4c9a998127443b776c215a469063a37c65a3b8217f6ceeeb445d72ac6495428cd76ebe65c2dc3f2318898914df7cf7d801132207c01bf6dc2264fcdf5f5d38265662f263853b5a233a339bb86460cfb74ea655db5cd0d63f5c8fba8691692d002adc905f5229496cfc88a65195899ce1ba063665d30f4c04fc48479917c9f8683444bd929f3da2061e9ee78c1bba8c089195ec5b2a5acc144cadfb46687a96b15e7ea3f1440fb0020584162914ef355877ee1aaf64c28922c50fba8f21f964f41915f9e47842be1fbff768941dad1c54d07441ef0b68f4879d970774a8d246c60b1062d5228a5ec94c6b050ba3ed666e92e9f3c5efd12035a711fa04d3838908c40d0974cdb73a25adc4cafda6b0c9ef91ae497a70a7d3f667770b4cf38fa14ef1f0e71a5b6bebcf071bf4263ef8cd5d23d78e1154beb72189d0bdd01b5968b9bf848e5a5abbe942e6f3f35a32e1e28b831f3cba100657b8e5b138bffab02a9a32c9e9fa595b1cb8a1c4ef27c5832e3f095090f8218a44f2b69e36e7c272b4c5be784f59aba86b18833743c495c7b0a117d08dcb2d7f2ad1959dc99b38d10ab19709d98f88897b586808e7c279e6a97b4de7240b979ee66bf48ec63fb8c259ec0d17936ec88a538331053b48b3b04ae866c5d26725ec6d66f23a1189e6cd62e59eea2f224bf56cb8da4b80c4c2b3c68d3f863047f5d3a1d6714d6ccdfa4e1196463af026db7265f5fa3706a1129e2a2bce60b9ad6948f89d04917ea6942163a5661c60305ce917e216aac914d63f129881a9d4b754849559cec2b2577542ecf375c4eb1d6849b7b9320b55b829f07e59e556f46fedb6b9892c720d6f48443e2f162c90540e4b7db3da4ff7d9139e2c904deafb695748465106247153bd180ff59dc7b653d450bd5d7c4fb30664ba5ac5e8e0701f7592849d8d7006a321cdee07140a4403067792651531462e0bf8985967ecd526506eb8d7d8128f793b96e6d447de368634e10bd2e4aae06bb955b403f2437d667e048f4fcb78ae4312bc288f3d24687194d7f27bf5d9c63d3462c6047b7b35497d0809a956c581e93f696514fbd3778457b5e5b75a877671ad3f96998460ea64f954953b05b4b6289a87923331c84531f01768b8846d258c43a0763429b80b6ba94160b5892e1f71f72cf52da8e48f0741a35de1c4d3de6634ebb18fed798adafe988f5ecb3c00293ba2f94256fecbb21727dc574df76fb4101233cfdd6f97110bd241e53ad58cfb58b4ed2e81250546d533075d7cfa5aa04c7a6533dd1be90b029b82473e3a1fde6fcd640a5a773adacb6ed57b9180da49850449711640c464195e3078164de140de2682db1351d73e817d176a9cc73a550c59c5f024d8d6581079e3c2712b82a2ee7e2b628c31ad291ee92d02771f3d340ac35d405fcaff95e0cfa99809bf74ff1e4f145d1e44fabdd2f85071a24e980bdfe8d4a2fc2fdf1f134e11ea3620c73f44071ba3a127dfa2ef4cd7d640310d69e8e5700909142f6b1e5d7e5ae2a5f70c49b686151e48ea476105fa3af109e2e225cdaa34b3e93c74eaf379cf3f2191c8a45671f7caeda0564d649e8985d1dd22c765cec7a3109c34fb1fc4d0e8bc9df3d583c7a9ec4d9fe40a13b4589003fa532a7b5d6ec865dc59cb7a9cc6202f51cfe3397deaf8c8395154ba44b44283e249ceee1749614ed7288174e801ed9ef0229db3336f9db6a4c2af97121ac81e2704df0ac6c0b60ecb2e76d7ce2d9f0e1af76d1c5f53b7eb2caaa8cdd750023421e75d39441442fc5112bb9386aa828db26ef1f8da615aa3ddf60d7324bec94fed70e7b6988c49f37b5b1c8bc0288431c7c392b6bd1c8132a614001f20f685169c7085081b1df72e8e4db77e9ca34eee8420161164ad2d7185c44310c97424a8d33b7f0fcb01805392675f7abf510082f3225b9ad2a6082b6d942ac0aad456a5a34ef83ae00668a54299bae29fa44e3bfa77ba6999008ff8429c5c53c8494e0e48e1a45bc7e151e7a949356ac93d86af75f1802f98f653477d2e0d195c5199fe9596ab94c96b54839337f9d4091fe042bd2decc8207e383d00fe505dcc26094d431034c18310df34d7a094e18c5cf045197fb9cc3957f5cb4590618e254b17e9be6771d2402c7f90e63f362b05058a120291b4c1339e8b8dc71c71811f183b5cc747634b69f0b21f07f7544dfb4b0cba80bba77a81bbde11220cc823f65cffce86d41d58a6d1f5578ab68de3d1a21217b97afeb06a975f9447ad36d47103b28c128ee37351c4781d076693ecb8d32399a7f17a836ce9568b01755fafec51af988ed30b204ddec5e74a80e23cbae1051dd4f74613de912e385831d692b8dfd54ba5e35d2a62a214bf5360e9daaebaff351a82a82a60e63a3c3f1a4f2fa5ca477991abbf3a544cdf9fbc581186e88b733bc739fd2d9c8448f4d9e09c986d8ee1cd758483bb8fd38ed461fc0e153eb4e2a7411893fc7b6f5e6f28e1c4494a1c50faa843eb073af1bdd225110afe44557a79b991a0ffbd48f4a8f23ae98aef57997c6bc18fdc0a94dd62b658916992fca72b7f54fa96bb07b756d1b78e6658b36923bf6fc66e4b47ca994fa8e49641856b1ab5e3e07cbc6ecd11f233845543e3d6440f16a432c4bd83a0a6f340cd8ef39174eb1487cde4ac68461314d9b8ab8213010a9fa8131fa6dcc1d62e011fd86083676c2189b84ccf017bfb4a9003333007919e69ff5131d5cfbc860fa0733607ce696bcbf4b1d790139a739681b34ed353d2608992732be139dc938e850e80b65d4a9bed3691e06c784d33e728bc6b4f31267acf64dd23f5399b9e94d33c3cabcaec352fee1cbc1fcbd160ce5fd65e8cc32b98e5645bddcd5707b85e4c9d86d0cbd6ec3863840d9e492af0223a675fee44000055366a5b11cc97d0ec1ef29adf9a469a4899b04a42d1de6106b66d8f9c49fa3bb4268da78a3c9f0766a90ac349087293793bffb631031039b12719e1697f197237b630a92c0fa341386e996addf5d8e5b3d7d7d1503b5acd28845fd5ba5058bc4e5fe1cea6bb703d6752d503a83ca3ccb20a29ceedc7fedeae51f76cc82f0a3b798a309a32269c22893e71a54557c10c9d1a69f8816a0759cce42186f893e0e85f3f56764fbd1af117833a86727d0bc3eb1d0f5c727c4b41e32e6150204edc1da71d7470a643c2ce1613d39d606d061db0d3437e423d91dd75279c1c01f760df924a40cec0cf2f325a990e815db1edbe311fc54218098611f78df257ce4a5d729b62c7c0ed3e058301b912f2d31a0b39fd82d2fea416a6787d748c818cad1fcb1e042983d91733da6f1be51272338b02dfa091ecf5f95570cbafe3171433b0b68e8066f17403282144bf6b6f5bd328bb232773899dd4f1ee3ab34de0f44a61aa658fe27cbeb2f1b35e82275c8cd5dfbdb6e51ae9760d9d27cbddbb886cdbfc1393105561997707a7b344a38cd7d2e4fe2bf6369f575428cfb6ee72557b9956d7a0dfef178c32010a9a8a6325186d7ef5702d2402ee95c02fdac03ebca973879b6bfe2cb629445279430306d1e397aafd976f6a4372224f1d6e1957139501fb600d1205193e0eb3a17de85d93da6b632cc44421e0d25b42c5b41dd7e1e520227750b43bb67be4ad0497060ea8a508e64ab93d4324492a61ecabce246223f984caaedaa6d8383fa53b5ba9a1284c68e23fb93ab0395faa87f23a457a61d5adcc70773b8e5f340da1a3cd5936c3d2fb2fe92a028e053a9f035a6bac0f59b36be38de18d82854625a5de0d2d5e2d8b4ae4aa3425da254e8d23f869bc11b396771183d4348c95261504f3c0c6a0f490ef7f655f92d68674a9b0b8cedd360d0be1552cb45c9f629f0aa5512e4049405b448f1aaf88a14f52e6ff299efa502d857119cd5551ebcace5ec33782afc3e6f95d40399595cd1a7e2822f0cb4a7fdf00fdd32477d809ac6a1e54c84befce9c6b561e988a671a968345587085af6f5627bb53b26c2aca619dfd5c5a58fe944a5ee0e40d845000be32c7369032f8563ef781168d583dadf9780bf878008f6b94cf2a0745adf258f905ca0d1a62e7b5b32fbd38748a09f981087eece28b48d6c823b35c0d804c7d9668ca1fa921cfb0f50e306dbb4bf1d36b33401205137eaed273bea5e100c48c269bfc9e235289aeeaca9b1602be6db9a34c826793045ece83f72189e1346611828e7b85d0a3b3edb5384195fde5b6944a99acdaf5783a3c81e024ac784427d62d3780e8d0147c214d9abcfee49a92055ff2449a4dabb646ed03552ec0a2604b51c85b768f153e3830b2e560e349fb07569185cfe6456ed747a1e5ebff1abe67610082de0ba6ce454a35c23dbf68698e96c8844ff2fae8d477b3a6b0c3df902da8f75e1d272a87ab3dcdd67c5ffbb1063a028530899339ca49c6928ebdfcc271101bc719569157a2f096ca9a1467b31b86f7c96b8af2c08b902e82da0cc8abeadbec4b4490f0632abbf8462aacb1cc02e98b15cea6af3068660de47b26f88f261c95952ccdc337e0c2cbf88944bbb79cb4664137f9cd03b1fb43bccacf3d6ea7094dd484a1d88ec0a421b392011cb2c55580302f5329da77c0a0582ac00073bbded99d0736917783effdd3b29e05d6bd2c42ed6ef60d62a9ac887f67330a64b753ed163cf409bd79ed6414e8f2f53f056166dd4f4755b632c910224ab07610717bf0424e9eb37b7bd3390712904baa11066ba5d3fc4bf01ea09eb4dced4819a8d17db7bdeefd5b1659e8dd640625bb6afbf7ca95afc6fe6ea48b1e0011f5b8db74623585fbc40308db3799c70685f66edb3e609f55365ff40e56a553147b72499ecc5049f13a6216b34b82454637831d78c938a59d9f84bd799cdc43bf0cc28a35b0c1a5f1af057f5fe72471d3549688ae188e0d3d5d2eccaffcc34e374704b0a28e635b9ae182b6d1a88c2154d936ffaf882ab71feaaf46e4678dc1224d8a592e1fafd95112eacf85f11e1366b1e3eeef1efba21ab53049f7ae93b4c352920d5918e100c17fbc5d7447ae721590b41803e654a94142d841610eee061d5916c183ecfcadf2fb336b7b0ab62030770a6b1b28db37b6c8f00d5c07d58f66c821c748975485f8787d3da96d8da9777f5d69ab1608056995443819bf179e1676711d33477e49aaddff2f2189fbf15a0cfd1f6cfa321bcb6a9b5abac12388d1b4fd576f6e0c6c46237baa29d09464cb8dfa0902231c5334ea0ee9ca69fc5614d6652c04d6e66fc0254ac28b50193c3f70030c8ccae14b493b794f35f275d26e95c5b6946531d4ae84f02f536a86e7a5ea529ba86bf9fe5e5b6d12e5648298f9f0b412dbeacccba773055b4f2a823a82ee5073e433ee4678818b40dd7a7c350bf5e7f074844bc96552960305f037e8607aef56639a50daddc531a79121026dbf8437cd55d86af681d0037c7324a0ff12d02e7c51c40c5fd7cd73041bc3257630a432d934b82001d92e4cdffb2fba63953d754e1a36064a836b1229c628c4b0b3ec36a156c152fc0f171f219c2e980a93557be2840096b5af5100c83f43d4bc777a8e791fbf48c0df46d66e83c1d3c3d48bd5f3b3054208b836322c38eead71bcd526db86c9d0fb509ff058c297de027bd0315123df6c8626be83ef5d99602b21f84b877eb240ed0f4c344476dfb97c685504a0e50504971b0e790e8608cdab632833f16808a5fb28b062206e67a9c8d07d0e3cdc14806a5b3c308ef82b7e413745688634a5e9dff57df0eb37f1ec5f89a27e861902917916941f3", 0x1000, 0x6}, {&(0x7f0000002200)="b91d4d6e5ebbc607c13502d525746f683e745708f7ad12126e7d400e5c33cad294c9bf19d6d62b29d090539e69c38148321f8305a4ab71968448e9ee47db6273ade66fb36c7ca4fb88661649aea5177f43a8", 0x52, 0x30373d4c}, {&(0x7f0000002280)="563ba270fcf80ae89b0d2cc8bc2e574152381d59991eae6ff89cf44327669413a8bf6532e8b179b3a713573db89b68824f10a4ed1e18ecf3a9094d80a07ea35e478fcfd6498922917642", 0x4a}, {&(0x7f0000002300)="81f17b881a0de1c47aaa6ff05aa689b2165ac640ee1714aba96a8a2df1a6d89295d214614746bead5379a3c8a6abdceaf35a91303b274508fa60ebbdf1157bdb14a51f54115e1231b6ecd36ddbdd45ae55f5912eb4ad73ffe06c372a096c0f4598210d3fddec5444729836177d2c64c57fb095fc2124c36fdd68c6612663b68b18d211d807a4815eefe036a73716ef282201507a63409cf9d5d1c7e44b67754f8a57d9", 0xa3, 0x5}], 0x12000, &(0x7f00000024c0)={[{@nocompress}, {@cruft}, {@sbsector}, {@nocompress}], [{@subj_type={'subj_type', 0x3d, '/dev/loop-control\x00'}}, {@fsuuid={'fsuuid', 0x3d, {[0x64, 0x36, 0x54, 0x36, 0x36, 0x35, 0x72, 0x64], 0x2d, [0x37, 0x37, 0x66, 0x33], 0x2d, [0x63, 0x32, 0x64, 0x30], 0x2d, [0x66, 0x62, 0x39, 0x33], 0x2d, [0x62, 0x36, 0x33, 0x64, 0x61, 0x35, 0x38]}}}]}) ioctl$AUTOFS_IOC_PROTOVER(r3, 0x80049363, &(0x7f0000002540)) r4 = open_tree(r3, &(0x7f0000002580)='./file0\x00', 0x9101) ioctl$CDROMRESET(r4, 0x5312) r5 = socket$inet(0x2, 0x4, 0x8248) ioctl$BTRFS_IOC_FS_INFO(r5, 0x8400941f, &(0x7f00000025c0)) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000029c0)={{0x1, 0x1, 0x18, r3}, './file0\x00'}) openat(r6, &(0x7f0000002a00)='./file1\x00', 0x14100, 0x184) r7 = syz_open_dev$tty20(0xc, 0x4, 0x0) fremovexattr(r7, &(0x7f0000002a40)=@known='security.apparmor\x00') connect$inet(r6, &(0x7f0000002a80)={0x2, 0x4e21, @loopback}, 0x10) r8 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000002ac0)='net/psched\x00') ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r8, 0x4008240b, &(0x7f0000002b00)={0x0, 0x80, 0x39, 0x7, 0x8, 0x8, 0x0, 0x7, 0xa00, 0x6, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xfffffff7, 0x1, @perf_config_ext={0x80, 0x20}, 0x5, 0xfe, 0x0, 0x1, 0xffffffff, 0x67, 0x0, 0x0, 0x2, 0x0, 0x6}) syz_io_uring_submit(0x0, 0x0, &(0x7f0000002b80)=@IORING_OP_POLL_REMOVE={0x7, 0x4, 0x0, 0x0, 0x0, 0x12345, 0x0, 0x0, 0xf37b0517a9fa287f}, 0x6) 15:06:31 executing program 7: ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x1, 0x80}}, './file0\x00'}) sendmsg$NL80211_CMD_GET_WOWLAN(r0, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x28, 0x0, 0x800, 0x70bd25, 0x25dfdbfc, {{}, {@void, @val={0x8}, @val={0xc, 0x99, {0x5, 0x4}}}}, ["", "", "", ""]}, 0x28}}, 0x4040041) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000180), r0) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f00000001c0)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_PMKSA(r0, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x54, r1, 0x300, 0x70bd25, 0x25dfdbfb, {{}, {@val={0x8, 0x3, r2}, @void}}, [@NL80211_ATTR_PMKID={0x14, 0x55, "f242ca8ef37eeb71321831b929506c2c"}, @NL80211_ATTR_PMK_REAUTH_THRESHOLD={0x5, 0x120, 0x22}, @NL80211_ATTR_FILS_CACHE_ID={0x6, 0xfd, 0xd32}, @NL80211_ATTR_PMK={0x14, 0xfe, "bd54684def1f8ea5dd668ce8f6cd7282"}]}, 0x54}, 0x1, 0x0, 0x0, 0x40000}, 0x4000001) r3 = fcntl$dupfd(r0, 0x0, r0) sendmsg$NL80211_CMD_VENDOR(r3, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x30, r1, 0x200, 0x70bd2a, 0x25dfdbff, {{}, {@void, @val={0x8}, @val={0xc, 0x99, {0x5, 0x33}}}}, [@NL80211_ATTR_VENDOR_ID={0x8, 0xc3, 0x100000}]}, 0x30}, 0x1, 0x0, 0x0, 0x127227c12e96c788}, 0x20040c00) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000400)={'macsec0\x00'}) r4 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x6, 0x810, r0, 0x0) syz_io_uring_submit(r4, 0x0, &(0x7f0000000440)=@IORING_OP_NOP={0x0, 0x5}, 0xffffffff) r5 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000480), 0x26800, 0x0) io_uring_enter(r5, 0x10cd, 0xd6be, 0x2, &(0x7f00000004c0)={[0x4]}, 0x8) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000500)=0x4) ioctl$F2FS_IOC_RELEASE_VOLATILE_WRITE(r5, 0xf504, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_GET_DEST(r6, &(0x7f0000000640)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000600)={&(0x7f0000000580)={0x80, 0x0, 0xd05, 0x70bd2a, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xff}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0xa724}, @IPVS_CMD_ATTR_DAEMON={0x14, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x6}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @broadcast}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x8}, @IPVS_CMD_ATTR_DAEMON={0x30, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @private=0x7ff}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'veth1_virt_wifi\x00'}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x5, 0x8, 0x4c}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @rand_addr=0x64010102}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x1}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x7}]}, 0x80}, 0x1, 0x0, 0x0, 0x4000}, 0x24000801) r7 = syz_genetlink_get_family_id$nl802154(&(0x7f00000006c0), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_SHORT_ADDR(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000680), 0xc, &(0x7f0000000740)={&(0x7f0000000700)={0x38, r7, 0x400, 0x70bd2a, 0x25dfdbfd, {}, [@NL802154_ATTR_SHORT_ADDR={0x6, 0xa, 0xaaa1}, @NL802154_ATTR_WPAN_DEV={0xc}, @NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_IFINDEX={0x8}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000080}, 0x20004041) open_by_handle_at(0xffffffffffffffff, &(0x7f00000007c0)=@xfs={0x1c, 0x81, {0x9, 0x3, 0x6, 0x10000}}, 0x600000) perf_event_open(&(0x7f0000000840)={0x4, 0x80, 0x1, 0x1f, 0x5, 0x1, 0x0, 0x0, 0xde71b9db6b3470e6, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x4a, 0x1, @perf_bp={&(0x7f0000000800), 0x8}, 0x401, 0x5, 0x2, 0x9, 0x7ff, 0x81, 0x7ffb, 0x0, 0x2, 0x0, 0x400}, 0xffffffffffffffff, 0x1, r0, 0x9) [ 73.458664] audit: type=1400 audit(1771167991.176:7): avc: denied { execmem } for pid=277 comm="syz-executor.2" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=process permissive=1 15:06:31 executing program 6: syz_io_uring_submit(0x0, 0x0, &(0x7f0000000000)=@IORING_OP_ASYNC_CANCEL={0xe, 0x2, 0x0, 0x0, 0x0, 0x12345, 0x0, 0x0, 0x1}, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000000c0)=0x0) r1 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x33, 0x81, 0x20, 0x5, 0x0, 0xc9, 0x178, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x8000000, 0x4, @perf_config_ext={0x8, 0x9}, 0xd31, 0x24000, 0x7, 0x5, 0x1f, 0xca, 0x3, 0x0, 0x200, 0x0, 0x1}, r0, 0x5, 0xffffffffffffffff, 0x9) r2 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0xf3, 0x7, 0x38, 0x0, 0x1ff, 0x68, 0x3, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x6, 0x1, @perf_config_ext={0x1, 0x98}, 0x11004, 0xffff, 0x8, 0x1, 0x2, 0xfffffc00, 0x6, 0x0, 0x99cf}, r0, 0x4, r1, 0x8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000001c0)=0xc) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(0xffffffffffffffff, 0x89fb, &(0x7f0000000280)={'syztnl1\x00', &(0x7f0000000200)={'ip6gre0\x00', 0x0, 0xf6c7a56482c52977, 0x8, 0x5, 0x9, 0x1, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x7800, 0x1, 0x7, 0x5}}) sendmsg(0xffffffffffffffff, &(0x7f00000018c0)={&(0x7f00000002c0)=@xdp={0x2c, 0x8, r3, 0x17}, 0x80, &(0x7f00000005c0)=[{&(0x7f0000000340)="ee0aad89b7d0073580d858ccff080d18a4c7b5c8805b2c999df5e3ea4783bc37daf3ad044142ddebca349d57ff48bbdc3efed57d1682ed43733dc2becb2b869db992b2853f96c710d8134f478dbbfa8b14d7692c9859ba2ca45d7e5c241b8b86c95928dd809c1183c3fe89a851f0b28892421c025e45089c9323373270a0e065d9f8db5d8429dd79d96bc82d650a518e37efe1a27d121544ca12095498fed0d56349b7f64d835d54379f6ee92e506e8919948047c1be741477766fcc881b2cff96ba8deb75f235fa669a7a1cb1d2a0d94b8e737e9234ef94602892a401511eee4b2dd0ee6a02ffdac0f6252fc0ee4781873b4b846b76c678ba", 0xf9}, {&(0x7f0000000440)="a97ef70064b9582fa44287b8c18138814e6ea9049983bfe0f0d314a41bc85f98aa4efb65d2ea8eeed4a58d034df7361656c5d418a1b8f5a51fa552c735f980626d8b1219ef8302dd5d47016fcd114d0a43780b8361db52d6ca2213c74ae20f25d7df6681652d94311a84ec92fd38dafad3f98a84affba45058e7bbba0175a65519387d20d9e25a0c812b7e36c73d94fcd81d354ceb7494ae9a57388347ba7876fbd71f429bd3d0e1dba8844d6731dd8d2a9cfedd57c4d5331dcb815f94e0df862afa6389", 0xc4}, {&(0x7f0000000540)="9ced734eb93e730c0eda70829fd6c51feec7aa0b815abec17b70e5900a817c0d2d3842d8804b6e225c603be63a0cb13e1f5b1cf66146f562222281715418b75f52794f49a36a1c9b406d49278b909751a3af39e2f553aee5fb51f71a670170395e8a5b7e2fba3ee14b7b4d8847efcc22808c0499e374b6eb", 0x78}], 0x3, &(0x7f0000000600)=[{0xc8, 0x84, 0x0, "f143cca662e884f7a052578f51f3697526dfef064b0a71f98e0e650aa7d15894a0a2ae0e2ee4f80a481bf5158d471e8a88e023227e8f3164775d00e59235d386ef9fcda59dd514bc1eae60718e6e6ef17389fc5f275fbbefdf9dfad4456267109696010631f662331a0500683a96d428abe68e02a8b622c73780a156d02e4e455d1e883176dc82f5cb802fd7e2f50fe2dc76a67caebad65b98b223a318a523e4ec22eb2786c274c7fa631f8b404d86a293"}, {0x1010, 0x10c, 0x3, "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"}, {0x78, 0x1, 0x4, "d6cfeef9e7837ae1686ed1861c52a5910eac1faafc82986c5f0d0d3ddfa9f3e2f9cbb8d0f78aaa67c47cb3ab345782175a8b3e3b8e67b0eaa37e7456ef17830ed5c29920ed82dbc95dd768aded08f08050a9e6246845e0479496d1e69ef929ee52"}, {0x98, 0x84, 0x3f, "36858a94747dfb5cdcd13baccbff659f9ae52315f5efd651e6f6f4a34e91e621167315b3297df3a9c580df9ac0fa43d03a749960e0cf3c06cd3a4c345050f7c73813bc38e8755fade8611c746df6a38f535062043a596abfbc84f38765bd538ca75a73900f45d841382bf9a7368d382f591f078b114fe81666125dd2390b36e003d381e11ab967"}, {0xb8, 0x108, 0x4, "1b55da334956562e65b14d867f92d7f7026379ca84a623b3a4afbb3e988e1a40a98d6719348fc8b59ed3a0409771724ce68ae11acee4cd39daaaf3335b4f7509c42342fdb45725c270dd79ebeef6f63845b378bb93dfdcccac03d54086d6d190ad310f3f5c0fe253257f98c0721383c2e0c72de82c94f07c1aa6cf5e456e623366f8e865f5f12aeb61bf7489a371331a992c8524fc09aa50de5d8d470195e56f0b365b09bb269c"}], 0x12a0}, 0x8840) r4 = dup(r2) flock(r1, 0x3) pipe(&(0x7f0000001d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x40082406, &(0x7f0000001d40)='syztnl1\x00') r7 = signalfd4(r6, &(0x7f0000001d80)={[0x1]}, 0x8, 0x80000) r8 = dup3(r1, r7, 0x80000) sendmsg$GTP_CMD_GETPDP(r8, &(0x7f0000001e80)={&(0x7f0000001dc0)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000001e40)={&(0x7f0000001e00)={0x1c, 0x0, 0x100, 0x70bd2a, 0x25dfdbff, {}, [@GTPA_NET_NS_FD={0x8, 0x7, r7}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40001}, 0x24008850) r9 = syz_genetlink_get_family_id$ipvs(&(0x7f0000001f00), r5) sendmsg$IPVS_CMD_GET_CONFIG(r4, &(0x7f0000002040)={&(0x7f0000001ec0)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000002000)={&(0x7f0000001f40)={0x90, r9, 0x330, 0x70bd25, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x1}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x738}, @IPVS_CMD_ATTR_DEST={0x64, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_PORT={0x6, 0x2, 0x4e23}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x10000000}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x1}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@initdev={0xac, 0x1e, 0x1, 0x0}}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x1f}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x5}, @IPVS_DEST_ATTR_PORT={0x6, 0x2, 0x4e23}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x1f}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x5}]}, 0x90}, 0x1, 0x0, 0x0, 0x20008024}, 0x400c001) syz_io_uring_submit(0x0, 0x0, &(0x7f00000021c0)=@IORING_OP_STATX={0x15, 0x5, 0x0, 0xffffffffffffff9c, &(0x7f0000002080), &(0x7f0000002180)='./file0\x00', 0x20, 0x2000, 0x1}, 0x0) r10 = syz_open_dev$vcsn(&(0x7f0000002200), 0x1, 0xc280) sendmsg$DEVLINK_CMD_TRAP_GROUP_SET(r10, &(0x7f0000002500)={&(0x7f0000002240)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000024c0)={&(0x7f0000002280)={0x22c, 0x0, 0x200, 0x70bd2d, 0x25dfdbff, {}, [{@pci={{0x8}, {0x11}}, {0xd}, {0x5}}, {@pci={{0x8}, {0x11}}, {0xd}, {0x5}}, {@pci={{0x8}, {0x11}}, {0xd}, {0x5}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0xd}, {0x5, 0x83, 0x1}}, {@pci={{0x8}, {0x11}}, {0xd}, {0x5, 0x83, 0x1}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0xd}, {0x5, 0x83, 0x1}}, {@pci={{0x8}, {0x11}}, {0xd}, {0x5}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0xd}, {0x5}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0xd}, {0x5}}, {@pci={{0x8}, {0x11}}, {0xd}, {0x5}}]}, 0x22c}, 0x1, 0x0, 0x0, 0x8010}, 0x1) sendmsg$FOU_CMD_GET(r10, &(0x7f0000002600)={&(0x7f0000002540)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000025c0)={&(0x7f0000002580)={0x24, 0x0, 0x200, 0x70bd28, 0x25dfdbfb, {}, [@FOU_ATTR_AF={0x5, 0x2, 0x2}, @FOU_ATTR_PORT={0x6, 0x1, 0x4e24}]}, 0x24}, 0x1, 0x0, 0x0, 0x40801}, 0x8004) 15:06:31 executing program 3: r0 = syz_open_dev$vcsu(&(0x7f0000000000), 0x0, 0x941) inotify_add_watch(r0, &(0x7f0000000040)='./file0\x00', 0x20000000) r1 = syz_mount_image$nfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x800, 0x0, &(0x7f0000000100), 0x901080, &(0x7f0000000140)={[{'/dev/vcsu#\x00'}, {'\\'}, {'/dev/vcsu#\x00'}], [{@euid_gt={'euid>', 0xffffffffffffffff}}]}) fspick(r1, &(0x7f0000000180)='./file0/file0\x00', 0x1) r2 = openat$cgroup_ro(r0, &(0x7f00000001c0)='memory.swap.current\x00', 0x0, 0x0) ioctl$BTRFS_IOC_LOGICAL_INO_V2(r2, 0xc038943b, &(0x7f0000000280)={0xff, 0x48, '\x00', 0x0, &(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) recvmsg$unix(r2, &(0x7f0000000500)={&(0x7f00000002c0)=@abs, 0x6e, &(0x7f0000000400)=[{&(0x7f0000000340)=""/192, 0xc0}], 0x1, &(0x7f0000000440)=[@cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0xb0}, 0x2121) r5 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000540), 0x490400, 0x0) readlinkat(r5, &(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)=""/4096, 0x1000) r6 = openat2(r4, 0x0, &(0x7f00000015c0)={0x0, 0x40, 0xa}, 0x18) inotify_add_watch(r6, &(0x7f0000001600)='./file0\x00', 0x82) r7 = openat(r3, &(0x7f0000001640)='./file0/file0\x00', 0x6101, 0x8) r8 = epoll_create(0x5) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r8, 0xd000943e, &(0x7f0000001680)={0x0, 0x0, "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", "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"}) signalfd4(r5, &(0x7f0000002680)={[0x3ff]}, 0x8, 0x0) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r0, 0xc018937e, &(0x7f00000026c0)={{0x1, 0x1, 0x18, r7, @out_args}, './file0/file0\x00'}) openat(r9, &(0x7f0000002700)='./file0/file1\x00', 0x40, 0x1) lremovexattr(&(0x7f0000002740)='./file0\x00', &(0x7f0000002780)=@random={'osx.', '/dev/bsg\x00'}) ioctl$AUTOFS_DEV_IOCTL_READY(r7, 0xc0189376, &(0x7f00000027c0)={{0x1, 0x1, 0x18, r6, {0x1}}, './file0/file1\x00'}) move_mount(r10, &(0x7f0000002800)='./file0/file1\x00', 0xffffffffffffffff, &(0x7f0000002840)='./file0\x00', 0x2) 15:06:31 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_GET_COALESCE(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x24, r1, 0x200, 0x70bd2a, 0x25dfdbfd, {{}, {@val={0x8, 0x1, 0x40}, @val={0x8}, @void}}, ["", ""]}, 0x24}}, 0x8000) sendmsg$NL80211_CMD_SET_MULTICAST_TO_UNICAST(r0, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x3c, r1, 0x4, 0x70bd2d, 0x25dfdbff, {{}, {@void, @void}}, [@NL80211_ATTR_MULTICAST_TO_UNICAST_ENABLED={0x4}, @NL80211_ATTR_MULTICAST_TO_UNICAST_ENABLED={0x4}, @NL80211_ATTR_MULTICAST_TO_UNICAST_ENABLED={0x4}, @NL80211_ATTR_MULTICAST_TO_UNICAST_ENABLED={0x4}, @NL80211_ATTR_MULTICAST_TO_UNICAST_ENABLED={0x4}, @NL80211_ATTR_MULTICAST_TO_UNICAST_ENABLED={0x4}, @NL80211_ATTR_MULTICAST_TO_UNICAST_ENABLED={0x4}, @NL80211_ATTR_MULTICAST_TO_UNICAST_ENABLED={0x4}, @NL80211_ATTR_MULTICAST_TO_UNICAST_ENABLED={0x4}, @NL80211_ATTR_MULTICAST_TO_UNICAST_ENABLED={0x4}]}, 0x3c}, 0x1, 0x0, 0x0, 0x20008440}, 0x0) sendmsg$BATADV_CMD_SET_MESH(r0, &(0x7f0000000300)={&(0x7f0000000240), 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x14, 0x0, 0x20, 0x70bd28, 0x25dfdbfd}, 0x14}, 0x1, 0x0, 0x0, 0x2008014}, 0x40) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000380), r0) sendmsg$NL80211_CMD_REGISTER_FRAME(r0, &(0x7f0000000740)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000700)={&(0x7f00000003c0)={0x324, r2, 0x4, 0x70bd2c, 0x25dfdbfd, {{}, {@val={0x8}, @val={0xc, 0x99, {0x1000, 0x18}}}}, [@NL80211_ATTR_FRAME_MATCH={0xb4, 0x5b, "7485f06056f1f08c0f68f6a03acbcf6a15ba5e9036e893efaf39b33576f2135d4caa691a23be87ecb8b5ffbb6a3b6598bf4c0183a6b829d56fac5eaa2458680482c5285a7ab19d7bb721f2374b62bacaee1cd1c7ecf8f60b2626cf921ab39e2eee032d07a8d36a03192449a62c38f83643db19749c8bbe10907cdab349c19b4e6d6cb579c57b69bcd2ebffd9598a790e6076d181b3808af79d496ef201c551126ef30079974326ed3a548e85ad2187e9"}, @NL80211_ATTR_FRAME_TYPE={0x6, 0x65, 0x1}, @NL80211_ATTR_FRAME_MATCH={0xc3, 0x5b, "c0627b8d21a74395d47426850c34109c15184cdf74bdbd23c93503acf0a7ce0031b7fe3d90f0d6e50faf117242a570eb71d80cfb081b95dc6027075e68671332f7cbaf175335496cb35f39f25de5cd09f4fc156333073857fba7004e661950aaf18bc4e23889dc5c1f177e6ef030272a6b38dc14fa27867588f12d0a38ca08dbfef4ddc8411f13f1e3400c6b9c6d2eb7029defb50bfc9fd394af75367a468ce6fe816110b8bd94669725832d4c8713c112eec35c344725672cad0579fd5ec3"}, @NL80211_ATTR_FRAME_MATCH={0x99, 0x5b, "38945284fa559c426d7d089b7e860b189c5e13a598361f38ac6aab18cdfd15528b279a05adaffdfb2e0b7855b49e3e3334d391a0fd763673503374cef90a771de82c9427982a1db062608b9f969fcb9e7c13fd10fbf1d17ec6518a5cfebf54f07dc0029628724071b14a0032913d73ac5c82f93192103eca8d849cd64e193100ca1316724d4728b92ffd7451ad0fee7d080f31b1b9"}, @NL80211_ATTR_FRAME_MATCH={0xae, 0x5b, "488478c7ee0909676eac01f223ced38acbf1775be83e9f185c3e0dc491593d77356846d2b6696800ebb331d4f70766fd75a60e687506c3129fe38b68b9ad6628687622df1562ee8f60a3176cd6b4115b51133bc0a1efa62855475e3763c279271e5f982d765705ad54e5620434679929cc579529483bf0be27f3a7b34666c5e50d1d43af66924dfb8e5db92856840e247507eacedc3f831ea62bd47e8f15e2a9a744b8cc45dc083d94b9"}, @NL80211_ATTR_FRAME_MATCH={0x2f, 0x5b, "aa11d524ebb974eba4b71505d0f924fbda0d02544464f87db9e2e6f0aad751cb98bc7590d6a4fd4bf93371"}]}, 0x324}, 0x1, 0x0, 0x0, 0x8a2}, 0x8000) r3 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000780), 0x400140, 0x0) pwritev2(r3, &(0x7f00000009c0)=[{&(0x7f00000007c0)="85ab2dd39c7259f19af2cf0542ca2e074cbf23aec76db050690145af5041634eed4c46c828f311993b0b3a5ec824be619ebe737771d9d5e94e86b75b257dda56e74eb9ea3760f27e86275f02e716f674497d4bc640d4b64e678aece560fb739355fccd8e9e81ef9bcf3d42981da920d6485b2cd3ff345f4420751ec882fcd24eab0566e1ab0493346ee36b0da6d718a38c71a51b4329592006a2d7f4976ba0ed136b4434ea9a331f1ea1d32174d2d66a5c800cf8e6f95457734d02bf7960191bf1a2779e15ef021e9c14836a9996d1c71cfd3f03f9a8306c0f3eeacc51b1deb972c0d540a65da35aeff7ec7d05", 0xed}, {&(0x7f00000008c0)="27e4957a97771631b472c98f557598d8ada9bdaddf97a8bd0838d73cdb82ea546a46adc4fb0e", 0x26}, {&(0x7f0000000900)="e4f202977f3ddb64ceb85541d7ac7adeee9d1bfd697364180162b8156f1bcbc8397f8c0bd8133b6aaeef2530a78b122d1431ffdf9d45c85ff1b528963853154d5ab22af45f71dfb3e895a8044e9847a8a501224ea6cd29fcbdfdb842cf56e7a3363bb73f2c1296dc0c6eccb78a9d19f1879e863fa4dce8b19995c685c2716ae9803fbd20e197b992339afb62a160bce280caf553309816451918981a4d9f6787b8ca9f", 0xa3}], 0x3, 0x7fff, 0x264d, 0x1e) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000a00), 0x80000, 0x0) fsetxattr$trusted_overlay_redirect(r4, &(0x7f0000000a40), &(0x7f0000000a80)='./file0\x00', 0x8, 0x0) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f0000000ac0)={{0x1, 0x1, 0x18, r4, @in_args={0x4}}, './file0\x00'}) sendmsg$NL80211_CMD_SET_QOS_MAP(r5, &(0x7f0000000c00)={&(0x7f0000000b00)={0x10, 0x0, 0x0, 0x3a10824}, 0xc, &(0x7f0000000bc0)={&(0x7f0000000b40)={0x50, r2, 0x20, 0x70bd28, 0x25dfdbfc, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_QOS_MAP={0x34, 0xc7, {[{0xfc, 0x4}, {0x5, 0x3}, {0x61, 0x3}, {0x80, 0x1}, {0x0, 0x1}, {0x20, 0x3}, {0x40}, {0x2}, {0x11, 0x1}, {0x8}, {0x1f, 0x1}, {0x6, 0x4}, {0x3}, {0x4e, 0x6}, {0xff, 0x4}, {0x1, 0x1}, {0x4, 0x2}, {0x6, 0x5}, {0x2, 0x4}, {0x1, 0x6}], "f21eb752b9b5722d"}}]}, 0x50}}, 0x9c0) ioctl$RFKILL_IOCTL_NOINPUT(r3, 0x5201) sync_file_range(r3, 0x1ff, 0x80, 0x2) r6 = dup2(r4, r3) sendmsg$NL80211_CMD_GET_MPATH(r6, &(0x7f0000000d40)={&(0x7f0000000c40)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000d00)={&(0x7f0000000c80)={0x7c, r1, 0x200, 0x70bd2c, 0x25dfdbfd, {{}, {@val={0x8}, @val={0xc, 0x99, {0x7ff, 0x69}}}}, [@NL80211_ATTR_MPATH_NEXT_HOP={0xa, 0x1a, @broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_MPATH_NEXT_HOP={0xa}, @NL80211_ATTR_MPATH_NEXT_HOP={0xa}, @NL80211_ATTR_MPATH_NEXT_HOP={0xa, 0x1a, @device_b}, @NL80211_ATTR_MPATH_NEXT_HOP={0xa, 0x1a, @device_b}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}]}, 0x7c}, 0x1, 0x0, 0x0, 0x4040000}, 0x24048c05) r7 = open_tree(0xffffffffffffff9c, &(0x7f0000000d80)='./file0\x00', 0x80802) sendmsg$TIPC_NL_MON_GET(r7, &(0x7f0000000fc0)={&(0x7f0000000dc0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000f80)={&(0x7f0000000e00)={0x164, 0x0, 0x800, 0x70bd2a, 0x25dfdbfc, {}, [@TIPC_NLA_NET={0x18, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_ADDR={0x8, 0x2, 0x8001}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0xd21}]}, @TIPC_NLA_MON={0x24, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_REF={0x8}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x20}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x4}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x5a2e}]}, @TIPC_NLA_LINK={0x10, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz1\x00'}]}, @TIPC_NLA_BEARER={0x40, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e21, @initdev={0xac, 0x1e, 0x1, 0x0}}}, {0x14, 0x2, @in={0x2, 0x4e22, @rand_addr=0x64010100}}}}, @TIPC_NLA_BEARER_NAME={0xf, 0x1, @l2={'ib', 0x3a, 'ip6gre0\x00'}}]}, @TIPC_NLA_BEARER={0xa8, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz2\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e23, @broadcast}}, {0x14, 0x2, @in={0x2, 0x4e20, @multicast2}}}}, @TIPC_NLA_BEARER_PROP={0x14, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xffffff31}]}, @TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x80}, @TIPC_NLA_BEARER_PROP={0x34, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9763}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xfffffff9}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1d4}, @TIPC_NLA_PROP_WIN={0x8}]}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x4}]}, @TIPC_NLA_NET={0x1c, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_NODEID={0xc, 0x3, 0x7}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x9}]}]}, 0x164}, 0x1, 0x0, 0x0, 0x800}, 0x40000) ioctl$DVD_READ_STRUCT(r5, 0x5390, &(0x7f0000001000)=@disckey={0x2, 0x2, "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"}) 15:06:31 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x100, 0x0) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000040)=[r0, 0xffffffffffffffff], 0x2) ioctl$VT_ACTIVATE(r0, 0x5606, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r0, 0xd000943e, &(0x7f0000000080)={0x0, 0x0, "99b61ce472e68ceee3197f7eed5f40fecc7bf87d8b2bf1809ab1299316e2a422978ea9a91c89ec7c746857f4ab5f00b60cb37054bbff6071a632762980f2e12e775317c912991fbea680232011d04df493e4ba239192a2ac0dccc27d712356e7798ee116c8577bc60715ae69bbbd5babc82b31400c16558d3d92b02eb063254c5f40141acf3a340c7d8a97607061ed28800dc61b21a0ed29cc696c822e2fe82881d66c01769527318c28e1d843f914eb00936fe29f22950726ec6f598068fb486499d6e35c5334ffe3e6b11dc9223ef7bdcade0c3b4ef4bb145c60aa3ab80ba71a038625eec3fda9675fe52208910431063e7adbede74e77a5573a1b5a1bd9d9", "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"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000001080)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r0, 0xd000943e, &(0x7f0000001280)={0x0, 0x0, "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", "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"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000002280)={0x0, ""/256, 0x0}) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, &(0x7f0000002480)={{0x0, 0xe4, 0x7, 0x2, 0x5, 0x10000, 0xd7, 0x1ff, 0x4, 0x1b8bc55b, 0xfffff800, 0x0, 0x4, 0x7ff, 0x7}, 0x20, [0x0, 0x0, 0x0, 0x0]}) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r0, 0xd000943e, &(0x7f0000002540)={0x0, 0x0, "7b80bcd1e2093bc01a7140ad8823522721b5645ea8d2ebe44fce0e97b51434b9b42dee2ff3b7a14873489034a775aadbd083e409dcbc0b533f85a45edd871e302fb8f65bbf59468f53b94403796d230b77a175b01f9b5070bc6a61b9a44346df77c180e20f5b08a474c8d23a230f8eb876bf70d769db29d3c4dd7b044cead3aa1f2745d7dc7e1358d8f43c1bc5b6221d301383de640a0e11ef450934dd5e303173ba99baf57ef16287bf112e211c2c675291269d536f61ffd295b876eb20a44ef88323225aba454de4feabac629d95e05634f370292297f4bb9c374aa4319c8ee55547ef53e5b23809f041d6a967f296b2fcdf6fde2a58b3e343bda899420e01", "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"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000003540)={0x80000001, [{}, {}, {}, {0x0, 0x0}], 0x81, "7a043026f7cfd0"}) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r0, 0xd000943e, &(0x7f0000004540)={0x0, 0x0, "20e786dca73f7f7742b13fbe793104f0b7ffc302e7c6f3db66890bd8aaba10e15b57d7df5f9f06bb6ad53c256dd9050d6a8fc97f92cd6d5886c09aa6813253bbd164aa0d1abc8ce1c59deeef5d1bf8599947d000183562e4f7fab21b121d463429b5b5240f189019d25d4a222d0c110ae58c0a2b8390d5193c4b3318078b5c544263b0a35d0c494214295543966d8aadee6c2ddead4692e59a5505fa12edb6959eed9955b901ee4ff2d7c4712aee2719bb8088befd69025a3ed0166464079d4e0510d60e79d8bbd33db3ef508299d001fb34e1be58bf7d379e17a8d68509233191514c8f904c48d6e32c3f39d6167ed7bd362a433af8a30651d404d33a5c587b", "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"}) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, &(0x7f0000005540)={{0x0, 0x3ff, 0x400, 0x1, 0xe83, 0x1, 0x6, 0x401, 0x2, 0x5, 0x1, 0x1ff, 0x5, 0x1ff, 0x5}}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000006540)={0xff, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x81, "282a8e2f982939"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000007540)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r0, 0xd000943e, &(0x7f0000007740)={0x0, 0x0, "84bbc4f6ed1b029b98db2296e8e2434da8c5123489ff7aa2e93e7a9dceb414c3fb801c1c68c00df43c5289e495d30ed8dc34d518be37b772697d102375e44823209bea46d7b889ad842e9610329a644d61f28a416aa87b4bd692da16eada0b8ff47430bfdd5813101a76ac03b74fb97e2caf1d0a753c60594acc7ada820c44b7c72312ae224fae9277b48073c12f8ee4790c5b24544329d946b4c127b9f68634eae43042932307807075ddf480ba55f1afc51c076fdb387dc88808997b18fa835030437a1484e4c56ca936523b8772b5e72a351727f3556024fc1d4d21441e1b0f4246ba98375a1b8c85541ee2e68c28bb0f63590d23d184b0c2a3920e1f84ff", "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"}) ioctl$BTRFS_IOC_TREE_SEARCH(r0, 0xd0009411, &(0x7f0000008740)={{0x0, 0xffffffff, 0x39362823, 0x800, 0x3, 0x2d2, 0x8000, 0x8, 0x8, 0x7fffffff, 0x6, 0x800, 0x7, 0x401, 0x651}}) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r0, 0xd000943e, &(0x7f0000009740)={0x0, 0x0, "497eb4041e4013780035f9af616998e7e81be9f6ec101f47fb8154a1d7c6ec39cb79aac5222152dc90caf44498b077c76ae8d0155d26a1f9191ab571751d212b1ae652b67b5a789658e783775b851d755b507f3dd7426db17e65d775d8527e954018b5d5b14c97e279ffcb5d692eb62c03b80fa9b3fb7752c4cf490d91edf645b44f405b454a1bcb07e1966a5de320727a80ab31745d966750d1cbff8b14bfdd7e15dabd5a35510eedbab22f4d1f3fa6f2a919653027e29eaf4723609642a09cf8bf95da938732c937e903393e48e73cee5aaf1f27c653bdd689d5965475c78997fae569a50ea035de608ea20cba1ee4866cd775ec64547371c476b76d74b27b", "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"}) ioctl$BTRFS_IOC_TREE_SEARCH(r0, 0xd0009411, &(0x7f000000a740)={{0x0, 0x0, 0x3, 0x7ff, 0x72, 0x1, 0x0, 0x0, 0x4103, 0xffffffff, 0x8001, 0xfffffffffffffffb, 0x7, 0x2, 0x100000001}}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f000000b740)={0x5f7e, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x3f, "c34b8d4389d242"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000075a40)={0x7, [{r1}, {0x0, r2}, {}, {0x0, r3}, {r4}, {r5}, {}, {0x0, r6}, {}, {0x0, r7}, {}, {0x0, r8}, {}, {r9}, {}, {}, {0x0, r10}, {0x0, r11}, {}, {0x0, r12}, {r13, r14}, {r15, r16}], 0x0, "d640117741e04a"}) [ 76.732612] Bluetooth: hci2: command 0x0409 tx timeout [ 76.732625] Bluetooth: hci4: command 0x0409 tx timeout [ 76.733122] Bluetooth: hci0: command 0x0409 tx timeout [ 76.735916] Bluetooth: hci1: command 0x0409 tx timeout [ 76.796239] Bluetooth: hci3: command 0x0409 tx timeout [ 76.860202] Bluetooth: hci7: command 0x0409 tx timeout [ 76.860225] Bluetooth: hci5: command 0x0409 tx timeout [ 76.861000] Bluetooth: hci6: command 0x0409 tx timeout [ 78.780194] Bluetooth: hci2: command 0x041b tx timeout [ 78.780215] Bluetooth: hci1: command 0x041b tx timeout [ 78.780890] Bluetooth: hci4: command 0x041b tx timeout [ 78.781519] Bluetooth: hci0: command 0x041b tx timeout [ 78.844232] Bluetooth: hci3: command 0x041b tx timeout [ 78.908202] Bluetooth: hci6: command 0x041b tx timeout [ 78.909220] Bluetooth: hci5: command 0x041b tx timeout [ 78.909898] Bluetooth: hci7: command 0x041b tx timeout [ 80.828230] Bluetooth: hci4: command 0x040f tx timeout [ 80.829623] Bluetooth: hci1: command 0x040f tx timeout [ 80.829649] Bluetooth: hci0: command 0x040f tx timeout [ 80.830846] Bluetooth: hci2: command 0x040f tx timeout [ 80.892215] Bluetooth: hci3: command 0x040f tx timeout [ 80.956291] Bluetooth: hci7: command 0x040f tx timeout [ 80.958939] Bluetooth: hci5: command 0x040f tx timeout [ 80.960815] Bluetooth: hci6: command 0x040f tx timeout [ 82.876264] Bluetooth: hci2: command 0x0419 tx timeout [ 82.878040] Bluetooth: hci0: command 0x0419 tx timeout [ 82.881865] Bluetooth: hci1: command 0x0419 tx timeout [ 82.883121] Bluetooth: hci4: command 0x0419 tx timeout [ 82.940246] Bluetooth: hci3: command 0x0419 tx timeout [ 83.004345] Bluetooth: hci6: command 0x0419 tx timeout [ 83.007488] Bluetooth: hci5: command 0x0419 tx timeout [ 83.008915] Bluetooth: hci7: command 0x0419 tx timeout [ 90.973535] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 90.974531] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 90.976867] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 90.977844] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 90.979260] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 90.980642] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 91.124013] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 91.125049] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 91.126568] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 91.134694] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 91.135612] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 91.136723] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready 15:06:49 executing program 4: r0 = semget$private(0x0, 0x6, 0x0) semtimedop(0x0, &(0x7f0000000000)=[{0x0, 0x5}, {}, {0x3, 0x6, 0x800}], 0x3, 0x0) semctl$SETALL(r0, 0x0, 0xd, &(0x7f0000000000)) [ 92.283814] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 92.284749] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 92.286196] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 92.367118] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 92.368091] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 92.369507] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 92.372192] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 92.373031] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 92.374613] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 92.484676] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 92.485603] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 92.487707] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 92.809999] loop1: detected capacity change from 0 to 135266304 [ 93.418729] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 93.419686] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 93.421212] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 93.450847] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 93.451750] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 93.453090] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 93.522484] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 93.523436] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 93.524954] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 93.552221] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 93.553093] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 93.554293] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 93.748345] loop3: detected capacity change from 0 to 2048 [ 93.763707] loop3: detected capacity change from 0 to 2048 [ 93.910597] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 93.911630] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 93.915680] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 93.931464] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 93.932750] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 93.934052] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 94.027113] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 94.028583] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 94.030731] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 94.040780] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 94.041970] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 94.043331] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready 15:07:08 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r0, 0x7, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r1, 0x7, 0x0, 0x0, 0x0) linkat(r0, &(0x7f0000000100)='./file1\x00', r1, &(0x7f00000001c0)='./file1\x00', 0x1400) r2 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x101142, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x0, 0x1f012, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r2, &(0x7f0000000300)=ANY=[@ANYRESHEX], 0x278) sendfile(r2, r3, 0x0, 0x100000001) 15:07:08 executing program 0: r0 = semget$private(0x0, 0x4, 0x100) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4317, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semop(0x0, &(0x7f0000000040)=[{0x0, 0x4, 0x82b4d8da1ae7c66c}], 0x1) r1 = semget$private(0x0, 0x6, 0x5) semctl$IPC_RMID(r1, 0x0, 0xb) semctl$SETALL(r1, 0x0, 0x11, &(0x7f0000000000)=[0x2, 0xf747, 0x8]) semctl$SEM_STAT_ANY(0x0, 0x0, 0x14, 0x0) clock_gettime(0x0, &(0x7f0000000140)) semtimedop(0x0, &(0x7f0000000100), 0x0, &(0x7f0000000180)={0x0, 0x989680}) semtimedop(0x0, &(0x7f00000001c0)=[{0x0, 0x4a41, 0x1000}, {0x0, 0x0, 0x1c00}], 0x2, &(0x7f0000000200)) semtimedop(0x0, &(0x7f0000000000), 0x0, &(0x7f0000000040)) semctl$IPC_RMID(0x0, 0x0, 0x0) semctl$SEM_STAT_ANY(0x0, 0x2, 0x14, &(0x7f00000010c0)=""/79) semctl$SEM_INFO(0x0, 0x1, 0x13, &(0x7f00000002c0)=""/113) semctl$IPC_RMID(0x0, 0x0, 0x0) r2 = semget$private(0x0, 0x6, 0x0) semop(r2, &(0x7f00000000c0)=[{0x3, 0x0, 0x1800}, {}], 0x2) semctl$IPC_RMID(r0, 0x0, 0x0) semctl$SEM_STAT_ANY(r0, 0x3, 0x14, 0x0) unshare(0x48020200) 15:07:08 executing program 6: openat2$dir(0xffffffffffffff9c, 0x0, &(0x7f0000000740)={0x0, 0x0, 0x1800}, 0x18) shmget$private(0x0, 0x1000, 0x10, &(0x7f0000ffd000/0x1000)=nil) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x22c, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1000}, 0x0, 0x0, 0x8001, 0x0, 0x5, 0x7, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x2000000000, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000000300)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB="00000000000000002e2f66696c653800f399264fcd12a1b7c4358959358e8585ff2b781e9ffcbead7bff0fdf8c5553cbacf35023a50acf4276363d2449472df83f78d0f515b82b677dcda104cb2443c8432adaf7ed36a516d896dbae7abc9656fa5e258ae5bdf5175607e3741c114231d3d6e23ed45ca49f5ae49129516873e632dd1e4c2a999eebf72ee44da6554c00e88966c2ed4a"]) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x129) r2 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) writev(r1, &(0x7f00000000c0)=[{&(0x7f0000000200)="af", 0x1}], 0x1) ioctl$BTRFS_IOC_SET_FEATURES(r1, 0x40309439, &(0x7f0000000280)={0x1}) syz_open_dev$sg(&(0x7f0000000480), 0x8001, 0x10380) r3 = creat(&(0x7f00000002c0)='./file0\x00', 0x0) fallocate(r3, 0x0, 0xffff, 0x8000) r4 = shmget(0x3, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) shmctl$IPC_RMID(r4, 0x0) shmctl$SHM_UNLOCK(r4, 0xc) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r2, 0xc0189372, &(0x7f0000000080)=ANY=[@ANYBLOB="012e1004841726ca00000062a3e9ca9d88ecff", @ANYRES32, @ANYBLOB="06000000000000002e2f66696c653000"]) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$FS_IOC_RESVSP(r5, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4000006}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x14}, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000040)={0x0, r2, 0x2}) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x80, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x10c004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0x7fff}, 0x0, 0x0, 0x0, 0x5edf9b4026fd8338, 0x0, 0x7f, 0xa9e2}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x1) [ 111.082918] audit: type=1400 audit(1771168028.799:8): avc: denied { open } for pid=3957 comm="syz-executor.0" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=perf_event permissive=1 [ 111.088596] audit: type=1400 audit(1771168028.799:9): avc: denied { kernel } for pid=3957 comm="syz-executor.0" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=perf_event permissive=1 [ 111.118217] hrtimer: interrupt took 40005 ns 15:07:08 executing program 1: r0 = inotify_init1(0x80800) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$BTRFS_IOC_DEV_REPLACE(r1, 0xca289435, &(0x7f0000000040)={0x0, 0x100, @status={[0xffffffff, 0xa7, 0x1, 0x3, 0x1, 0x2]}, [0x8e, 0x6, 0xfffffffffffffff9, 0xffffffffffffffff, 0x9, 0x6, 0x7, 0x7f, 0xfffffffffffffffd, 0x8001, 0x2, 0xd3, 0x7, 0xffffffffffff5b5c, 0x0, 0x40, 0x7cc20b72, 0xec94, 0x9, 0x0, 0x400, 0x0, 0x2, 0x9, 0x9, 0x0, 0x6, 0x7fff, 0xffffffff00000000, 0x80000000, 0x8, 0x2, 0x1000, 0x0, 0x960, 0x5, 0x9, 0x80, 0x8, 0x2, 0x93b, 0x131c, 0x4, 0x1, 0x400, 0x3, 0xff, 0xfffffffffffffff7, 0x7ff, 0x2, 0xfea5, 0x80, 0x7, 0x4, 0x6, 0xbc, 0x2, 0x4, 0x10000, 0x8, 0x0, 0x0, 0x9, 0x2]}) write$binfmt_elf64(r0, &(0x7f0000000a80)={{0x7f, 0x45, 0x4c, 0x46, 0x7, 0x2, 0x0, 0x2, 0x7fff, 0x2, 0x6, 0x1, 0x102, 0x40, 0x2eb, 0x2, 0x8, 0x38, 0x2, 0x8a, 0x7f, 0x6}, [{0x5, 0x4, 0x8, 0x4, 0x19f, 0x800, 0x4, 0x2}], "8eaa37e78d3b511bb798766e987f6e7266bf196fce75952457d456669d74765281df72c023ebf6b630d75cbfe80b9463a2e82b84169a5b61dfc4792f9fd4d720d6884dced850fa24a1af8828712f8746cded7320c9f99133ef94a30a65dfa71fe2f89071bc46f98faf62d5c80c61dd5b05ead6bc92e95dd4ac8d1f53a8108db68b1d34c55040673ed816f5bd0ae5243e255575b108b9a87a41732f33c19db274afd440e4a44ff6a3563a0b66f3edf1ba34e8f0", ['\x00', '\x00']}, 0x32b) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = syz_mount_image$iso9660(&(0x7f0000000dc0), &(0x7f0000000e00)='./file0\x00', 0xad6, 0xa, &(0x7f00000023c0)=[{&(0x7f0000000e40)="f7f39e11809021cb7797cd2ed2af4fe29a22c7c1684aa13188729cc540b8b4a06379bc19d8879cb2b988ed9918fb7a0a99ecfcd43a3c3aaf4d5b967c2a50d3cbefd8b44ae8ac3b70c459c86f0ebdfb62d3973503e8b0f718bd63e7d1d3036bbfc919b25bb779a345ff67be71101b6f1866e1ff19845510f2c392a593909b86bff3dfb8597925bf4635ffc0224f8b07192337060c61ca42b88df0306b4e3626d5317edf4a39e8cca188cf96247e0a642ec73f1d4bd8a5bfd6391fda0b6371d6bac054384fa33dd7e0fa8355037f178ef9e6533373fb67eb3b99732589cc80f4cef3f9fbedcab81701e0de", 0xea, 0x1f}, {&(0x7f0000000f40)="cb5f2de9b0579dfdc765af901c29d7047ed80bdc9c7373cd85d8c8ee64fb297cf9b4f51209bd93cb63bc860ed088b0043f528038b225ca5300e746cfafcd03f63212b970ad5fa65399708a106c6987e9443d03b767fba42c74c2dcf434d140c3939bd12f1fe60b763193db8d03bf366ca4791f981fbf803c6acd1a31215ecb3e863600d344f6f81b62dbb32ef6b4e3948ec3bb3d9e2d14ae5c2b06091f3e61511f1993948dbcca2418f6", 0xaa, 0x9}, {&(0x7f0000001000)="ebd48b66a383a76142aaf50ee0c6e18233656ce33be33176e9f73a03039f5ff3d42573982733447bbaeb9a47e9489a053d165ea1d98cb644982221f3d88e73156b8bd9a7819203d4eba249012fd05401d7a175a9ea3eb24dc41e940ae1fe9836e993f23af1bedcd6dd5b6c9a024d1629d34dbde4561bee0ff808fcaf01ad9e2bcef4dab758b336", 0x87, 0x6}, {&(0x7f00000010c0)="6a38284281aa6f02f62eeebeaf256c834570689ebb1d7836b3852ebcd5c0ac18e6d538285535cb8c9b7ac811c6ec276f524424bc9da7b7b43a48e0e3bd272686f7d4ef1b5020925c467c2381ba959a1be4160dd3b28ccce391345d56bdc8e3b0b7cfcafe6b8bfac491d8adffd2f8f7f2ab3acc550359e68439", 0x79, 0x1}, {&(0x7f0000001140)="37e3ed48c98b557a65ad6abf27932199fbd7aa6b4afa554191580fa0e403b8e349e517362bccc7d41741aa8d27a2a2142bfc5d93a09aae05cf9f3b452ade9bd5e0ae436697b2fe510a12777a800f1b8ee9a343fd7980633158284c5c49fe4a71dba96a2c5acbc93f47b4152dee3b9dba67ab", 0x72, 0x6}, {&(0x7f00000011c0)="8601e20334219993b92f732a7e3d03a39396e0fbb96635f13f4361891139f46f4f8f2007174f", 0x26, 0xfff}, {&(0x7f0000001200)="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", 0x1000, 0x6}, {&(0x7f0000002200)="b91d4d6e5ebbc607c13502d525746f683e745708f7ad12126e7d400e5c33cad294c9bf19d6d62b29d090539e69c38148321f8305a4ab71968448e9ee47db6273ade66fb36c7ca4fb88661649aea5177f43a8", 0x52, 0x30373d4c}, {&(0x7f0000002280)="563ba270fcf80ae89b0d2cc8bc2e574152381d59991eae6ff89cf44327669413a8bf6532e8b179b3a713573db89b68824f10a4ed1e18ecf3a9094d80a07ea35e478fcfd6498922917642", 0x4a}, {&(0x7f0000002300)="81f17b881a0de1c47aaa6ff05aa689b2165ac640ee1714aba96a8a2df1a6d89295d214614746bead5379a3c8a6abdceaf35a91303b274508fa60ebbdf1157bdb14a51f54115e1231b6ecd36ddbdd45ae55f5912eb4ad73ffe06c372a096c0f4598210d3fddec5444729836177d2c64c57fb095fc2124c36fdd68c6612663b68b18d211d807a4815eefe036a73716ef282201507a63409cf9d5d1c7e44b67754f8a57d9", 0xa3, 0x5}], 0x12000, &(0x7f00000024c0)={[{@nocompress}, {@cruft}, {@sbsector}, {@nocompress}], [{@subj_type={'subj_type', 0x3d, '/dev/loop-control\x00'}}, {@fsuuid={'fsuuid', 0x3d, {[0x64, 0x36, 0x54, 0x36, 0x36, 0x35, 0x72, 0x64], 0x2d, [0x37, 0x37, 0x66, 0x33], 0x2d, [0x63, 0x32, 0x64, 0x30], 0x2d, [0x66, 0x62, 0x39, 0x33], 0x2d, [0x62, 0x36, 0x33, 0x64, 0x61, 0x35, 0x38]}}}]}) ioctl$AUTOFS_IOC_PROTOVER(r3, 0x80049363, &(0x7f0000002540)) r4 = open_tree(r3, &(0x7f0000002580)='./file0\x00', 0x9101) ioctl$CDROMRESET(r4, 0x5312) r5 = socket$inet(0x2, 0x4, 0x8248) ioctl$BTRFS_IOC_FS_INFO(r5, 0x8400941f, &(0x7f00000025c0)) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000029c0)={{0x1, 0x1, 0x18, r3}, './file0\x00'}) openat(r6, &(0x7f0000002a00)='./file1\x00', 0x14100, 0x184) r7 = syz_open_dev$tty20(0xc, 0x4, 0x0) fremovexattr(r7, &(0x7f0000002a40)=@known='security.apparmor\x00') connect$inet(r6, &(0x7f0000002a80)={0x2, 0x4e21, @loopback}, 0x10) r8 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000002ac0)='net/psched\x00') ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r8, 0x4008240b, &(0x7f0000002b00)={0x0, 0x80, 0x39, 0x7, 0x8, 0x8, 0x0, 0x7, 0xa00, 0x6, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xfffffff7, 0x1, @perf_config_ext={0x80, 0x20}, 0x5, 0xfe, 0x0, 0x1, 0xffffffff, 0x67, 0x0, 0x0, 0x2, 0x0, 0x6}) syz_io_uring_submit(0x0, 0x0, &(0x7f0000002b80)=@IORING_OP_POLL_REMOVE={0x7, 0x4, 0x0, 0x0, 0x0, 0x12345, 0x0, 0x0, 0xf37b0517a9fa287f}, 0x6) 15:07:08 executing program 4: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1c08a4, 0x0) r1 = syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) r2 = open$dir(&(0x7f0000000200)='./mnt\x00', 0x40040, 0x10) mkdirat(r2, &(0x7f0000000280)='mnt/encrypted_dir/../file0\x00', 0x20) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir/../file0\x00', 0x80, 0x3e4fcec92923ce05) r3 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x50008, 0x0, 0x10081, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r4 = openat(r1, &(0x7f0000000000)='mnt/encrypted_dir/../file0\x00', 0x40, 0x100) r5 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r5, 0x7, 0x0, 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r5, 0xc0406619, &(0x7f00000001c0)={@desc={0x1, 0x0, @desc2}}) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, &(0x7f0000000140)=',,\\\x00') futimesat(r4, &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0)={{0x0, 0xea60}}) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000680)=ANY=[@ANYBLOB="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", @ANYRES32, @ANYBLOB="02000000000000006d6e742f656e637279707465645f6469722f2e2e2f66696c653000"]) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') 15:07:08 executing program 7: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0), 0x101000, 0x0) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SNAPSHOT_FREE(r2, 0x3305) fallocate(r1, 0x4, 0x401, 0x117) 15:07:08 executing program 5: r0 = perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000340)='\x00', 0x0) r2 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x430a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xff}, 0x0, 0x0, 0x10, 0x0, 0x0, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001540)={0x10800800, &(0x7f0000001600), &(0x7f0000000300)=0x0, &(0x7f0000000380), {0x26}, &(0x7f0000000500)=""/4096, 0x1000, &(0x7f00000003c0)=""/128, &(0x7f0000001500)}, 0x58) perf_event_open(&(0x7f0000000200)={0x4, 0x80, 0x1, 0x1b, 0x4, 0x1, 0x0, 0x5, 0x41100, 0x7, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x101, 0x4, @perf_config_ext={0xfffffffffffffffc, 0x6}, 0x1000, 0x7ff, 0xa5b, 0x5, 0x100000000, 0x2, 0x1, 0x0, 0x0, 0x0, 0x8}, r3, 0x6, r0, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2722, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x804, 0x0, 0x2, 0x4, 0x0, 0x0, 0x1, 0x0, 0x8}, 0x0, 0xfffffffffffffffb, r2, 0x0) ioctl$AUTOFS_IOC_PROTOVER(r1, 0x80049363, &(0x7f0000000280)) pwritev2(r1, &(0x7f0000000080)=[{&(0x7f00000000c0)='Z', 0x1}], 0x1, 0x0, 0x0, 0x0) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) ioctl$F2FS_IOC_ABORT_VOLATILE_WRITE(r2, 0xf505, 0x0) memfd_create(&(0x7f0000000100)='\x00', 0x0) finit_module(r1, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'wlan0\x00'}) r4 = syz_mount_image$vfat(&(0x7f0000001900), &(0x7f0000001940)='./file0\x00', 0x0, 0x9, &(0x7f0000003e00)=[{&(0x7f0000001980)="f71d5576f588dcf210511fe013ff4f", 0xf, 0x2}, {&(0x7f0000002e00)="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", 0x1000, 0x3}, {&(0x7f00000019c0)="18b1d156fde8cfd88d844014d0b93d1f9f8d9ecfdd73243d5406a8cdb26050093441a1eae4017230c9e2254b592ff6dc4c8019928c692148129571d8cf992e060ff7061e5246b3a7a4ecb97ba4b4fff976d0a9c694c56e1bb34162ae89e3457e4feee236020a61519670834aab26b7b879628b1e1409cb98bebae3563f5bf3fa545d74a441034eedd22741", 0x8b, 0x9}, {&(0x7f0000001a80)="e9a55bf4eadc94803b82453618c4c4e137dd1f3a047ff279e3", 0x19, 0xb4e}, {&(0x7f0000001ac0), 0x0, 0x1}, {&(0x7f0000001b00)="bf0ac625477bcf2a9e6fa826bd07c8cb16d6daed57bb93dc6d60b948eb927599a16ad10a64bc5c18e61cacb06e34", 0x2e, 0xfff}, {&(0x7f0000001b40)="8f116e702d3ad15fed807db3a05e3f079436a50cd11d5be867a8dfc2430fcb0adeb48719c660891cc4cab306186b941d288b9d9c545581bbd7aadbbe0b609157f144f3105412ab72aa232629ecb327cbae95da4891e9667615980f9b502017bbe64958ce60e6814c2a42ade4", 0x6c, 0xffffffff}, {&(0x7f0000001bc0)="bd44bc7cc3f67675016ff746bfb7fd2273406fe12072ee6cd20ee62ef3629e269d6351238174aab806068f97275810a242b9229df369e1ada0c27d7d879695f46c2425c3b160cd26472f70b61f390f6c9b42826b4fe866e5b869993d6f3478ec6b42f6e8d9d1719b6210dea0893de32f49b4575e18a407c70dd687a7ee02b04657", 0x81}, {&(0x7f0000001c80)="e95081315bf81d0e5914f2c114a6ef0248c216190ba363b1120b8053e70eed7e37e06db1cdb1ea270b975a80f508c93a25251895e920fc4dfed468e9bdf5fa473b64e63c98c63677b9b661e598d5a89f4b26adfa40c0d208adf215bdf69741052fd328d9c0102a5ea737af7a47069ab301f26db8cf18315ce426951de37fcc83b5591ad54c8cc7908765126fdd1300aab6a259dc4832e8c704988cc911164f3bececa1729714aab0bb0f3b21bdaf7bb9b00d25e1dddaffb48efb35c751f262577d49881243f6b24835ced2aea7f7df1d14296672c0818ba5dd1e8c2e9107a1df484487ae473bcd37a74f983644cdccc6f8d6b5", 0xf3}], 0x2018000, &(0x7f0000003f00)=ANY=[@ANYBLOB="73686f72746e616d653d6d697865642c756e695f786c6174653d302c726f6469722c73686f72746e616d653d77696e6e742c7365636c6162656c2c61707072616973655f74797000000000000000052c66736d616769633d3078303030303030303030303030306666662c00"]) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, r4) ftruncate(r1, 0x0) socketpair(0x1a, 0x2, 0x7, &(0x7f00000015c0)={0xffffffffffffffff}) ioctl$BTRFS_IOC_SUBVOL_CREATE(0xffffffffffffffff, 0x5000940e, &(0x7f0000001e00)={{r5}, "6bafa66ec4216d30a4a7b60654b842b78f87fb55daf88adcb8468def6b7ccc0f6ffadf0517b3c7fcde83dd1535a4ca4ed200e4ead86d217eb07eec64825f287277552c59768a5cb7e7a1d2fe3e46fedf359fc98f875782b52f220e67f1a81a69d4bfbb494042f8d6fb1ea2bc0f812db2aeb482a771aeb32ffd17a329d3da8f3b01d38bae8dfd7216c72b78b0e14a91d08fc7f875867f36a366e889fb65d1f9a9d9985dda67fb22adc7ce3731dd38e2d66175d05f04d9f31886dbb5d5cdda2fb7cc2da9847ccdaba951c22816ac2d01f16dd91ff457697b356649caf97834b1cb999866a0572ef57c4eec7b21fc90825087c9aa18bcbd1036ed0a9405c316ce7aa6354851a3a07c7e34f1c35776e43f4ff40920c6b207cd4d792a2a4e9e61f92822bef4927642cb58bb370dcb1a1ea53bad0c0370c2e9136eccb74bfcb68dc0fb555174a266da9ad6aac15f2791d331d04a3555d1e82655333a9bc92be86ef3adb8b976294aa045ea961d57d76a874702cef4ad0a0f696076f9f128a4d7a9ce836871890bf65a6ef12d864ab2fcded783bad7baabf9a9199f9454bfb91c26d11add0cb1627487bab7e5d3a982dbcbccbc3912b17dacb35daa661ae75b26b979b88e362095455ed40f64597b4d04cd0a63a192600161f6131d79599ae96f4cd15f8ce556c64ff61b44772dffaf3a816c001abdfddc9d66fafc77158e718dcba9317011547c74dd436afd7f5fd9ffc9b3dc65cda2d2635934d128f25eb195e2cc265173c2890cfe0b4401d05c45a7b6cd02907654048348e49c760ccb08fe0c10687a7cd6adb41355431df468cdb594732e270d82518631f468685b7d087162769d7ff0a419f25557f9daf1a11de32a268334b40e5122d47dfd31230cc2533797b7fdaefac5bed6653efad7065e49a2f8a0834d5b627917d91f6f19eacd1125504ed9e6313035556000416653fdff1a0606baa79c38b9f73deadaf43a9b2bf535a17bf55cf1bfa48a58c809d7f7dc536c276c11de9143f88dd22608824f2793080b372d40edfed40dda48f20a7c34011d6027845bdd458599822c01296481342a4698789764d8c013c1cbae476caa70a20ba74070595568f5ca45b3542cb42e81800a0e511f9f0e03859350090bdf96d43900716819f38834718dcccad5795981679af616ab3378c43388f22dc899805c98312595936ac549434db1fa2ce4840f1a63705e26f203af28592bb2f3edb0b16ba69fb65720c0a3d124043f407fdc52494129478593ed2d38343eef27e0f87244c4011ebcaed14532f645d4bdeb0a9e4df1f8efc13c13ee84e0cf407ca043f59a842fb819578b889b9b0a923b6cf2c7bfc030d0e6d9ffe1d30731cba52372f8049629006b5a201b834af1aeaea1abd7d498f61dd5ecb2e9bb5971bb7f2dfe17c2e3f1d839971873a12f08ac27a2051cfb6dd9e6cf65003d7f55d684042f4ef0645849f54417356b7adcb2096d2624283142c7d6b5b72a775a23c10059f9be9222126a10b316b32b7ddf2e397957b1f6601f5637b80f0eccab9f8c7b0457e6599c2597d3b4122e753c491764bb9443b2cca986a10a70ae2f47c2ac8af9f6986174e70642c27f26d4d81bb8dd47d6b9d602df6929c3552c05a5a1814ae7f64cdfe3bf962ecace788aa3440047ed33f160edc19aaed3cf031462275f138a515f38c55b744a76f3317c56df5ed8b2de17e0758b2948ab6fae85638c3d2875659375fc73ce81f3bb56fc12f613f31edcba2af6b290efbf42c05e165b504ff7509a4b5b21f45896edc5d259d4433fcda47e4df0a915220e8ff719b4088205ab42a90bd6a20911a0c6a2ea18739071affa65ef6c5ab53bb5e9a18d3483b3aae6c1924b9442205919ae45fc9d63a61128ed02c9c95053570f87238e7470eaaa6d7a75111ee57a347d3ea990f9adc9f1fc38812cf114bdfbab7426ef40ea90830e2b364e590d1adff672667875fa17d93e2877186b833925e2d183ac682825c3bcdeaaf3d67348831c4b899e92716b57c34078b479dad542624392ab129671c8e16d90899212562e199819466213218bf70e61799c35ba9a3d79a35ad6819251c6638f8387154280696c127fa968cc7da752b8dcb726ba5414e1e88e3151e63bd3174fffeef7d14d9d9187f2555b2f0e3a01eee83d5311b595aadb49b32915bfe0119a19d21f622e799a1893b4bf9abe719e0968cc0773f0eba0a875f1493f359422f26986965b2195d50425d82531624c919867e48b60f645cc9800550f1f253e2704c4adba288def27fac4bd7c1c114d7397717ff7cc4a997d7c28e6cf31ce204a29e6843b0a0113e0e0a0ccf3f4fda93253679021e3d09720e9c19c36fb70d3fcba9a2bd593ec3c95fd008c97629e1b6dd40b122dab00922b18353e1fec70aea99a14d911ad8a5490b8cff429fa2c5c241f5c3318b4619ec7c860090e9e1b818f6fd561a2787c1a644d7b758e5eda287f3a9162f03f05d69671b8212bb2b374f4319c9c4d5585228c6b8cd23299d36ec5783dc089a5a41ca1a6ea19b46fb95f9939b443b19e87a8c62731291102c89ef7f110a5fb680d9e281f7b1ff2e71024041406dc9b8967ab419cba6c053d5e124e4ce81b17851a6356341b80297429b3e6ddf388d9e3f7e30b9ef2d5994eeccabd74f56ec3dc371ce640afcd4082c853f77f6d1389096d103c67949c7641e1c8863a95413a77bfeab46e15237f9ddabf3c7ee8aab17afd7edc1d87244247235dd5c684ea7f2da2735f2372717642d019917ff2f18d62283f3cbc11e20710e9a82fd58c29970c58fe7b80f8b985ad09589373796a4ef8abd305403d5b20e8dc43f9a8da599ac85a4d9e10b6a49b521bb8d2731105aa745b515f3504298d8276f4eca9ab767290b7c9b5387d2244fa7a40fe4f0a5017b7be3d36e808fe3a3f66c7c112d6eafe4cdb014b20fdb3bb63c82b2d7a7925e77bd279b1a8c9e4eb708f62dde1cb2d97ef9e4894cfce0b52401175624d3be0ec6423abeb488976af37af2aa2ce1a479a8e78a2bf55521bea592efd64d74715d0f155d1347af56e67fef4665d5f4b75877af40db8b159dddbacd503bbefc12c9c5b0d95efda463b55e1e96c57a363730ba8c0ca16dc73974368864a619a743e130c1cca6e24e1ef8d889043b002ffe9bdd7fca5bb65a2e014d53134d2165ac833982038df1b4cecae83573cabfa049a4e1e8fcbbdc6dd735691bbd9fe93d3afec8704f04b9f9d4d06396d898cde853eb0ab06876995732316fd301f8f0183bc23fce54881842da71d71579f605b8322047956860596f2179c55c1f637967478627b673f4ec7968c12958b4865bfdd6a64ec5269eb69c9f4969fe48394797d19821c122bb320a100a425aed6ed9f0ec4869181c451d6623ee5699749645612cce522373fc9f07e631eb3f726ef757c427ede907ef1b099e7567722f97b643ce6feee2635aa731e5e1b3abf2450a40bd8b1b6be63c90a5a6fb07e95d0494b2c3c57028ccc6908b10de6303344bf5708371a4b29020a1ef1217155dc87c21e1588f22be8380d4f021921f59eb86f6857943ff382d5a7f43fcc89894293bb93a5b6154c9d6be945eb20bb79ee91a0827d52dc8ffa6414bd101490d753fe097ecf12a1d9ea43437a787a3400a660f51b2b1ac97bfb60c87a3eb25526c9eb12d9c5d11aaf4c5bc642f112ff7999ba9e12f00e41bdc90550056b31de2d4d5ebb77c587dec03db19eef9356760c93d12d40efefa93ae6c8633143e6fb1f66ad25f8ef267c44ceb7ad5ad49d7e4c31585b3a411019c0238360c6a439c6e6de25a0689a63be50584126ba948557e5daffda4691d3d69c36ba04797f719e2caf21728b84f83dd462aaac53810aa65fa9379e6493c6cbd0a44b22bb249c66142e971b066cd929701c5e7cff8d591f66bc39e70e939d02e738a1ea662dddc6f7f959a73094f4f04c8872afed2f94ae73f59a371e06b05ed616b4485cdc2e8842c4502b14c1905ff8596988f5ac9e9c201a030108688de99d7fa5a8e55b8c506634787650e35eb2e9b4da7b1466ed35ac6374e6177414f0aa7b0a21a3b648a3bb52984e71c2dc9546ae14a4ed53726b4cb7d93d40b67633e547a7471113a953a62c22d3b0fd13ec8e82674d90d8605753bec608a81af39fd2cbd34d9f7170f33f4268eed0b3a38b8000724af652b6ce522f44e57dd3ff5010ba43aaefae2b253c696f78586013f0e8c7e9daa67a24964d029dc0814f0a89be99b3800e9166733da80d8db13178e9030f6e3ca01f434f5e3b1d0d9849eab8b9ee0e0e16e7e3d0415f379d23f4928b281ce31408c54817851c49fdb30946aaafaf517c095ddf1343433fe6635b5eb3eaa37fbdfa69c25fbb8683a7344bdcdb88fb64877a161df378a7dd2216915bb9d2d58df5abff7d82ee1ea4e0cee5235135be5bcfbbe1f07677401e088bcd8a608d15644f0dc372c1924cf21bcbc49f6b90aac2d1b401e349be4bc0570c53574f1d288b21bf8c48aaf906213efecac68ee7ee4ae28b422d87203ed1a0ce7a35a3ec2e92163fb171e98cfae07bdedff56154855078b62831e41bb1ebbbaa05b1bf8ec258323d452538b90e96af6848094ed6b02b1a1e8d7543fdfb2895b0a7cc4f5775460e54ac0fb3a4950448cec14a390d866f35e0dae62a2e84dc86a7fb073b10fa14c8a39c3fc9ab413a7e2ff6ca2ec2e3215c937a6475c7a68ed481ab461b0d595ba5fd13033fbc7ae1a4792a262e5735c53be296d0d78d53a18a140e754cf8e6786414d33583b0b28eecb6b49342f173c0f32288c5747b48c6d574c2d56fd9a86d49ff508f636c12773d0f3c2c6177425dc12b3c4cb486e37707dc5c2398c5fa33b77d529e0364c24cc8c09a3df4cfc3d1717c4cdcaede727d71225d7db043c26a5f497978daeb9524e815e36adf1ff65036cc87552c3c2548523dbb753b0f682a3dcb28937d9bf5ee2b712138970735096a46e799cb64dbe146ac7b3498d03efebbf37ee4c902c403d1b0a4469e1a2bc3e57fc59f4ff50d84d4fc724dcb397fd1668797a8385973695959a74c18f553a50477cec17b321aba92de43e6b3f6acbec8d6b710b17864670f248b3405b4c1d96a36648741e7ca0892d6f214293dc672665a25e62e12aa6039d3fec62e3b06f58f4bf8a477e3e850b1e0483fbc5ed587c9b86ba04a91c44579deba6d841f2b2477a6df63d2a6acf8db996def1604f7ff572aed9b083a0a8aac52b837ac942981adcd9b4617ab42e563591b530fca5cb87c70f9cecbcc83524b5645afb36e9f91254039eff01b099db0b6a043f8f583455dfa3e49e8792f401416dc2705e5d13ade3fae7252c85b4dfa7fc97156c09356c9f68e9293d2861ae011730a1b871a208afe21060508d364d24be54732ccac410397f1af2c4ad68863b3f1d4a25189f7878eb97bc4e9442e145f0b67dada4d86e24a9c077a89c9ca22dbe891bd6421c7dc554cfb0daca0fa18b7f0da8c7afbcf2e1746172cd6ec12d754212c21b0adfb5240404f15b3ee310835db39d62950cf982b8ac14fb81d667fa8ab7701a07f311b431ce068f11f99c72425d57add7bd0228baa1e1f4c88507106c09b474cca32e1eefac5285cdc949fbac80530920c8d9681031ff7ca3a2e9b17ed5d45828b50da05366e4a139358c70e2cb5895bdce99175cf9d5c029347adece202ba3a5344709946f2cfcbf0361d703a74ecff1989b831deb2d71514240d95bcbd40199104d316d33c700550f83c3d8e234edef17a690377fc"}) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000180)='cgroup.threads\x00', 0x2, 0x0) 15:07:08 executing program 3: r0 = syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x1, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(0xffffffffffffffff, 0x40605346, &(0x7f0000000240)) fspick(0xffffffffffffffff, &(0x7f0000000140)='./file0/file0\x00', 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) fchdir(r0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000001000)=ANY=[@ANYBLOB="140000002c00ff2d000000002000000000000000"], 0x14}}, 0x0) epoll_pwait(r2, &(0x7f0000000000)=[{}, {}], 0x2, 0x528, &(0x7f0000000080)={[0x4e0]}, 0x8) r4 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x40001, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) dup2(r5, r4) sendmsg$nl_generic(r5, &(0x7f00000002c0)={&(0x7f0000000180), 0xc, &(0x7f00000001c0)={&(0x7f0000000940)=ANY=[@ANYBLOB="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", @ANYRES32, @ANYBLOB="faff650006000000000008008300", @ANYRES32=0x0, @ANYBLOB="5000968049005900de3f43c33134e9a7ce60553fb579d7435d434fac0669e311d9a966df31fc73ccf1bb0af324c6d2ccce44b0f573456e91dc2c93cdd0f7b664561d71646cc2de4b6e200e5f7d000000159408311c4ed1b8f4436d99632b0808967090a9a99e002580050074000000000008005700ac1414bbf563016a9f8fede534496d477d97ca2d9795515903c9e3d83157f7bbb21da38ad5d45281a26268b3be4e71b5be0414de988c7bf775a9c5828fde748c017e4b35a124e89dd08eb76b303f65bb7bf62f3c721afab55dd622372da2d8aac12ddabdf0fe7ff115384ca3833c117b38b1ee7e72102be9ad5c097f0d03f4e1333eb67b8adad163f45d6f7ba9ea00007adf56222a1d492c3597e19ce70ed133ce081b810d1fcf66bd19f5271e00"], 0x578}, 0x1, 0x0, 0x0, 0x1c}, 0x8000) ioctl$FICLONE(r1, 0x40049409, 0xffffffffffffffff) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) getresgid(&(0x7f00000010c0), &(0x7f0000001100), &(0x7f0000001140)=0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r6, @ANYBLOB=',wfdno=', @ANYRESHEX=r7, @ANYBLOB=',cache=mmap,cache=fscache,debug=0x0000000000000924,nodevmap,noextend,dfltgid=', @ANYRESHEX=0x0, @ANYRES16=r8, @ANYRESDEC=0x0, @ANYBLOB=',hash,fowner=', @ANYRESDEC=0x0, @ANYBLOB=',fsname=.,fowner>', @ANYRESDEC=0x0, @ANYRES64]) [ 111.204867] audit: type=1400 audit(1771168028.922:10): avc: denied { module_load } for pid=3967 comm="syz-executor.5" path=2F6D656D66643A202864656C6574656429 dev="tmpfs" ino=1027 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=system permissive=1 [ 111.213963] Module has invalid ELF structures 15:07:08 executing program 7: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000000)={{0x2, 0x0, @local}, {0x0, @local}, 0x20, {0x2, 0x0, @local}, 'dummy0\x00'}) ioctl$INCFS_IOC_CREATE_FILE(r0, 0xc058671e, &(0x7f00000013c0)={{'\x00', 0x1}, {0x3}, 0x140, 0x0, 0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000180)="b467f3489ff4121d6434d9a67ddda0a7c4e3bc466a7ee07d9fc115fe34176f814d365cadfc7f089249f178e2577cd61d40af62ee2a87fea2798375e2c9665878c484d50df965a12984f4004f673fb5adf10293c7ad1fa604727199622e9566bf45c2db4c95df090a164f84c962b1c667e2d781994fe6efa50fed0fbf0dd0ee7bc9ca51ae2df3d210aef72f3e636cda1222235f1dc9fb70fab1fadb3cd0206bef6034d0a00d35ed58b7e306f3fecd26d92a85bc6dbc87ddb408e804facc99964f", 0xc0, 0x0, &(0x7f0000000240)={0x2, 0x107a, {0x1, 0xc, 0x6d, "db08acc84769fcc55c8c044930582746a354fc4b4ff721838fccf79f9018585bea843b51fc7cfda768f23f2170d68fe91a5104472b453e45f1f7f7715b9a1a88ee7192e18fd635f8a341a28c5e2e0e88f3136215178e2779a990454dec5030ebc6c7ae847131b59b65c861f775", 0x1000, "ca492962e4ffefad7927e84eb36cdcef3f67a2863421d2efeaf26e8419c1dcf93ae4f64838592e34e7e33bf19f727a59e7de3eb495760049efe17c177bf7dd270942308630979733ffb855025ad9034e31fc6042f398b22b1a82278a7d4f3a07537bb7d776e7f9a9cb54d2e63a7f3ac012255e8ac7450ea8c1869fc91554c282ed4ba6094b70f3b8d8128875feb4d474ad0792ec3822c4becab2b4486cfba901d439625d61e9c1d3e63c438f33f1b4c3220177d7664b815f8891839c3f2ef6a7f6a79e3cb509240030fa914405daf93c49ad2917461346a6d7ce5ff0531c72427bab221c398b4cc2bb31258ae1361254a7bf5a3f473f9e5f2f95a1c19a97994c6fba2e36e1e9f1d5ab846e4b12f59fab36ed7f782951e2916e479a61dcbc07ecb60d5b93f464a29e4a9f5a61cdb8b6ee179e18cfeeb537cfdcacc7f7370af05ad7869f53b2ca8d70cb3d17d9c47777e6ba5333a96887136e513f67b7f0846002f0ab7fd625bcff0ba3df07fd9877b4db31d86fb827de26af57bd5665ade79ee0c58596f7edf5da746807487b15aa34cc8c049b2bd3ae21b920bbea090e4d9ac319bdf5a1ac45f2b239947d05f69aef7b118331919bc5569ce5095fa3acfdec24bdd3fc5213376bed4fe9c6543d4d63e400ad8ba430b3d64bda5b804db1c262d7f052962e1212addcf57417821b6fc3e01d8357eb64a287121f47366eba3a5d58f8fcbba58f3f6121effc8d4051b2f0f536f3f580335ee7983d9ec490bbe88588c688f2c7a46f8f2783663f0cbc77d78fda28a03d22ca9a9b418b41e6c0fbc63ee12a012ee67cddb0796df114e4873adb219f3523c5e37f28d6939f0e4f718c412fe3b517a858358d95398e1a23cd739f699332b4f7f7aceafe116420be7571efc02820a71156120e9392aef6d8284186bf03392c6eee3fca56e41ec372f3d23e0ebc8bcbc26be1207175bd44e2129bccc07900e83a5f700d35611ffb5431a143f7c95aa878956f21f0b7ef9a22e6bdff4a1b5ec39821df2d73eeb2dba8ffcf512fa6b7d714236bae5e62d07e01853610df833fce50d6d1788fa9bc847ec47098197fe1b9d525766e4f63d669606ffd7f5a70d321f0109ee9b37399cd6e485ae69dd42faa89585f1893cfe2ca6bb525cf35f09f38dbea1566f5e35692292fba523bfd44d9c96f8d55cd6616231cd2506efd3c6a496d85dc0d451a2e8cac7ed3a99650d5170db6b92bad45dfb104ee1cc32faf5bdf688ae9a3d4309a6bd72bba29adc52626199a96f689597332d97464888dd8f70e5d4925eeba5a8ae601c982180d5e57ecf7fc5e0a076dbde33beada8d914266f453d6d93360d92daec843148c773f4f26a43a6b13ed3c5fb872090cd31b678182869f44c6de471d9d82c0c78284e1134bb973964734bb69c886dccc5b56cad18b8536dd8c6a486cdfcb9c494fcdd425eb1343880b0c0caeb31e6e40811b4b117c7e2bc25b77ae0683664d93bb5356c3e6585bfeeed379c7d61ad22c5a942879605d5fa33973131c938ccd8c1621cb1eb14b88c60adb0c657102ec0fd7d693e8a97c5182ac9d03d5d05d792a496ab9e1f988cfa7cc09d35b7f3f9c730a9d8bd10875f44ff7c971d59a998a76e24b2276ff4ef8b26d0a133c57e3aebb95524d0349f1b336d882cb3f332ea0b346b28f07de8b3af99e5bac6e6e6e3ba4a4b742821dd07625349ea67c0c54c82b0a70465a0e4c88636f6ceff4517b3ce27e20a9f4471d51246a25525c1d2de3f8ccfb3b0e93d898add7598d3df5c5c3478686bd0e8239f93dec2b527fdcbc591adb18e19594f667564f02288c4ff1676809c9cebc604a8350bd6c2b0703e4bfb1374b76f38a11ee4cb3126649286a244cded6b21a5b08388871dd86556fd5ea235b014bff8e83c90e019c44911e19c2de6b99609a6e881d0055b49790e43672852957b74cbdcef2bfd20f746d363f5bf985b93edad10a27b85a3fa2a0cac7998211dfcd365a60d40ce2c6ac3b404fbf59acd2eb5b52e9645ea85060a665869d01f6929627ccb97e09033f98ee5b057e0eb1821cd9756468473fb989381aed41e53bf48d598fd389a2d27a7e5880fb708b5bbacc26c399362c389f075bcb7c3665904346d00de2b447aec398843692916b86a5f34a6cdcfd876731e4733ebe48dc54e5dea9057e9804445ae936bac697e6ac1d7ed5e86bcf9ab7282fd6549206f4e04919f4619ab6973efacbe47a0cf193cc9fccf8792956b42bfa3003cbe931a7d0bfeafed3ce9e7fbd2d474fdb4ca2457926d3d685c46155794908245dbb6312ab3fbf4cadb210280d62624bae5276f4a1746934cbe8914e368015f7d483d3164ddb7c24332d09158cd40678bb9cf3f41639582d93ba040d80f6e33fc70edcd57b78f19da7dab06e39b5b6d2a8529575d7897b3fa41d3c2ba60714694cd530c8796a631661440b345112140977b7614c82c7c596cf8423806c434f19f20a7153d77e30cb74bb4ba3364cdc5e3e7a37cbb7dd4690c1c1198cc97902cbb2d646d71e16acd2d6a7d59be213a053e17a63ec949767fb7a7ca3cda2ebd6f68a82f2a157f2788d2171ce3e07a61c8052907484148a3e6112b2bf20bc9057e9115d05be8f08ad5fd012d62e0eb93825c88e30b82e8ecd6c38cd0b8bab10ac230c35677d5e5abc68cded1bb057a2d65815c5236cdc7afc20973103ce95396a66306e03ae3f1768f345b93544619cc93d61f8d0b2edfff5d82c6cb67af21329764ea5bf4ff66239e7b15dc906aac58802598aec476fdc126025c4db0622d1469a081bd8bfcc8fd6390e97dc0e3a1a744ba9a7cfb581b745352189fd6673f3b2ded01139722b50fd20f7a3910646187f9068b1641e26c3d983b5d81af4f397f342e5db7c2e5e4e0512493fca1ccb62675ed131e4f7593aef21363eee15556c4cbb4023609ee022f1f7cf031e7647204456f2fb0e4e5b23183b27589d07de0f01e8fd89f605c75b5a4b44c6f96de354148d7ca3c98c6482531a3bce993e60f22c77e4116b859d0c38d2ead0d150e5954667eaa31b139bdd30a5d39d88d2d987782aea1cb903b6f66e5dba4dc941c9611de4732202d04d0c10e11c9c6e613e91a0952693a0a171d7fec9a6cbeb73a8396205c2f0ea3976ca39beab12b3434fb3e9e5bdbc9c98872e29c01236ece969851df4ed7f10793435c3a121a0e5128f501248ce7cbe1d90fedc79622a9e893a796b6d7ac40650ab847d91dbfbb112fc2a58469e4586e0961760815d664753a9aa6a9c957b5054b7d98ea930856b7123e0ccb43401f95e62bd51516642723f276975c372a170e365a6b8c07bf2848aba97393661644ee5cc8cef8df773fbd453ba6e40633454aee30eeb1b0d5d52c3e7e520c763c27be7a2115429c1116a7c5100450ef247fdff1c0408b24f8e9e743cbb8bd0eadc457206136b5216a2db9079f608cbbb5fa1ce8ef457800f796d85d1204a2f4278e091d9fb6be0f4f3ca7c1a77b76923574bce2f3f433697b2569683545d6f3b2a6d4994333206acc6c30ae5250bffabe0297912834ec0f215058122d3ec4d63f12e4f909c28095b57e446af598e73409e2eab1d86d608e519a5919c64f0ba123a14fcb3e46b2eeea5015cd7842cb2d08b8cf5bda9778645396d6a25ef4473b76d3a1de38e129d400c93a58c972b755c03b77b15a7f272da63a8e633da4745d5ac139b3363c6b0630df9cba33927a2e8c68275a9a60fa5661167ef6c46fd531ce062b2fde821355bd8791d264e44f2f948bad52291338b67b026bfe89dbc853252e6de210dfcd7b66d04e59580127dccf82ba1961f4e92aab4a9ba9f7bdf0554b264682ae8409b4609e751dae6adc7d20c0445132c15a7af8e312a6e47ee9b7a8edce8da68122d0668023c2bc9bc4712573d0827c4d805a334999c925e50f51b65e4e06f80e0090dbb56cee240b85f7066c27c5ba07e45a5c9b823d850eeb506e03fa0821b507dd4d08c4dcaff6ab2aafd738ac6eca31740a2e8510fc06ae96f6d231324e66989bd3222d6f042e432f3c7e66e53a730343d261f22f69ee0f9f21a21477af120559d78ece35f9e48c20adbfcbf20b0f4a2ac151ff5f5fb80c6e86ea7198c09276d0bae641099d6e392ce6c341a8c8c9251bbc64a9dfdf20378f3f2a61c9273e299cddaf04e285d612e27a2364c84dace77ca3af8bf7ccfb774e11adef72d85ac4505a689fd750dbb423aa961477715034df999cdce37fbae108a4df3a7566855d6b9190a832bb455e1e2778ef9ede31a61bca4dc3ff8b79aa62458ca441c9217efa87fc412939a2a0c54bc3372d5c701f0837b4128ee2d6ffbd751f79b77c78172396f46d39a8fb9110c51af6fe0c551e72f2b670fa1286ea5dd184708bdf9f34fde03acce771bbf16ca99e7359773a75b9fc2b345aadc9048232117760b7cb08b8c226dcf7b8512209821c53ece51fa066e420a894850585bfd1ed8b0a48bdfe347ae71f67a21ad5151746465c204906ca779198a00de499bff098a17a89f29d35d4f6cd63528675f7cab6ebcc485e6bcfc75c0232870a237db3b3d69af4b8a3184c3059cf8a4729f3a6490879d3d2a13576d95f5447261d7229d5c5f30984b5f2673b7f41d7beda7594422163889f3bd86e0d8f221e73a8734c855b007e9bad1cfc18a71c00a35669f4ff960636a24c2a35139648d729f7fbfb9255d5a156347fa6bcc1b0f9cf44207dc960bc78d6e31006a99b51a892a33a0e93a89d7f2f3584f316792d95e7081fc1b216ecc96ff968477a03f2dc811db7bae7957b6777cb517f5919685633b00aee59d731789c155554545461f6a3a1801d8c148591fceced6fb8fd589b202035970a99f9c47a31f8530ff80b6e50a1dbe7488884b2b8e4d9ec94f09cde4103d62e578ddbfd8d467fa7d726375152259799df2e9aee5db8335e95920c27132ad13d7fb5e1aa3ed3647a3b8fa97786a5a0ee27d1d91c5ab36c2bc7e2fcb27042f4457b7e9ebc2ea06267011b5e620f4e19aff61b5891b23c097762e014f831661296a15da8ad561840bc8800740777e17817e4727e510b02a682c4eaf7249b5da2820009d735e635ce1c7390417bdac7f90fb83ec731c63274a0aeec5696f6a0dab2fe2286cf254affd2c715f4a730494d9c65f3d00e485a716488a33d957d56597af214e1eb768ff31581e7fc3f45f1351a580153a99fbfac49b18e0d5d87c476ab047a10eaa07fdfa3e0b31fdf757df1ba07866998f97812332fe779c76fbd5b6a6aa20fbf3872d0f520efae65d2c345e7a5c83596f646089674ceee88736bb7a3fdbc13aa9eb4ac53f72a1701acc2fcbec879feaf98735e5b89a331c45c9bbcf73473f21213152afdb467e0d15c20339ce6f608815954755924646de4e80708c08bb253a70d81f3658995771f2baf19d67d4c4261507e648116479abb217b97b1106e46510230898fe229221d320d777857f3035bebe89cf98bc577f046505c4b211bc7667daea0723fd10aca4f79ed601dfe91227c32370879d316a7fdaa3e4d226c2a825a629f850ac18a579d6941fbd0d7c6482ff626afd732d1cb83767f0e8b148a2a9cafc655e503269000c1c31a53a1f940202572e61d0e58f6d7854fa3c0f45fd98261bf8c4712c3fad5176842ffd619778a89e23a0e9945e215edb1afcee730c1bc4b9a5cfad6b5822a038933c8835e10878c2455514fb53731e25a0748b24e78d190d66e43850182762883058fc936baf6ed01cffe413631e5225e8b1ac2e395c7c8fc5c7f6bc5c00a8f90d7ff16a0a"}, 0xf3, "0e088f785bc8a39fcec998c5ef68144c4e8a000cfbf1160d269bf92e97a91046e5c4162dedba2503642f2e6e6bf31fc5e4fae04da27873e6ff0525689bd89928726136244d93c3052109ebdc69bf74accfebf18fdea9e9965b222bfa0cd359500f5647ff1e615a53ffb51f5a80dbc7dfe02aa4028bebc838c76274d5256505d115065424baa2d40db74c14cda711e8b200839fc11b599302521a5a790f2a823f3c6482f74b831413e925a57e1c180078d9f64120ad89bd35b0819b11280d07168954bdaf8344d46a0ae9dbde96dfe8057200518612f3ab5339c619db25b47f0e3d3f645cd5c714fc182fdb78f886f2dd7e232b"}, 0x1179}) perf_event_open(&(0x7f0000000100)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 111.360432] audit: type=1400 audit(1771168029.070:11): avc: denied { write } for pid=3962 comm="syz-executor.4" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=perf_event permissive=1 15:07:09 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r0, 0x10e, 0xc, &(0x7f0000000000)=0x5, 0xff4d) sendmsg$nl_generic(r0, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f00000001c0)=ANY=[@ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB], 0x1c}}, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='freezer.self_freezing\x00', 0x0, 0x0) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0), r0) sendmsg$TIPC_NL_NAME_TABLE_GET(r1, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000100)={&(0x7f0000000340)={0x368, r2, 0x100, 0x70bd2a, 0x25dfdbff, {}, [@TIPC_NLA_BEARER={0x100, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_PROP={0x4c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xb}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xb}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}]}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x1}, @TIPC_NLA_BEARER_PROP={0x2c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x200}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7f}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8001}]}, @TIPC_NLA_BEARER_PROP={0x44, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x80000001}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x400}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x3}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x800}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5c1}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xc2b6}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1c}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5bf}]}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x1b}}}, {0x20, 0x2, @in6={0xa, 0x4e24, 0x3, @local, 0x6}}}}]}, @TIPC_NLA_NET={0x40, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_NODEID={0xc, 0x3, 0x1f}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x80000001}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x4}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x88a}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x4}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x9}]}, @TIPC_NLA_MEDIA={0xc0, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x44, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}, @TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x12}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x904}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x14}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xfffffff8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x800}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x4c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x190}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x10000}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfffffffd}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x7}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x401}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x55e9}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}]}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}]}]}, @TIPC_NLA_BEARER={0x48, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x9}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x7fffffff}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x3f}, @TIPC_NLA_BEARER_PROP={0x2c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0xffff}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1f}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x6}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x5}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xe}]}]}, @TIPC_NLA_MEDIA={0xc8, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_PROP={0x14, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x5}]}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0xb9be}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x200}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7f}]}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x78}]}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}, @TIPC_NLA_PROP_MTU={0x8}]}, @TIPC_NLA_MEDIA_PROP={0x24, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x700}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xfffffff9}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x17}]}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x401}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}]}, @TIPC_NLA_MEDIA_PROP={0x24, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1e}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xffff}]}]}, @TIPC_NLA_NET={0x20, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_ADDR={0x8, 0x2, 0x1}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x1f}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x2f}]}, @TIPC_NLA_PUBL={0x24, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x8}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x80000000}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x800}, @TIPC_NLA_PUBL_TYPE={0x8}]}]}, 0x368}, 0x1, 0x0, 0x0, 0x20004010}, 0x4) 15:07:09 executing program 1: keyctl$get_keyring_id(0x0, 0x0, 0x80) keyctl$read(0xb, 0x0, &(0x7f00000000c0)=""/35, 0x23) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) syz_usb_connect$cdc_ecm(0x0, 0x4d, 0x0, 0x0) timer_create(0x3, 0x0, &(0x7f0000000040)=0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, 0x0, 0x0) timer_settime(r0, 0x0, &(0x7f0000000480)={{0x0, 0x3938700}, {0x0, 0x989680}}, 0x0) timer_delete(r0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4059, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x7, 0x3f}, 0x41084, 0x0, 0x0, 0x0, 0x0, 0x1, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x6, 0x0, &(0x7f0000000040)=0x0) timer_gettime(r2, 0x0) timer_gettime(r2, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) writev(r1, &(0x7f0000000740)=[{&(0x7f0000000100)="09f2b434f7bbbe083b21fc2ce4f73d262f4757ec0d6f68e851cb54f953d4e238d5aa0582c3b815ae3b6123c60aaa1e54c941cac63c4e8fb38979405ea33c8b5e40f993c2fc69519be3c99af3e82ed458aa180567b7fd986f00b181a87cb002e79dd2779fc5e763474cf3694126bf309fc65ab7fddb6a706d124ef479d2ecb1f8a2ab9c2742a17a33648185621725f7d3da979a96c5429b425d3046", 0x9b}, {&(0x7f0000000240)="53e21eb6928428f5dd8a2f85ded29c5195ef3e61edb134005cf05917f188edd5bd3d819b8273383e3679b434bdffec5657d8466f7dfa51fee07bf7f45127ffc2f9ff586587b5ae79bc7ce9fa8d923d5019636dfc378e032ebeb8521b0318850c5129d3812ddd42cb2ad7d366c444e32b479afe73b7062ae97439d549ec8c1743f8d370bb23ac2325ca4d92033040883ac708f2fb6fe675bd4bbe77c9d3c10d483a930cdd1f024610d679a6e1679da36bab8f0a0722277c7bf4815fbae73d3d46c2bae47b1bfcaf70476ec9c6c3ec1810bbad4d1cb4b0b754fedefabe665c7c5847a89155093b50ef139e19d2d49eeb76c11429e751c05113", 0xf8}, {&(0x7f0000000340)="00219b2bf9a42e370cf2618991690ec671f6309bbc0bd54f5b9bd56d9e3c972a3fe525cfe1aa4e62c515013668eb5a52de716e9c34e459b2a0317ac69570dd4a74ce194c74d1a485f10d1a82ff27817ebf17262296a41ac85759d1d36e6ba9f909b9fabd445ea023247aaf3661c0f0c83efeefe23602ac5522865a332ee602f2d4e234c766e98108aed593ab1656b53bf13888b0e2021cb623c9767d0058fb651c474039ac058c9d22b72c5c765976760c855e781d4971eec77c7d3a1de02710f24022416f07b581bf3b19e33b8330a25ce6cb357a6cf1013c68286c1759993a1ebf17c0fa4891", 0xe7}, {&(0x7f00000004c0)="7868cc02393f1e8570079aac10ea5b1b4689e0a39c17593178da76d4010dbdaa4d29a2aef2d982f30ac900524f463d74a95e22006abf471972e19da4a9a8c6fb61bcd1e6888b93800be4008071a91ac2f06ba7d6fda84758435b4d2d86054ec7731b41c9d45ed0d6e63e4447ac3b2088d25c1e4184b1c555fb1e7678c2d05bdc81c7b1f89b2ed8db554b53339c0210d5aeb093511a07bac6ecc5a0748448d7", 0x9f}, {&(0x7f0000000580)="69a89b36afd3ce8b1f3e2ff086a926918b914ea98d19374aa9e15b823dd878ef397d41f5f2af859052107388d5b1bb5a1a2eac927a240b6bc9471df31ca4bf4965f5b48dd436234e890a052839c66603587459798fe9fd0e2e4eddad25e88b4e3665ec9c6a5e475288023b8dc7381435b38b790313e092b8412eb8ee095e6257605a4a7e7ff7d4e38606df092fe526c81e240eadc1bf3151", 0x98}, {&(0x7f0000000000)="ca6239241aa691ca30833332839c4bf1c55d76b2b5bbafe147f1f0fd632ca812c6b25513e07f45efd07de643ba1c61566e560e18862a", 0x36}, {&(0x7f0000000640)="806b02dfe3727fb92e811163c62c07f5a7f6f1b8294cc71d6c304a20034822da14fdab37f5a1966217110c179beda4f879296221a9f9272479525c550847f30f05c91f435dc3c320fda02b26b90d100ec1b33bceeec4aab3db0face65be2764aaeec6dc9eff333970285e71c1b0af7ea916907426e769c3f7a76d7ee2f67e7887009fe89370a12b4fdcc717c590db04bb21799e0114b0400769b658ca732ca08e4aa97f45714a05e44f3948b8f2a0286897258b002b21d7f6b86997f37876a3cbea13844ea3c879f4449c8614c4ec76b938df5ab", 0xd4}], 0x7) clone3(&(0x7f00000001c0)={0x40182300, 0x0, 0x0, 0x0, {0x34}, 0x0, 0x0, 0x0, 0x0}, 0x58) 15:07:09 executing program 5: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x10000, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x100000b, 0x8010, r0, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000002dc0)={&(0x7f0000000080)=ANY=[@ANYBLOB="18010000160001000000000000000000fe880000000000000000000000000001ac141400"/64, @ANYRES32=0x0, @ANYRES32=0xee01, @ANYBLOB="e0000002000000000000000000000000000000006c000000ac1414bb00000000000000000000000000000000000000000000000000000000000000000000000000000600000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009b572c4f984de3a00000000000000000000000000000000000000000000000000000028001a00e000000200"/208], 0x118}}, 0x0) [ 111.984383] netlink: 32 bytes leftover after parsing attributes in process `syz-executor.5'. 15:07:09 executing program 2: add_key$fscrypt_v1(&(0x7f00000000c0), &(0x7f0000000140)={'fscrypt:', @desc1}, &(0x7f0000000200)={0x0, "507034a2d8f917a5d12b511c19c32d3aded633b68e1c0390279be6aae9bffa954ce5898af1ad43ca1d807c97c44c4c874d4f00521b64ae66c77b895f5118c08f", 0x28}, 0x48, 0xfffffffffffffffc) creat(0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x200002, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, @perf_bp={&(0x7f00000001c0)}, 0x800, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x401}, 0x0, 0x5, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000440)=[{0x0}], 0x14, &(0x7f0000000000)=ANY=[@ANYRESHEX, @ANYRES32]) umount2(&(0x7f0000000080)='./file0\x00', 0x0) io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) [ 112.141109] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=47 sclass=netlink_route_socket pid=4003 comm=syz-executor.3 15:07:09 executing program 4: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1c08a4, 0x0) r1 = syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) r2 = open$dir(&(0x7f0000000200)='./mnt\x00', 0x40040, 0x10) mkdirat(r2, &(0x7f0000000280)='mnt/encrypted_dir/../file0\x00', 0x20) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir/../file0\x00', 0x80, 0x3e4fcec92923ce05) r3 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x50008, 0x0, 0x10081, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r4 = openat(r1, &(0x7f0000000000)='mnt/encrypted_dir/../file0\x00', 0x40, 0x100) r5 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r5, 0x7, 0x0, 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r5, 0xc0406619, &(0x7f00000001c0)={@desc={0x1, 0x0, @desc2}}) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, &(0x7f0000000140)=',,\\\x00') futimesat(r4, &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0)={{0x0, 0xea60}}) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000680)=ANY=[@ANYBLOB="b00900000000000018000000468a29458f2709d329f6d3f3917408961482081d984538af2f9bcf61c448afbaa0be3f00000000000000ca4aa56fc413a417324e8530165c3515981e2d28f7fce9ae3c6bb8fa04ff6411132c9ced479abaeea325c2205ea95984d3d7f98eea1cca02dfeb0b2471b497fbb71b60180d35e2a3394ba6d965f41c7b7bc29d4e3ca95bd7ad074a4242ec98a69ad9d1546ce18cbbd98d2e50688e958a0fcd16876ab83cdb94eeb03e42203f267a1bf6ccb1c07ad92e6e493149da32f754251ae74d30cd4b50eefd6a208172ed8693b320eda714bdd152b484d9c939b4bb777dddd947843d73529f5ffe589777254cb10f733351e0739a3a61c3b8f977517ee7becda66da23a93e3be8ed63bda262951b32f72c1c48ee63be474eafaa255074efaa494b950f48b119c76c70b833e4d7443b691dc97bf78bcae908758ff1edaf2ad48dd67d0337c8ecfcd47e8ce5598c435f4645d719ae60a12c5b37ed2d45571c29ff6af1292ed2ff7fa24e2ab69f18db826044f35683810d2ee95f68f586a8922acdc225912820cdffe6ac29641f3c531a0eb1ddbf17341a05f3ee437f2a56a4a92af8ba2e413d00d05caab40963868dc00da000dfe8962927be81ca05afcc624225b2667a1208dd74e8bb6ced5e1da98f41bb3dedc31302fbf6ed40e9c526f82b53ce45e25e20ce9068bba911f0ec11403a35ff01cee623f71101155fcb646937ac714ac49741b4a1ffc6a72cba387bf41c1af2eeaa80a07631a22d366562924848da0f27c", @ANYRES32, @ANYBLOB="02000000000000006d6e742f656e637279707465645f6469722f2e2e2f66696c653000"]) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') 15:07:09 executing program 5: openat$ptp0(0xffffffffffffff9c, &(0x7f0000000100), 0x1, 0x0) r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r0, 0x7, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r1, 0x7, 0x0, 0x0, 0x0) r2 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r2, 0x7, 0x0, 0x0, 0x0) ioctl$PTP_EXTTS_REQUEST(r2, 0x40043d0d, 0x0) 15:07:09 executing program 6: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1c08a4, 0x0) r1 = syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) r2 = open$dir(&(0x7f0000000200)='./mnt\x00', 0x40040, 0x10) mkdirat(r2, &(0x7f0000000280)='mnt/encrypted_dir/../file0\x00', 0x20) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir/../file0\x00', 0x80, 0x3e4fcec92923ce05) r3 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x50008, 0x0, 0x10081, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r4 = openat(r1, &(0x7f0000000000)='mnt/encrypted_dir/../file0\x00', 0x40, 0x100) r5 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r5, 0x7, 0x0, 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r5, 0xc0406619, &(0x7f00000001c0)={@desc={0x1, 0x0, @desc2}}) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, &(0x7f0000000140)=',,\\\x00') futimesat(r4, &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0)={{0x0, 0xea60}}) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000680)=ANY=[@ANYBLOB="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", @ANYRES32, @ANYBLOB="02000000000000006d6e742f656e637279707465645f6469722f2e2e2f66696c653000"]) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') 15:07:09 executing program 2: rt_sigaction(0x25, &(0x7f00000001c0)={&(0x7f0000000140)="660fdb6e4fc463bd0d2c763df3400fa7d864660f3a63fe0bc401b5d94200c461fc5b032e2e660f6c257a000000c401fa120e6646c0deec0fae4d33", 0x0, &(0x7f0000000180)="c4a149d07d26c421d1c497d5b79d320fdde6c422d9bb67f8f3470fbc07f20f8b08000000420faefe460fa1c4a2493a0940c0c047", {[0xd5]}}, &(0x7f0000000280)={&(0x7f0000000200)="46e7a8c44115e8f26465f20f5c4aff650fe033c4c1c05440e8c46165747954c4a2f907bc5d6cfe563866460fd414340f74d40fb9c7", 0x0, &(0x7f0000000240)="c482593b5a19c461e9fa95977e0000e60cf3a5c4e24dbc8f080000004d0fc721c442a990a41ae2000000426fc4e2fd22e3c481916783554d5e11"}, 0x8, &(0x7f00000002c0)) r0 = socket$netlink(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff8100e380}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$NL80211_CMD_FLUSH_PMKSA(r0, &(0x7f0000000340)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x20, 0x0, 0x400, 0x70bd2d, 0x25dfdbfd, {{}, {@void, @val={0xc, 0x99, {0x19, 0x36}}}}, ["", "", "", ""]}, 0x20}, 0x1, 0x0, 0x0, 0x4}, 0x1) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCSARP(r1, 0x8955, &(0x7f0000000000)={{0x2, 0x0, @local}, {0x0, @local}, 0x20, {0x2, 0x0, @local}, 'dummy0\x00'}) close(r1) openat$cgroup_pressure(0xffffffffffffffff, &(0x7f0000000300)='io.pressure\x00', 0x2, 0x0) 15:07:10 executing program 0: r0 = semget$private(0x0, 0x4, 0x100) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4317, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semop(0x0, &(0x7f0000000040)=[{0x0, 0x4, 0x82b4d8da1ae7c66c}], 0x1) r1 = semget$private(0x0, 0x6, 0x5) semctl$IPC_RMID(r1, 0x0, 0xb) semctl$SETALL(r1, 0x0, 0x11, &(0x7f0000000000)=[0x2, 0xf747, 0x8]) semctl$SEM_STAT_ANY(0x0, 0x0, 0x14, 0x0) clock_gettime(0x0, &(0x7f0000000140)) semtimedop(0x0, &(0x7f0000000100), 0x0, &(0x7f0000000180)={0x0, 0x989680}) semtimedop(0x0, &(0x7f00000001c0)=[{0x0, 0x4a41, 0x1000}, {0x0, 0x0, 0x1c00}], 0x2, &(0x7f0000000200)) semtimedop(0x0, &(0x7f0000000000), 0x0, &(0x7f0000000040)) semctl$IPC_RMID(0x0, 0x0, 0x0) semctl$SEM_STAT_ANY(0x0, 0x2, 0x14, &(0x7f00000010c0)=""/79) semctl$SEM_INFO(0x0, 0x1, 0x13, &(0x7f00000002c0)=""/113) semctl$IPC_RMID(0x0, 0x0, 0x0) r2 = semget$private(0x0, 0x6, 0x0) semop(r2, &(0x7f00000000c0)=[{0x3, 0x0, 0x1800}, {}], 0x2) semctl$IPC_RMID(r0, 0x0, 0x0) semctl$SEM_STAT_ANY(r0, 0x3, 0x14, 0x0) unshare(0x48020200) 15:07:21 executing program 0: r0 = semget$private(0x0, 0x4, 0x100) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4317, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semop(0x0, &(0x7f0000000040)=[{0x0, 0x4, 0x82b4d8da1ae7c66c}], 0x1) r1 = semget$private(0x0, 0x6, 0x5) semctl$IPC_RMID(r1, 0x0, 0xb) semctl$SETALL(r1, 0x0, 0x11, &(0x7f0000000000)=[0x2, 0xf747, 0x8]) semctl$SEM_STAT_ANY(0x0, 0x0, 0x14, 0x0) clock_gettime(0x0, &(0x7f0000000140)) semtimedop(0x0, &(0x7f0000000100), 0x0, &(0x7f0000000180)={0x0, 0x989680}) semtimedop(0x0, &(0x7f00000001c0)=[{0x0, 0x4a41, 0x1000}, {0x0, 0x0, 0x1c00}], 0x2, &(0x7f0000000200)) semtimedop(0x0, &(0x7f0000000000), 0x0, &(0x7f0000000040)) semctl$IPC_RMID(0x0, 0x0, 0x0) semctl$SEM_STAT_ANY(0x0, 0x2, 0x14, &(0x7f00000010c0)=""/79) semctl$SEM_INFO(0x0, 0x1, 0x13, &(0x7f00000002c0)=""/113) semctl$IPC_RMID(0x0, 0x0, 0x0) r2 = semget$private(0x0, 0x6, 0x0) semop(r2, &(0x7f00000000c0)=[{0x3, 0x0, 0x1800}, {}], 0x2) semctl$IPC_RMID(r0, 0x0, 0x0) semctl$SEM_STAT_ANY(r0, 0x3, 0x14, 0x0) unshare(0x48020200) 15:07:21 executing program 3: r0 = syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x1, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(0xffffffffffffffff, 0x40605346, &(0x7f0000000240)) fspick(0xffffffffffffffff, &(0x7f0000000140)='./file0/file0\x00', 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) fchdir(r0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000001000)=ANY=[@ANYBLOB="140000002c00ff2d000000002000000000000000"], 0x14}}, 0x0) epoll_pwait(r2, &(0x7f0000000000)=[{}, {}], 0x2, 0x528, &(0x7f0000000080)={[0x4e0]}, 0x8) r4 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x40001, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) dup2(r5, r4) sendmsg$nl_generic(r5, &(0x7f00000002c0)={&(0x7f0000000180), 0xc, &(0x7f00000001c0)={&(0x7f0000000940)=ANY=[@ANYBLOB="780500002f0000002abd7000fbdbdf2504000000d839aa7444c1c612ecdbf3cd5d0940d59492c93089fb202c4d784ef6c61620323c1cacc3841171aef44d87393c34a4c0151b014231f6f6a08c5453f4a2f55cd3e28628d1edc009ce06899ad2457d2ce4edf12bf91888259316e79d03e70cbd7bc1a2cc980e1ad37e0bce03818014008200ff01000000000000000000000000000107f053802df5ad5306790fdfbf532ecf19c44c6c45ae996ca51c55666bf4228cf8910cf851bc9ec86e851fe8358195c5f932e85648ff98bb1856248bfa1cf54ae67a92fd185a34780e7314e80087d85a05209d15d7cddd1deebadadc7755832a3e735d19e81615e09ca401e6237b1d547e6bd48513bcd50b84a1c4e6e407e99f90e5995901fd8ea89d30cb54d2deb1ddb8f80432080a5c5b333bfd9dd46d0d4149d8304adece0872c60e640d88f6c8b78972a940e26856994362f4b0d0a7e258dd278b527f1dfda0827fde066756fa62858f7c0f66144b975c1deab586cb6ffea6fb7f6e83a24d09d01c50c39131a4a524c617cb0e5e0b8a35d3d1b8921882e84adce255b784c8909f9374a3e838729948a4868368be17739c61d55eca3547f1f39c841153c0babf2675f6cb990e8defb057e22635f6719e46b15ce84cf468bd4e09e32279a5da2e8f4d319920152ea448fc8537f40f7eec39f99bbc49f3c44177bb1628db17f41d999e9b29289582ad106c9be68be285018341028de262821f54f727a7e091fb5c753fd5fd3d667c0306eca6534d5f8a5568ebf15c741dc58d0b845ee0c610c4a60af1ec5e432a44bef27d53db3f8c345380160f86a19842c5b9c0d0ab643662454871c15d553ef69d22d6766e45b74011ca3e234ba269eb5ae1a8a19df37f484ffbf8f9c62d19e7d198131ff04e8ddf3df529b696740c19969848bfda93e6d3935bb3df417c6fa90b786a85fb67562a1009605a51738d0d02905df1c946c250f62e607a182f9bf8f1c3a2cbe4f1b76d66a79c0984d6ee2edd2325b83cde692618832e5d6b0b409574e0a9973a7cdd973e841a4e0bdcf84e759517b363adbb52bde7298ea25dae1dd76b8f460c16a9922fa7227a5221767ff2bacec0631bc77d74ebe42b621adb6c4e4c32dbadf1a75bba68fa56c1b17b1560ba3c4de663b06d0b8f724beba2aafa3f39bd3e6647d1496549782b415a14006600fc0200000000000000000000000000003d4ce5d8565bb6573c8545c00642c317a3cac6703916fd462da8fd9d27577e7d0faa34c9208046d6c8cfa0dff636a59b16b8657173f57e9b60d657746f2fdbaab38a648eb6ec38db6ba7acfbe96402cead24738ef0d761daa1589aec7adb7fcc8ebff5d5624687b33d46fa93be1ca782e9110bcb62214fe54c3a6758f989f57081a801cd0a40c0c3c55d047f3d0bdd65150ad7ccbed48e44b666e9327889c278f19aaedbc512b4b16ed79691053dd7b0b81f1e58795c78576cf09000801d4c67bce6323aee1303adbe8ec7f10d093d3fd8f5db7d2908003c00", @ANYRES32, @ANYBLOB="faff650006000000000008008300", @ANYRES32=0x0, @ANYBLOB="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"], 0x578}, 0x1, 0x0, 0x0, 0x1c}, 0x8000) ioctl$FICLONE(r1, 0x40049409, 0xffffffffffffffff) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) getresgid(&(0x7f00000010c0), &(0x7f0000001100), &(0x7f0000001140)=0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r6, @ANYBLOB=',wfdno=', @ANYRESHEX=r7, @ANYBLOB=',cache=mmap,cache=fscache,debug=0x0000000000000924,nodevmap,noextend,dfltgid=', @ANYRESHEX=0x0, @ANYRES16=r8, @ANYRESDEC=0x0, @ANYBLOB=',hash,fowner=', @ANYRESDEC=0x0, @ANYBLOB=',fsname=.,fowner>', @ANYRESDEC=0x0, @ANYRES64]) 15:07:21 executing program 6: r0 = syz_io_uring_setup(0x7d04, &(0x7f00000002c0)={0x0, 0x0, 0x10}, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f0000000240)=[{&(0x7f0000000340)=""/142, 0x8e}], 0x1}, 0x0) syz_io_uring_setup(0x346d, &(0x7f0000000680)={0x0, 0x2000, 0x1, 0x0, 0x3, 0x0, r0}, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000fed000/0x4000)=nil, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/stat\x00', 0x0, 0x0) r5 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) sendmsg$unix(r4, &(0x7f0000000400)={&(0x7f0000000080)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000700)=[{&(0x7f0000000500)="9bbf5d34b4b900c15b0cbc6ff2163a83cdedfde1a32b621fd9cf10c5388fcdea10048a44db56ebe2177f6200a5c8ceb4b2885a2e31c0509aa85222fc75a158741b17b7195c00a5d1d7eba8e12ea801f6f305502173f16a8e6c8787d7b29ad86a8060bc03b11145eaf5b21067ebb6185f6028a23b", 0x74}, {&(0x7f0000000580)="524e0bbcbc4661431e1ec25ed7a74614815eb38ad72ebcb9ddfc336dc5674f10095d7c100644441b2a81223b5f89080032c9c1d8d00ce5fe498b110339f28c6737248677acd3b9b37a33308d628a4bd45f74e62311e0b0c288cff1d949688dd4f5030b87fe", 0x65}, {&(0x7f00000001c0)="beb050c16bef5bb844a67ce99f2faee9e392729067045c426e50fbeb53ae6f802825e4c49ea7378202666f8012edd0877cfa3a3d18272e133e38", 0x3a}, {&(0x7f0000000600)="f550fd67355033736a9ff5fd4561444dc2f0ac6d3d1594c0f0135ab16b553ae492c02163670f040477f8bf1029e52a558b3bcc8f405bc49ca8a611db6ea70c74e1facac9a4bbcb7ce157f24d71382636a0d72e2a03822d3a54367b652962646ac7a2f80164152a0c129713", 0x6b}, {&(0x7f0000000280)="fe56e3962f55c0d5879361017ca307e3b2b6504d5bb69ca9ae6cd546db655c2929045668ea25f9c498729cad524760c10051a102fab674f38fd0dbf758", 0x3d}], 0x5, 0x0, 0x0, 0x4000800}, 0x20000000) perf_event_open(&(0x7f0000000480)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r5, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) syz_io_uring_setup(0x40003086, &(0x7f0000000980)={0x0, 0xfead, 0x1, 0x0, 0x1cd, 0x0, r4}, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ff6000/0x3000)=nil, &(0x7f0000000840), &(0x7f0000000880)=0x0) r7 = accept$inet6(r3, &(0x7f00000008c0)={0xa, 0x0, 0x0, @loopback}, &(0x7f0000000900)=0x1c) syz_io_uring_setup(0x78a1, &(0x7f0000000080)={0x0, 0xa91f, 0x10, 0x0, 0x3ba}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f00000002c0), &(0x7f0000000180)=0x0) r9 = io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) syz_io_uring_submit(0x0, r8, &(0x7f0000000040)=@IORING_OP_REMOVE_BUFFERS={0x1f, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x1, {0x23}}, 0x7fe) syz_io_uring_submit(r5, r6, &(0x7f0000000940)=@IORING_OP_FADVISE={0x18, 0x1, 0x0, @fd=r7, 0x8, 0x0, 0x50, 0x2, 0x1, {0x0, r9}}, 0x7fff) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000000)={{0x2, 0x0, @local}, {0x0, @local}, 0x20, {0x2, 0x0, @local}, 'dummy0\x00'}) dup(r4) syz_io_uring_submit(r5, r2, &(0x7f0000000780)=@IORING_OP_CLOSE={0x13, 0x1, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x3ff) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) 15:07:21 executing program 7: sendmsg$NLBL_CIPSOV4_C_ADD(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000001c0)={&(0x7f0000000040)={0x15c, 0x0, 0x20, 0x70bd2c, 0x25dfdbfb, {}, [@NLBL_CIPSOV4_A_MLSLVLLST={0x70, 0x8, 0x0, 0x1, [{0x1c, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x2c1de534}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x5afe863f}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x7b}]}, {0xc, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x5333828e}]}, {0x44, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x4daeac89}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x514c0427}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x202b9013}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0xf270908}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x64dac61e}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x6e}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x6a}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x5f9c722d}]}]}, @NLBL_CIPSOV4_A_MLSCATLST={0xd8, 0xc, 0x0, 0x1, [{0x2c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xdc48}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x71e1f813}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x1b43f825}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xebe1}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x40e8ba02}]}, {0x44, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x7717}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x2513}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x295f}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x3d606441}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x7aff3b3d}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x1e76}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xe93f}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x492418ff}]}, {0x44, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x5d3d}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x5e1a}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x2f8053fe}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x464c}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xff5b}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x4007ff4e}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x77d4279b}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x74887e30}]}, {0x14, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x4626}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x2802cd87}]}, {0xc, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xafc3}]}]}]}, 0x15c}, 0x1, 0x0, 0x0, 0x40000}, 0x40000) r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r0, 0x7, 0x0, 0x0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0), 0x20000, 0x0) futimesat(r0, &(0x7f0000000340)='./file0\x00', &(0x7f0000000380)={{0x77359400}}) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000140), r1) sendmsg$TIPC_CMD_GET_BEARER_NAMES(r1, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x1c, r2, 0x400, 0x70bd2b, 0x25dfdbff, {}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4040000}, 0x40830) sendmsg$TIPC_CMD_SET_LINK_TOL(r0, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x244f4110}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x30, r2, 0x2, 0x70bd2a, 0x25dfdbff, {{}, {}, {0x14, 0x18, {0x20, @bearer=@udp='udp:syz1\x00'}}}, ["", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x88d0a685b02ab4b3}, 0x4000004) 15:07:21 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x132, &(0x7f0000000180)={0x0, 0x0, 0x10, 0x1}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_group_source_req(r3, 0x0, 0x2b, &(0x7f0000000240)={0x1, {{0x2, 0x4e22, @multicast1}}, {{0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}}, 0x108) setsockopt$inet_msfilter(r3, 0x0, 0x29, &(0x7f0000000040)={@multicast1, @local, 0x1}, 0x10) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000007c0)=ANY=[@ANYBLOB="010000000000000000f41809a88467b5989855b51118258bcc3ce54026c8819288b62aec8b9b7a87c9ebdd98de4fd5f452942a279b96b46b83fc085db87f2677c3d2742aa65657f43a63ebd1a01d8c331b34818caa30ccb3340642fafa9d52dbc7ef88249427a6cdae6354b7369471c9cff988df612e0a7cea8d6513c066f4c9fa2f95bbf254779e9fe164378a6eb607961244f84876e0576748407c680d69990a60edaeff0c2709737577f8839fcc99311608d5c285df6f079d0936bcb0fa063b33ed8e3ad1c67f464290b48f9d559ada0000000000000000", @ANYRES32, @ANYRESOCT=r3, @ANYRES32=0x0, @ANYBLOB="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"]) io_uring_enter(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff}) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_WRITE={0x17, 0x0, 0x0, @fd_index=0x8, 0xe4, 0x0, 0x0, 0x8}, 0x0) r5 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r3, {0x1}}, './file1\x00'}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r6, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r4, {0xffffffffffffffff, 0xee01}}, './file0\x00'}) connect$unix(r4, &(0x7f0000000280)=@file={0x0, './file0\x00'}, 0x6e) openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/mdstat\x00', 0x0, 0x0) syz_io_uring_submit(r5, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) r7 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r7, 0x7, 0x0, 0x0, 0x0) io_uring_enter(r7, 0x7957, 0x6a1c, 0x3, &(0x7f0000000080)={[0x5]}, 0x8) io_uring_enter(r0, 0x2c36, 0x0, 0x0, 0x0, 0x0) io_uring_enter(r6, 0x5cb2, 0x2f4a, 0x2, &(0x7f00000003c0)={[0x3]}, 0x8) 15:07:21 executing program 5: socket$nl_generic(0x10, 0x3, 0x10) r0 = perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, @perf_bp={&(0x7f0000000040), 0x6}, 0x18412}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r1 = perf_event_open(&(0x7f0000000240)={0x4, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000430a, 0x400, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x4, @perf_config_ext={0xff}, 0x1000, 0x0, 0xd67d, 0x0, 0x4, 0x0, 0x401, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, r0, 0x3) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) openat$vcsu(0xffffffffffffff9c, &(0x7f0000000080), 0x40, 0x0) bind$inet6(r2, &(0x7f0000000200)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) fcntl$setstatus(r2, 0x4, 0xc00) open_by_handle_at(r1, &(0x7f0000001940)=ANY=[@ANYBLOB="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", @ANYBLOB="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"], 0x400) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r3, 0x8914, &(0x7f0000000140)={'lo\x00'}) r4 = socket$packet(0x11, 0x3, 0x300) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) bind$packet(r4, &(0x7f0000000040)={0x11, 0x9, r6, 0x1, 0x8, 0x6, @random="1900de9961ac"}, 0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8914, &(0x7f0000000300)={'xfrm0\x00'}) sendmsg$inet6(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000500)="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", 0x13c}, {&(0x7f0000000340)="9469578b5745877d5b02f1effe0f104a9bfc8cef9b2f42e2f616db401c6fcd6b1b0e0f837820473d07cc3f64af8963e615b33c6004bc84cef10f8c66a423e0b8324c54f84dfc4b2dbadbaeec758c2e9890d059db6ff016dbad65998a07cb965fcd9c4fcb", 0x64}, {&(0x7f0000000700)="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", 0x1000}], 0x3}, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000000c0)={'ipvlan1\x00'}) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) bind$packet(r4, &(0x7f00000002c0)={0x11, 0x5, 0x0, 0x1, 0xff, 0x6, @random="b1f4a6611bde"}, 0x14) 15:07:21 executing program 2: syz_genetlink_get_family_id$tipc2(&(0x7f0000000000), 0xffffffffffffffff) 15:07:21 executing program 4: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1c08a4, 0x0) r1 = syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) r2 = open$dir(&(0x7f0000000200)='./mnt\x00', 0x40040, 0x10) mkdirat(r2, &(0x7f0000000280)='mnt/encrypted_dir/../file0\x00', 0x20) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir/../file0\x00', 0x80, 0x3e4fcec92923ce05) r3 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x50008, 0x0, 0x10081, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r4 = openat(r1, &(0x7f0000000000)='mnt/encrypted_dir/../file0\x00', 0x40, 0x100) r5 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r5, 0x7, 0x0, 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r5, 0xc0406619, &(0x7f00000001c0)={@desc={0x1, 0x0, @desc2}}) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, &(0x7f0000000140)=',,\\\x00') futimesat(r4, &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0)={{0x0, 0xea60}}) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000680)=ANY=[@ANYBLOB="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", @ANYRES32, @ANYBLOB="02000000000000006d6e742f656e637279707465645f6469722f2e2e2f66696c653000"]) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') 15:07:21 executing program 4: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1c08a4, 0x0) r1 = syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) r2 = open$dir(&(0x7f0000000200)='./mnt\x00', 0x40040, 0x10) mkdirat(r2, &(0x7f0000000280)='mnt/encrypted_dir/../file0\x00', 0x20) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir/../file0\x00', 0x80, 0x3e4fcec92923ce05) r3 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x50008, 0x0, 0x10081, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r4 = openat(r1, &(0x7f0000000000)='mnt/encrypted_dir/../file0\x00', 0x40, 0x100) r5 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r5, 0x7, 0x0, 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r5, 0xc0406619, &(0x7f00000001c0)={@desc={0x1, 0x0, @desc2}}) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, &(0x7f0000000140)=',,\\\x00') futimesat(r4, &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0)={{0x0, 0xea60}}) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000680)=ANY=[@ANYBLOB="b00900000000000018000000468a29458f2709d329f6d3f3917408961482081d984538af2f9bcf61c448afbaa0be3f00000000000000ca4aa56fc413a417324e8530165c3515981e2d28f7fce9ae3c6bb8fa04ff6411132c9ced479abaeea325c2205ea95984d3d7f98eea1cca02dfeb0b2471b497fbb71b60180d35e2a3394ba6d965f41c7b7bc29d4e3ca95bd7ad074a4242ec98a69ad9d1546ce18cbbd98d2e50688e958a0fcd16876ab83cdb94eeb03e42203f267a1bf6ccb1c07ad92e6e493149da32f754251ae74d30cd4b50eefd6a208172ed8693b320eda714bdd152b484d9c939b4bb777dddd947843d73529f5ffe589777254cb10f733351e0739a3a61c3b8f977517ee7becda66da23a93e3be8ed63bda262951b32f72c1c48ee63be474eafaa255074efaa494b950f48b119c76c70b833e4d7443b691dc97bf78bcae908758ff1edaf2ad48dd67d0337c8ecfcd47e8ce5598c435f4645d719ae60a12c5b37ed2d45571c29ff6af1292ed2ff7fa24e2ab69f18db826044f35683810d2ee95f68f586a8922acdc225912820cdffe6ac29641f3c531a0eb1ddbf17341a05f3ee437f2a56a4a92af8ba2e413d00d05caab40963868dc00da000dfe8962927be81ca05afcc624225b2667a1208dd74e8bb6ced5e1da98f41bb3dedc31302fbf6ed40e9c526f82b53ce45e25e20ce9068bba911f0ec11403a35ff01cee623f71101155fcb646937ac714ac49741b4a1ffc6a72cba387bf41c1af2eeaa80a07631a22d366562924848da0f27c", @ANYRES32, @ANYBLOB="02000000000000006d6e742f656e637279707465645f6469722f2e2e2f66696c653000"]) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') [ 124.118401] perf: interrupt took too long (4029 > 3995), lowering kernel.perf_event_max_sample_rate to 49000 [ 124.121628] perf: interrupt took too long (6375 > 6311), lowering kernel.perf_event_max_sample_rate to 31000 15:07:21 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x132, &(0x7f0000000180)={0x0, 0x0, 0x10, 0x1}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_group_source_req(r3, 0x0, 0x2b, &(0x7f0000000240)={0x1, {{0x2, 0x4e22, @multicast1}}, {{0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}}, 0x108) setsockopt$inet_msfilter(r3, 0x0, 0x29, &(0x7f0000000040)={@multicast1, @local, 0x1}, 0x10) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000007c0)=ANY=[@ANYBLOB="010000000000000000f41809a88467b5989855b51118258bcc3ce54026c8819288b62aec8b9b7a87c9ebdd98de4fd5f452942a279b96b46b83fc085db87f2677c3d2742aa65657f43a63ebd1a01d8c331b34818caa30ccb3340642fafa9d52dbc7ef88249427a6cdae6354b7369471c9cff988df612e0a7cea8d6513c066f4c9fa2f95bbf254779e9fe164378a6eb607961244f84876e0576748407c680d69990a60edaeff0c2709737577f8839fcc99311608d5c285df6f079d0936bcb0fa063b33ed8e3ad1c67f464290b48f9d559ada0000000000000000", @ANYRES32, @ANYRESOCT=r3, @ANYRES32=0x0, @ANYBLOB="2ed7e47eac2f66696c65300085facd56ed295287999dc3d31a1a2decbec56ad2988098d49afcbed44956084bfcbda8d6360b915be21531a1f960a6c140d9e76e5b79f0efedb165e31b1faad9c821d04dead8afd14fd72f5b505d2f5bf12cfbd199c6e74caae7eb18f92a34cbdc9b7cba58a91a4531d154ca8f40469449a02d8ef7bcd149a48cc88b77ebaa35f3443f8a1c16222dc7cca1bbbd18716c7014be3190343b61c3dfb6d6a478b0af8ae68baa982f7a6de0cd24f16bdf00b51e0d4204d28420145dd1c05182946362d56812be2571a3936aee5c4c09c5b7d3579dea3b886bb3bece36c06b6a8276f1ac3dbe5f911e08466ed23c94c5a33a"]) io_uring_enter(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff}) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_WRITE={0x17, 0x0, 0x0, @fd_index=0x8, 0xe4, 0x0, 0x0, 0x8}, 0x0) r5 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r3, {0x1}}, './file1\x00'}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r6, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r4, {0xffffffffffffffff, 0xee01}}, './file0\x00'}) connect$unix(r4, &(0x7f0000000280)=@file={0x0, './file0\x00'}, 0x6e) openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/mdstat\x00', 0x0, 0x0) syz_io_uring_submit(r5, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) r7 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r7, 0x7, 0x0, 0x0, 0x0) io_uring_enter(r7, 0x7957, 0x6a1c, 0x3, &(0x7f0000000080)={[0x5]}, 0x8) io_uring_enter(r0, 0x2c36, 0x0, 0x0, 0x0, 0x0) io_uring_enter(r6, 0x5cb2, 0x2f4a, 0x2, &(0x7f00000003c0)={[0x3]}, 0x8) [ 124.124983] perf: interrupt took too long (7983 > 7968), lowering kernel.perf_event_max_sample_rate to 25000 15:07:21 executing program 2: r0 = syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x1, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(0xffffffffffffffff, 0x40605346, &(0x7f0000000240)) fspick(0xffffffffffffffff, &(0x7f0000000140)='./file0/file0\x00', 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) fchdir(r0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000001000)=ANY=[@ANYBLOB="140000002c00ff2d000000002000000000000000"], 0x14}}, 0x0) epoll_pwait(r2, &(0x7f0000000000)=[{}, {}], 0x2, 0x528, &(0x7f0000000080)={[0x4e0]}, 0x8) r4 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x40001, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) dup2(r5, r4) sendmsg$nl_generic(r5, &(0x7f00000002c0)={&(0x7f0000000180), 0xc, &(0x7f00000001c0)={&(0x7f0000000940)=ANY=[@ANYBLOB="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", @ANYRES32, @ANYBLOB="faff650006000000000008008300", @ANYRES32=0x0, @ANYBLOB="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"], 0x578}, 0x1, 0x0, 0x0, 0x1c}, 0x8000) ioctl$FICLONE(r1, 0x40049409, 0xffffffffffffffff) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) getresgid(&(0x7f00000010c0), &(0x7f0000001100), &(0x7f0000001140)=0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r6, @ANYBLOB=',wfdno=', @ANYRESHEX=r7, @ANYBLOB=',cache=mmap,cache=fscache,debug=0x0000000000000924,nodevmap,noextend,dfltgid=', @ANYRESHEX=0x0, @ANYRES16=r8, @ANYRESDEC=0x0, @ANYBLOB=',hash,fowner=', @ANYRESDEC=0x0, @ANYBLOB=',fsname=.,fowner>', @ANYRESDEC=0x0, @ANYRES64]) [ 124.152893] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=47 sclass=netlink_route_socket pid=4036 comm=syz-executor.3 15:07:21 executing program 7: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_SETSEL(r0, 0x4b4b, 0x0) r1 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x400, 0x0) ioctl$TCSBRKP(r1, 0x5425, 0x994a) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000040), 0x101000, 0x0) ioctl$KDFONTOP_COPY(r2, 0x4b72, &(0x7f0000000480)={0x3, 0x0, 0x1c, 0x1, 0x17b, &(0x7f0000000080)}) 15:07:21 executing program 4: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1c08a4, 0x0) r1 = syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) r2 = open$dir(&(0x7f0000000200)='./mnt\x00', 0x40040, 0x10) mkdirat(r2, &(0x7f0000000280)='mnt/encrypted_dir/../file0\x00', 0x20) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir/../file0\x00', 0x80, 0x3e4fcec92923ce05) r3 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x50008, 0x0, 0x10081, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r4 = openat(r1, &(0x7f0000000000)='mnt/encrypted_dir/../file0\x00', 0x40, 0x100) r5 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r5, 0x7, 0x0, 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r5, 0xc0406619, &(0x7f00000001c0)={@desc={0x1, 0x0, @desc2}}) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, &(0x7f0000000140)=',,\\\x00') futimesat(r4, &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0)={{0x0, 0xea60}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') [ 124.293615] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=47 sclass=netlink_route_socket pid=4058 comm=syz-executor.2 [ 124.298499] perf: interrupt took too long (9982 > 9978), lowering kernel.perf_event_max_sample_rate to 20000 15:07:35 executing program 7: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_SETSEL(r0, 0x4b4b, 0x0) r1 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x400, 0x0) ioctl$TCSBRKP(r1, 0x5425, 0x994a) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000040), 0x101000, 0x0) ioctl$KDFONTOP_COPY(r2, 0x4b72, &(0x7f0000000480)={0x3, 0x0, 0x1c, 0x1, 0x17b, &(0x7f0000000080)}) 15:07:35 executing program 5: socket$nl_generic(0x10, 0x3, 0x10) r0 = perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, @perf_bp={&(0x7f0000000040), 0x6}, 0x18412}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r1 = perf_event_open(&(0x7f0000000240)={0x4, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000430a, 0x400, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x4, @perf_config_ext={0xff}, 0x1000, 0x0, 0xd67d, 0x0, 0x4, 0x0, 0x401, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, r0, 0x3) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) openat$vcsu(0xffffffffffffff9c, &(0x7f0000000080), 0x40, 0x0) bind$inet6(r2, &(0x7f0000000200)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) fcntl$setstatus(r2, 0x4, 0xc00) open_by_handle_at(r1, &(0x7f0000001940)=ANY=[@ANYBLOB="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", @ANYBLOB="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"], 0x400) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r3, 0x8914, &(0x7f0000000140)={'lo\x00'}) r4 = socket$packet(0x11, 0x3, 0x300) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) bind$packet(r4, &(0x7f0000000040)={0x11, 0x9, r6, 0x1, 0x8, 0x6, @random="1900de9961ac"}, 0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8914, &(0x7f0000000300)={'xfrm0\x00'}) sendmsg$inet6(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000500)="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", 0x13c}, {&(0x7f0000000340)="9469578b5745877d5b02f1effe0f104a9bfc8cef9b2f42e2f616db401c6fcd6b1b0e0f837820473d07cc3f64af8963e615b33c6004bc84cef10f8c66a423e0b8324c54f84dfc4b2dbadbaeec758c2e9890d059db6ff016dbad65998a07cb965fcd9c4fcb", 0x64}, {&(0x7f0000000700)="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", 0x1000}], 0x3}, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000000c0)={'ipvlan1\x00'}) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) bind$packet(r4, &(0x7f00000002c0)={0x11, 0x5, 0x0, 0x1, 0xff, 0x6, @random="b1f4a6611bde"}, 0x14) 15:07:35 executing program 2: semget(0x1, 0x3, 0x58) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x846e3, 0x89) r1 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0xa, 0x13, r0, 0x0) r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$binfmt_elf64(r2, &(0x7f0000000280)=ANY=[], 0xfdef) syz_io_uring_complete(r1) syz_memcpy_off$IO_URING_METADATA_FLAGS(0x0, 0x114, &(0x7f0000000140), 0x0, 0x4) socket$inet_icmp(0x2, 0x2, 0x1) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x2, @perf_bp={&(0x7f00000001c0)}, 0x0, 0x0, 0x0, 0x5, 0x80, 0x0, 0x2}, 0x0, 0xffdffffdffffffff, 0xffffffffffffffff, 0x9) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) socket$inet6_udplite(0xa, 0x2, 0x88) syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000055580)={0xffffffffffffffe1, [], 0xd8, "c3b057e37f7fda"}) ioctl$PTP_SYS_OFFSET_EXTENDED(r0, 0xc4c03d09, &(0x7f0000000440)={0x3}) ioctl$AUTOFS_IOC_PROTOVER(r2, 0x80049363, &(0x7f0000000080)) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f00000003c0)={0x53, 0x0, 0x14, 0x3f, @buffer={0x300, 0x0, 0x0}, &(0x7f00000002c0)="00dab500770200912abebf36c991c6bf5699e500", 0x0, 0x5, 0x0, 0x5, 0x0}) syz_io_uring_submit(r1, 0x0, &(0x7f0000000100)=@IORING_OP_READ_FIXED={0x4, 0x4, 0x0, @fd, 0x40, 0x4, 0xfffffff7, 0x1, 0x1, {0x3}}, 0x6) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000400)=@IORING_OP_LINK_TIMEOUT={0xf, 0x3, 0x0, 0x0, 0x0, &(0x7f00000003c0)={0x77359400}, 0x1, 0x1}, 0x3) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) openat(0xffffffffffffffff, &(0x7f0000000300)='./file1\x00', 0x1a5f42, 0x80) 15:07:35 executing program 3: r0 = syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x1, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(0xffffffffffffffff, 0x40605346, &(0x7f0000000240)) fspick(0xffffffffffffffff, &(0x7f0000000140)='./file0/file0\x00', 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) fchdir(r0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000001000)=ANY=[@ANYBLOB="140000002c00ff2d000000002000000000000000"], 0x14}}, 0x0) epoll_pwait(r2, &(0x7f0000000000)=[{}, {}], 0x2, 0x528, &(0x7f0000000080)={[0x4e0]}, 0x8) r4 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x40001, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) dup2(r5, r4) sendmsg$nl_generic(r5, &(0x7f00000002c0)={&(0x7f0000000180), 0xc, &(0x7f00000001c0)={&(0x7f0000000940)=ANY=[@ANYBLOB="780500002f0000002abd7000fbdbdf2504000000d839aa7444c1c612ecdbf3cd5d0940d59492c93089fb202c4d784ef6c61620323c1cacc3841171aef44d87393c34a4c0151b014231f6f6a08c5453f4a2f55cd3e28628d1edc009ce06899ad2457d2ce4edf12bf91888259316e79d03e70cbd7bc1a2cc980e1ad37e0bce03818014008200ff01000000000000000000000000000107f053802df5ad5306790fdfbf532ecf19c44c6c45ae996ca51c55666bf4228cf8910cf851bc9ec86e851fe8358195c5f932e85648ff98bb1856248bfa1cf54ae67a92fd185a34780e7314e80087d85a05209d15d7cddd1deebadadc7755832a3e735d19e81615e09ca401e6237b1d547e6bd48513bcd50b84a1c4e6e407e99f90e5995901fd8ea89d30cb54d2deb1ddb8f80432080a5c5b333bfd9dd46d0d4149d8304adece0872c60e640d88f6c8b78972a940e26856994362f4b0d0a7e258dd278b527f1dfda0827fde066756fa62858f7c0f66144b975c1deab586cb6ffea6fb7f6e83a24d09d01c50c39131a4a524c617cb0e5e0b8a35d3d1b8921882e84adce255b784c8909f9374a3e838729948a4868368be17739c61d55eca3547f1f39c841153c0babf2675f6cb990e8defb057e22635f6719e46b15ce84cf468bd4e09e32279a5da2e8f4d319920152ea448fc8537f40f7eec39f99bbc49f3c44177bb1628db17f41d999e9b29289582ad106c9be68be285018341028de262821f54f727a7e091fb5c753fd5fd3d667c0306eca6534d5f8a5568ebf15c741dc58d0b845ee0c610c4a60af1ec5e432a44bef27d53db3f8c345380160f86a19842c5b9c0d0ab643662454871c15d553ef69d22d6766e45b74011ca3e234ba269eb5ae1a8a19df37f484ffbf8f9c62d19e7d198131ff04e8ddf3df529b696740c19969848bfda93e6d3935bb3df417c6fa90b786a85fb67562a1009605a51738d0d02905df1c946c250f62e607a182f9bf8f1c3a2cbe4f1b76d66a79c0984d6ee2edd2325b83cde692618832e5d6b0b409574e0a9973a7cdd973e841a4e0bdcf84e759517b363adbb52bde7298ea25dae1dd76b8f460c16a9922fa7227a5221767ff2bacec0631bc77d74ebe42b621adb6c4e4c32dbadf1a75bba68fa56c1b17b1560ba3c4de663b06d0b8f724beba2aafa3f39bd3e6647d1496549782b415a14006600fc0200000000000000000000000000003d4ce5d8565bb6573c8545c00642c317a3cac6703916fd462da8fd9d27577e7d0faa34c9208046d6c8cfa0dff636a59b16b8657173f57e9b60d657746f2fdbaab38a648eb6ec38db6ba7acfbe96402cead24738ef0d761daa1589aec7adb7fcc8ebff5d5624687b33d46fa93be1ca782e9110bcb62214fe54c3a6758f989f57081a801cd0a40c0c3c55d047f3d0bdd65150ad7ccbed48e44b666e9327889c278f19aaedbc512b4b16ed79691053dd7b0b81f1e58795c78576cf09000801d4c67bce6323aee1303adbe8ec7f10d093d3fd8f5db7d2908003c00", @ANYRES32, @ANYBLOB="faff650006000000000008008300", @ANYRES32=0x0, @ANYBLOB="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"], 0x578}, 0x1, 0x0, 0x0, 0x1c}, 0x8000) ioctl$FICLONE(r1, 0x40049409, 0xffffffffffffffff) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) getresgid(&(0x7f00000010c0), &(0x7f0000001100), &(0x7f0000001140)=0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r6, @ANYBLOB=',wfdno=', @ANYRESHEX=r7, @ANYBLOB=',cache=mmap,cache=fscache,debug=0x0000000000000924,nodevmap,noextend,dfltgid=', @ANYRESHEX=0x0, @ANYRES16=r8, @ANYRESDEC=0x0, @ANYBLOB=',hash,fowner=', @ANYRESDEC=0x0, @ANYBLOB=',fsname=.,fowner>', @ANYRESDEC=0x0, @ANYRES64]) 15:07:35 executing program 1: r0 = perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000000)=0x5) close_range(r0, 0xffffffffffffffff, 0x0) 15:07:35 executing program 4: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1c08a4, 0x0) r1 = syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) r2 = open$dir(&(0x7f0000000200)='./mnt\x00', 0x40040, 0x10) mkdirat(r2, &(0x7f0000000280)='mnt/encrypted_dir/../file0\x00', 0x20) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir/../file0\x00', 0x80, 0x3e4fcec92923ce05) r3 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x50008, 0x0, 0x10081, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r4 = openat(r1, &(0x7f0000000000)='mnt/encrypted_dir/../file0\x00', 0x40, 0x100) r5 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r5, 0x7, 0x0, 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r5, 0xc0406619, &(0x7f00000001c0)={@desc={0x1, 0x0, @desc2}}) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, &(0x7f0000000140)=',,\\\x00') futimesat(r4, &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0)={{0x0, 0xea60}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') 15:07:35 executing program 6: r0 = memfd_create(&(0x7f0000000040)='\xc3\xa5\x01', 0x2) fcntl$addseals(r0, 0x409, 0xd) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x100000a, 0x11, r0, 0x0) r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x8a0081) ioctl$BTRFS_IOC_QUOTA_CTL(r1, 0xc0109428, &(0x7f0000000080)={0x1, 0x8}) 15:07:35 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000000)={{0x2, 0x0, @local}, {0x0, @local}, 0x20, {0x2, 0x0, @local}, 'dummy0\x00'}) syz_mount_image$tmpfs(&(0x7f0000000200), &(0x7f0000000240)='./file1\x00', 0x1, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=r0]) setxattr$system_posix_acl(&(0x7f0000000880)='./file1\x00', &(0x7f00000008c0)='system.posix_acl_access\x00', &(0x7f0000000a40), 0x24, 0x0) llistxattr(&(0x7f0000000000)='./file1\x00', &(0x7f0000000040)=""/23, 0x17) llistxattr(&(0x7f00000002c0)='./file1\x00', 0x0, 0x0) 15:07:35 executing program 0: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1c08a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) mkdirat(0xffffffffffffffff, 0x0, 0x20) uselib(&(0x7f0000000000)='./mnt\x00') perf_event_open(&(0x7f00000003c0)={0x1, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x50008, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f0000000900)=ANY=[@ANYBLOB="01000000019b0f0018009dd44a391794c87974293e2182bc0fb52b88cd61eca9b083f7488641be1174d75377b98e6ed148d299f12a48dd367bae8c8af8be6a5bf3883b1a38ee7d037889e72a19c38df963a3bebcc2ddfe92baa0171892e97d57433aba95bd07834966bcfb8b2c6af4c940ce352347bd492b156603b5204fd44b620e78f5a73379fcd964fc17f5e03e4d238f6d9b7abbaccff2af2cd9b547a3bf74fe64325d9dbd34be73f1e16730fc54fee1462809e5510a59630258b5aee43e557bfe231d59755d6076d53145b6849d1cf7fa7b1ac496018fe52741b58461b6f52e99586db84abf1567501094666a947a12e7af10143921b529dcd7a38cd8555ceb081cd22737dc9fa2eac4c7768a192a10d44678303608c76b96ee91e62f2ffc49c0627ddfb2366ff50d71a16e762bdf20d47022ac73ab31d6edcd22e2a78066453e8b4ed77b97505454a8d8fcf9b8e70d26d559afb81aaf7c755099785a0012abe9bc29493497da473c7aa9ab361d79f2691d22359d56ecd90bd9c8df65e4ff9c808f562bf9897102707c4a420e0c934d1c7c3d5c03a04f68e11b169c3fb2d7355d27272911326299573dd9d27e1c9eaa04d452a5af7b35081e858333684bcf2d617097be645701444a38c8c1ab461ff87936274a1f68a06af6e90be0c8fe0de2dc", @ANYRES32=r0, @ANYBLOB="07000000000000002e2f6d6e7400c8dc2fc581b8635e495c285c099686ef1d4500beb28f1f410a522d499d53793afa6a25cc1c8f0ed9fa25f09076c84967a8b94f0abe4d0100000018d008b1eb0cffebea4a409fe0207905ba28af353d54f828e7db3ae17c79a886bf4c2a85"]) mount(&(0x7f0000000040)=@nbd={'/dev/nbd', 0x0}, &(0x7f00000000c0)='./mnt\x00', &(0x7f0000000140)='proc\x00', 0x20, &(0x7f00000001c0)='!\\\x00') ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000200)={0x0, @adiantum, 0x0, @desc1}) open(&(0x7f0000000240)='./mnt\x00', 0x2080, 0x1) 15:07:35 executing program 4: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1c08a4, 0x0) r1 = syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) r2 = open$dir(&(0x7f0000000200)='./mnt\x00', 0x40040, 0x10) mkdirat(r2, &(0x7f0000000280)='mnt/encrypted_dir/../file0\x00', 0x20) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir/../file0\x00', 0x80, 0x3e4fcec92923ce05) r3 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x50008, 0x0, 0x10081, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r4 = openat(r1, &(0x7f0000000000)='mnt/encrypted_dir/../file0\x00', 0x40, 0x100) r5 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r5, 0x7, 0x0, 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r5, 0xc0406619, &(0x7f00000001c0)={@desc={0x1, 0x0, @desc2}}) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, &(0x7f0000000140)=',,\\\x00') futimesat(r4, &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0)={{0x0, 0xea60}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') 15:07:35 executing program 5: socket$nl_generic(0x10, 0x3, 0x10) r0 = perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, @perf_bp={&(0x7f0000000040), 0x6}, 0x18412}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r1 = perf_event_open(&(0x7f0000000240)={0x4, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000430a, 0x400, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x4, @perf_config_ext={0xff}, 0x1000, 0x0, 0xd67d, 0x0, 0x4, 0x0, 0x401, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, r0, 0x3) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) openat$vcsu(0xffffffffffffff9c, &(0x7f0000000080), 0x40, 0x0) bind$inet6(r2, &(0x7f0000000200)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) fcntl$setstatus(r2, 0x4, 0xc00) open_by_handle_at(r1, &(0x7f0000001940)=ANY=[@ANYBLOB="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", @ANYBLOB="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"], 0x400) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r3, 0x8914, &(0x7f0000000140)={'lo\x00'}) r4 = socket$packet(0x11, 0x3, 0x300) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) bind$packet(r4, &(0x7f0000000040)={0x11, 0x9, r6, 0x1, 0x8, 0x6, @random="1900de9961ac"}, 0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8914, &(0x7f0000000300)={'xfrm0\x00'}) sendmsg$inet6(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000500)="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", 0x13c}, {&(0x7f0000000340)="9469578b5745877d5b02f1effe0f104a9bfc8cef9b2f42e2f616db401c6fcd6b1b0e0f837820473d07cc3f64af8963e615b33c6004bc84cef10f8c66a423e0b8324c54f84dfc4b2dbadbaeec758c2e9890d059db6ff016dbad65998a07cb965fcd9c4fcb", 0x64}, {&(0x7f0000000700)="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", 0x1000}], 0x3}, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000000c0)={'ipvlan1\x00'}) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) bind$packet(r4, &(0x7f00000002c0)={0x11, 0x5, 0x0, 0x1, 0xff, 0x6, @random="b1f4a6611bde"}, 0x14) 15:07:35 executing program 6: r0 = dup(0xffffffffffffffff) fsmount(r0, 0x0, 0xff) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={[], [{@context={'context', 0x3d, 'user_u'}, 0x22}]}) creat(&(0x7f0000000080)='./file0\x00', 0x80) [ 137.654031] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=47 sclass=netlink_route_socket pid=4084 comm=syz-executor.3 15:07:35 executing program 1: r0 = perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000000)=0x5) close_range(r0, 0xffffffffffffffff, 0x0) 15:07:35 executing program 2: semget(0x1, 0x3, 0x58) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x846e3, 0x89) r1 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0xa, 0x13, r0, 0x0) r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$binfmt_elf64(r2, &(0x7f0000000280)=ANY=[], 0xfdef) syz_io_uring_complete(r1) syz_memcpy_off$IO_URING_METADATA_FLAGS(0x0, 0x114, &(0x7f0000000140), 0x0, 0x4) socket$inet_icmp(0x2, 0x2, 0x1) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x2, @perf_bp={&(0x7f00000001c0)}, 0x0, 0x0, 0x0, 0x5, 0x80, 0x0, 0x2}, 0x0, 0xffdffffdffffffff, 0xffffffffffffffff, 0x9) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) socket$inet6_udplite(0xa, 0x2, 0x88) syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000055580)={0xffffffffffffffe1, [], 0xd8, "c3b057e37f7fda"}) ioctl$PTP_SYS_OFFSET_EXTENDED(r0, 0xc4c03d09, &(0x7f0000000440)={0x3}) ioctl$AUTOFS_IOC_PROTOVER(r2, 0x80049363, &(0x7f0000000080)) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f00000003c0)={0x53, 0x0, 0x14, 0x3f, @buffer={0x300, 0x0, 0x0}, &(0x7f00000002c0)="00dab500770200912abebf36c991c6bf5699e500", 0x0, 0x5, 0x0, 0x5, 0x0}) syz_io_uring_submit(r1, 0x0, &(0x7f0000000100)=@IORING_OP_READ_FIXED={0x4, 0x4, 0x0, @fd, 0x40, 0x4, 0xfffffff7, 0x1, 0x1, {0x3}}, 0x6) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000400)=@IORING_OP_LINK_TIMEOUT={0xf, 0x3, 0x0, 0x0, 0x0, &(0x7f00000003c0)={0x77359400}, 0x1, 0x1}, 0x3) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) openat(0xffffffffffffffff, &(0x7f0000000300)='./file1\x00', 0x1a5f42, 0x80) [ 137.743518] SELinux: security_context_str_to_sid(user_u) failed for (dev tmpfs, type tmpfs) errno=-22 [ 137.773023] SELinux: security_context_str_to_sid(user_u) failed for (dev tmpfs, type tmpfs) errno=-22 15:07:48 executing program 7: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_SETSEL(r0, 0x4b4b, 0x0) r1 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x400, 0x0) ioctl$TCSBRKP(r1, 0x5425, 0x994a) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000040), 0x101000, 0x0) ioctl$KDFONTOP_COPY(r2, 0x4b72, &(0x7f0000000480)={0x3, 0x0, 0x1c, 0x1, 0x17b, &(0x7f0000000080)}) 15:07:48 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000540)={0xa, 0x800, 0x0, @dev, 0x2}, 0x1c) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x3a) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4ea0, 0x0, @ipv4={'\x00', '\xff\xff', @remote}}, 0x1c) r2 = getegid() setresgid(r2, r2, 0x0) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000000)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, r3, 0x0, &(0x7f0000000900)={&(0x7f0000000200)=@l2tp6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000000840)=[{&(0x7f0000000300)="a63a", 0x2}], 0x1}, 0x0, 0x4008000}, 0x0) socket$netlink(0x10, 0x3, 0x0) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2000004, 0x50, 0xffffffffffffffff, 0xe85d5000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0x0, 0x0, 0x0, 0x1, 0x0, 0xfffffffc, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x256c, &(0x7f0000000080)={0x0, 0xdff1, 0x0, 0x2, 0x253, 0x0, r1}, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)) syz_io_uring_submit(r4, 0x0, &(0x7f0000000180)=@IORING_OP_ASYNC_CANCEL={0xe, 0x3, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1}, 0x2) sendmmsg$inet6(r0, &(0x7f0000004d00), 0x2f, 0x0) 15:07:48 executing program 3: r0 = syz_mount_image$iso9660(0x0, 0x0, 0x0, 0x3, &(0x7f0000000740)=[{&(0x7f00000003c0)='4', 0x1}, {&(0x7f0000000400)=':', 0x1, 0x8000}, {&(0x7f0000000480)='b', 0x1}], 0x0, &(0x7f0000000800)) renameat2(r0, &(0x7f0000000000)='./file0\x00', r0, &(0x7f0000000040)='./file0\x00', 0x4) 15:07:48 executing program 4: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1c08a4, 0x0) r1 = syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) r2 = open$dir(&(0x7f0000000200)='./mnt\x00', 0x40040, 0x10) mkdirat(r2, &(0x7f0000000280)='mnt/encrypted_dir/../file0\x00', 0x20) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir/../file0\x00', 0x80, 0x3e4fcec92923ce05) r3 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x50008, 0x0, 0x10081, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) openat(r1, &(0x7f0000000000)='mnt/encrypted_dir/../file0\x00', 0x40, 0x100) r4 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r4, 0x7, 0x0, 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r4, 0xc0406619, &(0x7f00000001c0)={@desc={0x1, 0x0, @desc2}}) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, &(0x7f0000000140)=',,\\\x00') ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000680)=ANY=[@ANYBLOB="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", @ANYRES32, @ANYBLOB="02000000000000006d6e742f656e637279707465645f6469722f2e2e2f66696c653000"]) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') 15:07:48 executing program 1: r0 = perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000000)=0x5) close_range(r0, 0xffffffffffffffff, 0x0) 15:07:48 executing program 5: socket$nl_generic(0x10, 0x3, 0x10) r0 = perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, @perf_bp={&(0x7f0000000040), 0x6}, 0x18412}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r1 = perf_event_open(&(0x7f0000000240)={0x4, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000430a, 0x400, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x4, @perf_config_ext={0xff}, 0x1000, 0x0, 0xd67d, 0x0, 0x4, 0x0, 0x401, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, r0, 0x3) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) openat$vcsu(0xffffffffffffff9c, &(0x7f0000000080), 0x40, 0x0) bind$inet6(r2, &(0x7f0000000200)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) fcntl$setstatus(r2, 0x4, 0xc00) open_by_handle_at(r1, &(0x7f0000001940)=ANY=[@ANYBLOB="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", @ANYBLOB="5a0554ed51bb16100297872fcc829969b06bb6b02c1b0d67f3033f983af404dbca1e40224890f0375ff3fd2696e72dab63123b4297db7b2e03256563f3276327b0a2d629eab5e9e48707ee8f87a137b463261df8b0c744b885fb5c80d8f3c54da911a3deb3a4789695f297a083f42c43887fec6ff30ce4233fc3a9edc81d03b1f9630240ccead37ef431041dfdc13c5dcb8654e35925ee81a9c0cce27196570f3c3fb96868c6d3b7e3b88879cf1fe12f71b5922409d31b99eb00e305581c95a1e56dd4c0e8571f301df2918604ec6b5f4f8a81b85d62850a9d7068d4dd04baa58f68df5bc381b2afb196bbb32f1a19850eb49299d36fd7772b746216b3b369b761551b88f2a3f23ce6d5e94cee89e03728bf6f1eb6c3a1fb9f1b991900760d0a29a58f2856a11a044c5473306db54fce5a66c62eeefd96957f9ca1b529eb61767647f349953b2a3e1f6fc64da29e778c62d80515dd69c95adc9efe683262631bdeb4ed90e2891d5052b1531266cf30c506c039778ed1ed389781fdfbce78fea695ac81eb4d7ddd066d041392816ced3e441c3739fc482bf52bbcc12271533bd8c1a6175c39e82ae49c5f6932ba34444227dcfa9ee6d6aac5081a326817ddade2348e508cafa6d0c7b602dc29782e24fc73b9724c6fc753ecc1cd472542a03f0fa91fead625ae37bb62a3d874784cc618de7cc9be6f93e26450f179049b4d00ad8644b53bdd482adb74f15ef509bd7cdfad163ceceac7ce43dcb3fd8b4be8309737484e909553d557ce84aaed49487ad55c326df19b91a3fea9df39ade86d791647669bd81ee243d78fe6c43e2ad065f35476d53af0715ef7ae3b74e3904c49d291b7c556d1f379cbf163cecbebcbcb138695651aabeff11053924a8e076aabfbe346e381077f094c2c95a893e2fc2362b8d0ef19c6c9abe02bd26807b9e5949ee01a4521efe62cb2fd194c49c4a9079ffede9fc8237ea1afdff8df41267f82ee54cbbaae435f6c40b89fbab65d4321356121fd439994ca0f8b5ff0a5467ce01e6075f93e364246471dc5ea44e77ffd0a95fe0344fc1430e17c2e854a0ad05b025797e43284434bc51cd86b48237d7d72631969be0ef9e215dc57f6b6129e5e624c81d6254409f8eb366e3a0277b7477f22b801abf31b5d73c8365988f203ed093d3b8e31734e415594659369c702f288cad9006e48f5596f4cf1fc77f29387c74870ffc7dde2ae44cc9787626c7183719101d57c1a72ef19e68a7dce42f8d5f4b816bdbbbbc6f33e65c7c3b74456380661aa75d27f9e1488e8ce4ad17f44739aaaac1a8455f108ca50f1200aa63172f676e630228ab9400850fc827eab27c4e653ec6f815141cef361330b4611564488af8d42497f309804c2b69b892e5be9b6e2e30c4bc1769a37149ff1721134bb243a97aff68661387104dfe85c972358beb1ac5b3d2c26f9cc40e561407f4f1282de5236cb082f0953df4f418226d15fb200b3a61965dfc19818b9816fe5379bd21bbfcd46ec98f6b9b97d947da2b6c6f19f0c8f275a2ad6c016a0abd2d4b81ccb8607fafdc455b392470e692eb7c8b079cd8014deb772d1cd60aae705356e7334de855de98fac268bf8ca23d34a9d08bbbadf916bcff0cabe9e9178c616bcce31272608594d5fc49d1d9f74ab25be6c806dfc8294b4c376a46ead0c75a2e537c8107fe60af6b3e8b606c5d5b057ef0304ad3c3c02160484326c1fc76d4a763a4b7bb8061b7042512185abc212b0bc5228cf920f4ac8887cc49a6a497d8551bea287d2fdd3146c56c50a7ca7ab58a5d29b3f7fb89fdcb213358b5029ad059fc2579d50747fbbcdd6d8c5202687c0013e674e98007a2a756fc2f39a059ec54707c1d3fef73fad2fee4df7095ec8ebc555fb4815fd038932e0137fa3c27bfd9fc15befa2518c3c8b0c52ef9cebb6a32fbb73636a397e410f1bd06ab3578dac343a1392363f22d79a88ae255761faa494d0c0b5b4aaa1f387975cf932cc9a8a921d2b73bb8b85862d6392f5f7196bca04c60c6db5577ba88eb55902b0083cae174737596d6bcb890d33c2966a24fe0829ac7f381047c4eda4f8b54e8d274222da61940583b95774061e6bbdeaed09661f6bf3623974c2e16481b7e848630669e9c2b4d344648fe9dd116592e53cc9c1f9eb684ea15652c41d37a6b72a874eddca9b49826fa243581dbb64320dcfd4d4ca8616430dd2c6c089c1370cd06637de0489edf490e280aac37a31788e2333faaffde9a4df4ab8b5476703ede97b70fca6e99092f70b8365c2a3e4f367005a9e565e72084be07db335574c3850dc6a06b6b29ac69a3642ae4a63fb1fac367d5e0be63bc6384fa4019932a167a6c746314066ec7f83fb963ae94050d98db06e515083bd3703e3e6af5ded7933a1caed24e6d04c1367b31cd15b20fc676bdfbf045e9014b76d4c233d5bdb946c7d70596d7c5d8a0595f9d670132ff07f716172e02b951b7497ee88473fc5bcfd35b103c63451931a6a93c121a6019e565df488c4d66930b055d819525f817f129f5adeaef8c1fce734ac4c05acd33d6b8ddbde3ee0cf4986be72b948dd4f2784f97a194b0f1501ce4a28420911aa47e3cee317f4302d597f04dbaa082787149bc20ca985b85285bca1b25f250c0d727f9495d315cf4228104b96e83679f82e351c1406f960adfcc37dca9b4b890e1d6c5ed89c6b441d0033c71460b71d0c5695244bfbc465cdb93abd78fcd3f0e62aaac66eb20b873bae017c8784c81afcc0f49b09ae0e13ac7260888f1f71bcb0dc161e576d1ddf5a34b74de6f42cec2b8bafbef98bf33f71234af79024bdc60a00eccd7815ee3e3c133faf37ed5d077029234b0ceb05fd5609d7001c74b5aad1bab417a17b078c40bf4871e63b50d6ff044f5e99a2a00b0dc39d1c216227862117ea379e63075a78fa0c2ef899f1fe6221cb93cffeb89f74d4cc3f16e6c066490c117102e139b703773b430c0aa78ac8938f46d54c00b7e4009de493c487198d1af9d88bcea27020a02612f3777c5db2c59c07e3729eb119c498b38eee05f1de2a3c04f1e9d08076f00995438a240cc11aedd296b7a1f53111911547bf24324f84e5b95846abc24f719884752d443af3d31425366a59f518cea60c00ec466cfff027f4f5a7046d85b4bd40064254c908e82df2895e23d07a21ceed8f943e8fe74a38e53c5797d97a375c999b92bdf06771a7b314aa55542abc963a4571d69e584ab6d4ba5e3c88ba8e0cbae6ccd2a224055c7e05c562d8d95427fb8eb79670d3676f2e1e9d003020c530e93f5fbe021a8e955b910bdf65e57d8f060569ad20eee1932d06af294ebae96cbac85e2685224642c375c9158b4a1de2ce042eb0a8291ef084cf99226ae7955676fde52308999fba53b63ac7646d08d5d25ff9234f9a1e5278e521526dfa9f830a6cd7cc55196223b71e3df9e681453b31d74d9cce53a4e9d1e98ae7ce4eb1166cbf4fe6ac46eb47f162ddfefd470b134be39b3951ac7368aaf94c3a9c1e281a3df537653e9b340d3cfaef08b169493188db51cc63e77546058ff5a240d1ade8e34e47b24ae67d6f84e101bd6493b4f5d4956e82a41b123815661f3191032b391ebf0e8cd35f4de6bf82c971e9fa1a179cda5888827f3a24b4ec22a5bc0c90a10ef0baa3c2fc822669ba11dc71536abcc10dfc25c803065c0d707f491b79252dc7f363701e49122d9f190bad7f5792e9882f7d09f840d75de33e7d56564a938fc8095404b0ad787d89276fa52f2e85b177d8246b452084d758b6be953f5e7937ce6c50f7867166b222769ec0c742c7df9af12d3d15622bd3269857f4fd5dbd89483b7fd86562e3eabe1dea41cccfec95a930476973c640c3d2bf054e1f9e6e1e07c260f8ec17497a4c1c97fd5361b7dba92bfa294368d739fe26cb6f7fa272de7512ff5e8d7dd548ddbc30ead35262c22fa2727901cfcb36c8ca8dc40dd62c396b02daa976782f376e80bf144960a938390a057b8bc38741db678636f79db85b1ddf2e22916aac2dad120ff31fdeda7e30a22e498b0c346862c051eb57a9af035853cbec8d3aaab970b7c6d473d710607339c902c96800e6e8fe5693680d644dd05401202dfd9d5562a9a1552faa718e1d7fa0c5d7171da79b27289fc5f55e6ff1d6972786d4b5df696496247abdee803c371a71e6680494b9d1a0ec7bb0ae82a7f818b2605ba5ee48efaee23e1a408b8d76ec2801845268b958405529622562938f544f031381947a0d8669bb2773417e00e6af930b69c25f6d6f05f8f2e5c24880f85042a58c8f573b20b1f1c4dda4b6c3aeceb23167a63267a4ff398468ce827f881ec0ec16bd98a5c88a0c19e9771d063c2c56eae1d931bbba5c33727ae62d716f4416c0d1c33ccb6f379f40cf40366fab920906b1b1bca2b450c4cdc6bdcd77557930097cb84a647eb67f0c9e8499c7d66f089f72c01f90e957d79f102e1f82c69c61164ec068b16f3f8e8324012729dd839f68215141854e5e61c04b7f7fd82362c15a3d8662ad049af330b2207dedfc5f2a8c30c350e9aeb29da0ebb5749fa839baf995a4adc57f1f440d9a37b1250110f337b9892dc645042dd1aa0895e27a9cd57a01db8f29fd7083ae149d3bb7fb9a7087ebd94b38a2c6c7355f41aecff86c21fabe8b39fd2d3748c0d280b475bd0db36d79b227ae301d0fae4d25e0359b1330951c25c31da971ce251a12ffc9e8fce500b0e97c9df3e8297a38f0397dfe2943a0642df6c9b80ebeea4d2312289ab2aceef9cfea083beed9121e455335cd390fdf4f8e6eed8d88a3268ff55f3ff05649fb3f4482d8288b8cab45098673704de737d7e141dfa533b781d84a3825fd5260e8582a28efe767dd47de42e0564c6eee4b95cf6351786e3c3b3f7c22ad22af6ff6c3a046b4995b43a3330a7448da8999d546a17a16bd228aae005eef3ea171a2bbdf7da20359e72da85a6a8cb3452f0d908c1c32ce1b75af9e60c88735a752b3f2229d03b7c8c365e21d0573d2df816e2567543ee15d1d84b5b69b79c940dfd4258e775dd9eaa9e7f6427978cc281d68585cc1a2d5916f384f3adb9bcc5d9d9783fdd67d0472d2d4f488ada15419ec0f66952af70307af109cbcb6f1202d9134ad63c49a65ceb101a4ac96a30a79dc58387d500b0ab92cb3b7b6d50801047f6a768581f612edc60d0cf51275e85eb0435fb8d8ea4b6234a57522630fc29fc737c811089cfc3cd8a5326805bca869141231ac95f6972686a7ac8814b28ce85574a0fd527218a23c3b02f90cf3782752b8ebaf0e05c56a1868e127cdd14ab8e2280b956532636e95c19bdc20e0b5db0288f07c482e1242e86a52aa82936936e4972fe1cea1812c7d36fb1edfa0ab9769adf178844a0751bbf317039bf37031090e9ee8b83eec93fabd6f6b2a3b2102fbd96aca3b3ddcf92eb7812ef39e79dc1b5521e18988e8dabe41e357cfbd16693217995e8dff7b74f681e891c3649cee8973fa40e06299cacee46fde6a85ea8c4e8cf3389dc2c89c1771d324600b61182c4ad1eba5ff3b28c8db01dc970aa3153515879c499f9f84bcec271ef5dc5de444b1f3493576de348cafdd665ce10eece3689cf507d1550afac3f3557b2d565b16020b01969d31860099c6f2dc4a80c5f734c42f6b40ffa04663cbf8594ce4ce704ef73032e62d51f6c3aeebae4142989f1affecd745d797261799e51545de073bebe01ba43716791f2f48958ad8dfd725302dff45201aef68b87577418dc25a075f7092bf38e462955f2722"], 0x400) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r3, 0x8914, &(0x7f0000000140)={'lo\x00'}) r4 = socket$packet(0x11, 0x3, 0x300) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) bind$packet(r4, &(0x7f0000000040)={0x11, 0x9, r6, 0x1, 0x8, 0x6, @random="1900de9961ac"}, 0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8914, &(0x7f0000000300)={'xfrm0\x00'}) sendmsg$inet6(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000500)="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", 0x13c}, {&(0x7f0000000340)="9469578b5745877d5b02f1effe0f104a9bfc8cef9b2f42e2f616db401c6fcd6b1b0e0f837820473d07cc3f64af8963e615b33c6004bc84cef10f8c66a423e0b8324c54f84dfc4b2dbadbaeec758c2e9890d059db6ff016dbad65998a07cb965fcd9c4fcb", 0x64}, {&(0x7f0000000700)="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", 0x1000}], 0x3}, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000000c0)={'ipvlan1\x00'}) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) bind$packet(r4, &(0x7f00000002c0)={0x11, 0x5, 0x0, 0x1, 0xff, 0x6, @random="b1f4a6611bde"}, 0x14) 15:07:48 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$KDGKBENT(r0, 0x4b46, &(0x7f0000000000)={0x9}) ioctl$KDSKBMODE(r0, 0x4b45, &(0x7f0000000040)=0x1) 15:07:48 executing program 6: r0 = semget$private(0x0, 0x4, 0x100) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4317, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semctl$IPC_RMID(0x0, 0x0, 0xb) clock_gettime(0x0, &(0x7f0000000140)) semtimedop(0x0, &(0x7f00000003c0)=[{0x0, 0x4a41}, {}], 0x2, &(0x7f0000000200)={0x77359400}) semtimedop(0x0, &(0x7f0000000000), 0x0, &(0x7f0000000040)) semctl$SEM_STAT_ANY(0x0, 0x0, 0x14, 0x0) semctl$IPC_RMID(0x0, 0x0, 0x0) r1 = semget$private(0x0, 0x6, 0x0) semop(r1, &(0x7f00000000c0)=[{0x3, 0x0, 0x1800}, {}], 0x2) semctl$SEM_STAT_ANY(r0, 0x4, 0x14, &(0x7f00000002c0)=""/164) r2 = semget$private(0x0, 0x2, 0x800) semctl$IPC_RMID(r2, 0x0, 0x0) semctl$SEM_STAT_ANY(0x0, 0x3, 0x14, 0x0) unshare(0x48020200) semop(r2, &(0x7f0000000000)=[{0x4, 0x3000, 0x800}, {0x4, 0xa90}, {0x1, 0x80}, {0x0, 0x5, 0x800}], 0x4) [ 150.608454] loop3: detected capacity change from 0 to 65536 [ 150.628447] loop3: detected capacity change from 0 to 65536 15:07:48 executing program 1: r0 = perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000000)=0x5) close_range(r0, 0xffffffffffffffff, 0x0) 15:07:48 executing program 3: r0 = syz_mount_image$iso9660(0x0, 0x0, 0x0, 0x3, &(0x7f0000000740)=[{&(0x7f00000003c0)='4', 0x1}, {&(0x7f0000000400)=':', 0x1, 0x8000}, {&(0x7f0000000480)='b', 0x1}], 0x0, &(0x7f0000000800)) renameat2(r0, &(0x7f0000000000)='./file0\x00', r0, &(0x7f0000000040)='./file0\x00', 0x4) 15:07:48 executing program 4: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1c08a4, 0x0) r1 = syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) r2 = open$dir(&(0x7f0000000200)='./mnt\x00', 0x40040, 0x10) mkdirat(r2, &(0x7f0000000280)='mnt/encrypted_dir/../file0\x00', 0x20) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir/../file0\x00', 0x80, 0x3e4fcec92923ce05) r3 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x50008, 0x0, 0x10081, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) openat(r1, &(0x7f0000000000)='mnt/encrypted_dir/../file0\x00', 0x40, 0x100) r4 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r4, 0x7, 0x0, 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r4, 0xc0406619, &(0x7f00000001c0)={@desc={0x1, 0x0, @desc2}}) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, &(0x7f0000000140)=',,\\\x00') ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000680)=ANY=[@ANYBLOB="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", @ANYRES32, @ANYBLOB="02000000000000006d6e742f656e637279707465645f6469722f2e2e2f66696c653000"]) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') [ 150.723268] loop3: detected capacity change from 0 to 65536 15:07:48 executing program 2: r0 = syz_genetlink_get_family_id$mptcp(&(0x7f0000000380), 0xffffffffffffffff) sendmsg$MPTCP_PM_CMD_FLUSH_ADDRS(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000440)={&(0x7f00000003c0)={0x4c, r0, 0x200, 0x70bd28, 0x25dfdbfe, {}, [@MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x6}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x6}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x8}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x8}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x4}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x8}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40080c0) stat(&(0x7f0000000000)='.\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r1, 0x0) stat(&(0x7f00000004c0)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r2, 0x0) stat(&(0x7f0000000000)='.\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r3, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x7, 0x3, &(0x7f00000001c0)=[{&(0x7f0000000080)="b5365468686d84e59ff28403bad2554ba5a5d079652f577054745a9468e9ee258e127872093ea6234b74ec7b740a93", 0x2f, 0x1}, {&(0x7f00000000c0)="6428b35965c5a1fdd086386d1690f4e7c22e54faa1be222c1c41b16d8253abea61ba84b1c68b9811251d4f14047a0ce5912440080de252eb168219c456c39ff07fa0f08dad1b560309bab0f8b70391225d987fa9c63d9e8e06f2447cee8055c174bfe1e777e0ae3a5044ff1d86abff53f212cd9694453556be94d5e6fbb18a829da75e6b8b90e174cfde6395322b2fb7fa9817d4f9ba6568caf977c40bc9f4381ec2b74f522dd4", 0xa7, 0x5}, {&(0x7f0000000180)="552c8a3e2a933a82fd07fe15d1b3105bc58ee5b4b4e6d9e8a74d745961d6a146125d84", 0x23, 0x10000}], 0x1010000, &(0x7f0000000240)={[{@gid={'gid', 0x3d, 0xee01}}], [{@fowner_eq={'fowner', 0x3d, r1}}, {@permit_directio}, {@uid_eq={'uid', 0x3d, r2}}, {@pcr={'pcr', 0x3d, 0x3}}, {@smackfsfloor={'smackfsfloor', 0x3d, '.{'}}, {@obj_user={'obj_user', 0x3d, '/dev/nvram\x00'}}, {@uid_gt={'uid>', r3}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_READ'}}]}) openat$nvram(0xffffffffffffff9c, &(0x7f0000005480), 0x80, 0x0) 15:07:48 executing program 3: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000000440)=[{&(0x7f0000010000)="eb58906d6b66732e66617400020120000200008000f8000020004000000000000000000001", 0x25}, {0x0, 0x0, 0x4000}], 0x0, &(0x7f00000004c0)=ANY=[]) r1 = openat(r0, &(0x7f0000000100)='./file1\x00', 0x105142, 0x2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x4000, 0x1, 0x0, 0x0, 0xf31}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r2, 0x7, 0x0, 0x0, 0x0) utimensat(r2, &(0x7f00000001c0)='./file2\x00', &(0x7f0000000200)={{0x0, 0xea60}}, 0x100) chdir(&(0x7f0000000080)='./file2\x00') r3 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x90) sendfile(r1, r3, 0x0, 0x10000000c) ftruncate(0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, &(0x7f0000000000)={0x7}) lstat(&(0x7f0000000040)='./file2\x00', &(0x7f0000000140)) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0xfdef) r4 = creat(&(0x7f00000000c0)='./file2\x00', 0x0) fsconfig$FSCONFIG_SET_FLAG(r4, 0x0, &(0x7f0000000240)='lazytime\x00', 0x0, 0x0) openat(r4, &(0x7f0000000280)='./file2\x00', 0x0, 0x88) openat(r3, 0x0, 0x0, 0x102) [ 150.793330] loop3: detected capacity change from 0 to 32768 [ 150.809853] FAT-fs (loop3): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 15:07:48 executing program 5: read$rfkill(0xffffffffffffffff, &(0x7f0000000000), 0x8) r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$RFKILL_IOCTL_NOINPUT(r0, 0x5201) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='rdma.current\x00', 0x0, 0x0) r2 = pidfd_getfd(r1, r0, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x40001, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = dup2(r4, r3) r6 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r6, 0x7, 0x0, 0x0, 0x0) sendmsg$GTP_CMD_GETPDP(r6, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0xc004) socketpair(0x0, 0x0, 0x1, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000000)={{0x2, 0x0, @local}, {0x0, @local}, 0x20, {0x2, 0x0, @local}, 'dummy0\x00'}) r9 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000001b80)='ns/pid_for_children\x00') ioctl$F2FS_IOC_MOVE_RANGE(r2, 0xc020f509, &(0x7f0000001bc0)={r6, 0xffff, 0x0, 0x6}) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001d80)=[{{&(0x7f0000000180)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f00000000c0)=[{&(0x7f0000000200)="6f333f45199690a2dd01d3b072682513a3443308aad932c86103f3760e03ff159b674ac69d3970f99013191ed49eda27c3f3a0f85d35ed762c34a56108c0678c02b0fe3d92d6a6d687c24ccc472b0b860da74f99ad44f4ea66fdcb3cbcb910352fc8aff3f5fc73", 0x67}, {&(0x7f0000000340)="bfdb8f13991e7d6e1d36b68af89633551d6c85fcec6ddeb7c999ef86303aa0e62f9c7196b876b2d5d290bcff3a4d900730bf757ca4ee6a0bd637d256928e0e984066bef7cdf857860fff2674326b13a68b05927ca1cfdf5f871b68a3c445a6a98e2f20fef200071101c44e7fd74f791645fbad200560ce41c60d8d4f4fc4761d85b2aa748d06ec3bd074895f50026a9262a701c862", 0x95}, {&(0x7f00000004c0)="284264cc626fe28388ec2905f894608b9ba71df25246ed4130f0791c510d8d97343b051a0256566e82c7d8cb501f5970c92161441f1e9211f275d1eb7a61066040f005ebe34cae7800f8fc81953be7d9d9b90234085b97e3008a87d7de07f91ed24f29a24819a034394e3f88217bb2c3d6b8e7f67dff784e53ff6f00b1de860ca92241e7fbdf2cb90d607a4616c10025b2ea3eb6928f731d6e0b2e6ca1eeb6308b5f1767430c", 0xa6}, {&(0x7f0000000880)="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", 0x1000}], 0x4, 0x0, 0x0, 0x48001}}, {{&(0x7f0000000280)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000600)=[{&(0x7f0000000580)="cbe9b506b457e859ab9abb0fd9fd6e50e19720857a9ba04c68f5e17e1a0963b091979f8ec16261ce6ead7ed6345dca73b8a26b9005502db3bf1973388b351d1e23b22874aead79647bc3d265e7", 0x4d}, {&(0x7f0000000700)="a73463f5d0399385ba569ba897648d6ea0ba197958796c8dbdb052d85f9048e734b4368411dbe8f6a8d2c7b28607a0fff4e929d889ddb47923929ced581f87a22a64f1308d02382d3ee7b77c09f601fbb80cef47151af66c417afb21ff3f224609ce118b4edab68ce286723b490fcd695ea0912e14a5088a8314000e644c68864e932f945c485347cfeb8536e15fd8b3cfb180c8031bc060305d91ccdac31576142019a17106f16ac3f3c804c46ef2ac468ebb8e5c93ada26618fa5a00672652333688ac06f9290e7cb3cb90147a6bfeaff6280556520f506b65a9b67a760d00d6b0dc1e5f76672b325412ef5e556ef52e9d212fd6dd", 0xf6}, {&(0x7f0000000400)}], 0x3, &(0x7f0000001a00)=ANY=[@ANYBLOB="24000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="0000010006001000000000000100000001000000", @ANYRES32=r3, @ANYRES32, @ANYRES32=r2, @ANYRES32, @ANYRES32, @ANYRES32=r2, @ANYBLOB="1c0010000000d4dd6632000001000000", @ANYRES32=r2, @ANYRES32, @ANYRES32=r5, @ANYBLOB="0000000024000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32=r2, @ANYRES32, @ANYRESDEC, @ANYBLOB="00000000100000000000000001000000010000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0xee01, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000001000000", @ANYRES32, @ANYRES32=r7, @ANYRES32, @ANYBLOB="0000000024000000000000000100000001000000", @ANYRES32=r5, @ANYRES32, @ANYRES32=r3, @ANYRESDEC, @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0xee01, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32, @ANYRES32=r9, @ANYRES32=r6, @ANYRES32=r10], 0x150, 0x30000005}}], 0x2, 0x200408c1) sendmsg$MPTCP_PM_CMD_GET_LIMITS(r7, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={0x0}}, 0x20000840) fsmount(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000006c0), r8) sendmsg$NL80211_CMD_VENDOR(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x80}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4000000}, 0x20000000) 15:07:48 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='projid_map\x00') r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r1, 0x5407, &(0x7f0000000080)={0x4, 0x21, 0x4, 0x6633, 0xa, "bb09819e2f6e8485"}) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/mdstat\x00', 0x0, 0x0) r2 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000040), 0x101403, 0x0) write$P9_RREADLINK(r2, 0x0, 0x0) ioctl$KDGKBSENT(r0, 0x4b48, &(0x7f0000000100)={0x5, "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"}) 15:07:48 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000000)={{0x2, 0x0, @local}, {0x0, @local}, 0x20, {0x2, 0x0, @local}, 'dummy0\x00'}) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x8, 0x1) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCSARP(r1, 0x8955, &(0x7f0000000000)={{0x2, 0x0, @local}, {0x0, @local}, 0x20, {0x2, 0x0, @local}, 'dummy0\x00'}) ioctl$sock_inet_udp_SIOCINQ(r1, 0x541b, &(0x7f0000000080)) execveat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x0, &(0x7f0000001780), 0x0) [ 151.036630] FAT-fs (loop3): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 151.050913] process 'syz-executor.1' launched '/dev/fd/-1/./file0' with NULL argv: empty string added [ 162.212708] proc: Unknown parameter 'mode' 15:07:59 executing program 6: r0 = semget$private(0x0, 0x4, 0x100) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4317, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semctl$IPC_RMID(0x0, 0x0, 0xb) clock_gettime(0x0, &(0x7f0000000140)) semtimedop(0x0, &(0x7f00000003c0)=[{0x0, 0x4a41}, {}], 0x2, &(0x7f0000000200)={0x77359400}) semtimedop(0x0, &(0x7f0000000000), 0x0, &(0x7f0000000040)) semctl$SEM_STAT_ANY(0x0, 0x0, 0x14, 0x0) semctl$IPC_RMID(0x0, 0x0, 0x0) r1 = semget$private(0x0, 0x6, 0x0) semop(r1, &(0x7f00000000c0)=[{0x3, 0x0, 0x1800}, {}], 0x2) semctl$SEM_STAT_ANY(r0, 0x4, 0x14, &(0x7f00000002c0)=""/164) r2 = semget$private(0x0, 0x2, 0x800) semctl$IPC_RMID(r2, 0x0, 0x0) semctl$SEM_STAT_ANY(0x0, 0x3, 0x14, 0x0) unshare(0x48020200) semop(r2, &(0x7f0000000000)=[{0x4, 0x3000, 0x800}, {0x4, 0xa90}, {0x1, 0x80}, {0x0, 0x5, 0x800}], 0x4) 15:07:59 executing program 4: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1c08a4, 0x0) r1 = syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) r2 = open$dir(&(0x7f0000000200)='./mnt\x00', 0x40040, 0x10) mkdirat(r2, &(0x7f0000000280)='mnt/encrypted_dir/../file0\x00', 0x20) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir/../file0\x00', 0x80, 0x3e4fcec92923ce05) r3 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x50008, 0x0, 0x10081, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) openat(r1, &(0x7f0000000000)='mnt/encrypted_dir/../file0\x00', 0x40, 0x100) r4 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r4, 0x7, 0x0, 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r4, 0xc0406619, &(0x7f00000001c0)={@desc={0x1, 0x0, @desc2}}) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, &(0x7f0000000140)=',,\\\x00') ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000680)=ANY=[@ANYBLOB="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", @ANYRES32, @ANYBLOB="02000000000000006d6e742f656e637279707465645f6469722f2e2e2f66696c653000"]) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') 15:07:59 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000080)={0x0, 0x8000}, 0x4) r1 = dup3(r0, r0, 0x80000) setsockopt$SO_TIMESTAMP(r1, 0x1, 0x40, &(0x7f0000000000)=0x1f, 0x4) syz_emit_ethernet(0x66, &(0x7f0000001e00)=ANY=[@ANYBLOB="0180c2000000bbbbbbbbbbbb86dd6001203f00302c00fc020000000000000000000000000000ff020000e1000000000000000000000103009078000000006000100000000000fc000000000000000000000001000000fc0200"/102], 0x0) 15:07:59 executing program 3: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000000440)=[{&(0x7f0000010000)="eb58906d6b66732e66617400020120000200008000f8000020004000000000000000000001", 0x25}, {0x0, 0x0, 0x4000}], 0x0, &(0x7f00000004c0)=ANY=[]) r1 = openat(r0, &(0x7f0000000100)='./file1\x00', 0x105142, 0x2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x4000, 0x1, 0x0, 0x0, 0xf31}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r2, 0x7, 0x0, 0x0, 0x0) utimensat(r2, &(0x7f00000001c0)='./file2\x00', &(0x7f0000000200)={{0x0, 0xea60}}, 0x100) chdir(&(0x7f0000000080)='./file2\x00') r3 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x90) sendfile(r1, r3, 0x0, 0x10000000c) ftruncate(0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, &(0x7f0000000000)={0x7}) lstat(&(0x7f0000000040)='./file2\x00', &(0x7f0000000140)) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0xfdef) r4 = creat(&(0x7f00000000c0)='./file2\x00', 0x0) fsconfig$FSCONFIG_SET_FLAG(r4, 0x0, &(0x7f0000000240)='lazytime\x00', 0x0, 0x0) openat(r4, &(0x7f0000000280)='./file2\x00', 0x0, 0x88) openat(r3, 0x0, 0x0, 0x102) 15:07:59 executing program 7: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_SETSEL(r0, 0x4b4b, 0x0) r1 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x400, 0x0) ioctl$TCSBRKP(r1, 0x5425, 0x994a) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000040), 0x101000, 0x0) ioctl$KDFONTOP_COPY(r2, 0x4b72, &(0x7f0000000480)={0x3, 0x0, 0x1c, 0x1, 0x17b, &(0x7f0000000080)}) 15:07:59 executing program 5: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000000440)=[{&(0x7f0000010000)="eb58906d6b66732e66617400020120000200008000f8000020004000000000000000000001", 0x25}, {0x0, 0x0, 0x4000}], 0x0, &(0x7f00000004c0)=ANY=[]) r1 = openat(r0, &(0x7f0000000100)='./file1\x00', 0x105142, 0x2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x4000, 0x1, 0x0, 0x0, 0xf31}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r2, 0x7, 0x0, 0x0, 0x0) utimensat(r2, &(0x7f00000001c0)='./file2\x00', &(0x7f0000000200)={{0x0, 0xea60}}, 0x100) chdir(&(0x7f0000000080)='./file2\x00') r3 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x90) sendfile(r1, r3, 0x0, 0x10000000c) ftruncate(0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, &(0x7f0000000000)={0x7}) lstat(&(0x7f0000000040)='./file2\x00', &(0x7f0000000140)) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0xfdef) r4 = creat(&(0x7f00000000c0)='./file2\x00', 0x0) fsconfig$FSCONFIG_SET_FLAG(r4, 0x0, &(0x7f0000000240)='lazytime\x00', 0x0, 0x0) openat(r4, &(0x7f0000000280)='./file2\x00', 0x0, 0x88) openat(r3, 0x0, 0x0, 0x102) 15:07:59 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='projid_map\x00') r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r1, 0x5407, &(0x7f0000000080)={0x4, 0x21, 0x4, 0x6633, 0xa, "bb09819e2f6e8485"}) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/mdstat\x00', 0x0, 0x0) r2 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000040), 0x101403, 0x0) write$P9_RREADLINK(r2, 0x0, 0x0) ioctl$KDGKBSENT(r0, 0x4b48, &(0x7f0000000100)={0x5, "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"}) 15:07:59 executing program 1: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r0, 0x7, 0x0, 0x0, 0x0) getdents(r0, &(0x7f0000000280)=""/131, 0x83) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, 0x0) mount$bind(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180), 0x64000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x84002c, &(0x7f0000000400)=ANY=[@ANYBLOB='mode=0']) [ 162.219346] proc: Unknown parameter 'mode' [ 162.223690] loop5: detected capacity change from 0 to 32768 [ 162.236093] loop3: detected capacity change from 0 to 32768 [ 162.239988] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 162.243253] FAT-fs (loop3): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 15:07:59 executing program 1: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r0, 0x7, 0x0, 0x0, 0x0) getdents(r0, &(0x7f0000000280)=""/131, 0x83) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, 0x0) mount$bind(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180), 0x64000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x84002c, &(0x7f0000000400)=ANY=[@ANYBLOB='mode=0']) 15:08:00 executing program 6: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r0, 0x7, 0x0, 0x0, 0x0) getdents(r0, &(0x7f0000000280)=""/131, 0x83) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, 0x0) mount$bind(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180), 0x64000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x84002c, &(0x7f0000000400)=ANY=[@ANYBLOB='mode=0']) 15:08:00 executing program 2: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1c08a4, 0x0) r1 = syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) r2 = open$dir(&(0x7f0000000200)='./mnt\x00', 0x40040, 0x10) mkdirat(r2, &(0x7f0000000280)='mnt/encrypted_dir/../file0\x00', 0x20) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir/../file0\x00', 0x80, 0x3e4fcec92923ce05) r3 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x50008, 0x0, 0x10081, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) openat(r1, &(0x7f0000000000)='mnt/encrypted_dir/../file0\x00', 0x40, 0x100) r4 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r4, 0x7, 0x0, 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r4, 0xc0406619, &(0x7f00000001c0)={@desc={0x1, 0x0, @desc2}}) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, &(0x7f0000000140)=',,\\\x00') ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000680)=ANY=[@ANYBLOB="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", @ANYRES32, @ANYBLOB="02000000000000006d6e742f656e637279707465645f6469722f2e2e2f66696c653000"]) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') 15:08:00 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='projid_map\x00') r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r1, 0x5407, &(0x7f0000000080)={0x4, 0x21, 0x4, 0x6633, 0xa, "bb09819e2f6e8485"}) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/mdstat\x00', 0x0, 0x0) r2 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000040), 0x101403, 0x0) write$P9_RREADLINK(r2, 0x0, 0x0) ioctl$KDGKBSENT(r0, 0x4b48, &(0x7f0000000100)={0x5, "7ae2059ef85935cb12c2857977f50e8abe6c38f820f4650a2656ca864ceeb588b1f9d1bd2cb81131cf5b07349070a78cf930d887c34b2f245842d42c988b66c61e4b70c5e19ffb1d7e14226e0128b2ec32b03526709f71893b5205c2ce0342e8ccb16904a4492ba61eb2ca876e3e8198276074e1b28a5d43b22c16ce7d6bb64e96642c29cc68028eff1093a7764365969ac1fa482e301ec378c29dd7fe8be0541490c667ea2fec55ccc64474e138924618a6b2b3dca4e7d68b5e64dbc04412d12f734defcde3ceb63c599c96e233d4a37aaf2316096f035f6375f42526576f072c9ac910636921831df90332149c8090213cdac30876a6260ac7d64d9554a37c7d1ec9ff3f87a1d2dbb7ae97facc478b42068026c8936746b8683cf3c90235f6a6c2976850455192c20b2dfcbcb4b72f05bab17060fc98ee6c28c98378b4f0dd806e9854e18fe141ff02c750fe531cc7087e99892d86115225e5e14ff56b16e0b266c48c520e85ec6f95af7a3e8ef3032572825b67b68d5b78b1e57be43a3b160ef0d7fbc8d2447a47f1c155c54b0e89decb4d6d464b40cc802aa9127218b97fd707bee86b59f3640489722fbc088430ecfeaebccb75b3ea134ca89ef26d09b2cac6748a422d1d5c0ea6e357a17515f49f125c9f3ab65816cfb520e079cef78d7c55ed9de53e276c324fa2f7c2d748c8dc0c0e252c321c8dadcb695c7fb04253"}) [ 162.372944] proc: Unknown parameter 'mode' 15:08:00 executing program 4: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1c08a4, 0x0) r1 = syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) r2 = open$dir(&(0x7f0000000200)='./mnt\x00', 0x40040, 0x10) mkdirat(r2, &(0x7f0000000280)='mnt/encrypted_dir/../file0\x00', 0x20) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir/../file0\x00', 0x80, 0x3e4fcec92923ce05) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x50008, 0x0, 0x10081, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r3 = openat(r1, &(0x7f0000000000)='mnt/encrypted_dir/../file0\x00', 0x40, 0x100) r4 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r4, 0x7, 0x0, 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r4, 0xc0406619, &(0x7f00000001c0)={@desc={0x1, 0x0, @desc2}}) futimesat(r3, &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0)={{0x0, 0xea60}}) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000680)=ANY=[@ANYBLOB="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", @ANYRES32, @ANYBLOB="02000000000000006d6e742f656e637279707465645f6469722f2e2e2f66696c653000"]) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') [ 162.385348] proc: Unknown parameter 'mode' [ 162.440141] FAT-fs (loop3): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 15:08:00 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='projid_map\x00') r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r1, 0x5407, &(0x7f0000000080)={0x4, 0x21, 0x4, 0x6633, 0xa, "bb09819e2f6e8485"}) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/mdstat\x00', 0x0, 0x0) r2 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000040), 0x101403, 0x0) write$P9_RREADLINK(r2, 0x0, 0x0) ioctl$KDGKBSENT(r0, 0x4b48, &(0x7f0000000100)={0x5, "7ae2059ef85935cb12c2857977f50e8abe6c38f820f4650a2656ca864ceeb588b1f9d1bd2cb81131cf5b07349070a78cf930d887c34b2f245842d42c988b66c61e4b70c5e19ffb1d7e14226e0128b2ec32b03526709f71893b5205c2ce0342e8ccb16904a4492ba61eb2ca876e3e8198276074e1b28a5d43b22c16ce7d6bb64e96642c29cc68028eff1093a7764365969ac1fa482e301ec378c29dd7fe8be0541490c667ea2fec55ccc64474e138924618a6b2b3dca4e7d68b5e64dbc04412d12f734defcde3ceb63c599c96e233d4a37aaf2316096f035f6375f42526576f072c9ac910636921831df90332149c8090213cdac30876a6260ac7d64d9554a37c7d1ec9ff3f87a1d2dbb7ae97facc478b42068026c8936746b8683cf3c90235f6a6c2976850455192c20b2dfcbcb4b72f05bab17060fc98ee6c28c98378b4f0dd806e9854e18fe141ff02c750fe531cc7087e99892d86115225e5e14ff56b16e0b266c48c520e85ec6f95af7a3e8ef3032572825b67b68d5b78b1e57be43a3b160ef0d7fbc8d2447a47f1c155c54b0e89decb4d6d464b40cc802aa9127218b97fd707bee86b59f3640489722fbc088430ecfeaebccb75b3ea134ca89ef26d09b2cac6748a422d1d5c0ea6e357a17515f49f125c9f3ab65816cfb520e079cef78d7c55ed9de53e276c324fa2f7c2d748c8dc0c0e252c321c8dadcb695c7fb04253"}) [ 162.531299] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 15:08:14 executing program 7: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_SETSEL(r0, 0x4b4b, 0x0) r1 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x400, 0x0) ioctl$TCSBRKP(r1, 0x5425, 0x994a) openat$bsg(0xffffffffffffff9c, &(0x7f0000000040), 0x101000, 0x0) 15:08:14 executing program 5: ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x804307, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x10000, 0x7fffffff}, 0x0, 0xffffffffffffffff, 0x0, 0x3, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001640)) r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000000), 0x85b, 0x40000) ioctl$BTRFS_IOC_SNAP_DESTROY(r0, 0x5000940f, &(0x7f0000000440)={{r1}, "3ec0ff231f3dcb9c84464f3a0d75d8b5f3b5328f67b224bd9ae1b4360c2ced71aa8c770816a9c8bf2e723590e5d7c10c511851b0303ee1bb78410fa47f5b4b99e82375710c4985fbe35012ed598c190357c7fbe340f388393a47451986940f81e2a4ceea04c0e39da54bbaa1e15229f7709984fa931295238a551382e5d177c55ae2c1bf39772a1ccfb59e553d9cedc2186c845124b0040bf1fee11983efd0bc71e7327862cc2a8a1cef4e8d6fe839048a9d10031d5f78ddc3a553c0a646cdcd4c059a30f75c507ac9ee7bf10528e228957168e720dd56b3ea943a8a6b43edb7dc07e70b7e0f386639aa702f2a760e90b3db7b99ff30c54499c4f1ffd2af718134f54876cf54dcfd5265fa5627dee53e2fc6f90f927854ded2d730878e2694e62949167df94a51f692da237e243e131f91e071a35f9d5d5ad83988f51c71f27c759463bd801cd11e1755ec8da1369869f3e6c87fbb97eaebae0aee335b701d8b86a6a43ca18a2f15b291a612858c4edb389ff41326fdd21f5e8fbbd84e31f85210757cb91fde8b2c93136b297d78b02f87aca7d425095031e0ae5f4c53716e6ba2b52ea97972ed5b23c98ae125cd5ef63c94347031d6b18027613fae0909711a4b897033a94246c26a40d65dc110981624d948131aa24a145343e98e3ab254b1a1f15cfb2ecbe9ffc16f1d69dfaaff4ad4ffd16c29f00ff5984d30eb7a1500cfa23229f9c07244d11943567f0ed8885ff4417e3c35fa2fab4c7b3ea977291f13ad9bdc57ed4cbcc358529718cd6ca0840e0abc14e48aa4ece72147611affab78d647755f7371a7a82066cd2be9d3462cf062a80ab0c8657f8c0ec8fd2bf6bed629f30ae7bc87336f31fe44fca934251141b8360cefc548c9f666c8b33f72fdf968b0a70bbcefbd00929420a1af103d496b6225adf8019a046ea3b8eb85c8119852fc1db31eaa053381f29cb8d96c75c6329e996e9c02ac28a269e21175344e419a0b7f3931147457cbe10221013301e2b3d08304453e65d0187ec2bc2f38d6f3f8e699828a44be1ac9f199262a28746c1e264281ab33d7dafda288a159b067703107783439537a2ce5e6dba0d3b4198a6db2364758394f08776d03fcc6dca6d4648f7275998675f99ac86c44d15951b5841582fd344300a65792dc025bbb247d8bf5163b241cf0de97575071d7298f5f5451e1748f39b6406d1266a0db5b557b2239d9775f8dc5b8e48764efdc1035ee9c22039d60116505466285d3223d1b4f5a5736305641bbdaa31ae4ecf252928ed9da5307a81a4a953a1a893d12a28cb3ddcf20a6c9ca1fb2595a3159211d32057f1b7bd94b0996b33d7026f829f6f8fb6dd7db3af9cb175eb9497b689dc41087e08f1fa5370434d2e787b95152f98612582f8aa3e3d16bf9e484a73f34df685d9f9fbbbe8bdb769ec9283dec98999316224ccfbbf4988efaa48883ad6eb8a6a4056677a90aead3a18e2595e5a945ce6514dee6df899ffcb9484ecac40d5ff2cbadaca38c17e49ac93d8356a7f6260bf3a6e011b1c91d42c11675fcbcad5a05f87c5c623f2c3312882bc843ca86d7f831927d4aa2e7d40ad083c392757963ba49bca1750e728e3812332330db18fc24e389797af0ea1cd4bd57dd7a5340c3c22a59176c1bbafb2ea3fcea7bfeeb9ecb69d64f3ac7794fc26afc0746721058cf7c1685d9d16e2f49acc022585d50dff45bf98a0237607e78c8b1826dcf2d4e083ab4a3e3ca0041950ec581fcbadb9bbd7937889adc95f405c667072869629042f1747ddc83a47dd5d99d9c6f2c084678bb59bd53d968900ef89165e117590d60c6b4bbba6cbda0c031638799f9e2bdf941b084a0a9bd7e419f8390479618ab28823598e22b1def6f14370a0bf9fde353eab1462f2ed1d5fe63bad6aa80cf6a932919e961bce4a0f840649e16556c15cb3700f5919b92a660f86f0768167ea06265e4c8c5a3db37dc823d87c059511f371fd92f170f95e888d2daa06702356ab1a8f80b76ae33eac32c5034e0d60f65414d1f70539037abd9c5fb4c5c53287bfd1fbab7c4ca002f902f7d62a722cd65d3f1b6effd385e33e72e332411356e86ce917efc276348c584be2a3756900d489d6392ebd43a0cbc1c3928a96eef0d6e2a97538b9042f6df8a3fe1f0443a0bee4320c09523a64dc42f2f34cff6914a3a4bf7d6d5979ee2ff434c69b85e0a0e5209cd9e90f6b438d5fe7a7bdfef37bdf244dad0d02ad7aef15128273ce29a8f9ebd80b1c03cc5fd88e95399df4a3fd86540f38a6c04ba094774c88cf8c3421a6381b675e9a45555739a9dc8e84c850d12bad09d779e9b866648ee1e04ec125c4d057643caa74f42d7f024d1074bcdb944ebe5cc7cbc2ff330b1c55631475d29405d58890abc40cc76acd9a14cf08e31155ebdaa82af7fc44a34058e3e17e32b20ac8f9d055aab9e0bff14f210d7208588af90932bfe6fc796461a5164002a329269570af8ed117f1d83dc9ca58a9654cf72f77afe068e353a5f1823a4a85a8dd8d701e68d520992b84a864628635493da6b5aa5996692d59770ef518d2c47713f964582d90cf71d5ac8f5cfd6888b59168dbe71815bf6f5cde4c4fc7899cbd37a6b7c626bacbfccb3b8b92f4fa5452ad29032fe8e43e042d26286f0090c528551209ab0dd456d4a1740052e6e0f1c507a2a3672305562f616a4fe2462e12e4207546a553d215c1ac706cb7f659b04bd84cf3b0f26f6c53eb2ec282fdc0049b10c2f9c2cfbaa8d05f2936b9b00b217c8bd697741ebc6a1e0c5b71078b8a25da3fc4c5eb33b1d42262443a30cf65596838d86915862a935e27a8d3c9bb3692940bda788c0aa3b93574f6920bbb9673695e33b626381a721fc434ad3107c7c9afb951d9268ce8f3e3a0f005b6580f7d0d58bf792b9aa57523923e8c7e9ee4a31ba67cc2249a2d2c4c5bcc5a31363c29acd3fd01441a93c55bda119f22c256695d3f7791fa945bb67b212060c6d6a67a639fe11be08f3aea39e56f29aa9748ab1346ef250c7223591a572019655e69a578dd149f66f477b286d8e64a9bd8c791d6f5a48c8c668e48e38f59020dd139a9f2186e2253b7f15cf4e6cf02d0862ff2ba37b0581fb4bebf34e28068508791bd9aff1ffb90931b5b3d579bb20645f43cc7a4974df60e6411c147b6280f9c53daf705dcdead551d7a4a86e1361a8f808b1e38904ca5c00b2ec0dd39f5e44e780236d2ba373057cda2fc30814bf5102179076f33cc46c20c17397a81dec20010badaf5953c714174e53896e148e997c6322f1821a95971356f55d3937dad8c10fd0b969f85f4e4812995b0bd71707148df42d3696db0c2ebbbb73417eb598b7bcba6546eef41eb0d4f1a1112b2ab016c4f47f10fff84c5afc415ce9dc39c20cc91e8ba0c898ea2eb40a2915615324822d0b962316cbcf7c3f9982358333804517d233fc19b949215fda5b1cb98c9877df6d198d034590e73ee1820625207daea72afd33ad03103f2c2ec6b0aef78e14cca12ad08cb0964f9f00cb167fe98f737c9346a47fe60fb6493732b97987e2dbf47fb7c4c82228f7adf16caf3a93c744fdc635b2c513f053c5f19ef9fccf3a4430312f9cc8cf6eb00adf225774b0bf041adf4ee06a7eb033c2a2394fb995a4c25faea9fbb70603325a7478cc122085ee12e7af781373f741483970eb76d28e41ea4f8e60f2b80a89dc69e9c42c92d06e4a22d86898fa5db350b7ffbd158f321451b85082d956c2adee0e00a26c90aba7e79a7f77a2b8a2a3ad356444b1c5280d3d838557c2123bbcf27ac7efb975b6e61dfb4b663758740cd2fc3b9b28af58e7dbebc9ad1cc3ff058811ed622827f7ff1e186c2b4c0b383f8bdd3775a1cf94085fdb98f084742645d0d1a1c84704dd286b5a7274c7fbf812770c8e30bf3d750890ebee8f6d464ff444812cc3d9579b7d7a150699e903a13dc6fc5e5cdc42f5c76fa0413a33c15fdc471419a57e0449561ee0232f55d1002364e059dd78d80f02d09429c2bfcb64f14fd61d9ccfb35be172cf0c77e68d57dad703e38c2ebb198da0f570b4427073aa2d550c0f4ababa0e64587b31d4f835e4b8a072fd837e95e7ffc116152d041a1f27e8601ca935903dc10012a34aee6e1101777d1431060c0ecad91c9a0c3accf9990b6f9b1f898637def7ed7db7105a4d564d869f06c18a44db4a31e242438730c7463eb951c06715a24032b8a13a73d4f72a23188dd93dbcf39d286b2398653480e7c613af64db5d26ea7b60886ea2da50f9e6021b6b860b34017d893f977837abfa41116340838ddac4e80748b667aecea09ee55071ce7aea94a309de7aebe01e4903837d59f19cf16cd4ee3e44008b0b0dc4c79c0d1815f749b0afe0ec209f242ff6d8c7074c8b961739a8a8cf82ae2882909723b28e4f612a94d5990e8505cc43b21d1ff6ff1654d5a836c832c3399bcc4f08de85ffeb4094f4430043a840c4dbf8e7ae4382afc74da28093dd38dcc160371ab24ef8f0ec6bfccaa94d21c9857a448f35b6f51ff57a512f0d047c153209f6e56eadcb71876c58df36c19937b73f12b231d730d466b4b3cadc9ff7d7e7c703534883d5b8cdf2c30b0f64e862e2f7cc90a8388125567314cb24c63b136ae42b77d9d87119e1ac423d73c32b955517e8a078d252a3067f68b4e1b4a34a34e6966ac1bc275e78a37104ca48bcefc0bc03c70d4770ec9256bfef1416b976be55bfa453116250788a5c58636489d15cacd60ccc7a36846f6abd77abd8fe98acb260b6153d0fdd7785a6a6eef8c3c730554569eebe2f086567c37ed93b4b4c012a9f8e6014bd6eb69510dcf7270f0a4db472ce0d27db1dcb63c44a1401660c211db871c0be465344f00f624cf8ce87b3dffd06cd0d306ac0f8e2e2580127f8cc6806724a4e449515662e939f81aea96b3f18419f28bb2fc9029d2cd76ca652d72a3d9531c7be2f967dcae1cef7bf1ebf48e3ad88d9c197b9df950efa7e75ead95f0cfd96b5474bfe720e2106f0c0d41ed9804b01600f4f11ce2af94dce1182e3dbb6ef6102162eee3861aaf868e46b90729fe72b28d1c99fab5b133f3e1cb31ae3d491a04a046489bbc2e3877a4b3a5e84696f082f6f883bf3ebe5c7063fd9ca43aff27852866a86edf4fd0e2310a992eec4c3f699caeaa15f8cef5d56a69268ce3b95dbbd381a9c0871a2f9c41c699505ae1ce851b1afdb8a844e20f7b21a17127c0fdb263dd3667b12a43635a18b3c17f580780c4add6b7e99b831cea6f709447720b95b5c929454cd7cf1dd07f43b7e8625684a65986bbd9cf6c662ba4976ba47f7c69e13fcc4be459e6f80ac6b2dd012ecd9b477867d38fd5dbf07d4817ff66395fc81c9ad02b6a93f5b1b47fb641eef41b48cd43cc64fa21c258205f2de15beeff8ccd297bc69ae60bbe705c8c1f58ee8c691d67de2a2023e4af03fcc3294c5e76b00e19ebc63b66b7828a0ffabe7747cc922705ad89e87e6aac38db61e89fc43477a4851347d315ea9f29c94f1b3e327c4caf68ceaeea2d5b1b16e4490285885801df8438d136457371a46664e6b9548dd4ca9ca715cf785b8b23bdabf55a9012e4aa2293938e3e7b3aac90fc7ed1e488911aaad3e24f2be7c35cd4d3d9cce0bbd88e9c162112488b0f596d64d4fad65dee863c1f958d3a6b73c29081eda0de63926b91c2d7b9a941dd56d07fee888551fa1bcdf5f88095aa0d68cce88e641d2aa2007bb768d9a4a568e8e88607cfd30a22dec89a5e4990140831314646a913990f8"}) ioctl$SG_IO(r0, 0x127f, &(0x7f00000003c0)={0xe00, 0x0, 0x0, 0x0, @buffer={0x300, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r2 = openat(0xffffffffffffff9c, 0x0, 0x200082, 0x13b) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCSARP(r3, 0x8955, &(0x7f0000000000)={{0x2, 0x0, @local}, {0x0, @local}, 0x20, {0x2, 0x0, @remote}, 'dummy0\x00'}) fallocate(r3, 0x2, 0x6, 0x1) open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) writev(r2, &(0x7f00000000c0)=[{&(0x7f0000000200)="af", 0x1}], 0x1) ioctl$BTRFS_IOC_SET_FEATURES(r2, 0x40309439, &(0x7f0000000280)={0x1, 0x2}) openat$sr(0xffffffffffffff9c, &(0x7f0000000180), 0x40, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, 0x0) pwrite64(r2, &(0x7f00000000c0)="0cf118e467c8949b0b448381836bee73c75b7f9fab71938f3b5607a4d31e866d1ffc8a8f6a071508fb980f777aff980a61f4d9c3266db53d2d5b0adc77efdd316771f66fa0a409c37770583af209c2423315c177e92a3d2c3c9dea072aa6ac74e5ffb5fec9586f54363c745d28e09195ad7e2485b9a50a07a1edd59595752d705b7b198b0f7efa94410c16e81116b287b13148b4dcb418c20a869e51eb5f4b343c57a4d026a8066101f35493558e47c995ef9dce4504c3ef75f9", 0xba, 0x10000) r4 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000080), 0x16000, 0x0) ioctl$EXT4_IOC_GETSTATE(r4, 0x40046629, 0x0) 15:08:14 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x4) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x3ffff, 0x0, &(0x7f0000000200), 0x0, &(0x7f00000003c0)=ANY=[]) r1 = geteuid() r2 = getuid() syz_mount_image$tmpfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x7, 0x6, &(0x7f0000002480)=[{&(0x7f0000000280)="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", 0x1000, 0x2}, {&(0x7f0000001280)="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", 0x1000, 0x3546}, {&(0x7f0000002280)="64d02822d37291b9ba3d29a16bb5136848eb38a26f624eccf4e773c4e93b24ef9f312186926f253ea34dad900c1bc486475786cc0e4b818e00a88d292f8e8e8478e45804eec1", 0x46}, {&(0x7f00000001c0)="15bf8aab6d1c43382e167bdf6c5652661f447750f4798ebabacb85db014298fa098fcf5d93903cb70f54d4", 0x2b, 0x1}, {&(0x7f0000002300)="54637d671dc04ed24951de9e5e6c23b7d606581a1bb690ffa86cc8d714114295ca7bbd0d22f55d475d8250f24eb3c9f65f951ebc85c0f2131ccb30426ed6ae4b3070f98c219f3fcd7e1482a1327188f58af0fa29c14cd4f4", 0x58, 0x2}, {&(0x7f0000002380)="e7ff3eb2772988812a5c096a2b709522b4c607ff16545c1af86b2c53794f7b94db93222d60a8f9e145c9585b8af9c5918f990d7b0028608bd2ed3e2eeb051655c88d5af98bf88824ba9bd34b90481766c10387bda3d78fab019977e5af367ec22c104a0db99861589ede391d047cb10b8369fc07e8a17a67cbee33212e6acd7f6f4782e11bc973ba7b7fdf347f643d4bc0442ef66549b20e857be30e4aed25f2178ecc1f29b4fdd54753cf0a04cc2d9b03c33fb17c1a87f1fc7c387dcdcbbc5b92b0f914b149108cbd2f21225f288a33951d7bd0f3a8d3c45b0df447cc6b914b540e24b6020531383866744d2d0c", 0xee, 0x8}], 0x1000000, &(0x7f0000002540)=ANY=[@ANYBLOB='nr_inodes=,mpol=bind=relative:541131/2,huge=advise,uid<', @ANYRESDEC=r1, @ANYBLOB=',fowner<', @ANYRESDEC=r2, @ANYBLOB=',smackfsdef=ext4\x00,obj_role=ext4\x00,euid=', @ANYRESDEC, @ANYBLOB="2c7365636c6162656c2c6f626a5f747970653d232a2c6673636f6e746578743d757365725f752c73866f4752f8689f623a6075506d61636b66737f"]) mount$bind(0x0, 0x0, 0x0, 0x0, 0x0) linkat(r0, &(0x7f0000000080)='./file0\x00', r0, &(0x7f00000000c0)='./file0\x00', 0x400) [ 176.560926] tmpfs: Bad value for 'nr_blocks' [ 176.578115] tmpfs: Bad value for 'nr_blocks' 15:08:14 executing program 3: bind$bt_l2cap(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000000)={{0x2, 0x0, @local}, {0x0, @local}, 0x20, {0x2, 0x0, @local}, 'dummy0\x00'}) getsockopt$bt_hci(r0, 0x0, 0x3, &(0x7f0000000000)=""/153, &(0x7f00000000c0)=0x99) syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) 15:08:14 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@nr_blocks={'nr_blocks', 0x3d, [0x78, 0x30, 0x6d]}}, {@size={'size', 0x3d, [0x65, 0x78]}}, {@size={'size', 0x3d, [0x65, 0x30, 0xc, 0x36, 0x25, 0x2d]}}, {@gid={'gid', 0x3d, 0xee00}}, {@size={'size', 0x3d, [0x31]}}, {@huge_never}, {@mode={'mode', 0x3d, 0x1000}}], [{@func={'func', 0x3d, 'CREDS_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}) 15:08:14 executing program 1: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r0, 0x7, 0x0, 0x0, 0x0) getdents(r0, &(0x7f0000000280)=""/131, 0x83) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, 0x0) mount$bind(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180), 0x64000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x84002c, &(0x7f0000000400)=ANY=[@ANYBLOB='mode=0']) 15:08:14 executing program 4: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1c08a4, 0x0) r1 = syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) r2 = open$dir(&(0x7f0000000200)='./mnt\x00', 0x40040, 0x10) mkdirat(r2, &(0x7f0000000280)='mnt/encrypted_dir/../file0\x00', 0x20) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir/../file0\x00', 0x80, 0x3e4fcec92923ce05) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x50008, 0x0, 0x10081, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r3 = openat(r1, &(0x7f0000000000)='mnt/encrypted_dir/../file0\x00', 0x40, 0x100) r4 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r4, 0x7, 0x0, 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r4, 0xc0406619, &(0x7f00000001c0)={@desc={0x1, 0x0, @desc2}}) futimesat(r3, &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0)={{0x0, 0xea60}}) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000680)=ANY=[@ANYBLOB="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", @ANYRES32, @ANYBLOB="02000000000000006d6e742f656e637279707465645f6469722f2e2e2f66696c653000"]) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') 15:08:14 executing program 0: syz_open_procfs(0x0, &(0x7f00000000c0)='projid_map\x00') r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x5407, &(0x7f0000000080)={0x4, 0x21, 0x4, 0x6633, 0xa, "bb09819e2f6e8485"}) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/mdstat\x00', 0x0, 0x0) r1 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000040), 0x101403, 0x0) write$P9_RREADLINK(r1, 0x0, 0x0) [ 176.595403] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 176.596791] blk_update_request: I/O error, dev sr0, sector 7 op 0x1:(WRITE) flags 0x4000 phys_seg 32 prio class 0 [ 176.603560] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 176.604625] blk_update_request: I/O error, dev sr0, sector 263 op 0x1:(WRITE) flags 0x4000 phys_seg 32 prio class 0 [ 176.616464] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 176.617358] blk_update_request: I/O error, dev sr0, sector 519 op 0x1:(WRITE) flags 0x4000 phys_seg 32 prio class 0 [ 176.619770] proc: Unknown parameter 'mode' 15:08:14 executing program 6: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmsg(r0, &(0x7f00000016c0)={&(0x7f00000001c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x27}}, 0x1, 0x3, 0x3, 0x3}}, 0x80, &(0x7f0000001640)=[{&(0x7f0000000240)="ec852fddbead2d2324dbf3ac4f638f63b615f77bcd710826efc0ba6123856d8014b5e20eae059bffd362bf37338bc9e07f5472355c72ef5fceab63edc08bb3442b26f41d610a46", 0x47}, {&(0x7f0000000300)="e24da4619e5436e82e533a51f7b7b360ee881fc322cb8791c616251ec8bc27bf6162f6c1b5fc201386d159aa75015ebeffa075cb5232a3b9cee8fd87d55dfefe2f6ddb95e4404bfcbc8da5b353e690d976fcdb4756d93ba3c49db5c7a789de39a7479e0228270df9be0e24d47537618600e1ab05b79437c814db5fb2109998da9509993fefd1", 0x86}, {&(0x7f00000004c0)="4e047ee03b5e892cbb7a02be0f2b497ce441b719a63b272ce85e163b3f2550f25787d2594aceb8b92c406885c88b68d87cc7aae6317b8408d225b57b9a7b43cc670dd060769a2cb253f5b75116c6e9be4051485184ff9d43b765a46ef0ea12ba9d71104deae30d76e6305f25b5fdd341de1883a27dc2610b13c6ec0e8cbea15abd73c67241efb9a296f1d65cd1953124bf8c1561a2f8209ed7e422060ddc744a636799ad92680f12957b7b2453aad1959f1c0c170f4880f9419dce", 0xbb}, {&(0x7f0000000100)="a52fcb360c082ba73aca47916b01f3e89dec9a32ad23436162a08253c4333d830155bda1dff97b74c67db1f4", 0x2c}, {&(0x7f0000000580)="566e2381c4bcab6f2cb8ec4a8150ed5dc45340ff37db156b4293ea39ce80c9af6a819ff38adc2ccbed588cd01edcd10d1fb39278a7a4f6ac8d9337caa34cca4cee4f4f666fddb4d0f4c4fc37f5f7434baa7152c76449c7884959bd4638e8015e4d17384431e6387b3e37691f42a3ce321460307c599cd4b198a05e9f05c847f7b4968e6f6dc1aadcebb49b78a175c23d0e1e6581ff1e2306e06a83491f3c34fa11ed7e196ba1ea97", 0xa8}, {&(0x7f00000003c0)="f1fa813a12e68cacf130953b5162b282c25d52a31ac2be83f868029880f527464621455ca4a71c06f1120b6be6baac6dbacc511332c121c291d67cccb1b18a886fa92fc038dc17f126ec2965d6a34feac046768fbace4a187adc6a9b203bd6287372a9c256", 0x65}, {&(0x7f0000000640)="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", 0x1000}], 0x7}, 0x200400d4) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x101142, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x4400, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x100000001) openat(0xffffffffffffff9c, &(0x7f0000001700)='./file1\x00', 0x2, 0x0) [ 176.629123] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 176.630213] blk_update_request: I/O error, dev sr0, sector 775 op 0x1:(WRITE) flags 0x4000 phys_seg 32 prio class 0 [ 176.644821] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 176.645665] blk_update_request: I/O error, dev sr0, sector 1031 op 0x1:(WRITE) flags 0x4000 phys_seg 32 prio class 0 15:08:14 executing program 4: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1c08a4, 0x0) r1 = syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) r2 = open$dir(&(0x7f0000000200)='./mnt\x00', 0x40040, 0x10) mkdirat(r2, &(0x7f0000000280)='mnt/encrypted_dir/../file0\x00', 0x20) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir/../file0\x00', 0x80, 0x3e4fcec92923ce05) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x50008, 0x0, 0x10081, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r3 = openat(r1, &(0x7f0000000000)='mnt/encrypted_dir/../file0\x00', 0x40, 0x100) r4 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r4, 0x7, 0x0, 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r4, 0xc0406619, &(0x7f00000001c0)={@desc={0x1, 0x0, @desc2}}) futimesat(r3, &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0)={{0x0, 0xea60}}) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000680)=ANY=[@ANYBLOB="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", @ANYRES32, @ANYBLOB="02000000000000006d6e742f656e637279707465645f6469722f2e2e2f66696c653000"]) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') [ 176.659521] loop6: detected capacity change from 0 to 41948160 15:08:14 executing program 0: syz_open_procfs(0x0, &(0x7f00000000c0)='projid_map\x00') r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x5407, &(0x7f0000000080)={0x4, 0x21, 0x4, 0x6633, 0xa, "bb09819e2f6e8485"}) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/mdstat\x00', 0x0, 0x0) openat$hpet(0xffffffffffffff9c, &(0x7f0000000040), 0x101403, 0x0) [ 176.665054] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 176.665936] blk_update_request: I/O error, dev sr0, sector 1287 op 0x1:(WRITE) flags 0x4000 phys_seg 32 prio class 0 15:08:14 executing program 2: syz_open_procfs(0xffffffffffffffff, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) r0 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x10, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r0, 0x0, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x0) fchmodat(0xffffffffffffffff, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0}, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r1, 0xffffffbfffffffff, 0xffffffffffffffff, 0x8) r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r3, 0xc0189378, 0x0) copy_file_range(r3, 0x0, r2, 0x0, 0x10001, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0xee, 0x1, 0x75, 0x40, 0x0, 0x3, 0x808e, 0x2, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_config_ext={0xffffffff, 0xfe}, 0x200, 0x7a6c, 0x4e5f, 0x0, 0x40, 0x100, 0x2, 0x0, 0x1, 0x0, 0x8}, 0x0, 0x6, 0xffffffffffffffff, 0x9) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) sendfile(r2, r4, 0x0, 0x20d315) [ 176.683947] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 176.685368] blk_update_request: I/O error, dev sr0, sector 1543 op 0x1:(WRITE) flags 0x4000 phys_seg 32 prio class 0 [ 176.687859] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 176.689060] blk_update_request: I/O error, dev sr0, sector 1799 op 0x1:(WRITE) flags 0x0 phys_seg 32 prio class 0 [ 176.691408] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 176.692576] blk_update_request: I/O error, dev sr0, sector 2055 op 0x1:(WRITE) flags 0x4000 phys_seg 32 prio class 0 [ 176.697302] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 176.698058] blk_update_request: I/O error, dev sr0, sector 2311 op 0x1:(WRITE) flags 0x4000 phys_seg 32 prio class 0 15:08:14 executing program 3: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCSARP(r1, 0x8955, &(0x7f0000000000)={{0x2, 0x0, @local}, {0x0, @local}, 0x20, {0x2, 0x0, @local}, 'dummy0\x00'}) close(r1) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCSARP(r2, 0x8955, &(0x7f0000000000)={{0x2, 0x0, @local}, {0x0, @local}, 0x20, {0x2, 0x0, @local}, 'dummy0\x00'}) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(r2, 0x8983, &(0x7f0000000200)={0x6, 'team_slave_0\x00', {0x4}, 0x8}) openat(r0, &(0x7f0000000280)='./file0\x00', 0x8000, 0x0) r3 = creat(&(0x7f00000002c0)='./file0\x00', 0x0) pwritev(r0, &(0x7f0000000240)=[{&(0x7f0000000000)="689c", 0x2}], 0x1, 0x7fff, 0x0) pwrite64(r3, &(0x7f0000000140)="af", 0x1, 0xffffff) write$P9_RREADDIR(r0, &(0x7f0000000580)=ANY=[], 0x122) r4 = syz_genetlink_get_family_id$devlink(&(0x7f00000000c0), r0) sendmsg$DEVLINK_CMD_SB_PORT_POOL_SET(r3, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000180)={&(0x7f0000000300)={0xcc, r4, 0x100, 0x70bd27, 0x25dfdbff, {}, [{{@pci={{0x8}, {0x11}}, {0x8}}, {0x8, 0xb, 0x4}, {0x6, 0x11, 0x9}, {0x8, 0x15, 0x6}}, {{@pci={{0x8}, {0x11}}, {0x8, 0x3, 0x3}}, {0x8}, {0x6, 0x11, 0x7}, {0x8, 0x15, 0xfff}}, {{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x2}}, {0x8, 0xb, 0x3}, {0x6}, {0x8, 0x15, 0x1f}}]}, 0xcc}, 0x1, 0x0, 0x0, 0x24048040}, 0x4) fallocate(r0, 0x8, 0x0, 0x8000) 15:08:14 executing program 1: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r0, 0x7, 0x0, 0x0, 0x0) getdents(r0, &(0x7f0000000280)=""/131, 0x83) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, 0x0) mount$bind(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180), 0x64000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x84002c, &(0x7f0000000400)=ANY=[@ANYBLOB='mode=0']) [ 176.731010] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 176.733562] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 176.734583] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 176.735502] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 176.736337] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 176.745218] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 176.754802] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 176.755742] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 176.767865] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 176.774437] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 176.779883] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 176.780728] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 176.781679] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 176.791253] proc: Unknown parameter 'mode' 15:08:14 executing program 6: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmsg(r0, &(0x7f00000016c0)={&(0x7f00000001c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x27}}, 0x1, 0x3, 0x3, 0x3}}, 0x80, &(0x7f0000001640)=[{&(0x7f0000000240)="ec852fddbead2d2324dbf3ac4f638f63b615f77bcd710826efc0ba6123856d8014b5e20eae059bffd362bf37338bc9e07f5472355c72ef5fceab63edc08bb3442b26f41d610a46", 0x47}, {&(0x7f0000000300)="e24da4619e5436e82e533a51f7b7b360ee881fc322cb8791c616251ec8bc27bf6162f6c1b5fc201386d159aa75015ebeffa075cb5232a3b9cee8fd87d55dfefe2f6ddb95e4404bfcbc8da5b353e690d976fcdb4756d93ba3c49db5c7a789de39a7479e0228270df9be0e24d47537618600e1ab05b79437c814db5fb2109998da9509993fefd1", 0x86}, {&(0x7f00000004c0)="4e047ee03b5e892cbb7a02be0f2b497ce441b719a63b272ce85e163b3f2550f25787d2594aceb8b92c406885c88b68d87cc7aae6317b8408d225b57b9a7b43cc670dd060769a2cb253f5b75116c6e9be4051485184ff9d43b765a46ef0ea12ba9d71104deae30d76e6305f25b5fdd341de1883a27dc2610b13c6ec0e8cbea15abd73c67241efb9a296f1d65cd1953124bf8c1561a2f8209ed7e422060ddc744a636799ad92680f12957b7b2453aad1959f1c0c170f4880f9419dce", 0xbb}, {&(0x7f0000000100)="a52fcb360c082ba73aca47916b01f3e89dec9a32ad23436162a08253c4333d830155bda1dff97b74c67db1f4", 0x2c}, {&(0x7f0000000580)="566e2381c4bcab6f2cb8ec4a8150ed5dc45340ff37db156b4293ea39ce80c9af6a819ff38adc2ccbed588cd01edcd10d1fb39278a7a4f6ac8d9337caa34cca4cee4f4f666fddb4d0f4c4fc37f5f7434baa7152c76449c7884959bd4638e8015e4d17384431e6387b3e37691f42a3ce321460307c599cd4b198a05e9f05c847f7b4968e6f6dc1aadcebb49b78a175c23d0e1e6581ff1e2306e06a83491f3c34fa11ed7e196ba1ea97", 0xa8}, {&(0x7f00000003c0)="f1fa813a12e68cacf130953b5162b282c25d52a31ac2be83f868029880f527464621455ca4a71c06f1120b6be6baac6dbacc511332c121c291d67cccb1b18a886fa92fc038dc17f126ec2965d6a34feac046768fbace4a187adc6a9b203bd6287372a9c256", 0x65}, {&(0x7f0000000640)="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", 0x1000}], 0x7}, 0x200400d4) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x101142, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x4400, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x100000001) openat(0xffffffffffffff9c, &(0x7f0000001700)='./file1\x00', 0x2, 0x0) [ 176.797532] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 176.804425] sr 1:0:0:0: [sr0] tag#0 unaligned transfer 15:08:14 executing program 0: syz_open_procfs(0x0, &(0x7f00000000c0)='projid_map\x00') r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x5407, &(0x7f0000000080)={0x4, 0x21, 0x4, 0x6633, 0xa, "bb09819e2f6e8485"}) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/mdstat\x00', 0x0, 0x0) [ 176.808675] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 176.815035] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 176.820707] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 176.826257] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 176.833038] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 176.833876] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 176.843614] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 176.848938] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 176.863880] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 176.864904] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 176.878326] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 176.880581] loop6: detected capacity change from 0 to 41948160 [ 176.890926] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 176.893589] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 176.894981] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 176.896621] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 176.899373] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 176.908895] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 176.927170] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 176.939676] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 176.941259] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 176.953302] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 176.954873] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 176.966208] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 176.977092] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 176.978670] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 176.991923] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 176.996339] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 176.998673] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.006868] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.008348] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.012798] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.014534] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.016530] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.018884] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.020683] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.022846] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.025204] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.026665] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.029249] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.031304] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.032845] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.034556] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.037056] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.039226] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.041441] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.042906] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.045516] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.047226] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.048983] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.050548] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.052670] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.055138] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.057377] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.058860] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.061420] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.063217] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.064867] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.066541] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.068889] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.071081] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.073325] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.074742] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.077280] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.078957] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.080592] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.082367] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.084905] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.088007] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.090510] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.091900] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.093716] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.097615] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.099888] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.102512] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.109003] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.111898] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.113545] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.115006] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.117243] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.119339] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.121086] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.122635] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.124258] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.125820] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.127338] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.128737] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.131502] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.133262] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.134875] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.136710] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.138890] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.140889] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.142610] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.143943] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.145883] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.147522] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.149679] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.151613] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.153307] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.154911] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.156460] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.158078] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.159583] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.161602] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.163620] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.165594] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.167108] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.168703] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.171238] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.172532] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.174394] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.176016] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.177631] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.179221] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.180811] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.182331] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.184374] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.185977] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.187863] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.189646] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.191305] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.192728] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.194530] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.196898] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.198662] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.200039] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.201758] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.203496] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.205276] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.212010] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.213971] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.216054] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.217844] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.219416] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.220846] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.222231] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.223681] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.225365] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.230588] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.232650] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.234278] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.235598] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.237856] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.248457] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.249796] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.251124] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.252456] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.253803] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.258774] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.260098] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.261540] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.263763] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.265119] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.266510] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.267847] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.269234] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.270549] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.271885] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.273391] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.274903] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.276280] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.277754] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.279086] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.280421] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.281766] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.283089] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.284537] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.285910] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.287282] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.288613] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.289946] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.291302] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.292615] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.293940] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.295402] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.296742] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.298089] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.299427] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.300754] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.302089] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.303450] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.304762] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.306251] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.307587] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.313619] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.315088] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.316427] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.317765] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.319107] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.320413] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.321876] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.323268] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.325813] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.327171] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.328773] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.330112] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.331436] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.332782] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.334334] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.335711] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.337045] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.338386] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.339726] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.341064] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.342383] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.343691] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.345186] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.346542] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.347872] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.349249] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.350578] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.351924] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.353318] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.354637] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.356099] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.357459] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.358805] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.360171] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.361506] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.362826] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.364192] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.365499] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.366960] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.368335] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.369672] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.370999] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.372331] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.373683] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.375012] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.376324] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.403927] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.405453] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.406724] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.408627] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.427025] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.443793] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.460941] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.463227] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.464573] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.465524] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.466212] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.467028] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.468412] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.469746] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.471120] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.471960] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.473299] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.474620] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.475524] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.476267] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.476980] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.477708] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.478529] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.479834] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.481475] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.482878] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.484497] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.485846] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.487035] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.487892] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.489310] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.489991] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.490959] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.491652] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.492339] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.493004] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.493697] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.494387] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.495057] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.495751] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.496450] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.497098] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.497796] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.498470] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.499094] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.499752] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.500449] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.501080] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.501736] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.502425] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.503049] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.503718] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.504383] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.505010] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.505677] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.506356] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.506979] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.507669] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.508329] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.508967] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.509620] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.510285] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.510915] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.511610] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.512270] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.512904] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.514588] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.515286] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.516092] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.516929] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.517689] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.518381] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.519122] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.520270] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.521177] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.521881] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.522746] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.523569] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.524295] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.525098] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.525803] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.526586] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.527292] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.528117] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.529653] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.530397] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.531116] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.531819] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.532577] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.533249] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.533872] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.534578] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.535280] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.535938] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.536641] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.537343] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.538017] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.538716] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.539423] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.540088] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.540791] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.541488] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.542175] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.542842] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.543573] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.544280] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.544948] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.545666] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.546368] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.547031] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.547730] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.548428] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.549118] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.549822] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.550517] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.551202] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.551869] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.552566] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.553252] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.553919] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.554604] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.555275] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.555942] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.556622] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.557385] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.559638] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.560347] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.561582] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.562379] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.563054] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.563839] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.564550] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.565253] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.565927] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.566628] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.567333] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.567992] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.568681] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.569380] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.570039] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.570736] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.571443] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.572100] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.572808] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.573519] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.574225] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.574899] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.575622] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.576321] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.576993] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.577684] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.578374] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.579035] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.579725] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.580383] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.581044] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.581722] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.582414] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.583049] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.583757] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.584451] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.585121] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.585819] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.586523] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.587442] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.588102] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.588793] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.589491] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.590188] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.590862] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.591544] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.592238] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.592901] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.593594] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.594277] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.595052] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.596698] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.598038] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.599399] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.600367] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.601110] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.601854] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.602591] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.603301] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.603977] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.604785] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.605497] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.606372] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.608002] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.609362] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.610734] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.613028] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.614302] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.617514] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.619105] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.620373] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.621650] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.622918] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.624195] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.625451] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.626204] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.626908] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.627710] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.628512] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.630334] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.631043] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.631803] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.632511] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.633386] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.635059] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.636340] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.637611] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.638869] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.640170] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.641419] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.642679] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.643930] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.645271] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.646519] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.647779] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.649039] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.650303] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.651569] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.652831] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.654083] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.655342] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.656609] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.657876] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.659169] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.660415] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.661674] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.662936] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.664232] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.665485] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.666729] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.667984] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.669263] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.670507] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.671757] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.673039] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.674290] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.675553] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.676813] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.678078] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.679332] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.680578] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.681863] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.683111] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.684345] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.685589] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.686837] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.688095] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.689367] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.690619] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.691874] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.693176] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.694419] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.695660] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.696978] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.698269] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.699493] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.715813] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.717125] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.720511] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.721320] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.721995] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.722696] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.723394] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.724052] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.724758] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.725454] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.726132] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.726884] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.727587] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.728271] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.728931] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.729619] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.730296] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.730945] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.731617] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.732382] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.733068] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.733752] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.734437] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.735122] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.735816] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.736528] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.737212] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.737925] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.739691] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.740587] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.741335] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.741991] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.742809] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.743606] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.744357] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.745243] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.745952] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.746826] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.747679] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.748520] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.749325] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.750013] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.750751] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.751607] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.752952] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.753765] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.754556] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.755400] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.756098] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.756968] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.757714] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.758558] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.759367] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.760060] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.760900] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.761690] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.762521] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.763321] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.764008] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.764938] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.765798] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.766597] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.767445] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.768175] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.768953] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.769776] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.770500] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.771409] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.772112] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.772956] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.773783] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.774585] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.775339] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.776032] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.776794] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.777653] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.778462] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.779235] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.780006] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.780806] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.781663] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.782529] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.783285] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.784104] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.784921] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.785737] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.786535] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.787363] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.788062] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.788868] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.789608] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.790462] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.791209] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.791980] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.792816] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.793648] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.794442] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.795100] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.795820] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.796673] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.797488] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.798301] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.799004] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.799806] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.800636] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.801401] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.802051] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.802967] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.803782] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.804544] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.805391] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.806077] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.806866] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.807639] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.808369] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.809194] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.809876] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.810594] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.811312] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.811974] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.812666] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.813473] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.814174] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.814995] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.815833] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.816675] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.817470] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.818124] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.818862] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.819603] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.820673] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.821421] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.822131] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.822813] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.823502] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.824174] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.824833] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.825538] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.826209] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.826932] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.827631] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.828317] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.829021] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.829742] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.830466] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.831185] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.831870] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.832616] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.833330] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.833982] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.834683] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.835378] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.836067] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.836794] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.837520] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.838296] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.839006] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.839737] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.840470] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.841209] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.841903] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.842680] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.843401] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.844181] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.844899] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.845626] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.846324] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.847019] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.847745] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.848467] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.849184] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.849936] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.850678] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.851418] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.852104] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.852828] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.853582] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.854296] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.854977] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.855761] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.856494] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.857220] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.857916] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.859223] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.859917] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.861012] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.861725] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.862494] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.863227] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.863932] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.864660] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.865389] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.866082] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.866808] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.867523] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.868298] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.869007] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.869728] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.870424] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.871114] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.871839] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.872572] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.873294] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.874045] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.874787] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.875504] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.876227] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.876934] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.877660] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.878387] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.879045] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.879791] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.880528] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.881256] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.881961] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.882690] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.883422] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.884115] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.884834] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.885620] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.886358] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.887055] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.887777] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.888506] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.889233] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.889928] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.890616] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.891395] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.892104] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.892832] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.893560] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.894288] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.894986] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.895708] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.896415] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.897178] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.897861] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.898571] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.899260] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.899925] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.900629] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.901349] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.901996] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.902763] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.903503] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.904225] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.904904] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.905632] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.906340] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.907023] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.907734] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 177.908452] sr 1:0:0:0: [sr0] tag#0 unaligned transfer 15:08:27 executing program 0: syz_open_procfs(0x0, &(0x7f00000000c0)='projid_map\x00') r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x5407, &(0x7f0000000080)={0x4, 0x21, 0x4, 0x6633, 0xa, "bb09819e2f6e8485"}) 15:08:27 executing program 3: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCSARP(r1, 0x8955, &(0x7f0000000000)={{0x2, 0x0, @local}, {0x0, @local}, 0x20, {0x2, 0x0, @local}, 'dummy0\x00'}) close(r1) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCSARP(r2, 0x8955, &(0x7f0000000000)={{0x2, 0x0, @local}, {0x0, @local}, 0x20, {0x2, 0x0, @local}, 'dummy0\x00'}) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(r2, 0x8983, &(0x7f0000000200)={0x6, 'team_slave_0\x00', {0x4}, 0x8}) openat(r0, &(0x7f0000000280)='./file0\x00', 0x8000, 0x0) r3 = creat(&(0x7f00000002c0)='./file0\x00', 0x0) pwritev(r0, &(0x7f0000000240)=[{&(0x7f0000000000)="689c", 0x2}], 0x1, 0x7fff, 0x0) pwrite64(r3, &(0x7f0000000140)="af", 0x1, 0xffffff) write$P9_RREADDIR(r0, &(0x7f0000000580)=ANY=[], 0x122) r4 = syz_genetlink_get_family_id$devlink(&(0x7f00000000c0), r0) sendmsg$DEVLINK_CMD_SB_PORT_POOL_SET(r3, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000180)={&(0x7f0000000300)={0xcc, r4, 0x100, 0x70bd27, 0x25dfdbff, {}, [{{@pci={{0x8}, {0x11}}, {0x8}}, {0x8, 0xb, 0x4}, {0x6, 0x11, 0x9}, {0x8, 0x15, 0x6}}, {{@pci={{0x8}, {0x11}}, {0x8, 0x3, 0x3}}, {0x8}, {0x6, 0x11, 0x7}, {0x8, 0x15, 0xfff}}, {{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x2}}, {0x8, 0xb, 0x3}, {0x6}, {0x8, 0x15, 0x1f}}]}, 0xcc}, 0x1, 0x0, 0x0, 0x24048040}, 0x4) fallocate(r0, 0x8, 0x0, 0x8000) 15:08:27 executing program 4: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1c08a4, 0x0) r1 = syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) r2 = open$dir(&(0x7f0000000200)='./mnt\x00', 0x40040, 0x10) mkdirat(r2, &(0x7f0000000280)='mnt/encrypted_dir/../file0\x00', 0x20) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir/../file0\x00', 0x80, 0x3e4fcec92923ce05) r3 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x50008, 0x0, 0x10081, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r4 = openat(r1, &(0x7f0000000000)='mnt/encrypted_dir/../file0\x00', 0x40, 0x100) r5 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r5, 0x7, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, &(0x7f0000000140)=',,\\\x00') futimesat(r4, &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0)={{0x0, 0xea60}}) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000680)=ANY=[@ANYBLOB="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", @ANYRES32, @ANYBLOB="02000000000000006d6e742f656e637279707465645f6469722f2e2e2f66696c653000"]) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') 15:08:27 executing program 1: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r0, 0x7, 0x0, 0x0, 0x0) getdents(r0, &(0x7f0000000280)=""/131, 0x83) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, 0x0) mount$bind(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180), 0x64000, 0x0) 15:08:27 executing program 5: ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xee00, 0xee00}}, './file0\x00'}) syz_genetlink_get_family_id$ethtool(0xfffffffffffffffe, r0) 15:08:27 executing program 7: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_SETSEL(r0, 0x4b4b, 0x0) r1 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x400, 0x0) ioctl$TCSBRKP(r1, 0x5425, 0x994a) 15:08:27 executing program 2: r0 = add_key$keyring(&(0x7f00000002c0), 0x0, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) request_key(&(0x7f0000000140)='trusted\x00', &(0x7f0000000240)={'syz', 0x0}, &(0x7f0000000280)='fscrypt:', r0) keyctl$link(0x8, 0x0, 0xffffffffffffffff) add_key$fscrypt_v1(&(0x7f00000000c0), &(0x7f0000000100)={'fscrypt:', @auto=[0x37, 0x64, 0x39, 0x38, 0x62, 0x35, 0x63, 0x34, 0x39, 0x31, 0x33, 0x38, 0x33, 0x65, 0x65, 0x33]}, &(0x7f00000001c0)={0x0, "de19d56d267992a11306310ec72036525680297dd1b417d191c65f41ad4c4e3cf22e46d52a91c4686009f624a2c30b8e2a630e39c9847c154d698829596ef6e9", 0x1a}, 0x48, 0x0) add_key$fscrypt_v1(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) keyctl$chown(0x4, r1, 0x0, 0xee00) r2 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x9}, 0x0, 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x42) ioctl$FS_IOC_FSSETXATTR(r2, 0x401c5820, &(0x7f0000000080)={0x8000, 0x10000, 0x0, 0x3cc2, 0xffffffff}) 15:08:27 executing program 6: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000000)) r0 = socket$packet(0x11, 0x3, 0x300) accept4$packet(r0, 0x0, 0x0, 0x0) 15:08:27 executing program 0: syz_open_procfs(0x0, &(0x7f00000000c0)='projid_map\x00') ioctl$TCSETAW(0xffffffffffffffff, 0x5407, &(0x7f0000000080)={0x4, 0x21, 0x4, 0x6633, 0xa, "bb09819e2f6e8485"}) 15:08:27 executing program 5: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x1, 0x0) semop(r0, &(0x7f0000000140)=[{}], 0x1f4) semtimedop(r0, &(0x7f0000000000)=[{0x3, 0x8, 0x1800}, {0x4, 0xfff7, 0x1000}, {0x3, 0x1, 0x1800}, {0x1, 0x81, 0x800}, {0x2, 0x400, 0x1800}, {0x2, 0x5, 0x800}], 0x6, &(0x7f0000000040)) r1 = semget(0x0, 0x1, 0x80) semop(r1, &(0x7f0000000080)=[{0x0, 0x10, 0x1000}, {0x1, 0xfffc, 0x800}, {0x0, 0x9, 0x800}, {0x2, 0xdb, 0x800}, {0x3, 0x2, 0x1000}], 0x5) 15:08:27 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCSARP(r1, 0x8955, &(0x7f0000000000)={{0x2, 0x0, @local}, {0x0, @local}, 0x20, {0x2, 0x0, @local}, 'dummy0\x00'}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCSARP(r2, 0x8955, &(0x7f0000000000)={{0x2, 0x0, @local}, {0x0, @local}, 0x20, {0x2, 0x0, @local}, 'dummy0\x00'}) ioctl$sock_inet_SIOCSARP(r2, 0x8955, &(0x7f0000000180)={{0x2, 0x4e21, @local}, {0x1, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x42}}, 0x54, {0x2, 0x4e23, @empty}, 'veth1_to_bond\x00'}) sendfile(r1, 0xffffffffffffffff, 0x0, 0x2) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCSARP(r3, 0x8955, &(0x7f0000000000)={{0x2, 0x0, @local}, {0x0, @local}, 0x20, {0x2, 0x0, @local}, 'veth0_to_bond\x00'}) sendfile(r3, r0, &(0x7f0000000140)=0x9, 0x1000) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000200)="af", 0x1}], 0x1) ftruncate(r0, 0x9) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r4, 0x40305829, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x77}) 15:08:27 executing program 4: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1c08a4, 0x0) r1 = syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) r2 = open$dir(&(0x7f0000000200)='./mnt\x00', 0x40040, 0x10) mkdirat(r2, &(0x7f0000000280)='mnt/encrypted_dir/../file0\x00', 0x20) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir/../file0\x00', 0x80, 0x3e4fcec92923ce05) r3 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x50008, 0x0, 0x10081, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r4 = openat(r1, &(0x7f0000000000)='mnt/encrypted_dir/../file0\x00', 0x40, 0x100) r5 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r5, 0x7, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, &(0x7f0000000140)=',,\\\x00') futimesat(r4, &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0)={{0x0, 0xea60}}) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000680)=ANY=[@ANYBLOB="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", @ANYRES32, @ANYBLOB="02000000000000006d6e742f656e637279707465645f6469722f2e2e2f66696c653000"]) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') 15:08:27 executing program 1: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r0, 0x7, 0x0, 0x0, 0x0) getdents(r0, &(0x7f0000000280)=""/131, 0x83) mount$bind(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180), 0x64000, 0x0) 15:08:27 executing program 2: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1c08a4, 0x0) r1 = syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) r2 = open$dir(&(0x7f0000000200)='./mnt\x00', 0x40040, 0x10) mkdirat(r2, &(0x7f0000000280)='mnt/encrypted_dir/../file0\x00', 0x20) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir/../file0\x00', 0x80, 0x3e4fcec92923ce05) r3 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x50008, 0x0, 0x10081, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r4 = openat(r1, &(0x7f0000000000)='mnt/encrypted_dir/../file0\x00', 0x40, 0x100) r5 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r5, 0x7, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, &(0x7f0000000140)=',,\\\x00') futimesat(r4, &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0)={{0x0, 0xea60}}) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000680)=ANY=[@ANYBLOB="b00900000000000018000000468a29458f2709d329f6d3f3917408961482081d984538af2f9bcf61c448afbaa0be3f00000000000000ca4aa56fc413a417324e8530165c3515981e2d28f7fce9ae3c6bb8fa04ff6411132c9ced479abaeea325c2205ea95984d3d7f98eea1cca02dfeb0b2471b497fbb71b60180d35e2a3394ba6d965f41c7b7bc29d4e3ca95bd7ad074a4242ec98a69ad9d1546ce18cbbd98d2e50688e958a0fcd16876ab83cdb94eeb03e42203f267a1bf6ccb1c07ad92e6e493149da32f754251ae74d30cd4b50eefd6a208172ed8693b320eda714bdd152b484d9c939b4bb777dddd947843d73529f5ffe589777254cb10f733351e0739a3a61c3b8f977517ee7becda66da23a93e3be8ed63bda262951b32f72c1c48ee63be474eafaa255074efaa494b950f48b119c76c70b833e4d7443b691dc97bf78bcae908758ff1edaf2ad48dd67d0337c8ecfcd47e8ce5598c435f4645d719ae60a12c5b37ed2d45571c29ff6af1292ed2ff7fa24e2ab69f18db826044f35683810d2ee95f68f586a8922acdc225912820cdffe6ac29641f3c531a0eb1ddbf17341a05f3ee437f2a56a4a92af8ba2e413d00d05caab40963868dc00da000dfe8962927be81ca05afcc624225b2667a1208dd74e8bb6ced5e1da98f41bb3dedc31302fbf6ed40e9c526f82b53ce45e25e20ce9068bba911f0ec11403a35ff01cee623f71101155fcb646937ac714ac49741b4a1ffc6a72cba387bf41c1af2eeaa80a07631a22d366562924848da0f27c", @ANYRES32, @ANYBLOB="02000000000000006d6e742f656e637279707465645f6469722f2e2e2f66696c653000"]) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') 15:08:27 executing program 0: syz_open_procfs(0x0, &(0x7f00000000c0)='projid_map\x00') ioctl$TCSETAW(0xffffffffffffffff, 0x5407, &(0x7f0000000080)={0x4, 0x21, 0x4, 0x6633, 0xa, "bb09819e2f6e8485"}) 15:08:27 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='smaps\x00') r1 = perf_event_open(&(0x7f0000000000)={0x5, 0x80, 0x8, 0xf5, 0xd4, 0x36, 0x0, 0x10000, 0x2090, 0x4, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x9, 0x2, @perf_config_ext={0x1}, 0x10001, 0x6, 0x6, 0x6, 0xff, 0xd7, 0x8000, 0x0, 0xd5, 0x0, 0x400}, 0x0, 0x3, r0, 0x8) ioctl$BTRFS_IOC_RM_DEV_V2(r0, 0x5000943a, &(0x7f00000000c0)={{r1}, 0x0, 0x2, @unused=[0x4, 0x0, 0x8, 0x4], @name="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"}) pread64(r0, &(0x7f0000001100)=""/4095, 0x20001be3, 0xf7c) 15:08:27 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCSARP(r1, 0x8955, &(0x7f0000000000)={{0x2, 0x0, @local}, {0x0, @local}, 0x20, {0x2, 0x0, @local}, 'dummy0\x00'}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCSARP(r2, 0x8955, &(0x7f0000000000)={{0x2, 0x0, @local}, {0x0, @local}, 0x20, {0x2, 0x0, @local}, 'dummy0\x00'}) ioctl$sock_inet_SIOCSARP(r2, 0x8955, &(0x7f0000000180)={{0x2, 0x4e21, @local}, {0x1, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x42}}, 0x54, {0x2, 0x4e23, @empty}, 'veth1_to_bond\x00'}) sendfile(r1, 0xffffffffffffffff, 0x0, 0x2) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCSARP(r3, 0x8955, &(0x7f0000000000)={{0x2, 0x0, @local}, {0x0, @local}, 0x20, {0x2, 0x0, @local}, 'veth0_to_bond\x00'}) sendfile(r3, r0, &(0x7f0000000140)=0x9, 0x1000) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000200)="af", 0x1}], 0x1) ftruncate(r0, 0x9) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r4, 0x40305829, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x77}) [ 199.932275] Bluetooth: hci0: command 0x0406 tx timeout [ 199.933784] Bluetooth: hci1: command 0x0406 tx timeout [ 199.941237] Bluetooth: hci2: command 0x0406 tx timeout [ 199.942669] Bluetooth: hci3: command 0x0406 tx timeout [ 199.949066] Bluetooth: hci4: command 0x0406 tx timeout [ 199.950589] Bluetooth: hci6: command 0x0406 tx timeout [ 199.953251] Bluetooth: hci5: command 0x0406 tx timeout [ 199.954625] Bluetooth: hci7: command 0x0406 tx timeout 15:08:42 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x200002, 0x0) ioctl$SIOCGIFHWADDR(r0, 0x8927, &(0x7f00000000c0)={'veth0_to_team\x00'}) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x400, 0x0) fchownat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0xee01, 0x0) 15:08:42 executing program 1: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r0, 0x7, 0x0, 0x0, 0x0) getdents(r0, &(0x7f0000000280)=""/131, 0x83) mount$bind(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180), 0x64000, 0x0) 15:08:42 executing program 7: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_SETSEL(r0, 0x4b4b, 0x0) ioctl$TCSBRKP(0xffffffffffffffff, 0x5425, 0x994a) 15:08:42 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCSARP(r1, 0x8955, &(0x7f0000000000)={{0x2, 0x0, @local}, {0x0, @local}, 0x20, {0x2, 0x0, @local}, 'dummy0\x00'}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCSARP(r2, 0x8955, &(0x7f0000000000)={{0x2, 0x0, @local}, {0x0, @local}, 0x20, {0x2, 0x0, @local}, 'dummy0\x00'}) ioctl$sock_inet_SIOCSARP(r2, 0x8955, &(0x7f0000000180)={{0x2, 0x4e21, @local}, {0x1, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x42}}, 0x54, {0x2, 0x4e23, @empty}, 'veth1_to_bond\x00'}) sendfile(r1, 0xffffffffffffffff, 0x0, 0x2) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCSARP(r3, 0x8955, &(0x7f0000000000)={{0x2, 0x0, @local}, {0x0, @local}, 0x20, {0x2, 0x0, @local}, 'veth0_to_bond\x00'}) sendfile(r3, r0, &(0x7f0000000140)=0x9, 0x1000) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000200)="af", 0x1}], 0x1) ftruncate(r0, 0x9) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r4, 0x40305829, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x77}) 15:08:42 executing program 5: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x3, 0xff) r1 = fcntl$getown(r0, 0x9) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCSARP(r2, 0x8955, &(0x7f0000000000)={{0x2, 0x0, @local}, {0x0, @local}, 0x20, {0x2, 0x0, @local}, 'dummy0\x00'}) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000000)={'wlan1\x00', 0x0}) setsockopt$packet_add_memb(r3, 0x107, 0x1, &(0x7f0000000080)={r4, 0x3, 0x6, @multicast}, 0x10) sendmmsg$inet(r2, &(0x7f0000000840)=[{{&(0x7f0000000080)={0x2, 0x4e20, @private=0xa010100}, 0x10, &(0x7f00000002c0)=[{&(0x7f00000000c0)="4535f1981de2257b4f0ff0892512a7b6f69bbfd961b3fec3e8941ea3596518db7098b7e5e0b6fccbc053f4af6cb147d65104d348324b8295c56df354a401cbecb02a7e05c86fa05525cb05907f", 0x4d}, {&(0x7f0000000180)="27795fec09", 0x5}, {&(0x7f00000001c0)="331f031d2a6c26741684d5dd6edc37a806a656502acb30286cb345b8229e74f375c0fe90be9a477d69febacadcb2ab50198d5e8cb4e4990c828bcd717d32b1d113a75fd9a7958b0d86bc287953043da17594624558cc15006f0d5a3b03aacd0b7952e96fe8d9d49ddcb964ca876971c0a70a43c0d54f48442e17433ce90913ea9e2627a9dda71a984917d5884caa4695d6e4", 0x92}, {&(0x7f0000000280)="996956b3d8ba4f911b", 0x9}], 0x4, &(0x7f00000004c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @private=0xa010101, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, @ip_ttl={{0x14, 0x0, 0x2, 0x550a}}, @ip_ttl={{0x14, 0x0, 0x2, 0x3}}, @ip_retopts={{0x48, 0x0, 0x7, {[@ssrr={0x89, 0x7, 0xa8, [@loopback]}, @timestamp_addr={0x44, 0x1c, 0x77, 0x1, 0x2, [{@multicast2, 0x7}, {@remote, 0x100}, {@rand_addr=0x64010100, 0x4}]}, @generic={0x0, 0x7, "0095bc6abb"}, @timestamp_addr={0x44, 0xc, 0xad, 0x1, 0x0, [{@private=0xa010101}]}]}}}, @ip_ttl={{0x14, 0x0, 0x2, 0xff}}, @ip_retopts={{0x7c, 0x0, 0x7, {[@noop, @end, @end, @lsrr={0x83, 0x2b, 0x98, [@dev={0xac, 0x14, 0x14, 0x16}, @broadcast, @broadcast, @multicast2, @remote, @loopback, @dev={0xac, 0x14, 0x14, 0x25}, @empty, @multicast1, @local]}, @ssrr={0x89, 0x1b, 0x7f, [@dev={0xac, 0x14, 0x14, 0x31}, @multicast2, @private=0xa010102, @private=0xa010102, @broadcast, @remote]}, @timestamp_prespec={0x44, 0x14, 0x34, 0x3, 0x5, [{@broadcast, 0x1}, {@loopback, 0x7}]}, @noop, @timestamp={0x44, 0xc, 0xe9, 0x0, 0xb, [0x9740, 0xca]}, @end]}}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x41}}], 0x148}}, {{&(0x7f0000000300)={0x2, 0x4e23, @remote}, 0x10, &(0x7f0000000380)=[{&(0x7f0000000640)="bdd761144ea31e4ea4608d5f553d4ee08c924065d0b9285ab7068733f703de4a20c477c9f737a9fb8fd40133759603d4aa3062d16a1cb1049233bf8fbcbe3be81674562b53b97e90c9049f47ce0ebf56deccf7efec7d1d6e42e9fccc54be58d4221f21fb18ef80a0974473a9a19014549f06925d0d39ac73bda37bc292ed9c7f9b7b010064993a3f835450387b1d6e51da8f53124dbcc9bf2351781b0edd8eccc1d1619e9a97037ff999414653dd9497d0cf3cabc95a4cb72ec6fffe36084d5859044d47fdc1acff2106fadd5f9fdbe12b4d3235294dd51ef2577179ca", 0xdd}, {&(0x7f0000000740)="ab52c23dcc35fe7bcc2ba5434c53cedb7f21b9f7c5d6e7418405ca9c8d927beabdd4af3a99eb8c024c07d7f5d809d9ef27d10ca959587e760c29406a47a38d8493771f92f4cc7f8e260036ea34689bef7015e24d613ce0bd210c49445168ebb16889ce308b7862d9fe338473dad5d4b30b93eb46fef9d074effabf2347b52403b3c3d4ccbc3c37193f1e8514e341c4d00cbf3f7943f6dbb3391210d4b0bb765ae8e065244dc3a3b5fd61e4cd519f229e552977f359dd99cffbed0f2a34abb44ecb2d0e7b9b7abd54e2128ec5cee121ffe1a730aa9be2", 0xd6}, {&(0x7f0000000340)="f09ed9ed8252547f7bff7f911c6c49e9337a61", 0x13}], 0x3, &(0x7f00000003c0)=[@ip_tos_u8={{0x11, 0x0, 0x1, 0x7}}], 0x18}}], 0x2, 0x81) syz_open_procfs(r1, &(0x7f0000000040)='auxv\x00') r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000140)={'syz_tun\x00'}) sendmmsg$inet(r0, &(0x7f0000000bc0)=[{{&(0x7f0000000400)={0x2, 0x4e24, @remote}, 0x4d, &(0x7f0000000a80), 0x0, &(0x7f0000000000)=[@ip_tos_u8={{0x11, 0x0, 0x1, 0xdf}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x8}}], 0x30}}], 0x1, 0x0) 15:08:42 executing program 0: syz_open_procfs(0x0, &(0x7f00000000c0)='projid_map\x00') ioctl$TCSETAW(0xffffffffffffffff, 0x5407, &(0x7f0000000080)={0x4, 0x21, 0x4, 0x6633, 0xa, "bb09819e2f6e8485"}) 15:08:42 executing program 2: r0 = syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r1, 0x7, 0x0, 0x0, 0x0) statx(r0, &(0x7f00000001c0)='./file1\x00', 0x800, 0xb0f, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fchownat(r1, &(0x7f0000000080)='./file0/file0\x00', 0xee00, r2, 0x800) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x0) openat(r0, &(0x7f0000000000)='./file0/file0\x00', 0x141000, 0x190) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(0xffffffffffffffff, 0x40605346, &(0x7f0000000240)) fspick(0xffffffffffffffff, &(0x7f0000000140)='./file0/file0\x00', 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) creat(&(0x7f0000000180)='./file1\x00', 0x40) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000001000)={0x14, 0x2c, 0xcd2781b960712dff}, 0x14}}, 0x0) ioctl$FICLONE(r3, 0x40049409, 0xffffffffffffffff) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) getresgid(&(0x7f00000010c0), &(0x7f0000001100), &(0x7f0000001140)) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000700)={'trans=fd,', {'rfdno', 0x3d, r4}, 0x2c, {'wfdno', 0x3d, r5}, 0x2c, {[{@cache_mmap}, {@cache_fscache}, {@debug={'debug', 0x3d, 0x924}}, {@nodevmap}, {@noextend}, {@dfltgid}, {@afid={'afid', 0x3d, 0x345}}], [{@smackfstransmute={'smackfstransmute', 0x3d, 'nodevmap'}}, {@fowner_gt}, {@hash}, {@fowner_eq}, {@fsname={'fsname', 0x3d, '.'}}, {@fowner_gt}]}}) 15:08:42 executing program 4: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1c08a4, 0x0) r1 = syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) r2 = open$dir(&(0x7f0000000200)='./mnt\x00', 0x40040, 0x10) mkdirat(r2, &(0x7f0000000280)='mnt/encrypted_dir/../file0\x00', 0x20) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir/../file0\x00', 0x80, 0x3e4fcec92923ce05) r3 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x50008, 0x0, 0x10081, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r4 = openat(r1, &(0x7f0000000000)='mnt/encrypted_dir/../file0\x00', 0x40, 0x100) r5 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r5, 0x7, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, &(0x7f0000000140)=',,\\\x00') futimesat(r4, &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0)={{0x0, 0xea60}}) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000680)=ANY=[@ANYBLOB="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", @ANYRES32, @ANYBLOB="02000000000000006d6e742f656e637279707465645f6469722f2e2e2f66696c653000"]) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') [ 204.729092] device wlan1 entered promiscuous mode [ 204.756725] device wlan1 left promiscuous mode 15:08:42 executing program 7: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_SETSEL(r0, 0x4b4b, 0x0) ioctl$TCSBRKP(0xffffffffffffffff, 0x5425, 0x994a) 15:08:42 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) recvmsg$unix(r0, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x40010063) syz_genetlink_get_family_id$SEG6(&(0x7f0000001680), 0xffffffffffffffff) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) 15:08:42 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x5407, &(0x7f0000000080)={0x4, 0x21, 0x4, 0x6633, 0xa, "bb09819e2f6e8485"}) 15:08:42 executing program 1: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r0, 0x7, 0x0, 0x0, 0x0) getdents(r0, &(0x7f0000000280)=""/131, 0x83) mount$bind(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180), 0x64000, 0x0) 15:08:42 executing program 4: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1c08a4, 0x0) r1 = syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) r2 = open$dir(&(0x7f0000000200)='./mnt\x00', 0x40040, 0x10) mkdirat(r2, &(0x7f0000000280)='mnt/encrypted_dir/../file0\x00', 0x20) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir/../file0\x00', 0x80, 0x3e4fcec92923ce05) r3 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x50008, 0x0, 0x10081, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r4 = openat(r1, &(0x7f0000000000)='mnt/encrypted_dir/../file0\x00', 0x40, 0x100) r5 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r5, 0xc0406619, &(0x7f00000001c0)={@desc={0x1, 0x0, @desc2}}) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, &(0x7f0000000140)=',,\\\x00') futimesat(r4, &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0)={{0x0, 0xea60}}) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000680)=ANY=[@ANYBLOB="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", @ANYRES32, @ANYBLOB="02000000000000006d6e742f656e637279707465645f6469722f2e2e2f66696c653000"]) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') 15:08:42 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCSARP(r1, 0x8955, &(0x7f0000000000)={{0x2, 0x0, @local}, {0x0, @local}, 0x20, {0x2, 0x0, @local}, 'dummy0\x00'}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCSARP(r2, 0x8955, &(0x7f0000000000)={{0x2, 0x0, @local}, {0x0, @local}, 0x20, {0x2, 0x0, @local}, 'dummy0\x00'}) ioctl$sock_inet_SIOCSARP(r2, 0x8955, &(0x7f0000000180)={{0x2, 0x4e21, @local}, {0x1, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x42}}, 0x54, {0x2, 0x4e23, @empty}, 'veth1_to_bond\x00'}) sendfile(r1, 0xffffffffffffffff, 0x0, 0x2) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCSARP(r3, 0x8955, &(0x7f0000000000)={{0x2, 0x0, @local}, {0x0, @local}, 0x20, {0x2, 0x0, @local}, 'veth0_to_bond\x00'}) sendfile(r3, r0, &(0x7f0000000140)=0x9, 0x1000) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000200)="af", 0x1}], 0x1) ftruncate(r0, 0x9) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r4, 0x40305829, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x77}) 15:08:42 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000900)=ANY=[]) 15:08:42 executing program 7: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_SETSEL(r0, 0x4b4b, 0x0) ioctl$TCSBRKP(0xffffffffffffffff, 0x5425, 0x994a) 15:08:55 executing program 7: syz_open_dev$tty1(0xc, 0x4, 0x1) r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x400, 0x0) ioctl$TCSBRKP(r0, 0x5425, 0x994a) 15:08:55 executing program 5: socket$inet6_tcp(0xa, 0x1, 0x0) r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r0, 0x7, 0x0, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback={0x0, 0x2}}, 0x1c) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCSARP(r1, 0x8955, &(0x7f0000000000)={{0x2, 0x0, @local}, {0x0, @local}, 0x20, {0x2, 0x0, @local}, 'dummy0\x00'}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f00000004c0)={'tunl0\x00', &(0x7f0000000440)={'syztnl1\x00', 0x0, 0x1, 0x40, 0x9, 0xa739, {{0x9, 0x4, 0x1, 0x39, 0x24, 0x67, 0x0, 0x2, 0x2f, 0x0, @dev={0xac, 0x14, 0x14, 0xe}, @broadcast, {[@rr={0x7, 0xb, 0x9b, [@multicast2, @dev={0xac, 0x14, 0x14, 0x17}]}, @ra={0x94, 0x4, 0x1}]}}}}}) sendmmsg$inet(r2, &(0x7f00000006c0)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f00000000c0)="aabb302af2b9c74e05b23c1c2d7370a295080a2fb680d119b63eba4b8f9e451965870ecb95aaedb506511dbbfa62ee09bc95b5a3d815609c004e90db8673741c0469fdb1b7c95b61d12618011bbf05ea22016881bcacf50d30f8225c9e880dcb519ecb499d7999c5d89a1c0ce220f05912db93d5ccd8631dce6fbc43", 0x7c}, {&(0x7f0000000140)="ab0bfc4c06ce370794", 0x9}, {&(0x7f0000000180)="c39fc7", 0x3}, {&(0x7f00000001c0)="72217a9590386dc766662c63561fe7872fa6f272baa0623e5d7fc1e794257ab36ff078260842c84b657f2aa7e3188e8d9dd5cdd77a2f5295a5a699e30e7469e1121dfaf24710cbeea7b74418a427c178ee1bfc8c74ed7ae2c4c6200cc1edf7bb187dc3e68d7aa577cbb6e13b5a38cfe742966f744cfee5827557d21e61152cc55390bdee9729a1701b0f636fb87fb53e63ab3af489dd471a46a493d2ba389250e6670908f91468b545", 0xa9}], 0x4, &(0x7f00000002c0)=[@ip_tos_u8={{0x11, 0x0, 0x1, 0x80}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x1f}}], 0x30}}, {{&(0x7f0000000300)={0x2, 0x4e22, @empty}, 0x10, &(0x7f0000000400)=[{&(0x7f0000000340)="6c2901ad75dd6657c26f67d2e8fe6016fe3b4c9e28c5dc87bf397eadf9cf334eed587dff74bf12fc5815c3816c36e66531106376da462503113b9a4a6e1b22e409d64e9551db8730a20754", 0x4b}, {&(0x7f00000003c0)="aef4bc", 0x3}], 0x2, &(0x7f0000000500)=[@ip_tos_u8={{0x11, 0x0, 0x1, 0x7f}}, @ip_ttl={{0x14, 0x0, 0x2, 0x7}}, @ip_retopts={{0x3c, 0x0, 0x7, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0x27, 0xc2, [@multicast1, @initdev={0xac, 0x1e, 0x1, 0x0}, @local, @empty, @initdev={0xac, 0x1e, 0x1, 0x0}, @local, @empty, @loopback, @local]}]}}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0xf6}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @rand_addr=0x64010102, @loopback}}}, @ip_retopts={{0x7c, 0x0, 0x7, {[@cipso={0x86, 0x18, 0x3, [{0x7, 0xb, "756082bac6c2eca585"}, {0x0, 0x7, "96fb1b9434"}]}, @noop, @timestamp_addr={0x44, 0x1c, 0x70, 0x1, 0x5, [{@dev={0xac, 0x14, 0x14, 0xa}, 0x5}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x859c}, {@multicast2}]}, @noop, @noop, @timestamp_prespec={0x44, 0x34, 0x89, 0x3, 0x6, [{@local, 0x2}, {@dev={0xac, 0x14, 0x14, 0x13}, 0x1}, {@loopback, 0x80000000}, {@local, 0x7fffffff}, {@loopback, 0x2d}, {@remote}]}]}}}, @ip_retopts={{0x90, 0x0, 0x7, {[@timestamp_addr={0x44, 0x1c, 0xb7, 0x1, 0x7, [{@rand_addr=0x64010100, 0x5}, {@broadcast, 0x3}, {@loopback, 0xee7}]}, @timestamp_addr={0x44, 0x3c, 0xe3, 0x1, 0x9, [{@remote, 0x140f}, {@local}, {@remote, 0x6}, {@dev={0xac, 0x14, 0x14, 0x29}, 0x400}, {@broadcast, 0x289}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x1}, {@multicast1, 0x200}]}, @lsrr={0x83, 0x7, 0xe5, [@loopback]}, @cipso={0x86, 0x1e, 0x1, [{0x7, 0x11, "7772c89f5a16d467708d634b15a9c8"}, {0x2, 0x7, "9cdfa04d01"}]}]}}}], 0x1b8}}], 0x2, 0x24000014) ioctl$sock_SIOCGIFVLAN_GET_VLAN_INGRESS_PRIORITY_CMD(r1, 0x8982, &(0x7f0000000080)) ioctl$sock_SIOCADDRT(r1, 0x890b, &(0x7f0000000740)={0x0, @l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x1, 0x0}, 0x4}, @ethernet={0x1, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}}, @xdp={0x2c, 0x1, r3, 0x32}, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x6, 0x5, 0x3}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r2, 0x89f1, &(0x7f0000000880)={'gre0\x00', &(0x7f00000007c0)={'gretap0\x00', r4, 0x80, 0x20, 0x7, 0x3, {{0x20, 0x4, 0x3, 0x1d, 0x80, 0x64, 0x0, 0x79, 0x2f, 0x0, @broadcast, @empty, {[@ssrr={0x89, 0x7, 0x40, [@initdev={0xac, 0x1e, 0x1, 0x0}]}, @lsrr={0x83, 0x17, 0x77, [@local, @dev={0xac, 0x14, 0x14, 0x3c}, @private=0xa010100, @dev={0xac, 0x14, 0x14, 0x1e}, @local]}, @generic={0x7, 0x7, "85576ba11f"}, @rr={0x7, 0x1b, 0x5, [@local, @private=0xa010101, @private=0xa010100, @local, @private=0xa010100, @empty]}, @ra={0x94, 0x4, 0x1}, @rr={0x7, 0x27, 0x52, [@private=0xa010100, @initdev={0xac, 0x1e, 0x1, 0x0}, @dev={0xac, 0x14, 0x14, 0x25}, @dev={0xac, 0x14, 0x14, 0x3c}, @private=0xa010101, @rand_addr=0x64010100, @rand_addr=0x64010101, @initdev={0xac, 0x1e, 0x0, 0x0}, @multicast1]}]}}}}}) r5 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCSARP(r5, 0x8955, &(0x7f0000000000)={{0x2, 0x0, @local}, {0x0, @local}, 0x20, {0x2, 0x0, @local}, 'dummy0\x00'}) ioctl$F2FS_IOC_FLUSH_DEVICE(r5, 0x4008f50a, &(0x7f0000000040)={0x2, 0x100}) 15:08:55 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x5407, &(0x7f0000000080)={0x4, 0x21, 0x4, 0x6633, 0xa, "bb09819e2f6e8485"}) 15:08:55 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000280)='/proc/self/exe\x00', 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000000)=@IORING_OP_REMOVE_BUFFERS={0x1f, 0x1, 0x0, 0x1b22, 0x0, 0x0, 0x0, 0x0, 0x1, {0x3}}, 0xfffffffe) sendfile(r0, r1, 0x0, 0x100000001) creat(&(0x7f0000000040)='./file1\x00', 0x0) r2 = creat(&(0x7f0000000040)='./file1\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x4) ioctl$CDROMSTOP(0xffffffffffffffff, 0x5307) 15:08:55 executing program 2: r0 = syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r1, 0x7, 0x0, 0x0, 0x0) statx(r0, &(0x7f00000001c0)='./file1\x00', 0x800, 0xb0f, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fchownat(r1, &(0x7f0000000080)='./file0/file0\x00', 0xee00, r2, 0x800) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x0) openat(r0, &(0x7f0000000000)='./file0/file0\x00', 0x141000, 0x190) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(0xffffffffffffffff, 0x40605346, &(0x7f0000000240)) fspick(0xffffffffffffffff, &(0x7f0000000140)='./file0/file0\x00', 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) creat(&(0x7f0000000180)='./file1\x00', 0x40) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000001000)={0x14, 0x2c, 0xcd2781b960712dff}, 0x14}}, 0x0) ioctl$FICLONE(r3, 0x40049409, 0xffffffffffffffff) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) getresgid(&(0x7f00000010c0), &(0x7f0000001100), &(0x7f0000001140)) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000700)={'trans=fd,', {'rfdno', 0x3d, r4}, 0x2c, {'wfdno', 0x3d, r5}, 0x2c, {[{@cache_mmap}, {@cache_fscache}, {@debug={'debug', 0x3d, 0x924}}, {@nodevmap}, {@noextend}, {@dfltgid}, {@afid={'afid', 0x3d, 0x345}}], [{@smackfstransmute={'smackfstransmute', 0x3d, 'nodevmap'}}, {@fowner_gt}, {@hash}, {@fowner_eq}, {@fsname={'fsname', 0x3d, '.'}}, {@fowner_gt}]}}) 15:08:55 executing program 4: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1c08a4, 0x0) r1 = syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) r2 = open$dir(&(0x7f0000000200)='./mnt\x00', 0x40040, 0x10) mkdirat(r2, &(0x7f0000000280)='mnt/encrypted_dir/../file0\x00', 0x20) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir/../file0\x00', 0x80, 0x3e4fcec92923ce05) r3 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x50008, 0x0, 0x10081, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r4 = openat(r1, &(0x7f0000000000)='mnt/encrypted_dir/../file0\x00', 0x40, 0x100) r5 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r5, 0xc0406619, &(0x7f00000001c0)={@desc={0x1, 0x0, @desc2}}) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, &(0x7f0000000140)=',,\\\x00') futimesat(r4, &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0)={{0x0, 0xea60}}) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000680)=ANY=[@ANYBLOB="b00900000000000018000000468a29458f2709d329f6d3f3917408961482081d984538af2f9bcf61c448afbaa0be3f00000000000000ca4aa56fc413a417324e8530165c3515981e2d28f7fce9ae3c6bb8fa04ff6411132c9ced479abaeea325c2205ea95984d3d7f98eea1cca02dfeb0b2471b497fbb71b60180d35e2a3394ba6d965f41c7b7bc29d4e3ca95bd7ad074a4242ec98a69ad9d1546ce18cbbd98d2e50688e958a0fcd16876ab83cdb94eeb03e42203f267a1bf6ccb1c07ad92e6e493149da32f754251ae74d30cd4b50eefd6a208172ed8693b320eda714bdd152b484d9c939b4bb777dddd947843d73529f5ffe589777254cb10f733351e0739a3a61c3b8f977517ee7becda66da23a93e3be8ed63bda262951b32f72c1c48ee63be474eafaa255074efaa494b950f48b119c76c70b833e4d7443b691dc97bf78bcae908758ff1edaf2ad48dd67d0337c8ecfcd47e8ce5598c435f4645d719ae60a12c5b37ed2d45571c29ff6af1292ed2ff7fa24e2ab69f18db826044f35683810d2ee95f68f586a8922acdc225912820cdffe6ac29641f3c531a0eb1ddbf17341a05f3ee437f2a56a4a92af8ba2e413d00d05caab40963868dc00da000dfe8962927be81ca05afcc624225b2667a1208dd74e8bb6ced5e1da98f41bb3dedc31302fbf6ed40e9c526f82b53ce45e25e20ce9068bba911f0ec11403a35ff01cee623f71101155fcb646937ac714ac49741b4a1ffc6a72cba387bf41c1af2eeaa80a07631a22d366562924848da0f27c", @ANYRES32, @ANYBLOB="02000000000000006d6e742f656e637279707465645f6469722f2e2e2f66696c653000"]) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') 15:08:55 executing program 1: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r0, 0x7, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, 0x0) mount$bind(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180), 0x64000, 0x0) 15:08:55 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCSARP(r1, 0x8955, &(0x7f0000000000)={{0x2, 0x0, @local}, {0x0, @local}, 0x20, {0x2, 0x0, @local}, 'dummy0\x00'}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCSARP(r2, 0x8955, &(0x7f0000000000)={{0x2, 0x0, @local}, {0x0, @local}, 0x20, {0x2, 0x0, @local}, 'dummy0\x00'}) ioctl$sock_inet_SIOCSARP(r2, 0x8955, &(0x7f0000000180)={{0x2, 0x4e21, @local}, {0x1, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x42}}, 0x54, {0x2, 0x4e23, @empty}, 'veth1_to_bond\x00'}) sendfile(r1, 0xffffffffffffffff, 0x0, 0x2) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCSARP(r3, 0x8955, &(0x7f0000000000)={{0x2, 0x0, @local}, {0x0, @local}, 0x20, {0x2, 0x0, @local}, 'veth0_to_bond\x00'}) sendfile(r3, r0, &(0x7f0000000140)=0x9, 0x1000) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000200)="af", 0x1}], 0x1) ftruncate(r0, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) 15:08:55 executing program 0: syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(0xffffffffffffffff, 0x5407, &(0x7f0000000080)={0x4, 0x21, 0x4, 0x6633, 0xa, "bb09819e2f6e8485"}) 15:08:55 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCSARP(r1, 0x8955, &(0x7f0000000000)={{0x2, 0x0, @local}, {0x0, @local}, 0x20, {0x2, 0x0, @local}, 'dummy0\x00'}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCSARP(r2, 0x8955, &(0x7f0000000000)={{0x2, 0x0, @local}, {0x0, @local}, 0x20, {0x2, 0x0, @local}, 'dummy0\x00'}) ioctl$sock_inet_SIOCSARP(r2, 0x8955, &(0x7f0000000180)={{0x2, 0x4e21, @local}, {0x1, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x42}}, 0x54, {0x2, 0x4e23, @empty}, 'veth1_to_bond\x00'}) sendfile(r1, 0xffffffffffffffff, 0x0, 0x2) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCSARP(r3, 0x8955, &(0x7f0000000000)={{0x2, 0x0, @local}, {0x0, @local}, 0x20, {0x2, 0x0, @local}, 'veth0_to_bond\x00'}) sendfile(r3, r0, &(0x7f0000000140)=0x9, 0x1000) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000200)="af", 0x1}], 0x1) ftruncate(r0, 0x9) 15:08:55 executing program 1: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, 0x0) mount$bind(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180), 0x64000, 0x0) 15:08:55 executing program 4: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1c08a4, 0x0) r1 = syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) r2 = open$dir(&(0x7f0000000200)='./mnt\x00', 0x40040, 0x10) mkdirat(r2, &(0x7f0000000280)='mnt/encrypted_dir/../file0\x00', 0x20) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir/../file0\x00', 0x80, 0x3e4fcec92923ce05) r3 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x50008, 0x0, 0x10081, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r4 = openat(r1, &(0x7f0000000000)='mnt/encrypted_dir/../file0\x00', 0x40, 0x100) r5 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r5, 0xc0406619, &(0x7f00000001c0)={@desc={0x1, 0x0, @desc2}}) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, &(0x7f0000000140)=',,\\\x00') futimesat(r4, &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0)={{0x0, 0xea60}}) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000680)=ANY=[@ANYBLOB="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", @ANYRES32, @ANYBLOB="02000000000000006d6e742f656e637279707465645f6469722f2e2e2f66696c653000"]) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') 15:08:55 executing program 2: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r0, 0x7, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, 0x0) mount$bind(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180), 0x64000, 0x0) 15:08:55 executing program 0: syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(0xffffffffffffffff, 0x5407, &(0x7f0000000080)={0x4, 0x21, 0x4, 0x6633, 0xa, "bb09819e2f6e8485"}) 15:08:55 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCSARP(r1, 0x8955, &(0x7f0000000000)={{0x2, 0x0, @local}, {0x0, @local}, 0x20, {0x2, 0x0, @local}, 'dummy0\x00'}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCSARP(r2, 0x8955, &(0x7f0000000000)={{0x2, 0x0, @local}, {0x0, @local}, 0x20, {0x2, 0x0, @local}, 'dummy0\x00'}) ioctl$sock_inet_SIOCSARP(r2, 0x8955, &(0x7f0000000180)={{0x2, 0x4e21, @local}, {0x1, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x42}}, 0x54, {0x2, 0x4e23, @empty}, 'veth1_to_bond\x00'}) sendfile(r1, 0xffffffffffffffff, 0x0, 0x2) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCSARP(r3, 0x8955, &(0x7f0000000000)={{0x2, 0x0, @local}, {0x0, @local}, 0x20, {0x2, 0x0, @local}, 'veth0_to_bond\x00'}) sendfile(r3, r0, &(0x7f0000000140)=0x9, 0x1000) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000200)="af", 0x1}], 0x1) 15:08:55 executing program 1: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, 0x0) mount$bind(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180), 0x64000, 0x0) 15:09:08 executing program 7: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x400, 0x0) ioctl$TCSBRKP(r0, 0x5425, 0x994a) 15:09:08 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCSARP(r1, 0x8955, &(0x7f0000000000)={{0x2, 0x0, @local}, {0x0, @local}, 0x20, {0x2, 0x0, @local}, 'dummy0\x00'}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCSARP(r2, 0x8955, &(0x7f0000000000)={{0x2, 0x0, @local}, {0x0, @local}, 0x20, {0x2, 0x0, @local}, 'dummy0\x00'}) ioctl$sock_inet_SIOCSARP(r2, 0x8955, &(0x7f0000000180)={{0x2, 0x4e21, @local}, {0x1, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x42}}, 0x54, {0x2, 0x4e23, @empty}, 'veth1_to_bond\x00'}) sendfile(r1, 0xffffffffffffffff, 0x0, 0x2) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCSARP(r3, 0x8955, &(0x7f0000000000)={{0x2, 0x0, @local}, {0x0, @local}, 0x20, {0x2, 0x0, @local}, 'veth0_to_bond\x00'}) sendfile(r3, r0, &(0x7f0000000140)=0x9, 0x1000) 15:09:08 executing program 4: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1c08a4, 0x0) r1 = syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) r2 = open$dir(&(0x7f0000000200)='./mnt\x00', 0x40040, 0x10) mkdirat(r2, &(0x7f0000000280)='mnt/encrypted_dir/../file0\x00', 0x20) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir/../file0\x00', 0x80, 0x3e4fcec92923ce05) r3 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x50008, 0x0, 0x10081, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r4 = openat(r1, &(0x7f0000000000)='mnt/encrypted_dir/../file0\x00', 0x40, 0x100) fsconfig$FSCONFIG_CMD_RECONFIGURE(0xffffffffffffffff, 0x7, 0x0, 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(0xffffffffffffffff, 0xc0406619, &(0x7f00000001c0)={@desc={0x1, 0x0, @desc2}}) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, &(0x7f0000000140)=',,\\\x00') futimesat(r4, &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0)={{0x0, 0xea60}}) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000680)=ANY=[@ANYBLOB="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", @ANYRES32, @ANYBLOB="02000000000000006d6e742f656e637279707465645f6469722f2e2e2f66696c653000"]) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') 15:09:08 executing program 5: socket$inet6_tcp(0xa, 0x1, 0x0) r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r0, 0x7, 0x0, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback={0x0, 0x2}}, 0x1c) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCSARP(r1, 0x8955, &(0x7f0000000000)={{0x2, 0x0, @local}, {0x0, @local}, 0x20, {0x2, 0x0, @local}, 'dummy0\x00'}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f00000004c0)={'tunl0\x00', &(0x7f0000000440)={'syztnl1\x00', 0x0, 0x1, 0x40, 0x9, 0xa739, {{0x9, 0x4, 0x1, 0x39, 0x24, 0x67, 0x0, 0x2, 0x2f, 0x0, @dev={0xac, 0x14, 0x14, 0xe}, @broadcast, {[@rr={0x7, 0xb, 0x9b, [@multicast2, @dev={0xac, 0x14, 0x14, 0x17}]}, @ra={0x94, 0x4, 0x1}]}}}}}) sendmmsg$inet(r2, &(0x7f00000006c0)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f00000000c0)="aabb302af2b9c74e05b23c1c2d7370a295080a2fb680d119b63eba4b8f9e451965870ecb95aaedb506511dbbfa62ee09bc95b5a3d815609c004e90db8673741c0469fdb1b7c95b61d12618011bbf05ea22016881bcacf50d30f8225c9e880dcb519ecb499d7999c5d89a1c0ce220f05912db93d5ccd8631dce6fbc43", 0x7c}, {&(0x7f0000000140)="ab0bfc4c06ce370794", 0x9}, {&(0x7f0000000180)="c39fc7", 0x3}, {&(0x7f00000001c0)="72217a9590386dc766662c63561fe7872fa6f272baa0623e5d7fc1e794257ab36ff078260842c84b657f2aa7e3188e8d9dd5cdd77a2f5295a5a699e30e7469e1121dfaf24710cbeea7b74418a427c178ee1bfc8c74ed7ae2c4c6200cc1edf7bb187dc3e68d7aa577cbb6e13b5a38cfe742966f744cfee5827557d21e61152cc55390bdee9729a1701b0f636fb87fb53e63ab3af489dd471a46a493d2ba389250e6670908f91468b545", 0xa9}], 0x4, &(0x7f00000002c0)=[@ip_tos_u8={{0x11, 0x0, 0x1, 0x80}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x1f}}], 0x30}}, {{&(0x7f0000000300)={0x2, 0x4e22, @empty}, 0x10, &(0x7f0000000400)=[{&(0x7f0000000340)="6c2901ad75dd6657c26f67d2e8fe6016fe3b4c9e28c5dc87bf397eadf9cf334eed587dff74bf12fc5815c3816c36e66531106376da462503113b9a4a6e1b22e409d64e9551db8730a20754", 0x4b}, {&(0x7f00000003c0)="aef4bc", 0x3}], 0x2, &(0x7f0000000500)=[@ip_tos_u8={{0x11, 0x0, 0x1, 0x7f}}, @ip_ttl={{0x14, 0x0, 0x2, 0x7}}, @ip_retopts={{0x3c, 0x0, 0x7, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0x27, 0xc2, [@multicast1, @initdev={0xac, 0x1e, 0x1, 0x0}, @local, @empty, @initdev={0xac, 0x1e, 0x1, 0x0}, @local, @empty, @loopback, @local]}]}}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0xf6}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @rand_addr=0x64010102, @loopback}}}, @ip_retopts={{0x7c, 0x0, 0x7, {[@cipso={0x86, 0x18, 0x3, [{0x7, 0xb, "756082bac6c2eca585"}, {0x0, 0x7, "96fb1b9434"}]}, @noop, @timestamp_addr={0x44, 0x1c, 0x70, 0x1, 0x5, [{@dev={0xac, 0x14, 0x14, 0xa}, 0x5}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x859c}, {@multicast2}]}, @noop, @noop, @timestamp_prespec={0x44, 0x34, 0x89, 0x3, 0x6, [{@local, 0x2}, {@dev={0xac, 0x14, 0x14, 0x13}, 0x1}, {@loopback, 0x80000000}, {@local, 0x7fffffff}, {@loopback, 0x2d}, {@remote}]}]}}}, @ip_retopts={{0x90, 0x0, 0x7, {[@timestamp_addr={0x44, 0x1c, 0xb7, 0x1, 0x7, [{@rand_addr=0x64010100, 0x5}, {@broadcast, 0x3}, {@loopback, 0xee7}]}, @timestamp_addr={0x44, 0x3c, 0xe3, 0x1, 0x9, [{@remote, 0x140f}, {@local}, {@remote, 0x6}, {@dev={0xac, 0x14, 0x14, 0x29}, 0x400}, {@broadcast, 0x289}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x1}, {@multicast1, 0x200}]}, @lsrr={0x83, 0x7, 0xe5, [@loopback]}, @cipso={0x86, 0x1e, 0x1, [{0x7, 0x11, "7772c89f5a16d467708d634b15a9c8"}, {0x2, 0x7, "9cdfa04d01"}]}]}}}], 0x1b8}}], 0x2, 0x24000014) ioctl$sock_SIOCGIFVLAN_GET_VLAN_INGRESS_PRIORITY_CMD(r1, 0x8982, &(0x7f0000000080)) ioctl$sock_SIOCADDRT(r1, 0x890b, &(0x7f0000000740)={0x0, @l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x1, 0x0}, 0x4}, @ethernet={0x1, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}}, @xdp={0x2c, 0x1, r3, 0x32}, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x6, 0x5, 0x3}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r2, 0x89f1, &(0x7f0000000880)={'gre0\x00', &(0x7f00000007c0)={'gretap0\x00', r4, 0x80, 0x20, 0x7, 0x3, {{0x20, 0x4, 0x3, 0x1d, 0x80, 0x64, 0x0, 0x79, 0x2f, 0x0, @broadcast, @empty, {[@ssrr={0x89, 0x7, 0x40, [@initdev={0xac, 0x1e, 0x1, 0x0}]}, @lsrr={0x83, 0x17, 0x77, [@local, @dev={0xac, 0x14, 0x14, 0x3c}, @private=0xa010100, @dev={0xac, 0x14, 0x14, 0x1e}, @local]}, @generic={0x7, 0x7, "85576ba11f"}, @rr={0x7, 0x1b, 0x5, [@local, @private=0xa010101, @private=0xa010100, @local, @private=0xa010100, @empty]}, @ra={0x94, 0x4, 0x1}, @rr={0x7, 0x27, 0x52, [@private=0xa010100, @initdev={0xac, 0x1e, 0x1, 0x0}, @dev={0xac, 0x14, 0x14, 0x25}, @dev={0xac, 0x14, 0x14, 0x3c}, @private=0xa010101, @rand_addr=0x64010100, @rand_addr=0x64010101, @initdev={0xac, 0x1e, 0x0, 0x0}, @multicast1]}]}}}}}) r5 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCSARP(r5, 0x8955, &(0x7f0000000000)={{0x2, 0x0, @local}, {0x0, @local}, 0x20, {0x2, 0x0, @local}, 'dummy0\x00'}) ioctl$F2FS_IOC_FLUSH_DEVICE(r5, 0x4008f50a, &(0x7f0000000040)={0x2, 0x100}) 15:09:08 executing program 3: r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000040), 0xae602, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCSARP(r1, 0x8955, &(0x7f0000000000)={{0x2, 0x0, @local}, {0x0, @local}, 0x20, {0x2, 0x0, @local}, 'dummy0\x00'}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCSARP(r2, 0x8955, &(0x7f0000000000)={{0x2, 0x0, @local}, {0x0, @local}, 0x20, {0x2, 0x0, @local}, 'dummy0\x00'}) setsockopt$IP_VS_SO_SET_ADDDEST(r2, 0x0, 0x487, &(0x7f0000001100)={{0x1, @private=0xa010102, 0x4e20, 0x0, 'sh\x00', 0x10, 0x8, 0x6a}, {@broadcast, 0x4e22, 0x1, 0x200, 0x5, 0x8}}, 0x44) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(r0, 0x5000943f, &(0x7f0000000100)={{r1}, 0x0, 0x16, @inherit={0x60, &(0x7f0000000080)={0x1, 0x3, 0x9, 0x8001, {0x0, 0x7, 0x2, 0x5, 0x7}, [0x7fffffff, 0x6, 0x5]}}, @subvolid=0x7}) 15:09:08 executing program 2: fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(0xffffffffffffffff, 0x40605346, &(0x7f0000000240)) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = signalfd4(r0, &(0x7f0000000000)={[0x9]}, 0x8, 0x80000) sendmsg$inet6(r3, &(0x7f0000000380)={&(0x7f0000000080)={0xa, 0x4e20, 0x20, @private1, 0x2}, 0x1c, &(0x7f00000004c0)=[{&(0x7f0000000140)="beb7239c024109ed025cd834eb9c8e0dc1804f3e53b5a7e8e5580ee7ce763cd77a2f46c35596d2be79dd05c585b669aafd0f4c77f2f1edab140039b72273cc5a4617e99ef29e1d8ecb48eb89b3cd482db8d51e1da72c7a52ce97309cda7401f853137a249ac54585eb70c90e964569b1829cf64afa832b80", 0x78}, {&(0x7f00000002c0)="ab4c8c61fc6d1f436382f953f97af74cff52c9d6ffe1356d259d231b12d83aebbf70d6915beb11a1f41a2849bc2dac6573d3261e6390ca6e0371a5a88b9dde32f6d5df3d0975f6e783ab4135f19c97cda1a524c0732aa823571b8ba5150047648568e266d8d09d89516c5a402e096d5b94848f85a5215286fb2956eb363bc536cd060fbbbcbfd46ddf01d944d3", 0x8d}, {&(0x7f00000001c0)="5c1bb40f98f9f80ae247d38b0d8e9692dfd41fdcd3369746f39b69056770857b5515ae1e96eba7dcdea6ec993410b55632", 0x31}, {&(0x7f0000000400)="14812e808a7e2a46c78e80bde12deaa6140b484a0674d9c0fe777ff1db070fceac88a7d95a44a04856a2e0fffa14c37fd6c3789f7ae51c8637afc55b0b423e671418f53fc4b652f64bab7dd193b481a728ba274212a2c4954a3b79f0c5509f1933a2cbd0f1d2141afde2ec9566e3a5b479ea07e1f0721b983ca55a7ca2a51c73e85b7b748405608f8a7f416db2e1dd7f20aff3498a18ed8a18a1620452f4", 0x9e}, {&(0x7f0000000800)="3e7947d7e5dfd02529b98ea293f8485887c2cce889478d6b21884c5a854793243022c1a4e4de1fbd961a4e0e46c7a89908e981b8d09c8b60d769547df990c200ef8d6a719b5f1984818aceec00073d19da03cb8d441da95b07abf5e78584d18eed9423d78980f87dba54d0feb7c5beba0ef6ba3e592e59a8e45e251406696264cc2ee54c487dc6c35b4fb4dd78961d8f2dd7e62c0fec892eaeb1c7ce71519bfa06093cf511b8dbff15b58be1c1abe96524646d32b6a3fd0b4be534f40780dbee40a4c535b0c05260932602a49399cdd109c0e8781d4c67e895128970dae59d088c642b7cb5b7a183ad6f6813e70fcef58551c66e0830e14e540cedb93f42d9ed40f356cc846ce60510ee61561ccbeab61fac9fe5fb00f1a85f1479ff792554336929b7e711d204bb1786fc2081a4aa24ee9e26324a8d69bd9cc91124ee83d01e90f06c2df9068e27f7a40bfaa1ba03eca813e485fc417419cbe61036cf66df0eb7635438e8844cb2c9634079770a2af2e0738f4c2d75b63443f122d70e73817e8f7bd6bb179e019bca16bb40c815025c5dd6112c1fd38b555aee2f89fc546a532674cb82961553f9b42a06dd7d8fe886a1e2e7e2e1aaedecb46ce87e4a5fc06a93a4eeec5cfc6b8c8b09c761dead95e7368aab3a0e71bfcae085020ab461465679e21a2d1966a309c9940d9d335abc60802cde10993bef5148097aab514e24e6ebc4167cc0ff7b8ccb25a0a13be66b94158305f99019b7217e01b4b2f636ff8d81f09d71fa16fed395f57b5ca42e9e3e3a4a192903a90faa159429a23cf48c05a062232b93da17e9ff097bf2016da48011da7a851a841e2f89fcf7ffe576a44165f0ebca64cc669dd35a89a42f17be67d1844cde8075ef6d3a15bdc6c10a2e5a15a218742a4d324d4f92ff699eb60c89671033a758a2fed8051e93b5d08a16f1e9c747ac8b38580cdf28da2f903a6e4456f2010f9f3f715aa4a9118c624e1ed51ac4ba7062da27a741856a9f43091ace614de2481ab5a44febb11dcdcb401261151bd6f3b7d5341b1a95627aa1d1f1742d5f0f2a19a29452ba90627eeece55c26abd21efc9743b0406d4ea3c573bb3484a59f7cc20be0ac771ff19a72117d4ab38dbb8b6bae37a4a4880a5474cc407084d6a69babd61fe93e61e66564141362ba265c7cfe1a42dbd197ea710b10aea125766d12b5b74286cf5ecc2bb35da5be57368a6fff200892f1dea5214cbd02dc4ed05d6e6ca5675c6b14c5a02c9834a2890886b5db1843007f437353e6a6c2f1df83bd46301930ace1660b6eded6fd49d7ad43d2dade6c9f67d1019356fd377bf05cd4d44edff5224f3f05fa995704825a8ab2ae994ecf13abde52388968c41fe49a911e8e6190e6b98635d7812c488a94a3709fae61c516e65a6f1e6e2cd9c6f372647f6c6422a8e09491e5fce0b2518e8f9e1a53f6c9b497cc06edf0ed654f7a5519f029ab660f070ee52359b17a647ed394553c88c4a96d03961f855b6fe0b36e315c72779ae5acf4a8b59a9921a81ea68978220616bc727f4bc99b1fea2b7578176600ad0f576c69329f95fd6f0d5d76de3922ad701f491968efda1a06f706879613719a9220731d29c484aca5daeb58a76d0fcc92a0abb2da9fe3067c18573aab26e07c02e469c1dd97233f771cf801c66673d197d09d79252b85b91f0e677f45a58b1cc1652f27510ffab1415dcaff098b211539c257f7d948ec154d81aa9f589aa5f845a2c507babe593c5e756a0621e3b3518665efd98ccfb2f1f4eefba7ede629ce5f4568df85cc271f8bf86377fd3d22e1e4f0ab7e479af993d507c0bea0881e4b0c740f38e4cd12e2cac6fbc60c202ddc25ea175db8e953fb5e60795cf8160096ddb3547ee062d39681814260cd7cd9c5c95c8ef32c42c2b9b0647e0f992b124b5b325588a73ab6806c00c74787140d446d4fc4ab0d08034131f3b2fce3a0450359e73f4ab3db015764ca74c212f1c1b93f46a88d619e80c52d2ab181e453432fb5c10282183eb40679264eb3a799313347e47c4432e8b7c1d09c9365147c2dc668572f69a4d8793b776634e1ef44c583bfb343d458adcd0d8d802e286d6620886194e72d9805e120c7d69a215533a2e908b4e6386ba1551c2e3df9175c520cf3fe67dbfb386b96b04bdc8c4f7ac8b4866dc7267a72dcb96e8b8c45485c4c0d2814243fa168e0f20e262f92735d49d6ed6eb84251717e35e6f2bf519cd48a81cec2df705d254a15ac75f313e9fca687c5adc41dc39d4e9fbd5d8503a6e039d0fc6eb9e120e91933750b3ef40c29ed21ec0ff2fe6c76a8182bcfe665e147b0bf6353645eb9ce66b98db5b0c74752203909bcb6fac56a393671381838b61e95695c9edc4b51330c27b26d3bc14b0a065959dc38404e4bb34e9e21eeae5629a846309aa44dbed3d8e616df3e03619e4729add5b17088498ef280227dfdcb0550df67a432c06da8dd5a62d878d8d5856d32c3390d57b1bd7b0c5d391f01454835afb5dd6276c3df8ed0cc39263fbf8dd03394c49be0f116ce24b5bea34bd1e4f5e575fb9cee778a7d9e0abc467b5ec37d5136fa6c2c08fa54f63f8fc0ceeb1e03421c8023b00d1fcaaa945c5cc5837097ec1834a2a90d2ce84c1a8b719af1d01674d71b06a3938fb45e2ba5c0fcf0d4131bc5fd0a2828bbd2bd088ccbed949438383e500f2bd339899ae2e2cbac7201759cd55d6ac21793225217fe2f1dcf5d52b706cd1135db283dcfb7f27a88f622e85b22b92ddf679405c5d826eb4b6a761c51b48c31b0f778f233baaee926357a26fcb3806f4f5ab6e72a281a822ae711d34a739504fc24634ad6575aa73010bcc71a0eae5cb031fc39a2778d99facd28d88ce8843b9f7ff06181758387c2a8de7978f79a59b6b9bc8750b168cc8b543bbb969bfbf3f595d99ff99c2bf3853b16ba8995393f614725477b2b8aea7ed8b4f405b2dbd189b40edb75be0629f2142eb0fc4ac1766c1bae64d6d8c2557411d57d9bea80009de168b3a887e717b105ca84acd29e418126704922d9a7fb09494ce13b2ffa3cbb9109add0d3381f3f4aee6b1596e6a2609d517f608d924458810c93345fa4cdb7f751a8cec80b02190a65e52854dadae4c329b7eb2d3cf621693003e4c9dc9a4eb870d77ac1172af76557980851a78aae37af911e039104ca7df6298a4017ef191db17074dfe8d1c98d074aed073a8fda566da9cc0e7f836d5ea62623b8eae9adf34e23ec1fb35ed504d382326910d489eb233f0fa36421ddec5124ba139be8189a9292ae2fef6c3e199b55697c4d6c8c4f14cc201c1a29ce9a9bf6123dc7f99d0a247faa439463b00445f7b73eb02393473f1b38becd176f4a59de76c9bd483a3b9a8f311fff021501e2091260766101b4af9d79672b32e9a60ba00a987f8cb90b941e43df201349ccc69e28259c1635b5e5ffed60a3f70a4d4e2087a5ca96bf70580c13bcea57c7c918e8ab69025dcad4ef9db35a399603e920dabc436b8e7e648787e390ee39f7058c4bd9d1d404c2fa9b3dd0078d04cf9b9d9fd65850d36de7b13a7400cf3d86dbe382fee7aae9f6bc40139862fef69126efce51aa18705af2943d51be89088980370158dcd6ca4141f9040c130afec94b212536ce9ad1dc02ed66f9ae9c8a6748134dd84a72eb32df71bccab8a21a534ffce5d8fe714990ff99fb238ab35a3a8b51a5f4b08a883b9933c6e737ed9f30e8dcd2e04b7a5f9393a8b090bc369fc04dc3c2c611136401e6b2fb3099ec8a6640cd88a51e647c06db549929a55ab06e0060954533c7d0c3ee430f39dec99efc0eb0cc40f40725da44816bbde38a960b290e3a6b491c26b25dd53ed4e6125e79ad46b4d32b79903f33989825aa61faabce7dcdbd5a84fca4eebdaa518b9bf78333e6b77bc40e9f95dc986c010816cc4fae06b326bd0ab170bf5721b8164517be836f17d2a3a562e158551eeb93751801070c08133c750d4374ba7f5a9ea4aa71b9941bcb35771582c21973c5133df25410e32986ee4939097b93fb7a8ab356f85d71ad8df0299c08f44fe69ca38a7ba75a9ad9ed137e5b900e995609a30e10a8e0a1855eefaa387b79cd2fe69a96c294046b0f3c012ff43ac6d2b863f4ee148c11627de662092bfe9489611b2ff61aa3f1a626f4f28ae0bb1b9784b533cf195af9f672c31d3d64eae85dfd52de3289a341f677fb0127aa6d095fca1a8b0af9d054f78504289156625ced065ed3e827606bb66915499c7b54dec111ff40dd5ba0b77e78662cd74df838fd018981aee5b449d20edd17ea44458bcc85dca4ff21198dce8e58f153ba31d8bb6aee927e1ce0d77c1a80d4f17047c0f61869252978f121d1b84b8ebae361cafc9e1048c8abaffe056dfdaf3a3a101dfff97b5217fd9df1a0b981e7c1a710caa6180c49c83a32dbd0708538da20485907d8598b9a2b928718ec740583d95e343bfb0482ab97a0dfe20a6225a9fb8a748dc932e199500db539a1cdc6d2fc07183dcc56f08f456c9f6f4ab8595d3c0b70514419cd4a496aa0e78f15763c2be04516cb0f788e0994bcaffb335d95790e2ebf4535307d73627014e6b36550bb3e15b9e086511acb379417cd96178ca34d15482da03b6e4e682de45b7789b59346b977fab75a013b6c014cb3bc2e0dab2c4b4836d05320aaf475061302e43db488d6e78a69574b0a5a17c839d77518161807179050f0f0e7ba378c4f35fa7530a3e0691bb2db1fd5476eff9f12d07b6fd22f755e29bc304bdf96a571220c3ed006b88a00f1921e679b94a4d7769ca9326677ec6e2e515176cd91f3b3142aabbb789d67e37bcea39b22ae9f3c18f902c75e08a39689b93d1d4144fbbd3fd94b2cbd93f852ec70d3ed70f0eeb080170fec679b13a8470a4777a2de3ced3ae1e566304b66ede7a438e1a3f57ac49293c1dc2a799b206e0d9936ea46320edadd9610f2cb5e95efcbf31177dd8f50e7d3699b8200ce1de56465a6ecaa120e2faf438b47c686535d965602401e44e95df27a70beee3e2d2e86735c3552841fc0e992f8937a489b0512dcc3ecfaed01242a8eaabde891020574511b5f419ccc5268cb7a63051d6664391851537090a188d265da0f6502586c8026c08cb5d755bbea1e73a8cf20feefc891f495a1a582990c50745bd33e56b5f0c327f56a130dd8da46db1b11e2db009c7e425e39bc7498159ae38c6eb5c108a53794cd0466eacac3dc74925aa6c3ef5254dd1b46a2f95c7a035b4abd8d73a5046e61df21ba60a851ce10a71db31fe20f448a53734ec22615022dbf4823b07981cfdb78cce1feda266d10006664afa309953a16dc50942474d9108570949177791c00c6b17f5d17cadf60a3bfcd251e64b9c2464be4da578cdb4efb991a901097efb0a3279d5a5f9a1e5ac5c5a93d95bc801808d55dc77d6652a12742bf7ddb82864f4401d1a07684e5bcc077c91753203f88bf770f32e3ef1c089fab22bd91d287807f47cc182b4e65bc83775fb9b26dcb92c1d9799383c9953abee105f152106386799bc4a876c6c0d94b435da7bdf0fb1d4fbda3ea72e0e06ed222b233cc01842879ea78f26f0d464ed3e57a78ac287a8ef3bc9379bb4633ae9407a8c0701f9e3473c0c7d5058b5a1a03c4ce8f05c36c0a0683f920fd41942488937bd1714386022c473662ecc1d07acb172b9f7f1d1cf27a0808fae7ecedbb28b3fcfe58e026e67f1289906d7fa186a48dc371025b568d01b5720f6417a7370bb768042f65ec5ca083391fbc4ce31b9a62770234598993b", 0x1000}], 0x5}, 0x4000000) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r1, @ANYBLOB="37a603673e63", @ANYRESHEX=r2, @ANYBLOB=',cache=mmap,noextend,dfltgid=', @ANYRESHEX=0x0, @ANYBLOB=',afid=0x0000000000000000,smackfstransmute=nodevmap,fowner>', @ANYRESDEC=0x0, @ANYBLOB=',hash,fowner=', @ANYRESDEC=0x0, @ANYBLOB=',fsname=.,fowner>', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) 15:09:08 executing program 0: syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(0xffffffffffffffff, 0x5407, &(0x7f0000000080)={0x4, 0x21, 0x4, 0x6633, 0xa, "bb09819e2f6e8485"}) 15:09:08 executing program 1: mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, 0x0) mount$bind(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180), 0x64000, 0x0) [ 231.225017] 9pnet: Insufficient options for proto=fd 15:09:08 executing program 1: mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, 0x0) mount$bind(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180), 0x64000, 0x0) 15:09:08 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x5407, 0x0) 15:09:08 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCSARP(r1, 0x8955, &(0x7f0000000000)={{0x2, 0x0, @local}, {0x0, @local}, 0x20, {0x2, 0x0, @local}, 'dummy0\x00'}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCSARP(r2, 0x8955, &(0x7f0000000000)={{0x2, 0x0, @local}, {0x0, @local}, 0x20, {0x2, 0x0, @local}, 'dummy0\x00'}) ioctl$sock_inet_SIOCSARP(r2, 0x8955, &(0x7f0000000180)={{0x2, 0x4e21, @local}, {0x1, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x42}}, 0x54, {0x2, 0x4e23, @empty}, 'veth1_to_bond\x00'}) sendfile(r1, 0xffffffffffffffff, 0x0, 0x2) r3 = socket$inet_udplite(0x2, 0x2, 0x88) sendfile(r3, r0, &(0x7f0000000140)=0x9, 0x1000) 15:09:09 executing program 3: openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) syz_emit_ethernet(0x4a, &(0x7f0000000400)=ANY=[@ANYBLOB="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", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="48000000a1780000"], 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'lo\x00'}) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r1, 0x8914, &(0x7f0000000140)={'lo\x00'}) 15:09:09 executing program 4: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1c08a4, 0x0) r1 = syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) r2 = open$dir(&(0x7f0000000200)='./mnt\x00', 0x40040, 0x10) mkdirat(r2, &(0x7f0000000280)='mnt/encrypted_dir/../file0\x00', 0x20) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir/../file0\x00', 0x80, 0x3e4fcec92923ce05) r3 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x50008, 0x0, 0x10081, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r4 = openat(r1, &(0x7f0000000000)='mnt/encrypted_dir/../file0\x00', 0x40, 0x100) fsconfig$FSCONFIG_CMD_RECONFIGURE(0xffffffffffffffff, 0x7, 0x0, 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(0xffffffffffffffff, 0xc0406619, &(0x7f00000001c0)={@desc={0x1, 0x0, @desc2}}) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, &(0x7f0000000140)=',,\\\x00') futimesat(r4, &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0)={{0x0, 0xea60}}) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000680)=ANY=[@ANYBLOB="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", @ANYRES32, @ANYBLOB="02000000000000006d6e742f656e637279707465645f6469722f2e2e2f66696c653000"]) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') 15:09:09 executing program 2: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1c08a4, 0x0) r1 = syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) r2 = open$dir(&(0x7f0000000200)='./mnt\x00', 0x40040, 0x10) mkdirat(r2, &(0x7f0000000280)='mnt/encrypted_dir/../file0\x00', 0x20) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir/../file0\x00', 0x80, 0x3e4fcec92923ce05) r3 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x50008, 0x0, 0x10081, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r4 = openat(r1, &(0x7f0000000000)='mnt/encrypted_dir/../file0\x00', 0x40, 0x100) fsconfig$FSCONFIG_CMD_RECONFIGURE(0xffffffffffffffff, 0x7, 0x0, 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(0xffffffffffffffff, 0xc0406619, &(0x7f00000001c0)={@desc={0x1, 0x0, @desc2}}) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, &(0x7f0000000140)=',,\\\x00') futimesat(r4, &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0)={{0x0, 0xea60}}) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000680)=ANY=[@ANYBLOB="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", @ANYRES32, @ANYBLOB="02000000000000006d6e742f656e637279707465645f6469722f2e2e2f66696c653000"]) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') 15:09:09 executing program 1: mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, 0x0) mount$bind(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180), 0x64000, 0x0) 15:09:09 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x5407, 0x0) 15:09:21 executing program 7: r0 = openat$ttyS3(0xffffffffffffff9c, 0x0, 0x400, 0x0) ioctl$TCSBRKP(r0, 0x5425, 0x994a) 15:09:21 executing program 3: syz_io_uring_setup(0x10000, 0x0, &(0x7f0000ff9000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0xc2, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$FIOCLEX(r0, 0x5451) sendmsg$nl_generic(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000840)=ANY=[@ANYBLOB="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"], 0x24}}, 0x0) r2 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x80, 0x0, 0x0, 0x0, 0x7, 0x0, 0x87}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f0000000340)={0x1, &(0x7f0000000300)=[{0x9, 0x81, 0x0, 0x1ff}]}) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r2) fsetxattr$security_selinux(0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000080)='system_u:object_r:syslogd_var_lib_t:s0\x00', 0x27, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000240)={0x0, @aes128, 0x0, @desc4}) r4 = socket$inet(0x2, 0x4, 0x104) getsockname(r4, 0x0, &(0x7f0000000080)) r5 = fcntl$dupfd(r1, 0x406, r1) perf_event_open(&(0x7f0000000580)={0x2, 0x80, 0x6, 0xa1, 0x8, 0x3f, 0x0, 0xc, 0xa0, 0x6, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x8004, 0x2, 0xff, 0x7, 0xffffffff, 0x337, 0x4, 0x0, 0x9f3597d, 0x0, 0xffffffff}, 0xffffffffffffffff, 0x10, r5, 0xa) sendmsg$NL80211_CMD_LEAVE_MESH(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000540)={&(0x7f0000000600)=ANY=[@ANYRESHEX=r2, @ANYRES32=r3, @ANYBLOB="280026bd70ca826946dfaf5ca6287962bdc5ba09409857df8ca8d9211e0d8347b4ff65bb806b08b7ca0e6e4140156a37d225e825d86975ec85fb6af6ba4355d981000000112f81675387108e5f4156e1f305683505b43056f564caad1e4cb86ee92d3d7fe0c2970a00"/117, @ANYRES32, @ANYRESOCT], 0x28}, 0x1, 0x0, 0x0, 0x4040}, 0x80d4) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) ioctl$BTRFS_IOC_QUOTA_RESCAN_STATUS(0xffffffffffffffff, 0x8040942d, &(0x7f0000000280)) syz_80211_join_ibss(&(0x7f0000000180)='wlan0\x00', &(0x7f00000001c0)=@random="a83a25", 0x3, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0xfffffffffffffff9, 0x0, 0x0, 0x2000004, 0x0) 15:09:21 executing program 1: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, 0x0) mount$bind(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180), 0x64000, 0x0) 15:09:21 executing program 5: socket$inet6_tcp(0xa, 0x1, 0x0) r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r0, 0x7, 0x0, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback={0x0, 0x2}}, 0x1c) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCSARP(r1, 0x8955, &(0x7f0000000000)={{0x2, 0x0, @local}, {0x0, @local}, 0x20, {0x2, 0x0, @local}, 'dummy0\x00'}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f00000004c0)={'tunl0\x00', &(0x7f0000000440)={'syztnl1\x00', 0x0, 0x1, 0x40, 0x9, 0xa739, {{0x9, 0x4, 0x1, 0x39, 0x24, 0x67, 0x0, 0x2, 0x2f, 0x0, @dev={0xac, 0x14, 0x14, 0xe}, @broadcast, {[@rr={0x7, 0xb, 0x9b, [@multicast2, @dev={0xac, 0x14, 0x14, 0x17}]}, @ra={0x94, 0x4, 0x1}]}}}}}) sendmmsg$inet(r2, &(0x7f00000006c0)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f00000000c0)="aabb302af2b9c74e05b23c1c2d7370a295080a2fb680d119b63eba4b8f9e451965870ecb95aaedb506511dbbfa62ee09bc95b5a3d815609c004e90db8673741c0469fdb1b7c95b61d12618011bbf05ea22016881bcacf50d30f8225c9e880dcb519ecb499d7999c5d89a1c0ce220f05912db93d5ccd8631dce6fbc43", 0x7c}, {&(0x7f0000000140)="ab0bfc4c06ce370794", 0x9}, {&(0x7f0000000180)="c39fc7", 0x3}, {&(0x7f00000001c0)="72217a9590386dc766662c63561fe7872fa6f272baa0623e5d7fc1e794257ab36ff078260842c84b657f2aa7e3188e8d9dd5cdd77a2f5295a5a699e30e7469e1121dfaf24710cbeea7b74418a427c178ee1bfc8c74ed7ae2c4c6200cc1edf7bb187dc3e68d7aa577cbb6e13b5a38cfe742966f744cfee5827557d21e61152cc55390bdee9729a1701b0f636fb87fb53e63ab3af489dd471a46a493d2ba389250e6670908f91468b545", 0xa9}], 0x4, &(0x7f00000002c0)=[@ip_tos_u8={{0x11, 0x0, 0x1, 0x80}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x1f}}], 0x30}}, {{&(0x7f0000000300)={0x2, 0x4e22, @empty}, 0x10, &(0x7f0000000400)=[{&(0x7f0000000340)="6c2901ad75dd6657c26f67d2e8fe6016fe3b4c9e28c5dc87bf397eadf9cf334eed587dff74bf12fc5815c3816c36e66531106376da462503113b9a4a6e1b22e409d64e9551db8730a20754", 0x4b}, {&(0x7f00000003c0)="aef4bc", 0x3}], 0x2, &(0x7f0000000500)=[@ip_tos_u8={{0x11, 0x0, 0x1, 0x7f}}, @ip_ttl={{0x14, 0x0, 0x2, 0x7}}, @ip_retopts={{0x3c, 0x0, 0x7, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0x27, 0xc2, [@multicast1, @initdev={0xac, 0x1e, 0x1, 0x0}, @local, @empty, @initdev={0xac, 0x1e, 0x1, 0x0}, @local, @empty, @loopback, @local]}]}}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0xf6}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @rand_addr=0x64010102, @loopback}}}, @ip_retopts={{0x7c, 0x0, 0x7, {[@cipso={0x86, 0x18, 0x3, [{0x7, 0xb, "756082bac6c2eca585"}, {0x0, 0x7, "96fb1b9434"}]}, @noop, @timestamp_addr={0x44, 0x1c, 0x70, 0x1, 0x5, [{@dev={0xac, 0x14, 0x14, 0xa}, 0x5}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x859c}, {@multicast2}]}, @noop, @noop, @timestamp_prespec={0x44, 0x34, 0x89, 0x3, 0x6, [{@local, 0x2}, {@dev={0xac, 0x14, 0x14, 0x13}, 0x1}, {@loopback, 0x80000000}, {@local, 0x7fffffff}, {@loopback, 0x2d}, {@remote}]}]}}}, @ip_retopts={{0x90, 0x0, 0x7, {[@timestamp_addr={0x44, 0x1c, 0xb7, 0x1, 0x7, [{@rand_addr=0x64010100, 0x5}, {@broadcast, 0x3}, {@loopback, 0xee7}]}, @timestamp_addr={0x44, 0x3c, 0xe3, 0x1, 0x9, [{@remote, 0x140f}, {@local}, {@remote, 0x6}, {@dev={0xac, 0x14, 0x14, 0x29}, 0x400}, {@broadcast, 0x289}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x1}, {@multicast1, 0x200}]}, @lsrr={0x83, 0x7, 0xe5, [@loopback]}, @cipso={0x86, 0x1e, 0x1, [{0x7, 0x11, "7772c89f5a16d467708d634b15a9c8"}, {0x2, 0x7, "9cdfa04d01"}]}]}}}], 0x1b8}}], 0x2, 0x24000014) ioctl$sock_SIOCGIFVLAN_GET_VLAN_INGRESS_PRIORITY_CMD(r1, 0x8982, &(0x7f0000000080)) ioctl$sock_SIOCADDRT(r1, 0x890b, &(0x7f0000000740)={0x0, @l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x1, 0x0}, 0x4}, @ethernet={0x1, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}}, @xdp={0x2c, 0x1, r3, 0x32}, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x6, 0x5, 0x3}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r2, 0x89f1, &(0x7f0000000880)={'gre0\x00', &(0x7f00000007c0)={'gretap0\x00', r4, 0x80, 0x20, 0x7, 0x3, {{0x20, 0x4, 0x3, 0x1d, 0x80, 0x64, 0x0, 0x79, 0x2f, 0x0, @broadcast, @empty, {[@ssrr={0x89, 0x7, 0x40, [@initdev={0xac, 0x1e, 0x1, 0x0}]}, @lsrr={0x83, 0x17, 0x77, [@local, @dev={0xac, 0x14, 0x14, 0x3c}, @private=0xa010100, @dev={0xac, 0x14, 0x14, 0x1e}, @local]}, @generic={0x7, 0x7, "85576ba11f"}, @rr={0x7, 0x1b, 0x5, [@local, @private=0xa010101, @private=0xa010100, @local, @private=0xa010100, @empty]}, @ra={0x94, 0x4, 0x1}, @rr={0x7, 0x27, 0x52, [@private=0xa010100, @initdev={0xac, 0x1e, 0x1, 0x0}, @dev={0xac, 0x14, 0x14, 0x25}, @dev={0xac, 0x14, 0x14, 0x3c}, @private=0xa010101, @rand_addr=0x64010100, @rand_addr=0x64010101, @initdev={0xac, 0x1e, 0x0, 0x0}, @multicast1]}]}}}}}) r5 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCSARP(r5, 0x8955, &(0x7f0000000000)={{0x2, 0x0, @local}, {0x0, @local}, 0x20, {0x2, 0x0, @local}, 'dummy0\x00'}) ioctl$F2FS_IOC_FLUSH_DEVICE(r5, 0x4008f50a, &(0x7f0000000040)={0x2, 0x100}) 15:09:21 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCSARP(r1, 0x8955, &(0x7f0000000000)={{0x2, 0x0, @local}, {0x0, @local}, 0x20, {0x2, 0x0, @local}, 'dummy0\x00'}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCSARP(r2, 0x8955, &(0x7f0000000000)={{0x2, 0x0, @local}, {0x0, @local}, 0x20, {0x2, 0x0, @local}, 'dummy0\x00'}) ioctl$sock_inet_SIOCSARP(r2, 0x8955, &(0x7f0000000180)={{0x2, 0x4e21, @local}, {0x1, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x42}}, 0x54, {0x2, 0x4e23, @empty}, 'veth1_to_bond\x00'}) sendfile(r1, 0xffffffffffffffff, 0x0, 0x2) sendfile(0xffffffffffffffff, r0, &(0x7f0000000140)=0x9, 0x1000) 15:09:21 executing program 4: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1c08a4, 0x0) r1 = syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) r2 = open$dir(&(0x7f0000000200)='./mnt\x00', 0x40040, 0x10) mkdirat(r2, &(0x7f0000000280)='mnt/encrypted_dir/../file0\x00', 0x20) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir/../file0\x00', 0x80, 0x3e4fcec92923ce05) r3 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x50008, 0x0, 0x10081, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r4 = openat(r1, &(0x7f0000000000)='mnt/encrypted_dir/../file0\x00', 0x40, 0x100) fsconfig$FSCONFIG_CMD_RECONFIGURE(0xffffffffffffffff, 0x7, 0x0, 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(0xffffffffffffffff, 0xc0406619, &(0x7f00000001c0)={@desc={0x1, 0x0, @desc2}}) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, &(0x7f0000000140)=',,\\\x00') futimesat(r4, &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0)={{0x0, 0xea60}}) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000680)=ANY=[@ANYBLOB="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", @ANYRES32, @ANYBLOB="02000000000000006d6e742f656e637279707465645f6469722f2e2e2f66696c653000"]) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') 15:09:21 executing program 2: r0 = syz_io_uring_setup(0x10000, 0x0, &(0x7f0000ff9000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0xc2, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x24}}, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) sendmsg$TIPC_CMD_GET_BEARER_NAMES(r2, &(0x7f00000002c0)={&(0x7f0000000100), 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x1c, 0x0, 0x800, 0x70bd2d, 0x25dfdbfe, {}, ["", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4040081}, 0x40000) fsetxattr$security_selinux(0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000080)='system_u:object_r:syslogd_var_lib_t:s0\x00', 0x27, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_ADD_NAN_FUNCTION(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000380)={&(0x7f0000000b00)=ANY=[], 0x508}, 0x1, 0x0, 0x0, 0x40804}, 0x4c880) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_TX_BITRATE_MASK(r4, &(0x7f0000001240)={0x0, 0x0, &(0x7f0000001200)={&(0x7f0000000780)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16=r5, @ANYBLOB="010000000000000000001f"], 0x2c}}, 0x0) sendmsg$NL80211_CMD_STOP_P2P_DEVICE(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000340), 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x14, r5, 0x200, 0x70bd2b, 0x25dfdbfc, {{}, {@void, @void}}, ["", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x2}, 0x800) r6 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0), 0x1, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, r0) bind$packet(0xffffffffffffffff, 0x0, 0x0) dup2(r2, r0) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, &(0x7f0000000200)={r1, 0x3, 0x1000}) sendmsg$NL80211_CMD_LEAVE_MESH(r6, &(0x7f0000000440)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000540)={&(0x7f0000000580)=ANY=[@ANYRESHEX, @ANYRES32=r3, @ANYBLOB="280026bd704a82694635b3deabe6a2667c2d1c3adfebc3eb70fc1fa0208b3772a8c835d5921dd32037c15349228b209bab0af2f5891564ec63be67faaa541420f62649002c4cf05512af108886f2cb99e31e3cc870559a1130bc57ea157c7e0171afc877bb82fc80277a7db70981209a350a0b9d5174434c09401868dcaff27ee0e4b3c5d261de8fb16cbb3b1bdfcea13d990eba924d4caf92f8da2d60ce009cade577212962a66417cd253fae116cab40dc87e1646575bd3dbc5c5554bb10", @ANYRES32, @ANYRESOCT], 0x28}, 0x1, 0x0, 0x0, 0x4040}, 0x80d4) syz_80211_join_ibss(&(0x7f0000000180)='wlan1\x00', &(0x7f00000001c0)=@default_ibss_ssid, 0x6, 0x0) 15:09:21 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x5407, 0x0) [ 243.640615] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 15:09:21 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x5407, &(0x7f0000000080)={0x0, 0x21, 0x4, 0x6633, 0xa, "bb09819e2f6e8485"}) 15:09:21 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCSARP(r1, 0x8955, &(0x7f0000000000)={{0x2, 0x0, @local}, {0x0, @local}, 0x20, {0x2, 0x0, @local}, 'dummy0\x00'}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCSARP(r2, 0x8955, &(0x7f0000000000)={{0x2, 0x0, @local}, {0x0, @local}, 0x20, {0x2, 0x0, @local}, 'dummy0\x00'}) ioctl$sock_inet_SIOCSARP(r2, 0x8955, &(0x7f0000000180)={{0x2, 0x4e21, @local}, {0x1, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x42}}, 0x54, {0x2, 0x4e23, @empty}, 'veth1_to_bond\x00'}) sendfile(r1, 0xffffffffffffffff, 0x0, 0x2) sendfile(0xffffffffffffffff, r0, &(0x7f0000000140)=0x9, 0x1000) [ 243.690804] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4479 comm=syz-executor.2 [ 243.693512] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.2'. 15:09:21 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x5407, &(0x7f0000000080)={0x0, 0x0, 0x4, 0x6633, 0xa, "bb09819e2f6e8485"}) 15:09:21 executing program 7: r0 = openat$ttyS3(0xffffffffffffff9c, 0x0, 0x400, 0x0) ioctl$TCSBRKP(r0, 0x5425, 0x994a) 15:09:21 executing program 1: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, 0x0) mount$bind(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180), 0x64000, 0x0) [ 243.736523] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 15:09:21 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x5407, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x6633, 0xa, "bb09819e2f6e8485"}) [ 243.762503] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 243.764113] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 243.770017] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready 15:09:21 executing program 4: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1c08a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) r1 = open$dir(&(0x7f0000000200)='./mnt\x00', 0x40040, 0x10) mkdirat(r1, &(0x7f0000000280)='mnt/encrypted_dir/../file0\x00', 0x20) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir/../file0\x00', 0x80, 0x3e4fcec92923ce05) r2 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x50008, 0x0, 0x10081, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r3 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r3, 0x7, 0x0, 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r3, 0xc0406619, &(0x7f00000001c0)={@desc={0x1, 0x0, @desc2}}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000140)=',,\\\x00') futimesat(0xffffffffffffffff, &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0)={{0x0, 0xea60}}) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000680)=ANY=[@ANYBLOB="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", @ANYRES32, @ANYBLOB="02000000000000006d6e742f656e637279707465645f6469722f2e2e2f66696c653000"]) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') [ 243.776712] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 243.782718] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4467 comm=syz-executor.2 [ 243.797019] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.2'. [ 243.804899] syz-executor.2 (4479) used greatest stack depth: 23640 bytes left 15:09:21 executing program 1: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, 0x0) mount$bind(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180), 0x64000, 0x0) [ 243.842733] syz-executor.2 (4467) used greatest stack depth: 23352 bytes left 15:09:21 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='autofs\x00', 0x400, &(0x7f00000001c0)='\x00') [ 243.907473] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 243.908969] autofs4:pid:4502:autofs_fill_super: called with bogus options 15:09:33 executing program 7: r0 = openat$ttyS3(0xffffffffffffff9c, 0x0, 0x400, 0x0) ioctl$TCSBRKP(r0, 0x5425, 0x994a) 15:09:33 executing program 5: socket$inet6_tcp(0xa, 0x1, 0x0) r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r0, 0x7, 0x0, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback={0x0, 0x2}}, 0x1c) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCSARP(r1, 0x8955, &(0x7f0000000000)={{0x2, 0x0, @local}, {0x0, @local}, 0x20, {0x2, 0x0, @local}, 'dummy0\x00'}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f00000004c0)={'tunl0\x00', &(0x7f0000000440)={'syztnl1\x00', 0x0, 0x1, 0x40, 0x9, 0xa739, {{0x9, 0x4, 0x1, 0x39, 0x24, 0x67, 0x0, 0x2, 0x2f, 0x0, @dev={0xac, 0x14, 0x14, 0xe}, @broadcast, {[@rr={0x7, 0xb, 0x9b, [@multicast2, @dev={0xac, 0x14, 0x14, 0x17}]}, @ra={0x94, 0x4, 0x1}]}}}}}) sendmmsg$inet(r2, &(0x7f00000006c0)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f00000000c0)="aabb302af2b9c74e05b23c1c2d7370a295080a2fb680d119b63eba4b8f9e451965870ecb95aaedb506511dbbfa62ee09bc95b5a3d815609c004e90db8673741c0469fdb1b7c95b61d12618011bbf05ea22016881bcacf50d30f8225c9e880dcb519ecb499d7999c5d89a1c0ce220f05912db93d5ccd8631dce6fbc43", 0x7c}, {&(0x7f0000000140)="ab0bfc4c06ce370794", 0x9}, {&(0x7f0000000180)="c39fc7", 0x3}, {&(0x7f00000001c0)="72217a9590386dc766662c63561fe7872fa6f272baa0623e5d7fc1e794257ab36ff078260842c84b657f2aa7e3188e8d9dd5cdd77a2f5295a5a699e30e7469e1121dfaf24710cbeea7b74418a427c178ee1bfc8c74ed7ae2c4c6200cc1edf7bb187dc3e68d7aa577cbb6e13b5a38cfe742966f744cfee5827557d21e61152cc55390bdee9729a1701b0f636fb87fb53e63ab3af489dd471a46a493d2ba389250e6670908f91468b545", 0xa9}], 0x4, &(0x7f00000002c0)=[@ip_tos_u8={{0x11, 0x0, 0x1, 0x80}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x1f}}], 0x30}}, {{&(0x7f0000000300)={0x2, 0x4e22, @empty}, 0x10, &(0x7f0000000400)=[{&(0x7f0000000340)="6c2901ad75dd6657c26f67d2e8fe6016fe3b4c9e28c5dc87bf397eadf9cf334eed587dff74bf12fc5815c3816c36e66531106376da462503113b9a4a6e1b22e409d64e9551db8730a20754", 0x4b}, {&(0x7f00000003c0)="aef4bc", 0x3}], 0x2, &(0x7f0000000500)=[@ip_tos_u8={{0x11, 0x0, 0x1, 0x7f}}, @ip_ttl={{0x14, 0x0, 0x2, 0x7}}, @ip_retopts={{0x3c, 0x0, 0x7, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0x27, 0xc2, [@multicast1, @initdev={0xac, 0x1e, 0x1, 0x0}, @local, @empty, @initdev={0xac, 0x1e, 0x1, 0x0}, @local, @empty, @loopback, @local]}]}}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0xf6}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @rand_addr=0x64010102, @loopback}}}, @ip_retopts={{0x7c, 0x0, 0x7, {[@cipso={0x86, 0x18, 0x3, [{0x7, 0xb, "756082bac6c2eca585"}, {0x0, 0x7, "96fb1b9434"}]}, @noop, @timestamp_addr={0x44, 0x1c, 0x70, 0x1, 0x5, [{@dev={0xac, 0x14, 0x14, 0xa}, 0x5}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x859c}, {@multicast2}]}, @noop, @noop, @timestamp_prespec={0x44, 0x34, 0x89, 0x3, 0x6, [{@local, 0x2}, {@dev={0xac, 0x14, 0x14, 0x13}, 0x1}, {@loopback, 0x80000000}, {@local, 0x7fffffff}, {@loopback, 0x2d}, {@remote}]}]}}}, @ip_retopts={{0x90, 0x0, 0x7, {[@timestamp_addr={0x44, 0x1c, 0xb7, 0x1, 0x7, [{@rand_addr=0x64010100, 0x5}, {@broadcast, 0x3}, {@loopback, 0xee7}]}, @timestamp_addr={0x44, 0x3c, 0xe3, 0x1, 0x9, [{@remote, 0x140f}, {@local}, {@remote, 0x6}, {@dev={0xac, 0x14, 0x14, 0x29}, 0x400}, {@broadcast, 0x289}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x1}, {@multicast1, 0x200}]}, @lsrr={0x83, 0x7, 0xe5, [@loopback]}, @cipso={0x86, 0x1e, 0x1, [{0x7, 0x11, "7772c89f5a16d467708d634b15a9c8"}, {0x2, 0x7, "9cdfa04d01"}]}]}}}], 0x1b8}}], 0x2, 0x24000014) ioctl$sock_SIOCGIFVLAN_GET_VLAN_INGRESS_PRIORITY_CMD(r1, 0x8982, &(0x7f0000000080)) ioctl$sock_SIOCADDRT(r1, 0x890b, &(0x7f0000000740)={0x0, @l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x1, 0x0}, 0x4}, @ethernet={0x1, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}}, @xdp={0x2c, 0x1, r3, 0x32}, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x6, 0x5, 0x3}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r2, 0x89f1, &(0x7f0000000880)={'gre0\x00', &(0x7f00000007c0)={'gretap0\x00', r4, 0x80, 0x20, 0x7, 0x3, {{0x20, 0x4, 0x3, 0x1d, 0x80, 0x64, 0x0, 0x79, 0x2f, 0x0, @broadcast, @empty, {[@ssrr={0x89, 0x7, 0x40, [@initdev={0xac, 0x1e, 0x1, 0x0}]}, @lsrr={0x83, 0x17, 0x77, [@local, @dev={0xac, 0x14, 0x14, 0x3c}, @private=0xa010100, @dev={0xac, 0x14, 0x14, 0x1e}, @local]}, @generic={0x7, 0x7, "85576ba11f"}, @rr={0x7, 0x1b, 0x5, [@local, @private=0xa010101, @private=0xa010100, @local, @private=0xa010100, @empty]}, @ra={0x94, 0x4, 0x1}, @rr={0x7, 0x27, 0x52, [@private=0xa010100, @initdev={0xac, 0x1e, 0x1, 0x0}, @dev={0xac, 0x14, 0x14, 0x25}, @dev={0xac, 0x14, 0x14, 0x3c}, @private=0xa010101, @rand_addr=0x64010100, @rand_addr=0x64010101, @initdev={0xac, 0x1e, 0x0, 0x0}, @multicast1]}]}}}}}) r5 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCSARP(r5, 0x8955, &(0x7f0000000000)={{0x2, 0x0, @local}, {0x0, @local}, 0x20, {0x2, 0x0, @local}, 'dummy0\x00'}) ioctl$F2FS_IOC_FLUSH_DEVICE(r5, 0x4008f50a, &(0x7f0000000040)={0x2, 0x100}) 15:09:33 executing program 4: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1c08a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) r1 = open$dir(&(0x7f0000000200)='./mnt\x00', 0x40040, 0x10) mkdirat(r1, &(0x7f0000000280)='mnt/encrypted_dir/../file0\x00', 0x20) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir/../file0\x00', 0x80, 0x3e4fcec92923ce05) r2 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x50008, 0x0, 0x10081, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r3 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r3, 0x7, 0x0, 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r3, 0xc0406619, &(0x7f00000001c0)={@desc={0x1, 0x0, @desc2}}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000140)=',,\\\x00') futimesat(0xffffffffffffffff, &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0)={{0x0, 0xea60}}) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000680)=ANY=[@ANYBLOB="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", @ANYRES32, @ANYBLOB="02000000000000006d6e742f656e637279707465645f6469722f2e2e2f66696c653000"]) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') 15:09:33 executing program 1: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, 0x0, &(0x7f0000000040)='proc\x00', 0x0, 0x0) mount$bind(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180), 0x64000, 0x0) 15:09:33 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x5407, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0xa, "bb09819e2f6e8485"}) 15:09:33 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCSARP(r1, 0x8955, &(0x7f0000000000)={{0x2, 0x0, @local}, {0x0, @local}, 0x20, {0x2, 0x0, @local}, 'dummy0\x00'}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCSARP(r2, 0x8955, &(0x7f0000000000)={{0x2, 0x0, @local}, {0x0, @local}, 0x20, {0x2, 0x0, @local}, 'dummy0\x00'}) ioctl$sock_inet_SIOCSARP(r2, 0x8955, &(0x7f0000000180)={{0x2, 0x4e21, @local}, {0x1, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x42}}, 0x54, {0x2, 0x4e23, @empty}, 'veth1_to_bond\x00'}) sendfile(r1, 0xffffffffffffffff, 0x0, 0x2) sendfile(0xffffffffffffffff, r0, &(0x7f0000000140)=0x9, 0x1000) 15:09:33 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='autofs\x00', 0x400, &(0x7f00000001c0)='\x00') 15:09:33 executing program 3: syz_io_uring_setup(0x10000, 0x0, &(0x7f0000ff9000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0xc2, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$FIOCLEX(r0, 0x5451) sendmsg$nl_generic(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000840)=ANY=[@ANYBLOB="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"], 0x24}}, 0x0) r2 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x80, 0x0, 0x0, 0x0, 0x7, 0x0, 0x87}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f0000000340)={0x1, &(0x7f0000000300)=[{0x9, 0x81, 0x0, 0x1ff}]}) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r2) fsetxattr$security_selinux(0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000080)='system_u:object_r:syslogd_var_lib_t:s0\x00', 0x27, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000240)={0x0, @aes128, 0x0, @desc4}) r4 = socket$inet(0x2, 0x4, 0x104) getsockname(r4, 0x0, &(0x7f0000000080)) r5 = fcntl$dupfd(r1, 0x406, r1) perf_event_open(&(0x7f0000000580)={0x2, 0x80, 0x6, 0xa1, 0x8, 0x3f, 0x0, 0xc, 0xa0, 0x6, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x8004, 0x2, 0xff, 0x7, 0xffffffff, 0x337, 0x4, 0x0, 0x9f3597d, 0x0, 0xffffffff}, 0xffffffffffffffff, 0x10, r5, 0xa) sendmsg$NL80211_CMD_LEAVE_MESH(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000540)={&(0x7f0000000600)=ANY=[@ANYRESHEX=r2, @ANYRES32=r3, @ANYBLOB="280026bd70ca826946dfaf5ca6287962bdc5ba09409857df8ca8d9211e0d8347b4ff65bb806b08b7ca0e6e4140156a37d225e825d86975ec85fb6af6ba4355d981000000112f81675387108e5f4156e1f305683505b43056f564caad1e4cb86ee92d3d7fe0c2970a00"/117, @ANYRES32, @ANYRESOCT], 0x28}, 0x1, 0x0, 0x0, 0x4040}, 0x80d4) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) ioctl$BTRFS_IOC_QUOTA_RESCAN_STATUS(0xffffffffffffffff, 0x8040942d, &(0x7f0000000280)) syz_80211_join_ibss(&(0x7f0000000180)='wlan0\x00', &(0x7f00000001c0)=@random="a83a25", 0x3, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0xfffffffffffffff9, 0x0, 0x0, 0x2000004, 0x0) [ 255.546988] autofs4:pid:4522:autofs_fill_super: called with bogus options [ 255.548894] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 15:09:33 executing program 7: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCSBRKP(r0, 0x5425, 0x994a) 15:09:33 executing program 1: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, 0x0, &(0x7f0000000040)='proc\x00', 0x0, 0x0) mount$bind(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180), 0x64000, 0x0) 15:09:33 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='autofs\x00', 0x400, &(0x7f00000001c0)='\x00') 15:09:33 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x5407, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "bb09819e2f6e8485"}) 15:09:33 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCSARP(r1, 0x8955, &(0x7f0000000000)={{0x2, 0x0, @local}, {0x0, @local}, 0x20, {0x2, 0x0, @local}, 'dummy0\x00'}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCSARP(r2, 0x8955, &(0x7f0000000000)={{0x2, 0x0, @local}, {0x0, @local}, 0x20, {0x2, 0x0, @local}, 'dummy0\x00'}) ioctl$sock_inet_SIOCSARP(r2, 0x8955, &(0x7f0000000180)={{0x2, 0x4e21, @local}, {0x1, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x42}}, 0x54, {0x2, 0x4e23, @empty}, 'veth1_to_bond\x00'}) r3 = socket$inet_udplite(0x2, 0x2, 0x88) sendfile(r3, r0, &(0x7f0000000140)=0x9, 0x1000) 15:09:33 executing program 4: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1c08a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) r1 = open$dir(&(0x7f0000000200)='./mnt\x00', 0x40040, 0x10) mkdirat(r1, &(0x7f0000000280)='mnt/encrypted_dir/../file0\x00', 0x20) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir/../file0\x00', 0x80, 0x3e4fcec92923ce05) r2 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x50008, 0x0, 0x10081, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r3 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r3, 0x7, 0x0, 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r3, 0xc0406619, &(0x7f00000001c0)={@desc={0x1, 0x0, @desc2}}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000140)=',,\\\x00') futimesat(0xffffffffffffffff, &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0)={{0x0, 0xea60}}) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000680)=ANY=[@ANYBLOB="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", @ANYRES32, @ANYBLOB="02000000000000006d6e742f656e637279707465645f6469722f2e2e2f66696c653000"]) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') [ 255.708533] autofs4:pid:4540:autofs_fill_super: called with bogus options 15:09:33 executing program 1: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, 0x0, &(0x7f0000000040)='proc\x00', 0x0, 0x0) mount$bind(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180), 0x64000, 0x0) 15:09:47 executing program 7: openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCSBRKP(0xffffffffffffffff, 0x5425, 0x994a) 15:09:47 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='autofs\x00', 0x400, &(0x7f00000001c0)='\x00') [ 269.335689] FAULT_INJECTION: forcing a failure. [ 269.335689] name fail_usercopy, interval 1, probability 0, space 0, times 1 [ 269.338940] CPU: 1 PID: 4564 Comm: syz-executor.0 Not tainted 5.10.250 #1 [ 269.340349] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 269.342080] Call Trace: [ 269.342634] dump_stack+0x107/0x167 [ 269.343396] should_fail.cold+0x5/0xa [ 269.344196] _copy_from_user+0x2e/0x1b0 [ 269.345026] set_termios.part.0+0x6ad/0x8a0 [ 269.345919] ? mark_lock+0xf5/0x2df0 [ 269.346699] ? tty_termios_hw_change+0x1e0/0x1e0 [ 269.347700] ? lock_acquire+0x197/0x470 [ 269.348568] ? tty_ldisc_ref_wait+0x22/0x90 [ 269.349501] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 269.350587] tty_mode_ioctl+0xe2d/0xf40 [ 269.351422] ? set_termios.part.0+0x8a0/0x8a0 [ 269.352366] ? __ldsem_down_read_nested+0xe1/0x7e0 [ 269.353396] ? __ldsem_wake_readers+0x3d0/0x3d0 [ 269.354422] n_tty_ioctl_helper+0x55/0x3a0 [ 269.355570] n_tty_ioctl+0x56/0x370 [ 269.356518] tty_ioctl+0x912/0x18b0 [ 269.357519] ? n_tty_write_wakeup+0x40/0x40 [ 269.358643] ? tty_fasync+0x390/0x390 [ 269.359679] ? ioctl_has_perm.constprop.0.isra.0+0x29a/0x410 [ 269.361326] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 269.362750] ? do_vfs_ioctl+0x283/0x10d0 [ 269.363853] ? selinux_bprm_creds_for_exec+0xb60/0xb60 [ 269.365144] ? generic_block_fiemap+0x60/0x60 [ 269.366314] ? lock_downgrade+0x6d0/0x6d0 [ 269.367415] ? __mutex_unlock_slowpath+0xe1/0x600 [ 269.368699] ? wait_for_completion_io+0x270/0x270 [ 269.369921] ? selinux_file_ioctl+0xb6/0x270 [ 269.370979] ? tty_fasync+0x390/0x390 [ 269.371779] __x64_sys_ioctl+0x19a/0x210 [ 269.372644] do_syscall_64+0x33/0x40 [ 269.373458] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 269.374540] RIP: 0033:0x7f1ac436db19 [ 269.375314] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 269.379204] RSP: 002b:00007f1ac18e3188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 269.380792] RAX: ffffffffffffffda RBX: 00007f1ac4480f60 RCX: 00007f1ac436db19 [ 269.382284] RDX: 0000000020000080 RSI: 0000000000005407 RDI: 0000000000000003 [ 269.383778] RBP: 00007f1ac18e31d0 R08: 0000000000000000 R09: 0000000000000000 [ 269.385255] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 269.386744] R13: 00007fffd7624a6f R14: 00007f1ac18e3300 R15: 0000000000022000 [ 269.400064] autofs4:pid:4557:autofs_fill_super: called with bogus options 15:09:47 executing program 1: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) mount$bind(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180), 0x64000, 0x0) 15:09:47 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCSARP(r1, 0x8955, &(0x7f0000000000)={{0x2, 0x0, @local}, {0x0, @local}, 0x20, {0x2, 0x0, @local}, 'dummy0\x00'}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCSARP(r2, 0x8955, &(0x7f0000000000)={{0x2, 0x0, @local}, {0x0, @local}, 0x20, {0x2, 0x0, @local}, 'dummy0\x00'}) r3 = socket$inet_udplite(0x2, 0x2, 0x88) sendfile(r3, r0, &(0x7f0000000140)=0x9, 0x1000) 15:09:47 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, 0x13, r0, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x49, 0xbc, 0xae, 0x0, 0x5, 0x200, 0x2, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000000), 0x2}, 0x1000, 0x0, 0x3, 0x0, 0xfffffffffffffffe, 0x6, 0x800, 0x0, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x7, r0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, 0xffffffffffffffff) 15:09:47 executing program 5: socket$inet6_tcp(0xa, 0x1, 0x0) r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r0, 0x7, 0x0, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback={0x0, 0x2}}, 0x1c) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCSARP(r1, 0x8955, &(0x7f0000000000)={{0x2, 0x0, @local}, {0x0, @local}, 0x20, {0x2, 0x0, @local}, 'dummy0\x00'}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f00000004c0)={'tunl0\x00', &(0x7f0000000440)={'syztnl1\x00', 0x0, 0x1, 0x40, 0x9, 0xa739, {{0x9, 0x4, 0x1, 0x39, 0x24, 0x67, 0x0, 0x2, 0x2f, 0x0, @dev={0xac, 0x14, 0x14, 0xe}, @broadcast, {[@rr={0x7, 0xb, 0x9b, [@multicast2, @dev={0xac, 0x14, 0x14, 0x17}]}, @ra={0x94, 0x4, 0x1}]}}}}}) sendmmsg$inet(r2, &(0x7f00000006c0)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f00000000c0)="aabb302af2b9c74e05b23c1c2d7370a295080a2fb680d119b63eba4b8f9e451965870ecb95aaedb506511dbbfa62ee09bc95b5a3d815609c004e90db8673741c0469fdb1b7c95b61d12618011bbf05ea22016881bcacf50d30f8225c9e880dcb519ecb499d7999c5d89a1c0ce220f05912db93d5ccd8631dce6fbc43", 0x7c}, {&(0x7f0000000140)="ab0bfc4c06ce370794", 0x9}, {&(0x7f0000000180)="c39fc7", 0x3}, {&(0x7f00000001c0)="72217a9590386dc766662c63561fe7872fa6f272baa0623e5d7fc1e794257ab36ff078260842c84b657f2aa7e3188e8d9dd5cdd77a2f5295a5a699e30e7469e1121dfaf24710cbeea7b74418a427c178ee1bfc8c74ed7ae2c4c6200cc1edf7bb187dc3e68d7aa577cbb6e13b5a38cfe742966f744cfee5827557d21e61152cc55390bdee9729a1701b0f636fb87fb53e63ab3af489dd471a46a493d2ba389250e6670908f91468b545", 0xa9}], 0x4, &(0x7f00000002c0)=[@ip_tos_u8={{0x11, 0x0, 0x1, 0x80}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x1f}}], 0x30}}, {{&(0x7f0000000300)={0x2, 0x4e22, @empty}, 0x10, &(0x7f0000000400)=[{&(0x7f0000000340)="6c2901ad75dd6657c26f67d2e8fe6016fe3b4c9e28c5dc87bf397eadf9cf334eed587dff74bf12fc5815c3816c36e66531106376da462503113b9a4a6e1b22e409d64e9551db8730a20754", 0x4b}, {&(0x7f00000003c0)="aef4bc", 0x3}], 0x2, &(0x7f0000000500)=[@ip_tos_u8={{0x11, 0x0, 0x1, 0x7f}}, @ip_ttl={{0x14, 0x0, 0x2, 0x7}}, @ip_retopts={{0x3c, 0x0, 0x7, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0x27, 0xc2, [@multicast1, @initdev={0xac, 0x1e, 0x1, 0x0}, @local, @empty, @initdev={0xac, 0x1e, 0x1, 0x0}, @local, @empty, @loopback, @local]}]}}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0xf6}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @rand_addr=0x64010102, @loopback}}}, @ip_retopts={{0x7c, 0x0, 0x7, {[@cipso={0x86, 0x18, 0x3, [{0x7, 0xb, "756082bac6c2eca585"}, {0x0, 0x7, "96fb1b9434"}]}, @noop, @timestamp_addr={0x44, 0x1c, 0x70, 0x1, 0x5, [{@dev={0xac, 0x14, 0x14, 0xa}, 0x5}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x859c}, {@multicast2}]}, @noop, @noop, @timestamp_prespec={0x44, 0x34, 0x89, 0x3, 0x6, [{@local, 0x2}, {@dev={0xac, 0x14, 0x14, 0x13}, 0x1}, {@loopback, 0x80000000}, {@local, 0x7fffffff}, {@loopback, 0x2d}, {@remote}]}]}}}, @ip_retopts={{0x90, 0x0, 0x7, {[@timestamp_addr={0x44, 0x1c, 0xb7, 0x1, 0x7, [{@rand_addr=0x64010100, 0x5}, {@broadcast, 0x3}, {@loopback, 0xee7}]}, @timestamp_addr={0x44, 0x3c, 0xe3, 0x1, 0x9, [{@remote, 0x140f}, {@local}, {@remote, 0x6}, {@dev={0xac, 0x14, 0x14, 0x29}, 0x400}, {@broadcast, 0x289}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x1}, {@multicast1, 0x200}]}, @lsrr={0x83, 0x7, 0xe5, [@loopback]}, @cipso={0x86, 0x1e, 0x1, [{0x7, 0x11, "7772c89f5a16d467708d634b15a9c8"}, {0x2, 0x7, "9cdfa04d01"}]}]}}}], 0x1b8}}], 0x2, 0x24000014) ioctl$sock_SIOCGIFVLAN_GET_VLAN_INGRESS_PRIORITY_CMD(r1, 0x8982, &(0x7f0000000080)) ioctl$sock_SIOCADDRT(r1, 0x890b, &(0x7f0000000740)={0x0, @l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x1, 0x0}, 0x4}, @ethernet={0x1, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}}, @xdp={0x2c, 0x1, r3, 0x32}, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x6, 0x5, 0x3}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r2, 0x89f1, &(0x7f0000000880)={'gre0\x00', &(0x7f00000007c0)={'gretap0\x00', r4, 0x80, 0x20, 0x7, 0x3, {{0x20, 0x4, 0x3, 0x1d, 0x80, 0x64, 0x0, 0x79, 0x2f, 0x0, @broadcast, @empty, {[@ssrr={0x89, 0x7, 0x40, [@initdev={0xac, 0x1e, 0x1, 0x0}]}, @lsrr={0x83, 0x17, 0x77, [@local, @dev={0xac, 0x14, 0x14, 0x3c}, @private=0xa010100, @dev={0xac, 0x14, 0x14, 0x1e}, @local]}, @generic={0x7, 0x7, "85576ba11f"}, @rr={0x7, 0x1b, 0x5, [@local, @private=0xa010101, @private=0xa010100, @local, @private=0xa010100, @empty]}, @ra={0x94, 0x4, 0x1}, @rr={0x7, 0x27, 0x52, [@private=0xa010100, @initdev={0xac, 0x1e, 0x1, 0x0}, @dev={0xac, 0x14, 0x14, 0x25}, @dev={0xac, 0x14, 0x14, 0x3c}, @private=0xa010101, @rand_addr=0x64010100, @rand_addr=0x64010101, @initdev={0xac, 0x1e, 0x0, 0x0}, @multicast1]}]}}}}}) r5 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCSARP(r5, 0x8955, &(0x7f0000000000)={{0x2, 0x0, @local}, {0x0, @local}, 0x20, {0x2, 0x0, @local}, 'dummy0\x00'}) 15:09:47 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x5407, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "bb09819e2f6e8485"}) (fail_nth: 1) 15:09:47 executing program 4: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1c08a4, 0x0) r1 = syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) r2 = open$dir(&(0x7f0000000200)='./mnt\x00', 0x40040, 0x10) mkdirat(r2, &(0x7f0000000280)='mnt/encrypted_dir/../file0\x00', 0x20) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir/../file0\x00', 0x80, 0x3e4fcec92923ce05) r3 = openat(r1, &(0x7f0000000000)='mnt/encrypted_dir/../file0\x00', 0x40, 0x100) r4 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r4, 0x7, 0x0, 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r4, 0xc0406619, &(0x7f00000001c0)={@desc={0x1, 0x0, @desc2}}) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000140)=',,\\\x00') futimesat(r3, &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0)={{0x0, 0xea60}}) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000680)=ANY=[@ANYBLOB="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", @ANYRES32, @ANYBLOB="02000000000000006d6e742f656e637279707465645f6469722f2e2e2f66696c653000"]) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') 15:09:47 executing program 7: openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCSBRKP(0xffffffffffffffff, 0x5425, 0x994a) 15:09:47 executing program 2: mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='autofs\x00', 0x400, &(0x7f00000001c0)='\x00') 15:09:47 executing program 1: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) mount$bind(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180), 0x64000, 0x0) 15:09:47 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCSARP(r1, 0x8955, &(0x7f0000000000)={{0x2, 0x0, @local}, {0x0, @local}, 0x20, {0x2, 0x0, @local}, 'dummy0\x00'}) socket$inet_udplite(0x2, 0x2, 0x88) r2 = socket$inet_udplite(0x2, 0x2, 0x88) sendfile(r2, r0, &(0x7f0000000140)=0x9, 0x1000) 15:09:47 executing program 4: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1c08a4, 0x0) r1 = syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) r2 = open$dir(&(0x7f0000000200)='./mnt\x00', 0x40040, 0x10) mkdirat(r2, &(0x7f0000000280)='mnt/encrypted_dir/../file0\x00', 0x20) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir/../file0\x00', 0x80, 0x3e4fcec92923ce05) r3 = openat(r1, &(0x7f0000000000)='mnt/encrypted_dir/../file0\x00', 0x40, 0x100) r4 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r4, 0x7, 0x0, 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r4, 0xc0406619, &(0x7f00000001c0)={@desc={0x1, 0x0, @desc2}}) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000140)=',,\\\x00') futimesat(r3, &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0)={{0x0, 0xea60}}) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000680)=ANY=[@ANYBLOB="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", @ANYRES32, @ANYBLOB="02000000000000006d6e742f656e637279707465645f6469722f2e2e2f66696c653000"]) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') 15:09:47 executing program 7: openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCSBRKP(0xffffffffffffffff, 0x5425, 0x994a) 15:09:47 executing program 2: mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='autofs\x00', 0x400, &(0x7f00000001c0)='\x00') [ 269.590326] audit: type=1400 audit(1771168187.307:12): avc: denied { read } for pid=4563 comm="syz-executor.3" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=perf_event permissive=1 15:09:59 executing program 2: mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='autofs\x00', 0x400, &(0x7f00000001c0)='\x00') 15:09:59 executing program 7: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCSBRKP(r0, 0x5425, 0x0) 15:09:59 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCSARP(r1, 0x8955, &(0x7f0000000000)={{0x2, 0x0, @local}, {0x0, @local}, 0x20, {0x2, 0x0, @local}, 'dummy0\x00'}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) sendfile(r2, r0, &(0x7f0000000140)=0x9, 0x1000) 15:09:59 executing program 4: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1c08a4, 0x0) r1 = syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) r2 = open$dir(&(0x7f0000000200)='./mnt\x00', 0x40040, 0x10) mkdirat(r2, &(0x7f0000000280)='mnt/encrypted_dir/../file0\x00', 0x20) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir/../file0\x00', 0x80, 0x3e4fcec92923ce05) r3 = openat(r1, &(0x7f0000000000)='mnt/encrypted_dir/../file0\x00', 0x40, 0x100) r4 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r4, 0x7, 0x0, 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r4, 0xc0406619, &(0x7f00000001c0)={@desc={0x1, 0x0, @desc2}}) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000140)=',,\\\x00') futimesat(r3, &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0)={{0x0, 0xea60}}) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000680)=ANY=[@ANYBLOB="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", @ANYRES32, @ANYBLOB="02000000000000006d6e742f656e637279707465645f6469722f2e2e2f66696c653000"]) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') 15:09:59 executing program 1: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) mount$bind(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180), 0x64000, 0x0) 15:09:59 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, 0x13, r0, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x49, 0xbc, 0xae, 0x0, 0x5, 0x200, 0x2, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000000), 0x2}, 0x1000, 0x0, 0x3, 0x0, 0xfffffffffffffffe, 0x6, 0x800, 0x0, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x7, r0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, 0xffffffffffffffff) 15:09:59 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x5407, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "bb09819e2f6e8485"}) (fail_nth: 2) 15:09:59 executing program 5: socket$inet6_tcp(0xa, 0x1, 0x0) r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r0, 0x7, 0x0, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback={0x0, 0x2}}, 0x1c) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCSARP(r1, 0x8955, &(0x7f0000000000)={{0x2, 0x0, @local}, {0x0, @local}, 0x20, {0x2, 0x0, @local}, 'dummy0\x00'}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f00000004c0)={'tunl0\x00', &(0x7f0000000440)={'syztnl1\x00', 0x0, 0x1, 0x40, 0x9, 0xa739, {{0x9, 0x4, 0x1, 0x39, 0x24, 0x67, 0x0, 0x2, 0x2f, 0x0, @dev={0xac, 0x14, 0x14, 0xe}, @broadcast, {[@rr={0x7, 0xb, 0x9b, [@multicast2, @dev={0xac, 0x14, 0x14, 0x17}]}, @ra={0x94, 0x4, 0x1}]}}}}}) sendmmsg$inet(r2, &(0x7f00000006c0)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f00000000c0)="aabb302af2b9c74e05b23c1c2d7370a295080a2fb680d119b63eba4b8f9e451965870ecb95aaedb506511dbbfa62ee09bc95b5a3d815609c004e90db8673741c0469fdb1b7c95b61d12618011bbf05ea22016881bcacf50d30f8225c9e880dcb519ecb499d7999c5d89a1c0ce220f05912db93d5ccd8631dce6fbc43", 0x7c}, {&(0x7f0000000140)="ab0bfc4c06ce370794", 0x9}, {&(0x7f0000000180)="c39fc7", 0x3}, {&(0x7f00000001c0)="72217a9590386dc766662c63561fe7872fa6f272baa0623e5d7fc1e794257ab36ff078260842c84b657f2aa7e3188e8d9dd5cdd77a2f5295a5a699e30e7469e1121dfaf24710cbeea7b74418a427c178ee1bfc8c74ed7ae2c4c6200cc1edf7bb187dc3e68d7aa577cbb6e13b5a38cfe742966f744cfee5827557d21e61152cc55390bdee9729a1701b0f636fb87fb53e63ab3af489dd471a46a493d2ba389250e6670908f91468b545", 0xa9}], 0x4, &(0x7f00000002c0)=[@ip_tos_u8={{0x11, 0x0, 0x1, 0x80}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x1f}}], 0x30}}, {{&(0x7f0000000300)={0x2, 0x4e22, @empty}, 0x10, &(0x7f0000000400)=[{&(0x7f0000000340)="6c2901ad75dd6657c26f67d2e8fe6016fe3b4c9e28c5dc87bf397eadf9cf334eed587dff74bf12fc5815c3816c36e66531106376da462503113b9a4a6e1b22e409d64e9551db8730a20754", 0x4b}, {&(0x7f00000003c0)="aef4bc", 0x3}], 0x2, &(0x7f0000000500)=[@ip_tos_u8={{0x11, 0x0, 0x1, 0x7f}}, @ip_ttl={{0x14, 0x0, 0x2, 0x7}}, @ip_retopts={{0x3c, 0x0, 0x7, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0x27, 0xc2, [@multicast1, @initdev={0xac, 0x1e, 0x1, 0x0}, @local, @empty, @initdev={0xac, 0x1e, 0x1, 0x0}, @local, @empty, @loopback, @local]}]}}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0xf6}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @rand_addr=0x64010102, @loopback}}}, @ip_retopts={{0x7c, 0x0, 0x7, {[@cipso={0x86, 0x18, 0x3, [{0x7, 0xb, "756082bac6c2eca585"}, {0x0, 0x7, "96fb1b9434"}]}, @noop, @timestamp_addr={0x44, 0x1c, 0x70, 0x1, 0x5, [{@dev={0xac, 0x14, 0x14, 0xa}, 0x5}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x859c}, {@multicast2}]}, @noop, @noop, @timestamp_prespec={0x44, 0x34, 0x89, 0x3, 0x6, [{@local, 0x2}, {@dev={0xac, 0x14, 0x14, 0x13}, 0x1}, {@loopback, 0x80000000}, {@local, 0x7fffffff}, {@loopback, 0x2d}, {@remote}]}]}}}, @ip_retopts={{0x90, 0x0, 0x7, {[@timestamp_addr={0x44, 0x1c, 0xb7, 0x1, 0x7, [{@rand_addr=0x64010100, 0x5}, {@broadcast, 0x3}, {@loopback, 0xee7}]}, @timestamp_addr={0x44, 0x3c, 0xe3, 0x1, 0x9, [{@remote, 0x140f}, {@local}, {@remote, 0x6}, {@dev={0xac, 0x14, 0x14, 0x29}, 0x400}, {@broadcast, 0x289}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x1}, {@multicast1, 0x200}]}, @lsrr={0x83, 0x7, 0xe5, [@loopback]}, @cipso={0x86, 0x1e, 0x1, [{0x7, 0x11, "7772c89f5a16d467708d634b15a9c8"}, {0x2, 0x7, "9cdfa04d01"}]}]}}}], 0x1b8}}], 0x2, 0x24000014) ioctl$sock_SIOCGIFVLAN_GET_VLAN_INGRESS_PRIORITY_CMD(r1, 0x8982, &(0x7f0000000080)) ioctl$sock_SIOCADDRT(r1, 0x890b, &(0x7f0000000740)={0x0, @l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x1, 0x0}, 0x4}, @ethernet={0x1, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}}, @xdp={0x2c, 0x1, r3, 0x32}, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x6, 0x5, 0x3}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r2, 0x89f1, &(0x7f0000000880)={'gre0\x00', &(0x7f00000007c0)={'gretap0\x00', r4, 0x80, 0x20, 0x7, 0x3, {{0x20, 0x4, 0x3, 0x1d, 0x80, 0x64, 0x0, 0x79, 0x2f, 0x0, @broadcast, @empty, {[@ssrr={0x89, 0x7, 0x40, [@initdev={0xac, 0x1e, 0x1, 0x0}]}, @lsrr={0x83, 0x17, 0x77, [@local, @dev={0xac, 0x14, 0x14, 0x3c}, @private=0xa010100, @dev={0xac, 0x14, 0x14, 0x1e}, @local]}, @generic={0x7, 0x7, "85576ba11f"}, @rr={0x7, 0x1b, 0x5, [@local, @private=0xa010101, @private=0xa010100, @local, @private=0xa010100, @empty]}, @ra={0x94, 0x4, 0x1}, @rr={0x7, 0x27, 0x52, [@private=0xa010100, @initdev={0xac, 0x1e, 0x1, 0x0}, @dev={0xac, 0x14, 0x14, 0x25}, @dev={0xac, 0x14, 0x14, 0x3c}, @private=0xa010101, @rand_addr=0x64010100, @rand_addr=0x64010101, @initdev={0xac, 0x1e, 0x0, 0x0}, @multicast1]}]}}}}}) socket$inet_udplite(0x2, 0x2, 0x88) [ 282.106441] FAULT_INJECTION: forcing a failure. [ 282.106441] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 282.109732] CPU: 1 PID: 4612 Comm: syz-executor.0 Not tainted 5.10.250 #1 [ 282.111512] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 282.113615] Call Trace: [ 282.114298] dump_stack+0x107/0x167 [ 282.115243] should_fail.cold+0x5/0xa [ 282.116253] _copy_to_user+0x2e/0x180 [ 282.117235] simple_read_from_buffer+0xcc/0x160 [ 282.118462] proc_fail_nth_read+0x198/0x230 [ 282.119400] ? proc_sessionid_read+0x230/0x230 [ 282.120580] ? security_file_permission+0xb1/0xe0 [ 282.121626] ? proc_sessionid_read+0x230/0x230 [ 282.122817] vfs_read+0x228/0x620 [ 282.123575] ksys_read+0x12d/0x260 [ 282.124487] ? vfs_write+0xb10/0xb10 [ 282.125300] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 282.126669] ? syscall_enter_from_user_mode+0x1d/0x50 [ 282.127786] do_syscall_64+0x33/0x40 [ 282.128585] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 282.129683] RIP: 0033:0x7f1ac432069c [ 282.130504] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 282.134417] RSP: 002b:00007f1ac18e3170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 282.136038] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f1ac432069c [ 282.137551] RDX: 000000000000000f RSI: 00007f1ac18e31e0 RDI: 0000000000000004 [ 282.139074] RBP: 00007f1ac18e31d0 R08: 0000000000000000 R09: 0000000000000000 [ 282.140588] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 282.142127] R13: 00007fffd7624a6f R14: 00007f1ac18e3300 R15: 0000000000022000 15:09:59 executing program 2: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='autofs\x00', 0x400, &(0x7f00000001c0)='\x00') 15:09:59 executing program 1: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, 0x0) mount$bind(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180), 0x64000, 0x0) 15:09:59 executing program 3: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1c08a4, 0x0) r1 = syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) r2 = open$dir(&(0x7f0000000200)='./mnt\x00', 0x40040, 0x10) mkdirat(r2, &(0x7f0000000280)='mnt/encrypted_dir/../file0\x00', 0x20) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir/../file0\x00', 0x80, 0x3e4fcec92923ce05) r3 = openat(r1, &(0x7f0000000000)='mnt/encrypted_dir/../file0\x00', 0x40, 0x100) r4 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r4, 0x7, 0x0, 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r4, 0xc0406619, &(0x7f00000001c0)={@desc={0x1, 0x0, @desc2}}) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000140)=',,\\\x00') futimesat(r3, &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0)={{0x0, 0xea60}}) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000680)=ANY=[@ANYBLOB="b00900000000000018000000468a29458f2709d329f6d3f3917408961482081d984538af2f9bcf61c448afbaa0be3f00000000000000ca4aa56fc413a417324e8530165c3515981e2d28f7fce9ae3c6bb8fa04ff6411132c9ced479abaeea325c2205ea95984d3d7f98eea1cca02dfeb0b2471b497fbb71b60180d35e2a3394ba6d965f41c7b7bc29d4e3ca95bd7ad074a4242ec98a69ad9d1546ce18cbbd98d2e50688e958a0fcd16876ab83cdb94eeb03e42203f267a1bf6ccb1c07ad92e6e493149da32f754251ae74d30cd4b50eefd6a208172ed8693b320eda714bdd152b484d9c939b4bb777dddd947843d73529f5ffe589777254cb10f733351e0739a3a61c3b8f977517ee7becda66da23a93e3be8ed63bda262951b32f72c1c48ee63be474eafaa255074efaa494b950f48b119c76c70b833e4d7443b691dc97bf78bcae908758ff1edaf2ad48dd67d0337c8ecfcd47e8ce5598c435f4645d719ae60a12c5b37ed2d45571c29ff6af1292ed2ff7fa24e2ab69f18db826044f35683810d2ee95f68f586a8922acdc225912820cdffe6ac29641f3c531a0eb1ddbf17341a05f3ee437f2a56a4a92af8ba2e413d00d05caab40963868dc00da000dfe8962927be81ca05afcc624225b2667a1208dd74e8bb6ced5e1da98f41bb3dedc31302fbf6ed40e9c526f82b53ce45e25e20ce9068bba911f0ec11403a35ff01cee623f71101155fcb646937ac714ac49741b4a1ffc6a72cba387bf41c1af2eeaa80a07631a22d366562924848da0f27c", @ANYRES32, @ANYBLOB="02000000000000006d6e742f656e637279707465645f6469722f2e2e2f66696c653000"]) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') 15:09:59 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$inet_udplite(0x2, 0x2, 0x88) sendfile(r1, r0, &(0x7f0000000140)=0x9, 0x1000) 15:09:59 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1c08a4, 0x0) r0 = syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) r1 = open$dir(&(0x7f0000000200)='./mnt\x00', 0x40040, 0x10) mkdirat(r1, &(0x7f0000000280)='mnt/encrypted_dir/../file0\x00', 0x20) r2 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x50008, 0x0, 0x10081, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r3 = openat(r0, &(0x7f0000000000)='mnt/encrypted_dir/../file0\x00', 0x40, 0x100) r4 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r4, 0x7, 0x0, 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r4, 0xc0406619, &(0x7f00000001c0)={@desc={0x1, 0x0, @desc2}}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000140)=',,\\\x00') futimesat(r3, &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0)={{0x0, 0xea60}}) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000680)=ANY=[@ANYBLOB="b00900000000000018000000468a29458f2709d329f6d3f3917408961482081d984538af2f9bcf61c448afbaa0be3f00000000000000ca4aa56fc413a417324e8530165c3515981e2d28f7fce9ae3c6bb8fa04ff6411132c9ced479abaeea325c2205ea95984d3d7f98eea1cca02dfeb0b2471b497fbb71b60180d35e2a3394ba6d965f41c7b7bc29d4e3ca95bd7ad074a4242ec98a69ad9d1546ce18cbbd98d2e50688e958a0fcd16876ab83cdb94eeb03e42203f267a1bf6ccb1c07ad92e6e493149da32f754251ae74d30cd4b50eefd6a208172ed8693b320eda714bdd152b484d9c939b4bb777dddd947843d73529f5ffe589777254cb10f733351e0739a3a61c3b8f977517ee7becda66da23a93e3be8ed63bda262951b32f72c1c48ee63be474eafaa255074efaa494b950f48b119c76c70b833e4d7443b691dc97bf78bcae908758ff1edaf2ad48dd67d0337c8ecfcd47e8ce5598c435f4645d719ae60a12c5b37ed2d45571c29ff6af1292ed2ff7fa24e2ab69f18db826044f35683810d2ee95f68f586a8922acdc225912820cdffe6ac29641f3c531a0eb1ddbf17341a05f3ee437f2a56a4a92af8ba2e413d00d05caab40963868dc00da000dfe8962927be81ca05afcc624225b2667a1208dd74e8bb6ced5e1da98f41bb3dedc31302fbf6ed40e9c526f82b53ce45e25e20ce9068bba911f0ec11403a35ff01cee623f71101155fcb646937ac714ac49741b4a1ffc6a72cba387bf41c1af2eeaa80a07631a22d366562924848da0f27c", @ANYRES32, @ANYBLOB="02000000000000006d6e742f656e637279707465645f6469722f2e2e2f66696c653000"]) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') 15:10:00 executing program 2: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='autofs\x00', 0x400, &(0x7f00000001c0)='\x00') 15:10:00 executing program 1: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, 0x0) mount$bind(0x0, 0x0, &(0x7f0000000180), 0x64000, 0x0) 15:10:00 executing program 3: r0 = syz_io_uring_setup(0x7d04, &(0x7f00000002c0)={0x0, 0x25fc}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000200), &(0x7f0000000140)=0x0) r2 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r2, r1, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) 15:10:00 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) sendfile(r1, r0, &(0x7f0000000140)=0x9, 0x1000) 15:10:00 executing program 7: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCSBRKP(r0, 0x5425, 0x0) 15:10:00 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x5407, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "bb09819e2f6e8485"}) 15:10:00 executing program 5: socket$inet6_tcp(0xa, 0x1, 0x0) r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r0, 0x7, 0x0, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback={0x0, 0x2}}, 0x1c) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCSARP(r1, 0x8955, &(0x7f0000000000)={{0x2, 0x0, @local}, {0x0, @local}, 0x20, {0x2, 0x0, @local}, 'dummy0\x00'}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f00000004c0)={'tunl0\x00', &(0x7f0000000440)={'syztnl1\x00', 0x0, 0x1, 0x40, 0x9, 0xa739, {{0x9, 0x4, 0x1, 0x39, 0x24, 0x67, 0x0, 0x2, 0x2f, 0x0, @dev={0xac, 0x14, 0x14, 0xe}, @broadcast, {[@rr={0x7, 0xb, 0x9b, [@multicast2, @dev={0xac, 0x14, 0x14, 0x17}]}, @ra={0x94, 0x4, 0x1}]}}}}}) sendmmsg$inet(r2, &(0x7f00000006c0)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f00000000c0)="aabb302af2b9c74e05b23c1c2d7370a295080a2fb680d119b63eba4b8f9e451965870ecb95aaedb506511dbbfa62ee09bc95b5a3d815609c004e90db8673741c0469fdb1b7c95b61d12618011bbf05ea22016881bcacf50d30f8225c9e880dcb519ecb499d7999c5d89a1c0ce220f05912db93d5ccd8631dce6fbc43", 0x7c}, {&(0x7f0000000140)="ab0bfc4c06ce370794", 0x9}, {&(0x7f0000000180)="c39fc7", 0x3}, {&(0x7f00000001c0)="72217a9590386dc766662c63561fe7872fa6f272baa0623e5d7fc1e794257ab36ff078260842c84b657f2aa7e3188e8d9dd5cdd77a2f5295a5a699e30e7469e1121dfaf24710cbeea7b74418a427c178ee1bfc8c74ed7ae2c4c6200cc1edf7bb187dc3e68d7aa577cbb6e13b5a38cfe742966f744cfee5827557d21e61152cc55390bdee9729a1701b0f636fb87fb53e63ab3af489dd471a46a493d2ba389250e6670908f91468b545", 0xa9}], 0x4, &(0x7f00000002c0)=[@ip_tos_u8={{0x11, 0x0, 0x1, 0x80}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x1f}}], 0x30}}, {{&(0x7f0000000300)={0x2, 0x4e22, @empty}, 0x10, &(0x7f0000000400)=[{&(0x7f0000000340)="6c2901ad75dd6657c26f67d2e8fe6016fe3b4c9e28c5dc87bf397eadf9cf334eed587dff74bf12fc5815c3816c36e66531106376da462503113b9a4a6e1b22e409d64e9551db8730a20754", 0x4b}, {&(0x7f00000003c0)="aef4bc", 0x3}], 0x2, &(0x7f0000000500)=[@ip_tos_u8={{0x11, 0x0, 0x1, 0x7f}}, @ip_ttl={{0x14, 0x0, 0x2, 0x7}}, @ip_retopts={{0x3c, 0x0, 0x7, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0x27, 0xc2, [@multicast1, @initdev={0xac, 0x1e, 0x1, 0x0}, @local, @empty, @initdev={0xac, 0x1e, 0x1, 0x0}, @local, @empty, @loopback, @local]}]}}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0xf6}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @rand_addr=0x64010102, @loopback}}}, @ip_retopts={{0x7c, 0x0, 0x7, {[@cipso={0x86, 0x18, 0x3, [{0x7, 0xb, "756082bac6c2eca585"}, {0x0, 0x7, "96fb1b9434"}]}, @noop, @timestamp_addr={0x44, 0x1c, 0x70, 0x1, 0x5, [{@dev={0xac, 0x14, 0x14, 0xa}, 0x5}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x859c}, {@multicast2}]}, @noop, @noop, @timestamp_prespec={0x44, 0x34, 0x89, 0x3, 0x6, [{@local, 0x2}, {@dev={0xac, 0x14, 0x14, 0x13}, 0x1}, {@loopback, 0x80000000}, {@local, 0x7fffffff}, {@loopback, 0x2d}, {@remote}]}]}}}, @ip_retopts={{0x90, 0x0, 0x7, {[@timestamp_addr={0x44, 0x1c, 0xb7, 0x1, 0x7, [{@rand_addr=0x64010100, 0x5}, {@broadcast, 0x3}, {@loopback, 0xee7}]}, @timestamp_addr={0x44, 0x3c, 0xe3, 0x1, 0x9, [{@remote, 0x140f}, {@local}, {@remote, 0x6}, {@dev={0xac, 0x14, 0x14, 0x29}, 0x400}, {@broadcast, 0x289}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x1}, {@multicast1, 0x200}]}, @lsrr={0x83, 0x7, 0xe5, [@loopback]}, @cipso={0x86, 0x1e, 0x1, [{0x7, 0x11, "7772c89f5a16d467708d634b15a9c8"}, {0x2, 0x7, "9cdfa04d01"}]}]}}}], 0x1b8}}], 0x2, 0x24000014) ioctl$sock_SIOCGIFVLAN_GET_VLAN_INGRESS_PRIORITY_CMD(r1, 0x8982, &(0x7f0000000080)) ioctl$sock_SIOCADDRT(r1, 0x890b, &(0x7f0000000740)={0x0, @l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x1, 0x0}, 0x4}, @ethernet={0x1, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}}, @xdp={0x2c, 0x1, r3, 0x32}, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x6, 0x5, 0x3}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r2, 0x89f1, &(0x7f0000000880)={'gre0\x00', &(0x7f00000007c0)={'gretap0\x00', r4, 0x80, 0x20, 0x7, 0x3, {{0x20, 0x4, 0x3, 0x1d, 0x80, 0x64, 0x0, 0x79, 0x2f, 0x0, @broadcast, @empty, {[@ssrr={0x89, 0x7, 0x40, [@initdev={0xac, 0x1e, 0x1, 0x0}]}, @lsrr={0x83, 0x17, 0x77, [@local, @dev={0xac, 0x14, 0x14, 0x3c}, @private=0xa010100, @dev={0xac, 0x14, 0x14, 0x1e}, @local]}, @generic={0x7, 0x7, "85576ba11f"}, @rr={0x7, 0x1b, 0x5, [@local, @private=0xa010101, @private=0xa010100, @local, @private=0xa010100, @empty]}, @ra={0x94, 0x4, 0x1}, @rr={0x7, 0x27, 0x52, [@private=0xa010100, @initdev={0xac, 0x1e, 0x1, 0x0}, @dev={0xac, 0x14, 0x14, 0x25}, @dev={0xac, 0x14, 0x14, 0x3c}, @private=0xa010101, @rand_addr=0x64010100, @rand_addr=0x64010101, @initdev={0xac, 0x1e, 0x0, 0x0}, @multicast1]}]}}}}}) 15:10:12 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1c08a4, 0x0) r0 = syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) r1 = open$dir(&(0x7f0000000200)='./mnt\x00', 0x40040, 0x10) mkdirat(r1, &(0x7f0000000280)='mnt/encrypted_dir/../file0\x00', 0x20) r2 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x50008, 0x0, 0x10081, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r3 = openat(r0, &(0x7f0000000000)='mnt/encrypted_dir/../file0\x00', 0x40, 0x100) r4 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r4, 0x7, 0x0, 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r4, 0xc0406619, &(0x7f00000001c0)={@desc={0x1, 0x0, @desc2}}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000140)=',,\\\x00') futimesat(r3, &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0)={{0x0, 0xea60}}) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000680)=ANY=[@ANYBLOB="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", @ANYRES32, @ANYBLOB="02000000000000006d6e742f656e637279707465645f6469722f2e2e2f66696c653000"]) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') 15:10:12 executing program 7: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCSBRKP(r0, 0x5425, 0x0) 15:10:12 executing program 5: socket$inet6_tcp(0xa, 0x1, 0x0) r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r0, 0x7, 0x0, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback={0x0, 0x2}}, 0x1c) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCSARP(r1, 0x8955, &(0x7f0000000000)={{0x2, 0x0, @local}, {0x0, @local}, 0x20, {0x2, 0x0, @local}, 'dummy0\x00'}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f00000004c0)={'tunl0\x00', &(0x7f0000000440)={'syztnl1\x00', 0x0, 0x1, 0x40, 0x9, 0xa739, {{0x9, 0x4, 0x1, 0x39, 0x24, 0x67, 0x0, 0x2, 0x2f, 0x0, @dev={0xac, 0x14, 0x14, 0xe}, @broadcast, {[@rr={0x7, 0xb, 0x9b, [@multicast2, @dev={0xac, 0x14, 0x14, 0x17}]}, @ra={0x94, 0x4, 0x1}]}}}}}) sendmmsg$inet(r2, &(0x7f00000006c0)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f00000000c0)="aabb302af2b9c74e05b23c1c2d7370a295080a2fb680d119b63eba4b8f9e451965870ecb95aaedb506511dbbfa62ee09bc95b5a3d815609c004e90db8673741c0469fdb1b7c95b61d12618011bbf05ea22016881bcacf50d30f8225c9e880dcb519ecb499d7999c5d89a1c0ce220f05912db93d5ccd8631dce6fbc43", 0x7c}, {&(0x7f0000000140)="ab0bfc4c06ce370794", 0x9}, {&(0x7f0000000180)="c39fc7", 0x3}, {&(0x7f00000001c0)="72217a9590386dc766662c63561fe7872fa6f272baa0623e5d7fc1e794257ab36ff078260842c84b657f2aa7e3188e8d9dd5cdd77a2f5295a5a699e30e7469e1121dfaf24710cbeea7b74418a427c178ee1bfc8c74ed7ae2c4c6200cc1edf7bb187dc3e68d7aa577cbb6e13b5a38cfe742966f744cfee5827557d21e61152cc55390bdee9729a1701b0f636fb87fb53e63ab3af489dd471a46a493d2ba389250e6670908f91468b545", 0xa9}], 0x4, &(0x7f00000002c0)=[@ip_tos_u8={{0x11, 0x0, 0x1, 0x80}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x1f}}], 0x30}}, {{&(0x7f0000000300)={0x2, 0x4e22, @empty}, 0x10, &(0x7f0000000400)=[{&(0x7f0000000340)="6c2901ad75dd6657c26f67d2e8fe6016fe3b4c9e28c5dc87bf397eadf9cf334eed587dff74bf12fc5815c3816c36e66531106376da462503113b9a4a6e1b22e409d64e9551db8730a20754", 0x4b}, {&(0x7f00000003c0)="aef4bc", 0x3}], 0x2, &(0x7f0000000500)=[@ip_tos_u8={{0x11, 0x0, 0x1, 0x7f}}, @ip_ttl={{0x14, 0x0, 0x2, 0x7}}, @ip_retopts={{0x3c, 0x0, 0x7, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0x27, 0xc2, [@multicast1, @initdev={0xac, 0x1e, 0x1, 0x0}, @local, @empty, @initdev={0xac, 0x1e, 0x1, 0x0}, @local, @empty, @loopback, @local]}]}}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0xf6}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @rand_addr=0x64010102, @loopback}}}, @ip_retopts={{0x7c, 0x0, 0x7, {[@cipso={0x86, 0x18, 0x3, [{0x7, 0xb, "756082bac6c2eca585"}, {0x0, 0x7, "96fb1b9434"}]}, @noop, @timestamp_addr={0x44, 0x1c, 0x70, 0x1, 0x5, [{@dev={0xac, 0x14, 0x14, 0xa}, 0x5}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x859c}, {@multicast2}]}, @noop, @noop, @timestamp_prespec={0x44, 0x34, 0x89, 0x3, 0x6, [{@local, 0x2}, {@dev={0xac, 0x14, 0x14, 0x13}, 0x1}, {@loopback, 0x80000000}, {@local, 0x7fffffff}, {@loopback, 0x2d}, {@remote}]}]}}}, @ip_retopts={{0x90, 0x0, 0x7, {[@timestamp_addr={0x44, 0x1c, 0xb7, 0x1, 0x7, [{@rand_addr=0x64010100, 0x5}, {@broadcast, 0x3}, {@loopback, 0xee7}]}, @timestamp_addr={0x44, 0x3c, 0xe3, 0x1, 0x9, [{@remote, 0x140f}, {@local}, {@remote, 0x6}, {@dev={0xac, 0x14, 0x14, 0x29}, 0x400}, {@broadcast, 0x289}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x1}, {@multicast1, 0x200}]}, @lsrr={0x83, 0x7, 0xe5, [@loopback]}, @cipso={0x86, 0x1e, 0x1, [{0x7, 0x11, "7772c89f5a16d467708d634b15a9c8"}, {0x2, 0x7, "9cdfa04d01"}]}]}}}], 0x1b8}}], 0x2, 0x24000014) ioctl$sock_SIOCGIFVLAN_GET_VLAN_INGRESS_PRIORITY_CMD(r1, 0x8982, &(0x7f0000000080)) ioctl$sock_SIOCADDRT(r1, 0x890b, &(0x7f0000000740)={0x0, @l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x1, 0x0}, 0x4}, @ethernet={0x1, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}}, @xdp={0x2c, 0x1, r3, 0x32}, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x6, 0x5, 0x3}) 15:10:12 executing program 6: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendfile(r0, 0xffffffffffffffff, &(0x7f0000000140)=0x9, 0x1000) 15:10:12 executing program 2: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='autofs\x00', 0x400, &(0x7f00000001c0)='\x00') 15:10:12 executing program 1: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, 0x0) mount$bind(0x0, 0x0, &(0x7f0000000180), 0x64000, 0x0) 15:10:12 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x2, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "bb09819e2f6e8485"}) 15:10:12 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000000), 0x0, 0x80040) fcntl$setown(r0, 0x8, 0x0) r1 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) dup(r1) 15:10:12 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x4b2f, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "bb09819e2f6e8485"}) [ 294.675710] audit: type=1326 audit(1771168212.392:13): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=4668 comm="syz-executor.3" exe="/syz-executor.3" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f30e0055b19 code=0x7ffc0000 [ 294.684581] audit: type=1326 audit(1771168212.402:14): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=4668 comm="syz-executor.3" exe="/syz-executor.3" sig=0 arch=c000003e syscall=32 compat=0 ip=0x7f30e0055b19 code=0x7ffc0000 [ 294.688653] audit: type=1326 audit(1771168212.406:15): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=4668 comm="syz-executor.3" exe="/syz-executor.3" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f30e0055b19 code=0x7ffc0000 [ 294.694320] audit: type=1326 audit(1771168212.406:16): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=4668 comm="syz-executor.3" exe="/syz-executor.3" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f30e0055b19 code=0x7ffc0000 [ 294.701447] audit: type=1326 audit(1771168212.411:17): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=4668 comm="syz-executor.3" exe="/syz-executor.3" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7f30e0008a04 code=0x7ffc0000 [ 294.706363] audit: type=1326 audit(1771168212.415:18): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=4668 comm="syz-executor.3" exe="/syz-executor.3" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f30e0055b19 code=0x7ffc0000 [ 294.711986] audit: type=1326 audit(1771168212.415:19): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=4668 comm="syz-executor.3" exe="/syz-executor.3" sig=0 arch=c000003e syscall=72 compat=0 ip=0x7f30e0055b19 code=0x7ffc0000 [ 294.717966] audit: type=1326 audit(1771168212.415:20): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=4668 comm="syz-executor.3" exe="/syz-executor.3" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f30e0055b19 code=0x7ffc0000 [ 294.722933] audit: type=1326 audit(1771168212.415:21): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=4668 comm="syz-executor.3" exe="/syz-executor.3" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f30e0055b19 code=0x7ffc0000 [ 294.727519] audit: type=1326 audit(1771168212.415:22): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=4668 comm="syz-executor.3" exe="/syz-executor.3" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f30e0055b19 code=0x7ffc0000 15:10:23 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x4b30, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "bb09819e2f6e8485"}) 15:10:23 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1c08a4, 0x0) r0 = syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) r1 = open$dir(&(0x7f0000000200)='./mnt\x00', 0x40040, 0x10) mkdirat(r1, &(0x7f0000000280)='mnt/encrypted_dir/../file0\x00', 0x20) r2 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x50008, 0x0, 0x10081, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r3 = openat(r0, &(0x7f0000000000)='mnt/encrypted_dir/../file0\x00', 0x40, 0x100) r4 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r4, 0x7, 0x0, 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r4, 0xc0406619, &(0x7f00000001c0)={@desc={0x1, 0x0, @desc2}}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000140)=',,\\\x00') futimesat(r3, &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0)={{0x0, 0xea60}}) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000680)=ANY=[@ANYBLOB="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", @ANYRES32, @ANYBLOB="02000000000000006d6e742f656e637279707465645f6469722f2e2e2f66696c653000"]) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') 15:10:23 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, 0x0, &(0x7f0000000040)='autofs\x00', 0x400, &(0x7f00000001c0)='\x00') 15:10:23 executing program 1: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, 0x0) mount$bind(0x0, 0x0, &(0x7f0000000180), 0x64000, 0x0) 15:10:23 executing program 5: socket$inet6_tcp(0xa, 0x1, 0x0) r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r0, 0x7, 0x0, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback={0x0, 0x2}}, 0x1c) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCSARP(r1, 0x8955, &(0x7f0000000000)={{0x2, 0x0, @local}, {0x0, @local}, 0x20, {0x2, 0x0, @local}, 'dummy0\x00'}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f00000004c0)={'tunl0\x00', &(0x7f0000000440)={'syztnl1\x00', 0x0, 0x1, 0x40, 0x9, 0xa739, {{0x9, 0x4, 0x1, 0x39, 0x24, 0x67, 0x0, 0x2, 0x2f, 0x0, @dev={0xac, 0x14, 0x14, 0xe}, @broadcast, {[@rr={0x7, 0xb, 0x9b, [@multicast2, @dev={0xac, 0x14, 0x14, 0x17}]}, @ra={0x94, 0x4, 0x1}]}}}}}) sendmmsg$inet(r2, &(0x7f00000006c0)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f00000000c0)="aabb302af2b9c74e05b23c1c2d7370a295080a2fb680d119b63eba4b8f9e451965870ecb95aaedb506511dbbfa62ee09bc95b5a3d815609c004e90db8673741c0469fdb1b7c95b61d12618011bbf05ea22016881bcacf50d30f8225c9e880dcb519ecb499d7999c5d89a1c0ce220f05912db93d5ccd8631dce6fbc43", 0x7c}, {&(0x7f0000000140)="ab0bfc4c06ce370794", 0x9}, {&(0x7f0000000180)="c39fc7", 0x3}, {&(0x7f00000001c0)="72217a9590386dc766662c63561fe7872fa6f272baa0623e5d7fc1e794257ab36ff078260842c84b657f2aa7e3188e8d9dd5cdd77a2f5295a5a699e30e7469e1121dfaf24710cbeea7b74418a427c178ee1bfc8c74ed7ae2c4c6200cc1edf7bb187dc3e68d7aa577cbb6e13b5a38cfe742966f744cfee5827557d21e61152cc55390bdee9729a1701b0f636fb87fb53e63ab3af489dd471a46a493d2ba389250e6670908f91468b545", 0xa9}], 0x4, &(0x7f00000002c0)=[@ip_tos_u8={{0x11, 0x0, 0x1, 0x80}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x1f}}], 0x30}}, {{&(0x7f0000000300)={0x2, 0x4e22, @empty}, 0x10, &(0x7f0000000400)=[{&(0x7f0000000340)="6c2901ad75dd6657c26f67d2e8fe6016fe3b4c9e28c5dc87bf397eadf9cf334eed587dff74bf12fc5815c3816c36e66531106376da462503113b9a4a6e1b22e409d64e9551db8730a20754", 0x4b}, {&(0x7f00000003c0)="aef4bc", 0x3}], 0x2, &(0x7f0000000500)=[@ip_tos_u8={{0x11, 0x0, 0x1, 0x7f}}, @ip_ttl={{0x14, 0x0, 0x2, 0x7}}, @ip_retopts={{0x3c, 0x0, 0x7, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0x27, 0xc2, [@multicast1, @initdev={0xac, 0x1e, 0x1, 0x0}, @local, @empty, @initdev={0xac, 0x1e, 0x1, 0x0}, @local, @empty, @loopback, @local]}]}}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0xf6}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @rand_addr=0x64010102, @loopback}}}, @ip_retopts={{0x7c, 0x0, 0x7, {[@cipso={0x86, 0x18, 0x3, [{0x7, 0xb, "756082bac6c2eca585"}, {0x0, 0x7, "96fb1b9434"}]}, @noop, @timestamp_addr={0x44, 0x1c, 0x70, 0x1, 0x5, [{@dev={0xac, 0x14, 0x14, 0xa}, 0x5}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x859c}, {@multicast2}]}, @noop, @noop, @timestamp_prespec={0x44, 0x34, 0x89, 0x3, 0x6, [{@local, 0x2}, {@dev={0xac, 0x14, 0x14, 0x13}, 0x1}, {@loopback, 0x80000000}, {@local, 0x7fffffff}, {@loopback, 0x2d}, {@remote}]}]}}}, @ip_retopts={{0x90, 0x0, 0x7, {[@timestamp_addr={0x44, 0x1c, 0xb7, 0x1, 0x7, [{@rand_addr=0x64010100, 0x5}, {@broadcast, 0x3}, {@loopback, 0xee7}]}, @timestamp_addr={0x44, 0x3c, 0xe3, 0x1, 0x9, [{@remote, 0x140f}, {@local}, {@remote, 0x6}, {@dev={0xac, 0x14, 0x14, 0x29}, 0x400}, {@broadcast, 0x289}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x1}, {@multicast1, 0x200}]}, @lsrr={0x83, 0x7, 0xe5, [@loopback]}, @cipso={0x86, 0x1e, 0x1, [{0x7, 0x11, "7772c89f5a16d467708d634b15a9c8"}, {0x2, 0x7, "9cdfa04d01"}]}]}}}], 0x1b8}}], 0x2, 0x24000014) ioctl$sock_SIOCADDRT(r1, 0x890b, &(0x7f0000000740)={0x0, @l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x1, 0x0}, 0x4}, @ethernet={0x1, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}}, @xdp={0x2c, 0x1, r3, 0x32}, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x6, 0x5, 0x3}) 15:10:23 executing program 6: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendfile(r0, 0xffffffffffffffff, &(0x7f0000000140)=0x9, 0x1000) 15:10:23 executing program 7: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCSBRKP(r0, 0x5425, 0x994a) (fail_nth: 1) 15:10:23 executing program 3: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x1) r1 = creat(&(0x7f00000002c0)='./file0\x00', 0x0) pwrite64(r1, &(0x7f0000000140)="afc9", 0x2, 0xffffff) dup3(r0, r0, 0x0) ioctl$FS_IOC_GETFLAGS(r1, 0x80086601, &(0x7f0000000000)) write$P9_RREADDIR(r0, &(0x7f0000000580)=ANY=[@ANYRES16], 0x122) signalfd(0xffffffffffffffff, &(0x7f0000000080)={[0x80000001]}, 0x8) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8914, &(0x7f0000000140)={'lo\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, @perf_config_ext, 0x0, 0x3ba4141e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x17c0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(r0, 0x8, 0x0, 0x8000) 15:10:23 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, 0x0, &(0x7f0000000040)='autofs\x00', 0x400, &(0x7f00000001c0)='\x00') 15:10:23 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, 0x0, &(0x7f0000000040)='autofs\x00', 0x400, &(0x7f00000001c0)='\x00') 15:10:23 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x4b31, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "bb09819e2f6e8485"}) 15:10:23 executing program 6: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendfile(r0, 0xffffffffffffffff, &(0x7f0000000140)=0x9, 0x1000) 15:10:23 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x4b32, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "bb09819e2f6e8485"}) 15:10:23 executing program 1: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, 0x0) mount$bind(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x64000, 0x0) 15:10:24 executing program 3: setregid(0xffffffffffffffff, 0xee01) r0 = getegid() setfsgid(r0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000000c0)={0x0, 0x0}, &(0x7f0000000100)=0xc) newfstatat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x1000) mount$9p_virtio(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x2000, &(0x7f0000000440)=ANY=[@ANYBLOB='trans=virtio,version=9p2000.u,privport,version=9p2000.L,dfltgid=', @ANYRESHEX, @ANYBLOB="b11de123c41645dd150c6d1725c42df0ea407de497045cc0bd0ea81a92cce76a5ec3e00660dfc18846bccb8ff2da8ec48826e3baba24413d110c822b351ae641433986dd684aae318f3e68160ff426718ef06dde3106e56b46aa23f69a57870aadacd9952b8f2e00000000", @ANYRESDEC=r1, @ANYBLOB=',smackfshat=+*)-(:,uid>', @ANYRESDEC=r2, @ANYBLOB=',defcontext=us\x00\x00_u,\x00']) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0}, &(0x7f00000002c0)=0xc) setxattr$security_capability(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240), &(0x7f0000000300)=@v3={0x3000000, [{0x7, 0x3}, {0x7, 0x9}], r3}, 0x18, 0x2) setresgid(r0, r0, 0x0) r4 = fork() getegid() kcmp(r4, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) geteuid() 15:10:24 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x400, &(0x7f00000001c0)='\x00') 15:10:24 executing program 4: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1c08a4, 0x0) r1 = syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) open$dir(&(0x7f0000000200)='./mnt\x00', 0x40040, 0x10) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir/../file0\x00', 0x80, 0x3e4fcec92923ce05) r2 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x50008, 0x0, 0x10081, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r3 = openat(r1, &(0x7f0000000000)='mnt/encrypted_dir/../file0\x00', 0x40, 0x100) r4 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r4, 0x7, 0x0, 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r4, 0xc0406619, &(0x7f00000001c0)={@desc={0x1, 0x0, @desc2}}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000140)=',,\\\x00') futimesat(r3, &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0)={{0x0, 0xea60}}) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000680)=ANY=[@ANYBLOB="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", @ANYRES32, @ANYBLOB="02000000000000006d6e742f656e637279707465645f6469722f2e2e2f66696c653000"]) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') 15:10:24 executing program 5: socket$inet6_tcp(0xa, 0x1, 0x0) r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r0, 0x7, 0x0, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback={0x0, 0x2}}, 0x1c) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCSARP(r1, 0x8955, &(0x7f0000000000)={{0x2, 0x0, @local}, {0x0, @local}, 0x20, {0x2, 0x0, @local}, 'dummy0\x00'}) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f00000004c0)={'tunl0\x00', &(0x7f0000000440)={'syztnl1\x00', 0x0, 0x1, 0x40, 0x9, 0xa739, {{0x9, 0x4, 0x1, 0x39, 0x24, 0x67, 0x0, 0x2, 0x2f, 0x0, @dev={0xac, 0x14, 0x14, 0xe}, @broadcast, {[@rr={0x7, 0xb, 0x9b, [@multicast2, @dev={0xac, 0x14, 0x14, 0x17}]}, @ra={0x94, 0x4, 0x1}]}}}}}) ioctl$sock_SIOCADDRT(r1, 0x890b, &(0x7f0000000740)={0x0, @l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x1, 0x0}, 0x4}, @ethernet={0x1, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}}, @xdp={0x2c, 0x1, r2, 0x32}, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x6, 0x5, 0x3}) 15:10:24 executing program 6: r0 = openat(0xffffffffffffff9c, 0x0, 0x802c2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) sendfile(r1, r0, &(0x7f0000000140)=0x9, 0x1000) 15:10:24 executing program 1: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, 0x0) mount$bind(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) 15:10:24 executing program 4: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1c08a4, 0x0) r1 = syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) open$dir(&(0x7f0000000200)='./mnt\x00', 0x40040, 0x10) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir/../file0\x00', 0x80, 0x3e4fcec92923ce05) r2 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x50008, 0x0, 0x10081, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r3 = openat(r1, &(0x7f0000000000)='mnt/encrypted_dir/../file0\x00', 0x40, 0x100) r4 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r4, 0x7, 0x0, 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r4, 0xc0406619, &(0x7f00000001c0)={@desc={0x1, 0x0, @desc2}}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000140)=',,\\\x00') futimesat(r3, &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0)={{0x0, 0xea60}}) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000680)=ANY=[@ANYBLOB="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", @ANYRES32, @ANYBLOB="02000000000000006d6e742f656e637279707465645f6469722f2e2e2f66696c653000"]) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') 15:10:24 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x4b33, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "bb09819e2f6e8485"}) [ 307.015430] FAULT_INJECTION: forcing a failure. [ 307.015430] name failslab, interval 1, probability 0, space 0, times 1 [ 307.017571] CPU: 0 PID: 4694 Comm: syz-executor.7 Not tainted 5.10.250 #1 [ 307.018846] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 307.020372] Call Trace: [ 307.020871] dump_stack+0x107/0x167 [ 307.021551] should_fail.cold+0x5/0xa [ 307.022271] ? taskstats_exit+0x64d/0xb60 [ 307.023035] should_failslab+0x5/0x20 [ 307.023747] kmem_cache_alloc+0x5b/0x310 [ 307.024504] taskstats_exit+0x64d/0xb60 [ 307.025247] ? taskstats_user_cmd+0x1010/0x1010 [ 307.026118] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 307.027105] do_exit+0x5f2/0x2600 [ 307.027751] ? find_held_lock+0x2c/0x110 [ 307.028501] ? mm_update_next_owner+0x830/0x830 [ 307.029364] ? get_signal+0x37e/0x2350 [ 307.030085] ? lock_downgrade+0x6d0/0x6d0 [ 307.030865] ? do_raw_spin_lock+0x121/0x260 [ 307.031668] ? rwlock_bug.part.0+0x90/0x90 [ 307.032461] do_group_exit+0x125/0x310 [ 307.033181] get_signal+0x4bc/0x2350 [ 307.033895] arch_do_signal_or_restart+0x2b7/0x1990 [ 307.034834] ? ioctl_has_perm.constprop.0.isra.0+0x29a/0x410 [ 307.035902] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 307.036879] ? do_vfs_ioctl+0x283/0x10d0 [ 307.037641] ? selinux_bprm_creds_for_exec+0xb60/0xb60 [ 307.038634] ? generic_block_fiemap+0x60/0x60 [ 307.039480] ? lock_downgrade+0x6d0/0x6d0 [ 307.040257] ? restore_sigcontext+0x630/0x630 [ 307.041106] ? wait_for_completion_io+0x270/0x270 [ 307.042022] ? task_work_add+0x98/0x190 [ 307.042798] exit_to_user_mode_prepare+0x127/0x1e0 [ 307.043724] syscall_exit_to_user_mode+0x38/0x1d0 [ 307.044630] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 307.045592] RIP: 0033:0x7f8080770b19 [ 307.046300] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 307.049768] RSP: 002b:00007f807dce6188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 307.051212] RAX: fffffffffffffffc RBX: 00007f8080883f60 RCX: 00007f8080770b19 [ 307.052570] RDX: 000000000000994a RSI: 0000000000005425 RDI: 0000000000000003 [ 307.053931] RBP: 00007f807dce61d0 R08: 0000000000000000 R09: 0000000000000000 [ 307.055300] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 307.056660] R13: 00007ffdcd106acf R14: 00007f807dce6300 R15: 0000000000022000 15:10:37 executing program 7: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCSBRKP(r0, 0x5425, 0x994a) 15:10:37 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x400, &(0x7f00000001c0)='\x00') 15:10:37 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x4b34, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "bb09819e2f6e8485"}) 15:10:37 executing program 4: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1c08a4, 0x0) r1 = syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir/../file0\x00', 0x80, 0x3e4fcec92923ce05) r2 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x50008, 0x0, 0x10081, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r3 = openat(r1, &(0x7f0000000000)='mnt/encrypted_dir/../file0\x00', 0x40, 0x100) r4 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r4, 0x7, 0x0, 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r4, 0xc0406619, &(0x7f00000001c0)={@desc={0x1, 0x0, @desc2}}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000140)=',,\\\x00') futimesat(r3, &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0)={{0x0, 0xea60}}) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000680)=ANY=[@ANYBLOB="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", @ANYRES32, @ANYBLOB="02000000000000006d6e742f656e637279707465645f6469722f2e2e2f66696c653000"]) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') 15:10:37 executing program 3: setregid(0xffffffffffffffff, 0xee01) r0 = getegid() setfsgid(r0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000000c0)={0x0, 0x0}, &(0x7f0000000100)=0xc) newfstatat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x1000) mount$9p_virtio(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x2000, &(0x7f0000000440)=ANY=[@ANYBLOB='trans=virtio,version=9p2000.u,privport,version=9p2000.L,dfltgid=', @ANYRESHEX, @ANYBLOB="b11de123c41645dd150c6d1725c42df0ea407de497045cc0bd0ea81a92cce76a5ec3e00660dfc18846bccb8ff2da8ec48826e3baba24413d110c822b351ae641433986dd684aae318f3e68160ff426718ef06dde3106e56b46aa23f69a57870aadacd9952b8f2e00000000", @ANYRESDEC=r1, @ANYBLOB=',smackfshat=+*)-(:,uid>', @ANYRESDEC=r2, @ANYBLOB=',defcontext=us\x00\x00_u,\x00']) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0}, &(0x7f00000002c0)=0xc) setxattr$security_capability(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240), &(0x7f0000000300)=@v3={0x3000000, [{0x7, 0x3}, {0x7, 0x9}], r3}, 0x18, 0x2) setresgid(r0, r0, 0x0) r4 = fork() getegid() kcmp(r4, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) geteuid() 15:10:37 executing program 6: r0 = openat(0xffffffffffffff9c, 0x0, 0x802c2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) sendfile(r1, r0, &(0x7f0000000140)=0x9, 0x1000) 15:10:37 executing program 1: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, 0x0) mount$bind(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) 15:10:37 executing program 5: socket$inet6_tcp(0xa, 0x1, 0x0) r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r0, 0x7, 0x0, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback={0x0, 0x2}}, 0x1c) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCSARP(r1, 0x8955, &(0x7f0000000000)={{0x2, 0x0, @local}, {0x0, @local}, 0x20, {0x2, 0x0, @local}, 'dummy0\x00'}) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCADDRT(r1, 0x890b, &(0x7f0000000740)={0x0, @l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x1, 0x0}, 0x4}, @ethernet={0x1, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}}, @xdp={0x2c, 0x1, 0x0, 0x32}, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x6, 0x5, 0x3}) 15:10:37 executing program 1: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, 0x0) mount$bind(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) 15:10:37 executing program 5: socket$inet6_tcp(0xa, 0x1, 0x0) r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r0, 0x7, 0x0, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback={0x0, 0x2}}, 0x1c) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCSARP(r1, 0x8955, &(0x7f0000000000)={{0x2, 0x0, @local}, {0x0, @local}, 0x20, {0x2, 0x0, @local}, 'dummy0\x00'}) ioctl$sock_SIOCADDRT(r1, 0x890b, &(0x7f0000000740)={0x0, @l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x1, 0x0}, 0x4}, @ethernet={0x1, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}}, @xdp={0x2c, 0x1, 0x0, 0x32}, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x6, 0x5, 0x3}) 15:10:37 executing program 3: setregid(0xffffffffffffffff, 0xee01) r0 = getegid() setfsgid(r0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000000c0)={0x0, 0x0}, &(0x7f0000000100)=0xc) newfstatat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x1000) mount$9p_virtio(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x2000, &(0x7f0000000440)=ANY=[@ANYBLOB='trans=virtio,version=9p2000.u,privport,version=9p2000.L,dfltgid=', @ANYRESHEX, @ANYBLOB="b11de123c41645dd150c6d1725c42df0ea407de497045cc0bd0ea81a92cce76a5ec3e00660dfc18846bccb8ff2da8ec48826e3baba24413d110c822b351ae641433986dd684aae318f3e68160ff426718ef06dde3106e56b46aa23f69a57870aadacd9952b8f2e00000000", @ANYRESDEC=r1, @ANYBLOB=',smackfshat=+*)-(:,uid>', @ANYRESDEC=r2, @ANYBLOB=',defcontext=us\x00\x00_u,\x00']) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0}, &(0x7f00000002c0)=0xc) setxattr$security_capability(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240), &(0x7f0000000300)=@v3={0x3000000, [{0x7, 0x3}, {0x7, 0x9}], r3}, 0x18, 0x2) setresgid(r0, r0, 0x0) r4 = fork() getegid() kcmp(r4, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) geteuid() 15:10:37 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x4b35, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "bb09819e2f6e8485"}) 15:10:37 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x400, &(0x7f00000001c0)='\x00') 15:10:37 executing program 6: r0 = openat(0xffffffffffffff9c, 0x0, 0x802c2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) sendfile(r1, r0, &(0x7f0000000140)=0x9, 0x1000) 15:10:37 executing program 4: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1c08a4, 0x0) r1 = syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir/../file0\x00', 0x80, 0x3e4fcec92923ce05) r2 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x50008, 0x0, 0x10081, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r3 = openat(r1, &(0x7f0000000000)='mnt/encrypted_dir/../file0\x00', 0x40, 0x100) r4 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r4, 0x7, 0x0, 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r4, 0xc0406619, &(0x7f00000001c0)={@desc={0x1, 0x0, @desc2}}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000140)=',,\\\x00') futimesat(r3, &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0)={{0x0, 0xea60}}) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000680)=ANY=[@ANYBLOB="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", @ANYRES32, @ANYBLOB="02000000000000006d6e742f656e637279707465645f6469722f2e2e2f66696c653000"]) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') 15:10:37 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x4b36, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "bb09819e2f6e8485"}) 15:10:50 executing program 7: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCSBRKP(r0, 0x2, 0x994a) 15:10:50 executing program 5: socket$inet6_tcp(0xa, 0x1, 0x0) r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r0, 0x7, 0x0, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback={0x0, 0x2}}, 0x1c) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCADDRT(r1, 0x890b, &(0x7f0000000740)={0x0, @l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x1, 0x0}, 0x4}, @ethernet={0x1, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}}, @xdp={0x2c, 0x1, 0x0, 0x32}, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x6, 0x5, 0x3}) 15:10:50 executing program 1: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1c08a4, 0x0) r1 = syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) open$dir(&(0x7f0000000200)='./mnt\x00', 0x40040, 0x10) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir/../file0\x00', 0x80, 0x3e4fcec92923ce05) r2 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x50008, 0x0, 0x10081, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r3 = openat(r1, &(0x7f0000000000)='mnt/encrypted_dir/../file0\x00', 0x40, 0x100) r4 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r4, 0x7, 0x0, 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r4, 0xc0406619, &(0x7f00000001c0)={@desc={0x1, 0x0, @desc2}}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000140)=',,\\\x00') futimesat(r3, &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0)={{0x0, 0xea60}}) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000680)=ANY=[@ANYBLOB="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", @ANYRES32, @ANYBLOB="02000000000000006d6e742f656e637279707465645f6469722f2e2e2f66696c653000"]) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') 15:10:50 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) sendfile(r1, r0, &(0x7f0000000140)=0x9, 0x1000) 15:10:50 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='autofs\x00', 0x0, &(0x7f00000001c0)='\x00') 15:10:50 executing program 4: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1c08a4, 0x0) r1 = syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir/../file0\x00', 0x80, 0x3e4fcec92923ce05) r2 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x50008, 0x0, 0x10081, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r3 = openat(r1, &(0x7f0000000000)='mnt/encrypted_dir/../file0\x00', 0x40, 0x100) r4 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r4, 0x7, 0x0, 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r4, 0xc0406619, &(0x7f00000001c0)={@desc={0x1, 0x0, @desc2}}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000140)=',,\\\x00') futimesat(r3, &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0)={{0x0, 0xea60}}) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000680)=ANY=[@ANYBLOB="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", @ANYRES32, @ANYBLOB="02000000000000006d6e742f656e637279707465645f6469722f2e2e2f66696c653000"]) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') 15:10:50 executing program 3: setregid(0xffffffffffffffff, 0xee01) r0 = getegid() setfsgid(r0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000000c0)={0x0, 0x0}, &(0x7f0000000100)=0xc) newfstatat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x1000) mount$9p_virtio(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x2000, &(0x7f0000000440)=ANY=[@ANYBLOB='trans=virtio,version=9p2000.u,privport,version=9p2000.L,dfltgid=', @ANYRESHEX, @ANYBLOB="b11de123c41645dd150c6d1725c42df0ea407de497045cc0bd0ea81a92cce76a5ec3e00660dfc18846bccb8ff2da8ec48826e3baba24413d110c822b351ae641433986dd684aae318f3e68160ff426718ef06dde3106e56b46aa23f69a57870aadacd9952b8f2e00000000", @ANYRESDEC=r1, @ANYBLOB=',smackfshat=+*)-(:,uid>', @ANYRESDEC=r2, @ANYBLOB=',defcontext=us\x00\x00_u,\x00']) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0}, &(0x7f00000002c0)=0xc) setxattr$security_capability(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240), &(0x7f0000000300)=@v3={0x3000000, [{0x7, 0x3}, {0x7, 0x9}], r3}, 0x18, 0x2) setresgid(r0, r0, 0x0) r4 = fork() getegid() kcmp(r4, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) geteuid() 15:10:50 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x4b37, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "bb09819e2f6e8485"}) [ 332.352761] autofs4:pid:4789:autofs_fill_super: called with bogus options 15:10:50 executing program 1: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, 0x0) mount$bind(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x64000, 0x0) (fail_nth: 1) 15:10:50 executing program 3: setregid(0xffffffffffffffff, 0xee01) r0 = getegid() setfsgid(r0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000000c0)={0x0, 0x0}, &(0x7f0000000100)=0xc) newfstatat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x1000) mount$9p_virtio(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x2000, &(0x7f0000000440)=ANY=[@ANYBLOB='trans=virtio,version=9p2000.u,privport,version=9p2000.L,dfltgid=', @ANYRESHEX, @ANYBLOB="b11de123c41645dd150c6d1725c42df0ea407de497045cc0bd0ea81a92cce76a5ec3e00660dfc18846bccb8ff2da8ec48826e3baba24413d110c822b351ae641433986dd684aae318f3e68160ff426718ef06dde3106e56b46aa23f69a57870aadacd9952b8f2e00000000", @ANYRESDEC=r1, @ANYBLOB=',smackfshat=+*)-(:,uid>', @ANYRESDEC=r2, @ANYBLOB=',defcontext=us\x00\x00_u,\x00']) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0}, &(0x7f00000002c0)=0xc) setxattr$security_capability(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240), &(0x7f0000000300)=@v3={0x3000000, [{0x7, 0x3}, {0x7, 0x9}], r3}, 0x18, 0x2) setresgid(r0, r0, 0x0) r4 = fork() getegid() kcmp(r4, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 15:10:50 executing program 5: socket$inet6_tcp(0xa, 0x1, 0x0) r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r0, 0x7, 0x0, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback={0x0, 0x2}}, 0x1c) ioctl$sock_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000740)={0x0, @l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x1, 0x0}, 0x4}, @ethernet={0x1, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}}, @xdp={0x2c, 0x1, 0x0, 0x32}, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x6, 0x5, 0x3}) 15:10:50 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x4b3a, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "bb09819e2f6e8485"}) 15:10:50 executing program 7: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCSBRKP(r0, 0x4b47, 0x994a) 15:10:50 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) sendfile(r1, r0, &(0x7f0000000140)=0x9, 0x1000) [ 332.420978] FAULT_INJECTION: forcing a failure. [ 332.420978] name failslab, interval 1, probability 0, space 0, times 0 [ 332.422425] CPU: 0 PID: 4799 Comm: syz-executor.1 Not tainted 5.10.250 #1 [ 332.423268] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 332.424405] Call Trace: [ 332.424775] dump_stack+0x107/0x167 [ 332.425270] should_fail.cold+0x5/0xa [ 332.425758] ? getname_flags.part.0+0x50/0x4f0 [ 332.426330] should_failslab+0x5/0x20 [ 332.426860] kmem_cache_alloc+0x5b/0x310 [ 332.427408] getname_flags.part.0+0x50/0x4f0 [ 332.428008] user_path_at_empty+0xa1/0x100 [ 332.428586] __x64_sys_mount+0x1e9/0x300 [ 332.429136] ? copy_mnt_ns+0xa00/0xa00 [ 332.429682] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 332.430392] ? syscall_enter_from_user_mode+0x1d/0x50 [ 332.431107] do_syscall_64+0x33/0x40 [ 332.431621] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 332.432319] RIP: 0033:0x7f478d7b4b19 [ 332.432829] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 332.435023] RSP: 002b:00007f478ad2a188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 332.435896] RAX: ffffffffffffffda RBX: 00007f478d8c7f60 RCX: 00007f478d7b4b19 [ 332.436815] RDX: 0000000000000000 RSI: 0000000020000140 RDI: 0000000000000000 [ 332.437640] RBP: 00007f478ad2a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 332.438455] R10: 0000000000064000 R11: 0000000000000246 R12: 0000000000000001 [ 332.439353] R13: 00007ffd9565b00f R14: 00007f478ad2a300 R15: 0000000000022000 15:10:50 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='autofs\x00', 0x0, 0x0) 15:10:50 executing program 4: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1c08a4, 0x0) r1 = syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) open$dir(&(0x7f0000000200)='./mnt\x00', 0x40040, 0x10) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir/../file0\x00', 0x80, 0x3e4fcec92923ce05) r2 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x50008, 0x0, 0x10081, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r3 = openat(r1, &(0x7f0000000000)='mnt/encrypted_dir/../file0\x00', 0x40, 0x100) r4 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r4, 0x7, 0x0, 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r4, 0xc0406619, &(0x7f00000001c0)={@desc={0x1, 0x0, @desc2}}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000140)=',,\\\x00') futimesat(r3, &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0)={{0x0, 0xea60}}) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000680)=ANY=[@ANYBLOB="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", @ANYRES32, @ANYBLOB="02000000000000006d6e742f656e637279707465645f6469722f2e2e2f66696c653000"]) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') [ 332.478833] autofs4:pid:4811:autofs_fill_super: called with bogus options 15:10:50 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x4b3b, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "bb09819e2f6e8485"}) 15:10:50 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) sendfile(r1, r0, &(0x7f0000000140)=0x9, 0x1000) [ 343.920700] FAULT_INJECTION: forcing a failure. [ 343.920700] name failslab, interval 1, probability 0, space 0, times 0 [ 343.922173] CPU: 0 PID: 4829 Comm: syz-executor.1 Not tainted 5.10.250 #1 [ 343.923063] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 343.924122] Call Trace: [ 343.924473] dump_stack+0x107/0x167 [ 343.924940] should_fail.cold+0x5/0xa [ 343.925426] ? create_object.isra.0+0x3a/0xa30 [ 343.926005] should_failslab+0x5/0x20 [ 343.926510] kmem_cache_alloc+0x5b/0x310 [ 343.927042] create_object.isra.0+0x3a/0xa30 [ 343.927597] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 343.928255] kmem_cache_alloc+0x159/0x310 [ 343.928799] getname_flags.part.0+0x50/0x4f0 [ 343.928987] autofs4:pid:4824:autofs_fill_super: called with bogus options [ 343.929348] user_path_at_empty+0xa1/0x100 [ 343.929362] __x64_sys_mount+0x1e9/0x300 [ 343.929381] ? copy_mnt_ns+0xa00/0xa00 [ 343.932360] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 343.933043] ? syscall_enter_from_user_mode+0x1d/0x50 [ 343.933715] do_syscall_64+0x33/0x40 [ 343.934187] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 343.934870] RIP: 0033:0x7f478d7b4b19 [ 343.935337] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 343.937946] RSP: 002b:00007f478ad2a188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 343.938910] RAX: ffffffffffffffda RBX: 00007f478d8c7f60 RCX: 00007f478d7b4b19 [ 343.939868] RDX: 0000000000000000 RSI: 0000000020000140 RDI: 0000000000000000 [ 343.940825] RBP: 00007f478ad2a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 343.941791] R10: 0000000000064000 R11: 0000000000000246 R12: 0000000000000001 [ 343.942782] R13: 00007ffd9565b00f R14: 00007f478ad2a300 R15: 0000000000022000 15:11:01 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) sendfile(0xffffffffffffffff, r0, &(0x7f0000000140)=0x9, 0x1000) 15:11:01 executing program 3: setregid(0xffffffffffffffff, 0xee01) r0 = getegid() setfsgid(r0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000000c0)={0x0, 0x0}, &(0x7f0000000100)=0xc) newfstatat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x1000) mount$9p_virtio(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x2000, &(0x7f0000000440)=ANY=[@ANYBLOB='trans=virtio,version=9p2000.u,privport,version=9p2000.L,dfltgid=', @ANYRESHEX, @ANYBLOB="b11de123c41645dd150c6d1725c42df0ea407de497045cc0bd0ea81a92cce76a5ec3e00660dfc18846bccb8ff2da8ec48826e3baba24413d110c822b351ae641433986dd684aae318f3e68160ff426718ef06dde3106e56b46aa23f69a57870aadacd9952b8f2e00000000", @ANYRESDEC=r1, @ANYBLOB=',smackfshat=+*)-(:,uid>', @ANYRESDEC=r2, @ANYBLOB=',defcontext=us\x00\x00_u,\x00']) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0}, &(0x7f00000002c0)=0xc) setxattr$security_capability(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240), &(0x7f0000000300)=@v3={0x3000000, [{0x7, 0x3}, {0x7, 0x9}], r3}, 0x18, 0x2) setresgid(r0, r0, 0x0) r4 = fork() kcmp(r4, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 15:11:01 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='autofs\x00', 0x0, 0x0) 15:11:01 executing program 4: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1c08a4, 0x0) r1 = syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) open$dir(&(0x7f0000000200)='./mnt\x00', 0x40040, 0x10) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir/../file0\x00', 0x80, 0x3e4fcec92923ce05) r2 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x50008, 0x0, 0x10081, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r3 = openat(r1, &(0x7f0000000000)='mnt/encrypted_dir/../file0\x00', 0x40, 0x100) r4 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r4, 0x7, 0x0, 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r4, 0xc0406619, &(0x7f00000001c0)={@desc={0x1, 0x0, @desc2}}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000140)=',,\\\x00') futimesat(r3, &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0)={{0x0, 0xea60}}) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000680)=ANY=[@ANYBLOB="b00900000000000018000000468a29458f2709d329f6d3f3917408961482081d984538af2f9bcf61c448afbaa0be3f00000000000000ca4aa56fc413a417324e8530165c3515981e2d28f7fce9ae3c6bb8fa04ff6411132c9ced479abaeea325c2205ea95984d3d7f98eea1cca02dfeb0b2471b497fbb71b60180d35e2a3394ba6d965f41c7b7bc29d4e3ca95bd7ad074a4242ec98a69ad9d1546ce18cbbd98d2e50688e958a0fcd16876ab83cdb94eeb03e42203f267a1bf6ccb1c07ad92e6e493149da32f754251ae74d30cd4b50eefd6a208172ed8693b320eda714bdd152b484d9c939b4bb777dddd947843d73529f5ffe589777254cb10f733351e0739a3a61c3b8f977517ee7becda66da23a93e3be8ed63bda262951b32f72c1c48ee63be474eafaa255074efaa494b950f48b119c76c70b833e4d7443b691dc97bf78bcae908758ff1edaf2ad48dd67d0337c8ecfcd47e8ce5598c435f4645d719ae60a12c5b37ed2d45571c29ff6af1292ed2ff7fa24e2ab69f18db826044f35683810d2ee95f68f586a8922acdc225912820cdffe6ac29641f3c531a0eb1ddbf17341a05f3ee437f2a56a4a92af8ba2e413d00d05caab40963868dc00da000dfe8962927be81ca05afcc624225b2667a1208dd74e8bb6ced5e1da98f41bb3dedc31302fbf6ed40e9c526f82b53ce45e25e20ce9068bba911f0ec11403a35ff01cee623f71101155fcb646937ac714ac49741b4a1ffc6a72cba387bf41c1af2eeaa80a07631a22d366562924848da0f27c", @ANYRES32, @ANYBLOB="02000000000000006d6e742f656e637279707465645f6469722f2e2e2f66696c653000"]) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') 15:11:01 executing program 7: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCSBRKP(r0, 0x4b49, 0x994a) 15:11:01 executing program 5: socket$inet6_tcp(0xa, 0x1, 0x0) r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r0, 0x7, 0x0, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback={0x0, 0x2}}, 0x1c) ioctl$sock_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000740)={0x0, @l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x1, 0x0}, 0x4}, @ethernet={0x1, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}}, @xdp={0x2c, 0x1, 0x0, 0x32}, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x6, 0x5, 0x3}) 15:11:01 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x4b3c, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "bb09819e2f6e8485"}) 15:11:01 executing program 1: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, 0x0) mount$bind(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x64000, 0x0) (fail_nth: 2) 15:11:01 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x4b3d, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "bb09819e2f6e8485"}) 15:11:01 executing program 7: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCSBRKP(r0, 0x5409, 0x994a) 15:11:01 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) sendfile(0xffffffffffffffff, r0, &(0x7f0000000140)=0x9, 0x1000) 15:11:01 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x4b40, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "bb09819e2f6e8485"}) 15:11:01 executing program 5: socket$inet6_tcp(0xa, 0x1, 0x0) r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r0, 0x7, 0x0, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback={0x0, 0x2}}, 0x1c) ioctl$sock_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000740)={0x0, @l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x1, 0x0}, 0x4}, @ethernet={0x1, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}}, @xdp={0x2c, 0x1, 0x0, 0x32}, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x6, 0x5, 0x3}) 15:11:01 executing program 7: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCSBRKP(r0, 0x540b, 0x994a) 15:11:01 executing program 3: setregid(0xffffffffffffffff, 0xee01) r0 = getegid() setfsgid(r0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000000c0)={0x0, 0x0}, &(0x7f0000000100)=0xc) newfstatat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x1000) mount$9p_virtio(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x2000, &(0x7f0000000440)=ANY=[@ANYBLOB='trans=virtio,version=9p2000.u,privport,version=9p2000.L,dfltgid=', @ANYRESHEX, @ANYBLOB="b11de123c41645dd150c6d1725c42df0ea407de497045cc0bd0ea81a92cce76a5ec3e00660dfc18846bccb8ff2da8ec48826e3baba24413d110c822b351ae641433986dd684aae318f3e68160ff426718ef06dde3106e56b46aa23f69a57870aadacd9952b8f2e00000000", @ANYRESDEC=r1, @ANYBLOB=',smackfshat=+*)-(:,uid>', @ANYRESDEC=r2, @ANYBLOB=',defcontext=us\x00\x00_u,\x00']) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0}, &(0x7f00000002c0)=0xc) setxattr$security_capability(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240), &(0x7f0000000300)=@v3={0x3000000, [{0x7, 0x3}, {0x7, 0x9}], r3}, 0x18, 0x2) setresgid(r0, r0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 15:11:01 executing program 4: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1c08a4, 0x0) r1 = syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) open$dir(&(0x7f0000000200)='./mnt\x00', 0x40040, 0x10) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir/../file0\x00', 0x80, 0x3e4fcec92923ce05) r2 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x50008, 0x0, 0x10081, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r3 = openat(r1, &(0x7f0000000000)='mnt/encrypted_dir/../file0\x00', 0x40, 0x100) r4 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r4, 0x7, 0x0, 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r4, 0xc0406619, &(0x7f00000001c0)={@desc={0x1, 0x0, @desc2}}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000140)=',,\\\x00') futimesat(r3, &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0)={{0x0, 0xea60}}) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000680)=ANY=[@ANYBLOB="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", @ANYRES32, @ANYBLOB="02000000000000006d6e742f656e637279707465645f6469722f2e2e2f66696c653000"]) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') 15:11:01 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='autofs\x00', 0x0, 0x0) [ 344.112302] autofs4:pid:4856:autofs_fill_super: called with bogus options 15:11:13 executing program 1: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, 0x0) mount$bind(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x64000, 0x0) (fail_nth: 3) 15:11:13 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x4b41, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "bb09819e2f6e8485"}) 15:11:13 executing program 7: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCSBRKP(r0, 0x540c, 0x994a) 15:11:13 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) sendfile(0xffffffffffffffff, r0, &(0x7f0000000140)=0x9, 0x1000) 15:11:13 executing program 3: setregid(0xffffffffffffffff, 0xee01) r0 = getegid() setfsgid(r0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000000c0)={0x0, 0x0}, &(0x7f0000000100)=0xc) newfstatat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x1000) mount$9p_virtio(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x2000, &(0x7f0000000440)=ANY=[@ANYBLOB='trans=virtio,version=9p2000.u,privport,version=9p2000.L,dfltgid=', @ANYRESHEX, @ANYBLOB="b11de123c41645dd150c6d1725c42df0ea407de497045cc0bd0ea81a92cce76a5ec3e00660dfc18846bccb8ff2da8ec48826e3baba24413d110c822b351ae641433986dd684aae318f3e68160ff426718ef06dde3106e56b46aa23f69a57870aadacd9952b8f2e00000000", @ANYRESDEC=r1, @ANYBLOB=',smackfshat=+*)-(:,uid>', @ANYRESDEC=r2, @ANYBLOB=',defcontext=us\x00\x00_u,\x00']) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0}, &(0x7f00000002c0)=0xc) setxattr$security_capability(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240), &(0x7f0000000300)=@v3={0x3000000, [{0x7, 0x3}, {0x7, 0x9}], r3}, 0x18, 0x2) setresgid(r0, r0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 15:11:13 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='autofs\x00', 0x0, 0x0) 15:11:13 executing program 5: socket$inet6_tcp(0xa, 0x1, 0x0) r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r0, 0x7, 0x0, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCADDRT(r1, 0x890b, &(0x7f0000000740)={0x0, @l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x1, 0x0}, 0x4}, @ethernet={0x1, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}}, @xdp={0x2c, 0x1, 0x0, 0x32}, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x6, 0x5, 0x3}) 15:11:13 executing program 4: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1c08a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) open$dir(&(0x7f0000000200)='./mnt\x00', 0x40040, 0x10) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir/../file0\x00', 0x80, 0x3e4fcec92923ce05) r1 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x50008, 0x0, 0x10081, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='mnt/encrypted_dir/../file0\x00', 0x40, 0x100) r3 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r3, 0x7, 0x0, 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r3, 0xc0406619, &(0x7f00000001c0)={@desc={0x1, 0x0, @desc2}}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000140)=',,\\\x00') futimesat(r2, &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0)={{0x0, 0xea60}}) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000680)=ANY=[@ANYBLOB="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", @ANYRES32, @ANYBLOB="02000000000000006d6e742f656e637279707465645f6469722f2e2e2f66696c653000"]) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') [ 356.034031] autofs4:pid:4872:autofs_fill_super: called with bogus options 15:11:13 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x4b44, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "bb09819e2f6e8485"}) [ 356.060699] FAULT_INJECTION: forcing a failure. [ 356.060699] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 356.063255] CPU: 1 PID: 4874 Comm: syz-executor.1 Not tainted 5.10.250 #1 [ 356.064715] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 356.066461] Call Trace: [ 356.067028] dump_stack+0x107/0x167 [ 356.067799] should_fail.cold+0x5/0xa [ 356.068607] strncpy_from_user+0x34/0x470 [ 356.069491] getname_flags.part.0+0x95/0x4f0 [ 356.070431] user_path_at_empty+0xa1/0x100 [ 356.071328] __x64_sys_mount+0x1e9/0x300 [ 356.072177] ? copy_mnt_ns+0xa00/0xa00 [ 356.073005] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 356.074113] ? syscall_enter_from_user_mode+0x1d/0x50 [ 356.075217] do_syscall_64+0x33/0x40 [ 356.076012] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 356.077102] RIP: 0033:0x7f478d7b4b19 [ 356.077888] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 356.081779] RSP: 002b:00007f478ad2a188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 356.083397] RAX: ffffffffffffffda RBX: 00007f478d8c7f60 RCX: 00007f478d7b4b19 [ 356.084913] RDX: 0000000000000000 RSI: 0000000020000140 RDI: 0000000000000000 [ 356.086415] RBP: 00007f478ad2a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 356.087916] R10: 0000000000064000 R11: 0000000000000246 R12: 0000000000000001 [ 356.089426] R13: 00007ffd9565b00f R14: 00007f478ad2a300 R15: 0000000000022000 15:11:25 executing program 1: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, 0x0) mount$bind(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x64000, 0x0) (fail_nth: 4) 15:11:25 executing program 2: mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='autofs\x00', 0x0, 0x0) 15:11:25 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x4b45, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "bb09819e2f6e8485"}) 15:11:25 executing program 3: setregid(0xffffffffffffffff, 0xee01) r0 = getegid() setfsgid(r0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000000c0)={0x0, 0x0}, &(0x7f0000000100)=0xc) newfstatat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x1000) mount$9p_virtio(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x2000, &(0x7f0000000440)=ANY=[@ANYBLOB='trans=virtio,version=9p2000.u,privport,version=9p2000.L,dfltgid=', @ANYRESHEX, @ANYBLOB="b11de123c41645dd150c6d1725c42df0ea407de497045cc0bd0ea81a92cce76a5ec3e00660dfc18846bccb8ff2da8ec48826e3baba24413d110c822b351ae641433986dd684aae318f3e68160ff426718ef06dde3106e56b46aa23f69a57870aadacd9952b8f2e00000000", @ANYRESDEC=r1, @ANYBLOB=',smackfshat=+*)-(:,uid>', @ANYRESDEC=r2, @ANYBLOB=',defcontext=us\x00\x00_u,\x00']) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0}, &(0x7f00000002c0)=0xc) setxattr$security_capability(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240), &(0x7f0000000300)=@v3={0x3000000, [{0x7, 0x3}, {0x7, 0x9}], r3}, 0x18, 0x2) setresgid(r0, r0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 15:11:25 executing program 4: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1c08a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) open$dir(&(0x7f0000000200)='./mnt\x00', 0x40040, 0x10) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir/../file0\x00', 0x80, 0x3e4fcec92923ce05) r1 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x50008, 0x0, 0x10081, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='mnt/encrypted_dir/../file0\x00', 0x40, 0x100) r3 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r3, 0x7, 0x0, 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r3, 0xc0406619, &(0x7f00000001c0)={@desc={0x1, 0x0, @desc2}}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000140)=',,\\\x00') futimesat(r2, &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0)={{0x0, 0xea60}}) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000680)=ANY=[@ANYBLOB="b00900000000000018000000468a29458f2709d329f6d3f3917408961482081d984538af2f9bcf61c448afbaa0be3f00000000000000ca4aa56fc413a417324e8530165c3515981e2d28f7fce9ae3c6bb8fa04ff6411132c9ced479abaeea325c2205ea95984d3d7f98eea1cca02dfeb0b2471b497fbb71b60180d35e2a3394ba6d965f41c7b7bc29d4e3ca95bd7ad074a4242ec98a69ad9d1546ce18cbbd98d2e50688e958a0fcd16876ab83cdb94eeb03e42203f267a1bf6ccb1c07ad92e6e493149da32f754251ae74d30cd4b50eefd6a208172ed8693b320eda714bdd152b484d9c939b4bb777dddd947843d73529f5ffe589777254cb10f733351e0739a3a61c3b8f977517ee7becda66da23a93e3be8ed63bda262951b32f72c1c48ee63be474eafaa255074efaa494b950f48b119c76c70b833e4d7443b691dc97bf78bcae908758ff1edaf2ad48dd67d0337c8ecfcd47e8ce5598c435f4645d719ae60a12c5b37ed2d45571c29ff6af1292ed2ff7fa24e2ab69f18db826044f35683810d2ee95f68f586a8922acdc225912820cdffe6ac29641f3c531a0eb1ddbf17341a05f3ee437f2a56a4a92af8ba2e413d00d05caab40963868dc00da000dfe8962927be81ca05afcc624225b2667a1208dd74e8bb6ced5e1da98f41bb3dedc31302fbf6ed40e9c526f82b53ce45e25e20ce9068bba911f0ec11403a35ff01cee623f71101155fcb646937ac714ac49741b4a1ffc6a72cba387bf41c1af2eeaa80a07631a22d366562924848da0f27c", @ANYRES32, @ANYBLOB="02000000000000006d6e742f656e637279707465645f6469722f2e2e2f66696c653000"]) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') 15:11:25 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendfile(r0, 0xffffffffffffffff, &(0x7f0000000140)=0x9, 0x1000) 15:11:25 executing program 7: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCSBRKP(r0, 0x540d, 0x994a) 15:11:25 executing program 5: socket$inet6_tcp(0xa, 0x1, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCADDRT(r0, 0x890b, &(0x7f0000000740)={0x0, @l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x1, 0x0}, 0x4}, @ethernet={0x1, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}}, @xdp={0x2c, 0x1, 0x0, 0x32}, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x6, 0x5, 0x3}) [ 368.193888] FAULT_INJECTION: forcing a failure. [ 368.193888] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 368.196461] CPU: 0 PID: 4898 Comm: syz-executor.1 Not tainted 5.10.250 #1 [ 368.197933] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 368.199728] Call Trace: [ 368.200300] dump_stack+0x107/0x167 [ 368.201082] should_fail.cold+0x5/0xa [ 368.201907] _copy_to_user+0x2e/0x180 [ 368.202734] simple_read_from_buffer+0xcc/0x160 [ 368.203757] proc_fail_nth_read+0x198/0x230 [ 368.204697] ? proc_sessionid_read+0x230/0x230 [ 368.205676] ? security_file_permission+0xb1/0xe0 [ 368.206714] ? proc_sessionid_read+0x230/0x230 [ 368.207697] vfs_read+0x228/0x620 [ 368.208441] ksys_read+0x12d/0x260 [ 368.209196] ? vfs_write+0xb10/0xb10 [ 368.209996] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 368.211124] ? syscall_enter_from_user_mode+0x1d/0x50 [ 368.212228] do_syscall_64+0x33/0x40 [ 368.213023] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 368.214119] RIP: 0033:0x7f478d76769c [ 368.214919] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 368.218871] RSP: 002b:00007f478ad2a170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 368.220494] RAX: ffffffffffffffda RBX: ffffffffffffffff RCX: 00007f478d76769c [ 368.222023] RDX: 000000000000000f RSI: 00007f478ad2a1e0 RDI: 0000000000000003 [ 368.223561] RBP: 00007f478ad2a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 368.225084] R10: 0000000000064000 R11: 0000000000000246 R12: 0000000000000001 [ 368.226617] R13: 00007ffd9565b00f R14: 00007f478ad2a300 R15: 0000000000022000 15:11:25 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x4b46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "bb09819e2f6e8485"}) 15:11:25 executing program 3: setregid(0xffffffffffffffff, 0xee01) r0 = getegid() setfsgid(r0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000000c0)={0x0, 0x0}, &(0x7f0000000100)=0xc) newfstatat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x1000) mount$9p_virtio(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x2000, &(0x7f0000000440)=ANY=[@ANYBLOB='trans=virtio,version=9p2000.u,privport,version=9p2000.L,dfltgid=', @ANYRESHEX, @ANYBLOB="b11de123c41645dd150c6d1725c42df0ea407de497045cc0bd0ea81a92cce76a5ec3e00660dfc18846bccb8ff2da8ec48826e3baba24413d110c822b351ae641433986dd684aae318f3e68160ff426718ef06dde3106e56b46aa23f69a57870aadacd9952b8f2e00000000", @ANYRESDEC=r1, @ANYBLOB=',smackfshat=+*)-(:,uid>', @ANYRESDEC=r2, @ANYBLOB=',defcontext=us\x00\x00_u,\x00']) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0}, &(0x7f00000002c0)=0xc) setxattr$security_capability(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240), &(0x7f0000000300)=@v3={0x3000000, [{0x7, 0x3}, {0x7, 0x9}], r3}, 0x18, 0x2) r4 = fork() kcmp(r4, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 15:11:25 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendfile(r0, 0xffffffffffffffff, &(0x7f0000000140)=0x9, 0x1000) 15:11:25 executing program 7: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCSBRKP(r0, 0x5412, 0x994a) 15:11:25 executing program 2: mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='autofs\x00', 0x0, 0x0) 15:11:26 executing program 5: socket$inet6_tcp(0xa, 0x1, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCADDRT(r0, 0x890b, &(0x7f0000000740)={0x0, @l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x1, 0x0}, 0x4}, @ethernet={0x1, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}}, @xdp={0x2c, 0x1, 0x0, 0x32}, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x6, 0x5, 0x3}) 15:11:26 executing program 4: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1c08a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) open$dir(&(0x7f0000000200)='./mnt\x00', 0x40040, 0x10) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir/../file0\x00', 0x80, 0x3e4fcec92923ce05) r1 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x50008, 0x0, 0x10081, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='mnt/encrypted_dir/../file0\x00', 0x40, 0x100) r3 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r3, 0x7, 0x0, 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r3, 0xc0406619, &(0x7f00000001c0)={@desc={0x1, 0x0, @desc2}}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000140)=',,\\\x00') futimesat(r2, &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0)={{0x0, 0xea60}}) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000680)=ANY=[@ANYBLOB="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", @ANYRES32, @ANYBLOB="02000000000000006d6e742f656e637279707465645f6469722f2e2e2f66696c653000"]) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') 15:11:26 executing program 1: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, 0x0) mount$bind(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x64000, 0x0) 15:11:26 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x4b47, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "bb09819e2f6e8485"}) 15:11:26 executing program 2: mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='autofs\x00', 0x0, 0x0) 15:11:26 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendfile(r0, 0xffffffffffffffff, &(0x7f0000000140)=0x9, 0x1000) 15:11:39 executing program 1: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, 0x0) mount$bind(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x64002, 0x0) 15:11:39 executing program 2: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='autofs\x00', 0x0, 0x0) 15:11:39 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCADDRT(r0, 0x890b, &(0x7f0000000740)={0x0, @l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x1, 0x0}, 0x4}, @ethernet={0x1, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}}, @xdp={0x2c, 0x1, 0x0, 0x32}, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x6, 0x5, 0x3}) 15:11:39 executing program 4: r0 = syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) open$dir(&(0x7f0000000200)='./mnt\x00', 0x40040, 0x10) faccessat2(0xffffffffffffffff, &(0x7f0000000040)='mnt/encrypted_dir/../file0\x00', 0x80, 0x3e4fcec92923ce05) r1 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x50008, 0x0, 0x10081, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r2 = openat(r0, &(0x7f0000000000)='mnt/encrypted_dir/../file0\x00', 0x40, 0x100) r3 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r3, 0x7, 0x0, 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r3, 0xc0406619, &(0x7f00000001c0)={@desc={0x1, 0x0, @desc2}}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000140)=',,\\\x00') futimesat(r2, &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0)={{0x0, 0xea60}}) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000680)=ANY=[@ANYBLOB="b00900000000000018000000468a29458f2709d329f6d3f3917408961482081d984538af2f9bcf61c448afbaa0be3f00000000000000ca4aa56fc413a417324e8530165c3515981e2d28f7fce9ae3c6bb8fa04ff6411132c9ced479abaeea325c2205ea95984d3d7f98eea1cca02dfeb0b2471b497fbb71b60180d35e2a3394ba6d965f41c7b7bc29d4e3ca95bd7ad074a4242ec98a69ad9d1546ce18cbbd98d2e50688e958a0fcd16876ab83cdb94eeb03e42203f267a1bf6ccb1c07ad92e6e493149da32f754251ae74d30cd4b50eefd6a208172ed8693b320eda714bdd152b484d9c939b4bb777dddd947843d73529f5ffe589777254cb10f733351e0739a3a61c3b8f977517ee7becda66da23a93e3be8ed63bda262951b32f72c1c48ee63be474eafaa255074efaa494b950f48b119c76c70b833e4d7443b691dc97bf78bcae908758ff1edaf2ad48dd67d0337c8ecfcd47e8ce5598c435f4645d719ae60a12c5b37ed2d45571c29ff6af1292ed2ff7fa24e2ab69f18db826044f35683810d2ee95f68f586a8922acdc225912820cdffe6ac29641f3c531a0eb1ddbf17341a05f3ee437f2a56a4a92af8ba2e413d00d05caab40963868dc00da000dfe8962927be81ca05afcc624225b2667a1208dd74e8bb6ced5e1da98f41bb3dedc31302fbf6ed40e9c526f82b53ce45e25e20ce9068bba911f0ec11403a35ff01cee623f71101155fcb646937ac714ac49741b4a1ffc6a72cba387bf41c1af2eeaa80a07631a22d366562924848da0f27c", @ANYRES32, @ANYBLOB="02000000000000006d6e742f656e637279707465645f6469722f2e2e2f66696c653000"]) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') 15:11:39 executing program 7: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCSBRKP(r0, 0x5413, 0x994a) 15:11:39 executing program 3: setregid(0xffffffffffffffff, 0xee01) r0 = getegid() setfsgid(r0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000000c0)={0x0, 0x0}, &(0x7f0000000100)=0xc) newfstatat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x1000) mount$9p_virtio(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x2000, &(0x7f0000000440)=ANY=[@ANYBLOB='trans=virtio,version=9p2000.u,privport,version=9p2000.L,dfltgid=', @ANYRESHEX, @ANYBLOB="b11de123c41645dd150c6d1725c42df0ea407de497045cc0bd0ea81a92cce76a5ec3e00660dfc18846bccb8ff2da8ec48826e3baba24413d110c822b351ae641433986dd684aae318f3e68160ff426718ef06dde3106e56b46aa23f69a57870aadacd9952b8f2e00000000", @ANYRESDEC=r1, @ANYBLOB=',smackfshat=+*)-(:,uid>', @ANYRESDEC=r2, @ANYBLOB=',defcontext=us\x00\x00_u,\x00']) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0}, &(0x7f00000002c0)=0xc) setxattr$security_capability(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240), &(0x7f0000000300)=@v3={0x3000000, [{0x7, 0x3}, {0x7, 0x9}], r3}, 0x18, 0x2) r4 = fork() kcmp(r4, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 15:11:39 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x4b48, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "bb09819e2f6e8485"}) 15:11:39 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) sendfile(r1, r0, 0x0, 0x1000) 15:11:39 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) sendfile(r1, r0, 0x0, 0x1000) 15:11:39 executing program 7: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCSBRKP(r0, 0x5414, 0x994a) 15:11:39 executing program 2: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='autofs\x00', 0x0, 0x0) 15:11:39 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x4b49, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "bb09819e2f6e8485"}) 15:11:39 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000740)={0x0, @l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x1, 0x0}, 0x4}, @ethernet={0x1, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}}, @xdp={0x2c, 0x1, 0x0, 0x32}, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x6, 0x5, 0x3}) 15:11:39 executing program 3: setregid(0xffffffffffffffff, 0xee01) r0 = getegid() setfsgid(r0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000000c0)={0x0, 0x0}, &(0x7f0000000100)=0xc) newfstatat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x1000) mount$9p_virtio(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x2000, &(0x7f0000000440)=ANY=[@ANYBLOB='trans=virtio,version=9p2000.u,privport,version=9p2000.L,dfltgid=', @ANYRESHEX, @ANYBLOB="b11de123c41645dd150c6d1725c42df0ea407de497045cc0bd0ea81a92cce76a5ec3e00660dfc18846bccb8ff2da8ec48826e3baba24413d110c822b351ae641433986dd684aae318f3e68160ff426718ef06dde3106e56b46aa23f69a57870aadacd9952b8f2e00000000", @ANYRESDEC=r1, @ANYBLOB=',smackfshat=+*)-(:,uid>', @ANYRESDEC=r2, @ANYBLOB=',defcontext=us\x00\x00_u,\x00']) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0}, &(0x7f00000002c0)=0xc) setxattr$security_capability(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240), &(0x7f0000000300)=@v3={0x3000000, [{0x7, 0x3}, {0x7, 0x9}], r3}, 0x18, 0x2) r4 = fork() kcmp(r4, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 15:11:39 executing program 1: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, 0x0) mount$bind(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x64000, 0x2) 15:11:39 executing program 7: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCSBRKP(r0, 0x5415, 0x994a) 15:11:54 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x4b4a, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "bb09819e2f6e8485"}) 15:11:54 executing program 1: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, 0x0) mount$bind(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x64000, 0x8) 15:11:54 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000740)={0x0, @l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x1, 0x0}, 0x4}, @ethernet={0x1, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}}, @xdp={0x2c, 0x1, 0x0, 0x32}, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x6, 0x5, 0x3}) 15:11:54 executing program 4: r0 = syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) open$dir(&(0x7f0000000200)='./mnt\x00', 0x40040, 0x10) faccessat2(0xffffffffffffffff, &(0x7f0000000040)='mnt/encrypted_dir/../file0\x00', 0x80, 0x3e4fcec92923ce05) r1 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x50008, 0x0, 0x10081, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r2 = openat(r0, &(0x7f0000000000)='mnt/encrypted_dir/../file0\x00', 0x40, 0x100) r3 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r3, 0x7, 0x0, 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r3, 0xc0406619, &(0x7f00000001c0)={@desc={0x1, 0x0, @desc2}}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000140)=',,\\\x00') futimesat(r2, &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0)={{0x0, 0xea60}}) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000680)=ANY=[@ANYBLOB="b00900000000000018000000468a29458f2709d329f6d3f3917408961482081d984538af2f9bcf61c448afbaa0be3f00000000000000ca4aa56fc413a417324e8530165c3515981e2d28f7fce9ae3c6bb8fa04ff6411132c9ced479abaeea325c2205ea95984d3d7f98eea1cca02dfeb0b2471b497fbb71b60180d35e2a3394ba6d965f41c7b7bc29d4e3ca95bd7ad074a4242ec98a69ad9d1546ce18cbbd98d2e50688e958a0fcd16876ab83cdb94eeb03e42203f267a1bf6ccb1c07ad92e6e493149da32f754251ae74d30cd4b50eefd6a208172ed8693b320eda714bdd152b484d9c939b4bb777dddd947843d73529f5ffe589777254cb10f733351e0739a3a61c3b8f977517ee7becda66da23a93e3be8ed63bda262951b32f72c1c48ee63be474eafaa255074efaa494b950f48b119c76c70b833e4d7443b691dc97bf78bcae908758ff1edaf2ad48dd67d0337c8ecfcd47e8ce5598c435f4645d719ae60a12c5b37ed2d45571c29ff6af1292ed2ff7fa24e2ab69f18db826044f35683810d2ee95f68f586a8922acdc225912820cdffe6ac29641f3c531a0eb1ddbf17341a05f3ee437f2a56a4a92af8ba2e413d00d05caab40963868dc00da000dfe8962927be81ca05afcc624225b2667a1208dd74e8bb6ced5e1da98f41bb3dedc31302fbf6ed40e9c526f82b53ce45e25e20ce9068bba911f0ec11403a35ff01cee623f71101155fcb646937ac714ac49741b4a1ffc6a72cba387bf41c1af2eeaa80a07631a22d366562924848da0f27c", @ANYRES32, @ANYBLOB="02000000000000006d6e742f656e637279707465645f6469722f2e2e2f66696c653000"]) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') 15:11:54 executing program 2: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='autofs\x00', 0x0, 0x0) 15:11:54 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) sendfile(r1, r0, 0x0, 0x1000) 15:11:54 executing program 7: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCSBRKP(r0, 0x5416, 0x994a) 15:11:54 executing program 3: setregid(0xffffffffffffffff, 0xee01) r0 = getegid() setfsgid(r0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000000c0)={0x0, 0x0}, &(0x7f0000000100)=0xc) newfstatat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x1000) mount$9p_virtio(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x2000, &(0x7f0000000440)=ANY=[@ANYBLOB='trans=virtio,version=9p2000.u,privport,version=9p2000.L,dfltgid=', @ANYRESHEX, @ANYBLOB="b11de123c41645dd150c6d1725c42df0ea407de497045cc0bd0ea81a92cce76a5ec3e00660dfc18846bccb8ff2da8ec48826e3baba24413d110c822b351ae641433986dd684aae318f3e68160ff426718ef06dde3106e56b46aa23f69a57870aadacd9952b8f2e00000000", @ANYRESDEC=r1, @ANYBLOB=',smackfshat=+*)-(:,uid>', @ANYRESDEC=r2, @ANYBLOB=',defcontext=us\x00\x00_u,\x00']) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280), &(0x7f00000002c0)=0xc) setresgid(r0, r0, 0x0) r3 = fork() kcmp(r3, r3, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 15:11:54 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000740)={0x0, @l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x1, 0x0}, 0x4}, @ethernet={0x1, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}}, @xdp={0x2c, 0x1, 0x0, 0x32}, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x6, 0x5, 0x3}) 15:11:54 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x4b4b, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "bb09819e2f6e8485"}) 15:11:54 executing program 4: r0 = syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) open$dir(&(0x7f0000000200)='./mnt\x00', 0x40040, 0x10) faccessat2(0xffffffffffffffff, &(0x7f0000000040)='mnt/encrypted_dir/../file0\x00', 0x80, 0x3e4fcec92923ce05) r1 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x50008, 0x0, 0x10081, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r2 = openat(r0, &(0x7f0000000000)='mnt/encrypted_dir/../file0\x00', 0x40, 0x100) r3 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r3, 0x7, 0x0, 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r3, 0xc0406619, &(0x7f00000001c0)={@desc={0x1, 0x0, @desc2}}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000140)=',,\\\x00') futimesat(r2, &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0)={{0x0, 0xea60}}) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000680)=ANY=[@ANYBLOB="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", @ANYRES32, @ANYBLOB="02000000000000006d6e742f656e637279707465645f6469722f2e2e2f66696c653000"]) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') 15:11:54 executing program 7: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCSBRKP(r0, 0x5418, 0x994a) 15:11:54 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, 0x0, &(0x7f0000000040)='autofs\x00', 0x0, 0x0) 15:11:54 executing program 1: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, 0x0) mount$bind(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x64000, 0xf0) 15:11:54 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) sendfile(r1, r0, &(0x7f0000000140), 0x1000) 15:11:54 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCADDRT(r0, 0x890b, 0x0) 15:11:54 executing program 3: setregid(0xffffffffffffffff, 0xee01) r0 = getegid() setfsgid(r0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000000c0)={0x0, 0x0}, &(0x7f0000000100)=0xc) newfstatat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x1000) mount$9p_virtio(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x2000, &(0x7f0000000440)=ANY=[@ANYBLOB='trans=virtio,version=9p2000.u,privport,version=9p2000.L,dfltgid=', @ANYRESHEX, @ANYBLOB="b11de123c41645dd150c6d1725c42df0ea407de497045cc0bd0ea81a92cce76a5ec3e00660dfc18846bccb8ff2da8ec48826e3baba24413d110c822b351ae641433986dd684aae318f3e68160ff426718ef06dde3106e56b46aa23f69a57870aadacd9952b8f2e00000000", @ANYRESDEC=r1, @ANYBLOB=',smackfshat=+*)-(:,uid>', @ANYRESDEC=r2, @ANYBLOB=',defcontext=us\x00\x00_u,\x00']) setresgid(r0, r0, 0x0) r3 = fork() kcmp(r3, r3, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 15:11:54 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x4b4c, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "bb09819e2f6e8485"}) 15:11:54 executing program 7: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCSBRKP(r0, 0x541b, 0x994a) 15:12:07 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) sendfile(r1, r0, &(0x7f0000000140), 0x1000) 15:12:07 executing program 7: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCSBRKP(r0, 0x541d, 0x994a) 15:12:07 executing program 3: setregid(0xffffffffffffffff, 0xee01) r0 = getegid() setfsgid(r0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000000c0), &(0x7f0000000100)=0xc) newfstatat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180), 0x1000) setresgid(r0, r0, 0x0) r1 = fork() kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 15:12:07 executing program 4: r0 = syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x1c08a4, 0x0) r1 = syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) open$dir(&(0x7f0000000200)='./mnt\x00', 0x40040, 0x10) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir/../file0\x00', 0x80, 0x3e4fcec92923ce05) r2 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x50008, 0x0, 0x10081, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r3 = openat(r1, &(0x7f0000000000)='mnt/encrypted_dir/../file0\x00', 0x40, 0x100) r4 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r4, 0x7, 0x0, 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r4, 0xc0406619, &(0x7f00000001c0)={@desc={0x1, 0x0, @desc2}}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000140)=',,\\\x00') futimesat(r3, &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0)={{0x0, 0xea60}}) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000680)=ANY=[@ANYBLOB="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", @ANYRES32, @ANYBLOB="02000000000000006d6e742f656e637279707465645f6469722f2e2e2f66696c653000"]) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') 15:12:07 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x4b4d, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "bb09819e2f6e8485"}) 15:12:07 executing program 1: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, 0x0) mount$bind(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x64000, 0x1020) 15:12:07 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCADDRT(r0, 0x890b, 0x0) 15:12:07 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, 0x0, &(0x7f0000000040)='autofs\x00', 0x0, 0x0) 15:12:07 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCADDRT(r0, 0x890b, 0x0) 15:12:18 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCADDRT(r0, 0x890b, &(0x7f0000000740)={0x0, @l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x4}, @ethernet={0x1, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}}, @xdp={0x2c, 0x1, 0x0, 0x32}, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x6, 0x5, 0x3}) 15:12:18 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, 0x0, &(0x7f0000000040)='autofs\x00', 0x0, 0x0) 15:12:18 executing program 4: r0 = syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x1c08a4, 0x0) r1 = syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) open$dir(&(0x7f0000000200)='./mnt\x00', 0x40040, 0x10) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir/../file0\x00', 0x80, 0x3e4fcec92923ce05) r2 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x50008, 0x0, 0x10081, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r3 = openat(r1, &(0x7f0000000000)='mnt/encrypted_dir/../file0\x00', 0x40, 0x100) r4 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r4, 0x7, 0x0, 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r4, 0xc0406619, &(0x7f00000001c0)={@desc={0x1, 0x0, @desc2}}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000140)=',,\\\x00') futimesat(r3, &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0)={{0x0, 0xea60}}) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000680)=ANY=[@ANYBLOB="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", @ANYRES32, @ANYBLOB="02000000000000006d6e742f656e637279707465645f6469722f2e2e2f66696c653000"]) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') 15:12:18 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) sendfile(r1, r0, &(0x7f0000000140), 0x1000) 15:12:18 executing program 1: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, 0x0) mount$bind(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x64000, 0x2000) 15:12:18 executing program 7: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCSBRKP(r0, 0x541e, 0x994a) 15:12:18 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x4b4e, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "bb09819e2f6e8485"}) 15:12:18 executing program 3: setregid(0xffffffffffffffff, 0xee01) r0 = getegid() setfsgid(r0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000000c0), &(0x7f0000000100)=0xc) setresgid(r0, r0, 0x0) r1 = fork() kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 15:12:18 executing program 7: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCSBRKP(r0, 0x541e, 0x994a) 15:12:18 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) sendfile(r1, r0, &(0x7f0000000140)=0x9, 0x0) 15:12:18 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0) 15:12:18 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCADDRT(r0, 0x890b, &(0x7f0000000740)={0x0, @l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, @ethernet={0x1, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}}, @xdp={0x2c, 0x1, 0x0, 0x32}, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x6, 0x5, 0x3}) 15:12:18 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x4b52, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "bb09819e2f6e8485"}) 15:12:18 executing program 4: r0 = syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x1c08a4, 0x0) r1 = syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) open$dir(&(0x7f0000000200)='./mnt\x00', 0x40040, 0x10) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir/../file0\x00', 0x80, 0x3e4fcec92923ce05) r2 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x50008, 0x0, 0x10081, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r3 = openat(r1, &(0x7f0000000000)='mnt/encrypted_dir/../file0\x00', 0x40, 0x100) r4 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r4, 0x7, 0x0, 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r4, 0xc0406619, &(0x7f00000001c0)={@desc={0x1, 0x0, @desc2}}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000140)=',,\\\x00') futimesat(r3, &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0)={{0x0, 0xea60}}) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000680)=ANY=[@ANYBLOB="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", @ANYRES32, @ANYBLOB="02000000000000006d6e742f656e637279707465645f6469722f2e2e2f66696c653000"]) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') 15:12:18 executing program 1: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, 0x0) mount$bind(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x64000, 0x2010) 15:12:18 executing program 3: setregid(0xffffffffffffffff, 0xee01) r0 = getegid() setfsgid(r0) setresgid(r0, r0, 0x0) r1 = fork() kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 15:12:18 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCADDRT(r0, 0x890b, &(0x7f0000000740)={0x0, @l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, @ethernet={0x0, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}}, @xdp={0x2c, 0x1, 0x0, 0x32}, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x6, 0x5, 0x3}) 15:12:18 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0) 15:12:18 executing program 7: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCSBRKP(r0, 0x5421, 0x994a) 15:12:18 executing program 4: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) open$dir(&(0x7f0000000200)='./mnt\x00', 0x40040, 0x10) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir/../file0\x00', 0x80, 0x3e4fcec92923ce05) r2 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x50008, 0x0, 0x10081, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r3 = openat(r1, &(0x7f0000000000)='mnt/encrypted_dir/../file0\x00', 0x40, 0x100) r4 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r4, 0x7, 0x0, 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r4, 0xc0406619, &(0x7f00000001c0)={@desc={0x1, 0x0, @desc2}}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000140)=',,\\\x00') futimesat(r3, &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0)={{0x0, 0xea60}}) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000680)=ANY=[@ANYBLOB="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", @ANYRES32, @ANYBLOB="02000000000000006d6e742f656e637279707465645f6469722f2e2e2f66696c653000"]) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') 15:12:18 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) sendfile(r1, r0, &(0x7f0000000140)=0x9, 0x0) 15:12:18 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x4b62, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "bb09819e2f6e8485"}) 15:12:18 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCADDRT(r0, 0x890b, &(0x7f0000000740)={0x0, @l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, @ethernet={0x0, @link_local}, @xdp={0x2c, 0x1, 0x0, 0x32}, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x6, 0x5, 0x3}) 15:12:19 executing program 7: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCSBRKP(r0, 0x5423, 0x994a) 15:12:30 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) sendfile(r1, r0, &(0x7f0000000140)=0x9, 0x0) 15:12:30 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0) 15:12:30 executing program 1: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, 0x0) mount$bind(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x64000, 0xf000) 15:12:30 executing program 7: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCSBRKP(r0, 0x5424, 0x994a) 15:12:30 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x4b63, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "bb09819e2f6e8485"}) 15:12:30 executing program 3: setregid(0xffffffffffffffff, 0xee01) r0 = getegid() setresgid(r0, r0, 0x0) r1 = fork() kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 15:12:30 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCADDRT(r0, 0x890b, &(0x7f0000000740)={0x0, @l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, @ethernet={0x0, @link_local}, @xdp={0x2c, 0x0, 0x0, 0x32}, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x6, 0x5, 0x3}) 15:12:30 executing program 4: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) open$dir(&(0x7f0000000200)='./mnt\x00', 0x40040, 0x10) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir/../file0\x00', 0x80, 0x3e4fcec92923ce05) r2 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x50008, 0x0, 0x10081, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r3 = openat(r1, &(0x7f0000000000)='mnt/encrypted_dir/../file0\x00', 0x40, 0x100) r4 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r4, 0x7, 0x0, 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r4, 0xc0406619, &(0x7f00000001c0)={@desc={0x1, 0x0, @desc2}}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000140)=',,\\\x00') futimesat(r3, &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0)={{0x0, 0xea60}}) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000680)=ANY=[@ANYBLOB="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", @ANYRES32, @ANYBLOB="02000000000000006d6e742f656e637279707465645f6469722f2e2e2f66696c653000"]) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') 15:12:30 executing program 7: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCSBRKP(r0, 0x5427, 0x994a) 15:12:30 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x4b64, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "bb09819e2f6e8485"}) 15:12:30 executing program 3: setregid(0xffffffffffffffff, 0xee01) setresgid(0x0, 0x0, 0x0) r0 = fork() kcmp(r0, r0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 15:12:30 executing program 1: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, 0x0) mount$bind(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x64000, 0x80000) 15:12:43 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCADDRT(r0, 0x890b, &(0x7f0000000740)={0x0, @l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, @ethernet={0x0, @link_local}, @xdp, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x6, 0x5, 0x3}) 15:12:43 executing program 6: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) open$dir(&(0x7f0000000200)='./mnt\x00', 0x40040, 0x10) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir/../file0\x00', 0x80, 0x3e4fcec92923ce05) r2 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x50008, 0x0, 0x10081, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r3 = openat(r1, &(0x7f0000000000)='mnt/encrypted_dir/../file0\x00', 0x40, 0x100) r4 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r4, 0x7, 0x0, 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r4, 0xc0406619, &(0x7f00000001c0)={@desc={0x1, 0x0, @desc2}}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000140)=',,\\\x00') futimesat(r3, &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0)={{0x0, 0xea60}}) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000680)=ANY=[@ANYBLOB="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", @ANYRES32, @ANYBLOB="02000000000000006d6e742f656e637279707465645f6469722f2e2e2f66696c653000"]) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') 15:12:43 executing program 1: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, 0x0) mount$bind(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x64000, 0xf0ffff) 15:12:43 executing program 3: setregid(0xffffffffffffffff, 0xee01) setresgid(0x0, 0x0, 0x0) r0 = fork() kcmp(r0, r0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 15:12:43 executing program 7: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCSBRKP(r0, 0x5428, 0x994a) 15:12:43 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x4b52, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "bb09819e2f6e8485"}) 15:12:43 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x4b65, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "bb09819e2f6e8485"}) 15:12:43 executing program 4: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) open$dir(&(0x7f0000000200)='./mnt\x00', 0x40040, 0x10) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir/../file0\x00', 0x80, 0x3e4fcec92923ce05) r2 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x50008, 0x0, 0x10081, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r3 = openat(r1, &(0x7f0000000000)='mnt/encrypted_dir/../file0\x00', 0x40, 0x100) r4 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r4, 0x7, 0x0, 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r4, 0xc0406619, &(0x7f00000001c0)={@desc={0x1, 0x0, @desc2}}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000140)=',,\\\x00') futimesat(r3, &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0)={{0x0, 0xea60}}) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000680)=ANY=[@ANYBLOB="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", @ANYRES32, @ANYBLOB="02000000000000006d6e742f656e637279707465645f6469722f2e2e2f66696c653000"]) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') 15:12:43 executing program 1: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, 0x0) mount$bind(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x64000, 0x1000000) 15:12:43 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCADDRT(r0, 0x890b, &(0x7f0000000740)={0x0, @l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, @ethernet={0x0, @link_local}, @xdp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x5, 0x3}) 15:12:43 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x4b66, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "bb09819e2f6e8485"}) 15:12:43 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x4b52, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "bb09819e2f6e8485"}) 15:12:43 executing program 7: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCSBRKP(r0, 0x5437, 0x994a) 15:12:43 executing program 3: setregid(0xffffffffffffffff, 0xee01) setresgid(0x0, 0x0, 0x0) r0 = fork() kcmp(r0, r0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 15:12:43 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCADDRT(r0, 0x890b, &(0x7f0000000740)={0x0, @l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, @ethernet={0x0, @link_local}, @xdp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x3}) 15:12:43 executing program 6: setregid(0xffffffffffffffff, 0xee01) setresgid(0x0, 0x0, 0x0) r0 = fork() kcmp(r0, r0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 15:12:43 executing program 4: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1c08a4, 0x0) r1 = syz_mount_image$nfs4(0x0, 0x0, 0xa8a, 0x0, 0x0, 0x6c810, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) open$dir(&(0x7f0000000200)='./mnt\x00', 0x40040, 0x10) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir/../file0\x00', 0x80, 0x3e4fcec92923ce05) r2 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x50008, 0x0, 0x10081, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r3 = openat(r1, &(0x7f0000000000)='mnt/encrypted_dir/../file0\x00', 0x40, 0x100) r4 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r4, 0x7, 0x0, 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r4, 0xc0406619, &(0x7f00000001c0)={@desc={0x1, 0x0, @desc2}}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000140)=',,\\\x00') futimesat(r3, &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0)={{0x0, 0xea60}}) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000680)=ANY=[@ANYBLOB="b00900000000000018000000468a29458f2709d329f6d3f3917408961482081d984538af2f9bcf61c448afbaa0be3f00000000000000ca4aa56fc413a417324e8530165c3515981e2d28f7fce9ae3c6bb8fa04ff6411132c9ced479abaeea325c2205ea95984d3d7f98eea1cca02dfeb0b2471b497fbb71b60180d35e2a3394ba6d965f41c7b7bc29d4e3ca95bd7ad074a4242ec98a69ad9d1546ce18cbbd98d2e50688e958a0fcd16876ab83cdb94eeb03e42203f267a1bf6ccb1c07ad92e6e493149da32f754251ae74d30cd4b50eefd6a208172ed8693b320eda714bdd152b484d9c939b4bb777dddd947843d73529f5ffe589777254cb10f733351e0739a3a61c3b8f977517ee7becda66da23a93e3be8ed63bda262951b32f72c1c48ee63be474eafaa255074efaa494b950f48b119c76c70b833e4d7443b691dc97bf78bcae908758ff1edaf2ad48dd67d0337c8ecfcd47e8ce5598c435f4645d719ae60a12c5b37ed2d45571c29ff6af1292ed2ff7fa24e2ab69f18db826044f35683810d2ee95f68f586a8922acdc225912820cdffe6ac29641f3c531a0eb1ddbf17341a05f3ee437f2a56a4a92af8ba2e413d00d05caab40963868dc00da000dfe8962927be81ca05afcc624225b2667a1208dd74e8bb6ced5e1da98f41bb3dedc31302fbf6ed40e9c526f82b53ce45e25e20ce9068bba911f0ec11403a35ff01cee623f71101155fcb646937ac714ac49741b4a1ffc6a72cba387bf41c1af2eeaa80a07631a22d366562924848da0f27c", @ANYRES32, @ANYBLOB="02000000000000006d6e742f656e637279707465645f6469722f2e2e2f66696c653000"]) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') 15:12:43 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCADDRT(r0, 0x890b, &(0x7f0000000740)={0x0, @l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, @ethernet={0x0, @link_local}, @xdp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}) 15:12:43 executing program 3: r0 = getegid() setresgid(r0, r0, 0x0) r1 = fork() kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 15:12:56 executing program 4: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1c08a4, 0x0) r1 = syz_mount_image$nfs4(0x0, 0x0, 0xa8a, 0x0, 0x0, 0x6c810, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) open$dir(&(0x7f0000000200)='./mnt\x00', 0x40040, 0x10) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir/../file0\x00', 0x80, 0x3e4fcec92923ce05) r2 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x50008, 0x0, 0x10081, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r3 = openat(r1, &(0x7f0000000000)='mnt/encrypted_dir/../file0\x00', 0x40, 0x100) r4 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r4, 0x7, 0x0, 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r4, 0xc0406619, &(0x7f00000001c0)={@desc={0x1, 0x0, @desc2}}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000140)=',,\\\x00') futimesat(r3, &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0)={{0x0, 0xea60}}) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000680)=ANY=[@ANYBLOB="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", @ANYRES32, @ANYBLOB="02000000000000006d6e742f656e637279707465645f6469722f2e2e2f66696c653000"]) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') 15:12:56 executing program 1: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, 0x0) mount$bind(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x64000, 0x2000000) 15:12:56 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x4b67, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "bb09819e2f6e8485"}) 15:12:56 executing program 3: r0 = getegid() setresgid(r0, r0, 0x0) r1 = fork() kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 15:12:56 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x4b52, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "bb09819e2f6e8485"}) 15:12:56 executing program 7: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCSBRKP(r0, 0x5441, 0x994a) 15:12:56 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCADDRT(r0, 0x890b, &(0x7f0000000740)={0x0, @l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, @ethernet={0x0, @link_local}, @xdp}) 15:12:56 executing program 6: setregid(0xffffffffffffffff, 0xee01) setresgid(0x0, 0x0, 0x0) r0 = fork() kcmp(r0, r0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 15:12:57 executing program 7: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCSBRKP(r0, 0x5450, 0x994a) 15:12:57 executing program 2: ioctl$TCSETAW(0xffffffffffffffff, 0x4b52, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "bb09819e2f6e8485"}) 15:12:57 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x4b68, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "bb09819e2f6e8485"}) 15:12:57 executing program 1: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, 0x0) mount$bind(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x64000, 0x20000000) 15:12:57 executing program 2: ioctl$TCSETAW(0xffffffffffffffff, 0x4b52, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "bb09819e2f6e8485"}) 15:12:57 executing program 5: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1c08a4, 0x0) r1 = syz_mount_image$nfs4(0x0, 0x0, 0xa8a, 0x0, 0x0, 0x6c810, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) open$dir(&(0x7f0000000200)='./mnt\x00', 0x40040, 0x10) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir/../file0\x00', 0x80, 0x3e4fcec92923ce05) r2 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x50008, 0x0, 0x10081, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r3 = openat(r1, &(0x7f0000000000)='mnt/encrypted_dir/../file0\x00', 0x40, 0x100) r4 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r4, 0x7, 0x0, 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r4, 0xc0406619, &(0x7f00000001c0)={@desc={0x1, 0x0, @desc2}}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000140)=',,\\\x00') futimesat(r3, &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0)={{0x0, 0xea60}}) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000680)=ANY=[@ANYBLOB="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", @ANYRES32, @ANYBLOB="02000000000000006d6e742f656e637279707465645f6469722f2e2e2f66696c653000"]) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') 15:12:57 executing program 3: r0 = getegid() setresgid(r0, r0, 0x0) r1 = fork() kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 15:12:57 executing program 4: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1c08a4, 0x0) r1 = syz_mount_image$nfs4(0x0, 0x0, 0xa8a, 0x0, 0x0, 0x6c810, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) open$dir(&(0x7f0000000200)='./mnt\x00', 0x40040, 0x10) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir/../file0\x00', 0x80, 0x3e4fcec92923ce05) r2 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x50008, 0x0, 0x10081, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r3 = openat(r1, &(0x7f0000000000)='mnt/encrypted_dir/../file0\x00', 0x40, 0x100) r4 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r4, 0x7, 0x0, 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r4, 0xc0406619, &(0x7f00000001c0)={@desc={0x1, 0x0, @desc2}}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000140)=',,\\\x00') futimesat(r3, &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0)={{0x0, 0xea60}}) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000680)=ANY=[@ANYBLOB="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", @ANYRES32, @ANYBLOB="02000000000000006d6e742f656e637279707465645f6469722f2e2e2f66696c653000"]) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') 15:13:08 executing program 6: setregid(0xffffffffffffffff, 0xee01) setresgid(0x0, 0x0, 0x0) r0 = fork() kcmp(r0, r0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 15:13:08 executing program 5: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCSBRKP(r0, 0x5437, 0x994a) 15:13:08 executing program 3: setregid(0xffffffffffffffff, 0xee01) r0 = getegid() setresgid(0x0, r0, 0x0) r1 = fork() kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 15:13:08 executing program 4: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1c08a4, 0x0) r1 = syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x6c810, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) open$dir(&(0x7f0000000200)='./mnt\x00', 0x40040, 0x10) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir/../file0\x00', 0x80, 0x3e4fcec92923ce05) r2 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x50008, 0x0, 0x10081, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r3 = openat(r1, &(0x7f0000000000)='mnt/encrypted_dir/../file0\x00', 0x40, 0x100) r4 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r4, 0x7, 0x0, 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r4, 0xc0406619, &(0x7f00000001c0)={@desc={0x1, 0x0, @desc2}}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000140)=',,\\\x00') futimesat(r3, &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0)={{0x0, 0xea60}}) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000680)=ANY=[@ANYBLOB="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", @ANYRES32, @ANYBLOB="02000000000000006d6e742f656e637279707465645f6469722f2e2e2f66696c653000"]) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') 15:13:08 executing program 2: ioctl$TCSETAW(0xffffffffffffffff, 0x4b52, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "bb09819e2f6e8485"}) 15:13:08 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x4b69, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "bb09819e2f6e8485"}) 15:13:08 executing program 7: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCSBRKP(r0, 0x5451, 0x994a) 15:13:08 executing program 1: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, 0x0) mount$bind(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x64000, 0x20100000) 15:13:22 executing program 6: setregid(0xffffffffffffffff, 0xee01) setresgid(0x0, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 15:13:22 executing program 3: setregid(0xffffffffffffffff, 0xee01) r0 = getegid() setresgid(0x0, r0, 0x0) r1 = fork() kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 15:13:22 executing program 1: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, 0x0) mount$bind(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x64000, 0x8cffffff) 15:13:22 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x4b52, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "bb09819e2f6e8485"}) 15:13:22 executing program 7: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCSBRKP(r0, 0x5452, 0x994a) 15:13:22 executing program 5: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) open$dir(&(0x7f0000000200)='./mnt\x00', 0x40040, 0x10) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir/../file0\x00', 0x80, 0x3e4fcec92923ce05) r2 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x50008, 0x0, 0x10081, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r3 = openat(r1, &(0x7f0000000000)='mnt/encrypted_dir/../file0\x00', 0x40, 0x100) r4 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r4, 0x7, 0x0, 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r4, 0xc0406619, &(0x7f00000001c0)={@desc={0x1, 0x0, @desc2}}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000140)=',,\\\x00') futimesat(r3, &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0)={{0x0, 0xea60}}) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000680)=ANY=[@ANYBLOB="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", @ANYRES32, @ANYBLOB="02000000000000006d6e742f656e637279707465645f6469722f2e2e2f66696c653000"]) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') 15:13:22 executing program 4: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1c08a4, 0x0) r1 = syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x6c810, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) open$dir(&(0x7f0000000200)='./mnt\x00', 0x40040, 0x10) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir/../file0\x00', 0x80, 0x3e4fcec92923ce05) r2 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x50008, 0x0, 0x10081, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r3 = openat(r1, &(0x7f0000000000)='mnt/encrypted_dir/../file0\x00', 0x40, 0x100) r4 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r4, 0x7, 0x0, 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r4, 0xc0406619, &(0x7f00000001c0)={@desc={0x1, 0x0, @desc2}}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000140)=',,\\\x00') futimesat(r3, &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0)={{0x0, 0xea60}}) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000680)=ANY=[@ANYBLOB="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", @ANYRES32, @ANYBLOB="02000000000000006d6e742f656e637279707465645f6469722f2e2e2f66696c653000"]) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') 15:13:22 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x4b6a, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "bb09819e2f6e8485"}) 15:13:22 executing program 2: syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(0xffffffffffffffff, 0x4b52, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "bb09819e2f6e8485"}) 15:13:22 executing program 6: setregid(0xffffffffffffffff, 0xee01) setresgid(0x0, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 15:13:22 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x4b70, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "bb09819e2f6e8485"}) 15:13:22 executing program 1: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, 0x0) mount$bind(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x64000, 0xf6ffffff) 15:13:22 executing program 7: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCSBRKP(r0, 0x545d, 0x994a) 15:13:22 executing program 3: setregid(0xffffffffffffffff, 0xee01) r0 = getegid() setresgid(0x0, r0, 0x0) r1 = fork() kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 15:13:22 executing program 5: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, 0x0) mount$bind(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x64000, 0x1020) 15:13:22 executing program 4: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1c08a4, 0x0) r1 = syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x6c810, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) open$dir(&(0x7f0000000200)='./mnt\x00', 0x40040, 0x10) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir/../file0\x00', 0x80, 0x3e4fcec92923ce05) r2 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x50008, 0x0, 0x10081, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r3 = openat(r1, &(0x7f0000000000)='mnt/encrypted_dir/../file0\x00', 0x40, 0x100) r4 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r4, 0x7, 0x0, 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r4, 0xc0406619, &(0x7f00000001c0)={@desc={0x1, 0x0, @desc2}}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000140)=',,\\\x00') futimesat(r3, &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0)={{0x0, 0xea60}}) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000680)=ANY=[@ANYBLOB="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", @ANYRES32, @ANYBLOB="02000000000000006d6e742f656e637279707465645f6469722f2e2e2f66696c653000"]) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') 15:13:22 executing program 6: setregid(0xffffffffffffffff, 0xee01) setresgid(0x0, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 15:13:22 executing program 2: syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(0xffffffffffffffff, 0x4b52, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "bb09819e2f6e8485"}) 15:13:22 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x4b71, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "bb09819e2f6e8485"}) 15:13:22 executing program 7: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCSBRKP(r0, 0x5460, 0x994a) 15:13:22 executing program 1: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, 0x0) mount$bind(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x64000, 0xfffff000) 15:13:23 executing program 6: setregid(0xffffffffffffffff, 0xee01) r0 = fork() kcmp(r0, r0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 15:13:23 executing program 3: setregid(0xffffffffffffffff, 0xee01) r0 = getegid() setresgid(r0, 0x0, 0x0) r1 = fork() kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 15:13:23 executing program 5: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1c08a4, 0x0) r1 = syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x6c810, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) open$dir(&(0x7f0000000200)='./mnt\x00', 0x40040, 0x10) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir/../file0\x00', 0x80, 0x3e4fcec92923ce05) r2 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x50008, 0x0, 0x10081, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r3 = openat(r1, &(0x7f0000000000)='mnt/encrypted_dir/../file0\x00', 0x40, 0x100) r4 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r4, 0x7, 0x0, 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r4, 0xc0406619, &(0x7f00000001c0)={@desc={0x1, 0x0, @desc2}}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000140)=',,\\\x00') futimesat(r3, &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0)={{0x0, 0xea60}}) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000680)=ANY=[@ANYBLOB="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", @ANYRES32, @ANYBLOB="02000000000000006d6e742f656e637279707465645f6469722f2e2e2f66696c653000"]) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') 15:13:35 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x4b4c, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "bb09819e2f6e8485"}) 15:13:35 executing program 3: setregid(0xffffffffffffffff, 0xee01) r0 = getegid() setresgid(r0, 0x0, 0x0) r1 = fork() kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 15:13:35 executing program 4: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1c08a4, 0x0) r1 = syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) open$dir(&(0x7f0000000200)='./mnt\x00', 0x40040, 0x10) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir/../file0\x00', 0x80, 0x3e4fcec92923ce05) r2 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x50008, 0x0, 0x10081, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r3 = openat(r1, &(0x7f0000000000)='mnt/encrypted_dir/../file0\x00', 0x40, 0x100) r4 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r4, 0x7, 0x0, 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r4, 0xc0406619, &(0x7f00000001c0)={@desc={0x1, 0x0, @desc2}}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000140)=',,\\\x00') futimesat(r3, &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0)={{0x0, 0xea60}}) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000680)=ANY=[@ANYBLOB="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", @ANYRES32, @ANYBLOB="02000000000000006d6e742f656e637279707465645f6469722f2e2e2f66696c653000"]) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') 15:13:35 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x4b72, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "bb09819e2f6e8485"}) 15:13:35 executing program 2: syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(0xffffffffffffffff, 0x4b52, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "bb09819e2f6e8485"}) 15:13:35 executing program 7: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCSBRKP(r0, 0x40049409, 0x994a) 15:13:35 executing program 6: setregid(0xffffffffffffffff, 0xee01) r0 = fork() kcmp(r0, r0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 15:13:35 executing program 1: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, 0x0) mount$bind(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x64000, 0xffffff8c) 15:13:35 executing program 6: setregid(0xffffffffffffffff, 0xee01) r0 = fork() kcmp(r0, r0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 15:13:35 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x4bfa, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "bb09819e2f6e8485"}) 15:13:35 executing program 3: setregid(0xffffffffffffffff, 0xee01) r0 = getegid() setresgid(r0, 0x0, 0x0) r1 = fork() kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 15:13:35 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x4b4c, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "bb09819e2f6e8485"}) 15:13:35 executing program 7: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCSBRKP(r0, 0x40086602, 0x994a) 15:13:35 executing program 6: setresgid(0x0, 0x0, 0x0) r0 = fork() kcmp(r0, r0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 15:13:35 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x4b52, 0x0) 15:13:49 executing program 1: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, 0x0) mount$bind(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x64000, 0xfffffff6) 15:13:49 executing program 6: setresgid(0x0, 0x0, 0x0) r0 = fork() kcmp(r0, r0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 15:13:49 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x4b52, 0x0) 15:13:49 executing program 7: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCSBRKP(r0, 0x40087602, 0x994a) 15:13:49 executing program 4: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1c08a4, 0x0) r1 = syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) open$dir(&(0x7f0000000200)='./mnt\x00', 0x40040, 0x10) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir/../file0\x00', 0x80, 0x3e4fcec92923ce05) r2 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x50008, 0x0, 0x10081, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r3 = openat(r1, &(0x7f0000000000)='mnt/encrypted_dir/../file0\x00', 0x40, 0x100) r4 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r4, 0x7, 0x0, 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r4, 0xc0406619, &(0x7f00000001c0)={@desc={0x1, 0x0, @desc2}}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000140)=',,\\\x00') futimesat(r3, &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0)={{0x0, 0xea60}}) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000680)=ANY=[@ANYBLOB="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", @ANYRES32, @ANYBLOB="02000000000000006d6e742f656e637279707465645f6469722f2e2e2f66696c653000"]) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') 15:13:49 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x4bfb, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "bb09819e2f6e8485"}) 15:13:49 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x4b4c, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "bb09819e2f6e8485"}) 15:13:49 executing program 3: setregid(0xffffffffffffffff, 0xee01) r0 = getegid() setresgid(r0, r0, 0x0) r1 = fork() kcmp(0x0, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) [ 511.849973] cgroup: fork rejected by pids controller in /syz3 15:13:49 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x4b52, 0x0) 15:13:49 executing program 7: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCSBRKP(r0, 0x4020940d, 0x994a) 15:13:49 executing program 6: setresgid(0x0, 0x0, 0x0) r0 = fork() kcmp(r0, r0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 15:13:49 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x5401, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "bb09819e2f6e8485"}) 15:13:49 executing program 5: ioctl$TCSETAW(0xffffffffffffffff, 0x4b4c, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "bb09819e2f6e8485"}) 15:13:49 executing program 4: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1c08a4, 0x0) r1 = syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) open$dir(&(0x7f0000000200)='./mnt\x00', 0x40040, 0x10) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir/../file0\x00', 0x80, 0x3e4fcec92923ce05) r2 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x50008, 0x0, 0x10081, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r3 = openat(r1, &(0x7f0000000000)='mnt/encrypted_dir/../file0\x00', 0x40, 0x100) r4 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r4, 0x7, 0x0, 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r4, 0xc0406619, &(0x7f00000001c0)={@desc={0x1, 0x0, @desc2}}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000140)=',,\\\x00') futimesat(r3, &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0)={{0x0, 0xea60}}) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000680)=ANY=[@ANYBLOB="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", @ANYRES32, @ANYBLOB="02000000000000006d6e742f656e637279707465645f6469722f2e2e2f66696c653000"]) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') 15:13:49 executing program 1: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, 0x0) mount$bind(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x64000, 0x8000000000000) 15:14:04 executing program 1: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, 0x0) mount$bind(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x64000, 0xf0ffffffffffff) 15:14:04 executing program 4: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1c08a4, 0x0) r1 = syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) mkdirat(0xffffffffffffff9c, 0x0, 0xa0) open$dir(&(0x7f0000000200)='./mnt\x00', 0x40040, 0x10) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir/../file0\x00', 0x80, 0x3e4fcec92923ce05) r2 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x50008, 0x0, 0x10081, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r3 = openat(r1, &(0x7f0000000000)='mnt/encrypted_dir/../file0\x00', 0x40, 0x100) r4 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r4, 0x7, 0x0, 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r4, 0xc0406619, &(0x7f00000001c0)={@desc={0x1, 0x0, @desc2}}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000140)=',,\\\x00') futimesat(r3, &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0)={{0x0, 0xea60}}) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000680)=ANY=[@ANYBLOB="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", @ANYRES32, @ANYBLOB="02000000000000006d6e742f656e637279707465645f6469722f2e2e2f66696c653000"]) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') 15:14:04 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x5402, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "bb09819e2f6e8485"}) 15:14:04 executing program 5: ioctl$TCSETAW(0xffffffffffffffff, 0x4b4c, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "bb09819e2f6e8485"}) 15:14:04 executing program 6: setregid(0xffffffffffffffff, 0xee01) setresgid(0x0, 0x0, 0x0) r0 = fork() kcmp(0x0, r0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 15:14:04 executing program 7: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCSBRKP(r0, 0x80045432, 0x994a) 15:14:04 executing program 3: setregid(0xffffffffffffffff, 0xee01) r0 = getegid() setresgid(r0, r0, 0x0) r1 = fork() kcmp(0x0, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 15:14:04 executing program 2: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1c08a4, 0x0) r1 = syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) open$dir(&(0x7f0000000200)='./mnt\x00', 0x40040, 0x10) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir/../file0\x00', 0x80, 0x3e4fcec92923ce05) r2 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x50008, 0x0, 0x10081, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r3 = openat(r1, &(0x7f0000000000)='mnt/encrypted_dir/../file0\x00', 0x40, 0x100) r4 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r4, 0x7, 0x0, 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r4, 0xc0406619, &(0x7f00000001c0)={@desc={0x1, 0x0, @desc2}}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000140)=',,\\\x00') futimesat(r3, &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0)={{0x0, 0xea60}}) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000680)=ANY=[@ANYBLOB="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", @ANYRES32, @ANYBLOB="02000000000000006d6e742f656e637279707465645f6469722f2e2e2f66696c653000"]) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') 15:14:04 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x5403, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "bb09819e2f6e8485"}) 15:14:04 executing program 5: ioctl$TCSETAW(0xffffffffffffffff, 0x4b4c, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "bb09819e2f6e8485"}) 15:14:04 executing program 7: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCSBRKP(r0, 0x80045440, 0x994a) 15:14:04 executing program 4: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1c08a4, 0x0) r1 = syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) mkdirat(0xffffffffffffff9c, 0x0, 0xa0) open$dir(&(0x7f0000000200)='./mnt\x00', 0x40040, 0x10) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir/../file0\x00', 0x80, 0x3e4fcec92923ce05) r2 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x50008, 0x0, 0x10081, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r3 = openat(r1, &(0x7f0000000000)='mnt/encrypted_dir/../file0\x00', 0x40, 0x100) r4 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r4, 0x7, 0x0, 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r4, 0xc0406619, &(0x7f00000001c0)={@desc={0x1, 0x0, @desc2}}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000140)=',,\\\x00') futimesat(r3, &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0)={{0x0, 0xea60}}) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000680)=ANY=[@ANYBLOB="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", @ANYRES32, @ANYBLOB="02000000000000006d6e742f656e637279707465645f6469722f2e2e2f66696c653000"]) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') 15:14:04 executing program 6: setregid(0xffffffffffffffff, 0xee01) setresgid(0x0, 0x0, 0x0) r0 = fork() kcmp(0x0, r0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 15:14:04 executing program 1: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, 0x0) mount$bind(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x64000, 0x100000000000000) 15:14:16 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x4b4c, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "bb09819e2f6e8485"}) 15:14:16 executing program 4: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1c08a4, 0x0) r1 = syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) mkdirat(0xffffffffffffff9c, 0x0, 0xa0) open$dir(&(0x7f0000000200)='./mnt\x00', 0x40040, 0x10) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir/../file0\x00', 0x80, 0x3e4fcec92923ce05) r2 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x50008, 0x0, 0x10081, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r3 = openat(r1, &(0x7f0000000000)='mnt/encrypted_dir/../file0\x00', 0x40, 0x100) r4 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r4, 0x7, 0x0, 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r4, 0xc0406619, &(0x7f00000001c0)={@desc={0x1, 0x0, @desc2}}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000140)=',,\\\x00') futimesat(r3, &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0)={{0x0, 0xea60}}) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000680)=ANY=[@ANYBLOB="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", @ANYRES32, @ANYBLOB="02000000000000006d6e742f656e637279707465645f6469722f2e2e2f66696c653000"]) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') 15:14:16 executing program 7: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCSBRKP(r0, 0x80086601, 0x994a) 15:14:16 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x5402, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "bb09819e2f6e8485"}) 15:14:16 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "bb09819e2f6e8485"}) 15:14:16 executing program 3: setregid(0xffffffffffffffff, 0xee01) r0 = getegid() setresgid(r0, r0, 0x0) r1 = fork() kcmp(0x0, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 15:14:16 executing program 1: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, 0x0) mount$bind(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x64000, 0x200000000000000) 15:14:16 executing program 6: setregid(0xffffffffffffffff, 0xee01) setresgid(0x0, 0x0, 0x0) r0 = fork() kcmp(0x0, r0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 15:14:16 executing program 6: setregid(0xffffffffffffffff, 0xee01) setresgid(0x0, 0x0, 0x0) r0 = fork() kcmp(r0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 15:14:16 executing program 6: setregid(0xffffffffffffffff, 0xee01) setresgid(0x0, 0x0, 0x0) r0 = fork() kcmp(r0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 15:14:16 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x5405, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "bb09819e2f6e8485"}) 15:14:16 executing program 5: syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(0xffffffffffffffff, 0x4b4c, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "bb09819e2f6e8485"}) 15:14:16 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x5402, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "bb09819e2f6e8485"}) 15:14:16 executing program 7: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCSBRKP(r0, 0x80087601, 0x994a) 15:14:16 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x5406, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "bb09819e2f6e8485"}) 15:14:28 executing program 5: syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(0xffffffffffffffff, 0x4b4c, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "bb09819e2f6e8485"}) 15:14:28 executing program 3: setregid(0xffffffffffffffff, 0xee01) r0 = getegid() setresgid(r0, r0, 0x0) r1 = fork() kcmp(r1, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 15:14:28 executing program 6: setregid(0xffffffffffffffff, 0xee01) setresgid(0x0, 0x0, 0x0) r0 = fork() kcmp(r0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 15:14:28 executing program 1: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, 0x0) mount$bind(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x64000, 0x2000000000000000) 15:14:28 executing program 4: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1c08a4, 0x0) r1 = syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) open$dir(&(0x7f0000000200)='./mnt\x00', 0x40040, 0x10) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir/../file0\x00', 0x80, 0x3e4fcec92923ce05) r2 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x50008, 0x0, 0x10081, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r3 = openat(r1, &(0x7f0000000000)='mnt/encrypted_dir/../file0\x00', 0x40, 0x100) r4 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r4, 0x7, 0x0, 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r4, 0xc0406619, &(0x7f00000001c0)={@desc={0x1, 0x0, @desc2}}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000140)=',,\\\x00') futimesat(r3, &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0)={{0x0, 0xea60}}) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000680)=ANY=[@ANYBLOB="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", @ANYRES32, @ANYBLOB="02000000000000006d6e742f656e637279707465645f6469722f2e2e2f66696c653000"]) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') 15:14:28 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x5402, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "bb09819e2f6e8485"}) 15:14:28 executing program 7: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCSBRKP(r0, 0xc0045878, 0x994a) 15:14:28 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x5408, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "bb09819e2f6e8485"}) 15:14:28 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x5409, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "bb09819e2f6e8485"}) 15:14:28 executing program 2: ioctl$TCSETAW(0xffffffffffffffff, 0x5402, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "bb09819e2f6e8485"}) 15:14:28 executing program 4: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1c08a4, 0x0) r1 = syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) open$dir(&(0x7f0000000200)='./mnt\x00', 0x40040, 0x10) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir/../file0\x00', 0x80, 0x3e4fcec92923ce05) r2 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x50008, 0x0, 0x10081, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r3 = openat(r1, &(0x7f0000000000)='mnt/encrypted_dir/../file0\x00', 0x40, 0x100) r4 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r4, 0x7, 0x0, 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r4, 0xc0406619, &(0x7f00000001c0)={@desc={0x1, 0x0, @desc2}}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000140)=',,\\\x00') futimesat(r3, &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0)={{0x0, 0xea60}}) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000680)=ANY=[@ANYBLOB="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", @ANYRES32, @ANYBLOB="02000000000000006d6e742f656e637279707465645f6469722f2e2e2f66696c653000"]) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') 15:14:28 executing program 5: syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(0xffffffffffffffff, 0x4b4c, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "bb09819e2f6e8485"}) 15:14:28 executing program 7: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCSBRKP(r0, 0xc0045878, 0x994a) 15:14:28 executing program 2: ioctl$TCSETAW(0xffffffffffffffff, 0x5402, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "bb09819e2f6e8485"}) 15:14:28 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x540a, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "bb09819e2f6e8485"}) 15:14:28 executing program 1: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, 0x0) mount$bind(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x64000, 0x2010000000000000) 15:14:28 executing program 4: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1c08a4, 0x0) r1 = syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) open$dir(&(0x7f0000000200)='./mnt\x00', 0x40040, 0x10) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir/../file0\x00', 0x80, 0x3e4fcec92923ce05) r2 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x50008, 0x0, 0x10081, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r3 = openat(r1, &(0x7f0000000000)='mnt/encrypted_dir/../file0\x00', 0x40, 0x100) r4 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r4, 0x7, 0x0, 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r4, 0xc0406619, &(0x7f00000001c0)={@desc={0x1, 0x0, @desc2}}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000140)=',,\\\x00') futimesat(r3, &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0)={{0x0, 0xea60}}) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000680)=ANY=[@ANYBLOB="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", @ANYRES32, @ANYBLOB="02000000000000006d6e742f656e637279707465645f6469722f2e2e2f66696c653000"]) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') 15:14:42 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x4b4c, 0x0) 15:14:42 executing program 7: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCSBRKP(r0, 0xc0189436, 0x994a) 15:14:42 executing program 3: setregid(0xffffffffffffffff, 0xee01) r0 = getegid() setresgid(r0, r0, 0x0) r1 = fork() kcmp(r1, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 15:14:42 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x540b, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "bb09819e2f6e8485"}) 15:14:42 executing program 6: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCSBRKP(r0, 0xc0045878, 0x994a) 15:14:42 executing program 2: ioctl$TCSETAW(0xffffffffffffffff, 0x5402, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "bb09819e2f6e8485"}) 15:14:42 executing program 1: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, 0x0) mount$bind(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x64000, 0x8cffffff00000000) 15:14:42 executing program 4: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1c08a4, 0x0) r1 = syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) open$dir(0x0, 0x40040, 0x10) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir/../file0\x00', 0x80, 0x3e4fcec92923ce05) r2 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x50008, 0x0, 0x10081, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r3 = openat(r1, &(0x7f0000000000)='mnt/encrypted_dir/../file0\x00', 0x40, 0x100) r4 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r4, 0x7, 0x0, 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r4, 0xc0406619, &(0x7f00000001c0)={@desc={0x1, 0x0, @desc2}}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000140)=',,\\\x00') futimesat(r3, &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0)={{0x0, 0xea60}}) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000680)=ANY=[@ANYBLOB="b00900000000000018000000468a29458f2709d329f6d3f3917408961482081d984538af2f9bcf61c448afbaa0be3f00000000000000ca4aa56fc413a417324e8530165c3515981e2d28f7fce9ae3c6bb8fa04ff6411132c9ced479abaeea325c2205ea95984d3d7f98eea1cca02dfeb0b2471b497fbb71b60180d35e2a3394ba6d965f41c7b7bc29d4e3ca95bd7ad074a4242ec98a69ad9d1546ce18cbbd98d2e50688e958a0fcd16876ab83cdb94eeb03e42203f267a1bf6ccb1c07ad92e6e493149da32f754251ae74d30cd4b50eefd6a208172ed8693b320eda714bdd152b484d9c939b4bb777dddd947843d73529f5ffe589777254cb10f733351e0739a3a61c3b8f977517ee7becda66da23a93e3be8ed63bda262951b32f72c1c48ee63be474eafaa255074efaa494b950f48b119c76c70b833e4d7443b691dc97bf78bcae908758ff1edaf2ad48dd67d0337c8ecfcd47e8ce5598c435f4645d719ae60a12c5b37ed2d45571c29ff6af1292ed2ff7fa24e2ab69f18db826044f35683810d2ee95f68f586a8922acdc225912820cdffe6ac29641f3c531a0eb1ddbf17341a05f3ee437f2a56a4a92af8ba2e413d00d05caab40963868dc00da000dfe8962927be81ca05afcc624225b2667a1208dd74e8bb6ced5e1da98f41bb3dedc31302fbf6ed40e9c526f82b53ce45e25e20ce9068bba911f0ec11403a35ff01cee623f71101155fcb646937ac714ac49741b4a1ffc6a72cba387bf41c1af2eeaa80a07631a22d366562924848da0f27c", @ANYRES32, @ANYBLOB="02000000000000006d6e742f656e637279707465645f6469722f2e2e2f66696c653000"]) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') 15:14:42 executing program 6: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x540a, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "bb09819e2f6e8485"}) 15:14:42 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x4b4c, 0x0) 15:14:42 executing program 7: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCSBRKP(r0, 0xc020660b, 0x994a) 15:14:42 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x540c, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "bb09819e2f6e8485"}) 15:14:42 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x5402, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "bb09819e2f6e8485"}) 15:14:42 executing program 4: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1c08a4, 0x0) r1 = syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) open$dir(0x0, 0x40040, 0x10) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir/../file0\x00', 0x80, 0x3e4fcec92923ce05) r2 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x50008, 0x0, 0x10081, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r3 = openat(r1, &(0x7f0000000000)='mnt/encrypted_dir/../file0\x00', 0x40, 0x100) r4 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r4, 0x7, 0x0, 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r4, 0xc0406619, &(0x7f00000001c0)={@desc={0x1, 0x0, @desc2}}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000140)=',,\\\x00') futimesat(r3, &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0)={{0x0, 0xea60}}) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000680)=ANY=[@ANYBLOB="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", @ANYRES32, @ANYBLOB="02000000000000006d6e742f656e637279707465645f6469722f2e2e2f66696c653000"]) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') 15:14:42 executing program 1: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, 0x0) mount$bind(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x64000, 0xf6ffffff00000000) 15:14:42 executing program 6: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x540a, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "bb09819e2f6e8485"}) 15:14:42 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x4b4c, 0x0) 15:14:42 executing program 2: syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(0xffffffffffffffff, 0x5402, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "bb09819e2f6e8485"}) 15:14:42 executing program 3: setregid(0xffffffffffffffff, 0xee01) r0 = getegid() setresgid(r0, r0, 0x0) r1 = fork() kcmp(r1, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 15:14:56 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x540d, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "bb09819e2f6e8485"}) 15:14:56 executing program 2: syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(0xffffffffffffffff, 0x5402, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "bb09819e2f6e8485"}) 15:14:56 executing program 4: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1c08a4, 0x0) r1 = syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) open$dir(0x0, 0x40040, 0x10) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir/../file0\x00', 0x80, 0x3e4fcec92923ce05) r2 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x50008, 0x0, 0x10081, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r3 = openat(r1, &(0x7f0000000000)='mnt/encrypted_dir/../file0\x00', 0x40, 0x100) r4 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r4, 0x7, 0x0, 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r4, 0xc0406619, &(0x7f00000001c0)={@desc={0x1, 0x0, @desc2}}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000140)=',,\\\x00') futimesat(r3, &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0)={{0x0, 0xea60}}) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000680)=ANY=[@ANYBLOB="b00900000000000018000000468a29458f2709d329f6d3f3917408961482081d984538af2f9bcf61c448afbaa0be3f00000000000000ca4aa56fc413a417324e8530165c3515981e2d28f7fce9ae3c6bb8fa04ff6411132c9ced479abaeea325c2205ea95984d3d7f98eea1cca02dfeb0b2471b497fbb71b60180d35e2a3394ba6d965f41c7b7bc29d4e3ca95bd7ad074a4242ec98a69ad9d1546ce18cbbd98d2e50688e958a0fcd16876ab83cdb94eeb03e42203f267a1bf6ccb1c07ad92e6e493149da32f754251ae74d30cd4b50eefd6a208172ed8693b320eda714bdd152b484d9c939b4bb777dddd947843d73529f5ffe589777254cb10f733351e0739a3a61c3b8f977517ee7becda66da23a93e3be8ed63bda262951b32f72c1c48ee63be474eafaa255074efaa494b950f48b119c76c70b833e4d7443b691dc97bf78bcae908758ff1edaf2ad48dd67d0337c8ecfcd47e8ce5598c435f4645d719ae60a12c5b37ed2d45571c29ff6af1292ed2ff7fa24e2ab69f18db826044f35683810d2ee95f68f586a8922acdc225912820cdffe6ac29641f3c531a0eb1ddbf17341a05f3ee437f2a56a4a92af8ba2e413d00d05caab40963868dc00da000dfe8962927be81ca05afcc624225b2667a1208dd74e8bb6ced5e1da98f41bb3dedc31302fbf6ed40e9c526f82b53ce45e25e20ce9068bba911f0ec11403a35ff01cee623f71101155fcb646937ac714ac49741b4a1ffc6a72cba387bf41c1af2eeaa80a07631a22d366562924848da0f27c", @ANYRES32, @ANYBLOB="02000000000000006d6e742f656e637279707465645f6469722f2e2e2f66696c653000"]) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') 15:14:56 executing program 6: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x540a, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "bb09819e2f6e8485"}) 15:14:56 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x5403, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "bb09819e2f6e8485"}) 15:14:56 executing program 1: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, 0x0) mount$bind(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x64000, 0xfffffffffffff000) 15:14:56 executing program 7: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x80, 0x0) ioctl$TCSBRKP(r0, 0x5425, 0x994a) 15:14:56 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x4b4b, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "bb09819e2f6e8485"}) 15:14:56 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x540e, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "bb09819e2f6e8485"}) 15:14:56 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x4b4b, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "bb09819e2f6e8485"}) 15:14:56 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x5403, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "bb09819e2f6e8485"}) 15:14:56 executing program 2: syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(0xffffffffffffffff, 0x5402, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "bb09819e2f6e8485"}) 15:14:56 executing program 1: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0xfffffffffffffff9, 0x0, 0x0, 0xc2031, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, 0x0) chroot(&(0x7f0000000080)='./file0\x00') mount$bind(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x64000, 0x0) 15:14:56 executing program 6: ioctl$TCSETAW(0xffffffffffffffff, 0x540a, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "bb09819e2f6e8485"}) 15:14:56 executing program 4: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1c08a4, 0x0) r1 = syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) open$dir(&(0x7f0000000200)='./mnt\x00', 0x0, 0x10) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir/../file0\x00', 0x80, 0x3e4fcec92923ce05) r2 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x50008, 0x0, 0x10081, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r3 = openat(r1, &(0x7f0000000000)='mnt/encrypted_dir/../file0\x00', 0x40, 0x100) r4 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r4, 0x7, 0x0, 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r4, 0xc0406619, &(0x7f00000001c0)={@desc={0x1, 0x0, @desc2}}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000140)=',,\\\x00') futimesat(r3, &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0)={{0x0, 0xea60}}) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000680)=ANY=[@ANYBLOB="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", @ANYRES32, @ANYBLOB="02000000000000006d6e742f656e637279707465645f6469722f2e2e2f66696c653000"]) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') 15:15:13 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x540f, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "bb09819e2f6e8485"}) 15:15:13 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x5403, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "bb09819e2f6e8485"}) 15:15:13 executing program 7: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000080), 0x4c1, 0x0) ioctl$TIOCL_SCROLLCONSOLE(0xffffffffffffffff, 0x541c, &(0x7f0000000000)={0xd, 0x800}) r1 = fsmount(0xffffffffffffffff, 0x0, 0x5) ioctl$KDGKBTYPE(r1, 0x4b33, &(0x7f0000000040)) ioctl$TCSBRKP(r0, 0x5425, 0x994a) 15:15:13 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'wlan1\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000080)={r1, 0x3, 0x6, @multicast}, 0x10) sendmsg$BATADV_CMD_GET_ORIGINATORS(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x34, 0x0, 0x8, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5, 0x37, 0x1}, @BATADV_ATTR_GW_MODE={0x5, 0x33, 0x2}, @BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r1}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0xffff}]}, 0x34}, 0x1, 0x0, 0x0, 0x4c054}, 0x20044000) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, 0x0) mount$bind(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x64000, 0x0) 15:15:13 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x5402, 0x0) 15:15:13 executing program 6: ioctl$TCSETAW(0xffffffffffffffff, 0x540a, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "bb09819e2f6e8485"}) 15:15:13 executing program 4: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1c08a4, 0x0) r1 = syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) open$dir(&(0x7f0000000200)='./mnt\x00', 0x0, 0x10) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir/../file0\x00', 0x80, 0x3e4fcec92923ce05) r2 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x50008, 0x0, 0x10081, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r3 = openat(r1, &(0x7f0000000000)='mnt/encrypted_dir/../file0\x00', 0x40, 0x100) r4 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r4, 0x7, 0x0, 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r4, 0xc0406619, &(0x7f00000001c0)={@desc={0x1, 0x0, @desc2}}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000140)=',,\\\x00') futimesat(r3, &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0)={{0x0, 0xea60}}) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000680)=ANY=[@ANYBLOB="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", @ANYRES32, @ANYBLOB="02000000000000006d6e742f656e637279707465645f6469722f2e2e2f66696c653000"]) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') 15:15:13 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x4b4b, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "bb09819e2f6e8485"}) [ 595.635248] device wlan1 entered promiscuous mode [ 595.662872] device wlan1 left promiscuous mode 15:15:13 executing program 7: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) fgetxattr(r0, &(0x7f00000000c0)=@known='user.incfs.size\x00', 0x0, 0x0) r1 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCSBRKP(r1, 0x5425, 0x994a) r2 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r2, 0x7, 0x0, 0x0, 0x0) ioctl$TIOCGSOFTCAR(r2, 0x5419, &(0x7f0000000040)) 15:15:13 executing program 6: ioctl$TCSETAW(0xffffffffffffffff, 0x540a, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "bb09819e2f6e8485"}) [ 595.671407] device wlan1 entered promiscuous mode [ 595.675389] device wlan1 left promiscuous mode 15:15:13 executing program 5: ioctl$TCSETAW(0xffffffffffffffff, 0x5403, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "bb09819e2f6e8485"}) 15:15:13 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x5410, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "bb09819e2f6e8485"}) 15:15:13 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x5402, 0x0) 15:15:13 executing program 3: ioctl$TCSETAW(0xffffffffffffffff, 0x4b4b, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "bb09819e2f6e8485"}) 15:15:13 executing program 4: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1c08a4, 0x0) r1 = syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) open$dir(&(0x7f0000000200)='./mnt\x00', 0x0, 0x10) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir/../file0\x00', 0x80, 0x3e4fcec92923ce05) r2 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x50008, 0x0, 0x10081, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r3 = openat(r1, &(0x7f0000000000)='mnt/encrypted_dir/../file0\x00', 0x40, 0x100) r4 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r4, 0x7, 0x0, 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r4, 0xc0406619, &(0x7f00000001c0)={@desc={0x1, 0x0, @desc2}}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000140)=',,\\\x00') futimesat(r3, &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0)={{0x0, 0xea60}}) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000680)=ANY=[@ANYBLOB="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", @ANYRES32, @ANYBLOB="02000000000000006d6e742f656e637279707465645f6469722f2e2e2f66696c653000"]) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') 15:15:13 executing program 1: r0 = syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, 0x0) mount$bind(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0xe4884, 0x0) r1 = fsmount(0xffffffffffffffff, 0x1, 0x1) openat(r1, &(0x7f00000003c0)='./file0/file0\x00', 0xc0002, 0x8) stat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0}) newfstatat(0xffffffffffffff9c, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x2000) stat(&(0x7f0000000000)='.\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r4, 0x0) mount$cgroup2(0x0, &(0x7f0000000180)='./file0/file0\x00', &(0x7f00000001c0), 0x92800c, &(0x7f0000000500)=ANY=[@ANYBLOB='rlimit,io,memory_recursiveprot,memory_localevents,memory_localevents,memory_recursiveprot,fowner=', @ANYRESDEC=r2, @ANYBLOB=',appraise_type=imasig,fowner=', @ANYRESDEC=r3, @ANYBLOB=',seclabel,uid>', @ANYRESDEC=r4, @ANYBLOB="2c7375626a5f757365723d2c61707072616973655f747970653d696d617369672c736d61636b6673666c6f6f723d70726f63002c005b49f882359369a0410639309af198c3a03f34b353858f4c139ace9e0843af3ad8cc7631b79859cd6f094774c0d1043631a614730a5ddcf0315a23a88fd9d249ff23d8c09629488f52a34f0b96245638ffd254dbf65eb1701c0bb2636914fc1f0a"]) r5 = openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x103000, 0x151) r6 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r7 = socket$inet_udplite(0x2, 0x2, 0x88) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000380)=@IORING_OP_SPLICE={0x1e, 0x0, 0x0, @fd=r6, 0x7, {0x0, r0}, 0x140000, 0x2, 0x1, {0x0, 0x0, r7}}, 0x6) fsconfig$FSCONFIG_CMD_RECONFIGURE(r6, 0x7, 0x0, 0x0, 0x0) unlinkat(r5, &(0x7f0000000100)='./file0\x00', 0x200) 15:15:13 executing program 5: ioctl$TCSETAW(0xffffffffffffffff, 0x5403, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "bb09819e2f6e8485"}) 15:15:13 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x5402, 0x0) 15:15:13 executing program 3: ioctl$TCSETAW(0xffffffffffffffff, 0x4b4b, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "bb09819e2f6e8485"}) 15:15:13 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x5411, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "bb09819e2f6e8485"}) 15:15:26 executing program 3: ioctl$TCSETAW(0xffffffffffffffff, 0x4b4b, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "bb09819e2f6e8485"}) 15:15:26 executing program 7: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x40001, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) openat(0xffffffffffffff9c, &(0x7f00000004c0)='./file0\x00', 0x200, 0x27) dup2(r1, r0) sendmsg$TIPC_NL_NET_SET(r1, &(0x7f0000000480)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000440)={&(0x7f00000000c0)={0x364, 0x0, 0x8, 0x70bd29, 0x25dfdbff, {}, [@TIPC_NLA_SOCK={0x38, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_CON={0x24, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_NODE={0x8, 0x2, 0xee1}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x3}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x1}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x43}]}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}, @TIPC_NLA_NODE={0x78, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x3}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_KEY={0x49, 0x4, {'gcm(aes)\x00', 0x21, "f3c195c80ad4673ca87602457e7fba2b30da4750b14e5f3ace81add31eaaeccec0"}}, @TIPC_NLA_NODE_ID={0x13, 0x3, "4827a021c17a1e55c2e3a22fdb72b8"}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x200}]}, @TIPC_NLA_LINK={0x90, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0xc, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x20}]}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0x4c, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xe}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x4}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xa3}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}]}]}, @TIPC_NLA_MON={0x24, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x2}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x7f}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x1}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x2}]}, @TIPC_NLA_MON={0x24, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_REF={0x8}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x10000}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x3}]}, @TIPC_NLA_MON={0x2c, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x9a44}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x7}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x6bd}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x44}]}, @TIPC_NLA_MEDIA={0x88, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_PROP={0x34, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8001}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfffffff9}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}]}, @TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x14}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3f}]}, @TIPC_NLA_MEDIA_PROP={0x2c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3f}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7ff0}]}]}, @TIPC_NLA_NET={0x48, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_ADDR={0x8, 0x2, 0x1}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x5}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x4b2}, @TIPC_NLA_NET_ID={0x8}, @TIPC_NLA_NET_ID={0x8}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0xb4}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x2}]}, @TIPC_NLA_MON={0xc, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x3ba}]}, @TIPC_NLA_LINK={0xc0, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_PROP={0x34, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x20}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x14}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x200}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1f}]}, @TIPC_NLA_LINK_PROP={0x1c, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0xfff}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x19}]}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0x54, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xa}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x10000}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x18d}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1e}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}]}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}]}]}, 0x364}, 0x1, 0x0, 0x0, 0x4090}, 0x0) r2 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCSARP(r3, 0x8955, &(0x7f0000000000)={{0x2, 0x0, @local}, {0x0, @local}, 0x20, {0x2, 0x0, @local}, 'dummy0\x00'}) fcntl$addseals(r3, 0x409, 0x6) ioctl$TCSBRKP(r2, 0x5425, 0x994a) 15:15:26 executing program 1: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, 0x0) mount$bind(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x64000, 0x0) syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0xc2, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="41472d28788d15be113162eeff848e41e1cb5272d178d8aa92544cc60c9657c1eff44b256673248fe809cce1553866ae88433831100cbd2828e248c77dcecebd139b9327db1e496646fed021a4807ea31825e3d446f3acf98e551bdab464e847cac6f28b4d9746737b", 0x69, 0x23c}, {&(0x7f0000000200)}], 0x800401, &(0x7f0000000280)={[{@utf8}, {@uid={'uid', 0x3d, 0xee01}}, {}, {}, {@nocompress}, {@overriderock}, {@block={'block', 0x3d, 0x200}}], [{@fsuuid={'fsuuid', 0x3d, {[0x30, 0x34, 0x39, 0x31, 0x33, 0x9, 0x62, 0x36], 0x2d, [0x55, 0x61, 0x35, 0x62], 0x2d, [0x35, 0x37, 0x33, 0x39], 0x2d, [0x62, 0x3c, 0x65, 0x65], 0x2d, [0x62, 0x65, 0x37, 0x33, 0x32, 0x35, 0x61, 0x31]}}}, {@euid_eq}, {@smackfsroot={'smackfsroot', 0x3d, 'proc\x00'}}, {@subj_type={'subj_type', 0x3d, 'proc\x00'}}, {@dont_appraise}, {@subj_role={'subj_role', 0x3d, '\\[{&!\'#:]$^[)(}'}}, {@fsuuid={'fsuuid', 0x3d, {[0x63, 0x35, 0x34, 0x30, 0x33, 0x63], 0x2d, [0x31, 0x64, 0x63, 0x65], 0x2d, [0x39, 0xf8, 0x34, 0x32], 0x2d, [0x65, 0x31, 0x30, 0xa], 0x2d, [0x64, 0x37, 0x0, 0x31, 0x69, 0x36, 0x34, 0x66]}}}, {@permit_directio}]}) 15:15:26 executing program 5: ioctl$TCSETAW(0xffffffffffffffff, 0x5403, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "bb09819e2f6e8485"}) 15:15:26 executing program 2: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1c08a4, 0x0) r1 = syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) open$dir(&(0x7f0000000200)='./mnt\x00', 0x0, 0x10) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir/../file0\x00', 0x80, 0x3e4fcec92923ce05) r2 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x50008, 0x0, 0x10081, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r3 = openat(r1, &(0x7f0000000000)='mnt/encrypted_dir/../file0\x00', 0x40, 0x100) r4 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r4, 0x7, 0x0, 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r4, 0xc0406619, &(0x7f00000001c0)={@desc={0x1, 0x0, @desc2}}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000140)=',,\\\x00') futimesat(r3, &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0)={{0x0, 0xea60}}) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000680)=ANY=[@ANYBLOB="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", @ANYRES32, @ANYBLOB="02000000000000006d6e742f656e637279707465645f6469722f2e2e2f66696c653000"]) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') 15:15:26 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x5412, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "bb09819e2f6e8485"}) 15:15:26 executing program 4: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1c08a4, 0x0) r1 = syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) open$dir(&(0x7f0000000200)='./mnt\x00', 0x40040, 0x0) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir/../file0\x00', 0x80, 0x3e4fcec92923ce05) r2 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x50008, 0x0, 0x10081, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r3 = openat(r1, &(0x7f0000000000)='mnt/encrypted_dir/../file0\x00', 0x40, 0x100) r4 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r4, 0x7, 0x0, 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r4, 0xc0406619, &(0x7f00000001c0)={@desc={0x1, 0x0, @desc2}}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000140)=',,\\\x00') futimesat(r3, &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0)={{0x0, 0xea60}}) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000680)=ANY=[@ANYBLOB="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", @ANYRES32, @ANYBLOB="02000000000000006d6e742f656e637279707465645f6469722f2e2e2f66696c653000"]) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') 15:15:26 executing program 6: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x540a, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "bb09819e2f6e8485"}) 15:15:26 executing program 6: syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(0xffffffffffffffff, 0x540a, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "bb09819e2f6e8485"}) [ 609.209670] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=6154 comm=syz-executor.7 15:15:26 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x4b4b, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "bb09819e2f6e8485"}) 15:15:26 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x5403, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "bb09819e2f6e8485"}) 15:15:26 executing program 4: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1c08a4, 0x0) r1 = syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) open$dir(&(0x7f0000000200)='./mnt\x00', 0x40040, 0x0) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir/../file0\x00', 0x80, 0x3e4fcec92923ce05) r2 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x50008, 0x0, 0x10081, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r3 = openat(r1, &(0x7f0000000000)='mnt/encrypted_dir/../file0\x00', 0x40, 0x100) r4 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r4, 0x7, 0x0, 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r4, 0xc0406619, &(0x7f00000001c0)={@desc={0x1, 0x0, @desc2}}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000140)=',,\\\x00') futimesat(r3, &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0)={{0x0, 0xea60}}) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000680)=ANY=[@ANYBLOB="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", @ANYRES32, @ANYBLOB="02000000000000006d6e742f656e637279707465645f6469722f2e2e2f66696c653000"]) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') 15:15:26 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x5413, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "bb09819e2f6e8485"}) 15:15:26 executing program 1: r0 = syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$cgroup2(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100), 0x1f0b1a5df8e15286, &(0x7f0000000280)=ANY=[@ANYBLOB="6e7364656c65676174652c6d656d6f72795e72656375727369766570726f742c6370752c6d656d6f7281de3fa4602f4d6476656e74732c6d656d6f72795f72656375727369766570726f742c6d656d6f72792c6d61736b3d5ee473a21104684141d5d79f8d654d41595f455845432c646566636f6e746578743d757365725f752c6d6561737572652c00"]) pivot_root(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0\x00') mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, 0x0) mount$bind(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x64000, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000340)={{0x1, 0x1, 0x18, r0, {0x0, 0xee01}}, './file0/file0\x00'}) mount$cgroup2(0x0, &(0x7f0000000180)='./file1\x00', &(0x7f00000001c0), 0x200000, &(0x7f0000000380)={[{@memory_localevents}, {}, {}, {@memory_localevents}, {@memory_localevents}, {@memory_recursiveprot}], [{@fsuuid={'fsuuid', 0x3d, {[0x32, 0x62, 0x30, 0x34, 0x39, 0x39, 0x31, 0x31], 0x2d, [0x65, 0x37, 0x37, 0x30], 0x2d, [0x38, 0x66, 0x65, 0x35], 0x2d, [0x32, 0x6f52deb0d685a209, 0x36, 0x33], 0x2d, [0x65, 0x37, 0x36, 0x39, 0x63, 0x38, 0x31, 0x9ecbeb615d29e865]}}}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@fowner_lt={'fowner<', r1}}, {@smackfstransmute={'smackfstransmute', 0x3d, ')\\\\(@$!\f\xd4-'}}, {@context={'context', 0x3d, 'staff_u'}}, {@mask={'mask', 0x3d, '^MAY_EXEC'}}]}) 15:15:27 executing program 5: syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(0xffffffffffffffff, 0x5403, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "bb09819e2f6e8485"}) 15:15:27 executing program 6: syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(0xffffffffffffffff, 0x540a, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "bb09819e2f6e8485"}) 15:15:27 executing program 4: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1c08a4, 0x0) r1 = syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) open$dir(&(0x7f0000000200)='./mnt\x00', 0x40040, 0x0) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir/../file0\x00', 0x80, 0x3e4fcec92923ce05) r2 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x50008, 0x0, 0x10081, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r3 = openat(r1, &(0x7f0000000000)='mnt/encrypted_dir/../file0\x00', 0x40, 0x100) r4 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r4, 0x7, 0x0, 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r4, 0xc0406619, &(0x7f00000001c0)={@desc={0x1, 0x0, @desc2}}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000140)=',,\\\x00') futimesat(r3, &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0)={{0x0, 0xea60}}) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000680)=ANY=[@ANYBLOB="b00900000000000018000000468a29458f2709d329f6d3f3917408961482081d984538af2f9bcf61c448afbaa0be3f00000000000000ca4aa56fc413a417324e8530165c3515981e2d28f7fce9ae3c6bb8fa04ff6411132c9ced479abaeea325c2205ea95984d3d7f98eea1cca02dfeb0b2471b497fbb71b60180d35e2a3394ba6d965f41c7b7bc29d4e3ca95bd7ad074a4242ec98a69ad9d1546ce18cbbd98d2e50688e958a0fcd16876ab83cdb94eeb03e42203f267a1bf6ccb1c07ad92e6e493149da32f754251ae74d30cd4b50eefd6a208172ed8693b320eda714bdd152b484d9c939b4bb777dddd947843d73529f5ffe589777254cb10f733351e0739a3a61c3b8f977517ee7becda66da23a93e3be8ed63bda262951b32f72c1c48ee63be474eafaa255074efaa494b950f48b119c76c70b833e4d7443b691dc97bf78bcae908758ff1edaf2ad48dd67d0337c8ecfcd47e8ce5598c435f4645d719ae60a12c5b37ed2d45571c29ff6af1292ed2ff7fa24e2ab69f18db826044f35683810d2ee95f68f586a8922acdc225912820cdffe6ac29641f3c531a0eb1ddbf17341a05f3ee437f2a56a4a92af8ba2e413d00d05caab40963868dc00da000dfe8962927be81ca05afcc624225b2667a1208dd74e8bb6ced5e1da98f41bb3dedc31302fbf6ed40e9c526f82b53ce45e25e20ce9068bba911f0ec11403a35ff01cee623f71101155fcb646937ac714ac49741b4a1ffc6a72cba387bf41c1af2eeaa80a07631a22d366562924848da0f27c", @ANYRES32, @ANYBLOB="02000000000000006d6e742f656e637279707465645f6469722f2e2e2f66696c653000"]) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') 15:15:27 executing program 3: syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(0xffffffffffffffff, 0x4b4b, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "bb09819e2f6e8485"}) [ 610.028988] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=6184 comm=syz-executor.7 15:15:40 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x5411, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "bb09819e2f6e8485"}) 15:15:40 executing program 1: r0 = syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x40000, 0x0, 0x0, 0x40800, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f0000000180)=ANY=[@ANYBLOB="0100"/12, @ANYRES32=r0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) mkdirat(r1, &(0x7f0000000080)='./file0\x00', 0x140) mount$bind(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x11f4001, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x100, 0x0) 15:15:40 executing program 7: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x200101, 0x0) ioctl$TCSBRKP(r0, 0x5425, 0x994a) 15:15:40 executing program 6: syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(0xffffffffffffffff, 0x540a, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "bb09819e2f6e8485"}) 15:15:40 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x5414, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "bb09819e2f6e8485"}) 15:15:40 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1c08a4, 0x0) r0 = syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) open$dir(&(0x7f0000000200)='./mnt\x00', 0x40040, 0x10) faccessat2(0xffffffffffffffff, &(0x7f0000000040)='mnt/encrypted_dir/../file0\x00', 0x80, 0x3e4fcec92923ce05) r1 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x50008, 0x0, 0x10081, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r2 = openat(r0, &(0x7f0000000000)='mnt/encrypted_dir/../file0\x00', 0x40, 0x100) r3 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r3, 0x7, 0x0, 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r3, 0xc0406619, &(0x7f00000001c0)={@desc={0x1, 0x0, @desc2}}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000140)=',,\\\x00') futimesat(r2, &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0)={{0x0, 0xea60}}) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000680)=ANY=[@ANYBLOB="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", @ANYRES32, @ANYBLOB="02000000000000006d6e742f656e637279707465645f6469722f2e2e2f66696c653000"]) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') 15:15:40 executing program 3: syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(0xffffffffffffffff, 0x4b4b, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "bb09819e2f6e8485"}) 15:15:40 executing program 5: syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(0xffffffffffffffff, 0x5403, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "bb09819e2f6e8485"}) 15:15:40 executing program 5: syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(0xffffffffffffffff, 0x5403, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "bb09819e2f6e8485"}) 15:15:40 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x5411, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "bb09819e2f6e8485"}) 15:15:40 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x5415, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "bb09819e2f6e8485"}) 15:15:40 executing program 3: syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(0xffffffffffffffff, 0x4b4b, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "bb09819e2f6e8485"}) 15:15:40 executing program 7: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCSBRKP(r0, 0x5425, 0x994a) r1 = openat(0xffffffffffffff9c, 0x0, 0x214100, 0x104) r2 = dup3(r1, r1, 0x80000) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r2, 0xc018937b, &(0x7f0000000300)={{0x1, 0x1, 0x18, r0, {0xee00, 0xffffffffffffffff}}, './file0\x00'}) mount$9p_fd(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x48011, &(0x7f0000000340)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r2}, 0x2c, {[{@dfltuid}, {@privport}], [{@audit}, {@context={'context', 0x3d, 'system_u'}}]}}) fsconfig$FSCONFIG_CMD_RECONFIGURE(r1, 0x7, 0x0, 0x0, 0x0) ioctl$KDSIGACCEPT(r1, 0x4b4e, 0x17) openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x200000, 0x0) 15:15:40 executing program 1: r0 = syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, 0x0) mount$bind(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x64000, 0x0) mkdirat(r0, &(0x7f0000000080)='./file0\x00', 0x20) 15:15:55 executing program 6: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x540a, 0x0) 15:15:55 executing program 7: r0 = syz_open_dev$vcsn(&(0x7f0000000040), 0x7f, 0x1) sendmsg$AUDIT_MAKE_EQUIV(r0, &(0x7f0000000140)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x28, 0x3f7, 0x10, 0x70bd29, 0x25dfdbfc, {0x7, 0x7, './file0', './file0'}}, 0x28}, 0x1, 0x0, 0x0, 0x20000000}, 0x20000040) r1 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCSBRKP(r1, 0x5425, 0x994a) 15:15:55 executing program 1: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$cgroup(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100), 0x10000, &(0x7f0000000180)={[{@xattr}, {@name={'name', 0x3d, 'proc\x00'}}, {@xattr}, {@none}], [{@defcontext={'defcontext', 0x3d, 'user_u'}}, {@dont_appraise}, {@appraise_type}]}) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, 0x0) mount$bind(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x64000, 0x0) 15:15:55 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x5411, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "bb09819e2f6e8485"}) 15:15:55 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1c08a4, 0x0) r0 = syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) open$dir(&(0x7f0000000200)='./mnt\x00', 0x40040, 0x10) faccessat2(0xffffffffffffffff, &(0x7f0000000040)='mnt/encrypted_dir/../file0\x00', 0x80, 0x3e4fcec92923ce05) r1 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x50008, 0x0, 0x10081, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r2 = openat(r0, &(0x7f0000000000)='mnt/encrypted_dir/../file0\x00', 0x40, 0x100) r3 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r3, 0x7, 0x0, 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r3, 0xc0406619, &(0x7f00000001c0)={@desc={0x1, 0x0, @desc2}}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000140)=',,\\\x00') futimesat(r2, &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0)={{0x0, 0xea60}}) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000680)=ANY=[@ANYBLOB="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", @ANYRES32, @ANYBLOB="02000000000000006d6e742f656e637279707465645f6469722f2e2e2f66696c653000"]) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') 15:15:55 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x5416, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "bb09819e2f6e8485"}) 15:15:55 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x5403, 0x0) 15:15:55 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x4b4b, 0x0) [ 637.407393] cgroup: No subsys list or none specified [ 637.418135] cgroup: No subsys list or none specified 15:16:09 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x5403, 0x0) 15:16:09 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x5418, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "bb09819e2f6e8485"}) 15:16:09 executing program 7: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCSBRKP(r0, 0x5425, 0x9946) read(r0, &(0x7f0000000040)=""/4096, 0x1000) 15:16:09 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x4b4b, 0x0) 15:16:09 executing program 1: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000100), &(0x7f0000000180)='./file0\x00', 0x1, 0x1, &(0x7f00000002c0)=[{&(0x7f00000001c0)="da608e36b807fba28611c5c7c6776b59212d933a3744d0c53bda81a50750f5614d205cb96d2f7022072533e4c3cf84cc53c721b532cdcd8cde5b79cd6757e4dc68a7790ec0b82d597327368c43287f85c6aedb0e3f5bd05a3d139c4c752e6e63487cc0c4485a1715b2219588d26d9fc59441f073e4b5094be34b451effe1ccd17a44f8f2804fc198d1a2a428b7bd01e9f5670894ffb5e2d6d7532af4029ee025e546f6d2ccea568416308471cd7cf05127b68840b7ad4198264bc30e3973a5472837c8007c", 0xc5, 0x5}], 0x4002, &(0x7f0000000300)={[], [{@mask={'mask', 0x3d, 'MAY_APPEND'}}, {@euid_lt={'euid<', 0xffffffffffffffff}}, {@fowner_gt={'fowner>', 0xffffffffffffffff}}, {@audit}]}) setxattr$trusted_overlay_upper(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0), &(0x7f0000000500)=ANY=[@ANYBLOB="88dcd56e5ffb8f3ede164d4a3600fbef00805845f78cb5e7f05cce5df551d3c2089fdb4e62b9cacaa036b35e9b1e17c4b6073bb5874e78631601cc93bcc1c0907c8dfc3b48468f238f2552f93aa033153404071875c0cc031f82f93740666b658d59fdb98b5d07418c73733cad6d1829d2a65f983b9b0984ec9dcddd6e48dee127598908ccb298c849a04561ccb6404ebc6e08aa956e7fcfcaa7ba6694e822a69f7cd2801cf73a16e676dd36a26f7b77afe2ef87773c20427d0a19168c2432fc0df7c3dc24f60459a6560ff2051f8a42cd0f5c7f0a5d9c22a929028ebc55a0da83e2c7a0f687f86fb5ebd5dcc1d3bd700d8e54"], 0xef, 0x3) fsconfig$FSCONFIG_CMD_RECONFIGURE(0xffffffffffffffff, 0x7, 0x0, 0x0, 0x0) faccessat2(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x1, 0x1000) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, 0x0) mount(&(0x7f0000000400)=@filename='./file0\x00', &(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='f2fs\x00', 0x2066418, &(0x7f00000004c0)='\x9a\x94\x00\x00\x00') fsconfig$FSCONFIG_SET_STRING(0xffffffffffffffff, 0x1, &(0x7f0000000600)='*}\\[\x86\'F.][(*/#$\x00', &(0x7f0000000640)='\xed{{\xd0', 0x0) mount$bind(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x64000, 0x0) 15:16:09 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1c08a4, 0x0) r0 = syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) open$dir(&(0x7f0000000200)='./mnt\x00', 0x40040, 0x10) faccessat2(0xffffffffffffffff, &(0x7f0000000040)='mnt/encrypted_dir/../file0\x00', 0x80, 0x3e4fcec92923ce05) r1 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x50008, 0x0, 0x10081, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r2 = openat(r0, &(0x7f0000000000)='mnt/encrypted_dir/../file0\x00', 0x40, 0x100) r3 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r3, 0x7, 0x0, 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r3, 0xc0406619, &(0x7f00000001c0)={@desc={0x1, 0x0, @desc2}}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000140)=',,\\\x00') futimesat(r2, &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0)={{0x0, 0xea60}}) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000680)=ANY=[@ANYBLOB="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", @ANYRES32, @ANYBLOB="02000000000000006d6e742f656e637279707465645f6469722f2e2e2f66696c653000"]) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') 15:16:09 executing program 6: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x540a, 0x0) 15:16:09 executing program 2: ioctl$TCSETAW(0xffffffffffffffff, 0x5411, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "bb09819e2f6e8485"}) 15:16:09 executing program 6: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x540a, 0x0) 15:16:09 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x5403, 0x0) 15:16:09 executing program 6: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x540a, 0x0) 15:16:09 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x4b4b, 0x0) 15:16:09 executing program 2: ioctl$TCSETAW(0xffffffffffffffff, 0x5411, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "bb09819e2f6e8485"}) 15:16:09 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x5419, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "bb09819e2f6e8485"}) 15:16:09 executing program 1: r0 = syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000100)={0x0, 0x0, 0x0}, &(0x7f0000000180)=0xc) lchown(&(0x7f0000000080)='./file0\x00', 0xee01, r1) mount$bind(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x2b024b5, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) write$P9_RREADLINK(r2, &(0x7f0000000200)={0x10, 0x17, 0x1, {0x7, './file0'}}, 0x10) 15:16:09 executing program 6: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x540a, 0x0) 15:16:09 executing program 4: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1c08a4, 0x0) r1 = syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) open$dir(&(0x7f0000000200)='./mnt\x00', 0x40040, 0x10) faccessat2(r0, 0x0, 0x80, 0x3e4fcec92923ce05) r2 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x50008, 0x0, 0x10081, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r3 = openat(r1, &(0x7f0000000000)='mnt/encrypted_dir/../file0\x00', 0x40, 0x100) r4 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r4, 0x7, 0x0, 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r4, 0xc0406619, &(0x7f00000001c0)={@desc={0x1, 0x0, @desc2}}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000140)=',,\\\x00') futimesat(r3, &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0)={{0x0, 0xea60}}) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000680)=ANY=[@ANYBLOB="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", @ANYRES32, @ANYBLOB="02000000000000006d6e742f656e637279707465645f6469722f2e2e2f66696c653000"]) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') 15:16:09 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1c08a4, 0x0) r0 = syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) open$dir(&(0x7f0000000200)='./mnt\x00', 0x40040, 0x10) faccessat2(0xffffffffffffffff, &(0x7f0000000040)='mnt/encrypted_dir/../file0\x00', 0x80, 0x3e4fcec92923ce05) r1 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x50008, 0x0, 0x10081, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r2 = openat(r0, &(0x7f0000000000)='mnt/encrypted_dir/../file0\x00', 0x40, 0x100) r3 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r3, 0x7, 0x0, 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r3, 0xc0406619, &(0x7f00000001c0)={@desc={0x1, 0x0, @desc2}}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000140)=',,\\\x00') futimesat(r2, &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0)={{0x0, 0xea60}}) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000680)=ANY=[@ANYBLOB="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", @ANYRES32, @ANYBLOB="02000000000000006d6e742f656e637279707465645f6469722f2e2e2f66696c653000"]) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') 15:16:23 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x541a, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "bb09819e2f6e8485"}) 15:16:23 executing program 2: ioctl$TCSETAW(0xffffffffffffffff, 0x5411, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "bb09819e2f6e8485"}) 15:16:23 executing program 3: r0 = syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000100)={0x0, 0x0, 0x0}, &(0x7f0000000180)=0xc) lchown(&(0x7f0000000080)='./file0\x00', 0xee01, r1) mount$bind(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x2b024b5, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) write$P9_RREADLINK(r2, &(0x7f0000000200)={0x10, 0x17, 0x1, {0x7, './file0'}}, 0x10) 15:16:23 executing program 7: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCSBRKP(r0, 0x5425, 0x994a) recvmmsg$unix(0xffffffffffffffff, &(0x7f0000004280)=[{{0x0, 0x0, &(0x7f0000002180)=[{&(0x7f0000000080)=""/4096, 0x1000}, {&(0x7f0000001080)=""/4096, 0x1000}, {&(0x7f0000002080)=""/198, 0xc6}], 0x3, &(0x7f00000021c0)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000002200)=@abs, 0x6e, &(0x7f0000003280)=[{&(0x7f0000002280)=""/4096, 0x1000}], 0x1}}, {{&(0x7f00000032c0)=@abs, 0x6e, &(0x7f0000003440)=[{&(0x7f0000003340)=""/224, 0xe0}], 0x1, &(0x7f0000003480)=[@rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x28}}, {{&(0x7f00000034c0)=@abs, 0x6e, &(0x7f0000003700)=[{&(0x7f0000003540)=""/35, 0x23}, {&(0x7f0000003580)=""/125, 0x7d}, {&(0x7f0000003600)=""/236, 0xec}], 0x3, &(0x7f0000003740)=[@rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}], 0xa0}}, {{&(0x7f0000003800), 0x6e, &(0x7f00000038c0)=[{&(0x7f0000003880)}], 0x1, &(0x7f0000003900)=[@rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x80}}, {{&(0x7f0000003980), 0x6e, &(0x7f0000003e40)=[{&(0x7f0000003a00)=""/243, 0xf3}, {&(0x7f0000003b00)=""/222, 0xde}, {&(0x7f0000003c00)=""/154, 0x9a}, {&(0x7f0000003cc0)=""/134, 0x86}, {&(0x7f0000003d80)=""/111, 0x6f}, {&(0x7f0000003e00)=""/38, 0x26}], 0x6, &(0x7f0000003ec0)=[@rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x20}}, {{&(0x7f0000003f00), 0x6e, &(0x7f0000004180)=[{&(0x7f0000003f80)=""/116, 0x74}, {&(0x7f0000004000)=""/163, 0xa3}, {&(0x7f00000040c0)=""/144, 0x90}], 0x3, &(0x7f00000041c0)=[@cred={{0x1c}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x88}}], 0x7, 0x10000, &(0x7f0000004440)={0x77359400}) ioctl$TIOCSTI(r1, 0x5412, &(0x7f0000004480)=0xcb) ioctl$TIOCMBIS(r0, 0x5416, &(0x7f0000000040)=0xffff0000) 15:16:23 executing program 6: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x540a, 0x0) 15:16:23 executing program 5: setregid(0xffffffffffffffff, 0xee01) r0 = getegid() setfsgid(r0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000000c0)={0x0, 0x0}, &(0x7f0000000100)=0xc) newfstatat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x1000) mount$9p_virtio(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x2000, &(0x7f0000000440)=ANY=[@ANYBLOB='trans=virtio,version=9p2000.u,privport,version=9p2000.L,dfltgid=', @ANYRESHEX, @ANYBLOB="b11de123c41645dd150c6d1725c42df0ea407de497045cc0bd0ea81a92cce76a5ec3e00660dfc18846bccb8ff2da8ec48826e3baba24413d110c822b351ae641433986dd684aae318f3e68160ff426718ef06dde3106e56b46aa23f69a57870aadacd9952b8f2e00000000", @ANYRESDEC=r1, @ANYBLOB=',smackfshat=+*)-(:,uid>', @ANYRESDEC=r2, @ANYBLOB=',defcontext=us\x00\x00_u,\x00']) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0}, &(0x7f00000002c0)=0xc) setxattr$security_capability(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240), &(0x7f0000000300)=@v3={0x3000000, [{0x7, 0x3}, {0x7, 0x9}], r3}, 0x18, 0x2) r4 = fork() kcmp(r4, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 15:16:23 executing program 4: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1c08a4, 0x0) r1 = syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) open$dir(&(0x7f0000000200)='./mnt\x00', 0x40040, 0x10) faccessat2(r0, 0x0, 0x80, 0x3e4fcec92923ce05) r2 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x50008, 0x0, 0x10081, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r3 = openat(r1, &(0x7f0000000000)='mnt/encrypted_dir/../file0\x00', 0x40, 0x100) r4 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r4, 0x7, 0x0, 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r4, 0xc0406619, &(0x7f00000001c0)={@desc={0x1, 0x0, @desc2}}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000140)=',,\\\x00') futimesat(r3, &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0)={{0x0, 0xea60}}) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000680)=ANY=[@ANYBLOB="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", @ANYRES32, @ANYBLOB="02000000000000006d6e742f656e637279707465645f6469722f2e2e2f66696c653000"]) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') 15:16:23 executing program 1: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x180000, 0x0) mount$bind(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x64000, 0x0) 15:16:23 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x5411, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "bb09819e2f6e8485"}) 15:16:23 executing program 6: ioctl$TCSETAW(0xffffffffffffffff, 0x540a, 0x0) 15:16:24 executing program 1: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, 0x0) mount$bind(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x64000, 0x0) pivot_root(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='./file0\x00') 15:16:24 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x541b, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "bb09819e2f6e8485"}) 15:16:24 executing program 3: r0 = syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000100)={0x0, 0x0, 0x0}, &(0x7f0000000180)=0xc) lchown(&(0x7f0000000080)='./file0\x00', 0xee01, r1) mount$bind(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x2b024b5, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) write$P9_RREADLINK(r2, &(0x7f0000000200)={0x10, 0x17, 0x1, {0x7, './file0'}}, 0x10) 15:16:24 executing program 5: setregid(0xffffffffffffffff, 0xee01) r0 = getegid() setfsgid(r0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000000c0)={0x0, 0x0}, &(0x7f0000000100)=0xc) newfstatat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x1000) mount$9p_virtio(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x2000, &(0x7f0000000440)=ANY=[@ANYBLOB='trans=virtio,version=9p2000.u,privport,version=9p2000.L,dfltgid=', @ANYRESHEX, @ANYBLOB="b11de123c41645dd150c6d1725c42df0ea407de497045cc0bd0ea81a92cce76a5ec3e00660dfc18846bccb8ff2da8ec48826e3baba24413d110c822b351ae641433986dd684aae318f3e68160ff426718ef06dde3106e56b46aa23f69a57870aadacd9952b8f2e00000000", @ANYRESDEC=r1, @ANYBLOB=',smackfshat=+*)-(:,uid>', @ANYRESDEC=r2, @ANYBLOB=',defcontext=us\x00\x00_u,\x00']) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0}, &(0x7f00000002c0)=0xc) setxattr$security_capability(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240), &(0x7f0000000300)=@v3={0x3000000, [{0x7, 0x3}, {0x7, 0x9}], r3}, 0x18, 0x2) r4 = fork() kcmp(r4, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 15:16:24 executing program 4: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1c08a4, 0x0) r1 = syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) open$dir(&(0x7f0000000200)='./mnt\x00', 0x40040, 0x10) faccessat2(r0, 0x0, 0x80, 0x3e4fcec92923ce05) r2 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x50008, 0x0, 0x10081, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r3 = openat(r1, &(0x7f0000000000)='mnt/encrypted_dir/../file0\x00', 0x40, 0x100) r4 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r4, 0x7, 0x0, 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r4, 0xc0406619, &(0x7f00000001c0)={@desc={0x1, 0x0, @desc2}}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000140)=',,\\\x00') futimesat(r3, &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0)={{0x0, 0xea60}}) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000680)=ANY=[@ANYBLOB="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", @ANYRES32, @ANYBLOB="02000000000000006d6e742f656e637279707465645f6469722f2e2e2f66696c653000"]) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') 15:16:24 executing program 2: syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(0xffffffffffffffff, 0x5411, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "bb09819e2f6e8485"}) 15:16:24 executing program 6: ioctl$TCSETAW(0xffffffffffffffff, 0x540a, 0x0) 15:16:38 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x541c, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "bb09819e2f6e8485"}) 15:16:38 executing program 5: setregid(0xffffffffffffffff, 0xee01) r0 = getegid() setfsgid(r0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000000c0)={0x0, 0x0}, &(0x7f0000000100)=0xc) newfstatat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x1000) mount$9p_virtio(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x2000, &(0x7f0000000440)=ANY=[@ANYBLOB='trans=virtio,version=9p2000.u,privport,version=9p2000.L,dfltgid=', @ANYRESHEX, @ANYBLOB="b11de123c41645dd150c6d1725c42df0ea407de497045cc0bd0ea81a92cce76a5ec3e00660dfc18846bccb8ff2da8ec48826e3baba24413d110c822b351ae641433986dd684aae318f3e68160ff426718ef06dde3106e56b46aa23f69a57870aadacd9952b8f2e00000000", @ANYRESDEC=r1, @ANYBLOB=',smackfshat=+*)-(:,uid>', @ANYRESDEC=r2, @ANYBLOB=',defcontext=us\x00\x00_u,\x00']) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0}, &(0x7f00000002c0)=0xc) setxattr$security_capability(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240), &(0x7f0000000300)=@v3={0x3000000, [{0x7, 0x3}, {0x7, 0x9}], r3}, 0x18, 0x2) r4 = fork() kcmp(r4, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 15:16:38 executing program 4: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1c08a4, 0x0) r1 = syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) open$dir(&(0x7f0000000200)='./mnt\x00', 0x40040, 0x10) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir/../file0\x00', 0x0, 0x3e4fcec92923ce05) r2 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x50008, 0x0, 0x10081, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r3 = openat(r1, &(0x7f0000000000)='mnt/encrypted_dir/../file0\x00', 0x40, 0x100) r4 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r4, 0x7, 0x0, 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r4, 0xc0406619, &(0x7f00000001c0)={@desc={0x1, 0x0, @desc2}}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000140)=',,\\\x00') futimesat(r3, &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0)={{0x0, 0xea60}}) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000680)=ANY=[@ANYBLOB="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", @ANYRES32, @ANYBLOB="02000000000000006d6e742f656e637279707465645f6469722f2e2e2f66696c653000"]) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') 15:16:38 executing program 6: ioctl$TCSETAW(0xffffffffffffffff, 0x540a, 0x0) 15:16:38 executing program 2: syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(0xffffffffffffffff, 0x5411, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "bb09819e2f6e8485"}) 15:16:38 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x5, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, 0x0) mount$bind(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x64000, 0x0) 15:16:38 executing program 3: r0 = syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000100)={0x0, 0x0, 0x0}, &(0x7f0000000180)=0xc) lchown(&(0x7f0000000080)='./file0\x00', 0xee01, r1) mount$bind(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x2b024b5, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) write$P9_RREADLINK(r2, &(0x7f0000000200)={0x10, 0x17, 0x1, {0x7, './file0'}}, 0x10) 15:16:38 executing program 7: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCSBRKP(r0, 0x5425, 0x4000009949) 15:16:38 executing program 2: syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(0xffffffffffffffff, 0x5411, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "bb09819e2f6e8485"}) 15:16:38 executing program 3: r0 = syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000100)={0x0, 0x0, 0x0}, &(0x7f0000000180)=0xc) lchown(&(0x7f0000000080)='./file0\x00', 0xee01, r1) mount$bind(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x2b024b5, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) 15:16:38 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x541d, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "bb09819e2f6e8485"}) 15:16:38 executing program 1: r0 = syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2010010, 0x0) mkdirat(r0, &(0x7f0000000080)='./file0\x00', 0x40) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, 0x0) mount$bind(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x64000, 0x0) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r1, 0x7, 0x0, 0x0, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_KEY_STATUS(r1, 0xc080661a, &(0x7f0000000180)={@id={0x2, 0x0, @c}}) 15:16:38 executing program 6: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x540a, 0x0) 15:16:38 executing program 4: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1c08a4, 0x0) r1 = syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) open$dir(&(0x7f0000000200)='./mnt\x00', 0x40040, 0x10) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir/../file0\x00', 0x0, 0x3e4fcec92923ce05) r2 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x50008, 0x0, 0x10081, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r3 = openat(r1, &(0x7f0000000000)='mnt/encrypted_dir/../file0\x00', 0x40, 0x100) r4 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r4, 0x7, 0x0, 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r4, 0xc0406619, &(0x7f00000001c0)={@desc={0x1, 0x0, @desc2}}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000140)=',,\\\x00') futimesat(r3, &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0)={{0x0, 0xea60}}) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000680)=ANY=[@ANYBLOB="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", @ANYRES32, @ANYBLOB="02000000000000006d6e742f656e637279707465645f6469722f2e2e2f66696c653000"]) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') 15:16:38 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x5411, 0x0) 15:16:53 executing program 7: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCSBRKP(r0, 0x5425, 0x994a) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r1, 0x7, 0x0, 0x0, 0x0) ioctl$TIOCSTI(r1, 0x5412, &(0x7f0000000040)=0x47) 15:16:53 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x541e, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "bb09819e2f6e8485"}) 15:16:53 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x5411, 0x0) 15:16:53 executing program 1: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, 0x0) mount$bind(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x64000, 0x0) stat(&(0x7f0000000000)='.\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r0, 0x0) mount$9p_unix(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000180), 0x48, &(0x7f00000001c0)={'trans=unix,', {[{@dfltuid={'dfltuid', 0x3d, 0xffffffffffffffff}}], [{@smackfstransmute}, {@measure}, {@defcontext={'defcontext', 0x3d, 'user_u'}}, {@measure}, {@measure}, {@hash}, {@euid_eq={'euid', 0x3d, r0}}, {@dont_hash}, {@smackfshat}]}}) 15:16:53 executing program 5: setregid(0xffffffffffffffff, 0xee01) r0 = getegid() setfsgid(r0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000000c0)={0x0, 0x0}, &(0x7f0000000100)=0xc) newfstatat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x1000) mount$9p_virtio(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x2000, &(0x7f0000000440)=ANY=[@ANYBLOB='trans=virtio,version=9p2000.u,privport,version=9p2000.L,dfltgid=', @ANYRESHEX, @ANYBLOB="b11de123c41645dd150c6d1725c42df0ea407de497045cc0bd0ea81a92cce76a5ec3e00660dfc18846bccb8ff2da8ec48826e3baba24413d110c822b351ae641433986dd684aae318f3e68160ff426718ef06dde3106e56b46aa23f69a57870aadacd9952b8f2e00000000", @ANYRESDEC=r1, @ANYBLOB=',smackfshat=+*)-(:,uid>', @ANYRESDEC=r2, @ANYBLOB=',defcontext=us\x00\x00_u,\x00']) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0}, &(0x7f00000002c0)=0xc) setxattr$security_capability(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240), &(0x7f0000000300)=@v3={0x3000000, [{0x7, 0x3}, {0x7, 0x9}], r3}, 0x18, 0x2) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 15:16:53 executing program 3: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000100)={0x0, 0x0, 0x0}, &(0x7f0000000180)=0xc) lchown(&(0x7f0000000080)='./file0\x00', 0xee01, r0) mount$bind(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x2b024b5, 0x0) 15:16:53 executing program 4: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1c08a4, 0x0) r1 = syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) open$dir(&(0x7f0000000200)='./mnt\x00', 0x40040, 0x10) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir/../file0\x00', 0x0, 0x3e4fcec92923ce05) r2 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x50008, 0x0, 0x10081, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r3 = openat(r1, &(0x7f0000000000)='mnt/encrypted_dir/../file0\x00', 0x40, 0x100) r4 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r4, 0x7, 0x0, 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r4, 0xc0406619, &(0x7f00000001c0)={@desc={0x1, 0x0, @desc2}}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000140)=',,\\\x00') futimesat(r3, &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0)={{0x0, 0xea60}}) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000680)=ANY=[@ANYBLOB="b00900000000000018000000468a29458f2709d329f6d3f3917408961482081d984538af2f9bcf61c448afbaa0be3f00000000000000ca4aa56fc413a417324e8530165c3515981e2d28f7fce9ae3c6bb8fa04ff6411132c9ced479abaeea325c2205ea95984d3d7f98eea1cca02dfeb0b2471b497fbb71b60180d35e2a3394ba6d965f41c7b7bc29d4e3ca95bd7ad074a4242ec98a69ad9d1546ce18cbbd98d2e50688e958a0fcd16876ab83cdb94eeb03e42203f267a1bf6ccb1c07ad92e6e493149da32f754251ae74d30cd4b50eefd6a208172ed8693b320eda714bdd152b484d9c939b4bb777dddd947843d73529f5ffe589777254cb10f733351e0739a3a61c3b8f977517ee7becda66da23a93e3be8ed63bda262951b32f72c1c48ee63be474eafaa255074efaa494b950f48b119c76c70b833e4d7443b691dc97bf78bcae908758ff1edaf2ad48dd67d0337c8ecfcd47e8ce5598c435f4645d719ae60a12c5b37ed2d45571c29ff6af1292ed2ff7fa24e2ab69f18db826044f35683810d2ee95f68f586a8922acdc225912820cdffe6ac29641f3c531a0eb1ddbf17341a05f3ee437f2a56a4a92af8ba2e413d00d05caab40963868dc00da000dfe8962927be81ca05afcc624225b2667a1208dd74e8bb6ced5e1da98f41bb3dedc31302fbf6ed40e9c526f82b53ce45e25e20ce9068bba911f0ec11403a35ff01cee623f71101155fcb646937ac714ac49741b4a1ffc6a72cba387bf41c1af2eeaa80a07631a22d366562924848da0f27c", @ANYRES32, @ANYBLOB="02000000000000006d6e742f656e637279707465645f6469722f2e2e2f66696c653000"]) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') 15:16:53 executing program 6: syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(0xffffffffffffffff, 0x540a, 0x0) 15:16:53 executing program 5: setregid(0xffffffffffffffff, 0xee01) r0 = getegid() setfsgid(r0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000000c0)={0x0, 0x0}, &(0x7f0000000100)=0xc) newfstatat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x1000) mount$9p_virtio(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x2000, &(0x7f0000000440)=ANY=[@ANYBLOB='trans=virtio,version=9p2000.u,privport,version=9p2000.L,dfltgid=', @ANYRESHEX, @ANYBLOB="b11de123c41645dd150c6d1725c42df0ea407de497045cc0bd0ea81a92cce76a5ec3e00660dfc18846bccb8ff2da8ec48826e3baba24413d110c822b351ae641433986dd684aae318f3e68160ff426718ef06dde3106e56b46aa23f69a57870aadacd9952b8f2e00000000", @ANYRESDEC=r1, @ANYBLOB=',smackfshat=+*)-(:,uid>', @ANYRESDEC=r2, @ANYBLOB=',defcontext=us\x00\x00_u,\x00']) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0}, &(0x7f00000002c0)=0xc) setxattr$security_capability(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240), &(0x7f0000000300)=@v3={0x3000000, [{0x7, 0x3}, {0x7, 0x9}], r3}, 0x18, 0x2) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 15:16:53 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x541e, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "bb09819e2f6e8485"}) 15:16:53 executing program 6: syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(0xffffffffffffffff, 0x540a, 0x0) 15:16:53 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x5411, 0x0) 15:16:53 executing program 3: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000100), &(0x7f0000000180)=0xc) mount$bind(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x2b024b5, 0x0) 15:16:53 executing program 4: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1c08a4, 0x0) r1 = syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) open$dir(&(0x7f0000000200)='./mnt\x00', 0x40040, 0x10) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir/../file0\x00', 0x80, 0x0) r2 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x50008, 0x0, 0x10081, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r3 = openat(r1, &(0x7f0000000000)='mnt/encrypted_dir/../file0\x00', 0x40, 0x100) r4 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r4, 0x7, 0x0, 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r4, 0xc0406619, &(0x7f00000001c0)={@desc={0x1, 0x0, @desc2}}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000140)=',,\\\x00') futimesat(r3, &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0)={{0x0, 0xea60}}) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000680)=ANY=[@ANYBLOB="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", @ANYRES32, @ANYBLOB="02000000000000006d6e742f656e637279707465645f6469722f2e2e2f66696c653000"]) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') 15:17:05 executing program 6: syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(0xffffffffffffffff, 0x540a, 0x0) 15:17:05 executing program 7: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x109180, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r1, 0x7, 0x0, 0x0, 0x0) ioctl$TIOCL_GETSHIFTSTATE(r1, 0x541c, &(0x7f0000000040)={0x6, 0x7}) ioctl$TCSBRKP(r0, 0x5425, 0x994a) ioctl$TIOCL_SCROLLCONSOLE(r0, 0x541c, &(0x7f0000000080)={0xd, 0x200}) r2 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r2, 0x7, 0x0, 0x0, 0x0) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000100)={0x3, &(0x7f00000000c0)=[{}, {}, {}]}) 15:17:05 executing program 4: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1c08a4, 0x0) r1 = syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) open$dir(&(0x7f0000000200)='./mnt\x00', 0x40040, 0x10) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir/../file0\x00', 0x80, 0x0) r2 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x50008, 0x0, 0x10081, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r3 = openat(r1, &(0x7f0000000000)='mnt/encrypted_dir/../file0\x00', 0x40, 0x100) r4 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r4, 0x7, 0x0, 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r4, 0xc0406619, &(0x7f00000001c0)={@desc={0x1, 0x0, @desc2}}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000140)=',,\\\x00') futimesat(r3, &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0)={{0x0, 0xea60}}) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000680)=ANY=[@ANYBLOB="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", @ANYRES32, @ANYBLOB="02000000000000006d6e742f656e637279707465645f6469722f2e2e2f66696c653000"]) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') 15:17:05 executing program 5: setregid(0xffffffffffffffff, 0xee01) r0 = getegid() setfsgid(r0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000000c0)={0x0, 0x0}, &(0x7f0000000100)=0xc) newfstatat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x1000) mount$9p_virtio(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x2000, &(0x7f0000000440)=ANY=[@ANYBLOB='trans=virtio,version=9p2000.u,privport,version=9p2000.L,dfltgid=', @ANYRESHEX, @ANYBLOB="b11de123c41645dd150c6d1725c42df0ea407de497045cc0bd0ea81a92cce76a5ec3e00660dfc18846bccb8ff2da8ec48826e3baba24413d110c822b351ae641433986dd684aae318f3e68160ff426718ef06dde3106e56b46aa23f69a57870aadacd9952b8f2e00000000", @ANYRESDEC=r1, @ANYBLOB=',smackfshat=+*)-(:,uid>', @ANYRESDEC=r2, @ANYBLOB=',defcontext=us\x00\x00_u,\x00']) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0}, &(0x7f00000002c0)=0xc) setxattr$security_capability(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240), &(0x7f0000000300)=@v3={0x3000000, [{0x7, 0x3}, {0x7, 0x9}], r3}, 0x18, 0x2) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 15:17:05 executing program 1: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) sched_rr_get_interval(0x0, 0x0) tkill(0x0, 0x0) sched_setparam(0x0, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) getrusage(0xffffffffffffffff, &(0x7f0000000200)) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fork() timer_create(0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, 0x0) mount$bind(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x64000, 0x0) r0 = getegid() setgid(r0) chown(&(0x7f0000000080)='./file0/../file0\x00', 0xee01, r0) 15:17:05 executing program 3: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, 0x0) mount$bind(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x2b024b5, 0x0) 15:17:05 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x5421, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "bb09819e2f6e8485"}) 15:17:05 executing program 5: setregid(0xffffffffffffffff, 0xee01) r0 = getegid() setfsgid(r0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000000c0)={0x0, 0x0}, &(0x7f0000000100)=0xc) newfstatat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x1000) mount$9p_virtio(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x2000, &(0x7f0000000440)=ANY=[@ANYBLOB='trans=virtio,version=9p2000.u,privport,version=9p2000.L,dfltgid=', @ANYRESHEX, @ANYBLOB="b11de123c41645dd150c6d1725c42df0ea407de497045cc0bd0ea81a92cce76a5ec3e00660dfc18846bccb8ff2da8ec48826e3baba24413d110c822b351ae641433986dd684aae318f3e68160ff426718ef06dde3106e56b46aa23f69a57870aadacd9952b8f2e00000000", @ANYRESDEC=r1, @ANYBLOB=',smackfshat=+*)-(:,uid>', @ANYRESDEC=r2, @ANYBLOB=',defcontext=us\x00\x00_u,\x00']) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280), &(0x7f00000002c0)=0xc) r3 = fork() kcmp(r3, r3, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 15:17:05 executing program 2: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1c08a4, 0x0) r1 = syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) open$dir(&(0x7f0000000200)='./mnt\x00', 0x40040, 0x10) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir/../file0\x00', 0x80, 0x0) r2 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x50008, 0x0, 0x10081, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r3 = openat(r1, &(0x7f0000000000)='mnt/encrypted_dir/../file0\x00', 0x40, 0x100) r4 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r4, 0x7, 0x0, 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r4, 0xc0406619, &(0x7f00000001c0)={@desc={0x1, 0x0, @desc2}}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000140)=',,\\\x00') futimesat(r3, &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0)={{0x0, 0xea60}}) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000680)=ANY=[@ANYBLOB="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", @ANYRES32, @ANYBLOB="02000000000000006d6e742f656e637279707465645f6469722f2e2e2f66696c653000"]) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') 15:17:05 executing program 6: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1c08a4, 0x0) r1 = syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) open$dir(&(0x7f0000000200)='./mnt\x00', 0x40040, 0x10) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir/../file0\x00', 0x0, 0x3e4fcec92923ce05) r2 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x50008, 0x0, 0x10081, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r3 = openat(r1, &(0x7f0000000000)='mnt/encrypted_dir/../file0\x00', 0x40, 0x100) r4 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r4, 0x7, 0x0, 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r4, 0xc0406619, &(0x7f00000001c0)={@desc={0x1, 0x0, @desc2}}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000140)=',,\\\x00') futimesat(r3, &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0)={{0x0, 0xea60}}) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000680)=ANY=[@ANYBLOB="b00900000000000018000000468a29458f2709d329f6d3f3917408961482081d984538af2f9bcf61c448afbaa0be3f00000000000000ca4aa56fc413a417324e8530165c3515981e2d28f7fce9ae3c6bb8fa04ff6411132c9ced479abaeea325c2205ea95984d3d7f98eea1cca02dfeb0b2471b497fbb71b60180d35e2a3394ba6d965f41c7b7bc29d4e3ca95bd7ad074a4242ec98a69ad9d1546ce18cbbd98d2e50688e958a0fcd16876ab83cdb94eeb03e42203f267a1bf6ccb1c07ad92e6e493149da32f754251ae74d30cd4b50eefd6a208172ed8693b320eda714bdd152b484d9c939b4bb777dddd947843d73529f5ffe589777254cb10f733351e0739a3a61c3b8f977517ee7becda66da23a93e3be8ed63bda262951b32f72c1c48ee63be474eafaa255074efaa494b950f48b119c76c70b833e4d7443b691dc97bf78bcae908758ff1edaf2ad48dd67d0337c8ecfcd47e8ce5598c435f4645d719ae60a12c5b37ed2d45571c29ff6af1292ed2ff7fa24e2ab69f18db826044f35683810d2ee95f68f586a8922acdc225912820cdffe6ac29641f3c531a0eb1ddbf17341a05f3ee437f2a56a4a92af8ba2e413d00d05caab40963868dc00da000dfe8962927be81ca05afcc624225b2667a1208dd74e8bb6ced5e1da98f41bb3dedc31302fbf6ed40e9c526f82b53ce45e25e20ce9068bba911f0ec11403a35ff01cee623f71101155fcb646937ac714ac49741b4a1ffc6a72cba387bf41c1af2eeaa80a07631a22d366562924848da0f27c", @ANYRES32, @ANYBLOB="02000000000000006d6e742f656e637279707465645f6469722f2e2e2f66696c653000"]) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') 15:17:05 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x5422, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "bb09819e2f6e8485"}) 15:17:05 executing program 3: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$bind(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x2b024b5, 0x0) 15:17:05 executing program 4: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1c08a4, 0x0) r1 = syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) open$dir(&(0x7f0000000200)='./mnt\x00', 0x40040, 0x10) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir/../file0\x00', 0x80, 0x0) r2 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x50008, 0x0, 0x10081, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r3 = openat(r1, &(0x7f0000000000)='mnt/encrypted_dir/../file0\x00', 0x40, 0x100) r4 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r4, 0x7, 0x0, 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r4, 0xc0406619, &(0x7f00000001c0)={@desc={0x1, 0x0, @desc2}}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000140)=',,\\\x00') futimesat(r3, &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0)={{0x0, 0xea60}}) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000680)=ANY=[@ANYBLOB="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", @ANYRES32, @ANYBLOB="02000000000000006d6e742f656e637279707465645f6469722f2e2e2f66696c653000"]) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') 15:17:05 executing program 2: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1c08a4, 0x0) r1 = syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) open$dir(&(0x7f0000000200)='./mnt\x00', 0x40040, 0x10) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir/../file0\x00', 0x0, 0x3e4fcec92923ce05) r2 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x50008, 0x0, 0x10081, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r3 = openat(r1, &(0x7f0000000000)='mnt/encrypted_dir/../file0\x00', 0x40, 0x100) r4 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r4, 0x7, 0x0, 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r4, 0xc0406619, &(0x7f00000001c0)={@desc={0x1, 0x0, @desc2}}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000140)=',,\\\x00') futimesat(r3, &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0)={{0x0, 0xea60}}) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000680)=ANY=[@ANYBLOB="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", @ANYRES32, @ANYBLOB="02000000000000006d6e742f656e637279707465645f6469722f2e2e2f66696c653000"]) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') 15:17:05 executing program 1: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0xa000, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, 0x0) mount$bind(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x64000, 0x0) 15:17:05 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x5423, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "bb09819e2f6e8485"}) 15:17:05 executing program 5: setregid(0xffffffffffffffff, 0xee01) r0 = getegid() setfsgid(r0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000000c0)={0x0, 0x0}, &(0x7f0000000100)=0xc) newfstatat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x1000) mount$9p_virtio(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x2000, &(0x7f0000000440)=ANY=[@ANYBLOB='trans=virtio,version=9p2000.u,privport,version=9p2000.L,dfltgid=', @ANYRESHEX, @ANYBLOB="b11de123c41645dd150c6d1725c42df0ea407de497045cc0bd0ea81a92cce76a5ec3e00660dfc18846bccb8ff2da8ec48826e3baba24413d110c822b351ae641433986dd684aae318f3e68160ff426718ef06dde3106e56b46aa23f69a57870aadacd9952b8f2e00000000", @ANYRESDEC=r1, @ANYBLOB=',smackfshat=+*)-(:,uid>', @ANYRESDEC=r2, @ANYBLOB=',defcontext=us\x00\x00_u,\x00']) r3 = fork() kcmp(r3, r3, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 15:17:21 executing program 5: setregid(0xffffffffffffffff, 0xee01) r0 = getegid() setfsgid(r0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000000c0), &(0x7f0000000100)=0xc) newfstatat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180), 0x1000) r1 = fork() kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 15:17:21 executing program 2: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1c08a4, 0x0) r1 = syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) open$dir(&(0x7f0000000200)='./mnt\x00', 0x40040, 0x10) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir/../file0\x00', 0x80, 0x0) r2 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x50008, 0x0, 0x10081, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r3 = openat(r1, &(0x7f0000000000)='mnt/encrypted_dir/../file0\x00', 0x40, 0x100) r4 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r4, 0x7, 0x0, 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r4, 0xc0406619, &(0x7f00000001c0)={@desc={0x1, 0x0, @desc2}}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000140)=',,\\\x00') futimesat(r3, &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0)={{0x0, 0xea60}}) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000680)=ANY=[@ANYBLOB="b00900000000000018000000468a29458f2709d329f6d3f3917408961482081d984538af2f9bcf61c448afbaa0be3f00000000000000ca4aa56fc413a417324e8530165c3515981e2d28f7fce9ae3c6bb8fa04ff6411132c9ced479abaeea325c2205ea95984d3d7f98eea1cca02dfeb0b2471b497fbb71b60180d35e2a3394ba6d965f41c7b7bc29d4e3ca95bd7ad074a4242ec98a69ad9d1546ce18cbbd98d2e50688e958a0fcd16876ab83cdb94eeb03e42203f267a1bf6ccb1c07ad92e6e493149da32f754251ae74d30cd4b50eefd6a208172ed8693b320eda714bdd152b484d9c939b4bb777dddd947843d73529f5ffe589777254cb10f733351e0739a3a61c3b8f977517ee7becda66da23a93e3be8ed63bda262951b32f72c1c48ee63be474eafaa255074efaa494b950f48b119c76c70b833e4d7443b691dc97bf78bcae908758ff1edaf2ad48dd67d0337c8ecfcd47e8ce5598c435f4645d719ae60a12c5b37ed2d45571c29ff6af1292ed2ff7fa24e2ab69f18db826044f35683810d2ee95f68f586a8922acdc225912820cdffe6ac29641f3c531a0eb1ddbf17341a05f3ee437f2a56a4a92af8ba2e413d00d05caab40963868dc00da000dfe8962927be81ca05afcc624225b2667a1208dd74e8bb6ced5e1da98f41bb3dedc31302fbf6ed40e9c526f82b53ce45e25e20ce9068bba911f0ec11403a35ff01cee623f71101155fcb646937ac714ac49741b4a1ffc6a72cba387bf41c1af2eeaa80a07631a22d366562924848da0f27c", @ANYRES32, @ANYBLOB="02000000000000006d6e742f656e637279707465645f6469722f2e2e2f66696c653000"]) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') 15:17:21 executing program 7: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x45a6c1, 0x0) ioctl$TCSBRKP(r0, 0x5425, 0x994a) 15:17:21 executing program 3: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$bind(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x2b024b5, 0x0) 15:17:21 executing program 6: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1c08a4, 0x0) r1 = syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) open$dir(&(0x7f0000000200)='./mnt\x00', 0x40040, 0x10) faccessat2(r0, 0x0, 0x80, 0x3e4fcec92923ce05) r2 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x50008, 0x0, 0x10081, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r3 = openat(r1, &(0x7f0000000000)='mnt/encrypted_dir/../file0\x00', 0x40, 0x100) r4 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r4, 0x7, 0x0, 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r4, 0xc0406619, &(0x7f00000001c0)={@desc={0x1, 0x0, @desc2}}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000140)=',,\\\x00') futimesat(r3, &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0)={{0x0, 0xea60}}) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000680)=ANY=[@ANYBLOB="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", @ANYRES32, @ANYBLOB="02000000000000006d6e742f656e637279707465645f6469722f2e2e2f66696c653000"]) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') 15:17:21 executing program 4: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1c08a4, 0x0) r1 = syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) open$dir(&(0x7f0000000200)='./mnt\x00', 0x40040, 0x10) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir/../file0\x00', 0x80, 0x0) r2 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r3 = openat(r1, &(0x7f0000000000)='mnt/encrypted_dir/../file0\x00', 0x40, 0x100) r4 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r4, 0x7, 0x0, 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r4, 0xc0406619, &(0x7f00000001c0)={@desc={0x1, 0x0, @desc2}}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000140)=',,\\\x00') futimesat(r3, &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0)={{0x0, 0xea60}}) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000680)=ANY=[@ANYBLOB="b00900000000000018000000468a29458f2709d329f6d3f3917408961482081d984538af2f9bcf61c448afbaa0be3f00000000000000ca4aa56fc413a417324e8530165c3515981e2d28f7fce9ae3c6bb8fa04ff6411132c9ced479abaeea325c2205ea95984d3d7f98eea1cca02dfeb0b2471b497fbb71b60180d35e2a3394ba6d965f41c7b7bc29d4e3ca95bd7ad074a4242ec98a69ad9d1546ce18cbbd98d2e50688e958a0fcd16876ab83cdb94eeb03e42203f267a1bf6ccb1c07ad92e6e493149da32f754251ae74d30cd4b50eefd6a208172ed8693b320eda714bdd152b484d9c939b4bb777dddd947843d73529f5ffe589777254cb10f733351e0739a3a61c3b8f977517ee7becda66da23a93e3be8ed63bda262951b32f72c1c48ee63be474eafaa255074efaa494b950f48b119c76c70b833e4d7443b691dc97bf78bcae908758ff1edaf2ad48dd67d0337c8ecfcd47e8ce5598c435f4645d719ae60a12c5b37ed2d45571c29ff6af1292ed2ff7fa24e2ab69f18db826044f35683810d2ee95f68f586a8922acdc225912820cdffe6ac29641f3c531a0eb1ddbf17341a05f3ee437f2a56a4a92af8ba2e413d00d05caab40963868dc00da000dfe8962927be81ca05afcc624225b2667a1208dd74e8bb6ced5e1da98f41bb3dedc31302fbf6ed40e9c526f82b53ce45e25e20ce9068bba911f0ec11403a35ff01cee623f71101155fcb646937ac714ac49741b4a1ffc6a72cba387bf41c1af2eeaa80a07631a22d366562924848da0f27c", @ANYRES32, @ANYBLOB="02000000000000006d6e742f656e637279707465645f6469722f2e2e2f66696c653000"]) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') 15:17:21 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x5424, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "bb09819e2f6e8485"}) 15:17:21 executing program 1: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_redirect(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100), &(0x7f0000000180)='./file0\x00', 0x8, 0x2) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, 0x0) mount$bind(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x64000, 0x0) 15:17:21 executing program 7: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCSBRKP(r0, 0x5425, 0x994a) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$TIOCGLCKTRMIOS(r1, 0x5456, &(0x7f0000000040)={0x7, 0x8000, 0x400, 0x8, 0x5, "b8cd9d495235d98e9a02f5ca78d4a005b2bb12"}) 15:17:21 executing program 3: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$bind(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x2b024b5, 0x0) 15:17:21 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x5425, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "bb09819e2f6e8485"}) 15:17:21 executing program 6: setregid(0xffffffffffffffff, 0xee01) r0 = getegid() setfsgid(r0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000000c0)={0x0, 0x0}, &(0x7f0000000100)=0xc) newfstatat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x1000) mount$9p_virtio(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x2000, &(0x7f0000000440)=ANY=[@ANYBLOB='trans=virtio,version=9p2000.u,privport,version=9p2000.L,dfltgid=', @ANYRESHEX, @ANYBLOB="b11de123c41645dd150c6d1725c42df0ea407de497045cc0bd0ea81a92cce76a5ec3e00660dfc18846bccb8ff2da8ec48826e3baba24413d110c822b351ae641433986dd684aae318f3e68160ff426718ef06dde3106e56b46aa23f69a57870aadacd9952b8f2e00000000", @ANYRESDEC=r1, @ANYBLOB=',smackfshat=+*)-(:,uid>', @ANYRESDEC=r2, @ANYBLOB=',defcontext=us\x00\x00_u,\x00']) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280), &(0x7f00000002c0)=0xc) r3 = fork() kcmp(r3, r3, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 15:17:21 executing program 3: mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, 0x0) mount$bind(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x2b024b5, 0x0) 15:17:21 executing program 4: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1c08a4, 0x0) r1 = syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) open$dir(&(0x7f0000000200)='./mnt\x00', 0x40040, 0x10) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir/../file0\x00', 0x80, 0x0) r2 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r3 = openat(r1, &(0x7f0000000000)='mnt/encrypted_dir/../file0\x00', 0x40, 0x100) r4 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r4, 0x7, 0x0, 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r4, 0xc0406619, &(0x7f00000001c0)={@desc={0x1, 0x0, @desc2}}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000140)=',,\\\x00') futimesat(r3, &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0)={{0x0, 0xea60}}) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000680)=ANY=[@ANYBLOB="b00900000000000018000000468a29458f2709d329f6d3f3917408961482081d984538af2f9bcf61c448afbaa0be3f00000000000000ca4aa56fc413a417324e8530165c3515981e2d28f7fce9ae3c6bb8fa04ff6411132c9ced479abaeea325c2205ea95984d3d7f98eea1cca02dfeb0b2471b497fbb71b60180d35e2a3394ba6d965f41c7b7bc29d4e3ca95bd7ad074a4242ec98a69ad9d1546ce18cbbd98d2e50688e958a0fcd16876ab83cdb94eeb03e42203f267a1bf6ccb1c07ad92e6e493149da32f754251ae74d30cd4b50eefd6a208172ed8693b320eda714bdd152b484d9c939b4bb777dddd947843d73529f5ffe589777254cb10f733351e0739a3a61c3b8f977517ee7becda66da23a93e3be8ed63bda262951b32f72c1c48ee63be474eafaa255074efaa494b950f48b119c76c70b833e4d7443b691dc97bf78bcae908758ff1edaf2ad48dd67d0337c8ecfcd47e8ce5598c435f4645d719ae60a12c5b37ed2d45571c29ff6af1292ed2ff7fa24e2ab69f18db826044f35683810d2ee95f68f586a8922acdc225912820cdffe6ac29641f3c531a0eb1ddbf17341a05f3ee437f2a56a4a92af8ba2e413d00d05caab40963868dc00da000dfe8962927be81ca05afcc624225b2667a1208dd74e8bb6ced5e1da98f41bb3dedc31302fbf6ed40e9c526f82b53ce45e25e20ce9068bba911f0ec11403a35ff01cee623f71101155fcb646937ac714ac49741b4a1ffc6a72cba387bf41c1af2eeaa80a07631a22d366562924848da0f27c", @ANYRES32, @ANYBLOB="02000000000000006d6e742f656e637279707465645f6469722f2e2e2f66696c653000"]) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') 15:17:21 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x540a, 0x0) (fail_nth: 1) 15:17:21 executing program 1: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, 0x0) r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r0, 0x7, 0x0, 0x0, 0x0) syz_io_uring_setup(0x7d04, &(0x7f00000002c0), &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f0000000240)=[{&(0x7f0000000340)=""/142, 0x8e}], 0x1}, 0x0) syz_io_uring_submit(r1, 0x0, &(0x7f0000000100)=@IORING_OP_ASYNC_CANCEL, 0x4) mknodat$loop(r0, &(0x7f0000000080)='./file1\x00', 0x1000, 0x1) mount$bind(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x64000, 0x0) 15:17:21 executing program 5: setregid(0xffffffffffffffff, 0xee01) r0 = getegid() setfsgid(r0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000000c0), &(0x7f0000000100)=0xc) r1 = fork() kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 15:17:21 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x5427, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "bb09819e2f6e8485"}) [ 723.569692] FAULT_INJECTION: forcing a failure. [ 723.569692] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 723.571180] CPU: 0 PID: 6499 Comm: syz-executor.2 Not tainted 5.10.250 #1 [ 723.571992] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 723.572981] Call Trace: [ 723.573296] dump_stack+0x107/0x167 [ 723.573725] should_fail.cold+0x5/0xa [ 723.574181] _copy_to_user+0x2e/0x180 [ 723.574637] simple_read_from_buffer+0xcc/0x160 [ 723.575189] proc_fail_nth_read+0x198/0x230 [ 723.575700] ? proc_sessionid_read+0x230/0x230 [ 723.576237] ? security_file_permission+0xb1/0xe0 [ 723.576809] ? proc_sessionid_read+0x230/0x230 [ 723.577347] vfs_read+0x228/0x620 [ 723.577755] ksys_read+0x12d/0x260 [ 723.578173] ? vfs_write+0xb10/0xb10 [ 723.578629] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 723.579243] ? syscall_enter_from_user_mode+0x1d/0x50 [ 723.579854] do_syscall_64+0x33/0x40 [ 723.580296] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 723.580899] RIP: 0033:0x7fe06fd5169c [ 723.581337] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 723.583514] RSP: 002b:00007fe06d314170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 723.584411] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007fe06fd5169c [ 723.585242] RDX: 000000000000000f RSI: 00007fe06d3141e0 RDI: 0000000000000004 [ 723.586078] RBP: 00007fe06d3141d0 R08: 0000000000000000 R09: 0000000000000000 [ 723.586924] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 723.587761] R13: 00007ffc6211236f R14: 00007fe06d314300 R15: 0000000000022000 15:17:37 executing program 3: mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, 0x0) mount$bind(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x2b024b5, 0x0) 15:17:37 executing program 7: openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x4d0080, 0x0) r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r0, 0x400c6615, &(0x7f0000000000)={0x0, @adiantum, 0x0, @desc2}) fsconfig$FSCONFIG_CMD_RECONFIGURE(r0, 0x7, 0x0, 0x0, 0x0) ioctl$TCSBRKP(r0, 0x5425, 0x994a) 15:17:37 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x540a, 0x0) 15:17:37 executing program 6: setregid(0xffffffffffffffff, 0xee01) r0 = getegid() setfsgid(r0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000000c0)={0x0, 0x0}, &(0x7f0000000100)=0xc) newfstatat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x1000) mount$9p_virtio(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x2000, &(0x7f0000000440)=ANY=[@ANYBLOB='trans=virtio,version=9p2000.u,privport,version=9p2000.L,dfltgid=', @ANYRESHEX, @ANYBLOB="b11de123c41645dd150c6d1725c42df0ea407de497045cc0bd0ea81a92cce76a5ec3e00660dfc18846bccb8ff2da8ec48826e3baba24413d110c822b351ae641433986dd684aae318f3e68160ff426718ef06dde3106e56b46aa23f69a57870aadacd9952b8f2e00000000", @ANYRESDEC=r1, @ANYBLOB=',smackfshat=+*)-(:,uid>', @ANYRESDEC=r2, @ANYBLOB=',defcontext=us\x00\x00_u,\x00']) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280), &(0x7f00000002c0)=0xc) r3 = fork() kcmp(r3, r3, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 15:17:37 executing program 5: setregid(0xffffffffffffffff, 0xee01) r0 = getegid() setfsgid(r0) r1 = fork() kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 15:17:37 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x5428, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "bb09819e2f6e8485"}) 15:17:37 executing program 1: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, 0x0) mount$bind(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x64000, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x5) 15:17:37 executing program 4: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1c08a4, 0x0) r1 = syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) open$dir(&(0x7f0000000200)='./mnt\x00', 0x40040, 0x10) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir/../file0\x00', 0x80, 0x0) r2 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r3 = openat(r1, &(0x7f0000000000)='mnt/encrypted_dir/../file0\x00', 0x40, 0x100) r4 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r4, 0x7, 0x0, 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r4, 0xc0406619, &(0x7f00000001c0)={@desc={0x1, 0x0, @desc2}}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000140)=',,\\\x00') futimesat(r3, &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0)={{0x0, 0xea60}}) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000680)=ANY=[@ANYBLOB="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", @ANYRES32, @ANYBLOB="02000000000000006d6e742f656e637279707465645f6469722f2e2e2f66696c653000"]) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') 15:17:37 executing program 3: mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, 0x0) mount$bind(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x2b024b5, 0x0) 15:17:37 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x5429, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "bb09819e2f6e8485"}) 15:17:37 executing program 7: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f00000000c0)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB="08000000000000002e2f6669000030ff1a90"]) ioctl$TIOCSTI(r1, 0x5412, &(0x7f0000000080)=0x6) r2 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r2, 0x7, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r0, &(0x7f0000000100)={0x10000000}) ioctl$TCSBRKP(r0, 0x5425, 0x994a) ioctl$TIOCSISO7816(r0, 0xc0285443, &(0x7f0000000040)={0xbeb, 0x1, 0x101, 0x9169, 0x7fff}) 15:17:37 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x2, 0x0) 15:17:37 executing program 1: syz_emit_ethernet(0x5e, &(0x7f0000000000)={@local, @link_local, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "0004b4", 0x28, 0x3a, 0xff, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @mcast2, {[], @ndisc_redir={0x89, 0x0, 0x0, '\x00', @ipv4={'\x00', '\xff\xff', @private}, @private1}}}}}}, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, 0x0) mount$bind(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x64000, 0x0) 15:17:37 executing program 4: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1c08a4, 0x0) r1 = syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) open$dir(&(0x7f0000000200)='./mnt\x00', 0x40040, 0x10) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir/../file0\x00', 0x80, 0x0) r2 = perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x50008, 0x0, 0x10081, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r3 = openat(r1, &(0x7f0000000000)='mnt/encrypted_dir/../file0\x00', 0x40, 0x100) r4 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r4, 0x7, 0x0, 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r4, 0xc0406619, &(0x7f00000001c0)={@desc={0x1, 0x0, @desc2}}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000140)=',,\\\x00') futimesat(r3, &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0)={{0x0, 0xea60}}) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000680)=ANY=[@ANYBLOB="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", @ANYRES32, @ANYBLOB="02000000000000006d6e742f656e637279707465645f6469722f2e2e2f66696c653000"]) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') 15:17:37 executing program 5: setregid(0xffffffffffffffff, 0xee01) getegid() r0 = fork() kcmp(r0, r0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 15:17:37 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, 0x0) mount$bind(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x2b024b5, 0x0) [ 739.955044] perf: interrupt took too long (12480 > 12477), lowering kernel.perf_event_max_sample_rate to 16000 15:17:37 executing program 6: setregid(0xffffffffffffffff, 0xee01) r0 = getegid() setfsgid(r0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000000c0)={0x0, 0x0}, &(0x7f0000000100)=0xc) newfstatat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x1000) mount$9p_virtio(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x2000, &(0x7f0000000440)=ANY=[@ANYBLOB='trans=virtio,version=9p2000.u,privport,version=9p2000.L,dfltgid=', @ANYRESHEX, @ANYBLOB="b11de123c41645dd150c6d1725c42df0ea407de497045cc0bd0ea81a92cce76a5ec3e00660dfc18846bccb8ff2da8ec48826e3baba24413d110c822b351ae641433986dd684aae318f3e68160ff426718ef06dde3106e56b46aa23f69a57870aadacd9952b8f2e00000000", @ANYRESDEC=r1, @ANYBLOB=',smackfshat=+*)-(:,uid>', @ANYRESDEC=r2, @ANYBLOB=',defcontext=us\x00\x00_u,\x00']) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280), &(0x7f00000002c0)=0xc) r3 = fork() kcmp(r3, r3, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 15:17:37 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x5432, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "bb09819e2f6e8485"}) 15:17:37 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x4b2f, 0x0) 15:17:37 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, 0x0) mount$bind(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x2b024b5, 0x0) 15:17:37 executing program 1: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, 0x0) mount$bind(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280), 0x2004, 0x0) mount$bind(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x64000, 0x0) mount$9p_unix(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000180), 0x44000, &(0x7f00000001c0)={'trans=unix,', {[{@privport}], [{@seclabel}, {@seclabel}]}}) 15:17:37 executing program 4: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1c08a4, 0x0) r1 = syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) open$dir(&(0x7f0000000200)='./mnt\x00', 0x40040, 0x10) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir/../file0\x00', 0x80, 0x0) r2 = perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x50008, 0x0, 0x10081, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r3 = openat(r1, &(0x7f0000000000)='mnt/encrypted_dir/../file0\x00', 0x40, 0x100) r4 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r4, 0x7, 0x0, 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r4, 0xc0406619, &(0x7f00000001c0)={@desc={0x1, 0x0, @desc2}}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000140)=',,\\\x00') futimesat(r3, &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0)={{0x0, 0xea60}}) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000680)=ANY=[@ANYBLOB="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", @ANYRES32, @ANYBLOB="02000000000000006d6e742f656e637279707465645f6469722f2e2e2f66696c653000"]) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') 15:17:37 executing program 5: setregid(0xffffffffffffffff, 0xee01) r0 = fork() kcmp(r0, r0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 15:17:37 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x4b30, 0x0) 15:17:37 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x5435, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "bb09819e2f6e8485"}) 15:17:37 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, 0x0) mount$bind(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x2b024b5, 0x0) [ 753.735833] ====================================================== [ 753.735833] WARNING: the mand mount option is being deprecated and [ 753.735833] will be removed in v5.15! [ 753.735833] ====================================================== 15:17:51 executing program 1: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r0, 0x7, 0x0, 0x0, 0x0) mkdirat(r0, &(0x7f0000000180)='./file0\x00', 0x41) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x100050, 0x0) mount$bind(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x64000, 0x0) pivot_root(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='./file0\x00') 15:17:51 executing program 7: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCSBRKP(r0, 0x5425, 0x40994a) 15:17:51 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x5437, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "bb09819e2f6e8485"}) 15:17:51 executing program 3: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, 0x0, &(0x7f0000000040)='proc\x00', 0x0, 0x0) mount$bind(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x2b024b5, 0x0) 15:17:51 executing program 5: r0 = fork() kcmp(r0, r0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 15:17:51 executing program 4: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1c08a4, 0x0) r1 = syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) open$dir(&(0x7f0000000200)='./mnt\x00', 0x40040, 0x10) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir/../file0\x00', 0x80, 0x0) r2 = perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x50008, 0x0, 0x10081, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r3 = openat(r1, &(0x7f0000000000)='mnt/encrypted_dir/../file0\x00', 0x40, 0x100) r4 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r4, 0x7, 0x0, 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r4, 0xc0406619, &(0x7f00000001c0)={@desc={0x1, 0x0, @desc2}}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000140)=',,\\\x00') futimesat(r3, &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0)={{0x0, 0xea60}}) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000680)=ANY=[@ANYBLOB="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", @ANYRES32, @ANYBLOB="02000000000000006d6e742f656e637279707465645f6469722f2e2e2f66696c653000"]) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') 15:17:51 executing program 6: setregid(0xffffffffffffffff, 0xee01) r0 = getegid() setfsgid(r0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000000c0)={0x0, 0x0}, &(0x7f0000000100)=0xc) newfstatat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x1000) mount$9p_virtio(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x2000, &(0x7f0000000440)=ANY=[@ANYBLOB='trans=virtio,version=9p2000.u,privport,version=9p2000.L,dfltgid=', @ANYRESHEX, @ANYBLOB="b11de123c41645dd150c6d1725c42df0ea407de497045cc0bd0ea81a92cce76a5ec3e00660dfc18846bccb8ff2da8ec48826e3baba24413d110c822b351ae641433986dd684aae318f3e68160ff426718ef06dde3106e56b46aa23f69a57870aadacd9952b8f2e00000000", @ANYRESDEC=r1, @ANYBLOB=',smackfshat=+*)-(:,uid>', @ANYRESDEC=r2, @ANYBLOB=',defcontext=us\x00\x00_u,\x00']) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280), &(0x7f00000002c0)=0xc) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 15:17:51 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x4b31, 0x0) 15:18:06 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x5441, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "bb09819e2f6e8485"}) 15:18:06 executing program 7: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x20002, 0x0) ioctl$TCSBRKP(r0, 0x5425, 0x400) 15:18:06 executing program 4: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1c08a4, 0x0) r1 = syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) open$dir(&(0x7f0000000200)='./mnt\x00', 0x40040, 0x10) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir/../file0\x00', 0x80, 0x0) r2 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x50008, 0x0, 0x10081, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r3 = openat(r1, &(0x7f0000000000)='mnt/encrypted_dir/../file0\x00', 0x40, 0x100) r4 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r4, 0x7, 0x0, 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r4, 0xc0406619, &(0x7f00000001c0)={@desc={0x1, 0x0, @desc2}}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000140)=',,\\\x00') futimesat(r3, &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0)={{0x0, 0xea60}}) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000680)=ANY=[@ANYBLOB="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", @ANYRES32, @ANYBLOB="02000000000000006d6e742f656e637279707465645f6469722f2e2e2f66696c653000"]) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') 15:18:06 executing program 6: setregid(0xffffffffffffffff, 0xee01) r0 = getegid() setfsgid(r0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000000c0)={0x0, 0x0}, &(0x7f0000000100)=0xc) newfstatat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x1000) mount$9p_virtio(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x2000, &(0x7f0000000440)=ANY=[@ANYBLOB='trans=virtio,version=9p2000.u,privport,version=9p2000.L,dfltgid=', @ANYRESHEX, @ANYBLOB="b11de123c41645dd150c6d1725c42df0ea407de497045cc0bd0ea81a92cce76a5ec3e00660dfc18846bccb8ff2da8ec48826e3baba24413d110c822b351ae641433986dd684aae318f3e68160ff426718ef06dde3106e56b46aa23f69a57870aadacd9952b8f2e00000000", @ANYRESDEC=r1, @ANYBLOB=',smackfshat=+*)-(:,uid>', @ANYRESDEC=r2, @ANYBLOB=',defcontext=us\x00\x00_u,\x00']) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280), &(0x7f00000002c0)=0xc) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 15:18:06 executing program 3: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, 0x0, &(0x7f0000000040)='proc\x00', 0x0, 0x0) mount$bind(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x2b024b5, 0x0) 15:18:06 executing program 5: r0 = fork() kcmp(r0, r0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 15:18:06 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x4b32, 0x0) 15:18:06 executing program 1: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x3a) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, 0x0) mount$bind(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x64000, 0x0) 15:18:06 executing program 4: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1c08a4, 0x0) r1 = syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) open$dir(&(0x7f0000000200)='./mnt\x00', 0x40040, 0x10) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir/../file0\x00', 0x80, 0x0) r2 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x50008, 0x0, 0x10081, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r3 = openat(r1, &(0x7f0000000000)='mnt/encrypted_dir/../file0\x00', 0x40, 0x100) r4 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r4, 0x7, 0x0, 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r4, 0xc0406619, &(0x7f00000001c0)={@desc={0x1, 0x0, @desc2}}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000140)=',,\\\x00') futimesat(r3, &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0)={{0x0, 0xea60}}) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000680)=ANY=[@ANYBLOB="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", @ANYRES32, @ANYBLOB="02000000000000006d6e742f656e637279707465645f6469722f2e2e2f66696c653000"]) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') 15:18:06 executing program 3: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, 0x0, &(0x7f0000000040)='proc\x00', 0x0, 0x0) mount$bind(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x2b024b5, 0x0) 15:18:06 executing program 1: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20d085d, 0x0) mount(0x0, &(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='9p\x00', 0x100042, 0x0) mount$bind(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x64000, 0x0) 15:18:06 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x5450, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "bb09819e2f6e8485"}) 15:18:06 executing program 6: setregid(0xffffffffffffffff, 0xee01) r0 = getegid() setfsgid(r0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000000c0)={0x0, 0x0}, &(0x7f0000000100)=0xc) newfstatat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x1000) mount$9p_virtio(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x2000, &(0x7f0000000440)=ANY=[@ANYBLOB='trans=virtio,version=9p2000.u,privport,version=9p2000.L,dfltgid=', @ANYRESHEX, @ANYBLOB="b11de123c41645dd150c6d1725c42df0ea407de497045cc0bd0ea81a92cce76a5ec3e00660dfc18846bccb8ff2da8ec48826e3baba24413d110c822b351ae641433986dd684aae318f3e68160ff426718ef06dde3106e56b46aa23f69a57870aadacd9952b8f2e00000000", @ANYRESDEC=r1, @ANYBLOB=',smackfshat=+*)-(:,uid>', @ANYRESDEC=r2, @ANYBLOB=',defcontext=us\x00\x00_u,\x00']) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280), &(0x7f00000002c0)=0xc) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 15:18:06 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x4b33, 0x0) 15:18:06 executing program 5: r0 = fork() kcmp(r0, r0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 15:18:19 executing program 6: setregid(0xffffffffffffffff, 0xee01) r0 = getegid() setfsgid(r0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000000c0)={0x0, 0x0}, &(0x7f0000000100)=0xc) newfstatat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x1000) mount$9p_virtio(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x2000, &(0x7f0000000440)=ANY=[@ANYBLOB='trans=virtio,version=9p2000.u,privport,version=9p2000.L,dfltgid=', @ANYRESHEX, @ANYBLOB="b11de123c41645dd150c6d1725c42df0ea407de497045cc0bd0ea81a92cce76a5ec3e00660dfc18846bccb8ff2da8ec48826e3baba24413d110c822b351ae641433986dd684aae318f3e68160ff426718ef06dde3106e56b46aa23f69a57870aadacd9952b8f2e00000000", @ANYRESDEC=r1, @ANYBLOB=',smackfshat=+*)-(:,uid>', @ANYRESDEC=r2, @ANYBLOB=',defcontext=us\x00\x00_u,\x00']) r3 = fork() kcmp(r3, r3, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 15:18:19 executing program 4: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1c08a4, 0x0) r1 = syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) open$dir(&(0x7f0000000200)='./mnt\x00', 0x40040, 0x10) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir/../file0\x00', 0x80, 0x0) r2 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x50008, 0x0, 0x10081, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r3 = openat(r1, &(0x7f0000000000)='mnt/encrypted_dir/../file0\x00', 0x40, 0x100) r4 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r4, 0x7, 0x0, 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r4, 0xc0406619, &(0x7f00000001c0)={@desc={0x1, 0x0, @desc2}}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000140)=',,\\\x00') futimesat(r3, &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0)={{0x0, 0xea60}}) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000680)=ANY=[@ANYBLOB="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", @ANYRES32, @ANYBLOB="02000000000000006d6e742f656e637279707465645f6469722f2e2e2f66696c653000"]) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') 15:18:19 executing program 7: openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = openat(0xffffffffffffff9c, 0x0, 0x400000, 0x110) fsconfig$FSCONFIG_CMD_RECONFIGURE(r0, 0x7, 0x0, 0x0, 0x0) ioctl$TCSBRKP(r0, 0x5425, 0x8) r1 = syz_open_dev$vcsu(&(0x7f00000000c0), 0x100000000, 0x264863) ioctl$TIOCL_GETSHIFTSTATE(r1, 0x541c, &(0x7f0000000080)) 15:18:19 executing program 5: setregid(0xffffffffffffffff, 0xee01) r0 = fork() kcmp(0x0, r0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 15:18:19 executing program 3: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) mount$bind(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x2b024b5, 0x0) 15:18:19 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x5451, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "bb09819e2f6e8485"}) 15:18:19 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x4b34, 0x0) 15:18:19 executing program 1: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, 0x0) lgetxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)=@random={'user.', 'proc\x00'}, &(0x7f0000000180)=""/29, 0x1d) mount$bind(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x64000, 0x0) 15:18:19 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x4b35, 0x0) 15:18:19 executing program 1: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, 0x0) stat(&(0x7f00000014c0)='./file0\x00', &(0x7f0000001500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$tmpfs(&(0x7f0000000080), &(0x7f0000000100)='.\x00', 0x565b, 0x5, &(0x7f0000001440)=[{&(0x7f0000000180)="d073d43eb43ea7bec33bc5750f8d8189777512eb41c99959e8295d3abbe05d07ca5a9aea378faffc8395c6f0330e66124a1a1bd748ea43fc51993b842b65846204d25c25fde166c032347a72a5b7a48f6ad059a650d0bd5e0663751109851eb70c972ecb4333fcfe6bb64170034129d134d808c2bb", 0x75, 0xfcf}, {&(0x7f0000000200)="6de55d3bf14f49dfef1f272a20fa4426336d3c75668e87044ec65a277cec18d20e9b493ec28f122b0904e6f802298adc5618f0e951c58de847153320ab72eda56bebe6a0f16c00993fb320ef12f7e94eb7bf690dcbdfd6df9765ff1738d7d02f59f98de00fff7988a127eff8cc21ec3b2e0a83b80039ad005b97b96c8c297ee93eab0c0a0e9e6204cd14e07f573035aba7b68d3362368ad1b924a2775605896c71faae0c288fef38dd432871173bb7a50f11bafac3ba423e883d83b9f0732989b6148644b8351e94d6fe9c43abe226b4a9ca90ef9f002ec3b8c1b7bd7055d1ce63e7db404f6ffd3b868947873c531793247bf53953b7b298", 0xf8, 0x530}, {&(0x7f0000000300)="cac2ffae41b585c0b4f9cc3d11f34008e78d0a2ead47d899563cc6d72614474ea402fb3981aaa4a343d4541541e43b69db5f91419c112c4935577408b67259c063557db3c09701db60425872076502b558fc8556809e1fe8b76c82b784df6164d1e1280c8f65544824d2f928de1d0e2d2f0ddba24eb90605f17e2c508b440a0aab6d846867a89113770d85fc0e2aca460b56ea70fade9df8fb0213d5cd16ad092a52ececa4eedca9b2afe1214556fb43df850869", 0xb4, 0x1}, {&(0x7f00000003c0)="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", 0x1000, 0x100000001}, {&(0x7f00000013c0)="e56d2c60a2aa1ecba4424f9d55912798489c5c932e974dfad35d8036eb353563f25f71a729d7b7332f9f3f9101c6efcf5581f322003affbd2bd574fec11e1aa61a18d378cd55a935ec88816c82e07df2", 0x50}], 0x800, &(0x7f0000001580)=ANY=[@ANYBLOB='nr_inodes=3220p66),gid=', @ANYRESHEX=r0, @ANYBLOB="2c6f626a5f726f6c653d2c636f6e746578e92ef78e6f742c66756e633d4b455845435f494e495452414d466d61e3303d5e4d41595f526041442c000000000000000000"]) creat(&(0x7f0000001600)='./file0\x00', 0x4c) mount$bind(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x64000, 0x0) 15:18:19 executing program 5: setregid(0xffffffffffffffff, 0xee01) r0 = fork() kcmp(0x0, r0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 15:18:19 executing program 3: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) mount$bind(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x2b024b5, 0x0) 15:18:19 executing program 7: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$GIO_FONT(r0, 0x4b60, &(0x7f0000000040)=""/249) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r1, 0x7, 0x0, 0x0, 0x0) ioctl$TIOCGPTPEER(r1, 0x5441, 0x100000000) ioctl$TCSBRKP(r0, 0x5425, 0x994a) 15:18:19 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x5452, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "bb09819e2f6e8485"}) 15:18:19 executing program 4: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1c08a4, 0x0) r1 = syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) open$dir(&(0x7f0000000200)='./mnt\x00', 0x40040, 0x10) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir/../file0\x00', 0x80, 0x0) r2 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x50008, 0x0, 0x10081, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r3 = openat(r1, &(0x7f0000000000)='mnt/encrypted_dir/../file0\x00', 0x40, 0x100) r4 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r4, 0x7, 0x0, 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r4, 0xc0406619, &(0x7f00000001c0)={@desc={0x1, 0x0, @desc2}}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000140)=',,\\\x00') futimesat(r3, &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0)={{0x0, 0xea60}}) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000680)=ANY=[@ANYBLOB="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", @ANYRES32, @ANYBLOB="02000000000000006d6e742f656e637279707465645f6469722f2e2e2f66696c653000"]) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') 15:18:19 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x4b36, 0x0) 15:18:34 executing program 1: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, 0x0) mount$bind(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x19c4004, 0x0) 15:18:34 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x4b37, 0x0) 15:18:34 executing program 7: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x4, 0x80, 0x81, 0x3, 0x7, 0x8, 0x0, 0x1, 0x88288, 0x4, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0xc4, 0x1, @perf_bp={&(0x7f0000000040), 0x1}, 0x42100, 0x4, 0x7ff, 0x7, 0xff, 0x80000000, 0x8000, 0x0, 0x7, 0x0, 0x5}, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f0000000140)={0x3, &(0x7f0000000100)=[{0x8, 0x8, 0xc3, 0xffff}, {0xffff, 0x4e, 0xd2, 0x3f}, {0x19d, 0x5, 0xf7, 0x40}]}) ioctl$TCSBRKP(r0, 0x5425, 0x994a) 15:18:34 executing program 5: setregid(0xffffffffffffffff, 0xee01) r0 = fork() kcmp(0x0, r0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 15:18:34 executing program 4: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1c08a4, 0x0) r1 = syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) open$dir(&(0x7f0000000200)='./mnt\x00', 0x40040, 0x10) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir/../file0\x00', 0x80, 0x0) r2 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x50008, 0x0, 0x10081, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r3 = openat(r1, &(0x7f0000000000)='mnt/encrypted_dir/../file0\x00', 0x40, 0x100) r4 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r4, 0x7, 0x0, 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r4, 0xc0406619, &(0x7f00000001c0)={@desc={0x1, 0x0, @desc2}}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000140)=',,\\\x00') futimesat(r3, &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0)={{0x0, 0xea60}}) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000680)=ANY=[@ANYBLOB="b00900000000000018000000468a29458f2709d329f6d3f3917408961482081d984538af2f9bcf61c448afbaa0be3f00000000000000ca4aa56fc413a417324e8530165c3515981e2d28f7fce9ae3c6bb8fa04ff6411132c9ced479abaeea325c2205ea95984d3d7f98eea1cca02dfeb0b2471b497fbb71b60180d35e2a3394ba6d965f41c7b7bc29d4e3ca95bd7ad074a4242ec98a69ad9d1546ce18cbbd98d2e50688e958a0fcd16876ab83cdb94eeb03e42203f267a1bf6ccb1c07ad92e6e493149da32f754251ae74d30cd4b50eefd6a208172ed8693b320eda714bdd152b484d9c939b4bb777dddd947843d73529f5ffe589777254cb10f733351e0739a3a61c3b8f977517ee7becda66da23a93e3be8ed63bda262951b32f72c1c48ee63be474eafaa255074efaa494b950f48b119c76c70b833e4d7443b691dc97bf78bcae908758ff1edaf2ad48dd67d0337c8ecfcd47e8ce5598c435f4645d719ae60a12c5b37ed2d45571c29ff6af1292ed2ff7fa24e2ab69f18db826044f35683810d2ee95f68f586a8922acdc225912820cdffe6ac29641f3c531a0eb1ddbf17341a05f3ee437f2a56a4a92af8ba2e413d00d05caab40963868dc00da000dfe8962927be81ca05afcc624225b2667a1208dd74e8bb6ced5e1da98f41bb3dedc31302fbf6ed40e9c526f82b53ce45e25e20ce9068bba911f0ec11403a35ff01cee623f71101155fcb646937ac714ac49741b4a1ffc6a72cba387bf41c1af2eeaa80a07631a22d366562924848da0f27c", @ANYRES32, @ANYBLOB="02000000000000006d6e742f656e637279707465645f6469722f2e2e2f66696c653000"]) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') 15:18:34 executing program 3: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) mount$bind(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x2b024b5, 0x0) 15:18:34 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x5456, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "bb09819e2f6e8485"}) 15:18:34 executing program 6: setregid(0xffffffffffffffff, 0xee01) r0 = getegid() setfsgid(r0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000000c0), &(0x7f0000000100)=0xc) newfstatat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180), 0x1000) r1 = fork() kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 15:18:34 executing program 3: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, 0x0) mount$bind(0x0, 0x0, 0x0, 0x2b024b5, 0x0) 15:18:34 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x5457, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "bb09819e2f6e8485"}) 15:18:34 executing program 3: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, 0x0) mount$bind(0x0, 0x0, 0x0, 0x2b024b5, 0x0) 15:18:34 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x4b3a, 0x0) 15:18:34 executing program 6: setregid(0xffffffffffffffff, 0xee01) r0 = getegid() setfsgid(r0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000000c0), &(0x7f0000000100)=0xc) r1 = fork() kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 15:18:34 executing program 1: r0 = syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, 0x0) fstat(r0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file1\x00', 0x8000, 0x4, &(0x7f0000000340)=[{&(0x7f0000000180)="312178ba0e8591a7337e744510bcbf8ad5a13d624a95340cf0e8cff67dfbe95f969eac57d923362d649eeb4e5bbe5bb12537b020cc112dcb6322ddc0f82823c461182275cca450af40a5898faf5542b4c3788e0a108606355b93f202958908616b283ddf17fb11035c195653ff75ede7ae63ae9a34fb88e94ed6be269632f7", 0x7f, 0x3}, {&(0x7f0000000200)="d3c7c9edaa24eb286064", 0xa, 0xffffffffffffff00}, {&(0x7f0000000240)="efae416988b16f03fdabf3cff07770ed2793ea7cecc054c9240490a610914d0519286a83e2f5b2542369c8f6b4d6cc1eb135e665f7c898", 0x37, 0x6bb}, {&(0x7f0000000280)="7e39540aeeebefe25ca7a1dcc8ff2006f66ccc90e0bb177dc9f01d6891fac30408d7e1c27b8f6581781bffc9bb5148d8de2ffdc360487c0854dbd9741fe1d1600b0c72247486cfadd0c04dd78c500f6c1d8f397ba01da49615fe2a08a359c441956c27629d00c28d42486459ca27f751750ef3fc8144980358ab3096af20e8ce6047e285e1f4547954f9e0db87287d942d0153b5ded569e95bf9be1529d6d4e6", 0xa0, 0x3}], 0x80, &(0x7f0000000440)={[{@shortname_win95}, {@iocharset={'iocharset', 0x3d, 'iso8859-3'}}, {@shortname_win95}, {@shortname_lower}], [{@euid_eq={'euid', 0x3d, r1}}, {@obj_role={'obj_role', 0x3d, 'proc\x00'}}]}) mount$bind(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x64000, 0x0) 15:18:34 executing program 5: setregid(0xffffffffffffffff, 0xee01) r0 = fork() kcmp(r0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 15:18:34 executing program 4: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1c08a4, 0x0) r1 = syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) open$dir(&(0x7f0000000200)='./mnt\x00', 0x40040, 0x10) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir/../file0\x00', 0x80, 0x0) r2 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x50008, 0x0, 0x10081, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r3 = openat(r1, &(0x7f0000000000)='mnt/encrypted_dir/../file0\x00', 0x40, 0x100) r4 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r4, 0x7, 0x0, 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r4, 0xc0406619, &(0x7f00000001c0)={@desc={0x1, 0x0, @desc2}}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000140)=',,\\\x00') futimesat(r3, &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0)={{0x0, 0xea60}}) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000680)=ANY=[@ANYBLOB="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", @ANYRES32, @ANYBLOB="02000000000000006d6e742f656e637279707465645f6469722f2e2e2f66696c653000"]) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') 15:18:34 executing program 3: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, 0x0) mount$bind(0x0, 0x0, 0x0, 0x2b024b5, 0x0) 15:18:34 executing program 6: setregid(0xffffffffffffffff, 0xee01) r0 = getegid() setfsgid(r0) r1 = fork() kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 15:18:48 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x545d, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "bb09819e2f6e8485"}) 15:18:48 executing program 1: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, 0x0) mount$bind(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x64000, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x309000, 0x0) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="50af0030"], 0x10) 15:18:48 executing program 7: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCSBRKP(r0, 0x5425, 0x994a) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000080), 0x305400, 0x0) r2 = openat(0xffffffffffffffff, 0x0, 0x0, 0x15) readahead(r1, 0x5, 0x3) fsconfig$FSCONFIG_CMD_RECONFIGURE(r2, 0x7, 0x0, 0x0, 0x0) ioctl$TIOCL_SCROLLCONSOLE(r2, 0x541c, &(0x7f0000000040)={0xd, 0x5}) r3 = signalfd4(r2, &(0x7f0000000140)={[0x1]}, 0x8, 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x3f, 0xff, 0x4, 0x0, 0x0, 0x6, 0x8, 0x5, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x80, 0x1, @perf_config_ext={0x0, 0x100000001}, 0x8080, 0x3ff, 0x658, 0x4, 0x3f, 0x8, 0xff, 0x0, 0xfffffffc, 0x0, 0xdd}, 0xffffffffffffffff, 0x8, r3, 0xa) 15:18:48 executing program 6: setregid(0xffffffffffffffff, 0xee01) getegid() r0 = fork() kcmp(r0, r0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 15:18:48 executing program 4: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1c08a4, 0x0) r1 = syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) open$dir(&(0x7f0000000200)='./mnt\x00', 0x40040, 0x10) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir/../file0\x00', 0x80, 0x0) r2 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, @perf_bp={0x0, 0x9}, 0x50008, 0x0, 0x10081, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r3 = openat(r1, &(0x7f0000000000)='mnt/encrypted_dir/../file0\x00', 0x40, 0x100) r4 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r4, 0x7, 0x0, 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r4, 0xc0406619, &(0x7f00000001c0)={@desc={0x1, 0x0, @desc2}}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000140)=',,\\\x00') futimesat(r3, &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0)={{0x0, 0xea60}}) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000680)=ANY=[@ANYBLOB="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", @ANYRES32, @ANYBLOB="02000000000000006d6e742f656e637279707465645f6469722f2e2e2f66696c653000"]) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') 15:18:48 executing program 5: setregid(0xffffffffffffffff, 0xee01) r0 = fork() kcmp(r0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 15:18:48 executing program 3: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, 0x0) mount$bind(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) 15:18:48 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x4b3b, 0x0) 15:19:00 executing program 5: setregid(0xffffffffffffffff, 0xee01) r0 = fork() kcmp(r0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 15:19:00 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x4b3c, 0x0) 15:19:00 executing program 7: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000480)={&(0x7f0000000080)={0x3c4, 0x1f, 0x400, 0x70bd27, 0x25dfdbfb, {0x1d}, [@generic="ee989254cf0eeef95a82bc02d3e67ad1fb7446b8200f216c6440a733ce874b86", @generic="852324bed2156bfeba357400c2dff0e0a52940fd2e28536e8d6365e2b656f4ce999f92c7229b65523b72d7355a5e6286eec47bad6757564afac219fe70294934b12efb3a91b40da76ee3d8f3ab81d21f7b816279ba20e63c7a6a3db39989c981ce4e9583a39d2b0615ed906712b4fe209ed6c7ac7a13673f39f457f7111f817e23978917fa8795b62c17855cdc20209d143fe7e1525138f9efdf093d120cbc34e914e088f89416898ff00ca03b7ccdade9e6b3d604afb8861407", @generic="473083207ff0bcf4037c5d9bf35058e8fcec23eff811e0dadb339c3569c78e5a6ae5e7204a94ccfd0d90e871bc6902b98988fba051e7e8b8743f991f1b66033b81085dcba7cfce9f8d48b0b408081e3919431750f72083b672cbb1dbc968580dc315853f1fe7a91e2d72ea8c8bb77a139ee779fd3d9e36beee30a510f6f1c8c312ea637a644309e28b15eb4d89a0efc9a974d3d997e5b7dd4a8bde8857f54d446ec49a77db132361bcabd3514ffd4f868131fd3170e023bf7d7a0726ff6b28e76d09c6eb1c6638d0ad5ed7df58069fa62fd4e8b7fc70f794e8d590ea5978bfcdceac7311952c78fb80b9828393a458c31e019e7f4906616b373150", @nested={0xad, 0x91, 0x0, 0x1, [@generic="0a28dfbca0aabd6240bd63c0d6d4e432ac4b95398539b05b053e1ad7cfb3286c6adcf79cb1cf5291a34672b2c530593b1e758eeb0da6bc7470740ca52a8656a37e66db026285c269cb0bef514bb8ac6340d8dda7784b370b7fad", @typed={0xf, 0x66, 0x0, 0x0, @str='/dev/ttyS3\x00'}, @typed={0x4, 0x70}, @generic="490c2c979141ab3278f771c3c43859a3838a85af6e233348b9d4d527668f64faf6fe56b8cc48484614fd58b72d344e69c4b8d8424cb52b3936b731"]}, @generic="c43802be25d0b679fd34c5874af3f88a66cacd9026f75899f85676c9ef638516b23702aba18f4473c34d24409fee27f5730fe698e2bc33edc0463de18da0d0ec15cca9ff963d473dc3146d887b29277ec21d2a12ef99441c37b3b1ca3ee16455ecd7d15c79e8d9621b95625ad0f8197d01b8210460665abc00dac4dc0ec68d5a533bbec570c5ae669b8c492389215a5abf7b2f360f2a936d83fb5eccf3", @generic="e00e40bb28c0dccc2eff6147242f6ea5d6a96c1a13898e838e26001b578a2c0dd5b64a669006d37489883562f1a7d28c31f4e40cd0dbcb4edffaac44cd95244b5358253db6d3e751c2f30e40a9a6b5f217820d2b98f924107c55657b42ba8d89ab61f76fbfa0b7c4ed3245528ef54d083bfbf7f1eecae1ad6bc6f8d871ad6e5cce70ad58a51245e13ae81f"]}, 0x3c4}, 0x1, 0x0, 0x0, 0x1}, 0x8014) ioctl$TCSBRKP(r0, 0x5425, 0x994a) 15:19:00 executing program 4: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1c08a4, 0x0) r1 = syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) open$dir(&(0x7f0000000200)='./mnt\x00', 0x40040, 0x10) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir/../file0\x00', 0x80, 0x0) r2 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, @perf_bp={0x0, 0x9}, 0x50008, 0x0, 0x10081, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r3 = openat(r1, &(0x7f0000000000)='mnt/encrypted_dir/../file0\x00', 0x40, 0x100) r4 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r4, 0x7, 0x0, 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r4, 0xc0406619, &(0x7f00000001c0)={@desc={0x1, 0x0, @desc2}}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000140)=',,\\\x00') futimesat(r3, &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0)={{0x0, 0xea60}}) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000680)=ANY=[@ANYBLOB="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", @ANYRES32, @ANYBLOB="02000000000000006d6e742f656e637279707465645f6469722f2e2e2f66696c653000"]) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') 15:19:00 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x5460, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "bb09819e2f6e8485"}) 15:19:00 executing program 6: setregid(0xffffffffffffffff, 0xee01) r0 = fork() kcmp(r0, r0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 15:19:00 executing program 1: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='fusectl\x00', 0x4000, 0x0) mount$bind(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x16482c, 0x0) 15:19:00 executing program 3: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, 0x0) mount$bind(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) 15:19:00 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x4b3d, 0x0) 15:19:00 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x4b40, 0x0) 15:19:00 executing program 6: r0 = fork() kcmp(r0, r0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 15:19:00 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x5600, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "bb09819e2f6e8485"}) 15:19:00 executing program 3: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, 0x0) mount$bind(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) 15:19:00 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x4b41, 0x0) 15:19:00 executing program 4: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1c08a4, 0x0) r1 = syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) open$dir(&(0x7f0000000200)='./mnt\x00', 0x40040, 0x10) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir/../file0\x00', 0x80, 0x0) r2 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, @perf_bp={0x0, 0x9}, 0x50008, 0x0, 0x10081, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r3 = openat(r1, &(0x7f0000000000)='mnt/encrypted_dir/../file0\x00', 0x40, 0x100) r4 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r4, 0x7, 0x0, 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r4, 0xc0406619, &(0x7f00000001c0)={@desc={0x1, 0x0, @desc2}}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000140)=',,\\\x00') futimesat(r3, &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0)={{0x0, 0xea60}}) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000680)=ANY=[@ANYBLOB="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", @ANYRES32, @ANYBLOB="02000000000000006d6e742f656e637279707465645f6469722f2e2e2f66696c653000"]) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') 15:19:00 executing program 1: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, 0x0) syz_mount_image$nfs4(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x7ff, 0x8, &(0x7f0000001680)=[{&(0x7f0000000180)="de3cd7c92e952edf1d066d5a8232b7c4e92d", 0x12, 0x87d0}, {&(0x7f00000001c0)="82c1c37f2feb7ac8c222416a58e587ad193ab2a045f1623cf3540ce775bd11f5eb9c494d7522ccaf762a6691f59352f60cf51803841e16ec4aa6172d919b377777caacd42049400a61213cd9fed1dcfea86131a8bc1d7d9ba3baf2bb6b8a4dfbca87ad8135e46d3b471630de3bf0ff7038ce367fb39e15676beac2adcf", 0x7d, 0x8}, {&(0x7f0000000240)="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", 0x1000, 0x5}, {&(0x7f0000001240)="5f3c1589bc16ff7f9bf4e512a3ea3fab3adf2ce34cf8af7d676075590c3451a0ff6ad07b226f86912eda93e67712f2d43e524ca8cbf58e009e0440a116e034d2640c2526bffba4e6e47e61b5c92e7560a46d46ad3c97f880200c27f9e270b3b141818c6f7d61be638234c79fe076a3e32e58e57cdd5d12f37b", 0x79, 0x9}, {&(0x7f00000012c0)="7e5adee63f8a7da30ad8ee63b3b8db8abc2733182f6ae6c38f5b883e0e75aa48294ef32745a9c02d8cb094ed77d8d3d6caee3781e5bac2987abe0c38881f256e86318dd2fd20f4fffbcef373ee017f2609a9b16fa858183efd87b777b6e821e5042c2a4fa2766bd4310cc3bc3e08a09586ae7a601b37306ed2e8f4b864c5be90294b78bdc63f78f89509479a9365612645e9c6bac545a45d954cf37fa18040ad45f257f5ede88f32f53980d43038bbe6626e96509fd61e17be01433a3f265d3fc5b9f24a51bb246302095e359ef89bffe2993125d204a4e35cde10650cde73ef28f5320929337389aaeb3c06114a7287fde9e3f0", 0xf4, 0x2}, {&(0x7f00000013c0)="425fa4b17f2ccd5d99ba7291a34a28ee51414473f10d4f97c6f4d658792536c07f16e15062be3d3d989cf9ae59a46311be5b533a13f2484644de74370f6a8d6f88893373e33c5f0fb889a13e45c5eeeddad2fdef5a9fc54dcecdd522f754d54e2a5b68f30d92ca530a97fb2915cbc7892be1d4040a0df6dcb530b499242ce149eafbd61fa51988fcfab6edf40942fa6e9c9bf19ef7d6a9dc0622fb8668134f516c8d65e9fa4b3602c7d69c7b373fc78a9a70b76dadcb66afc7603abc4bff0dd0c7d2590d1e9fd44e6708317a882146f01136c199d9d6e60f4d0f500b7324a6b0362f", 0xe2, 0x1}, {&(0x7f00000014c0)="8340d741f1b3504b8aaece54d97f02d8b0dbe91f45483b63eb72f1ce65055f588cb218fd5959545178efd27876288e48722fa78bca05317517d8fd337557c199bd3cf787ec8aad8b42f5d004ea7a309479cf65cc5cf42f0e057c947fb7c4a59dd8ba43322d4fff2c16a13b21dced169c95ba6e1d6eda514df16eb47eac8c584b782ccf433902e237f3af35c6e383747ebfb970540698a08b1c2e59011d215ef1e126d5c0cec1c2ceace9935009e2b479856fc74e33f7bcc15f2529637cd92617fb813707c3406d0c8bf2a3fda6ab1feedb", 0xd1}, {&(0x7f00000015c0)="9d71daf6b5513ecc0fee57c3c90fcf72ee93cd19346a9e389f4c7016fe55d7f551c2254fa4d68d8849a17d6c40449c917eb8e301b2e834e02e198ccbc1923390f8cfa12549c667920ba61469f47581f64a4ee0881e04db7d6f4ab45b389980b1903ea9c4c3c8e3b2ab753906c168fdcd74f9722f58475c667c191b07ecf869217a6aea020e14ada31d24baa1d36e3ea19503", 0x92, 0x1}], 0x0, &(0x7f0000001740)=ANY=[@ANYBLOB='/!,proc\x00,\'\\}-/,proc\x00,\\,mask=MAY_APPEND,audit,appraise,pcr=000000000000=0000018,\x00']) mount$bind(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x64000, 0x0) 15:19:01 executing program 6: r0 = fork() kcmp(r0, r0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 15:19:01 executing program 5: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1c08a4, 0x0) r1 = syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) open$dir(&(0x7f0000000200)='./mnt\x00', 0x40040, 0x10) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir/../file0\x00', 0x80, 0x0) r2 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, @perf_bp={0x0, 0x9}, 0x50008, 0x0, 0x10081, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r3 = openat(r1, &(0x7f0000000000)='mnt/encrypted_dir/../file0\x00', 0x40, 0x100) r4 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r4, 0x7, 0x0, 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r4, 0xc0406619, &(0x7f00000001c0)={@desc={0x1, 0x0, @desc2}}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000140)=',,\\\x00') futimesat(r3, &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0)={{0x0, 0xea60}}) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000680)=ANY=[@ANYBLOB="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", @ANYRES32, @ANYBLOB="02000000000000006d6e742f656e637279707465645f6469722f2e2e2f66696c653000"]) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') 15:19:15 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x4b44, 0x0) 15:19:15 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x4b40, 0x0) 15:19:15 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x5601, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "bb09819e2f6e8485"}) 15:19:15 executing program 6: r0 = fork() kcmp(r0, r0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 15:19:15 executing program 4: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1c08a4, 0x0) r1 = syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) open$dir(&(0x7f0000000200)='./mnt\x00', 0x40040, 0x10) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir/../file0\x00', 0x80, 0x0) r2 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, @perf_bp={&(0x7f0000000500)}, 0x50008, 0x0, 0x10081, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r3 = openat(r1, &(0x7f0000000000)='mnt/encrypted_dir/../file0\x00', 0x40, 0x100) r4 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r4, 0x7, 0x0, 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r4, 0xc0406619, &(0x7f00000001c0)={@desc={0x1, 0x0, @desc2}}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000140)=',,\\\x00') futimesat(r3, &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0)={{0x0, 0xea60}}) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000680)=ANY=[@ANYBLOB="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", @ANYRES32, @ANYBLOB="02000000000000006d6e742f656e637279707465645f6469722f2e2e2f66696c653000"]) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') 15:19:15 executing program 3: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1c08a4, 0x0) r1 = syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) open$dir(&(0x7f0000000200)='./mnt\x00', 0x40040, 0x10) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir/../file0\x00', 0x80, 0x0) r2 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x50008, 0x0, 0x10081, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r3 = openat(r1, &(0x7f0000000000)='mnt/encrypted_dir/../file0\x00', 0x40, 0x100) r4 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r4, 0x7, 0x0, 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r4, 0xc0406619, &(0x7f00000001c0)={@desc={0x1, 0x0, @desc2}}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000140)=',,\\\x00') futimesat(r3, &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0)={{0x0, 0xea60}}) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000680)=ANY=[@ANYBLOB="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", @ANYRES32, @ANYBLOB="02000000000000006d6e742f656e637279707465645f6469722f2e2e2f66696c653000"]) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') 15:19:15 executing program 7: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) ioctl$TCSBRKP(r0, 0x5425, 0x994a) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)=0x100000) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) flistxattr(r1, &(0x7f00000000c0)=""/158, 0x9e) fcntl$setlease(r0, 0x400, 0x2) 15:19:15 executing program 1: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x9bdf, 0x2, &(0x7f0000000200)=[{&(0x7f0000000180)="4f5785311ea960191ebdf7073ea7", 0xe, 0x1}, {&(0x7f00000001c0)="15879dab67b6abe606d7f13bcfa1adc4e5ee18071cca14eb579242e247dfb2", 0x1f, 0x5}], 0x10, &(0x7f0000000340)=ANY=[@ANYBLOB="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"]) mount$bind(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x64000, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x1, 0x2) 15:19:15 executing program 1: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@nullb, &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='cgroup2\x00', 0x10100e, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, 0x0) mount$bind(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x64000, 0x0) 15:19:15 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x4b40, 0x0) 15:19:15 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x5456, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "bb09819e2f6e8485"}) 15:19:15 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x5602, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "bb09819e2f6e8485"}) 15:19:15 executing program 1: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, 0x0) mount$bind(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x264010, 0x0) 15:19:15 executing program 6: setregid(0xffffffffffffffff, 0xee01) r0 = fork() kcmp(0x0, r0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 15:19:15 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x4b45, 0x0) 15:19:15 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x4b40, 0x0) 15:19:15 executing program 4: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1c08a4, 0x0) r1 = syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) open$dir(&(0x7f0000000200)='./mnt\x00', 0x40040, 0x10) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir/../file0\x00', 0x80, 0x0) r2 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, @perf_bp={&(0x7f0000000500)}, 0x50008, 0x0, 0x10081, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r3 = openat(r1, &(0x7f0000000000)='mnt/encrypted_dir/../file0\x00', 0x40, 0x100) r4 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r4, 0x7, 0x0, 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r4, 0xc0406619, &(0x7f00000001c0)={@desc={0x1, 0x0, @desc2}}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000140)=',,\\\x00') futimesat(r3, &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0)={{0x0, 0xea60}}) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000680)=ANY=[@ANYBLOB="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", @ANYRES32, @ANYBLOB="02000000000000006d6e742f656e637279707465645f6469722f2e2e2f66696c653000"]) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') 15:19:15 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x5603, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "bb09819e2f6e8485"}) 15:19:29 executing program 6: setregid(0xffffffffffffffff, 0xee01) r0 = fork() kcmp(0x0, r0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 15:19:29 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x4b46, 0x0) 15:19:29 executing program 7: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCSBRKP(r0, 0x5425, 0x994a) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f0000000640)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0}) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(0xffffffffffffffff, 0x5000943f, &(0x7f0000000840)={{}, r2, 0x4, @inherit={0x80, &(0x7f0000000080)=ANY=[@ANYBLOB="010000000024a5000700000000000000b26e9690f7fad59a03000000cd000000000000000000000000000000000000a580040000000000b664f17b02000000000000007eacf3177c4830daa39375770000ffff000000000000010000800000000809000000000000000800000000000000040000000000000004000008000000"]}, @devid}) ioctl$BTRFS_IOC_RM_DEV_V2(r0, 0x5000943a, &(0x7f0000000040)={{r0}, r2, 0x3a, @unused=[0x48000000, 0x3, 0x42e, 0x1], @name="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"}) 15:19:29 executing program 4: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1c08a4, 0x0) r1 = syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) open$dir(&(0x7f0000000200)='./mnt\x00', 0x40040, 0x10) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir/../file0\x00', 0x80, 0x0) r2 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, @perf_bp={&(0x7f0000000500)}, 0x50008, 0x0, 0x10081, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r3 = openat(r1, &(0x7f0000000000)='mnt/encrypted_dir/../file0\x00', 0x40, 0x100) r4 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r4, 0x7, 0x0, 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r4, 0xc0406619, &(0x7f00000001c0)={@desc={0x1, 0x0, @desc2}}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000140)=',,\\\x00') futimesat(r3, &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0)={{0x0, 0xea60}}) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000680)=ANY=[@ANYBLOB="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", @ANYRES32, @ANYBLOB="02000000000000006d6e742f656e637279707465645f6469722f2e2e2f66696c653000"]) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') 15:19:29 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x5456, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "bb09819e2f6e8485"}) 15:19:29 executing program 1: clock_gettime(0x0, &(0x7f0000000280)={0x0, 0x0}) pselect6(0x40, &(0x7f00000001c0)={0x19, 0xa0000000000000, 0x5, 0x7fffffff, 0x6, 0x3d2}, &(0x7f0000000200)={0x5, 0x81, 0x20, 0x7, 0x8000, 0x6, 0x2, 0x3}, &(0x7f0000000240)={0x3, 0x1, 0x8803, 0x101, 0x40, 0x1, 0x0, 0x6}, &(0x7f00000002c0)={r0, r1+60000000}, &(0x7f0000000340)={&(0x7f0000000300)={[0xce]}, 0x8}) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, 0x0) rename(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x400, 0x190) mount$bind(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x64000, 0x0) 15:19:29 executing program 5: ioctl$TCSETAW(0xffffffffffffffff, 0x4b40, 0x0) 15:19:29 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x5605, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "bb09819e2f6e8485"}) 15:19:29 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x5456, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "bb09819e2f6e8485"}) 15:19:29 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x4b47, 0x0) 15:19:29 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x5606, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "bb09819e2f6e8485"}) 15:19:29 executing program 5: ioctl$TCSETAW(0xffffffffffffffff, 0x4b40, 0x0) 15:19:29 executing program 6: setregid(0xffffffffffffffff, 0xee01) r0 = fork() kcmp(0x0, r0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 15:19:29 executing program 4: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1c08a4, 0x0) r1 = syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) open$dir(&(0x7f0000000200)='./mnt\x00', 0x40040, 0x10) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir/../file0\x00', 0x80, 0x0) r2 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x0, 0x0, 0x10081, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r3 = openat(r1, &(0x7f0000000000)='mnt/encrypted_dir/../file0\x00', 0x40, 0x100) r4 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r4, 0x7, 0x0, 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r4, 0xc0406619, &(0x7f00000001c0)={@desc={0x1, 0x0, @desc2}}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000140)=',,\\\x00') futimesat(r3, &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0)={{0x0, 0xea60}}) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000680)=ANY=[@ANYBLOB="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", @ANYRES32, @ANYBLOB="02000000000000006d6e742f656e637279707465645f6469722f2e2e2f66696c653000"]) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') 15:19:30 executing program 1: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r0, 0x7, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r1, 0x7, 0x0, 0x0, 0x0) renameat2(r0, &(0x7f0000000180)='./file0/file0\x00', r1, &(0x7f00000001c0)='./file0\x00', 0x5) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, 0x0) mount$bind(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x64000, 0x0) pivot_root(&(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='./file0\x00') 15:19:30 executing program 3: ioctl$TCSETAW(0xffffffffffffffff, 0x5456, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "bb09819e2f6e8485"}) 15:19:30 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x4b48, 0x0) [ 852.359021] cgroup: fork rejected by pids controller in /syz6 15:19:30 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x5607, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "bb09819e2f6e8485"}) 15:19:46 executing program 5: ioctl$TCSETAW(0xffffffffffffffff, 0x4b40, 0x0) 15:19:46 executing program 7: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x234840, 0x0) ioctl$TCSBRKP(r0, 0x5425, 0x994a) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, @in_args={0x4}}, './file0\x00'}) ioctl$TIOCSTI(r1, 0x5412, &(0x7f00000000c0)) ioctl$TIOCL_SETVESABLANK(r1, 0x541c, &(0x7f0000000080)) 15:19:46 executing program 6: setregid(0xffffffffffffffff, 0xee01) r0 = fork() kcmp(r0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 15:19:46 executing program 3: ioctl$TCSETAW(0xffffffffffffffff, 0x5456, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "bb09819e2f6e8485"}) 15:19:46 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x4b49, 0x0) 15:19:46 executing program 4: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1c08a4, 0x0) r1 = syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) open$dir(&(0x7f0000000200)='./mnt\x00', 0x40040, 0x10) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir/../file0\x00', 0x80, 0x0) r2 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x0, 0x0, 0x10081, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r3 = openat(r1, &(0x7f0000000000)='mnt/encrypted_dir/../file0\x00', 0x40, 0x100) r4 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r4, 0x7, 0x0, 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r4, 0xc0406619, &(0x7f00000001c0)={@desc={0x1, 0x0, @desc2}}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000140)=',,\\\x00') futimesat(r3, &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0)={{0x0, 0xea60}}) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000680)=ANY=[@ANYBLOB="b00900000000000018000000468a29458f2709d329f6d3f3917408961482081d984538af2f9bcf61c448afbaa0be3f00000000000000ca4aa56fc413a417324e8530165c3515981e2d28f7fce9ae3c6bb8fa04ff6411132c9ced479abaeea325c2205ea95984d3d7f98eea1cca02dfeb0b2471b497fbb71b60180d35e2a3394ba6d965f41c7b7bc29d4e3ca95bd7ad074a4242ec98a69ad9d1546ce18cbbd98d2e50688e958a0fcd16876ab83cdb94eeb03e42203f267a1bf6ccb1c07ad92e6e493149da32f754251ae74d30cd4b50eefd6a208172ed8693b320eda714bdd152b484d9c939b4bb777dddd947843d73529f5ffe589777254cb10f733351e0739a3a61c3b8f977517ee7becda66da23a93e3be8ed63bda262951b32f72c1c48ee63be474eafaa255074efaa494b950f48b119c76c70b833e4d7443b691dc97bf78bcae908758ff1edaf2ad48dd67d0337c8ecfcd47e8ce5598c435f4645d719ae60a12c5b37ed2d45571c29ff6af1292ed2ff7fa24e2ab69f18db826044f35683810d2ee95f68f586a8922acdc225912820cdffe6ac29641f3c531a0eb1ddbf17341a05f3ee437f2a56a4a92af8ba2e413d00d05caab40963868dc00da000dfe8962927be81ca05afcc624225b2667a1208dd74e8bb6ced5e1da98f41bb3dedc31302fbf6ed40e9c526f82b53ce45e25e20ce9068bba911f0ec11403a35ff01cee623f71101155fcb646937ac714ac49741b4a1ffc6a72cba387bf41c1af2eeaa80a07631a22d366562924848da0f27c", @ANYRES32, @ANYBLOB="02000000000000006d6e742f656e637279707465645f6469722f2e2e2f66696c653000"]) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') 15:19:46 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x5608, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "bb09819e2f6e8485"}) 15:19:46 executing program 1: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, 0x0) mount$bind(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x64000, 0x0) setxattr$trusted_overlay_opaque(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100), &(0x7f0000000180), 0x2, 0x1) mount$cgroup2(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200), 0x40, &(0x7f0000000240)={[{}, {}, {}], [{@fowner_lt={'fowner<', 0xee00}}, {@dont_appraise}, {@dont_appraise}, {@context={'context', 0x3d, 'unconfined_u'}}]}) [ 868.372297] cgroup2: Unknown parameter 'fowner<00000000000000060928' [ 868.386570] cgroup2: Unknown parameter 'fowner<00000000000000060928' 15:19:46 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x5609, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "bb09819e2f6e8485"}) 15:19:46 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x4b40, 0x0) 15:19:46 executing program 7: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x4000, 0x0) ioctl$TCSBRKP(r0, 0x5425, 0x994a) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) fallocate(r1, 0x0, 0x6, 0x1) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x4040, 0x0) r2 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCL_SCROLLCONSOLE(r2, 0x541c, &(0x7f0000000040)={0xd, 0xff}) 15:19:46 executing program 3: ioctl$TCSETAW(0xffffffffffffffff, 0x5456, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "bb09819e2f6e8485"}) 15:19:46 executing program 1: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r0, 0x7, 0x0, 0x0, 0x0) recvmsg$unix(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)=""/82, 0x52}, {&(0x7f0000000200)=""/78, 0x4e}], 0x2, &(0x7f0000000280)=[@cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x68}, 0x40002102) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, 0x0) mount$bind(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x2242084, 0x0) 15:19:46 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x4b4a, 0x0) 15:19:46 executing program 4: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1c08a4, 0x0) r1 = syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) open$dir(&(0x7f0000000200)='./mnt\x00', 0x40040, 0x10) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir/../file0\x00', 0x80, 0x0) r2 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x0, 0x0, 0x10081, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r3 = openat(r1, &(0x7f0000000000)='mnt/encrypted_dir/../file0\x00', 0x40, 0x100) r4 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r4, 0x7, 0x0, 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r4, 0xc0406619, &(0x7f00000001c0)={@desc={0x1, 0x0, @desc2}}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000140)=',,\\\x00') futimesat(r3, &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0)={{0x0, 0xea60}}) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000680)=ANY=[@ANYBLOB="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", @ANYRES32, @ANYBLOB="02000000000000006d6e742f656e637279707465645f6469722f2e2e2f66696c653000"]) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') 15:19:46 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x5456, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "bb09819e2f6e8485"}) 15:19:46 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x560a, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "bb09819e2f6e8485"}) 15:20:01 executing program 5: syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(0xffffffffffffffff, 0x4b40, 0x0) 15:20:01 executing program 4: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1c08a4, 0x0) r1 = syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) open$dir(&(0x7f0000000200)='./mnt\x00', 0x40040, 0x10) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir/../file0\x00', 0x80, 0x0) r2 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x50008, 0x0, 0x0, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r3 = openat(r1, &(0x7f0000000000)='mnt/encrypted_dir/../file0\x00', 0x40, 0x100) r4 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r4, 0x7, 0x0, 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r4, 0xc0406619, &(0x7f00000001c0)={@desc={0x1, 0x0, @desc2}}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000140)=',,\\\x00') futimesat(r3, &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0)={{0x0, 0xea60}}) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000680)=ANY=[@ANYBLOB="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", @ANYRES32, @ANYBLOB="02000000000000006d6e742f656e637279707465645f6469722f2e2e2f66696c653000"]) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') 15:20:01 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x560b, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "bb09819e2f6e8485"}) 15:20:01 executing program 1: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, 0x0) r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r0, 0x7, 0x0, 0x0, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="100000e81701000700bdf92332d0dd2e"], 0x10) mount$bind(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x64000, 0x0) r1 = mmap$IORING_OFF_SQES(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x810, r0, 0x10000000) syz_io_uring_setup(0x78a1, &(0x7f0000000080)={0x0, 0x6f61, 0x10, 0x0, 0x3ba}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f00000002c0), &(0x7f0000000180)) r2 = io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) syz_io_uring_submit(0x0, r1, &(0x7f0000000100)=@IORING_OP_TEE={0x21, 0x3, 0x0, @fd_index, 0x0, 0x0, 0x4ff, 0xa, 0x0, {0x0, r2, r0}}, 0x3f) 15:20:01 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x4b4b, 0x0) 15:20:01 executing program 6: setregid(0xffffffffffffffff, 0xee01) r0 = fork() kcmp(r0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 15:20:01 executing program 3: syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(0xffffffffffffffff, 0x5456, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "bb09819e2f6e8485"}) 15:20:01 executing program 7: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r1, 0x7, 0x0, 0x0, 0x0) ioctl$TIOCGSERIAL(r1, 0x541e, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=""/31}) ioctl$TIOCSRS485(r0, 0x542f, &(0x7f0000000080)={0x7ff, 0x7, 0x3}) ioctl$TCSBRKP(r0, 0x5425, 0x994a) ioctl$TIOCGRS485(r0, 0x542e, &(0x7f0000000040)) 15:20:01 executing program 3: syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(0xffffffffffffffff, 0x5456, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "bb09819e2f6e8485"}) 15:20:01 executing program 5: syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(0xffffffffffffffff, 0x4b40, 0x0) 15:20:15 executing program 3: syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(0xffffffffffffffff, 0x5456, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "bb09819e2f6e8485"}) 15:20:15 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x4b4c, 0x0) 15:20:15 executing program 7: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x4000, 0x0) ioctl$TCSBRKP(r0, 0x5425, 0x3) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_script(r0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0xc8) ioctl$VT_RESIZEX(r1, 0x560a, &(0x7f00000000c0)={0x2c77, 0x3, 0x6, 0x6db, 0x6}) r2 = openat(0xffffffffffffff9c, 0x0, 0x280000, 0x0) r3 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f00000002c0), 0x101200, 0x0) ioctl$TIOCOUTQ(r4, 0x5411, &(0x7f0000000300)) fsconfig$FSCONFIG_CMD_RECONFIGURE(r3, 0x7, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r3, 0x7, 0x0, 0x0, 0x0) ioctl$KDGETLED(0xffffffffffffffff, 0x4b31, &(0x7f00000001c0)) r5 = openat(r1, &(0x7f0000000140)='./file0\x00', 0x440000, 0x0) fsconfig$FSCONFIG_CMD_CREATE(r2, 0x6, 0x0, 0x0, 0x0) ioctl$TIOCSRS485(r5, 0x542f, &(0x7f0000000180)={0x7, 0x80000000, 0x10000}) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000100), 0x2000, 0x0) ioctl$VT_DISALLOCATE(r6, 0x5608) ioctl$TIOCL_SCROLLCONSOLE(0xffffffffffffffff, 0x541c, &(0x7f0000000040)={0xd, 0x81}) fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$TCSBRK(0xffffffffffffffff, 0x5409, 0xe2fc) 15:20:15 executing program 5: syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(0xffffffffffffffff, 0x4b40, 0x0) 15:20:15 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000280)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x1000009, 0x1f012, r0, 0x0) rt_sigtimedwait(&(0x7f0000000180), 0x0, &(0x7f00000001c0)={0x0, 0x989680}, 0x8) r1 = openat(r0, &(0x7f0000000080)='./file0\x00', 0x410600, 0x74) r2 = syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, 0x0) mount$bind(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x64000, 0x0) r3 = openat$incfs(r1, &(0x7f0000000200)='.pending_reads\x00', 0x1000, 0x51) sendmsg$nl_generic(r1, &(0x7f0000001780)={&(0x7f0000000100), 0xc, &(0x7f0000000240)={&(0x7f00000002c0)={0x1484, 0x1a, 0x400, 0x70bd27, 0x25dfdbff, {0x5}, [@generic="fb62f7097acd1119e72ca48d95ea2c680b9deeaaebd175b18fabb22c16aefe4fb79fa54062d758ae73656ef20fed78f56fe498bd82d04eafa2391aa46b8169153e82c73794135122063f388d364acb4b9d7c778cf2d4", @nested={0xd7, 0x65, 0x0, 0x1, [@generic="3ee3ad0b9c5cfe0fd0014d6a92ce19baa0", @typed={0xc, 0x6b, 0x0, 0x0, @u64=0x1}, @typed={0xa1, 0x30, 0x0, 0x0, @binary="36b1fd992663eb079bb0633e4de21a4aed0c37dce7be0826724c96554327c8ff695082eadc61b12386b90585c5ea87cb27a56e2a3dd49b347b9a85ab28e898ae6266071d261001d190943550a3d7b47137b48c8dffced2dfd6f24b5ee79091974f3551d614438be70634d2599dd08a7307c15c38836ab6a3600996c77abbb8ac4e4e8b8c75d5726329059b18a376372e027074f086a92243de985756d3"}, @generic="7147dacafe27f34474f2bdfb828187cca2b6"]}, @nested={0x1133, 0x2d, 0x0, 0x1, [@typed={0x8, 0x5d, 0x0, 0x0, @fd=r2}, @generic="51d514a2996bcd29e97141ec138150c888bd5f6c8c6e104cb76dc6d8aa599fa765d039b92ec1d240e70478cda0eb8cc9e5e81d30b51859aaef473b292ee372338034bd30d68e06242c961e4f232902555d75a1ac33c6cbc951630627be99a48c70cdea482e9c58e949064ef51f", @generic="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", @generic="54908b9c4b118b08e9516633849692e92257f8bdfcc06e1e51cb58a760578acb41770b90cc698ee5d6e79224466a51ff320a720b92c84a77a4dbbb6ffd6fd568796ff43136bed0b6a270441a620ab5eb7a0b89aa07933b9429899c6244d78ab98ce60f6f4345137f4c3b7fe81b5814062be963af5280440e2074ebabc780e5f0d2768a758bf46c1e0e730e2aa1f55fb8b9ff", @typed={0x9, 0x6, 0x0, 0x0, @str='proc\x00'}, @typed={0x4, 0x5a}, @typed={0x8, 0x75, 0x0, 0x0, @fd=r3}, @generic, @typed={0x8, 0x25, 0x0, 0x0, @fd=r2}, @typed={0x8, 0x3, 0x0, 0x0, @fd=r2}]}, @nested={0x209, 0x26, 0x0, 0x1, [@generic="268d0ff53415436cfb544059a582346ee6ae623158e33057cf692032c6e811cdb3eae8595034b9741e0afceba4c77ad48fc7e76c47e9bb1b348431e2a002dec2c3b252780c634899dc056ea776bd1d6284ec87e802d8cec124d923627cd9e22d5dd9cc0cce61f6b7fd933823a2ada66c8f0dd6509e3e3e1c9da53d5e06fc9169b0b29423c6f872e77a14b0b3b7a1cecc7a1ff0c5e69ca33e9e49a600ff91d631193cae24f35db629e2", @typed={0xc, 0x57, 0x0, 0x0, @u64}, @generic="15085c0b396a1c5e0b5fd11d9ebcf86546b17428", @generic="e0928982fe526940398da21de81c826104244c2905f3e15705e95eb9f6f70dbca4370d3843d020e6e06a491f19811177ec29a7", @generic="b40ad2a16ea7ee8596cbc52d5f33c12a82e522e08f3fa5eef2375e5d69b4a1b8d63b7d056009613bcb4c1202ea9972a53a601b4b45bacb68077f865865b8fc8e63c2a088a0d3af7116533eefc31dee50832d6ba22b0c4f0785dbe544e5c246ec13ef31cac3d363ad6ed4e55cd838efdb8ee4255c690dffa69e9980e2e36688b5c0", @typed={0x8, 0x3c, 0x0, 0x0, @ipv4=@multicast2}, @generic="8aeb59ca16c256ba4686a99acc7ad7376728e50845d71b90bdff4c1d67387035751e014f981400ed36", @generic="dcc8832b6e99c7bfdc8842fc0be0a7d497543e3cac300790e7a6d4e16585eb29823123be83937942308201e91f190042fa34f535aed9d95b26d066b0a30023b14a40ff", @typed={0x9, 0x5d, 0x0, 0x0, @str='proc\x00'}, @typed={0x8, 0x3, 0x0, 0x0, @ipv4=@broadcast}]}]}, 0x1484}, 0x1, 0x0, 0x0, 0x24004811}, 0x4008800) 15:20:15 executing program 4: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1c08a4, 0x0) r1 = syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) open$dir(&(0x7f0000000200)='./mnt\x00', 0x40040, 0x10) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir/../file0\x00', 0x80, 0x0) r2 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x50008, 0x0, 0x0, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r3 = openat(r1, &(0x7f0000000000)='mnt/encrypted_dir/../file0\x00', 0x40, 0x100) r4 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r4, 0x7, 0x0, 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r4, 0xc0406619, &(0x7f00000001c0)={@desc={0x1, 0x0, @desc2}}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000140)=',,\\\x00') futimesat(r3, &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0)={{0x0, 0xea60}}) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000680)=ANY=[@ANYBLOB="b00900000000000018000000468a29458f2709d329f6d3f3917408961482081d984538af2f9bcf61c448afbaa0be3f00000000000000ca4aa56fc413a417324e8530165c3515981e2d28f7fce9ae3c6bb8fa04ff6411132c9ced479abaeea325c2205ea95984d3d7f98eea1cca02dfeb0b2471b497fbb71b60180d35e2a3394ba6d965f41c7b7bc29d4e3ca95bd7ad074a4242ec98a69ad9d1546ce18cbbd98d2e50688e958a0fcd16876ab83cdb94eeb03e42203f267a1bf6ccb1c07ad92e6e493149da32f754251ae74d30cd4b50eefd6a208172ed8693b320eda714bdd152b484d9c939b4bb777dddd947843d73529f5ffe589777254cb10f733351e0739a3a61c3b8f977517ee7becda66da23a93e3be8ed63bda262951b32f72c1c48ee63be474eafaa255074efaa494b950f48b119c76c70b833e4d7443b691dc97bf78bcae908758ff1edaf2ad48dd67d0337c8ecfcd47e8ce5598c435f4645d719ae60a12c5b37ed2d45571c29ff6af1292ed2ff7fa24e2ab69f18db826044f35683810d2ee95f68f586a8922acdc225912820cdffe6ac29641f3c531a0eb1ddbf17341a05f3ee437f2a56a4a92af8ba2e413d00d05caab40963868dc00da000dfe8962927be81ca05afcc624225b2667a1208dd74e8bb6ced5e1da98f41bb3dedc31302fbf6ed40e9c526f82b53ce45e25e20ce9068bba911f0ec11403a35ff01cee623f71101155fcb646937ac714ac49741b4a1ffc6a72cba387bf41c1af2eeaa80a07631a22d366562924848da0f27c", @ANYRES32, @ANYBLOB="02000000000000006d6e742f656e637279707465645f6469722f2e2e2f66696c653000"]) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') 15:20:15 executing program 6: setregid(0xffffffffffffffff, 0xee01) r0 = fork() kcmp(r0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 15:20:15 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x560c, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "bb09819e2f6e8485"}) 15:20:15 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x560d, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "bb09819e2f6e8485"}) 15:20:15 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x4b4d, 0x0) 15:20:15 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x5456, 0x0) 15:20:15 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x4b4a, 0x0) 15:20:15 executing program 1: r0 = syz_io_uring_complete(0x0) sendmsg$MPTCP_PM_CMD_SET_LIMITS(r0, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x38, 0x0, 0x200, 0x70bd2d, 0x25dfdbfe, {}, [@MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x8}, @MPTCP_PM_ATTR_ADDR={0x1c, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_FAMILY={0x6, 0x1, 0xa}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x7}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @multicast1}]}]}, 0x38}, 0x1, 0x0, 0x0, 0x1}, 0x20040011) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, 0x0) mount$bind(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x64000, 0x0) 15:20:15 executing program 7: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCSBRKP(r0, 0x5425, 0x994a) ioctl$TCSETSW2(r0, 0x402c542c, &(0x7f0000000040)={0x8, 0x8, 0x5, 0x8, 0x8, "0d128a3abd1051bdf65e4a2e5cbbdd5c9ccd99", 0x8, 0x7fffffff}) 15:20:15 executing program 4: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1c08a4, 0x0) r1 = syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) open$dir(&(0x7f0000000200)='./mnt\x00', 0x40040, 0x10) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir/../file0\x00', 0x80, 0x0) r2 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x50008, 0x0, 0x0, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r3 = openat(r1, &(0x7f0000000000)='mnt/encrypted_dir/../file0\x00', 0x40, 0x100) r4 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r4, 0x7, 0x0, 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r4, 0xc0406619, &(0x7f00000001c0)={@desc={0x1, 0x0, @desc2}}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000140)=',,\\\x00') futimesat(r3, &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0)={{0x0, 0xea60}}) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000680)=ANY=[@ANYBLOB="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", @ANYRES32, @ANYBLOB="02000000000000006d6e742f656e637279707465645f6469722f2e2e2f66696c653000"]) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') 15:20:15 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x4b4a, 0x0) 15:20:15 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x4b4e, 0x0) 15:20:15 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x560e, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "bb09819e2f6e8485"}) 15:20:15 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x5456, 0x0) 15:20:15 executing program 6: clock_gettime(0x0, &(0x7f0000000280)={0x0, 0x0}) pselect6(0x40, &(0x7f00000001c0)={0x19, 0xa0000000000000, 0x5, 0x7fffffff, 0x6, 0x3d2}, &(0x7f0000000200)={0x5, 0x81, 0x20, 0x7, 0x8000, 0x6, 0x2, 0x3}, &(0x7f0000000240)={0x3, 0x1, 0x8803, 0x101, 0x40, 0x1, 0x0, 0x6}, &(0x7f00000002c0)={r0, r1+60000000}, &(0x7f0000000340)={&(0x7f0000000300)={[0xce]}, 0x8}) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, 0x0) rename(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x400, 0x190) mount$bind(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x64000, 0x0) 15:20:29 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x4b4a, 0x0) 15:20:29 executing program 4: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1c08a4, 0x0) r1 = syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) open$dir(&(0x7f0000000200)='./mnt\x00', 0x40040, 0x10) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir/../file0\x00', 0x80, 0x0) r2 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x50008, 0x0, 0x10081}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r3 = openat(r1, &(0x7f0000000000)='mnt/encrypted_dir/../file0\x00', 0x40, 0x100) r4 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r4, 0x7, 0x0, 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r4, 0xc0406619, &(0x7f00000001c0)={@desc={0x1, 0x0, @desc2}}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000140)=',,\\\x00') futimesat(r3, &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0)={{0x0, 0xea60}}) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000680)=ANY=[@ANYBLOB="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", @ANYRES32, @ANYBLOB="02000000000000006d6e742f656e637279707465645f6469722f2e2e2f66696c653000"]) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') 15:20:29 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x560f, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "bb09819e2f6e8485"}) 15:20:29 executing program 7: fallocate(0xffffffffffffffff, 0x0, 0x3f, 0x3ff) r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCSBRKP(r0, 0x5425, 0x80) 15:20:29 executing program 1: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000580)=@loop={'/dev/loop', 0x0}, &(0x7f00000005c0)='./file1\x00', &(0x7f0000000600)='f2fs\x00', 0x204000, &(0x7f0000000640)='#.\x00') mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, 0x0) mount$bind(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x874400, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000300)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in6=@private2}}, &(0x7f0000000400)=0xe8) stat(&(0x7f0000000000)='.\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r1, 0x0) stat(&(0x7f0000000000)='.\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r2, 0x0) mount$cgroup2(0x0, &(0x7f0000000080)='./file1\x00', &(0x7f00000002c0), 0x20401, &(0x7f0000000440)=ANY=[@ANYBLOB='memory_localevents,memory_localevents,memory_recursiveprot,fowner=', @ANYRESDEC=r0, @ANYBLOB=',uid=', @ANYRESDEC=r1, @ANYBLOB="2c6d6561737572652c66756e633d4250524d5f434845434b2c736d61636b66736861743d0f2c2a2f2d5d5d272c666f776e65723c", @ANYRESDEC=r2, @ANYBLOB=',obj_type=#-^^),smackfstransmute=squashfs\x00,fsuuid=c9a2ecf0-c425-cc8c-8302-5fb89dQa,defcontext=unconfined_u,\x00']) mount(&(0x7f0000000200)=ANY=[@ANYBLOB="b75b397e754df3ef05c82ae814d34d0e2a5381d0bbb80d65777e98f9077b57812e092214608b821cc45ed75b8d12546db9874eeb41554e83b985c2974e98f70a557de43d99bcc1b53e9654157d7fa9b9dab6037a795613a0c454a9a6c6310ccec7a51750ca4e6c6d144576f2c9cef052d438810113106c63aa5a19ce0338e66e00d51584ef4ce90df3de6ba0c82de57fda7afcd45fab4fe9eb255bd218f2a1d29a9bbedb"], &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='squashfs\x00', 0x4052, &(0x7f00000001c0)='proc\x00') 15:20:29 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x5456, 0x0) 15:20:29 executing program 6: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, 0x0) mount$bind(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x264010, 0x0) 15:20:29 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x4b52, 0x0) 15:20:29 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x40049409, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "bb09819e2f6e8485"}) 15:20:29 executing program 5: ioctl$TCSETAW(0xffffffffffffffff, 0x4b4a, 0x0) 15:20:29 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x4b62, 0x0) 15:20:29 executing program 3: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1c08a4, 0x0) r1 = syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) open$dir(&(0x7f0000000200)='./mnt\x00', 0x40040, 0x10) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir/../file0\x00', 0x80, 0x0) r2 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x50008, 0x0, 0x10081, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r3 = openat(r1, &(0x7f0000000000)='mnt/encrypted_dir/../file0\x00', 0x40, 0x100) r4 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r4, 0x7, 0x0, 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r4, 0xc0406619, &(0x7f00000001c0)={@desc={0x1, 0x0, @desc2}}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000140)=',,\\\x00') futimesat(r3, &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0)={{0x0, 0xea60}}) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000680)=ANY=[@ANYBLOB="b00900000000000018000000468a29458f2709d329f6d3f3917408961482081d984538af2f9bcf61c448afbaa0be3f00000000000000ca4aa56fc413a417324e8530165c3515981e2d28f7fce9ae3c6bb8fa04ff6411132c9ced479abaeea325c2205ea95984d3d7f98eea1cca02dfeb0b2471b497fbb71b60180d35e2a3394ba6d965f41c7b7bc29d4e3ca95bd7ad074a4242ec98a69ad9d1546ce18cbbd98d2e50688e958a0fcd16876ab83cdb94eeb03e42203f267a1bf6ccb1c07ad92e6e493149da32f754251ae74d30cd4b50eefd6a208172ed8693b320eda714bdd152b484d9c939b4bb777dddd947843d73529f5ffe589777254cb10f733351e0739a3a61c3b8f977517ee7becda66da23a93e3be8ed63bda262951b32f72c1c48ee63be474eafaa255074efaa494b950f48b119c76c70b833e4d7443b691dc97bf78bcae908758ff1edaf2ad48dd67d0337c8ecfcd47e8ce5598c435f4645d719ae60a12c5b37ed2d45571c29ff6af1292ed2ff7fa24e2ab69f18db826044f35683810d2ee95f68f586a8922acdc225912820cdffe6ac29641f3c531a0eb1ddbf17341a05f3ee437f2a56a4a92af8ba2e413d00d05caab40963868dc00da000dfe8962927be81ca05afcc624225b2667a1208dd74e8bb6ced5e1da98f41bb3dedc31302fbf6ed40e9c526f82b53ce45e25e20ce9068bba911f0ec11403a35ff01cee623f71101155fcb646937ac714ac49741b4a1ffc6a72cba387bf41c1af2eeaa80a07631a22d366562924848da0f27c", @ANYRES32, @ANYBLOB="02000000000000006d6e742f656e637279707465645f6469722f2e2e2f66696c653000"]) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') 15:20:29 executing program 1: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, 0x0) mount$bind(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x64000, 0x0) mount(&(0x7f0000001240)=@sr0, &(0x7f0000001280)='./file0\x00', &(0x7f00000012c0)='configfs\x00', 0x800000, &(0x7f0000001300)='.\x00') setxattr$incfs_metadata(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100), &(0x7f0000000180)="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", 0x1000, 0x1) lsetxattr$security_capability(&(0x7f0000001180)='./file0\x00', &(0x7f00000011c0), &(0x7f0000001200)=@v1={0x1000000, [{0x6, 0xf7a}]}, 0xc, 0x3) 15:20:29 executing program 6: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1c08a4, 0x0) r1 = syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) open$dir(&(0x7f0000000200)='./mnt\x00', 0x40040, 0x10) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir/../file0\x00', 0x80, 0x0) r2 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x50008, 0x0, 0x10081, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r3 = openat(r1, &(0x7f0000000000)='mnt/encrypted_dir/../file0\x00', 0x40, 0x100) r4 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r4, 0x7, 0x0, 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r4, 0xc0406619, &(0x7f00000001c0)={@desc={0x1, 0x0, @desc2}}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000140)=',,\\\x00') futimesat(r3, &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0)={{0x0, 0xea60}}) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000680)=ANY=[@ANYBLOB="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", @ANYRES32, @ANYBLOB="02000000000000006d6e742f656e637279707465645f6469722f2e2e2f66696c653000"]) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') 15:20:29 executing program 4: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1c08a4, 0x0) r1 = syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) open$dir(&(0x7f0000000200)='./mnt\x00', 0x40040, 0x10) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir/../file0\x00', 0x80, 0x0) r2 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x50008, 0x0, 0x10081}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r3 = openat(r1, &(0x7f0000000000)='mnt/encrypted_dir/../file0\x00', 0x40, 0x100) r4 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r4, 0x7, 0x0, 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r4, 0xc0406619, &(0x7f00000001c0)={@desc={0x1, 0x0, @desc2}}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000140)=',,\\\x00') futimesat(r3, &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0)={{0x0, 0xea60}}) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000680)=ANY=[@ANYBLOB="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", @ANYRES32, @ANYBLOB="02000000000000006d6e742f656e637279707465645f6469722f2e2e2f66696c653000"]) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') 15:20:29 executing program 5: ioctl$TCSETAW(0xffffffffffffffff, 0x4b4a, 0x0) 15:20:29 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x40086602, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "bb09819e2f6e8485"}) [ 912.134002] configfs: Unknown parameter '.' [ 912.152660] configfs: Unknown parameter '.' 15:20:44 executing program 6: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, 0x0) mount$bind(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280), 0x2004, 0x0) mount$bind(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x64000, 0x0) mount$9p_unix(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000180), 0x44000, &(0x7f00000001c0)={'trans=unix,', {[{@privport}], [{@seclabel}, {@seclabel}]}}) 15:20:44 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x4b63, 0x0) 15:20:44 executing program 7: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCSBRKP(r0, 0x5425, 0x994c) r1 = syz_open_dev$vcsa(&(0x7f0000000080), 0x80000000, 0x40201) ioctl$GIO_UNISCRNMAP(r1, 0x4b69, &(0x7f00000000c0)=""/174) pread64(r0, &(0x7f0000000180)=""/58, 0x3a, 0xffffffffffffffff) ioctl$TCGETA(0xffffffffffffffff, 0x5405, &(0x7f0000000040)) 15:20:44 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x40087602, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "bb09819e2f6e8485"}) 15:20:44 executing program 4: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1c08a4, 0x0) r1 = syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) open$dir(&(0x7f0000000200)='./mnt\x00', 0x40040, 0x10) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir/../file0\x00', 0x80, 0x0) r2 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x50008, 0x0, 0x10081}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r3 = openat(r1, &(0x7f0000000000)='mnt/encrypted_dir/../file0\x00', 0x40, 0x100) r4 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r4, 0x7, 0x0, 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r4, 0xc0406619, &(0x7f00000001c0)={@desc={0x1, 0x0, @desc2}}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000140)=',,\\\x00') futimesat(r3, &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0)={{0x0, 0xea60}}) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000680)=ANY=[@ANYBLOB="b00900000000000018000000468a29458f2709d329f6d3f3917408961482081d984538af2f9bcf61c448afbaa0be3f00000000000000ca4aa56fc413a417324e8530165c3515981e2d28f7fce9ae3c6bb8fa04ff6411132c9ced479abaeea325c2205ea95984d3d7f98eea1cca02dfeb0b2471b497fbb71b60180d35e2a3394ba6d965f41c7b7bc29d4e3ca95bd7ad074a4242ec98a69ad9d1546ce18cbbd98d2e50688e958a0fcd16876ab83cdb94eeb03e42203f267a1bf6ccb1c07ad92e6e493149da32f754251ae74d30cd4b50eefd6a208172ed8693b320eda714bdd152b484d9c939b4bb777dddd947843d73529f5ffe589777254cb10f733351e0739a3a61c3b8f977517ee7becda66da23a93e3be8ed63bda262951b32f72c1c48ee63be474eafaa255074efaa494b950f48b119c76c70b833e4d7443b691dc97bf78bcae908758ff1edaf2ad48dd67d0337c8ecfcd47e8ce5598c435f4645d719ae60a12c5b37ed2d45571c29ff6af1292ed2ff7fa24e2ab69f18db826044f35683810d2ee95f68f586a8922acdc225912820cdffe6ac29641f3c531a0eb1ddbf17341a05f3ee437f2a56a4a92af8ba2e413d00d05caab40963868dc00da000dfe8962927be81ca05afcc624225b2667a1208dd74e8bb6ced5e1da98f41bb3dedc31302fbf6ed40e9c526f82b53ce45e25e20ce9068bba911f0ec11403a35ff01cee623f71101155fcb646937ac714ac49741b4a1ffc6a72cba387bf41c1af2eeaa80a07631a22d366562924848da0f27c", @ANYRES32, @ANYBLOB="02000000000000006d6e742f656e637279707465645f6469722f2e2e2f66696c653000"]) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') 15:20:44 executing program 1: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, 0x0) syz_io_uring_setup(0x4382, &(0x7f0000000180)={0x0, 0xdff4, 0x0, 0x0, 0x69}, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000100)) syz_io_uring_setup(0x5575, &(0x7f0000000340)={0x0, 0xcdc7, 0x8, 0x2, 0x255}, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000000280), &(0x7f00000002c0)=0x0) syz_io_uring_submit(r0, r1, &(0x7f0000000300)=@IORING_OP_POLL_REMOVE={0x7, 0x1, 0x0, 0x0, 0x0, 0x23456}, 0x6) mount$bind(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x64000, 0x0) 15:20:44 executing program 5: ioctl$TCSETAW(0xffffffffffffffff, 0x4b4a, 0x0) 15:20:44 executing program 3: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCSBRKP(r0, 0x5425, 0x40994a) 15:20:44 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x4b4a, 0x0) 15:20:44 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x4b64, 0x0) 15:20:44 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x4020940d, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "bb09819e2f6e8485"}) 15:20:44 executing program 5: syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(0xffffffffffffffff, 0x4b4a, 0x0) 15:20:44 executing program 4: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1c08a4, 0x0) r1 = syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) open$dir(&(0x7f0000000200)='./mnt\x00', 0x40040, 0x10) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir/../file0\x00', 0x80, 0x0) r2 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x50008, 0x0, 0x10081, 0x0, 0x0, 0xfffffffb}, 0x0, 0x0, 0xffffffffffffffff, 0xb) r3 = openat(r1, &(0x7f0000000000)='mnt/encrypted_dir/../file0\x00', 0x40, 0x100) r4 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r4, 0x7, 0x0, 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r4, 0xc0406619, &(0x7f00000001c0)={@desc={0x1, 0x0, @desc2}}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000140)=',,\\\x00') futimesat(r3, &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0)={{0x0, 0xea60}}) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000680)=ANY=[@ANYBLOB="b00900000000000018000000468a29458f2709d329f6d3f3917408961482081d984538af2f9bcf61c448afbaa0be3f00000000000000ca4aa56fc413a417324e8530165c3515981e2d28f7fce9ae3c6bb8fa04ff6411132c9ced479abaeea325c2205ea95984d3d7f98eea1cca02dfeb0b2471b497fbb71b60180d35e2a3394ba6d965f41c7b7bc29d4e3ca95bd7ad074a4242ec98a69ad9d1546ce18cbbd98d2e50688e958a0fcd16876ab83cdb94eeb03e42203f267a1bf6ccb1c07ad92e6e493149da32f754251ae74d30cd4b50eefd6a208172ed8693b320eda714bdd152b484d9c939b4bb777dddd947843d73529f5ffe589777254cb10f733351e0739a3a61c3b8f977517ee7becda66da23a93e3be8ed63bda262951b32f72c1c48ee63be474eafaa255074efaa494b950f48b119c76c70b833e4d7443b691dc97bf78bcae908758ff1edaf2ad48dd67d0337c8ecfcd47e8ce5598c435f4645d719ae60a12c5b37ed2d45571c29ff6af1292ed2ff7fa24e2ab69f18db826044f35683810d2ee95f68f586a8922acdc225912820cdffe6ac29641f3c531a0eb1ddbf17341a05f3ee437f2a56a4a92af8ba2e413d00d05caab40963868dc00da000dfe8962927be81ca05afcc624225b2667a1208dd74e8bb6ced5e1da98f41bb3dedc31302fbf6ed40e9c526f82b53ce45e25e20ce9068bba911f0ec11403a35ff01cee623f71101155fcb646937ac714ac49741b4a1ffc6a72cba387bf41c1af2eeaa80a07631a22d366562924848da0f27c", @ANYRES32, @ANYBLOB="02000000000000006d6e742f656e637279707465645f6469722f2e2e2f66696c653000"]) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') 15:20:44 executing program 6: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, 0x0) mount$bind(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280), 0x2004, 0x0) mount$bind(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x64000, 0x0) mount$9p_unix(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000180), 0x44000, &(0x7f00000001c0)={'trans=unix,', {[{@privport}], [{@seclabel}, {@seclabel}]}}) 15:20:45 executing program 1: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, 0x0) mount$bind(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x64000, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100), &(0x7f0000000180), 0x2, 0x3) 15:21:00 executing program 3: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCSBRKP(r0, 0x5425, 0x40994a) 15:21:00 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x4b65, 0x0) 15:21:00 executing program 7: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x2a601, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000100), 0xa, 0x101180) ioctl$FS_IOC_GETVERSION(r1, 0x80087601, &(0x7f0000000080)) ioctl$TCSBRKP(r0, 0x5425, 0x994a) ioctl$FIONREAD(r0, 0x541b, &(0x7f00000000c0)) 15:21:00 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x402c542b, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "bb09819e2f6e8485"}) 15:21:00 executing program 6: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, 0x0) mount$bind(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280), 0x2004, 0x0) mount$bind(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x64000, 0x0) mount$9p_unix(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000180), 0x44000, &(0x7f00000001c0)={'trans=unix,', {[{@privport}], [{@seclabel}, {@seclabel}]}}) 15:21:00 executing program 4: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1c08a4, 0x0) r1 = syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) open$dir(&(0x7f0000000200)='./mnt\x00', 0x40040, 0x10) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir/../file0\x00', 0x80, 0x0) r2 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x50008, 0x0, 0x10081, 0x0, 0x0, 0xfffffffb}, 0x0, 0x0, 0xffffffffffffffff, 0xb) r3 = openat(r1, &(0x7f0000000000)='mnt/encrypted_dir/../file0\x00', 0x40, 0x100) r4 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r4, 0x7, 0x0, 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r4, 0xc0406619, &(0x7f00000001c0)={@desc={0x1, 0x0, @desc2}}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000140)=',,\\\x00') futimesat(r3, &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0)={{0x0, 0xea60}}) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000680)=ANY=[@ANYBLOB="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", @ANYRES32, @ANYBLOB="02000000000000006d6e742f656e637279707465645f6469722f2e2e2f66696c653000"]) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') 15:21:00 executing program 1: r0 = syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, 0x0) mount$bind(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x64000, 0x0) mkdirat(r0, &(0x7f0000000080)='./file0\x00', 0x1) 15:21:00 executing program 5: syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(0xffffffffffffffff, 0x4b4a, 0x0) 15:21:00 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x4b66, 0x0) 15:21:00 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x402c542c, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "bb09819e2f6e8485"}) 15:21:00 executing program 5: syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(0xffffffffffffffff, 0x4b4a, 0x0) 15:21:00 executing program 1: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='btrfs\x00', 0x0, 0x0) mount$bind(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x64000, 0x0) 15:21:00 executing program 6: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, 0x0) mount$bind(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280), 0x2004, 0x0) mount$9p_unix(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000180), 0x44000, &(0x7f00000001c0)={'trans=unix,', {[{@privport}], [{@seclabel}, {@seclabel}]}}) 15:21:00 executing program 4: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1c08a4, 0x0) r1 = syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) open$dir(&(0x7f0000000200)='./mnt\x00', 0x40040, 0x10) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir/../file0\x00', 0x80, 0x0) r2 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x50008, 0x0, 0x10081, 0x0, 0x0, 0xfffffffb}, 0x0, 0x0, 0xffffffffffffffff, 0xb) r3 = openat(r1, &(0x7f0000000000)='mnt/encrypted_dir/../file0\x00', 0x40, 0x100) r4 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r4, 0x7, 0x0, 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r4, 0xc0406619, &(0x7f00000001c0)={@desc={0x1, 0x0, @desc2}}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000140)=',,\\\x00') futimesat(r3, &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0)={{0x0, 0xea60}}) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000680)=ANY=[@ANYBLOB="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", @ANYRES32, @ANYBLOB="02000000000000006d6e742f656e637279707465645f6469722f2e2e2f66696c653000"]) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') 15:21:00 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x4b67, 0x0) 15:21:00 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x402c542d, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "bb09819e2f6e8485"}) 15:21:14 executing program 3: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCSBRKP(r0, 0x5425, 0x40994a) 15:21:14 executing program 7: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = ioctl$TIOCGPTPEER(r0, 0x5441, 0x8000) r2 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r2, 0x7, 0x0, 0x0, 0x0) fcntl$dupfd(r1, 0x0, r0) r3 = syz_io_uring_complete(0x0) ioctl$TCSBRKP(r3, 0x5425, 0x5) 15:21:14 executing program 6: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, 0x0) mount$9p_unix(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000180), 0x44000, &(0x7f00000001c0)={'trans=unix,', {[{@privport}], [{@seclabel}, {@seclabel}]}}) 15:21:14 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x4b68, 0x0) 15:21:14 executing program 1: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x42, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, 0x0) mount$bind(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x64000, 0x0) 15:21:14 executing program 4: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1c08a4, 0x0) r1 = syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) open$dir(&(0x7f0000000200)='./mnt\x00', 0x40040, 0x10) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir/../file0\x00', 0x80, 0x0) r2 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x50008, 0x0, 0x10081, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat(r1, &(0x7f0000000000)='mnt/encrypted_dir/../file0\x00', 0x40, 0x100) r4 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r4, 0x7, 0x0, 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r4, 0xc0406619, &(0x7f00000001c0)={@desc={0x1, 0x0, @desc2}}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000140)=',,\\\x00') futimesat(r3, &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0)={{0x0, 0xea60}}) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000680)=ANY=[@ANYBLOB="b00900000000000018000000468a29458f2709d329f6d3f3917408961482081d984538af2f9bcf61c448afbaa0be3f00000000000000ca4aa56fc413a417324e8530165c3515981e2d28f7fce9ae3c6bb8fa04ff6411132c9ced479abaeea325c2205ea95984d3d7f98eea1cca02dfeb0b2471b497fbb71b60180d35e2a3394ba6d965f41c7b7bc29d4e3ca95bd7ad074a4242ec98a69ad9d1546ce18cbbd98d2e50688e958a0fcd16876ab83cdb94eeb03e42203f267a1bf6ccb1c07ad92e6e493149da32f754251ae74d30cd4b50eefd6a208172ed8693b320eda714bdd152b484d9c939b4bb777dddd947843d73529f5ffe589777254cb10f733351e0739a3a61c3b8f977517ee7becda66da23a93e3be8ed63bda262951b32f72c1c48ee63be474eafaa255074efaa494b950f48b119c76c70b833e4d7443b691dc97bf78bcae908758ff1edaf2ad48dd67d0337c8ecfcd47e8ce5598c435f4645d719ae60a12c5b37ed2d45571c29ff6af1292ed2ff7fa24e2ab69f18db826044f35683810d2ee95f68f586a8922acdc225912820cdffe6ac29641f3c531a0eb1ddbf17341a05f3ee437f2a56a4a92af8ba2e413d00d05caab40963868dc00da000dfe8962927be81ca05afcc624225b2667a1208dd74e8bb6ced5e1da98f41bb3dedc31302fbf6ed40e9c526f82b53ce45e25e20ce9068bba911f0ec11403a35ff01cee623f71101155fcb646937ac714ac49741b4a1ffc6a72cba387bf41c1af2eeaa80a07631a22d366562924848da0f27c", @ANYRES32, @ANYBLOB="02000000000000006d6e742f656e637279707465645f6469722f2e2e2f66696c653000"]) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') 15:21:14 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x80045432, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "bb09819e2f6e8485"}) 15:21:14 executing program 5: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x2a601, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000100), 0xa, 0x101180) ioctl$FS_IOC_GETVERSION(r1, 0x80087601, &(0x7f0000000080)) ioctl$TCSBRKP(r0, 0x5425, 0x994a) ioctl$FIONREAD(r0, 0x541b, &(0x7f00000000c0)) 15:21:15 executing program 7: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x412040, 0x0) fcntl$setstatus(r0, 0x4, 0x4000) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000040)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file0\x00'}) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f0000001680)=0x10001) r2 = syz_mount_image$nfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x9, 0x7, &(0x7f0000001500)=[{&(0x7f0000000100)="71a818feffaf159284eb8d5211d071effb89542d72454f3f724df421949c16cc0d9df365abef71e6a053aebe3aa9863a45eb4f4f95c23bd9100325a8b072c36ba3a4149472a82376536efa6febb2cbe965fad2ca1ef93ca87935a3c05e14e46275277ac0b08eb78c066ba9e5fe8b58f8da5a84c67f9d52d841d2d7a7f4e94195a0dc0cada273b654e137715774d075f8c3300a08c9960544316c3c98fccdf078", 0xa0, 0x5}, {&(0x7f00000001c0)="0d7bcb8bb5c48a0aa8967bbec5b9c0935b3cb38abff0d730cdea764139cc14965111b61a93020921473cd1c43bea2c9120b6e7728797c9efb4c1ead71d831af4b86898a0b9e509c5668a930c80ba1b16da801e0b6db63e28868808e94fa8c03ee8e18544ac0fe8542413aba538b9c6bcae171f04d759857500ed2a135b3497f1175ed256629451b1e4c3ba64fccdb03444b3c34f764d6351c3de43129e4f73ac", 0xa0, 0x8}, {&(0x7f0000000280)="a5", 0x1, 0x3}, {&(0x7f00000002c0)="b5da2592a6749a36a00f7acf8e8d3e4ee63837e7b33b1eedfcc7d8b53e848ff93a3bb10b3291434bb83c5c1f28b6df96b6fab692bf862d840171b836c4bc1cb5d4170d30676e9e58b6428860960911d2ed3c95e19aa632cd9e2c95ee1865129312a0317e4ab4db25c9c83a371f9b023935c37394f17d57faee32cf2befe778b49eeb8dae88ad0368e6915b42f4d8a1846abc92404e856efef17fc613846260846eb2baca720fbbd4a27075202e03653816bd20f3bf46198d94379e3f18fbae41d8", 0xc1, 0x40}, {&(0x7f00000003c0)="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", 0x1000, 0x1}, {&(0x7f00000013c0)="2ebed9870ccfa532d672405e2f1b66a9a7d9a29102494ac1f1cc22eccd5397c8311babf4a7d9c386c93c60cca82a4801ede2ad947a3617e8dd7eca63315f2f3688bcc3ae740adacdfa9d424c28ae15aff8290a43f66223507e579cb6aa864f58f7c9699c4094f820fd3428efc3d9dbde249a49ac17ad", 0x76, 0x4}, {&(0x7f0000001440)="75ae76bbe6c433ff3fae90769969739b04b6b7cffaa92b0f101a5536474d03dceee791f185fc02a31c833c1cb94a559a6a5c78027dba79ad46740abf1141efd90ccb62925a049cc952133e6e8fa68db5274963fd33806c46c3771c5a948831f1805f4655af7494c928ec34187ed3a3f3ea5280dc30c44882aa283e3cec6c59c46375722acb58e7f57900847a35def9da9fa54827b35ed98217414e9b108696452ceaabf22680dc5e74", 0xa9, 0x7}], 0x848004, &(0x7f00000015c0)=ANY=[@ANYBLOB="7569803e", @ANYRESDEC=0x0, @ANYBLOB=',smackfshat=/dev/ttyS3\x00,euid>', @ANYRESDEC, @ANYBLOB=',\x00']) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f0000001640)=[r2], 0x1) ioctl$TCSBRKP(r0, 0x5425, 0x9948) 15:21:15 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x4b69, 0x0) [ 957.328500] loop7: detected capacity change from 0 to 4096 [ 957.340517] loop7: detected capacity change from 0 to 4096 15:21:15 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x80045440, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "bb09819e2f6e8485"}) 15:21:15 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x4b6a, 0x0) 15:21:15 executing program 6: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000180), 0x44000, &(0x7f00000001c0)={'trans=unix,', {[{@privport}], [{@seclabel}, {@seclabel}]}}) 15:21:15 executing program 1: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='nfsd\x00', 0x0, 0x0) mount$bind(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x64000, 0x0) 15:21:15 executing program 4: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1c08a4, 0x0) r1 = syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) open$dir(&(0x7f0000000200)='./mnt\x00', 0x40040, 0x10) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir/../file0\x00', 0x80, 0x0) r2 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x50008, 0x0, 0x10081, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat(r1, &(0x7f0000000000)='mnt/encrypted_dir/../file0\x00', 0x40, 0x100) r4 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r4, 0x7, 0x0, 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r4, 0xc0406619, &(0x7f00000001c0)={@desc={0x1, 0x0, @desc2}}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000140)=',,\\\x00') futimesat(r3, &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0)={{0x0, 0xea60}}) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000680)=ANY=[@ANYBLOB="b00900000000000018000000468a29458f2709d329f6d3f3917408961482081d984538af2f9bcf61c448afbaa0be3f00000000000000ca4aa56fc413a417324e8530165c3515981e2d28f7fce9ae3c6bb8fa04ff6411132c9ced479abaeea325c2205ea95984d3d7f98eea1cca02dfeb0b2471b497fbb71b60180d35e2a3394ba6d965f41c7b7bc29d4e3ca95bd7ad074a4242ec98a69ad9d1546ce18cbbd98d2e50688e958a0fcd16876ab83cdb94eeb03e42203f267a1bf6ccb1c07ad92e6e493149da32f754251ae74d30cd4b50eefd6a208172ed8693b320eda714bdd152b484d9c939b4bb777dddd947843d73529f5ffe589777254cb10f733351e0739a3a61c3b8f977517ee7becda66da23a93e3be8ed63bda262951b32f72c1c48ee63be474eafaa255074efaa494b950f48b119c76c70b833e4d7443b691dc97bf78bcae908758ff1edaf2ad48dd67d0337c8ecfcd47e8ce5598c435f4645d719ae60a12c5b37ed2d45571c29ff6af1292ed2ff7fa24e2ab69f18db826044f35683810d2ee95f68f586a8922acdc225912820cdffe6ac29641f3c531a0eb1ddbf17341a05f3ee437f2a56a4a92af8ba2e413d00d05caab40963868dc00da000dfe8962927be81ca05afcc624225b2667a1208dd74e8bb6ced5e1da98f41bb3dedc31302fbf6ed40e9c526f82b53ce45e25e20ce9068bba911f0ec11403a35ff01cee623f71101155fcb646937ac714ac49741b4a1ffc6a72cba387bf41c1af2eeaa80a07631a22d366562924848da0f27c", @ANYRES32, @ANYBLOB="02000000000000006d6e742f656e637279707465645f6469722f2e2e2f66696c653000"]) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') 15:21:15 executing program 7: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcsu(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x4800) ioctl$TIOCL_SCROLLCONSOLE(r1, 0x541c, &(0x7f0000000140)={0xd, 0x9}) r2 = openat$incfs(r1, &(0x7f0000000180)='.log\x00', 0x218001, 0x131) r3 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r3, 0x7, 0x0, 0x0, 0x0) r4 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fcntl$dupfd(r4, 0x406, r0) ioctl$TIOCL_SCROLLCONSOLE(r2, 0x541c, &(0x7f0000000200)={0xd, 0x1}) fsconfig$FSCONFIG_CMD_RECONFIGURE(r4, 0x7, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000000)={{0x2, 0x0, @local}, {0x0, @local}, 0x20, {0x2, 0x0, @local}, 'dummy0\x00'}) r5 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r5, 0x81f8943c, &(0x7f0000000640)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0}) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(0xffffffffffffffff, 0x5000943f, &(0x7f0000000840)={{}, r6, 0x4, @inherit={0x80, &(0x7f0000000080)=ANY=[@ANYBLOB="010000000024a5000700000000000000b26e9690f7fad59a03000000cd000000000000000000000000000000000000a580040000030000b664f17b03000000000000007eacf3177c4830daa39375770000ffff000000000000010000800000000809000000000000000800000000000000040000000000000004000008000000"]}, @devid}) ioctl$BTRFS_IOC_SNAP_CREATE_V2(0xffffffffffffffff, 0x50009417, &(0x7f0000000240)={{}, r6, 0x8, @unused=[0x8, 0x3, 0xdfab, 0x6], @name="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"}) r7 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r7, 0x7, 0x0, 0x0, 0x0) ioctl$TIOCSTI(r7, 0x5412, &(0x7f00000000c0)=0x82) ioctl$TCSBRKP(r0, 0x5425, 0x994a) 15:21:31 executing program 7: sendmsg$NL80211_CMD_SET_QOS_MAP(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000080)={0x8c, 0x0, 0x800, 0x70bd2c, 0x25dfdbff, {{}, {@void, @void}}, [@NL80211_ATTR_QOS_MAP={0x28, 0xc7, {[{0x4, 0x3}, {0xff, 0x5}, {0x80, 0x3}, {0x80, 0x6}, {0x4, 0x1}, {0x5, 0x2}, {0x9, 0x7}, {0x8}, {0x8, 0x1}, {0x7f, 0x5}, {0x9, 0x2}, {0x4, 0x2}, {0x20}, {0x4a, 0x4}], "5df5a1c4fafc8e5e"}}, @NL80211_ATTR_QOS_MAP={0x28, 0xc7, {[{0x3, 0x1}, {0x4c, 0x7}, {0x2, 0x1}, {0x40}, {0x7, 0x4}, {0x2, 0x7}, {0x9, 0x1}, {0x78, 0x2}, {0xff, 0x1}, {0x1, 0x5}, {0x6, 0x7}, {0xc7}, {0x7, 0x5}, {0x20, 0x1}], "ee0a1eaeaa52087a"}}, @NL80211_ATTR_QOS_MAP={0x26, 0xc7, {[{0x0, 0x7}, {0x3c, 0x5}, {0x9}, {0x5, 0x1}, {0xff, 0x4}, {0x1f, 0x1}, {0x20, 0x1}, {0x2e, 0x1}, {0x9, 0x5}, {0x7f, 0x1}, {0x1f}, {0x1, 0x1}, {0x3, 0x1}], "0f894af7789c88df"}}]}, 0x8c}, 0x1, 0x0, 0x0, 0x89084}, 0x40) r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCSBRKP(r0, 0x5425, 0x994a) 15:21:31 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x80086601, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "bb09819e2f6e8485"}) 15:21:31 executing program 6: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000180), 0x44000, &(0x7f00000001c0)={'trans=unix,', {[{@privport}], [{@seclabel}, {@seclabel}]}}) 15:21:31 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x4b70, 0x0) 15:21:31 executing program 5: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x2a601, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000100), 0xa, 0x101180) ioctl$FS_IOC_GETVERSION(r1, 0x80087601, &(0x7f0000000080)) ioctl$TCSBRKP(r0, 0x5425, 0x994a) ioctl$FIONREAD(r0, 0x541b, &(0x7f00000000c0)) 15:21:31 executing program 4: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1c08a4, 0x0) r1 = syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) open$dir(&(0x7f0000000200)='./mnt\x00', 0x40040, 0x10) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir/../file0\x00', 0x80, 0x0) r2 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x50008, 0x0, 0x10081, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat(r1, &(0x7f0000000000)='mnt/encrypted_dir/../file0\x00', 0x40, 0x100) r4 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r4, 0x7, 0x0, 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r4, 0xc0406619, &(0x7f00000001c0)={@desc={0x1, 0x0, @desc2}}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000140)=',,\\\x00') futimesat(r3, &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0)={{0x0, 0xea60}}) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000680)=ANY=[@ANYBLOB="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", @ANYRES32, @ANYBLOB="02000000000000006d6e742f656e637279707465645f6469722f2e2e2f66696c653000"]) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') 15:21:31 executing program 1: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0xc8, 0x0, 0x0, 0x1000430, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, 0x0) mount$bind(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x64000, 0x0) 15:21:31 executing program 3: ioctl$TCSBRKP(0xffffffffffffffff, 0x5425, 0x40994a) 15:21:31 executing program 1: mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, 0x0) mount$bind(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x64000, 0x0) 15:21:31 executing program 6: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000180), 0x44000, &(0x7f00000001c0)={'trans=unix,', {[{@privport}], [{@seclabel}, {@seclabel}]}}) 15:21:31 executing program 3: ioctl$TCSBRKP(0xffffffffffffffff, 0x5425, 0x40994a) 15:21:31 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x4b71, 0x0) 15:21:31 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x80087601, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "bb09819e2f6e8485"}) 15:21:31 executing program 4: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1c08a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) open$dir(&(0x7f0000000200)='./mnt\x00', 0x40040, 0x10) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir/../file0\x00', 0x80, 0x0) r1 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x50008, 0x0, 0x10081, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='mnt/encrypted_dir/../file0\x00', 0x40, 0x100) r3 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r3, 0x7, 0x0, 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r3, 0xc0406619, &(0x7f00000001c0)={@desc={0x1, 0x0, @desc2}}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000140)=',,\\\x00') futimesat(r2, &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0)={{0x0, 0xea60}}) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000680)=ANY=[@ANYBLOB="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", @ANYRES32, @ANYBLOB="02000000000000006d6e742f656e637279707465645f6469722f2e2e2f66696c653000"]) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') 15:21:31 executing program 1: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r0, 0x7, 0x0, 0x0, 0x0) mkdirat(r0, &(0x7f0000000000)='./file0\x00', 0x25e) mount$bind(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x64000, 0x0) 15:21:31 executing program 6: mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, 0x0) mount$9p_unix(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000180), 0x44000, &(0x7f00000001c0)={'trans=unix,', {[{@privport}], [{@seclabel}, {@seclabel}]}}) 15:21:45 executing program 3: ioctl$TCSBRKP(0xffffffffffffffff, 0x5425, 0x40994a) 15:21:45 executing program 7: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCSBRKP(r0, 0x5425, 0x994a) ioctl$KDGKBTYPE(r0, 0x4b33, &(0x7f0000000040)) 15:21:45 executing program 5: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x2a601, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000100), 0xa, 0x101180) ioctl$FS_IOC_GETVERSION(r1, 0x80087601, &(0x7f0000000080)) ioctl$TCSBRKP(r0, 0x5425, 0x994a) ioctl$FIONREAD(r0, 0x541b, &(0x7f00000000c0)) 15:21:45 executing program 4: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1c08a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) open$dir(&(0x7f0000000200)='./mnt\x00', 0x40040, 0x10) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir/../file0\x00', 0x80, 0x0) r1 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x50008, 0x0, 0x10081, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='mnt/encrypted_dir/../file0\x00', 0x40, 0x100) r3 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r3, 0x7, 0x0, 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r3, 0xc0406619, &(0x7f00000001c0)={@desc={0x1, 0x0, @desc2}}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000140)=',,\\\x00') futimesat(r2, &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0)={{0x0, 0xea60}}) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000680)=ANY=[@ANYBLOB="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", @ANYRES32, @ANYBLOB="02000000000000006d6e742f656e637279707465645f6469722f2e2e2f66696c653000"]) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') 15:21:45 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x4b72, 0x0) 15:21:45 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x802c542a, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "bb09819e2f6e8485"}) 15:21:45 executing program 1: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x0, 0x0, 0x1001400, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, 0x0) mount$bind(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x64000, 0x0) 15:21:45 executing program 6: mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, 0x0) mount$9p_unix(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000180), 0x44000, &(0x7f00000001c0)={'trans=unix,', {[{@privport}], [{@seclabel}, {@seclabel}]}}) 15:21:45 executing program 4: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1c08a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) open$dir(&(0x7f0000000200)='./mnt\x00', 0x40040, 0x10) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir/../file0\x00', 0x80, 0x0) r1 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x50008, 0x0, 0x10081, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='mnt/encrypted_dir/../file0\x00', 0x40, 0x100) r3 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r3, 0x7, 0x0, 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r3, 0xc0406619, &(0x7f00000001c0)={@desc={0x1, 0x0, @desc2}}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000140)=',,\\\x00') futimesat(r2, &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0)={{0x0, 0xea60}}) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000680)=ANY=[@ANYBLOB="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", @ANYRES32, @ANYBLOB="02000000000000006d6e742f656e637279707465645f6469722f2e2e2f66696c653000"]) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') 15:21:45 executing program 3: r0 = openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSBRKP(r0, 0x5425, 0x40994a) 15:21:45 executing program 6: mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, 0x0) mount$9p_unix(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000180), 0x44000, &(0x7f00000001c0)={'trans=unix,', {[{@privport}], [{@seclabel}, {@seclabel}]}}) 15:21:45 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x4bfa, 0x0) 15:21:45 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0xc0045878, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "bb09819e2f6e8485"}) 15:21:45 executing program 1: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, 0x0) mount$bind(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x64000, 0x0) recvmmsg$unix(0xffffffffffffffff, &(0x7f0000003180)=[{{&(0x7f00000001c0)=@abs, 0x6e, &(0x7f0000000480)=[{&(0x7f0000000240)=""/153, 0x99}, {&(0x7f0000000300)=""/71, 0x47}, {&(0x7f0000000380)=""/252, 0xfc}], 0x3, &(0x7f00000034c0)=ANY=[@ANYBLOB="1c00000000000000018ea78500000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00'], 0x60}}, {{&(0x7f0000000540), 0x6e, &(0x7f0000001680)=[{&(0x7f00000005c0)=""/4096, 0x1000}, {&(0x7f00000015c0)=""/157, 0x9d}], 0x2, &(0x7f00000016c0)=[@rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x20}}, {{&(0x7f0000001700), 0x6e, &(0x7f0000001ac0)=[{&(0x7f0000001780)=""/25, 0x19}, {&(0x7f00000017c0)=""/30, 0x1e}, {&(0x7f0000001800)}, {&(0x7f0000001840)=""/76, 0x4c}, {&(0x7f00000018c0)=""/161, 0xa1}, {&(0x7f0000001980)=""/154, 0x9a}, {&(0x7f0000001a40)=""/80, 0x50}], 0x7}}, {{&(0x7f0000001b40), 0x6e, &(0x7f0000002cc0)=[{&(0x7f0000001bc0)=""/4096, 0x1000}, {&(0x7f0000002bc0)=""/173, 0xad}, {&(0x7f0000002c80)=""/14, 0xe}], 0x3, &(0x7f0000002d00)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{0x0, 0x0, &(0x7f0000003040)=[{&(0x7f0000002d40)=""/119, 0x77}, {&(0x7f0000002dc0)=""/233, 0xe9}, {&(0x7f0000002ec0)=""/64, 0x40}, {&(0x7f0000002f00)=""/25, 0x19}, {&(0x7f0000002f40)}, {&(0x7f0000002f80)=""/118, 0x76}, {&(0x7f0000003000)=""/9, 0x9}], 0x7, &(0x7f00000030c0)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0x0}}}], 0xb0}}], 0x5, 0x11000, &(0x7f00000032c0)={0x77359400}) mount$9p_tcp(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', &(0x7f0000000180), 0x4020, &(0x7f0000003300)={'trans=tcp,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@nodevmap}, {@dfltgid={'dfltgid', 0x3d, r1}}, {@nodevmap}, {@cache_none}, {@privport}, {@msize={'msize', 0x3d, 0x5}}, {@mmap}, {@debug={'debug', 0x3d, 0x9}}, {@posixacl}, {@privport}], [{@obj_user={'obj_user', 0x3d, '@},'}}]}}) stat(&(0x7f0000000000)='.\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r2, 0x0) mount$cgroup2(0x0, &(0x7f0000001800)='./file0\x00', &(0x7f0000002f40), 0x0, &(0x7f00000033c0)={[{@subsystem='rlimit'}], [{@euid_eq={'euid', 0x3d, r2}}, {@fsmagic={'fsmagic', 0x3d, 0x2}}, {@smackfsdef={'smackfsdef', 0x3d, 'nodevmap'}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@obj_user={'obj_user', 0x3d, '[+$j'}}, {@obj_role={'obj_role', 0x3d, 'cache=none'}}, {@fowner_lt={'fowner<', r0}}, {@appraise}, {@smackfshat={'smackfshat', 0x3d, '\x1b'}}, {@smackfshat={'smackfshat', 0x3d, '}&-'}}]}) 15:21:45 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x4bfb, 0x0) 15:21:45 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0xc0045878, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "bb09819e2f6e8485"}) [ 987.652806] proc: Unknown parameter 'trans' [ 987.660424] proc: Unknown parameter 'trans' 15:22:00 executing program 4: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1c08a4, 0x0) r1 = syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) open$dir(&(0x7f0000000200)='./mnt\x00', 0x40040, 0x10) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir/../file0\x00', 0x80, 0x0) r2 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x50008, 0x0, 0x10081, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r3 = openat(r1, 0x0, 0x40, 0x100) r4 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r4, 0x7, 0x0, 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r4, 0xc0406619, &(0x7f00000001c0)={@desc={0x1, 0x0, @desc2}}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000140)=',,\\\x00') futimesat(r3, &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0)={{0x0, 0xea60}}) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000680)=ANY=[@ANYBLOB="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", @ANYRES32, @ANYBLOB="02000000000000006d6e742f656e637279707465645f6469722f2e2e2f66696c653000"]) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') 15:22:00 executing program 3: r0 = openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSBRKP(r0, 0x5425, 0x40994a) 15:22:00 executing program 6: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, 0x0) mount$9p_unix(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000180), 0x44000, &(0x7f00000001c0)={'trans=unix,', {[{@privport}], [{@seclabel}, {@seclabel}]}}) 15:22:00 executing program 7: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x40001, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$inet(0x2, 0x3, 0x6) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r2, 0x400c6615, &(0x7f0000000240)={0x0, @adiantum, 0x0, @desc3}) r3 = dup2(r1, r0) r4 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000080), 0xffffffffffffffff) ioctl$sock_ipv6_tunnel_SIOCADDPRL(0xffffffffffffffff, 0x89f5, &(0x7f0000000140)={'syztnl1\x00', &(0x7f00000000c0)={'syztnl2\x00', 0x0, 0x29, 0x0, 0x2, 0x101, 0x6, @private1, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x8020, 0x7800, 0x101, 0x901}}) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(0xffffffffffffffff, 0x89fb, &(0x7f0000000200)={'ip6tnl0\x00', &(0x7f0000000180)={'ip6gre0\x00', 0x0, 0x2f, 0xff, 0x5, 0x1, 0x1a, @local, @ipv4={'\x00', '\xff\xff', @remote}, 0x1, 0x40, 0x4, 0x8}}) r6 = accept4$inet6(r3, &(0x7f0000000380)={0xa, 0x0, 0x0, @mcast2}, &(0x7f00000003c0)=0x1c, 0x80000) r7 = syz_open_dev$evdev(&(0x7f0000000280), 0x20, 0x80000) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r7, 0x8010661b, &(0x7f00000002c0)) read(r6, &(0x7f0000000400)=""/130, 0x82) r8 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r8, 0x8933, &(0x7f0000000000)={'wlan1\x00', 0x0}) setsockopt$packet_add_memb(r8, 0x107, 0x1, &(0x7f0000000080)={r9, 0x3, 0x6, @multicast}, 0x10) sendmsg$ETHTOOL_MSG_LINKINFO_GET(r1, &(0x7f0000000340)={&(0x7f0000000040), 0xc, &(0x7f0000000300)={&(0x7f0000000680)={0xfc, r4, 0x400, 0x70bd25, 0x25dfdbfe, {}, [@HEADER={0x58, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'team_slave_0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}]}, @HEADER={0x90, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r9}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_vlan\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'gre0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_vlan\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macvlan1\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_team\x00'}]}]}, 0xfc}, 0x1, 0x0, 0x0, 0x20000000}, 0x4800) r10 = openat$cgroup_ro(r3, &(0x7f00000004c0)='blkio.throttle.io_service_bytes\x00', 0x0, 0x0) ioctl$SNAPSHOT_UNFREEZE(r10, 0x3302) r11 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCSBRKP(r11, 0x5425, 0x4) 15:22:00 executing program 5: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x2a601, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000100), 0xa, 0x101180) ioctl$FS_IOC_GETVERSION(r1, 0x80087601, &(0x7f0000000080)) ioctl$TCSBRKP(r0, 0x5425, 0x994a) 15:22:00 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x5409, 0x0) 15:22:00 executing program 1: prctl$PR_CAP_AMBIENT(0x2f, 0x1, 0x20) r0 = syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x401, 0x0, 0x0, 0x0, 0x0) unlinkat(r0, &(0x7f0000000080)='./file0\x00', 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCSARP(r1, 0x8955, &(0x7f0000000000)={{0x2, 0x0, @local}, {0x0, @local}, 0x20, {0x2, 0x0, @local}, 'dummy0\x00'}) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, &(0x7f0000000100)={0xa0000004}) connect$inet(r1, &(0x7f0000000180)={0x2, 0x4e21, @broadcast}, 0x10) mount$bind(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x64000, 0x0) 15:22:00 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0xc0189436, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "bb09819e2f6e8485"}) [ 1002.556426] device wlan1 entered promiscuous mode 15:22:00 executing program 4: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1c08a4, 0x0) r1 = syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) open$dir(&(0x7f0000000200)='./mnt\x00', 0x40040, 0x10) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir/../file0\x00', 0x80, 0x0) r2 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x50008, 0x0, 0x10081, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r3 = openat(r1, 0x0, 0x40, 0x100) r4 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r4, 0x7, 0x0, 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r4, 0xc0406619, &(0x7f00000001c0)={@desc={0x1, 0x0, @desc2}}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000140)=',,\\\x00') futimesat(r3, &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0)={{0x0, 0xea60}}) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000680)=ANY=[@ANYBLOB="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", @ANYRES32, @ANYBLOB="02000000000000006d6e742f656e637279707465645f6469722f2e2e2f66696c653000"]) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') 15:22:00 executing program 6: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, 0x0) mount$9p_unix(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000180), 0x44000, &(0x7f00000001c0)={'trans=unix,', {[{@privport}], [{@seclabel}, {@seclabel}]}}) 15:22:00 executing program 3: r0 = openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSBRKP(r0, 0x5425, 0x40994a) 15:22:00 executing program 1: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='v7\x00', 0x310080c, 0x0) mount$bind(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x64000, 0x0) 15:22:00 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x540b, 0x0) 15:22:00 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0xc020660b, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "bb09819e2f6e8485"}) [ 1003.372319] device wlan1 left promiscuous mode [ 1003.385429] device wlan1 entered promiscuous mode [ 1003.397994] device wlan1 left promiscuous mode 15:22:14 executing program 3: openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCSBRKP(0xffffffffffffffff, 0x5425, 0x40994a) 15:22:14 executing program 7: ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000040)) r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCSBRKP(r0, 0x5425, 0x994a) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r1, 0x7, 0x0, 0x0, 0x0) ioctl$TIOCSTI(r1, 0x5412, &(0x7f0000000080)=0x77) 15:22:14 executing program 5: openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x2a601, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000100), 0xa, 0x101180) ioctl$FS_IOC_GETVERSION(r0, 0x80087601, &(0x7f0000000080)) 15:22:14 executing program 1: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) bind(0xffffffffffffffff, &(0x7f0000000180)=@vsock={0x28, 0x0, 0x1388, @host}, 0x80) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, 0x0) mount$bind(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x64000, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x149000, 0x20) 15:22:14 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x540c, 0x0) 15:22:14 executing program 6: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, 0x0) mount$9p_unix(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000180), 0x44000, &(0x7f00000001c0)={'trans=unix,', {[{@privport}], [{@seclabel}, {@seclabel}]}}) 15:22:14 executing program 4: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1c08a4, 0x0) r1 = syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) open$dir(&(0x7f0000000200)='./mnt\x00', 0x40040, 0x10) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir/../file0\x00', 0x80, 0x0) r2 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x50008, 0x0, 0x10081, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r3 = openat(r1, 0x0, 0x40, 0x100) r4 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r4, 0x7, 0x0, 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r4, 0xc0406619, &(0x7f00000001c0)={@desc={0x1, 0x0, @desc2}}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000140)=',,\\\x00') futimesat(r3, &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0)={{0x0, 0xea60}}) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000680)=ANY=[@ANYBLOB="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", @ANYRES32, @ANYBLOB="02000000000000006d6e742f656e637279707465645f6469722f2e2e2f66696c653000"]) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') 15:22:14 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x5407, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "bb09819e2f6e8485"}) 15:22:15 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x540d, 0x0) 15:22:15 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x5407, &(0x7f0000000080)={0x10, 0x0, 0x0, 0x0, 0x0, "bb09819e2f6e8485"}) 15:22:15 executing program 3: openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCSBRKP(0xffffffffffffffff, 0x5425, 0x40994a) 15:22:15 executing program 5: openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x2a601, 0x0) syz_open_dev$sg(&(0x7f0000000100), 0xa, 0x101180) 15:22:15 executing program 6: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, 0x0, &(0x7f0000000040)='proc\x00', 0x0, 0x0) mount$9p_unix(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000180), 0x44000, &(0x7f00000001c0)={'trans=unix,', {[{@privport}], [{@seclabel}, {@seclabel}]}}) 15:22:15 executing program 1: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$bind(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x64000, 0x0) r0 = accept4$unix(0xffffffffffffffff, &(0x7f0000000000)=@abs, &(0x7f0000000080)=0x6e, 0x80000) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000400)=@IORING_OP_RECVMSG={0xa, 0x2, 0x0, r0, 0x0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000240)=""/13, 0xd}, {&(0x7f0000000280)=""/108, 0x6c}], 0x2, &(0x7f0000000340)=""/112, 0x70}, 0x0, 0x40008003, 0x1, {0x2}}, 0x3) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000200)=@IORING_OP_ACCEPT={0xd, 0x0, 0x0, r0, &(0x7f0000000100)=0x80, &(0x7f0000000180)=@l2tp6, 0x0, 0x0, 0x1}, 0x6) 15:22:15 executing program 4: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1c08a4, 0x0) r1 = syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) open$dir(&(0x7f0000000200)='./mnt\x00', 0x40040, 0x10) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir/../file0\x00', 0x80, 0x0) r2 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x50008, 0x0, 0x10081, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r3 = openat(r1, &(0x7f0000000000)='mnt/encrypted_dir/../file0\x00', 0x0, 0x100) r4 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r4, 0x7, 0x0, 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r4, 0xc0406619, &(0x7f00000001c0)={@desc={0x1, 0x0, @desc2}}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000140)=',,\\\x00') futimesat(r3, &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0)={{0x0, 0xea60}}) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000680)=ANY=[@ANYBLOB="b00900000000000018000000468a29458f2709d329f6d3f3917408961482081d984538af2f9bcf61c448afbaa0be3f00000000000000ca4aa56fc413a417324e8530165c3515981e2d28f7fce9ae3c6bb8fa04ff6411132c9ced479abaeea325c2205ea95984d3d7f98eea1cca02dfeb0b2471b497fbb71b60180d35e2a3394ba6d965f41c7b7bc29d4e3ca95bd7ad074a4242ec98a69ad9d1546ce18cbbd98d2e50688e958a0fcd16876ab83cdb94eeb03e42203f267a1bf6ccb1c07ad92e6e493149da32f754251ae74d30cd4b50eefd6a208172ed8693b320eda714bdd152b484d9c939b4bb777dddd947843d73529f5ffe589777254cb10f733351e0739a3a61c3b8f977517ee7becda66da23a93e3be8ed63bda262951b32f72c1c48ee63be474eafaa255074efaa494b950f48b119c76c70b833e4d7443b691dc97bf78bcae908758ff1edaf2ad48dd67d0337c8ecfcd47e8ce5598c435f4645d719ae60a12c5b37ed2d45571c29ff6af1292ed2ff7fa24e2ab69f18db826044f35683810d2ee95f68f586a8922acdc225912820cdffe6ac29641f3c531a0eb1ddbf17341a05f3ee437f2a56a4a92af8ba2e413d00d05caab40963868dc00da000dfe8962927be81ca05afcc624225b2667a1208dd74e8bb6ced5e1da98f41bb3dedc31302fbf6ed40e9c526f82b53ce45e25e20ce9068bba911f0ec11403a35ff01cee623f71101155fcb646937ac714ac49741b4a1ffc6a72cba387bf41c1af2eeaa80a07631a22d366562924848da0f27c", @ANYRES32, @ANYBLOB="02000000000000006d6e742f656e637279707465645f6469722f2e2e2f66696c653000"]) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') 15:22:15 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x540e, 0x0) 15:22:29 executing program 4: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1c08a4, 0x0) r1 = syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) open$dir(&(0x7f0000000200)='./mnt\x00', 0x40040, 0x10) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir/../file0\x00', 0x80, 0x0) r2 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x50008, 0x0, 0x10081, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r3 = openat(r1, &(0x7f0000000000)='mnt/encrypted_dir/../file0\x00', 0x0, 0x100) r4 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r4, 0x7, 0x0, 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r4, 0xc0406619, &(0x7f00000001c0)={@desc={0x1, 0x0, @desc2}}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000140)=',,\\\x00') futimesat(r3, &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0)={{0x0, 0xea60}}) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000680)=ANY=[@ANYBLOB="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", @ANYRES32, @ANYBLOB="02000000000000006d6e742f656e637279707465645f6469722f2e2e2f66696c653000"]) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') 15:22:29 executing program 6: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, 0x0, &(0x7f0000000040)='proc\x00', 0x0, 0x0) mount$9p_unix(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000180), 0x44000, &(0x7f00000001c0)={'trans=unix,', {[{@privport}], [{@seclabel}, {@seclabel}]}}) 15:22:29 executing program 5: syz_open_dev$sg(&(0x7f0000000100), 0xa, 0x101180) 15:22:29 executing program 3: openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCSBRKP(0xffffffffffffffff, 0x5425, 0x40994a) 15:22:29 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x5407, &(0x7f0000000080)={0x1e, 0x0, 0x0, 0x0, 0x0, "bb09819e2f6e8485"}) 15:22:29 executing program 1: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, 0x0) mount(&(0x7f0000000080)=@md0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='tmpfs\x00', 0x0, &(0x7f00000001c0)='[[{$$-}-&)\\\'[^-\x00') syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x200, 0x2, &(0x7f0000000300)=[{&(0x7f0000000280)="16d2940f9eb7b2282fb243f5ad0c6691f176e0185a2bdb6b35df6469cd1983f5717c8ffb579dcfc213b1bbb54bb54fa50a3c8408d66bdcdc27bc048cdf", 0x3d, 0x7fffffff}, {&(0x7f00000002c0)="3d4a520845ec773ecdf52b00ef48eebb31891578b5cb87c6380a51e8a52b0d579d47e56266ef2ec54976475b9418bdba957441593b0ca8ba97", 0x39, 0x1}], 0x2000040, &(0x7f0000000340)={[{@iocharset={'iocharset', 0x3d, 'koi8-u'}}, {@uni_xlate}, {@iocharset={'iocharset', 0x3d, 'macromanian'}}, {@shortname_win95}, {@utf8}, {@rodir}, {@utf8no}, {@shortname_win95}, {@utf8no}, {@uni_xlateno}], [{@smackfshat={'smackfshat', 0x3d, '[[{$$-}-&)\\\'[^-\x00'}}]}) mount$bind(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x64000, 0x0) 15:22:29 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x540f, 0x0) 15:22:29 executing program 7: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCVHANGUP(r0, 0x5437, 0x0) socketpair(0x1a, 0x1, 0x3f, &(0x7f0000000040)={0xffffffffffffffff}) poll(&(0x7f0000000080)=[{r1, 0x20b6}], 0x1, 0xffffffff) ioctl$TCSBRKP(r0, 0x5425, 0x994a) 15:22:29 executing program 5: syz_open_dev$sg(0x0, 0xa, 0x101180) 15:22:29 executing program 3: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCSBRKP(r0, 0x5425, 0x0) [ 1031.911691] tmpfs: Unknown parameter '[[{$$-}-&)\'[^-' 15:22:29 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x5410, 0x0) 15:22:29 executing program 5: syz_open_dev$sg(0x0, 0xa, 0x101180) [ 1031.938117] tmpfs: Unknown parameter '[[{$$-}-&)\'[^-' 15:22:29 executing program 6: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, 0x0, &(0x7f0000000040)='proc\x00', 0x0, 0x0) mount$9p_unix(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000180), 0x44000, &(0x7f00000001c0)={'trans=unix,', {[{@privport}], [{@seclabel}, {@seclabel}]}}) 15:22:29 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x5407, &(0x7f0000000080)={0x1e00, 0x0, 0x0, 0x0, 0x0, "bb09819e2f6e8485"}) 15:22:29 executing program 4: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1c08a4, 0x0) r1 = syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) open$dir(&(0x7f0000000200)='./mnt\x00', 0x40040, 0x10) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir/../file0\x00', 0x80, 0x0) r2 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x50008, 0x0, 0x10081, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r3 = openat(r1, &(0x7f0000000000)='mnt/encrypted_dir/../file0\x00', 0x0, 0x100) r4 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r4, 0x7, 0x0, 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r4, 0xc0406619, &(0x7f00000001c0)={@desc={0x1, 0x0, @desc2}}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000140)=',,\\\x00') futimesat(r3, &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0)={{0x0, 0xea60}}) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000680)=ANY=[@ANYBLOB="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", @ANYRES32, @ANYBLOB="02000000000000006d6e742f656e637279707465645f6469722f2e2e2f66696c653000"]) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') 15:22:29 executing program 5: syz_open_dev$sg(0x0, 0xa, 0x101180) 15:22:29 executing program 1: openat$hwrng(0xffffffffffffff9c, &(0x7f0000000200), 0x90a00, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/ip_vs_stats_percpu\x00') ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000100)={'ip6_vti0\x00', &(0x7f0000000180)={'ip6tnl0\x00', 0x0, 0x29, 0x4d, 0x1, 0x7, 0x5e, @private0={0xfc, 0x0, '\x00', 0x1}, @empty, 0x8000, 0x10, 0x5, 0x1}}) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, 0x0) mount$bind(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x64000, 0x0) 15:22:29 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x5407, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "bb09819e2f6e8485"}) 15:22:29 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x5411, 0x0) 15:22:29 executing program 5: syz_open_dev$sg(&(0x7f0000000100), 0x0, 0x101180) 15:22:43 executing program 7: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCSBRKP(r0, 0x5425, 0x994a) ioctl$TIOCGSERIAL(r0, 0x541e, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=""/52}) 15:22:43 executing program 6: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000180), 0x44000, &(0x7f00000001c0)={'trans=unix,', {[{@privport}], [{@seclabel}, {@seclabel}]}}) 15:22:43 executing program 3: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCSBRKP(r0, 0x5425, 0x0) 15:22:43 executing program 5: syz_open_dev$sg(&(0x7f0000000100), 0x0, 0x0) 15:22:43 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x5407, &(0x7f0000000080)={0x0, 0x10, 0x0, 0x0, 0x0, "bb09819e2f6e8485"}) 15:22:43 executing program 4: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1c08a4, 0x0) r1 = syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) open$dir(&(0x7f0000000200)='./mnt\x00', 0x40040, 0x10) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir/../file0\x00', 0x80, 0x0) r2 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x50008, 0x0, 0x10081, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r3 = openat(r1, &(0x7f0000000000)='mnt/encrypted_dir/../file0\x00', 0x40, 0x0) r4 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r4, 0x7, 0x0, 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r4, 0xc0406619, &(0x7f00000001c0)={@desc={0x1, 0x0, @desc2}}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000140)=',,\\\x00') futimesat(r3, &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0)={{0x0, 0xea60}}) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000680)=ANY=[@ANYBLOB="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", @ANYRES32, @ANYBLOB="02000000000000006d6e742f656e637279707465645f6469722f2e2e2f66696c653000"]) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') 15:22:43 executing program 1: clone3(&(0x7f00000003c0)={0x164005000, &(0x7f0000000100), &(0x7f0000000180), &(0x7f00000001c0), {0x27}, &(0x7f0000000200)=""/98, 0x62, &(0x7f0000000280)=""/209, &(0x7f0000000380)=[0x0], 0x1}, 0x58) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x444180, 0x24) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, 0x0) mount$bind(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x64000, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000000)={{0x2, 0x0, @local}, {0x0, @local}, 0x20, {0x2, 0x0, @local}, 'dummy0\x00'}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCSARP(r1, 0x8955, &(0x7f0000000000)={{0x2, 0x0, @local}, {0x0, @local}, 0x20, {0x2, 0x0, @local}, 'dummy0\x00'}) sendfile(r0, r1, &(0x7f0000000440)=0x8000, 0x9) 15:22:43 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x5412, 0x0) 15:22:43 executing program 6: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000180), 0x44000, &(0x7f00000001c0)={'trans=unix,', {[{@privport}], [{@seclabel}, {@seclabel}]}}) 15:22:43 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x5407, &(0x7f0000000080)={0x0, 0x1e, 0x0, 0x0, 0x0, "bb09819e2f6e8485"}) 15:22:43 executing program 5: syz_open_dev$sg(&(0x7f0000000100), 0x0, 0x0) 15:22:43 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x5413, 0x0) 15:22:43 executing program 4: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1c08a4, 0x0) r1 = syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) open$dir(&(0x7f0000000200)='./mnt\x00', 0x40040, 0x10) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir/../file0\x00', 0x80, 0x0) r2 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x50008, 0x0, 0x10081, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r3 = openat(r1, &(0x7f0000000000)='mnt/encrypted_dir/../file0\x00', 0x40, 0x0) r4 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r4, 0x7, 0x0, 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r4, 0xc0406619, &(0x7f00000001c0)={@desc={0x1, 0x0, @desc2}}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000140)=',,\\\x00') futimesat(r3, &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0)={{0x0, 0xea60}}) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000680)=ANY=[@ANYBLOB="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", @ANYRES32, @ANYBLOB="02000000000000006d6e742f656e637279707465645f6469722f2e2e2f66696c653000"]) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') 15:22:44 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x5407, &(0x7f0000000080)={0x0, 0x1e00, 0x0, 0x0, 0x0, "bb09819e2f6e8485"}) 15:22:59 executing program 7: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCSBRKP(r0, 0x5425, 0x994a) r1 = getpgid(0x0) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) kcmp(r1, 0xffffffffffffffff, 0x6, r2, r3) 15:22:59 executing program 6: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000180), 0x44000, &(0x7f00000001c0)={'trans=unix,', {[{@privport}], [{@seclabel}, {@seclabel}]}}) 15:22:59 executing program 1: ioctl$INCFS_IOC_FILL_BLOCKS(0xffffffffffffffff, 0x80106720, &(0x7f0000000100)={0x7, &(0x7f0000001600)=[{0x7, 0xdd, &(0x7f0000000180)="adb9cc33aaf654e6fdc0f20f1b1bc923e1bba7cb1f130214690bed6e8d99f410ecda43ce5b385cf7f0b210aec9f9d414a503ec0b7fb37de0f1f20d6cafe14570d069eb64774f33153fbe2bb74024b9f4f97160dc933e195d3e901274bfc45d12d534ea978b61d9ca329a87073cf2e44efd76c278b827c4d4c390d0bb0c4e54b37c2f566dfc4962f441c15468afd8271e488364ad56c429001eaec1035cff86aef38f880c5b22d9a5921d4313d69ddffccf0477a4f71da254922fa1ecc37ece5b7f8481a81a5d1d26a46d875a29c304e6be5be143b4a9c1962b4042da0a", 0x0, 0x1}, {0x8, 0xee, &(0x7f0000000280)="1c774782ec3159f570d3c268c2012a550bc3b410aa2119a973563f727f789ce4e1e7490bf0756554ca2fdacc5baafe72e92ad6c674942637c16c4773c2ea4a533117df50cd4f93c25cf6dc5fe18e07a5e90e3058f110a9c4367c0bee38e7f41f61c34cf6b83c56207e058ee462864acd14f9c47e08d0628c68b7580cc775c663c6c712b206ec6afab37b156f69df54b3fda2b6576175529211e5baedad2200ae38b769b5bf34a57d166dfcff2caac9bcd1cfc459310fb665e17ba12857fb08251d15582aaaf431ec65b0a5ffcb480929b252dcb85936f42bc6678905bf4b7b0691adda86b79235e0c3e6c71d3ac9", 0x1}, {0x6, 0xde, &(0x7f0000000380)="5e92e52c25b397d2f84df0fb55becc97fbb406d7c938d5336a4066f2655217af0d6681cc9f7273c9d7f76a8c2477a3fcb1ee96d988b15b7b23ce6422a2b6a63123ba1e2da6b90d8f091b3b342d748bded7c4c2396b9cd163f21dd94c97134a0ddd49505c6c11a15fb5e04214c9543216b7d46c2b7ba1f9af846f0117d2eb8ba5549665e9de1ca63ab09b82a06bccc217b5e454fdbbd8fe8d49bac5320f7306227a8e1eacd2b65b5b4e80d2468ec5abe0bb8eaf907d28391eab981dcc4a823bbe576209e08bc4becb92ec4aa4fad9e0b96970c7e97a272e5e958cbd4d3e7b", 0x0, 0x1}, {0x4, 0x8b, &(0x7f0000000480)="3c4d9590078754e56156b60e00322a25db09de8e32a4d755e9c789c3ec8c731814d2889f62eee4b3d3a7265b04a912d4fa51eada0f8ba3b7c608daaa0e388395b9e54651f929ff9afaf2f84a8011c8a94b1b10830b1859de6e6fb75d67820de338e2e773fdc5b7c2cc96b04cb08df83e2ddaf539c5e03a80ed8802bce88eac0fffd54b37335513117dbcc2"}, {0x4, 0x1000, &(0x7f0000000540)="6f15d83a31f29e4636a3c67f90bfa4903a60e75ceee7de8eac6108156cdd0ba54e200b17bc0f6e5494291f772cdd2aa86b0512b74f527dfe92d4dbef73dc74e07675cc17225b2ee4c208257702a509cc8e2d1f5401fd06a05680cd378ffb2d2d1bc98f3f3962aee5b7ee064de8d2ee034e81aebf910e78ea6f953e403fbe9b208b5b8b169f262507b4a74a04739baf1ad64029cd0714406cce90c47f033dde7e9b57476959b8d3c599f304c1de7f701f3fced5d5a00c9a7931c1588bd7da21b2852e2b43f890c785e4058139e3d9e5ceaeed0b5697c2bd164079592aea6b5a9e8efd3dabe2b60bc4d5aa3f9da9735621f24322daf4fe26afe3b1b8fff486854794b9e4eb780ff738859949763d04d002b53d79fadce798cf69f0c2f4264acc349a569b1c8a6373bd667124418108ae6f976cf958afd0597c32dd7a7ce43e7e8a5e4c472780a38494b66740066a14d52364e576e3e90ee7d439586e0e551f4c437d2aafbfbfcec01e553ad5cbf267faba77d68fc24fac69d060450cb31f9f2d4a51cf54f44e57b959a5fd45cebe67f8b9cc247958612262e35f17b12b8f375a7aadc28bcec8e0f5fad63e58aefa2b6c3c14281595a8d5906d18e93a205980589f3aed7b2960dd5930093848ad703831d7c085615569d399a61417a9588ecca06e929a797f6fac9546b6a3683eddbe1280fa93a65080dd08f69ee535e2556f7b31cb017ba670ade46c01dddbb89aee797e9214cbad95c32a08bb90b1a355ac7487601cbf87de14c97f4366b579b7f2e07c814be3935bb73d69f72b525fc26f91b12b7ffaa668afa6a4b365328e8e61fb4104bda0df7bbd772e46531c947bf1a644383c1fa8d588541d78ffd8fecefab086a365879ea79e5d6d805e5041a9fe0d49db83ed4bd1be00fdf97fbc39904a48994f6386a346cc564c2d80edb9ab32476e2f983b9cb3900624eb848eb4d19804e9a7cd178dcccf814b7aa475e8aa28588706a4684ef756ba485b1f3722f24783a721e9ad0d37d9c7c9c64878886c0c59bc334b9c007c8edb4e4e5f1b1df43de777afbb688193af1863d77b226b7bbc3dadd841fd000853a3a1eaa3a61362c68fbbffa1d61cb30a27152e5968b293bca0feadbd58c33d5d490f0d3dc9957c3b7a22756c7256499b2b0af99d91a0e411916f7abef6c54a667b131336c9fbd2199084f44e5aeea48f5e89566c64271413a98ffbe9a818ee73f5fcc790ca5a994cf45b82b136fc8f6e57be0d3bf4fe499a2e4adc3f8111011b5bc3dea59fd24a576da4b5d5db9d1c2a3a32db74fca0780fd5a6e5978a0746ca600cb36e8757cd8055ab54a67b25aa9a64407d5993e4d41ddb8113578dd65b8cedd7854f70674fa4e2cf5e9567b7fa61271a8e68d257c22092d47775ddfc65f1326dc70b1737ef64c625e1aca4fd23de713b65ff8aaa544eb7953a3a8a306189aaefa12f291d96e8f951d5eed7a6d599c1bc8b24c30094bb66c9a97bca37f90d3a304e7606d9eac49361840e13c197d7035e26b79658621da90cbdeeebe103dee2e1ad61db6f5ef7928b03210e77a3525d1af849191f6b4e4a5b8670f5ca9c88fc60663225ff158d923ba4c7963edc197bb18d79331f070ed454774238141059ee9b25c3b5acf02917af95bfd2dcc93f8452ef30046241dc099924af7b444cc2cfee980e028a027351da63857606c5bdf9a75fd003024974c58ee8744e51adffb7dd40555861de84a37fe69af53475b8f96e35d69119655ceebe524be13875fb5e219a4ba162a20ab9e138fd1924c8bb3d60eeb4c4c26937d3f5bd1c48578d2a035dc0f4b45b4259385f6251c75600e3d424941717d445ef70fff63e3ccffd90e11cdbc347b547176287b356880210c0d60079c7ff73e54381c7ad200f8f4f722551bd41d48a954a9559c8256f7f911b41b95dd0cd562b9ba46bcd002117cb46f447bd9f5d7be5fa0949fc5c8ca8d5c39e2ab9cee4b8bbb68c3ff8fc8ad49b262889ef560eb05b813049c1ea9982b03c64e738b6639abd8199916e8c851d4345529789b82cd67bd260fde77f9e20d3ab4b265afd35179eab024cc30c9e6579babac037292b9d4e3dcf483f1e70debf05bdc5183454a1fc0ccf80be68acf74fd07bd813d4a8db71d301a3942ee8fd63b02e3a9597ec197177b09f78c3055fef28c8f1cf750c9243bfe2279c3941f3f1f26a80b653d888781edb4bb7ef2822e3eeba5a74047f677828bfce945df5373024ab7085ad1a09d5daecd9fd9053edf3432d9e0c90feeed7ab696374511e326dc1ae8b5148eb29d94ddfcf935256d1083b0be3e986ee633f24ed7a59a4a6f7b08c037f6b819ff1364bc4b2c4c79485b50ff3eca1c0a8cf7d4f18104d0bbe22ab9e844f4085af70cd048eed38accc9c60931d12481325c291500d9cb37c04296fa0604be0a2d79724c52de66ddc4a3aa9d00bb2587ffc4ba430e7a6135a4a7b7ff46c47396a4932ab2292478a78338037ada0e389cde044cb13bc654090447536d4236a091836eab87a6c26520f7335bf339ec6489722ef8dc2511425efc9ca1de8cf27c1d3785606084dca9beb8aeef2a9cfaad60fb4b60c1c9dc1e6ac249ddbdd5cef30051ee5c467e7121a75966b328e4546bb2610bc138fbb25d716b51ba931a41c52d0526725aba1267fbda8ab5c711e6e7f05a42e8211ad42215ba956b4dd609ffb015a3453af23e4b89573a38892a9de43b236e70999d377094dc9a4468b106cb3a0338d13fe17c5305d9b0d95d1f04291140f44ba625e5613a72c5eb8a24c7ae3156a505e36bbdb9cd494cf7064e71deb3e1ebc922e0f2a43f9851ffd47fac5813d38b8013070dfa39e2ee5a1a87e5b9e481aa4b3db6c543223fae4bc9c95d999ec679ec664a52af2c6ae87bb896bac2335eeb2bc187854a5f13047e00b59f8c37daec09b8f0f1420c4554285d8a90651ec70c694d6518de90bc94af3b06ee8df2ab0b1c3dc9d5b2a93a3746e56b56fc4d9e18fb8c60a7b410372f91b61c8dbdda8408234c32f34e8dc76a444712274915f63952608d23e5fc1b09a9dc7f1d4c1578e1d4c5d5d6432497e8c446f37d4a47a69d35c127db741aecda3c833022e8c5dbb0cc1f572d0085c3bbce8732a1cfdb28f0b397c618b164e9009cf435c418b7d3de8929a32f2a96979349ac3863501d179aa754cb1147f43cc445b73e4539f8a2f550856e0d3f2d77f3a2ff1349c85290cb5071941beeb61c0d98326f7bee04db8e8a942c9a401ffbf5b77daaeddedbfaff8efd30158a7f6ef1d281bd44c4ffacd1377eaffe531ef2bd917ecbeb278c0c853f18236236f6a3fd437f11fe3719b1e1be9261ddb051d8c01f89493f7b5c06f7bc47f41ddec6e08da4891c1be87fbc3990a24ec5d8ab438322dba271173ff97cd4485d85524b1a6948d1499e34709b5699e74d26e29eab0a3436d72c8e4760e9a3aea1f441156e7596aa15e68dac25f2d3a4325972cd71aff320e79be559c1acf9c7d1a4ae7bd78e4ed8d907ced4f19b5b6daa2e149bffaed7aedb1db472fabc0fa40dd534d52bf2e12fa6381375c05cd5998306aaaf3e754d605522705d57238eedbcee921bb7cc5c63f5de73cb9b620b41edf711b866f56aa746988d3f092734b0798dc4c2d5d77fec45591f358100d2faaae9e2d3bc55f820f39bf8a6eb75f41861442dfb60f282012b13fefb078ca846162dac29d50e07cb54dbe2b8c3fd2f7557a50fe0001499d8d6e2de41d5f35e06aaa33a49af6c363b43ee4f476ad7fb28278924ebafb193e86b2eb8f22c0325d549af81979f42b6c371aeacfb7d0493fef01bc7af334a353b25551f29427d176d74549d7b5cb55af1f102241bb5218f445be669a9fd13561fbe95766951f4e93ccb203265e62bc55100121dc50e540bd891802a2f95a98b46cc27233d54df81d57a40f9dcbdf049d49cf07fca03062e0d75071187797af87d933de85c1e2342e61abd6465c786539f05c5b99ccc5ef9c16aaf6c0ab903e9906b5f40511d9250e7df94245c562f73b84fa57626d028559e0bf2ee1fa7f21d26662d84abac3bfb6215a06195ff03e1954ae3768fc657fe4c51f4d3b8376d40773732e0ce474e914c0f97c4fbe5c79234b6b5ced94164e09e1c3512a93b81edf37018edfc18a2469b168a98279941205fc392bab5875b2b494770963584d2b1d8c1a8c85eed3b9705dcb07d906f42c38e7aa0b126210ec51b8b532b8e08f14e770de981e05545d3ce1a2491ad3d2feef880d5c57fd6364d46b21d7b4cdf2f0d0eff3482a92ba84b490f742ec529c9e052634a6e9417087e23d9bb666852449a5fbb1a9ca5bce6ba6056e7c493277cabd0197887b9f907eb249ab9394be4166f2c96d4aabb3817bca3ff7f3b5ba980a2c4ae2fc24b1d1d365ebd1479405f374f29e0631b4683a5c1d8a4a6922c84e5626248d68adbcf2b29a840b7bc29624b77e773cebf01f1d1a9ec3373bd4abd9214870fc471e9e58bff1ad9c46a9ac355a3d79dd5eb4fda245f9b880f08ceff23a2e18f78cfc9721cbab7ef3476091a2b424b63b29dc2322fa14166e3aa6b339c9e06a4a4518c5c1ca0febaec907da4f92b9a7148f297297f156fbeb59cdaea4f2c82554d30fcb8407dfb573f00415ec1085a2739c7f1730c1b86f633b50a9f95e27ebd9c300fadcfa74b54c713521f6f0505b78273b1013e65f2886736b31dad469b61ef3651c74c2b0646b091c1b68d8c5a758fe1e9aee234b644cd2f1f77b9676f4ea4a9b90f33f05e3419aed10524d76eebd16d171a9ef2b0afb6f12740a90bec2a502d2e4ca1b336dfc63e0b978d62f5a03122a90f12014465b51d83afb5ea8dad3d6b7b50fb93049b9f7e764ea7228fd650158f7c3663debefe20b0ca470de37d140ccb682fc26b8e761ea0c11c5a090f04146c056d7ed05850da650cfbc09d2eda42542a306c03464aabd1d87413d5499562a8daed68b0967fd88635473de240301233fc0a1d3194c15ec85cd832ac9b334959af0eeb8475ff56a9828f10dbece1ef4f4cae5563078c6949ed417ea41785fb2d3b44c583fbc2678294d2fd7fb668b894bfc649f145b3e53fa46c144484f3cf8ba79b0a453ae86dcee1a5860d204b0fc81fec28f6c3b01a0e4e84b86693c15dc5515a8cffc252eed8aae5873ab94a65841f98c2cc7c061f436bdaf8c6f6c705ea0507020a2ea4695578335d8c6e27fb2ba0ea369c0daf00f19a1ed2715257e893931d9f9283c6fb27f6f16bd0bfa89b32aca29520f3284e8ff80970fe46985a80712a0867021092a396238ea2ef99dfe3973f15cf98147a3cb084d3346bedec3435c42caf76f3956963fcfb23a9cb7f5824d9f84284f11aabdbe91edbb83b7ffc585b95a530ad905dfc0fb9b2256b0cbb6659b6cab8fbf870c4d4da749e7aa4217efdefbc56a1f79ce68b58235879124739ec4380609c400c8bc07d6ec8a8ffd213c53608b6d28edf7ed0ee7991b5f087dc159661743b29bc8ffa0fad46f83c72c43b731f2a78caa99420f375f2d3d10b850895d1c6e5a4fe47affb3ecd2cfb76b2858b4b23a2b93cf0a2766ab63d18cd26301d58bac0761fe3049dc30c40119a0de5907b693cce88ab017e2125fc00f7d7836bc3bc2298005cde6047b21ccfb5c19f6334d7e44f9f2903e5ab5e63b6a7322460e82d302c2a20f9192ed40232eef598838b84a59829e29b028071c7594d3fc8c8b84ef569e400867cc173cf4aeb9e98a8b740a5a1d4e2e9cc8befb506e82c1ab7141b5f5e517a5618c8b639c70228e53a0f1b936", 0x1}, {0x9, 0x1, &(0x7f0000000080)="0f", 0x0, 0x1}, {0x80000001, 0x9a, &(0x7f0000001540)="2cdaeeadcfbdc30f6daca15aadbb7a18d89acdb0f9f86b79a1c50dad4bc4ba0c5ec8f36377921199e7aab93b2a7eb02d51afbfdf11c505a8c81a42e7849d1352fb1a775c1bb4d0c86c0ff18d26d9914f70b5e75c8b06830754841188f67c56901be0e1c08318636ec643b733b0d0d636811e283c1624264733e169b0b32e5d419199217a0ef5e845bdf3ae737bb7a21caec62545dbbae442e8f9", 0x1, 0x1}]}) ioctl$F2FS_IOC_GET_PIN_FILE(0xffffffffffffffff, 0x8004f50e, &(0x7f0000001740)) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x2, 0x0, 0x0, 0x10880, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, 0x0) mount$bind(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x64000, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000001700)='./file0\x00', 0x460000, 0x1a0) 15:22:59 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x5414, 0x0) 15:23:00 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x5407, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "bb09819e2f6e8485"}) 15:23:00 executing program 4: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1c08a4, 0x0) r1 = syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) open$dir(&(0x7f0000000200)='./mnt\x00', 0x40040, 0x10) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir/../file0\x00', 0x80, 0x0) r2 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x50008, 0x0, 0x10081, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r3 = openat(r1, &(0x7f0000000000)='mnt/encrypted_dir/../file0\x00', 0x40, 0x0) r4 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r4, 0x7, 0x0, 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r4, 0xc0406619, &(0x7f00000001c0)={@desc={0x1, 0x0, @desc2}}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000140)=',,\\\x00') futimesat(r3, &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0)={{0x0, 0xea60}}) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000680)=ANY=[@ANYBLOB="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", @ANYRES32, @ANYBLOB="02000000000000006d6e742f656e637279707465645f6469722f2e2e2f66696c653000"]) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') 15:23:00 executing program 5: syz_open_dev$sg(&(0x7f0000000100), 0x0, 0x0) 15:23:00 executing program 3: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCSBRKP(r0, 0x5425, 0x0) 15:23:00 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x5415, 0x0) 15:23:00 executing program 6: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, 0x0) mount$9p_unix(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000180), 0x44000, &(0x7f00000001c0)={'trans=unix,', {[{@privport}], [{@seclabel}, {@seclabel}]}}) 15:23:00 executing program 5: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCSBRKP(r0, 0x5425, 0x994a) ioctl$TIOCGSERIAL(r0, 0x541e, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=""/52}) 15:23:00 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x5407, &(0x7f0000000080)={0x0, 0x0, 0x10, 0x0, 0x0, "bb09819e2f6e8485"}) 15:23:00 executing program 4: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1c08a4, 0x0) r1 = syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) open$dir(&(0x7f0000000200)='./mnt\x00', 0x40040, 0x10) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir/../file0\x00', 0x80, 0x0) r2 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x50008, 0x0, 0x10081, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r3 = openat(r1, &(0x7f0000000000)='mnt/encrypted_dir/../file0\x00', 0x40, 0x100) r4 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(0xffffffffffffffff, 0x7, 0x0, 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r4, 0xc0406619, &(0x7f00000001c0)={@desc={0x1, 0x0, @desc2}}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000140)=',,\\\x00') futimesat(r3, &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0)={{0x0, 0xea60}}) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000680)=ANY=[@ANYBLOB="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", @ANYRES32, @ANYBLOB="02000000000000006d6e742f656e637279707465645f6469722f2e2e2f66696c653000"]) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') 15:23:00 executing program 1: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, 0x0) mount$bind(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x64000, 0x0) r0 = openat2$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)={0x0, 0x6, 0x3}, 0x18) openat(r0, &(0x7f0000000200)='./file0\x00', 0x0, 0x108) removexattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)=@known='user.incfs.size\x00') 15:23:00 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x5416, 0x0) 15:23:00 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x5407, &(0x7f0000000080)={0x0, 0x0, 0x1e, 0x0, 0x0, "bb09819e2f6e8485"}) 15:23:00 executing program 7: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCSBRKP(r0, 0x5425, 0x994a) ioctl$TIOCSTI(r0, 0x5412, &(0x7f0000000040)=0x3f) 15:23:00 executing program 6: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, 0x0) mount$9p_unix(0x0, 0x0, &(0x7f0000000180), 0x44000, &(0x7f00000001c0)={'trans=unix,', {[{@privport}], [{@seclabel}, {@seclabel}]}}) 15:23:00 executing program 1: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x800, 0x0) recvmmsg$unix(0xffffffffffffffff, &(0x7f0000008040)=[{{&(0x7f0000000200)=@abs, 0x6e, &(0x7f0000001500)=[{&(0x7f0000000280)=""/4096, 0x1000}, {&(0x7f0000001280)=""/222, 0xde}, {&(0x7f0000001380)=""/18, 0x12}, {&(0x7f00000013c0)=""/23, 0x17}, {&(0x7f0000001400)=""/186, 0xba}, {&(0x7f00000014c0)}], 0x6, &(0x7f0000001580)=[@cred={{0x1c}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0x0}}}], 0x40}}, {{&(0x7f00000015c0), 0x6e, &(0x7f0000002800)=[{&(0x7f0000001640)=""/154, 0x9a}, {&(0x7f0000001700)=""/223, 0xdf}, {&(0x7f0000001800)=""/4096, 0x1000}], 0x3, &(0x7f0000002840)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x50}}, {{0x0, 0x0, &(0x7f0000003cc0)=[{&(0x7f00000028c0)=""/166, 0xa6}, {&(0x7f0000002980)=""/91, 0x5b}, {&(0x7f0000002a00)=""/147, 0x93}, {&(0x7f0000002ac0)=""/56, 0x38}, {&(0x7f0000002b00)=""/136, 0x88}, {&(0x7f0000002bc0)=""/4096, 0x1000}, {&(0x7f0000003bc0)=""/220, 0xdc}], 0x7, &(0x7f0000003d40)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x68}}, {{0x0, 0x0, &(0x7f0000004300)=[{&(0x7f0000003dc0)=""/130, 0x82}, {&(0x7f0000003e80)=""/225, 0xe1}, {&(0x7f0000003f80)=""/169, 0xa9}, {&(0x7f0000004040)=""/47, 0x2f}, {&(0x7f0000004080)=""/162, 0xa2}, {&(0x7f0000004140)=""/188, 0xbc}, {&(0x7f0000004200)=""/201, 0xc9}], 0x7}}, {{&(0x7f0000004380)=@abs, 0x6e, &(0x7f00000066c0)=[{&(0x7f0000004400)=""/178, 0xb2}, {&(0x7f00000044c0)=""/217, 0xd9}, {&(0x7f00000045c0)=""/198, 0xc6}, {&(0x7f00000046c0)=""/4096, 0x1000}, {&(0x7f00000056c0)=""/4096, 0x1000}], 0x5, &(0x7f0000006740)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x58}}, {{&(0x7f00000067c0)=@abs, 0x6e, &(0x7f0000006cc0)=[{&(0x7f0000006840)=""/111, 0x6f}, {&(0x7f00000068c0)=""/233, 0xe9}, {&(0x7f00000069c0)=""/108, 0x6c}, {&(0x7f0000006a40)=""/223, 0xdf}, {&(0x7f0000006b40)=""/161, 0xa1}, {&(0x7f0000006c00)=""/188, 0xbc}], 0x6}}, {{&(0x7f0000006d40), 0x6e, &(0x7f0000007f00)=[{&(0x7f0000006dc0)=""/235, 0xeb}, {&(0x7f0000006ec0)=""/49, 0x31}, {&(0x7f0000006f00)=""/4096, 0x1000}], 0x3, &(0x7f0000007f40)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0xf0}}], 0x7, 0x1, &(0x7f0000008200)) stat(&(0x7f0000000000)='.\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r1, 0x0) mount$9p_tcp(&(0x7f0000000100), &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x1048800, &(0x7f0000008240)={'trans=tcp,', {'port', 0x3d, 0x4e20}, 0x2c, {[{@cache_loose}, {@access_client}, {@access_user}, {@afid={'afid', 0x3d, 0x7}}, {@dfltgid={'dfltgid', 0x3d, r0}}, {@afid={'afid', 0x3d, 0x2}}, {@fscache}, {@access_user}], [{@euid_gt={'euid>', r1}}, {@pcr={'pcr', 0x3d, 0x3f}}]}}) mount$bind(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x64000, 0x0) 15:23:00 executing program 4: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1c08a4, 0x0) r1 = syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) open$dir(&(0x7f0000000200)='./mnt\x00', 0x40040, 0x10) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir/../file0\x00', 0x80, 0x0) r2 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x50008, 0x0, 0x10081, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r3 = openat(r1, &(0x7f0000000000)='mnt/encrypted_dir/../file0\x00', 0x40, 0x100) r4 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(0xffffffffffffffff, 0x7, 0x0, 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r4, 0xc0406619, &(0x7f00000001c0)={@desc={0x1, 0x0, @desc2}}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000140)=',,\\\x00') futimesat(r3, &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0)={{0x0, 0xea60}}) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000680)=ANY=[@ANYBLOB="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", @ANYRES32, @ANYBLOB="02000000000000006d6e742f656e637279707465645f6469722f2e2e2f66696c653000"]) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') 15:23:00 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x5418, 0x0) 15:23:00 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x5407, &(0x7f0000000080)={0x0, 0x0, 0x1e00, 0x0, 0x0, "bb09819e2f6e8485"}) 15:23:00 executing program 3: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1c08a4, 0x0) r1 = syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) open$dir(&(0x7f0000000200)='./mnt\x00', 0x40040, 0x10) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir/../file0\x00', 0x80, 0x0) r2 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x50008, 0x0, 0x10081, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r3 = openat(r1, &(0x7f0000000000)='mnt/encrypted_dir/../file0\x00', 0x40, 0x100) r4 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(0xffffffffffffffff, 0x7, 0x0, 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r4, 0xc0406619, &(0x7f00000001c0)={@desc={0x1, 0x0, @desc2}}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000140)=',,\\\x00') futimesat(r3, &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0)={{0x0, 0xea60}}) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000680)=ANY=[@ANYBLOB="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", @ANYRES32, @ANYBLOB="02000000000000006d6e742f656e637279707465645f6469722f2e2e2f66696c653000"]) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') 15:23:13 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x541b, 0x0) 15:23:13 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x5407, &(0x7f0000000080)={0x0, 0x0, 0x1e00, 0x0, 0x0, "bb09819e2f6e8485"}) 15:23:13 executing program 7: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCSBRKP(r0, 0x5425, 0x994a) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x20000, 0x0) ioctl$TCSETAW(r1, 0x5407, &(0x7f0000000080)={0x3, 0x7, 0xfe0, 0x0, 0x16, "6d646611bcbcaf30"}) 15:23:13 executing program 3: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1c08a4, 0x0) r1 = syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) open$dir(&(0x7f0000000200)='./mnt\x00', 0x40040, 0x10) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir/../file0\x00', 0x80, 0x0) r2 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x50008, 0x0, 0x10081, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r3 = openat(r1, &(0x7f0000000000)='mnt/encrypted_dir/../file0\x00', 0x40, 0x100) r4 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(0xffffffffffffffff, 0x7, 0x0, 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r4, 0xc0406619, &(0x7f00000001c0)={@desc={0x1, 0x0, @desc2}}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000140)=',,\\\x00') futimesat(r3, &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0)={{0x0, 0xea60}}) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000680)=ANY=[@ANYBLOB="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", @ANYRES32, @ANYBLOB="02000000000000006d6e742f656e637279707465645f6469722f2e2e2f66696c653000"]) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') 15:23:13 executing program 6: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, 0x0) mount$9p_unix(0x0, 0x0, &(0x7f0000000180), 0x44000, &(0x7f00000001c0)={'trans=unix,', {[{@privport}], [{@seclabel}, {@seclabel}]}}) 15:23:13 executing program 1: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x4, 0x0, 0x0, 0x800824, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='hostfs\x00', 0x8380a0, 0x0) mount$bind(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x64000, 0x0) lstat(&(0x7f0000000180)='./file1\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0xc) mount$cgroup2(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000100), 0x20000, &(0x7f00000002c0)={[{}, {@subsystem='devices'}, {@memory_localevents}, {@memory_localevents}], [{@uid_lt={'uid<', r0}}, {@seclabel}, {@fowner_gt={'fowner>', 0xee01}}, {@fsname={'fsname', 0x3d, 'hostfs\x00'}}, {@dont_appraise}, {@euid_eq={'euid', 0x3d, r1}}, {@obj_type={'obj_type', 0x3d, ',/-/%'}}]}) 15:23:13 executing program 4: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1c08a4, 0x0) r1 = syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) open$dir(&(0x7f0000000200)='./mnt\x00', 0x40040, 0x10) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir/../file0\x00', 0x80, 0x0) r2 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x50008, 0x0, 0x10081, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r3 = openat(r1, &(0x7f0000000000)='mnt/encrypted_dir/../file0\x00', 0x40, 0x100) r4 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(0xffffffffffffffff, 0x7, 0x0, 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r4, 0xc0406619, &(0x7f00000001c0)={@desc={0x1, 0x0, @desc2}}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000140)=',,\\\x00') futimesat(r3, &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0)={{0x0, 0xea60}}) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000680)=ANY=[@ANYBLOB="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", @ANYRES32, @ANYBLOB="02000000000000006d6e742f656e637279707465645f6469722f2e2e2f66696c653000"]) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') 15:23:13 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x5407, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "bb09819e2f6e8485"}) 15:23:13 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x541c, 0x0) 15:23:13 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x5407, &(0x7f0000000080)={0x0, 0x0, 0x1e00, 0x0, 0x0, "bb09819e2f6e8485"}) 15:23:13 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x5407, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x10, 0x0, "bb09819e2f6e8485"}) 15:23:13 executing program 1: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x1000000000001000, 0xfffffffffffffd1d, 0x0, 0x180014, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, 0x0) mount$bind(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x64000, 0x0) 15:23:13 executing program 6: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, 0x0) mount$9p_unix(0x0, 0x0, &(0x7f0000000180), 0x44000, &(0x7f00000001c0)={'trans=unix,', {[{@privport}], [{@seclabel}, {@seclabel}]}}) 15:23:27 executing program 4: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1c08a4, 0x0) r1 = syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) open$dir(&(0x7f0000000200)='./mnt\x00', 0x40040, 0x10) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir/../file0\x00', 0x80, 0x0) r2 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x50008, 0x0, 0x10081, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r3 = openat(r1, &(0x7f0000000000)='mnt/encrypted_dir/../file0\x00', 0x40, 0x100) r4 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r4, 0x7, 0x0, 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(0xffffffffffffffff, 0xc0406619, &(0x7f00000001c0)={@desc={0x1, 0x0, @desc2}}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000140)=',,\\\x00') futimesat(r3, &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0)={{0x0, 0xea60}}) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000680)=ANY=[@ANYBLOB="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", @ANYRES32, @ANYBLOB="02000000000000006d6e742f656e637279707465645f6469722f2e2e2f66696c653000"]) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') 15:23:27 executing program 3: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1c08a4, 0x0) r1 = syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) open$dir(&(0x7f0000000200)='./mnt\x00', 0x40040, 0x10) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir/../file0\x00', 0x80, 0x0) r2 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x50008, 0x0, 0x10081, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r3 = openat(r1, &(0x7f0000000000)='mnt/encrypted_dir/../file0\x00', 0x40, 0x0) r4 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r4, 0x7, 0x0, 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r4, 0xc0406619, &(0x7f00000001c0)={@desc={0x1, 0x0, @desc2}}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000140)=',,\\\x00') futimesat(r3, &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0)={{0x0, 0xea60}}) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000680)=ANY=[@ANYBLOB="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", @ANYRES32, @ANYBLOB="02000000000000006d6e742f656e637279707465645f6469722f2e2e2f66696c653000"]) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') 15:23:27 executing program 7: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x436641, 0x0) ioctl$TCSBRKP(r0, 0x5425, 0x4) 15:23:27 executing program 6: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, 0x0) mount$9p_unix(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x44000, &(0x7f00000001c0)={'trans=unix,', {[{@privport}], [{@seclabel}, {@seclabel}]}}) 15:23:27 executing program 1: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) umount2(&(0x7f0000000080)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, 0x0) mount$bind(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x64000, 0x0) 15:23:27 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x5407, &(0x7f0000000080)={0x0, 0x0, 0x1e00, 0x0, 0x0, "bb09819e2f6e8485"}) 15:23:27 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x5407, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x1e, 0x0, "bb09819e2f6e8485"}) 15:23:27 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x541d, 0x0) 15:23:27 executing program 7: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000080), 0x7b3b01, 0x0) ioctl$TCSBRKP(r0, 0x5425, 0x994a) ioctl$TIOCL_SELLOADLUT(r0, 0x541c, &(0x7f0000000000)={0x5, 0x0, 0x3, 0x9, 0x2}) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r1, 0x7, 0x0, 0x0, 0x0) ioctl$TIOCSTI(r1, 0x5412, &(0x7f0000000040)=0x2) creat(&(0x7f00000000c0)='./file0\x00', 0x129) 15:23:27 executing program 5: ioctl$TCSETAW(0xffffffffffffffff, 0x5407, &(0x7f0000000080)={0x0, 0x0, 0x1e00, 0x0, 0x0, "bb09819e2f6e8485"}) 15:23:39 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x5407, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x1e00, 0x0, "bb09819e2f6e8485"}) 15:23:39 executing program 4: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1c08a4, 0x0) r1 = syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) open$dir(&(0x7f0000000200)='./mnt\x00', 0x40040, 0x10) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir/../file0\x00', 0x80, 0x0) r2 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x50008, 0x0, 0x10081, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r3 = openat(r1, &(0x7f0000000000)='mnt/encrypted_dir/../file0\x00', 0x40, 0x100) r4 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r4, 0x7, 0x0, 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(0xffffffffffffffff, 0xc0406619, &(0x7f00000001c0)={@desc={0x1, 0x0, @desc2}}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000140)=',,\\\x00') futimesat(r3, &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0)={{0x0, 0xea60}}) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000680)=ANY=[@ANYBLOB="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", @ANYRES32, @ANYBLOB="02000000000000006d6e742f656e637279707465645f6469722f2e2e2f66696c653000"]) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') 15:23:39 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x541e, 0x0) 15:23:39 executing program 7: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r0, 0x7, 0x0, 0x0, 0x0) ioctl$PIO_FONTX(r0, 0x4b6c, &(0x7f0000000480)={0x1bb, 0x2, &(0x7f00000004c0)="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"}) ioctl$TCSBRKP(0xffffffffffffffff, 0x5425, 0x994a) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x711044, 0x0) ioctl$TIOCSPTLCK(r1, 0x40045431, &(0x7f0000000080)) 15:23:39 executing program 3: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1c08a4, 0x0) r1 = syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) open$dir(&(0x7f0000000200)='./mnt\x00', 0x40040, 0x10) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir/../file0\x00', 0x80, 0x0) r2 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x50008, 0x0, 0x10081, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r3 = openat(r1, &(0x7f0000000000)='mnt/encrypted_dir/../file0\x00', 0x0, 0x100) r4 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r4, 0x7, 0x0, 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r4, 0xc0406619, &(0x7f00000001c0)={@desc={0x1, 0x0, @desc2}}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000140)=',,\\\x00') futimesat(r3, &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0)={{0x0, 0xea60}}) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000680)=ANY=[@ANYBLOB="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", @ANYRES32, @ANYBLOB="02000000000000006d6e742f656e637279707465645f6469722f2e2e2f66696c653000"]) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') 15:23:39 executing program 5: ioctl$TCSETAW(0xffffffffffffffff, 0x5407, &(0x7f0000000080)={0x0, 0x0, 0x1e00, 0x0, 0x0, "bb09819e2f6e8485"}) 15:23:39 executing program 1: mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, 0x0) mount$bind(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x64000, 0x0) faccessat2(0xffffffffffffffff, &(0x7f0000000080)='./file1\x00', 0x0, 0x1200) 15:23:39 executing program 6: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, 0x0) mount$9p_unix(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f00000001c0)={'trans=unix,', {[{@privport}], [{@seclabel}, {@seclabel}]}}) 15:23:39 executing program 5: ioctl$TCSETAW(0xffffffffffffffff, 0x5407, &(0x7f0000000080)={0x0, 0x0, 0x1e00, 0x0, 0x0, "bb09819e2f6e8485"}) 15:23:39 executing program 1: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x2000000004, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, 0x0) mount$bind(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x81, 0x0) r0 = accept4$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000100)=0x14, 0x80800) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000180)={{0x1, 0x1, 0x18, r0, {0x6}}, './file0\x00'}) setxattr$incfs_id(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200), &(0x7f0000000240)={'0000000000000000000000000000000', 0x30}, 0x20, 0x0) 15:23:39 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x5407, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "bb09819e2f6e8485"}) 15:23:39 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x5407, &(0x7f0000000080)={0x0, 0x0, 0x1e00, 0x0, 0x0, "bb09819e2f6e8485"}) 15:23:39 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x541e, 0x0) 15:23:39 executing program 6: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, 0x0) mount$9p_unix(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f00000001c0)={'trans=unix,', {[{@privport}], [{@seclabel}, {@seclabel}]}}) 15:23:39 executing program 3: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCSBRKP(r0, 0x5425, 0x994a) ioctl$KDGKBTYPE(r0, 0x4b33, &(0x7f0000000040)) 15:23:39 executing program 7: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x940, 0x0) ioctl$TIOCL_SCROLLCONSOLE(r0, 0x541c, &(0x7f0000000080)) r1 = fsopen(&(0x7f00000000c0)='exofs\x00', 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r1, 0x40086607, &(0x7f0000000100)=0x66) ioctl$TIOCSTI(r0, 0x5412, &(0x7f0000000040)=0xfb) ioctl$TCSBRKP(r0, 0x5425, 0x994a) r2 = ioctl$TIOCGPTPEER(r0, 0x5441, 0x7ff) ioctl$TIOCSTI(r2, 0x5412, &(0x7f0000000140)=0x7) 15:23:39 executing program 5: syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(0xffffffffffffffff, 0x5407, &(0x7f0000000080)={0x0, 0x0, 0x1e00, 0x0, 0x0, "bb09819e2f6e8485"}) 15:23:54 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x5407, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x10, "bb09819e2f6e8485"}) 15:23:54 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x5421, 0x0) 15:23:54 executing program 7: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) ioctl$TIOCL_SCROLLCONSOLE(r1, 0x541c, &(0x7f0000000100)={0xd, 0x80}) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000040)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) ioctl$TIOCSTI(r2, 0x5412, &(0x7f0000000080)=0xff) ioctl$TCSBRKP(r0, 0x5425, 0x994a) 15:23:54 executing program 3: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCSBRKP(r0, 0x5425, 0x994a) ioctl$KDGKBTYPE(r0, 0x4b33, &(0x7f0000000040)) 15:23:54 executing program 4: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1c08a4, 0x0) r1 = syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) open$dir(&(0x7f0000000200)='./mnt\x00', 0x40040, 0x10) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir/../file0\x00', 0x80, 0x0) r2 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x50008, 0x0, 0x10081, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r3 = openat(r1, &(0x7f0000000000)='mnt/encrypted_dir/../file0\x00', 0x40, 0x100) r4 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r4, 0x7, 0x0, 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(0xffffffffffffffff, 0xc0406619, &(0x7f00000001c0)={@desc={0x1, 0x0, @desc2}}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000140)=',,\\\x00') futimesat(r3, &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0)={{0x0, 0xea60}}) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000680)=ANY=[@ANYBLOB="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", @ANYRES32, @ANYBLOB="02000000000000006d6e742f656e637279707465645f6469722f2e2e2f66696c653000"]) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') 15:23:54 executing program 1: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='autofs\x00', 0x0, 0x0) mount$bind(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x64000, 0x0) 15:23:54 executing program 5: syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(0xffffffffffffffff, 0x5407, &(0x7f0000000080)={0x0, 0x0, 0x1e00, 0x0, 0x0, "bb09819e2f6e8485"}) 15:23:54 executing program 6: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, 0x0) mount$9p_unix(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f00000001c0)={'trans=unix,', {[{@privport}], [{@seclabel}, {@seclabel}]}}) [ 1117.002667] autofs4:pid:8141:autofs_fill_super: called with bogus options 15:23:54 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x5422, 0x0) 15:23:54 executing program 5: syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(0xffffffffffffffff, 0x5407, &(0x7f0000000080)={0x0, 0x0, 0x1e00, 0x0, 0x0, "bb09819e2f6e8485"}) 15:23:54 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x5407, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x1e, "bb09819e2f6e8485"}) 15:23:54 executing program 6: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, 0x0) mount$9p_unix(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x44000, 0x0) 15:23:54 executing program 1: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x10000, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0/../file0\x00', 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000180)='./file0/../file0\x00', &(0x7f0000000140)='./file0\x00') 15:23:54 executing program 4: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1c08a4, 0x0) r1 = syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) open$dir(&(0x7f0000000200)='./mnt\x00', 0x40040, 0x10) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir/../file0\x00', 0x80, 0x0) r2 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x50008, 0x0, 0x10081, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r3 = openat(r1, &(0x7f0000000000)='mnt/encrypted_dir/../file0\x00', 0x40, 0x100) r4 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r4, 0x7, 0x0, 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r4, 0xc0406619, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000140)=',,\\\x00') futimesat(r3, &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0)={{0x0, 0xea60}}) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000680)=ANY=[@ANYBLOB="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", @ANYRES32, @ANYBLOB="02000000000000006d6e742f656e637279707465645f6469722f2e2e2f66696c653000"]) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') 15:23:54 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x5407, 0x0) 15:23:54 executing program 3: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCSBRKP(r0, 0x5425, 0x994a) ioctl$KDGKBTYPE(r0, 0x4b33, &(0x7f0000000040)) 15:23:54 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x5407, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "bb13819e2f6e8485"}) 15:23:54 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x5423, 0x0) 15:24:09 executing program 7: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCSBRKP(r0, 0x5425, 0x994a) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x40, 0x0) ioctl$KDGETKEYCODE(r1, 0x4b4c, &(0x7f0000000080)={0x7, 0x1ff}) r2 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r2, 0x7, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x18d280, 0x2) ioctl$AUTOFS_IOC_READY(r2, 0x9360, 0x7) openat$bsg(0xffffffffffffff9c, &(0x7f0000000100), 0x10000, 0x0) ioctl$TIOCL_SCROLLCONSOLE(r0, 0x541c, &(0x7f00000000c0)={0xd, 0x7ffe}) 15:24:09 executing program 3: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1c08a4, 0x0) r1 = syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) open$dir(&(0x7f0000000200)='./mnt\x00', 0x40040, 0x10) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir/../file0\x00', 0x80, 0x0) r2 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x50008, 0x0, 0x10081, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r3 = openat(r1, &(0x7f0000000000)='mnt/encrypted_dir/../file0\x00', 0x40, 0x100) r4 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r4, 0x7, 0x0, 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r4, 0xc0406619, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000140)=',,\\\x00') futimesat(r3, &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0)={{0x0, 0xea60}}) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000680)=ANY=[@ANYBLOB="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", @ANYRES32, @ANYBLOB="02000000000000006d6e742f656e637279707465645f6469722f2e2e2f66696c653000"]) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') 15:24:09 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x5424, 0x0) 15:24:09 executing program 1: r0 = syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x101, 0x0, 0x0, 0x1, 0x0) mknodat$loop(r0, &(0x7f0000000180)='./file0\x00', 0x2000, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='ext3\x00', 0x3e1458, 0x0) mount$bind(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x64000, 0x0) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r1, 0x7, 0x0, 0x0, 0x0) recvmsg$unix(r1, &(0x7f0000000780)={&(0x7f00000003c0)=@abs, 0x6e, &(0x7f0000000600)=[{&(0x7f0000000440)=""/88, 0x58}, {&(0x7f00000004c0)=""/164, 0xa4}, {&(0x7f0000000580)=""/77, 0x4d}], 0x3, &(0x7f0000000640)=[@cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @cred={{0x1c}}], 0x130}, 0x40000000) syz_mount_image$nfs4(&(0x7f0000000040), &(0x7f00000001c0)='./file0\x00', 0x1ff, 0x3, &(0x7f0000000340)=[{&(0x7f0000000200)="c6a9adadb77d6484489ff08e107c88fa30b59e95cdfb8cc9cfd8c3526300d48ff66f499644c8bc40be34d862419785336b114338640a717b6588be5a9c38c0e4999c50d9ee92bdb674c59c50dc377b24", 0x50, 0x6}, {&(0x7f0000000280)="e8cfd2bdd78df9f18225d2", 0xb, 0x5}, {&(0x7f00000002c0)="639c8bd6c6cab0c3efd70b245ec95b35306bb7b521346c827b035eff4f6f3927cd69143f960d1a7b94ecbd27b878ee451645c23749fcd7a5103d06f836ef731a2516029afbf6bbf6d1830da897d79bb6a136f5cdc269ca28705d47346eb24fcad3606cd54418f754", 0x68, 0x8}], 0x1001, &(0x7f00000007c0)={[{'&^--*+/'}, {'*\xae('}, {'ext3\x00'}, {'ext3\x00'}, {'ext3\x00'}], [{@audit}, {@fsuuid={'fsuuid', 0x3d, {[0x65, 0x0, 0x7c, 0x32, 0x66, 0x66, 0x31, 0x63], 0x2d, [0x0, 0x62, 0x39, 0x34], 0x2d, [0x39, 0x64, 0x63, 0x4c5bb568a390ad79], 0x2d, [0x33, 0x63, 0x38, 0x35], 0x2d, [0x39, 0x61, 0x31, 0x64, 0x37, 0x62, 0x31, 0x39]}}}, {@pcr={'pcr', 0x3d, 0x15}}, {@subj_role={'subj_role', 0x3d, '+}'}}, {@uid_gt={'uid>', r2}}, {@appraise}, {@smackfsdef={'smackfsdef', 0x3d, 'ext3\x00'}}, {@seclabel}]}) mkdirat(r1, &(0x7f0000000100)='.\x00', 0x194) 15:24:09 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x5407, 0x0) 15:24:09 executing program 4: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1c08a4, 0x0) r1 = syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) open$dir(&(0x7f0000000200)='./mnt\x00', 0x40040, 0x10) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir/../file0\x00', 0x80, 0x0) r2 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x50008, 0x0, 0x10081, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r3 = openat(r1, &(0x7f0000000000)='mnt/encrypted_dir/../file0\x00', 0x40, 0x100) r4 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r4, 0x7, 0x0, 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r4, 0xc0406619, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000140)=',,\\\x00') futimesat(r3, &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0)={{0x0, 0xea60}}) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000680)=ANY=[@ANYBLOB="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", @ANYRES32, @ANYBLOB="02000000000000006d6e742f656e637279707465645f6469722f2e2e2f66696c653000"]) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') 15:24:09 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x5407, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "bb09819e2f6e8485"}) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r1, 0x7, 0x0, 0x0, 0x0) ioctl$VT_GETSTATE(r1, 0x5603, &(0x7f0000000000)={0xff, 0x7f, 0x9}) 15:24:09 executing program 6: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='autofs\x00', 0x0, 0x0) mount$bind(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x64000, 0x0) [ 1132.257858] autofs4:pid:8389:autofs_fill_super: called with bogus options 15:24:09 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x5425, 0x0) 15:24:09 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x5407, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "bb09819e2f6e8485"}) ioctl$TCXONC(r0, 0x540a, 0x2) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r1, 0x7, 0x0, 0x0, 0x0) r2 = syz_open_dev$mouse(&(0x7f0000000040), 0x7, 0x0) ioctl$GIO_CMAP(r2, 0x4b70, &(0x7f00000000c0)) 15:24:09 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x5407, 0x0) 15:24:10 executing program 4: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1c08a4, 0x0) r1 = syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) open$dir(&(0x7f0000000200)='./mnt\x00', 0x40040, 0x10) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir/../file0\x00', 0x80, 0x0) r2 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x50008, 0x0, 0x10081, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r3 = openat(r1, &(0x7f0000000000)='mnt/encrypted_dir/../file0\x00', 0x40, 0x100) r4 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r4, 0x7, 0x0, 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r4, 0xc0406619, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000140)=',,\\\x00') futimesat(r3, &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0)={{0x0, 0xea60}}) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000680)=ANY=[@ANYBLOB="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", @ANYRES32, @ANYBLOB="02000000000000006d6e742f656e637279707465645f6469722f2e2e2f66696c653000"]) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') 15:24:10 executing program 3: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1c08a4, 0x0) r1 = syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) open$dir(&(0x7f0000000200)='./mnt\x00', 0x40040, 0x10) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir/../file0\x00', 0x80, 0x0) r2 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x50008, 0x0, 0x10081, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r3 = openat(r1, &(0x7f0000000000)='mnt/encrypted_dir/../file0\x00', 0x40, 0x100) r4 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r4, 0x7, 0x0, 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r4, 0xc0406619, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000140)=',,\\\x00') futimesat(r3, &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0)={{0x0, 0xea60}}) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000680)=ANY=[@ANYBLOB="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", @ANYRES32, @ANYBLOB="02000000000000006d6e742f656e637279707465645f6469722f2e2e2f66696c653000"]) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') 15:24:10 executing program 6: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='autofs\x00', 0x0, 0x0) mount$bind(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x64000, 0x0) 15:24:10 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x5427, 0x0) 15:24:10 executing program 1: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000001c0)='/sys/kernel/fscaps', 0xa080, 0x40) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000080)=ANY=[@ANYBLOB="000000ea5aa2640000000000", @ANYRES32=0xffffffffffffffff, @ANYBLOB='D\v\x00\x00\x00\x00\x00\x00./file0\x00']) getsockopt$inet6_udp_int(r1, 0x11, 0x63, &(0x7f0000000100), &(0x7f0000000180)=0x4) r2 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x20010, r0, 0x8000000) r3 = syz_io_uring_setup(0x7d04, &(0x7f00000002c0), &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r4, r5, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f0000000240)=[{&(0x7f0000000340)=""/142, 0x8e}], 0x1}, 0x0) r6 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r3, 0x0) syz_io_uring_submit(r6, r5, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) syz_io_uring_setup(0x78a1, &(0x7f0000000080)={0x0, 0xa91f, 0x10, 0x0, 0x3ba}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f00000002c0), &(0x7f0000000180)=0x0) r8 = io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) syz_io_uring_submit(0x0, r7, &(0x7f0000000040)=@IORING_OP_REMOVE_BUFFERS={0x1f, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x1, {0x23, r8}}, 0x7ff) r9 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCSARP(r9, 0x8955, &(0x7f0000000000)={{0x2, 0x0, @local}, {0x0, @local}, 0x20, {0x2, 0x0, @local}, 'dummy0\x00'}) recvmmsg$unix(r0, &(0x7f0000004ac0)=[{{0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000400)=""/119, 0x77}, {&(0x7f0000000480)=""/132, 0x84}, {&(0x7f0000000280)=""/45, 0x2d}, {&(0x7f0000000540)=""/94, 0x5e}, {&(0x7f00000005c0)=""/3, 0x3}, {&(0x7f0000000600)=""/27, 0x1b}, {&(0x7f0000000640)=""/217, 0xd9}, {&(0x7f0000000740)=""/253, 0xfd}], 0x8, &(0x7f00000008c0)=[@rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x70}}, {{&(0x7f0000000940), 0x6e, &(0x7f0000000ac0)=[{&(0x7f00000009c0)=""/106, 0x6a}, {&(0x7f0000000a40)=""/80, 0x50}], 0x2}}, {{0x0, 0x0, &(0x7f0000000c00)=[{&(0x7f0000000b00)=""/226, 0xe2}], 0x1, &(0x7f0000000c40)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x98}}, {{&(0x7f0000000d00), 0x6e, &(0x7f0000000dc0)=[{&(0x7f0000000d80)=""/15, 0xf}], 0x1, &(0x7f0000000e00)=[@rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x38, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x108}}, {{&(0x7f0000000f40), 0x6e, &(0x7f0000001240)=[{&(0x7f0000000fc0)=""/46, 0x2e}, {&(0x7f0000001000)=""/41, 0x29}, {&(0x7f0000001040)}, {&(0x7f0000001080)=""/245, 0xf5}, {&(0x7f0000001180)=""/140, 0x8c}], 0x5}}, {{0x0, 0x0, &(0x7f0000001780)=[{&(0x7f00000012c0)=""/84, 0x54}, {&(0x7f0000001340)=""/211, 0xd3}, {&(0x7f0000001440)=""/184, 0xb8}, {&(0x7f0000001500)=""/48, 0x30}, {&(0x7f0000001540)=""/48, 0x30}, {&(0x7f0000001580)=""/67, 0x43}, {&(0x7f0000001600)=""/247, 0xf7}, {&(0x7f0000001700)=""/119, 0x77}], 0x8, &(0x7f0000001800)=[@rights={{0x10}}, @cred={{0x1c}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x78}}, {{&(0x7f0000001880)=@abs, 0x6e, &(0x7f0000001a80)=[{&(0x7f0000001900)=""/173, 0xad}, {&(0x7f00000019c0)=""/67, 0x43}, {&(0x7f0000001a40)=""/44, 0x2c}], 0x3, &(0x7f0000001ac0)=[@cred={{0x1c}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x80}}, {{&(0x7f0000001b40)=@abs, 0x6e, &(0x7f0000003140)=[{&(0x7f0000001bc0)=""/198, 0xc6}, {&(0x7f0000001cc0)=""/4096, 0x1000}, {&(0x7f0000002cc0)=""/246, 0xf6}, {&(0x7f0000002dc0)=""/177, 0xb1}, {&(0x7f0000002e80)=""/157, 0x9d}, {&(0x7f0000002f40)=""/250, 0xfa}, {&(0x7f0000003040)=""/249, 0xf9}], 0x7, &(0x7f00000031c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x48}}, {{&(0x7f0000003240), 0x6e, &(0x7f0000004500)=[{&(0x7f00000032c0)=""/3, 0x3}, {&(0x7f0000003300)=""/209, 0xd1}, {&(0x7f0000003400)=""/4096, 0x1000}, {&(0x7f0000004400)=""/213, 0xd5}], 0x4, &(0x7f0000004540)=[@cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x128}}, {{&(0x7f0000004680), 0x6e, &(0x7f0000004a40)=[{&(0x7f0000004700)=""/123, 0x7b}, {&(0x7f0000004780)=""/71, 0x47}, {&(0x7f0000004800)=""/98, 0x62}, {&(0x7f0000004880)=""/50, 0x32}, {&(0x7f00000048c0)=""/187, 0xbb}, {&(0x7f0000004980)=""/66, 0x42}, {&(0x7f0000004a00)=""/12, 0xc}], 0x7}}], 0xa, 0x0, &(0x7f0000004d40)) ioctl$sock_inet_SIOCSIFNETMASK(r10, 0x891c, &(0x7f0000004d80)={'ip6erspan0\x00', {0x2, 0x0, @empty}}) syz_io_uring_submit(r2, r5, &(0x7f0000000200)=@IORING_OP_TEE={0x21, 0x4, 0x0, @fd_index=0x1, 0x0, 0x0, 0xff, 0xc, 0x0, {0x0, r8, r9}}, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, 0x0) mount$bind(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x64000, 0x0) [ 1132.406906] autofs4:pid:8400:autofs_fill_super: called with bogus options 15:24:24 executing program 7: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCSBRKP(r0, 0x5425, 0x9) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000040)={0x7ff, 0x3, 0x7}) 15:24:24 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x5407, &(0x7f0000000080)={0x4, 0x0, 0xffff, 0x0, 0xfd, "bb09819e2f6e8485"}) 15:24:24 executing program 3: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000001c0)='/sys/kernel/fscaps', 0xa080, 0x40) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000080)=ANY=[@ANYBLOB="000000ea5aa2640000000000", @ANYRES32=0xffffffffffffffff, @ANYBLOB='D\v\x00\x00\x00\x00\x00\x00./file0\x00']) getsockopt$inet6_udp_int(r1, 0x11, 0x63, &(0x7f0000000100), &(0x7f0000000180)=0x4) r2 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x20010, r0, 0x8000000) r3 = syz_io_uring_setup(0x7d04, &(0x7f00000002c0), &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r4, r5, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f0000000240)=[{&(0x7f0000000340)=""/142, 0x8e}], 0x1}, 0x0) r6 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r3, 0x0) syz_io_uring_submit(r6, r5, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) syz_io_uring_setup(0x78a1, &(0x7f0000000080)={0x0, 0xa91f, 0x10, 0x0, 0x3ba}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f00000002c0), &(0x7f0000000180)=0x0) r8 = io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) syz_io_uring_submit(0x0, r7, &(0x7f0000000040)=@IORING_OP_REMOVE_BUFFERS={0x1f, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x1, {0x23, r8}}, 0x7ff) r9 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCSARP(r9, 0x8955, &(0x7f0000000000)={{0x2, 0x0, @local}, {0x0, @local}, 0x20, {0x2, 0x0, @local}, 'dummy0\x00'}) recvmmsg$unix(r0, &(0x7f0000004ac0)=[{{0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000400)=""/119, 0x77}, {&(0x7f0000000480)=""/132, 0x84}, {&(0x7f0000000280)=""/45, 0x2d}, {&(0x7f0000000540)=""/94, 0x5e}, {&(0x7f00000005c0)=""/3, 0x3}, {&(0x7f0000000600)=""/27, 0x1b}, {&(0x7f0000000640)=""/217, 0xd9}, {&(0x7f0000000740)=""/253, 0xfd}], 0x8, &(0x7f00000008c0)=[@rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x70}}, {{&(0x7f0000000940), 0x6e, &(0x7f0000000ac0)=[{&(0x7f00000009c0)=""/106, 0x6a}, {&(0x7f0000000a40)=""/80, 0x50}], 0x2}}, {{0x0, 0x0, &(0x7f0000000c00)=[{&(0x7f0000000b00)=""/226, 0xe2}], 0x1, &(0x7f0000000c40)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x98}}, {{&(0x7f0000000d00), 0x6e, &(0x7f0000000dc0)=[{&(0x7f0000000d80)=""/15, 0xf}], 0x1, &(0x7f0000000e00)=[@rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x38, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x108}}, {{&(0x7f0000000f40), 0x6e, &(0x7f0000001240)=[{&(0x7f0000000fc0)=""/46, 0x2e}, {&(0x7f0000001000)=""/41, 0x29}, {&(0x7f0000001040)}, {&(0x7f0000001080)=""/245, 0xf5}, {&(0x7f0000001180)=""/140, 0x8c}], 0x5}}, {{0x0, 0x0, &(0x7f0000001780)=[{&(0x7f00000012c0)=""/84, 0x54}, {&(0x7f0000001340)=""/211, 0xd3}, {&(0x7f0000001440)=""/184, 0xb8}, {&(0x7f0000001500)=""/48, 0x30}, {&(0x7f0000001540)=""/48, 0x30}, {&(0x7f0000001580)=""/67, 0x43}, {&(0x7f0000001600)=""/247, 0xf7}, {&(0x7f0000001700)=""/119, 0x77}], 0x8, &(0x7f0000001800)=[@rights={{0x10}}, @cred={{0x1c}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x78}}, {{&(0x7f0000001880)=@abs, 0x6e, &(0x7f0000001a80)=[{&(0x7f0000001900)=""/173, 0xad}, {&(0x7f00000019c0)=""/67, 0x43}, {&(0x7f0000001a40)=""/44, 0x2c}], 0x3, &(0x7f0000001ac0)=[@cred={{0x1c}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x80}}, {{&(0x7f0000001b40)=@abs, 0x6e, &(0x7f0000003140)=[{&(0x7f0000001bc0)=""/198, 0xc6}, {&(0x7f0000001cc0)=""/4096, 0x1000}, {&(0x7f0000002cc0)=""/246, 0xf6}, {&(0x7f0000002dc0)=""/177, 0xb1}, {&(0x7f0000002e80)=""/157, 0x9d}, {&(0x7f0000002f40)=""/250, 0xfa}, {&(0x7f0000003040)=""/249, 0xf9}], 0x7, &(0x7f00000031c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x48}}, {{&(0x7f0000003240), 0x6e, &(0x7f0000004500)=[{&(0x7f00000032c0)=""/3, 0x3}, {&(0x7f0000003300)=""/209, 0xd1}, {&(0x7f0000003400)=""/4096, 0x1000}, {&(0x7f0000004400)=""/213, 0xd5}], 0x4, &(0x7f0000004540)=[@cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x128}}, {{&(0x7f0000004680), 0x6e, &(0x7f0000004a40)=[{&(0x7f0000004700)=""/123, 0x7b}, {&(0x7f0000004780)=""/71, 0x47}, {&(0x7f0000004800)=""/98, 0x62}, {&(0x7f0000004880)=""/50, 0x32}, {&(0x7f00000048c0)=""/187, 0xbb}, {&(0x7f0000004980)=""/66, 0x42}, {&(0x7f0000004a00)=""/12, 0xc}], 0x7}}], 0xa, 0x0, &(0x7f0000004d40)) ioctl$sock_inet_SIOCSIFNETMASK(r10, 0x891c, &(0x7f0000004d80)={'ip6erspan0\x00', {0x2, 0x0, @empty}}) syz_io_uring_submit(r2, r5, &(0x7f0000000200)=@IORING_OP_TEE={0x21, 0x4, 0x0, @fd_index=0x1, 0x0, 0x0, 0xff, 0xc, 0x0, {0x0, r8, r9}}, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, 0x0) mount$bind(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x64000, 0x0) 15:24:24 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x5428, 0x0) 15:24:24 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x5407, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "bb09819e2f6e8485"}) 15:24:24 executing program 6: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, 0x0) mount$bind(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x64000, 0x0) recvmmsg$unix(0xffffffffffffffff, &(0x7f0000003180)=[{{&(0x7f00000001c0)=@abs, 0x6e, &(0x7f0000000480)=[{&(0x7f0000000240)=""/153, 0x99}, {&(0x7f0000000300)=""/71, 0x47}, {&(0x7f0000000380)=""/252, 0xfc}], 0x3, &(0x7f00000034c0)=ANY=[@ANYBLOB="1c00000000000000018ea78500000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00'], 0x60}}, {{&(0x7f0000000540), 0x6e, &(0x7f0000001680)=[{&(0x7f00000005c0)=""/4096, 0x1000}, {&(0x7f00000015c0)=""/157, 0x9d}], 0x2, &(0x7f00000016c0)=[@rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x20}}, {{&(0x7f0000001700), 0x6e, &(0x7f0000001ac0)=[{&(0x7f0000001780)=""/25, 0x19}, {&(0x7f00000017c0)=""/30, 0x1e}, {&(0x7f0000001800)}, {&(0x7f0000001840)=""/76, 0x4c}, {&(0x7f00000018c0)=""/161, 0xa1}, {&(0x7f0000001980)=""/154, 0x9a}, {&(0x7f0000001a40)=""/80, 0x50}], 0x7}}, {{&(0x7f0000001b40), 0x6e, &(0x7f0000002cc0)=[{&(0x7f0000001bc0)=""/4096, 0x1000}, {&(0x7f0000002bc0)=""/173, 0xad}, {&(0x7f0000002c80)=""/14, 0xe}], 0x3, &(0x7f0000002d00)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{0x0, 0x0, &(0x7f0000003040)=[{&(0x7f0000002d40)=""/119, 0x77}, {&(0x7f0000002dc0)=""/233, 0xe9}, {&(0x7f0000002ec0)=""/64, 0x40}, {&(0x7f0000002f00)=""/25, 0x19}, {&(0x7f0000002f40)}, {&(0x7f0000002f80)=""/118, 0x76}, {&(0x7f0000003000)=""/9, 0x9}], 0x7, &(0x7f00000030c0)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0x0}}}], 0xb0}}], 0x5, 0x11000, &(0x7f00000032c0)={0x77359400}) mount$9p_tcp(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', &(0x7f0000000180), 0x4020, &(0x7f0000003300)={'trans=tcp,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@nodevmap}, {@dfltgid={'dfltgid', 0x3d, r1}}, {@nodevmap}, {@cache_none}, {@privport}, {@msize={'msize', 0x3d, 0x5}}, {@mmap}, {@debug={'debug', 0x3d, 0x9}}, {@posixacl}, {@privport}], [{@obj_user={'obj_user', 0x3d, '@},'}}]}}) stat(&(0x7f0000000000)='.\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r2, 0x0) mount$cgroup2(0x0, &(0x7f0000001800)='./file0\x00', &(0x7f0000002f40), 0x0, &(0x7f00000033c0)={[{@subsystem='rlimit'}], [{@euid_eq={'euid', 0x3d, r2}}, {@fsmagic={'fsmagic', 0x3d, 0x2}}, {@smackfsdef={'smackfsdef', 0x3d, 'nodevmap'}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@obj_user={'obj_user', 0x3d, '[+$j'}}, {@obj_role={'obj_role', 0x3d, 'cache=none'}}, {@fowner_lt={'fowner<', r0}}, {@appraise}, {@smackfshat={'smackfshat', 0x3d, '\x1b'}}, {@smackfshat={'smackfshat', 0x3d, '}&-'}}]}) 15:24:24 executing program 4: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1c08a4, 0x0) r1 = syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) open$dir(&(0x7f0000000200)='./mnt\x00', 0x40040, 0x10) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir/../file0\x00', 0x80, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x50008, 0x0, 0x10081, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r2 = openat(r1, &(0x7f0000000000)='mnt/encrypted_dir/../file0\x00', 0x40, 0x100) r3 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r3, 0x7, 0x0, 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r3, 0xc0406619, &(0x7f00000001c0)={@desc={0x1, 0x0, @desc2}}) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000140)=',,\\\x00') futimesat(r2, &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0)={{0x0, 0xea60}}) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000680)=ANY=[@ANYBLOB="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", @ANYRES32, @ANYBLOB="02000000000000006d6e742f656e637279707465645f6469722f2e2e2f66696c653000"]) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') 15:24:24 executing program 1: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) stat(&(0x7f0000000000)='.\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x9, 0x6, &(0x7f0000001340)=[{&(0x7f0000000180)="57695d6f30bcc037ad8ef699ea8c2daf7bec4abc344e1b1de1b7f869dc814dd725", 0x21, 0x647}, {&(0x7f00000001c0)="7f0c75f9b09ff7ff10433eaafeab8bfb4dbbc00bf8275272d1bc06285aefcea317953f036cf6611bf21d10e0a8a74b809d94703cf2fb86e942b90c067c", 0x3d, 0x9}, {&(0x7f0000001500)="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", 0x120, 0xcd}, {&(0x7f0000000280)="db1243e213b15859aca4621e89fbdb9d7699a774124dc1d09c2d22da4b4816ee2bba20ca740ae2b40d4a0316a6e86e9049f523b7735698cd6818666b27e043a1fe11d456f9aafa7ea5b2d85dd679516a9b20b1e14bf67ef77e8e3a253fdda207f7013e6117ad609941f225479f527c2fdc4a9ed9fbc8684de06461c2734230d3a4ac99a962c6c61f50a43d3624a65a76873503a483a9ea8122a6317b4d7899bc839197042c33bdf7e94e5181afee308f711eeb179f3e9cb95f150a5da56b193156a61545c7d1b65dc522b99a5607bb7bdaf5c507bd427457f70d7d2b0aef88fe03799a15ef5021a0664bccd21d24168630253e0e3dbb6f19c6b3eb1b9556022599bd82ed7d959556dfb2c30b262c08c6a7c8cb3d4ae6f3b925d9cfb94acc229242bdf47a7765bf92164a83d06b20804adb71e035960a844cacdb88966fa51f9b9ebf5e2b89ee9e8914e499c8ad9c12b90bb99528989bb406a3323dd57903ad195e8ec8ba07d1ccfc54579e425885981bca421ac22ea10a82f1aa4f95785b12b4dd6a4138c388f617c8ccae1df7c15e4db55ca40386e3149d4536a3d6837022ba45787383b1f9a39b2019a542bf8c2398680f8de4c0ec3fb51f3bc0223db6178b7e40c202acdf4209afc031fc7bb64bc2d8a226b3d9370ea9584c0cfb53620e380fbfad896b8eb20b3e6883a407999e9fff34e289b4743a56a1dbe9933c16674bc91d86266490398f5e8fcc3fc676e42f5f8a157ad03266ff1990d82aff71e0c74900bc165860654444f2190a1e88255688e167387065905d30d72458dbc5c943268e8f381e0e917653ef45b7b7a02017d0d9439d5ee9e7979c46682865bd4aedcc4e9ba8daf0f460aa0651c7d054a124b20502db08c9a269297631ea8b6f73c4d6eb0d8ecc115617ccf4c1f57de7eb5ca90021b58e5c555e302e38d5fd3a635c5f89b29eae8062b9501e937950d5dabedbf659bf7a2ff021295b3ee41f61931a99a671a492208680a845835f74bae6f3d61d19beca142c226d1183a53fab89f06f724b8979a0565e4e968330a2aed9956d136331335610d4b16fe3d11da155213196380ebc716c24a5f25c99826da6d96ab4352665014a98a569ec72abe0a73bd674cfdc4c878f2c21d22a2e31baecbbbc0f087958ccb85c52c21e24faa68729d023f657899105f6a9fda9427df24bfa69659dccf38e2758293e0bdb0dbac6b9d453c6c032f33fc64a60528f556d83f2b6978be68fcda9193a7abf9c93f2e7e3e1a7807a40c75bb8b3ac479d0a0bb94e35b620a399515e02f2548b309b9d82891b082caba32ce66942c9f7e57210f46e15f4b14a39638606ec8ef30d7dfeee384ca3b16190462b4578c89e9669b87d5e5db469a0459ca2772bf7dafbbb866fc35e1855dd46c12cf4ef1b2e7a669df83e4d1476d16d8d3e9c95f16d06a1c5681e0ee196152ad6f130ed57b2a35d4039bd31be7af9fbfc278c6065149a5099f925192cb7e105a70afa59d6656728f6a380ddfd27a9145a30e7782dce7e9140f2fb7a699873080ad7f6c5d56626bd9845865db2adabccc4e8a7d29390e658e43d1518ef8b025d2d1d86e7f67ed151f2ea2543eacd96f398f25857228a51003634cdf372ade446f512ee0c5485dd24b9496fc449dff0dfd1258c8fd8052362d44ee0ddc5ef3fb12ac8b1f2380b43d1bbb453635fa58b958ac482b0abf25da2bdfec0bdb19d8c3b2ec4310c3d55c3621e22a13e4f7fb92a33af55bcaab22905dc7d53496a4335b19bb36e6ceced58e2a6e218c480cde4399c1f5c2327f12cb5caf958c8ffb22552d0478eba296bbddb7b83441567a111441bf81b8b2c3bd104f05ad363a2630d19817cd0d1e3c58855368ccf4232eb82f632ca770bdc7ba513b2e712f32986a14a6bb97e7dfc5d712c6ad5600fde9bcbc918de8966a9a683c713ba771c96c1691d39e88d992e2d1253ffbea7ca4d16f103a8c5c3efd3692ab1f92dc09a13c71a1e82c5142b8151bb0cecf1f1dcfbeb06b0ff5264b02a797f84ace21993bba06982e5c8ce89391b8215aecfb7457a92e3cdd982f2f0fd1319fd987589a62920d77fd5510fe2023a47cb26afb45849972c59e547feabccd9e9b649010448becabf8186eb63020447bd34bf2bb20a6a0edc870f9ea6c3f71d89f56530fe21f12c71111f0562251b0d643da9380f4c7a4aeb88d8d6341cae36e8bcc9b4d0e8c6c93257706171e329c3a58a814fb887cc42a8aabbf9a8c8abdf800fc4faebe8980f31432226ba933a57e2420bf0342669faf42f88074f70ea02fe369588e342a5f3c5a2bb48cce1184c04c301d0eb36978fbd6645c548f3aec97dac4c24d7d4822f1c980da21f99553a922054790bbec1bddc744e693e41faffe2fbffe86c5b746ff31088f5173a17513618c93340cc40666d2d6a8c9a621a20736753c4e7a7d17cf010eb5f6ae86fcf650ce8bdb87374c01370722ea8326c543a7efff4a226062dde216cd3545230aafea2ffb8c64d28afa991a6137b3c0827aa92839f0978faaac0074fc090decf3bef45a9b9935dc67cc1fbd6a2b50e1778b0213b6af6c1e90686194c0ae37172719807de6bf31f6780f46507c51d1c9652c98207d59823ca02f4445e2a6594b503c126f2dcbe6cb57c49cd637e4ae285660cad3c64b833d88f4cc47616c278dba8dd7ab9d99e4be3b738e19bd6d4f81cea51f51ed4348e99a5a83fe215962cb8361eb3391c660abf04254e6384adfb15fa4d4407676c34456307472ecde73a9f6b2c4cd15ff74bf640380cee125cc1e19a184ad34150d68eaa83a616f826c98f2d737325fb8e35bec28098d6ae4f3d5299805e39a957cb3b8ede953586592a832860276ff1d09d120cdedd74d1847fcbb02eab85184c81ee91318f59759db5578a3d59613be5840add77998a41b18ef1e83887ba335fbc7e9efb964de584b8495f43d7d1efc23f5916606b614ab5b04b5b28e109e2b3b2ea27017a516bc82163548789adbae00331a78a03e304ed5db23ff92757f0feaf98268e69d3c6a465efe9a3b6e54cb0337ec417259baa3370aec464a72f89c26514150ea8420cb9fdbcc274d344d65c00d0424f64388add410b3946e2ae2404ff1af14848751d18e752f83c59343c8dd62f39928f4f7d3dd23c9ea1c2d5b5a19d3fbce3f355bbf3740de55e191abf77e8664b10c86b5febd4920cd9c097fdcf1064da5b8d3af548a478e4bad5d74467198917032dff73c8542965245f10dc4c450c061c66d38b0b9bd002c9f8dfc6e48ce75bbf9c1cf4d8b7d5cbf2911d48e2b601fbed63f9f42a205d57f4204572a7d47d910e6ec5f517f10d83dd43cb7316c86d3838cc3fb59de65a4afe279acf30db6193b8a88ecca7d0490ee60a29b732daadf1aed9c474e2bc98a184a2e0ea4ec42c5a22640c89d5bcdea00adf20dc0d9a3904dd63307e1ca5e247cb431222a929e5097a166e5f29505085447ba8ddf92703c487ad8f9e1f9345cd6039bf6c90ba7c64bfacc7bfff9d4e5ea579beed6f65657cfe09a511f5197b1a195b9b73018554779d7eca29b4105f5fda7cee4e4d108d0e8af3de018ba40bb0c012dcfe078f158a28be11e8f15e9ec628c13c4378ac7d905e31fbe6ad68bf56b2f6bf0728438545120b792f4ced36e94c9c392f9c72366b02d59442bd67e5493e188cac7da0788193c41148327cb9deb52eca9d3ee2625c2643f41e1f9b196eab4d349b1128d44b15ac9ec434689789f68440e6501e6d9323121e2b82ff5b866747450e3b3db7258b391b7502d4a5d1283ed540a7cc6228f1704990421e1b2177dbcee21b67b099703faee52e68010a28d426c6d59450e783cc8136818ca4d70ef23589e02ace8ec86ab17dfcd2d23ef4b729bd1c29e10acd92726b25ef86f2158bc56e20ee297ca199b4d982a4dddfc149e55dd8169a6320df8b842670d2d3321f524a4f1e52dc73c27ebb4396dd51936e37e0fd22805ed29ddc2acf4357db205dfdca1aa8e60f1faeaf39b9e907611887ac61a567ff693967c66ca45ad29402675bb11702be47346d357f175074be09d5155cbde27bd30eceb95aecaa6073b48c7331b6c7fa668926b7bd7249013ecebb2a81e01e2ff1b2e938aa60056b6081d54a2573387a2d2f3f07f6e357ca4d17859028c43d38a588852d4596602b9af26db17d14245d7096b66661824fa1f965424fe5aa899fe966b0f44bcc89b30032c3a456a13627099012992907ca9b8ae237a968638e1c7d678dde943a947357e1d5a178814883036ed91c4728038f90d13567d3095af307e0d217d17e64eba923d46b8f87be1f15798e3fb4d477f5164fdbfc4c7153e3d98903619e4f88633d8a52dbc79b7986400a9a5ddcc71ea2fc54de4a6d2f7f24e419c5bfa552340420bcb4fbade6f9df9ce703917a7c04baad10f1b5a9c1a411483a126fc023220135d1e5d41decd36ca39220b6aab88b718935f1d0ecde34585998840d642532a0b3348dc352c4666442fc2b19859796eeb8fdbb04e798aaa47c02c481c45ec8a00966a4320dc93dbecc699acd5fc24f3fe1c9bc0af05f778084b48ad586fc9bbd4d4699de600d7fd4b595047529b46412a98473aaf4740fca4b1cae3d1b28625103d22845e5a51ab3a8b68303e169df669c96b7154845e4717473b86a5e654325076ca017833bbaf364468eb84639806f147d499b4023d8a6a3e1fbc5c041784f04098564dd7640e1ab443b805d7022c758f5b410f8f07c8454d27d0583cb4d10b7881a4d6b5c59fcc67dcd9e414a3014c669a212d4c4815dff7c7287b8eb4fd7edcd633b05c71481850bb8ceb257017494a408c6d13f6c313e416e4a86ee0f6691e633bbea94c543770747bec64e2c93b83be0ef68bac3cf9eaac398bedf6a2bf11f596c1ce956f1d8ea38439915d286aadf7b01efef4411cd9a23f4ba0a23c2f36d3ceec1b859dd0aab6c4747cffdda8c08711bbf7f3d70879ecdaed52f1fc5947fce981d2def3cfa8a23a52073f3b0698962500a22debf3c2de4c89942947a580a48342a6da355072ada1aecae073c8a49bb85c20cdaa35a143bda84cfed80a1d7219f3d774be236b57b24cc8bdc03313cb2edc76b93bd493922cfbaf2e379a82e972d9241747ff32eefc42e865bdee2ecf0ed56c64f61dc98959e1da635da379ad5319992e397d78dbb275c2fe16627c8c9afad58aaee0b886d561d3bbb3fffe780cf614bc5ac3bd99f4a11a4910cba7031a1eb6ab8a95c3dc6ed10fa534d506c368ed6629960b7a13b3e15c29a183be2d4022ec1fb9f2ceb59f867bb1708588fb398edc35ce8a3ed51cead457bacf8e53e28ccf510b3758eb8d06d7a70b10e1accc3e025e37f6db2b852456c1dd7c25084b630c7d26c3fbe0ce803e914fd160ebb701a47e1ab29d6fb438be981764315143894a1ed280a92006016886c558324271c9341e18f385e8a658fe9e29604148216144c4296fee5f2964d2fdde0d559819893e21e3c74cc3d04399a587f106044df7276b2e9f3ac984d2a71ab624a8204742810b9b4a86b50dcd89e154a588035165571388679d2537c68d57ee56fac2da626ed3a56324609cac640031334b4f878c0ddcf1a7fb8de22165fb54995d5bd9dfd45667e272adc0837410e19b7f27e0a5258c098dd2a29f329649a87e59f1ddac9424281abe4ba0c4f6830abac605685d85af49b291238d8bcbdac0d932ba029bd923988babd4d7e1f990e28edef09347da4f58129304a7732b0970ef71cbca09f87b9aa567702a5fdd670bedc920fab605f", 0x1000, 0x4}, {&(0x7f0000001280)="aeab75e37f03d6f1ee7ff7d376da482f1462f85ef43fe79cd0b2682e060d5f94aeae7616d3ad9f4404893c20218b130a40e0466938aa8cbb72a25a695895d646cd14b18958946e4d15ccb913cdc6", 0x4e, 0x8}, {&(0x7f0000001300)="08c68103b313", 0x6, 0x9}], 0x96e883c5464a35df, &(0x7f0000001400)={[{@mode={'mode', 0x3d, 0x7f}}], [{@subj_role={'subj_role', 0x3d, 'proc\x00'}}, {@dont_hash}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@euid_eq={'euid', 0x3d, r0}}, {@appraise_type}, {@fsuuid={'fsuuid', 0x3d, {[0x33, 0x37, 0x36, 0x63, 0x33, 0x36, 0x63, 0x39], 0x2d, [0x36, 0x35, 0x37, 0x61], 0x2d, [0x35, 0x33, 0x63], 0x2d, [0x62, 0x33, 0x36, 0xff], 0x2d, [0x38, 0x64, 0x32, 0x37, 0x33, 0x66, 0x39, 0x65]}}}, {@obj_role={'obj_role', 0x3d, 'proc\x00'}}]}) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, 0x0) mount$bind(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x64000, 0x0) 15:24:24 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x5429, 0x0) [ 1146.888229] proc: Unknown parameter 'trans' 15:24:24 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x5407, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, '\x00\x00H\x00'}) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r1, 0x7, 0x0, 0x0, 0x0) ioctl$TIOCSCTTY(r1, 0x540e, 0x75e) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x4, 0x2, &(0x7f0000000180)=[{&(0x7f00000000c0)="95020fbff3e78427bcdf85976e104803bcc3769ac4f6c7514d44993e3370370bbbbe98151058c2d88dc18d5b375f30f75cf461ec67346e61cbf8b0b13d01deac80f2ecdeef67a8", 0x47}, {&(0x7f0000000140)="8fe2317e259ad3884f0c3d05f619253ad992cf32d20127474d3b06f1dc", 0x1d, 0x7f}], 0xa4030, &(0x7f00000001c0)={[{@nocompress}, {@dmode={'dmode', 0x3d, 0x2}}, {@check_relaxed}, {@nojoliet}, {@dmode={'dmode', 0x3d, 0x1}}, {@cruft}], [{@appraise_type}, {@permit_directio}, {@subj_role={'subj_role', 0x3d, ':'}}, {@smackfsdef}, {@fowner_eq={'fowner', 0x3d, 0xee01}}, {@obj_user={'obj_user', 0x3d, ',++&@:$\''}}, {@smackfstransmute={'smackfstransmute', 0x3d, '&+},\x00'}}, {@obj_type={'obj_type', 0x3d, '\'$}}'}}]}) 15:24:24 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x5407, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "bb09819e2f6e8485"}) 15:24:24 executing program 4: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1c08a4, 0x0) r1 = syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) open$dir(&(0x7f0000000200)='./mnt\x00', 0x40040, 0x10) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir/../file0\x00', 0x80, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x50008, 0x0, 0x10081, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r2 = openat(r1, &(0x7f0000000000)='mnt/encrypted_dir/../file0\x00', 0x40, 0x100) r3 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r3, 0x7, 0x0, 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r3, 0xc0406619, &(0x7f00000001c0)={@desc={0x1, 0x0, @desc2}}) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000140)=',,\\\x00') futimesat(r2, &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0)={{0x0, 0xea60}}) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000680)=ANY=[@ANYBLOB="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", @ANYRES32, @ANYBLOB="02000000000000006d6e742f656e637279707465645f6469722f2e2e2f66696c653000"]) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') 15:24:24 executing program 1: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x20800, 0x127) mkdirat(r0, &(0x7f0000000100)='./file0\x00', 0x20) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, 0x0) mount$bind(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x64000, 0x0) 15:24:24 executing program 6: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, 0x0) mount$bind(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x64000, 0x0) recvmmsg$unix(0xffffffffffffffff, &(0x7f0000003180)=[{{&(0x7f00000001c0)=@abs, 0x6e, &(0x7f0000000480)=[{&(0x7f0000000240)=""/153, 0x99}, {&(0x7f0000000300)=""/71, 0x47}, {&(0x7f0000000380)=""/252, 0xfc}], 0x3, &(0x7f00000034c0)=ANY=[@ANYBLOB="1c00000000000000018ea78500000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00'], 0x60}}, {{&(0x7f0000000540), 0x6e, &(0x7f0000001680)=[{&(0x7f00000005c0)=""/4096, 0x1000}, {&(0x7f00000015c0)=""/157, 0x9d}], 0x2, &(0x7f00000016c0)=[@rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x20}}, {{&(0x7f0000001700), 0x6e, &(0x7f0000001ac0)=[{&(0x7f0000001780)=""/25, 0x19}, {&(0x7f00000017c0)=""/30, 0x1e}, {&(0x7f0000001800)}, {&(0x7f0000001840)=""/76, 0x4c}, {&(0x7f00000018c0)=""/161, 0xa1}, {&(0x7f0000001980)=""/154, 0x9a}, {&(0x7f0000001a40)=""/80, 0x50}], 0x7}}, {{&(0x7f0000001b40), 0x6e, &(0x7f0000002cc0)=[{&(0x7f0000001bc0)=""/4096, 0x1000}, {&(0x7f0000002bc0)=""/173, 0xad}, {&(0x7f0000002c80)=""/14, 0xe}], 0x3, &(0x7f0000002d00)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{0x0, 0x0, &(0x7f0000003040)=[{&(0x7f0000002d40)=""/119, 0x77}, {&(0x7f0000002dc0)=""/233, 0xe9}, {&(0x7f0000002ec0)=""/64, 0x40}, {&(0x7f0000002f00)=""/25, 0x19}, {&(0x7f0000002f40)}, {&(0x7f0000002f80)=""/118, 0x76}, {&(0x7f0000003000)=""/9, 0x9}], 0x7, &(0x7f00000030c0)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0x0}}}], 0xb0}}], 0x5, 0x11000, &(0x7f00000032c0)={0x77359400}) mount$9p_tcp(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', &(0x7f0000000180), 0x4020, &(0x7f0000003300)={'trans=tcp,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@nodevmap}, {@dfltgid={'dfltgid', 0x3d, r1}}, {@nodevmap}, {@cache_none}, {@privport}, {@msize={'msize', 0x3d, 0x5}}, {@mmap}, {@debug={'debug', 0x3d, 0x9}}, {@posixacl}, {@privport}], [{@obj_user={'obj_user', 0x3d, '@},'}}]}}) stat(&(0x7f0000000000)='.\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r2, 0x0) mount$cgroup2(0x0, &(0x7f0000001800)='./file0\x00', &(0x7f0000002f40), 0x0, &(0x7f00000033c0)={[{@subsystem='rlimit'}], [{@euid_eq={'euid', 0x3d, r2}}, {@fsmagic={'fsmagic', 0x3d, 0x2}}, {@smackfsdef={'smackfsdef', 0x3d, 'nodevmap'}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@obj_user={'obj_user', 0x3d, '[+$j'}}, {@obj_role={'obj_role', 0x3d, 'cache=none'}}, {@fowner_lt={'fowner<', r0}}, {@appraise}, {@smackfshat={'smackfshat', 0x3d, '\x1b'}}, {@smackfshat={'smackfshat', 0x3d, '}&-'}}]}) 15:24:24 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x5407, &(0x7f0000000080)={0x4, 0x0, 0xffff, 0x0, 0xfd, "bb09819e2f6e8485"}) [ 1147.083979] proc: Unknown parameter 'trans' 15:24:39 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x5407, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "bb09819e2f6e8485"}) 15:24:39 executing program 0: ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, &(0x7f00000000c0)="4955a5404d459d2e75d57aaf0407a12e029bca2fdb2450d45841c80d36b423e8293ba676e42196119882e753bb4a0e24351ce66e9575a37d2509c749b87f9cefc88271fdd336272feed71a9f480739bc0a9adc6fc87582465d3ac378f8db870a5edd92390951b345946065c8b5532c446dbcbee1a42b792237cc4a42e40e7975450817d61090ab20b96b6bdf86a50905c9e7fb7c50419fa08b124950d136b69665e0e5f890e1f5d10205bb8a78c9057ed2c3e3a57648105249a5deebbd3a52efe1429dff71f6c4e11aa41984098f154db32ce3946fb0871f9d00376b2d3204fbd0925be63c06bce25698fcc0") r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x5407, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "bb09819e2f6e8485"}) 15:24:39 executing program 7: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCSBRKP(r0, 0x5425, 0x994a) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r1, 0x7, 0x0, 0x0, 0x0) ioctl$TIOCOUTQ(r1, 0x5411, &(0x7f0000000040)) r2 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r2, 0x7, 0x0, 0x0, 0x0) ioctl$KDSETMODE(r2, 0x4b3a, 0x0) 15:24:39 executing program 6: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, 0x0) mount$bind(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x64000, 0x0) recvmmsg$unix(0xffffffffffffffff, &(0x7f0000003180)=[{{&(0x7f00000001c0)=@abs, 0x6e, &(0x7f0000000480)=[{&(0x7f0000000240)=""/153, 0x99}, {&(0x7f0000000300)=""/71, 0x47}, {&(0x7f0000000380)=""/252, 0xfc}], 0x3, &(0x7f00000034c0)=ANY=[@ANYBLOB="1c00000000000000018ea78500000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00'], 0x60}}, {{&(0x7f0000000540), 0x6e, &(0x7f0000001680)=[{&(0x7f00000005c0)=""/4096, 0x1000}, {&(0x7f00000015c0)=""/157, 0x9d}], 0x2, &(0x7f00000016c0)=[@rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x20}}, {{&(0x7f0000001700), 0x6e, &(0x7f0000001ac0)=[{&(0x7f0000001780)=""/25, 0x19}, {&(0x7f00000017c0)=""/30, 0x1e}, {&(0x7f0000001800)}, {&(0x7f0000001840)=""/76, 0x4c}, {&(0x7f00000018c0)=""/161, 0xa1}, {&(0x7f0000001980)=""/154, 0x9a}, {&(0x7f0000001a40)=""/80, 0x50}], 0x7}}, {{&(0x7f0000001b40), 0x6e, &(0x7f0000002cc0)=[{&(0x7f0000001bc0)=""/4096, 0x1000}, {&(0x7f0000002bc0)=""/173, 0xad}, {&(0x7f0000002c80)=""/14, 0xe}], 0x3, &(0x7f0000002d00)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{0x0, 0x0, &(0x7f0000003040)=[{&(0x7f0000002d40)=""/119, 0x77}, {&(0x7f0000002dc0)=""/233, 0xe9}, {&(0x7f0000002ec0)=""/64, 0x40}, {&(0x7f0000002f00)=""/25, 0x19}, {&(0x7f0000002f40)}, {&(0x7f0000002f80)=""/118, 0x76}, {&(0x7f0000003000)=""/9, 0x9}], 0x7, &(0x7f00000030c0)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0x0}}}], 0xb0}}], 0x5, 0x11000, &(0x7f00000032c0)={0x77359400}) mount$9p_tcp(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', &(0x7f0000000180), 0x4020, &(0x7f0000003300)={'trans=tcp,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@nodevmap}, {@dfltgid={'dfltgid', 0x3d, r1}}, {@nodevmap}, {@cache_none}, {@privport}, {@msize={'msize', 0x3d, 0x5}}, {@mmap}, {@debug={'debug', 0x3d, 0x9}}, {@posixacl}, {@privport}], [{@obj_user={'obj_user', 0x3d, '@},'}}]}}) stat(&(0x7f0000000000)='.\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r2, 0x0) mount$cgroup2(0x0, &(0x7f0000001800)='./file0\x00', &(0x7f0000002f40), 0x0, &(0x7f00000033c0)={[{@subsystem='rlimit'}], [{@euid_eq={'euid', 0x3d, r2}}, {@fsmagic={'fsmagic', 0x3d, 0x2}}, {@smackfsdef={'smackfsdef', 0x3d, 'nodevmap'}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@obj_user={'obj_user', 0x3d, '[+$j'}}, {@obj_role={'obj_role', 0x3d, 'cache=none'}}, {@fowner_lt={'fowner<', r0}}, {@appraise}, {@smackfshat={'smackfshat', 0x3d, '\x1b'}}, {@smackfshat={'smackfshat', 0x3d, '}&-'}}]}) 15:24:39 executing program 4: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1c08a4, 0x0) r1 = syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) open$dir(&(0x7f0000000200)='./mnt\x00', 0x40040, 0x10) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir/../file0\x00', 0x80, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x50008, 0x0, 0x10081, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r2 = openat(r1, &(0x7f0000000000)='mnt/encrypted_dir/../file0\x00', 0x40, 0x100) r3 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r3, 0x7, 0x0, 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r3, 0xc0406619, &(0x7f00000001c0)={@desc={0x1, 0x0, @desc2}}) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000140)=',,\\\x00') futimesat(r2, &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0)={{0x0, 0xea60}}) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000680)=ANY=[@ANYBLOB="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", @ANYRES32, @ANYBLOB="02000000000000006d6e742f656e637279707465645f6469722f2e2e2f66696c653000"]) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') 15:24:39 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x5407, &(0x7f0000000080)={0x4, 0x0, 0xffff, 0x0, 0xfd, "bb09819e2f6e8485"}) 15:24:39 executing program 1: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x408, 0x0) stat(&(0x7f0000000000)='.\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r0, 0x0) syz_mount_image$nfs4(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x200, 0x3, &(0x7f0000000340)=[{&(0x7f0000000180)="0ebc507d5261c4ef4ba9966e5000ecaba13509bdee01c46f23934c26b77b6fa35e85c70eb49c2aab611205bb251d1b7ce1f787dab0aa34db9428c19a5f372254a662fdef0d862d77fcbdc15c9990c5285405f92966b072855bbc6f6edb629ff3cd28fcd37fe0b411d654cfaa449151b479d8c38db8a1595963c2e7bea9e6f6a33f8f92ba1c1334cf23d72005ab24d86e435d40ab64c0eaeb6b2c55ae7b674bfdc354dcb8f64172ba60ba2c98ff6bed213766ea7048dd46e2f397f161e3d948fd70c870e5e00d0c0d623df094d869fac9f6a32f098d7fd783ae5b2654273deb2b84c794837fb8c9", 0xe7, 0x8}, {&(0x7f0000000280)="d70c83ac929c3f22838400f1aa6037917dc47f1084e0b8487645fec78f1e49330932fb0411f14657a41fd8aefa502485b5ca7ea98c280522370363b56c4310b63d6ca822ae8b25870438cea32c52e8fa5416c36ab1b99414a69c756f383f7cbe0cd4a47628ba6e6146cc241d8e522a87d0a697ceb8d069a1ca08430a", 0x7c, 0x3}, {&(0x7f0000000300)="b2fc993a17637039c5da8ab0306c556af46f065678a83b5aa44ce16b5fe4d635296143", 0x23, 0x7ff}], 0x802000, &(0x7f00000003c0)={[{'cgroup2\x00'}, {'.+'}, {'cgroup2\x00'}, {'/\'\\-#'}], [{@obj_role={'obj_role', 0x3d, 'cgroup2\x00'}}, {@pcr={'pcr', 0x3d, 0x2d}}, {@uid_eq={'uid', 0x3d, r0}}]}) mount$bind(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x64000, 0x0) 15:24:39 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x5437, 0x0) [ 1161.807365] proc: Unknown parameter 'trans' 15:24:39 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000000)={{0x2, 0x0, @local}, {0x0, @local}, 0x20, {0x2, 0x0, @local}, 'veth0_virt_wifi\x00'}) ioctl(r0, 0x1000, &(0x7f0000000000)="8c7bebebb8abd1473bc095a874cf8f238b350fece612f7d7d7044a2bbe7bcf8b7eb402c59ee762c73b6ff97db67d918631f7") r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) r2 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r2, 0x7, 0x0, 0x0, 0x0) ioctl$TIOCL_SETSEL(r2, 0x541c, &(0x7f0000000100)={0x2, {0x2, 0xfffb, 0x9, 0x5, 0x2}}) ioctl$TCSETAW(r1, 0x5407, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x9, '\x00\x00\x00\x00\x00\x00\x00\a'}) dup2(r0, r1) r3 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r3, 0x7, 0x0, 0x0, 0x0) ioctl$TIOCL_SETSEL(r3, 0x541c, &(0x7f00000000c0)={0x2, {0x2, 0xffff, 0x7, 0x3, 0x3a}}) 15:24:39 executing program 1: r0 = syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000240)='./file0/file0\x00', 0x101600, 0x1) mount$bind(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x64000, 0x0) unlinkat(r0, &(0x7f0000000200)='./file0/file0\x00', 0x200) mount(&(0x7f0000000080)=@nullb, &(0x7f0000000100)='./file0/file0\x00', &(0x7f0000000180)='omfs\x00', 0x2a23090, &(0x7f00000001c0)='proc\x00') 15:24:39 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x5407, &(0x7f0000000080)={0x4, 0x0, 0xffff, 0x0, 0xfd, "bb09819e2f6e8485"}) 15:24:39 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x5441, 0x0) 15:24:39 executing program 5: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x408, 0x0) stat(&(0x7f0000000000)='.\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r0, 0x0) syz_mount_image$nfs4(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x200, 0x3, &(0x7f0000000340)=[{&(0x7f0000000180)="0ebc507d5261c4ef4ba9966e5000ecaba13509bdee01c46f23934c26b77b6fa35e85c70eb49c2aab611205bb251d1b7ce1f787dab0aa34db9428c19a5f372254a662fdef0d862d77fcbdc15c9990c5285405f92966b072855bbc6f6edb629ff3cd28fcd37fe0b411d654cfaa449151b479d8c38db8a1595963c2e7bea9e6f6a33f8f92ba1c1334cf23d72005ab24d86e435d40ab64c0eaeb6b2c55ae7b674bfdc354dcb8f64172ba60ba2c98ff6bed213766ea7048dd46e2f397f161e3d948fd70c870e5e00d0c0d623df094d869fac9f6a32f098d7fd783ae5b2654273deb2b84c794837fb8c9", 0xe7, 0x8}, {&(0x7f0000000280)="d70c83ac929c3f22838400f1aa6037917dc47f1084e0b8487645fec78f1e49330932fb0411f14657a41fd8aefa502485b5ca7ea98c280522370363b56c4310b63d6ca822ae8b25870438cea32c52e8fa5416c36ab1b99414a69c756f383f7cbe0cd4a47628ba6e6146cc241d8e522a87d0a697ceb8d069a1ca08430a", 0x7c, 0x3}, {&(0x7f0000000300)="b2fc993a17637039c5da8ab0306c556af46f065678a83b5aa44ce16b5fe4d635296143", 0x23, 0x7ff}], 0x802000, &(0x7f00000003c0)={[{'cgroup2\x00'}, {'.+'}, {'cgroup2\x00'}, {'/\'\\-#'}], [{@obj_role={'obj_role', 0x3d, 'cgroup2\x00'}}, {@pcr={'pcr', 0x3d, 0x2d}}, {@uid_eq={'uid', 0x3d, r0}}]}) mount$bind(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x64000, 0x0) 15:24:39 executing program 6: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, 0x0) mount$bind(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x64000, 0x0) recvmmsg$unix(0xffffffffffffffff, &(0x7f0000003180)=[{{&(0x7f00000001c0)=@abs, 0x6e, &(0x7f0000000480)=[{&(0x7f0000000240)=""/153, 0x99}, {&(0x7f0000000300)=""/71, 0x47}, {&(0x7f0000000380)=""/252, 0xfc}], 0x3, &(0x7f00000034c0)=ANY=[@ANYBLOB="1c00000000000000018ea78500000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00'], 0x60}}, {{&(0x7f0000000540), 0x6e, &(0x7f0000001680)=[{&(0x7f00000005c0)=""/4096, 0x1000}, {&(0x7f00000015c0)=""/157, 0x9d}], 0x2, &(0x7f00000016c0)=[@rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x20}}, {{&(0x7f0000001700), 0x6e, &(0x7f0000001ac0)=[{&(0x7f0000001780)=""/25, 0x19}, {&(0x7f00000017c0)=""/30, 0x1e}, {&(0x7f0000001800)}, {&(0x7f0000001840)=""/76, 0x4c}, {&(0x7f00000018c0)=""/161, 0xa1}, {&(0x7f0000001980)=""/154, 0x9a}, {&(0x7f0000001a40)=""/80, 0x50}], 0x7}}, {{&(0x7f0000001b40), 0x6e, &(0x7f0000002cc0)=[{&(0x7f0000001bc0)=""/4096, 0x1000}, {&(0x7f0000002bc0)=""/173, 0xad}, {&(0x7f0000002c80)=""/14, 0xe}], 0x3, &(0x7f0000002d00)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{0x0, 0x0, &(0x7f0000003040)=[{&(0x7f0000002d40)=""/119, 0x77}, {&(0x7f0000002dc0)=""/233, 0xe9}, {&(0x7f0000002ec0)=""/64, 0x40}, {&(0x7f0000002f00)=""/25, 0x19}, {&(0x7f0000002f40)}, {&(0x7f0000002f80)=""/118, 0x76}, {&(0x7f0000003000)=""/9, 0x9}], 0x7, &(0x7f00000030c0)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0x0}}}], 0xb0}}], 0x5, 0x11000, &(0x7f00000032c0)={0x77359400}) mount$9p_tcp(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', &(0x7f0000000180), 0x4020, &(0x7f0000003300)={'trans=tcp,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@nodevmap}, {@dfltgid={'dfltgid', 0x3d, r0}}, {@nodevmap}, {@cache_none}, {@privport}, {@msize={'msize', 0x3d, 0x5}}, {@mmap}, {@debug={'debug', 0x3d, 0x9}}, {@posixacl}, {@privport}], [{@obj_user={'obj_user', 0x3d, '@},'}}]}}) stat(&(0x7f0000000000)='.\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r1, 0x0) 15:24:39 executing program 4: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1c08a4, 0x0) r1 = syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) open$dir(&(0x7f0000000200)='./mnt\x00', 0x40040, 0x10) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir/../file0\x00', 0x80, 0x0) r2 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x50008, 0x0, 0x10081, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r3 = openat(r1, &(0x7f0000000000)='mnt/encrypted_dir/../file0\x00', 0x40, 0x100) r4 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r4, 0x7, 0x0, 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r4, 0xc0406619, &(0x7f00000001c0)={@desc={0x1, 0x0, @desc2}}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, 0x0) futimesat(r3, &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0)={{0x0, 0xea60}}) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000680)=ANY=[@ANYBLOB="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", @ANYRES32, @ANYBLOB="02000000000000006d6e742f656e637279707465645f6469722f2e2e2f66696c653000"]) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') 15:24:39 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x5450, 0x0) [ 1162.032389] proc: Unknown parameter 'trans' 15:24:39 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x5407, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "bb09819e2f6e8485"}) ioctl$TIOCSSOFTCAR(0xffffffffffffffff, 0x541a, &(0x7f0000000040)=0xb00) r1 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.pending_reads\x00', 0x101040, 0x2) ioctl$TIOCNOTTY(r1, 0x5422) 15:24:53 executing program 7: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x41a002, 0x0) ioctl$TCSBRKP(r0, 0x5425, 0x994a) 15:24:53 executing program 3: ioctl$TCSETAW(0xffffffffffffffff, 0x5407, &(0x7f0000000080)={0x4, 0x0, 0xffff, 0x0, 0xfd, "bb09819e2f6e8485"}) 15:24:53 executing program 5: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1c08a4, 0x0) r1 = syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) open$dir(&(0x7f0000000200)='./mnt\x00', 0x40040, 0x10) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir/../file0\x00', 0x80, 0x0) r2 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x50008, 0x0, 0x10081, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r3 = openat(r1, &(0x7f0000000000)='mnt/encrypted_dir/../file0\x00', 0x40, 0x100) r4 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r4, 0x7, 0x0, 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r4, 0xc0406619, &(0x7f00000001c0)={@desc={0x1, 0x0, @desc2}}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, 0x0) futimesat(r3, &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0)={{0x0, 0xea60}}) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000680)=ANY=[@ANYBLOB="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", @ANYRES32, @ANYBLOB="02000000000000006d6e742f656e637279707465645f6469722f2e2e2f66696c653000"]) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') 15:24:53 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCSARP(r2, 0x8955, &(0x7f0000000000)={{0x2, 0x0, @local}, {0x0, @local}, 0x20, {0x2, 0x0, @local}, 'dummy0\x00'}) fallocate(r2, 0x44, 0x5462, 0xff) fsconfig$FSCONFIG_CMD_RECONFIGURE(r1, 0x7, 0x0, 0x0, 0x0) ioctl$TIOCGSOFTCAR(r1, 0x5419, &(0x7f0000000000)) ioctl$TCSETAW(r0, 0x5407, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "bb09819e2f6e8485"}) 15:24:53 executing program 1: connect$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x4e22, @local}, 0x10) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, 0x0) mount$bind(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x64000, 0x0) 15:24:53 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x5451, 0x0) 15:24:53 executing program 6: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, 0x0) mount$bind(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x64000, 0x0) recvmmsg$unix(0xffffffffffffffff, &(0x7f0000003180)=[{{&(0x7f00000001c0)=@abs, 0x6e, &(0x7f0000000480)=[{&(0x7f0000000240)=""/153, 0x99}, {&(0x7f0000000300)=""/71, 0x47}, {&(0x7f0000000380)=""/252, 0xfc}], 0x3, &(0x7f00000034c0)=ANY=[@ANYBLOB="1c00000000000000018ea78500000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00'], 0x60}}, {{&(0x7f0000000540), 0x6e, &(0x7f0000001680)=[{&(0x7f00000005c0)=""/4096, 0x1000}, {&(0x7f00000015c0)=""/157, 0x9d}], 0x2, &(0x7f00000016c0)=[@rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x20}}, {{&(0x7f0000001700), 0x6e, &(0x7f0000001ac0)=[{&(0x7f0000001780)=""/25, 0x19}, {&(0x7f00000017c0)=""/30, 0x1e}, {&(0x7f0000001800)}, {&(0x7f0000001840)=""/76, 0x4c}, {&(0x7f00000018c0)=""/161, 0xa1}, {&(0x7f0000001980)=""/154, 0x9a}, {&(0x7f0000001a40)=""/80, 0x50}], 0x7}}, {{&(0x7f0000001b40), 0x6e, &(0x7f0000002cc0)=[{&(0x7f0000001bc0)=""/4096, 0x1000}, {&(0x7f0000002bc0)=""/173, 0xad}, {&(0x7f0000002c80)=""/14, 0xe}], 0x3, &(0x7f0000002d00)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{0x0, 0x0, &(0x7f0000003040)=[{&(0x7f0000002d40)=""/119, 0x77}, {&(0x7f0000002dc0)=""/233, 0xe9}, {&(0x7f0000002ec0)=""/64, 0x40}, {&(0x7f0000002f00)=""/25, 0x19}, {&(0x7f0000002f40)}, {&(0x7f0000002f80)=""/118, 0x76}, {&(0x7f0000003000)=""/9, 0x9}], 0x7, &(0x7f00000030c0)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0x0}}}], 0xb0}}], 0x5, 0x11000, &(0x7f00000032c0)={0x77359400}) mount$9p_tcp(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', &(0x7f0000000180), 0x4020, &(0x7f0000003300)={'trans=tcp,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@nodevmap}, {@dfltgid={'dfltgid', 0x3d, r0}}, {@nodevmap}, {@cache_none}, {@privport}, {@msize={'msize', 0x3d, 0x5}}, {@mmap}, {@debug={'debug', 0x3d, 0x9}}, {@posixacl}, {@privport}], [{@obj_user={'obj_user', 0x3d, '@},'}}]}}) stat(&(0x7f0000000000)='.\x00', &(0x7f00000001c0)) 15:24:53 executing program 4: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1c08a4, 0x0) r1 = syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) open$dir(&(0x7f0000000200)='./mnt\x00', 0x40040, 0x10) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir/../file0\x00', 0x80, 0x0) r2 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x50008, 0x0, 0x10081, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r3 = openat(r1, &(0x7f0000000000)='mnt/encrypted_dir/../file0\x00', 0x40, 0x100) r4 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r4, 0x7, 0x0, 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r4, 0xc0406619, &(0x7f00000001c0)={@desc={0x1, 0x0, @desc2}}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, 0x0) futimesat(r3, &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0)={{0x0, 0xea60}}) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000680)=ANY=[@ANYBLOB="b00900000000000018000000468a29458f2709d329f6d3f3917408961482081d984538af2f9bcf61c448afbaa0be3f00000000000000ca4aa56fc413a417324e8530165c3515981e2d28f7fce9ae3c6bb8fa04ff6411132c9ced479abaeea325c2205ea95984d3d7f98eea1cca02dfeb0b2471b497fbb71b60180d35e2a3394ba6d965f41c7b7bc29d4e3ca95bd7ad074a4242ec98a69ad9d1546ce18cbbd98d2e50688e958a0fcd16876ab83cdb94eeb03e42203f267a1bf6ccb1c07ad92e6e493149da32f754251ae74d30cd4b50eefd6a208172ed8693b320eda714bdd152b484d9c939b4bb777dddd947843d73529f5ffe589777254cb10f733351e0739a3a61c3b8f977517ee7becda66da23a93e3be8ed63bda262951b32f72c1c48ee63be474eafaa255074efaa494b950f48b119c76c70b833e4d7443b691dc97bf78bcae908758ff1edaf2ad48dd67d0337c8ecfcd47e8ce5598c435f4645d719ae60a12c5b37ed2d45571c29ff6af1292ed2ff7fa24e2ab69f18db826044f35683810d2ee95f68f586a8922acdc225912820cdffe6ac29641f3c531a0eb1ddbf17341a05f3ee437f2a56a4a92af8ba2e413d00d05caab40963868dc00da000dfe8962927be81ca05afcc624225b2667a1208dd74e8bb6ced5e1da98f41bb3dedc31302fbf6ed40e9c526f82b53ce45e25e20ce9068bba911f0ec11403a35ff01cee623f71101155fcb646937ac714ac49741b4a1ffc6a72cba387bf41c1af2eeaa80a07631a22d366562924848da0f27c", @ANYRES32, @ANYBLOB="02000000000000006d6e742f656e637279707465645f6469722f2e2e2f66696c653000"]) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') 15:24:53 executing program 4: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1c08a4, 0x0) r1 = syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) open$dir(&(0x7f0000000200)='./mnt\x00', 0x40040, 0x10) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir/../file0\x00', 0x80, 0x0) r2 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x50008, 0x0, 0x10081, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r3 = openat(r1, &(0x7f0000000000)='mnt/encrypted_dir/../file0\x00', 0x40, 0x100) r4 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r4, 0x7, 0x0, 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r4, 0xc0406619, &(0x7f00000001c0)={@desc={0x1, 0x0, @desc2}}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, 0x0) futimesat(r3, &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0)={{0x0, 0xea60}}) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000680)=ANY=[@ANYBLOB="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", @ANYRES32, @ANYBLOB="02000000000000006d6e742f656e637279707465645f6469722f2e2e2f66696c653000"]) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') 15:24:53 executing program 1: r0 = syz_open_dev$vcsu(&(0x7f0000000000), 0x1f, 0x100c0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000040)=0x401) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$bind(0x0, &(0x7f0000001140)='./file0\x00', 0x0, 0x10, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000080)={0x2, 'veth0\x00', 0x1}, 0x18) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r1, 0x7, 0x0, 0x0, 0x0) ioctl$TUNGETFILTER(r1, 0x801054db, &(0x7f0000000140)=""/4096) [ 1175.399776] proc: Unknown parameter 'trans' 15:24:53 executing program 7: epoll_create1(0x80000) r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x40a800, 0x0) ioctl$TCSBRKP(r0, 0x5425, 0x994a) ioctl$TIOCL_SCROLLCONSOLE(r0, 0x541c, &(0x7f0000000040)={0xd, 0x2}) 15:24:53 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x5452, 0x0) 15:24:53 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDGKBDIACR(r0, 0x4b4a, &(0x7f0000000180)=""/240) ioctl$TCSETAW(r0, 0x5407, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "bb09819e2f6e8485"}) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000000)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB="02000000000000002b2f66696c653000"]) ioctl$PIO_UNISCRNMAP(r1, 0x4b6a, &(0x7f00000000c0)="e64c99e5d38c500a390730ecea103b8cccbd5e239e120d2423deb0f97a93de31b102d8e84f9af0b356ddb2faf8c0233fe9074ed1135e2bd2d70015f2061383f2af1f93881eb456a03a8caa8aead16905a3502cefed5b1450178a3fe84974f5c1e344ffac469dcda5aaf1db35a48d95f72e2c0e59d4ff664859bb8046f3f4b30401cfec7620c3082b6547873a742857726fbfd006cc8582f3474a21388318faacca85e4b1549dc31638799ab0312b1af28b40d73dcec8d40a71496aebe4") r2 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r2, 0x7, 0x0, 0x0, 0x0) ioctl$KDSETMODE(r2, 0x4b3a, 0x1) 15:24:53 executing program 3: ioctl$TCSETAW(0xffffffffffffffff, 0x5407, &(0x7f0000000080)={0x4, 0x0, 0xffff, 0x0, 0xfd, "bb09819e2f6e8485"}) 15:24:53 executing program 5: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1c08a4, 0x0) r1 = syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) open$dir(&(0x7f0000000200)='./mnt\x00', 0x40040, 0x10) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir/../file0\x00', 0x80, 0x0) r2 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x50008, 0x0, 0x10081, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r3 = openat(r1, &(0x7f0000000000)='mnt/encrypted_dir/../file0\x00', 0x40, 0x100) r4 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r4, 0x7, 0x0, 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r4, 0xc0406619, &(0x7f00000001c0)={@desc={0x1, 0x0, @desc2}}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, 0x0) futimesat(r3, &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0)={{0x0, 0xea60}}) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000680)=ANY=[@ANYBLOB="b00900000000000018000000468a29458f2709d329f6d3f3917408961482081d984538af2f9bcf61c448afbaa0be3f00000000000000ca4aa56fc413a417324e8530165c3515981e2d28f7fce9ae3c6bb8fa04ff6411132c9ced479abaeea325c2205ea95984d3d7f98eea1cca02dfeb0b2471b497fbb71b60180d35e2a3394ba6d965f41c7b7bc29d4e3ca95bd7ad074a4242ec98a69ad9d1546ce18cbbd98d2e50688e958a0fcd16876ab83cdb94eeb03e42203f267a1bf6ccb1c07ad92e6e493149da32f754251ae74d30cd4b50eefd6a208172ed8693b320eda714bdd152b484d9c939b4bb777dddd947843d73529f5ffe589777254cb10f733351e0739a3a61c3b8f977517ee7becda66da23a93e3be8ed63bda262951b32f72c1c48ee63be474eafaa255074efaa494b950f48b119c76c70b833e4d7443b691dc97bf78bcae908758ff1edaf2ad48dd67d0337c8ecfcd47e8ce5598c435f4645d719ae60a12c5b37ed2d45571c29ff6af1292ed2ff7fa24e2ab69f18db826044f35683810d2ee95f68f586a8922acdc225912820cdffe6ac29641f3c531a0eb1ddbf17341a05f3ee437f2a56a4a92af8ba2e413d00d05caab40963868dc00da000dfe8962927be81ca05afcc624225b2667a1208dd74e8bb6ced5e1da98f41bb3dedc31302fbf6ed40e9c526f82b53ce45e25e20ce9068bba911f0ec11403a35ff01cee623f71101155fcb646937ac714ac49741b4a1ffc6a72cba387bf41c1af2eeaa80a07631a22d366562924848da0f27c", @ANYRES32, @ANYBLOB="02000000000000006d6e742f656e637279707465645f6469722f2e2e2f66696c653000"]) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') 15:24:53 executing program 6: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, 0x0) mount$bind(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x64000, 0x0) recvmmsg$unix(0xffffffffffffffff, &(0x7f0000003180)=[{{&(0x7f00000001c0)=@abs, 0x6e, &(0x7f0000000480)=[{&(0x7f0000000240)=""/153, 0x99}, {&(0x7f0000000300)=""/71, 0x47}, {&(0x7f0000000380)=""/252, 0xfc}], 0x3, &(0x7f00000034c0)=ANY=[@ANYBLOB="1c00000000000000018ea78500000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00'], 0x60}}, {{&(0x7f0000000540), 0x6e, &(0x7f0000001680)=[{&(0x7f00000005c0)=""/4096, 0x1000}, {&(0x7f00000015c0)=""/157, 0x9d}], 0x2, &(0x7f00000016c0)=[@rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x20}}, {{&(0x7f0000001700), 0x6e, &(0x7f0000001ac0)=[{&(0x7f0000001780)=""/25, 0x19}, {&(0x7f00000017c0)=""/30, 0x1e}, {&(0x7f0000001800)}, {&(0x7f0000001840)=""/76, 0x4c}, {&(0x7f00000018c0)=""/161, 0xa1}, {&(0x7f0000001980)=""/154, 0x9a}, {&(0x7f0000001a40)=""/80, 0x50}], 0x7}}, {{&(0x7f0000001b40), 0x6e, &(0x7f0000002cc0)=[{&(0x7f0000001bc0)=""/4096, 0x1000}, {&(0x7f0000002bc0)=""/173, 0xad}, {&(0x7f0000002c80)=""/14, 0xe}], 0x3, &(0x7f0000002d00)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{0x0, 0x0, &(0x7f0000003040)=[{&(0x7f0000002d40)=""/119, 0x77}, {&(0x7f0000002dc0)=""/233, 0xe9}, {&(0x7f0000002ec0)=""/64, 0x40}, {&(0x7f0000002f00)=""/25, 0x19}, {&(0x7f0000002f40)}, {&(0x7f0000002f80)=""/118, 0x76}, {&(0x7f0000003000)=""/9, 0x9}], 0x7, &(0x7f00000030c0)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0x0}}}], 0xb0}}], 0x5, 0x11000, &(0x7f00000032c0)={0x77359400}) mount$9p_tcp(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', &(0x7f0000000180), 0x4020, &(0x7f0000003300)={'trans=tcp,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@nodevmap}, {@dfltgid={'dfltgid', 0x3d, r0}}, {@nodevmap}, {@cache_none}, {@privport}, {@msize={'msize', 0x3d, 0x5}}, {@mmap}, {@debug={'debug', 0x3d, 0x9}}, {@posixacl}, {@privport}], [{@obj_user={'obj_user', 0x3d, '@},'}}]}}) [ 1175.541469] proc: Unknown parameter 'trans' 15:25:04 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDGKBDIACR(r0, 0x4b4a, &(0x7f0000000180)=""/240) ioctl$TCSETAW(r0, 0x5407, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "bb09819e2f6e8485"}) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000000)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB="02000000000000002b2f66696c653000"]) ioctl$PIO_UNISCRNMAP(r1, 0x4b6a, &(0x7f00000000c0)="e64c99e5d38c500a390730ecea103b8cccbd5e239e120d2423deb0f97a93de31b102d8e84f9af0b356ddb2faf8c0233fe9074ed1135e2bd2d70015f2061383f2af1f93881eb456a03a8caa8aead16905a3502cefed5b1450178a3fe84974f5c1e344ffac469dcda5aaf1db35a48d95f72e2c0e59d4ff664859bb8046f3f4b30401cfec7620c3082b6547873a742857726fbfd006cc8582f3474a21388318faacca85e4b1549dc31638799ab0312b1af28b40d73dcec8d40a71496aebe4") r2 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r2, 0x7, 0x0, 0x0, 0x0) ioctl$KDSETMODE(r2, 0x4b3a, 0x1) 15:25:04 executing program 1: r0 = syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, 0x0) statx(r0, &(0x7f0000000180)='./file0\x00', 0x100, 0x1, &(0x7f00000001c0)) unlinkat(r0, &(0x7f0000000100)='./file0\x00', 0x200) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r1, 0x7, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f0000000300)={{0x1, 0x1, 0x18, r0}, './file0/file0\x00'}) mount$bind(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x64000, 0x0) open(&(0x7f0000000080)='./file0\x00', 0x103, 0x113) mknod$loop(&(0x7f00000002c0)='./file0/file0\x00', 0x2, 0x1) 15:25:04 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCGWINSZ(r0, 0x5413, &(0x7f0000000000)) ioctl$TCSETAW(r0, 0x5407, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "bb09819e2f6e8485"}) 15:25:04 executing program 7: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCSBRKP(r0, 0x5425, 0x994a) ioctl$KDFONTOP_GET(0xffffffffffffffff, 0x4b72, &(0x7f0000000440)={0x1, 0x1, 0x16, 0x13, 0x74, &(0x7f0000000040)}) 15:25:04 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x545d, 0x0) 15:25:04 executing program 3: ioctl$TCSETAW(0xffffffffffffffff, 0x5407, &(0x7f0000000080)={0x4, 0x0, 0xffff, 0x0, 0xfd, "bb09819e2f6e8485"}) 15:25:04 executing program 6: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, 0x0) mount$bind(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x64000, 0x0) mount$9p_tcp(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', &(0x7f0000000180), 0x4020, &(0x7f0000003300)={'trans=tcp,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@nodevmap}, {@dfltgid}, {@nodevmap}, {@cache_none}, {@privport}, {@msize={'msize', 0x3d, 0x5}}, {@mmap}, {@debug={'debug', 0x3d, 0x9}}, {@posixacl}, {@privport}], [{@obj_user={'obj_user', 0x3d, '@},'}}]}}) 15:25:04 executing program 4: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1c08a4, 0x0) r1 = syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) open$dir(&(0x7f0000000200)='./mnt\x00', 0x40040, 0x10) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir/../file0\x00', 0x80, 0x0) r2 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x50008, 0x0, 0x10081, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) openat(r1, &(0x7f0000000000)='mnt/encrypted_dir/../file0\x00', 0x40, 0x100) r3 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r3, 0x7, 0x0, 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r3, 0xc0406619, &(0x7f00000001c0)={@desc={0x1, 0x0, @desc2}}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000140)=',,\\\x00') futimesat(0xffffffffffffffff, &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0)={{0x0, 0xea60}}) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000680)=ANY=[@ANYBLOB="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", @ANYRES32, @ANYBLOB="02000000000000006d6e742f656e637279707465645f6469722f2e2e2f66696c653000"]) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') [ 1187.319686] proc: Unknown parameter 'trans' 15:25:05 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x5407, &(0x7f0000000080)={0x4, 0x0, 0xffff, 0x0, 0xfd, "bb09819e2f6e8485"}) 15:25:05 executing program 4: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1c08a4, 0x0) r1 = syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) open$dir(&(0x7f0000000200)='./mnt\x00', 0x40040, 0x10) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir/../file0\x00', 0x80, 0x0) r2 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x50008, 0x0, 0x10081, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) openat(r1, &(0x7f0000000000)='mnt/encrypted_dir/../file0\x00', 0x40, 0x100) r3 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r3, 0x7, 0x0, 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r3, 0xc0406619, &(0x7f00000001c0)={@desc={0x1, 0x0, @desc2}}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000140)=',,\\\x00') futimesat(0xffffffffffffffff, &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0)={{0x0, 0xea60}}) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000680)=ANY=[@ANYBLOB="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", @ANYRES32, @ANYBLOB="02000000000000006d6e742f656e637279707465645f6469722f2e2e2f66696c653000"]) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') 15:25:05 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x5460, 0x0) 15:25:05 executing program 0: r0 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_GET_COALESCE(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x1c, r0, 0x400, 0x70bd2a, 0x25dfdbff, {{}, {@val={0x8, 0x1, 0x14}, @void, @void}}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x44000}, 0x40) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r1, 0x5407, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "bb09819e2f6e8485"}) 15:25:05 executing program 6: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, 0x0) mount$9p_tcp(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', &(0x7f0000000180), 0x4020, &(0x7f0000003300)={'trans=tcp,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@nodevmap}, {@dfltgid}, {@nodevmap}, {@cache_none}, {@privport}, {@msize={'msize', 0x3d, 0x5}}, {@mmap}, {@debug={'debug', 0x3d, 0x9}}, {@posixacl}, {@privport}], [{@obj_user={'obj_user', 0x3d, '@},'}}]}}) 15:25:05 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDGKBDIACR(r0, 0x4b4a, &(0x7f0000000180)=""/240) ioctl$TCSETAW(r0, 0x5407, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "bb09819e2f6e8485"}) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000000)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB="02000000000000002b2f66696c653000"]) ioctl$PIO_UNISCRNMAP(r1, 0x4b6a, &(0x7f00000000c0)="e64c99e5d38c500a390730ecea103b8cccbd5e239e120d2423deb0f97a93de31b102d8e84f9af0b356ddb2faf8c0233fe9074ed1135e2bd2d70015f2061383f2af1f93881eb456a03a8caa8aead16905a3502cefed5b1450178a3fe84974f5c1e344ffac469dcda5aaf1db35a48d95f72e2c0e59d4ff664859bb8046f3f4b30401cfec7620c3082b6547873a742857726fbfd006cc8582f3474a21388318faacca85e4b1549dc31638799ab0312b1af28b40d73dcec8d40a71496aebe4") r2 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r2, 0x7, 0x0, 0x0, 0x0) ioctl$KDSETMODE(r2, 0x4b3a, 0x1) 15:25:05 executing program 1: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x2, 0x0, 0x0, 0x124424, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, 0x0) mount$bind(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x64000, 0x0) open(&(0x7f0000000080)='./file0\x00', 0x541e81, 0x40) [ 1187.518420] proc: Unknown parameter 'trans' 15:25:05 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDGKBDIACR(r0, 0x4b4a, &(0x7f0000000180)=""/240) ioctl$TCSETAW(r0, 0x5407, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "bb09819e2f6e8485"}) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000000)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB="02000000000000002b2f66696c653000"]) ioctl$PIO_UNISCRNMAP(r1, 0x4b6a, &(0x7f00000000c0)="e64c99e5d38c500a390730ecea103b8cccbd5e239e120d2423deb0f97a93de31b102d8e84f9af0b356ddb2faf8c0233fe9074ed1135e2bd2d70015f2061383f2af1f93881eb456a03a8caa8aead16905a3502cefed5b1450178a3fe84974f5c1e344ffac469dcda5aaf1db35a48d95f72e2c0e59d4ff664859bb8046f3f4b30401cfec7620c3082b6547873a742857726fbfd006cc8582f3474a21388318faacca85e4b1549dc31638799ab0312b1af28b40d73dcec8d40a71496aebe4") r2 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r2, 0x7, 0x0, 0x0, 0x0) ioctl$KDSETMODE(r2, 0x4b3a, 0x1) 15:25:05 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/fib_triestat\x00') getpeername(r0, &(0x7f00000000c0)=@hci, &(0x7f0000000040)=0x80) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r1, 0x5407, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "bb09819e2f6e8485"}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCSARP(r2, 0x8955, &(0x7f0000000000)={{0x2, 0x0, @local}, {0x0, @local}, 0x20, {0x2, 0x0, @local}, 'dummy0\x00'}) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000140)={'ip6tnl0\x00'}) ioctl$TCXONC(r1, 0x540a, 0x1) 15:25:05 executing program 3: syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(0xffffffffffffffff, 0x5407, &(0x7f0000000080)={0x4, 0x0, 0xffff, 0x0, 0xfd, "bb09819e2f6e8485"}) 15:25:05 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x5600, 0x0) 15:25:19 executing program 7: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x460400, 0x0) ioctl$TCSBRKP(r0, 0x5425, 0x994a) 15:25:19 executing program 4: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1c08a4, 0x0) r1 = syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) open$dir(&(0x7f0000000200)='./mnt\x00', 0x40040, 0x10) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir/../file0\x00', 0x80, 0x0) r2 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x50008, 0x0, 0x10081, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) openat(r1, &(0x7f0000000000)='mnt/encrypted_dir/../file0\x00', 0x40, 0x100) r3 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r3, 0x7, 0x0, 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r3, 0xc0406619, &(0x7f00000001c0)={@desc={0x1, 0x0, @desc2}}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000140)=',,\\\x00') futimesat(0xffffffffffffffff, &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0)={{0x0, 0xea60}}) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000680)=ANY=[@ANYBLOB="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", @ANYRES32, @ANYBLOB="02000000000000006d6e742f656e637279707465645f6469722f2e2e2f66696c653000"]) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') 15:25:19 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x5407, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "bb09819e2f6e8485"}) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r2, 0x7, 0x0, 0x0, 0x0) ioctl$PIO_UNISCRNMAP(r2, 0x4b6a, &(0x7f00000000c0)="80e2ad5a1c4e72996753a8c576ed5da466617be5b4032b47ea8b89c50dd65cb474895fb87e9bf38f3e23a9866014117ce9520439c2395f64f49b08913f5aff20ff3b6e4f86dc1fd32e95273f3737ef9e51b7c2cade8f9b1cdb84e3d1ea93b0233c7d2df4bc1fb5c99c765b06b7fe4f56eb4c78463b42ee9decc0637f55bc3a15e5119e683400610603eee8b1da22eb1e2fbc224003ae25acf555ca6f975342d3026a3c99862774645f379517d75bd8bcdfcbd390485d4903036a13c1488a148eb9c3dbdb5a54af445c9f216198554519a11482513dd8dff53441e2a538d6d147e0b9c39e666a4554426d0acee113ada1d6e629eda592") ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000040)={{0x1, 0x1, 0x18, r1, {0x37}}, './file0\x00'}) fsconfig$FSCONFIG_SET_FLAG(r3, 0x0, &(0x7f00000001c0)='mand\x00', 0x0, 0x0) ioctl$TIOCGLCKTRMIOS(r1, 0x5456, &(0x7f0000000000)={0xfffffe01, 0x400, 0x358, 0x2, 0x19, "dc7b63415b8944725b24834a40f67f9c00"}) ioctl$TIOCSLCKTRMIOS(r0, 0x5457, &(0x7f0000000200)) 15:25:19 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDGKBDIACR(r0, 0x4b4a, &(0x7f0000000180)=""/240) ioctl$TCSETAW(r0, 0x5407, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "bb09819e2f6e8485"}) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000000)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB="02000000000000002b2f66696c653000"]) ioctl$PIO_UNISCRNMAP(r1, 0x4b6a, &(0x7f00000000c0)="e64c99e5d38c500a390730ecea103b8cccbd5e239e120d2423deb0f97a93de31b102d8e84f9af0b356ddb2faf8c0233fe9074ed1135e2bd2d70015f2061383f2af1f93881eb456a03a8caa8aead16905a3502cefed5b1450178a3fe84974f5c1e344ffac469dcda5aaf1db35a48d95f72e2c0e59d4ff664859bb8046f3f4b30401cfec7620c3082b6547873a742857726fbfd006cc8582f3474a21388318faacca85e4b1549dc31638799ab0312b1af28b40d73dcec8d40a71496aebe4") r2 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r2, 0x7, 0x0, 0x0, 0x0) 15:25:19 executing program 1: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r0, 0x7, 0x0, 0x0, 0x0) execveat(r0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)=[&(0x7f0000000100)='/-(*\x00', &(0x7f0000000180)='proc\x00', &(0x7f00000001c0)='proc\x00'], &(0x7f0000000400)=[&(0x7f0000000240)='\x00', &(0x7f0000000280)='proc\x00', &(0x7f00000002c0)='proc\x00', &(0x7f0000000300)='proc\x00', &(0x7f0000000340)='-+(%#)%:.+*/)-]\'\x00', &(0x7f0000000380)='/:-&,.\xef*!.#{[+@\x83/:+$\\]\x00', &(0x7f00000003c0)='proc\x00'], 0x400) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, 0x0) mount$bind(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x64000, 0x0) 15:25:19 executing program 6: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_tcp(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', &(0x7f0000000180), 0x4020, &(0x7f0000003300)={'trans=tcp,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@nodevmap}, {@dfltgid}, {@nodevmap}, {@cache_none}, {@privport}, {@msize={'msize', 0x3d, 0x5}}, {@mmap}, {@debug={'debug', 0x3d, 0x9}}, {@posixacl}, {@privport}], [{@obj_user={'obj_user', 0x3d, '@},'}}]}}) 15:25:19 executing program 3: syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(0xffffffffffffffff, 0x5407, &(0x7f0000000080)={0x4, 0x0, 0xffff, 0x0, 0xfd, "bb09819e2f6e8485"}) 15:25:19 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x5601, 0x0) 15:25:19 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x5602, 0x0) 15:25:19 executing program 7: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCGSERIAL(r0, 0x541e, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=""/218}) ioctl$TCSBRKP(r0, 0x5425, 0x994a) 15:25:19 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDGKBDIACR(r0, 0x4b4a, &(0x7f0000000180)=""/240) ioctl$TCSETAW(r0, 0x5407, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "bb09819e2f6e8485"}) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000000)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB="02000000000000002b2f66696c653000"]) ioctl$PIO_UNISCRNMAP(r1, 0x4b6a, &(0x7f00000000c0)="e64c99e5d38c500a390730ecea103b8cccbd5e239e120d2423deb0f97a93de31b102d8e84f9af0b356ddb2faf8c0233fe9074ed1135e2bd2d70015f2061383f2af1f93881eb456a03a8caa8aead16905a3502cefed5b1450178a3fe84974f5c1e344ffac469dcda5aaf1db35a48d95f72e2c0e59d4ff664859bb8046f3f4b30401cfec7620c3082b6547873a742857726fbfd006cc8582f3474a21388318faacca85e4b1549dc31638799ab0312b1af28b40d73dcec8d40a71496aebe4") openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) 15:25:19 executing program 6: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_tcp(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', &(0x7f0000000180), 0x4020, &(0x7f0000003300)={'trans=tcp,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@nodevmap}, {@dfltgid}, {@nodevmap}, {@cache_none}, {@privport}, {@msize={'msize', 0x3d, 0x5}}, {@mmap}, {@debug={'debug', 0x3d, 0x9}}, {@posixacl}, {@privport}], [{@obj_user={'obj_user', 0x3d, '@},'}}]}}) 15:25:19 executing program 0: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x4, 0x8, &(0x7f0000001500)=[{&(0x7f00000000c0)="137bdb01594287ecf5ca76dcaea622ed14b7f32616d81546138c320b55f435d378b75673f0307d431c37cd4a5897fed44bdcbbb09dd0e50dcc4bf53c84d55b074f62db39e423c396340acd682c", 0x4d, 0x7aef}, {&(0x7f0000000140)="bc8c54aadffa9b4441e7e0f8180d8e154f2f01313464b017bb40bfcd773a71d22b55b766f6557c97949985eabf8dd34ca7c7c31f51340d9f49891285ee03af853e11c341433615fbb352cc0cdb7ac708b973dc35f7c72b52a2977bf235ed249216a0b676093f424956bbd8b34001603648d9b2a86a43c0df2d7424811bf1c93819f7f2bcee2e9d274f547a81e40d0d035fea56e45c9154ee2193b9125f865f737e4460a3654602da4790a4a61b98e0a7e036b5d8a4c992db7552b312f0", 0xbd, 0x1}, {&(0x7f0000000200)="82a7d1e6a287d63a159274074852c01f90ac2f7f6f55c2461cc9bc62731038f584bf37cb3177ebb2b5f7ac3580f69d8ad94aef003dfe25035380b8740e7b8ed87b2d79c62c7a695681b9fa55137c1e4459d3d958bf3bd0d4ec5ae8e0775e7b38681a2b7c884ae105f334ae07af0c153ab11cb8f531db30d92ee8cef8059cfe46684e82eec2e95735e46848dc772d87987982068234e0b97d50ae31a7196f2ffc170f18fdb3db11813426c36491d8b729ae6b5e1747a88dd47363580b9fa4b8a36e8a15e0146b6657bfacca", 0xcb, 0x40}, {&(0x7f0000000300)="35b7fb99af7401b685ae66b760f40064adb61034ad4765c59b197f674b32167167af866f345f3d392e6030304e41890810ff74c896a67e67838fb8139011147c6efb20503a", 0x45, 0x8}, {&(0x7f0000000380)="979d042dcd79cae3c026682668551e7834842483e8aa5957239c26a8ba775ae3d8ecc5ca019740acef494a2e50bc22b0c68fe46ded43527e9d95462c6168705417d28a30cbaf6c4e180891b52ad0f6790cb4f6e62d261bc713c080a34333e27142017f942f16fef47063f29b603121d6f5c0e3a8154568a6f3a0f59d87572823dcba6ae67a4ced4892a0de", 0x8b}, {&(0x7f0000000440)="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", 0x1000, 0x5}, {&(0x7f0000001440)="ee1b5b7dfe6d9776ee8588ab856ccfb92a361cf2c81412229200b9a2ce028b259865919096d7a33628b86e073699fa7c2d66e1d8db202e77263f6a81b0eb5f1240", 0x41, 0x7}, {&(0x7f00000014c0)="7b796fe7d5dbc91f4134dd7d64623b9b732810a9", 0x14, 0x2}], 0x10080, &(0x7f00000015c0)={[{@fat=@debug}, {@nonumtail}, {@utf8no}, {@uni_xlate}, {@utf8no}, {@shortname_mixed}, {@utf8}], [{@uid_lt={'uid<', 0xee01}}, {@measure}, {@fowner_gt={'fowner>', 0xee01}}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}) fcntl$setsig(r0, 0xa, 0xe) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r1, 0x5407, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "7a040000000e890b"}) 15:25:32 executing program 3: syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(0xffffffffffffffff, 0x5407, &(0x7f0000000080)={0x4, 0x0, 0xffff, 0x0, 0xfd, "bb09819e2f6e8485"}) 15:25:32 executing program 4: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1c08a4, 0x0) r1 = syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) open$dir(&(0x7f0000000200)='./mnt\x00', 0x40040, 0x10) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir/../file0\x00', 0x80, 0x0) r2 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x50008, 0x0, 0x10081, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r3 = openat(r1, &(0x7f0000000000)='mnt/encrypted_dir/../file0\x00', 0x40, 0x100) r4 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r4, 0x7, 0x0, 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r4, 0xc0406619, &(0x7f00000001c0)={@desc={0x1, 0x0, @desc2}}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000140)=',,\\\x00') futimesat(r3, 0x0, &(0x7f00000000c0)={{0x0, 0xea60}}) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000680)=ANY=[@ANYBLOB="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", @ANYRES32, @ANYBLOB="02000000000000006d6e742f656e637279707465645f6469722f2e2e2f66696c653000"]) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') 15:25:32 executing program 7: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x401, 0x0) ioctl$TCSBRKP(r0, 0x5425, 0x994a) 15:25:32 executing program 6: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_tcp(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', &(0x7f0000000180), 0x4020, &(0x7f0000003300)={'trans=tcp,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@nodevmap}, {@dfltgid}, {@nodevmap}, {@cache_none}, {@privport}, {@msize={'msize', 0x3d, 0x5}}, {@mmap}, {@debug={'debug', 0x3d, 0x9}}, {@posixacl}, {@privport}], [{@obj_user={'obj_user', 0x3d, '@},'}}]}}) 15:25:32 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDGKBDIACR(r0, 0x4b4a, &(0x7f0000000180)=""/240) ioctl$TCSETAW(r0, 0x5407, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "bb09819e2f6e8485"}) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000000)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB="02000000000000002b2f66696c653000"]) ioctl$PIO_UNISCRNMAP(r1, 0x4b6a, &(0x7f00000000c0)="e64c99e5d38c500a390730ecea103b8cccbd5e239e120d2423deb0f97a93de31b102d8e84f9af0b356ddb2faf8c0233fe9074ed1135e2bd2d70015f2061383f2af1f93881eb456a03a8caa8aead16905a3502cefed5b1450178a3fe84974f5c1e344ffac469dcda5aaf1db35a48d95f72e2c0e59d4ff664859bb8046f3f4b30401cfec7620c3082b6547873a742857726fbfd006cc8582f3474a21388318faacca85e4b1549dc31638799ab0312b1af28b40d73dcec8d40a71496aebe4") 15:25:32 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x5603, 0x0) 15:25:32 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KIOCSOUND(r0, 0x4b2f, 0x1) ioctl$TCSETAW(r0, 0x5407, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "bb09819e2f6e8485"}) 15:25:32 executing program 1: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x400, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, 0x0) mount$bind(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x64000, 0x0) 15:25:32 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_SETSEL(0xffffffffffffffff, 0x541c, &(0x7f00000000c0)={0x2, {0x2, 0x0, 0x0, 0x3, 0x1, 0x4}}) ioctl$TCSETAW(r0, 0x5407, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "bb09819e2f6e8485"}) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$AUTOFS_IOC_PROTOVER(r1, 0x80049363, &(0x7f0000000040)) 15:25:32 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x5407, 0x0) 15:25:32 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDGKBDIACR(r0, 0x4b4a, &(0x7f0000000180)=""/240) ioctl$TCSETAW(r0, 0x5407, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "bb09819e2f6e8485"}) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000000)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB="02000000000000002b2f66696c653000"]) 15:25:32 executing program 6: mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, 0x0) mount$9p_tcp(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', &(0x7f0000000180), 0x4020, &(0x7f0000003300)={'trans=tcp,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@nodevmap}, {@dfltgid}, {@nodevmap}, {@cache_none}, {@privport}, {@msize={'msize', 0x3d, 0x5}}, {@mmap}, {@debug={'debug', 0x3d, 0x9}}, {@posixacl}, {@privport}], [{@obj_user={'obj_user', 0x3d, '@},'}}]}}) 15:25:32 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x5605, 0x0) 15:25:32 executing program 1: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, 0x0) mount$bind(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x64000, 0x0) 15:25:32 executing program 4: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1c08a4, 0x0) r1 = syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) open$dir(&(0x7f0000000200)='./mnt\x00', 0x40040, 0x10) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir/../file0\x00', 0x80, 0x0) r2 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x50008, 0x0, 0x10081, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r3 = openat(r1, &(0x7f0000000000)='mnt/encrypted_dir/../file0\x00', 0x40, 0x100) r4 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r4, 0x7, 0x0, 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r4, 0xc0406619, &(0x7f00000001c0)={@desc={0x1, 0x0, @desc2}}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000140)=',,\\\x00') futimesat(r3, 0x0, &(0x7f00000000c0)={{0x0, 0xea60}}) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000680)=ANY=[@ANYBLOB="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", @ANYRES32, @ANYBLOB="02000000000000006d6e742f656e637279707465645f6469722f2e2e2f66696c653000"]) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') 15:25:47 executing program 7: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x303102, 0x0) ioctl$TCSBRKP(r0, 0x5425, 0x994a) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCSARP(r1, 0x8955, &(0x7f0000000000)={{0x2, 0x0, @local}, {0x0, @local}, 0x20, {0x2, 0x0, @local}, 'dummy0\x00'}) ioctl$EXT4_IOC_GET_ES_CACHE(r1, 0xc020662a, &(0x7f00000000c0)={0x0, 0x80000000, 0x0, 0x1, 0x3, [{0x0, 0x22, 0x3f, '\x00', 0x2}, {0xf79b, 0x3a0e, 0x7, '\x00', 0x6}, {0x6c7, 0x800, 0x0, '\x00', 0x4c86}]}) ioctl$TIOCL_SCROLLCONSOLE(r0, 0x541c, &(0x7f0000000000)={0xd, 0x9075}) ioctl$TIOCL_SCROLLCONSOLE(r0, 0x541c, &(0x7f0000000080)={0xd, 0xff}) 15:25:47 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x5407, 0x0) 15:25:47 executing program 4: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1c08a4, 0x0) r1 = syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) open$dir(&(0x7f0000000200)='./mnt\x00', 0x40040, 0x10) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir/../file0\x00', 0x80, 0x0) r2 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x50008, 0x0, 0x10081, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r3 = openat(r1, &(0x7f0000000000)='mnt/encrypted_dir/../file0\x00', 0x40, 0x100) r4 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r4, 0x7, 0x0, 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r4, 0xc0406619, &(0x7f00000001c0)={@desc={0x1, 0x0, @desc2}}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000140)=',,\\\x00') futimesat(r3, 0x0, &(0x7f00000000c0)={{0x0, 0xea60}}) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000680)=ANY=[@ANYBLOB="b00900000000000018000000468a29458f2709d329f6d3f3917408961482081d984538af2f9bcf61c448afbaa0be3f00000000000000ca4aa56fc413a417324e8530165c3515981e2d28f7fce9ae3c6bb8fa04ff6411132c9ced479abaeea325c2205ea95984d3d7f98eea1cca02dfeb0b2471b497fbb71b60180d35e2a3394ba6d965f41c7b7bc29d4e3ca95bd7ad074a4242ec98a69ad9d1546ce18cbbd98d2e50688e958a0fcd16876ab83cdb94eeb03e42203f267a1bf6ccb1c07ad92e6e493149da32f754251ae74d30cd4b50eefd6a208172ed8693b320eda714bdd152b484d9c939b4bb777dddd947843d73529f5ffe589777254cb10f733351e0739a3a61c3b8f977517ee7becda66da23a93e3be8ed63bda262951b32f72c1c48ee63be474eafaa255074efaa494b950f48b119c76c70b833e4d7443b691dc97bf78bcae908758ff1edaf2ad48dd67d0337c8ecfcd47e8ce5598c435f4645d719ae60a12c5b37ed2d45571c29ff6af1292ed2ff7fa24e2ab69f18db826044f35683810d2ee95f68f586a8922acdc225912820cdffe6ac29641f3c531a0eb1ddbf17341a05f3ee437f2a56a4a92af8ba2e413d00d05caab40963868dc00da000dfe8962927be81ca05afcc624225b2667a1208dd74e8bb6ced5e1da98f41bb3dedc31302fbf6ed40e9c526f82b53ce45e25e20ce9068bba911f0ec11403a35ff01cee623f71101155fcb646937ac714ac49741b4a1ffc6a72cba387bf41c1af2eeaa80a07631a22d366562924848da0f27c", @ANYRES32, @ANYBLOB="02000000000000006d6e742f656e637279707465645f6469722f2e2e2f66696c653000"]) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') 15:25:47 executing program 6: mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, 0x0) mount$9p_tcp(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', &(0x7f0000000180), 0x4020, &(0x7f0000003300)={'trans=tcp,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@nodevmap}, {@dfltgid}, {@nodevmap}, {@cache_none}, {@privport}, {@msize={'msize', 0x3d, 0x5}}, {@mmap}, {@debug={'debug', 0x3d, 0x9}}, {@posixacl}, {@privport}], [{@obj_user={'obj_user', 0x3d, '@},'}}]}}) 15:25:47 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x5606, 0x0) 15:25:47 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDGKBDIACR(r0, 0x4b4a, &(0x7f0000000180)=""/240) ioctl$TCSETAW(r0, 0x5407, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "bb09819e2f6e8485"}) 15:25:47 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x5407, &(0x7f0000000080)={0x401, 0x0, 0x0, 0x0, 0x0, "cc09819e2f6e846b"}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCSARP(r1, 0x8955, &(0x7f0000000000)={{0x2, 0x0, @local}, {0x0, @local}, 0x20, {0x2, 0x0, @local}, 'dummy0\x00'}) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f00000002c0)=ANY=[@ANYBLOB="01000082b1682fef8759030000", @ANYRES32=r0, @ANYBLOB="4c000001080000002e30002d2539c938c1f31d5b3d593a21de00404ae56dcb88f98db8c07c2785c443647a98e0d42c84f52196b2ee9c514db1585df31790aa8c8f054a9e36b80fb8ebb547e44265df937c2a8169095874277439af087c2d5c1d7a0fdaa89575915d557eda8259e1ae0e53f8848a4ffad4daea045b528669f72d747204ececc0361f259ea64916e2162569e5be99e82e5683a71c49a113d144bcd53e0642"]) ioctl$BTRFS_IOC_SET_FEATURES(r0, 0x40309439, &(0x7f0000000180)={0x2, 0x1, 0x12}) perf_event_open(&(0x7f00000000c0)={0x5, 0x80, 0x40, 0x9, 0xdd, 0x6, 0x0, 0x3317, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x800, 0x0, @perf_bp={&(0x7f0000000140), 0x5}, 0x101, 0x3, 0x20, 0x3, 0x7, 0x0, 0x800, 0x0, 0x1000, 0x0, 0x4}, 0xffffffffffffffff, 0xd, r2, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCSARP(r3, 0x8955, &(0x7f0000000000)={{0x2, 0x0, @local}, {0x0, @local}, 0x20, {0x2, 0x0, @local}, 'dummy0\x00'}) ioctl$FICLONE(r1, 0x40049409, r3) r4 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x0, 0x80, 0x7, 0x3f, 0x0, 0xe4, 0x0, 0xcc, 0x801, 0x6, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x5, 0x1, @perf_bp={&(0x7f00000001c0), 0x9}, 0x404, 0x2, 0x4, 0x7, 0x6, 0x95, 0xaa10, 0x0, 0x1, 0x0, 0x2}, 0xffffffffffffffff, 0xc, 0xffffffffffffffff, 0x1) fsconfig$FSCONFIG_CMD_RECONFIGURE(r4, 0x7, 0x0, 0x0, 0x0) ioctl$TCSBRKP(r4, 0x5425, 0xf0) 15:25:47 executing program 1: ioctl$BTRFS_IOC_START_SYNC(0xffffffffffffffff, 0x80089418, &(0x7f00000000c0)=0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000180)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0}) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000380)={"b1de76382edcbc2927a50476f56f4edf", r0, r1, {0x7fff, 0x4}, {0x6, 0x80000000}, 0x1, [0x6, 0x2, 0x8001, 0x10001, 0x100000000, 0x6, 0x2b18, 0x161d07ac, 0x100000000, 0x6, 0x8a, 0xffffffffffffffff, 0x200, 0x187, 0x2, 0xfff]}) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$bind(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x64000, 0x0) 15:25:47 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDGKBDIACR(r0, 0x4b4a, &(0x7f0000000180)=""/240) 15:25:47 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x5407, 0x0) 15:25:47 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x5607, 0x0) 15:25:47 executing program 1: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r0, 0x7, 0x0, 0x0, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000080)={0x10, 0x17, 0x2, {0x7, './file0'}}, 0x10) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, 0x0) mount$bind(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x64000, 0x0) 15:25:47 executing program 6: mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, 0x0) mount$9p_tcp(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', &(0x7f0000000180), 0x4020, &(0x7f0000003300)={'trans=tcp,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@nodevmap}, {@dfltgid}, {@nodevmap}, {@cache_none}, {@privport}, {@msize={'msize', 0x3d, 0x5}}, {@mmap}, {@debug={'debug', 0x3d, 0x9}}, {@posixacl}, {@privport}], [{@obj_user={'obj_user', 0x3d, '@},'}}]}}) 15:25:47 executing program 4: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1c08a4, 0x0) r1 = syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) open$dir(&(0x7f0000000200)='./mnt\x00', 0x40040, 0x10) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir/../file0\x00', 0x80, 0x0) r2 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x50008, 0x0, 0x10081, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r3 = openat(r1, &(0x7f0000000000)='mnt/encrypted_dir/../file0\x00', 0x40, 0x100) r4 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r4, 0x7, 0x0, 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r4, 0xc0406619, &(0x7f00000001c0)={@desc={0x1, 0x0, @desc2}}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000140)=',,\\\x00') futimesat(r3, &(0x7f0000000080)='./file1\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000680)=ANY=[@ANYBLOB="b00900000000000018000000468a29458f2709d329f6d3f3917408961482081d984538af2f9bcf61c448afbaa0be3f00000000000000ca4aa56fc413a417324e8530165c3515981e2d28f7fce9ae3c6bb8fa04ff6411132c9ced479abaeea325c2205ea95984d3d7f98eea1cca02dfeb0b2471b497fbb71b60180d35e2a3394ba6d965f41c7b7bc29d4e3ca95bd7ad074a4242ec98a69ad9d1546ce18cbbd98d2e50688e958a0fcd16876ab83cdb94eeb03e42203f267a1bf6ccb1c07ad92e6e493149da32f754251ae74d30cd4b50eefd6a208172ed8693b320eda714bdd152b484d9c939b4bb777dddd947843d73529f5ffe589777254cb10f733351e0739a3a61c3b8f977517ee7becda66da23a93e3be8ed63bda262951b32f72c1c48ee63be474eafaa255074efaa494b950f48b119c76c70b833e4d7443b691dc97bf78bcae908758ff1edaf2ad48dd67d0337c8ecfcd47e8ce5598c435f4645d719ae60a12c5b37ed2d45571c29ff6af1292ed2ff7fa24e2ab69f18db826044f35683810d2ee95f68f586a8922acdc225912820cdffe6ac29641f3c531a0eb1ddbf17341a05f3ee437f2a56a4a92af8ba2e413d00d05caab40963868dc00da000dfe8962927be81ca05afcc624225b2667a1208dd74e8bb6ced5e1da98f41bb3dedc31302fbf6ed40e9c526f82b53ce45e25e20ce9068bba911f0ec11403a35ff01cee623f71101155fcb646937ac714ac49741b4a1ffc6a72cba387bf41c1af2eeaa80a07631a22d366562924848da0f27c", @ANYRES32, @ANYBLOB="02000000000000006d6e742f656e637279707465645f6469722f2e2e2f66696c653000"]) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') 15:25:47 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x5407, &(0x7f0000000080)={0x0, 0x0, 0xffff, 0x0, 0xfd, "bb09819e2f6e8485"}) 15:25:47 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x5407, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "bb09819e2f6e8485"}) recvmmsg$unix(0xffffffffffffffff, &(0x7f00000028c0)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000000)=""/62, 0x3e}, {&(0x7f0000000040)=""/22, 0x16}], 0x2, &(0x7f0000000100)=[@cred={{0x1c}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}], 0x80}}, {{&(0x7f0000000180), 0x6e, &(0x7f0000001200)=[{&(0x7f0000000200)=""/4096, 0x1000}], 0x1, &(0x7f0000001240)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xf8}}, {{&(0x7f0000001340), 0x6e, &(0x7f0000001400)=[{&(0x7f00000013c0)=""/61, 0x3d}], 0x1}}, {{&(0x7f0000001440)=@abs, 0x6e, &(0x7f0000002800)=[{&(0x7f00000014c0)=""/38, 0x26}, {&(0x7f0000001500)=""/47, 0x2f}, {&(0x7f0000001540)=""/39, 0x27}, {&(0x7f0000001580)=""/191, 0xbf}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000002640)=""/196, 0xc4}, {&(0x7f0000002740)=""/151, 0x97}], 0x7, &(0x7f0000002880)=[@cred={{0x1c}}], 0x20}}], 0x4, 0x2003, &(0x7f00000029c0)={0x0, 0x989680}) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000002a00)=0x800) 15:25:47 executing program 1: r0 = syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(r0, &(0x7f0000000080)='./file0/file0\x00', 0x50) r1 = dup2(r0, r0) mknodat(r1, &(0x7f0000000180)='./file0\x00', 0x4, 0x7) futimesat(r1, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)={{0x77359400}, {0x77359400}}) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000440)='virtiofs\x00', 0x0, 0x0) mount$bind(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x64000, 0x0) mount$cgroup2(0x0, &(0x7f0000000300)='./file0/file0/file0\x00', &(0x7f0000000340), 0x1014, &(0x7f0000000480)={[{@memory_localevents}, {@subsystem='cpuacct'}, {@subsystem='rlimit'}, {}, {@subsystem='blkio'}, {@memory_recursiveprot}, {}, {@subsystem='net_cls'}], [{@defcontext={'defcontext', 0x3d, 'user_u'}}, {@obj_role={'obj_role', 0x3d, 'proc\x00'}}, {@seclabel}]}) r2 = dup3(r0, r0, 0x0) mkdirat(r2, &(0x7f0000000100)='./file0/file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r1, 0xc018937a, &(0x7f0000000380)=ANY=[@ANYBLOB="0100001001005d001800000093397d5798f49dfdb5fdaac423da33eee06288a74e4762965911de93cd1110f421446c8624b6b08f0dc83669ac98f9a3", @ANYRES32=r2, @ANYBLOB='\t\x00\x00\x00\x00\x00\x00\x00./file0/file0/file0\x00']) openat(r3, &(0x7f00000002c0)='./file0/file0\x00', 0x50000, 0xa0) setsockopt$SO_TIMESTAMPING(r2, 0x1, 0x41, &(0x7f0000000040)=0x48, 0x4) open(&(0x7f00000001c0)='./file0/file0/file0\x00', 0x200, 0xa0) 15:25:47 executing program 7: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000000c0), 0x1eb800, 0x0) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r1, 0x7, 0x0, 0x0, 0x0) ioctl$TIOCSPGRP(r1, 0x5410, &(0x7f0000000000)) ioctl$KDGKBDIACR(r0, 0x4b4a, &(0x7f0000000040)=""/74) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCSARP(r2, 0x8955, &(0x7f0000000000)={{0x2, 0x0, @local}, {0x0, @local}, 0x20, {0x2, 0x0, @local}, 'dummy0\x00'}) finit_module(r2, &(0x7f0000000100)='/dev/ttyS3\x00', 0x1) 15:25:47 executing program 5: ioctl$KDGKBDIACR(0xffffffffffffffff, 0x4b4a, &(0x7f0000000180)=""/240) 15:25:47 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x5407, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0xfd, "bb09819e2f6e8485"}) 15:25:59 executing program 1: r0 = syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x7, 0x0, 0x0, 0x10000, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, 0x0) mount$bind(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x64000, 0x0) lstat(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r2, 0x0) stat(&(0x7f0000000400)='./file0\x00', &(0x7f0000000440)) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000380)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) mount$tmpfs(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100), 0x14a8c4700a4d14cc, &(0x7f0000000240)={[{@nr_inodes={'nr_inodes', 0x3d, [0x35]}}, {@huge_within_size}, {@uid={'uid', 0x3d, r1}}, {@mpol={'mpol', 0x3d, {'bind', '=static', @val={0x3a, [0x33]}}}}], [{@euid_gt={'euid>', 0xffffffffffffffff}}, {@context={'context', 0x3d, 'sysadm_u'}}, {@uid_gt={'uid>', r2}}, {@fsmagic={'fsmagic', 0x3d, 0x80}}]}) pivot_root(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='./file0\x00') 15:25:59 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x5608, 0x0) 15:25:59 executing program 5: ioctl$KDGKBDIACR(0xffffffffffffffff, 0x4b4a, &(0x7f0000000180)=""/240) 15:25:59 executing program 0: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) finit_module(r0, &(0x7f00000000c0)='\x00', 0x0) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r1, 0x7, 0x0, 0x0, 0x0) r2 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r2, 0x7, 0x0, 0x0, 0x0) openat(r2, &(0x7f0000000040)='./file0\x00', 0x2000, 0x4) openat(r1, &(0x7f0000000000)='./file0\x00', 0x301000, 0x20) fsconfig$FSCONFIG_CMD_RECONFIGURE(r0, 0x7, 0x0, 0x0, 0x0) ioctl$TCSETAW(r0, 0x5407, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "0000000200"}) 15:25:59 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x5407, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0xfd, "bb09819e2f6e8485"}) 15:25:59 executing program 7: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCSBRKP(r0, 0x5425, 0x994a) creat(&(0x7f00000000c0)='./file0\x00', 0x60) ioctl$TIOCMBIS(r0, 0x5416, &(0x7f0000000080)=0x2440) ioctl$PIO_SCRNMAP(0xffffffffffffffff, 0x4b41, &(0x7f0000000100)="7d33ad505d6744e94b8461910300663ab4ca6ea2edd4ddf96f12fc7d1043df55d24301345b82e02b07aaf484fabc02ee543deda50288bf1b66a2bf6701d2d1c502868eb05dd13d10be1b20c1dee6ea372bf9f1c054cf3bd3d5") ioctl$TIOCMGET(r0, 0x5415, &(0x7f0000000040)) 15:25:59 executing program 6: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, 0x0) mount$9p_tcp(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', &(0x7f0000000180), 0x4020, &(0x7f0000003300)={'trans=tcp,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@nodevmap}, {@dfltgid}, {@nodevmap}, {@cache_none}, {@privport}, {@msize={'msize', 0x3d, 0x5}}, {@mmap}, {@debug={'debug', 0x3d, 0x9}}, {@posixacl}, {@privport}], [{@obj_user={'obj_user', 0x3d, '@},'}}]}}) 15:25:59 executing program 4: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1c08a4, 0x0) r1 = syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) open$dir(&(0x7f0000000200)='./mnt\x00', 0x40040, 0x10) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir/../file0\x00', 0x80, 0x0) r2 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x50008, 0x0, 0x10081, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r3 = openat(r1, &(0x7f0000000000)='mnt/encrypted_dir/../file0\x00', 0x40, 0x100) r4 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r4, 0x7, 0x0, 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r4, 0xc0406619, &(0x7f00000001c0)={@desc={0x1, 0x0, @desc2}}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000140)=',,\\\x00') futimesat(r3, &(0x7f0000000080)='./file1\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000680)=ANY=[@ANYBLOB="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", @ANYRES32, @ANYBLOB="02000000000000006d6e742f656e637279707465645f6469722f2e2e2f66696c653000"]) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') 15:26:15 executing program 5: ioctl$KDGKBDIACR(0xffffffffffffffff, 0x4b4a, &(0x7f0000000180)=""/240) 15:26:15 executing program 7: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCSARP(r1, 0x8955, &(0x7f0000000000)={{0x2, 0x0, @local}, {0x0, @local}, 0x20, {0x2, 0x0, @local}, 'dummy0\x00'}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000040)={0x0, 0x2, r1, 0x9}) ioctl$TCSBRKP(r0, 0x5425, 0xd940000000000000) ioctl$F2FS_IOC_RELEASE_VOLATILE_WRITE(r0, 0xf504, 0x0) 15:26:15 executing program 4: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1c08a4, 0x0) r1 = syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) open$dir(&(0x7f0000000200)='./mnt\x00', 0x40040, 0x10) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir/../file0\x00', 0x80, 0x0) r2 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x50008, 0x0, 0x10081, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r3 = openat(r1, &(0x7f0000000000)='mnt/encrypted_dir/../file0\x00', 0x40, 0x100) r4 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r4, 0x7, 0x0, 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r4, 0xc0406619, &(0x7f00000001c0)={@desc={0x1, 0x0, @desc2}}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000140)=',,\\\x00') futimesat(r3, &(0x7f0000000080)='./file1\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000680)=ANY=[@ANYBLOB="b00900000000000018000000468a29458f2709d329f6d3f3917408961482081d984538af2f9bcf61c448afbaa0be3f00000000000000ca4aa56fc413a417324e8530165c3515981e2d28f7fce9ae3c6bb8fa04ff6411132c9ced479abaeea325c2205ea95984d3d7f98eea1cca02dfeb0b2471b497fbb71b60180d35e2a3394ba6d965f41c7b7bc29d4e3ca95bd7ad074a4242ec98a69ad9d1546ce18cbbd98d2e50688e958a0fcd16876ab83cdb94eeb03e42203f267a1bf6ccb1c07ad92e6e493149da32f754251ae74d30cd4b50eefd6a208172ed8693b320eda714bdd152b484d9c939b4bb777dddd947843d73529f5ffe589777254cb10f733351e0739a3a61c3b8f977517ee7becda66da23a93e3be8ed63bda262951b32f72c1c48ee63be474eafaa255074efaa494b950f48b119c76c70b833e4d7443b691dc97bf78bcae908758ff1edaf2ad48dd67d0337c8ecfcd47e8ce5598c435f4645d719ae60a12c5b37ed2d45571c29ff6af1292ed2ff7fa24e2ab69f18db826044f35683810d2ee95f68f586a8922acdc225912820cdffe6ac29641f3c531a0eb1ddbf17341a05f3ee437f2a56a4a92af8ba2e413d00d05caab40963868dc00da000dfe8962927be81ca05afcc624225b2667a1208dd74e8bb6ced5e1da98f41bb3dedc31302fbf6ed40e9c526f82b53ce45e25e20ce9068bba911f0ec11403a35ff01cee623f71101155fcb646937ac714ac49741b4a1ffc6a72cba387bf41c1af2eeaa80a07631a22d366562924848da0f27c", @ANYRES32, @ANYBLOB="02000000000000006d6e742f656e637279707465645f6469722f2e2e2f66696c653000"]) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') 15:26:15 executing program 6: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, 0x0) mount$9p_tcp(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', &(0x7f0000000180), 0x4020, &(0x7f0000003300)={'trans=tcp,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@nodevmap}, {@dfltgid}, {@nodevmap}, {@cache_none}, {@privport}, {@msize={'msize', 0x3d, 0x5}}, {@mmap}, {@debug={'debug', 0x3d, 0x9}}, {@posixacl}, {@privport}], [{@obj_user={'obj_user', 0x3d, '@},'}}]}}) 15:26:15 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x5609, 0x0) 15:26:15 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x5407, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "bb09819e2e6e8485"}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCSARP(r1, 0x8955, &(0x7f0000000000)={{0x2, 0x0, @local}, {0x0, @local}, 0x20, {0x2, 0x0, @local}, 'dummy0\x00'}) ioctl$AUTOFS_IOC_PROTOVER(r1, 0x80049363, &(0x7f0000000000)) 15:26:15 executing program 1: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x80000, 0x0) mount$bind(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x246041, 0x0) 15:26:15 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x5407, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0xfd, "bb09819e2f6e8485"}) 15:26:15 executing program 6: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, 0x0) mount$9p_tcp(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', &(0x7f0000000180), 0x4020, &(0x7f0000003300)={'trans=tcp,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@nodevmap}, {@dfltgid}, {@nodevmap}, {@cache_none}, {@privport}, {@msize={'msize', 0x3d, 0x5}}, {@mmap}, {@debug={'debug', 0x3d, 0x9}}, {@posixacl}, {@privport}], [{@obj_user={'obj_user', 0x3d, '@},'}}]}}) 15:26:15 executing program 7: openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0xa0000, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000000)={{0x2, 0x0, @rand_addr=0x64010100}, {0x0, @local}, 0x20, {0x2, 0x0, @local}, 'dummy0\x00'}) ioctl$BTRFS_IOC_INO_PATHS(r0, 0xc0389423, &(0x7f0000000080)={0x1000, 0x18, [0x9, 0x2, 0x6647e076, 0x6], &(0x7f0000000040)=[0x0, 0x0, 0x0]}) socketpair(0xa, 0xa, 0x1, &(0x7f00000000c0)) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(0xffffffffffffffff, 0xc0305302, &(0x7f0000000140)={0x7e5da91d, 0x100, 0x8, 0x822, 0x1200, 0x2}) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_SIOCGIFCONF(r2, 0x8912, &(0x7f0000000280)=@buf={0xbc, &(0x7f00000001c0)="4f2e2cd487a0b1f2ba82255e6d14eb874fa93889f40e03b88d1a5868ec62b347faf0bb6bda0d9b12a1e3947318a460740ee98d8beea22eaa8bd650585af668502f48d872ac4f4eb1d2c22e8c43073833810f1b99a3ece51f975ee22590220e1dc225b12ffd38a7961a0e1fcd594c95bea05a94b05893924de34d698b01cb62f58cd0d0eb52abf57dbe9ab06e8c001f135f1ac179fb19b2c4beaf4de986a66e476a5e66bed569961727afc34056096e377bf2e1fb540a8df4b0d2941f"}) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'wg0\x00', 0x0}) setsockopt$inet_mreqn(r2, 0x0, 0x20, &(0x7f0000000180)={@dev={0xac, 0x14, 0x14, 0x3b}, @loopback, r3}, 0xc) ioctl$sock_inet_SIOCSARP(r1, 0x8955, &(0x7f0000000000)={{0x2, 0x0, @local}, {0x0, @local}, 0x20, {0x2, 0x0, @local}, 'dummy0\x00'}) 15:26:15 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x560a, 0x0) 15:26:15 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x5407, &(0x7f0000000080)={0x80, 0x1, 0x0, 0x401, 0x0, "bb09819e2f6e8485"}) 15:26:15 executing program 6: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, 0x0, &(0x7f0000000040)='proc\x00', 0x0, 0x0) mount$9p_tcp(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', &(0x7f0000000180), 0x4020, &(0x7f0000003300)={'trans=tcp,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@nodevmap}, {@dfltgid}, {@nodevmap}, {@cache_none}, {@privport}, {@msize={'msize', 0x3d, 0x5}}, {@mmap}, {@debug={'debug', 0x3d, 0x9}}, {@posixacl}, {@privport}], [{@obj_user={'obj_user', 0x3d, '@},'}}]}}) 15:26:15 executing program 1: r0 = syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0xfffffffffffffffe, 0x0, 0x0, 0x10080, 0x0) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r1, 0x7, 0x0, 0x0, 0x0) unlinkat(r1, &(0x7f0000000100)='./file0\x00', 0x200) ioctl$AUTOFS_DEV_IOCTL_FAIL(r1, 0xc0189377, &(0x7f0000000180)={{0x1, 0x1, 0x18, r0, {0x71, 0xa8}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r2, 0xc0189379, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, 0x0) mount$bind(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x64000, 0x0) mkdirat(r0, &(0x7f0000000080)='./file0\x00', 0x280) 15:26:15 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x5407, &(0x7f0000000080)={0x0, 0x0, 0xffff, 0x0, 0x0, "bb09819e2f6e8485"}) 15:26:15 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDGKBDIACR(r0, 0x4b4a, &(0x7f0000000180)=""/240) 15:26:15 executing program 6: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, 0x0, &(0x7f0000000040)='proc\x00', 0x0, 0x0) mount$9p_tcp(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', &(0x7f0000000180), 0x4020, &(0x7f0000003300)={'trans=tcp,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@nodevmap}, {@dfltgid}, {@nodevmap}, {@cache_none}, {@privport}, {@msize={'msize', 0x3d, 0x5}}, {@mmap}, {@debug={'debug', 0x3d, 0x9}}, {@posixacl}, {@privport}], [{@obj_user={'obj_user', 0x3d, '@},'}}]}}) 15:26:15 executing program 4: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1c08a4, 0x0) r1 = syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) open$dir(&(0x7f0000000200)='./mnt\x00', 0x40040, 0x10) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir/../file0\x00', 0x80, 0x0) r2 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x50008, 0x0, 0x10081, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r3 = openat(r1, &(0x7f0000000000)='mnt/encrypted_dir/../file0\x00', 0x40, 0x100) r4 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r4, 0x7, 0x0, 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r4, 0xc0406619, &(0x7f00000001c0)={@desc={0x1, 0x0, @desc2}}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000140)=',,\\\x00') futimesat(r3, &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0)={{0x0, 0xea60}}) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') 15:26:15 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x560b, 0x0) 15:26:15 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x5407, &(0x7f0000000080)={0x200, 0x0, 0x1000, 0x2000, 0x0, "00000000e1a30008"}) 15:26:15 executing program 6: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, 0x0, &(0x7f0000000040)='proc\x00', 0x0, 0x0) mount$9p_tcp(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', &(0x7f0000000180), 0x4020, &(0x7f0000003300)={'trans=tcp,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@nodevmap}, {@dfltgid}, {@nodevmap}, {@cache_none}, {@privport}, {@msize={'msize', 0x3d, 0x5}}, {@mmap}, {@debug={'debug', 0x3d, 0x9}}, {@posixacl}, {@privport}], [{@obj_user={'obj_user', 0x3d, '@},'}}]}}) 15:26:15 executing program 7: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCMBIS(r0, 0x5416, &(0x7f0000000080)=0x8) ioctl$TIOCL_SCROLLCONSOLE(r0, 0x541c, &(0x7f0000000040)={0xd, 0x5}) ioctl$TCSBRKP(r0, 0x5425, 0x994a) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r1, 0x7, 0x0, 0x0, 0x0) ioctl$TIOCSPTLCK(r1, 0x40045431, &(0x7f00000000c0)=0x1) fcntl$setlease(r0, 0x400, 0x1) 15:26:15 executing program 5: syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDGKBDIACR(0xffffffffffffffff, 0x4b4a, &(0x7f0000000180)=""/240) 15:26:28 executing program 4: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1c08a4, 0x0) r1 = syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) open$dir(&(0x7f0000000200)='./mnt\x00', 0x40040, 0x10) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir/../file0\x00', 0x80, 0x0) r2 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x50008, 0x0, 0x10081, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r3 = openat(r1, &(0x7f0000000000)='mnt/encrypted_dir/../file0\x00', 0x40, 0x100) r4 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r4, 0x7, 0x0, 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r4, 0xc0406619, &(0x7f00000001c0)={@desc={0x1, 0x0, @desc2}}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000140)=',,\\\x00') futimesat(r3, &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0)={{0x0, 0xea60}}) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') 15:26:28 executing program 7: ioctl$TCSBRKP(0xffffffffffffffff, 0x5425, 0x994a) ioctl$TIOCMBIS(0xffffffffffffffff, 0x5416, &(0x7f0000000000)=0x7fffffff) r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r0, 0x7, 0x0, 0x0, 0x0) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000040)={0x7e3, 0x1, 0x2, 0x2, 0x8, "22bd1792a22165f1447c3acdf0dd729646a808"}) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x8440, 0x0) ioctl$TIOCL_SELLOADLUT(r1, 0x541c, &(0x7f00000000c0)={0x5, 0x3ff, 0x0, 0x5, 0x20}) 15:26:28 executing program 1: r0 = syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, 0x0) mount$bind(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x64000, 0x0) stat(&(0x7f0000000000)='.\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r1, 0x0) fstat(r0, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000000)='.\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r3, 0x0) r4 = geteuid() r5 = geteuid() r6 = getegid() setresgid(0x0, 0x0, r6) r7 = getegid() setresgid(0x0, 0x0, r7) r8 = getegid() setresgid(0x0, 0x0, r8) setxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000100)='system.posix_acl_default\x00', &(0x7f0000000200)=ANY=[@ANYBLOB="02000000010003000000000002000100", @ANYRES32=0xee01, @ANYBLOB="02000300", @ANYRES32=r1, @ANYBLOB="02000100", @ANYRES32, @ANYBLOB="02000c00", @ANYRES32=r2, @ANYBLOB="02000600", @ANYRES32=r3, @ANYBLOB="02000400", @ANYRES32=r4, @ANYBLOB="02000f00", @ANYRES32=r5, @ANYBLOB="040000000000000008000000", @ANYRES32=0xee00, @ANYBLOB='\b\x00\a\x00', @ANYRES32, @ANYBLOB='\b\x00\b\x00', @ANYRES32, @ANYBLOB='\b\x00\a\x00', @ANYRES32=r6, @ANYBLOB="0800e6ff", @ANYRES32=r7, @ANYBLOB="08000100", @ANYRES32=r8, @ANYBLOB="10000200000000002000050000000000"], 0x8c, 0x3) 15:26:28 executing program 5: syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDGKBDIACR(0xffffffffffffffff, 0x4b4a, &(0x7f0000000180)=""/240) 15:26:28 executing program 0: ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, &(0x7f0000000000)={0xffffffffffffffff, 0x73, 0x3ff, 0x8000}) pwritev2(r0, &(0x7f0000000440)=[{&(0x7f00000000c0)="446dbd07f9c7d7d140b28ea044b4599cf141bdc9e4340d53765ee2c80cf0807949f26d6683b0c9e498491543707eabf696ef2e9f109d847001e6edf0235bb2e79d9b66958764e6db9ea9c6cae19f13c958", 0x51}, {&(0x7f0000000140)="6305eb8a4c1fed965df0855d6f0751feb5fd4f9824b6ea03713731de9a180e48d5abbc7d03fc91db36c49c36758c4ac42b0d2f11a736f479b9ef267dc7145f6488cb44877f40a1d36e96804134796aeade2b28fa564198e0f7d2f4ad6942e1771f9c30cc15c3f158e6398446c3d41bfb13f46273790ede01825c60fedb640560e04dac91ceff272f7dc75aa0fcafdc81d0e8", 0x92}, {&(0x7f0000000200)="9608c0b1baae6c1ce3a85d947eeffc09d6ec7801f14f08207d8a7572ad37879fff30a099ad7bc466239cf177df756e5d1f6fd1c0d419d73720564a6ff834fccd7c328d8cc298d0658feddb870f285c897273fe3cc7a26074945273fed2da0ea435cbb4ab1174dde0f131489777dc98c92d13bf34868852725986819b1b623a3e23dfe6aeddfef7a962b5203e35734f32fdb61bc78ea0a99b8b4dd4958f03f6cd5ff01338669d53f5e7a6ac9d478bf810cc4e92dc2db2abafcb94403a6998d8abb92e61f58566f1eea3657ce5c5bfd8cc160380672c46a950dccbfad29551cad96c08f9f737b026b4ed97c7dac27481be0390831b0f78d9b9466f60a8b3", 0xfd}, {&(0x7f0000000300)="cfa9b7795c14181b5cb13288cede62df357d69d02e99ddfc3973b54ff02d82945dca32456ddec042d02e5b082e179fe31ff40e6a0085f22e78adf1f00bc2344c59f2fcf44eea1f0fb2ce897c0c9a", 0x4e}, {&(0x7f0000000380)="bc6ffffed4431397050be83e762c47138115ba2c80e1282ab1dd4b19c63c4878aa25e7e162b84a9ef82b0f6e491c4b58cd58738d22799430236ab6a86fd89920ebecd72f5747ea17c939d1081a0c994740269a73853698c92a5d71190004dcbb4f146eeb4e3aee5b7c2e10842229a2d7962f32eff60b48905df84526f4e4f898508b527be3d5f83fa11a7a345de38fb71a74b7980ae1c15e24a0a68f1255c66a473fbd936d25b3ffb1c3d40ad31bb8b37d4a72418d40ed18aaf82ced3a46", 0xbe}], 0x5, 0x10001, 0x4, 0x1) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r1, 0x5407, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "bb09819e2f6e8485"}) 15:26:28 executing program 6: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) mount$9p_tcp(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', &(0x7f0000000180), 0x4020, &(0x7f0000003300)={'trans=tcp,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@nodevmap}, {@dfltgid}, {@nodevmap}, {@cache_none}, {@privport}, {@msize={'msize', 0x3d, 0x5}}, {@mmap}, {@debug={'debug', 0x3d, 0x9}}, {@posixacl}, {@privport}], [{@obj_user={'obj_user', 0x3d, '@},'}}]}}) 15:26:28 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x560c, 0x0) 15:26:29 executing program 3: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1c08a4, 0x0) r1 = syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) open$dir(&(0x7f0000000200)='./mnt\x00', 0x40040, 0x10) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir/../file0\x00', 0x80, 0x0) r2 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x50008, 0x0, 0x10081, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r3 = openat(r1, &(0x7f0000000000)='mnt/encrypted_dir/../file0\x00', 0x40, 0x100) r4 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r4, 0x7, 0x0, 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r4, 0xc0406619, &(0x7f00000001c0)={@desc={0x1, 0x0, @desc2}}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000140)=',,\\\x00') futimesat(r3, &(0x7f0000000080)='./file1\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000680)=ANY=[@ANYBLOB="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", @ANYRES32, @ANYBLOB="02000000000000006d6e742f656e637279707465645f6469722f2e2e2f66696c653000"]) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') 15:26:29 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x560d, 0x0) 15:26:29 executing program 0: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080), 0x3000, 0x0) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f00000000c0), &(0x7f0000000100)=0x14) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_SETSEL(r1, 0x541c, &(0x7f0000000040)={0x2, {0x2, 0xf92, 0xce5, 0xa9, 0x7, 0x10}}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCSARP(r2, 0x8955, &(0x7f0000000000)={{0x2, 0x0, @local}, {0x0, @local}, 0x20, {0x2, 0x0, @local}, 'dummy0\x00'}) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000240)={&(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000180)="613207d77ffe6950728d38ae60e050ee848fe046d3e2035741a56c0e32b930a985e0b4b77e80a55ae7630d59ab4f0a6003e4e80646597725ed3d0b8258e561c4c5e6004b51989eb5ec8becf6032b551c8a954ba6f87da0836f2cdeebd98328a44996af4d7eace81cf0688e2d25a504c4ec61953e453b86e3a4b8a8c69581400578eb60de2b03cbd8670a43811dbc6d4fd3d2ce00d2509bc28b682a9a71448ab75acfddcd66d2f0", 0xa7, r2}, 0x68) write$P9_RMKNOD(r0, &(0x7f0000000140)={0x14, 0x13, 0x2, {0x20, 0x3, 0x3}}, 0x14) ioctl$TCSETAW(r1, 0x5407, &(0x7f0000000000)={0x0, 0x3, 0x0, 0x0, 0x0, "bb09819e2f6e8485"}) 15:26:29 executing program 7: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) fallocate(r0, 0x2f, 0x100000001, 0x6) ioctl$TCSBRKP(r0, 0x5425, 0x994a) 15:26:29 executing program 5: syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDGKBDIACR(0xffffffffffffffff, 0x4b4a, &(0x7f0000000180)=""/240) 15:26:29 executing program 6: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) mount$9p_tcp(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', &(0x7f0000000180), 0x4020, &(0x7f0000003300)={'trans=tcp,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@nodevmap}, {@dfltgid}, {@nodevmap}, {@cache_none}, {@privport}, {@msize={'msize', 0x3d, 0x5}}, {@mmap}, {@debug={'debug', 0x3d, 0x9}}, {@posixacl}, {@privport}], [{@obj_user={'obj_user', 0x3d, '@},'}}]}}) 15:26:29 executing program 1: r0 = syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r1, 0x7, 0x0, 0x0, 0x0) getdents(r1, &(0x7f0000000380)=""/129, 0x81) fstat(r0, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffb, 0x1, &(0x7f0000000240)=[{&(0x7f0000000180)="b1fddcc870f1dd4e5273f606827eb710a3f95b9c7b893cfc3a3f67cfc7196b95a78f36a3266d6e1d2d028c368716e257f3a75a5d3e274bb91ce0c72adc6fd3444b0509cb3443ce4220e1b971cd8e5f0751dfb2cd17c7b53db3bfa92476bb3b720e64153b12e7cf353c82400f5febb629a273b6e735a3167a62b5b14ed30008c7a6fc0b1bd0f4f8e3ee592b52a2bfd86b52f24b1f230a032c8358f1594e92044a699fe9a95fc000ebf0dbebce779b07031b6187f812225af45947dcbbce", 0xbd, 0x3}], 0x2000808, &(0x7f0000000300)={[{@iocharset={'iocharset', 0x3d, 'cp857'}}, {@rodir}], [{@subj_role={'subj_role', 0x3d, 'proc\x00'}}, {@permit_directio}, {@obj_type}, {@subj_role={'subj_role', 0x3d, ']/'}}, {@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_eq={'uid', 0x3d, r2}}]}) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, 0x0) mount$bind(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x64000, 0x0) 15:26:45 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x560e, 0x0) 15:26:45 executing program 7: openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r0, 0x7, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r1, 0x7, 0x0, 0x0, 0x0) r2 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r2, 0x7, 0x0, 0x0, 0x0) mknodat(r1, &(0x7f0000000080)='./file0\x00', 0x80, 0x3) ioctl$TCSBRKP(r1, 0x5425, 0x80200000994a) ioctl$F2FS_IOC_GARBAGE_COLLECT_RANGE(r2, 0x4018f50b, &(0x7f0000000040)={0x0, 0x100000000, 0x1590}) 15:26:45 executing program 1: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) rename(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='./file0\x00') r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r0, 0x7, 0x0, 0x0, 0x0) mkdirat(r0, &(0x7f0000000680)='./file0\x00', 0x115) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, 0x0) syz_mount_image$nfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x1, 0x6, &(0x7f0000000540)=[{&(0x7f0000000200)="779eef2b9179640dbc3c21d80f4cc667e4ea03b925ae6b63c8cdac721734083daa740ee3588b9975e54e506d89f5d1febfbab7b05abe0bd90b837ffbfd8c698f9b0e08c8e289818f1ae47de08aef2a737de7b2894eaaf6c63212437ebded5544322a956480bc1fb04dcd30efc0", 0x6d}, {&(0x7f0000000280)="bf24a12077c1043d3365fe7599e5b403c5813626d0fa198c196bceb329de0ac35f097389f5587b142c6e2791baee4899aeb37d518114b26e891d82a865902274aae523fbf8cf4051860701b6c1c4cde5be3157c2da53e9b7f09a22d5e1b9c21245a11c6c7c00bda1833c5288573b666cb7ca95", 0x73, 0x80000001}, {&(0x7f0000000300)="abdee2d4b4d92b71a2d3f01b476f5529d622b21a5f11ed5f5d56cf57ab077410725ff9611e16c3804a1fb2ea018e", 0x2e, 0x1ff}, {&(0x7f0000000340)="0753000a50d0b7faf3c1f8e1ab67e80381e72f275a3c9494acebe78e31ed4bad5b6d3ca9968854284475026a8e6a5ecfb8bc3d7f334ed891158fc8e89ec18e83629f8ce3637b087d182c3ba3e7957a64df4f3f9349389f5c41d73e2766c7f4318a5b93487b7fe71b012a7ca7cd179de79174da5a8480ac738226ce9994958ead177be5d3f374e984d61d5fe07c3da80e51b069ec644bacb56d20561429b4ba971303428286bc460077b00fe01ffb7ef552a2ede52c5be8911482a8bf7ed2e6b2e2140e030baabd567dc8aca11005531cbabbfd0ea01717555b1b7a01a08b06c7d28ac9fea7803f9524f3a4fd22a3507287", 0xf1, 0x60c51515}, {&(0x7f0000000440)="107a94b6b7d7ab3f3e6d18029a23ee0f9b048586972ad81bb4a10caa1ccf04a63f0b70ed9540af24037be882f985c6fd63dd8725dd4edeb2a104fff217", 0x3d, 0x3de3d75b}, {&(0x7f0000000480)="459b33c395cfb5765402895b2fd5b7c1eca0267d8cfb85c63c5d7ac8b54dd8356447f85a13f231fc3340d378b086591fb20a1af624ca0d05285d31826471fec984f7fe93250b75788f5bc7a1f19538d22937a6141a3a9e1bff2c8a753f407160f7eb090873402ec9d44d56db0fd40780b6ebbbbc9a5c6413a6a031a4c54cbb7afe97299bbbf28c6b1f", 0x89, 0x100000000}], 0x40000, &(0x7f0000000600)={[{'proc\x00'}, {'proc\x00'}, {'proc\x00'}, {'\x97)!'}, {'proc\x00'}, {}, {'proc\x00'}], [{@appraise_type}, {@appraise_type}, {@mask={'mask', 0x3d, 'MAY_WRITE'}}, {@seclabel}, {@measure}]}) mount$bind(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x64000, 0x0) 15:26:45 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDGKBDIACR(r0, 0x4b4a, 0x0) 15:26:45 executing program 0: ioctl$TIOCL_UNBLANKSCREEN(0xffffffffffffffff, 0x541c, &(0x7f0000000000)) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, &(0x7f00000013c0)={0x54, 0x0, &(0x7f00000012c0)=[@reply_sg={0x40486312, {0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68, 0x18, &(0x7f0000001200)={@ptr={0x70742a85, 0x1, &(0x7f0000000100)=""/241, 0xf1, 0x0, 0xbd0}, @ptr={0x70742a85, 0x1, &(0x7f0000000200)=""/4096, 0x1000, 0x0, 0x33}, @fd}, &(0x7f0000001280)={0x0, 0x28, 0x50}}, 0x1000}, @release={0x40046306, 0x3}], 0x4a, 0x0, &(0x7f0000001340)="03bc17f636225cf2718fe2f6a1d6700a981b5e55b8f171bec495fd256eaf7f6cf1a7d63c1c371f21db23dda6ce99582e1d5a83eb95c8a9266a8fc5e386fa38935fba41439377b20766bc"}) ioctl$TCSETAW(0xffffffffffffffff, 0x5407, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "bb09819e2f6e8485"}) syncfs(0xffffffffffffffff) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/thermal', 0x10101, 0x10) ioctl$PIO_UNIMAPCLR(r0, 0x4b68, &(0x7f00000000c0)={0xffe0, 0x1, 0x3}) 15:26:45 executing program 6: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) mount$9p_tcp(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', &(0x7f0000000180), 0x4020, &(0x7f0000003300)={'trans=tcp,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@nodevmap}, {@dfltgid}, {@nodevmap}, {@cache_none}, {@privport}, {@msize={'msize', 0x3d, 0x5}}, {@mmap}, {@debug={'debug', 0x3d, 0x9}}, {@posixacl}, {@privport}], [{@obj_user={'obj_user', 0x3d, '@},'}}]}}) 15:26:45 executing program 4: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1c08a4, 0x0) r1 = syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) open$dir(&(0x7f0000000200)='./mnt\x00', 0x40040, 0x10) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir/../file0\x00', 0x80, 0x0) r2 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x50008, 0x0, 0x10081, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r3 = openat(r1, &(0x7f0000000000)='mnt/encrypted_dir/../file0\x00', 0x40, 0x100) r4 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r4, 0x7, 0x0, 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r4, 0xc0406619, &(0x7f00000001c0)={@desc={0x1, 0x0, @desc2}}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000140)=',,\\\x00') futimesat(r3, &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0)={{0x0, 0xea60}}) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') 15:26:45 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x560d, 0x0) 15:26:45 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x560d, 0x0) 15:26:45 executing program 4: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1c08a4, 0x0) r1 = syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) open$dir(&(0x7f0000000200)='./mnt\x00', 0x40040, 0x10) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir/../file0\x00', 0x80, 0x0) r2 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x50008, 0x0, 0x10081, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r3 = openat(r1, &(0x7f0000000000)='mnt/encrypted_dir/../file0\x00', 0x40, 0x100) r4 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r4, 0x7, 0x0, 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r4, 0xc0406619, &(0x7f00000001c0)={@desc={0x1, 0x0, @desc2}}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000140)=',,\\\x00') futimesat(r3, &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0)={{0x0, 0xea60}}) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000680)=ANY=[@ANYBLOB="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", @ANYRES32]) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') 15:26:45 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x560f, 0x0) 15:26:45 executing program 6: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, 0x0) mount$9p_tcp(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000180), 0x4020, &(0x7f0000003300)={'trans=tcp,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@nodevmap}, {@dfltgid}, {@nodevmap}, {@cache_none}, {@privport}, {@msize={'msize', 0x3d, 0x5}}, {@mmap}, {@debug={'debug', 0x3d, 0x9}}, {@posixacl}, {@privport}], [{@obj_user={'obj_user', 0x3d, '@},'}}]}}) 15:26:45 executing program 1: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x94000d, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) lsetxattr$trusted_overlay_redirect(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x8, 0x3) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f00000001c0)={{0x2, 0x0, @local}, {0x0, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}, 0x20, {0x2, 0x0, @local}, 'virt_wifi0\x00'}) close(r0) mount$bind(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x64004, 0x0) 15:26:45 executing program 7: r0 = socket$inet(0x2, 0x1, 0x3faf) ioctl$sock_SIOCADDDLCI(r0, 0x8980, &(0x7f0000000040)={'veth1_to_bridge\x00', 0x5d5}) r1 = syz_open_dev$vcsn(&(0x7f0000000080), 0xbb5, 0x20100) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCSARP(r2, 0x8955, &(0x7f0000000000)={{0x2, 0x0, @local}, {0x0, @local}, 0x20, {0x2, 0x0, @local}, 'dummy0\x00'}) getsockopt$inet_opts(r2, 0x0, 0x16, &(0x7f00000001c0)=""/166, &(0x7f0000000280)=0xa6) getsockopt$bt_l2cap_L2CAP_OPTIONS(r1, 0x6, 0x1, &(0x7f00000000c0), &(0x7f0000000100)=0xc) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCSARP(r3, 0x8955, &(0x7f0000000000)={{0x2, 0x0, @local}, {0x0, @local}, 0x20, {0x2, 0x0, @local}, 'dummy0\x00'}) getsockopt$inet_mtu(r3, 0x0, 0xa, &(0x7f00000002c0), &(0x7f0000000300)=0x4) r4 = socket$unix(0x1, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000140), &(0x7f0000000180)=0xc) ioctl$sock_inet_udp_SIOCINQ(r2, 0x541b, &(0x7f0000000340)) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r5 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r5, 0x7, 0x0, 0x0, 0x0) r6 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r6, 0x7, 0x0, 0x0, 0x0) pidfd_getfd(r5, r2, 0x0) ioctl$TCSBRKP(r1, 0x5425, 0xdc7) 15:26:45 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDGKBDIACR(r0, 0x4b4a, 0x0) 15:26:45 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x560d, 0x0) 15:26:45 executing program 0: openat$vcsu(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r0, 0x7, 0x0, 0x0, 0x0) ioctl$TIOCMSET(r0, 0x5418, &(0x7f0000000200)=0xff) openat$tun(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f00000004c0)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0}) r3 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f0000000640)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0}) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(0xffffffffffffffff, 0x5000943f, &(0x7f0000000840)={{}, r4, 0x4, @inherit={0x80, &(0x7f0000000080)=ANY=[@ANYBLOB="010000000024a5000700000000000000b26e9690f81dd59a03000000cd000000000000000000000000000000000000a580040000000000b664f17b02000000000000007eacf3177c4830daa39375770000ffff000000000000010000800000000809000000000000000800000000000004000008000000"]}, @devid}) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(0xffffffffffffffff, 0x5000943f, &(0x7f0000000840)={{}, r4, 0x4, @inherit={0x80, &(0x7f0000000180)=ANY=[@ANYRESOCT=0x0]}, @name="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"}) ioctl$BTRFS_IOC_WAIT_SYNC(0xffffffffffffffff, 0x40089416, &(0x7f0000000000)=r2) r5 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_SETSEL(r5, 0x541c, &(0x7f0000000040)={0x2, {0x2, 0x1, 0x4, 0x1ff, 0x5a8}}) ioctl$TCSETAW(r5, 0x5407, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "bb09819e2f6e8485"}) [ 1287.806057] proc: Unknown parameter 'trans' 15:26:57 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x2) ioctl$TCSETAW(r0, 0x5407, &(0x7f0000000000)={0x0, 0x0, 0x1000, 0x0, 0x0, "bb09819e2f678485"}) ioctl$TIOCL_SCROLLCONSOLE(r0, 0x541c, &(0x7f0000000040)={0xd, 0x7}) fsync(r0) 15:26:57 executing program 4: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1c08a4, 0x0) r1 = syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) open$dir(&(0x7f0000000200)='./mnt\x00', 0x40040, 0x10) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir/../file0\x00', 0x80, 0x0) r2 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x50008, 0x0, 0x10081, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r3 = openat(r1, &(0x7f0000000000)='mnt/encrypted_dir/../file0\x00', 0x40, 0x100) r4 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r4, 0x7, 0x0, 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r4, 0xc0406619, &(0x7f00000001c0)={@desc={0x1, 0x0, @desc2}}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000140)=',,\\\x00') futimesat(r3, &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0)={{0x0, 0xea60}}) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000680)=ANY=[@ANYBLOB="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", @ANYRES32]) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') 15:26:57 executing program 6: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, 0x0) mount$9p_tcp(0x0, 0x0, &(0x7f0000000180), 0x4020, &(0x7f0000003300)={'trans=tcp,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@nodevmap}, {@dfltgid}, {@nodevmap}, {@cache_none}, {@privport}, {@msize={'msize', 0x3d, 0x5}}, {@mmap}, {@debug={'debug', 0x3d, 0x9}}, {@posixacl}, {@privport}], [{@obj_user={'obj_user', 0x3d, '@},'}}]}}) 15:26:57 executing program 7: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCSBRKP(r0, 0x5425, 0x8) 15:26:57 executing program 3: ioctl$TCSETAW(0xffffffffffffffff, 0x560d, 0x0) 15:26:57 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x40049409, 0x0) 15:26:57 executing program 1: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x4, 0x0, 0x0, 0x100000, 0x0) umount2(&(0x7f0000000040)='./file0\x00', 0x8) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='iso9660\x00', 0x0, 0x0) mount$bind(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x64000, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000100)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB="faffffffe9ffffff2d2f66696c653000"]) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f0000000180)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) 15:26:57 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDGKBDIACR(r0, 0x4b4a, 0x0) 15:26:57 executing program 5: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1c08a4, 0x0) r1 = syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) open$dir(&(0x7f0000000200)='./mnt\x00', 0x40040, 0x10) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir/../file0\x00', 0x80, 0x0) r2 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x50008, 0x0, 0x10081, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r3 = openat(r1, &(0x7f0000000000)='mnt/encrypted_dir/../file0\x00', 0x40, 0x100) r4 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r4, 0x7, 0x0, 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r4, 0xc0406619, &(0x7f00000001c0)={@desc={0x1, 0x0, @desc2}}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000140)=',,\\\x00') futimesat(r3, &(0x7f0000000080)='./file1\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000680)=ANY=[@ANYBLOB="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", @ANYRES32, @ANYBLOB="02000000000000006d6e742f656e637279707465645f6469722f2e2e2f66696c653000"]) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') 15:26:57 executing program 3: ioctl$TCSETAW(0xffffffffffffffff, 0x560d, 0x0) 15:26:57 executing program 1: write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000100)={0x10, 0x17, 0x1, {0x7, './file0'}}, 0x10) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, 0x0) llistxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)=""/185, 0xb9) mount$bind(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x64000, 0x0) 15:26:57 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x5407, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "bb09819e2f6e8485"}) r1 = syz_open_dev$tty1(0xc, 0x4, 0x4) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000000)) 15:26:57 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x40086602, 0x0) 15:26:57 executing program 6: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, 0x0) mount$9p_tcp(0x0, 0x0, &(0x7f0000000180), 0x4020, &(0x7f0000003300)={'trans=tcp,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@nodevmap}, {@dfltgid}, {@nodevmap}, {@cache_none}, {@privport}, {@msize={'msize', 0x3d, 0x5}}, {@mmap}, {@debug={'debug', 0x3d, 0x9}}, {@posixacl}, {@privport}], [{@obj_user={'obj_user', 0x3d, '@},'}}]}}) 15:27:10 executing program 3: ioctl$TCSETAW(0xffffffffffffffff, 0x560d, 0x0) 15:27:10 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x5608, 0x0) 15:27:10 executing program 4: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1c08a4, 0x0) r1 = syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) open$dir(&(0x7f0000000200)='./mnt\x00', 0x40040, 0x10) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir/../file0\x00', 0x80, 0x0) r2 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x50008, 0x0, 0x10081, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r3 = openat(r1, &(0x7f0000000000)='mnt/encrypted_dir/../file0\x00', 0x40, 0x100) r4 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r4, 0x7, 0x0, 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r4, 0xc0406619, &(0x7f00000001c0)={@desc={0x1, 0x0, @desc2}}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000140)=',,\\\x00') futimesat(r3, &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0)={{0x0, 0xea60}}) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000680)=ANY=[@ANYBLOB="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", @ANYRES32]) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') 15:27:10 executing program 1: r0 = syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, 0x0) r1 = getegid() setgid(r1) r2 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r2, 0x7, 0x0, 0x0, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000100)={0x10, 0x17, 0x1, {0x7, './file0'}}, 0x10) fchownat(r0, &(0x7f0000000080)='./file0\x00', 0xee00, r1, 0x100) mount$bind(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x64000, 0x0) 15:27:10 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = open(&(0x7f0000000000)='./file0\x00', 0x424000, 0x3) ioctl$TIOCCBRK(r1, 0x5428) ioctl$TCSETAW(r0, 0x5407, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "bb09819e2f6e8485"}) 15:27:10 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x40087602, 0x0) 15:27:10 executing program 6: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, 0x0) mount$9p_tcp(0x0, 0x0, &(0x7f0000000180), 0x4020, &(0x7f0000003300)={'trans=tcp,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@nodevmap}, {@dfltgid}, {@nodevmap}, {@cache_none}, {@privport}, {@msize={'msize', 0x3d, 0x5}}, {@mmap}, {@debug={'debug', 0x3d, 0x9}}, {@posixacl}, {@privport}], [{@obj_user={'obj_user', 0x3d, '@},'}}]}}) 15:27:10 executing program 7: r0 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0xa, 0x810, 0xffffffffffffffff, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) syz_io_uring_submit(r0, 0x0, &(0x7f0000000700)=@IORING_OP_RECVMSG={0xa, 0x0, 0x0, r1, 0x0, &(0x7f00000006c0)={&(0x7f0000000440)=@l2tp6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000000680)=[{&(0x7f00000003c0)}, {&(0x7f00000004c0)=""/147, 0x93}, {&(0x7f0000000580)=""/223, 0xdf}], 0x3}, 0x0, 0x2000, 0x0, {0x1}}, 0x8000) r2 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) syz_genetlink_get_family_id$tipc2(&(0x7f0000000080), 0xffffffffffffffff) r3 = openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x46e2, 0x0) ftruncate(r3, 0x1000003) preadv(r3, &(0x7f0000000400)=[{&(0x7f0000000b80)=""/145, 0x91}, {0x0, 0x2}], 0x2, 0x0, 0x0) sendmsg$TIPC_NL_LINK_RESET_STATS(r2, &(0x7f00000002c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000280)={&(0x7f0000000740)=ANY=[@ANYRESOCT=r2, @ANYRES32=r2, @ANYBLOB="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"], 0x27c}, 0x1, 0x0, 0x0, 0x20004084}, 0x20048884) r4 = openat$sr(0xffffffffffffff9c, &(0x7f00000000c0), 0x103, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r4, 0x8933, &(0x7f0000000100)={'batadv_slave_0\x00'}) r5 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCSBRKP(r5, 0x5425, 0x994a) io_setup(0x5, &(0x7f0000000000)=0x0) r7 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r8 = openat$procfs(0xffffffffffffff9c, &(0x7f00000010c0)='/proc/diskstats\x00', 0x0, 0x0) io_submit(r6, 0x2, &(0x7f0000000080)=[&(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, r7, 0x0}, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, r7, 0x0, 0x0, 0x0, 0x0, 0x1, r8}]) r9 = openat$cgroup_subtree(r3, &(0x7f0000000140), 0x2, 0x0) r10 = open(&(0x7f0000000240)='./file0\x00', 0x282000, 0x0) io_cancel(r6, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x8, 0x7, r9, &(0x7f0000000180)="e96567d51b877d1ad5238645881c8b958f2e5d44b04f316ad3ba0ece133c23e71e4a913de031b344f5e32b3feebe088d462463b334262b6e4d333cdb7fca78044317179c48064553ea6e5e0f2b7658dd615a735980c5656d7410c28dde33b834e2f20042351266be232153fb1cb08deb6a54e75f4636e4587c640848d899b0af0065427c61406d2f0295a8184644c05881dc3fe26b263770384296e2b68846a42e9a9f3f43985d43d2767ae442b76ca2a934181e44f3ab554b3d", 0xba, 0x7, 0x0, 0x2, r10}, &(0x7f0000000340)) 15:27:10 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCGPKT(r0, 0x80045438, &(0x7f0000000000)) ioctl$TCSETAW(r0, 0x5407, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x10, "bb09819e2f6e8485"}) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r1, 0x7, 0x0, 0x0, 0x0) ioctl$TCSETS(r1, 0x5402, &(0x7f0000000040)={0xfffffffb, 0x4, 0x9, 0x2, 0x4, "9cca9678f66e8d48b4fd3df537254a3d4fb31f"}) 15:27:10 executing program 6: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, 0x0) mount$9p_tcp(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x4020, &(0x7f0000003300)={'trans=tcp,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@nodevmap}, {@dfltgid}, {@nodevmap}, {@cache_none}, {@privport}, {@msize={'msize', 0x3d, 0x5}}, {@mmap}, {@debug={'debug', 0x3d, 0x9}}, {@posixacl}, {@privport}], [{@obj_user={'obj_user', 0x3d, '@},'}}]}}) 15:27:10 executing program 5: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1c08a4, 0x0) r1 = syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) open$dir(&(0x7f0000000200)='./mnt\x00', 0x40040, 0x10) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir/../file0\x00', 0x80, 0x0) r2 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x50008, 0x0, 0x10081, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) openat(r1, &(0x7f0000000000)='mnt/encrypted_dir/../file0\x00', 0x40, 0x100) r3 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r3, 0x7, 0x0, 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r3, 0xc0406619, &(0x7f00000001c0)={@desc={0x1, 0x0, @desc2}}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000140)=',,\\\x00') futimesat(0xffffffffffffffff, &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0)={{0x0, 0xea60}}) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000680)=ANY=[@ANYBLOB="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", @ANYRES32, @ANYBLOB="02000000000000006d6e742f656e637279707465645f6469722f2e2e2f66696c653000"]) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') 15:27:10 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x560d, 0x0) 15:27:10 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x4020940d, 0x0) 15:27:10 executing program 4: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1c08a4, 0x0) r1 = syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) open$dir(&(0x7f0000000200)='./mnt\x00', 0x40040, 0x10) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir/../file0\x00', 0x80, 0x0) r2 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x50008, 0x0, 0x10081, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r3 = openat(r1, &(0x7f0000000000)='mnt/encrypted_dir/../file0\x00', 0x40, 0x100) r4 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r4, 0x7, 0x0, 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r4, 0xc0406619, &(0x7f00000001c0)={@desc={0x1, 0x0, @desc2}}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000140)=',,\\\x00') futimesat(r3, &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0)={{0x0, 0xea60}}) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000680)=ANY=[@ANYBLOB="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", @ANYRES32, @ANYBLOB]) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') 15:27:10 executing program 1: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x80892, 0x0) mount$bind(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x64000, 0x0) mount$cgroup2(0x0, &(0x7f0000000100)='./file0/file0\x00', &(0x7f0000000180), 0x24, &(0x7f00000001c0)=ANY=[@ANYBLOB="6d656d6f72792c6d656d6f72795f72656375727369766570726f742c7569643c0000fbffffffffffffff00000000", @ANYRESDEC, @ANYBLOB=',appraise,euid>', @ANYRESDEC, @ANYBLOB=',fsmagic=0x0000000000000005,\x00']) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x400, 0x0) [ 1312.897776] proc: Unknown parameter 'trans' 15:27:10 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCSSOFTCAR(0xffffffffffffffff, 0x541a, &(0x7f0000000000)=0x3327) ioctl$TCSETAW(r0, 0x5407, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "bb09819e2f6e8485"}) 15:27:25 executing program 7: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCL_SCROLLCONSOLE(r0, 0x541c, &(0x7f0000000040)={0xd, 0x3}) ioctl$TCSBRKP(r0, 0x5425, 0x994a) 15:27:25 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCSCTTY(r0, 0x540e, 0x4) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = syz_io_uring_setup(0x7d04, &(0x7f00000002c0), &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r3, r4, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f0000000240)=[{&(0x7f0000000340)=""/142, 0x8e}], 0x1}, 0x0) r5 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r2, 0x0) syz_io_uring_submit(r5, r4, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) r6 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x20000, 0x0) syz_io_uring_setup(0x78a1, &(0x7f0000000080)={0x0, 0xa91f, 0x10, 0x0, 0x3ba}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f00000002c0), &(0x7f0000000180)=0x0) r8 = io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) syz_io_uring_submit(0x0, r7, &(0x7f0000000040)=@IORING_OP_REMOVE_BUFFERS={0x1f, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x1, {0x23, r8}}, 0x7ff) syz_io_uring_submit(r5, 0x0, &(0x7f0000000140)=@IORING_OP_ACCEPT={0xd, 0x4, 0x0, r6, &(0x7f0000000040)=0x80, &(0x7f00000000c0)=@l2tp6={0xa, 0x0, 0x0, @loopback}, 0x0, 0x80800, 0x1, {0x0, r8}}, 0x1ff) fsconfig$FSCONFIG_CMD_RECONFIGURE(r1, 0x7, 0x0, 0x0, 0x0) ioctl$TCSETAW(r1, 0x5407, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x80, "bb09819e2f6e8485"}) 15:27:25 executing program 6: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, 0x0) mount$9p_tcp(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000003300)={'trans=tcp,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@nodevmap}, {@dfltgid}, {@nodevmap}, {@cache_none}, {@privport}, {@msize={'msize', 0x3d, 0x5}}, {@mmap}, {@debug={'debug', 0x3d, 0x9}}, {@posixacl}, {@privport}], [{@obj_user={'obj_user', 0x3d, '@},'}}]}}) 15:27:25 executing program 3: syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(0xffffffffffffffff, 0x560d, 0x0) 15:27:25 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x80045432, 0x0) 15:27:25 executing program 4: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1c08a4, 0x0) r1 = syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) open$dir(&(0x7f0000000200)='./mnt\x00', 0x40040, 0x10) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir/../file0\x00', 0x80, 0x0) r2 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x50008, 0x0, 0x10081, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r3 = openat(r1, &(0x7f0000000000)='mnt/encrypted_dir/../file0\x00', 0x40, 0x100) r4 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r4, 0x7, 0x0, 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r4, 0xc0406619, &(0x7f00000001c0)={@desc={0x1, 0x0, @desc2}}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000140)=',,\\\x00') futimesat(r3, &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0)={{0x0, 0xea60}}) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000680)=ANY=[@ANYBLOB="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", @ANYRES32, @ANYBLOB]) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') 15:27:25 executing program 5: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1c08a4, 0x0) r1 = syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) open$dir(&(0x7f0000000200)='./mnt\x00', 0x40040, 0x10) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir/../file0\x00', 0x80, 0x0) r2 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x50008, 0x0, 0x10081, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r3 = openat(r1, &(0x7f0000000000)='mnt/encrypted_dir/../file0\x00', 0x40, 0x100) r4 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r4, 0x7, 0x0, 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r4, 0xc0406619, &(0x7f00000001c0)={@desc={0x1, 0x0, @desc2}}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000140)=',,\\\x00') futimesat(r3, &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0)={{0x0, 0xea60}}) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000680)=ANY=[@ANYBLOB="b00900000000000018000000468a29458f2709d329f6d3f3917408961482081d984538af2f9bcf61c448afbaa0be3f00000000000000ca4aa56fc413a417324e8530165c3515981e2d28f7fce9ae3c6bb8fa04ff6411132c9ced479abaeea325c2205ea95984d3d7f98eea1cca02dfeb0b2471b497fbb71b60180d35e2a3394ba6d965f41c7b7bc29d4e3ca95bd7ad074a4242ec98a69ad9d1546ce18cbbd98d2e50688e958a0fcd16876ab83cdb94eeb03e42203f267a1bf6ccb1c07ad92e6e493149da32f754251ae74d30cd4b50eefd6a208172ed8693b320eda714bdd152b484d9c939b4bb777dddd947843d73529f5ffe589777254cb10f733351e0739a3a61c3b8f977517ee7becda66da23a93e3be8ed63bda262951b32f72c1c48ee63be474eafaa255074efaa494b950f48b119c76c70b833e4d7443b691dc97bf78bcae908758ff1edaf2ad48dd67d0337c8ecfcd47e8ce5598c435f4645d719ae60a12c5b37ed2d45571c29ff6af1292ed2ff7fa24e2ab69f18db826044f35683810d2ee95f68f586a8922acdc225912820cdffe6ac29641f3c531a0eb1ddbf17341a05f3ee437f2a56a4a92af8ba2e413d00d05caab40963868dc00da000dfe8962927be81ca05afcc624225b2667a1208dd74e8bb6ced5e1da98f41bb3dedc31302fbf6ed40e9c526f82b53ce45e25e20ce9068bba911f0ec11403a35ff01cee623f71101155fcb646937ac714ac49741b4a1ffc6a72cba387bf41c1af2eeaa80a07631a22d366562924848da0f27c", @ANYRES32, @ANYBLOB]) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') 15:27:25 executing program 1: ioctl$VT_WAITACTIVE(0xffffffffffffffff, 0x5607) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000080), 0x84400, 0x0) ioctl$CDROM_SELECT_DISK(r0, 0x5322, 0x101) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCSARP(r1, 0x8955, &(0x7f0000000000)={{0x2, 0x0, @local}, {0x0, @local}, 0x20, {0x2, 0x0, @local}, 'dummy0\x00'}) fcntl$getflags(r1, 0x40a) mount$bind(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x64000, 0x0) 15:27:25 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x80045440, 0x0) 15:27:25 executing program 6: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, 0x0) mount$9p_tcp(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000003300)={'trans=tcp,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@nodevmap}, {@dfltgid}, {@nodevmap}, {@cache_none}, {@privport}, {@msize={'msize', 0x3d, 0x5}}, {@mmap}, {@debug={'debug', 0x3d, 0x9}}, {@posixacl}, {@privport}], [{@obj_user={'obj_user', 0x3d, '@},'}}]}}) 15:27:25 executing program 3: syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(0xffffffffffffffff, 0x560d, 0x0) 15:27:25 executing program 5: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1c08a4, 0x0) r1 = syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) open$dir(&(0x7f0000000200)='./mnt\x00', 0x40040, 0x10) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir/../file0\x00', 0x80, 0x0) r2 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x50008, 0x0, 0x10081, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) openat(r1, &(0x7f0000000000)='mnt/encrypted_dir/../file0\x00', 0x40, 0x100) r3 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r3, 0x7, 0x0, 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r3, 0xc0406619, &(0x7f00000001c0)={@desc={0x1, 0x0, @desc2}}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000140)=',,\\\x00') futimesat(0xffffffffffffffff, &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0)={{0x0, 0xea60}}) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000680)=ANY=[@ANYBLOB="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", @ANYRES32, @ANYBLOB="02000000000000006d6e742f656e637279707465645f6469722f2e2e2f66696c653000"]) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') 15:27:25 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$VFAT_IOCTL_READDIR_BOTH(r0, 0x82307201, &(0x7f0000000180)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r1, 0x7, 0x0, 0x0, 0x0) r2 = getuid() write$P9_RGETATTR(r1, &(0x7f00000000c0)={0xa0, 0x19, 0x1, {0x108, {0x8, 0x1, 0x6}, 0x42, r2, 0x0, 0x758, 0x96, 0x9, 0x5, 0x7, 0x7f, 0xad3, 0x0, 0x37c, 0x7, 0x4, 0x7, 0x772, 0x4, 0xfffffffffffffff7}}, 0xa0) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) mkdirat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x20) ioctl$TCSETAW(r3, 0x5407, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "bb09819e2f6e8485"}) 15:27:25 executing program 4: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1c08a4, 0x0) r1 = syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) open$dir(&(0x7f0000000200)='./mnt\x00', 0x40040, 0x10) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir/../file0\x00', 0x80, 0x0) r2 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x50008, 0x0, 0x10081, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r3 = openat(r1, &(0x7f0000000000)='mnt/encrypted_dir/../file0\x00', 0x40, 0x100) r4 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r4, 0x7, 0x0, 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r4, 0xc0406619, &(0x7f00000001c0)={@desc={0x1, 0x0, @desc2}}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000140)=',,\\\x00') futimesat(r3, &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0)={{0x0, 0xea60}}) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000680)=ANY=[@ANYBLOB="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", @ANYRES32, @ANYBLOB]) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') 15:27:25 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/fib_triestat\x00') getpeername(r0, &(0x7f00000000c0)=@hci, &(0x7f0000000040)=0x80) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r1, 0x5407, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "bb09819e2f6e8485"}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCSARP(r2, 0x8955, &(0x7f0000000000)={{0x2, 0x0, @local}, {0x0, @local}, 0x20, {0x2, 0x0, @local}, 'dummy0\x00'}) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000140)={'ip6tnl0\x00'}) ioctl$TCXONC(r1, 0x540a, 0x1) 15:27:25 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x80086601, 0x0) 15:27:39 executing program 6: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, 0x0) mount$9p_tcp(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000003300)={'trans=tcp,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@nodevmap}, {@dfltgid}, {@nodevmap}, {@cache_none}, {@privport}, {@msize={'msize', 0x3d, 0x5}}, {@mmap}, {@debug={'debug', 0x3d, 0x9}}, {@posixacl}, {@privport}], [{@obj_user={'obj_user', 0x3d, '@},'}}]}}) 15:27:39 executing program 7: openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ptype\x00') ioctl$TCSBRKP(r0, 0x5425, 0x80000000000007) 15:27:39 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/fib_triestat\x00') getpeername(r0, &(0x7f00000000c0)=@hci, &(0x7f0000000040)=0x80) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r1, 0x5407, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "bb09819e2f6e8485"}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCSARP(r2, 0x8955, &(0x7f0000000000)={{0x2, 0x0, @local}, {0x0, @local}, 0x20, {0x2, 0x0, @local}, 'dummy0\x00'}) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000140)={'ip6tnl0\x00'}) ioctl$TCXONC(r1, 0x540a, 0x1) 15:27:39 executing program 4: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1c08a4, 0x0) r1 = syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) open$dir(&(0x7f0000000200)='./mnt\x00', 0x40040, 0x10) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir/../file0\x00', 0x80, 0x0) r2 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x50008, 0x0, 0x10081, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r3 = openat(r1, &(0x7f0000000000)='mnt/encrypted_dir/../file0\x00', 0x40, 0x100) r4 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r4, 0x7, 0x0, 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r4, 0xc0406619, &(0x7f00000001c0)={@desc={0x1, 0x0, @desc2}}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000140)=',,\\\x00') futimesat(r3, &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0)={{0x0, 0xea60}}) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000680)=ANY=[@ANYBLOB="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", @ANYRES32, @ANYBLOB="02000000000000006d6e742f656e63727970"]) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') 15:27:39 executing program 5: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCSBRKP(r0, 0x5425, 0x9) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000040)={0x7ff, 0x3, 0x7}) 15:27:39 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x80087601, 0x0) 15:27:39 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) lseek(0xffffffffffffffff, 0x5, 0x3) ioctl$TCSETAW(r0, 0x5407, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x2, "bb09819e2f6e8485"}) 15:27:39 executing program 3: syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(0xffffffffffffffff, 0x560d, 0x0) 15:27:39 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_SCROLLCONSOLE(r0, 0x541c, &(0x7f0000000000)={0xd, 0x10000}) ioctl$TCSETAW(r0, 0x5407, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "bb09819e2f6e8485"}) 15:27:39 executing program 6: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, 0x0) mount$9p_tcp(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x4020, 0x0) 15:27:39 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0xc0045878, 0x0) 15:27:39 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x5407, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "bb09819e2f6e8485"}) ioctl$TCXONC(r0, 0x540a, 0x2) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r1, 0x7, 0x0, 0x0, 0x0) r2 = syz_open_dev$mouse(&(0x7f0000000040), 0x7, 0x0) ioctl$GIO_CMAP(r2, 0x4b70, &(0x7f00000000c0)) 15:27:39 executing program 7: ioctl$TCSBRKP(0xffffffffffffffff, 0x5425, 0x994a) 15:27:39 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x5407, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x1000, 0x1, "bb09819e2f6e8485"}) ioctl$TIOCSSOFTCAR(r0, 0x541a, &(0x7f00000000c0)=0xda74) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCSARP(r1, 0x8955, &(0x7f0000000000)={{0x2, 0x0, @local}, {0x0, @local}, 0x20, {0x2, 0x0, @local}, 'dummy0\x00'}) ioctl$F2FS_IOC_SET_PIN_FILE(r1, 0x4004f50d, &(0x7f0000000000)=0x1) ioctl$GIO_UNISCRNMAP(r0, 0x4b69, &(0x7f0000000100)=""/239) 15:27:39 executing program 4: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1c08a4, 0x0) r1 = syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) open$dir(&(0x7f0000000200)='./mnt\x00', 0x40040, 0x10) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir/../file0\x00', 0x80, 0x0) r2 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x50008, 0x0, 0x10081, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r3 = openat(r1, &(0x7f0000000000)='mnt/encrypted_dir/../file0\x00', 0x40, 0x100) r4 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r4, 0x7, 0x0, 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r4, 0xc0406619, &(0x7f00000001c0)={@desc={0x1, 0x0, @desc2}}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000140)=',,\\\x00') futimesat(r3, &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0)={{0x0, 0xea60}}) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000680)=ANY=[@ANYBLOB="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", @ANYRES32, @ANYBLOB="02000000000000006d6e742f656e63727970"]) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') 15:27:39 executing program 6: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, 0x0) mount$9p_tcp(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x4020, 0x0) 15:27:39 executing program 3: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1c08a4, 0x0) r1 = syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) open$dir(&(0x7f0000000200)='./mnt\x00', 0x40040, 0x10) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir/../file0\x00', 0x80, 0x0) r2 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x50008, 0x0, 0x10081, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r3 = openat(r1, &(0x7f0000000000)='mnt/encrypted_dir/../file0\x00', 0x40, 0x100) r4 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r4, 0x7, 0x0, 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r4, 0xc0406619, &(0x7f00000001c0)={@desc={0x1, 0x0, @desc2}}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000140)=',,\\\x00') futimesat(r3, &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0)={{0x0, 0xea60}}) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000680)=ANY=[@ANYBLOB="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", @ANYRES32, @ANYBLOB="02000000000000006d6e742f656e63727970"]) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') 15:27:39 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000000)={0x9, 0x9, 0x1000}) ioctl$TCSETAW(r0, 0x5407, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "bb09819e2f6e8485"}) 15:27:39 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/fib_triestat\x00') getpeername(r0, &(0x7f00000000c0)=@hci, &(0x7f0000000040)=0x80) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r1, 0x5407, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "bb09819e2f6e8485"}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCSARP(r2, 0x8955, &(0x7f0000000000)={{0x2, 0x0, @local}, {0x0, @local}, 0x20, {0x2, 0x0, @local}, 'dummy0\x00'}) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000140)={'ip6tnl0\x00'}) ioctl$TCXONC(r1, 0x540a, 0x1) 15:28:00 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x402c542b, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "bb09819e2f6e8485"}) 15:28:00 executing program 4: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1c08a4, 0x0) r1 = syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) open$dir(&(0x7f0000000200)='./mnt\x00', 0x40040, 0x10) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir/../file0\x00', 0x80, 0x0) r2 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x50008, 0x0, 0x10081, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r3 = openat(r1, &(0x7f0000000000)='mnt/encrypted_dir/../file0\x00', 0x40, 0x100) r4 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r4, 0x7, 0x0, 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r4, 0xc0406619, &(0x7f00000001c0)={@desc={0x1, 0x0, @desc2}}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000140)=',,\\\x00') futimesat(r3, &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0)={{0x0, 0xea60}}) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000680)=ANY=[@ANYBLOB="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", @ANYRES32, @ANYBLOB="02000000000000006d6e742f656e63727970"]) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') 15:28:00 executing program 7: ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f00000002c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff}, './file0\x00'}) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000340), 0xffffffffffffffff) sendmsg$IPVS_CMD_SET_INFO(r0, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000440)={&(0x7f0000000380)={0xa4, r1, 0x100, 0x70bd27, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xfffff000}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x9}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x1}, @IPVS_CMD_ATTR_DAEMON={0x28, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @loopback}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'bond0\x00'}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x5, 0x8, 0x48}]}, @IPVS_CMD_ATTR_DEST={0x40, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@rand_addr=0x64010100}, @IPVS_DEST_ATTR_TUN_PORT={0x6, 0xe, 0x4e23}, @IPVS_DEST_ATTR_TUN_FLAGS={0x6, 0xf, 0x413}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x9}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x3ff}, @IPVS_DEST_ATTR_PORT={0x6, 0x2, 0x4e24}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xaa0d}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8}]}, 0xa4}, 0x1, 0x0, 0x0, 0x894}, 0x800) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$TIPC_NL_SOCK_GET(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f00000000c0)={0x15c, r2, 0x200, 0x70bd27, 0x25dfdbfc, {}, [@TIPC_NLA_BEARER={0xdc, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_PROP={0x2c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1d}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x11}]}, @TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz0\x00'}, @TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz0\x00'}, @TIPC_NLA_BEARER_PROP={0x2c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x20}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x101}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x3}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}]}, @TIPC_NLA_BEARER_PROP={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x60a31702}]}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e22, 0x6, @loopback, 0x40}}, {0x20, 0x2, @in6={0xa, 0x4e20, 0x5, @mcast2, 0x6}}}}]}, @TIPC_NLA_SOCK={0x20, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_CON={0xc, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_NODE={0x8, 0x2, 0x5}]}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x6}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}, @TIPC_NLA_NODE={0x4c, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_KEY={0x47, 0x4, {'gcm(aes)\x00', 0x1f, "9476bac4a05af46726f456c21071ccb9a419ed44bb7b13384845b7554c3ef6"}}]}]}, 0x15c}, 0x1, 0x0, 0x0, 0x4000}, 0x8085) r3 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCSBRKP(r3, 0x5425, 0x994a) 15:28:00 executing program 6: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, 0x0) mount$9p_tcp(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x4020, 0x0) 15:28:00 executing program 0: ioctl$KDGETLED(0xffffffffffffffff, 0x4b31, &(0x7f0000000040)) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x5407, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, "bb09819e2f6e8485"}) 15:28:00 executing program 3: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1c08a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) open$dir(&(0x7f0000000200)='./mnt\x00', 0x40040, 0x10) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir/../file0\x00', 0x80, 0x0) r1 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x50008, 0x0, 0x10081, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='mnt/encrypted_dir/../file0\x00', 0x40, 0x100) r3 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r3, 0x7, 0x0, 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r3, 0xc0406619, &(0x7f00000001c0)={@desc={0x1, 0x0, @desc2}}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000140)=',,\\\x00') futimesat(r2, &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0)={{0x0, 0xea60}}) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000680)=ANY=[@ANYBLOB="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", @ANYRES32, @ANYBLOB="02000000000000006d6e742f656e637279707465645f6469722f2e2e2f66696c653000"]) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') 15:28:00 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0xc0045878, 0x0) 15:28:00 executing program 1: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1c08a4, 0x0) r1 = syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) open$dir(&(0x7f0000000200)='./mnt\x00', 0x40040, 0x10) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir/../file0\x00', 0x80, 0x0) r2 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x50008, 0x0, 0x10081, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat(r1, &(0x7f0000000000)='mnt/encrypted_dir/../file0\x00', 0x40, 0x100) r4 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r4, 0x7, 0x0, 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r4, 0xc0406619, &(0x7f00000001c0)={@desc={0x1, 0x0, @desc2}}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000140)=',,\\\x00') futimesat(r3, &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0)={{0x0, 0xea60}}) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000680)=ANY=[@ANYBLOB="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", @ANYRES32, @ANYBLOB="02000000000000006d6e742f656e637279707465645f6469722f2e2e2f66696c653000"]) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') 15:28:12 executing program 7: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCSBRKP(r0, 0x5425, 0x994a) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r2 = dup(r1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCSARP(r3, 0x8955, &(0x7f0000000000)={{0x2, 0x0, @local}, {0x0, @local}, 0x20, {0x2, 0x0, @local}, 'dummy0\x00'}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r2, 0xc0189378, &(0x7f0000000080)={{0x1, 0x1, 0x18, r1, {r3}}, './file0\x00'}) dup(r0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000100)=ANY=[@ANYBLOB="01000000010000001800000054adf091ce36d102afd30b72edb188b67c5fcadac6daf6e80ffd6bd3aa63e1f248448d55f40832f443e1288ce918f6cb37e5aef022d3afcdd19811dfad6846a4b14ef0056916904c713ceac34fdf98d418f85ec727f28c403d86d5defbff0a188e5c891390de66df4d9ab42700accdffb38ac8da7ca2a52f4a171b", @ANYRES32=r0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) ioctl$TIOCMIWAIT(r4, 0x545c, 0x0) 15:28:12 executing program 6: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, 0x0) mount$9p_tcp(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x4020, &(0x7f0000003300)={'trans=tcp,', {}, 0x2c, {[{@nodevmap}, {@dfltgid}, {@nodevmap}, {@cache_none}, {@privport}, {@msize={'msize', 0x3d, 0x5}}, {@mmap}, {@debug={'debug', 0x3d, 0x9}}, {@posixacl}, {@privport}], [{@obj_user={'obj_user', 0x3d, '@},'}}]}}) 15:28:12 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x5407, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "bb09819e2f6e8485"}) ioctl$VT_SETMODE(r0, 0x5602, &(0x7f0000000000)={0x7, 0x0, 0x7f4d, 0x2, 0xe1e3}) 15:28:12 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0xc0189436, 0x0) 15:28:12 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x402c542b, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "bb09819e2f6e8485"}) 15:28:12 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDGKBDIACR(r0, 0x4b4a, &(0x7f0000000180)=""/240) (fail_nth: 1) 15:28:12 executing program 4: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1c08a4, 0x0) r1 = syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) open$dir(&(0x7f0000000200)='./mnt\x00', 0x40040, 0x10) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir/../file0\x00', 0x80, 0x0) r2 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x50008, 0x0, 0x10081, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r3 = openat(r1, &(0x7f0000000000)='mnt/encrypted_dir/../file0\x00', 0x40, 0x100) r4 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r4, 0x7, 0x0, 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r4, 0xc0406619, &(0x7f00000001c0)={@desc={0x1, 0x0, @desc2}}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000140)=',,\\\x00') futimesat(r3, &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0)={{0x0, 0xea60}}) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000680)=ANY=[@ANYBLOB="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", @ANYRES32, @ANYBLOB="02000000000000006d6e742f656e637279707465645f6469722f2e"]) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') 15:28:12 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x560d, 0x0) (fail_nth: 1) [ 1375.243347] FAULT_INJECTION: forcing a failure. [ 1375.243347] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1375.245871] CPU: 1 PID: 9130 Comm: syz-executor.3 Not tainted 5.10.250 #1 [ 1375.247331] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1375.249088] Call Trace: [ 1375.249649] dump_stack+0x107/0x167 [ 1375.250421] should_fail.cold+0x5/0xa [ 1375.251238] _copy_to_user+0x2e/0x180 [ 1375.252045] simple_read_from_buffer+0xcc/0x160 [ 1375.253031] proc_fail_nth_read+0x198/0x230 [ 1375.253942] ? proc_sessionid_read+0x230/0x230 [ 1375.254917] ? security_file_permission+0xb1/0xe0 [ 1375.255945] ? proc_sessionid_read+0x230/0x230 [ 1375.256911] vfs_read+0x228/0x620 [ 1375.257644] ksys_read+0x12d/0x260 [ 1375.258393] ? vfs_write+0xb10/0xb10 [ 1375.259191] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1375.260294] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1375.261382] do_syscall_64+0x33/0x40 [ 1375.262166] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1375.263257] RIP: 0033:0x7f30e000869c 15:28:12 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x402c542b, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "bb09819e2f6e8485"}) 15:28:12 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDGKBDIACR(r0, 0x4b4a, &(0x7f0000000180)=""/240) [ 1375.264050] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 1375.268178] RSP: 002b:00007f30dd5cb170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1375.269780] RAX: ffffffffffffffda RBX: ffffffffffffffff RCX: 00007f30e000869c [ 1375.271285] RDX: 000000000000000f RSI: 00007f30dd5cb1e0 RDI: 0000000000000004 [ 1375.272789] RBP: 00007f30dd5cb1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1375.274293] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1375.275797] R13: 00007fffbc89ef1f R14: 00007f30dd5cb300 R15: 0000000000022000 [ 1375.293378] proc: Unknown parameter 'trans' 15:28:13 executing program 4: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1c08a4, 0x0) r1 = syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) open$dir(&(0x7f0000000200)='./mnt\x00', 0x40040, 0x10) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir/../file0\x00', 0x80, 0x0) r2 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x50008, 0x0, 0x10081, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r3 = openat(r1, &(0x7f0000000000)='mnt/encrypted_dir/../file0\x00', 0x40, 0x100) r4 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r4, 0x7, 0x0, 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r4, 0xc0406619, &(0x7f00000001c0)={@desc={0x1, 0x0, @desc2}}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000140)=',,\\\x00') futimesat(r3, &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0)={{0x0, 0xea60}}) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000680)=ANY=[@ANYBLOB="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", @ANYRES32, @ANYBLOB="02000000000000006d6e742f656e637279707465645f6469722f2e"]) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') 15:28:13 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x5407, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "bb09819e2f6e8485"}) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x8080, 0x0) ioctl$FS_IOC_SETVERSION(r1, 0x40087602, &(0x7f0000000040)=0x136) 15:28:13 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0xc020660b, 0x0) 15:28:13 executing program 6: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, 0x0) mount$9p_tcp(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x4020, &(0x7f0000003300)={'trans=tcp,', {}, 0x2c, {[{@nodevmap}, {@dfltgid}, {@nodevmap}, {@cache_none}, {@privport}, {@msize={'msize', 0x3d, 0x5}}, {@mmap}, {@debug={'debug', 0x3d, 0x9}}, {@posixacl}], [{@obj_user={'obj_user', 0x3d, '@},'}}]}}) 15:28:13 executing program 5: ioctl$TCSETAW(0xffffffffffffffff, 0x402c542b, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "bb09819e2f6e8485"}) 15:28:13 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x4) ioctl$KDGKBDIACR(r0, 0x4b4a, &(0x7f0000000000)=""/226) [ 1375.408264] proc: Unknown parameter 'trans' 15:28:27 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCSSOFTCAR(0xffffffffffffffff, 0x541a, &(0x7f0000000000)=0x8) ioctl$KDGKBDIACR(r0, 0x4b4a, &(0x7f0000000100)=""/249) ioctl$TIOCL_SETSEL(r0, 0x541c, &(0x7f0000000040)={0x2, {0x2, 0xfffe, 0xba34, 0x7, 0x80, 0x1}}) 15:28:27 executing program 7: openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r0, 0x7, 0x0, 0x0, 0x0) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCSARP(r2, 0x8955, &(0x7f0000000000)={{0x2, 0x0, @local}, {0x0, @local}, 0x20, {0x2, 0x0, @local}, 'dummy0\x00'}) syz_io_uring_setup(0x7ecb, &(0x7f00000000c0)={0x0, 0xf6c5, 0x1, 0x2, 0x3c}, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000001200), &(0x7f0000001400)=0x0) r4 = pidfd_getfd(0xffffffffffffffff, r2, 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCSARP(r5, 0x8955, &(0x7f0000000000)={{0x2, 0x0, @local}, {0x0, @local}, 0x20, {0x2, 0x0, @local}, 'dummy0\x00'}) syz_io_uring_submit(0x0, r3, &(0x7f0000001780)=@IORING_OP_EPOLL_CTL=@mod={0x1d, 0x2, 0x0, r4, &(0x7f0000001740)={0x2002}, r5, 0x3, 0x0, 0x1}, 0x6) writev(r2, &(0x7f00000015c0)=[{&(0x7f0000001380)="3b22f9943c2722b51563a5280e5829ead6264e3b5cd871ffb842e286ff5be34dfc36d2510e1d1d5fff286f0bdf25dd7b7043fc932e82d49fb0acd74bf4c83673b95042e35c0c59dc80bf8a006eab87dbd76b9b806ad2589661a325253914cc26ea0d79197afc", 0x66}, {&(0x7f0000000140)="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", 0x1000}, {&(0x7f0000001440)="e7e7922d44d912f77293d1c47a8b68383ad0cda7e912d57a3c7622c2de113234f035f6b7531dc5b16181d8f43728264ba3d7e7f45ddf6c6367b5224142ada6c6fa7271a12be688262f9440c4bd8b052f2f47f8cd1fc122f021f29153a573a35097586c0436d9507fa62d3701653036165e61611bc1708a4df2a15ab22139ad46a3d05a568f102086395865419b0f40d6b558db602d9a8b2e3fdb62127da43b0388b274987ca6df21c7959864913fff21f9ca0cfe16f17a13905a3b6a030df9eadd15dff07afc2aab56581d3d448b3e4d1256c0325e9bc18028436388a9562807610d74baecf5668dfd28e81348593b", 0xef}, {&(0x7f0000001240)="37b12f705740d68c904d58e74a34dc87752672c3d5b64fe83d32a629aab9c0dcc500cbdd405044e1134a55014d947fdac501ff958da31ad9a9265086b9a35ae1d3924bfcec214158a7332eee609f9cf7cda63cdc48721f6ce7f1d939b2ba2ebbc259b617741e653aa1fd5b844cd43bdd7259c6d951fd6454ff8b32f75c700c7787bef4104f28ebfdfc88bfca8d970c5c1246547f5cf3b219e6bfa3f302abc4c1bc1af1efa60b16455b84236c2520b917bb290c6dba94da2332d82083d943b98ca43d83b703c2032a852656579d70886598473c644d5155aef730136d5cf570c47e4816943008fdfc183f38", 0xeb}, {&(0x7f0000001340)="a069f08dc4c951bb8e00e43f668af48b21f66a0627038da744e7e9436c11861c6a9dd41ce9fc6ea61dde52f892e835422888a20b5db728b5be8b15ce542f5655", 0x40}, {&(0x7f0000001640)="12d9e776d91b8b8b39a86affa58f2325eff6c8ed4f74ef02cd6afc13fd49220791d2553b7602b22fd8e84ddead5c29fd9b25ebe0a327b0a0f0d41d2899a2c1e80733c90ee7b236ff1c88c4bd86a509855c6b9b548d748617de9d652b4da6032fdadbb9c2b0a9c4f234b1e616316ef4506f26c0e3c4a8d55a286c4ab9fd1d3662e7017a15d6a05609180f299b5568b2e5daeb2f5edc866b77d84cc4d3719b2590da17d336aaef3b2beb568d6dfbd2e98059b8c6b23ff2b0611969c0b300c5ca1a0d58361a6a60633db44f7823db987bca1e27", 0xd2}, {&(0x7f0000001140)="97f11261e4a28e7c3e958ee7ad0624553cdd4c7a826c327fe6779bea0d640fff01594856068cd2135707781d0788637f0edbc95a59937c68abb54330ae9b689fd3b5ca1d7f14348fd17260b204de11e55d55ea785c024a27a5bb7eb588d336022a961203930087c03282ba34d1506f5efaa22f8c64e246197fd7e97567c1b4e4741a53c8c581541ed6583c606a0a85f2f83f6e66", 0x94}, {&(0x7f0000001540)="645608862e7a957ad6c8db030951f720231185b2283b9a8d4b6e33033090c733621f05e8b8e09019fe76987b114153659c5bfed732db0babb43c2dc23186f7a9cfa934e0e822e485eb66fb22a8ecc4ebb6e4247958e530d5d915b96458d96f050d6c6b78c181e50c", 0x68}], 0x8) llistxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=""/60, 0x3c) ioctl$TCSBRKP(r1, 0x5425, 0x4) 15:28:27 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x540a, 0x0) 15:28:27 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x5407, &(0x7f0000000080)={0x0, 0x1000, 0x800, 0x0, 0x14, "ffff0400ffffffff"}) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000000)={0x764e, 0x3, 0x3}) ioctl$FIGETBSZ(r0, 0x2, &(0x7f0000000040)) ioctl$EXT4_IOC_MIGRATE(r0, 0x6609) 15:28:27 executing program 4: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1c08a4, 0x0) r1 = syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) open$dir(&(0x7f0000000200)='./mnt\x00', 0x40040, 0x10) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir/../file0\x00', 0x80, 0x0) r2 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x50008, 0x0, 0x10081, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r3 = openat(r1, &(0x7f0000000000)='mnt/encrypted_dir/../file0\x00', 0x40, 0x100) r4 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r4, 0x7, 0x0, 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r4, 0xc0406619, &(0x7f00000001c0)={@desc={0x1, 0x0, @desc2}}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000140)=',,\\\x00') futimesat(r3, &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0)={{0x0, 0xea60}}) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000680)=ANY=[@ANYBLOB="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", @ANYRES32, @ANYBLOB="02000000000000006d6e742f656e637279707465645f6469722f2e"]) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') 15:28:27 executing program 6: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, 0x0) mount$9p_tcp(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x4020, &(0x7f0000003300)={'trans=tcp,', {}, 0x2c, {[{@nodevmap}, {@dfltgid}, {@nodevmap}, {@cache_none}, {@privport}, {@msize={'msize', 0x3d, 0x5}}, {@mmap}, {@debug={'debug', 0x3d, 0x9}}], [{@obj_user={'obj_user', 0x3d, '@},'}}]}}) 15:28:27 executing program 5: ioctl$TCSETAW(0xffffffffffffffff, 0x402c542b, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "bb09819e2f6e8485"}) 15:28:27 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x560d, 0x0) [ 1389.943987] proc: Unknown parameter 'trans' 15:28:27 executing program 5: ioctl$TCSETAW(0xffffffffffffffff, 0x402c542b, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "bb09819e2f6e8485"}) 15:28:27 executing program 6: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, 0x0) mount$9p_tcp(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x4020, &(0x7f0000003300)={'trans=tcp,', {}, 0x2c, {[{@nodevmap}, {@dfltgid}, {@nodevmap}, {@cache_none}, {@privport}, {@msize={'msize', 0x3d, 0x5}}, {@mmap}], [{@obj_user={'obj_user', 0x3d, '@},'}}]}}) 15:28:27 executing program 4: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1c08a4, 0x0) r1 = syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) open$dir(&(0x7f0000000200)='./mnt\x00', 0x40040, 0x10) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir/../file0\x00', 0x80, 0x0) r2 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x50008, 0x0, 0x10081, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r3 = openat(r1, &(0x7f0000000000)='mnt/encrypted_dir/../file0\x00', 0x40, 0x100) r4 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r4, 0x7, 0x0, 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r4, 0xc0406619, &(0x7f00000001c0)={@desc={0x1, 0x0, @desc2}}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000140)=',,\\\x00') futimesat(r3, &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0)={{0x0, 0xea60}}) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000680)=ANY=[@ANYBLOB="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", @ANYRES32, @ANYBLOB="02000000000000006d6e742f656e637279707465645f6469722f2e2e2f6669"]) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') 15:28:27 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000000)={{0x2, 0x0, @local}, {0x0, @local}, 0x20, {0x2, 0x0, @local}, 'dummy0\x00'}) ioctl$BTRFS_IOC_DEFRAG(r0, 0x50009402, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCSARP(r2, 0x8955, &(0x7f0000000000)={{0x2, 0x0, @local}, {0x0, @local}, 0x20, {0x2, 0x0, @local}, 'dummy0\x00'}) setsockopt$inet_udp_encap(r0, 0x11, 0x64, &(0x7f0000000080)=0x4, 0x4) lseek(r2, 0x3, 0x2) r3 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r3, 0x7, 0x0, 0x0, 0x0) openat(r3, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) ioctl$KDGKBDIACR(r1, 0x4b4a, &(0x7f0000000180)=""/240) 15:28:27 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x2, 0x0) 15:28:27 executing program 0: ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f0000000000)=0x98) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x5407, &(0x7f0000000080)={0x3f, 0x0, 0x0, 0x0, 0xff, "bb09819e2f6e8485"}) 15:28:27 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000180)={0xdd6b, 0x6, 0x4, 0x6, 0x7, 0x90}) r1 = syz_open_pts(0xffffffffffffffff, 0x20000) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r0, 0xc018937a, &(0x7f0000000040)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r1, @ANYBLOB="06000000000000002e2f66496c653000"]) ioctl$TIOCL_SETSEL(r2, 0x541c, &(0x7f0000000080)={0x2, {0x2, 0x29db, 0x7f, 0x7ff, 0x5, 0x1}}) perf_event_open(&(0x7f00000000c0)={0x3, 0x80, 0xf7, 0x1, 0x9, 0x80, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x9e8f, 0x4, @perf_config_ext={0x8e, 0x8000}, 0x10, 0x0, 0x9, 0x6, 0x7ff, 0x0, 0x8, 0x0, 0x101, 0x0, 0x800}, 0x0, 0x0, r2, 0xa) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000000)={0x8000, 0xff, 0x2}) ioctl$TCSETAW(r0, 0x540a, 0x0) perf_event_open(&(0x7f0000000240)={0x4, 0x80, 0x1, 0x7, 0x0, 0x51, 0x0, 0x0, 0x469, 0xa, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x2, @perf_config_ext={0x1f, 0x2}, 0x0, 0x1, 0x0, 0x0, 0x3b085f8d, 0x1, 0x3, 0x0, 0x3, 0x0, 0x4}, 0x0, 0xffffffffffffffff, r2, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r4, 0x7, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r4, 0xc018937c, &(0x7f0000000140)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0/file0\x00'}) ioctl$sock_inet_SIOCSARP(r3, 0x8955, &(0x7f0000000000)={{0x2, 0x0, @local}, {0x0, @local}, 0x20, {0x2, 0x0, @local}, 'dummy0\x00'}) fremovexattr(r3, &(0x7f00000001c0)=ANY=[@ANYBLOB="38b16878ab5a24510fd865296a15034b5e86dd5b9537bbde0e57ccb7b2a847d66f8d26355f7cbf181738f0ebf8aeb79f5f976be2d49047e5593f4d1198800f150ee784cab8816b227e695bed"]) sendmsg$inet(r3, &(0x7f0000000540)={&(0x7f00000002c0)={0x2, 0x4e20, @private=0xa010101}, 0x10, &(0x7f0000000480)=[{&(0x7f0000000300)="00e0dda66b8b9d194a3151b6b6835638b9fd75c4d863e00dd94cba6335df654b7e2c0c76ab0d51bf1041c8dab1c962a417a2fef72dcd86e5b12222cc17deebd1cbd4ff7c97211707bc696f4fb6d20015493093d6cb92801a33f6f3b7cc", 0x5d}, {&(0x7f0000000380)="a4d44c8fca01ef4fe0afda03908c0fd060d01bb5016d59e50ba6bc1280bf5f0adbf391e2f89a892b59e1ff90159fda62c5a4606e4ffb633d3ede92c0c86308efcb33430398a7bdb0584f78182b36ac5f6b501e99aecfe76b9ff97c285636ff94c1cb8566cb5cc2148b823a142a9c0fee", 0x70}, {&(0x7f0000000400)="77bd59307c1e91bceb5bef8bb169502128ff98a0e1f6253fb3b0ced52015f2", 0x1f}, {&(0x7f0000000440)="be1e6ccbfba185cc4b60a126fa59b2eab893a545d49ee2151efa2d4a8bc6fb9a78bcf5caeb14324d6439322f61e57cce2397e82576f4b6e09c", 0x39}], 0x4, &(0x7f00000004c0)=[@ip_tos_u8={{0x11, 0x0, 0x1, 0xd7}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x81}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x4}}, @ip_tos_u8={{0x11}}], 0x60}, 0x8084) 15:28:27 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x402c542b, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "bb09819e2f6e8485"}) 15:28:27 executing program 7: recvmmsg(0xffffffffffffffff, &(0x7f0000001400)=[{{&(0x7f0000000080)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000001380)=[{&(0x7f0000000100)=""/90, 0x5a}, {&(0x7f0000000180)=""/44, 0x2c}, {&(0x7f00000001c0)=""/177, 0xb1}, {&(0x7f0000000280)=""/4096, 0x1000}, {&(0x7f0000001280)=""/29, 0x1d}, {&(0x7f00000012c0)=""/48, 0x30}, {&(0x7f0000001300)=""/120, 0x78}], 0x7}, 0x9}], 0x1, 0x1011, &(0x7f0000001440)) r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x3c1c00, 0x0) ioctl$TIOCL_SCROLLCONSOLE(r0, 0x541c, &(0x7f0000000040)={0xd, 0x5}) ioctl$TCSBRKP(r0, 0x5425, 0x994a) [ 1390.080044] proc: Unknown parameter 'trans' 15:28:27 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x5407, &(0x7f0000000080)={0x101, 0x0, 0x0, 0x0, 0x0, "bb09819e2f6e8485"}) 15:28:27 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = openat(0xffffffffffffff9c, 0x0, 0x60001, 0x82) fsconfig$FSCONFIG_CMD_RECONFIGURE(r1, 0x7, 0x0, 0x0, 0x0) ioctl$TIOCL_SETSEL(r1, 0x541c, &(0x7f0000000300)={0x2, {0x2, 0xf4c, 0x8, 0x8, 0xb2c, 0xf}}) ioctl$KDGKBDIACR(r0, 0x4b4a, &(0x7f0000000180)=""/240) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) r3 = syz_open_dev$tty1(0xc, 0x4, 0x4) r4 = openat(r1, 0x0, 0x101000, 0x0) ioctl$KDGKBDIACR(r3, 0x4b4a, &(0x7f0000000380)=""/164) fsconfig$FSCONFIG_CMD_RECONFIGURE(r4, 0x7, 0x0, 0x0, 0x0) ioctl$KDGKBDIACR(r4, 0x4b4a, &(0x7f0000000080)=""/190) ioctl$TIOCL_SETSEL(0xffffffffffffffff, 0x541c, &(0x7f0000000340)={0x2, {0x2, 0x8, 0x1ff, 0x9, 0x0, 0x12}}) ioctl$TIOCSSOFTCAR(r2, 0x541a, &(0x7f0000000040)=0x7) r5 = openat$nvram(0xffffffffffffff9c, &(0x7f00000002c0), 0x22000, 0x0) fsconfig$FSCONFIG_CMD_CREATE(r5, 0x6, 0x0, 0x0, 0x0) r6 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r6, 0x7, 0x0, 0x0, 0x0) ioctl$KDDELIO(r6, 0x4b35, 0x10001) ioctl$VT_GETMODE(r0, 0x5601, &(0x7f0000000000)) ioctl$TIOCMBIS(r3, 0x5416, &(0x7f0000000280)=0x20009) [ 1403.093519] proc: Unknown parameter 'trans' 15:28:40 executing program 5: syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(0xffffffffffffffff, 0x402c542b, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "bb09819e2f6e8485"}) 15:28:40 executing program 7: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCGLCKTRMIOS(r0, 0x5456, &(0x7f0000000040)={0x8000, 0x800, 0x0, 0x5, 0x1, "235d1fc5915c9fc09834a2541f99a15adce635"}) ioctl$TCSBRKP(r0, 0x5425, 0x994a) 15:28:40 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x2) ioctl$TCSETAW(r0, 0x5407, &(0x7f0000000080)={0xfffd, 0x0, 0x0, 0x1ff, 0x8, "4f676d93b11c00"}) ioctl$KDSETMODE(r0, 0x4b3a, 0x2) 15:28:40 executing program 4: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1c08a4, 0x0) r1 = syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) open$dir(&(0x7f0000000200)='./mnt\x00', 0x40040, 0x10) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir/../file0\x00', 0x80, 0x0) r2 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x50008, 0x0, 0x10081, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r3 = openat(r1, &(0x7f0000000000)='mnt/encrypted_dir/../file0\x00', 0x40, 0x100) r4 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r4, 0x7, 0x0, 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r4, 0xc0406619, &(0x7f00000001c0)={@desc={0x1, 0x0, @desc2}}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000140)=',,\\\x00') futimesat(r3, &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0)={{0x0, 0xea60}}) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000680)=ANY=[@ANYBLOB="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", @ANYRES32, @ANYBLOB="02000000000000006d6e742f656e637279707465645f6469722f2e2e2f6669"]) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') 15:28:40 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x4b2f, 0x0) 15:28:40 executing program 1: sendmsg$ETHTOOL_MSG_LINKINFO_SET(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x0, 0x1, 0x70bd2d, 0x25dfdbfc, {}, [@ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000001}, 0x40) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDGKBDIACR(r0, 0x4b4a, &(0x7f0000000180)=""/240) 15:28:40 executing program 6: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, 0x0) mount$9p_tcp(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x4020, &(0x7f0000003300)={'trans=tcp,', {}, 0x2c, {[{@nodevmap}, {@dfltgid}, {@nodevmap}, {@cache_none}, {@privport}, {@msize={'msize', 0x3d, 0x5}}], [{@obj_user={'obj_user', 0x3d, '@},'}}]}}) 15:28:40 executing program 2: r0 = dup(0xffffffffffffffff) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r1, 0x540a, 0x0) ioctl$TIOCSSOFTCAR(r0, 0x541a, &(0x7f0000000000)=0x6) 15:28:40 executing program 6: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, 0x0) mount$9p_tcp(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x4020, &(0x7f0000003300)={'trans=tcp,', {}, 0x2c, {[{@nodevmap}, {@dfltgid}, {@nodevmap}, {@cache_none}, {@privport}], [{@obj_user={'obj_user', 0x3d, '@},'}}]}}) [ 1403.169307] proc: Unknown parameter 'trans' 15:28:40 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDGKBMODE(r0, 0x4b44, &(0x7f0000000000)) ioctl$TCSETAW(r0, 0x5407, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "bb09819e2f6e8485"}) 15:28:40 executing program 4: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1c08a4, 0x0) r1 = syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) open$dir(&(0x7f0000000200)='./mnt\x00', 0x40040, 0x10) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir/../file0\x00', 0x80, 0x0) r2 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x50008, 0x0, 0x10081, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r3 = openat(r1, &(0x7f0000000000)='mnt/encrypted_dir/../file0\x00', 0x40, 0x100) r4 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r4, 0x7, 0x0, 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r4, 0xc0406619, &(0x7f00000001c0)={@desc={0x1, 0x0, @desc2}}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000140)=',,\\\x00') futimesat(r3, &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0)={{0x0, 0xea60}}) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000680)=ANY=[@ANYBLOB="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", @ANYRES32, @ANYBLOB="02000000000000006d6e742f656e637279707465645f6469722f2e2e2f6669"]) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') 15:28:40 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x4b30, 0x0) 15:28:40 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCVHANGUP(r0, 0x5437, 0x0) r1 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x800, 0x0) ioctl$TIOCL_SETSEL(r1, 0x541c, &(0x7f0000000000)={0x2, {0x2, 0x6, 0x802, 0x673c, 0x2, 0x1}}) 15:28:40 executing program 5: syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(0xffffffffffffffff, 0x402c542b, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "bb09819e2f6e8485"}) 15:28:40 executing program 2: setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000000c0)="257c8dbc4249e428f4b3de8a6e24f6d392173204d70098b6df9915288d44f3f50dac400a07044f8de953f689da596db0dd7cec2d687770a8336022a9794e6613f60bfe79d2b593c219605bc2c2b3a92a3a232885e605081d4b2228a687d893cc172feadf06aa39228bf252d26b217740e2939cd751de6c2768b6b68b948d11fe533bf546945d504f73491fe8d18a793b3a442640f05f57d281c0e999be5dae7a7cb241ac0b577de647f68ea00aab654cb7a45f280c793ef60b7931855d757586891372845943cf510cdf5a66ace9d4e8a3e7e2", 0xd3) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000000)={{0x2, 0x0, @local}, {0x0, @local}, 0x20, {0x2, 0x0, @local}, 'dummy0\x00'}) ioctl$sock_FIOSETOWN(r0, 0x8901, &(0x7f0000000000)=0xffffffffffffffff) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r1, 0x540a, 0x0) ioctl$TIOCL_GETSHIFTSTATE(r1, 0x541c, &(0x7f0000000080)={0x6, 0x80}) 15:28:40 executing program 6: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, 0x0) mount$9p_tcp(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x4020, &(0x7f0000003300)={'trans=tcp,', {}, 0x2c, {[{@nodevmap}, {@dfltgid}, {@nodevmap}, {@cache_none}], [{@obj_user={'obj_user', 0x3d, '@},'}}]}}) 15:28:40 executing program 4: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1c08a4, 0x0) r1 = syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) open$dir(&(0x7f0000000200)='./mnt\x00', 0x40040, 0x10) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir/../file0\x00', 0x80, 0x0) r2 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x50008, 0x0, 0x10081, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r3 = openat(r1, &(0x7f0000000000)='mnt/encrypted_dir/../file0\x00', 0x40, 0x100) r4 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r4, 0x7, 0x0, 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r4, 0xc0406619, &(0x7f00000001c0)={@desc={0x1, 0x0, @desc2}}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000140)=',,\\\x00') futimesat(r3, &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0)={{0x0, 0xea60}}) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000680)=ANY=[@ANYBLOB="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", @ANYRES32, @ANYBLOB="02000000000000006d6e742f656e637279707465645f6469722f2e2e2f66696c65"]) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') [ 1403.275442] proc: Unknown parameter 'trans' 15:28:55 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x4b31, 0x0) 15:28:55 executing program 1: sendmsg$NFULNL_MSG_CONFIG(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x1, 0x4, 0x201, 0x0, 0x0, {0xa, 0x0, 0x1}, [@NFULA_CFG_NLBUFSIZ={0x8, 0x3, 0x1, 0x0, 0xde0}]}, 0x1c}, 0x1, 0x0, 0x0, 0x1}, 0x4008044) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDGKBDIACR(r0, 0x4b4a, &(0x7f0000000180)=""/240) 15:28:55 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x5407, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "bb09819e2f6e8485"}) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r1, 0x7, 0x0, 0x0, 0x0) r2 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r2, 0x7, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_CREATE(r2, 0x6, 0x0, 0x0, 0x0) r3 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r3, 0x7, 0x0, 0x0, 0x0) fsmount(r3, 0x0, 0x0) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000000)={0x76, 0x9, &(0x7f00000000c0)}) 15:28:55 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x540a, 0x0) ioctl$TIOCSSOFTCAR(r0, 0x541a, &(0x7f00000000c0)=0x9) ioctl$TIOCGSERIAL(r0, 0x541e, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=""/53}) 15:28:55 executing program 6: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, 0x0) mount$9p_tcp(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x4020, &(0x7f0000003300)={'trans=tcp,', {}, 0x2c, {[{@nodevmap}, {@dfltgid}, {@nodevmap}], [{@obj_user={'obj_user', 0x3d, '@},'}}]}}) 15:28:55 executing program 7: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCSBRKP(r0, 0x5425, 0x994a) ioctl$TIOCSTI(r0, 0x5412, &(0x7f0000000040)=0x9) 15:28:55 executing program 4: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1c08a4, 0x0) r1 = syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) open$dir(&(0x7f0000000200)='./mnt\x00', 0x40040, 0x10) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir/../file0\x00', 0x80, 0x0) r2 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x50008, 0x0, 0x10081, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r3 = openat(r1, &(0x7f0000000000)='mnt/encrypted_dir/../file0\x00', 0x40, 0x100) r4 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r4, 0x7, 0x0, 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r4, 0xc0406619, &(0x7f00000001c0)={@desc={0x1, 0x0, @desc2}}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000140)=',,\\\x00') futimesat(r3, &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0)={{0x0, 0xea60}}) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000680)=ANY=[@ANYBLOB="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", @ANYRES32, @ANYBLOB="02000000000000006d6e742f656e637279707465645f6469722f2e2e2f66696c65"]) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') 15:28:55 executing program 5: syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(0xffffffffffffffff, 0x402c542b, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "bb09819e2f6e8485"}) [ 1417.359298] proc: Unknown parameter 'trans' 15:28:55 executing program 0: syz_open_dev$tty1(0xc, 0x4, 0x1) 15:28:55 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x540a, 0x0) 15:28:55 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x4b32, 0x0) 15:28:55 executing program 6: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, 0x0) mount$9p_tcp(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x4020, &(0x7f0000003300)={'trans=tcp,', {}, 0x2c, {[{@nodevmap}, {@dfltgid}], [{@obj_user={'obj_user', 0x3d, '@},'}}]}}) 15:28:55 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x402c542b, 0x0) 15:28:55 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x4b33, 0x0) 15:28:55 executing program 1: ioctl$KDGKBDIACR(0xffffffffffffffff, 0x4b4a, &(0x7f0000000180)=""/240) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, &(0x7f0000000000)={0x82, 0x20, 0x9, 0x7f, 0x3ff, 0x4f9}) [ 1417.453695] proc: Unknown parameter 'trans' 15:28:55 executing program 4: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1c08a4, 0x0) r1 = syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) open$dir(&(0x7f0000000200)='./mnt\x00', 0x40040, 0x10) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir/../file0\x00', 0x80, 0x0) r2 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x50008, 0x0, 0x10081, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r3 = openat(r1, &(0x7f0000000000)='mnt/encrypted_dir/../file0\x00', 0x40, 0x100) r4 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r4, 0x7, 0x0, 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r4, 0xc0406619, &(0x7f00000001c0)={@desc={0x1, 0x0, @desc2}}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000140)=',,\\\x00') futimesat(r3, &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0)={{0x0, 0xea60}}) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000680)=ANY=[@ANYBLOB="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", @ANYRES32, @ANYBLOB="02000000000000006d6e742f656e637279707465645f6469722f2e2e2f66696c65"]) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') 15:29:10 executing program 7: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r1, 0x7, 0x0, 0x0, 0x0) ioctl$TIOCL_SCROLLCONSOLE(r1, 0x541c, &(0x7f0000000040)={0xd, 0x2}) ioctl$TCSBRKP(r0, 0x5425, 0x994a) r2 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r2, 0x7, 0x0, 0x0, 0x0) ioctl$TIOCSTI(r2, 0x5412, &(0x7f0000000080)) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x200000, 0x0) ioctl$TIOCL_SCROLLCONSOLE(r3, 0x541c, &(0x7f0000000100)={0xd, 0x2}) 15:29:10 executing program 6: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, 0x0) mount$9p_tcp(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x4020, &(0x7f0000003300)={'trans=tcp,', {}, 0x2c, {[{@nodevmap}], [{@obj_user={'obj_user', 0x3d, '@},'}}]}}) 15:29:10 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDGKBDIACR(r0, 0x4b4a, &(0x7f0000000100)=""/245) 15:29:10 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_SETSEL(r0, 0x541c, &(0x7f0000000080)={0x2, {0x2, 0x9, 0x7, 0x4, 0x1, 0x1}}) ioctl$TCSETAW(r0, 0x5407, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, "bb09819e2f6e8485"}) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x10002, 0x100) r2 = fcntl$dupfd(r0, 0x0, r0) sendfile(r1, r2, 0x0, 0xe3) 15:29:10 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x4b34, 0x0) 15:29:10 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x540a, 0x0) 15:29:10 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x402c542b, 0x0) 15:29:10 executing program 4: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1c08a4, 0x0) r1 = syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) open$dir(&(0x7f0000000200)='./mnt\x00', 0x40040, 0x10) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir/../file0\x00', 0x80, 0x0) r2 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x50008, 0x0, 0x10081, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r3 = openat(r1, &(0x7f0000000000)='mnt/encrypted_dir/../file0\x00', 0x40, 0x100) r4 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r4, 0x7, 0x0, 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r4, 0xc0406619, &(0x7f00000001c0)={@desc={0x1, 0x0, @desc2}}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000140)=',,\\\x00') futimesat(r3, &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0)={{0x0, 0xea60}}) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000680)=ANY=[@ANYBLOB="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", @ANYRES32, @ANYBLOB="02000000000000006d6e742f656e637279707465645f6469722f2e2e2f66696c6530"]) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') [ 1433.319613] proc: Unknown parameter 'trans' 15:29:11 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x4b35, 0x0) 15:29:11 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDGKBDIACR(r0, 0x4b4a, &(0x7f0000000180)=""/240) ioctl$KDSETMODE(r0, 0x4b3a, 0x1) ioctl$TIOCSSOFTCAR(r0, 0x541a, &(0x7f0000000000)=0x4d) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000040)) 15:29:11 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) ioctl$KDGKBDIACR(r1, 0x4b4a, &(0x7f0000000040)=""/187) 15:29:11 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x402c542b, 0x0) 15:29:11 executing program 6: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, 0x0) mount$9p_tcp(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x4020, &(0x7f0000003300)={'trans=tcp,', {}, 0x2c, {[], [{@obj_user={'obj_user', 0x3d, '@},'}}]}}) 15:29:11 executing program 0: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x40001, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) dup2(r1, r0) sendmsg$NL80211_CMD_SET_NOACK_MAP(r1, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x30, 0x0, 0x2, 0x70bd2a, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x0, 0x6d}}}}, [@NL80211_ATTR_NOACK_MAP={0x6, 0x95, 0xff}, @NL80211_ATTR_NOACK_MAP={0x6, 0x95, 0x6}]}, 0x30}, 0x1, 0x0, 0x0, 0x800}, 0x4000400) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r2, 0x5407, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "bb09819e2f6e8485"}) 15:29:11 executing program 4: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1c08a4, 0x0) r1 = syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) open$dir(&(0x7f0000000200)='./mnt\x00', 0x40040, 0x10) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir/../file0\x00', 0x80, 0x0) r2 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x50008, 0x0, 0x10081, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r3 = openat(r1, &(0x7f0000000000)='mnt/encrypted_dir/../file0\x00', 0x40, 0x100) r4 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r4, 0x7, 0x0, 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r4, 0xc0406619, &(0x7f00000001c0)={@desc={0x1, 0x0, @desc2}}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000140)=',,\\\x00') futimesat(r3, &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0)={{0x0, 0xea60}}) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000680)=ANY=[@ANYBLOB="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", @ANYRES32, @ANYBLOB="02000000000000006d6e742f656e637279707465645f6469722f2e2e2f66696c6530"]) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') [ 1433.487969] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=9335 comm=syz-executor.0 [ 1433.513807] proc: Unknown parameter 'trans' [ 1433.519877] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=9335 comm=syz-executor.0 [ 1447.608999] proc: Unknown parameter 'trans' 15:29:25 executing program 7: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCSBRKP(r0, 0x5425, 0x994a) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x84) ioctl$TIOCSTI(r1, 0x5412, &(0x7f0000000080)=0x8) 15:29:25 executing program 0: fremovexattr(0xffffffffffffffff, &(0x7f0000000040)=@known='security.apparmor\x00') r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x5407, &(0x7f0000000080)={0x0, 0x2, 0x6, 0x0, 0x0, "18540a2f0700008b"}) 15:29:25 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x540a, 0x0) r1 = open(&(0x7f0000000000)='./file0\x00', 0x44000, 0x14b) ioctl$TIOCL_GETKMSGREDIRECT(r1, 0x541c, &(0x7f0000000040)) 15:29:25 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x4b36, 0x0) 15:29:25 executing program 4: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1c08a4, 0x0) r1 = syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) open$dir(&(0x7f0000000200)='./mnt\x00', 0x40040, 0x10) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir/../file0\x00', 0x80, 0x0) r2 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x50008, 0x0, 0x10081, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r3 = openat(r1, &(0x7f0000000000)='mnt/encrypted_dir/../file0\x00', 0x40, 0x100) r4 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r4, 0x7, 0x0, 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r4, 0xc0406619, &(0x7f00000001c0)={@desc={0x1, 0x0, @desc2}}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000140)=',,\\\x00') futimesat(r3, &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0)={{0x0, 0xea60}}) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000680)=ANY=[@ANYBLOB="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", @ANYRES32, @ANYBLOB="02000000000000006d6e742f656e637279707465645f6469722f2e2e2f66696c6530"]) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') 15:29:25 executing program 6: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, 0x0) mount$9p_tcp(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x4020, &(0x7f0000003300)) 15:29:25 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDGKBDIACR(r0, 0x4b4a, &(0x7f0000000180)=""/240) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000280)={0x0, 0x1}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000000)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000009640)={0x0, ""/256, 0x0}) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, &(0x7f0000000440)={0x0, r2, "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", "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"}) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, &(0x7f0000000200)={r1, r2, "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", "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"}) r3 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6}]}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r3, 0x40182103, &(0x7f0000000280)={0x0, 0x1, r3}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000000)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000009640)={0x0, ""/256, 0x0}) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, &(0x7f0000000440)={0x0, r5, "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", "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"}) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r3, 0xd000943e, &(0x7f0000000200)={r4, r5, "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", "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"}) r6 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6}]}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r6, 0x40182103, &(0x7f0000000280)={0x0, 0x1, r6}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000000)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000009640)={0x0, ""/256, 0x0}) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, &(0x7f0000000440)={0x0, r8, "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", "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"}) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r6, 0xd000943e, &(0x7f0000000200)={r7, r8, "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", "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"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000056000)={0x6, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {0x0, r4}, {r8}], 0x0, "92881badb4aff8"}) 15:29:25 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x4b37, 0x0) 15:29:25 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x540a, 0x0) ioctl$TIOCSSOFTCAR(r0, 0x541a, &(0x7f0000000000)=0x101) 15:29:25 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) clone3(&(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) ioctl$TCSETAW(r0, 0x5407, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "bb09819e2f6e8485"}) 15:29:25 executing program 4: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1c08a4, 0x0) r1 = syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) open$dir(&(0x7f0000000200)='./mnt\x00', 0x40040, 0x10) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir/../file0\x00', 0x80, 0x0) r2 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x50008, 0x0, 0x10081, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r3 = openat(r1, &(0x7f0000000000)='mnt/encrypted_dir/../file0\x00', 0x40, 0x100) r4 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r4, 0x7, 0x0, 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r4, 0xc0406619, &(0x7f00000001c0)={@desc={0x1, 0x0, @desc2}}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000140)=',,\\\x00') futimesat(r3, &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0)={{0x0, 0xea60}}) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000680)=ANY=[@ANYBLOB="b00900000000000018000000468a29458f2709d329f6d3f3917408961482081d984538af2f9bcf61c448afbaa0be3f00000000000000ca4aa56fc413a417324e8530165c3515981e2d28f7fce9ae3c6bb8fa04ff6411132c9ced479abaeea325c2205ea95984d3d7f98eea1cca02dfeb0b2471b497fbb71b60180d35e2a3394ba6d965f41c7b7bc29d4e3ca95bd7ad074a4242ec98a69ad9d1546ce18cbbd98d2e50688e958a0fcd16876ab83cdb94eeb03e42203f267a1bf6ccb1c07ad92e6e493149da32f754251ae74d30cd4b50eefd6a208172ed8693b320eda714bdd152b484d9c939b4bb777dddd947843d73529f5ffe589777254cb10f733351e0739a3a61c3b8f977517ee7becda66da23a93e3be8ed63bda262951b32f72c1c48ee63be474eafaa255074efaa494b950f48b119c76c70b833e4d7443b691dc97bf78bcae908758ff1edaf2ad48dd67d0337c8ecfcd47e8ce5598c435f4645d719ae60a12c5b37ed2d45571c29ff6af1292ed2ff7fa24e2ab69f18db826044f35683810d2ee95f68f586a8922acdc225912820cdffe6ac29641f3c531a0eb1ddbf17341a05f3ee437f2a56a4a92af8ba2e413d00d05caab40963868dc00da000dfe8962927be81ca05afcc624225b2667a1208dd74e8bb6ced5e1da98f41bb3dedc31302fbf6ed40e9c526f82b53ce45e25e20ce9068bba911f0ec11403a35ff01cee623f71101155fcb646937ac714ac49741b4a1ffc6a72cba387bf41c1af2eeaa80a07631a22d366562924848da0f27c", @ANYBLOB="02000000000000006d6e742f656e637279707465645f6469722f2e2e2f66696c653000"]) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') 15:29:25 executing program 5: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1c08a4, 0x0) r1 = syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) open$dir(&(0x7f0000000200)='./mnt\x00', 0x40040, 0x10) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir/../file0\x00', 0x80, 0x0) r2 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x50008, 0x0, 0x10081, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r3 = openat(r1, &(0x7f0000000000)='mnt/encrypted_dir/../file0\x00', 0x40, 0x100) r4 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r4, 0x7, 0x0, 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r4, 0xc0406619, &(0x7f00000001c0)={@desc={0x1, 0x0, @desc2}}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000140)=',,\\\x00') futimesat(r3, &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0)={{0x0, 0xea60}}) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000680)=ANY=[@ANYBLOB="b00900000000000018000000468a29458f2709d329f6d3f3917408961482081d984538af2f9bcf61c448afbaa0be3f00000000000000ca4aa56fc413a417324e8530165c3515981e2d28f7fce9ae3c6bb8fa04ff6411132c9ced479abaeea325c2205ea95984d3d7f98eea1cca02dfeb0b2471b497fbb71b60180d35e2a3394ba6d965f41c7b7bc29d4e3ca95bd7ad074a4242ec98a69ad9d1546ce18cbbd98d2e50688e958a0fcd16876ab83cdb94eeb03e42203f267a1bf6ccb1c07ad92e6e493149da32f754251ae74d30cd4b50eefd6a208172ed8693b320eda714bdd152b484d9c939b4bb777dddd947843d73529f5ffe589777254cb10f733351e0739a3a61c3b8f977517ee7becda66da23a93e3be8ed63bda262951b32f72c1c48ee63be474eafaa255074efaa494b950f48b119c76c70b833e4d7443b691dc97bf78bcae908758ff1edaf2ad48dd67d0337c8ecfcd47e8ce5598c435f4645d719ae60a12c5b37ed2d45571c29ff6af1292ed2ff7fa24e2ab69f18db826044f35683810d2ee95f68f586a8922acdc225912820cdffe6ac29641f3c531a0eb1ddbf17341a05f3ee437f2a56a4a92af8ba2e413d00d05caab40963868dc00da000dfe8962927be81ca05afcc624225b2667a1208dd74e8bb6ced5e1da98f41bb3dedc31302fbf6ed40e9c526f82b53ce45e25e20ce9068bba911f0ec11403a35ff01cee623f71101155fcb646937ac714ac49741b4a1ffc6a72cba387bf41c1af2eeaa80a07631a22d366562924848da0f27c", @ANYRES32, @ANYBLOB="02000000000000006d6e742f656e637279707465645f6469722f2e2e2f66696c6530"]) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') 15:29:25 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x4b3a, 0x0) 15:29:25 executing program 6: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDGKBMODE(r0, 0x4b44, &(0x7f0000000000)) ioctl$TCSETAW(r0, 0x5407, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "bb09819e2f6e8485"}) 15:29:25 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x540a, 0x0) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r1, 0x7, 0x0, 0x0, 0x0) ioctl$TIOCL_SETSEL(r1, 0x541c, &(0x7f0000000040)={0x2, {0x2, 0x9, 0xc225, 0x8, 0x1, 0x1}}) r2 = inotify_init() inotify_add_watch(r2, &(0x7f0000000000)='./file0\x00', 0x2000220) [ 1448.016799] audit: type=1326 audit(1771169365.733:23): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=9349 comm="syz-executor.1" exe="/syz-executor.1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f478d7b4b19 code=0x0 [ 1448.021805] audit: type=1326 audit(1771169365.734:24): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=9349 comm="syz-executor.1" exe="/syz-executor.1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f478d7b4b19 code=0x0 [ 1448.080048] audit: type=1326 audit(1771169365.797:25): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=9349 comm="syz-executor.1" exe="/syz-executor.1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f478d7b4b19 code=0x0 [ 1448.132241] audit: type=1326 audit(1771169365.849:26): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=9349 comm="syz-executor.1" exe="/syz-executor.1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f478d7b4b19 code=0x0 15:29:40 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x4b3b, 0x0) 15:29:40 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDGKBDIACR(r0, 0x4b4a, &(0x7f0000000180)=""/240) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {0xd}}, './file0\x00'}) ioctl$GIO_CMAP(r1, 0x4b70, &(0x7f0000000040)) 15:29:40 executing program 5: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1c08a4, 0x0) r1 = syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) open$dir(&(0x7f0000000200)='./mnt\x00', 0x40040, 0x10) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir/../file0\x00', 0x80, 0x0) r2 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x50008, 0x0, 0x10081, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r3 = openat(r1, &(0x7f0000000000)='mnt/encrypted_dir/../file0\x00', 0x40, 0x100) r4 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r4, 0x7, 0x0, 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r4, 0xc0406619, &(0x7f00000001c0)={@desc={0x1, 0x0, @desc2}}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000140)=',,\\\x00') futimesat(r3, &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0)={{0x0, 0xea60}}) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000680)=ANY=[@ANYBLOB="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", @ANYBLOB="02000000000000006d6e742f656e637279707465645f6469722f2e2e2f66696c653000"]) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') 15:29:40 executing program 7: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x200000, 0x0) ioctl$TCSBRKP(r0, 0x5425, 0x994a) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCSARP(r1, 0x8955, &(0x7f0000000000)={{0x2, 0x0, @local}, {0x0, @local}, 0x20, {0x2, 0x0, @local}, 'dummy0\x00'}) ioctl$EXT4_IOC_GROUP_ADD(r1, 0x40286608, &(0x7f0000000140)={0x1, 0x2c, 0x63d0000000000000, 0xbf, 0xfffffffb, 0x8}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$VT_GETSTATE(r0, 0x5603, &(0x7f00000000c0)={0x401, 0x9, 0xc}) ioctl$sock_inet_SIOCSARP(r2, 0x8955, &(0x7f0000000000)={{0x2, 0x0, @local}, {0x0, @local}, 0x20, {0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xb}}, 'dummy0\x00'}) r3 = memfd_create(&(0x7f0000000080)='\xaa\xaa\xaa\xaa\xaa', 0x3) ftruncate(r3, 0x5) r4 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000100)={{0x1, 0x1, 0x18, r4, {0x1}}, './file0\x00'}) ioctl$FS_IOC_GETVERSION(r2, 0x80087601, &(0x7f0000000040)) 15:29:40 executing program 6: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDGKBMODE(r0, 0x4b44, &(0x7f0000000000)) ioctl$TCSETAW(r0, 0x5407, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "bb09819e2f6e8485"}) 15:29:40 executing program 4: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1c08a4, 0x0) r1 = syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) open$dir(&(0x7f0000000200)='./mnt\x00', 0x40040, 0x10) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir/../file0\x00', 0x80, 0x0) r2 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x50008, 0x0, 0x10081, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r3 = openat(r1, &(0x7f0000000000)='mnt/encrypted_dir/../file0\x00', 0x40, 0x100) r4 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r4, 0x7, 0x0, 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r4, 0xc0406619, &(0x7f00000001c0)={@desc={0x1, 0x0, @desc2}}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000140)=',,\\\x00') futimesat(r3, &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0)={{0x0, 0xea60}}) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000680)=ANY=[@ANYBLOB="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", @ANYBLOB="02000000000000006d6e742f656e637279707465645f6469722f2e2e2f66696c653000"]) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') 15:29:40 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x5407, &(0x7f0000000000)={0x0, 0x3, 0x0, 0x0, 0x5, "bb09819e2f6e8485"}) 15:29:40 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x540a, 0x0) 15:29:40 executing program 2: ioctl$TCSETAW(0xffffffffffffffff, 0x540a, 0x0) r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r0, 0x7, 0x0, 0x0, 0x0) ioctl$TIOCL_SETSEL(0xffffffffffffffff, 0x541c, &(0x7f0000000040)={0x2, {0x2, 0xd641, 0x3, 0x9, 0x4, 0xf}}) io_uring_enter(r0, 0x6466, 0x7b11, 0x2, &(0x7f0000000000)={[0x6]}, 0x8) 15:29:40 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x5407, &(0x7f0000000080)={0xfffd, 0x0, 0x4, 0x0, 0x0, "bb09819e2f6e8485"}) 15:29:40 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDGKBDIACR(r0, 0x4b4a, &(0x7f0000000180)=""/240) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x901c82, 0x42) r2 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r2, 0x7, 0x0, 0x0, 0x0) ioctl$TIOCPKT(r0, 0x5420, &(0x7f00000000c0)=0x8001) ioctl$VT_DISALLOCATE(r0, 0x5608) fsconfig$FSCONFIG_CMD_CREATE(r1, 0x6, 0x0, 0x0, 0x0) ioctl$TIOCSISO7816(r0, 0xc0285443, &(0x7f0000000040)={0x3, 0x8, 0x9, 0x8}) 15:29:40 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x4b3c, 0x0) 15:29:40 executing program 6: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDGKBMODE(r0, 0x4b44, &(0x7f0000000000)) ioctl$TCSETAW(r0, 0x5407, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "bb09819e2f6e8485"}) 15:29:40 executing program 7: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCSBRKP(r0, 0x5425, 0xfffc) 15:29:40 executing program 4: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1c08a4, 0x0) r1 = syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) open$dir(&(0x7f0000000200)='./mnt\x00', 0x40040, 0x10) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir/../file0\x00', 0x80, 0x0) r2 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x50008, 0x0, 0x10081, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r3 = openat(r1, &(0x7f0000000000)='mnt/encrypted_dir/../file0\x00', 0x40, 0x100) r4 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r4, 0x7, 0x0, 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r4, 0xc0406619, &(0x7f00000001c0)={@desc={0x1, 0x0, @desc2}}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000140)=',,\\\x00') futimesat(r3, &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0)={{0x0, 0xea60}}) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000680)=ANY=[@ANYBLOB="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", @ANYBLOB="02000000000000006d6e742f656e637279707465645f6469722f2e2e2f66696c653000"]) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') 15:29:40 executing program 5: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1c08a4, 0x0) r1 = syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) open$dir(&(0x7f0000000200)='./mnt\x00', 0x40040, 0x10) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir/../file0\x00', 0x80, 0x0) r2 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x50008, 0x0, 0x10081, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r3 = openat(r1, &(0x7f0000000000)='mnt/encrypted_dir/../file0\x00', 0x40, 0x100) r4 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r4, 0x7, 0x0, 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r4, 0xc0406619, &(0x7f00000001c0)={@desc={0x1, 0x0, @desc2}}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000140)=',,\\\x00') futimesat(r3, &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0)={{0x0, 0xea60}}) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000680)=ANY=[@ANYBLOB="b00900000000000018000000468a29458f2709d329f6d3f3917408961482081d984538af2f9bcf61c448afbaa0be3f00000000000000ca4aa56fc413a417324e8530165c3515981e2d28f7fce9ae3c6bb8fa04ff6411132c9ced479abaeea325c2205ea95984d3d7f98eea1cca02dfeb0b2471b497fbb71b60180d35e2a3394ba6d965f41c7b7bc29d4e3ca95bd7ad074a4242ec98a69ad9d1546ce18cbbd98d2e50688e958a0fcd16876ab83cdb94eeb03e42203f267a1bf6ccb1c07ad92e6e493149da32f754251ae74d30cd4b50eefd6a208172ed8693b320eda714bdd152b484d9c939b4bb777dddd947843d73529f5ffe589777254cb10f733351e0739a3a61c3b8f977517ee7becda66da23a93e3be8ed63bda262951b32f72c1c48ee63be474eafaa255074efaa494b950f48b119c76c70b833e4d7443b691dc97bf78bcae908758ff1edaf2ad48dd67d0337c8ecfcd47e8ce5598c435f4645d719ae60a12c5b37ed2d45571c29ff6af1292ed2ff7fa24e2ab69f18db826044f35683810d2ee95f68f586a8922acdc225912820cdffe6ac29641f3c531a0eb1ddbf17341a05f3ee437f2a56a4a92af8ba2e413d00d05caab40963868dc00da000dfe8962927be81ca05afcc624225b2667a1208dd74e8bb6ced5e1da98f41bb3dedc31302fbf6ed40e9c526f82b53ce45e25e20ce9068bba911f0ec11403a35ff01cee623f71101155fcb646937ac714ac49741b4a1ffc6a72cba387bf41c1af2eeaa80a07631a22d366562924848da0f27c", @ANYRES32, @ANYBLOB="02000000000000006d6e742f656e637279707465645f6469722f2e2e2f6669"]) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') 15:29:40 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x4b3d, 0x0) 15:29:40 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x3) ioctl$TCSETAW(r0, 0x540a, 0x0) 15:29:40 executing program 1: r0 = accept$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, &(0x7f0000000280)={{0x0, 0x10001, 0x427, 0x7, 0xd98b, 0x100000001, 0x1, 0x8000, 0x7f, 0x7f, 0x3, 0x3, 0x3f, 0x7, 0x5}}) ioctl$BTRFS_IOC_INO_LOOKUP(r0, 0xd0009412, &(0x7f0000001280)={r1, 0x1780}) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCSARP(r3, 0x8955, &(0x7f0000000000)={{0x2, 0x0, @local}, {0x0, @local}, 0x20, {0x2, 0x0, @local}, 'dummy0\x00'}) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000100), 0x220000, 0x0) ioctl$sock_inet_SIOCADDRT(r4, 0x890b, &(0x7f0000002280)={0x0, {0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x1b}}, {0x2, 0x4e23, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x2, 0x4e21, @private=0xa010102}, 0x30, 0x0, 0x0, 0x0, 0x5, 0x0, 0x7, 0x9, 0x9}) connect(r0, &(0x7f0000000080)=@pppol2tpv3in6={0x18, 0x1, {0x0, r3, 0x0, 0x3, 0x3, 0x3, {0xa, 0x4e24, 0x8, @empty, 0x800}}}, 0x80) fcntl$dupfd(r3, 0x406, r0) ioctl$KDGKBDIACR(r2, 0x4b4a, &(0x7f0000000180)=""/240) 15:29:40 executing program 6: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDGKBMODE(r0, 0x4b44, &(0x7f0000000000)) 15:29:40 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x5407, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3, "bb09809e2f6e0bb8"}) 15:29:40 executing program 4: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1c08a4, 0x0) r1 = syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) open$dir(&(0x7f0000000200)='./mnt\x00', 0x40040, 0x10) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir/../file0\x00', 0x80, 0x0) r2 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x50008, 0x0, 0x10081, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r3 = openat(r1, &(0x7f0000000000)='mnt/encrypted_dir/../file0\x00', 0x40, 0x100) r4 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r4, 0x7, 0x0, 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r4, 0xc0406619, &(0x7f00000001c0)={@desc={0x1, 0x0, @desc2}}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000140)=',,\\\x00') futimesat(r3, &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0)={{0x0, 0xea60}}) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000680)=ANY=[@ANYRES32, @ANYBLOB="02000000000000006d6e742f656e637279707465645f6469722f2e2e2f66696c653000"]) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') 15:29:40 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCSPTLCK(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)=0x1) ioctl$VT_OPENQRY(0xffffffffffffffff, 0x5600, &(0x7f0000000040)) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000000)={0x5, 0x3ff, 0x8, 0x2, 0x14, "2b1a9ec7316af6cce124acedc33323a5b844d0"}) ioctl$TCSETAW(r0, 0x540a, 0x0) 15:29:40 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x4b40, 0x0) 15:29:40 executing program 1: ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000800)=ANY=[]) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000000)=@IORING_OP_WRITE={0x17, 0x0, 0x0, @fd, 0x0, 0x0}, 0x0) r0 = getpgrp(0x0) r1 = pidfd_open(r0, 0x0) r2 = dup(r1) setns(r2, 0x7e0302ad8e8d3b54) syz_io_uring_submit(0x0, 0x0, &(0x7f00000002c0)=@IORING_OP_EPOLL_CTL=@add={0x1d, 0x1, 0x0, r2, &(0x7f0000000100)={0x90002014}}, 0x6) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB="240000001000010000000000000000960000090005000000000000000500008048000000"], 0x24}}, 0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0), 0x301000, 0x0) openat(r4, &(0x7f0000000400)='./file1\x00', 0x0, 0x4) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8005, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, @perf_config_ext={0x3ff, 0xfffffffffffffffc}, 0x0, 0x5, 0x0, 0x0, 0x1, 0x0, 0x90}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000002dc0)={&(0x7f0000001780)=ANY=[@ANYBLOB="3c010000100001000000123800000000fe8000000000000000000000000000aa200100000000000000000000000000020000000500"/64, @ANYRES32=0x0, @ANYRES32=0xee00, @ANYBLOB="000000000000000000000000000000000000000032000000e0000002000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff070000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a00040038000000000000004c00140073686132353600"/244], 0x13c}}, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r5, 0x400c6615, &(0x7f0000000000)={0x0, @aes128, 0x0, @desc1}) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46800) r6 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDGKBDIACR(r6, 0x4b4a, &(0x7f0000000180)=""/240) 15:29:40 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x1c4) fsconfig$FSCONFIG_CMD_RECONFIGURE(r1, 0x7, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_CREATE(r1, 0x6, 0x0, 0x0, 0x0) ioctl$TIOCSSOFTCAR(r1, 0x541a, &(0x7f0000000000)=0x8000) ioctl$TCSETAW(r0, 0x5407, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x5}) ioctl$TIOCSSOFTCAR(r1, 0x541a, &(0x7f0000000040)=0x5) 15:29:40 executing program 6: ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, &(0x7f0000000000)) 15:29:40 executing program 5: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1c08a4, 0x0) r1 = syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) open$dir(&(0x7f0000000200)='./mnt\x00', 0x40040, 0x10) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir/../file0\x00', 0x80, 0x0) r2 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x50008, 0x0, 0x10081, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r3 = openat(r1, &(0x7f0000000000)='mnt/encrypted_dir/../file0\x00', 0x40, 0x100) r4 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r4, 0x7, 0x0, 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r4, 0xc0406619, &(0x7f00000001c0)={@desc={0x1, 0x0, @desc2}}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000140)=',,\\\x00') futimesat(r3, &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0)={{0x0, 0xea60}}) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000680)=ANY=[@ANYBLOB="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", @ANYRES32, @ANYBLOB="02000000000000006d6e742f656e637279707465645f6469722f2e2e2f6669"]) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') [ 1462.918265] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. 15:29:40 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f0000000040)) ioctl$TCSETAW(r0, 0x540a, 0x0) 15:29:53 executing program 7: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCSBRKP(r0, 0x5425, 0x994a) ioctl$TIOCSTI(0xffffffffffffffff, 0x5412, &(0x7f0000000040)=0x3) 15:29:53 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_dev$ptys(0xc, 0x3, 0x0) ioctl$TIOCL_SETSEL(r1, 0x541c, &(0x7f0000000000)={0x2, {0x2, 0x1, 0xf645, 0x6, 0x2, 0xf}}) ioctl$KDGKBDIACR(r0, 0x4b4a, &(0x7f0000000180)=""/240) ioctl$PIO_UNIMAP(r1, 0x4b67, &(0x7f0000000080)={0x5, &(0x7f0000000040)=[{0x40, 0x7ff}, {0x9, 0x7fff}, {0x8, 0x2}, {0xff, 0x5}, {0x1a0b, 0x974}]}) 15:29:53 executing program 6: ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, &(0x7f0000000000)) 15:29:53 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x4b41, 0x0) 15:29:53 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDGKBDIACR(0xffffffffffffffff, 0x4b4a, &(0x7f00000000c0)=""/180) ioctl$TCSETAW(r0, 0x5407, &(0x7f0000000080)={0x0, 0x7fff, 0x400, 0x0, 0x1a, "00e7ff800200ffef"}) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) ioctl$VT_GETSTATE(r1, 0x5603, &(0x7f0000000040)={0x0, 0x0, 0x2}) 15:29:53 executing program 5: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1c08a4, 0x0) r1 = syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) open$dir(&(0x7f0000000200)='./mnt\x00', 0x40040, 0x10) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir/../file0\x00', 0x80, 0x0) r2 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x50008, 0x0, 0x10081, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r3 = openat(r1, &(0x7f0000000000)='mnt/encrypted_dir/../file0\x00', 0x40, 0x100) r4 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r4, 0x7, 0x0, 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r4, 0xc0406619, &(0x7f00000001c0)={@desc={0x1, 0x0, @desc2}}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000140)=',,\\\x00') futimesat(r3, &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0)={{0x0, 0xea60}}) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000680)=ANY=[@ANYBLOB="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", @ANYRES32, @ANYBLOB="02000000000000006d6e742f656e637279707465645f6469722f2e2e2f6669"]) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') 15:29:53 executing program 2: syz_open_dev$tty1(0xc, 0x4, 0x1) 15:29:53 executing program 4: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1c08a4, 0x0) r1 = syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) open$dir(&(0x7f0000000200)='./mnt\x00', 0x40040, 0x10) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir/../file0\x00', 0x80, 0x0) r2 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x50008, 0x0, 0x10081, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r3 = openat(r1, &(0x7f0000000000)='mnt/encrypted_dir/../file0\x00', 0x40, 0x100) r4 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r4, 0x7, 0x0, 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r4, 0xc0406619, &(0x7f00000001c0)={@desc={0x1, 0x0, @desc2}}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000140)=',,\\\x00') futimesat(r3, &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0)={{0x0, 0xea60}}) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000680)=ANY=[@ANYRES32, @ANYBLOB="02000000000000006d6e742f656e637279707465645f6469722f2e2e2f66696c653000"]) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') 15:29:53 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x4b44, 0x0) 15:29:53 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x5407, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "bb09819e2f6e8485"}) ioctl$TIOCSCTTY(r0, 0x540e, 0x3) 15:29:53 executing program 6: ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, &(0x7f0000000000)) 15:29:53 executing program 2: syz_open_dev$tty1(0xc, 0x4, 0x1) r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r0, 0x7, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r1, 0x7, 0x0, 0x0, 0x0) ioctl$TCSETAW(r1, 0x540a, 0x0) 15:29:53 executing program 1: msgctl$IPC_RMID(0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, &(0x7f0000000000)=""/80) ioctl$KDGKBDIACR(r0, 0x4b4a, &(0x7f0000000180)=""/240) ioctl$KDSETLED(r0, 0x4b32, 0x2) 15:29:53 executing program 4: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1c08a4, 0x0) r1 = syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) open$dir(&(0x7f0000000200)='./mnt\x00', 0x40040, 0x10) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir/../file0\x00', 0x80, 0x0) r2 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x50008, 0x0, 0x10081, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r3 = openat(r1, &(0x7f0000000000)='mnt/encrypted_dir/../file0\x00', 0x40, 0x100) r4 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r4, 0x7, 0x0, 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r4, 0xc0406619, &(0x7f00000001c0)={@desc={0x1, 0x0, @desc2}}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000140)=',,\\\x00') futimesat(r3, &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0)={{0x0, 0xea60}}) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000680)=ANY=[@ANYRES32, @ANYBLOB="02000000000000006d6e742f656e637279707465645f6469722f2e2e2f66696c653000"]) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') 15:29:53 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x4b45, 0x0) 15:29:53 executing program 5: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, 0x0) mount$9p_tcp(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x4020, &(0x7f0000003300)={'trans=tcp,', {}, 0x2c, {[{@nodevmap}, {@dfltgid}, {@nodevmap}, {@cache_none}, {@privport}, {@msize={'msize', 0x3d, 0x5}}], [{@obj_user={'obj_user', 0x3d, '@},'}}]}}) [ 1476.162903] proc: Unknown parameter 'trans' 15:30:07 executing program 6: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDGKBMODE(r0, 0x4b44, &(0x7f0000000000)) 15:30:07 executing program 7: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCSBRKP(r0, 0x5425, 0x994a) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r1, 0x7, 0x0, 0x0, 0x0) ioctl$GIO_CMAP(r1, 0x4b70, &(0x7f0000000040)) 15:30:07 executing program 1: syz_open_dev$tty1(0xc, 0x4, 0x1) r0 = openat(0xffffffffffffff9c, 0x0, 0x580, 0x1c1) r1 = open_tree(r0, &(0x7f0000000000)='./file0\x00', 0x900) ioctl$INCFS_IOC_CREATE_FILE(r1, 0xc058671e, &(0x7f00000000c0)={{'\x00', 0x3}, {0x1}, 0x20, 0x0, 0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000280)="e89a1a9d2a56ea61b776e17021adc38c8c66e2b9ab72152942d214e224287ec4a337b7bea6d970af70945d421fdd497efe0a0d81aa61ebf4c2d814c5162f947956ac389215e119f8d8f888843a1b50b612a6a89c9afe9ef89408e03f3f889592f66f0616cafe06a3c3844532f1b19a3977b86eddc73d8bf6fe31c8c1dd23e07bf1f4c3a25fdaae8435a8c849be4953c9a44a5a34e809909975a0088bd8c3176d9ec71161865f4d87e9c0dcc966b3a271450edd677180c8763bb66b694733d0822601f7", 0xc3, 0x0, &(0x7f0000000380)={0x2, 0x168, {0x0, 0xc, 0xa2, "257047af2de7ccdd7da5045ab630790ad79a0c8892e1fa5938907c61d6484a3f55623b1093d51a2df6e6fe9ba2721b0f8aa16c881cc62ae73f4ad1b6089dcf52d760c8b29575bdacc1ffbac6d05a8b01c64eedbcc93f49d2e84caebff2a442a9617958c7a330428e643ae03a03f8c5085ea3a3a9fa4c13baa1b72bde881252683c337399cdd69482a66b7934e54ad5e5f468ab7428c60bce294613d43cd164b0ea5c", 0xb9, "e3e2627380807dfca6df6a8c4851bb5b6eb6a70d30adfbd5e2f51ce261bda7e732139dda2073b26d9eae2b7b9383c8c2bbe8f44ec6c7f867d39305202f5c696a53c373c0c206145e7380b18b85772bedaf04250c14d95010e36718c1f81b57a09ab24218a80ef0fc9d77f5c52e6013354d498bc4c39ef2bf65aebc48330dd43be702c86ff6f26397a9950a50f4de43d1e7fab4b5ae38056b0eb198d01882f536ff415eeb484c1080b7a112f10c7c8150eaa278e45198858a61"}, 0xb6, "a100ee712a8e70f575668e71b54b2f0a8608e631449af3dd4469d30fdf19fec39c172d06e9a8a6a193fc3c5f4c0f656beb081aff43a8b671af1fd0c263959cc1b65615156e00b42dee87d5b828fe7ea379920f841f7d87191a312759edab1773c8ce682e04da6cc1b48fda0ee7caa5cd30a878ec3c6188c0d66d3554cb6576a6b300ce9e1978cd8e9cea60c69660679ce6606fe5fffd4a3279d68c041b023704f7be7629c62626bd94e9db17dc07e198e182d63f381b"}, 0x22a}) fsconfig$FSCONFIG_CMD_RECONFIGURE(r0, 0x7, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_CREATE(r1, 0x6, 0x0, 0x0, 0x0) getsockname$unix(r1, &(0x7f0000000640), &(0x7f00000006c0)=0x6e) ioctl$KDGKBDIACR(r0, 0x4b4a, &(0x7f0000000180)=""/224) mkdirat(r0, &(0x7f0000000140)='./file0\x00', 0x1) fsconfig$FSCONFIG_SET_STRING(r0, 0x1, &(0x7f00000005c0)='\t!]#^*b*\'\x00', &(0x7f0000000600)='\x00', 0x0) 15:30:07 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x4b46, 0x0) 15:30:07 executing program 4: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1c08a4, 0x0) r1 = syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) open$dir(&(0x7f0000000200)='./mnt\x00', 0x40040, 0x10) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir/../file0\x00', 0x80, 0x0) r2 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x50008, 0x0, 0x10081, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r3 = openat(r1, &(0x7f0000000000)='mnt/encrypted_dir/../file0\x00', 0x40, 0x100) r4 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r4, 0x7, 0x0, 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r4, 0xc0406619, &(0x7f00000001c0)={@desc={0x1, 0x0, @desc2}}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000140)=',,\\\x00') futimesat(r3, &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0)={{0x0, 0xea60}}) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000680)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB="02000000000000006d6e742f656e637279707465645f6469722f2e2e2f66696c653000"]) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') 15:30:07 executing program 5: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, 0x0) mount$9p_tcp(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x4020, &(0x7f0000003300)={'trans=tcp,', {}, 0x2c, {[{@nodevmap}, {@dfltgid}, {@nodevmap}, {@cache_none}, {@privport}, {@msize={'msize', 0x3d, 0x5}}], [{@obj_user={'obj_user', 0x3d, '@},'}}]}}) 15:30:07 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDGKBSENT(r0, 0x4b48, &(0x7f00000000c0)={0x20, "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"}) ioctl$TCSETAW(r0, 0x5407, &(0x7f0000000000)={0x0, 0x0, 0x0, 0xc684, 0x15, "000000000000e16d"}) 15:30:07 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x540a, 0x0) [ 1489.494012] proc: Unknown parameter 'trans' 15:30:07 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r1, 0x7, 0x0, 0x0, 0x0) ioctl$VT_RESIZE(r1, 0x5609, &(0x7f0000000100)={0x3b4f, 0x546, 0xfff}) ioctl$TCSETAW(r0, 0x540a, 0x0) ioctl$PIO_UNIMAP(r0, 0x4b67, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x2, 0x1}]}) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000001c0), 0xc02, 0x0) ioctl$TIOCL_SETSEL(r2, 0x541c, &(0x7f0000000200)={0x2, {0x2, 0x8, 0x9, 0x0, 0x7, 0x1}}) ioctl$AUTOFS_DEV_IOCTL_READY(r1, 0xc0189376, &(0x7f00000002c0)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r1, @ANYBLOB="07000000000000002e2f662323916a546e99d72ad154fee78f1a6f4a40559e61d2bcf1a310699a81f095d5dbf2d10fa60342824999c8971e8a2621e465f707148b2e6197384505d1ee85c879ade8711349d400ae5177593803867d04788035f17e45b842791dfeeeec5b777260bf102ee114eb04a9c0b20be1bda7fd0c6c0ac1f9d66729feac94ac25ec542e07f097f41821e24a30c9092a236fe1241585dda9e9f01e113e6c3390469bd8415afffa03e8234b9e84e61b96c960e0ccac7c974452e140b7d19db335145dc06ba9822868c8efdd2a2f14355c21f01bed54232f9f44cc51386a41c232cb36d8"]) r3 = ioctl$TIOCGPTPEER(r1, 0x5441, 0x5) ioctl$TIOCL_SETSEL(r3, 0x541c, &(0x7f0000000180)={0x2, {0x2, 0x800, 0xed, 0xfff, 0x5, 0x10}}) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000080)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) ioctl$TIOCMBIS(r4, 0x5416, &(0x7f00000000c0)=0x2) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r4, 0x400c6615, &(0x7f0000000280)={0x0, @aes256, 0x0, @desc4}) 15:30:07 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x4b47, 0x0) 15:30:07 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_SETSEL(r0, 0x541c, &(0x7f0000000000)={0x2, {0x2, 0x6, 0x9, 0x36, 0x9, 0x2}}) ioctl$VT_RESIZEX(r0, 0x560a, &(0x7f0000001380)={0x3, 0x630, 0x5f, 0xff, 0x9}) r1 = openat(0xffffffffffffffff, 0x0, 0x359823, 0x4b) ioctl$KDSETMODE(r1, 0x4b3a, 0x1) fsconfig$FSCONFIG_CMD_RECONFIGURE(r1, 0x7, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_SET_FLAG(r1, 0x0, &(0x7f00000002c0)='async\x00', 0x0, 0x0) fsconfig$FSCONFIG_CMD_CREATE(r1, 0x6, 0x0, 0x0, 0x0) r2 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r2, 0x7, 0x0, 0x0, 0x0) ioctl$TIOCL_SETVESABLANK(r2, 0x541c, &(0x7f0000001340)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, &(0x7f0000000300)={{0x1, 0x1, 0x18, r0, {0x3}}, './file0\x00'}) ioctl$KDGKBDIACR(r3, 0x4b4a, &(0x7f0000000340)=""/4096) fsconfig$FSCONFIG_SET_STRING(0xffffffffffffffff, 0x1, &(0x7f0000000240)='\x00', &(0x7f0000000280)='#\x00', 0x0) ioctl$PIO_SCRNMAP(r1, 0x4b41, &(0x7f0000000140)="819ab4944b7b28da228aac9a5aba4a4d54ae8f0a58300c1f068c2b2e1254b6eaf418b597bb6c4496d74c8b20ae985b7e3b9f92e79e0b0ac00c93d997f9c588d2ab03cc28f3b58cf6fbf247808a77bf85e62eb9c1d106916912ab9c12138137579068c62155a110d7ad69987c86e733d39e0e2f604a7ebd9306d52569a09dbfcb78b45a4310d635445714684dc644ff66aa85e8e56f1fc6cc437314cf4b7d20a53eaa04069162ad39173202e4a2eff85af7c62f8237cf85963b752c2c4d8ca260b9f4664f9876bcc2eba15d9577c75f6f69f9169cd58e4f4e2489cbe70a3397ce9a70bc09f39a5bf2edfc142ba5cd") ioctl$KDGKBDIACR(r0, 0x4b4a, &(0x7f0000000040)=""/241) 15:30:07 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x540a, 0x0) 15:30:22 executing program 4: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1c08a4, 0x0) r1 = syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) open$dir(&(0x7f0000000200)='./mnt\x00', 0x40040, 0x10) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir/../file0\x00', 0x80, 0x0) r2 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x50008, 0x0, 0x10081, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r3 = openat(r1, &(0x7f0000000000)='mnt/encrypted_dir/../file0\x00', 0x40, 0x100) r4 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r4, 0x7, 0x0, 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r4, 0xc0406619, &(0x7f00000001c0)={@desc={0x1, 0x0, @desc2}}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000140)=',,\\\x00') futimesat(r3, &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0)={{0x0, 0xea60}}) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000680)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB="02000000000000006d6e742f656e637279707465645f6469722f2e2e2f66696c653000"]) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') 15:30:22 executing program 6: syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, &(0x7f0000000000)) 15:30:22 executing program 7: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCSBRKP(r0, 0x5425, 0x994a) 15:30:22 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDGKBENT(r0, 0x4b46, &(0x7f0000000000)={0x9, 0xcf, 0x5}) ioctl$TCSETAW(r0, 0x540a, 0x0) 15:30:22 executing program 5: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, 0x0) mount$9p_tcp(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x4020, &(0x7f0000003300)) (fail_nth: 1) 15:30:22 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCSSOFTCAR(r0, 0x541a, &(0x7f0000000000)=0x6) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCSARP(r1, 0x8955, &(0x7f0000000000)={{0x2, 0x0, @local}, {0x0, @local}, 0x20, {0x2, 0x0, @local}, 'dummy0\x00'}) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, r1) ioctl$KDGKBDIACR(r0, 0x4b4a, &(0x7f0000000180)=""/240) 15:30:22 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x4b48, 0x0) 15:30:22 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = openat(0xffffffffffffff9c, 0x0, 0x42800, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r1, 0x7, 0x0, 0x0, 0x0) ioctl$TIOCL_SETSEL(r1, 0x541c, &(0x7f0000000040)={0x2, {0x2, 0xa222, 0x14, 0x3, 0x1, 0x1}}) r2 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r2, 0x7, 0x0, 0x0, 0x0) ioctl$TIOCMSET(r2, 0x5418, &(0x7f0000000500)=0x5) r3 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r3, 0x7, 0x0, 0x0, 0x0) r4 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x13c) fsconfig$FSCONFIG_CMD_RECONFIGURE(r4, 0x7, 0x0, 0x0, 0x0) ioctl$TIOCVHANGUP(r4, 0x5437, 0x0) ioctl$KDFONTOP_GET(r3, 0x4b72, &(0x7f0000000000)={0x1, 0x1, 0xc, 0xa, 0x1a1, &(0x7f00000000c0)}) ioctl$TCSETAW(r0, 0x5407, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x4, 0x0, "bb09819e2f6e8485"}) openat$snapshot(0xffffffffffffff9c, &(0x7f00000004c0), 0xda100, 0x0) [ 1504.429260] FAULT_INJECTION: forcing a failure. [ 1504.429260] name failslab, interval 1, probability 0, space 0, times 0 [ 1504.431881] CPU: 0 PID: 9558 Comm: syz-executor.5 Not tainted 5.10.250 #1 [ 1504.433419] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1504.435279] Call Trace: [ 1504.435874] dump_stack+0x107/0x167 [ 1504.436693] should_fail.cold+0x5/0xa [ 1504.437567] ? copy_mount_options+0x55/0x180 [ 1504.438555] should_failslab+0x5/0x20 [ 1504.439400] kmem_cache_alloc_trace+0x55/0x320 [ 1504.440410] ? wait_for_completion_io+0x270/0x270 [ 1504.441486] copy_mount_options+0x55/0x180 [ 1504.442434] __x64_sys_mount+0x1a8/0x300 [ 1504.443344] ? copy_mnt_ns+0xa00/0xa00 [ 1504.444216] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1504.445393] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1504.446527] do_syscall_64+0x33/0x40 [ 1504.447366] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1504.448523] RIP: 0033:0x7f95ced63b19 [ 1504.449353] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1504.453475] RSP: 002b:00007f95cc2d9188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1504.455157] RAX: ffffffffffffffda RBX: 00007f95cee76f60 RCX: 00007f95ced63b19 [ 1504.456751] RDX: 0000000000000000 RSI: 0000000020000100 RDI: 0000000000000000 [ 1504.458368] RBP: 00007f95cc2d91d0 R08: 0000000020003300 R09: 0000000000000000 [ 1504.459975] R10: 0000000000004020 R11: 0000000000000246 R12: 0000000000000001 [ 1504.461564] R13: 00007ffde6ceea9f R14: 00007f95cc2d9300 R15: 0000000000022000 15:30:22 executing program 6: syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, &(0x7f0000000000)) 15:30:22 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x4b49, 0x0) 15:30:22 executing program 4: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1c08a4, 0x0) r1 = syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) open$dir(&(0x7f0000000200)='./mnt\x00', 0x40040, 0x10) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir/../file0\x00', 0x80, 0x0) r2 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x50008, 0x0, 0x10081, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r3 = openat(r1, &(0x7f0000000000)='mnt/encrypted_dir/../file0\x00', 0x40, 0x100) r4 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r4, 0x7, 0x0, 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r4, 0xc0406619, &(0x7f00000001c0)={@desc={0x1, 0x0, @desc2}}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000140)=',,\\\x00') futimesat(r3, &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0)={{0x0, 0xea60}}) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000680)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB="02000000000000006d6e742f656e637279707465645f6469722f2e2e2f66696c653000"]) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') 15:30:22 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x540a, 0x0) ioctl$TCSETAW(r0, 0x5407, &(0x7f0000000000)={0x100, 0x5, 0x608, 0xff, 0x15, "924638416c41a27f"}) 15:30:22 executing program 6: syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, &(0x7f0000000000)) 15:30:22 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x4b4a, 0x0) 15:30:22 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDGKBDIACR(r0, 0x4b4a, &(0x7f0000000180)=""/240) recvmmsg$unix(0xffffffffffffffff, &(0x7f0000003a40)=[{{0x0, 0x0, &(0x7f0000000480)=[{}, {&(0x7f0000000040)=""/19, 0x13}, {&(0x7f0000000080)=""/239, 0xef}, {&(0x7f0000000280)=""/97, 0x61}, {&(0x7f0000000300)=""/112, 0x70}, {&(0x7f0000000380)=""/245, 0xf5}], 0x6, &(0x7f0000000500)=ANY=[@ANYBLOB="1c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000003000000", @ANYRES32, @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYBLOB='\x00\x00\x00\x00'], 0x40}}, {{&(0x7f0000000540)=@abs, 0x6e, &(0x7f0000000600)=[{&(0x7f00000005c0)=""/20, 0x14}], 0x1, &(0x7f0000000640)=[@cred={{0x1c}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x98}}, {{&(0x7f0000000700)=@abs, 0x6e, &(0x7f0000000f00)=[{&(0x7f0000000780)=""/208, 0xd0}, {&(0x7f0000000880)=""/179, 0xb3}, {&(0x7f0000000940)=""/161, 0xa1}, {&(0x7f0000000a00)=""/140, 0x8c}, {&(0x7f0000000ac0)=""/185, 0xb9}, {&(0x7f0000000b80)=""/218, 0xda}, {&(0x7f0000000c80)=""/97, 0x61}, {&(0x7f0000000d00)=""/190, 0xbe}, {&(0x7f0000000dc0)=""/122, 0x7a}, {&(0x7f0000000e40)=""/129, 0x81}], 0xa, &(0x7f0000000fc0)=[@rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x88}}, {{&(0x7f0000001080), 0x6e, &(0x7f0000002400)=[{&(0x7f0000001100)=""/40, 0x28}, {&(0x7f0000001140)=""/250, 0xfa}, {&(0x7f0000001240)=""/106, 0x6a}, {&(0x7f00000012c0)=""/214, 0xd6}, {&(0x7f00000013c0)=""/4096, 0x1000}, {&(0x7f00000023c0)=""/29, 0x1d}], 0x6, &(0x7f0000003c00)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000002400000000000000010000b732b3fcf06a16e15022380001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="0000000030000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00'], 0x82}}, {{&(0x7f0000002540)=@abs, 0x6e, &(0x7f0000003980)=[{&(0x7f00000025c0)=""/194, 0xc2}, {&(0x7f00000026c0)=""/192, 0xc0}, {&(0x7f0000002780)=""/39, 0x27}, {&(0x7f00000027c0)=""/4096, 0x1000}, {&(0x7f00000037c0)=""/207, 0xcf}, {&(0x7f00000038c0)=""/169, 0xa9}], 0x6, &(0x7f0000003a00)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}], 0x5, 0x0, &(0x7f0000003b80)={0x0, 0x3938700}) openat(r1, &(0x7f0000003bc0)='./file0\x00', 0x101000, 0x4) syz_io_uring_submit(0x0, 0x0, &(0x7f0000002480)=@IORING_OP_NOP={0x0, 0x2}, 0x5) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000000)=@IORING_OP_FSYNC={0x3, 0x2, 0x0, @fd=r2, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x80) 15:30:22 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000000)={{0x2, 0x0, @local}, {0x0, @local}, 0x20, {0x2, 0x0, @local}, 'dummy0\x00'}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000040)={&(0x7f00000000c0)={0x1bc, 0x39, 0x800, 0x70bd2c, 0x25dfdbfe, {0xc}, [@nested={0xf4, 0xe, 0x0, 0x1, [@generic="050bee5a18c1eb1f8597e7e35a098fec8340f3ff981e991dace17142588dc125334ae8d61c45eb34713934ed1674f650614aced30a2d939410cd32aff5882461e3cdadfb94509a08419a8f95b5c649e56a0396d337ac481d8d1ca423e7e91ae114c15e6c938bc87daaddd48ad6137285d9ffac5b46ebd8481bd7e807e530030ee35d9a13853455229c30a7e09d9e13221926b213411771aa6745f536a53ff3cd29cb1978a207a449ed9a89172a81c4396b03b75b21bf4d6dc9717c61785852dd5051e9059603616d4f0872f86206f5c9c366ce01fb4ac1f619dd378520c1a5e13bcae9bf218ac4fab1860f22772a0ec1"]}, @generic="21b9d20a4d65", @typed={0x6, 0x80, 0x0, 0x0, @str=',\x00'}, @nested={0x9a, 0xd, 0x0, 0x1, [@generic="402e2b11e8a2b2e25abe8050563756bbc3156369657bfe2255c234b3383cdc6bc559564371f736f64dd947445f8a4d3d34db54bf5c5815f3eb7589205316109dcc5fcd09aa554bb0a1ab7fe65cb8d154ba42fc687a4c4db3d6c0b740a9d02366125efe9129327bd720db74b1c05b70bd8c5643134a678e681d9d9764c60d67f24644", @typed={0x8, 0xf, 0x0, 0x0, @fd=r0}, @typed={0xc, 0x2c, 0x0, 0x0, @u64=0x401}]}, @typed={0x8, 0x56, 0x0, 0x0, @u32=0x7fffffff}]}, 0x1bc}, 0x1, 0x0, 0x0, 0x40000}, 0x80) r1 = syz_open_dev$tty1(0xc, 0x4, 0x2) ioctl$TCSETAW(r1, 0x5407, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "6e848500"}) 15:30:22 executing program 6: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDGKBMODE(r0, 0x4b44, 0x0) 15:30:22 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x1000008, 0x50, 0xffffffffffffffff, 0x8000000) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCSARP(r2, 0x8955, &(0x7f0000000000)={{0x2, 0x0, @local}, {0x0, @local}, 0x20, {0x2, 0x0, @local}, 'dummy0\x00'}) r3 = io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) syz_io_uring_submit(r1, 0x0, &(0x7f00000000c0)=@IORING_OP_READV=@use_registered_buffer={0x1, 0x2, 0xe000, @fd=r2, 0xffffffffffffff79, 0x0, 0x0, 0x15, 0x0, {0x3, r3}}, 0xc0000000) r4 = signalfd4(r0, &(0x7f0000000000)={[0xb68]}, 0x8, 0x0) io_uring_setup(0x2ad5, &(0x7f0000000040)={0x0, 0xc946, 0x0, 0x3, 0x350, 0x0, r4}) ioctl$TCSETAW(r0, 0x540a, 0x0) 15:30:37 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x4b4b, 0x0) 15:30:37 executing program 7: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = inotify_init1(0x80800) r2 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r2, 0x7, 0x0, 0x0, 0x0) ioctl$TIOCL_UNBLANKSCREEN(r2, 0x541c, &(0x7f0000000100)) ioctl$BTRFS_IOC_QUOTA_CTL(r1, 0xc0109428, &(0x7f00000000c0)={0x1, 0x10000}) ioctl$TCSBRKP(r0, 0x5425, 0x994a) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f0000000040)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB="0100000000000000000000025c023000"]) ioctl$TIOCL_SCROLLCONSOLE(r3, 0x541c, &(0x7f0000000080)={0xd, 0x15e2}) 15:30:37 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x3) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r1, 0x7, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_CREATE(r1, 0x6, 0x0, 0x0, 0x0) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x210000, 0x0) r3 = openat(r2, 0x0, 0x690042, 0x5) fsconfig$FSCONFIG_CMD_RECONFIGURE(r3, 0x7, 0x0, 0x0, 0x0) ioctl$TCSETAW(r3, 0x540a, 0x0) r4 = epoll_create(0x3) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r3, 0xc0189378, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {r3}}, './file0\x00'}) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0xb7, 0x40, 0x7f, 0x3d, 0x0, 0x4, 0x60695, 0xf, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_config_ext={0x2453, 0x5}, 0x5070, 0x2f7e, 0x1, 0x0, 0xf1f6, 0xd8, 0x6, 0x0, 0x8}, 0x0, 0x4, r5, 0x8) ioctl$AUTOFS_IOC_PROTOVER(r4, 0x80049363, &(0x7f0000000040)) 15:30:37 executing program 4: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1c08a4, 0x0) r1 = syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) open$dir(&(0x7f0000000200)='./mnt\x00', 0x40040, 0x10) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir/../file0\x00', 0x80, 0x0) r2 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x50008, 0x0, 0x10081, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r3 = openat(r1, &(0x7f0000000000)='mnt/encrypted_dir/../file0\x00', 0x40, 0x100) r4 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r4, 0x7, 0x0, 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r4, 0xc0406619, &(0x7f00000001c0)={@desc={0x1, 0x0, @desc2}}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000140)=',,\\\x00') futimesat(r3, &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0)={{0x0, 0xea60}}) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000680)=ANY=[@ANYBLOB="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", @ANYRES32, @ANYBLOB="02000000000000006d6e742f656e637279707465645f6469722f2e2e2f66696c653000"]) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') 15:30:37 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) readlinkat(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$KDGKBDIACR(r0, 0x4b4a, &(0x7f0000000180)=""/240) 15:30:37 executing program 6: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDGKBMODE(r0, 0x4b44, 0x0) 15:30:37 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCSSOFTCAR(r0, 0x541a, &(0x7f0000000040)=0x4) ioctl$TCSETAW(r0, 0x5407, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "bb09819e2f6e8485"}) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000000)={0x1ff, 0x6, 0x1, 0x40, 0x12, "b4e662f4e259d08f1b075c5a27e483d09a940a"}) 15:30:37 executing program 5: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, 0x0) mount$9p_tcp(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x4020, &(0x7f0000003300)) (fail_nth: 2) [ 1519.638665] FAULT_INJECTION: forcing a failure. [ 1519.638665] name failslab, interval 1, probability 0, space 0, times 0 [ 1519.641293] CPU: 1 PID: 9608 Comm: syz-executor.5 Not tainted 5.10.250 #1 [ 1519.642798] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1519.644601] Call Trace: [ 1519.645227] dump_stack+0x107/0x167 [ 1519.646031] should_fail.cold+0x5/0xa [ 1519.646865] ? create_object.isra.0+0x3a/0xa30 [ 1519.647864] should_failslab+0x5/0x20 [ 1519.648705] kmem_cache_alloc+0x5b/0x310 [ 1519.649615] create_object.isra.0+0x3a/0xa30 [ 1519.650574] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1519.651711] kmem_cache_alloc_trace+0x151/0x320 [ 1519.652736] copy_mount_options+0x55/0x180 [ 1519.653665] __x64_sys_mount+0x1a8/0x300 [ 1519.654550] ? copy_mnt_ns+0xa00/0xa00 [ 1519.655416] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1519.656563] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1519.657697] do_syscall_64+0x33/0x40 [ 1519.658515] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1519.659634] RIP: 0033:0x7f95ced63b19 [ 1519.660443] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1519.664560] RSP: 002b:00007f95cc2d9188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1519.666240] RAX: ffffffffffffffda RBX: 00007f95cee76f60 RCX: 00007f95ced63b19 [ 1519.667789] RDX: 0000000000000000 RSI: 0000000020000100 RDI: 0000000000000000 [ 1519.669362] RBP: 00007f95cc2d91d0 R08: 0000000020003300 R09: 0000000000000000 [ 1519.670887] R10: 0000000000004020 R11: 0000000000000246 R12: 0000000000000001 [ 1519.672436] R13: 00007ffde6ceea9f R14: 00007f95cc2d9300 R15: 0000000000022000 15:30:37 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x4b4c, 0x0) 15:30:37 executing program 0: r0 = io_uring_setup(0x130b, &(0x7f0000000000)={0x0, 0xe8eb, 0x0, 0x0, 0x2c6}) fsync(r0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r1, 0x5407, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "bb09819e2f6e8485"}) ioctl$TIOCL_SETSEL(0xffffffffffffffff, 0x541c, &(0x7f00000000c0)={0x2, {0x2, 0xe7b, 0x118e, 0x401, 0x7, 0x12}}) 15:30:37 executing program 6: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDGKBMODE(r0, 0x4b44, 0x0) [ 1519.699886] audit: type=1326 audit(1771169437.417:27): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=9609 comm="syz-executor.1" exe="/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f478d7b4b19 code=0x7ffc0000 [ 1519.706575] audit: type=1326 audit(1771169437.423:28): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=9609 comm="syz-executor.1" exe="/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f478d7b4b19 code=0x7ffc0000 [ 1519.719475] proc: Unknown parameter 'trans' [ 1519.722280] audit: type=1326 audit(1771169437.436:29): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=9609 comm="syz-executor.1" exe="/syz-executor.1" sig=0 arch=c000003e syscall=16 compat=0 ip=0x7f478d7b4b19 code=0x7ffc0000 [ 1519.741257] audit: type=1326 audit(1771169437.436:30): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=9609 comm="syz-executor.1" exe="/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f478d7b4b19 code=0x7ffc0000 [ 1519.766650] audit: type=1326 audit(1771169437.439:31): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=9609 comm="syz-executor.1" exe="/syz-executor.1" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7f478d767a04 code=0x7ffc0000 [ 1519.793382] audit: type=1326 audit(1771169437.446:32): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=9609 comm="syz-executor.1" exe="/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f478d7b4b19 code=0x7ffc0000 [ 1519.812499] audit: type=1326 audit(1771169437.446:33): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=9609 comm="syz-executor.1" exe="/syz-executor.1" sig=0 arch=c000003e syscall=317 compat=0 ip=0x7f478d7b4b19 code=0x7ffc0000 15:30:50 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x4b4d, 0x0) 15:30:50 executing program 7: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCSBRKP(r0, 0x5425, 0x994a) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r1, 0x7, 0x0, 0x0, 0x0) ioctl$TCSETS2(r1, 0x402c542b, &(0x7f0000000040)={0x6, 0x401, 0x3, 0x10000, 0x0, "bae14e1adddda6b276720a1873477043775730", 0x3, 0x6}) fremovexattr(r1, &(0x7f0000000140)=@known='com.apple.FinderInfo\x00') r2 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r2, 0x7, 0x0, 0x0, 0x0) ioctl$TIOCL_SCROLLCONSOLE(r2, 0x541c, &(0x7f00000000c0)={0xd, 0xffff}) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/module/i8042', 0x8000, 0x8) r3 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r3, 0x7, 0x0, 0x0, 0x0) ioctl$GIO_SCRNMAP(r3, 0x4b40, &(0x7f0000000180)=""/83) fcntl$dupfd(r1, 0x0, r3) 15:30:50 executing program 5: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, 0x0) mount$9p_tcp(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x4020, &(0x7f0000003300)) (fail_nth: 3) 15:30:50 executing program 6: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1c08a4, 0x0) r1 = syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) open$dir(&(0x7f0000000200)='./mnt\x00', 0x40040, 0x10) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir/../file0\x00', 0x80, 0x0) r2 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x50008, 0x0, 0x10081, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r3 = openat(r1, &(0x7f0000000000)='mnt/encrypted_dir/../file0\x00', 0x40, 0x100) r4 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r4, 0x7, 0x0, 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r4, 0xc0406619, &(0x7f00000001c0)={@desc={0x1, 0x0, @desc2}}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000140)=',,\\\x00') futimesat(r3, &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0)={{0x0, 0xea60}}) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000680)=ANY=[@ANYBLOB="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", @ANYRES32, @ANYBLOB="02000000000000006d6e742f656e637279707465645f6469722f2e2e2f66696c653000"]) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') 15:30:50 executing program 0: syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(0xffffffffffffffff, 0x5407, &(0x7f0000000080)={0xfffd, 0x0, 0x5, 0x0, 0x0, "bb09819e2f6e8485"}) 15:30:50 executing program 1: prctl$PR_SET_ENDIAN(0x14, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x3) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000040)={0x7b981e5, 0xfffffffe, 0x84, 0x2, 0x1d, "3a37451e55e2178aa5abf2198ec6c354514e0c"}) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000080)={0x6, 0x10000, 0x273c, 0x6, 0x13, "93908b7f67d65f7db4184d3dbad016c170b33a"}) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r1, 0x7, 0x0, 0x0, 0x0) ioctl$KDGKBDIACR(r1, 0x4b4a, &(0x7f0000000180)=""/240) ioctl$TIOCSSOFTCAR(r0, 0x541a, &(0x7f0000000000)=0xff) 15:30:50 executing program 4: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1c08a4, 0x0) r1 = syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) open$dir(&(0x7f0000000200)='./mnt\x00', 0x40040, 0x10) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir/../file0\x00', 0x80, 0x0) r2 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x50008, 0x0, 0x10081, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r3 = openat(r1, &(0x7f0000000000)='mnt/encrypted_dir/../file0\x00', 0x40, 0x100) r4 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r4, 0x7, 0x0, 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r4, 0xc0406619, &(0x7f00000001c0)={@desc={0x1, 0x0, @desc2}}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000140)=',,\\\x00') futimesat(r3, &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0)={{0x0, 0xea60}}) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000680)=ANY=[@ANYBLOB="b00900000000000018000000468a29458f2709d329f6d3f3917408961482081d984538af2f9bcf61c448afbaa0be3f00000000000000ca4aa56fc413a417324e8530165c3515981e2d28f7fce9ae3c6bb8fa04ff6411132c9ced479abaeea325c2205ea95984d3d7f98eea1cca02dfeb0b2471b497fbb71b60180d35e2a3394ba6d965f41c7b7bc29d4e3ca95bd7ad074a4242ec98a69ad9d1546ce18cbbd98d2e50688e958a0fcd16876ab83cdb94eeb03e42203f267a1bf6ccb1c07ad92e6e493149da32f754251ae74d30cd4b50eefd6a208172ed8693b320eda714bdd152b484d9c939b4bb777dddd947843d73529f5ffe589777254cb10f733351e0739a3a61c3b8f977517ee7becda66da23a93e3be8ed63bda2629", @ANYRES32, @ANYBLOB="02000000000000006d6e742f656e637279707465645f6469722f2e2e2f66696c653000"]) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') 15:30:50 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$GIO_UNIMAP(0xffffffffffffffff, 0x4b66, &(0x7f00000000c0)={0x6, &(0x7f0000000080)=[{}, {}, {}, {}, {}, {}]}) ioctl$TCSETAW(r0, 0x540a, 0x0) pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x80000) ioctl$TIOCSERGETLSR(r1, 0x5459, &(0x7f0000000040)) 15:30:50 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x4b4e, 0x0) 15:30:50 executing program 2: syz_open_dev$tty1(0xc, 0x4, 0x1) [ 1533.192497] FAULT_INJECTION: forcing a failure. [ 1533.192497] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1533.195030] CPU: 0 PID: 9646 Comm: syz-executor.5 Not tainted 5.10.250 #1 [ 1533.196472] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1533.198215] Call Trace: [ 1533.198774] dump_stack+0x107/0x167 [ 1533.199542] should_fail.cold+0x5/0xa [ 1533.200357] _copy_from_user+0x2e/0x1b0 [ 1533.201198] copy_mount_options+0x76/0x180 [ 1533.202094] __x64_sys_mount+0x1a8/0x300 [ 1533.202941] ? copy_mnt_ns+0xa00/0xa00 [ 1533.203766] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1533.204878] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1533.205976] do_syscall_64+0x33/0x40 [ 1533.206755] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1533.207827] RIP: 0033:0x7f95ced63b19 [ 1533.208610] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1533.212516] RSP: 002b:00007f95cc2d9188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1533.214126] RAX: ffffffffffffffda RBX: 00007f95cee76f60 RCX: 00007f95ced63b19 [ 1533.215622] RDX: 0000000000000000 RSI: 0000000020000100 RDI: 0000000000000000 [ 1533.217119] RBP: 00007f95cc2d91d0 R08: 0000000020003300 R09: 0000000000000000 [ 1533.218633] R10: 0000000000004020 R11: 0000000000000246 R12: 0000000000000001 [ 1533.220084] R13: 00007ffde6ceea9f R14: 00007f95cc2d9300 R15: 0000000000022000 [ 1533.273460] proc: Unknown parameter 'trans' 15:31:06 executing program 7: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCSBRKP(r0, 0x5425, 0x994a) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r1, 0x7, 0x0, 0x0, 0x0) ioctl$TIOCL_SCROLLCONSOLE(r1, 0x541c, &(0x7f0000000040)={0xd, 0x7fffffff}) 15:31:06 executing program 5: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, 0x0) mount$9p_tcp(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x4020, &(0x7f0000003300)) (fail_nth: 4) 15:31:06 executing program 4: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1c08a4, 0x0) r1 = syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) open$dir(&(0x7f0000000200)='./mnt\x00', 0x40040, 0x10) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir/../file0\x00', 0x80, 0x0) r2 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x50008, 0x0, 0x10081, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r3 = openat(r1, &(0x7f0000000000)='mnt/encrypted_dir/../file0\x00', 0x40, 0x100) r4 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r4, 0x7, 0x0, 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r4, 0xc0406619, &(0x7f00000001c0)={@desc={0x1, 0x0, @desc2}}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000140)=',,\\\x00') futimesat(r3, &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0)={{0x0, 0xea60}}) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000680)=ANY=[@ANYBLOB="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", @ANYRES32, @ANYBLOB="02000000000000006d6e742f656e637279707465645f6469722f2e2e2f66696c653000"]) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') 15:31:06 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0) r2 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r2, 0x7, 0x0, 0x0, 0x0) ioctl$KDGKBDIACR(r2, 0x4b4a, &(0x7f0000000000)=""/202) r3 = openat(r1, 0x0, 0x480c0, 0x25) fsconfig$FSCONFIG_CMD_RECONFIGURE(r3, 0x7, 0x0, 0x0, 0x0) ioctl$TIOCL_SETSEL(r3, 0x541c, &(0x7f0000000140)={0x2, {0x2, 0x1b57, 0x1, 0x81, 0xf3, 0x10}}) ioctl$TCSETAW(r0, 0x540a, 0x0) 15:31:06 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_SETSEL(r0, 0x541c, &(0x7f00000000c0)={0x2, {0x2, 0x200, 0x8, 0x8, 0x5, 0x2}}) ioctl$KDGKBDIACR(r0, 0x4b4a, &(0x7f0000000180)=""/240) fremovexattr(r0, &(0x7f0000000140)=@random={'btrfs.', '].[\x00'}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='ns\x00') ioctl$TIOCGSOFTCAR(r0, 0x5419, &(0x7f0000000680)) fsconfig$FSCONFIG_CMD_RECONFIGURE(0xffffffffffffffff, 0x7, 0x0, 0x0, 0x0) ioctl$KDSETMODE(r1, 0x4b3a, 0x1) ioctl$KDSETMODE(0xffffffffffffffff, 0x4b3a, 0x0) ioctl$TIOCL_SELLOADLUT(0xffffffffffffffff, 0x541c, &(0x7f0000000100)={0x5, 0x8, 0x0, 0x8, 0x62338ad5}) ioctl$KDFONTOP_GET(r1, 0x4b72, &(0x7f0000000040)={0x1, 0x1, 0x4, 0x17, 0x1ce, &(0x7f0000000280)}) 15:31:06 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x5407, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "bb09819e2f6e8485"}) fsetxattr$security_capability(r0, &(0x7f0000000000), &(0x7f0000000040)=@v2={0x2000000, [{0x9, 0x7}, {0x8, 0x101}]}, 0x14, 0x2) 15:31:06 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x4b52, 0x0) 15:31:06 executing program 6: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1c08a4, 0x0) r1 = syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) open$dir(&(0x7f0000000200)='./mnt\x00', 0x40040, 0x10) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir/../file0\x00', 0x80, 0x0) r2 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x50008, 0x0, 0x10081, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r3 = openat(r1, &(0x7f0000000000)='mnt/encrypted_dir/../file0\x00', 0x40, 0x100) r4 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r4, 0x7, 0x0, 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r4, 0xc0406619, &(0x7f00000001c0)={@desc={0x1, 0x0, @desc2}}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000140)=',,\\\x00') futimesat(r3, &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0)={{0x0, 0xea60}}) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000680)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB="02000000000000006d6e742f656e637279707465645f6469722f2e2e2f66696c653000"]) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') [ 1549.182866] FAULT_INJECTION: forcing a failure. [ 1549.182866] name failslab, interval 1, probability 0, space 0, times 0 [ 1549.186019] CPU: 1 PID: 9664 Comm: syz-executor.5 Not tainted 5.10.250 #1 [ 1549.187888] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 15:31:06 executing program 4: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1c08a4, 0x0) r1 = syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) open$dir(&(0x7f0000000200)='./mnt\x00', 0x40040, 0x10) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir/../file0\x00', 0x80, 0x0) r2 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x50008, 0x0, 0x10081, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r3 = openat(r1, &(0x7f0000000000)='mnt/encrypted_dir/../file0\x00', 0x40, 0x100) r4 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r4, 0x7, 0x0, 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r4, 0xc0406619, &(0x7f00000001c0)={@desc={0x1, 0x0, @desc2}}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000140)=',,\\\x00') futimesat(r3, &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0)={{0x0, 0xea60}}) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000680)=ANY=[@ANYBLOB="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", @ANYRES32, @ANYBLOB="02000000000000006d6e742f656e637279707465645f6469722f2e2e2f66696c653000"]) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') [ 1549.190149] Call Trace: [ 1549.191077] dump_stack+0x107/0x167 [ 1549.192072] should_fail.cold+0x5/0xa [ 1549.193107] ? getname_flags.part.0+0x50/0x4f0 [ 1549.194306] should_failslab+0x5/0x20 [ 1549.195108] kmem_cache_alloc+0x5b/0x310 [ 1549.195960] getname_flags.part.0+0x50/0x4f0 [ 1549.196895] ? _copy_from_user+0xfb/0x1b0 [ 1549.197774] user_path_at_empty+0xa1/0x100 [ 1549.198674] __x64_sys_mount+0x1e9/0x300 [ 1549.199525] ? copy_mnt_ns+0xa00/0xa00 [ 1549.200353] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1549.201455] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1549.202558] do_syscall_64+0x33/0x40 [ 1549.203346] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1549.204428] RIP: 0033:0x7f95ced63b19 [ 1549.205231] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1549.209165] RSP: 002b:00007f95cc2d9188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1549.210804] RAX: ffffffffffffffda RBX: 00007f95cee76f60 RCX: 00007f95ced63b19 [ 1549.212341] RDX: 0000000000000000 RSI: 0000000020000100 RDI: 0000000000000000 [ 1549.213874] RBP: 00007f95cc2d91d0 R08: 0000000020003300 R09: 0000000000000000 [ 1549.215417] R10: 0000000000004020 R11: 0000000000000246 R12: 0000000000000001 [ 1549.216947] R13: 00007ffde6ceea9f R14: 00007f95cc2d9300 R15: 0000000000022000 15:31:07 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCSARP(r1, 0x8955, &(0x7f0000000000)={{0x2, 0x0, @local}, {0x0, @local}, 0x20, {0x2, 0x0, @local}, 'dummy0\x00'}) sendfile(r0, r1, &(0x7f0000000140)=0x3, 0x6) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000000)={'batadv_slave_1\x00'}) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) sendmsg$DEVLINK_CMD_RATE_GET(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000440)={0x170, 0x0, 0x400, 0x70bd27, 0x25dfdbfb, {}, [@handle=@pci={{0x8}, {0x11}}, @DEVLINK_ATTR_RATE_NODE_NAME={0xe}, @handle=@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_RATE_NODE_NAME={0x94, 0xa8, @random="d1393fc48e7d645eb5c102dd39e72805f09da6b969b5ef704a9a94076ea77c72db5ed0f72bcf986279b86633cef4674dca2eb50e17dbabdf10514733a0491349ca0e0e55e6c3c059414f4cb5cfdca469634564fc1e38b91b32cf8bd7f80bc2d9f57d01e0df169c8db334680100273faa82929df4bd4cc07e6786208b7d0d5e3fdf55de26005b9dc8173a7f057c0d427c"}, @handle=@pci={{0x8}, {0x11}}, @handle=@pci={{0x8}, {0x11}}, @handle=@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @handle=@pci={{0x8}, {0x11}}, @DEVLINK_ATTR_PORT_INDEX={0x8, 0x3, 0x2}]}, 0x170}, 0x1, 0x0, 0x0, 0x24000041}, 0x0) fcntl$F_GET_RW_HINT(r0, 0x40b, &(0x7f0000000100)) ioctl$TCSETAW(r2, 0x5407, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "bb09819e2f6e8485"}) r3 = syz_open_dev$vcsu(&(0x7f0000000040), 0x80, 0x2000) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(0xffffffffffffffff, 0x80089419, &(0x7f00000000c0)) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r3, 0xc018937e, &(0x7f00000003c0)={{0x1, 0x1, 0x18, r0, @out_args}, './file0\x00'}) read$char_usb(r4, &(0x7f0000000400)=""/64, 0x40) 15:31:07 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x4b62, 0x0) 15:31:07 executing program 6: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1c08a4, 0x0) r1 = syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) open$dir(&(0x7f0000000200)='./mnt\x00', 0x40040, 0x10) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir/../file0\x00', 0x80, 0x0) r2 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x50008, 0x0, 0x10081, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r3 = openat(r1, &(0x7f0000000000)='mnt/encrypted_dir/../file0\x00', 0x40, 0x100) r4 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r4, 0x7, 0x0, 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r4, 0xc0406619, &(0x7f00000001c0)={@desc={0x1, 0x0, @desc2}}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000140)=',,\\\x00') futimesat(r3, &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0)={{0x0, 0xea60}}) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000680)=ANY=[@ANYBLOB="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", @ANYRES32, @ANYBLOB="02000000000000006d6e742f656e637279707465645f6469722f2e2e2f66696c653000"]) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') 15:31:07 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000080), 0x40a302, 0x0) ioctl$KDGKBDIACR(r1, 0x4b4a, &(0x7f00000000c0)=""/122) ioctl$KDGKBDIACR(r0, 0x4b4a, &(0x7f0000000180)=""/240) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCSARP(r2, 0x8955, &(0x7f0000000000)={{0x2, 0x0, @local}, {0x0, @local}, 0x20, {0x2, 0x0, @local}, 'dummy0\x00'}) ioctl$BTRFS_IOC_BALANCE_V2(r0, 0xc4009420, &(0x7f0000000280)={0x19, 0x3, {0x1f, @usage=0x3f, 0x0, 0xd7, 0x7, 0x0, 0x9, 0x1, 0x48, @struct={0x4, 0x80000001}, 0x5, 0x400, [0x3, 0x3, 0x80000000, 0x100000000, 0x10000, 0xffffffffffffffe1]}, {0x9, @struct={0x1000, 0x8}, 0x0, 0x20, 0x7, 0x2, 0xd19b, 0x2, 0x40, @usage=0x8, 0xfff, 0x1, [0x3ff, 0x5, 0x5, 0x878, 0x1, 0x3]}, {0x3, @usage=0xbf1a, 0x0, 0x6, 0x5, 0x81, 0x7, 0x7, 0x8, @usage=0x8, 0xab, 0x20, [0xfffffffffffffffa, 0x1d1053e1, 0x2, 0xd77, 0x4, 0x80]}, {0x100000001, 0xffffffff80000001, 0x2}}) ioctl$AUTOFS_IOC_READY(r2, 0x9360, 0x6) ioctl$BTRFS_IOC_RM_DEV_V2(r0, 0x5000943a, &(0x7f0000000680)={{r2}, 0x0, 0x6, @inherit={0x60, &(0x7f0000001680)=ANY=[@ANYBLOB="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"]}, @devid=r3}) 15:31:07 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x540a, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x200000, 0x0) ioctl$KDFONTOP_SET(r1, 0x4b72, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x8, 0x1f5, &(0x7f0000000040)="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"}) 15:31:07 executing program 5: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, 0x0) mount$9p_tcp(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x4020, &(0x7f0000003300)) (fail_nth: 5) 15:31:07 executing program 4: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1c08a4, 0x0) r1 = syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) open$dir(&(0x7f0000000200)='./mnt\x00', 0x40040, 0x10) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir/../file0\x00', 0x80, 0x0) r2 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x50008, 0x0, 0x10081, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r3 = openat(r1, &(0x7f0000000000)='mnt/encrypted_dir/../file0\x00', 0x40, 0x100) r4 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r4, 0x7, 0x0, 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r4, 0xc0406619, &(0x7f00000001c0)={@desc={0x1, 0x0, @desc2}}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000140)=',,\\\x00') futimesat(r3, &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0)={{0x0, 0xea60}}) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000680)=ANY=[@ANYBLOB="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", @ANYRES32, @ANYBLOB="02000000000000006d6e742f656e637279707465645f6469722f2e2e2f66696c653000"]) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') [ 1549.489943] FAULT_INJECTION: forcing a failure. [ 1549.489943] name failslab, interval 1, probability 0, space 0, times 0 [ 1549.492931] CPU: 0 PID: 9701 Comm: syz-executor.5 Not tainted 5.10.250 #1 [ 1549.494661] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1549.496745] Call Trace: [ 1549.497415] dump_stack+0x107/0x167 [ 1549.498343] should_fail.cold+0x5/0xa [ 1549.499305] ? create_object.isra.0+0x3a/0xa30 [ 1549.500450] should_failslab+0x5/0x20 [ 1549.501414] kmem_cache_alloc+0x5b/0x310 [ 1549.502454] create_object.isra.0+0x3a/0xa30 [ 1549.503541] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1549.504808] kmem_cache_alloc+0x159/0x310 [ 1549.505853] getname_flags.part.0+0x50/0x4f0 [ 1549.506946] ? _copy_from_user+0xfb/0x1b0 [ 1549.507978] user_path_at_empty+0xa1/0x100 [ 1549.509033] __x64_sys_mount+0x1e9/0x300 [ 1549.510051] ? copy_mnt_ns+0xa00/0xa00 [ 1549.511029] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1549.512333] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1549.513624] do_syscall_64+0x33/0x40 [ 1549.514554] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1549.515825] RIP: 0033:0x7f95ced63b19 [ 1549.516748] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1549.521309] RSP: 002b:00007f95cc2d9188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1549.523190] RAX: ffffffffffffffda RBX: 00007f95cee76f60 RCX: 00007f95ced63b19 [ 1549.524943] RDX: 0000000000000000 RSI: 0000000020000100 RDI: 0000000000000000 [ 1549.526705] RBP: 00007f95cc2d91d0 R08: 0000000020003300 R09: 0000000000000000 [ 1549.528457] R10: 0000000000004020 R11: 0000000000000246 R12: 0000000000000001 [ 1549.530219] R13: 00007ffde6ceea9f R14: 00007f95cc2d9300 R15: 0000000000022000 [ 1549.564405] proc: Unknown parameter 'trans' 15:31:20 executing program 7: ioctl$TIOCL_SCROLLCONSOLE(0xffffffffffffffff, 0x541c, &(0x7f0000000040)={0xd, 0x9c}) r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r0, 0x7, 0x0, 0x0, 0x0) ioctl$TIOCNXCL(r0, 0x540d) ioctl$TCSBRKP(0xffffffffffffffff, 0x5425, 0x994a) 15:31:20 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r1, 0x7, 0x0, 0x0, 0x0) ioctl$PIO_SCRNMAP(r1, 0x4b41, &(0x7f0000000000)) ioctl$TCSETAW(r0, 0x540a, 0x0) 15:31:20 executing program 5: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, 0x0) mount$9p_tcp(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x4020, &(0x7f0000003300)) (fail_nth: 6) 15:31:20 executing program 6: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r1, 0x7, 0x0, 0x0, 0x0) ioctl$VT_RESIZE(r1, 0x5609, &(0x7f0000000100)={0x3b4f, 0x546, 0xfff}) ioctl$TCSETAW(r0, 0x540a, 0x0) ioctl$PIO_UNIMAP(r0, 0x4b67, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x2, 0x1}]}) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000001c0), 0xc02, 0x0) ioctl$TIOCL_SETSEL(r2, 0x541c, &(0x7f0000000200)={0x2, {0x2, 0x8, 0x9, 0x0, 0x7, 0x1}}) ioctl$AUTOFS_DEV_IOCTL_READY(r1, 0xc0189376, &(0x7f00000002c0)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r1, @ANYBLOB="07000000000000002e2f662323916a546e99d72ad154fee78f1a6f4a40559e61d2bcf1a310699a81f095d5dbf2d10fa60342824999c8971e8a2621e465f707148b2e6197384505d1ee85c879ade8711349d400ae5177593803867d04788035f17e45b842791dfeeeec5b777260bf102ee114eb04a9c0b20be1bda7fd0c6c0ac1f9d66729feac94ac25ec542e07f097f41821e24a30c9092a236fe1241585dda9e9f01e113e6c3390469bd8415afffa03e8234b9e84e61b96c960e0ccac7c974452e140b7d19db335145dc06ba9822868c8efdd2a2f14355c21f01bed54232f9f44cc51386a41c232cb36d8"]) r3 = ioctl$TIOCGPTPEER(r1, 0x5441, 0x5) ioctl$TIOCL_SETSEL(r3, 0x541c, &(0x7f0000000180)={0x2, {0x2, 0x800, 0xed, 0xfff, 0x5, 0x10}}) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000080)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) ioctl$TIOCMBIS(r4, 0x5416, &(0x7f00000000c0)=0x2) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r4, 0x400c6615, &(0x7f0000000280)={0x0, @aes256, 0x0, @desc4}) 15:31:20 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x4b63, 0x0) 15:31:20 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDGKBDIACR(r0, 0x4b4a, &(0x7f0000000180)=""/240) ioctl$TIOCGRS485(r0, 0x542e, &(0x7f0000000000)) 15:31:20 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x5407, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "bb09819e2f6e8485"}) syz_open_dev$ttys(0xc, 0x2, 0x1) ioctl$GIO_CMAP(r0, 0x4b70, &(0x7f0000000000)) 15:31:20 executing program 4: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1c08a4, 0x0) r1 = syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) open$dir(&(0x7f0000000200)='./mnt\x00', 0x40040, 0x10) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir/../file0\x00', 0x80, 0x0) r2 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x50008, 0x0, 0x10081, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r3 = openat(r1, &(0x7f0000000000)='mnt/encrypted_dir/../file0\x00', 0x40, 0x100) r4 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r4, 0x7, 0x0, 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r4, 0xc0406619, &(0x7f00000001c0)={@desc={0x1, 0x0, @desc2}}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000140)=',,\\\x00') futimesat(r3, &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0)={{0x0, 0xea60}}) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000680)=ANY=[@ANYBLOB="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", @ANYRES32, @ANYBLOB="02000000000000006d6e742f656e637279707465645f6469722f2e2e2f66696c653000"]) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') 15:31:20 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCSSOFTCAR(r0, 0x541a, &(0x7f00000000c0)=0x10001) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {0x7af49595}}, './file0\x00'}) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r1, 0x7, 0x0, 0x0, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x2000000, 0x20010, 0xffffffffffffffff, 0x10000000) ioctl$TIOCGISO7816(r1, 0x80285442, &(0x7f0000000040)) ioctl$TCSETAW(r0, 0x5407, &(0x7f0000000080)={0x8, 0x0, 0x2, 0x0, 0x0, "bb09819e2f6e8485"}) [ 1562.888302] FAULT_INJECTION: forcing a failure. [ 1562.888302] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1562.890982] CPU: 0 PID: 9732 Comm: syz-executor.5 Not tainted 5.10.250 #1 [ 1562.892527] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1562.894400] Call Trace: [ 1562.894995] dump_stack+0x107/0x167 [ 1562.895818] should_fail.cold+0x5/0xa [ 1562.896684] strncpy_from_user+0x34/0x470 [ 1562.897623] getname_flags.part.0+0x95/0x4f0 [ 1562.898620] ? _copy_from_user+0xfb/0x1b0 [ 1562.899557] user_path_at_empty+0xa1/0x100 [ 1562.900508] __x64_sys_mount+0x1e9/0x300 [ 1562.901421] ? copy_mnt_ns+0xa00/0xa00 [ 1562.902311] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1562.903493] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1562.904658] do_syscall_64+0x33/0x40 [ 1562.905496] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1562.906659] RIP: 0033:0x7f95ced63b19 [ 1562.907494] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1562.911643] RSP: 002b:00007f95cc2d9188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1562.913356] RAX: ffffffffffffffda RBX: 00007f95cee76f60 RCX: 00007f95ced63b19 [ 1562.915126] RDX: 0000000000000000 RSI: 0000000020000100 RDI: 0000000000000000 [ 1562.917187] RBP: 00007f95cc2d91d0 R08: 0000000020003300 R09: 0000000000000000 [ 1562.919262] R10: 0000000000004020 R11: 0000000000000246 R12: 0000000000000001 [ 1562.921329] R13: 00007ffde6ceea9f R14: 00007f95cc2d9300 R15: 0000000000022000 15:31:20 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) dup2(r3, r2) pidfd_open(0x0, 0x0) bind$bt_l2cap(r1, &(0x7f0000000080), 0xe) ioctl$TCSETAW(r0, 0x5407, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "bb09819e2f6e8485"}) 15:31:20 executing program 4: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1c08a4, 0x0) r1 = syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) open$dir(&(0x7f0000000200)='./mnt\x00', 0x40040, 0x10) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir/../file0\x00', 0x80, 0x0) r2 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x50008, 0x0, 0x10081, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r3 = openat(r1, &(0x7f0000000000)='mnt/encrypted_dir/../file0\x00', 0x40, 0x100) r4 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r4, 0x7, 0x0, 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r4, 0xc0406619, &(0x7f00000001c0)={@desc={0x1, 0x0, @desc2}}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000140)=',,\\\x00') futimesat(r3, &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0)={{0x0, 0xea60}}) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000680)=ANY=[@ANYBLOB="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", @ANYRES32, @ANYBLOB="02000000000000006d6e742f656e637279707465645f6469722f2e2e2f66696c653000"]) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') 15:31:20 executing program 1: sendmsg$NL80211_CMD_SET_MULTICAST_TO_UNICAST(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000740)={&(0x7f0000000700)={0x20, 0x0, 0x20, 0x70bd26, 0x25dfdbfd, {{}, {@void, @val={0xc, 0x99, {0x1, 0x26}}}}}, 0x20}, 0x1, 0x0, 0x0, 0x4008000}, 0x8000) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDGKBDIACR(r0, 0x4b4a, &(0x7f0000000180)=""/240) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r1, 0x7, 0x0, 0x0, 0x0) ioctl$PIO_UNIMAP(r1, 0x4b67, &(0x7f0000000040)={0x7, &(0x7f0000000000)=[{0x2, 0x3}, {0x6, 0x5}, {0x9, 0x40}, {0x400, 0x3f}, {0xe1, 0x6b}, {0x7ff, 0x81}, {0x200, 0xfbff}]}) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x40001, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) dup2(r3, r2) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f00000002c0), r1) sendmsg$NL80211_CMD_SET_REKEY_OFFLOAD(r3, &(0x7f0000000400)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x90, r4, 0x800, 0x70bd26, 0x25dfdbfc, {{}, {@void, @val={0xc, 0x99, {0x7, 0x47}}}}, [@NL80211_ATTR_REKEY_DATA={0x70, 0x7a, 0x0, 0x1, [@NL80211_REKEY_DATA_KCK={0x1c, 0x2, @kck_ext="11f8cfbdf3b310791bd60c046d3e383da7792a659bb3e477"}, @NL80211_REKEY_DATA_KEK={0x14, 0x1, @kek="3cf5f5f83526ae79ad51ef19f026adc4"}, @NL80211_REKEY_DATA_KCK={0x14, 0x2, @kck="0b9d53192f4ba57d1200c7254a67a94e"}, @NL80211_REKEY_DATA_REPLAY_CTR={0xc, 0x3, "d8cdd8374b1258ef"}, @NL80211_REKEY_DATA_KCK={0x1c, 0x2, @kck_ext="d743d421f2d9ad785e0492ec1858955858b9aac7691335ed"}]}]}, 0x90}, 0x1, 0x0, 0x0, 0x200080c1}, 0x1) ioctl$KDSETMODE(r0, 0x4b3a, 0x1) r5 = eventfd2(0x1, 0x80801) ioctl$INCFS_IOC_CREATE_FILE(r5, 0xc058671e, &(0x7f0000000100)={{}, {0x3}, 0x20, 0x0, 0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f00000007c0)="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", 0x1e6, 0x0, &(0x7f0000000480)={0x2, 0x174, {0x0, 0xc, 0x76, "78f539456a5858461fdeb0a61deb2cad9b548ea94986572d33fdee70ede6174fbfa7b339826f3698d14c38eef72377308cd04ac9f286bf0eb6507cc48be441ce9a1ef0791cb0d0b117ac0c1ceeec355d48d323764975b91d63d3a6768fdffbac45f01d3106cce03a43286b83ac792f53560d82d3029a", 0xf1, "5f9c51b0d1b885532ab701afec8c5e927f07908382724d57c7d28c45ecb873dec786218283d4554aebae8f19e62b0683393dd7a7a24c9d266e3e130214df4583075a92b3603d46f4cf5b3cb1384ee5d54eff8f6ec8c60b136e2f73a1936a4e370d7f25bb29984fc24939a9f1c84877075b5a02ed098fd5355dd197c3deda1b0f73b0e47534210b9f0d46a85232e94663ecad879b4b0f02d7ab76dd4f5a6305986407f2e6e48721ba2a7640c4be0f7454ff1253b92bcc4009283c39b4320e82ba448cf706a0649dcccd73d7c875f1b1e46d7857e16dd46140d9448c63b1dfe326e77502a0f1ddbfb013f08308591051c189"}, 0x96, "cb6b084a0b0923302b51f770ee92abfb0764d30995c7f9e8fb962f808f5988b2a41dd185dc32b376dfe2aa389da2a129ef756134beb638ec341b4e9f29f76ae34d84906a5627da23ca82c746ae2be03e3abf7ebf3063b5f397679a444d2f660dbf41f3bd144cd1c381374ecb50ff86f17e3f874d739edd6476b48e5f12ad8d9c21425b3c9c4d51464d163036307ab7d8b305d076ee5f"}, 0x216}) 15:31:20 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x540a, 0x0) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000140)={{0x1, 0x1, 0x18, r0, {0x490}}, './file0\x00'}) r2 = openat(r1, 0x0, 0x101480, 0x40) fsconfig$FSCONFIG_CMD_RECONFIGURE(r2, 0x7, 0x0, 0x0, 0x0) r3 = signalfd4(r0, &(0x7f0000000000)={[0x8000]}, 0x8, 0x800) ioctl$TCSETSF(r3, 0x5404, &(0x7f0000000040)={0x8, 0xb, 0xc8f42a4, 0xf4, 0xb, "9f401247faed5344eb430200"}) r4 = openat$random(0xffffffffffffff9c, &(0x7f0000000080), 0x40200, 0x0) ioctl$TCGETA(0xffffffffffffffff, 0x5405, &(0x7f0000000100)) syz_io_uring_submit(0x0, 0x0, &(0x7f00000000c0)=@IORING_OP_TEE={0x21, 0x3, 0x0, @fd_index=0x5, 0x0, 0x0, 0x800, 0x1, 0x1, {0x0, 0x0, r4}}, 0x800) 15:31:20 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x4b64, 0x0) 15:31:20 executing program 5: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, 0x0) mount$9p_tcp(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x4020, &(0x7f0000003300)) (fail_nth: 7) 15:31:20 executing program 6: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDGKBMODE(r0, 0x4b44, &(0x7f0000000000)) (fail_nth: 1) 15:31:20 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x540a, 0x0) ioctl$BTRFS_IOC_GET_SUPPORTED_FEATURES(r0, 0x80489439, &(0x7f0000000040)) ioctl$TIOCL_SETSEL(0xffffffffffffffff, 0x541c, &(0x7f0000000000)={0x2, {0x2, 0x10d6, 0x7f, 0x7, 0xfffb, 0x3}}) [ 1563.126622] FAULT_INJECTION: forcing a failure. [ 1563.126622] name failslab, interval 1, probability 0, space 0, times 0 [ 1563.129413] CPU: 0 PID: 9850 Comm: syz-executor.5 Not tainted 5.10.250 #1 [ 1563.131427] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1563.133505] Call Trace: [ 1563.134145] dump_stack+0x107/0x167 [ 1563.135149] should_fail.cold+0x5/0xa [ 1563.136052] ? alloc_fs_context+0x58/0x870 [ 1563.137011] should_failslab+0x5/0x20 [ 1563.137883] kmem_cache_alloc_trace+0x55/0x320 [ 1563.138902] ? cap_capable+0x1cd/0x230 [ 1563.139776] alloc_fs_context+0x58/0x870 [ 1563.140686] path_mount+0x96b/0x2200 [ 1563.141520] ? strncpy_from_user+0x9e/0x470 [ 1563.142496] ? finish_automount+0xa90/0xa90 [ 1563.143456] ? getname_flags.part.0+0x1dd/0x4f0 [ 1563.144496] ? _copy_from_user+0xfb/0x1b0 [ 1563.145426] __x64_sys_mount+0x282/0x300 [ 1563.146340] ? copy_mnt_ns+0xa00/0xa00 [ 1563.147225] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1563.148404] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1563.149566] do_syscall_64+0x33/0x40 [ 1563.150405] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1563.151547] RIP: 0033:0x7f95ced63b19 [ 1563.152374] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1563.156478] RSP: 002b:00007f95cc2d9188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1563.158182] RAX: ffffffffffffffda RBX: 00007f95cee76f60 RCX: 00007f95ced63b19 [ 1563.159784] RDX: 0000000000000000 RSI: 0000000020000100 RDI: 0000000000000000 [ 1563.161381] RBP: 00007f95cc2d91d0 R08: 0000000020003300 R09: 0000000000000000 [ 1563.162984] R10: 0000000000004020 R11: 0000000000000246 R12: 0000000000000001 [ 1563.164575] R13: 00007ffde6ceea9f R14: 00007f95cc2d9300 R15: 0000000000022000 [ 1563.192558] FAULT_INJECTION: forcing a failure. [ 1563.192558] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 1563.196298] CPU: 0 PID: 9852 Comm: syz-executor.6 Not tainted 5.10.250 #1 15:31:20 executing program 1: r0 = openat$incfs(0xffffffffffffffff, &(0x7f0000000000)='.pending_reads\x00', 0x105002, 0x80) ioctl$CDROMPLAYTRKIND(r0, 0x5304, &(0x7f0000000040)={0x6, 0x2, 0x2, 0xc1}) r1 = pidfd_getfd(0xffffffffffffffff, r0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f00000000c0)={0x0, r1, 0x7f, 0x3, 0x4}) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) r3 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r3, 0x7, 0x0, 0x0, 0x0) ioctl$TIOCL_SETSEL(r3, 0x541c, &(0x7f0000000080)={0x2, {0x2, 0x3, 0x3ff, 0xffff, 0x1000}}) ioctl$KDGKBDIACR(r2, 0x4b4a, &(0x7f0000000180)=""/240) [ 1563.198264] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1563.200694] Call Trace: [ 1563.201376] dump_stack+0x107/0x167 [ 1563.202462] should_fail.cold+0x5/0xa [ 1563.203567] __alloc_pages_nodemask+0x182/0x600 [ 1563.204891] ? __alloc_pages_slowpath.constprop.0+0x2310/0x2310 [ 1563.206544] ? add_mm_counter_fast+0x220/0x220 [ 1563.207797] ? count_memcg_event_mm.part.0+0x10f/0x2f0 [ 1563.209317] alloc_pages_current+0x187/0x280 [ 1563.210615] __pmd_alloc+0x37/0x630 [ 1563.211600] handle_mm_fault+0x1ac4/0x3500 [ 1563.212648] ? __lock_acquire+0x1657/0x5b00 [ 1563.213700] ? __pmd_alloc+0x630/0x630 [ 1563.214777] ? vmacache_find+0x55/0x2a0 [ 1563.215723] ? vmacache_update+0xce/0x140 [ 1563.216696] do_user_addr_fault+0x56e/0xc60 [ 1563.217745] exc_page_fault+0xa2/0x1a0 [ 1563.218661] asm_exc_page_fault+0x1e/0x30 [ 1563.219627] RIP: 0010:__put_user_nocheck_4+0x3/0x11 [ 1563.220763] Code: 00 00 48 39 d9 73 54 0f 01 cb 66 89 01 31 c9 0f 01 ca e9 91 66 1c 02 90 48 bb fd ef ff ff ff 7f 00 00 48 39 d9 73 34 0f 01 cb <89> 01 31 c9 0f 01 ca e9 72 66 1c 02 66 90 48 bb f9 ef ff ff ff 7f [ 1563.225474] RSP: 0018:ffff888019467b98 EFLAGS: 00050297 [ 1563.226820] RAX: 0000000000000000 RBX: 00007fffffffeffd RCX: 0000000020000000 [ 1563.228420] RDX: 0000000000040000 RSI: ffffffff822ad210 RDI: ffffffff84648724 [ 1563.230026] RBP: ffff888043438000 R08: 0000000000000000 R09: 0000000000000000 [ 1563.231622] R10: 0000000000000003 R11: 0000000000000001 R12: 0000000020000000 [ 1563.233214] R13: 0000000000000001 R14: 0000000000004b44 R15: 0000000000004b44 [ 1563.234824] ? vt_do_kdgkbmode+0xd0/0x100 [ 1563.235754] vt_ioctl+0x4bc/0x2c90 [ 1563.236552] ? vt_waitactive+0x3a0/0x3a0 [ 1563.237494] ? __lock_acquire+0xbb1/0x5b00 [ 1563.238463] ? find_held_lock+0x2c/0x110 [ 1563.239371] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1563.240547] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 1563.241695] ? vt_waitactive+0x3a0/0x3a0 [ 1563.242613] tty_ioctl+0x862/0x18b0 [ 1563.243424] ? tty_fasync+0x390/0x390 [ 1563.244274] ? ioctl_has_perm.constprop.0.isra.0+0x29a/0x410 [ 1563.245559] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 1563.246719] ? do_vfs_ioctl+0x283/0x10d0 [ 1563.247629] ? selinux_bprm_creds_for_exec+0xb60/0xb60 [ 1563.248798] ? generic_block_fiemap+0x60/0x60 [ 1563.249808] ? lock_downgrade+0x6d0/0x6d0 [ 1563.250731] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1563.251816] ? wait_for_completion_io+0x270/0x270 [ 1563.252912] ? selinux_file_ioctl+0xb6/0x270 [ 1563.253911] ? tty_fasync+0x390/0x390 [ 1563.254764] __x64_sys_ioctl+0x19a/0x210 [ 1563.255683] do_syscall_64+0x33/0x40 [ 1563.256516] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1563.257664] RIP: 0033:0x7f4fcc18db19 [ 1563.258514] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1563.262644] RSP: 002b:00007f4fc9703188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1563.264351] RAX: ffffffffffffffda RBX: 00007f4fcc2a0f60 RCX: 00007f4fcc18db19 [ 1563.265961] RDX: 0000000020000000 RSI: 0000000000004b44 RDI: 0000000000000003 [ 1563.267557] RBP: 00007f4fc97031d0 R08: 0000000000000000 R09: 0000000000000000 [ 1563.269158] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1563.270765] R13: 00007ffdf8625b7f R14: 00007f4fc9703300 R15: 0000000000022000 15:31:34 executing program 6: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDGKBMODE(r0, 0x4b44, &(0x7f0000000000)) (fail_nth: 2) 15:31:34 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x400000, 0x0) ioctl$TIOCSSOFTCAR(r1, 0x541a, &(0x7f0000000040)=0x1f) ioctl$KDGKBDIACR(r0, 0x4b4a, &(0x7f0000000180)=""/240) 15:31:34 executing program 7: ioctl$TIOCSTI(0xffffffffffffffff, 0x5412, &(0x7f0000000040)=0x3) r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r1, 0x7, 0x0, 0x0, 0x0) r2 = epoll_create(0x3a) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCSARP(r3, 0x8955, &(0x7f0000000000)={{0x2, 0x0, @local}, {0x0, @local}, 0x20, {0x2, 0x0, @local}, 'dummy0\x00'}) r4 = syz_open_dev$vcsn(&(0x7f0000000240), 0x3, 0x800c2) r5 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCSARP(r5, 0x8955, &(0x7f0000000000)={{0x2, 0x0, @local}, {0x0, @local}, 0x20, {0x2, 0x0, @local}, 'dummy0\x00'}) r6 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCSARP(r6, 0x8955, &(0x7f0000000000)={{0x2, 0x0, @local}, {0x0, @local}, 0x20, {0x2, 0x0, @local}, 'dummy0\x00'}) r7 = openat$full(0xffffffffffffff9c, &(0x7f0000000180), 0x410300, 0x0) r8 = socket$nl_generic(0x10, 0x3, 0x10) r9 = getpid() fcntl$setownex(r8, 0xf, &(0x7f0000000140)={0x2, r9}) ioctl$TIOCGSID(r4, 0x5429, &(0x7f0000000100)) stat(&(0x7f0000002800)='./file0\x00', &(0x7f0000002840)={0x0, 0x0, 0x0, 0x0, 0x0}) sendmmsg$unix(r1, &(0x7f0000002780)=[{{&(0x7f0000000080)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000100), 0x0, &(0x7f0000000480)=ANY=[@ANYRESDEC, @ANYRES32, @ANYRES32, @ANYRESHEX=r10, @ANYRES32=r0, @ANYRES32=r0, @ANYBLOB="0000000024000000000000000100000001000000", @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r2, @ANYRES32=r0, @ANYBLOB="000000001c000000000000000100000001000000", @ANYRES32=r3, @ANYRES32=r4, @ANYRESDEC, @ANYBLOB="000000001c000000e13b00000100000002000000", @ANYRES32=0x0, @ANYRES32=r10, @ANYRES32=r10, @ANYBLOB="0000000014000000000000000100000001000000", @ANYRES32=r0, @ANYBLOB='\x00\x00\x00\x00'], 0xa8, 0x20008000}}, {{&(0x7f0000000280)=@abs={0x0, 0x0, 0x4e20}, 0x6e, &(0x7f00000026c0), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYRES32=0xee01, @ANYBLOB="000068d4fdec00a0cd9e7ea9da4721c0000020000000000000d2f84b84696a1c79", @ANYRES32, @ANYRES32=r1, @ANYRES32=r7, @ANYRES32=r5], 0x40, 0x4000010}}], 0x2, 0x41) ioctl$TCSBRKP(r0, 0x5425, 0x994a) [ 1576.872817] FAULT_INJECTION: forcing a failure. [ 1576.872817] name failslab, interval 1, probability 0, space 0, times 0 [ 1576.875336] CPU: 0 PID: 9869 Comm: syz-executor.6 Not tainted 5.10.250 #1 [ 1576.876773] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1576.878513] Call Trace: [ 1576.879067] dump_stack+0x107/0x167 [ 1576.879826] should_fail.cold+0x5/0xa [ 1576.880625] ? __pmd_alloc+0x94/0x630 [ 1576.881422] should_failslab+0x5/0x20 [ 1576.882239] kmem_cache_alloc+0x5b/0x310 [ 1576.883097] __pmd_alloc+0x94/0x630 [ 1576.883863] handle_mm_fault+0x1ac4/0x3500 [ 1576.884748] ? __lock_acquire+0x1657/0x5b00 [ 1576.885653] ? __pmd_alloc+0x630/0x630 [ 1576.886490] ? vmacache_find+0x55/0x2a0 [ 1576.887321] ? vmacache_update+0xce/0x140 [ 1576.888193] do_user_addr_fault+0x56e/0xc60 [ 1576.889109] exc_page_fault+0xa2/0x1a0 [ 1576.889948] asm_exc_page_fault+0x1e/0x30 [ 1576.890881] RIP: 0010:__put_user_nocheck_4+0x3/0x11 [ 1576.891945] Code: 00 00 48 39 d9 73 54 0f 01 cb 66 89 01 31 c9 0f 01 ca e9 91 66 1c 02 90 48 bb fd ef ff ff ff 7f 00 00 48 39 d9 73 34 0f 01 cb <89> 01 31 c9 0f 01 ca e9 72 66 1c 02 66 90 48 bb f9 ef ff ff ff 7f [ 1576.895819] RSP: 0018:ffff888046b97b98 EFLAGS: 00050297 [ 1576.896942] RAX: 0000000000000000 RBX: 00007fffffffeffd RCX: 0000000020000000 [ 1576.898450] RDX: 0000000000040000 RSI: ffffffff822ad210 RDI: ffffffff84648724 [ 1576.899955] RBP: ffff888043438000 R08: 0000000000000000 R09: 0000000000000000 [ 1576.901448] R10: 0000000000000003 R11: 0000000000000001 R12: 0000000020000000 [ 1576.902952] R13: 0000000000000001 R14: 0000000000004b44 R15: 0000000000004b44 [ 1576.904469] ? vt_do_kdgkbmode+0xd0/0x100 [ 1576.905334] vt_ioctl+0x4bc/0x2c90 [ 1576.906093] ? vt_waitactive+0x3a0/0x3a0 [ 1576.906949] ? __lock_acquire+0xbb1/0x5b00 [ 1576.907844] ? find_held_lock+0x2c/0x110 [ 1576.908696] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1576.909790] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 1576.910898] ? vt_waitactive+0x3a0/0x3a0 [ 1576.911754] tty_ioctl+0x862/0x18b0 [ 1576.912518] ? tty_fasync+0x390/0x390 [ 1576.913314] ? ioctl_has_perm.constprop.0.isra.0+0x29a/0x410 [ 1576.914522] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 1576.915599] ? do_vfs_ioctl+0x283/0x10d0 [ 1576.916448] ? selinux_bprm_creds_for_exec+0xb60/0xb60 [ 1576.917546] ? generic_block_fiemap+0x60/0x60 [ 1576.918489] ? lock_downgrade+0x6d0/0x6d0 [ 1576.919354] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1576.920361] ? wait_for_completion_io+0x270/0x270 [ 1576.921379] ? selinux_file_ioctl+0xb6/0x270 [ 1576.922329] ? tty_fasync+0x390/0x390 [ 1576.923128] __x64_sys_ioctl+0x19a/0x210 [ 1576.923981] do_syscall_64+0x33/0x40 [ 1576.924765] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1576.925829] RIP: 0033:0x7f4fcc18db19 [ 1576.926613] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1576.930011] FAULT_INJECTION: forcing a failure. [ 1576.930011] name failslab, interval 1, probability 0, space 0, times 0 [ 1576.930473] RSP: 002b:00007f4fc9703188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1576.934463] RAX: ffffffffffffffda RBX: 00007f4fcc2a0f60 RCX: 00007f4fcc18db19 [ 1576.935956] RDX: 0000000020000000 RSI: 0000000000004b44 RDI: 0000000000000003 [ 1576.937450] RBP: 00007f4fc97031d0 R08: 0000000000000000 R09: 0000000000000000 [ 1576.938949] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1576.940446] R13: 00007ffdf8625b7f R14: 00007f4fc9703300 R15: 0000000000022000 [ 1576.941986] CPU: 1 PID: 9876 Comm: syz-executor.5 Not tainted 5.10.250 #1 [ 1576.943440] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1576.945186] Call Trace: [ 1576.945745] dump_stack+0x107/0x167 [ 1576.946527] should_fail.cold+0x5/0xa [ 1576.947325] ? create_object.isra.0+0x3a/0xa30 [ 1576.948284] should_failslab+0x5/0x20 [ 1576.949086] kmem_cache_alloc+0x5b/0x310 [ 1576.949957] create_object.isra.0+0x3a/0xa30 [ 1576.950875] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1576.951946] kmem_cache_alloc_trace+0x151/0x320 [ 1576.952918] ? cap_capable+0x1cd/0x230 [ 1576.953741] alloc_fs_context+0x58/0x870 [ 1576.954612] path_mount+0x96b/0x2200 [ 1576.955398] ? strncpy_from_user+0x9e/0x470 [ 1576.956307] ? finish_automount+0xa90/0xa90 [ 1576.957206] ? getname_flags.part.0+0x1dd/0x4f0 [ 1576.958191] ? _copy_from_user+0xfb/0x1b0 [ 1576.959069] __x64_sys_mount+0x282/0x300 15:31:34 executing program 4: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1c08a4, 0x0) r1 = syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) open$dir(&(0x7f0000000200)='./mnt\x00', 0x40040, 0x10) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir/../file0\x00', 0x80, 0x0) r2 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x50008, 0x0, 0x10081, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r3 = openat(r1, &(0x7f0000000000)='mnt/encrypted_dir/../file0\x00', 0x40, 0x100) r4 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r4, 0x7, 0x0, 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r4, 0xc0406619, &(0x7f00000001c0)={@desc={0x1, 0x0, @desc2}}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000140)=',,\\\x00') futimesat(r3, &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0)={{0x0, 0xea60}}) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000680)=ANY=[@ANYBLOB="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", @ANYRES32, @ANYBLOB="02000000000000006d6e742f656e637279707465645f6469722f2e2e2f66696c653000"]) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') 15:31:34 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = openat(0xffffffffffffffff, 0x0, 0xc00, 0x2) fsconfig$FSCONFIG_CMD_RECONFIGURE(r1, 0x7, 0x0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='pids.current\x00', 0x0, 0x0) fsconfig$FSCONFIG_SET_STRING(r3, 0x1, &(0x7f0000000100)='-/-\x00', &(0x7f0000000140)='\x00', 0x0) ioctl$sock_inet_SIOCSARP(r3, 0x8955, &(0x7f0000000000)={{0x2, 0x0, @local}, {0x0, @remote}, 0x0, {0x2, 0x0, @local}, 'batadv_slave_0\x00'}) lseek(r2, 0x4, 0x4) ioctl$TIOCSPTLCK(r0, 0x40045431, &(0x7f0000000180)=0x1) r4 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r4, 0x7, 0x0, 0x0, 0x0) ioctl$TIOCL_SETSEL(r4, 0x541c, &(0x7f0000000000)={0x2, {0x2, 0x4, 0x85, 0x8001, 0x1}}) r5 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f00000001c0), 0x2, 0x0) r6 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCSARP(r6, 0x8955, &(0x7f0000000000)={{0x2, 0x0, @local}, {0x0, @local}, 0x20, {0x2, 0x0, @local}, 'dummy0\x00'}) r7 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r7, 0x7, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r7, 0x1, r3, &(0x7f0000000240)={0x4}) copy_file_range(r5, &(0x7f0000000200)=0x8, r6, 0x0, 0x401, 0x0) ioctl$TCSETAW(r0, 0x5407, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "bb09819e2f6e8485"}) 15:31:34 executing program 5: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, 0x0) mount$9p_tcp(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x4020, &(0x7f0000003300)) (fail_nth: 8) 15:31:34 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) openat$hpet(0xffffffffffffff9c, &(0x7f0000000000), 0xb0000, 0x0) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r1, 0x7, 0x0, 0x0, 0x0) r2 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r2, 0x7, 0x0, 0x0, 0x0) r3 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r3, 0x7, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r1, 0xc0189378, &(0x7f0000000040)={{0x1, 0x1, 0x18, r2, {r0}}, './file0\x00'}) r4 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000080), 0x200, 0x0) ioctl$TCSETAW(r4, 0x540a, 0x0) 15:31:34 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x4b65, 0x0) [ 1576.960106] ? copy_mnt_ns+0xa00/0xa00 [ 1576.961088] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1576.962202] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1576.963293] do_syscall_64+0x33/0x40 [ 1576.964076] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1576.965145] RIP: 0033:0x7f95ced63b19 [ 1576.965920] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1576.969789] RSP: 002b:00007f95cc2d9188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1576.971389] RAX: ffffffffffffffda RBX: 00007f95cee76f60 RCX: 00007f95ced63b19 [ 1576.972882] RDX: 0000000000000000 RSI: 0000000020000100 RDI: 0000000000000000 [ 1576.974375] RBP: 00007f95cc2d91d0 R08: 0000000020003300 R09: 0000000000000000 [ 1576.975881] R10: 0000000000004020 R11: 0000000000000246 R12: 0000000000000001 [ 1576.977379] R13: 00007ffde6ceea9f R14: 00007f95cc2d9300 R15: 0000000000022000 15:31:34 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x4b66, 0x0) 15:31:34 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDGKBDIACR(r0, 0x4b4a, &(0x7f0000000180)=""/240) r1 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000), 0x80240, 0x0) fcntl$setpipe(r1, 0x407, 0xfffffffffffffff9) 15:31:34 executing program 4: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1c08a4, 0x0) r1 = syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) open$dir(&(0x7f0000000200)='./mnt\x00', 0x40040, 0x10) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir/../file0\x00', 0x80, 0x0) r2 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x50008, 0x0, 0x10081, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r3 = openat(r1, &(0x7f0000000000)='mnt/encrypted_dir/../file0\x00', 0x40, 0x100) r4 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r4, 0x7, 0x0, 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r4, 0xc0406619, &(0x7f00000001c0)={@desc={0x1, 0x0, @desc2}}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000140)=',,\\\x00') futimesat(r3, &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0)={{0x0, 0xea60}}) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000680)=ANY=[@ANYBLOB="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", @ANYRES32, @ANYBLOB="02000000000000006d6e742f656e637279707465645f6469722f2e2e2f66696c653000"]) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') 15:31:34 executing program 0: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0}, &(0x7f0000000140)=0xc) setreuid(r0, 0xee01) r1 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x14, 0x3b, 0x200, 0x70bd2d, 0x25dfdbfd, {0xf}}, 0x14}, 0x1, 0x0, 0x0, 0xc0}, 0x24000000) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r2, 0x5407, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "bb09819e2f6e8485"}) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x20000, 0x0) ioctl$PIO_UNIMAP(r3, 0x4b67, &(0x7f0000000100)={0x4, &(0x7f00000000c0)=[{0x3, 0x3}, {0xcb81, 0x7}, {0x1, 0xc427}, {0x7, 0x5}]}) [ 1577.067251] proc: Unknown parameter 'trans' 15:31:34 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x540a, 0x0) write(r0, &(0x7f0000002040)="8ae82643efe6e88c824f8cd9621453c4619eaf7c5c96495ffc15378485166f81724d101f032a9b7405c8c7f460789f074e0282748a5fa756ec37da80bdb85bd1908a297842a760c1579f32339032abd27e3125a678db16004008abc74c139d9ba65892eeeece0138688985d02acf77df74ba614c77023f0515a3a2a526c5cf15a19f81bb929bc753d0649d3922e1eaed003854d8a8c529f2d1e31289b5e97181db2e76c827569c2a08f73508dbeb43153abb966d61f8f95639f9db4ff1c072c35d812a07241bd3e82fbe0fffae2ad5ea10e836d8544b1c7cab58edbd5795495a41e13c32ed9957186045650ec7226d7619caae4052f12ff56ffc551be3ca2756f096938adf1e1796300c34b338517f861552db2b9a679b192145d9d2922572e11ba8b7e23148706261fb85f503c3f30049b8ae99a0315abe66908864d682c6cd11997898a2a41a370a8e35987717bb5789b1f0e7b8c15e7176713fc154f35cc58c20d2c27f86c4ce69419cd9aa5d7f39b97c86c6e3a50702db56af54c692ce0e3c752ed0187e90416bb54bd8ce482b3f3a656fe91216212b34652a4ccf5714d97bc05d95f16dde141d7888763ae3b4c8a27c1e6242eb5ece7ce4b96fcf2a073e0b2cf8940b764585d098a40fdb38c09f21f274d52241dfafc224dfac2a867ff3581a74a7d7e427a88f30403b4530f02be2dbf9c42c1ae4af2cebd6849bc0abc9eb446eab95b8c747af25f86f8b21758046e68cc916b59f779201990cf1cf852424c7034d7c032f708d11fcd8b0918cb165f1d07c6465315d7f7e6383a8222a2e08dbaff523fa91fb7099460d67afa7f6e34b039caf4a7a1d074c798cf84d1d453fb0f4dfcda14de0c1024ba2d5a8b8bd633c9d2f58c8e6c0e3a1c621f019dff187ca9b89f17e190dcba34a0fcd65991d11bfe9b92fc0d47c78463609902a1abbca64deb19173d778ca6798ba7f7b2a920aa166d671076d1e1dc840d489d87e5b20346b0c314323c75801b4e33e470a7bf96c7870964a7c5b28723dcbd4ab4d623fa3ad0770e995af145f5e028e1574802cacf21c6d00d7f98ca1baf524b7b2cc5a58a4211ac845eca761f3b170dfd5e58481b2cfa38e0e00418b75ea30fde5d20270edb1e5ea9dce36a1014836c6b9950d5aa057999980dbc87acf536dfaebce93a124be16bc7d92a3e58c2ba5159944f8b71b01e752ef00f8c6b429d78f05978c77d5e3bbc6e0ab2a3b00b1de78d333981bdb8e4768ba6e269ad4ddc84889d3661b1ecf77c92a48bc6896cae5e31a29a935633cbb4b3d809d530721929433abb789588b5d49f8df0baedfae204c81a36cba4b9772efe54dea0a28edaedb41b6b3dd63e55d35d5d760baa2eb32091138d7a6fb4eb13846ff1d07567a760d5546f0273c90ef278be710744b0c1300eb88c8ae8dc01d9215c9143fab2d59a2eeef408942e3894b15f5721518f4d8d87f544878bbe60c7896c1d060d1c2dc771de0117d15bd46e913df99e59a5022f19d07c5764610f3c4995ff3154e2bceb6ba12af8102773cc142100b08b615835d26cea98d6650d8fa6baa7d796a28eb51de84896762b0baae9a9f26f0363f4b4d104c7d1940eb985a3d73adc347f280639df8fa9b69589277d948802372816e54f9efc536988334a827aac61feb3eec0f122204592b86364c47ae19e3616fd0398a17f6bb2607d5d867ff2b843bd8fc3e92c153619a1938bfd0a64f36acfd956699a5f2500cbcae43f5b97926db920411fb98037330eccdcb4511a3681724e0102b6706d9e16c51c4a4042d477ddc362dbcb5eca6601e34f40bdf30adf92aa98335f990a760b3ebf76933beb2eaa2cc57339f88b484ed293040efc38444100ae6f2164d89edac08c2443c52d6b06ffc7053dcaa737eb7fa8873aebe5118dc404236e6bfa29e6f7713bbcfb2c5fddacc352a80274dae81181ee7120c712bda07c03663053c37053ec8afdc2a9bdb673c301f12bc6bcb26d535297314ae0c7eb93af9aa539bf302f11252a2c34f76df7f5a228d91e9f4ae3fb23aca90534a915486540bda205912d9264d3f75cd0d38fed6d0178ecb9ee1ceb684913b2c361950d0722bdc2ff0e282f32df640231374461f3a00c0111f8485d98cb12110f0c0761f3aa5ce66b0eb380b4be265ab89aab82abbe3f15e653fb549a3afb20cf69e29b7d1296f383dd20e1941f5ea589ba806eb3ae8d6f38cbde8c1cfcaed609e1cabde900b46830236256f2f5df61affbb1d602de33e891adcd393aa55b09de3c470e7f81c8a37349b490f5188ed6a7f717e2f327670028628bb8c092de4cabad6b34b8a72f9e234baf9afdfb773dd34075225a148e01bf97def52a748c1c5ecfe58d938e588027bbeea6f951c8963d9da34734ca82c55122fc434225eaa7965fa3da628cc1af739cda9ab5db843fb7b35e2330add723cd015c174c6742fac0c59860e224e30cfb7373c0b293155831eb77ceec86dc6458782595b3bae19b2a882c9400eff375895542cad8353d10d4fddd088413ffef9ede7387fb964c6c61a5ae3432ab29e17663a181c49cf34ede4f3ddbb78248a0a527692debf912b9656310ea0902d38e3b03b01de7a48f0c8f3a22ea776937f7670d0016b81d3c60e3fdfcb49c734bc20f66ca07898d89d2e7a19f22c9ce5c2ea56699054ef8236e79528f4b329c31ed0b5712024bfc7e0ce6c862ee7eb12277ecf5deb3a9ea33cb7ed3eee443cefd2cdc80240338ef91e7235e96eacb5e35907b976465e1e546da13f1a1d6b5a0c4bcbc58a437f03d423a854313067274f1ac87852ec90be69296ed683f61996101aaa420fdd7050f1100b134989a521dfb9fbf58d6d657f3edf6102d8f176981c08b9487995acfdfffe909128dceccda0e92c07d506677814a61c9fa36424931b5f5a0cc70d85be2f32d4ff1930b45ab97e3df934f09cae85fb6b0735c34fe755547aecd469c0d500b43f0b9c5148a0513f586736148d909c58e18969c1684d45fa2f62a8db4d4ee77e50b8f8f3872cb892215fabb643284ae593cda3d1c4550c1d00bd6483d14ad9dad18f9c142f9c00b7aa8e9e32efefac277eeb1864bff2319629b5f5cd1b9795bd3c730b9e1b277b78edaa9c96eb883f970137a5d067c8401b8da2038598e60bbeec13be4a50e2cb0ed1f380164cade79fde7f077dbada20324e837202cb4831475d7628a99861762c1327316185b812b6fd096c23c28baae235b9e0fc038208a1b93c364c3d1fc5721ae80cadb80ba878638acfce04b8e79723f9b0806420bc0f215182d76f020658306fcd3cd4faeedb3e2d852853028a883574353f19cd03091a2284238cbcad9adcfd4630a56eefb25dc1d5dc6048d7aad4ac94e398e062aaa7bf59f203a84c3ee8169a2795b214ae99aa9c3b1e39cad0f95c77c800135d38c986aa5f49e9df166f764f424362766f31029e3ca55cd4e367e68f7dad38df751b2119bfdb5372a806fab7604fee5ea4fc1c3f54654fe49b6e594a142ec3256e121b2ad16d4c8b2a71f63257751a1df2541508727313009cc44213a5d6138db60b65aeef69cc019f02ac6eaca16f84e9349c646de5873444f4156864f07fd785ebe67719d9a5e4b19cac003e1a57efaae0d459a1a64a6a9037a42c8bb08d2f50e695ba36f654d2af0f75e6403fcd4a2be6a5489b6d801cb09a3f4d3e8dc50af9ef88b72b4932bc867ec3e29bbf58ad650bf313fabca8c467e25592f32da46c7f44869dc1aa003103b1a9b3fc5cac867e494b237e861f07a64ab02420e5c4e4e8adb2db5195d7b707c92d4c1377850fc840ff4afa469e3d590344df0f184317b57bcd53e6ddf69b2d4a9dfa1d0e4990c1ff85e3820d204ea10aaed504ae366dae5df50fc6811ee206fa1a0f8e3c78a9b93cb6ecee26796a8be8d67a04a14ef4ee82f029370e73cbab2a63750394833b0ba224ca6de29b622b54f7798944372cc15d403a8095600021ef91ab54ed3016d9bc90b6dee219c072539f3198252616dcbd9e1faa8371583b83b8bb7839982c0dd0d4137410168721328278b1887015a7a20e4ee1fde4ac30d8cba1d2f6a07c07025bab79b7f314f2405ebfe51ec8f967a1423f5119811adf50ee034bfed61dd00a1355a279919754fd622a171c19bca8d0cb2293818d78371518edf81ad49f231533db2e54205fed7cff6d66e17a8f29eac423d6b6f43919564974857e07f6757750aab32fb4a170d9df8192fe70f338815978e72a595f37b7a5d66ab6c3e40759fa302d004beedb6272e30fa299b17340e61536d70590da013719bd6717be25f1202cce94e3573391bae0233b74f9572dbbe4a5c153f72aab3cf83aa3544369250b58c877a2dc29dd9c95a0d079fb6f7a3aa5da18139e29f4e762242a6d44326986f6a7b242196af1c51093be830d1c7e975e928cc64f38727ec37c4111b689cda12f1a210d5a4944067b34693129a14641309151ce2568ee7975841e9ba4b09e419cda3c0d72d93bfbe4e59b831252847c7ab4d82d26ea65c4494bf74c41a7cae3a369e56644a24e186790139e3d127763567abe25cd8fabcc5f246110a7ddb05f9b2cbe8edf9a1cfebedf7f7b5b1b6fe93da229ea873bfc151154b360b853198ddbde3f85ee3d83a4d8fe0632ffaae7dcc5bc2e9bab92ba344bc504b853b809af865a95b162f1728ae15cd5145f931ee14731007fcd39f344070ac52f10a2d08bd7ef6ccb36f8dc103ef1c60ff54e17fa1007ffe5513a1eec6216beb380f68a8ac9e253c1ccdadfe1d5889d95f82c08e38b97f5a7309b5a1bfd1f07892e387ff49af216c8d2f15d3ceca517a43c0a81472a73524eceb78a7e87119469521832f2961ec268a7e2f9a558579edf0df850d0d9c10152ea30785ba56857f3bf960a40f5b34c053bf7be783959627e6d742942952cdafa0ee6b19dfa6474bfcf16de18364d1a3a2dcfea574616187602e73c7044b9f4b8f581dc5b4fd861995aac0a72343b7846ba914e51b88be64bb4b6b544a5f7f7fb2dbe09a637598b7f6a15c3d4d5e090cebec1c595639fe664a6d0b8761667d524db4cb5956197510e2eb6dd9266c538f6f5448a9ef836be66a0ea81521ed55f6004b75254f7684a2646adf3ee64c7cae3ecaa344f1a6361ad8ee3696e996b7c04340dc1f417ac8e2d6ffa6421a0f3afb4cd22bc87e991025ebcc0f26017d6670f1fffac41e2adf95b0d6116d910a2162e77ab531f1e578a90d9cd53d8ccae3160919cc95bc983c4e311777f46778b031abddcf689ee63ec64103e2e68d2817a9b3ead7582f57a6b18073b15585db639354452ed2dd163969e6115570faa871b3fa31b495fdc65b1bc26a128d84b81c76792317cc141eb5c73ecdf288527afd727f27f9a59ae8a5e3c9e7cd770364af8c991e1781a4f94055d5d6a8e24b9c4b08d42562f53a3d5f6b5bff74a7475e013ad2a9da01b3590b0bf32f1599cf2ac9777baba775c305d5a4e9e885b2a53fe9b4ad02e8ab8aa93627676a6de80151f1bb5659893efc82f1cdef6a797a251ecc1eec18edcab53a1737ceec066c491afc113008d4bc94f84a19d08fc10eb32a9bcefa9255b26e00f8867689698b635dc0a0b8763571cba1f70fe3b717d9ee36618bd101a5a0bde6c3334b617f7f4a9f5ed1b9d8f33c85be9494c8d9bea61280d1fa723898240ccaf0408ecced1743e66cde8b79408ee2d6cf0c2229cc0a2b77b44bfb5777102994cd4b1980a8c212998df1c0af61f1e397313a596ef998ff2ff2d459b1cc1308588856d235019d1d5ab0ae7e00000000000000000369b539a4dd67a6e593510d557add76a5181431227d9f74b2e70fe1c542759880da72e9383df7d055f94025f993a6121", 0x1038) 15:31:34 executing program 6: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDGKBMODE(r0, 0x4b44, &(0x7f0000000000)) (fail_nth: 3) 15:31:34 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x4b67, 0x0) [ 1577.136706] FAULT_INJECTION: forcing a failure. [ 1577.136706] name failslab, interval 1, probability 0, space 0, times 0 [ 1577.139140] CPU: 0 PID: 9897 Comm: syz-executor.6 Not tainted 5.10.250 #1 [ 1577.140586] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1577.142336] Call Trace: [ 1577.142891] dump_stack+0x107/0x167 [ 1577.143659] should_fail.cold+0x5/0xa [ 1577.144464] ? create_object.isra.0+0x3a/0xa30 [ 1577.145415] should_failslab+0x5/0x20 [ 1577.146223] kmem_cache_alloc+0x5b/0x310 [ 1577.147078] create_object.isra.0+0x3a/0xa30 [ 1577.147997] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1577.149067] kmem_cache_alloc+0x159/0x310 [ 1577.149960] __pmd_alloc+0x94/0x630 [ 1577.150729] handle_mm_fault+0x1ac4/0x3500 [ 1577.151619] ? __lock_acquire+0x1657/0x5b00 [ 1577.152532] ? __pmd_alloc+0x630/0x630 [ 1577.153354] ? vmacache_find+0x55/0x2a0 [ 1577.154194] ? vmacache_update+0xce/0x140 [ 1577.155074] do_user_addr_fault+0x56e/0xc60 [ 1577.155984] exc_page_fault+0xa2/0x1a0 [ 1577.156811] asm_exc_page_fault+0x1e/0x30 [ 1577.157676] RIP: 0010:__put_user_nocheck_4+0x3/0x11 [ 1577.158730] Code: 00 00 48 39 d9 73 54 0f 01 cb 66 89 01 31 c9 0f 01 ca e9 91 66 1c 02 90 48 bb fd ef ff ff ff 7f 00 00 48 39 d9 73 34 0f 01 cb <89> 01 31 c9 0f 01 ca e9 72 66 1c 02 66 90 48 bb f9 ef ff ff ff 7f [ 1577.162581] RSP: 0018:ffff888042b17b98 EFLAGS: 00050297 [ 1577.163690] RAX: 0000000000000000 RBX: 00007fffffffeffd RCX: 0000000020000000 [ 1577.165180] RDX: 0000000000040000 RSI: ffffffff822ad210 RDI: ffffffff84648724 [ 1577.166687] RBP: ffff888043438000 R08: 0000000000000000 R09: 0000000000000000 [ 1577.168172] R10: 0000000000000003 R11: 0000000000000001 R12: 0000000020000000 [ 1577.169670] R13: 0000000000000001 R14: 0000000000004b44 R15: 0000000000004b44 [ 1577.171194] ? vt_do_kdgkbmode+0xd0/0x100 [ 1577.172062] vt_ioctl+0x4bc/0x2c90 [ 1577.172809] ? vt_waitactive+0x3a0/0x3a0 [ 1577.173665] ? __lock_acquire+0xbb1/0x5b00 [ 1577.174567] ? find_held_lock+0x2c/0x110 [ 1577.175417] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1577.176518] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 1577.177599] ? vt_waitactive+0x3a0/0x3a0 [ 1577.178456] tty_ioctl+0x862/0x18b0 [ 1577.179222] ? tty_fasync+0x390/0x390 [ 1577.180024] ? ioctl_has_perm.constprop.0.isra.0+0x29a/0x410 [ 1577.181223] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 1577.182314] ? do_vfs_ioctl+0x283/0x10d0 [ 1577.183159] ? selinux_bprm_creds_for_exec+0xb60/0xb60 [ 1577.184254] ? generic_block_fiemap+0x60/0x60 [ 1577.185186] ? lock_downgrade+0x6d0/0x6d0 [ 1577.186057] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1577.187063] ? wait_for_completion_io+0x270/0x270 [ 1577.188077] ? selinux_file_ioctl+0xb6/0x270 [ 1577.188996] ? tty_fasync+0x390/0x390 [ 1577.189794] __x64_sys_ioctl+0x19a/0x210 [ 1577.190653] do_syscall_64+0x33/0x40 [ 1577.191440] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1577.192509] RIP: 0033:0x7f4fcc18db19 [ 1577.193289] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1577.197145] RSP: 002b:00007f4fc9703188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1577.198744] RAX: ffffffffffffffda RBX: 00007f4fcc2a0f60 RCX: 00007f4fcc18db19 15:31:34 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCSARP(r1, 0x8955, &(0x7f0000000000)={{0x2, 0x0, @local}, {0x0, @local}, 0x20, {0x2, 0x0, @local}, 'dummy0\x00'}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCSARP(r2, 0x8955, &(0x7f0000000000)={{0x2, 0x0, @local}, {0x0, @local}, 0x20, {0x2, 0x0, @local}, 'dummy0\x00'}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000280)) ioctl$KDGKBDIACR(r0, 0x4b4a, &(0x7f0000000180)=""/240) [ 1577.200231] RDX: 0000000020000000 RSI: 0000000000004b44 RDI: 0000000000000003 [ 1577.201954] RBP: 00007f4fc97031d0 R08: 0000000000000000 R09: 0000000000000000 15:31:34 executing program 4: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1c08a4, 0x0) r1 = syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) open$dir(&(0x7f0000000200)='./mnt\x00', 0x40040, 0x10) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir/../file0\x00', 0x80, 0x0) r2 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x50008, 0x0, 0x10081, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r3 = openat(r1, &(0x7f0000000000)='mnt/encrypted_dir/../file0\x00', 0x40, 0x100) r4 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r4, 0x7, 0x0, 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r4, 0xc0406619, &(0x7f00000001c0)={@desc={0x1, 0x0, @desc2}}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000140)=',,\\\x00') futimesat(r3, &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0)={{0x0, 0xea60}}) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000680)=ANY=[@ANYBLOB="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", @ANYRES32, @ANYBLOB="02000000000000006d6e742f656e637279707465645f6469722f2e2e2f66696c653000"]) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') [ 1577.203445] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1577.205002] R13: 00007ffdf8625b7f R14: 00007f4fc9703300 R15: 0000000000022000 15:31:34 executing program 5: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, 0x0) mount$9p_tcp(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x4020, &(0x7f0000003300)) (fail_nth: 9) [ 1577.274471] FAULT_INJECTION: forcing a failure. [ 1577.274471] name failslab, interval 1, probability 0, space 0, times 0 [ 1577.276929] CPU: 0 PID: 9906 Comm: syz-executor.5 Not tainted 5.10.250 #1 [ 1577.278372] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1577.280097] Call Trace: [ 1577.280651] dump_stack+0x107/0x167 [ 1577.281425] should_fail.cold+0x5/0xa [ 1577.282235] ? proc_init_fs_context+0x45/0x330 [ 1577.283188] should_failslab+0x5/0x20 [ 1577.283988] kmem_cache_alloc_trace+0x55/0x320 [ 1577.284947] proc_init_fs_context+0x45/0x330 [ 1577.285863] ? proc_fill_super+0x5c0/0x5c0 [ 1577.286756] alloc_fs_context+0x518/0x870 [ 1577.287634] path_mount+0x96b/0x2200 [ 1577.288415] ? strncpy_from_user+0x9e/0x470 [ 1577.289316] ? finish_automount+0xa90/0xa90 [ 1577.290244] ? getname_flags.part.0+0x1dd/0x4f0 [ 1577.291216] ? _copy_from_user+0xfb/0x1b0 [ 1577.292090] __x64_sys_mount+0x282/0x300 [ 1577.292940] ? copy_mnt_ns+0xa00/0xa00 [ 1577.293767] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1577.294880] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1577.295965] do_syscall_64+0x33/0x40 [ 1577.296743] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1577.297814] RIP: 0033:0x7f95ced63b19 [ 1577.298608] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1577.302456] RSP: 002b:00007f95cc2d9188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1577.304040] RAX: ffffffffffffffda RBX: 00007f95cee76f60 RCX: 00007f95ced63b19 [ 1577.305534] RDX: 0000000000000000 RSI: 0000000020000100 RDI: 0000000000000000 [ 1577.307025] RBP: 00007f95cc2d91d0 R08: 0000000020003300 R09: 0000000000000000 [ 1577.308548] R10: 0000000000004020 R11: 0000000000000246 R12: 0000000000000001 [ 1577.310050] R13: 00007ffde6ceea9f R14: 00007f95cc2d9300 R15: 0000000000022000 15:31:35 executing program 7: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000100), 0x404100, 0x0) ioctl$PIO_SCRNMAP(r1, 0x4b41, &(0x7f0000000140)="780bcba80e4fa085079f6793d18f6fc820f0d7dcbc96e24b9037995c95e0189583626adde946b09fc14629d81da85be257d9bb3d79068336e1d744a754f6021487494f6f4f15e921830a78377dc498f45c73d0e1fc5c1f83f48311d08653b91b420641fa5d8864802936808c9ba0852e3bb3c5932e437ed31ac0") ioctl$TCSBRKP(r0, 0x5425, 0x994a) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f00000002c0)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYRESOCT]) ioctl$TIOCL_SCROLLCONSOLE(r0, 0x541c, &(0x7f00000000c0)={0xd, 0x5}) ioctl$FS_IOC_GETVERSION(r2, 0x80087601, &(0x7f0000000080)) 15:31:35 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r1, 0x7, 0x0, 0x0, 0x0) ioctl$KDGETMODE(r1, 0x4b3b, &(0x7f0000000000)) ioctl$KDGKBDIACR(r0, 0x4b4a, &(0x7f0000000180)=""/238) 15:31:35 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x4b68, 0x0) 15:31:35 executing program 4: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1c08a4, 0x0) r1 = syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) open$dir(&(0x7f0000000200)='./mnt\x00', 0x40040, 0x10) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir/../file0\x00', 0x80, 0x0) r2 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x50008, 0x0, 0x10081, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r3 = openat(r1, &(0x7f0000000000)='mnt/encrypted_dir/../file0\x00', 0x40, 0x100) r4 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r4, 0x7, 0x0, 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r4, 0xc0406619, &(0x7f00000001c0)={@desc={0x1, 0x0, @desc2}}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000140)=',,\\\x00') futimesat(r3, &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0)={{0x0, 0xea60}}) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000680)=ANY=[@ANYBLOB="b00900000000000018000000468a29458f2709d329f6d3f3917408961482081d984538af2f9bcf61c448afbaa0be3f00000000000000ca4aa56fc413a417324e8530165c3515981e2d28f7fce9ae3c6bb8fa04ff6411132c9ced479abaeea325c2205ea95984d3d7f98eea1cca02dfeb0b2471b497fbb71b60180d35e2a3394ba6d965f41c7b7bc29d4e3ca95bd7ad074a4242ec98a69ad9d1546ce18cbbd98d2e50688e958a0fcd16876ab83cdb94eeb03e42203f267a1bf6ccb1c07ad92e6e493149da32f754251ae74d30cd4b50eefd6a208172ed8693b320eda714bdd152b484d9c939b4bb777dddd947843d73529f5ffe589777254cb10f733351e0739a3a61c3b8f977517ee7becda66da23a93e3be8ed63bda262951b32f72c1c48ee63be474eafaa255074efaa494b950f48b119c76c70b833e4d7443b691dc97bf78bcae908758ff1edaf2ad48dd67d0337c8ecfcd47e8ce5598c435f4645d719ae60a12c5b37ed2d45571c29ff6af1292ed2ff7fa24e2ab69f18db826044f35683810d2ee95f68f586a8922acdc225912820cdffe6ac29641f3c531a0eb1ddbf17341a05f3ee437f2a56a4a92af8ba2e413d00d05caab40963868dc00da000dfe8962927be81ca05afcc624225b2667a1208dd74e8bb6ced5e1da98f41bb3dedc31302fbf6ed40e9c526f82b53ce45e25e20ce9068bba911f0ec11403a35ff01cee623f71101155fcb646937ac714", @ANYRES32, @ANYBLOB="02000000000000006d6e742f656e637279707465645f6469722f2e2e2f66696c653000"]) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') 15:31:35 executing program 5: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, 0x0) mount$9p_tcp(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x4020, &(0x7f0000003300)) (fail_nth: 10) 15:31:35 executing program 6: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDGKBMODE(r0, 0x4b44, &(0x7f0000000000)) (fail_nth: 4) [ 1577.767372] FAULT_INJECTION: forcing a failure. [ 1577.767372] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1577.770171] CPU: 1 PID: 9921 Comm: syz-executor.6 Not tainted 5.10.250 #1 [ 1577.771710] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1577.773561] Call Trace: [ 1577.774172] dump_stack+0x107/0x167 [ 1577.774991] should_fail.cold+0x5/0xa [ 1577.775851] __alloc_pages_nodemask+0x182/0x600 [ 1577.776899] ? __alloc_pages_slowpath.constprop.0+0x2310/0x2310 [ 1577.778265] ? find_held_lock+0x2c/0x110 [ 1577.779182] ? __pmd_alloc+0x31d/0x630 [ 1577.780061] ? lock_downgrade+0x6d0/0x6d0 [ 1577.780988] ? do_raw_spin_lock+0x121/0x260 [ 1577.781968] alloc_pages_current+0x187/0x280 [ 1577.782956] pte_alloc_one+0x16/0x1a0 [ 1577.783812] __pte_alloc+0x1d/0x330 [ 1577.784632] handle_mm_fault+0x287f/0x3500 [ 1577.785581] ? __lock_acquire+0x1657/0x5b00 [ 1577.786561] ? __pmd_alloc+0x630/0x630 [ 1577.786850] FAULT_INJECTION: forcing a failure. [ 1577.786850] name failslab, interval 1, probability 0, space 0, times 0 [ 1577.787439] ? vmacache_find+0x55/0x2a0 [ 1577.787458] ? vmacache_update+0xce/0x140 [ 1577.787484] do_user_addr_fault+0x56e/0xc60 [ 1577.792588] exc_page_fault+0xa2/0x1a0 [ 1577.793463] asm_exc_page_fault+0x1e/0x30 [ 1577.794397] RIP: 0010:__put_user_nocheck_4+0x3/0x11 [ 1577.795511] Code: 00 00 48 39 d9 73 54 0f 01 cb 66 89 01 31 c9 0f 01 ca e9 91 66 1c 02 90 48 bb fd ef ff ff ff 7f 00 00 48 39 d9 73 34 0f 01 cb <89> 01 31 c9 0f 01 ca e9 72 66 1c 02 66 90 48 bb f9 ef ff ff ff 7f [ 1577.799621] RSP: 0018:ffff88804599fb98 EFLAGS: 00050297 [ 1577.800809] RAX: 0000000000000000 RBX: 00007fffffffeffd RCX: 0000000020000000 [ 1577.802415] RDX: 0000000000040000 RSI: ffffffff822ad210 RDI: ffffffff84648724 [ 1577.804002] RBP: ffff888043438000 R08: 0000000000000000 R09: 0000000000000000 [ 1577.805590] R10: 0000000000000003 R11: 0000000000000001 R12: 0000000020000000 [ 1577.807193] R13: 0000000000000001 R14: 0000000000004b44 R15: 0000000000004b44 [ 1577.808804] ? vt_do_kdgkbmode+0xd0/0x100 [ 1577.809730] vt_ioctl+0x4bc/0x2c90 [ 1577.810538] ? vt_waitactive+0x3a0/0x3a0 [ 1577.811444] ? __lock_acquire+0xbb1/0x5b00 [ 1577.812400] ? find_held_lock+0x2c/0x110 [ 1577.813310] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1577.814496] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 1577.815644] ? vt_waitactive+0x3a0/0x3a0 [ 1577.816549] tty_ioctl+0x862/0x18b0 [ 1577.817362] ? tty_fasync+0x390/0x390 [ 1577.818228] ? ioctl_has_perm.constprop.0.isra.0+0x29a/0x410 [ 1577.819510] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 1577.820665] ? do_vfs_ioctl+0x283/0x10d0 [ 1577.821571] ? selinux_bprm_creds_for_exec+0xb60/0xb60 [ 1577.822748] ? generic_block_fiemap+0x60/0x60 [ 1577.823745] ? lock_downgrade+0x6d0/0x6d0 [ 1577.824667] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1577.825742] ? wait_for_completion_io+0x270/0x270 [ 1577.826842] ? selinux_file_ioctl+0xb6/0x270 [ 1577.827826] ? tty_fasync+0x390/0x390 [ 1577.828678] __x64_sys_ioctl+0x19a/0x210 [ 1577.829592] do_syscall_64+0x33/0x40 [ 1577.830432] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1577.831578] RIP: 0033:0x7f4fcc18db19 [ 1577.832408] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1577.836526] RSP: 002b:00007f4fc9703188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1577.838247] RAX: ffffffffffffffda RBX: 00007f4fcc2a0f60 RCX: 00007f4fcc18db19 [ 1577.839838] RDX: 0000000020000000 RSI: 0000000000004b44 RDI: 0000000000000003 [ 1577.841428] RBP: 00007f4fc97031d0 R08: 0000000000000000 R09: 0000000000000000 [ 1577.843030] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1577.844621] R13: 00007ffdf8625b7f R14: 00007f4fc9703300 R15: 0000000000022000 [ 1577.846258] CPU: 0 PID: 9922 Comm: syz-executor.5 Not tainted 5.10.250 #1 [ 1577.847725] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1577.849468] Call Trace: [ 1577.850041] dump_stack+0x107/0x167 [ 1577.850816] should_fail.cold+0x5/0xa [ 1577.851619] ? create_object.isra.0+0x3a/0xa30 [ 1577.852587] should_failslab+0x5/0x20 [ 1577.853387] kmem_cache_alloc+0x5b/0x310 [ 1577.854246] ? find_held_lock+0x2c/0x110 [ 1577.855100] create_object.isra.0+0x3a/0xa30 [ 1577.856018] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1577.857097] kmem_cache_alloc_trace+0x151/0x320 [ 1577.858100] proc_init_fs_context+0x45/0x330 [ 1577.859021] ? proc_fill_super+0x5c0/0x5c0 [ 1577.859906] alloc_fs_context+0x518/0x870 [ 1577.860780] path_mount+0x96b/0x2200 [ 1577.861560] ? strncpy_from_user+0x9e/0x470 [ 1577.862479] ? finish_automount+0xa90/0xa90 [ 1577.863383] ? getname_flags.part.0+0x1dd/0x4f0 [ 1577.864360] ? _copy_from_user+0xfb/0x1b0 [ 1577.865241] __x64_sys_mount+0x282/0x300 [ 1577.866106] ? copy_mnt_ns+0xa00/0xa00 [ 1577.866928] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1577.868039] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1577.869139] do_syscall_64+0x33/0x40 [ 1577.869956] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1577.871029] RIP: 0033:0x7f95ced63b19 [ 1577.871813] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1577.875660] RSP: 002b:00007f95cc2d9188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1577.877253] RAX: ffffffffffffffda RBX: 00007f95cee76f60 RCX: 00007f95ced63b19 [ 1577.878753] RDX: 0000000000000000 RSI: 0000000020000100 RDI: 0000000000000000 [ 1577.880254] RBP: 00007f95cc2d91d0 R08: 0000000020003300 R09: 0000000000000000 [ 1577.881741] R10: 0000000000004020 R11: 0000000000000246 R12: 0000000000000002 [ 1577.883237] R13: 00007ffde6ceea9f R14: 00007f95cc2d9300 R15: 0000000000022000 15:31:35 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x4b69, 0x0) 15:31:35 executing program 6: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDGKBMODE(r0, 0x4b44, &(0x7f0000000000)) (fail_nth: 5) 15:31:35 executing program 1: ioctl$FIONCLEX(0xffffffffffffffff, 0x5450) r0 = ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f00000000c0)={0x7, 0x1, 0x7f, 0x2070, 0x4}) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDGKBDIACR(r1, 0x4b4a, &(0x7f0000000180)=""/230) [ 1577.945540] FAULT_INJECTION: forcing a failure. [ 1577.945540] name failslab, interval 1, probability 0, space 0, times 0 [ 1577.948005] CPU: 0 PID: 9927 Comm: syz-executor.6 Not tainted 5.10.250 #1 [ 1577.949438] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1577.951179] Call Trace: [ 1577.951752] dump_stack+0x107/0x167 [ 1577.952513] should_fail.cold+0x5/0xa [ 1577.953314] ? ptlock_alloc+0x1d/0x70 [ 1577.954128] should_failslab+0x5/0x20 [ 1577.954924] kmem_cache_alloc+0x5b/0x310 [ 1577.955784] ptlock_alloc+0x1d/0x70 [ 1577.956544] pte_alloc_one+0x68/0x1a0 [ 1577.957340] __pte_alloc+0x1d/0x330 [ 1577.958121] handle_mm_fault+0x287f/0x3500 [ 1577.959012] ? __lock_acquire+0x1657/0x5b00 [ 1577.959922] ? __pmd_alloc+0x630/0x630 [ 1577.960743] ? vmacache_find+0x55/0x2a0 [ 1577.961570] ? vmacache_update+0xce/0x140 [ 1577.962464] do_user_addr_fault+0x56e/0xc60 [ 1577.963381] exc_page_fault+0xa2/0x1a0 [ 1577.964202] asm_exc_page_fault+0x1e/0x30 [ 1577.965066] RIP: 0010:__put_user_nocheck_4+0x3/0x11 [ 1577.966112] Code: 00 00 48 39 d9 73 54 0f 01 cb 66 89 01 31 c9 0f 01 ca e9 91 66 1c 02 90 48 bb fd ef ff ff ff 7f 00 00 48 39 d9 73 34 0f 01 cb <89> 01 31 c9 0f 01 ca e9 72 66 1c 02 66 90 48 bb f9 ef ff ff ff 7f [ 1577.969971] RSP: 0018:ffff888045f87b98 EFLAGS: 00050297 [ 1577.971094] RAX: 0000000000000000 RBX: 00007fffffffeffd RCX: 0000000020000000 [ 1577.972592] RDX: 0000000000040000 RSI: ffffffff822ad210 RDI: ffffffff84648724 [ 1577.974094] RBP: ffff888043438000 R08: 0000000000000000 R09: 0000000000000000 [ 1577.975593] R10: 0000000000000003 R11: 0000000000000001 R12: 0000000020000000 [ 1577.977082] R13: 0000000000000001 R14: 0000000000004b44 R15: 0000000000004b44 [ 1577.978640] ? vt_do_kdgkbmode+0xd0/0x100 [ 1577.979512] vt_ioctl+0x4bc/0x2c90 [ 1577.980262] ? vt_waitactive+0x3a0/0x3a0 [ 1577.981114] ? __lock_acquire+0xbb1/0x5b00 [ 1577.982089] ? find_held_lock+0x2c/0x110 [ 1577.982111] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1577.982131] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 1577.982149] ? vt_waitactive+0x3a0/0x3a0 [ 1577.982167] tty_ioctl+0x862/0x18b0 [ 1577.982186] ? tty_fasync+0x390/0x390 [ 1577.982206] ? ioctl_has_perm.constprop.0.isra.0+0x29a/0x410 [ 1577.982223] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 1577.982242] ? do_vfs_ioctl+0x283/0x10d0 [ 1577.982260] ? selinux_bprm_creds_for_exec+0xb60/0xb60 [ 1577.982293] ? generic_block_fiemap+0x60/0x60 [ 1577.992989] ? lock_downgrade+0x6d0/0x6d0 [ 1577.993855] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1577.994882] ? wait_for_completion_io+0x270/0x270 [ 1577.995897] ? selinux_file_ioctl+0xb6/0x270 [ 1577.996817] ? tty_fasync+0x390/0x390 [ 1577.997618] __x64_sys_ioctl+0x19a/0x210 [ 1577.998481] do_syscall_64+0x33/0x40 [ 1577.999265] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1578.000341] RIP: 0033:0x7f4fcc18db19 [ 1578.001123] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1578.004984] RSP: 002b:00007f4fc9703188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1578.006578] RAX: ffffffffffffffda RBX: 00007f4fcc2a0f60 RCX: 00007f4fcc18db19 [ 1578.008053] RDX: 0000000020000000 RSI: 0000000000004b44 RDI: 0000000000000003 [ 1578.009539] RBP: 00007f4fc97031d0 R08: 0000000000000000 R09: 0000000000000000 [ 1578.011025] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1578.012503] R13: 00007ffdf8625b7f R14: 00007f4fc9703300 R15: 0000000000022000 [ 1578.091081] proc: Unknown parameter 'trans' [ 1595.411300] FAULT_INJECTION: forcing a failure. [ 1595.411300] name failslab, interval 1, probability 0, space 0, times 0 [ 1595.413736] CPU: 0 PID: 9950 Comm: syz-executor.6 Not tainted 5.10.250 #1 [ 1595.415173] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1595.416889] Call Trace: 15:31:53 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDGKBDIACR(r0, 0x4b4a, &(0x7f0000000180)=""/240) [ 1595.417442] dump_stack+0x107/0x167 [ 1595.418407] should_fail.cold+0x5/0xa [ 1595.419306] ? create_object.isra.0+0x3a/0xa30 [ 1595.420284] should_failslab+0x5/0x20 [ 1595.421106] kmem_cache_alloc+0x5b/0x310 [ 1595.421976] ? __alloc_pages_slowpath.constprop.0+0x2310/0x2310 [ 1595.423254] create_object.isra.0+0x3a/0xa30 [ 1595.424188] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1595.425237] kmem_cache_alloc+0x159/0x310 [ 1595.426134] ptlock_alloc+0x1d/0x70 [ 1595.426926] pte_alloc_one+0x68/0x1a0 [ 1595.427715] __pte_alloc+0x1d/0x330 [ 1595.428504] handle_mm_fault+0x287f/0x3500 [ 1595.429414] ? __lock_acquire+0x1657/0x5b00 [ 1595.430357] ? __pmd_alloc+0x630/0x630 [ 1595.431201] ? vmacache_find+0x55/0x2a0 [ 1595.432050] ? vmacache_update+0xce/0x140 [ 1595.432943] do_user_addr_fault+0x56e/0xc60 [ 1595.433877] exc_page_fault+0xa2/0x1a0 [ 1595.434466] FAULT_INJECTION: forcing a failure. [ 1595.434466] name failslab, interval 1, probability 0, space 0, times 0 [ 1595.434729] asm_exc_page_fault+0x1e/0x30 [ 1595.438250] RIP: 0010:__put_user_nocheck_4+0x3/0x11 [ 1595.439319] Code: 00 00 48 39 d9 73 54 0f 01 cb 66 89 01 31 c9 0f 01 ca e9 91 66 1c 02 90 48 bb fd ef ff ff ff 7f 00 00 48 39 d9 73 34 0f 01 cb <89> 01 31 c9 0f 01 ca e9 72 66 1c 02 66 90 48 bb f9 ef ff ff ff 7f [ 1595.443264] RSP: 0018:ffff888040717b98 EFLAGS: 00050297 [ 1595.444405] RAX: 0000000000000000 RBX: 00007fffffffeffd RCX: 0000000020000000 [ 1595.445926] RDX: 0000000000040000 RSI: ffffffff822ad210 RDI: ffffffff84648724 [ 1595.447452] RBP: ffff888043438000 R08: 0000000000000000 R09: 0000000000000000 [ 1595.448977] R10: 0000000000000003 R11: 0000000000000001 R12: 0000000020000000 [ 1595.450513] R13: 0000000000000001 R14: 0000000000004b44 R15: 0000000000004b44 [ 1595.452034] ? vt_do_kdgkbmode+0xd0/0x100 [ 1595.452889] vt_ioctl+0x4bc/0x2c90 [ 1595.453620] ? vt_waitactive+0x3a0/0x3a0 [ 1595.454477] ? __lock_acquire+0xbb1/0x5b00 [ 1595.455354] ? find_held_lock+0x2c/0x110 [ 1595.456193] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1595.457281] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 1595.458359] ? vt_waitactive+0x3a0/0x3a0 [ 1595.459203] tty_ioctl+0x862/0x18b0 [ 1595.459950] ? tty_fasync+0x390/0x390 [ 1595.460731] ? ioctl_has_perm.constprop.0.isra.0+0x29a/0x410 [ 1595.461923] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 1595.462987] ? do_vfs_ioctl+0x283/0x10d0 [ 1595.463851] ? selinux_bprm_creds_for_exec+0xb60/0xb60 [ 1595.464969] ? generic_block_fiemap+0x60/0x60 [ 1595.465897] ? lock_downgrade+0x6d0/0x6d0 [ 1595.466771] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1595.467775] ? wait_for_completion_io+0x270/0x270 [ 1595.468774] ? selinux_file_ioctl+0xb6/0x270 [ 1595.469687] ? tty_fasync+0x390/0x390 [ 1595.470498] __x64_sys_ioctl+0x19a/0x210 [ 1595.471337] do_syscall_64+0x33/0x40 [ 1595.472128] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1595.473185] RIP: 0033:0x7f4fcc18db19 [ 1595.473948] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1595.477793] RSP: 002b:00007f4fc9703188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1595.479378] RAX: ffffffffffffffda RBX: 00007f4fcc2a0f60 RCX: 00007f4fcc18db19 [ 1595.480869] RDX: 0000000020000000 RSI: 0000000000004b44 RDI: 0000000000000003 [ 1595.482390] RBP: 00007f4fc97031d0 R08: 0000000000000000 R09: 0000000000000000 [ 1595.483867] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1595.485335] R13: 00007ffdf8625b7f R14: 00007f4fc9703300 R15: 0000000000022000 [ 1595.486863] CPU: 1 PID: 9948 Comm: syz-executor.5 Not tainted 5.10.250 #1 15:31:53 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCSSOFTCAR(r0, 0x541a, &(0x7f0000000000)=0x1) ioctl$TCSETAW(r0, 0x5407, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "bb09819e2f6e8485"}) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x2100, 0x0) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f00000000c0)) 15:31:53 executing program 7: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCSBRKP(r0, 0x5425, 0x994a) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000080)={0x0, 0x2, 0x3, 0x1}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCSARP(r1, 0x8955, &(0x7f0000000000)={{0x2, 0x0, @local}, {0x0, @local}, 0x20, {0x2, 0x0, @local}, 'dummy0\x00'}) pwritev(r1, &(0x7f0000000040), 0x0, 0x3, 0xffff) 15:31:53 executing program 5: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, 0x0) mount$9p_tcp(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x4020, &(0x7f0000003300)) (fail_nth: 11) 15:31:53 executing program 6: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDGKBMODE(r0, 0x4b44, &(0x7f0000000000)) (fail_nth: 6) 15:31:53 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x540a, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCSARP(r1, 0x8955, &(0x7f0000000140)={{0x2, 0x0, @loopback}, {0x0, @local}, 0x20, {0x2, 0x0, @local}, 'dummy0\x00'}) ioctl$BTRFS_IOC_START_SYNC(r0, 0x80089418, &(0x7f0000000000)=0x0) sync_file_range(r0, 0x3, 0x2, 0x5) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r1, 0xc0c89425, &(0x7f0000000040)={"01826fe1bb58cbce1aa087b8c0569fe1", 0x0, r2, {0x7fffffff}, {0x1000, 0x6}, 0x6a20, [0x10001, 0x6, 0x1f, 0x3, 0x3, 0x100, 0xffffffff, 0x3, 0x4, 0x8, 0x2, 0xe4a, 0x100, 0x7fffffff, 0x74b88fa3, 0x6]}) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCSARP(r3, 0x8955, &(0x7f0000000000)={{0x2, 0x0, @local}, {0x0, @local}, 0x20, {0x2, 0x0, @local}, 'dummy0\x00'}) finit_module(r3, &(0x7f00000001c0)='$$)-Y\x00', 0x3) 15:31:53 executing program 4: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1c08a4, 0x0) r1 = syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) open$dir(&(0x7f0000000200)='./mnt\x00', 0x40040, 0x10) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir/../file0\x00', 0x80, 0x0) r2 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x50008, 0x0, 0x10081, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r3 = openat(r1, &(0x7f0000000000)='mnt/encrypted_dir/../file0\x00', 0x40, 0x100) r4 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r4, 0x7, 0x0, 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r4, 0xc0406619, &(0x7f00000001c0)={@desc={0x1, 0x0, @desc2}}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000140)=',,\\\x00') futimesat(r3, &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0)={{0x0, 0xea60}}) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000680)=ANY=[@ANYBLOB="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", @ANYRES32, @ANYBLOB="02000000000000006d6e742f656e637279707465645f6469722f2e2e2f66696c653000"]) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') 15:31:53 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x4b6a, 0x0) [ 1595.488285] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1595.490221] Call Trace: [ 1595.490754] dump_stack+0x107/0x167 [ 1595.491485] should_fail.cold+0x5/0xa [ 1595.492236] ? create_object.isra.0+0x3a/0xa30 [ 1595.493155] should_failslab+0x5/0x20 [ 1595.493928] kmem_cache_alloc+0x5b/0x310 [ 1595.494798] ? find_held_lock+0x2c/0x110 [ 1595.495716] create_object.isra.0+0x3a/0xa30 [ 1595.496609] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1595.497641] kmem_cache_alloc_trace+0x151/0x320 [ 1595.498585] proc_init_fs_context+0x45/0x330 [ 1595.499454] ? proc_fill_super+0x5c0/0x5c0 [ 1595.500523] alloc_fs_context+0x518/0x870 [ 1595.501375] path_mount+0x96b/0x2200 [ 1595.502133] ? strncpy_from_user+0x9e/0x470 [ 1595.503021] ? finish_automount+0xa90/0xa90 [ 1595.503902] ? getname_flags.part.0+0x1dd/0x4f0 [ 1595.504853] ? _copy_from_user+0xfb/0x1b0 [ 1595.505712] __x64_sys_mount+0x282/0x300 [ 1595.506546] ? copy_mnt_ns+0xa00/0xa00 [ 1595.507344] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1595.508415] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1595.509468] do_syscall_64+0x33/0x40 [ 1595.510233] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1595.511277] RIP: 0033:0x7f95ced63b19 [ 1595.512037] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1595.515795] RSP: 002b:00007f95cc2d9188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1595.517347] RAX: ffffffffffffffda RBX: 00007f95cee76f60 RCX: 00007f95ced63b19 [ 1595.518826] RDX: 0000000000000000 RSI: 0000000020000100 RDI: 0000000000000000 [ 1595.520280] RBP: 00007f95cc2d91d0 R08: 0000000020003300 R09: 0000000000000000 [ 1595.521739] R10: 0000000000004020 R11: 0000000000000246 R12: 0000000000000002 [ 1595.523219] R13: 00007ffde6ceea9f R14: 00007f95cc2d9300 R15: 0000000000022000 15:31:53 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x4b70, 0x0) [ 1595.664228] proc: Unknown parameter 'trans' 15:32:06 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZEX(r0, 0x560a, &(0x7f0000000340)={0x1, 0x7ff, 0x2, 0xf484, 0x3ff, 0x1743}) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r1, 0x7, 0x0, 0x0, 0x0) ioctl$TIOCL_SCROLLCONSOLE(r1, 0x541c, &(0x7f0000000000)={0xd, 0x5}) ioctl$TCSETAW(r0, 0x5407, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "bb09819e2f6e8485"}) r2 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000040), 0x20000, 0x0) ioctl$BTRFS_IOC_QUOTA_CTL(r2, 0xc0109428, &(0x7f0000000300)={0x3, 0x81}) ioctl$VFAT_IOCTL_READDIR_SHORT(r1, 0x82307202, &(0x7f00000000c0)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) 15:32:06 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x540a, 0x0) ioctl$KDSETMODE(r0, 0x4b3a, 0x0) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r1, 0x7, 0x0, 0x0, 0x0) ioctl$VT_RESIZE(r1, 0x5609, &(0x7f0000000000)={0x2, 0x7, 0x1000}) r2 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r2, 0x7, 0x0, 0x0, 0x0) ioctl$TCSBRKP(r2, 0x5425, 0xa48) 15:32:06 executing program 5: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, 0x0) mount$9p_tcp(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x4020, &(0x7f0000003300)) (fail_nth: 12) 15:32:06 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x4b71, 0x0) 15:32:06 executing program 4: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1c08a4, 0x0) r1 = syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) open$dir(&(0x7f0000000200)='./mnt\x00', 0x40040, 0x10) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir/../file0\x00', 0x80, 0x0) r2 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x50008, 0x0, 0x10081, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r3 = openat(r1, &(0x7f0000000000)='mnt/encrypted_dir/../file0\x00', 0x40, 0x100) r4 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r4, 0x7, 0x0, 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r4, 0xc0406619, &(0x7f00000001c0)={@desc={0x1, 0x0, @desc2}}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000140)=',,\\\x00') futimesat(r3, &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0)={{0x0, 0xea60}}) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000680)=ANY=[@ANYBLOB="b00900000000000018000000468a29458f2709d329f6d3f3917408961482081d984538af2f9bcf61c448afbaa0be3f00000000000000ca4aa56fc413a417324e8530165c3515981e2d28f7fce9ae3c6bb8fa04ff6411132c9ced479abaeea325c2205ea95984d3d7f98eea1cca02dfeb0b2471b497fbb71b60180d35e2a3394ba6d965f41c7b7bc29d4e3ca95bd7ad074a4242ec98a69ad9d1546ce18cbbd98d2e50688e958a0fcd16876ab83cdb94eeb03e42203f267a1bf6ccb1c07ad92e6e493149da32f754251ae74d30cd4b50eefd6a208172ed8693b320eda714bdd152b484d9c939b4bb777dddd947843d73529f5ffe589777254cb10f733351e0739a3a61c3b8f977517ee7becda66da23a93e3be8ed63bda262951b32f72c1c48ee63be474eafaa255074efaa494b950f48b119c76c70b833e4d7443b691dc97bf78bcae908758ff1edaf2ad48dd67d0337c8ecfcd47e8ce5598c435f4645d719ae60a12c5b37ed2d45571c29ff6af1292ed2ff7fa24e2ab69f18db826044f35683810d2ee95f68f586a8922acdc225912820cdffe6ac29641f3c531a0eb1ddbf17341a05f3ee437f2a56a4a92af8ba2e413d00d05caab40963868dc00da000dfe8962927be81ca05afcc624225b2667a1208dd74e8bb6ced5e1da98f41bb3dedc31302fbf6ed40e9c526f82b53ce45e25e20ce9068bba911f0ec11403a35ff01cee623f71101155fcb646937ac714ac49741b4a1ffc6a72cba387bf41c1af2e", @ANYRES32, @ANYBLOB="02000000000000006d6e742f656e637279707465645f6469722f2e2e2f66696c653000"]) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') 15:32:06 executing program 6: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDGKBMODE(r0, 0x4b44, &(0x7f0000000000)) (fail_nth: 7) 15:32:06 executing program 7: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x40001, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) dup2(r1, r0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_TX_BITRATE_MASK(r2, &(0x7f0000001240)={0x0, 0x0, &(0x7f0000001200)={&(0x7f0000000780)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="010000000000000000001f"], 0x2c}}, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r4, 0x8933, &(0x7f0000000300)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_VENDOR(r4, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000400)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r5, @ANYBLOB="01000000000000001caf7502000008000300", @ANYRES32=r6], 0x1c}}, 0x0) sendmsg$NL80211_CMD_DEL_PMKSA(r1, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000140)={&(0x7f0000000080)={0x8c, r3, 0x200, 0x70bd27, 0x25dfdbfc, {{}, {@val={0x8, 0x3, r6}, @void}}, [@NL80211_ATTR_PMK_REAUTH_THRESHOLD={0x5, 0x120, 0x45}, @NL80211_ATTR_PMKID={0x14, 0x55, "bf56c335286f57db5af37b292099c9a6"}, @NL80211_ATTR_MAC={0xa, 0x6, @from_mac=@broadcast}, @NL80211_ATTR_PMK_LIFETIME={0x8}, @NL80211_ATTR_PMK_REAUTH_THRESHOLD={0x5, 0x120, 0x3b}, @NL80211_ATTR_SSID={0x1b, 0x34, @random="455c2e9617ffc032efc81c51d9b91e7ee3d53ecf8e8d68"}, @NL80211_ATTR_PMK_REAUTH_THRESHOLD={0x5, 0x120, 0x45}, @NL80211_ATTR_PMK={0x14, 0xfe, "bd57e6c158b60b0914cbb5428c3b757a"}]}, 0x8c}, 0x1, 0x0, 0x0, 0x40080}, 0xc014) r7 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCSBRKP(r7, 0x5425, 0x994a) 15:32:06 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDGKBDIACR(r0, 0x4b4a, &(0x7f0000000180)=""/240) ioctl$TIOCL_SCROLLCONSOLE(r0, 0x541c, &(0x7f0000000000)={0xd, 0xfffff001}) [ 1609.128199] FAULT_INJECTION: forcing a failure. [ 1609.128199] name failslab, interval 1, probability 0, space 0, times 0 [ 1609.129812] CPU: 1 PID: 9978 Comm: syz-executor.6 Not tainted 5.10.250 #1 [ 1609.130743] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1609.131859] Call Trace: [ 1609.132216] dump_stack+0x107/0x167 [ 1609.132712] should_fail.cold+0x5/0xa [ 1609.133240] ? __anon_vma_prepare+0x62/0x500 [ 1609.133833] should_failslab+0x5/0x20 [ 1609.134337] kmem_cache_alloc+0x5b/0x310 [ 1609.134897] __anon_vma_prepare+0x62/0x500 [ 1609.135466] ? __pte_alloc+0x194/0x330 [ 1609.135992] handle_mm_fault+0x2b2d/0x3500 [ 1609.136572] ? __lock_acquire+0x1657/0x5b00 [ 1609.137164] ? __pmd_alloc+0x630/0x630 [ 1609.137697] ? vmacache_find+0x55/0x2a0 [ 1609.138230] ? vmacache_update+0xce/0x140 [ 1609.138801] do_user_addr_fault+0x56e/0xc60 [ 1609.139380] exc_page_fault+0xa2/0x1a0 [ 1609.139903] asm_exc_page_fault+0x1e/0x30 [ 1609.140456] RIP: 0010:__put_user_nocheck_4+0x3/0x11 [ 1609.141115] Code: 00 00 48 39 d9 73 54 0f 01 cb 66 89 01 31 c9 0f 01 ca e9 91 66 1c 02 90 48 bb fd ef ff ff ff 7f 00 00 48 39 d9 73 34 0f 01 cb <89> 01 31 c9 0f 01 ca e9 72 66 1c 02 66 90 48 bb f9 ef ff ff ff 7f [ 1609.143576] RSP: 0018:ffff888045f9fb98 EFLAGS: 00050297 [ 1609.144279] RAX: 0000000000000000 RBX: 00007fffffffeffd RCX: 0000000020000000 [ 1609.145245] RDX: 0000000000040000 RSI: ffffffff822ad210 RDI: ffffffff84648724 [ 1609.146207] RBP: ffff888043438000 R08: 0000000000000000 R09: 0000000000000000 [ 1609.147188] R10: 0000000000000003 R11: 0000000000000001 R12: 0000000020000000 [ 1609.148143] R13: 0000000000000001 R14: 0000000000004b44 R15: 0000000000004b44 [ 1609.149100] ? vt_do_kdgkbmode+0xd0/0x100 [ 1609.149648] vt_ioctl+0x4bc/0x2c90 [ 1609.150119] ? vt_waitactive+0x3a0/0x3a0 [ 1609.150666] ? __lock_acquire+0xbb1/0x5b00 [ 1609.151233] ? find_held_lock+0x2c/0x110 [ 1609.151775] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1609.152475] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 1609.153156] ? vt_waitactive+0x3a0/0x3a0 [ 1609.153698] tty_ioctl+0x862/0x18b0 [ 1609.154188] ? tty_fasync+0x390/0x390 [ 1609.154700] ? ioctl_has_perm.constprop.0.isra.0+0x29a/0x410 [ 1609.155472] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 1609.156163] ? do_vfs_ioctl+0x283/0x10d0 [ 1609.156713] ? selinux_bprm_creds_for_exec+0xb60/0xb60 [ 1609.157412] ? generic_block_fiemap+0x60/0x60 [ 1609.158019] ? lock_downgrade+0x6d0/0x6d0 [ 1609.158578] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1609.159219] ? wait_for_completion_io+0x270/0x270 [ 1609.159857] ? selinux_file_ioctl+0xb6/0x270 [ 1609.160441] ? tty_fasync+0x390/0x390 [ 1609.160956] __x64_sys_ioctl+0x19a/0x210 [ 1609.161500] do_syscall_64+0x33/0x40 [ 1609.161990] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1609.162678] RIP: 0033:0x7f4fcc18db19 [ 1609.163176] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1609.165610] RSP: 002b:00007f4fc9703188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1609.166628] RAX: ffffffffffffffda RBX: 00007f4fcc2a0f60 RCX: 00007f4fcc18db19 [ 1609.167579] RDX: 0000000020000000 RSI: 0000000000004b44 RDI: 0000000000000003 [ 1609.168515] RBP: 00007f4fc97031d0 R08: 0000000000000000 R09: 0000000000000000 [ 1609.169461] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1609.170411] R13: 00007ffdf8625b7f R14: 00007f4fc9703300 R15: 0000000000022000 15:32:06 executing program 2: set_mempolicy(0x4000, &(0x7f0000000000)=0x9, 0x350) syz_open_dev$tty1(0xc, 0x4, 0x1) syz_open_dev$vcsu(&(0x7f0000000040), 0x200, 0x799101) r0 = syz_open_dev$vcsa(&(0x7f0000000080), 0x9, 0x48000) ioctl$TCSETAW(r0, 0x540a, 0x0) [ 1609.180246] FAULT_INJECTION: forcing a failure. [ 1609.180246] name failslab, interval 1, probability 0, space 0, times 0 [ 1609.181798] CPU: 1 PID: 9981 Comm: syz-executor.5 Not tainted 5.10.250 #1 [ 1609.182721] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1609.183827] Call Trace: [ 1609.184209] dump_stack+0x107/0x167 [ 1609.184721] should_fail.cold+0x5/0xa [ 1609.185248] ? create_object.isra.0+0x3a/0xa30 [ 1609.185869] should_failslab+0x5/0x20 [ 1609.186385] kmem_cache_alloc+0x5b/0x310 [ 1609.186935] ? find_held_lock+0x2c/0x110 [ 1609.187476] create_object.isra.0+0x3a/0xa30 [ 1609.188050] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1609.188719] kmem_cache_alloc_trace+0x151/0x320 [ 1609.189342] proc_init_fs_context+0x45/0x330 [ 1609.189913] ? proc_fill_super+0x5c0/0x5c0 [ 1609.190479] alloc_fs_context+0x518/0x870 [ 1609.191029] path_mount+0x96b/0x2200 [ 1609.191518] ? strncpy_from_user+0x9e/0x470 [ 1609.192078] ? finish_automount+0xa90/0xa90 [ 1609.192654] ? getname_flags.part.0+0x1dd/0x4f0 [ 1609.193274] ? _copy_from_user+0xfb/0x1b0 [ 1609.193819] __x64_sys_mount+0x282/0x300 [ 1609.194348] ? copy_mnt_ns+0xa00/0xa00 [ 1609.194881] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1609.195569] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1609.196259] do_syscall_64+0x33/0x40 [ 1609.196744] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1609.197408] RIP: 0033:0x7f95ced63b19 [ 1609.197895] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1609.200339] RSP: 002b:00007f95cc2d9188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1609.201339] RAX: ffffffffffffffda RBX: 00007f95cee76f60 RCX: 00007f95ced63b19 [ 1609.202285] RDX: 0000000000000000 RSI: 0000000020000100 RDI: 0000000000000000 [ 1609.203231] RBP: 00007f95cc2d91d0 R08: 0000000020003300 R09: 0000000000000000 [ 1609.204177] R10: 0000000000004020 R11: 0000000000000246 R12: 0000000000000002 [ 1609.205111] R13: 00007ffde6ceea9f R14: 00007f95cc2d9300 R15: 0000000000022000 [ 1609.208507] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.7'. [ 1609.229544] proc: Unknown parameter 'trans' [ 1609.962655] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.7'. 15:32:19 executing program 7: setsockopt(0xffffffffffffffff, 0x6, 0xc8b, &(0x7f0000000040)="70cb1b02afbae024623daa01dd9cde67a588133c2325104311c2c50904b63ec3c8796b8214988832fbbcaea9d3f35864d40e5740d50bd099c32f824b2d708a069a665e6a4da0ea8db94ecb1d9041a1bf2cf76266fb6f059205b184b1a937a67e10a159de6ac9ec36a9330f191198ef61055ccc85b52a1a7d03d5ef42de9ffc3123ec3b5862fdd6fc703fc7b689f93b9f35ce301876522346a0aa9b776fd5af775899351c9a6a49ce920a0d396e27ab8eb29a7e0c37cf68bca0505cb1ad867b38745eb0fd99d7ddf0cd450f53976a81528da7e20b5ba7cd83c2cd26701929947b", 0xe0) setsockopt$IP_VS_SO_SET_DEL(0xffffffffffffffff, 0x0, 0x484, &(0x7f0000000140)={0x0, @remote, 0x4e22, 0x0, 'rr\x00', 0x4, 0xfffffff7, 0x7b}, 0x2c) r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCSBRKP(r0, 0x5425, 0x994a) 15:32:19 executing program 1: syz_open_dev$tty1(0xc, 0x4, 0x1) pipe(&(0x7f0000000000)={0xffffffffffffffff}) fchdir(r0) ioctl$KDGKBDIACR(0xffffffffffffffff, 0x4b4a, &(0x7f0000000180)=""/240) r1 = openat$urandom(0xffffffffffffff9c, &(0x7f00000000c0), 0x80400, 0x0) close(r1) ioctl$TIOCL_SCROLLCONSOLE(0xffffffffffffffff, 0x541c, &(0x7f0000000080)={0xd, 0x1f}) r2 = syz_open_pts(r0, 0x440900) ioctl$KDFONTOP_COPY(r2, 0x4b72, &(0x7f0000000040)={0x3, 0x1, 0x8, 0xf, 0x67, &(0x7f0000000280)}) 15:32:19 executing program 6: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDGKBMODE(r0, 0x4b44, &(0x7f0000000000)) (fail_nth: 8) 15:32:19 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x5407, &(0x7f0000000080)={0x7, 0x0, 0x1b, 0x0, 0x2, "bb09819e2f6e8485"}) 15:32:19 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x4b72, 0x0) 15:32:19 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCSTI(r0, 0x5412, &(0x7f0000000040)=0x1) r1 = dup(r0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r1, 0xc0189375, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) ioctl$TCSETAW(r2, 0x540a, 0x0) 15:32:19 executing program 5: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, 0x0) mount$9p_tcp(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x4020, &(0x7f0000003300)) (fail_nth: 13) 15:32:19 executing program 4: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1c08a4, 0x0) r1 = syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) open$dir(&(0x7f0000000200)='./mnt\x00', 0x40040, 0x10) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir/../file0\x00', 0x80, 0x0) r2 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x50008, 0x0, 0x10081, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r3 = openat(r1, &(0x7f0000000000)='mnt/encrypted_dir/../file0\x00', 0x40, 0x100) r4 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r4, 0x7, 0x0, 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r4, 0xc0406619, &(0x7f00000001c0)={@desc={0x1, 0x0, @desc2}}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000140)=',,\\\x00') futimesat(r3, &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0)={{0x0, 0xea60}}) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000680)=ANY=[@ANYBLOB="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", @ANYRES32, @ANYBLOB="02000000000000006d6e742f656e637279707465645f6469722f2e2e2f66696c653000"]) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') [ 1622.059322] proc: Unknown parameter 'trans' [ 1622.065601] FAULT_INJECTION: forcing a failure. [ 1622.065601] name failslab, interval 1, probability 0, space 0, times 0 [ 1622.067999] CPU: 1 PID: 10010 Comm: syz-executor.6 Not tainted 5.10.250 #1 [ 1622.069460] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1622.071186] Call Trace: [ 1622.071733] dump_stack+0x107/0x167 [ 1622.072495] should_fail.cold+0x5/0xa [ 1622.073295] ? create_object.isra.0+0x3a/0xa30 [ 1622.074233] should_failslab+0x5/0x20 [ 1622.075081] kmem_cache_alloc+0x5b/0x310 [ 1622.075959] create_object.isra.0+0x3a/0xa30 [ 1622.076889] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1622.077987] kmem_cache_alloc+0x159/0x310 [ 1622.078875] __anon_vma_prepare+0x62/0x500 [ 1622.079780] ? __pte_alloc+0x194/0x330 [ 1622.080623] handle_mm_fault+0x2b2d/0x3500 [ 1622.081524] ? __lock_acquire+0x1657/0x5b00 [ 1622.082433] ? __pmd_alloc+0x630/0x630 [ 1622.083251] ? vmacache_find+0x55/0x2a0 [ 1622.084091] ? vmacache_update+0xce/0x140 [ 1622.084979] do_user_addr_fault+0x56e/0xc60 [ 1622.085917] exc_page_fault+0xa2/0x1a0 [ 1622.086740] asm_exc_page_fault+0x1e/0x30 [ 1622.087623] RIP: 0010:__put_user_nocheck_4+0x3/0x11 [ 1622.088655] Code: 00 00 48 39 d9 73 54 0f 01 cb 66 89 01 31 c9 0f 01 ca e9 91 66 1c 02 90 48 bb fd ef ff ff ff 7f 00 00 48 39 d9 73 34 0f 01 cb <89> 01 31 c9 0f 01 ca e9 72 66 1c 02 66 90 48 bb f9 ef ff ff ff 7f [ 1622.092495] RSP: 0018:ffff8880440d7b98 EFLAGS: 00050297 [ 1622.093625] RAX: 0000000000000000 RBX: 00007fffffffeffd RCX: 0000000020000000 [ 1622.095132] RDX: 0000000000040000 RSI: ffffffff822ad210 RDI: ffffffff84648724 [ 1622.096632] RBP: ffff888043438000 R08: 0000000000000000 R09: 0000000000000000 [ 1622.097184] FAULT_INJECTION: forcing a failure. [ 1622.097184] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1622.098136] R10: 0000000000000003 R11: 0000000000000001 R12: 0000000020000000 [ 1622.098147] R13: 0000000000000001 R14: 0000000000004b44 R15: 0000000000004b44 [ 1622.098178] ? vt_do_kdgkbmode+0xd0/0x100 [ 1622.098205] vt_ioctl+0x4bc/0x2c90 [ 1622.105218] ? vt_waitactive+0x3a0/0x3a0 [ 1622.106076] ? __lock_acquire+0xbb1/0x5b00 [ 1622.107014] ? find_held_lock+0x2c/0x110 [ 1622.107868] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1622.108984] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 1622.110071] ? vt_waitactive+0x3a0/0x3a0 [ 1622.110946] tty_ioctl+0x862/0x18b0 [ 1622.111707] ? tty_fasync+0x390/0x390 [ 1622.112496] ? ioctl_has_perm.constprop.0.isra.0+0x29a/0x410 [ 1622.113698] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 1622.114774] ? do_vfs_ioctl+0x283/0x10d0 [ 1622.115613] ? selinux_bprm_creds_for_exec+0xb60/0xb60 [ 1622.116714] ? generic_block_fiemap+0x60/0x60 [ 1622.117655] ? lock_downgrade+0x6d0/0x6d0 [ 1622.118534] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1622.119562] ? wait_for_completion_io+0x270/0x270 [ 1622.120573] ? selinux_file_ioctl+0xb6/0x270 [ 1622.121488] ? tty_fasync+0x390/0x390 [ 1622.122287] __x64_sys_ioctl+0x19a/0x210 [ 1622.123155] do_syscall_64+0x33/0x40 [ 1622.123935] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1622.125005] RIP: 0033:0x7f4fcc18db19 [ 1622.125789] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1622.129687] RSP: 002b:00007f4fc9703188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1622.131295] RAX: ffffffffffffffda RBX: 00007f4fcc2a0f60 RCX: 00007f4fcc18db19 [ 1622.132792] RDX: 0000000020000000 RSI: 0000000000004b44 RDI: 0000000000000003 [ 1622.134297] RBP: 00007f4fc97031d0 R08: 0000000000000000 R09: 0000000000000000 [ 1622.135802] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1622.137309] R13: 00007ffdf8625b7f R14: 00007f4fc9703300 R15: 0000000000022000 [ 1622.138843] CPU: 0 PID: 10005 Comm: syz-executor.5 Not tainted 5.10.250 #1 [ 1622.140300] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1622.142050] Call Trace: [ 1622.142609] dump_stack+0x107/0x167 [ 1622.143376] should_fail.cold+0x5/0xa [ 1622.144174] _copy_to_user+0x2e/0x180 [ 1622.144987] simple_read_from_buffer+0xcc/0x160 [ 1622.145947] proc_fail_nth_read+0x198/0x230 [ 1622.146861] ? proc_sessionid_read+0x230/0x230 [ 1622.147822] ? security_file_permission+0xb1/0xe0 [ 1622.148851] ? proc_sessionid_read+0x230/0x230 [ 1622.149807] vfs_read+0x228/0x620 [ 1622.150537] ksys_read+0x12d/0x260 [ 1622.151289] ? vfs_write+0xb10/0xb10 [ 1622.152068] ? ksys_read+0x260/0x260 [ 1622.152864] do_syscall_64+0x33/0x40 [ 1622.153644] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1622.154716] RIP: 0033:0x7f95ced1669c [ 1622.155493] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 1622.159376] RSP: 002b:00007f95cc2d9170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1622.160958] RAX: ffffffffffffffda RBX: ffffffffffffffff RCX: 00007f95ced1669c [ 1622.162442] RDX: 000000000000000f RSI: 00007f95cc2d91e0 RDI: 0000000000000003 [ 1622.163941] RBP: 00007f95cc2d91d0 R08: 0000000000000000 R09: 0000000000000000 [ 1622.165449] R10: 0000000000004020 R11: 0000000000000246 R12: 0000000000000002 [ 1622.166955] R13: 00007ffde6ceea9f R14: 00007f95cc2d9300 R15: 0000000000022000 15:32:19 executing program 2: r0 = openat$random(0xffffffffffffff9c, &(0x7f00000000c0), 0x40800, 0x0) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000100), 0x100, 0x0) r2 = signalfd(r0, &(0x7f0000000140)={[0x6]}, 0x8) sendfile(r1, r2, &(0x7f0000000180)=0x2, 0x5) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r3, 0x540a, 0x0) ioctl$GIO_UNISCRNMAP(r3, 0x4b69, &(0x7f0000000000)=""/132) 15:32:19 executing program 0: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000000100)=ANY=[@ANYRESDEC=0x0, @ANYRES32=r0, @ANYBLOB="fbb86a9d0000000100f904f25914c056"]) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f00000000c0)={0xc000200b}) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, &(0x7f0000000140)={r0, 0x4, 0x2, 0x2}) fsconfig$FSCONFIG_CMD_RECONFIGURE(r2, 0x7, 0x0, 0x0, 0x0) ioctl$HIDIOCSFLAG(r0, 0x4004480f, &(0x7f0000000000)=0x3) ioctl$HIDIOCGFIELDINFO(r0, 0xc038480a, &(0x7f0000000040)={0x3, 0x3, 0xcc, 0x1000, 0x200, 0x3, 0x2, 0x1, 0x7202, 0x1000, 0x0, 0x9, 0x3f, 0xdec7}) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r3, 0x5407, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "bb09819e2f6e8485"}) 15:32:19 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x4) ioctl$KDGKBDIACR(r0, 0x4b4a, &(0x7f0000000180)=""/240) 15:32:19 executing program 4: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1c08a4, 0x0) r1 = syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) open$dir(&(0x7f0000000200)='./mnt\x00', 0x40040, 0x10) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir/../file0\x00', 0x80, 0x0) r2 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x50008, 0x0, 0x10081, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r3 = openat(r1, &(0x7f0000000000)='mnt/encrypted_dir/../file0\x00', 0x40, 0x100) r4 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r4, 0x7, 0x0, 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r4, 0xc0406619, &(0x7f00000001c0)={@desc={0x1, 0x0, @desc2}}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000140)=',,\\\x00') futimesat(r3, &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0)={{0x0, 0xea60}}) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000680)=ANY=[@ANYBLOB="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", @ANYRES32, @ANYBLOB="02000000000000006d6e742f656e637279707465645f6469722f2e2e2f66696c653000"]) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') 15:32:19 executing program 6: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDGKBMODE(r0, 0x4b44, &(0x7f0000000000)) (fail_nth: 9) 15:32:19 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_dev$vcsu(&(0x7f0000000000), 0x3, 0x400040) ioctl$TIOCSSOFTCAR(r1, 0x541a, &(0x7f0000000040)) ioctl$KDGKBDIACR(r0, 0x4b4a, &(0x7f0000000180)=""/240) 15:32:19 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x4bfa, 0x0) [ 1622.273859] FAULT_INJECTION: forcing a failure. [ 1622.273859] name failslab, interval 1, probability 0, space 0, times 0 [ 1622.277700] CPU: 1 PID: 10025 Comm: syz-executor.6 Not tainted 5.10.250 #1 [ 1622.279160] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1622.280884] Call Trace: [ 1622.281435] dump_stack+0x107/0x167 [ 1622.282201] should_fail.cold+0x5/0xa [ 1622.283011] ? __anon_vma_prepare+0x270/0x500 [ 1622.283930] should_failslab+0x5/0x20 [ 1622.284728] kmem_cache_alloc+0x5b/0x310 [ 1622.285583] __anon_vma_prepare+0x270/0x500 [ 1622.286468] ? __pte_alloc+0x194/0x330 [ 1622.287293] handle_mm_fault+0x2b2d/0x3500 [ 1622.288197] ? __lock_acquire+0x1657/0x5b00 [ 1622.289104] ? __pmd_alloc+0x630/0x630 [ 1622.289917] ? vmacache_find+0x55/0x2a0 [ 1622.290742] ? vmacache_update+0xce/0x140 [ 1622.291624] do_user_addr_fault+0x56e/0xc60 [ 1622.292526] exc_page_fault+0xa2/0x1a0 [ 1622.293333] asm_exc_page_fault+0x1e/0x30 [ 1622.294202] RIP: 0010:__put_user_nocheck_4+0x3/0x11 [ 1622.295243] Code: 00 00 48 39 d9 73 54 0f 01 cb 66 89 01 31 c9 0f 01 ca e9 91 66 1c 02 90 48 bb fd ef ff ff ff 7f 00 00 48 39 d9 73 34 0f 01 cb <89> 01 31 c9 0f 01 ca e9 72 66 1c 02 66 90 48 bb f9 ef ff ff ff 7f [ 1622.299094] RSP: 0018:ffff888046837b98 EFLAGS: 00050297 [ 1622.300201] RAX: 0000000000000000 RBX: 00007fffffffeffd RCX: 0000000020000000 [ 1622.301692] RDX: 0000000000040000 RSI: ffffffff822ad210 RDI: ffffffff84648724 [ 1622.303172] RBP: ffff888043438000 R08: 0000000000000000 R09: 0000000000000000 [ 1622.304639] R10: 0000000000000003 R11: 0000000000000001 R12: 0000000020000000 [ 1622.306115] R13: 0000000000000001 R14: 0000000000004b44 R15: 0000000000004b44 [ 1622.307649] ? vt_do_kdgkbmode+0xd0/0x100 [ 1622.308517] vt_ioctl+0x4bc/0x2c90 [ 1622.309253] ? vt_waitactive+0x3a0/0x3a0 [ 1622.310101] ? __lock_acquire+0xbb1/0x5b00 [ 1622.310990] ? find_held_lock+0x2c/0x110 [ 1622.311833] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1622.312920] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 1622.313991] ? vt_waitactive+0x3a0/0x3a0 [ 1622.314864] tty_ioctl+0x862/0x18b0 [ 1622.315615] ? tty_fasync+0x390/0x390 [ 1622.316404] ? ioctl_has_perm.constprop.0.isra.0+0x29a/0x410 [ 1622.317598] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 1622.318682] ? do_vfs_ioctl+0x283/0x10d0 [ 1622.319530] ? selinux_bprm_creds_for_exec+0xb60/0xb60 [ 1622.320640] ? generic_block_fiemap+0x60/0x60 [ 1622.321578] ? lock_downgrade+0x6d0/0x6d0 [ 1622.322436] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1622.323465] ? wait_for_completion_io+0x270/0x270 [ 1622.324474] ? selinux_file_ioctl+0xb6/0x270 [ 1622.325377] ? tty_fasync+0x390/0x390 [ 1622.326167] __x64_sys_ioctl+0x19a/0x210 [ 1622.327021] do_syscall_64+0x33/0x40 [ 1622.327781] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1622.328854] RIP: 0033:0x7f4fcc18db19 15:32:20 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDGKBDIACR(r0, 0x4b4a, &(0x7f0000000180)=""/240) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCSARP(r1, 0x8955, &(0x7f0000000000)={{0x2, 0x0, @local}, {0x0, @local}, 0x20, {0x2, 0x0, @local}, 'dummy0\x00'}) ioctl$AUTOFS_IOC_PROTOVER(r0, 0x80049363, &(0x7f00000000c0)) r2 = pidfd_getfd(0xffffffffffffffff, r0, 0x0) ioctl$KDSETMODE(r2, 0x4b3a, 0x1) r3 = dup2(r2, r1) ioctl$TIOCL_SETSEL(r3, 0x541c, &(0x7f0000000080)={0x2, {0x2, 0x1, 0x430, 0x8, 0x800, 0xf}}) r4 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r4, 0x7, 0x0, 0x0, 0x0) ioctl$TIOCL_SCROLLCONSOLE(r4, 0x541c, &(0x7f0000000040)) [ 1622.329630] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1622.333599] RSP: 002b:00007f4fc9703188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1622.335180] RAX: ffffffffffffffda RBX: 00007f4fcc2a0f60 RCX: 00007f4fcc18db19 [ 1622.336645] RDX: 0000000020000000 RSI: 0000000000004b44 RDI: 0000000000000003 [ 1622.338114] RBP: 00007f4fc97031d0 R08: 0000000000000000 R09: 0000000000000000 [ 1622.339593] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1622.341066] R13: 00007ffdf8625b7f R14: 00007f4fc9703300 R15: 0000000000022000 [ 1762.557356] kworker/dying (65) used greatest stack depth: 22848 bytes left VM DIAGNOSIS: 15:37:22 Registers: info registers vcpu 0 RAX=0000000000000000 RBX=0000000000000000 RCX=0000000000000001 RDX=0000000000000000 RSI=00000000ffffffff RDI=ffffffff84ff9c20 RBP=ffffffff84ff9c20 RSP=ffff88801ac8f8a8 R8 =0000000000000001 R9 =ffff8880434380cf R10=0000000000000000 R11=0000000000000001 R12=ffff88802018b480 R13=ffff8880434380c8 R14=00000000ffffffff R15=0000000000000000 RIP=ffffffff83e87314 RFL=00000246 [---Z-P-] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 00007f1ac18e3700 00000000 00000000 GS =0000 ffff88806ce00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe0000003000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000001000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00007fea439bf010 CR3=0000000044c6e000 CR4=00350ef0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 XMM00=00000000000000000000000000000000 XMM01=7465677261742e79636e656772656d65 XMM02=ffffffffffffff0f0e0d0c0b0a090807 XMM03=00000000000004f10065636976726573 XMM04=40404040404040404040404040404040 XMM05=5a5a5a5a5a5a5a5a5a5a5a5a5a5a5a5a XMM06=20202020202020202020202020202020 XMM07=00000000000000000000000000000000 XMM08=732f6563696c732e6d65747379732f3a XMM09=00000000000000000000000000000000 XMM10=00000000000000000000200000000000 XMM11=00000000000000000000000000000000 XMM12=00000000000000000000000000000000 XMM13=00000000000000000000000000000000 XMM14=00000000000000000000000000000000 XMM15=00000000000000000000000000000000 info registers vcpu 1 RAX=dffffc0000000000 RBX=0000000000000000 RCX=0000000000000001 RDX=1ffff11008687025 RSI=ffffffff84ff9b60 RDI=ffff888043438128 RBP=0000000000000000 RSP=ffff888044087908 R8 =0000000000000000 R9 =ffff8880434380cf R10=0000000000000000 R11=0000000000000001 R12=dffffc0000000000 R13=ffff8880434380c8 R14=ffff888044087b30 R15=0000000000000000 RIP=ffffffff83e96a43 RFL=00000246 [---Z-P-] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 00007f1ac18a1700 00000000 00000000 GS =0000 ffff88806cf00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe000004a000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000048000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00007fea424d92b8 CR3=0000000044c6e000 CR4=00350ee0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001fa0 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 XMM00=00000000000000000000000000000000 XMM01=00e201fe016c6c6f502e726567616e61 XMM02=51fc84884353fc4d574851fc0401039a XMM03=0000060606060401db6ffe51fc0108d3 XMM04=11c351fc0801039aff3900df01fe016c XMM05=21beaf53fcb4d29f53fc71a79b6ffc9b XMM06=fc5dbeeb95fca518406cfcb4176851fc XMM07=000006060606060606060801d3406a51 XMM08=726f74756365786511006c61746f7420 XMM09=20636578650800737472617473657220 XMM10=0e007a7a7566206365786509006e6567 XMM11=0a006574616469646e61632063657865 XMM12=636578650a006873616d732063657865 XMM13=69727420636578650b00736465657320 XMM14=696d696e696d20636578650d00656761 XMM15=000073746e696820636578650a00657a