[], 0x1000000c8) splice(r3, 0x0, r5, 0x0, 0x18102, 0x0) 04:30:17 executing program 2: syz_mount_image$msdos(&(0x7f00000002c0)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a020002740ef801", 0x17}], 0x10, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) fsconfig$FSCONFIG_SET_FLAG(r1, 0x6, &(0x7f00000000c0)='posixacl\x00', 0x0, 0x0) ioctl$UI_SET_SWBIT(r1, 0x4004556d, 0x1) syz_genetlink_get_family_id$smc(&(0x7f0000000040)='SMC_PNETID\x00') ftruncate(r0, 0x5) 04:30:17 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0xfffff000, 0x0) 04:30:17 executing program 0: syz_mount_image$msdos(&(0x7f00000002c0)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xfffffffb, 0x0, &(0x7f0000000080), 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) dup3(r0, 0xffffffffffffffff, 0x0) 04:30:17 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x7, 0x0) 04:30:17 executing program 3: r0 = memfd_create(&(0x7f0000001780)='\xd8\x05V\x15\xa5e\xf1\xb8\xf6\xa2\xba\x85\xb95\x03<\xb9;\xcd\x86\x8bD\xf9\xe9L\xe1Q\xfc\xe2\x97\xa0\xe8s\xb2\x11\xef\x1ac\xc9\x89\xc7\x0fv1\xa1:h\xf6\xf5\a\x8c\xf0Ay\x03\x97\xe77\xc1\xc8\xa6\xcb\xd2\xbe\xe9\xd2\xfb{u\xc3\xcd\xba\xa8G`9\xb5\x82\xa9p\xc8)\xe5$b\v\x8e\b\xf4\xf0\x11\xb4\xcb\"\xf4\xf3\xb4|\xdf\xa3\xdd\x9c\x8a\xf4D\xd3\xea\x11c}\x86H\xca=;i\x96\x183h\xba\x1a\x10', 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000380)='/dev/nullb0\x00', 0x0, 0x0) io_setup(0x1, &(0x7f00000004c0)=0x0) io_submit(r4, 0x68, &(0x7f00000000c0)=[&(0x7f0000000140)={0x3a004000, 0x2759, 0x10, 0x0, 0x0, r3, &(0x7f0000000000)="98", 0x3e80000000, 0x0, 0x0, 0x2}]) [ 320.528562][T13213] FAT-fs (loop0): bogus number of reserved sectors 04:30:17 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x8, 0x0) [ 320.588264][T13213] FAT-fs (loop0): Can't find a valid FAT filesystem 04:30:17 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0xfffffdf9, 0x0) [ 320.670371][T13213] FAT-fs (loop0): bogus number of reserved sectors 04:30:17 executing program 2: syz_mount_image$msdos(&(0x7f00000002c0)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a020002740ef801", 0x17}], 0x10, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) ftruncate(r0, 0x5) [ 320.712243][T13213] FAT-fs (loop0): Can't find a valid FAT filesystem 04:30:18 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0xffffff7f, 0x0) 04:30:18 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0xf, 0x0) 04:30:18 executing program 0: syz_mount_image$msdos(&(0x7f00000002c0)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a020002740ef801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$batadv(&(0x7f0000000000)='batadv\x00') sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r1, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)={0x14, r2, 0x301, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) fsconfig$FSCONFIG_SET_FLAG(r5, 0x6, &(0x7f00000000c0)='posixacl\x00', 0x0, 0x0) ioctl$CHAR_RAW_RRPART(r5, 0x125f, 0x0) sendmsg$TIPC_NL_LINK_SET(r3, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000300)={0x40, r4, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_LINK={0x2c, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_PROP={0x14, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x5}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5ca}]}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}]}]}, 0x40}}, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$batadv(&(0x7f0000000000)='batadv\x00') sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r6, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)={0x14, r7, 0x301, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) sendfile(r6, r1, &(0x7f0000000200), 0x0) sendmsg$TIPC_NL_SOCK_GET(r1, &(0x7f00000001c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000400)=ANY=[@ANYBLOB="d0030000", @ANYRES16=r4, @ANYBLOB="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"], 0x3d0}, 0x1, 0x0, 0x0, 0x4040040}, 0x20000000) r8 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) dup3(r8, r0, 0x0) [ 321.276631][ T29] audit: type=1804 audit(1596688218.509:264): pid=13250 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir858755101/syzkaller.FYnl5i/189/file1/bus" dev="loop0" ino=212 res=1 [ 321.351876][ T29] audit: type=1804 audit(1596688218.569:265): pid=13250 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir858755101/syzkaller.FYnl5i/189/file1/bus" dev="loop0" ino=212 res=1 04:30:19 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket(0x10, 0x3, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$inet_udp(0x2, 0x2, 0x0) close(r5) sendto$llc(0xffffffffffffffff, &(0x7f0000000140)="7653bbc6175a3d2b8b43d6fab096", 0xe, 0x40080, &(0x7f00000000c0)={0x1a, 0x1, 0x6, 0x0, 0x0, 0x1, @random="646b0c1887fa"}, 0x10) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88882, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0x2}) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @loopback}}) write$binfmt_misc(r4, &(0x7f0000000140)=ANY=[], 0x1000000c8) splice(r3, 0x0, r5, 0x0, 0x18102, 0x0) 04:30:19 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0xffffff8c, 0x0) 04:30:19 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x10, 0x0) 04:30:19 executing program 2 (fault-call:3 fault-nth:0): mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, 0x0, &(0x7f00000001c0)) socket(0x0, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000200)={0x0, 'veth1_macvtap\x00'}) 04:30:19 executing program 3: r0 = memfd_create(&(0x7f0000001780)='\xd8\x05V\x15\xa5e\xf1\xb8\xf6\xa2\xba\x85\xb95\x03<\xb9;\xcd\x86\x8bD\xf9\xe9L\xe1Q\xfc\xe2\x97\xa0\xe8s\xb2\x11\xef\x1ac\xc9\x89\xc7\x0fv1\xa1:h\xf6\xf5\a\x8c\xf0Ay\x03\x97\xe77\xc1\xc8\xa6\xcb\xd2\xbe\xe9\xd2\xfb{u\xc3\xcd\xba\xa8G`9\xb5\x82\xa9p\xc8)\xe5$b\v\x8e\b\xf4\xf0\x11\xb4\xcb\"\xf4\xf3\xb4|\xdf\xa3\xdd\x9c\x8a\xf4D\xd3\xea\x11c}\x86H\xca=;i\x96\x183h\xba\x1a\x10', 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000380)='/dev/nullb0\x00', 0x0, 0x0) io_setup(0x1, &(0x7f00000004c0)=0x0) io_submit(r4, 0x70, &(0x7f00000000c0)=[&(0x7f0000000140)={0x3a004000, 0x2759, 0x10, 0x0, 0x0, r3, &(0x7f0000000000)="98", 0x3e80000000, 0x0, 0x0, 0x2}]) 04:30:19 executing program 0: syz_mount_image$msdos(&(0x7f00000002c0)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a020002740ef801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$EVIOCGABS0(r1, 0x80184540, &(0x7f0000000180)) r2 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) dup3(r2, r0, 0x0) 04:30:19 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0xfffffff6, 0x0) [ 322.079544][ T29] audit: type=1804 audit(1596688219.309:266): pid=13271 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir858755101/syzkaller.FYnl5i/190/file1/bus" dev="loop0" ino=213 res=1 04:30:19 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0xedc000000000, 0x0) [ 322.123263][T13276] FAULT_INJECTION: forcing a failure. [ 322.123263][T13276] name failslab, interval 1, probability 0, space 0, times 0 04:30:19 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0xf0, 0x0) [ 322.197143][T13276] CPU: 1 PID: 13276 Comm: syz-executor.2 Not tainted 5.8.0-syzkaller #0 [ 322.205500][T13276] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 322.215565][T13276] Call Trace: [ 322.218884][T13276] dump_stack+0x18f/0x20d [ 322.222295][ T29] audit: type=1804 audit(1596688219.349:267): pid=13278 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir858755101/syzkaller.FYnl5i/190/file1/bus" dev="loop0" ino=213 res=1 [ 322.223225][T13276] should_fail.cold+0x5/0x14 [ 322.223241][T13276] ? strndup_user+0x70/0xe0 [ 322.223260][T13276] ? strndup_user+0x70/0xe0 [ 322.260158][T13276] should_failslab+0x5/0xf [ 322.264593][T13276] __kmalloc_track_caller+0x27b/0x330 [ 322.269974][T13276] ? strnlen_user+0x10/0x2f0 [ 322.274574][T13276] memdup_user+0x22/0xd0 [ 322.278826][T13276] strndup_user+0x70/0xe0 [ 322.283170][T13276] __x64_sys_mount+0xe6/0x230 [ 322.287852][T13276] do_syscall_64+0x2d/0x70 [ 322.292282][T13276] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 322.298180][T13276] RIP: 0033:0x45ccd9 [ 322.302077][T13276] Code: 2d b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 fb b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 322.322726][T13276] RSP: 002b:00007f2eab139c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 322.331148][T13276] RAX: ffffffffffffffda RBX: 0000000000020440 RCX: 000000000045ccd9 [ 322.339132][T13276] RDX: 0000000020000040 RSI: 0000000020000180 RDI: 0000000020000240 04:30:19 executing program 0: syz_mount_image$msdos(&(0x7f00000002c0)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a020002740ef801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x20) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000001400)={&(0x7f0000000140)=@pppoe={0x18, 0x0, {0x0, @dev}}, 0x80, &(0x7f0000000280)=[{&(0x7f0000000400)=""/4096, 0x1000}, {&(0x7f00000001c0)=""/149, 0x95}], 0x2, &(0x7f0000000300)=""/156, 0x9c}, 0x162) r2 = dup3(r1, r0, 0x0) setsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r2, 0x84, 0xc, &(0x7f0000001440)=0x8001, 0x4) [ 322.347121][T13276] RBP: 00007f2eab139ca0 R08: 0000000000000000 R09: 0000000000000000 [ 322.355107][T13276] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 322.363115][T13276] R13: 00007ffe478d2fff R14: 00007f2eab13a9c0 R15: 000000000078bf0c 04:30:19 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x1000000000000, 0x0) 04:30:19 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x300, 0x0) [ 322.653688][ T29] audit: type=1804 audit(1596688219.889:268): pid=13296 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir858755101/syzkaller.FYnl5i/191/file1/bus" dev="loop0" ino=214 res=1 [ 322.774305][ T29] audit: type=1804 audit(1596688219.939:269): pid=13296 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir858755101/syzkaller.FYnl5i/191/file1/bus" dev="loop0" ino=214 res=1 04:30:20 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket(0x10, 0x3, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$inet_udp(0x2, 0x2, 0x0) close(r5) sendto$llc(0xffffffffffffffff, &(0x7f0000000140)="7653bbc6175a3d2b8b43d6fab096eaaa", 0x10, 0x40080, &(0x7f00000000c0)={0x1a, 0x1, 0x6, 0x0, 0x0, 0x1, @random="646b0c1887fa"}, 0x10) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88882, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0x2}) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @loopback}}) write$binfmt_misc(r4, &(0x7f0000000140)=ANY=[], 0x1000000c8) splice(r3, 0x0, r5, 0x0, 0x18102, 0x0) 04:30:20 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0xf0ffffffffffff, 0x0) 04:30:20 executing program 0 (fault-call:2 fault-nth:0): mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) 04:30:20 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x500, 0x0) 04:30:20 executing program 3: r0 = memfd_create(&(0x7f0000001780)='\xd8\x05V\x15\xa5e\xf1\xb8\xf6\xa2\xba\x85\xb95\x03<\xb9;\xcd\x86\x8bD\xf9\xe9L\xe1Q\xfc\xe2\x97\xa0\xe8s\xb2\x11\xef\x1ac\xc9\x89\xc7\x0fv1\xa1:h\xf6\xf5\a\x8c\xf0Ay\x03\x97\xe77\xc1\xc8\xa6\xcb\xd2\xbe\xe9\xd2\xfb{u\xc3\xcd\xba\xa8G`9\xb5\x82\xa9p\xc8)\xe5$b\v\x8e\b\xf4\xf0\x11\xb4\xcb\"\xf4\xf3\xb4|\xdf\xa3\xdd\x9c\x8a\xf4D\xd3\xea\x11c}\x86H\xca=;i\x96\x183h\xba\x1a\x10', 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000380)='/dev/nullb0\x00', 0x0, 0x0) io_setup(0x1, &(0x7f00000004c0)=0x0) io_submit(r4, 0x78, &(0x7f00000000c0)=[&(0x7f0000000140)={0x3a004000, 0x2759, 0x10, 0x0, 0x0, r3, &(0x7f0000000000)="98", 0x3e80000000, 0x0, 0x0, 0x2}]) 04:30:20 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, 0x0, &(0x7f00000001c0)) socket(0x0, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000200)={0x0, 'veth1_macvtap\x00'}) [ 323.417383][T13321] FAULT_INJECTION: forcing a failure. [ 323.417383][T13321] name failslab, interval 1, probability 0, space 0, times 0 [ 323.436758][ T23] FS-Cache: Duplicate cookie detected [ 323.442348][ T23] FS-Cache: O-cookie c=0000000011f88098 [p=00000000a00f4ec0 fl=212 nc=0 na=0] [ 323.451300][ T23] FS-Cache: O-cookie d=0000000000000000 n=0000000000000000 [ 323.458618][ T23] FS-Cache: O-key=[2] 'e9e7' [ 323.463347][ T23] FS-Cache: N-cookie c=000000004a0101da [p=00000000a00f4ec0 fl=2 nc=0 na=1] [ 323.472120][ T23] FS-Cache: N-cookie d=0000000035364e0c n=00000000ff6ce597 [ 323.473112][T13321] CPU: 0 PID: 13321 Comm: syz-executor.0 Not tainted 5.8.0-syzkaller #0 [ 323.479324][ T23] FS-Cache: N-key=[2] 'e9e7' [ 323.487618][T13321] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 323.487624][T13321] Call Trace: [ 323.487647][T13321] dump_stack+0x18f/0x20d [ 323.487668][T13321] should_fail.cold+0x5/0x14 [ 323.487684][T13321] ? strndup_user+0x70/0xe0 [ 323.487699][T13321] ? strndup_user+0x70/0xe0 [ 323.487719][T13321] should_failslab+0x5/0xf [ 323.527906][T13321] __kmalloc_track_caller+0x27b/0x330 [ 323.533298][T13321] memdup_user+0x22/0xd0 [ 323.537557][T13321] strndup_user+0x70/0xe0 [ 323.541894][T13321] __x64_sys_mount+0xe6/0x230 [ 323.546583][T13321] do_syscall_64+0x2d/0x70 [ 323.551013][T13321] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 323.556910][T13321] RIP: 0033:0x45ccd9 [ 323.560813][T13321] Code: 2d b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 fb b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 323.580423][T13321] RSP: 002b:00007f0dc3524c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 323.588846][T13321] RAX: ffffffffffffffda RBX: 0000000000020440 RCX: 000000000045ccd9 [ 323.596826][T13321] RDX: 0000000020000040 RSI: 0000000020000180 RDI: 0000000020000240 [ 323.604808][T13321] RBP: 00007f0dc3524ca0 R08: 0000000000000000 R09: 0000000000000000 04:30:20 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x600, 0x0) 04:30:20 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x100000000000000, 0x0) [ 323.612791][T13321] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 323.620862][T13321] R13: 00007fffca27905f R14: 00007f0dc35259c0 R15: 000000000078bf0c 04:30:20 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="25e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, 0x0, &(0x7f00000001c0)) socket(0x0, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000200)={0x0, 'veth1_macvtap\x00'}) 04:30:20 executing program 0 (fault-call:2 fault-nth:1): mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) 04:30:21 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x200000000000000, 0x0) 04:30:21 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x700, 0x0) [ 323.975441][T13342] FAULT_INJECTION: forcing a failure. [ 323.975441][T13342] name failslab, interval 1, probability 0, space 0, times 0 [ 324.029456][T13342] CPU: 1 PID: 13342 Comm: syz-executor.0 Not tainted 5.8.0-syzkaller #0 [ 324.037822][T13342] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 324.047884][T13342] Call Trace: [ 324.051191][T13342] dump_stack+0x18f/0x20d [ 324.055540][T13342] should_fail.cold+0x5/0x14 [ 324.060143][T13342] ? strndup_user+0x70/0xe0 [ 324.064766][T13342] ? strndup_user+0x70/0xe0 [ 324.069280][T13342] should_failslab+0x5/0xf [ 324.073711][T13342] __kmalloc_track_caller+0x27b/0x330 [ 324.079097][T13342] ? _copy_from_user+0x138/0x190 [ 324.084046][T13342] memdup_user+0x22/0xd0 [ 324.088305][T13342] strndup_user+0x70/0xe0 [ 324.092751][T13342] __x64_sys_mount+0x12f/0x230 [ 324.097529][T13342] do_syscall_64+0x2d/0x70 [ 324.101959][T13342] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 324.107854][T13342] RIP: 0033:0x45ccd9 [ 324.111753][T13342] Code: 2d b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 fb b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 324.131362][T13342] RSP: 002b:00007f0dc3524c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 324.139784][T13342] RAX: ffffffffffffffda RBX: 0000000000020440 RCX: 000000000045ccd9 [ 324.147770][T13342] RDX: 0000000020000040 RSI: 0000000020000180 RDI: 0000000020000240 [ 324.155752][T13342] RBP: 00007f0dc3524ca0 R08: 0000000000000000 R09: 0000000000000000 [ 324.163733][T13342] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 324.171715][T13342] R13: 00007fffca27905f R14: 00007f0dc35259c0 R15: 000000000078bf0c 04:30:21 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket(0x10, 0x3, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$inet_udp(0x2, 0x2, 0x0) close(r5) sendto$llc(0xffffffffffffffff, &(0x7f0000000140)="7653bbc6175a3d2b8b43d6fab096eaaa", 0x10, 0x40080, &(0x7f00000000c0)={0x1a, 0x1, 0x6, 0x0, 0x0, 0x1, @random="646b0c1887fa"}, 0x10) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88882, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0x2}) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @loopback}}) write$binfmt_misc(r4, &(0x7f0000000140)=ANY=[], 0x1000000c8) splice(r3, 0x0, r5, 0x0, 0x18102, 0x0) 04:30:21 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="3ce9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, 0x0, &(0x7f00000001c0)) socket(0x0, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000200)={0x0, 'veth1_macvtap\x00'}) 04:30:21 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x300000000000000, 0x0) 04:30:21 executing program 3: r0 = memfd_create(&(0x7f0000001780)='\xd8\x05V\x15\xa5e\xf1\xb8\xf6\xa2\xba\x85\xb95\x03<\xb9;\xcd\x86\x8bD\xf9\xe9L\xe1Q\xfc\xe2\x97\xa0\xe8s\xb2\x11\xef\x1ac\xc9\x89\xc7\x0fv1\xa1:h\xf6\xf5\a\x8c\xf0Ay\x03\x97\xe77\xc1\xc8\xa6\xcb\xd2\xbe\xe9\xd2\xfb{u\xc3\xcd\xba\xa8G`9\xb5\x82\xa9p\xc8)\xe5$b\v\x8e\b\xf4\xf0\x11\xb4\xcb\"\xf4\xf3\xb4|\xdf\xa3\xdd\x9c\x8a\xf4D\xd3\xea\x11c}\x86H\xca=;i\x96\x183h\xba\x1a\x10', 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000380)='/dev/nullb0\x00', 0x0, 0x0) io_setup(0x1, &(0x7f00000004c0)=0x0) io_submit(r4, 0x88, &(0x7f00000000c0)=[&(0x7f0000000140)={0x3a004000, 0x2759, 0x10, 0x0, 0x0, r3, &(0x7f0000000000)="98", 0x3e80000000, 0x0, 0x0, 0x2}]) 04:30:21 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0xf00, 0x0) 04:30:21 executing program 0 (fault-call:2 fault-nth:2): mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) [ 324.797902][T13365] kAFS: unparsable volume name 04:30:22 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x400000000000000, 0x0) [ 324.843131][T13366] FAULT_INJECTION: forcing a failure. [ 324.843131][T13366] name failslab, interval 1, probability 0, space 0, times 0 [ 324.904007][T13366] CPU: 0 PID: 13366 Comm: syz-executor.0 Not tainted 5.8.0-syzkaller #0 [ 324.912361][T13366] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 324.922424][T13366] Call Trace: [ 324.925730][T13366] dump_stack+0x18f/0x20d [ 324.930079][T13366] should_fail.cold+0x5/0x14 [ 324.934683][T13366] should_failslab+0x5/0xf [ 324.939112][T13366] kmem_cache_alloc+0x2a9/0x3b0 [ 324.943976][T13366] getname_flags.part.0+0x50/0x4f0 [ 324.949103][T13366] user_path_at_empty+0xa1/0x100 [ 324.954059][T13366] do_mount+0x140/0x1fe0 [ 324.958322][T13366] ? copy_mount_string+0x40/0x40 [ 324.963268][T13366] ? __might_fault+0x190/0x1d0 [ 324.968046][T13366] ? _copy_from_user+0x138/0x190 [ 324.973000][T13366] ? memdup_user+0x7c/0xd0 [ 324.977432][T13366] __x64_sys_mount+0x18f/0x230 [ 324.982212][T13366] do_syscall_64+0x2d/0x70 [ 324.986645][T13366] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 324.992660][T13366] RIP: 0033:0x45ccd9 [ 324.996574][T13366] Code: 2d b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 fb b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 325.016189][T13366] RSP: 002b:00007f0dc3524c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 325.024618][T13366] RAX: ffffffffffffffda RBX: 0000000000020440 RCX: 000000000045ccd9 [ 325.032606][T13366] RDX: 0000000020000040 RSI: 0000000020000180 RDI: 0000000020000240 [ 325.040591][T13366] RBP: 00007f0dc3524ca0 R08: 0000000000000000 R09: 0000000000000000 04:30:22 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x1020, 0x0) [ 325.048573][T13366] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 325.056553][T13366] R13: 00007fffca27905f R14: 00007f0dc35259c0 R15: 000000000078bf0c [ 325.102175][T13365] kAFS: unparsable volume name 04:30:22 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="5ce9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, 0x0, &(0x7f00000001c0)) socket(0x0, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000200)={0x0, 'veth1_macvtap\x00'}) 04:30:22 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x2000, 0x0) 04:30:22 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x500000000000000, 0x0) 04:30:22 executing program 0 (fault-call:2 fault-nth:3): mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) [ 325.322656][T13386] kAFS: unparsable volume name [ 325.418214][T13390] kAFS: unparsable volume name [ 325.554260][T13396] FAULT_INJECTION: forcing a failure. [ 325.554260][T13396] name failslab, interval 1, probability 0, space 0, times 0 [ 325.568061][T13396] CPU: 0 PID: 13396 Comm: syz-executor.0 Not tainted 5.8.0-syzkaller #0 [ 325.576398][T13396] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 325.586456][T13396] Call Trace: [ 325.589756][T13396] dump_stack+0x18f/0x20d [ 325.594103][T13396] should_fail.cold+0x5/0x14 [ 325.598715][T13396] ? tomoyo_encode2.part.0+0xe9/0x3a0 [ 325.604093][T13396] should_failslab+0x5/0xf [ 325.608512][T13396] __kmalloc+0x27d/0x340 [ 325.612763][T13396] tomoyo_encode2.part.0+0xe9/0x3a0 [ 325.617964][T13396] tomoyo_encode+0x28/0x50 [ 325.622385][T13396] tomoyo_mount_acl+0xe5/0x840 [ 325.627155][T13396] ? __lock_acquire+0xbb5/0x5640 [ 325.632101][T13396] ? tomoyo_check_mount_acl+0x1a0/0x1a0 [ 325.637657][T13396] ? lockdep_hardirqs_on_prepare+0x530/0x530 [ 325.643639][T13396] ? trace_hardirqs_on+0x5f/0x220 [ 325.648669][T13396] ? lockdep_hardirqs_on+0x76/0xf0 [ 325.653800][T13396] ? putname+0xe1/0x120 [ 325.657968][T13396] ? tomoyo_domain+0xb9/0x150 [ 325.662655][T13396] ? tomoyo_profile+0x42/0x50 [ 325.667342][T13396] tomoyo_mount_permission+0x151/0x3f0 [ 325.672808][T13396] ? tomoyo_mount_permission+0xfa/0x3f0 [ 325.678368][T13396] ? tomoyo_mount_acl+0x840/0x840 [ 325.683419][T13396] security_sb_mount+0x66/0xc0 [ 325.688199][T13396] do_mount+0x1c0/0x1fe0 [ 325.692537][T13396] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 325.698708][T13396] ? lockdep_hardirqs_on_prepare+0x354/0x530 [ 325.704718][T13396] ? trace_hardirqs_on+0x5f/0x220 [ 325.709750][T13396] ? copy_mount_string+0x40/0x40 [ 325.714695][T13396] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 325.720952][T13396] ? __x64_sys_mount+0x141/0x230 [ 325.725904][T13396] __x64_sys_mount+0x18f/0x230 [ 325.730679][T13396] do_syscall_64+0x2d/0x70 [ 325.735108][T13396] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 325.741003][T13396] RIP: 0033:0x45ccd9 [ 325.744910][T13396] Code: 2d b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 fb b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 325.764517][T13396] RSP: 002b:00007f0dc3524c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 325.772931][T13396] RAX: ffffffffffffffda RBX: 0000000000020440 RCX: 000000000045ccd9 [ 325.780905][T13396] RDX: 0000000020000040 RSI: 0000000020000180 RDI: 0000000020000240 [ 325.788878][T13396] RBP: 00007f0dc3524ca0 R08: 0000000000000000 R09: 0000000000000000 [ 325.796921][T13396] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 [ 325.804903][T13396] R13: 00007fffca27905f R14: 00007f0dc35259c0 R15: 000000000078bf0c 04:30:23 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket(0x10, 0x3, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$inet_udp(0x2, 0x2, 0x0) close(r5) sendto$llc(0xffffffffffffffff, &(0x7f0000000140)="7653bbc6175a3d2b8b43d6fab096eaaa", 0x10, 0x40080, &(0x7f00000000c0)={0x1a, 0x1, 0x6, 0x0, 0x0, 0x1, @random="646b0c1887fa"}, 0x10) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88882, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0x2}) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @loopback}}) write$binfmt_misc(r4, &(0x7f0000000140)=ANY=[], 0x1000000c8) splice(r3, 0x0, r5, 0x0, 0x18102, 0x0) 04:30:23 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x2010, 0x0) 04:30:23 executing program 3: r0 = memfd_create(&(0x7f0000001780)='\xd8\x05V\x15\xa5e\xf1\xb8\xf6\xa2\xba\x85\xb95\x03<\xb9;\xcd\x86\x8bD\xf9\xe9L\xe1Q\xfc\xe2\x97\xa0\xe8s\xb2\x11\xef\x1ac\xc9\x89\xc7\x0fv1\xa1:h\xf6\xf5\a\x8c\xf0Ay\x03\x97\xe77\xc1\xc8\xa6\xcb\xd2\xbe\xe9\xd2\xfb{u\xc3\xcd\xba\xa8G`9\xb5\x82\xa9p\xc8)\xe5$b\v\x8e\b\xf4\xf0\x11\xb4\xcb\"\xf4\xf3\xb4|\xdf\xa3\xdd\x9c\x8a\xf4D\xd3\xea\x11c}\x86H\xca=;i\x96\x183h\xba\x1a\x10', 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000380)='/dev/nullb0\x00', 0x0, 0x0) io_setup(0x1, &(0x7f00000004c0)=0x0) io_submit(r4, 0x90, &(0x7f00000000c0)=[&(0x7f0000000140)={0x3a004000, 0x2759, 0x10, 0x0, 0x0, r3, &(0x7f0000000000)="98", 0x3e80000000, 0x0, 0x0, 0x2}]) 04:30:23 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x600000000000000, 0x0) 04:30:23 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e72f"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, 0x0, &(0x7f00000001c0)) socket(0x0, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000200)={0x0, 'veth1_macvtap\x00'}) 04:30:23 executing program 0 (fault-call:2 fault-nth:4): mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) [ 326.256009][T13411] kAFS: No cell specified 04:30:23 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x700000000000000, 0x0) 04:30:23 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x3f00, 0x0) [ 326.321848][T13413] FAULT_INJECTION: forcing a failure. [ 326.321848][T13413] name failslab, interval 1, probability 0, space 0, times 0 [ 326.337576][T13413] CPU: 1 PID: 13413 Comm: syz-executor.0 Not tainted 5.8.0-syzkaller #0 [ 326.345923][T13413] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 326.355984][T13413] Call Trace: [ 326.359294][T13413] dump_stack+0x18f/0x20d [ 326.363645][T13413] should_fail.cold+0x5/0x14 [ 326.368250][T13413] ? tomoyo_realpath_from_path+0xc3/0x620 [ 326.373984][T13413] should_failslab+0x5/0xf [ 326.378417][T13413] __kmalloc+0x27d/0x340 [ 326.382675][T13413] ? rcu_read_lock_sched_held+0x3a/0xb0 [ 326.388236][T13413] tomoyo_realpath_from_path+0xc3/0x620 [ 326.393802][T13413] ? tomoyo_fill_path_info+0x227/0x410 [ 326.399278][T13413] tomoyo_mount_acl+0x14e/0x840 [ 326.404140][T13413] ? __lock_acquire+0xbb5/0x5640 [ 326.409097][T13413] ? tomoyo_check_mount_acl+0x1a0/0x1a0 [ 326.414663][T13413] ? trace_hardirqs_on+0x5f/0x220 [ 326.419710][T13413] ? lockdep_hardirqs_on+0x76/0xf0 [ 326.424856][T13413] ? putname+0xe1/0x120 [ 326.429024][T13413] ? tomoyo_domain+0xb9/0x150 [ 326.433714][T13413] ? tomoyo_profile+0x42/0x50 [ 326.438405][T13413] tomoyo_mount_permission+0x151/0x3f0 [ 326.443871][T13413] ? tomoyo_mount_permission+0xfa/0x3f0 [ 326.449426][T13413] ? tomoyo_mount_acl+0x840/0x840 [ 326.454480][T13413] security_sb_mount+0x66/0xc0 [ 326.459264][T13413] do_mount+0x1c0/0x1fe0 [ 326.463521][T13413] ? _copy_from_user+0x10f/0x190 [ 326.468469][T13413] ? copy_mount_string+0x40/0x40 [ 326.473417][T13413] ? _copy_from_user+0x138/0x190 [ 326.478366][T13413] ? memdup_user+0x7c/0xd0 [ 326.482791][T13413] __x64_sys_mount+0x18f/0x230 [ 326.487566][T13413] do_syscall_64+0x2d/0x70 [ 326.491990][T13413] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 326.497884][T13413] RIP: 0033:0x45ccd9 [ 326.501781][T13413] Code: 2d b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 fb b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 326.521388][T13413] RSP: 002b:00007f0dc3524c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 326.529812][T13413] RAX: ffffffffffffffda RBX: 0000000000020440 RCX: 000000000045ccd9 [ 326.537799][T13413] RDX: 0000000020000040 RSI: 0000000020000180 RDI: 0000000020000240 [ 326.545786][T13413] RBP: 00007f0dc3524ca0 R08: 0000000000000000 R09: 0000000000000000 [ 326.553770][T13413] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 326.561749][T13413] R13: 00007fffca27905f R14: 00007f0dc35259c0 R15: 000000000078bf0c [ 326.584430][T13411] kAFS: No cell specified 04:30:23 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73c"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, 0x0, &(0x7f00000001c0)) socket(0x0, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000200)={0x0, 'veth1_macvtap\x00'}) [ 326.656216][T13413] ERROR: Out of memory at tomoyo_realpath_from_path. 04:30:24 executing program 0 (fault-call:2 fault-nth:5): mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) 04:30:24 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x800000000000000, 0x0) 04:30:24 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0xedc0, 0x0) [ 326.861867][T13431] kAFS: No cell specified [ 326.918535][T13431] kAFS: No cell specified [ 326.967516][T13436] FAULT_INJECTION: forcing a failure. [ 326.967516][T13436] name failslab, interval 1, probability 0, space 0, times 0 [ 326.995535][T13436] CPU: 1 PID: 13436 Comm: syz-executor.0 Not tainted 5.8.0-syzkaller #0 [ 327.007541][T13436] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 327.017606][T13436] Call Trace: [ 327.020913][T13436] dump_stack+0x18f/0x20d [ 327.025246][T13436] should_fail.cold+0x5/0x14 [ 327.029833][T13436] ? tomoyo_encode2.part.0+0xe9/0x3a0 [ 327.035208][T13436] should_failslab+0x5/0xf [ 327.039635][T13436] __kmalloc+0x27d/0x340 [ 327.043910][T13436] tomoyo_encode2.part.0+0xe9/0x3a0 [ 327.049117][T13436] tomoyo_encode+0x28/0x50 [ 327.053541][T13436] tomoyo_realpath_from_path+0x186/0x620 [ 327.059185][T13436] tomoyo_mount_acl+0x14e/0x840 [ 327.064041][T13436] ? __lock_acquire+0xbb5/0x5640 [ 327.068994][T13436] ? tomoyo_check_mount_acl+0x1a0/0x1a0 [ 327.074554][T13436] ? trace_hardirqs_on+0x5f/0x220 [ 327.079583][T13436] ? lockdep_hardirqs_on+0x76/0xf0 [ 327.084715][T13436] ? putname+0xe1/0x120 [ 327.088874][T13436] ? tomoyo_domain+0xb9/0x150 [ 327.093555][T13436] ? tomoyo_profile+0x42/0x50 [ 327.098246][T13436] tomoyo_mount_permission+0x151/0x3f0 [ 327.103805][T13436] ? tomoyo_mount_permission+0xfa/0x3f0 [ 327.109354][T13436] ? tomoyo_mount_acl+0x840/0x840 [ 327.114404][T13436] security_sb_mount+0x66/0xc0 [ 327.119179][T13436] do_mount+0x1c0/0x1fe0 [ 327.123432][T13436] ? _copy_from_user+0xe6/0x190 [ 327.128290][T13436] ? copy_mount_string+0x40/0x40 [ 327.133232][T13436] ? write_comp_data+0xa/0x80 [ 327.137916][T13436] ? _copy_from_user+0x138/0x190 [ 327.142859][T13436] ? memdup_user+0x7c/0xd0 [ 327.147369][T13436] __x64_sys_mount+0x18f/0x230 [ 327.152136][T13436] do_syscall_64+0x2d/0x70 [ 327.156553][T13436] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 327.162441][T13436] RIP: 0033:0x45ccd9 [ 327.166343][T13436] Code: 2d b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 fb b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 327.185952][T13436] RSP: 002b:00007f0dc3524c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 327.194368][T13436] RAX: ffffffffffffffda RBX: 0000000000020440 RCX: 000000000045ccd9 [ 327.202345][T13436] RDX: 0000000020000040 RSI: 0000000020000180 RDI: 0000000020000240 [ 327.210322][T13436] RBP: 00007f0dc3524ca0 R08: 0000000000000000 R09: 0000000000000000 [ 327.218290][T13436] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 327.226256][T13436] R13: 00007fffca27905f R14: 00007f0dc35259c0 R15: 000000000078bf0c [ 327.538490][T13436] ERROR: Out of memory at tomoyo_realpath_from_path. 04:30:24 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket(0x10, 0x3, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$inet_udp(0x2, 0x2, 0x0) close(r5) sendto$llc(0xffffffffffffffff, &(0x7f0000000140)="7653bbc6175a3d2b8b43d6fab096eaaa30", 0x11, 0x0, &(0x7f00000000c0)={0x1a, 0x1, 0x6, 0x0, 0x0, 0x1, @random="646b0c1887fa"}, 0x10) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88882, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0x2}) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @loopback}}) write$binfmt_misc(r4, &(0x7f0000000140)=ANY=[], 0x1000000c8) splice(r3, 0x0, r5, 0x0, 0x18102, 0x0) 04:30:24 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0xf00000000000000, 0x0) 04:30:24 executing program 3: r0 = memfd_create(&(0x7f0000001780)='\xd8\x05V\x15\xa5e\xf1\xb8\xf6\xa2\xba\x85\xb95\x03<\xb9;\xcd\x86\x8bD\xf9\xe9L\xe1Q\xfc\xe2\x97\xa0\xe8s\xb2\x11\xef\x1ac\xc9\x89\xc7\x0fv1\xa1:h\xf6\xf5\a\x8c\xf0Ay\x03\x97\xe77\xc1\xc8\xa6\xcb\xd2\xbe\xe9\xd2\xfb{u\xc3\xcd\xba\xa8G`9\xb5\x82\xa9p\xc8)\xe5$b\v\x8e\b\xf4\xf0\x11\xb4\xcb\"\xf4\xf3\xb4|\xdf\xa3\xdd\x9c\x8a\xf4D\xd3\xea\x11c}\x86H\xca=;i\x96\x183h\xba\x1a\x10', 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000380)='/dev/nullb0\x00', 0x0, 0x0) io_setup(0x1, &(0x7f00000004c0)=0x0) io_submit(r4, 0x98, &(0x7f00000000c0)=[&(0x7f0000000140)={0x3a004000, 0x2759, 0x10, 0x0, 0x0, r3, &(0x7f0000000000)="98", 0x3e80000000, 0x0, 0x0, 0x2}]) 04:30:24 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0xf000, 0x0) 04:30:24 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e75c"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, 0x0, &(0x7f00000001c0)) socket(0x0, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000200)={0x0, 'veth1_macvtap\x00'}) 04:30:24 executing program 0 (fault-call:2 fault-nth:6): mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) 04:30:25 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x1000000000000000, 0x0) 04:30:25 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0xff00, 0x0) [ 327.749003][T13458] kAFS: No cell specified [ 327.787869][T13455] FAULT_INJECTION: forcing a failure. [ 327.787869][T13455] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 327.801091][T13455] CPU: 1 PID: 13455 Comm: syz-executor.0 Not tainted 5.8.0-syzkaller #0 [ 327.807192][T13458] kAFS: No cell specified [ 327.809419][T13455] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 327.823883][T13455] Call Trace: [ 327.827183][T13455] dump_stack+0x18f/0x20d [ 327.831537][T13455] should_fail.cold+0x5/0x14 [ 327.836138][T13455] ? __x64_sys_mount+0x18f/0x230 [ 327.841087][T13455] __alloc_pages_nodemask+0x1a3/0x930 [ 327.846491][T13455] ? __alloc_pages_slowpath.constprop.0+0x27a0/0x27a0 [ 327.853262][T13455] ? kvm_sched_clock_read+0x14/0x40 [ 327.858477][T13455] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 327.864645][T13455] cache_grow_begin+0x8c/0xb20 [ 327.869421][T13455] ? cache_alloc_pfmemalloc+0x1e/0x140 [ 327.874895][T13455] cache_alloc_refill+0x27b/0x340 [ 327.879930][T13455] ? lockdep_hardirqs_off+0x89/0xc0 [ 327.885139][T13455] ? tomoyo_realpath_from_path+0xc3/0x620 [ 327.890874][T13455] __kmalloc+0x319/0x340 [ 327.895132][T13455] tomoyo_realpath_from_path+0xc3/0x620 [ 327.900693][T13455] ? tomoyo_fill_path_info+0x227/0x410 [ 327.906159][T13455] tomoyo_mount_acl+0x14e/0x840 [ 327.911022][T13455] ? __lock_acquire+0xbb5/0x5640 [ 327.915971][T13455] ? tomoyo_check_mount_acl+0x1a0/0x1a0 [ 327.921530][T13455] ? trace_hardirqs_on+0x5f/0x220 [ 327.926560][T13455] ? lockdep_hardirqs_on+0x76/0xf0 [ 327.931696][T13455] ? putname+0xe1/0x120 [ 327.935860][T13455] ? tomoyo_domain+0xb9/0x150 [ 327.940542][T13455] ? tomoyo_profile+0x42/0x50 [ 327.945231][T13455] tomoyo_mount_permission+0x151/0x3f0 [ 327.950695][T13455] ? tomoyo_mount_permission+0xfa/0x3f0 [ 327.956252][T13455] ? tomoyo_mount_acl+0x840/0x840 [ 327.961301][T13455] security_sb_mount+0x66/0xc0 [ 327.966077][T13455] do_mount+0x1c0/0x1fe0 [ 327.970353][T13455] ? copy_mount_string+0x40/0x40 [ 327.975295][T13455] ? __might_fault+0x190/0x1d0 [ 327.980062][T13455] ? _copy_from_user+0x138/0x190 [ 327.985014][T13455] ? memdup_user+0x7c/0xd0 [ 327.989435][T13455] __x64_sys_mount+0x18f/0x230 [ 327.994208][T13455] do_syscall_64+0x2d/0x70 [ 327.998648][T13455] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 328.004547][T13455] RIP: 0033:0x45ccd9 [ 328.008455][T13455] Code: 2d b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 fb b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 328.028067][T13455] RSP: 002b:00007f0dc3524c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 04:30:25 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x2, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, 0x0, &(0x7f00000001c0)) socket(0x0, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000200)={0x0, 'veth1_macvtap\x00'}) [ 328.036498][T13455] RAX: ffffffffffffffda RBX: 0000000000020440 RCX: 000000000045ccd9 [ 328.044477][T13455] RDX: 0000000020000040 RSI: 0000000020000180 RDI: 0000000020000240 [ 328.052454][T13455] RBP: 00007f0dc3524ca0 R08: 0000000000000000 R09: 0000000000000000 [ 328.060434][T13455] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000006 [ 328.068426][T13455] R13: 00007fffca27905f R14: 00007f0dc35259c0 R15: 000000000078bf0c 04:30:25 executing program 0 (fault-call:2 fault-nth:7): mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) 04:30:25 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x2000000000000000, 0x0) 04:30:25 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0xf0ffff, 0x0) [ 328.483235][T13484] FAULT_INJECTION: forcing a failure. [ 328.483235][T13484] name failslab, interval 1, probability 0, space 0, times 0 [ 328.522362][T13484] CPU: 1 PID: 13484 Comm: syz-executor.0 Not tainted 5.8.0-syzkaller #0 [ 328.530719][T13484] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 328.540782][T13484] Call Trace: [ 328.544083][T13484] dump_stack+0x18f/0x20d [ 328.548432][T13484] should_fail.cold+0x5/0x14 [ 328.553039][T13484] should_failslab+0x5/0xf [ 328.557466][T13484] kmem_cache_alloc_trace+0x240/0x2d0 [ 328.562854][T13484] alloc_fs_context+0x57/0x880 [ 328.567637][T13484] do_mount+0x12ea/0x1fe0 [ 328.571993][T13484] ? copy_mount_string+0x40/0x40 [ 328.576940][T13484] ? __might_fault+0x190/0x1d0 [ 328.581714][T13484] ? _copy_from_user+0x138/0x190 [ 328.586669][T13484] ? memdup_user+0x7c/0xd0 [ 328.591096][T13484] __x64_sys_mount+0x18f/0x230 [ 328.595872][T13484] do_syscall_64+0x2d/0x70 [ 328.600301][T13484] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 328.606306][T13484] RIP: 0033:0x45ccd9 [ 328.610210][T13484] Code: 2d b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 fb b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 328.629829][T13484] RSP: 002b:00007f0dc3524c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 328.638259][T13484] RAX: ffffffffffffffda RBX: 0000000000020440 RCX: 000000000045ccd9 [ 328.646246][T13484] RDX: 0000000020000040 RSI: 0000000020000180 RDI: 0000000020000240 [ 328.654234][T13484] RBP: 00007f0dc3524ca0 R08: 0000000000000000 R09: 0000000000000000 [ 328.662220][T13484] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000007 [ 328.670227][T13484] R13: 00007fffca27905f R14: 00007f0dc35259c0 R15: 000000000078bf0c 04:30:26 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket(0x10, 0x3, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$inet_udp(0x2, 0x2, 0x0) close(r5) sendto$llc(0xffffffffffffffff, &(0x7f0000000140)="7653bbc6175a3d2b8b43d6fab096eaaa30", 0x11, 0x0, 0x0, 0x0) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88882, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0x2}) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @loopback}}) write$binfmt_misc(r4, &(0x7f0000000140)=ANY=[], 0x1000000c8) splice(r3, 0x0, r5, 0x0, 0x18102, 0x0) 04:30:26 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x3, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, 0x0, &(0x7f00000001c0)) socket(0x0, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000200)={0x0, 'veth1_macvtap\x00'}) 04:30:26 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x2010000000000000, 0x0) 04:30:26 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x1000000, 0x0) 04:30:26 executing program 3: r0 = memfd_create(&(0x7f0000001780)='\xd8\x05V\x15\xa5e\xf1\xb8\xf6\xa2\xba\x85\xb95\x03<\xb9;\xcd\x86\x8bD\xf9\xe9L\xe1Q\xfc\xe2\x97\xa0\xe8s\xb2\x11\xef\x1ac\xc9\x89\xc7\x0fv1\xa1:h\xf6\xf5\a\x8c\xf0Ay\x03\x97\xe77\xc1\xc8\xa6\xcb\xd2\xbe\xe9\xd2\xfb{u\xc3\xcd\xba\xa8G`9\xb5\x82\xa9p\xc8)\xe5$b\v\x8e\b\xf4\xf0\x11\xb4\xcb\"\xf4\xf3\xb4|\xdf\xa3\xdd\x9c\x8a\xf4D\xd3\xea\x11c}\x86H\xca=;i\x96\x183h\xba\x1a\x10', 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000380)='/dev/nullb0\x00', 0x0, 0x0) io_setup(0x1, &(0x7f00000004c0)=0x0) io_submit(r4, 0xa0, &(0x7f00000000c0)=[&(0x7f0000000140)={0x3a004000, 0x2759, 0x10, 0x0, 0x0, r3, &(0x7f0000000000)="98", 0x3e80000000, 0x0, 0x0, 0x2}]) 04:30:26 executing program 0 (fault-call:2 fault-nth:8): mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) 04:30:26 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x3f00000000000000, 0x0) 04:30:26 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x4, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, 0x0, &(0x7f00000001c0)) socket(0x0, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000200)={0x0, 'veth1_macvtap\x00'}) [ 329.275194][T13511] FAULT_INJECTION: forcing a failure. [ 329.275194][T13511] name failslab, interval 1, probability 0, space 0, times 0 [ 329.338264][T13511] CPU: 0 PID: 13511 Comm: syz-executor.0 Not tainted 5.8.0-syzkaller #0 [ 329.346620][T13511] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 329.356684][T13511] Call Trace: [ 329.359996][T13511] dump_stack+0x18f/0x20d [ 329.364345][T13511] should_fail.cold+0x5/0x14 [ 329.368951][T13511] should_failslab+0x5/0xf [ 329.373375][T13511] kmem_cache_alloc_trace+0x240/0x2d0 [ 329.378759][T13511] ? afs_get_tree+0x1460/0x1460 [ 329.383627][T13511] afs_init_fs_context+0x45/0x5a0 [ 329.388660][T13511] ? afs_get_tree+0x1460/0x1460 [ 329.393524][T13511] alloc_fs_context+0x51c/0x880 [ 329.398393][T13511] do_mount+0x12ea/0x1fe0 [ 329.402742][T13511] ? copy_mount_string+0x40/0x40 [ 329.407693][T13511] ? __might_fault+0x190/0x1d0 [ 329.412555][T13511] ? _copy_from_user+0x138/0x190 [ 329.417514][T13511] ? memdup_user+0x7c/0xd0 [ 329.421949][T13511] __x64_sys_mount+0x18f/0x230 [ 329.426726][T13511] do_syscall_64+0x2d/0x70 [ 329.431154][T13511] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 329.437054][T13511] RIP: 0033:0x45ccd9 [ 329.440964][T13511] Code: 2d b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 fb b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 329.460774][T13511] RSP: 002b:00007f0dc3524c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 329.469171][T13511] RAX: ffffffffffffffda RBX: 0000000000020440 RCX: 000000000045ccd9 [ 329.477124][T13511] RDX: 0000000020000040 RSI: 0000000020000180 RDI: 0000000020000240 [ 329.485161][T13511] RBP: 00007f0dc3524ca0 R08: 0000000000000000 R09: 0000000000000000 [ 329.493115][T13511] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000008 [ 329.501093][T13511] R13: 00007fffca27905f R14: 00007f0dc35259c0 R15: 000000000078bf0c 04:30:26 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x1000002, 0x0) 04:30:26 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x8cffffff00000000, 0x0) 04:30:26 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x5, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, 0x0, &(0x7f00000001c0)) socket(0x0, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000200)={0x0, 'veth1_macvtap\x00'}) 04:30:27 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x2000000, 0x0) 04:30:27 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket(0x10, 0x3, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$inet_udp(0x2, 0x2, 0x0) close(r5) sendto$llc(0xffffffffffffffff, &(0x7f0000000140)="7653bbc6175a3d2b8b43d6fab096eaaa30", 0x11, 0x0, 0x0, 0x0) r6 = openat$tun(0xffffffffffffff9c, 0x0, 0x88882, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0x2}) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @loopback}}) write$binfmt_misc(r4, &(0x7f0000000140)=ANY=[], 0x1000000c8) splice(r3, 0x0, r5, 0x0, 0x18102, 0x0) 04:30:27 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0xf6ffffff00000000, 0x0) 04:30:27 executing program 0 (fault-call:2 fault-nth:9): mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) 04:30:27 executing program 3: r0 = memfd_create(&(0x7f0000001780)='\xd8\x05V\x15\xa5e\xf1\xb8\xf6\xa2\xba\x85\xb95\x03<\xb9;\xcd\x86\x8bD\xf9\xe9L\xe1Q\xfc\xe2\x97\xa0\xe8s\xb2\x11\xef\x1ac\xc9\x89\xc7\x0fv1\xa1:h\xf6\xf5\a\x8c\xf0Ay\x03\x97\xe77\xc1\xc8\xa6\xcb\xd2\xbe\xe9\xd2\xfb{u\xc3\xcd\xba\xa8G`9\xb5\x82\xa9p\xc8)\xe5$b\v\x8e\b\xf4\xf0\x11\xb4\xcb\"\xf4\xf3\xb4|\xdf\xa3\xdd\x9c\x8a\xf4D\xd3\xea\x11c}\x86H\xca=;i\x96\x183h\xba\x1a\x10', 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000380)='/dev/nullb0\x00', 0x0, 0x0) io_setup(0x1, &(0x7f00000004c0)=0x0) io_submit(r4, 0xa8, &(0x7f00000000c0)=[&(0x7f0000000140)={0x3a004000, 0x2759, 0x10, 0x0, 0x0, r3, &(0x7f0000000000)="98", 0x3e80000000, 0x0, 0x0, 0x2}]) 04:30:27 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x6, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, 0x0, &(0x7f00000001c0)) socket(0x0, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000200)={0x0, 'veth1_macvtap\x00'}) 04:30:27 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x2000001, 0x0) 04:30:27 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x7, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, 0x0, &(0x7f00000001c0)) socket(0x0, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000200)={0x0, 'veth1_macvtap\x00'}) 04:30:27 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x3000000, 0x0) 04:30:27 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0xf9fdffff00000000, 0x0) [ 330.476699][T13548] FAULT_INJECTION: forcing a failure. [ 330.476699][T13548] name failslab, interval 1, probability 0, space 0, times 0 [ 330.548375][T13548] CPU: 0 PID: 13548 Comm: syz-executor.0 Not tainted 5.8.0-syzkaller #0 [ 330.556733][T13548] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 330.566799][T13548] Call Trace: [ 330.570120][T13548] dump_stack+0x18f/0x20d [ 330.574473][T13548] should_fail.cold+0x5/0x14 [ 330.579087][T13548] should_failslab+0x5/0xf [ 330.583519][T13548] kmem_cache_alloc_trace+0x240/0x2d0 [ 330.588905][T13548] alloc_fs_context+0x57/0x880 [ 330.593689][T13548] do_mount+0x12ea/0x1fe0 [ 330.598556][T13548] ? lockdep_hardirqs_on_prepare+0x354/0x530 [ 330.604549][T13548] ? trace_hardirqs_on+0x5f/0x220 [ 330.609588][T13548] ? copy_mount_string+0x40/0x40 [ 330.614534][T13548] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 330.620704][T13548] ? __x64_sys_mount+0x153/0x230 [ 330.625658][T13548] __x64_sys_mount+0x18f/0x230 [ 330.630441][T13548] do_syscall_64+0x2d/0x70 [ 330.634878][T13548] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 330.640778][T13548] RIP: 0033:0x45ccd9 [ 330.644684][T13548] Code: 2d b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 fb b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 330.665336][T13548] RSP: 002b:00007f0dc3524c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 330.673758][T13548] RAX: ffffffffffffffda RBX: 0000000000020440 RCX: 000000000045ccd9 [ 330.681741][T13548] RDX: 0000000020000040 RSI: 0000000020000180 RDI: 0000000020000240 [ 330.689720][T13548] RBP: 00007f0dc3524ca0 R08: 0000000000000000 R09: 0000000000000000 [ 330.697702][T13548] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000009 [ 330.705682][T13548] R13: 00007fffca27905f R14: 00007f0dc35259c0 R15: 000000000078bf0c 04:30:28 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0xff00000000000000, 0x0) 04:30:28 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x3042458, 0x0) 04:30:28 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x8, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, 0x0, &(0x7f00000001c0)) socket(0x0, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000200)={0x0, 'veth1_macvtap\x00'}) 04:30:28 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket(0x10, 0x3, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$inet_udp(0x2, 0x2, 0x0) close(r5) sendto$llc(0xffffffffffffffff, &(0x7f0000000140)="7653bbc6175a3d2b8b43d6fab096eaaa30", 0x11, 0x0, 0x0, 0x0) r6 = openat$tun(0xffffffffffffff9c, 0x0, 0x88882, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0x2}) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @loopback}}) write$binfmt_misc(r4, &(0x7f0000000140)=ANY=[], 0x1000000c8) splice(r3, 0x0, r5, 0x0, 0x18102, 0x0) 04:30:28 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0xffffff7f00000000, 0x0) 04:30:28 executing program 3: r0 = memfd_create(&(0x7f0000001780)='\xd8\x05V\x15\xa5e\xf1\xb8\xf6\xa2\xba\x85\xb95\x03<\xb9;\xcd\x86\x8bD\xf9\xe9L\xe1Q\xfc\xe2\x97\xa0\xe8s\xb2\x11\xef\x1ac\xc9\x89\xc7\x0fv1\xa1:h\xf6\xf5\a\x8c\xf0Ay\x03\x97\xe77\xc1\xc8\xa6\xcb\xd2\xbe\xe9\xd2\xfb{u\xc3\xcd\xba\xa8G`9\xb5\x82\xa9p\xc8)\xe5$b\v\x8e\b\xf4\xf0\x11\xb4\xcb\"\xf4\xf3\xb4|\xdf\xa3\xdd\x9c\x8a\xf4D\xd3\xea\x11c}\x86H\xca=;i\x96\x183h\xba\x1a\x10', 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000380)='/dev/nullb0\x00', 0x0, 0x0) io_setup(0x1, &(0x7f00000004c0)=0x0) io_submit(r4, 0xb0, &(0x7f00000000c0)=[&(0x7f0000000140)={0x3a004000, 0x2759, 0x10, 0x0, 0x0, r3, &(0x7f0000000000)="98", 0x3e80000000, 0x0, 0x0, 0x2}]) 04:30:28 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x4000000, 0x0) 04:30:28 executing program 0 (fault-call:2 fault-nth:10): mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) 04:30:28 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0xf, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, 0x0, &(0x7f00000001c0)) socket(0x0, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000200)={0x0, 'veth1_macvtap\x00'}) 04:30:28 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0xfffffffffffff000, 0x0) 04:30:28 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x5000000, 0x0) [ 331.384743][T13590] FAULT_INJECTION: forcing a failure. [ 331.384743][T13590] name failslab, interval 1, probability 0, space 0, times 0 [ 331.438077][T13590] CPU: 1 PID: 13590 Comm: syz-executor.0 Not tainted 5.8.0-syzkaller #0 [ 331.446524][T13590] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 331.456587][T13590] Call Trace: [ 331.459893][T13590] dump_stack+0x18f/0x20d [ 331.464237][T13590] should_fail.cold+0x5/0x14 [ 331.468837][T13590] should_failslab+0x5/0xf [ 331.473264][T13590] kmem_cache_alloc_trace+0x240/0x2d0 [ 331.478644][T13590] ? afs_get_tree+0x1460/0x1460 [ 331.483505][T13590] afs_init_fs_context+0x45/0x5a0 [ 331.488535][T13590] ? afs_get_tree+0x1460/0x1460 [ 331.493403][T13590] alloc_fs_context+0x51c/0x880 [ 331.498273][T13590] do_mount+0x12ea/0x1fe0 [ 331.502622][T13590] ? copy_mount_string+0x40/0x40 [ 331.507568][T13590] ? __might_fault+0x190/0x1d0 [ 331.512341][T13590] ? _copy_from_user+0x138/0x190 [ 331.517296][T13590] ? memdup_user+0x7c/0xd0 [ 331.521724][T13590] __x64_sys_mount+0x18f/0x230 [ 331.526500][T13590] do_syscall_64+0x2d/0x70 [ 331.530940][T13590] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 331.536833][T13590] RIP: 0033:0x45ccd9 [ 331.540739][T13590] Code: 2d b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 fb b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 331.560459][T13590] RSP: 002b:00007f0dc3524c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 331.568879][T13590] RAX: ffffffffffffffda RBX: 0000000000020440 RCX: 000000000045ccd9 [ 331.576952][T13590] RDX: 0000000020000040 RSI: 0000000020000180 RDI: 0000000020000240 04:30:28 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x10, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, 0x0, &(0x7f00000001c0)) socket(0x0, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000200)={0x0, 'veth1_macvtap\x00'}) [ 331.584933][T13590] RBP: 00007f0dc3524ca0 R08: 0000000000000000 R09: 0000000000000000 [ 331.592913][T13590] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000000000a [ 331.600890][T13590] R13: 00007fffca27905f R14: 00007f0dc35259c0 R15: 000000000078bf0c 04:30:28 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) r0 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x4, 0x1c181) openat$cgroup_devices(r0, &(0x7f0000000080)='devices.allow\x00', 0x2, 0x0) 04:30:29 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x6000000, 0x0) 04:30:29 executing program 0 (fault-call:2 fault-nth:11): mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) [ 331.995121][T13620] FAULT_INJECTION: forcing a failure. [ 331.995121][T13620] name failslab, interval 1, probability 0, space 0, times 0 [ 332.025072][T13620] CPU: 0 PID: 13620 Comm: syz-executor.0 Not tainted 5.8.0-syzkaller #0 [ 332.033425][T13620] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 332.043477][T13620] Call Trace: [ 332.046758][T13620] dump_stack+0x18f/0x20d [ 332.051144][T13620] should_fail.cold+0x5/0x14 [ 332.055730][T13620] ? vfs_parse_fs_string+0xc0/0x150 [ 332.060952][T13620] ? vfs_parse_fs_string+0xc0/0x150 [ 332.066147][T13620] should_failslab+0x5/0xf [ 332.070568][T13620] __kmalloc_track_caller+0x27b/0x330 [ 332.075977][T13620] ? afs_lookup_cell_rcu+0x19b/0x750 [ 332.081276][T13620] kmemdup_nul+0x2d/0xa0 [ 332.085519][T13620] vfs_parse_fs_string+0xc0/0x150 [ 332.090526][T13620] ? vfs_parse_fs_param+0x550/0x550 [ 332.095722][T13620] ? alloc_fs_context+0x56e/0x880 [ 332.100791][T13620] do_mount+0x658/0x1fe0 [ 332.105020][T13620] ? copy_mount_string+0x40/0x40 [ 332.109935][T13620] ? __might_fault+0x190/0x1d0 [ 332.114689][T13620] ? _copy_from_user+0x138/0x190 [ 332.119619][T13620] ? memdup_user+0x7c/0xd0 [ 332.124017][T13620] __x64_sys_mount+0x18f/0x230 [ 332.128763][T13620] do_syscall_64+0x2d/0x70 [ 332.133183][T13620] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 332.139071][T13620] RIP: 0033:0x45ccd9 04:30:29 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket(0x10, 0x3, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$inet_udp(0x2, 0x2, 0x0) close(r5) sendto$llc(0xffffffffffffffff, &(0x7f0000000140)="7653bbc6175a3d2b8b43d6fab096eaaa30", 0x11, 0x0, 0x0, 0x0) r6 = openat$tun(0xffffffffffffff9c, 0x0, 0x88882, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0x2}) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @loopback}}) write$binfmt_misc(r4, &(0x7f0000000140)=ANY=[], 0x1000000c8) splice(r3, 0x0, r5, 0x0, 0x18102, 0x0) 04:30:29 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0xf0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, 0x0, &(0x7f00000001c0)) socket(0x0, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000200)={0x0, 'veth1_macvtap\x00'}) [ 332.142965][T13620] Code: 2d b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 fb b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 332.162659][T13620] RSP: 002b:00007f0dc3524c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 332.171083][T13620] RAX: ffffffffffffffda RBX: 0000000000020440 RCX: 000000000045ccd9 [ 332.179065][T13620] RDX: 0000000020000040 RSI: 0000000020000180 RDI: 0000000020000240 [ 332.187051][T13620] RBP: 00007f0dc3524ca0 R08: 0000000000000000 R09: 0000000000000000 [ 332.195033][T13620] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000000000b [ 332.203029][T13620] R13: 00007fffca27905f R14: 00007f0dc35259c0 R15: 000000000078bf0c 04:30:29 executing program 3: r0 = memfd_create(&(0x7f0000001780)='\xd8\x05V\x15\xa5e\xf1\xb8\xf6\xa2\xba\x85\xb95\x03<\xb9;\xcd\x86\x8bD\xf9\xe9L\xe1Q\xfc\xe2\x97\xa0\xe8s\xb2\x11\xef\x1ac\xc9\x89\xc7\x0fv1\xa1:h\xf6\xf5\a\x8c\xf0Ay\x03\x97\xe77\xc1\xc8\xa6\xcb\xd2\xbe\xe9\xd2\xfb{u\xc3\xcd\xba\xa8G`9\xb5\x82\xa9p\xc8)\xe5$b\v\x8e\b\xf4\xf0\x11\xb4\xcb\"\xf4\xf3\xb4|\xdf\xa3\xdd\x9c\x8a\xf4D\xd3\xea\x11c}\x86H\xca=;i\x96\x183h\xba\x1a\x10', 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000380)='/dev/nullb0\x00', 0x0, 0x0) io_setup(0x1, &(0x7f00000004c0)=0x0) io_submit(r4, 0xb8, &(0x7f00000000c0)=[&(0x7f0000000140)={0x3a004000, 0x2759, 0x10, 0x0, 0x0, r3, &(0x7f0000000000)="98", 0x3e80000000, 0x0, 0x0, 0x2}]) 04:30:29 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="3a05d78b"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) fsconfig$FSCONFIG_SET_FLAG(r0, 0x6, &(0x7f00000000c0)='posixacl\x00', 0x0, 0x0) ioctl$VIDIOC_S_CROP(r0, 0x4014563c, &(0x7f0000000000)={0x9, {0x69, 0xff, 0x0, 0x1}}) 04:30:29 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x7000000, 0x0) 04:30:29 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x300, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, 0x0, &(0x7f00000001c0)) socket(0x0, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000200)={0x0, 'veth1_macvtap\x00'}) [ 332.389267][T13640] kAFS: unparsable volume name 04:30:29 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x8000000, 0x0) [ 332.421131][T13640] kAFS: unparsable volume name 04:30:29 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x500, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, 0x0, &(0x7f00000001c0)) socket(0x0, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000200)={0x0, 'veth1_macvtap\x00'}) 04:30:29 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000000)='batadv\x00') sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)={0x14, r1, 0x301, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) r2 = accept4(r0, &(0x7f0000000080)=@can, &(0x7f0000000000)=0x80, 0x800) ioctl$sock_SIOCSIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r2, 0x8983, &(0x7f0000000100)={0x2, 'xfrm0\x00', {0x7}, 0x8}) mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) 04:30:29 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) getxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)=@random={'system.', '\x00'}, &(0x7f00000000c0)=""/52, 0x34) socket$caif_stream(0x25, 0x1, 0x5) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) [ 332.633777][ T7967] FS-Cache: Duplicate cookie detected [ 332.639214][ T7967] FS-Cache: O-cookie c=0000000004fb59ac [p=00000000a00f4ec0 fl=222 nc=0 na=1] [ 332.648243][ T7967] FS-Cache: O-cookie d=0000000035364e0c n=000000008fc5145a [ 332.655505][ T7967] FS-Cache: O-key=[2] 'e9e7' [ 332.660178][ T7967] FS-Cache: N-cookie c=00000000811a778b [p=00000000a00f4ec0 fl=2 nc=0 na=1] [ 332.668849][ T7967] FS-Cache: N-cookie d=0000000035364e0c n=00000000bbdf5647 [ 332.676131][ T7967] FS-Cache: N-key=[2] 'e9e7' 04:30:30 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0xf000000, 0x0) 04:30:30 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) 04:30:30 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket(0x10, 0x3, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$inet_udp(0x2, 0x2, 0x0) close(r5) sendto$llc(0xffffffffffffffff, &(0x7f0000000140)="7653bbc6175a3d2b8b43d6fab096eaaa30", 0x11, 0x0, 0x0, 0x0) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0x2}) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @loopback}}) write$binfmt_misc(r4, &(0x7f0000000140)=ANY=[], 0x1000000c8) splice(r3, 0x0, r5, 0x0, 0x18102, 0x0) 04:30:30 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x600, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, 0x0, &(0x7f00000001c0)) socket(0x0, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000200)={0x0, 'veth1_macvtap\x00'}) 04:30:30 executing program 3: r0 = memfd_create(&(0x7f0000001780)='\xd8\x05V\x15\xa5e\xf1\xb8\xf6\xa2\xba\x85\xb95\x03<\xb9;\xcd\x86\x8bD\xf9\xe9L\xe1Q\xfc\xe2\x97\xa0\xe8s\xb2\x11\xef\x1ac\xc9\x89\xc7\x0fv1\xa1:h\xf6\xf5\a\x8c\xf0Ay\x03\x97\xe77\xc1\xc8\xa6\xcb\xd2\xbe\xe9\xd2\xfb{u\xc3\xcd\xba\xa8G`9\xb5\x82\xa9p\xc8)\xe5$b\v\x8e\b\xf4\xf0\x11\xb4\xcb\"\xf4\xf3\xb4|\xdf\xa3\xdd\x9c\x8a\xf4D\xd3\xea\x11c}\x86H\xca=;i\x96\x183h\xba\x1a\x10', 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000380)='/dev/nullb0\x00', 0x0, 0x0) io_setup(0x1, &(0x7f00000004c0)=0x0) io_submit(r4, 0xc0, &(0x7f00000000c0)=[&(0x7f0000000140)={0x3a004000, 0x2759, 0x10, 0x0, 0x0, r3, &(0x7f0000000000)="98", 0x3e80000000, 0x0, 0x0, 0x2}]) 04:30:30 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="236a8e2e"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) 04:30:30 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x10000000, 0x0) 04:30:30 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="25e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) [ 333.247138][T13680] kAFS: No cell specified 04:30:30 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x700, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, 0x0, &(0x7f00000001c0)) socket(0x0, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000200)={0x0, 'veth1_macvtap\x00'}) 04:30:30 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x157) personality(0x4000000) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x64c401, 0x0) fsconfig$FSCONFIG_SET_FLAG(r0, 0x6, &(0x7f00000000c0)='posixacl\x00', 0x0, 0x0) setsockopt$bt_BT_CHANNEL_POLICY(r0, 0x112, 0xa, &(0x7f0000000000)=0x2, 0x4) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="04000000"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0xde440, 0x0) fsconfig$FSCONFIG_SET_FLAG(r1, 0x6, &(0x7f00000000c0)='posixacl\x00', 0x0, 0x0) ioctl$DRM_IOCTL_ADD_MAP(r1, 0xc0286415, &(0x7f0000000080)={&(0x7f0000ffd000/0x3000)=nil, 0x1, 0x4, 0x0, &(0x7f0000ffc000/0x4000)=nil, 0x2000006}) 04:30:30 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x20000000, 0x0) 04:30:30 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="3ce9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) [ 333.484116][T13693] kAFS: unparsable volume name [ 333.506805][T13693] kAFS: unparsable volume name 04:30:30 executing program 1: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$F2FS_IOC_FLUSH_DEVICE(r0, 0x4008f50a, &(0x7f0000000000)={0x3, 0x8}) mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) 04:30:30 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x20100000, 0x0) [ 333.594981][T13699] kAFS: unparsable volume name [ 333.646278][T13703] kAFS: unparsable volume name [ 334.221201][ T0] NOHZ: local_softirq_pending 08 04:30:31 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="5ce9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) 04:30:31 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0xf00, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, 0x0, &(0x7f00000001c0)) socket(0x0, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000200)={0x0, 'veth1_macvtap\x00'}) 04:30:31 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x3f000000, 0x0) 04:30:31 executing program 1: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) fsconfig$FSCONFIG_SET_FLAG(r0, 0x6, &(0x7f00000000c0)='posixacl\x00', 0x0, 0x0) ioctl$KVM_CREATE_PIT2(r0, 0x4040ae77, &(0x7f0000000000)={0x3}) mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) mount(&(0x7f00000001c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) 04:30:31 executing program 3: r0 = memfd_create(&(0x7f0000001780)='\xd8\x05V\x15\xa5e\xf1\xb8\xf6\xa2\xba\x85\xb95\x03<\xb9;\xcd\x86\x8bD\xf9\xe9L\xe1Q\xfc\xe2\x97\xa0\xe8s\xb2\x11\xef\x1ac\xc9\x89\xc7\x0fv1\xa1:h\xf6\xf5\a\x8c\xf0Ay\x03\x97\xe77\xc1\xc8\xa6\xcb\xd2\xbe\xe9\xd2\xfb{u\xc3\xcd\xba\xa8G`9\xb5\x82\xa9p\xc8)\xe5$b\v\x8e\b\xf4\xf0\x11\xb4\xcb\"\xf4\xf3\xb4|\xdf\xa3\xdd\x9c\x8a\xf4D\xd3\xea\x11c}\x86H\xca=;i\x96\x183h\xba\x1a\x10', 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000380)='/dev/nullb0\x00', 0x0, 0x0) io_setup(0x1, &(0x7f00000004c0)=0x0) io_submit(r4, 0xc8, &(0x7f00000000c0)=[&(0x7f0000000140)={0x3a004000, 0x2759, 0x10, 0x0, 0x0, r3, &(0x7f0000000000)="98", 0x3e80000000, 0x0, 0x0, 0x2}]) 04:30:31 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket(0x10, 0x3, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$inet_udp(0x2, 0x2, 0x0) close(r5) sendto$llc(0xffffffffffffffff, &(0x7f0000000140)="7653bbc6175a3d2b8b43d6fab096eaaa30", 0x11, 0x0, 0x0, 0x0) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0x2}) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @loopback}}) write$binfmt_misc(r4, &(0x7f0000000140)=ANY=[], 0x1000000c8) splice(r3, 0x0, r5, 0x0, 0x18102, 0x0) [ 334.339515][T13721] kAFS: unparsable volume name 04:30:31 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x58240403, 0x0) [ 334.366651][T13724] kAFS: No cell specified [ 334.382175][T13727] kAFS: unparsable volume name [ 334.397661][T13728] kAFS: No cell specified 04:30:31 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e72f"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) 04:30:31 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x1020, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, 0x0, &(0x7f00000001c0)) socket(0x0, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000200)={0x0, 'veth1_macvtap\x00'}) 04:30:31 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x0, 0x2) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x30, r2, 0x23f, 0x0, 0x0, {{}, {0x0, 0x410c, 0xf0}, {0x14, 0x14, 'broadcast-link\x00'}}}, 0x30}, 0x1, 0xfffffff0}, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x1c, r2, 0x400, 0x70bd25, 0x25dfdbfe, {}, ["", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4080014}, 0x804) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) 04:30:31 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x8cffffff, 0x0) [ 334.645786][T13741] kAFS: No cell specified [ 334.687258][T13746] kAFS: No cell specified 04:30:32 executing program 1: syz_genetlink_get_family_id$nbd(&(0x7f0000000000)='nbd\x00') mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) 04:30:32 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73c"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) 04:30:32 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x2000, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, 0x0, &(0x7f00000001c0)) socket(0x0, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000200)={0x0, 'veth1_macvtap\x00'}) 04:30:32 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0xc0ed0000, 0x0) 04:30:32 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) fsconfig$FSCONFIG_SET_FLAG(r0, 0x6, &(0x7f00000000c0)='posixacl\x00', 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) r2 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f0000000080)={r3, 0x82000000}, 0x10) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000080)={r3, @in={{0x2, 0x4e22, @rand_addr=0x64010101}}, 0x9, 0x1, 0x5, 0xfffffffc, 0x52, 0x0, 0x2}, &(0x7f0000000000)=0x9c) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000280)={r4, @in6={{0xa, 0x4e24, 0x650, @dev={0xfe, 0x80, [], 0x3f}}}, [0x9, 0x7ff, 0x3a, 0x5, 0x2c30fb54, 0x101, 0x1, 0x1000, 0x80000000, 0x45b, 0x3, 0x80000001, 0x6, 0xffff, 0x6]}, &(0x7f00000001c0)=0x100) [ 334.925903][T13757] kAFS: No cell specified [ 334.960504][T13764] kAFS: No cell specified 04:30:32 executing program 3: r0 = memfd_create(&(0x7f0000001780)='\xd8\x05V\x15\xa5e\xf1\xb8\xf6\xa2\xba\x85\xb95\x03<\xb9;\xcd\x86\x8bD\xf9\xe9L\xe1Q\xfc\xe2\x97\xa0\xe8s\xb2\x11\xef\x1ac\xc9\x89\xc7\x0fv1\xa1:h\xf6\xf5\a\x8c\xf0Ay\x03\x97\xe77\xc1\xc8\xa6\xcb\xd2\xbe\xe9\xd2\xfb{u\xc3\xcd\xba\xa8G`9\xb5\x82\xa9p\xc8)\xe5$b\v\x8e\b\xf4\xf0\x11\xb4\xcb\"\xf4\xf3\xb4|\xdf\xa3\xdd\x9c\x8a\xf4D\xd3\xea\x11c}\x86H\xca=;i\x96\x183h\xba\x1a\x10', 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000380)='/dev/nullb0\x00', 0x0, 0x0) io_setup(0x1, &(0x7f00000004c0)=0x0) io_submit(r4, 0xd0, &(0x7f00000000c0)=[&(0x7f0000000140)={0x3a004000, 0x2759, 0x10, 0x0, 0x0, r3, &(0x7f0000000000)="98", 0x3e80000000, 0x0, 0x0, 0x2}]) 04:30:32 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket(0x10, 0x3, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$inet_udp(0x2, 0x2, 0x0) close(r5) sendto$llc(0xffffffffffffffff, &(0x7f0000000140)="7653bbc6175a3d2b8b43d6fab096eaaa30", 0x11, 0x0, 0x0, 0x0) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0x2}) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @loopback}}) write$binfmt_misc(r4, &(0x7f0000000140)=ANY=[], 0x1000000c8) splice(r3, 0x0, r5, 0x0, 0x18102, 0x0) 04:30:32 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e75c"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) 04:30:32 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0xf6ffffff, 0x0) 04:30:32 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x2010, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, 0x0, &(0x7f00000001c0)) socket(0x0, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000200)={0x0, 'veth1_macvtap\x00'}) 04:30:32 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000240)={{0x2, 0x0, @private=0x5}, {0x0, @link_local}, 0x0, {0x2, 0x0, @dev}}) r1 = accept4$inet(r0, &(0x7f0000000000), &(0x7f0000000080)=0x10, 0x800) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000000000)='batadv\x00') sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r2, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)={0x14, r3, 0x301, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_SET(r4, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000300)={0x40, r5, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_LINK={0x2c, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_PROP={0x14, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x5}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5ca}]}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}]}]}, 0x40}}, 0x0) sendmsg$TIPC_NL_MON_PEER_GET(r2, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000740)={0x19c, r5, 0x2, 0x70bd26, 0x25dfdbfd, {}, [@TIPC_NLA_BEARER={0x48, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e23, 0x0, @mcast1, 0x1}}, {0x20, 0x2, @in6={0xa, 0x4e21, 0x5, @dev={0xfe, 0x80, [], 0x27}, 0x9}}}}]}, @TIPC_NLA_LINK={0xbc, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_PROP={0x14, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0xc08}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x13}]}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0x34, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x401}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x20}]}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0x1c, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x19}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}]}]}, @TIPC_NLA_NET={0x50, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x8000}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x5}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x9}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x40}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0xfffffffffffffff9}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x1}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x2}]}, @TIPC_NLA_MON={0x34, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_REF={0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x5}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x1}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x7f}, @TIPC_NLA_MON_REF={0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xffff}]}]}, 0x19c}, 0x1, 0x0, 0x0, 0x8000}, 0x1) r6 = socket$nl_generic(0x10, 0x3, 0x10) prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) r7 = syz_genetlink_get_family_id$batadv(&(0x7f0000000000)='batadv\x00') sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r6, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)={0x14, r7, 0x301, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) r8 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r8, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=@newqdisc={0x138, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_gred={{0x9, 0x1, 'gred\x00'}, {0x108, 0x2, [@TCA_GRED_STAB={0x104, 0x2, "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"}]}}]}, 0x138}}, 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f00000002c0)={@remote, 0x56}) fcntl$dupfd(r1, 0x0, r6) mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) [ 335.764467][T13787] kAFS: No cell specified [ 335.787121][T13792] kAFS: No cell specified 04:30:33 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) r0 = openat2$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)={0x541500, 0xc, 0xa}, 0x18) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) fsconfig$FSCONFIG_SET_FLAG(r1, 0x6, &(0x7f00000000c0)='posixacl\x00', 0x0, 0x0) renameat(r0, &(0x7f00000000c0)='./file0\x00', r1, &(0x7f0000000100)='./file0\x00') mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) 04:30:33 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0xf9fdffff, 0x0) 04:30:33 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x2, 0x0) 04:30:33 executing program 3: r0 = memfd_create(&(0x7f0000001780)='\xd8\x05V\x15\xa5e\xf1\xb8\xf6\xa2\xba\x85\xb95\x03<\xb9;\xcd\x86\x8bD\xf9\xe9L\xe1Q\xfc\xe2\x97\xa0\xe8s\xb2\x11\xef\x1ac\xc9\x89\xc7\x0fv1\xa1:h\xf6\xf5\a\x8c\xf0Ay\x03\x97\xe77\xc1\xc8\xa6\xcb\xd2\xbe\xe9\xd2\xfb{u\xc3\xcd\xba\xa8G`9\xb5\x82\xa9p\xc8)\xe5$b\v\x8e\b\xf4\xf0\x11\xb4\xcb\"\xf4\xf3\xb4|\xdf\xa3\xdd\x9c\x8a\xf4D\xd3\xea\x11c}\x86H\xca=;i\x96\x183h\xba\x1a\x10', 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000380)='/dev/nullb0\x00', 0x0, 0x0) io_setup(0x1, &(0x7f00000004c0)=0x0) io_submit(r4, 0xd8, &(0x7f00000000c0)=[&(0x7f0000000140)={0x3a004000, 0x2759, 0x10, 0x0, 0x0, r3, &(0x7f0000000000)="98", 0x3e80000000, 0x0, 0x0, 0x2}]) 04:30:33 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x3f00, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, 0x0, &(0x7f00000001c0)) socket(0x0, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000200)={0x0, 'veth1_macvtap\x00'}) 04:30:33 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000000)='batadv\x00') sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)={0x14, r1, 0x301, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) r2 = syz_genetlink_get_family_id$batadv(&(0x7f00000000c0)='batadv\x00') sendmsg$BATADV_CMD_TP_METER(r0, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000001c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r2, @ANYBLOB="04002dbd7000fedbdf250200fdff08003c00080000001094ebc3de03f8401deb05c6f6936184909f84dbc5b722dedcd5"], 0x1c}, 0x1, 0x0, 0x0, 0x404c004}, 0x4000) mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) mount(&(0x7f0000000400)=ANY=[@ANYBLOB="8ba6be5d1aaa587f00000bbc63d023d8ae4c851c1d48eada163ef6a3645f025eb4dd7451752b97e365af9c0d497c9874b98504c879f81e0f135ca147bbf2fcd9d8b6f5af1a5944503755bcd0f0c6caf6dae1010002db54d51382af737353b01fb1a140bc91a4e3694d36961324c64887f9859a147eb87dbafe60c6525f552db10dfd43c5379a626b9ceb41311915432e797a8d04a907bd9726633c976adec530587e8188e2ded67897109de0986e0346e02ab7199dde0f91c061449951d9c5e7861e8be7f5e9e89781915ef363e7b3ed71531b3d733f2d6e13cd280ee5762937259036131b3829e1402c53610a66d000"/261], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x80, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$batadv(&(0x7f0000000000)='batadv\x00') sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r3, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)={0x14, r4, 0x301, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) getsockopt$IP_SET_OP_GET_FNAME(r3, 0x1, 0x53, &(0x7f0000000240)={0x8, 0x7, 0x0, 'syz1\x00'}, &(0x7f0000000280)=0x2c) syz_genetlink_get_family_id$SEG6(&(0x7f0000000000)='SEG6\x00') 04:30:33 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0xff000000, 0x0) [ 336.192492][T13820] kAFS: unparsable volume name [ 336.248383][T13822] kAFS: unparsable volume name 04:30:34 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket(0x10, 0x3, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$inet_udp(0x2, 0x2, 0x0) close(r5) sendto$llc(0xffffffffffffffff, &(0x7f0000000140)="7653bbc6175a3d2b8b43d6fab096eaaa30", 0x11, 0x0, 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88882, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0x2}) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @loopback}}) write$binfmt_misc(r4, &(0x7f0000000140)=ANY=[], 0x1000000c8) splice(r3, 0x0, r5, 0x0, 0x18102, 0x0) 04:30:34 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0xedc0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, 0x0, &(0x7f00000001c0)) socket(0x0, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000200)={0x0, 'veth1_macvtap\x00'}) 04:30:34 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x3, 0x0) 04:30:34 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0xfffff000, 0x0) 04:30:34 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) socket$rds(0x15, 0x5, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000080)='/proc/capi/capi20\x00', 0x4c000, 0x0) ioctl$TUNSETTXFILTER(r1, 0x400454d1, &(0x7f0000000100)={0x1, 0x2, [@local, @link_local]}) fsconfig$FSCONFIG_SET_FLAG(r0, 0x6, &(0x7f00000000c0)='posixacl\x00', 0x0, 0x0) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) 04:30:34 executing program 3: r0 = memfd_create(&(0x7f0000001780)='\xd8\x05V\x15\xa5e\xf1\xb8\xf6\xa2\xba\x85\xb95\x03<\xb9;\xcd\x86\x8bD\xf9\xe9L\xe1Q\xfc\xe2\x97\xa0\xe8s\xb2\x11\xef\x1ac\xc9\x89\xc7\x0fv1\xa1:h\xf6\xf5\a\x8c\xf0Ay\x03\x97\xe77\xc1\xc8\xa6\xcb\xd2\xbe\xe9\xd2\xfb{u\xc3\xcd\xba\xa8G`9\xb5\x82\xa9p\xc8)\xe5$b\v\x8e\b\xf4\xf0\x11\xb4\xcb\"\xf4\xf3\xb4|\xdf\xa3\xdd\x9c\x8a\xf4D\xd3\xea\x11c}\x86H\xca=;i\x96\x183h\xba\x1a\x10', 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000380)='/dev/nullb0\x00', 0x0, 0x0) io_setup(0x1, &(0x7f00000004c0)=0x0) io_submit(r4, 0xe0, &(0x7f00000000c0)=[&(0x7f0000000140)={0x3a004000, 0x2759, 0x10, 0x0, 0x0, r3, &(0x7f0000000000)="98", 0x3e80000000, 0x0, 0x0, 0x2}]) 04:30:34 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0xfffffdf9, 0x0) [ 337.025603][ T8779] FS-Cache: Duplicate cookie detected [ 337.031177][ T8779] FS-Cache: O-cookie c=00000000f8601bb6 [p=00000000a00f4ec0 fl=222 nc=0 na=1] [ 337.040144][ T8779] FS-Cache: O-cookie d=0000000035364e0c n=000000004955261f [ 337.047332][ T8779] FS-Cache: O-key=[2] 'e9e7' [ 337.052050][ T8779] FS-Cache: N-cookie c=0000000041335e40 [p=00000000a00f4ec0 fl=2 nc=0 na=1] [ 337.060804][ T8779] FS-Cache: N-cookie d=0000000035364e0c n=000000003db55c53 [ 337.068027][ T8779] FS-Cache: N-key=[2] 'e9e7' 04:30:34 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x4, 0x0) 04:30:34 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0xf000, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, 0x0, &(0x7f00000001c0)) socket(0x0, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000200)={0x0, 'veth1_macvtap\x00'}) 04:30:34 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000000)='batadv\x00') sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)={0x14, r1, 0x301, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$batadv(&(0x7f00000001c0)='batadv\x00') sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r2, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)={0x14, r3, 0x301, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) sendmsg$BATADV_CMD_GET_BLA_CLAIM(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x2c, r3, 0x100, 0x70bd29, 0x25dfdbfc, {}, [@BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5, 0x2f, 0x1}, @BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x6}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x55}]}, 0x2c}, 0x1, 0x0, 0x0, 0x1}, 0x40) 04:30:34 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0xffffff8c, 0x0) 04:30:34 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x5, 0x0) 04:30:35 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket(0x10, 0x3, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$inet_udp(0x2, 0x2, 0x0) close(r5) sendto$llc(0xffffffffffffffff, &(0x7f0000000140)="7653bbc6175a3d2b8b43d6fab096eaaa30", 0x11, 0x0, 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88882, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0x2}) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @loopback}}) write$binfmt_misc(r4, &(0x7f0000000140)=ANY=[], 0x1000000c8) splice(r3, 0x0, r5, 0x0, 0x18102, 0x0) 04:30:35 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0xff00, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, 0x0, &(0x7f00000001c0)) socket(0x0, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000200)={0x0, 'veth1_macvtap\x00'}) 04:30:35 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) mount(&(0x7f0000000000)=ANY=[@ANYBLOB="e8ee002c200d0b00"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) llistxattr(&(0x7f0000000080)='./file0\x00', &(0x7f00000001c0)=""/218, 0xda) 04:30:35 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0xfffffff6, 0x0) 04:30:35 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x6, 0x0) 04:30:35 executing program 3: r0 = memfd_create(&(0x7f0000001780)='\xd8\x05V\x15\xa5e\xf1\xb8\xf6\xa2\xba\x85\xb95\x03<\xb9;\xcd\x86\x8bD\xf9\xe9L\xe1Q\xfc\xe2\x97\xa0\xe8s\xb2\x11\xef\x1ac\xc9\x89\xc7\x0fv1\xa1:h\xf6\xf5\a\x8c\xf0Ay\x03\x97\xe77\xc1\xc8\xa6\xcb\xd2\xbe\xe9\xd2\xfb{u\xc3\xcd\xba\xa8G`9\xb5\x82\xa9p\xc8)\xe5$b\v\x8e\b\xf4\xf0\x11\xb4\xcb\"\xf4\xf3\xb4|\xdf\xa3\xdd\x9c\x8a\xf4D\xd3\xea\x11c}\x86H\xca=;i\x96\x183h\xba\x1a\x10', 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000380)='/dev/nullb0\x00', 0x0, 0x0) io_setup(0x1, &(0x7f00000004c0)=0x0) io_submit(r4, 0xe8, &(0x7f00000000c0)=[&(0x7f0000000140)={0x3a004000, 0x2759, 0x10, 0x0, 0x0, r3, &(0x7f0000000000)="98", 0x3e80000000, 0x0, 0x0, 0x2}]) 04:30:35 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0xedc000000000, 0x0) [ 338.035311][T13890] kAFS: unparsable volume name [ 338.077973][T13890] kAFS: unparsable volume name 04:30:35 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x7, 0x0) 04:30:35 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0xf0ffff, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, 0x0, &(0x7f00000001c0)) socket(0x0, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000200)={0x0, 'veth1_macvtap\x00'}) 04:30:35 executing program 1: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) fsconfig$FSCONFIG_SET_FLAG(r0, 0x6, &(0x7f00000000c0)='posixacl\x00', 0x0, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) fsconfig$FSCONFIG_SET_FLAG(r1, 0x6, &(0x7f00000000c0)='posixacl\x00', 0x0, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_SET(r2, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000300)={0x40, r3, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_LINK={0x2c, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_PROP={0x14, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x5}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5ca}]}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}]}]}, 0x40}}, 0x0) sendmsg$TIPC_NL_MEDIA_SET(r0, &(0x7f00000005c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000100)={&(0x7f00000002c0)={0x2e0, r3, 0x200, 0x70bd2c, 0x25dfdbfd, {}, [@TIPC_NLA_PUBL={0x44, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x6}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x1000}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x2}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x5}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x1}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0xffffff80}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x80}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x9}]}, @TIPC_NLA_BEARER={0x14, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x10000}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x61b2}]}, @TIPC_NLA_MON={0xc, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x8}]}, @TIPC_NLA_LINK={0x100, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_PROP={0x1c, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x401}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8000}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x55b}]}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0x44, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1b}, @TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6748}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xff}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}]}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0x4c, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xd68c}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8d}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x20}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x17}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}]}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}]}, @TIPC_NLA_PUBL={0x24, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0xc331}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x40}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x4}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0xc0000000}]}, @TIPC_NLA_LINK={0x100, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_PROP={0xc, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8000}]}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0x2c, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x9}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5bd5ee83}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_PRIO={0x8}]}, @TIPC_NLA_LINK_PROP={0x2c, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x10}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xfff}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}]}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0xc, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3ff}]}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0x4c, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x10}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x20}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x18}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x35}]}, @TIPC_NLA_LINK_PROP={0xc, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}]}]}, @TIPC_NLA_SOCK={0x14, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0x66}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x9}]}, @TIPC_NLA_NET={0x30, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_ADDR={0x8, 0x2, 0x4}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x3}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x7ff}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x4}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x3}]}]}, 0x2e0}, 0x1, 0x0, 0x0, 0x4}, 0x400e804) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) fsconfig$FSCONFIG_SET_FLAG(r4, 0x6, &(0x7f00000000c0)='posixacl\x00', 0x0, 0x0) mkdirat(r4, &(0x7f0000000140)='./file0\x00', 0x0) mount(&(0x7f00000001c0)=ANY=[@ANYBLOB="a3a9a707006f5fd1f65e82336bb1a44f707a109f8b2cf74da039a5c32dabb8a89aa0d85dbdd7ad88e1ad349f289dcd08113292af969d2c049a496f738dff085ea9f71a70f5a14733ebf46f1e27af3da0c084740e4840df4eb2f5a59bb2180ed70cdc42ed410681dc82c7ac10a5cd02e4c171e2c2612a331be732121d4f3cf85ebceb464f3351a35d2d355f5c04edeade18554c910da96d6fe7e3c5a85e0de3da793afeac905b34f67c1977b6440255bbbc71e8e3f8f3cf10fc6a06747e373600b6f0086b0b727511baa9624e930f5518480a4caf3c21f7e1d8"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) r5 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x1000001, 0x11, 0xffffffffffffffff, 0x8000000) syz_io_uring_submit(r5, 0x0, 0x0, 0x0) syz_io_uring_complete(r5) 04:30:35 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x1000000000000, 0x0) 04:30:35 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x8, 0x0) 04:30:36 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket(0x10, 0x3, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$inet_udp(0x2, 0x2, 0x0) close(r5) sendto$llc(0xffffffffffffffff, &(0x7f0000000140)="7653bbc6175a3d2b8b43d6fab096eaaa30", 0x11, 0x0, 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88882, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0x2}) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @loopback}}) write$binfmt_misc(r4, &(0x7f0000000140)=ANY=[], 0x1000000c8) splice(r3, 0x0, r5, 0x0, 0x18102, 0x0) 04:30:36 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) syz_mount_image$nfs4(&(0x7f0000000000)='nfs4\x00', &(0x7f0000000080)='./file0\x00', 0x99, 0x4, &(0x7f0000000340)=[{&(0x7f0000000280)="b297100ebc7a8d67e92c527ea712ec3587939c586f538bc7141efb9790919bd9b74a0cd8bdeea1da0425065d7fe6748d4f4cc37053d11ead756c9df0140fa1a89de59452b71311325d51174d51f9445586f605f4b901f375098d0188eeee323505f8c51bfde4376d5a4348ebd5a7cf83812fc99938c59eeebc00ce36c40ed4ba9b27e66b6b8298bf621aef70e06f8f29353595c386a9f67edba6bfff28af4d7df71a2aa0a44134528b92f781d720c7820469adae76ce96c4", 0xb8, 0x4}, {&(0x7f00000000c0)="bee213362fab09aadd662088b937f2c96dbe302afe4b70ab1057f3f336ea5681e223316a3b830908e02ad3bfb6ff5219d4a80153b50e6d4fc24ef0e41d56e4ac4ddc02522d9f9641", 0x48, 0x141}, {&(0x7f00000001c0)="e83bb37c2bfdb92631022c74e06b16a7df756f6f82ca6314616292bdfb535859f43876", 0x23, 0x20000000000000}, {&(0x7f0000000200)="ceb6f4284fc433cc267d49f2d99ab01094beb65ca6f404ca6977b42ed4", 0x1d, 0xfffffffffffffffb}], 0x80800, &(0x7f00000003c0)='&$\x00') mount(&(0x7f0000000240)=ANY=[@ANYBLOB="1c3924b4"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) 04:30:36 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x1000000, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, 0x0, &(0x7f00000001c0)) socket(0x0, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000200)={0x0, 'veth1_macvtap\x00'}) 04:30:36 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0xf0ffffffffffff, 0x0) 04:30:36 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0xf, 0x0) 04:30:36 executing program 3: r0 = memfd_create(&(0x7f0000001780)='\xd8\x05V\x15\xa5e\xf1\xb8\xf6\xa2\xba\x85\xb95\x03<\xb9;\xcd\x86\x8bD\xf9\xe9L\xe1Q\xfc\xe2\x97\xa0\xe8s\xb2\x11\xef\x1ac\xc9\x89\xc7\x0fv1\xa1:h\xf6\xf5\a\x8c\xf0Ay\x03\x97\xe77\xc1\xc8\xa6\xcb\xd2\xbe\xe9\xd2\xfb{u\xc3\xcd\xba\xa8G`9\xb5\x82\xa9p\xc8)\xe5$b\v\x8e\b\xf4\xf0\x11\xb4\xcb\"\xf4\xf3\xb4|\xdf\xa3\xdd\x9c\x8a\xf4D\xd3\xea\x11c}\x86H\xca=;i\x96\x183h\xba\x1a\x10', 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000380)='/dev/nullb0\x00', 0x0, 0x0) io_setup(0x1, &(0x7f00000004c0)=0x0) io_submit(r4, 0xf0, &(0x7f00000000c0)=[&(0x7f0000000140)={0x3a004000, 0x2759, 0x10, 0x0, 0x0, r3, &(0x7f0000000000)="98", 0x3e80000000, 0x0, 0x0, 0x2}]) 04:30:36 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x10, 0x0) [ 338.972191][T13933] kAFS: unparsable volume name [ 338.991743][T13942] kAFS: unparsable volume name 04:30:36 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x100000000000000, 0x0) 04:30:36 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x2000000, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, 0x0, &(0x7f00000001c0)) socket(0x0, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000200)={0x0, 'veth1_macvtap\x00'}) 04:30:36 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x100000200000000, 0x0) 04:30:36 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x3e, 0x0) 04:30:36 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x3000000, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, 0x0, &(0x7f00000001c0)) socket(0x0, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000200)={0x0, 'veth1_macvtap\x00'}) 04:30:37 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket(0x10, 0x3, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$inet_udp(0x2, 0x2, 0x0) close(r5) sendto$llc(0xffffffffffffffff, &(0x7f0000000140)="7653bbc6175a3d2b8b43d6fab096eaaa30", 0x11, 0x0, 0x0, 0x0) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88882, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, 0x0) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @loopback}}) write$binfmt_misc(r4, &(0x7f0000000140)=ANY=[], 0x1000000c8) splice(r3, 0x0, r5, 0x0, 0x18102, 0x0) 04:30:37 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x200000000000000, 0x0) 04:30:37 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0xf0, 0x0) 04:30:37 executing program 3: r0 = memfd_create(&(0x7f0000001780)='\xd8\x05V\x15\xa5e\xf1\xb8\xf6\xa2\xba\x85\xb95\x03<\xb9;\xcd\x86\x8bD\xf9\xe9L\xe1Q\xfc\xe2\x97\xa0\xe8s\xb2\x11\xef\x1ac\xc9\x89\xc7\x0fv1\xa1:h\xf6\xf5\a\x8c\xf0Ay\x03\x97\xe77\xc1\xc8\xa6\xcb\xd2\xbe\xe9\xd2\xfb{u\xc3\xcd\xba\xa8G`9\xb5\x82\xa9p\xc8)\xe5$b\v\x8e\b\xf4\xf0\x11\xb4\xcb\"\xf4\xf3\xb4|\xdf\xa3\xdd\x9c\x8a\xf4D\xd3\xea\x11c}\x86H\xca=;i\x96\x183h\xba\x1a\x10', 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000380)='/dev/nullb0\x00', 0x0, 0x0) io_setup(0x1, &(0x7f00000004c0)=0x0) io_submit(r4, 0xf8, &(0x7f00000000c0)=[&(0x7f0000000140)={0x3a004000, 0x2759, 0x10, 0x0, 0x0, r3, &(0x7f0000000000)="98", 0x3e80000000, 0x0, 0x0, 0x2}]) 04:30:37 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x4000000, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, 0x0, &(0x7f00000001c0)) socket(0x0, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000200)={0x0, 'veth1_macvtap\x00'}) 04:30:37 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x300000000000000, 0x0) 04:30:37 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x300, 0x0) 04:30:37 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x5000000, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, 0x0, &(0x7f00000001c0)) socket(0x0, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000200)={0x0, 'veth1_macvtap\x00'}) 04:30:37 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x400000000000000, 0x0) 04:30:37 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x500, 0x0) 04:30:37 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x6000000, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, 0x0, &(0x7f00000001c0)) socket(0x0, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000200)={0x0, 'veth1_macvtap\x00'}) 04:30:37 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x500000000000000, 0x0) 04:30:38 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket(0x10, 0x3, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$inet_udp(0x2, 0x2, 0x0) close(r5) sendto$llc(0xffffffffffffffff, &(0x7f0000000140)="7653bbc6175a3d2b8b43d6fab096eaaa30", 0x11, 0x0, 0x0, 0x0) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88882, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, 0x0) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @loopback}}) write$binfmt_misc(r4, &(0x7f0000000140)=ANY=[], 0x1000000c8) splice(r3, 0x0, r5, 0x0, 0x18102, 0x0) 04:30:38 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x600, 0x0) 04:30:38 executing program 3: r0 = memfd_create(&(0x7f0000001780)='\xd8\x05V\x15\xa5e\xf1\xb8\xf6\xa2\xba\x85\xb95\x03<\xb9;\xcd\x86\x8bD\xf9\xe9L\xe1Q\xfc\xe2\x97\xa0\xe8s\xb2\x11\xef\x1ac\xc9\x89\xc7\x0fv1\xa1:h\xf6\xf5\a\x8c\xf0Ay\x03\x97\xe77\xc1\xc8\xa6\xcb\xd2\xbe\xe9\xd2\xfb{u\xc3\xcd\xba\xa8G`9\xb5\x82\xa9p\xc8)\xe5$b\v\x8e\b\xf4\xf0\x11\xb4\xcb\"\xf4\xf3\xb4|\xdf\xa3\xdd\x9c\x8a\xf4D\xd3\xea\x11c}\x86H\xca=;i\x96\x183h\xba\x1a\x10', 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000380)='/dev/nullb0\x00', 0x0, 0x0) io_setup(0x1, &(0x7f00000004c0)=0x0) io_submit(r4, 0x80000, &(0x7f00000000c0)=[&(0x7f0000000140)={0x3a004000, 0x2759, 0x10, 0x0, 0x0, r3, &(0x7f0000000000)="98", 0x3e80000000, 0x0, 0x0, 0x2}]) 04:30:38 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x600000000000000, 0x0) 04:30:38 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x7000000, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, 0x0, &(0x7f00000001c0)) socket(0x0, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000200)={0x0, 'veth1_macvtap\x00'}) 04:30:38 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x700, 0x0) 04:30:38 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x700000000000000, 0x0) 04:30:38 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x8000000, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, 0x0, &(0x7f00000001c0)) socket(0x0, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000200)={0x0, 'veth1_macvtap\x00'}) 04:30:38 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x800000000000000, 0x0) 04:30:38 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0xf00, 0x0) 04:30:38 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0xf000000, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, 0x0, &(0x7f00000001c0)) socket(0x0, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000200)={0x0, 'veth1_macvtap\x00'}) 04:30:38 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0xf00000000000000, 0x0) 04:30:39 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket(0x10, 0x3, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$inet_udp(0x2, 0x2, 0x0) close(r5) sendto$llc(0xffffffffffffffff, &(0x7f0000000140)="7653bbc6175a3d2b8b43d6fab096eaaa30", 0x11, 0x0, 0x0, 0x0) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88882, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, 0x0) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @loopback}}) write$binfmt_misc(r4, &(0x7f0000000140)=ANY=[], 0x1000000c8) splice(r3, 0x0, r5, 0x0, 0x18102, 0x0) 04:30:39 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x1020, 0x0) 04:30:39 executing program 3: r0 = memfd_create(&(0x7f0000001780)='\xd8\x05V\x15\xa5e\xf1\xb8\xf6\xa2\xba\x85\xb95\x03<\xb9;\xcd\x86\x8bD\xf9\xe9L\xe1Q\xfc\xe2\x97\xa0\xe8s\xb2\x11\xef\x1ac\xc9\x89\xc7\x0fv1\xa1:h\xf6\xf5\a\x8c\xf0Ay\x03\x97\xe77\xc1\xc8\xa6\xcb\xd2\xbe\xe9\xd2\xfb{u\xc3\xcd\xba\xa8G`9\xb5\x82\xa9p\xc8)\xe5$b\v\x8e\b\xf4\xf0\x11\xb4\xcb\"\xf4\xf3\xb4|\xdf\xa3\xdd\x9c\x8a\xf4D\xd3\xea\x11c}\x86H\xca=;i\x96\x183h\xba\x1a\x10', 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000380)='/dev/nullb0\x00', 0x0, 0x0) io_setup(0x1, &(0x7f00000004c0)=0x0) io_submit(r4, 0x3e7ffff, &(0x7f00000000c0)=[&(0x7f0000000140)={0x3a004000, 0x2759, 0x10, 0x0, 0x0, r3, &(0x7f0000000000)="98", 0x3e80000000, 0x0, 0x0, 0x2}]) 04:30:39 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x1000000000000000, 0x0) 04:30:39 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x10000000, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, 0x0, &(0x7f00000001c0)) socket(0x0, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000200)={0x0, 'veth1_macvtap\x00'}) 04:30:39 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x2000, 0x0) 04:30:39 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x2000000000000000, 0x0) 04:30:39 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x2010, 0x0) 04:30:39 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x20000000, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, 0x0, &(0x7f00000001c0)) socket(0x0, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000200)={0x0, 'veth1_macvtap\x00'}) 04:30:39 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x2010000000000000, 0x0) 04:30:39 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x3e00, 0x0) 04:30:39 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x3f00000000000000, 0x0) 04:30:39 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket(0x10, 0x3, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$inet_udp(0x2, 0x2, 0x0) close(r5) sendto$llc(0xffffffffffffffff, &(0x7f0000000140)="7653bbc6175a3d2b8b43d6fab096eaaa30", 0x11, 0x0, 0x0, 0x0) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88882, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00'}) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @loopback}}) write$binfmt_misc(r4, &(0x7f0000000140)=ANY=[], 0x1000000c8) splice(r3, 0x0, r5, 0x0, 0x18102, 0x0) 04:30:39 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x20100000, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, 0x0, &(0x7f00000001c0)) socket(0x0, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000200)={0x0, 'veth1_macvtap\x00'}) 04:30:39 executing program 3: r0 = memfd_create(&(0x7f0000001780)='\xd8\x05V\x15\xa5e\xf1\xb8\xf6\xa2\xba\x85\xb95\x03<\xb9;\xcd\x86\x8bD\xf9\xe9L\xe1Q\xfc\xe2\x97\xa0\xe8s\xb2\x11\xef\x1ac\xc9\x89\xc7\x0fv1\xa1:h\xf6\xf5\a\x8c\xf0Ay\x03\x97\xe77\xc1\xc8\xa6\xcb\xd2\xbe\xe9\xd2\xfb{u\xc3\xcd\xba\xa8G`9\xb5\x82\xa9p\xc8)\xe5$b\v\x8e\b\xf4\xf0\x11\xb4\xcb\"\xf4\xf3\xb4|\xdf\xa3\xdd\x9c\x8a\xf4D\xd3\xea\x11c}\x86H\xca=;i\x96\x183h\xba\x1a\x10', 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000380)='/dev/nullb0\x00', 0x0, 0x0) io_setup(0x1, &(0x7f00000004c0)=0x0) io_submit(r4, 0x8, &(0x7f00000000c0)=[&(0x7f0000000140)={0x3a000300, 0x2759, 0x10, 0x0, 0x0, r3, &(0x7f0000000000)="98", 0x3e80000000, 0x0, 0x0, 0x2}]) 04:30:39 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0xedc0, 0x0) 04:30:40 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x5824040300000000, 0x0) 04:30:40 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0xf000, 0x0) 04:30:40 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x8cffffff00000000, 0x0) 04:30:40 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x3f000000, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, 0x0, &(0x7f00000001c0)) socket(0x0, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000200)={0x0, 'veth1_macvtap\x00'}) 04:30:40 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0xf6ffffff00000000, 0x0) 04:30:40 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0xff00, 0x0) 04:30:40 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x8cffffff, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, 0x0, &(0x7f00000001c0)) socket(0x0, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000200)={0x0, 'veth1_macvtap\x00'}) 04:30:40 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0xf9fdffff00000000, 0x0) 04:30:40 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket(0x10, 0x3, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$inet_udp(0x2, 0x2, 0x0) close(r5) sendto$llc(0xffffffffffffffff, &(0x7f0000000140)="7653bbc6175a3d2b8b43d6fab096eaaa30", 0x11, 0x0, 0x0, 0x0) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88882, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00'}) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @loopback}}) write$binfmt_misc(r4, &(0x7f0000000140)=ANY=[], 0x1000000c8) splice(r3, 0x0, r5, 0x0, 0x18102, 0x0) 04:30:40 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0xf0ffff, 0x0) 04:30:40 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0xc0ed0000, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, 0x0, &(0x7f00000001c0)) socket(0x0, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000200)={0x0, 'veth1_macvtap\x00'}) 04:30:40 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0xff00000000000000, 0x0) 04:30:40 executing program 3: r0 = memfd_create(&(0x7f0000001780)='\xd8\x05V\x15\xa5e\xf1\xb8\xf6\xa2\xba\x85\xb95\x03<\xb9;\xcd\x86\x8bD\xf9\xe9L\xe1Q\xfc\xe2\x97\xa0\xe8s\xb2\x11\xef\x1ac\xc9\x89\xc7\x0fv1\xa1:h\xf6\xf5\a\x8c\xf0Ay\x03\x97\xe77\xc1\xc8\xa6\xcb\xd2\xbe\xe9\xd2\xfb{u\xc3\xcd\xba\xa8G`9\xb5\x82\xa9p\xc8)\xe5$b\v\x8e\b\xf4\xf0\x11\xb4\xcb\"\xf4\xf3\xb4|\xdf\xa3\xdd\x9c\x8a\xf4D\xd3\xea\x11c}\x86H\xca=;i\x96\x183h\xba\x1a\x10', 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000380)='/dev/nullb0\x00', 0x0, 0x0) io_setup(0x1, &(0x7f00000004c0)=0x0) io_submit(r4, 0x8, &(0x7f00000000c0)=[&(0x7f0000000140)={0x3a000500, 0x2759, 0x10, 0x0, 0x0, r3, &(0x7f0000000000)="98", 0x3e80000000, 0x0, 0x0, 0x2}]) 04:30:41 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0xfffffffffffff000, 0x0) 04:30:41 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x1000000, 0x0) 04:30:41 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0xf6ffffff, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, 0x0, &(0x7f00000001c0)) socket(0x0, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000200)={0x0, 'veth1_macvtap\x00'}) 04:30:41 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) fsconfig$FSCONFIG_SET_FLAG(r0, 0x6, &(0x7f00000000c0)='posixacl\x00', 0x0, 0x0) r1 = open_tree(r0, &(0x7f0000000000)='./file0\x00', 0x8100) getsockopt$inet_tcp_int(r1, 0x6, 0x5, &(0x7f0000000080), &(0x7f00000000c0)=0x4) mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) mount(&(0x7f0000000340)=ANY=[@ANYBLOB="e9ff00009e9f0bed8bbdf0b1cfd08899e447d2f78cc26e5760b9d732ac411b96908a2df0e9b9249c5cbec65268c79ab97c73840ec1c4b0847521c6e3809304db4fd11df4c5551e5555c0a28bec25321711123c88da52acbdd03666b82e4387672b2e14bf5070e58fadf62ad03d8f0ff9bc2dee0fdc6fa3eb3700382a5b82e05bfae0057da970e4f51f49b6f5f33dde0f59c0f89801441ff3d3c5393272e000cc93c62f46517c7be68388a3c6c581d898cdf62ea3082be537ce0f59311f31422ab8601a0a9c5f14029d3e261111501f5eb7c0bb54c2d442fb4e4fdfefcc1c907678bdc50d9d0246b0e5d762"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) 04:30:41 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x2000000, 0x0) 04:30:41 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0xf9fdffff, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, 0x0, &(0x7f00000001c0)) socket(0x0, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000200)={0x0, 'veth1_macvtap\x00'}) [ 344.227548][T14184] kAFS: unparsable volume name 04:30:41 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) pipe2(&(0x7f00000000c0)={0xffffffffffffffff}, 0x800) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$batadv(&(0x7f0000000000)='batadv\x00') sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r1, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)={0x14, r2, 0x301, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) r3 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r4, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='9p\x00', 0x1000065, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_uid={'access', 0x3d, 0xee01}}, {@version_L='version=9p2000.L'}], [{@pcr={'pcr', 0x3d, 0x11}}, {@func={'func', 0x3d, 'FIRMWARE_CHECK'}}, {@dont_hash='dont_hash'}, {@func={'func', 0x3d, 'PATH_CHECK'}}, {@fowner_eq={'fowner', 0x3d, r4}}, {@subj_role={'subj_role', 0x3d, ':}}\x04'}}, {@fsname={'fsname', 0x3d, '/{\xb6*'}}]}}) 04:30:41 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket(0x10, 0x3, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$inet_udp(0x2, 0x2, 0x0) close(r5) sendto$llc(0xffffffffffffffff, &(0x7f0000000140)="7653bbc6175a3d2b8b43d6fab096eaaa30", 0x11, 0x0, 0x0, 0x0) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88882, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00'}) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @loopback}}) write$binfmt_misc(r4, &(0x7f0000000140)=ANY=[], 0x1000000c8) splice(r3, 0x0, r5, 0x0, 0x18102, 0x0) 04:30:41 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) fsconfig$FSCONFIG_SET_FLAG(0xffffffffffffffff, 0x6, &(0x7f00000000c0)='posixacl\x00', 0x0, 0x0) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000480), 0x4) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) fsconfig$FSCONFIG_SET_FLAG(r1, 0x6, &(0x7f00000000c0)='posixacl\x00', 0x0, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) fsconfig$FSCONFIG_SET_FLAG(r2, 0x6, &(0x7f00000000c0)='posixacl\x00', 0x0, 0x0) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) fsconfig$FSCONFIG_SET_FLAG(r3, 0x6, &(0x7f00000000c0)='posixacl\x00', 0x0, 0x0) r4 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, 0x0, 0x26}, 0x20) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000040)=@framed, &(0x7f0000000080)='GPL\x00', 0x5, 0x1f6, &(0x7f00000002c0)=""/168, 0x0, 0x0, [], 0x0, 0x0, r4, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x1}, 0x6d) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000280)={r5, 0xc0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1b, 0x3, &(0x7f0000000200)=@framed={{0x18, 0x2}}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r6}, 0x70) r7 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) fsconfig$FSCONFIG_SET_FLAG(r7, 0x6, &(0x7f00000000c0)='posixacl\x00', 0x0, 0x0) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x1d, 0xa, &(0x7f0000000540)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9}, [@call={0x85, 0x0, 0x0, 0x42}, @initr0={0x18, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x6}, @func={0x85, 0x0, 0x1, 0x0, 0x2}, @map={0x18, 0x6, 0x1, 0x0, r2}, @alu={0x7, 0x1, 0x7, 0x1, 0x4, 0xfffffffffffffff8, 0xffffffffffffffff}]}, &(0x7f00000005c0)='GPL\x00', 0x2, 0x4f, &(0x7f0000000600)=""/79, 0x41000, 0x0, [], 0x0, 0xe, r3, 0x8, &(0x7f0000000680)={0x3, 0x1}, 0x8, 0x10, &(0x7f00000006c0)={0x3, 0x0, 0x2, 0x1}, 0x10, r6, r7}, 0x78) r9 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) fsconfig$FSCONFIG_SET_FLAG(r9, 0x6, &(0x7f00000000c0)='posixacl\x00', 0x0, 0x0) io_submit(0x0, 0x5, &(0x7f0000000840)=[&(0x7f00000001c0)={0x0, 0x0, 0x0, 0x3, 0x6, 0xffffffffffffffff, &(0x7f00000000c0)="344c9ec700d55b7a8fb32bbc4d0d7ecbe81a9757216e4aa920f01d0a9fd6bd7edcc44d838cbbd1d870fa39f4dc57e143b768b14edd3c45ba90f796f364a9c85c8fa624356cb6aa6e5fe0bd7f78150db58ff635b89689bd5cc4cb295e", 0x5c, 0xfffffffffffffe01, 0x0, 0x2}, &(0x7f0000000380)={0x0, 0x0, 0x0, 0xa, 0x1000, 0xffffffffffffffff, &(0x7f0000000280)="803628b282d1a6b6e53d97d595fa384a14115a67f01cce8dba5c61557c1d0422b01687f2e94279427080ed03e720c665c10a43ea84500df34e6627bbed574486ffdf06c3c0f589ae18dd46572ce7b9717791971f9b91ad46d16f922116d9bd206ebc5d1cde50ece93b80467ad4a56b4272b988878f8924c5b1de495ad33e2cc37ed63c396edb1131a8d82f67f01bff94a1aebf204fd134d21fb669ce721a954181f48e0b0cd90bfe72b28b43d6709811768f4aa483382f78588079df97f21fe1278022a2a8a6cd1b9499083691ebbb3ffa3c88fde7853c9b813e9c0cb03572ae3686006017baff133d4795ecf1ee83b51ca48267", 0xf4, 0xffffffff, 0x0, 0x1}, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x8, 0x1f, 0xffffffffffffffff, &(0x7f00000003c0)="75930f42bc71c64e71902bfb812c3edbf4c6c31541a1bd93f2a497d6f8b073326638507c16887606bdb02c1239908feb5e63f1788aa94a7521c810a163c12cf1c63890988e32d212e5ba1eb2940e08d59b13c7c37454edc4560ee02de385e7", 0x5f, 0x3f, 0x0, 0x1}, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x7, 0x1f, r0, &(0x7f00000004c0)="589f592a08dc60f11ec8997bbcd05b48315858cfd711bffceabf5bc8959bcc60b43b2742bf89b9350c4ef8b2", 0x2c, 0xfff, 0x0, 0x1, r1}, &(0x7f0000000800)={0x0, 0x0, 0x0, 0x0, 0x2, r8, &(0x7f0000000780)="122f5554c0d450178bdd5efd194bb0118e658da0bcda32ab78b3d774361bbefe4b2e5535f118f56ebbca042d3ffb723d61895066267d910e6c3746cb81df7156b35eb92aef4834c4d3c4b4961453054d90d19606e9867924e6ba40cdade4f34dd6962b5f329c4261814ba82013c1353bf68f57c4c46020", 0x77, 0x80000000, 0x0, 0x2, r9}]) 04:30:41 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x3000000, 0x0) 04:30:41 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0xff000000, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, 0x0, &(0x7f00000001c0)) socket(0x0, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000200)={0x0, 'veth1_macvtap\x00'}) 04:30:41 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='nfs4\x00', 0x1e0000, 0x0) r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=ANY=[@ANYBLOB="440000006600000126bd7000fddbdf2500000000", @ANYRES32=0x0, @ANYBLOB="f8ff040009000f00ffffe0ff08000b000100000008000b000000000008000b008500000008000b0005000000"], 0x44}}, 0x4010) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r3 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r3, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=@newqdisc={0x138, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_gred={{0x9, 0x1, 'gred\x00'}, {0x108, 0x2, [@TCA_GRED_STAB={0x104, 0x2, "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"}]}}]}, 0x138}}, 0x0) r4 = socket(0x11, 0x800000003, 0x0) bind(r4, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r4, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r6 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r6, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=@newqdisc={0x138, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r5, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_gred={{0x9, 0x1, 'gred\x00'}, {0x108, 0x2, [@TCA_GRED_STAB={0x104, 0x2, "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"}]}}]}, 0x138}}, 0x0) r7 = socket(0x11, 0x800000003, 0x0) bind(r7, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r7, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r9 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r9, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=@newqdisc={0x138, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r8, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_gred={{0x9, 0x1, 'gred\x00'}, {0x108, 0x2, [@TCA_GRED_STAB={0x104, 0x2, "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"}]}}]}, 0x138}}, 0x0) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000540)={&(0x7f0000000280)=ANY=[@ANYBLOB="bc020000", @ANYRES16=0x0, @ANYBLOB="000129bd7000ffdbdf250200000008000100", @ANYRES32=0x0, @ANYBLOB="1c0202805c000100240001006270665f686173685f66756e6300000000000000000000000000000000000000050003000b0000002c00040003001f6301000000000009f0ff0f00000400091cff010000f9ff0140160e00005aef1f070001000040000100240001007072696f72697479000000000000000000000000000000000000000000000000050003000e000000080004000600000008000600", @ANYRES32=0x0, @ANYBLOB="3c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000005000300060000000400040008000600", @ANYRES32=0x0, @ANYBLOB="40000100240001006d6f6465000000000000000000000000000000000000000000000000000000000500030005000000100004006c6f616462616c616e636500400001002400010071756575655f6964000000000000000000000000000000000000000000000000050003000300000008000400cf21000008000600", @ANYRES32=0x0, @ANYBLOB="40000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000050003000300000008000400", @ANYRES32=r2, @ANYBLOB="080007000000000040000100240001006c625f686173685f737461747300000000000000000000000000000000000000050003000b0000000800040007000000080007000000000040000100240001006c625f686173685f737461747300000000000000000000000000000000000000050003000b0000000800040006000000080007000000000008000100", @ANYRES32=r5, @ANYBLOB="7c00028038000103240001006e6f746966795f70656572735f696e74657276616c00000000000000000000000500030003000000260004000180000040000100240001007072696f7269747900ffff0000000000000000000000000000000000000000000003000e00000008000400000000000800060000", @ANYRES32=r8, @ANYBLOB], 0x2bc}, 0x1, 0x0, 0x0, 0x90}, 0x8014) 04:30:41 executing program 3: r0 = memfd_create(&(0x7f0000001780)='\xd8\x05V\x15\xa5e\xf1\xb8\xf6\xa2\xba\x85\xb95\x03<\xb9;\xcd\x86\x8bD\xf9\xe9L\xe1Q\xfc\xe2\x97\xa0\xe8s\xb2\x11\xef\x1ac\xc9\x89\xc7\x0fv1\xa1:h\xf6\xf5\a\x8c\xf0Ay\x03\x97\xe77\xc1\xc8\xa6\xcb\xd2\xbe\xe9\xd2\xfb{u\xc3\xcd\xba\xa8G`9\xb5\x82\xa9p\xc8)\xe5$b\v\x8e\b\xf4\xf0\x11\xb4\xcb\"\xf4\xf3\xb4|\xdf\xa3\xdd\x9c\x8a\xf4D\xd3\xea\x11c}\x86H\xca=;i\x96\x183h\xba\x1a\x10', 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000380)='/dev/nullb0\x00', 0x0, 0x0) io_setup(0x1, &(0x7f00000004c0)=0x0) io_submit(r4, 0x8, &(0x7f00000000c0)=[&(0x7f0000000140)={0x3a000600, 0x2759, 0x10, 0x0, 0x0, r3, &(0x7f0000000000)="98", 0x3e80000000, 0x0, 0x0, 0x2}]) 04:30:42 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x4000000, 0x0) 04:30:42 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0xfffff000, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, 0x0, &(0x7f00000001c0)) socket(0x0, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000200)={0x0, 'veth1_macvtap\x00'}) 04:30:42 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) fsconfig$FSCONFIG_SET_FLAG(r0, 0x6, &(0x7f00000000c0)='posixacl\x00', 0x0, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000000)) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x2210021, 0x0) 04:30:42 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) fsconfig$FSCONFIG_SET_FLAG(r0, 0x6, &(0x7f00000000c0)='posixacl\x00', 0x0, 0x0) getresuid(&(0x7f0000000000), &(0x7f0000000080)=0x0, &(0x7f00000000c0)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = getpid() r4 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setresgid(0x0, r5, 0x0) sendmsg$unix(r2, &(0x7f0000001440)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=[@cred={{0x1c, 0x1, 0x2, {r3, 0x0, r5}}}], 0x20}, 0x0) write$FUSE_ENTRY(r0, &(0x7f0000000280)={0x90, 0x0, 0x8, {0x2, 0x1, 0x1400000000000000, 0x3ff, 0x0, 0xfffffffc, {0x0, 0xa60e, 0x57a60000, 0x2, 0x20, 0x2a9f, 0x2, 0xffff, 0x3, 0x800, 0x2d9b, r1, r5, 0x80, 0x8}}}, 0x90) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) 04:30:42 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x5000000, 0x0) 04:30:42 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0xfffffdf9, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, 0x0, &(0x7f00000001c0)) socket(0x0, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000200)={0x0, 'veth1_macvtap\x00'}) 04:30:42 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket(0x10, 0x3, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$inet_udp(0x2, 0x2, 0x0) close(r5) sendto$llc(0xffffffffffffffff, &(0x7f0000000140)="7653bbc6175a3d2b8b43d6fab096eaaa30", 0x11, 0x0, 0x0, 0x0) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88882, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0x2}) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @loopback}}) write$binfmt_misc(r4, &(0x7f0000000140)=ANY=[], 0x1000000c8) splice(r3, 0x0, r5, 0x0, 0x18102, 0x0) 04:30:42 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x3) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$batadv(&(0x7f0000000000)='batadv\x00') sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r1, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)={0x14, r2, 0x301, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) pwritev(r1, &(0x7f0000000100)=[{&(0x7f0000000280)="1eadec455696b411ca4624a1b6bd9cd7c3f8b08488c89328b4dd8794a119a8cefa6842dd9ecbde7a99a273887bdfa3f1da5c7d7413ecdfa8092056af911c69f610a6390116742279b6fbea92e275c98c6a8e069461cc64cecf77b1c5069861adb660d2c7a9cb308291fe7bf5b671e2663bf4d98356830eead09205ce65138d127f57e9f36ddc0de57b308e11b4304f6ceff165ae2401889bc2524ec3058c20133267c11afbf6fadc511508217b5eb7a3ed705e4157268dca735788", 0xbb}, {&(0x7f0000000340)="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", 0x1000}, {&(0x7f0000000080)="d173e2a65befde776523682add20de271f198205aa454448a2", 0x19}, {&(0x7f0000001340)="15364d981f338360b77e1825fa1ffe58f8150d93975c7ad9f7f4415d63537d7a90ccb30dda04d68386a38af9f053e46aa3ea75911b591d573c1b113f32a818c2c8cdbf76e68aabdc1e96bb7986bc48cec3ed6d7bf72d77c69fc26df06df10e3752fd4eb118a6e6602e814ed737f590c29966d729a8e44c894a0915453ba8d33984a452efccde7c81c52e839e1ce8c92faa2bcf0a400a10d11e3bd94e218c12d1fb52940599f6c6292be70a905da4b6af4a7c7d", 0xb3}], 0x4, 0x0, 0xee) fsconfig$FSCONFIG_SET_FLAG(r0, 0x6, &(0x7f00000000c0)='posixacl\x00', 0x0, 0x0) ioctl$SNAPSHOT_CREATE_IMAGE(r0, 0x40043311, &(0x7f0000000000)) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) 04:30:42 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x6000000, 0x0) 04:30:42 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) socket$nl_crypto(0x10, 0x3, 0x15) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9003a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) fsconfig$FSCONFIG_SET_FLAG(r0, 0x6, &(0x7f00000000c0)='posixacl\x00', 0x0, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x10, &(0x7f0000000000)=0x3, 0x4) 04:30:42 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0xffffff7f, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, 0x0, &(0x7f00000001c0)) socket(0x0, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000200)={0x0, 'veth1_macvtap\x00'}) 04:30:42 executing program 3: r0 = memfd_create(&(0x7f0000001780)='\xd8\x05V\x15\xa5e\xf1\xb8\xf6\xa2\xba\x85\xb95\x03<\xb9;\xcd\x86\x8bD\xf9\xe9L\xe1Q\xfc\xe2\x97\xa0\xe8s\xb2\x11\xef\x1ac\xc9\x89\xc7\x0fv1\xa1:h\xf6\xf5\a\x8c\xf0Ay\x03\x97\xe77\xc1\xc8\xa6\xcb\xd2\xbe\xe9\xd2\xfb{u\xc3\xcd\xba\xa8G`9\xb5\x82\xa9p\xc8)\xe5$b\v\x8e\b\xf4\xf0\x11\xb4\xcb\"\xf4\xf3\xb4|\xdf\xa3\xdd\x9c\x8a\xf4D\xd3\xea\x11c}\x86H\xca=;i\x96\x183h\xba\x1a\x10', 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000380)='/dev/nullb0\x00', 0x0, 0x0) io_setup(0x1, &(0x7f00000004c0)=0x0) io_submit(r4, 0x8, &(0x7f00000000c0)=[&(0x7f0000000140)={0x3a000700, 0x2759, 0x10, 0x0, 0x0, r3, &(0x7f0000000000)="98", 0x3e80000000, 0x0, 0x0, 0x2}]) [ 345.684080][T14256] kAFS: No cell specified [ 345.721488][T14263] kAFS: No cell specified 04:30:43 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0xffffff8c, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, 0x0, &(0x7f00000001c0)) socket(0x0, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000200)={0x0, 'veth1_macvtap\x00'}) 04:30:43 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x7000000, 0x0) 04:30:43 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) r0 = syz_open_dev$video4linux(&(0x7f0000000000)='/dev/v4l-subdev#\x00', 0x1, 0x10000) ioctl$VIDIOC_SUBDEV_G_FRAME_INTERVAL(r0, 0xc0305615, &(0x7f0000000080)={0x0, {0x8, 0x8000}}) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) 04:30:43 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000000)='batadv\x00') sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)={0x14, r1, 0x301, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, &(0x7f0000000000)={r0, 0x5, 0x9, 0x2}) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) fsconfig$FSCONFIG_SET_FLAG(r3, 0x6, &(0x7f00000000c0)='posixacl\x00', 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$batadv(&(0x7f0000000000)='batadv\x00') sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r5, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)={0x14, r6, 0x301, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) sendmmsg$sock(r5, &(0x7f0000002000)=[{{0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000340)="ba6906e265a0a6ddc87ff7b7b03a0d1d52a83a9338dbad45e5e154218987040e434d95d8867f932de61ac27a945518f77015c6e89789a9c7fd8536a55d0dfd8085fee1ccfc8cb237e6fed701d7169020692428481ae7d9b08a75c69dbf671805622fc2c4427fabfcc9a311f867b37a443e5a1e31d6235cd2d35958f57aa0b7bed5ef1d73680082dc79d9073baf8a313bdef7809651101e42e52f38d9592bf4b6ac84c29fd0eaa2859027b8eb908df3f36c114654ea23d43f0edfb6848ebe318ed5b6c4dbd17ee429c30757926f0e2b6af406fe8d24e5f2", 0xd7}, {&(0x7f00000001c0)="2c73a80aac0e10d2accfb9def8c5066e05a067faee9003f705141b24cbea24433ceb31bf18acdeed2b626bd4ec120ddd40ee1a9b9798b0ef363b8d5c225a779a4c389541cfcac8db18d5efa5b940749eb17b4b559d51e973d6401a0d790aa4a5a8da45674bdad36b11d9176c9bbbbf44e2", 0x71}], 0x2, &(0x7f0000000480)=[@timestamping={{0x14}}, @txtime={{0x18, 0x1, 0x3d, 0x800}}, @txtime={{0x18, 0x1, 0x3d, 0x7}}, @txtime={{0x18, 0x1, 0x3d, 0x1}}, @mark={{0x14}}, @txtime={{0x18}}, @mark={{0x14, 0x1, 0x24, 0x9}}, @timestamping={{0x14, 0x1, 0x25, 0xffffff80}}], 0xc0}}, {{0x0, 0x0, &(0x7f0000000780)=[{&(0x7f00000005c0)="985e8423fe2cfe903f1d38cc7700a0c3666442b020a8a50136fb4f8569b3412e2c86ae1002c0113e990c0c5a155600fb2b9e6a438a54333f04db3008231e6af6b080b8a0eef94867ca10315b627263c3567d65bbde6f012d40aa80f1e1e9b5cb015df3220675bb5e6e5737722224f6db15927dd7aaf02c38c18f040b3ccadaa3520df65d66b89196f2dd883693b10913234d314fab0cd9eb90299a3b34637d6ebc7c8de4a3d3d20423c97124d2c178a4b3ff959aaf0fff70a6c245", 0xbb}, {&(0x7f0000000540)="ea51c66c43761504d5e4916105be31cab88b2f5b", 0x14}, {&(0x7f0000000680)="70aecd4c697d4a7334cfc33a23627e3f14e1487e951e32817be930ad0c769248513059b16944f015bc07268719b122719e06113969850af11c52705221084b218463a4ed4c1bb95275e16cc0f21779971f7fa6d84c8c6fef8ddc8a49145f5e9a7787aefe002511bd4419c43eaa49670c2e662ca6b85574467d3d9bcdd3dc8a7347523de16ac7ef31518fd72b56ff4235b7763cddcadcbbd0d86a4b1d117b350736ad94b8994cee1ea7e696ac00340367d2a918c84e82f7774e102e8e76e1366c466f1525b00f160b4a76e4e5a2315a12b3636c5a9e5405303b620b", 0xdb}], 0x3, &(0x7f00000007c0)=[@timestamping={{0x14, 0x1, 0x25, 0x8}}], 0x18}}, {{0x0, 0x0, &(0x7f0000000cc0)=[{&(0x7f0000000800)="6d485e91f85ba01e159fd7a1b0d64adc1aff6ceb372d9b5941c015507ab29d1ef51bf60347c182b8b19de8e70015fb636b0b519645bcf5da6119debf65e8fb5d94be1f52c6b606e603aba5070696d9899348419493bbc61746e056a1b45fde5c2d2b88bebdc30b656623fb6105e682344a64286069ac6328ecdab8ed7b5f1f8b020e539676cf3bd3a068efdfd294830b45b3e23335cdaba3d27999ba395b00cd39d5fa51", 0xa4}, {&(0x7f00000008c0)="72d7925a19373ff0d115f53c6e0620eadab8ad382c50456f120796d2cb227ef6187447a1c4f462441ea311341744bf589a11aef3f956a516e244c1af4616cf30b4ad3a25560b71886f0dcc624b5d0fc913e1a417db8f35eee607636887c375ccbd736e9de4a198a42b8083dadc68a24bcc57d62fdcadeda0257f6d0c62489ee62cf0339e9d870e63a63219682752f3cd5ca441c68323357879d22788de7ae88fc8de85e250e437a9740247bdb5ed76c60657aa6deb4eeb", 0xb7}, {&(0x7f0000000980)="5ab4840ba9c09bfbd8425c60e52a97e75c8736349834ba32b38c78ac791b52f784888adea9c144706a70d720fddb08bbaf1bc929bf216b2c52d134d0e8508b32cccd9456a76bb1b50ce31fc42b77523e8bf7029d185f1a16c5de75d289b5d23dd5e853e79d3f6a8091fac59c3fd24c9c50aa322abdf67dc77347c6d5b1a75ee3e1bc7d7f50eebec7b866496e9d23547e12958cd18a1782f18fa4ed463dc318463823618e92c74050be6ef397600e59322475e4bccbab79522b07ead3bf408bc12d830fe0d074f4e42024b1d4253bb1540de4ee98b4e4564115e3", 0xda}, {&(0x7f0000000a80)="58da8b18bb9a8265a631c8ffdf1b885371da8465c9f6357dfd8f0e8cb458d019dc17bc60d9b5108d94dba62f4c1ec198c7c5c34745ecb2a602015c1128bc0efd041fb2de60cff7b751e5581b9a8c8ea7dc875d491acd47d484225e4f2ad5c01c5a6fc6db02e17f30a62417d25ad8cba971e4d3736160501dbfb2920bae977ea387a57ec64ab4c6a97dc63d1226e45c55beff", 0x92}, {&(0x7f0000000b40)="52ff4bc62c45397e7625bbcad55aefe72102659096e6b7531a5a58bcec11c615f24b2bf4c0386072a0a56e6b5c2978638c6788fcee14", 0x36}, {&(0x7f0000000b80)="2c370ed90d82a62a82786d7fed89eabf38077216ef04f09762b3e420c0f3effb4c17dee39df544c7cf386b86a2d8197b57eb0780720354fbbec8699290676cef1f3d0165a6ed6319aa4b7888d5dfda6f50763a783eeded8d6c013b70fdac7155f175445c9a973d42585c5aecb1d50cf90b62bd4733cfa98e8a99d3f334faafb0ca72a436391a06b3c2c513f6271f9ebec20621afafe52894b6d79c63a841a00e0d6a905cb78490ef574636fdcf85bda8c4766d4c3e88f86c0910b9bb8ad4680e7da83a6f0205fc7f4dfb63b079c98bd35d78a7b683bff015fbc19036", 0xdc}, {&(0x7f0000000c80)="9f7300c3868575b910e023d1bce9b8eb", 0x10}], 0x7, &(0x7f0000000d40)=[@timestamping={{0x14, 0x1, 0x25, 0x7fff}}, @mark={{0x14, 0x1, 0x24, 0x1}}, @timestamping={{0x14, 0x1, 0x25, 0x7}}, @mark={{0x14, 0x1, 0x24, 0x3}}, @txtime={{0x18, 0x1, 0x3d, 0xfffffffffffff001}}], 0x78}}, {{&(0x7f0000000dc0)=@hci={0x1f, 0x4, 0x4}, 0x80, &(0x7f0000001f80)=[{&(0x7f0000000e40)="669a361a545931ac9308b9c4acf4", 0xe}, {&(0x7f0000000e80)="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", 0x1000}, {&(0x7f0000001e80)="8e84055457ec36e94b1cbd826ce7a64f09e112a71fb0b601af028c0b295f9cff72e1508df2078fee757f8077e27e2584710e0ec451254c9fe571c90acc00371f07615784c3d55c102694ffa49918f42604a45bf7c14c7a60b7a0a9de9e1716b46c19e7dc525f3e55c0de7d0609b4e1357e7ba165206c9499284c01e6ef6502b333ab665b19d78106a8bf6d55573d1a70e22fef4f11340ce1d4377146689f4c6010abc2589c06caaf8c7a88f5bbfa08a81c0a896c70b587764d6233b79212a19c1c738eaa064104292b896cfa8ba1181dc46e2a6808b8938d30ab0f52", 0xdc}], 0x3, &(0x7f0000001fc0)=[@timestamping={{0x14, 0x1, 0x25, 0x9}}, @timestamping={{0x14, 0x1, 0x25, 0x7}}], 0x30}}], 0x4, 0x4000) close(r4) r7 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r7, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp_SCTP_RTOINFO(r4, 0x84, 0x0, &(0x7f0000000080)={r8, 0x82000000}, 0x10) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r3, 0x84, 0x6, &(0x7f0000000280)={r8, @in={{0x2, 0x4e22, @private=0xa010100}}}, &(0x7f00000000c0)=0x84) ioctl$vim2m_VIDIOC_ENUM_FMT(r2, 0xc0405602, &(0x7f0000000080)={0x0, 0x1, 0x1, "7b8c23bdeece3e5fc4cd5ab5f1521a60bbb2f4e491a1f25f0fea1a113a631b0e", 0x1ee5f01ed7aad53a}) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) [ 345.989325][ T7440] FS-Cache: Duplicate cookie detected [ 345.994853][ T7440] FS-Cache: O-cookie c=000000007336d2bd [p=00000000a00f4ec0 fl=222 nc=0 na=1] [ 346.003872][ T7440] FS-Cache: O-cookie d=0000000000000000 n=0000000000000000 [ 346.011175][ T7440] FS-Cache: O-key=[2] 'e9e7' [ 346.015782][ T7440] FS-Cache: N-cookie c=00000000df1e58da [p=00000000a00f4ec0 fl=2 nc=0 na=1] [ 346.024551][ T7440] FS-Cache: N-cookie d=0000000035364e0c n=000000002fc3d040 [ 346.031829][ T7440] FS-Cache: N-key=[2] 'e9e7' 04:30:43 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x8000000, 0x0) 04:30:43 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0xfffffff6, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, 0x0, &(0x7f00000001c0)) socket(0x0, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000200)={0x0, 'veth1_macvtap\x00'}) 04:30:43 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket(0x10, 0x3, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$inet_udp(0x2, 0x2, 0x0) close(r5) sendto$llc(0xffffffffffffffff, &(0x7f0000000140)="7653bbc6175a3d2b8b43d6fab096eaaa30", 0x11, 0x0, 0x0, 0x0) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88882, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0x2}) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @loopback}}) write$binfmt_misc(r4, &(0x7f0000000140)=ANY=[], 0x1000000c8) splice(r3, 0x0, r5, 0x0, 0x18102, 0x0) 04:30:43 executing program 4: socket$kcm(0x2, 0x0, 0x2) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffff7, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') sendmsg$NL80211_CMD_GET_STATION(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000080)=ANY=[@ANYBLOB="24000000b69c26b9a40d0a54cec7072199e1ea17e8ee969438f11e52dda918bf45da2a8eab570bb8f5c8ff3b0e1e0ab6c0c6234878bdbe152c2ca30e9177e9dc558b5c044a0a653a1cf8b5de4001d4c402f1af397525869e716f3f25e1dbabeed6824d86255f9269b78ce3a89f7c48ab0c44fd9d2e7ddcc49e0c1f06cd0cfcd3c7a963130055fb9c15aa51b0d281925315b970bcdf4b507f66fcfd3514253b68", @ANYRES16=r1, @ANYBLOB="2b0f00000000000000006700000006001200000000000500e40000000000"], 0x24}}, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0xc020662a, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) socket$kcm(0x2, 0x0, 0x2) socket$nl_generic(0x10, 0x3, 0x10) mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) mount(&(0x7f0000000440)=ANY=[@ANYBLOB="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"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) 04:30:43 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) mount(&(0x7f0000000080)=ANY=[@ANYBLOB="cd4e2b038cf6a74eb4274758fbf7fa501f52fcf218ec0d7658625098655731b042b1eeed8eb3c973a638242b2ade46d2c948e8bd4a8828d01f084fe078c730af10a0588957a55414800d6f01a5fcfd9fd243e354609b825f335627056c0328e15e1ceb210c411d5b65f7943e590368bffaf07aa218ffbdaf68c786695dbde0"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) 04:30:43 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0xf000000, 0x0) 04:30:43 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0xedc000000000, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, 0x0, &(0x7f00000001c0)) socket(0x0, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000200)={0x0, 'veth1_macvtap\x00'}) 04:30:43 executing program 3: r0 = memfd_create(&(0x7f0000001780)='\xd8\x05V\x15\xa5e\xf1\xb8\xf6\xa2\xba\x85\xb95\x03<\xb9;\xcd\x86\x8bD\xf9\xe9L\xe1Q\xfc\xe2\x97\xa0\xe8s\xb2\x11\xef\x1ac\xc9\x89\xc7\x0fv1\xa1:h\xf6\xf5\a\x8c\xf0Ay\x03\x97\xe77\xc1\xc8\xa6\xcb\xd2\xbe\xe9\xd2\xfb{u\xc3\xcd\xba\xa8G`9\xb5\x82\xa9p\xc8)\xe5$b\v\x8e\b\xf4\xf0\x11\xb4\xcb\"\xf4\xf3\xb4|\xdf\xa3\xdd\x9c\x8a\xf4D\xd3\xea\x11c}\x86H\xca=;i\x96\x183h\xba\x1a\x10', 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000380)='/dev/nullb0\x00', 0x0, 0x0) io_setup(0x1, &(0x7f00000004c0)=0x0) io_submit(r4, 0x8, &(0x7f00000000c0)=[&(0x7f0000000140)={0x3a002000, 0x2759, 0x10, 0x0, 0x0, r3, &(0x7f0000000000)="98", 0x3e80000000, 0x0, 0x0, 0x2}]) [ 346.712816][T14311] kAFS: unparsable volume name 04:30:44 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x4e) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) 04:30:44 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x1000000000000, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, 0x0, &(0x7f00000001c0)) socket(0x0, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000200)={0x0, 'veth1_macvtap\x00'}) 04:30:44 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x10000000, 0x0) [ 346.855732][T14315] kAFS: unparsable volume name [ 347.046477][T14341] kAFS: unparsable volume name 04:30:44 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x20000000, 0x0) 04:30:44 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0xf0ffffffffffff, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, 0x0, &(0x7f00000001c0)) socket(0x0, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000200)={0x0, 'veth1_macvtap\x00'}) 04:30:44 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) r0 = socket(0x10, 0x2, 0x0) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)={0x14, 0x0, 0x301, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$batadv(&(0x7f0000000000)='batadv\x00') sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r1, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)={0x14, r2, 0x301, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, &(0x7f0000000380)={r1, 0x2, 0x3, 0xffffffffffff8000}) r4 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r5, 0x0) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$FUSE_ENTRY(r3, &(0x7f0000000480)={0x90, 0x0, 0x3, {0x4, 0x1, 0x3, 0xffffffffffffffdb, 0x3, 0x6, {0x6, 0xe0e, 0x2, 0x5, 0x5, 0x6, 0xfff, 0xb5e1, 0xb282, 0x6, 0x5, r5, r6, 0x7, 0xffff}}}, 0x90) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000000340)=0xc) setresuid(0x0, r7, 0x0) r8 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r8, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r9, 0x0) getresuid(&(0x7f0000000100)=0x0, &(0x7f00000001c0), &(0x7f0000000200)) mount$9p_virtio(&(0x7f0000000000)='syz\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x40080, &(0x7f0000000280)={'trans=virtio,', {[{@nodevmap='nodevmap'}, {@posixacl='posixacl'}, {@access_any='access=any'}, {@dfltuid={'dfltuid', 0x3d, r7}}, {@access_client='access=client'}], [{@obj_user={'obj_user', 0x3d, '-$[(#'}}, {@euid_lt={'euid<', r9}}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@uid_lt={'uid<', r10}}]}}) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e33a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) 04:30:44 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket(0x10, 0x3, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$inet_udp(0x2, 0x2, 0x0) close(r5) sendto$llc(0xffffffffffffffff, &(0x7f0000000140)="7653bbc6175a3d2b8b43d6fab096eaaa30", 0x11, 0x0, 0x0, 0x0) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88882, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0x2}) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @loopback}}) write$binfmt_misc(r4, &(0x7f0000000140)=ANY=[], 0x1000000c8) splice(r3, 0x0, r5, 0x0, 0x18102, 0x0) 04:30:44 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x100000000000000, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, 0x0, &(0x7f00000001c0)) socket(0x0, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000200)={0x0, 'veth1_macvtap\x00'}) 04:30:44 executing program 3: r0 = memfd_create(&(0x7f0000001780)='\xd8\x05V\x15\xa5e\xf1\xb8\xf6\xa2\xba\x85\xb95\x03<\xb9;\xcd\x86\x8bD\xf9\xe9L\xe1Q\xfc\xe2\x97\xa0\xe8s\xb2\x11\xef\x1ac\xc9\x89\xc7\x0fv1\xa1:h\xf6\xf5\a\x8c\xf0Ay\x03\x97\xe77\xc1\xc8\xa6\xcb\xd2\xbe\xe9\xd2\xfb{u\xc3\xcd\xba\xa8G`9\xb5\x82\xa9p\xc8)\xe5$b\v\x8e\b\xf4\xf0\x11\xb4\xcb\"\xf4\xf3\xb4|\xdf\xa3\xdd\x9c\x8a\xf4D\xd3\xea\x11c}\x86H\xca=;i\x96\x183h\xba\x1a\x10', 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000380)='/dev/nullb0\x00', 0x0, 0x0) io_setup(0x1, &(0x7f00000004c0)=0x0) io_submit(r4, 0x8, &(0x7f00000000c0)=[&(0x7f0000000140)={0x3a003f00, 0x2759, 0x10, 0x0, 0x0, r3, &(0x7f0000000000)="98", 0x3e80000000, 0x0, 0x0, 0x2}]) 04:30:44 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x20100000, 0x0) 04:30:44 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) r0 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) shmat(r0, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffdfff) shmat(r0, &(0x7f0000000000/0x1000)=nil, 0x0) shmctl$SHM_UNLOCK(r0, 0xc) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) [ 347.777454][ T29] audit: type=1800 audit(1596688245.010:270): pid=14377 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.4" name="SYSV00000000" dev="hugetlbfs" ino=0 res=0 04:30:45 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x3e000000, 0x0) 04:30:45 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000000)='batadv\x00') sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)={0x14, r1, 0x301, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) fsetxattr$security_ima(r0, &(0x7f0000000000)='security.ima\x00', &(0x7f0000000080)=@v2={0x3, 0x0, 0xf, 0x20, 0x13, "76fec07637eae779aa9306d093b6e0dde4eb74"}, 0x1c, 0x2) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) 04:30:45 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x200000000000000, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, 0x0, &(0x7f00000001c0)) socket(0x0, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000200)={0x0, 'veth1_macvtap\x00'}) [ 348.037248][ T7967] FS-Cache: Duplicate cookie detected [ 348.042768][ T7967] FS-Cache: O-cookie c=00000000d8c6e49a [p=00000000a00f4ec0 fl=222 nc=0 na=1] [ 348.051838][ T7967] FS-Cache: O-cookie d=0000000000000000 n=0000000000000000 [ 348.059154][ T7967] FS-Cache: O-key=[2] 'e9e7' [ 348.063765][ T7967] FS-Cache: N-cookie c=0000000053a2395b [p=00000000a00f4ec0 fl=2 nc=0 na=1] [ 348.072544][ T7967] FS-Cache: N-cookie d=0000000035364e0c n=0000000021861854 [ 348.079811][ T7967] FS-Cache: N-key=[2] 'e9e7' 04:30:45 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x300000000000000, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, 0x0, &(0x7f00000001c0)) socket(0x0, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000200)={0x0, 'veth1_macvtap\x00'}) 04:30:45 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x8cffffff, 0x0) 04:30:45 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) fsconfig$FSCONFIG_SET_FLAG(r0, 0x6, &(0x7f00000000c0)='posixacl\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000140)='./file0\x00', 0x147) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$FBIOPAN_DISPLAY(r1, 0x4606, &(0x7f0000000080)={0x3c00, 0xf0, 0xa00, 0x1e0, 0xad9c, 0xfffffff9, 0xf, 0x2, {0xfffff001, 0x3, 0x1}, {0x8}, {0x7, 0x0, 0x1}, {0xfe09, 0x4566}, 0x0, 0x183, 0x3, 0x1f, 0x0, 0x63f5, 0x3f, 0x37, 0x1, 0x80000000, 0x7fffffff, 0x6, 0x2c, 0x0, 0x3, 0x3}) ioctl$CAPI_CLR_FLAGS(r1, 0x80044325, &(0x7f00000001c0)) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) 04:30:45 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0xc0ed0000, 0x0) 04:30:45 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket(0x10, 0x3, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$inet_udp(0x2, 0x2, 0x0) close(r5) sendto$llc(0xffffffffffffffff, &(0x7f0000000140)="7653bbc6175a3d2b8b43d6fab096eaaa30", 0x11, 0x0, 0x0, 0x0) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88882, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0x2}) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8914, 0x0) write$binfmt_misc(r4, &(0x7f0000000140)=ANY=[], 0x1000000c8) splice(r3, 0x0, r5, 0x0, 0x18102, 0x0) 04:30:45 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x400000000000000, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, 0x0, &(0x7f00000001c0)) socket(0x0, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000200)={0x0, 'veth1_macvtap\x00'}) 04:30:45 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) fsconfig$FSCONFIG_SET_FLAG(r0, 0x6, &(0x7f00000000c0)='posixacl\x00', 0x0, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$batadv(&(0x7f0000000000)='batadv\x00') sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r1, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)={0x14, r2, 0x301, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) sendmsg$sock(r1, &(0x7f0000001880)={&(0x7f00000001c0)=@l2={0x1f, 0x7, @none, 0x9}, 0x80, &(0x7f0000001780)=[{&(0x7f0000000280)="d28f9061f9161550294ef838ab563ce4119b4872a0598c40c771d6406a302354944da5546713cba94be16080025ebb451400b35b90d1f8fa92e8f995b351244398278a3e4bd154f49308ce2def8b97c4daa330b27db5d1c6cce7b391281eb2ef09d930ee6bf138469cc344ef87f3dd04e7d638378f58cf4d72a2e59cec20408b68130867a3778b8ed57b3247a52eecb5f7da93935492549940fde6f0c5dc809620de39", 0xa3}, {&(0x7f0000000340)="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", 0x1000}, {&(0x7f0000001340)="be26f8d4bfce7c4e6e6f492fa8d68f7bf6c6bf58f7973c7de4f839a833ddd4721f8f4180cca9ad16fe1a6bcb8f7c5bcdfd544ea9cdada3b50c27f0d8b708dba58e6e03667e0b2fa0e565a10099ed52c30af7fb8d3f9efe77fa01da3b1a1a0d410b89b0e148c3dcb116f3c6ebc03ad257adcb1b6b8e801ca2ae27ca2b4d9ecdf0743650c9b9e6de86d3064075a458ac6d0a1fc7c60a95ad92c4dd445a40f1562b4f73b5028a2852fbb35323a4c218c1272157f2f7c8babfd924737cbaae9f1fc5f417c08c6390e752372097e39c45b1b0692c94d607ab390afa92eb3e8ad3feff11ef240c0ac823ed8f2f73e1101dd6001ca19b1cf04f65d7fa", 0xf9}, {&(0x7f0000001440)="97fb2396451ae63e7b3928e14cceddee2f9e9dc830cd50264c6699403de9e594074bf226fec5c525a6da0eec3704deabb5d97ac4b3c6fbccccd63e6342a6599275580bc730fe2821b30291182c97a8c922c65c44d7bb006ea0ddaeaf1d180914a5fe4c955270ae8ea6b0220e455008244fb7734ffe168aeddb7507f741adec35fd5cd9f678ee5ac4700d0ffbd0efe695", 0x90}, {&(0x7f0000001500)="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", 0xfa}, {&(0x7f0000001600)="b15829d64ac698287213c31c23c1c79d9d2278890dcd40546baebe3d4665a148b39c21a279732cc19283a5e7fed177e6a2d91704cee6576a826fb36536cafc9e92a576b7240198bdcfa174d563d7ef36aa2ce8f1574178fa152c7f31e00794997e5698018a3448e5324131687181f711f9d09c9680a807dd26be7667", 0x7c}, {&(0x7f0000000080)="dcc54965", 0x4}, {&(0x7f0000001680)="9a6f0395adb7a69e21411ba34a1cea804c25767365ea1c9f2d8df0e8e560d739a3d7a946466a2028828231aa40314274b0f72e1f141434a451798c1c3fb33b95b5f32155928bec3d5a865e0f6e7a505952072a16b8debbe5d3eabf6e3ef0e8bbf6dc27d75d6a0504fb4ffddd5b780822376f8135cf660ce52bad157de8de59da0c632cd5eccead6b3fefd5bd1f5ad572e84b2a042cefb4cb8ae963fa674f440e3ce131195edc554f7a4747ff3274122802d271b492eb3707f6c69e1528151a58d433e08a66f41323fff9fa6b9cefa67ec608cbdf9d44c4496d3608a5cbb2cb2da1f8196c0e43d290ceddf716d810a00b28cd131f3d28", 0xf6}, {&(0x7f0000000100)="c3e6f215d20ca3689b", 0x9}], 0x9, &(0x7f0000001840)=[@mark={{0x14, 0x1, 0x24, 0xffffffff}}, @txtime={{0x18, 0x1, 0x3d, 0xfffffffffffffffc}}], 0x30}, 0x40040) ioctl$HIDIOCSFLAG(r0, 0x4004480f, &(0x7f0000000000)=0x2) 04:30:45 executing program 3: r0 = memfd_create(&(0x7f0000001780)='\xd8\x05V\x15\xa5e\xf1\xb8\xf6\xa2\xba\x85\xb95\x03<\xb9;\xcd\x86\x8bD\xf9\xe9L\xe1Q\xfc\xe2\x97\xa0\xe8s\xb2\x11\xef\x1ac\xc9\x89\xc7\x0fv1\xa1:h\xf6\xf5\a\x8c\xf0Ay\x03\x97\xe77\xc1\xc8\xa6\xcb\xd2\xbe\xe9\xd2\xfb{u\xc3\xcd\xba\xa8G`9\xb5\x82\xa9p\xc8)\xe5$b\v\x8e\b\xf4\xf0\x11\xb4\xcb\"\xf4\xf3\xb4|\xdf\xa3\xdd\x9c\x8a\xf4D\xd3\xea\x11c}\x86H\xca=;i\x96\x183h\xba\x1a\x10', 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000380)='/dev/nullb0\x00', 0x0, 0x0) io_setup(0x1, &(0x7f00000004c0)=0x0) io_submit(r4, 0x8, &(0x7f00000000c0)=[&(0x7f0000000140)={0x3a004002, 0x2759, 0x10, 0x0, 0x0, r3, &(0x7f0000000000)="98", 0x3e80000000, 0x0, 0x0, 0x2}]) 04:30:45 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0xf6ffffff, 0x0) 04:30:46 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x500000000000000, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, 0x0, &(0x7f00000001c0)) socket(0x0, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000200)={0x0, 'veth1_macvtap\x00'}) 04:30:46 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0xf9fdffff, 0x0) 04:30:46 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x600000000000000, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, 0x0, &(0x7f00000001c0)) socket(0x0, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000200)={0x0, 'veth1_macvtap\x00'}) 04:30:46 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0xff000000, 0x0) 04:30:46 executing program 4: ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f0000000000)={'veth0_to_team\x00', 0x7f}) mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) fsconfig$FSCONFIG_SET_FLAG(r0, 0x6, &(0x7f00000000c0)='posixacl\x00', 0x0, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$batadv(&(0x7f0000000000)='batadv\x00') sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r1, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)={0x14, r2, 0x301, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) r3 = pidfd_getfd(r0, r1, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r3, 0x8983, &(0x7f0000000540)={0x2, 'geneve1\x00', {0x2}, 0x81}) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$mptcp(&(0x7f0000000280)='mptcp_pm\x00') sendmsg$MPTCP_PM_CMD_ADD_ADDR(r4, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000002c0)={0x20, r5, 0x1, 0x0, 0x0, {}, [@MPTCP_PM_ATTR_ADDR={0xc, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_FAMILY={0x6, 0x1, 0xa}]}]}, 0x20}}, 0x0) r6 = socket(0x11, 0x800000003, 0x0) bind(r6, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r6, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r8 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r8, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=@newqdisc={0x138, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r7, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_gred={{0x9, 0x1, 'gred\x00'}, {0x108, 0x2, [@TCA_GRED_STAB={0x104, 0x2, "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"}]}}]}, 0x138}}, 0x0) getsockopt$inet_mreqn(r3, 0x0, 0x23, &(0x7f00000001c0)={@rand_addr, @multicast2, 0x0}, &(0x7f0000000200)=0xc) sendmsg$MPTCP_PM_CMD_DEL_ADDR(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000300)={&(0x7f0000000240)={0x94, r5, 0x20, 0x70bd28, 0x25dfdbfd, {}, [@MPTCP_PM_ATTR_ADDR={0x24, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @broadcast}, @MPTCP_PM_ADDR_ATTR_ID={0x5, 0x2, 0x7}, @MPTCP_PM_ADDR_ATTR_IF_IDX={0x8, 0x7, r7}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x2}]}, @MPTCP_PM_ATTR_ADDR={0x40, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @private=0xa010100}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @remote}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @remote}, @MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @local}, @MPTCP_PM_ADDR_ATTR_ID={0x5, 0x2, 0xff}, @MPTCP_PM_ADDR_ATTR_IF_IDX={0x8, 0x7, r9}]}, @MPTCP_PM_ATTR_ADDR={0x1c, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @local}, @MPTCP_PM_ADDR_ATTR_FAMILY={0x6, 0x1, 0xa}, @MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e21}]}]}, 0x94}, 0x1, 0x0, 0x0, 0x20000004}, 0x4) mount(&(0x7f0000000340)=ANY=[@ANYBLOB="23e9e73a94721c73e21bf3734f51dab77f484255e2de8cc6b387b4f280b9de0a86e12e3b113fde19dc12900b1fb71ae2bcb9ba021897659aadfd62a7901c2fab1cf4873496053a01d6755470ecac17e2765cacfb1dbd90e2989ccf2bc70af3926d6163d623bdf134d56fed5b5f2215d21fd3cf79fe5e357d439d01657cc1428e87dbce29b6a0e9c8a80755b1af6bbc6c9178a18c9fb1522342e6b53ea6391c8ffcc0058ce60b59812ed8800b820ca7d8a955a873d8827a19b85284ccccbb50b8073cfa1a24ac9cfdf6e4b8640eeb0a93da394674caed7c7188c64eda7015c2b5ff34000000000000"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) 04:30:46 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0xfffff000, 0x0) 04:30:46 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x700000000000000, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, 0x0, &(0x7f00000001c0)) socket(0x0, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000200)={0x0, 'veth1_macvtap\x00'}) 04:30:46 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) fsconfig$FSCONFIG_SET_FLAG(r0, 0x6, &(0x7f00000000c0)='posixacl\x00', 0x0, 0x0) ioctl$TCSBRKP(r0, 0x5425, 0xe72) r1 = openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nvme-fabrics\x00', 0x14200, 0x0) ioctl$KDSKBMETA(r1, 0x4b63, &(0x7f0000000080)=0x3) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) 04:30:46 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket(0x10, 0x3, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$inet_udp(0x2, 0x2, 0x0) close(r5) sendto$llc(0xffffffffffffffff, &(0x7f0000000140)="7653bbc6175a3d2b8b43d6fab096eaaa30", 0x11, 0x0, 0x0, 0x0) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88882, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0x2}) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8914, 0x0) write$binfmt_misc(r4, &(0x7f0000000140)=ANY=[], 0x1000000c8) splice(r3, 0x0, r5, 0x0, 0x18102, 0x0) 04:30:46 executing program 3: r0 = memfd_create(&(0x7f0000001780)='\xd8\x05V\x15\xa5e\xf1\xb8\xf6\xa2\xba\x85\xb95\x03<\xb9;\xcd\x86\x8bD\xf9\xe9L\xe1Q\xfc\xe2\x97\xa0\xe8s\xb2\x11\xef\x1ac\xc9\x89\xc7\x0fv1\xa1:h\xf6\xf5\a\x8c\xf0Ay\x03\x97\xe77\xc1\xc8\xa6\xcb\xd2\xbe\xe9\xd2\xfb{u\xc3\xcd\xba\xa8G`9\xb5\x82\xa9p\xc8)\xe5$b\v\x8e\b\xf4\xf0\x11\xb4\xcb\"\xf4\xf3\xb4|\xdf\xa3\xdd\x9c\x8a\xf4D\xd3\xea\x11c}\x86H\xca=;i\x96\x183h\xba\x1a\x10', 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000380)='/dev/nullb0\x00', 0x0, 0x0) io_setup(0x1, &(0x7f00000004c0)=0x0) io_submit(r4, 0x8, &(0x7f00000000c0)=[&(0x7f0000000140)={0x3a004003, 0x2759, 0x10, 0x0, 0x0, r3, &(0x7f0000000000)="98", 0x3e80000000, 0x0, 0x0, 0x2}]) 04:30:46 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x800000000000000, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, 0x0, &(0x7f00000001c0)) socket(0x0, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000200)={0x0, 'veth1_macvtap\x00'}) 04:30:46 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0xfffffdf9, 0x0) 04:30:47 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0xffffff8c, 0x0) 04:30:47 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0xf00000000000000, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, 0x0, &(0x7f00000001c0)) socket(0x0, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000200)={0x0, 'veth1_macvtap\x00'}) 04:30:47 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0xfffffff6, 0x0) 04:30:47 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000000)='batadv\x00') r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x6400, 0x0) fsconfig$FSCONFIG_SET_FLAG(0xffffffffffffffff, 0x6, &(0x7f00000000c0)='posixacl\x00', 0x0, 0x0) ioctl$SNDCTL_MIDI_INFO(0xffffffffffffffff, 0xc074510c, &(0x7f0000000480)={"a17377ef47cce47dcc80699c9835b3fd3341fce248db6b35f042c5979545", 0x4, 0xc5, 0x4, [0x800, 0x100, 0x100, 0x0, 0x4, 0x80000001, 0xa3e, 0x0, 0x1, 0xc23d, 0x80000001, 0x4f, 0x80e, 0x5, 0xa0, 0x4, 0x101, 0x4]}) r3 = socket$kcm(0x10, 0x2, 0x10) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000040)={0x18, r4, 0x1, 0x0, 0x0, {0xa}, [@IPVS_CMD_ATTR_DAEMON={0x4}]}, 0x18}}, 0x0) sendmsg$IPVS_CMD_FLUSH(r2, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000001c0)={&(0x7f00000003c0)={0x90, r4, 0x400, 0x70bd25, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x8f1}, @IPVS_CMD_ATTR_SERVICE={0x74, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_PROTOCOL={0x6}, @IPVS_SVC_ATTR_AF={0x6, 0x1, 0xa}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@ipv4={[], [], @private=0xa010101}}, @IPVS_SVC_ATTR_AF={0x6, 0x1, 0x2}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@broadcast}, @IPVS_SVC_ATTR_SCHED_NAME={0x9, 0x6, 'lblc\x00'}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x21}}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x6}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x4}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}]}]}, 0x90}, 0x1, 0x0, 0x0, 0x24000040}, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) close(r6) r7 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r7, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp_SCTP_RTOINFO(r5, 0x84, 0x0, &(0x7f0000000080)={r8, 0x82000000}, 0x10) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r2, 0x84, 0x7b, &(0x7f0000000340)={r8, 0x1}, &(0x7f0000000380)=0x8) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)={0x14, r1, 0x301, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) ioctl$FS_IOC_GETFLAGS(r0, 0x80086601, &(0x7f0000000000)) 04:30:47 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x1000000000000000, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, 0x0, &(0x7f00000001c0)) socket(0x0, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000200)={0x0, 'veth1_macvtap\x00'}) 04:30:47 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0xedc000000000, 0x0) 04:30:47 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) fsconfig$FSCONFIG_SET_FLAG(r0, 0x6, &(0x7f00000000c0)='posixacl\x00', 0x0, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) fsconfig$FSCONFIG_SET_FLAG(r2, 0x6, &(0x7f00000000c0)='posixacl\x00', 0x0, 0x0) ioctl$HIDIOCGRDESCSIZE(r2, 0x80044801, &(0x7f0000000080)) fsconfig$FSCONFIG_SET_FLAG(r1, 0x6, &(0x7f00000000c0)='posixacl\x00', 0x0, 0x0) mkdirat(r1, &(0x7f0000000100)='./file0\x00', 0x10c) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) 04:30:47 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x1000000000000, 0x0) 04:30:47 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket(0x10, 0x3, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$inet_udp(0x2, 0x2, 0x0) close(r5) sendto$llc(0xffffffffffffffff, &(0x7f0000000140)="7653bbc6175a3d2b8b43d6fab096eaaa30", 0x11, 0x0, 0x0, 0x0) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88882, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0x2}) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8914, 0x0) write$binfmt_misc(r4, &(0x7f0000000140)=ANY=[], 0x1000000c8) splice(r3, 0x0, r5, 0x0, 0x18102, 0x0) 04:30:47 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB='*'], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) 04:30:47 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x2000000000000000, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, 0x0, &(0x7f00000001c0)) socket(0x0, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000200)={0x0, 'veth1_macvtap\x00'}) 04:30:47 executing program 3: r0 = memfd_create(&(0x7f0000001780)='\xd8\x05V\x15\xa5e\xf1\xb8\xf6\xa2\xba\x85\xb95\x03<\xb9;\xcd\x86\x8bD\xf9\xe9L\xe1Q\xfc\xe2\x97\xa0\xe8s\xb2\x11\xef\x1ac\xc9\x89\xc7\x0fv1\xa1:h\xf6\xf5\a\x8c\xf0Ay\x03\x97\xe77\xc1\xc8\xa6\xcb\xd2\xbe\xe9\xd2\xfb{u\xc3\xcd\xba\xa8G`9\xb5\x82\xa9p\xc8)\xe5$b\v\x8e\b\xf4\xf0\x11\xb4\xcb\"\xf4\xf3\xb4|\xdf\xa3\xdd\x9c\x8a\xf4D\xd3\xea\x11c}\x86H\xca=;i\x96\x183h\xba\x1a\x10', 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000380)='/dev/nullb0\x00', 0x0, 0x0) io_setup(0x1, &(0x7f00000004c0)=0x0) io_submit(r4, 0x8, &(0x7f00000000c0)=[&(0x7f0000000140)={0x3a004004, 0x2759, 0x10, 0x0, 0x0, r3, &(0x7f0000000000)="98", 0x3e80000000, 0x0, 0x0, 0x2}]) 04:30:47 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0xf0ffffffffffff, 0x0) [ 350.693409][T14523] kAFS: unparsable volume name 04:30:48 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x40) lsetxattr$security_evm(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='security.evm\x00', &(0x7f00000003c0), 0x1, 0x1) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x100, 0x1) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="960322f0"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) symlink(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='./file0\x00') mount$overlay(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x1080084, &(0x7f0000000280)={[{@xino_off='xino=off'}, {@index_off='index=off'}, {@redirect_dir={'redirect_dir', 0x3d, './file0'}}], [{@appraise_type='appraise_type=imasig'}, {@context={'context', 0x3d, 'system_u'}}, {@fsuuid={'fsuuid', 0x3d, {[0x65, 0x34, 0xbcda360e7fb7ddd0, 0x0, 0x35, 0x39, 0x61, 0x66], 0x2d, [0x30, 0x63, 0x63, 0x64], 0x2d, [0x35, 0x35, 0x62, 0xdd3714f60ad464fa], 0x2d, [0x63, 0x0, 0x32, 0x63], 0x2d, [0x62, 0x65, 0x64, 0x62, 0x34, 0x62, 0x62, 0x36]}}}, {@seclabel='seclabel'}, {@fsmagic={'fsmagic', 0x3d, 0x101}}]}) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) 04:30:48 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x2010000000000000, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, 0x0, &(0x7f00000001c0)) socket(0x0, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000200)={0x0, 'veth1_macvtap\x00'}) 04:30:48 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x100000000000000, 0x0) [ 350.879616][T14536] kAFS: unparsable volume name [ 350.906172][T14536] kAFS: unparsable volume name 04:30:48 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) fsconfig$FSCONFIG_SET_FLAG(r0, 0x6, &(0x7f00000000c0)='posixacl\x00', 0x0, 0x0) name_to_handle_at(r0, &(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000280)={0x1008, 0x4, "ba71aa6a2eac9fcbbe911b7a00b68944166d91d9d084ddee3e32259758489e7296aef4c9ba12e7c6fa95738c35b51bb5d23bc48e3c551e6d842e8ec7e1238d91825bac8d35dfe1f2d07f2e47d807052ca5cbba405f2f225880eb0b0f8a5071a55b94ae8f720b1967a685561e59b5bba6cbf5ff64943d62eb581c696d9a7e78edf4907c8b02891c63fabe67ac8294e8de06029eb4fea2b23200293c2ffa0b629fa6846b80cdbc5cd1ba75f5a8f1cebe93f62d990182f5687f91e03a186436dc7f98695ac38c7964052a9258a01f4f3c5278100db369cef2d47c3f5c7e3da1bcbd09e528bd7e6f758b996c346142c7b3dc75fd8caa098624916bc9f21e081baf13bba95f705eb98fad77e9f5882ee190883eade9ae0c04c41283f82409d15cb0b2bf107f22b059a0851d4d07a4c4713d76c8b0de091916a31d2e0260a0b26063f6a17b46ede371aaf5a6de39b5c2c9fcaf50ce27af1e80f0b0bd835cac782251dafd8a246b89a23b70c87655fd6ca5ee2834ada3c2bc202b4d1d8be993ba60bb25ec418a630089243f67a9ae1f548e559526698db3c2bebb78dd4d0fe03a7fbb3a0fc5a075bae65bdc572bcf1865be81a534404594c09d3843581994b675ccbc2835a7c50bfb2d68fc36660047b2d6a6e1dd6f650a955bc1296f906549d563233857c5a95feb78954c1e44026bc1fbe3cfab0952ed4b929102df4920fe33bdb81ef68f0f904544772862d6466a1b3edbca1fe85a7e6b1fa2440e461662c0ca831621b516307f21c4b94ed113614a8cb72f2aa717c6ce049ea7ccfa5b643eeb1509c9a4e4666bdf00accf9b6fd973a52596479ca76b192f1ed6b351b96902bf99b720fb38555bbe4bae41d8fd5c62026767488e63f4ef669179a2ed0eae460a1885d728765dd4a4e725e291181e48d5158d61b0d0c7b81ef6a86ef5708f43e11fd7f1d2f6c292a3b18cf70c94e8e83fac6005ca0600a4dd3edcc8633b5969d663dc3ae2cfb7a0d905dec9af37ee6c3072881e340c59485d18c1199fd39ac62ac49b7259fb6893b2bebce7d63ce8ddbd42293af67aa7019eaa95755b74fc76239a8953168a20aaa7644c77d5f112cdf151af4c90919186adc408089ceeaba1f7be74347aabe7f7cf24cdd666e735b2fd1cfc272f6880fe71f540f9ab4f5103064ac0145364963643903813015c9e2cf1c78b07564feeed8f716b76c1b978f423b9e140a70d0525a9dc96bfa8d9e84b9347d7640aa9455920d0cfa666e2cfb912b52677c7b1134e90ecaec7aa92d21f8380e035b532907378c215284231ca7facccb608a79db33963149d87a7ab33583f916fa61881154382546e0f53b80d0b391aa9ea29358fa3e04d06531e60a8fe58ff978adda48cd8cb27236ab342f14f27565fcaa8980ce26d9d7f6ac7bf27291bbfea04000cbd264e2a9c09f7b7776898f852efdb6b348d5d7a02c14474d9bbf8c9cfc998ab4abde2ebbd650c8b67de891a8656119b8cbfeeaafa6f08e3a08147d99be49a844142b9f8945d3cb0bd99d53673c2d08e54f994bd1485fc16114de6d5f5ca6741b029c745708134ff8f5ce410be1a16e6943264b8d341bd2cd4b7d0eed9c99b257825c7edebddd50b9ab2cfaa698d7b3a28661ed91fa1bac82d5c7141dfcd8f8e7f17ec37b8a9220fd0bd358c4a851a1c9e70742491b1971ba570a4421453af12b7e25739c7ee4011aef3f1f7b16adf6edcd38f3095470cb01b0f72a062384e1e25f63559f0f461cca7b217ddd6c0013b7930bff109b483d18bc764b4b70f9a6f512bd9150c75db56020848f2b0bcfbc39f61d8da21a89edf9fb714f9fd1cf5dc1011cb3a4365fd9dddb01fd404b299504b24c3c0b46c9cfaf898511138bb626ae4ead8afc39a42a3aaca46e34cf5df0218f30175e06b99258d7bdcff70693c7790f3a32a326ff9f88d34e870290c5587eb578e14bd457346cd81ad935d4eaca86d42f76dc06f2f68cdcc7544225475821c474a95c451c50bbd97cecbd298f5fc39995b5fd2cbf10ccb33a63156333226c5c3a7254bba06c13bc285c093a0d508092de1e09a526a1010c92a8583bb60b53761bfeef870c8295d413ac95bbc1424c8fca45fd7fc2adb6a2ec498182ae9616cb5e2e4209a8634eb2a33f8138bf291aff1f2d5194ce64d5037931bbd5ead4da8b43f769db4210faf4299b899c93d110621b547ea7561abead8d1bee427528580f05ed28d61c6a59c36afb75fe1572629174be62b68af8d491feeb0dbe0536f4d5188571a8b596acdc58a31e74d019d29671e9d7ed722108e26732eee4cd47005ee6ea6ec77e4d2b485feb73ac2b89f45cd424b79c9d1db24569b34ea6eea39685bedf2dcc953d0ea15a61128bdd9b6c5d540def2010182a593ce428da2274af5ce576fe4cfe10259b2099cfcbe74e24f8d0817a77fba951d20d343dbaa876a3b6de6b421587f3fc7e0b7034f1ee0d8daff4eaaccce7c62db2ceca456d7f73d8ae6d6c30092c45737db70a466a8b9687959ed9b8d43a957f220b67e7d2da7910123168386b1688bbef57aa76e6d71642f00ee0765ddc5cf02a1394b2378371ae495524b8ef6267cbb5d7934f63245777bb5494ec6ee2d6d58b4138577601dd056e809559aae393a55aed4a5bf7550a59b276794cdf6e15c7316b83bede310a0ff014240451db7c2c7a21f704be429e582d128b10be915c283d35a026ad41304c4088ef7b715c4c9737567d3ef4dd9cf23400bb18c1e6dfd9a30f9f30608bff1aac64b20498c278ffd81933eacca1ab73d98f98adfddc86f37422333a85145603adea1c65d1ac68717cbb430928753f4ad33daa62451c04c0c3c25da57c5a1fd20249413fb91da3afaaaf8be3d4cd330d7e645a98ff19e908bde0dc6d899ce7e2c217e38559304e51a77e14a1e5236b0bee203b1d6f1c17855e97bfd63ce22a9c5eeeee6782d0723103d6a9508389cff1789f52a47b9d290ab7ff5925edf94b12c5e9a69e94c2219978cac26116af2ccc249bd22a181fc8a72e8c991036dc2f959db9d0448ee06919f0dce51042bf417c2b4492cb5a7c9a29b996004979d69aad5e1a3b512d28fb2f8328ab9e4c1fa3c1c0feeba5f66a30de9612643b443bc2621ac98253ce6893ac32461e04007a6e958c864caf86c9cb5b571b0818b813a20a6ab3fe601c4b07cf435fa5df561f18a2d7d291a8f2ff6ebddb2ff9f9f7dc0bb4f9a25b7707721aa62b24d4d97307c67d361038715fd137fcec8ed86606496c8ff2e56297870f4f843947a09844c7c1e0b343926b80f292206edbbbcf5a5bd711ea5962509553089590cedcb1c43a7fda81498bab5f48fe250fce2c06cff7527e6ee4df5bc0c100a6b1b245c3a18480e0a19f927ad93a4143a4e0a2a54b9fbf3f0d9cd44d40a0dbb7fec9038fe75d2f2f947e202e20ebd0932d859f2ca3b46d9ad14ffd723db2484ff14cd5736dd14e4601e306aa4403fe7660bb8021a019250242564896899a1f8bbbd06e5b805e9574d8841651b1e43fc507c5f4fc450a8a5eb9a08aae7b02e6457d5e2fc65b566bcf1ce5c4acf178633504e3864320866b592bc75e03053f869604586efec784ce4fb5b4cb2d6de75bcda5ba554565722262d1e824c133c8c1101610799507b1cd461f8b8350740df2b3b67c7235bcaacb6fcacfa97417e9640edbb1e4d43499a6aa5f94cbb77c9a23dc57ee64590bd41c8223d28944c8f2f8a8d48bb1f0d40304d0d2b97dce75b9d9be878e1fcf50996742f89514fbbb278be8c1b99287d8a6abad6f48ba435958262a4fbe9f307211e97e1e82e5b30e932ce469c6e612b673b5e62a23f4790f56ccf04f5a62c37cb8e4043fa8819b7c659d7731232ca6c0cce559ae248060a642313e1854f0a537bfe4233eb8d8a5421afe2091fce647bb8686a5934c6be51b053c9fdb8da7a99cf5f3b9e95846f1c5fc97e66da081c252c4582c58176d547d461e2ca87883b33a99e6d90938089995f1838e13c3ce65bfd407aee92e87bb9b0f14283b2e3931a8b9bc27fa0dfbafab8bcd46135c5bd844d54da3426c78ac6376974f3ec5abdcb0305ea04cab0bc32997405ef13cc7e760c24142a25c43d925f0efd537acf1b83a4092f7b63550f4ddb54e030628266497228a2a969af0a5ee5d47fab47d78ece3afc885f6d1a94f9661edc6e91c60637af1fc6ac7aa3e34fc0cc82cb295ddb60a08e214caf97fb53a100d7ea2851e14480d9995a3c2235ac5bdb94267e3d86836700bf2e67261c101820a3ff72bd4e7f256ef88a15ee7099122ae2bb631298a0c192157f590ce999763453decb101057aeb4c059ce0028b05c462f891fdc231eb87d69a72a0ade6ee8cd1d9fd16c41401c01ecf6d2f99ca7dd5c69b5418b013604a22c15f73ccf2be814491865ae494981488c91dcebaed180ec0d239999f7c6ea02e797a906f8ddbfa0caba79db463618e70045517c869aa8554f61956723d598335232ac72d77a1f71105e5a141f969f786a2834995d502d078f47f885de30f629244fa400f089f525c13aca951bd868a4a182ab28915e9ca3e45a55d656c378774104d50eef737f4a59cb86486b1b90ed9c4de38c7f57f13ce950cc2447eadaf40922ac8cdde7251a67afbfa7ba11ed21d6b4ba0b5cb1937ac49ee965c56f9ebc4fe1b9701e59cbe1717f29c43dffdb1ff4b7bfa19ddf0545394885f747dce5eff7bae1e7b7ef0a33ba42bbe9492fed0d174cef30154392fbafa2eedcc0bd3f5e34d7845c4ebe57bf668983a507b99f6ffc61dcb58d807fb21202f2df4818a9bce622154c080e9bfe52e72cb6bf230b6dc8680d7f4ecc3fa16b5142b40eefd5867894c5da16e6b3e1378b9e7bc320161322e41b272b876c61f4c241ee2eaa3262f80b07ef93150d0168c50cb50a2b85d05d4b162fc727f36a18ae9488601fdd53a96c32675a2bd2a292f827d34c63e88ca267c813a14f817c9dd49aa2cc0f24c069ffa2f3d95bacd16c4cd3336db9127c9e72d2b6ebc3bba4c6af874e75f40e768043cf4e05c2d06fe95664ef9d748e6469c9849dc0de254ead9adc0425de8efc6ba44fbbf53ee0dd30619a663bc7b57e4934dc179413cb9e59387f426cb02fac3c7f730c412d6436fa21603c5ce52b37e949c6f4f560e9397bc99c1b45c84cb4ef566dc54f03b5d290dd120336f6cc6916b4223efc6554ca8871c44fd477a07515f272ecee369a5c413cbe84f42af0c17c4a8e6282f3421d9678179fb2c8c242281921ea53139cb57a5a708b37aff2bef3d5f7b6c013021a25025e037bf52e6c6707510e0d87c8bd24928adbbe7907de98fae9b9020380210428604aa9e4963abf4ed99f8dc0c192daf8e8b9396c878fe89e99004406623b1964d2b16463e337cb4373c23fe0e87ddf9044a326de99aff92c6c60ada265b5ca3f2cbbb216ecd0683ed874103f297f1933e34720b5cc2a4a4f31cf12e67bc92efc86e25116bcbea1f5c0bafeba2d324e19df39535ad20661f68bcfbdd4a728d4e38725acfaa27a18a3bae44dc1425ab8a48dd91b21e8416caef70ba55549ee1a15d55adf1ce5c324f89cda2d06990f0d435a0e7ec285b8c205228830803249ff30187e413489249901a7dd20d9b3a8a7191e1e595137bfa304cfae6bd2c5aeb86c39b8a3e06cd8e10921ffc45b12540251b91e278762f6d57586a0db4c28330f674699ca93ff7f735ed4ff9fb6e4b7ada2a3246abff8b81fda760527f922b6541ce717646bce7f9bf08d2c155108cb00261adcdde9344082e2723bea324b012b7318a5c203"}, &(0x7f0000000080), 0x400) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) 04:30:48 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x3f00000000000000, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, 0x0, &(0x7f00000001c0)) socket(0x0, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000200)={0x0, 'veth1_macvtap\x00'}) 04:30:48 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x200000000000000, 0x0) 04:30:48 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) mount(&(0x7f0000000000)=ANY=[@ANYBLOB="cf0ac50629ed430a2abeb8e7160130f39c63925b3173abab7dba5ff3e2d667552e61d0534a304590918e44"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) [ 351.228526][T14555] kAFS: unparsable volume name 04:30:48 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket(0x10, 0x3, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pipe(&(0x7f0000000040)={0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) sendto$llc(0xffffffffffffffff, &(0x7f0000000140)="7653bbc6175a3d2b8b43d6fab096eaaa30", 0x11, 0x0, 0x0, 0x0) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88882, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0x2}) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @loopback}}) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x1000000c8) splice(r3, 0x0, r4, 0x0, 0x18102, 0x0) 04:30:48 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) fsconfig$FSCONFIG_SET_FLAG(r0, 0x6, &(0x7f00000000c0)='posixacl\x00', 0x0, 0x0) ioctl$VIDIOC_S_HW_FREQ_SEEK(r0, 0x40305652, &(0x7f0000000140)={0x40802, 0x1, 0x80000000, 0x8001, 0x7ff, 0xb01b}) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) fsconfig$FSCONFIG_SET_FLAG(r1, 0x6, &(0x7f00000000c0)='posixacl\x00', 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r2) r3 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r3, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f0000000080)={r4, 0x82000000}, 0x10) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f0000000200)={r4, 0xe8f}, &(0x7f0000000280)=0x8) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x4000, 0x0) fsconfig$FSCONFIG_SET_FLAG(r5, 0x6, &(0x7f00000000c0)='posixacl\x00', 0x0, 0x0) mkdirat(r5, &(0x7f0000000000)='./file0\x00', 0x20) ioctl$SNDRV_RAWMIDI_IOCTL_PVERSION(r5, 0x80045700, &(0x7f0000000100)) mount(&(0x7f00000002c0)=ANY=[@ANYBLOB="23e9e73a3155b8fac663fd8cf73bfe746116371c88e4e214a3a373cf12"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) ioctl$DRM_IOCTL_AUTH_MAGIC(r5, 0x40046411, &(0x7f0000000080)=0x772) 04:30:48 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x300000000000000, 0x0) 04:30:48 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x8cffffff00000000, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, 0x0, &(0x7f00000001c0)) socket(0x0, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000200)={0x0, 'veth1_macvtap\x00'}) 04:30:48 executing program 3: r0 = memfd_create(&(0x7f0000001780)='\xd8\x05V\x15\xa5e\xf1\xb8\xf6\xa2\xba\x85\xb95\x03<\xb9;\xcd\x86\x8bD\xf9\xe9L\xe1Q\xfc\xe2\x97\xa0\xe8s\xb2\x11\xef\x1ac\xc9\x89\xc7\x0fv1\xa1:h\xf6\xf5\a\x8c\xf0Ay\x03\x97\xe77\xc1\xc8\xa6\xcb\xd2\xbe\xe9\xd2\xfb{u\xc3\xcd\xba\xa8G`9\xb5\x82\xa9p\xc8)\xe5$b\v\x8e\b\xf4\xf0\x11\xb4\xcb\"\xf4\xf3\xb4|\xdf\xa3\xdd\x9c\x8a\xf4D\xd3\xea\x11c}\x86H\xca=;i\x96\x183h\xba\x1a\x10', 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000380)='/dev/nullb0\x00', 0x0, 0x0) io_setup(0x1, &(0x7f00000004c0)=0x0) io_submit(r4, 0x8, &(0x7f00000000c0)=[&(0x7f0000000140)={0x3a004005, 0x2759, 0x10, 0x0, 0x0, r3, &(0x7f0000000000)="98", 0x3e80000000, 0x0, 0x0, 0x2}]) 04:30:49 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x400000000000000, 0x0) 04:30:49 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000000)='batadv\x00') r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000000000)='batadv\x00') sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r2, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)={0x14, r3, 0x301, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000200)={0xd, r1, 0x300, 0x70bd26, 0xfffffffd, {0xa}}, 0x14}}, 0x0) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) fsconfig$FSCONFIG_SET_FLAG(r4, 0x6, &(0x7f00000000c0)='posixacl\x00', 0x0, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$batadv(&(0x7f0000000000)='batadv\x00') sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r5, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)={0x14, r6, 0x301, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) ioctl$VIDIOC_G_EXT_CTRLS(r4, 0xc0205647, &(0x7f0000000340)={0xa10000, 0x400, 0xfe, r5, 0x0, &(0x7f0000000300)={0x990af4, 0x6, [], @string=&(0x7f00000002c0)=0x6}}) ioctl$HIDIOCGUSAGES(r7, 0xd01c4813, &(0x7f00000005c0)={{0x1, 0xffffffff, 0x4, 0xfff, 0x7ff, 0x2}, 0x38c, [0x2, 0x1, 0xfffffffc, 0xffffffd4, 0x3, 0x6, 0x1f, 0x7, 0x0, 0x281, 0x521, 0x9, 0x7, 0x40, 0x8, 0x1, 0x2, 0x0, 0xd090, 0x1f, 0x5, 0x6, 0xa7, 0x2, 0x9, 0xdc28, 0x4, 0xfffffeff, 0x5, 0x2, 0xb02b, 0x200040, 0x80000000, 0x6c, 0xd8, 0xffffffff, 0x3f, 0x0, 0x3ff, 0x1, 0x9, 0x7, 0xfff, 0x8000, 0x5, 0x371f0000, 0x0, 0x5, 0x1, 0x7fff, 0xffffffff, 0x0, 0x7033, 0x3, 0x28f, 0xa0, 0x7fff, 0x6, 0x161a37d5, 0x100, 0x29c, 0x4, 0x4, 0x8, 0xfffffffa, 0x6, 0x0, 0x6, 0xfffffffc, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x7ff, 0x0, 0x3, 0x4, 0x4, 0x4ae, 0x0, 0x8, 0xffff80f2, 0x1f, 0x5, 0x9e6, 0x7fff, 0x8, 0x8000, 0x6, 0x3, 0x3, 0xd, 0x9, 0x0, 0x9, 0x62a, 0xffffffff, 0x4, 0x1, 0x3ff, 0x3ff, 0x8, 0x8, 0x6, 0x7f, 0x800, 0x8, 0x0, 0xffff0000, 0x9, 0xfffffbff, 0x5, 0x20c, 0x7fff, 0x1ff, 0x800, 0x1, 0xe1b, 0x1, 0x2, 0x7, 0x0, 0xffff, 0x6, 0xffff, 0x7, 0x81, 0x0, 0x716, 0x25c, 0x8000, 0xabd, 0x7, 0x5, 0x7f, 0x1, 0x6, 0x10001, 0x6, 0x214, 0x4, 0x2, 0xfec8, 0x7fff, 0xfff, 0x4, 0x6, 0x6, 0xfffffff9, 0x7, 0x3f, 0x5, 0x6, 0x2, 0x3ff, 0x8000, 0x2, 0x7, 0x5d, 0x5, 0xd9, 0xfffffffa, 0xf504, 0x1ff, 0x40, 0x1, 0x800, 0x2, 0x20de, 0x6, 0x926, 0x8, 0x6, 0x20, 0x5, 0x21, 0x81, 0x344, 0x969, 0x8, 0x7fffffff, 0xfffffc01, 0x2, 0xff, 0x7, 0x6f, 0x728, 0xffff, 0x6, 0x3ff, 0xfffffff9, 0x4, 0x9, 0x33, 0xfffffff7, 0x8, 0x6, 0xcaa, 0x0, 0x209, 0xdf1d00, 0x6, 0x4, 0x4, 0x3, 0x5, 0x100, 0xfff, 0x1, 0x5, 0x1, 0x100, 0x8, 0xffffff80, 0x9, 0x9, 0x9, 0x101, 0x0, 0x1ff, 0x8607, 0x9f, 0x377, 0x4a, 0x5, 0x5, 0x1, 0x3, 0x8001, 0x3ff, 0x4, 0x0, 0x1000, 0x44, 0xff, 0x40, 0x3, 0x7fffffff, 0x3ff, 0x3ff, 0x1, 0x10001, 0x5, 0x10001, 0xcc35, 0x0, 0x8, 0x0, 0x7fff, 0x2, 0x8, 0x8, 0xffff, 0x7f, 0x3, 0x6, 0xd0ac, 0x800000, 0x3, 0x10002, 0x7f, 0x3, 0xb5c, 0x8, 0x2d, 0x5, 0x7, 0x80, 0xbe, 0x3, 0x2, 0x8001, 0x8, 0x7c0, 0x7fff, 0x81, 0x8fd, 0x8, 0x25bcad67, 0x16e, 0x8, 0xfffffffe, 0x4, 0x6, 0x2, 0xffffff14, 0xda8, 0x86, 0x6, 0x18000000, 0x3ff, 0x7f, 0x7, 0x4, 0xffffef0b, 0xea3c, 0x10000, 0x200, 0x100, 0x7ff, 0x80000000, 0x1, 0x9, 0xe2c8, 0x4, 0x0, 0x4, 0x0, 0x1, 0x5, 0x800, 0x81, 0x9, 0xc61, 0x180000, 0x18, 0x3ff, 0x4, 0x9, 0x7, 0x6, 0x6, 0x7fffffff, 0xfffffff8, 0xfa, 0x101, 0x4, 0x61, 0x5, 0x5, 0x7, 0x3f, 0x7, 0x40000, 0x4, 0x7, 0x8, 0x7, 0x1, 0xa4c4, 0x7, 0x401, 0xc983, 0x400, 0x9, 0x401, 0x2, 0xffff, 0x6, 0x2260, 0x1, 0x7f, 0x7, 0x6, 0xb9, 0x5, 0x6, 0x9, 0x0, 0x1, 0x7ff, 0x5, 0x2, 0x101, 0x31, 0xe6a, 0x5, 0x401, 0x7, 0x8e57, 0x1, 0x7ff, 0x0, 0x80000000, 0x7fff, 0xff, 0x74, 0x6, 0x200, 0x5, 0x9, 0xfffffffd, 0x20, 0xffffffc0, 0x7fffffff, 0x9, 0x200, 0x4, 0x6, 0x6, 0x7ff, 0x80000000, 0x3, 0xaa7d, 0x1, 0xff, 0x6, 0x4, 0x9, 0x1, 0x0, 0x80, 0x1, 0x2, 0x1000, 0x800, 0x3, 0xffffffff, 0x9, 0x80000001, 0xb8, 0x9, 0x100, 0x1, 0x0, 0x7fffffff, 0xffff, 0x1, 0xffffffff, 0x4e0369a0, 0x4906, 0x8, 0x3, 0x7, 0x80, 0xffff, 0x3, 0x8dee, 0x4, 0x1000, 0xffff7aca, 0x10000, 0x6, 0x3, 0x401, 0x80000001, 0x6, 0xc90000, 0x0, 0x4, 0x7f, 0x5, 0x7, 0x7, 0x6, 0x7, 0x6, 0xfffff324, 0xf6b, 0x101, 0x6, 0x0, 0x1000, 0x7, 0x7, 0x400, 0x6, 0x0, 0x2f, 0x200, 0x52f517a7, 0x2b, 0x81, 0x1, 0x9, 0x0, 0xff, 0x8, 0x2, 0x8, 0x1, 0xfffffff8, 0xdef8a9e, 0x1, 0x0, 0x8001, 0x505, 0x800, 0x1f, 0x6, 0x0, 0x80, 0x100, 0x7, 0x5f, 0x6, 0x1, 0x0, 0x100, 0x3, 0x4, 0x800, 0x7, 0x9, 0x4, 0x9fd7, 0x9, 0x4, 0xffff980f, 0x40000, 0x0, 0x80, 0xfd, 0xfffffff9, 0x8000, 0x1, 0x200, 0x7fffffff, 0x80000001, 0x400000, 0x2, 0x49f, 0x3f, 0xfffffff8, 0x1000000, 0x14be, 0x400, 0x9, 0x4, 0x4, 0x7ff, 0x4, 0x101, 0x101, 0x401, 0x3ff, 0x6, 0x7, 0x1ff, 0x6, 0xffff19a3, 0x2, 0x4, 0x7fff, 0x1, 0x81, 0x81, 0x100, 0x3, 0x7fff, 0x400, 0x3, 0x1a90, 0x83ab, 0x0, 0x8, 0x6, 0xfffffffb, 0x9, 0x3, 0x5, 0x8, 0x2, 0x7, 0x5b, 0x80, 0x81, 0x2, 0x2, 0x4, 0x2fd5abe8, 0x1, 0x6b, 0x0, 0x7, 0x7, 0xca, 0x40, 0x5, 0x5, 0xfff, 0x0, 0x4, 0x9, 0x1, 0x4e, 0xffffb10e, 0xda63, 0x8001, 0x1b, 0x1f, 0x3, 0x5, 0xfffffffa, 0x7, 0xff, 0x9, 0xc4, 0xea3, 0x15f, 0x800, 0x3, 0x3, 0x743b, 0x8, 0x400, 0x80000000, 0x9, 0x80000001, 0x1, 0xf2bf, 0x5, 0x8, 0x1, 0x6, 0x3f, 0x0, 0x1000, 0xa48, 0x81, 0x8, 0x1ff, 0xfffffff8, 0x4, 0x5, 0x1, 0x101, 0x8, 0x1, 0x3, 0x804, 0x2, 0x1, 0x200, 0x9318, 0x1000, 0x0, 0x2, 0x3, 0x7, 0xd5, 0x40, 0x8, 0x7ff, 0x101, 0x8001, 0xfffffe00, 0x1, 0x3ff, 0x8, 0x0, 0x2, 0x26, 0xfffffffa, 0xe4, 0x0, 0x80000001, 0x400, 0x6, 0x5, 0x1, 0x2, 0x0, 0x2e5d, 0x36, 0x1000, 0x9, 0x1ff, 0x9, 0x1f, 0x8, 0x1, 0xff, 0x2, 0x5dd1, 0x6, 0x4b00000, 0x6769, 0x1, 0x4, 0x200, 0x7, 0xffffffff, 0xffffffff, 0x0, 0x3, 0x0, 0x40, 0xff, 0x1, 0x1bf44b6a, 0x9, 0x3ff, 0x1ff, 0x3, 0x80000000, 0xda0, 0xfffffc00, 0xabf6, 0x4e9, 0x100, 0x2898, 0xd7e, 0x250, 0x4, 0x7, 0xfff, 0x10001, 0x80000000, 0xffff, 0x7fffffff, 0x7, 0x2, 0x6e8, 0x2, 0x7, 0xff, 0x1, 0x5, 0x92d4, 0x5, 0xfffffc01, 0x6, 0x9, 0x3f, 0x5e4a, 0x4, 0x10001, 0x4, 0x36, 0x93, 0x5, 0x3, 0xf86, 0xfff, 0x3, 0x480a00c3, 0x2, 0x20, 0x4ef, 0x81, 0x9, 0x3a, 0x20, 0x10001, 0x3f, 0x5, 0x10000, 0x9, 0x3f, 0x5, 0x0, 0x3, 0x1f, 0x92, 0xda1, 0x7, 0x6b, 0x2, 0x47e2, 0x7, 0x401, 0x7fffffff, 0x5, 0x3c89feff, 0xaa, 0x8, 0x2, 0x1ff, 0x1, 0x80, 0x1, 0x2f09, 0x800, 0x1, 0xf85, 0xffff, 0xfff, 0x8, 0x4, 0x1, 0x3f, 0x30, 0x1, 0x3, 0xffffffff, 0x6, 0x0, 0x1, 0x1, 0xfff, 0x0, 0x7fffffff, 0x0, 0x10000, 0x48000, 0x1, 0x5, 0x18b, 0x6, 0x2, 0x5, 0x9, 0x8, 0x7ff, 0x95b, 0xffff0001, 0xfffffeff, 0xdc, 0x1f, 0x10001, 0x5, 0x8001, 0xdc3e, 0x8000, 0x0, 0x0, 0x9, 0x8df, 0xfffffff8, 0x8, 0x5, 0x0, 0x5, 0x9, 0x1, 0x0, 0x1, 0x7, 0x1, 0x1, 0xffffffff, 0x8, 0x8001, 0x1ff, 0x6, 0x8, 0x4, 0x3f, 0x80000000, 0x20, 0xea, 0x1, 0x9, 0x35, 0x4, 0x7, 0xf2, 0x0, 0x0, 0xffffff01, 0x5, 0x4, 0x4, 0xfffffff9, 0x519, 0x3ff, 0x1, 0x0, 0x3, 0xca, 0x101, 0xd0f, 0x7ff, 0x4, 0x6, 0x0, 0x998, 0x4, 0x0, 0xfffffffb, 0x1, 0x7ff, 0xffff0001, 0x100, 0x7ff, 0xfff, 0x7, 0x6, 0x1, 0x1, 0x1ff, 0x7, 0x1, 0x2, 0x8001, 0x9, 0x10001, 0x80000001, 0x800, 0x21, 0xfffffffa, 0x6c4, 0xe9f, 0x6, 0x2, 0x1, 0x2, 0x6, 0x3, 0x1000, 0x0, 0x401, 0x6, 0x7da, 0xff, 0x80000001, 0xfffffffb, 0x4bc1, 0x40000000, 0x1f, 0x8001, 0x7f, 0xfffffff9, 0xffffffff, 0xfffffff7, 0x3, 0x4, 0x5, 0x7fff, 0x0, 0x400, 0x0, 0xffff, 0x9, 0x40, 0x2, 0x7fff, 0x1, 0x6, 0x7, 0x8, 0x594de3a2, 0x40e, 0x2, 0x7, 0x3, 0x6, 0xb67f, 0x10000, 0x5, 0x8000, 0x8, 0xf0000000, 0x4, 0xa99, 0xf65, 0x80000000, 0x4, 0x20, 0x0, 0xffffffff, 0xd4, 0x2, 0x4, 0xffffffff, 0x9, 0x40, 0x0, 0x0, 0x1, 0x6, 0x5, 0x8, 0x9, 0x9e8, 0x8, 0x8, 0x0, 0x0, 0x8000, 0x3, 0x8, 0x9, 0x30, 0x4, 0x1, 0x80, 0xa04, 0x6, 0x4, 0x9, 0x9, 0x3, 0x7, 0x1, 0xff, 0x0, 0x2ce, 0x7ff, 0x0, 0x1, 0x7f, 0x9, 0x9, 0xbf, 0x0, 0x7, 0x1, 0x6, 0x56, 0x5, 0x10001, 0x7ff, 0xfffffff7, 0x2, 0x0, 0x7ff, 0x7fffffff, 0xffffffff, 0x1, 0x1, 0x6, 0x1000, 0x1f, 0xfffff000, 0x3, 0x7fff, 0x4, 0xff, 0x7, 0x2, 0x2, 0x66, 0xffff, 0x9, 0x4, 0x7, 0x7, 0x4ea, 0x7fff, 0x80, 0x4]}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000080)={0x2, 0x47, 0x1, 0xffffff58, 0x1, [{0x3, 0x61c, 0x5, [], 0x660f}]}) mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) 04:30:49 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0xf6ffffff00000000, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, 0x0, &(0x7f00000001c0)) socket(0x0, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000200)={0x0, 'veth1_macvtap\x00'}) 04:30:49 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="00e9e77a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) socket(0x11, 0xa, 0x5) 04:30:49 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x500000000000000, 0x0) 04:30:49 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0xf9fdffff00000000, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, 0x0, &(0x7f00000001c0)) socket(0x0, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000200)={0x0, 'veth1_macvtap\x00'}) [ 352.172622][T14598] afs: Bad value for 'source' [ 352.212942][T14598] afs: Bad value for 'source' 04:30:49 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x600000000000000, 0x0) 04:30:50 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket(0x10, 0x3, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pipe(&(0x7f0000000040)={0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) sendto$llc(0xffffffffffffffff, &(0x7f0000000140)="7653bbc6175a3d2b8b43d6fab096eaaa30", 0x11, 0x0, 0x0, 0x0) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88882, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0x2}) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @loopback}}) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x1000000c8) splice(r3, 0x0, r4, 0x0, 0x18102, 0x0) 04:30:50 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0xff00000000000000, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, 0x0, &(0x7f00000001c0)) socket(0x0, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000200)={0x0, 'veth1_macvtap\x00'}) 04:30:50 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="0ee9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) r0 = add_key(&(0x7f0000000000)='user\x00', &(0x7f00000011c0)={'syz', 0x3}, &(0x7f00000002c0)="f6", 0x1, 0xfffffffffffffffb) keyctl$unlink(0x9, r0, 0xfffffffffffffffb) r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000080)={'syz', 0x1}, 0x0, 0x0, r0) keyctl$get_security(0x11, r1, &(0x7f00000000c0)=""/99, 0x63) 04:30:50 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x700000000000000, 0x0) 04:30:50 executing program 3: r0 = memfd_create(&(0x7f0000001780)='\xd8\x05V\x15\xa5e\xf1\xb8\xf6\xa2\xba\x85\xb95\x03<\xb9;\xcd\x86\x8bD\xf9\xe9L\xe1Q\xfc\xe2\x97\xa0\xe8s\xb2\x11\xef\x1ac\xc9\x89\xc7\x0fv1\xa1:h\xf6\xf5\a\x8c\xf0Ay\x03\x97\xe77\xc1\xc8\xa6\xcb\xd2\xbe\xe9\xd2\xfb{u\xc3\xcd\xba\xa8G`9\xb5\x82\xa9p\xc8)\xe5$b\v\x8e\b\xf4\xf0\x11\xb4\xcb\"\xf4\xf3\xb4|\xdf\xa3\xdd\x9c\x8a\xf4D\xd3\xea\x11c}\x86H\xca=;i\x96\x183h\xba\x1a\x10', 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000380)='/dev/nullb0\x00', 0x0, 0x0) io_setup(0x1, &(0x7f00000004c0)=0x0) io_submit(r4, 0x8, &(0x7f00000000c0)=[&(0x7f0000000140)={0x3a004006, 0x2759, 0x10, 0x0, 0x0, r3, &(0x7f0000000000)="98", 0x3e80000000, 0x0, 0x0, 0x2}]) [ 353.011356][T14626] kAFS: unparsable volume name 04:30:50 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x800000000000000, 0x0) [ 353.048637][T14626] kAFS: unparsable volume name 04:30:50 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0xffffff7f00000000, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, 0x0, &(0x7f00000001c0)) socket(0x0, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000200)={0x0, 'veth1_macvtap\x00'}) 04:30:50 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x9, 0x2000) ioctl$VIDIOC_DV_TIMINGS_CAP(r0, 0xc0905664, &(0x7f0000000080)={0x0, 0x0, [], @bt={0xc9, 0x8001, 0x1, 0xb, 0x4, 0xfffffffffffffff8, 0x3, 0x6}}) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) 04:30:50 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0xf00000000000000, 0x0) [ 353.333007][T14643] afs: Bad value for 'source' 04:30:50 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0xfffffffffffff000, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, 0x0, &(0x7f00000001c0)) socket(0x0, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000200)={0x0, 'veth1_macvtap\x00'}) 04:30:50 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x1000000000000000, 0x0) 04:30:50 executing program 4: r0 = syz_usb_connect(0x4, 0x71e, &(0x7f0000000280)={{0x12, 0x1, 0x310, 0xd4, 0xdc, 0xef, 0x8, 0x2100, 0x9e69, 0x8c38, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x70c, 0x3, 0x8, 0x0, 0x20, 0x80, [{{0x9, 0x4, 0x7c, 0x1, 0x6, 0xe9, 0xe1, 0xdb, 0x6, [@uac_control={{0xa, 0x24, 0x1, 0x42a, 0xbc}, [@feature_unit={0x13, 0x24, 0x6, 0x4, 0x5, 0x6, [0x14, 0x9, 0x8, 0x3, 0x4, 0x8], 0x4}, @feature_unit={0x13, 0x24, 0x6, 0x6, 0x4, 0x6, [0x6, 0x8, 0x2, 0x9, 0xa, 0x6], 0x5}, @output_terminal={0x9, 0x24, 0x3, 0x1, 0x302, 0x3, 0x2, 0xe3}]}], [{{0x9, 0x5, 0x80, 0x0, 0x400, 0x3, 0x99, 0x5a}}, {{0x9, 0x5, 0x3, 0x10, 0x60, 0x76, 0x0, 0x7, [@uac_iso={0x7, 0x25, 0x1, 0x3, 0x3f, 0x9}]}}, {{0x9, 0x5, 0x6, 0x4, 0x40, 0x6, 0x20, 0x81, [@generic={0x50, 0xf, "3c480a12dd3ef6f4027729db87c1c4cb13d62bf8f02af21ab7209a0725758f3d22bbf324f12b40d6733bc0a58f0c7975a1a97b51f2d0aa2c693189c274b6491409de2a18e5a20b8545b2d16af581"}, @uac_iso={0x7, 0x25, 0x1, 0x82, 0x1, 0x4}]}}, {{0x9, 0x5, 0xe, 0x0, 0x20, 0x7f, 0xfc, 0x0, [@uac_iso={0x7, 0x25, 0x1, 0x102, 0x4, 0x3}]}}, {{0x9, 0x5, 0x2, 0x0, 0x400, 0x40, 0x0, 0x9}}, {{0x9, 0x5, 0x2, 0x10, 0x8, 0x0, 0x5, 0x2}}]}}, {{0x9, 0x4, 0x3e, 0x2, 0x3, 0xff, 0xe7, 0x3, 0x2, [@generic={0x6a, 0x23, "6c7fe094dbb059b94254c9ec3f5afb0641ab3a60e7305aef68dad7b6cf866df2fe825a959b5afeb2c94f2b3caa1dd0bb68ab3c7f90c91d4d8e9ea2d5e413082d8bf684137f9f911f193b3ffba5be6045caf9cee7e47fd0201ab05d42b36b98c183d480ceeba8fdd0"}, @cdc_ecm={{0x5}, {0x5, 0x24, 0x0, 0xff}, {0xd, 0x24, 0xf, 0x1, 0x1, 0x7ff, 0x0, 0xfa}, [@mdlm={0x15, 0x24, 0x12, 0x7}, @dmm={0x7, 0x24, 0x14, 0x7, 0x200}, @ncm={0x6, 0x24, 0x1a, 0x4, 0x4}, @country_functional={0xc, 0x24, 0x7, 0x20, 0x100, [0x6, 0x8, 0x8001]}, @mdlm={0x15, 0x24, 0x12, 0x8}, @mbim_extended={0x8, 0x24, 0x1c, 0x5, 0x5, 0x49c8}]}], [{{0x9, 0x5, 0xb, 0x10, 0x200, 0x3, 0x4, 0x3f, [@uac_iso={0x7, 0x25, 0x1, 0x82, 0x34, 0x400}, @generic={0xcf, 0x4, "ea64e86b3b9b730a78acf9d689d9a56a1eb3c44ee9140579fe4a55fe015e31ad070e78e6dd71a451e42847f757bc9f29068c11a6c24f290a384d510455702c0b8c82efc3f0b894ffaf214d67ce796d18d0a61b545a4706c56ab70cf4c028e46a63619a8df9120fe597912a270521546d2e87a9b046e34cf233d633d93b9b7b54ffd584f7287f52d03137418794e2374c9aab91e2d383df02df6fba0c7aa9bbfd1b789118679a34310be1b60c5475fc5eb8a84e927a0a718dafdac0ae5d9c3e2e6f55690bca13ec38ddb44aacbe"}]}}, {{0x9, 0x5, 0x7, 0x0, 0x10, 0x5, 0x1, 0x7, [@generic={0xaf, 0x2, "9d4a35c9f91fab98dd400df24d8a789885ed7949a0c5ba08998e1d543b1aee96b6ef14aa4c3916fc7a8be15bd90ee8092c4f92c4f544b0ad8a851b9706f834301e78a777600232319598f93f20d4022e73b3f53f6eb78eac0afa9e6a4f4fdcabec215da01ca9fae9c89c60a763d4bb1952318e4caf49afe09d20869362b32767c5f9fcf48babdb5f10d33c48f8c18900a9ad1872cd9372ea9409ba46e2692672d81254238947998e0f2cdd00e8"}]}}, {{0x9, 0x5, 0x8, 0x4, 0x8, 0x4, 0x4, 0x80, [@generic={0x6d, 0x6, "03e57c83f5753f3031c0712198af5d4e5675ce953d418d39be1a12051363e29bcdb0f41d7f3ed74c003c42a56c28b7ed0fb1315c8027b5a4b749cc14b5ea116ed0924e2b02d32d0a1097fe4474eebcc945e99ad18ad0e7fc37d2ba980f7810ed69ed84205e8aadd3901140"}, @uac_iso={0x7, 0x25, 0x1, 0x0, 0xff, 0x2}]}}]}}, {{0x9, 0x4, 0xa6, 0x10, 0xc, 0xd5, 0xef, 0x44, 0x5, [@hid_hid={0x9, 0x21, 0x2, 0x8f, 0x1, {0x22, 0x643}}], [{{0x9, 0x5, 0x0, 0x2, 0x400, 0x0, 0x9, 0x4, [@uac_iso={0x7, 0x25, 0x1, 0x1, 0x3, 0x81}, @uac_iso={0x7, 0x25, 0x1, 0x2, 0x81, 0xa5f5}]}}, {{0x9, 0x5, 0x6, 0x3, 0x20, 0x1f, 0x80, 0x8, [@uac_iso={0x7, 0x25, 0x1, 0x1, 0x5, 0x5}]}}, {{0x9, 0x5, 0x0, 0x1, 0x400, 0x5a, 0x6, 0x3, [@uac_iso={0x7, 0x25, 0x1, 0x1, 0xe4, 0x401}]}}, {{0x9, 0x5, 0x1, 0x0, 0x20, 0x8, 0x94, 0x4, [@uac_iso={0x7, 0x25, 0x1, 0x0, 0x6, 0xfff}]}}, {{0x9, 0x5, 0x6, 0x10, 0x400, 0xf8, 0x15, 0x3f, [@generic={0x7, 0x39, "02427b16a6"}, @generic={0xf4, 0x30, "baac687a86b6257fd9d2528d2dfd771e4bf869126b295fdb75bc12624d34468a258025c47ea61eb640db996092588298ea6807c55e4482fac39150a3a8a4d6515d5f94bb60d45268f3edd60710e40f04f780356f45af6682863408995629cd00799675f16c8aed0c010827862e21c926166678a2fb402c2ee4525e3a6bb9136f31e4f21fed824a4030cd6637552caa7eb1fcc927812e41b6f8a9bd3c12f6af5fef8d234cb747813757573e3e9533dd0482ee7e41baec340c8070f5c5147245f3b24a186f5e1df72b4ffbacc85fb9140e3bc0b3d63e12c584d8ff04ada695fdc8211b0e0e85e13a3c792197ea19d1dbe9d9d6"}]}}, {{0x9, 0x5, 0xd, 0xc, 0x20, 0x40, 0xe6, 0x9, [@uac_iso={0x7, 0x25, 0x1, 0x83, 0x0, 0x7}, @uac_iso={0x7, 0x25, 0x1, 0x2, 0x8, 0x5}]}}, {{0x9, 0x5, 0xa, 0x0, 0x200, 0x5, 0x0, 0x9}}, {{0x9, 0x5, 0x7, 0x10, 0x10, 0x6, 0x6, 0x39, [@uac_iso={0x7, 0x25, 0x1, 0x0, 0x7, 0x10}]}}, {{0x9, 0x5, 0x6, 0x10, 0x8, 0x0, 0x81}}, {{0x9, 0x5, 0x82699ab65c0ad8bb, 0x10, 0x400, 0x80, 0xde, 0x9}}, {{0x9, 0x5, 0x5, 0x1, 0x8, 0x0, 0x0, 0x2, [@generic={0xee, 0x23, "667bc57df9f841ac95de82372a31275f87e4577ba384b2d83adfe04fbedd556d2b832259c3bc04d4285005e6038d7d322120b7ae8de4a0ca03b24e526bfc002745542abebd1ea275796d57f40d72b716e47109162279edae9867d789171676f1edd4a1164d31c7eb1f91bf7c4fb40983fcdb5b8bfcb082f190c7da526fed5767117a61d08582d80c916527de1534bbb512f1b539bff610ce4714f0a2f2ee132b399c38a59af69c44eb0cd46ed517d1764b8561aba30c919840911fd5c53372b14db1b15898418098ae48a32583bbfcb979671e4b7df4562494f6b6b8d62e7834f7663a8b60184bb9ef507f86"}, @generic={0x9f, 0xf, "e6ab04a4ad959967e96cc73b5283a5e744580bb35f32abf3a4b07f4e0ab1bbf54a602f96d8405d3433f459a88ec99b502461c1c4ceea3ed0dde22a0cb4adbb7ab102fb9a07055487d482cf381e552d381f83aab43d48a5019d836c5e453c807ab969e6022e8e7b92b5c049f528a9f5e115272694449630f8a52624fbd327101b38e41be1bcfb7b9853fc1827bd1ef0fe0ccaae71bd598b888d2998ce97"}]}}, {{0x9, 0x5, 0xe, 0x0, 0x400, 0x80}}]}}]}}]}}, &(0x7f0000000c00)={0xa, &(0x7f0000000000)={0xa, 0x6, 0x201, 0x1f, 0x81, 0x0, 0xff, 0x8}, 0x38, &(0x7f0000000080)={0x5, 0xf, 0x38, 0x4, [@ss_cap={0xa, 0x10, 0x3, 0x0, 0x0, 0x6, 0x30, 0x2}, @ssp_cap={0x1c, 0x10, 0xa, 0x0, 0x4, 0x35e, 0x0, 0x3, [0xff3fc0, 0xc0f0, 0xf, 0xff00c0]}, @ptm_cap={0x3}, @ss_cap={0x69, 0x10, 0x3, 0x0, 0x1, 0x6, 0x2, 0x3}]}, 0x7, [{0x9f, &(0x7f00000013c0)=ANY=[@ANYBLOB="9f03b1c5a5c4dc20d0d980259966c800607324e6efd6fa93507ff581d4d73db84331c2e17f25d02f394875cc7ee3ad95b1230bacf7848d50dd22c107186cf3f9eede3dd5df3b21931ab6bdef2717edc501635e7c77b6751c466e04f6d00d9cc80e7ba058ccec198b00e25a7200efc28c9166af42b4938151db50ce585895faa7fddb7db0c6a3226729b9a41312b9dfed8508e78ee22accc17651caccdf14629a25aca101d2d125cfa576a8d53fb22b0f8bb114078198cc047f447e7351e2fd8387962b8e8e74fa7d7d3f5695b0e4ca9de34a570bd0549faeac453d8b1924bfe97bdbd37e0fa554e9d79e386bdec568f6d6e06e888033c5ac7145f3e23620f2f23c7f017bb6e11ec277f1f335be61849b78789b8f4c6fde08d54b17016673"]}, {0x2f, &(0x7f00000000c0)=@string={0x2f, 0x3, "7a8864981257ae55965b8284d3a44c6eb8f887ecc3a9a24023d844ce0fc5a84dd88c31b6cefb23afbecd9a84a4"}}, {0x8, &(0x7f0000000100)=@string={0x8, 0x3, "b45734bf9b1e"}}, {0x40, &(0x7f00000001c0)=@string={0x40, 0x3, "94c262a80fb3b4d793b73271eafdcc3d5ca7c071b4734fe7a956098d7e141a89fa9cf3ad14e04b1683950005d9a192eebc3de5f99a1d85ae9a74d04afa27"}}, {0xcb, &(0x7f0000000a80)=@string={0xcb, 0x3, "c3d1010647fe3b6f32d7d2d7bf498649b602f5094e8f75adeb018d61d3fac80d4a7af1ec961aa23cc18253f5287d5ad08a9f8417bcc4ab9e054f3d8209989357219ddb71ef6d7e1f2eb5287d840af738abc90540491ed3597fca9d334aeaf238cfdd2b4fe925aa1ba9dc0a6b8ddead451b43d9661b02be43132922db747868868e0d83652456d5a6a1bc044c7e979910b6838c6b97f95aed96315c2159c2e9f298a2c25d594b7cb562be44ba24e17617b48aa3f9a6a84ee67fdd0b8e7c90fc3b0903c269e95b04b9e4"}}, {0x68, &(0x7f0000000b80)=@string={0x68, 0x3, "3a33f5cad68501828606235e7d11f8d6506cd4ad2a6a41cf34eccdc2df9120b1506e28aa6a74507ac46e4465e9b7db865393221cd677e541901fd2d1226bd0abc89f3ed56969e2ba897a6759669ae518d2cef5ca971bb970d79bb5532b5652d3032c6e4886c4"}}, {0x4, &(0x7f0000000200)=@lang_id={0x4, 0x3, 0x42b}}]}) syz_usb_control_io$uac1(r0, &(0x7f0000000d40)={0x14, &(0x7f0000000c80)={0x40, 0xe, 0x6d, {0x6d, 0xf10767e9d01db408, "9ef62e7e822d1b302cf1e5ef53f76c6d6caf46eb775e7cf83e89beeb513c2c5f4f575697e9bd5d2e0972ab2dc3879dd5f949cbb48c813dd7f31cd8f2e65a01ee243fd2f4df3d042acad3284ca5b33d8413c71fef65fdcf0f8c4df16c5adc58bdee8809049e861af49ead27"}}, &(0x7f0000000d00)={0x0, 0x3, 0x4, @lang_id={0x4, 0x3, 0x300a}}}, &(0x7f0000001000)={0x44, &(0x7f0000000d80)={0x0, 0x16, 0x7c, "5fcb9096631ede66d6c438bab328e4ce464b4f7b1df6b4bc5962e8dcafd81c61a6e250b5444408655c9aed13e31058c51290ef56c9fe29fb5960396f732a823cdfe98ec3dbd7c018d6740b36815fe6e31f113a00930d71aef18941fd99edfb656525a3f78dd94383681a7ec40f7a6419c96db450efc6b0414e939d48"}, &(0x7f0000000e40)={0x0, 0xa, 0x1, 0x7}, &(0x7f0000000e80)={0x0, 0x8, 0x1, 0x4}, &(0x7f0000000ec0)={0x20, 0x81, 0x2, "6def"}, &(0x7f0000000f00)={0x20, 0x82, 0x3, "2b5a1f"}, &(0x7f0000000f40)={0x20, 0x83, 0x3, 'T/\"'}, &(0x7f0000000f80)={0x20, 0x84, 0x1, '!'}, &(0x7f0000000fc0)={0x20, 0x85, 0x3, "b53690"}}) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$batadv(&(0x7f0000000000)='batadv\x00') sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r1, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)={0x14, r2, 0x301, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) r3 = syz_genetlink_get_family_id$devlink(&(0x7f00000010c0)='devlink\x00') r4 = getpid() tkill(r4, 0x2f) r5 = gettid() ptrace$setopts(0x4206, r5, 0x0, 0x0) tkill(r5, 0x17) ptrace$setregs(0xd, r5, 0x0, &(0x7f0000000080)) r6 = getpid() tkill(r6, 0x2f) ptrace$peek(0x2, r6, &(0x7f0000001240)) r7 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) fsconfig$FSCONFIG_SET_FLAG(r7, 0x6, &(0x7f00000000c0)='posixacl\x00', 0x0, 0x0) sendmsg$DEVLINK_CMD_RELOAD(r1, &(0x7f0000001200)={&(0x7f0000001080)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000011c0)={&(0x7f0000001100)={0xac, r3, 0x200, 0x70bd25, 0x25dfdbfe, {}, [{@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, @DEVLINK_ATTR_NETNS_ID={0x8, 0x8c, 0x1}}, {@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, @DEVLINK_ATTR_NETNS_PID={0x8, 0x8b, r4}}, {@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8, 0x8b, r5}}, {@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_FD={0x8, 0x8a, r7}}]}, 0xac}, 0x1, 0x0, 0x0, 0x4090}, 0xc0) mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) 04:30:51 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket(0x10, 0x3, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pipe(&(0x7f0000000040)={0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) sendto$llc(0xffffffffffffffff, &(0x7f0000000140)="7653bbc6175a3d2b8b43d6fab096eaaa30", 0x11, 0x0, 0x0, 0x0) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88882, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0x2}) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @loopback}}) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x1000000c8) splice(r3, 0x0, r4, 0x0, 0x18102, 0x0) 04:30:51 executing program 2: syz_open_dev$hiddev(&(0x7f0000000000)='/dev/usb/hiddev#\x00', 0x193, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, 0x0, &(0x7f00000001c0)) socket(0x0, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000200)={0x0, 'veth1_macvtap\x00'}) 04:30:51 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x2000000000000000, 0x0) 04:30:51 executing program 3: r0 = memfd_create(&(0x7f0000001780)='\xd8\x05V\x15\xa5e\xf1\xb8\xf6\xa2\xba\x85\xb95\x03<\xb9;\xcd\x86\x8bD\xf9\xe9L\xe1Q\xfc\xe2\x97\xa0\xe8s\xb2\x11\xef\x1ac\xc9\x89\xc7\x0fv1\xa1:h\xf6\xf5\a\x8c\xf0Ay\x03\x97\xe77\xc1\xc8\xa6\xcb\xd2\xbe\xe9\xd2\xfb{u\xc3\xcd\xba\xa8G`9\xb5\x82\xa9p\xc8)\xe5$b\v\x8e\b\xf4\xf0\x11\xb4\xcb\"\xf4\xf3\xb4|\xdf\xa3\xdd\x9c\x8a\xf4D\xd3\xea\x11c}\x86H\xca=;i\x96\x183h\xba\x1a\x10', 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000380)='/dev/nullb0\x00', 0x0, 0x0) io_setup(0x1, &(0x7f00000004c0)=0x0) io_submit(r4, 0x8, &(0x7f00000000c0)=[&(0x7f0000000140)={0x3a004007, 0x2759, 0x10, 0x0, 0x0, r3, &(0x7f0000000000)="98", 0x3e80000000, 0x0, 0x0, 0x2}]) 04:30:51 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) fsconfig$FSCONFIG_SET_FLAG(r0, 0x6, &(0x7f00000000c0)='posixacl\x00', 0x0, 0x0) write$P9_RLERROR(r0, &(0x7f0000000080)={0x1e, 0x7, 0x2, {0x15, '/proc/self/net/pfkey\x00'}}, 0x1e) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) mkdirat(r1, &(0x7f0000000140)='./file0\x00', 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) fsconfig$FSCONFIG_SET_FLAG(r2, 0x6, &(0x7f00000000c0)='posixacl\x00', 0x0, 0x0) ioctl$VT_RELDISP(r2, 0x5605) getdents64(r2, &(0x7f0000000280)=""/211, 0xd3) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) fsconfig$FSCONFIG_SET_FLAG(r3, 0x6, &(0x7f00000000c0)='posixacl\x00', 0x0, 0x0) fsconfig$FSCONFIG_SET_BINARY(r3, 0x2, &(0x7f0000000100)='[A5[\x00', &(0x7f0000000380)="9189216cd5f57428f59973aae065922b2de1d476093bdd79bbaf3e1241555be54a6f806687604547598ccc28958083987379a42cc55c4b341dac5d44d75e82c2be6ec9463167eeda4ec5c1a9f2235283237e1cee30e8445c36701faff39d72b56938c8475b5c2c74493faf6de8c1dc91d043b9e917a86ea57e1a665e8499e1ee4093f559edc4ac068edcd9707f8d3fd668163e81d02f2099fb23d9654c20dab40e719d142d3a2da4978493969b44e8b76f412c8e6fdfd74daa95db20379af10a4950d9a21ec9e0defff6eeb3f5c088c837f022ae5474b710b74dfab6d572da7725891ab9dadead9fa188efb99ad412b7d4361f29891eaead49c0f48a49a4b667f84db98591635a6c6a6aa8732f51ac00a61ccbe4965fed3c280b556672f9922f9edaa9d581d73c3b5b4803bcf7f326acc0f29a970da2cab7f0efcefe6b01608ec82f61414432a29529f63fc5f114322d1a7e181bc0a15f5d9e9a50af4afa58f9cbedd4ae33313ef30e2c237922c57119dba0302a15e700aaa36ed9cbf3f3e1b4bd311dd9d0d058a881c730c3eb2a2a61990bc2272d0a345e31f0baa359db0c6281aadf5ff71e37ff2b14e9645c4f713ccb598c27d5acb7e1920d528da9ebc5536ebde2d64de8adc0f41d5254e9916bf2772594b808c3a7c2debf2c7a29a9b87466a06fac8fc2ede09fe84013c4c2593968ba63bb47f1a2003c06acdaa954cc1621f0b7580aa1500cb36de8dc9d5bd5ae96ad669e080480540a0bb722e2661f1a9cd70ec01ca2a95647b03156f724220e3f18000dfeeff405fd36a2436dec9ad29684d58b4a02f8f0a16189de2d841f698662cca3aa9c68604474e5aed2e467c4b63bebee1134ca55f711443114dd2685da9f63dee911aaf9a34d3f65cf7dabbc885b07b78b5b2e5a366f966f4c768b542d615ee2351c047655de0b08226dede8d06351f48f1ce48324f29aacc7ab5e2fe19e990f473b7a6e704ac3dd02ce04db7493a0e88401210021427b3a4f867d959728a7f97fbc8e2bda5a7cd7edca80ac856d7e817db4ca359fb82fab086980218aa5213fdcb05ce904794e8d339f7668aa05ce91f674963a85cf9c481f910c3b574e7f2737e1effba18f8e20768e651efe70508568e9e2804bf8beace36b2f570bbf866234d3b261a3416606c9d19c48975ad1daebab8f968decf03c1780a46e08b5ae5eaaf9af42b195ebd283e4eb17b740e75e060408d2cbece815ff7fe50ee0821f814dfe70f2604d78b72aa70dc4608475e5b5254c0641a70a3759f62a6bae23f3145a55121f49056d0170ad0554838fa2a215d8b22d6c94a4fc1d559a0767e87f1195ef7a831d74a1e4a71fa52a1cb64ccd41862f899a94c4e5a273e8e07ba4beb6cf84acc46ffb0d6e2e303a3ac7b40178c9d76410f20b1e6701172c19b74894ac8cb113fb26595b898614cc01cc6a04185d14af88fdeddeaadca5db41c1372da43ead562947d75c4634e4e57bf93a24cd10e5a1e318f4e377b1e281dd44932859480fabc13f7773e8559ce096f87a6c162422b4524ae4552bc9230b0402fb1619cc8daccb9c3ac69991e496c55ebf0db800fb0563b09972892e599281c51ddfef62875912dd820fca7b1f9a82e5ee423b23f755b7a291a46fdb4db54cdd619174d5aa2b493de3eb7723f3c8c0f084af3e175246b480d3e49b8690168bb650324c3e7e38f6a2524277e18419514252d790455f44719462a6b6c2cda580ca809435deeb7fd3d7dafa93634e2f703c825c4911fedee234056a5ae4ba84689b26973694ce4db9eefe1340d4ee00fc7d093c24c8713438eec0062235e544ae9f657a4c54d88220d3c0cae079e1804fd56220b1a65fae776bc212acccb17a7ca3a033a4899f117c3d94cbd142318e074ac315a60e12454a796f227b52d5be6b3b19ba49c6810bb8cb987189ca3f8bb60ad18c0c8d62c7329b3983e62b9d1fee13dee7459af0f6a7f23eb9e817937791f116a247d94508a40b9c2ef336ab76a6416c51770fd658f8f909986d4178964da6af3b7c206540b9362d2003f7c861d1769fe35937c694f74a6ca6677f71a8cdcc9eae3951475104e38a6742f6c692fad362d4258fb651a5be0d19d15dcf92050440654a5b2bf2c17be11153898ebade942f97b69f241d28e7a107db07e90e07f73ec8ad0f47fbb94e93fb30956ef667e5fd1ad11342f452ad8fa5ae41da106164eb33bbd383621db597a66d5461c1fbf49319f03652241d73793041dc06eb4230a519fd7beeaf04875cfbcce86e4b454fdf6fa157220e6ba4d5f8a9901fd78ad54032185d760908a6a9424e2ea5814dee3776cab9e48b0e0af77fb7cb1019182838abf72b3cd40e9bd6b66bca9971bc241a6feb568406471b7e85849016416e21ae827699c428a2dd4e3461904d7c9948bcc8070acd30ddf3fcc7b1e78e8dc0918457e4543d2a4490bcf5d4c012f36eebab8e11c1aa592f86f255e361914878e8169ef81ce46ef437627cf51e131c6f6696b53af486752fa566593546524faa63436eae08e5d89efbcb3c8d6b1e75c5582a8b062b483d9e0b910addb4afc038babc8d603157b389b55346677be65adae1f92111a7525639f7af2b09bc84d2fe7e50dc2aee15355822ded314fb606f8768c8dcaecbc9a89e039a9cd0bbe86bc94e8b0337138c5afc2babf72e8ed4cd77ef508d87f0e096ddc97189bb2faef557b00ee81c2a675cf7d11ca44c68458dbdb95cdc34963cb812a366a7f89c59a0bb7f3ac07efd9ccf80b73dfad85a4e817d88dbf749f7a47df33a4ed7fea11c03876ad5c9566ad2ffcc1677e2f34f067da19e78c9f2d44ae41c834aa40d6738a3e5848df26756c94f65ccb5e68c8ed8378ae43a8daece74dc67fdcfd0be6db560c31fa212d59f3540ab5dc56951fda723c549469da6759ddc220aa133bcfe14eb41630664dd4e7c4c202973d401a347a9939b8fe11c1783fd7296ce24a4370eec5f1b47437c3c9913d11b0902b5987663662d16067b4f0b3d1cfa29b9dafe0a6866c63075ebf5c782f631ffca323eb15050c6695d177a07df078cd15939089e353262220b600a53fd4c756fdfde1cf1aae9eac9fe1e6e4e84cf70015e80535488be62d35a582345413f6e9f339067e79fef9beedb18a00b077455b0e68af832d857bebbf455bf01ad249d7d9c06a42369f1bee09f823af6e109c4962ead04691fa5da496ff52ea95980f339b66fa6d9f4c800f47849eb5d116ae3523a76a2d047583967b02673f716bab63131600bea4ea980e8aa1da2d01334a7257751df8b68b449a12bf2e39fe26dde0075f4cff282d7ecf1172588a7abd3137e563692ecbf92a93987fd01857734d513c443b7537e53f5d0823803b1c9b938743e4907e721c6aa9cc50f6128a939e836b625f973cfc0915237a03332658e883cdc7fe1feea0b0d53ca8e6f2d91945ad238d5206379172c8434b3b3618df5fba0799c62efef293ac7f4ec34a4a7a7ad441659e1c2dcf0863e812521cbe445da0a6fef79d3b1ed7b9f26eea5fa0733204dde755ec6a9c8a74b42e43656de77962739ccb5997a1900a6fdc9ea96edb22668e297f39126d902b67e0632e7bbfde79b3252c846957402c17276e5bbddc9a8de2a94c4244ed03431b0a7cbf0eb51088e30d27c0f72b87e493e15efa19c29ab8a18c7575c2d062c1394ff3cc8bc65b8830ddd2c73d70765df586eefd70c7888fa0ae40eca77a4cc36e85672deec7504a5d132f818169df608a5226e435d267ea2c63cf12bac6b0d48423aad3d4ab4db1cf3b539e5b532c7f52f861d7f538f025c3d7fc68a92859aee70e1116ca027627f7670e30dc2945f7000714dc733a8fefe561112c5551d3f414343f871c1a1d1671f14634a29a321fb2a76eda4c21644a53dada1ca237757d8b7a0f6840194047a87e71494f90cebb3ac4d3833a254e6750556be5f8264e3fec56c186f665eb384e836ec7b4f89ad5c0fa14c7327299c1b2b993a67363063ded91381ec3033798f6823c79d7b0c8b28876fa9791588cea594d4f5e60030991ecc790bd0ab60bfda381c307702074f9c08c3a89648af9e6ef3b4b7213bd8fbdd2844cb0041f0cac270adb55623b10b7c5d5b4d8898a3a63506dd1d46c19785a12548f38177054cf6f3a5c859dff60d383a26da8fab29b45110c2a8bcbca224de1ab72dc853670d5893d06c861c3bbf21ec726689a1763b27c32dc46161b765e2a9042316806b1d3d475ef9348b00ba0450a46ba2aba9d7888c1888330abaf5599b5da953334a5220251fac8cd531cb216626ce87185c663d4fa74a8dab25901f665fafc5299ef560126745ad88bd2cd7ebfa10bf1713a2cadecaf8c96cd6c72e82306c30b902340b0aa56ceb55b2d089cd7e0d892050815804c7e970652358ce0dbdc688f0abaf0872496e6f0000d797e7b70ff982d2c9a2712cae565104becea23baa64932f4bd1c1bcfa4c953e996e540d00a8c9eacef55735d1032657e2bc24294c38daa131d70783ec8fff40e0c3b615ea90ab229064bd4b02f65f0c0aa13877ee96f463adc22e3c3580c321817c4d098f3a40db62183da19ae42ae972a7775e5053fea51c0d59bb46dbff57c00a041747803dff0de37a3989a59f9948fc3ffde2b65786c6cb3ec6fd3d66d2b025dfb8ddfde235a78fa0eba93e126f1f3c0378936eaf7bdbdcae33b50d220b959190b426e26d279d4b71242d9bcbc8fe6f1be36cd160e87bc1de4214216c8ed1f2a56fd42e46fda771b9ac6f9063ad8a8729c3030f1d25ca083f195be27d50d6041b45f168dcd721b55e30a8f1d4e3ff9d03002776583656b2d85ea8fedffe61cd6feeaed28d2f4a776bfb24317cf81d7281d6fa30dc437937181ed24d0fb280692ccda361c0a946c5acfd69ecbf995ead3dc2e595f16bfcc881edc205fdafa91364e10d374693d2a176e55e7158bfffa9c1180ad02b0b9ed2c6f2f8bd953565d003c5e7e8f6a4da22ea7602077284f8e552f899bf8589f501894292699cacd18223198d8de00bd7d68ee682b9df8ab0cadd0d813065f08d3a5f0d72c67ad1910cae6a0134e5eba29e0a729516c587ed3e95b4caa74e8b65e5a96a59b99b85cc4f138686177b387107d966751fdc62e86c504fc20779981dcc90663845c12ecff1aef74b1b6b84631ab08aa607080d703d64ca0a1a07d137331da3de31ae00baea9713bf3e8afa00357cd12715d4a72de3fedc1f67d4c13b551cd7e77ae34d82eaf18f601b815e9b7efe028f377068818d27f255930d70b1b90e1a6d69ed963146644dbb6867ba0e6ef52f44140abc7d4b4e0f45a1669165935d7132f4b0f12d53b7c1c1d4bbfa00f60897f51f1478f289f94ffdc289277ce2a5d60602475348affb3d8844e115eeb24c8b39f276a74e09fa11b082f18dce0613c46646da6107fdd46c48c20cc708cadcfaf19cb0ec79086bfebdffda01f8fc5a504d946e8592f156dd3408a65c6edf1e3310f852e4810b4df53ddd9d4104afced6a4dbf18c87c8252d4ca43d2128bdb83aa44ab4e16ad2694166fa964761114d6697c9129d9f01f18bad7842a41da9584a3ea9f9ac6fd5ce03e51f2705bcdf7790f294a4a599d253d20b65657c33f4018c684a276ed4abadf49e7d404b66db9759e40c88476d9dd3185b326b2f250feab70c414cec3434468bc3149fbe6ce6cd9d2e23126b8aed3afde1d2d0b108d08f82a3afedcd64af29b1f29d1735311815dae405d295e11e579db1be6bd0ec28e00fc3c59ca6008571e0d279b0dede6fa00f9137a21f", 0x1000) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r4, &(0x7f00000001c0)={0xe, 0x18, 0xfa00, @id_tos={0x0, r5, 0x0, 0x3, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r2, &(0x7f0000000200)={0x10, 0x30, 0xfa00, {&(0x7f00000001c0), 0x4, {0xa, 0x4e23, 0x0, @ipv4={[], [], @initdev={0xac, 0x1e, 0x1, 0x0}}}, r5}}, 0x38) r6 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) fsconfig$FSCONFIG_SET_FLAG(r6, 0x6, &(0x7f00000000c0)='posixacl\x00', 0x0, 0x0) ioctl$KVM_SET_LAPIC(r6, 0x4400ae8f, &(0x7f0000001380)={"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"}) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) 04:30:51 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x2010000000000000, 0x0) 04:30:51 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) r0 = socket(0xa, 0x6, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r1, 0x0) syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000080)='./file0\x00', 0x2, 0x6, &(0x7f0000000640)=[{&(0x7f0000000280)="1e396ab7e89e7c9422eaaf4346312b7f4ce64366e6225aad9ae0b05078c7620c0dcd8291bc70c3b25a1728333d5c5e7e2d41a40367a317417ab4022c898121ff8bc22f8a37b84a267887882ba9764abfb3abd6b4f35b7edd282af322fafbf91f41780658b44d147f229de16d3ed7bdffc2fd0ef9cfc005925759004bebbe0b10e76a91a29fb51086497e06d76abea1cb6a36265f606c51b4b52c4555ac8b5a9c6ab035da", 0xa4, 0x6}, {&(0x7f00000000c0)="e6bef022cc0cf1d736b56d88e00e07264dd87eef0c4476ab2bb506c776383fd5a3b04b77142cbaf5277b5c1e36f31dd4b14cb57f92b61c21acbcb082c3c2fcdc86ba3f57fc84d0e200bfe4642ef29e369595fd33481c29936ef39b996245db32b1f8a4dd6d741312", 0x68, 0x2}, {&(0x7f0000000340)="68115829cb70b7588bef48862a3986d1380544bcaf125f2cf36c49f658a269ace213030e9772bb708bd2b079c28de9fe41dda8aadc79ac13d7f321047c1ee104ed8c4982b23bbb4a321bbe7dca12f40d524f28a26ac10b2b5e778ecf073531f37badd53ffb8bc2bb888b93921677ffc0efab8f0bf86acd91b0f776495adc811aec61bec55bae2bb3681cdffac249d9dda096ff82319847f0f02674d2b7261e35f6802b20152ddb325ee51e71bb381022fc8269b44066bffd3a69aecea2376018da61c4ea7a7ce0ef0228843c9f03354782c4", 0xd2, 0x8}, {&(0x7f0000000440), 0x0, 0x10000000000000}, {&(0x7f0000000480)="fb07cd2ab95ca22a846c86e6274844cada4a9ebeff2b59c97aa67f7f0b0514e40a8cbac71409f5b2e00aabdb1ece3678a210f92631e9eb31d4ce1462f439a25dd600d39b60a0f7a0155e14e89557be3e71808dc97d37a77d65a1f5e2b3ce83ed4ffbb317cbc0919d989f08904733be7501ff21feb1183d182b65f3a55dcb168baf778f8dbd1ae85181614d5927b80a34bd29cd66bff02fabd3902c02ec782cb00b842dfc1ce8b0c070d364094596d808850f5901675b775dd7ea73ccff9b91f8a273114e48a4748851dac300a23457e9", 0xd0, 0x5}, {&(0x7f0000000580)="24041292116de74075c428d151a0d91fbe54ecb566f0441f66b5e5b3074f6295d6f0542f7a9c2f50a7aab59e3f6fd0cb374f40dca91b28245e9d07f8a5606fca2a0a9273ad3300c733d61fc049eab431203fb3e55522bc518bf93746b0ee906514e9d4287f8d6a83b60b582c1ad2ee996df497caf1e8ae79f9595ad0b59b1f855ccf08fd4b7e2a54f1878daa203870d340dfab7c2793ac73605bc30ec5276db7acf0c97171a2", 0xa6, 0x159}], 0xc1, &(0x7f0000000700)={[{@nouser_xattr='nouser_xattr'}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'afs\x00'}}, {@measure='measure'}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@subj_role={'subj_role', 0x3d, '}i{'}}, {@fowner_eq={'fowner', 0x3d, r1}}, {@audit='audit'}, {@fsmagic={'fsmagic', 0x3d, 0x5}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, 0x0, &(0x7f00000001c0)) socket(0x0, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000200)={0x0, 'veth1_macvtap\x00'}) 04:30:51 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) chroot(&(0x7f0000000000)='./file0\x00') mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) 04:30:51 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x3e00000000000000, 0x0) [ 354.588000][T14696] erofs: Unknown parameter 'smackfsfloor' 04:30:51 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000080)='./file1\x00', 0x3c, 0xa, &(0x7f0000002700)=[{&(0x7f0000000280)="c550c6cf5d13878ce2463e9ef3953ed4814aa03c19fa2e33f9974778050301f63f0a7c0aa8677cce718231a18adf43cad36db40ab0106a60b9cc1b4fb3e1c9a260170c9582197ee4426f2686ad8fef00a1268dcc9302bec7e7ea8bc8bcc64eddd3fca95453d51b8c84f24c50f2b5461a9b3053ddeef304d4226b3fb17545cf2cc5a4929c17563349d0bf72313cda51969d916ee10d9d4e3a040e5f79794303ca0d1f5993e04c1776d19f43", 0xab, 0x30000}, {&(0x7f0000000340)="2346a8cd64e2e53f2fec5cf8e8b23313f4734a0bd6a50eea4f59cc79dc87902783cd691d12a6bfc0f975605fe1abaebf4f3150be5467cd10a3419e3c74d51ba02e9fcb0e7dc52bd2564ea6b1f599aa15dfa2884507cf56b28ed9e8a949208cb0188d3472f08da97deae98888aeee27b560212ad00956249c28faea19c7baa025bd8ce5e7139492784c80d49fb2ebf244ccd4a0eb3b5ae3408e9e0e96452cb28346d1236d56d2a7c9b3ef370cf63836d7b5c5edd70bb6b1171b96627abc1e7f622898ae2ce3f899365b8612581cd6980409b0c4", 0xd3, 0x6}, {&(0x7f0000000440)="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", 0x1000, 0x400}, {&(0x7f0000001440)="72db05a8b08ea5a1ddbd70634595daa9dd03ddc40c8a57e25a809d02cc8ff336d2a441b3d4c150cf18b3e6e726a30f3eb8dd810b586616b33693f65819edfa41a3441e0ceee5600b477865c69c62d408543315d648310de5973a11714c60ee62bb19817064294399dd67086b7db52953412008dd2b4b929b4a3f9703d0bc474bd60ea2d66212133b362c0ea451650ad6784fe52899550a5532effeee1822c0b558c832113ace7149be03831d57e424a0e41045a8aa2f3a804d81a3a1f8b1f4ab3e2ef89d5a6d42d2c4935d85", 0xcc}, {&(0x7f0000001540)="4ee02ee9dab6bf0dc8953bc91d38f1918d127f8c1beba0e86804e966d96c85b35880412fc94af7f4ed96464f448c03487464f38e53af3871823913519438f9b68e593e7c072590b5bb67699607819dea3cfdf7d6ea3864e95acc3884a04ad7474ec451be02fcb73b2d5f15f2f90be8ff858cc95f4665f3eabf174cff9991769b68912e0840e37e33c59d13c8b149c7c07335a9957a8f5311d4c48207cb2cbe57fa024e6b2cd145aaafdac5014dca0dc6c1701956e3626f81c11f2d6e035b88a4d383e5080ed643e6a988a712b0f292f6633221525b063a93ce9dd906ab41a30b78e4f10c552e195a2e02c7e7b249cf70e948b8e8d42a07eedf61c0f98faf80905dda551304a63c359d3eac70c71d377b33f5bde0af6dab0daf3902924a46dde8cf9e045dab91e81c61ec96cd5fe9e66cdbf95cd8cb41a3375539f0431e20083affe10ec3204f6dc42bac54b4e7f77978ac6ff1c37a5cde9815d1cdf095790d7dc842471c1474639579488d60cd711a60aab5cce7e40320b37a8f20a65d6d3157abbf96970d25b716f93fab197174971e4bf736d0e6fd53e2795a78bca6b4268ccdfe8c8cf0fa2c55de64b7b8da6f6e722bbc531e84dfb82dd153e903b92a4b191f2787cc8c7659c79aaf1a6e1247799592b9e3f050863b09830b5cb066e407683f954007ea9617abdf2e8b3bc1c4c2146fa2278ae9bd3784d8e42c1b29d351ad9c35db543314c20bbe9ca80cd09e5257f26fee914a31b4e187034882e817026014890013139e6b9926d2f9b7ea1378ef229d104e1bae140673451036b16f2e8e170a33dc254de5452f062e9c824d19a6946d23e087b4acf3c7b718e4c0d699c859da59cc793a69a62e509beb29870b9b9048ce6308b45ccc9963af67cc532572e0ebe59531dbf80e49c0df653260b5a5bc9f4eea474597394f0c9040516b2b26778a733ef576b20f49e3f1803d439e6289c4d477c454e4862216e85703b1b6bd377d7a551a3b1ae58de646e30fa22ad0a6e887ce32806018dfe7aeb3ff88e3e226c1c124d4ceba00a796d30ef92ea57b9de92abb963da8eb6f61365668801bbd16be0d535c2f67e75e9de679e5369a131eb58bbeb7a296832aeb0bac68594226dad878fc678d185d692e15f9747a0e669336dc5b194d313a36ffd8a4f98e1ef1d313aa667d340943083b2dc37f81e018d7d0f308072d3bc4a6f0ffbe4b03de7680ea812887c3e94a327327e001f852cdbe17bb0939254719df30e2e631076fdb3a94a57af4f0d0beb830300e50b3c0006b3cc3b0d7d5124d473a04fe863b9ab587ca626e39b50ac3e6a4c07838cbe3d796694dee9ad40ec8e016d486f94bc167a5d1e0e9eb28ea5dcfaf77b5c91d11617303645f583bee9575ad8ca35140f9d6903c8094f4e99759588a00202897a72fd95c91a72127b0345b1f537ac220ba727a2a751bb5c392874f271a11c6d6f2477a6adc9133145d393b48a19fa33150b93aa6811835106a3132455a1df4e1eed5dfbdc8c883a3969b68c6df7cdd7ce34dfbd43dc6f230f91169c13a9a69bca28e93fa9d9424b4b9e22734565796d12f7c4eb224261cca38fa614efcd05d9e5ad0e66e7bcc5a3ba4704e7bf510f804596757be2acea7a5be6decd9e8cdf9aaf692794be3c02808f74404c966e27d7f42d70b9f19e9fdbc1a425376d6874c9fe12f23aaabea22e6a8d17afe88814fd1933db2ef35c728037a3d187c01fd0e05e652b07434e89d48f584c07e164409ee90f24c5899953b504938555513bf0406e6b675de27c7da8b23e765e9cb528b53bd1eb94d9a871ed437fa174c9f90be618344364fa1396f994ab49d387f1dc27d942ac4f5bff7cd4efaea20812cb142cd01f6a2c174b39995294918e1f85aa6d7c41497a0e19c973da33d313cd4d9aa82f78136258fd4039b1c6973a017a21a8479b94da14efac48c9c18800dad3c8e30e44e32d971dbc9b24d63e56cfb6429a0c434a95e6be25972990e9f63746a8a066aec9d331a431cd9dff46cc47ee15b189bcaa523b160f5324cff7f328ce6635e9819a7ffa721163981c0335334228a2a166119a4d232ad0c31db44a2df8a79a29f52556df86eec6f1d5a6dfb6233057de020e655ee28d96e06adb4f18d66f7c9effc2f1009706a4d9e91735a5499fa9ebc6d81d74d617ce44e098b2662031e6f2b5387073b345b2d9c1810ebd398dc7fc8281516388d6259f7196415ee493bd4de082e28541832bbe37098ac257df13ca492332256689d30ef81d4190121f14d069d71294803c44871ff5d84b796fa64f472acac41449796226c918db1de790dccf4232a32820f21c5d76022ad516ddee91ff4b3f2a6ec33e480a8408aef461775a3f27127ee86f00d02d47fdf52e66e5465c0dbf90c7416ea49b5a75fe79dfea72fc543b7d515ae157334d68923b793dae6cccc26c4eb4f33e20f2f2391c0e4fbfdd095702c6e527c7f563ab2d78fd309f6107f3ca014abdd093355c85cdefb0f596bc9151731d0b20b771bd30ae639a0fb9b48f9072c8490f10749e1a039dbcee0182dc1704725b6c90814a8b1d5b2acdd43bdcf6338d66ab59412e9e19ec2d1789c49ffd5d557deb8987a59f738cbc62b60c7be8f697cf439c6ab6c2984d8f219715ae930f4c017556b9f6c8d74af6cc0ea0bb066d8fb42894bfc1575f87da82bc14ee5b1dee14bc0a510aa735b0e3891e9e32100d0090be5598dd3ef1f6fd58ce168678c3c167cfc61a19a31c60b2b0d44d40ebe2b292e3f3fa9588ad4deef8b8b50affda7917f5de9cd4a7a6c17b7f4d0133d7b61b1c69581e11317539ce10cc03ea8ef7738b3194f0a944d318519a45b3c78ca9e08611ce2caa53ddef9bfa72a2ac35879f39f4aceb236247579c6b57d1d2a0b497dd0323d030137697e5348fb436a1040ae45c3453b6c6cca4f3de784ea5f6f7c7800fb6be79e22547404024b3c2cbcd35631d7b0f746ee5e7ee3b8ce8b71d843dc0492a925e151c027c7f53b693729dd070d67931a4567c8414673f1bebb661442c9a37ccda28bfca003f4c726400b93741352751e95f2f5c0a6bd42f9db480bd6fbafd59359e5473a1666ba3dfb54bcb47aa4927e0ac52bc30109ae37d104bc2c98511663c28b7fcda99d368dd8d3069d298bc4f64052eec9519c37cc944794c9fe10eb9aacc387380bda1e03964c9d278827b72f3380f63dbbd5c0b2e495235bb95b59daf9db64a7290c16832afebbac0b369bc21d8cac335f80822437386e643c55f12e99d4221ca88bf835f23fb95ef10408c726b9cb436420152107555f749055f369cd2d51c54c0e7cf517cec2f9f756351ebf2ef55e6b148187dc4067b160652c795424ea6ed84f82e4a2a3a9f6e87cad7d30c78b6123633e347064ae6df914b175ba7e4296215fa0b22f038bcb0bd1b7247f773da97e47b1978a79e2fd2aa8655e0033b4c739420741cfb19fe98e942a2f8a91b10e65772d79cc64d1b0ed4050fea88f9d1edc72649867c5c4d48203f083f1373beb8d94a9e6f3b0cf48277587da6c38d097f512ea1d7d7329df89a321950e08d2c0caf5bd40036656a80ce1b48a1e52efcbc99c3e273f21aba0581bfdf30bc0e690b46ee025415628e9eb4adff34cf26a9cbeead03222dfcaeec225223ba805ecd911789f36b154f07ff472e61bde7a55ac50245ebd117e8e128ee05f88b6feb26a69a84af4c0b6d62315da21db5c9e27b405963f45e0563307fb2f17639dc99eb023556cacefec217928257faeb59945dfaa1ea6a844b112f3313e501de184cd807ea6490022ab7c8bc677b95546d3ec42acc983dd535ecf13d5da9fac4d5eb1987f08ce791a138ea47b38b90b814bb97803a0e065a2aa6bde18815a956571d0e492ce3120fe7c088d77fed0920eeed73fe055bae9f28725e39b9c931dcc61f97654370cc5658849248f5f367b7b5542e8268432b995bf1ad04d9e60bf4f4a16f1d578d3102bfb4e43f16e7ebf7f8a8d902deafbb8f848f45175b0411f463bbbbb38f6b76579b6a8c8ffadc0ceff303ef8b4307b35834e7b79a7aba1199cd4b7118210d7435234d9476ee8ba59641ba6dc767f2b75f37b62e25ab09d3e6709d1863588ba767e4fba705ced5db038c0e6463c1c8a5feba84a127d30eca66880dda9ffbf40adfda426a34825a81d4a324a1a8ffb9b61cfe5a474e2fc9679843b3157572d51601dbb0f30780154f3d137cd8ae702ec701cc30a762028b6e9d20caddddc42d551ca501864f3caf61514a808f143328160238947145f2e234f0a4c98558692ec4463d4854f8b01fa9350802833b95c78dc770471d7b9b98ec10d2d63a85f54fdff1d667008119d9d094eed69f36339103bd5efd0d047e1f270f6bb761b24d6d0ee69c8911bc6fd8aad5816d2b1ce221335d8a296326c2043ced6d1f008ed72707f9cd9f7885a5c36c06c8ba081aec0371664fed531626bdbc6194bab5a4a57a46dcb1b654e2c39a4ea30d1a5907106badc55483e7c967f2805b5249af8bfdc523bb3db283e84634ccb20be2d2dce5d7d512b8cb7b484a8ad5e1cfd9cb4c2d9f05c17a609ba4f03d7f317abf037ed967332b651c20a5f8f65f2bd6fe8f0df53aedb5c3d3c329ca0d76b8318eb57fb82ea1a03dd4349a344e7d79ae22986978d33a30b9f150e8b19846923f68e441f096f40a233e75a292bad47f20219a83b87d593ef05a9ed1072c50f0cc6a5674840ba9fa9894588896c32037a1ed2fbc194590eb7de7d47ce1774005ecefa5670dfc0c3768eab2cb75a1a560f518c27e8dbe879bd22c72592a29bbf2419b9178d1f2c063eb6aa4426bb1b860b837d75f982d06311b241c6a0e12b5b51a7dbd94545109db5c06cdbfe6e59ea25ec8ddd86296b3393fe103d2a574e2835f31c4e283b11d6892f55d0ea267ce8a0d8cfaf3ea5a0d08605d3259c3e011279c2d91334ed4ee3d87988636aec423efce93226bfa80df18271c21ef7bc3f9eb2a4b6240d6ab39a84a750ba63894640ec60c2eb173c2fe8be29818c6f4b61320ae4fcb88233ee0289b014f70a229208a5544ee57271698dfcb2635f5c7e1f7f7fbf8c00aa28f7f256f97cc915c65c981cb9a481a91e9284f0c1ee3852808147ab8310152e42f57c98fff2dc76f1677e4df62480e85d232397fbdd372eb2ee6ad73785458361b75f7e2ff980df2164a8ec88c1196b8b1f4a6caebebce1c4c569747476e0ae09bda652e28289a792512216c7c2ffaf1533796646db32d8881bb201f89e5c009a5e44d629317c5d6d2525f926fc09c199baadb080b7b02c21e7e97440597d7075bb05ce5b36369178051b5d251d236bd95b1afe3dc8b49c0ed77310a179a42c79856239c0ee589e20c1f5c24c9c75005fa56776ade6d51daf5467fe198e9048948e5b7476de05341daa7e30a798be91738f05a8926a63fae215aab4968b3c7ce5a320dfbebdc2eec170ddee67b06c545904542f922c1869ed31dfb00811a00494389562330b917c3a571b29d40aa7a261e6011cad0d7ef6fb5b8a75db3a438a589ec6567e550763dcfae16df0e0c0cc58f4a665271c09f3a531706f91ef0a59262ac8d3b137482814c73f884670387508187585cf2a51a01c93b0f0101e32de70d8a9071173938df2df2a048e208637e9141c669e4fc31ff92c493eb33d8929ee9ff9645ac5de6b47a7f26cf1b6530041d9cdb71021d717bcd456c239fe62697b7610da6b18c622f6f9fd5f9e7f00cd98ad18614afd18b0ec48f7e9df9bc5b112362f96cb7dd0fb9a98f440cec8cc35e8", 0x1000, 0x8}, {&(0x7f00000000c0)="352f23410abaccace056677f30f5d5503d201293e7bd4ae489d62592a1ddb47f2e602281a48bbdd607f488fb7f4c8fa1b02d1e4072f329dc347df7bfe3c07addde6d6200", 0x44, 0x3}, {&(0x7f00000001c0)="b231a418a0880301dec3c1acb4f4e69a79badeb185825b79a1f9f18be9c44a4ba0e1f132d04f3d4d2a13139928ebab1b8ac2ea89c8a95b73c2985c9e7a6b84b17477aca042079ae0a614910790029370a5e549a1467b5db66289d4a3e8ee48924b601f2fe483a218d2ffcda9144838", 0x6f, 0x3}, {&(0x7f0000002540)="b11b67e3d2655cbde82baf3a99c96969dfeb1e8439ae789df4dc57b69ef14f3ea8fbf5fdfb809b2bdd844193c75b86d5", 0x30, 0xfffffffeffffffff}, {&(0x7f0000002580)="b04e7baaf2e3830c35994b3942f0ed3370987e2df449518c485e2e25a507fb55a547e592e427b031b40d8be9c469ec10e580fa7bd54023236f1e1a8c1d7c6f6a36e1546a3ff5182c37ce033bbd6a90f26d9ee8f497875d9e0999e31eff6a970c011d949ffab633b8976a003d925814c659367ccc73f66049e0516645e5ed187adeccf95b20022fee553cb4182e61810d4e955467c41fc58448cc40ff00606ca15e82f5a29b9e9210bce1581b602ec9eaeefaecac7d405ccaa7434aa1fcdd95aeba686a12d416f411aac10a26cf3f110bbdde6b3fbb6a703a62d71b486d75326dfbd98b39e5fd", 0xe6}, {&(0x7f0000002680)="fceecb492be32e69ac8915843269af4843229156e755b21f4ff55a6f134bfe652441752ce7f199d5f0fdebed4b7a1bbda543926f96e9c8a013c647c197a11c18d6c0bd0d0888de", 0x47, 0x2}], 0x1000008, &(0x7f0000002800)={[{@session={'session', 0x3d, 0x1b}}, {@cruft='cruft'}], [{@measure='measure'}, {@seclabel='seclabel'}, {@fsmagic={'fsmagic', 0x3d, 0x8}}, {@appraise='appraise'}, {@hash='hash'}]}) mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000002880)='/proc/meminfo\x00', 0x0, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x30, r2, 0x23f, 0x0, 0x0, {{}, {0x0, 0x410c, 0xf0}, {0x14, 0x14, 'broadcast-link\x00'}}}, 0x30}, 0x1, 0xfffffff0}, 0x0) sendmsg$TIPC_CMD_SHOW_LINK_STATS(r0, &(0x7f0000002980)={&(0x7f00000028c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000002940)={&(0x7f0000002900)={0x30, r2, 0x100, 0x70bd28, 0x25dfdbfe, {{}, {}, {0x14, 0x14, 'broadcast-link\x00'}}, ["", "", "", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x4000000}, 0x40005) 04:30:51 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)=ANY=[@ANYBLOB="3a41968fa2bfa5a83bcc02f1ca8ea6c49531cc69a20bdcd65cf6"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, 0x0, &(0x7f00000001c0)) socket(0x0, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000200)={0x0, 'veth1_macvtap\x00'}) 04:30:52 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x8cffffff00000000, 0x0) [ 354.859811][T14708] kAFS: unparsable volume name [ 354.895184][T14708] kAFS: unparsable volume name 04:30:52 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket(0x10, 0x3, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$inet_udp(0x2, 0x2, 0x0) close(r5) sendto$llc(0xffffffffffffffff, &(0x7f0000000140)="7653bbc6175a3d2b8b43d6fab096eaaa30", 0x11, 0x0, 0x0, 0x0) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88882, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0x2}) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @loopback}}) write$binfmt_misc(r4, 0x0, 0x1000000c8) splice(r3, 0x0, r5, 0x0, 0x18102, 0x0) 04:30:52 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) socket$inet(0x2, 0x5, 0x0) mount(&(0x7f0000000080)=ANY=[@ANYBLOB="2386e73a1aad1f00801bc0bd7c9f9696c7c38be6a79725"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x4800, 0x0) 04:30:52 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, 0x0, &(0x7f00000001c0)) socket(0x0, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000200)={0x0, 'veth1_macvtap\x00'}) 04:30:52 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0xf6ffffff00000000, 0x0) 04:30:52 executing program 3: r0 = memfd_create(&(0x7f0000001780)='\xd8\x05V\x15\xa5e\xf1\xb8\xf6\xa2\xba\x85\xb95\x03<\xb9;\xcd\x86\x8bD\xf9\xe9L\xe1Q\xfc\xe2\x97\xa0\xe8s\xb2\x11\xef\x1ac\xc9\x89\xc7\x0fv1\xa1:h\xf6\xf5\a\x8c\xf0Ay\x03\x97\xe77\xc1\xc8\xa6\xcb\xd2\xbe\xe9\xd2\xfb{u\xc3\xcd\xba\xa8G`9\xb5\x82\xa9p\xc8)\xe5$b\v\x8e\b\xf4\xf0\x11\xb4\xcb\"\xf4\xf3\xb4|\xdf\xa3\xdd\x9c\x8a\xf4D\xd3\xea\x11c}\x86H\xca=;i\x96\x183h\xba\x1a\x10', 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000380)='/dev/nullb0\x00', 0x0, 0x0) io_setup(0x1, &(0x7f00000004c0)=0x0) io_submit(r4, 0x8, &(0x7f00000000c0)=[&(0x7f0000000140)={0x3a004008, 0x2759, 0x10, 0x0, 0x0, r3, &(0x7f0000000000)="98", 0x3e80000000, 0x0, 0x0, 0x2}]) [ 355.747872][T14736] kAFS: unable to lookup cell '†ç' [ 355.796360][T14743] kAFS: unable to lookup cell '†ç' 04:30:53 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x800000, 0x0, 0x20, 0x0, 0x7fff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) fsconfig$FSCONFIG_SET_FLAG(r0, 0x6, &(0x7f00000000c0)='posixacl\x00', 0x0, 0x0) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f0000000000)={0x0, 0x0, 0x3}) ioctl$DRM_IOCTL_GEM_CLOSE(r0, 0x40086409, &(0x7f0000000080)={r1}) mount(&(0x7f0000000100)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x1020008, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, 0x0, &(0x7f00000001c0)) socket(0x0, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000200)={0x0, 'veth1_macvtap\x00'}) 04:30:53 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0xf9fdffff00000000, 0x0) 04:30:53 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) fsconfig$FSCONFIG_SET_FLAG(r0, 0x6, &(0x7f00000000c0)='posixacl\x00', 0x0, 0x0) ioctl$CAPI_INSTALLED(r0, 0x80024322) mlock2(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x1) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) fsconfig$FSCONFIG_SET_FLAG(r1, 0x6, &(0x7f00000000c0)='posixacl\x00', 0x0, 0x0) ioctl$CHAR_RAW_GETSIZE64(r1, 0x80081272, &(0x7f0000000040)) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000000)='jffs2\x00', 0x0, 0x0) getpgrp(0xffffffffffffffff) 04:30:53 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0xff00000000000000, 0x0) 04:30:53 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, 0x0, &(0x7f00000001c0)) socket(0x0, 0x0, 0x0) socket(0x1e, 0x80002, 0x6) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000200)={0x0, 'veth1_macvtap\x00'}) 04:30:53 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) mount(&(0x7f0000000000)=ANY=[@ANYBLOB="85071b65ffd5cc6b700bb3070c0563276da17407a1ad6811c1a8b160687fd4a6cbac27d9a8f7c07ee9e9aa437a54e3"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) 04:30:53 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0xfffffffffffff000, 0x0) [ 356.323105][T14767] kAFS: unparsable volume name 04:30:53 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket(0x10, 0x3, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$inet_udp(0x2, 0x2, 0x0) close(r5) sendto$llc(0xffffffffffffffff, &(0x7f0000000140)="7653bbc6175a3d2b8b43d6fab096eaaa30", 0x11, 0x0, 0x0, 0x0) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88882, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0x2}) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @loopback}}) write$binfmt_misc(r4, 0x0, 0x1000000c8) splice(r3, 0x0, r5, 0x0, 0x18102, 0x0) 04:30:53 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) fsconfig$FSCONFIG_SET_FLAG(r0, 0x6, &(0x7f00000000c0)='posixacl\x00', 0x0, 0x0) ioctl$SOUND_OLD_MIXER_INFO(r0, 0x80304d65, &(0x7f0000000000)) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) 04:30:53 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="33e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, 0x0, &(0x7f00000001c0)) socket(0x0, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000200)={0x0, 'veth1_macvtap\x00'}) r1 = socket(0x2c, 0x6, 0x9) setsockopt$inet6_IPV6_RTHDRDSTOPTS(r1, 0x29, 0x37, &(0x7f0000000000)={0x3c, 0x4, [], [@calipso={0x7, 0x18, {0x3, 0x4, 0x20, 0x80, [0x7, 0x1000000000000000]}}, @ra={0x5, 0x2, 0x4}, @pad1, @pad1]}, 0x30) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) fsconfig$FSCONFIG_SET_FLAG(r2, 0x6, &(0x7f00000000c0)='posixacl\x00', 0x0, 0x0) ioctl$CHAR_RAW_ZEROOUT(r2, 0x127f, &(0x7f0000000100)={0x7, 0x3}) r3 = getpid() tkill(r3, 0x2f) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x19, 0x6f, 0x7f, 0x7, 0x0, 0x5, 0x40, 0x4, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6, 0x4, @perf_config_ext={0x1, 0x2}, 0x4204, 0x100000000, 0x4, 0x8, 0x5, 0x7f, 0x4}, r3, 0xe, r0, 0x2) 04:30:53 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x1, 0x0) r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=@newqdisc={0x138, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_gred={{0x9, 0x1, 'gred\x00'}, {0x108, 0x2, [@TCA_GRED_STAB={0x104, 0x2, "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"}]}}]}, 0x138}}, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r3 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r3, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=@newqdisc={0x138, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_gred={{0x9, 0x1, 'gred\x00'}, {0x108, 0x2, [@TCA_GRED_STAB={0x104, 0x2, "e8652700f479df1c5c88dcdfc38f1eaefda68919704f152d6d96d18f73cb0f24d682a44a3fce667f08c07c113fc18f9b4ec0a810da3ac3c701a305b4d250029bd3ed2882faedc0a9e55a8ba57219747cf9a1f2aaa8b24871db98fbf5acbc7803c45b5f8c186acaa45a08aa7c91e5ffcf71a6512c148bfdefb6489a776f47eae4ca650c27c95af89ae778383ab2d07ea557a28da99597acd5cff23d4dc5131a3dc34e791abe1c4d501a6a90da03a1fc0fd22af26bd28c18b993596826966d514941969b7e6324fd0193ab6bec12ffb23b9da438a108392379c39b0e3327db205ce4f8d75be51e6b81b9fa8466a37bd41c5ffd8c1c4950becc763d7ee6c757aa8c"}]}}]}, 0x138}}, 0x0) r4 = socket(0x11, 0x800000003, 0x0) bind(r4, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r4, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=@newqdisc={0x138, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r5, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_gred={{0x9, 0x1, 'gred\x00'}, {0x108, 0x2, [@TCA_GRED_STAB={0x104, 0x2, "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"}]}}]}, 0x138}}, 0x0) r6 = socket(0x11, 0x800000003, 0x0) bind(r6, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r6, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r8 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r8, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=@newqdisc={0x138, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r7, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_gred={{0x9, 0x1, 'gred\x00'}, {0x108, 0x2, [@TCA_GRED_STAB={0x104, 0x2, "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"}]}}]}, 0x138}}, 0x0) sendmsg$ETHTOOL_MSG_EEE_GET(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000280)={0xcc, 0x0, 0x800, 0x70bd26, 0x25dfdbfc, {}, [@HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0x38, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0x58, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bond0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'erspan0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}]}, @HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r7}]}]}, 0xcc}, 0x1, 0x0, 0x0, 0x20000010}, 0x8000) 04:30:53 executing program 3: r0 = memfd_create(&(0x7f0000001780)='\xd8\x05V\x15\xa5e\xf1\xb8\xf6\xa2\xba\x85\xb95\x03<\xb9;\xcd\x86\x8bD\xf9\xe9L\xe1Q\xfc\xe2\x97\xa0\xe8s\xb2\x11\xef\x1ac\xc9\x89\xc7\x0fv1\xa1:h\xf6\xf5\a\x8c\xf0Ay\x03\x97\xe77\xc1\xc8\xa6\xcb\xd2\xbe\xe9\xd2\xfb{u\xc3\xcd\xba\xa8G`9\xb5\x82\xa9p\xc8)\xe5$b\v\x8e\b\xf4\xf0\x11\xb4\xcb\"\xf4\xf3\xb4|\xdf\xa3\xdd\x9c\x8a\xf4D\xd3\xea\x11c}\x86H\xca=;i\x96\x183h\xba\x1a\x10', 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000380)='/dev/nullb0\x00', 0x0, 0x0) io_setup(0x1, &(0x7f00000004c0)=0x0) io_submit(r4, 0x8, &(0x7f00000000c0)=[&(0x7f0000000140)={0x3a004009, 0x2759, 0x10, 0x0, 0x0, r3, &(0x7f0000000000)="98", 0x3e80000000, 0x0, 0x0, 0x2}]) 04:30:54 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000000)='batadv\x00') sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000014c0)=ANY=[@ANYBLOB="140000003622541e3a2516423decf9dbddf4a41fafa7ffc2b17c828876b89e4caf81a7746d980c30c30f1f08c25fa37336f77be8786431523f2f4f4bc0a7021144e244aed7987d76bc9079211ba9d2d63d9e7ebc2c3a19fd3c7ede9fa8ce5dcfa9cc1916005dadbb530ba01166f82b5af7498fe751e25cc571cd0b80192930ceae123a19c7c92c87ff6c4854d8cf1895480aadf924de865c960b", @ANYRES16=r1, @ANYBLOB="010300000000000000000a000000"], 0x14}}, 0x0) mount(&(0x7f00000000c0)=ANY=[@ANYRES32=0x0, @ANYRESOCT=r1], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000080)='./file0\x00', 0x40, 0x4, &(0x7f0000001340)=[{&(0x7f0000000280)="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", 0x1000, 0x2}, {&(0x7f0000001280)="4333871f829c22c392e82c74507f174ac42fe3295700cf382612da608a51c07892540474f5eedddc33cadaa156d58594199da14f1adc43221c5d4e7d6dab5b0489fbbf6871b4e0129e20dbf9d5f9901c6f663ce52a3b6470de649d2846482fc7369c385f6e61d0d1dfea6f44bf950eb94bb292dca256f41e4e441322a5772afdafcbce2d7fbfb660735b8930a9159d70055212be8ad7d200b4727356a71b13506a67c2c3e7b1cea7503f172f6d992039df8ea1c55aa591da9dcdff", 0xbb, 0x3}, {&(0x7f00000000c0), 0x0, 0x6}, {&(0x7f00000001c0)="fa431c9247ba701bc90a90baeb6eee4c0eca3839e745140a2025c3b32aba6f1963cafb4cb8f61ab2d2218471c1548dd48d43648d97d0fe49b5a15c7bd5eb836d3530e832b500d10439dc14effab772b715c5348f5ea51f89739a417a4ec5039c", 0x60, 0xfd}], 0x8, &(0x7f00000013c0)={[{@noacl='noacl'}, {@acl='acl'}, {@noacl='noacl'}, {@fault_injection={'fault_injection', 0x3d, 0xba}}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'afs\x00'}}, {@fscontext={'fscontext', 0x3d, 'root'}}]}) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) fsconfig$FSCONFIG_SET_FLAG(r2, 0x6, &(0x7f00000000c0)='posixacl\x00', 0x0, 0x0) r3 = openat(r2, &(0x7f0000000240)='./file0\x00', 0x2, 0x38) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) fsconfig$FSCONFIG_SET_FLAG(r4, 0x6, &(0x7f00000000c0)='posixacl\x00', 0x0, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(r4, 0xc0206434, &(0x7f0000001440)={0x4, 0x0, 0x2, 0x3}) r6 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) fsconfig$FSCONFIG_SET_FLAG(r6, 0x6, &(0x7f00000000c0)='posixacl\x00', 0x0, 0x0) write$UHID_DESTROY(r6, &(0x7f00000015c0), 0x4) write$P9_RLOPEN(r2, &(0x7f0000001580)={0x18, 0xd, 0x1, {{0x40, 0x0, 0x1}, 0x4}}, 0x18) ioctl$DRM_IOCTL_AGP_FREE(r3, 0x40206435, &(0x7f0000001480)={0x8, r5, 0x1}) setsockopt$PNPIPE_INITSTATE(r3, 0x113, 0x4, &(0x7f0000000100)=0x1, 0x4) [ 356.756287][T14785] kAFS: unparsable volume name 04:30:54 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) fsconfig$FSCONFIG_SET_FLAG(r0, 0x6, &(0x7f00000000c0)='posixacl\x00', 0x0, 0x0) statx(r0, &(0x7f0000000000)='./file0\x00', 0x6000, 0x4, &(0x7f0000000280)) prctl$PR_CAP_AMBIENT(0x2f, 0xf13e38c85c107bc1, 0x25) 04:30:54 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, 0x0, &(0x7f00000001c0)) rename(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00') socket(0x0, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000200)={0x0, 'veth1_macvtap\x00'}) [ 356.910990][T14798] afs: Bad value for 'source' [ 356.958549][T14798] erofs: Unknown parameter 'fault_injection' [ 357.069916][T14806] afs: Bad value for 'source' 04:30:54 executing program 1: mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e936a1"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) 04:30:54 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="1bcc0397"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) 04:30:54 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) fsconfig$FSCONFIG_SET_FLAG(r0, 0x6, &(0x7f00000000c0)='posixacl\x00', 0x0, 0x0) ioctl$VIDIOC_S_EDID(r0, 0xc0285629, &(0x7f0000000100)={0x0, 0xffff, 0x1, [], &(0x7f0000000080)=0x20}) r1 = perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) fsconfig$FSCONFIG_SET_FLAG(r2, 0x6, &(0x7f00000000c0)='posixacl\x00', 0x0, 0x0) ioctl$GIO_FONTX(r2, 0x4b6b, &(0x7f0000000000)={0x12c, 0x200, &(0x7f0000000280)}) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$batadv(&(0x7f0000000000)='batadv\x00') sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r3, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)={0x14, r4, 0x301, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) mount(&(0x7f0000000680)=ANY=[@ANYBLOB="23e9e73a", @ANYRESDEC=r3, @ANYRESOCT, @ANYRES32=r1, @ANYRES32=r1], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) ioctl$DRM_IOCTL_MODE_GETENCODER(r0, 0xc01464a6, &(0x7f0000000240)={0x2}) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, 0x0, &(0x7f00000001c0)) socket(0x0, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000200)={0x0, 'veth1_macvtap\x00'}) 04:30:54 executing program 1: prctl$PR_GET_DUMPABLE(0x3) mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x10) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) [ 357.481764][T14826] kAFS: unparsable volume name 04:30:55 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket(0x10, 0x3, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$inet_udp(0x2, 0x2, 0x0) close(r5) sendto$llc(0xffffffffffffffff, &(0x7f0000000140)="7653bbc6175a3d2b8b43d6fab096eaaa30", 0x11, 0x0, 0x0, 0x0) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88882, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0x2}) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @loopback}}) write$binfmt_misc(r4, 0x0, 0x1000000c8) splice(r3, 0x0, r5, 0x0, 0x18102, 0x0) 04:30:55 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000000)='batadv\x00') sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)={0x14, r1, 0x301, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) ioctl$SIOCGSTAMP(r0, 0x8906, &(0x7f0000000000)) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) 04:30:55 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, 0x0, &(0x7f00000001c0)) socket(0x0, 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) fsconfig$FSCONFIG_SET_FLAG(r0, 0x6, &(0x7f00000000c0)='posixacl\x00', 0x0, 0x0) ioctl$KDDELIO(r0, 0x4b35, 0x0) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000200)={0x0, 'veth1_macvtap\x00'}) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r2, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x8, 0x4, &(0x7f0000000500)=[{&(0x7f0000000280)="58d9fdc061c1d0d733613e0e9a9a838844b288ed3087484f98646b7ad9af0c67db599cf7147653a5f4ca71c516a2a6e4d42855435a12f544cc2e098e769024863137afaef4e6bfa91cf7e49f3d04ae0de3aa49831be404a430cc9aa0c189c23b0c142350ea1dd943238c78588b9eba1e3aa102b8c15f73ff2040576d5861a018eb42b8b114d9f8666da0", 0x8a, 0xce9a}, {&(0x7f0000000340)="021477f413d2f8c7484b3fb6e0d1cfda9f8f78d65c14cc8ad58059eef990ba0ff72b6ee9769b87f2582e339c7f668e819cf399a823a549c6975f03f2d6d7fae260ff2b809b9cfc3bf335e84caeb479ef6ab2705700b53fe3d51d063b8a72727f6fa18bc48c98c5c5e6b352cc52673903e70d6dbfb9f5e569917780f7ddbe12071f0e1e", 0x83, 0x7}, {&(0x7f00000000c0)="b27cbaf0e5dbd23b281d7a417f", 0xd, 0x6}, {&(0x7f0000000400)="844bcf0097314d9b2f92dfafba089916b4286dd3f08b8087bab4871b671f7a35d304b7b775fb3f6545ba6213ff8b2389c0b419b00222b5148a011f9f569147caf0f29e6c346890e6a6f1553e4ec497c74a9764a74511b8f1e996fef0b13e17352b15bcbe8711ca776666d704c029031accbbb90911e589f8ec5a19dc54030dd3147279ca143801368338bbd0d8f2a7d45926d87fc792face0bd92980b3094e4e6b0c2f9b13afada6cf61006dbf06fccdf769eb4b3c92d80b4113b53d5a8584c5f8cb32bebde94a1616d610c2894ff24bf85ed0ca20f90c06b391e442141cd688f2bb9adc064664e0f305c6927d2dde9c35860cd3", 0xf4, 0x4}], 0x40000, &(0x7f0000000580)={[{@norecovery='norecovery'}, {@nobarrier='nobarrier'}, {@resuid={'resuid', 0x3d, r2}}, {@nogrpid='nogrpid'}, {@auto_da_alloc_val={'auto_da_alloc', 0x3d, 0x3f}}], [{@fsmagic={'fsmagic', 0x3d, 0x100000001}}, {@dont_measure='dont_measure'}, {@dont_hash='dont_hash'}, {@hash='hash'}, {@fsuuid={'fsuuid', 0x3d, {[0x65, 0x36, 0x63, 0x36, 0x30, 0x61, 0x61, 0x62], 0x2d, [0x38, 0x38, 0x30, 0x37], 0x2d, [0x64, 0x63, 0x33, 0x65], 0x2d, [0x61, 0x35, 0x65, 0x33], 0x2d, [0x30, 0x37, 0x37, 0x65, 0x66, 0x66, 0x34, 0x63]}}}, {@obj_user={'obj_user', 0x3d, '$\\@]&'}}, {@fsname={'fsname'}}]}) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) fsconfig$FSCONFIG_SET_FLAG(r3, 0x6, &(0x7f00000000c0)='posixacl\x00', 0x0, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r3, 0x29, 0x2a, &(0x7f0000000680)={0x6, {{0xa, 0x4e21, 0x8, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x8}}}, 0x88) 04:30:55 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) fsconfig$FSCONFIG_SET_FLAG(r0, 0x6, &(0x7f00000000c0)='posixacl\x00', 0x0, 0x0) read$char_raw(r0, &(0x7f0000001400)={""/61895}, 0xf200) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="2300e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) 04:30:55 executing program 3: r0 = memfd_create(&(0x7f0000001780)='\xd8\x05V\x15\xa5e\xf1\xb8\xf6\xa2\xba\x85\xb95\x03<\xb9;\xcd\x86\x8bD\xf9\xe9L\xe1Q\xfc\xe2\x97\xa0\xe8s\xb2\x11\xef\x1ac\xc9\x89\xc7\x0fv1\xa1:h\xf6\xf5\a\x8c\xf0Ay\x03\x97\xe77\xc1\xc8\xa6\xcb\xd2\xbe\xe9\xd2\xfb{u\xc3\xcd\xba\xa8G`9\xb5\x82\xa9p\xc8)\xe5$b\v\x8e\b\xf4\xf0\x11\xb4\xcb\"\xf4\xf3\xb4|\xdf\xa3\xdd\x9c\x8a\xf4D\xd3\xea\x11c}\x86H\xca=;i\x96\x183h\xba\x1a\x10', 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000380)='/dev/nullb0\x00', 0x0, 0x0) io_setup(0x1, &(0x7f00000004c0)=0x0) io_submit(r4, 0x8, &(0x7f00000000c0)=[&(0x7f0000000140)={0x3a00400a, 0x2759, 0x10, 0x0, 0x0, r3, &(0x7f0000000000)="98", 0x3e80000000, 0x0, 0x0, 0x2}]) 04:30:55 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/nat_icmp_send\x00', 0x2, 0x0) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000080)={0xc000, 0x7, 0x7fff}) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) [ 358.002093][T14846] kAFS: unparsable volume name 04:30:55 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x0) mount(&(0x7f0000000200)=ANY=[@ANYRESDEC], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x820008, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x101002, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cpuacct.usage_percpu\x00', 0x0, 0x0) io_uring_register$IORING_UNREGISTER_FILES(r1, 0x3, 0x0, 0x0) syz_mount_image$minix(&(0x7f0000000080)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x8, 0x0, &(0x7f00000001c0), 0x1821482, 0x0) ioctl$KVM_SET_TSS_ADDR(r0, 0xae47, 0xd000) 04:30:55 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) fsconfig$FSCONFIG_SET_FLAG(r0, 0x6, &(0x7f00000000c0)='posixacl\x00', 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_STATUS_EXT64(r0, 0xc0984124, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) fsconfig$FSCONFIG_SET_FLAG(r1, 0x6, &(0x7f00000000c0)='posixacl\x00', 0x0, 0x0) ioctl$TIOCGPKT(r1, 0x80045438, &(0x7f0000000000)) 04:30:55 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="20c2e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000000)='batadv\x00') syz_open_dev$usbfs(&(0x7f0000000200)='/dev/bus/usb/00#/00#\x00', 0x78b, 0x40002) unlink(&(0x7f00000001c0)='./file0\x00') sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)={0x14, r1, 0x301, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) recvfrom(r0, &(0x7f0000000080)=""/186, 0xba, 0x4020, 0x0, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) fsconfig$FSCONFIG_SET_FLAG(r2, 0x6, &(0x7f00000000c0)='posixacl\x00', 0x0, 0x0) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000280)={r2}, 0x8) ioctl$TUNSETQUEUE(r3, 0x400454d9, &(0x7f00000002c0)={'veth0_virt_wifi\x00', 0x200}) 04:30:55 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) fsconfig$FSCONFIG_SET_FLAG(r0, 0x6, &(0x7f00000000c0)='posixacl\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x50818, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, r0, 0x0) mount(&(0x7f0000000000)=ANY=[@ANYBLOB="00080000110c3e74f62d"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, 0x0, &(0x7f00000001c0)) socket(0x0, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000200)={0x0, 'veth1_macvtap\x00'}) [ 358.353104][T14872] afs: Bad value for 'source' 04:30:55 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) mount(&(0x7f0000000340)=ANY=[@ANYBLOB="00000000d8936ae77d1801a28640a0aaf3acd9f8fdbc2f9ceb698af3728f2bd31dba89d2424648b91c2b280bbca15d97e4d5af94ca63963504196905e2bbb183e501374a187c9a8b929093863c62b60bd5237938ea3f1fd21d82f54c45b7719bc8ca7ad81f8f3626b2dabca475da5751dd9ad0c8df069168ac7912751d8b7c89310694613b2729e469e1ff3bc2fdc58b98ef6b201c96d39191dc5dda192c6db952274c08032e4c1247266f196ae73216f2037d55268a8461d1f88e58252bc2f13a5bfe21a189cc69493254cab0c418b939bcfac3e5"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) [ 358.420355][T14873] kAFS: unparsable volume name 04:30:55 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) fsconfig$FSCONFIG_SET_FLAG(r0, 0x6, &(0x7f00000000c0)='posixacl\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000140)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB='\x00\x00\x00\x00'], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) [ 358.530440][T14879] kAFS: unparsable volume name [ 358.543592][T14872] afs: Bad value for 'source' [ 358.644578][T14885] afs: Bad value for 'source' 04:30:56 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket(0x10, 0x3, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) sendto$llc(0xffffffffffffffff, &(0x7f0000000140)="7653bbc6175a3d2b8b43d6fab096eaaa30", 0x11, 0x0, 0x0, 0x0) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88882, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0x2}) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @loopback}}) write$binfmt_misc(r3, &(0x7f0000000140)=ANY=[], 0x1000000c8) splice(0xffffffffffffffff, 0x0, r4, 0x0, 0x18102, 0x0) 04:30:56 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) fsconfig$FSCONFIG_SET_FLAG(r0, 0x6, &(0x7f00000000c0)='posixacl\x00', 0x0, 0x0) getsockopt$netrom_NETROM_T1(r0, 0x103, 0x1, &(0x7f0000000000), &(0x7f0000000080)=0x4) 04:30:56 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) fsconfig$FSCONFIG_SET_FLAG(r0, 0x6, &(0x7f00000000c0)='posixacl\x00', 0x0, 0x0) fchmodat(r0, &(0x7f00000000c0)='./file0\x00', 0x10) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, 0x0, &(0x7f00000001c0)) socket(0x0, 0x0, 0x0) pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x0) ioctl$KVM_GET_MP_STATE(r1, 0x8004ae98, &(0x7f0000000080)) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000200)={0x0, 'veth1_macvtap\x00'}) 04:30:56 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000140)='batadv\x00') sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)={0x14, r1, 0x301, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) mount(&(0x7f0000000080)=ANY=[@ANYRES16=r0, @ANYRES16=r1], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x810020, 0x0) prctl$PR_SET_SPECULATION_CTRL(0x35, 0x0) 04:30:56 executing program 3: r0 = memfd_create(&(0x7f0000001780)='\xd8\x05V\x15\xa5e\xf1\xb8\xf6\xa2\xba\x85\xb95\x03<\xb9;\xcd\x86\x8bD\xf9\xe9L\xe1Q\xfc\xe2\x97\xa0\xe8s\xb2\x11\xef\x1ac\xc9\x89\xc7\x0fv1\xa1:h\xf6\xf5\a\x8c\xf0Ay\x03\x97\xe77\xc1\xc8\xa6\xcb\xd2\xbe\xe9\xd2\xfb{u\xc3\xcd\xba\xa8G`9\xb5\x82\xa9p\xc8)\xe5$b\v\x8e\b\xf4\xf0\x11\xb4\xcb\"\xf4\xf3\xb4|\xdf\xa3\xdd\x9c\x8a\xf4D\xd3\xea\x11c}\x86H\xca=;i\x96\x183h\xba\x1a\x10', 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000380)='/dev/nullb0\x00', 0x0, 0x0) io_setup(0x1, &(0x7f00000004c0)=0x0) io_submit(r4, 0x8, &(0x7f00000000c0)=[&(0x7f0000000140)={0x3a00400b, 0x2759, 0x10, 0x0, 0x0, r3, &(0x7f0000000000)="98", 0x3e80000000, 0x0, 0x0, 0x2}]) 04:30:56 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) 04:30:56 executing program 1: pipe(&(0x7f0000000000)={0xffffffffffffffff}) read$sequencer(r0, &(0x7f0000000280)=""/227, 0xe3) mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) mount(&(0x7f0000000080)=ANY=[@ANYBLOB="b6054ed492a474a96b76083362c3a4e38ea435d97f0aec3a7a716f56cf8597e719dd22c41ebd4de16ec66f"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) fsconfig$FSCONFIG_SET_FLAG(r1, 0x6, &(0x7f00000000c0)='posixacl\x00', 0x0, 0x0) ioctl$VIDIOC_S_MODULATOR(r1, 0x40445637, &(0x7f00000000c0)={0x6, "078e3afb99c0d3fe73d31efcd4d691c3ed23e5417eea8bc5c2a8f8782e08f9af", 0x20, 0x10dd, 0x1, 0x1, 0x3}) 04:30:56 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$usbfs(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x8, 0x100) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) fsconfig$FSCONFIG_SET_FLAG(r0, 0x6, &(0x7f00000000c0)='posixacl\x00', 0x0, 0x0) mmap$qrtrtun(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000a, 0x2010, r0, 0x7) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e95c32"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) 04:30:56 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x0, 0x0, 0x4000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x9) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='bdev\x00', 0xc0c2, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) fsconfig$FSCONFIG_SET_FLAG(r0, 0x6, &(0x7f00000000c0)='posixacl\x00', 0x0, 0x0) setsockopt$netrom_NETROM_T2(r0, 0x103, 0x2, &(0x7f0000000000)=0x7, 0x4) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, 0x0, &(0x7f00000001c0)) socket(0x0, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000200)={0x0, 'veth1_macvtap\x00'}) 04:30:56 executing program 4: openat$uhid(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uhid\x00', 0x2, 0x0) mount(&(0x7f00000000c0)=ANY=[@ANYBLOB="b57d1023e9e73ad3cf85ea17632576bc815222f556c125acbf8087cad1ff6d9e64390bfa5e2ff7662ca7e49a2a90dbbc17cdaa3f936fc2dfc6b65a41a55d3df6f2c79fc53c745f70ebc85c99baff5502bf3ed5a16f69dd83f949db2a73033a3360fa3a247ed89c8162e2d05e616fc7aad8f3c0d02e0655a59d76316957baaef8d96b006a63fd9708"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='afs\x00', 0x0, 0x0) [ 359.293256][T14919] kAFS: No cell specified [ 359.316551][T14922] kAFS: unparsable volume name [ 359.351282][T14925] kAFS: No cell specified 04:30:56 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) fsconfig$FSCONFIG_SET_FLAG(r0, 0x6, &(0x7f00000000c0)='posixacl\x00', 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) r2 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f0000000080)={r3, 0x82000000}, 0x10) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000000)={r3, 0x101}, &(0x7f0000000080)=0x8) mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) 04:30:56 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) [ 360.016356][T14922] kAFS: unparsable volume name 04:30:57 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket(0x10, 0x3, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) sendto$llc(0xffffffffffffffff, &(0x7f0000000140)="7653bbc6175a3d2b8b43d6fab096eaaa30", 0x11, 0x0, 0x0, 0x0) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88882, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0x2}) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @loopback}}) write$binfmt_misc(r3, &(0x7f0000000140)=ANY=[], 0x1000000c8) splice(0xffffffffffffffff, 0x0, r4, 0x0, 0x18102, 0x0) 04:30:57 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, 0x0, &(0x7f00000001c0)) socket(0x2c, 0x2, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) fsconfig$FSCONFIG_SET_FLAG(r0, 0x6, &(0x7f00000000c0)='posixacl\x00', 0x0, 0x0) getsockname$unix(r0, &(0x7f0000000300), &(0x7f0000000000)=0x6e) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000200)={0x0, 'veth1_macvtap\x00'}) 04:30:57 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) io_setup(0x3, &(0x7f0000000040)=0x0) io_submit(r1, 0x1, &(0x7f000049bfe8)=[&(0x7f00004dbfc0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0}]) mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) mount(&(0x7f00000003c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000540)='afs\x00', 0x2042, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) fsconfig$FSCONFIG_SET_FLAG(r2, 0x6, &(0x7f00000000c0)='posixacl\x00', 0x0, 0x0) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) fsconfig$FSCONFIG_SET_FLAG(r3, 0x6, &(0x7f00000000c0)='posixacl\x00', 0x0, 0x0) ioctl$SG_GET_SCSI_ID(r3, 0x2276, &(0x7f0000000080)) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) fsconfig$FSCONFIG_SET_FLAG(r4, 0x6, &(0x7f00000000c0)='posixacl\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r4, 0x84, 0x1f, &(0x7f00000002c0)={0x0, @in={{0x2, 0x4e22, @multicast2}}, 0x40, 0x5}, &(0x7f0000000380)=0x90) ioctl$TUNSETVNETLE(r2, 0x400454dc, &(0x7f0000000000)=0x1) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) fsconfig$FSCONFIG_SET_FLAG(r5, 0x6, &(0x7f00000000c0)='posixacl\x00', 0x0, 0x0) ioctl$UFFDIO_WAKE(r5, 0x8010aa02, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, 0x1000}) r6 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/qat_adf_ctl\x00', 0x8000, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r6, 0x408c5333, &(0x7f0000000200)={0x661, 0x5, 0x1, 'queue0\x00', 0x3ff}) 04:30:57 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vsock\x00', 0x2000, 0x0) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f00000001c0)) mount(&(0x7f0000000240)=ANY=[@ANYBLOB], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCDARP(r1, 0x8953, &(0x7f0000000240)={{0x2, 0x0, @private=0x5}, {0x0, @link_local}, 0x0, {0x2, 0x0, @dev}}) getsockopt$EBT_SO_GET_INFO(r1, 0x0, 0x80, &(0x7f0000000080)={'broute\x00'}, &(0x7f0000000000)=0x78) 04:30:57 executing program 3: r0 = memfd_create(&(0x7f0000001780)='\xd8\x05V\x15\xa5e\xf1\xb8\xf6\xa2\xba\x85\xb95\x03<\xb9;\xcd\x86\x8bD\xf9\xe9L\xe1Q\xfc\xe2\x97\xa0\xe8s\xb2\x11\xef\x1ac\xc9\x89\xc7\x0fv1\xa1:h\xf6\xf5\a\x8c\xf0Ay\x03\x97\xe77\xc1\xc8\xa6\xcb\xd2\xbe\xe9\xd2\xfb{u\xc3\xcd\xba\xa8G`9\xb5\x82\xa9p\xc8)\xe5$b\v\x8e\b\xf4\xf0\x11\xb4\xcb\"\xf4\xf3\xb4|\xdf\xa3\xdd\x9c\x8a\xf4D\xd3\xea\x11c}\x86H\xca=;i\x96\x183h\xba\x1a\x10', 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000380)='/dev/nullb0\x00', 0x0, 0x0) io_setup(0x1, &(0x7f00000004c0)=0x0) io_submit(r4, 0x8, &(0x7f00000000c0)=[&(0x7f0000000140)={0x3a00400c, 0x2759, 0x10, 0x0, 0x0, r3, &(0x7f0000000000)="98", 0x3e80000000, 0x0, 0x0, 0x2}]) 04:30:57 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000000)='batadv\x00') r2 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$batadv(&(0x7f0000000000)='batadv\x00') sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r2, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000200)={0x14, r1, 0x301, 0x0, 0x0, {0xa}}, 0x5f}}, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$batadv(&(0x7f0000000000)='batadv\x00') sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r3, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=ANY=[@ANYBLOB="14000000", @ANYRES16=r4, @ANYBLOB="010300800000000000000a001000"], 0x14}}, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$batadv(&(0x7f0000000000)='batadv\x00') sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r5, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)={0x14, r6, 0x301, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$batadv(&(0x7f0000000000)='batadv\x00') sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r7, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)=ANY=[@ANYBLOB="14000000", @ANYRES16=r8, @ANYBLOB="01130008004011008000000a0000007565c8f3c8288c9b"], 0x14}}, 0x0) poll(&(0x7f0000000080)=[{r0, 0x1200}, {r3, 0x40c0}, {r5, 0x2220}, {r7, 0x10}], 0x4, 0x6) r9 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) fsconfig$FSCONFIG_SET_FLAG(r9, 0x6, &(0x7f00000000c0)='posixacl\x00', 0x0, 0x0) ioctl$EVIOCSABS20(r9, 0x401845e0, &(0x7f0000000000)={0x7ff, 0x5, 0x0, 0x9, 0x5, 0x5}) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) [ 360.174517][T14951] QAT: Invalid ioctl [ 360.229576][T14958] QAT: Invalid ioctl [ 360.233882][T14954] Unknown ioctl 1074025692 [ 360.246002][ T7967] FS-Cache: Duplicate cookie detected [ 360.252520][ T7967] FS-Cache: O-cookie c=0000000094bc6783 [p=00000000a00f4ec0 fl=222 nc=0 na=1] [ 360.261452][ T7967] FS-Cache: O-cookie d=0000000000000000 n=0000000000000000 [ 360.268743][ T7967] FS-Cache: O-key=[2] 'e9e7' [ 360.273385][ T7967] FS-Cache: N-cookie c=00000000c0a8494c [p=00000000a00f4ec0 fl=2 nc=0 na=1] [ 360.282138][ T7967] FS-Cache: N-cookie d=0000000035364e0c n=000000009214617e [ 360.289433][ T7967] FS-Cache: N-key=[2] 'e9e7' [ 360.301814][T14960] afs: Bad value for 'source' 04:30:57 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x4001, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e18000"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, 0x0, &(0x7f00000001c0)) socket(0x0, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000200)={0x0, 'veth1_macvtap\x00'}) [ 360.341177][T14960] kAFS: unparsable volume name [ 360.359778][T14954] Unknown ioctl 1074025692 04:30:57 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000000)='afs\x00', 0x0, 0x0) 04:30:57 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)=ANY=[@ANYBLOB="3fb8c0578c42c936eb031578f95c843a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) 04:30:57 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x88200, 0x0) r0 = userfaultfd(0x800) ioctl$F2FS_IOC_WRITE_CHECKPOINT(r0, 0xf507, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) [ 360.587606][T14971] kAFS: No cell specified [ 360.634178][T14975] kAFS: unparsable volume name 04:30:57 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000000)='batadv\x00') sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)={0x14, r1, 0x301, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000280)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="3f02000000000000000035aa000007000000000000000000001462726f6164636173542d6c696e6b000005e512079dd1ad8e88f2c1aac98b96da170d3f76b213fb8c113335b2a08b4bcc1ee4933ebe7511708700"/94], 0x30}, 0x1, 0xfffffff0}, 0x0) sendmsg$TIPC_CMD_GET_LINKS(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x24, r3, 0x400, 0x70bd25, 0x25dfdbfe, {{}, {}, {0x8, 0x11, 0x10001}}, ["", "", "", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x4000}, 0x8000) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) [ 360.685038][T14980] kAFS: unparsable volume name [ 360.691969][T14979] kAFS: No cell specified 04:30:58 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, 0x0, &(0x7f00000001c0)) r1 = socket(0x0, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(r0, 0x404c534a, &(0x7f0000000080)={0x0, 0x7}) recvfrom$unix(r1, &(0x7f0000000280)=""/165, 0xa5, 0x60, &(0x7f0000000340)=@abs={0x1, 0x0, 0x4e24}, 0x6e) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000200)={0x0, 'veth1_macvtap\x00'}) 04:30:58 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket(0x10, 0x3, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) sendto$llc(0xffffffffffffffff, &(0x7f0000000140)="7653bbc6175a3d2b8b43d6fab096eaaa30", 0x11, 0x0, 0x0, 0x0) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88882, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0x2}) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @loopback}}) write$binfmt_misc(r3, &(0x7f0000000140)=ANY=[], 0x1000000c8) splice(0xffffffffffffffff, 0x0, r4, 0x0, 0x18102, 0x0) 04:30:58 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x482100, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000000000)='batadv\x00') sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r2, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000400)=ANY=[@ANYBLOB="14000000d66c6634fd6aa862b92176c06c73e601c1979ab62c637f7da705dfaa8d0ab0dc1a40ad0f13ad143aa98d7051588365de7936a52c40c5439eb206eb1b13ae6ddd69229ec1ccd0f3ca0c528927783a73fd53edbcebe7abf98866a661682d9d32ea9e5ef4afccd0e7715adbf1fd13f35ece6fd8fd0fa5330374a91bd9e8c58699d1b91dad19384810309d87ad67956d8cc43cf151d821333f9d8aefb32b9851e966b1349b2855652379304a0932f20fe870221956", @ANYRES16=r3, @ANYBLOB="010300000000000000000a000000"], 0x14}}, 0x0) ioctl$FICLONERANGE(r1, 0x4020940d, &(0x7f00000001c0)={{r2}, 0x8, 0x20, 0x407}) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$batadv(&(0x7f0000000000)='batadv\x00') sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r4, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)={0x14, r5, 0x301, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) r6 = socket(0x11, 0x800000003, 0x0) bind(r6, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r6, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r8 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r8, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=@newqdisc={0x138, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r7, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_gred={{0x9, 0x1, 'gred\x00'}, {0x108, 0x2, [@TCA_GRED_STAB={0x104, 0x2, "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"}]}}]}, 0x138}}, 0x0) sendmsg$BATADV_CMD_GET_VLAN(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000200), 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x54, r5, 0x400, 0x70bd2d, 0x25dfdbfb, {}, [@BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x6}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0x1}, @BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0xff}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0x4}, @BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r7}, @BATADV_ATTR_BONDING_ENABLED={0x5}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5, 0x37, 0x1}]}, 0x54}, 0x1, 0x0, 0x0, 0x8800}, 0x4004) fsconfig$FSCONFIG_SET_FLAG(r0, 0x6, &(0x7f00000000c0)='posixacl\x00', 0x0, 0x0) ioctl$VIDIOC_S_CROP(r0, 0x4014563c, &(0x7f0000000080)={0x2, {0xfff, 0x5, 0xc4a4}}) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x10201, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, r0, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="4fe9fe1d"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) 04:30:58 executing program 1: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) fsconfig$FSCONFIG_SET_FLAG(r0, 0x6, &(0x7f00000000c0)='posixacl\x00', 0x0, 0x0) r1 = openat2(r0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={0x280000, 0x0, 0x19}, 0x18) mkdirat(r1, &(0x7f0000000140)='./file0\x00', 0x81) mount(&(0x7f0000000000)=ANY=[@ANYBLOB="23eab3f46e62c5519f611a1c76dd9746e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) 04:30:58 executing program 3: r0 = memfd_create(&(0x7f0000001780)='\xd8\x05V\x15\xa5e\xf1\xb8\xf6\xa2\xba\x85\xb95\x03<\xb9;\xcd\x86\x8bD\xf9\xe9L\xe1Q\xfc\xe2\x97\xa0\xe8s\xb2\x11\xef\x1ac\xc9\x89\xc7\x0fv1\xa1:h\xf6\xf5\a\x8c\xf0Ay\x03\x97\xe77\xc1\xc8\xa6\xcb\xd2\xbe\xe9\xd2\xfb{u\xc3\xcd\xba\xa8G`9\xb5\x82\xa9p\xc8)\xe5$b\v\x8e\b\xf4\xf0\x11\xb4\xcb\"\xf4\xf3\xb4|\xdf\xa3\xdd\x9c\x8a\xf4D\xd3\xea\x11c}\x86H\xca=;i\x96\x183h\xba\x1a\x10', 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000380)='/dev/nullb0\x00', 0x0, 0x0) io_setup(0x1, &(0x7f00000004c0)=0x0) io_submit(r4, 0x8, &(0x7f00000000c0)=[&(0x7f0000000140)={0x3a00400d, 0x2759, 0x10, 0x0, 0x0, r3, &(0x7f0000000000)="98", 0x3e80000000, 0x0, 0x0, 0x2}]) 04:30:58 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x0, 0x31, 0xffffffffffffffff, 0x0) times(&(0x7f0000000000)) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000000)='batadv\x00') sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={0x24, r1, 0x2, 0x0, 0x0, {0xa}, [@BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x80000000}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x1}]}, 0x24}, 0x1, 0x0, 0x0, 0x4000001}, 0x0) mount(&(0x7f0000000280)=ANY=[@ANYRESHEX=r1], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='cpuset\x00', 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, 0x0, &(0x7f00000001c0)) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) fsconfig$FSCONFIG_SET_FLAG(r2, 0x6, &(0x7f00000000c0)='posixacl\x00', 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r3) r4 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp_SCTP_RTOINFO(r3, 0x84, 0x0, &(0x7f0000000080)={r5, 0x82000000}, 0x10) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r2, 0x84, 0x6c, &(0x7f0000000080)=ANY=[@ANYRES32=r5, @ANYBLOB="480000009c4dd1def2d2abf02bef0bc7239cc690e076270134d1269ab4197b0ac4bef7b3dd1a67263a638281d6d3574d5f7b3d7d0ec592118a48aa282cb3406095fd4785e06cbf369842c302"], &(0x7f0000000000)=0x50) socket(0x0, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000200)={0x0, 'veth1_macvtap\x00'}) [ 361.676819][T15002] kAFS: unparsable volume name 04:30:58 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) fsconfig$FSCONFIG_SET_FLAG(r0, 0x6, &(0x7f00000000c0)='posixacl\x00', 0x0, 0x0) mq_notify(r0, &(0x7f00000001c0)={0x0, 0x12, 0x1, @thr={&(0x7f0000000000)="528fa40cfbec317cd0dccee7ea6690b95d7d22df4c84bf425b215f2b1d79023ab2", &(0x7f0000000080)="316c1a3ac00906894886dfacfb72387db42c19b3bf5fb4d063d9168013458c72708942b147f774ccc5d1ff8f65f17935389bbd926687cb620318ff2466c366b973ad9e246289e6a4b6c605f1090c460a085ec68f160078d3113cbb3fea7341b2efeba7a0c9790cb6aef0ad596982cbe676314e6acebd0dd30c1a208aa3192ea66fb47afa808705ac895b3ff1b99e6b9c377993d880d035"}}) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) [ 361.765241][T15002] kAFS: unparsable volume name 04:30:59 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="c69ad77948fb8be7abf826dac4589f272f026aa7f42a710239ece9c60899a3c1cc87ddd968248275ccab677f6b1e12196e9b90f822a0815ebc69fbecdca8b6c25bba6a996cd5567fe73775ee82a0d642c1b57b2377c4"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000000)='batadv\x00') sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)={0x14, r1, 0x301, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) fsconfig$FSCONFIG_SET_FLAG(r2, 0x6, &(0x7f00000000c0)='posixacl\x00', 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000300)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000002c0)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4, 0xfa00, {r3}}, 0xc) symlink(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)='./file0\x00') fcntl$setpipe(r0, 0x407, 0x3) openat$nvram(0xffffffffffffff9c, &(0x7f0000000380)='/dev/nvram\x00', 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, 0x0, &(0x7f00000001c0)) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) fsconfig$FSCONFIG_SET_FLAG(r4, 0x6, &(0x7f00000000c0)='posixacl\x00', 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r4, 0x40284504, &(0x7f0000000080)={0x7, 0x7, 0x0, 0x4, "48f2f125d809f6af82b799e5d2ace1a0fa10f5ccc4f03625c8dc5f89ce3ed2eb"}) socket(0x0, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000200)={0x0, 'veth1_macvtap\x00'}) 04:30:59 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) r0 = openat2$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)={0x408c41, 0x2, 0x4}, 0x18) fchmodat(r0, &(0x7f00000000c0)='./file0\x00', 0x1cc) perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x2, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f00000001c0)=ANY=[@ANYBLOB="09e9e726ba1ef4ef2a2e167f34da2f575967ea3ae05f750954d5aecaa441ec1871111e02de86f2d8f8b50aaccb729c96af967b28f3ceee927cfb2aaa8b346cf199ed04e0071dece468eec4a03196c6646c397d0584f418c71b3d6145183682162b66bd5ad2ad2b87"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) 04:30:59 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000000)='batadv\x00') sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=ANY=[@ANYBLOB="14000000", @ANYRES16=r1, @ANYBLOB="010310bb5d2b912c41ee0a000000"], 0x14}}, 0x0) r2 = signalfd(r0, &(0x7f0000000000)={[0x9]}, 0x8) ioctl$VIDIOC_S_EXT_CTRLS(r2, 0xc0205648, &(0x7f00000000c0)={0x0, 0xa, 0x1, 0xffffffffffffffff, 0x0, &(0x7f0000000080)={0x9909c9, 0x3, [], @value64=0x7}}) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) [ 362.017394][T15023] kAFS: unparsable volume name [ 362.060196][T15022] kAFS: unparsable volume name [ 362.086670][T15025] kAFS: unparsable volume name 04:30:59 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) fsconfig$FSCONFIG_SET_FLAG(r0, 0x6, &(0x7f00000000c0)='posixacl\x00', 0x0, 0x0) bind$unix(r0, &(0x7f0000000080)=@file={0x0, './file0\x00'}, 0x6e) [ 362.225482][T15023] kAFS: unparsable volume name 04:30:59 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x400000, 0x0) ioctl$DRM_IOCTL_MAP_BUFS(r0, 0xc0186419, &(0x7f0000000640)={0x6, &(0x7f0000000080)=""/166, &(0x7f0000000580)=[{0x2, 0xb7, 0x2, &(0x7f0000000280)=""/183}, {0x0, 0x6d, 0x7, &(0x7f00000001c0)=""/109}, {0x10000, 0x33, 0x2, &(0x7f0000000340)=""/51}, {0xfffeffff, 0x64, 0x8000, &(0x7f0000000380)=""/100}, {0x200, 0xe7, 0x7, &(0x7f0000000400)=""/231}, {0x58, 0x56, 0x9, &(0x7f0000000500)=""/86}]}) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) 04:30:59 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, 0x0, &(0x7f00000001c0)) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$F2FS_IOC_RESERVE_COMPRESS_BLOCKS(r0, 0x8008f513, &(0x7f0000000000)) socket(0x0, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000200)={0x0, 'veth1_macvtap\x00'}) 04:31:00 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket(0x10, 0x3, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$inet_udp(0x2, 0x2, 0x0) close(r5) sendto$llc(0xffffffffffffffff, &(0x7f0000000140)="7653bbc6175a3d2b8b43d6fab096eaaa30", 0x11, 0x0, 0x0, 0x0) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88882, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0x2}) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @loopback}}) write$binfmt_misc(r4, &(0x7f0000000140)=ANY=[], 0x1000000c8) splice(r3, 0x0, 0xffffffffffffffff, 0x0, 0x18102, 0x0) 04:31:00 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) fsconfig$FSCONFIG_SET_FLAG(r0, 0x6, &(0x7f00000000c0)='posixacl\x00', 0x0, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) fsconfig$FSCONFIG_SET_FLAG(r1, 0x6, &(0x7f00000000c0)='posixacl\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f0000000000)={0x0, 0x6f7ffbcc}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000280)={r2, 0xd3, "ec9d05935774f7be2ff0929e6c87baf623ed3a8414bc38d9dce737f14d634c5081df7f00dfd21c24c1edd4b4b01b676442b9d8ec46b6349eefc99953c8bb94142b4960db269f4838c84e9f03417fab4978bb3c24760aab2c8da5d91d08a762af5be5d7758918991bfd98569e72db1f4b18f43de42a5f85b10c70be760f6798c979a7216d5eca5bfac928d92823af69739098eae8cb8263e5ff3d450f82ae33ef952f27ec089e3af2e1e10f302f53e31a9ebf722e39da7752035222e88e0dc0b5eee7ad713517a3cfddafc7936df492d2415353"}, &(0x7f00000000c0)=0xdb) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) 04:31:00 executing program 3: r0 = memfd_create(&(0x7f0000001780)='\xd8\x05V\x15\xa5e\xf1\xb8\xf6\xa2\xba\x85\xb95\x03<\xb9;\xcd\x86\x8bD\xf9\xe9L\xe1Q\xfc\xe2\x97\xa0\xe8s\xb2\x11\xef\x1ac\xc9\x89\xc7\x0fv1\xa1:h\xf6\xf5\a\x8c\xf0Ay\x03\x97\xe77\xc1\xc8\xa6\xcb\xd2\xbe\xe9\xd2\xfb{u\xc3\xcd\xba\xa8G`9\xb5\x82\xa9p\xc8)\xe5$b\v\x8e\b\xf4\xf0\x11\xb4\xcb\"\xf4\xf3\xb4|\xdf\xa3\xdd\x9c\x8a\xf4D\xd3\xea\x11c}\x86H\xca=;i\x96\x183h\xba\x1a\x10', 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000380)='/dev/nullb0\x00', 0x0, 0x0) io_setup(0x1, &(0x7f00000004c0)=0x0) io_submit(r4, 0x8, &(0x7f00000000c0)=[&(0x7f0000000140)={0x3a00400e, 0x2759, 0x10, 0x0, 0x0, r3, &(0x7f0000000000)="98", 0x3e80000000, 0x0, 0x0, 0x2}]) 04:31:00 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000000)='batadv\x00') sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)={0x14, r1, 0x301, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000000)={'lo\x00', &(0x7f0000000280)=@ethtool_drvinfo={0x3, "cab792e6992f738e18f82f5e48c8620d9c5a44314977e81419761fd5914e7649", "f3b5c65a7b0f3a26cfc601d46b9fb72a0511dbc14db52e6425890b190b52a64e", "c2b9045acecd6392368f63f8f3e2040664a5600979957bb53865ec5187d3e243", "e0fc736986eac97123eef7a1d7c843e02b7276cc87536d7b97113c9e1e151cf0", "d415be3c9e03dbea388346a1577f1b7638bba53635b5f0089d72b6518207013e", "720b99d2c7bfe68f3b6e38ad", 0x80000000, 0x9, 0x9, 0x401, 0x4}}) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) 04:31:00 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000000)='batadv\x00') sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)={0x14, r1, 0x301, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) r2 = getegid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = getpid() r5 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setresgid(0x0, r6, 0x0) sendmsg$unix(r3, &(0x7f0000001440)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=[@cred={{0x1c, 0x1, 0x2, {r4, 0x0, r6}}}], 0x20}, 0x0) r7 = getgid() newfstatat(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x6000) fsetxattr$system_posix_acl(r0, &(0x7f0000000080)='system.posix_acl_default\x00', &(0x7f00000003c0)={{}, {0x1, 0x2}, [{0x2, 0x1}, {0x2, 0x4}], {}, [{0x8, 0x7}, {0x8, 0x1}, {0x8, 0x5}, {}, {0x8, 0x7}, {0x8, 0x1}, {0x8, 0x1, r2}, {0x8, 0x4, r6}, {0x8, 0x1, r7}, {0x8, 0x6, r8}], {}, {0x20, 0x2}}, 0x84, 0x2) mount(&(0x7f00000005c0)=ANY=[@ANYBLOB="bfced280cc86db60d096f7ffe54222e31675471841ae8b6d8359a7402757136138843278f8b78f1819dd23c31938cbf1a710b129eec3581385e5e28371b3e68cdac5c49eafea36162e211c7f09c608117a92abdc8e03d98894523695591b19f70db967298d3e41eb9449e4e6d8a1dc3f7cec94a6e9bd2386977a89bc06dbf4fcd1b45e9f369f501f9d24f8506958fea1ac6fe77a66de556f87277d28f77856f4b9d518c68c2ae1d15e998ca902975edce4ae538e6a73019610ac86ee6a498720a89301f4f1592c832aee20781b04", @ANYBLOB="ab1f16ac9f5d5cf7816b873bba2e9e456bf66d63525fc72e729e077acd612dddce6bc32b184d8c27b58a8372910ed28ca601f0b48d20c9367c6ca1c763c281b9e982e3d3189124e436e781b88cebef40228c8b049b3738777e4c64393498c1d0e91b3221b6991e1e27134280a03d23af1a17f6515bbd73ee6b51f186ba8cc21154aa32d62abe8fa47f8147cb3d6af701f9750e0c2e2cec56f5184d1ffae213cbc9543b74bad86d4debb8544d87b56efd6c703a421801645986bdb9d945385aef4a4d27", @ANYRESHEX=r6], &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='afs\x00', 0x280000, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, 0x0, &(0x7f00000001c0)) socket(0x0, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000200)={0x0, 'veth1_macvtap\x00'}) 04:31:00 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x410, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) 04:31:00 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000000)='batadv\x00') sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)={0x14, r1, 0x301, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000000000)='batadv\x00') sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r2, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)={0x14, r3, 0x301, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) splice(r0, &(0x7f0000000000)=0x6, r2, &(0x7f0000000080)=0x200, 0x8, 0xd) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) 04:31:00 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23620157"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, 0x0, &(0x7f00000001c0)) socket(0x0, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000200)={0x0, 'veth1_macvtap\x00'}) [ 363.483546][ T8172] FS-Cache: Duplicate cookie detected [ 363.489050][ T8172] FS-Cache: O-cookie c=000000004ba14e61 [p=00000000a00f4ec0 fl=222 nc=0 na=1] [ 363.498009][ T8172] FS-Cache: O-cookie d=0000000035364e0c n=0000000007a73fb0 [ 363.505233][ T8172] FS-Cache: O-key=[2] 'e9e7' [ 363.509911][ T8172] FS-Cache: N-cookie c=00000000528dad76 [p=00000000a00f4ec0 fl=2 nc=0 na=1] [ 363.518636][ T8172] FS-Cache: N-cookie d=0000000035364e0c n=0000000026c831c5 [ 363.525832][ T8172] FS-Cache: N-key=[2] 'e9e7' [ 363.610452][T15078] kAFS: No cell specified [ 363.684953][T15078] kAFS: No cell specified 04:31:00 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000000)='batadv\x00') sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)={0x14, r1, 0x301, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) r2 = dup3(0xffffffffffffffff, r0, 0x80000) getpeername$netlink(r2, &(0x7f0000000000), &(0x7f0000000080)=0xc) mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) stat(&(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = getpid() r6 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setresgid(0x0, r7, 0x0) sendmsg$unix(r4, &(0x7f0000001440)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=[@cred={{0x1c, 0x1, 0x2, {r5, 0x0, r7}}}], 0x20}, 0x0) write$FUSE_ENTRY(r2, &(0x7f0000000240)={0x90, 0x0, 0x1, {0x6, 0x3, 0xfff, 0x100, 0xd76, 0x69b, {0x0, 0x2, 0x8000, 0x5, 0x2e68, 0x7f, 0x8, 0x8, 0x7, 0x7, 0x8, r3, r7, 0x7, 0xfffffffa}}}, 0x90) mount(&(0x7f00000003c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) 04:31:01 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, 0x0, &(0x7f00000001c0)) socket(0x0, 0x0, 0x0) ioctl$VT_WAITACTIVE(0xffffffffffffffff, 0x5607) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000200)={0x0, 'veth1_macvtap\x00'}) 04:31:01 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="52d33000"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) [ 363.884415][T15085] kAFS: unparsable volume name [ 363.961308][T15090] kAFS: unparsable volume name 04:31:01 executing program 3: r0 = memfd_create(&(0x7f0000001780)='\xd8\x05V\x15\xa5e\xf1\xb8\xf6\xa2\xba\x85\xb95\x03<\xb9;\xcd\x86\x8bD\xf9\xe9L\xe1Q\xfc\xe2\x97\xa0\xe8s\xb2\x11\xef\x1ac\xc9\x89\xc7\x0fv1\xa1:h\xf6\xf5\a\x8c\xf0Ay\x03\x97\xe77\xc1\xc8\xa6\xcb\xd2\xbe\xe9\xd2\xfb{u\xc3\xcd\xba\xa8G`9\xb5\x82\xa9p\xc8)\xe5$b\v\x8e\b\xf4\xf0\x11\xb4\xcb\"\xf4\xf3\xb4|\xdf\xa3\xdd\x9c\x8a\xf4D\xd3\xea\x11c}\x86H\xca=;i\x96\x183h\xba\x1a\x10', 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000380)='/dev/nullb0\x00', 0x0, 0x0) io_setup(0x1, &(0x7f00000004c0)=0x0) io_submit(r4, 0x8, &(0x7f00000000c0)=[&(0x7f0000000140)={0x3a00400f, 0x2759, 0x10, 0x0, 0x0, r3, &(0x7f0000000000)="98", 0x3e80000000, 0x0, 0x0, 0x2}]) 04:31:01 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket(0x10, 0x3, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$inet_udp(0x2, 0x2, 0x0) close(r5) sendto$llc(0xffffffffffffffff, &(0x7f0000000140)="7653bbc6175a3d2b8b43d6fab096eaaa30", 0x11, 0x0, 0x0, 0x0) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88882, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0x2}) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @loopback}}) write$binfmt_misc(r4, &(0x7f0000000140)=ANY=[], 0x1000000c8) splice(r3, 0x0, 0xffffffffffffffff, 0x0, 0x18102, 0x0) 04:31:01 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)=ANY=[@ANYBLOB="23e9e73a3c8696d73f88ebfedd"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) pipe2(&(0x7f0000000080)={0xffffffffffffffff}, 0x800) ioctl$TUNGETFILTER(r5, 0x801054db, &(0x7f0000000100)=""/48) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) close(r2) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000140)=ANY=[@ANYBLOB="74000000000119050000000000000000000000002400010014001f0008000100ac1414aa08000200e00000000c0002000500010000000000240002000c000200050001000000000014000100080001000000000008000200000000000800070000000000100005"], 0x1}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfd53) splice(r0, 0x0, r2, 0x0, 0x344, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, 0x0, &(0x7f00000001c0)) socket(0x0, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000200)={0x0, 'veth1_macvtap\x00'}) 04:31:01 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) fsconfig$FSCONFIG_SET_FLAG(r0, 0x6, &(0x7f00000000c0)='posixacl\x00', 0x0, 0x0) ioctl$TIOCL_UNBLANKSCREEN(r0, 0x541c, &(0x7f0000000880)) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x5, 0x6, &(0x7f0000000580)=[{&(0x7f0000000280)="71de47ec45c269924338c3cb901de4705ce8461dbb300b05ee839f8dfb45053c06df5b0f4278310a66050c7ec80f13c77f14ba4861f83363263bc5fa5afbe05ee60d6727616780cedc01885c39e2dc1fd769ca3d11675735d39767083b230eadd07d99177b8c88736b18da0203a391bb92d239c006b99de1223c3399c655721812db6581a3d9cf9511fe8bb78265de764c58c9b2f947f646a23badefef068c16994d25c81110c7d529a1aa581943cd7552898b00397e1e9ee1ae55eebe0f490e91c2073d9f6a4e81fc73de39f4eac9cbae431d09797af0523f9977254d5948feda5cf2db58a2c0b7fea168b68c4c0ce7672d898cf0efc745d6", 0xf9}, {&(0x7f0000000380)="5ddac874135af208b35664439c0a9938d9879b87e30e303af2d3111968968eef76d6cd6a2ae174de185404dc9289ee8f31ec72c8e57fd0d78afe5c34e479fc3ed6f6fec54207ee43aea559ad12c78a5c99a7923c97c831e5fe727f6d25a56be5bffabab26c37d790f31c1a3ec3f5814a84965ec122873dc3a9ca017dcf93bf2cbd7e89ccfd74eff6018cab5e8b5cefe477de4c79a35a70dad1cc490013644c41e05059c6451b797d7876a303e8b5a783398a8c228b07d9de960e841a41ceb4e47120b3cf10e22dcdf63dc97ddc9d49aec3b6d9bf582a96c53aa81ad5f76916f232e7ffb094a07e847805cf1e", 0xec, 0x8001}, {&(0x7f00000000c0)="fac4fe41ae4c8463d5ff2d7dcd831044c66747771a1079769452283994f922a2df348ea637088a737dfd6725e4a8c717d7c07e2d6d4dbe02172e130f9b3a7ced0482203c64f247533881fd193326e499a0259877cf5a1bb9e2fa4294e6e8e2474086faad1c4f835aefc1fb3be094d7ff", 0x70, 0x7}, {&(0x7f00000001c0)="8b0a15c7cd051876e3773dc61492a9", 0xf, 0x2}, {&(0x7f0000000480)="a5a0395392a3c8b649ca8de35a3e4078c6eac530d81632c786065a6cbad5f1de06ade124294cdb592882e3f08424abab8d6a2d9d504d15df7ede27f6637801d3a108ae137a45f6701087bed38946b7aae0b988aec4500a29d68fd34fb65c8a29377d9828bfa8c3c5609d3bd6df624afc9af8f78ae721bf25f4be24fa0d032d8d7edafd38d0ed9fec0665c7314b52b709cdbc8f636449f6cc09cf89bfa3e3ea40d2998df16131018571fc753c49abaa43ed214207290018a5929a184a15086f0177921eadbc80c1a51a7e94601fe92ba3bf16d460e5fc1612f05fce85cf571c", 0xdf, 0x8}, {&(0x7f0000000200)="511260eb8df4289b82d76777e62f3b4d482fdba6a619f98c9e9b7042585856551b186e3ca0715862749ba88a200a2b1ca225ea2d438a223135", 0x39, 0x9}], 0x1053008, &(0x7f0000000640)={[{@quota='quota'}, {@swidth={'swidth', 0x3d, 0x5}}, {@grpquota='grpquota'}, {@allocsize={'allocsize', 0x3d, [0x33]}}, {@nodiscard='nodiscard'}, {@biosize={'biosize', 0x3d, 0x3f}}, {@quota='quota'}, {@gqnoenforce='gqnoenforce'}], [{@defcontext={'defcontext', 0x3d, 'user_u'}}]}) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) fsconfig$FSCONFIG_SET_FLAG(r1, 0x6, &(0x7f00000000c0)='posixacl\x00', 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000740)={0x0, 0x0}) sendmsg$can_bcm(r1, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000780)={0x4, 0x0, 0x8, {0x0, 0x2710}, {r2, r3/1000+10000}, {0x0, 0x0, 0x1, 0x1}, 0x1, @canfd={{0x0, 0x1, 0x1}, 0x40, 0x2, 0x0, 0x0, "716f602750708ac747161082a2ec8b317db865b84ee5145fc667978ddcd05297e3fb67bd567be5c4ea47e7f21df6615e52b37d2e9bf9094f8a0faade792f1d53"}}, 0x80}, 0x1, 0x0, 0x0, 0x4}, 0x4040003) ioctl$PPPIOCATTACH(r1, 0x4004743d, &(0x7f0000000700)=0x3) 04:31:01 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000000)='batadv\x00') sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=ANY=[@ANYBLOB="05000000", @ANYRES16=r1, @ANYBLOB="010300000000000000000a000000"], 0x14}}, 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x406, r0) ioctl$USBDEVFS_FREE_STREAMS(r2, 0x8008551d, &(0x7f0000000080)={0xbab1, 0xd, [{0xa, 0x1}, {0x4}, {0xb, 0x1}, {0x3}, {0x2, 0x1}, {0xc, 0x1}, {0x4, 0x1}, {0x2, 0x1}, {0xd, 0x1}, {0x5, 0x1}, {0xe, 0x1}, {0x8, 0x1}, {0x6}]}) ioctl$SNDRV_CTL_IOCTL_TLV_WRITE(r2, 0xc008551b, &(0x7f0000000000)={0x0, 0x14, [0x100, 0x1, 0x7fff, 0x5, 0xfff]}) perf_event_open(&(0x7f0000001340)={0x4, 0x70, 0x0, 0x0, 0x1, 0x0, 0x0, 0x41c1, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x14400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) 04:31:02 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) umount2(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x4000000009, 0x0) semtimedop(r0, &(0x7f00000000c0)=[{0x0, 0xffff}], 0x1, &(0x7f0000000100)={0x77359400}) semctl$GETZCNT(r0, 0x1, 0xf, &(0x7f0000000080)=""/111) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="0f23513e"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x841, 0x0) [ 364.756216][ T23] FS-Cache: Duplicate cookie detected [ 364.761708][ T23] FS-Cache: O-cookie c=00000000cce49427 [p=00000000a00f4ec0 fl=212 nc=0 na=0] [ 364.770668][ T23] FS-Cache: O-cookie d=0000000000000000 n=0000000000000000 [ 364.778010][ T23] FS-Cache: O-key=[2] 'e9e7' [ 364.782667][ T23] FS-Cache: N-cookie c=00000000a80ba894 [p=00000000a00f4ec0 fl=2 nc=0 na=1] [ 364.791433][ T23] FS-Cache: N-cookie d=0000000035364e0c n=00000000df95a615 [ 364.798709][ T23] FS-Cache: N-key=[2] 'e9e7' 04:31:02 executing program 3: r0 = memfd_create(&(0x7f0000001780)='\xd8\x05V\x15\xa5e\xf1\xb8\xf6\xa2\xba\x85\xb95\x03<\xb9;\xcd\x86\x8bD\xf9\xe9L\xe1Q\xfc\xe2\x97\xa0\xe8s\xb2\x11\xef\x1ac\xc9\x89\xc7\x0fv1\xa1:h\xf6\xf5\a\x8c\xf0Ay\x03\x97\xe77\xc1\xc8\xa6\xcb\xd2\xbe\xe9\xd2\xfb{u\xc3\xcd\xba\xa8G`9\xb5\x82\xa9p\xc8)\xe5$b\v\x8e\b\xf4\xf0\x11\xb4\xcb\"\xf4\xf3\xb4|\xdf\xa3\xdd\x9c\x8a\xf4D\xd3\xea\x11c}\x86H\xca=;i\x96\x183h\xba\x1a\x10', 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000380)='/dev/nullb0\x00', 0x0, 0x0) io_setup(0x1, &(0x7f00000004c0)=0x0) io_submit(r4, 0x8, &(0x7f00000000c0)=[&(0x7f0000000140)={0x3a004010, 0x2759, 0x10, 0x0, 0x0, r3, &(0x7f0000000000)="98", 0x3e80000000, 0x0, 0x0, 0x2}]) 04:31:02 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000000)='batadv\x00') sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)={0x14, r1, 0x301, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) r2 = syz_genetlink_get_family_id$devlink(&(0x7f0000000080)='devlink\x00') sendmsg$DEVLINK_CMD_PORT_SET(r0, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f00000001c0)={&(0x7f00000000c0)={0x6c, r2, 0x200, 0x70bd2a, 0x25dfdbff, {}, [{{@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8, 0x3, 0x1}}, {0x6, 0x4, 0x2}}, {{@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8, 0x3, 0x2}}, {0x6, 0x4, 0x2}}]}, 0x6c}, 0x1, 0x0, 0x0, 0x20008014}, 0x40) [ 365.016908][T15129] kAFS: unparsable volume name 04:31:02 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x867, 0x800) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="3ae20000"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, 0x0, &(0x7f00000001c0)) socket(0x0, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000200)={0x0, 'veth1_macvtap\x00'}) [ 365.204747][T15136] kAFS: unparsable volume name 04:31:02 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_SET_WIPHY(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x30, 0x0, 0x20, 0x70bd26, 0x25dfdbfe, {}, [@NL80211_ATTR_WIPHY={0x8, 0x1, 0x4}, @NL80211_ATTR_WIPHY_NAME={0x14, 0x2, 'veth0_to_hsr\x00'}]}, 0x30}, 0x1, 0x0, 0x0, 0x4}, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) mount(&(0x7f0000000000)=ANY=[@ANYBLOB="4a39e3af1cc9224eaedfef06fe55f29d"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) [ 365.257672][T15141] kAFS: unparsable volume name 04:31:02 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)=ANY=[@ANYBLOB="23e9e73aa8c7dda4b5357e223e28728a41ad3a237252416823e2eba232bb6de073baf4c8d9d5"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, 0x0, &(0x7f00000001c0)) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) sendmmsg(r0, &(0x7f0000000a00)=[{{&(0x7f0000000240)=@ethernet={0x6}, 0x80, &(0x7f0000000100)=[{&(0x7f00000002c0)="23e200b95b79cdbbc4e639bdd1c4c170e3a795b0bff512a0b109b659044efd42d1f77b21aab25464aae80032a040863153dee0e0388a792db697dca2f60a6ead19d1b2a1a9ee67fc63ac4ddf377de9b3762cada1fa1dc22db385f237177391b6440546b11bec14d8ef639e25a6deb9fc7d987d2938c53a5e2b372e40c43ef42dc6ce38f2bf16522f6fabadfe70594bc4153c6c4dc5ee416d95315abe83ac0ae9442a3de5092cfc6d03a584349a7c323e98", 0xb1}, {&(0x7f0000000380)="c118f2232dbd601e0825e699346edae455e4762ff7f168ffe0aa71493b4091c9fc94335db8f30c26c7d163553255a1eea8ee6c4d9a227753100ed68597265efca44d8a1adddb7981a81ddbe074037572381bd00f62b1ae73f2a5a874075f233ee4d0b264fa9ed0e27413c6ade939ecd41355734ae649ab40b992e090222b0e08afad568eb31f0098dd385f00d020dbf83f6d814bd6eb9880f5740a6a8b7561f1723b0e4c304d7da9fad6810162916aa38707739a406e66ace3305eeb98d7c4d6748c835e3daa3b7da2b0", 0xca}], 0x2}}, {{&(0x7f0000000480)=@caif=@rfm={0x25, 0x0, "0ce42efdf9694ec99676f9b6be2c26fc"}, 0x80, &(0x7f0000000980)=[{&(0x7f0000000500)="da562c6b9718bfc262c1c8f82b85e6533a03d53dc7ca6da0be1df57a358ab5b670d49fba606a0b9b0454f2", 0x2b}, {&(0x7f0000000540)="a4cdb8b89dab7c1f391b6bd71f28ed6f7b0509926232e37ee81483de8a1a56ed49cf512e01b40fb54e16442eae4c5696fa4d07f22f891b22c3949eea5f8944cea8d346831564cad2ed9e485491568d07bc965f815b15b47e80f70566f6b99638af3c1944282c6883d2f46a96b3a122dabd7639055aa3bbc55d", 0x79}, {&(0x7f00000005c0)="071c751ce6ec2ce1e9860a987f31e82ccb02b8c88f252e4d8b2fbc6b40f6d3326a0a4f6dbc4664a9f84129999aa725a4f7c86afae1732fe213f86f89c8f02d463ddddcbe28e2967d2984be03b295797b8e9e02ee9caa123a006a3f6461b321d973db24c5d0baa20704cd65b5dbed76e7b3000f9e179d9840498759b4de459021bb1b201343b2340952c8f325a569c63c82", 0x91}, {&(0x7f0000000680)="6dd29487f0906a9372688b17841e9947ba401b46feb0f7d2c056aab538499e03f833137c6be6be3bb1bb19e9b2e3e7d2c839e5a6e2f94a3414e7c25b4a7d926ab44107b45efab9af491d9539bd9036377806d2a013241248b2ddaff9731d80679b056f6fe516d457f0208e8c0e06b230b1430e60645647095077b2110a89c593f7c66130575cbe25698f949adb3ef55e70032d8d70ca138c1da5f171024c7f6234692f9d95cd547f0ce48e6e4f3782fddb71965bf11ba71cdf56a34d46", 0xbd}, {&(0x7f0000000740)="1e29b2b65922c32c85fe6b64140f9376f9063587", 0x14}, {&(0x7f0000000a80)="7a73ade46e561cd6fa47d21d3471a7556d29752de44e60e33ffc02356f0420fbe6373c823b5c39bdd157e2fbd890cb015ae8891bc2486761d6b6d6215d1d678a21519e8e8703cd05a073959747b296c8b795221873ad63cf84573236e9ba32b12bdc70d90e64e86d9d89390d8561436455cf193bb470c9f636386dfaa560da19f2cbb4f4b562ab00b23d829834d2f7a2fa5d36bb3a13c90bca37ed337024f4cb236d344e3cd9649dac7eb8353de980780b9eee61119b4f576d673e4a7694212eacc4b2e326f06845b2f5d08588a324489483220be82b98852e9f4dad58", 0xdd}, {&(0x7f0000000880)="2773777a410f71123f731577f0feade104f115e8ab69bcf2a0014a0a9c3d64ba435e6d2a3767cdd7239c2853c1b7575d1e7146df4e79a68a9241ab7b16759b40f0144e1924adb95bc4b32ce5496773a9", 0x50}, {&(0x7f0000000900)="82c01839f8e6b3ed60245d4fcfb4ef6105a9614a56fd81c81022c85dccecd4737701632792d65a169d9b15174ba3a40b0acb73bd02e621ef72807013e68f716c91942a84fcb04fbe43604d54680abe9655bee74a866309ccf4eb36cb6d8c5a56cb78d3fb", 0x64}], 0x8}}], 0x2, 0x81) r1 = socket(0x0, 0x0, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) connect$rds(r1, &(0x7f0000000080)={0x2, 0x4e20, @empty}, 0x10) r3 = syz_open_pts(0xffffffffffffffff, 0x80000) ioctl$FS_IOC_FSGETXATTR(r3, 0x801c581f, &(0x7f0000000780)={0x8, 0xb25, 0x1, 0x70, 0x73}) fsconfig$FSCONFIG_SET_FLAG(r2, 0x6, &(0x7f00000000c0)='posixacl\x00', 0x0, 0x0) sendmsg$SOCK_DIAG_BY_FAMILY(r2, &(0x7f0000000bc0)={&(0x7f00000007c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000b80)={&(0x7f0000000800)=ANY=[@ANYBLOB="64000000140000022693da589e2549203d3a2a2a1252c0ecbfbd7000fddbdf25043f4d00010011e3ca1a4dd5a2bc685c2fb636364987d7650e90881b7bb1c996d24d160f66a4ba46207b54b25bc61a358a7b4b04b750ac14a6d73f9ab8e1ce1e3d22d9a9"], 0x64}, 0x1, 0x0, 0x0, 0x4000}, 0x8014) ioctl$USBDEVFS_GET_SPEED(r2, 0x551f) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000200)={0x0, 'veth1_macvtap\x00'}) 04:31:02 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) fsconfig$FSCONFIG_SET_FLAG(r1, 0x6, &(0x7f00000000c0)='posixacl\x00', 0x0, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) fsconfig$FSCONFIG_SET_FLAG(r2, 0x6, &(0x7f00000000c0)='posixacl\x00', 0x0, 0x0) ioctl$DRM_IOCTL_MODE_LIST_LESSEES(r2, 0xc01064c7, &(0x7f00000001c0)={0x8, 0x0, &(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) r4 = socket$nl_generic(0x10, 0x3, 0x10) fsconfig$FSCONFIG_SET_FLAG(0xffffffffffffffff, 0x6, &(0x7f00000000c0)='posixacl\x00', 0x0, 0x0) ioctl$SG_GET_PACK_ID(0xffffffffffffffff, 0x227c, &(0x7f0000000280)) r5 = syz_genetlink_get_family_id$batadv(&(0x7f0000000000)='batadv\x00') sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r4, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)={0x14, r5, 0x301, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$batadv(&(0x7f0000000000)='batadv\x00') sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r6, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)={0x14, r7, 0x301, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) ioctl$F2FS_IOC_FLUSH_DEVICE(r6, 0x4008f50a, &(0x7f0000000240)={0x1000, 0x3}) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(r1, 0xc01864c6, &(0x7f0000000200)={&(0x7f0000000080)=[0x3, 0x5, 0x3, 0x7, 0x400, 0x2], 0x6, 0x80800, r3, r4}) fsconfig$FSCONFIG_SET_FLAG(r0, 0x6, &(0x7f00000000c0)='posixacl\x00', 0x0, 0x0) setsockopt$netrom_NETROM_T2(r0, 0x103, 0x2, &(0x7f0000000000)=0x9, 0x4) mount(&(0x7f0000000280)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0xca008, 0x0) [ 365.414757][T15146] kAFS: unparsable volume name [ 365.471566][T15146] kAFS: unparsable volume name 04:31:02 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) mount(&(0x7f00000000c0)=ANY=[@ANYBLOB="23e9e73a533e38c4332d32e06509440ca122221cc10c0b854565d67630c20bfc88e755d1b5ceda9757937d282acfd781ed6c4c249d5272dce81fbba20e42"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x10002, 0x0) ioctl$RTC_VL_READ(r0, 0x80047013, &(0x7f0000000080)) [ 365.768773][T15163] kAFS: unparsable volume name 04:31:03 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket(0x10, 0x3, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$inet_udp(0x2, 0x2, 0x0) close(r5) sendto$llc(0xffffffffffffffff, &(0x7f0000000140)="7653bbc6175a3d2b8b43d6fab096eaaa30", 0x11, 0x0, 0x0, 0x0) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88882, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0x2}) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @loopback}}) write$binfmt_misc(r4, &(0x7f0000000140)=ANY=[], 0x1000000c8) splice(r3, 0x0, 0xffffffffffffffff, 0x0, 0x18102, 0x0) 04:31:03 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) fsconfig$FSCONFIG_SET_FLAG(r1, 0x6, &(0x7f00000000c0)='posixacl\x00', 0x0, 0x0) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=@newqdisc={0x24, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {0x492ccf2c6e6fe735, 0xffff}}}, 0x24}}, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000100)={@local, 0x28, r3}) fsconfig$FSCONFIG_SET_FLAG(r0, 0x6, &(0x7f00000000c0)='posixacl\x00', 0x0, 0x0) accept4$llc(r0, &(0x7f0000000000)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000080)=0x10, 0x800) getsockopt$netrom_NETROM_T4(r1, 0x103, 0x6, &(0x7f00000001c0)=0x401, &(0x7f0000000200)=0x4) mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) 04:31:03 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000000)='batadv\x00') sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)={0x14, r1, 0x301, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) r2 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000080)='NLBL_UNLBL\x00') r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) fsconfig$FSCONFIG_SET_FLAG(r3, 0x6, &(0x7f00000000c0)='posixacl\x00', 0x0, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$batadv(&(0x7f0000000000)='batadv\x00') sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r4, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000002c0)=ANY=[@ANYBLOB="14000000", @ANYRES16=r5, @ANYBLOB="00af628c9a2c51492ad93ebe60746ae99df059cc52d37cdb0d9da626e51b4fb3bf7beed404f489072b525c1ba2327705ea9d5a746a3b1809f64271777f95159b0d1bd01ec6fbf030e4f40b3ac5ad7d40a605d395f0d90f6101"], 0x14}}, 0x0) ftruncate(r4, 0xffe0000000000000) ioctl$RTC_WKALM_SET(r3, 0x4028700f, &(0x7f0000000280)={0x1, 0x0, {0xb, 0x12, 0xb, 0xb, 0x5, 0x0, 0x2, 0x129, 0x1}}) sendmsg$NLBL_UNLABEL_C_STATICADD(r0, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10040}, 0xc, &(0x7f00000001c0)={&(0x7f00000000c0)={0x5c, r2, 0x1, 0x70bd26, 0x25dfdbfb, {}, [@NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @empty}, @NLBL_UNLABEL_A_ACPTFLG={0x5}, @NLBL_UNLABEL_A_ACPTFLG={0x5, 0x1, 0x1}, @NLBL_UNLABEL_A_SECCTX={0x28, 0x7, 'system_u:object_r:hwclock_exec_t:s0\x00'}, @NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @rand_addr=0x64010101}]}, 0x5c}, 0x1, 0x0, 0x0, 0x8045}, 0xc4) 04:31:03 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000300)=ANY=[@ANYBLOB="23e9e73af13fea36fead87b81f2bf1e6610847cb9e1d805a6ed5ea75588ea70b4cd08ca3c285731a9a688da2b2486d8ee7ed2db204088edae80050f4d1875c324e491ed9d08239a1d628a04a0cdd55f61c24bc0dd9e2e2bd99da6f1e63970c1c62fec4b553c34c126e6fd192425cc20948c74dd1afd0eb016a4f28936edbb4e8b5ff6d05444212396f9833015396d3ee77c1933b"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, 0x0, &(0x7f00000001c0)) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) fsconfig$FSCONFIG_SET_FLAG(r0, 0x6, &(0x7f00000000c0)='posixacl\x00', 0x0, 0x0) ioctl$UI_SET_MSCBIT(r0, 0x40045568, 0x23) r1 = socket(0x0, 0x0, 0x0) ioctl$F2FS_IOC_FLUSH_DEVICE(r0, 0x4008f50a, &(0x7f0000000080)={0x3}) setsockopt$nfc_llcp_NFC_LLCP_RW(r1, 0x118, 0x0, &(0x7f0000000100)=0x9448, 0x4) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000200)={0x0, 'veth1_macvtap\x00'}) 04:31:03 executing program 3: r0 = memfd_create(&(0x7f0000001780)='\xd8\x05V\x15\xa5e\xf1\xb8\xf6\xa2\xba\x85\xb95\x03<\xb9;\xcd\x86\x8bD\xf9\xe9L\xe1Q\xfc\xe2\x97\xa0\xe8s\xb2\x11\xef\x1ac\xc9\x89\xc7\x0fv1\xa1:h\xf6\xf5\a\x8c\xf0Ay\x03\x97\xe77\xc1\xc8\xa6\xcb\xd2\xbe\xe9\xd2\xfb{u\xc3\xcd\xba\xa8G`9\xb5\x82\xa9p\xc8)\xe5$b\v\x8e\b\xf4\xf0\x11\xb4\xcb\"\xf4\xf3\xb4|\xdf\xa3\xdd\x9c\x8a\xf4D\xd3\xea\x11c}\x86H\xca=;i\x96\x183h\xba\x1a\x10', 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000380)='/dev/nullb0\x00', 0x0, 0x0) io_setup(0x1, &(0x7f00000004c0)=0x0) io_submit(r4, 0x8, &(0x7f00000000c0)=[&(0x7f0000000140)={0x3a004011, 0x2759, 0x10, 0x0, 0x0, r3, &(0x7f0000000000)="98", 0x3e80000000, 0x0, 0x0, 0x2}]) 04:31:03 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$gtp(&(0x7f0000000040)='gtp\x00') sendmsg$GTP_CMD_NEWPDP(r1, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000200)={0x34, r2, 0x1, 0x0, 0x0, {}, [@GTPA_MS_ADDRESS={0x8, 0x5, @dev}, @GTPA_VERSION={0x8}, @GTPA_PEER_ADDRESS={0x8, 0x4, @broadcast}, @GTPA_LINK={0x8}]}, 0x34}}, 0x0) sendmsg$GTP_CMD_GETPDP(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x2c, r2, 0x100, 0x70bd2d, 0x25dfdbfd, {}, [@GTPA_NET_NS_FD={0x8}, @GTPA_O_TEI={0x8, 0x9, 0x2}, @GTPA_I_TEI={0x8, 0x8, 0x4}]}, 0x2c}, 0x1, 0x0, 0x0, 0x1}, 0x20004040) [ 366.130823][ T7954] FS-Cache: Duplicate cookie detected [ 366.136357][ T7954] FS-Cache: O-cookie c=00000000fc1466f5 [p=00000000a00f4ec0 fl=222 nc=0 na=1] [ 366.145407][ T7954] FS-Cache: O-cookie d=0000000000000000 n=0000000000000000 [ 366.152666][ T7954] FS-Cache: O-key=[2] 'e9e7' [ 366.157273][ T7954] FS-Cache: N-cookie c=0000000053a2395b [p=00000000a00f4ec0 fl=2 nc=0 na=1] [ 366.165990][ T7954] FS-Cache: N-cookie d=0000000035364e0c n=00000000d1b7035c [ 366.173241][ T7954] FS-Cache: N-key=[2] 'e9e7' 04:31:03 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) fsconfig$FSCONFIG_SET_FLAG(r1, 0x6, &(0x7f00000000c0)='posixacl\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(r1, 0xc0a85322, &(0x7f0000000280)) r2 = syz_genetlink_get_family_id$batadv(&(0x7f0000000000)='batadv\x00') sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)={0x14, r2, 0x301, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) ioctl$sock_inet_SIOCGIFADDR(r0, 0x8915, &(0x7f0000000000)={'gretap0\x00', {0x2, 0x4e23, @loopback}}) mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) 04:31:03 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x18) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) [ 366.312169][ T8172] FS-Cache: Duplicate cookie detected [ 366.317618][ T8172] FS-Cache: O-cookie c=00000000d8c6e49a [p=00000000a00f4ec0 fl=222 nc=0 na=1] [ 366.326592][ T8172] FS-Cache: O-cookie d=0000000035364e0c n=00000000c5381741 [ 366.333874][ T8172] FS-Cache: O-key=[2] 'e9e7' [ 366.338568][ T8172] FS-Cache: N-cookie c=000000005f1177e9 [p=00000000a00f4ec0 fl=2 nc=0 na=1] [ 366.347243][ T8172] FS-Cache: N-cookie d=0000000035364e0c n=0000000021861854 [ 366.354535][ T8172] FS-Cache: N-key=[2] 'e9e7' 04:31:03 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) fsconfig$FSCONFIG_SET_FLAG(r0, 0x6, &(0x7f00000000c0)='posixacl\x00', 0x0, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$batadv(&(0x7f0000000000)='batadv\x00') sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r1, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)={0x14, r2, 0x301, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) ioctl$VIDIOC_G_EXT_CTRLS(r0, 0xc0205647, &(0x7f0000000100)={0x990000, 0x6, 0x8000, r1, 0x0, &(0x7f00000000c0)={0x990afa, 0x2, [], @string=&(0x7f0000000080)=0x8}}) setsockopt$bt_BT_RCVMTU(r3, 0x112, 0xd, &(0x7f0000000180)=0x6, 0x2) 04:31:03 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001340)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7fffffff, 0x100}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, 0x0, &(0x7f00000001c0)) socket(0x0, 0x0, 0x0) r0 = syz_open_dev$vivid(&(0x7f0000000000)='/dev/video#\x00', 0x3, 0x2) ioctl$VIDIOC_QUERY_DV_TIMINGS(r0, 0x80845663, &(0x7f0000000080)={0x0, @reserved}) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000200)={0x0, 'veth1_macvtap\x00'}) 04:31:03 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) fsconfig$FSCONFIG_SET_FLAG(r0, 0x6, &(0x7f00000000c0)='posixacl\x00', 0x0, 0x0) getsockopt$CAN_RAW_LOOPBACK(r0, 0x65, 0x3, &(0x7f0000000000), &(0x7f0000000080)=0x4) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) 04:31:03 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000000)='batadv\x00') sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=ANY=[@ANYBLOB="14000100", @ANYRES16=r1, @ANYBLOB="010300000000000000000a000000"], 0x14}}, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000380)={0x30, r3, 0x1, 0x0, 0x0, {0xa}, [@IPVS_CMD_ATTR_DAEMON={0x3}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x8}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x0, 0x4, 0x6}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x7fff}, @IPVS_CMD_ATTR_DAEMON={0x0, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_MCAST_GROUP={0x0, 0x5, @initdev={0xac, 0x1e, 0x0, 0x0}}]}]}, 0x30}}, 0x0) sendmsg$IPVS_CMD_GET_DEST(r0, &(0x7f0000000280)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000000c0)={&(0x7f00000001c0)={0xbc, r3, 0x400, 0x70bd26, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x8}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x947}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x8001}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x8887}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8}, @IPVS_CMD_ATTR_DAEMON={0x64, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @ipv4={[], [], @remote}}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x6, 0x7, 0x4e23}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x2}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x6, 0x7, 0x4e20}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x6, 0x7, 0x4e24}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x5}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'veth1_to_batadv\x00'}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x6, 0x7, 0x4e24}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x5}, @IPVS_CMD_ATTR_DAEMON={0xc, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_MCAST_PORT={0x6, 0x7, 0x4e20}]}]}, 0xbc}, 0x1, 0x0, 0x0, 0x20040081}, 0x4010) mount(&(0x7f0000000040)=ANY=[@ANYRES16=r1], &(0x7f0000000180)='./file0\x00', &(0x7f0000000000)='qnx4\x00', 0x0, 0x0) [ 366.677029][ T12] FS-Cache: Duplicate cookie detected [ 366.682590][ T12] FS-Cache: O-cookie c=00000000b592895b [p=00000000a00f4ec0 fl=222 nc=0 na=1] [ 366.691554][ T12] FS-Cache: O-cookie d=0000000000000000 n=0000000000000000 [ 366.698865][ T12] FS-Cache: O-key=[2] 'e9e7' [ 366.703471][ T12] FS-Cache: N-cookie c=000000009649d636 [p=00000000a00f4ec0 fl=2 nc=0 na=1] [ 366.712216][ T12] FS-Cache: N-cookie d=0000000035364e0c n=00000000acdac874 [ 366.719471][ T12] FS-Cache: N-key=[2] 'e9e7' [ 366.747455][T15211] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.1'. [ 366.846999][T15219] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.1'. 04:31:04 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket(0x10, 0x3, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$inet_udp(0x2, 0x2, 0x0) close(r5) sendto$llc(0xffffffffffffffff, &(0x7f0000000140)="7653bbc6175a3d2b8b43d6fab096eaaa30", 0x11, 0x0, 0x0, 0x0) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88882, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0x2}) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @loopback}}) write$binfmt_misc(r4, &(0x7f0000000140)=ANY=[], 0x1000000c8) splice(r3, 0x0, r5, 0x0, 0x0, 0x0) 04:31:04 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000400)=ANY=[@ANYBLOB="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"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, 0x0, &(0x7f00000001c0)) socket(0x0, 0x0, 0x0) preadv(r0, &(0x7f0000000840)=[{&(0x7f0000000240)=""/207, 0xcf}, {&(0x7f0000000080)=""/109, 0x6d}, {&(0x7f0000000340)=""/149, 0x95}, {&(0x7f0000000000)=""/16, 0x10}, {&(0x7f00000005c0)=""/174, 0xae}, {&(0x7f0000000680)=""/212, 0xd4}, {&(0x7f0000000100)=""/6, 0x6}, {&(0x7f0000000780)=""/189, 0xbd}], 0x8, 0x47, 0x5) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000200)={0x0, 'veth1_macvtap\x00'}) 04:31:04 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0xa) mount(&(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) fsconfig$FSCONFIG_SET_FLAG(r0, 0x6, &(0x7f00000000c0)='posixacl\x00', 0x0, 0x0) accept4$nfc_llcp(r0, &(0x7f0000000080), &(0x7f0000000000)=0x60, 0x80800) 04:31:04 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8001, 0x10}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) fsconfig$FSCONFIG_SET_FLAG(r0, 0x6, &(0x7f00000000c0)='posixacl\x00', 0x0, 0x0) sendmsg$AUDIT_LIST_RULES(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x10, 0x3f5, 0x2, 0x70bd2b, 0x25dfdbfe, "", ["", "", "", "", "", "", "", "", "", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x20004010}, 0x24004000) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) 04:31:04 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="ec73d12f"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) fsconfig$FSCONFIG_SET_FLAG(r0, 0x6, &(0x7f00000000c0)='posixacl\x00', 0x0, 0x0) ioctl$DRM_IOCTL_MAP_BUFS(r0, 0xc0186419, &(0x7f0000000000)={0x4, &(0x7f0000000080)=""/121, &(0x7f0000002380)=[{0x3, 0x7b, 0x4, &(0x7f00000001c0)=""/123}, {0x0, 0x1000, 0x1f, &(0x7f0000000280)=""/4096}, {0x2, 0x1000, 0x1f, &(0x7f0000001280)=""/4096}, {0x6, 0xda, 0x6, &(0x7f0000002280)=""/218}]}) 04:31:04 executing program 3: r0 = memfd_create(&(0x7f0000001780)='\xd8\x05V\x15\xa5e\xf1\xb8\xf6\xa2\xba\x85\xb95\x03<\xb9;\xcd\x86\x8bD\xf9\xe9L\xe1Q\xfc\xe2\x97\xa0\xe8s\xb2\x11\xef\x1ac\xc9\x89\xc7\x0fv1\xa1:h\xf6\xf5\a\x8c\xf0Ay\x03\x97\xe77\xc1\xc8\xa6\xcb\xd2\xbe\xe9\xd2\xfb{u\xc3\xcd\xba\xa8G`9\xb5\x82\xa9p\xc8)\xe5$b\v\x8e\b\xf4\xf0\x11\xb4\xcb\"\xf4\xf3\xb4|\xdf\xa3\xdd\x9c\x8a\xf4D\xd3\xea\x11c}\x86H\xca=;i\x96\x183h\xba\x1a\x10', 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000380)='/dev/nullb0\x00', 0x0, 0x0) io_setup(0x1, &(0x7f00000004c0)=0x0) io_submit(r4, 0x8, &(0x7f00000000c0)=[&(0x7f0000000140)={0x3a004012, 0x2759, 0x10, 0x0, 0x0, r3, &(0x7f0000000000)="98", 0x3e80000000, 0x0, 0x0, 0x2}]) 04:31:04 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23ede73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) [ 367.479792][T15238] kAFS: unparsable volume name [ 367.480066][T15237] kAFS: unparsable volume name [ 367.517490][T15238] kAFS: unparsable volume name 04:31:04 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ocfs2_control\x00', 0x4480, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$batadv(&(0x7f0000000000)='batadv\x00') sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r1, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)={0x14, r2, 0x301, 0x70bd29, 0x0, {0xa}}, 0x14}}, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$batadv(&(0x7f0000000000)='batadv\x00') sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r3, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)={0x14, r4, 0x301, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) ioctl$sock_bt_hidp_HIDPCONNADD(r0, 0x400448c8, &(0x7f0000000440)={r1, r3, 0x6, 0xcf, &(0x7f0000000340)="c6123ef6986929f670af7fa8539902f6a189804f3f852ff05f8122c6f26f7c1152e18239075f4e0b6959f248d797acd67b14537b4594558788675aff8bd8b09942facc2cbab432110280d7651fbf317059ec62c4a17a71ddf4f1146a0ba187ad7053fe1c9c1495d83475b65e110eb476d658f759eb5e8b2326c47710506f38da801fccc9ac4506cd189fcb8485cd3f5fc7fc4c7ba83d8b467a1dfb6e08bf14788d1b09c95156d9d26d1b1909e02a7999937485daf77735477c9576861475e532d2bce75a0d06433dc862d3853d11bd", 0x3, 0x7, 0x81, 0x7, 0xa2, 0x5, 0xab, 'syz0\x00'}) mount(&(0x7f0000000240)=ANY=[@ANYBLOB='\x00\x00\x00\x00'], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) fsconfig$FSCONFIG_SET_FLAG(r5, 0x6, &(0x7f00000000c0)='posixacl\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_RECVNXTINFO(r5, 0x84, 0x21, &(0x7f0000000080), &(0x7f00000000c0)=0x4) [ 367.589819][T15237] kAFS: unparsable volume name 04:31:04 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) mount(&(0x7f0000000100)=ANY=[@ANYBLOB="a2ec6556358432cc01bd806e244f7000"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x8000, 0x0) write$vhost_msg_v2(r0, &(0x7f00000001c0)={0x2, 0x0, {&(0x7f0000000380)=""/229, 0xe5, &(0x7f0000000480)=""/247, 0x3, 0x2}}, 0x48) fsconfig$FSCONFIG_SET_FLAG(r0, 0x6, &(0x7f00000000c0)='posixacl\x00', 0x0, 0x0) getsockopt$inet6_mreq(r0, 0x29, 0x14, &(0x7f0000000000)={@dev}, &(0x7f0000000080)=0x14) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) fsconfig$FSCONFIG_SET_FLAG(r1, 0x6, &(0x7f00000000c0)='posixacl\x00', 0x0, 0x0) ioctl$BLKPBSZGET(r1, 0x127b, &(0x7f0000000240)) 04:31:04 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000000)='batadv\x00') sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)={0x14, r1, 0x301, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) mount(&(0x7f0000000080)=ANY=[@ANYBLOB="23e9e73a", @ANYRESHEX, @ANYRESOCT=r1], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, 0x0, &(0x7f00000001c0)) socket(0x0, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000200)={0x0, 'veth1_macvtap\x00'}) 04:31:05 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000000)='batadv\x00') sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)={0x14, r1, 0x301, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) mount(&(0x7f0000000280)=ANY=[@ANYRESOCT=r1], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$AUDIT_ADD_RULE(r2, &(0x7f0000000340)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000300)={&(0x7f00000005c0)={0x434, 0x3f3, 0x2, 0x70bd2b, 0x25dfdbfb, {0x5, 0x1, 0x2d, [0x9, 0x80000000, 0x200, 0x0, 0x0, 0x0, 0x1000, 0xfffff000, 0x1, 0x3c, 0x2, 0x1, 0xffffff01, 0x9, 0xaff, 0x1, 0x8, 0xfa, 0xd0, 0x7, 0xea, 0x401, 0x1f, 0x4, 0x400, 0x2, 0x4, 0x40, 0x4, 0x4, 0x6, 0xffffffd1, 0x2, 0xfffffffc, 0x8, 0xe69e, 0x3, 0x9, 0x401, 0x1, 0x3956, 0x29dc, 0x5c9f, 0x1b9b4873, 0xaea, 0x98, 0x1, 0x5, 0x8001, 0x6, 0x7ff, 0x0, 0x200, 0x6, 0x200, 0x7, 0x4, 0x6, 0x47f, 0xfff, 0x34, 0x1f, 0x7, 0x5], [0x7, 0x1e, 0x3, 0x400, 0x8, 0x3f, 0x1, 0x8000, 0xff, 0x0, 0x8, 0x3, 0x9, 0x1f, 0x1, 0x6, 0x10001, 0x101, 0x6f, 0x5, 0x4521, 0x2, 0x1, 0x5, 0x4, 0xfffffffa, 0x7ff, 0xffffffe1, 0x1, 0x8, 0x2, 0x4807, 0x9, 0x5, 0x5, 0x3ff, 0x2, 0x5, 0x3, 0x3ff, 0x5, 0x3, 0x0, 0x7, 0xfffffffa, 0x4, 0x4, 0x2, 0x1, 0x4, 0x2, 0x6, 0x1000, 0xff, 0x200, 0xed6d, 0x990, 0x1000, 0x7, 0x3ff, 0x4, 0x8, 0x7f, 0x6], [0x9, 0x100, 0x8000, 0x4, 0x7e4, 0x8, 0x7fffffff, 0x6, 0x3, 0x1, 0x5, 0x6, 0x6, 0xfffffffb, 0x6, 0x7fffffff, 0x1, 0x1, 0xfff, 0x7fffffff, 0x7, 0xffffffff, 0xa8fd, 0xb3, 0xffff, 0x0, 0xe219, 0x200000, 0xff, 0x100, 0x1f, 0x7, 0x1ff, 0x3ff, 0x3, 0x1, 0x5, 0x4, 0x0, 0x800, 0x1000, 0x3, 0x2, 0x2, 0x1, 0x80000001, 0x1ff, 0x1, 0x49c, 0x339, 0x6, 0x4, 0xdfe3, 0xfffffbff, 0x3, 0xd7, 0x3f, 0x2, 0x4, 0x6, 0x5, 0x1f, 0x6, 0x9d0], [0x8, 0x1, 0xc00000, 0xffffffff, 0x8, 0x62, 0xbe5, 0x200, 0x40, 0x7, 0xfff, 0x0, 0x3, 0x5, 0x200, 0x4294, 0x3, 0x1, 0x4, 0x2, 0x7f, 0x8, 0x39ea, 0x0, 0x1ff, 0x2, 0x100, 0xde, 0x0, 0x10000, 0x7ff, 0x1, 0x3, 0x7, 0x6, 0xcf8, 0x2, 0x4, 0x8, 0x9, 0x100, 0x6, 0x1f, 0x514, 0x401, 0x6, 0xb9, 0x7, 0x8, 0x200, 0x1, 0x6, 0x784, 0x7, 0x1f, 0x7, 0x3ff, 0x1, 0x200, 0x3, 0x2, 0x51, 0x2], 0x11, ['\xd3\'-\x00', 'syz1\x00', 'syz1\x00', '!*\x00']}, ["", "", "", ""]}, 0x434}, 0x1, 0x0, 0x0, 0x20040000}, 0x4) fsconfig$FSCONFIG_SET_FLAG(r2, 0x6, &(0x7f00000000c0)='posixacl\x00', 0x0, 0x0) ioctl$IMSETDEVNAME(r2, 0x80184947, &(0x7f0000000240)={0x7, 'syz1\x00'}) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) fsconfig$FSCONFIG_SET_FLAG(r3, 0x6, &(0x7f00000000c0)='posixacl\x00', 0x0, 0x0) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) fsconfig$FSCONFIG_SET_FLAG(r4, 0x6, &(0x7f00000000c0)='posixacl\x00', 0x0, 0x0) r5 = openat$zero(0xffffffffffffff9c, &(0x7f0000000100)='/dev/zero\x00', 0x0, 0x0) ioctl$DRM_IOCTL_MODE_LIST_LESSEES(r5, 0xc01064c7, &(0x7f0000000200)={0x2, 0x0, &(0x7f00000001c0)=[0x0, 0x0]}) renameat(r3, &(0x7f0000000000)='./file0\x00', r4, &(0x7f0000000080)='./file0\x00') [ 367.821884][T15262] kAFS: unparsable volume name [ 367.864227][T15258] afs: Bad value for 'source' [ 367.870133][T15262] kAFS: unparsable volume name [ 367.931132][T15270] afs: Bad value for 'source' [ 367.993007][T15269] kAFS: unparsable volume name 04:31:05 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) r0 = syz_genetlink_get_family_id$batadv(&(0x7f0000000000)='batadv\x00') sendmsg$BATADV_CMD_GET_MCAST_FLAGS(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)={0x14, r0, 0x301, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$batadv(&(0x7f0000000000)='batadv\x00') sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r1, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)={0x14, r2, 0x301, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$batadv(&(0x7f0000000000)='batadv\x00') sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r3, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)={0x14, r4, 0x301, 0x10000000, 0x0, {0xa}}, 0x14}}, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$batadv(&(0x7f0000000000)='batadv\x00') sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r5, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)=ANY=[@ANYBLOB="00000000a345e9d694fc29b0e0c4c2588cdf8f3f42dce1116611b26ed9d7f63ae57b83547287afeecb7b0594fd5a2f73b14a3339042017df69aaeebd921762daf04816a3be2c355deb995309fe1679035f", @ANYRES16=r6, @ANYBLOB="010300000f00e3259aba6f8cd9605e17bce470281e74aa20cf47b95ce4af291eb2813e617f"], 0x14}}, 0x0) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$batadv(&(0x7f0000000000)='batadv\x00') sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r7, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=ANY=[@ANYBLOB="14000000", @ANYRES16=r8, @ANYBLOB="0103000000081d00000000000008"], 0x14}}, 0x0) r9 = socket$nl_generic(0x10, 0x3, 0x10) r10 = syz_genetlink_get_family_id$batadv(&(0x7f0000000000)='batadv\x00') sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r9, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)={0x14, r10, 0x301, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) poll(&(0x7f0000000080)=[{0xffffffffffffffff, 0xc09c}, {0xffffffffffffffff, 0x2200}, {0xffffffffffffffff, 0x2}, {0xffffffffffffffff, 0x4100}, {r1, 0x540}, {r3, 0x1410}, {0xffffffffffffffff, 0x2008}, {r5, 0x100}, {r7}, {r9, 0x444}], 0xa, 0x4) mount(&(0x7f0000000000)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x10000, 0x0) [ 368.045626][T15272] kAFS: unparsable volume name 04:31:05 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket(0x10, 0x3, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$inet_udp(0x2, 0x2, 0x0) close(r5) sendto$llc(0xffffffffffffffff, &(0x7f0000000140)="7653bbc6175a3d2b8b43d6fab096eaaa30", 0x11, 0x0, 0x0, 0x0) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88882, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0x2}) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @loopback}}) write$binfmt_misc(r4, &(0x7f0000000140)=ANY=[], 0x1000000c8) splice(r3, 0x0, r5, 0x0, 0x0, 0x0) 04:31:05 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f00000002c0)=ANY=[@ANYBLOB="21cdad242bff5af6d2e8414011ea1809400dc7a72f0b293211e0c46167190bb6a4b2482ca746c48652803567453199837042a24cc4d8e2bef77e804cfddf5850aac55d9b03143743c3693681a15aaa"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, 0x0, &(0x7f00000001c0)) socket(0x0, 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) fsconfig$FSCONFIG_SET_FLAG(r0, 0x6, &(0x7f00000000c0)='posixacl\x00', 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x50, 0x2, 0x6, 0x201, 0x0, 0x0, {0xa, 0x0, 0x1}, [@IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_CADT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x80}]}, @IPSET_ATTR_TYPENAME={0x16, 0x3, 'hash:net,port,net\x00'}]}, 0x50}, 0x1, 0x0, 0x0, 0x24008004}, 0x4) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000200)={0x0, 'veth1_macvtap\x00'}) 04:31:05 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) fsconfig$FSCONFIG_SET_FLAG(r0, 0x6, &(0x7f00000000c0)='posixacl\x00', 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000280)=@filter={'filter\x00', 0xe, 0x4, 0x670, 0xffffffff, 0x368, 0x0, 0x298, 0xffffffff, 0xffffffff, 0x5a0, 0x5a0, 0x5a0, 0xffffffff, 0x4, &(0x7f0000000080), {[{{@ipv6={@remote, @mcast1, [0xff, 0x0, 0xff, 0xffffff00], [0xffffffff, 0xffffffff, 0xff, 0xff], 'tunl0\x00', 'syz_tun\x00', {}, {0xff}, 0x6c, 0x63, 0x0, 0x1}, 0x0, 0x270, 0x298, 0x0, {}, [@common=@srh1={{0x90, 'srh\x00'}, {0x3a, 0x0, 0x0, 0x5, 0x7fff, @remote, @loopback, @private2={0xfc, 0x2, [], 0x1}, [0xff000000, 0xffffffff, 0xffffff00], [0xffffff00, 0xff, 0xff, 0xff], [0x0, 0xff000000, 0xff], 0x1000, 0x10}}, @common=@rt={{0x138, 'rt\x00'}, {0x6, [0x2, 0x5], 0x22, 0x1, 0x7, [@mcast2, @local, @loopback, @empty, @private2={0xfc, 0x2, [], 0x1}, @private1={0xfc, 0x1, [], 0x1}, @rand_addr=' \x01\x00', @mcast1, @loopback, @private2, @empty, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @private1, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @local, @local], 0xd}}]}, @common=@unspec=@MARK={0x28, 'MARK\x00', 0x2, {0x9, 0x80f8}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x8}}}, {{@ipv6={@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0xb}}, [0x0, 0x0, 0xffffffff, 0xffffffff], [0xff, 0x0, 0xff000000, 0xff000000], 'veth1_to_batadv\x00', 'erspan0\x00', {}, {}, 0x3a, 0x0, 0x2, 0x1}, 0x0, 0x1f8, 0x238, 0x0, {}, [@common=@unspec=@mark={{0x30, 'mark\x00'}, {0x7, 0x20, 0x1}}, @common=@unspec=@comment={{0x120, 'comment\x00'}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "b3f84325a4d13fb0d53f96f986bcea439fd9a8b90d171a71705c7c8074df"}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6d0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x2) umount2(&(0x7f0000000100)='./file1\x00', 0x0) 04:31:05 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) fsconfig$FSCONFIG_SET_FLAG(r0, 0x6, &(0x7f00000000c0)='posixacl\x00', 0x0, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) fsconfig$FSCONFIG_SET_FLAG(r1, 0x6, &(0x7f00000000c0)='dirsync\x00', 0x0, 0x0) renameat(r0, &(0x7f0000000080)='./file0\x00', r1, &(0x7f0000000280)='./file0\x00') mount(&(0x7f00000002c0)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$batadv(&(0x7f0000000000)='batadv\x00') sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r3, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)={0x14, r4, 0x301, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) pread64(r3, &(0x7f00000001c0)=""/77, 0x4d, 0x7) fsconfig$FSCONFIG_SET_FLAG(r2, 0x6, &(0x7f00000000c0)='posixacl\x00', 0x0, 0x0) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000a80)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000a40)={&(0x7f0000000980)={0x88, 0x0, 0x20, 0x70bd25, 0x25dfdbfb, {}, [@HEADER={0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bond_slave_0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macvlan1\x00'}]}, @HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'hsr0\x00'}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}]}, 0x88}, 0x1, 0x0, 0x0, 0x40800}, 0x280e5) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$batadv(&(0x7f0000000000)='batadv\x00') sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r5, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)={0x14, r6, 0x301, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) fstat(r5, &(0x7f0000000300)) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f0000000000)={0x1, 0x0, [0x0]}) 04:31:05 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) fsconfig$FSCONFIG_SET_FLAG(r0, 0x6, &(0x7f00000000c0)='posixacl\x00', 0x0, 0x0) mmap$fb(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x3000003, 0x4000010, r0, 0x3f000) 04:31:05 executing program 3: r0 = memfd_create(&(0x7f0000001780)='\xd8\x05V\x15\xa5e\xf1\xb8\xf6\xa2\xba\x85\xb95\x03<\xb9;\xcd\x86\x8bD\xf9\xe9L\xe1Q\xfc\xe2\x97\xa0\xe8s\xb2\x11\xef\x1ac\xc9\x89\xc7\x0fv1\xa1:h\xf6\xf5\a\x8c\xf0Ay\x03\x97\xe77\xc1\xc8\xa6\xcb\xd2\xbe\xe9\xd2\xfb{u\xc3\xcd\xba\xa8G`9\xb5\x82\xa9p\xc8)\xe5$b\v\x8e\b\xf4\xf0\x11\xb4\xcb\"\xf4\xf3\xb4|\xdf\xa3\xdd\x9c\x8a\xf4D\xd3\xea\x11c}\x86H\xca=;i\x96\x183h\xba\x1a\x10', 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000380)='/dev/nullb0\x00', 0x0, 0x0) io_setup(0x1, &(0x7f00000004c0)=0x0) io_submit(r4, 0x8, &(0x7f00000000c0)=[&(0x7f0000000140)={0x3a004013, 0x2759, 0x10, 0x0, 0x0, r3, &(0x7f0000000000)="98", 0x3e80000000, 0x0, 0x0, 0x2}]) [ 368.745518][ T23] FS-Cache: Duplicate cookie detected [ 368.751094][ T23] FS-Cache: O-cookie c=00000000c0a8494c [p=00000000a00f4ec0 fl=222 nc=0 na=1] [ 368.760058][ T23] FS-Cache: O-cookie d=0000000035364e0c n=00000000ecf37abc [ 368.768271][ T23] FS-Cache: O-key=[2] 'e9e7' [ 368.773831][ T23] FS-Cache: N-cookie c=000000007cf29cf9 [p=00000000a00f4ec0 fl=2 nc=0 na=1] [ 368.782573][ T23] FS-Cache: N-cookie d=0000000035364e0c n=00000000def5cf85 [ 368.789827][ T23] FS-Cache: N-key=[2] 'e9e7' [ 368.796227][ T12] FS-Cache: Duplicate cookie detected [ 368.801773][ T12] FS-Cache: O-cookie c=00000000c0a8494c [p=00000000a00f4ec0 fl=222 nc=0 na=1] [ 368.803142][T15293] kAFS: unparsable volume name [ 368.810715][ T12] FS-Cache: O-cookie d=0000000035364e0c n=00000000ecf37abc [ 368.810724][ T12] FS-Cache: O-key=[2] 'e9e7' [ 368.810746][ T12] FS-Cache: N-cookie c=00000000b96f6194 [p=00000000a00f4ec0 fl=2 nc=0 na=1] [ 368.810756][ T12] FS-Cache: N-cookie d=0000000035364e0c n=0000000037bb4b6f [ 368.810762][ T12] FS-Cache: N-key=[2] 'e9e7' 04:31:06 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) fsconfig$FSCONFIG_SET_FLAG(r0, 0x6, &(0x7f00000000c0)='posixacl\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r2, 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='bpf\x00', 0x218020, &(0x7f0000000280)={[{@mode={'mode', 0x3d, 0x7}}, {@mode={'mode', 0x3d, 0x9}}, {@mode={'mode', 0x3d, 0xb72daa5}}, {@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x1}}, {@mode={'mode', 0x3d, 0x1}}, {@mode={'mode', 0x3d, 0x9}}, {@mode={'mode', 0x3d, 0x9}}, {@mode={'mode', 0x3d, 0x5}}, {@mode={'mode', 0x3d, 0x7f}}], [{@uid_gt={'uid>', r2}}, {@func={'func', 0x3d, 'FIRMWARE_CHECK'}}, {@context={'context', 0x3d, 'root'}}]}) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) 04:31:06 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0xf) r0 = syz_usb_connect(0x0, 0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="1201000014092108ab12a190eb09000000010902240001000000000904410002ff5d810009050f1f0f0000000009058303e9"], 0x0) syz_usb_ep_write$ath9k_ep2(r0, 0x83, 0x8, &(0x7f0000000240)=ANY=[@ANYBLOB="28cb"]) syz_usb_ep_write$ath9k_ep2(r0, 0x83, 0x0, 0x0) syz_usb_ep_write$ath9k_ep1(r0, 0x82, 0x1408, &(0x7f00000001c0)={[{0xba, 0x4e00, "d929c063fdc77842952ff0b745fe8ea71e5cc5ac9cfbcee0a8dc13d3832027300c1ccf702a34c339bf08a11181fb17d590735d98a1700641a29493fd374f97f220f0e0d62b328714dc017e3bff1a82868e28b640d9f11907e3e2dcc4d3887ca6812dd57b52ef0e9a3c4b7dc42533886a20a0ecb4ff733400fc8d07f51196e08724997edb152c61522bdc4ab137e8cea28ac8f2ed2402ad92d3ba64f103d95f9de1b4bac8cdf2cdd551b829704f3f53df04f684db85b0e3ce7f55"}, {0x7f, 0x4e00, "0beb6b530841ee8ef42e2f4e328a519a7045fa7388190d1f73d883fadc36df5311de9cacaaf58c6a83d2ff26cd70370ba2078f8df5f6bc55f0a304b78066b8cdf913153d259580feaefdfd7e48971195a5faa5d5c5210be608ad706959f73833b8745456c96889e8ff4ce344decc1d198001098f7db70c8c4487276d3885ee"}, {0x87, 0x4e00, "cf8ac28c1370037565aaf116f1e6d0d43591c5648cc3623a6638a820e6a3a8015e613070d7a31c359a97a3722a95c97229c145ceba4fc29afd7b892640248ba7d6d6eb73f3bfc2d60a17b619d95a0487dfb4e4eb5e5f6e8848fc326dada8cc6f3e6d55f487a0b95fbb727a33d9c73ada597876d186127324027f778c125064b15aa3158305c21e"}, {0x6f, 0x4e00, "1ad1a3af96c9f45d9d8031b774dc493aeb226f2cf68300c9bc3b3d77108fa289df8c713ab53d5a75d8a04c03e736b5f029254921044b3948446e3043dc2a9855ac6f8cc481ba94e3f7e9ea8c2cdaccdcc12cf76ae4d6689c505bd71e879498c103cfb2670249061d463a922fc84b4f"}, {0xdc, 0x4e00, "8ee6ce22bf0cf35776bc01b25de05ed0742ad904445f3c0df17685d2971206471b9a5c4af9765af06aef24efc029b2a9cdd8109de8a68f057f8c36843f18037a407f86fe18e99a5acd629d2a79f65e373b91c752a586beac675ed08b6032dc4cba4badd792531ed1d4d4cc348ba0105dd834ece9a8e7f1c5fb7eabc87aab79c2555d109d9bc25600f9a3a6016562329cbcc209d676983ac4c3b66fb9c192e670165faba5a85fd4e4c11ab0928a08aa8c17febade2e6bcf6b47032f6535914f1bb246d62cb917ba12ba5506ccb42882c67add7291548b8d284964b51f"}, {0xdb, 0x4e00, "7c232cc528438da50036ff2bd81b2009fb2af3b64804551b6310d875e53efb6c1bbbdf0692ba1328a3c9f1301e994c1e4fb5a9ff1ed9c5c69c814d6d7856a301e41651dae2a7fe5775793286f78380950f848fb3abf2eff31b2fb68cfb0bf86e9a1b03c41044555dfbe5cfe8161e838bfb48580d9d9f7f1af32ad7846e2a6e011dcb6fc08003da751181387aced400c6ddce63ab327dabc8e4e43561982e6ff2d9b87dbed794ea06482135d321c7fd14431d3580f2d910c4849cceb3f2689c62debbc3fde6957e4d6e2538b7753290cca99d89f0baaf2c8813b9d0"}, {0x1000, 0x4e00, "1f1bd205ddf9c5a7864d6dd92560cea4e9c4f004ca4f8b0d1006138f31e340687af0b6a8f9528d2dd643af2ea3ab4e27d4d2d2f64ec7dc5cf138ea428168b6a0b5645af41e9a20adcb051ed89f4d508674e0844ca82d1abccf1589014416f417544e3d4774feca0469130e0b0ab2914aa3eff8ae54a2155c9c3be14f5f64beb3d1505c573b7bf998815b8c447706d4138fa3b9716ace6ac65a4a73a33577feb0626e12688a2e272f5cac737169e6d937cc0accd191f548c4c563168203f8bd4c66e6070df868bff62bf305b84ed35a515958219ba6908e5cc03b7a0bc8ad6c5761df018e839dbc7e0bc3aa1f51fe6cdd6c5ffa99194d8b4f8c1c3df9d6830943d6646c1964e836c74d024a59e88e9c5306c02b2fde12e6ae4f6e3e32d4a30c971e943db359276029a9d35d1388d48a42cddc225364bb5c63a46e7d74f2591a08e966b8420cae728104500dce039c19492abe0fe60c1d54fedc37d48a1fa37cb5bb0530a0ffee034675e6cf9bbc991cc1cb7dd103c251715c59f4a036546f67b0ac7f6c1cda19cb58e9423c184e8b3dd9d3da4b874af2c3fded9dbf9c1ceceb130efcbf7551716025da83ee3d94669697fc80bdc811894c01f42349f4bed75f30daceefe3226cd8f0c21cd98fb48aef41ccfbf68b9dac14b2e61f0f356edacf6549c8f33d9f6ba1d2b21d365fdbb0c48adbedda49e7913a5cfd25b6d5f6d66d964b6e7dc608d9ce8f29012dbf315052de449c413a7c0f1bb47215e62f8f4927cbc3f999e4ad9dea7b9956b76068a8c5d39432d75be9da1a39396e57fae23cc7f2de2fbade1661a2f2e2f1dda3aca9ce4c98b51056cbfd6921ae8c64c69f23173864fdc3ede0d1c5db4c4910f9eaee47657aac0afbef8bfc134d8876007ffc0196b18125cb564f7f47a0082343e1a3963b827e75bbe3b675bc91d484be81052bf23e2dcf6a226ba08f030b755ee96d735ff4934867a26b2d303a64853253897deae63ac731c6dc8eb614022f54a74f210220d37c438638c9742ca46b39f4733dc192295231069745960d7263863b43ee5f0903395d0b0932fc1d25c06cd7d96126f9ed5565780fc19708719720bcd00d39a018400ebc519e93f33f8431b7ef9db8c44baa3aa23c0646a878ce3502ea9b8023e49540743bf9aab613627f0ed4ff27b395c15af8a55926fde48da8f84e1a3452d8c9d42ba2b02e0e20eab327b6eca5b104cf743e02c4b724f9e64d553b771df8902da1ffc77f144a8a7be59df78566f9b76063224fb4a5e6ab9cffd5093ece73d4d58986b2b323b61e7c159dfcab7fa23bc1826a56387a0d9ea2885b9a4f56b04d14dc8877697cc7d795940165222e6524334855a6b2a317090041cb704a4868b83d8a833739e7abb53984c30f00ce818cef575d5190b3b668bdbac4314d119cdeb19d24ca953233cc0f80732756fd5bc8788bce6c2e0c7f0b6255d26d715ea6b7b567efc411b5bb526655f81b00e8078ffc637b944161b0cdcf38bba7316ab3bbd648e7b6eeec65b8ad3c10d250e448162234ac160dabc7ed733d30d25fda148edea9ec3302574cb4b9847f66e466a2cf9fd1aef931da303cdf1c0479943041f33f4c8459b737cd0b2876977c063a179274da3ee942196a01ebe48d63ca1999d013493e3d89ed143ea57e3b9dfc1dfe2eb2eceb29a5961593c129be6c494435b3928d7fd378e607726541ac72d2b453743af5ad4d53b6c5d7d1808348cb9cda701f23d351b9002c8d0a7f3dcd07fcca8d8393da027fd9efcef91a275a4b834df648d30dd30e21873b273fc0ef238b3e6c48d308c45a983ea82af8ede6874a91a42f1bf7fc9c6971043eb6df4f5857986ee87c437d7b25b8eaa60da5191d20bb84d3839b45096d061c06c3acf868c39306ecdddf2c4cfc5fc93fe980fe3159e782742e3ede122ad188594a1691f859c869f356b9adca0bc8e3d475548c9f857ee3de5b234c8d251ab46d960ca131597bec2ee1888aa060b09b402b6132fc2a1facd3e9153893f92ccc81f9b98d8a7eaf5a2b0bef976487d1a1e79ecc56d14ef6c703de8e9c58b3b6ff47e8dfab11fb480427d18f438a9ce0eec0ba7d2390cb4480153abc2c619d4141bd6f7809aec4543bd3427388f7a0abc88cdf897c9b7ad19f170a468e2635f76ce49617d3d9edbf0e78b229464d1cc02ac482d90f46d4d95348d04a7240216fd43d2b5e0f15ed6fc5ec85c1aa9fb37271450a262998c010d5f86cb37c6527dbf26e6a1ca6e79eadabdb31d42bf8c0d6c4d6caf4f90904a144a310a8745f80c86e49b210d6fc8d21600d439b6deb923634de2cb787f09e107ed1e21bca63855d2e39cc915475a7157b4659ef65ae3df2e9ed293d3d0be51452341698777706185dd851fdb117454142e07fff23e35be69f09b1cb18679f0c8e04173ef1eeb03b8b256604b1bc741e9599b1d8c07689f0951c4b6173dc52ef8750ac2a477b58a708645737845da75eb85a5423fe46cc9f2c264bd34323479467841280fc760bdf5047c87c86999aa9848b0233eb243bc9b895a30260170fa0519bf786a12d548f256b70f4acc399481348f51e9d2806f94155c17429acf05d8fe8c0d77baacb417cf183d72d26634e9369d36e335555f5d50c96c4672a3595f57ee904e34d7ffbfe0396ba18854871ea18acd4020c9d28f367369998218d31517b053f37d65c9674eabd7c10df880cf9fa146097f01b70043bdfe6ae74302ce8fee19ef8d3b559f8ad9922a6019feb01301443e573d6cf574758502f0afec7b5701e5e124eb5e440ea2043c4713009ffe5bdc409fdb694100179f3a4363a57fcf0bcfe66e5903d5e2c28ed93cd583f1d69d936cba72bf3e733c58a34af7d5331a2708cb7f873992025dfd85ec1d2a2c07374a9e48448adc6ef131e4ed58f61ac621a9e8b9fda3b10a1744e135b6013c8222b3b113d0d424fe0e9948577071a5e4d0422803b6948b7b1cdca23ed012b31d15b48ce1c5694cd5c7b0073a8f703659daf6195684dc1da6b23699e55e9430ea7a83051000ea9c080dca601ec5e9cb9bb621f15247c71661fc546af8590521ed63dafdfeb48cddc7f11e714d0ef5e0565ae90c5becb0ddf6e5886ce4d22db071ad30d97b9aa7930c3a1932caba3e48f11d888a2653c44180a572e4cbc2c5fd5f90b8b49a484e9c26ca2a8336282aedae20187278e5ae4cedd92ce684c4cb69e56e022aca3d77a2b876966f879e1aa74340250add2c089cb393077a179f0bf34b1a2937013de12a3d2f1f740fdcd61a7d7b1669795bfd3d22cf3c5dac2f325fa5e3bda15148f70575c03e82b664ae864744d73b669e515a7a6186ef12cd6c075b37103684cda966e028410ed6b8268b0435258bfdafba7db96d8019a0d527b8e68d09a86d03206577d6e8481adf63bdf062d495da68f3315317589699a3572e4afd900471c1dbec62794eff29fe31f3bdfaeb85aaa2cc5bf60563e0e771f83c7d9d4e1e61ab4a01a7533c0b003e3175af11eb75b17b4a87cc77eba18751c8dfc3ce6da953f8e30ab4fa4f050d9ee7edbda384362a63bf9d480e9b288bb6f7ba8ee42987743ff5f20adc44142997835b47ff5d9f661fdd027c4a910679865e2da8877e7c484a117d024896082a041a6305310b4e126f71ffdc315b5697006cd46649cba634e2ad0d54c1f98fc151aef16b75ca1c0a552ed9c804997b583a668523dab191ae25ccd496d314c1d6f800763e54029fbdbe6fbbb4ddbe2d1bf0e43dc24ed36dc0787c196efb526d72a6efedea9065c39600c43a7cccc82e0e1c0be5d0a413e876be8de14ffc5fa0071b494c0e9d1593bb164d56f93f1b7ddf4ca14f197287dd5b13ffa213a60cae7057a8420763a694a34dc8e0c3eded1159a46f1be02216fb769c07528596d7fa77611d6495f5bfcff12b1f44f71955376e02c0d55188a172eaa741878e567fd83781a75e0567f07574351decd7833928f6475804f888d8c92a0db2d93c958d5bb0b7cf4f4b210194d00c8ba222853d51cafff179f3bde5a59660fb98c9f6c4918ec1fe0b048ecc349be33f8ad681a87e448ccb846f6da084598207d7406e64210972e1a9d548e59ebda6b28067ae4d2c60d2eb4b90579b03cdaee89cead451cdf9f21b51a8d8b85cc9cdb5aed8ab490e9ca4f695c19841c71c9d1639fabb5f7e92bca2533ab7ef8a76d8090852c6db727d632294731ed3aa61647d2d7f4a4de225f5c7a5843f0e757d0581a90fa3bfbd7398109edf111c03a7c3a330c7bc3607e0bd526f7ec4c7f15479dd6a69ee2d619dce9f6852260a3181cd0781be36088f2590067ec03d1e5c25a703378cf247575a2fbe14eb53866220be36c530038e495737ccf726d3fe8a3474858f41283704ad7987931db8da659db30740ac618a3af0b2ddaf1d87f4100955fe43a7552f4058767c7cef2e16406481d53a671a95d205d7d81383bcfd06a426847421e164edb757a08a2143c52dd8df23b4c8fda677207b45e07c9b95bd633faeb4de462af8de66d681ab648efd3f76cb0a60d22b0a603ba6521b9bb44c2c4b66ee3e9426b7a8f941c63dec498db043ac9fdb6788a26a7de950f875ae9158d120320b3d7759e30a2399f457acdefdf91ef0a4621122546385fb3f44e4b2146bfe1ffd8fda3413fca3331392bd4eafe25b1d66b98e348ce71a9df567c9b557cf2400c0d9b3d7cbd6df1ff1580a6960254926dd9990c7bf0271c58891e829afe9af0aa32d14e7edc653bd293dcf75264bc71b262912ae75bade2d98cd78cb80bd080e59f198e83db1982f37cefadeb75add8caa173d56d1ffd481e4efa38a75827ebcbd90439c296decc09c5c762704670fc109bf3d159586a6ebbb32d8953a64815649f64f716721e539ae62313c1e6ed868bb92d7a9bacc61db0067a91ae06ef1a18c09407f972bc005bfbc100dde2422b74ca2c5202a8a93170f137b073462c4044e2893f98555b989a893897c30416e0b066cfb715bfe6bdc62bca4769ca397f79bfd60add74af95793710bf15f3aa5f8cb4cfe7ce0b64fddeaf32d3416b8eabdd4323bfba7af8b8dbcd9023b29d4fca35b0ebbe9dd937c534effcd877ee1de58ca9d47045fcfa140d6a4959fed432a66b6e92505953035d271e12f23eef3b630f9439ab07d0523304392fefa98983ec6446280ce783430686c461b2085ca826a8ef17e87869014cfd56b41d448bc47aec04be99ac3e65503949ae6aa9b99e650e940b3ea9f2d19b4949598765841a52db7c431402434c102b192724a821cb27fbddae330203749510916a81dacb59958bc21eb56476f3f43c2bcb2c42452a85498a1907c77cb14c45ac44143d668279cf1e49fb464cb3636154e40fcabdf063c413155c9d822700740f1b9d3ed67be08d9c707d0e98dad04e347cd284cb618e49ce1f4a766227c8dca3480dd77b358c6156ce49669910084036b6a6b0c5a0707d0c268aee4012d70bafbcecb809de272badbcfab77d5cae085cb56b9fbeb6317e6911d48f2487349652f2fdf164a011cfa878817a7879328981d5856c9cc990f90083a4c95575431b076bf8b45cee16ff41fb92d99f8559d51bd84f1bde7b6fadbe523c76117937e3164100cf662a50c7a0bef29a57d4aa2721d61292350500f2f50bc7f01cc63f8d1bc7139956fa95c96eb31b52004b92e40aca12d901b6256f8ffce04b4242fdb9038e3c73b3423a203d5c735f31eb6dff733698bb857be71934155f6d659f4e498568a6f6b8447b1df28db109649fd706eea0c9a42df094a122a369efca99"}]}) mount(&(0x7f0000000080)=ANY=[@ANYBLOB="e8b574bfe1a28297e62b9559206383994a92"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x44040, 0x0) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f00000000c0), &(0x7f0000000100)=0x30) 04:31:06 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) fsconfig$FSCONFIG_SET_FLAG(r0, 0x6, &(0x7f00000000c0)='posixacl\x00', 0x0, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r0, 0x110, 0x2, &(0x7f0000000000)='\'^-)%!\'!--{.!\\$]\\\x00', 0x12) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) [ 369.034954][T15299] kAFS: unparsable volume name 04:31:06 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, 0x0, &(0x7f00000001c0)) socket(0x0, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000200)={0x0, 'veth1_macvtap\x00'}) 04:31:06 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) fsconfig$FSCONFIG_SET_FLAG(r0, 0x6, &(0x7f00000000c0)='posixacl\x00', 0x0, 0x0) ioctl$VIDIOC_ENUM_FRAMESIZES(r0, 0xc02c564a, &(0x7f0000000100)={0x1, 0xebedd9dc, 0x1, @stepwise={0x8c, 0x2, 0x4, 0x40, 0x9, 0x2db}}) r1 = openat(r0, &(0x7f0000000000)='./file0\x00', 0x50dc2, 0x99) write$bt_hci(r1, &(0x7f0000000080)={0x1, @remote_name_req_cancel={{0x41a, 0x6}}}, 0xa) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) 04:31:06 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f00000002c0)='./file0\x00', 0x138) mount(&(0x7f0000000380)=ANY=[@ANYBLOB="23e90500f8420eed84bbd3ceef34a2264e68eeec0d0000a19adfe777cbaefb1db9068ee5d0c5efddb8f87aa29b560a6570ccc7b3fdf62acd8549bb523db86f71f6aa11027f0966732a0957100cba8aa46ae29775e7dceee1422873467059b8ec16e33cb0db1e27a223049a0e562b7a48a6834c578948c66df667a3fbdd9bc0bbe9981dda7a42b18fa4ac16529b858594931b37f6253a80c5712ea723e5f45f3f4ed6842ed72b352ad18cfcb6e6c3bc066b547f2c371575cb70758918fa2b414d1ae8804a59bb7eccaeeeadbc9cf2a8a3095fb6fe138a52550c0f9406b7f763e52536c3de108c7086"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) truncate(&(0x7f0000000300)='./file0\x00', 0x800) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000280)='/proc/self/net/pfkey\x00', 0x2f4182, 0x0) fsconfig$FSCONFIG_SET_FLAG(r0, 0x6, &(0x7f00000000c0)='posixacl\x00', 0x0, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$batadv(&(0x7f0000000000)='batadv\x00') ioctl$sock_SIOCDELDLCI(r0, 0x8981, &(0x7f0000000240)={'veth1_to_team\x00', 0x100}) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r1, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)={0x14, r2, 0x301, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') sendmsg$NL80211_CMD_NEW_INTERFACE(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x14, r4, 0x405, 0x0, 0x0, {0x7e}}, 0x14}}, 0x0) sendmsg$NL80211_CMD_GET_MPP(r1, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f00000001c0)={&(0x7f0000000100)={0x14, r4, 0x8, 0x70bd27, 0x25dfdbfc}, 0x14}, 0x1, 0x0, 0x0, 0x8000}, 0x4000000) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) fsconfig$FSCONFIG_SET_FLAG(r5, 0x6, &(0x7f00000000c0)='posixacl\x00', 0x0, 0x0) r6 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) fsconfig$FSCONFIG_SET_FLAG(r6, 0x6, &(0x7f00000000c0)='posixacl\x00', 0x0, 0x0) pidfd_getfd(r6, 0xffffffffffffffff, 0x0) ioctl$VHOST_GET_VRING_BASE(r5, 0xc008af12, &(0x7f0000000480)) [ 369.348647][ T7440] usb 2-1: new high-speed USB device number 2 using dummy_hcd [ 369.483090][T15332] kAFS: No cell specified [ 369.503548][T15332] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 369.533296][T15332] kAFS: No cell specified [ 369.553883][T15332] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 369.607662][ T7440] usb 2-1: Using ep0 maxpacket: 8 [ 369.728413][ T7440] usb 2-1: config 0 has an invalid interface number: 65 but max is 0 [ 369.736522][ T7440] usb 2-1: config 0 has no interface number 0 [ 369.767919][ T7440] usb 2-1: config 0 interface 65 altsetting 0 endpoint 0xF has an invalid bInterval 0, changing to 7 [ 369.797639][ T7440] usb 2-1: config 0 interface 65 altsetting 0 endpoint 0x83 has an invalid bInterval 0, changing to 7 [ 369.827674][ T7440] usb 2-1: New USB device found, idVendor=12ab, idProduct=90a1, bcdDevice= 9.eb [ 369.836736][ T7440] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 369.858956][ T7440] usb 2-1: config 0 descriptor?? 04:31:07 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket(0x10, 0x3, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$inet_udp(0x2, 0x2, 0x0) close(r5) sendto$llc(0xffffffffffffffff, &(0x7f0000000140)="7653bbc6175a3d2b8b43d6fab096eaaa30", 0x11, 0x0, 0x0, 0x0) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88882, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0x2}) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @loopback}}) write$binfmt_misc(r4, &(0x7f0000000140)=ANY=[], 0x1000000c8) splice(r3, 0x0, r5, 0x0, 0x0, 0x0) 04:31:07 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, 0x0, &(0x7f00000001c0)) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) fsconfig$FSCONFIG_SET_FLAG(r0, 0x6, &(0x7f00000000c0)='posixacl\x00', 0x0, 0x0) ioctl$VIDIOC_G_SLICED_VBI_CAP(r0, 0xc0745645, &(0x7f0000000080)={0x2, [0x0, 0x2, 0x8, 0x800, 0x5, 0x9, 0x7f, 0x4, 0x7, 0x2, 0x9, 0x3, 0x3, 0x2, 0x408, 0xffe1, 0x8001, 0x2, 0x1ff, 0xfff9, 0x31a, 0x9, 0x0, 0x7ee2, 0x40, 0x7, 0x1, 0x7, 0x6, 0xfffb, 0x3, 0x7, 0x3f, 0x7, 0x3, 0x7fff, 0x4, 0x0, 0x8, 0x81, 0xe49, 0x1, 0xcd9e, 0x0, 0x1, 0x4, 0x6, 0x8f], 0x3}) socket(0x0, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000200)={0x0, 'veth1_macvtap\x00'}) 04:31:07 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffdfffff, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e736"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x10, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) fsconfig$FSCONFIG_SET_FLAG(r0, 0x6, &(0x7f00000000c0)='posixacl\x00', 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCDARP(r1, 0x8953, &(0x7f0000000240)={{0x2, 0x0, @private=0x5}, {0x0, @link_local}, 0x0, {0x2, 0x0, @dev}}) ioctl$sock_inet_SIOCSARP(r1, 0x8955, &(0x7f00000002c0)={{0x2, 0x4e21, @multicast1}, {0x1, @remote}, 0xd2, {0x2, 0x4e24, @loopback}, 'wg0\x00'}) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000000000)='batadv\x00') sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r2, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=ANY=[@ANYBLOB="14000000", @ANYRES16=r3, @ANYBLOB="41030000000189896349efcf7f8aef076707e6000000000a000000"], 0x14}}, 0x0) ioctl$VIDIOC_TRY_EXT_CTRLS(r0, 0xc0205649, &(0x7f00000000c0)={0xf000000, 0xb48c, 0x4, r2, 0x0, &(0x7f0000000080)={0x9b090c, 0x9, [], @p_u32=&(0x7f0000000000)=0x8}}) ioctl$VIDIOC_TRY_DECODER_CMD(r4, 0xc0485661, &(0x7f00000001c0)={0x1, 0x1, @start={0x7, 0x1}}) 04:31:07 executing program 3: r0 = memfd_create(&(0x7f0000001780)='\xd8\x05V\x15\xa5e\xf1\xb8\xf6\xa2\xba\x85\xb95\x03<\xb9;\xcd\x86\x8bD\xf9\xe9L\xe1Q\xfc\xe2\x97\xa0\xe8s\xb2\x11\xef\x1ac\xc9\x89\xc7\x0fv1\xa1:h\xf6\xf5\a\x8c\xf0Ay\x03\x97\xe77\xc1\xc8\xa6\xcb\xd2\xbe\xe9\xd2\xfb{u\xc3\xcd\xba\xa8G`9\xb5\x82\xa9p\xc8)\xe5$b\v\x8e\b\xf4\xf0\x11\xb4\xcb\"\xf4\xf3\xb4|\xdf\xa3\xdd\x9c\x8a\xf4D\xd3\xea\x11c}\x86H\xca=;i\x96\x183h\xba\x1a\x10', 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000380)='/dev/nullb0\x00', 0x0, 0x0) io_setup(0x1, &(0x7f00000004c0)=0x0) io_submit(r4, 0x8, &(0x7f00000000c0)=[&(0x7f0000000140)={0x3a004014, 0x2759, 0x10, 0x0, 0x0, r3, &(0x7f0000000000)="98", 0x3e80000000, 0x0, 0x0, 0x2}]) 04:31:07 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000000)='batadv\x00') sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=ANY=[@ANYBLOB="14000000", @ANYRES16=r1, @ANYBLOB="010300"/14], 0x14}}, 0x0) mount(&(0x7f0000000280)=ANY=[@ANYBLOB="fc5fee63da87810cad13ac050590edc7c953b3e49fa90d268b84840bafbb2ab90ccd3e9a0a98587dd6f18a78626930f21dce634f0d35b1d2a0c5071e8253088eb35fb3660d7f892c3f3d6ee3644356208d8b54806611d3371d0873c0f23a0efcdb6396950ae58d539c4695d9696bb294658e149be7a24fbf6653cc94ea4db47a0608047fcf90445363e6830b5426323a9dbed2c284dfca997a8508f43d124ec23f83557d36dda52c88953987"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='vxfs\x00', 0x0, 0x0) [ 370.121574][ T2576] input: Generic X-Box pad as /devices/platform/dummy_hcd.1/usb2/2-1/2-1:0.65/input/input5 [ 370.143320][T15359] kAFS: No cell specified 04:31:07 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x2000, 0x100) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000080)={'bridge0\x00', {0x2, 0x4e20, @multicast2}}) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f00000000c0)=0x9, 0x4) [ 370.282631][T15374] kAFS: No cell specified 04:31:07 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, 0x0, &(0x7f00000001c0)) socket(0x26, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000200)={0x0, 'veth1_macvtap\x00'}) 04:31:07 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000000)='batadv\x00') sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)={0x14, r1, 0x301, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) r2 = gettid() ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x17) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) pipe(&(0x7f0000000080)={0xffffffffffffffff}) write$P9_RLINK(r3, &(0x7f00000000c0)={0x7, 0x47, 0x2}, 0x7) fcntl$lock(r0, 0x25, &(0x7f0000000000)={0x3, 0x1, 0x5, 0x3, r2}) mount(&(0x7f0000000140)=ANY=[@ANYRES64=r2], &(0x7f00000001c0)='./file1\x00', &(0x7f0000000040)='cgroup\x00', 0x828c12, 0x0) 04:31:07 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) mount(&(0x7f0000000000)=ANY=[@ANYBLOB="23e9e78d4c912c9c4af3d45ecd950e183a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) 04:31:07 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) fsconfig$FSCONFIG_SET_FLAG(r0, 0x6, &(0x7f00000000c0)='posixacl\x00', 0x0, 0x0) ioctl$KVM_ARM_SET_DEVICE_ADDR(r0, 0x4010aeab, &(0x7f0000000000)={0x1, 0x1000}) [ 370.562863][ T7967] usb 2-1: USB disconnect, device number 2 [ 370.577767][ C1] xpad 2-1:0.65: xpad_irq_out - usb_submit_urb failed with result -19 [ 370.586734][ C1] xpad 2-1:0.65: xpad_irq_in - usb_submit_urb failed with result -19 04:31:07 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, 0x0, &(0x7f00000001c0)) r0 = socket(0x0, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(r0, 0x8982, &(0x7f0000000000)={0x0, 'bond_slave_1\x00', {0x3}, 0x7}) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000200)={0x0, 'veth1_macvtap\x00'}) [ 370.680409][T15390] kAFS: unable to lookup cell 'éçL‘,œJóÔ^Í•' 04:31:08 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000080)=ANY=[@ANYBLOB="23e9e73abcb2a5474b3b6906e33bb50b32fc4da696fb6a126ad9212e4e911150edbcc742e4504cd206d0c9a2a430c2cbdd2c022fdeac6f6bc79e15d2722ee4190375f136a46d3d81d2"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) 04:31:08 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x32a140, 0x0) fsconfig$FSCONFIG_SET_FLAG(r0, 0x6, &(0x7f00000000c0)='posixacl\x00', 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r0, 0x4010ae67, &(0x7f0000000000)={0x6000, 0x8000}) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) fsconfig$FSCONFIG_SET_FLAG(r1, 0x6, &(0x7f00000000c0)='posixacl\x00', 0x0, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r1, 0x28, 0x0, &(0x7f0000000080)=0x8, 0x8) mount(&(0x7f0000000240)=ANY=[@ANYRESDEC], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x800000, 0x0) r2 = socket$inet(0x2, 0x5, 0x1) connect(r2, &(0x7f00000001c0)=@un=@abs={0x1, 0x0, 0x4e21}, 0x80) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x400, 0x0) ioctl$sock_inet_SIOCSARP(r3, 0x8955, &(0x7f0000000280)={{0x2, 0x4e21, @private=0xa010101}, {0x1, @remote}, 0x0, {0x2, 0x4e20, @initdev={0xac, 0x1e, 0x0, 0x0}}, 'ip_vti0\x00'}) 04:31:08 executing program 4: r0 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x2, 0x80010, 0xffffffffffffffff, 0x0) syz_io_uring_complete(r0) mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r1, 0x0) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r3, 0x0) r4 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r5, 0x0) r6 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r7, 0x0) r8 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r8, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r9, 0x0) stat(&(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='system.posix_acl_default\x00', &(0x7f0000000280)={{}, {0x1, 0x8}, [{0x2, 0x3, r1}, {0x2, 0x1, r3}, {0x2, 0x6, r5}, {0x2, 0x5, r7}, {0x2, 0x0, 0xee00}, {0x2, 0x2, r9}], {0x4, 0x1}, [{0x8, 0x1, 0xee00}, {0x8, 0x7, r10}], {0x10, 0x4}}, 0x64, 0x0) 04:31:08 executing program 3: r0 = memfd_create(&(0x7f0000001780)='\xd8\x05V\x15\xa5e\xf1\xb8\xf6\xa2\xba\x85\xb95\x03<\xb9;\xcd\x86\x8bD\xf9\xe9L\xe1Q\xfc\xe2\x97\xa0\xe8s\xb2\x11\xef\x1ac\xc9\x89\xc7\x0fv1\xa1:h\xf6\xf5\a\x8c\xf0Ay\x03\x97\xe77\xc1\xc8\xa6\xcb\xd2\xbe\xe9\xd2\xfb{u\xc3\xcd\xba\xa8G`9\xb5\x82\xa9p\xc8)\xe5$b\v\x8e\b\xf4\xf0\x11\xb4\xcb\"\xf4\xf3\xb4|\xdf\xa3\xdd\x9c\x8a\xf4D\xd3\xea\x11c}\x86H\xca=;i\x96\x183h\xba\x1a\x10', 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000380)='/dev/nullb0\x00', 0x0, 0x0) io_setup(0x1, &(0x7f00000004c0)=0x0) io_submit(r4, 0x8, &(0x7f00000000c0)=[&(0x7f0000000140)={0x3a004015, 0x2759, 0x10, 0x0, 0x0, r3, &(0x7f0000000000)="98", 0x3e80000000, 0x0, 0x0, 0x2}]) 04:31:08 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000000)='batadv\x00') sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)={0x14, r1, 0x301, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f0000000000)={0x6, 0x4, 0x5, 0x1ff, 0x8000}) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) 04:31:08 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) fsconfig$FSCONFIG_SET_FLAG(r0, 0x6, &(0x7f00000000c0)='posixacl\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r0, 0x54a2) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x9, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') sendmsg$NL80211_CMD_NEW_INTERFACE(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x14, r2, 0x405, 0x0, 0x0, {0x7e}}, 0x14}}, 0x0) sendmsg$NL80211_CMD_SET_KEY(r0, &(0x7f0000000340)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000300)={&(0x7f0000000100)={0x18, r2, 0x800, 0x70bd26, 0x25dfdbfc, {}, [@NL80211_ATTR_KEY_SEQ={0x4}]}, 0x18}, 0x1, 0x0, 0x0, 0x840}, 0x20040000) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, 0x0, &(0x7f00000001c0)) socket(0x0, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000200)={0x0, 'veth1_macvtap\x00'}) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) fsconfig$FSCONFIG_SET_FLAG(r3, 0x6, &(0x7f00000000c0)='posixacl\x00', 0x0, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r3, 0x29, 0x41, &(0x7f0000000280)={'raw\x00', 0x2, [{}, {}]}, 0x48) r4 = fsmount(r3, 0x0, 0x78) setsockopt$RXRPC_MIN_SECURITY_LEVEL(0xffffffffffffffff, 0x110, 0x4, &(0x7f0000000380)=0x2, 0x4) write$FUSE_WRITE(r4, &(0x7f0000000000)={0x18, 0xfffffffffffffff5, 0x2, {0xe5}}, 0x18) 04:31:08 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, 0x0, &(0x7f00000001c0)) r0 = socket(0x0, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(r0, 0x8982, &(0x7f0000000000)={0x0, 'bond_slave_1\x00', {0x3}, 0x7}) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000200)={0x0, 'veth1_macvtap\x00'}) [ 371.360684][ T12] FS-Cache: Duplicate cookie detected [ 371.363567][T15422] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 371.366142][ T12] FS-Cache: O-cookie c=0000000027e67e61 [p=00000000a00f4ec0 fl=222 nc=0 na=1] [ 371.384548][ T12] FS-Cache: O-cookie d=0000000000000000 n=0000000000000000 [ 371.391847][ T12] FS-Cache: O-key=[2] 'e9e7' [ 371.396458][ T12] FS-Cache: N-cookie c=00000000d9113997 [p=00000000a00f4ec0 fl=2 nc=0 na=1] [ 371.405226][ T12] FS-Cache: N-cookie d=0000000035364e0c n=00000000ec1b70c0 [ 371.412507][ T12] FS-Cache: N-key=[2] 'e9e7' [ 371.433971][T15425] kAFS: unparsable volume name 04:31:08 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="8543e9e7"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) 04:31:08 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffdfffff, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e736"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x10, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) fsconfig$FSCONFIG_SET_FLAG(r0, 0x6, &(0x7f00000000c0)='posixacl\x00', 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCDARP(r1, 0x8953, &(0x7f0000000240)={{0x2, 0x0, @private=0x5}, {0x0, @link_local}, 0x0, {0x2, 0x0, @dev}}) ioctl$sock_inet_SIOCSARP(r1, 0x8955, &(0x7f00000002c0)={{0x2, 0x4e21, @multicast1}, {0x1, @remote}, 0xd2, {0x2, 0x4e24, @loopback}, 'wg0\x00'}) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000000000)='batadv\x00') sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r2, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=ANY=[@ANYBLOB="14000000", @ANYRES16=r3, @ANYBLOB="41030000000189896349efcf7f8aef076707e6000000000a000000"], 0x14}}, 0x0) ioctl$VIDIOC_TRY_EXT_CTRLS(r0, 0xc0205649, &(0x7f00000000c0)={0xf000000, 0xb48c, 0x4, r2, 0x0, &(0x7f0000000080)={0x9b090c, 0x9, [], @p_u32=&(0x7f0000000000)=0x8}}) ioctl$VIDIOC_TRY_DECODER_CMD(r4, 0xc0485661, &(0x7f00000001c0)={0x1, 0x1, @start={0x7, 0x1}}) [ 371.617634][T15425] kAFS: unparsable volume name 04:31:08 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) bpf$ENABLE_STATS(0x20, 0x0, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f0000000040)=[{0x28, 0x0, 0x0, 0xfffff038}, {0x6}]}, 0x10) syz_emit_ethernet(0x3a, &(0x7f0000000080)=ANY=[], 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) r1 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r3, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$batadv(&(0x7f0000000000)='batadv\x00') sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r4, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)={0x14, r5, 0x301, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) fstat(r4, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuseblk(&(0x7f0000000000)='/dev/loop0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='fuseblk\x00', 0x10, &(0x7f0000000300)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id', 0x3d, r3}, 0x2c, {'group_id', 0x3d, r6}, 0x2c, {[{@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@allow_other='allow_other'}], [{@appraise='appraise'}]}}) write$P9_RREADDIR(r1, &(0x7f0000000080)={0x4f, 0x29, 0x2, {0x4, [{{0x1}, 0x1, 0x40, 0xd, './file0/file0'}, {{0x10, 0x0, 0x3}, 0x96a6, 0x45, 0x7, './file0'}]}}, 0x4f) 04:31:08 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000080)=ANY=[@ANYBLOB="00e9e73a74e9a1fbc701cb438d89edcce59bec9b68fc1d6ddf7fdf577fe86ad8cb8d4bc75e071642196eec0f75a2eea443e6e5449c15a3f31b87e942d6b888355abe490a26e59b9a9025416d8a6bc4c93ea5342ed18dea5a4f7903357e4719cc04e1895df581"], &(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000040)='afs\x00', 0x221085, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, 0x0, &(0x7f00000001c0)) r0 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x1000001, 0x11, 0xffffffffffffffff, 0x8000000) syz_io_uring_submit(r0, 0x0, 0x0, 0x0) r1 = syz_io_uring_complete(r0) sendmsg$SOCK_DIAG_BY_FAMILY(r1, &(0x7f0000000280)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000240)={&(0x7f0000000180)={0x14, 0x14, 0x800, 0x70bd2d, 0x25dfdbff, {0x4, 0x5}}, 0x14}}, 0x0) socket(0x4, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000200)={0x0, 'veth1_macvtap\x00'}) 04:31:08 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) r0 = syz_genetlink_get_family_id$batadv(&(0x7f0000000000)='batadv\x00') sendmsg$BATADV_CMD_GET_MCAST_FLAGS(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)={0x14, r0, 0x301, 0x70bd27, 0x0, {0xa}}, 0x14}}, 0x0) mount(&(0x7f0000000000)=ANY=[@ANYRESDEC=r0], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) [ 371.784802][T15446] kAFS: unparsable volume name [ 371.828979][T15450] kAFS: unparsable volume name [ 371.830123][T15447] kAFS: No cell specified 04:31:09 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000080)=ANY=[@ANYBLOB="2371a2f6556776175c728bd1ebf828149708465ca3060016d2e544d222ec5ccfd324cfa34da5f18029fdaf8195dac461a094b7069201768d1a8b0733dbc3618366fdcebfa2e719cc481561ce65dba5a7dd6da1b8ec7965aa02cc21c5b81f8b03f2d7bf99dc164738b00aae5dfd663c333d23"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) 04:31:09 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="f24558df"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, 0x0, &(0x7f00000001c0)) socket(0x0, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000200)={0x0, 'veth1_macvtap\x00'}) [ 371.992897][T15458] kAFS: unparsable volume name 04:31:09 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, 0x0, &(0x7f00000001c0)) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) fsconfig$FSCONFIG_SET_FLAG(r0, 0x6, &(0x7f00000000c0)='posixacl\x00', 0x0, 0x0) ioctl$VIDIOC_G_SLICED_VBI_CAP(r0, 0xc0745645, &(0x7f0000000080)={0x2, [0x0, 0x2, 0x8, 0x800, 0x5, 0x9, 0x7f, 0x4, 0x7, 0x2, 0x9, 0x3, 0x3, 0x2, 0x408, 0xffe1, 0x8001, 0x2, 0x1ff, 0xfff9, 0x31a, 0x9, 0x0, 0x7ee2, 0x40, 0x7, 0x1, 0x7, 0x6, 0xfffb, 0x3, 0x7, 0x3f, 0x7, 0x3, 0x7fff, 0x4, 0x0, 0x8, 0x81, 0xe49, 0x1, 0xcd9e, 0x0, 0x1, 0x4, 0x6, 0x8f], 0x3}) socket(0x0, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000200)={0x0, 'veth1_macvtap\x00'}) [ 372.142877][T15463] kAFS: No cell specified [ 372.163561][T15466] kAFS: No cell specified [ 372.205370][T15464] kAFS: unparsable volume name 04:31:09 executing program 3: r0 = memfd_create(&(0x7f0000001780)='\xd8\x05V\x15\xa5e\xf1\xb8\xf6\xa2\xba\x85\xb95\x03<\xb9;\xcd\x86\x8bD\xf9\xe9L\xe1Q\xfc\xe2\x97\xa0\xe8s\xb2\x11\xef\x1ac\xc9\x89\xc7\x0fv1\xa1:h\xf6\xf5\a\x8c\xf0Ay\x03\x97\xe77\xc1\xc8\xa6\xcb\xd2\xbe\xe9\xd2\xfb{u\xc3\xcd\xba\xa8G`9\xb5\x82\xa9p\xc8)\xe5$b\v\x8e\b\xf4\xf0\x11\xb4\xcb\"\xf4\xf3\xb4|\xdf\xa3\xdd\x9c\x8a\xf4D\xd3\xea\x11c}\x86H\xca=;i\x96\x183h\xba\x1a\x10', 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000380)='/dev/nullb0\x00', 0x0, 0x0) io_setup(0x1, &(0x7f00000004c0)=0x0) io_submit(r4, 0x8, &(0x7f00000000c0)=[&(0x7f0000000140)={0x3a004016, 0x2759, 0x10, 0x0, 0x0, r3, &(0x7f0000000000)="98", 0x3e80000000, 0x0, 0x0, 0x2}]) 04:31:09 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="2329e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) 04:31:09 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x528c494f0b75130}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_init_net_socket$nl_rdma(0xffffffffffffffff, 0x3, 0x14) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) [ 372.241515][T15464] kAFS: unparsable volume name 04:31:09 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000240)={{0x2, 0x0, @private=0x5}, {0x0, @link_local}, 0x0, {0x2, 0x0, @dev}}) sendto$inet(r0, &(0x7f0000000080)="4f1096b47207b053f2e1455fdeadd998281753247e4611e52a4b2afc6559dc14a724d4dc39aac4e0356b2595eaf8f52cba52fb0db1b1f6f853d892d4d5546376d075ef6b7a7e917bbb40a42b6ad2625ee29d4bd8ed0495a263e7295cd91ecf63764c7b2f7d4756276375d50c59951f78ddc041deb9e7705df79e9e057103d2f4e403ca", 0x83, 0x80d8, &(0x7f0000000000)={0x2, 0x4e24, @multicast2}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCDARP(r1, 0x8953, &(0x7f0000000240)={{0x2, 0x0, @private=0x5}, {0x0, @link_local}, 0x0, {0x2, 0x0, @dev}}) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=@newqdisc={0x138, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_gred={{0x9, 0x1, 'gred\x00'}, {0x108, 0x2, [@TCA_GRED_STAB={0x104, 0x2, "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"}]}}]}, 0x138}}, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f00000002c0)={'erspan0\x00', &(0x7f00000001c0)={'syztnl1\x00', r3, 0x8000, 0x8, 0x4, 0x4, {{0x16, 0x4, 0x0, 0x3, 0x58, 0x66, 0x0, 0x20, 0x4, 0x0, @rand_addr=0x64010102, @dev={0xac, 0x14, 0x14, 0x28}, {[@timestamp_prespec={0x44, 0x44, 0xab, 0x3, 0x1, [{@multicast2, 0x7a}, {@local, 0x7}, {@local}, {@broadcast}, {@broadcast, 0x4}, {@multicast1}, {@broadcast, 0x3}, {@remote, 0xfff}]}]}}}}}) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) 04:31:09 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, 0x0, &(0x7f00000001c0)) socket(0x23, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000200)={0x0, 'veth1_macvtap\x00'}) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) ioctl$UI_DEV_DESTROY(r0, 0x5502) 04:31:09 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000080)=ANY=[@ANYBLOB="2371a2f6556776175c728bd1ebf828149708465ca3060016d2e544d222ec5ccfd324cfa34da5f18029fdaf8195dac461a094b7069201768d1a8b0733dbc3618366fdcebfa2e719cc481561ce65dba5a7dd6da1b8ec7965aa02cc21c5b81f8b03f2d7bf99dc164738b00aae5dfd663c333d23"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) 04:31:09 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000240)={{0x2, 0x0, @private=0x5}, {0x0, @link_local}, 0x0, {0x2, 0x0, @broadcast}}) ioctl$sock_SIOCGIFVLAN_SET_VLAN_FLAG_CMD(r0, 0x8982, &(0x7f0000000640)={0x7, 'dummy0\x00', {0x280}, 0x9}) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f00000001c0)=@nat={'nat\x00', 0x1b, 0x5, 0x400, 0x0, 0xb8, 0xffffffff, 0x1a0, 0x270, 0x368, 0x368, 0xffffffff, 0x368, 0x368, 0x5, &(0x7f00000000c0), {[{{@ip={@dev={0xac, 0x14, 0x14, 0x36}, @broadcast, 0xff, 0xff000000, 'erspan0\x00', 'vlan0\x00', {}, {}, 0xff, 0x3, 0x5b}, 0x0, 0x70, 0xb8}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x1, @ipv6=@private0, @ipv6=@local, @gre_key=0x1000, @icmp_id=0x64}}}, {{@ip={@dev={0xac, 0x14, 0x14, 0x28}, @multicast2, 0xff000000, 0xff, 'batadv_slave_1\x00', 'ip6tnl0\x00', {0xff}, {}, 0x73, 0x2, 0x43}, 0x0, 0xb0, 0xe8, 0x0, {}, [@common=@socket0={{0x20, 'socket\x00'}}, @common=@socket0={{0x20, 'socket\x00'}}]}, @DNAT0={0x38, 'DNAT\x00', 0x0, {0x1, {0x1, @initdev={0xac, 0x1e, 0x1, 0x0}, @initdev={0xac, 0x1e, 0x1, 0x0}, @port=0x4e21, @port=0x4e24}}}}, {{@uncond, 0x0, 0x98, 0xd0, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}, {0x2, 0x5}}]}, @REDIRECT={0x38, 'REDIRECT\x00', 0x0, {0x1, {0x4, @loopback, @remote, @gre_key=0x80, @port=0x4e20}}}}, {{@ip={@rand_addr=0x64010100, @remote, 0xffffff00, 0xff, 'veth1\x00', 'bond0\x00', {0xff}, {}, 0x33, 0x0, 0x41}, 0x0, 0xc0, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28, 'state\x00'}, {0x8}}, @common=@icmp={{0x28, 'icmp\x00'}, {0xc, 'dG', 0x1}}]}, @MASQUERADE={0x38, 'MASQUERADE\x00', 0x0, {0x1, {0x4, @multicast1, @broadcast, @gre_key=0x2, @port=0x4e20}}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x460) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) fsconfig$FSCONFIG_SET_FLAG(r1, 0x6, &(0x7f00000000c0)='posixacl\x00', 0x0, 0x0) ioctl$PPPIOCSCOMPRESS(r1, 0x4010744d) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) fsconfig$FSCONFIG_SET_FLAG(r2, 0x6, &(0x7f00000000c0)='posixacl\x00', 0x0, 0x0) ioctl$KDDELIO(r2, 0x4b35, 0xffffffffffffd80f) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$mptcp(&(0x7f0000000280)='mptcp_pm\x00') sendmsg$MPTCP_PM_CMD_ADD_ADDR(r3, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000002c0)={0x20, r4, 0x1, 0x0, 0x0, {}, [@MPTCP_PM_ATTR_ADDR={0xc, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_FAMILY={0x6, 0x1, 0xa}]}]}, 0x20}}, 0x0) getsockopt$IP_VS_SO_GET_DAEMON(r3, 0x0, 0x487, &(0x7f0000000080), &(0x7f0000000840)=0x30) sendmsg$MPTCP_PM_CMD_ADD_ADDR(r2, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000740)={&(0x7f00000006c0)={0x54, r4, 0x1, 0x70bd26, 0x25dfdbfd, {}, [@MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x4}, @MPTCP_PM_ATTR_ADDR={0x4}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x4}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x6}, @MPTCP_PM_ATTR_ADDR={0x14, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e22}, @MPTCP_PM_ADDR_ATTR_ID={0x5, 0x2, 0x1f}]}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x5}]}, 0x54}, 0x1, 0x0, 0x0, 0x8}, 0x40000) mount(&(0x7f00000007c0)=ANY=[@ANYBLOB="236900c2fd8136216aa11cce69f7d765309fcabffc7f7f6c037f827c354a7d534603438b00e2b91d628f77ce6bcfbba0d515cb2e59a61b24eab5b0072003d9add56f6a7f342b5a0fe1468f87f4266e451b4d467ba007009d325f025836441f0094404782d1c0eb100580993b99c25c4569a7cf0d50d5b2423c79b05853e235"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) umount2(&(0x7f0000000000)='./file0\x00', 0x8) 04:31:09 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x482ad, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0x8001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) fsconfig$FSCONFIG_SET_FLAG(r0, 0x6, &(0x7f00000000c0)='posixacl\x00', 0x0, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000340)={&(0x7f00000001c0)="3b284ec3f28e0f6679647a7a9fdb98e11c3d6e793c57e936fcef85e1e5d6d55691f7b79402b57e5b9f294342493673a89baa8fe97cf6569928de7d744e801d89c0b43749793bf51aefdbebb6f5a010638c5c9dad321fa0a5dcef65eb1b990464d76e78b10d691a7c733b5b642f090d537452e4aee3f941573bb5ef3fb6c9d56d8ed6e085f0be42b91e900ff4d978955dbd613ac3771d68295731e807827d61fd9fcde497cb2ea7d55c6e1cad6e36b4029efa", &(0x7f0000000280)=""/34, &(0x7f0000000580)="762b16f64a111e078aba7238d93d8eee7c13a9304597ce66f016f50dfdb115ee61a7dc9934302e1fe13a8ee794b254e21fa0a94099616fc8abce5baa0845e64cf1abbd28a082616fd65ac912956b366d292363710833b39b482c80d42ec0bc820180ff54", &(0x7f0000000300)="33ed3df2b99bfdf644c76cd00a26", 0xffffff00, r0, 0x4}, 0x38) mount(&(0x7f0000000380)=ANY=[@ANYBLOB="23e9e73229cfc119c50f0be91fe36cb4acedba624858d5a1bb646d1393819bf9c1b9481474a2b0938f334adb7de11a6c8053dcbbffcef65c64efe2ea04d098f5baf77bd138dc456f5e29a2017d861379b52665b8499bc32606d00588e69a535a0e6c50e19e74b3610284c9b97f500d62b7f8d21c64e5565ef1d617820c3c5f33f99e8d687429f82c22cc869ed0179f83ccbfb934f3e7f916ae2a87d72256d6a86bcb4d716144ae6e6e6b9abb54369488f006354d96b07d50f7a2939013d28c9c884768ef4f134e6e355aa75fc85562c4df547ed77f0f8c2eb164a7f126da3350971801914ab113c0bdd14101e56adefe101f4b0270f6e2f480df570632dff25f15ee77db8c83a89f01fd230583"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x40000, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) fsconfig$FSCONFIG_SET_FLAG(r1, 0x6, &(0x7f00000000c0)='posixacl\x00', 0x0, 0x0) ioctl$LOOP_SET_DIRECT_IO(r1, 0x4c08, 0x8) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) fsconfig$FSCONFIG_SET_FLAG(r2, 0x6, &(0x7f00000000c0)='posixacl\x00', 0x0, 0x0) r3 = openat$binder_debug(0xffffffffffffff9c, &(0x7f00000002c0)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$batadv(&(0x7f0000000000)='batadv\x00') sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r4, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)={0x14, r5, 0x301, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) ioctl$sock_bt_hidp_HIDPCONNADD(r2, 0x400448c8, &(0x7f0000000700)={r3, r4, 0x81, 0xce, &(0x7f0000000600)="bf1e4b1a17a9584d9a87dec10f6f6f47d1aafa112b4a4ff782db46b98600f8e0b92a9ce2245fa6a206ce0baf3ff02918914bee27a10b0e2459565c73735d20dc4e2e5fe8373a15e2a1e0838a4a1dd370f0353619964a3b4e352e1278aed8ffc9540adfcf49c6a03692096b5ec383f122d70528df28c964de4af0caa49efe3ac767372d3009be4aad32422db07f360f9e2d43421ccc419814c224b87e17f45a62b8848cc3f0c37b91c60c529644b1f88943d3e334545e97a3b0c89401065104f63858b53d2c46619bf23965886df7", 0x5, 0x20, 0x93e, 0x100, 0x5, 0x3, 0x4, 'syz1\x00'}) accept4$netrom(r0, &(0x7f00000004c0)={{0x3, @netrom}, [@null, @bcast, @remote, @netrom, @default, @remote, @netrom, @netrom]}, &(0x7f0000000540)=0x48, 0xc0800) ioctl$PIO_FONT(r2, 0x4b61, &(0x7f0000000080)="240342a11a22bc2e9643e38f24424611f41fe6b457733063ad296b17c6c20cb05fc462a4f0c73f4ae84534d1999c8138bdb2174f59cef73883e881d508da29347639d8fdb52b5d64f88ad9fa4a3ba27cb7a59a491a3854fb58fd5dc87044d166fc13818f8aef0b4ec5fe223dc2a810d4ada3e004951f375607aa0a2a86c18fb2420ce02a32034aa4b3cf659a2159f659abf751a52d66730e6c8ef3d8da2ca3d9f9bffbc0829c0f357f57a23d242d447fb8ff9817a6") r6 = fspick(0xffffffffffffffff, &(0x7f00000007c0)='./file0\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r6, 0x6, 0x0, 0x0, 0x0) [ 372.542274][T15484] kAFS: unparsable volume name [ 372.628673][T15489] x_tables: duplicate underflow at hook 1 [ 372.633986][T15487] kAFS: No cell specified [ 372.644131][T15491] kAFS: unparsable volume name [ 372.662885][T15489] kAFS: No cell specified 04:31:09 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, 0x0, &(0x7f00000001c0)) socket(0x0, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000200)={0x0, 'veth1_macvtap\x00'}) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) fsconfig$FSCONFIG_SET_FLAG(r0, 0x6, &(0x7f00000000c0)='posixacl\x00', 0x0, 0x0) recvfrom$unix(r0, &(0x7f0000000080)=""/142, 0x8e, 0xa160, 0x0, 0x0) ioctl$DRM_IOCTL_MODESET_CTL(r0, 0x40086408, &(0x7f0000000440)={0x7f, 0xc8}) sendmsg$key(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="021800092700000028bd7000fedbdf2502000a0007000000230e00000000000005001a00fc020000000000000000000000000000fc0100000000000000000000000000000a00080402000a00020000000000000000000000070019000000000002004e2ce000000100000000000000000a004e230001000000000000000000000000000000000000080000000000000008001900000000000a004e22ffffffff00000000000000000000000000000001001000000a004e2100000080fc000000000000000000000000000000a1000000050019000000000002004e207f000001000000000000000002004e21ac1414bb00000000000000000800120003000100b46b6e004d03000006003c00090700001f00000000000000ff010000000000000000000000000001200100"/312], 0x138}}, 0x8008) 04:31:10 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="5f567913"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) fsconfig$FSCONFIG_SET_FLAG(r0, 0x6, &(0x7f00000000c0)='posixacl\x00', 0x0, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) fsconfig$FSCONFIG_SET_FLAG(0xffffffffffffffff, 0x6, &(0x7f0000000100)='posixacl\x00', 0x0, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000000000)='batadv\x00') sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r2, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)={0x14, r3, 0x301, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) ioctl$UFFDIO_UNREGISTER(r0, 0x8010aa01, &(0x7f00000001c0)={&(0x7f0000ffe000/0x1000)=nil, 0x1000}) r4 = socket$nl_generic(0x10, 0x3, 0x10) fsconfig$FSCONFIG_SET_FLAG(0xffffffffffffffff, 0x6, &(0x7f00000000c0)='posixacl\x00', 0x0, 0x0) ioctl$TIOCSSOFTCAR(0xffffffffffffffff, 0x541a, &(0x7f0000000200)=0xd9) r5 = syz_genetlink_get_family_id$batadv(&(0x7f0000000000)='batadv\x00') r6 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$sock_int(r6, 0x1, 0x2e, &(0x7f0000000000), 0x4) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r4, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=ANY=[@ANYBLOB="104cb30637c18a473b5a3054fb7efe01ec00de0a3d6eff77f85fe52c325298ffc0665d5b3036f3118a2e8c7463b73d1586ace560cc938858a3ba7028a27f1393656bd91a58704d7faa628314b61a97a9bfa14c83164e48c669dcd21d644a9fceb51b51dd65994be856c08e4f0b5e", @ANYRES16=r5, @ANYBLOB="010300000000000000000a000000"], 0x14}}, 0x0) dup2(r2, r4) connect$rxrpc(r1, &(0x7f0000000080)=@in4={0x21, 0x1, 0x2, 0x10, {0x2, 0x4e20, @remote}}, 0x24) ioctl$sock_qrtr_TIOCOUTQ(r0, 0x5411, &(0x7f0000000000)) [ 372.682490][T15493] x_tables: duplicate underflow at hook 1 [ 372.719698][T15493] kAFS: No cell specified 04:31:10 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, 0x0, &(0x7f00000001c0)) socket(0x0, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000200)={0x0, 'veth1_macvtap\x00'}) 04:31:10 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = syz_genetlink_get_family_id$batadv(&(0x7f0000000000)='batadv\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$batadv(&(0x7f0000000000)='batadv\x00') sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r1, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)={0x14, r2, 0x301, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r1, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)={0x14, r0, 0x301, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) fsconfig$FSCONFIG_SET_FLAG(r4, 0x6, &(0x7f00000000c0)='posixacl\x00', 0x0, 0x0) getsockopt$PNPIPE_IFINDEX(r4, 0x113, 0x2, &(0x7f0000000180), &(0x7f00000001c0)=0x4) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x4b, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0x6) write$cgroup_int(r5, &(0x7f0000000200), 0x400c00) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$batadv(&(0x7f0000000000)='batadv\x00') sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r6, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)={0x14, r7, 0x301, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) flistxattr(r6, &(0x7f0000000240)=""/179, 0xb3) mount(&(0x7f0000000080)=ANY=[@ANYRESHEX=r0], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) [ 372.959584][T15503] kAFS: unparsable volume name [ 373.048553][T15503] kAFS: unparsable volume name 04:31:10 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) fsconfig$FSCONFIG_SET_FLAG(r0, 0x6, &(0x7f00000000c0)='posixacl\x00', 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000280)=@filter={'filter\x00', 0xe, 0x4, 0x670, 0xffffffff, 0x368, 0x0, 0x298, 0xffffffff, 0xffffffff, 0x5a0, 0x5a0, 0x5a0, 0xffffffff, 0x4, &(0x7f0000000080), {[{{@ipv6={@remote, @mcast1, [0xff, 0x0, 0xff, 0xffffff00], [0xffffffff, 0xffffffff, 0xff, 0xff], 'tunl0\x00', 'syz_tun\x00', {}, {0xff}, 0x6c, 0x63, 0x0, 0x1}, 0x0, 0x270, 0x298, 0x0, {}, [@common=@srh1={{0x90, 'srh\x00'}, {0x3a, 0x0, 0x0, 0x5, 0x7fff, @remote, @loopback, @private2={0xfc, 0x2, [], 0x1}, [0xff000000, 0xffffffff, 0xffffff00], [0xffffff00, 0xff, 0xff, 0xff], [0x0, 0xff000000, 0xff], 0x1000, 0x10}}, @common=@rt={{0x138, 'rt\x00'}, {0x6, [0x2, 0x5], 0x22, 0x1, 0x7, [@mcast2, @local, @loopback, @empty, @private2={0xfc, 0x2, [], 0x1}, @private1={0xfc, 0x1, [], 0x1}, @rand_addr=' \x01\x00', @mcast1, @loopback, @private2, @empty, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @private1, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @local, @local], 0xd}}]}, @common=@unspec=@MARK={0x28, 'MARK\x00', 0x2, {0x9, 0x80f8}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x8}}}, {{@ipv6={@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0xb}}, [0x0, 0x0, 0xffffffff, 0xffffffff], [0xff, 0x0, 0xff000000, 0xff000000], 'veth1_to_batadv\x00', 'erspan0\x00', {}, {}, 0x3a, 0x0, 0x2, 0x1}, 0x0, 0x1f8, 0x238, 0x0, {}, [@common=@unspec=@mark={{0x30, 'mark\x00'}, {0x7, 0x20, 0x1}}, @common=@unspec=@comment={{0x120, 'comment\x00'}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "b3f84325a4d13fb0d53f96f986bcea439fd9a8b90d171a71705c7c8074df"}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6d0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x2) umount2(&(0x7f0000000100)='./file1\x00', 0x0) 04:31:10 executing program 3: r0 = memfd_create(&(0x7f0000001780)='\xd8\x05V\x15\xa5e\xf1\xb8\xf6\xa2\xba\x85\xb95\x03<\xb9;\xcd\x86\x8bD\xf9\xe9L\xe1Q\xfc\xe2\x97\xa0\xe8s\xb2\x11\xef\x1ac\xc9\x89\xc7\x0fv1\xa1:h\xf6\xf5\a\x8c\xf0Ay\x03\x97\xe77\xc1\xc8\xa6\xcb\xd2\xbe\xe9\xd2\xfb{u\xc3\xcd\xba\xa8G`9\xb5\x82\xa9p\xc8)\xe5$b\v\x8e\b\xf4\xf0\x11\xb4\xcb\"\xf4\xf3\xb4|\xdf\xa3\xdd\x9c\x8a\xf4D\xd3\xea\x11c}\x86H\xca=;i\x96\x183h\xba\x1a\x10', 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000380)='/dev/nullb0\x00', 0x0, 0x0) io_setup(0x1, &(0x7f00000004c0)=0x0) io_submit(r4, 0x8, &(0x7f00000000c0)=[&(0x7f0000000140)={0x3a004017, 0x2759, 0x10, 0x0, 0x0, r3, &(0x7f0000000000)="98", 0x3e80000000, 0x0, 0x0, 0x2}]) 04:31:10 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/autofs\x00', 0x612200, 0x0) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(r1, 0x89fa, &(0x7f0000000300)={'syztnl2\x00', &(0x7f0000000280)={'ip6tnl0\x00', 0x0, 0x2f, 0x5, 0x7, 0x1, 0x3, @private0, @loopback, 0x10, 0x7800, 0x3, 0x9}}) openat$cgroup_devices(r0, &(0x7f0000000100)='devices.deny\x00', 0x2, 0x0) fsconfig$FSCONFIG_SET_FLAG(r0, 0x6, &(0x7f00000000c0)='posixacl\x00', 0x0, 0x0) ioctl$VIDIOC_G_INPUT(r0, 0x80045626, &(0x7f00000001c0)) ioctl$TIOCCBRK(r0, 0x5428) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) lsetxattr$trusted_overlay_opaque(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='trusted.overlay.opaque\x00', &(0x7f00000000c0)='y\x00', 0x2, 0x1) 04:31:10 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000000)='batadv\x00') sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)={0x14, r1, 0x301, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) ioctl$EXT4_IOC_MIGRATE(r0, 0x6609) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400, 0x0, 0x0, 0x2, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, 0x0, &(0x7f00000001c0)) socket(0x0, 0x0, 0x0) r2 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f00000002c0)='X', 0x1, 0xfffffffffffffffe) r3 = add_key$user(&(0x7f0000000640)='user\x00', &(0x7f0000000540)={'syz'}, &(0x7f00000000c0), 0xc6, 0xfffffffffffffffd) r4 = add_key$user(&(0x7f0000000640)='user\x00', &(0x7f0000000540)={'syz'}, &(0x7f00000000c0), 0xc6, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f00000000c0)={r2, r3, r4}, 0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)={'sha224-avx\x00'}}) r5 = add_key(&(0x7f0000000000)='user\x00', &(0x7f00000011c0)={'syz', 0x3}, &(0x7f00000002c0)="f6", 0x1, 0xfffffffffffffffb) keyctl$unlink(0x9, r5, 0xfffffffffffffffb) keyctl$negate(0xd, r4, 0x9, r5) r6 = openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nvme-fabrics\x00', 0x2002, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r6, 0xc008240a, &(0x7f0000000080)={0x1, 0x0, [0x0]}) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000200)={0x0, 'veth1_macvtap\x00'}) 04:31:10 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) mount(&(0x7f0000000080)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) fsconfig$FSCONFIG_SET_FLAG(r0, 0x6, &(0x7f00000000c0)='posixacl\x00', 0x0, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) fsconfig$FSCONFIG_SET_FLAG(r1, 0x6, &(0x7f0000000100)='posixacl\x00', 0x0, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(r1, 0xc0206434, &(0x7f0000000000)={0xd61532e, 0x0, 0x10000, 0x8000}) ioctl$DRM_IOCTL_AGP_FREE(r0, 0x40206435, &(0x7f0000000080)={0x3f, r2, 0x1, 0x1f}) [ 373.157083][T15507] kAFS: unparsable volume name [ 373.224871][T15507] kAFS: unparsable volume name [ 373.312613][T15524] afs: Bad value for 'source' [ 373.368101][T15524] kAFS: unparsable volume name 04:31:10 executing program 1: exit_group(0x7) mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) r0 = syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x7fffffff, 0x8200) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$batadv(&(0x7f0000000000)='batadv\x00') sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r1, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)={0x14, r2, 0x301, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) fcntl$setstatus(r1, 0x4, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCDARP(r3, 0x8953, &(0x7f0000000240)={{0x2, 0x0, @private=0x5}, {0x0, @link_local}, 0x0, {0x2, 0x0, @dev}}) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000000480)={{{@in=@multicast2, @in6=@ipv4={[], [], @local}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in6=@empty}}, &(0x7f00000001c0)=0xe8) r5 = syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000300)='NLBL_CALIPSO\x00') sendmsg$NLBL_CALIPSO_C_LISTALL(0xffffffffffffffff, &(0x7f0000000600)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f00000005c0)={&(0x7f0000000340)={0x34, r5, 0x400, 0x70bd27, 0x25dfdbff, {}, [@NLBL_CALIPSO_A_DOI={0x8}, @NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x3}, @NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x3}]}, 0x34}, 0x1, 0x0, 0x0, 0x4000}, 0x4000080) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = getpid() r8 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r8, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setresgid(0x0, r9, 0x0) sendmsg$unix(r6, &(0x7f0000001440)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=[@cred={{0x1c, 0x1, 0x2, {r7, 0x0, r9}}}], 0x20}, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x2000000, &(0x7f0000000380)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000140000,user_id=', @ANYRESDEC=r4, @ANYBLOB=',group_id=', @ANYRESDEC=r9, @ANYBLOB="2c616c6c6f775f6f746865722c616c6c6f775f6f746865722c626c6b73697a653d307830302c736d61636b66736465663d616673002c6673636f6e746578743d73276b0f991458d0fd2d89815c9a797374656d5f752c0000"]) 04:31:10 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) fsconfig$FSCONFIG_SET_FLAG(r0, 0x6, &(0x7f00000000c0)='posixacl\x00', 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000280)=@filter={'filter\x00', 0xe, 0x4, 0x670, 0xffffffff, 0x368, 0x0, 0x298, 0xffffffff, 0xffffffff, 0x5a0, 0x5a0, 0x5a0, 0xffffffff, 0x4, &(0x7f0000000080), {[{{@ipv6={@remote, @mcast1, [0xff, 0x0, 0xff, 0xffffff00], [0xffffffff, 0xffffffff, 0xff, 0xff], 'tunl0\x00', 'syz_tun\x00', {}, {0xff}, 0x6c, 0x63, 0x0, 0x1}, 0x0, 0x270, 0x298, 0x0, {}, [@common=@srh1={{0x90, 'srh\x00'}, {0x3a, 0x0, 0x0, 0x5, 0x7fff, @remote, @loopback, @private2={0xfc, 0x2, [], 0x1}, [0xff000000, 0xffffffff, 0xffffff00], [0xffffff00, 0xff, 0xff, 0xff], [0x0, 0xff000000, 0xff], 0x1000, 0x10}}, @common=@rt={{0x138, 'rt\x00'}, {0x6, [0x2, 0x5], 0x22, 0x1, 0x7, [@mcast2, @local, @loopback, @empty, @private2={0xfc, 0x2, [], 0x1}, @private1={0xfc, 0x1, [], 0x1}, @rand_addr=' \x01\x00', @mcast1, @loopback, @private2, @empty, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @private1, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @local, @local], 0xd}}]}, @common=@unspec=@MARK={0x28, 'MARK\x00', 0x2, {0x9, 0x80f8}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x8}}}, {{@ipv6={@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0xb}}, [0x0, 0x0, 0xffffffff, 0xffffffff], [0xff, 0x0, 0xff000000, 0xff000000], 'veth1_to_batadv\x00', 'erspan0\x00', {}, {}, 0x3a, 0x0, 0x2, 0x1}, 0x0, 0x1f8, 0x238, 0x0, {}, [@common=@unspec=@mark={{0x30, 'mark\x00'}, {0x7, 0x20, 0x1}}, @common=@unspec=@comment={{0x120, 'comment\x00'}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "b3f84325a4d13fb0d53f96f986bcea439fd9a8b90d171a71705c7c8074df"}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6d0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x2) umount2(&(0x7f0000000100)='./file1\x00', 0x0) 04:31:10 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)=ANY=[@ANYBLOB="2285bbce0000000000"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, 0x0, &(0x7f00000001c0)) socket(0x0, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000200)={0x0, 'veth1_macvtap\x00'}) 04:31:10 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) fsconfig$FSCONFIG_SET_FLAG(r0, 0x6, &(0x7f00000000c0)='posixacl\x00', 0x0, 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(r0, 0xc018620b, &(0x7f0000000000)) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x1000860, 0x0) name_to_handle_at(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', &(0x7f0000000100)={0x1d, 0x119, "35b7cb49d84a88504a589246403925e54785eb07ef"}, &(0x7f00000001c0), 0x600) 04:31:10 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) setxattr$trusted_overlay_opaque(&(0x7f0000000000)='./file1\x00', &(0x7f0000000080)='trusted.overlay.opaque\x00', &(0x7f00000000c0)='y\x00', 0x2, 0x3) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) fsconfig$FSCONFIG_SET_FLAG(r0, 0x6, &(0x7f00000000c0)='posixacl\x00', 0x0, 0x0) setsockopt$SO_J1939_PROMISC(r0, 0x6b, 0x2, &(0x7f0000000100), 0x4) 04:31:10 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) fsconfig$FSCONFIG_SET_FLAG(r0, 0x6, &(0x7f00000000c0)='posixacl\x00', 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(r0, 0x89fa, &(0x7f0000000000)={'syztnl2\x00', &(0x7f0000000080)={'sit0\x00', 0x0, 0x2f, 0x6, 0x6, 0xd13, 0x42, @rand_addr=' \x01\x00', @dev={0xfe, 0x80, [], 0x30}, 0x40, 0x10, 0x2, 0x701}}) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) 04:31:10 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$batadv(&(0x7f0000000000)='batadv\x00') socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r1, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)={0x14, r2, 0x301, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) fsetxattr$trusted_overlay_redirect(r1, &(0x7f00000001c0)='trusted.overlay.redirect\x00', &(0x7f0000000200)='./file0\x00', 0x8, 0x2) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000000000)='batadv\x00') sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)={0x14, r3, 0x301, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) getpeername(r0, &(0x7f0000000080)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff}}, &(0x7f0000000000)=0x80) bind$l2tp(r4, &(0x7f0000000100)={0x2, 0x0, @initdev={0xac, 0x1e, 0x1, 0x0}, 0x3}, 0x10) [ 373.650526][T15542] kAFS: unparsable volume name 04:31:10 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) fsconfig$FSCONFIG_SET_FLAG(r0, 0x6, &(0x7f00000000c0)='posixacl\x00', 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000280)=@filter={'filter\x00', 0xe, 0x4, 0x670, 0xffffffff, 0x368, 0x0, 0x298, 0xffffffff, 0xffffffff, 0x5a0, 0x5a0, 0x5a0, 0xffffffff, 0x4, &(0x7f0000000080), {[{{@ipv6={@remote, @mcast1, [0xff, 0x0, 0xff, 0xffffff00], [0xffffffff, 0xffffffff, 0xff, 0xff], 'tunl0\x00', 'syz_tun\x00', {}, {0xff}, 0x6c, 0x63, 0x0, 0x1}, 0x0, 0x270, 0x298, 0x0, {}, [@common=@srh1={{0x90, 'srh\x00'}, {0x3a, 0x0, 0x0, 0x5, 0x7fff, @remote, @loopback, @private2={0xfc, 0x2, [], 0x1}, [0xff000000, 0xffffffff, 0xffffff00], [0xffffff00, 0xff, 0xff, 0xff], [0x0, 0xff000000, 0xff], 0x1000, 0x10}}, @common=@rt={{0x138, 'rt\x00'}, {0x6, [0x2, 0x5], 0x22, 0x1, 0x7, [@mcast2, @local, @loopback, @empty, @private2={0xfc, 0x2, [], 0x1}, @private1={0xfc, 0x1, [], 0x1}, @rand_addr=' \x01\x00', @mcast1, @loopback, @private2, @empty, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @private1, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @local, @local], 0xd}}]}, @common=@unspec=@MARK={0x28, 'MARK\x00', 0x2, {0x9, 0x80f8}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x8}}}, {{@ipv6={@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0xb}}, [0x0, 0x0, 0xffffffff, 0xffffffff], [0xff, 0x0, 0xff000000, 0xff000000], 'veth1_to_batadv\x00', 'erspan0\x00', {}, {}, 0x3a, 0x0, 0x2, 0x1}, 0x0, 0x1f8, 0x238, 0x0, {}, [@common=@unspec=@mark={{0x30, 'mark\x00'}, {0x7, 0x20, 0x1}}, @common=@unspec=@comment={{0x120, 'comment\x00'}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "b3f84325a4d13fb0d53f96f986bcea439fd9a8b90d171a71705c7c8074df"}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6d0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x2) umount2(&(0x7f0000000100)='./file1\x00', 0x0) [ 373.731748][T15542] kAFS: unparsable volume name [ 373.882316][ T8172] FS-Cache: Duplicate cookie detected [ 373.887941][ T8172] FS-Cache: O-cookie c=00000000df1e58da [p=00000000a00f4ec0 fl=212 nc=0 na=0] [ 373.896773][ T8172] FS-Cache: O-cookie d=0000000000000000 n=0000000000000000 [ 373.904048][ T8172] FS-Cache: O-key=[2] 'e9e7' [ 373.908708][ T8172] FS-Cache: N-cookie c=00000000a946c801 [p=00000000a00f4ec0 fl=2 nc=0 na=1] [ 373.917433][ T8172] FS-Cache: N-cookie d=0000000035364e0c n=000000001633e5f6 [ 373.924633][ T8172] FS-Cache: N-key=[2] 'e9e7' 04:31:11 executing program 3: r0 = memfd_create(&(0x7f0000001780)='\xd8\x05V\x15\xa5e\xf1\xb8\xf6\xa2\xba\x85\xb95\x03<\xb9;\xcd\x86\x8bD\xf9\xe9L\xe1Q\xfc\xe2\x97\xa0\xe8s\xb2\x11\xef\x1ac\xc9\x89\xc7\x0fv1\xa1:h\xf6\xf5\a\x8c\xf0Ay\x03\x97\xe77\xc1\xc8\xa6\xcb\xd2\xbe\xe9\xd2\xfb{u\xc3\xcd\xba\xa8G`9\xb5\x82\xa9p\xc8)\xe5$b\v\x8e\b\xf4\xf0\x11\xb4\xcb\"\xf4\xf3\xb4|\xdf\xa3\xdd\x9c\x8a\xf4D\xd3\xea\x11c}\x86H\xca=;i\x96\x183h\xba\x1a\x10', 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000380)='/dev/nullb0\x00', 0x0, 0x0) io_setup(0x1, &(0x7f00000004c0)=0x0) io_submit(r4, 0x8, &(0x7f00000000c0)=[&(0x7f0000000140)={0x3a004018, 0x2759, 0x10, 0x0, 0x0, r3, &(0x7f0000000000)="98", 0x3e80000000, 0x0, 0x0, 0x2}]) 04:31:11 executing program 0: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000100)=@req={0x3, 0x4, 0x81, 0x3f}, 0x10) fsconfig$FSCONFIG_SET_FLAG(r0, 0x6, &(0x7f00000000c0)='posixacl\x00', 0x0, 0x0) chdir(&(0x7f0000000140)='./file0/file0\x00') mkdirat(r0, &(0x7f0000000080)='./file0\x00', 0x0) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0x6, 0xffffffffffffffff, 0x0) mount(&(0x7f00000001c0)=ANY=[@ANYBLOB="23e9e7a171f2923e46749e582731f2699a58913b"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) 04:31:11 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000000)='batadv\x00') sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)={0x14, r1, 0x301, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000000000)='batadv\x00') ioctl$sock_inet_SIOCGIFNETMASK(r2, 0x891b, &(0x7f0000000240)={'bond_slave_0\x00', {0x2, 0x4e20, @loopback}}) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r2, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)={0x14, r3, 0x301, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$batadv(&(0x7f0000000000)='batadv\x00') sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r4, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)={0x14, r5, 0x301, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) r6 = socket(0x11, 0x800000003, 0x0) bind(r6, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r6, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r8 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r8, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=@newqdisc={0x138, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r7, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_gred={{0x9, 0x1, 'gred\x00'}, {0x108, 0x2, [@TCA_GRED_STAB={0x104, 0x2, "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"}]}}]}, 0x138}}, 0x0) sendmsg$BATADV_CMD_GET_ROUTING_ALGOS(r2, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f00000001c0)={&(0x7f00000000c0)={0x24, r5, 0x200, 0x70bd2c, 0x25dfdbfd, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r7}, @BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5, 0x29, 0x1}]}, 0x24}, 0x1, 0x0, 0x0, 0x80}, 0x1) mount(&(0x7f0000000000)=ANY=[@ANYRESHEX=r0], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) 04:31:11 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7fffffff, 0x3ff}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, 0x0, &(0x7f00000001c0)) socket(0x0, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000200)={0x0, 'veth1_macvtap\x00'}) r1 = openat$cgroup_ro(r0, &(0x7f0000000000)='cpu.stat\x00', 0x0, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_STATUS32(r1, 0xc0245720, &(0x7f0000000080)={0x1}) 04:31:11 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) fsconfig$FSCONFIG_SET_FLAG(r0, 0x6, &(0x7f00000000c0)='posixacl\x00', 0x0, 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(r0, 0xc018620b, &(0x7f0000000000)) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x1000860, 0x0) name_to_handle_at(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', &(0x7f0000000100)={0x1d, 0x119, "35b7cb49d84a88504a589246403925e54785eb07ef"}, &(0x7f00000001c0), 0x600) [ 374.340706][T15567] kAFS: unparsable volume name [ 374.456528][T15567] kAFS: unparsable volume name 04:31:11 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/autofs\x00', 0x612200, 0x0) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(r1, 0x89fa, &(0x7f0000000300)={'syztnl2\x00', &(0x7f0000000280)={'ip6tnl0\x00', 0x0, 0x2f, 0x5, 0x7, 0x1, 0x3, @private0, @loopback, 0x10, 0x7800, 0x3, 0x9}}) openat$cgroup_devices(r0, &(0x7f0000000100)='devices.deny\x00', 0x2, 0x0) fsconfig$FSCONFIG_SET_FLAG(r0, 0x6, &(0x7f00000000c0)='posixacl\x00', 0x0, 0x0) ioctl$VIDIOC_G_INPUT(r0, 0x80045626, &(0x7f00000001c0)) ioctl$TIOCCBRK(r0, 0x5428) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) lsetxattr$trusted_overlay_opaque(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='trusted.overlay.opaque\x00', &(0x7f00000000c0)='y\x00', 0x2, 0x1) 04:31:11 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x9) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) fsconfig$FSCONFIG_SET_FLAG(r0, 0x6, &(0x7f00000000c0)='posixacl\x00', 0x0, 0x0) ioctl$VIDIOC_DBG_G_REGISTER(r0, 0xc0385650, &(0x7f0000000000)={{0x4, @addr=0xfffffffa}, 0x8, 0x10001}) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) fsconfig$FSCONFIG_SET_FLAG(r1, 0x6, &(0x7f00000000c0)='posixacl\x00', 0x0, 0x0) connect$nfc_raw(r1, &(0x7f0000000080)={0x27, 0x0, 0x2, 0x3}, 0x10) 04:31:12 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/autofs\x00', 0x612200, 0x0) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(r1, 0x89fa, &(0x7f0000000300)={'syztnl2\x00', &(0x7f0000000280)={'ip6tnl0\x00', 0x0, 0x2f, 0x5, 0x7, 0x1, 0x3, @private0, @loopback, 0x10, 0x7800, 0x3, 0x9}}) openat$cgroup_devices(r0, &(0x7f0000000100)='devices.deny\x00', 0x2, 0x0) fsconfig$FSCONFIG_SET_FLAG(r0, 0x6, &(0x7f00000000c0)='posixacl\x00', 0x0, 0x0) ioctl$VIDIOC_G_INPUT(r0, 0x80045626, &(0x7f00000001c0)) ioctl$TIOCCBRK(r0, 0x5428) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) lsetxattr$trusted_overlay_opaque(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='trusted.overlay.opaque\x00', &(0x7f00000000c0)='y\x00', 0x2, 0x1) 04:31:12 executing program 2: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) fsconfig$FSCONFIG_SET_FLAG(r0, 0x6, &(0x7f00000000c0)='posixacl\x00', 0x0, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) fsconfig$FSCONFIG_SET_FLAG(r1, 0x6, &(0x7f00000000c0)='posixacl\x00', 0x0, 0x0) mkdirat(r1, &(0x7f0000000140)='./file0\x00', 0x1c) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, 0x0, &(0x7f00000001c0)) socket(0x0, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000200)={0x0, 'veth1_macvtap\x00'}) 04:31:12 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)=ANY=[@ANYBLOB="25582f7ad17b359aceb9cbcd267bc160894e42b9"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) 04:31:12 executing program 1: mkdirat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x108) mount(&(0x7f0000000740)=ANY=[@ANYBLOB="886e259c6ee9f7eec988e664093a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000000)='batadv\x00') sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=ANY=[@ANYBLOB="14000000", @ANYRES16=r1, @ANYBLOB="010300000000000000400a004000"], 0x14}}, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000000000)='batadv\x00') r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$batadv(&(0x7f0000000000)='batadv\x00') sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r4, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)={0x14, r5, 0x301, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000680)=[r2, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r4, r0, 0xffffffffffffffff, r0], 0x9) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r2, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)={0x14, r3, 0x301, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) r6 = syz_genetlink_get_family_id$tipc(&(0x7f0000000380)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_WINDOW(r2, &(0x7f0000000480)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000440)={&(0x7f00000003c0)={0x68, r6, 0x700, 0x70bd2a, 0x25dfdbfb, {{}, {}, {0x4c, 0x18, {0x9, @link='syz1\x00'}}}, ["", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x20008045}, 0x4000000) recvmsg(r0, &(0x7f00000001c0)={&(0x7f0000000080)=@rc={0x1f, @none}, 0x80, &(0x7f0000000100)=[{&(0x7f0000000000)=""/11, 0xb}, {&(0x7f0000000280)=""/251, 0xfb}], 0x2}, 0x2000) r7 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f00000002c0)='X', 0x1, 0xfffffffffffffffe) r8 = add_key$user(&(0x7f0000000640)='user\x00', &(0x7f0000000540)={'syz'}, &(0x7f00000006c0)="c5de4009d1f39fa3e86a2e744ffaa4a37e4da5cd0200000093b615daf9d579b70bae5237c13556f05b691d1d1e35da9b59ea3a3009feddb6f2da867fa983ffa668f778cf3e5172ae000f23660bb11cec61de587d6848c0665548f6bf1b687a71aabdb8a0c70adfecb4e25e9be7fb10ef7c4a77a06e15c61f8c92ee3dbe73", 0x7e, 0xfffffffffffffffd) r9 = add_key$user(&(0x7f0000000640)='user\x00', &(0x7f0000000540)={'syz'}, &(0x7f00000000c0), 0xc6, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f00000000c0)={r7, r8, r9}, 0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)={'sha224-avx\x00'}}) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f00000004c0)={r8, 0x4, 0x94}, 0x0, &(0x7f0000000500)="60c3b43d", &(0x7f00000005c0)=""/148) 04:31:12 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="05210021"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, 0x0, &(0x7f00000001c0)) socket(0x0, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000200)={0x0, 'veth1_macvtap\x00'}) [ 375.071610][T15597] kAFS: No cell specified [ 375.118447][T15599] kAFS: No cell specified [ 375.223646][T15602] kAFS: unparsable volume name 04:31:12 executing program 3: r0 = memfd_create(&(0x7f0000001780)='\xd8\x05V\x15\xa5e\xf1\xb8\xf6\xa2\xba\x85\xb95\x03<\xb9;\xcd\x86\x8bD\xf9\xe9L\xe1Q\xfc\xe2\x97\xa0\xe8s\xb2\x11\xef\x1ac\xc9\x89\xc7\x0fv1\xa1:h\xf6\xf5\a\x8c\xf0Ay\x03\x97\xe77\xc1\xc8\xa6\xcb\xd2\xbe\xe9\xd2\xfb{u\xc3\xcd\xba\xa8G`9\xb5\x82\xa9p\xc8)\xe5$b\v\x8e\b\xf4\xf0\x11\xb4\xcb\"\xf4\xf3\xb4|\xdf\xa3\xdd\x9c\x8a\xf4D\xd3\xea\x11c}\x86H\xca=;i\x96\x183h\xba\x1a\x10', 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000380)='/dev/nullb0\x00', 0x0, 0x0) io_setup(0x1, &(0x7f00000004c0)=0x0) io_submit(r4, 0x8, &(0x7f00000000c0)=[&(0x7f0000000140)={0x3a004019, 0x2759, 0x10, 0x0, 0x0, r3, &(0x7f0000000000)="98", 0x3e80000000, 0x0, 0x0, 0x2}]) 04:31:12 executing program 1: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) fsconfig$FSCONFIG_SET_FLAG(r0, 0x6, &(0x7f0000000040)='sync\x00', 0x0, 0x0) ioctl$VIDIOC_TRY_EXT_CTRLS(r0, 0xc0205649, &(0x7f0000000100)={0x9f0000, 0x5, 0x5, 0xffffffffffffffff, 0x0, &(0x7f00000000c0)={0x9e0905, 0xa74, [], @string=&(0x7f0000000080)=0x8}}) ioctl$VIDIOC_S_TUNER(r1, 0x4054561e, &(0x7f0000000180)={0x0, "39210df4a7972b84c62d83efe84ded8a0ab1e7b2418f1f6a133305f705564456", 0x5, 0x1000, 0x8, 0x4, 0x10, 0x4, 0x0, 0x81}) mkdirat(r1, &(0x7f0000000140)='./file0\x00', 0x6) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) fsconfig$FSCONFIG_SET_FLAG(r2, 0x6, &(0x7f00000000c0)='posixacl\x00', 0x0, 0x0) ioctl$SNDCTL_SYNTH_ID(r2, 0xc08c5114, &(0x7f0000000200)={"570f7894cdee6b78c5861e1700d696252f43b68257aaa21731ec336ad1d1", 0x46, 0x0, 0x401, 0x8000, 0x3, 0x75, 0x9, 0x2, [0xe0000000, 0xffffff00, 0x2, 0x800, 0x7, 0x6, 0x7, 0x1000, 0x4, 0x5a1, 0x7, 0x747, 0x20, 0x2, 0xfffff000, 0x1f, 0xb513, 0x3, 0x4]}) 04:31:12 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x9) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) fsconfig$FSCONFIG_SET_FLAG(r0, 0x6, &(0x7f00000000c0)='posixacl\x00', 0x0, 0x0) ioctl$VIDIOC_DBG_G_REGISTER(r0, 0xc0385650, &(0x7f0000000000)={{0x4, @addr=0xfffffffa}, 0x8, 0x10001}) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) fsconfig$FSCONFIG_SET_FLAG(r1, 0x6, &(0x7f00000000c0)='posixacl\x00', 0x0, 0x0) connect$nfc_raw(r1, &(0x7f0000000080)={0x27, 0x0, 0x2, 0x3}, 0x10) [ 375.298013][T15602] kAFS: unparsable volume name 04:31:12 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) fsconfig$FSCONFIG_SET_FLAG(r0, 0x6, &(0x7f00000000c0)='posixacl\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x5, 0x70, 0x6b, 0x0, 0x80, 0x5, 0x0, 0x5, 0xc0800, 0x2, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x3, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp, 0x1020, 0x4, 0x2, 0x4, 0x8, 0x4, 0x1}, 0xffffffffffffffff, 0x10, r0, 0x1) 04:31:12 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, 0x0, &(0x7f00000001c0)) socket(0x0, 0x0, 0x0) openat$nvram(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nvram\x00', 0x400000, 0x0) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000200)={0x0, 'veth1_macvtap\x00'}) 04:31:12 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) fsconfig$FSCONFIG_SET_FLAG(r0, 0x6, &(0x7f00000000c0)='posixacl\x00', 0x0, 0x0) bind$unix(r0, &(0x7f0000000080)=@file={0x0, './file0\x00'}, 0x6e) mount(&(0x7f0000000100)=ANY=[@ANYBLOB="fc617174dd34567fb027f9b5d0f473178cbeb63e8d879efc840a030000007ac42f9c19b64ee5ca55b59b8e00ef"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) 04:31:12 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/autofs\x00', 0x612200, 0x0) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(r1, 0x89fa, &(0x7f0000000300)={'syztnl2\x00', &(0x7f0000000280)={'ip6tnl0\x00', 0x0, 0x2f, 0x5, 0x7, 0x1, 0x3, @private0, @loopback, 0x10, 0x7800, 0x3, 0x9}}) openat$cgroup_devices(r0, &(0x7f0000000100)='devices.deny\x00', 0x2, 0x0) fsconfig$FSCONFIG_SET_FLAG(r0, 0x6, &(0x7f00000000c0)='posixacl\x00', 0x0, 0x0) ioctl$VIDIOC_G_INPUT(r0, 0x80045626, &(0x7f00000001c0)) ioctl$TIOCCBRK(r0, 0x5428) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) lsetxattr$trusted_overlay_opaque(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='trusted.overlay.opaque\x00', &(0x7f00000000c0)='y\x00', 0x2, 0x1) [ 375.679668][T15625] kAFS: unparsable volume name [ 375.735385][T15628] kAFS: unparsable volume name 04:31:13 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000480)=ANY=[@ANYRESHEX], &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='hfsplus\x00', 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, 0x0, &(0x7f00000001c0)) r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x10000, 0x0) ioctl$DRM_IOCTL_MODE_GETRESOURCES(r0, 0xc04064a0, &(0x7f0000000440)={&(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000380)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000400)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5, 0x9, 0x9, 0x5}) name_to_handle_at(r0, &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000280)=ANY=[@ANYBLOB="d2000000da0000001997533461697e6755bea2e36911ed5d589333ba3c7ffb61deb4baa9f99443a32ab1cfa437bed59f00d0b52c5b63a12ebba47018704d03940ed4b9fdb11176ad261b67bb0469ea8ad1911fef62a94f6ef3b1f5ffee74498dd22da69e2bc857199034ea020969d4358b9a518d262f1213b9f31acb642f276fb0c2a4c53bdc8725895c5d386324be998745a4169d7f4fe01cf317677f28869f1349603886531c7b65edaf77180802fbd2f0e689958f01b66b2680d176b6e5004a8e22d05aa8c75a22833379430eeb9b5400"], &(0x7f00000000c0), 0x0) socket(0x0, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000200)={0x0, 'veth1_macvtap\x00'}) 04:31:13 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x0, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r3 = socket(0x10, 0x3, 0x0) prctl$PR_GET_SPECULATION_CTRL(0x34, 0x0, 0x8) sendmsg$nl_route_sched(r3, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=@newqdisc={0x138, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_gred={{0x9, 0x1, 'gred\x00'}, {0x108, 0x2, [@TCA_GRED_STAB={0x104, 0x2, "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"}]}}]}, 0x138}}, 0x0) recvfrom$packet(r0, &(0x7f00000001c0)=""/89, 0x59, 0x10000, &(0x7f0000000100)={0x11, 0x15, r2, 0x1, 0x1}, 0x14) mount(&(0x7f0000000080)=ANY=[@ANYBLOB="0000aa96ef3c9f903c2a97fb9f682599edebb032168a7048b4812f22d331920eeaae0c9a0de69f5ed4ce9baf60d8df963fdfd0bbcce3acb29ab644af88d681ae7a39064ee6090178f6c07bb5ca0b0700e8d6"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) 04:31:13 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, 0x0, &(0x7f00000001c0)) socket(0x0, 0x0, 0x0) openat$nvram(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nvram\x00', 0x400000, 0x0) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000200)={0x0, 'veth1_macvtap\x00'}) [ 376.060019][T15639] afs: Bad value for 'source' 04:31:13 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, 0x0, &(0x7f00000001c0)) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000100)=0x3, 0x4) fsconfig$FSCONFIG_SET_FLAG(r0, 0x6, &(0x7f00000000c0)='posixacl\x00', 0x0, 0x0) ioctl$KDSIGACCEPT(r0, 0x4b4e, 0x3d) ioctl$KVM_GET_XCRS(0xffffffffffffffff, 0x8188aea6, &(0x7f0000000280)={0x6, 0x8, [{0x9, 0x0, 0x6}, {0x5, 0x0, 0x400}, {0x1000}, {0x7fff, 0x0, 0x80}, {0x72c, 0x0, 0x7}, {0x6, 0x0, 0x9}]}) socket(0x0, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000200)={0x0, 'veth1_macvtap\x00'}) ioctl$KDGETMODE(r0, 0x4b3b, &(0x7f0000000080)) [ 376.131755][T15639] afs: Bad value for 'source' 04:31:13 executing program 3: r0 = memfd_create(&(0x7f0000001780)='\xd8\x05V\x15\xa5e\xf1\xb8\xf6\xa2\xba\x85\xb95\x03<\xb9;\xcd\x86\x8bD\xf9\xe9L\xe1Q\xfc\xe2\x97\xa0\xe8s\xb2\x11\xef\x1ac\xc9\x89\xc7\x0fv1\xa1:h\xf6\xf5\a\x8c\xf0Ay\x03\x97\xe77\xc1\xc8\xa6\xcb\xd2\xbe\xe9\xd2\xfb{u\xc3\xcd\xba\xa8G`9\xb5\x82\xa9p\xc8)\xe5$b\v\x8e\b\xf4\xf0\x11\xb4\xcb\"\xf4\xf3\xb4|\xdf\xa3\xdd\x9c\x8a\xf4D\xd3\xea\x11c}\x86H\xca=;i\x96\x183h\xba\x1a\x10', 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000380)='/dev/nullb0\x00', 0x0, 0x0) io_setup(0x1, &(0x7f00000004c0)=0x0) io_submit(r4, 0x8, &(0x7f00000000c0)=[&(0x7f0000000140)={0x3a00401a, 0x2759, 0x10, 0x0, 0x0, r3, &(0x7f0000000000)="98", 0x3e80000000, 0x0, 0x0, 0x2}]) 04:31:13 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = syz_genetlink_get_family_id$batadv(&(0x7f0000000000)='batadv\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$batadv(&(0x7f0000000000)='batadv\x00') sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r1, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)={0x14, r2, 0x301, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r1, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)={0x14, r0, 0x301, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) fsconfig$FSCONFIG_SET_FLAG(r4, 0x6, &(0x7f00000000c0)='posixacl\x00', 0x0, 0x0) getsockopt$PNPIPE_IFINDEX(r4, 0x113, 0x2, &(0x7f0000000180), &(0x7f00000001c0)=0x4) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x4b, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0x6) write$cgroup_int(r5, &(0x7f0000000200), 0x400c00) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$batadv(&(0x7f0000000000)='batadv\x00') sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r6, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)={0x14, r7, 0x301, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) flistxattr(r6, &(0x7f0000000240)=""/179, 0xb3) mount(&(0x7f0000000080)=ANY=[@ANYRESHEX=r0], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) 04:31:13 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) r0 = getpid() tkill(r0, 0x2f) wait4(r0, &(0x7f0000000000), 0x8, &(0x7f0000000080)) 04:31:13 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x656, 0x2}, 0x40080, 0x0, 0x0, 0x9}, 0x0, 0x3, 0xffffffffffffffff, 0x0) pread64(r0, &(0x7f00000001c0)=""/87, 0x57, 0x100000000) mount(&(0x7f00000002c0)=ANY=[@ANYBLOB="ef000000b045eeb122900d5e4bf6eb920fe73a34bc4fb18235ee01bfe5737a4af1957df5d1764bae3d27dae60c9fd4b4d2a218108c4c8e0fe4acc3c52a1669001520000000000000000001000000"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) fsconfig$FSCONFIG_SET_FLAG(r1, 0x6, &(0x7f00000000c0)='posixacl\x00', 0x0, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000000000)='batadv\x00') sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r2, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)={0x14, r3, 0x301, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) ioctl$FS_IOC_GETFSLABEL(r2, 0x81009431, &(0x7f0000000440)) ioctl$SIOCX25SCALLUSERDATA(r1, 0x89e5, &(0x7f0000000080)={0x48, "8113228b18cfe634f64b1c6c61c275634e4fe7222ff9ab45efb588667858bcc25ed45c81bc90a941da20568e376c901e8a3dfcd2ed5dcfa809b3b0fa5c974b6c51ac951412ca70aa10a3b6df36492ea76252e88691c8062db9de0b914551eee65c2dae096eac7add38a2e28d1b5806f256076938d5f05e73d8dce4447e9611cb"}) r4 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/qat_adf_ctl\x00', 0x20080, 0x0) r5 = syz_open_dev$vcsu(&(0x7f0000000380)='/dev/vcsu#\x00', 0x0, 0x10fa00) ioctl$BLKFRASET(r5, 0x1264, &(0x7f00000003c0)=0x3) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000340)={&(0x7f0000000240)='./file0\x00', r4}, 0x10) r6 = getpid() ptrace$peek(0x1, r6, &(0x7f0000000400)) 04:31:13 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, 0x0, &(0x7f00000001c0)) socket(0x2a, 0x4, 0x7) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000200)={0x0, 'veth1_macvtap\x00'}) [ 376.529878][T15657] kAFS: unparsable volume name [ 376.552513][T15652] kAFS: unparsable volume name [ 376.585621][T15657] kAFS: unparsable volume name 04:31:13 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) fsconfig$FSCONFIG_SET_FLAG(r0, 0x6, &(0x7f00000001c0)='mand\x00', 0x0, 0x0) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000000)=0x8) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x80, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000000000)='batadv\x00') sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r2, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)={0x14, r3, 0x301, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) r4 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ubi_ctrl\x00', 0x1000, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$batadv(&(0x7f0000000000)='batadv\x00') sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r5, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)={0x14, r6, 0x301, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) sendmsg$BATADV_CMD_GET_ORIGINATORS(r4, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x58, r6, 0x300, 0x70bd26, 0x25dfdbfd, {}, [@BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x400}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0x101}, @BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x7}, @BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5}, @BATADV_ATTR_GW_MODE={0x5, 0x33, 0x1}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @multicast}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0x101}]}, 0x58}, 0x1, 0x0, 0x0, 0x40001}, 0x4008000) fcntl$dupfd(r1, 0x406, r2) 04:31:14 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x40, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x18008, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x200, 0x0) getdents(r0, &(0x7f0000000080)=""/99, 0x63) mount(&(0x7f0000000240)=ANY=[@ANYBLOB='\x00\x00\x00\x00'], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, 0x0, &(0x7f00000001c0)) socket(0x0, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000200)={0x0, 'veth1_macvtap\x00'}) 04:31:14 executing program 0: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) fsconfig$FSCONFIG_SET_FLAG(r0, 0x6, &(0x7f00000000c0)='posixacl\x00', 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCDARP(r1, 0x8953, &(0x7f0000000240)={{0x2, 0x0, @private=0x5}, {0x0, @link_local}, 0x0, {0x2, 0x0, @dev}}) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000580)={{{@in=@broadcast, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in=@dev}}, &(0x7f0000000680)=0xe8) r3 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r4, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000006c0)={{{@in=@broadcast, @in=@empty, 0x4e23, 0xfbff, 0x4e22, 0x0, 0xa, 0x80, 0xe0, 0x22, r2, r4}, {0xbd, 0x1, 0x5, 0x7, 0x3, 0x7, 0x4, 0x1ff}, {0xffffffff, 0x400, 0x1ff, 0x80000001}, 0xffffffff, 0x7f, 0x1, 0x1, 0x2, 0xb108e9d1dbd1c42e}, {{@in6=@mcast2, 0x4d4, 0x2b}, 0xa, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x3507, 0x1, 0x2, 0x7, 0x400, 0x4, 0x4}}, 0xe8) mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) ioctl$F2FS_IOC_START_VOLATILE_WRITE(0xffffffffffffffff, 0xf503, 0x0) r5 = perf_event_open(&(0x7f0000001340)={0x3, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x36}, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23580646"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) r6 = signalfd(r5, &(0x7f0000000000)={[0x1000]}, 0x8) recvmsg$kcm(r6, &(0x7f0000000200)={&(0x7f0000000080)=@can={0x1d, 0x0}, 0x80, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/61, 0x3d}, {&(0x7f0000000280)=""/235, 0xeb}, {&(0x7f0000000380)=""/207, 0xcf}], 0x3, &(0x7f0000000480)=""/228, 0xe4}, 0x1000) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r9 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r9, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=ANY=[@ANYBLOB="3801000024000b0d00"/20, @ANYRES32=r8, @ANYBLOB="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"], 0x138}}, 0x0) sendmsg$ETHTOOL_MSG_TSINFO_GET(0xffffffffffffffff, &(0x7f0000000a40)={&(0x7f00000007c0)={0x10, 0x0, 0x0, 0x84800}, 0xc, &(0x7f0000000a00)={&(0x7f00000008c0)={0x12c, 0x0, 0x0, 0x70bd26, 0x25dfdbff, {}, [@HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x6}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'sit0\x00'}]}, @HEADER={0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}]}, @HEADER={0x60, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv_slave_1\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'gre0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x38, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bond_slave_0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}]}, @HEADER={0x44, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r7}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x6}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'hsr0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_macvtap\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}]}]}, 0x12c}, 0x1, 0x0, 0x0, 0x8000}, 0x80) 04:31:14 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) socket$bt_bnep(0x1f, 0x3, 0x4) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) [ 376.897118][T15670] afs: Bad value for 'source' [ 376.966966][T15670] afs: Bad value for 'source' 04:31:14 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) fsconfig$FSCONFIG_SET_FLAG(r0, 0x6, &(0x7f00000000c0)='posixacl\x00', 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000040), 0x4) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f00000001c0)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='virtiofs\x00', 0x0, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) fsconfig$FSCONFIG_SET_FLAG(r1, 0x6, &(0x7f00000000c0)='posixacl\x00', 0x0, 0x0) write$P9_RRENAME(r1, &(0x7f0000000000)={0x7, 0x15, 0x1}, 0x7) 04:31:14 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, 0x0, &(0x7f00000001c0)) r0 = socket(0x0, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000200)={0x0, 'veth1_macvtap\x00'}) getsockopt$IP_VS_SO_GET_INFO(r0, 0x0, 0x481, &(0x7f0000000000), &(0x7f0000000080)=0xc) 04:31:14 executing program 3: r0 = memfd_create(&(0x7f0000001780)='\xd8\x05V\x15\xa5e\xf1\xb8\xf6\xa2\xba\x85\xb95\x03<\xb9;\xcd\x86\x8bD\xf9\xe9L\xe1Q\xfc\xe2\x97\xa0\xe8s\xb2\x11\xef\x1ac\xc9\x89\xc7\x0fv1\xa1:h\xf6\xf5\a\x8c\xf0Ay\x03\x97\xe77\xc1\xc8\xa6\xcb\xd2\xbe\xe9\xd2\xfb{u\xc3\xcd\xba\xa8G`9\xb5\x82\xa9p\xc8)\xe5$b\v\x8e\b\xf4\xf0\x11\xb4\xcb\"\xf4\xf3\xb4|\xdf\xa3\xdd\x9c\x8a\xf4D\xd3\xea\x11c}\x86H\xca=;i\x96\x183h\xba\x1a\x10', 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000380)='/dev/nullb0\x00', 0x0, 0x0) io_setup(0x1, &(0x7f00000004c0)=0x0) io_submit(r4, 0x8, &(0x7f00000000c0)=[&(0x7f0000000140)={0x3a00401b, 0x2759, 0x10, 0x0, 0x0, r3, &(0x7f0000000000)="98", 0x3e80000000, 0x0, 0x0, 0x2}]) [ 377.104910][T15680] virtio-fs: tag <> not found 04:31:14 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) fsconfig$FSCONFIG_SET_FLAG(r0, 0x6, &(0x7f00000000c0)='posixacl\x00', 0x0, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r3 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r3, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=@newqdisc={0x138, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_gred={{0x9, 0x1, 'gred\x00'}, {0x108, 0x2, [@TCA_GRED_STAB={0x104, 0x2, "e8652700f479df1c5c88dcdfc38f1eaefda68919704f152d6d96d18f73cb0f24d682a44a3fce667f08c07c113fc18f9b4ec0a810da3ac3c701a305b4d250029bd3ed2882faedc0a9e55a8ba57219747cf9a1f2aaa8b24871db98fbf5acbc7803c45b5f8c186acaa45a08aa7c91e5ffcf71a6512c148bfdefb6489a776f47eae4ca650c27c95af89ae778383ab2d07ea557a28da99597acd5cff23d4dc5131a3dc34e791abe1c4d501a6a90da03a1fc0fd22af26bd28c18b993596826966d514941969b7e6324fd0193ab6bec12ffb23b9da438a108392379c39b0e3327db205ce4f8d75be51e6b81b9fa8466a37bd41c5ffd8c1c4950becc763d7ee6c757aa8c"}]}}]}, 0x138}}, 0x0) sendto$packet(r0, &(0x7f00000001c0)="136d1f77b7535a8e2e8d304693f43ff2ffabda5fc91aa2894ca8d7f2a31ed4d48fdc00b03dc0767cc45ec8699728b1322b073f5808fe93d103c20af6ca098f0fca11b0a2ff07cd6424d3e6ecdf9161aafec0ad59b8d8f3fc11ddd8318b6a7c82842917daf0f30efcdfee03a27a", 0x6d, 0x20000811, &(0x7f0000000100)={0x11, 0x17, r2, 0x1, 0x2, 0x6, @random="7ab062c2df46"}, 0x14) r4 = openat2(r0, &(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000080)={0x200000, 0xc0, 0x1}, 0x18) socket$rxrpc(0x21, 0x2, 0xa) ioctl$RTC_PIE_OFF(r4, 0x7006) ioctl$SNDRV_PCM_IOCTL_RESUME(r4, 0x4147, 0x0) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r0, 0x40505412, &(0x7f0000000400)={0x5, 0x7, 0x9, 0x0, 0x6}) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) fsconfig$FSCONFIG_SET_FLAG(r5, 0x6, &(0x7f00000000c0)='posixacl\x00', 0x0, 0x0) ioctl$LOOP_GET_STATUS64(r5, 0x4c05, &(0x7f0000000280)) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) syz_open_dev$char_usb(0xc, 0xb4, 0x5) [ 377.132799][T15680] virtio-fs: tag <> not found 04:31:14 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) fsconfig$FSCONFIG_SET_FLAG(r0, 0x6, &(0x7f00000000c0)='posixacl\x00', 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000040), 0x4) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f00000001c0)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='virtiofs\x00', 0x0, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) fsconfig$FSCONFIG_SET_FLAG(r1, 0x6, &(0x7f00000000c0)='posixacl\x00', 0x0, 0x0) write$P9_RRENAME(r1, &(0x7f0000000000)={0x7, 0x15, 0x1}, 0x7) 04:31:14 executing program 0: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) mkdirat(r0, &(0x7f0000000140)='./file0\x00', 0x0) flistxattr(0xffffffffffffffff, &(0x7f0000000280)=""/217, 0xd9) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) 04:31:14 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, 0x0, &(0x7f00000001c0)) acct(&(0x7f0000000280)='./file0\x00') socket(0x0, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000200)={0x0, 'veth1_macvtap\x00'}) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) fsconfig$FSCONFIG_SET_FLAG(r0, 0x6, &(0x7f00000000c0)='posixacl\x00', 0x0, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) fsconfig$FSCONFIG_SET_FLAG(r1, 0x6, &(0x7f00000000c0)='posixacl\x00', 0x0, 0x0) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$SNDCTL_DSP_SPEED(0xffffffffffffffff, 0xc0045002, &(0x7f00000002c0)=0x6) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=@newqdisc={0x138, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_gred={{0x9, 0x1, 'gred\x00'}, {0x108, 0x2, [@TCA_GRED_STAB={0x104, 0x2, "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"}]}}]}, 0x138}}, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETPRL(r1, 0x89f4, &(0x7f0000000000)={'ip6_vti0\x00', &(0x7f0000000080)={'ip6tnl0\x00', r3, 0x4, 0x96, 0x8, 0x7, 0x42, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @private0, 0x700, 0x711, 0x8, 0x20}}) connect$can_j1939(r0, &(0x7f0000000100)={0x1d, r5, 0x2, {0x1, 0xff, 0x1}, 0x2}, 0x18) 04:31:14 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) lstat(&(0x7f0000000000)='./file1\x00', &(0x7f0000000080)) [ 377.647086][ T2576] FS-Cache: Duplicate cookie detected [ 377.652604][ T2576] FS-Cache: O-cookie c=00000000a63f5055 [p=00000000a00f4ec0 fl=212 nc=0 na=0] [ 377.661618][ T2576] FS-Cache: O-cookie d=0000000000000000 n=0000000000000000 [ 377.668864][ T2576] FS-Cache: O-key=[2] 'e9e7' [ 377.673487][ T2576] FS-Cache: N-cookie c=00000000c0a8494c [p=00000000a00f4ec0 fl=2 nc=0 na=1] [ 377.682211][ T2576] FS-Cache: N-cookie d=0000000035364e0c n=0000000047839f7d [ 377.689448][ T2576] FS-Cache: N-key=[2] 'e9e7' 04:31:14 executing program 0: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) fsconfig$FSCONFIG_SET_FLAG(r0, 0x6, &(0x7f00000000c0)='posixacl\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x1ff) mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) ioctl$SNDCTL_FM_LOAD_INSTR(r0, 0x40285107) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) 04:31:15 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) fsconfig$FSCONFIG_SET_FLAG(r0, 0x6, &(0x7f00000000c0)='posixacl\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000000)='./file1\x00', 0x93) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) 04:31:15 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, 0x0, &(0x7f00000001c0)) socket(0x2a, 0x4, 0x7) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000200)={0x0, 'veth1_macvtap\x00'}) [ 377.872492][ T12] FS-Cache: Duplicate cookie detected [ 377.878028][ T12] FS-Cache: O-cookie c=00000000dc199a98 [p=00000000a00f4ec0 fl=222 nc=0 na=1] [ 377.886880][ T12] FS-Cache: O-cookie d=0000000035364e0c n=00000000d8202e90 [ 377.894185][ T12] FS-Cache: O-key=[2] 'e9e7' [ 377.898876][ T12] FS-Cache: N-cookie c=0000000096ad40ed [p=00000000a00f4ec0 fl=2 nc=0 na=1] [ 377.907671][ T12] FS-Cache: N-cookie d=0000000035364e0c n=00000000109343ed [ 377.914865][ T12] FS-Cache: N-key=[2] 'e9e7' 04:31:15 executing program 3: r0 = memfd_create(&(0x7f0000001780)='\xd8\x05V\x15\xa5e\xf1\xb8\xf6\xa2\xba\x85\xb95\x03<\xb9;\xcd\x86\x8bD\xf9\xe9L\xe1Q\xfc\xe2\x97\xa0\xe8s\xb2\x11\xef\x1ac\xc9\x89\xc7\x0fv1\xa1:h\xf6\xf5\a\x8c\xf0Ay\x03\x97\xe77\xc1\xc8\xa6\xcb\xd2\xbe\xe9\xd2\xfb{u\xc3\xcd\xba\xa8G`9\xb5\x82\xa9p\xc8)\xe5$b\v\x8e\b\xf4\xf0\x11\xb4\xcb\"\xf4\xf3\xb4|\xdf\xa3\xdd\x9c\x8a\xf4D\xd3\xea\x11c}\x86H\xca=;i\x96\x183h\xba\x1a\x10', 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000380)='/dev/nullb0\x00', 0x0, 0x0) io_setup(0x1, &(0x7f00000004c0)=0x0) io_submit(r4, 0x8, &(0x7f00000000c0)=[&(0x7f0000000140)={0x3a00401c, 0x2759, 0x10, 0x0, 0x0, r3, &(0x7f0000000000)="98", 0x3e80000000, 0x0, 0x0, 0x2}]) [ 377.923062][ T7954] FS-Cache: Duplicate cookie detected [ 377.928668][ T7954] FS-Cache: O-cookie c=00000000dc199a98 [p=00000000a00f4ec0 fl=222 nc=0 na=1] [ 377.937598][ T7954] FS-Cache: O-cookie d=0000000035364e0c n=00000000d8202e90 [ 377.944796][ T7954] FS-Cache: O-key=[2] 'e9e7' [ 377.949502][ T7954] FS-Cache: N-cookie c=000000007cf29cf9 [p=00000000a00f4ec0 fl=2 nc=0 na=1] [ 377.958220][ T7954] FS-Cache: N-cookie d=0000000035364e0c n=000000005db2aa6c [ 377.965414][ T7954] FS-Cache: N-key=[2] 'e9e7' 04:31:15 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x180) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) 04:31:15 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000000)='batadv\x00') sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)={0x14, r1, 0x301, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) r2 = syz_open_dev$radio(&(0x7f0000000080)='/dev/radio#\x00', 0x1, 0x2) r3 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0x1, 0x2) splice(r2, 0x0, r3, 0x0, 0x9, 0x7) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x3}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, 0x0, &(0x7f00000001c0)) socket(0x0, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000200)={0x0, 'veth1_macvtap\x00'}) 04:31:15 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, 0x0, &(0x7f00000001c0)) socket(0x2a, 0x4, 0x7) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000200)={0x0, 'veth1_macvtap\x00'}) 04:31:15 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000240)={{0x2, 0x0, @private=0x5}, {0x6, @link_local}, 0x2, {0x2, 0x0, @dev}}) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000000)={0x0, 'ip6tnl0\x00', 0x1}, 0x18) mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r2, 0x0) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) fsconfig$FSCONFIG_SET_FLAG(r3, 0x6, &(0x7f00000000c0)='posixacl\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'trusted:', 'em1', 0x20, 0xdfc}, 0xfffffffffffffff5, 0xfffffffffffffffd) r5 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0x1f1, 0xfffffffffffffffe) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$update(0x2, r5, &(0x7f0000000000)="9f", 0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, &(0x7f0000000a40)={{{@in6=@dev, @in6=@ipv4={[], [], @initdev}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}}}, &(0x7f0000000940)=0xfffffff4) r7 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r8, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0\x00', 0x61dd, 0xa, &(0x7f0000000740)=[{&(0x7f00000002c0)="a825978453815aa75b563cd8c77304b4e7bca5c4820e2efd78636cbc6023886fcb7f1988fa49b40240610521320b41987bac9e1f59d2a31564843e49c724d79735ad06ec5ab47474a86ea5693b65ba7766774d0539b808d9fad8e396b602ceff86efafa059558898eb0c29cbdd55eaefe68cb2ff0cebd62a82037bb0ec925e9d69c7bbdc9a77d3d54293e69edd0976525a8d096d27a8c5e56caf83b916611af42313a4897a84829e97c64c49ffba9d9d957211bd27", 0xe1, 0x1ff}, {&(0x7f00000001c0)="e25533c27752c84c4062f9a89219b68b8d24589853e9ae3a25e06cf6a574702d2bc4ce1a741584bab400e127549d6c8fe70b2d006b4ef5f7ba811b34e4f53270219ad08b26f9b89d2144ba0f5fd1dc912183062c70a9cf263cb1fe91fcbb2f9db1543bf830b087651688994d74081c25978359321c0e5544e929", 0x7a, 0x4}, {&(0x7f0000000840)="a4b9b595", 0x4, 0x7f}, {&(0x7f0000000b40)="4f4a32dfe2da74db03d84f8bb86b8cf600368940ab1bf7007d5740d8aa67f373b89bef2e8c6520a6f567f6d612206c67980ef87c09d2c1e0163d66f154e02312e0bd3c584e7202684426ba5e2eae9af1a13f707fe53c64632e7386c87737030b2a551529ae4f4f2f6a51edc888686aeec66dddeaafe767d084c0f119314b6124f07e281a5e6763c6d68c374e0ebc2fb4eb3df2fc75f020f96581e055e99ddcc7cbadd18795d1fef9a0ee75d85ef35e2565178217804de614f6960d8f3c1c12f70d11161d6388c6fc84ca33b451fed5e2c0df384fd386139920a3aa8767bf09c0c42c5a85d62b15000000000000000000", 0xf0, 0x4}, {&(0x7f0000000480)="c54d5b3af43c7d7a111d9d167fa9503c500626a5a6d832288e712ed750457b00db057a5ec85d5d7faae2f443546905eb70fd51e0790e00d126baf81b9d474fed23c0f232623c28badb5033ae972be88de3a274327a3e0aad727cba5399e6", 0x5e, 0x7}, {&(0x7f0000000500)="d7875565aafdb7ad6823bc8d31ab34e75aa3ca9c1754159b3f3362b4633568d18c8ca316623ef48ba43a1f51de9fc7945341184970599a9b7ac56e", 0x3b, 0x2}, {&(0x7f0000000540)="f932110eb83bb6343070d919301a41bc3664f59a58ed75b58c513aee889585df63225f6562741dd1958c9c975260869686ed67ea19", 0x35, 0x8000000000000007}, {&(0x7f0000000580)="e10469535906b9a83619135420dd63879dff38fac22cd5dec444b33e5deebe1e9deb7abec1a554bd37822a21f58bc5b8a92febf6fe9645029348f0cbea0cdb2d1f5e43f977e39ed0ffb4e166fe060875232dee990f7e3cdeb073f21a5926682d0167de24896a742e0037c2dfd24655dd0088a62551010a567469f7308c479938c42a852a", 0x84, 0x1ff}, {&(0x7f0000000640)="914d88d2431326130dd037f3b8e3f16467a928ac06bb09fa56fb5478dd1997733a5fcb29dc89287bd2a2c75e9b810c30f563ff0c2e2c62399452431b7ab2b72c5f4268d009ac80715280841121809793775fc8e3562706350bd8d2b21aef80ae74510dbce26f4db57a8c226d20c4f6ed85fee9ee0074b4d5c80325cb97e84c895b438bd0422959d18121181099e0e9e0582b7244ccb42438", 0x98, 0x26}, {&(0x7f0000000100)="44a7bc79b2456b922de98e367ccb106a6323ab0755510e81adc64f795ce661f89b17493255500a8d000259c6b0663132ba5974f80faf7848cd1064c30c", 0x3d, 0x5}], 0x6000, &(0x7f0000000980)={[{@session={'session', 0x3d, 0x20}}, {@type={'type', 0x3d, "0f70b6e8"}}], [{@fsmagic={'fsmagic', 0x3d, 0xb}}, {@audit='audit'}, {@permit_directio='permit_directio'}, {@fowner_lt={'fowner<', r6}}, {@appraise='appraise'}]}) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) 04:31:15 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = getpid() r2 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setresgid(0x0, r3, 0x0) sendmsg$unix(r0, &(0x7f0000001440)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=[@cred={{0x1c, 0x1, 0x2, {r1, 0x0, r3}}}], 0x20}, 0x0) setfsgid(r3) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) fsconfig$FSCONFIG_SET_FLAG(r4, 0x6, &(0x7f00000000c0)='posixacl\x00', 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r4, 0x89f9, &(0x7f0000000880)={'syztnl1\x00', &(0x7f0000000800)={'syztnl0\x00', 0x0, 0x4, 0x3f, 0xe4, 0x5, 0x21, @local, @mcast1, 0x20, 0x0, 0x7, 0xfffffffc}}) ioctl$sock_SIOCDELRT(r0, 0x890c, &(0x7f0000000900)={0x0, @can={0x1d, r5}, @nl, @nfc={0x27, 0x0, 0x2, 0x3}, 0x9, 0x0, 0x0, 0x0, 0x433f, &(0x7f00000008c0)='macvlan0\x00', 0xdd, 0x400, 0x3}) [ 378.350177][T15732] encrypted_key: insufficient parameters specified 04:31:15 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, 0x0, &(0x7f00000001c0)) acct(&(0x7f0000000280)='./file0\x00') socket(0x0, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000200)={0x0, 'veth1_macvtap\x00'}) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) fsconfig$FSCONFIG_SET_FLAG(r0, 0x6, &(0x7f00000000c0)='posixacl\x00', 0x0, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) fsconfig$FSCONFIG_SET_FLAG(r1, 0x6, &(0x7f00000000c0)='posixacl\x00', 0x0, 0x0) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$SNDCTL_DSP_SPEED(0xffffffffffffffff, 0xc0045002, &(0x7f00000002c0)=0x6) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=@newqdisc={0x138, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_gred={{0x9, 0x1, 'gred\x00'}, {0x108, 0x2, [@TCA_GRED_STAB={0x104, 0x2, "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"}]}}]}, 0x138}}, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETPRL(r1, 0x89f4, &(0x7f0000000000)={'ip6_vti0\x00', &(0x7f0000000080)={'ip6tnl0\x00', r3, 0x4, 0x96, 0x8, 0x7, 0x42, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @private0, 0x700, 0x711, 0x8, 0x20}}) connect$can_j1939(r0, &(0x7f0000000100)={0x1d, r5, 0x2, {0x1, 0xff, 0x1}, 0x2}, 0x18) 04:31:15 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) fsconfig$FSCONFIG_SET_FLAG(r0, 0x6, &(0x7f00000000c0)='posixacl\x00', 0x0, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$batadv(&(0x7f0000000000)='batadv\x00') sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r1, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)={0x14, r2, 0x100, 0x0, 0x0, {0xa}}, 0x14}, 0x1, 0x0, 0x0, 0x2894}, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000100)={0x0, 0x4, 0x4, 0xffffffffffffffff}) setsockopt$TIPC_GROUP_LEAVE(r0, 0x10f, 0x88) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000240)='IPVS\x00') sendmsg$IPVS_CMD_DEL_SERVICE(r0, &(0x7f0000000400)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000003c0)={&(0x7f0000000280)={0x140, r4, 0x1, 0x70bd26, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_SERVICE={0x34, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_PORT={0x6, 0x4, 0x4e24}, @IPVS_SVC_ATTR_PROTOCOL={0x6, 0x2, 0x87}, @IPVS_SVC_ATTR_PROTOCOL={0x6}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'ovf\x00'}, @IPVS_SVC_ATTR_AF={0x6, 0x1, 0x2}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}]}, @IPVS_CMD_ATTR_DAEMON={0x60, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x3}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @multicast1}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @dev={0xfe, 0x80, [], 0x32}}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x5}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'erspan0\x00'}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @ipv4={[], [], @private=0xa010100}}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}]}, @IPVS_CMD_ATTR_SERVICE={0x68, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x23, 0x4}}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x1}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x37, 0x1}}, @IPVS_SVC_ATTR_PORT={0x6, 0x4, 0x4e24}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_FWMARK={0x8}, @IPVS_SVC_ATTR_PORT={0xffffffffffffff9d, 0x4, 0x4e21}, @IPVS_SVC_ATTR_PROTOCOL={0x6, 0x2, 0x88}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@rand_addr=' \x01\x00'}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x1}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x6}, @IPVS_CMD_ATTR_SERVICE={0x28, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}]}]}, 0x140}, 0x1, 0x0, 0x0, 0x91}, 0x4000000) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) fsconfig$FSCONFIG_SET_FLAG(r5, 0x6, &(0x7f00000000c0)='posixacl\x00', 0x0, 0x0) ioctl$DRM_IOCTL_MODE_RMFB(r5, 0xc00464af, &(0x7f0000000440)=0x7fffffff) fsconfig$FSCONFIG_SET_FLAG(r3, 0x6, &(0x7f00000000c0)='posixacl\x00', 0x0, 0x0) r6 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) fsconfig$FSCONFIG_SET_FLAG(r6, 0x6, &(0x7f00000000c0)='posixacl\x00', 0x0, 0x0) ioctl$USBDEVFS_RELEASEINTERFACE(r6, 0x80045510, &(0x7f0000000180)=0xb3) ioctl$BLKBSZGET(r3, 0x80081270, &(0x7f0000000080)) mount(&(0x7f0000000240)=ANY=[], &(0x7f00000001c0)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x8824, 0x0) 04:31:15 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) symlink(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00') mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, 0x0, &(0x7f00000001c0)) r0 = socket(0x0, 0x0, 0x0) ioctl$SIOCGSTAMPNS(r0, 0x8907, &(0x7f00000000c0)) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000200)={0x0, 'veth1_macvtap\x00'}) 04:31:15 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) iopl(0x4) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) fsconfig$FSCONFIG_SET_FLAG(r0, 0x6, &(0x7f00000000c0)='posixacl\x00', 0x0, 0x0) ioctl$DRM_IOCTL_MODE_GET_LEASE(r0, 0xc01064c8, &(0x7f00000001c0)={0x8, 0x0, &(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) fsconfig$FSCONFIG_SET_FLAG(r1, 0x6, &(0x7f00000000c0)='posixacl\x00', 0x0, 0x0) ioctl$CAPI_GET_FLAGS(r1, 0x80044323, &(0x7f0000000000)) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snd/timer\x00', 0x545080) mount(&(0x7f0000000200)=ANY=[@ANYBLOB="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"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='binfmt_misc\x00', 0x0, 0x0) 04:31:16 executing program 1: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) fsconfig$FSCONFIG_SET_FLAG(r0, 0x6, &(0x7f00000000c0)='posixacl\x00', 0x0, 0x0) sendto$netrom(r0, &(0x7f0000000280)="22cdd179583a83de516c20502baad6ef32dd1b234e8bec193c7f4bdca58fc42621440f2f53d6a0974f2472d76d42677eb2f27e7dd653cac1371a3963099db2997818f28b0466305fc655e47524c92b9d27cf2e3820fceb4ffc9eaff86a98d1844b900cffdc262060472e7f84780b085ff5cf1aa69c2da424be60ce8bb5b0cc85305eb942cd32bb73e0b48612e135f36a925122f1df75baab06a4e83e189604c354486b45fe7ec26bb52943c9fb65564fd2a5b667e603b1dfa6fa71b639f798377b50bdd711a4ce62641e6f7210", 0xcd, 0x20000044, &(0x7f0000000080)={{0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, 0x3}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @null]}, 0x48) mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) mount(&(0x7f0000000100)=ANY=[@ANYBLOB="2362467a00000000ec0000e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) 04:31:16 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0xf, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, 0x0, &(0x7f00000001c0)) socket(0x0, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000200)={0x0, 'veth1_macvtap\x00'}) [ 378.968636][T15761] kAFS: No cell specified [ 378.999672][T15765] kAFS: No cell specified 04:31:16 executing program 3: r0 = memfd_create(&(0x7f0000001780)='\xd8\x05V\x15\xa5e\xf1\xb8\xf6\xa2\xba\x85\xb95\x03<\xb9;\xcd\x86\x8bD\xf9\xe9L\xe1Q\xfc\xe2\x97\xa0\xe8s\xb2\x11\xef\x1ac\xc9\x89\xc7\x0fv1\xa1:h\xf6\xf5\a\x8c\xf0Ay\x03\x97\xe77\xc1\xc8\xa6\xcb\xd2\xbe\xe9\xd2\xfb{u\xc3\xcd\xba\xa8G`9\xb5\x82\xa9p\xc8)\xe5$b\v\x8e\b\xf4\xf0\x11\xb4\xcb\"\xf4\xf3\xb4|\xdf\xa3\xdd\x9c\x8a\xf4D\xd3\xea\x11c}\x86H\xca=;i\x96\x183h\xba\x1a\x10', 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000380)='/dev/nullb0\x00', 0x0, 0x0) io_setup(0x1, &(0x7f00000004c0)=0x0) io_submit(r4, 0x8, &(0x7f00000000c0)=[&(0x7f0000000140)={0x3a00401d, 0x2759, 0x10, 0x0, 0x0, r3, &(0x7f0000000000)="98", 0x3e80000000, 0x0, 0x0, 0x2}]) 04:31:16 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = getpid() r2 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setresgid(0x0, r3, 0x0) sendmsg$unix(r0, &(0x7f0000001440)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=[@cred={{0x1c, 0x1, 0x2, {r1, 0x0, r3}}}], 0x20}, 0x0) setfsgid(r3) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) fsconfig$FSCONFIG_SET_FLAG(r4, 0x6, &(0x7f00000000c0)='posixacl\x00', 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r4, 0x89f9, &(0x7f0000000880)={'syztnl1\x00', &(0x7f0000000800)={'syztnl0\x00', 0x0, 0x4, 0x3f, 0xe4, 0x5, 0x21, @local, @mcast1, 0x20, 0x0, 0x7, 0xfffffffc}}) ioctl$sock_SIOCDELRT(r0, 0x890c, &(0x7f0000000900)={0x0, @can={0x1d, r5}, @nl, @nfc={0x27, 0x0, 0x2, 0x3}, 0x9, 0x0, 0x0, 0x0, 0x433f, &(0x7f00000008c0)='macvlan0\x00', 0xdd, 0x400, 0x3}) 04:31:16 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) fsconfig$FSCONFIG_SET_FLAG(r0, 0x6, &(0x7f00000000c0)='posixacl\x00', 0x0, 0x0) faccessat2(r0, &(0x7f0000000000)='./file0\x00', 0x10, 0x100) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e71e"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) 04:31:16 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x10be00, 0x0) bind$l2tp6(r0, &(0x7f0000000080)={0xa, 0x0, 0x6d5, @loopback, 0x401, 0x4}, 0x20) r1 = dup3(r0, r0, 0x0) ioctl$SNAPSHOT_PREF_IMAGE_SIZE(r1, 0x3312, 0x9e) 04:31:16 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) fsconfig$FSCONFIG_SET_FLAG(r0, 0x6, &(0x7f00000000c0)='posixacl\x00', 0x0, 0x0) ioctl$USBDEVFS_CONNECTINFO(r0, 0x40085511, &(0x7f0000000000)) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) fsconfig$FSCONFIG_SET_FLAG(r1, 0x6, &(0x7f00000000c0)='posixacl\x00', 0x0, 0x0) ioctl$CHAR_RAW_PG(r1, 0x1269, &(0x7f0000000080)={0x4, 0x0, 0xfc, &(0x7f0000000280)="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"}) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e63a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, 0x0, &(0x7f00000001c0)) socket(0x0, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000200)={0x0, 'veth1_macvtap\x00'}) [ 379.361894][T15778] kAFS: No cell specified 04:31:16 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0xf, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, 0x0, &(0x7f00000001c0)) socket(0x0, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000200)={0x0, 'veth1_macvtap\x00'}) 04:31:16 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, 0x0, &(0x7f00000001c0)) socket(0x0, 0x0, 0x0) statfs(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)=""/186) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000200)={0x0, 'veth1_macvtap\x00'}) 04:31:16 executing program 1: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) fsconfig$FSCONFIG_SET_FLAG(r0, 0x6, &(0x7f00000000c0)='posixacl\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000140)='./file0\x00', 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)={0x14, 0x0, 0x301, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = syz_genetlink_get_family_id$team(&(0x7f00000000c0)='team\x00') sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, r2, 0x1}, 0x14}}, 0x0) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r5 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r5, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=@newqdisc={0x138, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_gred={{0x9, 0x1, 'gred\x00'}, {0x108, 0x2, [@TCA_GRED_STAB={0x104, 0x2, "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"}]}}]}, 0x138}}, 0x0) r6 = socket(0x11, 0x800000003, 0x0) bind(r6, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r6, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r8 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r8, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=@newqdisc={0x138, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r7, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_gred={{0x9, 0x1, 'gred\x00'}, {0x108, 0x2, [@TCA_GRED_STAB={0x104, 0x2, "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"}]}}]}, 0x138}}, 0x0) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000100)={&(0x7f0000000280)={0xd0, r2, 0x8, 0x70bd2c, 0x25dfdbfb, {}, [{{0x8, 0x1, r4}, {0xb4, 0x2, 0x0, 0x1, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x5}, {0x8, 0x4, 0x40}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x5}, {0x8, 0x4, 0x1000}}, {0x8, 0x6, r7}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x5}, {0x8, 0x4, 0x8}}}]}}]}, 0xd0}, 0x1, 0x0, 0x0, 0x4004000}, 0x10) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) 04:31:17 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, 0x0, &(0x7f00000001c0)) socket(0x0, 0x0, 0x0) statfs(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)=""/186) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000200)={0x0, 'veth1_macvtap\x00'}) 04:31:17 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0xfe, 0xff, 0x0, 0x8, 0x0, 0x41c1, 0x10100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}, 0x0, 0x6, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x5, 0x115880) write$cgroup_int(r0, &(0x7f0000000080)=0xfffffffffffeffff, 0x12) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='debugfs\x00', 0x2000, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, 0x0, &(0x7f00000001c0)) socket(0x0, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000200)={0x0, 'veth1_macvtap\x00'}) 04:31:17 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) 04:31:17 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x761, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$urandom(0xffffffffffffff9c, &(0x7f0000000340)='/dev/urandom\x00', 0x121202, 0x0) mount(&(0x7f0000000000)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00'], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) r0 = openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ocfs2_control\x00', 0x101800, 0x0) sendmsg$NFNL_MSG_ACCT_GET_CTRZERO(r0, &(0x7f00000002c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000100)={&(0x7f0000000240)={0x54, 0x2, 0x7, 0x401, 0x0, 0x0, {0xa, 0x0, 0x3}, [@NFACCT_FILTER={0x1c, 0x7, 0x0, 0x1, [@NFACCT_FILTER_MASK={0x8, 0x1, 0x1, 0x0, 0x8f9e}, @NFACCT_FILTER_MASK={0x8, 0x1, 0x1, 0x0, 0x7016}, @NFACCT_FILTER_VALUE={0x8, 0x2, 0x1, 0x0, 0xa51}]}, @NFACCT_NAME={0x9, 0x1, 'syz1\x00'}, @NFACCT_NAME={0x9, 0x1, 'syz0\x00'}, @NFACCT_QUOTA={0xc, 0x6, 0x1, 0x0, 0xdf7}]}, 0x54}, 0x1, 0x0, 0x0, 0x4044}, 0xc00) ioctl$KVM_SET_MP_STATE(r0, 0x4004ae99, &(0x7f0000000300)=0x5) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, 0x0, &(0x7f00000001c0)) socket(0x0, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000200)={0x0, 'veth1_macvtap\x00'}) 04:31:17 executing program 3: r0 = memfd_create(&(0x7f0000001780)='\xd8\x05V\x15\xa5e\xf1\xb8\xf6\xa2\xba\x85\xb95\x03<\xb9;\xcd\x86\x8bD\xf9\xe9L\xe1Q\xfc\xe2\x97\xa0\xe8s\xb2\x11\xef\x1ac\xc9\x89\xc7\x0fv1\xa1:h\xf6\xf5\a\x8c\xf0Ay\x03\x97\xe77\xc1\xc8\xa6\xcb\xd2\xbe\xe9\xd2\xfb{u\xc3\xcd\xba\xa8G`9\xb5\x82\xa9p\xc8)\xe5$b\v\x8e\b\xf4\xf0\x11\xb4\xcb\"\xf4\xf3\xb4|\xdf\xa3\xdd\x9c\x8a\xf4D\xd3\xea\x11c}\x86H\xca=;i\x96\x183h\xba\x1a\x10', 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000380)='/dev/nullb0\x00', 0x0, 0x0) io_setup(0x1, &(0x7f00000004c0)=0x0) io_submit(r4, 0x8, &(0x7f00000000c0)=[&(0x7f0000000140)={0x3a00401e, 0x2759, 0x10, 0x0, 0x0, r3, &(0x7f0000000000)="98", 0x3e80000000, 0x0, 0x0, 0x2}]) 04:31:17 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) iopl(0x4) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) fsconfig$FSCONFIG_SET_FLAG(r0, 0x6, &(0x7f00000000c0)='posixacl\x00', 0x0, 0x0) ioctl$DRM_IOCTL_MODE_GET_LEASE(r0, 0xc01064c8, &(0x7f00000001c0)={0x8, 0x0, &(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) fsconfig$FSCONFIG_SET_FLAG(r1, 0x6, &(0x7f00000000c0)='posixacl\x00', 0x0, 0x0) ioctl$CAPI_GET_FLAGS(r1, 0x80044323, &(0x7f0000000000)) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snd/timer\x00', 0x545080) mount(&(0x7f0000000200)=ANY=[@ANYBLOB="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"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='binfmt_misc\x00', 0x0, 0x0) 04:31:17 executing program 1: mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) [ 380.289842][T15812] afs: Bad value for 'source' [ 380.398243][T15819] afs: Bad value for 'source' 04:31:17 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) fsconfig$FSCONFIG_SET_FLAG(r0, 0x6, &(0x7f00000000c0)='posixacl\x00', 0x0, 0x0) ioctl$SNDCTL_SEQ_GETTIME(r0, 0x80045113, &(0x7f0000000000)) 04:31:17 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, 0x0, &(0x7f00000001c0)) socket(0x0, 0x0, 0x0) prctl$PR_SET_FPEMU(0xa, 0x1) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000200)={0x0, 'veth1_macvtap\x00'}) 04:31:17 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000000)='batadv\x00') sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)={0x14, r1, 0x301, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) r2 = syz_open_dev$radio(&(0x7f0000000080)='/dev/radio#\x00', 0x1, 0x2) r3 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0x1, 0x2) splice(r2, 0x0, r3, 0x0, 0x9, 0x7) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x3}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, 0x0, &(0x7f00000001c0)) socket(0x0, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000200)={0x0, 'veth1_macvtap\x00'}) 04:31:18 executing program 0: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) fsconfig$FSCONFIG_SET_FLAG(r0, 0x6, &(0x7f00000000c0)='posixacl\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000100)='./file0\x00', 0x3a) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$batadv(&(0x7f0000000000)='batadv\x00') sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r1, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=ANY=[@ANYBLOB="14200000", @ANYRES16=r2, @ANYBLOB="010300000000000000000a000000"], 0x14}}, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$devlink(&(0x7f0000000080)='devlink\x00') r5 = io_uring_setup(0x1, &(0x7f0000000040)) r6 = io_uring_register$IORING_REGISTER_PERSONALITY(r5, 0x9, 0x0, 0x0) io_uring_register$IORING_UNREGISTER_PERSONALITY(0xffffffffffffffff, 0xa, 0x0, r6) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000280)=@IORING_OP_SEND={0x1a, 0x0, 0x0, r0, 0x0, &(0x7f00000013c0)="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", 0x1000, 0x4000, 0x1, {0x0, r6}}, 0x1) r7 = gettid() sendmsg$DEVLINK_CMD_RELOAD(r3, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000000)={0x3c, r4, 0x536ae464467e3e0b, 0x0, 0x0, {}, [{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8, 0x8b, r7}}]}, 0x3c}, 0x1, 0x6000000000000000, 0x0, 0x800}, 0x80001) sendmsg$DEVLINK_CMD_SB_OCC_SNAPSHOT(r1, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x38, r4, 0x10, 0x70bd29, 0x25dfdbfb, {}, [{@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8, 0xb, 0x9}}]}, 0x38}, 0x1, 0x0, 0x0, 0x20000080}, 0x20004004) r8 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000240)='/proc/self/net/pfkey\x00', 0x0, 0x0) fsconfig$FSCONFIG_SET_FLAG(r8, 0x6, &(0x7f00000000c0)='posixacl\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(r8, 0xae41, 0x2) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) mount(&(0x7f00000002c0)=ANY=[@ANYBLOB="23e9e78de436d13a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) 04:31:18 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) msgget$private(0x0, 0x781) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) fsconfig$FSCONFIG_SET_FLAG(r0, 0x6, &(0x7f00000000c0)='posixacl\x00', 0x0, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) fsconfig$FSCONFIG_SET_FLAG(r1, 0x6, &(0x7f00000000c0)='posixacl\x00', 0x0, 0x0) connect$nfc_llcp(r1, &(0x7f0000000200)={0x27, 0x0, 0x2, 0x3, 0x79, 0x7, "fb4726c29c2dbd8875b5db3223e1256d7c8aa9dfc8b4da8429b030e4c045659d67b39299a20d1d50eb3fe26c1955f5476650cd34cd1eac4e961a25aebe237d", 0x10}, 0x60) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) fsconfig$FSCONFIG_SET_FLAG(r2, 0x6, &(0x7f00000000c0)='posixacl\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000000c0)={0x5, 0x4, 0x1, r2}) mount(&(0x7f0000000000)=ANY=[@ANYBLOB="f21ce09faa18a7beeb60da4f769c6b0d21e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x2076808, 0x0) open(&(0x7f0000000080)='./file0\x00', 0x0, 0x2) 04:31:18 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="e9e703"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, 0x0, &(0x7f00000001c0)) socket(0x0, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000200)={0x0, 'veth1_macvtap\x00'}) 04:31:18 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000240)={{0x2, 0x0, @private=0x5}, {0x6, @link_local}, 0x2, {0x2, 0x0, @dev}}) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000000)={0x0, 'ip6tnl0\x00', 0x1}, 0x18) mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r2, 0x0) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) fsconfig$FSCONFIG_SET_FLAG(r3, 0x6, &(0x7f00000000c0)='posixacl\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'trusted:', 'em1', 0x20, 0xdfc}, 0xfffffffffffffff5, 0xfffffffffffffffd) r5 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0x1f1, 0xfffffffffffffffe) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$update(0x2, r5, &(0x7f0000000000)="9f", 0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, &(0x7f0000000a40)={{{@in6=@dev, @in6=@ipv4={[], [], @initdev}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}}}, &(0x7f0000000940)=0xfffffff4) r7 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r8, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0\x00', 0x61dd, 0xa, &(0x7f0000000740)=[{&(0x7f00000002c0)="a825978453815aa75b563cd8c77304b4e7bca5c4820e2efd78636cbc6023886fcb7f1988fa49b40240610521320b41987bac9e1f59d2a31564843e49c724d79735ad06ec5ab47474a86ea5693b65ba7766774d0539b808d9fad8e396b602ceff86efafa059558898eb0c29cbdd55eaefe68cb2ff0cebd62a82037bb0ec925e9d69c7bbdc9a77d3d54293e69edd0976525a8d096d27a8c5e56caf83b916611af42313a4897a84829e97c64c49ffba9d9d957211bd27", 0xe1, 0x1ff}, {&(0x7f00000001c0)="e25533c27752c84c4062f9a89219b68b8d24589853e9ae3a25e06cf6a574702d2bc4ce1a741584bab400e127549d6c8fe70b2d006b4ef5f7ba811b34e4f53270219ad08b26f9b89d2144ba0f5fd1dc912183062c70a9cf263cb1fe91fcbb2f9db1543bf830b087651688994d74081c25978359321c0e5544e929", 0x7a, 0x4}, {&(0x7f0000000840)="a4b9b595", 0x4, 0x7f}, {&(0x7f0000000b40)="4f4a32dfe2da74db03d84f8bb86b8cf600368940ab1bf7007d5740d8aa67f373b89bef2e8c6520a6f567f6d612206c67980ef87c09d2c1e0163d66f154e02312e0bd3c584e7202684426ba5e2eae9af1a13f707fe53c64632e7386c87737030b2a551529ae4f4f2f6a51edc888686aeec66dddeaafe767d084c0f119314b6124f07e281a5e6763c6d68c374e0ebc2fb4eb3df2fc75f020f96581e055e99ddcc7cbadd18795d1fef9a0ee75d85ef35e2565178217804de614f6960d8f3c1c12f70d11161d6388c6fc84ca33b451fed5e2c0df384fd386139920a3aa8767bf09c0c42c5a85d62b15000000000000000000", 0xf0, 0x4}, {&(0x7f0000000480)="c54d5b3af43c7d7a111d9d167fa9503c500626a5a6d832288e712ed750457b00db057a5ec85d5d7faae2f443546905eb70fd51e0790e00d126baf81b9d474fed23c0f232623c28badb5033ae972be88de3a274327a3e0aad727cba5399e6", 0x5e, 0x7}, {&(0x7f0000000500)="d7875565aafdb7ad6823bc8d31ab34e75aa3ca9c1754159b3f3362b4633568d18c8ca316623ef48ba43a1f51de9fc7945341184970599a9b7ac56e", 0x3b, 0x2}, {&(0x7f0000000540)="f932110eb83bb6343070d919301a41bc3664f59a58ed75b58c513aee889585df63225f6562741dd1958c9c975260869686ed67ea19", 0x35, 0x8000000000000007}, {&(0x7f0000000580)="e10469535906b9a83619135420dd63879dff38fac22cd5dec444b33e5deebe1e9deb7abec1a554bd37822a21f58bc5b8a92febf6fe9645029348f0cbea0cdb2d1f5e43f977e39ed0ffb4e166fe060875232dee990f7e3cdeb073f21a5926682d0167de24896a742e0037c2dfd24655dd0088a62551010a567469f7308c479938c42a852a", 0x84, 0x1ff}, {&(0x7f0000000640)="914d88d2431326130dd037f3b8e3f16467a928ac06bb09fa56fb5478dd1997733a5fcb29dc89287bd2a2c75e9b810c30f563ff0c2e2c62399452431b7ab2b72c5f4268d009ac80715280841121809793775fc8e3562706350bd8d2b21aef80ae74510dbce26f4db57a8c226d20c4f6ed85fee9ee0074b4d5c80325cb97e84c895b438bd0422959d18121181099e0e9e0582b7244ccb42438", 0x98, 0x26}, {&(0x7f0000000100)="44a7bc79b2456b922de98e367ccb106a6323ab0755510e81adc64f795ce661f89b17493255500a8d000259c6b0663132ba5974f80faf7848cd1064c30c", 0x3d, 0x5}], 0x6000, &(0x7f0000000980)={[{@session={'session', 0x3d, 0x20}}, {@type={'type', 0x3d, "0f70b6e8"}}], [{@fsmagic={'fsmagic', 0x3d, 0xb}}, {@audit='audit'}, {@permit_directio='permit_directio'}, {@fowner_lt={'fowner<', r6}}, {@appraise='appraise'}]}) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) 04:31:18 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETVERSION(r0, 0x40087602, &(0x7f0000000000)=0x4) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) [ 381.170829][T15854] encrypted_key: insufficient parameters specified [ 381.180522][T15856] kAFS: unparsable volume name [ 381.252801][T15856] kAFS: unparsable volume name 04:31:18 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000240)={{0x2, 0x0, @private=0x5}, {0x6, @link_local}, 0x2, {0x2, 0x0, @dev}}) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000000)={0x0, 'ip6tnl0\x00', 0x1}, 0x18) mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r2, 0x0) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) fsconfig$FSCONFIG_SET_FLAG(r3, 0x6, &(0x7f00000000c0)='posixacl\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'trusted:', 'em1', 0x20, 0xdfc}, 0xfffffffffffffff5, 0xfffffffffffffffd) r5 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0x1f1, 0xfffffffffffffffe) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$update(0x2, r5, &(0x7f0000000000)="9f", 0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, &(0x7f0000000a40)={{{@in6=@dev, @in6=@ipv4={[], [], @initdev}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}}}, &(0x7f0000000940)=0xfffffff4) r7 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r8, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0\x00', 0x61dd, 0xa, &(0x7f0000000740)=[{&(0x7f00000002c0)="a825978453815aa75b563cd8c77304b4e7bca5c4820e2efd78636cbc6023886fcb7f1988fa49b40240610521320b41987bac9e1f59d2a31564843e49c724d79735ad06ec5ab47474a86ea5693b65ba7766774d0539b808d9fad8e396b602ceff86efafa059558898eb0c29cbdd55eaefe68cb2ff0cebd62a82037bb0ec925e9d69c7bbdc9a77d3d54293e69edd0976525a8d096d27a8c5e56caf83b916611af42313a4897a84829e97c64c49ffba9d9d957211bd27", 0xe1, 0x1ff}, {&(0x7f00000001c0)="e25533c27752c84c4062f9a89219b68b8d24589853e9ae3a25e06cf6a574702d2bc4ce1a741584bab400e127549d6c8fe70b2d006b4ef5f7ba811b34e4f53270219ad08b26f9b89d2144ba0f5fd1dc912183062c70a9cf263cb1fe91fcbb2f9db1543bf830b087651688994d74081c25978359321c0e5544e929", 0x7a, 0x4}, {&(0x7f0000000840)="a4b9b595", 0x4, 0x7f}, {&(0x7f0000000b40)="4f4a32dfe2da74db03d84f8bb86b8cf600368940ab1bf7007d5740d8aa67f373b89bef2e8c6520a6f567f6d612206c67980ef87c09d2c1e0163d66f154e02312e0bd3c584e7202684426ba5e2eae9af1a13f707fe53c64632e7386c87737030b2a551529ae4f4f2f6a51edc888686aeec66dddeaafe767d084c0f119314b6124f07e281a5e6763c6d68c374e0ebc2fb4eb3df2fc75f020f96581e055e99ddcc7cbadd18795d1fef9a0ee75d85ef35e2565178217804de614f6960d8f3c1c12f70d11161d6388c6fc84ca33b451fed5e2c0df384fd386139920a3aa8767bf09c0c42c5a85d62b15000000000000000000", 0xf0, 0x4}, {&(0x7f0000000480)="c54d5b3af43c7d7a111d9d167fa9503c500626a5a6d832288e712ed750457b00db057a5ec85d5d7faae2f443546905eb70fd51e0790e00d126baf81b9d474fed23c0f232623c28badb5033ae972be88de3a274327a3e0aad727cba5399e6", 0x5e, 0x7}, {&(0x7f0000000500)="d7875565aafdb7ad6823bc8d31ab34e75aa3ca9c1754159b3f3362b4633568d18c8ca316623ef48ba43a1f51de9fc7945341184970599a9b7ac56e", 0x3b, 0x2}, {&(0x7f0000000540)="f932110eb83bb6343070d919301a41bc3664f59a58ed75b58c513aee889585df63225f6562741dd1958c9c975260869686ed67ea19", 0x35, 0x8000000000000007}, {&(0x7f0000000580)="e10469535906b9a83619135420dd63879dff38fac22cd5dec444b33e5deebe1e9deb7abec1a554bd37822a21f58bc5b8a92febf6fe9645029348f0cbea0cdb2d1f5e43f977e39ed0ffb4e166fe060875232dee990f7e3cdeb073f21a5926682d0167de24896a742e0037c2dfd24655dd0088a62551010a567469f7308c479938c42a852a", 0x84, 0x1ff}, {&(0x7f0000000640)="914d88d2431326130dd037f3b8e3f16467a928ac06bb09fa56fb5478dd1997733a5fcb29dc89287bd2a2c75e9b810c30f563ff0c2e2c62399452431b7ab2b72c5f4268d009ac80715280841121809793775fc8e3562706350bd8d2b21aef80ae74510dbce26f4db57a8c226d20c4f6ed85fee9ee0074b4d5c80325cb97e84c895b438bd0422959d18121181099e0e9e0582b7244ccb42438", 0x98, 0x26}, {&(0x7f0000000100)="44a7bc79b2456b922de98e367ccb106a6323ab0755510e81adc64f795ce661f89b17493255500a8d000259c6b0663132ba5974f80faf7848cd1064c30c", 0x3d, 0x5}], 0x6000, &(0x7f0000000980)={[{@session={'session', 0x3d, 0x20}}, {@type={'type', 0x3d, "0f70b6e8"}}], [{@fsmagic={'fsmagic', 0x3d, 0xb}}, {@audit='audit'}, {@permit_directio='permit_directio'}, {@fowner_lt={'fowner<', r6}}, {@appraise='appraise'}]}) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) 04:31:18 executing program 3: r0 = memfd_create(&(0x7f0000001780)='\xd8\x05V\x15\xa5e\xf1\xb8\xf6\xa2\xba\x85\xb95\x03<\xb9;\xcd\x86\x8bD\xf9\xe9L\xe1Q\xfc\xe2\x97\xa0\xe8s\xb2\x11\xef\x1ac\xc9\x89\xc7\x0fv1\xa1:h\xf6\xf5\a\x8c\xf0Ay\x03\x97\xe77\xc1\xc8\xa6\xcb\xd2\xbe\xe9\xd2\xfb{u\xc3\xcd\xba\xa8G`9\xb5\x82\xa9p\xc8)\xe5$b\v\x8e\b\xf4\xf0\x11\xb4\xcb\"\xf4\xf3\xb4|\xdf\xa3\xdd\x9c\x8a\xf4D\xd3\xea\x11c}\x86H\xca=;i\x96\x183h\xba\x1a\x10', 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000380)='/dev/nullb0\x00', 0x0, 0x0) io_setup(0x1, &(0x7f00000004c0)=0x0) io_submit(r4, 0x8, &(0x7f00000000c0)=[&(0x7f0000000140)={0x3a004021, 0x2759, 0x10, 0x0, 0x0, r3, &(0x7f0000000000)="98", 0x3e80000000, 0x0, 0x0, 0x2}]) 04:31:18 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, 0x0, &(0x7f00000001c0)) socket(0x0, 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) fsconfig$FSCONFIG_SET_FLAG(r0, 0x6, &(0x7f00000000c0)='posixacl\x00', 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(r0, 0x114, 0x8, &(0x7f0000000000)=0xffffffffffffffff, 0x4) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000200)={0x0, 'veth1_macvtap\x00'}) [ 381.480979][T15865] encrypted_key: insufficient parameters specified 04:31:18 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000240)={{0x2, 0x0, @private=0x5}, {0x6, @link_local}, 0x2, {0x2, 0x0, @dev}}) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000000)={0x0, 'ip6tnl0\x00', 0x1}, 0x18) mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r2, 0x0) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) fsconfig$FSCONFIG_SET_FLAG(r3, 0x6, &(0x7f00000000c0)='posixacl\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'trusted:', 'em1', 0x20, 0xdfc}, 0xfffffffffffffff5, 0xfffffffffffffffd) r5 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0x1f1, 0xfffffffffffffffe) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$update(0x2, r5, &(0x7f0000000000)="9f", 0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, &(0x7f0000000a40)={{{@in6=@dev, @in6=@ipv4={[], [], @initdev}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}}}, &(0x7f0000000940)=0xfffffff4) r7 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r8, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0\x00', 0x61dd, 0xa, &(0x7f0000000740)=[{&(0x7f00000002c0)="a825978453815aa75b563cd8c77304b4e7bca5c4820e2efd78636cbc6023886fcb7f1988fa49b40240610521320b41987bac9e1f59d2a31564843e49c724d79735ad06ec5ab47474a86ea5693b65ba7766774d0539b808d9fad8e396b602ceff86efafa059558898eb0c29cbdd55eaefe68cb2ff0cebd62a82037bb0ec925e9d69c7bbdc9a77d3d54293e69edd0976525a8d096d27a8c5e56caf83b916611af42313a4897a84829e97c64c49ffba9d9d957211bd27", 0xe1, 0x1ff}, {&(0x7f00000001c0)="e25533c27752c84c4062f9a89219b68b8d24589853e9ae3a25e06cf6a574702d2bc4ce1a741584bab400e127549d6c8fe70b2d006b4ef5f7ba811b34e4f53270219ad08b26f9b89d2144ba0f5fd1dc912183062c70a9cf263cb1fe91fcbb2f9db1543bf830b087651688994d74081c25978359321c0e5544e929", 0x7a, 0x4}, {&(0x7f0000000840)="a4b9b595", 0x4, 0x7f}, {&(0x7f0000000b40)="4f4a32dfe2da74db03d84f8bb86b8cf600368940ab1bf7007d5740d8aa67f373b89bef2e8c6520a6f567f6d612206c67980ef87c09d2c1e0163d66f154e02312e0bd3c584e7202684426ba5e2eae9af1a13f707fe53c64632e7386c87737030b2a551529ae4f4f2f6a51edc888686aeec66dddeaafe767d084c0f119314b6124f07e281a5e6763c6d68c374e0ebc2fb4eb3df2fc75f020f96581e055e99ddcc7cbadd18795d1fef9a0ee75d85ef35e2565178217804de614f6960d8f3c1c12f70d11161d6388c6fc84ca33b451fed5e2c0df384fd386139920a3aa8767bf09c0c42c5a85d62b15000000000000000000", 0xf0, 0x4}, {&(0x7f0000000480)="c54d5b3af43c7d7a111d9d167fa9503c500626a5a6d832288e712ed750457b00db057a5ec85d5d7faae2f443546905eb70fd51e0790e00d126baf81b9d474fed23c0f232623c28badb5033ae972be88de3a274327a3e0aad727cba5399e6", 0x5e, 0x7}, {&(0x7f0000000500)="d7875565aafdb7ad6823bc8d31ab34e75aa3ca9c1754159b3f3362b4633568d18c8ca316623ef48ba43a1f51de9fc7945341184970599a9b7ac56e", 0x3b, 0x2}, {&(0x7f0000000540)="f932110eb83bb6343070d919301a41bc3664f59a58ed75b58c513aee889585df63225f6562741dd1958c9c975260869686ed67ea19", 0x35, 0x8000000000000007}, {&(0x7f0000000580)="e10469535906b9a83619135420dd63879dff38fac22cd5dec444b33e5deebe1e9deb7abec1a554bd37822a21f58bc5b8a92febf6fe9645029348f0cbea0cdb2d1f5e43f977e39ed0ffb4e166fe060875232dee990f7e3cdeb073f21a5926682d0167de24896a742e0037c2dfd24655dd0088a62551010a567469f7308c479938c42a852a", 0x84, 0x1ff}, {&(0x7f0000000640)="914d88d2431326130dd037f3b8e3f16467a928ac06bb09fa56fb5478dd1997733a5fcb29dc89287bd2a2c75e9b810c30f563ff0c2e2c62399452431b7ab2b72c5f4268d009ac80715280841121809793775fc8e3562706350bd8d2b21aef80ae74510dbce26f4db57a8c226d20c4f6ed85fee9ee0074b4d5c80325cb97e84c895b438bd0422959d18121181099e0e9e0582b7244ccb42438", 0x98, 0x26}, {&(0x7f0000000100)="44a7bc79b2456b922de98e367ccb106a6323ab0755510e81adc64f795ce661f89b17493255500a8d000259c6b0663132ba5974f80faf7848cd1064c30c", 0x3d, 0x5}], 0x6000, &(0x7f0000000980)={[{@session={'session', 0x3d, 0x20}}, {@type={'type', 0x3d, "0f70b6e8"}}], [{@fsmagic={'fsmagic', 0x3d, 0xb}}, {@audit='audit'}, {@permit_directio='permit_directio'}, {@fowner_lt={'fowner<', r6}}, {@appraise='appraise'}]}) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) 04:31:18 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, 0x0, &(0x7f00000001c0)) socket(0x1a, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000200)={0x0, 'veth1_macvtap\x00'}) [ 381.756779][T15877] encrypted_key: insufficient parameters specified 04:31:19 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000240)={{0x2, 0x0, @private=0x5}, {0x6, @link_local}, 0x2, {0x2, 0x0, @dev}}) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000000)={0x0, 'ip6tnl0\x00', 0x1}, 0x18) mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r2, 0x0) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) fsconfig$FSCONFIG_SET_FLAG(r3, 0x6, &(0x7f00000000c0)='posixacl\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'trusted:', 'em1', 0x20, 0xdfc}, 0xfffffffffffffff5, 0xfffffffffffffffd) r5 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0x1f1, 0xfffffffffffffffe) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$update(0x2, r5, &(0x7f0000000000)="9f", 0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, &(0x7f0000000a40)={{{@in6=@dev, @in6=@ipv4={[], [], @initdev}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}}}, &(0x7f0000000940)=0xfffffff4) r7 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r8, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0\x00', 0x61dd, 0xa, &(0x7f0000000740)=[{&(0x7f00000002c0)="a825978453815aa75b563cd8c77304b4e7bca5c4820e2efd78636cbc6023886fcb7f1988fa49b40240610521320b41987bac9e1f59d2a31564843e49c724d79735ad06ec5ab47474a86ea5693b65ba7766774d0539b808d9fad8e396b602ceff86efafa059558898eb0c29cbdd55eaefe68cb2ff0cebd62a82037bb0ec925e9d69c7bbdc9a77d3d54293e69edd0976525a8d096d27a8c5e56caf83b916611af42313a4897a84829e97c64c49ffba9d9d957211bd27", 0xe1, 0x1ff}, {&(0x7f00000001c0)="e25533c27752c84c4062f9a89219b68b8d24589853e9ae3a25e06cf6a574702d2bc4ce1a741584bab400e127549d6c8fe70b2d006b4ef5f7ba811b34e4f53270219ad08b26f9b89d2144ba0f5fd1dc912183062c70a9cf263cb1fe91fcbb2f9db1543bf830b087651688994d74081c25978359321c0e5544e929", 0x7a, 0x4}, {&(0x7f0000000840)="a4b9b595", 0x4, 0x7f}, {&(0x7f0000000b40)="4f4a32dfe2da74db03d84f8bb86b8cf600368940ab1bf7007d5740d8aa67f373b89bef2e8c6520a6f567f6d612206c67980ef87c09d2c1e0163d66f154e02312e0bd3c584e7202684426ba5e2eae9af1a13f707fe53c64632e7386c87737030b2a551529ae4f4f2f6a51edc888686aeec66dddeaafe767d084c0f119314b6124f07e281a5e6763c6d68c374e0ebc2fb4eb3df2fc75f020f96581e055e99ddcc7cbadd18795d1fef9a0ee75d85ef35e2565178217804de614f6960d8f3c1c12f70d11161d6388c6fc84ca33b451fed5e2c0df384fd386139920a3aa8767bf09c0c42c5a85d62b15000000000000000000", 0xf0, 0x4}, {&(0x7f0000000480)="c54d5b3af43c7d7a111d9d167fa9503c500626a5a6d832288e712ed750457b00db057a5ec85d5d7faae2f443546905eb70fd51e0790e00d126baf81b9d474fed23c0f232623c28badb5033ae972be88de3a274327a3e0aad727cba5399e6", 0x5e, 0x7}, {&(0x7f0000000500)="d7875565aafdb7ad6823bc8d31ab34e75aa3ca9c1754159b3f3362b4633568d18c8ca316623ef48ba43a1f51de9fc7945341184970599a9b7ac56e", 0x3b, 0x2}, {&(0x7f0000000540)="f932110eb83bb6343070d919301a41bc3664f59a58ed75b58c513aee889585df63225f6562741dd1958c9c975260869686ed67ea19", 0x35, 0x8000000000000007}, {&(0x7f0000000580)="e10469535906b9a83619135420dd63879dff38fac22cd5dec444b33e5deebe1e9deb7abec1a554bd37822a21f58bc5b8a92febf6fe9645029348f0cbea0cdb2d1f5e43f977e39ed0ffb4e166fe060875232dee990f7e3cdeb073f21a5926682d0167de24896a742e0037c2dfd24655dd0088a62551010a567469f7308c479938c42a852a", 0x84, 0x1ff}, {&(0x7f0000000640)="914d88d2431326130dd037f3b8e3f16467a928ac06bb09fa56fb5478dd1997733a5fcb29dc89287bd2a2c75e9b810c30f563ff0c2e2c62399452431b7ab2b72c5f4268d009ac80715280841121809793775fc8e3562706350bd8d2b21aef80ae74510dbce26f4db57a8c226d20c4f6ed85fee9ee0074b4d5c80325cb97e84c895b438bd0422959d18121181099e0e9e0582b7244ccb42438", 0x98, 0x26}, {&(0x7f0000000100)="44a7bc79b2456b922de98e367ccb106a6323ab0755510e81adc64f795ce661f89b17493255500a8d000259c6b0663132ba5974f80faf7848cd1064c30c", 0x3d, 0x5}], 0x6000, &(0x7f0000000980)={[{@session={'session', 0x3d, 0x20}}, {@type={'type', 0x3d, "0f70b6e8"}}], [{@fsmagic={'fsmagic', 0x3d, 0xb}}, {@audit='audit'}, {@permit_directio='permit_directio'}, {@fowner_lt={'fowner<', r6}}, {@appraise='appraise'}]}) 04:31:19 executing program 0: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setresgid(0x0, r0, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000001440)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0, r0}}}], 0x20}, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) fsconfig$FSCONFIG_SET_FLAG(r1, 0x6, &(0x7f00000000c0)='posixacl\x00', 0x0, 0x0) statx(r1, &(0x7f00000000c0)='./file0\x00', 0x800, 0x100, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$batadv(&(0x7f0000000000)='batadv\x00') sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r3, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)={0x14, r4, 0x301, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) fstat(r3, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = getpid() r8 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r8, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setresgid(0x0, r9, 0x0) sendmsg$unix(r6, &(0x7f0000001440)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=[@cred={{0x1c, 0x1, 0x2, {r7, 0x0, r9}}}], 0x20}, 0x0) setxattr$system_posix_acl(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000080)='system.posix_acl_access\x00', &(0x7f0000000380)={{}, {0x1, 0x2}, [{0x2, 0x1}, {0x2, 0x2}, {0x2, 0x1}], {0x4, 0x1}, [{0x8, 0x6}, {0x8, 0x4, r0}, {0x8, 0x1, r2}, {0x8, 0xe, r5}, {0x8, 0x3, r9}], {}, {0x20, 0x4}}, 0x64, 0x1) mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) 04:31:19 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) mount(&(0x7f0000000340)=ANY=[@ANYBLOB="2300033ad4c7f31708ea69c0beb58c7e0a71aeb0b9dbb7a176e00e0f49de9d398a6d98e919bef3f10332b4b543ac36c8b756818f4e930db9a0caddb4047e9d9309dd1cf90a71e63827a9e68b0c4e8e15fb2e060b30062588559774e93e56d3804249783050757ed37ccc070782edee0e9125b38016d349e5ce4525d483e4d7222a67db52cb83a078f2101a54f850ed21c10c1cb8e10538cf77f84f1909377bc7fc24d9912352dfb892ec6b2c0c0b7ef5acf08a18a325c30509752b1ff3901df5c39c3836396812"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000000)='batadv\x00') sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)={0x14, r1, 0x301, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) r2 = dup2(r0, 0xffffffffffffffff) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_SET(r3, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000300)={0x40, r4, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_LINK={0x2c, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_PROP={0x14, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x5}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5ca}]}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}]}]}, 0x40}}, 0x0) sendmsg$TIPC_NL_BEARER_GET(r2, &(0x7f0000000100)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000000c0)={&(0x7f00000001c0)={0xdc, r4, 0x100, 0x70bd2b, 0x25dfdbfc, {}, [@TIPC_NLA_NET={0x54, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0xe5}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x9}, @TIPC_NLA_NET_ID={0x8, 0x1, 0xfffff8e6}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x5}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x6}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x775}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x4}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x4}]}, @TIPC_NLA_BEARER={0x48, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_PROP={0x44, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x10}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x2}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1f}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1d}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1e}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}]}]}, @TIPC_NLA_PUBL={0x2c, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x930}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x2}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x7fffffff}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x1}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x1}]}]}, 0xdc}, 0x1, 0x0, 0x0, 0x44090}, 0x0) 04:31:19 executing program 2: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) fsconfig$FSCONFIG_SET_FLAG(r0, 0x6, &(0x7f00000000c0)='posixacl\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000140)='./file0\x00', 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000100)='nl80211\x00') sendmsg$NL80211_CMD_SET_BEACON(r1, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000740)={&(0x7f0000001c00)={0x3c, r2, 0x1, 0x0, 0x0, {}, [@NL80211_ATTR_BEACON_HEAD={0x28, 0xe, "b94db81fefe0d02a3a26cf81f9fd5742b9585429bae11f070481c3d9746a13e8f8"}]}, 0x3c}}, 0x0) lsetxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f0000000280)={0x0, 0xfb, 0xe9, 0x5, 0x3f, "a176242d8ce4f4b51c2262e660ff10b6", "f82393bbaea7b4e9ba704a32b1608eb388c9d458e21c60b8213885d4c1a96e77926d499ebfcf0dcf967bdc4895285c01f378ca0fe427ac25353c1a83881fa8268348cc3cbee0401074a4cb26426daf546bb257d488358fb7d6a593246525093f26496bc5440ee94ce75b86e35535b7289e0c807a427bdc3ae45f7d2b8ec852e57f17af2a4742d2c4ad9939c7129e3caf89f0bdfb64da2e1bb0cec36176862f33b3ae6cbab7c46ce23a8b6058af856b5fdf16f53978aba03794647ea6dc2b2a1528e6afd91bfb4bcc85d01a0e5c229229d5cae212"}, 0xe9, 0x3) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0x200000, 0x0) ioctl$VFIO_IOMMU_GET_INFO(r3, 0x3b70, &(0x7f0000000380)={0x18, 0x0, 0x0, 0x6}) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, 0x0, &(0x7f00000001c0)) socket(0x0, 0x1, 0xfffffffe) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/vcs\x00', 0x100, 0x0) setsockopt$CAN_RAW_FD_FRAMES(r4, 0x65, 0x5, &(0x7f0000000400)=0x1, 0x4) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000200)={0x0, 'veth1_macvtap\x00'}) [ 381.996661][T15885] kAFS: unparsable volume name [ 382.038208][T15885] kAFS: unparsable volume name 04:31:19 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) r0 = syz_genetlink_get_family_id$batadv(&(0x7f0000000000)='batadv\x00') sendmsg$BATADV_CMD_GET_MCAST_FLAGS(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000500)=ANY=[@ANYBLOB="14000000b4eec388028400000000000000080000000000000000", @ANYRES16=r0, @ANYBLOB="010300000000000000000a000000"], 0x14}}, 0x0) setsockopt(0xffffffffffffffff, 0x0, 0x6, &(0x7f0000000480)="48b4a5bfc74c4d81ba8e5d45cd630fb8dc7738f66769aa32011f1f79fde8759c48ecb939ee8ba184642c624c517d0a4e000770ddc2c33a4b0840a9b9a8db9b8a6f7548096fe40005c395e31434ff474a579e66a9e8dc36434b5998c031579dd312c7d2455b5cf53e94802f", 0x6b) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcsa\x00', 0x40300, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) fsconfig$FSCONFIG_SET_FLAG(r1, 0x6, &(0x7f00000000c0)='posixacl\x00', 0x0, 0x0) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) close(r3) r4 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp_SCTP_RTOINFO(r3, 0x84, 0x0, &(0x7f0000000080)={r5, 0x82000000}, 0x10) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f00000001c0)={r5, @in6={{0xa, 0x4e22, 0x40, @ipv4={[], [], @rand_addr=0x64010102}, 0x10001}}, 0xfffffc00, 0x5, 0x1ff, 0x1ff, 0x9, 0x240000, 0xf8}, &(0x7f0000000280)=0x9c) openat$vsock(0xffffffffffffff9c, &(0x7f0000000440)='/dev/vsock\x00', 0x111c00, 0x0) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f00000002c0)=ANY=[@ANYRES32=r6, @ANYBLOB="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"], &(0x7f0000000400)=0x105) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0xfd, 0x40, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000080)=ANY=[@ANYRES64=r2], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) r7 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) fsconfig$FSCONFIG_SET_FLAG(r7, 0x6, &(0x7f00000000c0)='posixacl\x00', 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_DRAIN(r7, 0x4144, 0x0) [ 382.087462][T15890] encrypted_key: insufficient parameters specified 04:31:19 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) ioctl$SG_SET_RESERVED_SIZE(0xffffffffffffffff, 0x2275, &(0x7f0000000000)=0x81) 04:31:19 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000240)={{0x2, 0x0, @private=0x5}, {0x6, @link_local}, 0x2, {0x2, 0x0, @dev}}) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000000)={0x0, 'ip6tnl0\x00', 0x1}, 0x18) mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r2, 0x0) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) fsconfig$FSCONFIG_SET_FLAG(r3, 0x6, &(0x7f00000000c0)='posixacl\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'trusted:', 'em1', 0x20, 0xdfc}, 0xfffffffffffffff5, 0xfffffffffffffffd) r5 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0x1f1, 0xfffffffffffffffe) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$update(0x2, r5, &(0x7f0000000000)="9f", 0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, &(0x7f0000000a40)={{{@in6=@dev, @in6=@ipv4={[], [], @initdev}}}, {{@in=@empty}}}, &(0x7f0000000940)=0xfffffff4) r6 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r7, 0x0) 04:31:19 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) mount(&(0x7f00000001c0)=ANY=[@ANYBLOB="23e9e73abf6b6d3d7a2313cb7b1cd301bd2cdad9c28d8301b063c2fd3f38c151750286324d3f8576b1af55502159e25138a10d89da19dc74fcf3"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/expire_nodest_conn\x00', 0x2, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) fsconfig$FSCONFIG_SET_FLAG(r0, 0x6, &(0x7f00000000c0)='posixacl\x00', 0x0, 0x0) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, &(0x7f00000000c0)={0x5, &(0x7f0000000080)=[{}, {}, {}, {0x0}, {}]}) ioctl$DRM_IOCTL_UNLOCK(r0, 0x4008642b, &(0x7f0000000100)={r1, 0x2d}) [ 382.243735][T15898] kAFS: unparsable volume name [ 382.263884][T15900] kAFS: unparsable volume name 04:31:19 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000080)=ANY=[@ANYBLOB="23e9e7a2e1c4c87f893799fa021406a53abbba0a8c2f564dc77020b82459af7975f698b0674cf0e08b99a02fe78c4cc2e96270a5babcb858769278037fd4706ff248474c71c81b8027dce42287dc109a3772e932c9756f132458498f34ed2989fbdf0b9ffbfb4b456bd965f2ffbd4a5300"/124], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) socket(0x0, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000200)={0x0, 'veth1_macvtap\x00'}) 04:31:19 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0xed, 0x0, 0x0, 0x0, 0xe5, 0x2108, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xfffffffffffffffb, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) 04:31:19 executing program 3: r0 = memfd_create(&(0x7f0000001780)='\xd8\x05V\x15\xa5e\xf1\xb8\xf6\xa2\xba\x85\xb95\x03<\xb9;\xcd\x86\x8bD\xf9\xe9L\xe1Q\xfc\xe2\x97\xa0\xe8s\xb2\x11\xef\x1ac\xc9\x89\xc7\x0fv1\xa1:h\xf6\xf5\a\x8c\xf0Ay\x03\x97\xe77\xc1\xc8\xa6\xcb\xd2\xbe\xe9\xd2\xfb{u\xc3\xcd\xba\xa8G`9\xb5\x82\xa9p\xc8)\xe5$b\v\x8e\b\xf4\xf0\x11\xb4\xcb\"\xf4\xf3\xb4|\xdf\xa3\xdd\x9c\x8a\xf4D\xd3\xea\x11c}\x86H\xca=;i\x96\x183h\xba\x1a\x10', 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000380)='/dev/nullb0\x00', 0x0, 0x0) io_setup(0x1, &(0x7f00000004c0)=0x0) io_submit(r4, 0x8, &(0x7f00000000c0)=[&(0x7f0000000140)={0x3a004022, 0x2759, 0x10, 0x0, 0x0, r3, &(0x7f0000000000)="98", 0x3e80000000, 0x0, 0x0, 0x2}]) 04:31:19 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000000)='batadv\x00') sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)={0x14, r1, 0x301, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) dup(r0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x9400051}, 0xc, &(0x7f0000000100)={&(0x7f00000001c0)=@ipv6_newrule={0x70, 0x20, 0x4, 0x70bd2a, 0x25dfdbff, {0xa, 0x14, 0x10, 0x7f, 0x1c, 0x0, 0x0, 0x0, 0x10004}, [@FRA_SRC={0x14, 0x2, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, @FIB_RULE_POLICY=@FRA_GOTO={0x8, 0x4, 0x22}, @FRA_DST={0x14, 0x1, @empty}, @FIB_RULE_POLICY=@FRA_TABLE={0x8, 0xf, 0x28000}, @FRA_DST={0x14, 0x1, @loopback}, @FIB_RULE_POLICY=@FRA_PRIORITY={0x8, 0x6, 0x2b}]}, 0x70}, 0x1, 0x0, 0x0, 0x10}, 0x1) fsconfig$FSCONFIG_SET_FLAG(r2, 0x6, &(0x7f00000000c0)='posixacl\x00', 0x0, 0x0) ioctl$SNDCTL_DSP_GETOSPACE(r2, 0x8010500c, &(0x7f0000000000)) mount(&(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) [ 382.367739][T15905] encrypted_key: insufficient parameters specified 04:31:19 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000240)={{0x2, 0x0, @private=0x5}, {0x6, @link_local}, 0x2, {0x2, 0x0, @dev}}) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000000)={0x0, 'ip6tnl0\x00', 0x1}, 0x18) mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r2, 0x0) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) fsconfig$FSCONFIG_SET_FLAG(r3, 0x6, &(0x7f00000000c0)='posixacl\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'trusted:', 'em1', 0x20, 0xdfc}, 0xfffffffffffffff5, 0xfffffffffffffffd) r5 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0x1f1, 0xfffffffffffffffe) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$update(0x2, r5, &(0x7f0000000000)="9f", 0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, &(0x7f0000000a40)={{{@in6=@dev, @in6=@ipv4={[], [], @initdev}}}, {{@in=@empty}}}, &(0x7f0000000940)=0xfffffff4) r6 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) [ 382.435269][T15909] kAFS: unable to lookup cell 'éç¢áÄȉ7™ú¥' 04:31:19 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) fsconfig$FSCONFIG_SET_FLAG(r2, 0x6, &(0x7f00000000c0)='posixacl\x00', 0x0, 0x0) openat2(r2, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)={0x341040, 0xd0, 0x8}, 0x18) setresuid(0x0, r1, 0x0) quotactl(0x969, &(0x7f0000000000)='./file0\x00', r1, &(0x7f0000000080)="7259aa5f1508c49e0a80b95bb69cb8f66dd4be0fa8be184a0896c52695011515af625e03c1a5310f39ea1a647f53579c58b00b7554185779b281706deba137") r3 = openat$cuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/cuse\x00', 0x2, 0x0) r4 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r5, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = getpid() r8 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r8, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setresgid(0x0, r9, 0x0) sendmsg$unix(r6, &(0x7f0000001440)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=[@cred={{0x1c, 0x1, 0x2, {r7, 0x0, r9}}}], 0x20}, 0x0) mount$fuseblk(&(0x7f00000001c0)='/dev/loop0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='fuseblk\x00', 0x40, &(0x7f0000000300)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, r5}, 0x2c, {'group_id', 0x3d, r9}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x200}}, {@allow_other='allow_other'}, {@blksize={'blksize', 0x3d, 0x1800}}, {@default_permissions='default_permissions'}], [{@smackfstransmute={'smackfstransmute'}}, {@euid_gt={'euid>', r1}}, {@dont_hash='dont_hash'}, {@obj_role={'obj_role', 0x3d, '{.\\,6'}}, {@uid_lt={'uid<', r1}}, {@dont_measure='dont_measure'}, {@fsmagic={'fsmagic', 0x3d, 0x2}}, {@measure='measure'}]}}) [ 382.519659][T15915] kAFS: unable to lookup cell 'éç¢áÄȉ7™ú¥' 04:31:19 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x1, 0x0, 0x0, 0x41c1, 0x7608, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) fsconfig$FSCONFIG_SET_FLAG(r0, 0x6, &(0x7f00000000c0)='posixacl\x00', 0x0, 0x0) sendmsg$IPCTNL_MSG_TIMEOUT_NEW(r0, &(0x7f00000002c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000280)={&(0x7f00000000c0)={0x5c, 0x0, 0x8, 0x101, 0x0, 0x0, {0x1, 0x0, 0x9}, [@CTA_TIMEOUT_NAME={0x9, 0x1, 'syz1\x00'}, @CTA_TIMEOUT_DATA={0x2c, 0x4, 0x0, 0x1, @gre=[@CTA_TIMEOUT_GRE_UNREPLIED={0x8, 0x1, 0x1, 0x0, 0x5}, @CTA_TIMEOUT_GRE_UNREPLIED={0x8, 0x1, 0x1, 0x0, 0x7f7}, @CTA_TIMEOUT_GRE_UNREPLIED={0x8, 0x1, 0x1, 0x0, 0x7544}, @CTA_TIMEOUT_GRE_REPLIED={0x8, 0x2, 0x1, 0x0, 0x9}, @CTA_TIMEOUT_GRE_UNREPLIED={0x8, 0x1, 0x1, 0x0, 0x9}]}, @CTA_TIMEOUT_L4PROTO={0x5, 0x3, 0x6}, @CTA_TIMEOUT_L4PROTO={0x5, 0x3, 0x2f}]}, 0x5c}, 0x1, 0x0, 0x0, 0x20048081}, 0x2c000004) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, 0x0, &(0x7f00000001c0)) socket(0x0, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000200)={0x0, 'veth1_macvtap\x00'}) 04:31:19 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) r0 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x2, 0x40000) ioctl$sock_inet_SIOCRTMSG(r0, 0x890d, &(0x7f00000001c0)={0x0, {0x2, 0x4e20, @rand_addr=0x64010101}, {0x2, 0x4b25, @private=0xa010102}, {0x2, 0x4e24, @local}, 0x70, 0x0, 0x0, 0x0, 0xfff, &(0x7f0000000100)='wg2\x00', 0x724b3cee, 0xa8a, 0x8}) perf_event_open(&(0x7f0000001340)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x40901, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x0, 0x8000) ioctl$SNDCTL_SEQ_RESETSAMPLES(r1, 0x40045109, &(0x7f0000000080)) mount(&(0x7f0000000300)=ANY=[@ANYBLOB="000000697d2c0767f0cd3f9e022317793dfc5de7542a8255a3391d8fc5cd65dedfccd0c8b661fcb693cd2c7d10eb70876ac054577d2627bd9ee6dde002d44fb75d0c5accca8aa72bc8cadd18bc7449e376f7b95d8c5aa74fba016b33a4d32cd470374605f37706b73da75d041704f6fe7e21ccd3e764f83a93adf0d88914d81cdabe0c32b0a403b15928c948d7409f9785264e9d8a2173a98e70b1280c97fd7def2e370c0c"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) 04:31:19 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) ioctl$SNDCTL_TMR_TEMPO(r0, 0xc0045405, &(0x7f0000000080)=0x56) mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) mount(&(0x7f00000001c0)=ANY=[@ANYBLOB="23e9e73ad6144ee2410947c4c63705910ba7cb7f20492055567faec85d6aef66fbe341ef9ab75ce867777269b9c238fcdf7f186c4658afcce683a97a4270df5daa77b8a5246daa0d8077540350d66a65ca4adfff7ee1218a2231d7e563499c00efa76d53a20e80b739d27c9ea081692061a6218ed29b5402bd544202ebf18c49d8311ea66cb5cb5a703f2b4732e108983ffd38c6b0b63cafa472549538af1b42dd50d7e4be4e9073d03b6645af3d712cb22ce11a6003004b41403d1bfcb67c32795d957a642d9335feae9d660edf84a945810000"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) [ 382.656814][T15925] encrypted_key: insufficient parameters specified 04:31:19 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000240)={{0x2, 0x0, @private=0x5}, {0x6, @link_local}, 0x2, {0x2, 0x0, @dev}}) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000000)={0x0, 'ip6tnl0\x00', 0x1}, 0x18) mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r2, 0x0) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) fsconfig$FSCONFIG_SET_FLAG(r3, 0x6, &(0x7f00000000c0)='posixacl\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'trusted:', 'em1', 0x20, 0xdfc}, 0xfffffffffffffff5, 0xfffffffffffffffd) r5 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0x1f1, 0xfffffffffffffffe) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$update(0x2, r5, &(0x7f0000000000)="9f", 0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, &(0x7f0000000a40)={{{@in6=@dev, @in6=@ipv4={[], [], @initdev}}}, {{@in=@empty}}}, &(0x7f0000000940)=0xfffffff4) socket(0x10, 0x2, 0x0) 04:31:20 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) mount(&(0x7f0000000200)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) [ 382.816630][T15933] afs: Bad value for 'source' [ 382.858454][T15937] afs: Bad value for 'source' 04:31:20 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) mount$9p_unix(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f00000000c0)='9p\x00', 0x20000, &(0x7f0000000280)={'trans=unix,', {[{@mmap='mmap'}, {@cache_loose='cache=loose'}, {@cache_none='cache=none'}, {@access_any='access=any'}, {@cache_none='cache=none'}, {@access_any='access=any'}, {@version_u='version=9p2000.u'}, {@nodevmap='nodevmap'}], [{@smackfstransmute={'smackfstransmute', 0x3d, 'afs\x00'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@obj_user={'obj_user', 0x3d, 'afs\x00'}}]}}) 04:31:20 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0xc1, 0x0, 0x0, 0x3f, 0x0, 0x41c1, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000080)=ANY=[@ANYBLOB="23e9e73a277404b6a295e5159d9b99b9697526cc1292810f9c93a0b3ddc1413876aedce43e05721ede6c10878fb1d0705bfae89abef32b2515f3475e54ffc155d7bf26b7993b3d26897d8563564a10469d8ddbc4503bf9ce344eb8b474929058cc18238098ef5800"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000240)={{0x2, 0x0, @private=0x5}, {0x0, @link_local}, 0x0, {0x2, 0x0, @dev}}) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nvram\x00', 0x20000, 0x0) setsockopt$CAN_RAW_ERR_FILTER(r1, 0x65, 0x2, &(0x7f00000001c0)=0x100, 0x4) ioctl$sock_inet_udp_SIOCINQ(r0, 0x541b, &(0x7f0000000000)) 04:31:20 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) getuid() perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000080)=ANY=[@ANYBLOB="bb3575a36936b9e344e7a2530f7571d464f05fd107b3a6f9242fa31f12a408f72a7df53a58e362afea90a3d6143c32abee8c7ae999728e"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, 0x0, &(0x7f00000001c0)) socket(0x0, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000000)={0x0, 'hsr0\x00', {}, 0x1}) [ 382.943296][T15943] encrypted_key: insufficient parameters specified [ 383.009433][T15944] afs: Bad value for 'source' [ 383.109673][ T12] FS-Cache: Duplicate cookie detected [ 383.115110][ T12] FS-Cache: O-cookie c=000000001298c210 [p=00000000a00f4ec0 fl=222 nc=0 na=1] [ 383.124130][ T12] FS-Cache: O-cookie d=0000000035364e0c n=00000000b4911184 [ 383.131424][ T12] FS-Cache: O-key=[2] 'e9e7' [ 383.136061][ T12] FS-Cache: N-cookie c=00000000b7ce9637 [p=00000000a00f4ec0 fl=2 nc=0 na=1] [ 383.144857][ T12] FS-Cache: N-cookie d=0000000035364e0c n=00000000268544d6 [ 383.152154][ T12] FS-Cache: N-key=[2] 'e9e7' [ 383.191207][T15952] kAFS: unparsable volume name [ 383.235485][T15956] kAFS: unparsable volume name 04:31:20 executing program 3: r0 = memfd_create(&(0x7f0000001780)='\xd8\x05V\x15\xa5e\xf1\xb8\xf6\xa2\xba\x85\xb95\x03<\xb9;\xcd\x86\x8bD\xf9\xe9L\xe1Q\xfc\xe2\x97\xa0\xe8s\xb2\x11\xef\x1ac\xc9\x89\xc7\x0fv1\xa1:h\xf6\xf5\a\x8c\xf0Ay\x03\x97\xe77\xc1\xc8\xa6\xcb\xd2\xbe\xe9\xd2\xfb{u\xc3\xcd\xba\xa8G`9\xb5\x82\xa9p\xc8)\xe5$b\v\x8e\b\xf4\xf0\x11\xb4\xcb\"\xf4\xf3\xb4|\xdf\xa3\xdd\x9c\x8a\xf4D\xd3\xea\x11c}\x86H\xca=;i\x96\x183h\xba\x1a\x10', 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000380)='/dev/nullb0\x00', 0x0, 0x0) io_setup(0x1, &(0x7f00000004c0)=0x0) io_submit(r4, 0x8, &(0x7f00000000c0)=[&(0x7f0000000140)={0x3a004023, 0x2759, 0x10, 0x0, 0x0, r3, &(0x7f0000000000)="98", 0x3e80000000, 0x0, 0x0, 0x2}]) 04:31:20 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB='#@%}'], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) 04:31:20 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000240)={{0x2, 0x0, @private=0x5}, {0x6, @link_local}, 0x2, {0x2, 0x0, @dev}}) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000000)={0x0, 'ip6tnl0\x00', 0x1}, 0x18) mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r2, 0x0) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) fsconfig$FSCONFIG_SET_FLAG(r3, 0x6, &(0x7f00000000c0)='posixacl\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'trusted:', 'em1', 0x20, 0xdfc}, 0xfffffffffffffff5, 0xfffffffffffffffd) r5 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0x1f1, 0xfffffffffffffffe) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$update(0x2, r5, &(0x7f0000000000)="9f", 0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, &(0x7f0000000a40)={{{@in6=@dev, @in6=@ipv4={[], [], @initdev}}}, {{@in=@empty}}}, &(0x7f0000000940)=0xfffffff4) 04:31:20 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ubi_ctrl\x00', 0x400200, 0x0) fsconfig$FSCONFIG_SET_FLAG(r0, 0x6, &(0x7f00000000c0)='posixacl\x00', 0x0, 0x0) ioctl$RFKILL_IOCTL_NOINPUT(r0, 0x5201) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) 04:31:20 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x4, 0x800) ioctl$TIOCGRS485(r0, 0x542e, &(0x7f0000000080)) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) 04:31:20 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x2b, 0x3, 0x7f, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x50000, 0x0, 0x1, 0x5, 0x0, 0x0, 0xed4a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB='\x00\x00\x00\x00'], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) fsconfig$FSCONFIG_SET_FLAG(r0, 0x6, &(0x7f00000000c0)='posixacl\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_START_UNIT(r0, 0x5) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) fsconfig$FSCONFIG_SET_FLAG(r1, 0x6, &(0x7f00000000c0)='posixacl\x00', 0x0, 0x0) ioctl$vim2m_VIDIOC_QBUF(r1, 0xc058560f, &(0x7f0000000280)={0x6, 0x1, 0x4, 0x2, 0x3, {0x77359400}, {0x4, 0x1, 0x5, 0x5, 0x3, 0x0, "67d41fd4"}, 0x6, 0x1, @fd=0xffffffffffffffff, 0x400000, 0x0, r0}) ioctl$FS_IOC_SETVERSION(r2, 0x40087602, &(0x7f0000000080)=0x73fceed5) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, 0x0, &(0x7f00000001c0)) socket(0x0, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000200)={0x0, 'veth1_macvtap\x00'}) pipe(&(0x7f0000000000)) [ 383.414086][T15965] encrypted_key: insufficient parameters specified [ 383.426231][ T12] FS-Cache: Duplicate cookie detected [ 383.431784][ T12] FS-Cache: O-cookie c=00000000486ce8c3 [p=00000000a00f4ec0 fl=212 nc=0 na=0] [ 383.439066][T15967] kAFS: No cell specified [ 383.440723][ T12] FS-Cache: O-cookie d=0000000000000000 n=0000000000000000 [ 383.452278][ T12] FS-Cache: O-key=[2] 'e9e7' [ 383.456948][ T12] FS-Cache: N-cookie c=00000000b87ffc1c [p=00000000a00f4ec0 fl=2 nc=0 na=1] [ 383.465650][ T12] FS-Cache: N-cookie d=0000000035364e0c n=00000000a4b497ab [ 383.472930][ T12] FS-Cache: N-key=[2] 'e9e7' 04:31:20 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) gettid() mount(&(0x7f0000000200)=ANY=[@ANYBLOB="3441f9b2ecd4de310eeaeb11539c0dcc593e2206ef4a3ca36007d75578a8936b3e90862f7ef2f13805e1be9985fdcdac1b54f19cab27986efee6eb9843fe6d86b480f61f01a55e9e19c7774c1afab134d3fbf85bed1d8a3295869af2799ce95bbb972635ab7b4cb0e05ed9bc56921bcdb12098ecdaa27af56172bd36a86bccb495903f5d1a759d8b417e065d093d5187aff8a21e8d397c56c5cc29694ee5de76526f60c0c9e6f7404a2c525934f601d6f6a78139f8dfc4735be517bd17a2cebe55"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) fsconfig$FSCONFIG_SET_FLAG(r0, 0x6, &(0x7f00000000c0)='posixacl\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0xc06855c8, &(0x7f00000000c0)={0x9, 0x7, {0x57, 0x3, 0x1, {0xf2, 0x6}, {0x5, 0xffff}, @period={0x5c, 0x1ff, 0x5f, 0xfff, 0x0, {0x100, 0x1, 0x200, 0x2}, 0x0, &(0x7f0000000080)}}, {0x57, 0x80, 0xb8, {0x1, 0x7}, {0x9, 0x6}, @cond=[{0x0, 0x8, 0x7, 0x1ff, 0x7f, 0xea58}, {0x8000, 0x5, 0x400, 0x5, 0x15, 0x8b}]}}) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) fsconfig$FSCONFIG_SET_FLAG(r1, 0x6, &(0x7f00000000c0)='posixacl\x00', 0x0, 0x0) r2 = fsmount(r1, 0x1, 0x7b) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r3) r4 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp_SCTP_RTOINFO(r3, 0x84, 0x0, &(0x7f0000000080)={r5, 0x82000000}, 0x10) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r2, 0x84, 0x22, &(0x7f00000001c0)={0xe9, 0x2, 0x9, 0xffff, r5}, 0x10) 04:31:20 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x129) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="42e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x6) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) fsconfig$FSCONFIG_SET_FLAG(r1, 0x6, &(0x7f00000000c0)='posixacl\x00', 0x0, 0x0) renameat2(r0, &(0x7f00000000c0)='./file0\x00', r1, &(0x7f0000000100)='./file0\x00', 0x4) pipe2$9p(&(0x7f0000000000), 0x80000) 04:31:20 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000240)={{0x2, 0x0, @private=0x5}, {0x6, @link_local}, 0x2, {0x2, 0x0, @dev}}) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000000)={0x0, 'ip6tnl0\x00', 0x1}, 0x18) mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r2, 0x0) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) fsconfig$FSCONFIG_SET_FLAG(r3, 0x6, &(0x7f00000000c0)='posixacl\x00', 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'trusted:', 'em1', 0x20, 0xdfc}, 0xfffffffffffffff5, 0xfffffffffffffffd) r4 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0x1f1, 0xfffffffffffffffe) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$update(0x2, r4, &(0x7f0000000000)="9f", 0x1) 04:31:20 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="22e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) [ 383.571102][T15974] afs: Bad value for 'source' [ 383.673355][T15974] afs: Bad value for 'source' 04:31:21 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000000)='batadv\x00') sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)={0x14, r1, 0x301, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) write$binfmt_elf64(r0, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x9, 0x9, 0x5, 0x3f, 0x2, 0x0, 0x6, 0x9, 0x2f9, 0x40, 0xb, 0xae0, 0x100, 0x38, 0x1, 0x2, 0x7, 0x5}, [{0x2, 0x7ff, 0x0, 0x100000001, 0x2, 0x0, 0x1, 0xfff}], "cea05e0b2ff0148ae90f3f0fecf05d9bfda8312f56466322cc9022aba5d624e05e5f7684bc483c428ec4385af5121f238ac02d48034f409f2b7c084a8e7f15c28fac66bd46e5582246e1f681c4ff6b1a156538fb4d3cbc4c2a7e48c56d32071d9872c69759b76cbda47244742a6ad7e3342da3105be013c71973b968d941fc6c8226ea0c4879f823bf60cd16a47d04ed0287"}, 0x10a) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, 0x0, &(0x7f00000001c0)) socket(0x0, 0x0, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000000000)='batadv\x00') sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r2, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)={0x14, r3, 0x301, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) r4 = dup3(0xffffffffffffffff, r2, 0x0) recvfrom(r4, &(0x7f0000000080)=""/6, 0x6, 0x10041, 0x0, 0x0) [ 383.733164][T15982] encrypted_key: insufficient parameters specified [ 383.740895][T15984] kAFS: unparsable volume name [ 383.740932][T15983] kAFS: unparsable volume name [ 383.782295][T15984] kAFS: unparsable volume name [ 383.801428][T15987] kAFS: unparsable volume name [ 383.809549][T15985] kAFS: unparsable volume name 04:31:21 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000240)={{0x2, 0x0, @private=0x5}, {0x6, @link_local}, 0x2, {0x2, 0x0, @dev}}) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000000)={0x0, 'ip6tnl0\x00', 0x1}, 0x18) mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r2, 0x0) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) fsconfig$FSCONFIG_SET_FLAG(r3, 0x6, &(0x7f00000000c0)='posixacl\x00', 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'trusted:', 'em1', 0x20, 0xdfc}, 0xfffffffffffffff5, 0xfffffffffffffffd) r4 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0x1f1, 0xfffffffffffffffe) keyctl$update(0x2, r4, &(0x7f0000000000)="9f", 0x1) [ 383.844106][T15989] kAFS: unparsable volume name [ 384.035590][T15995] encrypted_key: insufficient parameters specified 04:31:21 executing program 3: r0 = memfd_create(&(0x7f0000001780)='\xd8\x05V\x15\xa5e\xf1\xb8\xf6\xa2\xba\x85\xb95\x03<\xb9;\xcd\x86\x8bD\xf9\xe9L\xe1Q\xfc\xe2\x97\xa0\xe8s\xb2\x11\xef\x1ac\xc9\x89\xc7\x0fv1\xa1:h\xf6\xf5\a\x8c\xf0Ay\x03\x97\xe77\xc1\xc8\xa6\xcb\xd2\xbe\xe9\xd2\xfb{u\xc3\xcd\xba\xa8G`9\xb5\x82\xa9p\xc8)\xe5$b\v\x8e\b\xf4\xf0\x11\xb4\xcb\"\xf4\xf3\xb4|\xdf\xa3\xdd\x9c\x8a\xf4D\xd3\xea\x11c}\x86H\xca=;i\x96\x183h\xba\x1a\x10', 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000380)='/dev/nullb0\x00', 0x0, 0x0) io_setup(0x1, &(0x7f00000004c0)=0x0) io_submit(r4, 0x8, &(0x7f00000000c0)=[&(0x7f0000000140)={0x3a004024, 0x2759, 0x10, 0x0, 0x0, r3, &(0x7f0000000000)="98", 0x3e80000000, 0x0, 0x0, 0x2}]) 04:31:21 executing program 1: syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000100)=[{&(0x7f00000000c0), 0x0, 0x101}, {&(0x7f00000001c0)="c413d9c98b12e24be20c311875d483d62c293c8ab4bacc2de7cc722502e448229f1b54e3f1c0fc0b9ca49eda22bdc07583df93e34c582062dcf4e73b54763fbfc6a4ab2d60c10562e39e1b3f0f4405d02b56ab042f4c58b3c235", 0x5a, 0x2}], 0x1, &(0x7f0000000280)={[{@type={'type', 0x3d, "559a5734"}}, {@creator={'creator', 0x3d, "f87cba3c"}}], [{@hash='hash'}]}) mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) lgetxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000002c0)=@known='system.posix_acl_access\x00', &(0x7f0000000300)=""/184, 0xb8) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) 04:31:21 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) fsconfig$FSCONFIG_SET_FLAG(r0, 0x6, &(0x7f00000000c0)='posixacl\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(r0, 0x80045301, &(0x7f0000000000)) mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000080)=0x1, 0x4) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) 04:31:21 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0xc0000) ioctl$KVM_SET_LAPIC(r0, 0x4400ae8f, &(0x7f0000000280)={"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"}) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) 04:31:21 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000240)={{0x2, 0x0, @private=0x5}, {0x6, @link_local}, 0x2, {0x2, 0x0, @dev}}) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000000)={0x0, 'ip6tnl0\x00', 0x1}, 0x18) mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r2, 0x0) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) fsconfig$FSCONFIG_SET_FLAG(r3, 0x6, &(0x7f00000000c0)='posixacl\x00', 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'trusted:', 'em1', 0x20, 0xdfc}, 0xfffffffffffffff5, 0xfffffffffffffffd) keyctl$update(0x2, 0x0, &(0x7f0000000000)="9f", 0x1) 04:31:21 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000000)='batadv\x00') sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)={0x14, r1, 0x301, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) r2 = accept$nfc_llcp(0xffffffffffffffff, &(0x7f0000000440), &(0x7f00000004c0)=0x60) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000080)=0xc) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, 0x0, &(0x7f00000001c0)) socket(0x0, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000200)={0x0, 'veth1_macvtap\x00'}) 04:31:21 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x3, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="65e9ef3a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) [ 384.454243][T16013] hfs: unable to parse mount options 04:31:21 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000240)={{0x2, 0x0, @private=0x5}, {0x6, @link_local}, 0x2, {0x2, 0x0, @dev}}) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000000)={0x0, 'ip6tnl0\x00', 0x1}, 0x18) mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r2, 0x0) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) fsconfig$FSCONFIG_SET_FLAG(r3, 0x6, &(0x7f00000000c0)='posixacl\x00', 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'trusted:', 'em1', 0x20, 0xdfc}, 0xfffffffffffffff5, 0xfffffffffffffffd) keyctl$update(0x2, 0x0, &(0x7f0000000000)="9f", 0x1) [ 384.555299][ T12] FS-Cache: Duplicate cookie detected [ 384.560998][ T12] FS-Cache: O-cookie c=000000005f33521c [p=00000000a00f4ec0 fl=222 nc=0 na=1] [ 384.561977][T16013] hfs: unable to parse mount options [ 384.569929][ T12] FS-Cache: O-cookie d=0000000035364e0c n=000000007418fa4a [ 384.569937][ T12] FS-Cache: O-key=[2] 'e9e7' [ 384.569957][ T12] FS-Cache: N-cookie c=00000000d5da790e [p=00000000a00f4ec0 fl=2 nc=0 na=1] [ 384.569972][ T12] FS-Cache: N-cookie d=0000000035364e0c n=000000000e279599 04:31:21 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x20, 0x0) 04:31:21 executing program 1: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) fsconfig$FSCONFIG_SET_FLAG(r0, 0x6, &(0x7f00000000c0)='posixacl\x00', 0x0, 0x0) ioctl$ASHMEM_GET_NAME(r0, 0x81007702, &(0x7f0000000000)=""/59) mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) fsconfig$FSCONFIG_SET_FLAG(r1, 0x6, &(0x7f00000000c0)='posixacl\x00', 0x0, 0x0) ioctl$DRM_IOCTL_MODE_GETRESOURCES(r1, 0xc04064a0, &(0x7f0000000280)={&(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000200)=[0x0, 0x0], &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x4, 0x9, 0x2, 0x6}) mount(&(0x7f0000000080)=ANY=[@ANYBLOB="d8fb3f88f3c16626e5ad759b0b72111d0c355f7806690357ae7f442dff13fc8773031e36da9cbfd9fd38d8a6c4b36343ff62b4"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) [ 384.603039][ T12] FS-Cache: N-key=[2] 'e9e7' [ 384.651830][T16028] kAFS: unparsable volume name [ 384.684336][T16032] kAFS: unparsable volume name 04:31:22 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000080)=ANY=[@ANYBLOB="23484e05e974b536ca3073e9e77a9cfbb2521e0a8f5746edd96a099a054c7db40210bca8ae459d63a65e7af85b71a069c2c46550a373f2d082e9e36671fd32da00c33358ef4e0eb1fdee25d4e9a0ac664c6e4b7c91cc74"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) 04:31:22 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000240)={{0x2, 0x0, @private=0x5}, {0x6, @link_local}, 0x2, {0x2, 0x0, @dev}}) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000000)={0x0, 'ip6tnl0\x00', 0x1}, 0x18) mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r2, 0x0) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) fsconfig$FSCONFIG_SET_FLAG(r3, 0x6, &(0x7f00000000c0)='posixacl\x00', 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'trusted:', 'em1', 0x20, 0xdfc}, 0xfffffffffffffff5, 0xfffffffffffffffd) keyctl$update(0x2, 0x0, &(0x7f0000000000)="9f", 0x1) [ 384.874641][T16037] kAFS: unparsable volume name [ 384.995846][T16043] kAFS: No cell specified [ 385.038267][T16043] kAFS: No cell specified 04:31:22 executing program 3: r0 = memfd_create(&(0x7f0000001780)='\xd8\x05V\x15\xa5e\xf1\xb8\xf6\xa2\xba\x85\xb95\x03<\xb9;\xcd\x86\x8bD\xf9\xe9L\xe1Q\xfc\xe2\x97\xa0\xe8s\xb2\x11\xef\x1ac\xc9\x89\xc7\x0fv1\xa1:h\xf6\xf5\a\x8c\xf0Ay\x03\x97\xe77\xc1\xc8\xa6\xcb\xd2\xbe\xe9\xd2\xfb{u\xc3\xcd\xba\xa8G`9\xb5\x82\xa9p\xc8)\xe5$b\v\x8e\b\xf4\xf0\x11\xb4\xcb\"\xf4\xf3\xb4|\xdf\xa3\xdd\x9c\x8a\xf4D\xd3\xea\x11c}\x86H\xca=;i\x96\x183h\xba\x1a\x10', 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000380)='/dev/nullb0\x00', 0x0, 0x0) io_setup(0x1, &(0x7f00000004c0)=0x0) io_submit(r4, 0x8, &(0x7f00000000c0)=[&(0x7f0000000140)={0x3a004025, 0x2759, 0x10, 0x0, 0x0, r3, &(0x7f0000000000)="98", 0x3e80000000, 0x0, 0x0, 0x2}]) 04:31:22 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000000)='batadv\x00') sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)={0x14, r1, 0x301, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) sendmmsg(r0, &(0x7f0000007980)=[{{&(0x7f0000000080)=@x25={0x9, @remote={[], 0x1}}, 0x80, &(0x7f00000025c0)=[{&(0x7f00000001c0)="4b9c46f4247ea5f72b961dd5480525f0c022afbcae28d029d818b11d849344b5545ad9c4507e43f92d550179f288722247e50fb9f82871510f05dfb207cfe78d9588f7955aa371d60a9db2246e6cd5ad764cd365776382f50c8aa695", 0x5c}, {&(0x7f0000000280)="21113b004f2e8f2b711d3ba693567e2b533f793b029b42fe57d4776b6f773cb773a2d6cc9e42d301b48e80717a97544a3808ad66cd8c70b968e371faef1aa1962c37f6287d9bc6b3355984a99b2beb99b9b75cd88765a4c3518f8a8d6d498ed816b26cfeab6ededc1791", 0x6a}, {&(0x7f0000000000)="43b7e8142527884e363f3bf0fc0d62ca81edb95307d3e81ab08aa92ffa3aba50908b86a55b56a6f7743104c530a66ff1190b2c81e0d5", 0x36}, {&(0x7f0000000300)="3f933b01e1f110a6393095c9ab95e6037a5f4ded810c5be092c25eda03772253427a7a0aea5a864e025ef41adc729ddec84d127a051c3a7ef7d4637d45057947183e5b5a6b7e13c877f75c58d74d26816c6021ea3b471e7decd767834ee4ceba7c78a15940b66353db7332c4037ac2f7e6afb0fbd0f04fee1fe77fcc5c13988dd0a7ec58b72af9e113856d54c928dea38ad5b9d995d19b7af2d400f27883909c845fecdc902d5f0d03bcbf8f76f630fd2b8978d52d1c6d4f6991270d9445298bb44ea1fe009add1d0a15f474379ba4ccaca97c05e8cefe13fb47d9257bad69dc9d8ccd34d3e0fc", 0xe7}, {&(0x7f0000000400)="38c00f4e945cfad4b4ba4b0d9b8531e88d571a3430e753555736c61c8e577edfbfce70c98315ca5e8dbb1745d1359e1aaf2b1278ea6abfc21d4aaf1f2c4638f33211c82f5c8856461f82ef566241e8c537f13456f90b37148ae616fb4227894efd1ff503e0dfa43b8e888704dc09a5d342f89fcb71a426648bb707109023a2dc978a330a93f68aa550b90a5e3af69791c88d9ec7cb413bdfdd05fd49e3d760422f65db150bc1ff22b6f2386931c8c8a01af64b5f83821461e0578cba40074fa04a4dc5defbf31e7a6b7782251ffa7725cdfa8fc525bf289da6b37cc072ec7bbcd1a04897e16c890b22196a6f1119d57eb7ca41d5de77ce6038fd766366535d344f868b483ad99506703e2fc2fb9d7383d92ee98dea5b0f302d3864e638871eea9fe92fa29ad5aba4e5e1c433661c3095912ccc1b3762f2e2eff7514d89881db240d7b361ae2aa6afbe2aad7aa11a008cfa05fae3e0e7318640593d40e6edc88e208d972bcb2a10fc45315607154d530b2ed3fd72ea2073e03c6f7a97aa15393b9dee8d85cfec0374510dc463f122e601b69b01555ed57105b03b1391ac3c558caba5ff3ba5938e4d5ae22237c7daacc4bf746a555d24005a7c22704b32a8bf25f9f14471e0efe2354b1b9eab372cdeb72499319498776bbfd3ac2de578fb6eaaead07552bd0c6ed89976a4cbaf92d4fb882db3e125b1147664da436350249f43d281f31f79694d873acece11dd59275e26c80a1ce4bf3981e2006c8fd0ff5933125025198a15e488055b55d236a11845f7342f592e4e234ca3e67ba1517032250ac9c870e8e40c6fe7d7c6506185d0f7d8bb851d3d4cb673e4920ba956f8bc384c0a548e40dabbe5418c67d8c617d656e53bc2c7131e8068330b4de45f942d13d99e9d8188b57e009b54b54ccd4930e967af6678f08eae21bf012df1aa2a1519127fcb5edeb51c9087a09175d395018c7de0fcf947dda8193470dd655f5128a9e3b5784b35015f8ee303264d54d87b011e98bdb51607546eed532c2ecfda09764158a3c48b231dbc79de0a68dc108c363788974193f8eb4bde96c087a310d403606442bfa224d3cb689c43752b19c5b93a1de076a28ecb2ddec7890e192df971abeca6050f0339a5f965268c8a4824262da2154ad9b3b38b3c821cc8beb25ee9e63fcb10c5b85a46660d558dbb27eeeaf04b9fa7e8b745456c5e3a2ca3bfb9207d6404bff6d25226b113550647ca7b966735973eea500ae91ea5739f60e402753f14de5c9dbec26649f73fb3018f29bf40a6bad4e47a976ef7eda13fd4ebfb71c01b1015a2963d6d4c6d7bce0babb6101e0c62ab450f3b5deac4e178639c23221a140bc72358d9ed4a8a78f2b2b35c567de127626ba8e19bfe5e9bd0638e1319f0ab1e8ca11a7ba67bb2b71e51b6dbbf1243ae029afc28cef88d70b7a4329d38db37c43dd42246462e01ce88624fd49378cbba9fe3a27f50edd9e8761eea3fbfab7e8fc16684c416497d72c13af7e41e0add803e7d7bc30c51264a9f87f8f20ef7a3f5d357488c4d02e04ecb5a92ade7179a20f0c2da2ebf20aa70a6b25a6ac06be36b1811353e80133a701886ca1ee0e88880e87e2f5435271da32505a0fd8de78c4f2154cfd810447377aa41792af9a96f6d0cabc10b664cc598902333b434880817a2b9f0e97f45bd3e03c4a5e2d42d45384e62580921ff5717d2c6c8e3031a729ba28600f57ce9519da79039f2095ddcdc1ee5a4c00cf9976fd886e0c636f51a63b018e9a97defb4aa691993777ac857240f1b503b3ba7a8a4624867cfee3fdda18cb7b68db06f8a03434da5bf1b18d8300b1b7d3b7ab70b662dd98af9b849f016efa14231635413263c4e9aec5d576933a5c9baf3b26a76ac429b446e2676aea10b619a383ceb5c8f27b0142f2a978fe488cb42946ae3c268f1dc2e960d4b5959c31596a5975c641f9cc07814a4de4c590da6dc631d479d498945803cc9cd8e8d8fecb7d44d9a4daa2d6d2ac72b30fdd729d4075a1592603b365ca0631139748033c406077173a25354b7121da48027b0ff5afe3556dd80eae1c27dc5603831052e21b57fbb35545e5e9c425f4a39b1b185f291ea13215df1fe8c93af321d3b387adda80b0a04384b7167b09f07ddafee472aaf58a06b91f37f5415053795d96dc6a558bd87a82276b00dff77edfaa189e69bf2137875500266df70c8d92f249f5464f56b860530fd19e136e176997153819882de2fc2efe489ca61b3dd0876f6d5bf44606e642194fdf87704806924b13b088a6830ca5b1433594d4c0b625bccb9ab1289c26bb24aca41b0c20ed805f93d6695e7927144da3e87ff37c0236d0ebf926af3ad9aba5e84812a9e46a74dcd0b0bafc42674e5ed31256039becf25d02e7160545cf6e12c95c90a877aab5a65430ef3c5271ce44806ae22d38987ec40c135987e49914e9970ace15eade8b81a845e75eaa6d9d97964fe9acf46d789d30554cba22e8699073277b78c58a18b48e43be80e57cf9cc96ea51ce4270ff552a838142f9d5eaa95b72437e9327dcd28cf1faf7abcdfbff43d78f002916095440fe7906ffdc913f893a0d27925b60c4384f92401641d750884f9a76cd790fd216b6b4100cee46c59fe1d41dc7c342c851125fa7f08170983dd64c765435e0bb068f2963ad8bacd9f61d9186865e39267e837e78c40ced2e023553b690bfeeff59a8097f83ba6978028d8735c8e295713d77a851d5d2346fcf9c8f05114f548592fa543ecb083030c9d46558bd04db3ae9c7106cb381f5ed208c45f18d2d4041e7ad9b38b228c3b80087ec3c7b2d5e1f9e79d98b6c6e6dad7def0e8aa2b3b7648073c33c384f48306e78ec6c60044afb2a70cafe0358fc2d064d2dbc8c6cd22bf0dea435981fa23f08081c3c1654fc0f5aca66d6b0c1e498c5735e997216482fc49849e6bb0113e1d917fd83b3b43111b36a1d1a4905aba11852650049761ee87202c042e069c69e6703498ae4a867f444c1bc3e26c60d7ecae1423797155a1f32a6ae382282a8eb990dcdcb460e4e7f14c5b060eb028bd347fd2a1f2988982e7cbdda26d9270cbebc15937b1037d51708d1d5ec7bb2b8b214b8a8b506404202cd21bdaf4817eb844f471cc70bb38a68462b90e73b60c983766eb9260ed2c1a6d59aefac837eb692914b9866ef1d8cd418410c046fc66667a0707b583ea1fe3a08b5191455180445f59098e2f5279098153b6005a386ae1b52c47c784952514dd2308610cd616bc58996e5a5573213265cd00b06a756642299fa3544c49518f812a4525b7fc5bb8b93839939780da7f065abe6f4544898ba21c2c4f1f13c51616700143002a2a62ed893cb3a8a523aad3c2083a5cfea265d88b8c19bfbe3fd9277c614a614016f58e10e5fe55f73f7e7013dae49f62e71fcb3281df6e15f628f6d9ddca03d8c32151d5514cc7a8a5cc06e0f0df068b07784fe469c60e42009ebddcce1d2dab27848a3f8d660785918a3152cd9be20b8a0295a9bbd70fcec6e80f76f9f4e62e84abf9117f54f743809402a4403a3b960acb8d7f4f22926de0cd67c11c09fced94e78f527b6344ad4133ba1b116eee69987d3e27495ba2259ad2382697a3b1dd3c767efb81d298d149d3b04f2ad49a2b35e9c41cf9872c29783fad3f818bd2f7b1e74ba7626a06222a4b761fc3fbec9dd73297aa21e4bed3f62286428e82f439c7907231e2f24f63c277be231fe27890edfbc7c064047976c8e2b7bd0562bc562193e6594e4e7e0f7e3486ceeacc57808aa34dc3fa7d20ba793bc7f5b24595b1a105b14b0abd1bb127115f98aa815b5e92d4a6772555e329972ced33e51ee5a3f4ede9847d171195c245ead89fb08a8d8314329f6207d75d2685b49c3550c30d99449272857037f4b6b7356b7c07a40febb82bccb271ed81c6675fdf47adccab62f58de7b601250fbf515a8420e3c42779b63319ddccc849cd6e05d6f505f06d21dc71aff4ba16dbcb1e35f1350a5abd7573dd6a8ee1bfc4ecb62d5f4af20c86945efd7ea3687805f7bac3be00c888395d2bef535ce6542605cbd7c8b0084d6ce1368ca039513637dc77763d43e8ba5e1b7dbcb9f967887578a09bc7852bb88e4c4595351ab9779ba92eb0b86e70d822994a3389ae9b97d09e005ecbf3a1c8b23843dc865691fdfa3980968665f7891f3c4421de9b2ad0e0c73d8161dbabac86c1805ee22bcefb07d36aeff56d411c8709cc79759d3dd6506ee9c14c2201f1a1821124179db8fe17db97988f81d5b3ab2d65761451f3862d1dad91123680df67303c8e7c187a1a924ecd4750be4e38d424b2daf6adc54426ae7c2d29a24e8fecab03f5c07fe5515ad3ffc0d372d8117b6fb7852d860489dcc4db952ee51c39de696f845dbe86254058ee5b6e9a8589165122dd4da036d558d25e7bdfc7fcb61c21ec7e6ab7a1949659c0e6e8379f72e5ea205dd6fbdc76d00a149e0de0f4c5f6d599783d8c9139d14928f0c59b2057ee7711628ebd47e3efda566d324441678909e5f195f4b5bdc21b141f21c7df3f9fe4cfeefe6a1565f31dc0c32408593151afae7504d0eb8d93578661a143533b99818841c2e7a544c4ea8a28f5572a983e1bf025c8c41b4c5585f4b7ac1879827b44d0d51f94be737752a38d4ad4168654b0dfb181d16ca4ad3e7c453c9391df723cd7b4b3d2fca3b1bf3b002d6ea3f12dc20e36570ebf5a066b9954cdda2ddb1200dda258c7574278e0889cf62436e6abbf02290b9ebef83f94f94612368a2b2497943b37cfab07eba7b8cea21c6731ec0bde09944ec64594a92de39cc38b232fd254065b3780ea62045f97dcee270c93c25ccf529012b742ef3f06d4183bb23b6ab304061f4c56258776883ab8a8a6ec4c758f06f7354cdaaa9e146efbcc7ac5b5f8384e7c48dcc38df2dcd02a144c20d57170274fa04c416b93fd060dc2b74ccf6b686f6b59600533f24de6cdfce288df16be5c7c5e40edf29a4296652f4c32884e79d4635becea55e4c0ab4ee02bbabf20562cb192b8acf8e929f2425e35c299d1bd4caba14c6cebc0de20e73f18a0f39abadf81ce03761cae316e6e8b2bfbf93c83d394e40fc9f02de576cecbce5e2424f54010c56f1e0f78171dccd7e1141136167afe24eb16ec250b7c9215f15c61251154b1e93e55b8ef088df0553b569ee5d5b75993ecf411d75786ea5277cf33c814864189dabd61c5330ab5ffa37c4b488a56561aee7b1d846eebf051191baaee10c28c448caf14e3e522c041bef80e2ac22f3ccc8e1f39257ddc6ab1e99cb13363efef10df368474da136f9cfa374133476c03c671565609a0ddfbd2b98de647a8f501a52aa92e23b7e90724ea5a9941a57ba35f4e1a445fcd86d8cdb956177ae46d89211d07fe7406888b8d80108aae1ec1411685d66cbb0e314b73b0e4710fd68e373834a4f24c61217423d89a28345da184c592ed0044a3899807c947eb1e0448efe03994bea8d9fdf05047132efa448afe833dc1c19cc2ec33522c91f3c2b7e8e7a3d22a9231619e0e71882e3415d9e451559bfd91b81c7731e282fd64d43de376b499588d65a431b3c66577acd620dcde8301bb45fdbc57409caa637e745328144f5983746497a4761c75b1b0e626df6e942f3367e3850189f22dcad717bf11f68261384d1dc241678ee0bbf0b78f9a6fda72e4951b51c83b7b30bd931085d87fbb0960965cddb918ad0e2340ea4ec84157cbb220b65e6f91ad1037cf28479db1f03af8b859cdc85252926f4f50c960b665e4ab", 0x1000}, {&(0x7f0000001400)="309dd8ae5681fbd56e618e58f1696ac11bf403bf7f50d97e42e7983e689640332e1e57abb8b1e790d900c5b3848843db09b8e539529565f268a3dbca8e787f5328de1b0b07", 0x45}, {&(0x7f0000000100)="f51cb73036abea8e054b6915c563b00f628a3310bdea705249de27127bc9eef55bb255cbb7ac", 0x26}, {&(0x7f0000001480)="035cdd7b39e8a8d1c7857d8a8572dc73fd8224899ca21630a24da210335d1b882f21b0bb9995ee514d006546a980e129b96778d7d7c23ad7c9aceae82370707556c449cbb0acce18a4e3767210a4a4ad94df5d1483053dd0244a98d4a9c92506c8dff87b051d67dcf26e3627e50448cd0a32c9b91250acdb0cce06df9505d91eb14fa51f62925884694010", 0x8b}, {&(0x7f0000001540)="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", 0x1000}, {&(0x7f0000002540)="61ef579dc72ae52a95e2bc5bb2b779baba5da60295cf22dd73bff4e68be9ef5c44e787b2458f29bc64da0c50f1ebc66924b5fac506e6fb36bbf08b9751878510a6c9fad201313da3e20f232b5f497e7e1b39862bd0a06d3fc952fa36a83cd2e754cee826feec41f82a98d2", 0x6b}], 0xa, &(0x7f0000002680)=[{0x18, 0x0, 0x8, "89f23d2066e0"}, {0x80, 0x10a, 0x1000, "5f5a0e3cc62f23844c75f2e319fcaf62938e73015d25c1fe0efe76947e6940b1fc32069b192930e2afd69b67ed7451c08755433ad965564c61ae2e834683dcc483ad67694fc8e5254d9f32d55efd1c4b9cc5eff4a5e55ab9c26f9a73b5850ec0555ecaae724cfc44ddbb5c9122"}, {0x100, 0x103, 0xff, "ce7b55e08a5697129a7295e2cd26003993350e5464a7b219205963f378b7cee7650950bb6efc377d593675cbc423b521918d7c30d6d2d6e9689b83a6a7383d12b9694bf72b6babd9d51f3555df083dac5e2bc9312679c8f54d06eda77f4f3403e86798c03d2ad28874f561069da80e171a4bc5c87100ce6cbcc7a3596fa86053ad5052de8ae54227f7e465df4641d2cb88d82e855c43e7b46b7a98a3bef18b7e2464efd7dccb41646ec9fbfce969161fbb6f0070eb6f2b6b787649c9fec09812359717e613cd680674c3cfdbed8eb3c8fab5805cb817369ab3f7b86f451783143879a88dac5cb2cb05b7744074230c"}, {0x78, 0x118, 0x2, "dd225a021ff3484321f7208682be43351e039a24a16172ad66e7c78d795a1be69d0122942bf34f927f0bca222c51725874a912aba37dcb9f4bb8cc8a615deed4616df5d8ade7a9482078fc956e20551b2104599454e62b6b58cc1d63d0d9a1204248a1"}], 0x210}}, {{&(0x7f00000028c0)=@tipc=@id={0x1e, 0x3, 0x3, {0x4e23, 0x1}}, 0x80, &(0x7f0000002a00)=[{&(0x7f0000002940)="b9135ee4bd4b852fc15da974822d4b0c1e5ea88d0d7e24a2265a944c889a7b", 0x1f}, {&(0x7f0000002980)="7f6a7686103ca5ccba15d1686b671214b5f916bff777b64ec4d12fa02fc5780cab9be251b7523c1da8b1f89b8442fae76cf0dd224ed34b60013f1e70060a886d54c84226041cb2c3cd649b08257691a9f0bee793c963f8061c93a43d0ef0403e07159a0172320bcc598f04d8dbe705b5fff64c8be4cecae3ab", 0x79}], 0x2, &(0x7f0000002a40)=[{0x1010, 0x36b, 0x3, "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"}, {0xc8, 0x114, 0x4, "d49d1c9acb01d91f1b3d92cc25b98d712efb7de8872e066b305c9d53b333cecff2b1fd955860c30cba2ed6952e82f92e4bffe0ae0a3389e4fe028320d7a023ca0f93f81f1beb3ed054c1f30f416443fd6729a71afee3164bc2d520358bf90bacda6fd738905d6a324552dd7a4fd676e92f58110148ea9fe2c946eb54c2a189525fd3e8ba7926fcf18251af7fe1701ae0b679cf80833e54e909afc3ebf98c70a96cf02dc380a50c5fd7731459975906b378b3bf69b9"}, {0x58, 0x119, 0x80, "9211b0990f661c668bfc85d1197f9a85fe17c2214497b6a48fea952c9616d01574687b0a69cbfb7919090ac7202a8dc4d269de00b939fb3248710edb4d644808859eceb641"}], 0x1130}}, {{0x0, 0x0, &(0x7f0000003bc0)=[{&(0x7f0000003b80)="ef467e276edf65fd36a21a06e8253a00897c377ddc55185090c9410b9032cd647a37cbcd8385ed632e86e0dee4e7307f0a", 0x31}], 0x1}}, {{0x0, 0x0, &(0x7f0000004c00)=[{&(0x7f0000003c00)="8de6da7574aec8500e55056797c49eff48e8dba42947e620a60cc0305e8c9da560adb2eeb465f590b3c93b724402b4701b538e00c49ddfc4664063d7cd7ccd3966a207914157a490d0a221f0fe7e01688cf8427245bfc27f03117da1fbe113bf2bb65e6cecb75251b1d59080f6f6cbb3cd017525139b447b2892a95558a983f030701aa5a9a69d948f98793e27988da33aa2fa605ed314a8ff656381d4225fc9204498ad4c84863c0caf0289aa7fcd856bcd2318485e03f4fb589211a7a287dc1f124161572b878db981c6e5bd6fd10217c060a780928427a1cd56f53eb6ffacedec8b15f3c287d43be5129d33fa6842b24103608c30ff914ba48f6adf2c0d4c5f1c534d16fbcd8725204e48b08c84073f7d2f3017ffcae996300ada05b45f69002107f7e2bb130cd9337dee2bdc7524d46619e24a52b9a9c382982e2442980dd0de5f492f9a320d46606eafd7ae2ad76cef860593c4777b30f46d3084f69e1d53cbc9973439cf04e3460ee4cba2fb11a3410221420cedde4bbd816aefcd2e5b113734bb77f01593519f7bd8ae69abccdbd052e4eb95fa5f3619ebd911105206ca36947db20e53f5191a4519fba4a3e307742ea25c0f7080c97c596e79d8424e2b782dfb8b5cb89b4e020c0bc5660c403810ed14b93918305c1cc70c77ce1f6a117eddc6327d1755412168dcf3557921f185a330a5de58b36b51b627129c7673ab7d3d7c7a963bc6b17631533c480a0e0699178695880aa8d4896956ce4e5b3a49f5e7d825f631ba30155779b96ab1950c1a27ef1c1dbb9d8811b15a43442c05ee1572a91518b733e08e501bb312a6c693b1bd44315f1a3d1c509beb30b62ab8be4765fbb35c1586d1365b04f522f6e6052f70f2de1b597510a3776c7168485bbe552fb687379ca0a78630c66da43e4aafa038f85857b57bd3b47749547ba2126fe261933b9025cb02570ae9571279dfff0ca9da3c748d560696bb41fb0e64ce9965e11a59ae61225559fd4f64458c104fa09d4096cfd7e12df75864b549573cb052b596ba56cda8c8d65aefa40472590d0bdf3b9a462517baa4a33cff521e99668932efb42c1a64636ddb61a7df22e240cf9585db7d8a361f4487d9f5c4252a2047fa6eb11d15c32a9b6e26c59f5072fbaa9d676aa91dd388870a9530b9169f8298301ab1a4f2f7839aaee455ac86de47f176feda15a902d86ff92f47c05f05e3e7ffd43ffee73f5e6b994c77b5be6a36ed787dfa7e46acb6dc1160b9548cf7070c2652adf22833a88d92a348e78d1cc1d7387a0941e05f223fb4550906b20e290eea67928b64fbdc42644ff77f530f01f6e8f558b20b56bf6f888ee0f530cdaac8a3de130c79709d157b87e4f62007109b872327468dacdfd7c4ed1d93a19e48835b1531ac622880a9cf06ce6015320c0337a12bb5b604c1b4af6b00f70b3c90a2899149ed3c3f31ffbe9ee1a235250e942b8eff24ace3e0bcdb5539ea2e4d5a6eca20e29318d9382b4f4d3f01045d3a0d5cb4a8c94d72e0f1a7e6f5e50a61f1d871d0e482ff5ef4f063feeaa9da082425c8d6f809575d4839c2c181cb1f315b846df09416dc5b780ac3367751ce659ffa6e945c4aa7bcc9c7c1679bd3f0085f1dc69e732b3876c10d56caca6bea98122ffb43706990b04459e8d6e775ed7b3134814d92c174c1ee725b6767afcd46c0e6531bc6acc9814c772d95052237115767f19c516d39dd8d1a747db0d6dc35fc1abb82fa6d8189141482edef2c51df5d40520e5ac4e73433109e32915bde503e807bb46ce62736ddf8f22482707384146e9672315180b85bcb9d077e79d60b483a7cc606d74343d6ed41b9ad4570cf8befaf853d6146023dde0c409bc6fa7dedf8ae60efba7446d190900596963eb5b0f0a4170b757216483be04beb673f186dd0140b170a9ab903982c62500943409157157d03136ebaca249a6aa0a3ae6000f00a486d1f4cfba000e3b8fa9c7beead9a691fb2720dd15738ed8707ec45ebb2fd85314791ffc0fecca38684e10a6d314349ade76260144bf33e3d836d53346da7325c623cc34d30e7a2a228c7b5b02ebfbb9319aeec27ece5c4a54ac38c6effcfe4ec1a981aefba9e7b2dd23ccde442236d697522a02a17a7b7cbd57d4813b795ba5c4f3b240a74e765a739446a075f29e70e40d1e204794147e9a3d580757bfd64ef253da84028e45a7dfcae4781d4ec188fd27f48e058527425afcd4c806b1312d7ccca0d26d902cb29d43c644201490de00c52e3f5efa0975e66abc84bb8e792cfccc27a33caf8a7e142f6a3d0baf7625df85349cbb9c1360d04862f51d5bde514a1aff64e77a679d454cef108cecb11eddb86f98526f04d23bafefab6fc0a4e11e900e4eec3ff1ee36d124d37c323cd6ab346f0f4b162cb8d2f5ee92f92fa1942b73ec0a94e0db4c009a39fafb9da98c7723e983c58f31d19f4f62d55ab9c5417ddc16ab6efae4d5f783acceb8bc56d5818530edcfd10694598bdd5df133e66ded206d2e584ff7d9e40c2f97a4739e34d1dc4fc127dcf4fcd57068a2aeeb244aebb09522e7ca6d74d0bdae7d7dc6c99b55d5f1b355b9c620b54d9e4449c8f6f12fd54095df5db3f645100acaac0bd216d9bb4ff413777355c84b28ca3c37cfe79c63489c1ede1c519cfd930ddb94f5ac3214c7bd5ff68ff255b1902ec0a36bd68353c9720b8fa7be3537556bb4185432375e8b2342c83e6149a4f4cdf007d2b01a750ccca16b7f5e3b9f8b3aaa6a0215a875b162d29a44a094aac2bbb07d72fe4754e00f38cddc41c97729f7b86a8771c5525f98acee9785564b703a0a0c42305e7bf3a383d3bac18b670e5daef14bb068aeb92c1eedd35554bbe257ee911f6b5ea17140da8a096ee27a32a07235deb4d40331a1ed8c33c010b93f766227a95458ae0122dfa1f7177940db6b8eaa9455e5ca8313e14404c21119748e6a7c158b44d774ed5d4d6ca344821bd26680af8e4359d7e2004aca614e19a14633f7b1971a8bfbe73289d1f6ea1efb9ecccaa8b3e4ba839020335ca68ee4f4eabda1d3e8001ca8da3ba59e5fcd4a29bd6d923c690e87d1def722d202ab19ff5c1ce545c0fed830f8b37f8acba51ff924d280e5d38548b45bb6bad155b8f81446c923870ed1c018fe125d0858d00ee7ce5b269352837bf19bab5c3ebc9a3c6c475396cbd19cc4c74703047bdcc2455c0d26bb1b1fe8ce04461298a5e6616b126e1e53e26a4076fd955c00cc0a36899f5e9a2b67baafcda0bc56f742ec54c11d3bd013c9fa38c00dd682c8d8346a4ab42b040ba410884221d6a211839666ec26261543ec1231fc65e20ec629fc55bdd83d4ac151a70085c534ce53e1c62f21d01d064cee8cbea0883021f824be6d7da155b9c22c83636a4d23b42786a77742b19a89e115847489dd7b5a9da82d542d6272b1874d39cdf1c00e83f1c6539d5b9e738664836c3e4f1db12cbb291722b5d49b67ef0c1f7c3edc446036c54316cdea355ca2788246ddd4c339c30c6e434c05ffdbbedfc913a97d78f4924f6e0a702db871c70d26b65cfdfd2b530a73f3ef98105fa7c9033027e81a1f4175c581b7034c14f97b2594e59aa5b181e6e185fca5ccd810698ae001d9c03f90b160b4f9354fdc1d29af1f8fdce97a33490c538ec8c59657959f5c9868bab51a4e2e7fda74be27564c029c7be5b5aa6cd30efd6539d517610454c0eb2884cfe22b8ea83815c6ce5a2cb04881c6afced7c2c43061c25242e501c28ff04265cc65c835779ce4037d53268521748d1cd5ab4efff842be40452e46fb5ef79dcebf5f6fb946d8bbccfec702821132ef1d4be0951ad5b92df4f425f2c6b616212dfbf71c6720d3fc18931986169b78260ede322dbf62026ca6fff5665d3cca6e04f686798b533836b391bfa6dfd5bc73b91e92f20cb8342d9b4aae200bbe982bf51ffd55b58de34ba4f5a568c7eb7110ab899a1d1ae57adbe5ccfacd007e5941515082d7afd9aa336ef06f1f3b5b08fffc2d47f9916f9cc790767f6fad2b012b7835a8ffd338cfd61c6c6239326423ef7bcf30f70073cbe7ab69427624d090c1f84e5053447a1fc3482909db54dbbe8084959bec52084796afe23614dc7de93e1d9701b427954d9da2761cef4a929dc6d52e949a32702bc7f81f2173aed7535b3f2e6931a5dc1e78d384313088f7b4e9ac94e94bb5771f16069e406e1307e667ad713db6c43cb5d63441e2a2a1773e46532620a579e4d229b5eacf9cf980e8abda2654e994f213acf6881589dae71a45b8a29eb3ddb8b5bae83aeef964c195baf7aae4e68f6856a7a40fce1a6e5adc4958a03914887b628ea393f1b4e506b7b580d24eed33e8cfb03888457d03de431c7b245cf11afbdf9a1f2dc03832d4d871f48e6cb5f4019d45495783a615fa18fe46cb401ce3b2c0d035c42565695a5c3dfebd350688c77707fc94e4780b1a6b36738a3531d9412fdcab688284cb56a58ec02556fc915b4d8772cd1bd5245c5ac2b850d00e17a66e13340a0bbc3bd2fb488bff7cc31a0cf4d9ff4e5b24002acd09059c01783f0b05f380348885f1741049b98eb067f3fd8cd5e450bb00b694ce9636753401e7360f08292943a53291c9a402c8fe561d16c8e5a7190154ce7e1e0571857554e1d7b053e214df10d8d284d8f5080247faa66482a9bf4d611aa7a0b306e84fffbc48964babd9f294c0748bfa454fbca0355c777b21bd2a18506d2cb693c2fffe4f365566a02deea2b9de3c5812f19de8445322933bded4900dff5881908770797e383f388ff7879f54ae260e1e4420f5aad70e75d5db3cfd40da7af7c798ca4febf3a36cd4e761e4e6545bbc970651d51b73748ecd0a87bdefc456a1ac081ee86c3e22ee0df22cb9003577c3086140b346d78c8a7f96334e206fb26717bcf68d36e5e4904331b48004a0fcc55755ef55e24ede5e1c8a1fdd51bff494df457b12703b943cc81a75877e9fc2ec3d38395b9734c3a17e46088e47d0689ed2975320d648eec104d88cb02c11c94d33eab72b21005083e8135558089dbc216dee53c7cf09cc6b10fa2d6079011f5e2444af143c622eda9d8e7c940c0ebaef1065e5269517862d65e15a1399390906ece8ac94f062e34bfec5b7b989c413f4faa1b56b910a1e0ade1ad84961a3ba503c856e0fd1c4efe3385e01e5ea20f77eae5768b9610d65a209d78011f408900bda1685fe38abb3dbe51a6475b32970d6d0f4077cc0eb1d93bc8d32ca92b8464b2018be12fa09736c35819842b32923ce9e487e347607b7b24ea50b9c987cadb1244cb37f44bdfde13537a9cfaa6fe7704f8c87c897122b89c69f1edb34073eb4ca26421c7dcdc306f9d3efa9e3d9628b4d1d4641020557f7bb89f244613328e49e4f6a7d2ddb22de1f600c9ceaf92acee93552f63636f3d0c870a956cc28e765b02e4657b54befa0cbdbfad3f537a745d35846864a3b6a47f3d133bf35c5a2cda80ecc024d5dfd3d3667462881b73e8a8c524d9e6ca0c6d550ddd6909c0e9d190d0cf9a012058cb7ba2b8bf2e10256c1488c751a5868008bcd2ae2d25a662b3cce6b079e05d888876f33efd08f20bf23ceca14d5348e026409d3cd1e53ff7183d87edc4bdff38e4972812d40b9eb49e6c2a0822c4b39320363bd10fcf0e9274212cf3e290b748d9d9d7ba25c7713746559fe9c9f72f81ac2c8971c8024061c7e869161933c1b90f8944e4cfe9f8aa8daccd91ebe4a90abd109269cffdf6bac6aec9dc08d288e8fc79deec822a413aa309184cc9153126b761fd", 0x1000}], 0x1, &(0x7f0000004c40)=[{0x60, 0x100, 0x5, "5006ad85e0b06c0cdb6bb2b30c6934988a7bb41637963c823d48e0ca3edcb1dece89dfc6f7b8f9e6485650b3fa24b2c2ef205c327623a5af47265338d6e9ebd34bef8a625df2e48300"}, {0x30, 0x118, 0x9, "78bf50400608b05e790b17c77329e0a39ceeed115454b92b3919cb59c05e"}, {0xd8, 0x111, 0x9, "b5f053817ca0129c19d46e277f47c358dda7d55edfe5c644ada8ef4743b766c20a063e12b1c7a5165a30b2de867d5997b78af26611697652d9da655071f4e7bdfecc54b26d40fed3d1cdfb9a4dcfd728e1e328e59af5d75c708efb6e5d5d8f38aec08b7be0cd16291794019033a3aa36ac23694e040ce7ca98b609f51d4ce7d54f4115f40f3a0adb9939a6115480e0ebc912257609e5b9f89a38212358587ecfd37ae846650827baaeb5742c64370e1d45db5e3130598728030c0aeb882f2c4cf785d7d7e0a3e5"}, {0x98, 0x108, 0x1, "9b3a5829dfd2f91fcf1f815bde0294dc87a04998f3c89acbb713cab5633e35c7deaece6cf267f3df8f4b483d2fd4a6eb5defaa2c93c55bed1d9305812a40e5a09cbb60efd2adef05229458f80f1793f3dfc72e2a5b887e03dbb914b3573f2e14af8cbf1b6d9953437fd6159252630a1198e87bef875cb54fe2cc7142ade1880a5214"}, {0x1010, 0x10e, 0x7, "7c2caf0cca87975b73731f9b1609e839e7a3940454d09e183cdab128dde4a1f05f27413c72ebd09f477096a13cc37ba49c7908d93ceaf604fdd3df8592299ec88431ccb1052510bab724f203759b9089abab2ef31200ea261863462eaa3874aa2e4e458e924878160cb7fe8e41a0242039dda19d74eb6430d6ec83a9308c57dad03c2c5dc691b6a045bc39d413a7ded161f39607fd440973a38f8d9df5d22dea98893190937f87a01010b19a4cf0f7d211c3434ca77e78bc8a888eabde5d104df8071858a88523df7e7dae390579003d531cbf1d64b5b9392c7700e9fc11364230912b694b7d9c23dcf1a8d9d613f02ee17a4feb047497795ed490d5ea4af60f13dd8c3a76e2346cc2fcc2469076cb9220c37067728d929e998625e7412c6318ecc629115eec88280ba3ec1b9e2fbe7c56af99362430ea9cf3f9ddd6a0109449a036c7d7b164cbda2de26ed45def9a2cc4f28e2a413dd4d0463304bf1a9fb2258a3bded29d48ac0e8f6767531674d02ab4246b91756798b92b01c738981d3a5dc64b32227d5fb576554cf5686329278ffcf49584db966530888c2142fccd5693468e58cd151b89e4d1d5c0e6241ed63af5831161bde0760d77e7f054806c16f7f8c715e228230013f6e3b26d7dd77de06d7962f65a3d61ab80c815a2019f45b7501dd1225b997d98e7fae4f351f0f1c58d79ce5a3ef269fa12871d3c9e31010ec2e7fb792cea153435bec36382da5018a46bd69b5209d51334f0271ece0e7aa74b3576c8a6a0a1412b59a293809570e3ef01587b7568fd201186927477547fa048c7f24618ad3a3db128d18cb4dbb54a5694e9512e765169bc8eaca0f34720165973fe58b1d998484466cf1bc902d99ac81e4033a23c61e9e9418f4438b8652f52f660de7d4607df2ac2a303fb14c2d7d7ce256f0c7464b34a35d2879202f1abc1c9a69aaaeb511d547b8f97dd8c56013f74816acd0041a24717046b1e98c905883b11a3a935f683c5757632f5a48c4fd59a658acd8c53d7ff7a8ce3fad4b24d1c99d6298711dea767b99d284ae071a6abe725ce66640c20287597d9c57fdb894ebf0a62dac6927a0ac422692c960312d10534a3f7a4a69fbdc469a1c092274820bcc47e2175e95490e2292c98cf4ccec30a52db7e60dacdb92b439ea5b6d7a1741b6aa4f9128cda11b96068876882601b97b3f6bbaf26981141fdbcd6aaeac928e2cf603462e214667ed53c17bed940dacada71e5437732cf6a4d10482d1bc560f1309e1f2b646c8cd55d2e73f634bbdfeb2c840e68e3fad908994313905d620d9ea6d6d4d74e9295b9092f762d2eb59e4ff3e7d77fbc9850593baa3790b2e13d1e461fb37a0fd109af6b1ae0efc37e29f4cd870b42ef21858cae0e4f3002539b08bce3ea8303a924f4e2ef0c2164af41b21db2bfed41673389fc99f6a073b73503b43be9f049ddf6e95bbcf89cb9d00d6020c74250d40a62fb19a2d5428efbdae6e75cc6f8b79d827032e6793d7294c282b21fbc8321691da6852bcbdd869deb942dae74fbf8c2c89d1f958e977c651a4376a996620c9f622ef6ff9a897644481711dfe1d1e45c56d5a47f9626c38f35fe7e216a0a7616058d9da44b91662575519281128785a28c71fecea5b8100ac7b86da5071d4b75f31f4ad482f3967c82d232443149a59422aa944d1fc9dbb4f6f7f0d54c26410b20425afd77964488299da8a5c06fc801fe1f7404ac102a7aff7d51e95b1464f81298f3a3d2451f15748ad34ace12221ae32890aa221107d922c077c8574f364edef67c75f2fecd2578e84cc89e100a96e2c321d9254da2b32bb76e823b2b9290f5fa547a54c1a1410b1e04cafd39d49980d82d0f46629264963f71b5e81ad0b7170f542cbb2c8a8f2d98ac3a309a2a8822bacfd00b3d84328411639413801c21376077e5146920cb2425a5506f28dd1763849822959e9c474a7cba09848770a220c0766512bd6fe34bf97d9f97535f07f92fb93573975f2930c82c10e1ec553fcecf0fa4857d598426325c66b893f85d2f5387d23c0453b21436c8eef458e2b6d620676af70a920396c65824372f3aa88af67e72bb50d71e52040e8ee838a2976c4b30bc31c8d68b6c301c7114c080f0ce70c667990600ff01a00ee1b3b10cfb227c6ca33a80741477c8974ba0a6e1cc07e826f2a221b46c756bcf24475ba95aef1d6d586ad82edfd172d622fd4afc9b406115346a183fcb36d8a60f0ced5a5a252ee67c3f48b52e6c52225b39ecc3f4abf9ff614e1fdbcc424b4b6b2772025d121e53c5707ff4b936384c4d855c5e120a921d7081cd3a2d2b44ece8a143323f137d266e65249a762e32d881013b24f31252a6f0a285523166fe193922b8bc7cad7f5a8512fa344bbe5d76a00bdaae1edced649e3b01e274c79cdbf2c9c4325a8b2552225bb3499bc92516aabfd9b4398b7ba0fd91bb99c80215e7c22fad463f36279bc90421764d6fe48520166eda2e086b1ad57542d29d43dad6238f603674101844485a308383d134e5402b58452fa6b6ca8b6d16356b0c679de371e2b2020f62e59d89e6a9dd091e1090940f5da77a64221a6895532e5c235c323661430f343304e77a892db455092374222f073e82b6d8098e4622d7efe41b7aab703aa1eb276ff15f1b4554b58e14e97c3208e42134f8791213321f70a5bb887917ed540d5e0d7131230f464c2f0fea2175dcb318408c6dd0f88830b59fe7c19bd1f23c03667e621c2d1580c9123949d44c41df377c4f65c2962db95d22f2892127fbe57e54d378085ccd06996dec4a1ba7dc96df2448e8c0f7fa9318832e9a31307bd5f902e0b2bb009fe5c17fb47e158eb4406ff05c0e61644ba6159cf5670d6bada9fd180f9f52cec7f9cfa0418eb787bd65c798ea814daee298ba9a22da990d0f1b4f0d21c295ff1acc31648cd513ac8a3cf98ed4a1ee6004fce118adf9c836a7c9f3aa2153e23e20c05e789470f3b751117ffa9b9eee7a882f5564ebd6262f2a29bbee59138a025b99a0862fbb208c3d428a121a11121487bbbf85b35b44258cf8028e8c635140f2049247c7b8d275b32db52293778971ef451ff33e1cd77cd002e1ffbdcbb58627f582d7fb21ad5ec69e3603c7cc82f8fa57cc147e61bbd7aa54fd8a42c0e4b75063f2a97077e6803a05789bc45446428af84b86558d8d4ee7ef130592ae0d5a6d29c6f00430d656248e28a0f282380e3105e3dab9d736d20b62bfc9756f0996af0a038c3d0142bb898a9762b74ba135438f95aa930b53e9e2498b1aba4634974aacbed044e2b44e469b96f00bb27d2ec81ce11827bb8259ecc0639458d8c364ae74e16738c367a364b0340d7f9696b5dc649a349c24d1292b612ac343f6ce72fe59633aa4162f6b5ed0e0857ac629bf6d67013e6aa19dd38f4ca46fb0a3f8bcf291d9d015476ba1cd065c24a9f5f8a56f4f27ee7afd191684e861b90a0d01b725444f4368604bdebb52b8ba094c11d75e16d99d51a791e700b2c6a5f427e8c74cafe6e0fefb93c3bbcb88f60454d317d6c109ad31e98ed3d44764850df6785689d7275a7077036a01ff309f7363a7968a23c9adb1a002c89227f5a6020faf4e8efb181d248e2478b142de0f2f3805364f0d2cf5165e293ea008de6adbbfa86e3bdcfc81f5aeb22f80c26dd3037a3d2f2b622fed6a75122f233f9d76a3c7b21c13899c95973d4a37995bb0c0a3b93c0e0ac411d6cf452f154d62c844add2655daeab04dbc353ac8e8ff2fa154591a5b10ab8f386153e243e87aede01470fc6448b9ecc8e137d4d270f88da79119e04fdb8d3a986cade7d136bc0b07e788b341965cdc8bc5f6db56b2704e3fc57f88889e77aa93a198e907508764112cd934f6c71fe9d09597233ce298ac4e1b7073b70820c34993c432020bcbd5a14595695c51b6909d065045e42008969f7fc9767679ca8ca667647f3d36de3ffee6b28e9ce8b0dfac5ce5effc967c82bbc738407a9a55a10967edf65cfccafcd21d013ef559a41b69c6cfdde634318a4a2bf220132668762520f82fd991f93c8008210d5ab58f153341d40cc36be4bdf90f9dbd5e422f764556dce0f55995924262fac4fec180e514ed71101b99fe4c47f8f4e07a8ec435597e6163d8fd71a0db45b7929f05dc8883768c98c6bd91e9eeab4c53e8e606cb7f44996d639e8731c3252d403b271993be24a3282e1c3a0ce30140e41107dff0264e03096e0cd52c826f3266b86e34bb54d5149faee46e9fcbbd9f753bcd4733d07aaf646c31bcefa7485afc32d015cdd4ae0a8e5ee2618e2030a52fb0415425783cd7f1ae32a61437304fe4f8dacebeb33c7c126ae26269d083a7c0047e465aa4c6c6046ff7b2e6e1fe45c4b54588c3a0e9112a3209b54a5d176a32ac616a3efe886fbd0b2aaa89eb29837788a0a8ee1d2c912edff9950333b6329a65fce219f04d520095f5eb3f2e2a0a82963df3a1589e39146c0977868535f34e39ff9450467ac004fa1c27d4ea03f37bd4385e8c54b469946bd5144ee102f99a854528db6f3ad7af9afaa779442b167e25218fc024e3194ce6f949934bfec8fe20e7783700a287947cf438be47b037a6befbb82dbc5b78cbe26d3c7670db898d8763ed7d1cb8b7587819d25eb44caa03bdf5ba1015084f81e554bf5480b1389ac7c01abe2a7285ebb50aed7965a8f3e6b60d2ddfeb7f182ea42e70d5e9a6c8c873608552605c157372f2567396a9b89e97246826e03bfa02e708a400f25271fcdce608d267651b2325fdef569ff270b6946301f7354ece43ed03c149f9b4a009f1433d5f5581abde65be2983e9e644df7326dc9e76e63d4e97128896f6666a852cfbdefd093694860126f649a38674f8a7de1b0e270658b6493ba67200ec2406a24cae83bd5ce443265511945702104440145a5c2d3347ab1b7fb8a088e1d864b04497d52701c40e968c9b9c0636c3c7bfb1cc8d1471c2933e6b4080b74ca0a2357331119c1dbf51b9640e07bc386e188363fc70e399418e0619f3c0f9f09082f9c4b13954be75b3107c968289adf163c1e153d8d2ddaab407ef07d08ab68d04ee95fd541dfe88863b794af3451c1d8136b81bea3774ebb467e1821231362ef46bde5838919fa05634a3e85b594d4ea4dce2a3ed7071e36a05978c1f9735123107e8888a341d407c868327f88a499998e4bff1f08bd1a416b0c8280a0791b6495dc97171553cea9d3659f96a953c3b2fcab5cf8fe62a50d69fb67153510dc9216a121d098686c353e0e3b5919b8453acb74b2acbb05e8bb43ccb58555a999c7641323e5aa97f33dd9106aed6da83747ea2b3e5e073501630180e1310d1f984fdb754120307e486bcbf56403a84aab874ea940f95c605a21b26dda2ff1aa5c2f35dbc4f5bbbcb48dc78bd8347ec006eb5a47994e61c7dfb6cbc6a0fd281429c224b4a18647b5a6217b840ad4f80b26d4c00a6b3b9bf96ca7ae367ffcbcecea994e524253892fecd63de4a30465edb39dcea25fe6d40e11185baf3f8791c81e81674e790de5ff65da874f310f1b89b2bd83e35c873f94c4be49af76901af43021d096a02525ca1551709174bbeb3c0304d6dc5e051bd4f3fd195ea5afbcd07390805d38826f4f14d86c48f1d1145d1b45d846c19525854daa067b23dbf463b9e54eff49a804d5c2ce172664f423b9f691f9d1dc0a530d6bddae029ada54d3508917a81a0ff2707e627571e47b6a746f23cdbc2623919509acff865c84116a8b16ab18917cce2aa48d870487209f12afa1317b8186"}, {0x68, 0x10f, 0x7f, "f0a4c5ebbe7e07c81e947f60619451a5be417c72ce63deda082f8c1648c2164a2cf31c85fc76ee883def17fabf43ce73d08d19518c1d47cd37dd20b2a36ff6e23a1ab5f532bc69431f2418682171df5b9f7d"}, {0x50, 0x115, 0x1, "bb845901a6e3b89d66281d2776de5faae1dccc448c5154439d73865cd089b297cf4d2b4ac2bc60e81e16da574758e35b4490bbc15faa9b0f89"}, {0x1010, 0xff, 0xffffffff, "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"}, {0x50, 0x10b, 0xc8, "6d9ce3d41499794059160002c08b980a2bb8303a3b7dfc7f346a0b8d042fb561b66973dd02fec3d1d0423258b2cc8719f0babb79ab2c0a970acc9f99"}], 0x2328}}, {{&(0x7f0000006f80)=@x25={0x9, @null=' \x00'}, 0x80, &(0x7f0000007440)=[{&(0x7f0000007000)="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", 0xfa}, {&(0x7f0000007100)="63c606ba0a474460b5880e7935123b609cf0888e9933fc751a7cca1f3d904c53e1269dce6da6b2bdfd79ebb5c4b31485788ed0004d78143de8e8fe6834a42a4f4c8c919db746f5d1d29e5b1225553206d4efd736", 0x54}, {&(0x7f0000007180)="6633dda527b09dd0c70e7a4e9f6e699677f61654591f2309397a59e0f5d2ee464cfa83e92c4a6d402eafe877a16f898679284b4c7458d9cc003120d3d2e93ceae496e0c21f3c9905ae779eba61847e79fd9fd2a3a36770101b67f23fdf52e94091f015e9248e04f6edfdcac1c3a3045cf73be6766941254dd9a82f65b4b34883948e549a126175fb96b00cf5a048c7eb2c4e676d2aeff134be52064cb249131f48c20470b68e47f39a5c5dbb05041048423e6f33f1bedac7c7e3ff6dfcca298e6dc323844ae6d2f50f75356ac9e7b033fe36a514d54af6c1878f5f221c03d8b23fc22d2e4c6b2e27f1", 0xe9}, {&(0x7f0000007280)="a2d090ab6df0b5701858ef5fa4fa799629a884e68edd5e8b1b56f2e5fbc3cf6fef494e2edbac341dbf2695e447493341dfbd36032edf0faa1651aa8fbdd10b2a0170834682c3b88a2c9d6b054ef1878eced2", 0x52}, {&(0x7f0000007300)="41cc37b6c14c7d7a6309df1ca45719e8d537021fd56e6180e5bab92a6d46bd085e384a8945f35e3294f4ee0880a7a37ff10b6bf7db38422ed3bce6", 0x3b}, {&(0x7f0000007340)="cd306af3e1806c4cf41dfdda04e92839862704945501aa8ebdb10a5b06aba79b1bd11a43605f1d2519df18392a76a2ccfa16380ec57e2b9f3d8ec641fe81ae6b125b1d8da8461de6dbcd5f1920d24c4333d94cb0a4d3b34b8a469e799f413649c2da17b2b2a4b56307a122ca967bfe9eece7a726fb7edec39c792d23e0d258501624c98758a432b943c36b0133a171ece49b17ebd8c12d925381ec4b5d092345c4495777535a4f72e8c66de702ae856ff401a7cac46fc9662f084ba10b777a84c12e6ac121bfd1c7ba52db832545", 0xce}], 0x6, &(0x7f00000074c0)=[{0x80, 0x116, 0x0, "3b40576b8dbd4dc57a5eb3bca53670fb3359289403beb41eb39169ad4f2cd98b75e9c0f7c7f39e02db38b6641b67f2174b5e560f1948f57cb7683a5a384c253ed1adee25121d1c08c6b4919baf3d344fc5bd8a292198baa4bde7c7cf2e4081d158187d60e25deb2c21"}, {0x20, 0x1, 0x80, "634e4194f7e96c6bbf83fc"}, {0xd8, 0x115, 0x9, "0549aee13b539419e7082276104185dda295ea215aa86e7ce08e1ee6afeb18dd8ac5d15df8d6e929e5e3a0935594fc79177ffa8126c2d8fdfecbff5aa7be9b36bf9323a1c9b7571444b95644faee6c4d9e5010fa77259004058637aeb62fd5172f9df058b87e9d43dc0725f2b1e3dbd979ae306bb5cb72accdc9fb55a73765b7354ff1ef1620d92b8aa69a696a81e23a8548a1ed7fa33c13165f98329dc3c9c9e3143d0cfee4b57659433d49b6568d08d5216a6a587aa519304e155589c1b36d2a87"}], 0x178}}, {{&(0x7f0000007640)=@hci={0x1f, 0x2, 0x2}, 0x80, &(0x7f0000007880)=[{&(0x7f00000076c0)="08ef2ad1e72af7f3ee472dbb2e60d475bf61982404624ff697190e8cc65060f8400f9970543cce41231563356088bd5e01adf70ca1f7db5683e86c94075fec96593fc18224f39054a2e4fac7afc93a93d3e51eac89351fbeb196082a0360243ad46bd750f6fcb1e33d4396fd5ac7e040e2ab4941ffd9a658636fe90a1e69404357984b8d7b315cada110020158b21c42bc0b02a4731f56dd2b54f5f2396985db5f709c2c1e4abb393c800c33f2f3d7b6ff131dbaad966d920f26e5c7a373dc627ee24ecf6ae3c0e1d53d8af730675a66a6ea9885539ad968873892494445589ff02df0de056cb478774cd99cdcbd", 0xee}, {&(0x7f00000077c0)="ea2ef817ee2f25a010791eda291cec707558df038cc06eb3bea12f366d2b564731842e8f9b49aa8458f57de707eb495e80586017a2652a2e4d7e2af3b867ac56961eb2b84ab885aa5e6f9b8286c78e0befd30a29be00a20a15831cd13baeb153e469e21ade984d3c6ab42807309a92ac5045000a746141f0051a29b73fb9ac3f76f2e3b4443d45da27af02bdddc3a50fb5c61919c1078c1a69b998eb59bcd4", 0x9f}], 0x2, &(0x7f00000078c0)=[{0x38, 0x114, 0x5, "b35b8bbe9c9a208a220b6ebab51ac74f32406f0544533dbf74deb8b253ff06b419b6af"}, {0x10, 0x116, 0x1f}, {0x78, 0x3a, 0x5, "d22c2e738e9bf2a88deb6bac71d0340ac9af80b7d583a1fcc4f6e3cc3516d1b6508f51f1fa09089188b8886db4294ebf2694ddd5606b0df14af517fa1cf2486e0ea3a83806431cb61167695e901c602d5e1273676d328ae6eca1c0b8c496a9cef9f233046f"}], 0xc0}}], 0x6, 0x4040) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) 04:31:22 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) fsconfig$FSCONFIG_SET_FLAG(r0, 0x6, &(0x7f00000000c0)='posixacl\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(r0, 0xc0a85322, &(0x7f0000000080)) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, 0x0, &(0x7f00000001c0)) socket(0x0, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000200)={0x0, 'veth1_macvtap\x00'}) 04:31:22 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="c041e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) fsconfig$FSCONFIG_SET_FLAG(r0, 0x6, &(0x7f00000000c0)='posixacl\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r0, 0xc10c5541, &(0x7f0000000280)={0x7fff, 0x8000}) r1 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_NAME_TYPE_CMD(r1, 0x8982, &(0x7f0000000080)={0x6, 'batadv_slave_1\x00', {0x7}, 0x1}) 04:31:22 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000240)={{0x2, 0x0, @private=0x5}, {0x6, @link_local}, 0x2, {0x2, 0x0, @dev}}) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000000)={0x0, 'ip6tnl0\x00', 0x1}, 0x18) mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r2, 0x0) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) fsconfig$FSCONFIG_SET_FLAG(r3, 0x6, &(0x7f00000000c0)='posixacl\x00', 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) r4 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0x1f1, 0xfffffffffffffffe) keyctl$update(0x2, r4, &(0x7f0000000000)="9f", 0x1) 04:31:22 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000000)='batadv\x00') sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)={0x14, r1, 0x301, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) bind$netlink(r0, &(0x7f0000000000)={0x10, 0x0, 0x25dfdbff, 0x2000}, 0xc) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000000000)='batadv\x00') sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r2, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)={0x14, r3, 0x301, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) sendmsg$sock(r2, &(0x7f0000000200)={&(0x7f0000000080)=@nl=@proc={0x10, 0x0, 0x25dfdbfe, 0x8}, 0x80, &(0x7f00000001c0)=[{&(0x7f0000000280)="0d2b13502e72e40c512471ae6c74ac58e5f373fdf48d74daee9e1d49d1c81e69e951c0791d9202fd5c29d0cb03bb9198637dabd45c9f49d3b3c84d1a85e4ce3c4b1685b278de67a14a0e33085cbc4d8c83090f7d59219b7f6302fe0a98624581d9bd02672e2714c8a6864dc76a23868e8c7e7973a0c5b00b777f42e6cc5b4f4766544acf1cc9822c8d5c28b776fe0507c47d6bd53b8bd5dd0fe2e01445477ed43a1e86a5a9627c06fb4dbfcde1bde8b05ba75965358a39a3e517bf384a46a6651c686cc05ef5dcdb76fc43861a0b4fb3bce77ce094e2d207de9bb2355b5615794bdd8997b650", 0xe6}, {&(0x7f0000000380)="bd953e0dd257078455744f807b48778529a955e925cca7008f4c3d98a9ecba0a517296d1002c465da8b7ab926053b2c4d6a691808fb15e525c8b2dd8710b8311a99d9e38e3293492b897e61eb60fb1fbfd01ad8f47f4a792b6abd9b824c80627951e0676b02f2d883191195906addf7b53492ad3af7266bee6e1e137b79c00974b2c1370f20202c004688e438ca75b8ee5629bf221906eb16cbeab3c0f60cf668653ae871bafbf9468f1fefd42eb70117be3d43a63b76d8d9928f5adb32a51d7798a0aeceb72b8cfa8e151decdbbc20839ca1e42ff30eff901e867c5c3c6509375bfdbac916f69909ff834647ab72b4e9a43db3b6f307683d5d7a3", 0xfb}], 0x2}, 0x4000) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) fsconfig$FSCONFIG_SET_FLAG(r4, 0x6, &(0x7f00000000c0)='posixacl\x00', 0x0, 0x0) recvmsg$can_bcm(r4, &(0x7f0000000ac0)={&(0x7f0000000480)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, 0x80, &(0x7f0000000880)=[{&(0x7f00000013c0)=""/4096, 0x1000}, {&(0x7f0000000bc0)=""/228, 0xe4}, {&(0x7f0000000540)=""/3, 0x3}, {&(0x7f00000006c0)=""/68, 0x44}, {&(0x7f0000000740)=""/130, 0x82}, {&(0x7f0000000800)=""/107, 0x6b}], 0x6, &(0x7f0000000b00)=""/157, 0x9d}, 0x2003) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') sendmsg$NL80211_CMD_NEW_INTERFACE(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x14, r7, 0x405, 0x0, 0x0, {0x7e}}, 0x14}}, 0x0) sendmsg$NL80211_CMD_START_SCHED_SCAN(r5, &(0x7f0000000a80)={&(0x7f00000009c0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000a40)={&(0x7f0000000a00)={0x1c, r7, 0x400, 0x70bd28, 0x25dfdbfd, {}, [@NL80211_ATTR_SCHED_SCAN_MULTI={0x4}, @NL80211_ATTR_SCHED_SCAN_MULTI={0x4}]}, 0x1c}, 0x1, 0x0, 0x0, 0x10}, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) [ 385.402206][T16060] kAFS: unparsable volume name [ 385.408666][T16059] encrypted_key: insufficient parameters specified [ 385.437276][T16060] kAFS: unparsable volume name 04:31:22 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) write$FUSE_NOTIFY_STORE(r0, &(0x7f0000000100)={0x2b, 0x4, 0x0, {0x0, 0x40, 0x3, 0x0, [0x0, 0x0, 0x0]}}, 0x2b) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) fsconfig$FSCONFIG_SET_FLAG(r1, 0x6, &(0x7f00000000c0)='posixacl\x00', 0x0, 0x0) mkdirat(r1, &(0x7f0000000000)='./file0\x00', 0x4b) [ 385.479178][T16058] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 04:31:22 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000240)={{0x2, 0x0, @private=0x5}, {0x6, @link_local}, 0x2, {0x2, 0x0, @dev}}) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000000)={0x0, 'ip6tnl0\x00', 0x1}, 0x18) mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r2, 0x0) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) fsconfig$FSCONFIG_SET_FLAG(r3, 0x6, &(0x7f00000000c0)='posixacl\x00', 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) r4 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0x1f1, 0xfffffffffffffffe) keyctl$update(0x2, r4, &(0x7f0000000000)="9f", 0x1) 04:31:22 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) lremovexattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)=@known='com.apple.system.Security\x00') 04:31:22 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0xfc, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5000, 0x8000, 0x0, 0xa, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="33e9e7f4"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) openat$pidfd(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self\x00', 0x10000, 0x0) stat(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$sock_void(r1, 0x1, 0x24, 0x0, 0x0) fsconfig$FSCONFIG_SET_FLAG(r1, 0x6, &(0x7f00000000c0)='posixacl\x00', 0x0, 0x0) getsockopt$inet6_int(r1, 0x29, 0x19, &(0x7f00000001c0), &(0x7f0000000200)=0x4) setfsuid(r0) 04:31:22 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) fsconfig$FSCONFIG_SET_FLAG(r0, 0x6, &(0x7f00000000c0)='posixacl\x00', 0x0, 0x0) ioctl$DRM_IOCTL_RM_MAP(r0, 0x4028641b, &(0x7f0000000280)={&(0x7f0000ffd000/0x1000)=nil, 0x9, 0x1, 0x36, &(0x7f0000ffc000/0x2000)=nil, 0xdd8}) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, 0x0, &(0x7f00000001c0)) r1 = socket(0x0, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000200)={0x0, 'veth1_macvtap\x00'}) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000000000)='batadv\x00') sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r2, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)={0x14, r3, 0x301, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) sendmsg$BATADV_CMD_SET_VLAN(r1, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x34, r3, 0x20, 0x70bd28, 0x25dfdbfc, {}, [@BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x1}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5, 0x2f, 0x1}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x6}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x1}]}, 0x34}, 0x1, 0x0, 0x0, 0x4000800}, 0x24004810) [ 385.724361][ T7954] FS-Cache: Duplicate cookie detected [ 385.729857][ T7954] FS-Cache: O-cookie c=0000000083cce752 [p=00000000a00f4ec0 fl=212 nc=0 na=0] [ 385.738949][ T7954] FS-Cache: O-cookie d=0000000000000000 n=0000000000000000 [ 385.746169][ T7954] FS-Cache: O-key=[2] 'e9e7' [ 385.750840][ T7954] FS-Cache: N-cookie c=0000000090745401 [p=00000000a00f4ec0 fl=2 nc=0 na=1] [ 385.759574][ T7954] FS-Cache: N-cookie d=0000000035364e0c n=00000000f2d0f04e [ 385.766816][ T7954] FS-Cache: N-key=[2] 'e9e7' 04:31:23 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) mount(&(0x7f00000003c0)=ANY=[@ANYBLOB="23e9e73a8a13a55125e733965380893f8eb63b60c658f1437f757d1736edf94d11d19d3460f9455cf740cbd9311fcf62f01101ae0f8e07996955654411b5b3e63e3f8810236cf430f3799f5f4dad3c52ac6f3a16fb69aa82339c1ccd901e2138a4cb0ae458cf5aff708df36091c7615fab7a2e85914bbdcbfe9b10d36c944f4b8703e3490de18211914e3ea0686191f9ff1e181214cd5fc72b008b4fe8d65017d19bf6cee2a415c519e571741ccdb93e5c43fcd14b202666a11d18813a983158c511a93c077e8591aa82f1741d438f5e61ecc115248823cf5dc6d1a8ad062f09ca7e5ff1f0b068bd7b2a9d71217d640000000000000000b0c8c62a83f823c7a7205bfc9229ed86588357319de6148c0d635fe2361d762c0257fc926a7469cda80b6b5cff832603ff9ce6387534dd09777110d64dcbecacf89ef1de1b176b032b73f5ce7caa37f105cd442a9dddd4a3f4d009c2733071"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) [ 385.788828][T16075] encrypted_key: insufficient parameters specified [ 385.851224][T16083] kAFS: unparsable volume name [ 385.887572][T16086] kAFS: unparsable volume name 04:31:23 executing program 3: r0 = memfd_create(&(0x7f0000001780)='\xd8\x05V\x15\xa5e\xf1\xb8\xf6\xa2\xba\x85\xb95\x03<\xb9;\xcd\x86\x8bD\xf9\xe9L\xe1Q\xfc\xe2\x97\xa0\xe8s\xb2\x11\xef\x1ac\xc9\x89\xc7\x0fv1\xa1:h\xf6\xf5\a\x8c\xf0Ay\x03\x97\xe77\xc1\xc8\xa6\xcb\xd2\xbe\xe9\xd2\xfb{u\xc3\xcd\xba\xa8G`9\xb5\x82\xa9p\xc8)\xe5$b\v\x8e\b\xf4\xf0\x11\xb4\xcb\"\xf4\xf3\xb4|\xdf\xa3\xdd\x9c\x8a\xf4D\xd3\xea\x11c}\x86H\xca=;i\x96\x183h\xba\x1a\x10', 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000380)='/dev/nullb0\x00', 0x0, 0x0) io_setup(0x1, &(0x7f00000004c0)=0x0) io_submit(r4, 0x8, &(0x7f00000000c0)=[&(0x7f0000000140)={0x3a004026, 0x2759, 0x10, 0x0, 0x0, r3, &(0x7f0000000000)="98", 0x3e80000000, 0x0, 0x0, 0x2}]) 04:31:23 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000240)={{0x2, 0x0, @private=0x5}, {0x6, @link_local}, 0x2, {0x2, 0x0, @dev}}) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000000)={0x0, 'ip6tnl0\x00', 0x1}, 0x18) mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r2, 0x0) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) fsconfig$FSCONFIG_SET_FLAG(r3, 0x6, &(0x7f00000000c0)='posixacl\x00', 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) r4 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0x1f1, 0xfffffffffffffffe) keyctl$update(0x2, r4, &(0x7f0000000000)="9f", 0x1) 04:31:23 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$batadv(&(0x7f0000000000)='batadv\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$batadv(&(0x7f0000000000)='batadv\x00') r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) fsconfig$FSCONFIG_SET_FLAG(r4, 0x6, &(0x7f00000000c0)='posixacl\x00', 0x0, 0x0) io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, &(0x7f00000001c0)=r4, 0x1) fsconfig$FSCONFIG_SET_FLAG(r3, 0x6, &(0x7f00000000c0)='posixacl\x00', 0x0, 0x0) setsockopt$RDS_CONG_MONITOR(r3, 0x114, 0x6, &(0x7f0000000080)=0x1, 0x4) ioctl$sock_x25_SIOCDELRT(r4, 0x890c, &(0x7f0000000300)={@remote={[], 0x0}, 0x6, 'dummy0\x00'}) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r1, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)={0x14, r2, 0x301, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=ANY=[@ANYBLOB="14000000", @ANYRES16=r2, @ANYBLOB="0103030000000a0000c5cd41c762dde5cc0f459303a2084abbeca702e63d4c354ed4daf9e1a962b0905eef5d728e3fd0b324f2aeb2ea0de1353bb9b53e45c8ff2eb9b8b5d78f8da78172622f41ec75b4a3b2fc2e0000"], 0x14}}, 0x801) mount(&(0x7f0000000240)=ANY=[@ANYRES16=r0], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x100802, 0x0) 04:31:23 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000041c1, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000000)='batadv\x00') sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)={0x14, r1, 0x301, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$batadv(&(0x7f0000000000)='batadv\x00') mount(&(0x7f0000000080)=ANY=[@ANYRES64=r1, @ANYRESHEX=r2], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) 04:31:23 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001340)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, 0x0, &(0x7f00000001c0)) r0 = socket(0x10, 0x80002, 0xc) sendmsg$NFNL_MSG_ACCT_GET_CTRZERO(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)=ANY=[@ANYBLOB="12dfc32f02070500"/20], 0x14}}, 0x0) r1 = socket(0x0, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000200)={0x0, 'veth1_macvtap\x00'}) accept4$phonet_pipe(r1, &(0x7f0000000000), &(0x7f0000000080)=0x10, 0x80800) 04:31:23 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) fsconfig$FSCONFIG_SET_FLAG(r0, 0x6, &(0x7f00000000c0)='posixacl\x00', 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) r2 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f0000000080)={r3, 0x82000000}, 0x10) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000000)={r3, 0x9}, &(0x7f0000000080)=0x8) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x17, &(0x7f00000000c0)={r4, 0x20, 0x56, "fb1de6956a9b3c84d27ee608eb07681b13efb40560e17aa8996054323095806816c228f2e2c262d966c12341fe87b805a7a160384e13b31f31f2e80c67e80a9adcab021887c33d6d66c03fea5c5df6901cf4e93d76a1"}, 0x5e) mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$batadv(&(0x7f0000000000)='batadv\x00') sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r5, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)={0x14, r6, 0x301, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) ioctl$FIONCLEX(r5, 0x5450) ioctl$USBDEVFS_SUBMITURB(0xffffffffffffffff, 0x8038550a, &(0x7f0000000480)=@urb_type_control={0x2, {0x4, 0x1}, 0x2, 0x0, &(0x7f00000004c0)={0x0, 0xc, 0x401, 0x7fff}, 0x8, 0x43e, 0x7ff, 0x0, 0x4, 0x81, &(0x7f00000005c0)="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"}) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="00b00b00"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='afs\x00', 0x0, 0x0) r7 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) fsconfig$FSCONFIG_SET_FLAG(r7, 0x6, &(0x7f00000000c0)='posixacl\x00', 0x0, 0x0) setsockopt$RDS_CANCEL_SENT_TO(r7, 0x114, 0x1, &(0x7f00000001c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_sctp_SCTP_AUTH_KEY(r2, 0x84, 0x17, &(0x7f0000000280)={r4, 0x38b, 0x88, "e929841cf6dddffb1bda14b4bf742174344b2d2472c1afb191b1a2430e3ca9dc9b99086434a0c8466711a9ccd3263a13ffa9a130bd6c458cc098e27f1b2bd52aafa8da22fd95fbedeb93aae5f5f30e5a85a4500c887b7a30d9a71b5802cb9edf369fc00a7328d2e538af4ecdc60f439df45b1588f79e1e8bf48f46458984e2697fd09154d27b7a1e"}, 0x90) [ 386.383309][T16103] afs: Bad value for 'source' [ 386.390629][T16102] kAFS: unparsable volume name [ 386.403418][T16106] encrypted_key: insufficient parameters specified [ 386.425387][T16103] afs: Bad value for 'source' 04:31:23 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000000)='batadv\x00') sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)={0x14, r1, 0x301, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000000000)='batadv\x00') sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r2, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)={0x2c, r3, 0x301, 0x70bd2c, 0x0, {0xa}, [@BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x1}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5, 0x37, 0x1}, @BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5, 0x29, 0x1}]}, 0x2c}}, 0x0) mount(&(0x7f0000000080)=ANY=[@ANYRES32=r2], &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='erofs\x00', 0x0, 0x0) r4 = openat2(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)={0x22000}, 0x18) r5 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r6, 0x0) mount$9p_rdma(&(0x7f0000000300)='127.0.0.1\x00', &(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='9p\x00', 0x8010, &(0x7f00000003c0)={'trans=rdma,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@sq={'sq', 0x3d, 0x1}}, {@common=@cache_mmap='cache=mmap'}, {@rq={'rq', 0x3d, 0x5}}, {@rq={'rq', 0x3d, 0xba8b}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '\\@-'}}, {@appraise_type='appraise_type=imasig'}, {@euid_eq={'euid', 0x3d, r6}}, {@permit_directio='permit_directio'}]}}) getsockname$l2tp6(r4, &(0x7f0000000280), &(0x7f00000002c0)=0x20) 04:31:23 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) fsconfig$FSCONFIG_SET_FLAG(r0, 0x6, &(0x7f00000000c0)='posixacl\x00', 0x0, 0x0) ioctl$EVIOCGREP(r0, 0x80084503, &(0x7f0000000080)=""/179) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) 04:31:23 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = gettid() ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x9, 0x0, 0x1, 0x0, 0x41c1, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffc}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, 0x0, &(0x7f00000001c0)) socket(0x0, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000200)={0x0, 'veth1_macvtap\x00'}) 04:31:23 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000240)={{0x2, 0x0, @private=0x5}, {0x6, @link_local}, 0x2, {0x2, 0x0, @dev}}) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000000)={0x0, 'ip6tnl0\x00', 0x1}, 0x18) mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r2, 0x0) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) fsconfig$FSCONFIG_SET_FLAG(r3, 0x6, &(0x7f00000000c0)='posixacl\x00', 0x0, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'trusted:', 'em1', 0x20, 0xdfc}, 0xfffffffffffffff5, 0xfffffffffffffffd) r4 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0x1f1, 0xfffffffffffffffe) keyctl$update(0x2, r4, &(0x7f0000000000)="9f", 0x1) 04:31:23 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000000)='batadv\x00') r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) fsconfig$FSCONFIG_SET_FLAG(r2, 0x6, &(0x7f00000000c0)='posixacl\x00', 0x0, 0x0) r3 = openat(r2, &(0x7f00000001c0)='./file0\x00', 0x80000, 0x88) getsockopt$inet_opts(r3, 0x0, 0x4, &(0x7f0000000200), &(0x7f0000000280)) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)={0x14, r1, 0x301, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) getsockopt$IP_SET_OP_VERSION(r0, 0x1, 0x53, &(0x7f0000000000), &(0x7f0000000080)=0x8) mkdir(&(0x7f00000000c0)='./file0\x00', 0x9) [ 386.699513][T16122] encrypted_key: insufficient parameters specified 04:31:24 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000240)={{0x2, 0x0, @private=0x5}, {0x6, @link_local}, 0x2, {0x2, 0x0, @dev}}) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000000)={0x0, 'ip6tnl0\x00', 0x1}, 0x18) mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r2, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'trusted:', 'em1', 0x20, 0xdfc}, 0xfffffffffffffff5, 0xfffffffffffffffd) r3 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0x1f1, 0xfffffffffffffffe) keyctl$update(0x2, r3, &(0x7f0000000000)="9f", 0x1) [ 386.991108][T16138] encrypted_key: insufficient parameters specified 04:31:24 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="57695aba"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) 04:31:24 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) r0 = getpid() tkill(r0, 0x2f) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xfffffffffffffffc}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) 04:31:24 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000000)='batadv\x00') sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)={0x14, r1, 0x301, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r0, 0x6612) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) 04:31:24 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$batadv(&(0x7f0000000000)='batadv\x00') r1 = syz_open_dev$mouse(&(0x7f00000000c0)='/dev/input/mouse#\x00', 0x7, 0x10000) getsockopt$bt_l2cap_L2CAP_CONNINFO(r1, 0x6, 0x2, &(0x7f0000000240), &(0x7f0000000280)=0x6) mount(&(0x7f0000000040)=ANY=[@ANYRES64=r0], &(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x40004, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, 0x0, &(0x7f00000001c0)) r2 = socket$inet_icmp(0x2, 0x2, 0x1) connect$inet(r2, &(0x7f0000000000)={0x2, 0x4e24, @remote}, 0x10) socket(0x0, 0x0, 0x0) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r5 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r5, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=@newqdisc={0x138, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_gred={{0x9, 0x1, 'gred\x00'}, {0x108, 0x2, [@TCA_GRED_STAB={0x104, 0x2, "e8652700f479df1c5c88dcdfc38f1eaefda68919704f152d6d96d18f73cb0f24d682a44a3fce667f08c07c113fc18f9b4ec0a810da3ac3c701a305b4d250029bd3ed2882faedc0a9e55a8ba57219747cf9a1f2aaa8b24871db98fbf5acbc7803c45b5f8c186acaa45a08aa7c91e5ffcf71a6512c148bfdefb6489a776f47eae4ca650c27c95af89ae778383ab2d07ea557a28da99597acd5cff23d4dc5131a3dc34e791abe1c4d501a6a90da03a1fc0fd22af26bd28c18b993596826966d514941969b7e6324fd0193ab6bec12ffb23b9da438a108392379c39b0e3327db205ce4f8d75be51e6b81b9fa8466a37bd41c5ffd8c1c4950becc763d7ee6c757aa8c"}]}}]}, 0x138}}, 0x0) sendmsg$ETHTOOL_MSG_PAUSE_GET(0xffffffffffffffff, &(0x7f0000000880)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000840)={&(0x7f00000008c0)={0x1f0, 0x0, 0x100, 0x70bd26, 0x25dfdbfe, {}, [@HEADER={0x48, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6_vti0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6gretap0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'lo\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_batadv\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0x38, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vxcan1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x88, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'caif0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bridge\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan1\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bond_slave_0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6_vti0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x54, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_virt_wifi\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'sit0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}]}, 0x1f0}, 0x1, 0x0, 0x0, 0xfba6a778b82533ea}, 0x8000) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000200)={0x0, 'veth1_macvtap\x00'}) 04:31:24 executing program 3: r0 = memfd_create(&(0x7f0000001780)='\xd8\x05V\x15\xa5e\xf1\xb8\xf6\xa2\xba\x85\xb95\x03<\xb9;\xcd\x86\x8bD\xf9\xe9L\xe1Q\xfc\xe2\x97\xa0\xe8s\xb2\x11\xef\x1ac\xc9\x89\xc7\x0fv1\xa1:h\xf6\xf5\a\x8c\xf0Ay\x03\x97\xe77\xc1\xc8\xa6\xcb\xd2\xbe\xe9\xd2\xfb{u\xc3\xcd\xba\xa8G`9\xb5\x82\xa9p\xc8)\xe5$b\v\x8e\b\xf4\xf0\x11\xb4\xcb\"\xf4\xf3\xb4|\xdf\xa3\xdd\x9c\x8a\xf4D\xd3\xea\x11c}\x86H\xca=;i\x96\x183h\xba\x1a\x10', 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000380)='/dev/nullb0\x00', 0x0, 0x0) io_setup(0x1, &(0x7f00000004c0)=0x0) io_submit(r4, 0x8, &(0x7f00000000c0)=[&(0x7f0000000140)={0x3a004027, 0x2759, 0x10, 0x0, 0x0, r3, &(0x7f0000000000)="98", 0x3e80000000, 0x0, 0x0, 0x2}]) 04:31:24 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000240)={{0x2, 0x0, @private=0x5}, {0x6, @link_local}, 0x2, {0x2, 0x0, @dev}}) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000000)={0x0, 'ip6tnl0\x00', 0x1}, 0x18) mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r2, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'trusted:', 'em1', 0x20, 0xdfc}, 0xfffffffffffffff5, 0xfffffffffffffffd) r3 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0x1f1, 0xfffffffffffffffe) keyctl$update(0x2, r3, &(0x7f0000000000)="9f", 0x1) 04:31:24 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000240)={{0x2, 0x0, @private=0x5}, {0x6, @link_local}, 0x2, {0x2, 0x0, @dev}}) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000000)={0x0, 'ip6tnl0\x00', 0x1}, 0x18) mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r2, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'trusted:', 'em1', 0x20, 0xdfc}, 0xfffffffffffffff5, 0xfffffffffffffffd) r3 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0x1f1, 0xfffffffffffffffe) keyctl$update(0x2, r3, &(0x7f0000000000)="9f", 0x1) [ 387.245327][T16149] kAFS: unparsable volume name 04:31:24 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) fsconfig$FSCONFIG_SET_FLAG(r0, 0x6, &(0x7f00000000c0)='posixacl\x00', 0x0, 0x0) ioctl$VHOST_SET_LOG_BASE(r0, 0x4008af04, &(0x7f0000000080)) r1 = getpid() tkill(r1, 0x2f) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x41c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="33f9e75b"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) 04:31:24 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) socket$isdn(0x22, 0x3, 0x11) 04:31:24 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) fsconfig$FSCONFIG_SET_FLAG(r0, 0x6, &(0x7f00000000c0)='posixacl\x00', 0x0, 0x0) statx(r0, &(0x7f0000000000)='./file0\x00', 0x6000, 0x40, &(0x7f0000000280)) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) [ 387.395036][T16157] encrypted_key: insufficient parameters specified 04:31:24 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, 0x0, &(0x7f00000001c0)) socket(0x0, 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) fsconfig$FSCONFIG_SET_FLAG(r0, 0x6, &(0x7f00000000c0)='posixacl\x00', 0x0, 0x0) ioctl$SNDCTL_TMR_SOURCE(r0, 0xc0045406) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000200)={0x0, 'veth1_macvtap\x00'}) 04:31:24 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000240)={{0x2, 0x0, @private=0x5}, {0x6, @link_local}, 0x2, {0x2, 0x0, @dev}}) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000000)={0x0, 'ip6tnl0\x00', 0x1}, 0x18) mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'trusted:', 'em1', 0x20, 0xdfc}, 0xfffffffffffffff5, 0xfffffffffffffffd) r2 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0x1f1, 0xfffffffffffffffe) keyctl$update(0x2, r2, &(0x7f0000000000)="9f", 0x1) 04:31:24 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) fsconfig$FSCONFIG_SET_FLAG(r0, 0x6, &(0x7f00000000c0)='posixacl\x00', 0x0, 0x0) write$cgroup_type(r0, &(0x7f0000000000)='threaded\x00', 0x9) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) 04:31:24 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) fsconfig$FSCONFIG_SET_FLAG(r0, 0x6, &(0x7f00000000c0)='posixacl\x00', 0x0, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000000)={&(0x7f0000ff9000/0x4000)=nil, 0x4000}, &(0x7f0000000080)=0x10) 04:31:24 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000000)='batadv\x00') sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)={0x14, r1, 0x301, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000000000)='batadv\x00') sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r2, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)={0x14, r3, 0x301, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) r4 = socket(0x11, 0x800000003, 0x0) bind(r4, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r4, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r6 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r6, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=@newqdisc={0x138, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r5, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_gred={{0x9, 0x1, 'gred\x00'}, {0x108, 0x2, [@TCA_GRED_STAB={0x104, 0x2, "e8652700f479df1c5c88dcdfc38f1eaefda68919704f152d6d96d18f73cb0f24d682a44a3fce667f08c07c113fc18f9b4ec0a810da3ac3c701a305b4d250029bd3ed2882faedc0a9e55a8ba57219747cf9a1f2aaa8b24871db98fbf5acbc7803c45b5f8c186acaa45a08aa7c91e5ffcf71a6512c148bfdefb6489a776f47eae4ca650c27c95af89ae778383ab2d07ea557a28da99597acd5cff23d4dc5131a3dc34e791abe1c4d501a6a90da03a1fc0fd22af26bd28c18b993596826966d514941969b7e6324fd0193ab6bec12ffb23b9da438a108392379c39b0e3327db205ce4f8d75be51e6b81b9fa8466a37bd41c5ffd8c1c4950becc763d7ee6c757aa8c"}]}}]}, 0x138}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r2, 0x8933, &(0x7f00000016c0)={'batadv0\x00', r5}) recvmsg(r0, &(0x7f0000001680)={&(0x7f00000001c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x80, &(0x7f0000001600)=[{&(0x7f0000000240)=""/4096, 0x1000}, {&(0x7f0000001240)=""/119, 0x77}, {&(0x7f00000012c0)=""/236, 0xec}, {&(0x7f00000013c0)=""/197, 0xc5}, {&(0x7f0000000000)=""/44, 0x2c}, {&(0x7f00000014c0)=""/167, 0xa7}, {&(0x7f0000001580)=""/32, 0x20}, {&(0x7f00000015c0)=""/36, 0x24}], 0x8}, 0x10000) mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) mount(&(0x7f0000000080)=ANY=[@ANYBLOB="23e9e73a33fbcf7e3421d4e628217c4cbf19686e00a2cc25ab29535275e9c68f397ab1c3013338be84be290380806e423a9c4eb6419eea621b0ed67035c0384478b16ef1e4b6b9d1260fb5237be578fd9686e08aecc9ec554cb26b99e95007c05516b0ef4f780cc6bfd9de22371980a5215607931861460b115db1c07b3d7687a85046834e6f4b614c86b0b104bff01b2edf1b594767ea4131dcb2905f1895437537b05ecbc75f1d32027d1eb4a1271ac6"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) timerfd_create(0x3, 0x0) [ 387.660936][T16170] encrypted_key: insufficient parameters specified 04:31:25 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000240)={{0x2, 0x0, @private=0x5}, {0x6, @link_local}, 0x2, {0x2, 0x0, @dev}}) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000000)={0x0, 'ip6tnl0\x00', 0x1}, 0x18) mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) socket(0x10, 0x2, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'trusted:', 'em1', 0x20, 0xdfc}, 0xfffffffffffffff5, 0xfffffffffffffffd) r1 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0x1f1, 0xfffffffffffffffe) keyctl$update(0x2, r1, &(0x7f0000000000)="9f", 0x1) [ 387.921801][T16187] encrypted_key: insufficient parameters specified 04:31:25 executing program 3: r0 = memfd_create(&(0x7f0000001780)='\xd8\x05V\x15\xa5e\xf1\xb8\xf6\xa2\xba\x85\xb95\x03<\xb9;\xcd\x86\x8bD\xf9\xe9L\xe1Q\xfc\xe2\x97\xa0\xe8s\xb2\x11\xef\x1ac\xc9\x89\xc7\x0fv1\xa1:h\xf6\xf5\a\x8c\xf0Ay\x03\x97\xe77\xc1\xc8\xa6\xcb\xd2\xbe\xe9\xd2\xfb{u\xc3\xcd\xba\xa8G`9\xb5\x82\xa9p\xc8)\xe5$b\v\x8e\b\xf4\xf0\x11\xb4\xcb\"\xf4\xf3\xb4|\xdf\xa3\xdd\x9c\x8a\xf4D\xd3\xea\x11c}\x86H\xca=;i\x96\x183h\xba\x1a\x10', 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000380)='/dev/nullb0\x00', 0x0, 0x0) io_setup(0x1, &(0x7f00000004c0)=0x0) io_submit(r4, 0x8, &(0x7f00000000c0)=[&(0x7f0000000140)={0x3a004028, 0x2759, 0x10, 0x0, 0x0, r3, &(0x7f0000000000)="98", 0x3e80000000, 0x0, 0x0, 0x2}]) 04:31:25 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) 04:31:25 executing program 2: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_DBG_G_REGISTER(r0, 0xc0385650, &(0x7f0000000080)={{0x4, @name="7b693008c7b9ae6c81de506ce49916961755e8970b9b5786b3aeeaabb51e41d3"}, 0x8, 0x6, 0xef6}) mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, 0x0, &(0x7f00000001c0)) socket(0x0, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000200)={0x0, 'veth1_macvtap\x00'}) 04:31:25 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000000)='batadv\x00') sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)={0x14, r1, 0x301, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) r2 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/capi/capi20ncci\x00', 0x200, 0x0) ioctl$KVM_IRQ_LINE(r2, 0x4008ae61, &(0x7f0000000200)={0x4, 0x3f}) mount(&(0x7f00000000c0)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='gfs2meta\x00', 0x122002, 0x0) setxattr$security_evm(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f0000000280)=@v2={0x3, 0x0, 0xd, 0x1, 0xe6, "9ba80f9bc54ad8b6f87631d8cfdb92f5c279f09bd26634ef4efcef45d76b3a1ab09f4d45176635da094e3302827416c700ce3c84f7b52be16f57a0a678ede296f995b25a20a8ef39af232587475be54efd75e02ab19a7428979c569c29d6daf76e32920fd4a12d61e142eadd1ca3b5ca827d2e466aab9a177b454cd25b6c5e045177347a8967d995bdc57e1d663e01306675ab3429e57b0c42fe0804bd29ff4a048e7fee2a0944ff6aeafc4455a442c6b0ee44e5cc3179fadf307b7e6a4d6ccb0d775803753df5c74469a751718540f0b0508617990cb175dcd81e1312b95cbb0daae2e018d0"}, 0xef, 0x2) 04:31:25 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000240)={{0x2, 0x0, @private=0x5}, {0x6, @link_local}, 0x2, {0x2, 0x0, @dev}}) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000000)={0x0, 'ip6tnl0\x00', 0x1}, 0x18) mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'trusted:', 'em1', 0x20, 0xdfc}, 0xfffffffffffffff5, 0xfffffffffffffffd) r1 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0x1f1, 0xfffffffffffffffe) keyctl$update(0x2, r1, &(0x7f0000000000)="9f", 0x1) 04:31:25 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) mount$9p_tcp(&(0x7f0000000000)='127.0.0.1\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x4c00, &(0x7f0000000280)={'trans=tcp,', {'port', 0x3d, 0x4e23}, 0x2c, {[{@access_uid={'access', 0x3d, 0xee01}}, {@version_9p2000='version=9p2000'}, {@access_uid={'access'}}, {@afid={'afid', 0x3d, 0x3}}, {@dfltgid={'dfltgid'}}, {@debug={'debug', 0x3d, 0x1f}}, {@cache_none='cache=none'}, {@cachetag={'cachetag', 0x3d, 'transmute\x00\x00\x00\x00\x00\x00\x00'}}], [{@subj_user={'subj_user', 0x3d, '-)%.\':*%#}'}}, {@audit='audit'}, {@fscontext={'fscontext', 0x3d, 'user_u'}}]}}) [ 388.288405][ T17] FS-Cache: Duplicate cookie detected [ 388.293956][ T17] FS-Cache: O-cookie c=00000000914aa10e [p=00000000a00f4ec0 fl=222 nc=0 na=1] [ 388.303011][ T17] FS-Cache: O-cookie d=0000000035364e0c n=000000003b05a731 [ 388.310258][ T17] FS-Cache: O-key=[2] 'e9e7' [ 388.314867][ T17] FS-Cache: N-cookie c=00000000a63f5055 [p=00000000a00f4ec0 fl=2 nc=0 na=1] [ 388.323582][ T17] FS-Cache: N-cookie d=0000000035364e0c n=00000000919f9ea9 [ 388.330864][ T17] FS-Cache: N-key=[2] 'e9e7' [ 388.343880][ T7967] FS-Cache: Duplicate cookie detected [ 388.349374][T16208] 9pnet: p9_fd_create_tcp (16208): problem connecting socket to 127.0.0.1 [ 388.354997][T16208] 9pnet: p9_fd_create_tcp (16208): problem connecting socket to 127.0.0.1 [ 388.358080][ T7967] FS-Cache: O-cookie c=00000000914aa10e [p=00000000a00f4ec0 fl=222 nc=0 na=1] [ 388.358091][ T7967] FS-Cache: O-cookie d=0000000035364e0c n=000000003b05a731 [ 388.358097][ T7967] FS-Cache: O-key=[2] 'e9e7' 04:31:25 executing program 1: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) setsockopt$inet6_tcp_TLS_TX(r0, 0x6, 0x1, &(0x7f0000000080)=@ccm_128={{0x304}, "09a42c37f8cbf200", "0753b005d8fa0b8a9b5887eb740e91fb", "14aef136", "cdc3eeb7d78e35cc"}, 0x28) syz_genetlink_get_family_id$fou(&(0x7f00000000c0)='fou\x00') mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) [ 388.358119][ T7967] FS-Cache: N-cookie c=00000000d55100ee [p=00000000a00f4ec0 fl=2 nc=0 na=1] [ 388.358128][ T7967] FS-Cache: N-cookie d=0000000035364e0c n=00000000a354c3cd [ 388.358135][ T7967] FS-Cache: N-key=[2] 'e9e7' [ 388.411782][T16204] encrypted_key: insufficient parameters specified 04:31:25 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000240)={{0x2, 0x0, @private=0x5}, {0x6, @link_local}, 0x2, {0x2, 0x0, @dev}}) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000000)={0x0, 'ip6tnl0\x00', 0x1}, 0x18) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'trusted:', 'em1', 0x20, 0xdfc}, 0xfffffffffffffff5, 0xfffffffffffffffd) r1 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0x1f1, 0xfffffffffffffffe) keyctl$update(0x2, r1, &(0x7f0000000000)="9f", 0x1) 04:31:25 executing program 4: ioctl$SNDRV_SEQ_IOCTL_PVERSION(0xffffffffffffffff, 0x80045300, &(0x7f00000000c0)) mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) mount(&(0x7f0000000340)=ANY=[@ANYBLOB="a8c60aaaa5ce7fb939cfd6f0ff639cfe23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000000)='batadv\x00') sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)={0x14, r1, 0x301, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={0x44, r3, 0x1, 0x0, 0x0, {0xc}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'lo\x00'}]}, @ETHTOOL_A_LINKMODES_OURS={0x18, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x14, 0x3, 0x0, 0x1, [{0x10, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x1}]}]}]}]}, 0x44}}, 0x0) sendmsg$ETHTOOL_MSG_EEE_SET(r0, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000001c0)={&(0x7f0000000280)={0x9c, r3, 0x100, 0x70bd2c, 0x25dfdbfe, {}, [@ETHTOOL_A_EEE_TX_LPI_TIMER={0x8, 0x7, 0xc9}, @ETHTOOL_A_EEE_MODES_OURS={0x80, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x4}, @ETHTOOL_A_BITSET_MASK={0x75, 0x5, "71fe0a4eb3ce5e27b9450500381ee3fa2d6a569ed123760e868238e2f5ed1ff3a44f46be2413c8902e5db61fa79de0cf6de26fbf1a3ec8cd23d477b6ba00a633b0eb5ed399c80340e36084804bc8ff4cd241af7b9bc0fae4f5447b7dedc5e9a5fef3b68eccc3f84a1a8e0ded9ec682e6d6"}]}]}, 0x9c}, 0x1, 0x0, 0x0, 0x40840}, 0x800) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/asound/seq/clients\x00', 0x0, 0x0) write$P9_RREADLINK(r4, &(0x7f0000000080)={0x10, 0x17, 0x1, {0x7, './file0'}}, 0x10) 04:31:25 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$batadv(&(0x7f0000000000)='batadv\x00') r1 = syz_open_dev$mouse(&(0x7f00000000c0)='/dev/input/mouse#\x00', 0x7, 0x10000) getsockopt$bt_l2cap_L2CAP_CONNINFO(r1, 0x6, 0x2, &(0x7f0000000240), &(0x7f0000000280)=0x6) mount(&(0x7f0000000040)=ANY=[@ANYRES64=r0], &(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x40004, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, 0x0, &(0x7f00000001c0)) r2 = socket$inet_icmp(0x2, 0x2, 0x1) connect$inet(r2, &(0x7f0000000000)={0x2, 0x4e24, @remote}, 0x10) socket(0x0, 0x0, 0x0) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r5 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r5, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=@newqdisc={0x138, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_gred={{0x9, 0x1, 'gred\x00'}, {0x108, 0x2, [@TCA_GRED_STAB={0x104, 0x2, "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"}]}}]}, 0x138}}, 0x0) sendmsg$ETHTOOL_MSG_PAUSE_GET(0xffffffffffffffff, &(0x7f0000000880)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000840)={&(0x7f00000008c0)={0x1f0, 0x0, 0x100, 0x70bd26, 0x25dfdbfe, {}, [@HEADER={0x48, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6_vti0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6gretap0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'lo\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_batadv\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0x38, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vxcan1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x88, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'caif0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bridge\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan1\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bond_slave_0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6_vti0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x54, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_virt_wifi\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'sit0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}]}, 0x1f0}, 0x1, 0x0, 0x0, 0xfba6a778b82533ea}, 0x8000) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000200)={0x0, 'veth1_macvtap\x00'}) [ 388.642202][T16220] encrypted_key: insufficient parameters specified [ 388.670975][T16222] kAFS: unparsable volume name 04:31:26 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000240)={{0x2, 0x0, @private=0x5}, {0x6, @link_local}, 0x2, {0x2, 0x0, @dev}}) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'trusted:', 'em1', 0x20, 0xdfc}, 0xfffffffffffffff5, 0xfffffffffffffffd) r1 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0x1f1, 0xfffffffffffffffe) keyctl$update(0x2, r1, &(0x7f0000000000)="9f", 0x1) [ 388.710467][T16222] lo: mixed HW and IP checksum settings. 04:31:26 executing program 0: r0 = perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) fsconfig$FSCONFIG_SET_FLAG(r1, 0x6, &(0x7f00000000c0)='posixacl\x00', 0x0, 0x0) r2 = syz_open_dev$swradio(&(0x7f0000000140)='/dev/swradio#\x00', 0x1, 0x2) ioctl$KVM_S390_INTERRUPT_CPU(r1, 0x4010ae94, &(0x7f00000000c0)={0x9, 0x80, 0x4}) ioctl$VIDIOC_OVERLAY(r2, 0x4004560e, &(0x7f0000000180)=0x7ff) socket$rds(0x15, 0x5, 0x0) ioctl$RTC_VL_READ(r1, 0x80047013, &(0x7f0000000100)) mount(&(0x7f0000000080)=ANY=[@ANYRES32=r0], &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x800000, 0x0) [ 388.764959][T16225] kAFS: unparsable volume name [ 388.795392][T16225] lo: mixed HW and IP checksum settings. [ 388.914553][T16231] encrypted_key: insufficient parameters specified 04:31:26 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000000)='batadv\x00') sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)={0x14, r1, 0x301, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) mount(&(0x7f0000000040)=ANY=[@ANYRES64=r0], &(0x7f0000000180)='./file0\x00', &(0x7f0000000000)='cpuset\x00', 0x0, 0x0) 04:31:26 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x1, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, 0x0, &(0x7f00000001c0)) socket(0x0, 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) fsconfig$FSCONFIG_SET_FLAG(r0, 0x6, &(0x7f00000000c0)='posixacl\x00', 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_SYNC_PTR(r0, 0xc0884123, &(0x7f0000000080)={0x4, "c13750a5142e925a93c19a8b2dfe0a900c8bbd18e219a72ccd1e0418e60012f30df28d2571fffde46b0d34ea29d4a7ca62e0110c4183c08fc634beebb059e7d4", {0x5}}) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000200)={0x0, 'veth1_macvtap\x00'}) 04:31:26 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000240)={{0x2, 0x0, @private=0x5}, {0x6, @link_local}, 0x2, {0x2, 0x0, @dev}}) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000000)={0x0, 'ip6tnl0\x00', 0x1}, 0x18) mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r2, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'trusted:', 'em1', 0x20, 0xdfc}, 0xfffffffffffffff5, 0xfffffffffffffffd) r3 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0x1f1, 0xfffffffffffffffe) keyctl$update(0x2, r3, &(0x7f0000000000)="9f", 0x1) 04:31:26 executing program 5: socket$inet_udp(0x2, 0x2, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'trusted:', 'em1', 0x20, 0xdfc}, 0xfffffffffffffff5, 0xfffffffffffffffd) r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0x1f1, 0xfffffffffffffffe) keyctl$update(0x2, r0, &(0x7f0000000000)="9f", 0x1) 04:31:26 executing program 3: r0 = memfd_create(&(0x7f0000001780)='\xd8\x05V\x15\xa5e\xf1\xb8\xf6\xa2\xba\x85\xb95\x03<\xb9;\xcd\x86\x8bD\xf9\xe9L\xe1Q\xfc\xe2\x97\xa0\xe8s\xb2\x11\xef\x1ac\xc9\x89\xc7\x0fv1\xa1:h\xf6\xf5\a\x8c\xf0Ay\x03\x97\xe77\xc1\xc8\xa6\xcb\xd2\xbe\xe9\xd2\xfb{u\xc3\xcd\xba\xa8G`9\xb5\x82\xa9p\xc8)\xe5$b\v\x8e\b\xf4\xf0\x11\xb4\xcb\"\xf4\xf3\xb4|\xdf\xa3\xdd\x9c\x8a\xf4D\xd3\xea\x11c}\x86H\xca=;i\x96\x183h\xba\x1a\x10', 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000380)='/dev/nullb0\x00', 0x0, 0x0) io_setup(0x1, &(0x7f00000004c0)=0x0) io_submit(r4, 0x8, &(0x7f00000000c0)=[&(0x7f0000000140)={0x3a004029, 0x2759, 0x10, 0x0, 0x0, r3, &(0x7f0000000000)="98", 0x3e80000000, 0x0, 0x0, 0x2}]) 04:31:26 executing program 0: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) fsconfig$FSCONFIG_SET_FLAG(r0, 0x6, &(0x7f00000000c0)='posixacl\x00', 0x0, 0x0) open$dir(&(0x7f0000000100)='./file0\x00', 0x90400, 0x88) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) fsconfig$FSCONFIG_SET_FLAG(r1, 0x6, &(0x7f00000000c0)='posixacl\x00', 0x0, 0x0) mkdirat(r1, &(0x7f0000000080)='./file0\x00', 0x184) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f00000003c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) r2 = accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) getpeername(r2, &(0x7f00000001c0)=@nfc_llcp, &(0x7f0000000280)=0x80) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) fsconfig$FSCONFIG_SET_FLAG(r3, 0x6, &(0x7f00000000c0)='posixacl\x00', 0x0, 0x0) ioctl$VIDIOC_S_MODULATOR(r3, 0x40445637, &(0x7f0000000140)={0x2, "cdcaa141d6f4080d5aea47a81fd8d3a6dd0084b03ceeea6316a5eb1a2a5c32ec", 0x200, 0x10001, 0x2c5b, 0x8, 0x1}) [ 389.224753][T16245] encrypted_key: insufficient parameters specified [ 389.238319][T16243] new mount options do not match the existing superblock, will be ignored [ 389.259020][T16242] encrypted_key: insufficient parameters specified 04:31:26 executing program 5: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'trusted:', 'em1', 0x20, 0xdfc}, 0xfffffffffffffff5, 0xfffffffffffffffd) r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0x1f1, 0xfffffffffffffffe) keyctl$update(0x2, r0, &(0x7f0000000000)="9f", 0x1) 04:31:26 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000240)={{0x2, 0x0, @private=0x5}, {0x6, @link_local}, 0x2, {0x2, 0x0, @dev}}) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000000)={0x0, 'ip6tnl0\x00', 0x1}, 0x18) mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r2, 0x0) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) fsconfig$FSCONFIG_SET_FLAG(r3, 0x6, &(0x7f00000000c0)='posixacl\x00', 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) r4 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0x1f1, 0xfffffffffffffffe) keyctl$update(0x2, r4, &(0x7f0000000000)="9f", 0x1) 04:31:26 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) perf_event_open(&(0x7f0000001340)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000000)='afs\x00', 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, 0x0, &(0x7f00000001c0)) socket(0x0, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000200)={0x0, 'veth1_macvtap\x00'}) 04:31:26 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)=ANY=[@ANYBLOB='\x00\t\x00\x00'], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) [ 389.342912][T16254] new mount options do not match the existing superblock, will be ignored 04:31:26 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="40e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000000)='batadv\x00') sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)={0x14, r1, 0x301, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0205647, &(0x7f0000000080)={0xfffffff, 0x3f, 0x400, r0, 0x0, &(0x7f0000000000)={0x9e0903, 0x80000001, [], @value64=0xfff}}) sendmmsg$alg(r2, &(0x7f00000009c0)=[{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="a7c28fec3445514c4cbe4f1aefd1951548bd726c1f7f18a66144f75bb431dcf74065545f1ec097a6dea65adaf94008bd079033c311144aa1a20c7e032bf1f11f90d2f9938fb2b94bdfecb5897f08ca04a9907dc1ded6632dd72956c01e", 0x5d}], 0x1, &(0x7f0000000200)=[@assoc={0x18, 0x117, 0x4, 0x8}], 0x18, 0x14}, {0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000280)="880d5485ddefe34c25a2b3fb4b96481a7e70c33caa9aecb180acbdd1e942d5fa0667ce617083c826f80fd2460edd0efb333489bb030b76eebe5fa622b2affb778fec78e77e7bba936df6d27bc5b91b58f783653eea73ced1ed574b36a156cefd47a7dd35e060748b6492467e3123d489a605864d", 0x74}, {&(0x7f0000000300)="85a61c756d7829b3d591d4bc5464", 0xe}, {&(0x7f0000000340)="252963d18c9d96f36c571c912772f65383c4dfb3d254109d6313c5ff157a91afc2be362f233dd49d310f78", 0x2b}, {&(0x7f0000000380)="dac1952fc6844ff6c07877a33dcbe89728af206ee409ac3ba75258c3afb899399d52335ea6514d8e4f88b053454b671e8bacaf89be3b05b32bee325b043d7ea068afb88585f6184c2eb291", 0x4b}, {&(0x7f0000000400)}, {&(0x7f0000000440)="feb4cb58f9285fcbd0155448f04540b16d4cf3812400399e591e7b7e9f582ee695b63dd020a560e94290d7ca7d9e4eb763aa83eca4202a1085f44bf6177cf7bd830b2bc512808f34ed42b72a21dcc779ddea6230610c1008a269a5ad9f2867eab85331412d9eb9ddd97999b5757eb2e377997bb48dc659974d3078e8929f01efe6929560f5619a3b9ac37b5f5e0e82fc", 0x90}, {&(0x7f0000000500)="d79ea940d3ee7f4e54c29a46e4c9d5b0f2136c1c436938d294f2074267293e0b3df88391da0ba84e982aa1757e26531f3a0dedffdee6b9d4df63285c8ece9c9e35e160d2ec5f8f17f2969888f2362d3fe404f90f1e3cbcf6a49298256ea59b801ed484c225980eb274aa9ec297c363e9617d377da18dd151f6a983c1af6bf7f4d41600b8938ee2299fea9251beb5983de5a0b5d33231e8d034ca7e", 0x9b}], 0x7, &(0x7f0000000640)=[@assoc={0x18, 0x117, 0x4, 0x2966856}, @op={0x18, 0x117, 0x3, 0x1}, @op={0x18}, @op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0xd1}, @iv={0x68, 0x117, 0x2, 0x4e, "47e9351f03bdfb973c0711c0139e809e5e7cf8552b87132de1573915196a6510022a7073b3e34047fb26f846d8db876bc1c36ad455ca81b934eb9e15efad4639b812a55c12cb873b63ded9c9166a"}, @assoc={0x18, 0x117, 0x4, 0x4}, @op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0xd92e}, @assoc={0x18, 0x117, 0x4, 0x2d7c0000}], 0x140, 0x4}, {0x0, 0x0, &(0x7f0000000900)=[{&(0x7f0000000780)="112e9b9262b0fb2443c98db337a0d56fbb762844300688b3f8006fc17ff7c658b7aca81a098edc75fa0df3b75809ad825081f6ba0c29d53163d1b04111585f57a7864e31f679842df2296eb174f8f618310e1ddf40ac70cfdadcfe8051a80beb5291e138232fa4f2133e8e322f055be3852e1c9be809f193f9d3fa0c88f5240f07", 0x81}, {&(0x7f0000000840)="98bc775efc089d543800c6cf84854f046aa243785e7848704901f0191244878147c22e5f9201c35eb596ae4a0292cc3a851faad0a73630a88a5ab543bb0bc59975b0aa835f7310e2ed7b5a491677d1b0e35b99fbd90b4b38a1da4a5582b15c40a553a600cd706923ac616703701f84b5a61f216a03624d854d47149324c78a862735f36647701250c8b3a54af9f9c13a9351968dbaa3bfee4d723b98eb1bd536c62d4ebe4ecf9f190253e545a60b6e4360ee58b126ec215fd4", 0xb9}], 0x2, &(0x7f0000000940)=[@assoc={0x18}, @iv={0x48, 0x117, 0x2, 0x33, "d2ec6307a540b0f0a674a0d84c2d375cb052dfafec1171453cce7b0d6e0fbd5e533e079a0245287ac11565d231f84287424e41"}], 0x60, 0x800}], 0x3, 0x48001) [ 389.550118][T16263] encrypted_key: insufficient parameters specified [ 389.555808][T16259] afs: Bad value for 'source' [ 389.580428][T16264] afs: Bad value for 'source' [ 389.600802][T16260] encrypted_key: insufficient parameters specified 04:31:26 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="0be90300"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) 04:31:26 executing program 5: keyctl$instantiate(0xc, 0x0, 0x0, 0x0, 0xfffffffffffffffd) r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0x1f1, 0xfffffffffffffffe) keyctl$update(0x2, r0, &(0x7f0000000000)="9f", 0x1) [ 389.650808][T16266] kAFS: unparsable volume name 04:31:26 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000000)='batadv\x00') sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)={0x14, r1, 0x301, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) bind$netlink(r0, &(0x7f0000000000)={0x10, 0x0, 0x25dfdbff, 0x2000}, 0xc) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000000000)='batadv\x00') sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r2, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)={0x14, r3, 0x301, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) sendmsg$sock(r2, &(0x7f0000000200)={&(0x7f0000000080)=@nl=@proc={0x10, 0x0, 0x25dfdbfe, 0x8}, 0x80, &(0x7f00000001c0)=[{&(0x7f0000000280)="0d2b13502e72e40c512471ae6c74ac58e5f373fdf48d74daee9e1d49d1c81e69e951c0791d9202fd5c29d0cb03bb9198637dabd45c9f49d3b3c84d1a85e4ce3c4b1685b278de67a14a0e33085cbc4d8c83090f7d59219b7f6302fe0a98624581d9bd02672e2714c8a6864dc76a23868e8c7e7973a0c5b00b777f42e6cc5b4f4766544acf1cc9822c8d5c28b776fe0507c47d6bd53b8bd5dd0fe2e01445477ed43a1e86a5a9627c06fb4dbfcde1bde8b05ba75965358a39a3e517bf384a46a6651c686cc05ef5dcdb76fc43861a0b4fb3bce77ce094e2d207de9bb2355b5615794bdd8997b650", 0xe6}, {&(0x7f0000000380)="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", 0xfb}], 0x2}, 0x4000) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) fsconfig$FSCONFIG_SET_FLAG(r4, 0x6, &(0x7f00000000c0)='posixacl\x00', 0x0, 0x0) recvmsg$can_bcm(r4, &(0x7f0000000ac0)={&(0x7f0000000480)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, 0x80, &(0x7f0000000880)=[{&(0x7f00000013c0)=""/4096, 0x1000}, {&(0x7f0000000bc0)=""/228, 0xe4}, {&(0x7f0000000540)=""/3, 0x3}, {&(0x7f00000006c0)=""/68, 0x44}, {&(0x7f0000000740)=""/130, 0x82}, {&(0x7f0000000800)=""/107, 0x6b}], 0x6, &(0x7f0000000b00)=""/157, 0x9d}, 0x2003) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') sendmsg$NL80211_CMD_NEW_INTERFACE(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x14, r7, 0x405, 0x0, 0x0, {0x7e}}, 0x14}}, 0x0) sendmsg$NL80211_CMD_START_SCHED_SCAN(r5, &(0x7f0000000a80)={&(0x7f00000009c0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000a40)={&(0x7f0000000a00)={0x1c, r7, 0x400, 0x70bd28, 0x25dfdbfd, {}, [@NL80211_ATTR_SCHED_SCAN_MULTI={0x4}, @NL80211_ATTR_SCHED_SCAN_MULTI={0x4}]}, 0x1c}, 0x1, 0x0, 0x0, 0x10}, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) [ 389.692473][T16266] kAFS: unparsable volume name 04:31:27 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f00000002c0)=ANY=[@ANYBLOB="e73a0000b60cd83e2b79aa8a37fb0c47bdf1202be038f95d96c3c917459a9baf8e9108dcb50334ff5822c7d0e360ffd04d4e3040000000d0c6caf97c74fa4a282ee33cf9fc8ae49addab98511a88147fd2c848c46a47fbf8d16455dcc6634b57d3d381753d9d085bbe6d"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, 0x0, &(0x7f00000001c0)) socket(0x0, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x60c02, 0x8) sendmsg$RDMA_NLDEV_CMD_RES_QP_GET(r0, &(0x7f0000000280)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x38, 0x140a, 0x400, 0x70bd28, 0x25dfdbff, "", [@RDMA_NLDEV_ATTR_RES_LQPN={0x8, 0x15, 0x2}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x2}, @RDMA_NLDEV_ATTR_RES_LQPN={0x8, 0x15, 0x4}, @RDMA_NLDEV_ATTR_PORT_INDEX={0x8, 0x3, 0x3}, @RDMA_NLDEV_ATTR_RES_LQPN={0x8, 0x15, 0x3}]}, 0x38}}, 0x40) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000200)={0x0, 'veth1_macvtap\x00'}) 04:31:27 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) mount(&(0x7f00000001c0)=ANY=[@ANYBLOB="32080000c01694371174783fca8f715b00f04a33f2d22b79944365b38bb2159066fddc8ba8a9d3b2c95cfceb8825e642bd269569097c309eea9cd5003ee04d1eb920ab57b1c83ac8142c79ba0b433759dc675435af49b9e08224685f9d40d1ffc52a8e"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0xa0001, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) fsconfig$FSCONFIG_SET_FLAG(r0, 0x6, &(0x7f00000000c0)='posixacl\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000080)='./file0\x00', 0x100) r1 = syz_open_dev$ttys(0xc, 0x2, 0x1) socket$nl_generic(0x10, 0x3, 0x10) ioctl$TIOCL_SETSEL(r1, 0x541c, &(0x7f0000000000)={0x2, {0x2, 0x15a, 0x7ff, 0x8, 0x8}}) [ 389.821223][T16275] encrypted_key: insufficient parameters specified [ 389.867970][T16276] kAFS: unparsable volume name [ 389.933077][T16281] kAFS: unparsable volume name [ 389.989205][T16282] kAFS: unparsable volume name [ 390.034410][T16277] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 04:31:27 executing program 3: r0 = memfd_create(&(0x7f0000001780)='\xd8\x05V\x15\xa5e\xf1\xb8\xf6\xa2\xba\x85\xb95\x03<\xb9;\xcd\x86\x8bD\xf9\xe9L\xe1Q\xfc\xe2\x97\xa0\xe8s\xb2\x11\xef\x1ac\xc9\x89\xc7\x0fv1\xa1:h\xf6\xf5\a\x8c\xf0Ay\x03\x97\xe77\xc1\xc8\xa6\xcb\xd2\xbe\xe9\xd2\xfb{u\xc3\xcd\xba\xa8G`9\xb5\x82\xa9p\xc8)\xe5$b\v\x8e\b\xf4\xf0\x11\xb4\xcb\"\xf4\xf3\xb4|\xdf\xa3\xdd\x9c\x8a\xf4D\xd3\xea\x11c}\x86H\xca=;i\x96\x183h\xba\x1a\x10', 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000380)='/dev/nullb0\x00', 0x0, 0x0) io_setup(0x1, &(0x7f00000004c0)=0x0) io_submit(r4, 0x8, &(0x7f00000000c0)=[&(0x7f0000000140)={0x3a00402a, 0x2759, 0x10, 0x0, 0x0, r3, &(0x7f0000000000)="98", 0x3e80000000, 0x0, 0x0, 0x2}]) 04:31:27 executing program 5: keyctl$instantiate(0xc, 0x0, 0x0, 0x0, 0xfffffffffffffffd) r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0x1f1, 0xfffffffffffffffe) keyctl$update(0x2, r0, &(0x7f0000000000)="9f", 0x1) 04:31:27 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) [ 390.085485][T16282] kAFS: unparsable volume name 04:31:27 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000000)='batadv\x00') sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)={0x14, r1, 0x301, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) bind$netlink(r0, &(0x7f0000000000)={0x10, 0x0, 0x25dfdbff, 0x2000}, 0xc) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000000000)='batadv\x00') sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r2, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)={0x14, r3, 0x301, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) sendmsg$sock(r2, &(0x7f0000000200)={&(0x7f0000000080)=@nl=@proc={0x10, 0x0, 0x25dfdbfe, 0x8}, 0x80, &(0x7f00000001c0)=[{&(0x7f0000000280)="0d2b13502e72e40c512471ae6c74ac58e5f373fdf48d74daee9e1d49d1c81e69e951c0791d9202fd5c29d0cb03bb9198637dabd45c9f49d3b3c84d1a85e4ce3c4b1685b278de67a14a0e33085cbc4d8c83090f7d59219b7f6302fe0a98624581d9bd02672e2714c8a6864dc76a23868e8c7e7973a0c5b00b777f42e6cc5b4f4766544acf1cc9822c8d5c28b776fe0507c47d6bd53b8bd5dd0fe2e01445477ed43a1e86a5a9627c06fb4dbfcde1bde8b05ba75965358a39a3e517bf384a46a6651c686cc05ef5dcdb76fc43861a0b4fb3bce77ce094e2d207de9bb2355b5615794bdd8997b650", 0xe6}, {&(0x7f0000000380)="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", 0xfb}], 0x2}, 0x4000) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) fsconfig$FSCONFIG_SET_FLAG(r4, 0x6, &(0x7f00000000c0)='posixacl\x00', 0x0, 0x0) recvmsg$can_bcm(r4, &(0x7f0000000ac0)={&(0x7f0000000480)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, 0x80, &(0x7f0000000880)=[{&(0x7f00000013c0)=""/4096, 0x1000}, {&(0x7f0000000bc0)=""/228, 0xe4}, {&(0x7f0000000540)=""/3, 0x3}, {&(0x7f00000006c0)=""/68, 0x44}, {&(0x7f0000000740)=""/130, 0x82}, {&(0x7f0000000800)=""/107, 0x6b}], 0x6, &(0x7f0000000b00)=""/157, 0x9d}, 0x2003) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') sendmsg$NL80211_CMD_NEW_INTERFACE(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x14, r7, 0x405, 0x0, 0x0, {0x7e}}, 0x14}}, 0x0) sendmsg$NL80211_CMD_START_SCHED_SCAN(r5, &(0x7f0000000a80)={&(0x7f00000009c0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000a40)={&(0x7f0000000a00)={0x1c, r7, 0x400, 0x70bd28, 0x25dfdbfd, {}, [@NL80211_ATTR_SCHED_SCAN_MULTI={0x4}, @NL80211_ATTR_SCHED_SCAN_MULTI={0x4}]}, 0x1c}, 0x1, 0x0, 0x0, 0x10}, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) 04:31:27 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) r0 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f00000002c0)='X', 0x1, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000640)='user\x00', &(0x7f0000000540)={'syz'}, &(0x7f00000000c0), 0xc6, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f0000000640)='user\x00', &(0x7f0000000540)={'syz'}, &(0x7f00000000c0), 0xc6, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f00000000c0)={r0, r1, r2}, 0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)={'sha224-avx\x00'}}) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000340)={r1, 0x24, 0x9e}, &(0x7f0000000380)={'enc=', 'oaep', ' hash=', {'sha384-avx2\x00'}}, &(0x7f0000000400)="5791f0834b666349cefb5c1280caa92f551d705a060a071cecc658fd4d349f713bd60cf5", &(0x7f0000000440)=""/158) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, 0x0, &(0x7f00000001c0)) socket(0x0, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000200)={0x0, 'veth1_macvtap\x00'}) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$batadv(&(0x7f0000000000)='batadv\x00') sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r3, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)={0x14, r4, 0x301, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) r5 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_ZERO(r3, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000000c0)={&(0x7f0000000280)={0xa4, r5, 0x20, 0x70bd28, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x8}, @IPVS_CMD_ATTR_DEST={0x1c, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x1ff}, @IPVS_DEST_ATTR_PORT={0x6, 0x2, 0x4e20}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x6, 0xb, 0xa}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xeb}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x180000}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x1ff}, @IPVS_CMD_ATTR_DAEMON={0xc, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_MCAST_PORT={0x6, 0x7, 0x4e20}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x6f}, @IPVS_CMD_ATTR_DAEMON={0x40, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_MCAST_TTL={0x3, 0x8, 0x7}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x5, 0x8, 0x33}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @broadcast}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @remote}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x5, 0x8, 0x1f}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x6, 0x7, 0x4e24}]}]}, 0xa4}, 0x1, 0x0, 0x0, 0x10}, 0x40050) r6 = open_tree(0xffffffffffffffff, &(0x7f0000000f40)='./file0\x00', 0x80000) sendmsg$IPVS_CMD_NEW_SERVICE(r6, &(0x7f0000001100)={&(0x7f0000000f80)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000010c0)={&(0x7f0000000fc0)={0xc8, r5, 0x400, 0x70bd26, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xffff2595}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x101}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x7}, @IPVS_CMD_ATTR_DEST={0x44, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x1}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x1}, @IPVS_DEST_ATTR_TUN_TYPE={0x5, 0xd, 0x1}, @IPVS_DEST_ATTR_TUN_TYPE={0x5, 0xd, 0x1}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x2}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x1}, @IPVS_DEST_ATTR_TUN_FLAGS={0x6, 0xf, 0x3}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x4}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x6}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x1}, @IPVS_CMD_ATTR_SERVICE={0x40, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0xffffffff}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@multicast1}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x7}]}, 0xc8}, 0x1, 0x0, 0x0, 0x20048040}, 0x5c011) 04:31:27 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) fsconfig$FSCONFIG_SET_FLAG(r0, 0x6, &(0x7f00000000c0)='posixacl\x00', 0x0, 0x0) r1 = fsmount(r0, 0x0, 0x82) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r2) r3 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r3, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f0000000080)={r4, 0x82000000}, 0x10) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f0000000000)={0x401, 0x8301, 0x0, 0x0, r4}, &(0x7f0000000080)=0x10) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') sendmsg$NL80211_CMD_NEW_INTERFACE(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x14, r5, 0x405, 0x0, 0x0, {0x7e}}, 0x14}}, 0x0) r6 = socket(0x11, 0x800000003, 0x0) bind(r6, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r6, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r8 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r8, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=@newqdisc={0x138, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r7, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_gred={{0x9, 0x1, 'gred\x00'}, {0x108, 0x2, [@TCA_GRED_STAB={0x104, 0x2, "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"}]}}]}, 0x138}}, 0x0) sendmsg$NL80211_CMD_SET_BSS(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000280)={&(0x7f00000001c0)={0x50, r5, 0x2, 0x70bd2a, 0x25dfdbfb, {}, [@NL80211_ATTR_WIPHY={0x8}, @NL80211_ATTR_BSS_HT_OPMODE={0x6, 0x6d, 0x3}, @NL80211_ATTR_IFINDEX={0x8, 0x3, r7}, @NL80211_ATTR_AP_ISOLATE={0x5, 0x60, 0x7}, @NL80211_ATTR_BSS_CTS_PROT={0x5, 0x1c, 0x7f}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x0, 0x2}}, @NL80211_ATTR_P2P_CTWINDOW={0x5, 0xa2, 0xf1}]}, 0x50}, 0x1, 0x0, 0x0, 0x4000094}, 0x40) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) [ 390.213992][T16294] encrypted_key: insufficient parameters specified 04:31:27 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000000)='batadv\x00') sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)={0x14, r1, 0x301, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) mount(&(0x7f0000000180)=ANY=[@ANYRESOCT=r0, @ANYBLOB="2c04331270cccd3406ce083ce053bcce92e59e30e6c61a5122887af8d237edb8d2ea2addafd6d4952692d67864ba1eb54aecc3ff5c154a9bbdd46c27ba9f02af235cf5c107ab305ae90282a959a9369fd44072324386551249956710a3f7cf9300f8e1f4af140860095a50bd2d2e182641ad3c1a4e76a0ef3ccde82d95803809a48decee61f6192cbf6d5252e079905cb6419030ad3976e73e7d853ff8e210d990d9f2e4f2a672dc9f0cee277f7b91b08d8bcb668d489b2a16484b57de297f1ecec5559a5f0871235bdd0c56e6e24237629d36dddc56cba80463bbba466325924ef124c7b00dd17f52"], &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x20e1040, 0x0) 04:31:27 executing program 5: keyctl$instantiate(0xc, 0x0, 0x0, 0x0, 0xfffffffffffffffd) r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0x1f1, 0xfffffffffffffffe) keyctl$update(0x2, r0, &(0x7f0000000000)="9f", 0x1) [ 390.483119][T16300] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 04:31:27 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000000)='batadv\x00') sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)={0x14, r1, 0x301, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) bind$netlink(r0, &(0x7f0000000000)={0x10, 0x0, 0x25dfdbff, 0x2000}, 0xc) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000000000)='batadv\x00') sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r2, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)={0x14, r3, 0x301, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) sendmsg$sock(r2, &(0x7f0000000200)={&(0x7f0000000080)=@nl=@proc={0x10, 0x0, 0x25dfdbfe, 0x8}, 0x80, &(0x7f00000001c0)=[{&(0x7f0000000280)="0d2b13502e72e40c512471ae6c74ac58e5f373fdf48d74daee9e1d49d1c81e69e951c0791d9202fd5c29d0cb03bb9198637dabd45c9f49d3b3c84d1a85e4ce3c4b1685b278de67a14a0e33085cbc4d8c83090f7d59219b7f6302fe0a98624581d9bd02672e2714c8a6864dc76a23868e8c7e7973a0c5b00b777f42e6cc5b4f4766544acf1cc9822c8d5c28b776fe0507c47d6bd53b8bd5dd0fe2e01445477ed43a1e86a5a9627c06fb4dbfcde1bde8b05ba75965358a39a3e517bf384a46a6651c686cc05ef5dcdb76fc43861a0b4fb3bce77ce094e2d207de9bb2355b5615794bdd8997b650", 0xe6}, {&(0x7f0000000380)="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", 0xfb}], 0x2}, 0x4000) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) fsconfig$FSCONFIG_SET_FLAG(r4, 0x6, &(0x7f00000000c0)='posixacl\x00', 0x0, 0x0) recvmsg$can_bcm(r4, &(0x7f0000000ac0)={&(0x7f0000000480)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, 0x80, &(0x7f0000000880)=[{&(0x7f00000013c0)=""/4096, 0x1000}, {&(0x7f0000000bc0)=""/228, 0xe4}, {&(0x7f0000000540)=""/3, 0x3}, {&(0x7f00000006c0)=""/68, 0x44}, {&(0x7f0000000740)=""/130, 0x82}, {&(0x7f0000000800)=""/107, 0x6b}], 0x6, &(0x7f0000000b00)=""/157, 0x9d}, 0x2003) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') sendmsg$NL80211_CMD_NEW_INTERFACE(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x14, r7, 0x405, 0x0, 0x0, {0x7e}}, 0x14}}, 0x0) sendmsg$NL80211_CMD_START_SCHED_SCAN(r5, &(0x7f0000000a80)={&(0x7f00000009c0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000a40)={&(0x7f0000000a00)={0x1c, r7, 0x400, 0x70bd28, 0x25dfdbfd, {}, [@NL80211_ATTR_SCHED_SCAN_MULTI={0x4}, @NL80211_ATTR_SCHED_SCAN_MULTI={0x4}]}, 0x1c}, 0x1, 0x0, 0x0, 0x10}, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) [ 390.540291][T16311] encrypted_key: insufficient parameters specified 04:31:27 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x2000000, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, 0x0, &(0x7f00000001c0)) socket(0x0, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000200)={0x0, 'veth1_macvtap\x00'}) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r1, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x80000000, 0x1}, {0x80, 0x7fffffff}], r1}, 0x18, 0x1) 04:31:27 executing program 5: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'trusted:', 'em1'}, 0xfffffffffffffff5, 0xfffffffffffffffd) r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0x1f1, 0xfffffffffffffffe) keyctl$update(0x2, r0, &(0x7f0000000000)="9f", 0x1) 04:31:27 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$hidraw(&(0x7f0000000000)='/dev/hidraw#\x00', 0x62, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) [ 390.777834][T16320] afs: Bad value for 'source' [ 390.880920][T16320] kAFS: unparsable volume name [ 390.902602][T16322] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 04:31:28 executing program 3: r0 = memfd_create(&(0x7f0000001780)='\xd8\x05V\x15\xa5e\xf1\xb8\xf6\xa2\xba\x85\xb95\x03<\xb9;\xcd\x86\x8bD\xf9\xe9L\xe1Q\xfc\xe2\x97\xa0\xe8s\xb2\x11\xef\x1ac\xc9\x89\xc7\x0fv1\xa1:h\xf6\xf5\a\x8c\xf0Ay\x03\x97\xe77\xc1\xc8\xa6\xcb\xd2\xbe\xe9\xd2\xfb{u\xc3\xcd\xba\xa8G`9\xb5\x82\xa9p\xc8)\xe5$b\v\x8e\b\xf4\xf0\x11\xb4\xcb\"\xf4\xf3\xb4|\xdf\xa3\xdd\x9c\x8a\xf4D\xd3\xea\x11c}\x86H\xca=;i\x96\x183h\xba\x1a\x10', 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000380)='/dev/nullb0\x00', 0x0, 0x0) io_setup(0x1, &(0x7f00000004c0)=0x0) io_submit(r4, 0x8, &(0x7f00000000c0)=[&(0x7f0000000140)={0x3a00402b, 0x2759, 0x10, 0x0, 0x0, r3, &(0x7f0000000000)="98", 0x3e80000000, 0x0, 0x0, 0x2}]) 04:31:28 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readlink(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=""/41, 0x29) 04:31:28 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000000)='batadv\x00') sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)={0x14, r1, 0x301, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000000000)='batadv\x00') r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) fsconfig$FSCONFIG_SET_FLAG(r4, 0x6, &(0x7f00000000c0)='posixacl\x00', 0x0, 0x0) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r5, &(0x7f00000001c0)={0xe, 0x18, 0xfa00, @id_tos={0x0, r6, 0x0, 0x3, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r4, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r6, 0x2}}, 0x10) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r2, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="14008000e1c4bf5e7dd84af35e7f214d475bc24461c022cdbcfc01e39541bba22ab551969b83d472b0db17a0574db69b8dd957645c6d3844810daf07bff7b2321437bca6c1fec32405fb07f7279d0f07", @ANYRES16=r3, @ANYBLOB="010300000000000000000a000000"], 0x14}}, 0x0) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$batadv(&(0x7f0000000000)='batadv\x00') sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r7, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=ANY=[@ANYBLOB="14000000", @ANYRES16=r8, @ANYBLOB="0103000049f20000000000000000"], 0x14}}, 0x0) r9 = socket$nl_generic(0x10, 0x3, 0x10) r10 = syz_genetlink_get_family_id$batadv(&(0x7f0000000000)='batadv\x00') sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r9, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)={0x14, r10, 0x301, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) mount(&(0x7f0000000280)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRESHEX=r9, @ANYRESDEC=r1, @ANYRES64=r1, @ANYBLOB="88be880d3a8d65a3b7a64702ecefc4558e8d4379e0f30a0195573b603a0f89f4096b7ec6af41767fc3e1ce8579a8caf3055adea57fce70b9b3ab361dad348d8e737ace8c553ae79a48b12918495c50ce056da72fba7866ffb4768e01705c6b0485fcb5", @ANYRES64=r3, @ANYRES16=r7], &(0x7f0000000180)='./file1\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) 04:31:28 executing program 5: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'trusted:', 'em1'}, 0xfffffffffffffff5, 0xfffffffffffffffd) r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0x1f1, 0xfffffffffffffffe) keyctl$update(0x2, r0, &(0x7f0000000000)="9f", 0x1) 04:31:28 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$hidraw(&(0x7f0000000000)='/dev/hidraw#\x00', 0x62, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) 04:31:28 executing program 5: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'trusted:', 'em1'}, 0xfffffffffffffff5, 0xfffffffffffffffd) r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0x1f1, 0xfffffffffffffffe) keyctl$update(0x2, r0, &(0x7f0000000000)="9f", 0x1) 04:31:28 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)=ANY=[@ANYBLOB="23e9c59c31126d86401d33808f440b3353f58eb001228fc6fc037b399c6a27b1deb26479974c1d9650e780"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) 04:31:28 executing program 1: keyctl$instantiate(0xc, 0x0, 0x0, 0x0, 0xfffffffffffffffd) r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0x1f1, 0xfffffffffffffffe) keyctl$update(0x2, r0, &(0x7f0000000000)="9f", 0x1) 04:31:28 executing program 5: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'trusted:', 'em1', 0x20, 0xdfc}, 0xfffffffffffffff5, 0xfffffffffffffffd) r0 = add_key(0x0, &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0x0, 0xfffffffffffffffe) keyctl$update(0x2, r0, &(0x7f0000000000)="9f", 0x1) 04:31:28 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) fsconfig$FSCONFIG_SET_FLAG(r1, 0x6, &(0x7f00000000c0)='posixacl\x00', 0x0, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r2, &(0x7f00000001c0)={0xe, 0x18, 0xfa00, @id_tos={0x0, r3, 0x0, 0x3, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r1, &(0x7f00000001c0)={0xf, 0x8, 0xfa00, {r3, 0xe}}, 0x10) r4 = syz_genetlink_get_family_id$batadv(&(0x7f0000000000)='batadv\x00') sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000280)={0x2c, r4, 0x301, 0x70bd27, 0x0, {0xa}, [@BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x20}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x1ff}, @BATADV_ATTR_VLANID={0x6, 0x28, 0x3}]}, 0x2c}, 0x1, 0x0, 0x0, 0x100000c4}, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000080)=""/98, &(0x7f0000000000)=0x62) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) [ 391.602392][T16353] kAFS: No cell specified [ 391.619670][T16356] encrypted_key: insufficient parameters specified [ 391.634873][T16358] kAFS: No cell specified 04:31:28 executing program 1: keyctl$instantiate(0xc, 0x0, 0x0, 0x0, 0xfffffffffffffffd) r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0x1f1, 0xfffffffffffffffe) keyctl$update(0x2, r0, &(0x7f0000000000)="9f", 0x1) 04:31:28 executing program 5: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'trusted:', 'em1', 0x20, 0xdfc}, 0xfffffffffffffff5, 0xfffffffffffffffd) r0 = add_key(0x0, &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0x0, 0xfffffffffffffffe) keyctl$update(0x2, r0, &(0x7f0000000000)="9f", 0x1) [ 391.860227][T16367] encrypted_key: insufficient parameters specified 04:31:29 executing program 3: r0 = memfd_create(&(0x7f0000001780)='\xd8\x05V\x15\xa5e\xf1\xb8\xf6\xa2\xba\x85\xb95\x03<\xb9;\xcd\x86\x8bD\xf9\xe9L\xe1Q\xfc\xe2\x97\xa0\xe8s\xb2\x11\xef\x1ac\xc9\x89\xc7\x0fv1\xa1:h\xf6\xf5\a\x8c\xf0Ay\x03\x97\xe77\xc1\xc8\xa6\xcb\xd2\xbe\xe9\xd2\xfb{u\xc3\xcd\xba\xa8G`9\xb5\x82\xa9p\xc8)\xe5$b\v\x8e\b\xf4\xf0\x11\xb4\xcb\"\xf4\xf3\xb4|\xdf\xa3\xdd\x9c\x8a\xf4D\xd3\xea\x11c}\x86H\xca=;i\x96\x183h\xba\x1a\x10', 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000380)='/dev/nullb0\x00', 0x0, 0x0) io_setup(0x1, &(0x7f00000004c0)=0x0) io_submit(r4, 0x8, &(0x7f00000000c0)=[&(0x7f0000000140)={0x3a00402c, 0x2759, 0x10, 0x0, 0x0, r3, &(0x7f0000000000)="98", 0x3e80000000, 0x0, 0x0, 0x2}]) 04:31:29 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) fsconfig$FSCONFIG_SET_FLAG(r0, 0x6, &(0x7f00000000c0)='posixacl\x00', 0x0, 0x0) r1 = fsmount(r0, 0x0, 0x82) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) fsconfig$FSCONFIG_SET_FLAG(r2, 0x6, &(0x7f00000000c0)='posixacl\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f00000001c0)='cgroup.procs\x00', 0x2, 0x0) ioctl$RNDADDTOENTCNT(r2, 0x40045201, &(0x7f0000000100)=0x9) sendto$inet(r1, &(0x7f0000000040)="2d910b3dfcacb30f08eb65749f5fc4cda82071ecb38636d8ef5bf985e3c74f4e43a93fbb55f04638ee44d5409d613085a784b22095924954adc2cb263c3fa742d1ff554099e4d9e0515c507f5a495457b85dcb9ef23aa4b15594d69f1f6bd7ed0f1fad3563487491dda5071a3d99faed3133dbc486f6", 0x76, 0x54, &(0x7f00000000c0)={0x2, 0x4e23, @private=0xa010101}, 0x10) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000000)='bdev\x00', 0x3000010, 0x0) 04:31:29 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) setxattr$security_capability(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v1={0x1000000, [{0x20, 0x7}]}, 0xc, 0x3) 04:31:29 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) fsconfig$FSCONFIG_SET_FLAG(r1, 0x6, &(0x7f00000000c0)='posixacl\x00', 0x0, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r2, &(0x7f00000001c0)={0xe, 0x18, 0xfa00, @id_tos={0x0, r3, 0x0, 0x3, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r1, &(0x7f00000001c0)={0xf, 0x8, 0xfa00, {r3, 0xe}}, 0x10) r4 = syz_genetlink_get_family_id$batadv(&(0x7f0000000000)='batadv\x00') sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000280)={0x2c, r4, 0x301, 0x70bd27, 0x0, {0xa}, [@BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x20}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x1ff}, @BATADV_ATTR_VLANID={0x6, 0x28, 0x3}]}, 0x2c}, 0x1, 0x0, 0x0, 0x100000c4}, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000080)=""/98, &(0x7f0000000000)=0x62) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) 04:31:29 executing program 5: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'trusted:', 'em1', 0x20, 0xdfc}, 0xfffffffffffffff5, 0xfffffffffffffffd) r0 = add_key(0x0, &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0x0, 0xfffffffffffffffe) keyctl$update(0x2, r0, &(0x7f0000000000)="9f", 0x1) 04:31:29 executing program 5: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'trusted:', 'em1', 0x20, 0xdfc}, 0xfffffffffffffff5, 0xfffffffffffffffd) r0 = add_key(&(0x7f0000000140)='encrypted\x00', 0x0, &(0x7f0000000100), 0x0, 0xfffffffffffffffe) keyctl$update(0x2, r0, &(0x7f0000000000)="9f", 0x1) 04:31:29 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000080)=ANY=[@ANYBLOB="23e90002b4cc0e9c91252c6efd7c364b33a5a31e3d62ae108a5633f6ab4b39ccbc1a2bae918fbfa283b73b696bc25017bc31a9ab4a595428d53488cb63adca056a19b7c6997436242f02d14f54970fc9ee76c9aae2eb53b14f77cbba4daf9238d0b16c6c8921897f4007b800ad0502d8777e50e405b00747e546"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) 04:31:29 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0xc0000) ioctl$KVM_SET_LAPIC(r0, 0x4400ae8f, &(0x7f0000000280)={"0b3eb990e08fb30900f9d54141adab80150b953b534a3b561401d9c6546e0f3177f0ee0446006e7eeed11081181abedfb12128dcbdc2dbe975938f4a91adfef2f933086a211c541f07e82d4556a523391ffe5d9159a476c23c742c0138c7dbffde5004348ec354810a9a84356d05bd7b614db66a5e9fdf76734f4ded13a09e5b559d166b652a47f451c90fba3d6195e1a779bc3aeb65f226dda6fdfa208fa34b6d28616c1df9554a273d6e42b437039a401b93b402421cae304f97b4e05670f9d41e3d1c8abed7b06bd5ba80b945058c03b543835cf96e98f063de42e195d031aa0983f90b0d23ef8496253695c7f989f220fb4cfa1fa5d4c94c13ee5cf24eaa91cab6c0e883d4f69bd276b648a3e39c687c00f2422fef66bc965c93c26223d377438d80a281a246ddfff44332a44a2e09a4bf0081afced0e7d7f864aaec54028a0ff8d62ce213e78ee35c0b74728c9c1447334a322beaafd23ed12b1257fb132918a7011a4824051b251608564137a2a149b73b21629e464517edd3e05727ac4dd8de38508eb896fa2f8c858146bb1e6d425de2884aae1acc96e71b5e974cfe72f87b133d881ac9c7686c92fad4e871c3bfa4f07e5de3a72cafda448d32cd238536c9db5d693a5ebd11f129fc06cd920b0a4a1760b459153dbde5d1ff8d6d635eb813c9ca3baa6394f91d2bd0ab39c61ec0ad4e955cf1778977b8cc4d451f6dcd4ee42f124ee3068e530251ba31ebc71d2ba9ac2958fdfd950a9ad32cd26377947710f82985699d007cc9775689ff52c976e47f198a136eb62a6ab6fd4f1c75cdfc299dbd60a716ecfae414baba2d6f0386bcb107741cc60e0b330756cd0e97dacdd814d9e534eba9a78013d8bed8111fbe53fa4b569f3806f5eb6a766572ae92904dfe3c8fe18d17569806ed9f36d9ce76b59cfa2c782d29897a1e327f39b55275ad7efedd69b603f9dc3dc181d16bfcd08ad5b8b44b573ef36aa459d5d4c6c1c7f333b3d2dfed42b0e4484a4bad2e703ba0277a3cdfaeae0aff05ca9b61222f2175b042a8a9aade4d772232946e15dc1af2fe2fbc61880992f33eba74f7a6ef7f2cca47eaa619b4f7ba6c0450df60886003e6722efc13552508e3a72b2bbfe65b48336b010869d34f8b5319325e662cd8fa6df1981d5901dfbfab0c27bba95c4c70ef8c3d799804db60007ef6d90f96c94923bd62347062ffe841070964be3ab947a434dc6bb89985c27cab39697614dbbf1a43c84cf182053b4275fb924f55ac3ff57cee9c7c38fa381e0fc0937b525290cead0a5fc86410ba42f241a1c1e9c74ce27f0e1406108695ee90be1b4dfc85bfdfaae98c3cf4d524ef95bd95fb84a4d1a41ddcba667c55fbc0e59078760f79031496511924053083c59f71f8fb074f74f1b632d3dade3b8f814b85b9cf658d04fefbf0c27541c669d5ba7e93e1"}) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) 04:31:29 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x181) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) fsconfig$FSCONFIG_SET_FLAG(r0, 0x6, &(0x7f00000000c0)='posixacl\x00', 0x0, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$batadv(&(0x7f0000000000)='batadv\x00') sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r1, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)={0x14, r2, 0x301, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) r3 = syz_genetlink_get_family_id$batadv(&(0x7f00000001c0)='batadv\x00') r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) fsconfig$FSCONFIG_SET_FLAG(r4, 0x6, &(0x7f00000000c0)='posixacl\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r4, 0x29, 0x23, &(0x7f0000000300)={{{@in=@dev, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@multicast2}}, &(0x7f0000000400)=0xe8) r6 = socket(0x11, 0x800000003, 0x0) bind(r6, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r6, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) ioctl$FS_IOC_GETVERSION(r1, 0x80087601, &(0x7f0000000280)) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r1, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000440)={0x5c, r3, 0x4, 0x70bd27, 0x6, {}, [@BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5, 0x2f, 0x1}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5, 0x30, 0x1}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8, 0x32, 0xff}, @BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r7}, @BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r5}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0xf841}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x4}, @BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0xe7b1}, @BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5}]}, 0x5c}, 0x1, 0x0, 0x0, 0x8804}, 0x24008000) ioctl$TIOCMBIS(r0, 0x5416, &(0x7f0000000080)) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) r8 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) fsconfig$FSCONFIG_SET_FLAG(r8, 0x6, &(0x7f00000000c0)='posixacl\x00', 0x0, 0x0) sendmmsg$unix(r8, &(0x7f0000000000), 0x0, 0x20000000) [ 392.504926][T16387] kAFS: No cell specified 04:31:29 executing program 5: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'trusted:', 'em1', 0x20, 0xdfc}, 0xfffffffffffffff5, 0xfffffffffffffffd) r0 = add_key(&(0x7f0000000140)='encrypted\x00', 0x0, &(0x7f0000000100), 0x0, 0xfffffffffffffffe) keyctl$update(0x2, r0, &(0x7f0000000000)="9f", 0x1) [ 392.541341][T16390] kAFS: No cell specified 04:31:29 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000000)='batadv\x00') sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)={0x14, r1, 0x301, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) write$binfmt_elf64(r0, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x9, 0x9, 0x5, 0x3f, 0x2, 0x0, 0x6, 0x9, 0x2f9, 0x40, 0xb, 0xae0, 0x100, 0x38, 0x1, 0x2, 0x7, 0x5}, [{0x2, 0x7ff, 0x0, 0x100000001, 0x2, 0x0, 0x1, 0xfff}], "cea05e0b2ff0148ae90f3f0fecf05d9bfda8312f56466322cc9022aba5d624e05e5f7684bc483c428ec4385af5121f238ac02d48034f409f2b7c084a8e7f15c28fac66bd46e5582246e1f681c4ff6b1a156538fb4d3cbc4c2a7e48c56d32071d9872c69759b76cbda47244742a6ad7e3342da3105be013c71973b968d941fc6c8226ea0c4879f823bf60cd16a47d04ed0287"}, 0x10a) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, 0x0, &(0x7f00000001c0)) socket(0x0, 0x0, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000000000)='batadv\x00') sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r2, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)={0x14, r3, 0x301, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) r4 = dup3(0xffffffffffffffff, r2, 0x0) recvfrom(r4, &(0x7f0000000080)=""/6, 0x6, 0x10041, 0x0, 0x0) 04:31:29 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000280)=ANY=[@ANYBLOB="279ee73a9561a1c0cb3370ffa686be7125aac763a9cd9176830e3df4d2017c9b30be267379bbbdcf822ed4656368c8058c8f42ca3844e00d3907fddb1f0db4ec1ae9fa608a236ed9fe370c28653644f71092f58aa55b27cc1658ad90f558ef91d8e731d21ba101fec028cf2ea795cdbd7193c14a51c60ad454c132dda48b65618c275ac290062a75f751f84f945b7bd4caa08600eea07a2c24fa3bf421fc0c06b53360558d12f19f217512d24bb15878895dbe9a18929e1599c63bba0488350e25da961eb0446a7f5da918500ae98b9fa6acc1a0d73d2f493e1f0c39ab9ff419edd119d20faf"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x24000, 0x0) 04:31:30 executing program 3: r0 = memfd_create(&(0x7f0000001780)='\xd8\x05V\x15\xa5e\xf1\xb8\xf6\xa2\xba\x85\xb95\x03<\xb9;\xcd\x86\x8bD\xf9\xe9L\xe1Q\xfc\xe2\x97\xa0\xe8s\xb2\x11\xef\x1ac\xc9\x89\xc7\x0fv1\xa1:h\xf6\xf5\a\x8c\xf0Ay\x03\x97\xe77\xc1\xc8\xa6\xcb\xd2\xbe\xe9\xd2\xfb{u\xc3\xcd\xba\xa8G`9\xb5\x82\xa9p\xc8)\xe5$b\v\x8e\b\xf4\xf0\x11\xb4\xcb\"\xf4\xf3\xb4|\xdf\xa3\xdd\x9c\x8a\xf4D\xd3\xea\x11c}\x86H\xca=;i\x96\x183h\xba\x1a\x10', 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000380)='/dev/nullb0\x00', 0x0, 0x0) io_setup(0x1, &(0x7f00000004c0)=0x0) io_submit(r4, 0x8, &(0x7f00000000c0)=[&(0x7f0000000140)={0x3a00402d, 0x2759, 0x10, 0x0, 0x0, r3, &(0x7f0000000000)="98", 0x3e80000000, 0x0, 0x0, 0x2}]) 04:31:30 executing program 5: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'trusted:', 'em1', 0x20, 0xdfc}, 0xfffffffffffffff5, 0xfffffffffffffffd) r0 = add_key(&(0x7f0000000140)='encrypted\x00', 0x0, &(0x7f0000000100), 0x0, 0xfffffffffffffffe) keyctl$update(0x2, r0, &(0x7f0000000000)="9f", 0x1) 04:31:30 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000000)='batadv\x00') sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)={0x14, r1, 0x301, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) write$binfmt_elf64(r0, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x9, 0x9, 0x5, 0x3f, 0x2, 0x0, 0x6, 0x9, 0x2f9, 0x40, 0xb, 0xae0, 0x100, 0x38, 0x1, 0x2, 0x7, 0x5}, [{0x2, 0x7ff, 0x0, 0x100000001, 0x2, 0x0, 0x1, 0xfff}], "cea05e0b2ff0148ae90f3f0fecf05d9bfda8312f56466322cc9022aba5d624e05e5f7684bc483c428ec4385af5121f238ac02d48034f409f2b7c084a8e7f15c28fac66bd46e5582246e1f681c4ff6b1a156538fb4d3cbc4c2a7e48c56d32071d9872c69759b76cbda47244742a6ad7e3342da3105be013c71973b968d941fc6c8226ea0c4879f823bf60cd16a47d04ed0287"}, 0x10a) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, 0x0, &(0x7f00000001c0)) socket(0x0, 0x0, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000000000)='batadv\x00') sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r2, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)={0x14, r3, 0x301, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) r4 = dup3(0xffffffffffffffff, r2, 0x0) recvfrom(r4, &(0x7f0000000080)=""/6, 0x6, 0x10041, 0x0, 0x0) 04:31:30 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = getpid() r4 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setresgid(0x0, r5, 0x0) sendmsg$unix(r2, &(0x7f0000001440)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=[@cred={{0x1c, 0x1, 0x2, {r3, 0x0, r5}}}], 0x20}, 0x0) chown(&(0x7f0000000000)='./file0\x00', r1, r5) 04:31:30 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) mount(&(0x7f0000000000)=ANY=[@ANYBLOB="23e92c983b136f0682987b0f94e63a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='configfs\x00', 0x0, 0x0) 04:31:30 executing program 5: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'trusted:', 'em1', 0x20, 0xdfc}, 0xfffffffffffffff5, 0xfffffffffffffffd) r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$update(0x2, r0, &(0x7f0000000000)="9f", 0x1) 04:31:30 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000000)='batadv\x00') sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)={0x14, r1, 0x301, 0x70bd2b, 0x0, {0xa}}, 0x14}}, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) fsconfig$FSCONFIG_SET_FLAG(r2, 0x6, &(0x7f00000000c0)='posixacl\x00', 0x0, 0x0) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_INTERVAL(r2, 0xc040564b, &(0x7f0000000080)={0x0, 0x0, 0x2008, 0x8, 0xff81, {0x8, 0x6}, 0x1}) fchmod(r0, 0x1) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) fsconfig$FSCONFIG_SET_FLAG(r3, 0x6, &(0x7f00000000c0)='posixacl\x00', 0x0, 0x0) ioctl$SOUND_MIXER_READ_DEVMASK(r3, 0x80044dfe, &(0x7f0000000000)) 04:31:30 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ubi_ctrl\x00', 0x400200, 0x0) fsconfig$FSCONFIG_SET_FLAG(r0, 0x6, &(0x7f00000000c0)='posixacl\x00', 0x0, 0x0) ioctl$RFKILL_IOCTL_NOINPUT(r0, 0x5201) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) 04:31:30 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000000)='batadv\x00') sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)={0x14, r1, 0x301, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) mount(&(0x7f00000002c0)=ANY=[@ANYRESOCT=r0], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) fspick(0xffffffffffffffff, &(0x7f0000000280)='./file0\x00', 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) fsconfig$FSCONFIG_SET_FLAG(r2, 0x6, &(0x7f00000000c0)='posixacl\x00', 0x0, 0x0) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r5 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r5, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=@newqdisc={0x138, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_gred={{0x9, 0x1, 'gred\x00'}, {0x108, 0x2, [@TCA_GRED_STAB={0x104, 0x2, "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"}]}}]}, 0x138}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40001800}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=@getqdisc={0x2c, 0x26, 0x20, 0x70bd25, 0x25dfdbfe, {0x0, 0x0, 0x0, r4, {0x4, 0x8}, {0x5, 0xc}, {0x3, 0xa}}, [{0x4}, {0x4}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x800) 04:31:30 executing program 5: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'trusted:', 'em1', 0x20, 0xdfc}, 0xfffffffffffffff5, 0xfffffffffffffffd) r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$update(0x2, r0, &(0x7f0000000000)="9f", 0x1) [ 393.811416][T16427] kAFS: unparsable volume name 04:31:31 executing program 5: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'trusted:', 'em1', 0x20, 0xdfc}, 0xfffffffffffffff5, 0xfffffffffffffffd) r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$update(0x2, r0, &(0x7f0000000000)="9f", 0x1) [ 393.904010][T16430] kAFS: unparsable volume name 04:31:31 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000240)={{0x2, 0x0, @private=0x5}, {0x6, @link_local}, 0x2, {0x2, 0x0, @dev}}) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000000)={0x0, 'ip6tnl0\x00', 0x1}, 0x18) mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r2, 0x0) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) fsconfig$FSCONFIG_SET_FLAG(r3, 0x6, &(0x7f00000000c0)='posixacl\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'trusted:', 'em1', 0x20, 0xdfc}, 0xfffffffffffffff5, 0xfffffffffffffffd) r5 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0x1f1, 0xfffffffffffffffe) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$update(0x2, r5, &(0x7f0000000000)="9f", 0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, &(0x7f0000000a40)={{{@in6=@dev, @in6=@ipv4={[], [], @initdev}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}}}, &(0x7f0000000940)=0xfffffff4) r7 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r8, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0\x00', 0x61dd, 0xa, &(0x7f0000000740)=[{&(0x7f00000002c0)="a825978453815aa75b563cd8c77304b4e7bca5c4820e2efd78636cbc6023886fcb7f1988fa49b40240610521320b41987bac9e1f59d2a31564843e49c724d79735ad06ec5ab47474a86ea5693b65ba7766774d0539b808d9fad8e396b602ceff86efafa059558898eb0c29cbdd55eaefe68cb2ff0cebd62a82037bb0ec925e9d69c7bbdc9a77d3d54293e69edd0976525a8d096d27a8c5e56caf83b916611af42313a4897a84829e97c64c49ffba9d9d957211bd27", 0xe1, 0x1ff}, {&(0x7f00000001c0)="e25533c27752c84c4062f9a89219b68b8d24589853e9ae3a25e06cf6a574702d2bc4ce1a741584bab400e127549d6c8fe70b2d006b4ef5f7ba811b34e4f53270219ad08b26f9b89d2144ba0f5fd1dc912183062c70a9cf263cb1fe91fcbb2f9db1543bf830b087651688994d74081c25978359321c0e5544e929", 0x7a, 0x4}, {&(0x7f0000000840)="a4b9b595", 0x4, 0x7f}, {&(0x7f0000000b40)="4f4a32dfe2da74db03d84f8bb86b8cf600368940ab1bf7007d5740d8aa67f373b89bef2e8c6520a6f567f6d612206c67980ef87c09d2c1e0163d66f154e02312e0bd3c584e7202684426ba5e2eae9af1a13f707fe53c64632e7386c87737030b2a551529ae4f4f2f6a51edc888686aeec66dddeaafe767d084c0f119314b6124f07e281a5e6763c6d68c374e0ebc2fb4eb3df2fc75f020f96581e055e99ddcc7cbadd18795d1fef9a0ee75d85ef35e2565178217804de614f6960d8f3c1c12f70d11161d6388c6fc84ca33b451fed5e2c0df384fd386139920a3aa8767bf09c0c42c5a85d62b15000000000000000000", 0xf0, 0x4}, {&(0x7f0000000480)="c54d5b3af43c7d7a111d9d167fa9503c500626a5a6d832288e712ed750457b00db057a5ec85d5d7faae2f443546905eb70fd51e0790e00d126baf81b9d474fed23c0f232623c28badb5033ae972be88de3a274327a3e0aad727cba5399e6", 0x5e, 0x7}, {&(0x7f0000000500)="d7875565aafdb7ad6823bc8d31ab34e75aa3ca9c1754159b3f3362b4633568d18c8ca316623ef48ba43a1f51de9fc7945341184970599a9b7ac56e", 0x3b, 0x2}, {&(0x7f0000000540)="f932110eb83bb6343070d919301a41bc3664f59a58ed75b58c513aee889585df63225f6562741dd1958c9c975260869686ed67ea19", 0x35, 0x8000000000000007}, {&(0x7f0000000580)="e10469535906b9a83619135420dd63879dff38fac22cd5dec444b33e5deebe1e9deb7abec1a554bd37822a21f58bc5b8a92febf6fe9645029348f0cbea0cdb2d1f5e43f977e39ed0ffb4e166fe060875232dee990f7e3cdeb073f21a5926682d0167de24896a742e0037c2dfd24655dd0088a62551010a567469f7308c479938c42a852a", 0x84, 0x1ff}, {&(0x7f0000000640)="914d88d2431326130dd037f3b8e3f16467a928ac06bb09fa56fb5478dd1997733a5fcb29dc89287bd2a2c75e9b810c30f563ff0c2e2c62399452431b7ab2b72c5f4268d009ac80715280841121809793775fc8e3562706350bd8d2b21aef80ae74510dbce26f4db57a8c226d20c4f6ed85fee9ee0074b4d5c80325cb97e84c895b438bd0422959d18121181099e0e9e0582b7244ccb42438", 0x98, 0x26}, {&(0x7f0000000100)="44a7bc79b2456b922de98e367ccb106a6323ab0755510e81adc64f795ce661f89b17493255500a8d000259c6b0663132ba5974f80faf7848cd1064c30c", 0x3d, 0x5}], 0x6000, &(0x7f0000000980)={[{@session={'session', 0x3d, 0x20}}, {@type={'type', 0x3d, "0f70b6e8"}}], [{@fsmagic={'fsmagic', 0x3d, 0xb}}, {@audit='audit'}, {@permit_directio='permit_directio'}, {@fowner_lt={'fowner<', r6}}, {@appraise='appraise'}]}) 04:31:31 executing program 3: r0 = memfd_create(&(0x7f0000001780)='\xd8\x05V\x15\xa5e\xf1\xb8\xf6\xa2\xba\x85\xb95\x03<\xb9;\xcd\x86\x8bD\xf9\xe9L\xe1Q\xfc\xe2\x97\xa0\xe8s\xb2\x11\xef\x1ac\xc9\x89\xc7\x0fv1\xa1:h\xf6\xf5\a\x8c\xf0Ay\x03\x97\xe77\xc1\xc8\xa6\xcb\xd2\xbe\xe9\xd2\xfb{u\xc3\xcd\xba\xa8G`9\xb5\x82\xa9p\xc8)\xe5$b\v\x8e\b\xf4\xf0\x11\xb4\xcb\"\xf4\xf3\xb4|\xdf\xa3\xdd\x9c\x8a\xf4D\xd3\xea\x11c}\x86H\xca=;i\x96\x183h\xba\x1a\x10', 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000380)='/dev/nullb0\x00', 0x0, 0x0) io_setup(0x1, &(0x7f00000004c0)=0x0) io_submit(r4, 0x8, &(0x7f00000000c0)=[&(0x7f0000000140)={0x3a00402e, 0x2759, 0x10, 0x0, 0x0, r3, &(0x7f0000000000)="98", 0x3e80000000, 0x0, 0x0, 0x2}]) 04:31:31 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) fsconfig$FSCONFIG_SET_FLAG(r0, 0x6, &(0x7f00000000c0)='posixacl\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000080)='./file0\x00', 0x20) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) 04:31:31 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) 04:31:31 executing program 5: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'trusted:', 'em1', 0x20, 0xdfc}, 0xfffffffffffffff5, 0xfffffffffffffffd) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0x1f1, 0xfffffffffffffffe) keyctl$update(0x2, 0x0, &(0x7f0000000000)="9f", 0x1) [ 394.185431][T16437] encrypted_key: insufficient parameters specified 04:31:31 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000240)={{0x2, 0x0, @private=0x5}, {0x6, @link_local}, 0x2, {0x2, 0x0, @dev}}) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000000)={0x0, 'ip6tnl0\x00', 0x1}, 0x18) mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r2, 0x0) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) fsconfig$FSCONFIG_SET_FLAG(r3, 0x6, &(0x7f00000000c0)='posixacl\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'trusted:', 'em1', 0x20, 0xdfc}, 0xfffffffffffffff5, 0xfffffffffffffffd) r5 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0x1f1, 0xfffffffffffffffe) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$update(0x2, r5, &(0x7f0000000000)="9f", 0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, &(0x7f0000000a40)={{{@in6=@dev, @in6=@ipv4={[], [], @initdev}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}}}, &(0x7f0000000940)=0xfffffff4) r7 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r8, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0\x00', 0x61dd, 0xa, &(0x7f0000000740)=[{&(0x7f00000002c0)="a825978453815aa75b563cd8c77304b4e7bca5c4820e2efd78636cbc6023886fcb7f1988fa49b40240610521320b41987bac9e1f59d2a31564843e49c724d79735ad06ec5ab47474a86ea5693b65ba7766774d0539b808d9fad8e396b602ceff86efafa059558898eb0c29cbdd55eaefe68cb2ff0cebd62a82037bb0ec925e9d69c7bbdc9a77d3d54293e69edd0976525a8d096d27a8c5e56caf83b916611af42313a4897a84829e97c64c49ffba9d9d957211bd27", 0xe1, 0x1ff}, {&(0x7f00000001c0)="e25533c27752c84c4062f9a89219b68b8d24589853e9ae3a25e06cf6a574702d2bc4ce1a741584bab400e127549d6c8fe70b2d006b4ef5f7ba811b34e4f53270219ad08b26f9b89d2144ba0f5fd1dc912183062c70a9cf263cb1fe91fcbb2f9db1543bf830b087651688994d74081c25978359321c0e5544e929", 0x7a, 0x4}, {&(0x7f0000000840)="a4b9b595", 0x4, 0x7f}, {&(0x7f0000000b40)="4f4a32dfe2da74db03d84f8bb86b8cf600368940ab1bf7007d5740d8aa67f373b89bef2e8c6520a6f567f6d612206c67980ef87c09d2c1e0163d66f154e02312e0bd3c584e7202684426ba5e2eae9af1a13f707fe53c64632e7386c87737030b2a551529ae4f4f2f6a51edc888686aeec66dddeaafe767d084c0f119314b6124f07e281a5e6763c6d68c374e0ebc2fb4eb3df2fc75f020f96581e055e99ddcc7cbadd18795d1fef9a0ee75d85ef35e2565178217804de614f6960d8f3c1c12f70d11161d6388c6fc84ca33b451fed5e2c0df384fd386139920a3aa8767bf09c0c42c5a85d62b15000000000000000000", 0xf0, 0x4}, {&(0x7f0000000480)="c54d5b3af43c7d7a111d9d167fa9503c500626a5a6d832288e712ed750457b00db057a5ec85d5d7faae2f443546905eb70fd51e0790e00d126baf81b9d474fed23c0f232623c28badb5033ae972be88de3a274327a3e0aad727cba5399e6", 0x5e, 0x7}, {&(0x7f0000000500)="d7875565aafdb7ad6823bc8d31ab34e75aa3ca9c1754159b3f3362b4633568d18c8ca316623ef48ba43a1f51de9fc7945341184970599a9b7ac56e", 0x3b, 0x2}, {&(0x7f0000000540)="f932110eb83bb6343070d919301a41bc3664f59a58ed75b58c513aee889585df63225f6562741dd1958c9c975260869686ed67ea19", 0x35, 0x8000000000000007}, {&(0x7f0000000580)="e10469535906b9a83619135420dd63879dff38fac22cd5dec444b33e5deebe1e9deb7abec1a554bd37822a21f58bc5b8a92febf6fe9645029348f0cbea0cdb2d1f5e43f977e39ed0ffb4e166fe060875232dee990f7e3cdeb073f21a5926682d0167de24896a742e0037c2dfd24655dd0088a62551010a567469f7308c479938c42a852a", 0x84, 0x1ff}, {&(0x7f0000000640)="914d88d2431326130dd037f3b8e3f16467a928ac06bb09fa56fb5478dd1997733a5fcb29dc89287bd2a2c75e9b810c30f563ff0c2e2c62399452431b7ab2b72c5f4268d009ac80715280841121809793775fc8e3562706350bd8d2b21aef80ae74510dbce26f4db57a8c226d20c4f6ed85fee9ee0074b4d5c80325cb97e84c895b438bd0422959d18121181099e0e9e0582b7244ccb42438", 0x98, 0x26}, {&(0x7f0000000100)="44a7bc79b2456b922de98e367ccb106a6323ab0755510e81adc64f795ce661f89b17493255500a8d000259c6b0663132ba5974f80faf7848cd1064c30c", 0x3d, 0x5}], 0x6000, &(0x7f0000000980)={[{@session={'session', 0x3d, 0x20}}, {@type={'type', 0x3d, "0f70b6e8"}}], [{@fsmagic={'fsmagic', 0x3d, 0xb}}, {@audit='audit'}, {@permit_directio='permit_directio'}, {@fowner_lt={'fowner<', r6}}, {@appraise='appraise'}]}) 04:31:31 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) mount(&(0x7f0000000080)=ANY=[@ANYBLOB="57e212c25d8b67e4d5f5de5f3e71bb05ed998396bd6f2535c38785b821eb11d6201e017b550279c4c3eb4112c21dff7a978984ab5372556a81734201440538aa737f68c8db"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) 04:31:31 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$batadv(&(0x7f0000000000)='batadv\x00') sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r1, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)={0x14, r2, 0x301, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) readahead(r1, 0x1, 0x5) fsconfig$FSCONFIG_SET_FLAG(r0, 0x6, &(0x7f00000000c0)='posixacl\x00', 0x0, 0x0) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000000)={r0}, 0x8) ioctl$BLKDISCARD(r3, 0x1277, &(0x7f0000000080)=0x4) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) 04:31:31 executing program 5: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'trusted:', 'em1', 0x20, 0xdfc}, 0xfffffffffffffff5, 0xfffffffffffffffd) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0x1f1, 0xfffffffffffffffe) keyctl$update(0x2, 0x0, &(0x7f0000000000)="9f", 0x1) [ 394.473445][T16452] kAFS: unparsable volume name [ 394.481812][T16451] encrypted_key: insufficient parameters specified 04:31:31 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) socket$nl_route(0x10, 0x3, 0x0) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000000)='batadv\x00') sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)={0x14, r1, 0x200, 0x0, 0x25dfdbfc, {0xa}}, 0x14}}, 0x0) mount(&(0x7f0000000080)=ANY=[@ANYRES32=r0], &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x40000, 0x0) 04:31:31 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000240)={{0x2, 0x0, @private=0x5}, {0x6, @link_local}, 0x2, {0x2, 0x0, @dev}}) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000000)={0x0, 'ip6tnl0\x00', 0x1}, 0x18) mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r2, 0x0) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) fsconfig$FSCONFIG_SET_FLAG(r3, 0x6, &(0x7f00000000c0)='posixacl\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'trusted:', 'em1', 0x20, 0xdfc}, 0xfffffffffffffff5, 0xfffffffffffffffd) r5 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0x1f1, 0xfffffffffffffffe) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$update(0x2, r5, &(0x7f0000000000)="9f", 0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, &(0x7f0000000a40)={{{@in6=@dev, @in6=@ipv4={[], [], @initdev}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}}}, &(0x7f0000000940)=0xfffffff4) r7 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r8, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0\x00', 0x61dd, 0xa, &(0x7f0000000740)=[{&(0x7f00000002c0)="a825978453815aa75b563cd8c77304b4e7bca5c4820e2efd78636cbc6023886fcb7f1988fa49b40240610521320b41987bac9e1f59d2a31564843e49c724d79735ad06ec5ab47474a86ea5693b65ba7766774d0539b808d9fad8e396b602ceff86efafa059558898eb0c29cbdd55eaefe68cb2ff0cebd62a82037bb0ec925e9d69c7bbdc9a77d3d54293e69edd0976525a8d096d27a8c5e56caf83b916611af42313a4897a84829e97c64c49ffba9d9d957211bd27", 0xe1, 0x1ff}, {&(0x7f00000001c0)="e25533c27752c84c4062f9a89219b68b8d24589853e9ae3a25e06cf6a574702d2bc4ce1a741584bab400e127549d6c8fe70b2d006b4ef5f7ba811b34e4f53270219ad08b26f9b89d2144ba0f5fd1dc912183062c70a9cf263cb1fe91fcbb2f9db1543bf830b087651688994d74081c25978359321c0e5544e929", 0x7a, 0x4}, {&(0x7f0000000840)="a4b9b595", 0x4, 0x7f}, {&(0x7f0000000b40)="4f4a32dfe2da74db03d84f8bb86b8cf600368940ab1bf7007d5740d8aa67f373b89bef2e8c6520a6f567f6d612206c67980ef87c09d2c1e0163d66f154e02312e0bd3c584e7202684426ba5e2eae9af1a13f707fe53c64632e7386c87737030b2a551529ae4f4f2f6a51edc888686aeec66dddeaafe767d084c0f119314b6124f07e281a5e6763c6d68c374e0ebc2fb4eb3df2fc75f020f96581e055e99ddcc7cbadd18795d1fef9a0ee75d85ef35e2565178217804de614f6960d8f3c1c12f70d11161d6388c6fc84ca33b451fed5e2c0df384fd386139920a3aa8767bf09c0c42c5a85d62b15000000000000000000", 0xf0, 0x4}, {&(0x7f0000000480)="c54d5b3af43c7d7a111d9d167fa9503c500626a5a6d832288e712ed750457b00db057a5ec85d5d7faae2f443546905eb70fd51e0790e00d126baf81b9d474fed23c0f232623c28badb5033ae972be88de3a274327a3e0aad727cba5399e6", 0x5e, 0x7}, {&(0x7f0000000500)="d7875565aafdb7ad6823bc8d31ab34e75aa3ca9c1754159b3f3362b4633568d18c8ca316623ef48ba43a1f51de9fc7945341184970599a9b7ac56e", 0x3b, 0x2}, {&(0x7f0000000540)="f932110eb83bb6343070d919301a41bc3664f59a58ed75b58c513aee889585df63225f6562741dd1958c9c975260869686ed67ea19", 0x35, 0x8000000000000007}, {&(0x7f0000000580)="e10469535906b9a83619135420dd63879dff38fac22cd5dec444b33e5deebe1e9deb7abec1a554bd37822a21f58bc5b8a92febf6fe9645029348f0cbea0cdb2d1f5e43f977e39ed0ffb4e166fe060875232dee990f7e3cdeb073f21a5926682d0167de24896a742e0037c2dfd24655dd0088a62551010a567469f7308c479938c42a852a", 0x84, 0x1ff}, {&(0x7f0000000640)="914d88d2431326130dd037f3b8e3f16467a928ac06bb09fa56fb5478dd1997733a5fcb29dc89287bd2a2c75e9b810c30f563ff0c2e2c62399452431b7ab2b72c5f4268d009ac80715280841121809793775fc8e3562706350bd8d2b21aef80ae74510dbce26f4db57a8c226d20c4f6ed85fee9ee0074b4d5c80325cb97e84c895b438bd0422959d18121181099e0e9e0582b7244ccb42438", 0x98, 0x26}, {&(0x7f0000000100)="44a7bc79b2456b922de98e367ccb106a6323ab0755510e81adc64f795ce661f89b17493255500a8d000259c6b0663132ba5974f80faf7848cd1064c30c", 0x3d, 0x5}], 0x6000, &(0x7f0000000980)={[{@session={'session', 0x3d, 0x20}}, {@type={'type', 0x3d, "0f70b6e8"}}], [{@fsmagic={'fsmagic', 0x3d, 0xb}}, {@audit='audit'}, {@permit_directio='permit_directio'}, {@fowner_lt={'fowner<', r6}}, {@appraise='appraise'}]}) 04:31:31 executing program 5: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'trusted:', 'em1', 0x20, 0xdfc}, 0xfffffffffffffff5, 0xfffffffffffffffd) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0x1f1, 0xfffffffffffffffe) keyctl$update(0x2, 0x0, &(0x7f0000000000)="9f", 0x1) 04:31:31 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) fsconfig$FSCONFIG_SET_FLAG(r0, 0x6, &(0x7f00000000c0)='posixacl\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) [ 394.767388][T16465] encrypted_key: insufficient parameters specified 04:31:32 executing program 3: r0 = memfd_create(&(0x7f0000001780)='\xd8\x05V\x15\xa5e\xf1\xb8\xf6\xa2\xba\x85\xb95\x03<\xb9;\xcd\x86\x8bD\xf9\xe9L\xe1Q\xfc\xe2\x97\xa0\xe8s\xb2\x11\xef\x1ac\xc9\x89\xc7\x0fv1\xa1:h\xf6\xf5\a\x8c\xf0Ay\x03\x97\xe77\xc1\xc8\xa6\xcb\xd2\xbe\xe9\xd2\xfb{u\xc3\xcd\xba\xa8G`9\xb5\x82\xa9p\xc8)\xe5$b\v\x8e\b\xf4\xf0\x11\xb4\xcb\"\xf4\xf3\xb4|\xdf\xa3\xdd\x9c\x8a\xf4D\xd3\xea\x11c}\x86H\xca=;i\x96\x183h\xba\x1a\x10', 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000380)='/dev/nullb0\x00', 0x0, 0x0) io_setup(0x1, &(0x7f00000004c0)=0x0) io_submit(r4, 0x8, &(0x7f00000000c0)=[&(0x7f0000000140)={0x3a00402f, 0x2759, 0x10, 0x0, 0x0, r3, &(0x7f0000000000)="98", 0x3e80000000, 0x0, 0x0, 0x2}]) 04:31:32 executing program 5: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'trusted:', 'em1', 0x20, 0xdfc}, 0xfffffffffffffff5, 0xfffffffffffffffd) r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0x1f1, 0xfffffffffffffffe) keyctl$update(0x2, r0, 0x0, 0x0) 04:31:32 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9c73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) 04:31:32 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000240)={{0x2, 0x0, @private=0x5}, {0x6, @link_local}, 0x2, {0x2, 0x0, @dev}}) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000000)={0x0, 'ip6tnl0\x00', 0x1}, 0x18) mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r2, 0x0) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) fsconfig$FSCONFIG_SET_FLAG(r3, 0x6, &(0x7f00000000c0)='posixacl\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'trusted:', 'em1', 0x20, 0xdfc}, 0xfffffffffffffff5, 0xfffffffffffffffd) r5 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0x1f1, 0xfffffffffffffffe) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$update(0x2, r5, &(0x7f0000000000)="9f", 0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, &(0x7f0000000a40)={{{@in6=@dev, @in6=@ipv4={[], [], @initdev}}}, {{@in=@empty}}}, &(0x7f0000000940)=0xfffffff4) r6 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r7, 0x0) 04:31:32 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) fsconfig$FSCONFIG_SET_FLAG(r0, 0x6, &(0x7f00000000c0)='posixacl\x00', 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) r2 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) r4 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dlm-control\x00', 0x501201, 0x0) r5 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCDARP(r5, 0x8953, &(0x7f0000000240)={{0x2, 0x0, @private=0x5}, {0x0, @link_local}, 0x0, {0x2, 0x0, @dev}}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r5, 0x89f3, &(0x7f0000000280)={'tunl0\x00', &(0x7f0000000480)=ANY=[@ANYBLOB="74797a746e6c3000000000000000ff035b000000000000006041ac381089b853a7785f6b887884c6d7ddbb5964255f76fc79d7c0c0fb5ae1d316b51280", @ANYRES32=0x0, @ANYBLOB="0700780000001000000000004d170034006700007f1b907800000000ffffffff89037900441c254000000670d0000000000066a90800100000000006000000092159dc105d1ee31f8817b0832c59f7888e83cd34c22184f309bfb4374ba660663b73ce552fae8511e5018c2371245e13cfde066a8da0b78ca8d2a99c4d339e5b7e5e77112445e231254203b3c2608fcfb74ed76c039279d2b7937a21f9f5d1db0e9912383dd8b30dc7c71112b9f2e6f9b2"]}) bind$can_raw(r4, &(0x7f00000002c0)={0x1d, r6}, 0x10) setsockopt$inet_sctp_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f0000000080)={r3, 0x82000000}, 0x10) r7 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r7, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000000080)={r8, 0x82000000}, 0x10) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000300)={r8, 0x7afb}, &(0x7f0000000340)=0x8) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000000)={r3}, &(0x7f0000000080)=0x8) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) 04:31:32 executing program 5: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'trusted:', 'em1', 0x20, 0xdfc}, 0xfffffffffffffff5, 0xfffffffffffffffd) r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0x1f1, 0xfffffffffffffffe) keyctl$update(0x2, r0, 0x0, 0x0) [ 395.068878][T16476] encrypted_key: insufficient parameters specified 04:31:32 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) fsconfig$FSCONFIG_SET_FLAG(r0, 0x6, &(0x7f00000000c0)='posixacl\x00', 0x0, 0x0) io_uring_register$IORING_REGISTER_PROBE(r0, 0x8, &(0x7f0000000000)={0x0, 0x0, 0x0, [], [{}, {}, {}, {}]}, 0x4) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) 04:31:32 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000240)={{0x2, 0x0, @private=0x5}, {0x6, @link_local}, 0x2, {0x2, 0x0, @dev}}) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000000)={0x0, 'ip6tnl0\x00', 0x1}, 0x18) mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r2, 0x0) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) fsconfig$FSCONFIG_SET_FLAG(r3, 0x6, &(0x7f00000000c0)='posixacl\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'trusted:', 'em1', 0x20, 0xdfc}, 0xfffffffffffffff5, 0xfffffffffffffffd) r5 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0x1f1, 0xfffffffffffffffe) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$update(0x2, r5, &(0x7f0000000000)="9f", 0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, &(0x7f0000000a40)={{{@in6=@dev, @in6=@ipv4={[], [], @initdev}}}, {{@in=@empty}}}, &(0x7f0000000940)=0xfffffff4) r6 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) 04:31:32 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) fsconfig$FSCONFIG_SET_FLAG(r0, 0x6, &(0x7f00000000c0)='posixacl\x00', 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000000000)='batadv\x00') sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r2, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)={0x14, r3, 0x301, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x30, r5, 0x23f, 0x0, 0x0, {{}, {0x0, 0x410c, 0xf0}, {0x14, 0x14, 'broadcast-link\x00'}}}, 0x30}, 0x1, 0xfffffff0}, 0x0) sendmsg$TIPC_CMD_GET_NETID(r2, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x10000400}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, r5, 0x20, 0x70bd27, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x1}, 0x0) r6 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r6, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f0000000080)={r7, 0x82000000}, 0x10) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f0000000100)={r7, 0x5, 0x4}, &(0x7f00000001c0)=0x8) setsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000200)=@assoc_id=r8, 0x4) mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) r9 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsu\x00', 0x440000, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r9, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 04:31:32 executing program 5: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'trusted:', 'em1', 0x20, 0xdfc}, 0xfffffffffffffff5, 0xfffffffffffffffd) r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0x1f1, 0xfffffffffffffffe) keyctl$update(0x2, r0, 0x0, 0x0) 04:31:32 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) perf_event_open(&(0x7f0000001340)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7, 0x3}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) fcntl$addseals(r0, 0x409, 0x2) fsconfig$FSCONFIG_SET_FLAG(r0, 0x6, &(0x7f00000000c0)='posixacl\x00', 0x0, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) fsconfig$FSCONFIG_SET_FLAG(r1, 0x6, &(0x7f00000000c0)='posixacl\x00', 0x0, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) fsconfig$FSCONFIG_SET_FLAG(r2, 0x6, &(0x7f00000000c0)='posixacl\x00', 0x0, 0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(r2, 0x29, 0x2d, &(0x7f0000000080)={0x6, {{0xa, 0x4e23, 0x4a7b, @private1={0xfc, 0x1, [], 0x1}, 0xa}}}, 0x88) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r0, 0xc0145401, &(0x7f00000001c0)={0x2, 0x1, 0x5f, 0x0, 0xff}) 04:31:32 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$batadv(&(0x7f0000000000)='batadv\x00') r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000080)='batadv\x00') sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)={0x14, r1, 0xb00, 0x70bd2c, 0x3, {0xa}}, 0xffffff4f}, 0x1, 0x0, 0x0, 0x2000c010}, 0x80) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) 04:31:33 executing program 3: r0 = memfd_create(&(0x7f0000001780)='\xd8\x05V\x15\xa5e\xf1\xb8\xf6\xa2\xba\x85\xb95\x03<\xb9;\xcd\x86\x8bD\xf9\xe9L\xe1Q\xfc\xe2\x97\xa0\xe8s\xb2\x11\xef\x1ac\xc9\x89\xc7\x0fv1\xa1:h\xf6\xf5\a\x8c\xf0Ay\x03\x97\xe77\xc1\xc8\xa6\xcb\xd2\xbe\xe9\xd2\xfb{u\xc3\xcd\xba\xa8G`9\xb5\x82\xa9p\xc8)\xe5$b\v\x8e\b\xf4\xf0\x11\xb4\xcb\"\xf4\xf3\xb4|\xdf\xa3\xdd\x9c\x8a\xf4D\xd3\xea\x11c}\x86H\xca=;i\x96\x183h\xba\x1a\x10', 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000380)='/dev/nullb0\x00', 0x0, 0x0) io_setup(0x1, &(0x7f00000004c0)=0x0) io_submit(r4, 0x8, &(0x7f00000000c0)=[&(0x7f0000000140)={0x3a004030, 0x2759, 0x10, 0x0, 0x0, r3, &(0x7f0000000000)="98", 0x3e80000000, 0x0, 0x0, 0x2}]) 04:31:33 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000240)={{0x2, 0x0, @private=0x5}, {0x6, @link_local}, 0x2, {0x2, 0x0, @dev}}) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000000)={0x0, 'ip6tnl0\x00', 0x1}, 0x18) mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r2, 0x0) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) fsconfig$FSCONFIG_SET_FLAG(r3, 0x6, &(0x7f00000000c0)='posixacl\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'trusted:', 'em1', 0x20, 0xdfc}, 0xfffffffffffffff5, 0xfffffffffffffffd) r5 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0x1f1, 0xfffffffffffffffe) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$update(0x2, r5, &(0x7f0000000000)="9f", 0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, &(0x7f0000000a40)={{{@in6=@dev, @in6=@ipv4={[], [], @initdev}}}, {{@in=@empty}}}, &(0x7f0000000940)=0xfffffff4) r6 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) 04:31:33 executing program 5: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'trusted:', 'em1', 0x20, 0xdfc}, 0xfffffffffffffff5, 0xfffffffffffffffd) r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0x1f1, 0xfffffffffffffffe) keyctl$update(0x2, r0, &(0x7f0000000000), 0x0) 04:31:33 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) ioctl$SNDRV_CTL_IOCTL_TLV_WRITE(0xffffffffffffffff, 0xc008551b, &(0x7f0000000140)=ANY=[@ANYBLOB="0a40000000000000000f20b5676eb35274810000004e675566a5613a6762"]) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) fsconfig$FSCONFIG_SET_FLAG(r0, 0x6, &(0x7f00000000c0)='posixacl\x00', 0x0, 0x0) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f00000000c0)={0x7fffffff, 0x1000000, "2397b206f7de077cb503605b85d529862df315033c247711", {0xffff, 0x1f}, 0x401}) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) 04:31:33 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) fsconfig$FSCONFIG_SET_FLAG(r0, 0x6, &(0x7f00000000c0)='posixacl\x00', 0x0, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x4e22, @multicast1}}, 0x0, 0x0, 0x2e, 0x0, "0ec1575fdfd0696c9c19c86d094c004a18f9cfc4089421cba82d060450de285df42a6de965725f15926a1fb5324816f7d8ddedd92b66b10ac56a4d48252953a19770a329240979de214a7eb43c90e938"}, 0xd8) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000080)=ANY=[@ANYBLOB="23e9e7105a80b7b957473a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) 04:31:33 executing program 2: ioctl$VIDIOC_SUBDEV_S_SELECTION(0xffffffffffffffff, 0xc040563e, &(0x7f0000000380)={0x1, 0x0, 0x103, 0x2, {0x3, 0xfffffffa, 0x1, 0x5}}) mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000880)='afs\x00', 0x2800012, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, 0x0, &(0x7f00000001c0)) r1 = gettid() ioctl$DRM_IOCTL_AGP_FREE(0xffffffffffffffff, 0x40206435, &(0x7f0000000900)={0x5, 0x0, 0x0, 0x6}) ptrace$setopts(0x4206, r1, 0x0, 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) tkill(r1, 0x17) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ioctl$DRM_IOCTL_GET_CLIENT(0xffffffffffffffff, 0xc0286405, &(0x7f0000000700)={0x756, 0x7, {r1}, {0xee00}, 0x7fffffff, 0x1}) r3 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r4, 0x0) fstat(r0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$afs(&(0x7f0000000000)='afs\x00', &(0x7f0000000080)='./file0\x00', 0x8, 0x7, &(0x7f0000000640)=[{&(0x7f0000000280)="360d6813297ec30eb29aba1d2204d1257d2af6e23300075c4b62614fbfd5844965ccaf3449e0a0daa63b5a18d9c30f45394ca864c7f8820f9d749706f56f2f588ab85e9fe88044cb7920db497eefea00daf8f7a6525b71d42870c734505fa388bdd3fad60ced61e0759a0436ec9aaeecb07f7b70b8a9b4ce8894f7f2fc3c5b263a0475958b3fc61fb9c1763a42dc742eb2c104e86485e6545b70e5af3a060ddf52ce6fda8eef102fcf15009a8fb2f8a818b898b41d15ab38b3015ce93d86b4133ef2d3db20c3988e6b9d3e0ddbbd240ca0ec9a7a4edd2920d2f27414905e4c", 0xdf}, {&(0x7f00000000c0)="047dc0a75d62828e8e03702e5b6db1396e83ef2106b5de9282542fecaeea9d643ae5157bc37eefb7fe4d0ed2e16c1d82d603358961be9c6aaa8c08149ab067cde11e43a5623a9a8e202f5eaf2926daf9f0660f9586dd2f97d64a89c7c7ec51423e6f693d738f", 0x66, 0x100000000}, {&(0x7f0000000380), 0x0, 0x7c}, {&(0x7f00000003c0)="4ac2c347dc2b727bc051bfb33348aa50b1f4439e288684d04b0777c3330ee4b9a685a18e0ce2f832874aff823dbc8ede9e109f0af0490650f4a425eb5ec20ba7d22d28bf923b75b6fee70f0faf3d3de78a2cb4e23f0f8fa282594a0633d7ccf92efc17a3d785bcb1a27cdf5bec697f60c0342b8189bfa5a529b7b0c5bfce2d6dab42f22b8eda8cb224ca7ddc81b8f8d74720f374f4f0c8028eeb93b62093d82b23ecaf70dba04f13c6a6f3c527c58967ef48092eac29e532372b06f645dc883a2cf71887a7b5240ebba90edb13e00c28fdd208a8ba76c8517ad08250e5f14d953f07b10e12abe4b8a127a8a37b75de97a5648eedb2fc", 0xf6}, {&(0x7f00000004c0)="53ad720d8a0befdcc204c49a1c8432e27a82bc1cc7ecba2a102b79d70cb32103f31d2e9916c0f2d3726725aaf243d2db0cd1f3ffdfd14af2d3db7a4224bf9789322bbe3629c9fda9d9c94b1c6dc40135ddb2f5a7ad261f66e496e68a2657d744009ce16f4700aeb94cfcf182f7f34e3d1f727be6de7c92138f2e707f2b11d64de9a5db87fb39a11715fe6cc5e379270001aaa19c5d04f713f25f7307803a638cbbbf05b79aef624e83dfd8315e01", 0xae, 0x7fff}, {&(0x7f0000000580)="25f8b5fb4b79a84faf654b3d7b2e3add09cced7dc0a3c944042099ad47cde3b302f5934d2e8e9b82efa43e584a6c2578e244ddcdcf3b77dfb36780dc99b0360d7bc4e5523b9048", 0x47, 0x80000001}, {&(0x7f0000000600)="d84f60355694128ab49d0aabc01b5ced5cfa45dbc8d0a6e6f07ee42c4924dc866a91dd0d981ab1155b9e813d5ef8c6ea19ad6b578cba87c9b00ba4a73e", 0x3d, 0x7}], 0x10000, &(0x7f00000007c0)={[{@autocell='autocell'}, {@flock_local='flock=local'}, {@autocell='autocell'}], [{@fowner_gt={'fowner>', r2}}, {@hash='hash'}, {@context={'context', 0x3d, 'unconfined_u'}}, {@pcr={'pcr', 0x3d, 0x2a}}, {@appraise_type='appraise_type=imasig'}, {@euid_eq={'euid', 0x3d, r4}}, {@fowner_gt={'fowner>', r5}}]}) socket(0xe, 0x0, 0x6) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000200)={0x0, 'veth1_macvtap\x00'}) [ 395.962574][T16512] encrypted_key: insufficient parameters specified 04:31:33 executing program 5: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'trusted:', 'em1', 0x20, 0xdfc}, 0xfffffffffffffff5, 0xfffffffffffffffd) r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0x1f1, 0xfffffffffffffffe) keyctl$update(0x2, r0, &(0x7f0000000000), 0x0) 04:31:33 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) fsconfig$FSCONFIG_SET_FLAG(r1, 0x6, &(0x7f00000000c0)='posixacl\x00', 0x0, 0x0) ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000340)={0x81, "fab748f099f01914553fd2ea1ad98598b313acc392965b8c8d2af05144f7f472eb46badfc30403ce7c499abfc91294187f9827dcc72305725aac5ee2e5f9c375131bf9bfe609a397b1ceb74ec690082bb59b345543042806ed697c836b913ae8dfb8d2a046c9170fe58c7cfadb64c61000b4570a6fb3dc155aa7a82d9cc0738b85af84fa798d494d94bab4c0f936fdf8a73388bc564c374c552585dee6719ebd8f4d5b65e167442499f5ff275d6ce8657a519860ba22e44e5a1ad2168993fe7a2d083a7e8ce461c3b888150cf0fa0d0389ff705d00d8c3a744ac511830b3ca0a5d2ba8c4e7638f67695d3197e7f8a8483d0000dba1578784f3e52fcb8920b17c2abb35d471955a5c49a49ba25ecb5e6c031dc8ed9d839905186a9c72b5a97273dfad3d0e065c723c8e3e21ace9cb8ed956f056433001f1b052750ef10b4bfb71df8bf0e6a2251f7c9e7273bb9d5563e296256ed74227790dbb29ec79a261367e02f2869efb7444619a797288758ecbd3241b4d7eadab17087fa25c67dec2e9ca714a987d7767bc21d9ec4bcdfe2cceb4a7ef58d4582472a5c915b11698111104ef7117ad82697c87240e0c32961f36032ccf6187dd2cb7cf70236496d977502c000651a7c20ed452cf4b1e9d8de7c5a666118d248f1099f21d41f112a38d7a4c645fb21447e9004be13afd550d1c39b3858a0e2b0074c76b1514fa3e55a7744d"}) fsconfig$FSCONFIG_SET_FLAG(r0, 0x6, &(0x7f00000000c0)='posixacl\x00', 0x0, 0x0) setsockopt$bt_BT_POWER(r0, 0x112, 0x9, &(0x7f0000000100)=0x4c, 0x1) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, &(0x7f0000000280)={@vsock={0x28, 0x0, 0xffffffff, @host}, {&(0x7f0000000080)=""/126, 0x7e}, &(0x7f0000000000), 0x4c}, 0xa0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/qat_adf_ctl\x00', 0x20440, 0x0) getsockopt$inet6_udp_int(r2, 0x11, 0x1, &(0x7f0000000200), &(0x7f0000000580)=0x4) 04:31:33 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000240)={{0x2, 0x0, @private=0x5}, {0x6, @link_local}, 0x2, {0x2, 0x0, @dev}}) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000000)={0x0, 'ip6tnl0\x00', 0x1}, 0x18) mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r2, 0x0) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) fsconfig$FSCONFIG_SET_FLAG(r3, 0x6, &(0x7f00000000c0)='posixacl\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'trusted:', 'em1', 0x20, 0xdfc}, 0xfffffffffffffff5, 0xfffffffffffffffd) r5 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0x1f1, 0xfffffffffffffffe) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$update(0x2, r5, &(0x7f0000000000)="9f", 0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, &(0x7f0000000a40)={{{@in6=@dev, @in6=@ipv4={[], [], @initdev}}}, {{@in=@empty}}}, &(0x7f0000000940)=0xfffffff4) socket(0x10, 0x2, 0x0) [ 396.060577][T16517] kAFS: unable to lookup cell 'éçZ€·¹WG' 04:31:33 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) io_setup(0x6, &(0x7f0000000100)=0x0) io_destroy(r0) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) fsconfig$FSCONFIG_SET_FLAG(r1, 0x6, &(0x7f00000000c0)='posixacl\x00', 0x0, 0x0) ioctl$IMCTRLREQ(r1, 0x80044945, &(0x7f0000000000)={0x20, 0x8001, 0x6, 0x20}) mount(&(0x7f0000000080)=ANY=[@ANYBLOB="23f9e73ac847c8f0db"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) 04:31:33 executing program 5: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'trusted:', 'em1', 0x20, 0xdfc}, 0xfffffffffffffff5, 0xfffffffffffffffd) r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0x1f1, 0xfffffffffffffffe) keyctl$update(0x2, r0, &(0x7f0000000000), 0x0) 04:31:33 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001340)={0x5, 0x70, 0x0, 0x0, 0x5, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23e9e73a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, 0x0, &(0x7f00000001c0)) socket(0x0, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000200)={0x0, 'veth1_macvtap\x00'}) [ 396.326919][T16531] encrypted_key: insufficient parameters specified [ 396.529186][ T2576] ================================================================== [ 396.537572][ T2576] BUG: KASAN: use-after-free in afs_manage_cell+0xf72/0x11c0 [ 396.544951][ T2576] Write of size 8 at addr ffff88808ecf5888 by task kworker/1:2/2576 [ 396.552921][ T2576] [ 396.555258][ T2576] CPU: 1 PID: 2576 Comm: kworker/1:2 Not tainted 5.8.0-syzkaller #0 [ 396.563231][ T2576] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 396.573298][ T2576] Workqueue: afs afs_manage_cell [ 396.578235][ T2576] Call Trace: [ 396.581530][ T2576] dump_stack+0x18f/0x20d [ 396.585863][ T2576] ? afs_manage_cell+0xf72/0x11c0 [ 396.590890][ T2576] ? afs_manage_cell+0xf72/0x11c0 [ 396.595918][ T2576] print_address_description.constprop.0.cold+0xae/0x436 [ 396.602947][ T2576] ? proc_create_net_data+0x14d/0x1b0 [ 396.608327][ T2576] ? vprintk_func+0x97/0x1a6 [ 396.612920][ T2576] ? afs_manage_cell+0xf72/0x11c0 [ 396.617944][ T2576] kasan_report.cold+0x1f/0x37 [ 396.622715][ T2576] ? afs_manage_cell+0xf72/0x11c0 [ 396.627744][ T2576] afs_manage_cell+0xf72/0x11c0 [ 396.632602][ T2576] ? afs_cell_destroy+0x240/0x240 [ 396.637638][ T2576] ? do_raw_spin_lock+0x120/0x2b0 [ 396.642673][ T2576] ? _raw_spin_unlock_irq+0x1f/0x80 [ 396.647874][ T2576] ? lock_is_held_type+0xbb/0xf0 [ 396.652818][ T2576] process_one_work+0x94c/0x1670 [ 396.657766][ T2576] ? lock_release+0x8e0/0x8e0 [ 396.662448][ T2576] ? pwq_dec_nr_in_flight+0x2d0/0x2d0 [ 396.667828][ T2576] ? rwlock_bug.part.0+0x90/0x90 [ 396.672777][ T2576] worker_thread+0x64c/0x1120 [ 396.677468][ T2576] ? __kthread_parkme+0x13f/0x1e0 [ 396.682497][ T2576] ? process_one_work+0x1670/0x1670 [ 396.687698][ T2576] kthread+0x3b5/0x4a0 [ 396.691763][ T2576] ? __kthread_bind_mask+0xc0/0xc0 [ 396.696872][ T2576] ? __kthread_bind_mask+0xc0/0xc0 [ 396.701987][ T2576] ret_from_fork+0x1f/0x30 [ 396.706410][ T2576] [ 396.708734][ T2576] Allocated by task 16538: [ 396.713148][ T2576] save_stack+0x1b/0x40 [ 396.717303][ T2576] __kasan_kmalloc.constprop.0+0xc2/0xd0 [ 396.722931][ T2576] kmem_cache_alloc_trace+0x14f/0x2d0 [ 396.728303][ T2576] afs_lookup_cell+0x5c8/0x1440 [ 396.733150][ T2576] afs_parse_param+0x404/0x8c0 [ 396.737919][ T2576] vfs_parse_fs_param+0x203/0x550 [ 396.742949][ T2576] vfs_parse_fs_string+0xe6/0x150 [ 396.748063][ T2576] do_mount+0x658/0x1fe0 [ 396.752305][ T2576] __x64_sys_mount+0x18f/0x230 [ 396.757067][ T2576] do_syscall_64+0x2d/0x70 [ 396.761482][ T2576] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 396.767360][ T2576] [ 396.769685][ T2576] Freed by task 7033: [ 396.773663][ T2576] save_stack+0x1b/0x40 [ 396.777836][ T2576] __kasan_slab_free+0xf5/0x140 [ 396.782685][ T2576] kfree+0x103/0x2c0 [ 396.786577][ T2576] rcu_core+0x5c7/0x1190 [ 396.790821][ T2576] __do_softirq+0x2de/0xa24 [ 396.795310][ T2576] [ 396.797643][ T2576] The buggy address belongs to the object at ffff88808ecf5800 [ 396.797643][ T2576] which belongs to the cache kmalloc-1k of size 1024 [ 396.811710][ T2576] The buggy address is located 136 bytes inside of [ 396.811710][ T2576] 1024-byte region [ffff88808ecf5800, ffff88808ecf5c00) [ 396.825160][ T2576] The buggy address belongs to the page: [ 396.830802][ T2576] page:ffffea00023b3d40 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 [ 396.839909][ T2576] flags: 0xfffe0000000200(slab) [ 396.844768][ T2576] raw: 00fffe0000000200 ffffea0002896a48 ffffea0002784e88 ffff8880aa000c40 [ 396.853359][ T2576] raw: 0000000000000000 ffff88808ecf5000 0000000100000002 0000000000000000 [ 396.861941][ T2576] page dumped because: kasan: bad access detected [ 396.868349][ T2576] [ 396.870673][ T2576] Memory state around the buggy address: [ 396.876307][ T2576] ffff88808ecf5780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 396.884365][ T2576] ffff88808ecf5800: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 396.892437][ T2576] >ffff88808ecf5880: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 396.900485][ T2576] ^ [ 396.904817][ T2576] ffff88808ecf5900: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 396.912881][ T2576] ffff88808ecf5980: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 396.920937][ T2576] ================================================================== [ 396.928995][ T2576] Disabling lock debugging due to kernel taint [ 396.971148][ T2576] Kernel panic - not syncing: panic_on_warn set ... [ 396.977771][ T2576] CPU: 1 PID: 2576 Comm: kworker/1:2 Tainted: G B 5.8.0-syzkaller #0 [ 396.987134][ T2576] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 396.997199][ T2576] Workqueue: afs afs_manage_cell [ 397.002130][ T2576] Call Trace: [ 397.005424][ T2576] dump_stack+0x18f/0x20d [ 397.009760][ T2576] ? afs_manage_cell+0xef0/0x11c0 [ 397.014899][ T2576] panic+0x2e3/0x75c [ 397.018797][ T2576] ? __warn_printk+0xf3/0xf3 [ 397.023388][ T2576] ? preempt_schedule_common+0x59/0xc0 [ 397.028847][ T2576] ? afs_manage_cell+0xf72/0x11c0 [ 397.033863][ T2576] ? preempt_schedule_thunk+0x16/0x18 [ 397.039228][ T2576] ? trace_hardirqs_on+0x55/0x220 [ 397.044260][ T2576] ? afs_manage_cell+0xf72/0x11c0 [ 397.049283][ T2576] ? afs_manage_cell+0xf72/0x11c0 [ 397.054304][ T2576] end_report+0x4d/0x53 [ 397.058456][ T2576] kasan_report.cold+0xd/0x37 [ 397.063133][ T2576] ? afs_manage_cell+0xf72/0x11c0 [ 397.068166][ T2576] afs_manage_cell+0xf72/0x11c0 [ 397.073028][ T2576] ? afs_cell_destroy+0x240/0x240 [ 397.078051][ T2576] ? do_raw_spin_lock+0x120/0x2b0 [ 397.083077][ T2576] ? _raw_spin_unlock_irq+0x1f/0x80 [ 397.088280][ T2576] ? lock_is_held_type+0xbb/0xf0 [ 397.093220][ T2576] process_one_work+0x94c/0x1670 [ 397.098161][ T2576] ? lock_release+0x8e0/0x8e0 [ 397.102836][ T2576] ? pwq_dec_nr_in_flight+0x2d0/0x2d0 [ 397.108203][ T2576] ? rwlock_bug.part.0+0x90/0x90 [ 397.113140][ T2576] worker_thread+0x64c/0x1120 [ 397.117812][ T2576] ? __kthread_parkme+0x13f/0x1e0 [ 397.122834][ T2576] ? process_one_work+0x1670/0x1670 [ 397.128032][ T2576] kthread+0x3b5/0x4a0 [ 397.132097][ T2576] ? __kthread_bind_mask+0xc0/0xc0 [ 397.137208][ T2576] ? __kthread_bind_mask+0xc0/0xc0 [ 397.142337][ T2576] ret_from_fork+0x1f/0x30 [ 397.147959][ T2576] Kernel Offset: disabled [ 397.152273][ T2576] Rebooting in 86400 seconds..