8b6be66ea", 0x11}], 0x1}}, {{&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000002c0)=[{&(0x7f0000000040)="70a6b8247e016ae2647a2e703fce46c432e37d1dffd332a793d4b9e3617386d153", 0x21}, {&(0x7f0000000200)="09f96fbf33ceccc10976cd10b1411ee57d092fd5b7f95a0f19f01005f110463ccb2c6ebdb74ad7a7da1a2bed233154886db68984d477ebee11ce9a8e3510d401f6f31ea0a7e3ec1cda7b95f7a02b42753eb4cf0bbf5afbc7084f9bc2603aafe5da6cd54e4d647ec9fd641e4241513aaf23481d1f390bbb83dfae56369f4b03367ccd45f0ec4cd929aed127394157e7b3794500c0c5f88930b1ff50bbae1163c26fff28d06028", 0xa6}, {&(0x7f0000000100)="38d6cd435749d519cc39e90540f37c4f5c6bceef6c4ae07105cafc5e25d9bbfce859670b89666cca0857aa0c2abd8722a9db0caad3905e3ff682", 0x3a}, {&(0x7f0000000140)="d71206abd00e3c0a7e2440673da6a9fc2c1255a9b136bc982a3dc2ac21ef167250c176acfbd4d13abd86b018e8b1357842d8dc93e53f6b542e9633e1db8672e8", 0x40}], 0x4}}, {{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000380)="df304451b990364b1c6ff9c843eb47125c0a16565b5efbc0494b453f9863364196a743b5d226d34b2293f3b4b8dde4b8434172dec0902f0e03c2893c2bfd5f662eefc2902850a0221d55", 0x200003ca}, {&(0x7f0000000400)}], 0x2, &(0x7f0000000540)=[@ip_tos_u8={{0x11}}, @ip_ttl={{0x14}}, @ip_ttl={{0x14}}, @ip_tos_u8={{0x11}}], 0x60}}], 0x3, 0x0) r6 = socket$alg(0x26, 0x5, 0x0) bind$alg(r6, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r7 = accept4(r6, 0x0, 0x0, 0x0) sendmmsg$inet(r7, &(0x7f0000000680)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f00000000c0)="5831255624c13e4c563f221188b6be66ea", 0x11}], 0x1}}, {{&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000002c0)=[{&(0x7f0000000040)="70a6b8247e016ae2647a2e703fce46c432e37d1dffd332a793d4b9e3617386d153", 0x21}, {&(0x7f0000000200)="09f96fbf33ceccc10976cd10b1411ee57d092fd5b7f95a0f19f01005f110463ccb2c6ebdb74ad7a7da1a2bed233154886db68984d477ebee11ce9a8e3510d401f6f31ea0a7e3ec1cda7b95f7a02b42753eb4cf0bbf5afbc7084f9bc2603aafe5da6cd54e4d647ec9fd641e4241513aaf23481d1f390bbb83dfae56369f4b03367ccd45f0ec4cd929aed127394157e7b3794500c0c5f88930b1ff50bbae1163c26fff28d06028", 0xa6}, {&(0x7f0000000100)="38d6cd435749d519cc39e90540f37c4f5c6bceef6c4ae07105cafc5e25d9bbfce859670b89666cca0857aa0c2abd8722a9db0caad3905e3ff682", 0x3a}, {&(0x7f0000000140)="d71206abd00e3c0a7e2440673da6a9fc2c1255a9b136bc982a3dc2ac21ef167250c176acfbd4d13abd86b018e8b1357842d8dc93e53f6b542e9633e1db8672e8", 0x40}], 0x4}}, {{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000380)="df304451b990364b1c6ff9c843eb47125c0a16565b5efbc0494b453f9863364196a743b5d226d34b2293f3b4b8dde4b8434172dec0902f0e03c2893c2bfd5f662eefc2902850a0221d55", 0x200003ca}, {&(0x7f0000000400)}], 0x2, &(0x7f0000000540)=[@ip_tos_u8={{0x11}}, @ip_ttl={{0x14}}, @ip_ttl={{0x14}}, @ip_tos_u8={{0x11}}], 0x60}}], 0x3, 0x0) r8 = socket$alg(0x26, 0x5, 0x0) bind$alg(r8, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r8, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c81", 0x10) r9 = socket$alg(0x26, 0x5, 0x0) bind$alg(r9, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r10 = accept4(r9, 0x0, 0x0, 0x0) sendmmsg$inet(r10, &(0x7f0000000680)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f00000000c0)="5831255624c13e4c563f221188b6be66ea", 0x11}], 0x1}}, {{&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000002c0)=[{&(0x7f0000000040)="70a6b8247e016ae2647a2e703fce46c432e37d1dffd332a793d4b9e3617386d153", 0x21}, {&(0x7f0000000200)="09f96fbf33ceccc10976cd10b1411ee57d092fd5b7f95a0f19f01005f110463ccb2c6ebdb74ad7a7da1a2bed233154886db68984d477ebee11ce9a8e3510d401f6f31ea0a7e3ec1cda7b95f7a02b42753eb4cf0bbf5afbc7084f9bc2603aafe5da6cd54e4d647ec9fd641e4241513aaf23481d1f390bbb83dfae56369f4b03367ccd45f0ec4cd929aed127394157e7b3794500c0c5f88930b1ff50bbae1163c26fff28d06028", 0xa6}, {&(0x7f0000000100)="38d6cd435749d519cc39e90540f37c4f5c6bceef6c4ae07105cafc5e25d9bbfce859670b89666cca0857aa0c2abd8722a9db0caad3905e3ff682", 0x3a}, {&(0x7f0000000140)="d71206abd00e3c0a7e2440673da6a9fc2c1255a9b136bc982a3dc2ac21ef167250c176acfbd4d13abd86b018e8b1357842d8dc93e53f6b542e9633e1db8672e8", 0x40}], 0x4}}, {{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000380)="df304451b990364b1c6ff9c843eb47125c0a16565b5efbc0494b453f9863364196a743b5d226d34b2293f3b4b8dde4b8434172dec0902f0e03c2893c2bfd5f662eefc2902850a0221d55", 0x200003ca}, {&(0x7f0000000400)}], 0x2, &(0x7f0000000540)=[@ip_tos_u8={{0x11}}, @ip_ttl={{0x14}}, @ip_ttl={{0x14}}, @ip_tos_u8={{0x11}}], 0x60}}], 0x3, 0x0) r11 = socket(0x0, 0x80002, 0x0) ioctl(r11, 0x1000008912, &(0x7f00000000c0)="080db5055e0bcfe8696071") r12 = socket$alg(0x26, 0x5, 0x0) bind$alg(r12, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) accept4(r12, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r12, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c81", 0x10) r13 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0x22, &(0x7f0000000940)=ANY=[@ANYBLOB="b7020000f7ffff8cbfa70000000000002402000020feffff7a0af0fff8ffffff69a4f0ff00000000b70600000018d1fe2d6405000000000075110000000000000704000000000000b7040000100000206a0700fe00000000850000002f000000b70000000a0000009500000000000000e535f8a63796c113a80c19aab9d607000000b6cd483be3f0d3253730e711f5969f62c28b22756bedf3cf393d14c46cc4f79fd2b316da4f0de8163f6242fa732300000637c48468766af540439fce41f144631ac262dcae18c3d1a1fbe96dd87235b44174f7c0343185089a0f119e31975e551558055dc2dc000000018000000000", @ANYRES16=0x0, @ANYPTR64=&(0x7f00000002c0)=ANY=[@ANYRESOCT=0x0, @ANYRESHEX, @ANYRES16, @ANYRES16, @ANYRES32=0x0, @ANYRES64, @ANYRES16=r2, @ANYRES16, @ANYRES32=r11], @ANYRESHEX=r10, @ANYPTR64=&(0x7f0000000400)=ANY=[@ANYRES32=0x0, @ANYPTR64, @ANYRES16, @ANYPTR, @ANYRESDEC=r8, @ANYBLOB="7c1170a48ac0783cfbd50593111fa807f604cadd35d5062dada79fcbacb2abe1b3e82f2f4af6080000004dea30f8f191570c42fb36a37374f9683518a6c372a08cccbae4efedc13614426870ff60902e91fcd2b681e1cd57fb31cba12c25a83550132833abc231058af9d244ddf4fd8f42aaafa5371a21de9cf157b1a357bee673f46044141b1eb5d8112f249b1b0b2c22dc1242d40e2b1037c42b63090c7f9f4c5d0a455d326874cc1081fdfa1e7210588dd819eb", @ANYRES16=r4]], &(0x7f0000000340)='syzkaller\x00', 0x800000, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x3}, 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) r14 = socket$kcm(0x11, 0x8000000002, 0x300) setsockopt$sock_attach_bpf(r14, 0x1, 0x32, &(0x7f0000000540)=r13, 0x4) socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r17 = socket$inet_udplite(0x2, 0x2, 0x88) r18 = fcntl$dupfd(r16, 0x0, r17) ioctl$PERF_EVENT_IOC_ENABLE(r18, 0x8912, 0x400200) ioctl$SNDRV_PCM_IOCTL_READI_FRAMES(r18, 0x80184151, &(0x7f00000001c0)={0x0, &(0x7f0000000080)="420ace8df95963493d0da3eb92245f909c69586a0d33ce2534f36ed10fbde4db4b5667c3ae15d27019d3828b6ff3ff248271a9bcd51c46be92444b6f00c77a4c1635592e9e7ad9482f09f8ffb56e01316fb555b71abf30714c0f94b8b00318548f09a2e5de4c4c8d3df1c65d31ad24ccb3338c0fab4539efe6b87d36d344818e7035", 0x82}) r19 = socket$inet_udplite(0x2, 0x2, 0x88) r20 = fcntl$dupfd(r15, 0x0, r19) ioctl$PERF_EVENT_IOC_ENABLE(r20, 0x8912, 0x400200) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') [ 1313.467990][ T6848] kAFS: unparsable volume name [ 1313.508985][ T6848] kAFS: unparsable volume name 09:32:58 executing program 2: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f00000015c0)=ANY=[@ANYBLOB='%'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x7000000, 0x0) 09:32:58 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f0000000340)=ANY=[@ANYBLOB="b7020000f7ffffffbfa70000000000002402000020feffff7a0af0fff8ffffff69a4f0ff00000000b70600000018d1fe2d6405000000000075040000000000000704000000000000b7040000100000206a0700fe00000000850000002f000000b70000000a0000009500000000000000e535f8a62fc2868f0399d909a63796c113a80c19aab9d607000000b6cd483be3f0d3253730e711f5969f62c28b22756bedf3cf393d14c46cc4f79fd2b316da4f0de8163f6242fa732300000637c48468766af540439fce41f144631ac262dcae18c3d1a1fbe96dd87235b44174f7c0343185089a0f119e31975e551558055dc2dc"], &(0x7f0000000280)='GPL\x00'}, 0x48) r1 = socket$kcm(0x11, 0x8000000002, 0x300) socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000540)=r0, 0x4) syz_emit_ethernet(0xfffffdef, &(0x7f0000000000)={@broadcast, @random="96c1e9574b31", @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x1, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @local}, @time_exceeded={0xb, 0x0, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local, @multicast2}}}}}}, 0x0) 09:32:58 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) accept(0xffffffffffffffff, &(0x7f0000000100)=@ethernet={0x0, @broadcast}, &(0x7f0000000040)=0x80) mount(&(0x7f0000000000)=ANY=[@ANYRES32], &(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000080)='ext4\x00', 0x20a4000, 0x0) [ 1313.751860][ T7165] kAFS: unparsable volume name 09:32:59 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f0000000140)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x2, 0x1, 0x0, 0x1000, &(0x7f0000000000/0x1000)=nil}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x40000004, 0x0, 0x0, 0x0, 0x4cb]}) ioctl$sock_SIOCGIFVLAN_SET_VLAN_NAME_TYPE_CMD(0xffffffffffffffff, 0x8982, &(0x7f00000000c0)={0x6, 'hsr0\x00', {0x81}, 0x3}) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x12, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 09:32:59 executing program 2: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f00000015c0)=ANY=[@ANYBLOB='%'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x8000000, 0x0) 09:32:59 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000180), 0x10) socketpair(0x8000000000001e, 0x805, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) getpeername$packet(r1, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000100)=0x14) sendmsg$can_bcm(r0, &(0x7f00000002c0)={&(0x7f0000000140)={0x1d, r2}, 0x10, &(0x7f0000000280)={&(0x7f0000000200)={0x0, 0x0, 0x0, {0x0, 0x2710}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "55e19dc0c30616da"}}, 0x48}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2000140}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)=@delchain={0x44, 0x65, 0x200, 0x70bd26, 0x25dfdbfd, {0x0, 0x0, 0x0, r2, {0x8, 0xf}, {0x1ffe8, 0xc}, {0xb, 0xd}}, [@filter_kind_options=@f_flow={{0x9, 0x1, 'flow\x00'}, {0x14, 0x2, [@TCA_FLOW_ADDEND={0x8}, @TCA_FLOW_KEYS={0x8, 0x1, 0x9da}]}}]}, 0x44}, 0x1, 0x0, 0x0, 0x48080}, 0x4004020) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="1159aff24f1c68"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000000)='rootfs\x00', 0x0, 0x0) 09:32:59 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f0000000340)=ANY=[@ANYBLOB="b7020000f7ffffffbfa70000000000002402000020feffff7a0af0fff8ffffff69a4f0ff00000000b70600000018d1fe2d6405000000000075040000000000000704000000000000b7040000100000206a0700fe00000000850000002f000000b70000000a0000009500000000000000e535f8a62fc2868f0399d909a63796c113a80c19aab9d607000000b6cd483be3f0d3253730e711f5969f62c28b22756bedf3cf393d14c46cc4f79fd2b316da4f0de8163f6242fa732300000637c48468766af540439fce41f144631ac262dcae18c3d1a1fbe96dd87235b44174f7c0343185089a0f119e31975e551558055dc2dc"], &(0x7f0000000280)='GPL\x00'}, 0x48) r1 = socket$kcm(0x11, 0x8000000002, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000540)=r0, 0x4) socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = fcntl$dupfd(r2, 0x0, r3) r5 = socket$alg(0x26, 0x5, 0x0) bind$alg(r5, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r6 = accept4(r5, 0x0, 0x0, 0x0) sendmmsg$inet(r6, &(0x7f0000000680)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f00000000c0)="5831255624c13e4c563f221188b6be66ea", 0x11}], 0x1}}, {{&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000002c0)=[{&(0x7f0000000040)="70a6b8247e016ae2647a2e703fce46c432e37d1dffd332a793d4b9e3617386d153", 0x21}, {&(0x7f0000000200)="09f96fbf33ceccc10976cd10b1411ee57d092fd5b7f95a0f19f01005f110463ccb2c6ebdb74ad7a7da1a2bed233154886db68984d477ebee11ce9a8e3510d401f6f31ea0a7e3ec1cda7b95f7a02b42753eb4cf0bbf5afbc7084f9bc2603aafe5da6cd54e4d647ec9fd641e4241513aaf23481d1f390bbb83dfae56369f4b03367ccd45f0ec4cd929aed127394157e7b3794500c0c5f88930b1ff50bbae1163c26fff28d06028", 0xa6}, {&(0x7f0000000100)="38d6cd435749d519cc39e90540f37c4f5c6bceef6c4ae07105cafc5e25d9bbfce859670b89666cca0857aa0c2abd8722a9db0caad3905e3ff682", 0x3a}, {&(0x7f0000000140)="d71206abd00e3c0a7e2440673da6a9fc2c1255a9b136bc982a3dc2ac21ef167250c176acfbd4d13abd86b018e8b1357842d8dc93e53f6b542e9633e1db8672e8", 0x40}], 0x4}}, {{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000380)="df304451b990364b1c6ff9c843eb47125c0a16565b5efbc0494b453f9863364196a743b5d226d34b2293f3b4b8dde4b8434172dec0902f0e03c2893c2bfd5f662eefc2902850a0221d55", 0x200003ca}, {&(0x7f0000000400)}], 0x2, &(0x7f0000000540)=[@ip_tos_u8={{0x11}}, @ip_ttl={{0x14}}, @ip_ttl={{0x14}}, @ip_tos_u8={{0x11}}], 0x60}}], 0x3, 0x0) r7 = socket(0x0, 0x80002, 0x0) ioctl(r7, 0x1000008912, &(0x7f00000000c0)="080db5055e0bcfe8696071") getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r7, 0x84, 0x76, &(0x7f0000000040)={0x0}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r6, 0x84, 0x71, &(0x7f0000000100)={r8, 0x8}, &(0x7f00000001c0)=0x8) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00') [ 1314.004401][ T7376] kAFS: unparsable volume name 09:32:59 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f0000000340)=ANY=[@ANYBLOB="b7020000f7ffffffbfa70000000000002402000020feffff7a0af0fff8ffffff69a4f0ff00000000b70600000018d1fe2d6405000000000075040000000000000704000000000000b7040000100000206a0700fe00000000850000002f000000b70000000a0000009500000000000000e535f8a62fc2868f0399d909a63796c113a80c19aab9d607000000b6cd483be3f0d3253730e711f5969f62c28b22756bedf3cf393d14c46cc4f79fd2b316da4f0de8163f6242fa732300000637c48468766af540439fce41f144631ac262dcae18c3d1a1fbe96dd87235b44174f7c0343185089a0f119e31975e551558055dc2dc"], &(0x7f0000000280)='GPL\x00'}, 0x48) r1 = socket$kcm(0x11, 0x8000000002, 0x300) socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000540)=r0, 0x4) syz_emit_ethernet(0xfffffffffffffdef, &(0x7f0000000000)={@broadcast, @random="96c1e9574b31", @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x1, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @local}, @time_exceeded={0xb, 0x0, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local, @multicast2}}}}}}, 0x0) 09:32:59 executing program 2: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f00000015c0)=ANY=[@ANYBLOB='%'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x10000000, 0x0) 09:32:59 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket(0x0, 0x80002, 0x0) ioctl(r2, 0x1000008912, &(0x7f00000000c0)="080db5055e0bcfe8696071") r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r4 = accept4(r3, 0x0, 0x0, 0x0) sendmmsg$inet(r4, &(0x7f0000000680)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f00000000c0)="5831255624c13e4c563f221188b6be66ea", 0x11}], 0x1}}, {{&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000002c0)=[{&(0x7f0000000040)="70a6b8247e016ae2647a2e703fce46c432e37d1dffd332a793d4b9e3617386d153", 0x21}, {&(0x7f0000000200)="09f96fbf33ceccc10976cd10b1411ee57d092fd5b7f95a0f19f01005f110463ccb2c6ebdb74ad7a7da1a2bed233154886db68984d477ebee11ce9a8e3510d401f6f31ea0a7e3ec1cda7b95f7a02b42753eb4cf0bbf5afbc7084f9bc2603aafe5da6cd54e4d647ec9fd641e4241513aaf23481d1f390bbb83dfae56369f4b03367ccd45f0ec4cd929aed127394157e7b3794500c0c5f88930b1ff50bbae1163c26fff28d06028", 0xa6}, {&(0x7f0000000100)="38d6cd435749d519cc39e90540f37c4f5c6bceef6c4ae07105cafc5e25d9bbfce859670b89666cca0857aa0c2abd8722a9db0caad3905e3ff682", 0x3a}, {&(0x7f0000000140)="d71206abd00e3c0a7e2440673da6a9fc2c1255a9b136bc982a3dc2ac21ef167250c176acfbd4d13abd86b018e8b1357842d8dc93e53f6b542e9633e1db8672e8", 0x40}], 0x4}}, {{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000380)="df304451b990364b1c6ff9c843eb47125c0a16565b5efbc0494b453f9863364196a743b5d226d34b2293f3b4b8dde4b8434172dec0902f0e03c2893c2bfd5f662eefc2902850a0221d55", 0x200003ca}, {&(0x7f0000000400)}], 0x2, &(0x7f0000000540)=[@ip_tos_u8={{0x11}}, @ip_ttl={{0x14}}, @ip_ttl={{0x14}}, @ip_tos_u8={{0x11}}], 0x60}}], 0x3, 0x0) r5 = syz_open_dev$sg(&(0x7f00000005c0)='/dev/sg#\x00', 0xd0cd, 0x880881) r6 = getpgid(0x0) r7 = socket$alg(0x26, 0x5, 0x0) bind$alg(r7, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r8 = accept4(r7, 0x0, 0x0, 0x0) sendmmsg$inet(r8, &(0x7f0000000680)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f00000000c0)="5831255624c13e4c563f221188b6be66ea", 0x11}], 0x1}}, {{&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000002c0)=[{&(0x7f0000000040)="70a6b8247e016ae2647a2e703fce46c432e37d1dffd332a793d4b9e3617386d153", 0x21}, {&(0x7f0000000200)="09f96fbf33ceccc10976cd10b1411ee57d092fd5b7f95a0f19f01005f110463ccb2c6ebdb74ad7a7da1a2bed233154886db68984d477ebee11ce9a8e3510d401f6f31ea0a7e3ec1cda7b95f7a02b42753eb4cf0bbf5afbc7084f9bc2603aafe5da6cd54e4d647ec9fd641e4241513aaf23481d1f390bbb83dfae56369f4b03367ccd45f0ec4cd929aed127394157e7b3794500c0c5f88930b1ff50bbae1163c26fff28d06028", 0xa6}, {&(0x7f0000000100)="38d6cd435749d519cc39e90540f37c4f5c6bceef6c4ae07105cafc5e25d9bbfce859670b89666cca0857aa0c2abd8722a9db0caad3905e3ff682", 0x3a}, {&(0x7f0000000140)="d71206abd00e3c0a7e2440673da6a9fc2c1255a9b136bc982a3dc2ac21ef167250c176acfbd4d13abd86b018e8b1357842d8dc93e53f6b542e9633e1db8672e8", 0x40}], 0x4}}, {{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000380)="df304451b990364b1c6ff9c843eb47125c0a16565b5efbc0494b453f9863364196a743b5d226d34b2293f3b4b8dde4b8434172dec0902f0e03c2893c2bfd5f662eefc2902850a0221d55", 0x200003ca}, {&(0x7f0000000400)}], 0x2, &(0x7f0000000540)=[@ip_tos_u8={{0x11}}, @ip_ttl={{0x14}}, @ip_ttl={{0x14}}, @ip_tos_u8={{0x11}}], 0x60}}], 0x3, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r8, 0x0, 0x10, &(0x7f0000000600)={{{@in6=@initdev, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in6=@remote}}, &(0x7f0000000700)=0xe8) r10 = getegid() chown(&(0x7f0000000140)='./file0\x00', 0x0, r10) r11 = getpid() sched_setscheduler(r11, 0x5, &(0x7f0000000380)) r12 = socket$inet_tcp(0x2, 0x1, 0x0) r13 = fcntl$dupfd(r12, 0x0, r12) getsockopt$sock_cred(r13, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) setresuid(r14, r14, 0x0) r15 = getegid() chown(&(0x7f0000000140)='./file0\x00', 0x0, r15) r16 = getegid() chown(&(0x7f0000000140)='./file0\x00', 0x0, r16) r17 = getegid() chown(&(0x7f0000000140)='./file0\x00', 0x0, r17) r18 = getegid() chown(&(0x7f0000000140)='./file0\x00', 0x0, r18) r19 = getegid() chown(&(0x7f0000000140)='./file0\x00', 0x0, r19) getgroups(0x7, &(0x7f0000000740)=[r15, 0x0, r16, r17, r18, 0xffffffffffffffff, r19]) r21 = socket$alg(0x26, 0x5, 0x0) bind$alg(r21, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r22 = accept4(r21, 0x0, 0x0, 0x0) sendmmsg$inet(r22, &(0x7f0000000680)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f00000000c0)="5831255624c13e4c563f221188b6be66ea", 0x11}], 0x1}}, {{&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000002c0)=[{&(0x7f0000000040)="70a6b8247e016ae2647a2e703fce46c432e37d1dffd332a793d4b9e3617386d153", 0x21}, {&(0x7f0000000200)="09f96fbf33ceccc10976cd10b1411ee57d092fd5b7f95a0f19f01005f110463ccb2c6ebdb74ad7a7da1a2bed233154886db68984d477ebee11ce9a8e3510d401f6f31ea0a7e3ec1cda7b95f7a02b42753eb4cf0bbf5afbc7084f9bc2603aafe5da6cd54e4d647ec9fd641e4241513aaf23481d1f390bbb83dfae56369f4b03367ccd45f0ec4cd929aed127394157e7b3794500c0c5f88930b1ff50bbae1163c26fff28d06028", 0xa6}, {&(0x7f0000000100)="38d6cd435749d519cc39e90540f37c4f5c6bceef6c4ae07105cafc5e25d9bbfce859670b89666cca0857aa0c2abd8722a9db0caad3905e3ff682", 0x3a}, {&(0x7f0000000140)="d71206abd00e3c0a7e2440673da6a9fc2c1255a9b136bc982a3dc2ac21ef167250c176acfbd4d13abd86b018e8b1357842d8dc93e53f6b542e9633e1db8672e8", 0x40}], 0x4}}, {{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000380)="df304451b990364b1c6ff9c843eb47125c0a16565b5efbc0494b453f9863364196a743b5d226d34b2293f3b4b8dde4b8434172dec0902f0e03c2893c2bfd5f662eefc2902850a0221d55", 0x200003ca}, {&(0x7f0000000400)}], 0x2, &(0x7f0000000540)=[@ip_tos_u8={{0x11}}, @ip_ttl={{0x14}}, @ip_ttl={{0x14}}, @ip_tos_u8={{0x11}}], 0x60}}], 0x3, 0x0) r23 = socket(0x0, 0x80002, 0x0) ioctl(r23, 0x1000008912, &(0x7f00000000c0)="080db5055e0bcfe8696071") r24 = socket(0x0, 0x80002, 0x0) ioctl(r24, 0x1000008912, &(0x7f00000000c0)="080db5055e0bcfe8696071") r25 = socket$alg(0x26, 0x5, 0x0) bind$alg(r25, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r26 = accept4(r25, 0x0, 0x0, 0x0) sendmmsg$inet(r26, &(0x7f0000000680)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f00000000c0)="5831255624c13e4c563f221188b6be66ea", 0x11}], 0x1}}, {{&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000002c0)=[{&(0x7f0000000040)="70a6b8247e016ae2647a2e703fce46c432e37d1dffd332a793d4b9e3617386d153", 0x21}, {&(0x7f0000000200)="09f96fbf33ceccc10976cd10b1411ee57d092fd5b7f95a0f19f01005f110463ccb2c6ebdb74ad7a7da1a2bed233154886db68984d477ebee11ce9a8e3510d401f6f31ea0a7e3ec1cda7b95f7a02b42753eb4cf0bbf5afbc7084f9bc2603aafe5da6cd54e4d647ec9fd641e4241513aaf23481d1f390bbb83dfae56369f4b03367ccd45f0ec4cd929aed127394157e7b3794500c0c5f88930b1ff50bbae1163c26fff28d06028", 0xa6}, {&(0x7f0000000100)="38d6cd435749d519cc39e90540f37c4f5c6bceef6c4ae07105cafc5e25d9bbfce859670b89666cca0857aa0c2abd8722a9db0caad3905e3ff682", 0x3a}, {&(0x7f0000000140)="d71206abd00e3c0a7e2440673da6a9fc2c1255a9b136bc982a3dc2ac21ef167250c176acfbd4d13abd86b018e8b1357842d8dc93e53f6b542e9633e1db8672e8", 0x40}], 0x4}}, {{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000380)="df304451b990364b1c6ff9c843eb47125c0a16565b5efbc0494b453f9863364196a743b5d226d34b2293f3b4b8dde4b8434172dec0902f0e03c2893c2bfd5f662eefc2902850a0221d55", 0x200003ca}, {&(0x7f0000000400)}], 0x2, &(0x7f0000000540)=[@ip_tos_u8={{0x11}}, @ip_ttl={{0x14}}, @ip_ttl={{0x14}}, @ip_tos_u8={{0x11}}], 0x60}}], 0x3, 0x0) r27 = socket(0x0, 0x80002, 0x0) ioctl(r27, 0x1000008912, &(0x7f00000000c0)="080db5055e0bcfe8696071") r28 = socket$alg(0x26, 0x5, 0x0) bind$alg(r28, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r29 = accept4(r28, 0x0, 0x0, 0x0) sendmmsg$inet(r29, &(0x7f0000000680)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f00000000c0)="5831255624c13e4c563f221188b6be66ea", 0x11}], 0x1}}, {{&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000002c0)=[{&(0x7f0000000040)="70a6b8247e016ae2647a2e703fce46c432e37d1dffd332a793d4b9e3617386d153", 0x21}, {&(0x7f0000000200)="09f96fbf33ceccc10976cd10b1411ee57d092fd5b7f95a0f19f01005f110463ccb2c6ebdb74ad7a7da1a2bed233154886db68984d477ebee11ce9a8e3510d401f6f31ea0a7e3ec1cda7b95f7a02b42753eb4cf0bbf5afbc7084f9bc2603aafe5da6cd54e4d647ec9fd641e4241513aaf23481d1f390bbb83dfae56369f4b03367ccd45f0ec4cd929aed127394157e7b3794500c0c5f88930b1ff50bbae1163c26fff28d06028", 0xa6}, {&(0x7f0000000100)="38d6cd435749d519cc39e90540f37c4f5c6bceef6c4ae07105cafc5e25d9bbfce859670b89666cca0857aa0c2abd8722a9db0caad3905e3ff682", 0x3a}, {&(0x7f0000000140)="d71206abd00e3c0a7e2440673da6a9fc2c1255a9b136bc982a3dc2ac21ef167250c176acfbd4d13abd86b018e8b1357842d8dc93e53f6b542e9633e1db8672e8", 0x40}], 0x4}}, {{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000380)="df304451b990364b1c6ff9c843eb47125c0a16565b5efbc0494b453f9863364196a743b5d226d34b2293f3b4b8dde4b8434172dec0902f0e03c2893c2bfd5f662eefc2902850a0221d55", 0x200003ca}, {&(0x7f0000000400)}], 0x2, &(0x7f0000000540)=[@ip_tos_u8={{0x11}}, @ip_ttl={{0x14}}, @ip_ttl={{0x14}}, @ip_tos_u8={{0x11}}], 0x60}}], 0x3, 0x0) r30 = socket(0x0, 0x80002, 0x0) ioctl(r30, 0x1000008912, &(0x7f00000000c0)="080db5055e0bcfe8696071") r31 = socket(0x0, 0x80002, 0x0) ioctl(r31, 0x1000008912, &(0x7f00000000c0)="080db5055e0bcfe8696071") r32 = socket$alg(0x26, 0x5, 0x0) bind$alg(r32, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) accept4(r32, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r32, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c81", 0x10) r33 = socket$alg(0x26, 0x5, 0x0) bind$alg(r33, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r34 = accept4(r33, 0x0, 0x0, 0x0) sendmmsg$inet(r34, &(0x7f0000000680)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f00000000c0)="5831255624c13e4c563f221188b6be66ea", 0x11}], 0x1}}, {{&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000002c0)=[{&(0x7f0000000040)="70a6b8247e016ae2647a2e703fce46c432e37d1dffd332a793d4b9e3617386d153", 0x21}, {&(0x7f0000000200)="09f96fbf33ceccc10976cd10b1411ee57d092fd5b7f95a0f19f01005f110463ccb2c6ebdb74ad7a7da1a2bed233154886db68984d477ebee11ce9a8e3510d401f6f31ea0a7e3ec1cda7b95f7a02b42753eb4cf0bbf5afbc7084f9bc2603aafe5da6cd54e4d647ec9fd641e4241513aaf23481d1f390bbb83dfae56369f4b03367ccd45f0ec4cd929aed127394157e7b3794500c0c5f88930b1ff50bbae1163c26fff28d06028", 0xa6}, {&(0x7f0000000100)="38d6cd435749d519cc39e90540f37c4f5c6bceef6c4ae07105cafc5e25d9bbfce859670b89666cca0857aa0c2abd8722a9db0caad3905e3ff682", 0x3a}, {&(0x7f0000000140)="d71206abd00e3c0a7e2440673da6a9fc2c1255a9b136bc982a3dc2ac21ef167250c176acfbd4d13abd86b018e8b1357842d8dc93e53f6b542e9633e1db8672e8", 0x40}], 0x4}}, {{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000380)="df304451b990364b1c6ff9c843eb47125c0a16565b5efbc0494b453f9863364196a743b5d226d34b2293f3b4b8dde4b8434172dec0902f0e03c2893c2bfd5f662eefc2902850a0221d55", 0x200003ca}, {&(0x7f0000000400)}], 0x2, &(0x7f0000000540)=[@ip_tos_u8={{0x11}}, @ip_ttl={{0x14}}, @ip_ttl={{0x14}}, @ip_tos_u8={{0x11}}], 0x60}}], 0x3, 0x0) r35 = socket$alg(0x26, 0x5, 0x0) bind$alg(r35, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r36 = accept4(r35, 0x0, 0x0, 0x0) sendmmsg$inet(r36, &(0x7f0000000680)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f00000000c0)="5831255624c13e4c563f221188b6be66ea", 0x11}], 0x1}}, {{&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000002c0)=[{&(0x7f0000000040)="70a6b8247e016ae2647a2e703fce46c432e37d1dffd332a793d4b9e3617386d153", 0x21}, {&(0x7f0000000200)="09f96fbf33ceccc10976cd10b1411ee57d092fd5b7f95a0f19f01005f110463ccb2c6ebdb74ad7a7da1a2bed233154886db68984d477ebee11ce9a8e3510d401f6f31ea0a7e3ec1cda7b95f7a02b42753eb4cf0bbf5afbc7084f9bc2603aafe5da6cd54e4d647ec9fd641e4241513aaf23481d1f390bbb83dfae56369f4b03367ccd45f0ec4cd929aed127394157e7b3794500c0c5f88930b1ff50bbae1163c26fff28d06028", 0xa6}, {&(0x7f0000000100)="38d6cd435749d519cc39e90540f37c4f5c6bceef6c4ae07105cafc5e25d9bbfce859670b89666cca0857aa0c2abd8722a9db0caad3905e3ff682", 0x3a}, {&(0x7f0000000140)="d71206abd00e3c0a7e2440673da6a9fc2c1255a9b136bc982a3dc2ac21ef167250c176acfbd4d13abd86b018e8b1357842d8dc93e53f6b542e9633e1db8672e8", 0x40}], 0x4}}, {{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000380)="df304451b990364b1c6ff9c843eb47125c0a16565b5efbc0494b453f9863364196a743b5d226d34b2293f3b4b8dde4b8434172dec0902f0e03c2893c2bfd5f662eefc2902850a0221d55", 0x200003ca}, {&(0x7f0000000400)}], 0x2, &(0x7f0000000540)=[@ip_tos_u8={{0x11}}, @ip_ttl={{0x14}}, @ip_ttl={{0x14}}, @ip_tos_u8={{0x11}}], 0x60}}], 0x3, 0x0) r37 = socket$alg(0x26, 0x5, 0x0) bind$alg(r37, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r38 = accept4(r37, 0x0, 0x0, 0x0) sendmmsg$inet(r38, &(0x7f0000000680)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f00000000c0)="5831255624c13e4c563f221188b6be66ea", 0x11}], 0x1}}, {{&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000002c0)=[{&(0x7f0000000040)="70a6b8247e016ae2647a2e703fce46c432e37d1dffd332a793d4b9e3617386d153", 0x21}, {&(0x7f0000000200)="09f96fbf33ceccc10976cd10b1411ee57d092fd5b7f95a0f19f01005f110463ccb2c6ebdb74ad7a7da1a2bed233154886db68984d477ebee11ce9a8e3510d401f6f31ea0a7e3ec1cda7b95f7a02b42753eb4cf0bbf5afbc7084f9bc2603aafe5da6cd54e4d647ec9fd641e4241513aaf23481d1f390bbb83dfae56369f4b03367ccd45f0ec4cd929aed127394157e7b3794500c0c5f88930b1ff50bbae1163c26fff28d06028", 0xa6}, {&(0x7f0000000100)="38d6cd435749d519cc39e90540f37c4f5c6bceef6c4ae07105cafc5e25d9bbfce859670b89666cca0857aa0c2abd8722a9db0caad3905e3ff682", 0x3a}, {&(0x7f0000000140)="d71206abd00e3c0a7e2440673da6a9fc2c1255a9b136bc982a3dc2ac21ef167250c176acfbd4d13abd86b018e8b1357842d8dc93e53f6b542e9633e1db8672e8", 0x40}], 0x4}}, {{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000380)="df304451b990364b1c6ff9c843eb47125c0a16565b5efbc0494b453f9863364196a743b5d226d34b2293f3b4b8dde4b8434172dec0902f0e03c2893c2bfd5f662eefc2902850a0221d55", 0x200003ca}, {&(0x7f0000000400)}], 0x2, &(0x7f0000000540)=[@ip_tos_u8={{0x11}}, @ip_ttl={{0x14}}, @ip_ttl={{0x14}}, @ip_tos_u8={{0x11}}], 0x60}}], 0x3, 0x0) r39 = socket$alg(0x26, 0x5, 0x0) bind$alg(r39, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r40 = accept4(r39, 0x0, 0x0, 0x0) sendmmsg$inet(r40, &(0x7f0000000680)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f00000000c0)="5831255624c13e4c563f221188b6be66ea", 0x11}], 0x1}}, {{&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000002c0)=[{&(0x7f0000000040)="70a6b8247e016ae2647a2e703fce46c432e37d1dffd332a793d4b9e3617386d153", 0x21}, {&(0x7f0000000200)="09f96fbf33ceccc10976cd10b1411ee57d092fd5b7f95a0f19f01005f110463ccb2c6ebdb74ad7a7da1a2bed233154886db68984d477ebee11ce9a8e3510d401f6f31ea0a7e3ec1cda7b95f7a02b42753eb4cf0bbf5afbc7084f9bc2603aafe5da6cd54e4d647ec9fd641e4241513aaf23481d1f390bbb83dfae56369f4b03367ccd45f0ec4cd929aed127394157e7b3794500c0c5f88930b1ff50bbae1163c26fff28d06028", 0xa6}, {&(0x7f0000000100)="38d6cd435749d519cc39e90540f37c4f5c6bceef6c4ae07105cafc5e25d9bbfce859670b89666cca0857aa0c2abd8722a9db0caad3905e3ff682", 0x3a}, {&(0x7f0000000140)="d71206abd00e3c0a7e2440673da6a9fc2c1255a9b136bc982a3dc2ac21ef167250c176acfbd4d13abd86b018e8b1357842d8dc93e53f6b542e9633e1db8672e8", 0x40}], 0x4}}, {{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000380)="df304451b990364b1c6ff9c843eb47125c0a16565b5efbc0494b453f9863364196a743b5d226d34b2293f3b4b8dde4b8434172dec0902f0e03c2893c2bfd5f662eefc2902850a0221d55", 0x200003ca}, {&(0x7f0000000400)}], 0x2, &(0x7f0000000540)=[@ip_tos_u8={{0x11}}, @ip_ttl={{0x14}}, @ip_ttl={{0x14}}, @ip_tos_u8={{0x11}}], 0x60}}], 0x3, 0x0) r41 = getpid() sched_setscheduler(r41, 0x5, &(0x7f0000000380)) r42 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x4200, 0x0) r43 = socket$inet_tcp(0x2, 0x1, 0x0) r44 = fcntl$dupfd(r43, 0x0, r43) getsockopt$sock_cred(r44, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000b00)=0xc) setsockopt$inet_IP_XFRM_POLICY(r42, 0x0, 0x11, &(0x7f00000007c0)={{{@in=@empty, @in=@multicast1, 0x4e23, 0x8001, 0x4e21, 0x9, 0x0, 0x20, 0xc0, 0x5e, 0x0, r45}, {0x6, 0x0, 0x2, 0x3, 0x480, 0x4, 0x7, 0x1}, {0x101, 0x3, 0x2, 0x7}, 0x96f, 0x6e6bbb, 0x608f917477f760e0, 0x1, 0x1, 0xfb37c7a19e19f3f9}, {{@in6=@rand_addr="17df945b34f8ddfaad004646bda31afc", 0x4d4, 0x33}, 0xa, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x6}}, 0xe8) stat(&(0x7f0000001a80)='./file0\x00', &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r48 = socket$inet_udplite(0x2, 0x2, 0x88) r49 = fcntl$dupfd(r47, 0x0, r48) ioctl$PERF_EVENT_IOC_ENABLE(r49, 0x8912, 0x400200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r49, 0xc0502100, &(0x7f0000001b40)={0x0, 0x0}) socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r52 = socket$inet_udplite(0x2, 0x2, 0x88) r53 = fcntl$dupfd(r51, 0x0, r52) ioctl$PERF_EVENT_IOC_ENABLE(r53, 0x8912, 0x400200) statx(r53, &(0x7f0000001bc0)='./file0\x00', 0x4000, 0x2, &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) r55 = getgid() getresgid(&(0x7f0000001d00)=0x0, &(0x7f0000001d40), &(0x7f0000001d80)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001dc0)=0x0) r58 = socket$alg(0x26, 0x5, 0x0) bind$alg(r58, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) accept4(r58, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r58, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c81", 0x10) getsockopt$sock_cred(r58, 0x1, 0x11, &(0x7f0000001e00)={0x0, 0x0, 0x0}, &(0x7f0000001e40)=0xc) r60 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x4200, 0x0) r61 = socket$inet_tcp(0x2, 0x1, 0x0) r62 = fcntl$dupfd(r61, 0x0, r61) getsockopt$sock_cred(r62, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000b00)=0xc) setsockopt$inet_IP_XFRM_POLICY(r60, 0x0, 0x11, &(0x7f00000007c0)={{{@in=@empty, @in=@multicast1, 0x4e23, 0x8001, 0x4e21, 0x9, 0x0, 0x20, 0xc0, 0x5e, 0x0, r63}, {0x6, 0x0, 0x2, 0x3, 0x480, 0x4, 0x7, 0x1}, {0x101, 0x3, 0x2, 0x7}, 0x96f, 0x6e6bbb, 0x608f917477f760e0, 0x1, 0x1, 0xfb37c7a19e19f3f9}, {{@in6=@rand_addr="17df945b34f8ddfaad004646bda31afc", 0x4d4, 0x33}, 0xa, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x6}}, 0xe8) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000002040)={0x0, 0x0, 0x0}, &(0x7f0000002080)=0xc) r65 = getpid() sched_setscheduler(r65, 0x5, &(0x7f0000000380)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000020c0)={{{@in=@broadcast, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@remote}}, &(0x7f00000021c0)=0xe8) r67 = getegid() chown(&(0x7f0000000140)='./file0\x00', 0x0, r67) r68 = gettid() kcmp(0x0, r68, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) r69 = socket$inet_tcp(0x2, 0x1, 0x0) r70 = fcntl$dupfd(r69, 0x0, r69) getsockopt$sock_cred(r70, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) setresuid(r71, r71, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000002200)='./file0\x00', &(0x7f0000002240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x6000) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000022c0)=0x0) r74 = getegid() chown(&(0x7f0000000140)='./file0\x00', 0x0, r74) r75 = syz_open_dev$admmidi(&(0x7f0000002300)='/dev/admmidi#\x00', 0x2a, 0x280000) r76 = socket(0x0, 0x80002, 0x0) ioctl(r76, 0x1000008912, &(0x7f00000000c0)="080db5055e0bcfe8696071") r77 = socket$alg(0x26, 0x5, 0x0) bind$alg(r77, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r78 = accept4(r77, 0x0, 0x0, 0x0) sendmmsg$inet(r78, &(0x7f0000000680)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f00000000c0)="5831255624c13e4c563f221188b6be66ea", 0x11}], 0x1}}, {{&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000002c0)=[{&(0x7f0000000040)="70a6b8247e016ae2647a2e703fce46c432e37d1dffd332a793d4b9e3617386d153", 0x21}, {&(0x7f0000000200)="09f96fbf33ceccc10976cd10b1411ee57d092fd5b7f95a0f19f01005f110463ccb2c6ebdb74ad7a7da1a2bed233154886db68984d477ebee11ce9a8e3510d401f6f31ea0a7e3ec1cda7b95f7a02b42753eb4cf0bbf5afbc7084f9bc2603aafe5da6cd54e4d647ec9fd641e4241513aaf23481d1f390bbb83dfae56369f4b03367ccd45f0ec4cd929aed127394157e7b3794500c0c5f88930b1ff50bbae1163c26fff28d06028", 0xa6}, {&(0x7f0000000100)="38d6cd435749d519cc39e90540f37c4f5c6bceef6c4ae07105cafc5e25d9bbfce859670b89666cca0857aa0c2abd8722a9db0caad3905e3ff682", 0x3a}, {&(0x7f0000000140)="d71206abd00e3c0a7e2440673da6a9fc2c1255a9b136bc982a3dc2ac21ef167250c176acfbd4d13abd86b018e8b1357842d8dc93e53f6b542e9633e1db8672e8", 0x40}], 0x4}}, {{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000380)="df304451b990364b1c6ff9c843eb47125c0a16565b5efbc0494b453f9863364196a743b5d226d34b2293f3b4b8dde4b8434172dec0902f0e03c2893c2bfd5f662eefc2902850a0221d55", 0x200003ca}, {&(0x7f0000000400)}], 0x2, &(0x7f0000000540)=[@ip_tos_u8={{0x11}}, @ip_ttl={{0x14}}, @ip_ttl={{0x14}}, @ip_tos_u8={{0x11}}], 0x60}}], 0x3, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002380)={0x0, 0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002340)='^security\\\\user/'}, 0x30) r80 = socket$alg(0x26, 0x5, 0x0) bind$alg(r80, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r81 = accept4(r80, 0x0, 0x0, 0x0) sendmmsg$inet(r81, &(0x7f0000000680)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f00000000c0)="5831255624c13e4c563f221188b6be66ea", 0x11}], 0x1}}, {{&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000002c0)=[{&(0x7f0000000040)="70a6b8247e016ae2647a2e703fce46c432e37d1dffd332a793d4b9e3617386d153", 0x21}, {&(0x7f0000000200)="09f96fbf33ceccc10976cd10b1411ee57d092fd5b7f95a0f19f01005f110463ccb2c6ebdb74ad7a7da1a2bed233154886db68984d477ebee11ce9a8e3510d401f6f31ea0a7e3ec1cda7b95f7a02b42753eb4cf0bbf5afbc7084f9bc2603aafe5da6cd54e4d647ec9fd641e4241513aaf23481d1f390bbb83dfae56369f4b03367ccd45f0ec4cd929aed127394157e7b3794500c0c5f88930b1ff50bbae1163c26fff28d06028", 0xa6}, {&(0x7f0000000100)="38d6cd435749d519cc39e90540f37c4f5c6bceef6c4ae07105cafc5e25d9bbfce859670b89666cca0857aa0c2abd8722a9db0caad3905e3ff682", 0x3a}, {&(0x7f0000000140)="d71206abd00e3c0a7e2440673da6a9fc2c1255a9b136bc982a3dc2ac21ef167250c176acfbd4d13abd86b018e8b1357842d8dc93e53f6b542e9633e1db8672e8", 0x40}], 0x4}}, {{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000380)="df304451b990364b1c6ff9c843eb47125c0a16565b5efbc0494b453f9863364196a743b5d226d34b2293f3b4b8dde4b8434172dec0902f0e03c2893c2bfd5f662eefc2902850a0221d55", 0x200003ca}, {&(0x7f0000000400)}], 0x2, &(0x7f0000000540)=[@ip_tos_u8={{0x11}}, @ip_ttl={{0x14}}, @ip_ttl={{0x14}}, @ip_tos_u8={{0x11}}], 0x60}}], 0x3, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r81, 0x0, 0x10, &(0x7f00000023c0)={{{@in6=@ipv4={[], [], @dev}, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}}}, &(0x7f00000024c0)=0xe8) r83 = getegid() chown(&(0x7f0000000140)='./file0\x00', 0x0, r83) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000002500)={0x0, 0x0}) r85 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x4200, 0x0) r86 = socket$inet_tcp(0x2, 0x1, 0x0) r87 = fcntl$dupfd(r86, 0x0, r86) getsockopt$sock_cred(r87, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000b00)=0xc) setsockopt$inet_IP_XFRM_POLICY(r85, 0x0, 0x11, &(0x7f00000007c0)={{{@in=@empty, @in=@multicast1, 0x4e23, 0x8001, 0x4e21, 0x9, 0x0, 0x20, 0xc0, 0x5e, 0x0, r88}, {0x6, 0x0, 0x2, 0x3, 0x480, 0x4, 0x7, 0x1}, {0x101, 0x3, 0x2, 0x7}, 0x96f, 0x6e6bbb, 0x608f917477f760e0, 0x1, 0x1, 0xfb37c7a19e19f3f9}, {{@in6=@rand_addr="17df945b34f8ddfaad004646bda31afc", 0x4d4, 0x33}, 0xa, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x6}}, 0xe8) r89 = getegid() chown(&(0x7f0000000140)='./file0\x00', 0x0, r89) r90 = gettid() kcmp(0x0, r90, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) r91 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x4200, 0x0) r92 = socket$inet_tcp(0x2, 0x1, 0x0) r93 = fcntl$dupfd(r92, 0x0, r92) getsockopt$sock_cred(r93, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000b00)=0xc) setsockopt$inet_IP_XFRM_POLICY(r91, 0x0, 0x11, &(0x7f00000007c0)={{{@in=@empty, @in=@multicast1, 0x4e23, 0x8001, 0x4e21, 0x9, 0x0, 0x20, 0xc0, 0x5e, 0x0, r94}, {0x6, 0x0, 0x2, 0x3, 0x480, 0x4, 0x7, 0x1}, {0x101, 0x3, 0x2, 0x7}, 0x96f, 0x6e6bbb, 0x608f917477f760e0, 0x1, 0x1, 0xfb37c7a19e19f3f9}, {{@in6=@rand_addr="17df945b34f8ddfaad004646bda31afc", 0x4d4, 0x33}, 0xa, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x6}}, 0xe8) r95 = getegid() chown(&(0x7f0000000140)='./file0\x00', 0x0, r95) r96 = socket(0x0, 0x80002, 0x0) ioctl(r96, 0x1000008912, &(0x7f00000000c0)="080db5055e0bcfe8696071") r97 = socket$alg(0x26, 0x5, 0x0) bind$alg(r97, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) accept4(r97, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r97, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c81", 0x10) r98 = socket$inet6_sctp(0xa, 0x1, 0x84) r99 = openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f0000002580)='/proc/self/attr/current\x00', 0x2, 0x0) sendmmsg$unix(r2, &(0x7f0000002bc0)=[{&(0x7f0000000040)=@abs={0x1, 0x0, 0x4e21}, 0x6e, &(0x7f0000000280)=[{&(0x7f0000000100)="6090c5b0259997a5b68161947a4943dc9c80562d90cb3dc5191d9597595fae124024ac65ed0dc9cb80fec2d228c5dfbf28fd5d9c3ebe073648951efe8d4ead788654cd0af1097be1919ced5fbd8afe911416153e41c1bf459256c89ee14b6d2370b551763c78049e12e3fd740704f94a2a9a6463d5fe0b2e39c2035c22b9590aa0987972a02e3b28a28455cc526f374849dd1f65cb313b185f9697", 0x9b}, {&(0x7f00000001c0)="3aca26cdd5e3da64137f3d509e474cdbb19247db51d8b2928bfb8fa13f1c94626aa7ca14a798b973ad20811e2a7e337377747ef9a98ded098baa8697d9475c2b3d2a6ee33cd10320608c26a15a52f0bd2a0ca0623bb9c90d41d0713b6783469b15631fd3734fdfc016c1ea917f63cd2abab41269c4527df0f002f1bc8f96501a", 0x80}, {&(0x7f0000000240)="5c0a699f3bdaefd0bcec72b97a61227c3aec204b2da02bcbca257ba7374f17da", 0x20}], 0x3, 0x0, 0x0, 0x40}, {&(0x7f00000002c0)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000580)=[{&(0x7f0000000340)="7e3a537051c653e16c23e821f8f4d17c22629cc4a9155212a88a4b6097b2f4b0c46f8d2cd4a4f8230cd1ae20f53869e7238d7e51387e229f9045c008e55c772a3365f9b1dca10d824d7b067211cebf01e5a71ab990338fa74d36480b3a0aeb36ba13b0c66db1b051f01045e0da32c64cd5f9b4790989eb984019702d39efe91a8a81bd6b0d07867d9b01661fb034f37ed0047ddeada14674376f90125e9bdd9b1b5e31b6f9769a50d4cdb75e9d426d34d53dac822f5e43bd955116", 0xbb}, {&(0x7f0000000400)="d427a67cb86c00c6697dbb9a4818bb373932569be96215af25d6249fc49907ad50cc95fa959a8d8e128fd19a79e2a8aacb9e718b9026c741683800c74a981d102ed1a8451b3ba7a40445b57236cbb7b1ea6371009ce8eb9a0a307ded7a15b1c432979640f7331e08c36553cc37b14da57cc030c3325f549a84b84c0a2e4b5eb440a030b9ab7d", 0x86}, {&(0x7f00000004c0)="9b25e413cafaeed858bbcf52586f67a09e97639145b4d38e05933c6fb89adca0b2180388bf47b20f89489d11", 0x2c}, {&(0x7f0000000500)="abfb7c8a75a9b5d83ef58598fd119cc3e3f639d892e2cd682b12bd0fd689be7c3fcfc77820cbebe16f0cde679b2da72edc109b054474edc3ae5dd86cfc7902d5282c98b01e8f112fce68c4777cc91791c8eb87a9f8afe83133f4a9c4a636a0733edefbb443d506c4c3e3b8ee7431be41ec", 0x71}], 0x4, &(0x7f0000000780)=[@rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, r0, r4, r5]}}, @cred={{0x1c, 0x1, 0x2, {r6, r9, r10}}}, @cred={{0x1c, 0x1, 0x2, {r11, r14, r20}}}], 0x68, 0x14}, {&(0x7f0000000880)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000e00)=[{&(0x7f0000000800)="c65f5d56a88c4ab0abdc2539bf4424895b9b10e5cd8443940c24d8fe750c8147ecc07202c4f776483e4977b5e7c23b857b", 0x31}, {&(0x7f0000000900)="d5ff4c8d7d4ccdec731f36", 0xb}, {&(0x7f0000000940)="7e417047a29fd055d693cd1d", 0xc}, {&(0x7f0000000980)="917c1aa57afe7a437af7", 0xa}, {&(0x7f00000009c0)="75af07e74502be6e7089f562be7a939caefa3aef15beccbbb26356b8758d521284f3ee4e9ceae536aee62f613e2524c39f37b246887ad8c1dafff1e12df3118d34e308b33a4c1cacbbbbe8fb5f41503c109d0c21d032f409c53eefc59742c0bd2c8aaadbf815bb3e173c725a0b8ecb73ec07dc0b4b4ba280c86cddf25f3c0f429e2df61a13f762a911438efaca04021d02ef24a0ac0faa1dd9e126fc945ec9ad827d973409", 0xa5}, {&(0x7f0000000a80)="1f292565109fdd3151b52e478a73b7986b45247c51a92cfc7cd5a5b596628ba8c2fd4e5f37", 0x25}, {&(0x7f0000000ac0)="8ed586d5cdc4a1a7b3051e1a9f91ac355a773f26ab9741bdf502f501576f5c8a422aa0681a38912841990f97b8d7ab9218957901ec1bdcfe6b05af75de9ee9f48aa34b495391014cfdec7d563f044abf2a2ec01dab291d14723adaade4b845a7a47fcd352eee33cce34e17def748f6e7d50ccb3bf827a2bd5cd707f2d338e7d5f2680d09ff7631fff9a1f6cfc2461bf08e36d2d2895c231dffa3c13bff099a3dc152ced9f65cec6ec5bb24225deb4a7ec4ae95b707539ef0638f287cec8835932b62118e2388ed979cf9d5a6abd3554efb4e2c5f8f22bb55c3fba0c8ecf7d3d1ae047b679d0ec7231953d43853fd75558d", 0xf1}, {&(0x7f0000000bc0)="ef2a2c5afe45e86d88950afb9a54a086c34ccd4bb03714d52be1f6bf2642c6cd19eae7ddefb5714478b33543c24e93eb2152a2416ccb65a4e23a9207bc0889febec2c5dbd9ed7634d1771ccf1b74308ae7b9a02093782a877453aa6a3b7764be4c178877953c36f40c27c68645a5db862981286aa1ef86a89957d87cd2498c4b769f35", 0x83}, {&(0x7f0000000c80)="a3ed71c5662457e09d48569da2a1379f51ffdec7de5d85f950530bbee4a288ef04b54956e2c9eac925e8915517d681555b37c8521c1e31b0a16ac4dc939b55f41c624882afeab677f41e32df1478f05571566ffd166a7633164cdb4034a95285f434e7fb0f65eb076ffd92842b8193b2c1370bacb5005b58df747c594ddf608caedfc61f70625c6975e4ce92aaf5c6db3848a997d7a928916eb37d25f6de8f3f31dfd92efff8ae4be272ddc307c0be15b105a2", 0xb3}, {&(0x7f0000000d40)="c159829ca32077c16a91317644bf6ce3bdea501371755b3120fd6ac7ddfd7499a4c02ac7ec7261621ee1d761dd9a45393fc24c3283edbf3b7db357d585b95d20fe84cc861e6a3f1e6c96f0de18f6e21ba673b1a78407c776707b4b5bc51c577ebad0e28a64339c0ea6e714309ec7bc6901d143a3e40d0ae28e054644b994150df8abe7d111ae6a89105c0240ef0ef9c09efee6cf58f8a877e96dd214aa3f6985f781b2ec46d59d7050f847448e56d308d2843d16c30d3f", 0xb7}], 0xa, &(0x7f0000000ec0)=ANY=[@ANYBLOB="2c000000080020000100000701000000", @ANYRES32=r22, @ANYRES32=r23, @ANYRES32=r24, @ANYRES32, @ANYRES32=r26, @ANYRES32=r27, @ANYRES32=r29, @ANYBLOB='\x00\x00\x00\x00'], 0x30, 0x20000000}, {&(0x7f0000000f00)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001400)=[{&(0x7f0000000f80)="1159271bfea7c30e64a428281875f4598e7b3523382a36ffde822567fb0f95af2319a74988608b2a65003a4bd2eddc079f9f0991e8c6d21d101f89d22167263f262dc8980c7fd73accbc02bc75e7d2e56904be80732cd2f688a3c0e9ff97cb08a35e0f5d28f7b21fbdf531382d00668ecdf615ca4a75f2a6b8e8ee90bf0e5bacf70223a6aff0e198d8f8678de764c17f40c756574adb9d698f26a309c253794b83bf24671415e12e002a35424f191cfb", 0xb0}, {&(0x7f0000001040)="73f771d233f0306c8d7b093afaf589c9a671c5fff0834db05e7a1d6dec03ef8d86a253e7debc016e52447fbc87e4dfcedd86e4c1c6b9ff38ce2735e8ca8733a6a20b802c048e8c287abd5462c1c116533f6b93685b60bf84642887d7bad9db15af2d7c74a9c849682a64b7b10c08a4fd86a906fcef5786b5baf1471a6a0872d88c25a7e327b037a4028432c047930df5b902afa99d9751e5707cea0d60c9095aa3bfa77af9", 0xa5}, {&(0x7f0000001100)="af3f9d3a4d1ed8fec69d84f5c7769b5ba835a055bcd9201ad8c12927b444eee8c7fd8437fa3aaa1cbdc7d5b797cc58bafacb8014b2e046fd21fbfa89431c2379bc5a5f98c9a40f1dea04214744f583c57972a529bb58633b28959ed85083798ecb3c08134199d7b234433b769c55aa3634ce267c3d227fc8a6685cfa896df72bd66da93938918dcee389d83fa399ed27846f0025a540e718127b3e51", 0x9c}, {&(0x7f00000011c0)="1dd8c722c7e3c6a9860874b7fdd079d0a790ef3ab05ad6a91a2dc301752f97e6509178d796459e9f2291ccdbf69cab08423ce1878a9b23fbad6302b605d196db81f305a11a401c87a4207dfe6407475bccef3a6f0e908a5a67ba24a57a9151b675ac941d9b1fbaf025594a83b6df9d67c5b52534f7c9c854fc36f1d484d4499c0356b8cb5079d6806aa3394c548cb57e39bab5d98bd69a443c05849af3c8b6552bdc62f1c03ae0a8df09a1d23456001fdfefa32d4402cd63909016d717cfe8b66dc5103dae", 0xc5}, {&(0x7f00000012c0)="c0631f48bd9646b5b1bccba396e138afa1fcaa35e22f84443bf5432ad3733f4626789649f4d281d484133b2f297affe8e418be2742cfc93cf7ead8e94ca965654f2d285c6d528933076cf2e31dbd8f6b1c7e7a47eaee00e65d239a2934a6e4a04f8cf2c3f1f97d48", 0x68}, {&(0x7f0000001340)="e6c399352b26c5e5b4bab29e1a5a86bb9e0f6e7af1d93347c47cbed0ceaaa929ed6ba274c22aafa1aa02f2936fd689449c31cfa7de99d24e8d00da51d51b9d336bd774fbd0a053d5bf2c7e290691296dd641ff6ec6dba53cedc3db5aff56f49dd23558ebae0d904a1d7404c45a81bded75211fe390fd3eb52d378b1a9cc6a8c76f5289443a4b9fb11ccb72f29dce1f8dde7a63dacc292e150c9e8d6b435ea26666f988ee3441818d47fc01842e7c", 0xae}], 0x6, 0x0, 0x0, 0x4000000}, {&(0x7f0000001480)=@abs={0x1, 0x0, 0x4e22}, 0x6e, &(0x7f00000015c0)=[{&(0x7f0000001500)="208d11f5fb90df72d4f9cd8a1cd2e939066b37528fb6698f02a4a50da08de4cb01adf0cb18ff43740525b79441a060b9f1e34099361b2b4a16675725ad47b7e8ec4c5ef0a91eb374e81f5526030eaf9e255754a0c59fca87e14350569304547298237b83eea772cbf1d1324bfbcb9e669f7a", 0x72}, {&(0x7f0000001580)="00c5c4f5f60778c20c5dd4c3bc98c1a2679474cab175141e626c2ecb5cd8866b4273b1f77164fa1b29de5c42be59b6dbf35b96b81352e090cf8b8e", 0x3b}], 0x2, &(0x7f0000001600)=ANY=[@ANYBLOB="140000000000001501e5ffff00000000", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00'], 0x18, 0x819}, {&(0x7f0000001640)=@abs={0x0, 0x0, 0x4e21}, 0x6e, &(0x7f0000001900)=[{&(0x7f00000016c0)="296e9a166eb6dfd00858d77acee2d3b280bde93188ccd93816c85af103c62a8303b31ba0f93692bd5c994609f4a7768e31d4eb340cb7d6c7301aade9c051d653edc055c7a63ecfbe0dcd04ad2c8997f4a67dd4cbe70be75e66353e4a969b206884d42c5f551e8aa79d4c25de01ddbfce3375bc5ae29d631e3d0b1ccdd6e1f4219097af77b4d48aa8b5a5c02cb1dfeaadaf8a5a9955e9ae609e687945e5518d7b631f5f9aeff99bdba8c74efe21c6bc3ae0076d167b3863e7a03ae34721e97dfaf3e1f2fe11c065eb56d44f70a2d9008f2861851c49025b87150a3f713591a0b92c361a8d575eca", 0xe7}, {&(0x7f00000017c0)="1e98afe30a115e5c2c7cc69dd68bdd19bc6856", 0x13}, {&(0x7f0000001800)="6f6be1bfc996841509937c3f08c5743be77f6338e9a40fcb7f16e8219843e6980c017bd6a7", 0x25}, {&(0x7f0000001840)="c81307101f3b514520ca5ce2104bbfd6f7a838f826bf1a682b00f47812871bb1935a48c2f65edf42974c62bb2da0c6bef34e4f91f5298b1c22232c15ce85dd73b3d49e10ac634aa8a8c2dba2b732d144e4066d98fe8feeb4c9c4542e2edc6bee3b10f556d3421847b147013f7a58799749438a8c2d5ed0b6c5aececf9f7ba042a13ec83336c99126b27e4ba9b15750c188ef7f37eb6d25ade3febae1ff9a8d8aebafea826c793d1dc092ac7adf5511bc7e5a28c109c554837dcfd3510d", 0xbd}], 0x4, 0x0, 0x0, 0x30}, {&(0x7f0000001940)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001a40)=[{&(0x7f00000019c0)="13eba93f86eb34b2286c91b2df93b63bfa7e313371d881c71f2b17dadafaf0fcf6ef5b4ea177cfbdff472956bca7d1ae5566091336ea3fdec492d469242245a05939408b3f5b602229f3207df349fdb9cbd38796744b5bd74608b13162d1720c70cf16cac91e73c8db0bda0b55b4e2a8bef33c0ec5a1d6d7", 0x78}], 0x1, &(0x7f0000001e80)=[@rights={{0x1c, 0x1, 0x1, [r0, r30, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [r31, r32, r1, r34, r1, r36, 0xffffffffffffffff, r38, r40]}}, @cred={{0x1c, 0x1, 0x2, {r41, r45, r46}}}, @cred={{0x1c, 0x1, 0x2, {r50, r54, r55}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee01, r56}}}, @cred={{0x1c, 0x1, 0x2, {r57, 0x0, r59}}}], 0xd8, 0x4000}, {&(0x7f0000001f80)=@abs={0x1, 0x0, 0x4e24}, 0x6e, &(0x7f0000002000), 0x0, &(0x7f00000025c0)=[@cred={{0x1c, 0x1, 0x2, {0x0, r63, r64}}}, @cred={{0x1c, 0x1, 0x2, {r65, r66, r67}}}, @cred={{0x1c, 0x1, 0x2, {r68, r71, r72}}}, @cred={{0x1c, 0x1, 0x2, {r73, 0xee00, r74}}}, @rights={{0x28, 0x1, 0x1, [r75, 0xffffffffffffffff, r76, r1, r78, r1]}}, @cred={{0x1c, 0x1, 0x2, {r79, r82, r83}}}, @cred={{0x1c, 0x1, 0x2, {r84, r88, r89}}}, @cred={{0x1c, 0x1, 0x2, {r90, r94, r95}}}, @rights={{0x24, 0x1, 0x1, [r96, r1, r97, r98, r99]}}], 0x130, 0x20000000}, {&(0x7f0000002700)=@abs={0x1, 0x0, 0x4e20}, 0x6e, &(0x7f0000002b40)=[{&(0x7f0000002780)="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", 0xfb}, {&(0x7f0000002880)="2e1604fbf3866b95e57cb8a2437d4f528bc90a8219f0d0980f77f58fab9b9e87c434a00b5bd019a4e5c5b0c69709f0721d3a77b3c86b2500fc62b028f360bdedb7c1f8c586cd0cf47dafb2242e7fe11d2527a56e51d4cb81344fe4567597bf537386f8ebccac5df74c881fc64bc8a9530e1e7661a3542f0f7a510fd4c264dbb0cc2d870f7a03f7dd413ec22175357fc80e667faf71b5844227d6b6d319a04897f821c1bf2a47387871a46556bf440d5ab43638e9300c9ce606fd92fa78ed98dcb69e22e766b2c4b61626056cc61c44fc6d1013f49672067579d0af0be669beef40ebbf2eecb7251c23a8", 0xea}, {&(0x7f0000002980)="eeef5c8a7be3fbc1f4f24494758fc5a941ed033dd2bddb8b43f6c01a82241a902a4d3ee655e008", 0x27}, {&(0x7f00000029c0)="7282ad9b4a88550a18653db156a40a307685055ac94dfae7cedec3167051e0d1cae3d8eea5e2fa697a4dda766befab6c62b427ef5feab5a8e43c1d48bbcbff8e8baf0940bd51f3311b19dc4123506f3dc28816a2abc134e1a71d054eee15a2dbfbaa878772e1950cc7ee7428bfdca56b7d1718e12f63f4f4b0206b3abc6514e8dc95a359b8c50d34cb", 0x89}, {&(0x7f0000002a80)="042db450021a1d03b4a4176ccf93b9f5f15fbf49d0e3db2464863f7225d731f950d4857e7c51008059fbb4ed54e4aea4a4d1f31f51602e67bb8f985e40e7436f019d523d0d70b7709293bd378c3932744b97a6118dcfe481ce0cb5f5ddce6cd07e4af6baded4935e8a660a882eb084d1a3e5c5318443cef9abd7358f4a191ae80c0b69760ee4209cddf41fc2a4bd0d3b4c764b64a61a9e75060926b5297755c497aff32934e374", 0xa7}], 0x5, 0x0, 0x0, 0x20000000}], 0x9, 0x4000000) r100 = socket$inet6_tcp(0xa, 0x1, 0x0) r101 = fcntl$dupfd(r100, 0x0, r100) ioctl$PERF_EVENT_IOC_ENABLE(r101, 0x8912, 0x400200) fcntl$lock(r1, 0x27, &(0x7f0000000840)={0x0, 0x0, 0x1000000}) fcntl$lock(r1, 0x6, &(0x7f0000000000)) 09:32:59 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x2, 0x3, 0x258, 0x0, 0x108, 0x0, 0x0, 0x0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x3, 0x0, {[{{@ip={@remote, @dev, 0x0, 0x0, '\x00', 'ip_vti0\x00', {}, {}, 0x88}, 0x0, 0xa0, 0x108, 0x0, {}, [@common=@inet=@udplite={{0x30, 'udplite\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'netbios-ns\x00', 'syz1\x00'}}}, {{@uncond, 0x0, 0x98, 0xb8, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2b8) unlinkat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) accept4(r1, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c81", 0x10) accept(r1, 0x0, &(0x7f00000005c0)) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) accept4(r2, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c81", 0x10) fgetxattr(r2, &(0x7f0000000080)=@known='com.apple.FinderInfo\x00', &(0x7f0000000100)=""/230, 0xe6) r3 = socket(0x0, 0x80002, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000000c0)="080db5055e0bcfe8696071") r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r5 = accept4(r4, 0x0, 0x0, 0x0) sendmmsg$inet(r5, &(0x7f0000000680)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f00000000c0)="5831255624c13e4c563f221188b6be66ea", 0x11}], 0x1}}, {{&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000002c0)=[{&(0x7f0000000040)="70a6b8247e016ae2647a2e703fce46c432e37d1dffd332a793d4b9e3617386d153", 0x21}, {&(0x7f0000000200)="09f96fbf33ceccc10976cd10b1411ee57d092fd5b7f95a0f19f01005f110463ccb2c6ebdb74ad7a7da1a2bed233154886db68984d477ebee11ce9a8e3510d401f6f31ea0a7e3ec1cda7b95f7a02b42753eb4cf0bbf5afbc7084f9bc2603aafe5da6cd54e4d647ec9fd641e4241513aaf23481d1f390bbb83dfae56369f4b03367ccd45f0ec4cd929aed127394157e7b3794500c0c5f88930b1ff50bbae1163c26fff28d06028", 0xa6}, {&(0x7f0000000100)="38d6cd435749d519cc39e90540f37c4f5c6bceef6c4ae07105cafc5e25d9bbfce859670b89666cca0857aa0c2abd8722a9db0caad3905e3ff682", 0x3a}, {&(0x7f0000000140)="d71206abd00e3c0a7e2440673da6a9fc2c1255a9b136bc982a3dc2ac21ef167250c176acfbd4d13abd86b018e8b1357842d8dc93e53f6b542e9633e1db8672e8", 0x40}], 0x4}}, {{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000380)="df304451b990364b1c6ff9c843eb47125c0a16565b5efbc0494b453f9863364196a743b5d226d34b2293f3b4b8dde4b8434172dec0902f0e03c2893c2bfd5f662eefc2902850a0221d55", 0x200003ca}, {&(0x7f0000000400)}], 0x2, &(0x7f0000000540)=[@ip_tos_u8={{0x11}}, @ip_ttl={{0x14}}, @ip_ttl={{0x14}}, @ip_tos_u8={{0x11}}], 0x60}}], 0x3, 0x0) r6 = socket(0x0, 0x80002, 0x0) ioctl(r6, 0x1000008912, &(0x7f00000000c0)="080db5055e0bcfe8696071") r7 = socket$alg(0x26, 0x5, 0x0) bind$alg(r7, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r8 = accept4(r7, 0x0, 0x0, 0x0) sendmmsg$inet(r8, &(0x7f0000000680)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f00000000c0)="5831255624c13e4c563f221188b6be66ea", 0x11}], 0x1}}, {{&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000002c0)=[{&(0x7f0000000040)="70a6b8247e016ae2647a2e703fce46c432e37d1dffd332a793d4b9e3617386d153", 0x21}, {&(0x7f0000000200)="09f96fbf33ceccc10976cd10b1411ee57d092fd5b7f95a0f19f01005f110463ccb2c6ebdb74ad7a7da1a2bed233154886db68984d477ebee11ce9a8e3510d401f6f31ea0a7e3ec1cda7b95f7a02b42753eb4cf0bbf5afbc7084f9bc2603aafe5da6cd54e4d647ec9fd641e4241513aaf23481d1f390bbb83dfae56369f4b03367ccd45f0ec4cd929aed127394157e7b3794500c0c5f88930b1ff50bbae1163c26fff28d06028", 0xa6}, {&(0x7f0000000100)="38d6cd435749d519cc39e90540f37c4f5c6bceef6c4ae07105cafc5e25d9bbfce859670b89666cca0857aa0c2abd8722a9db0caad3905e3ff682", 0x3a}, {&(0x7f0000000140)="d71206abd00e3c0a7e2440673da6a9fc2c1255a9b136bc982a3dc2ac21ef167250c176acfbd4d13abd86b018e8b1357842d8dc93e53f6b542e9633e1db8672e8", 0x40}], 0x4}}, {{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000380)="df304451b990364b1c6ff9c843eb47125c0a16565b5efbc0494b453f9863364196a743b5d226d34b2293f3b4b8dde4b8434172dec0902f0e03c2893c2bfd5f662eefc2902850a0221d55", 0x200003ca}, {&(0x7f0000000400)}], 0x2, &(0x7f0000000540)=[@ip_tos_u8={{0x11}}, @ip_ttl={{0x14}}, @ip_ttl={{0x14}}, @ip_tos_u8={{0x11}}], 0x60}}], 0x3, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r8, 0x6, 0x14, &(0x7f0000000280), 0x16f) [ 1314.275882][ T7591] kAFS: unparsable volume name 09:32:59 executing program 4: socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = fcntl$dupfd(r0, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$VIDIOC_ENUMAUDIO(r3, 0xc0345641, &(0x7f0000000000)={0x1000, "8508ee0131f23fb43f35c7ec61f3ef9edd5f1186d1d530fa56bbd1b1b67c7f01", 0x0, 0x1}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000080)={0x7, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) [ 1314.302405][ T7591] kAFS: unparsable volume name 09:32:59 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f0000000340)=ANY=[@ANYBLOB="b7020000f7ffffffbfa70000000000002402000020feffff7a0af0fff8ffffff69a4f0ff00000000b70600000018d1fe2d6405000000000075040000000000000704000000000000b7040000100000206a0700fe00000000850000002f000000b70000000a0000009500000000000000e535f8a62fc2868f0399d909a63796c113a80c19aab9d607000000b6cd483be3f0d3253730e711f5969f62c28b22756bedf3cf393d14c46cc4f79fd2b316da4f0de8163f6242fa732300000637c48468766af540439fce41f144631ac262dcae18c3d1a1fbe96dd87235b44174f7c0343185089a0f119e31975e551558055dc2dc"], &(0x7f0000000280)='GPL\x00'}, 0x48) r1 = socket$kcm(0x11, 0x8000000002, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000540)=r0, 0x4) socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') [ 1314.336774][ T7596] xt_CT: No such helper "netbios-ns" 09:32:59 executing program 2: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f00000015c0)=ANY=[@ANYBLOB='%'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x20000000, 0x0) 09:32:59 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f0000000340)=ANY=[@ANYBLOB="b7020000f7ffffffbfa70000000000002402000020feffff7a0af0fff8ffffff69a4f0ff00000000b70600000018d1fe2d6405000000000075040000000000000704000000000000b7040000100000206a0700fe00000000850000002f000000b70000000a0000009500000000000000e535f8a62fc2868f0399d909a63796c113a80c19aab9d607000000b6cd483be3f0d3253730e711f5969f62c28b22756bedf3cf393d14c46cc4f79fd2b316da4f0de8163f6242fa732300000637c48468766af540439fce41f144631ac262dcae18c3d1a1fbe96dd87235b44174f7c0343185089a0f119e31975e551558055dc2dc"], &(0x7f0000000280)='GPL\x00'}, 0x48) r1 = socket$kcm(0x11, 0x8000000002, 0x300) socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000540)=r0, 0x4) syz_emit_ethernet(0x3e, &(0x7f0000000000)={@broadcast, @random="96c1e9574b31", @void, {@ipv4={0x300, @icmp={{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x1, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @local}, @time_exceeded={0xb, 0x0, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local, @multicast2}}}}}}, 0x0) 09:32:59 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = epoll_create(0x5) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) socket$inet(0x10, 0x2, 0x0) r3 = socket(0x0, 0x80002, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000000c0)="080db5055e0bcfe8696071") sendmsg(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500022881001f03fe0504000800080005000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 1314.555101][ T7907] kAFS: unparsable volume name 09:32:59 executing program 4: r0 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x6, 0x50801) r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r1, &(0x7f0000000180), 0x10) socketpair(0x8000000000001e, 0x805, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) getpeername$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000100)=0x14) sendmsg$can_bcm(r1, &(0x7f00000002c0)={&(0x7f0000000140)={0x1d, r3}, 0x10, &(0x7f0000000280)={&(0x7f0000000200)={0x0, 0x0, 0x0, {0x0, 0x2710}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "55e19dc0c30616da"}}, 0x48}}, 0x0) r4 = dup2(0xffffffffffffffff, 0xffffffffffffffff) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0xfff, 0x1000, 0x8f3, 0x91a5bd1607835f49, r0, 0xffe, [], r3, r4, 0x0, 0x2}, 0x3c) mkdir(&(0x7f0000000200)='./file0\x00', 0x12) mount(&(0x7f00000015c0)=ANY=[@ANYBLOB='#'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:32:59 executing program 2: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f00000015c0)=ANY=[@ANYBLOB='%'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x20100000, 0x0) 09:32:59 executing program 5: socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x6, 0x1e, &(0x7f0000000340)=ANY=[@ANYBLOB="b7020000f7ffffffbfa70000000000002402000020feffff7a0af0fff8ffffff69a4f0ff00000000b70600000018d1fe2d6405000000000075040000000000000704000000000000b7040000100000206a0700fe00000000850000002f000000b70000000a0000009500000000000000e535f8a62fc2868f0399d909a63796c113a80c19aab9d6f5969f62c28b22756bedf3cf393d14c46cc4f79fd2b316da4f0de8163f6242fa732300000637c48468766af540439fce41f144631ac262dcae18c3d1a1fbe96dd87235b44174f7c0343185089a0f119e31975e551558055d82dc00"/241], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x2}, 0x8, 0x10, &(0x7f0000000000), 0x10, 0x0, r2}, 0x78) r4 = socket$kcm(0x11, 0x8000000002, 0x300) setsockopt$sock_attach_bpf(r4, 0x1, 0x32, &(0x7f0000000540)=r3, 0x4) socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r6 = socket$inet_udplite(0x2, 0x2, 0x88) r7 = socket$alg(0x26, 0x5, 0x0) bind$alg(r7, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r8 = accept4(r7, 0x0, 0x0, 0x0) sendmmsg$inet(r8, &(0x7f0000000680)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f00000000c0)="5831255624c13e4c563f221188b6be66ea", 0x11}], 0x1}}, {{&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000002c0)=[{&(0x7f0000000040)="70a6b8247e016ae2647a2e703fce46c432e37d1dffd332a793d4b9e3617386d153", 0x21}, {&(0x7f0000000200)="09f96fbf33ceccc10976cd10b1411ee57d092fd5b7f95a0f19f01005f110463ccb2c6ebdb74ad7a7da1a2bed233154886db68984d477ebee11ce9a8e3510d401f6f31ea0a7e3ec1cda7b95f7a02b42753eb4cf0bbf5afbc7084f9bc2603aafe5da6cd54e4d647ec9fd641e4241513aaf23481d1f390bbb83dfae56369f4b03367ccd45f0ec4cd929aed127394157e7b3794500c0c5f88930b1ff50bbae1163c26fff28d06028", 0xa6}, {&(0x7f0000000100)="38d6cd435749d519cc39e90540f37c4f5c6bceef6c4ae07105cafc5e25d9bbfce859670b89666cca0857aa0c2abd8722a9db0caad3905e3ff682", 0x3a}, {&(0x7f0000000140)="d71206abd00e3c0a7e2440673da6a9fc2c1255a9b136bc982a3dc2ac21ef167250c176acfbd4d13abd86b018e8b1357842d8dc93e53f6b542e9633e1db8672e8", 0x40}], 0x4}}, {{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000380)="df304451b990364b1c6ff9c843eb47125c0a16565b5efbc0494b453f9863364196a743b5d226d34b2293f3b4b8dde4b8434172dec0902f0e03c2893c2bfd5f662eefc2902850a0221d55", 0x200003ca}, {&(0x7f0000000400)}], 0x2, &(0x7f0000000540)=[@ip_tos_u8={{0x11}}, @ip_ttl={{0x14}}, @ip_ttl={{0x14}}, @ip_tos_u8={{0x11}}], 0x60}}], 0x3, 0x0) sendmsg$inet_sctp(r8, &(0x7f00000006c0)={&(0x7f0000000100)=@in6={0xa, 0x4e23, 0x10, @dev={0xfe, 0x80, [], 0x18}, 0x7fe}, 0x1c, &(0x7f0000000640)=[{&(0x7f0000000200)="d5026f0b541ac0e7f8f0c77e48209dd320a5659a132618b690ec3343f2c153336985b6566e0539", 0x27}, {&(0x7f00000002c0)="656c0e45d00248a2f103db16353772c19f1591e7e691f6699274791548ac485bdb14bbf968b964fe76fc7fdf9cce8ccefb6e6895c76a810c1077795ddb9f8b1c9d40abfd18a3e3bef88087", 0x4b}, {&(0x7f0000000240)="cd08ec4d39488871012368febc15be7baf47b54ca1be20506e05c32e2b73c72f7b2ac3e6f8a9af9383", 0x29}, {&(0x7f0000000440)="e5bc3d6e06cbc30247f3643c983f5a1b8bb62fba367599ac8e1adfa348c6c12d398439dcc67e158800331c26410bb429b70630803f713b57040366496e74a6a62aeb069744ac3dbaada62534ec8042", 0x4f}, {&(0x7f00000004c0)="8c349240088db8c969d2a1f8760678106a9732563312eeb7e02e82033b950c50ad7cb168c4ef0db957d1d112d03849b8adf2a8e1", 0x34}, {&(0x7f0000000500)="4fb35f165d4aa92de68758f4227c400e27ed768a838941", 0x17}, {&(0x7f0000000580)="546a82f7fe478b7734665325137de5134c32f58acc00ee020e2bd74e62163c1902e1a11a5a113732ff19a81bdf09a456e4272e90f85bb6d6886b76e0e3a6a87e829d6db60d9ae518fd042786f84839592bb53ce75a90fe8aa30bd23a40f52e0f572f9c648fa33d0b93c9a6cf751e406a5c34950cc168242ce1b21e8a8ef7161e0313e8014016ae4f6718c2aa305676e60ff2cc9136841ee15c542483e5bbe39504126b2d55b01f8b0a935f", 0xab}], 0x7}, 0x20008050) r9 = fcntl$dupfd(r5, 0x0, r6) bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r10 = socket(0x0, 0x80002, 0x0) ioctl(r10, 0x1000008912, &(0x7f00000000c0)="080db5055e0bcfe8696071") flock(r10, 0x1) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c81", 0x10) ioctl$VIDIOC_S_EXT_CTRLS(r9, 0xc0205648, &(0x7f00000000c0)={0x0, 0x3b, 0x10001, 0xffffffffffffffff, 0x0, &(0x7f0000000080)={0x990900, 0x4, [], @value=0x15}}) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') 09:32:59 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_vs\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000080)='comm\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$EVIOCGABS3F(r4, 0x8018457f, &(0x7f0000000000)=""/32) setsockopt$inet_sctp_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) sendfile(r1, r0, 0x0, 0x20080000000) r5 = socket$can_bcm(0x1d, 0x2, 0x2) fcntl$setsig(r5, 0xa, 0x9) [ 1314.743729][ T8118] kAFS: unparsable volume name 09:32:59 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f0000000340)=ANY=[@ANYBLOB="b7020000f7ffffffbfa70000000000002402000020feffff7a0af0fff8ffffff69a4f0ff00000000b70600000018d1fe2d6405000000000075040000000000000704000000000000b7040000100000206a0700fe00000000850000002f000000b70000000a0000009500000000000000e535f8a62fc2868f0399d909a63796c113a80c19aab9d607000000b6cd483be3f0d3253730e711f5969f62c28b22756bedf3cf393d14c46cc4f79fd2b316da4f0de8163f6242fa732300000637c48468766af540439fce41f144631ac262dcae18c3d1a1fbe96dd87235b44174f7c0343185089a0f119e31975e551558055dc2dc"], &(0x7f0000000280)='GPL\x00'}, 0x48) r1 = socket$kcm(0x11, 0x8000000002, 0x300) socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000540)=r0, 0x4) syz_emit_ethernet(0x3e, &(0x7f0000000000)={@broadcast, @random="96c1e9574b31", @void, {@ipv4={0x500, @icmp={{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x1, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @local}, @time_exceeded={0xb, 0x0, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local, @multicast2}}}}}}, 0x0) 09:33:00 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000588ff8)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) newfstatat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x0) ioctl$IMCLEAR_L2(r2, 0x80044946, &(0x7f0000000100)=0x3) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) fcntl$lock(r0, 0x7, &(0x7f0000000840)={0x1}) fcntl$lock(r0, 0x6, &(0x7f0000000000)) 09:33:00 executing program 2: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f00000015c0)=ANY=[@ANYBLOB='%'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x3f000000, 0x0) 09:33:00 executing program 4: r0 = socket(0x0, 0x80002, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="080db5055e0bcfe8696071") setsockopt$inet_sctp6_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f0000000000)={0x800, 0x619, 0x2, 0x7a6}, 0x8) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000040)=ANY=[@ANYBLOB='#'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='dax\x00', 0x0, 0x0) 09:33:00 executing program 5: getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000440)={{{@in, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in6=@dev}}, &(0x7f0000000080)=0xe8) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x1e, &(0x7f0000000580)=ANY=[@ANYBLOB="b7020000f7ffffffbfa70000000000002402000020feffff7a0af0fff8ffffff69a4f0ff00000000b70600000018d1fe2d6405000000000075040000000000000704000000000000b7040000100000206a0700fe00000000850000002f000000b70000000a0000009500000000000000e535f8a62fc2868f0399d909a63796c113a80c19aab9d607000000ffffff7f000000003730e711f5969f62c28b22756bedf3cf393d14c46cc4f79fd2b316da4f0de816596242fa732300000637c48468766af540439fce41f144631ac262dcae18c3d1a1fbe96dd87235b44174f7c0343185089a0f119e31975e551558055dc2dca6b369d70fa461cf93908e9eb24d37d55f7a2d3dcd0c3cfa73d3ed9dc122b3917261892ef3a9ee14e40c1c646b9b84d0ff8ae443"], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], r0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) r2 = socket$kcm(0x11, 0x8000000002, 0x300) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000540)=r1, 0x4) r3 = socket(0x0, 0x80002, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000000c0)="080db5055e0bcfe8696071") setsockopt$inet6_udp_int(r3, 0x11, 0x67, &(0x7f00000001c0)=0x8001, 0x4) socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = fcntl$dupfd(r4, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_AUTOCLOSE(r6, 0x84, 0x4, &(0x7f0000000180)=0x2, 0x4) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') socket$inet_udp(0x2, 0x2, 0x0) r7 = getpid() sched_setscheduler(r7, 0x5, &(0x7f0000000380)) r8 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) fsetxattr$system_posix_acl(r8, &(0x7f0000000240)='system.posix_acl_access\x00', &(0x7f0000000a40)=ANY=[@ANYRES32, @ANYBLOB="91ebb354fd31a94555ba5d2c925d8ff657a2e96ac0ef243599e826d4dd5c3935c24740f2cb2c29d2790f9cf23502515809e6e9ee58877eca3feedc3893bd571c46b022a27342354f350460cbbd81ef2eb1", @ANYRESHEX=r7], 0x3, 0x1) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={0xffffffffffffffff, 0xc0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=0x400, 0x0, 0x0, 0x0, &(0x7f00000002c0)={0x5, 0x3}, 0x0, 0x0, &(0x7f0000000300)={0x3, 0xb, 0x7, 0x4cd}, &(0x7f0000000340)=0xffffffffffff8001, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=0x3}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={r7, r6, 0x0, 0x1, &(0x7f0000000200)='\x00', r9}, 0x30) 09:33:00 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x20) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @ipv4={[], [], @multicast2}, 0x9d6b}, 0x1c) sendmmsg(r0, &(0x7f000000ac80), 0x66, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f00000001c0)=ANY=[@ANYRES32=0x0], 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f0000000100)={0x0, 0x1, 0x10}, 0xc) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x2300, 0x0) setsockopt$inet_buf(r1, 0x0, 0x19, &(0x7f00000000c0)="ae36ebf7682277ba881d4060aa19926549d2c482f548658457895c1f3492deecb230857ebfd0f3", 0x27) 09:33:00 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f0000000340)=ANY=[@ANYBLOB="b7020000f7ffffffbfa70000000000002402000020feffff7a0af0fff8ffffff69a4f0ff00000000b70600000018d1fe2d6405000000000075040000000000000704000000000000b7040000100000206a0700fe00000000850000002f000000b70000000a0000009500000000000000e535f8a62fc2868f0399d909a63796c113a80c19aab9d607000000b6cd483be3f0d3253730e711f5969f62c28b22756bedf3cf393d14c46cc4f79fd2b316da4f0de8163f6242fa732300000637c48468766af540439fce41f144631ac262dcae18c3d1a1fbe96dd87235b44174f7c0343185089a0f119e31975e551558055dc2dc"], &(0x7f0000000280)='GPL\x00'}, 0x48) r1 = socket$kcm(0x11, 0x8000000002, 0x300) socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000540)=r0, 0x4) syz_emit_ethernet(0x3e, &(0x7f0000000000)={@broadcast, @random="96c1e9574b31", @void, {@ipv4={0x600, @icmp={{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x1, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @local}, @time_exceeded={0xb, 0x0, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local, @multicast2}}}}}}, 0x0) [ 1315.265893][ T8449] kAFS: unparsable volume name 09:33:00 executing program 2: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f00000015c0)=ANY=[@ANYBLOB='%'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x40000000, 0x0) [ 1315.396007][ T8620] kAFS: unparsable volume name 09:33:00 executing program 2: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f00000015c0)=ANY=[@ANYBLOB='%'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x48000000, 0x0) 09:33:00 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f0000000340)=ANY=[@ANYBLOB="b7020000f7ffffffbfa70000000000002402000020feffff7a0af0fff8ffffff69a4f0ff00000000b70600000018d1fe2d6405000000000075040000000000000704000000000000b7040000100000206a0700fe00000000850000002f000000b70000000a0000009500000000000000e535f8a62fc2868f0399d909a63796c113a80c19aab9d607000000b6cd483be3f0d3253730e711f5969f62c28b22756bedf3cf393d14c46cc4f79fd2b316da4f0de8163f6242fa732300000637c48468766af540439fce41f144631ac262dcae18c3d1a1fbe96dd87235b44174f7c0343185089a0f119e31975e551558055dc2dc"], &(0x7f0000000280)='GPL\x00'}, 0x48) r1 = socket$kcm(0x11, 0x8000000002, 0x300) socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000540)=r0, 0x4) syz_emit_ethernet(0x3e, &(0x7f0000000000)={@broadcast, @random="96c1e9574b31", @void, {@ipv4={0x700, @icmp={{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x1, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @local}, @time_exceeded={0xb, 0x0, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local, @multicast2}}}}}}, 0x0) 09:33:00 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f00000015c0)=ANY=[@ANYBLOB='#'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) mount(&(0x7f00000000c0)=@nullb='/dev/nullb0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='ocfs2\x00', 0xfa12bf8bc43884a4, &(0x7f0000000240)='afs\x00') socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setitimer(0x0, &(0x7f0000000040)={{}, {0x77359400}}, &(0x7f0000000080)) ioctl$SNDRV_TIMER_IOCTL_TREAD(r2, 0x40045402, &(0x7f0000000000)=0x1) [ 1315.639641][ T8773] kAFS: unparsable volume name [ 1315.662302][ T8774] kAFS: unparsable volume name [ 1315.685611][ T8773] kAFS: unparsable volume name 09:33:00 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYRES16], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) r0 = socket(0x0, 0x80002, 0x0) r1 = dup3(0xffffffffffffffff, r0, 0x80000) sendmsg$unix(r1, &(0x7f00000001c0)={&(0x7f0000000040)=@abs={0x643a7878a6ae4b2, 0x0, 0x4e21}, 0x6e, &(0x7f0000000100)=[{&(0x7f00000000c0)="c8186ffa3361b81b84a502614a18f12c5c6ebe7438ecbb4a25d372aea615c26533892742c8ee5c82bed6d289a674", 0x23}], 0x100000000000008d, 0x0, 0x0, 0x86}, 0x20008801) r2 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x2) signalfd(r2, &(0x7f0000000000)={0x6}, 0x8) 09:33:00 executing program 2: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f00000015c0)=ANY=[@ANYBLOB='%'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x4c000000, 0x0) [ 1315.828957][ T8983] kAFS: unparsable volume name [ 1315.837326][ T8984] kAFS: unparsable volume name [ 1315.885232][ T8984] kAFS: unparsable volume name 09:33:01 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000588ff8)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) fcntl$lock(r0, 0x7, &(0x7f0000000840)={0x1}) fcntl$lock(r0, 0x6, &(0x7f0000000000)) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000580)={r3, 0x0, 0x1, [0x0]}, 0xa) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r2, 0x84, 0x76, &(0x7f0000000040)={r3, 0x6}, &(0x7f0000000080)=0x8) 09:33:01 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="33c83f5744", 0x5) socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$RTC_IRQP_SET(r3, 0x4008700c, 0x1a18) ioctl$TIOCEXCL(r0, 0x540c) 09:33:01 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f0000000340)=ANY=[@ANYBLOB="b7020000f7ffffffbfa70000000000002402000020feffff7a0af0fff8ffffff69a4f0ff00000000b70600000018d1fe2d6405000000000075040000000000000704000000000000b7040000100000206a0700fe00000000850000002f000000b70000000a0000009500000000000000e535f8a62fc2868f0399d909a63796c113a80c19aab9d607000000b6cd483be3f0d3253730e711f5969f62c28b22756bedf3cf393d14c46cc4f79fd2b316da4f0de8163f6242fa732300000637c48468766af540439fce41f144631ac262dcae18c3d1a1fbe96dd87235b44174f7c0343185089a0f119e31975e551558055dc2dc"], &(0x7f0000000280)='GPL\x00'}, 0x48) r1 = socket$kcm(0x11, 0x8000000002, 0x300) socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000540)=r0, 0x4) syz_emit_ethernet(0x3e, &(0x7f0000000000)={@broadcast, @random="96c1e9574b31", @void, {@ipv4={0x802, @icmp={{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x1, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @local}, @time_exceeded={0xb, 0x0, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local, @multicast2}}}}}}, 0x0) 09:33:01 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f0000000340)=ANY=[@ANYBLOB="b7020000f7ffe9ffbfa70000000000002402000020feffff7a0af0fff8ffffff69a4f0ff00000000b70600000018d1fe2d6405000000000075040000000000000704000000040000b7040000100000206a0700fe00000000850000002f000000b70000000a0000009500000000000000e735f8a62fc2868f0399d909a63796c113a80c19aab9d607000000b6cd483be3f0d3253730e711f5969f62c28b22756bedf3cf393d14c46cc4f79fd2b316da4f0de8163f6242fa732300000637c48468766af540439fce41f144631ac262dcae18c3d1a1fbe96dd87235b44174f7c0343185089a0f119e31975e551558055dc2dc"], &(0x7f0000000280)='GPL\x00'}, 0x48) r1 = socket$kcm(0x11, 0x8000000002, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000540)=r0, 0x4) r2 = openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000300)='/dev/nvme-fabrics\x00', 0x40, 0x0) ioctl$VIDIOC_OVERLAY(r2, 0x4004560e, &(0x7f0000000440)=0x9) socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r4 = socket$inet_udplite(0x2, 0x2, 0x88) fcntl$dupfd(r3, 0x0, r4) socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r6 = socket$alg(0x26, 0x5, 0x0) bind$alg(r6, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r7 = accept4(r6, 0x0, 0x0, 0x0) sendmmsg$inet(r7, &(0x7f0000000680)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f00000000c0)="5831255624c13e4c563f221188b6be66ea", 0x11}], 0x1}}, {{&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000002c0)=[{&(0x7f0000000040)="70a6b8247e016ae2647a2e703fce46c432e37d1dffd332a793d4b9e3617386d153", 0x21}, {&(0x7f0000000200)="09f96fbf33ceccc10976cd10b1411ee57d092fd5b7f95a0f19f01005f110463ccb2c6ebdb74ad7a7da1a2bed233154886db68984d477ebee11ce9a8e3510d401f6f31ea0a7e3ec1cda7b95f7a02b42753eb4cf0bbf5afbc7084f9bc2603aafe5da6cd54e4d647ec9fd641e4241513aaf23481d1f390bbb83dfae56369f4b03367ccd45f0ec4cd929aed127394157e7b3794500c0c5f88930b1ff50bbae1163c26fff28d06028", 0xa6}, {&(0x7f0000000100)="38d6cd435749d519cc39e90540f37c4f5c6bceef6c4ae07105cafc5e25d9bbfce859670b89666cca0857aa0c2abd8722a9db0caad3905e3ff682", 0x3a}, {&(0x7f0000000140)="d71206abd00e3c0a7e2440673da6a9fc2c1255a9b136bc982a3dc2ac21ef167250c176acfbd4d13abd86b018e8b1357842d8dc93e53f6b542e9633e1db8672e8", 0x40}], 0x4}}, {{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000380)="df304451b990364b1c6ff9c843eb47125c0a16565b5efbc0494b453f9863364196a743b5d226d34b2293f3b4b8dde4b8434172dec0902f0e03c2893c2bfd5f662eefc2902850a0221d55", 0x200003ca}, {&(0x7f0000000400)}], 0x2, &(0x7f0000000540)=[@ip_tos_u8={{0x11}}, @ip_ttl={{0x14}}, @ip_ttl={{0x14}}, @ip_tos_u8={{0x11}}], 0x60}}], 0x3, 0x0) ioctl$IMSETDEVNAME(r7, 0x80184947, &(0x7f00000000c0)={0x6, 'syz1\x00'}) r8 = socket$inet_udplite(0x2, 0x2, 0x88) r9 = fcntl$dupfd(r5, 0x0, r8) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) ioctl$EVIOCSKEYCODE(r9, 0x40084504, &(0x7f0000000080)=[0xfffff24e, 0x7]) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') 09:33:01 executing program 2: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f00000015c0)=ANY=[@ANYBLOB='%'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x60000000, 0x0) 09:33:01 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f00000015c0)=ANY=[@ANYBLOB='\x00'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1316.180783][ T9323] kAFS: Bad value for 'source' [ 1316.190108][ T9326] kAFS: unparsable volume name 09:33:01 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) 09:33:01 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f0000000340)=ANY=[@ANYBLOB="b7020000f7ffffffbfa70000000000002402000020feffff7a0af0fff8ffffff69a4f0ff00000000b70600000018d1fe2d6405000000000075040000000000000704000000000000b7040000100000206a0700fe00000000850000002f000000b70000000a0000009500000000000000e535f8a62fc2868f0399d909a63796c113a80c19aab9d607000000b6cd483be3f0d3253730e711f5969f62c28b22756bedf3cf393d14c46cc4f79fd2b316da4f0de8163f6242fa732300000637c48468766af540439fce41f144631ac262dcae18c3d1a1fbe96dd87235b44174f7c0343185089a0f119e31975e551558055dc2dc"], &(0x7f0000000280)='GPL\x00'}, 0x48) r1 = socket$kcm(0x11, 0x8000000002, 0x300) socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000540)=r0, 0x4) syz_emit_ethernet(0x3e, &(0x7f0000000000)={@broadcast, @random="96c1e9574b31", @void, {@ipv4={0x803, @icmp={{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x1, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @local}, @time_exceeded={0xb, 0x0, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local, @multicast2}}}}}}, 0x0) 09:33:01 executing program 4: mount(&(0x7f00000015c0)=ANY=[@ANYBLOB='#'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) r0 = socket(0x0, 0x80002, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="080db5055e0bcfe8696071") r1 = dup(r0) socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ftruncate(r3, 0x138) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = fcntl$dupfd(r2, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r5, &(0x7f0000000040)={0xb, 0x10, 0xfa00, {&(0x7f00000001c0), 0xffffffffffffffff, 0x2}}, 0x18) ioctl$RNDADDTOENTCNT(r1, 0x40045201, &(0x7f0000000000)=0x8000) 09:33:01 executing program 2: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f00000015c0)=ANY=[@ANYBLOB='%'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x68000000, 0x0) 09:33:01 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0x1e, &(0x7f0000000580)=ANY=[@ANYBLOB="b7020000f7ffffffbfa70000000000002402000020feffff7a0af0fff8ffffff69a4f0ff00000000b70600000018d1fe2d6405000000000075040000000000000704000000000000b7040000100000206a0700fe00000000850000002f00000068196ada86c6b70000000a0000009500000000000000e535f8a62fc2868f0399d909a63796c113a80c19aab9d607000000b6cd483be3f0d3253730e711f5969f62c28b22756bedf3cf393d14c46cc4f79fd2b316da4f0de8163f6242fa732300000637c48468766af540439fce41f144631ac262dcae18c3d1a1fbe96dd87235b44174f7c0343185089a0f119e31975e551558055dc2dc"], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) r1 = socket$kcm(0x11, 0x8000000002, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000540)=r0, 0x4) socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = fcntl$dupfd(r2, 0x0, r3) r5 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x8e000, 0x0) ioctl$SNDRV_PCM_IOCTL_READI_FRAMES(r5, 0x80184151, &(0x7f00000003c0)={0x0, &(0x7f00000002c0)="bac0c4506bd88b58f5f8d354f2c454f4fa93d1fb89378ddc159a0295d31aae08559c0319206edc5eed2bfc970cef407ec1c515a18b2e30a06c26eac5e0b1ca24809618d5298c7fd72e307d4135dc8d0bd323d6352b56f40fe8367d3986a1fe6df5b1c9cf5be387546b6e052256addb349e713b58e5af2061e3ba6f1d772dcd5026993baedadc4734ac595b37cf08e7fe1331465e84be34b832b701850fd2dba7c54d87c88485f450efb7ac5d67b19fa29bf38afc95a44223ff53ee85de252b003f581b15371c5dc4191c7e5f9c052b76bb6de3ee9f7d7a1f173204e86e4e47663ee5aad111a80aa06e8297a8cc", 0xed}) r6 = socket(0x0, 0x80002, 0x0) ioctl(r6, 0x1000008912, &(0x7f00000000c0)="080db5055e0bcfe8696071") openat$snapshot(0xffffffffffffff9c, &(0x7f0000000240)='/dev/snapshot\x00', 0x88000, 0x0) r7 = accept$unix(r4, &(0x7f0000000440), &(0x7f0000000100)=0x6e) ioctl$sock_SIOCADDRT(r7, 0x890b, &(0x7f00000001c0)={0x0, @vsock={0x28, 0x0, 0x1ffffd8ef, @local}, @vsock={0x28, 0x0, 0x2710, @hyper}, @rc={0x1f, {0x3f, 0x0, 0x7f, 0x1, 0xef, 0x9}, 0x40}, 0x3, 0x0, 0x0, 0x0, 0x6, 0x0, 0x4, 0x9, 0x6}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') 09:33:01 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) dup2(0xffffffffffffffff, 0xffffffffffffffff) pipe(&(0x7f0000000000)={0xffffffffffffffff}) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000240)={0x0, 0x80000001, 0x1, {0xd, @pix={0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}}}) socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r3, 0x40045532, &(0x7f0000000040)=0x904) [ 1316.477746][ T9527] kAFS: unparsable volume name 09:33:02 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000588ff8)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r4 = accept4(r3, 0x0, 0x0, 0x0) sendmmsg$inet(r4, &(0x7f0000000680)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f00000000c0)="5831255624c13e4c563f221188b6be66ea", 0x11}], 0x1}}, {{&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000002c0)=[{&(0x7f0000000040)="70a6b8247e016ae2647a2e703fce46c432e37d1dffd332a793d4b9e3617386d153", 0x21}, {&(0x7f0000000200)="09f96fbf33ceccc10976cd10b1411ee57d092fd5b7f95a0f19f01005f110463ccb2c6ebdb74ad7a7da1a2bed233154886db68984d477ebee11ce9a8e3510d401f6f31ea0a7e3ec1cda7b95f7a02b42753eb4cf0bbf5afbc7084f9bc2603aafe5da6cd54e4d647ec9fd641e4241513aaf23481d1f390bbb83dfae56369f4b03367ccd45f0ec4cd929aed127394157e7b3794500c0c5f88930b1ff50bbae1163c26fff28d06028", 0xa6}, {&(0x7f0000000100)="38d6cd435749d519cc39e90540f37c4f5c6bceef6c4ae07105cafc5e25d9bbfce859670b89666cca0857aa0c2abd8722a9db0caad3905e3ff682", 0x3a}, {&(0x7f0000000140)="d71206abd00e3c0a7e2440673da6a9fc2c1255a9b136bc982a3dc2ac21ef167250c176acfbd4d13abd86b018e8b1357842d8dc93e53f6b542e9633e1db8672e8", 0x40}], 0x4}}, {{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000380)="df304451b990364b1c6ff9c843eb47125c0a16565b5efbc0494b453f9863364196a743b5d226d34b2293f3b4b8dde4b8434172dec0902f0e03c2893c2bfd5f662eefc2902850a0221d55", 0x200003ca}, {&(0x7f0000000400)}], 0x2, &(0x7f0000000540)=[@ip_tos_u8={{0x11}}, @ip_ttl={{0x14}}, @ip_ttl={{0x14}}, @ip_tos_u8={{0x11}}], 0x60}}], 0x3, 0x0) getsockopt$inet_mreqsrc(r4, 0x0, 0x28, &(0x7f0000000040)={@remote, @empty, @multicast1}, &(0x7f0000000080)=0xc) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) fcntl$lock(r0, 0x7, &(0x7f0000000840)={0x1}) fcntl$lock(r0, 0x7, &(0x7f0000000000)) 09:33:02 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f0000000340)=ANY=[@ANYBLOB="b7020000f7ffffffbfa70000000000002402000020feffff7a0af0fff8ffffff69a4f0ff00000000b70600000018d1fe2d6405000000000075040000000000000704000000000000b7040000100000206a0700fe00000000850000002f000000b70000000a0000009500000000000000e535f8a62fc2868f0399d909a63796c113a80c19aab9d607000000b6cd483be3f0d3253730e711f5969f62c28b22756bedf3cf393d14c46cc4f79fd2b316da4f0de8163f6242fa732300000637c48468766af540439fce41f144631ac262dcae18c3d1a1fbe96dd87235b44174f7c0343185089a0f119e31975e551558055dc2dc"], &(0x7f0000000280)='GPL\x00'}, 0x48) r1 = socket$kcm(0x11, 0x8000000002, 0x300) socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000540)=r0, 0x4) syz_emit_ethernet(0x3e, &(0x7f0000000000)={@broadcast, @random="96c1e9574b31", @void, {@ipv4={0x804, @icmp={{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x1, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @local}, @time_exceeded={0xb, 0x0, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local, @multicast2}}}}}}, 0x0) 09:33:02 executing program 2: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f00000015c0)=ANY=[@ANYBLOB='%'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x6c000000, 0x0) 09:33:02 executing program 4: socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UI_SET_RELBIT(r2, 0x40045566, 0x3) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f00000015c0)=ANY=[@ANYBLOB='#'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:33:02 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f0000000340)=ANY=[@ANYBLOB="b7020000f7ffffffbfa70000000000002402000020feffff7a0af0fff8ffffff69a4f0ff00000000b70600000018d1fe2d6405000000000075040000000000000704000000000000b7040000100000206a0700fe00000000850000002f000000b70000000a0000009500000000000000e535f8a62fc2868f0399d909a63796c113a80c19aab9d607000000b6cd483be3f0d3253730e711f5969f62c28b22756bedf3cf393d14c46cc4f79fd2b316da4f0de8163f6242fa732300000637c48468766af540439fce41f144631ac262dcae18c3d1a1fbe96dd87235b44174f7c0343185089a0f119e31975e551558055dc2dc"], &(0x7f0000000280)='GPL\x00'}, 0x48) r1 = socket$kcm(0x11, 0x8000000002, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000540)=r0, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') [ 1316.893323][ T9895] kAFS: unparsable volume name [ 1316.942690][ T9928] kAFS: unparsable volume name 09:33:02 executing program 4: ioctl$SG_GET_LOW_DMA(0xffffffffffffffff, 0x227a, &(0x7f0000000000)) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000080)=ANY=[@ANYBLOB="2355d9da810f118761505cbc243ebf1c64a62949ee1ffbc71464c1a4b4ad7f05daac119155dd2c494ab77876f112c1cb862533c9631de1e9f4a4c625866e0af1371f68dbbb326e5fe3b4939465d11e6c554bd146d75ef0e3001ff01e4691ac1e5fd2"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:33:02 executing program 3: pipe2$9p(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x80001, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) syz_open_dev$vcsa(0x0, 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) dup(0xffffffffffffffff) r1 = syz_open_procfs(0x0, 0x0) getdents(r1, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000041c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4}, 0x0, 0x3, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xfffffef3) write$P9_RGETLOCK(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000005c0)=0x169, 0x4) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000780)={@in={{0x2, 0x0, @local}}, 0x0, 0x9, 0x2}, 0xd8) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100), 0x4) recvmsg(r0, &(0x7f0000000240)={0x0, 0xfffffffffffffd83, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0x5801}], 0x1, 0x0, 0xf080}, 0x100) ioctl$KVM_GET_API_VERSION(0xffffffffffffffff, 0xae00, 0x0) socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = openat$cgroup_procs(r1, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) ioctl$LOOP_SET_FD(r4, 0x4c00, r5) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 09:33:02 executing program 2: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f00000015c0)=ANY=[@ANYBLOB='%'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x74000000, 0x0) 09:33:02 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0x2b, &(0x7f0000000580)=ANY=[@ANYBLOB="b7020000f7ffffffbfa70000000000002402000020feffff7a0af0fff8ffffff69a4f0ff00000000b70600000018d1fe2d640500000000007504dd0000000000079e1b057d270acc47040000100000206a0700fe0000000085c018d21c7456010000002f000000b70000000a0000009500000000000000e535f8a62fc2868f0399d909a63796c113a80c19aab9d607000000b6cd483be3f0d3253730e711f5969f62c28b22756bedf3cf393d14c46cc4f79fd2b316da4f0de8163f6242fa732300000637c48468766af540439fce41f144631ac262dcae18c3d1a1fbe96dd87235b44174f7c0343185089a0f119e31975e551558055dc2dc1c57c55a001bec2403886fd546d192d828986bca43100aedacaee7b8c9fa397a396e6efd398f1a8ca998000e352195212ffa8f287c2251fecee6fc20ff7b1d7dced40ca831ba0457f615099d47062dbbae3b3c04fef2557a3d2f521d3c2d9249c7"], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000080), 0x8, 0x10, &(0x7f0000000000)={0xfffffffe}, 0x10}, 0x78) r1 = socket$kcm(0x11, 0x8000000002, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000540)=r0, 0x4) socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') 09:33:02 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f0000000340)=ANY=[@ANYBLOB="b7020000f7ffffffbfa70000000000002402000020feffff7a0af0fff8ffffff69a4f0ff00000000b70600000018d1fe2d6405000000000075040000000000000704000000000000b7040000100000206a0700fe00000000850000002f000000b70000000a0000009500000000000000e535f8a62fc2868f0399d909a63796c113a80c19aab9d607000000b6cd483be3f0d3253730e711f5969f62c28b22756bedf3cf393d14c46cc4f79fd2b316da4f0de8163f6242fa732300000637c48468766af540439fce41f144631ac262dcae18c3d1a1fbe96dd87235b44174f7c0343185089a0f119e31975e551558055dc2dc"], &(0x7f0000000280)='GPL\x00'}, 0x48) r1 = socket$kcm(0x11, 0x8000000002, 0x300) socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000540)=r0, 0x4) syz_emit_ethernet(0x3e, &(0x7f0000000000)={@broadcast, @random="96c1e9574b31", @void, {@ipv4={0x806, @icmp={{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x1, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @local}, @time_exceeded={0xb, 0x0, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local, @multicast2}}}}}}, 0x0) [ 1317.227296][T10212] kAFS: unparsable volume name 09:33:02 executing program 2: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f00000015c0)=ANY=[@ANYBLOB='%'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x7a000000, 0x0) 09:33:02 executing program 3: ioctl$SG_GET_LOW_DMA(0xffffffffffffffff, 0x227a, &(0x7f0000000000)) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000080)=ANY=[@ANYBLOB="2355d9da810f118761505cbc243ebf1c64a62949ee1ffbc71464c1a4b4ad7f05daac119155dd2c494ab77876f112c1cb862533c9631de1e9f4a4c625866e0af1371f68dbbb326e5fe3b4939465d11e6c554bd146d75ef0e3001ff01e4691ac1e5fd2"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1317.402506][T10397] kAFS: unparsable volume name 09:33:02 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000588ff8)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) fcntl$lock(r0, 0x7, &(0x7f0000000840)={0x1}) r3 = open(&(0x7f0000000080)='./file0\x00', 0x20000, 0x6) ioctl$LOOP_CLR_FD(r3, 0x4c01) fcntl$lock(r0, 0x6, &(0x7f0000000000)) ioctl$SNDRV_PCM_IOCTL_USER_PVERSION(r3, 0x40044104, &(0x7f00000000c0)=0x5) socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = fcntl$dupfd(r4, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) io_uring_register$IORING_REGISTER_EVENTFD(r2, 0x4, &(0x7f0000000040)=r6, 0x1) 09:33:02 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f0000000340)=ANY=[@ANYBLOB="b7020000f7ffffffbfa70000020000000900000020feffff7a0af0fff8ffffff69a4f0ff00000000b70600000018d1fe2d6405000000000075040000000000000704000000002000b7040000100000206a0700fe00000000850000002f000000b70000000a0000009500000000000000e535f8a62fc2868f0399d909a63796c113a80c19aab9d607000000b6cd483be3f0d3253730e711f5969f62c28b22756bedf3cf393d14c46cc4f79fd2b316da4f0de8163f6242fa732300000637c48468766af540439fce41f144631ac262dcae18c3d1a1fbe96dd831975e551558055dc2dc00"/241], &(0x7f0000000280)='GPL\x00'}, 0x48) r1 = socket$kcm(0x11, 0x8000000002, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000540)=r0, 0x4) socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') 09:33:02 executing program 2: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f00000015c0)=ANY=[@ANYBLOB='%'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x8cffffff, 0x0) 09:33:02 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f0000000340)=ANY=[@ANYBLOB="b7020000f7ffffffbfa70000000000002402000020feffff7a0af0fff8ffffff69a4f0ff00000000b70600000018d1fe2d6405000000000075040000000000000704000000000000b7040000100000206a0700fe00000000850000002f000000b70000000a0000009500000000000000e535f8a62fc2868f0399d909a63796c113a80c19aab9d607000000b6cd483be3f0d3253730e711f5969f62c28b22756bedf3cf393d14c46cc4f79fd2b316da4f0de8163f6242fa732300000637c48468766af540439fce41f144631ac262dcae18c3d1a1fbe96dd87235b44174f7c0343185089a0f119e31975e551558055dc2dc"], &(0x7f0000000280)='GPL\x00'}, 0x48) r1 = socket$kcm(0x11, 0x8000000002, 0x300) socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000540)=r0, 0x4) syz_emit_ethernet(0x3e, &(0x7f0000000000)={@broadcast, @random="96c1e9574b31", @void, {@ipv4={0x807, @icmp={{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x1, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @local}, @time_exceeded={0xb, 0x0, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local, @multicast2}}}}}}, 0x0) 09:33:02 executing program 3: ioctl$SG_GET_LOW_DMA(0xffffffffffffffff, 0x227a, &(0x7f0000000000)) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000080)=ANY=[@ANYBLOB="2355d9da810f118761505cbc243ebf1c64a62949ee1ffbc71464c1a4b4ad7f05daac119155dd2c494ab77876f112c1cb862533c9631de1e9f4a4c625866e0af1371f68dbbb326e5fe3b4939465d11e6c554bd146d75ef0e3001ff01e4691ac1e5fd2"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:33:02 executing program 2: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f00000015c0)=ANY=[@ANYBLOB='%'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0xc0ed0000, 0x0) 09:33:03 executing program 3: ioctl$SG_GET_LOW_DMA(0xffffffffffffffff, 0x227a, &(0x7f0000000000)) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000080)=ANY=[@ANYBLOB="2355d9da810f118761505cbc243ebf1c64a62949ee1ffbc71464c1a4b4ad7f05daac119155dd2c494ab77876f112c1cb862533c9631de1e9f4a4c625866e0af1371f68dbbb326e5fe3b4939465d11e6c554bd146d75ef0e3001ff01e4691ac1e5fd2"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:33:03 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f0000000340)=ANY=[@ANYBLOB="b7020000f7ffffffbfa70000000000002402000020feffff7a0af0fff8ffffff69a4f0ff00000000b70600000018d1fe2d6405000000000075040000000000000704000000000000b7040000100000206a0700fe00000000850000002f000000b70000000a0000009500000000000000e535f8a62fc2868f0399d909a63796c113a80c19aab9d607000000b6cd483be3f0d3253730e711f5969f62c28b22756bedf3cf393d14c46cc4f79fd2b316da4f0de8163f6242fa732300000637c48468766af540439fce41f144631ac262dcae18c3d1a1fbe96dd87235b44174f7c0343185089a0f119e31975e551558055dc2dc"], &(0x7f0000000280)='GPL\x00'}, 0x48) r1 = socket$kcm(0x11, 0x8000000002, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000540)=r0, 0x4) socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') ioctl$TIOCGWINSZ(r4, 0x5413, &(0x7f0000000080)) [ 1317.927757][T10600] kAFS: unparsable volume name 09:33:03 executing program 3: ioctl$SG_GET_LOW_DMA(0xffffffffffffffff, 0x227a, &(0x7f0000000000)) mount(&(0x7f0000000080)=ANY=[@ANYBLOB="2355d9da810f118761505cbc243ebf1c64a62949ee1ffbc71464c1a4b4ad7f05daac119155dd2c494ab77876f112c1cb862533c9631de1e9f4a4c625866e0af1371f68dbbb326e5fe3b4939465d11e6c554bd146d75ef0e3001ff01e4691ac1e5fd2"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:33:03 executing program 2: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f00000015c0)=ANY=[@ANYBLOB='%'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0xf6ffffff, 0x0) 09:33:03 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f0000000340)=ANY=[@ANYBLOB="b7020000f7ffffffbfa70000000000002402000020feffff7a0af0fff8ffffff69a4f0ff00000000b70600000018d1fe2d6405000000000075040000000000000704000000000000b7040000100000206a0700fe00000000850000002f000000b70000000a0000009500000000000000e535f8a62fc2868f0399d909a63796c113a80c19aab9d607000000b6cd483be3f0d3253730e711f5969f62c28b22756bedf3cf393d14c46cc4f79fd2b316da4f0de8163f6242fa732300000637c48468766af540439fce41f144631ac262dcae18c3d1a1fbe96dd87235b44174f7c0343185089a0f119e31975e551558055dc2dc"], &(0x7f0000000280)='GPL\x00'}, 0x48) r1 = socket$kcm(0x11, 0x8000000002, 0x300) socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000540)=r0, 0x4) syz_emit_ethernet(0x3e, &(0x7f0000000000)={@broadcast, @random="96c1e9574b31", @void, {@ipv4={0x808, @icmp={{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x1, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @local}, @time_exceeded={0xb, 0x0, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local, @multicast2}}}}}}, 0x0) 09:33:03 executing program 2: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f00000015c0)=ANY=[@ANYBLOB='%'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0xff000000, 0x0) 09:33:04 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f0000000340)=ANY=[@ANYBLOB="b7020000f7ffffffbfa70000000000002402000020feffff7a0af0fff8ffffff69a4f0ff00000000b70600000018d1fe2d6405000000000075040000000000000704000000000000b7040000100000206a0700fe00000000850000002f000000b70000000a0000009500000000000000e535f8a62fc2868f0399d909a63796c113a80c19aab9d607000000b6cd483be3f0d3253730e711f5969f62c28b22756bedf3cf393d14c46cc4f79fd2b316da4f0de8163f6242fa732300000637c48468766af540439fce41f144631ac262dcae18c3d1a1fbe96dd87235b44174f7c0343185089a0f119e31975e551558055dc2dc"], &(0x7f0000000280)='GPL\x00'}, 0x48) r1 = socket$kcm(0x11, 0x8000000002, 0x300) socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000540)=r0, 0x4) syz_emit_ethernet(0x3e, &(0x7f0000000000)={@broadcast, @random="96c1e9574b31", @void, {@ipv4={0x80b, @icmp={{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x1, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @local}, @time_exceeded={0xb, 0x0, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local, @multicast2}}}}}}, 0x0) 09:33:04 executing program 5: r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ubi_ctrl\x00', 0x0, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='bic\x00', 0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f0000000340)=ANY=[@ANYBLOB="b7020000f7ffffffbfa70000000000002402000020feffff7a0af0fff8ffffff69a4f0ff00000000b70600000018d1fe2d6405000000000075040000000000000704000000000000b7040000100000206a0700fe00000000850000002f000000b70000000a0000009500000000000000e535f8a62fc2868f0399d909a63796c113a80c19aab9d607000000b6cd483be3f0d3253730e711f5969f62c28b22756bedf3cf393d14c46cc4f79fd2b316da4f0de8163f6242fa732300000637c48468766af540439fce41f144631ac262dcae18c3d1a1fbe96dd87235b44174f7c0343185089a0f119e31975e551558055dc2dc"], &(0x7f0000000280)='GPL\x00'}, 0x48) r2 = socket$kcm(0x11, 0x8000000002, 0x300) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000540)=r1, 0x4) socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = fcntl$dupfd(r3, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') 09:33:04 executing program 3: ioctl$SG_GET_LOW_DMA(0xffffffffffffffff, 0x227a, &(0x7f0000000000)) mount(&(0x7f0000000080)=ANY=[@ANYBLOB="2355d9da810f118761505cbc243ebf1c64a62949ee1ffbc71464c1a4b4ad7f05daac119155dd2c494ab77876f112c1cb862533c9631de1e9f4a4c625866e0af1371f68dbbb326e5fe3b4939465d11e6c554bd146d75ef0e3001ff01e4691ac1e5fd2"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:33:04 executing program 2: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f00000015c0)=ANY=[@ANYBLOB='%'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0xfffff000, 0x0) 09:33:04 executing program 3: ioctl$SG_GET_LOW_DMA(0xffffffffffffffff, 0x227a, &(0x7f0000000000)) mount(&(0x7f0000000080)=ANY=[@ANYBLOB="2355d9da810f118761505cbc243ebf1c64a62949ee1ffbc71464c1a4b4ad7f05daac119155dd2c494ab77876f112c1cb862533c9631de1e9f4a4c625866e0af1371f68dbbb326e5fe3b4939465d11e6c554bd146d75ef0e3001ff01e4691ac1e5fd2"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:33:04 executing program 2: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f00000015c0)=ANY=[@ANYBLOB='%'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0xffffff8c, 0x0) 09:33:04 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f0000000340)=ANY=[@ANYBLOB="b7020000f7ffffffbfa70000000000002402000020feffff7a0af0fff8ffffff69a4f0ff00000000b70600000018d1fe2d6405000000000075040000000000000704000000000000b7040000100000206a0700fe00000000850000002f000000b70000000a0000009500000000000000e535f8a62fc2868f0399d909a63796c113a80c19aab9d607000000b6cd483be3f0d3253730e711f5969f62c28b22756bedf3cf393d14c46cc4f79fd2b316da4f0de8163f6242fa732300000637c48468766af540439fce41f144631ac262dcae18c3d1a1fbe96dd87235b44174f7c0343185089a0f119e31975e551558055dc2dc"], &(0x7f0000000280)='GPL\x00'}, 0x48) r1 = socket$kcm(0x11, 0x8000000002, 0x300) socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000540)=r0, 0x4) syz_emit_ethernet(0x3e, &(0x7f0000000000)={@broadcast, @random="96c1e9574b31", @void, {@ipv4={0x811, @icmp={{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x1, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @local}, @time_exceeded={0xb, 0x0, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local, @multicast2}}}}}}, 0x0) 09:33:04 executing program 3: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000080)=ANY=[@ANYBLOB="2355d9da810f118761505cbc243ebf1c64a62949ee1ffbc71464c1a4b4ad7f05daac119155dd2c494ab77876f112c1cb862533c9631de1e9f4a4c625866e0af1371f68dbbb326e5fe3b4939465d11e6c554bd146d75ef0e3001ff01e4691ac1e5fd2"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:33:04 executing program 2: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f00000015c0)=ANY=[@ANYBLOB='%'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0xfffffff6, 0x0) 09:33:04 executing program 2: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f00000015c0)=ANY=[@ANYBLOB='%'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0xedc000000000, 0x0) 09:33:04 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f0000000340)=ANY=[@ANYBLOB="b7020000f7ffffffbfa70000000000002402000020feffff7a0af0fff8ffffff69a4f0ff00000000b70600000018d1fe2d6405000000000075040000000000000704000000000000b7040000100000206a0700fe00000000850000002f000000b70000000a0000009500000000000000e535f8a62fc2868f0399d909a63796c113a80c19aab9d607000000b6cd483be3f0d3253730e711f5969f62c28b22756bedf3cf393d14c46cc4f79fd2b316da4f0de8163f6242fa732300000637c48468766af540439fce41f144631ac262dcae18c3d1a1fbe96dd87235b44174f7c0343185089a0f119e31975e551558055dc2dc"], &(0x7f0000000280)='GPL\x00'}, 0x48) r1 = socket$kcm(0x11, 0x8000000002, 0x300) socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000540)=r0, 0x4) syz_emit_ethernet(0x3e, &(0x7f0000000000)={@broadcast, @random="96c1e9574b31", @void, {@ipv4={0x81c, @icmp={{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x1, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @local}, @time_exceeded={0xb, 0x0, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local, @multicast2}}}}}}, 0x0) 09:33:04 executing program 3: mkdir(0x0, 0x0) mount(&(0x7f0000000080)=ANY=[@ANYBLOB="2355d9da810f118761505cbc243ebf1c64a62949ee1ffbc71464c1a4b4ad7f05daac119155dd2c494ab77876f112c1cb862533c9631de1e9f4a4c625866e0af1371f68dbbb326e5fe3b4939465d11e6c554bd146d75ef0e3001ff01e4691ac1e5fd2"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:33:05 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000588ff8)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x6cb, 0x400000) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f00000002c0)='NLBL_CIPSOv4\x00') sendmsg$NLBL_CIPSOV4_C_LIST(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x4002000}, 0xc, &(0x7f0000000300)={&(0x7f0000001900)=ANY=[@ANYBLOB="14030000", @ANYRES16=r6, @ANYBLOB="000026bd7000fddbdf25030000001c000400080003000700000008000300010000000800030000000000440008003400070008000500d7df9725080006001100000008000500cd1353690800050032e313090800060013000000080005002d1a6a330c000700080006005700000050000c000c000b0008000a00a437000014000b0008000a007ad2000008000900347632672c000b0008000900a633f01008000a004a2d0000080009007b292c6b0800090063a72c0c08000a007590000020010c003c000b0008000a00cc8a0000080009004f1e410a08000a00f13c000008000a003889000008000a000c42000008000a00fc4b00000800090059a1812b34000b000800090086afcf4908000900b4d1230b080009007a86842508000a0074940000080009006c49bb1708000a00d5a400002c000b0008000a00be00000008000a00e678000008000900b9bb9f0908000a000000000008000a0044fa00002c000b000800090007c2721a080009359a87f8c11b11c40007e1aa0508000a0086bb000008000a00d722000008000a001053000014000b0008000a000000000008000900c07db83c0c000b000800090041d8263d34000b0008000a00d8a600000800090023bb1a0408000a004ddf000008000a0071b3000008000900c78ae44d08000a008d0e0000080001000000000028010c004c000b0008000a007752000008000a009223000008000900c9b6dc4308000900f37a757708000a00536800000800090040dc42340800090096ebab7b080009004d08252908000900000000000c000b0008000a00000000000c000b0008000a000000000034000b0008000a003d6c000008000a00fb1c000008000900613a664e080009006289b5350800090003d58d5808000a003165000054000b0008000900776abd0808000a00d4e2000008000900000000000800090042aa531f08000a0050a90000080009005c57825008000a000000000008000a002796000008000a00e995000008000a000000000024000b0008000a00e6d2000008000900f185ad3108000a000000000008000a00f832000014000b00080009006871ee01"], 0x314}, 0x1, 0x0, 0x0, 0x24000000}, 0x48002) sendmsg$NLBL_CIPSOV4_C_REMOVE(r5, &(0x7f0000000280)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2008000}, 0xc, &(0x7f0000000240)={&(0x7f0000000880)={0x33c, r6, 0x300, 0x70bd27, 0x25dfdbff, {}, [@NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x1}, @NLBL_CIPSOV4_A_TAGLST={0x14, 0x4, [{0x5, 0x3, 0x6}, {0x5}]}, @NLBL_CIPSOV4_A_TAGLST={0xc, 0x4, [{0x5, 0x3, 0x1}]}, @NLBL_CIPSOV4_A_TAGLST={0x4c, 0x4, [{0x5}, {0x5, 0x3, 0x5}, {0x5, 0x3, 0x7}, {0x5, 0x3, 0x2}, {0x5, 0x3, 0x3}, {0x5, 0x3, 0x5}, {0x5, 0x3, 0x1}, {0x5, 0x3, 0x1}, {0x5, 0x3, 0x1}]}, @NLBL_CIPSOV4_A_MLSLVLLST={0x94, 0x8, [{0x44, 0x7, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x2b43c1a7}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x92e5597}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x668d7d43}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0xed97bae}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x24}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x39}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x37135258}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x3b2a7377}]}, {0x14, 0x7, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x17238c00}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x7f}]}, {0x24, 0x7, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x7b}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x6fb855fe}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x1000}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x4a96ba6a}]}, {0x14, 0x7, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x5d89950c}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xd3}]}]}, @NLBL_CIPSOV4_A_MLSLVLLST={0x2c, 0x8, [{0x14, 0x7, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x48cb3696}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xf8}]}, {0x14, 0x7, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xd8}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x1cbfff12}]}]}, @NLBL_CIPSOV4_A_MLSLVLLST={0x1dc, 0x8, [{0x24, 0x7, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x2f}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0xe3ab7b9}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x37559bb2}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x3e114a9b}]}, {0x1c, 0x7, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x70}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x1f2d6f2}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x104534d5}]}, {0x2c, 0x7, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x2d1109f2}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x16}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x5a}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x63}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x1d}]}, {0x34, 0x7, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x61d1ad70}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xf}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xfa}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x26}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x74dd1637}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x6109429}]}, {0x3c, 0x7, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x49}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x60}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xa6}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x168c5088}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x7ae98b29}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x78b943a4}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x36744979}]}, {0x54, 0x7, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xc6}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0xec6fed8}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x40}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x6b9a1f8e}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x2d}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xea}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x45}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x69}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x43df384}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xf2}]}, {0x4c, 0x7, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x8e}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xd5}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x4219015f}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x77}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x7bb38020}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x1bf5edc0}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x3f01d91c}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x88}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x18}]}, {0x14, 0x7, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x29e30cf1}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x10}]}, {0xc, 0x7, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xc}]}, {0x3c, 0x7, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x157dc481}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x66}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x1e}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xa4}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x32b6fc42}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x555673a2}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0xb3c20f}]}]}, @NLBL_CIPSOV4_A_MLSCATLST={0x10, 0xc, [{0xc, 0xb, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x2d53c6e2}]}]}, @NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x1}]}, 0x33c}, 0x1, 0x0, 0x0, 0x800}, 0x80) sendmsg$TIPC_CMD_SHOW_LINK_STATS(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000540)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="3f02000000000000000001000000000000007e39000000000014"], 0x30}, 0x1, 0xfffffff0}, 0x0) sendmsg$TIPC_CMD_SHOW_STATS(r2, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x400}, 0xffffffffffffff24, &(0x7f0000000100)={&(0x7f00000000c0)={0x1c, r4, 0x4, 0x70bd29, 0x25dfdbfd, {}, ["", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x44084}, 0x4000000) r7 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) fchmodat(r2, &(0x7f0000000600)='./file0\x00', 0x25) r8 = socket$alg(0x26, 0x5, 0x0) bind$alg(r8, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r9 = socket(0x0, 0x80002, 0x0) ioctl(r9, 0x1000008912, &(0x7f00000000c0)="080db5055e0bcfe8696071") ioctl$sock_inet_SIOCGIFNETMASK(r9, 0x891b, &(0x7f0000000740)={'syzkaller1\x00', {0x2, 0x4e22, @empty}}) r10 = accept4(r8, 0x0, 0x0, 0x0) sendmmsg$inet(r10, &(0x7f0000000680)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f00000000c0)="5831255624c13e4c563f221188b6be66ea", 0x11}], 0x1}}, {{&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000002c0)=[{&(0x7f0000000040)="70a6b8247e016ae2647a2e703fce46c432e37d1dffd332a793d4b9e3617386d153", 0x21}, {&(0x7f0000000200)="09f96fbf33ceccc10976cd10b1411ee57d092fd5b7f95a0f19f01005f110463ccb2c6ebdb74ad7a7da1a2bed233154886db68984d477ebee11ce9a8e3510d401f6f31ea0a7e3ec1cda7b95f7a02b42753eb4cf0bbf5afbc7084f9bc2603aafe5da6cd54e4d647ec9fd641e4241513aaf23481d1f390bbb83dfae56369f4b03367ccd45f0ec4cd929aed127394157e7b3794500c0c5f88930b1ff50bbae1163c26fff28d06028", 0xa6}, {&(0x7f0000000100)="38d6cd435749d519cc39e90540f37c4f5c6bceef6c4ae07105cafc5e25d9bbfce859670b89666cca0857aa0c2abd8722a9db0caad3905e3ff682", 0x3a}, {&(0x7f0000000140)="d71206abd00e3c0a7e2440673da6a9fc2c1255a9b136bc982a3dc2ac21ef167250c176acfbd4d13abd86b018e8b1357842d8dc93e53f6b542e9633e1db8672e8", 0x40}], 0x4}}, {{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000380)="df304451b990364b1c6ff9c843eb47125c0a16565b5efbc0494b453f9863364196a743b5d226d34b2293f3b4b8dde4b8434172dec0902f0e03c2893c2bfd5f662eefc2902850a0221d55", 0x200003ca}, {&(0x7f0000000400)}], 0x2, &(0x7f0000000540)=[@ip_tos_u8={{0x11}}, @ip_ttl={{0x14}}, @ip_ttl={{0x14}}, @ip_tos_u8={{0x11}}], 0x60}}], 0x3, 0x0) r11 = socket$nl_generic(0x10, 0x3, 0x10) r12 = syz_genetlink_get_family_id$fou(&(0x7f00000000c0)='fou\x00') sendmsg$FOU_CMD_GET(r11, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x14, r12, 0x522f58c7ff5ac33d}, 0x14}}, 0x0) sendmsg$FOU_CMD_GET(r10, &(0x7f0000000700)={&(0x7f0000000640)={0x10, 0x0, 0x0, 0x10001000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000bc0)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r12, @ANYBLOB="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"], 0x24}, 0x1, 0x0, 0x0, 0x4000000}, 0x8000) fcntl$lock(r0, 0x7, &(0x7f0000000840)={0x1}) fcntl$lock(r0, 0x6, &(0x7f0000000000)) r13 = accept4(0xffffffffffffffff, &(0x7f0000000380)=@in6={0xa, 0x0, 0x0, @local}, &(0x7f0000000400)=0x80, 0x81800) r14 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000480)='IPVS\x00') sendmsg$IPVS_CMD_GET_INFO(r13, &(0x7f00000005c0)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000580)={&(0x7f00000004c0)={0x7c, r14, 0x1, 0x70bd28, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x9}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x1}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x27}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x9}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x1eb7}, @IPVS_CMD_ATTR_SERVICE={0xc, 0x1, [@IPVS_SVC_ATTR_AF={0x6, 0x1, 0xa}]}, @IPVS_CMD_ATTR_SERVICE={0x34, 0x1, [@IPVS_SVC_ATTR_PORT={0x6, 0x4, 0x4e23}, @IPVS_SVC_ATTR_SCHED_NAME={0x7, 0x6, 'rr\x00'}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0xebb}, @IPVS_SVC_ATTR_PROTOCOL={0x6, 0x2, 0x2f}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x1}, @IPVS_SVC_ATTR_PORT={0x6, 0x4, 0x4e23}]}]}, 0x7c}, 0x1, 0x0, 0x0, 0x82}, 0x2044) 09:33:05 executing program 2: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f00000015c0)=ANY=[@ANYBLOB='%'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x40040000000000, 0x0) 09:33:05 executing program 3: mkdir(0x0, 0x0) mount(&(0x7f0000000080)=ANY=[@ANYBLOB="2355d9da810f118761505cbc243ebf1c64a62949ee1ffbc71464c1a4b4ad7f05daac119155dd2c494ab77876f112c1cb862533c9631de1e9f4a4c625866e0af1371f68dbbb326e5fe3b4939465d11e6c554bd146d75ef0e3001ff01e4691ac1e5fd2"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:33:05 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f0000000340)=ANY=[@ANYBLOB="b7020000f7ffffffbfa70000000000002402000020feffff7a0af0fff8ffffff69a4f0ff00000000b70600000018d1fe2d6405000000000075040000000000000704000000000000b7040000100000206a0700fe00000000850000002f000000b70000000a0000009500000000000000e535f8a62fc2868f0399d909a63796c113a80c19aab9d607000000b6cd483be3f0d3253730e711f5969f62c28b22756bedf3cf393d14c46cc4f79fd2b316da4f0de8163f6242fa732300000637c48468766af540439fce41f144631ac262dcae18c3d1a1fbe96dd87235b44174f7c0343185089a0f119e31975e551558055dc2dc"], &(0x7f0000000280)='GPL\x00'}, 0x48) r1 = socket$kcm(0x11, 0x8000000002, 0x300) socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000540)=r0, 0x4) syz_emit_ethernet(0x3e, &(0x7f0000000000)={@broadcast, @random="96c1e9574b31", @void, {@ipv4={0x821, @icmp={{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x1, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @local}, @time_exceeded={0xb, 0x0, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local, @multicast2}}}}}}, 0x0) 09:33:05 executing program 2: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f00000015c0)=ANY=[@ANYBLOB='%'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0xf0ffffffffffff, 0x0) 09:33:05 executing program 3: mkdir(0x0, 0x0) mount(&(0x7f0000000080)=ANY=[@ANYBLOB="2355d9da810f118761505cbc243ebf1c64a62949ee1ffbc71464c1a4b4ad7f05daac119155dd2c494ab77876f112c1cb862533c9631de1e9f4a4c625866e0af1371f68dbbb326e5fe3b4939465d11e6c554bd146d75ef0e3001ff01e4691ac1e5fd2"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:33:05 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0x2, &(0x7f0000000340)=ANY=[@ANYRESHEX], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) r1 = socket$kcm(0x11, 0x8000000002, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000540)=r0, 0x4) socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') sendmsg$NL80211_CMD_GET_MPP(r5, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000001c0)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r6, @ANYBLOB="090300260000000000006b00000008000300", @ANYRES32=0x0, @ANYBLOB], 0x1c}}, 0x0) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') sendmsg$NL80211_CMD_GET_MPP(r7, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000001c0)={0x1c, r8, 0x709, 0x0, 0x0, {}, [@NL80211_ATTR_IFINDEX={0x8}]}, 0x1c}}, 0x0) r9 = socket$nl_generic(0x10, 0x3, 0x10) r10 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') sendmsg$NL80211_CMD_GET_MPP(r9, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000001c0)={0x1c, r10, 0x709, 0x0, 0x0, {}, [@NL80211_ATTR_IFINDEX={0x8}]}, 0x1c}}, 0x0) r11 = socket$nl_generic(0x10, 0x3, 0x10) r12 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') sendmsg$NL80211_CMD_GET_MPP(r11, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000001c0)={0x1c, r12, 0x709, 0x0, 0x0, {}, [@NL80211_ATTR_IFINDEX={0x8}]}, 0x1c}}, 0x0) r13 = socket$nl_generic(0x10, 0x3, 0x10) r14 = socket(0x0, 0x80002, 0x0) ioctl(r14, 0x1000008912, &(0x7f00000000c0)="080db5055e0bcfe8696071") setsockopt$PNPIPE_HANDLE(r14, 0x113, 0x3, &(0x7f0000000380)=0xff, 0x4) r15 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') sendmsg$NL80211_CMD_GET_MPP(r13, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000001c0)={0x1c, r15, 0x709, 0x0, 0x0, {}, [@NL80211_ATTR_IFINDEX={0x8}]}, 0x1c}}, 0x0) r16 = socket(0x0, 0x80002, 0x0) ioctl(r16, 0x1000008912, &(0x7f00000000c0)="080db5055e0bcfe8696071") sendmsg$NL80211_CMD_TRIGGER_SCAN(r16, &(0x7f0000000200)={&(0x7f0000000080), 0xc, &(0x7f00000001c0)={&(0x7f00000000c0)={0x54, r15, 0x20, 0x70bd2d, 0x25dfdbfc, {}, [@NL80211_ATTR_SCAN_SSIDS={0x28, 0x2d, [{0xd, 0x0, [0x1a, 0x20, 0x19, 0x1c, 0x11, 0xc, 0x0, 0x12, 0x11]}, {0xb, 0x0, [0x18, 0x8, 0x12, 0x1, 0x6, 0x2, 0x1d]}, {0x8, 0x0, [0x1e, 0xd, 0xd, 0x19]}]}, @NL80211_ATTR_SCHED_SCAN_RELATIVE_RSSI={0x5, 0xf6, 0x9}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x80, 0xffffffffffffffff}}, @NL80211_ATTR_MEASUREMENT_DURATION_MANDATORY={0x4}]}, 0x54}, 0x1, 0x0, 0x0, 0x81}, 0x844) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') creat(&(0x7f0000000300)='./file0\x00', 0x4) 09:33:05 executing program 2: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f00000015c0)=ANY=[@ANYBLOB='%'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x100000000000000, 0x0) 09:33:05 executing program 3: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:33:05 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f0000000340)=ANY=[@ANYBLOB="b7020000f7ffffffbfa70000000000002402000020feffff7a0af0fff8ffffff69a4f0ff00000000b70600000018d1fe2d6405000000000075040000000000000704000000000000b7040000100000206a0700fe00000000850000002f000000b70000000a0000009500000000000000e535f8a62fc2868f0399d909a63796c113a80c19aab9d607000000b6cd483be3f0d3253730e711f5969f62c28b22756bedf3cf393d14c46cc4f79fd2b316da4f0de8163f6242fa732300000637c48468766af540439fce41f144631ac262dcae18c3d1a1fbe96dd87235b44174f7c0343185089a0f119e31975e551558055dc2dc"], &(0x7f0000000280)='GPL\x00'}, 0x48) r1 = socket$kcm(0x11, 0x8000000002, 0x300) socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000540)=r0, 0x4) syz_emit_ethernet(0x3e, &(0x7f0000000000)={@broadcast, @random="96c1e9574b31", @void, {@ipv4={0x82f, @icmp={{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x1, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @local}, @time_exceeded={0xb, 0x0, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local, @multicast2}}}}}}, 0x0) 09:33:05 executing program 2: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f00000015c0)=ANY=[@ANYBLOB='%'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x200000000000000, 0x0) 09:33:05 executing program 3: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:33:05 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000588ff8)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_GET_VCPU_EVENTS(0xffffffffffffffff, 0x8040ae9f, &(0x7f0000000040)) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) fcntl$lock(r0, 0x7, &(0x7f0000000840)={0x1}) fcntl$lock(r0, 0x6, &(0x7f0000000000)) 09:33:05 executing program 2: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f00000015c0)=ANY=[@ANYBLOB='%'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x300000000000000, 0x0) 09:33:06 executing program 3: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:33:06 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f0000000340)=ANY=[@ANYBLOB="b7020000f7ffffffbfa70000000000002402000020feffff7a0af0fff8ffffff69a4f0ff00000000b70600000018d1fe2d6405000000000075040000000000000704000000000000b7040000100000206a0700fe00000000850000002f000000b70000000a0000009500000000000000e535f8a62fc2868f0399d909a63796c113a80c19aab9d607000000b6cd483be3f0d3253730e711f5969f62c28b22756bedf3cf393d14c46cc4f79fd2b316da4f0de8163f6242fa732300000637c48468766af540439fce41f144631ac262dcae18c3d1a1fbe96dd87235b44174f7c0343185089a0f119e31975e551558055dc2dc"], &(0x7f0000000280)='GPL\x00'}, 0x48) r1 = socket$kcm(0x11, 0x8000000002, 0x300) socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000540)=r0, 0x4) syz_emit_ethernet(0x3e, &(0x7f0000000000)={@broadcast, @random="96c1e9574b31", @void, {@ipv4={0x830, @icmp={{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x1, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @local}, @time_exceeded={0xb, 0x0, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local, @multicast2}}}}}}, 0x0) 09:33:06 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f0000000840)=ANY=[@ANYBLOB="b7020000f7ffffffbfa70000000000002402000020feffff7a0af0ffa4f0ff00000000b70600000018d1fe2d6405000000000075040000000000000704000000000000b7040000100000206a0700fe00000000850000002f000000b700000095000000001de1db9447381c000000e535f8a62fc2868f0399d909a63796c113a80c19aab9d607000000b6cd483be3d0d3253730e711f5966d62c28b22756bedf3cf393d14c46cc4f79fd2b316da4f0de8163f6242fa732300000637c48468766af540439fce41f144631ac262dcae18c3d1a1fbe96dd87235b49a0f119e31975e551558055dc2dc11a5724ee37300000000000000"], &(0x7f0000000280)='GPL\x00'}, 0x48) r1 = socket$kcm(0x11, 0x8000000002, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000540)=r0, 0x4) socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = fcntl$dupfd(r2, 0x0, r3) r5 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000340)='NLBL_UNLBL\x00') sendmsg$NLBL_UNLABEL_C_STATICLISTDEF(r4, &(0x7f00000005c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000400)=ANY=[@ANYBLOB="bc000000", @ANYRES16=r5, @ANYBLOB="20002cbd7000fddbdf250800000014000200fe8000000000000000000000000000bb14000600766c616e30000000000000000000000008000500ac1414aa050001000000000014000200ff01000000000000000000000000000114000200fe80000000000000000000000000001a140003000000000000000000000000012900070073797374656d5f753a6f626a6563745f723a696e6574645f7661725f72756e5f743a73300000000008000500e0000001a838"], 0xbc}, 0x1, 0x0, 0x0, 0x8000}, 0x8) r6 = socket$alg(0x26, 0x5, 0x0) bind$alg(r6, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r7 = accept4(r6, 0x0, 0x0, 0x0) sendmmsg$inet(r7, &(0x7f0000000680)=[{{0x0, 0x0, &(0x7f0000000800)}}, {{&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000002c0)=[{&(0x7f0000000040)="70a6b8247e016ae2647a2e703fce46c432e37d1dffd332a793d4b9e3617386d153", 0x21}, {&(0x7f0000000200)="09f96fbf33ceccc10976cd10b1411ee57d092fd5b7f95a0f19f01005f110463ccb2c6ebdb74ad7a7da1a2bed233154886db68984d477ebee11ce9a8e3510d401f6f31ea0a7e3ec1cda7b95f7a02b42753eb4cf0bbf5afbc7084f9bc2603aafe5da6cd54e4d647ec9fd641e4241513aaf23481d1f390bbb83dfae56369f4b03367ccd45f0ec4cd929aed127394157e7b3794500c0c5f88930b1ff50bbae1163c26fff28d06028", 0xa6}, {&(0x7f0000000100)="38d6cd435749d519cc39e90540f37c4f5c6bceef6c4ae07105cafc5e25d9bbfce859670b89666cca0857aa0c2abd8722a9db0caad3905e3ff682", 0x3a}, {&(0x7f0000000140)="d71206abd00e3c0a7e2440673da6a9fc2c1255a9b136bc982a3dc2ac21ef167250c176acfbd4d13abd86b018e8b1357842d8dc93e53f6b542e9633e1db8672e8", 0x40}], 0x4}}, {{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000380)="df304451b990364b1c6ff9c843eb47125c0a16565b5efbc0494b453f9863364196a743b5d226d34b2293f3b4b8dde4b8434172dec0902f0e03c2893c2bfd5f662eefc2902850a0221d55", 0x4a}, {&(0x7f0000000d80)}], 0x2, &(0x7f0000000540)=[@ip_tos_u8={{0x11}}, @ip_ttl={{0x14}}, @ip_ttl={{0x14}}, @ip_tos_u8={{0x11}}], 0x60}}], 0x3, 0x0) ioctl$sock_SIOCDELDLCI(r7, 0x8981, &(0x7f0000000080)={'xfrm0\x00', 0x3ff}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) io_setup(0xfff, &(0x7f0000000600)=0x0) socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r10 = socket$inet_udplite(0x2, 0x2, 0x88) r11 = fcntl$dupfd(r9, 0x0, r10) ioctl$PERF_EVENT_IOC_ENABLE(r11, 0x8912, 0x400200) r12 = syz_open_dev$vbi(&(0x7f0000000780)='/dev/vbi#\x00', 0x2, 0x2) r13 = socket(0x0, 0x80002, 0x0) ioctl(r13, 0x1000008912, &(0x7f00000000c0)="080db5055e0bcfe8696071") socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r15 = socket$inet_udplite(0x2, 0x2, 0x88) r16 = fcntl$dupfd(r14, 0x0, r15) ioctl$PERF_EVENT_IOC_ENABLE(r16, 0x8912, 0x400200) io_submit(r8, 0x5, &(0x7f0000000cc0)=[&(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x6, r2, &(0x7f0000000640)="19f877b0d98c867a1779b47e825ea1a3727382a608dfbc03e2feebb0a1b13d43e614b0222b94e8", 0x27, 0x5, 0x0, 0x0, r11}, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x8, 0x7fff, r12, &(0x7f0000000940)="0ec7cea2defe9ca75eb5ccdfeb0e6eefc468a94b99dec15e72b07e9a1f2522ed39b1264c0c78706430f17b8e10a52c16d317627b3dbd5a86f29d9815b4033aa522250093de93848ee0298d5a68026996b1af5ddbc337661d7ccb4e7b34f83dba4053ac79636581b01817e469527d5c907ebb5c8b14a94abc26b890d8b195e6f4a4f2f3e6d8b4fde3544b7b2eb3f4eb6ea85bc0c12c07d749e88c57860b6db9b96d6f52fb8133e73997857473e4a707ff779ba365756b3ea8a09a03f079d742f8eef0bdefe5df666d058085a34adc5f062aa5b4091b9eeddf293c92562e30ba65006678b2b81e40057228cd4170f564cb4a5dbfc23fc7", 0xf6, 0xb5, 0x0, 0x72ed86380dcf304, r4}, &(0x7f0000000a80)={0x0, 0x0, 0x0, 0x6, 0x81, r13, &(0x7f0000000a40)="b78bd9c07802766e8923992db14f62dc2a528b8cf1a549f5ca00", 0x1a, 0x7, 0x0, 0x1}, &(0x7f0000000b40)={0x0, 0x0, 0x0, 0x9, 0x7, r7, &(0x7f0000000ac0)="cb031657f1594b115d003c9552d539785cc93722ada16f6872ef4b4a4b14f4bb625f65280f7fc2be392256078d36722b1c393985d6452c71d31fe2ca15ece4227e8d46dc01060129707096b2e2b847e073840d156e18e0bfffd80c0001a770935bdfe95ba1999c3dfc78", 0x6a, 0x8, 0x0, 0x0, r16}, &(0x7f0000000c80)={0x0, 0x0, 0x0, 0x2, 0x4, r2, &(0x7f0000000b80)="06142e2ce74b3725dfc8ce41297c1eba72477c359659d8dadf65eafd21ac2a0fe75c632ba97f244684e97c92503d589bab5b6c813c4298a35a634b9b267a6d17ed10ad6ea1aa28019eb91a70bbc92fcfb3f823c09f3bc1ad7a2fa3df7ed4aaf8a8fffb656b0b89128e487caf4802974ad0bd648071ebe8c894331ee3417e963ad2bbdd64e447affef7a9459930ced9ff87383594146010c047849a680c953a7394a5d84c7f92cef384d6db9d81f7eb0c6b915655eab5f488ef5caa4dc90352c7efdeae643ea5a9c1e899326fb9ceb8b3bdf3d55a77b25faf73e441f0555bd9e309af7d7088e9353fecc29568271d1022f2bf76bc6e", 0xf5, 0x792, 0x0, 0x3}]) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') 09:33:06 executing program 2: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f00000015c0)=ANY=[@ANYBLOB='%'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x400000000000000, 0x0) 09:33:06 executing program 3: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000080)=ANY=[], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:33:06 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f0000000340)=ANY=[@ANYBLOB="b7020000f7ffffffbfa70000000000002402000020feffff7a0af0fff8ffffff69a4f0ff00000000b70600000018d1fe2d6405000000000075040000000000000704000000000000b7040000100000206a0700fe00000000850000002f000000b70000000a0000009500000000000000e535f8a62fc2868f0399d909a63796c113a80c19aab9d607000000b6cd483be3f0d3253730e711f5969f62c28b22756bedf3cf393d14c46cc4f79fd2b316da4f0de8163f6242fa732300000637c48468766af540439fce41f144631ac262dcae18c3d1a1fbe96dd87235b44174f7c0343185089a0f119e31975e551558055dc2dc"], &(0x7f0000000280)='GPL\x00'}, 0x48) r1 = socket$kcm(0x11, 0x8000000002, 0x300) socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000540)=r0, 0x4) syz_emit_ethernet(0x3e, &(0x7f0000000000)={@broadcast, @random="96c1e9574b31", @void, {@ipv4={0x83a, @icmp={{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x1, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @local}, @time_exceeded={0xb, 0x0, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local, @multicast2}}}}}}, 0x0) 09:33:06 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f0000000340)=ANY=[@ANYBLOB="b7020000f7ffffffbfa7000000000000968277a1ac2402000020feffff7a0af0fff8ffffff69a4f0ff40000000b70600000018d1fe2d6405000000000075040000000000000704000000000000b7040000100000206a0700fe00000000850000002f000000b70000000a0000009500000000000000e535f8a62fc2868f0399d909a63796c113a80c19aab9d607000000b6cd483be3f0d3253730e711f5969f62c28b22756bedf3cf393d14c46cc4f79fd2b316da4f0de8163f6242fa732300000637c48468766af540439fce41f144631ac262dcae18c3d1a1fbe96dd87235b44174f7c0343185089a0f119e31975e5515"], &(0x7f0000000280)='GPL\x00'}, 0x48) r1 = socket$kcm(0x11, 0x8000000002, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000540)=r0, 0x4) socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000000680)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f00000000c0)="5831255624c13e4c563f221188b6be66ea", 0x11}], 0x1}}, {{&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000002c0)=[{&(0x7f0000000040)="70a6b8247e016ae2647a2e703fce46c432e37d1dffd332a793d4b9e3617386d153", 0x21}, {&(0x7f0000000200)="09f96fbf33ceccc10976cd10b1411ee57d092fd5b7f95a0f19f01005f110463ccb2c6ebdb74ad7a7da1a2bed233154886db68984d477ebee11ce9a8e3510d401f6f31ea0a7e3ec1cda7b95f7a02b42753eb4cf0bbf5afbc7084f9bc2603aafe5da6cd54e4d647ec9fd641e4241513aaf23481d1f390bbb83dfae56369f4b03367ccd45f0ec4cd929aed127394157e7b3794500c0c5f88930b1ff50bbae1163c26fff28d06028", 0xa6}, {&(0x7f0000000100)="38d6cd435749d519cc39e90540f37c4f5c6bceef6c4ae07105cafc5e25d9bbfce859670b89666cca0857aa0c2abd8722a9db0caad3905e3ff682", 0x3a}, {&(0x7f0000000140)="d71206abd00e3c0a7e2440673da6a9fc2c1255a9b136bc982a3dc2ac21ef167250c176acfbd4d13abd86b018e8b1357842d8dc93e53f6b542e9633e1db8672e8", 0x40}], 0x4}}, {{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000380)="df304451b990364b1c6ff9c843eb47125c0a16565b5efbc0494b453f9863364196a743b5d226d34b2293f3b4b8dde4b8434172dec0902f0e03c2893c2bfd5f662eefc2902850a0221d55", 0x17}, {&(0x7f0000000480)}], 0x2, &(0x7f0000000540)=[@ip_retopts={{0x14, 0x0, 0x7, {[@end]}}}, @ip_ttl={{0x14}}, @ip_ttl={{0x14}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x8}}], 0x60}}], 0x3, 0x0) socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = fcntl$dupfd(r4, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) write$FUSE_NOTIFY_STORE(r6, &(0x7f0000000740)={0x2c, 0x4, 0x0, {0x0, 0x10001, 0x4, 0x0, [0x0, 0x0, 0x0, 0x0]}}, 0x2c) ioctl$KVM_GET_MSR_INDEX_LIST(r6, 0xc004ae02, &(0x7f0000000640)={0x2, [0x0, 0x0]}) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, &(0x7f0000000440)={0x5492, 0x5, 0x1, 0x8, 0x7}) r7 = fcntl$dupfd(r2, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000300)={0x10000, 0x9}, 0xc) r8 = socket$alg(0x26, 0x5, 0x0) bind$alg(r8, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r9 = accept4(r8, 0x0, 0x0, 0x0) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000000680), 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r9, 0x8934, &(0x7f0000000080)={'team_slave_0\x00', 0x2}) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') write$RDMA_USER_CM_CMD_CREATE_ID(r7, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f00000004c0)={0xffffffffffffffff}, 0x106, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000600)={0x1, 0x10, 0xfa00, {&(0x7f0000000480), r10}}, 0x18) [ 1321.221982][T11708] kAFS: Bad value for 'source' 09:33:06 executing program 2: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f00000015c0)=ANY=[@ANYBLOB='%'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x500000000000000, 0x0) 09:33:06 executing program 3: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000080)=ANY=[], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:33:06 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0x1e, &(0x7f0000000580)=ANY=[@ANYBLOB="b7020000f7ffffffbfa70000000000002402000020feffff7a0af0fff8ffffff69a4f0ff00000000b70600000022d1fe2d6405000000000075040000000000000704000000000000b7040000100000206a0700fe00000000850000002f000000b70000000a0000009500000000000000e535f8a62fc2868f0399d909a63796c113a80c19aab9d607000000b6cd483be3f0d3253730e711f5969f62c28b22756bedf3cf393d14c46cc4f79fd2b316da4f0de8163f6242fa732300000637c48468766af540439fce41f144631ac262dcae18c3d1a1fbe96dd87235b44174f7c0343185089a0f119e3197000415580500c2dc2d3a7e2e6be9524daa99be2b94f71495e49f910bb697d3dd342bc128cd1e24b94cca057fb83573c37ac3d18c60dcca1010d72a26dcc22f387ff5b6473017b3963db6251ffed8e05d77e03ee7185714739fab7fcd093a7638ceeef3b14338d7a20faeac2d06299b235e9c1cbf440d2716e08290c688395d8a7f2b255d5e69f361c82d1eaa782864048925842102e65cba9d569e8f21a51c14e5451784e6a94fe88c52aeb48e871cc349a70e702997be68c02bcdd7f6001a7a204d6a12395c65"], &(0x7f0000000280)='GPL\x00', 0x2, 0x0, 0x0, 0x41100, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xffffffffffffffcd, 0x10, &(0x7f0000000000), 0x10}, 0x78) r1 = socket$kcm(0x11, 0x8000000002, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000540)=r0, 0x4) socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') [ 1321.462139][T11819] kAFS: Bad value for 'source' 09:33:06 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000588ff8)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r1, 0x0, r1) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$inet(r3, &(0x7f0000000680)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f00000000c0)="5831255624c13e4c563f221188b6be66ea", 0x11}], 0x1}}, {{&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000002c0)=[{&(0x7f0000000040)="70a6b8247e016ae2647a2e703fce46c432e37d1dffd332a793d4b9e3617386d153", 0x21}, {&(0x7f0000000200)="09f96fbf33ceccc10976cd10b1411ee57d092fd5b7f95a0f19f01005f110463ccb2c6ebdb74ad7a7da1a2bed233154886db68984d477ebee11ce9a8e3510d401f6f31ea0a7e3ec1cda7b95f7a02b42753eb4cf0bbf5afbc7084f9bc2603aafe5da6cd54e4d647ec9fd641e4241513aaf23481d1f390bbb83dfae56369f4b03367ccd45f0ec4cd929aed127394157e7b3794500c0c5f88930b1ff50bbae1163c26fff28d06028", 0xa6}, {&(0x7f0000000100)="38d6cd435749d519cc39e90540f37c4f5c6bceef6c4ae07105cafc5e25d9bbfce859670b89666cca0857aa0c2abd8722a9db0caad3905e3ff682", 0x3a}, {&(0x7f0000000140)="d71206abd00e3c0a7e2440673da6a9fc2c1255a9b136bc982a3dc2ac21ef167250c176acfbd4d13abd86b018e8b1357842d8dc93e53f6b542e9633e1db8672e8", 0x40}], 0x4}}, {{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000380)="df304451b990364b1c6ff9c843eb47125c0a16565b5efbc0494b453f9863364196a743b5d226d34b2293f3b4b8dde4b8434172dec0902f0e03c2893c2bfd5f662eefc2902850a0221d55", 0x200003ca}, {&(0x7f0000000400)}], 0x2, &(0x7f0000000540)=[@ip_tos_u8={{0x11}}, @ip_ttl={{0x14}}, @ip_ttl={{0x14}}, @ip_tos_u8={{0x11}}], 0x60}}], 0x3, 0x0) connect$l2tp6(r3, &(0x7f00000000c0)={0xa, 0x0, 0x4, @remote, 0x1ff, 0x1}, 0x20) r4 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x80, 0x800) openat$autofs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/autofs\x00', 0x400, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) fcntl$lock(r0, 0x7, &(0x7f0000000840)={0x1}) fcntl$lock(r0, 0x6, &(0x7f0000000000)) 09:33:07 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f0000000340)=ANY=[@ANYBLOB="b7020000f7ffffffbfa70000000000002402000020feffff7a0af0fff8ffffff69a4f0ff00000000b70600000018d1fe2d6405000000000075040000000000000704000000000000b7040000100000206a0700fe00000000850000002f000000b70000000a0000009500000000000000e535f8a62fc2868f0399d909a63796c113a80c19aab9d607000000b6cd483be3f0d3253730e711f5969f62c28b22756bedf3cf393d14c46cc4f79fd2b316da4f0de8163f6242fa732300000637c48468766af540439fce41f144631ac262dcae18c3d1a1fbe96dd87235b44174f7c0343185089a0f119e31975e551558055dc2dc"], &(0x7f0000000280)='GPL\x00'}, 0x48) r1 = socket$kcm(0x11, 0x8000000002, 0x300) socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000540)=r0, 0x4) syz_emit_ethernet(0x3e, &(0x7f0000000000)={@broadcast, @random="96c1e9574b31", @void, {@ipv4={0x4000, @icmp={{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x1, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @local}, @time_exceeded={0xb, 0x0, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local, @multicast2}}}}}}, 0x0) 09:33:07 executing program 2: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f00000015c0)=ANY=[@ANYBLOB='%'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x600000000000000, 0x0) 09:33:07 executing program 3: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000080)=ANY=[], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:33:07 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f0000000340)=ANY=[@ANYBLOB="b7020000f7ffffffbfa70000000000002402e5ff1ffeffff7a0af0fff8ffffff69a4f0ff00000000b70600000018d1fe2d6405000000000000005603e41d00100000206a0700fe00000000850000002f000000b70000000a0000009500000000000000e135f8a62fc2868f0399d909a63796c113a80c19aab9d607000000b6cd483be3f0d3253730e711f5969f6cca33ea9cf001a7280de8163f6242fa732300000637c48468766af540439fce40f144631ac262dcae18c3d1a1fbe96dd87235b44174f7c0343185089a0f119e31975e551558055dc2dc00"/228], &(0x7f0000000280)='GPL\x00'}, 0x22) r1 = socket$kcm(0x11, 0x8000000002, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000540)=r0, 0x4) socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = socket$alg(0x26, 0x5, 0x0) bind$alg(r5, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r6 = accept4(r5, 0x0, 0x0, 0x0) sendmmsg$inet(r6, &(0x7f0000000680)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f00000000c0)="5831255624c13e4c563f221188b6be66ea", 0x11}], 0x1}}, {{&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000002c0)=[{&(0x7f0000000040)="70a6b8247e016ae2647a2e703fce46c432e37d1dffd332a793d4b9e3617386d153", 0x21}, {&(0x7f0000000200)="09f96fbf33ceccc10976cd10b1411ee57d092fd5b7f95a0f19f01005f110463ccb2c6ebdb74ad7a7da1a2bed233154886db68984d477ebee11ce9a8e3510d401f6f31ea0a7e3ec1cda7b95f7a02b42753eb4cf0bbf5afbc7084f9bc2603aafe5da6cd54e4d647ec9fd641e4241513aaf23481d1f390bbb83dfae56369f4b03367ccd45f0ec4cd929aed127394157e7b3794500c0c5f88930b1ff50bbae1163c26fff28d06028", 0xa6}, {&(0x7f0000000100)="38d6cd435749d519cc39e90540f37c4f5c6bceef6c4ae07105cafc5e25d9bbfce859670b89666cca0857aa0c2abd8722a9db0caad3905e3ff682", 0x3a}, {&(0x7f0000000140)="d71206abd00e3c0a7e2440673da6a9fc2c1255a9b136bc982a3dc2ac21ef167250c176acfbd4d13abd86b018e8b1357842d8dc93e53f6b542e9633e1db8672e8", 0x40}], 0x4}}, {{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000380)="df304451b990364b1c6ff9c843eb47125c0a16565b5efbc0494b453f9863364196a743b5d226d34b2293f3b4b8dde4b8434172dec0902f0e03c2893c2bfd5f662eefc2902850a0221d55", 0x200003ca}, {&(0x7f0000000400)}], 0x2, &(0x7f0000000540)=[@ip_tos_u8={{0x11}}, @ip_ttl={{0x14}}, @ip_ttl={{0x14}}, @ip_tos_u8={{0x11}}], 0x60}}], 0x3, 0x0) r7 = socket$alg(0x26, 0x5, 0x0) bind$alg(r7, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r8 = accept4(r7, 0x0, 0x0, 0x0) sendmmsg$inet(r8, &(0x7f0000000680)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f00000000c0)="5831255624c13e4c563f221188b6be66ea", 0x11}], 0x1}}, {{&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000002c0)=[{&(0x7f0000000040)="70a6b8247e016ae2647a2e703fce46c432e37d1dffd332a793d4b9e3617386d153", 0x21}, {&(0x7f0000000200)="09f96fbf33ceccc10976cd10b1411ee57d092fd5b7f95a0f19f01005f110463ccb2c6ebdb74ad7a7da1a2bed233154886db68984d477ebee11ce9a8e3510d401f6f31ea0a7e3ec1cda7b95f7a02b42753eb4cf0bbf5afbc7084f9bc2603aafe5da6cd54e4d647ec9fd641e4241513aaf23481d1f390bbb83dfae56369f4b03367ccd45f0ec4cd929aed127394157e7b3794500c0c5f88930b1ff50bbae1163c26fff28d06028", 0xffffffffffffff0f}, {&(0x7f0000000100)="38d6cd435749d519cc39e90540f37c4f5c6bceef6c4ae07105cafc5e25d9bbfce859670b89666cca0857aa0c2abd8722a9db0caad3905e3ff682", 0x3a}, {&(0x7f0000000140)="d71206abd00e3c0a7e2440673da6a9fc2c1255a9b136bc982a3dc2ac21ef167250c176acfbd4d13abd86b018e8b1357842d8dc93e53f6b542e9633e1db8672e8", 0x40}], 0x4}}, {{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000380)="df304451b990364b1c6ff9c843eb47125c0a16565b5efbc0494b453f9863364196a743b5d226d34b2293f3b4b8dde4b8434172dec0902f0e03c2893c2bfd5f662eefc2902850a0221d55", 0x200003ca}, {&(0x7f0000000400)}], 0x2, &(0x7f0000000540)=[@ip_tos_u8={{0x11}}, @ip_ttl={{0x14}}, @ip_ttl={{0x14}}, @ip_tos_u8={{0x11}}], 0x60}}], 0x3, 0x0) ioctl$IMGETDEVINFO(r4, 0x80044944, &(0x7f0000000080)={0xffffffff}) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') [ 1321.933042][T11939] kAFS: Bad value for 'source' 09:33:07 executing program 2: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f00000015c0)=ANY=[@ANYBLOB='%'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x700000000000000, 0x0) 09:33:07 executing program 3: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000080)=ANY=[@ANYBLOB], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:33:07 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0x1, &(0x7f0000000340)=ANY=[@ANYRES64], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000000)={0x0, 0x40000}, 0x10}, 0x78) r1 = socket$kcm(0x11, 0x8000000002, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000540)=r0, 0x4) socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r3 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000500)='/dev/vcsu\x00', 0x400000, 0x0) connect$pptp(r3, &(0x7f0000000600)={0x18, 0x2, {0x0, @initdev={0xac, 0x1e, 0x1, 0x0}}}, 0x1e) r4 = socket$inet_udplite(0x2, 0x2, 0x88) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000240)={r0, 0xc0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=0x3ff, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x2}, 0x0, 0x0, &(0x7f0000000100)={0x2, 0xa, 0x7}, &(0x7f00000001c0)=0x3, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=0xffffffffffffffff}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000002c0)={r5}, 0xc) r6 = fcntl$dupfd(r2, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') [ 1322.182513][T12048] kAFS: Bad value for 'source' 09:33:07 executing program 2: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f00000015c0)=ANY=[@ANYBLOB='%'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x800000000000000, 0x0) 09:33:07 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f0000000340)=ANY=[@ANYBLOB="b7020000f7ffffffbfa70000000000002402000020feffff7a0af0fff8ffffff69a4f0ff00000000b70600000018d1fe2d6405000000000075040000000000000704000000000000b7040000100000206a0700fe00000000850000002f000000b70000000a0000009500000000000000e535f8a62fc2868f0399d909a63796c113a80c19aab9d607000000b6cd483be3f0d3253730e711f5969f62c28b22756bedf3cf393d14c46cc4f79fd2b316da4f0de8163f6242fa732300000637c48468766af540439fce41f144631ac262dcae18c3d1a1fbe96dd87235b44174f7c0343185089a0f119e31975e551558055dc2dc"], &(0x7f0000000280)='GPL\x00'}, 0x48) r1 = socket$kcm(0x11, 0x8000000002, 0x300) socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000540)=r0, 0x4) syz_emit_ethernet(0x3e, &(0x7f0000000000)={@broadcast, @random="96c1e9574b31", @void, {@ipv4={0x4305, @icmp={{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x1, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @local}, @time_exceeded={0xb, 0x0, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local, @multicast2}}}}}}, 0x0) 09:33:07 executing program 3: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000080)=ANY=[@ANYBLOB], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:33:07 executing program 5: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.net/syz1\x00', 0x200002, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f0000000580)=ANY=[@ANYBLOB="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"/324], &(0x7f0000000280)='GPL\x00'}, 0x48) r1 = socket$kcm(0x11, 0x8000000002, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000540)=r0, 0x4) socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000001640)='/proc/self/net/pfkey\x00', 0x140000, 0x0) getsockopt$SO_J1939_SEND_PRIO(r4, 0x6b, 0x3, &(0x7f0000001680), &(0x7f00000016c0)=0x4) r5 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') [ 1322.405824][T12135] kAFS: Bad value for 'source' 09:33:07 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000588ff8)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket(0x0, 0x80002, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000000c0)="080db5055e0bcfe8696071") r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000540)=ANY=[@ANYBLOB="57ff94b8", @ANYRES16=r3, @ANYBLOB="3f02000000000000000001000000001f00000b00000000000014"], 0x30}, 0x1, 0xfffffff0}, 0x0) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000100)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x30, r3, 0x4, 0x70bd2a, 0x25dfdbfd, {{}, {}, {0x14, 0x19, {0x1, 0x8, 0x6b, 0x6}}}, ["", "", ""]}, 0x30}}, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) fcntl$lock(r0, 0x7, &(0x7f0000000840)={0x1}) fcntl$lock(r0, 0x6, &(0x7f0000000000)) 09:33:07 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='GPL\x00'}, 0x48) r1 = socket$kcm(0x11, 0x8000000002, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000540)=r0, 0x4) socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) accept4(r4, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r4, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c81", 0x10) r5 = fcntl$dupfd(r4, 0x406, r1) r6 = socket(0x0, 0x80002, 0x0) ioctl(r6, 0x1000008912, &(0x7f00000000c0)="080db5055e0bcfe8696071") ioctl$sock_SIOCGIFVLAN_GET_VLAN_EGRESS_PRIORITY_CMD(r6, 0x8982, &(0x7f00000000c0)) ioctl$DRM_IOCTL_GET_CAP(r5, 0xc010640c, &(0x7f0000000080)={0x8, 0x7fda4361}) socket$packet(0x11, 0x3, 0x300) r7 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') r8 = socket$nl_generic(0x10, 0x3, 0x10) r9 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') sendmsg$NL80211_CMD_GET_MPP(r8, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000001c0)={0x1c, r9, 0x709, 0x0, 0x0, {}, [@NL80211_ATTR_IFINDEX={0x8}]}, 0x1c}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0}, &(0x7f0000000240)=0x14) r11 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r11, &(0x7f0000000180), 0x10) socketpair(0x8000000000001e, 0x805, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) getpeername$packet(r12, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000100)=0x14) sendmsg$can_bcm(r11, &(0x7f00000002c0)={&(0x7f0000000140)={0x1d, r13}, 0x10, &(0x7f0000000280)={&(0x7f0000000200)={0x0, 0x0, 0x0, {0x0, 0x2710}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "55e19dc0c30616da"}}, 0x48}}, 0x0) r14 = socket$alg(0x26, 0x5, 0x0) bind$alg(r14, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r15 = accept4(r14, 0x0, 0x0, 0x0) sendmmsg$inet(r15, &(0x7f0000000680)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f00000000c0)="5831255624c13e4c563f221188b6be66ea", 0x11}], 0x1}}, {{&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000002c0)=[{&(0x7f0000000040)="70a6b8247e016ae2647a2e703fce46c432e37d1dffd332a793d4b9e3617386d153", 0x21}, {&(0x7f0000000200)="09f96fbf33ceccc10976cd10b1411ee57d092fd5b7f95a0f19f01005f110463ccb2c6ebdb74ad7a7da1a2bed233154886db68984d477ebee11ce9a8e3510d401f6f31ea0a7e3ec1cda7b95f7a02b42753eb4cf0bbf5afbc7084f9bc2603aafe5da6cd54e4d647ec9fd641e4241513aaf23481d1f390bbb83dfae56369f4b03367ccd45f0ec4cd929aed127394157e7b3794500c0c5f88930b1ff50bbae1163c26fff28d06028", 0xa6}, {&(0x7f0000000100)="38d6cd435749d519cc39e90540f37c4f5c6bceef6c4ae07105cafc5e25d9bbfce859670b89666cca0857aa0c2abd8722a9db0caad3905e3ff682", 0x3a}, {&(0x7f0000000140)="d71206abd00e3c0a7e2440673da6a9fc2c1255a9b136bc982a3dc2ac21ef167250c176acfbd4d13abd86b018e8b1357842d8dc93e53f6b542e9633e1db8672e8", 0x40}], 0x4}}, {{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000380)="df304451b990364b1c6ff9c843eb47125c0a16565b5efbc0494b453f9863364196a743b5d226d34b2293f3b4b8dde4b8434172dec0902f0e03c2893c2bfd5f662eefc2902850a0221d55", 0x200003ca}, {&(0x7f0000000400)}], 0x2, &(0x7f0000000540)=[@ip_tos_u8={{0x11}}, @ip_ttl={{0x14}}, @ip_ttl={{0x14}}, @ip_tos_u8={{0x11}}], 0x60}}], 0x3, 0x0) getsockname$packet(r15, &(0x7f0000000900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000940)=0x14) sendmsg$NL80211_CMD_GET_MESH_CONFIG(r6, &(0x7f0000000a40)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000a00)={&(0x7f0000000980)={0x4c, r9, 0x400, 0x70bd25, 0x25dfdbfc, {}, [@NL80211_ATTR_WDEV={0xc, 0x99, {0x80000001, 0xffffffffffffffff}}, @NL80211_ATTR_IFINDEX={0x8, 0x3, r10}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x2}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x5, 0x3}}, @NL80211_ATTR_IFINDEX={0x8, 0x3, r13}, @NL80211_ATTR_IFINDEX={0x8, 0x3, r16}]}, 0x4c}, 0x1, 0x0, 0x0, 0x1}, 0x2c008040) 09:33:07 executing program 2: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f00000015c0)=ANY=[@ANYBLOB='%'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x1000000000000000, 0x0) 09:33:07 executing program 3: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000080)=ANY=[@ANYBLOB], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:33:07 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f0000000340)=ANY=[@ANYBLOB="b7020000f7ffffffbfa70000000000002402000020feffff7a0af0fff8ffffff69a4f0ff00000000b70600000018d1fe2d6405000000000075040000000000000704000000000000b7040000100000206a0700fe00000000850000002f000000b70000000a0000009500000000000000e535f8a62fc2868f0399d909a63796c113a80c19aab9d607000000b6cd483be3f0d3253730e711f5969f62c28b22756bedf3cf393d14c46cc4f79fd2b316da4f0de8163f6242fa732300000637c48468766af540439fce41f144631ac262dcae18c3d1a1fbe96dd87235b44174f7c0343185089a0f119e31975e551558055dc2dc"], &(0x7f0000000280)='GPL\x00'}, 0x48) r1 = socket$kcm(0x11, 0x8000000002, 0x300) socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000540)=r0, 0x4) syz_emit_ethernet(0x3e, &(0x7f0000000000)={@broadcast, @random="96c1e9574b31", @void, {@ipv4={0x6000, @icmp={{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x1, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @local}, @time_exceeded={0xb, 0x0, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local, @multicast2}}}}}}, 0x0) [ 1322.852729][T12275] kAFS: Bad value for 'source' 09:33:08 executing program 2: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f00000015c0)=ANY=[@ANYBLOB='%'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x2000000000000000, 0x0) 09:33:08 executing program 3: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000080)=ANY=[@ANYBLOB="2355d9da810f118761505cbc243ebf1c64a62949ee1ffbc71464c1a4b4ad7f05daac119155dd2c494ab77876f112c1cb86"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:33:08 executing program 2: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f00000015c0)=ANY=[@ANYBLOB='%'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x2010000000000000, 0x0) 09:33:08 executing program 3: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000080)=ANY=[@ANYBLOB], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:33:08 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f00000015c0)=ANY=[@ANYBLOB='#'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) r0 = socket(0x0, 0x80002, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="080db5055e0bcfe8696071") sendmmsg$unix(r0, &(0x7f0000000780)=[{&(0x7f00000002c0)=@abs={0x757c3c299e79f50f, 0x0, 0x4e20}, 0x6e, &(0x7f0000000480)=[{&(0x7f0000000340)="f79af3d9eb4315a0db5091963371139c84a4b74d388b49048844e1589857d3fb9b02ba205b971c7b5e5db9cded8a72ac24ca5f89af46a7d8f619c7799f6cfbea9b2ed2f16a6c54d82c1d3058f7b69acd0ce1309bb823034dcb8892dfde809d14f7e36c17a8075b662e2b726dcdbcda1c7f4d8ada7ca7c69328b92ca565a48ff6f86a0f20e86c8cfd8cb3207ccf7b23ff24c2611fb7117730e8a8f125b89a69b7e23701a72c2fac8d21d9ed09d3d1681650df1ff87ec9deead9c00da1856f1878ea937ef7f0bd1b76103d353dc5f6ceb232a4b52c571469833d01060734ddb12066e98652780404e62d829e21ee3c", 0xee}, {&(0x7f0000000440)="de5baa56411ec3048431", 0xa}], 0x2, &(0x7f00000004c0), 0x0, 0x4000000}, {&(0x7f0000000500)=@abs={0x0, 0x0, 0x4e20}, 0x6e, &(0x7f0000000740)=[{&(0x7f0000000580)="20306ec0bb1c829969e4210efac4141a26f6a8d815547b671b7076365bfbaa48a3e4b6d5d61b187dce1ef6dbc41e36df42", 0x31}, {&(0x7f00000005c0)="7c110a83557907d0d248de42235d38cbbdbbcdd861ddc1396d286f85f0104b057ee888417644aee786b088dac51fefa4fe08f70ba772b3317bea5c5748cfc5ae2fbdf777e060033262fe9c2b3b10bf17f7f8971d529688f0349e497d9c83e47859c32c7195a27487b7a63a164c457bb933a99170e66d7833094bb542f0178f254a3e972a3fbeb6f2e12e07ff0b", 0x8d}, {&(0x7f0000000680)="c821d16129754d211884c3f855a9278e164043e5e384ae594455a10f800be6519720e1173736550dd7b4d66d0eee97d87796b66c2f60efb2dac80ab7b5fb0dca380bd9d2e2def34d31176682a6ded5462856ea8dd6e15377907946915873b40cd7f799ea7f1625ece6ad0f1989a000db9ec41d92f60e857ad46e4857b689489fb70e870ec48067fe6bc621ca8638fd131b4f52014a747945dd2575a8103a15d44a604020984a404ae940d1e471e29b4d01b7d6e5951a1e", 0xb7}], 0x3, 0x0, 0x0, 0x10000081}], 0x2, 0x60000004) r1 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0xff, 0x2800) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f00000004c0)={0x0, 0x0, 0x1, 0x5}) ioctl$DRM_IOCTL_SG_FREE(r1, 0x40106439, &(0x7f0000000800)={0x9, r2}) execveat(r1, &(0x7f0000000040)='./file1\x00', &(0x7f00000001c0)=[&(0x7f0000000080)='afs\x00', &(0x7f00000000c0)='-md5sum\x00', &(0x7f0000000100)='afs\x00'], &(0x7f0000000280)=[&(0x7f0000000240)='\x00'], 0x1000) [ 1323.135176][T12290] kAFS: Bad value for 'source' 09:33:08 executing program 3: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000080)=ANY=[@ANYBLOB], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:33:08 executing program 2: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f00000015c0)=ANY=[@ANYBLOB='%'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x3f00000000000000, 0x0) [ 1323.189394][T12292] kAFS: unparsable volume name [ 1323.360912][T12502] kAFS: Bad value for 'source' 09:33:08 executing program 2: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f00000015c0)=ANY=[@ANYBLOB='%'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x4000000000000000, 0x0) 09:33:08 executing program 4: socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$EVIOCGPROP(r2, 0x80404509, &(0x7f0000000280)=""/209) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f00000015c0)=ANY=[@ANYBLOB='#'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) accept4(r3, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c81", 0x10) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, &(0x7f0000000040)={0x9d0000, 0x7ff, 0x0, r3, 0x0, &(0x7f0000000000)={0x990a61, 0x10000, [], @ptr=0x3}}) r5 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcsa\x00', 0x80000, 0x0) linkat(r4, &(0x7f0000000080)='./file0\x00', r5, &(0x7f0000000100)='./file0\x00', 0x1400) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x189301, 0x0) socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r7 = socket$inet_udplite(0x2, 0x2, 0x88) r8 = fcntl$dupfd(r6, 0x0, r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) ioctl$DRM_IOCTL_ADD_CTX(r8, 0xc0086420, &(0x7f0000000380)={0x0}) ioctl$DRM_IOCTL_SWITCH_CTX(0xffffffffffffffff, 0x40086424, &(0x7f00000003c0)={r9, 0x1}) 09:33:08 executing program 3: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000080)=ANY=[@ANYBLOB], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:33:08 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f0000000340)=ANY=[@ANYBLOB="b7020000f7ffffffbfa70000000000002402000020feffff7a0af0fff8ffffff69a4f0ff00000000b70600000018d1fe2d6405000000000075040000000000000704000000000000b7040000100000206a0700fe00000000850000002f000000b70000000a0000009500000000000000e535f8a62fc2868f0399d909a63796c113a80c19aab9d607000000b6cd483be3f0d3253730e711f5969f62c28b22756bedf3cf393d14c46cc4f79fd2b316da4f0de8163f6242fa732300000637c48468766af540439fce41f144631ac262dcae18c3d1a1fbe96dd87235b44174f7c0343185089a0f119e31975e551558055dc2dc"], &(0x7f0000000280)='GPL\x00'}, 0x48) r1 = socket$kcm(0x11, 0x8000000002, 0x300) socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000540)=r0, 0x4) syz_emit_ethernet(0x3e, &(0x7f0000000000)={@broadcast, @random="96c1e9574b31", @void, {@ipv4={0x8035, @icmp={{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x1, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @local}, @time_exceeded={0xb, 0x0, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local, @multicast2}}}}}}, 0x0) 09:33:08 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f0000000340)=ANY=[@ANYBLOB="b7020000f7ffffffbfa70000000000002402000020feffff7a0af0fff8ffffff69a4f0ff00000000b70600000018d1fe2d6405000000000075040000000000000704000000000000b7040000100000206a0700fe00000000850000002f000000b70000000a0000009500000000000000e535f8a62fc2868f0399d909a63796c113a80c19aab9d607000000b6cd483be3f0d3253730e711f5969f62c28b22756bedf3cf393d14c46cc4f79fd2b316da4f0de8163f6242fa732300000637c48468766af540439fce41f144631ac262dcae18c3d1a1fbe96dd87235b44174f7c0343185089a0f119e31975e551558055dc2dc"], &(0x7f0000000280)='GPL\x00'}, 0x48) r1 = socket$kcm(0x11, 0x8000000002, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000540)=r0, 0x4) socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = fcntl$dupfd(r2, 0x0, r3) r5 = socket$alg(0x26, 0x5, 0x0) bind$alg(r5, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) accept4(r5, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r5, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c81", 0x10) setsockopt$sock_void(r5, 0x1, 0x24, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') 09:33:08 executing program 2: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f00000015c0)=ANY=[@ANYBLOB='%'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x4800000000000000, 0x0) [ 1323.665098][T12617] kAFS: unparsable volume name [ 1323.679123][T12620] kAFS: Bad value for 'source' 09:33:08 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f00000015c0)=ANY=[@ANYBLOB='\x00'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:33:08 executing program 3: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000080)=ANY=[@ANYBLOB="2355d9da810f118761505cbc243ebf1c64a62949ee1ffbc714"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:33:09 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f0000000340)=ANY=[@ANYBLOB="b7020000f7ffffffbfa70000000000002402000020feffff7a0af0fff8ffffff69a4f0ff00000000b70600000018d1fe2d6405000000000075040000000000000704000000000000b7040000100000206a0700fe00000000850000002f000000b70000000a0000009500000000000000e535f8a62fc2868f0399d909a63796c113a80c19aab9d607000072a1cd483be3f0d3253730e711f5969f62b90795c28b22756bedf3cf393d14c46cc4f79fd2b316da4f0de8163f6242fa732300000637c48468766af540439fce41f144631ac262dcae18c3d1a1fbe96dd87235b44174f7c0343185089a0f119e31975e55045805"], &(0x7f0000000280)='GPL\x00'}, 0x48) r1 = socket$kcm(0x11, 0x8000000002, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000540)=r0, 0x4) socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') 09:33:09 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f0000000340)=ANY=[@ANYBLOB="b7020000f7ffffffbfa70000000000002402000020feffff7a0af0fff8ffffff69a4f0ff00000000b70600000018d1fe2d6405000000000075040000000000000704000000000000b7040000100000206a0700fe00000000850000002f000000b70000000a0000009500000000000000e535f8a62fc2868f0399d909a63796c113a80c19aab9d607000000b6cd483be3f0d3253730e711f5969f62c28b22756bedf3cf393d14c46cc4f79fd2b316da4f0de8163f6242fa732300000637c48468766af540439fce41f144631ac262dcae18c3d1a1fbe96dd87235b44174f7c0343185089a0f119e31975e551558055dc2dc"], &(0x7f0000000280)='GPL\x00'}, 0x48) r1 = socket$kcm(0x11, 0x8000000002, 0x300) socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000540)=r0, 0x4) syz_emit_ethernet(0x3e, &(0x7f0000000000)={@broadcast, @random="96c1e9574b31", @void, {@ipv4={0x8100, @icmp={{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x1, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @local}, @time_exceeded={0xb, 0x0, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local, @multicast2}}}}}}, 0x0) 09:33:09 executing program 2: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f00000015c0)=ANY=[@ANYBLOB='%'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x4c00000000000000, 0x0) [ 1323.927272][T12837] kAFS: Bad value for 'source' 09:33:09 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x7ff, 0x0) setsockopt$SO_RDS_MSG_RXPATH_LATENCY(r0, 0x114, 0xa, &(0x7f0000000040)={0x2, "97d2"}, 0x3) mount(&(0x7f00000015c0)=ANY=[@ANYBLOB='#'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:33:09 executing program 3: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000080)=ANY=[@ANYBLOB='#'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:33:09 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0x1d, &(0x7f0000000340)=ANY=[@ANYBLOB="b7020000f7ffffffbfa70000000000002402000020feffff7a0af0fff8ffffff69a4f0ff00000000b70600000018d1fe2d6405000000000075040000000000000704000000000000b704000000b70000000a0000009500000000000000e535f8a62fc2868f0399d909a63796c113a80c19aab9d607000000b6cd483be3f0d3253730e711f5969f62c28b22756bedf3cf393d14c46cc4f79fd2b316da4f0de8163f6242fa732300000637c48468766af540439fce41f144631ac262dcae18c3d1a1b6476dd87235b44174f7c0343185089a0f119e31975e551558055dc2dc00"/238], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) r1 = socket$kcm(0x11, 0x8000000002, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000540)=r0, 0x4) socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') 09:33:09 executing program 2: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f00000015c0)=ANY=[@ANYBLOB='%'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x6000000000000000, 0x0) [ 1324.173203][T12959] kAFS: unparsable volume name [ 1324.198800][T12962] kAFS: unparsable volume name 09:33:09 executing program 3: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000080)=ANY=[@ANYBLOB='#'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:33:09 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f0000000340)=ANY=[@ANYBLOB="b7020000f7ffffffbfa70000000000002402000020feffff7a0af0fff8ffffff69a4f0ff00000000b70600000018d1fe2d6405000000000075040000000000000704000000000000b7040000100000206a0700fe00000000850000002f000000b70000000a0000009500000000000000e535f8a62fc2868f0399d909a63796c113a80c19aab9d607000000b6cd483be3f0d3253730e711f5969f62c28b22756bedf3cf393d14c46cc4f79fd2b316da4f0de8163f6242fa732300000637c48468766af540439fce41f144631ac262dcae18c3d1a1fbe96dd87235b44174f7c0343185089a0f119e31975e551558055dc2dc"], &(0x7f0000000280)='GPL\x00'}, 0x48) r1 = socket$kcm(0x11, 0x8000000002, 0x300) socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000540)=r0, 0x4) syz_emit_ethernet(0x3e, &(0x7f0000000000)={@broadcast, @random="96c1e9574b31", @void, {@ipv4={0x8847, @icmp={{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x1, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @local}, @time_exceeded={0xb, 0x0, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local, @multicast2}}}}}}, 0x0) 09:33:09 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f00000015c0)=ANY=[@ANYBLOB='\x00'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:33:09 executing program 2: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f00000015c0)=ANY=[@ANYBLOB='%'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x6800000000000000, 0x0) [ 1324.435697][T13078] kAFS: unparsable volume name 09:33:09 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg$inet(r1, &(0x7f0000000680)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f00000000c0)="5831255624c13e4c563f221188b6be66ea", 0x11}], 0x1}}, {{&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000002c0)=[{&(0x7f0000000040)="70a6b8247e016ae2647a2e703fce46c432e37d1dffd332a793d4b9e3617386d153", 0x21}, {&(0x7f0000000200)="09f96fbf33ceccc10976cd10b1411ee57d092fd5b7f95a0f19f01005f110463ccb2c6ebdb74ad7a7da1a2bed233154886db68984d477ebee11ce9a8e3510d401f6f31ea0a7e3ec1cda7b95f7a02b42753eb4cf0bbf5afbc7084f9bc2603aafe5da6cd54e4d647ec9fd641e4241513aaf23481d1f390bbb83dfae56369f4b03367ccd45f0ec4cd929aed127394157e7b3794500c0c5f88930b1ff50bbae1163c26fff28d06028", 0xa6}, {&(0x7f0000000100)="38d6cd435749d519cc39e90540f37c4f5c6bceef6c4ae07105cafc5e25d9bbfce859670b89666cca0857aa0c2abd8722a9db0caad3905e3ff682", 0x3a}, {&(0x7f0000000140)="d71206abd00e3c0a7e2440673da6a9fc2c1255a9b136bc982a3dc2ac21ef167250c176acfbd4d13abd86b018e8b1357842d8dc93e53f6b542e9633e1db8672e8", 0x40}], 0x4}}, {{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000380)="df304451b990364b1c6ff9c843eb47125c0a16565b5efbc0494b453f9863364196a743b5d226d34b2293f3b4b8dde4b8434172dec0902f0e03c2893c2bfd5f662eefc2902850a0221d55", 0x200003ca}, {&(0x7f0000000400)}], 0x2, &(0x7f0000000540)=[@ip_tos_u8={{0x11}}, @ip_ttl={{0x14}}, @ip_ttl={{0x14}}, @ip_tos_u8={{0x11}}], 0x60}}], 0x3, 0x0) r2 = socket(0x0, 0x80002, 0x0) ioctl(r2, 0x1000008912, &(0x7f00000000c0)="080db5055e0bcfe8696071") setsockopt$pppl2tp_PPPOL2TP_SO_RECVSEQ(r1, 0x111, 0x2, 0x1, 0x4) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0x20000000000000c8, &(0x7f0000000840)=ANY=[@ANYPTR=&(0x7f00000005c0)=ANY=[@ANYPTR=&(0x7f0000000480)=ANY=[@ANYRES32=0x0, @ANYPTR, @ANYRESOCT=0x0, @ANYPTR64, @ANYPTR, @ANYRESOCT, @ANYRESOCT=r1], @ANYRESHEX=0x0, @ANYRESHEX=r2]], &(0x7f0000000280)='GPL\x00', 0x0, 0x2e8, 0x0, 0x0, 0x0, [], 0x0, 0x10, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000)={0x0, 0x0, 0x0, 0xffffff01}}, 0x48) r4 = socket$kcm(0x11, 0x8000000002, 0x300) setsockopt$sock_attach_bpf(r4, 0x1, 0x32, &(0x7f0000000540)=r3, 0x4) r5 = socket$inet6_sctp(0xa, 0x0, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)=ANY=[@ANYBLOB="01000800", @ANYRES32=0x0], &(0x7f000095dffc)=0x8) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000580)={r6, 0x0, 0x1, [0x0]}, 0xa) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r5, 0x84, 0x6f, &(0x7f0000000340)={r6, 0x94, &(0x7f0000000740)=[@in6={0xa, 0x4e23, 0x6, @mcast1, 0xb4c5}, @in={0x2, 0x4e23, @multicast1}, @in={0x2, 0x4e23, @multicast1}, @in6={0xa, 0x4e21, 0x2, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x8}, @in6={0xa, 0x4e22, 0x40, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x2}, @in={0x2, 0x4e24, @broadcast}, @in={0x2, 0x4e20, @broadcast}]}, &(0x7f0000000400)=0x10) socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r8 = socket$inet_udplite(0x2, 0x2, 0x88) r9 = fcntl$dupfd(r7, 0x0, r8) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') r10 = socket$alg(0x26, 0x5, 0x0) socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r12 = socket$inet_udplite(0x2, 0x2, 0x88) r13 = fcntl$dupfd(r11, 0x0, r12) ioctl$PERF_EVENT_IOC_ENABLE(r13, 0x8912, 0x400200) ioctl$SNDCTL_DSP_SETFMT(r13, 0xc0045005, &(0x7f0000000440)=0xc21) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000000300)={0x0, 0x0, 0xbcc, 0x80000000}) bind$alg(r10, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r14 = accept4(r10, 0x0, 0x0, 0x0) sendmmsg$inet(r14, &(0x7f0000000680)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f00000000c0)="5831255624c13e4c563f221188b6be66ea", 0x11}], 0x1}}, {{&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000002c0)=[{&(0x7f0000000040)="70a6b8247e016ae2647a2e703fce46c432e37d1dffd332a793d4b9e3617386d153", 0x21}, {&(0x7f0000000200)="09f96fbf33ceccc10976cd10b1411ee57d092fd5b7f95a0f19f01005f110463ccb2c6ebdb74ad7a7da1a2bed233154886db68984d477ebee11ce9a8e3510d401f6f31ea0a7e3ec1cda7b95f7a02b42753eb4cf0bbf5afbc7084f9bc2603aafe5da6cd54e4d647ec9fd641e4241513aaf23481d1f390bbb83dfae56369f4b03367ccd45f0ec4cd929aed127394157e7b3794500c0c5f88930b1ff50bbae1163c26fff28d06028", 0xa6}, {&(0x7f0000000100)="38d6cd435749d519cc39e90540f37c4f5c6bceef6c4ae07105cafc5e25d9bbfce859670b89666cca0857aa0c2abd8722a9db0caad3905e3ff682", 0x3a}, {&(0x7f0000000140)="d71206abd00e3c0a7e2440673da6a9fc2c1255a9b136bc982a3dc2ac21ef167250c176acfbd4d13abd86b018e8b1357842d8dc93e53f6b542e9633e1db8672e8", 0x40}], 0x4}}, {{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000380)="df304451b990364b1c6ff9c843eb47125c0a16565b5efbc0494b453f9863364196a743b5d226d34b2293f3b4b8dde4b8434172dec0902f0e03c2893c2bfd5f662eefc2902850a0221d55", 0x200003ca}, {&(0x7f0000000400)}], 0x2, &(0x7f0000000540)=[@ip_tos_u8={{0x11}}, @ip_ttl={{0x14}}, @ip_ttl={{0x14}}, @ip_tos_u8={{0x11}}], 0x60}}], 0x3, 0x0) sendmsg$TIPC_NL_BEARER_GET(r14, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, 0x0, 0x4, 0x70bd2c, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x24000040}, 0x40000) 09:33:09 executing program 3: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000080)=ANY=[@ANYBLOB='#'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1324.559911][T13085] kAFS: Bad value for 'source' 09:33:09 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000588ff8)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = fcntl$dupfd(r3, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={0x0, r5, 0x0, 0xe, &(0x7f0000000100)='mime_typeppp1\x00'}, 0x30) fcntl$lock(r0, 0x7, &(0x7f0000000840)={0x1, 0x0, 0x0, 0x0, r6}) r7 = getpid() sched_setscheduler(r7, 0x5, &(0x7f0000000380)) fcntl$lock(r0, 0x6, &(0x7f0000000040)={0x1, 0x0, 0x0, 0x0, r7}) r8 = socket(0x0, 0x80002, 0x0) ioctl(r8, 0x1000008912, &(0x7f00000000c0)="080db5055e0bcfe8696071") r9 = socket$nl_generic(0x10, 0x3, 0x10) r10 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240)='l2tp\x00') sendmsg$L2TP_CMD_NOOP(r9, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)={0x14, r10, 0x1}, 0x14}}, 0x0) sendmsg$L2TP_CMD_SESSION_GET(r8, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x44, r10, 0x200, 0x70bd2d, 0x25dfdbfb, {}, [@L2TP_ATTR_OFFSET={0x6, 0x3, 0x9}, @L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e24}, @L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e23}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0xff}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0xf8}, @L2TP_ATTR_SESSION_ID={0x8, 0xb, 0x4}]}, 0x44}, 0x1, 0x0, 0x0, 0x8080}, 0x40000c0) socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, &(0x7f00000000c0)=0x20, 0x4) r12 = socket$inet_udplite(0x2, 0x2, 0x88) r13 = fcntl$dupfd(r11, 0x0, r12) ioctl$PERF_EVENT_IOC_ENABLE(r13, 0x8912, 0x400200) ioctl$DRM_IOCTL_AGP_ALLOC(r13, 0xc0206434, &(0x7f0000000000)={0xa55, 0x0, 0x10000, 0x200}) ioctl$DRM_IOCTL_AGP_BIND(0xffffffffffffffff, 0x40106436, &(0x7f0000000080)={r14, 0x8}) socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r16 = socket$inet_udplite(0x2, 0x2, 0x88) r17 = fcntl$dupfd(r15, 0x0, r16) ioctl$PERF_EVENT_IOC_ENABLE(r17, 0x8912, 0x400200) ioctl$RTC_EPOCH_SET(r17, 0x4008700e, 0x5) [ 1324.652572][T13189] kAFS: unparsable volume name 09:33:09 executing program 2: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f00000015c0)=ANY=[@ANYBLOB='%'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x6c00000000000000, 0x0) 09:33:09 executing program 3: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000080)=ANY=[@ANYBLOB="2355d9da810f118761505cbc24"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:33:09 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f00000015c0)=ANY=[@ANYBLOB='#'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) r0 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x9, 0x400) ioctl$UI_SET_MSCBIT(r0, 0x40045568, 0xd) socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$KVM_GET_API_VERSION(r3, 0xae00, 0x0) 09:33:09 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f0000000340)=ANY=[@ANYBLOB="b7020000f7ffffffbfa70000000000002402000020feffff7a0af0fff8ffffff69a4f0ff00000000b70600000018d1fe2d6405000000000075040000000000000704000000000000b7040000100000206a0700fe00000000850000002f000000b70000000a0000009500000000000000e535f8a62fc2868f0399d909a63796c113a80c19aab9d607000000b6cd483be3f0d3253730e711f5969f62c28b22756bedf3cf393d14c46cc4f79fd2b316da4f0de8163f6242fa732300000637c48468766af540439fce41f144631ac262dcae18c3d1a1fbe96dd87235b44174f7c0343185089a0f119e31975e551558055dc2dc"], &(0x7f0000000280)='GPL\x00'}, 0x48) r1 = socket$kcm(0x11, 0x8000000002, 0x300) socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000540)=r0, 0x4) syz_emit_ethernet(0x3e, &(0x7f0000000000)={@broadcast, @random="96c1e9574b31", @void, {@ipv4={0x8848, @icmp={{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x1, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @local}, @time_exceeded={0xb, 0x0, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local, @multicast2}}}}}}, 0x0) [ 1324.837620][T13207] kAFS: unparsable volume name [ 1324.878649][T13207] kAFS: unparsable volume name 09:33:10 executing program 3: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000080)=ANY=[@ANYBLOB='#'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:33:10 executing program 2: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f00000015c0)=ANY=[@ANYBLOB='%'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x7400000000000000, 0x0) 09:33:10 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000000)=ANY=[@ANYBLOB="d3adcdcb38"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:33:10 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg$inet(r1, &(0x7f0000000680)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f00000000c0)="5831255624c13e4c563f221188b6be66ea", 0x11}], 0x1}}, {{&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000002c0)=[{&(0x7f0000000040)="70a6b8247e016ae2647a2e703fce46c432e37d1dffd332a793d4b9e3617386d153", 0x21}, {&(0x7f0000000200)="09f96fbf33ceccc10976cd10b1411ee57d092fd5b7f95a0f19f01005f110463ccb2c6ebdb74ad7a7da1a2bed233154886db68984d477ebee11ce9a8e3510d401f6f31ea0a7e3ec1cda7b95f7a02b42753eb4cf0bbf5afbc7084f9bc2603aafe5da6cd54e4d647ec9fd641e4241513aaf23481d1f390bbb83dfae56369f4b03367ccd45f0ec4cd929aed127394157e7b3794500c0c5f88930b1ff50bbae1163c26fff28d06028", 0xa6}, {&(0x7f0000000100)="38d6cd435749d519cc39e90540f37c4f5c6bceef6c4ae07105cafc5e25d9bbfce859670b89666cca0857aa0c2abd8722a9db0caad3905e3ff682", 0x3a}, {&(0x7f0000000140)="d71206abd00e3c0a7e2440673da6a9fc2c1255a9b136bc982a3dc2ac21ef167250c176acfbd4d13abd86b018e8b1357842d8dc93e53f6b542e9633e1db8672e8", 0x40}], 0x4}}, {{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000380)="df304451b990364b1c6ff9c843eb47125c0a16565b5efbc0494b453f9863364196a743b5d226d34b2293f3b4b8dde4b8434172dec0902f0e03c2893c2bfd5f662eefc2902850a0221d55", 0x200003ca}, {&(0x7f0000000400)}], 0x2, &(0x7f0000000540)=[@ip_tos_u8={{0x11}}, @ip_ttl={{0x14}}, @ip_ttl={{0x14}}, @ip_tos_u8={{0x11}}], 0x60}}], 0x3, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0x27, &(0x7f0000000580)=ANY=[@ANYPTR=&(0x7f00000001c0)=ANY=[@ANYRESOCT=r1, @ANYBLOB="1a0dbbcdb622dbe58fc208a218b1452a1070e0aebcc85a36859500000000069d351b2297067ffb99a73553b305b0fce8b71eb83d3815160f21bc461c71a11a9a5ec528459c85db06e63e0000cd8402741b2123bec7474800"/97, @ANYRESDEC]], &(0x7f0000000280)='GPL\x00', 0x0, 0x31c, 0x0, 0x0, 0xa, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x0, 0x0, 0xfffffffd}, 0x10}, 0x78) r3 = socket$kcm(0x11, 0x8000000002, 0x300) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000540)=r2, 0x4) socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = fcntl$dupfd(r4, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, &(0x7f0000000080)) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') [ 1325.061642][T13410] kAFS: unparsable volume name [ 1325.108478][T13426] kAFS: unparsable volume name 09:33:10 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f0000000340)=ANY=[@ANYBLOB="b7020000f7ffffffbfa70000000000002402000020feffff7a0af0fff8ffffff69a4f0ff00000000b70600000018d1fe2d6405000000000075040000000000000704000000000000b7040000100000206a0700fe00000000850000002f000000b70000000a0000009500000000000000e535f8a62fc2868f0399d909a63796c113a80c19aab9d607000000b6cd483be3f0d3253730e711f5969f62c28b22756bedf3cf393d14c46cc4f79fd2b316da4f0de8163f6242fa732300000637c48468766af540439fce41f144631ac262dcae18c3d1a1fbe96dd87235b44174f7c0343185089a0f119e31975e551558055dc2dc"], &(0x7f0000000280)='GPL\x00'}, 0x48) r1 = socket$kcm(0x11, 0x8000000002, 0x300) socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000540)=r0, 0x4) syz_emit_ethernet(0x3e, &(0x7f0000000000)={@broadcast, @random="96c1e9574b31", @void, {@ipv4={0x8864, @icmp={{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x1, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @local}, @time_exceeded={0xb, 0x0, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local, @multicast2}}}}}}, 0x0) 09:33:10 executing program 3: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000080)=ANY=[@ANYBLOB='#'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:33:10 executing program 4: r0 = syz_open_dev$vcsn(&(0x7f00000001c0)='/dev/vcs#\x00', 0x0, 0x480802) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000200)) r1 = socket(0x0, 0x80002, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000000c0)="080db5055e0bcfe8696071") ioctl$sock_SIOCGIFBR(r1, 0x8940, &(0x7f0000000100)=@add_del={0x2, &(0x7f00000000c0)='ipvlan1\x00'}) r2 = openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nvme-fabrics\x00', 0x2, 0x0) ioctl$KVM_S390_UCAS_MAP(r2, 0x4018ae50, &(0x7f0000000080)={0x8, 0x0, 0x8}) ioctl$sock_inet6_udp_SIOCINQ(r1, 0x541b, &(0x7f0000000240)) mount(&(0x7f0000000040)=ANY=[@ANYRES64=0x0, @ANYRES64, @ANYRESDEC=0x0], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1325.285759][T13440] kAFS: unparsable volume name 09:33:10 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000588ff8)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nvram\x00', 0x161201, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r3, 0x0, 0x41, &(0x7f0000000880)={'filter\x00', 0x1000, "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"}, &(0x7f0000000080)=0x1024) lsetxattr$trusted_overlay_opaque(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='trusted.overlay.opaque\x00', &(0x7f0000000140)='y\x00', 0x2, 0x0) fcntl$lock(r0, 0x7, &(0x7f0000000840)={0x1}) fcntl$lock(r0, 0x6, &(0x7f0000000000)) 09:33:10 executing program 2: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f00000015c0)=ANY=[@ANYBLOB='%'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x7a00000000000000, 0x0) 09:33:10 executing program 3: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000080)=ANY=[@ANYBLOB='#'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:33:10 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0x11f, &(0x7f0000000340)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0xdc6ecc9b9e5cefb4, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000001c0), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) r1 = socket$kcm(0x11, 0x8000000002, 0x300) setxattr$trusted_overlay_nlink(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='trusted.overlay.nlink\x00', &(0x7f00000002c0)={'L-', 0x1}, 0x16, 0x1) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000540)=r0, 0x4) socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) bind$vsock_stream(r4, &(0x7f0000000100)={0x28, 0x0, 0x0, @my=0x1}, 0x10) r5 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2000, 0x0) ioctl$BLKIOMIN(r5, 0x1278, &(0x7f00000000c0)) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, &(0x7f0000000300)="b77e373bed2dc3dd6ed8c4cdc3e72a09be5c68661fefb773b0a034096881c6c00cdbc48cc65de561e933720c16dd483455dee3f60bcbf05da813dbd25758ceb86d1b07d12143acb04383f5a9d613771189ab57e4346c0908b1b8b80dfb924691171002b0bed33379f4701418a041ceb005eee7466f817967a40a6a60b0c16527e6bdc713bfff1262ebfb637d64dd85476d10357dccec56eb09aa966e2845cb33d3297fd1a67a17c5ba5da14102aff2873398751fce264edc5ebc06b927d160045998fa27d1") 09:33:10 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f00000015c0)=ANY=[@ANYBLOB='#'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) symlink(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00') getpid() 09:33:10 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f0000000340)=ANY=[@ANYBLOB="b7020000f7ffffffbfa70000000000002402000020feffff7a0af0fff8ffffff69a4f0ff00000000b70600000018d1fe2d6405000000000075040000000000000704000000000000b7040000100000206a0700fe00000000850000002f000000b70000000a0000009500000000000000e535f8a62fc2868f0399d909a63796c113a80c19aab9d607000000b6cd483be3f0d3253730e711f5969f62c28b22756bedf3cf393d14c46cc4f79fd2b316da4f0de8163f6242fa732300000637c48468766af540439fce41f144631ac262dcae18c3d1a1fbe96dd87235b44174f7c0343185089a0f119e31975e551558055dc2dc"], &(0x7f0000000280)='GPL\x00'}, 0x48) r1 = socket$kcm(0x11, 0x8000000002, 0x300) socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000540)=r0, 0x4) syz_emit_ethernet(0x3e, &(0x7f0000000000)={@broadcast, @random="96c1e9574b31", @void, {@ipv4={0x8906, @icmp={{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x1, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @local}, @time_exceeded={0xb, 0x0, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local, @multicast2}}}}}}, 0x0) [ 1325.547101][T13751] kAFS: unparsable volume name [ 1325.556591][T13751] kAFS: unparsable volume name [ 1325.579173][T13776] kAFS: unparsable volume name 09:33:10 executing program 2: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f00000015c0)=ANY=[@ANYBLOB='%'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x8cffffff00000000, 0x0) 09:33:10 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f00000015c0)=ANY=[@ANYBLOB='#'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x40040, 0x4) 09:33:10 executing program 3: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000080)=ANY=[@ANYBLOB="2355d9da810f11"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:33:10 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0x1e, &(0x7f0000000340)=ANY=[@ANYRES64=0x0], &(0x7f0000000280)='GPL\x00', 0x0, 0xfffffe5d, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000000c0), 0x8, 0x10, &(0x7f0000000000), 0xffffffffffffff07}, 0x407) r1 = socket$kcm(0x11, 0x8000000002, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000540)=r0, 0x4) socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = fcntl$dupfd(r2, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) timerfd_create(0x5, 0x40800) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') sendfile(r1, r3, &(0x7f0000000080)=0x8, 0x2) ioctl$sock_SIOCDELDLCI(r1, 0x8981, &(0x7f0000000100)={'ip6tnl0\x00', 0x800}) 09:33:10 executing program 2: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f00000015c0)=ANY=[@ANYBLOB='%'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0xf6ffffff00000000, 0x0) [ 1325.778692][T13963] kAFS: unparsable volume name 09:33:10 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f0000000340)=ANY=[@ANYBLOB="b7020000f7ffffffbfa70000000000002402000020feffff7a0af0fff8ffffff69a4f0ff00000000b70600000018d1fe2d6405000000000075040000000000000704000000000000b7040000100000206a0700fe00000000850000002f000000b70000000a0000009500000000000000e535f8a62fc2868f0399d909a63796c113a80c19aab9d607000000b6cd483be3f0d3253730e711f5969f62c28b22756bedf3cf393d14c46cc4f79fd2b316da4f0de8163f6242fa732300000637c48468766af540439fce41f144631ac262dcae18c3d1a1fbe96dd87235b44174f7c0343185089a0f119e31975e551558055dc2dc"], &(0x7f0000000280)='GPL\x00'}, 0x48) r1 = socket$kcm(0x11, 0x8000000002, 0x300) socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000540)=r0, 0x4) syz_emit_ethernet(0x3e, &(0x7f0000000000)={@broadcast, @random="96c1e9574b31", @void, {@ipv4={0x800, @icmp={{0x4, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x1, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @local}, @time_exceeded={0xb, 0x0, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local, @multicast2}}}}}}, 0x0) [ 1325.805904][T13963] kAFS: unparsable volume name 09:33:11 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000000)=ANY=[@ANYBLOB='\x00\x00\x00'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:33:11 executing program 3: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000080)=ANY=[@ANYBLOB='#'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:33:11 executing program 2: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f00000015c0)=ANY=[@ANYBLOB='%'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0xff00000000000000, 0x0) 09:33:11 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f0000000340)=ANY=[@ANYBLOB="b7020000f7ffffffbfa70000000000002402000020feffff7a0af0fff8ffffff69a4f0ff00000000b70600000018d1fe2d6405000000000075040000000000000704000000000000b7040000100000206a0700fe00000000850000002f000000b70000000a0000009500000000000000e535f8a62fc2868f0399d909a63796c113a80c19aab9d607000000b6cd483be3f0d3253730e711f5969f62c28b22756bedf3cf393d14c46cc4f79fd2b316da4f0de8163f6242fa732300000637c48468766af540439fce41f144631ac262dcae18c3d1a1fbe96dd87235b44174f7c0343185089a0f119e31975e551558055dc2dc"], &(0x7f0000000280)='GPL\x00'}, 0x48) r1 = socket$kcm(0x11, 0x8000000002, 0x300) socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000540)=r0, 0x4) syz_emit_ethernet(0x3e, &(0x7f0000000000)={@broadcast, @random="96c1e9574b31", @void, {@ipv4={0x800, @icmp={{0x6, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x1, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @local}, @time_exceeded={0xb, 0x0, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local, @multicast2}}}}}}, 0x0) 09:33:11 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000588ff8)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x9, 0x100) flock(r1, 0x8) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$inet(r3, &(0x7f0000000680)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f00000000c0)="5831255624c13e4c563f221188b6be66ea", 0x11}], 0x1}}, {{&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000002c0)=[{&(0x7f0000000040)="70a6b8247e016ae2647a2e703fce46c432e37d1dffd332a793d4b9e3617386d153", 0x21}, {&(0x7f0000000200)="09f96fbf33ceccc10976cd10b1411ee57d092fd5b7f95a0f19f01005f110463ccb2c6ebdb74ad7a7da1a2bed233154886db68984d477ebee11ce9a8e3510d401f6f31ea0a7e3ec1cda7b95f7a02b42753eb4cf0bbf5afbc7084f9bc2603aafe5da6cd54e4d647ec9fd641e4241513aaf23481d1f390bbb83dfae56369f4b03367ccd45f0ec4cd929aed127394157e7b3794500c0c5f88930b1ff50bbae1163c26fff28d06028", 0xa6}, {&(0x7f0000000100)="38d6cd435749d519cc39e90540f37c4f5c6bceef6c4ae07105cafc5e25d9bbfce859670b89666cca0857aa0c2abd8722a9db0caad3905e3ff682", 0x3a}, {&(0x7f0000000140)="d71206abd00e3c0a7e2440673da6a9fc2c1255a9b136bc982a3dc2ac21ef167250c176acfbd4d13abd86b018e8b1357842d8dc93e53f6b542e9633e1db8672e8", 0x40}], 0x4}}, {{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000380)="df304451b990364b1c6ff9c843eb47125c0a16565b5efbc0494b453f9863364196a743b5d226d34b2293f3b4b8dde4b8434172dec0902f0e03c2893c2bfd5f662eefc2902850a0221d55", 0x200003ca}, {&(0x7f0000000400)}], 0x2, &(0x7f0000000540)=[@ip_tos_u8={{0x11}}, @ip_ttl={{0x14}}, @ip_ttl={{0x14}}, @ip_tos_u8={{0x11}}], 0x60}}], 0x3, 0x0) r4 = socket(0x0, 0x80002, 0x0) ioctl(r4, 0x1000008912, &(0x7f00000000c0)="080db5055e0bcfe8696071") getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000580)={r5, 0x0, 0x1, [0x0]}, 0xa) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r4, 0x84, 0x1a, &(0x7f0000000100)={r5, 0x5b, "7772ad939efd269b1ac3f585ad3f769491d1d22712f0e65f68cb7ce58d0bc3eca8ccadf83bad3073d93cbfe217040f9d204e709f55bd67d254e97b06abd3af800787a15107cccb2637c0a90ee2ca48789995dd9518be39f5064f2d"}, &(0x7f0000000080)=0x63) setsockopt$inet_sctp_SCTP_RESET_ASSOC(r3, 0x84, 0x78, &(0x7f0000000180)=r6, 0x4) r7 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) r8 = socket(0x0, 0x80002, 0x0) ioctl(r8, 0x1000008912, &(0x7f00000000c0)="080db5055e0bcfe8696071") fcntl$lock(r8, 0x7, &(0x7f0000000840)={0x1, 0x3, 0x10000000000000}) fcntl$lock(r0, 0x6, &(0x7f0000000000)) 09:33:11 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f0000000340)=ANY=[@ANYBLOB="b7020000f7ffffffbfa70000000000002402000020feffff7a0af0fff8ffffff69a4f0ff00000000b70600000018d1fe2d6405000000000075040000000000000704000000000000b7040000100000206a0700fe00000000850000002f000000b70000000a0000009500000000000000e535f8a62fc2868f0399d909a63796c113a80c19aab9d607000000b6cd483be3f0d3253730e711f5969f62c28b22756bedf3cf393d14c46cc4f79fd2b316da4f0de8163f6242fa732300000637c48468766af540439fce41f144631ac262dcae18c3d1a1fbe96dd87235b44174f7c0343185089a0f119e31975e551558055dc2dc"], &(0x7f0000000280)='GPL\x00'}, 0x48) r1 = socket$kcm(0x11, 0x8000000002, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000540)=r0, 0x4) r2 = syz_open_dev$audion(&(0x7f0000000080)='/dev/audio#\x00', 0x6, 0xc0) getsockopt$CAN_RAW_RECV_OWN_MSGS(r2, 0x65, 0x4, &(0x7f00000000c0), &(0x7f0000000100)=0x4) socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = fcntl$dupfd(r3, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') [ 1326.205883][T14291] kAFS: Bad value for 'source' 09:33:11 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) rmdir(&(0x7f0000000000)='./file0\x00') mount(&(0x7f00000015c0)=ANY=[@ANYBLOB="df"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1326.231408][T14295] kAFS: unparsable volume name 09:33:11 executing program 2: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f00000015c0)=ANY=[@ANYBLOB='%'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0xfffffffffffff000, 0x0) 09:33:11 executing program 3: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000080)=ANY=[@ANYBLOB='#'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:33:11 executing program 4: r0 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyprintk\x00', 0x40000, 0x0) ioctl$VT_WAITACTIVE(r0, 0x5607) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) membarrier(0x40, 0x0) 09:33:11 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0x20000000000000f7, &(0x7f0000000340)=ANY=[@ANYBLOB="b7020016f7ffffffbfa70000000000002402000020feffff7a0af0fff8ffffff69a4f0ff00000000b70600000018d1fe2d6405000000000075040000000000000cd35e13994da1a496cb9a2a195aa80704000000000000b7040000100000206a0700fe00000000850000002f000000b70000000a0000009500000000000000e535f8a62fc2868f0399d909a63796c113a80c19aab9d607000000b6cd483be3f0d3253730e711f5969f62c28b22756bedf3cf393d14c46cc4f79fd2b316da4f0de8163f6242fa732300000637c48468766af540439fce41f144631ac262dcae18c3d1a1fbe96dd87235b44174f7c0343185"], &(0x7f0000000280)='GPL\x00'}, 0x48) r1 = socket$kcm(0x11, 0x8000000002, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000540)=r0, 0x4) socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') 09:33:11 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f0000000340)=ANY=[@ANYBLOB="b7020000f7ffffffbfa70000000000002402000020feffff7a0af0fff8ffffff69a4f0ff00000000b70600000018d1fe2d6405000000000075040000000000000704000000000000b7040000100000206a0700fe00000000850000002f000000b70000000a0000009500000000000000e535f8a62fc2868f0399d909a63796c113a80c19aab9d607000000b6cd483be3f0d3253730e711f5969f62c28b22756bedf3cf393d14c46cc4f79fd2b316da4f0de8163f6242fa732300000637c48468766af540439fce41f144631ac262dcae18c3d1a1fbe96dd87235b44174f7c0343185089a0f119e31975e551558055dc2dc"], &(0x7f0000000280)='GPL\x00'}, 0x48) r1 = socket$kcm(0x11, 0x8000000002, 0x300) socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000540)=r0, 0x4) syz_emit_ethernet(0x3e, &(0x7f0000000000)={@broadcast, @random="96c1e9574b31", @void, {@ipv4={0x800, @icmp={{0x8, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x1, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @local}, @time_exceeded={0xb, 0x0, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local, @multicast2}}}}}}, 0x0) 09:33:11 executing program 2: socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$PPPIOCSACTIVE(r2, 0x40107446, &(0x7f0000000040)={0x6, &(0x7f0000000000)=[{0x9, 0x9, 0x12, 0xce9}, {0x400, 0x81, 0x6c, 0x8001}, {0x0, 0x9b, 0x1f}, {0x7, 0x3, 0x0, 0xff}, {0x1, 0x92, 0x4, 0x9}, {0x0, 0x9, 0x8, 0x1}]}) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/qat_adf_ctl\x00', 0x20001, 0x0) ioctl$SNDCTL_DSP_GETBLKSIZE(r3, 0xc0045004, &(0x7f00000000c0)) mount(&(0x7f00000015c0)=ANY=[@ANYBLOB='%'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1326.465404][T14504] kAFS: unparsable volume name [ 1326.574684][T14514] QAT: Invalid ioctl 09:33:11 executing program 3: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000080)=ANY=[@ANYBLOB='#'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:33:11 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0xdb) mount(&(0x7f0000000000)=ANY=[@ANYBLOB="2301fd447cc23411fd5b14e0b9c4baf5366062f654880f5895569eb8fcf565cbdcf22bda5571b4defe35d671956a83110831b8588ec0dc2f04847d6612c5db5cbcb59d5d14e6b5bd1a071faada320425bfc59d23a55a8304fcffffffffffffff85dd2a22a250c3be4b2c05ced9af32c074d59c446dcdbd9581e43b00000000baca4f6e363fd3104e3131e7b0acff24a86680f61abc3385488f4a4e8ab4"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:33:11 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f0000000440)=ANY=[@ANYBLOB="b7020000f7ffffffbfa70000000000002402000020feffff7a0af0fff8ffffff69a4f0ff00000000b70600000018d1fe2d6405000000000075d5e72d8ec8418a9f7a1b5fc21a48f6040000000000000704000000000000b7040000100000206a0700fe00000000850000002f000000b70000000a0000009500000000000000e535f8a62fc2868f0399d909a63796c113a80c19aab9d607000000b6cd483be3f0d32514c46cc4f79fd2b316da4f0de8163f6242fa732300000637c48468766af540439fce41f144631ac262dcae18c3d1a1fbe96dd87235b44174f7c0343185089a0f119e31975e551558055dc2dc00"/251], &(0x7f0000000280)='GPL\x00'}, 0x48) r1 = socket$kcm(0x11, 0x8000000002, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000540)=r0, 0x4) socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') [ 1326.768056][T14824] kAFS: unparsable volume name 09:33:12 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000588ff8)={0xffffffffffffffff, 0xffffffffffffffff}) socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = fcntl$dupfd(r1, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$KVM_X86_SET_MCE(r4, 0x4040ae9e, &(0x7f0000000040)={0x8100000000000000, 0x0, 0x7, 0x2, 0x3}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r5 = socket$alg(0x26, 0x5, 0x0) r6 = socket$isdn(0x22, 0x3, 0x23) getsockopt$sock_int(r6, 0x1, 0x27, &(0x7f0000000080), &(0x7f0000000300)=0x4) bind$alg(r5, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) getsockopt$IP_SET_OP_GET_BYINDEX(r2, 0x1, 0x53, &(0x7f0000000340), &(0x7f0000000400)=0x28) r7 = accept4(r5, 0x0, 0x0, 0x0) sendmmsg$inet(r7, &(0x7f0000000680)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f00000000c0)="5831255624c13e4c563f221188b6be66ea", 0x11}], 0x1}}, {{&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000002c0)=[{&(0x7f0000000040)="70a6b8247e016ae2647a2e703fce46c432e37d1dffd332a793d4b9e3617386d153", 0x21}, {&(0x7f0000000200)="09f96fbf33ceccc10976cd10b1411ee57d092fd5b7f95a0f19f01005f110463ccb2c6ebdb74ad7a7da1a2bed233154886db68984d477ebee11ce9a8e3510d401f6f31ea0a7e3ec1cda7b95f7a02b42753eb4cf0bbf5afbc7084f9bc2603aafe5da6cd54e4d647ec9fd641e4241513aaf23481d1f390bbb83dfae56369f4b03367ccd45f0ec4cd929aed127394157e7b3794500c0c5f88930b1ff50bbae1163c26fff28d06028", 0xa6}, {&(0x7f0000000100)="38d6cd435749d519cc39e90540f37c4f5c6bceef6c4ae07105cafc5e25d9bbfce859670b89666cca0857aa0c2abd8722a9db0caad3905e3ff682", 0x3a}, {&(0x7f0000000140)="d71206abd00e3c0a7e2440673da6a9fc2c1255a9b136bc982a3dc2ac21ef167250c176acfbd4d13abd86b018e8b1357842d8dc93e53f6b542e9633e1db8672e8", 0x40}], 0x4}}, {{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000380)="df304451b990364b1c6ff9c843eb47125c0a16565b5efbc0494b453f9863364196a743b5d226d34b2293f3b4b8dde4b8434172dec0902f0e03c2893c2bfd5f662eefc2902850a0221d55", 0x200003ca}, {&(0x7f0000000400)}], 0x2, &(0x7f0000000540)=[@ip_tos_u8={{0x11}}, @ip_ttl={{0x14}}, @ip_ttl={{0x14}}, @ip_tos_u8={{0x11}}], 0x60}}], 0x3, 0x0) fcntl$lock(r7, 0x26, &(0x7f0000000840)) fcntl$lock(r0, 0x6, &(0x7f0000000000)) 09:33:12 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0x1e, &(0x7f0000000340)=ANY=[@ANYBLOB="b7020000f7ffffffbfa70000000000002402000020feffff7a0af0fff8ffffff69a4f0ff00000000b70600000018d1fe2d6405000000000075040000000000000704000000000000b7040000100000206a0700fe00000000850000002f000000b70000000a0000009500000000000000e535f8a62fc2868f0399d909a63796c113a80c19aab9d607000000b6cd483be3f0d3253730e711f5969f62c28b22756bedf3cf393d14c46cc4f79fd2b316da4f0de8163f6242fa732300000637c48468766af540439fce41f144631ac262dcae18c3d1a1fbe96dd87235b44174f7c0343185089a0f119e31975e551558055dc2dc"], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) r1 = socket$kcm(0x11, 0x8000000002, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000540)=r0, 0x4) socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r3 = socket(0x0, 0x80002, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000000c0)="080db5055e0bcfe8696071") ioctl$sock_inet6_tcp_SIOCOUTQNSD(r3, 0x894b, &(0x7f0000000100)) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = fcntl$dupfd(r2, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000080)=0x9) 09:33:12 executing program 2: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nvram\x00', 0x6b985871053ad700, 0x0) lstat(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000340)) ioctl$VIDIOC_G_CTRL(r0, 0xc008561b, &(0x7f0000000300)={0xffffffff, 0x9}) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, &(0x7f00000002c0)=0x100) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000040)={@in={{0x2, 0x4e21, @empty}}, 0x0, 0x0, 0x1c, 0x0, "36b8825097944f3e1e0c683fa343de19fc182ee5dd36a6157bf35ac5961205e9f70833446c452a882a069afca4be4cf4736bf7882df27183e4dc19e3fa75d985804290f62f98eeef433de41c69d248b5"}, 0xd8) mount(&(0x7f00000015c0)=ANY=[@ANYBLOB], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:33:12 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f0000000340)=ANY=[@ANYBLOB="b7020000f7ffffffbfa70000000000002402000020feffff7a0af0fff8ffffff69a4f0ff00000000b70600000018d1fe2d6405000000000075040000000000000704000000000000b7040000100000206a0700fe00000000850000002f000000b70000000a0000009500000000000000e535f8a62fc2868f0399d909a63796c113a80c19aab9d607000000b6cd483be3f0d3253730e711f5969f62c28b22756bedf3cf393d14c46cc4f79fd2b316da4f0de8163f6242fa732300000637c48468766af540439fce41f144631ac262dcae18c3d1a1fbe96dd87235b44174f7c0343185089a0f119e31975e551558055dc2dc"], &(0x7f0000000280)='GPL\x00'}, 0x48) r1 = socket$kcm(0x11, 0x8000000002, 0x300) socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000540)=r0, 0x4) syz_emit_ethernet(0x3e, &(0x7f0000000000)={@broadcast, @random="96c1e9574b31", @void, {@ipv4={0x800, @icmp={{0x5, 0x2, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x1, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @local}, @time_exceeded={0xb, 0x0, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local, @multicast2}}}}}}, 0x0) 09:33:12 executing program 4: ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x1) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000140)='./file0\x00', &(0x7f0000000000)='exfat\x00', 0x0, 0x0) 09:33:12 executing program 3: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000080)=ANY=[@ANYBLOB="2355d9da"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1327.076768][T14943] kAFS: Bad value for 'source' 09:33:12 executing program 3: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000080)=ANY=[@ANYBLOB='#'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:33:12 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f00000015c0)=ANY=[@ANYBLOB='#'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(r2, 0x40405515, &(0x7f0000000000)={0x5, 0x1, 0x7, 0x8628, '\x00', 0x401}) 09:33:12 executing program 2: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000040)=ANY=[@ANYRESDEC=0x0], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='pipefs\x00', 0x340d022, 0x0) r0 = socket(0x0, 0x80002, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="080db5055e0bcfe8696071") getsockopt$bt_BT_SECURITY(r0, 0x112, 0x4, &(0x7f0000000080), 0x2) [ 1327.249833][T15213] kAFS: unparsable volume name [ 1327.304147][T15258] kAFS: unparsable volume name [ 1327.341049][T15258] kAFS: unparsable volume name 09:33:12 executing program 3: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000080)=ANY=[@ANYBLOB='#'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:33:12 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f0000000340)=ANY=[@ANYBLOB="b7020000f7ffffffbfa70000000000002402000020feffff7a0af0fff8ffffff69a4f0ff00000000b70600000018d1fe2d6405000000000075040000000000000704000000000000b7040000100000206a0700fe00000000850000002f000000b70000000a0000009500000000000000e535f8a62fc2868f0399d909a63796c113a80c19aab9d607000000b6cd483be3f0d3253730e711f5969f62c28b22756bedf3cf393d14c46cc4f79fd2b316da4f0de8163f6242fa732300000637c48468766af540439fce41f144631ac262dcae18c3d1a1fbe96dd87235b44174f7c0343185089a0f119e31975e551558055dc2dc"], &(0x7f0000000280)='GPL\x00'}, 0x48) r1 = socket$kcm(0x11, 0x8000000002, 0x300) socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000540)=r0, 0x4) syz_emit_ethernet(0x3e, &(0x7f0000000000)={@broadcast, @random="96c1e9574b31", @void, {@ipv4={0x800, @icmp={{0x5, 0x3, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x1, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @local}, @time_exceeded={0xb, 0x0, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local, @multicast2}}}}}}, 0x0) [ 1327.521739][T15467] kAFS: unparsable volume name 09:33:12 executing program 3: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000080)=ANY=[@ANYBLOB='#'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1327.669805][T15562] kAFS: unparsable volume name 09:33:13 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$TIOCGPTLCK(r2, 0x80045439, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = fcntl$dupfd(r3, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) write$FUSE_NOTIFY_DELETE(r5, &(0x7f00000000c0)=ANY=[@ANYBLOB="3b0000000600000000000000000000000500000000000000060000000100000012000000000000006d696d655f747970652473656c696e75783a00"], 0x3b) fcntl$lock(r0, 0x7, &(0x7f0000000840)={0x1}) fcntl$lock(r0, 0x6, &(0x7f0000000000)) 09:33:13 executing program 2: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0x227, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000100)="01", 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r1, r0, r1}, &(0x7f0000000280)=""/250, 0x223, &(0x7f0000000580)={&(0x7f0000000080)={'sha256-generic\x00'}}) keyctl$get_keyring_id(0x0, r1, 0x1) mount(&(0x7f00000015c0)=ANY=[@ANYBLOB='%'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:33:13 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f00000015c0)=ANY=[@ANYBLOB='#'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg$inet(r1, &(0x7f0000000680)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f00000000c0)="5831255624c13e4c563f221188b6be66ea", 0x11}], 0x1}}, {{&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000002c0)=[{&(0x7f0000000040)="70a6b8247e016ae2647a2e703fce46c432e37d1dffd332a793d4b9e3617386d153", 0x21}, {&(0x7f0000000200)="09f96fbf33ceccc10976cd10b1411ee57d092fd5b7f95a0f19f01005f110463ccb2c6ebdb74ad7a7da1a2bed233154886db68984d477ebee11ce9a8e3510d401f6f31ea0a7e3ec1cda7b95f7a02b42753eb4cf0bbf5afbc7084f9bc2603aafe5da6cd54e4d647ec9fd641e4241513aaf23481d1f390bbb83dfae56369f4b03367ccd45f0ec4cd929aed127394157e7b3794500c0c5f88930b1ff50bbae1163c26fff28d06028", 0xa6}, {&(0x7f0000000100)="38d6cd435749d519cc39e90540f37c4f5c6bceef6c4ae07105cafc5e25d9bbfce859670b89666cca0857aa0c2abd8722a9db0caad3905e3ff682", 0x3a}, {&(0x7f0000000140)="d71206abd00e3c0a7e2440673da6a9fc2c1255a9b136bc982a3dc2ac21ef167250c176acfbd4d13abd86b018e8b1357842d8dc93e53f6b542e9633e1db8672e8", 0x40}], 0x4}}, {{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000380)="df304451b990364b1c6ff9c843eb47125c0a16565b5efbc0494b453f9863364196a743b5d226d34b2293f3b4b8dde4b8434172dec0902f0e03c2893c2bfd5f662eefc2902850a0221d55", 0x200003ca}, {&(0x7f0000000400)}], 0x2, &(0x7f0000000540)=[@ip_tos_u8={{0x11}}, @ip_ttl={{0x14}}, @ip_ttl={{0x14}}, @ip_tos_u8={{0x11}}], 0x60}}], 0x3, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000580)={r2, 0x0, 0x1, [0x0]}, 0xa) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000000)={r2, @in6={{0xa, 0x4e23, 0x6, @loopback}}, 0x7, 0x1000, 0x1000, 0x8, 0x1, 0x1, 0x2}, 0x9c) 09:33:13 executing program 3: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000080)=ANY=[@ANYBLOB="2355d9"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:33:13 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f0000000340)=ANY=[@ANYBLOB="b7020000f7ffffffbfa70000000000002402000020feffff7a0af0fff8ffffff69a4f0ff00000000b70600000018d1fe2d6405000000000075040000000000000704000000000000b7040000100000206a0700fe00000000850000002f000000b70000000a0000009500000000000000e535f8a62fc2868f0399d909a63796c113a80c19aab9d607000000b6cd483be3f0d3253730e711f5969f62c28b22756bedf3cf393d14c46cc4f79fd2b316da4f0de8163f6242fa732300000637c48468766af540439fce41f144631ac262dcae18c3d1a1fbe96dd87235b44174f7c0343185089a0f119e31975e551558055dc2dc"], &(0x7f0000000280)='GPL\x00'}, 0x48) r1 = socket$kcm(0x11, 0x8000000002, 0x300) socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000540)=r0, 0x4) syz_emit_ethernet(0x3e, &(0x7f0000000000)={@broadcast, @random="96c1e9574b31", @void, {@ipv4={0x800, @icmp={{0x5, 0x6, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x1, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @local}, @time_exceeded={0xb, 0x0, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local, @multicast2}}}}}}, 0x0) 09:33:13 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0x2080, &(0x7f0000000340)=ANY=[@ANYBLOB="b7020000f7ffffffbfa70000000000002402000020feffff7a0af0fff8ffffff69a4f0ff00000000b70600000018d1fe2d6405000000000075040000000000000704000000000000b7040000100000206a0700fe00000000850000002f000000b70000000a0000009500000000000000e535f8a62fc2868f0399d909a63796c113a80c19aab9d607000000b6cd483be3f0d3253730e711f5969f62c28b22756bedf3cf393d14c46cc4f79fd2b316da4f0de8163f6242fa732300000637c48468766af540439fce41f144631ac262dcae18c3d1a1fbe96dd87235b44174f7c0343185089a0f119e31975e551558055dc2dc"], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000)={0x1}}, 0x48) r1 = socket$kcm(0x11, 0x8000000002, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000540)=r0, 0x4) socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = fcntl$dupfd(r2, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = socket(0x0, 0x80002, 0x0) ioctl(r6, 0x1000008912, &(0x7f00000000c0)="080db5055e0bcfe8696071") getsockopt$inet6_mreq(r6, 0x29, 0x14, &(0x7f00000001c0)={@empty, 0x0}, &(0x7f0000000200)=0x14) r8 = open(0x0, 0x4000, 0x82) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000380)={{{@in6=@remote, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000000180)=0xe8) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000480)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=0x9, 0x0, 0x0, 0x0, &(0x7f00000002c0), 0x0, 0x0, &(0x7f0000000300)={0x3, 0xf, 0xe0000000, 0xfffffe00}, &(0x7f0000000340)=0x80, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000580)=0x5}}, 0xf) r12 = socket(0x0, 0x80002, 0x0) ioctl(r12, 0x1000008912, &(0x7f00000000c0)="080db5055e0bcfe8696071") r13 = socket$alg(0x26, 0x5, 0x0) bind$alg(r13, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r14 = accept4(r13, 0x0, 0x0, 0x0) sendmmsg$inet(r14, &(0x7f0000000680)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f00000000c0)="5831255624c13e4c563f221188b6be66ea", 0x11}], 0x1}}, {{&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000002c0)=[{&(0x7f0000000040)="70a6b8247e016ae2647a2e703fce46c432e37d1dffd332a793d4b9e3617386d153", 0x21}, {&(0x7f0000000200)="09f96fbf33ceccc10976cd10b1411ee57d092fd5b7f95a0f19f01005f110463ccb2c6ebdb74ad7a7da1a2bed233154886db68984d477ebee11ce9a8e3510d401f6f31ea0a7e3ec1cda7b95f7a02b42753eb4cf0bbf5afbc7084f9bc2603aafe5da6cd54e4d647ec9fd641e4241513aaf23481d1f390bbb83dfae56369f4b03367ccd45f0ec4cd929aed127394157e7b3794500c0c5f88930b1ff50bbae1163c26fff28d06028", 0xa6}, {&(0x7f0000000100)="38d6cd435749d519cc39e90540f37c4f5c6bceef6c4ae07105cafc5e25d9bbfce859670b89666cca0857aa0c2abd8722a9db0caad3905e3ff682", 0x3a}, {&(0x7f0000000140)="d71206abd00e3c0a7e2440673da6a9fc2c1255a9b136bc982a3dc2ac21ef167250c176acfbd4d13abd86b018e8b1357842d8dc93e53f6b542e9633e1db8672e8", 0x40}], 0x4}}, {{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000380)="df304451b990364b1c6ff9c843eb47125c0a16565b5efbc0494b453f9863364196a743b5d226d34b2293f3b4b8dde4b8434172dec0902f0e03c2893c2bfd5f662eefc2902850a0221d55", 0x200003ca}, {&(0x7f0000000400)}], 0x2, &(0x7f0000000540)=[@ip_tos_u8={{0x11}}, @ip_ttl={{0x14}}, @ip_ttl={{0x14}}, @ip_tos_u8={{0x11}}], 0x60}}], 0x3, 0x0) r15 = socket$alg(0x26, 0x5, 0x0) bind$alg(r15, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) accept4(r15, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r15, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c81", 0x10) r16 = socket(0x0, 0x80002, 0x0) ioctl(r16, 0x1000008912, &(0x7f00000000c0)="080db5055e0bcfe8696071") bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x6, 0x11, &(0x7f0000000780)=ANY=[@ANYRESOCT, @ANYRES32, @ANYBLOB="0000000000000000182b0000", @ANYBLOB="000000000880000000851000c7f0ffffff181900ff76a3ae26e4b799caa827a73346c130d8bf65f8fc837f47e7b88b6ec9530df2a0935f5aeaaa119f11ff38916691de51d3414be7197eb0f296c7b649", @ANYPTR=&(0x7f00000006c0)=ANY=[@ANYPTR=&(0x7f0000000640)=ANY=[@ANYRES64=r12, @ANYRESOCT=r0, @ANYRESOCT=0x0], @ANYBLOB="90fd4e2fc499aa414c82d51f1c831c95c531697d5b65807f85a63e3401790eeb2440b3f849a1e8a261b0204fb962fb012328128bf79d58de9c789362ad31ee401c8eee9cf118828f8562dc6f4913d3d1fd3466c5f4e4e1", @ANYPTR64=&(0x7f0000000680)=ANY=[@ANYRES64=r8, @ANYRES32=r3, @ANYRESHEX=r10, @ANYRES32=r14, @ANYRES16=r15, @ANYRESHEX=r16]], @ANYBLOB="0000000000000000950000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x26, &(0x7f0000000140)=""/38, 0x41000, 0x5, [], r9, 0x12, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0x7, 0x3}, 0x8, 0x10, &(0x7f00000002c0)={0x0, 0x2, 0x92d, 0xff}, 0x10, r11}, 0x78) r17 = socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r19 = dup(r18) getpeername$packet(r19, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x12) ioctl$sock_inet6_SIOCADDRT(r17, 0x890b, &(0x7f0000000240)={@dev, @ipv4={[0x0, 0x0, 0x8], [], @loopback}, @initdev={0xfe, 0x88, [0xe, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20c200a2, r20}) r21 = syz_open_procfs(0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_QUERY(r21, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000bc0)={0x2f, 0x7, &(0x7f0000000740)=@raw=[@map={0x18, 0x3}, @map_val={0x18, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x4}, @ldst={0x0, 0x2, 0x6, 0x7, 0x2, 0xfffffffffffffff4, 0x8}, @alu={0x4, 0x1, 0x8, 0x1, 0xb, 0x20, 0x10}, @func={0x85, 0x0, 0x1, 0x0, 0x5}], &(0x7f0000000ac0)='GPL\x00', 0x3, 0x9, &(0x7f0000000b00)=""/9, 0x41000, 0xe, [], r20, 0x17, 0xffffffffffffffff, 0x8, &(0x7f0000000b40)={0xa, 0x1}, 0x8, 0x10, &(0x7f0000000b80)={0x5, 0xd, 0x6, 0x5}, 0x10, r11, r21}, 0x78) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000840)={0xffffffffffffffff, 0x10, &(0x7f0000000040)={&(0x7f00000014c0)=""/4096, 0xffffffffffffff82, r11}}, 0x1df) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={r8, 0x10, &(0x7f0000000400)={&(0x7f00000003c0)=""/30, 0x1e, r11}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x2, &(0x7f00000008c0)=ANY=[@ANYRESOCT], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0xbb, &(0x7f00000004c0)=""/187, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x7, 0x0, 0xfffffffe}, 0x10, r11}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x7, &(0x7f0000000000)=@raw=[@call={0x85, 0x0, 0x0, 0x5d}, @exit, @map={0x18, 0x2}, @func={0x85, 0x0, 0x1, 0x0, 0x1}, @map={0x18, 0x6}], &(0x7f0000000040)='syzkaller\x00', 0x10001, 0x0, 0x0, 0x41000, 0x8, [], 0x0, 0x15, 0xffffffffffffffff, 0x8, &(0x7f0000000080)={0x9, 0x2}, 0x8, 0x10, &(0x7f00000000c0)={0x5, 0x6, 0x7fff, 0x7f}, 0x10, r11}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x2a6d69ff9d69a9a, 0x7, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6}, [@generic={0x1f, 0x5, 0x4, 0x7, 0x7}, @initr0={0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x6}, @jmp={0x5, 0x0, 0xa, 0x8, 0x4, 0x40, 0x4}]}, &(0x7f00000000c0)='syzkaller\x00', 0x7517, 0x2f, &(0x7f0000000100)=""/47, 0x41100, 0x2, [], r7, 0xc, r5, 0x8, &(0x7f0000000240)={0x5, 0x5}, 0x8, 0x10, &(0x7f00000002c0)={0x3, 0xc, 0x10000, 0x6}, 0x10, r11, r5}, 0x78) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, &(0x7f0000000600)={0xa00000, 0x7, 0x100, 0xffffffffffffffff, 0x0, &(0x7f00000005c0)={0x990900, 0x17e1, [], @ptr=0x8}}) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') [ 1328.165788][T15683] kAFS: unparsable volume name [ 1328.181391][T15684] kAFS: unparsable volume name [ 1328.214447][T15683] kAFS: unparsable volume name 09:33:13 executing program 3: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000080)=ANY=[@ANYBLOB='#U'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:33:13 executing program 4: mount(&(0x7f00000015c0)=ANY=[@ANYBLOB='#'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:33:13 executing program 2: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000040)=ANY=[@ANYBLOB='%'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000000)='binder\x00', 0x0, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0x227, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000100)="01", 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r1, r0, r1}, &(0x7f0000000280)=""/250, 0x223, &(0x7f0000000580)={&(0x7f0000000080)={'sha256-generic\x00'}}) keyctl$search(0xa, r0, &(0x7f0000000080)='rxrpc_s\x00', &(0x7f00000000c0)={'syz', 0x2}, 0xfffffffffffffff8) 09:33:13 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f0000000340)=ANY=[@ANYBLOB="b7020000f7ffffffbfa70000000000002402000020feffff7a0af0fff8ffffff69a4f0ff00000000b70600000018d1fe2d6405000000000075040000000000000704000000000000b7040000100000206a0700fe00000000850000002f000000b70000000a0000009500000000000000e535f8a62fc2868f0399d909a63796c113a80c19aab9d607000000b6cd483be3f0d3253730e711f5969f62c28b22756bedf3cf393d14c46cc4f79fd2b316da4f0de8163f6242fa732300000637c48468766af540439fce41f144631ac262dcae18c3d1a1fbe96dd87235b44174f7c0343185089a0f119e31975e551558055dc2dc"], &(0x7f0000000280)='GPL\x00'}, 0x48) r1 = socket$kcm(0x11, 0x8000000002, 0x300) socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000540)=r0, 0x4) syz_emit_ethernet(0x3e, &(0x7f0000000000)={@broadcast, @random="96c1e9574b31", @void, {@ipv4={0x800, @icmp={{0x5, 0x8, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x1, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @local}, @time_exceeded={0xb, 0x0, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local, @multicast2}}}}}}, 0x0) 09:33:13 executing program 3: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000080)=ANY=[@ANYBLOB='#'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1328.584702][T16015] kAFS: unparsable volume name 09:33:13 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f0000000340)=ANY=[@ANYBLOB="b7020000f7ffffffbfa70000000000002402000020feffff7a0af0fff8ffffff69a4f0ff00000000b70600000018d1fe2d6405000000000075040000000000000704000000000000b7040000100000206a0700fe00000000850000002f000000b70000000a0000009500000000000000e535f8a62fc2868f0399d909a63796c113a80c19aab9d6070000eeb6cd483be3f0d3253730e711f5969f62c28b22756bedf3cf393d14c46cc4f79fd2b316da4f0de8163f6242fa73230000069aa38468766af540439fce41f144631ac262dcae18c3d1a1fbe96dd87235b44174f7c0343185089a0f119e31975e551558055dc2dc"], &(0x7f0000000280)='GPL\x00'}, 0x48) r1 = socket$kcm(0x11, 0x8000000002, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000540)=r0, 0x4) socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') 09:33:14 executing program 1: r0 = syz_open_dev$audion(&(0x7f0000000080)='/dev/audio#\x00', 0x80, 0x100) ioctl$RTC_AIE_ON(r0, 0x7001) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000588ff8)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) r4 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/pmtu_disc\x00', 0x2, 0x0) ioctl$PIO_FONTRESET(r4, 0x4b6d, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r5 = socket$alg(0x26, 0x5, 0x0) bind$alg(r5, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r6 = accept4(r5, 0x0, 0x0, 0x0) sendmmsg$inet(r6, &(0x7f0000000680)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f00000000c0)="5831255624c13e4c563f221188b6be66ea", 0x11}], 0x1}}, {{&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000002c0)=[{&(0x7f0000000040)="70a6b8247e016ae2647a2e703fce46c432e37d1dffd332a793d4b9e3617386d153", 0x21}, {&(0x7f0000000200)="09f96fbf33ceccc10976cd10b1411ee57d092fd5b7f95a0f19f01005f110463ccb2c6ebdb74ad7a7da1a2bed233154886db68984d477ebee11ce9a8e3510d401f6f31ea0a7e3ec1cda7b95f7a02b42753eb4cf0bbf5afbc7084f9bc2603aafe5da6cd54e4d647ec9fd641e4241513aaf23481d1f390bbb83dfae56369f4b03367ccd45f0ec4cd929aed127394157e7b3794500c0c5f88930b1ff50bbae1163c26fff28d06028", 0xa6}, {&(0x7f0000000100)="38d6cd435749d519cc39e90540f37c4f5c6bceef6c4ae07105cafc5e25d9bbfce859670b89666cca0857aa0c2abd8722a9db0caad3905e3ff682", 0x3a}, {&(0x7f0000000140)="d71206abd00e3c0a7e2440673da6a9fc2c1255a9b136bc982a3dc2ac21ef167250c176acfbd4d13abd86b018e8b1357842d8dc93e53f6b542e9633e1db8672e8", 0x40}], 0x4}}, {{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000380)="df304451b990364b1c6ff9c843eb47125c0a16565b5efbc0494b453f9863364196a743b5d226d34b2293f3b4b8dde4b8434172dec0902f0e03c2893c2bfd5f662eefc2902850a0221d55", 0x200003ca}, {&(0x7f0000000400)}], 0x2, &(0x7f0000000540)=[@ip_tos_u8={{0x11}}, @ip_ttl={{0x14}}, @ip_ttl={{0x14}}, @ip_tos_u8={{0x11}}], 0x60}}], 0x3, 0x0) fcntl$lock(r6, 0x7, &(0x7f0000000840)={0x1, 0x1}) fcntl$lock(r1, 0x6, &(0x7f0000000000)) 09:33:14 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f00000015c0)=ANY=[], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0xf2a912bba32917bd, 0x0) 09:33:14 executing program 3: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000080)=ANY=[@ANYBLOB='#'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:33:14 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f0000000340)=ANY=[@ANYBLOB="b7020000f7ffffffbfa70000000000002402000020feffff7a0af0fff8ffffff69a4f0ff00000000b70600000018d1fe2d6405000000000075040000000000000704000000000000b7040000100000206a0700fe00000000850000002f000000b70000000a0000009500000000000000e535f8a62fc2868f0399d909a63796c113a80c19aab9d607000000b6cd483be3f0d3253730e711f5969f62c28b22756bedf3cf393d14c46cc4f79fd2b316da4f0de8163f6242fa732300000637c48468766af540439fce41f144631ac262dcae18c3d1a1fbe96dd87235b44174f7c0343185089a0f119e31975e551558055dc2dc"], &(0x7f0000000280)='GPL\x00'}, 0x48) r1 = socket$kcm(0x11, 0x8000000002, 0x300) socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000540)=r0, 0x4) syz_emit_ethernet(0x3e, &(0x7f0000000000)={@broadcast, @random="96c1e9574b31", @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x1, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @local}, @time_exceeded={0xb, 0x0, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local, @multicast2}}}}}}, 0x0) 09:33:14 executing program 2: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f00000015c0)=ANY=[@ANYBLOB='%'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x40, 0x0) 09:33:14 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0x1e, &(0x7f0000000340)=ANY=[@ANYBLOB="b7020000f7ffffffbfa70000000000002402000020feffff7a0af0fff8ffffff69a4f0ff00000000b70600000018d1fe2d6405000000000075040000000000000704000000000000b7040000100000206a0700fe00000000850000002f000000b70000000a0000009500000000000000e535f8a62fc2868f0399d909a63796c113a80c19aab9d607000000b6cd483be3f0d3253730e711f5969f62c28b22756bedf3cf393d14c46cc4f79fd2b316da4f0de8163f6242fa732300000637c48468766af540439fce41f144631ac262dcae18c3d1a1fbe96dd87235b44174f7c0343185089a0f119e31975e551558055dc2dc"], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0xa}, 0x10}, 0x78) r1 = socket$kcm(0x11, 0x8000000002, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000540)=r0, 0x4) socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') 09:33:14 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000080)=ANY=[@ANYBLOB="8b03710455ccd987a0023be5e149a8d5c80b2e21cae8b6ece9ebd7c2618fa175584d449bf8adbb"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_ENUMAUDOUT(r0, 0xc0345642, &(0x7f0000000040)={0x10001, "c7f6c0991bb7f569f1a2ebbfa575a2535a9f1b704d82c755a1d505ebe5fc3c5b", 0x3, 0x1}) [ 1329.054724][T16373] kAFS: unparsable volume name [ 1329.055104][T16375] kAFS: unparsable volume name [ 1329.084968][T16373] kAFS: unparsable volume name 09:33:14 executing program 3: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000080)=ANY=[@ANYBLOB='#'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:33:14 executing program 2: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg$inet(r1, &(0x7f0000000680)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f00000000c0)="5831255624c13e4c563f221188b6be66ea", 0x11}], 0x1}}, {{&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000002c0)=[{&(0x7f0000000040)="70a6b8247e016ae2647a2e703fce46c432e37d1dffd332a793d4b9e3617386d153", 0x21}, {&(0x7f0000000200)="09f96fbf33ceccc10976cd10b1411ee57d092fd5b7f95a0f19f01005f110463ccb2c6ebdb74ad7a7da1a2bed233154886db68984d477ebee11ce9a8e3510d401f6f31ea0a7e3ec1cda7b95f7a02b42753eb4cf0bbf5afbc7084f9bc2603aafe5da6cd54e4d647ec9fd641e4241513aaf23481d1f390bbb83dfae56369f4b03367ccd45f0ec4cd929aed127394157e7b3794500c0c5f88930b1ff50bbae1163c26fff28d06028", 0xa6}, {&(0x7f0000000100)="38d6cd435749d519cc39e90540f37c4f5c6bceef6c4ae07105cafc5e25d9bbfce859670b89666cca0857aa0c2abd8722a9db0caad3905e3ff682", 0x3a}, {&(0x7f0000000140)="d71206abd00e3c0a7e2440673da6a9fc2c1255a9b136bc982a3dc2ac21ef167250c176acfbd4d13abd86b018e8b1357842d8dc93e53f6b542e9633e1db8672e8", 0x40}], 0x4}}, {{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000380)="df304451b990364b1c6ff9c843eb47125c0a16565b5efbc0494b453f9863364196a743b5d226d34b2293f3b4b8dde4b8434172dec0902f0e03c2893c2bfd5f662eefc2902850a0221d55", 0x200003ca}, {&(0x7f0000000400)}], 0x2, &(0x7f0000000540)=[@ip_tos_u8={{0x11}}, @ip_ttl={{0x14}}, @ip_ttl={{0x14}}, @ip_tos_u8={{0x11}}], 0x60}}], 0x3, 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x80c, r1) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r2, 0xc0045516, &(0x7f0000000100)=0x5) mount(&(0x7f00000015c0)=ANY=[@ANYBLOB='%'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) mount(&(0x7f0000000000)=@sg0='/dev/sg0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='hostfs\x00', 0x2000804, &(0x7f00000000c0)='afs\x00') r3 = io_uring_setup(0x57e, &(0x7f0000000240)={0x0, 0x0, 0x4, 0x2, 0x18e}) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x4000000, 0x8010, r3, 0x8000000) 09:33:14 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='GPL\x00'}, 0x48) r1 = socket$kcm(0x11, 0x8000000002, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000540)=r0, 0x4) socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = fcntl$dupfd(r2, 0x0, r3) sendmsg$NFNL_MSG_CTHELPER_GET(r4, &(0x7f00000002c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x4242068}, 0xc, &(0x7f0000000100)={&(0x7f0000000340)={0xb4, 0x1, 0x9, 0x20, 0x70bd25, 0x25dfdbfc, {0x3, 0x0, 0x2}, [@NFCTH_TUPLE={0x68, 0x2, [@CTA_TUPLE_IP={0x2c, 0x1, @ipv6={{0x14, 0x3, @ipv4={[], [], @empty}}, {0x14, 0x4, @local}}}, @CTA_TUPLE_IP={0x14, 0x1, @ipv4={{0x8, 0x1, @multicast2}, {0x8, 0x2, @broadcast}}}, @CTA_TUPLE_IP={0x14, 0x1, @ipv4={{0x8, 0x1, @dev={0xac, 0x14, 0x14, 0x2c}}, {0x8, 0x2, @rand_addr=0x2}}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_ZONE={0x6}]}, @NFCTH_QUEUE_NUM={0x8, 0x3, 0x2}, @NFCTH_PRIV_DATA_LEN={0x8, 0x5, 0x19}, @NFCTH_PRIV_DATA_LEN={0x8, 0x5, 0x15}, @NFCTH_QUEUE_NUM={0x8, 0x3, 0x3}, @NFCTH_TUPLE={0x18, 0x2, [@CTA_TUPLE_IP={0x14, 0x1, @ipv4={{0x8, 0x1, @broadcast}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x1, 0x0}}}}]}]}, 0xb4}, 0x1, 0x0, 0x0, 0x40}, 0x8000) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') r5 = socket$phonet(0x23, 0x2, 0x1) socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r7 = socket$inet_udplite(0x2, 0x2, 0x88) r8 = fcntl$dupfd(r6, 0x0, r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) ioctl$VT_RELDISP(r8, 0x5605) ioctl$sock_inet_SIOCSIFPFLAGS(r5, 0x8934, &(0x7f00000000c0)={'team_slave_1\x00'}) r9 = socket(0x0, 0x80002, 0x0) ioctl(r9, 0x1000008912, &(0x7f00000000c0)="080db5055e0bcfe8696071") getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000440)=0xc) r10 = socket$packet(0x11, 0x3, 0x300) getsockopt$bt_hci(r10, 0x0, 0x2, &(0x7f00000001c0)=""/183, &(0x7f0000000400)=0xb7) [ 1329.244795][T16598] kAFS: unparsable volume name 09:33:14 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f0000000340)=ANY=[@ANYBLOB="b7020000f7ffffffbfa70000000000002402000020feffff7a0af0fff8ffffff69a4f0ff00000000b70600000018d1fe2d6405000000000075040000000000000704000000000000b7040000100000206a0700fe00000000850000002f000000b70000000a0000009500000000000000e535f8a62fc2868f0399d909a63796c113a80c19aab9d607000000b6cd483be3f0d3253730e711f5969f62c28b22756bedf3cf393d14c46cc4f79fd2b316da4f0de8163f6242fa732300000637c48468766af540439fce41f144631ac262dcae18c3d1a1fbe96dd87235b44174f7c0343185089a0f119e31975e551558055dc2dc"], &(0x7f0000000280)='GPL\x00'}, 0x48) r1 = socket$kcm(0x11, 0x8000000002, 0x300) socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000540)=r0, 0x4) syz_emit_ethernet(0x3e, &(0x7f0000000000)={@broadcast, @random="96c1e9574b31", @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x2, 0x0, 0x30, 0x0, 0x0, 0x0, 0x1, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @local}, @time_exceeded={0xb, 0x0, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local, @multicast2}}}}}}, 0x0) [ 1329.301470][T16598] kAFS: unparsable volume name [ 1329.316325][T16604] kAFS: unparsable volume name [ 1329.319058][T16643] kAFS: unparsable volume name 09:33:14 executing program 3: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000080)=ANY=[@ANYBLOB='#U'], 0x0, &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:33:14 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000588ff8)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) fcntl$lock(r0, 0x7, &(0x7f0000000840)={0x1}) socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) ioctl$EXT4_IOC_SWAP_BOOT(r3, 0x6611) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) accept4(r4, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r4, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c81", 0x10) shutdown(r4, 0x0) socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r6 = socket$inet_udplite(0x2, 0x2, 0x88) r7 = fcntl$dupfd(r5, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) r8 = socket$alg(0x26, 0x5, 0x0) bind$alg(r8, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r9 = accept4(r8, 0x0, 0x0, 0x0) sendmmsg$inet(r9, &(0x7f0000000680)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f00000000c0)="5831255624c13e4c563f221188b6be66ea", 0x11}], 0x1}}, {{&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000002c0)=[{&(0x7f0000000040)="70a6b8247e016ae2647a2e703fce46c432e37d1dffd332a793d4b9e3617386d153", 0x21}, {&(0x7f0000000200)="09f96fbf33ceccc10976cd10b1411ee57d092fd5b7f95a0f19f01005f110463ccb2c6ebdb74ad7a7da1a2bed233154886db68984d477ebee11ce9a8e3510d401f6f31ea0a7e3ec1cda7b95f7a02b42753eb4cf0bbf5afbc7084f9bc2603aafe5da6cd54e4d647ec9fd641e4241513aaf23481d1f390bbb83dfae56369f4b03367ccd45f0ec4cd929aed127394157e7b3794500c0c5f88930b1ff50bbae1163c26fff28d06028", 0xa6}, {&(0x7f0000000100)="38d6cd435749d519cc39e90540f37c4f5c6bceef6c4ae07105cafc5e25d9bbfce859670b89666cca0857aa0c2abd8722a9db0caad3905e3ff682", 0x3a}, {&(0x7f0000000140)="d71206abd00e3c0a7e2440673da6a9fc2c1255a9b136bc982a3dc2ac21ef167250c176acfbd4d13abd86b018e8b1357842d8dc93e53f6b542e9633e1db8672e8", 0x40}], 0x4}}, {{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000380)="df304451b990364b1c6ff9c843eb47125c0a16565b5efbc0494b453f9863364196a743b5d226d34b2293f3b4b8dde4b8434172dec0902f0e03c2893c2bfd5f662eefc2902850a0221d55", 0x200003ca}, {&(0x7f0000000400)}], 0x2, &(0x7f0000000540)=[@ip_tos_u8={{0x11}}, @ip_ttl={{0x14}}, @ip_ttl={{0x14}}, @ip_tos_u8={{0x11}}], 0x60}}], 0x3, 0x0) ioctl$VIDIOC_TRY_EXT_CTRLS(r7, 0xc0205649, &(0x7f0000000240)={0x9b0000, 0x1, 0x7, r9, 0x0, &(0x7f0000000200)={0xa10001, 0x1, [], @value=0x10001}}) sendmsg$rds(r10, &(0x7f0000001980)={0x0, 0x0, &(0x7f0000000740)=[{&(0x7f0000000280)=""/19, 0x13}, {&(0x7f00000002c0)=""/168, 0xa8}, {&(0x7f0000000380)=""/65, 0x41}, {&(0x7f0000000400)=""/156, 0x9c}, {&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f00000004c0)}, {&(0x7f0000000500)=""/228, 0xe4}, {&(0x7f0000000600)=""/55, 0x37}, {&(0x7f0000000640)=""/236, 0xec}], 0x9, &(0x7f0000001900)=[@rdma_map={0x30, 0x114, 0x3, {{&(0x7f0000001880)=""/72, 0x48}, &(0x7f0000000800), 0x2}}, @zcopy_cookie={0x18, 0x114, 0xc, 0x8}], 0x48, 0x800}, 0x8010) r11 = socket$inet_udplite(0x2, 0x2, 0x88) r12 = fcntl$dupfd(r3, 0x0, r11) ioctl$PERF_EVENT_IOC_ENABLE(r12, 0x8912, 0x400200) write$RDMA_USER_CM_CMD_GET_EVENT(r12, &(0x7f00000001c0)={0xc, 0x8, 0xfa00, {&(0x7f0000000040)}}, 0x10) fcntl$lock(r0, 0x6, &(0x7f0000000000)) 09:33:14 executing program 2: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000100)=ANY=[], &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='afs\x00', 0x0, 0x0) socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x0) 09:33:14 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000000)=0x13, 0x4) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f00000015c0)=ANY=[@ANYBLOB='#'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) exit_group(0x1) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)={&(0x7f0000000040)='./file0\x00', 0x0, 0x4}, 0x10) 09:33:14 executing program 3: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000080)=ANY=[@ANYBLOB='#U'], 0x0, &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:33:14 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f0000000340)=ANY=[@ANYBLOB="b7020000f7ffffffbfa70000000000002402000020feffff7a0af0fff8ffffff69a4f0ff00000000b70600000018d1fe2d6405000000000075040000000000000704000000000000b7040000100000206a0700fe00000000850000002f000000b70000000a0000009500000000000000e535f8a62fc2868f0399d909a63796c113a80c19aab9d607000000b6cd483be3f0d3253730e711f5969f62c28b22756bedf3cf393d14c46cc4f79fd2b316da4f0de8163f6242fa732300000637c48468766af540439fce41f144631ac262dcae18c3d1a1fbe96dd87235b44174f7c0343185089a0f119e31975e551558055dc2dc"], &(0x7f0000000280)='GPL\x00'}, 0x48) r1 = socket$kcm(0x11, 0x8000000002, 0x300) socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000540)=r0, 0x4) syz_emit_ethernet(0x3e, &(0x7f0000000000)={@broadcast, @random="96c1e9574b31", @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x3, 0x0, 0x30, 0x0, 0x0, 0x0, 0x1, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @local}, @time_exceeded={0xb, 0x0, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local, @multicast2}}}}}}, 0x0) 09:33:14 executing program 3: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000080)=ANY=[@ANYBLOB='#U'], 0x0, &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1329.676860][T16944] kAFS: unparsable volume name [ 1329.696764][T16946] kAFS: Bad value for 'source' 09:33:14 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f0000000340)=ANY=[@ANYBLOB="b7020000f7ffffffbfa70000000000002402000020feffff7a0af0fff8ffffff69a4f0ff00000000b70600000018d1fe2d6405000000000075040000000000000704000000000000b7040000100000206a0700fe00000000850000002f000000b70000000a0000009500000000000000e535f8a62fc2868f0399d909a63796c113a80c19aab9d607000000b6cd483be3f0d3253730e711f5969f62c28b22756bedf3cf393d14c46cc4f79fd2b316da4f0de8163f6242fa732300000637c48468766af540439fce41f144631ac262dcae18c3d1a1fbe96dd87235b44174f7c0343185089a0f119e31975e551558055dc2dc"], &(0x7f0000000280)='GPL\x00'}, 0x48) r1 = socket$kcm(0x11, 0x8000000002, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000540)=r0, 0x4) socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') syz_open_dev$vcsu(&(0x7f0000000080)='/dev/vcsu#\x00', 0x1, 0x40001) [ 1329.736881][T16946] kAFS: Bad value for 'source' 09:33:14 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c81", 0x10) mount(&(0x7f0000000240)=ANY=[@ANYRESHEX=r0, @ANYRES64=0x0, @ANYBLOB="f3518cf82dde72d8c4a0ac4d06837a454caddfb17abbf639898eae0f2af8168a4a7814b85906de912a810851dfff714411f3667c486450dd5a4d86c9cd399074dd47a9f96bb50db2efc536a242fdfa0dded0f83e5e117921ddcb0c6046f95061046fcbaf4bb88c4b6975097f3230c89fce072ab86abf4384b771783f0615e8212f667ea0bdf6a0f9c476b0589470dae8288336802e9b5683541a15bf9a0fa4df69029b1a99fe27283dbbfe184b04b47b", @ANYRESDEC, @ANYRESOCT=0x0], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x4000, 0x0) [ 1329.864136][T17159] kAFS: unparsable volume name 09:33:15 executing program 2: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f00000015c0)=ANY=[@ANYBLOB='\x00'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:33:15 executing program 3: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000080)=ANY=[@ANYBLOB='#U'], &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) 09:33:15 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f0000000340)=ANY=[@ANYBLOB="b7020000f7ffffffbfa70000000000002402000020feffff7a0af0fff8ffffff69a4f0ff00000000b70600000018d1fe2d6405000000000075040000000000000704000000000000b7040000100000206a0700fe00000000850000002f000000b70000000a0000009500000000000000e535f8a62fc2868f0399d909a63796c113a80c19aab9d607000000b6cd483be3f0d3253730e711f5969f62c28b22756bedf3cf393d14c46cc4f79fd2b316da4f0de8163f6242fa732300000637c48468766af540439fce41f144631ac262dcae18c3d1a1fbe96dd87235b44174f7c0343185089a0f119e31975e551558055dc2dc"], &(0x7f0000000280)='GPL\x00'}, 0x48) r1 = socket$kcm(0x11, 0x8000000002, 0x300) socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000540)=r0, 0x4) syz_emit_ethernet(0x3e, &(0x7f0000000000)={@broadcast, @random="96c1e9574b31", @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x1, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @local}, @time_exceeded={0xb, 0x0, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local, @multicast2}}}}}}, 0x0) 09:33:15 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f0000000340)=ANY=[@ANYBLOB="b7020000f7ffffffbfa70000000000002402000020feffff7a0af0fff8ffffff69a4f0ff00000000b70600000018d1fe2d6405000000000075040000000000000704000000000000b7040000100000206a0700fe00000000850000002f000000b70000000a0000009500000000000000e535f8a62fc2868f0399d909a63796c113a80c19aab9d607000000b6cd483be3f0d3253730e711f5969f62c28b22756bedf3cf393d14c46cc4f79fd2b316da4f0de8163f6242fa732300000637c48468766af540439fce41f144631ac262dcae18c3d1a1fbe96dd87235b44174f7c0343185089a0f119e31975e551558055dc2dc"], &(0x7f0000000280)='GPL\x00'}, 0x48) r1 = socket$kcm(0x11, 0x8000000002, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000540)=r0, 0x4) socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r5 = accept4(r4, 0x0, 0x0, 0x0) sendmmsg$inet(r5, &(0x7f0000000680)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f00000000c0)="5831255624c13e4c563f221188b6be66ea", 0x11}], 0x1}}, {{&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000002c0)=[{&(0x7f0000000040)="70a6b8247e016ae2647a2e703fce46c432e37d1dffd332a793d4b9e3617386d153", 0x21}, {&(0x7f0000000200)="09f96fbf33ceccc10976cd10b1411ee57d092fd5b7f95a0f19f01005f110463ccb2c6ebdb74ad7a7da1a2bed233154886db68984d477ebee11ce9a8e3510d401f6f31ea0a7e3ec1cda7b95f7a02b42753eb4cf0bbf5afbc7084f9bc2603aafe5da6cd54e4d647ec9fd641e4241513aaf23481d1f390bbb83dfae56369f4b03367ccd45f0ec4cd929aed127394157e7b3794500c0c5f88930b1ff50bbae1163c26fff28d06028", 0xa6}, {&(0x7f0000000100)="38d6cd435749d519cc39e90540f37c4f5c6bceef6c4ae07105cafc5e25d9bbfce859670b89666cca0857aa0c2abd8722a9db0caad3905e3ff682", 0x3a}, {&(0x7f0000000140)="d71206abd00e3c0a7e2440673da6a9fc2c1255a9b136bc982a3dc2ac21ef167250c176acfbd4d13abd86b018e8b1357842d8dc93e53f6b542e9633e1db8672e8", 0x40}], 0x4}}, {{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000380)="df304451b990364b1c6ff9c843eb47125c0a16565b5efbc0494b453f9863364196a743b5d226d34b2293f3b4b8dde4b8434172dec0902f0e03c2893c2bfd5f662eefc2902850a0221d55", 0x200003ca}, {&(0x7f0000000400)}], 0x2, &(0x7f0000000540)=[@ip_tos_u8={{0x11}}, @ip_ttl={{0x14}}, @ip_ttl={{0x14}}, @ip_tos_u8={{0x11}}], 0x60}}], 0x3, 0x0) setsockopt$inet_opts(r5, 0x0, 0x1adeba0c8d0c2a8e, &(0x7f00000009c0)="b41cf548c7ffca0ac4ce643ef85f49fc5ce9cdf482111c0a6eabfc8b6882fcf3e1bda1d586668dc135630e22601ade5757410ea342bf27c3538cc7b332907ea108b79a5b5f336d03fe8cbb847e3ebdb34e9a9990ea5611ae1b788ba83a5d7377cfa7b0d1428af2f39bdb6fd10904adfc641868f976550bf042f2e98ecd1b8e0b7934827afb506702f16bd411ac8b79a826e31e0de9916514f537ab7f56f191f94dfa42fbf1022d83927c4e95032ce109eac98863e96c9fbfcc1ad544b1cf474fbbf4cfa8c69b510d1c61052a0cde23dc9aa4c5450111d7d6201b83a63af05d2de6aae45113b11d8b9ed84fc01b8a4a", 0xef) r6 = fcntl$dupfd(r2, 0x0, r3) socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r8 = socket$inet_udplite(0x2, 0x2, 0x88) r9 = fcntl$dupfd(r7, 0x0, r8) socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r11 = socket$inet_udplite(0x2, 0x2, 0x88) r12 = fcntl$dupfd(r10, 0x0, r11) ioctl$PERF_EVENT_IOC_ENABLE(r12, 0x8912, 0x400200) ioctl$SNDRV_RAWMIDI_IOCTL_PARAMS(r12, 0xc0305710, &(0x7f0000000080)={0x0, 0x7fffffff, 0x7fff}) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) sendmsg$rds(r6, &(0x7f00000008c0)={&(0x7f00000000c0)={0x2, 0x4e23, @local}, 0x10, &(0x7f0000000780)=[{&(0x7f00000001c0)=""/187, 0xbb}, {&(0x7f00000002c0)=""/73, 0x49}, {&(0x7f0000000100)=""/47, 0x2f}, {&(0x7f0000000900)=""/183, 0xb7}, {&(0x7f0000000500)}, {&(0x7f0000000580)=""/241, 0xf1}, {&(0x7f0000000680)=""/246, 0xf6}], 0x7, &(0x7f0000000880)=[@rdma_map={0x30, 0x114, 0x3, {{&(0x7f0000000500)=""/25, 0x19}, &(0x7f0000000840), 0x11}}], 0x30, 0x8000}, 0x8000800) socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r14 = socket$inet_udplite(0x2, 0x2, 0x88) r15 = fcntl$dupfd(r13, 0x0, r14) ioctl$PERF_EVENT_IOC_ENABLE(r15, 0x8912, 0x400200) setsockopt$IP_VS_SO_SET_FLUSH(r6, 0x0, 0x485, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r15, 0x8912, 0x8) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') [ 1330.058089][T17267] kAFS: Bad value for 'source' 09:33:15 executing program 2: mkdir(&(0x7f0000000200)='./file1\x00', 0x110) mount(&(0x7f00000015c0)=ANY=[@ANYBLOB='%'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:33:15 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x20) mount(&(0x7f00000015c0)=ANY=[@ANYBLOB='#'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:33:15 executing program 3: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000080)=ANY=[@ANYBLOB='#U'], &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) 09:33:15 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='GPL\x00'}, 0x48) r1 = socket$kcm(0x11, 0x8000000002, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000540)=r0, 0x4) socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vhost-vsock\x00', 0x2, 0x0) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = socket(0x0, 0x80002, 0x0) ioctl(r5, 0x1000008912, &(0x7f00000000c0)="080db5055e0bcfe8696071") fcntl$F_GET_FILE_RW_HINT(r5, 0x40d, &(0x7f00000000c0)) r6 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000100)='/dev/btrfs-control\x00', 0x123200, 0x0) mq_getsetattr(r6, &(0x7f00000001c0)={0xb4a, 0x9, 0x0, 0x1}, &(0x7f0000000200)) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') 09:33:15 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f0000000340)=ANY=[@ANYBLOB="b7020000f7ffffffbfa70000000000002402000020feffff7a0af0fff8ffffff69a4f0ff00000000b70600000018d1fe2d6405000000000075040000000000000704000000000000b7040000100000206a0700fe00000000850000002f000000b70000000a0000009500000000000000e535f8a62fc2868f0399d909a63796c113a80c19aab9d607000000b6cd483be3f0d3253730e711f5969f62c28b22756bedf3cf393d14c46cc4f79fd2b316da4f0de8163f6242fa732300000637c48468766af540439fce41f144631ac262dcae18c3d1a1fbe96dd87235b44174f7c0343185089a0f119e31975e551558055dc2dc"], &(0x7f0000000280)='GPL\x00'}, 0x48) r1 = socket$kcm(0x11, 0x8000000002, 0x300) socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000540)=r0, 0x4) syz_emit_ethernet(0x3e, &(0x7f0000000000)={@broadcast, @random="96c1e9574b31", @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x2, 0x30, 0x0, 0x0, 0x0, 0x1, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @local}, @time_exceeded={0xb, 0x0, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local, @multicast2}}}}}}, 0x0) 09:33:15 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000588ff8)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) fcntl$lock(r0, 0x7, &(0x7f0000000840)={0x1}) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00') socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = fcntl$dupfd(r4, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$TIOCSBRK(r6, 0x5427) r7 = socket(0x0, 0x80002, 0x0) ioctl(r7, 0x1000008912, &(0x7f00000000c0)="080db5055e0bcfe8696071") accept4$packet(r7, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000100)=0x14, 0x100800) r9 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r9, &(0x7f0000000180), 0x10) socketpair(0x3, 0xa, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$packet_buf(r11, 0x107, 0xd, &(0x7f0000000340)=""/114, &(0x7f00000003c0)=0x72) getpeername$packet(r10, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000100)=0x14) sendmsg$can_bcm(r9, &(0x7f00000002c0)={&(0x7f0000000140)={0x1d, r12}, 0x10, &(0x7f0000000280)={&(0x7f0000000200)={0x0, 0x0, 0x0, {0x0, 0x2710}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "55e19dc0c30616da"}}, 0x48}}, 0x0) sendmsg$NL80211_CMD_GET_MESH_CONFIG(r2, &(0x7f0000000200)={&(0x7f0000000040), 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x68, r3, 0x100, 0x70bd2a, 0x25dfdbfe, {}, [@NL80211_ATTR_WIPHY={0x8, 0x1, 0x2}, @NL80211_ATTR_WIPHY={0x8}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x40a4, 0x3}}, @NL80211_ATTR_IFINDEX={0x8, 0x3, r8}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x5}}, @NL80211_ATTR_IFINDEX={0x8, 0x3, r12}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x2}}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x3}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x3}]}, 0x68}, 0x1, 0x0, 0x0, 0x4008090}, 0x1) fcntl$lock(r0, 0x6, &(0x7f0000000000)) 09:33:15 executing program 2: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg$inet(r1, &(0x7f0000000680)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f00000000c0)="5831255624c13e4c563f221188b6be66ea", 0x11}], 0x1}}, {{&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000002c0)=[{&(0x7f0000000040)="70a6b8247e016ae2647a2e703fce46c432e37d1dffd332a793d4b9e3617386d153", 0x21}, {&(0x7f0000000200)="09f96fbf33ceccc10976cd10b1411ee57d092fd5b7f95a0f19f01005f110463ccb2c6ebdb74ad7a7da1a2bed233154886db68984d477ebee11ce9a8e3510d401f6f31ea0a7e3ec1cda7b95f7a02b42753eb4cf0bbf5afbc7084f9bc2603aafe5da6cd54e4d647ec9fd641e4241513aaf23481d1f390bbb83dfae56369f4b03367ccd45f0ec4cd929aed127394157e7b3794500c0c5f88930b1ff50bbae1163c26fff28d06028", 0xa6}, {&(0x7f0000000100)="38d6cd435749d519cc39e90540f37c4f5c6bceef6c4ae07105cafc5e25d9bbfce859670b89666cca0857aa0c2abd8722a9db0caad3905e3ff682", 0x3a}, {&(0x7f0000000140)="d71206abd00e3c0a7e2440673da6a9fc2c1255a9b136bc982a3dc2ac21ef167250c176acfbd4d13abd86b018e8b1357842d8dc93e53f6b542e9633e1db8672e8", 0x40}], 0x4}}, {{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000380)="df304451b990364b1c6ff9c843eb47125c0a16565b5efbc0494b453f9863364196a743b5d226d34b2293f3b4b8dde4b8434172dec0902f0e03c2893c2bfd5f662eefc2902850a0221d55", 0x200003ca}, {&(0x7f0000000400)}], 0x2, &(0x7f0000000540)=[@ip_tos_u8={{0x11}}, @ip_ttl={{0x14}}, @ip_ttl={{0x14}}, @ip_tos_u8={{0x11}}], 0x60}}], 0x3, 0x0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') r3 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vsock\x00', 0x0, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r3, 0x7706, &(0x7f0000000400)) r4 = socket(0x0, 0x80002, 0x0) ioctl(r4, 0x1000008912, &(0x7f00000000c0)="080db5055e0bcfe8696071") getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r4, 0x84, 0x72, &(0x7f0000000440)={0x0, 0x18, 0x20}, &(0x7f0000000480)=0xc) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r3, 0x84, 0xf, &(0x7f00000005c0)={r5, @in6={{0xa, 0x4e22, 0x6, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x401}}, 0x3, 0xab1f, 0x4, 0x101, 0x8001}, &(0x7f00000004c0)=0x98) sendmsg$IPVS_CMD_FLUSH(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x890080}, 0xc, &(0x7f0000000080)={&(0x7f0000000240)={0xdc, r2, 0x1, 0x70bd26, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x2}, @IPVS_CMD_ATTR_SERVICE={0x24, 0x1, [@IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0xfffff2a4}, @IPVS_SVC_ATTR_AF={0x6, 0x1, 0x2}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x8}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x9}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8}, @IPVS_CMD_ATTR_DAEMON={0x24, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @initdev={0xac, 0x1e, 0x1, 0x0}}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x3}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x6, 0x7, 0x4e22}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x6, 0x4, 0x40}]}, @IPVS_CMD_ATTR_DAEMON={0x58, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @dev={0xac, 0x14, 0x14, 0x1c}}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x6, 0x7, 0x4e21}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x5, 0x8, 0x20}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x6, 0x4, 0x2e9}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'bridge0\x00'}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @local}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x6, 0x4, 0x1f}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x3}]}, 0xdc}, 0x1, 0x0, 0x0, 0x4080409}, 0x40854) mount(&(0x7f0000000740)=ANY=[@ANYBLOB="84e9f4ea48a5cc366f48e025"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1330.452369][T17495] kAFS: unparsable volume name 09:33:15 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x20) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vsock\x00', 0x2040, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000580)={r1, 0x0, 0x1, [0x0]}, 0xa) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00000001c0)={r1, 0x3f, 0x6, [0x800, 0x2, 0x8, 0x6, 0x1, 0x4]}, 0x14) socketpair(0x1330621a89215c14, 0x7e9abea48fd559f0, 0x1, &(0x7f0000000000)={0xffffffffffffffff}) accept$phonet_pipe(r2, &(0x7f0000000040), &(0x7f0000000080)=0x10) mount(&(0x7f0000000100)=ANY=[@ANYBLOB='#'], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x10080, 0x0) 09:33:15 executing program 3: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000080)=ANY=[@ANYBLOB='#U'], &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) 09:33:15 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f0000000340)=ANY=[@ANYBLOB="b7020000f7ffffffbfa70000000000002402000020feffff7a0af0fff8ffffff69a4f0ff00000000b70600000018d1fe2d6405000000000075040000000000000704000000000000b7040000100000206a0700fe00000000850000002f000000b70000000a0000009500000000000000e535f8a62fc2868f0399d909a63796c113a80c19aab9d607000000b6cd483be3f0d3253730e711f5969f62c28b22756bedf3cf393d14c46cc4f79fd2b316da4f0de8163f6242fa732300000637c48468766af540439fce41f144631ac262dcae18c3d1a1fbe96dd87235b44174f7c0343185089a0f119e31975e551558055dc2dc"], &(0x7f0000000280)='GPL\x00'}, 0x48) r1 = socket$kcm(0x11, 0x8000000002, 0x300) socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000540)=r0, 0x4) syz_emit_ethernet(0x3e, &(0x7f0000000000)={@broadcast, @random="96c1e9574b31", @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x3, 0x30, 0x0, 0x0, 0x0, 0x1, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @local}, @time_exceeded={0xb, 0x0, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local, @multicast2}}}}}}, 0x0) [ 1330.613725][T17602] Unknown ioctl 30470 [ 1330.616321][T17605] kAFS: unparsable volume name 09:33:15 executing program 3: r0 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyprintk\x00', 0x40000, 0x0) ioctl$VT_WAITACTIVE(r0, 0x5607) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) membarrier(0x40, 0x0) 09:33:15 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f0000000340)=ANY=[@ANYBLOB="b7020000f7ffffffbfa70000000000002402000020feffff7a0af0fff8ffffff69a4f0ff00000000b70600000018d1fe2d6405000000000075040000000000000704000000000000b7040000100000206a0700fe00000000850000002f000000b70000000a0000009500000000000000e535f8a62fc2868f0399d909a63796c113a80c19aab9d607000000b6cd483be3f0d3253730e711f5969f62c28b22756bedf3cf393d14c46cc4f79fd2b316da4f0de8163f6242fa732300000637c48468766af540439fce41f144631ac262dcae18c3d1a1fbe96dd87235b44174f7c0343185089a0f119e31975e551558055dc2dc"], &(0x7f0000000280)='GPL\x00'}, 0x48) r1 = socket$kcm(0x11, 0x8000000002, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000540)=r0, 0x4) socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r3 = socket$inet_udplite(0x2, 0x2, 0x88) socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = fcntl$dupfd(r4, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$NS_GET_PARENT(r6, 0xb702, 0x0) r7 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ioctl$VIDIOC_SUBDEV_G_DV_TIMINGS(r6, 0xc0845658, &(0x7f0000000080)={0x0, @bt={0x3ff, 0x6, 0x0, 0x2, 0x7, 0xf39, 0x0, 0x5, 0x6, 0x3, 0x7f, 0xfffffffc, 0x7, 0x0, 0x4, 0x8, {0x8, 0x1}, 0x1, 0x7f}}) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') 09:33:15 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_HAS_DEVICE_ATTR(r2, 0x4018aee3, &(0x7f0000000040)={0x0, 0x2929, 0x4, &(0x7f0000000000)=0x7}) mount(&(0x7f00000015c0)=ANY=[@ANYBLOB='#'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:33:16 executing program 2: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f00000015c0)=ANY=[@ANYBLOB='%'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg$inet(r1, &(0x7f0000000680)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f00000000c0)="5831255624c13e4c563f221188b6be66ea", 0x11}], 0x1}}, {{&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000002c0)=[{&(0x7f0000000040)="70a6b8247e016ae2647a2e703fce46c432e37d1dffd332a793d4b9e3617386d153", 0x21}, {&(0x7f0000000200)="09f96fbf33ceccc10976cd10b1411ee57d092fd5b7f95a0f19f01005f110463ccb2c6ebdb74ad7a7da1a2bed233154886db68984d477ebee11ce9a8e3510d401f6f31ea0a7e3ec1cda7b95f7a02b42753eb4cf0bbf5afbc7084f9bc2603aafe5da6cd54e4d647ec9fd641e4241513aaf23481d1f390bbb83dfae56369f4b03367ccd45f0ec4cd929aed127394157e7b3794500c0c5f88930b1ff50bbae1163c26fff28d06028", 0xa6}, {&(0x7f0000000100)="38d6cd435749d519cc39e90540f37c4f5c6bceef6c4ae07105cafc5e25d9bbfce859670b89666cca0857aa0c2abd8722a9db0caad3905e3ff682", 0x3a}, {&(0x7f0000000140)="d71206abd00e3c0a7e2440673da6a9fc2c1255a9b136bc982a3dc2ac21ef167250c176acfbd4d13abd86b018e8b1357842d8dc93e53f6b542e9633e1db8672e8", 0x40}], 0x4}}, {{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000380)="df304451b990364b1c6ff9c843eb47125c0a16565b5efbc0494b453f9863364196a743b5d226d34b2293f3b4b8dde4b8434172dec0902f0e03c2893c2bfd5f662eefc2902850a0221d55", 0x200003ca}, {&(0x7f0000000400)}], 0x2, &(0x7f0000000540)=[@ip_tos_u8={{0x11}}, @ip_ttl={{0x14}}, @ip_ttl={{0x14}}, @ip_tos_u8={{0x11}}], 0x60}}], 0x3, 0x0) connect$unix(r1, &(0x7f0000000040)=@abs={0x1, 0x0, 0x4e24}, 0x6e) r2 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000480)='/dev/dlm-monitor\x00', 0x100, 0x0) r3 = syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000500)='NLBL_CALIPSO\x00') sendmsg$NLBL_CALIPSO_C_ADD(r2, &(0x7f0000000600)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000005c0)={&(0x7f0000000540)={0x44, r3, 0x10, 0x70bd2d, 0x25dfdbfc, {}, [@NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x6}, @NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_DOI={0x8}, @NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x1}, @NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x2}, @NLBL_CALIPSO_A_MTYPE={0x8}]}, 0x44}, 0x1, 0x0, 0x0, 0x20000020}, 0x80) r4 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x20000) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r4, 0x84, 0x7c, &(0x7f00000001c0)={0x0, 0x438, 0x5}, 0x8) socket$bt_rfcomm(0x1f, 0x1, 0x3) [ 1330.947690][T17924] kAFS: unparsable volume name 09:33:16 executing program 3: r0 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyprintk\x00', 0x40000, 0x0) ioctl$VT_WAITACTIVE(r0, 0x5607) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) membarrier(0x40, 0x0) 09:33:16 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f0000000340)=ANY=[@ANYBLOB="b7020000f7ffffffbfa70000000000002402000020feffff7a0af0fff8ffffff69a4f0ff00000000b70600000018d1fe2d6405000000000075040000000000000704000000000000b7040000100000206a0700fe00000000850000002f000000b70000000a0000009500000000000000e535f8a62fc2868f0399d909a63796c113a80c19aab9d607000000b6cd483be3f0d3253730e711f5969f62c28b22756bedf3cf393d14c46cc4f79fd2b316da4f0de8163f6242fa732300000637c48468766af540439fce41f144631ac262dcae18c3d1a1fbe96dd87235b44174f7c0343185089a0f119e31975e551558055dc2dc"], &(0x7f0000000280)='GPL\x00'}, 0x48) r1 = socket$kcm(0x11, 0x8000000002, 0x300) socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000540)=r0, 0x4) syz_emit_ethernet(0x3e, &(0x7f0000000000)={@broadcast, @random="96c1e9574b31", @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x4, 0x30, 0x0, 0x0, 0x0, 0x1, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @local}, @time_exceeded={0xb, 0x0, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local, @multicast2}}}}}}, 0x0) [ 1330.988300][T17960] kAFS: unparsable volume name 09:33:16 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000000)=ANY=[@ANYBLOB="0045bbcd3b66fa2e5ffb79d872ab4d7937c2281ba4706d4ed9c21e21911ff308d55d5a9235d1db6b1876a96e4a7de995b56b168e21d4d80623e04591cbcbb59a1dbe6def28895d3e399c56d64e3468da499899a9550b8a0a8ac437719a4919ce24fc78311b409b4907630cd1312955b8d2f56d14fc"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$SNDCTL_DSP_GETODELAY(r2, 0x80045017, &(0x7f0000000080)) ioctl$KVM_SET_CPUID2(r2, 0x4008ae90, &(0x7f0000000240)={0x4, 0x0, [{0x0, 0x1ff, 0x6, 0x27, 0x0, 0x5, 0x7}, {0xc0000000, 0x3272, 0x1, 0x1, 0x1f, 0x7}, {0x4, 0xfffffffa, 0x0, 0x9, 0x4, 0x9, 0xa6eb}, {0x80000019, 0xdb4c, 0x5, 0x6, 0x2, 0x9, 0x8}]}) [ 1331.112122][T17960] kAFS: unparsable volume name [ 1331.146866][T18073] kAFS: Bad value for 'source' [ 1331.161218][T18073] kAFS: Bad value for 'source' 09:33:16 executing program 1 (fault-call:1 fault-nth:0): mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000080)=ANY=[@ANYBLOB='#U'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:33:16 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0x1e, &(0x7f0000000340)=ANY=[@ANYBLOB="b7020000f7ffffffbfa70000000000002402000020feffff7a0af0fff8ffffff69a4f0ff00000000b70600000018d1fe2d6405000000000075040000000000000704000000000000b7040000100000206a0700fe00000000850000002f000000b70000000a0000009500000000000000e535f8a62fc2868f0399d909a63796c113a80c19aab9d607000000b6cd483be3f0d3253730e711f5969f62c28b22756bedf3cf393d14c46cc4f79fd2b316da4f0de8163f6242fa732300000637c48468766af540439fce41f144631ac262dcae18c3d1a1fbe96dd87235b44174f7c0343185089a0f119e31975e551558055dc2dc"], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x8}, 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) r1 = socket$kcm(0x11, 0x8000000002, 0x300) r2 = socket(0x0, 0x80002, 0x0) ioctl(r2, 0x1000008912, &(0x7f00000000c0)="080db5055e0bcfe8696071") r3 = openat$vsock(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vsock\x00', 0x8000, 0x0) ioctl$sock_bt_bnep_BNEPGETCONNLIST(r3, 0x800442d2, &(0x7f0000000200)={0x8, &(0x7f0000000440)=[{0x0, 0x0, 0x0, @remote}, {0x0, 0x0, 0x0, @random}, {0x0, 0x0, 0x0, @broadcast}, {0x0, 0x0, 0x0, @broadcast}, {}, {}, {}, {0x0, 0x0, 0x0, @random}]}) r4 = accept4(r2, 0x0, &(0x7f00000000c0), 0xc00) bind$inet(r4, &(0x7f0000000100)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000540)=r0, 0x4) socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) ioctl$FS_IOC_GETVERSION(r0, 0x80087601, &(0x7f0000000080)) r6 = socket$inet_udplite(0x2, 0x2, 0x88) r7 = fcntl$dupfd(r5, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') 09:33:16 executing program 2: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000080)={0x1, 0x9, 0x4, 0x400, 0x5, {}, {0x2, 0x1, 0x6, 0xfc, 0x1f, 0xe, "c658e1bb"}, 0x4, 0x1, @userptr=0x5, 0x2, 0x0, 0xffffffffffffffff}) sendto$unix(r0, &(0x7f0000000100)="0d3dfb7963424a1006bb642c2c2065fb1a0e2d27aa7621f77e1740b269bd94264364ffeec307e21212b3", 0x2a, 0x20000, &(0x7f0000000240)=@file={0x0, './file0\x00'}, 0x6e) mount(&(0x7f0000000000)=ANY=[@ANYBLOB="000000857f0f415a57bde152d12515ee0b40ef486fc77a07c951659aead9890ad7d7690ff2b5e6918e1a0afe8a0c9ba285e78a488d286b5ce21b82a1613b14992131d6964a9332bf1d4c130154664826d62806c7e55092a2a3d09e55cdf6000000000000000000"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:33:16 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x20) mount(&(0x7f00000015c0)=ANY=[@ANYBLOB='#'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:33:16 executing program 3: r0 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyprintk\x00', 0x40000, 0x0) ioctl$VT_WAITACTIVE(r0, 0x5607) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) membarrier(0x40, 0x0) 09:33:16 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f0000000340)=ANY=[@ANYBLOB="b7020000f7ffffffbfa70000000000002402000020feffff7a0af0fff8ffffff69a4f0ff00000000b70600000018d1fe2d6405000000000075040000000000000704000000000000b7040000100000206a0700fe00000000850000002f000000b70000000a0000009500000000000000e535f8a62fc2868f0399d909a63796c113a80c19aab9d607000000b6cd483be3f0d3253730e711f5969f62c28b22756bedf3cf393d14c46cc4f79fd2b316da4f0de8163f6242fa732300000637c48468766af540439fce41f144631ac262dcae18c3d1a1fbe96dd87235b44174f7c0343185089a0f119e31975e551558055dc2dc"], &(0x7f0000000280)='GPL\x00'}, 0x48) r1 = socket$kcm(0x11, 0x8000000002, 0x300) socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000540)=r0, 0x4) syz_emit_ethernet(0x3e, &(0x7f0000000000)={@broadcast, @random="96c1e9574b31", @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x6, 0x30, 0x0, 0x0, 0x0, 0x1, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @local}, @time_exceeded={0xb, 0x0, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local, @multicast2}}}}}}, 0x0) [ 1331.442086][T18551] kAFS: Bad value for 'source' [ 1331.469264][T18558] kAFS: unparsable volume name 09:33:16 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={r0, 0xc0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=0x4, 0x0, 0x0, 0x0, &(0x7f0000000080)={0x2, 0x2}, 0x0, 0x0, &(0x7f00000000c0)={0x0, 0x2, 0x2, 0x9}, &(0x7f0000000100)=0x9, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=0x3}}, 0x10) mount(&(0x7f0000000380)=ANY=[@ANYBLOB="23949caac83e578201fcf5e48513f84a3b41143f2a6be83f098c42d05db66fa89c43c386f1bbb610326238a976fafa165a55e904a8406a6032b9f3f5d47d68f29161a87544e136b5b3d2363e7c27b88f8782645b9f65eea5a83eddf88b8a02a178373fbaac8ba120bb195cf670064e7ff6b10325fd29a7dcbe7a63ac45d7b85aaa4d38"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$UI_ABS_SETUP(r3, 0x401c5504, &(0x7f0000000340)={0x101, {0x10000, 0x7fff, 0x101, 0x8, 0x81, 0xff}}) [ 1331.506590][T18563] Unknown ioctl -2147204398 09:33:16 executing program 3: r0 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyprintk\x00', 0x40000, 0x0) ioctl$VT_WAITACTIVE(r0, 0x5607) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:33:16 executing program 2: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000000)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1331.635089][T18563] Unknown ioctl -2147204398 09:33:16 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f0000000340)=ANY=[@ANYBLOB="b7020000f7ffffffbfa70000000000002402000020feffff7a0af0fff8ffffff69a4f0ff00000000b70600000018d1fe2d6405000000000075040000000000000704000000000000b7040000100000206a0700fe00000000850000002f000000b70000000a0000009500000000000000e535f8a62fc2868f0399d909a63796c113a80c19aab9d607000000b6cd483be3f0d3253730e711f5969f62c28b22756bedf3cf393d14c46cc4f79fd2b316da4f0de8163f6242fa732300000637c48468766af540439fce41f144631ac262dcae18c3d1a1fbe96dd87235b44174f7c0343185089a0f119e31975e551558055dc2dc"], &(0x7f0000000280)='GPL\x00'}, 0x48) r1 = socket$kcm(0x11, 0x8000000002, 0x300) socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000540)=r0, 0x4) syz_emit_ethernet(0x3e, &(0x7f0000000000)={@broadcast, @random="96c1e9574b31", @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x7, 0x30, 0x0, 0x0, 0x0, 0x1, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @local}, @time_exceeded={0xb, 0x0, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local, @multicast2}}}}}}, 0x0) 09:33:16 executing program 5: r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x80080, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=0xeade, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x6, 0x5}, 0x0, 0x0, &(0x7f00000001c0)={0x5, 0xf, 0x200, 0x9}, &(0x7f0000000200)=0x800, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=0x41}}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x6, 0x176, &(0x7f0000000300)=ANY=[@ANYRES32], &(0x7f0000000280)='GPL\x00', 0x0, 0xffffff42, 0x0, 0x0, 0x0, [], 0x0, 0x10, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10, r1, r0}, 0x5) r3 = socket$kcm(0x11, 0x8000000002, 0x300) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000540)=r2, 0x4) socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = fcntl$dupfd(r4, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') 09:33:16 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f00000015c0)=ANY=[@ANYBLOB='#'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x400, 0x0) ioctl$KVM_GET_PIT2(r0, 0x8070ae9f, &(0x7f0000000040)) [ 1331.728183][T18875] kAFS: unparsable volume name [ 1331.809649][T18875] kAFS: unparsable volume name [ 1331.886721][T18885] kAFS: unparsable volume name [ 1331.915626][T18885] kAFS: unparsable volume name [ 1332.074805][T19095] FAULT_INJECTION: forcing a failure. [ 1332.074805][T19095] name failslab, interval 1, probability 0, space 0, times 0 [ 1332.088269][T19095] CPU: 0 PID: 19095 Comm: syz-executor.1 Not tainted 5.5.0-rc5-syzkaller #0 [ 1332.096944][T19095] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1332.107116][T19095] Call Trace: [ 1332.110423][T19095] dump_stack+0x197/0x210 [ 1332.114763][T19095] should_fail.cold+0xa/0x15 [ 1332.119356][T19095] ? fault_create_debugfs_attr+0x180/0x180 [ 1332.125171][T19095] ? ___might_sleep+0x163/0x2c0 [ 1332.130029][T19095] __should_failslab+0x121/0x190 [ 1332.134988][T19095] should_failslab+0x9/0x14 [ 1332.139476][T19095] __kmalloc_track_caller+0x2dc/0x760 [ 1332.144834][T19095] ? fput+0x1b/0x20 [ 1332.148635][T19095] ? ksys_write+0x1cf/0x290 [ 1332.153144][T19095] ? strndup_user+0x77/0xd0 [ 1332.157630][T19095] memdup_user+0x26/0xd0 [ 1332.161868][T19095] strndup_user+0x77/0xd0 [ 1332.166208][T19095] __x64_sys_mount+0xe9/0x230 [ 1332.170885][T19095] do_syscall_64+0xfa/0x790 [ 1332.175387][T19095] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1332.181355][T19095] RIP: 0033:0x45af49 [ 1332.185254][T19095] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1332.204959][T19095] RSP: 002b:00007fd0b6990c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1332.213384][T19095] RAX: ffffffffffffffda RBX: 00007fd0b6990c90 RCX: 000000000045af49 09:33:17 executing program 1 (fault-call:1 fault-nth:1): mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000080)=ANY=[@ANYBLOB='#U'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:33:17 executing program 3: r0 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyprintk\x00', 0x40000, 0x0) ioctl$VT_WAITACTIVE(r0, 0x5607) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:33:17 executing program 2: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000000)=ANY=[@ANYRESHEX], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x2034400, 0x0) 09:33:17 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='GPL\x00'}, 0x48) r1 = socket$kcm(0x11, 0x8000000002, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000540)=r0, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') 09:33:17 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000000)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:33:17 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f0000000340)=ANY=[@ANYBLOB="b7020000f7ffffffbfa70000000000002402000020feffff7a0af0fff8ffffff69a4f0ff00000000b70600000018d1fe2d6405000000000075040000000000000704000000000000b7040000100000206a0700fe00000000850000002f000000b70000000a0000009500000000000000e535f8a62fc2868f0399d909a63796c113a80c19aab9d607000000b6cd483be3f0d3253730e711f5969f62c28b22756bedf3cf393d14c46cc4f79fd2b316da4f0de8163f6242fa732300000637c48468766af540439fce41f144631ac262dcae18c3d1a1fbe96dd87235b44174f7c0343185089a0f119e31975e551558055dc2dc"], &(0x7f0000000280)='GPL\x00'}, 0x48) r1 = socket$kcm(0x11, 0x8000000002, 0x300) socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000540)=r0, 0x4) syz_emit_ethernet(0x3e, &(0x7f0000000000)={@broadcast, @random="96c1e9574b31", @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x8, 0x30, 0x0, 0x0, 0x0, 0x1, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @local}, @time_exceeded={0xb, 0x0, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local, @multicast2}}}}}}, 0x0) [ 1332.221362][T19095] RDX: 0000000020000180 RSI: 0000000020000140 RDI: 0000000020000080 [ 1332.229326][T19095] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1332.237576][T19095] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd0b69916d4 [ 1332.245529][T19095] R13: 00000000004c8583 R14: 00000000004e06a8 R15: 0000000000000003 09:33:17 executing program 3: r0 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyprintk\x00', 0x40000, 0x0) ioctl$VT_WAITACTIVE(r0, 0x5607) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="2398c593a2303d8df8dc1623f67a060de466e34712df232157116a41dc2b323a699adc0101000000000000ed28515f9ece02c8d482f01d5ee1523b4de13cbe74cc4004a437d127ec8a6b6fcd768b1d1eb28add2c402848f743907236000d5d0a12aca1a89ade47fba48469ea95b6c67196ce16118cea061d52d0284271d4d462c25c00000000000000000000000000b3efc93293ccdfb945d02fa5cf51f1bd043d2954e65d63a6d11d19ae177067e98ea7ce784f6c76f4c7d635995144bc5090cab944aa7927506a6a50048f0962436f6cbd975bc0a0d6866b8929d024c496eef336065aa75e242f38f8bc37964bcf57373afca7cec2a60a3c5ee4dfdfab7563b25f0838ea9555db12ef74cd842fe30df1c977e482af48ce0ccfdb6a7c153670c9e96d3d58d82ef834bc888416be1c566833c4227692e6f12fbdb12921dbf983efb7c378b66b1b7f3911cda7e7d7bf947364ba89985dc56f1d7015dec8e1b1be9af868d6c8ce196ad5eeb9827a42157f57476554cd73932ae79a8ba370158ece8c89c7f597"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1332.323233][T19105] kAFS: unparsable volume name 09:33:17 executing program 2: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f00000015c0)=ANY=[@ANYBLOB='%'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) r0 = msgget(0x0, 0x20) msgctl$MSG_INFO(r0, 0xc, &(0x7f0000000000)=""/121) 09:33:17 executing program 4: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/snat_reroute\x00', 0x2, 0x0) ioctl$MON_IOCX_GET(r0, 0x40189206, &(0x7f0000000100)={&(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @iso}, &(0x7f0000000080)=""/73, 0x49}) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f00000015c0)=ANY=[@ANYBLOB='#'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:33:17 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f0000000340)=ANY=[@ANYBLOB="b7020000f7ffffffbfa70000000000002402000020feffff7a0af0fff8ffffff69a4f0ff00000000b70600000018d1fe2d6405000000000075040000000000000704000000000000b7040000100000206a0700fe00000000850000002f000000b70000000a0000009500000000000000e535f8a62fc2868f0399d909a63796c113a80c19aab9d607000000b6cd483be3f0d3253730e711f5969f62c28b22756bedf3cf393d14c46cc4f79fd2b316da4f0de8163f6242fa732300000637c48468766af540439fce41f144631ac262dcae18c3d1a1fbe96dd87235b44174f7c0343185089a0f119e31975e551558055dc2dc"], &(0x7f0000000280)='GPL\x00'}, 0x48) r1 = socket$kcm(0x11, 0x8000000002, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000540)=r0, 0x4) socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') pipe2(&(0x7f0000000080), 0x4000) 09:33:17 executing program 3: r0 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyprintk\x00', 0x40000, 0x0) ioctl$VT_WAITACTIVE(r0, 0x5607) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1332.547164][T19220] kAFS: unparsable volume name [ 1332.563620][T19219] kAFS: unparsable volume name 09:33:17 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f0000000340)=ANY=[@ANYBLOB="b7020000f7ffffffbfa70000000000002402000020feffff7a0af0fff8ffffff69a4f0ff00000000b70600000018d1fe2d6405000000000075040000000000000704000000000000b7040000100000206a0700fe00000000850000002f000000b70000000a0000009500000000000000e535f8a62fc2868f0399d909a63796c113a80c19aab9d607000000b6cd483be3f0d3253730e711f5969f62c28b22756bedf3cf393d14c46cc4f79fd2b316da4f0de8163f6242fa732300000637c48468766af540439fce41f144631ac262dcae18c3d1a1fbe96dd87235b44174f7c0343185089a0f119e31975e551558055dc2dc"], &(0x7f0000000280)='GPL\x00'}, 0x48) r1 = socket$kcm(0x11, 0x8000000002, 0x300) socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000540)=r0, 0x4) syz_emit_ethernet(0x3e, &(0x7f0000000000)={@broadcast, @random="96c1e9574b31", @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0xb, 0x30, 0x0, 0x0, 0x0, 0x1, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @local}, @time_exceeded={0xb, 0x0, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local, @multicast2}}}}}}, 0x0) [ 1332.594325][T19220] kAFS: unparsable volume name [ 1332.798441][T19437] FAULT_INJECTION: forcing a failure. [ 1332.798441][T19437] name failslab, interval 1, probability 0, space 0, times 0 [ 1332.811488][T19437] CPU: 0 PID: 19437 Comm: syz-executor.1 Not tainted 5.5.0-rc5-syzkaller #0 [ 1332.820166][T19437] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1332.830226][T19437] Call Trace: [ 1332.833520][T19437] dump_stack+0x197/0x210 [ 1332.837855][T19437] should_fail.cold+0xa/0x15 [ 1332.842440][T19437] ? fault_create_debugfs_attr+0x180/0x180 [ 1332.848250][T19437] ? ___might_sleep+0x163/0x2c0 [ 1332.853118][T19437] __should_failslab+0x121/0x190 [ 1332.858111][T19437] should_failslab+0x9/0x14 [ 1332.862605][T19437] __kmalloc_track_caller+0x2dc/0x760 [ 1332.867979][T19437] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1332.874230][T19437] ? strndup_user+0x77/0xd0 [ 1332.878784][T19437] memdup_user+0x26/0xd0 [ 1332.883016][T19437] strndup_user+0x77/0xd0 [ 1332.887333][T19437] __x64_sys_mount+0x132/0x230 [ 1332.892097][T19437] do_syscall_64+0xfa/0x790 [ 1332.896693][T19437] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1332.902568][T19437] RIP: 0033:0x45af49 [ 1332.906451][T19437] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1332.926060][T19437] RSP: 002b:00007fd0b6990c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1332.934483][T19437] RAX: ffffffffffffffda RBX: 00007fd0b6990c90 RCX: 000000000045af49 09:33:18 executing program 1 (fault-call:1 fault-nth:2): mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000080)=ANY=[@ANYBLOB='#U'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:33:18 executing program 5: ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, &(0x7f00000001c0)={0xf010008, 0x5, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000100)={0x9c0909, 0x6, [], @p_u32=&(0x7f00000000c0)=0x9}}) ioctl$KVM_GET_DEVICE_ATTR(r0, 0x4018aee2, &(0x7f0000001600)={0x0, 0x400, 0x1, &(0x7f0000000400)=0x3}) socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x13, 0x2, &(0x7f0000001840)=ANY=[@ANYBLOB="c18607830a97eb4c57511778714cbe089d4e56e66cfa53ce186a21000f694994560e96d29c49accb1ce31fb19db561433e7f6c8fe620bcf0d8dc9777ed48fdb9ece32e8c43ca92e0e4068a26747d151091904b255ba779d8afcb322434292062a253797f24e561bfe4"], &(0x7f0000000280)='GPL\x00', 0x4, 0x36f, 0x0, 0x0, 0x2, [], 0x0, 0x7, r0, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000080)={0x3, 0x0, 0x0, 0x3}, 0x10, 0x0, r3}, 0x78) r5 = socket$kcm(0x11, 0x8000000002, 0x300) setsockopt$sock_attach_bpf(r5, 0x1, 0x32, &(0x7f0000000540)=r4, 0x4) socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r7 = socket$inet_udplite(0x2, 0x2, 0x88) r8 = fcntl$dupfd(r6, 0x0, r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) ioctl$TUNSETFILTEREBPF(r8, 0x800454e1, &(0x7f0000000240)=r0) socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r10 = socket$alg(0x26, 0x5, 0x0) bind$alg(r10, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r12 = socket$inet_udplite(0x2, 0x2, 0x88) r13 = fcntl$dupfd(r11, 0x0, r12) ioctl$PERF_EVENT_IOC_ENABLE(r13, 0x8912, 0x400200) ioctl$VIDIOC_TRY_EXT_CTRLS(r13, 0xc0205649, &(0x7f0000001780)={0x718000, 0x80000000, 0x1, r8, 0x0, &(0x7f0000001740)={0x9a091b, 0x8000, [], @p_u8=&(0x7f0000001700)=0x3}}) accept4(r10, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r10, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c81", 0x10) r14 = syz_open_dev$media(&(0x7f0000001640)='/dev/media#\x00', 0xfff, 0x80040) getsockopt$bt_BT_SNDMTU(r14, 0x112, 0xc, &(0x7f0000001680)=0x7fff, &(0x7f00000016c0)=0x2) sendmsg$sock(r10, &(0x7f00000015c0)={0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f00000002c0)="38a58aa1bd25570ac6a0f727eb106f4d067e320957738a35079f428b6c873e2fde9be0573db509557caca60486f3a2a73a6bb347b21aa08ee136f4a52edefc665d3267a931f9a2ad657e532c97320984ce59f8c63d50eeca49048d17ec46d7a8bdc7dcac9afc0f014550f32e7465bf824205c42da9bec0c9c631fa3d9cb1498daadc43b14d9028bd87d3add37ee88cf3bc5a19de832beb5be46f30b525453eb8505beec86058fc39dea6f2bd6dedb0ae776b3ac126162ea1d3b8bb57f3f244c4", 0xc0}, {&(0x7f0000000380)="73c21f40048cc8fb47948207acd3febd22fc057dcf8a2a1473a5c5c8a4cce4ccc3b7dd570151f34d8faf014595b16071a6eb08a2b26a510bc8537b024bce8e7fd348e395ed812146a909bad1", 0x4c}, {&(0x7f0000000400)}, {&(0x7f0000000580)="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", 0x1000}, {&(0x7f0000000440)="686ef3098fbd63b98dd5b12555d4cf0ca1a0caf550db8e6425cfde34788e9c94bc27d77645ffc2108e7bfc6d5f5db8b496d5af6541", 0x35}, {&(0x7f0000000480)="6e8fa245a161b64a98907bcb72144bbc55e2f830e7a2eb7654ae0abc417120cbfae19787bb15", 0x26}], 0x6, &(0x7f0000001580)=[@mark={{0x14, 0x1, 0x24, 0xfff}}, @timestamping={{0x14, 0x1, 0x25, 0x200}}], 0x30}, 0x800) r15 = socket$inet_udplite(0x2, 0x2, 0x88) r16 = fcntl$dupfd(r9, 0x0, r15) ioctl$PERF_EVENT_IOC_ENABLE(r16, 0x8912, 0x400200) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') 09:33:18 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) socket$tipc(0x1e, 0x2, 0x0) 09:33:18 executing program 3: openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyprintk\x00', 0x40000, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:33:18 executing program 2: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f00000015c0)=ANY=[@ANYBLOB='%'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x110000, 0x0) [ 1332.942469][T19437] RDX: 0000000020000180 RSI: 0000000020000140 RDI: 0000000020000080 [ 1332.950475][T19437] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1332.958459][T19437] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd0b69916d4 [ 1332.966446][T19437] R13: 00000000004c8583 R14: 00000000004e06a8 R15: 0000000000000003 09:33:18 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f0000000340)=ANY=[@ANYBLOB="b7020000f7ffffffbfa70000000000002402000020feffff7a0af0fff8ffffff69a4f0ff00000000b70600000018d1fe2d6405000000000075040000000000000704000000000000b7040000100000206a0700fe00000000850000002f000000b70000000a0000009500000000000000e535f8a62fc2868f0399d909a63796c113a80c19aab9d607000000b6cd483be3f0d3253730e711f5969f62c28b22756bedf3cf393d14c46cc4f79fd2b316da4f0de8163f6242fa732300000637c48468766af540439fce41f144631ac262dcae18c3d1a1fbe96dd87235b44174f7c0343185089a0f119e31975e551558055dc2dc"], &(0x7f0000000280)='GPL\x00'}, 0x48) r1 = socket$kcm(0x11, 0x8000000002, 0x300) socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000540)=r0, 0x4) syz_emit_ethernet(0x3e, &(0x7f0000000000)={@broadcast, @random="96c1e9574b31", @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x11, 0x30, 0x0, 0x0, 0x0, 0x1, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @local}, @time_exceeded={0xb, 0x0, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local, @multicast2}}}}}}, 0x0) 09:33:18 executing program 2: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) setsockopt$TIPC_DEST_DROPPABLE(0xffffffffffffffff, 0x10f, 0x81, &(0x7f0000000000)=0x8, 0x4) mount(&(0x7f00000015c0)=ANY=[@ANYBLOB='%'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:33:18 executing program 3: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1333.140644][T19554] kAFS: unparsable volume name 09:33:18 executing program 3: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="2398c593a2303d8df8dc1623f67a060de466e34712df232157116a41dc2b323a699adc0101000000000000ed28515f9ece02c8d482f01d5ee1523b4de13cbe74cc4004a437d127ec8a6b6fcd768b1d1eb28add2c402848f743907236000d5d0a12aca1a89ade47fba48469ea95b6c67196ce16118cea061d52d0284271d4d462c25c00000000000000000000000000b3efc93293ccdfb945d02fa5cf51f1bd043d2954e65d63a6d11d19ae177067e98ea7ce784f6c76f4c7d635995144bc5090cab944aa7927506a6a50048f0962436f6cbd975bc0a0d6866b8929d024c496eef336065aa75e242f38f8bc37964bcf57373afca7cec2a60a3c5ee4dfdfab7563b25f0838ea9555db12ef74cd842fe30df1c977e482af48ce0ccfdb6a7c153670c9e96d3d58d82ef834bc888416be1c566833c4227692e6f12fbdb12921dbf983efb7c378b66b1b7f3911cda7e7d7bf947364ba89985dc56f1d7015dec8e1b1be9af868d6c8ce196ad5eeb9827a42157f57476554cd73932ae79a8ba370158ece8c89c7f597"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:33:18 executing program 5: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x1, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) sendmmsg$inet(r2, &(0x7f0000000680)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f00000000c0)="5831255624c13e4c563f221188b6be66ea", 0x11}], 0x1}}, {{&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000002c0)=[{&(0x7f0000000040)="70a6b8247e016ae2647a2e703fce46c432e37d1dffd332a793d4b9e3617386d153", 0x21}, {&(0x7f0000000200)="09f96fbf33ceccc10976cd10b1411ee57d092fd5b7f95a0f19f01005f110463ccb2c6ebdb74ad7a7da1a2bed233154886db68984d477ebee11ce9a8e3510d401f6f31ea0a7e3ec1cda7b95f7a02b42753eb4cf0bbf5afbc7084f9bc2603aafe5da6cd54e4d647ec9fd641e4241513aaf23481d1f390bbb83dfae56369f4b03367ccd45f0ec4cd929aed127394157e7b3794500c0c5f88930b1ff50bbae1163c26fff28d06028", 0xa6}, {&(0x7f0000000100)="38d6cd435749d519cc39e90540f37c4f5c6bceef6c4ae07105cafc5e25d9bbfce859670b89666cca0857aa0c2abd8722a9db0caad3905e3ff682", 0x3a}, {&(0x7f0000000140)="d71206abd00e3c0a7e2440673da6a9fc2c1255a9b136bc982a3dc2ac21ef167250c176acfbd4d13abd86b018e8b1357842d8dc93e53f6b542e9633e1db8672e8", 0x40}], 0x4}}, {{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000380)="df304451b990364b1c6ff9c843eb47125c0a16565b5efbc0494b453f9863364196a743b5d226d34b2293f3b4b8dde4b8434172dec0902f0e03c2893c2bfd5f662eefc2902850a0221d55", 0x200003ca}, {&(0x7f0000000400)}], 0x2, &(0x7f0000000540)=[@ip_tos_u8={{0x11}}, @ip_ttl={{0x14}}, @ip_ttl={{0x14}}, @ip_tos_u8={{0x11}}], 0x60}}], 0x3, 0x0) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r2, 0x84, 0x20, &(0x7f00000000c0), &(0x7f0000000100)=0x4) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f0000000340)=ANY=[@ANYBLOB="b7020000f7ffffffbfa70000080000002402000020feffff7a0af0fff8ffffff69a4f0ff00000000b70600000018d16f2d6405000000000075040000000000000704000000000000b7040000100000206a0700fe00000000850000002f000000b70000000a0000009500000000000000e535f8a62fc2868f0399d909a63796c113a80c19aab9d607000000b6cd483be3f0d3253730e711f5969f62c28b22756bedf3cf393d14c46cc4f79fd2b316da4f0de8163f6242fa732300000637c48468766af540439fce41f144631ac262dcae18c3d1a1fbe96dd87235b44174f7c0343185089a0f119e31975e551558055dc2dc"], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0xffffffff}, 0x0, 0x10, &(0x7f0000000000), 0x203, 0x0, r0}, 0x48) r4 = socket$kcm(0x11, 0x8000000002, 0x300) setsockopt$sock_attach_bpf(r4, 0x1, 0x32, &(0x7f0000000540)=r3, 0x4) socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r6 = socket$inet_udplite(0x2, 0x2, 0x88) r7 = fcntl$dupfd(r5, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') 09:33:18 executing program 2: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000000)=ANY=[@ANYBLOB="4488f7024c5e9ba31b0b7a862b21"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1333.376074][T19737] kAFS: unparsable volume name 09:33:18 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f00000015c0)=ANY=[@ANYBLOB='#'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) accept4(r3, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c81", 0x10) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc058560f, &(0x7f0000000000)={0x8, 0xb, 0x4, 0x40000, 0x6c8, {}, {0x1, 0x1, 0x0, 0x74, 0x3, 0x7, "f5932bb2"}, 0xc93, 0x3, @fd=r2, 0x1c00, 0x0, r3}) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCFLSH(r5, 0x8910, 0x0) r6 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r6, 0x5423, &(0x7f0000000000)=0x6) ioctl$TCFLSH(r6, 0x8910, 0x0) r7 = dup2(r5, r6) r8 = syz_genetlink_get_family_id$team(&(0x7f00000000c0)='team\x00') socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000380)={0xffffffffffffffff}) r10 = fcntl$dupfd(r9, 0x0, r9) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) getsockopt$inet6_IPV6_IPSEC_POLICY(r10, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@empty, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6}}, &(0x7f0000000280)=0xe8) r12 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r12, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r12, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, r13, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$TEAM_CMD_PORT_LIST_GET(r7, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000002c0)={0x60, r8, 0x8, 0x70bd2b, 0x25dfdbfc, {}, [{{0x8, 0x1, r11}, {0x44, 0x2, [{0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r13}}, {0x8}}}]}}]}, 0x60}, 0x1, 0x0, 0x0, 0x6f92a2c59184ece0}, 0x4000) r14 = socket(0x0, 0x80002, 0x0) ioctl(r14, 0x1000008912, &(0x7f00000000c0)="080db5055e0bcfe8696071") ioctl$ifreq_SIOCGIFINDEX_team(r14, 0x8933, &(0x7f00000000c0)={'team0\x00', 0x0}) r16 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x2, 0x0) write$cgroup_pid(r16, 0x0, 0x0) r17 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r17, &(0x7f0000000180), 0x10) socketpair(0x8000000000001e, 0x805, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) getpeername$packet(r18, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000100)=0x14) sendmsg$can_bcm(r17, &(0x7f00000002c0)={&(0x7f0000000140)={0x1d, r19}, 0x10, &(0x7f0000000280)={&(0x7f0000000200)={0x0, 0x0, 0x0, {0x0, 0x2710}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "55e19dc0c30616da"}}, 0x48}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r16, 0x8933, &(0x7f00000007c0)={'vxcan1\x00', r19}) r20 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCFLSH(r20, 0x8910, 0x0) r21 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r21, 0x5423, &(0x7f0000000000)=0x6) ioctl$TCFLSH(r21, 0x8910, 0x0) r22 = dup2(r20, r21) r23 = syz_genetlink_get_family_id$team(&(0x7f00000000c0)='team\x00') socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000380)={0xffffffffffffffff}) r25 = fcntl$dupfd(r24, 0x0, r24) ioctl$PERF_EVENT_IOC_ENABLE(r25, 0x8912, 0x400200) getsockopt$inet6_IPV6_IPSEC_POLICY(r25, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@empty, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6}}, &(0x7f0000000280)=0xe8) r27 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r27, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r27, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, r28, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$TEAM_CMD_PORT_LIST_GET(r22, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000002c0)={0x60, r23, 0x8, 0x70bd2b, 0x25dfdbfb, {}, [{{0x8, 0x1, r26}, {0x44, 0x2, [{0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x5}, {0x8, 0x4, r28}}, {0x8}}}]}}]}, 0x60}, 0x1, 0x0, 0x0, 0x6f92a2c59184ece0}, 0x4000) r29 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCFLSH(r29, 0x8910, 0x0) r30 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r30, 0x5423, &(0x7f0000000000)=0x6) ioctl$TCFLSH(r30, 0x8910, 0x0) r31 = dup2(r29, r30) r32 = syz_genetlink_get_family_id$team(&(0x7f00000000c0)='team\x00') socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000380)={0xffffffffffffffff}) r34 = fcntl$dupfd(r33, 0x0, r33) ioctl$PERF_EVENT_IOC_ENABLE(r34, 0x8912, 0x400200) getsockopt$inet6_IPV6_IPSEC_POLICY(r34, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@empty, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6}}, &(0x7f0000000280)=0xe8) r36 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r36, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r36, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, r37, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$TEAM_CMD_PORT_LIST_GET(r31, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000002c0)={0x60, r32, 0x8, 0x70bd2b, 0x25dfdbfc, {}, [{{0x8, 0x1, r35}, {0x44, 0x2, [{0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r37}}, {0x8}}}]}}]}, 0x60}, 0x1, 0x0, 0x0, 0x6f92a2c59184ece0}, 0x4000) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'team0\x00', r37}) r39 = socket$alg(0x26, 0x5, 0x0) bind$alg(r39, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r40 = accept4(r39, 0x0, 0x0, 0x0) sendmmsg$inet(r40, &(0x7f0000000680)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f00000000c0)="5831255624c13e4c563f221188b6be66ea", 0x11}], 0x1}}, {{&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000002c0)=[{&(0x7f0000000040)="70a6b8247e016ae2647a2e703fce46c432e37d1dffd332a793d4b9e3617386d153", 0x21}, {&(0x7f0000000200)="09f96fbf33ceccc10976cd10b1411ee57d092fd5b7f95a0f19f01005f110463ccb2c6ebdb74ad7a7da1a2bed233154886db68984d477ebee11ce9a8e3510d401f6f31ea0a7e3ec1cda7b95f7a02b42753eb4cf0bbf5afbc7084f9bc2603aafe5da6cd54e4d647ec9fd641e4241513aaf23481d1f390bbb83dfae56369f4b03367ccd45f0ec4cd929aed127394157e7b3794500c0c5f88930b1ff50bbae1163c26fff28d06028", 0xa6}, {&(0x7f0000000100)="38d6cd435749d519cc39e90540f37c4f5c6bceef6c4ae07105cafc5e25d9bbfce859670b89666cca0857aa0c2abd8722a9db0caad3905e3ff682", 0x3a}, {&(0x7f0000000140)="d71206abd00e3c0a7e2440673da6a9fc2c1255a9b136bc982a3dc2ac21ef167250c176acfbd4d13abd86b018e8b1357842d8dc93e53f6b542e9633e1db8672e8", 0x40}], 0x4}}, {{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000380)="df304451b990364b1c6ff9c843eb47125c0a16565b5efbc0494b453f9863364196a743b5d226d34b2293f3b4b8dde4b8434172dec0902f0e03c2893c2bfd5f662eefc2902850a0221d55", 0x200003ca}, {&(0x7f0000000400)}], 0x2, &(0x7f0000000540)=[@ip_tos_u8={{0x11}}, @ip_ttl={{0x14}}, @ip_ttl={{0x14}}, @ip_tos_u8={{0x11}}], 0x60}}], 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r40, 0x8933, &(0x7f0000000380)={'vxcan1\x00'}) r41 = socket(0x0, 0x80002, 0x0) ioctl(r41, 0x1000008912, &(0x7f00000000c0)="080db5055e0bcfe8696071") getsockopt$inet_IP_IPSEC_POLICY(r41, 0x0, 0x10, &(0x7f0000000e00)={{{@in6=@initdev, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@ipv4={[], [], @loopback}}}, &(0x7f0000000640)=0xc8a83e4dbe453101) recvmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000d80)={&(0x7f00000009c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x80, &(0x7f0000000d40)=[{&(0x7f0000000a40)=""/246, 0xf6}, {&(0x7f0000000b40)=""/244, 0xf4}, {&(0x7f0000000c40)=""/34, 0x22}, {&(0x7f0000000c80)=""/187, 0xbb}], 0x4}, 0x40) r44 = socket(0x0, 0x80002, 0x0) ioctl(r44, 0x1000008912, &(0x7f00000000c0)="080db5055e0bcfe8696071") ioctl$ifreq_SIOCGIFINDEX_team(r44, 0x8933, &(0x7f0000000dc0)={'team0\x00'}) r45 = socket(0x0, 0x80002, 0x0) ioctl(r45, 0x1000008912, &(0x7f00000000c0)="080db5055e0bcfe8696071") getsockopt$inet_mreqn(r45, 0x0, 0x20, &(0x7f0000000f00)={@remote, @broadcast}, &(0x7f0000000f40)=0xc) r46 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r46, &(0x7f0000000180), 0x10) socketpair(0x8000000000001e, 0x805, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) getpeername$packet(r47, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000100)=0x14) sendmsg$can_bcm(r46, &(0x7f00000002c0)={&(0x7f0000000140)={0x1d, r48}, 0x10, &(0x7f0000000280)={&(0x7f0000000200)=ANY=[@ANYBLOB, @ANYRES64=0x0, @ANYRES64=0x2710, @ANYRES64=0x0, @ANYRES64=0x0, @ANYBLOB="0000000001000000000000000000000055e19dc0c30616da"], 0x48}}, 0x0) r49 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r49, &(0x7f0000000180), 0x10) socketpair(0x8000000000001e, 0x805, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) getpeername$packet(r50, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000100)=0x14) sendmsg$can_bcm(r49, &(0x7f00000002c0)={&(0x7f0000000140)={0x1d, r51}, 0x10, &(0x7f0000000280)={&(0x7f0000000200)={0x0, 0x0, 0x0, {0x0, 0x2710}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "55e19dc0c30616da"}}, 0x48}}, 0x0) sendmsg$TEAM_CMD_NOOP(r4, &(0x7f00000012c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0xd2}, 0xc, &(0x7f0000001280)={&(0x7f0000001900)={0x2f0, r8, 0x200, 0x70bd2c, 0x25dfdbfe, {}, [{{0x8, 0x1, r15}, {0x60, 0x2, [{0x5c, 0x1, @bpf_hash_func={{0xffffffffffffff5e, 0x1, 'bpf_hash_func\x00'}, {0x5}, {0x2c, 0x4, [{0x573, 0xfa, 0x20, 0x7}, {0x5, 0x81, 0x0, 0x7fffffff}, {0x5, 0x2, 0x28, 0x6f}, {0x8, 0x5c, 0x7, 0x20000000}, {0x836f, 0x9, 0x3f, 0x9}]}}}]}}, {{0x8, 0x1, r19}, {0x16c, 0x2, [{0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x5}, {0x8, 0x4, 0x7f}}, {0x8, 0x6, r28}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x5}, {0x8, 0x4, 0x3f}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x5}, {0x8, 0x4, 0x86}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x5}, {0x8, 0x4, 0x1}}, {0x8, 0x6, r38}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0xfffffffffffffd2e}, {0x8}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x5}, {0x8, 0x4, 0x81}}}]}}, {{0x8, 0x1, r42}, {0xf8, 0x2, [{0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x5}, {0x8, 0x4, r43}}}, {0x3c, 0x1, @lb_tx_hash_to_port_mapping={{{0x0, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {}, {0x0, 0x4, r51}}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x5}, {0x8, 0x4, 0x100}}, {0x8}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x5}, {0x8, 0x4, r48}}, {0x8}}}]}}]}, 0x2f0}, 0x1, 0x0, 0x0, 0x10000}, 0x0) [ 1333.485507][T19779] kAFS: unparsable volume name [ 1333.718484][T19789] FAULT_INJECTION: forcing a failure. [ 1333.718484][T19789] name failslab, interval 1, probability 0, space 0, times 0 [ 1333.732165][T19789] CPU: 0 PID: 19789 Comm: syz-executor.1 Not tainted 5.5.0-rc5-syzkaller #0 [ 1333.741035][T19789] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1333.751105][T19789] Call Trace: [ 1333.754409][T19789] dump_stack+0x197/0x210 [ 1333.758761][T19789] should_fail.cold+0xa/0x15 [ 1333.763403][T19789] ? fault_create_debugfs_attr+0x180/0x180 [ 1333.769233][T19789] ? ___might_sleep+0x163/0x2c0 [ 1333.774106][T19789] __should_failslab+0x121/0x190 [ 1333.779243][T19789] should_failslab+0x9/0x14 [ 1333.783766][T19789] kmem_cache_alloc+0x2aa/0x710 [ 1333.788651][T19789] ? __might_fault+0x12b/0x1e0 [ 1333.793437][T19789] ? find_held_lock+0x35/0x130 [ 1333.798223][T19789] getname_flags+0xd6/0x5b0 [ 1333.802747][T19789] user_path_at_empty+0x2f/0x50 [ 1333.807624][T19789] do_mount+0x150/0x1b50 [ 1333.811896][T19789] ? copy_mount_string+0x40/0x40 [ 1333.816933][T19789] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1333.823193][T19789] ? _copy_from_user+0x12c/0x1a0 [ 1333.828153][T19789] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1333.834439][T19789] ? copy_mount_options+0x2e8/0x3f0 [ 1333.839667][T19789] __x64_sys_mount+0x192/0x230 [ 1333.844425][T19789] do_syscall_64+0xfa/0x790 [ 1333.848923][T19789] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1333.854822][T19789] RIP: 0033:0x45af49 [ 1333.858729][T19789] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1333.863611][T19779] kAFS: unparsable volume name [ 1333.878338][T19789] RSP: 002b:00007fd0b6990c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1333.878353][T19789] RAX: ffffffffffffffda RBX: 00007fd0b6990c90 RCX: 000000000045af49 [ 1333.878361][T19789] RDX: 0000000020000180 RSI: 0000000020000140 RDI: 0000000020000080 [ 1333.878368][T19789] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 09:33:19 executing program 1 (fault-call:1 fault-nth:3): mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000080)=ANY=[@ANYBLOB='#U'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:33:19 executing program 2: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$VIDIOC_ENUM_FRAMESIZES(r2, 0xc02c564a, &(0x7f00000000c0)={0x6a531d0b, 0x47425247, 0x1, @discrete={0x30000000, 0x6}}) socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = fcntl$dupfd(r3, 0x0, r4) ioctl$SNDRV_PCM_IOCTL_READN_FRAMES(r2, 0x80184153, &(0x7f00000001c0)={0x0, &(0x7f0000000100)=[&(0x7f0000000240)="87509fc69a2062a9318be360b146c2991e296498618c5b1a0a972f66f7d68d65ce93c73db7645a62985e1c295c735d7171beb68401561bc2e80fdcf10c1c2ab787b22e6da3836fd2d47e40a577665b3dfe7dff87f44e9cfa435b448efe8be2e39f4c42ef2db44d9c952042a785c8ae25f405ceb9badc7866792d92afd5227f35729b62cefc784a65818567ac4ebfcdb7ddcfa92683b0f5822349212ab8d62fbc0a1336ca302464fe472f1d25f828cbf5b71854f0f823d4bc5d3afcff36a0ebdadfc0fb39ddb056c8febd525a5b8b7bb68ca0c4cf93bc8cab7a5fc5c9cc2ee996a376b5a333a34e17dcf86503ef6a8659bcd6ecc7", &(0x7f0000000340)="62610e676ce15b21664201f7ab84fcb5be951577eea348247b7beaeb4499763ba4fc9455a7a3724183ed31a76bd3d2c107010f2c69ca4e1caa99d27328fdb8510494fa978487c7b8ee906f1d0bd814f4d50b62603db43b7b45c791d7c7df3f5b576aec36f71aa177a940e2cc65b7680ce50cd58011d25ef1353e11c58e30dcc3", &(0x7f00000003c0)="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", &(0x7f00000013c0)="f847445e14b4dfe9d22c424a3cf46418e188b32bd607b666a21e41d20a4f26c97141cfac6048e38ed9d8af675c18aa7858dd65a22694503529ff71ed33facb8dac5af22448fe111a5b628bf4ab339115dc5c4f9a7ad353ac00a1c86a13dc0a438e9e7dcdbdca2f1c9ff26bf627f1cee69985be28f1ec31afb4dd4f34a6a31b22b9799b58b7bbc9cc2d2fc4c637dd979aa79521602891eb9f728c2eb72a28fb670595446e045622d92b26b591f57e28f6e3d0842d1e21e3abfac9f25a2aa6c733b21f6625fa73a041497b2e3e49f5f7db5eda12c2b49365bd80"]}) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$DRM_IOCTL_MODE_GETCRTC(r5, 0xc06864a1, &(0x7f0000000040)={&(0x7f0000000000)=[0x1, 0x484, 0x5, 0x3, 0x9, 0x9, 0x6, 0xffffffff, 0x7257, 0x1f], 0xa, 0x2, 0x6, 0xe4, 0x7, 0x9, 0x2, {0x80000000, 0x80, 0x7fff, 0x7fff, 0x20, 0x1, 0x8, 0x4, 0x6, 0x9, 0x9, 0x0, 0xfff, 0x9, "af9d6bea4549e4a3d3c361836c06ed69f6f24685efff8eb09551543811e32d65"}}) mount(&(0x7f00000015c0)=ANY=[@ANYBLOB='%'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:33:19 executing program 3: mkdir(0x0, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:33:19 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f0000000340)=ANY=[@ANYBLOB="b7020000f7ffffffbfa70000000000002402000020feffff7a0af0fff8ffffff69a4f0ff00000000b70600000018d1fe2d6405000000000075040000000000000704000000000000b7040000100000206a0700fe00000000850000002f000000b70000000a0000009500000000000000e535f8a62fc2868f0399d909a63796c113a80c19aab9d607000000b6cd483be3f0d3253730e711f5969f62c28b22756bedf3cf393d14c46cc4f79fd2b316da4f0de8163f6242fa732300000637c48468766af540439fce41f144631ac262dcae18c3d1a1fbe96dd87235b44174f7c0343185089a0f119e31975e551558055dc2dc"], &(0x7f0000000280)='GPL\x00'}, 0x48) r1 = socket$kcm(0x11, 0x8000000002, 0x300) socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000540)=r0, 0x4) syz_emit_ethernet(0x3e, &(0x7f0000000000)={@broadcast, @random="96c1e9574b31", @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x1c, 0x30, 0x0, 0x0, 0x0, 0x1, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @local}, @time_exceeded={0xb, 0x0, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local, @multicast2}}}}}}, 0x0) 09:33:19 executing program 5: r0 = open(0x0, 0x4000, 0x82) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000380)={{{@in6=@remote, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000000180)=0xe8) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000480)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=0x9, 0x0, 0x0, 0x0, &(0x7f00000002c0), 0x0, 0x0, &(0x7f0000000300)={0x3, 0xf, 0xe0000000, 0xfffffe00}, &(0x7f0000000340)=0x80, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000580)=0x5}}, 0xf) bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x6, 0x11, &(0x7f00000024c0)=ANY=[@ANYRESOCT, @ANYRES32, @ANYBLOB="0000000000000000182b0000", @ANYBLOB="000000000880000000851000c7f0ffffff181900ff76a3ae26e4b799caa827a73346c130d8bf65f8fc837f47e7b88b6ec9530df2a0935f5aeaaa119f11ff38916691de51d3414be7197eb0f296c7b649", @ANYRES32=r1, @ANYBLOB="0000000000000000950000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x26, &(0x7f0000000140)=""/38, 0x41000, 0x5, [], r2, 0x12, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0x7, 0x3}, 0x8, 0x10, &(0x7f00000002c0)={0x0, 0x2, 0x92d, 0xff}, 0x10, r3}, 0x78) r4 = socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup(r5) getpeername$packet(r6, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x12) ioctl$sock_inet6_SIOCADDRT(r4, 0x890b, &(0x7f0000000240)={@dev, @ipv4={[0x0, 0x0, 0x8], [], @loopback}, @initdev={0xfe, 0x88, [0xe, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20c200a2, r7}) r8 = syz_open_procfs(0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_QUERY(r8, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000bc0)={0x2f, 0x7, &(0x7f0000000740)=@raw=[@map={0x18, 0x3}, @map_val={0x18, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x4}, @ldst={0x0, 0x2, 0x6, 0x7, 0x2, 0xfffffffffffffff4, 0x8}, @alu={0x4, 0x1, 0x8, 0x1, 0xb, 0x20, 0x10}, @func={0x85, 0x0, 0x1, 0x0, 0x5}], &(0x7f0000000ac0)='GPL\x00', 0x3, 0x9, &(0x7f0000000b00)=""/9, 0x41000, 0xe, [], r7, 0x17, 0xffffffffffffffff, 0x8, &(0x7f0000000b40)={0xa, 0x1}, 0x8, 0x10, &(0x7f0000000b80)={0x5, 0xd, 0x6, 0x5}, 0x10, r3, r8}, 0x78) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000080)={0xffffffffffffffff, 0x10, &(0x7f0000000040)={&(0x7f00000014c0)=""/4096, 0x1000, r3}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={r0, 0x10, &(0x7f0000000400)={&(0x7f00000003c0)=""/30, 0x1e, r3}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x2, &(0x7f00000008c0)=ANY=[@ANYRESOCT], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0xbb, &(0x7f00000004c0)=""/187, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x7, 0x0, 0xfffffffe}, 0x10, r3}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x7, &(0x7f0000000000)=@raw=[@call={0x85, 0x0, 0x0, 0x5d}, @exit, @map={0x18, 0x2}, @func={0x85, 0x0, 0x1, 0x0, 0x1}, @map={0x18, 0x6}], &(0x7f0000000040)='syzkaller\x00', 0x10001, 0x0, 0x0, 0x41000, 0x8, [], 0x0, 0x15, 0xffffffffffffffff, 0x8, &(0x7f0000000080)={0x9, 0x2}, 0x8, 0x10, &(0x7f00000000c0)={0x5, 0x6, 0x7fff, 0x7f}, 0x10, r3}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x12, 0x1e, &(0x7f0000000340)=ANY=[@ANYBLOB="b7020000f7ffffffbfa70000000000002402000020feffa3390af0fff8ffffff69a4f0ff00000000b70600000018d1fe2d6405000000000075040000000000000704000000000000b7040000100000206a0700fe00000000850000002f000000b70000000a0000009500000000000000e535f8a62fc2868f0399d909a63796c113a80c19aab9d607000000b6cd483be3f0d3253730e711f5969f62c28b22756bedf3cf393d14c46cc4f79fd2b316da4f0de8163f6242fa732300000637c48468766af540439fce41f144631ac262dcae18c3d1a1fbe96dd87235b44174f7c0343185089a0f119e31975e551558055dc2dc"], &(0x7f0000000280)='GPL\x00', 0x0, 0x254, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10, r3}, 0x78) socket$kcm(0x11, 0x8000000002, 0x300) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r8, 0x800c6613, &(0x7f00000001c0)=@v2={0x2, @aes128, 0x1, [], "d1334a2896bb5979e7d254852a8c188f"}) socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r10 = socket$inet_udplite(0x2, 0x2, 0x88) r11 = fcntl$dupfd(r9, 0x0, r10) ioctl$PERF_EVENT_IOC_ENABLE(r11, 0x8912, 0x400200) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') [ 1333.878376][T19789] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd0b69916d4 [ 1333.878383][T19789] R13: 00000000004c8583 R14: 00000000004e06a8 R15: 0000000000000003 09:33:19 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000000)=ANY=[@ANYBLOB="0f826d4ed2a2e5bc3c4eecf5f587e6216e6236bdaeffeb156a857b9b66560a3435a93a8268b0137a6374e301ff05906b02190574116abd8aaf5a5f73cbabbe51adae52469e28af7582ca51cfe5b9aa0215269e0bf19f5caffcd36c94c198ffe0eec54f447908bd78f40ac1b7c0861a94217b82f1b1ec9ff27c9a43d7bd770259542e0b7d163ceeea"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:33:19 executing program 3: mkdir(0x0, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1333.997448][T19843] kAFS: unparsable volume name 09:33:19 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f0000000340)=ANY=[@ANYBLOB="b7020000f7ffffffbfa70000000000002402000020feffff7a0af0fff8ffffff69a4f0ff00000000b70600000018d1fe2d6405000000000075040000000000000704000000000000b7040000100000206a0700fe00000000850000002f000000b70000000a0000009500000000000000e535f8a62fc2868f0399d909a63796c113a80c19aab9d607000000b6cd483be3f0d3253730e711f5969f62c28b22756bedf3cf393d14c46cc4f79fd2b316da4d6de8163f6242fa732300000637c48468766af540439fce41f144631ac262dcae18c3d1a1fbe96dd87235b44174f7c0343185089a0f119e31975e551558055dc2dc"], &(0x7f0000000280)='GPL\x00'}, 0x48) r1 = socket$kcm(0x11, 0x8000000002, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000540)=r0, 0x4) socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) pipe2$9p(&(0x7f0000000080)={0xffffffffffffffff}, 0x2fa8774bfc0e1e6f) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r5, 0xc0406618, &(0x7f00000000c0)={{0x2, 0x0, @identifier="f3faa5cc2781fdf1417565feff0add3d"}}) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') [ 1334.147337][T20107] kAFS: unparsable volume name 09:33:19 executing program 3: mkdir(0x0, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:33:19 executing program 2: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) r0 = socket$bt_bnep(0x1f, 0x3, 0x4) write$binfmt_script(r0, &(0x7f0000000000)={'#! ', './file0', [{0x20, '*lo]+}nodev'}, {0x20, 'afs\x00'}, {0x20, '('}, {0x20, 'afs\x00'}, {0x20, 'afs\x00'}, {0x20, '[ppp1]]'}, {0x20, 'afs\x00'}], 0xa, "92053dc96b89a85060126aae9f465c2cd3f090d077ae5556fdd0837e0bc19d04f9ab6316f9864a"}, 0x5c) mount(&(0x7f00000015c0)=ANY=[@ANYBLOB="a5"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) 09:33:19 executing program 4: prctl$PR_SET_NO_NEW_PRIVS(0x26, 0x1) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c81", 0x10) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="a8066c146948d7e180ba05d3b755f85a01fb1b002230c3608776e249c6f05dbfaba8a97323043db0c2985ba44fef84f35f1ad500c6c9b7b3bf279c553eac1afba638ad322906807c2a0ec5b335de2a71ba65497856b189c413a8647bd07f5bc702686a5e5c65318c2740b315dac2f4274d25e93dc7f06838bdf31bdbfdd2965b029f28c9ff4e7a471a31234a4609edad11a5df14c4273cf80f82c6c3bd", @ANYPTR64=&(0x7f00000001c0)=ANY=[@ANYRES16, @ANYRES32, @ANYPTR=&(0x7f0000000100)=ANY=[@ANYRES16, @ANYPTR64], @ANYRES32=r0]], &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='efivarfs\x00', 0x0, 0x0) 09:33:19 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f0000000340)=ANY=[@ANYBLOB="b7020000f7ffffffbfa70000000000002402000020feffff7a0af0fff8ffffff69a4f0ff00000000b70600000018d1fe2d6405000000000075040000000000000704000000000000b7040000100000206a0700fe00000000850000002f000000b70000000a0000009500000000000000e535f8a62fc2868f0399d909a63796c113a80c19aab9d607000000b6cd483be3f0d3253730e711f5969f62c28b22756bedf3cf393d14c46cc4f79fd2b316da4f0de8163f6242fa732300000637c48468766af540439fce41f144631ac262dcae18c3d1a1fbe96dd87235b44174f7c0343185089a0f119e31975e551558055dc2dc"], &(0x7f0000000280)='GPL\x00'}, 0x48) r1 = socket$kcm(0x11, 0x8000000002, 0x300) socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000540)=r0, 0x4) syz_emit_ethernet(0x3e, &(0x7f0000000000)={@broadcast, @random="96c1e9574b31", @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x21, 0x30, 0x0, 0x0, 0x0, 0x1, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @local}, @time_exceeded={0xb, 0x0, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local, @multicast2}}}}}}, 0x0) [ 1334.316939][T20124] kAFS: unparsable volume name [ 1334.589956][T20456] FAULT_INJECTION: forcing a failure. [ 1334.589956][T20456] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1334.603329][T20456] CPU: 1 PID: 20456 Comm: syz-executor.1 Not tainted 5.5.0-rc5-syzkaller #0 [ 1334.612971][T20456] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1334.624684][T20456] Call Trace: [ 1334.628001][T20456] dump_stack+0x197/0x210 [ 1334.632324][T20456] should_fail.cold+0xa/0x15 [ 1334.636910][T20456] ? fault_create_debugfs_attr+0x180/0x180 [ 1334.642718][T20456] ? __kasan_check_read+0x11/0x20 [ 1334.647740][T20456] ? __lock_acquire+0x16f2/0x4a00 [ 1334.652771][T20456] should_fail_alloc_page+0x50/0x60 [ 1334.658389][T20456] __alloc_pages_nodemask+0x1a1/0x910 [ 1334.663762][T20456] ? fs_reclaim_release+0xf/0x30 [ 1334.668878][T20456] ? __alloc_pages_slowpath+0x2920/0x2920 [ 1334.674744][T20456] ? fs_reclaim_release+0xf/0x30 [ 1334.679713][T20456] ? fault_create_debugfs_attr+0x180/0x180 [ 1334.686160][T20456] cache_grow_begin+0x90/0xc60 [ 1334.691372][T20456] ? getname_flags+0xd6/0x5b0 [ 1334.696073][T20456] ? trace_hardirqs_off+0x62/0x240 [ 1334.701194][T20456] kmem_cache_alloc+0x64e/0x710 [ 1334.706063][T20456] ? __might_fault+0x12b/0x1e0 [ 1334.710843][T20456] getname_flags+0xd6/0x5b0 [ 1334.715334][T20456] user_path_at_empty+0x2f/0x50 [ 1334.720193][T20456] do_mount+0x150/0x1b50 [ 1334.724424][T20456] ? copy_mount_string+0x40/0x40 [ 1334.729349][T20456] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1334.735625][T20456] ? _copy_from_user+0x12c/0x1a0 [ 1334.740563][T20456] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1334.746894][T20456] ? copy_mount_options+0x2e8/0x3f0 [ 1334.752088][T20456] __x64_sys_mount+0x192/0x230 [ 1334.756856][T20456] do_syscall_64+0xfa/0x790 [ 1334.761353][T20456] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1334.767236][T20456] RIP: 0033:0x45af49 [ 1334.771116][T20456] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 09:33:20 executing program 1 (fault-call:1 fault-nth:4): mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000080)=ANY=[@ANYBLOB='#U'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:33:20 executing program 3: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:33:20 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f0000000340)=ANY=[@ANYBLOB="b7020000f7ffffffbfa70000000000002402000020feffff7a0af0fff8ffffff69a4f0ff00000000b70600000018d1fe2d6405000000000075040000000000000704000000000000b7040000100000206a0700fe00000000850000002f000000b70000000a0000009500000000000000e535f8a62fc2868f0399d909a63796c113a80c19aab9d607000000b6cd483be3f0d3253730e711f5969f62c28b22756bedf3cf393d14c46cc4f79fd2b316da4f0de8163f6242fa732300000637c48468766af540439fce41f144631ac262dcae18c3d1a1fbe96dd87235b44174f7c0343185089a0f119e31975e551558055dc2dc"], &(0x7f0000000280)='GPL\x00'}, 0x48) r1 = socket$kcm(0x11, 0x8000000002, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000540)=r0, 0x4) sendmsg$IPSET_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x4080900a}, 0xc, &(0x7f00000001c0)={&(0x7f00000000c0)={0x64, 0x4, 0x6, 0x1, 0x70bd26, 0x25dfdbff, {0x9, 0x0, 0x9}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x64}, 0x1, 0x0, 0x0, 0x14}, 0x1) socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') 09:33:20 executing program 2: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) r0 = openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f0000001280)='/proc/self/attr/current\x00', 0x2, 0x0) dup(r0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) recvmsg(r1, &(0x7f0000001240)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000000)=""/21, 0x15}, {&(0x7f0000000040)=""/120, 0x78}, {&(0x7f00000000c0)=""/98, 0x62}], 0x3, &(0x7f0000000240)=""/4096, 0x1000}, 0x21) ioctl$DRM_IOCTL_GET_MAP(0xffffffffffffffff, 0xc0286404, &(0x7f00000012c0)={&(0x7f0000ffb000/0x3000)=nil, 0xa9f5, 0x3, 0x8, &(0x7f0000ffb000/0x4000)=nil}) mount(&(0x7f00000015c0)=ANY=[@ANYBLOB='%'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:33:20 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f0000000340)=ANY=[@ANYBLOB="b7020000f7ffffffbfa70000000000002402000020feffff7a0af0fff8ffffff69a4f0ff00000000b70600000018d1fe2d6405000000000075040000000000000704000000000000b7040000100000206a0700fe00000000850000002f000000b70000000a0000009500000000000000e535f8a62fc2868f0399d909a63796c113a80c19aab9d607000000b6cd483be3f0d3253730e711f5969f62c28b22756bedf3cf393d14c46cc4f79fd2b316da4f0de8163f6242fa732300000637c48468766af540439fce41f144631ac262dcae18c3d1a1fbe96dd87235b44174f7c0343185089a0f119e31975e551558055dc2dc"], &(0x7f0000000280)='GPL\x00'}, 0x48) r1 = socket$kcm(0x11, 0x8000000002, 0x300) socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000540)=r0, 0x4) syz_emit_ethernet(0x3e, &(0x7f0000000000)={@broadcast, @random="96c1e9574b31", @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x2f, 0x30, 0x0, 0x0, 0x0, 0x1, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @local}, @time_exceeded={0xb, 0x0, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local, @multicast2}}}}}}, 0x0) [ 1334.791057][T20456] RSP: 002b:00007fd0b6990c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1334.799542][T20456] RAX: ffffffffffffffda RBX: 00007fd0b6990c90 RCX: 000000000045af49 [ 1334.807499][T20456] RDX: 0000000020000180 RSI: 0000000020000140 RDI: 0000000020000080 [ 1334.815632][T20456] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1334.823790][T20456] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd0b69916d4 [ 1334.832649][T20456] R13: 00000000004c8583 R14: 00000000004e06a8 R15: 0000000000000003 09:33:20 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f00000015c0)=ANY=[@ANYBLOB='#'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) r0 = socket(0x0, 0x80002, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="080db5055e0bcfe8696071") sendto(r0, &(0x7f0000000000)="9c58f20146c953b0a67bece90d98cad2562760660c6ba2d1ee6e41ef61707d37397e62ca134f863a645721e9d8611cc641c6ef6caf639486ffa49dc594f34ea86eb6e6115d03dbaa4586fbba1f38d6fdd8aa962066747570f27d704fd1bf320e42953b5ce9b05bee7a554a03192aa373c728985d0c569c58514329edad80af692c8d78976ca6b0fe121f2f8bfca29ac2474e1c4ce0088fcb7c4dbf4467cfeb63e7b67df3c16a90033374d8ffb527635ade82ac7601912e6c207665ef3dc6216be1ff4a2a0f5519f78f1d3ecba6f5ce16a88cce65925b3d3dd4b36fd711f1", 0xde, 0x800, &(0x7f0000000240)=@tipc=@id={0x1e, 0x3, 0x0, {0x4e20, 0x4}}, 0x80) 09:33:20 executing program 3: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1334.923648][T20466] kAFS: unparsable volume name 09:33:20 executing program 2: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg$inet(r1, &(0x7f0000000680)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f00000000c0)="5831255624c13e4c563f221188b6be66ea", 0x11}], 0x1}}, {{&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000002c0)=[{&(0x7f0000000040)="70a6b8247e016ae2647a2e703fce46c432e37d1dffd332a793d4b9e3617386d153", 0x21}, {&(0x7f0000000200)="09f96fbf33ceccc10976cd10b1411ee57d092fd5b7f95a0f19f01005f110463ccb2c6ebdb74ad7a7da1a2bed233154886db68984d477ebee11ce9a8e3510d401f6f31ea0a7e3ec1cda7b95f7a02b42753eb4cf0bbf5afbc7084f9bc2603aafe5da6cd54e4d647ec9fd641e4241513aaf23481d1f390bbb83dfae56369f4b03367ccd45f0ec4cd929aed127394157e7b3794500c0c5f88930b1ff50bbae1163c26fff28d06028", 0xa6}, {&(0x7f0000000100)="38d6cd435749d519cc39e90540f37c4f5c6bceef6c4ae07105cafc5e25d9bbfce859670b89666cca0857aa0c2abd8722a9db0caad3905e3ff682", 0x3a}, {&(0x7f0000000140)="d71206abd00e3c0a7e2440673da6a9fc2c1255a9b136bc982a3dc2ac21ef167250c176acfbd4d13abd86b018e8b1357842d8dc93e53f6b542e9633e1db8672e8", 0x40}], 0x4}}, {{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000380)="df304451b990364b1c6ff9c843eb47125c0a16565b5efbc0494b453f9863364196a743b5d226d34b2293f3b4b8dde4b8434172dec0902f0e03c2893c2bfd5f662eefc2902850a0221d55", 0x200003ca}, {&(0x7f0000000400)}], 0x2, &(0x7f0000000540)=[@ip_tos_u8={{0x11}}, @ip_ttl={{0x14}}, @ip_ttl={{0x14}}, @ip_tos_u8={{0x11}}], 0x60}}], 0x3, 0x0) mount(&(0x7f00000000c0)=ANY=[@ANYRES64], &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='devpts\x00', 0x0, 0x0) 09:33:20 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f0000000340)=ANY=[@ANYBLOB="b7020000f7ffffffbfa70000000000002402000020feffff7a0af0fff8ffffff69a4f0ff00000000b70600000018d1fe2d6405000000000075040000000000000704000000000000b7040000100000206a0700fe00000000850000002f000000b70000000a0000009500000000000000e535f8a62fc2868f0399d909a63796c113a80c19aab9d607000000b6cd483be3f0d3253730e711f5969f62c28b22756bedf3cf393d14c46cc4f79fd2b316da4f0de8163f6242fa732300000637c48468766af540439fce41f144631ac262dcae18c3d1a1fbe96dd87235b44174f7c0343185089a0f119e31975e551558055dc2dc"], &(0x7f0000000280)='GPL\x00'}, 0x48) socket$kcm(0x11, 0x8000000002, 0x300) socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$alg(0x26, 0x5, 0x0) r5 = socket(0x0, 0x80002, 0x0) ioctl(r5, 0x1000008912, &(0x7f00000000c0)="080db5055e0bcfe8696071") ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) bind$alg(r4, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r6 = accept4(r4, 0x0, 0x0, 0x0) sendmmsg$inet(r6, &(0x7f0000000680)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f00000000c0)="5831255624c13e4c563f221188b6be66ea", 0x11}], 0x1}}, {{&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000002c0)=[{&(0x7f0000000080)="70a6b8247e016ae2647a2e703fce46c432e37d1dffd332a793d4b9e3617386d153", 0x21}, {&(0x7f0000000200)="09f96fbf33ceccc10976cd10b1411ee57d092fd5b7f95a0f19f01005f110463ccb2c6ebdb74ad7a7da1a2bed233154886db68984d477ebee11ce9a8e3510d401f6f31ea0a7e3ec1cda7b95f7a02b42753eb4cf0bbf5afbc7084f9bc2603aafe5da6cd54e4d647ec9fd641e4241513aaf23481d1f390bbb83dfae56369f4b03367ccd45f0ec4cd929aed127394157e7b3794500c0c5f88930b1ff50bbae1163c26fff28d06028", 0xa6}, {&(0x7f0000000100)="38d6cd435749d519cc39e90540f37c4f5c6bceef6c4ae07105cafc5e25d9bbfce859670b89666cca0857aa0c2abd8722a9db0caad3905e3ff682", 0x3a}, {&(0x7f0000000140)="d71206abd00e3c0a7e2440673da6a9fc2c1255a9b136bc982a3dc2ac21ef167250c176acfbd4d13abd86b018e8b1357842d8dc93e53f6b542e9633e1db8672e8", 0x2b}], 0x2af}}, {{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000380)="df304451b990364b1c6ff9c843eb47125c0a16565b5efbc0494b453f9863364196a743b5d226d34b2293f3b4b8dde4b8434172dec0902f0e03c2893c2bfd5f662eefc2902850a0221d55", 0x4a}, {&(0x7f0000000300)="07000000f20f006a20a035", 0xffffffffffffff7e}], 0x2, &(0x7f0000000440)=[@ip_tos_u8={{0x11}}, @ip_ttl={{0x14}}, @ip_ttl={{0x14}}, @ip_tos_u8={{0x11}}], 0x60}}], 0x3, 0x0) ioctl$VIDIOC_QBUF(r3, 0xc058560f, &(0x7f00000001c0)={0x3ff, 0x4, 0x4, 0xe000, 0x2000000, {}, {0x2, 0x5, 0x0, 0x8, 0xff, 0x20, "f2299d97"}, 0x10000, 0x2, @planes=&(0x7f0000000100)={0x10001, 0x800, @mem_offset=0x7f, 0x400}, 0x5, 0x0, r6}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f00000000c0)=r0, 0x0) socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r8 = socket$inet_udplite(0x2, 0x2, 0x88) r9 = fcntl$dupfd(r7, 0x0, r8) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') 09:33:20 executing program 3: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:33:20 executing program 4: mount(&(0x7f00000015c0)=ANY=[@ANYBLOB], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:33:20 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f0000000340)=ANY=[@ANYBLOB="b7020000f7ffffffbfa70000000000002402000020feffff7a0af0fff8ffffff69a4f0ff00000000b70600000018d1fe2d6405000000000075040000000000000704000000000000b7040000100000206a0700fe00000000850000002f000000b70000000a0000009500000000000000e535f8a62fc2868f0399d909a63796c113a80c19aab9d607000000b6cd483be3f0d3253730e711f5969f62c28b22756bedf3cf393d14c46cc4f79fd2b316da4f0de8163f6242fa732300000637c48468766af540439fce41f144631ac262dcae18c3d1a1fbe96dd87235b44174f7c0343185089a0f119e31975e551558055dc2dc"], &(0x7f0000000280)='GPL\x00'}, 0x48) r1 = socket$kcm(0x11, 0x8000000002, 0x300) socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000540)=r0, 0x4) syz_emit_ethernet(0x3e, &(0x7f0000000000)={@broadcast, @random="96c1e9574b31", @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x30, 0x30, 0x0, 0x0, 0x0, 0x1, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @local}, @time_exceeded={0xb, 0x0, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local, @multicast2}}}}}}, 0x0) [ 1335.448279][T20908] FAULT_INJECTION: forcing a failure. [ 1335.448279][T20908] name failslab, interval 1, probability 0, space 0, times 0 [ 1335.464669][T20908] CPU: 0 PID: 20908 Comm: syz-executor.1 Not tainted 5.5.0-rc5-syzkaller #0 [ 1335.473673][T20908] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1335.484980][T20908] Call Trace: [ 1335.488560][T20908] dump_stack+0x197/0x210 [ 1335.493016][T20908] should_fail.cold+0xa/0x15 [ 1335.497980][T20908] ? fault_create_debugfs_attr+0x180/0x180 [ 1335.503888][T20908] ? ___might_sleep+0x163/0x2c0 [ 1335.509616][T20908] __should_failslab+0x121/0x190 [ 1335.515185][T20908] should_failslab+0x9/0x14 [ 1335.521466][T20908] __kmalloc+0x2e0/0x770 [ 1335.526059][T20908] ? save_stack+0x5c/0x90 [ 1335.530742][T20908] ? tomoyo_encode2.part.0+0xf5/0x400 [ 1335.536734][T20908] tomoyo_encode2.part.0+0xf5/0x400 [ 1335.541941][T20908] ? do_syscall_64+0xfa/0x790 [ 1335.546696][T20908] tomoyo_encode+0x2b/0x50 [ 1335.551889][T20908] tomoyo_mount_acl+0xe0/0x840 [ 1335.557077][T20908] ? debug_check_no_obj_freed+0x20a/0x43f [ 1335.562890][T20908] ? __kasan_check_read+0x11/0x20 [ 1335.567907][T20908] ? mark_lock+0xc2/0x1220 [ 1335.572310][T20908] ? tomoyo_check_mount_acl+0x1b0/0x1b0 [ 1335.577844][T20908] ? __kasan_check_read+0x11/0x20 [ 1335.582852][T20908] ? __lock_acquire+0x8a0/0x4a00 [ 1335.587785][T20908] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1335.594009][T20908] ? debug_smp_processor_id+0x33/0x18a [ 1335.599550][T20908] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 1335.605704][T20908] ? lock_acquire+0x190/0x410 [ 1335.610459][T20908] ? tomoyo_mount_permission+0x10a/0x400 [ 1335.616084][T20908] tomoyo_mount_permission+0x16a/0x400 [ 1335.621539][T20908] ? tomoyo_mount_permission+0x10a/0x400 [ 1335.627172][T20908] ? tomoyo_mount_acl+0x840/0x840 [ 1335.632201][T20908] ? strncpy_from_user+0x2b4/0x400 [ 1335.637300][T20908] tomoyo_sb_mount+0x35/0x40 [ 1335.641880][T20908] security_sb_mount+0x87/0xd0 [ 1335.646633][T20908] do_mount+0x1d4/0x1b50 [ 1335.650868][T20908] ? copy_mount_string+0x40/0x40 [ 1335.655802][T20908] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1335.662028][T20908] ? _copy_from_user+0x12c/0x1a0 [ 1335.666988][T20908] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1335.673232][T20908] ? copy_mount_options+0x2e8/0x3f0 [ 1335.678447][T20908] __x64_sys_mount+0x192/0x230 [ 1335.683211][T20908] do_syscall_64+0xfa/0x790 [ 1335.687709][T20908] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1335.694205][T20908] RIP: 0033:0x45af49 [ 1335.698088][T20908] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1335.717677][T20908] RSP: 002b:00007fd0b6990c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1335.726081][T20908] RAX: ffffffffffffffda RBX: 00007fd0b6990c90 RCX: 000000000045af49 [ 1335.734039][T20908] RDX: 0000000020000180 RSI: 0000000020000140 RDI: 0000000020000080 [ 1335.741995][T20908] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1335.749948][T20908] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd0b69916d4 [ 1335.757902][T20908] R13: 00000000004c8583 R14: 00000000004e06a8 R15: 0000000000000003 09:33:21 executing program 1 (fault-call:1 fault-nth:5): mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000080)=ANY=[@ANYBLOB='#U'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:33:21 executing program 3: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:33:21 executing program 2: r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) keyctl$revoke(0x3, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f00000000c0)=ANY=[@ANYRESHEX=r0], &(0x7f0000000140)='./file0\x00', &(0x7f0000001240)='afs\x00', 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nvram\x00', 0x400000, 0x0) read$dsp(r1, &(0x7f0000000240)=""/4096, 0x1000) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(0xffffffffffffffff, 0x84, 0xc, &(0x7f0000000000), &(0x7f00000001c0)=0x4) 09:33:21 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f00000000c0)=ANY=[@ANYBLOB="7483a5a8f9ce476abc9d4210777b8030344f69b9c24c81f568e0465abdc25128f3cb0ae212a2a8c2416a72e8041cf21635555cb7ff6e9500b610dd04058a001e8a380ecd"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x6100, 0x0) getsockopt$inet_sctp6_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000040), &(0x7f0000000080)=0xe) 09:33:21 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f0000000340)=ANY=[@ANYBLOB="b7020000f7ffffffbfa700000000000024020000070000007a0af0fff8ffffff69a4f0ff00000000b70600000018d1fe2d6405000000000075046c8da43f00000704000000000000b7040000100000206a0700fe00000000850000002f000000b70000000a0000009500000000000000e535f8a62fc2868f0399d909a63796c113a80c19aab9d607000000b6cd483be3f0d3253730e711f5969f62c28b22756bedf3cf393d14c46cc4f79fd2b316da4f0de8163f6242fa732300000637c48468766af540439fce41f144631ac262dcae18c3d1a1fbe96dd87235b44174f7c0343185089a0f119e31975e551558055dc2dc"], &(0x7f0000000280)='GPL\x00'}, 0x48) r1 = socket$kcm(0x11, 0x8000000002, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000540)=r0, 0x4) socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000080)=r0, 0x4) 09:33:21 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f0000000340)=ANY=[@ANYBLOB="b7020000f7ffffffbfa70000000000002402000020feffff7a0af0fff8ffffff69a4f0ff00000000b70600000018d1fe2d6405000000000075040000000000000704000000000000b7040000100000206a0700fe00000000850000002f000000b70000000a0000009500000000000000e535f8a62fc2868f0399d909a63796c113a80c19aab9d607000000b6cd483be3f0d3253730e711f5969f62c28b22756bedf3cf393d14c46cc4f79fd2b316da4f0de8163f6242fa732300000637c48468766af540439fce41f144631ac262dcae18c3d1a1fbe96dd87235b44174f7c0343185089a0f119e31975e551558055dc2dc"], &(0x7f0000000280)='GPL\x00'}, 0x48) r1 = socket$kcm(0x11, 0x8000000002, 0x300) socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000540)=r0, 0x4) syz_emit_ethernet(0x3e, &(0x7f0000000000)={@broadcast, @random="96c1e9574b31", @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x3a, 0x30, 0x0, 0x0, 0x0, 0x1, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @local}, @time_exceeded={0xb, 0x0, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local, @multicast2}}}}}}, 0x0) [ 1335.892273][T21015] kAFS: Bad value for 'source' [ 1335.903504][T21018] kAFS: unparsable volume name [ 1335.904568][T21017] kAFS: unparsable volume name [ 1335.932440][T21018] kAFS: unparsable volume name 09:33:21 executing program 3: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:33:21 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f00000015c0)=ANY=[@ANYBLOB='#'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c81", 0x10) bind(r0, &(0x7f0000000080)=@vsock={0x28, 0x0, 0xffffffff, @local}, 0x80) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x2, 0x0) faccessat(r1, &(0x7f0000000040)='.\x00', 0x80, 0x100) 09:33:21 executing program 2: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f00000015c0)=ANY=[@ANYBLOB='%'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) openat$vimc0(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video0\x00', 0x2, 0x0) 09:33:21 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f0000000340)=ANY=[@ANYBLOB="b7020000f7ffffffbfa70000000000002402000020feffff7a0af0fff8ffffff69a4f0ff00000000b70600000018d1fe2d6405000000000075040000000000000704000000000000b7040000100000206a0700fe00000000850000002f000000b70000000a0000009500000000000000e535f8a62fc2868f0399d909a63796c113a80c19aab9d607000000b6cd483be3f0d3253730e711f5969f62c28b22756bedf3cf393d14c46cc4f79fd2b316da4f0de8163f6242fa732300000637c48468766af540439fce41f144631ac262dcae18c3d1a1fbe96dd87235b44174f7c0343185089a0f119e31975e551558055dc2dc"], &(0x7f0000000280)='GPL\x00'}, 0x48) r1 = socket$kcm(0x11, 0x8000000002, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000540)=r0, 0x4) r2 = pkey_alloc(0x0, 0x0) pkey_free(r2) socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = fcntl$dupfd(r3, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') ioctl$EVIOCGBITSND(r5, 0x80404532, &(0x7f0000000080)=""/20) 09:33:21 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f0000000340)=ANY=[@ANYBLOB="b7020000f7ffffffbfa70000000000002402000020feffff7a0af0fff8ffffff69a4f0ff00000000b70600000018d1fe2d6405000000000075040000000000000704000000000000b7040000100000206a0700fe00000000850000002f000000b70000000a0000009500000000000000e535f8a62fc2868f0399d909a63796c113a80c19aab9d607000000b6cd483be3f0d3253730e711f5969f62c28b22756bedf3cf393d14c46cc4f79fd2b316da4f0de8163f6242fa732300000637c48468766af540439fce41f144631ac262dcae18c3d1a1fbe96dd87235b44174f7c0343185089a0f119e31975e551558055dc2dc"], &(0x7f0000000280)='GPL\x00'}, 0x48) r1 = socket$kcm(0x11, 0x8000000002, 0x300) socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000540)=r0, 0x4) syz_emit_ethernet(0x3e, &(0x7f0000000000)={@broadcast, @random="96c1e9574b31", @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x3f, 0x30, 0x0, 0x0, 0x0, 0x1, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @local}, @time_exceeded={0xb, 0x0, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local, @multicast2}}}}}}, 0x0) [ 1336.163879][T21390] kAFS: unparsable volume name [ 1336.174815][T21396] kAFS: unparsable volume name [ 1336.209993][T21396] kAFS: unparsable volume name 09:33:21 executing program 3: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1336.449507][T21703] kAFS: Bad value for 'source' [ 1336.598980][T21761] FAULT_INJECTION: forcing a failure. [ 1336.598980][T21761] name failslab, interval 1, probability 0, space 0, times 0 [ 1336.635167][T21761] CPU: 0 PID: 21761 Comm: syz-executor.1 Not tainted 5.5.0-rc5-syzkaller #0 [ 1336.643926][T21761] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1336.653993][T21761] Call Trace: [ 1336.657304][T21761] dump_stack+0x197/0x210 [ 1336.661671][T21761] should_fail.cold+0xa/0x15 [ 1336.666371][T21761] ? fault_create_debugfs_attr+0x180/0x180 [ 1336.672459][T21761] ? ___might_sleep+0x163/0x2c0 [ 1336.677363][T21761] __should_failslab+0x121/0x190 [ 1336.682587][T21761] should_failslab+0x9/0x14 [ 1336.687227][T21761] __kmalloc+0x2e0/0x770 [ 1336.691485][T21761] ? __kmalloc+0x608/0x770 [ 1336.695917][T21761] ? tomoyo_realpath_from_path+0xc5/0x660 [ 1336.701962][T21761] tomoyo_realpath_from_path+0xc5/0x660 [ 1336.707559][T21761] tomoyo_mount_acl+0x149/0x840 [ 1336.712426][T21761] ? debug_check_no_obj_freed+0x20a/0x43f [ 1336.718164][T21761] ? __kasan_check_read+0x11/0x20 [ 1336.723201][T21761] ? mark_lock+0xc2/0x1220 [ 1336.727640][T21761] ? tomoyo_check_mount_acl+0x1b0/0x1b0 [ 1336.733375][T21761] ? __kasan_check_read+0x11/0x20 [ 1336.738557][T21761] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1336.744930][T21761] ? debug_smp_processor_id+0x33/0x18a [ 1336.750425][T21761] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 1336.756623][T21761] ? lock_acquire+0x190/0x410 [ 1336.761320][T21761] ? tomoyo_mount_permission+0x10a/0x400 [ 1336.766997][T21761] tomoyo_mount_permission+0x16a/0x400 [ 1336.772478][T21761] ? tomoyo_mount_permission+0x10a/0x400 [ 1336.778128][T21761] ? tomoyo_mount_acl+0x840/0x840 [ 1336.783182][T21761] ? strncpy_from_user+0x2b4/0x400 [ 1336.788312][T21761] tomoyo_sb_mount+0x35/0x40 [ 1336.792921][T21761] security_sb_mount+0x87/0xd0 [ 1336.797700][T21761] do_mount+0x1d4/0x1b50 [ 1336.801960][T21761] ? copy_mount_string+0x40/0x40 [ 1336.806913][T21761] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1336.813256][T21761] ? _copy_from_user+0x12c/0x1a0 [ 1336.821339][T21761] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1336.827595][T21761] ? copy_mount_options+0x2e8/0x3f0 [ 1336.832989][T21761] __x64_sys_mount+0x192/0x230 [ 1336.837784][T21761] do_syscall_64+0xfa/0x790 [ 1336.842303][T21761] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1336.848201][T21761] RIP: 0033:0x45af49 [ 1336.852108][T21761] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1336.871895][T21761] RSP: 002b:00007fd0b6990c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1336.880429][T21761] RAX: ffffffffffffffda RBX: 00007fd0b6990c90 RCX: 000000000045af49 [ 1336.888421][T21761] RDX: 0000000020000180 RSI: 0000000020000140 RDI: 0000000020000080 [ 1336.896407][T21761] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1336.905178][T21761] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd0b69916d4 [ 1336.914206][T21761] R13: 00000000004c8583 R14: 00000000004e06a8 R15: 0000000000000003 09:33:22 executing program 1: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000080)=ANY=[@ANYBLOB='#U'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:33:22 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f0000000340)=ANY=[@ANYBLOB="b7020000f7ffffffbfa70000000000002402000020feffff7a0af0fff8ffffff69a4f0ff00000000b70600000018d1fe2d6405000000000075040000000000000704000000000000b7040000100000206a0700fe00000000850000002f000000b70000000a0000009500000000000000e535f8a62fc2868f0399d909a63796c113a80c19aab9d607000000b6cd483be3f0d3253730e711f5969f62c28b22756bedf3cf393d14c46cc4f79fd2b316da4f0de8163f6242fa732300000637c48468766af540439fce41f144631ac262dcae18c3d1a1fbe96dd87235b44174f7c0343185089a0f119e31975e551558055dc2dc"], &(0x7f0000000280)='GPL\x00'}, 0x48) r1 = socket$kcm(0x11, 0x8000000002, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000540)=r0, 0x4) socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) socket$inet_udplite(0x2, 0x2, 0x88) r4 = socket(0x0, 0x80002, 0x0) ioctl(r4, 0x1000008912, &(0x7f00000000c0)="080db5055e0bcfe8696071") socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r6 = socket$inet_udplite(0x2, 0x2, 0x88) r7 = fcntl$dupfd(r5, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ioctl$KDSETMODE(r7, 0x4b3a, 0x0) r8 = dup2(r3, r4) r9 = socket$alg(0x26, 0x5, 0x0) syslog(0x9, &(0x7f0000000740)=""/168, 0xa8) bind$alg(r9, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, &(0x7f0000000600), &(0x7f0000000640)=0xc) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000300)='/dev/sequencer2\x00', 0x80000, 0x0) r10 = dup3(0xffffffffffffffff, r2, 0x80000) ioctl$VIDIOC_S_SELECTION(r10, 0xc040565f, &(0x7f00000005c0)={0x7, 0x100, 0x4, {0x7, 0x9, 0xfff, 0x80000001}}) r11 = accept4(r9, 0x0, 0x0, 0x0) sendmmsg$inet(r11, &(0x7f0000000680)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f00000000c0)="5831255624c13e4c563f221188b6be66ea", 0x11}], 0x1}}, {{&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000002c0)=[{&(0x7f0000000040)="70a6b8247e016ae2647a2e703fce46c432e37d1dffd332a793d4b9e3617386d153", 0x21}, {&(0x7f0000000200)="09f96fbf33ceccc10976cd10b1411ee57d092fd5b7f95a0f19f01005f110463ccb2c6ebdb74ad7a7da1a2bed233154886db68984d477ebee11ce9a8e3510d401f6f31ea0a7e3ec1cda7b95f7a02b42753eb4cf0bbf5afbc7084f9bc2603aafe5da6cd54e4d647ec9fd641e4241513aaf23481d1f390bbb83dfae56369f4b03367ccd45f0ec4cd929aed127394157e7b3794500c0c5f88930b1ff50bbae1163c26fff28d06028", 0xa6}, {&(0x7f0000000100)="38d6cd435749d519cc39e90540f37c4f5c6bceef6c4ae07105cafc5e25d9bbfce859670b89666cca0857aa0c2abd8722a9db0caad3905e3ff682", 0x3a}, {&(0x7f0000000140)="d71206abd00e3c0a7e2440673da6a9fc2c1255a9b136bc982a3dc2ac21ef167250c176acfbd4d13abd86b018e8b1357842d8dc93e53f6b542e9633e1db8672e8", 0x40}], 0x4}}, {{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000380)="df304451b990364b1c6ff9c843eb47125c0a16565b5efbc0494b453f9863364196a743b5d226d34b2293f3b4b8dde4b8434172dec0902f0e03c2893c2bfd5f662eefc2902850a0221d55", 0x200003ca}, {&(0x7f0000000400)}], 0x2, &(0x7f0000000540)=[@ip_tos_u8={{0x11}}, @ip_ttl={{0x14}}, @ip_ttl={{0x14}}, @ip_tos_u8={{0x11}}], 0x60}}], 0x3, 0x0) r12 = openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ocfs2_control\x00', 0xb2628227941bd97, 0x0) r13 = fcntl$dupfd(r8, 0x0, r12) ioctl$PERF_EVENT_IOC_ENABLE(r13, 0x8912, 0x400200) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') 09:33:22 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0x100) mount(&(0x7f00000015c0)=ANY=[@ANYBLOB='%'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) unlink(&(0x7f0000000000)='./file0\x00') 09:33:22 executing program 3: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:33:22 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f0000000340)=ANY=[@ANYBLOB="b7020000f7ffffffbfa70000000000002402000020feffff7a0af0fff8ffffff69a4f0ff00000000b70600000018d1fe2d6405000000000075040000000000000704000000000000b7040000100000206a0700fe00000000850000002f000000b70000000a0000009500000000000000e535f8a62fc2868f0399d909a63796c113a80c19aab9d607000000b6cd483be3f0d3253730e711f5969f62c28b22756bedf3cf393d14c46cc4f79fd2b316da4f0de8163f6242fa732300000637c48468766af540439fce41f144631ac262dcae18c3d1a1fbe96dd87235b44174f7c0343185089a0f119e31975e551558055dc2dc"], &(0x7f0000000280)='GPL\x00'}, 0x48) r1 = socket$kcm(0x11, 0x8000000002, 0x300) socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000540)=r0, 0x4) syz_emit_ethernet(0x3e, &(0x7f0000000000)={@broadcast, @random="96c1e9574b31", @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x1, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @local}, @time_exceeded={0xb, 0x0, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local, @multicast2}}}}}}, 0x0) [ 1337.402647][T21761] ERROR: Out of memory at tomoyo_realpath_from_path. [ 1337.486220][T21768] kAFS: Bad value for 'source' [ 1337.487057][T21769] kAFS: unparsable volume name [ 1337.519677][T21769] kAFS: unparsable volume name 09:33:22 executing program 3: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:33:22 executing program 2: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg$inet(r1, &(0x7f0000000680)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f00000000c0)="5831255624c13e4c563f221188b6be66ea", 0x11}], 0x1}}, {{&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000002c0)=[{&(0x7f0000000040)="70a6b8247e016ae2647a2e703fce46c432e37d1dffd332a793d4b9e3617386d153", 0x21}, {&(0x7f0000000200)="09f96fbf33ceccc10976cd10b1411ee57d092fd5b7f95a0f19f01005f110463ccb2c6ebdb74ad7a7da1a2bed233154886db68984d477ebee11ce9a8e3510d401f6f31ea0a7e3ec1cda7b95f7a02b42753eb4cf0bbf5afbc7084f9bc2603aafe5da6cd54e4d647ec9fd641e4241513aaf23481d1f390bbb83dfae56369f4b03367ccd45f0ec4cd929aed127394157e7b3794500c0c5f88930b1ff50bbae1163c26fff28d06028", 0xa6}, {&(0x7f0000000100)="38d6cd435749d519cc39e90540f37c4f5c6bceef6c4ae07105cafc5e25d9bbfce859670b89666cca0857aa0c2abd8722a9db0caad3905e3ff682", 0x3a}, {&(0x7f0000000140)="d71206abd00e3c0a7e2440673da6a9fc2c1255a9b136bc982a3dc2ac21ef167250c176acfbd4d13abd86b018e8b1357842d8dc93e53f6b542e9633e1db8672e8", 0x40}], 0x4}}, {{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000380)="df304451b990364b1c6ff9c843eb47125c0a16565b5efbc0494b453f9863364196a743b5d226d34b2293f3b4b8dde4b8434172dec0902f0e03c2893c2bfd5f662eefc2902850a0221d55", 0x200003ca}, {&(0x7f0000000400)}], 0x2, &(0x7f0000000540)=[@ip_tos_u8={{0x11}}, @ip_ttl={{0x14}}, @ip_ttl={{0x14}}, @ip_tos_u8={{0x11}}], 0x60}}], 0x3, 0x0) mount(&(0x7f0000000300)=ANY=[@ANYRES32, @ANYPTR, @ANYRESHEX=r1], &(0x7f0000000140)='./file0\x00', &(0x7f0000000000)='coda\x00', 0x40, 0x0) socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) accept4(r3, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c81", 0x10) r4 = fcntl$dupfd(r2, 0x203, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$RTC_WKALM_SET(r4, 0x4028700f, &(0x7f0000000080)={0x1, 0x0, {0x1e, 0x2f, 0x15, 0x1e, 0x6, 0x1, 0x2, 0x148, 0xfffffffffffffffd}}) 09:33:22 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0xf, 0x1e, &(0x7f0000000340)=ANY=[@ANYBLOB="b7020000f7ffffffbfa70000000000002402000020feffff7a0af0fff8ffffff69a4f0ff00000000b70600000018d1fe2d6405000000000075040000000000000704000000000000b7040000100000206a0700fe00000000850000002f000000b70000000a0000009500000000000000e535f8a62fc2868f0399d909a63796c113a80c19aab9d607000000b6cd483be3f0d3253730e711f5969f62c28b22756bedf3cf393d14c46cc4f79fd2b316da4f0de8163f6242fa732300000637c48468766af540439fce41f144631ac262dcae18c3d1a1fbe96dd87235b44174f7c0343185089a0f119e31975e551558055dc2dc"], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) r1 = socket$kcm(0x11, 0x8000000002, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000540)=r0, 0x4) socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') [ 1337.764100][T21981] kAFS: Bad value for 'source' 09:33:23 executing program 3: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:33:23 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f0000000340)=ANY=[@ANYBLOB="b7020000f7ffffffbfa70000000000002402000020feffff7a0af0fff8ffffff69a4f0ff00000000b70600000018d1fe2d6405000000000075040000000000000704000000000000b7040000100000206a0700fe00000000850000002f000000b70000000a0000009500000000000000e535f8a62fc2868f0399d909a63796c113a80c19aab9d607000000b6cd483be3f0d3253730e711f5969f62c28b22756bedf3cf393d14c46cc4f79fd2b316da4f0de8163f6242fa732300000637c48468766af540439fce41f144631ac262dcae18c3d1a1fbe96dd87235b44174f7c0343185089a0f119e31975e551558055dc2dc"], &(0x7f0000000280)='GPL\x00'}, 0x48) r1 = socket$kcm(0x11, 0x8000000002, 0x300) socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000540)=r0, 0x4) syz_emit_ethernet(0x3e, &(0x7f0000000000)={@broadcast, @random="96c1e9574b31", @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x13, 0x0, 0x0, 0x0, 0x1, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @local}, @time_exceeded={0xb, 0x0, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local, @multicast2}}}}}}, 0x0) 09:33:23 executing program 2: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f00000015c0)=ANY=[@ANYBLOB='%'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x2000, 0x0) execveat(r0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)=[&(0x7f0000000080)='afs\x00'], &(0x7f0000000380)=[&(0x7f0000000100)='em1mime_type\x87^\x00', &(0x7f00000001c0)='self#\x00', &(0x7f0000000240)='trusted\x00', &(0x7f0000000280)='mime_typeppp0)[nodevposix_acl_access\x00', &(0x7f00000002c0)='afs\x00', &(0x7f0000000300)='afs\x00', &(0x7f0000000340)=':cgroup\x00'], 0x400) 09:33:23 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f0000000340)=ANY=[@ANYBLOB="b7020000f7ffffffbfa70000000000002402000020feffff7a0af0fff8ffffff69a4f0ff00000000b70600000018d1fe2d6405000000000075040000000000000704000000000000b7040000100000206a0700fe00000000850000002f000000b70000000a0000009500000000000000e535f8a62fc2868f0399d909a63796c113a80c19aab9d607000000b6cd483be3f0d3253730e711f5969f62c28b22756bedf3cf393d14c46cc4f79fd2b316da4f0de8163f6242fa732300000637c48468766af540439fce41f144631ac262dcae18c3d1a1fbe96dd87235b44174f7c0343185089a0f119e31975e551558055dc2dc"], &(0x7f0000000280)='GPL\x00'}, 0x48) r1 = socket$kcm(0x11, 0x8000000002, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000540)=r0, 0x4) socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') getsockopt$TIPC_DEST_DROPPABLE(r4, 0x10f, 0x81, &(0x7f0000000080), &(0x7f00000000c0)=0x4) [ 1337.976256][T22091] kAFS: Bad value for 'source' [ 1338.051311][T22094] kAFS: unparsable volume name [ 1338.093231][T22094] kAFS: unparsable volume name 09:33:23 executing program 1: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000080)=ANY=[@ANYBLOB='%U'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:33:23 executing program 3: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="2398c593a2303d8df8dc1623f67a060de466e34712df232157116a41dc2b323a699adc0101000000000000ed28515f9ece02c8d482f01d5ee1523b4de13cbe74cc4004a437d127ec8a6b6fcd768b1d1eb28add2c402848f743907236000d5d0a12aca1a89ade47fba48469ea95b6c67196ce16118cea061d52d0284271d4d462c25c00000000000000000000000000b3efc93293ccdfb945d02fa5cf51f1bd043d2954e65d63a6d11d19ae177067e98ea7ce784f6c76f4c7d635995144bc5090cab944"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:33:23 executing program 2: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000000)=ANY=[@ANYBLOB="8bc9b543cc99450995a131503229474f2ec02ac9bf787e00caa9c113a16559828e158c06a85988a94f351de625392ae20eac2dd35ac79ffa70636f089cd2dc4ff848aff94b6036b5fd4707aa476269fd2e2ba60f65fe997d636034609505cace93510b08cd9653ed7238847b6572f20a40"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:33:23 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f0000000340)=ANY=[@ANYBLOB="b7020000f7ffffffbfa70000000000002402000020feffff7a0af0fff8ffffff69a4f0ff00000000b70600000018d1fe2d6405000000000075040000000000000704000000000000b7040000100000206a0700fe00000000850000002f000000b70000000a0000009500000000000000e535f8a62fc2868f0399d909a63796c113a80c19aab9d607000000b6cd483be3f0d3253730e711f5969f62c28b22756bedf3cf393d14c46cc4f79fd2b316da4f0de8163f6242fa732300000637c48468766af540439fce41f144631ac262dcae18c3d1a1fbe96dd87235b44174f7c0343185089a0f119e31975e551558055dc2dc"], &(0x7f0000000280)='GPL\x00'}, 0x48) r1 = socket$kcm(0x11, 0x8000000002, 0x300) socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000540)=r0, 0x4) syz_emit_ethernet(0x3e, &(0x7f0000000000)={@broadcast, @random="96c1e9574b31", @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x1, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @local}, @time_exceeded={0xb, 0x0, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local, @multicast2}}}}}}, 0x0) 09:33:23 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f0000000340)=ANY=[@ANYBLOB="b7020000f7ffffffbfa70000000000002402000020feffff7a0af0fff8ffffff69a4f0ff00000000b70600000018d1fe2d6405000000000075040000000000000704000000000000b7040000100000206a0700fe00000000850000002f000000b70000000a0000009500000000000000e535f8a62fc2868f0399d909a63796c113a80c19aab9d607000000b6cd483be3f0d3253730e711f5969f62c28b22756bedf3cf393d14c46cc4f79fd2b316da4f0de8163f6242fa732300000637c48468766af540439fce41f144631ac262dcae18c3d1a1fbe96dd87235b44174f7c0343185089a0f119e31975e551558055dc2dc"], &(0x7f0000000280)='GPL\x00'}, 0x48) r1 = socket$kcm(0x11, 0x8000000002, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000540)=r0, 0x4) socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = fcntl$dupfd(r2, 0x0, r3) r5 = syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0)='nl80211\x00') sendmsg$NL80211_CMD_GET_REG(r4, &(0x7f00000002c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000100)={&(0x7f00000001c0)={0xa0, r5, 0x400, 0x70bd2c, 0x25dfdbff, {}, [@NL80211_ATTR_USER_REG_HINT_TYPE={0x8, 0x9a, 0x1}, @NL80211_ATTR_REG_RULES={0x24, 0x22, [@NL80211_ATTR_DFS_CAC_TIME={0x8, 0x7, 0x3}, @NL80211_ATTR_FREQ_RANGE_START={0x8, 0x2, 0xffffffff}, @NL80211_ATTR_POWER_RULE_MAX_EIRP={0x8, 0x6, 0x60}, @NL80211_ATTR_DFS_CAC_TIME={0x8, 0x7, 0x4}]}, @NL80211_ATTR_SOCKET_OWNER={0x4}, @NL80211_ATTR_REG_RULES={0x4c, 0x22, [@NL80211_ATTR_POWER_RULE_MAX_EIRP={0x8}, @NL80211_ATTR_REG_RULE_FLAGS={0x8, 0x1, 0x400}, @NL80211_ATTR_POWER_RULE_MAX_ANT_GAIN={0x8, 0x5, 0x7fffffff}, @NL80211_ATTR_FREQ_RANGE_END={0x8, 0x3, 0x2}, @NL80211_ATTR_POWER_RULE_MAX_EIRP={0x8, 0x6, 0x5}, @NL80211_ATTR_POWER_RULE_MAX_EIRP={0x8, 0x6, 0x14}, @NL80211_ATTR_FREQ_RANGE_START={0x8, 0x2, 0x1}, @NL80211_ATTR_FREQ_RANGE_END={0x8, 0x3, 0x82}, @NL80211_ATTR_POWER_RULE_MAX_ANT_GAIN={0x8, 0x5, 0x6972}]}, @NL80211_ATTR_DFS_REGION={0x5, 0x92, 0x9}, @NL80211_ATTR_DFS_REGION={0x5, 0x92, 0x36}]}, 0xa0}, 0x1, 0x0, 0x0, 0x4}, 0x8051005) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') [ 1338.422963][T22313] kAFS: unparsable volume name 09:33:23 executing program 2: r0 = syz_open_dev$ptys(0xc, 0x3, 0x0) ioctl$KDSETKEYCODE(r0, 0x4b4d, &(0x7f0000000100)={0x3, 0x1f}) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f00000015c0)=ANY=[@ANYBLOB="03"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x400, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x0) fchownat(r1, &(0x7f0000000040)='./file0\x00', r2, 0xffffffffffffffff, 0x1000) lsetxattr$trusted_overlay_redirect(&(0x7f00000000c0)='./file0\x00', &(0x7f00000002c0)='trusted.overlay.redirect\x00', &(0x7f00000001c0)='./file0\x00', 0x8, 0x6) socket$caif_stream(0x25, 0x1, 0x3) 09:33:23 executing program 3: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB='#'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:33:23 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0x1e, &(0x7f0000000340)=ANY=[@ANYBLOB="b7020000f7ffffffbfa70000000000002402000020feffff7a0af0fff8ffffff69a4f0ff00000000b70600000018d1fe2d6405000000000075040000000000000704000000000000b7040000100000206a0700fe00000000850000002f00b72ebf80433e5b7100009500000000000000e535f8a62fc2868f03998d94a63796c113a80c19aa96d607000000b6cd483be3f0d3253730e711f5969f62c28b22756bedf3cf393d14c46cc4f79fd2b316da4f0de8163f6242fa732300000637c48468766af540439fce41f144631ac262dcae18c3d1a1fbe96dd87235b44174f7c0343185089a0f119e31975e551558055dc2dc"], &(0x7f0000000280)='GPL\x00', 0x200000, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) r1 = socket$kcm(0x11, 0x8000000002, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000540)=r0, 0x4) socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x840, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') [ 1338.593015][T22421] kAFS: unparsable volume name 09:33:23 executing program 3: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB='#'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1338.643054][T22422] kAFS: unparsable volume name 09:33:23 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f0000000340)=ANY=[@ANYBLOB="b7020000f7ffffffbfa70000000000002402000020feffff7a0af0fff8ffffff69a4f0ff00000000b70600000018d1fe2d6405000000000075040000000000000704000000000000b7040000100000206a0700fe00000000850000002f000000b70000000a0000009500000000000000e535f8a62fc2868f0399d909a63796c113a80c19aab9d607000000b6cd483be3f0d3253730e711f5969f62c28b22756bedf3cf393d14c46cc4f79fd2b316da4f0de8163f6242fa732300000637c48468766af540439fce41f144631ac262dcae18c3d1a1fbe96dd87235b44174f7c0343185089a0f119e31975e551558055dc2dc"], &(0x7f0000000280)='GPL\x00'}, 0x48) r1 = socket$kcm(0x11, 0x8000000002, 0x300) socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000540)=r0, 0x4) syz_emit_ethernet(0x3e, &(0x7f0000000000)={@broadcast, @random="96c1e9574b31", @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x1, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @local}, @time_exceeded={0xb, 0x0, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local, @multicast2}}}}}}, 0x0) 09:33:23 executing program 2: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f00000015c0)=ANY=[@ANYBLOB='%'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg$inet(r1, &(0x7f0000000680)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f00000000c0)="5831255624c13e4c563f221188b6be66ea", 0x11}], 0x1}}, {{&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000002c0)=[{&(0x7f0000000040)="70a6b8247e016ae2647a2e703fce46c432e37d1dffd332a793d4b9e3617386d153", 0x21}, {&(0x7f0000000200)="09f96fbf33ceccc10976cd10b1411ee57d092fd5b7f95a0f19f01005f110463ccb2c6ebdb74ad7a7da1a2bed233154886db68984d477ebee11ce9a8e3510d401f6f31ea0a7e3ec1cda7b95f7a02b42753eb4cf0bbf5afbc7084f9bc2603aafe5da6cd54e4d647ec9fd641e4241513aaf23481d1f390bbb83dfae56369f4b03367ccd45f0ec4cd929aed127394157e7b3794500c0c5f88930b1ff50bbae1163c26fff28d06028", 0xa6}, {&(0x7f0000000100)="38d6cd435749d519cc39e90540f37c4f5c6bceef6c4ae07105cafc5e25d9bbfce859670b89666cca0857aa0c2abd8722a9db0caad3905e3ff682", 0x3a}, {&(0x7f0000000140)="d71206abd00e3c0a7e2440673da6a9fc2c1255a9b136bc982a3dc2ac21ef167250c176acfbd4d13abd86b018e8b1357842d8dc93e53f6b542e9633e1db8672e8", 0x40}], 0x4}}, {{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000380)="df304451b990364b1c6ff9c843eb47125c0a16565b5efbc0494b453f9863364196a743b5d226d34b2293f3b4b8dde4b8434172dec0902f0e03c2893c2bfd5f662eefc2902850a0221d55", 0x4a}, {&(0x7f0000000400)}], 0x2, &(0x7f0000000300)=[@ip_tos_u8={{0x11}}, @ip_ttl={{0x14}}, @ip_ttl={{0x14}}, @ip_tos_u8={{0x11}}, @ip_ttl={{0x14, 0x0, 0x2, 0x8007}}], 0x78}}], 0x3, 0x0) getsockname$l2tp6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2}, &(0x7f0000000080)=0x62751d88b23f07d7) [ 1338.777807][T22530] kAFS: unparsable volume name 09:33:24 executing program 3: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB='#'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1338.929385][T22610] kAFS: unparsable volume name [ 1338.965232][T22610] kAFS: unparsable volume name [ 1339.002981][T22688] kAFS: unparsable volume name 09:33:24 executing program 1: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000080)=ANY=[@ANYBLOB='\\U'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:33:24 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='GPL\x00'}, 0x48) r1 = socket$kcm(0x11, 0x5, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000540)=r0, 0x4) socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = fcntl$dupfd(r2, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r7 = socket$inet_udplite(0x2, 0x2, 0x88) setns(r3, 0x8000000) r8 = fcntl$dupfd(r6, 0x0, r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000080)={0xffffffffffffffff}, 0x27e, 0x7}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r8, &(0x7f0000000580)={0x9, 0x108, 0xfa00, {r9, 0x5, "ed9e70", "1ba5fe6e0c288a4d11c420790f035fc0d8b23bdec5c214a37c39e49f9c9db9a287c2aebb86b6d945cfa84694d64192ae3011749617d3735772a80159bf135b83b4d7175cd62ee946628faf059bd11507468139710d0bb5ecce4b1582b1ec3bb6cd5dcb8ad28b6e773fc8411f336b4b92eb17d8e6774fd7663538e304d3ca544123839e578fe9b86d20f633fd1e025541aedec0fb6b6cd3634d382390e21c57ca5ce481373018df4dbc46a04e072d84fb00010b625a83debca6602b9c840399964e058da0a4d49a3fcf7656d9da2955f0deb1fbfe9c9a6486243155e99cf9044a3a5519fb7d0c10db9bafaa39731c4508ebfc701581b3840e8656bcd95339671e"}}, 0x110) 09:33:24 executing program 2: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f00000015c0)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x800000, 0x0) 09:33:24 executing program 3: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="2398c593a2303d8df8dc1623f67a060de466e34712df232157116a41dc2b323a699adc0101000000000000ed28515f9ece02c8d482f01d5ee1523b4de13cbe74cc4004a437d127ec8a6b6fcd768b1d1eb28add2c402848f743907236000d5d0a12ac"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:33:24 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f0000000340)=ANY=[@ANYBLOB="b7020000f7ffffffbfa70000000000002402000020feffff7a0af0fff8ffffff69a4f0ff00000000b70600000018d1fe2d6405000000000075040000000000000704000000000000b7040000100000206a0700fe00000000850000002f000000b70000000a0000009500000000000000e535f8a62fc2868f0399d909a63796c113a80c19aab9d607000000b6cd483be3f0d3253730e711f5969f62c28b22756bedf3cf393d14c46cc4f79fd2b316da4f0de8163f6242fa732300000637c48468766af540439fce41f144631ac262dcae18c3d1a1fbe96dd87235b44174f7c0343185089a0f119e31975e551558055dc2dc"], &(0x7f0000000280)='GPL\x00'}, 0x48) r1 = socket$kcm(0x11, 0x8000000002, 0x300) socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000540)=r0, 0x4) syz_emit_ethernet(0x3e, &(0x7f0000000000)={@broadcast, @random="96c1e9574b31", @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x30, 0x2, 0x0, 0x0, 0x1, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @local}, @time_exceeded={0xb, 0x0, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local, @multicast2}}}}}}, 0x0) [ 1339.254200][T22751] kAFS: Bad value for 'source' 09:33:24 executing program 3: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB='#'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:33:24 executing program 2: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f00000015c0)=ANY=[@ANYBLOB='\x00'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:33:24 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f0000000580)=ANY=[@ANYBLOB="b7020000f7ffffffbfa70000000000002402000020feffff7a0af0bff8ffffff69a4f0ff00000000b70600000018d1fe2d6405000000000075040000000000000704000000000000b7040000100000206a0700fe00000000850000002f000000b70000000a0000009500000000000000e535f8a22fc2868f0399d909a63796c113a80c19aab9d607000000b6cd483be3f0d3253730e711f5969f62c28b22756bedf3cf393d14c46cc4f79fd2b316da4f0de8163f6242fa732300000637c48468766af540439fce41f144631ac262dcae18c3d1a1fbe96dd87235b44174f7c0343185089a0f119e31975e551558055dc2dc3f296d1816f124b3306d63c258d393795835877e2d7851d113910bfdc1e15cf0b8cbcf29fd230d2bcfc9b5f75b62e2f5e5ba5f756d1563f03486ff5d5f8cdd351658fe3d9748"], &(0x7f0000000280)='GPL\x00'}, 0x48) r1 = socket$kcm(0x11, 0x8000000002, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000540)=r0, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = fcntl$dupfd(r2, 0x0, r3) socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) r6 = socket$inet_udplite(0x2, 0x2, 0x88) r7 = fcntl$dupfd(r5, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) r8 = socket(0x0, 0x80002, 0x0) ioctl(r8, 0x1000008912, &(0x7f00000000c0)="080db5055e0bcfe8696071") r9 = syz_genetlink_get_family_id$fou(&(0x7f00000000c0)='fou\x00') r10 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r10, &(0x7f0000000180), 0x10) socketpair(0x8000000000001e, 0x805, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) getpeername$packet(r11, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000100)=0x14) sendmsg$can_bcm(r10, &(0x7f00000002c0)={&(0x7f0000000140)={0x1d, r12}, 0x10, &(0x7f0000000280)={&(0x7f0000000200)={0x0, 0x0, 0x0, {0x0, 0x2710}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "55e19dc0c30616da"}}, 0x48}}, 0x0) sendmsg$FOU_CMD_DEL(r8, &(0x7f0000000240)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000200)={&(0x7f0000000340)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r9, @ANYBLOB="a51f4205666357ab7644cc43fd2748a71d8147c59faafb76e1d101a6d543ed96ec09d909e5427efeb4eba69a47087b", @ANYRES32=r12, @ANYBLOB="0500020002000000050003002c00000006000a004e220000"], 0x34}, 0x1, 0x0, 0x0, 0x810}, 0x8000) ioctl$PIO_CMAP(r7, 0x4b71, &(0x7f0000000040)={0x6, 0x7, 0x3f, 0x10000, 0x7fff, 0x2}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) syz_genetlink_get_family_id$nl80211(&(0x7f0000000100)='nl80211\x00') [ 1339.425476][T22860] kAFS: unparsable volume name 09:33:24 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f0000000340)=ANY=[@ANYBLOB="b7020000f7ffffffbfa70000000000002402000020feffff7a0af0fff8ffffff69a4f0ff00000000b70600000018d1fe2d6405000000000075040000000000000704000000000000b7040000100000206a0700fe00000000850000002f000000b70000000a0000009500000000000000e535f8a62fc2868f0399d909a63796c113a80c19aab9d607000000b6cd483be3f0d3253730e711f5969f62c28b22756bedf3cf393d14c46cc4f79fd2b316da4f0de8163f6242fa732300000637c48468766af540439fce41f144631ac262dcae18c3d1a1fbe96dd87235b44174f7c0343185089a0f119e31975e551558055dc2dc"], &(0x7f0000000280)='GPL\x00'}, 0x48) r1 = socket$kcm(0x11, 0x8000000002, 0x300) socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000540)=r0, 0x4) syz_emit_ethernet(0x3e, &(0x7f0000000000)={@broadcast, @random="96c1e9574b31", @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x30, 0x3, 0x0, 0x0, 0x1, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @local}, @time_exceeded={0xb, 0x0, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local, @multicast2}}}}}}, 0x0) 09:33:24 executing program 3: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB='#'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:33:24 executing program 2: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) timer_create(0x3, &(0x7f0000000000)={0x0, 0x7f, 0x1, @tid=r0}, &(0x7f0000000040)) [ 1339.549011][T22868] kAFS: Bad value for 'source' [ 1339.584828][T22873] kAFS: unparsable volume name 09:33:24 executing program 3: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB='#'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1339.730014][T22981] kAFS: unparsable volume name [ 1339.753369][T22984] kAFS: unparsable volume name [ 1339.779863][T22981] kAFS: unparsable volume name 09:33:25 executing program 1: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000080)=ANY=[@ANYBLOB='#/'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:33:25 executing program 3: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="2398c593a2303d8df8dc1623f67a060de466e34712df232157116a41dc2b323a699adc0101000000000000ed28515f9ece02"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:33:25 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f0000000340)=ANY=[@ANYBLOB="b7020000f7ffffffbfa70000000000002402000020feffff7a0af0fff8ffffff69a4f0ff00000000b70600000018d1fe2d6405000000000075040000000000000704000000000000b7040000100000206a0700fe00000000850000002f000000b70000000a0000009500000000000000e535f8a62fc2868f0399d909a63796c113a80c19aab9d607000000b6cd483be3f0d3253730e711f5969f62c28b22756bedf3cf393d14c46cc4f79fd2b316da4f0de8163f6242fa732300000637c48468766af540439fce41f144631ac262dcae18c3d1a1fbe96dd87235b44174f7c0343185089a0f119e31975e551558055dc2dc"], &(0x7f0000000280)='GPL\x00'}, 0x48) r1 = socket$kcm(0x11, 0x8000000002, 0x300) socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000540)=r0, 0x4) syz_emit_ethernet(0x3e, &(0x7f0000000000)={@broadcast, @random="96c1e9574b31", @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x30, 0x4, 0x0, 0x0, 0x1, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @local}, @time_exceeded={0xb, 0x0, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local, @multicast2}}}}}}, 0x0) 09:33:25 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f0000000340)=ANY=[@ANYBLOB="b7020000f7ffffffbfa70000000000002402000020feffff7a0af0fff8ffffff69a4f0ff00000000b70600000018d1fe2d6405000000000075040000000000000704000000000000b7040000100000206a0700fe00000000850000002f000000b70000000a0000009500000000000000e535f8a62fc2868f0399d909a63796c113a80c19aab9d607000000b6cd483be3f0d3253730e711f5969f62c28b22756bedf3cf393d14c46cc4f79fd2b316da4f0de8163f6242fa732300000637c48468766af540439fce41f144631ac262dcae18c3d1a1fbe96dd87235b44174f7c0343185089a0f119e31975e551558055dc2dc"], &(0x7f0000000280)='GPL\x00'}, 0x48) r1 = socket$kcm(0x11, 0x8000000002, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000540)=r0, 0x4) socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') ioctl$SNDRV_TIMER_IOCTL_START(r4, 0x54a0) [ 1339.910983][T22989] kAFS: unparsable volume name 09:33:25 executing program 3: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="2398"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:33:25 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f0000000340)=ANY=[@ANYBLOB="b7020000f7ffffffbfa70000000000002402000020feffff7a0af0fff8ffffff69a4f0ff00000000b70600000018d1fe2d6405000000000075040000000000000704000000000000b7040000100000206a0700fe00000000850000002f000000b70000000a0000009500000000000000e535f8a62fc2868f0399d909a63796c113a80c19aab9d607000000b6cd483be3f0d3253730e711f5969f62c28b22756bedf3cf393d14c46cc4f79fd2b316da4f0de8163f6242fa732300000637c48468766af540439fce41f144631ac262dcae18c3d1a1fbe96dd87235b44174f7c0343185089a0f119e31975e551558055dc2dc"], &(0x7f0000000280)='GPL\x00'}, 0x48) r1 = socket$kcm(0x11, 0x8000000002, 0x300) socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000540)=r0, 0x4) syz_emit_ethernet(0x3e, &(0x7f0000000000)={@broadcast, @random="96c1e9574b31", @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x30, 0x6, 0x0, 0x0, 0x1, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @local}, @time_exceeded={0xb, 0x0, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local, @multicast2}}}}}}, 0x0) 09:33:25 executing program 3: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="2398"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:33:25 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f0000000340)=ANY=[@ANYBLOB="b7020000f7ffffffbfa70000000000002402000020feffff7a0af0fff8ffffff69a4f0ff00000000b70600000018d1fe2d6405000000000075040000000000000704000000000000b7040000100000206a0700fe00000000850000002f000000b70000000a0000009500000000000000e535f8a62fc2868f0399d909a63796c113a80c19aab9d607000000b6cd483be3f0d3253730e711f5969f62c28b22756bedf3cf393d14c46cc4f79fd2b316da4f0de8163f6242fa732300000637c48468766af540439fce41f144631ac262dcae18c3d1a1fbe96dd87235b44174f7c0343185089a0f119e31975e551558055dc2dc"], &(0x7f0000000280)='GPL\x00'}, 0x48) socket$kcm(0x11, 0x8000000002, 0x300) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) accept4(r1, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c81", 0x10) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$inet(r3, &(0x7f0000000680)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f00000000c0)="5831255624c13e4c563f221188b6be66ea", 0x11}], 0x1}}, {{&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000002c0)=[{&(0x7f0000000040)="70a6b8247e016ae2647a2e703fce46c432e37d1dffd332a793d4b9e3617386d153", 0x21}, {&(0x7f0000000200)="09f96fbf33ceccc10976cd10b1411ee57d092fd5b7f95a0f19f01005f110463ccb2c6ebdb74ad7a7da1a2bed233154886db68984d477ebee11ce9a8e3510d401f6f31ea0a7e3ec1cda7b95f7a02b42753eb4cf0bbf5afbc7084f9bc2603aafe5da6cd54e4d647ec9fd641e4241513aaf23481d1f390bbb83dfae56369f4b03367ccd45f0ec4cd929aed127394157e7b3794500c0c5f88930b1ff50bbae1163c26fff28d06028", 0xa6}, {&(0x7f0000000100)="38d6cd435749d519cc39e90540f37c4f5c6bceef6c4ae07105cafc5e25d9bbfce859670b89666cca0857aa0c2abd8722a9db0caad3905e3ff682", 0x3a}, {&(0x7f0000000140)="d71206abd00e3c0a7e2440673da6a9fc2c1255a9b136bc982a3dc2ac21ef167250c176acfbd4d13abd86b018e8b1357842d8dc93e53f6b542e9633e1db8672e8", 0x40}], 0x4}}, {{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000380)="df304451b990364b1c6ff9c843eb47125c0a16565b5efbc0494b453f9863364196a743b5d226d34b2293f3b4b8dde4b8434172dec0902f0e03c2893c2bfd5f662eefc2902850a0221d55", 0x200003ca}, {&(0x7f0000000400)}], 0x2, &(0x7f0000000540)=[@ip_tos_u8={{0x11}}, @ip_ttl={{0x14}}, @ip_ttl={{0x14}}, @ip_tos_u8={{0x11}}], 0x60}}], 0x3, 0x0) socketpair$unix(0x1, 0x4, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r4, 0x1, 0x32, &(0x7f0000000540)=r0, 0x4) socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = syz_open_dev$radio(&(0x7f0000000300)='/dev/radio#\x00', 0x2, 0x2) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(r7, 0xc0905664, &(0x7f0000000440)={0x0, 0x0, [], @raw_data=[0x7f, 0x80000001, 0x7fff, 0x7e, 0x8, 0x3077, 0xfffff101, 0x6, 0x4, 0x3, 0x2, 0x40, 0xf4, 0x2, 0x0, 0x0, 0x8, 0x8, 0x7, 0x7f, 0x2, 0x3, 0xfffffff7, 0x64f, 0x6, 0x0, 0xa59, 0x10000, 0x7, 0x87f5, 0x6, 0x8]}) r8 = socket$inet_udplite(0x2, 0x2, 0x88) r9 = fcntl$dupfd(r5, 0x0, r8) ioctl$FS_IOC_GET_ENCRYPTION_KEY_STATUS(r6, 0xc080661a, &(0x7f0000000080)={{0x2, 0x0, @descriptor="a8ca3ee8cd9c6406"}}) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') 09:33:25 executing program 3: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="2398"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:33:25 executing program 3: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="2398c593a2303d8df8dc1623f67a060de466e34712df23215711"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:33:25 executing program 2: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f00000015c0)=ANY=[@ANYBLOB='%'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/ignore_tunneled\x00', 0x2, 0x0) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_WINDOW(r0, &(0x7f00000001c0)={&(0x7f0000000040), 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x34, r1, 0x601, 0x70bd25, 0x25dfdbfb, {{}, {}, {0x18, 0x18, {0x81, @bearer=@l2={'eth', 0x3a, 'netdevsim0\x00'}}}}, ["", ""]}, 0x34}, 0x1, 0x0, 0x0, 0x10000090}, 0x40000) 09:33:25 executing program 3: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="2398c593a2303d8df8dc1623f67a060de466e34712df23215711"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1340.854159][T23230] kAFS: unparsable volume name [ 1340.894866][T23230] kAFS: unparsable volume name 09:33:26 executing program 1: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000080)=ANY=[@ANYBLOB='#\\'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:33:26 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f0000000340)=ANY=[@ANYBLOB="b7020000f7ffffffbfa70000000000002402000020feffff7a0af0fff8ffffff69a4f0ff00000000b70600000018d1fe2d6405000000000075040000000000000704000000000000b7040000100000206a0700fe00000000850000002f000000b70000000a0000009500000000000000e535f8a62fc2868f0399d909a63796c113a80c19aab9d607000000b6cd483be3f0d3253730e711f5969f62c28b22756bedf3cf393d14c46cc4f79fd2b316da4f0de8163f6242fa732300000637c48468766af540439fce41f144631ac262dcae18c3d1a1fbe96dd87235b44174f7c0343185089a0f119e31975e551558055dc2dc"], &(0x7f0000000280)='GPL\x00'}, 0x48) r1 = socket$kcm(0x11, 0x8000000002, 0x300) socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000540)=r0, 0x4) syz_emit_ethernet(0x3e, &(0x7f0000000000)={@broadcast, @random="96c1e9574b31", @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x30, 0x7, 0x0, 0x0, 0x1, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @local}, @time_exceeded={0xb, 0x0, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local, @multicast2}}}}}}, 0x0) 09:33:26 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f0000000340)=ANY=[@ANYBLOB="b7020000f7ffffffbfa70000000000002402000020feffff7a0af0fff8ffffff69a4f0ff00000000b70600000018d1fe2d6405000000000075040000000000000704000000000000b7040000100000206a0700fe00000000850000002f000000b70000000a0000009500000000000000e535f8a62fc2868f0399d909a63796c113a80c19aab9d607000000b6cd483be3f0d3253730e711f5969f62c28b22756bedf3cf393d14c46cc4f79fd2b316da4f0de8163f6242fa732300000637c48468766af540439fce41f144631ac262dcae18c3d1a1fbe96dd87235b44174f7c0343185089a0f119e31975e551558055dc2dc"], &(0x7f0000000280)='GPL\x00'}, 0x48) r1 = socket$kcm(0x11, 0x8000000002, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000540)=r0, 0x4) socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCFLSH(r4, 0x8910, 0x0) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r5, 0x5423, &(0x7f0000000000)=0x6) ioctl$TCFLSH(r5, 0x8910, 0x0) r6 = dup2(r4, r5) r7 = syz_genetlink_get_family_id$team(&(0x7f00000000c0)='team\x00') socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000380)={0xffffffffffffffff}) r9 = fcntl$dupfd(r8, 0x0, r8) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) r10 = socket(0x0, 0x80002, 0x0) ioctl(r10, 0x1000008912, &(0x7f00000000c0)="080db5055e0bcfe8696071") r11 = socket$alg(0x26, 0x5, 0x0) bind$alg(r11, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r12 = accept4(r11, 0x0, 0x0, 0x0) sendmmsg$inet(r12, &(0x7f0000000680)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f00000000c0)="5831255624c13e4c563f221188b6be66ea", 0x11}], 0x1}}, {{&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000002c0)=[{&(0x7f0000000040)="70a6b8247e016ae2647a2e703fce46c432e37d1dffd332a793d4b9e3617386d153", 0x21}, {&(0x7f0000000200)="09f96fbf33ceccc10976cd10b1411ee57d092fd5b7f95a0f19f01005f110463ccb2c6ebdb74ad7a7da1a2bed233154886db68984d477ebee11ce9a8e3510d401f6f31ea0a7e3ec1cda7b95f7a02b42753eb4cf0bbf5afbc7084f9bc2603aafe5da6cd54e4d647ec9fd641e4241513aaf23481d1f390bbb83dfae56369f4b03367ccd45f0ec4cd929aed127394157e7b3794500c0c5f88930b1ff50bbae1163c26fff28d06028", 0xa6}, {&(0x7f0000000100)="38d6cd435749d519cc39e90540f37c4f5c6bceef6c4ae07105cafc5e25d9bbfce859670b89666cca0857aa0c2abd8722a9db0caad3905e3ff682", 0x3a}, {&(0x7f0000000140)="d71206abd00e3c0a7e2440673da6a9fc2c1255a9b136bc982a3dc2ac21ef167250c176acfbd4d13abd86b018e8b1357842d8dc93e53f6b542e9633e1db8672e8", 0x40}], 0x4}}, {{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000380)="df304451b990364b1c6ff9c843eb47125c0a16565b5efbc0494b453f9863364196a743b5d226d34b2293f3b4b8dde4b8434172dec0902f0e03c2893c2bfd5f662eefc2902850a0221d55", 0x200003ca}, {&(0x7f0000000400)}], 0x2, &(0x7f0000000540)=[@ip_tos_u8={{0x11}}, @ip_ttl={{0x14}}, @ip_ttl={{0x14}}, @ip_tos_u8={{0x11}}], 0x60}}], 0x3, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r12, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@empty, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6}}, &(0x7f0000000280)=0xeb6c60fee552a2cc) r14 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r14, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r14, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, r15, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$TEAM_CMD_PORT_LIST_GET(r6, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000002c0)={0x60, r7, 0x8, 0x70bd2b, 0x25dfdbfc, {}, [{{0x8, 0x1, r13}, {0x44, 0x2, [{0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r15}}, {0x8}}}]}}]}, 0x60}, 0x1, 0x0, 0x0, 0x6f92a2c59184ece0}, 0x4000) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x18, 0x9, 0x3766ba15, 0x8, 0x400, 0xffffffffffffffff, 0x1, [], r13, 0xffffffffffffffff, 0x4, 0x3}, 0x3c) r16 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r16, 0x8912, 0x400200) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') 09:33:26 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000001980)=ANY=[@ANYBLOB="004db1861e629870e89762a5bb7416d2c37e4770503d2355f659834d163b61aad5b9701e446155537c737d1376ff49f03feec5a4f25d5ff1e337459811ca5ceb0aaa17681dfec426e5dbb6194a51bdd0b83dd17f79436589ec5f240e19aab8a26818abe69f6be7ea99570b46d026d039b021dde8e60a15"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) r0 = getpgid(0xffffffffffffffff) process_vm_readv(r0, &(0x7f00000000c0)=[{&(0x7f0000000000)=""/152, 0x98}, {&(0x7f0000000240)=""/224, 0xe0}, {&(0x7f0000000340)=""/193, 0xc1}, {&(0x7f0000000440)=""/4096, 0x1000}, {&(0x7f0000001440)=""/241, 0xf1}, {&(0x7f0000001600)=""/236, 0xec}], 0x6, &(0x7f0000001540)=[{&(0x7f0000001700)=""/160, 0xa0}, {&(0x7f00000001c0)=""/61, 0x3d}, {&(0x7f00000017c0)=""/138, 0x8a}, {&(0x7f0000001880)=""/250, 0xfa}], 0x4, 0x0) r1 = socket(0x0, 0x80002, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000000c0)="080db5055e0bcfe8696071") ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000001a00)={0xffffffffffffffff}) r3 = socket$inet_tcp(0x2, 0x1, 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, r3) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000200), &(0x7f0000000240)=0xc) r5 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000001300)='NLBL_UNLBL\x00') sendmsg$NLBL_UNLABEL_C_STATICADD(r4, &(0x7f0000001500)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0xc300002}, 0xc, &(0x7f00000014c0)={&(0x7f0000001580)=ANY=[@ANYBLOB="004ea1965f477004791bb768db0e2ed8f7920b5f4c25965fafc65d8af5d5ea4215b53685dfc7d4a3f96924f342f0c040ee19f4c0037c28f9610a5f1598586e836e75b87850af", @ANYRES16=r5, @ANYBLOB="02002cbd7000fbdbdf25030000002000070073797374656d5f753a6f626a6563745f723a6574635f743a73300000"], 0x34}, 0x1, 0x0, 0x0, 0x1}, 0x8000) r6 = socket$alg(0x26, 0x5, 0x0) bind$alg(r6, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r7 = accept4(r6, 0x0, 0x0, 0x0) sendmmsg$inet(r7, &(0x7f0000000680)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f00000000c0)="5831255624c13e4c563f221188b6be66ea", 0x11}], 0x1}}, {{&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000002c0)=[{&(0x7f0000000040)="70a6b8247e016ae2647a2e703fce46c432e37d1dffd332a793d4b9e3617386d153", 0x21}, {&(0x7f0000000200)="09f96fbf33ceccc10976cd10b1411ee57d092fd5b7f95a0f19f01005f110463ccb2c6ebdb74ad7a7da1a2bed233154886db68984d477ebee11ce9a8e3510d401f6f31ea0a7e3ec1cda7b95f7a02b42753eb4cf0bbf5afbc7084f9bc2603aafe5da6cd54e4d647ec9fd641e4241513aaf23481d1f390bbb83dfae56369f4b03367ccd45f0ec4cd929aed127394157e7b3794500c0c5f88930b1ff50bbae1163c26fff28d06028", 0xa6}, {&(0x7f0000000100)="38d6cd435749d519cc39e90540f37c4f5c6bceef6c4ae07105cafc5e25d9bbfce859670b89666cca0857aa0c2abd8722a9db0caad3905e3ff682", 0x3a}, {&(0x7f0000000140)="d71206abd00e3c0a7e2440673da6a9fc2c1255a9b136bc982a3dc2ac21ef167250c176acfbd4d13abd86b018e8b1357842d8dc93e53f6b542e9633e1db8672e8", 0x40}], 0x4}}, {{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000380)="df304451b990364b1c6ff9c843eb47125c0a16565b5efbc0494b453f9863364196a743b5d226d34b2293f3b4b8dde4b8434172dec0902f0e03c2893c2bfd5f662eefc2902850a0221d55", 0x200003ca}, {&(0x7f0000000400)}], 0x2, &(0x7f0000000540)=[@ip_tos_u8={{0x11}}, @ip_ttl={{0x14}}, @ip_ttl={{0x14}}, @ip_tos_u8={{0x11}}], 0x60}}], 0x3, 0x0) r8 = socket(0x0, 0x80002, 0x0) ioctl(r2, 0x1000008912, &(0x7f0000001b80)="080db5055e0bcfe8696071") sendmsg$NLBL_UNLABEL_C_STATICADDDEF(r8, &(0x7f0000001b40)={&(0x7f0000001a40)={0x10, 0x0, 0x0, 0x480}, 0xc, &(0x7f0000001b00)={&(0x7f0000001bc0)=ANY=[@ANYBLOB='l\x00\x00\x00', @ANYRES16=r5, @ANYBLOB="000128bd70004000000006000000000001000100000008000500ac1e000108000500e0000002080004000000000000000100010000000900060074756e6c30000000000000000000000014000300000000000000000000000000000000000500010000000000571be0"], 0x6c}, 0x1, 0x0, 0x0, 0x4000}, 0x10) 09:33:26 executing program 3: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="2398c593a2303d8df8dc1623f67a060de466e34712df23215711"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:33:26 executing program 2: socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$LOOP_SET_BLOCK_SIZE(r2, 0x4c09, 0x7ff) mount(&(0x7f00000015c0)=ANY=[@ANYBLOB='%'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = fcntl$dupfd(r3, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$SNDRV_RAWMIDI_IOCTL_STATUS64(r5, 0xc0385720, &(0x7f0000000000)) [ 1341.054990][T23337] kAFS: Bad value for 'source' [ 1341.171161][T23337] kAFS: Bad value for 'source' 09:33:26 executing program 3: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="2398c593a2303d8df8dc1623f67a060de466e34712df232157116a41dc2b323a699adc010100"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:33:26 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f0000000340)=ANY=[@ANYBLOB="b7020000f7ffffffbfa70000000000002402000020feffff7a0af0fff8ffffff69a4f0ff00000000b70600000018d1fe2d6405000000000075040000000000000704000000000000b7040000100000206a0700fe00000000850000002f000000b70000000a0000009500000000000000e535f8a62fc2868f0399d909a63796c113a80c19aab9d607000000b6cd483be3f0d3253730e711f5969f62c28b22756bedf3cf393d14c46cc4f79fd2b316da4f0de8163f6242fa732300000637c48468766af540439fce41f144631ac262dcae18c3d1a1fbe96dd87235b44174f7c0343185089a0f119e31975e551558055dc2dc"], &(0x7f0000000280)='GPL\x00'}, 0x48) r1 = socket$kcm(0x11, 0x8000000002, 0x300) socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000540)=r0, 0x4) syz_emit_ethernet(0x3e, &(0x7f0000000000)={@broadcast, @random="96c1e9574b31", @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x30, 0x8, 0x0, 0x0, 0x1, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @local}, @time_exceeded={0xb, 0x0, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local, @multicast2}}}}}}, 0x0) 09:33:26 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000580)={r1, 0x0, 0x1, [0x0]}, 0xa) getsockopt$inet_sctp_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000001580)={r1, 0x20}, &(0x7f0000001800)=0x8) mount(&(0x7f00000015c0)=ANY=[@ANYBLOB='#'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:33:26 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f0000000340)=ANY=[@ANYBLOB="b7020000f7ffffffbfa70000000000002402000020feffff7a0af0fff8ffffff69a4f0ff00000000b70600000018d1fe2d6405000000000075040000000000000704000000000000b7040000100000206a0700fe00000000850000002f000000b70000000a0000009500000000000000e535f8a62fc2868f0399d909a63796c113a80c19aab9d607000000b6cd483be3f0d3253730e711f5969f62c28b22756bedf3cf393d14c46cc4f79fd2b316da4f0de8163f6242fa732300000637c48468766af540439fce41f144631ac262dcae18c3d1a1fbe96dd87235b44174f7c0343185089a0f119e31975e551558055dc2dc"], &(0x7f0000000280)='GPL\x00'}, 0x48) r1 = socket$kcm(0x11, 0x8000000002, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000540)=r0, 0x4) socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = socket(0x0, 0x80002, 0x0) ioctl(r4, 0x1000008912, &(0x7f00000000c0)="080db5055e0bcfe8696071") ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000080)={'vlan1\x00', 0x400}) r5 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') 09:33:26 executing program 3: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="2398c593a2303d8df8dc1623f67a060de466e34712df232157116a41dc2b323a699adc010100"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1341.481105][T23656] kAFS: unparsable volume name 09:33:26 executing program 3: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="2398c593a2303d8df8dc1623f67a060de466e34712df23215711"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:33:27 executing program 1: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000080)=ANY=[@ANYBLOB='#U'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x2, 0x0) 09:33:27 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg$inet(r1, &(0x7f0000000680)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f00000000c0)="5831255624c13e4c563f221188b6be66ea", 0x11}], 0x1}}, {{&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000002c0)=[{&(0x7f0000000040)="70a6b8247e016ae2647a2e703fce46c432e37d1dffd332a793d4b9e3617386d153", 0x21}, {&(0x7f0000000200)="09f96fbf33ceccc10976cd10b1411ee57d092fd5b7f95a0f19f01005f110463ccb2c6ebdb74ad7a7da1a2bed233154886db68984d477ebee11ce9a8e3510d401f6f31ea0a7e3ec1cda7b95f7a02b42753eb4cf0bbf5afbc7084f9bc2603aafe5da6cd54e4d647ec9fd641e4241513aaf23481d1f390bbb83dfae56369f4b03367ccd45f0ec4cd929aed127394157e7b3794500c0c5f88930b1ff50bbae1163c26fff28d06028", 0xa6}, {&(0x7f0000000100)="38d6cd435749d519cc39e90540f37c4f5c6bceef6c4ae07105cafc5e25d9bbfce859670b89666cca0857aa0c2abd8722a9db0caad3905e3ff682", 0x3a}, {&(0x7f0000000140)="d71206abd00e3c0a7e2440673da6a9fc2c1255a9b136bc982a3dc2ac21ef167250c176acfbd4d13abd86b018e8b1357842d8dc93e53f6b542e9633e1db8672e8", 0x40}], 0x4}}, {{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000380)="df304451b990364b1c6ff9c843eb47125c0a16565b5efbc0494b453f9863364196a743b5d226d34b2293f3b4b8dde4b8434172dec0902f0e03c2893c2bfd5f662eefc2902850a0221d55", 0x200003ca}, {&(0x7f0000000400)}], 0x2, &(0x7f0000000540)=[@ip_tos_u8={{0x11}}, @ip_ttl={{0x14}}, @ip_ttl={{0x14}}, @ip_tos_u8={{0x11}}], 0x60}}], 0x3, 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001140)='/dev/fuse\x00', 0x2, 0x0) fremovexattr(r2, &(0x7f0000001180)=@random={'system.', '^cgroupvboxnet0obdev(\x00'}) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, &(0x7f0000000100)={0x9d0000, 0xf2, 0x80, r1, 0x0, &(0x7f0000000040)={0x9a0919, 0xfffffffd, [], @ptr}}) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r5 = accept4(r4, 0x0, 0x0, 0x0) r6 = socket$alg(0x26, 0x5, 0x0) bind$alg(r6, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r7 = accept4(r6, 0x0, 0x0, 0x0) sendmmsg$inet(r7, &(0x7f0000000680)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f00000000c0)="5831255624c13e4c563f221188b6be66ea", 0x11}], 0x1}}, {{&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000002c0)=[{&(0x7f0000000040)="70a6b8247e016ae2647a2e703fce46c432e37d1dffd332a793d4b9e3617386d153", 0x21}, {&(0x7f0000000200)="09f96fbf33ceccc10976cd10b1411ee57d092fd5b7f95a0f19f01005f110463ccb2c6ebdb74ad7a7da1a2bed233154886db68984d477ebee11ce9a8e3510d401f6f31ea0a7e3ec1cda7b95f7a02b42753eb4cf0bbf5afbc7084f9bc2603aafe5da6cd54e4d647ec9fd641e4241513aaf23481d1f390bbb83dfae56369f4b03367ccd45f0ec4cd929aed127394157e7b3794500c0c5f88930b1ff50bbae1163c26fff28d06028", 0xa6}, {&(0x7f0000000100)="38d6cd435749d519cc39e90540f37c4f5c6bceef6c4ae07105cafc5e25d9bbfce859670b89666cca0857aa0c2abd8722a9db0caad3905e3ff682", 0x3a}, {&(0x7f0000000140)="d71206abd00e3c0a7e2440673da6a9fc2c1255a9b136bc982a3dc2ac21ef167250c176acfbd4d13abd86b018e8b1357842d8dc93e53f6b542e9633e1db8672e8", 0x40}], 0x4}}, {{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000380)="df304451b990364b1c6ff9c843eb47125c0a16565b5efbc0494b453f9863364196a743b5d226d34b2293f3b4b8dde4b8434172dec0902f0e03c2893c2bfd5f662eefc2902850a0221d55", 0x200003ca}, {&(0x7f0000000400)}], 0x2, &(0x7f0000000540)=[@ip_tos_u8={{0x11}}, @ip_ttl={{0x14}}, @ip_ttl={{0x14}}, @ip_tos_u8={{0x11}}], 0x60}}], 0x3, 0x0) socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r9 = socket$inet_udplite(0x2, 0x2, 0x88) r10 = fcntl$dupfd(r8, 0x0, r9) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) ioctl$VIDIOC_REQBUFS(r10, 0xc0145608, &(0x7f00000011c0)={0x29522203, 0xf, 0x3}) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000580)={r11, 0x0, 0x1, [0x0]}, 0xa) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r7, 0x84, 0x6d, &(0x7f0000008200)={r11, 0xf7, "161f373e548e949015c874e376cf736e9370987107fa5523053e067d8937a372f79e1bc9daa022a3ac25049430a47d75c2d29c07bf7a5070a423d1d39e5ba30f0249c89da0acf28e48d4e1c792ee3ebcb5dc05aac560c19011ef557abdd2243d5265c683fc744cf32d1201338b724875ea4aac1f718d5c2a7b6e0028ae65e069d35ddd000a5ff9bc408a90093358e1e31fa31186907d1cd149ed608164e9f021b1baa76b8f865685472d924e57d824ee558ce13b9516bf03f25b168c6f2870ad96bdec51f9c6023ac604ad5370922a37c67020c347fe501b5257dd811d36b217b6a56ea22c04bee7461a21dbee501b6771eb799648fae3"}, &(0x7f0000008300)=0xff) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f00000012c0)={@loopback, @initdev, 0x0}, &(0x7f0000001300)=0xc) sendmsg$nl_route_sched(r3, &(0x7f00000013c0)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x8480b046}, 0xc, &(0x7f0000001380)={&(0x7f0000001340)=@gettfilter={0x34, 0x2e, 0x20, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, r12, {0x2, 0xa}, {0xc, 0xfff5}, {0x2, 0x7}}, [{0x8, 0xb, 0x6b}, {0x8, 0xb, 0x8}]}, 0x34}, 0x1, 0x0, 0x0, 0x7820bb0ad4dc9cc3}, 0xce90e03ba55c6844) sendmmsg$inet(r5, &(0x7f0000000680)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f00000000c0)="5831255624c13e4c563f221188b6be66ea", 0x11}], 0x1}}, {{&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000002c0)=[{&(0x7f0000000040)="70a6b8247e016ae2647a2e703fce46c432e37d1dffd332a793d4b9e3617386d153", 0x21}, {&(0x7f0000000200)="09f96fbf33ceccc10976cd10b1411ee57d092fd5b7f95a0f19f01005f110463ccb2c6ebdb74ad7a7da1a2bed233154886db68984d477ebee11ce9a8e3510d401f6f31ea0a7e3ec1cda7b95f7a02b42753eb4cf0bbf5afbc7084f9bc2603aafe5da6cd54e4d647ec9fd641e4241513aaf23481d1f390bbb83dfae56369f4b03367ccd45f0ec4cd929aed127394157e7b3794500c0c5f88930b1ff50bbae1163c26fff28d06028", 0xa6}, {&(0x7f0000000100)="38d6cd435749d519cc39e90540f37c4f5c6bceef6c4ae07105cafc5e25d9bbfce859670b89666cca0857aa0c2abd8722a9db0caad3905e3ff682", 0x3a}, {&(0x7f0000000140)="d71206abd00e3c0a7e2440673da6a9fc2c1255a9b136bc982a3dc2ac21ef167250c176acfbd4d13abd86b018e8b1357842d8dc93e53f6b542e9633e1db8672e8", 0x40}], 0x4}}, {{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000380)="df304451b990364b1c6ff9c843eb47125c0a16565b5efbc0494b453f9863364196a743b5d226d34b2293f3b4b8dde4b8434172dec0902f0e03c2893c2bfd5f662eefc2902850a0221d55", 0x200003ca}, {&(0x7f0000000400)}], 0x2, &(0x7f0000000540)=[@ip_tos_u8={{0x11}}, @ip_ttl={{0x14}}, @ip_ttl={{0x14}}, @ip_tos_u8={{0x11}}], 0x60}}], 0x3, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000640)={0x0, @multicast2, @broadcast}, &(0x7f0000006a80)=0xc) sendmmsg(r3, &(0x7f00000080c0)=[{{&(0x7f0000000400)=@l2tp={0x2, 0x0, @local, 0x1}, 0x80, &(0x7f0000000480)=[{&(0x7f0000000840)="c31f5e035473ac540f623b1455c55bf5a6a282ab80d38c010633c5d02389ffb6ea0f06a9e2d79e44e5b5f280564f1356f44c87ea76d552940ff5f405be191737de17cb225f5502a1265a99590f3e6bff2466d0b5d970a737192132ec6574ca12a376b7960dda4aed676fa032019873c7450e14604dac5a92985f9601b7c4a21167b3f8913debbd19e0a727a489f39a555ac68940ab86a23d8ec1b1a9db7718c1675afa3e0c3999622f4906b3f53660dae7e8903707b09cfadcbd2f9b5ee4f673194cd735efeb84b4ff0d59ec20766189512063a44a03e4337bde8b9906aea8b739f2b74ddb04c76a5b775f21a366", 0xee}], 0x1, &(0x7f0000000940)=[{0xe8, 0x87, 0x80000, "cf9d39b0096a22933efb0b8343a8ff4156253e065e13ed4e71b9bb1d95c83e9c6825868d16ec98628344c6f355adb456098356e65364ddf2a0e4b8ed66db8e6e454855803498190ec97f820206f88f49223c453c94bf05a09317457496d167e83316d1bb4977f69d1b372311e2f73d8424ae3eab02a735923ce50b517d06051ced165868cae70534febe61cbe8fdc4921674660f87543fe43e7906875139dc68cf73f0e8110ee2fad4f796fcbd530c9b649919a04fa4d09822462e4fcc49a52cb4fba15a4d8c94b6ff3ccc6a17a7f614bd7e040076bee1"}, {0x28, 0x345, 0x10001, "bd1ba8a92430daea65719fd6b70da4b1ba05b6382a71026b"}, {0x38, 0xbaf350f95a7db0e8, 0x1, "df66aa08c36b9c0e101de021cd678d4b6040e966b328e2e36a3a57475f3ccd0fc9b838f9e2d7"}, {0xc0, 0x114, 0xfffffe9a, "d75548e36be3b90967f5bbafa72691b9e8e9ce68dba76c0ad08c770a6bde97a5484b7d2963ec5bad1099e14c8bce911549478ceb85bd3b5a65d4fb52a4d88d2dbb5ff7fb29037c7ae220dcdc5d39d4bb12287a9a7e988845f2515d4338854c61904827032dc05d0ac7d0f68252faa6f3eb3c0b40395547c6c3948eb44115484db5df24f34d01f4910c280faa0d4fbbf0be8f9f88d641eea929a4eb9a682ea675063f5c469b8d406e59"}, {0x18, 0xff, 0xffffffff, "aa2a4035"}, {0x70, 0x6, 0x1, "4e5d05526b89a82e1e020f5f61eeef3dcb74a8e5f92eb119f7d08a84b1adedf7e67a9aaa238eca84a17f03ad1bee2e1d845a428bddbe86889a028409f06c4fbb4c88bea02ada2f5c8b41d056a50313f9e886df7767fcb2663611d5e52cefcc"}, {0x80, 0x101, 0x8dc2, "ae92e1ae006d2ae0b05ac5efeacfe1b4e57927392dcf3daaa235f343409af959c1c5d46dc07aab0583727269ff19a275697a18c80db1c30d1f165a3a905a0a4196d886e6423b51d13f0104551a3190a5a99b20cf482644a6c5cdc8b17ccb9a7d1335ba1423b2aeccdd8fd1ba"}], 0x310}}, {{&(0x7f00000005c0)=@pppol2tpv3={0x18, 0x1, {0x0, r5, {0x2, 0x4e22, @multicast2}, 0x4, 0x0, 0x1, 0x2}}, 0x80, &(0x7f0000001080)=[{&(0x7f0000000740)="3d693596654d589292252dd4d959d73c585c17cb3c37b44cfa35af3f67fc160cbb8675964dd6f4a034e1c6b4790f7d23183c4ddb73d95da1456292a943a7336c7858a2c24e470cb63eb7538df12442b88a6118c1adf8e5df959c1fd20db0b5dfe36afd72bc62986a1b7c898f63b43d97df5a359c49e33751ce1b1befac4386fa3038c942cf8396301c7cb0ce19106f865714676269c7a3394f4f048661518805dc816087a7d02199e909d1db5b9c75dbdae70e14efc85618", 0xb8}, {&(0x7f0000000c80)="b7e60f572f46f654192322abcce1681927b89706c9f3e66a915816ab446c5edc69e294fe97b3fd9ec33b18dcda69ee514dc8981300cce37b89df0d2457ac675dc984ff846d0721769eb9d39f3d1fb9ae427edfe7ee30e9fba375dea6577a6c85878bf636505335b0e8ac6e3eec80a10ac1dd5f371d4cbf3d0f4e5f9059a5dcc62f6ea640e9a764881262f72da2bbfe9807e95523bfa55c1bdc73b1a3b63684bbca0b1e257b897d60a59072f7631903bc9c0376c6", 0xb4}, {&(0x7f0000000d40)="96b9389dd5442a5b547f09946b51898740133a0275bb6368a55cb6be0ac6716a03a5e6d295e08c0b395e9df16d42ec7ab8fa56df1cf7d1faebf719ab4d6ede1a6f4577d530dc9792e52b452ee5ea75daa09cb6ec42d4585bb4752176bfcf8db13643d4f8be8eb0ee1749217fe21caf77a73b6d2dcf332aa870a6a11a1a0d2fe999228533b851b74e07f13c17553db4e8f41b77f37522db996092653801bf8bdd9e0967ac2372c1643c", 0xa9}, {&(0x7f0000000e00)="3d0f6efc970abb18b4b8d4e6d02d98798a7ef8a8c93f11d1dfb01d057ce72be04cf361a7424a00f9029b9237137b4ee7d82f0b2eb54c9a87d090349aa0488a470d6128db", 0x44}, {&(0x7f00000004c0)="cb4435db64589424e25a7dd7a0499ddd45bef198c84324991a8281c2e540e4902c3e0a26f10fcd8e87b8", 0x2a}, {&(0x7f0000000e80)="62b3ed97a4bb1df611e903e92a821e132d52ecf289d497df982b83e0a9f7a4053b65f33bbfb293f1ccf9a7ce8b31d8dc8c2ba80f3f4c59212248e082c6c444ab76e980ed3e10f0734b61b8a771ef0857f306c76a29da0b60bc315a91053a3116da100310671e822f2fd2f72920f78e8f7041f2a6cda15a8929638db1f23025c2fce4e4cd0ce0018f5047a2bc6747b5dff6c12c127805dbda8cf5746b0e30f6d98eef21675c2016b150b3c196113e7b966b0557eeab489e6e53457f3ee018d7dc3122572550ae02f001977bd354df5182cc6f203ac4ef", 0xd6}, {&(0x7f0000000f80)="1e2872353e4b247f695fd022bfa260ebe48b5b33aeb28889f50c1b313f93a28a2183d037cf4000f58e432086e4e7ec207d74cf7160e816e8c5ab1b3a60b9b6fdfa3f27a8d0df3af0a00490a8bf5853aaa44aa85b337404aaccd8ea9fd8b5508ed06f6d0bfcdb6f96c5c97e5469a7ada02cdd4bd4504b84beb0ecf5a8a27996d0021fc26ee2590bfcd9d85c4bb5e645be5a23c7d3f1b4e91130f01f0739196e26497e4497ff11fed5e8162383653440b56f91729c680ac55fb3d126a2643bb60471bd618cf5f8ec23cbbaeaa129f3f324ad745788bda89d15fb1df09a", 0xdc}], 0x7, &(0x7f0000008340)=ANY=[@ANYBLOB="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"], 0x2268}}, {{&(0x7f0000003380)=@rxrpc=@in6={0x21, 0x1, 0x2, 0x1c, {0xa, 0x4e22, 0x7, @empty, 0x3}}, 0x80, &(0x7f0000006880)=[{&(0x7f0000003400)="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", 0x1000}, {&(0x7f0000004400)="e76cc56b543c9d95c4e6bae4caf3ce05a4cdaf2691af6f324215b275be127e0d05df0ff4647a09bec41d531b5a5f5b5a46119c7b72dde5cd7d3268819397aa5174593cecd9e4", 0x46}, {&(0x7f0000004480)="691fefe4004b594e0ea02fe175f58e4a94db805e81ab11c93ddcba80074d038b230b26283b908d076ba0dd68f33eaa4bfadd3a3a159d1fcde1bb5ea9e0668bec9e70462d400e552cc9f232d26cd546188e7021f72077dc1967ae01bf6accd0b061f3b75cd93a57fa6dc450d6c34a83ea6771a2d5798ccafa0567353c0e5561b1bf9e9f7bf55be958cf8159380fcc5d9a8ee2f6178ccdbe2e225354a398fb02ed3f56", 0xa2}, {&(0x7f0000004540)="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", 0x1000}, {&(0x7f0000005540)="0cc63772392451d8474cdf9d220e64cfbba9f81afcb7f836d8411d228777d1c6bd82b68b75246a2ef43a8b9d4ee6c0d6b06d78256eff93e9f8c230143cc9fbc783c4ad41502b5d9f9896883c5749f60664b594d1f3ffc43c41e3872ab3317c79a845f08e38fe7ed733290c99003bef19537fa222e3d98e52dc87bedb349cb676f14e60e1a7731c75d1a799e512cf6d2838096ad3b472d31f011a6e0bdecb60c8f2098b91e0a3f0f99e0d9ccb02b84d5c", 0xb0}, {&(0x7f0000005600)="394b44cbe75b99fd1554860c3b4dffa77f497054bce03dfd946e94fdcf3215fc52fce147cc0591542aab669163af594acb69d2c0ca570f2e9748c6d84e87f0c3788527af5e1555630dba0c48f678a1019a4f64b28bfed05ce21e93ae14e16df7b4a9c852dd058e3466d25e68b46336695df4f4fb7bb8ce80962cb7a1b863e45ecac1b03bd6a9ccd348bbdd89258ab5f62cbef0b5eb2402933b67d5bfcbebee0f49fd44ecb42ac699b18ba04a45d8a1e943", 0xb1}, {&(0x7f00000056c0)="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", 0x1000}, {&(0x7f00000066c0)="f46bb2774f6251e20cdba7e57b6a54ddf76876e543356af52e82990c08d2e06c8cd04646a7bd455a2def46ca0ca2503f08d9f6558df3849ba634451c1067a6dde7ce98a1c227939f36ee2e71394e44c153708db13616b0c4c84dab2c54a8dc6ee8fff331e7c364845d54ed555a8f28dc4e61e31336b9a998d9bb4669cd13fc44d52a444886a70e3775e184ab1fbf9ba2d06abcb62f33ca2600bd9e7a38c024ec635028f2b9577a4dfe7a12", 0xab}, {&(0x7f0000006780)="535342116ed10a5a62244a979bff638246aeee33a93d6e49d0030383a0b4965fc3f872ba154919ea62f56d7fff6a5a2d3b4f6b4e3a573a242ff1aa0daf723dc0530b6afb440fff1e02e57948c426d510b9ac2268bade44519f7ac7abfcb3026fd0ff7e39d4c83bbcb92ac3335fed2fe5c1173c1f94bec791a6477048deb5eb851bbfccc28bef020f54ab151cbe6f79268f1768c7026bc4b3d67718cfec3a2fa2e9a7560d6dc2e9a16bff7ac70dcd903f3d96aa79516368202b084ca7cd03fbc42ccc7432573a06240e5b51db90069e16929a2b3e057c766e55a1fee566c22f995c7d99e8", 0xe4}], 0x9, &(0x7f0000006940)=[{0x10, 0x0, 0x9}, {0x100, 0x1, 0x1c000000, "1de42e658e9e96c663ea0fd265e381cce08e06717ca3846038d47a45fce28a32bd754070958330811358b5edbbb760e254d8fd49052152ac031b35910d5f772916d77338da8d04f75d514a8360432610c564d7138f4b6cafe3f4b183d35240f3741485d83f6e8ce7f04f0ef7437d04ebcab7f3b6213794cf09e0136e56e7548c1004eaca5a8ffe41408b0260c613edffe5dd2eb92efae521f7c886a481a4a6e12af8a8cca959004297e4f04bd9c71bd159f28f4ddd130985bd243a8477db22ac8938e41d35fe205f9599d3165a8ae6b4d6d5dc30b89cba78fef74b7f3c4b98a59da9ee559b7322939370"}, {0x10, 0x10f}], 0x120}}, {{&(0x7f0000006ac0)=@ll={0x11, 0x4, r13, 0x1, 0x9, 0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}}, 0x80, &(0x7f0000007ec0)=[{&(0x7f0000006b40)="4e932fb9d1d6276fb6e2bfde879796f27d131eb728f400d0718546c0c87808ba67ec639c3b0c01", 0x27}, {&(0x7f0000006b80)="1a6fde09db37e55b92cafdf261d7fc5f9b2ab6f7b0b5cb9881db552a08aab82b56a0b93eb93e57d5ce6aee4057f65a33c77218c9563a1f11fbc71db882297bec29dc4cdde8f34309dbd5e7bee63d3f3a35a8c9557b64bbf30bd4c35f3da5313a23293ff52115ca6c1eca69cdb73ab255ee1114df86e9846a1384c4cfd3c9c38ecb17e7d2c179de6448ab3a10dc6efafc5a5493df27273f1b86a2699ca05bf19cfd7b28aa7b0d4cf7945809071fc43805be62768d5747477222cac27e3219137dce52b9f3729548cb5214cb5f70b1f53dfb2ba451c336a4567bfa016af203f18c1180e5cdced135aae50b4ad7743d02500dfde3040d04471e12041eeb239a2def1e2ef07db13fd1364ed2d4a46e90725500c44e40a746c2cc165db41ad68f3c8bfd31f11ae1bf88317b03a836b80f1b35cedb00f212348354b8599dabb59767efb6f7f42b220b27dbc95baa72907f73810e7c8950f81d85506953fefd96597519c73a9f27a6c5e81c3631e588c414b9c0858fd822ead2999ebe5fbedde13c13f1c47bf9042e95e1c8e717708e87c780e5c660e6f0b3d5e7344c9c374b14c739548b5895d36b2988062e74a24e79ce141f96e29c1f7202b2cd9b3b3a3400c791e25ebfa50d72479220393d9b1b71c167f090d7d87618ad19c0a774c1549855ce2a3c1c8a39ea974cfee161afd83fcf33aa29ccf8e3c51a5071f57eb1e88062939dc330917775080e43f356069515f812713b50b8e45a7d171ef5dfb2465b15e123a8ee1e63b8f67515007d54f3e0972d8a1990f99e413053b8ea4dd9cfa66ef1db13567297e58f48a10be04d9e7c271dadb07e70fce689f78b780567ac86031f8df0ec856488de78171a66455fd593b810447e3250dc725d69f88c5cee337d4010613fcd926141a86709ada015d43c6fda64dc44503e4ea7dc9005cff2b702b3a9c1123dcee4f6dec30a335b1e8954026efd55ad1038271d93daf1d4dff4aa093849d5d7be353d6ed1980408f16eb21d7ff3729e2bf6f7b2a5a5fd0c6fe5354f330877a999f0f712616ce1849ec39251287ecffbb2602ab2d3a14afd4f33306b3025517773f11111e4caff85d0acb86752003abde8bebc7a300db5d439af2875e0c4f4442a79a3496932c03e23f85053dc4e4c3fe2995d4df11001e747f6d2243f0afe5dc87077db39c335244e0da8bfffd8f75a809c2cae5aa52acc7039a9173bdca0fc223cb8c0455e4da9d63df8591f523f2c2dab4aaa8f74cf811cef121fb6423598141064a3d96ca0c314fd4eb30feb6131e0c7e49560c0a75956ad3c2c26d15908675b662a70373a7760712a83c1254a6336ec6a4647160831f277fe6dc9a99d7c54d5204354c5c07a99f4ad6b8fc721f8c291cfdb2d3156e2ea2e82a4e1faed77cdc1d7bf9abd168b9436651a1693ee685c6ed82c5efea32d9966fce7dd8114a267dbe830e1484499771d48500213c271e975a3dead20043385983d9ac611a547303051ddb36ea9d146fa161905b79c6a5dd89364f0def415d678c67b8ff9d9852a79e65b2f52bfda26162a7d4e0b03e222e2c1e9d0b7751da4b0a046832f696ecf88aa70a2b0acbfe1694b1b528c9484579f54d6b525119405ec1e1b010d70a3e524205faa0cc9c262b41c9d39463cd4da44641c8e2646706983ee29c6655ef9166f0f85a1410e45d57ecae9dca54256eff153f2a3759fe6fe6391b874adabafeb14658161ae5c670686300fb248dbee58c633893ce021aead1634beccce95b459033937e5dad16cb7269e5c09be3f3eb61c68b44fa08d084396e90fdc28d1bd4c524d9b36915ac2b6ed686ae4322e24da8ef87b0bd31c238d22278099d8eb81a727e47577b228f6a238b6bd8e39b0d13e27e3f683b17b18b77b4a49217d61365a54eaf5d0d26393d868caeff95ef48be6542cbafd79500e0d57815ba39f8277d333f3a6b3d03d46ca5d18f246bded522d8c02db7e5885e56e0ade2cdf46d0bffefae8be097663348c563ffb6a4d4d533d42721270acf310b935d85ca838a30444511f9de0c34a947d1243ee02bec0de95431e692bcb0d7e7f7e9506c67ca16493a7b29850f01f7523f6bdb10ab3dad85b35bef4f63030785719a5e752e8e0effebd6a0cf6dda436abfcca43aa2e00767b3e9999f88c332719f352c42e62c6a7991c46d9ec8a17ed7a6d1aaa35268c07aab79895b23ec24d3ab55b321482ae83fafbd24c41cb4eb5173b8db648bad0ad12760311a6ce94122524dc97b77cb17d9216e77eb4993d0f4f1d9560dd10e5bea4338148f374fffcf9d450a7710e015b67ce840e024112c82c55a7846e65116cec7712a1c6b803c3de07f8df03eb051d837e6ab64a2729ccdf8423e4e47bb12d97915fd99cfd8b3aad53d1cff444d377cd239ea16530861a26e3b22667ab1ac5e6053af05555e1ef451d58c61d6c2d90663fb4c01ad78befe7ca99e7925a01f804e77d68be628524614212bfbf7b56bffc7c956801bff3922c74b7de2e8ebcbb3462daf8323d4d0dba9a2590a8082717e68ac33bdb06d208a5e4dd2e6971b8b699ec0fe94e8b7015510b268e58e0d6771b0f38fa440ea6c9d36ac50d7aef7007492d850e2d627afbcc4cf95985de6f2ab14cade8eb783a4c39c381e556f7ba6799fbca361e41a180a6382c7289aecd3211f2ceb7da4e36b6ea613f35da9f32dcea604a8fe21e65a0ea54d6405c5ae7b993d0ec8953eeaea6fb95c48719b3bc43456775ed68c540e1472ace456245b20b82828630ab009164a37843cb2de9d0b9ccfadd9c1ab53f9471a83e55c6ea23eef9daabeec1929bab4d5e109e840abe5a1c691b32189fbdf9f9c6f7792e631afff3eda587df2197117ba13e7d0d0cce93026f8e0515f4d0acc705d05f16d192000c5400bbbc7dd1ca20fd88274f69e7bd5b04f3ef07e98451873beaa3ab0bd54b5d4b8560da6e01940c0ebd304232b831acda042f2a7487fde3795218f55bdf6fc5b43a7bebd19925f7968fa4888554ea684be6a6741f9f543f8b87af481d9f5484e0d4b6c1352e1ceec0e3619815b677e9aa8881f69c9c706c459453b788222dd7bcac8c5b30d47ddb770a1efb2c08f92f97e29357e801d4cbd82d7c04cb314f5a2ce52986a5d58ffedd8aac554703563e03ca79a4abfc8a38f31fb4d92f4538885008e0dd2d7e6be9182cadbbd85710650b7b71a6c5557ab3453e148a892842d987206559426b9d7e1daadbf5df91b29052c642846a5b44644c7033c2e0849cb7a110f3359b0ef6907a2c370b31977905474555109d6d17e878c4a6937df94dfd0fc40dc792d86c1c21237dfeac04da33dbb443c25f9363d61ecd7cac99f2b5ad424305ef1e07b4729a5880a6b21614d19fac6db838df54c01d2738acaf9c3a742c86c1ac462745381cbaf12101d3384193c92342314b7f28144f3c416f8cd28722a4cc909c666fdb31530e4328906c5b5ccadaefd52ca0c9d5d190fc6a57b946dd7fcd0b91343a974cbe8374bf32cb4a2463036a28267bc82b4f135a237a15490dbba4c8db61e7ec7728f9540c0c2f98d3e0ebfe42cd68c0c0588808a291ebe15294ce60556b510f77cd57c847cc6ea94e74882b9a23b3c74d620c21a7eb13341682714216ceffbda8179e1c929a5096953d2ba9742f7f9fcecff2222e1f9154b13506e8ac49ba75f81748b152d816b71841ddad848cd232139b51e018acf7c7d862936559710e05159bda897b2cf4243b4758fac0cbcfba42f96f5139b22368d25a69eb8a03ff52494577a1936df83e681b8daa3198af8123c065fdf64d3084c6f3a49144c6578de545926efaa039ac8b52ce41179a49e92d49496a2397552096d8b6ac88fb2437597959155155c0052c83f3ecabe673c61ffc06a01313b7ab1fdb24399944153cac8ce829119b64bfd18eb141644cce2c80cbe0827739e4ec455f3c1bd3bfa8dfcbde53b5109cc082c3e6ecb7612936293cf4d123f996269a8e78fb2d002a219152f9b75425fe2a17ff90271d3fa007f2dc5cf0cd62ca23a19f751b5827e01998cc7c8bca793e859ccf22dccb3d27fcffb30ca1d1da94b19dd77d9b2019220aefddee903171cb3d4a8d1be7fec19ed55a75485dbb0d17e496352f7df408b65b49e67a05a0e9b2b86aae276b0658a1ec7816efd8f49be16a070376e31f839db4d1a4a0be1201d0800b380ab60324a79d765b61f22b61b04e7bef9142ed48cc0ce441adf0fb803769f5cd0391ef8cdcbc415f922609b28bcaed8bed303a14f11e9080111d07744b544a75421e5685186d2a8ce8ce58b5e32287639e1e4ea7d42800808e0e0813e39441b71f4e124874897eb15bdbbe0dcae29e0190f17eeb9cc183e7c0699055c4e14bfe92e324547cf24ce16554dacf3a4737d3a359027f268c7e1bd6b0fcda9162f7818a745e268fa0d9f054842e5b651fd7319e8231368e3774cd0bd5e89e483eff125fa93643cce95851ea10371c85ff54ccff5dfdcdc05b7e721365f0565eae79d360d8f22388562a19d89c34c07a0669a0b41018501217e58f5fa12bccb1988249e12467ab55d0c86cf580d7bef998596dcc700f7433acb21236ea6d5855d58ac3488b02b817864edeb1ff29ada3a03b5036ee1bf28b2f0586d634b976abca3209189861d2c4724251e60e1454a4d01b3e19d4621cdca6526f1e57c9f9ef8faed931df36e9f1be554ac9f831a069042b196dccd70e6cabe2f70b702c13cecf0e22f57d9d645f63e07fed607ca40d6f002722cb7c6969b89ed9c98e657533f919c684e5be4f4d530d4afb592836be7ea757bea5471ece6f6bb8440a95ca1ce7e3bd1d55e45b6db874689e2fce7fc5e2cc780d8da960655e3c52083f3535469cfee5f41c9d9dd4b338da62e1c7bb7aff4defefb9ffd33d2022a6a4a316734517d68c7c7f4d404c12caf230307bc07d4e7000e5013d8ab644adb7fc27f1a3fc43257455ca31ae4a8d22fb70f2f8853cec0ab9413c94b913616cc8e351e9dc660e4e63bc3d47bddf0345f55fcacf9be0b2cea9ec381bfe879516e20ff810e5d5b00826f51cf90aba5302b36249b87a476a7f401c1f2703f5d500033ac47968095ed12eab5c58b4caae0a751d1423b8ddbb5bfc5230928e83f0e4f19df5d5c8f958e44346795094d6934587a821444998bb5cb7e5d38d92774dd39c58046c0bcbff35c7a5d0edbba74d20c69303185fadbbe874af9b41811cf09f34d12f84936011e15e5b32e12553b23fa2a6e30e6f7c7e70a23ef79cc42a53ce0f8b5fbc591d7181d7634ddf8e741611772bd2ff7b921d48750eaeb6dc77c0dfd6c719cfc3fe7d60cfa91b4509740f9598c7334377a2501025d25297f20ac800366060495633b6bf6b9134601c0f3d7b4565171264e2cfaf0273d58d59d4c492a4978b97803463fcafcd54e470cf4f020c62e7b7097d2e1ed49604912cb76c65389ed0a10e4fd22ec7cb1ed73f8944b3b10363721d0845af081dc74fe3e3d034e1a9d78bce8210c47494b3025600c541caffb14a79981596fe17a9962d3b280363de721a33d847948e961cbc7e50cd979c9589a4d510f619a2937dde5a678a442b37c016e62fbcdddef14cffa0e4fc708d954ed492036139042ad79b4bdef28b09310c5942689644f487fc46ea17379dca68b3957ad7c5c83f7dab6baefde0cf5582c19d1b6276db65caf3092494ec297e05959895a6cbf56e5d537caa67b0619ed7fc698a14a135044270ef6ca542a36318271bc35580a5ae2490079d3c32e41fe87b8a577bb95b2b82c115d96c9fb6c3d5124b", 0x1000}, {&(0x7f0000007b80)="64e2b10bde9bb57d07ff33548ab34da3a3739fc8b3dcbad967d62b9655defa5a8b6f045fd7eaa1f60d9703ed40d82b57a86c4564842ee729c694ab78726c8150bab0acb0b28aec17a751c210971f2aa13b8b1b10b350803ddc65ad96ec629e5887b0adbe1fb15450d0d2610ef2ae34e224c4ffec31a90871ff61405b78f4a18ab8300e84da8390c8ee0e836a16ceeae8a47f7d7a6c71de2479342b7555f1fdc44d2ac714", 0xa4}, {&(0x7f0000007c40)="ebd4f6ced5bf60790c8d6e0f6b6613fb1ea763599a214ad64bea8a010c7426153420fbae8a28f8a6872a50a03f79cf5ca7520781e66be6", 0x37}, {&(0x7f0000007c80)="74fbde341ac073512ec2d4813935d65809fc031f7bb44eaa10f2e7f71d75c42e6ada399d8d9a4b767ddca5d649932f740efef61452aa4a15ce3277cc2d045dc876c537ba", 0x44}, {&(0x7f0000007d00)="10c73774ec8895b9c51da3647ce7281c3c72af155122a7da5a1c41d2be58f27acd5d1f43f8a6d07e008705912082daee230a387a19144e4976d290ac3c6bbce6767b354fa43b34cc2052cf84fda9f60802d436d32cfbf3e4ea428b4fd0157a3d52a839cb2afb0565fe4de411dadb48d292edc0cde4afe381e6bc2813a7a79ae28757a646a92e389253e4468393e08acf88697f73abcf5792af21eceec5ce9e3f4ade236f805007b42adcd701ac582286c1b64a821c2c5adf8c54", 0xba}, {&(0x7f0000007dc0)="58c1e8b08314da28d47c4d78cb7141c84c525d3ebae2584e58fffe15d5b468b11d5b83a42cd190035a93502af95ee45e3279c4ca7c12743a7d15889dd1617aa07c020be9edcb9c01e0cf39620ae6b5a35f00481d28ef533742093b68e9adab02b91a0c3c24ee396dccdc0306ddde57ac2af8a83ea3706b58c74b3460b192e32cd6ffe1ed575fc32d67b7", 0x8a}, {&(0x7f0000007e80)="9b4489f64524bca2118b2d9f96c03c25b2a66f9ea0", 0x15}], 0x8}}, {{&(0x7f0000007f40)=@in={0x2, 0x4e23, @rand_addr=0xffffffff}, 0x80, &(0x7f0000008080)=[{&(0x7f0000007fc0)="38ab4cbf16abfd969bc7f2f02355fe57ed0f501f0c01ccdc6428e5764834ee92a84886bf4300a26535e8315ba1e9787222e0b27c56af0d1e98cd409da18a3a9c6421dbbfe43860b1843d211094452061510714fe5e09ce94ad697c3a1cdbf869cc2698c97740e000ff003726530d90a1b9c8658c6c25411b7bac3b03e6fdc7f2dbdaa57edb2b05d20a73669abf78073b6de1053fd93d11db49fd2454136bd336820a6413ae5de91acf63d3", 0xab}], 0x1}}], 0x5, 0x880) ioctl$SG_GET_ACCESS_COUNT(r3, 0x2289, &(0x7f0000000340)) open(&(0x7f0000000000)='./file0\x00', 0x20800, 0x40) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="024e8cb15758316689784d09a38e796c9f60e47abc0f25fe389a26672fffc34b15df1099a41ac46a8bdb15dcb26b47eef4adf1f8c47474c86ef728d15accf85f62dfb3902c4e0ead6642d2dbd33a812fa76bee1e9ed9cfe453d019bed8dc00a84c54c4c9d38029750c574c3b002dff87c8aa33cf4644a10e24b7c4b874b28b4946b95146688ada035f6c10a7007925b9ac51ee5718698a92434f15808e87e05fb662a18128c4a37041c118eb6589371bd95d46bc44a649a3efaf851fd46a050ab3e02d6028ea861944495015d205f05e228e07baf40698f78b920f25ae583571323974c3f2ee4e04a283c57d3fe63acc5a7c"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) r14 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x3, 0x2) ioctl$VIDIOC_ENUMAUDOUT(r14, 0xc0345642, &(0x7f0000000080)={0x7, "745fcecc24d416b3af8e9d5881f843446b2e3f4c14f6ccf0a0fe3f5373479b63", 0x1, 0x1}) ioctl$DRM_IOCTL_MARK_BUFS(0xffffffffffffffff, 0x40206417, &(0x7f00000000c0)={0x101, 0x8000, 0x2, 0xc000000}) 09:33:27 executing program 3: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="2398c593a2303d8df8dc1623f67a060de466e34712df23215711"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:33:27 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f0000000340)=ANY=[@ANYBLOB="b7020000f7ffffffbfa70000000000002402000020feffff7a0af0fff8ffffff69a4f0ff00000000b70600000018d1fe2d6405000000000075040000000000000704000000000000b7040000100000206a0700fe00000000850000002f000000b70000000a0000009500000000000000e535f8a62fc2868f0399d909a63796c113a80c19aab9d607000000b6cd483be3f0d3253730e711f5969f62c28b22756bedf3cf393d14c46cc4f79fd2b316da4f0de8163f6242fa732300000637c48468766af540439fce41f144631ac262dcae18c3d1a1fbe96dd87235b44174f7c0343185089a0f119e31975e551558055dc2dc"], &(0x7f0000000280)='GPL\x00'}, 0x48) r1 = socket$kcm(0x11, 0x8000000002, 0x300) socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000540)=r0, 0x4) syz_emit_ethernet(0x3e, &(0x7f0000000000)={@broadcast, @random="96c1e9574b31", @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x30, 0xb, 0x0, 0x0, 0x1, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @local}, @time_exceeded={0xb, 0x0, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local, @multicast2}}}}}}, 0x0) 09:33:27 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f0000000340)=ANY=[@ANYBLOB="b7020000f7ffffffbfa70000000000002402000020feffff7a0af0fff8ffffff69a4f0ff00000000b70600000018d1fe2d6405000000000075040000000000000704000000000000b7040000100000206a0700fe00000000850000002f000000b70000000a0000009500000000000000e535f8a62fc2868f0399d909a63796c113a80c19aab9d607000000b6cd483be3f0d3253730e711f5969f62c28b22756bedf3cf393d14c46cc4f79fd2b316da4f0de8163f6242fa732300000637c48468766af540439fce41f144631ac262dcae18c3d1a1fbe96dd87235b44174f7c0343185089a0f119e31975e551558055dc2dc"], &(0x7f0000000280)='GPL\x00'}, 0x48) r1 = socket$kcm(0x11, 0x8000000002, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000540)=r0, 0x4) socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r3 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x0, 0x2d, &(0x7f0000000080)={0x400, {{0x2, 0x4e21, @empty}}}, 0x88) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') [ 1342.104505][T23881] kAFS: unparsable volume name 09:33:27 executing program 3: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="2398c593a2303d8df8dc1623f67a060de466e34712df23215711"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:33:27 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x280800, 0x0) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000040)={0x0, 0xff}, &(0x7f0000000080)=0x8) mount(&(0x7f00000015c0)=ANY=[@ANYBLOB='\''], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) sendmmsg$inet(r2, &(0x7f0000000680)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f00000000c0)="5831255624c13e4c563f221188b6be66ea", 0x11}], 0x1}}, {{&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000002c0)=[{&(0x7f0000000040)="70a6b8247e016ae2647a2e703fce46c432e37d1dffd332a793d4b9e3617386d153", 0x21}, {&(0x7f0000000200)="09f96fbf33ceccc10976cd10b1411ee57d092fd5b7f95a0f19f01005f110463ccb2c6ebdb74ad7a7da1a2bed233154886db68984d477ebee11ce9a8e3510d401f6f31ea0a7e3ec1cda7b95f7a02b42753eb4cf0bbf5afbc7084f9bc2603aafe5da6cd54e4d647ec9fd641e4241513aaf23481d1f390bbb83dfae56369f4b03367ccd45f0ec4cd929aed127394157e7b3794500c0c5f88930b1ff50bbae1163c26fff28d06028", 0xa6}, {&(0x7f0000000100)="38d6cd435749d519cc39e90540f37c4f5c6bceef6c4ae07105cafc5e25d9bbfce859670b89666cca0857aa0c2abd8722a9db0caad3905e3ff682", 0x3a}, {&(0x7f0000000140)="d71206abd00e3c0a7e2440673da6a9fc2c1255a9b136bc982a3dc2ac21ef167250c176acfbd4d13abd86b018e8b1357842d8dc93e53f6b542e9633e1db8672e8", 0x40}], 0x4}}, {{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000380)="df304451b990364b1c6ff9c843eb47125c0a16565b5efbc0494b453f9863364196a743b5d226d34b2293f3b4b8dde4b8434172dec0902f0e03c2893c2bfd5f662eefc2902850a0221d55", 0x200003ca}, {&(0x7f0000000400)}], 0x2, &(0x7f0000000540)=[@ip_tos_u8={{0x11}}, @ip_ttl={{0x14}}, @ip_ttl={{0x14}}, @ip_tos_u8={{0x11}}], 0x60}}], 0x3, 0x0) r3 = fsopen(&(0x7f00000000c0)='cgroup\x00', 0x0) r4 = socket(0x0, 0x80002, 0x0) ioctl(r4, 0x1000008912, &(0x7f00000000c0)="080db5055e0bcfe8696071") r5 = socket$alg(0x26, 0x5, 0x0) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mreq(r6, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) setsockopt$inet6_mreq(r6, 0x29, 0x1b, &(0x7f0000000200)={@dev}, 0x14) r7 = socket$netlink(0x10, 0x3, 0x0) ioctl(r7, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8478071") setsockopt$inet6_mreq(r6, 0x29, 0x1c, &(0x7f0000000100)={@remote}, 0x1c3) bind$alg(r5, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) accept4(r5, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r5, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c81", 0x10) ppoll(&(0x7f0000000100)=[{r2, 0x810c}, {r3, 0x4}, {r0, 0x8000}, {r0, 0x2084}, {r0, 0x4084}, {r4, 0xec14b133ff02a12}, {r5, 0x10}], 0x7, &(0x7f00000001c0)={0x0, 0x989680}, &(0x7f0000000240)={0x10000}, 0x8) [ 1342.233580][T23961] kAFS: unparsable volume name 09:33:27 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f0000000340)=ANY=[@ANYBLOB="b7020000f7ffffffbfa70000000000002402000020feffff7a0af0fff8ffffff69a4f0ff00000000b70600000018d1fe2d6405000000000075040000000000000704000000000000b7040000100000206a0700fe00000000850000002f000000b70000000a0000009500000000000000e535f8a62fc2868f0399d909a63796c113a80c19aab9d607000000b6cd483be3f0d3253730e711f5969f62c28b22756bedf3cf393d14c46cc4f79fd2b316da4f0de8163f6242fa732300000637c48468766af540439fce41f144631ac262dcae18c3d1a1fbe96dd87235b44174f7c0343185089a0f119e31975e551558055dc2dc"], &(0x7f0000000280)='GPL\x00'}, 0x48) r1 = socket$kcm(0x11, 0x8000000002, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000540)=r0, 0x4) socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) getsockopt$IP6T_SO_GET_REVISION_MATCH(r4, 0x29, 0x44, &(0x7f0000000080)={'icmp6\x00'}, &(0x7f00000000c0)=0x1e) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') 09:33:27 executing program 3: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="2398c593a2303d8df8dc1623f67a060de466e34712df232157116a41dc2b323a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:33:27 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f0000000340)=ANY=[@ANYBLOB="b7020000f7ffffffbfa70000000000002402000020feffff7a0af0fff8ffffff69a4f0ff00000000b70600000018d1fe2d6405000000000075040000000000000704000000000000b7040000100000206a0700fe00000000850000002f000000b70000000a0000009500000000000000e535f8a62fc2868f0399d909a63796c113a80c19aab9d607000000b6cd483be3f0d3253730e711f5969f62c28b22756bedf3cf393d14c46cc4f79fd2b316da4f0de8163f6242fa732300000637c48468766af540439fce41f144631ac262dcae18c3d1a1fbe96dd87235b44174f7c0343185089a0f119e31975e551558055dc2dc"], &(0x7f0000000280)='GPL\x00'}, 0x48) r1 = socket$kcm(0x11, 0x8000000002, 0x300) socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000540)=r0, 0x4) syz_emit_ethernet(0x3e, &(0x7f0000000000)={@broadcast, @random="96c1e9574b31", @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x30, 0x11, 0x0, 0x0, 0x1, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @local}, @time_exceeded={0xb, 0x0, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local, @multicast2}}}}}}, 0x0) 09:33:27 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f00000015c0)=ANY=[@ANYBLOB="88"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:33:27 executing program 3: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="2398c593a2303d8df8dc1623f67a060de466e34712df23215711"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1342.557919][T24165] kAFS: unparsable volume name 09:33:28 executing program 1: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000080)=ANY=[@ANYBLOB='#U'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x3, 0x0) 09:33:28 executing program 5: r0 = socket(0x0, 0x80002, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="080db5055e0bcfe8696071") getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f0000000340)=ANY=[@ANYBLOB="b7020000f7ffffffbfa70000000000002402000020feffff7a0af0fff8ffffff69a4f0ff00000000b70600000018d1fe2d6405000000000075040000000000000704000000000000b7040000100000206a0700fe00000000850000002f000000b70000000a0000009500000000000000e535f8a62fc2868f0399d909a63796c113a80c19aab9d607000000b6cd483be3f0d3253730e711f5969f62c28b22756bedf3cf393d14c46cc4f79fd2b316da4f0de8163f6242fa732300000637c48468766af540439fce41f144631ac262dcae18c3d1a1fbe96dd87235b44174f7c0343185089a0f119e31975e551558055dc2dc"], &(0x7f0000000280)='GPL\x00'}, 0x48) r2 = socket$kcm(0x11, 0x8000000002, 0x300) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000540)=r1, 0x4) socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = fcntl$dupfd(r3, 0x0, r4) fsopen(&(0x7f0000000100)='hpfs\x00', 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') 09:33:28 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f0000000340)=ANY=[@ANYBLOB="b7020000f7ffffffbfa70000000000002402000020feffff7a0af0fff8ffffff69a4f0ff00000000b70600000018d1fe2d6405000000000075040000000000000704000000000000b7040000100000206a0700fe00000000850000002f000000b70000000a0000009500000000000000e535f8a62fc2868f0399d909a63796c113a80c19aab9d607000000b6cd483be3f0d3253730e711f5969f62c28b22756bedf3cf393d14c46cc4f79fd2b316da4f0de8163f6242fa732300000637c48468766af540439fce41f144631ac262dcae18c3d1a1fbe96dd87235b44174f7c0343185089a0f119e31975e551558055dc2dc"], &(0x7f0000000280)='GPL\x00'}, 0x48) r1 = socket$kcm(0x11, 0x8000000002, 0x300) socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000540)=r0, 0x4) syz_emit_ethernet(0x3e, &(0x7f0000000000)={@broadcast, @random="96c1e9574b31", @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x30, 0x1c, 0x0, 0x0, 0x1, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @local}, @time_exceeded={0xb, 0x0, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local, @multicast2}}}}}}, 0x0) 09:33:28 executing program 3: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="2398c593a2303d8df8dc1623f67a060de466e34712df23215711"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:33:28 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) r0 = socket$key(0xf, 0x3, 0x2) r1 = socket$netlink(0x10, 0x3, 0x8) r2 = creat(&(0x7f0000000300)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000340)={0xffffffffffffffff}, 0x800) ioctl$LOOP_SET_FD(r2, 0x4c00, r3) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') sendmsg$NL80211_CMD_GET_MPP(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000001c0)={0x1c, r5, 0x709, 0x0, 0x0, {}, [@NL80211_ATTR_IFINDEX={0x8}]}, 0x1c}}, 0x0) setsockopt$bt_BT_CHANNEL_POLICY(0xffffffffffffffff, 0x112, 0xa, 0x0, 0x0) sendmsg$L2TP_CMD_TUNNEL_DELETE(0xffffffffffffffff, 0x0, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) stat(&(0x7f0000000400)='./file0\x00', &(0x7f0000000440)) r9 = socket$inet_udplite(0x2, 0x2, 0x88) r10 = fcntl$dupfd(r8, 0x0, r9) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) ioctl$VIDIOC_S_HW_FREQ_SEEK(r10, 0x40305652, &(0x7f0000000080)={0x0, 0x5, 0x8, 0x6, 0xfffffe01, 0x1, 0x6283a79f}) write$binfmt_misc(r7, &(0x7f0000000900)=ANY=[@ANYPTR64=&(0x7f0000000880)=ANY=[@ANYRESDEC, @ANYRESHEX]], 0xfe9a) setsockopt$sock_int(r6, 0x1, 0x8, &(0x7f0000000000), 0x4) sendmmsg$sock(r7, &(0x7f0000000300), 0x400000000000129, 0x0) recvmmsg(r6, &(0x7f0000006e00)=[{{0x0, 0x0, &(0x7f0000005700)=[{&(0x7f0000003440)=""/128, 0x80}], 0x1}}], 0x1, 0x0, 0x0) r11 = socket$alg(0x26, 0x5, 0x0) bind$alg(r11, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r12 = accept4(r11, 0x0, 0x0, 0x0) sendmmsg$inet(r12, &(0x7f0000000680)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f00000000c0)="5831255624c13e4c563f221188b6be66ea", 0x11}], 0x1}}, {{&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000002c0)=[{&(0x7f0000000040)="70a6b8247e016ae2647a2e703fce46c432e37d1dffd332a793d4b9e3617386d153", 0x21}, {&(0x7f0000000200)="09f96fbf33ceccc10976cd10b1411ee57d092fd5b7f95a0f19f01005f110463ccb2c6ebdb74ad7a7da1a2bed233154886db68984d477ebee11ce9a8e3510d401f6f31ea0a7e3ec1cda7b95f7a02b42753eb4cf0bbf5afbc7084f9bc2603aafe5da6cd54e4d647ec9fd641e4241513aaf23481d1f390bbb83dfae56369f4b03367ccd45f0ec4cd929aed127394157e7b3794500c0c5f88930b1ff50bbae1163c26fff28d06028", 0xa6}, {&(0x7f0000000100)="38d6cd435749d519cc39e90540f37c4f5c6bceef6c4ae07105cafc5e25d9bbfce859670b89666cca0857aa0c2abd8722a9db0caad3905e3ff682", 0x3a}, {&(0x7f0000000140)="d71206abd00e3c0a7e2440673da6a9fc2c1255a9b136bc982a3dc2ac21ef167250c176acfbd4d13abd86b018e8b1357842d8dc93e53f6b542e9633e1db8672e8", 0x40}], 0x4}}, {{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000380)="df304451b990364b1c6ff9c843eb47125c0a16565b5efbc0494b453f9863364196a743b5d226d34b2293f3b4b8dde4b8434172dec0902f0e03c2893c2bfd5f662eefc2902850a0221d55", 0x200003ca}, {&(0x7f0000000400)}], 0x2, &(0x7f0000000540)=[@ip_tos_u8={{0x11}}, @ip_ttl={{0x14}}, @ip_ttl={{0x14}}, @ip_tos_u8={{0x11}}], 0x60}}], 0x3, 0x0) setsockopt$inet_mtu(r12, 0x0, 0xa, &(0x7f0000000140)=0x1, 0x4) sendmsg$NL80211_CMD_SET_KEY(r1, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000940)=ANY=[@ANYBLOB="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", @ANYRES16=r5, @ANYBLOB="100027bd7000ffdbdf250a00000018006e000400020004000200040001000400020004000200"], 0x2c}, 0x1, 0x0, 0x0, 0x1800}, 0x0) fcntl$getownex(r0, 0x10, &(0x7f0000000000)) 09:33:28 executing program 3: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="2398c593a2303d8df8dc1623f67a060de466e34712df23215711"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:33:28 executing program 3: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="2398c593a2303d8df8dc1623f67a060de466e34712df232157116a41dc"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:33:28 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f0000000340)=ANY=[@ANYBLOB="b7020000f7ffffffbfa70000000000002402000020feffff7a0af0fff8ffffff69a4f0ff00000000b70600000018d1fe2d6405000000000075040000000000000704000000000000b7040000100000206a0700fe00000000850000002f000000b70000000a0000009500000000000000e535f8a62fc2868f0399d909a63796c113a80c19aab9d607000000b6cd483be3f0d3253730e711f5969f62c28b22756bedf3cf393d14c46cc4f79fd2b316da4f0de8163f6242fa732300000637c48468766af540439fce41f144631ac262dcae18c3d1a1fbe96dd87235b44174f7c0343185089a0f119e31975e551558055dc2dc"], &(0x7f0000000280)='GPL\x00'}, 0x48) r1 = socket$kcm(0x11, 0x8000000002, 0x300) socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000540)=r0, 0x4) syz_emit_ethernet(0x3e, &(0x7f0000000000)={@broadcast, @random="96c1e9574b31", @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x30, 0x21, 0x0, 0x0, 0x1, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @local}, @time_exceeded={0xb, 0x0, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local, @multicast2}}}}}}, 0x0) 09:33:28 executing program 4: socket$caif_seqpacket(0x25, 0x5, 0x1) mkdir(&(0x7f0000000200)='./file0\x00', 0xf9) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg$inet(r1, &(0x7f0000000680)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f00000000c0)="5831255624c13e4c563f221188b6be66ea", 0x11}], 0x1}}, {{&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000002c0)=[{&(0x7f0000000040)="70a6b8247e016ae2647a2e703fce46c432e37d1dffd332a793d4b9e3617386d153", 0x21}, {&(0x7f0000000200)="09f96fbf33ceccc10976cd10b1411ee57d092fd5b7f95a0f19f01005f110463ccb2c6ebdb74ad7a7da1a2bed233154886db68984d477ebee11ce9a8e3510d401f6f31ea0a7e3ec1cda7b95f7a02b42753eb4cf0bbf5afbc7084f9bc2603aafe5da6cd54e4d647ec9fd641e4241513aaf23481d1f390bbb83dfae56369f4b03367ccd45f0ec4cd929aed127394157e7b3794500c0c5f88930b1ff50bbae1163c26fff28d06028", 0xa6}, {&(0x7f0000000100)="38d6cd435749d519cc39e90540f37c4f5c6bceef6c4ae07105cafc5e25d9bbfce859670b89666cca0857aa0c2abd8722a9db0caad3905e3ff682", 0x3a}, {&(0x7f0000000140)="d71206abd00e3c0a7e2440673da6a9fc2c1255a9b136bc982a3dc2ac21ef167250c176acfbd4d13abd86b018e8b1357842d8dc93e53f6b542e9633e1db8672e8", 0x40}], 0x4}}, {{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000380)="df304451b990364b1c6ff9c843eb47125c0a16565b5efbc0494b453f9863364196a743b5d226d34b2293f3b4b8dde4b8434172dec0902f0e03c2893c2bfd5f662eefc2902850a0221d55", 0x200003ca}, {&(0x7f0000000400)}], 0x2, &(0x7f0000000540)=[@ip_tos_u8={{0x11}}, @ip_ttl={{0x14}}, @ip_ttl={{0x14}}, @ip_tos_u8={{0x11}}], 0x60}}], 0x3, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000400)=ANY=[@ANYBLOB="00000080ab13c99f5497505af76b5fb8788884bc6710e49eb27089f8f13f8493d1547f5a6f3455fa9350fed5c694a5acf5bd8120591e8debfd76fd90c4a024f4a49528b571674089da52a8d76d690e8310cdcc9269e56c58719ca17dce5db420f066462a0801c31677a6a4dc5c5663dc433925ab164076df3d762e434c8b2e1a2d207c49cf", @ANYRES32=0x0], &(0x7f000095dffc)=0x8) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000580)={r2, 0x0, 0x1, [0x0]}, 0xa) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000000)={r2, 0x2, 0x30}, 0xc) mount(&(0x7f00000015c0)=ANY=[@ANYBLOB='3'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:33:28 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f0000000340)=ANY=[@ANYBLOB="b7020000f7ffffffbfa70000000000002402000020feffff7a0af0fff8ffffff69a4f0ff00000000b70600000018d1fe2d6405000000000075040000000000000704000000000000b7040000100000206a0700fe00000000850000002f000000b70000000a0000009500000000000000e535f8a62fc2868f0399d909a63796c113a80c19aab9d607000000b6cd483be3f0d3253730e711f5969f62c28b22756bedf3cf393d14c46cc4f79fd2b316da4f0de8163f6242fa732300000637c48468766af540439fce41f144631ac262dcae18c3d1a1fbe96dd87235b44174f7c0343185089a0f119e31975e551558055dc2dc"], &(0x7f0000000280)='GPL\x00'}, 0x48) r1 = socket$kcm(0x11, 0x8000000002, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000540)=r0, 0x4) socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x42, 0x200) sendmsg$IPSET_CMD_ADD(r4, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0xc0004000}, 0xc, &(0x7f0000000100)={&(0x7f0000000440)={0xd8, 0x9, 0x6, 0x600, 0x70bd2d, 0x25dfdbfb, {0x3, 0x0, 0x9}, [@IPSET_ATTR_LINENO={0x8, 0x9, 0x1, 0x0, 0x6}, @IPSET_ATTR_DATA={0x30, 0x7, 0x0, 0x1, [@IPSET_ATTR_CIDR={0x5, 0x3, 0xfb}, @IPSET_ATTR_TIMEOUT={0x8, 0x6, 0x1, 0x0, 0xfff}, @IPSET_ATTR_COMMENT={0xc, 0x1a, 'nl80211\x00'}, @IPSET_ATTR_PORT_TO={0x6, 0x5, 0x1, 0x0, 0x4e21}, @IPSET_ATTR_PORT_TO={0x6, 0x5, 0x1, 0x0, 0x4e23}]}, @IPSET_ATTR_DATA={0x20, 0x7, 0x0, 0x1, [@IPSET_ATTR_PORT_TO={0x6, 0x5, 0x1, 0x0, 0x4e23}, @IPSET_ATTR_ETHER={0xa, 0x11, @local}, @IPSET_ATTR_TIMEOUT={0x8, 0x6, 0x1, 0x0, 0x3}]}, @IPSET_ATTR_LINENO={0x8, 0x9, 0x1, 0x0, 0x15b}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_ADT={0x50, 0x8, 0x0, 0x1, [{0x10, 0x7, 0x0, 0x1, @IPSET_ATTR_IP2={0xc, 0x14, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @loopback}}}, {0xc, 0x7, 0x0, 0x1, @IPSET_ATTR_MARK={0x8, 0xa, 0x1, 0x0, 0x5}}, {0xc, 0x7, 0x0, 0x1, @IPSET_ATTR_MARKMASK={0x8, 0xb, 0x1, 0x0, 0x10000}}, {0xc, 0x7, 0x0, 0x1, @IPSET_ATTR_PROTO={0x5, 0x7, 0xe8}}, {0x18, 0x7, 0x0, 0x1, @IPSET_ATTR_IFACE={0x14, 0x17, 'bond_slave_1\x00'}}]}]}, 0xd8}, 0x1, 0x0, 0x0, 0x40c1}, 0x4008000) r5 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') [ 1343.220259][T24437] kAFS: unparsable volume name 09:33:28 executing program 3: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="2398c593a2303d8df8dc1623f67a060de466e34712df232157116a41dc"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:33:28 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_SET_MSCBIT(r0, 0x405c5503, 0x0) ioctl$SNDRV_PCM_IOCTL_WRITEI_FRAMES(0xffffffffffffffff, 0x40184150, &(0x7f0000000080)={0x0, &(0x7f0000000040)="39d7c04b9e5f4811246d70820dbc60c12af71624ef9ebb84e5740696d51cb9203735db9e", 0x24}) r1 = socket(0x10, 0x80002, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8696071") r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000380)) geteuid() ioctl$VIDIOC_TRY_EXT_CTRLS(0xffffffffffffffff, 0xc0205649, &(0x7f0000000340)={0xf000000, 0x5, 0x4, 0xffffffffffffffff, 0x0, &(0x7f0000000300)={0x9a090d, 0x6, [], @value64=0x35}}) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000480)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) fstat(r3, &(0x7f0000000400)) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000140)={0x26, 'skcipher\x00', 0x0, 0x0, 'chacha20-generic\x00'}, 0x58) accept$alg(r4, 0x0, 0x0) openat$ion(0xffffffffffffff9c, &(0x7f0000000800)='/dev/ion\x00', 0x8cc9284021b4f37d, 0x0) socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) epoll_create1(0x0) socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) r5 = socket(0x0, 0x80002, 0x0) ioctl(r5, 0x1000008912, &(0x7f00000000c0)="080db5055e0bcfe8696071") r6 = socket$alg(0x26, 0x5, 0x0) bind$alg(r6, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r7 = accept4(r6, 0x0, 0x0, 0x0) sendmmsg$inet(r7, &(0x7f0000000680)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f00000000c0)="5831255624c13e4c563f221188b6be66ea", 0x11}], 0x1}}, {{&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000002c0)=[{&(0x7f0000000040)="70a6b8247e016ae2647a2e703fce46c432e37d1dffd332a793d4b9e3617386d153", 0x21}, {&(0x7f0000000200)="09f96fbf33ceccc10976cd10b1411ee57d092fd5b7f95a0f19f01005f110463ccb2c6ebdb74ad7a7da1a2bed233154886db68984d477ebee11ce9a8e3510d401f6f31ea0a7e3ec1cda7b95f7a02b42753eb4cf0bbf5afbc7084f9bc2603aafe5da6cd54e4d647ec9fd641e4241513aaf23481d1f390bbb83dfae56369f4b03367ccd45f0ec4cd929aed127394157e7b3794500c0c5f88930b1ff50bbae1163c26fff28d06028", 0xa6}, {&(0x7f0000000100)="38d6cd435749d519cc39e90540f37c4f5c6bceef6c4ae07105cafc5e25d9bbfce859670b89666cca0857aa0c2abd8722a9db0caad3905e3ff682", 0x3a}, {&(0x7f0000000140)="d71206abd00e3c0a7e2440673da6a9fc2c1255a9b136bc982a3dc2ac21ef167250c176acfbd4d13abd86b018e8b1357842d8dc93e53f6b542e9633e1db8672e8", 0x40}], 0x4}}, {{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000380)="df304451b990364b1c6ff9c843eb47125c0a16565b5efbc0494b453f9863364196a743b5d226d34b2293f3b4b8dde4b8434172dec0902f0e03c2893c2bfd5f662eefc2902850a0221d55", 0x200003ca}, {&(0x7f0000000400)}], 0x2, &(0x7f0000000540)=[@ip_tos_u8={{0x11}}, @ip_ttl={{0x14}}, @ip_ttl={{0x14}}, @ip_tos_u8={{0x11}}], 0x60}}], 0x3, 0x0) accept$alg(r7, 0x0, 0x0) getpgid(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000014c0), &(0x7f00000001c0)=0xc) semctl$IPC_SET(0x0, 0x0, 0x1, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) r8 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) accept$alg(r8, 0x0, 0x0) r9 = socket$alg(0x26, 0x5, 0x0) bind$alg(r9, &(0x7f0000000140)={0x26, 'skcipher\x00', 0x0, 0x0, 'chacha20-generic\x00'}, 0x58) accept$alg(0xffffffffffffffff, 0x0, 0x0) 09:33:29 executing program 1: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000080)=ANY=[@ANYBLOB='#U'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x4, 0x0) 09:33:29 executing program 3: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="2398c593a2303d8df8dc1623f67a060de466e34712df232157116a41dc"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:33:29 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f0000000340)=ANY=[@ANYBLOB="b7020000f7ffffffbfa70000000000002402000020feffff7a0af0fff8ffffff69a4f0ff00000000b70600000018d1fe2d6405000000000075040000000000000704000000000000b7040000100000206a0700fe00000000850000002f000000b70000000a0000009500000000000000e535f8a62fc2868f0399d909a63796c113a80c19aab9d607000000b6cd483be3f0d3253730e711f5969f62c28b22756bedf3cf393d14c46cc4f79fd2b316da4f0de8163f6242fa732300000637c48468766af540439fce41f144631ac262dcae18c3d1a1fbe96dd87235b44174f7c0343185089a0f119e31975e551558055dc2dc"], &(0x7f0000000280)='GPL\x00'}, 0x48) r1 = socket$kcm(0x11, 0x8000000002, 0x300) socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000540)=r0, 0x4) syz_emit_ethernet(0x3e, &(0x7f0000000000)={@broadcast, @random="96c1e9574b31", @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x30, 0x2f, 0x0, 0x0, 0x1, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @local}, @time_exceeded={0xb, 0x0, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local, @multicast2}}}}}}, 0x0) 09:33:29 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f0000000340)=ANY=[@ANYBLOB="b7020000f7ffffffbfa70000000000002402000020feffff7a0af0fff8ffffff69a4f0ff00000000b70600000018d1fe2d6405000000000075040000000000000704000000000000b7040000100000206a0700fe00000000850000002f000000b70000000a0000009500000000000000e535f8a62fc2868f0399d909a63796c113a80c19aab9d607000000b6cd483be3f0d3253730e711f5969f62c28b22756bedf3cf393d14c46cc4f79fd2b316da4f0de8163f6242fa732300000637c48468766af540439fce41f144631ac262dcae18c3d1a1fbe96dd87235b44174f7c0343185089a0f119e31975e551558055dc2dc"], &(0x7f0000000280)='GPL\x00'}, 0x48) r1 = socket$kcm(0x11, 0x8000000002, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000240)=r0, 0x8d) r2 = socket(0x0, 0x80002, 0x0) ioctl(r2, 0x1000008912, &(0x7f00000000c0)="080db5055e0bcfe8696071") sendmsg$L2TP_CMD_SESSION_GET(r2, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)=ANY=[@ANYBLOB="7a41e1f8", @ANYRES16=0x0, @ANYBLOB="00002bbd7000ffdbdf250800000005002100000000000c001000060000000000000006001b004e200000"], 0x30}, 0x1, 0x0, 0x0, 0x10}, 0x4) socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') r6 = socket(0x0, 0x80002, 0x0) ioctl(r6, 0x1000008912, &(0x7f00000000c0)="080db5055e0bcfe8696071") r7 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x4200, 0x0) r8 = socket$inet_tcp(0x2, 0x1, 0x0) r9 = fcntl$dupfd(r8, 0x0, r8) getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000b00)=0xc) setsockopt$inet_IP_XFRM_POLICY(r7, 0x0, 0x11, &(0x7f00000007c0)={{{@in=@empty, @in=@multicast1, 0x4e23, 0x8001, 0x4e21, 0x9, 0x0, 0x20, 0xc0, 0x5e, 0x0, r10}, {0x6, 0x0, 0x2, 0x3, 0x480, 0x4, 0x7, 0x1}, {0x101, 0x3, 0x2, 0x7}, 0x96f, 0x6e6bbb, 0x608f917477f760e0, 0x1, 0x1, 0xfb37c7a19e19f3f9}, {{@in6=@rand_addr="17df945b34f8ddfaad004646bda31afc", 0x4d4, 0x33}, 0xa, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x6}}, 0xe8) socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r12 = socket$inet_udplite(0x2, 0x2, 0x88) r13 = fcntl$dupfd(r11, 0x0, r12) ioctl$PERF_EVENT_IOC_ENABLE(r13, 0x8912, 0x400200) r14 = openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000a80)='/dev/nvme-fabrics\x00', 0xc61422f7d3305623, 0x0) getsockopt$bt_BT_CHANNEL_POLICY(r14, 0x112, 0xa, &(0x7f0000000ac0)=0x2, &(0x7f0000000b40)=0x4) r15 = syz_open_pts(r13, 0x8800) r16 = socket$bt_rfcomm(0x1f, 0x3, 0x3) r17 = socket$alg(0x26, 0x5, 0x0) bind$alg(r17, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r18 = accept4(r17, 0x0, 0x0, 0x0) sendmmsg$inet(r18, &(0x7f0000000680)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f00000000c0)="5831255624c13e4c563f221188b6be66ea", 0x11}], 0x1}}, {{&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000002c0)=[{&(0x7f0000000040)="70a6b8247e016ae2647a2e703fce46c432e37d1dffd332a793d4b9e3617386d153", 0x21}, {&(0x7f0000000200)="09f96fbf33ceccc10976cd10b1411ee57d092fd5b7f95a0f19f01005f110463ccb2c6ebdb74ad7a7da1a2bed233154886db68984d477ebee11ce9a8e3510d401f6f31ea0a7e3ec1cda7b95f7a02b42753eb4cf0bbf5afbc7084f9bc2603aafe5da6cd54e4d647ec9fd641e4241513aaf23481d1f390bbb83dfae56369f4b03367ccd45f0ec4cd929aed127394157e7b3794500c0c5f88930b1ff50bbae1163c26fff28d06028", 0xa6}, {&(0x7f0000000100)="38d6cd435749d519cc39e90540f37c4f5c6bceef6c4ae07105cafc5e25d9bbfce859670b89666cca0857aa0c2abd8722a9db0caad3905e3ff682", 0x3a}, {&(0x7f0000000140)="d71206abd00e3c0a7e2440673da6a9fc2c1255a9b136bc982a3dc2ac21ef167250c176acfbd4d13abd86b018e8b1357842d8dc93e53f6b542e9633e1db8672e8", 0x40}], 0x4}}, {{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000380)="df304451b990364b1c6ff9c843eb47125c0a16565b5efbc0494b453f9863364196a743b5d226d34b2293f3b4b8dde4b8434172dec0902f0e03c2893c2bfd5f662eefc2902850a0221d55", 0x200003ca}, {&(0x7f0000000400)}], 0x2, &(0x7f0000000540)=[@ip_tos_u8={{0x11}}, @ip_ttl={{0x14}}, @ip_ttl={{0x14}}, @ip_tos_u8={{0x11}}], 0x60}}], 0x3, 0x0) r19 = socket$packet(0x11, 0x3, 0x300) sendmsg$netlink(r6, &(0x7f0000000a40)={&(0x7f0000000200)=@proc={0x10, 0x0, 0x25dfdbfd, 0x200000}, 0xc, &(0x7f0000000980)=[{&(0x7f0000000440)={0x144, 0x3c, 0x200, 0x70bd25, 0x25dfdbfe, "", [@generic="6d77068eeae071d30b0a4cb453624ee8131649d28666439cab96862df92370ba898bf95787ecb5924e226fcb12e36d78af882b118ca0ac4a75f37d6bb48237cf47b67c38475c40072e3d0d53105284ebe2f0b4e8348ce5c8b4db99", @typed={0x8, 0x8e, 0x0, 0x0, @u32=0x5}, @generic="6f24b29572a7aa9a52371d5aa14d05d723a9b56f3fd9ef0d6482992d416c70ed8313f4a094da8ea67b98666076e6290a7d9f9b95dcbe79d7f33f062d0f27bf53a6374369591652a65d93c969c58c1223f810d58b6a5f2fd60bd0ec2297461552c47b0a75a77b5d6c7aef3ac0090a2898cbb154dcb0475619bfdb4db49565d3ea49103c27b4d08c3ddb2c13fc95ea8dbeff07fc18d5f4382420fd875963042beba948a5dfbd6bdde94e6109d21afeb02cf9925be898d7781345bf", @typed={0x8, 0xe, 0x0, 0x0, @u32=0x4}, @nested={0xc, 0x95, 0x0, 0x1, [@typed={0x8, 0x25, 0x0, 0x0, @u32=0x9}]}]}, 0x144}, {&(0x7f00000005c0)={0x220, 0x13, 0x4, 0x70bd29, 0x25dfdbfd, "", [@nested={0xfd, 0x21, 0x0, 0x1, [@generic="30fbe3b13b21c41262a73eaa24cc07a91955ce6354b3bd9420c5847f81a7689ebf064b10d4a54214bffcfcf526ea6a2379a80467f04e5c9c05575aefc09d4a13ae94c8871e153547957d918d1f8bd209e4b743097b98aa351f6d8748932efca58041d2087f1faf47223f5e706caac41d08bc8f2e0ad5cc0697d49734f67a168d5783bb56caeff7af386fcddf0ee3f16a0d3118235972f5f09fd409d67c768e441b894655444a0534b21fa1686b71aa698b295a0641ac3774be1f22c59e8b7ae2e80b9bf8709109d8388bf8", @typed={0x8, 0x8b, 0x0, 0x0, @u32=0x72d}, @typed={0x8, 0x80, 0x0, 0x0, @uid=r10}, @generic="5514750950d70eb7c01340dfc34c9d96acfdec163f2022fed2a1641b6757"]}, @generic="92ce68fc586ed2c9812d5b5b9a36ad964939ab2846a8c70d3890e5295d6b79d2b6a8e4f473c3147f8a48c704c371c8a9dadca4920cb9b36e0691", @generic="4bfde988d8ad0f4499ec2ef185925108a42942e26174849e4ebb4c44d16f87", @nested={0xb1, 0x5c, 0x0, 0x1, [@typed={0x8, 0x44, 0x0, 0x0, @u32=0x3}, @generic="3097578f255c7c3a48e60eb170ab1514d6978c7bd13434e4d7fab92ed7a4c7a36351b6e116a8dd75e842f4bfb09d963c0ee750037dfed153e60e81820ad207be1bdf3283b3924a5863da0d72c296d6171da8fe0f5ef80d95656fda8992e1ebb4837925e87dae2cf60e2ee88a88c3c724ce69e1d36ff77fe3dd61b7ed56b11e255d3640b7ea7811433e5ed5a608ed6774f283e1c76a50b735c0ce06f007ab03b5caff93fb36"]}]}, 0x220}, {&(0x7f00000002c0)={0x58, 0x3b, 0x10, 0x70bd2a, 0x25dfdbfb, "", [@generic="cbfafd259d", @nested={0x2a, 0x85, 0x0, 0x1, [@generic="3669540f759969be30dd0032ba919c94133d4ada1a4a27f2ef0d352f4134ee854fb3", @generic="8f07bac7"]}, @typed={0xc, 0x22, 0x0, 0x0, @u64=0x1}, @typed={0x8, 0x70, 0x0, 0x0, @str='GPL\x00'}]}, 0x58}, {&(0x7f0000000800)={0x64, 0x33, 0x0, 0x70bd26, 0x25dfdbfd, "", [@generic="046c6accad40669b11705253f828db8896a602d4e8d2cd0bc65c7c16fe5523d2ca64717660b584eaf9f7afd8d3d001fd13071e93e1298dee2e3953c03693c532318f5e29", @generic="e1675255e0591784c6f46b3eb3"]}, 0x64}, {&(0x7f0000000880)={0x84, 0x29, 0x10, 0x70bd29, 0x25dfdbfe, "", [@typed={0xc, 0xe, 0x0, 0x0, @u64=0x7}, @generic="254b1574c3db49bf48e1828e3c5f3077bcfd0290fc8aa9103c7dd1a002a6bfd314e67685c740f32282be70a9c4add1f30ce662d04aaecc7db58a122531d7de6cab4cd3d899d0a763b0c892fc56ca9f66036ef4599ac2e46308e1f79520883953cc73620683"]}, 0x84}, {&(0x7f0000000940)={0x1c, 0x13, 0x100, 0x70bd26, 0x25dfdbff, "", [@typed={0xc, 0x47, 0x0, 0x0, @u64}]}, 0x1c}], 0x6, &(0x7f0000000a00)=[@rights={{0x20, 0x1, 0x1, [r1, r15, r16, r18]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, r19, r4, 0xffffffffffffffff]}}], 0x40, 0x4002000}, 0x1) 09:33:29 executing program 3: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="2398c593a2303d8df8dc1623f67a060de466e34712df232157116a41dc2b32"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:33:29 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f0000000340)=ANY=[@ANYBLOB="b7020000f7ffffffbfa70000000000002402000020feffff7a0af0fff8ffffff69a4f0ff00000000b70600000018d1fe2d6405000000000075040000000000000704000000000000b7040000100000206a0700fe00000000850000002f000000b70000000a0000009500000000000000e535f8a62fc2868f0399d909a63796c113a80c19aab9d607000000b6cd483be3f0d3253730e711f5969f62c28b22756bedf3cf393d14c46cc4f79fd2b316da4f0de8163f6242fa732300000637c48468766af540439fce41f144631ac262dcae18c3d1a1fbe96dd87235b44174f7c0343185089a0f119e31975e551558055dc2dc"], &(0x7f0000000280)='GPL\x00'}, 0x48) r1 = socket$kcm(0x11, 0x8000000002, 0x300) socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000540)=r0, 0x4) syz_emit_ethernet(0x3e, &(0x7f0000000000)={@broadcast, @random="96c1e9574b31", @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x30, 0x30, 0x0, 0x0, 0x1, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @local}, @time_exceeded={0xb, 0x0, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local, @multicast2}}}}}}, 0x0) 09:33:29 executing program 3: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="2398c593a2303d8df8dc1623f67a060de466e34712df232157116a41dc2b32"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:33:29 executing program 3: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="2398c593a2303d8df8dc1623f67a060de466e34712df232157116a41dc2b32"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:33:29 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='GPL\x00'}, 0x48) r1 = socket$kcm(0x11, 0x8000000002, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000540)=r0, 0x4) socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = fcntl$dupfd(r2, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') r6 = creat(&(0x7f0000000080)='./file0\x00', 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_LNSMODE(r3, 0x111, 0x4, 0x0, 0x4) ioctl$TIOCSCTTY(r6, 0x540e, 0x8) socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r8 = socket$inet_udplite(0x2, 0x2, 0x88) r9 = fcntl$dupfd(r7, 0x0, r8) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(r9, 0xc01064b5, &(0x7f0000000100)={&(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9}) 09:33:30 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f0000000340)=ANY=[@ANYBLOB="b7020000f7ffffffbfa70000000000002402000020feffff7a0af0fff8ffffff69a4f0ff00000000b70600000018d1fe2d6405000000000075040000000000000704000000000000b7040000100000206a0700fe00000000850000002f000000b70000000a0000009500000000000000e535f8a62fc2868f0399d909a63796c113a80c19aab9d607000000b6cd483be3f0d3253730e711f5969f62c28b22756bedf3cf393d14c46cc4f79fd2b316da4f0de8163f6242fa732300000637c48468766af540439fce41f144631ac262dcae18c3d1a1fbe96dd87235b44174f7c0343185089a0f119e31975e551558055dc2dc"], &(0x7f0000000280)='GPL\x00'}, 0x48) r1 = socket$kcm(0x11, 0x8000000002, 0x300) socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000540)=r0, 0x4) syz_emit_ethernet(0x3e, &(0x7f0000000000)={@broadcast, @random="96c1e9574b31", @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x30, 0x3a, 0x0, 0x0, 0x1, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @local}, @time_exceeded={0xb, 0x0, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local, @multicast2}}}}}}, 0x0) 09:33:30 executing program 3: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="2398c593a2303d8df8dc1623f67a060de466e34712df232157116a41dc2b323a"], 0x0, &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:33:31 executing program 3: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="2398c593a2303d8df8dc1623f67a060de466e34712df232157116a41dc2b323a"], 0x0, &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:33:31 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='GPL\x00'}, 0x48) r1 = socket$kcm(0x11, 0x8000000002, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000540)=r0, 0x4) socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') 09:33:31 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f0000000340)=ANY=[@ANYBLOB="b7020000f7ffffffbfa70000000000002402000020feffff7a0af0fff8ffffff69a4f0ff00000000b70600000018d1fe2d6405000000000075040000000000000704000000000000b7040000100000206a0700fe00000000850000002f000000b70000000a0000009500000000000000e535f8a62fc2868f0399d909a63796c113a80c19aab9d607000000b6cd483be3f0d3253730e711f5969f62c28b22756bedf3cf393d14c46cc4f79fd2b316da4f0de8163f6242fa732300000637c48468766af540439fce41f144631ac262dcae18c3d1a1fbe96dd87235b44174f7c0343185089a0f119e31975e551558055dc2dc"], &(0x7f0000000280)='GPL\x00'}, 0x48) r1 = socket$kcm(0x11, 0x8000000002, 0x300) socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000540)=r0, 0x4) syz_emit_ethernet(0x3e, &(0x7f0000000000)={@broadcast, @random="96c1e9574b31", @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x30, 0x300, 0x0, 0x0, 0x1, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @local}, @time_exceeded={0xb, 0x0, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local, @multicast2}}}}}}, 0x0) 09:33:31 executing program 2: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f00000015c0)=ANY=[@ANYBLOB='%'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = fcntl$dupfd(r3, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$DRM_IOCTL_GEM_OPEN(r5, 0xc010640b, &(0x7f0000000000)={0x0, 0x0, 0x1ff}) ioctl$DRM_IOCTL_GEM_FLINK(r2, 0xc008640a, &(0x7f0000000040)={0x0, r6}) 09:33:31 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) listxattr(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000040)=""/116, 0x74) socket$bt_bnep(0x1f, 0x3, 0x4) syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/hci\x00') socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$FUSE_STATFS(r2, &(0x7f0000000240)={0x60, 0x0, 0x7, {{0x3, 0xf8, 0x2, 0xb2, 0x6, 0xff, 0x6, 0x4}}}, 0x60) mount(&(0x7f00000015c0)=ANY=[@ANYBLOB='#'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:33:31 executing program 1: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000080)=ANY=[@ANYBLOB='#U'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x5, 0x0) [ 1345.921094][T25108] kAFS: unparsable volume name 09:33:31 executing program 3: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="2398c593a2303d8df8dc1623f67a060de466e34712df232157116a41dc2b323a"], 0x0, &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1345.947398][T25113] kAFS: unparsable volume name [ 1345.959786][T25108] kAFS: unparsable volume name 09:33:31 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f00000015c0)=ANY=[@ANYBLOB='#'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) r0 = socket(0x0, 0x80002, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="08e8696071") getsockopt$CAN_RAW_JOIN_FILTERS(r0, 0x65, 0x6, &(0x7f0000000000), &(0x7f0000000040)=0x4) 09:33:31 executing program 3: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="2398c593a2303d8df8dc1623f67a060de466e34712df232157116a41dc2b323a"], &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) 09:33:31 executing program 2: prctl$PR_GET_DUMPABLE(0x3) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) r0 = socket(0x0, 0x80002, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="080db5055e0bcfe8696071") mount(&(0x7f0000000000)=ANY=[@ANYRES16=r0], &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='devtmpfs\x00', 0x10000, 0x0) 09:33:31 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='GPL\x00'}, 0x48) r1 = socket$kcm(0x11, 0x8000000002, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000540)=r0, 0x4) socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') 09:33:31 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f0000000340)=ANY=[@ANYBLOB="b7020000f7ffffffbfa70000000000002402000020feffff7a0af0fff8ffffff69a4f0ff00000000b70600000018d1fe2d6405000000000075040000000000000704000000000000b7040000100000206a0700fe00000000850000002f000000b70000000a0000009500000000000000e535f8a62fc2868f0399d909a63796c113a80c19aab9d607000000b6cd483be3f0d3253730e711f5969f62c28b22756bedf3cf393d14c46cc4f79fd2b316da4f0de8163f6242fa732300000637c48468766af540439fce41f144631ac262dcae18c3d1a1fbe96dd87235b44174f7c0343185089a0f119e31975e551558055dc2dc"], &(0x7f0000000280)='GPL\x00'}, 0x48) r1 = socket$kcm(0x11, 0x8000000002, 0x300) socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000540)=r0, 0x4) syz_emit_ethernet(0x3e, &(0x7f0000000000)={@broadcast, @random="96c1e9574b31", @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x30, 0x600, 0x0, 0x0, 0x1, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @local}, @time_exceeded={0xb, 0x0, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local, @multicast2}}}}}}, 0x0) [ 1346.229481][T25427] kAFS: unparsable volume name 09:33:31 executing program 3: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="2398c593a2303d8df8dc1623f67a060de466e34712df232157116a41dc2b323a"], &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) [ 1346.298296][T25427] kAFS: unparsable volume name 09:33:31 executing program 3: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="2398c593a2303d8df8dc1623f67a060de466e34712df232157116a41dc2b323a"], &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) 09:33:31 executing program 4: socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$RTC_UIE_ON(r2, 0x7003) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f00000015c0)=ANY=[@ANYBLOB='#'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:33:31 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f0000000340)=ANY=[@ANYBLOB="b7020000f7ffffffbfa70000000000002402000020feffff7a0af0fff8ffffff69a4f0ff00000000b70600000018d1fe2d6405000000000075040000000000000704000000000000b7040000100000206a0700fe00000000850000002f000000b70000000a0000009500000000000000e535f8a62fc2868f0399d909a63796c113a80c19aab9d607000000b6cd483be3f0d3253730e711f5969f62c28b22756bedf3cf393d14c46cc4f79fd2b316da4f0de8163f6242fa732300000637c48468766af540439fce41f144631ac262dcae18c3d1a1fbe96dd87235b44174f7c0343185089a0f119e31975e551558055dc2dc"], &(0x7f0000000280)='GPL\x00'}, 0x48) r1 = socket$kcm(0x11, 0x8000000002, 0x300) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$inet(r3, &(0x7f0000000680)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f00000000c0)="5831255624c13e4c563f221188b6be66ea", 0x11}], 0x1}}, {{&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000002c0)=[{&(0x7f0000000040)="70a6b8247e016ae2647a2e703fce46c432e37d1dffd332a793d4b9e3617386d153", 0x21}, {&(0x7f0000000200)="09f96fbf33ceccc10976cd10b1411ee57d092fd5b7f95a0f19f01005f110463ccb2c6ebdb74ad7a7da1a2bed233154886db68984d477ebee11ce9a8e3510d401f6f31ea0a7e3ec1cda7b95f7a02b42753eb4cf0bbf5afbc7084f9bc2603aafe5da6cd54e4d647ec9fd641e4241513aaf23481d1f390bbb83dfae56369f4b03367ccd45f0ec4cd929aed127394157e7b3794500c0c5f88930b1ff50bbae1163c26fff28d06028", 0xa6}, {&(0x7f0000000100)="38d6cd435749d519cc39e90540f37c4f5c6bceef6c4ae07105cafc5e25d9bbfce859670b89666cca0857aa0c2abd8722a9db0caad3905e3ff682", 0x3a}, {&(0x7f0000000140)="d71206abd00e3c0a7e2440673da6a9fc2c1255a9b136bc982a3dc2ac21ef167250c176acfbd4d13abd86b018e8b1357842d8dc93e53f6b542e9633e1db8672e8", 0x40}], 0x4}}, {{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000380)="df304451b990364b1c6ff9c843eb47125c0a16565b5efbc0494b453f9863364196a743b5d226d34b2293f3b4b8dde4b8434172dec0902f0e03c2893c2bfd5f662eefc2902850a0221d55", 0x200003ca}, {&(0x7f0000000400)}], 0x2, &(0x7f0000000540)=[@ip_tos_u8={{0x11}}, @ip_ttl={{0x14}}, @ip_ttl={{0x14}}, @ip_tos_u8={{0x11}}], 0x60}}], 0x3, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000580)={r4, 0x0, 0x1, [0x0]}, 0xa) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r3, 0x84, 0x79, &(0x7f0000000300)={r4, 0x8000, 0x100}, 0x8) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000540)=r0, 0x4) socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r6 = socket$inet_udplite(0x2, 0x2, 0x88) r7 = fcntl$dupfd(r5, 0x0, r6) getresuid(&(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r9 = socket$inet_udplite(0x2, 0x2, 0x88) r10 = fcntl$dupfd(r8, 0x0, r9) syz_open_dev$sndpcmp(&(0x7f00000002c0)='/dev/snd/pcmC#D#p\x00', 0x9a26, 0x8000) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r10, 0xc0a85320, &(0x7f0000000080)={{0x7}, 'port1\x00', 0xc1, 0x100000, 0x2, 0x0, 0xff, 0x593f, 0x200, 0x0, 0x2, 0x2}) 09:33:31 executing program 2: socket$l2tp(0x2, 0x2, 0x73) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000000)=ANY=[@ANYBLOB="25c70895ed3484f23fbb1a6bfff26c6dc96a1863f1200903148dabc648f5863f64527b94ecb637a53b5b6b134b1eb836b21a8563ae64b13189d8e8a1982caa9e4c7fb726fd904df55a5e3ea3a853b0ba174b2d"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1346.606243][T25759] kAFS: unparsable volume name 09:33:32 executing program 1: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000080)=ANY=[@ANYBLOB='#U'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x6, 0x0) 09:33:32 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f0000000340)=ANY=[@ANYBLOB="b7020000f7ffffffbfa70000000000002402000020feffff7a0af0fff8ffffff69a4f0ff00000000b70600000018d1fe2d6405000000000075040000000000000704000000000000b7040000100000206a0700fe00000000850000002f000000b70000000a0000009500000000000000e535f8a62fc2868f0399d909a63796c113a80c19aab9d607000000b6cd483be3f0d3253730e711f5969f62c28b22756bedf3cf393d14c46cc4f79fd2b316da4f0de8163f6242fa732300000637c48468766af540439fce41f144631ac262dcae18c3d1a1fbe96dd87235b44174f7c0343185089a0f119e31975e551558055dc2dc"], &(0x7f0000000280)='GPL\x00'}, 0x48) r1 = socket$kcm(0x11, 0x8000000002, 0x300) socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000540)=r0, 0x4) syz_emit_ethernet(0x3e, &(0x7f0000000000)={@broadcast, @random="96c1e9574b31", @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x30, 0x700, 0x0, 0x0, 0x1, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @local}, @time_exceeded={0xb, 0x0, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local, @multicast2}}}}}}, 0x0) 09:33:32 executing program 3: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="2398c593a2303d8df8dc1623f67a060de466e34712df232157116a41dc2b323a699adc010100"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:33:32 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0x1e, &(0x7f0000000340)=ANY=[@ANYBLOB="b7020000f7ffffffbfa70000000000002402000020feffff7a0af0fff8ffffff69a4f0ff00000000b70600000018d1fe2d6405000000000075040000000000000704000000000000b7040000100000206a0700fe00000000850000002f000000b70000000a0000009500000000000000e535f8a62fc2868f0399d909a63796c113a80c19aab9d607000000b6cd483be3f0d3253730e711f5969f62c28b22756bedf3cf393d14c46cc4f79fd2b316da4f0de8163f6242fa732300000637c48468766af540439fce41f144631ac262dcae18c3d1a1fbe96dd87235b44174f7c0343185089a0f119e31975e551558055dc2dc"], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x18, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x7}, 0x10}, 0x78) r1 = socket$kcm(0x11, 0x8000000002, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000540)=r0, 0x4) socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = fcntl$dupfd(r2, 0x406, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r6 = socket$inet_udplite(0x2, 0x2, 0x88) r7 = fcntl$dupfd(r5, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x2400, 0x6) 09:33:32 executing program 2: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f00000015c0)=ANY=[@ANYBLOB='%'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x400, 0x0) 09:33:32 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$TIOCSISO7816(r3, 0xc0285443, &(0x7f00000001c0)={0xe5, 0x0, 0x7ff, 0x2}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) write$cgroup_int(r3, &(0x7f0000000100)=0x2, 0x12) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = fcntl$dupfd(r0, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = socket$inet_tcp(0x2, 0x1, 0x0) r7 = fcntl$dupfd(r6, 0x0, r6) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) setresuid(r8, r8, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x4000) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x2494834, &(0x7f00000002c0)={{'fd', 0x3d, r5}, 0x2c, {'rootmode', 0x3d, 0xc000}, 0x2c, {'user_id', 0x3d, r8}, 0x2c, {'group_id', 0x3d, r9}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x4}}, {@default_permissions='default_permissions'}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@blksize={'blksize', 0x3d, 0x200}}, {@default_permissions='default_permissions'}, {@blksize={'blksize', 0x3d, 0x1000}}, {@max_read={'max_read', 0x3d, 0x5}}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'afs\x00'}}]}}) mount(&(0x7f0000000000)=ANY=[@ANYBLOB="54d6e64edeb2e0e74dcee973909c168e4f05b47e08d451cb"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1346.873379][T26064] kAFS: unparsable volume name 09:33:32 executing program 3: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="2398c593a2303d8df8dc1623f67a060de466e34712df232157116a41dc2b323a699adc010100"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1346.928029][T26067] kAFS: unparsable volume name 09:33:32 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f0000000340)=ANY=[@ANYBLOB="b7020000f7ffffffbfa70000000000002402000020feffff7a0af0fff8ffffff69a4f0ff00000000b70600000018d1fe2d6405000000000075040000000000000704000000000000b7040000100000206a0700fe00000000850000002f000000b70000000a0000009500000000000000e535f8a62fc2868f0399d909a63796c113a80c19aab9d607000000b6cd483be3f0d3253730e711f5969f62c28b22756bedf3cf393d14c46cc4f79fd2b316da4f0de8163f6242fa732300000637c48468766af540439fce41f144631ac262dcae18c3d1a1fbe96dd87235b44174f7c0343185089a0f119e31975e551558055dc2dc"], &(0x7f0000000280)='GPL\x00'}, 0x48) r1 = socket$kcm(0x11, 0x8000000002, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000540)=r0, 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = fcntl$dupfd(r2, 0x0, r3) r5 = socket$alg(0x26, 0x5, 0x0) bind$alg(r5, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) accept4(r5, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r5, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c81", 0x10) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(r5, 0x8982, &(0x7f0000000080)={0x0, 'ip_vti0\x00', {}, 0x8}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') 09:33:32 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f0000000340)=ANY=[@ANYBLOB="b7020000f7ffffffbfa70000000000002402000020feffff7a0af0fff8ffffff69a4f0ff00000000b70600000018d1fe2d6405000000000075040000000000000704000000000000b7040000100000206a0700fe00000000850000002f000000b70000000a0000009500000000000000e535f8a62fc2868f0399d909a63796c113a80c19aab9d607000000b6cd483be3f0d3253730e711f5969f62c28b22756bedf3cf393d14c46cc4f79fd2b316da4f0de8163f6242fa732300000637c48468766af540439fce41f144631ac262dcae18c3d1a1fbe96dd87235b44174f7c0343185089a0f119e31975e551558055dc2dc"], &(0x7f0000000280)='GPL\x00'}, 0x48) r1 = socket$kcm(0x11, 0x8000000002, 0x300) socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000540)=r0, 0x4) syz_emit_ethernet(0x3e, &(0x7f0000000000)={@broadcast, @random="96c1e9574b31", @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x30, 0xb00, 0x0, 0x0, 0x1, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @local}, @time_exceeded={0xb, 0x0, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local, @multicast2}}}}}}, 0x0) 09:33:32 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f00000015c0)=ANY=[@ANYBLOB='#'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) r0 = socket(0x0, 0x80002, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="080db5055e0bcfe8696071") recvmsg$can_raw(r0, &(0x7f0000001500)={&(0x7f0000000000)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast1}}}, 0x80, &(0x7f00000013c0)=[{&(0x7f0000000080)=""/134, 0x86}, {&(0x7f00000001c0)=""/6, 0x6}, {&(0x7f0000000240)=""/4096, 0x1000}, {&(0x7f0000001240)=""/30, 0x1e}, {&(0x7f0000001280)=""/137, 0x89}, {&(0x7f0000001340)=""/103, 0x67}], 0x6, &(0x7f0000001440)=""/137, 0x89}, 0x1) r2 = syz_genetlink_get_family_id$SEG6(&(0x7f0000001580)='SEG6\x00') sendmsg$SEG6_CMD_GET_TUNSRC(r1, &(0x7f00000016c0)={&(0x7f0000001540)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000001680)={&(0x7f0000001600)={0x74, r2, 0x0, 0x70bd26, 0x25dfdbfe, {}, [@SEG6_ATTR_SECRET={0x10, 0x4, [0x5, 0x20, 0x98]}, @SEG6_ATTR_DST={0x14, 0x1, @ipv4={[], [], @empty}}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xcc}, @SEG6_ATTR_SECRET={0x14, 0x4, [0x7fffffff, 0x6, 0x8, 0x3]}, @SEG6_ATTR_SECRET={0x10, 0x4, [0x0, 0x3, 0x7f]}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x3}]}, 0x74}, 0x1, 0x0, 0x0, 0x20000000}, 0x4000) 09:33:32 executing program 3: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="2398c593a2303d8df8dc1623f67a060de466e34712df232157116a41dc2b323a699adc010100"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:33:32 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) open(&(0x7f0000000300)='./file0\x00', 0x20000, 0x4) syz_genetlink_get_family_id$team(&(0x7f0000000400)='team\x00') getsockopt$PNPIPE_IFINDEX(r0, 0x113, 0x2, &(0x7f0000000440), &(0x7f0000000480)=0x4) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x2, 0x0) write$cgroup_pid(r1, 0x0, 0x0) r2 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r2, &(0x7f0000000180), 0x10) socketpair(0x8000000000001e, 0x805, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) getpeername$packet(r3, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000100)=0x14) sendmsg$can_bcm(r2, &(0x7f00000002c0)={&(0x7f0000000140)={0x1d, r4}, 0x10, &(0x7f0000000280)={&(0x7f0000000200)={0x0, 0x0, 0x0, {0x0, 0x2710}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "55e19dc0c30616da"}}, 0x48}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f00000007c0)={'vxcan1\x00', r4}) r5 = socket(0x0, 0x80002, 0x0) ioctl(r5, 0x1000008912, &(0x7f00000000c0)="080db5055e0bcfe8696071") getpeername$packet(r5, &(0x7f00000004c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000005c0)=0x14) r6 = socket(0x0, 0x80002, 0x0) ioctl(r6, 0x1000008912, &(0x7f00000000c0)="080db5055e0bcfe8696071") getsockopt$PNPIPE_IFINDEX(r6, 0x113, 0x2, &(0x7f0000000600), &(0x7f0000000640)=0x4) getsockname$packet(0xffffffffffffffff, &(0x7f0000001400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000001440)=0x14) r7 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCFLSH(r7, 0x8910, 0x0) r8 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r8, 0x5423, &(0x7f0000000000)=0x6) ioctl$TCFLSH(r8, 0x8910, 0x0) dup2(r7, r8) syz_genetlink_get_family_id$team(&(0x7f00000000c0)='team\x00') socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000380)={0xffffffffffffffff}) r10 = fcntl$dupfd(r9, 0x0, r9) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) [ 1347.276447][T26298] kAFS: unparsable volume name [ 1347.333900][T26298] kAFS: unparsable volume name 09:33:32 executing program 1: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000080)=ANY=[@ANYBLOB='#U'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x7, 0x0) 09:33:32 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f0000000340)=ANY=[@ANYBLOB="b7020000f7ffffffbfa70000000000002402000020feffff7a0af0fff8ffffff69a4f0ff00000000b70600000018d1fe2d6405000000000075040000000000000704000000000000b7040000100000206a0700fe00000000850000002f000000b70000000a0000009500000000000000e535f8a62fc2868f0399d909a63796c113a80c19aab9d607000000b6cd483be3f0d3253730e711f5969f62c28b22756bedf3cf393d14c46cc4f79fd2b316da4f0de8163f6242fa732300000637c48468766af540439fce41f144631ac262dcae18c3d1a1fbe96dd87235b44174f7c0343185089a0f119e31975e551558055dc2dc"], &(0x7f0000000280)='GPL\x00'}, 0x48) r1 = socket$kcm(0x11, 0x8000000002, 0x300) socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000540)=r0, 0x4) syz_emit_ethernet(0x3e, &(0x7f0000000000)={@broadcast, @random="96c1e9574b31", @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x30, 0x1100, 0x0, 0x0, 0x1, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @local}, @time_exceeded={0xb, 0x0, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local, @multicast2}}}}}}, 0x0) 09:33:32 executing program 5: r0 = socket(0x0, 0x80002, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="080db5055e0bcfe8696071") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0x21, &(0x7f0000000580)=ANY=[@ANYBLOB="b7020000f7ffffffbfa70000000000002402000020feffff7a0af0fff8ffffff69a4f0ff00000000b70600000018d1fe2d6405000000000075040000000000000704000000000000b7040000100000206a0700fe00000000850000002f000000b70000000a0000009500000000000000e535f8a62fc2868f0399d909a63796c113a80c19aab9d607000000b6cd483be3f0d3253730e711f5969f62c28b22756bedf3cf393d14c46cc4f79fd2b316da4f0de8163f6242fa732300000637c48468766af540439fce41f144631ac262dcae18c3d1a1fbe96dd87235b44174f7c0343185089a0f119e31975e551558055dc2dc", @ANYRES32, @ANYRESDEC=r0], &(0x7f0000000280)='GPL\x00', 0xfffffffd, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) r2 = socket$kcm(0x11, 0x8000000002, 0x300) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000540)=r1, 0x4) socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = fcntl$dupfd(r3, 0x0, r4) r6 = gettid() getpriority(0x1, r6) r7 = openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x42101, 0x0) getsockopt$bt_BT_POWER(r7, 0x112, 0x9, &(0x7f0000000200), 0x0) r8 = getpgid(0x0) r9 = gettid() r10 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000240)='/dev/dlm-control\x00', 0x0, 0x0) r11 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r11, 0x29, 0x2a, &(0x7f0000fca000)={0x100000001, {{0xa, 0x0, 0x0, @mcast1}}}, 0x88) setsockopt$inet6_MCAST_MSFILTER(r11, 0x29, 0x30, &(0x7f0000001200)=ANY=[@ANYBLOB="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"], 0x310) setsockopt$inet6_group_source_req(r11, 0x29, 0x2b, &(0x7f0000000040)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) r12 = dup3(r11, 0xffffffffffffffff, 0x0) ioctl$KVM_HYPERV_EVENTFD(r10, 0x4018aebd, &(0x7f0000000280)={0x0, r12, 0x1}) r13 = dup(0xffffffffffffffff) r14 = getpgrp(0x0) capget(&(0x7f0000000000)={0x0, r14}, 0x0) r15 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r16 = socket$kcm(0x11, 0xa, 0x300) fcntl$getownex(r16, 0x10, &(0x7f0000000580)={0x0, 0x0}) r18 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) fsetxattr$system_posix_acl(r18, &(0x7f0000000240)='system.posix_acl_access\x00', 0x0, 0x0, 0x1) r19 = gettid() waitid(0x83b895581628fca4, r19, &(0x7f0000000040), 0x2, &(0x7f0000000480)) r20 = dup2(0xffffffffffffffff, 0xffffffffffffffff) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={0x4, 0x2}, &(0x7f00000005c0), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000018c0)={r19, r20, 0x0, 0xd, &(0x7f0000001880)='bond_slave_0\x00', r21}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000007c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x17, &(0x7f0000000780)='cgroup.subtree_control\x00', r21}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r21}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={r17, r18, 0x0, 0x1, &(0x7f0000000080)='\x00', r21}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={0x0, r15, 0x0, 0x0, 0x0, r21}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r14, 0xffffffffffffffff, 0x0, 0x0, 0x0, r21}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000740)={r21}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={r22, r13, 0x0, 0x5, &(0x7f0000000000)='ppp1\x00', r21}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r9, r10, 0x0, 0x10, &(0x7f0000000000)='/dev/input/mice\x00', r21}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r8, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000000000)='+bdev[ð0wlan07GPL\x00', r21}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0x0, r7, 0x0, 0xb, &(0x7f0000000080)='em0trusted\x00', r21}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r21}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={r6, 0xffffffffffffffff, 0x0, 0x6, &(0x7f0000000100)='eth0{\x00', r21}, 0x30) r23 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)={r21}, 0xc) ioctl$LOOP_CHANGE_FD(r2, 0x4c06, r23) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') 09:33:32 executing program 3: mount(&(0x7f0000000240)=ANY=[@ANYBLOB="2398c593a2303d8df8dc1623f67a060de466e34712df232157116a41dc2b323a699adc010100"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:33:32 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f00000015c0)=ANY=[@ANYBLOB='#'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='udf\x00', 0x0, 0x0) open$dir(&(0x7f0000000000)='./file0\x00', 0x1a0280, 0x80) 09:33:32 executing program 2: mount(&(0x7f00000015c0)=ANY=[@ANYBLOB='%'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:33:32 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0xcfd78842d9628346) mount(&(0x7f0000000040)=ANY=[@ANYPTR64], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:33:32 executing program 3: mount(&(0x7f0000000240)=ANY=[@ANYBLOB="2398c593a2303d8df8dc1623f67a060de466e34712df232157116a41dc2b323a699adc010100"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1347.787021][T26820] kAFS: Bad value for 'source' 09:33:32 executing program 2: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000400)=ANY=[@ANYBLOB="f3122a9f826ccb26591189e2ab91e9de7408f73314f67d2e262a321444de74d0ba911f374d55a8430b27fbabe5b6034587f015a31f3f577566ec3578a83e56269711268d8970eaaa9aa8b0da17f6d5aab1bbf286043c165f6d99c6b2f4555846ceac02c800a8f80048a45049823e615da71be0b43991bde808ccada3d1f8dd54661537d769cc60f6226e13b2aa51e10a813a5dedf0eb8c8f5c93f050a707f8d97aadebf2df289bc78306a32e918341950a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r1 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r1, 0x8983, &(0x7f0000000080)={0x0, 'erspan0\x00', {0x1}, 0xfffb}) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg$inet(r2, &(0x7f0000000680)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f00000000c0)="5831255624c13e4c563f221188b6be66ea", 0x11}], 0x1}}, {{&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000002c0)=[{&(0x7f0000000040)="70a6b8247e016ae2647a2e703fce46c432e37d1dffd332a793d4b9e3617386d153", 0x21}, {&(0x7f0000000200)="09f96fbf33ceccc10976cd10b1411ee57d092fd5b7f95a0f19f01005f110463ccb2c6ebdb74ad7a7da1a2bed233154886db68984d477ebee11ce9a8e3510d401f6f31ea0a7e3ec1cda7b95f7a02b42753eb4cf0bbf5afbc7084f9bc2603aafe5da6cd54e4d647ec9fd641e4241513aaf23481d1f390bbb83dfae56369f4b03367ccd45f0ec4cd929aed127394157e7b3794500c0c5f88930b1ff50bbae1163c26fff28d06028", 0xa6}, {&(0x7f0000000100)="38d6cd435749d519cc39e90540f37c4f5c6bceef6c4ae07105cafc5e25d9bbfce859670b89666cca0857aa0c2abd8722a9db0caad3905e3ff682", 0x3a}, {&(0x7f0000000140)="d71206abd00e3c0a7e2440673da6a9fc2c1255a9b136bc982a3dc2ac21ef167250c176acfbd4d13abd86b018e8b1357842d8dc93e53f6b542e9633e1db8672e8", 0x40}], 0x4}}, {{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000380)="df304451b990364b1c6ff9c843eb47125c0a16565b5efbc0494b453f9863364196a743b5d226d34b2293f3b4b8dde4b8434172dec0902f0e03c2893c2bfd5f662eefc2902850a0221d55", 0x200003ca}, {&(0x7f0000000400)}], 0x2, &(0x7f0000000540)=[@ip_tos_u8={{0x11}}, @ip_ttl={{0x14}}, @ip_ttl={{0x14}}, @ip_tos_u8={{0x11}}], 0x60}}], 0x3, 0x0) r3 = dup2(r2, 0xffffffffffffffff) getsockopt$bt_BT_DEFER_SETUP(r3, 0x112, 0x7, &(0x7f0000000300)=0x1, &(0x7f0000000340)=0x4) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', r3}, 0x10) 09:33:33 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) ioctl$KVM_SET_GUEST_DEBUG(0xffffffffffffffff, 0x4048ae9b, &(0x7f0000000000)={0x3, 0x0, [0x0, 0x4, 0x5, 0xffffffff, 0x9, 0x7fff, 0x7, 0x5]}) socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) chdir(&(0x7f0000000100)='./file0\x00') r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UI_SET_SWBIT(r2, 0x4004556d, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x80) setsockopt$inet_sctp_SCTP_CONTEXT(r3, 0x84, 0x11, &(0x7f00000000c0)={0x0, 0x1}, 0x8) r4 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/qat_adf_ctl\x00', 0x410100, 0x0) ioctl$SNDCTL_DSP_RESET(r4, 0x5000, 0x0) mount(&(0x7f00000015c0)=ANY=[@ANYBLOB='#'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:33:33 executing program 3: mount(&(0x7f0000000240)=ANY=[@ANYBLOB="2398c593a2303d8df8dc1623f67a060de466e34712df232157116a41dc2b323a699adc010100"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:33:33 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f0000000340)=ANY=[@ANYBLOB="b7020000f7ffffffbfa70000000000002402000020feffff7a0af0fff8ffffff69a4f0ff00000000b70600000018d1fe2d6405000000000075040000000000000704000000000000b7040000100000206a0700fe00000000850000002f000000b70000000a0000009500000000000000e535f8a62fc2868f0399d909a63796c113a80c19aab9d607000000b6cd483be3f0d3253730e711f5969f62c28b22756bedf3cf393d14c46cc4f79fd2b316da4f0de8163f6242fa732300000637c48468766af540439fce41f144631ac262dcae18c3d1a1fbe96dd87235b44174f7c0343185089a0f119e31975e551558055dc2dc"], &(0x7f0000000280)='GPL\x00'}, 0x48) r1 = socket$kcm(0x11, 0x8000000002, 0x300) socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000540)=r0, 0x4) syz_emit_ethernet(0x3e, &(0x7f0000000000)={@broadcast, @random="96c1e9574b31", @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x30, 0x1c00, 0x0, 0x0, 0x1, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @local}, @time_exceeded={0xb, 0x0, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local, @multicast2}}}}}}, 0x0) [ 1347.991654][T26925] kAFS: unparsable volume name [ 1347.996561][T26924] kAFS: unparsable volume name [ 1348.096027][T26925] kAFS: unparsable volume name 09:33:33 executing program 1: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000080)=ANY=[@ANYBLOB='#U'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x8, 0x0) 09:33:33 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0x1e, &(0x7f0000000340)=ANY=[@ANYBLOB="b7020000f7ffffffbfa70000000000002402000020feffff7a0af0fff8ffffff69a4f0ff00000000b70600000018d1fe2d6405000000000075040000000000000704000000000000b7040000100000206a0700fe00000000850000002f000000b70000000a0000009500000000000000e535f8a62fc2868f0399d909a63796c113a80c19aab9d607000000b6cd483be3f0d3253730e711f5969f62c28b22756bedf3cf393d14c46cc4f79fd2b316da4f0de8163f6242fa732300000637c48468766af540439fce41f144631ac262dcae18c3d1a1fbe96dd87235b44174f7c0343185089a0f119e31975e551558055dc2dc"], &(0x7f0000000280)='GPL\x00', 0xffffffff, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) r1 = socket$kcm(0x11, 0x8000000002, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000540)=r0, 0x4) socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$sock_SIOCGIFBR(r4, 0x8940, &(0x7f00000000c0)=@get={0x1, &(0x7f0000000080)=""/34, 0xed}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = socket(0x0, 0x80002, 0x0) setsockopt$ALG_SET_KEY(r5, 0x117, 0x1, &(0x7f0000000440)="a2070bf3e6198accf59a15fb78abfb21697544269f714bdc13a256c7b14aa9c4f6d336a6297ae466d8e175890de7350cde9c1f2a1a8230fe308cf61d5fd12eadd3724b601025c9a6d0c00f275d13e91408d84368852194e7496135b96c950a727f3f75228d9d7c485d9310a06210e314474424b6edd0ed20389877422770561e4fd4b296787575e7a8c8354f46b80094e8a103161ece9ec06f6de3fa1b8cf37b6a3f14", 0xa3) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000200)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000580)=ANY=[@ANYRES32=r6, @ANYBLOB="000005000000"], 0xa) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r4, 0x84, 0x66, &(0x7f0000000100)={r6, 0x3}, &(0x7f00000001c0)=0x8) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') 09:33:33 executing program 3: mkdir(0x0, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="2398c593a2303d8df8dc1623f67a060de466e34712df232157116a41dc2b323a699adc010100"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:33:33 executing program 2: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount(&(0x7f00000015c0)=ANY=[@ANYBLOB='%'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:33:33 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f0000000340)=ANY=[@ANYBLOB="b7020000f7ffffffbfa70000000000002402000020feffff7a0af0fff8ffffff69a4f0ff00000000b70600000018d1fe2d6405000000000075040000000000000704000000000000b7040000100000206a0700fe00000000850000002f000000b70000000a0000009500000000000000e535f8a62fc2868f0399d909a63796c113a80c19aab9d607000000b6cd483be3f0d3253730e711f5969f62c28b22756bedf3cf393d14c46cc4f79fd2b316da4f0de8163f6242fa732300000637c48468766af540439fce41f144631ac262dcae18c3d1a1fbe96dd87235b44174f7c0343185089a0f119e31975e551558055dc2dc"], &(0x7f0000000280)='GPL\x00'}, 0x48) r1 = socket$kcm(0x11, 0x8000000002, 0x300) socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000540)=r0, 0x4) syz_emit_ethernet(0x3e, &(0x7f0000000000)={@broadcast, @random="96c1e9574b31", @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x30, 0x2100, 0x0, 0x0, 0x1, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @local}, @time_exceeded={0xb, 0x0, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local, @multicast2}}}}}}, 0x0) 09:33:33 executing program 2: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f00000015c0)=ANY=[@ANYBLOB='%'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg$inet(r1, &(0x7f0000000680)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f00000000c0)="5831255624c13e4c563f221188b6be66ea", 0x11}], 0x1}}, {{&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000002c0)=[{&(0x7f0000000040)="70a6b8247e016ae2647a2e703fce46c432e37d1dffd332a793d4b9e3617386d153", 0x21}, {&(0x7f0000000200)="09f96fbf33ceccc10976cd10b1411ee57d092fd5b7f95a0f19f01005f110463ccb2c6ebdb74ad7a7da1a2bed233154886db68984d477ebee11ce9a8e3510d401f6f31ea0a7e3ec1cda7b95f7a02b42753eb4cf0bbf5afbc7084f9bc2603aafe5da6cd54e4d647ec9fd641e4241513aaf23481d1f390bbb83dfae56369f4b03367ccd45f0ec4cd929aed127394157e7b3794500c0c5f88930b1ff50bbae1163c26fff28d06028", 0xa6}, {&(0x7f0000000100)="38d6cd435749d519cc39e90540f37c4f5c6bceef6c4ae07105cafc5e25d9bbfce859670b89666cca0857aa0c2abd8722a9db0caad3905e3ff682", 0x3a}, {&(0x7f0000000140)="d71206abd00e3c0a7e2440673da6a9fc2c1255a9b136bc982a3dc2ac21ef167250c176acfbd4d13abd86b018e8b1357842d8dc93e53f6b542e9633e1db8672e8", 0x40}], 0x4}}, {{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000380)="df304451b990364b1c6ff9c843eb47125c0a16565b5efbc0494b453f9863364196a743b5d226d34b2293f3b4b8dde4b8434172dec0902f0e03c2893c2bfd5f662eefc2902850a0221d55", 0x200003ca}, {&(0x7f0000000400)}], 0x2, &(0x7f0000000540)=[@ip_tos_u8={{0x11}}, @ip_ttl={{0x14}}, @ip_ttl={{0x14}}, @ip_tos_u8={{0x11}}], 0x60}}], 0x3, 0x0) setsockopt$PNPIPE_HANDLE(r1, 0x113, 0x3, &(0x7f0000000000)=0x1, 0x4) 09:33:33 executing program 3: mkdir(0x0, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="2398c593a2303d8df8dc1623f67a060de466e34712df232157116a41dc2b323a699adc010100"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1348.587115][T27333] kAFS: unparsable volume name 09:33:33 executing program 3: mkdir(0x0, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="2398c593a2303d8df8dc1623f67a060de466e34712df232157116a41dc2b323a699adc010100"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1348.633779][T27333] kAFS: unparsable volume name 09:33:33 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f0000000340)=ANY=[@ANYBLOB="b7020000f7ffffffbfa70000000000002402000020feffff7a0af0fff8ffffff69a4f0ff00000000b70600000018d1fe2d6405000000000075040000000000000704000000000000b7040000100000206a0700fe00000000850000002f000000b70000000a0000009500000000000000e535f8a62fc2868f0399d909a63796c113a80c19aab9d607000000b6cd483be3f0d3253730e711f5969f62c28b22756bedf3cf393d14c46cc4f79fd2b316da4f0de8163f6242fa732300000637c48468766af540439fce41f144631ac262dcae18c3d1a1fbe96dd87235b44174f7c0343185089a0f119e31975e551558055dc2dc"], &(0x7f0000000280)='GPL\x00'}, 0x48) r1 = socket$kcm(0x11, 0x8000000002, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000540)=r0, 0x4) socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) connect$vsock_stream(r1, &(0x7f00000001c0)={0x28, 0x0, 0x2711, @my=0x1}, 0x10) r3 = syz_open_dev$vcsu(&(0x7f00000000c0)='/dev/vcsu#\x00', 0xc000000000000000, 0x2080) ioctl$sock_bt_bnep_BNEPGETCONNINFO(r3, 0x800442d3, &(0x7f0000000100)={0x81, 0x7fff, 0x7, @empty, 'veth0_to_hsr\x00'}) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = socket$alg(0x26, 0x5, 0x0) bind$alg(r5, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r6 = accept4(r5, 0x0, 0x0, 0x0) sendmmsg$inet(r6, &(0x7f0000000680)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f00000000c0)="5831255624c13e4c563f221188b6be66ea", 0x11}], 0x1}}, {{&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000002c0)=[{&(0x7f0000000040)="70a6b8247e016ae2647a2e703fce46c432e37d1dffd332a793d4b9e3617386d153", 0x21}, {&(0x7f0000000200)="09f96fbf33ceccc10976cd10b1411ee57d092fd5b7f95a0f19f01005f110463ccb2c6ebdb74ad7a7da1a2bed233154886db68984d477ebee11ce9a8e3510d401f6f31ea0a7e3ec1cda7b95f7a02b42753eb4cf0bbf5afbc7084f9bc2603aafe5da6cd54e4d647ec9fd641e4241513aaf23481d1f390bbb83dfae56369f4b03367ccd45f0ec4cd929aed127394157e7b3794500c0c5f88930b1ff50bbae1163c26fff28d06028", 0xa6}, {&(0x7f0000000100)="38d6cd435749d519cc39e90540f37c4f5c6bceef6c4ae07105cafc5e25d9bbfce859670b89666cca0857aa0c2abd8722a9db0caad3905e3ff682", 0x3a}, {&(0x7f0000000140)="d71206abd00e3c0a7e2440673da6a9fc2c1255a9b136bc982a3dc2ac21ef167250c176acfbd4d13abd86b018e8b1357842d8dc93e53f6b542e9633e1db8672e8", 0x40}], 0x4}}, {{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000380)="df304451b990364b1c6ff9c843eb47125c0a16565b5efbc0494b453f9863364196a743b5d226d34b2293f3b4b8dde4b8434172dec0902f0e03c2893c2bfd5f662eefc2902850a0221d55", 0x200003ca}, {&(0x7f0000000400)}], 0x2, &(0x7f0000000540)=[@ip_tos_u8={{0x11}}, @ip_ttl={{0x14}}, @ip_ttl={{0x14}}, @ip_tos_u8={{0x11}}], 0x60}}], 0x3, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000580)={r7, 0x0, 0x1, [0x0]}, 0xa) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r3, 0x84, 0x10, &(0x7f0000000200)=@sack_info={r7, 0x2, 0x8}, &(0x7f0000000240)=0xc) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r6, 0x84, 0x72, &(0x7f00000002c0)={r8, 0x8, 0x30}, &(0x7f0000000300)=0xc) r9 = fcntl$dupfd(r2, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) syz_open_dev$swradio(&(0x7f0000000080)='/dev/swradio#\x00', 0x1, 0x2) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') 09:33:33 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f0000000340)=ANY=[@ANYBLOB="b7020000f7ffffffbfa70000000000002402000020feffff7a0af0fff8ffffff69a4f0ff00000000b70600000018d1fe2d6405000000000075040000000000000704000000000000b7040000100000206a0700fe00000000850000002f000000b70000000a0000009500000000000000e535f8a62fc2868f0399d909a63796c113a80c19aab9d607000000b6cd483be3f0d3253730e711f5969f62c28b22756bedf3cf393d14c46cc4f79fd2b316da4f0de8163f6242fa732300000637c48468766af540439fce41f144631ac262dcae18c3d1a1fbe96dd87235b44174f7c0343185089a0f119e31975e551558055dc2dc"], &(0x7f0000000280)='GPL\x00'}, 0x48) r1 = socket$kcm(0x11, 0x8000000002, 0x300) socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000540)=r0, 0x4) syz_emit_ethernet(0x3e, &(0x7f0000000000)={@broadcast, @random="96c1e9574b31", @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x30, 0x2f00, 0x0, 0x0, 0x1, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @local}, @time_exceeded={0xb, 0x0, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local, @multicast2}}}}}}, 0x0) 09:33:33 executing program 2: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000000)=ANY=[@ANYBLOB="0f5a6f5fbeb6a2b7c1f032e68d25"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:33:34 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f0000000340)=ANY=[@ANYBLOB="b7020000f7ffffffbfa70000000000002402000020feffff7a0af0fff8ffffff69a4f0ff00000000b70600000018d1fe2d6405000000000075040000000000000704000000000000b7040000100000206a0700fe00000000850000002f000000b70000000a0000009500000000000000e535f8a62fc2868f0399d909a63796c113a80c19aab9d607000000b6cd483be3f0d3253730e711f5969f62c28b22756bedf3cf393d14c46cc4f79fd2b316da4f0de8163f6242fa732300000637c48468766af540439fce41f144631ac262dcae18c3d1a1fbe96dd87235b44174f7c0343185089a0f119e31975e551558055dc2dc"], &(0x7f0000000280)='GPL\x00'}, 0x48) r1 = socket$kcm(0x11, 0x8000000002, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000540)=r0, 0x4) socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r4, 0x84, 0x72, &(0x7f0000000080)={0x0, 0xf76, 0x18}, 0xc) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') [ 1348.919279][T27566] kAFS: unparsable volume name 09:33:34 executing program 1: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000080)=ANY=[@ANYBLOB='#U'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x10, 0x0) 09:33:34 executing program 3: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:33:34 executing program 2: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f00000015c0)=ANY=[@ANYBLOB='V'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:33:34 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f0000000340)=ANY=[@ANYBLOB="b7020000f7ffffffbfa70000000000002402000020feffff7a0af0fff8ffffff69a4f0ff00000000b70600000018d1fe2d6405000000000075040000000000000704000000000000b7040000100000206a0700fe00000000850000002f000000b70000000a0000009500000000000000e535f8a62fc2868f0399d909a63796c113a80c19aab9d607000000b6cd483be3f0d3253730e711f5969f62c28b22756bedf3cf393d14c46cc4f79fd2b316da4f0de8163f6242fa732300000637c48468766af540439fce41f144631ac262dcae18c3d1a1fbe96dd87235b44174f7c0343185089a0f119e31975e551558055dc2dc"], &(0x7f0000000280)='GPL\x00'}, 0x48) r1 = socket$kcm(0x11, 0x8000000002, 0x300) socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000540)=r0, 0x4) syz_emit_ethernet(0x3e, &(0x7f0000000000)={@broadcast, @random="96c1e9574b31", @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x30, 0x3000, 0x0, 0x0, 0x1, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @local}, @time_exceeded={0xb, 0x0, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local, @multicast2}}}}}}, 0x0) 09:33:34 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg$inet(r1, &(0x7f0000000680), 0x0, 0x800) socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0x0, &(0x7f0000000300)=ANY=[@ANYRES32=r1], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x3}, 0x8, 0x10, &(0x7f0000000000)={0x0, 0x0, 0x40}, 0x10, 0x0, r4}, 0x78) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000540)=r5, 0x4) socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r7 = socket$inet_udplite(0x2, 0x2, 0x88) r8 = socket$alg(0x26, 0x5, 0x0) bind$alg(r8, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r9 = accept4(r8, 0x0, 0x0, 0x0) sendmmsg$inet(r9, &(0x7f0000000680)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f00000000c0)="5831255624c13e4c563f221188b6be66ea", 0x11}], 0x1, 0x0, 0x20f}}, {{&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000002c0)=[{&(0x7f0000000040)="70a6b8247e016ae2647a2e703fce46c432e37d1dffd332a793d4b9e3617386d153", 0x21}, {&(0x7f0000000200)="09f96fbf33ceccc10976cd10b1411ee57d092fd5b7f95a0f19f01005f110463ccb2c6ebdb74ad7a7da1a2bed233154886db68984d477ebee11ce9a8e3510d401f6f31ea0a7e3ec1cda7b95f7a02b42753eb4cf0bbf5afbc7084f9bc2603aafe5da6cd54e4d647ec9fd641e4241513aaf23481d1f390bbb83dfae56369f4b03367ccd45f0ec4cd929aed127394157e7b3794500c0c5f88930b1ff50bbae1163c26fff28d06028", 0xa6}, {&(0x7f0000000100)="38d6cd435749d519cc39e90540f37c4f5c6bceef6c4ae07105cafc5e25d9bbfce859670b89666cca0857aa0c2abd8722a9db0caad3905e3ff682", 0x3a}, {&(0x7f0000000140)="d71206abd00e3c0a7e2440673da6a9fc2c1255a9b136bc982a3dc2ac21ef167250c176acfbd4d13abd86b018e8b1357842d8dc93e53f6b542e9633e1db8672e8", 0x40}], 0x4}}, {{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000380)="df304451b990364b1c6ff9c843eb47125c0a16565b5efbc0494b453f9863364196a743b5d226d34b2293f3b4b8dde4b8434172dec0902f0e03c2893c2bfd5f662eefc2902850a0221d55", 0x4a}, {&(0x7f0000000840)="509e20ea837910940b6592d36a1e35cacdb76838fd25464268d3eb887fbd9c51fbe8e3e51c482599733c305af1fc443f6d45e8d76c1f649087463beadf21b131cfe64326589f00"/83}], 0x3ad, &(0x7f0000000540)=[@ip_tos_u8={{0x11}}, @ip_ttl={{0x14}}, @ip_ttl={{0x14}}, @ip_tos_u8={{0xffffffffffffff38}}], 0x60}}], 0x3, 0x1) r10 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r10, &(0x7f0000000000)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r10, &(0x7f00000000c0)={0x14, 0x88, 0xfa00, {r11, 0x30, 0x0, @ib}}, 0x90) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000740)={0x16, 0x98, 0xfa00, {&(0x7f0000000340), 0x1, r11, 0x30, 0x0, @ib={0x1b, 0x3, 0x101, {"a43dbd1623ff5601cd75cd38a0665a31"}, 0x7, 0x9, 0x8}}}, 0xa0) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000080)={0x8001, 0x408, 0x7, 0x3, 0x0}, &(0x7f00000000c0)=0x10) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r9, 0x84, 0x9, &(0x7f00000001c0)={r12, @in={{0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x24}}}, 0x100, 0x1, 0x4, 0x0, 0x8, 0xfdb1}, &(0x7f0000000100)=0x9c) r13 = socket$alg(0x26, 0x5, 0x0) bind$alg(r13, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) accept4(r13, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r13, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c81", 0x10) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f00000005c0)={&(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffa000/0x1000)=nil, &(0x7f0000000440)="5068cc614df67bd050b5212bc7583628cbe75ade14dbbbccf634695301d16212355c9057b0266f5b6137289f13460680ea34e8b33889593c1a408f7eb180bd750fd6055d8007054875b54fb634901ca39ca3187f790488f617f8d824cc1f3d51ed040fcac5329d2f255afb0753360586dea2b437765f567650f8b4a0ac82e52a7bbc05a31ce292b52a93df98d51a5463c523b0798e", 0x95, r13}, 0x26) r14 = fcntl$dupfd(r6, 0x0, r7) ioctl$PERF_EVENT_IOC_ENABLE(r14, 0x8912, 0x400200) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') [ 1349.254138][T27584] kAFS: unparsable volume name 09:33:34 executing program 2: mkdir(&(0x7f0000000200)='./file0\x00', 0x80) mount(&(0x7f00000015c0)=ANY=[@ANYBLOB='%'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:33:34 executing program 3: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:33:34 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f0000000340)=ANY=[@ANYBLOB="b7020000f7ffffffbfa70000000000002402000020feffff7a0af0fff8ffffff69a4f0ff00000000b70600000018d1fe2d6405000000000075040000000000000704000000000000b7040000100000206a0700fe00000000850000002f000000b70000000a0000009500000000000000e535f8a62fc2868f0399d909a63796c113a80c19aab9d607000000b6cd483be3f0d3253730e711f5969f62c28b22756bedf3cf393d14c46cc4f79fd2b316da4f0de8163f6242fa732300000637c48468766af540439fce41f144631ac262dcae18c3d1a1fbe96dd87235b44174f7c0343185089a0f119e31975e551558055dc2dc"], &(0x7f0000000280)='GPL\x00'}, 0x48) r1 = socket$kcm(0x11, 0x8000000002, 0x300) socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000540)=r0, 0x4) syz_emit_ethernet(0x3e, &(0x7f0000000000)={@broadcast, @random="96c1e9574b31", @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x30, 0x3a00, 0x0, 0x0, 0x1, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @local}, @time_exceeded={0xb, 0x0, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local, @multicast2}}}}}}, 0x0) 09:33:34 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f0000000340)=ANY=[@ANYBLOB="b7020000f7ffffffbfa70000000000002402000020feffff7a0af0fff8ffffff69a4f0ff00000000b70600000018d1fe2d6405000000000075040000000000000704000000000000b7040000100000206a0700fe00000000850000002f000000b70000000a0000009500000000000000e535f8a62fc2868f0399d909a63796c113a80c19aab9d607000000b6cd483be3f0d3253730e711f5969f62c28b22756bedf3cf393d14c46cc4f79fd2b316da4f0de8163f6242fa732300000637c48468766af540439fce41f144631ac262dcae18c3d1a1fbe96dd87235b44174f7c0343185089a0f119e31975e551558055dc2dc"], &(0x7f0000000280)='GPL\x00'}, 0x48) r1 = socket$kcm(0x11, 0x8000000002, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000540)=r0, 0x4) socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') 09:33:34 executing program 3: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1349.515526][T27698] kAFS: unparsable volume name 09:33:34 executing program 2: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f00000015c0)=ANY=[@ANYBLOB="05"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:33:34 executing program 3: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1349.745981][T27812] kAFS: unparsable volume name [ 1349.809037][T27814] kAFS: Bad value for 'source' 09:33:35 executing program 1: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000080)=ANY=[@ANYBLOB='#U'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0xf0, 0x0) 09:33:35 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0x1e, &(0x7f0000000340)=ANY=[@ANYBLOB="b7020000f7ffffffbfa70000000000002402000020feffff7a0af0fff8ffffff69a4f0ff00000000b70600000018d1fe2d6405000000000075040000000000000704000000000000b7040000100000206a0700fe00000000850000002f000000b70000000a0000f0aec47299bb009500000000000000e535f8a62fc2868f0399d909a63796c113a80c19aab9d607002000b6cd483be3f0d3253730e711f5969f62c28b22756bedf3cf393d14c46cc4f79fd2b316da4f0de8163f6242fa732300000637c48468766af540439fce41f144631ac262dcae18c32ea1fbe96dd87235b44174f7c0343185089a0f119e31975e55"], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000080), 0x10}, 0x78) r1 = socket$kcm(0x11, 0x8000000002, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000540)=r0, 0x4) socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$VHOST_SET_MEM_TABLE(r4, 0x4008af03, &(0x7f0000000100)=ANY=[@ANYBLOB="73d681a39a988c88bf3cba7449fadb7b0ce53ac7ea7749769218e6a9772fab150073"]) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') 09:33:35 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f0000000340)=ANY=[@ANYBLOB="b7020000f7ffffffbfa70000000000002402000020feffff7a0af0fff8ffffff69a4f0ff00000000b70600000018d1fe2d6405000000000075040000000000000704000000000000b7040000100000206a0700fe00000000850000002f000000b70000000a0000009500000000000000e535f8a62fc2868f0399d909a63796c113a80c19aab9d607000000b6cd483be3f0d3253730e711f5969f62c28b22756bedf3cf393d14c46cc4f79fd2b316da4f0de8163f6242fa732300000637c48468766af540439fce41f144631ac262dcae18c3d1a1fbe96dd87235b44174f7c0343185089a0f119e31975e551558055dc2dc"], &(0x7f0000000280)='GPL\x00'}, 0x48) r1 = socket$kcm(0x11, 0x8000000002, 0x300) socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000540)=r0, 0x4) syz_emit_ethernet(0x3e, &(0x7f0000000000)={@broadcast, @random="96c1e9574b31", @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x30, 0x3f00, 0x0, 0x0, 0x1, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @local}, @time_exceeded={0xb, 0x0, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local, @multicast2}}}}}}, 0x0) 09:33:35 executing program 2: r0 = socket(0x0, 0x3, 0x4) setsockopt$inet_mreqsrc(r0, 0x0, 0x26, &(0x7f0000000000)={@loopback, @multicast2, @multicast1}, 0xc) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) 09:33:35 executing program 3: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1350.095161][T27828] kAFS: Bad value for 'source' 09:33:35 executing program 3: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:33:35 executing program 2: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000040)=ANY=[@ANYRESDEC], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$RTC_SET_TIME(r2, 0x4024700a, &(0x7f0000000000)={0x25, 0x38, 0x11, 0x13, 0xb, 0x0, 0x0, 0x10a, 0x1}) 09:33:35 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f0000000340)=ANY=[@ANYBLOB="b7020000f7ffffffbfa70000000000002402000020feffff7a0af0fff8ffffffe38afb983a69a4f0ff00000000b70600000018d1fe2d640500000000008a040000000000000704000000000000b7040000100000206a0700fe00000000850000002f000000b70000000a0000009500000000000000e535f8a62fc2868f0399d909a63796c113a80c19aab9d607000000b6cd483be3f0d3253730e711f5969f62c28b22756bedf3cf393d14c46cc4f79fd2b316da4f0de8163f6242fa732300000637c48468766af540439fce41f144631ac262dcae18c3d1a1fbe96dd87235e8040000c0343185089a0f119e31975e5515"], &(0x7f0000000280)='GPL\x00'}, 0x48) r1 = socket$kcm(0x11, 0x8000000002, 0x300) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$inet(r3, &(0x7f0000000680)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f00000000c0)="5831255624c13e4c563f221188b6be66ea", 0x11}], 0x1}}, {{&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000002c0)=[{&(0x7f0000000040)="70a6b8247e016ae2647a2e703fce46c432e37d1dffd332a793d4b9e3617386d153", 0x21}, {&(0x7f0000000200)="09f96fbf33ceccc10976cd10b1411ee57d092fd5b7f95a0f19f01005f110463ccb2c6ebdb74ad7a7da1a2bed233154886db68984d477ebee11ce9a8e3510d401f6f31ea0a7e3ec1cda7b95f7a02b42753eb4cf0bbf5afbc7084f9bc2603aafe5da6cd54e4d647ec9fd641e4241513aaf23481d1f390bbb83dfae56369f4b03367ccd45f0ec4cd929aed127394157e7b3794500c0c5f88930b1ff50bbae1163c26fff28d06028", 0xa6}, {&(0x7f0000000100)="38d6cd435749d519cc39e90540f37c4f5c6bceef6c4ae07105cafc5e25d9bbfce859670b89666cca0857aa0c2abd8722a9db0caad3905e3ff682", 0x3a}, {&(0x7f0000000140)="d71206abd00e3c0a7e2440673da6a9fc2c1255a9b136bc982a3dc2ac21ef167250c176acfbd4d13abd86b018e8b1357842d8dc93e53f6b542e9633e1db8672e8", 0x40}], 0x4}}, {{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000380)="df304451b990364b1c6ff9c843eb47125c0a16565b5efbc0494b453f9863364196a743b5d226d34b2293f3b4b8dde4b8434172dec0902f0e03c2893c2bfd5f662eefc2902850a0221d55", 0x200003ca}, {&(0x7f0000000400)}], 0x2, &(0x7f0000000540)=[@ip_tos_u8={{0x11}}, @ip_ttl={{0x14}}, @ip_ttl={{0x14}}, @ip_tos_u8={{0x11}}], 0x60}}], 0x3, 0x0) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0)='nl80211\x00') sendmsg$NL80211_CMD_NEW_KEY(r3, &(0x7f0000000240)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x90015880}, 0xc, &(0x7f0000000100)={&(0x7f00000001c0)={0x50, r4, 0x100, 0x70bd2c, 0x25dfdbfe, {}, [@NL80211_ATTR_KEY_CIPHER={0x8, 0x9, 0xfac01}, @NL80211_ATTR_KEY={0x1c, 0x50, [@NL80211_KEY_DEFAULT_TYPES={0xc, 0x8, [@NL80211_KEY_DEFAULT_TYPE_MULTICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_UNICAST={0x4}]}, @NL80211_KEY_SEQ={0x8, 0x4, "5fdf9473"}, @NL80211_KEY_DEFAULT={0x4}]}, @NL80211_ATTR_KEY={0x18, 0x50, [@NL80211_KEY_CIPHER={0x8, 0x3, 0xfac05}, @NL80211_KEY_DATA_WEP40={0x9, 0x1, "65ed604c9d"}]}]}, 0x50}, 0x1, 0x0, 0x0, 0x10}, 0x2000800) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000540)=r0, 0x4) socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r6 = socket$inet_udplite(0x2, 0x2, 0x88) r7 = fcntl$dupfd(r5, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r9 = socket$inet_udplite(0x2, 0x2, 0x88) r10 = fcntl$dupfd(r8, 0x0, r9) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r7, 0x2405, r10) 09:33:35 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f0000000340)=ANY=[@ANYBLOB="b7020000f7ffffffbfa70000000000002402000020feffff7a0af0fff8ffffff69a4f0ff00000000b70600000018d1fe2d6405000000000075040000000000000704000000000000b7040000100000206a0700fe00000000850000002f000000b70000000a0000009500000000000000e535f8a62fc2868f0399d909a63796c113a80c19aab9d607000000b6cd483be3f0d3253730e711f5969f62c28b22756bedf3cf393d14c46cc4f79fd2b316da4f0de8163f6242fa732300000637c48468766af540439fce41f144631ac262dcae18c3d1a1fbe96dd87235b44174f7c0343185089a0f119e31975e551558055dc2dc"], &(0x7f0000000280)='GPL\x00'}, 0x48) r1 = socket$kcm(0x11, 0x8000000002, 0x300) socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000540)=r0, 0x4) syz_emit_ethernet(0x3e, &(0x7f0000000000)={@broadcast, @random="96c1e9574b31", @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x30, 0x4000, 0x0, 0x0, 0x1, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @local}, @time_exceeded={0xb, 0x0, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local, @multicast2}}}}}}, 0x0) [ 1350.403095][T28044] kAFS: unparsable volume name [ 1350.403767][T28042] kAFS: Bad value for 'source' [ 1350.431607][T28044] kAFS: unparsable volume name 09:33:35 executing program 3: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:33:35 executing program 2: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f00000015c0)=ANY=[@ANYBLOB='%'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000000)=r2, 0x4) [ 1350.608690][T28250] kAFS: unparsable volume name 09:33:35 executing program 3: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1350.630272][T28250] kAFS: unparsable volume name [ 1350.644367][T28251] kAFS: Bad value for 'source' [ 1350.843453][T28358] kAFS: Bad value for 'source' 09:33:36 executing program 1: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000080)=ANY=[@ANYBLOB='#U'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x300, 0x0) 09:33:36 executing program 3: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:33:36 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f0000000340)=ANY=[@ANYBLOB="b7020000f7ffffffbfa70000000000002402000020feffff7a0af0fff8ffffff69a4f0ff00000000b70600000018d1fe2d6405000000000075040000000000000704000000000000b7040000100000206a0700fe00000000850000002f000000b70000000a0000009500000000000000e535f8a62fc2868f0399d909a63796c113a80c19aab9d607000000b6cd483be3f0d3253730e711f5969f62c28b22756bedf3cf393d14c46cc4f79fd2b316da4f0de8163f6242fa732300000637c48468766af540439fce41f144631ac262dcae18c3d1a1fbe96dd87235b44174f7c0343185089a0f119e31975e551558055dc2dc"], &(0x7f0000000280)='GPL\x00'}, 0x48) r1 = socket$kcm(0x11, 0x8000000002, 0x300) socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000540)=r0, 0x4) syz_emit_ethernet(0x3e, &(0x7f0000000000)={@broadcast, @random="96c1e9574b31", @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x30, 0xffff, 0x0, 0x0, 0x1, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @local}, @time_exceeded={0xb, 0x0, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local, @multicast2}}}}}}, 0x0) 09:33:36 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f0000000340)=ANY=[@ANYBLOB="b7020000f7ffffffbfa70000000000002402000020feffff7a0af0fff8ffffff69a4f0ff00000000b70600000018d1fe2d6405000000000075040000000000000704000000000000b7040000100000206a0700fe00000000850000002f000000b70000000a0000009500000000000000e535f8a62fc2868f0399d909a63796c113a80c19aab9d607000000b6cd483be3f0d3253730e711f5969f62c28b22756bedf3b4393d14c46cc4f79fd2b316da4f0de8163f6242fa732300000637c48468766af540439fce41f144631ac262dcae18c3d1a1fbe96dd87235b44174f7c0343185089a0f119e31975e551558055dc2dc"], &(0x7f0000000280)='GPL\x00'}, 0x48) r1 = socket$kcm(0x11, 0x8000000002, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000540)=r0, 0x4) socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') 09:33:36 executing program 2: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f00000015c0)=ANY=[@ANYBLOB="01"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1351.101811][T28367] kAFS: Bad value for 'source' [ 1351.111946][T28368] kAFS: unparsable volume name 09:33:36 executing program 3: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="2398c593a2303d8df8dc1623f67a060de466e3"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:33:36 executing program 2: keyctl$KEYCTL_CAPABILITIES(0x1f, &(0x7f0000000000), 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) lgetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@known='trusted.overlay.metacopy\x00', &(0x7f0000000080)=""/162, 0xa2) openat$vimc1(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/video1\x00', 0x2, 0x0) mount(&(0x7f00000015c0)=ANY=[@ANYBLOB='%'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) r0 = socket(0x0, 0x80002, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="080db5055e0bcfe8696071") accept$unix(r0, &(0x7f0000000240), &(0x7f00000002c0)=0x6e) 09:33:36 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f00000015c0)=ANY=[@ANYBLOB='#'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) r0 = socket(0x0, 0x80002, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="080db5055e0bcfe8696071") r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000140)='NLBL_MGMT\x00') sendmsg$NLBL_MGMT_C_REMOVE(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)={0x40, r1, 0x100, 0x70bd26, 0x25dfdbfb, {}, [@NLBL_MGMT_A_IPV6MASK={0x14, 0x6, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x22}}}, @NLBL_MGMT_A_CV4DOI={0x8, 0x4, 0x1}, @NLBL_MGMT_A_DOMAIN={0xd, 0x1, ':.vmnet0\x00'}]}, 0x40}, 0x1, 0x0, 0x0, 0x48080}, 0x80000) sendmsg$NLBL_MGMT_C_REMOVEDEF(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x42000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x70, r1, 0x10, 0x70bd27, 0x25dfdbfc, {}, [@NLBL_MGMT_A_PROTOCOL={0x8, 0x2, 0x7}, @NLBL_MGMT_A_DOMAIN={0x8, 0x1, 'afs\x00'}, @NLBL_MGMT_A_IPV6ADDR={0x14, 0x5, @local}, @NLBL_MGMT_A_IPV6MASK={0x14, 0x6, @local}, @NLBL_MGMT_A_IPV4ADDR={0x8, 0x7, @broadcast}, @NLBL_MGMT_A_IPV6ADDR={0x14, 0x5, @rand_addr="fa6ad78c691ec2caf247cbfb49485241"}, @NLBL_MGMT_A_CV4DOI={0x8}]}, 0x70}, 0x1, 0x0, 0x0, 0x80}, 0x4c002) 09:33:36 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0x1, &(0x7f0000000340)=ANY=[@ANYPTR=&(0x7f0000000440)=ANY=[@ANYPTR]], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x6, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0xb}, 0x10}, 0x78) r1 = socket$kcm(0x11, 0x8000000002, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000540)=r0, 0x4) socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') [ 1351.324472][T28478] kAFS: unparsable volume name [ 1351.340497][T28479] kAFS: unparsable volume name 09:33:36 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f0000000340)=ANY=[@ANYBLOB="b7020000f7ffffffbfa70000000000002402000020feffff7a0af0fff8ffffff69a4f0ff00000000b70600000018d1fe2d6405000000000075040000000000000704000000000000b7040000100000206a0700fe00000000850000002f000000b70000000a0000009500000000000000e535f8a62fc2868f0399d909a63796c113a80c19aab9d607000000b6cd483be3f0d3253730e711f5969f62c28b22756bedf3cf393d14c46cc4f79fd2b316da4f0de8163f6242fa732300000637c48468766af540439fce41f144631ac262dcae18c3d1a1fbe96dd87235b44174f7c0343185089a0f119e31975e551558055dc2dc"], &(0x7f0000000280)='GPL\x00'}, 0x48) r1 = socket$kcm(0x11, 0x8000000002, 0x300) socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000540)=r0, 0x4) syz_emit_ethernet(0x3e, &(0x7f0000000000)={@broadcast, @random="96c1e9574b31", @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x1, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @local}, @time_exceeded={0xb, 0x0, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local, @multicast2}}}}}}, 0x0) 09:33:36 executing program 3: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="2398c593a2303d8df8dc1623f67a060de466e3"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:33:36 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000015c0)=ANY=[@ANYBLOB='H'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) accept4(r3, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c81", 0x10) ioctl$VIDIOC_QBUF(r2, 0xc058560f, &(0x7f00000001c0)={0x0, 0x6, 0x4, 0x200000, 0x0, {}, {0x1, 0x0, 0x20, 0xbd, 0x6, 0x4, "9f719c16"}, 0x2, 0x3, @offset=0x4, 0x3, 0x0, r3}) recvfrom$unix(r4, &(0x7f0000000240)=""/74, 0x4a, 0x2000, 0x0, 0x0) ioctl$VIDIOC_DQBUF(0xffffffffffffffff, 0xc0585611, &(0x7f0000000040)={0x2, 0x5, 0x4, 0x4000000, 0x0, {}, {0x3, 0xd0696c3581310126, 0x1, 0x9, 0x0, 0x20, "df2a5414"}, 0x80000001, 0x6, @offset=0x7f, 0x10000, 0x0, 0xffffffffffffffff}) ioctl$sock_TIOCOUTQ(r5, 0x5411, &(0x7f00000000c0)) [ 1351.665516][T28694] kAFS: unparsable volume name [ 1351.725063][T28694] kAFS: unparsable volume name 09:33:37 executing program 1: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000080)=ANY=[@ANYBLOB='#U'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x500, 0x0) 09:33:37 executing program 3: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="2398c593a2303d8df8dc1623f67a060de466e3"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:33:37 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg$inet(r1, &(0x7f0000000680)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f00000000c0)="5831255624c13e4c563f221188b6be66ea", 0x11}], 0x1}}, {{&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000002c0)=[{&(0x7f0000000040)="70a6b8247e016ae2647a2e703fce46c432e37d1dffd332a793d4b9e3617386d153", 0x21}, {&(0x7f0000000200)="09f96fbf33ceccc10976cd10b1411ee57d092fd5b7f95a0f19f01005f110463ccb2c6ebdb74ad7a7da1a2bed233154886db68984d477ebee11ce9a8e3510d401f6f31ea0a7e3ec1cda7b95f7a02b42753eb4cf0bbf5afbc7084f9bc2603aafe5da6cd54e4d647ec9fd641e4241513aaf23481d1f390bbb83dfae56369f4b03367ccd45f0ec4cd929aed127394157e7b3794500c0c5f88930b1ff50bbae1163c26fff28d06028", 0xa6}, {&(0x7f0000000100)="38d6cd435749d519cc39e90540f37c4f5c6bceef6c4ae07105cafc5e25d9bbfce859670b89666cca0857aa0c2abd8722a9db0caad3905e3ff682", 0x3a}, {&(0x7f0000000140)="d71206abd00e3c0a7e2440673da6a9fc2c1255a9b136bc982a3dc2ac21ef167250c176acfbd4d13abd86b018e8b1357842d8dc93e53f6b542e9633e1db8672e8", 0x40}], 0x4}}, {{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000380)="df304451b990364b1c6ff9c843eb47125c0a16565b5efbc0494b453f9863364196a743b5d226d34b2293f3b4b8dde4b8434172dec0902f0e03c2893c2bfd5f662eefc2902850a0221d55", 0x200003ca}, {&(0x7f0000000400)}], 0x2, &(0x7f0000000540)=[@ip_tos_u8={{0x11}}, @ip_ttl={{0x14}}, @ip_ttl={{0x14}}, @ip_tos_u8={{0x11}}], 0x60}}], 0x3, 0x0) setsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000100)={0x7, 0x3, 0x2, 0x7f, 0x2, 0x8, 0x3, 0x3, 0x2, 0xfb, 0x0, 0x9, 0xab, 0xa6}, 0xe) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) r2 = syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x400) r3 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x4200, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f00000000c0)=0x4ac76322) r4 = socket$inet_tcp(0x2, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000b00)=0xc) setsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f00000007c0)={{{@in=@empty, @in=@multicast1, 0x4e23, 0x8001, 0x4e21, 0x9, 0x0, 0x20, 0xc0, 0x5e, 0x0, r6}, {0x6, 0x0, 0x2, 0x3, 0x480, 0x4, 0x7, 0x1}, {0x101, 0x3, 0x2, 0x7}, 0x96f, 0x6e6bbb, 0x608f917477f760e0, 0x1, 0x1, 0xfb37c7a19e19f3f9}, {{@in6=@rand_addr="17df945b34f8ddfaad004646bda31afc", 0x4d4, 0x33}, 0xa, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x6}}, 0xe8) r7 = getegid() r8 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$KIOCSOUND(r8, 0x4b2f, 0xa8) chown(&(0x7f0000000140)='./file0\x00', 0x0, r7) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x100000, &(0x7f0000000240)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, r6}, 0x2c, {'group_id', 0x3d, r7}, 0x2c, {[{@default_permissions='default_permissions'}, {@blksize={'blksize', 0x3d, 0x400}}, {@max_read={'max_read', 0x3d, 0xde1e}}, {@allow_other='allow_other'}, {@blksize={'blksize', 0x3d, 0x200}}, {@max_read={'max_read', 0x3d, 0x3b}}, {@blksize={'blksize'}}], [{@obj_type={'obj_type', 0x3d, 'proc'}}]}}) mount(&(0x7f00000015c0)=ANY=[@ANYBLOB='#'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:33:37 executing program 2: socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$SNDCTL_DSP_GETOPTR(r2, 0x800c5012, &(0x7f0000000000)) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f00000015c0)=ANY=[@ANYBLOB='%'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:33:37 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f0000000340)=ANY=[@ANYBLOB="b7020000f7ffffffbfa70000000000002402000020feffff7a0af0fff8ffffff69a4f0ff00000000b70600000018d1fe2d6405000000000075040000000000000704000000000000b7040000100000206a0700fe00000000850000002f000000b70000000a0000009500000000000000e535f8a62fc2868f0399d909a63796c113a80c19aab9d607000000b6cd483be3f0d3253730e711f5969f62c28b22756bedf3cf393d14c46cc4f79fd2b316da4f0de8163f6242fa732300000637c48468766af540439fce41f144631ac262dcae18c3d1a1fbe96dd87235b44174f7c0343185089a0f119e31975e551558055dc2dc"], &(0x7f0000000280)='GPL\x00'}, 0x48) r1 = socket$kcm(0x11, 0x8000000002, 0x300) socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000540)=r0, 0x4) syz_emit_ethernet(0x3e, &(0x7f0000000000)={@broadcast, @random="96c1e9574b31", @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x2, 0x0, 0x1, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @local}, @time_exceeded={0xb, 0x0, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local, @multicast2}}}}}}, 0x0) [ 1351.980222][T28903] kAFS: unparsable volume name [ 1351.988070][T28905] kAFS: unparsable volume name 09:33:37 executing program 3: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="2398c593a2303d8df8dc1623f67a060de466e34712df232157116a41dc"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:33:37 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f0000000340)=ANY=[@ANYBLOB="b7020000f7ffffffbfa70000000000002402000020feffff7a0af0fff8ffffff69a4f0ff00000000b70600000018d1fe2d6405000000000075040000000000000704000000000000b7040000100000206a0700fe00000000850000002f000000b70000000a0000009500000000000000e535f8a62fc2868f0399d909a63796c113a80c19aab9d607000000b6cd483be3f0d3253730e711f5969f62c28b22756bedf3cf393d14c46cc4f79fd2b316da4f0de8163f6242fa732300000637c48468766af540439fce41f144631ac262dcae18c3d1a1fbe96dd87235b44174f7c0343185089a0f119e31975e551558055dc2dc"], &(0x7f0000000280)='GPL\x00'}, 0x48) r1 = socket$kcm(0x11, 0x8000000002, 0x300) socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000540)=r0, 0x4) syz_emit_ethernet(0x3e, &(0x7f0000000000)={@broadcast, @random="96c1e9574b31", @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x3, 0x0, 0x1, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @local}, @time_exceeded={0xb, 0x0, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local, @multicast2}}}}}}, 0x0) 09:33:37 executing program 2: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nvram\x00', 0x5b8c38175cf00c22, 0x0) setsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000040)={0x0, @in6={{0xa, 0x4e22, 0x3, @local, 0x3}}}, 0x84) mount(&(0x7f00000015c0)=ANY=[@ANYBLOB='%'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:33:37 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) r0 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x40000) setsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f00000001c0), 0x4) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) sendmmsg$inet(r2, &(0x7f0000000680)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f00000000c0)="5831255624c13e4c563f221188b6be66ea", 0x11}], 0x1, 0x0, 0xffffffffffffffbf}}, {{&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0xfffffeef, &(0x7f00000002c0)=[{&(0x7f0000000040)="70a6b8247e016ae2647a2e703fce46c432e37d1dffd332a793d4b9e3617386d153", 0x21}, {&(0x7f0000000200)="09f96fbf33ceccc10976cd10b1411ee57d092fd5b7f95a0f19f01005f110463ccb2c6ebdb74ad7a7da1a2bed233154886db68984d477ebee11ce9a8e3510d401f6f31ea0a7e3ec1cda7b95f7a02b42753eb4cf0bbf5afbc7084f9bc2603aafe5da6cd54e4d647ec9fd641e4241513aaf23481d1f390bbb83dfae56369f4b03367ccd45f0ec4cd929aed127394157e7b3794500c0c5f88930b1ff50bbae1163c26fff28d06028", 0xa6}, {&(0x7f0000000100)="38d6cd435749d519cc39e90540f37c4f5c6bceef6c4ae07105cafc5e25d9bbfce859670b89666cca0857aa0c2abd8722a9db0caad3905e3ff682", 0x3a}, {&(0x7f0000000140)="d71206abd00e3c0a7e2440673da6a9fc2c1255a9b136bc982a3dc2ac21ef167250c176acfbd4d13abd86b018e8b1357842d8dc93e53f6b542e9633e1db8672e8", 0x40}], 0x1000000000000088}}, {{0x0, 0x21b, &(0x7f0000000500)=[{&(0x7f0000000380)="df304451b990364b1c6ff9c843eb47125c0a16565b5efbc0494b453f9863364196a743b5d226d34b2293f3b4b8dde4b8434172dec0902f0e03c2893c2bfd5f662eefc2902850a0221d55", 0x20000719}, {&(0x7f0000000400)}], 0x2, &(0x7f0000000540)=[@ip_tos_u8={{0x11}}, @ip_ttl={{0x14}}, @ip_ttl={{0x14}}, @ip_tos_u8={{0x11}}], 0x47}}], 0x3, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000300)=ANY=[@ANYRES32=r3, @ANYBLOB="000001020000ff6f6c6ce2db007ea981eb9567a0792ce8545fe0bb0d8448919634d5413423db415fe26e78f4f61275641ea45287761babd528ed44060420b5851cfb737e08"], 0xa) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r2, 0x84, 0x73, &(0x7f0000000040)={r3, 0x5, 0x0, 0xf34e, 0x6}, &(0x7f0000000080)=0x18) setsockopt$inet_sctp_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f00000000c0)=@assoc_value={r4}, 0x8) r5 = socket(0x0, 0x80002, 0x0) ioctl(r5, 0x1000008912, &(0x7f00000000c0)="080db5055e0bcfe8696071") fadvise64(r5, 0x3, 0x8001, 0x0) r6 = socket$bt_hidp(0x1f, 0x3, 0x6) setsockopt$bt_BT_SNDMTU(r6, 0x112, 0xc, &(0x7f0000000000)=0x3808, 0x2) mount(&(0x7f0000000480)=ANY=[@ANYBLOB="231871946de86edf2f98fa816d6745168d4ba728c6759e1002ab7dfe3b8ae60ceebc3751b4a701b7464f"], &(0x7f00000004c0)='./file0\x00', &(0x7f0000000440)='configfs\x00', 0x0, 0x0) 09:33:37 executing program 3: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="2398c593a2303d8df8dc1623f67a060de466e34712df232157116a41dc"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1352.259298][T29216] kAFS: unparsable volume name 09:33:37 executing program 2: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = fcntl$dupfd(r3, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) syz_genetlink_get_family_id$nbd(&(0x7f00000000c0)='nbd\x00') ioctl$KVM_CREATE_DEVICE(r2, 0xc00caee0, &(0x7f0000000040)={0x3, r5, 0x2}) ioctl(r6, 0x3eb86975, &(0x7f0000000080)="8173650ff9241dce8dbc378de95e380418b31f91b722411daf2ea2c2f03fc1b9a869632ffb8c1f10b067e8a96f8a986b") mount(&(0x7f0000000000)=ANY=[@ANYBLOB="236835a6df91e1f672fe0adb"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:33:37 executing program 3: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="2398c593a2303d8df8dc1623f67a060de466e34712df232157116a41dc"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:33:37 executing program 1: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000080)=ANY=[@ANYBLOB='#U'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x600, 0x0) 09:33:37 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f0000000340)=ANY=[@ANYBLOB="b7020000f7ffffffbfa70000000000002402000020feffff7a0af0fff8ffffff69a4f0ff00000000b70600000018d1fe2d6405000000000075040000000000000704000000000000b7040000100000206a0700fe00000000850000002f000000b70000000a0000009500000000000000e535f8a62fc2868f0399d909a63796c113a80c19aab9d607000000b6cd483be3f0d3253730e711f5969f62c28b22756bedf3cf393d14c46cc4f79fd2b316da4f0de8163f6242fa732300000637c48468766af540439fce41f144631ac262dcae18c3d1a1fbe96dd87235b44174f7c0343185089a0f119e31975e551558055dc2dc"], &(0x7f0000000280)='GPL\x00'}, 0x48) r1 = socket$kcm(0x11, 0x8000000002, 0x300) socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000540)=r0, 0x4) syz_emit_ethernet(0x3e, &(0x7f0000000000)={@broadcast, @random="96c1e9574b31", @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x4, 0x0, 0x1, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @local}, @time_exceeded={0xb, 0x0, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local, @multicast2}}}}}}, 0x0) 09:33:37 executing program 3: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="2398c593a2303d8df8dc1623f67a060de466e34712df232157116a41dc2b323a699a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:33:37 executing program 2: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000000)=ANY=[@ANYBLOB="0f0c1bfeae3f7ad1f783a4cc34b1eea42d06cf"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:33:37 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@known='com.apple.system.Security\x00', &(0x7f0000000080)='afs\x00', 0x4, 0x1) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg$inet(r1, &(0x7f0000000680)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f00000000c0)="5831255624c13e4c563f221188b6be66ea", 0x11}], 0x1}}, {{&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000002c0)=[{&(0x7f0000000040)="70a6b8247e016ae2647a2e703fce46c432e37d1dffd332a793d4b9e3617386d153", 0x21}, {&(0x7f0000000200)="09f96fbf33ceccc10976cd10b1411ee57d092fd5b7f95a0f19f01005f110463ccb2c6ebdb74ad7a7da1a2bed233154886db68984d477ebee11ce9a8e3510d401f6f31ea0a7e3ec1cda7b95f7a02b42753eb4cf0bbf5afbc7084f9bc2603aafe5da6cd54e4d647ec9fd641e4241513aaf23481d1f390bbb83dfae56369f4b03367ccd45f0ec4cd929aed127394157e7b3794500c0c5f88930b1ff50bbae1163c26fff28d06028", 0xa6}, {&(0x7f0000000100)="38d6cd435749d519cc39e90540f37c4f5c6bceef6c4ae07105cafc5e25d9bbfce859670b89666cca0857aa0c2abd8722a9db0caad3905e3ff682", 0x3a}, {&(0x7f0000000140)="d71206abd00e3c0a7e2440673da6a9fc2c1255a9b136bc982a3dc2ac21ef167250c176acfbd4d13abd86b018e8b1357842d8dc93e53f6b542e9633e1db8672e8", 0x40}], 0x4}}, {{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000380)="df304451b990364b1c6ff9c843eb47125c0a16565b5efbc0494b453f9863364196a743b5d226d34b2293f3b4b8dde4b8434172dec0902f0e03c2893c2bfd5f662eefc2902850a0221d55", 0x200003ca}, {&(0x7f0000000400)}], 0x2, &(0x7f0000000540)=[@ip_tos_u8={{0x11}}, @ip_ttl={{0x14}}, @ip_ttl={{0x14}}, @ip_tos_u8={{0x11}}], 0x60}}], 0x3, 0x0) mount(&(0x7f00000000c0)=ANY=[@ANYRESOCT=r1], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:33:37 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f0000000340)=ANY=[@ANYBLOB="b7020000f7ffffffbfa70000000000002402000020feffff7a0af0ffff69a4f0ff00000000b70600000018d1fe2d6405000000000075040000000000000704000000000000b7040000100000206a0700fe00000000850000002f000000b70000000a0000009500000000000000e535f8a62fc2868f0399d909a63796c113a80c19aab9d607000000b6db4839e3f0d3253730e711f5969f62c28b22756bedf3cf393d14c46cc4f79fd2b316da4f734d2300000637c48468766af540439fce41f144631ac262dcae18c3d1a1fbe96dd87235b44174f7c0343185089a0f119e31975e551558055dc2"], &(0x7f0000000280)='GPL\x00'}, 0x48) r1 = socket$kcm(0x11, 0x8000000002, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000540)=r0, 0x4) socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000600)={0x0, 0xffffffffffffffff, 0x1}, 0x10) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = fcntl$dupfd(r2, 0x0, r3) r5 = socket$alg(0x26, 0x5, 0x0) bind$alg(r5, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r6 = accept4(r5, 0x0, 0x0, 0x0) r7 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000640)='/dev/bsg\x00', 0x90000, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r7, 0x0, 0x41, &(0x7f0000000740)={'security\x00', 0x13, "2cb86c0ab817d7773bae1dc2d3c23ad72b9efd"}, &(0x7f0000000780)=0x37) sendmmsg$inet(r6, &(0x7f0000000680)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f00000000c0)="5831255624c13e4c563f221188b6be66ea", 0x11}], 0x1}}, {{&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000002c0)=[{&(0x7f0000000040)="70a6b8247e016ae2647a2e703fce46c432e37d1dffd332a793d4b9e3617386d153", 0x21}, {&(0x7f0000000200)="09f96fbf33ceccc10976cd10b1411ee57d092fd5b7f95a0f19f01005f110463ccb2c6ebdb74ad7a7da1a2bed233154886db68984d477ebee11ce9a8e3510d401f6f31ea0a7e3ec1cda7b95f7a02b42753eb4cf0bbf5afbc7084f9bc2603aafe5da6cd54e4d647ec9fd641e4241513aaf23481d1f390bbb83dfae56369f4b03367ccd45f0ec4cd929aed127394157e7b3794500c0c5f88930b1ff50bbae1163c26fff28d06028", 0xa6}, {&(0x7f0000000100)="38d6cd435749d519cc39e90540f37c4f5c6bceef6c4ae07105cafc5e25d9bbfce859670b89666cca0857aa0c2abd8722a9db0caad3905e3ff682", 0x3a}, {&(0x7f0000000140)="d71206abd00e3c0a7e2440673da6a9fc2c1255a9b136bc982a3dc2ac21ef167250c176acfbd4d13abd86b018e8b1357842d8dc93e53f6b542e9633e1db8672e8", 0x40}], 0x4}}, {{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000380)="df304451b990364b1c6ff9c843eb47125c0a16565b5efbc0494b453f9863364196a743b5d226d34b2293f3b4b8dde4b8434172dec0902f0e03c2893c2bfd5f662eefc2902850a0221d55", 0x200003ca}, {&(0x7f0000000400)}], 0x2, &(0x7f0000000540)=[@ip_tos_u8={{0x11}}, @ip_ttl={{0x14}}, @ip_ttl={{0x14}}, @ip_tos_u8={{0x11}}], 0x60}}], 0x3, 0x0) r8 = syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000080)='NLBL_CALIPSO\x00') sendmsg$NLBL_CALIPSO_C_REMOVE(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4800044}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x44, r8, 0x400, 0x70bd26, 0x25dfdbff, {}, [@NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x6}, @NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x59589ea006b6bade}, @NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_MTYPE={0x8}]}, 0x44}}, 0x4000000) sendmsg$IPSET_CMD_SAVE(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000004c0)={&(0x7f0000000440)={0x4c, 0x8, 0x6, 0x400, 0x70bd26, 0x25dfdbfd, {0xc, 0x0, 0x2}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x4c}}, 0x20000001) sendmsg$NLBL_CALIPSO_C_LISTALL(r6, &(0x7f00000002c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x208}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x4c, r8, 0x1, 0x70bd25, 0x25dfdbfe, {}, [@NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x3}, @NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x1}, @NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x3}, @NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_MTYPE={0x8}]}, 0x4c}, 0x1, 0x0, 0x0, 0x40}, 0x10000) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) bind(r2, &(0x7f0000000080)=@nfc={0x27, 0x0, 0x2, 0x5}, 0x80) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, &(0x7f00000007c0)={0xb92, 0xfffffffffffffff7, 0x80000001}) [ 1352.887158][T29641] kAFS: unparsable volume name [ 1352.899495][T29642] kAFS: unparsable volume name 09:33:38 executing program 3: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="2398c593a2303d8df8dc1623f67a060de466e34712df232157116a41dc2b"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:33:38 executing program 2: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f00000015c0)=ANY=[@ANYBLOB='Z'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000000)='devpts\x00', 0x0, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0x227, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000100)="01", 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r1, r0, r1}, &(0x7f0000000280)=""/250, 0x223, &(0x7f0000000580)={&(0x7f0000000080)={'sha256-generic\x00'}}) r2 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r3 = openat$vicodec1(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_G_FMT(r3, 0xc0d05604, &(0x7f0000000480)={0x3, @sliced={0x9, [0x9, 0x200, 0x7, 0x8, 0x0, 0x8c, 0x200, 0x401, 0xe080, 0x1, 0x78, 0x0, 0x7fff, 0x8, 0x4, 0x4, 0x3, 0xf, 0x7, 0x0, 0x8a03, 0x7, 0x3, 0x400, 0x3a52, 0x9, 0x0, 0x3, 0x3f, 0x1, 0x1a9, 0x4, 0x1, 0x20, 0xc77, 0x0, 0x0, 0x1, 0x9, 0x7, 0x800, 0x401, 0xff34, 0x69e, 0x61a, 0x92, 0x6, 0x1], 0xfffffff7}}) add_key(&(0x7f0000000140)='ceph\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000040), 0x1d4, r2) keyctl$unlink(0x9, r0, r2) clock_gettime(0x0, &(0x7f0000005840)={0x0, 0x0}) recvmmsg(0xffffffffffffffff, &(0x7f0000005600)=[{{&(0x7f00000005c0)=@caif=@rfm, 0x80, &(0x7f0000000800)=[{&(0x7f0000000240)=""/60, 0x3c}, {&(0x7f0000000640)=""/254, 0xfe}, {&(0x7f0000000740)=""/89, 0x59}, {&(0x7f00000007c0)=""/6, 0x6}], 0x4, &(0x7f0000000840)=""/211, 0xd3}, 0xb8}, {{&(0x7f0000000940)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @empty}}}, 0x80, &(0x7f0000000c00)=[{&(0x7f00000009c0)=""/4, 0x4}, {&(0x7f0000000a00)}, {&(0x7f0000000a40)=""/142, 0x8e}, {&(0x7f0000000b00)=""/254, 0xfe}, {&(0x7f0000001600)=""/4096, 0x1000}], 0x5, &(0x7f0000002600)=""/4096, 0x1000}, 0x1}, {{&(0x7f0000000c80)=@ipx, 0x80, &(0x7f0000000d80)=[{&(0x7f0000000d00)=""/73, 0x49}], 0x1, &(0x7f0000000dc0)=""/188, 0xbc}, 0x4}, {{&(0x7f0000000e80)=@nfc_llcp, 0x80, &(0x7f0000001280)=[{&(0x7f0000000f00)=""/217, 0xd9}, {&(0x7f0000001000)=""/21, 0x15}, {&(0x7f0000001040)=""/100, 0x64}, {&(0x7f00000010c0)=""/116, 0x74}, {&(0x7f0000001140)=""/34, 0x22}, {&(0x7f0000001180)=""/194, 0xc2}], 0x6, &(0x7f0000001300)=""/98, 0x62}, 0x9}, {{&(0x7f0000001380)=@pptp={0x18, 0x2, {0x0, @local}}, 0x80, &(0x7f0000001400), 0x0, &(0x7f0000001440)=""/63, 0x3f}, 0x9}, {{&(0x7f0000001480)=@nfc, 0x80, &(0x7f00000039c0)=[{&(0x7f0000001500)=""/183, 0xb7}, {&(0x7f0000003600)=""/128, 0x80}, {&(0x7f0000003680)=""/58, 0x3a}, {&(0x7f00000036c0)=""/164, 0xa4}, {&(0x7f0000003780)=""/185, 0xb9}, {&(0x7f0000003840)=""/27, 0x1b}, {&(0x7f0000003880)=""/240, 0xf0}, {&(0x7f0000003980)=""/49, 0x31}], 0x8, &(0x7f0000003a40)=""/90, 0x5a}, 0xcf4f}, {{&(0x7f0000003ac0)=@isdn, 0x80, &(0x7f0000003c00)=[{&(0x7f0000003b40)=""/164, 0xa4}], 0x1, &(0x7f0000003c40)=""/57, 0x39}, 0x401}, {{&(0x7f0000003c80)=@ethernet={0x0, @local}, 0x80, &(0x7f0000005280)=[{&(0x7f0000003d00)=""/84, 0x54}, {&(0x7f0000003d80)=""/158, 0x9e}, {&(0x7f0000003e40)=""/1, 0x1}, {&(0x7f0000003e80)=""/162, 0xa2}, {&(0x7f0000003f40)=""/194, 0xc2}, {&(0x7f0000004040)=""/252, 0xfc}, {&(0x7f0000004140)=""/64, 0x40}, {&(0x7f0000004180)=""/163, 0xa3}, {&(0x7f0000004240)=""/4096, 0x1000}, {&(0x7f0000005240)=""/24, 0x18}], 0xa, &(0x7f0000005340)=""/117, 0x75}}, {{&(0x7f00000053c0)=@sco, 0x80, &(0x7f00000055c0)=[{&(0x7f0000005440)=""/129, 0x81}, {&(0x7f0000005500)=""/189, 0xbd}], 0x2}, 0x2}], 0x9, 0x20, &(0x7f0000005880)={r4, r5+30000000}) connect$vsock_stream(r6, &(0x7f00000058c0), 0x10) 09:33:38 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x2, 0x1e, &(0x7f0000000340)=ANY=[@ANYBLOB="b7020000f7ffffffbfa70000000000002402000020feffff7a0af0fff8ffffff69a4f0ff00000000b70600000018d1fe2d64050000000000750400000000000007faff0000000000b7040000100000206a0700fe00000000850000002f000000b700000c0a0000009500000000868f0399d909a63796c113a80c19aab9d607000000b6cd483be3f0d3253730e711f5969f62c28b22756bedf3cf393d14c46cc4f79fd2b316da4f0de8163f6242fa732300000637c48468766af540439fce41f144631ac262dcae18c3d1a1fbe96dd87235b44174f7c0343185089a0f119e31975e551558055dc2dc000000000000000000"], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x39b}, 0x78) r1 = socket$kcm(0x11, 0x8000000002, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000540)=r0, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') 09:33:38 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f0000000340)=ANY=[@ANYBLOB="b7020000f7ffffffbfa70000000000002402000020feffff7a0af0fff8ffffff69a4f0ff00000000b70600000018d1fe2d6405000000000075040000000000000704000000000000b7040000100000206a0700fe00000000850000002f000000b70000000a0000009500000000000000e535f8a62fc2868f0399d909a63796c113a80c19aab9d607000000b6cd483be3f0d3253730e711f5969f62c28b22756bedf3cf393d14c46cc4f79fd2b316da4f0de8163f6242fa732300000637c48468766af540439fce41f144631ac262dcae18c3d1a1fbe96dd87235b44174f7c0343185089a0f119e31975e551558055dc2dc"], &(0x7f0000000280)='GPL\x00'}, 0x48) r1 = socket$kcm(0x11, 0x8000000002, 0x300) socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000540)=r0, 0x4) syz_emit_ethernet(0x3e, &(0x7f0000000000)={@broadcast, @random="96c1e9574b31", @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x6, 0x0, 0x1, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @local}, @time_exceeded={0xb, 0x0, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local, @multicast2}}}}}}, 0x0) 09:33:38 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) r0 = socket(0x0, 0x80002, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="080db5055e0bcfe8696071") getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000580)={r1, 0x0, 0x1, [0x0]}, 0xa) setsockopt$inet_sctp_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000000)={r1, 0x1f}, 0x8) mount(&(0x7f00000015c0)=ANY=[@ANYBLOB='#'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:33:38 executing program 3: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="2398c593a2303d8df8dc1623f67a060de466e34712df232157116a41dc2b"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:33:38 executing program 1: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000080)=ANY=[@ANYBLOB='#U'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x700, 0x0) 09:33:38 executing program 2: r0 = accept$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000000)) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000040)={0x0, 0x6}, 0x8) mkdir(&(0x7f0000000200)='./file0\x00', 0x40) mount(&(0x7f0000000080)=ANY=[@ANYBLOB="350dcd6364dbf5bb4564e9091c0168ac40050072a09673db841a3a8cefa02ae8a747d803da224f3247db31e27f49334905277e0bd680335ce27560d16c0fe625ada19c8752d4e51b4035e7ca4d29f0633159e2c39f7a09e19ef95b2133199681a9943819b4"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:33:38 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='GPL\x00'}, 0x48) r1 = socket$kcm(0x11, 0x8000000002, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000540)=r0, 0x4) socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = socket(0x0, 0x80002, 0x0) ioctl(r4, 0x1000008912, &(0x7f00000000c0)="080db5055e0bcfe8696071") setsockopt$inet6_IPV6_ADDRFORM(r4, 0x29, 0x1, &(0x7f0000000080), 0x4) r5 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') 09:33:38 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f0000000340)=ANY=[@ANYBLOB="b7020000f7ffffffbfa70000000000002402000020feffff7a0af0fff8ffffff69a4f0ff00000000b70600000018d1fe2d6405000000000075040000000000000704000000000000b7040000100000206a0700fe00000000850000002f000000b70000000a0000009500000000000000e535f8a62fc2868f0399d909a63796c113a80c19aab9d607000000b6cd483be3f0d3253730e711f5969f62c28b22756bedf3cf393d14c46cc4f79fd2b316da4f0de8163f6242fa732300000637c48468766af540439fce41f144631ac262dcae18c3d1a1fbe96dd87235b44174f7c0343185089a0f119e31975e551558055dc2dc"], &(0x7f0000000280)='GPL\x00'}, 0x48) r1 = socket$kcm(0x11, 0x8000000002, 0x300) socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000540)=r0, 0x4) syz_emit_ethernet(0x3e, &(0x7f0000000000)={@broadcast, @random="96c1e9574b31", @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x7, 0x0, 0x1, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @local}, @time_exceeded={0xb, 0x0, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local, @multicast2}}}}}}, 0x0) 09:33:38 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f00000015c0)=ANY=[@ANYBLOB='#'], &(0x7f0000000000)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x4, 0x0) r0 = socket(0x0, 0x80002, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="080db5055e0bcfe8696071") ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000040)={0x81, 0x18, 0x4, 0x70000, 0x5, {}, {0x3, 0x1, 0x2, 0x3, 0x2, 0x80, "1eff2c3f"}, 0x32, 0x1, @offset=0x5, 0x97b2, 0x0, r0}) r2 = socket(0x0, 0x80002, 0x0) ioctl(r2, 0x1000008912, &(0x7f00000000c0)="080db5055e0bcfe8696071") getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f00000002c0)={{{@in=@loopback, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@mcast2}}, &(0x7f00000003c0)=0xe8) setsockopt$packet_drop_memb(r1, 0x107, 0x2, &(0x7f0000000400)={r3, 0x1, 0x6, @local}, 0x10) 09:33:38 executing program 3: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="2398c593a2303d8df8dc1623f67a060de466e34712df232157116a41dc2b"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1353.487386][T30175] kAFS: unparsable volume name 09:33:38 executing program 3: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="2398c593a2303d8df8dc1623f67a060de466e34712df232157116a41dc2b323a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1353.552010][T30232] kAFS: unparsable volume name 09:33:38 executing program 2: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f00000015c0)=ANY=[@ANYBLOB='%'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, &(0x7f0000000080)={0xf000000, 0x1, 0x8, 0xffffffffffffffff, 0x0, &(0x7f0000000040)={0xd7544b99bfa10b7, 0x2, [], @p_u32=&(0x7f0000000000)=0x4}}) ioctl$sock_SIOCINQ(r0, 0x541b, &(0x7f00000000c0)) uselib(&(0x7f0000000100)='./file0\x00') 09:33:38 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f0000000340)=ANY=[@ANYBLOB="b7020000f7ffffffbfa70000000000002402000020feffff7a0af0fff8ffffff69a4f0ff00000000b70600000018d1fe2d6405000000000075040000000000000704000000000000b7040000100000206a0700fe00000000850000002f000000b70000000a0000009500000000000000e535f8a62fc2868f0399d909a63796c113a80c19aab9d607000000b6cd483be3f0d3253730e711f5969f62c28b22756bedf3cf393d14c46cc4f79fd2b316da4f0de8163f6242fa732300000637c48468766af540439fce41f144631ac262dcae18c3d1a1fbe96dd87235b44174f7c0343185089a0f119e31975e551558055dc2dc"], &(0x7f0000000280)='GPL\x00'}, 0x48) r1 = socket$kcm(0x11, 0x8000000002, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000540)=r0, 0x4) socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = fcntl$dupfd(r2, 0x0, r3) r5 = socket$alg(0x26, 0x5, 0x0) bind$alg(r5, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) accept4(r5, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r5, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c81", 0x10) r6 = gettid() fcntl$lock(r5, 0x24, &(0x7f0000000080)={0x1, 0x1, 0x1, 0x7f, r6}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') 09:33:38 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) rmdir(&(0x7f0000000000)='./file0\x00') mount(&(0x7f0000000240)=ANY=[@ANYBLOB="af8c9449672da887f7a813b651c12093e839d084b9c8465ab0af587466911f4b3c3e5ec3110de0d7bcbd8387a9b6e4e96b9567afda173f61260d5ed2d73955ce9908ebaedcc3c2558311f921df1a84dcd302398bbde0b9050a448c7626a88ee29f10006912cb026867fbeee3757e957f08cff91ddca819b3a393c4c148060197e2c4030ca67a220e838eed1f990ace5475a2de1b3a12fcc534f9373c8e45c833ccbf0627c4c7d0a7aac135a96d37f9f19c722ae997b91397ba7b49d79f01bfbf6e27c525b41ba6af18202e"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0/../file0\x00', 0x14a) 09:33:38 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f0000000340)=ANY=[@ANYBLOB="b7020000f7ffffffbfa70000000000002402000020feffff7a0af0fff8ffffff69a4f0ff00000000b70600000018d1fe2d6405000000000075040000000000000704000000000000b7040000100000206a0700fe00000000850000002f000000b70000000a0000009500000000000000e535f8a62fc2868f0399d909a63796c113a80c19aab9d607000000b6cd483be3f0d3253730e711f5969f62c28b22756bedf3cf393d14c46cc4f79fd2b316da4f0de8163f6242fa732300000637c48468766af540439fce41f144631ac262dcae18c3d1a1fbe96dd87235b44174f7c0343185089a0f119e31975e551558055dc2dc"], &(0x7f0000000280)='GPL\x00'}, 0x48) r1 = socket$kcm(0x11, 0x8000000002, 0x300) socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000540)=r0, 0x4) syz_emit_ethernet(0x3e, &(0x7f0000000000)={@broadcast, @random="96c1e9574b31", @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x8, 0x0, 0x1, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @local}, @time_exceeded={0xb, 0x0, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local, @multicast2}}}}}}, 0x0) [ 1353.777568][T30494] kAFS: unparsable volume name 09:33:39 executing program 3: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="2398c593a2303d8df8dc1623f67a060de466e34712df232157116a41dc2b"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1353.820890][T30494] kAFS: unparsable volume name 09:33:39 executing program 1: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000080)=ANY=[@ANYBLOB='#U'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x1020, 0x0) 09:33:39 executing program 2: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f00000015c0)=ANY=[@ANYBLOB='%'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fec000/0x13000)=nil) 09:33:39 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0x1e, &(0x7f0000000340)=ANY=[@ANYBLOB="b7020000f7ffffffbfa70000000000002402000020feffff7a0af0fff8ffffff69a4f0ff00000000b70600000018d1fe020005000000000075040000000000000704000000000000b7040000100000206a0700fe00000000850000002f000000b70000000a0000009500000000000000e535f8a62fc2868f0399d909a63796c113a80c19aab9d607000000b6cd483be3f0d3253730e711f5969f62c28b22756bedf3cf393d14c46cc4f79fd2b316da4f0de8163f6242fa732300000637c48468766af540439fce41f144631ac262dcae18c3d1a1fbe96dd87235b44174f7c0343185089a0f119e31975e551558055dc2dc"], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x6}, 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) r1 = socket$kcm(0x11, 0x8000000002, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000540)=r0, 0x4) socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = fcntl$dupfd(r2, 0x0, r3) r5 = syz_open_dev$audion(&(0x7f0000000080)='/dev/audio#\x00', 0x3, 0x400) open_tree(r5, &(0x7f00000000c0)='./file0\x00', 0x40001) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') 09:33:39 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000000)=@abs={0x0, 0x0, 0x4e24}, 0x6e) removexattr(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=@known='com.apple.FinderInfo\x00') socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = fcntl$dupfd(r0, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r5 = accept4(r4, 0x0, 0x0, 0x0) sendmmsg$inet(r5, &(0x7f0000000680)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f00000000c0)="5831255624c13e4c563f221188b6be66ea", 0x11}], 0x1}}, {{&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000002c0)=[{&(0x7f0000000040)="70a6b8247e016ae2647a2e703fce46c432e37d1dffd332a793d4b9e3617386d153", 0x21}, {&(0x7f0000000200)="09f96fbf33ceccc10976cd10b1411ee57d092fd5b7f95a0f19f01005f110463ccb2c6ebdb74ad7a7da1a2bed233154886db68984d477ebee11ce9a8e3510d401f6f31ea0a7e3ec1cda7b95f7a02b42753eb4cf0bbf5afbc7084f9bc2603aafe5da6cd54e4d647ec9fd641e4241513aaf23481d1f390bbb83dfae56369f4b03367ccd45f0ec4cd929aed127394157e7b3794500c0c5f88930b1ff50bbae1163c26fff28d06028", 0xa6}, {&(0x7f0000000100)="38d6cd435749d519cc39e90540f37c4f5c6bceef6c4ae07105cafc5e25d9bbfce859670b89666cca0857aa0c2abd8722a9db0caad3905e3ff682", 0x3a}, {&(0x7f0000000140)="d71206abd00e3c0a7e2440673da6a9fc2c1255a9b136bc982a3dc2ac21ef167250c176acfbd4d13abd86b018e8b1357842d8dc93e53f6b542e9633e1db8672e8", 0x40}], 0x4}}, {{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000380)="df304451b990364b1c6ff9c843eb47125c0a16565b5efbc0494b453f9863364196a743b5d226d34b2293f3b4b8dde4b8434172dec0902f0e03c2893c2bfd5f662eefc2902850a0221d55", 0x200003ca}, {&(0x7f0000000400)}], 0x2, &(0x7f0000000540)=[@ip_tos_u8={{0x11}}, @ip_ttl={{0x14}}, @ip_ttl={{0x14}}, @ip_tos_u8={{0x11}}], 0x60}}], 0x3, 0x0) ioctl$FICLONE(r1, 0x40049409, r5) ioctl$BLKDISCARD(r3, 0x1277, &(0x7f0000000100)=0xffffffffffffff02) mount(&(0x7f00000015c0)=ANY=[@ANYBLOB='#'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:33:39 executing program 3: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="2398c593a2303d8df8dc1623f67a060de466e34712df232157116a41dc2b"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:33:39 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f0000000340)=ANY=[@ANYBLOB="b7020000f7ffffffbfa70000000000002402000020feffff7a0af0fff8ffffff69a4f0ff00000000b70600000018d1fe2d6405000000000075040000000000000704000000000000b7040000100000206a0700fe00000000850000002f000000b70000000a0000009500000000000000e535f8a62fc2868f0399d909a63796c113a80c19aab9d607000000b6cd483be3f0d3253730e711f5969f62c28b22756bedf3cf393d14c46cc4f79fd2b316da4f0de8163f6242fa732300000637c48468766af540439fce41f144631ac262dcae18c3d1a1fbe96dd87235b44174f7c0343185089a0f119e31975e551558055dc2dc"], &(0x7f0000000280)='GPL\x00'}, 0x48) r1 = socket$kcm(0x11, 0x8000000002, 0x300) socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000540)=r0, 0x4) syz_emit_ethernet(0x3e, &(0x7f0000000000)={@broadcast, @random="96c1e9574b31", @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0xb, 0x0, 0x1, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @local}, @time_exceeded={0xb, 0x0, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local, @multicast2}}}}}}, 0x0) [ 1354.188461][T30816] kAFS: unparsable volume name 09:33:39 executing program 3: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="2398c593a2303d8df8dc1623f67a060de466e34712df232157116a41dc2b"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1354.212251][T30818] kAFS: unparsable volume name [ 1354.223912][T30816] kAFS: unparsable volume name 09:33:39 executing program 2: mkdir(&(0x7f0000000200)='./file0\x00', 0x59) mount(&(0x7f00000015c0)=ANY=[@ANYBLOB='%'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket(0x0, 0x80002, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000000c0)="080db5055e0bcfe8696071") bind$alg(r1, &(0x7f0000000180)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_ctr_aes128\x00'}, 0x51fe1a17435315fd) accept4(r0, 0x0, 0x0, 0x0) mknod(&(0x7f00000000c0)='./file0\x00', 0x2, 0x80) r2 = socket(0x0, 0x80002, 0x0) ioctl(r2, 0x1000008912, &(0x7f00000000c0)="080db5055e0bcfe8696071") connect$inet6(r2, &(0x7f0000000340)={0xa, 0x4e22, 0x1f0000, @local, 0xff}, 0x1c) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c81", 0x10) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000400)='/dev/nvram\x00', 0x0, 0x0) ioctl$LOOP_GET_STATUS(r3, 0x4c03, &(0x7f0000000940)) llistxattr(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)=""/60, 0x3c) r4 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vga_arbiter\x00', 0x27e23f1556cdb957, 0x0) recvfrom$unix(r4, &(0x7f0000000240)=""/76, 0x4c, 0xa041, &(0x7f00000002c0)=@abs={0x1, 0x0, 0x4e24}, 0x6e) socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r6 = socket$inet_udplite(0x2, 0x2, 0x88) r7 = fcntl$dupfd(r5, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ioctl$UI_BEGIN_FF_ERASE(r7, 0xc00c55ca, &(0x7f0000000440)={0x6, 0x5, 0x9}) socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r9 = socket$inet_udplite(0x2, 0x2, 0x88) r10 = fcntl$dupfd(r8, 0x0, r9) socketpair$unix(0x1, 0x4f621cf6939618cd, 0x0, &(0x7f0000000480)={0xffffffffffffffff}) r12 = socket$inet_udplite(0x2, 0x2, 0x88) r13 = fcntl$dupfd(r11, 0x0, r12) ioctl$PERF_EVENT_IOC_ENABLE(r13, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_ENABLE(r13, 0x8912, 0x8) ioctl$KDFONTOP_GET(r10, 0x4b72, &(0x7f0000000900)={0x1, 0x1, 0x20, 0xb, 0xed, &(0x7f0000000500)}) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000000), &(0x7f0000000040)=0x8) 09:33:39 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x200000000000008d, &(0x7f0000000580)=ANY=[@ANYBLOB="b7020000f7ffffffbfa70000000000002402000020feffff7a0af0fff8ffffff69a4f0ff00000000b70600000018d1fe2d6405000000000075040000000000000704000000000000b7040000100000206a0700fe0000000085000000af000000b70000000a0000009500000000000000e535f8a62fc2868f0399d909a63796c113a80c19aab9d607000000b6cd483be3f0d3253730e711f5969f62c28b22756bedf3cf393d14c46cc4f79fd2b316da4f0de8163f6242fa732300000637c48468766af540439fce41f144631ac262dcae18c3d1a1fbe96dd87235b44174f7c0343185089a23119e31975e551558055dc2dcc4c99483f30dfeb18db15324ad14e1403db4e00cacbf907794fcc270155d7299285f81a732004423c4a6516f34443802c531426de69a91f076d5eccce4171becbbd45121ec886e3a8416f04cf5b460c57de9be0aeb93caba"], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x8, 0x2002}, 0x2, 0x10, &(0x7f0000000000)={0x4, 0xe}, 0x10}, 0x78) r1 = socket$kcm(0x11, 0x8000000002, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000540)=r0, 0x4) socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') 09:33:39 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) r0 = syz_open_dev$vcsu(&(0x7f0000000000)='/dev/vcsu#\x00', 0x4, 0x141000) openat(r0, &(0x7f0000000040)='./file0\x00', 0xb0000, 0x42) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x80000, 0x0) write$cgroup_int(r1, &(0x7f00000000c0)=0x2, 0x12) mount(&(0x7f00000015c0)=ANY=[], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:33:39 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f0000000340)=ANY=[@ANYBLOB="b7020000f7ffffffbfa70000000000002402000020feffff7a0af0fff8ffffff69a4f0ff00000000b70600000018d1fe2d6405000000000075040000000000000704000000000000b7040000100000206a0700fe00000000850000002f000000b70000000a0000009500000000000000e535f8a62fc2868f0399d909a63796c113a80c19aab9d607000000b6cd483be3f0d3253730e711f5969f62c28b22756bedf3cf393d14c46cc4f79fd2b316da4f0de8163f6242fa732300000637c48468766af540439fce41f144631ac262dcae18c3d1a1fbe96dd87235b44174f7c0343185089a0f119e31975e551558055dc2dc"], &(0x7f0000000280)='GPL\x00'}, 0x48) r1 = socket$kcm(0x11, 0x8000000002, 0x300) socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000540)=r0, 0x4) syz_emit_ethernet(0x3e, &(0x7f0000000000)={@broadcast, @random="96c1e9574b31", @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x11, 0x0, 0x1, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @local}, @time_exceeded={0xb, 0x0, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local, @multicast2}}}}}}, 0x0) 09:33:39 executing program 3: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="2398c593a2303d8df8dc1623f67a060de466e34712df232157116a41dc2b32"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1354.554718][T31140] kAFS: unparsable volume name [ 1354.557183][T31137] kAFS: Bad value for 'source' 09:33:39 executing program 1: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000080)=ANY=[@ANYBLOB='#U'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x2000, 0x0) 09:33:39 executing program 3: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="2398c593a2303d8df8dc1623f67a060de466e34712df232157116a41dc2b32"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:33:39 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) r0 = socket(0x13, 0x80002, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="080db5055e0bcfe8696071") mount(&(0x7f0000000080)=ANY=[@ANYRES64=r0], &(0x7f0000000140)='./file0\x00', &(0x7f0000000000)='afs\x00', 0x80, 0x0) 09:33:39 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f0000000580)=ANY=[@ANYBLOB="b7020000f7ffffffbfa70000000000002402000020feffff7a0af0fff8ffffff69a4f0ff00000000b70600000018d1fe2d6405000000000075040000000000000704000000000000b7040000100000206a0700fe00000000850000002f000000b70000000a0000009500000000000000e53578a62fc2868f0399d909a63796c113280c19aab9d607000000b6cd483be3f0d3253730e711f5969f62c28b22756bedf3cf393d140200000000000000da4f0de8163f6242fa73230000b6c88c0637c48468766af540439fce41f144631ac262dcae18c3d1a1fbe96dd87235b4418cf7c0343185089a0f119e31975e551558055dc2dc"], &(0x7f0000000280)='GPL\x00'}, 0x48) r0 = socket$kcm(0x11, 0x8000000007, 0x300) socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$sock_attach_bpf(r4, 0x1, 0x32, &(0x7f0000000540)=r3, 0x0) socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r6 = socket$inet_udplite(0x2, 0x2, 0x88) r7 = fcntl$dupfd(r5, 0x0, r6) r8 = syz_genetlink_get_family_id$tipc(&(0x7f0000000100)='TIPC\x00') sendmsg$TIPC_CMD_GET_NETID(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0xc420000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x1c, r8, 0x410, 0x70bd2c, 0x25dfdbfc, {}, ["", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x20008840}, 0x40) socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r10 = socket$inet_udplite(0x2, 0x2, 0x88) r11 = fcntl$dupfd(r9, 0x0, r10) ioctl$PERF_EVENT_IOC_ENABLE(r11, 0x8912, 0x400200) openat$cgroup_ro(r11, &(0x7f0000000080)='memory.events\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r13 = socket$inet_udplite(0x2, 0x2, 0x88) r14 = fcntl$dupfd(r12, 0x0, r13) ioctl$PERF_EVENT_IOC_ENABLE(r14, 0x8912, 0x400200) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(r14, 0x80dc5521, &(0x7f0000000440)=""/189) ioctl$EVIOCGSND(r11, 0x8040451a, &(0x7f00000002c0)=""/73) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') 09:33:39 executing program 2: socket$nl_xfrm(0x10, 0x3, 0x6) r0 = syz_open_dev$tty1(0xc, 0x4, 0x4) ioctl$PIO_UNIMAP(r0, 0x4b67, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x80, 0x8}]}) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f00000015c0)=ANY=[@ANYBLOB='%'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:33:39 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f0000000340)=ANY=[@ANYBLOB="b7020000f7ffffffbfa70000000000002402000020feffff7a0af0fff8ffffff69a4f0ff00000000b70600000018d1fe2d6405000000000075040000000000000704000000000000b7040000100000206a0700fe00000000850000002f000000b70000000a0000009500000000000000e535f8a62fc2868f0399d909a63796c113a80c19aab9d607000000b6cd483be3f0d3253730e711f5969f62c28b22756bedf3cf393d14c46cc4f79fd2b316da4f0de8163f6242fa732300000637c48468766af540439fce41f144631ac262dcae18c3d1a1fbe96dd87235b44174f7c0343185089a0f119e31975e551558055dc2dc"], &(0x7f0000000280)='GPL\x00'}, 0x48) r1 = socket$kcm(0x11, 0x8000000002, 0x300) socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000540)=r0, 0x4) syz_emit_ethernet(0x3e, &(0x7f0000000000)={@broadcast, @random="96c1e9574b31", @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x1c, 0x0, 0x1, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @local}, @time_exceeded={0xb, 0x0, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local, @multicast2}}}}}}, 0x0) [ 1354.881120][T31461] kAFS: unparsable volume name 09:33:40 executing program 3: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="2398c593a2303d8df8dc1623f67a060de466e34712df232157116a41dc2b32"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:33:40 executing program 2: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000040)=ANY=[@ANYRESDEC], &(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='afs\x00', 0x0, 0x0) 09:33:40 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f0000000340)=ANY=[@ANYBLOB="b7020000f7ffffffbfa70000000000002402000020feffff7a0af0fff8ffffff69a4f0ff00000000b70600000018d1fe2d6405000000000075040000000000000704000000000000b7040000100000206a0700fe00000000850000002f000000b70000000a0000009500000000000000e535f8a62fc2868f0399d909a63796c113a80c19aab9d607000000b6cd483be3f0d3253730e711f5969f62c28b22756bedf3cf393d14c46cc4f79fd2b316da4f0de8163f6242fa732300000637c48468766af540439fce41f144631ac262dcae18c3d1a1fbe96dd87235b44174f7c0343185089a0f119e31975e551558055dc2dc"], &(0x7f0000000280)='GPL\x00'}, 0x48) r1 = socket$kcm(0x11, 0x8000000002, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000540)=r0, 0x4) socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = open$dir(&(0x7f0000000080)='./file0\x00', 0x1a5801, 0x10) r5 = socket$alg(0x26, 0x5, 0x0) bind$alg(r5, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) accept4(r5, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r5, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c81", 0x10) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0205647, &(0x7f0000000200)={0xa30000, 0x7e, 0x4bf, r5, 0x0, &(0x7f00000001c0)={0xa10001, 0x5, [], @string=&(0x7f0000000100)=0x8}}) linkat(r4, &(0x7f00000000c0)='./file0\x00', r6, &(0x7f0000000240)='./file0\x00', 0x1800) r7 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') 09:33:40 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg$inet(r1, &(0x7f0000000680)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f00000000c0)="5831255624c13e4c563f221188b6be66ea", 0x11}], 0x1}}, {{&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000002c0)=[{&(0x7f0000000040)="70a6b8247e016ae2647a2e703fce46c432e37d1dffd332a793d4b9e3617386d153", 0x21}, {&(0x7f0000000200)="09f96fbf33ceccc10976cd10b1411ee57d092fd5b7f95a0f19f01005f110463ccb2c6ebdb74ad7a7da1a2bed233154886db68984d477ebee11ce9a8e3510d401f6f31ea0a7e3ec1cda7b95f7a02b42753eb4cf0bbf5afbc7084f9bc2603aafe5da6cd54e4d647ec9fd641e4241513aaf23481d1f390bbb83dfae56369f4b03367ccd45f0ec4cd929aed127394157e7b3794500c0c5f88930b1ff50bbae1163c26fff28d06028", 0xa6}, {&(0x7f0000000100)="38d6cd435749d519cc39e90540f37c4f5c6bceef6c4ae07105cafc5e25d9bbfce859670b89666cca0857aa0c2abd8722a9db0caad3905e3ff682", 0x3a}, {&(0x7f0000000140)="d71206abd00e3c0a7e2440673da6a9fc2c1255a9b136bc982a3dc2ac21ef167250c176acfbd4d13abd86b018e8b1357842d8dc93e53f6b542e9633e1db8672e8", 0x40}], 0x4}}, {{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000380)="df304451b990364b1c6ff9c843eb47125c0a16565b5efbc0494b453f9863364196a743b5d226d34b2293f3b4b8dde4b8434172dec0902f0e03c2893c2bfd5f662eefc2902850a0221d55", 0x200003ca}, {&(0x7f0000000400)}], 0x2, &(0x7f0000000540)=[@ip_tos_u8={{0x11}}, @ip_ttl={{0x14}}, @ip_ttl={{0x14}}, @ip_tos_u8={{0x11}}], 0x60}}], 0x3, 0x0) setsockopt$CAIFSO_REQ_PARAM(r1, 0x116, 0x80, &(0x7f0000000080)="aa6c85056c9b3613073f8a", 0xb) socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = openat$cgroup_ro(r4, &(0x7f0000000300)='cpuacct.usage_all\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000580)={r6, 0x0, 0x1, [0x0]}, 0xa) setsockopt$inet_sctp_SCTP_CONTEXT(r5, 0x84, 0x11, &(0x7f0000000340)={r6, 0x80}, 0x8) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000000)=ANY=[@ANYBLOB="a1bc35c82ef681d9c12fdcf29a28e777ca5a0b9283f6f265fe911fb53832905706881bde71514be8fd4cd34c977b32976f25184ecc775ae5364b376d0099340465b04b10b5699d"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:33:40 executing program 3: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="2398c593a2303d8df8dc1623f67a060de466e34712df232157116a41dc2b323a"], 0x0, &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:33:40 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f0000000340)=ANY=[@ANYBLOB="b7020000f7ffffffbfa70000000000002402000020feffff7a0af0fff8ffffff69a4f0ff00000000b70600000018d1fe2d6405000000000075040000000000000704000000000000b7040000100000206a0700fe00000000850000002f000000b70000000a0000009500000000000000e535f8a62fc2868f0399d909a63796c113a80c19aab9d607000000b6cd483be3f0d3253730e711f5969f62c28b22756bedf3cf393d14c46cc4f79fd2b316da4f0de8163f6242fa732300000637c48468766af540439fce41f144631ac262dcae18c3d1a1fbe96dd87235b44174f7c0343185089a0f119e31975e551558055dc2dc"], &(0x7f0000000280)='GPL\x00'}, 0x48) r1 = socket$kcm(0x11, 0x8000000002, 0x300) socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000540)=r0, 0x4) syz_emit_ethernet(0x3e, &(0x7f0000000000)={@broadcast, @random="96c1e9574b31", @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x21, 0x0, 0x1, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @local}, @time_exceeded={0xb, 0x0, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local, @multicast2}}}}}}, 0x0) [ 1355.127975][T31772] kAFS: unparsable volume name [ 1355.230651][T31778] kAFS: unparsable volume name 09:33:40 executing program 1: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000080)=ANY=[@ANYBLOB='#U'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x2010, 0x0) 09:33:40 executing program 2: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f00000015c0)=ANY=[@ANYBLOB='5'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:33:40 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f0000000340)=ANY=[@ANYBLOB="b7020000f7ffffffbfa70000000000002402000020feffff7a0af0fff8ffffff69a4f0ff00000000b70600000018d1fe2d6405000000000075040000000000000704000000000000b7040000100000206a0700fe00000000850000002f000000b70000000a0000009500000000000000e535f8a62fc2868f0399d909a63796c113a80c19aab9d607000000b6cd483be3f0d3253730e711f5969f62c28b22756bedf3cf393d14c46cc4f79fd2b316da4f0de8163f6242fa732300000637c48468766af540439fce41f144631ac262dcae18c3d1a1fbe96dd87235b44174f7c0343185089a0f119e31975e551558055dc2dc"], &(0x7f0000000280)='GPL\x00'}, 0x48) r1 = socket$kcm(0x11, 0x8000000002, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000540)=r0, 0x4) socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) 09:33:40 executing program 3: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="2398c593a2303d8df8dc1623f67a060de466e34712df232157116a41dc2b323a"], 0x0, &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:33:40 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) r0 = socket(0x0, 0x80002, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="080db5055e0bcfe8696071") getsockname$unix(r0, &(0x7f0000000240)=@abs, &(0x7f0000000100)=0x6e) sendmsg$IPSET_CMD_PROTOCOL(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000080)={&(0x7f00000005c0)=ANY=[@ANYBLOB="3c0000000106200e28bd7000fedbdf25000000090500010007000000050001000700000005000100070000000500010007000000050001000700000056371424291cc2aa743a08b04cc8a1fdc26a018afae03fee7a23c385aadecbc354858e7c56064155ddf281559bb5d4bee3db0baacf56c8fa1547f16d21429ca28c07c2df78d6560591277daf95122659e2e1b0d036898aac9a11779ea8dc8b2672fc769c8a19e15e2c8cbcad85515a9d487469"], 0x3c}, 0x1, 0x0, 0x0, 0x40000}, 0x20001) r1 = socket(0x0, 0x80002, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000000c0)="080db5055e0bcfe8696071") r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(r2, 0x8918, &(0x7f0000000300)={'hsr0\x00', {0x2, 0x4e21, @loopback}}) sendmmsg$inet(r3, &(0x7f0000000680)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f00000000c0)="5831255624c13e4c563f221188b6be66ea", 0x11}], 0x1}}, {{&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000002c0)=[{&(0x7f0000000040)="70a6b8247e016ae2647a2e703fce46c432e37d1dffd332a793d4b9e3617386d153", 0x21}, {&(0x7f0000000200)="09f96fbf33ceccc10976cd10b1411ee57d092fd5b7f95a0f19f01005f110463ccb2c6ebdb74ad7a7da1a2bed233154886db68984d477ebee11ce9a8e3510d401f6f31ea0a7e3ec1cda7b95f7a02b42753eb4cf0bbf5afbc7084f9bc2603aafe5da6cd54e4d647ec9fd641e4241513aaf23481d1f390bbb83dfae56369f4b03367ccd45f0ec4cd929aed127394157e7b3794500c0c5f88930b1ff50bbae1163c26fff28d06028", 0xa6}, {&(0x7f0000000100)="38d6cd435749d519cc39e90540f37c4f5c6bceef6c4ae07105cafc5e25d9bbfce859670b89666cca0857aa0c2abd8722a9db0caad3905e3ff682", 0x3a}, {&(0x7f0000000140)="d71206abd00e3c0a7e2440673da6a9fc2c1255a9b136bc982a3dc2ac21ef167250c176acfbd4d13abd86b018e8b1357842d8dc93e53f6b542e9633e1db8672e8", 0x40}], 0x4}}, {{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000380)="df304451b990364b1c6ff9c843eb47125c0a16565b5efbc0494b453f9863364196a743b5d226d34b2293f3b4b8dde4b8434172dec0902f0e03c2893c2bfd5f662eefc2902850a0221d55", 0x200003ca}, {&(0x7f0000000400)}], 0x2, &(0x7f0000000540)=[@ip_tos_u8={{0x11}}, @ip_ttl={{0x14}}, @ip_ttl={{0x14}}, @ip_tos_u8={{0x11}}], 0x60}}], 0x3, 0x0) r4 = socket(0x0, 0x80002, 0x0) ioctl(r4, 0x1000008912, &(0x7f00000000c0)="080db5055e0bcfe8696071") r5 = socket$alg(0x26, 0x5, 0x0) bind$alg(r5, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r6 = accept4(r5, 0x0, 0x0, 0x0) sendmmsg$inet(r6, &(0x7f0000000680)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f00000000c0)="5831255624c13e4c563f221188b6be66ea", 0x11}], 0x1}}, {{&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000002c0)=[{&(0x7f0000000040)="70a6b8247e016ae2647a2e703fce46c432e37d1dffd332a793d4b9e3617386d153", 0x21}, {&(0x7f0000000200)="09f96fbf33ceccc10976cd10b1411ee57d092fd5b7f95a0f19f01005f110463ccb2c6ebdb74ad7a7da1a2bed233154886db68984d477ebee11ce9a8e3510d401f6f31ea0a7e3ec1cda7b95f7a02b42753eb4cf0bbf5afbc7084f9bc2603aafe5da6cd54e4d647ec9fd641e4241513aaf23481d1f390bbb83dfae56369f4b03367ccd45f0ec4cd929aed127394157e7b3794500c0c5f88930b1ff50bbae1163c26fff28d06028", 0xa6}, {&(0x7f0000000100)="38d6cd435749d519cc39e90540f37c4f5c6bceef6c4ae07105cafc5e25d9bbfce859670b89666cca0857aa0c2abd8722a9db0caad3905e3ff682", 0x3a}, {&(0x7f0000000140)="d71206abd00e3c0a7e2440673da6a9fc2c1255a9b136bc982a3dc2ac21ef167250c176acfbd4d13abd86b018e8b1357842d8dc93e53f6b542e9633e1db8672e8", 0x40}], 0x4}}, {{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000380)="df304451b990364b1c6ff9c843eb47125c0a16565b5efbc0494b453f9863364196a743b5d226d34b2293f3b4b8dde4b8434172dec0902f0e03c2893c2bfd5f662eefc2902850a0221d55", 0x200003ca}, {&(0x7f0000000400)}], 0x2, &(0x7f0000000540)=[@ip_tos_u8={{0x11}}, @ip_ttl={{0x14}}, @ip_ttl={{0x14}}, @ip_tos_u8={{0x11}}], 0x60}}], 0x3, 0x0) r7 = socket$alg(0x26, 0x5, 0x0) bind$alg(r7, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r8 = accept4(r7, 0x0, 0x0, 0x0) setsockopt$sock_void(r7, 0x1, 0x1b, 0x0, 0x0) sendmmsg$inet(r8, &(0x7f0000000680)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f00000000c0)="5831255624c13e4c563f221188b6be66ea", 0x11}], 0x1}}, {{&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000002c0)=[{&(0x7f0000000040)="70a6b8247e016ae2647a2e703fce46c432e37d1dffd332a793d4b9e3617386d153", 0x21}, {&(0x7f0000000200)="09f96fbf33ceccc10976cd10b1411ee57d092fd5b7f95a0f19f01005f110463ccb2c6ebdb74ad7a7da1a2bed233154886db68984d477ebee11ce9a8e3510d401f6f31ea0a7e3ec1cda7b95f7a02b42753eb4cf0bbf5afbc7084f9bc2603aafe5da6cd54e4d647ec9fd641e4241513aaf23481d1f390bbb83dfae56369f4b03367ccd45f0ec4cd929aed127394157e7b3794500c0c5f88930b1ff50bbae1163c26fff28d06028", 0xa6}, {&(0x7f0000000100)="38d6cd435749d519cc39e90540f37c4f5c6bceef6c4ae07105cafc5e25d9bbfce859670b89666cca0857aa0c2abd8722a9db0caad3905e3ff682", 0x3a}, {&(0x7f0000000140)="d71206abd00e3c0a7e2440673da6a9fc2c1255a9b136bc982a3dc2ac21ef167250c176acfbd4d13abd86b018e8b1357842d8dc93e53f6b542e9633e1db8672e8", 0x40}], 0x4}}, {{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000380)="df304451b990364b1c6ff9c843eb47125c0a16565b5efbc0494b453f9863364196a743b5d226d34b2293f3b4b8dde4b8434172dec0902f0e03c2893c2bfd5f662eefc2902850a0221d55", 0x200003ca}, {&(0x7f0000000400)}], 0x2, &(0x7f0000000540)=[@ip_tos_u8={{0x11}}, @ip_ttl={{0x14}}, @ip_ttl={{0x14}}, @ip_tos_u8={{0x11}}], 0x60}}], 0x3, 0x0) mount(&(0x7f0000000840)=ANY=[@ANYPTR=&(0x7f0000000400)=ANY=[@ANYRES32, @ANYRES64=r0, @ANYBLOB="9b866a66d332e95fd9437519d55385bdb9a4ef13cac186ff0429f0437cf78a7c9f8c084bdfcffae2a56d4cb9706bb2a7843de891ba6cf31bb814f1479e6cc74c4907fc99b60098f911dd611c4dfb5e12", @ANYRESOCT=r1, @ANYRESHEX=r3, @ANYPTR64=&(0x7f0000000340)=ANY=[@ANYRESHEX, @ANYRES32=r4], @ANYRESOCT, @ANYRES64, @ANYPTR64=&(0x7f0000000380)=ANY=[@ANYRESHEX, @ANYBLOB="5fc94a5e8a858567", @ANYRESHEX, @ANYRESDEC=r0, @ANYRES32=r6, @ANYRES16=r0, @ANYPTR64, @ANYPTR64, @ANYPTR], @ANYRESDEC=r8], @ANYPTR, @ANYBLOB="5a2e04d800149651c4d8bdc4ab13b785f9b52d16302a18cd597e180ba734aeecc47d440d6a211381308864e8d0423dcd9b6eb24d60ba5e62b898301ddb8caf23d593a11ed6dea56f45a1e1a3b9395d8c109f13675a734a627958718f1ce503097b0b0919dbe150eb0c144d3f440026d4f8c952571f4cb92a80e130305aecf0a3b7d5a5cd06e6b5e602da8246cd3c849e79e63a1088b5829c56b0355ab326b2bc7539dbdd04d8adabb40f13d41e321e9c882eac5a613544f95c789ff234366c865da14c427f1f3b71511de32483901ca8389065e37155c5a2836a2abcf9308b5513c3d550ae47a2"], &(0x7f00000002c0)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:33:40 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f0000000340)=ANY=[@ANYBLOB="b7020000f7ffffffbfa70000000000002402000020feffff7a0af0fff8ffffff69a4f0ff00000000b70600000018d1fe2d6405000000000075040000000000000704000000000000b7040000100000206a0700fe00000000850000002f000000b70000000a0000009500000000000000e535f8a62fc2868f0399d909a63796c113a80c19aab9d607000000b6cd483be3f0d3253730e711f5969f62c28b22756bedf3cf393d14c46cc4f79fd2b316da4f0de8163f6242fa732300000637c48468766af540439fce41f144631ac262dcae18c3d1a1fbe96dd87235b44174f7c0343185089a0f119e31975e551558055dc2dc"], &(0x7f0000000280)='GPL\x00'}, 0x48) r1 = socket$kcm(0x11, 0x8000000002, 0x300) socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000540)=r0, 0x4) syz_emit_ethernet(0x3e, &(0x7f0000000000)={@broadcast, @random="96c1e9574b31", @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x2f, 0x0, 0x1, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @local}, @time_exceeded={0xb, 0x0, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local, @multicast2}}}}}}, 0x0) 09:33:40 executing program 3: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="2398c593a2303d8df8dc1623f67a060de466e34712df232157116a41dc2b323a"], 0x0, &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1355.563850][T32005] kAFS: unparsable volume name 09:33:40 executing program 2: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f00000015c0)=ANY=[@ANYBLOB='%'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) execve(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)=[&(0x7f0000000040)='self+*\x00', &(0x7f0000000080)='-eth1wlan1eth1*ztrusted\x00'], &(0x7f0000000340)=[&(0x7f0000000100)='afs\x00', &(0x7f00000001c0)='em1\x13\x00', &(0x7f0000000240)='afs\x00', &(0x7f0000000280)=',%losystemsecurity!\x00', &(0x7f00000002c0)=')procvmnet0\x00', &(0x7f0000000300)='\x00']) socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r0, 0x0, r1) r3 = socket$nl_route(0x10, 0x3, 0x0) recvmmsg(r3, &(0x7f0000008000)=[{{&(0x7f0000000380)=@can, 0x80, &(0x7f0000000980)=[{&(0x7f0000000400)=""/167, 0xa7}, {&(0x7f00000004c0)=""/240, 0xf0}, {&(0x7f00000005c0)=""/243, 0xf3}, {&(0x7f00000006c0)=""/82, 0x52}, {&(0x7f0000000740)=""/78, 0x4e}, {&(0x7f00000007c0)=""/87, 0x57}, {&(0x7f0000000840)=""/17, 0x11}, {&(0x7f0000000880)=""/187, 0xbb}, {&(0x7f0000001600)=""/4096, 0x1000}, {&(0x7f0000000940)=""/7, 0x7}], 0xa, &(0x7f0000000a40)=""/23, 0x17}, 0x1}, {{0x0, 0x0, &(0x7f0000000bc0)=[{&(0x7f0000000a80)=""/43, 0x2b}, {&(0x7f0000000ac0)=""/90, 0x5a}, {&(0x7f0000000b40)=""/89, 0x59}], 0x3}, 0x10000}, {{&(0x7f0000000c00)=@l2tp6={0xa, 0x0, 0x0, @ipv4={[], [], @initdev}}, 0x80, &(0x7f0000000d00)=[{&(0x7f0000000c80)=""/85, 0x55}], 0x1}, 0x3}, {{0x0, 0x0, &(0x7f0000001240)=[{&(0x7f0000000d40)=""/154, 0x9a}, {&(0x7f0000002600)=""/4096, 0x1000}, {&(0x7f0000000e00)=""/188, 0xbc}, {&(0x7f0000000ec0)=""/191, 0xbf}, {&(0x7f0000000f80)=""/138, 0x8a}, {&(0x7f0000001040)=""/204, 0xcc}, {&(0x7f0000001140)=""/203, 0xcb}, {&(0x7f0000003600)=""/4096, 0x1000}], 0x8, &(0x7f0000004600)=""/4096, 0x1000}}, {{&(0x7f00000012c0)=@pptp, 0x80, &(0x7f0000006980)=[{&(0x7f0000001340)=""/17, 0x11}, {&(0x7f0000001380)=""/147, 0x93}, {&(0x7f0000005600)=""/4096, 0x1000}, {&(0x7f0000001440)=""/154, 0x9a}, {&(0x7f0000001500)=""/144, 0x90}, {&(0x7f0000006600)=""/72, 0x48}, {&(0x7f0000006680)=""/144, 0x90}, {&(0x7f0000006740)=""/178, 0xb2}, {&(0x7f0000006800)=""/75, 0x4b}, {&(0x7f0000006880)=""/226, 0xe2}], 0xa}, 0x7}, {{&(0x7f0000006a40)=@can, 0x80, &(0x7f0000007ec0)=[{&(0x7f0000006ac0)=""/189, 0xbd}, {&(0x7f0000006b80)=""/239, 0xef}, {&(0x7f0000006c80)=""/4096, 0x1000}, {&(0x7f0000007c80)=""/86, 0x56}, {&(0x7f0000007d00)=""/157, 0x9d}, {&(0x7f0000007dc0)=""/225, 0xe1}], 0x6, &(0x7f0000007f40)=""/164, 0xa4}, 0x7}], 0x6, 0x21, &(0x7f0000008180)) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$RFKILL_IOCTL_NOINPUT(r2, 0x5201) 09:33:40 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f00000015c0)=ANY=[@ANYBLOB='#'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000000)='jffs2\x00', 0x80, 0x0) 09:33:40 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f0000000340)=ANY=[@ANYBLOB="b7020000f7ffffffbfa70000000000002402000020feffff7a0af0fff8ffffff69a4f0ff00000000b70600000018d1fe2d6405000000000075040000000000000704000000000000b7040000100000206a0700fe00000000850000002f000000b70000000a0000009500000000000000e535f8a62fc2868f0399d909a63796c113a80c19aab9d607000000b6cd483be3f0d3253730e711f5969f62c28b22756bedf3cf393d14c46cc4f79fd2b316da4f0de8163f6242fa732300000637c48468766af540439fce41f144631ac262dcae18c3d1a1fbe96dd87235b44174f7c0343185089a0f119e31975e551558055dc2dc"], &(0x7f0000000280)='GPL\x00'}, 0x48) r1 = socket$kcm(0x11, 0x8000000002, 0x300) socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000540)=r0, 0x4) syz_emit_ethernet(0x3e, &(0x7f0000000000)={@broadcast, @random="96c1e9574b31", @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x30, 0x0, 0x1, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @local}, @time_exceeded={0xb, 0x0, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local, @multicast2}}}}}}, 0x0) 09:33:40 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c81", 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0x0, &(0x7f0000000340)=ANY=[@ANYRES16=r0], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) r2 = socket$kcm(0x11, 0x8000000002, 0x300) memfd_create(&(0x7f00000000c0)='.vboxnet1%}userself\x00', 0x4) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000540)=r1, 0x4) socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = fcntl$dupfd(r3, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') 09:33:40 executing program 3: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="2398c593a2303d8df8dc1623f67a060de466e34712df232157116a41dc2b323a"], &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) [ 1355.845536][T32222] kAFS: unparsable volume name [ 1355.913000][T32222] kAFS: unparsable volume name 09:33:41 executing program 1: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000080)=ANY=[@ANYBLOB='#U'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x4000, 0x0) 09:33:41 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000340)=ANY=[@ANYBLOB="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", @ANYRESOCT], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x2000, 0x0) 09:33:41 executing program 3: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="2398c593a2303d8df8dc1623f67a060de466e34712df232157116a41dc2b323a"], &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) 09:33:41 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f0000000340)=ANY=[@ANYBLOB="b7020000f7ffffffbfa70000000000002402000020feffff7a0af0fff8ffffff69a4f0ff00000000b70600000018d1fe2d6405000000000075040000000000000704000000000000b7040000100000206a0700fe00000000850000002f000000b70000000a0000009500000000000000e535f8a62fc2868f0399d909a63796c113a80c19aab9d607000000b6cd483be3f0d3253730e711f5969f62c28b22756bedf3cf393d14c46cc4f79fd2b316da4f0de8163f6242fa732300000637c48468766af540439fce41f144631ac262dcae18c3d1a1fbe96dd87235b44174f7c0343185089a0f119e31975e551558055dc2dc"], &(0x7f0000000280)='GPL\x00'}, 0x48) read$eventfd(0xffffffffffffffff, &(0x7f00000000c0), 0x8) r1 = socket$kcm(0x11, 0x8000000002, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000540)=r0, 0x4) socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') 09:33:41 executing program 2: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000080)='/dev/cachefiles\x00', 0x400, 0x0) fsconfig$FSCONFIG_SET_PATH(r2, 0x3, &(0x7f0000000000)='Y\x00', &(0x7f0000000040)='./file0\x00', r3) r4 = creat(&(0x7f00000000c0)='./file0\x00', 0x2) ioctl$TIOCL_GETKMSGREDIRECT(r4, 0x541c, &(0x7f0000000100)) mount(&(0x7f00000015c0)=ANY=[@ANYBLOB='%'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:33:41 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f0000000340)=ANY=[@ANYBLOB="b7020000f7ffffffbfa70000000000002402000020feffff7a0af0fff8ffffff69a4f0ff00000000b70600000018d1fe2d6405000000000075040000000000000704000000000000b7040000100000206a0700fe00000000850000002f000000b70000000a0000009500000000000000e535f8a62fc2868f0399d909a63796c113a80c19aab9d607000000b6cd483be3f0d3253730e711f5969f62c28b22756bedf3cf393d14c46cc4f79fd2b316da4f0de8163f6242fa732300000637c48468766af540439fce41f144631ac262dcae18c3d1a1fbe96dd87235b44174f7c0343185089a0f119e31975e551558055dc2dc"], &(0x7f0000000280)='GPL\x00'}, 0x48) r1 = socket$kcm(0x11, 0x8000000002, 0x300) socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000540)=r0, 0x4) syz_emit_ethernet(0x3e, &(0x7f0000000000)={@broadcast, @random="96c1e9574b31", @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x3a, 0x0, 0x1, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @local}, @time_exceeded={0xb, 0x0, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local, @multicast2}}}}}}, 0x0) 09:33:41 executing program 3: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="2398c593a2303d8df8dc1623f67a060de466e34712df232157116a41dc2b323a"], &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) [ 1356.229233][T32447] kAFS: unparsable volume name 09:33:41 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f0000000040)='SEG6\x00') r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c81", 0x10) r1 = dup(r0) fsconfig$FSCONFIG_SET_PATH_EMPTY(r1, 0x4, &(0x7f0000000540)='vmnet0\x00', &(0x7f0000000640)='./file1/file0\x00', 0xffffffffffffffff) mount(&(0x7f0000000080)=ANY=[], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) r2 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x1f, 0x20000) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) newfstatat(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x4000) newfstatat(0xffffffffffffff9c, &(0x7f0000000500)='./file1\x00', &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x100) fchown(r2, r4, r5) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000580)={r3, 0x0, 0x1, [0x0]}, 0xa) r6 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0x227, 0xfffffffffffffffe) r7 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000100)="01", 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r7, r6, r7}, &(0x7f0000000280)=""/250, 0x223, &(0x7f0000000580)={&(0x7f0000000080)={'sha256-generic\x00'}}) keyctl$invalidate(0x15, r7) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r2, 0x84, 0x1b, &(0x7f0000000240)={r3, 0xfe, "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"}, &(0x7f0000000080)=0x106) 09:33:41 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f0000000340)=ANY=[@ANYBLOB="b7020000f7ffffffbfa70000000000002402000020feffff7a0af0fff8ffffff69a4f0ff00000000b70600000018d1fe2d6405000000000075040000000000000704000000000000b7040000100000206a0700fe00000000850000002f000000b70000000a0000009500000000000000e535f8a62fc2868f0399d909a63796c113a80c19aab9d607000000b6cd483be3f0d3253730e711f5969f62c28b22756bedf3cf393d14c46cc4f79fd2b316da4f0de8163f6242fa732300000637c48468766af540439fce41f144631ac262dcae18c3d1a1fbe96dd87235b44174f7c0343185089a0f119e31975e551558055dc2dc"], &(0x7f0000000280)='GPL\x00'}, 0x48) r1 = socket$kcm(0x11, 0x8000000002, 0x300) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpu.stat\x00', 0x0, 0x0) ioctl$SNDCTL_DSP_SPEED(r2, 0xc0045002, &(0x7f00000001c0)=0x7) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000540)=r0, 0x4) socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$DRM_IOCTL_IRQ_BUSID(r4, 0xc0106403, &(0x7f00000000c0)={0x40, 0x0, 0x100, 0x62a8}) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = fcntl$dupfd(r3, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') [ 1356.372869][T32650] kAFS: unparsable volume name 09:33:41 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f0000000340)=ANY=[@ANYBLOB="b7020000f7ffffffbfa70000000000002402000020feffff7a0af0fff8ffffff69a4f0ff00000000b70600000018d1fe2d6405000000000075040000000000000704000000000000b7040000100000206a0700fe00000000850000002f000000b70000000a0000009500000000000000e535f8a62fc2868f0399d909a63796c113a80c19aab9d607000000b6cd483be3f0d3253730e711f5969f62c28b22756bedf3cf393d14c46cc4f79fd2b316da4f0de8163f6242fa732300000637c48468766af540439fce41f144631ac262dcae18c3d1a1fbe96dd87235b44174f7c0343185089a0f119e31975e551558055dc2dc"], &(0x7f0000000280)='GPL\x00'}, 0x48) r1 = socket$kcm(0x11, 0x8000000002, 0x300) socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000540)=r0, 0x4) syz_emit_ethernet(0x3e, &(0x7f0000000000)={@broadcast, @random="96c1e9574b31", @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x300, 0x0, 0x1, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @local}, @time_exceeded={0xb, 0x0, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local, @multicast2}}}}}}, 0x0) 09:33:41 executing program 2: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SCSI_IOCTL_START_UNIT(r0, 0x5) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(r1, 0x80045301, &(0x7f0000000300)) mount(&(0x7f00000015c0)=ANY=[@ANYBLOB='%'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) r2 = accept(0xffffffffffffffff, &(0x7f0000000000)=@rc, &(0x7f0000000080)=0x80) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000100)=ANY=[@ANYRES32=r3, @ANYRES64=0x0], 0x2) setsockopt$inet_sctp6_SCTP_AUTH_KEY(r2, 0x84, 0x17, &(0x7f0000000240)={r3, 0x7, 0xb0, "9a8871c03ee2666c3a1883312e892ef5dc17e520d2d907d601d39e390c13fd625d36fe18789b60f3018e584343a3e34be477fb4ad508f730902a56b2c64c1b899af3b4fbccf16695db8e00e37d26fce7ff915ed1a5e91962aa7ad8c717a253a949c00d9015951514cff7d64bb53f8976f06c65013ef54bf95b49e78d08eb74b4603ceb34dae22f2267d4203b268d0c3fffa9cb8882ab0629f1f518d4245ebdac9bd29a77ffd70b8bfd68dce9f2dc01c6"}, 0xb8) 09:33:41 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f0000000340)=ANY=[@ANYBLOB="b7020000f7ffffffbfa70000000000002402000020feffff7a0af0fff8ffffff69a4f0ff00000000b70600000018d1fe2d6405000000000075040000000000000704000000000000b7040000100000206a0700fe00000000850000002f000000b70000000a0000009500000000000000e535f8a62fc2868f0399d909a63796c113a80c19aab9d607000000b6cd483be3f0d3253730e711f5969f62c28b22756bedf3cf393d14c46cc4f79fd2b316da4f0de8163f6242fa732300000637c48468766af540439fce41f144631ac262dcae18c3d1a1fbe96dd87235b44174f7c0343185089a0f119e31975e551558055dc2dc"], &(0x7f0000000280)='GPL\x00'}, 0x48) r1 = socket$kcm(0x11, 0x8000000002, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000540)=r0, 0x4) socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = fcntl$dupfd(r2, 0x0, r3) r5 = socket$alg(0x26, 0x5, 0x0) bind$alg(r5, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) accept4(r5, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r5, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c81", 0x10) r6 = gettid() fcntl$lock(r5, 0x24, &(0x7f0000000080)={0x1, 0x1, 0x1, 0x7f, r6}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') [ 1356.607131][T32749] kAFS: unparsable volume name 09:33:42 executing program 1: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000080)=ANY=[@ANYBLOB='#U'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0xedc0, 0x0) 09:33:42 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f0000000340)=ANY=[@ANYBLOB="b7020000f7ffffffbfa70000000000002402000020feffff7a0af0fff8ffffff69a4f0ff00000000b70600000018d1fe2d6405000000000075040000000000000704000000000000b7040000100000206a0700fe00000000850000002f000000b70000000a0000009500000000000000e535f8a62fc2868f0399d909a63796c113a80c19aab9d607000000b6cd483be3f0d3253730e711f5969f62c28b22756bedf3cf393d14c46cc4f79fd2b316da4f0de8163f6242fa732300000637c48468766af540439fce41f144631ac262dcae18c3d1a1fbe96dd87235b44174f7c09a0f119e31975e551558055dc2dc00000000"], &(0x7f0000000280)='GPL\x00'}, 0x48) r1 = socket$kcm(0x11, 0x8000000002, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000540)=r0, 0x4) socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) socket$inet_udplite(0x2, 0x2, 0x88) r3 = fcntl$dupfd(r2, 0x203, r2) socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = fcntl$dupfd(r4, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f0000000080)={0x0, 0x0}) ioctl$DRM_IOCTL_GEM_FLINK(0xffffffffffffffff, 0xc008640a, &(0x7f00000000c0)={0x0, 0x0}) ioctl$DRM_IOCTL_GEM_FLINK(r6, 0xc008640a, &(0x7f0000000100)={r7, r8}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') 09:33:42 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f00000015c0)=ANY=[@ANYBLOB="b5"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:33:42 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f0000000340)=ANY=[@ANYBLOB="b7020000f7ffffffbfa70000000000002402000020feffff7a0af0fff8ffffff69a4f0ff00000000b70600000018d1fe2d6405000000000075040000000000000704000000000000b7040000100000206a0700fe00000000850000002f000000b70000000a0000009500000000000000e535f8a62fc2868f0399d909a63796c113a80c19aab9d607000000b6cd483be3f0d3253730e711f5969f62c28b22756bedf3cf393d14c46cc4f79fd2b316da4f0de8163f6242fa732300000637c48468766af540439fce41f144631ac262dcae18c3d1a1fbe96dd87235b44174f7c0343185089a0f119e31975e551558055dc2dc"], &(0x7f0000000280)='GPL\x00'}, 0x48) r1 = socket$kcm(0x11, 0x8000000002, 0x300) socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000540)=r0, 0x4) syz_emit_ethernet(0x3e, &(0x7f0000000000)={@broadcast, @random="96c1e9574b31", @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x30, 0x4, 0x0, 0x0, 0x1, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @local}, @time_exceeded={0xb, 0x0, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local, @multicast2}}}}}}, 0x0) 09:33:42 executing program 2: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg$inet(r1, &(0x7f0000000680)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f00000000c0)="5831255624c13e4c563f221188b6be66ea", 0x11}], 0x1}}, {{&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000002c0)=[{&(0x7f0000000040)="70a6b8247e016ae2647a2e703fce46c432e37d1dffd332a793d4b9e3617386d153", 0x21}, {&(0x7f0000000200)="09f96fbf33ceccc10976cd10b1411ee57d092fd5b7f95a0f19f01005f110463ccb2c6ebdb74ad7a7da1a2bed233154886db68984d477ebee11ce9a8e3510d401f6f31ea0a7e3ec1cda7b95f7a02b42753eb4cf0bbf5afbc7084f9bc2603aafe5da6cd54e4d647ec9fd641e4241513aaf23481d1f390bbb83dfae56369f4b03367ccd45f0ec4cd929aed127394157e7b3794500c0c5f88930b1ff50bbae1163c26fff28d06028", 0xa6}, {&(0x7f0000000100)="38d6cd435749d519cc39e90540f37c4f5c6bceef6c4ae07105cafc5e25d9bbfce859670b89666cca0857aa0c2abd8722a9db0caad3905e3ff682", 0x3a}, {&(0x7f0000000140)="d71206abd00e3c0a7e2440673da6a9fc2c1255a9b136bc982a3dc2ac21ef167250c176acfbd4d13abd86b018e8b1357842d8dc93e53f6b542e9633e1db8672e8", 0x40}], 0x4}}, {{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000380)="df304451b990364b1c6ff9c843eb47125c0a16565b5efbc0494b453f9863364196a743b5d226d34b2293f3b4b8dde4b8434172dec0902f0e03c2893c2bfd5f662eefc2902850a0221d55", 0x200003ca}, {&(0x7f0000000400)}], 0x2, &(0x7f0000000540)=[@ip_tos_u8={{0x11}}, @ip_ttl={{0x14}}, @ip_ttl={{0x14}}, @ip_tos_u8={{0x11}}], 0x60}}], 0x3, 0x0) mount(&(0x7f0000000080)=ANY=[@ANYPTR64=&(0x7f0000000040)=ANY=[@ANYRES32, @ANYRES16, @ANYRESOCT=r1, @ANYPTR=&(0x7f0000000000)=ANY=[@ANYRESOCT, @ANYRESOCT=0x0], @ANYRES16]], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x80, 0x0) 09:33:42 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f0000000340)=ANY=[@ANYBLOB="b7020000f7ffffffbfa70000000000002402000020feffff7a0af0fff8ffffff69a4f0ff00000000b70600000018d1fe2d6405000000000075040000000000000704000000000000b7040000100000206a0700fe00000000850000002f000000b70000000a0000009500000000000000e535f8a62fc2868f0399d909a63796c113a80c19aab9d607000000b6cd483be3f0d3253730e711f5969f62c28b22756bedf3cf393d14c46cc4f79fd2b316da4f0de8163f6242fa732300000637c48468766af540439fce41f144631ac262dcae18c3d1a1fbe96dd87235b44174f7c0343185089a0f119e31975e551558055dc2dc"], &(0x7f0000000280)='GPL\x00'}, 0x48) r1 = socket$kcm(0x11, 0x8000000002, 0x300) socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000540)=r0, 0x4) syz_emit_ethernet(0x3e, &(0x7f0000000000)={@broadcast, @random="96c1e9574b31", @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x600, 0x0, 0x1, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @local}, @time_exceeded={0xb, 0x0, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local, @multicast2}}}}}}, 0x0) [ 1357.115109][ T520] kAFS: unparsable volume name [ 1357.128364][ T519] kAFS: unparsable volume name [ 1357.148631][ T520] kAFS: unparsable volume name 09:33:42 executing program 3: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000080)=ANY=[@ANYBLOB='%U'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:33:42 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="2398c593a2303d8df8dc1623f67a060de466e34712df232157116a41dc2b323a699adc0101000000000000ed28515f9ece02c8d482f01d5ee1523b4de13cbe74cc4004a437d127ec8a6b6fcd768b1d1eb28add2c402848f743907236000d5d0a12aca1a89ade47fba48469ea95b6c67196ce16118cea061d52d0284271d4d462c25c00000000000000000000000000b3efc93293ccdfb945d02fa5cf51f1bd043d2954e65d63a6d11d19ae177067e98ea7ce784f6c76f4c7d635995144bc5090cab944aa7927506a6a50048f0962436f6cbd975bc0a0d6866b8929d024c496eef336065aa75e242f38f8bc37964bcf57373afca7cec2a60a3c5ee4dfdfab7563b25f0838ea9555db12ef74cd842fe30df1c977e482af48ce0ccfdb6a7c153670c9e96d3d58d82ef834bc888416be1c566833c4227692e6f12fbdb12921dbf983efb7c378b66b1b7f3911cda7e7d7bf947364ba89985dc56f1d7015dec8e1b1be9af868d6c8ce196ad5eeb9827a42157f57476554cd73932ae79a8ba370158ece8c89c7f597"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:33:42 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x44140, 0x0) socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$inet(r3, &(0x7f0000000680)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f00000000c0)="5831255624c13e4c563f221188b6be66ea", 0x11}], 0x1}}, {{&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000002c0)=[{&(0x7f0000000040)="70a6b8247e016ae2647a2e703fce46c432e37d1dffd332a793d4b9e3617386d153", 0x21}, {&(0x7f0000000200)="09f96fbf33ceccc10976cd10b1411ee57d092fd5b7f95a0f19f01005f110463ccb2c6ebdb74ad7a7da1a2bed233154886db68984d477ebee11ce9a8e3510d401f6f31ea0a7e3ec1cda7b95f7a02b42753eb4cf0bbf5afbc7084f9bc2603aafe5da6cd54e4d647ec9fd641e4241513aaf23481d1f390bbb83dfae56369f4b03367ccd45f0ec4cd929aed127394157e7b3794500c0c5f88930b1ff50bbae1163c26fff28d06028", 0xa6}, {&(0x7f0000000100)="38d6cd435749d519cc39e90540f37c4f5c6bceef6c4ae07105cafc5e25d9bbfce859670b89666cca0857aa0c2abd8722a9db0caad3905e3ff682", 0x3a}, {&(0x7f0000000140)="d71206abd00e3c0a7e2440673da6a9fc2c1255a9b136bc982a3dc2ac21ef167250c176acfbd4d13abd86b018e8b1357842d8dc93e53f6b542e9633e1db8672e8", 0x40}], 0x4}}, {{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000380)="df304451b990364b1c6ff9c843eb47125c0a16565b5efbc0494b453f9863364196a743b5d226d34b2293f3b4b8dde4b8434172dec0902f0e03c2893c2bfd5f662eefc2902850a0221d55", 0x200003ca}, {&(0x7f0000000400)}], 0x2, &(0x7f0000000540)=[@ip_tos_u8={{0x11}}, @ip_ttl={{0x14}}, @ip_ttl={{0x14}}, @ip_tos_u8={{0x11}}], 0x60}}], 0x3, 0x0) close(r3) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = fcntl$dupfd(r1, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$SG_GET_VERSION_NUM(r5, 0x2282, &(0x7f0000000100)) socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r7 = socket$inet_udplite(0x2, 0x2, 0x88) r8 = fcntl$dupfd(r6, 0x0, r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) r9 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/pmtu_disc\x00', 0x2, 0x0) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, &(0x7f0000000080)={0x0, 0x3, [{r5, 0x0, 0xfffffffff0000000, 0x8000}, {r8, 0x0, 0xfffff000, 0x10000}, {r9, 0x0, 0x100010000, 0xfffffffff0000000}]}) mount(&(0x7f00000015c0)=ANY=[@ANYBLOB='#'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:33:42 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f0000000340)=ANY=[@ANYBLOB="b7020000f7ffffffbfa70000000000002402000020feffff7a0af0fff8ffffff69a4f0ff00000000b70600000018d1fe2d6405000000000075040000000000000704000000000000b7040000100000206a0700fe00000000850000002f000000b70000000a0000009500000000000000e535f8a62fc2868f0399d909a63796c113a80c19aab9d607000000b6cd483be3f0d3253730e711f5969f62c28b22756bedf3cf393d14c46cc4f79fd2b316da4f0de8163f6242fa732300000637c48468766af540439fce41f144631ac262dcae18c3d1a1fbe96dd87235b44174f7c0343185089a0f119e31975e551558055dc2dc"], &(0x7f0000000280)='GPL\x00'}, 0x48) r1 = socket$kcm(0x11, 0x8000000002, 0x300) socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000540)=r0, 0x4) syz_emit_ethernet(0x3e, &(0x7f0000000000)={@broadcast, @random="96c1e9574b31", @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x700, 0x0, 0x1, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @local}, @time_exceeded={0xb, 0x0, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local, @multicast2}}}}}}, 0x0) 09:33:42 executing program 2: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000040)=ANY=[@ANYRESHEX=0x0], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x6e13314a8b4f1a57, 0x0) [ 1357.442910][ T729] kAFS: unparsable volume name 09:33:42 executing program 5 (fault-call:1 fault-nth:0): mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="2398c593a2303d8df8dc1623f67a060de466e34712df232157116a41dc2b323a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1357.676050][ T941] FAULT_INJECTION: forcing a failure. [ 1357.676050][ T941] name failslab, interval 1, probability 0, space 0, times 0 [ 1357.719850][ T941] CPU: 0 PID: 941 Comm: syz-executor.5 Not tainted 5.5.0-rc5-syzkaller #0 [ 1357.728389][ T941] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1357.738459][ T941] Call Trace: [ 1357.741770][ T941] dump_stack+0x197/0x210 [ 1357.746133][ T941] should_fail.cold+0xa/0x15 [ 1357.750746][ T941] ? fault_create_debugfs_attr+0x180/0x180 [ 1357.756570][ T941] ? ___might_sleep+0x163/0x2c0 [ 1357.761436][ T941] __should_failslab+0x121/0x190 [ 1357.766387][ T941] should_failslab+0x9/0x14 [ 1357.770899][ T941] __kmalloc_track_caller+0x2dc/0x760 [ 1357.776284][ T941] ? fput+0x1b/0x20 [ 1357.780101][ T941] ? ksys_write+0x1cf/0x290 [ 1357.784616][ T941] ? strndup_user+0x77/0xd0 [ 1357.789134][ T941] memdup_user+0x26/0xd0 [ 1357.793387][ T941] strndup_user+0x77/0xd0 [ 1357.797735][ T941] __x64_sys_mount+0xe9/0x230 [ 1357.802425][ T941] do_syscall_64+0xfa/0x790 [ 1357.806945][ T941] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1357.812857][ T941] RIP: 0033:0x45af49 [ 1357.816934][ T941] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1357.836552][ T941] RSP: 002b:00007f2c1e821c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1357.844980][ T941] RAX: ffffffffffffffda RBX: 00007f2c1e821c90 RCX: 000000000045af49 [ 1357.853056][ T941] RDX: 0000000020000180 RSI: 0000000020000140 RDI: 0000000020000240 [ 1357.861043][ T941] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 09:33:43 executing program 1: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000080)=ANY=[@ANYBLOB='#U'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0xf000, 0x0) 09:33:43 executing program 3: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000080)=ANY=[@ANYBLOB='%U'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:33:43 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000000680)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f00000000c0)="5831255624c13e4c563f221188b6be66ea", 0x11}], 0x1}}, {{&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000002c0)=[{&(0x7f0000000040)="70a6b8247e016ae2647a2e703fce46c432e37d1dffd332a793d4b9e3617386d153", 0x21}, {&(0x7f0000000200)="09f96fbf33ceccc10976cd10b1411ee57d092fd5b7f95a0f19f01005f110463ccb2c6ebdb74ad7a7da1a2bed233154886db68984d477ebee11ce9a8e3510d401f6f31ea0a7e3ec1cda7b95f7a02b42753eb4cf0bbf5afbc7084f9bc2603aafe5da6cd54e4d647ec9fd641e4241513aaf23481d1f390bbb83dfae56369f4b03367ccd45f0ec4cd929aed127394157e7b3794500c0c5f88930b1ff50bbae1163c26fff28d06028", 0xa6}, {&(0x7f0000000100)="38d6cd435749d519cc39e90540f37c4f5c6bceef6c4ae07105cafc5e25d9bbfce859670b89666cca0857aa0c2abd8722a9db0caad3905e3ff682", 0x3a}, {&(0x7f0000000140)="d71206abd00e3c0a7e2440673da6a9fc2c1255a9b136bc982a3dc2ac21ef167250c176acfbd4d13abd86b018e8b1357842d8dc93e53f6b542e9633e1db8672e8", 0x40}], 0x4}}, {{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000380)="df304451b990364b1c6ff9c843eb47125c0a16565b5efbc0494b453f9863364196a743b5d226d34b2293f3b4b8dde4b8434172dec0902f0e03c2893c2bfd5f662eefc2902850a0221d55", 0x200003ca}, {&(0x7f0000000400)}], 0x2, &(0x7f0000000540)=[@ip_tos_u8={{0x11}}, @ip_ttl={{0x14}}, @ip_ttl={{0x14}}, @ip_tos_u8={{0x11}}], 0x60}}], 0x3, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) sendmmsg$inet(r2, &(0x7f0000000680)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f00000000c0)="5831255624c13e4c563f221188b6be66ea", 0x11}], 0x1}}, {{&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000002c0)=[{&(0x7f0000000040)="70a6b8247e016ae2647a2e703fce46c432e37d1dffd332a793d4b9e3617386d153", 0x21}, {&(0x7f0000000200)="09f96fbf33ceccc10976cd10b1411ee57d092fd5b7f95a0f19f01005f110463ccb2c6ebdb74ad7a7da1a2bed233154886db68984d477ebee11ce9a8e3510d401f6f31ea0a7e3ec1cda7b95f7a02b42753eb4cf0bbf5afbc7084f9bc2603aafe5da6cd54e4d647ec9fd641e4241513aaf23481d1f390bbb83dfae56369f4b03367ccd45f0ec4cd929aed127394157e7b3794500c0c5f88930b1ff50bbae1163c26fff28d06028", 0xa6}, {&(0x7f0000000100)="38d6cd435749d519cc39e90540f37c4f5c6bceef6c4ae07105cafc5e25d9bbfce859670b89666cca0857aa0c2abd8722a9db0caad3905e3ff682", 0x3a}, {&(0x7f0000000140)="d71206abd00e3c0a7e2440673da6a9fc2c1255a9b136bc982a3dc2ac21ef167250c176acfbd4d13abd86b018e8b1357842d8dc93e53f6b542e9633e1db8672e8", 0x40}], 0x4}}, {{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000380)="df304451b990364b1c6ff9c843eb47125c0a16565b5efbc0494b453f9863364196a743b5d226d34b2293f3b4b8dde4b8434172dec0902f0e03c2893c2bfd5f662eefc2902850a0221d55", 0x200003ca}, {&(0x7f0000000400)}], 0x2, &(0x7f0000000540)=[@ip_tos_u8={{0x11}}, @ip_ttl={{0x14}}, @ip_ttl={{0x14}}, @ip_tos_u8={{0x11}}], 0x60}}], 0x3, 0x0) mount(&(0x7f0000001300)=ANY=[@ANYRESDEC], &(0x7f0000000140)='./file0\x00', &(0x7f00000012c0)='rpc_pipefs\x00', 0x0, 0x0) 09:33:43 executing program 2: syz_genetlink_get_family_id$SEG6(&(0x7f0000000300)='SEG6\x00') mkdir(&(0x7f0000000200)='./file0\x00', 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r0 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r1, &(0x7f0000000180), 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000100)=0x14) syz_genetlink_get_family_id$SEG6(&(0x7f0000000040)='SEG6\x00') sendmsg$can_bcm(r1, &(0x7f00000002c0)={&(0x7f0000000140)={0x1d, r2}, 0x10, &(0x7f0000000280)={&(0x7f0000000200)={0x0, 0x0, 0x0, {0x0, 0x2710}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "55e19dc0c30616da"}}, 0x48}}, 0x0) ioctl$sock_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000001b80)={0x0, @vsock={0x28, 0x0, 0x0, @local}, @ipx={0x4, 0x3160, 0x6, "13b6503f6421", 0x80}, @xdp={0x2c, 0x8, 0x0, 0x37}, 0xfe01, 0x0, 0x0, 0x0, 0x2, &(0x7f0000001b40)='syzkaller0\x00', 0xffffffffffffffe0, 0x4, 0x2}) sendmmsg$inet(r0, &(0x7f0000001d00)=[{{&(0x7f0000000340)={0x2, 0x4e20, @remote}, 0x10, &(0x7f0000000600)=[{&(0x7f0000000400)="f1ca678fa20426", 0x7}, {&(0x7f0000000440)="2d3cd1d66a4c55b2032cc7e55e90804678cf288e6badc33850b0a90228ddd8e9c41175c3d20018dc4d0d965946098f70e9f04e7e831205b0ce958c9bb198eb9de213cb8c4ad2803e299b6d7f9901", 0x4e}, {&(0x7f0000000840)="73b13db1defe09e2a36b3450f6b49cafc8566463ff2b0750fe2d4275b156b7ea3bf19a5514a5357a7afbb49e76c1fcdf178f16b6f4a44f034bbba816bad6f9497c23026951c462f18460d6a2625cf632e24c29589ea63ede5610b34e49aaf3cee1bb4cbebd29b9bc844dc18a7ac0ca55b774cd82b0634292f265572eac29361d734debea19118d6771b6fc216112122d46cd9b3feef3d0f14b9d405d96f3ecdc582573b2b57b61cc9a76c31c8dcbc2d2f46f288cbd2a73d9cb458f00ca7e4118548c31b58110c44dc47c9769f815607622baa0f1c09bfcea0fdae33a02b22b652f78e6a5b81754108d1994f4", 0xec}, {&(0x7f00000004c0)}, {&(0x7f00000005c0)="eff3e62bd7309efc8b890024faa0f6029f5cc2ae318963232e0eb6e9a91ae8a76d6fa4853a55949c5988557a", 0x2c}], 0x5}}, {{&(0x7f0000000740)={0x2, 0x4e24, @loopback}, 0x10, &(0x7f0000000780)=[{&(0x7f0000000940)="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", 0x1000}], 0x1, &(0x7f0000001940)=[@ip_tos_u8={{0x11, 0x0, 0x1, 0x62}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x1}}, @ip_ttl={{0x14}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r2, @dev={0xac, 0x14, 0x14, 0x24}, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, @ip_retopts={{0xb0, 0x0, 0x7, {[@ssrr={0x89, 0x7, 0x60, [@rand_addr=0xc14]}, @rr={0x7, 0x17, 0x89, [@multicast1, @loopback, @remote, @loopback, @dev={0xac, 0x14, 0x14, 0x2d}]}, @rr={0x7, 0x1b, 0xf0, [@rand_addr=0xffff8001, @remote, @empty, @loopback, @broadcast, @rand_addr=0x9]}, @generic={0x82, 0xb, "e2332cc09314957c4e"}, @timestamp={0x44, 0x14, 0xa, 0x0, 0xf, [0x3, 0x100, 0x4a, 0x7ff]}, @rr={0x7, 0x13, 0x61, [@rand_addr=0x6, @multicast1, @multicast1, @dev={0xac, 0x14, 0x14, 0x30}]}, @timestamp={0x44, 0x18, 0xbc, 0x0, 0x4, [0xc7d7, 0x3f, 0x200, 0x10, 0x7ff]}, @ssrr={0x89, 0x1b, 0x38, [@local, @broadcast, @multicast2, @initdev={0xac, 0x1e, 0x0, 0x0}, @empty, @empty]}, @end]}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @remote, @multicast2}}}, @ip_tos_u8={{0x11}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x9}}], 0x168}}], 0x2, 0x40000) mount(&(0x7f0000000000)=ANY=[@ANYRESOCT=r0], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x20, 0x0) r4 = socket$inet6_sctp(0xa, 0x1, 0x84) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(r4, 0x8982, &(0x7f0000000080)={0x0, 'nr0\x00', {0x1}, 0x20}) 09:33:43 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f0000000340)=ANY=[@ANYBLOB="b7020000f7ffffffbfa70000000000002402000020feffff7a0af0fff8ffffff69a4f0ff00000000b70600000018d1fe2d6405000000000075040000000000000704000000000000b7040000100000206a0700fe00000000850000002f000000b70000000a0000009500000000000000e535f8a62fc2868f0399d909a63796c113a80c19aab9d607000000b6cd483be3f0d3253730e711f5969f62c28b22756bedf3cf393d14c46cc4f79fd2b316da4f0de8163f6242fa732300000637c48468766af540439fce41f144631ac262dcae18c3d1a1fbe96dd87235b44174f7c0343185089a0f119e31975e551558055dc2dc"], &(0x7f0000000280)='GPL\x00'}, 0x48) r1 = socket$kcm(0x11, 0x8000000002, 0x300) socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000540)=r0, 0x4) syz_emit_ethernet(0x3e, &(0x7f0000000000)={@broadcast, @random="96c1e9574b31", @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0xb00, 0x0, 0x1, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @local}, @time_exceeded={0xb, 0x0, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local, @multicast2}}}}}}, 0x0) [ 1357.869029][ T941] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f2c1e8226d4 [ 1357.877020][ T941] R13: 00000000004c8583 R14: 00000000004e06a8 R15: 0000000000000003 09:33:43 executing program 5 (fault-call:1 fault-nth:1): mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="2398c593a2303d8df8dc1623f67a060de466e34712df232157116a41dc2b323a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:33:43 executing program 3: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000080)=ANY=[@ANYBLOB='%U'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:33:43 executing program 2: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f00000015c0)=ANY=[@ANYBLOB='%'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) keyctl$set_reqkey_keyring(0xe, 0x27106b0d3f8e0061) 09:33:43 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="23888eddd5025505ff630696af", @ANYRES16=0x0], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x10000, 0x0) [ 1358.222107][ T1279] FAULT_INJECTION: forcing a failure. [ 1358.222107][ T1279] name failslab, interval 1, probability 0, space 0, times 0 [ 1358.249404][ T1281] kAFS: unparsable volume name [ 1358.257092][ T1279] CPU: 0 PID: 1279 Comm: syz-executor.5 Not tainted 5.5.0-rc5-syzkaller #0 [ 1358.265715][ T1279] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1358.275874][ T1279] Call Trace: [ 1358.279187][ T1279] dump_stack+0x197/0x210 [ 1358.283546][ T1279] should_fail.cold+0xa/0x15 [ 1358.285137][ T1281] kAFS: unparsable volume name [ 1358.288157][ T1279] ? fault_create_debugfs_attr+0x180/0x180 [ 1358.288179][ T1279] ? ___might_sleep+0x163/0x2c0 [ 1358.288203][ T1279] __should_failslab+0x121/0x190 [ 1358.308605][ T1279] should_failslab+0x9/0x14 [ 1358.313243][ T1279] __kmalloc_track_caller+0x2dc/0x760 [ 1358.318645][ T1279] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1358.324920][ T1279] ? strndup_user+0x77/0xd0 [ 1358.329444][ T1279] memdup_user+0x26/0xd0 [ 1358.333708][ T1279] strndup_user+0x77/0xd0 [ 1358.338061][ T1279] __x64_sys_mount+0x132/0x230 [ 1358.342849][ T1279] do_syscall_64+0xfa/0x790 [ 1358.347457][ T1279] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1358.353355][ T1279] RIP: 0033:0x45af49 09:33:43 executing program 3: mount(&(0x7f0000000080)=ANY=[@ANYBLOB='%U'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:33:43 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f00000015c0)=ANY=[@ANYBLOB='#'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='afs\x00', 0x2000800, 0x0) r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nvram\x00', 0x200200, 0x0) connect$l2tp(r0, &(0x7f0000000040)={0x2, 0x0, @empty, 0x1}, 0x10) 09:33:43 executing program 5 (fault-call:1 fault-nth:2): mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="2398c593a2303d8df8dc1623f67a060de466e34712df232157116a41dc2b323a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1358.357262][ T1279] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1358.377130][ T1279] RSP: 002b:00007f2c1e821c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1358.377145][ T1279] RAX: ffffffffffffffda RBX: 00007f2c1e821c90 RCX: 000000000045af49 [ 1358.377153][ T1279] RDX: 0000000020000180 RSI: 0000000020000140 RDI: 0000000020000240 [ 1358.377161][ T1279] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1358.377169][ T1279] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f2c1e8226d4 [ 1358.377177][ T1279] R13: 00000000004c8583 R14: 00000000004e06a8 R15: 0000000000000003 [ 1358.475848][ T1390] kAFS: unparsable volume name [ 1358.502914][ T1390] kAFS: unparsable volume name [ 1358.511553][ T1392] FAULT_INJECTION: forcing a failure. [ 1358.511553][ T1392] name failslab, interval 1, probability 0, space 0, times 0 [ 1358.539840][ T1392] CPU: 1 PID: 1392 Comm: syz-executor.5 Not tainted 5.5.0-rc5-syzkaller #0 [ 1358.548468][ T1392] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1358.548476][ T1392] Call Trace: [ 1358.548498][ T1392] dump_stack+0x197/0x210 [ 1358.548524][ T1392] should_fail.cold+0xa/0x15 [ 1358.561885][ T1392] ? fault_create_debugfs_attr+0x180/0x180 [ 1358.561907][ T1392] ? ___might_sleep+0x163/0x2c0 [ 1358.561929][ T1392] __should_failslab+0x121/0x190 [ 1358.561954][ T1392] should_failslab+0x9/0x14 [ 1358.590927][ T1392] kmem_cache_alloc+0x2aa/0x710 [ 1358.595802][ T1392] ? __might_fault+0x12b/0x1e0 [ 1358.600580][ T1392] ? find_held_lock+0x35/0x130 [ 1358.605363][ T1392] getname_flags+0xd6/0x5b0 [ 1358.609890][ T1392] user_path_at_empty+0x2f/0x50 [ 1358.614759][ T1392] do_mount+0x150/0x1b50 [ 1358.619025][ T1392] ? copy_mount_string+0x40/0x40 [ 1358.623996][ T1392] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1358.630264][ T1392] ? _copy_from_user+0x12c/0x1a0 [ 1358.635307][ T1392] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1358.641569][ T1392] ? copy_mount_options+0x2e8/0x3f0 [ 1358.646804][ T1392] __x64_sys_mount+0x192/0x230 09:33:43 executing program 1: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000080)=ANY=[@ANYBLOB='#U'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0xff00, 0x0) 09:33:43 executing program 2: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f00000015c0)=ANY=[@ANYBLOB='%'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x200) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg$inet(r1, &(0x7f0000000680)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f00000000c0)="5831255624c13e4c563f221188b6be66ea", 0x11}], 0x1}}, {{&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000002c0)=[{&(0x7f0000000040)="70a6b8247e016ae2647a2e703fce46c432e37d1dffd332a793d4b9e3617386d153", 0x21}, {&(0x7f0000000200)="09f96fbf33ceccc10976cd10b1411ee57d092fd5b7f95a0f19f01005f110463ccb2c6ebdb74ad7a7da1a2bed233154886db68984d477ebee11ce9a8e3510d401f6f31ea0a7e3ec1cda7b95f7a02b42753eb4cf0bbf5afbc7084f9bc2603aafe5da6cd54e4d647ec9fd641e4241513aaf23481d1f390bbb83dfae56369f4b03367ccd45f0ec4cd929aed127394157e7b3794500c0c5f88930b1ff50bbae1163c26fff28d06028", 0xa6}, {&(0x7f0000000100)="38d6cd435749d519cc39e90540f37c4f5c6bceef6c4ae07105cafc5e25d9bbfce859670b89666cca0857aa0c2abd8722a9db0caad3905e3ff682", 0x3a}, {&(0x7f0000000140)="d71206abd00e3c0a7e2440673da6a9fc2c1255a9b136bc982a3dc2ac21ef167250c176acfbd4d13abd86b018e8b1357842d8dc93e53f6b542e9633e1db8672e8", 0x40}], 0x4}}, {{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000380)="df304451b990364b1c6ff9c843eb47125c0a16565b5efbc0494b453f9863364196a743b5d226d34b2293f3b4b8dde4b8434172dec0902f0e03c2893c2bfd5f662eefc2902850a0221d55", 0x200003ca}, {&(0x7f0000000400)}], 0x2, &(0x7f0000000540)=[@ip_tos_u8={{0x11}}, @ip_ttl={{0x14}}, @ip_ttl={{0x14}}, @ip_tos_u8={{0x11}}], 0x60}}], 0x3, 0x0) setsockopt$inet_MCAST_MSFILTER(r1, 0x0, 0x30, &(0x7f0000000240)={0x81, {{0x2, 0x4e21, @multicast2}}, 0x1, 0x9, [{{0x2, 0x4e22, @initdev={0xac, 0x1e, 0x0, 0x0}}}, {{0x2, 0x4e24, @multicast2}}, {{0x2, 0x4e24, @remote}}, {{0x2, 0x4e22, @local}}, {{0x2, 0x4e20, @loopback}}, {{0x2, 0x4e20, @broadcast}}, {{0x2, 0x4e21, @loopback}}, {{0x2, 0x4e20, @broadcast}}, {{0x2, 0x4e24, @multicast2}}]}, 0x510) 09:33:43 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f0000000340)=ANY=[@ANYBLOB="b7020000f7ffffffbfa70000000000002402000020feffff7a0af0fff8ffffff69a4f0ff00000000b70600000018d1fe2d6405000000000075040000000000000704000000000000b7040000100000206a0700fe00000000850000002f000000b70000000a0000009500000000000000e535f8a62fc2868f0399d909a63796c113a80c19aab9d607000000b6cd483be3f0d3253730e711f5969f62c28b22756bedf3cf393d14c46cc4f79fd2b316da4f0de8163f6242fa732300000637c48468766af540439fce41f144631ac262dcae18c3d1a1fbe96dd87235b44174f7c0343185089a0f119e31975e551558055dc2dc"], &(0x7f0000000280)='GPL\x00'}, 0x48) r1 = socket$kcm(0x11, 0x8000000002, 0x300) socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000540)=r0, 0x4) syz_emit_ethernet(0x3e, &(0x7f0000000000)={@broadcast, @random="96c1e9574b31", @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x1100, 0x0, 0x1, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @local}, @time_exceeded={0xb, 0x0, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local, @multicast2}}}}}}, 0x0) 09:33:43 executing program 3: mount(&(0x7f0000000080)=ANY=[@ANYBLOB='%U'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1358.651590][ T1392] do_syscall_64+0xfa/0x790 [ 1358.656115][ T1392] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1358.662015][ T1392] RIP: 0033:0x45af49 [ 1358.666880][ T1392] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1358.688667][ T1392] RSP: 002b:00007f2c1e821c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 09:33:43 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x9) mount(&(0x7f0000000000)=ANY=[@ANYBLOB='#'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1358.699338][ T1392] RAX: ffffffffffffffda RBX: 00007f2c1e821c90 RCX: 000000000045af49 [ 1358.707440][ T1392] RDX: 0000000020000180 RSI: 0000000020000140 RDI: 0000000020000240 [ 1358.715547][ T1392] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1358.724075][ T1392] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f2c1e8226d4 [ 1358.732048][ T1392] R13: 00000000004c8583 R14: 00000000004e06a8 R15: 0000000000000003 [ 1358.776627][ T1518] kAFS: unparsable volume name [ 1358.797120][ T1518] kAFS: unparsable volume name 09:33:44 executing program 3: mount(&(0x7f0000000080)=ANY=[@ANYBLOB='%U'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:33:44 executing program 5 (fault-call:1 fault-nth:3): mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="2398c593a2303d8df8dc1623f67a060de466e34712df232157116a41dc2b323a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:33:44 executing program 2: prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f00000015c0)=ANY=[@ANYBLOB='%'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:33:44 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f0000000340)=ANY=[@ANYBLOB="b7020000f7ffffffbfa70000000000002402000020feffff7a0af0fff8ffffff69a4f0ff00000000b70600000018d1fe2d6405000000000075040000000000000704000000000000b7040000100000206a0700fe00000000850000002f000000b70000000a0000009500000000000000e535f8a62fc2868f0399d909a63796c113a80c19aab9d607000000b6cd483be3f0d3253730e711f5969f62c28b22756bedf3cf393d14c46cc4f79fd2b316da4f0de8163f6242fa732300000637c48468766af540439fce41f144631ac262dcae18c3d1a1fbe96dd87235b44174f7c0343185089a0f119e31975e551558055dc2dc"], &(0x7f0000000280)='GPL\x00'}, 0x48) r1 = socket$kcm(0x11, 0x8000000002, 0x300) socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000540)=r0, 0x4) syz_emit_ethernet(0x3e, &(0x7f0000000000)={@broadcast, @random="96c1e9574b31", @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x1c00, 0x0, 0x1, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @local}, @time_exceeded={0xb, 0x0, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local, @multicast2}}}}}}, 0x0) [ 1358.949901][ T1726] FAULT_INJECTION: forcing a failure. [ 1358.949901][ T1726] name failslab, interval 1, probability 0, space 0, times 0 [ 1358.974171][ T1721] kAFS: unparsable volume name 09:33:44 executing program 3: mkdir(0x0, 0x0) mount(&(0x7f0000000080)=ANY=[@ANYBLOB='%U'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1359.029099][ T1729] kAFS: unparsable volume name [ 1359.051015][ T1726] CPU: 0 PID: 1726 Comm: syz-executor.5 Not tainted 5.5.0-rc5-syzkaller #0 [ 1359.059646][ T1726] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1359.069711][ T1726] Call Trace: [ 1359.073019][ T1726] dump_stack+0x197/0x210 [ 1359.077371][ T1726] should_fail.cold+0xa/0x15 [ 1359.081987][ T1726] ? fault_create_debugfs_attr+0x180/0x180 [ 1359.087814][ T1726] ? ___might_sleep+0x163/0x2c0 [ 1359.092687][ T1726] __should_failslab+0x121/0x190 [ 1359.097662][ T1726] should_failslab+0x9/0x14 [ 1359.102178][ T1726] __kmalloc+0x2e0/0x770 [ 1359.106436][ T1726] ? save_stack+0x5c/0x90 [ 1359.110785][ T1726] ? tomoyo_encode2.part.0+0xf5/0x400 [ 1359.116180][ T1726] tomoyo_encode2.part.0+0xf5/0x400 [ 1359.121390][ T1726] ? do_syscall_64+0xfa/0x790 [ 1359.126087][ T1726] tomoyo_encode+0x2b/0x50 [ 1359.130520][ T1726] tomoyo_mount_acl+0xe0/0x840 [ 1359.135285][ T1726] ? debug_check_no_obj_freed+0x20a/0x43f [ 1359.141014][ T1726] ? __kasan_check_read+0x11/0x20 [ 1359.141030][ T1726] ? mark_lock+0xc2/0x1220 [ 1359.141047][ T1726] ? tomoyo_check_mount_acl+0x1b0/0x1b0 [ 1359.141063][ T1726] ? __kasan_check_read+0x11/0x20 [ 1359.141075][ T1726] ? __lock_acquire+0x8a0/0x4a00 [ 1359.141092][ T1726] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1359.141107][ T1726] ? debug_smp_processor_id+0x33/0x18a [ 1359.141125][ T1726] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 1359.141156][ T1726] ? lock_acquire+0x190/0x410 [ 1359.188598][ T1726] ? tomoyo_mount_permission+0x10a/0x400 [ 1359.194259][ T1726] tomoyo_mount_permission+0x16a/0x400 [ 1359.199732][ T1726] ? tomoyo_mount_permission+0x10a/0x400 [ 1359.205370][ T1726] ? tomoyo_mount_acl+0x840/0x840 [ 1359.210400][ T1726] ? strncpy_from_user+0x2b4/0x400 [ 1359.210419][ T1726] tomoyo_sb_mount+0x35/0x40 [ 1359.210437][ T1726] security_sb_mount+0x87/0xd0 [ 1359.210459][ T1726] do_mount+0x1d4/0x1b50 [ 1359.210481][ T1726] ? copy_mount_string+0x40/0x40 [ 1359.210505][ T1726] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1359.240333][ T1726] ? _copy_from_user+0x12c/0x1a0 [ 1359.245298][ T1726] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1359.251555][ T1726] ? copy_mount_options+0x2e8/0x3f0 [ 1359.256774][ T1726] __x64_sys_mount+0x192/0x230 [ 1359.261561][ T1726] do_syscall_64+0xfa/0x790 [ 1359.266078][ T1726] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1359.271999][ T1726] RIP: 0033:0x45af49 [ 1359.275901][ T1726] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 09:33:44 executing program 2: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000000)=@sr0='/dev/sr0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='ocfs2\x00', 0x445, &(0x7f00000000c0)='afs\x00') mount(&(0x7f00000015c0)=ANY=[@ANYBLOB='\x00'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000100)='/dev/cachefiles\x00', 0x24340, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x100, 0x0) ioctl$TUNSETFILTEREBPF(r0, 0x800454e1, &(0x7f0000000240)=r1) [ 1359.295770][ T1726] RSP: 002b:00007f2c1e821c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1359.304177][ T1726] RAX: ffffffffffffffda RBX: 00007f2c1e821c90 RCX: 000000000045af49 [ 1359.312138][ T1726] RDX: 0000000020000180 RSI: 0000000020000140 RDI: 0000000020000240 [ 1359.320179][ T1726] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1359.328136][ T1726] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f2c1e8226d4 [ 1359.336090][ T1726] R13: 00000000004c8583 R14: 00000000004e06a8 R15: 0000000000000003 [ 1359.357921][ T1838] kAFS: Bad value for 'source' 09:33:44 executing program 3: mkdir(0x0, 0x0) mount(&(0x7f0000000080)=ANY=[@ANYBLOB='%U'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:33:44 executing program 1: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000080)=ANY=[@ANYBLOB='#U'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x44000, 0x0) 09:33:44 executing program 4: r0 = socket$pptp(0x18, 0x1, 0x2) r1 = socket(0x0, 0x80002, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000000c0)="080db5055e0bcfe8696071") getsockname$packet(r1, &(0x7f0000000400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000440)=0x14) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000480)={'veth0_virt_wifi\x00', r2}) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000000)=ANY=[@ANYBLOB="25b575"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x1000000, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r5 = accept4(r4, 0x0, 0x0, 0x0) sendmmsg$inet(r5, &(0x7f0000000680)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f00000000c0)="5831255624c13e4c563f221188b6be66ea", 0x11}], 0x1}}, {{&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000002c0)=[{&(0x7f0000000040)="70a6b8247e016ae2647a2e703fce46c432e37d1dffd332a793d4b9e3617386d153", 0x21}, {&(0x7f0000000200)="09f96fbf33ceccc10976cd10b1411ee57d092fd5b7f95a0f19f01005f110463ccb2c6ebdb74ad7a7da1a2bed233154886db68984d477ebee11ce9a8e3510d401f6f31ea0a7e3ec1cda7b95f7a02b42753eb4cf0bbf5afbc7084f9bc2603aafe5da6cd54e4d647ec9fd641e4241513aaf23481d1f390bbb83dfae56369f4b03367ccd45f0ec4cd929aed127394157e7b3794500c0c5f88930b1ff50bbae1163c26fff28d06028", 0xa6}, {&(0x7f0000000100)="38d6cd435749d519cc39e90540f37c4f5c6bceef6c4ae07105cafc5e25d9bbfce859670b89666cca0857aa0c2abd8722a9db0caad3905e3ff682", 0x3a}, {&(0x7f0000000140)="d71206abd00e3c0a7e2440673da6a9fc2c1255a9b136bc982a3dc2ac21ef167250c176acfbd4d13abd86b018e8b1357842d8dc93e53f6b542e9633e1db8672e8", 0x40}], 0x4}}, {{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000380)="df304451b990364b1c6ff9c843eb47125c0a16565b5efbc0494b453f9863364196a743b5d226d34b2293f3b4b8dde4b8434172dec0902f0e03c2893c2bfd5f662eefc2902850a0221d55", 0x200003ca}, {&(0x7f0000000400)}], 0x2, &(0x7f0000000540)=[@ip_tos_u8={{0x11}}, @ip_ttl={{0x14}}, @ip_ttl={{0x14}}, @ip_tos_u8={{0x11}}], 0x60}}], 0x3, 0x0) r6 = syz_genetlink_get_family_id$team(&(0x7f0000000780)='team\x00') r7 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r7, &(0x7f0000000180), 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000100)=0x14) sendmsg$can_bcm(r7, &(0x7f00000002c0)={&(0x7f0000000140)={0x1d, r8}, 0x10, &(0x7f0000000280)={&(0x7f0000000200)={0x0, 0x0, 0x0, {0x0, 0x2710}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "55e19dc0c30616da"}}, 0x48}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f00000007c0)={'vcan0\x00', r2}) r10 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x2, 0x0) write$cgroup_pid(r10, 0x0, 0x0) r11 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r11, &(0x7f0000000180), 0x10) socketpair(0x8000000000001e, 0x805, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) getpeername$packet(r12, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000100)=0x14) sendmsg$can_bcm(r11, &(0x7f00000002c0)={&(0x7f0000000140)={0x1d, r13}, 0x10, &(0x7f0000000280)={&(0x7f0000000200)={0x0, 0x0, 0x0, {0x0, 0x2710}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "55e19dc0c30616da"}}, 0x48}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r10, 0x8933, &(0x7f00000007c0)={'vxcan1\x00', r13}) r14 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCFLSH(r14, 0x8910, 0x0) r15 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r15, 0x5423, &(0x7f0000000000)=0x6) ioctl$TCFLSH(r15, 0x8910, 0x0) r16 = dup2(r14, r15) r17 = syz_genetlink_get_family_id$team(&(0x7f00000000c0)='team\x00') socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000380)={0xffffffffffffffff}) r19 = fcntl$dupfd(r18, 0x0, r18) ioctl$PERF_EVENT_IOC_ENABLE(r19, 0x8912, 0x400200) getsockopt$inet6_IPV6_IPSEC_POLICY(r19, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@empty, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6}}, &(0x7f0000000280)=0xe8) r21 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r21, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r21, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, r22, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$TEAM_CMD_PORT_LIST_GET(r16, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000002c0)={0x60, r17, 0x8, 0x70bd2b, 0x25dfdbfc, {}, [{{0x8, 0x1, r20}, {0x44, 0x2, [{0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r22}}, {0x8}}}]}}]}, 0x60}, 0x1, 0x0, 0x0, 0x6f92a2c59184ece0}, 0x4000) r23 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCFLSH(r23, 0x8910, 0x0) r24 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r24, 0x5423, &(0x7f0000000000)=0x6) ioctl$TCFLSH(r24, 0x8910, 0x0) r25 = dup2(r23, r24) r26 = syz_genetlink_get_family_id$team(&(0x7f00000000c0)='team\x00') socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000380)={0xffffffffffffffff}) r28 = fcntl$dupfd(r27, 0x0, r27) ioctl$PERF_EVENT_IOC_ENABLE(r28, 0x8912, 0x400200) getsockopt$inet6_IPV6_IPSEC_POLICY(r28, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@empty, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6}}, &(0x7f0000000280)=0xe8) r30 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r30, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r30, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, r31, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$TEAM_CMD_PORT_LIST_GET(r25, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000002c0)={0x60, r26, 0x8, 0x70bd2b, 0x25dfdbfc, {}, [{{0x8, 0x1, r29}, {0x44, 0x2, [{0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r31}}, {0x8}}}]}}]}, 0x60}, 0x1, 0x0, 0x0, 0x6f92a2c59184ece0}, 0x4000) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000840)={'hsr0\x00', r29}) r33 = socket$alg(0x26, 0x5, 0x0) bind$alg(r33, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r34 = accept4(r33, 0x0, 0x0, 0x0) sendmmsg$inet(r34, &(0x7f0000000680)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f00000000c0)="5831255624c13e4c563f221188b6be66ea", 0x11}], 0x1}}, {{&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000002c0)=[{&(0x7f0000000040)="70a6b8247e016ae2647a2e703fce46c432e37d1dffd332a793d4b9e3617386d153", 0x21}, {&(0x7f0000000200)="09f96fbf33ceccc10976cd10b1411ee57d092fd5b7f95a0f19f01005f110463ccb2c6ebdb74ad7a7da1a2bed233154886db68984d477ebee11ce9a8e3510d401f6f31ea0a7e3ec1cda7b95f7a02b42753eb4cf0bbf5afbc7084f9bc2603aafe5da6cd54e4d647ec9fd641e4241513aaf23481d1f390bbb83dfae56369f4b03367ccd45f0ec4cd929aed127394157e7b3794500c0c5f88930b1ff50bbae1163c26fff28d06028", 0xa6}, {&(0x7f0000000100)="38d6cd435749d519cc39e90540f37c4f5c6bceef6c4ae07105cafc5e25d9bbfce859670b89666cca0857aa0c2abd8722a9db0caad3905e3ff682", 0x3a}, {&(0x7f0000000140)="d71206abd00e3c0a7e2440673da6a9fc2c1255a9b136bc982a3dc2ac21ef167250c176acfbd4d13abd86b018e8b1357842d8dc93e53f6b542e9633e1db8672e8", 0x40}], 0x4}}, {{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000380)="df304451b990364b1c6ff9c843eb47125c0a16565b5efbc0494b453f9863364196a743b5d226d34b2293f3b4b8dde4b8434172dec0902f0e03c2893c2bfd5f662eefc2902850a0221d55", 0x200003ca}, {&(0x7f0000000400)}], 0x2, &(0x7f0000000540)=[@ip_tos_u8={{0x11}}, @ip_ttl={{0x14}}, @ip_ttl={{0x14}}, @ip_tos_u8={{0x11}}], 0x60}}], 0x3, 0x0) getsockname$packet(r34, &(0x7f0000000880)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000008c0)=0x14) r36 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r36, &(0x7f0000000180), 0x10) socketpair(0x8000000000001e, 0x805, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) getpeername$packet(r37, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000100)=0x14) sendmsg$can_bcm(r36, &(0x7f00000002c0)={&(0x7f0000000140)={0x1d, r38}, 0x10, &(0x7f0000000280)={&(0x7f0000000200)={0x0, 0x0, 0x0, {0x0, 0x2710}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "55e19dc0c30616da"}}, 0x48}}, 0x0) r39 = socket(0x0, 0x80002, 0x0) ioctl(r39, 0x1000008912, &(0x7f00000000c0)="080db5055e0bcfe8696071") getsockopt$inet_mreqn(r39, 0x0, 0x20, &(0x7f0000000900)={@remote, @loopback, 0x0}, &(0x7f0000000940)=0xc) r41 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCFLSH(r41, 0x8910, 0x0) r42 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r42, 0x5423, &(0x7f0000000000)=0x6) ioctl$TCFLSH(r42, 0x8910, 0x0) r43 = dup2(r41, r42) r44 = syz_genetlink_get_family_id$team(&(0x7f00000000c0)='team\x00') socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000380)={0xffffffffffffffff}) r46 = fcntl$dupfd(r45, 0x0, r45) ioctl$PERF_EVENT_IOC_ENABLE(r46, 0x8912, 0x400200) getsockopt$inet6_IPV6_IPSEC_POLICY(r46, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@empty, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6}}, &(0x7f0000000280)=0xe8) r48 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r48, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r48, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, r49, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$TEAM_CMD_PORT_LIST_GET(r43, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000002c0)={0x60, r44, 0x8, 0x70bd2b, 0x25dfdbfc, {}, [{{0x8, 0x1, r47}, {0x44, 0x2, [{0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r49}}, {0x8}}}]}}]}, 0x60}, 0x1, 0x0, 0x0, 0x6f92a2c59184ece0}, 0x4000) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000980)={{{@in=@empty, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000a80)=0xe8) accept$packet(r1, &(0x7f0000000ac0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000b00)=0x14) r52 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x2, 0x0) write$cgroup_pid(r52, 0x0, 0x0) r53 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r53, &(0x7f0000000180), 0x10) socketpair(0x8000000000001e, 0x805, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) getpeername$packet(r54, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000100)=0x14) sendmsg$can_bcm(r53, &(0x7f00000002c0)={&(0x7f0000000140)={0x1d, r55}, 0x10, &(0x7f0000000280)={&(0x7f0000000200)={0x0, 0x0, 0x0, {0x0, 0x2710}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "55e19dc0c30616da"}}, 0x48}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r52, 0x8933, &(0x7f00000007c0)={'vxcan1\x00', r55}) r56 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r56, &(0x7f0000000180), 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000100)=0x14) sendmsg$can_bcm(r56, &(0x7f00000002c0)={&(0x7f0000000140)={0x1d, r57}, 0x10, &(0x7f0000000280)={&(0x7f0000000200)={0x0, 0x0, 0x0, {0x0, 0x2710}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "55e19dc0c30616da"}}, 0x48}}, 0x0) r58 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r58, &(0x7f0000000180), 0x10) socketpair(0x8000000000001e, 0x805, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) getpeername$packet(r59, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000100)=0x14) sendmsg$can_bcm(r58, &(0x7f00000002c0)={&(0x7f0000000140)={0x1d, r60}, 0x10, &(0x7f0000000280)={&(0x7f0000000200)={0x0, 0x0, 0x0, {0x0, 0x2710}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "55e19dc0c30616da"}}, 0x48}}, 0x0) r61 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCFLSH(r61, 0x8910, 0x0) r62 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r62, 0x5423, &(0x7f0000000000)=0x6) ioctl$TCFLSH(r62, 0x8910, 0x0) r63 = dup2(r61, r62) r64 = syz_genetlink_get_family_id$team(&(0x7f00000000c0)='team\x00') socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000380)={0xffffffffffffffff}) r66 = fcntl$dupfd(r65, 0x0, r65) ioctl$PERF_EVENT_IOC_ENABLE(r66, 0x8912, 0x400200) getsockopt$inet6_IPV6_IPSEC_POLICY(r66, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@empty, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6}}, &(0x7f0000000280)=0xe8) r68 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r68, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r68, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, r69, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$TEAM_CMD_PORT_LIST_GET(r63, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000002c0)={0x60, r64, 0x8, 0x70bd2b, 0x25dfdbfc, {}, [{{0x8, 0x1, r67}, {0x44, 0x2, [{0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r69}}, {0x8}}}]}}]}, 0x60}, 0x1, 0x0, 0x0, 0x6f92a2c59184ece0}, 0x4000) r70 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCFLSH(r70, 0x8910, 0x0) r71 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r71, 0x5423, &(0x7f0000000000)=0x6) ioctl$TCFLSH(r71, 0x8910, 0x0) r72 = dup2(r70, r71) r73 = syz_genetlink_get_family_id$team(&(0x7f00000000c0)='team\x00') socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000380)={0xffffffffffffffff}) r75 = fcntl$dupfd(r74, 0x0, r74) ioctl$PERF_EVENT_IOC_ENABLE(r75, 0x8912, 0x400200) getsockopt$inet6_IPV6_IPSEC_POLICY(r75, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@empty, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6}}, &(0x7f0000000280)=0xe8) r77 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r77, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r77, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, r78, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$TEAM_CMD_PORT_LIST_GET(r72, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000002c0)={0x60, r73, 0x8, 0x70bd2b, 0x25dfdbfc, {}, [{{0x8, 0x1, r76}, {0x44, 0x2, [{0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r78}}, {0x8}}}]}}]}, 0x60}, 0x1, 0x0, 0x0, 0x6f92a2c59184ece0}, 0x4000) r79 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCFLSH(r79, 0x8910, 0x0) r80 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r80, 0x5423, &(0x7f0000000000)=0x6) ioctl$TCFLSH(r80, 0x8910, 0x0) r81 = dup2(r79, r80) r82 = syz_genetlink_get_family_id$team(&(0x7f00000000c0)='team\x00') socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000380)={0xffffffffffffffff}) r84 = fcntl$dupfd(r83, 0x0, r83) ioctl$PERF_EVENT_IOC_ENABLE(r84, 0x8912, 0x400200) getsockopt$inet6_IPV6_IPSEC_POLICY(r84, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@empty, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6}}, &(0x7f0000000280)=0xe8) r86 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r86, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r86, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, r87, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$TEAM_CMD_PORT_LIST_GET(r81, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000002c0)={0x60, r82, 0x8, 0x70bd2b, 0x25dfdbfc, {}, [{{0x8, 0x1, r85}, {0x44, 0x2, [{0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r87}}, {0x8}}}]}}]}, 0x60}, 0x1, 0x0, 0x0, 0x6f92a2c59184ece0}, 0x4000) r88 = socket(0x0, 0x80002, 0x0) ioctl(r88, 0x1000008912, &(0x7f00000000c0)="080db5055e0bcfe8696071") ioctl$ifreq_SIOCGIFINDEX_team(r88, 0x8933, &(0x7f0000000b40)={'team0\x00', 0x0}) r90 = socket(0x0, 0x80002, 0x0) ioctl(r90, 0x1000008912, &(0x7f00000000c0)="080db5055e0bcfe8696071") getsockopt$PNPIPE_IFINDEX(r90, 0x113, 0x2, &(0x7f0000000c80)=0x0, &(0x7f0000000cc0)=0x4) r92 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCFLSH(r92, 0x8910, 0x0) r93 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r93, 0x5423, &(0x7f0000000000)=0x6) ioctl$TCFLSH(r93, 0x8910, 0x0) r94 = dup2(r92, r93) r95 = syz_genetlink_get_family_id$team(&(0x7f00000000c0)='team\x00') socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000380)={0xffffffffffffffff}) r97 = fcntl$dupfd(r96, 0x0, r96) ioctl$PERF_EVENT_IOC_ENABLE(r97, 0x8912, 0x400200) getsockopt$inet6_IPV6_IPSEC_POLICY(r97, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@empty, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6}}, &(0x7f0000000280)=0xe8) r99 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r99, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r99, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, r100, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$TEAM_CMD_PORT_LIST_GET(r94, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000002c0)={0x60, r95, 0x8, 0x70bd2b, 0x25dfdbfc, {}, [{{0x8, 0x1, r98}, {0x44, 0x2, [{0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r100}}, {0x8}}}]}}]}, 0x60}, 0x1, 0x0, 0x0, 0x6f92a2c59184ece0}, 0x4000) r101 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x2, 0x0) write$cgroup_pid(r101, 0x0, 0x0) r102 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r102, &(0x7f0000000180), 0x10) socketpair(0x8000000000001e, 0x805, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) getpeername$packet(r103, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000100)=0x14) sendmsg$can_bcm(r102, &(0x7f00000002c0)={&(0x7f0000000140)={0x1d, r104}, 0x10, &(0x7f0000000280)={&(0x7f0000000200)={0x0, 0x0, 0x0, {0x0, 0x2710}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "55e19dc0c30616da"}}, 0x48}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r101, 0x8933, &(0x7f00000007c0)={'vxcan1\x00', r104}) sendmsg$TEAM_CMD_OPTIONS_SET(r5, &(0x7f0000001780)={&(0x7f0000000740)={0x10, 0x0, 0x0, 0x48000400}, 0xc, &(0x7f0000001740)={&(0x7f0000000d00)={0xa18, r6, 0x8, 0x70bd25, 0x25dfdbfc, {}, [{{0x8, 0x1, r8}, {0x80, 0x2, [{0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x5}, {0x4}}, {0x8, 0x6, r9}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x5}, {0x8, 0x4, 0x6}}, {0x8, 0x6, r13}}}]}}, {{0x8, 0x1, r20}, {0x13c, 0x2, [{0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x5}, {0x8, 0x4, 0x2}}, {0x8, 0x6, r2}}}, {0x7c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x5}, {0x4c, 0x4, [{0x8, 0x0, 0x0, 0x1}, {0x8, 0x1f, 0x2, 0xeb}, {0x0, 0x9, 0xb0, 0x5}, {0x20, 0xfb, 0x0, 0x8}, {0x2, 0x0, 0x1f, 0x7}, {0xffcb, 0x3, 0x0, 0x80000001}, {0x579, 0x4, 0x7}, {0x5, 0x4, 0x8, 0x4f}, {0x3, 0xff, 0x8, 0xfffffffc}]}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x5}, {0x8, 0x4, 0x6298}}, {0x8, 0x6, r32}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x5}, {0x4}}, {0x8, 0x6, r3}}}]}}, {{0x8, 0x1, r2}, {0x1f4, 0x2, [{0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x5}, {0x8, 0x4, 0x200}}, {0x8, 0x6, r35}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x5}, {0x8, 0x4, 0xd357}}}, {0x44, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x5}, {0x11, 0x4, 'activebackup\x00'}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x5}, {0x8, 0x4, 0x6}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x5}, {0x8, 0x4, r38}}, {0x8}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x5}, {0x8, 0x4, r40}}, {0x8}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x5}, {0x8, 0x4, 0x1}}, {0x8, 0x6, r2}}}]}}, {{0x8, 0x1, r49}, {0x88, 0x2, [{0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x5}, {0x19, 0x4, 'hash_to_port_mapping\x00'}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x5}, {0x8, 0x4, 0x9}}}]}}, {{0x8, 0x1, r50}, {0x74, 0x2, [{0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x5}, {0x8, 0x4, 0x2}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x5}, {0x8, 0x4, 0x80000001}}}]}}, {{0x8, 0x1, r51}, {0x19c, 0x2, [{0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x5}, {0x8, 0x4, 0x1}}}, {0x3c, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x5}, {0xb, 0x4, 'random\x00'}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x5}, {0x8, 0x4, 0x3}}, {0x8, 0x6, r55}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x5}, {0x8, 0x4, 0x2}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x5}, {0x8, 0x4, 0x5}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x5}, {0x8, 0x4, 0xb0ff}}}]}}, {{0x8, 0x1, r57}, {0x7c, 0x2, [{0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x5}, {0x8, 0x4, 0x400}}, {0x8, 0x6, r60}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x5}, {0x8, 0x4, r67}}}]}}, {{0x8, 0x1, r78}, {0x134, 0x2, [{0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x5}, {0x4}}, {0x8, 0x6, r85}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x5}, {0xf, 0x4, 'roundrobin\x00'}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x5}, {0x8, 0x4, 0x5}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x5}, {0x8}}}, {0x44, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x5}, {0x11, 0x4, 'activebackup\x00'}}}]}}, {{0x8, 0x1, r89}, {0x40, 0x2, [{0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x5}, {0x4}}, {0x8, 0x6, r3}}}]}}, {{0x8, 0x1, r3}, {0x17c, 0x2, [{0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x5}, {0x8, 0x4, 0x176}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x5}, {0x8, 0x4, r91}}, {0x8}}}, {0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x5}, {0x19, 0x4, 'hash_to_port_mapping\x00'}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x5}, {0x4}}, {0x8, 0x6, r100}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x5}, {0x8, 0x4, 0x1b}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x5}, {0x8, 0x4, 0x7}}, {0x8, 0x6, r104}}}]}}]}, 0xa18}, 0x1, 0x0, 0x0, 0x2000e040}, 0x4) r105 = socket$alg(0x26, 0x5, 0x0) bind$alg(r105, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f00000005c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000340)={0x30, 0x0, 0x100, 0x70bd28, 0x25dfdbfe, {{}, {}, {0x14, 0x19, {0x5, 0x8, 0x3de7a608, 0x8f9}}}, ["", "", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x20c8868}, 0xc3bb45d10fcfc0ee) r106 = accept4(r105, 0x0, 0x0, 0x0) sendmmsg$inet(r106, &(0x7f0000000680)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f00000000c0)="5831255624c13e4c563f221188b6be66ea", 0x11}], 0x1}}, {{&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000002c0)=[{&(0x7f0000000040)="70a6b8247e016ae2647a2e703fce46c432e37d1dffd332a793d4b9e3617386d153", 0x21}, {&(0x7f0000000200)="09f96fbf33ceccc10976cd10b1411ee57d092fd5b7f95a0f19f01005f110463ccb2c6ebdb74ad7a7da1a2bed233154886db68984d477ebee11ce9a8e3510d401f6f31ea0a7e3ec1cda7b95f7a02b42753eb4cf0bbf5afbc7084f9bc2603aafe5da6cd54e4d647ec9fd641e4241513aaf23481d1f390bbb83dfae56369f4b03367ccd45f0ec4cd929aed127394157e7b3794500c0c5f88930b1ff50bbae1163c26fff28d06028", 0xa6}, {&(0x7f0000000100)="38d6cd435749d519cc39e90540f37c4f5c6bceef6c4ae07105cafc5e25d9bbfce859670b89666cca0857aa0c2abd8722a9db0caad3905e3ff682", 0x3a}, {&(0x7f0000000140)="d71206abd00e3c0a7e2440673da6a9fc2c1255a9b136bc982a3dc2ac21ef167250c176acfbd4d13abd86b018e8b1357842d8dc93e53f6b542e9633e1db8672e8", 0x40}], 0x4}}, {{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000380)="df304451b990364b1c6ff9c843eb47125c0a16565b5efbc0494b453f9863364196a743b5d226d34b2293f3b4b8dde4b8434172dec0902f0e03c2893c2bfd5f662eefc2902850a0221d55", 0x200003ca}, {&(0x7f0000000400)}], 0x2, &(0x7f0000000540)=[@ip_tos_u8={{0x11}}, @ip_ttl={{0x14}}, @ip_ttl={{0x14}}, @ip_tos_u8={{0x11}}], 0x60}}], 0x3, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, &(0x7f0000000600)={{0x5, 0x6}, {0x1, 0x3}, 0x9, 0x4, 0x2}) socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r108 = socket$inet_udplite(0x2, 0x2, 0x88) r109 = fcntl$dupfd(r107, 0x0, r108) ioctl$PERF_EVENT_IOC_ENABLE(r109, 0x8912, 0x400200) ioctl$TUNSETVNETBE(r109, 0x400454de, &(0x7f0000000080)) setsockopt$inet6_dccp_int(r106, 0x21, 0x3, &(0x7f0000000040)=0x1, 0x4) 09:33:44 executing program 2: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f00000015c0)=ANY=[@ANYBLOB='%'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0xa80, 0x0) ioctl$DRM_IOCTL_MARK_BUFS(r0, 0x40206417, &(0x7f0000000040)={0x800, 0x0, 0x7, 0x77a6, 0x0, 0x81}) 09:33:44 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f0000000340)=ANY=[@ANYBLOB="b7020000f7ffffffbfa70000000000002402000020feffff7a0af0fff8ffffff69a4f0ff00000000b70600000018d1fe2d6405000000000075040000000000000704000000000000b7040000100000206a0700fe00000000850000002f000000b70000000a0000009500000000000000e535f8a62fc2868f0399d909a63796c113a80c19aab9d607000000b6cd483be3f0d3253730e711f5969f62c28b22756bedf3cf393d14c46cc4f79fd2b316da4f0de8163f6242fa732300000637c48468766af540439fce41f144631ac262dcae18c3d1a1fbe96dd87235b44174f7c0343185089a0f119e31975e551558055dc2dc"], &(0x7f0000000280)='GPL\x00'}, 0x48) r1 = socket$kcm(0x11, 0x8000000002, 0x300) socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000540)=r0, 0x4) syz_emit_ethernet(0x3e, &(0x7f0000000000)={@broadcast, @random="96c1e9574b31", @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x2100, 0x0, 0x1, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @local}, @time_exceeded={0xb, 0x0, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local, @multicast2}}}}}}, 0x0) 09:33:44 executing program 3: mkdir(0x0, 0x0) mount(&(0x7f0000000080)=ANY=[@ANYBLOB='%U'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:33:44 executing program 5 (fault-call:1 fault-nth:4): mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="2398c593a2303d8df8dc1623f67a060de466e34712df232157116a41dc2b323a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1359.714942][ T2078] FAULT_INJECTION: forcing a failure. [ 1359.714942][ T2078] name failslab, interval 1, probability 0, space 0, times 0 [ 1359.727933][ T2078] CPU: 0 PID: 2078 Comm: syz-executor.5 Not tainted 5.5.0-rc5-syzkaller #0 [ 1359.736540][ T2078] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1359.746614][ T2078] Call Trace: [ 1359.750008][ T2078] dump_stack+0x197/0x210 [ 1359.754363][ T2078] should_fail.cold+0xa/0x15 [ 1359.756964][ T2083] kAFS: unparsable volume name [ 1359.759588][ T2078] ? fault_create_debugfs_attr+0x180/0x180 [ 1359.759614][ T2078] ? ___might_sleep+0x163/0x2c0 [ 1359.759636][ T2078] __should_failslab+0x121/0x190 [ 1359.759659][ T2078] should_failslab+0x9/0x14 [ 1359.784584][ T2078] __kmalloc+0x2e0/0x770 [ 1359.788816][ T2078] ? __kmalloc+0x608/0x770 [ 1359.793240][ T2078] ? tomoyo_realpath_from_path+0xc5/0x660 [ 1359.798982][ T2078] tomoyo_realpath_from_path+0xc5/0x660 [ 1359.804543][ T2078] tomoyo_mount_acl+0x149/0x840 [ 1359.809404][ T2078] ? debug_check_no_obj_freed+0x20a/0x43f [ 1359.815140][ T2078] ? __kasan_check_read+0x11/0x20 [ 1359.820158][ T2078] ? mark_lock+0xc2/0x1220 [ 1359.824583][ T2078] ? tomoyo_check_mount_acl+0x1b0/0x1b0 [ 1359.830145][ T2078] ? __kasan_check_read+0x11/0x20 [ 1359.835194][ T2078] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1359.841447][ T2078] ? debug_smp_processor_id+0x33/0x18a [ 1359.846917][ T2078] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 1359.853082][ T2078] ? lock_acquire+0x190/0x410 [ 1359.857753][ T2078] ? tomoyo_mount_permission+0x10a/0x400 [ 1359.863399][ T2078] tomoyo_mount_permission+0x16a/0x400 [ 1359.868850][ T2078] ? tomoyo_mount_permission+0x10a/0x400 [ 1359.874472][ T2078] ? tomoyo_mount_acl+0x840/0x840 [ 1359.879495][ T2078] ? strncpy_from_user+0x2b4/0x400 [ 1359.884643][ T2078] tomoyo_sb_mount+0x35/0x40 [ 1359.889228][ T2078] security_sb_mount+0x87/0xd0 [ 1359.894005][ T2078] do_mount+0x1d4/0x1b50 [ 1359.898266][ T2078] ? copy_mount_string+0x40/0x40 [ 1359.903200][ T2078] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1359.909432][ T2078] ? _copy_from_user+0x12c/0x1a0 [ 1359.914362][ T2078] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1359.920592][ T2078] ? copy_mount_options+0x2e8/0x3f0 [ 1359.925797][ T2078] __x64_sys_mount+0x192/0x230 [ 1359.930556][ T2078] do_syscall_64+0xfa/0x790 [ 1359.935045][ T2078] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1359.940938][ T2078] RIP: 0033:0x45af49 [ 1359.944825][ T2078] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1359.964410][ T2078] RSP: 002b:00007f2c1e821c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1359.972820][ T2078] RAX: ffffffffffffffda RBX: 00007f2c1e821c90 RCX: 000000000045af49 [ 1359.980796][ T2078] RDX: 0000000020000180 RSI: 0000000020000140 RDI: 0000000020000240 [ 1359.988774][ T2078] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1359.996737][ T2078] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f2c1e8226d4 [ 1360.004696][ T2078] R13: 00000000004c8583 R14: 00000000004e06a8 R15: 0000000000000003 09:33:45 executing program 5 (fault-call:1 fault-nth:5): mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="2398c593a2303d8df8dc1623f67a060de466e34712df232157116a41dc2b323a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1360.019327][ T2078] ERROR: Out of memory at tomoyo_realpath_from_path. 09:33:45 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f00000015c0)=ANY=[], &(0x7f0000000140)='./file0\x00', &(0x7f0000000000)='romfs\x00', 0x0, 0x0) 09:33:45 executing program 3: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:33:45 executing program 1: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000080)=ANY=[@ANYBLOB='#U'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x400400, 0x0) 09:33:45 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f0000000340)=ANY=[@ANYBLOB="b7020000f7ffffffbfa70000000000002402000020feffff7a0af0fff8ffffff69a4f0ff00000000b70600000018d1fe2d6405000000000075040000000000000704000000000000b7040000100000206a0700fe00000000850000002f000000b70000000a0000009500000000000000e535f8a62fc2868f0399d909a63796c113a80c19aab9d607000000b6cd483be3f0d3253730e711f5969f62c28b22756bedf3cf393d14c46cc4f79fd2b316da4f0de8163f6242fa732300000637c48468766af540439fce41f144631ac262dcae18c3d1a1fbe96dd87235b44174f7c0343185089a0f119e31975e551558055dc2dc"], &(0x7f0000000280)='GPL\x00'}, 0x48) r1 = socket$kcm(0x11, 0x8000000002, 0x300) socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000540)=r0, 0x4) syz_emit_ethernet(0x3e, &(0x7f0000000000)={@broadcast, @random="96c1e9574b31", @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x2f00, 0x0, 0x1, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @local}, @time_exceeded={0xb, 0x0, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local, @multicast2}}}}}}, 0x0) 09:33:45 executing program 2: ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, &(0x7f0000000000)) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f00000015c0)=ANY=[@ANYBLOB='%'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:33:45 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f00000015c0)=ANY=[@ANYBLOB='3'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) ioctl$KVM_SET_LAPIC(r0, 0x4400ae8f, &(0x7f0000000840)={"9aff0290d013182185ca7be4508d05b1d2f93686efef000444e7836d70ceac9e0a20a628200d3b16038206c33c1394e68ce09bf1be2166a12ab547e2587c179e4aabd69bcd7e5d9adee1f394126c98405871790b17b96e356fab1bf03219fc08dfe90d4905df2bf960247148a802247f14714760e290a2781b6f3866cc7c717721fb93a2edc3c69ba04918b6e91c6fabc82581f5ce1b1f589fcbcb7a430a1f68a501626b2a3ec82e37608eedd16c7f3e252ffcf623a024ebc1cba5d81d54e3921e0a3b5e510626bd0d7ddfabbc0c81b8f32298e84fed1132f8b6437ae38c37de8d68e1279d304c3064ee3adf08a6c5e54a0970675b2f53a9b11a231db6abe055fb33a22a330afcdd144fd0c08709a41b2c42e7aa48e5a1891ad3bceaa8dc03dcddb5955d998a8a8df405963114d1b94a70b5ce174c705d9dc5e19dce29adbf9e7791539cf1ddf48fcb048f63d7c6e1b506c19209a4626299385be6589b63080e178cc0fadd56217cd60c4f3863c661fab98b338ae7f89e90b6b0e4e3675f0c6f77339fdfb1db5ddbddd8fe58237372be9aad1b6babb232ff37c92ac87ba00278f8c72892f963c57cce0fa6963aff4d17c297e8cd4126a656c8e9a95641626fc5b67ce2225a9821257be710429d9ef224937c3dff58bd5224248412d7ccd8d1f349935162ca8b4d181fa5ecb57a93f568cc72ec11f0142751c8e2052bd5d38bf01221e75a18f50a1f5bc1c533be27f585c40c4f9ffcc047a5aba408a83433d00fe469970331c727a2d4673e665b4c2bbb6a7ceb5322182442429cd0a13ae8f86d7c197a734b8a5b3761db09c384e83ad3506da8b1abe6885bdf2374b3edfd8d7bb40852631cbd83e864b34037e5a015da074d12afeade5b65645a7ac0070f646b1a60b35398230fa112bc7320f7fc46995012245d01187d879025bb56d43a11bc6a7148e9e9084d11e02a5e3c3514e15be971d33f4c67993427ea00d8af36072d00cfe0edad6c1f077a3a31525866e18337feddc5b3fc103d94b34eddbf0e151320271f2ac31e58f36d3c3bfbf33c839a19cb88207de9e4ede4eb202fc09afc9a692fdd174fb9425eb156cfd6985412b11f0e170afa3de1cbeb019ae287a1b9148f006aa1a5227e54238b50c4b5b6ecc3327c51e6f142f91f5918e222f2932ab9244ba389846f4889317d7bd948ffcd4276ed81d5a39e340d5185f9bf6e643d3507f398dbbca8c39daaafe3fcbc9119babe9cb29a49bd479ebb209de813e87df3909dabab3a746b4f6bfb8b8f91c059d520e97700c3f5c1d482b08b9dceb69abd2ba3af163bf6a8488b2088921db6f0177efd7aed4b4ca2856cc782f9a03d22f8e7a96bb1966de470417722639e1131c0b8335ac8e64bfcd5b75e1e99b265d658b6d6de8fa110d7ee16920b715031cdb0c13c92cadcf51e90bd9705b69cf6b47b"}) sendmmsg$inet(r1, &(0x7f0000000680)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f00000000c0)="5831255624c13e4c563f221188b6be66ea", 0x11}], 0x1}}, {{&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000002c0)=[{&(0x7f0000000040)="70a6b8247e016ae2647a2e703fce46c432e37d1dffd332a793d4b9e3617386d153", 0x21}, {&(0x7f0000000200)="09f96fbf33ceccc10976cd10b1411ee57d092fd5b7f95a0f19f01005f110463ccb2c6ebdb74ad7a7da1a2bed233154886db68984d477ebee11ce9a8e3510d401f6f31ea0a7e3ec1cda7b95f7a02b42753eb4cf0bbf5afbc7084f9bc2603aafe5da6cd54e4d647ec9fd641e4241513aaf23481d1f390bbb83dfae56369f4b03367ccd45f0ec4cd929aed127394157e7b3794500c0c5f88930b1ff50bbae1163c26fff28d06028", 0xa6}, {&(0x7f0000000100)="38d6cd435749d519cc39e90540f37c4f5c6bceef6c4ae07105cafc5e25d9bbfce859670b89666cca0857aa0c2abd8722a9db0caad3905e3ff682", 0x3a}, {&(0x7f0000000140)="d71206abd00e3c0a7e2440673da6a9fc2c1255a9b136bc982a3dc2ac21ef167250c176acfbd4d13abd86b018e8b1357842d8dc93e53f6b542e9633e1db8672e8", 0x40}], 0x4}}, {{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000380)="df304451b990364b1c6ff9c843eb47125c0a16565b5efbc0494b453f9863364196a743b5d226d34b2293f3b4b8dde4b8434172dec0902f0e03c2893c2bfd5f662eefc2902850a0221d55", 0x200003ca}, {&(0x7f0000000400)}], 0x2, &(0x7f0000000540)=[@ip_tos_u8={{0x11}}, @ip_ttl={{0x14}}, @ip_ttl={{0x14}}, @ip_tos_u8={{0x11}}], 0x60}}], 0x3, 0x0) getpeername$unix(r1, &(0x7f0000000000), &(0x7f0000000080)=0x6e) [ 1360.265500][ T2392] FAULT_INJECTION: forcing a failure. [ 1360.265500][ T2392] name failslab, interval 1, probability 0, space 0, times 0 [ 1360.331211][ T2392] CPU: 1 PID: 2392 Comm: syz-executor.5 Not tainted 5.5.0-rc5-syzkaller #0 [ 1360.339846][ T2392] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1360.349912][ T2392] Call Trace: [ 1360.353209][ T2392] dump_stack+0x197/0x210 [ 1360.357546][ T2392] should_fail.cold+0xa/0x15 [ 1360.362129][ T2392] ? fault_create_debugfs_attr+0x180/0x180 [ 1360.367923][ T2392] ? ___might_sleep+0x163/0x2c0 [ 1360.372764][ T2392] __should_failslab+0x121/0x190 [ 1360.377688][ T2392] should_failslab+0x9/0x14 [ 1360.382176][ T2392] __kmalloc+0x2e0/0x770 [ 1360.386490][ T2392] ? __kmalloc+0x608/0x770 [ 1360.390898][ T2392] ? tomoyo_realpath_from_path+0xc5/0x660 [ 1360.397648][ T2392] tomoyo_realpath_from_path+0xc5/0x660 [ 1360.403186][ T2392] tomoyo_mount_acl+0x149/0x840 [ 1360.408023][ T2392] ? debug_check_no_obj_freed+0x20a/0x43f [ 1360.414441][ T2392] ? __kasan_check_read+0x11/0x20 [ 1360.419451][ T2392] ? mark_lock+0xc2/0x1220 [ 1360.423857][ T2392] ? tomoyo_check_mount_acl+0x1b0/0x1b0 [ 1360.429391][ T2392] ? __kasan_check_read+0x11/0x20 [ 1360.434411][ T2392] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1360.440636][ T2392] ? debug_smp_processor_id+0x33/0x18a [ 1360.446081][ T2392] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 1360.452242][ T2392] ? lock_acquire+0x190/0x410 [ 1360.458044][ T2392] ? tomoyo_mount_permission+0x10a/0x400 [ 1360.463815][ T2392] tomoyo_mount_permission+0x16a/0x400 [ 1360.469269][ T2392] ? tomoyo_mount_permission+0x10a/0x400 [ 1360.474936][ T2392] ? tomoyo_mount_acl+0x840/0x840 [ 1360.479967][ T2392] ? strncpy_from_user+0x2b4/0x400 [ 1360.485082][ T2392] tomoyo_sb_mount+0x35/0x40 [ 1360.489664][ T2392] security_sb_mount+0x87/0xd0 [ 1360.494421][ T2392] do_mount+0x1d4/0x1b50 [ 1360.498656][ T2392] ? copy_mount_string+0x40/0x40 [ 1360.503581][ T2392] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1360.509894][ T2392] ? _copy_from_user+0x12c/0x1a0 [ 1360.514822][ T2392] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1360.521055][ T2392] ? copy_mount_options+0x2e8/0x3f0 [ 1360.526247][ T2392] __x64_sys_mount+0x192/0x230 [ 1360.531008][ T2392] do_syscall_64+0xfa/0x790 [ 1360.535501][ T2392] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1360.541382][ T2392] RIP: 0033:0x45af49 [ 1360.545266][ T2392] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1360.565806][ T2392] RSP: 002b:00007f2c1e821c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1360.574200][ T2392] RAX: ffffffffffffffda RBX: 00007f2c1e821c90 RCX: 000000000045af49 09:33:45 executing program 3: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1360.582153][ T2392] RDX: 0000000020000180 RSI: 0000000020000140 RDI: 0000000020000240 [ 1360.590125][ T2392] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1360.598214][ T2392] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f2c1e8226d4 [ 1360.606283][ T2392] R13: 00000000004c8583 R14: 00000000004e06a8 R15: 0000000000000003 [ 1360.693418][ T2502] kAFS: unparsable volume name [ 1360.694843][ T2503] kAFS: unparsable volume name [ 1360.737440][ T2503] kAFS: unparsable volume name 09:33:45 executing program 2: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) bind(r0, &(0x7f0000004540)=@l2tp={0x2, 0x0, @rand_addr=0x10001, 0x3}, 0x80) mount(&(0x7f00000015c0)=ANY=[@ANYBLOB], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) r1 = socket$nl_crypto(0x10, 0x3, 0x15) r2 = dup2(r1, 0xffffffffffffffff) bind(r2, &(0x7f00000045c0)=@ipx={0x4, 0x3f, 0x1, "12f01d4c4399"}, 0x80) recvmmsg(r1, &(0x7f00000043c0)=[{{&(0x7f0000000000)=@nfc, 0x80, &(0x7f0000002600)=[{&(0x7f0000000080)=""/176, 0xb0}, {&(0x7f0000000240)=""/67, 0x43}, {&(0x7f00000002c0)=""/225, 0xe1}, {&(0x7f00000003c0)=""/4096, 0x1000}, {&(0x7f00000001c0)=""/12, 0xc}, {&(0x7f00000013c0)=""/214, 0xd6}, {&(0x7f0000001600)=""/4096, 0x1000}, {&(0x7f00000014c0)=""/178, 0xb2}], 0x8, &(0x7f0000002680)=""/216, 0xd8}, 0x6}, {{&(0x7f0000002780)=@isdn, 0x80, &(0x7f0000001580)=[{&(0x7f0000002800)=""/83, 0x53}], 0x1}, 0x800}, {{&(0x7f0000002880)=@rc, 0x80, &(0x7f0000003d40)=[{&(0x7f0000002900)=""/190, 0xbe}, {&(0x7f00000029c0)}, {&(0x7f0000002a00)=""/206, 0xce}, {&(0x7f0000002b00)=""/132, 0x84}, {&(0x7f0000002bc0)=""/88, 0x58}, {&(0x7f0000002c40)=""/185, 0xb9}, {&(0x7f0000002d00)}, {&(0x7f0000002d40)=""/4096, 0x1000}], 0x8, &(0x7f0000003dc0)}, 0x1}, {{&(0x7f0000003e00)=@in6={0xa, 0x0, 0x0, @remote}, 0x80, &(0x7f0000004080)=[{&(0x7f0000003e80)=""/202, 0xca}, {&(0x7f0000003f80)=""/30, 0x1e}, {&(0x7f0000003fc0)=""/170, 0xaa}], 0x3, &(0x7f00000040c0)=""/165, 0xa5}, 0x81}, {{&(0x7f0000004180)=@phonet, 0x80, &(0x7f0000004280)=[{&(0x7f0000004200)=""/125, 0x7d}], 0x1, &(0x7f00000042c0)=""/205, 0xcd}, 0x5}], 0x5, 0x40010000, &(0x7f0000004500)={0x0, 0x989680}) 09:33:45 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f0000000340)=ANY=[@ANYBLOB="b7020000f7ffffffbfa70000000000002402000020feffff7a0af0fff8ffffff69a4f0ff00000000b70600000018d1fe2d6405000000000075040000000000000704000000000000b7040000100000206a0700fe00000000850000002f000000b70000000a0000009500000000000000e535f8a62fc2868f0399d909a63796c113a80c19aab9d607000000b6cd483be3f0d3253730e711f5969f62c28b22756bedf3cf393d14c46cc4f79fd2b316da4f0de8163f6242fa732300000637c48468766af540439fce41f144631ac262dcae18c3d1a1fbe96dd87235b44174f7c0343185089a0f119e31975e551558055dc2dc"], &(0x7f0000000280)='GPL\x00'}, 0x48) r1 = socket$kcm(0x11, 0x8000000002, 0x300) socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000540)=r0, 0x4) syz_emit_ethernet(0x3e, &(0x7f0000000000)={@broadcast, @random="96c1e9574b31", @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x3000, 0x0, 0x1, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @local}, @time_exceeded={0xb, 0x0, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local, @multicast2}}}}}}, 0x0) 09:33:46 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) r0 = socket(0x0, 0x80002, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="080db5055e0bcfe8696071") mount(&(0x7f00000001c0)=ANY=[@ANYRES16=r0], &(0x7f0000000140)='./file0\x00', &(0x7f0000000240)='bdev\x00', 0x0, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x381040, 0x0) accept4$unix(r1, &(0x7f0000000040)=@abs, &(0x7f00000000c0)=0x6e, 0x800) 09:33:46 executing program 5 (fault-call:1 fault-nth:6): mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="2398c593a2303d8df8dc1623f67a060de466e34712df232157116a41dc2b323a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1360.843071][ T2392] ERROR: Out of memory at tomoyo_realpath_from_path. [ 1360.856604][ T2720] kAFS: Bad value for 'source' 09:33:46 executing program 3: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1360.949215][ T2729] FAULT_INJECTION: forcing a failure. [ 1360.949215][ T2729] name failslab, interval 1, probability 0, space 0, times 0 [ 1360.964129][ T2729] CPU: 0 PID: 2729 Comm: syz-executor.5 Not tainted 5.5.0-rc5-syzkaller #0 [ 1360.972741][ T2729] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1360.982813][ T2729] Call Trace: [ 1360.986104][ T2729] dump_stack+0x197/0x210 [ 1360.990447][ T2729] should_fail.cold+0xa/0x15 [ 1360.995025][ T2729] ? fault_create_debugfs_attr+0x180/0x180 [ 1361.000821][ T2729] ? ___might_sleep+0x163/0x2c0 [ 1361.005663][ T2729] __should_failslab+0x121/0x190 [ 1361.010611][ T2729] should_failslab+0x9/0x14 [ 1361.015103][ T2729] __kmalloc+0x2e0/0x770 [ 1361.019334][ T2729] ? tomoyo_encode2.part.0+0xf5/0x400 [ 1361.024692][ T2729] tomoyo_encode2.part.0+0xf5/0x400 [ 1361.029902][ T2729] ? __get_fs_type+0x9a/0xd0 [ 1361.034753][ T2729] tomoyo_encode+0x2b/0x50 [ 1361.039198][ T2729] tomoyo_mount_acl+0x320/0x840 [ 1361.044056][ T2729] ? debug_check_no_obj_freed+0x20a/0x43f [ 1361.049776][ T2729] ? mark_lock+0xc2/0x1220 [ 1361.054205][ T2729] ? tomoyo_check_mount_acl+0x1b0/0x1b0 [ 1361.059768][ T2729] ? __kasan_check_read+0x11/0x20 [ 1361.064791][ T2729] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1361.071023][ T2729] ? debug_smp_processor_id+0x33/0x18a [ 1361.076492][ T2729] ? lock_acquire+0x190/0x410 [ 1361.081160][ T2729] ? tomoyo_mount_permission+0x10a/0x400 [ 1361.086787][ T2729] tomoyo_mount_permission+0x16a/0x400 [ 1361.092236][ T2729] ? tomoyo_mount_permission+0x10a/0x400 [ 1361.097855][ T2729] ? tomoyo_mount_acl+0x840/0x840 [ 1361.102879][ T2729] ? strncpy_from_user+0x2b4/0x400 [ 1361.108069][ T2729] tomoyo_sb_mount+0x35/0x40 [ 1361.112649][ T2729] security_sb_mount+0x87/0xd0 [ 1361.117404][ T2729] do_mount+0x1d4/0x1b50 [ 1361.121641][ T2729] ? copy_mount_string+0x40/0x40 [ 1361.126675][ T2729] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1361.132912][ T2729] ? _copy_from_user+0x12c/0x1a0 [ 1361.137843][ T2729] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1361.144099][ T2729] ? copy_mount_options+0x2e8/0x3f0 [ 1361.149297][ T2729] __x64_sys_mount+0x192/0x230 [ 1361.154074][ T2729] do_syscall_64+0xfa/0x790 [ 1361.158574][ T2729] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1361.164470][ T2729] RIP: 0033:0x45af49 [ 1361.168353][ T2729] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1361.188202][ T2729] RSP: 002b:00007f2c1e821c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1361.196706][ T2729] RAX: ffffffffffffffda RBX: 00007f2c1e821c90 RCX: 000000000045af49 [ 1361.204810][ T2729] RDX: 0000000020000180 RSI: 0000000020000140 RDI: 0000000020000240 [ 1361.212788][ T2729] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1361.220767][ T2729] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f2c1e8226d4 [ 1361.228762][ T2729] R13: 00000000004c8583 R14: 00000000004e06a8 R15: 0000000000000003 09:33:46 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f0000000340)=ANY=[@ANYBLOB="b7020000f7ffffffbfa70000000000002402000020feffff7a0af0fff8ffffff69a4f0ff00000000b70600000018d1fe2d6405000000000075040000000000000704000000000000b7040000100000206a0700fe00000000850000002f000000b70000000a0000009500000000000000e535f8a62fc2868f0399d909a63796c113a80c19aab9d607000000b6cd483be3f0d3253730e711f5969f62c28b22756bedf3cf393d14c46cc4f79fd2b316da4f0de8163f6242fa732300000637c48468766af540439fce41f144631ac262dcae18c3d1a1fbe96dd87235b44174f7c0343185089a0f119e31975e551558055dc2dc"], &(0x7f0000000280)='GPL\x00'}, 0x48) r1 = socket$kcm(0x11, 0x8000000002, 0x300) socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000540)=r0, 0x4) syz_emit_ethernet(0x3e, &(0x7f0000000000)={@broadcast, @random="96c1e9574b31", @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x3a00, 0x0, 0x1, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @local}, @time_exceeded={0xb, 0x0, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local, @multicast2}}}}}}, 0x0) 09:33:46 executing program 5 (fault-call:1 fault-nth:7): mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="2398c593a2303d8df8dc1623f67a060de466e34712df232157116a41dc2b323a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:33:46 executing program 1: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000080)=ANY=[@ANYBLOB='#U'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0xf0ffff, 0x0) 09:33:46 executing program 3: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000080)=ANY=[], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:33:46 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f00000015c0)=ANY=[@ANYBLOB='#'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x262041, 0x9) accept$phonet_pipe(r0, &(0x7f0000000040), &(0x7f0000000080)=0x10) [ 1361.537206][ T3055] FAULT_INJECTION: forcing a failure. [ 1361.537206][ T3055] name failslab, interval 1, probability 0, space 0, times 0 [ 1361.543010][ T3058] kAFS: unparsable volume name [ 1361.561773][ T3055] CPU: 1 PID: 3055 Comm: syz-executor.5 Not tainted 5.5.0-rc5-syzkaller #0 [ 1361.563872][ T3057] kAFS: Bad value for 'source' [ 1361.570407][ T3055] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1361.570414][ T3055] Call Trace: [ 1361.570439][ T3055] dump_stack+0x197/0x210 [ 1361.570461][ T3055] should_fail.cold+0xa/0x15 [ 1361.570482][ T3055] ? fault_create_debugfs_attr+0x180/0x180 [ 1361.570501][ T3055] ? ___might_sleep+0x163/0x2c0 [ 1361.570525][ T3055] __should_failslab+0x121/0x190 [ 1361.579527][ T3058] kAFS: unparsable volume name [ 1361.585348][ T3055] should_failslab+0x9/0x14 [ 1361.585363][ T3055] __kmalloc+0x2e0/0x770 [ 1361.585389][ T3055] ? tomoyo_encode2.part.0+0xf5/0x400 [ 1361.585409][ T3055] tomoyo_encode2.part.0+0xf5/0x400 09:33:46 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) setxattr$trusted_overlay_upper(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f0000000240)={0x0, 0xfb, 0x9d, 0x4, 0x6, "6293d4dd817f7d7e8554210331d31e72", "4c6624a988e06da9b480ce028ce1ed8eb28d3ff6d3a29edd52ac56eaf9bb3be4e2d3d6fd74ee1a489342553b4d6c52caef5781c8453332b939cfebb35c890eefbc17816c3cf0955e55fcba3b06886f34c90f73578b802de0c035d61f024a7c5da94dad583f8b28f1a1a955a31535ac14b1de4556275d51226a5d92edf74608347615554a4a0c4831"}, 0x9d, 0x2) mount(&(0x7f0000000000)=ANY=[@ANYBLOB="2866568e001f282496a1f20319ede72012b2879d157d8b75ca336d0b1c362ddcc2ad879da8dd530d7f6518f561da899f20344371d62fedfd08a110f4c1394a54166ddf0a00d34a2ce5eece4b0301804db57a41c2146ad949000000000000000000"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1361.585430][ T3055] ? __get_fs_type+0x9a/0xd0 [ 1361.641754][ T3055] tomoyo_encode+0x2b/0x50 [ 1361.646192][ T3055] tomoyo_mount_acl+0x320/0x840 [ 1361.651061][ T3055] ? debug_check_no_obj_freed+0x20a/0x43f [ 1361.653639][ T3162] kAFS: unparsable volume name [ 1361.656796][ T3055] ? mark_lock+0xc2/0x1220 [ 1361.656818][ T3055] ? tomoyo_check_mount_acl+0x1b0/0x1b0 [ 1361.656842][ T3055] ? __kasan_check_read+0x11/0x20 [ 1361.676602][ T3055] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 09:33:46 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000000)=ANY=[@ANYBLOB="3ea9a3e19cf06887bc2f3d03"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1361.682871][ T3055] ? debug_smp_processor_id+0x33/0x18a [ 1361.688366][ T3055] ? lock_acquire+0x190/0x410 [ 1361.693202][ T3055] ? tomoyo_mount_permission+0x10a/0x400 [ 1361.698863][ T3055] tomoyo_mount_permission+0x16a/0x400 [ 1361.704338][ T3055] ? tomoyo_mount_permission+0x10a/0x400 [ 1361.709992][ T3055] ? tomoyo_mount_acl+0x840/0x840 [ 1361.715047][ T3055] ? strncpy_from_user+0x2b4/0x400 [ 1361.720179][ T3055] tomoyo_sb_mount+0x35/0x40 [ 1361.724790][ T3055] security_sb_mount+0x87/0xd0 [ 1361.730712][ T3055] do_mount+0x1d4/0x1b50 [ 1361.734976][ T3055] ? copy_mount_string+0x40/0x40 [ 1361.735445][ T3265] kAFS: unparsable volume name [ 1361.739922][ T3055] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1361.739940][ T3055] ? _copy_from_user+0x12c/0x1a0 [ 1361.739956][ T3055] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1361.739979][ T3055] ? copy_mount_options+0x2e8/0x3f0 [ 1361.767315][ T3055] __x64_sys_mount+0x192/0x230 [ 1361.772102][ T3055] do_syscall_64+0xfa/0x790 [ 1361.776632][ T3055] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1361.782523][ T3055] RIP: 0033:0x45af49 [ 1361.782539][ T3055] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1361.782547][ T3055] RSP: 002b:00007f2c1e821c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1361.782560][ T3055] RAX: ffffffffffffffda RBX: 00007f2c1e821c90 RCX: 000000000045af49 [ 1361.782575][ T3055] RDX: 0000000020000180 RSI: 0000000020000140 RDI: 0000000020000240 [ 1361.806758][ T3055] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1361.806767][ T3055] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f2c1e8226d4 [ 1361.806774][ T3055] R13: 00000000004c8583 R14: 00000000004e06a8 R15: 0000000000000003 09:33:47 executing program 2: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) add_key(&(0x7f0000000000)='blacklist\x00', &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000080)="7918f7a9b4a8db5a35884a535f", 0xd, 0x0) mount(&(0x7f00000015c0)=ANY=[@ANYBLOB='%'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c81", 0x10) sendmmsg(r0, &(0x7f0000001900)=[{{&(0x7f00000000c0)=@pppoe={0x18, 0x0, {0x4, @remote, 'vxcan1\x00'}}, 0x80, &(0x7f0000000340)=[{&(0x7f00000001c0)="164dd98515831fd0448b6d63a26c2aef2438780067427cf7b6a6e872c921f2c29207baf45e93a16367b2e2fc3bcb473d51786fe186d905ae72", 0x39}, {&(0x7f0000000240)="d61254169be8bcd6adb7444aaac61ca0e60df0d36dcbe6a880451867ba41cb3407d62d3a2eb99c0d88dcd2881279e6c99ebe0aa1d84adf3bfd2db3ecd0baa0476210bdddf0387c67b002df15eb84b04a4e42e28ac792df3b3fd9f5bda4278fd514461839c3dab97216b1e2e357c5bc1a0b08cb58ffa7a51d7225a032d41894f0bd43ba78f5cde105b90c92b755584ba8e9e9150abfb2f018e0e3eb73c3dd2b155b38f2de3d2e7fbeb33bd0", 0xab}, {&(0x7f0000000300)="763f0d6579df78a88a4c165aee84e94f4caa67df", 0x14}], 0x3, &(0x7f0000000380)=[{0x48, 0x5ab41de5b8a29b10, 0x7fff, "bb0d0e6e4ccebd339b689b8244f9e587046fcb3952fa4663fe2954851d4694d1923d916ba674d61a4d280c191397cfdf63532f1485b6"}, {0xa8, 0x100, 0x940b, "87704a54220a59f8a632fceed9ab7eb92db825ff93b361028bbd13256bd6e6fa1bc8e81b65542db842cc2c81afca60d3f58ab20811335c9c549f3d572a7b6f0f38b610a10c43239e921713e68c4952aa1db0b72bc67f365bd547ecde167f8e8105882ebd2338f6dbd07f626d4c812c0f568905df20e0b05121c9dbe126ccec4294ee540fc756a16a73dd3f180e8185657ad7"}, {0x38, 0x108, 0x4, "6f22809bbcdf611a105df770f48a6c8b010f5b7472e44228eb6ac931cc33aaf3848bf4ede0"}], 0x128}}, {{&(0x7f00000004c0)=@l2tp6={0xa, 0x0, 0x177, @ipv4={[], [], @remote}, 0x12f, 0x1}, 0x80, &(0x7f0000000600)=[{&(0x7f0000000540)="26ef0cbc1b786419e5cf90b05d4b868a83788a266d19444674e0e1becb47e9cce0fa41fda0f31dd26e01f78bf57ce4a70b8f1a98ae77bc9a125ceb1311237f2070341db63a9cd4cbacb0d5b77391db59af694b", 0x53}, {&(0x7f00000005c0)="29f40d136ad3273a4259ce8f617bfe80087267f454f3123745bdf0fa5b4cd25fc385a008e654582ffb2a63c91fe5084b6a62ab74260c", 0x36}], 0x2, &(0x7f0000000640)=[{0xa8, 0x101, 0xa2ca, "60680c843df2afda81f8b43286b8d15e4853f297cd69fa4c06ebb9b6c0c9dfa060c0a454cc34cfe926b357877beae94adbf3b16dc24572d61a127bfc55c58aa9b579e7978474fc04febaef0fed22e8526cf9a6ede9727b54cac94c5602d9938bb3616ff4593cbaed9f50cab327705fa8e2f73e8ef765d7d192b8727f5faf0959e8979de572fd7375bac3ab2638ba2681f1479db29cb1bf"}, {0xc8, 0x108, 0x1ff, "653f2b823330bcb68099615bde4b757a66d333460abfb91a5f7e421249df37502fc9b6748f314ac0c3ed76bd023bc0f8f47dc4453395d8eb30db9cf752a4bfb507441c65a6ca05f5818fe191d3125db450635dd2460ad72876d0e0fdf3ca3764f2fdc00bfd55608ba71038cfa66a55f2be8d4e250c76d598f189b133406e810a0239daac1eea9903cc9c4d13324b7e715c7f93b40545fbfa4365926a78cce17cdf2be67d68b1ea91de6aa246b7b80c03ec77a5"}, {0x110, 0x228, 0x0, "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"}, {0xb8, 0x0, 0x3, "0a510a83c27238298698b565f7fdcf0878f467564eb1bbd99582061aee05f94b87673065c3e26ed3f50c98e51bdfdce2bc8398a4940973deb4f200540a6365f79795e479020eb21416bf86c953ecfaa9dca54c9a9c0933b1986890b8173c3e0f6d5f18b700bda78aa72d93cf4a61e077e158fe99f98888f56d4f2dc62d66de527f9ef65bcb2c334c89ba3ca4f6a84695439dedab2d00f53ceab10970a411fb9919e5b2b4c8"}, {0x68, 0x29, 0x4, "283536021b5ed133c61f54b085b210088be70d5b16cee69cc9e1b9a146653ce27e001919283dcf672b3b32b620c32c7811d7f1c9ec45c3b7a0e2c645984eaba6d6991e774f67662dbd79c8c097a1f8d9fcb4d38a54b156"}, {0x110, 0x88, 0x10000, "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"}, {0xa8, 0x101, 0x3ff, "a427dca947dfe9ca42587f23880c2c37e6583d1ef758a316f9815aacb0721b866d6735cd65f39bb5354024554f8413266b3203feacbd408f7d9d73906b8710228090257e5cc4d785e6486aa000294cb277b4356179242cb8be630fb08e8fe4f09976b084fbf485f44efc91b9b4f752fa2cf37b6efb5fea5265f768cb3d0bd571a167ee9362a5fa2d4fb9c253fbb2c571abe7c2cf"}], 0x558}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000bc0)="745f2dc1d2031e24954d722206a219878321e6900b5a0656934beb7689c5b820ba44b20fecaeae3c068993641e40e37d328b205c5fa77ae6c6f133d0e8b39a6f80b0", 0x42}, {&(0x7f0000000c40)="fff1f8a5e63aaac3ddde26ec1f24e3830ee7e88388e5fbb35d8dc9d2d6bd54a555cdb952776f0631c56ab35350852121c1da0963bf2848f902f27f28e64ec43fe258aa85b530ce496c033e45124c9239601ebb12dca4fe1213049ca65113c84dd3bd0d2a", 0x64}, {&(0x7f0000000cc0)="90cae32ff4178c7d0b2eb285c31b2a9ac0b2419e4b4b5a33b21f4289ca1dca846abd6d28e40cead980e68a686bfb7841be53b61e383f0903cc8a798f770c356ffad88d4f432a4b1fac3e174a1ea818dd078125b8916506f8c482a93d586e07d1", 0x60}], 0x3, &(0x7f0000000d80)=[{0x80, 0x115, 0x38, "360b40516468856747d8e3f7986f36b2a637ec24107f1128245d4a3adca714eedc3ad6f38464cf910a3ef27d4ebdfe8612d58f1ec6eca9195f587258015b598dc40b4aa45782d6fdeb1a8f40525c17b9ad1ada8e4a8674733e3db4f677fa36f8b98fe3cbc28726f5eff611df"}, {0xb0, 0x1f2291eedd3268ca, 0x7, "44459376434b15935bf9a7d8e4385cfcba5e6cbf4e79d859fe707c13a793dba3b81054152cf1490165b4743897ea3480ac12af558e2f0bfb1364030bc0c2d358866b997780a8c2756d9b633fc8d5957e055fee4dbf36d0ef14f6f393db7487c41d2a38bc7c8e24ca76fe787600e0afb15b412dce3cc97a6cf063eeca8f59918e53aa3b37de9ed193348a3cb1984686fda608dad05f2dcff5f22a"}, {0x18, 0x118, 0x65, "6b969df89ce3"}, {0xa0, 0x11, 0x5, "90b5d76081567be9d93f1d3e13c03e75d192251a6beb637697ed4fce7c946625d228786867094621e5d39d488e4272d3fb498e398460edecf1fd018e9b17f97361fe4ea783549770f7a578dbbff3a2d1ab025d1d20ff44368b1b2a85bf5638d7cec5035d3f80c9455543d75ed30d5bfe46e57d5030490edd0d67a46050322a1e288ce86f55a16eecb9b8"}], 0x1e8}}, {{&(0x7f0000000f80)=@isdn={0x22, 0x9, 0x40, 0xfa, 0x1}, 0x80, &(0x7f0000001000)}}, {{&(0x7f0000001040)=@un=@file={0x1, './file0\x00'}, 0x80, &(0x7f0000001280)=[{&(0x7f00000010c0)="12f0e745e75989845a40e2a76a186d2dbc8af3b29258f4152da3a58c15dbb4c44172edc501fb6855fdf2f76596a430607e8d93423c5ba611b445e178752328204845bb944d803bdb917585ec27b627db", 0x50}, {&(0x7f0000001140)}, {&(0x7f0000001180)="88e7c16a2f43211ade5845d8242631ad2510900ec70ac901e733ab4512206cefbb0487d4b7893aade0b03fec3eb9550a50eec52f96e37a5ab75de1aa28c89812ef6bd5ededf7c6cddfb2c14714bfb5a3feed9583c09797ab777d78729c38e775b849cba0dc2f519c00495a0f0998b15b900beee8ea48cc5af18f6efe0455089d9c19df15f6e0afb2de5f4bb24d7260a859468a2f9805b3624154dc2ae0078e12c8338a67b283dae1d7dc862425cd2338f5d93e7e3aa22416d1406166051436315aee39cf797a919f981a3f6ce082e19d53", 0xd1}], 0x3, &(0x7f00000012c0)=[{0x110, 0x332, 0x2, "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"}, {0x68, 0x10d, 0x40, "db4be1023913ea744df93632c7e991acf6a4f2bcb0569f3a04240e11a99d42075f6c1bf03d4a9a5077eaa4f14711ff2e593e4b9232560582b07c1bcfc852cdf54d9af30f5a86bdcf7772e0add81031fa9c3264"}, {0x40, 0x10c, 0x7, "2b23bf8a8e43a4a39fbdad7f940e53d25301020448cef3151e54a4e5c2a9f20f767a43b97921677bae"}, {0x98, 0x115, 0x1, "e7ae0215a55e8e8e62c0fda522881446020fa0004a3dc20e09f77a0b7b6096ea2afdd0a9f37246da4efbb3354c9e71ea5d9ebf4891861487817b67b0642bc3348efaec1f85907b1204b41853947c0a54b060a20f38a7b8416040edd69f86412a7f7c78b5d668434eb45ef584faadf96b7ae0986214de987139da00c30b3a74e42c1aca1ca55d"}, {0x80, 0x88, 0x694065f, "3642f638544491ee948b3b960ed89cca568c33cd8ba7c58f5eb4d670044aa07d526c8228b970e8f621415f17b05542cccc4683a515c2f3e2e5fb827bac763b50f31a11426b3036fc8a3c756237d53e78643f5166df83161e569756425b9e158e53666e53322248bf645eb2"}], 0x2d0}}, {{&(0x7f0000001600)=@nfc_llcp={0x27, 0x0, 0x0, 0x5, 0x0, 0x80, "4438a39c5f58544da9560825fdaf255d3d2feabdc0d45363360c8f324d3940179011f75d8d9a24ac080dbcd0535c965964810f0854ea134308c3b31a0467fe", 0x1d}, 0x80, &(0x7f0000001700)=[{&(0x7f0000001680)="503939c68f4d71ac802cc1cc8ae642cedb9b16b9c9e0a67a2cafbc80e861578e3dc5d270d503edd4a8fe959b78b4876b719943ea72dd70b68765c42cde2ca951ab63ebb498309be47601fb2ca1b4dba335ec", 0x52}], 0x1, &(0x7f0000001740)=[{0xb0, 0x4b670f10ab0d0e93, 0x823e, "4bf4bacb76a778209e33eca7935515677942e09acd43d5ce53c67cc2fe90c95184745d3055c6af81a73147e559e81ecf4df11112315300fae4f8b5b9bff27d4e04095fc8b0efa9bad93b5d4f134ca84634f6ca841a18b56e621c13bd5fc7e4a6538b75ef605b5895774a1d4452540b1fe722fa333a170ddd57740ae000c2aa5a86df2ca874210c5b0a22612ee2eaf9196227319068301653a8c3fd57c77608"}, {0xe0, 0x101, 0x20, "c5961388c14382be4af1161f6a4a2fd355ef22983530900ba5efe44b7bd581dc1fb8d8d725ee568150b35346fc1bc4bf132adaa42b60b30f3dc88f44a856e27fb9efb2a0128eb59692706d750c3a17ef82cd5e03b00519ba39a5f5c2552daefdd909716e80ff863ab8e56242a8940a6a2f9dcbaa59f867d66bd56352ae6b1d1c08f6cc1c711713d31206c6cafa212583b46881a18fb7431352724904553db0c4fc3d65083f42e7ee5a4a2c9b20f6292f786055b8d87c308007fa7d508bacdb80520fc6a768bd71e10d46a3"}], 0x190}}], 0x6, 0x2000c004) 09:33:47 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000000)=ANY=[@ANYBLOB="b506c9e6e7e47942f7789c342450197a7645e7c43e922b634ab282f7e1"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:33:47 executing program 5 (fault-call:1 fault-nth:8): mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="2398c593a2303d8df8dc1623f67a060de466e34712df232157116a41dc2b323a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:33:47 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f0000000340)=ANY=[@ANYBLOB="b7020000f7ffffffbfa70000000000002402000020feffff7a0af0fff8ffffff69a4f0ff00000000b70600000018d1fe2d6405000000000075040000000000000704000000000000b7040000100000206a0700fe00000000850000002f000000b70000000a0000009500000000000000e535f8a62fc2868f0399d909a63796c113a80c19aab9d607000000b6cd483be3f0d3253730e711f5969f62c28b22756bedf3cf393d14c46cc4f79fd2b316da4f0de8163f6242fa732300000637c48468766af540439fce41f144631ac262dcae18c3d1a1fbe96dd87235b44174f7c0343185089a0f119e31975e551558055dc2dc"], &(0x7f0000000280)='GPL\x00'}, 0x48) r1 = socket$kcm(0x11, 0x8000000002, 0x300) socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000540)=r0, 0x4) syz_emit_ethernet(0x3e, &(0x7f0000000000)={@broadcast, @random="96c1e9574b31", @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x3f00, 0x0, 0x1, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @local}, @time_exceeded={0xb, 0x0, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local, @multicast2}}}}}}, 0x0) 09:33:47 executing program 3: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000080)=ANY=[], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1362.036264][ T3376] kAFS: unparsable volume name [ 1362.056266][ T3379] kAFS: Bad value for 'source' [ 1362.056622][ T3380] kAFS: unparsable volume name [ 1362.064568][ T3378] FAULT_INJECTION: forcing a failure. [ 1362.064568][ T3378] name failslab, interval 1, probability 0, space 0, times 0 [ 1362.095963][ T3378] CPU: 1 PID: 3378 Comm: syz-executor.5 Not tainted 5.5.0-rc5-syzkaller #0 [ 1362.104590][ T3378] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1362.114646][ T3378] Call Trace: [ 1362.117937][ T3378] dump_stack+0x197/0x210 [ 1362.122292][ T3378] should_fail.cold+0xa/0x15 [ 1362.126888][ T3378] ? fault_create_debugfs_attr+0x180/0x180 [ 1362.132703][ T3378] ? ___might_sleep+0x163/0x2c0 [ 1362.137551][ T3378] __should_failslab+0x121/0x190 [ 1362.142482][ T3378] should_failslab+0x9/0x14 [ 1362.146970][ T3378] __kmalloc+0x2e0/0x770 [ 1362.151204][ T3378] ? tomoyo_encode2.part.0+0xf5/0x400 [ 1362.156564][ T3378] tomoyo_encode2.part.0+0xf5/0x400 [ 1362.161746][ T3378] ? __get_fs_type+0x9a/0xd0 [ 1362.166331][ T3378] tomoyo_encode+0x2b/0x50 [ 1362.170744][ T3378] tomoyo_mount_acl+0x320/0x840 [ 1362.175590][ T3378] ? debug_check_no_obj_freed+0x20a/0x43f [ 1362.181297][ T3378] ? mark_lock+0xc2/0x1220 [ 1362.185714][ T3378] ? tomoyo_check_mount_acl+0x1b0/0x1b0 [ 1362.191246][ T3378] ? __kasan_check_read+0x11/0x20 [ 1362.196255][ T3378] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1362.202478][ T3378] ? debug_smp_processor_id+0x33/0x18a [ 1362.207937][ T3378] ? lock_acquire+0x190/0x410 [ 1362.212611][ T3378] ? tomoyo_mount_permission+0x10a/0x400 [ 1362.218255][ T3378] tomoyo_mount_permission+0x16a/0x400 [ 1362.223716][ T3378] ? tomoyo_mount_permission+0x10a/0x400 [ 1362.229348][ T3378] ? tomoyo_mount_acl+0x840/0x840 [ 1362.234499][ T3378] ? strncpy_from_user+0x2b4/0x400 [ 1362.239604][ T3378] tomoyo_sb_mount+0x35/0x40 [ 1362.244184][ T3378] security_sb_mount+0x87/0xd0 [ 1362.248946][ T3378] do_mount+0x1d4/0x1b50 [ 1362.253186][ T3378] ? copy_mount_string+0x40/0x40 [ 1362.258124][ T3378] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1362.264360][ T3378] ? _copy_from_user+0x12c/0x1a0 [ 1362.269293][ T3378] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1362.275519][ T3378] ? copy_mount_options+0x2e8/0x3f0 [ 1362.280710][ T3378] __x64_sys_mount+0x192/0x230 [ 1362.285460][ T3378] do_syscall_64+0xfa/0x790 [ 1362.289949][ T3378] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1362.295824][ T3378] RIP: 0033:0x45af49 [ 1362.299712][ T3378] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1362.319308][ T3378] RSP: 002b:00007f2c1e821c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1362.327715][ T3378] RAX: ffffffffffffffda RBX: 00007f2c1e821c90 RCX: 000000000045af49 [ 1362.335675][ T3378] RDX: 0000000020000180 RSI: 0000000020000140 RDI: 0000000020000240 09:33:47 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x44) mount(&(0x7f00000015c0)=ANY=[@ANYBLOB='#'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) r0 = socket(0x0, 0x80002, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="080db5055e0bcfe8696071") ioctl$sock_bt_bnep_BNEPGETSUPPFEAT(r0, 0x800442d4, &(0x7f0000000000)=0x7fffffff) [ 1362.343642][ T3378] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1362.351599][ T3378] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f2c1e8226d4 [ 1362.359555][ T3378] R13: 00000000004c8583 R14: 00000000004e06a8 R15: 0000000000000003 09:33:47 executing program 5 (fault-call:1 fault-nth:9): mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="2398c593a2303d8df8dc1623f67a060de466e34712df232157116a41dc2b323a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1362.502771][ T3606] kAFS: unparsable volume name [ 1362.568568][ T3614] FAULT_INJECTION: forcing a failure. [ 1362.568568][ T3614] name failslab, interval 1, probability 0, space 0, times 0 [ 1362.616762][ T3614] CPU: 0 PID: 3614 Comm: syz-executor.5 Not tainted 5.5.0-rc5-syzkaller #0 [ 1362.625392][ T3614] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1362.636064][ T3614] Call Trace: [ 1362.639380][ T3614] dump_stack+0x197/0x210 [ 1362.643740][ T3614] should_fail.cold+0xa/0x15 [ 1362.648360][ T3614] ? fault_create_debugfs_attr+0x180/0x180 [ 1362.654193][ T3614] ? ___might_sleep+0x163/0x2c0 [ 1362.659069][ T3614] __should_failslab+0x121/0x190 [ 1362.664032][ T3614] should_failslab+0x9/0x14 [ 1362.668549][ T3614] kmem_cache_alloc_trace+0x2d3/0x790 [ 1362.673951][ T3614] alloc_fs_context+0x5a/0x810 [ 1362.678732][ T3614] ? _raw_read_unlock+0x28/0x40 [ 1362.683753][ T3614] fs_context_for_mount+0x25/0x30 [ 1362.688816][ T3614] do_mount+0x11b2/0x1b50 [ 1362.693171][ T3614] ? copy_mount_string+0x40/0x40 [ 1362.698133][ T3614] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1362.704385][ T3614] ? _copy_from_user+0x12c/0x1a0 [ 1362.709336][ T3614] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1362.715588][ T3614] ? copy_mount_options+0x2e8/0x3f0 [ 1362.720803][ T3614] __x64_sys_mount+0x192/0x230 [ 1362.725580][ T3614] do_syscall_64+0xfa/0x790 [ 1362.730097][ T3614] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1362.735997][ T3614] RIP: 0033:0x45af49 [ 1362.739907][ T3614] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 09:33:47 executing program 1: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000080)=ANY=[@ANYBLOB='#U'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x1000000, 0x0) 09:33:47 executing program 3: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000080)=ANY=[], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:33:47 executing program 2: r0 = getpgrp(0x0) get_robust_list(r0, &(0x7f00000001c0)=&(0x7f0000000100)={&(0x7f0000000040)={&(0x7f0000000000)}, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)}}, &(0x7f0000000240)=0x18) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f00000015c0)=ANY=[@ANYBLOB='%'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = creat(&(0x7f0000000300)='./file1\x00', 0x1) fsconfig$FSCONFIG_SET_PATH(r3, 0x3, &(0x7f0000000280)='afs\x00', &(0x7f00000002c0)='./file0\x00', r4) 09:33:47 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f0000000340)=ANY=[@ANYBLOB="b7020000f7ffffffbfa70000000000002402000020feffff7a0af0fff8ffffff69a4f0ff00000000b70600000018d1fe2d6405000000000075040000000000000704000000000000b7040000100000206a0700fe00000000850000002f000000b70000000a0000009500000000000000e535f8a62fc2868f0399d909a63796c113a80c19aab9d607000000b6cd483be3f0d3253730e711f5969f62c28b22756bedf3cf393d14c46cc4f79fd2b316da4f0de8163f6242fa732300000637c48468766af540439fce41f144631ac262dcae18c3d1a1fbe96dd87235b44174f7c0343185089a0f119e31975e551558055dc2dc"], &(0x7f0000000280)='GPL\x00'}, 0x48) r1 = socket$kcm(0x11, 0x8000000002, 0x300) socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000540)=r0, 0x4) syz_emit_ethernet(0x3e, &(0x7f0000000000)={@broadcast, @random="96c1e9574b31", @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x4000, 0x0, 0x1, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @local}, @time_exceeded={0xb, 0x0, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local, @multicast2}}}}}}, 0x0) 09:33:47 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg$inet(r1, &(0x7f0000000680)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f00000000c0)="5831255624c13e4c563f221188b6be66ea", 0x11}], 0x1}}, {{&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000002c0)=[{&(0x7f0000000040)="70a6b8247e016ae2647a2e703fce46c432e37d1dffd332a793d4b9e3617386d153", 0x21}, {&(0x7f0000000200)="09f96fbf33ceccc10976cd10b1411ee57d092fd5b7f95a0f19f01005f110463ccb2c6ebdb74ad7a7da1a2bed233154886db68984d477ebee11ce9a8e3510d401f6f31ea0a7e3ec1cda7b95f7a02b42753eb4cf0bbf5afbc7084f9bc2603aafe5da6cd54e4d647ec9fd641e4241513aaf23481d1f390bbb83dfae56369f4b03367ccd45f0ec4cd929aed127394157e7b3794500c0c5f88930b1ff50bbae1163c26fff28d06028", 0xa6}, {&(0x7f0000000100)="38d6cd435749d519cc39e90540f37c4f5c6bceef6c4ae07105cafc5e25d9bbfce859670b89666cca0857aa0c2abd8722a9db0caad3905e3ff682", 0x3a}, {&(0x7f0000000140)="d71206abd00e3c0a7e2440673da6a9fc2c1255a9b136bc982a3dc2ac21ef167250c176acfbd4d13abd86b018e8b1357842d8dc93e53f6b542e9633e1db8672e8", 0x40}], 0x4}}, {{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000380)="df304451b990364b1c6ff9c843eb47125c0a16565b5efbc0494b453f9863364196a743b5d226d34b2293f3b4b8dde4b8434172dec0902f0e03c2893c2bfd5f662eefc2902850a0221d55", 0x200003ca}, {&(0x7f0000000400)}], 0x2, &(0x7f0000000540)=[@ip_tos_u8={{0x11}}, @ip_ttl={{0x14}}, @ip_ttl={{0x14}}, @ip_tos_u8={{0x11}}], 0x60}}], 0x3, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$inet(r3, &(0x7f0000000680)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f00000000c0)="5831255624c13e4c563f221188b6be66ea", 0x11}], 0x1}}, {{&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000002c0)=[{&(0x7f0000000040)="70a6b8247e016ae2647a2e703fce46c432e37d1dffd332a793d4b9e3617386d153", 0x21}, {&(0x7f0000000200)="09f96fbf33ceccc10976cd10b1411ee57d092fd5b7f95a0f19f01005f110463ccb2c6ebdb74ad7a7da1a2bed233154886db68984d477ebee11ce9a8e3510d401f6f31ea0a7e3ec1cda7b95f7a02b42753eb4cf0bbf5afbc7084f9bc2603aafe5da6cd54e4d647ec9fd641e4241513aaf23481d1f390bbb83dfae56369f4b03367ccd45f0ec4cd929aed127394157e7b3794500c0c5f88930b1ff50bbae1163c26fff28d06028", 0xa6}, {&(0x7f0000000100)="38d6cd435749d519cc39e90540f37c4f5c6bceef6c4ae07105cafc5e25d9bbfce859670b89666cca0857aa0c2abd8722a9db0caad3905e3ff682", 0x3a}, {&(0x7f0000000140)="d71206abd00e3c0a7e2440673da6a9fc2c1255a9b136bc982a3dc2ac21ef167250c176acfbd4d13abd86b018e8b1357842d8dc93e53f6b542e9633e1db8672e8", 0x40}], 0x4}}, {{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000380)="df304451b990364b1c6ff9c843eb47125c0a16565b5efbc0494b453f9863364196a743b5d226d34b2293f3b4b8dde4b8434172dec0902f0e03c2893c2bfd5f662eefc2902850a0221d55", 0x200003ca}, {&(0x7f0000000400)}], 0x2, &(0x7f0000000540)=[@ip_tos_u8={{0x11}}, @ip_ttl={{0x14}}, @ip_ttl={{0x14}}, @ip_tos_u8={{0x11}}], 0x60}}], 0x3, 0x0) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="bbe07d6186502f6b8a109acbd683d1c75ed191a4c1c8219e22b3817f26d331d5a213b78898aaedae37b82e451643e6e93d0d6271111ce39eda03f469b13bff93937691906063189d321b8b1ff73a0b2fe000e78bb7c832d86354012994fd5974c1bcc8d17cf6275cd29f3c134c9e80"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1362.759867][ T3614] RSP: 002b:00007f2c1e821c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1362.768385][ T3614] RAX: ffffffffffffffda RBX: 00007f2c1e821c90 RCX: 000000000045af49 [ 1362.776367][ T3614] RDX: 0000000020000180 RSI: 0000000020000140 RDI: 0000000020000240 [ 1362.784351][ T3614] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1362.792334][ T3614] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f2c1e8226d4 [ 1362.800313][ T3614] R13: 00000000004c8583 R14: 00000000004e06a8 R15: 0000000000000003 [ 1362.802583][ T3742] kAFS: unparsable volume name [ 1362.851659][ T3786] kAFS: unparsable volume name 09:33:48 executing program 5 (fault-call:1 fault-nth:10): mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="2398c593a2303d8df8dc1623f67a060de466e34712df232157116a41dc2b323a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:33:48 executing program 2: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f00000015c0)=ANY=[@ANYBLOB='%'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) lgetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@known='security.apparmor\x00', &(0x7f0000000080)=""/103, 0x67) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vsock\x00', 0x6100, 0x0) write$P9_RREADLINK(r0, &(0x7f00000001c0)={0x10, 0x17, 0x1, {0x7, './file0'}}, 0x10) 09:33:48 executing program 3: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000080)=ANY=[@ANYBLOB], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:33:48 executing program 4 (fault-call:1 fault-nth:0): mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="2398c593a2303d8df8dc1623f67a060de466e34712df232157116a41dc2b323a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:33:48 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f0000000340)=ANY=[@ANYBLOB="b7020000f7ffffffbfa70000000000002402000020feffff7a0af0fff8ffffff69a4f0ff00000000b70600000018d1fe2d6405000000000075040000000000000704000000000000b7040000100000206a0700fe00000000850000002f000000b70000000a0000009500000000000000e535f8a62fc2868f0399d909a63796c113a80c19aab9d607000000b6cd483be3f0d3253730e711f5969f62c28b22756bedf3cf393d14c46cc4f79fd2b316da4f0de8163f6242fa732300000637c48468766af540439fce41f144631ac262dcae18c3d1a1fbe96dd87235b44174f7c0343185089a0f119e31975e551558055dc2dc"], &(0x7f0000000280)='GPL\x00'}, 0x48) r1 = socket$kcm(0x11, 0x8000000002, 0x300) socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000540)=r0, 0x4) syz_emit_ethernet(0x3e, &(0x7f0000000000)={@broadcast, @random="96c1e9574b31", @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0xffff, 0x0, 0x1, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @local}, @time_exceeded={0xb, 0x0, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local, @multicast2}}}}}}, 0x0) [ 1363.066200][ T4178] FAULT_INJECTION: forcing a failure. [ 1363.066200][ T4178] name failslab, interval 1, probability 0, space 0, times 0 [ 1363.099118][ T4183] kAFS: Bad value for 'source' [ 1363.136279][ T4186] kAFS: unparsable volume name [ 1363.142261][ T4178] CPU: 1 PID: 4178 Comm: syz-executor.5 Not tainted 5.5.0-rc5-syzkaller #0 [ 1363.150873][ T4178] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1363.160937][ T4178] Call Trace: [ 1363.164249][ T4178] dump_stack+0x197/0x210 [ 1363.168601][ T4178] should_fail.cold+0xa/0x15 [ 1363.170374][ T4188] FAULT_INJECTION: forcing a failure. [ 1363.170374][ T4188] name failslab, interval 1, probability 0, space 0, times 0 [ 1363.173262][ T4178] ? afs_lookup_cell+0x9b3/0x1130 [ 1363.173285][ T4178] ? fault_create_debugfs_attr+0x180/0x180 [ 1363.196802][ T4178] ? ___might_sleep+0x163/0x2c0 [ 1363.201676][ T4178] __should_failslab+0x121/0x190 [ 1363.206648][ T4178] should_failslab+0x9/0x14 [ 1363.211142][ T4178] kmem_cache_alloc_trace+0x2d3/0x790 [ 1363.216512][ T4178] ? __kasan_check_read+0x11/0x20 [ 1363.221528][ T4178] afs_lookup_cell+0x18c/0x1130 [ 1363.226365][ T4178] ? strcmp+0x4c/0xb0 [ 1363.230335][ T4178] ? afs_lookup_cell_rcu+0x920/0x920 [ 1363.235617][ T4178] ? fs_lookup_key.isra.0+0x96/0xc0 [ 1363.240804][ T4178] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 1363.246701][ T4178] ? fs_parse+0x53c/0x10e0 [ 1363.251106][ T4178] ? rcu_lockdep_current_cpu_online+0xa2/0x130 [ 1363.257252][ T4178] afs_parse_param+0x43c/0x920 [ 1363.262020][ T4178] ? afs_free_inode+0x30/0x30 [ 1363.266681][ T4178] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1363.272388][ T4178] ? __lookup_constant+0xd6/0x100 [ 1363.277404][ T4178] ? afs_free_inode+0x30/0x30 [ 1363.282066][ T4178] vfs_parse_fs_param+0x2ca/0x540 [ 1363.287078][ T4178] vfs_parse_fs_string+0x105/0x170 [ 1363.292204][ T4178] ? vfs_parse_fs_param+0x540/0x540 [ 1363.297396][ T4178] ? afs_init_fs_context+0x316/0x5b0 [ 1363.302681][ T4178] ? afs_alloc_inode+0x220/0x220 [ 1363.307644][ T4178] do_mount+0x6b4/0x1b50 [ 1363.311973][ T4178] ? copy_mount_string+0x40/0x40 [ 1363.316905][ T4178] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1363.323135][ T4178] ? _copy_from_user+0x12c/0x1a0 [ 1363.328078][ T4178] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1363.334305][ T4178] ? copy_mount_options+0x2e8/0x3f0 [ 1363.339492][ T4178] __x64_sys_mount+0x192/0x230 [ 1363.344261][ T4178] do_syscall_64+0xfa/0x790 [ 1363.348767][ T4178] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1363.354659][ T4178] RIP: 0033:0x45af49 [ 1363.358545][ T4178] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1363.378134][ T4178] RSP: 002b:00007f2c1e821c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1363.386532][ T4178] RAX: ffffffffffffffda RBX: 00007f2c1e821c90 RCX: 000000000045af49 [ 1363.394511][ T4178] RDX: 0000000020000180 RSI: 0000000020000140 RDI: 0000000020000240 [ 1363.402640][ T4178] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1363.410594][ T4178] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f2c1e8226d4 [ 1363.418548][ T4178] R13: 00000000004c8583 R14: 00000000004e06a8 R15: 0000000000000003 [ 1363.453183][ T4188] CPU: 1 PID: 4188 Comm: syz-executor.4 Not tainted 5.5.0-rc5-syzkaller #0 [ 1363.462029][ T4188] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1363.472099][ T4188] Call Trace: [ 1363.475414][ T4188] dump_stack+0x197/0x210 [ 1363.479782][ T4188] should_fail.cold+0xa/0x15 [ 1363.484406][ T4188] ? fault_create_debugfs_attr+0x180/0x180 [ 1363.490241][ T4188] ? ___might_sleep+0x163/0x2c0 [ 1363.495138][ T4188] __should_failslab+0x121/0x190 09:33:48 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f0000000340)=ANY=[@ANYBLOB="b7020000f7ffffffbfa70000000000002402000020feffff7a0af0fff8ffffff69a4f0ff00000000b70600000018d1fe2d6405000000000075040000000000000704000000000000b7040000100000206a0700fe00000000850000002f000000b70000000a0000009500000000000000e535f8a62fc2868f0399d909a63796c113a80c19aab9d607000000b6cd483be3f0d3253730e711f5969f62c28b22756bedf3cf393d14c46cc4f79fd2b316da4f0de8163f6242fa732300000637c48468766af540439fce41f144631ac262dcae18c3d1a1fbe96dd87235b44174f7c0343185089a0f119e31975e551558055dc2dc"], &(0x7f0000000280)='GPL\x00'}, 0x48) r1 = socket$kcm(0x11, 0x8000000002, 0x300) socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000540)=r0, 0x4) syz_emit_ethernet(0x3e, &(0x7f0000000000)={@broadcast, @random="96c1e9574b31", @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x1, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @local}, @time_exceeded={0xb, 0x0, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local, @multicast2}}}}}}, 0x0) [ 1363.500096][ T4188] should_failslab+0x9/0x14 [ 1363.505312][ T4188] __kmalloc_track_caller+0x2dc/0x760 [ 1363.510714][ T4188] ? fput+0x1b/0x20 [ 1363.514536][ T4188] ? ksys_write+0x1cf/0x290 [ 1363.519054][ T4188] ? strndup_user+0x77/0xd0 [ 1363.523666][ T4188] memdup_user+0x26/0xd0 [ 1363.527930][ T4188] strndup_user+0x77/0xd0 [ 1363.532276][ T4188] __x64_sys_mount+0xe9/0x230 [ 1363.532295][ T4188] do_syscall_64+0xfa/0x790 [ 1363.532313][ T4188] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1363.532330][ T4188] RIP: 0033:0x45af49 [ 1363.547454][ T4188] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1363.547464][ T4188] RSP: 002b:00007f8a26b14c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1363.547480][ T4188] RAX: ffffffffffffffda RBX: 00007f8a26b14c90 RCX: 000000000045af49 [ 1363.547489][ T4188] RDX: 0000000020000180 RSI: 0000000020000140 RDI: 0000000020000240 [ 1363.547498][ T4188] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 09:33:48 executing program 3: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000080)=ANY=[@ANYBLOB], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1363.547505][ T4188] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f8a26b156d4 [ 1363.547520][ T4188] R13: 00000000004c8583 R14: 00000000004e06a8 R15: 0000000000000003 [ 1363.701770][ T4456] kAFS: Bad value for 'source' [ 1363.787207][ T4178] kAFS: unable to lookup cell 'œ0=#z fG#!WjA+2' 09:33:49 executing program 1: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000080)=ANY=[@ANYBLOB='#U'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x2000000, 0x0) 09:33:49 executing program 2: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) r0 = socket(0x0, 0x80002, 0x0) ioctl(r0, 0xc, &(0x7f0000000080)="f20000ff07599498d82d6a8dc5df52d44704449940efec6d87744c572ad90eb616ad188dc5414e641e6822dcbe775e74edd73a9ed89059b5f1e65200000000") setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)='vlan1\x00', 0x10) mount(&(0x7f00000015c0)=ANY=[@ANYBLOB='%'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:33:49 executing program 3: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000080)=ANY=[@ANYBLOB], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:33:49 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f0000000340)=ANY=[@ANYBLOB="b7020000f7ffffffbfa70000000000002402000020feffff7a0af0fff8ffffff69a4f0ff00000000b70600000018d1fe2d6405000000000075040000000000000704000000000000b7040000100000206a0700fe00000000850000002f000000b70000000a0000009500000000000000e535f8a62fc2868f0399d909a63796c113a80c19aab9d607000000b6cd483be3f0d3253730e711f5969f62c28b22756bedf3cf393d14c46cc4f79fd2b316da4f0de8163f6242fa732300000637c48468766af540439fce41f144631ac262dcae18c3d1a1fbe96dd87235b44174f7c0343185089a0f119e31975e551558055dc2dc"], &(0x7f0000000280)='GPL\x00'}, 0x48) r1 = socket$kcm(0x11, 0x8000000002, 0x300) socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000540)=r0, 0x4) syz_emit_ethernet(0x3e, &(0x7f0000000000)={@broadcast, @random="96c1e9574b31", @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x2, 0x1, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @local}, @time_exceeded={0xb, 0x0, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local, @multicast2}}}}}}, 0x0) 09:33:49 executing program 4 (fault-call:1 fault-nth:1): mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="2398c593a2303d8df8dc1623f67a060de466e34712df232157116a41dc2b323a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:33:49 executing program 5 (fault-call:1 fault-nth:11): mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="2398c593a2303d8df8dc1623f67a060de466e34712df232157116a41dc2b323a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1363.959728][ T4508] kAFS: Bad value for 'source' [ 1363.969760][ T4509] FAULT_INJECTION: forcing a failure. [ 1363.969760][ T4509] name failslab, interval 1, probability 0, space 0, times 0 [ 1363.986330][ T4513] FAULT_INJECTION: forcing a failure. [ 1363.986330][ T4513] name failslab, interval 1, probability 0, space 0, times 0 [ 1363.988740][ T4511] kAFS: unparsable volume name [ 1364.011989][ T4509] CPU: 1 PID: 4509 Comm: syz-executor.5 Not tainted 5.5.0-rc5-syzkaller #0 [ 1364.020616][ T4509] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1364.030693][ T4509] Call Trace: [ 1364.034001][ T4509] dump_stack+0x197/0x210 [ 1364.038362][ T4509] should_fail.cold+0xa/0x15 [ 1364.042974][ T4509] ? fault_create_debugfs_attr+0x180/0x180 [ 1364.048804][ T4509] ? ___might_sleep+0x163/0x2c0 [ 1364.053676][ T4509] __should_failslab+0x121/0x190 [ 1364.058642][ T4509] should_failslab+0x9/0x14 [ 1364.063161][ T4509] __kmalloc_track_caller+0x2dc/0x760 [ 1364.068551][ T4509] ? lock_downgrade+0x920/0x920 [ 1364.073418][ T4509] ? vfs_parse_fs_string+0xe8/0x170 [ 1364.078636][ T4509] kmemdup_nul+0x31/0xa0 [ 1364.082902][ T4509] vfs_parse_fs_string+0xe8/0x170 [ 1364.087945][ T4509] ? vfs_parse_fs_param+0x540/0x540 [ 1364.093155][ T4509] ? afs_init_fs_context+0x316/0x5b0 [ 1364.098446][ T4509] ? afs_alloc_inode+0x220/0x220 [ 1364.103403][ T4509] do_mount+0x6b4/0x1b50 [ 1364.107674][ T4509] ? copy_mount_string+0x40/0x40 [ 1364.112635][ T4509] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1364.118889][ T4509] ? _copy_from_user+0x12c/0x1a0 [ 1364.123830][ T4509] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1364.123848][ T4509] ? copy_mount_options+0x2e8/0x3f0 [ 1364.123872][ T4509] __x64_sys_mount+0x192/0x230 [ 1364.140073][ T4509] do_syscall_64+0xfa/0x790 [ 1364.140096][ T4509] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1364.140107][ T4509] RIP: 0033:0x45af49 09:33:49 executing program 2: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f00000015c0)=ANY=[@ANYBLOB='%'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000002600)='/proc/sys/net/ipv4/vs/ignore_tunneled\x00', 0x2, 0x0) sendto$unix(r0, &(0x7f0000002640)="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", 0x1000, 0x80, &(0x7f0000003640)=@abs={0x0, 0x0, 0x4e20}, 0x6e) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x4100, 0x0) sendmsg$alg(r1, &(0x7f0000001580)={0x0, 0x0, &(0x7f00000012c0)=[{&(0x7f0000000040)="4bd54bd0b5e679a990d86ea86da97bf996934f63a60089bd6d5e7162e111c8d80f7dbb827813e6e266c9170ada32aebdbde842aa07d7a72c25ceed8e8013593fce3cf16ff76316d2d5a063bc87ed7234e110eb15a0da1a92807a5ddcb5762affc72e65d399913ac62e45fde8b6a6a94de56fdc2ee034df77762a0da86af0631992e1614b017ffb86412ef8079551954a8a98d597431745722de6f4dee6b7e5eb2b7493e25a9d218c94c2ed9e9d933042c98fc9a1e613c273229bd5e5c7be6b25b2fc86204b010d0dfa6cfdb07d80998bdf792319605dd9", 0xd7}, {&(0x7f0000000240)="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", 0x1000}, {&(0x7f00000001c0)="bb15409583fcf595a3623e00", 0xc}, {&(0x7f0000001240)="019d1f5edf831940baedf0d363dfcbef02b4406cbad46527c95cc9ffb9f55ed3d29eb36c1a91953d103674ee", 0x2c}, {&(0x7f0000001280)="0fe7eff1056f08518a351fec35294a3687e840b70089a584bb26f1758552413b91077253174c26cf9b", 0x29}, {&(0x7f0000001600)="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", 0x1000}], 0x6, &(0x7f0000001340)=[@op={0x18, 0x117, 0x3, 0x1}, @iv={0xf8, 0x117, 0x2, 0xe4, "d9e5ee745847570874c5827991a0a3d5a0c1ae4a1dc47eac7903a87340e88281138512228292e4392b8a300782b72a47bfa8f9f0eb450cd29083e0c1fde1ffe2dabf8d0a5d4c26aac47994c1efea482add82480adc909f996dda89145d5cc12586e5ee8dde2a0ff944f71eddef92f644f47450ffa7836e7b0c92cb96d4a1b7f44672b1a0f3e14b45f9139def2ff0a1b955c4f827953cef99d3e8d878aa65e1a3f5c860dd503c131f19e4e3461311596e4248a3d981b07c49d854842dcb076c6611d6b99362f9476b9fc2670af412b6df515a037c8ccbceb03cac9d60c5bc554cc4e3c112"}, @iv={0xb8, 0x117, 0x2, 0x9e, "17a3f2e5603e1ee0c6c57cb6cb108d640b69a091f448aaa8d49299938bd783cdaa6b3018765354c17421ff1e4c8bff768986d95b68958216efc6fa25911a970531ae1268ad846441f289ac891e84886d2c664220ad3ee8334f8b50d4698027a3fd5e82f3ba3162eb094ae004730329d5a2312ba5f5ae16928daaffb055a1306879869037d1b888e3459c8643e922cf34e0cc4f9b84f9368e8f5beb87f6b7"}, @op={0x18, 0x117, 0x3, 0x1}, @op={0x18}, @assoc={0x18, 0x117, 0x4, 0x8000}, @iv={0x18, 0x117, 0x2, 0x4, "beb74b4b"}, @assoc={0x18, 0x117, 0x4, 0x400}], 0x240, 0x2000c840}, 0x40000) [ 1364.140126][ T4509] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1364.166864][ T4717] kAFS: unparsable volume name [ 1364.174048][ T4509] RSP: 002b:00007f2c1e821c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1364.174063][ T4509] RAX: ffffffffffffffda RBX: 00007f2c1e821c90 RCX: 000000000045af49 [ 1364.174072][ T4509] RDX: 0000000020000180 RSI: 0000000020000140 RDI: 0000000020000240 [ 1364.174081][ T4509] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1364.174091][ T4509] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f2c1e8226d4 [ 1364.174099][ T4509] R13: 00000000004c8583 R14: 00000000004e06a8 R15: 0000000000000003 [ 1364.189338][ T4513] CPU: 1 PID: 4513 Comm: syz-executor.4 Not tainted 5.5.0-rc5-syzkaller #0 [ 1364.217619][ T4717] kAFS: unparsable volume name [ 1364.219899][ T4513] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1364.219907][ T4513] Call Trace: [ 1364.219931][ T4513] dump_stack+0x197/0x210 [ 1364.219955][ T4513] should_fail.cold+0xa/0x15 [ 1364.219979][ T4513] ? fault_create_debugfs_attr+0x180/0x180 [ 1364.270917][ T4513] ? ___might_sleep+0x163/0x2c0 [ 1364.275969][ T4513] __should_failslab+0x121/0x190 [ 1364.280929][ T4513] should_failslab+0x9/0x14 [ 1364.285444][ T4513] __kmalloc_track_caller+0x2dc/0x760 [ 1364.290920][ T4513] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1364.297179][ T4513] ? strndup_user+0x77/0xd0 [ 1364.301702][ T4513] memdup_user+0x26/0xd0 [ 1364.305963][ T4513] strndup_user+0x77/0xd0 09:33:49 executing program 2: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f00000015c0)=ANY=[@ANYBLOB='%'], &(0x7f0000000000)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x4200, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000b00)=0xc) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000007c0)={{{@in=@empty, @in=@multicast1, 0x4e23, 0x8001, 0x4e21, 0x9, 0x0, 0x20, 0xc0, 0x5e, 0x0, r3}, {0x6, 0x0, 0x2, 0x3, 0x480, 0x4, 0x7, 0x1}, {0x101, 0x3, 0x2, 0x7}, 0x96f, 0x6e6bbb, 0x608f917477f760e0, 0x1, 0x1, 0xfb37c7a19e19f3f9}, {{@in6=@rand_addr="17df945b34f8ddfaad004646bda31afc", 0x4d4, 0x33}, 0xa, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x6}}, 0xe8) socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = fcntl$dupfd(r4, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) statx(r6, &(0x7f0000000080)='./file0\x00', 0x4400, 0x4, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lchown(&(0x7f0000000040)='./file0/file0\x00', r3, r7) [ 1364.310310][ T4513] __x64_sys_mount+0x132/0x230 [ 1364.315091][ T4513] do_syscall_64+0xfa/0x790 [ 1364.319611][ T4513] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1364.325519][ T4513] RIP: 0033:0x45af49 [ 1364.329380][ T4822] kAFS: unparsable volume name [ 1364.329426][ T4513] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1364.343334][ T4822] kAFS: unparsable volume name 09:33:49 executing program 3: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000080)=ANY=[@ANYBLOB='%'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:33:49 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f0000000340)=ANY=[@ANYBLOB="b7020000f7ffffffbfa70000000000002402000020feffff7a0af0fff8ffffff69a4f0ff00000000b70600000018d1fe2d6405000000000075040000000000000704000000000000b7040000100000206a0700fe00000000850000002f000000b70000000a0000009500000000000000e535f8a62fc2868f0399d909a63796c113a80c19aab9d607000000b6cd483be3f0d3253730e711f5969f62c28b22756bedf3cf393d14c46cc4f79fd2b316da4f0de8163f6242fa732300000637c48468766af540439fce41f144631ac262dcae18c3d1a1fbe96dd87235b44174f7c0343185089a0f119e31975e551558055dc2dc"], &(0x7f0000000280)='GPL\x00'}, 0x48) r1 = socket$kcm(0x11, 0x8000000002, 0x300) socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000540)=r0, 0x4) syz_emit_ethernet(0x3e, &(0x7f0000000000)={@broadcast, @random="96c1e9574b31", @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x3, 0x1, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @local}, @time_exceeded={0xb, 0x0, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local, @multicast2}}}}}}, 0x0) [ 1364.353793][ T4513] RSP: 002b:00007f8a26b14c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1364.353808][ T4513] RAX: ffffffffffffffda RBX: 00007f8a26b14c90 RCX: 000000000045af49 [ 1364.353816][ T4513] RDX: 0000000020000180 RSI: 0000000020000140 RDI: 0000000020000240 [ 1364.353823][ T4513] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1364.353832][ T4513] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f8a26b156d4 [ 1364.353841][ T4513] R13: 00000000004c8583 R14: 00000000004e06a8 R15: 0000000000000003 [ 1364.434974][ T4867] kAFS: unparsable volume name 09:33:49 executing program 5 (fault-call:1 fault-nth:12): mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="2398c593a2303d8df8dc1623f67a060de466e34712df232157116a41dc2b323a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:33:49 executing program 3: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000080)=ANY=[@ANYBLOB='%'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1364.600259][ T4934] kAFS: unparsable volume name [ 1364.607625][ T4933] FAULT_INJECTION: forcing a failure. [ 1364.607625][ T4933] name failslab, interval 1, probability 0, space 0, times 0 [ 1364.660032][ T4933] CPU: 0 PID: 4933 Comm: syz-executor.5 Not tainted 5.5.0-rc5-syzkaller #0 [ 1364.668664][ T4933] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1364.678732][ T4933] Call Trace: [ 1364.682040][ T4933] dump_stack+0x197/0x210 [ 1364.686392][ T4933] should_fail.cold+0xa/0x15 [ 1364.691003][ T4933] ? fault_create_debugfs_attr+0x180/0x180 [ 1364.696831][ T4933] ? ___might_sleep+0x163/0x2c0 [ 1364.701700][ T4933] __should_failslab+0x121/0x190 [ 1364.706656][ T4933] should_failslab+0x9/0x14 [ 1364.711171][ T4933] __kmalloc+0x2e0/0x770 [ 1364.715432][ T4933] ? kmem_cache_alloc_trace+0x397/0x790 [ 1364.720991][ T4933] ? afs_alloc_vlserver_list+0x27/0xb0 [ 1364.726464][ T4933] afs_alloc_vlserver_list+0x27/0xb0 [ 1364.731763][ T4933] afs_lookup_cell+0xe65/0x1130 [ 1364.736633][ T4933] ? afs_lookup_cell_rcu+0x920/0x920 [ 1364.741928][ T4933] ? fs_lookup_key.isra.0+0x96/0xc0 [ 1364.747141][ T4933] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 1364.748690][ T4940] kAFS: unparsable volume name 09:33:49 executing program 1: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000080)=ANY=[@ANYBLOB='#U'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x3000000, 0x0) 09:33:49 executing program 2: mkdir(&(0x7f0000000200)='./file0\x00', 0x3) mount(&(0x7f00000015c0)=ANY=[@ANYBLOB='\b'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:33:49 executing program 3: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000080)=ANY=[@ANYBLOB='%'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:33:49 executing program 3: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000080)=ANY=[@ANYBLOB='%U'], 0x0, &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1364.753048][ T4933] ? fs_parse+0x53c/0x10e0 [ 1364.753068][ T4933] ? rcu_lockdep_current_cpu_online+0xa2/0x130 [ 1364.753091][ T4933] afs_parse_param+0x43c/0x920 [ 1364.753108][ T4933] ? afs_free_inode+0x30/0x30 [ 1364.753132][ T4933] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1364.753147][ T4933] ? __lookup_constant+0xd6/0x100 [ 1364.753161][ T4933] ? afs_free_inode+0x30/0x30 [ 1364.753182][ T4933] vfs_parse_fs_param+0x2ca/0x540 [ 1364.788843][ T4933] vfs_parse_fs_string+0x105/0x170 [ 1364.803637][ T4933] ? vfs_parse_fs_param+0x540/0x540 [ 1364.808853][ T4933] ? afs_init_fs_context+0x316/0x5b0 [ 1364.814152][ T4933] ? afs_alloc_inode+0x220/0x220 [ 1364.814185][ T4933] do_mount+0x6b4/0x1b50 [ 1364.823356][ T4933] ? copy_mount_string+0x40/0x40 [ 1364.828309][ T4933] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1364.834562][ T4933] ? _copy_from_user+0x12c/0x1a0 [ 1364.837543][ T4942] kAFS: unparsable volume name [ 1364.839512][ T4933] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1364.839538][ T4933] ? copy_mount_options+0x2e8/0x3f0 [ 1364.855864][ T4933] __x64_sys_mount+0x192/0x230 [ 1364.860654][ T4933] do_syscall_64+0xfa/0x790 [ 1364.865182][ T4933] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1364.871094][ T4933] RIP: 0033:0x45af49 [ 1364.874999][ T4933] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1364.894615][ T4933] RSP: 002b:00007f2c1e821c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 09:33:50 executing program 4 (fault-call:1 fault-nth:2): mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="2398c593a2303d8df8dc1623f67a060de466e34712df232157116a41dc2b323a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:33:50 executing program 3: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000080)=ANY=[@ANYBLOB='%U'], 0x0, &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:33:50 executing program 2: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000000)=ANY=[@ANYBLOB="2b91c13ecebc1d0b1adfe2bab7c677077417ce45affdda9da325"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1364.905301][ T4933] RAX: ffffffffffffffda RBX: 00007f2c1e821c90 RCX: 000000000045af49 [ 1364.913288][ T4933] RDX: 0000000020000180 RSI: 0000000020000140 RDI: 0000000020000240 [ 1364.921361][ T4933] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1364.921371][ T4933] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f2c1e8226d4 [ 1364.921378][ T4933] R13: 00000000004c8583 R14: 00000000004e06a8 R15: 0000000000000003 [ 1364.935527][ T4933] kAFS: unable to lookup cell 'œ0=#z fG#!WjA+2' 09:33:50 executing program 5 (fault-call:1 fault-nth:13): mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="2398c593a2303d8df8dc1623f67a060de466e34712df232157116a41dc2b323a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:33:50 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f0000000340)=ANY=[@ANYBLOB="b7020000f7ffffffbfa70000000000002402000020feffff7a0af0fff8ffffff69a4f0ff00000000b70600000018d1fe2d6405000000000075040000000000000704000000000000b7040000100000206a0700fe00000000850000002f000000b70000000a0000009500000000000000e535f8a62fc2868f0399d909a63796c113a80c19aab9d607000000b6cd483be3f0d3253730e711f5969f62c28b22756bedf3cf393d14c46cc4f79fd2b316da4f0de8163f6242fa732300000637c48468766af540439fce41f144631ac262dcae18c3d1a1fbe96dd87235b44174f7c0343185089a0f119e31975e551558055dc2dc"], &(0x7f0000000280)='GPL\x00'}, 0x48) r1 = socket$kcm(0x11, 0x8000000002, 0x300) socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000540)=r0, 0x4) syz_emit_ethernet(0x3e, &(0x7f0000000000)={@broadcast, @random="96c1e9574b31", @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x4, 0x1, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @local}, @time_exceeded={0xb, 0x0, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local, @multicast2}}}}}}, 0x0) [ 1365.093943][ T5052] kAFS: unparsable volume name 09:33:50 executing program 3: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000080)=ANY=[@ANYBLOB='%U'], 0x0, &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1365.173267][ T5057] FAULT_INJECTION: forcing a failure. [ 1365.173267][ T5057] name failslab, interval 1, probability 0, space 0, times 0 [ 1365.204236][ T5057] CPU: 1 PID: 5057 Comm: syz-executor.4 Not tainted 5.5.0-rc5-syzkaller #0 [ 1365.212855][ T5057] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1365.212861][ T5057] Call Trace: [ 1365.212884][ T5057] dump_stack+0x197/0x210 [ 1365.212905][ T5057] should_fail.cold+0xa/0x15 [ 1365.212926][ T5057] ? fault_create_debugfs_attr+0x180/0x180 [ 1365.212948][ T5057] ? ___might_sleep+0x163/0x2c0 [ 1365.212968][ T5057] __should_failslab+0x121/0x190 [ 1365.212988][ T5057] should_failslab+0x9/0x14 [ 1365.213001][ T5057] kmem_cache_alloc+0x2aa/0x710 [ 1365.213015][ T5057] ? __might_fault+0x12b/0x1e0 [ 1365.213029][ T5057] ? find_held_lock+0x35/0x130 [ 1365.213051][ T5057] getname_flags+0xd6/0x5b0 [ 1365.250872][ T5057] user_path_at_empty+0x2f/0x50 [ 1365.250892][ T5057] do_mount+0x150/0x1b50 [ 1365.250914][ T5057] ? copy_mount_string+0x40/0x40 [ 1365.250936][ T5057] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1365.260291][ T5057] ? _copy_from_user+0x12c/0x1a0 [ 1365.269801][ T5057] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1365.305929][ T5057] ? copy_mount_options+0x2e8/0x3f0 [ 1365.311151][ T5057] __x64_sys_mount+0x192/0x230 [ 1365.315940][ T5057] do_syscall_64+0xfa/0x790 09:33:50 executing program 2: openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x40002, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$VHOST_SET_MEM_TABLE(r2, 0x4008af03, &(0x7f00000004c0)={0x5, 0x0, [{0xf000, 0x6d, &(0x7f0000000080)=""/109}, {0x2, 0x8a, &(0x7f0000000340)=""/138}, {0xf000, 0x20, &(0x7f0000000100)=""/32}, {0x5000, 0x62, &(0x7f0000000180)=""/98}, {0x6000, 0x87, &(0x7f0000000400)=""/135}]}) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="00fb2851f8f09e59d3bae7e27f41637067a027a84e307324285e1967717c67ccb6f9e0ac4577481f1e12578fc06baa5583b1fb0e601a25fd6ecb1c53ecab85547dcf73ab8b89fbdf4e5878e856295afe0877b35b342149f29e8bb749f0316b4fc0e0c0c48c297afc53a22462c3998aa118d6ae05ca571d4d2e70377c6e43e8fbcd0fcc71fd8a88cac30daf22081bb28708ec6bd46543a92284d5b34b172c1fcf98ec5b563eaab0a5cc2d4004fda33d2bcff961f5c6a3a28be32b486d0d000c1190eb836c3f86c1e221c75d6f5dbcb3093b2d6b011ced8b2af74266"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cramfs\x00', 0x0, 0x0) 09:33:50 executing program 1: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000080)=ANY=[@ANYBLOB='#U'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x4000000, 0x0) [ 1365.320457][ T5057] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1365.326352][ T5057] RIP: 0033:0x45af49 [ 1365.330255][ T5057] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1365.350468][ T5057] RSP: 002b:00007f8a26b14c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1365.350483][ T5057] RAX: ffffffffffffffda RBX: 00007f8a26b14c90 RCX: 000000000045af49 [ 1365.350491][ T5057] RDX: 0000000020000180 RSI: 0000000020000140 RDI: 0000000020000240 [ 1365.350499][ T5057] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1365.350507][ T5057] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f8a26b156d4 [ 1365.350515][ T5057] R13: 00000000004c8583 R14: 00000000004e06a8 R15: 0000000000000003 09:33:50 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="2398c593a2303d8df8dc1623f67a060de466e34712df232157116a41dc2b323a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:33:50 executing program 4 (fault-call:1 fault-nth:3): mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="2398c593a2303d8df8dc1623f67a060de466e34712df232157116a41dc2b323a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:33:50 executing program 3: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000080)=ANY=[@ANYBLOB='%U'], &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) [ 1365.645341][ T5281] FAULT_INJECTION: forcing a failure. [ 1365.645341][ T5281] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1365.658581][ T5281] CPU: 1 PID: 5281 Comm: syz-executor.4 Not tainted 5.5.0-rc5-syzkaller #0 [ 1365.658592][ T5281] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1365.658598][ T5281] Call Trace: [ 1365.658625][ T5281] dump_stack+0x197/0x210 [ 1365.684891][ T5281] should_fail.cold+0xa/0x15 [ 1365.689501][ T5281] ? fault_create_debugfs_attr+0x180/0x180 [ 1365.695330][ T5281] ? __kasan_check_read+0x11/0x20 [ 1365.700361][ T5281] ? __lock_acquire+0x16f2/0x4a00 [ 1365.705398][ T5281] should_fail_alloc_page+0x50/0x60 [ 1365.710606][ T5281] __alloc_pages_nodemask+0x1a1/0x910 [ 1365.715990][ T5281] ? fs_reclaim_release+0xf/0x30 [ 1365.720938][ T5281] ? __alloc_pages_slowpath+0x2920/0x2920 [ 1365.726665][ T5281] ? fs_reclaim_release+0xf/0x30 [ 1365.731626][ T5281] ? fault_create_debugfs_attr+0x180/0x180 [ 1365.737450][ T5281] cache_grow_begin+0x90/0xc60 [ 1365.742236][ T5281] ? getname_flags+0xd6/0x5b0 [ 1365.746914][ T5281] ? trace_hardirqs_off+0x62/0x240 [ 1365.746934][ T5281] kmem_cache_alloc+0x64e/0x710 [ 1365.746955][ T5281] ? __might_fault+0x12b/0x1e0 [ 1365.761654][ T5281] getname_flags+0xd6/0x5b0 [ 1365.766157][ T5281] user_path_at_empty+0x2f/0x50 [ 1365.771003][ T5281] do_mount+0x150/0x1b50 [ 1365.775237][ T5281] ? copy_mount_string+0x40/0x40 [ 1365.780161][ T5281] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1365.787279][ T5281] ? _copy_from_user+0x12c/0x1a0 [ 1365.792219][ T5281] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1365.798453][ T5281] ? copy_mount_options+0x2e8/0x3f0 [ 1365.803650][ T5281] __x64_sys_mount+0x192/0x230 [ 1365.808780][ T5281] do_syscall_64+0xfa/0x790 [ 1365.813274][ T5281] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1365.819150][ T5281] RIP: 0033:0x45af49 [ 1365.823037][ T5281] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 09:33:50 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f0000000340)=ANY=[@ANYBLOB="b7020000f7ffffffbfa70000000000002402000020feffff7a0af0fff8ffffff69a4f0ff00000000b70600000018d1fe2d6405000000000075040000000000000704000000000000b7040000100000206a0700fe00000000850000002f000000b70000000a0000009500000000000000e535f8a62fc2868f0399d909a63796c113a80c19aab9d607000000b6cd483be3f0d3253730e711f5969f62c28b22756bedf3cf393d14c46cc4f79fd2b316da4f0de8163f6242fa732300000637c48468766af540439fce41f144631ac262dcae18c3d1a1fbe96dd87235b44174f7c0343185089a0f119e31975e551558055dc2dc"], &(0x7f0000000280)='GPL\x00'}, 0x48) r1 = socket$kcm(0x11, 0x8000000002, 0x300) socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000540)=r0, 0x4) syz_emit_ethernet(0x3e, &(0x7f0000000000)={@broadcast, @random="96c1e9574b31", @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x6, 0x1, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @local}, @time_exceeded={0xb, 0x0, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local, @multicast2}}}}}}, 0x0) 09:33:51 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="0798c593a2303d8df8dc1623f67a060de466e34712df232157116a41dc2b323a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1365.842638][ T5281] RSP: 002b:00007f8a26b14c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1365.851048][ T5281] RAX: ffffffffffffffda RBX: 00007f8a26b14c90 RCX: 000000000045af49 [ 1365.859032][ T5281] RDX: 0000000020000180 RSI: 0000000020000140 RDI: 0000000020000240 [ 1365.867009][ T5281] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1365.874988][ T5281] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f8a26b156d4 [ 1365.882957][ T5281] R13: 00000000004c8583 R14: 00000000004e06a8 R15: 0000000000000003 09:33:51 executing program 1: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000080)=ANY=[@ANYBLOB='#U'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x5000000, 0x0) 09:33:51 executing program 2: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000000)=ANY=[@ANYBLOB="c8486f7c096f949257fb9fb4f209"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:33:51 executing program 3: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000080)=ANY=[@ANYBLOB='%U'], &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) [ 1366.035496][ T5373] kAFS: unparsable volume name 09:33:51 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="2598c593a2303d8df8dc1623f67a060de466e34712df232157116a41dc2b323a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1366.138992][ T5397] kAFS: unparsable volume name 09:33:51 executing program 2: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c81", 0x10) mount(&(0x7f0000000000)=ANY=[@ANYBLOB='%', @ANYRESDEC=r0], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:33:51 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="5c98c593a2303d8df8dc1623f67a060de466e34712df232157116a41dc2b323a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:33:51 executing program 3: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000080)=ANY=[@ANYBLOB='%U'], &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) [ 1366.310250][ T5445] kAFS: unparsable volume name 09:33:51 executing program 2: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) set_thread_area(&(0x7f0000000000)={0x1ff, 0xfffffffffffffbff, 0x25b47769c0251279, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1}) r0 = socket(0x0, 0x80002, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="080db5055e0bcfe8696071") r1 = socket(0x0, 0x80002, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000000c0)="080db5055e0bcfe8696071") mount(&(0x7f0000000100)=ANY=[@ANYRESHEX=r0, @ANYRESOCT=r1], &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='logfs\x00', 0x0, 0x0) 09:33:51 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="2398c593a2303d8df8dc1623f67a060de466e34712df232157116a41dc2b323a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:33:51 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="2398c593a2253d8df8dc1623f67a060de466e34712df232157116a41dc2b323a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:33:51 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f0000000340)=ANY=[@ANYBLOB="b7020000f7ffffffbfa70000000000002402000020feffff7a0af0fff8ffffff69a4f0ff00000000b70600000018d1fe2d6405000000000075040000000000000704000000000000b7040000100000206a0700fe00000000850000002f000000b70000000a0000009500000000000000e535f8a62fc2868f0399d909a63796c113a80c19aab9d607000000b6cd483be3f0d3253730e711f5969f62c28b22756bedf3cf393d14c46cc4f79fd2b316da4f0de8163f6242fa732300000637c48468766af540439fce41f144631ac262dcae18c3d1a1fbe96dd87235b44174f7c0343185089a0f119e31975e551558055dc2dc"], &(0x7f0000000280)='GPL\x00'}, 0x48) r1 = socket$kcm(0x11, 0x8000000002, 0x300) socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000540)=r0, 0x4) syz_emit_ethernet(0x3e, &(0x7f0000000000)={@broadcast, @random="96c1e9574b31", @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x7, 0x1, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @local}, @time_exceeded={0xb, 0x0, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local, @multicast2}}}}}}, 0x0) 09:33:51 executing program 3 (fault-call:1 fault-nth:0): mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000080)=ANY=[@ANYBLOB='%U'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:33:51 executing program 1: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000080)=ANY=[@ANYBLOB='#U'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x6000000, 0x0) 09:33:51 executing program 2: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f00000015c0)=ANY=[@ANYBLOB='%'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000000)='omfs\x00', 0x0, 0x0) [ 1366.648905][ T5629] FAULT_INJECTION: forcing a failure. [ 1366.648905][ T5629] name failslab, interval 1, probability 0, space 0, times 0 [ 1366.696992][ T5629] CPU: 0 PID: 5629 Comm: syz-executor.3 Not tainted 5.5.0-rc5-syzkaller #0 [ 1366.705805][ T5629] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1366.715872][ T5629] Call Trace: [ 1366.719179][ T5629] dump_stack+0x197/0x210 [ 1366.723534][ T5629] should_fail.cold+0xa/0x15 [ 1366.728148][ T5629] ? fault_create_debugfs_attr+0x180/0x180 [ 1366.733975][ T5629] ? ___might_sleep+0x163/0x2c0 [ 1366.738843][ T5629] __should_failslab+0x121/0x190 09:33:51 executing program 2: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f00000015c0)=ANY=[@ANYBLOB="83"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1366.743794][ T5629] should_failslab+0x9/0x14 [ 1366.748312][ T5629] __kmalloc_track_caller+0x2dc/0x760 [ 1366.753708][ T5629] ? fput+0x1b/0x20 [ 1366.757524][ T5629] ? ksys_write+0x1cf/0x290 [ 1366.762048][ T5629] ? strndup_user+0x77/0xd0 [ 1366.766554][ T5629] memdup_user+0x26/0xd0 [ 1366.770803][ T5629] strndup_user+0x77/0xd0 [ 1366.775152][ T5629] __x64_sys_mount+0xe9/0x230 [ 1366.779842][ T5629] do_syscall_64+0xfa/0x790 [ 1366.784355][ T5629] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1366.790238][ T5629] RIP: 0033:0x45af49 [ 1366.794132][ T5629] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1366.813746][ T5629] RSP: 002b:00007f66b27f6c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1366.822172][ T5629] RAX: ffffffffffffffda RBX: 00007f66b27f6c90 RCX: 000000000045af49 [ 1366.830158][ T5629] RDX: 0000000020000180 RSI: 0000000020000140 RDI: 0000000020000080 [ 1366.838140][ T5629] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 09:33:52 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="2398c593a2333d8df8dc1623f67a060de466e34712df232157116a41dc2b323a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1366.838221][ T5638] kAFS: unparsable volume name [ 1366.846110][ T5629] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f66b27f76d4 [ 1366.846119][ T5629] R13: 00000000004c8583 R14: 00000000004e06a8 R15: 0000000000000003 09:33:52 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="0798c593a2303d8df8dc1623f67a060de466e34712df232157116a41dc2b323a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1366.933791][ T5638] kAFS: unparsable volume name 09:33:52 executing program 2: socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) r5 = socket(0x0, 0x80002, 0x0) ioctl(r5, 0x1000008912, &(0x7f00000000c0)="080db5055e0bcfe8696071") ioctl$VIDIOC_QUERYBUF(r2, 0xc0585609, &(0x7f00000000c0)={0xffffffff, 0x9, 0x4, 0x100000, 0x92f1, {r3, r4/1000+30000}, {0x3, 0x0, 0x80, 0x0, 0x2, 0x80, "f1bc783e"}, 0x1, 0x1, @offset=0x7fffffff, 0xfffffc01, 0x0, r5}) r7 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/sys/net/ipv4/vs/nat_icmp_send\x00', 0x2, 0x0) io_uring_register$IORING_REGISTER_EVENTFD(r6, 0x4, &(0x7f0000000240)=r7, 0x1) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f00000015c0)=ANY=[@ANYBLOB='%'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) statfs(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=""/9) 09:33:52 executing program 3 (fault-call:1 fault-nth:1): mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000080)=ANY=[@ANYBLOB='%U'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:33:52 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f0000000340)=ANY=[@ANYBLOB="b7020000f7ffffffbfa70000000000002402000020feffff7a0af0fff8ffffff69a4f0ff00000000b70600000018d1fe2d6405000000000075040000000000000704000000000000b7040000100000206a0700fe00000000850000002f000000b70000000a0000009500000000000000e535f8a62fc2868f0399d909a63796c113a80c19aab9d607000000b6cd483be3f0d3253730e711f5969f62c28b22756bedf3cf393d14c46cc4f79fd2b316da4f0de8163f6242fa732300000637c48468766af540439fce41f144631ac262dcae18c3d1a1fbe96dd87235b44174f7c0343185089a0f119e31975e551558055dc2dc"], &(0x7f0000000280)='GPL\x00'}, 0x48) r1 = socket$kcm(0x11, 0x8000000002, 0x300) socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000540)=r0, 0x4) syz_emit_ethernet(0x3e, &(0x7f0000000000)={@broadcast, @random="96c1e9574b31", @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x8, 0x1, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @local}, @time_exceeded={0xb, 0x0, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local, @multicast2}}}}}}, 0x0) 09:33:52 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="2398c593a25c3d8df8dc1623f67a060de466e34712df232157116a41dc2b323a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1367.041117][ T5744] kAFS: unparsable volume name 09:33:52 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="2598c593a2303d8df8dc1623f67a060de466e34712df232157116a41dc2b323a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1367.127607][ T5753] FAULT_INJECTION: forcing a failure. [ 1367.127607][ T5753] name failslab, interval 1, probability 0, space 0, times 0 [ 1367.192985][ T5753] CPU: 0 PID: 5753 Comm: syz-executor.3 Not tainted 5.5.0-rc5-syzkaller #0 [ 1367.201616][ T5753] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1367.211684][ T5753] Call Trace: [ 1367.214993][ T5753] dump_stack+0x197/0x210 [ 1367.219342][ T5753] should_fail.cold+0xa/0x15 [ 1367.223955][ T5753] ? fault_create_debugfs_attr+0x180/0x180 [ 1367.229774][ T5753] ? ___might_sleep+0x163/0x2c0 [ 1367.235156][ T5753] __should_failslab+0x121/0x190 [ 1367.235176][ T5753] should_failslab+0x9/0x14 [ 1367.235190][ T5753] __kmalloc_track_caller+0x2dc/0x760 [ 1367.235211][ T5753] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1367.235225][ T5753] ? strndup_user+0x77/0xd0 [ 1367.235244][ T5753] memdup_user+0x26/0xd0 [ 1367.235261][ T5753] strndup_user+0x77/0xd0 [ 1367.235279][ T5753] __x64_sys_mount+0x132/0x230 [ 1367.235301][ T5753] do_syscall_64+0xfa/0x790 [ 1367.278600][ T5753] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1367.284501][ T5753] RIP: 0033:0x45af49 09:33:52 executing program 2: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x3dd3fe00390e8f79, 0x1) mount(&(0x7f00000015c0)=ANY=[@ANYBLOB='%'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1367.288406][ T5753] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1367.308024][ T5753] RSP: 002b:00007f66b27f6c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1367.316447][ T5753] RAX: ffffffffffffffda RBX: 00007f66b27f6c90 RCX: 000000000045af49 [ 1367.316457][ T5753] RDX: 0000000020000180 RSI: 0000000020000140 RDI: 0000000020000080 [ 1367.316465][ T5753] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 09:33:52 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="2398c593a2305c8df8dc1623f67a060de466e34712df232157116a41dc2b323a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1367.316473][ T5753] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f66b27f76d4 [ 1367.316481][ T5753] R13: 00000000004c8583 R14: 00000000004e06a8 R15: 0000000000000003 [ 1367.444182][ T5965] kAFS: unparsable volume name 09:33:52 executing program 1: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000080)=ANY=[@ANYBLOB='#U'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x7000000, 0x0) 09:33:52 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="5c98c593a2303d8df8dc1623f67a060de466e34712df232157116a41dc2b323a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:33:52 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f0000000340)=ANY=[@ANYBLOB="b7020000f7ffffffbfa70000000000002402000020feffff7a0af0fff8ffffff69a4f0ff00000000b70600000018d1fe2d6405000000000075040000000000000704000000000000b7040000100000206a0700fe00000000850000002f000000b70000000a0000009500000000000000e535f8a62fc2868f0399d909a63796c113a80c19aab9d607000000b6cd483be3f0d3253730e711f5969f62c28b22756bedf3cf393d14c46cc4f79fd2b316da4f0de8163f6242fa732300000637c48468766af540439fce41f144631ac262dcae18c3d1a1fbe96dd87235b44174f7c0343185089a0f119e31975e551558055dc2dc"], &(0x7f0000000280)='GPL\x00'}, 0x48) r1 = socket$kcm(0x11, 0x8000000002, 0x300) socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000540)=r0, 0x4) syz_emit_ethernet(0x3e, &(0x7f0000000000)={@broadcast, @random="96c1e9574b31", @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0xb, 0x1, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @local}, @time_exceeded={0xb, 0x0, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local, @multicast2}}}}}}, 0x0) 09:33:52 executing program 3 (fault-call:1 fault-nth:2): mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000080)=ANY=[@ANYBLOB='%U'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:33:52 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="2398c593a2303d8df8dc1e23f67a060de466e34712df232157116a41dc2b323a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:33:52 executing program 2: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg$inet(r1, &(0x7f0000000680)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f00000000c0)="5831255624c13e4c563f221188b6be66ea", 0x11}], 0x1}}, {{&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000002c0)=[{&(0x7f0000000040)="70a6b8247e016ae2647a2e703fce46c432e37d1dffd332a793d4b9e3617386d153", 0x21}, {&(0x7f0000000200)="09f96fbf33ceccc10976cd10b1411ee57d092fd5b7f95a0f19f01005f110463ccb2c6ebdb74ad7a7da1a2bed233154886db68984d477ebee11ce9a8e3510d401f6f31ea0a7e3ec1cda7b95f7a02b42753eb4cf0bbf5afbc7084f9bc2603aafe5da6cd54e4d647ec9fd641e4241513aaf23481d1f390bbb83dfae56369f4b03367ccd45f0ec4cd929aed127394157e7b3794500c0c5f88930b1ff50bbae1163c26fff28d06028", 0xa6}, {&(0x7f0000000100)="38d6cd435749d519cc39e90540f37c4f5c6bceef6c4ae07105cafc5e25d9bbfce859670b89666cca0857aa0c2abd8722a9db0caad3905e3ff682", 0x3a}, {&(0x7f0000000140)="d71206abd00e3c0a7e2440673da6a9fc2c1255a9b136bc982a3dc2ac21ef167250c176acfbd4d13abd86b018e8b1357842d8dc93e53f6b542e9633e1db8672e8", 0x40}], 0x4}}, {{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000380)="df304451b990364b1c6ff9c843eb47125c0a16565b5efbc0494b453f9863364196a743b5d226d34b2293f3b4b8dde4b8434172dec0902f0e03c2893c2bfd5f662eefc2902850a0221d55", 0x200003ca}, {&(0x7f0000000400)}], 0x2, &(0x7f0000000540)=[@ip_tos_u8={{0x11}}, @ip_ttl={{0x14}}, @ip_ttl={{0x14}}, @ip_tos_u8={{0x11}}], 0x60}}], 0x3, 0x0) sendmsg$sock(r1, &(0x7f0000000100)={&(0x7f0000000000)=@rc={0x1f, {0x20, 0x20, 0x1, 0x80, 0xda, 0x4}, 0x7f}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000240)="3cce7506e386d594cf6de24248d3c8833dedf106b05b59d7add51a4561d9971533d5618a1bd2306bdc26c5ded611cef1841d1d1630de668a701a34f7cf270e8716334eea5807117361b3f00ba0c00a29e5742751844f7a802f73d2d011d59cdcff1395ac4a7f65fcf21c260a1a21e10db382c7ca464faa80b575ee7767e8b426da62b84ff37d917ee9023c356de878460e793fc34c9060f6593d8655dd256754e2eba3ffbf8da93b89ef29b1a875ea81821e068e995ff9f42ab1e93fe80671bfd761178f89bbe345dde54184b4c76dd01d59c3d97bea3fadd7476ab4715ed100c8646e74692ea96cfc2be011156dc66919b9930da12e06e6c19056", 0xfb}], 0x1, &(0x7f00000000c0)}, 0x40) mount(&(0x7f00000015c0)=ANY=[@ANYBLOB='%'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1367.707530][ T6081] kAFS: unparsable volume name [ 1367.721601][ T6084] kAFS: unparsable volume name [ 1367.728524][ T6083] FAULT_INJECTION: forcing a failure. [ 1367.728524][ T6083] name failslab, interval 1, probability 0, space 0, times 0 [ 1367.741742][ T6083] CPU: 0 PID: 6083 Comm: syz-executor.3 Not tainted 5.5.0-rc5-syzkaller #0 [ 1367.750611][ T6083] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1367.760677][ T6083] Call Trace: [ 1367.764512][ T6083] dump_stack+0x197/0x210 [ 1367.769389][ T6083] should_fail.cold+0xa/0x15 [ 1367.774010][ T6083] ? fault_create_debugfs_attr+0x180/0x180 [ 1367.779969][ T6083] ? ___might_sleep+0x163/0x2c0 [ 1367.784902][ T6083] __should_failslab+0x121/0x190 [ 1367.789870][ T6083] should_failslab+0x9/0x14 [ 1367.794388][ T6083] kmem_cache_alloc+0x2aa/0x710 [ 1367.799367][ T6083] ? __might_fault+0x12b/0x1e0 [ 1367.804134][ T6083] ? find_held_lock+0x35/0x130 [ 1367.804155][ T6083] getname_flags+0xd6/0x5b0 [ 1367.804175][ T6083] user_path_at_empty+0x2f/0x50 [ 1367.804194][ T6083] do_mount+0x150/0x1b50 [ 1367.804215][ T6083] ? copy_mount_string+0x40/0x40 [ 1367.804232][ T6083] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1367.804249][ T6083] ? _copy_from_user+0x12c/0x1a0 [ 1367.804268][ T6083] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1367.804282][ T6083] ? copy_mount_options+0x2e8/0x3f0 [ 1367.804301][ T6083] __x64_sys_mount+0x192/0x230 09:33:53 executing program 1: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000080)=ANY=[@ANYBLOB='#U'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x8000000, 0x0) [ 1367.804326][ T6083] do_syscall_64+0xfa/0x790 [ 1367.860361][ T6083] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1367.866440][ T6083] RIP: 0033:0x45af49 [ 1367.870366][ T6083] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1367.890064][ T6083] RSP: 002b:00007f66b27f6c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1367.898484][ T6083] RAX: ffffffffffffffda RBX: 00007f66b27f6c90 RCX: 000000000045af49 09:33:53 executing program 2: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f00000015c0)=ANY=[@ANYBLOB="03"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) ioctl$TIOCCBRK(0xffffffffffffffff, 0x5428) 09:33:53 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="2398c593a2303d8df8dc5c23f67a060de466e34712df232157116a41dc2b323a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:33:53 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="2398c593a2253d8df8dc1623f67a060de466e34712df232157116a41dc2b323a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1367.906479][ T6083] RDX: 0000000020000180 RSI: 0000000020000140 RDI: 0000000020000080 [ 1367.914447][ T6083] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1367.914456][ T6083] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f66b27f76d4 [ 1367.914464][ T6083] R13: 00000000004c8583 R14: 00000000004e06a8 R15: 0000000000000003 [ 1368.074625][ T6295] kAFS: unparsable volume name 09:33:53 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="2398c593a2333d8df8dc1623f67a060de466e34712df232157116a41dc2b323a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:33:53 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="2398c593a2303d8df8dc1607f67a060de466e34712df232157116a41dc2b323a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1368.108348][ T6295] kAFS: unparsable volume name 09:33:53 executing program 3 (fault-call:1 fault-nth:3): mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000080)=ANY=[@ANYBLOB='%U'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:33:53 executing program 2: mount(&(0x7f00000015c0)=ANY=[@ANYBLOB='%'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:33:53 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f0000000340)=ANY=[@ANYBLOB="b7020000f7ffffffbfa70000000000002402000020feffff7a0af0fff8ffffff69a4f0ff00000000b70600000018d1fe2d6405000000000075040000000000000704000000000000b7040000100000206a0700fe00000000850000002f000000b70000000a0000009500000000000000e535f8a62fc2868f0399d909a63796c113a80c19aab9d607000000b6cd483be3f0d3253730e711f5969f62c28b22756bedf3cf393d14c46cc4f79fd2b316da4f0de8163f6242fa732300000637c48468766af540439fce41f144631ac262dcae18c3d1a1fbe96dd87235b44174f7c0343185089a0f119e31975e551558055dc2dc"], &(0x7f0000000280)='GPL\x00'}, 0x48) r1 = socket$kcm(0x11, 0x8000000002, 0x300) socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000540)=r0, 0x4) syz_emit_ethernet(0x3e, &(0x7f0000000000)={@broadcast, @random="96c1e9574b31", @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x11, 0x1, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @local}, @time_exceeded={0xb, 0x0, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local, @multicast2}}}}}}, 0x0) [ 1368.282765][ T6405] FAULT_INJECTION: forcing a failure. [ 1368.282765][ T6405] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1368.296012][ T6405] CPU: 0 PID: 6405 Comm: syz-executor.3 Not tainted 5.5.0-rc5-syzkaller #0 [ 1368.304604][ T6405] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1368.315105][ T6405] Call Trace: [ 1368.318414][ T6405] dump_stack+0x197/0x210 [ 1368.322764][ T6405] should_fail.cold+0xa/0x15 [ 1368.327370][ T6405] ? fault_create_debugfs_attr+0x180/0x180 [ 1368.333191][ T6405] ? __kasan_check_read+0x11/0x20 [ 1368.338226][ T6405] ? __lock_acquire+0x16f2/0x4a00 [ 1368.343271][ T6405] should_fail_alloc_page+0x50/0x60 [ 1368.348495][ T6405] __alloc_pages_nodemask+0x1a1/0x910 [ 1368.354587][ T6405] ? fs_reclaim_release+0xf/0x30 [ 1368.359632][ T6405] ? __alloc_pages_slowpath+0x2920/0x2920 [ 1368.365366][ T6405] ? fs_reclaim_release+0xf/0x30 [ 1368.370322][ T6405] ? fault_create_debugfs_attr+0x180/0x180 [ 1368.376147][ T6405] cache_grow_begin+0x90/0xc60 [ 1368.380916][ T6405] ? getname_flags+0xd6/0x5b0 [ 1368.385585][ T6405] ? trace_hardirqs_off+0x62/0x240 [ 1368.390694][ T6405] kmem_cache_alloc+0x64e/0x710 [ 1368.395534][ T6405] ? __might_fault+0x12b/0x1e0 [ 1368.400297][ T6405] getname_flags+0xd6/0x5b0 [ 1368.404801][ T6405] user_path_at_empty+0x2f/0x50 [ 1368.409656][ T6405] do_mount+0x150/0x1b50 [ 1368.413889][ T6405] ? copy_mount_string+0x40/0x40 [ 1368.418814][ T6405] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1368.427911][ T6405] ? _copy_from_user+0x12c/0x1a0 [ 1368.432925][ T6405] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1368.439325][ T6405] ? copy_mount_options+0x2e8/0x3f0 [ 1368.444524][ T6405] __x64_sys_mount+0x192/0x230 [ 1368.449278][ T6405] do_syscall_64+0xfa/0x790 [ 1368.453783][ T6405] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1368.459668][ T6405] RIP: 0033:0x45af49 [ 1368.463554][ T6405] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 09:33:53 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="2398c593a25c3d8df8dc1623f67a060de466e34712df232157116a41dc2b323a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1368.483155][ T6405] RSP: 002b:00007f66b27f6c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1368.491560][ T6405] RAX: ffffffffffffffda RBX: 00007f66b27f6c90 RCX: 000000000045af49 [ 1368.499530][ T6405] RDX: 0000000020000180 RSI: 0000000020000140 RDI: 0000000020000080 [ 1368.507487][ T6405] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1368.515444][ T6405] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f66b27f76d4 [ 1368.523496][ T6405] R13: 00000000004c8583 R14: 00000000004e06a8 R15: 0000000000000003 09:33:53 executing program 2: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="2398c593a2305c8df8dc1623f67a060de466e34712df232157116a41dc2b323a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:33:53 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="2398c593a2303d8df8dc1625f67a060de466e34712df232157116a41dc2b323a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:33:54 executing program 1: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000080)=ANY=[@ANYBLOB='#U'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x10000000, 0x0) 09:33:54 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="2398c593a2305c8df8dc1623f67a060de466e34712df232157116a41dc2b323a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:33:54 executing program 2: socket(0x10, 0x2, 0x0) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x802, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0xc06855c8, &(0x7f0000000140)={0xc, 0xc34f, {0x53, 0xc4, 0x6, {0xfff}, {0x1}, @const={0x7, {0x81, 0x5, 0x3}}}, {0x51, 0x1f, 0x8, {0xb0f8, 0x6}, {0x7}, @const={0xd415, {0x2, 0x4, 0x0, 0x5}}}}) pidfd_send_signal(0xffffffffffffffff, 0x0, 0x0, 0x0) open$dir(&(0x7f00000000c0)='./file0\x00', 0x41, 0x7a2bd7823df72184) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) semtimedop(0xffffffffffffffff, &(0x7f0000000080)=[{0x2, 0xfff}, {0x4}, {0x0, 0x8001, 0x1000}, {0x0, 0x9, 0x800}, {0x1, 0x47a}, {0x1, 0x2d5, 0x1800}, {0x2, 0x2e1c, 0x800}, {0x0, 0x2, 0x800}], 0x8, &(0x7f00000001c0)={0x77359400}) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000180)=[@in6={0xa, 0x4e22, 0x0, @ipv4={[0x0, 0x0, 0x0, 0xfec0000000000000], [], @local}}, @in={0x2, 0x0, @remote}], 0x2c) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000000240)=[@in6={0xa, 0x4e20, 0x0, @ipv4={[], [], @loopback}, 0xffb}, @in={0x2, 0x4e20, @rand_addr=0x94}], 0x2c) 09:33:54 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f0000000340)=ANY=[@ANYBLOB="b7020000f7ffffffbfa70000000000002402000020feffff7a0af0fff8ffffff69a4f0ff00000000b70600000018d1fe2d6405000000000075040000000000000704000000000000b7040000100000206a0700fe00000000850000002f000000b70000000a0000009500000000000000e535f8a62fc2868f0399d909a63796c113a80c19aab9d607000000b6cd483be3f0d3253730e711f5969f62c28b22756bedf3cf393d14c46cc4f79fd2b316da4f0de8163f6242fa732300000637c48468766af540439fce41f144631ac262dcae18c3d1a1fbe96dd87235b44174f7c0343185089a0f119e31975e551558055dc2dc"], &(0x7f0000000280)='GPL\x00'}, 0x48) r1 = socket$kcm(0x11, 0x8000000002, 0x300) socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000540)=r0, 0x4) syz_emit_ethernet(0x3e, &(0x7f0000000000)={@broadcast, @random="96c1e9574b31", @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x1c, 0x1, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @local}, @time_exceeded={0xb, 0x0, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local, @multicast2}}}}}}, 0x0) 09:33:54 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="2398c593a2303d8df8dc165cf67a060de466e34712df232157116a41dc2b323a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:33:54 executing program 3 (fault-call:1 fault-nth:4): mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000080)=ANY=[@ANYBLOB='%U'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1368.915541][ T6533] FAULT_INJECTION: forcing a failure. [ 1368.915541][ T6533] name failslab, interval 1, probability 0, space 0, times 0 [ 1368.947846][ T6533] CPU: 0 PID: 6533 Comm: syz-executor.3 Not tainted 5.5.0-rc5-syzkaller #0 [ 1368.956478][ T6533] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1368.966541][ T6533] Call Trace: [ 1368.969852][ T6533] dump_stack+0x197/0x210 [ 1368.974204][ T6533] should_fail.cold+0xa/0x15 [ 1368.978816][ T6533] ? fault_create_debugfs_attr+0x180/0x180 [ 1368.984630][ T6533] ? ___might_sleep+0x163/0x2c0 [ 1368.989482][ T6533] __should_failslab+0x121/0x190 [ 1368.994431][ T6533] should_failslab+0x9/0x14 [ 1368.998943][ T6533] __kmalloc+0x2e0/0x770 [ 1369.003187][ T6533] ? save_stack+0x5c/0x90 [ 1369.007536][ T6533] ? tomoyo_encode2.part.0+0xf5/0x400 [ 1369.012920][ T6533] tomoyo_encode2.part.0+0xf5/0x400 [ 1369.018123][ T6533] ? do_syscall_64+0xfa/0x790 [ 1369.022992][ T6533] tomoyo_encode+0x2b/0x50 [ 1369.027420][ T6533] tomoyo_mount_acl+0xe0/0x840 [ 1369.032279][ T6533] ? debug_check_no_obj_freed+0x20a/0x43f [ 1369.038013][ T6533] ? __kasan_check_read+0x11/0x20 [ 1369.043049][ T6533] ? mark_lock+0xc2/0x1220 [ 1369.047487][ T6533] ? tomoyo_check_mount_acl+0x1b0/0x1b0 [ 1369.053052][ T6533] ? __kasan_check_read+0x11/0x20 [ 1369.058084][ T6533] ? __lock_acquire+0x8a0/0x4a00 09:33:54 executing program 1: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000080)=ANY=[@ANYBLOB='#U'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x20000000, 0x0) [ 1369.063046][ T6533] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1369.069455][ T6533] ? debug_smp_processor_id+0x33/0x18a [ 1369.074929][ T6533] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 1369.082329][ T6533] ? lock_acquire+0x190/0x410 [ 1369.087106][ T6533] ? tomoyo_mount_permission+0x10a/0x400 [ 1369.092754][ T6533] tomoyo_mount_permission+0x16a/0x400 [ 1369.098209][ T6533] ? tomoyo_mount_permission+0x10a/0x400 [ 1369.103857][ T6533] ? tomoyo_mount_acl+0x840/0x840 [ 1369.108909][ T6533] ? strncpy_from_user+0x2b4/0x400 [ 1369.114029][ T6533] tomoyo_sb_mount+0x35/0x40 [ 1369.118619][ T6533] security_sb_mount+0x87/0xd0 [ 1369.123390][ T6533] do_mount+0x1d4/0x1b50 [ 1369.127650][ T6533] ? copy_mount_string+0x40/0x40 [ 1369.132604][ T6533] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1369.138855][ T6533] ? _copy_from_user+0x12c/0x1a0 [ 1369.143810][ T6533] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1369.150062][ T6533] ? copy_mount_options+0x2e8/0x3f0 [ 1369.155282][ T6533] __x64_sys_mount+0x192/0x230 [ 1369.160072][ T6533] do_syscall_64+0xfa/0x790 09:33:54 executing program 1: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000080)=ANY=[@ANYBLOB='#U'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x20100000, 0x0) [ 1369.164587][ T6533] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1369.170482][ T6533] RIP: 0033:0x45af49 [ 1369.174387][ T6533] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1369.193996][ T6533] RSP: 002b:00007f66b27f6c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1369.202446][ T6533] RAX: ffffffffffffffda RBX: 00007f66b27f6c90 RCX: 000000000045af49 09:33:54 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="2398c593a2303d8df8dc1623f65c060de466e34712df232157116a41dc2b323a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:33:54 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="2398c593a2303d8df8dc1e23f67a060de466e34712df232157116a41dc2b323a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1369.210425][ T6533] RDX: 0000000020000180 RSI: 0000000020000140 RDI: 0000000020000080 [ 1369.210434][ T6533] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1369.210443][ T6533] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f66b27f76d4 [ 1369.210451][ T6533] R13: 00000000004c8583 R14: 00000000004e06a8 R15: 0000000000000003 09:33:54 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="2398c593a2303d8df8dc5c23f67a060de466e34712df232157116a41dc2b323a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:33:54 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="2398c593a2303d8df8dc1623f67a020de466e34712df232157116a41dc2b323a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:33:54 executing program 2: sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x8200, 0x0) getsockopt$IP_SET_OP_GET_BYNAME(r0, 0x1, 0x53, &(0x7f0000000080)={0x6, 0x7, 'syz2\x00'}, &(0x7f00000000c0)=0x28) r1 = socket$inet(0x10, 0x800, 0x40) ioctl$sock_ifreq(r1, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00', @ifru_flags=0x2}) r2 = syz_open_dev$media(&(0x7f0000000780)='/dev/media#\x00', 0x4dd8, 0x6c2002) setsockopt$XDP_UMEM_FILL_RING(r2, 0x11b, 0x5, &(0x7f0000000140)=0x1, 0x0) ioctl$USBDEVFS_CLEAR_HALT(r0, 0x80045515, &(0x7f0000000100)={0xa}) 09:33:54 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f0000000340)=ANY=[@ANYBLOB="b7020000f7ffffffbfa70000000000002402000020feffff7a0af0fff8ffffff69a4f0ff00000000b70600000018d1fe2d6405000000000075040000000000000704000000000000b7040000100000206a0700fe00000000850000002f000000b70000000a0000009500000000000000e535f8a62fc2868f0399d909a63796c113a80c19aab9d607000000b6cd483be3f0d3253730e711f5969f62c28b22756bedf3cf393d14c46cc4f79fd2b316da4f0de8163f6242fa732300000637c48468766af540439fce41f144631ac262dcae18c3d1a1fbe96dd87235b44174f7c0343185089a0f119e31975e551558055dc2dc"], &(0x7f0000000280)='GPL\x00'}, 0x48) r1 = socket$kcm(0x11, 0x8000000002, 0x300) socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000540)=r0, 0x4) syz_emit_ethernet(0x3e, &(0x7f0000000000)={@broadcast, @random="96c1e9574b31", @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x21, 0x1, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @local}, @time_exceeded={0xb, 0x0, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local, @multicast2}}}}}}, 0x0) 09:33:54 executing program 3 (fault-call:1 fault-nth:5): mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000080)=ANY=[@ANYBLOB='%U'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:33:54 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="2398c593a2303d8df8dc1623f67a030de466e34712df232157116a41dc2b323a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:33:54 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x3, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_DRAIN(r1, 0x40045731, &(0x7f0000000040)=0xffffffff) ioctl$SIOCSIFMTU(r2, 0x8922, &(0x7f0000000000)={'hsr0\x00', 0x5dc}) [ 1369.632221][ T6865] FAULT_INJECTION: forcing a failure. [ 1369.632221][ T6865] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1369.645459][ T6865] CPU: 1 PID: 6865 Comm: syz-executor.3 Not tainted 5.5.0-rc5-syzkaller #0 [ 1369.654169][ T6865] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1369.654177][ T6865] Call Trace: [ 1369.654201][ T6865] dump_stack+0x197/0x210 [ 1369.654223][ T6865] should_fail.cold+0xa/0x15 [ 1369.654236][ T6865] ? __kmalloc+0x163/0x770 [ 1369.654254][ T6865] ? fault_create_debugfs_attr+0x180/0x180 [ 1369.654268][ T6865] ? do_mount+0x1d4/0x1b50 [ 1369.654289][ T6865] ? __x64_sys_mount+0x192/0x230 [ 1369.696217][ T6865] ? do_syscall_64+0xfa/0x790 [ 1369.700917][ T6865] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1369.707794][ T6865] should_fail_alloc_page+0x50/0x60 [ 1369.713008][ T6865] __alloc_pages_nodemask+0x1a1/0x910 [ 1369.718398][ T6865] ? is_bpf_text_address+0xce/0x160 [ 1369.723609][ T6865] ? __alloc_pages_slowpath+0x2920/0x2920 [ 1369.729349][ T6865] ? unwind_get_return_address+0x61/0xa0 [ 1369.731935][ T6967] hsr0: A HSR master's MTU cannot be greater than the smallest MTU of its slaves minus the HSR Tag length (6 octets). [ 1369.734999][ T6865] ? fault_create_debugfs_attr+0x180/0x180 [ 1369.735021][ T6865] cache_grow_begin+0x90/0xc60 [ 1369.735044][ T6865] ? tomoyo_realpath_from_path+0xc5/0x660 [ 1369.763748][ T6865] ? trace_hardirqs_off+0x62/0x240 [ 1369.768982][ T6865] __kmalloc+0x6b2/0x770 [ 1369.773238][ T6865] ? __kmalloc+0x608/0x770 [ 1369.777684][ T6865] ? tomoyo_realpath_from_path+0xc5/0x660 [ 1369.783424][ T6865] tomoyo_realpath_from_path+0xc5/0x660 [ 1369.788993][ T6865] tomoyo_mount_acl+0x149/0x840 [ 1369.793855][ T6865] ? debug_check_no_obj_freed+0x20a/0x43f [ 1369.799598][ T6865] ? __kasan_check_read+0x11/0x20 [ 1369.804630][ T6865] ? mark_lock+0xc2/0x1220 [ 1369.809057][ T6865] ? tomoyo_check_mount_acl+0x1b0/0x1b0 [ 1369.814617][ T6865] ? __kasan_check_read+0x11/0x20 [ 1369.819652][ T6865] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1369.825908][ T6865] ? debug_smp_processor_id+0x33/0x18a [ 1369.831480][ T6865] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 1369.837667][ T6865] ? lock_acquire+0x190/0x410 [ 1369.842472][ T6865] ? tomoyo_mount_permission+0x10a/0x400 [ 1369.842496][ T6865] tomoyo_mount_permission+0x16a/0x400 [ 1369.842510][ T6865] ? tomoyo_mount_permission+0x10a/0x400 [ 1369.842531][ T6865] ? tomoyo_mount_acl+0x840/0x840 [ 1369.853603][ T6865] ? strncpy_from_user+0x2b4/0x400 [ 1369.869336][ T6865] tomoyo_sb_mount+0x35/0x40 [ 1369.873952][ T6865] security_sb_mount+0x87/0xd0 [ 1369.878739][ T6865] do_mount+0x1d4/0x1b50 [ 1369.883005][ T6865] ? copy_mount_string+0x40/0x40 [ 1369.887959][ T6865] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1369.894209][ T6865] ? _copy_from_user+0x12c/0x1a0 [ 1369.899167][ T6865] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1369.905429][ T6865] ? copy_mount_options+0x2e8/0x3f0 [ 1369.910652][ T6865] __x64_sys_mount+0x192/0x230 [ 1369.915553][ T6865] do_syscall_64+0xfa/0x790 [ 1369.920080][ T6865] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1369.926065][ T6865] RIP: 0033:0x45af49 [ 1369.929969][ T6865] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1369.949580][ T6865] RSP: 002b:00007f66b27f6c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1369.958006][ T6865] RAX: ffffffffffffffda RBX: 00007f66b27f6c90 RCX: 000000000045af49 [ 1369.965990][ T6865] RDX: 0000000020000180 RSI: 0000000020000140 RDI: 0000000020000080 [ 1369.973981][ T6865] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 09:33:54 executing program 1: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000080)=ANY=[@ANYBLOB='#U'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x40000000, 0x0) 09:33:55 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="2398c593a2303d8df8dc1623f67a040de466e34712df232157116a41dc2b323a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:33:55 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="2398c593a2303d8df8dc1623f67a050de466e34712df232157116a41dc2b323a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:33:55 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="2398c593a2303d8df8dc1623f67a070de466e34712df232157116a41dc2b323a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:33:55 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f0000000340)=ANY=[@ANYBLOB="b7020000f7ffffffbfa70000000000002402000020feffff7a0af0fff8ffffff69a4f0ff00000000b70600000018d1fe2d6405000000000075040000000000000704000000000000b7040000100000206a0700fe00000000850000002f000000b70000000a0000009500000000000000e535f8a62fc2868f0399d909a63796c113a80c19aab9d607000000b6cd483be3f0d3253730e711f5969f62c28b22756bedf3cf393d14c46cc4f79fd2b316da4f0de8163f6242fa732300000637c48468766af540439fce41f144631ac262dcae18c3d1a1fbe96dd87235b44174f7c0343185089a0f119e31975e551558055dc2dc"], &(0x7f0000000280)='GPL\x00'}, 0x48) r1 = socket$kcm(0x11, 0x8000000002, 0x300) socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000540)=r0, 0x4) syz_emit_ethernet(0x3e, &(0x7f0000000000)={@broadcast, @random="96c1e9574b31", @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x2f, 0x1, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @local}, @time_exceeded={0xb, 0x0, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local, @multicast2}}}}}}, 0x0) 09:33:55 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="2398c593a2303d8df8dc1607f67a060de466e34712df232157116a41dc2b323a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1369.981968][ T6865] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f66b27f76d4 [ 1369.989947][ T6865] R13: 00000000004c8583 R14: 00000000004e06a8 R15: 0000000000000003 09:33:55 executing program 3 (fault-call:1 fault-nth:6): mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000080)=ANY=[@ANYBLOB='%U'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:33:55 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="2398c593a2303d8df8dc1625f67a060de466e34712df232157116a41dc2b323a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:33:55 executing program 2: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="2398c593a2303d8df8dc1623f67a050de466e34712df232157116a41dc2b323a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:33:55 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="2398c593a2303d8df8dc1623f67a100de466e34712df232157116a41dc2b323a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:33:55 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f0000000340)=ANY=[@ANYBLOB="b7020000f7ffffffbfa70000000000002402000020feffff7a0af0fff8ffffff69a4f0ff00000000b70600000018d1fe2d6405000000000075040000000000000704000000000000b7040000100000206a0700fe00000000850000002f000000b70000000a0000009500000000000000e535f8a62fc2868f0399d909a63796c113a80c19aab9d607000000b6cd483be3f0d3253730e711f5969f62c28b22756bedf3cf393d14c46cc4f79fd2b316da4f0de8163f6242fa732300000637c48468766af540439fce41f144631ac262dcae18c3d1a1fbe96dd87235b44174f7c0343185089a0f119e31975e551558055dc2dc"], &(0x7f0000000280)='GPL\x00'}, 0x48) r1 = socket$kcm(0x11, 0x8000000002, 0x300) socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000540)=r0, 0x4) syz_emit_ethernet(0x3e, &(0x7f0000000000)={@broadcast, @random="96c1e9574b31", @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x30, 0x1, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @local}, @time_exceeded={0xb, 0x0, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local, @multicast2}}}}}}, 0x0) [ 1370.338698][ T7196] FAULT_INJECTION: forcing a failure. [ 1370.338698][ T7196] name failslab, interval 1, probability 0, space 0, times 0 [ 1370.412928][ T7196] CPU: 0 PID: 7196 Comm: syz-executor.3 Not tainted 5.5.0-rc5-syzkaller #0 [ 1370.421634][ T7196] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1370.431707][ T7196] Call Trace: [ 1370.435014][ T7196] dump_stack+0x197/0x210 [ 1370.439449][ T7196] should_fail.cold+0xa/0x15 [ 1370.444056][ T7196] ? fault_create_debugfs_attr+0x180/0x180 [ 1370.449878][ T7196] ? ___might_sleep+0x163/0x2c0 [ 1370.454745][ T7196] __should_failslab+0x121/0x190 [ 1370.459872][ T7196] should_failslab+0x9/0x14 [ 1370.464381][ T7196] __kmalloc+0x2e0/0x770 [ 1370.468638][ T7196] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1370.474893][ T7196] ? d_absolute_path+0x11b/0x170 [ 1370.479843][ T7196] ? __d_path+0x140/0x140 [ 1370.484183][ T7196] ? tomoyo_encode2.part.0+0xf5/0x400 [ 1370.489566][ T7196] tomoyo_encode2.part.0+0xf5/0x400 [ 1370.494765][ T7196] tomoyo_encode+0x2b/0x50 [ 1370.494781][ T7196] tomoyo_realpath_from_path+0x19c/0x660 [ 1370.494803][ T7196] tomoyo_mount_acl+0x149/0x840 [ 1370.494819][ T7196] ? debug_check_no_obj_freed+0x20a/0x43f [ 1370.494837][ T7196] ? __kasan_check_read+0x11/0x20 [ 1370.494851][ T7196] ? mark_lock+0xc2/0x1220 [ 1370.494868][ T7196] ? tomoyo_check_mount_acl+0x1b0/0x1b0 [ 1370.494884][ T7196] ? __kasan_check_read+0x11/0x20 [ 1370.494901][ T7196] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1370.494921][ T7196] ? debug_smp_processor_id+0x33/0x18a [ 1370.547203][ T7196] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 1370.553501][ T7196] ? lock_acquire+0x190/0x410 [ 1370.558196][ T7196] ? tomoyo_mount_permission+0x10a/0x400 [ 1370.563856][ T7196] tomoyo_mount_permission+0x16a/0x400 [ 1370.569329][ T7196] ? tomoyo_mount_permission+0x10a/0x400 [ 1370.574975][ T7196] ? tomoyo_mount_acl+0x840/0x840 [ 1370.580053][ T7196] ? strncpy_from_user+0x2b4/0x400 [ 1370.585183][ T7196] tomoyo_sb_mount+0x35/0x40 [ 1370.589794][ T7196] security_sb_mount+0x87/0xd0 [ 1370.594578][ T7196] do_mount+0x1d4/0x1b50 [ 1370.598844][ T7196] ? copy_mount_string+0x40/0x40 [ 1370.603830][ T7196] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 09:33:55 executing program 1: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000080)=ANY=[@ANYBLOB='#U'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x8cffffff, 0x0) 09:33:55 executing program 1: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000080)=ANY=[@ANYBLOB='#U'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0xc0ed0000, 0x0) [ 1370.610163][ T7196] ? _copy_from_user+0x12c/0x1a0 [ 1370.615115][ T7196] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1370.621374][ T7196] ? copy_mount_options+0x2e8/0x3f0 [ 1370.626586][ T7196] __x64_sys_mount+0x192/0x230 [ 1370.631366][ T7196] do_syscall_64+0xfa/0x790 [ 1370.635915][ T7196] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1370.641815][ T7196] RIP: 0033:0x45af49 [ 1370.645717][ T7196] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1370.665588][ T7196] RSP: 002b:00007f66b27f6c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1370.665603][ T7196] RAX: ffffffffffffffda RBX: 00007f66b27f6c90 RCX: 000000000045af49 [ 1370.665611][ T7196] RDX: 0000000020000180 RSI: 0000000020000140 RDI: 0000000020000080 [ 1370.665618][ T7196] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1370.665626][ T7196] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f66b27f76d4 [ 1370.665634][ T7196] R13: 00000000004c8583 R14: 00000000004e06a8 R15: 0000000000000003 09:33:55 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f0000000340)=ANY=[@ANYBLOB="b7020000f7ffffffbfa70000000000002402000020feffff7a0af0fff8ffffff69a4f0ff00000000b70600000018d1fe2d6405000000000075040000000000000704000000000000b7040000100000206a0700fe00000000850000002f000000b70000000a0000009500000000000000e535f8a62fc2868f0399d909a63796c113a80c19aab9d607000000b6cd483be3f0d3253730e711f5969f62c28b22756bedf3cf393d14c46cc4f79fd2b316da4f0de8163f6242fa732300000637c48468766af540439fce41f144631ac262dcae18c3d1a1fbe96dd87235b44174f7c0343185089a0f119e31975e551558055dc2dc"], &(0x7f0000000280)='GPL\x00'}, 0x48) r1 = socket$kcm(0x11, 0x8000000002, 0x300) socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000540)=r0, 0x4) syz_emit_ethernet(0x3e, &(0x7f0000000000)={@broadcast, @random="96c1e9574b31", @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x3a, 0x1, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @local}, @time_exceeded={0xb, 0x0, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local, @multicast2}}}}}}, 0x0) 09:33:55 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="2398c593a2303d8df8dc165cf67a060de466e34712df232157116a41dc2b323a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:33:55 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="2398c593a2303d8df8dc1623f67a140de466e34712df232157116a41dc2b323a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:33:55 executing program 2: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="2398c593a2303d8df8dc1623f67a040de466e34712df232157116a41dc2b323a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1370.713890][ T7196] ERROR: Out of memory at tomoyo_realpath_from_path. 09:33:55 executing program 3 (fault-call:1 fault-nth:7): mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000080)=ANY=[@ANYBLOB='%U'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:33:56 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget$private(0x0, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) shmat(r0, &(0x7f0000000000/0x4000)=nil, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x24749d39b667d841) shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0x0) r1 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) shmat(r1, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffffff) r2 = socket(0x0, 0x80002, 0x0) ioctl(r2, 0x1000008912, &(0x7f00000000c0)="080db5055e0bcfe8696071") getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000040)=ANY=[@ANYRES32=r3, @ANYBLOB="0000df3057ab7d1ee9f8f9af19f357779b0e84f2ad52db79dd8fb47dc6f2a5bb80bd381598c2cb1f26aecb2d24e0993261ece112a6d6763070ab8072187f99fd8d3019f0f25aaa00995ce2b07d1d37d304fa088e4f2d4c5bfae25e70ee668fbfce"], 0xa) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000000)={r3, 0x6, 0x30}, 0xc) 09:33:56 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="2398c593a2303d8df8dc1623f65c060de466e34712df232157116a41dc2b323a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:33:56 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="2398c593a2303d8df8dc1623f67a1e0de466e34712df232157116a41dc2b323a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1370.989352][ T7388] FAULT_INJECTION: forcing a failure. [ 1370.989352][ T7388] name failslab, interval 1, probability 0, space 0, times 0 [ 1371.028791][ T7388] CPU: 1 PID: 7388 Comm: syz-executor.3 Not tainted 5.5.0-rc5-syzkaller #0 [ 1371.037421][ T7388] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1371.047483][ T7388] Call Trace: [ 1371.050794][ T7388] dump_stack+0x197/0x210 [ 1371.055148][ T7388] should_fail.cold+0xa/0x15 [ 1371.059765][ T7388] ? fault_create_debugfs_attr+0x180/0x180 [ 1371.065593][ T7388] ? ___might_sleep+0x163/0x2c0 [ 1371.070464][ T7388] __should_failslab+0x121/0x190 [ 1371.075515][ T7388] should_failslab+0x9/0x14 [ 1371.080032][ T7388] __kmalloc+0x2e0/0x770 [ 1371.084294][ T7388] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1371.090547][ T7388] ? d_absolute_path+0x11b/0x170 [ 1371.095505][ T7388] ? __d_path+0x140/0x140 [ 1371.099859][ T7388] ? tomoyo_encode2.part.0+0xf5/0x400 [ 1371.105246][ T7388] tomoyo_encode2.part.0+0xf5/0x400 [ 1371.110466][ T7388] tomoyo_encode+0x2b/0x50 [ 1371.114900][ T7388] tomoyo_realpath_from_path+0x19c/0x660 [ 1371.120583][ T7388] tomoyo_mount_acl+0x149/0x840 [ 1371.125444][ T7388] ? debug_check_no_obj_freed+0x20a/0x43f [ 1371.131176][ T7388] ? __kasan_check_read+0x11/0x20 [ 1371.136471][ T7388] ? mark_lock+0xc2/0x1220 [ 1371.140485][ T27] audit: type=1800 audit(1578562436.183:35): pid=7426 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.2" name="SYSV00000000" dev="hugetlbfs" ino=2 res=0 [ 1371.140899][ T7388] ? tomoyo_check_mount_acl+0x1b0/0x1b0 [ 1371.166473][ T7388] ? __kasan_check_read+0x11/0x20 [ 1371.171518][ T7388] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1371.177777][ T7388] ? debug_smp_processor_id+0x33/0x18a [ 1371.183257][ T7388] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 1371.189439][ T7388] ? lock_acquire+0x190/0x410 [ 1371.194133][ T7388] ? tomoyo_mount_permission+0x10a/0x400 [ 1371.199778][ T7388] tomoyo_mount_permission+0x16a/0x400 [ 1371.205238][ T7388] ? tomoyo_mount_permission+0x10a/0x400 [ 1371.210875][ T7388] ? tomoyo_mount_acl+0x840/0x840 [ 1371.216143][ T7388] ? strncpy_from_user+0x2b4/0x400 [ 1371.221278][ T7388] tomoyo_sb_mount+0x35/0x40 [ 1371.225882][ T7388] security_sb_mount+0x87/0xd0 [ 1371.230673][ T7388] do_mount+0x1d4/0x1b50 [ 1371.235114][ T7388] ? copy_mount_string+0x40/0x40 [ 1371.240060][ T7388] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1371.246304][ T7388] ? _copy_from_user+0x12c/0x1a0 [ 1371.251250][ T7388] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1371.257674][ T7388] ? copy_mount_options+0x2e8/0x3f0 [ 1371.262880][ T7388] __x64_sys_mount+0x192/0x230 [ 1371.267655][ T7388] do_syscall_64+0xfa/0x790 [ 1371.272177][ T7388] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1371.278068][ T7388] RIP: 0033:0x45af49 [ 1371.281966][ T7388] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1371.301576][ T7388] RSP: 002b:00007f66b27f6c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1371.310269][ T7388] RAX: ffffffffffffffda RBX: 00007f66b27f6c90 RCX: 000000000045af49 [ 1371.318239][ T7388] RDX: 0000000020000180 RSI: 0000000020000140 RDI: 0000000020000080 [ 1371.326212][ T7388] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 09:33:56 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="2398c593a2303d8df8dc1623f67a5c0de466e34712df232157116a41dc2b323a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:33:56 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="2398c593a2303d8df8dc1623f67a020de466e34712df232157116a41dc2b323a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1371.334181][ T7388] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f66b27f76d4 [ 1371.342154][ T7388] R13: 00000000004c8583 R14: 00000000004e06a8 R15: 0000000000000003 09:33:56 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f0000000340)=ANY=[@ANYBLOB="b7020000f7ffffffbfa70000000000002402000020feffff7a0af0fff8ffffff69a4f0ff00000000b70600000018d1fe2d6405000000000075040000000000000704000000000000b7040000100000206a0700fe00000000850000002f000000b70000000a0000009500000000000000e535f8a62fc2868f0399d909a63796c113a80c19aab9d607000000b6cd483be3f0d3253730e711f5969f62c28b22756bedf3cf393d14c46cc4f79fd2b316da4f0de8163f6242fa732300000637c48468766af540439fce41f144631ac262dcae18c3d1a1fbe96dd87235b44174f7c0343185089a0f119e31975e551558055dc2dc"], &(0x7f0000000280)='GPL\x00'}, 0x48) r1 = socket$kcm(0x11, 0x8000000002, 0x300) socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000540)=r0, 0x4) syz_emit_ethernet(0x3e, &(0x7f0000000000)={@broadcast, @random="96c1e9574b31", @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0xff, 0x1, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @local}, @time_exceeded={0xb, 0x0, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local, @multicast2}}}}}}, 0x0) [ 1371.539891][ T7388] ERROR: Out of memory at tomoyo_realpath_from_path. 09:33:56 executing program 1: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000080)=ANY=[@ANYBLOB='#U'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0xf6ffffff, 0x0) 09:33:56 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="2398c593a2303d8df8dc1623f67a0610e466e34712df232157116a41dc2b323a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:33:56 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="2398c593a2303d8df8dc1623f67a030de466e34712df232157116a41dc2b323a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:33:56 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000080)='/dev/input/event#\x00', 0xc, 0x121041) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x400000, 0x0) ioctl$USBDEVFS_BULK(r1, 0xc0185502, &(0x7f0000000040)={{{0x7}}, 0x8e, 0x20, &(0x7f0000000100)="d37f2394a5f7a501febad2f67a25da7d726e903887b16e9e7ab7c13cb8bec5fa96b97600506b88bd492f483791ca5054b85d3ab7ea654f49787ac57d6b6bc880594ed6b08fd6feb8c67780f1f717afc9005b5d7281fdeed57a436da770c03b4633e6c7e4fdb8c1a65144f29317ccbe6bcc2c31da79942e2d01faa89f6cb1754e8a4dbe4cfcd93580b3bb08e919ce"}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400004) socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = fcntl$dupfd(r4, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$EVIOCSFF(r6, 0x40304580, &(0x7f00000001c0)={0x0, 0x0, 0x0, {0x400, 0xfffe}, {0x20, 0xe17c}, @const={0xfff, {0x81, 0xfff, 0x4, 0x21a}}}) r7 = accept$inet(r1, &(0x7f00000005c0), &(0x7f0000000600)=0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000580)={r8, 0x0, 0x1, [0x0]}, 0xa) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r6, 0x84, 0x6, &(0x7f0000000400)={r8, @in6={{0xa, 0x4e23, 0x6, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x7}}}, &(0x7f00000004c0)=0x84) r9 = socket$alg(0x26, 0x5, 0x0) bind$alg(r9, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r10 = accept4(r9, 0x0, 0x0, 0x0) sendmmsg$inet(r10, &(0x7f0000000680)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f00000000c0)="5831255624c13e4c563f221188b6be66ea", 0x11}], 0x1}}, {{&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000002c0)=[{&(0x7f0000000040)="70a6b8247e016ae2647a2e703fce46c432e37d1dffd332a793d4b9e3617386d153", 0x21}, {&(0x7f0000000200)="09f96fbf33ceccc10976cd10b1411ee57d092fd5b7f95a0f19f01005f110463ccb2c6ebdb74ad7a7da1a2bed233154886db68984d477ebee11ce9a8e3510d401f6f31ea0a7e3ec1cda7b95f7a02b42753eb4cf0bbf5afbc7084f9bc2603aafe5da6cd54e4d647ec9fd641e4241513aaf23481d1f390bbb83dfae56369f4b03367ccd45f0ec4cd929aed127394157e7b3794500c0c5f88930b1ff50bbae1163c26fff28d06028", 0xa6}, {&(0x7f0000000100)="38d6cd435749d519cc39e90540f37c4f5c6bceef6c4ae07105cafc5e25d9bbfce859670b89666cca0857aa0c2abd8722a9db0caad3905e3ff682", 0x3a}, {&(0x7f0000000140)="d71206abd00e3c0a7e2440673da6a9fc2c1255a9b136bc982a3dc2ac21ef167250c176acfbd4d13abd86b018e8b1357842d8dc93e53f6b542e9633e1db8672e8", 0x40}], 0x4}}, {{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000380)="df304451b990364b1c6ff9c843eb47125c0a16565b5efbc0494b453f9863364196a743b5d226d34b2293f3b4b8dde4b8434172dec0902f0e03c2893c2bfd5f662eefc2902850a0221d55", 0x200003ca}, {&(0x7f0000000400)}], 0x2, &(0x7f0000000540)=[@ip_tos_u8={{0x11}}, @ip_ttl={{0x14}}, @ip_ttl={{0x14}}, @ip_tos_u8={{0x11}}], 0x60}}], 0x3, 0x0) ioctl$FS_IOC_FSGETXATTR(r10, 0x801c581f, &(0x7f00000000c0)={0xfffffff7, 0x81, 0x4, 0x7d, 0x5}) ioctl$VIDIOC_S_HW_FREQ_SEEK(r1, 0x40305652, &(0x7f0000000300)={0xdf, 0x2, 0x2, 0x4, 0x6, 0x1ff, 0x1}) bind$l2tp(r7, &(0x7f0000000640)={0x2, 0x0, @rand_addr=0x10000, 0x1}, 0x10) ioctl$VT_WAITACTIVE(r3, 0x5607) write$evdev(r0, &(0x7f0000000040), 0x373) ioctl$DRM_IOCTL_SET_UNIQUE(r1, 0x40106410, &(0x7f0000000340)={0x1000, &(0x7f0000000840)="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"}) 09:33:56 executing program 3 (fault-call:1 fault-nth:8): mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000080)=ANY=[@ANYBLOB='%U'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1371.713837][ T7650] FAULT_INJECTION: forcing a failure. [ 1371.713837][ T7650] name failslab, interval 1, probability 0, space 0, times 0 [ 1371.736624][ T7650] CPU: 1 PID: 7650 Comm: syz-executor.3 Not tainted 5.5.0-rc5-syzkaller #0 [ 1371.745255][ T7650] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1371.755323][ T7650] Call Trace: [ 1371.755352][ T7650] dump_stack+0x197/0x210 [ 1371.755372][ T7650] should_fail.cold+0xa/0x15 [ 1371.755390][ T7650] ? fault_create_debugfs_attr+0x180/0x180 [ 1371.755412][ T7650] ? ___might_sleep+0x163/0x2c0 [ 1371.778286][ T7650] __should_failslab+0x121/0x190 [ 1371.783339][ T7650] should_failslab+0x9/0x14 [ 1371.787946][ T7650] kmem_cache_alloc_trace+0x2d3/0x790 [ 1371.793945][ T7650] ? lockdep_init_map+0x1be/0x6d0 [ 1371.798986][ T7650] ? afs_alloc_inode+0x220/0x220 [ 1371.803943][ T7650] afs_init_fs_context+0x4a/0x5b0 [ 1371.809110][ T7650] ? afs_alloc_inode+0x220/0x220 [ 1371.814063][ T7650] alloc_fs_context+0x4d1/0x810 [ 1371.814084][ T7650] fs_context_for_mount+0x25/0x30 [ 1371.814105][ T7650] do_mount+0x11b2/0x1b50 [ 1371.828334][ T7650] ? copy_mount_string+0x40/0x40 [ 1371.833291][ T7650] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1371.833310][ T7650] ? _copy_from_user+0x12c/0x1a0 [ 1371.833327][ T7650] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1371.833348][ T7650] ? copy_mount_options+0x2e8/0x3f0 [ 1371.855957][ T7650] __x64_sys_mount+0x192/0x230 [ 1371.860726][ T7650] do_syscall_64+0xfa/0x790 [ 1371.865223][ T7650] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1371.871101][ T7650] RIP: 0033:0x45af49 [ 1371.874988][ T7650] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1371.895038][ T7650] RSP: 002b:00007f66b27f6c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1371.904044][ T7650] RAX: ffffffffffffffda RBX: 00007f66b27f6c90 RCX: 000000000045af49 09:33:56 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f0000000340)=ANY=[@ANYBLOB="b7020000f7ffffffbfa70000000000002402000020feffff7a0af0fff8ffffff69a4f0ff00000000b70600000018d1fe2d6405000000000075040000000000000704000000000000b7040000100000206a0700fe00000000850000002f000000b70000000a0000009500000000000000e535f8a62fc2868f0399d909a63796c113a80c19aab9d607000000b6cd483be3f0d3253730e711f5969f62c28b22756bedf3cf393d14c46cc4f79fd2b316da4f0de8163f6242fa732300000637c48468766af540439fce41f144631ac262dcae18c3d1a1fbe96dd87235b44174f7c0343185089a0f119e31975e551558055dc2dc"], &(0x7f0000000280)='GPL\x00'}, 0x48) r1 = socket$kcm(0x11, 0x8000000002, 0x300) socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000540)=r0, 0x4) syz_emit_ethernet(0x3e, &(0x7f0000000000)={@broadcast, @random="96c1e9574b31", @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @local}, @time_exceeded={0xb, 0x0, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local, @multicast2}}}}}}, 0x0) 09:33:56 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="2398c593a2303d8df8dc1623f67a040de466e34712df232157116a41dc2b323a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:33:56 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="2398c593a2303d8df8dc1623f67a0614e466e34712df232157116a41dc2b323a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1371.913153][ T7650] RDX: 0000000020000180 RSI: 0000000020000140 RDI: 0000000020000080 [ 1371.921120][ T7650] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1371.929825][ T7650] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f66b27f76d4 [ 1371.937800][ T7650] R13: 00000000004c8583 R14: 00000000004e06a8 R15: 0000000000000003 09:33:57 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f0000000340)=ANY=[@ANYBLOB="b7020000f7ffffffbfa70000000000002402000020feffff7a0af0fff8ffffff69a4f0ff00000000b70600000018d1fe2d6405000000000075040000000000000704000000000000b7040000100000206a0700fe00000000850000002f000000b70000000a0000009500000000000000e535f8a62fc2868f0399d909a63796c113a80c19aab9d607000000b6cd483be3f0d3253730e711f5969f62c28b22756bedf3cf393d14c46cc4f79fd2b316da4f0de8163f6242fa732300000637c48468766af540439fce41f144631ac262dcae18c3d1a1fbe96dd87235b44174f7c0343185089a0f119e31975e551558055dc2dc"], &(0x7f0000000280)='GPL\x00'}, 0x48) r1 = socket$kcm(0x11, 0x8000000002, 0x300) socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000540)=r0, 0x4) syz_emit_ethernet(0x3e, &(0x7f0000000000)={@broadcast, @random="96c1e9574b31", @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @local}, @time_exceeded={0xb, 0x0, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local, @multicast2}}}}}}, 0x0) 09:33:57 executing program 2: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) ioctl$VIDIOC_ENUM_FREQ_BANDS(0xffffffffffffffff, 0xc0405665, &(0x7f00000000c0)={0x1, 0x3, 0x1, 0x0, 0x1, 0xfff, 0x8}) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x40, 0x7e, 0x8, 0x1e, 0x0, 0x5, 0x22018, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffb, 0xae4e4af420666a15, @perf_bp={&(0x7f0000000080), 0x6}, 0x2b490fabcb8399f, 0x7, 0x600, 0x4, 0xa, 0xb, 0x80}, r1, 0xd, 0xffffffffffffffff, 0xdcb1ae8218c4b727) getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000200)={'nat\x00'}, &(0x7f0000000280)=0x78) r2 = socket(0x0, 0x80002, 0x0) ioctl(r2, 0x1000008912, &(0x7f00000000c0)="080db5055e0bcfe8696071") r3 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vga_arbiter\x00', 0x54200, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r5 = accept4(r4, 0x0, 0x0, 0x0) sendmmsg$inet(r5, &(0x7f0000000680)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f00000000c0)="5831255624c13e4c563f221188b6be66ea", 0x11}], 0x1}}, {{&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000002c0)=[{&(0x7f0000000040)="70a6b8247e016ae2647a2e703fce46c432e37d1dffd332a793d4b9e3617386d153", 0x21}, {&(0x7f0000000200)="09f96fbf33ceccc10976cd10b1411ee57d092fd5b7f95a0f19f01005f110463ccb2c6ebdb74ad7a7da1a2bed233154886db68984d477ebee11ce9a8e3510d401f6f31ea0a7e3ec1cda7b95f7a02b42753eb4cf0bbf5afbc7084f9bc2603aafe5da6cd54e4d647ec9fd641e4241513aaf23481d1f390bbb83dfae56369f4b03367ccd45f0ec4cd929aed127394157e7b3794500c0c5f88930b1ff50bbae1163c26fff28d06028", 0xa6}, {&(0x7f0000000100)="38d6cd435749d519cc39e90540f37c4f5c6bceef6c4ae07105cafc5e25d9bbfce859670b89666cca0857aa0c2abd8722a9db0caad3905e3ff682", 0x3a}, {&(0x7f0000000140)="d71206abd00e3c0a7e2440673da6a9fc2c1255a9b136bc982a3dc2ac21ef167250c176acfbd4d13abd86b018e8b1357842d8dc93e53f6b542e9633e1db8672e8", 0x40}], 0x4}}, {{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000380)="df304451b990364b1c6ff9c843eb47125c0a16565b5efbc0494b453f9863364196a743b5d226d34b2293f3b4b8dde4b8434172dec0902f0e03c2893c2bfd5f662eefc2902850a0221d55", 0x200003ca}, {&(0x7f0000000400)}], 0x2, &(0x7f0000000540)=[@ip_tos_u8={{0x11}}, @ip_ttl={{0x14}}, @ip_ttl={{0x14}}, @ip_tos_u8={{0x11}}], 0x60}}], 0x3, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000600)=ANY=[@ANYBLOB="01000000217f4818c95ff1801e25c1ac9f72f5903d1198a1709ece55ea326bb5ca2d9f", @ANYRES32=0x0], &(0x7f000095dffc)=0x8) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000580)=ANY=[@ANYRES32=r6, @ANYBLOB], 0xa) getsockopt$inet_sctp_SCTP_ASSOCINFO(r5, 0x84, 0x1, &(0x7f00000004c0)={r6, 0x7f, 0x4, 0x80000000, 0x1, 0x5}, &(0x7f0000000500)=0x14) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r3, 0x84, 0x77, &(0x7f0000000540)={r7, 0x4, 0x3, [0x6, 0x923, 0x4]}, 0xe) write$UHID_INPUT(r3, &(0x7f0000000b40)={0x8, {"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", 0x1000}}, 0x1006) getsockopt$inet_sctp_SCTP_PR_STREAM_STATUS(r2, 0x84, 0x74, &(0x7f00000002c0)=""/150, &(0x7f00000003c0)=0x96) r8 = socket$alg(0x26, 0x5, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r5, 0x0, 0x48c, &(0x7f00000005c0)={0x4, 'ip6erspan0\x00', 0x2}, 0x18) bind$alg(r8, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) accept4(r8, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r8, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c81", 0x10) ioctl$VIDIOC_PREPARE_BUF(0xffffffffffffffff, 0xc058565d, &(0x7f0000000400)={0x6, 0x1, 0x4, 0x200000, 0x1ff, {0x0, 0x2710}, {0x5, 0x8, 0xff, 0x3, 0x7f, 0x5, "e86a1bc2"}, 0x81, 0x3, @userptr=0x8, 0xffff7fff, 0x0, r8}) ioctl$PIO_FONTRESET(r9, 0x4b6d, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, &(0x7f0000000ac0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}) 09:33:57 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="2398c593a2303d8df8dc1623f67a050de466e34712df232157116a41dc2b323a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:33:57 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="2398c593a2303d8df8dc1623f67a061ee466e34712df232157116a41dc2b323a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:33:57 executing program 1: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000080)=ANY=[@ANYBLOB='#U'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0xf9fdffff, 0x0) 09:33:57 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="2398c593a2303d8df8dc1623f67a070de466e34712df232157116a41dc2b323a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:33:57 executing program 3 (fault-call:1 fault-nth:9): mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000080)=ANY=[@ANYBLOB='%U'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:33:57 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f0000000340)=ANY=[@ANYBLOB="b7020000f7ffffffbfa70000000000002402000020feffff7a0af0fff8ffffff69a4f0ff00000000b70600000018d1fe2d6405000000000075040000000000000704000000000000b7040000100000206a0700fe00000000850000002f000000b70000000a0000009500000000000000e535f8a62fc2868f0399d909a63796c113a80c19aab9d607000000b6cd483be3f0d3253730e711f5969f62c28b22756bedf3cf393d14c46cc4f79fd2b316da4f0de8163f6242fa732300000637c48468766af540439fce41f144631ac262dcae18c3d1a1fbe96dd87235b44174f7c0343185089a0f119e31975e551558055dc2dc"], &(0x7f0000000280)='GPL\x00'}, 0x48) r1 = socket$kcm(0x11, 0x8000000002, 0x300) socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000540)=r0, 0x4) syz_emit_ethernet(0x3e, &(0x7f0000000000)={@broadcast, @random="96c1e9574b31", @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x3, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @local}, @time_exceeded={0xb, 0x0, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local, @multicast2}}}}}}, 0x0) 09:33:57 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="2398c593a2303d8df8dc1623f67a065ce466e34712df232157116a41dc2b323a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:33:57 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) socket$kcm(0x11, 0xa, 0x300) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000800)) socket$kcm(0x2, 0x1000000000000002, 0x0) socket$kcm(0x29, 0x2, 0x0) ptrace$setopts(0x4206, 0x0, 0x2, 0x300000) socket$kcm(0x10, 0x2, 0x4) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000)='/dev/bsg\x00', 0x2, 0x0) ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f0000000080)) socket$kcm(0xa, 0x2, 0x11) socket$kcm(0x11, 0x200000000000002, 0x300) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) r2 = gettid() kcmp(0x0, r2, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) sched_setaffinity(r2, 0x8, &(0x7f0000000100)=0x6) socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = fcntl$dupfd(r3, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r7 = socket$inet_udplite(0x2, 0x2, 0x88) r8 = fcntl$dupfd(r6, 0x0, r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) r9 = openat$cgroup_ro(r0, &(0x7f00000001c0)='hugetlb.2MB.usage_in_bytes\x00', 0x26e1, 0x0) r10 = socket$kcm(0x2, 0x2, 0x0) r11 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x84a00, 0x0) sendmsg$kcm(r11, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000400)="7141c0cc986496a1850b8c3b7dc38c582d802eeb74b792f6b6e39df09d1dec58e80545798e1a400d8adc2ff27858cda973efc9d8ae14ce1ec772580d8aa35674c8e21f6624178e93a5d99d82e1b1fb7ab708903cc111674256be9466da80a8ca1ad935a8ae393476fcf0d8a24b34fa72776373cd33f4b51e41a3145ee1ff4f8630223df12fa3fe1e4ac9b6302075277dce986e4550de9ccbafb29814e925c8fe661e76eb9fe9f72bc070ca29980e8f7c2ef84f9dd4588d4d82a753da2382b49c3ed2393acf8f0aee3554469523251ec35bfbe7f55d0222e38edc48096ee8d55bd107488b6eb23e789b2a9424f107ca53f228108af83167", 0xf7}, {&(0x7f0000000300)="408f33e3bf03bdab413a59b5e11f82ef72a46c7c29ec1cc9e1f94ac2da21762a47ca933e90d6571c5767914a47b5fd3829c28433d4daafd87642772576bbdfac6ba933c30b9a9b", 0x47}, {&(0x7f0000000280)="5c0fe4bf20da6af1bb9ef50fc89812e6757053b38a16e2a62876bee3385be81f2966b2b54bd631be74b6664694e092d244a902bf3cb2c5c478", 0x39}, {&(0x7f0000000500)="d071e6d0350f3b6f52d1f40d644624ca1d04e95c64039d6eb2db053bc36ce0a395094f6818418a11eb57e354a4e78c03a5ce820ebabd0b5146dd1da96102804190fede202c1052e09c96", 0x4a}], 0x4, &(0x7f0000000580)=[{0xa8, 0xc858f36be3c93472, 0x2, "225b74684b4dffc9584abec94d8e63fc17a5491fab0ba4a94e695c29963f273e227122f89dde84b02af20715e89968736fda53c578a25cd62fa97bed6df531535d9d809a67d7520b6929397f6dc404627e27083771b57cdf6ca8770fc09932df5bfd7806542e067ca91e6e0f34ad9bc46064e0e3153fcf6584ba36edc5d732d3bc46d3dd589666518965aa4a0b12d8bf17"}, {0x70, 0x103, 0x6, "d7bc5c6899e9c6cfdc610e4f4cd95a20ed85b68d9c6ba43d1c459b323a994995e5042d03e2aade7fb1bbbbedad3c6b0d74f39643484f5ee7ecbee797ac2646107a8083e0cf7fbebdd54cb2a6ddda773047ef3408411e8068dd5c75f7a5"}], 0x118}, 0x84) setsockopt$sock_attach_bpf(r10, 0x1, 0x3e, &(0x7f00000002c0)=r9, 0x161) sendmsg$kcm(r10, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1=0xe000006a}, 0x80, 0x0}, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(r9, 0x40505331, &(0x7f00000006c0)={{0x3f, 0x49}, {0x3, 0x9}, 0x81, 0x2}) [ 1372.505454][ T7984] FAULT_INJECTION: forcing a failure. [ 1372.505454][ T7984] name failslab, interval 1, probability 0, space 0, times 0 [ 1372.545015][ T7984] CPU: 1 PID: 7984 Comm: syz-executor.3 Not tainted 5.5.0-rc5-syzkaller #0 [ 1372.553648][ T7984] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1372.563714][ T7984] Call Trace: [ 1372.567025][ T7984] dump_stack+0x197/0x210 [ 1372.571379][ T7984] should_fail.cold+0xa/0x15 [ 1372.575992][ T7984] ? fault_create_debugfs_attr+0x180/0x180 [ 1372.581804][ T7984] ? ___might_sleep+0x163/0x2c0 [ 1372.581827][ T7984] __should_failslab+0x121/0x190 [ 1372.581850][ T7984] should_failslab+0x9/0x14 [ 1372.591635][ T7984] kmem_cache_alloc_trace+0x2d3/0x790 [ 1372.591653][ T7984] ? lockdep_init_map+0x1be/0x6d0 [ 1372.591672][ T7984] ? afs_alloc_inode+0x220/0x220 [ 1372.591689][ T7984] afs_init_fs_context+0x4a/0x5b0 [ 1372.591709][ T7984] ? afs_alloc_inode+0x220/0x220 [ 1372.621433][ T7984] alloc_fs_context+0x4d1/0x810 [ 1372.626308][ T7984] fs_context_for_mount+0x25/0x30 [ 1372.631348][ T7984] do_mount+0x11b2/0x1b50 [ 1372.635702][ T7984] ? copy_mount_string+0x40/0x40 [ 1372.640651][ T7984] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1372.640669][ T7984] ? _copy_from_user+0x12c/0x1a0 [ 1372.640690][ T7984] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1372.651843][ T7984] ? copy_mount_options+0x2e8/0x3f0 [ 1372.651864][ T7984] __x64_sys_mount+0x192/0x230 [ 1372.651885][ T7984] do_syscall_64+0xfa/0x790 [ 1372.651906][ T7984] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1372.678453][ T7984] RIP: 0033:0x45af49 [ 1372.682359][ T7984] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 09:33:57 executing program 1: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000080)=ANY=[@ANYBLOB='#U'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0xff000000, 0x0) 09:33:57 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="2398c593a2303d8df8dc1623f67a060de425e34712df232157116a41dc2b323a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:33:57 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="2398c593a2303d8df8dc1623f67a100de466e34712df232157116a41dc2b323a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:33:57 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="2398c593a2303d8df8dc1623f67a060de42ee34712df232157116a41dc2b323a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1372.701970][ T7984] RSP: 002b:00007f66b27f6c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1372.710478][ T7984] RAX: ffffffffffffffda RBX: 00007f66b27f6c90 RCX: 000000000045af49 [ 1372.718460][ T7984] RDX: 0000000020000180 RSI: 0000000020000140 RDI: 0000000020000080 [ 1372.726442][ T7984] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1372.734423][ T7984] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f66b27f76d4 [ 1372.742429][ T7984] R13: 00000000004c8583 R14: 00000000004e06a8 R15: 0000000000000003 09:33:58 executing program 3 (fault-call:1 fault-nth:10): mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000080)=ANY=[@ANYBLOB='%U'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:33:58 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="2398c593a2303d8df8dc1623f67a060de42fe34712df232157116a41dc2b323a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:33:58 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="2398c593a2303d8df8dc1623f67a140de466e34712df232157116a41dc2b323a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:33:58 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f0000000340)=ANY=[@ANYBLOB="b7020000f7ffffffbfa70000000000002402000020feffff7a0af0fff8ffffff69a4f0ff00000000b70600000018d1fe2d6405000000000075040000000000000704000000000000b7040000100000206a0700fe00000000850000002f000000b70000000a0000009500000000000000e535f8a62fc2868f0399d909a63796c113a80c19aab9d607000000b6cd483be3f0d3253730e711f5969f62c28b22756bedf3cf393d14c46cc4f79fd2b316da4f0de8163f6242fa732300000637c48468766af540439fce41f144631ac262dcae18c3d1a1fbe96dd87235b44174f7c0343185089a0f119e31975e551558055dc2dc"], &(0x7f0000000280)='GPL\x00'}, 0x48) r1 = socket$kcm(0x11, 0x8000000002, 0x300) socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000540)=r0, 0x4) syz_emit_ethernet(0x3e, &(0x7f0000000000)={@broadcast, @random="96c1e9574b31", @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x4, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @local}, @time_exceeded={0xb, 0x0, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local, @multicast2}}}}}}, 0x0) 09:33:58 executing program 2: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="2398c593a2303d8df8dc1623f67a100de466e34712df232157116a41dc2b323a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1372.987096][ T8202] FAULT_INJECTION: forcing a failure. [ 1372.987096][ T8202] name failslab, interval 1, probability 0, space 0, times 0 [ 1373.039914][ T4724] ------------[ cut here ]------------ [ 1373.045885][ T4724] name '哢0=#z /g#!wja+2' [ 1373.051818][ T4724] WARNING: CPU: 0 PID: 4724 at fs/proc/generic.c:178 __xlate_proc_name+0xe7/0x110 [ 1373.052907][ T8202] CPU: 1 PID: 8202 Comm: syz-executor.3 Not tainted 5.5.0-rc5-syzkaller #0 [ 1373.061027][ T4724] Kernel panic - not syncing: panic_on_warn set ... [ 1373.069609][ T8202] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1373.086227][ T8202] Call Trace: [ 1373.089516][ T8202] dump_stack+0x197/0x210 [ 1373.093841][ T8202] should_fail.cold+0xa/0x15 [ 1373.098420][ T8202] ? fault_create_debugfs_attr+0x180/0x180 [ 1373.104216][ T8202] ? ___might_sleep+0x163/0x2c0 [ 1373.109055][ T8202] __should_failslab+0x121/0x190 [ 1373.114103][ T8202] should_failslab+0x9/0x14 [ 1373.118602][ T8202] kmem_cache_alloc_trace+0x2d3/0x790 [ 1373.123959][ T8202] ? lockdep_init_map+0x1be/0x6d0 [ 1373.128970][ T8202] ? afs_alloc_inode+0x220/0x220 [ 1373.133930][ T8202] afs_init_fs_context+0x4a/0x5b0 [ 1373.138956][ T8202] ? afs_alloc_inode+0x220/0x220 [ 1373.143912][ T8202] alloc_fs_context+0x4d1/0x810 [ 1373.148765][ T8202] fs_context_for_mount+0x25/0x30 [ 1373.153785][ T8202] do_mount+0x11b2/0x1b50 [ 1373.158110][ T8202] ? copy_mount_string+0x40/0x40 [ 1373.163040][ T8202] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1373.169272][ T8202] ? _copy_from_user+0x12c/0x1a0 [ 1373.174204][ T8202] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1373.180433][ T8202] ? copy_mount_options+0x2e8/0x3f0 [ 1373.185625][ T8202] __x64_sys_mount+0x192/0x230 [ 1373.190392][ T8202] do_syscall_64+0xfa/0x790 [ 1373.194888][ T8202] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1373.200764][ T8202] RIP: 0033:0x45af49 [ 1373.204650][ T8202] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1373.224237][ T8202] RSP: 002b:00007f66b27f6c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1373.233327][ T8202] RAX: ffffffffffffffda RBX: 00007f66b27f6c90 RCX: 000000000045af49 [ 1373.241287][ T8202] RDX: 0000000020000180 RSI: 0000000020000140 RDI: 0000000020000080 [ 1373.249245][ T8202] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1373.257204][ T8202] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f66b27f76d4 [ 1373.265173][ T8202] R13: 00000000004c8583 R14: 00000000004e06a8 R15: 0000000000000003 [ 1373.273155][ T4724] CPU: 0 PID: 4724 Comm: kworker/0:0 Not tainted 5.5.0-rc5-syzkaller #0 [ 1373.281506][ T4724] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1373.291579][ T4724] Workqueue: afs afs_manage_cell [ 1373.296524][ T4724] Call Trace: [ 1373.299815][ T4724] dump_stack+0x197/0x210 [ 1373.304142][ T4724] ? __xlate_proc_name+0x10/0x110 [ 1373.309418][ T4724] panic+0x2e3/0x75c [ 1373.313323][ T4724] ? add_taint.cold+0x16/0x16 [ 1373.317991][ T4724] ? __kasan_check_write+0x14/0x20 [ 1373.323092][ T4724] ? __warn.cold+0x14/0x3e [ 1373.327492][ T4724] ? __warn+0xd9/0x1cf [ 1373.331555][ T4724] ? __xlate_proc_name+0xe7/0x110 [ 1373.336575][ T4724] __warn.cold+0x2f/0x3e [ 1373.340808][ T4724] ? __xlate_proc_name+0xe7/0x110 [ 1373.345818][ T4724] report_bug+0x289/0x300 [ 1373.350198][ T4724] do_error_trap+0x11b/0x200 [ 1373.354781][ T4724] do_invalid_op+0x37/0x50 [ 1373.359197][ T4724] ? __xlate_proc_name+0xe7/0x110 [ 1373.364212][ T4724] invalid_op+0x23/0x30 [ 1373.368359][ T4724] RIP: 0010:__xlate_proc_name+0xe7/0x110 [ 1373.373992][ T4724] Code: 3f eb 90 ff 44 89 e0 48 83 c4 08 5b 41 5c 41 5d 41 5e 41 5f 5d c3 e8 28 eb 90 ff 4c 89 fe 48 c7 c7 40 18 39 88 e8 88 99 61 ff <0f> 0b 41 bc fe ff ff ff eb cb 4c 89 f7 e8 37 a4 ce ff e9 3d ff ff [ 1373.393598][ T4724] RSP: 0018:ffffc9000839f9d0 EFLAGS: 00010282 [ 1373.399650][ T4724] RAX: 0000000000000000 RBX: ffff88806234f549 RCX: 0000000000000000 [ 1373.407610][ T4724] RDX: 0000000000000000 RSI: ffffffff815e8506 RDI: fffff52001073f2c [ 1373.415579][ T4724] RBP: ffffc9000839fa00 R08: ffff888093b30000 R09: fffffbfff165eba6 [ 1373.423535][ T4724] R10: fffffbfff165eba5 R11: ffffffff8b2f5d2f R12: 0000000000000000 [ 1373.431503][ T4724] R13: ffff88806234f539 R14: ffffc9000839fb08 R15: ffff88806234f539 [ 1373.439540][ T4724] ? vprintk_func+0x86/0x189 [ 1373.444124][ T4724] __proc_create+0xac/0x860 [ 1373.448611][ T4724] ? pde_free+0x110/0x110 [ 1373.453368][ T4724] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 1373.459505][ T4724] proc_mkdir_data+0xbc/0x1b0 [ 1373.464169][ T4724] ? proc_symlink+0x1c0/0x1c0 [ 1373.468881][ T4724] ? fscache_free_cookie+0x110/0x1c0 [ 1373.474156][ T4724] afs_proc_cell_setup+0x95/0x190 [ 1373.479186][ T4724] afs_manage_cell+0x54b/0x1410 [ 1373.484026][ T4724] ? afs_put_cell.part.0+0x180/0x180 [ 1373.489300][ T4724] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 1373.495089][ T4724] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 1373.501054][ T4724] ? trace_hardirqs_on+0x67/0x240 [ 1373.506065][ T4724] process_one_work+0x9af/0x1740 [ 1373.510993][ T4724] ? pwq_dec_nr_in_flight+0x320/0x320 [ 1373.516345][ T4724] ? lock_acquire+0x190/0x410 [ 1373.521014][ T4724] worker_thread+0x98/0xe40 [ 1373.525545][ T4724] ? trace_hardirqs_on+0x67/0x240 [ 1373.530587][ T4724] kthread+0x361/0x430 [ 1373.534648][ T4724] ? process_one_work+0x1740/0x1740 [ 1373.540116][ T4724] ? kthread_mod_delayed_work+0x1f0/0x1f0 [ 1373.545949][ T4724] ret_from_fork+0x24/0x30 [ 1373.551964][ T4724] Kernel Offset: disabled [ 1373.556393][ T4724] Rebooting in 86400 seconds..