[ 79.359811][ T27] audit: type=1800 audit(1578563246.802:25): pid=9837 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="cron" dev="sda1" ino=2414 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. [ 80.288395][ T27] kauditd_printk_skb: 3 callbacks suppressed [ 80.288408][ T27] audit: type=1800 audit(1578563247.732:29): pid=9837 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="rc.local" dev="sda1" ino=2432 res=0 [ 80.315062][ T27] audit: type=1800 audit(1578563247.732:30): pid=9837 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="rmnologin" dev="sda1" ino=2423 res=0 Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.101' (ECDSA) to the list of known hosts. 2020/01/09 09:47:39 fuzzer started 2020/01/09 09:47:41 dialing manager at 10.128.0.26:41863 2020/01/09 09:47:41 syscalls: 2649 2020/01/09 09:47:41 code coverage: enabled 2020/01/09 09:47:41 comparison tracing: enabled 2020/01/09 09:47:41 extra coverage: enabled 2020/01/09 09:47:41 setuid sandbox: enabled 2020/01/09 09:47:41 namespace sandbox: enabled 2020/01/09 09:47:41 Android sandbox: /sys/fs/selinux/policy does not exist 2020/01/09 09:47:41 fault injection: enabled 2020/01/09 09:47:41 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2020/01/09 09:47:41 net packet injection: enabled 2020/01/09 09:47:41 net device setup: enabled 2020/01/09 09:47:41 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 2020/01/09 09:47:41 devlink PCI setup: PCI device 0000:00:10.0 is not available 09:49:04 executing program 0: ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000300)={&(0x7f00000000c0)=""/106, 0xfffffffffffffef2}) clone(0x49b96b00, 0x0, 0x0, 0x0, &(0x7f0000000300)) ioctl$KDFONTOP_SET_DEF(0xffffffffffffffff, 0x4b72, &(0x7f0000000040)={0x2, 0x0, 0x0, 0x0, 0x0, 0x0}) syz_open_dev$ttys(0xc, 0x2, 0x1) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="2ef4a834d7b40040049679a4dff8c11963870c63999b"], 0x16) recvmsg(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x8a1636a888c5dbc, 0x0, 0xffffffffffffff90, 0x0, 0x47931cccd02bdc31}, 0x0) 09:49:04 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x109}], 0x4, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x266, 0x0}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) syzkaller login: [ 177.253264][T10008] IPVS: ftp: loaded support on port[0] = 21 [ 177.464295][T10008] chnl_net:caif_netlink_parms(): no params data found [ 177.480304][T10011] IPVS: ftp: loaded support on port[0] = 21 09:49:05 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/135, 0x75}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='net/snmp\x00') preadv(r0, &(0x7f0000000480), 0x10000000000001e2, 0x0) syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x81801) socket$inet6_tcp(0xa, 0x1, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x2802, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x1, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f00000006c0)=ANY=[@ANYBLOB]) [ 177.549066][T10008] bridge0: port 1(bridge_slave_0) entered blocking state [ 177.559865][T10008] bridge0: port 1(bridge_slave_0) entered disabled state [ 177.568810][T10008] device bridge_slave_0 entered promiscuous mode [ 177.605294][T10008] bridge0: port 2(bridge_slave_1) entered blocking state [ 177.620877][T10008] bridge0: port 2(bridge_slave_1) entered disabled state [ 177.628975][T10008] device bridge_slave_1 entered promiscuous mode [ 177.710363][T10013] IPVS: ftp: loaded support on port[0] = 21 [ 177.730147][T10008] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 177.745273][T10008] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 177.839815][T10008] team0: Port device team_slave_0 added [ 177.850209][T10008] team0: Port device team_slave_1 added [ 177.878492][T10011] chnl_net:caif_netlink_parms(): no params data found 09:49:05 executing program 3: ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000100)=""/125, 0x7d}) clone(0x48b94b00, 0x0, 0x0, 0x0, &(0x7f0000000300)) ioctl$KDFONTOP_SET_DEF(0xffffffffffffffff, 0x4b72, 0x0) syz_open_procfs(0x0, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, "138000001900000000000000000000ebff00"}) recvmsg(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0xd0de9b99170b7ead, 0x0, 0xfffffcf4, 0x0, 0x1d6}, 0x0) [ 177.966813][T10008] device hsr_slave_0 entered promiscuous mode [ 178.020895][T10008] device hsr_slave_1 entered promiscuous mode [ 178.160730][T10016] IPVS: ftp: loaded support on port[0] = 21 [ 178.239553][T10011] bridge0: port 1(bridge_slave_0) entered blocking state [ 178.247425][T10011] bridge0: port 1(bridge_slave_0) entered disabled state [ 178.258248][T10011] device bridge_slave_0 entered promiscuous mode 09:49:05 executing program 4: ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000300)={&(0x7f00000000c0)=""/116, 0x74}) clone(0x49b96b00, 0x0, 0x0, 0x0, &(0x7f0000000300)) ioctl$KDFONTOP_SET_DEF(0xffffffffffffffff, 0x4b72, 0x0) syz_open_dev$ptys(0xc, 0x3, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="16a33f7fdf7b1e7f00000000000000f79fbbc543ba47d8eba378059838a1077dfe5ea1ac64ac8501b5868d227b6cc3cd00c3156c930b0c22dccae6000080e6e4cda2c20dc1976728d66cb55cfcb0f548f20ea74b4f66"], 0x56) recvmsg(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x14f, 0x0, 0xfffffffffffffd48}, 0x0) [ 178.305044][T10013] chnl_net:caif_netlink_parms(): no params data found [ 178.314520][T10011] bridge0: port 2(bridge_slave_1) entered blocking state [ 178.338291][T10011] bridge0: port 2(bridge_slave_1) entered disabled state [ 178.361851][T10011] device bridge_slave_1 entered promiscuous mode [ 178.493569][T10011] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 178.520828][T10011] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 178.544746][T10019] IPVS: ftp: loaded support on port[0] = 21 [ 178.601409][T10011] team0: Port device team_slave_0 added [ 178.624649][T10008] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 178.685645][T10011] team0: Port device team_slave_1 added [ 178.705638][T10013] bridge0: port 1(bridge_slave_0) entered blocking state [ 178.719511][T10013] bridge0: port 1(bridge_slave_0) entered disabled state [ 178.728769][T10013] device bridge_slave_0 entered promiscuous mode 09:49:06 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000680)='status\x00') preadv(r0, &(0x7f00000017c0), 0x332, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/sloppy_tcp\x00', 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000041c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1842a}, 0x0, 0x0, r1, 0x0) syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x2, 0x56fc64f74309468b) open(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x1fa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x10062101, 0x0, 0x0, 0x0, 0x0) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ubi_ctrl\x00', 0x8000, 0x0) ioctl$ASHMEM_GET_SIZE(r2, 0x40186f40, 0x7600e1) r3 = socket$inet6(0xa, 0x2, 0x0) ptrace$getsig(0x4202, 0xffffffffffffffff, 0x3, &(0x7f00000001c0)) connect$inet6(r3, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg(r3, &(0x7f00000092c0), 0x800000000000164, 0x0) [ 178.741022][T10008] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 178.804089][T10008] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 178.843003][T10021] IPVS: ftp: loaded support on port[0] = 21 [ 178.872950][T10008] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 178.939128][T10013] bridge0: port 2(bridge_slave_1) entered blocking state [ 178.947078][T10013] bridge0: port 2(bridge_slave_1) entered disabled state [ 178.955533][T10013] device bridge_slave_1 entered promiscuous mode [ 178.985187][T10013] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 179.064320][T10011] device hsr_slave_0 entered promiscuous mode [ 179.110861][T10011] device hsr_slave_1 entered promiscuous mode [ 179.160767][T10011] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 179.168643][T10011] Cannot create hsr debugfs directory [ 179.175665][T10013] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 179.266267][T10013] team0: Port device team_slave_0 added [ 179.275462][T10013] team0: Port device team_slave_1 added [ 179.372839][T10013] device hsr_slave_0 entered promiscuous mode [ 179.411002][T10013] device hsr_slave_1 entered promiscuous mode [ 179.460578][T10013] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 179.468160][T10013] Cannot create hsr debugfs directory [ 179.554282][T10016] chnl_net:caif_netlink_parms(): no params data found [ 179.711596][T10013] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 179.754328][T10019] chnl_net:caif_netlink_parms(): no params data found [ 179.803091][T10013] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 179.867531][T10016] bridge0: port 1(bridge_slave_0) entered blocking state [ 179.877538][T10016] bridge0: port 1(bridge_slave_0) entered disabled state [ 179.886170][T10016] device bridge_slave_0 entered promiscuous mode [ 179.894350][T10011] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 179.966697][T10011] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 180.014099][T10013] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 180.067001][T10013] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 180.126767][T10016] bridge0: port 2(bridge_slave_1) entered blocking state [ 180.133993][T10016] bridge0: port 2(bridge_slave_1) entered disabled state [ 180.142549][T10016] device bridge_slave_1 entered promiscuous mode [ 180.150268][T10011] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 180.203550][T10011] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 180.271091][T10021] chnl_net:caif_netlink_parms(): no params data found [ 180.329513][T10016] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 180.342985][T10016] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 180.362560][T10008] 8021q: adding VLAN 0 to HW filter on device bond0 [ 180.410352][T10019] bridge0: port 1(bridge_slave_0) entered blocking state [ 180.418817][T10019] bridge0: port 1(bridge_slave_0) entered disabled state [ 180.427832][T10019] device bridge_slave_0 entered promiscuous mode [ 180.454724][T10016] team0: Port device team_slave_0 added [ 180.461648][T10019] bridge0: port 2(bridge_slave_1) entered blocking state [ 180.468730][T10019] bridge0: port 2(bridge_slave_1) entered disabled state [ 180.477625][T10019] device bridge_slave_1 entered promiscuous mode [ 180.499983][T10021] bridge0: port 1(bridge_slave_0) entered blocking state [ 180.508847][T10021] bridge0: port 1(bridge_slave_0) entered disabled state [ 180.517379][T10021] device bridge_slave_0 entered promiscuous mode [ 180.527389][T10016] team0: Port device team_slave_1 added [ 180.567827][ T3172] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 180.576903][ T3172] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 180.585861][T10021] bridge0: port 2(bridge_slave_1) entered blocking state [ 180.593417][T10021] bridge0: port 2(bridge_slave_1) entered disabled state [ 180.601842][T10021] device bridge_slave_1 entered promiscuous mode [ 180.618763][T10008] 8021q: adding VLAN 0 to HW filter on device team0 [ 180.652779][T10016] device hsr_slave_0 entered promiscuous mode [ 180.701081][T10016] device hsr_slave_1 entered promiscuous mode [ 180.761330][T10016] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 180.768965][T10016] Cannot create hsr debugfs directory [ 180.777096][T10019] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 180.790008][T10019] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 180.810897][T10021] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 180.858320][T10021] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 180.886313][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 180.895012][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 180.904692][ T17] bridge0: port 1(bridge_slave_0) entered blocking state [ 180.912020][ T17] bridge0: port 1(bridge_slave_0) entered forwarding state [ 180.927599][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 180.948644][T10021] team0: Port device team_slave_0 added [ 180.978995][T10019] team0: Port device team_slave_0 added [ 180.988532][ T2675] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 180.998974][ T2675] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 181.007649][ T2675] bridge0: port 2(bridge_slave_1) entered blocking state [ 181.014810][ T2675] bridge0: port 2(bridge_slave_1) entered forwarding state [ 181.031960][T10021] team0: Port device team_slave_1 added [ 181.043257][T10025] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 181.051904][T10025] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 181.060691][T10025] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 181.069286][T10025] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 181.089316][T10019] team0: Port device team_slave_1 added [ 181.155943][T10021] device hsr_slave_0 entered promiscuous mode [ 181.210972][T10021] device hsr_slave_1 entered promiscuous mode [ 181.250659][T10021] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 181.258312][T10021] Cannot create hsr debugfs directory [ 181.272416][T10025] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 181.280185][T10025] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 181.289576][T10025] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 181.424370][T10019] device hsr_slave_0 entered promiscuous mode [ 181.481011][T10019] device hsr_slave_1 entered promiscuous mode [ 181.520600][T10019] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 181.528191][T10019] Cannot create hsr debugfs directory [ 181.544503][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 181.553115][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 181.561770][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 181.570067][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 181.593536][T10013] 8021q: adding VLAN 0 to HW filter on device bond0 [ 181.632487][T10011] 8021q: adding VLAN 0 to HW filter on device bond0 [ 181.655296][T10016] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 181.722828][T10016] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 181.778308][T10016] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 181.838873][T10016] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 181.914150][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 181.922224][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 181.959582][T10011] 8021q: adding VLAN 0 to HW filter on device team0 [ 181.969689][T10013] 8021q: adding VLAN 0 to HW filter on device team0 [ 181.978361][ T2675] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 181.986378][ T2675] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 181.994740][ T2675] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 182.003052][ T2675] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 182.028610][T10008] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 182.050004][ T2713] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 182.059330][ T2713] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 182.068289][ T2713] bridge0: port 1(bridge_slave_0) entered blocking state [ 182.075482][ T2713] bridge0: port 1(bridge_slave_0) entered forwarding state [ 182.084259][ T2713] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 182.094431][ T2713] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 182.103417][ T2713] bridge0: port 2(bridge_slave_1) entered blocking state [ 182.110549][ T2713] bridge0: port 2(bridge_slave_1) entered forwarding state [ 182.118626][ T2713] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 182.150797][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 182.168424][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 182.181201][T10025] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 182.189825][T10025] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 182.198774][T10025] bridge0: port 1(bridge_slave_0) entered blocking state [ 182.205900][T10025] bridge0: port 1(bridge_slave_0) entered forwarding state [ 182.252534][ T2675] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 182.265679][ T2675] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 182.275005][ T2675] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 182.284242][ T2675] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 182.293254][ T2675] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 182.301873][ T2675] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 182.310610][ T2675] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 182.319062][ T2675] bridge0: port 2(bridge_slave_1) entered blocking state [ 182.326207][ T2675] bridge0: port 2(bridge_slave_1) entered forwarding state [ 182.338265][ T2675] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 182.355835][T10021] netdevsim netdevsim5 netdevsim0: renamed from eth0 [ 182.427573][T10021] netdevsim netdevsim5 netdevsim1: renamed from eth1 [ 182.483590][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 182.492878][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 182.502010][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 182.510340][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 182.538474][T10019] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 182.573545][T10021] netdevsim netdevsim5 netdevsim2: renamed from eth2 [ 182.623523][ T3172] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 182.632831][ T3172] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 182.641687][ T3172] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 182.662315][T10011] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 182.682249][T10019] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 182.725089][T10021] netdevsim netdevsim5 netdevsim3: renamed from eth3 [ 182.818880][T10008] device veth0_vlan entered promiscuous mode [ 182.826854][T10019] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 182.874556][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 182.884549][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 182.893957][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 182.903185][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 182.912436][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 182.921266][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 182.930097][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 182.939176][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 182.947185][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 182.955176][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 182.966805][T10019] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 183.036331][T10016] 8021q: adding VLAN 0 to HW filter on device bond0 [ 183.048921][ T2713] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 183.061998][ T2713] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 183.094005][T10008] device veth1_vlan entered promiscuous mode [ 183.107816][T10011] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 183.117521][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 183.126652][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 183.134303][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 183.142102][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 183.150656][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 183.174946][T10013] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 183.198998][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 183.208564][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 183.217236][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 183.229562][T10016] 8021q: adding VLAN 0 to HW filter on device team0 [ 183.260791][ T2713] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 183.271188][ T2713] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 183.279579][ T2713] bridge0: port 1(bridge_slave_0) entered blocking state [ 183.286721][ T2713] bridge0: port 1(bridge_slave_0) entered forwarding state [ 183.295410][ T2713] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 183.303782][ T2713] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 183.348756][T10013] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 183.364240][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 183.376277][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 183.385148][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 183.393782][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 183.400924][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 183.409099][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 183.417839][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 183.426694][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 183.440655][T10025] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 183.496186][ T3172] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 183.507967][ T3172] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 183.527225][ T3172] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 183.553939][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 183.563677][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 183.572780][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 183.581686][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 183.593586][T10011] device veth0_vlan entered promiscuous mode [ 183.618839][T10021] 8021q: adding VLAN 0 to HW filter on device bond0 [ 183.633092][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 183.646854][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 183.673455][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 183.689655][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 183.700060][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 183.709555][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 183.725936][T10029] IPVS: ftp: loaded support on port[0] = 21 [ 183.735196][T10011] device veth1_vlan entered promiscuous mode [ 183.758571][T10019] 8021q: adding VLAN 0 to HW filter on device bond0 [ 183.770585][T10016] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 183.787109][T10016] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 183.795942][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 183.806028][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 183.846935][T10019] 8021q: adding VLAN 0 to HW filter on device team0 [ 183.876706][ T2713] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 183.889466][ T2713] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 183.924986][T10021] 8021q: adding VLAN 0 to HW filter on device team0 [ 183.940275][ T2713] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 183.949326][ T2713] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 183.958532][ T2713] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 183.967717][ T2713] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 183.976290][ T2713] bridge0: port 1(bridge_slave_0) entered blocking state [ 183.983382][ T2713] bridge0: port 1(bridge_slave_0) entered forwarding state [ 183.991584][ T2713] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 183.999507][ T2713] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 184.007459][ T2713] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 184.017697][ T2713] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 184.026237][ T2713] bridge0: port 2(bridge_slave_1) entered blocking state [ 184.033336][ T2713] bridge0: port 2(bridge_slave_1) entered forwarding state [ 184.043019][ T2713] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 184.050966][ T2713] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 184.058871][ T2713] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 184.067688][T10013] device veth0_vlan entered promiscuous mode [ 184.132770][T10025] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 184.151615][T10025] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 184.171104][T10025] bridge0: port 1(bridge_slave_0) entered blocking state [ 184.178248][T10025] bridge0: port 1(bridge_slave_0) entered forwarding state [ 184.195999][T10029] IPVS: ftp: loaded support on port[0] = 21 [ 184.204040][T10025] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 184.218638][ T921] tipc: TX() has been purged, node left! [ 184.221238][T10025] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 184.236330][T10025] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 184.247155][T10025] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 184.255496][T10025] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 184.264166][T10025] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 184.272847][T10025] bridge0: port 2(bridge_slave_1) entered blocking state [ 184.279944][T10025] bridge0: port 2(bridge_slave_1) entered forwarding state [ 184.310338][T10016] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 184.351034][T10025] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 184.359721][T10025] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 184.368719][T10025] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 184.378299][T10025] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 184.398459][T10013] device veth1_vlan entered promiscuous mode [ 184.417467][T10025] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 184.425823][T10025] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 184.435741][T10025] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 184.446873][T10025] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 184.455708][T10025] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 184.485198][T10025] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 184.496538][T10025] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 184.507791][T10025] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 184.518877][T10025] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 184.528395][T10025] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 184.537582][T10025] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 184.546401][ T2675] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 184.622708][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 184.637267][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 184.646303][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 184.663911][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 184.673851][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 184.684781][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 184.694312][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 184.715350][T10021] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 184.746601][ T2713] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 184.758459][ T2713] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 184.823421][T10019] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 184.837877][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 184.850698][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 184.858231][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 184.884463][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 184.901590][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 184.909144][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 184.917530][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 184.926303][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 184.961924][T10016] device veth0_vlan entered promiscuous mode [ 184.986495][T10021] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 185.038844][T10016] device veth1_vlan entered promiscuous mode [ 185.079615][ T2713] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 185.105921][ T2713] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 185.117459][ T2713] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 185.216967][T10025] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 185.233926][T10025] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 185.261941][T10025] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 185.282152][ T2675] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 185.304062][ T2675] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 185.327926][T10019] device veth0_vlan entered promiscuous mode [ 185.351496][ T2713] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 185.360221][ T2713] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 185.396915][T10019] device veth1_vlan entered promiscuous mode [ 185.454502][ T2713] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 185.469224][ T2713] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 185.486491][ T2713] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 185.529656][T10021] device veth0_vlan entered promiscuous mode [ 185.551495][ T2713] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 185.571219][ T2713] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 185.578401][T10046] IPVS: ftp: loaded support on port[0] = 21 [ 185.591795][ T2713] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 185.732086][T10021] device veth1_vlan entered promiscuous mode [ 185.747839][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready 09:49:13 executing program 2: [ 185.939075][T10046] IPVS: ftp: loaded support on port[0] = 21 09:49:13 executing program 2: mkdir(&(0x7f0000000340)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) preadv(r0, &(0x7f0000000740)=[{&(0x7f0000000600)=""/164, 0x197}], 0x1, 0x0) setxattr$trusted_overlay_upper(&(0x7f0000000280)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mount$fuseblk(0x0, &(0x7f0000000200)='./file0/file0\x00', 0x0, 0x0, 0x0) read$FUSE(r0, 0x0, 0x0) read$FUSE(r0, &(0x7f0000000780), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000140)={0x50, 0x0, 0x1}, 0x50) symlink(&(0x7f0000006240)='./file0\x00', &(0x7f0000006580)='./file0/file0\x00') write$FUSE_ENTRY(r0, &(0x7f0000000540)={0x90, 0x0, 0x3, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x85eb}}}, 0x90) [ 186.066795][T10053] IPVS: ftp: loaded support on port[0] = 21 [ 186.396342][T10053] IPVS: ftp: loaded support on port[0] = 21 09:49:14 executing program 5: ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000300)={&(0x7f00000000c0)=""/106, 0xfffffffffffffea1}) clone(0x48b94b00, 0x0, 0x0, 0x0, &(0x7f0000000300)) ioctl$KDFONTOP_SET_DEF(0xffffffffffffffff, 0x4b72, &(0x7f0000000000)={0x2, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)="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"}) syz_open_dev$ttys(0xc, 0x2, 0x1) syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0406618, &(0x7f0000000080)={{0x0, 0x0, @reserved="fef83338d74f361c357b755416c5ca84152f5d9006f147bf9a797da2b11ac5f0"}}) recvmsg(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0xfffffffffffffe52, 0x0, 0xffffffffffffff8a}, 0x0) 09:49:14 executing program 4: ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000300)={&(0x7f00000000c0)=""/106, 0xfffffffffffffea1}) clone(0x48b94b00, 0x0, 0x0, 0x0, &(0x7f0000000300)) ioctl$KDFONTOP_SET_DEF(0xffffffffffffffff, 0x4b72, &(0x7f0000000000)={0x2, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)="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"}) syz_open_dev$ttys(0xc, 0x2, 0x1) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="faff22c918123c5ac4917a11788eba27d52290210157"], 0x16) recvmsg(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x0, 0x0}, 0x0) [ 186.824953][T10070] IPVS: ftp: loaded support on port[0] = 21 [ 186.829599][T10069] IPVS: ftp: loaded support on port[0] = 21 09:49:14 executing program 2: ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000300)={&(0x7f00000000c0)=""/106, 0xfffffffffffffea1}) clone(0x48b94b00, 0x0, 0x0, 0x0, &(0x7f0000000300)) ioctl$KDFONTOP_SET_DEF(0xffffffffffffffff, 0x4b72, &(0x7f0000000000)={0x2, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)="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"}) syz_open_dev$ttys(0xc, 0x2, 0x1) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="00fa6f20040000ebe59d7a51788eba27d5229021b657"], 0x16) recvmsg(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x0, 0x0}, 0x0) 09:49:14 executing program 1: ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000300)={&(0x7f00000000c0)=""/106, 0xfffffffffffffea1}) clone(0x48b94b00, 0x0, 0x0, 0x0, &(0x7f0000000300)) ioctl$KDFONTOP_SET_DEF(0xffffffffffffffff, 0x4b72, &(0x7f0000000000)={0x2, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)="0272aae16e010f05dfd5d71cc8bab91d6d936cf44cd317b97f2a55de2da11f6e18b9d00ffc2ffadbfb9717eba42e7fe4c05cb583ea3eda7784d6295485da75d990180231f59ebe181b0c1efb0834ccb53d1cec4a6f2a239e64b7933129033faecb9e1ba890153d5a7b44e714cda28b4f3fcba183aa4829e8639470759738801af931737681657f6decd5d726312531bc25ba09f691da22dfa2773bad6958f651438f5aec2b0a627181f982be1b312614ee1fb7ead43f88c89ac6fef1ea610820076a16019cc346d8884480141ebb45dbcb6b59c73822fd33b7f22ff104ad68db421422335d97ce336d513503de9d4a62d3d7b29b2f969add4af8c0b339ff750804c0a0f91011c34854d5e076ed7592bc914d44eee8e0080e510b224edcb1aacefd47a6eb51627a52fac53eed4cc9a20246a637eb5e95ce9028da700daf4089a89ca94c84c37738754288f1aa22eaa4ba6cdda04b3b1fb846c65802809bd2a65a6f7919847b65956fb34a9ee698c8057c7ee6f33c20e4b96ebdca22a4dc6d1a61df20edd8205cc448ed6b846ff0b6c35a4963e48427c098a542f36a05012161f74ad26a867740f64ed44aed19a4d5582b0a99f8c8a5781c91477302cf1e929bbec534eb4fc6b62b203bcc627913d817f57db502d57be3205727e2c6e47d2d201885eb6455273276e3a35a80d5aedbbac70a1b0a9173c797608479a7631eb8b63195efe23f354a7615900b191ed2e0053cebd06218df7fccf1717434a11c812057f083431a22cbacd089927d7c1509b0e94624b130b8aadd0af89eb4b6bfcc4cf67db95bd731892be3f1a2bf17917f4525f6e3463f331378f7ee7a872721ade7a62c16bf0e4c4a25971c9e64ca3a55ef13eddc6d6557931f149a0929cb87b8371e354ef6f06b1abfb506d5b6c7d35b51dabd94a4d816fbd3491e17c0094a659053724b94da23e5d9b4d260ef723929d79f14361ddab19bde5a05677c161ce38324c9264288dde2d398d52f87cf72a9e2db8a67b79598ef9f8fb5ac41fab294f21026f12c843afb510d2dff09f709aee946d38fe1f5304a11185bdf08e92ea42cfd576508359bd538195a0737c29445cda5504ddab67ebd1310dc8efc0380db010da701d2ffdc26575535f289535d625debc3494a7b3c20ff63c3b984812a7de5f0fd69580ec787de4a5c2ea293530a2f1fce30558b6dcb6776dcb256f817078849e597dd5651f65bcccccff1749cb46a79f37005a8ef555976a33eec417ce523ec5a94c8bfc8d2e61adad9f7759529bb7dc46d3954853aabe78f77e365075c04ee83091967504f7116d10fc2e3f3ef1ffc311397cffadb2ca0fcd4e18b44e08346192dba9840470b92a5a44d15df225f020abc62636c97509063f8d3633d8c0bc1fc783fd8f15d388dfa391c31b176ee3c730b765345d3a19300980566196ba633"}) syz_open_dev$ttys(0xc, 0x2, 0x1) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="00fa6f200815040000009c305c8034a62d63fa6da783"], 0x16) recvmsg(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x0, 0x0}, 0x0) [ 187.205908][T10069] IPVS: ftp: loaded support on port[0] = 21 [ 187.268674][T10070] IPVS: ftp: loaded support on port[0] = 21 [ 187.359027][T10076] IPVS: ftp: loaded support on port[0] = 21 [ 187.430839][T10080] IPVS: ftp: loaded support on port[0] = 21 09:49:15 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x6, 0x0) write$binfmt_aout(r0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x41) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) read(r0, &(0x7f0000000400)=""/236, 0x117248e3) r1 = syz_open_pts(r0, 0x0) pselect6(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = dup2(r1, r0) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$TCXONC(r2, 0x540a, 0x3) 09:49:15 executing program 2: ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000300)={&(0x7f00000000c0)=""/106, 0xfffffffffffffea1}) clone(0x48b94b00, 0x0, 0x0, 0x0, &(0x7f0000000300)) ioctl$KDFONTOP_SET_DEF(0xffffffffffffffff, 0x4b72, &(0x7f0000000000)={0x2, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)="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"}) syz_open_dev$tty1(0xc, 0x4, 0x1) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="00fa6f200815040000009c305c8034a62d63fa6da783"], 0x16) recvmsg(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0xffffffffffffff4d, 0x0, 0xffffffffffffff70}, 0x0) 09:49:15 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) read(r0, &(0x7f0000000400)=""/236, 0x117248e3) r1 = syz_open_pts(r0, 0x0) r2 = dup2(r1, r0) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$TCXONC(r2, 0x540a, 0x3) [ 188.581656][T10087] IPVS: ftp: loaded support on port[0] = 21 09:49:17 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={&(0x7f0000f4dff4), 0x74c, &(0x7f0000000040)={&(0x7f0000000080)=@migrate={0x15c, 0x18, 0x1, 0x0, 0x0, {{@in6=@ipv4={[], [], @multicast1}, @in6=@dev}}, [@migrate={0x10c}]}, 0x15c}}, 0x0) 09:49:17 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) sched_setscheduler(0x0, 0x5, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000200)=@newlink={0x38, 0x10, 0xe3b, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @ip6gretap={{0xe, 0x1, 'ip6gretap\x00'}, {0x4}}}]}, 0x38}}, 0x0) 09:49:17 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000080)='/dev/input/event#\x00', 0xc, 0x121041) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f00000000c0)={0x0, 0x0, 0x0, {0x0, 0x100000000000001}, {0x21, 0x2}, @cond}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$evdev(r0, &(0x7f0000000040), 0x373) 09:49:17 executing program 0: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1) close(r1) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x80001, 0x0) splice(r0, 0x0, r1, 0x0, 0x100000002, 0x0) 09:49:17 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000001040)={&(0x7f0000000000)=ANY=[@ANYBLOB="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"], 0x58}}, 0x0) [ 190.037887][ T921] tipc: TX() has been purged, node left! [ 190.047015][ T921] tipc: TX() has been purged, node left! [ 190.065994][ T921] tipc: TX() has been purged, node left! [ 190.086024][ T921] tipc: TX() has been purged, node left! [ 190.330686][ T921] tipc: TX() has been purged, node left! [ 190.530634][ T921] tipc: TX() has been purged, node left! [ 190.710623][ T921] tipc: TX() has been purged, node left! [ 190.890549][ T921] tipc: TX() has been purged, node left! 09:49:18 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000001040)={&(0x7f0000000000)=ANY=[@ANYBLOB="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"], 0x58}}, 0x0) 09:49:19 executing program 4: 09:49:19 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.stat\x00', 0x275a, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f00000000c0)={0x20}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cgroup.controllers\x00', 0x275a, 0x0) r2 = socket(0x10, 0x80002, 0x0) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8696071") write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYRESOCT], 0xfe6f) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='cgroup.controllers\x00', 0x7a05, 0x1700) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[@ANYBLOB], 0x200600) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000001300)={0x0, r0}) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) 09:49:19 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000001040)={&(0x7f0000000f80)={0x54, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8}]}, @IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x54}}, 0x0) 09:49:19 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000480)=ANY=[@ANYBLOB="500000002800210400"/20, @ANYRES32, @ANYBLOB="ac02000000000000000000000c0080eb8600000075700000200002001c000100000001f00000080001006270660004000200040006ff00ff156569735843de8b4c1ef779b8d8f7bf7afb33e23753792aafde2698ebe5f83bc5b1d2c1df41944400193870e465324b63063fc06b6d0e583c75ba0a6d8da2ca131e39aeef0f"], 0x50}}, 0x0) 09:49:19 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup/syz0\x00', 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) write(r1, &(0x7f0000000200)="96", 0x1) 09:49:19 executing program 5: 09:49:19 executing program 5: 09:49:19 executing program 3: 09:49:19 executing program 0: 09:49:19 executing program 2: 09:49:19 executing program 4: 09:49:19 executing program 1: 09:49:19 executing program 5: 09:49:19 executing program 0: 09:49:19 executing program 3: 09:49:19 executing program 4: 09:49:19 executing program 2: 09:49:19 executing program 5: 09:49:19 executing program 0: 09:49:19 executing program 1: 09:49:19 executing program 3: 09:49:19 executing program 1: 09:49:19 executing program 2: 09:49:19 executing program 5: 09:49:19 executing program 4: 09:49:19 executing program 0: 09:49:20 executing program 3: 09:49:20 executing program 1: 09:49:20 executing program 5: 09:49:20 executing program 2: 09:49:20 executing program 4: 09:49:20 executing program 3: 09:49:20 executing program 0: 09:49:20 executing program 1: 09:49:20 executing program 2: 09:49:20 executing program 5: 09:49:20 executing program 3: 09:49:20 executing program 4: 09:49:20 executing program 0: 09:49:20 executing program 1: 09:49:20 executing program 2: 09:49:20 executing program 5: 09:49:20 executing program 3: 09:49:20 executing program 0: 09:49:20 executing program 4: 09:49:20 executing program 1: 09:49:20 executing program 5: 09:49:20 executing program 3: 09:49:20 executing program 2: 09:49:20 executing program 0: 09:49:20 executing program 4: 09:49:21 executing program 5: 09:49:21 executing program 2: 09:49:21 executing program 0: 09:49:21 executing program 1: 09:49:21 executing program 3: 09:49:21 executing program 4: 09:49:21 executing program 5: 09:49:21 executing program 1: r0 = memfd_create(&(0x7f0000000040)='*\x9a\xc1\xbf\x16mZ\xeeC\xb5r', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 09:49:21 executing program 4: bind$alg(0xffffffffffffffff, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) mprotect(&(0x7f0000001000/0x2000)=nil, 0x2000, 0x0) madvise(&(0x7f00000d9000/0x600000)=nil, 0x600000, 0x14) 09:49:21 executing program 0: socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0x4b33414b70050b0a}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000280)='/dev/loop#\x00', 0x0, 0x100082) r1 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000180)="13", 0x1}], 0x1, 0x8180a) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r3) add_key$keyring(0x0, &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$get_persistent(0x16, r3, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x5) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) r5 = creat(0x0, 0xfffffffffffffffe) setsockopt$netlink_NETLINK_RX_RING(r5, 0x10e, 0x6, 0x0, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x20000102000007) getresuid(&(0x7f0000002bc0)=0x0, &(0x7f0000002c00), &(0x7f0000002c40)) fchown(r2, r6, r4) socket$packet(0x11, 0x2, 0x300) r7 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r7, &(0x7f00000017c0), 0x3da, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(r7, 0xc0205648, &(0x7f0000000200)={0xfa40000, 0x0, 0x7f, 0xffffffffffffffff, 0x0, &(0x7f00000001c0)={0xec8df0, 0x8, [], @p_u8=&(0x7f00000000c0)=0xda}}) sendto$inet6(0xffffffffffffffff, &(0x7f0000000600)="36d1f955266b2b2662902acf9afef727b2758f2d215033b0958bc5f3c10fff1bd21de8b3ddc3cb843da201d24b1aa3648dc27ca2e87ad1ad6d068d49de5cd94595230faf9840d13270d4fad26c12e1215d9632392caed817fa02c2513d68d92b8f8506d393bdf130866244eeeb754634fd26db809e78e56caaad09bbbb511d7bc297187fffdd19d3", 0x88, 0x4, &(0x7f0000b63fe4)={0xa, 0x2, 0x1ff, @rand_addr="00000000000e00000300ffffffff7eff"}, 0x1c) preadv(0xffffffffffffffff, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x6a}, {&(0x7f00000007c0)=""/242, 0xf2}, {0x0}], 0x4, 0x0) getsockopt$netlink(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000540)=""/105, &(0x7f00000005c0)=0xfffffffffffffeba) 09:49:21 executing program 2: syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) socket$kcm(0x10, 0x0, 0x10) bind$alg(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe5}]}, 0x10) bind$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, &(0x7f0000000100)={0xa79, 0x8, 0x1000}) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000200)=ANY=[@ANYBLOB="3ca749b0b78acb", @ANYRES32=0x0], &(0x7f000095dffc)=0x8) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xe6, 0x8}}, 0x0, 0xfffff7ffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r1, 0x4, 0x42000) sendto$inet(r0, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a750fbf746bec66ba", 0xfe6a, 0xe, 0x0, 0xfffffffffffffe2b) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x199, 0x0) 09:49:21 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'cbcmac(cast6)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_MON_SET(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)={0x14}, 0x14}}, 0x0) 09:49:21 executing program 5: r0 = socket(0x2, 0x80002, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8696071") r1 = socket$kcm(0x29, 0x2, 0x0) setsockopt$kcm_KCM_RECV_DISABLE(r1, 0x119, 0x1, &(0x7f00000006c0)=0x10000, 0x4) ioctl$KVM_SET_ONE_REG(0xffffffffffffffff, 0x4010aeac, 0x0) setsockopt$kcm_KCM_RECV_DISABLE(r1, 0x119, 0x1, &(0x7f0000000000), 0x4) bpf$BPF_MAP_FREEZE(0x16, 0x0, 0x0) [ 194.109777][T10252] ERROR: Domain ' /sbin/init /etc/init.d/rc /sbin/startpar /etc/init.d/ssh /sbin/start-stop-daemon /usr/sbin/sshd /usr/sbin/sshd /bin/bash /root/syz-fuzzer /root/syz-executor.1 proc:/self/fd/3' not defined. 09:49:21 executing program 1: r0 = perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x7ffffffffffd, 0x6d1a4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x20, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f00000000c0)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r2, 0x0, 0xfffffffffffffff8, 0x200007fe, &(0x7f0000000100)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendto$inet(r2, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0x9000000) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) ioctl$DRM_IOCTL_SET_VERSION(0xffffffffffffffff, 0xc0106407, 0x0) 09:49:21 executing program 2: r0 = perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x7ffffffffffd, 0x6d1a4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x20, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f00000000c0)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r2, 0x0, 0xfffffffffffffff8, 0x200007fe, &(0x7f0000000100)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendto$inet(r2, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x2540, 0x0, 0x9000000) socket$inet6_sctp(0xa, 0x10000000005, 0x84) syz_open_dev$dri(&(0x7f0000000140)='/dev/dri/card#\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f0000000000), 0x8) 09:49:21 executing program 4: r0 = perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x7ffffffffffd, 0x6d1a4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x20, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f00000000c0)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r2, 0x0, 0xfffffffffffffff8, 0x200007fe, &(0x7f0000000100)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendto$inet(r2, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x2540, 0x0, 0x9000000) clock_gettime(0x0, 0x0) socket$inet6_sctp(0xa, 0x0, 0x84) 09:49:21 executing program 5: r0 = socket(0x2, 0x80002, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8696071") r1 = socket$kcm(0x29, 0x2, 0x0) setsockopt$kcm_KCM_RECV_DISABLE(r1, 0x119, 0x1, &(0x7f00000006c0)=0x10000, 0x4) ioctl$KVM_SET_ONE_REG(0xffffffffffffffff, 0x4010aeac, 0x0) setsockopt$kcm_KCM_RECV_DISABLE(r1, 0x119, 0x1, &(0x7f0000000000), 0x4) bpf$BPF_MAP_FREEZE(0x16, 0x0, 0x0) 09:49:22 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xfda000)=nil, 0xfda000, 0x1000003, 0x4031, 0xffffffffffffffff, 0x0) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f00000000c0)) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000040)={{&(0x7f00000e2000/0xc00000)=nil, 0xc00000}, 0x1}) ioctl$UFFDIO_REGISTER(r2, 0xc028aa03, &(0x7f00000a0fe0)={{&(0x7f00005e3000/0x800000)=nil, 0x20ce6000}, 0x200000}) 09:49:22 executing program 5: socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xfda000)=nil, 0xfda000, 0x1000003, 0x4031, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f00000000c0)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000040)={{&(0x7f00000e2000/0xc00000)=nil, 0xc00000}, 0x1}) ioctl$UFFDIO_REGISTER(r1, 0xc028aa03, &(0x7f00000a0fe0)={{&(0x7f00005e3000/0x800000)=nil, 0x20ce6000}, 0x200000}) 09:49:22 executing program 0: r0 = perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x7ffffffffffd, 0x6d1a4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x20, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, 0xffffffffffffffff) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f00000000c0)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r2, 0x0, 0xfffffffffffffff8, 0x200007fe, &(0x7f0000000100)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendto$inet(r2, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x2540, 0x0, 0x9000000) clock_gettime(0x0, &(0x7f0000000080)) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) r3 = syz_open_dev$dri(0x0, 0x0, 0x0) ioctl$DRM_IOCTL_SET_VERSION(r3, 0xc0106407, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, &(0x7f0000000300)) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, 0x0, 0x0) 09:49:22 executing program 2: 09:49:22 executing program 2: accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000100)={0x28, 0x0, 0x0, @hyper}, 0x10, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f0000000140)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x40000004, 0x0, 0x0, 0x0, 0x4cb]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) syz_genetlink_get_family_id$ipvs(0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0xa, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) ioctl$KVM_RUN(r2, 0xae80, 0x0) 09:49:22 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000006ffc), 0x26d) syz_open_dev$sndseq(0x0, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x5452, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0xfef0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$sndseq(0x0, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2b, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) 09:49:22 executing program 0: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="2398c593a2303d8df8dc1623f67a060de466e34712df232157116a41dc2b323a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 195.030879][T10321] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. 09:49:22 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0) mremap(&(0x7f00009d4000/0x2000)=nil, 0x2000, 0x2000, 0x3, &(0x7f0000161000/0x2000)=nil) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, 0x0, 0x0, 0x2000000000002) [ 195.238243][T10338] mmap: syz-executor.3 (10338) uses deprecated remap_file_pages() syscall. See Documentation/vm/remap_file_pages.rst. 09:49:22 executing program 0: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="2398c593a2303d8df8dc1623f67a060de466e34712df232157116a41dc2b323a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:49:22 executing program 5: socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xfda000)=nil, 0xfda000, 0x1000003, 0x4031, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f00000000c0)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000040)={{&(0x7f00000e2000/0xc00000)=nil, 0xc00000}, 0x1}) ioctl$UFFDIO_REGISTER(r1, 0xc028aa03, &(0x7f00000a0fe0)={{&(0x7f00005e3000/0x800000)=nil, 0x20ce6000}, 0x200000}) 09:49:22 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'trusted:', 'em*', 0x20, 0xdfc}, 0x2d, 0xfffffffffffffffd) r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0x1f1, 0xfffffffffffffffe) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) keyctl$update(0x2, r0, &(0x7f0000000000)="fd", 0x1) 09:49:22 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f0000000140)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x40000004, 0x0, 0x0, 0x0, 0x4cb]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00') perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0xa, @perf_config_ext, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) ioctl$KVM_RUN(r2, 0xae80, 0x0) 09:49:22 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000006ffc), 0x26d) syz_open_dev$sndseq(0x0, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x5452, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0xfef0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$sndseq(0x0, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2b, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) 09:49:22 executing program 0: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="2398c593a2303d8df8dc1623f67a060de466e34712df232157116a41dc2b323a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:49:23 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(r0, 0x80dc5521, &(0x7f00000000c0)=""/153) 09:49:23 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f0000000140)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = socket(0x80000000000000a, 0x2, 0x0) getsockopt$inet_sctp_SCTP_NODELAY(r3, 0x84, 0x3, &(0x7f00000000c0), &(0x7f0000000100)=0x4) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x40000004, 0x0, 0x0, 0x0, 0x4cb]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00') perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0xa, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) ioctl$KVM_RUN(r2, 0xae80, 0x0) 09:49:23 executing program 4: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'trusted:', 'em*', 0x20, 0xdfc}, 0x2d, 0xfffffffffffffffd) socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0x1f1, 0xfffffffffffffffe) 09:49:23 executing program 0: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="2398c593a2303d8df8dc1623f67a060de466e34712df232157116a41dc2b323a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:49:23 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0) mremap(&(0x7f00009d4000/0x2000)=nil, 0x2000, 0x2000, 0x3, &(0x7f0000161000/0x2000)=nil) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, 0x0, 0x0, 0x2000000000002) 09:49:23 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(r0, 0x80dc5521, &(0x7f00000000c0)=""/153) [ 195.955740][T10371] kvm [10370]: vcpu0, guest rIP: 0x14c Hyper-V uhandled wrmsr: 0x40000004 data 0x93000000000b 09:49:23 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(r0, 0x80dc5521, &(0x7f00000000c0)=""/153) [ 196.037280][T10371] kvm [10370]: vcpu0, guest rIP: 0x14c Hyper-V uhandled wrmsr: 0x4000000b data 0xe70000000062 09:49:23 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}, 0x10, 0x7, 0x0, 0x0, 0x8001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) mprotect(&(0x7f0000ffa000/0x2000)=nil, 0x2000, 0x0) shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffa000/0x3000)=nil) shmat(0x0, &(0x7f0000ffd000/0x3000)=nil, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x2}, 0x1f) connect$inet6(r0, &(0x7f0000000300)={0xa, 0x4e22, 0x0, @ipv4={[], [], @remote}}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r1, 0x0, 0xedc0) [ 196.106087][T10371] kvm [10370]: vcpu0, guest rIP: 0x14c Hyper-V uhandled wrmsr: 0x40000062 data 0x7c000000002d 09:49:23 executing program 0: mount(&(0x7f0000000240)=ANY=[@ANYBLOB="2398c593a2303d8df8dc1623f67a060de466e34712df232157116a41dc2b323a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 196.151873][T10371] kvm [10370]: vcpu0, guest rIP: 0x14c Hyper-V uhandled wrmsr: 0x4000002c data 0xb5000000001c [ 196.205659][T10371] kvm [10370]: vcpu0, guest rIP: 0x14c Hyper-V uhandled wrmsr: 0x4000001b data 0xff0000000021 09:49:23 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(r0, 0x80dc5521, &(0x7f00000000c0)=""/153) [ 196.287179][ C1] hrtimer: interrupt took 36870 ns 09:49:23 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000080)=ANY=[@ANYBLOB='%U'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:49:23 executing program 0: mount(&(0x7f0000000240)=ANY=[@ANYBLOB="2398c593a2303d8df8dc1623f67a060de466e34712df232157116a41dc2b323a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:49:24 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f0000000140)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = socket(0x80000000000000a, 0x2, 0x0) getsockopt$inet_sctp_SCTP_NODELAY(r3, 0x84, 0x3, &(0x7f00000000c0), &(0x7f0000000100)=0x4) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x40000004, 0x0, 0x0, 0x0, 0x4cb]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00') perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0xa, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) ioctl$KVM_RUN(r2, 0xae80, 0x0) 09:49:24 executing program 3: mprotect(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x3000002) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}, 0x10, 0x7, 0x0, 0x0, 0x8001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) mprotect(&(0x7f0000ffa000/0x2000)=nil, 0x2000, 0x6df427d79a627620) shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffa000/0x3000)=nil) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) shmat(0x0, &(0x7f0000ffd000/0x3000)=nil, 0x0) connect$inet6(r0, &(0x7f0000000300)={0xa, 0x4e22, 0x0, @ipv4={[], [], @remote}}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r1, 0x0, 0xedc0) 09:49:24 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000080)=ANY=[@ANYBLOB='%U'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:49:24 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(r0, 0x80dc5521, &(0x7f00000000c0)=""/153) 09:49:24 executing program 0: mount(&(0x7f0000000240)=ANY=[@ANYBLOB="2398c593a2303d8df8dc1623f67a060de466e34712df232157116a41dc2b323a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:49:24 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f0000000340)=ANY=[@ANYBLOB="b7020000f7ffffffbfa70000000000002402000020feffff7a0af0fff8ffffff69a4f0ff00000000b70600000018d1fe2d6405000000000075040000000000000704000000000000b7040000100000206a0700fe00000000850000002f000000b70000000a0000009500000000000000e535f8a62fc2868f0399d909a63796c113a80c19aab9d607000000b6cd483be3f0d3253730e711f5969f62c28b22756bedf3cf393d14c46cc4f79fd2b316da4f0de8163f6242fa732300000637c48468766af540439fce41f144631ac262dcae18c3d1a1fbe96dd87235b44174f7c0343185089a0f119e31975e551558055dc2dc"], &(0x7f0000000280)='GPL\x00'}, 0x48) r1 = socket$kcm(0x11, 0x8000000002, 0x300) socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000540)=r0, 0x4) syz_emit_ethernet(0x3e, &(0x7f0000000000)={@broadcast, @random="96c1e9574b31", @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x1, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @local}, @time_exceeded={0xb, 0x0, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local, @multicast2}}}}}}, 0x0) 09:49:24 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(0xffffffffffffffff, 0x80dc5521, &(0x7f00000000c0)=""/153) 09:49:24 executing program 0: mkdir(0x0, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="2398c593a2303d8df8dc1623f67a060de466e34712df232157116a41dc2b323a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:49:24 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000080)=ANY=[@ANYBLOB='%U'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:49:24 executing program 3: mprotect(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x3000002) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}, 0x10, 0x7, 0x0, 0x0, 0x8001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) mprotect(&(0x7f0000ffa000/0x2000)=nil, 0x2000, 0x6df427d79a627620) shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffa000/0x3000)=nil) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) shmat(0x0, &(0x7f0000ffd000/0x3000)=nil, 0x0) connect$inet6(r0, &(0x7f0000000300)={0xa, 0x4e22, 0x0, @ipv4={[], [], @remote}}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r1, 0x0, 0xedc0) 09:49:24 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f0000000140)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = socket(0x80000000000000a, 0x2, 0x0) getsockopt$inet_sctp_SCTP_NODELAY(r3, 0x84, 0x3, &(0x7f00000000c0), &(0x7f0000000100)=0x4) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x40000004, 0x0, 0x0, 0x0, 0x4cb]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00') perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0xa, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) ioctl$KVM_RUN(r2, 0xae80, 0x0) 09:49:24 executing program 0: mkdir(0x0, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="2398c593a2303d8df8dc1623f67a060de466e34712df232157116a41dc2b323a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:49:24 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(0xffffffffffffffff, 0x80dc5521, &(0x7f00000000c0)=""/153) 09:49:24 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000080)=ANY=[@ANYBLOB='%U'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:49:24 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f00000015c0)=ANY=[@ANYBLOB='#'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:49:24 executing program 3: mprotect(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x3000002) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}, 0x10, 0x7, 0x0, 0x0, 0x8001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) mprotect(&(0x7f0000ffa000/0x2000)=nil, 0x2000, 0x6df427d79a627620) shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffa000/0x3000)=nil) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) shmat(0x0, &(0x7f0000ffd000/0x3000)=nil, 0x0) connect$inet6(r0, &(0x7f0000000300)={0xa, 0x4e22, 0x0, @ipv4={[], [], @remote}}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r1, 0x0, 0xedc0) 09:49:24 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f0000000140)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = socket(0x80000000000000a, 0x2, 0x0) getsockopt$inet_sctp_SCTP_NODELAY(r3, 0x84, 0x3, &(0x7f00000000c0), &(0x7f0000000100)=0x4) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x40000004, 0x0, 0x0, 0x0, 0x4cb]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00') perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0xa, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) ioctl$KVM_RUN(r2, 0xae80, 0x0) 09:49:24 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(0xffffffffffffffff, 0x80dc5521, &(0x7f00000000c0)=""/153) 09:49:25 executing program 0: mkdir(0x0, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="2398c593a2303d8df8dc1623f67a060de466e34712df232157116a41dc2b323a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:49:25 executing program 4: mount(&(0x7f0000000080)=ANY=[@ANYBLOB='%U'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 197.614627][T10469] kAFS: unparsable volume name 09:49:25 executing program 0: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:49:25 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f00000015c0)=ANY=[@ANYBLOB='#'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:49:25 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f0000000140)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x40000004, 0x0, 0x0, 0x0, 0x4cb]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00') perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x2, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 09:49:25 executing program 1: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(r0, 0x80dc5521, &(0x7f00000000c0)=""/153) 09:49:25 executing program 4: mount(&(0x7f0000000080)=ANY=[@ANYBLOB='%U'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:49:25 executing program 3: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f00000015c0)=ANY=[@ANYBLOB='%'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 197.993619][T10485] kAFS: unparsable volume name 09:49:25 executing program 0: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:49:25 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f00000015c0)=ANY=[@ANYBLOB='#'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 198.072815][T10494] kAFS: unparsable volume name 09:49:25 executing program 1: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(r0, 0x80dc5521, &(0x7f00000000c0)=""/153) 09:49:25 executing program 4: mount(&(0x7f0000000080)=ANY=[@ANYBLOB='%U'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 198.243065][T10506] kAFS: unparsable volume name 09:49:25 executing program 3: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f00000015c0)=ANY=[@ANYBLOB='%'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:49:25 executing program 0: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:49:25 executing program 2: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000080)=ANY=[@ANYBLOB='#U'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:49:25 executing program 1: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(r0, 0x80dc5521, &(0x7f00000000c0)=""/153) 09:49:25 executing program 4: mkdir(0x0, 0x0) mount(&(0x7f0000000080)=ANY=[@ANYBLOB='%U'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:49:25 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f00000015c0)=ANY=[@ANYBLOB='#'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 198.464976][T10519] kAFS: unparsable volume name 09:49:26 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(r0, 0x80dc5521, &(0x7f00000000c0)=""/153) [ 198.574681][T10527] kAFS: unparsable volume name 09:49:26 executing program 3: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f00000015c0)=ANY=[@ANYBLOB='%'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:49:26 executing program 4: mkdir(0x0, 0x0) mount(&(0x7f0000000080)=ANY=[@ANYBLOB='%U'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:49:26 executing program 0: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:49:26 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x3, 0x0, 0x248000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) r2 = gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) perf_event_open(0x0, r2, 0x0, 0xffffffffffffffff, 0x9) ioctl$TUNSETVNETHDRSZ(0xffffffffffffffff, 0x400454d8, &(0x7f0000001200)=0x80000000) write$cgroup_type(r0, &(0x7f0000000140)='threaded\x00', 0xffffff1f) 09:49:26 executing program 5: mount(&(0x7f00000015c0)=ANY=[@ANYBLOB='#'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 198.756184][T10536] kAFS: unparsable volume name 09:49:26 executing program 4: mkdir(0x0, 0x0) mount(&(0x7f0000000080)=ANY=[@ANYBLOB='%U'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 198.855402][T10545] kAFS: Bad value for 'source' 09:49:26 executing program 2: perf_event_open(&(0x7f0000000380)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000380)) write$cgroup_int(r0, &(0x7f0000000000), 0xffffffee) 09:49:26 executing program 3: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f00000015c0)=ANY=[@ANYBLOB='%'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:49:26 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(r0, 0x80dc5521, &(0x7f00000000c0)=""/153) 09:49:26 executing program 0: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:49:26 executing program 5: mount(&(0x7f00000015c0)=ANY=[@ANYBLOB='#'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:49:26 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 199.174550][T10561] kAFS: unparsable volume name 09:49:26 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x8000}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200), 0x400086) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40305828, &(0x7f0000000040)) write$cgroup_int(r2, 0x0, 0x3300) 09:49:26 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(r0, 0x80dc5521, &(0x7f00000000c0)=""/153) [ 199.220369][T10566] kAFS: Bad value for 'source' 09:49:26 executing program 5: mount(&(0x7f00000015c0)=ANY=[@ANYBLOB='#'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:49:26 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:49:26 executing program 0: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:49:26 executing program 3: mount(&(0x7f00000015c0)=ANY=[@ANYBLOB='%'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:49:26 executing program 1: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(r0, 0x80dc5521, &(0x7f00000000c0)=""/153) 09:49:27 executing program 5: mkdir(0x0, 0x0) mount(&(0x7f00000015c0)=ANY=[@ANYBLOB='#'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 199.566525][T10587] kAFS: Bad value for 'source' 09:49:27 executing program 3: mount(&(0x7f00000015c0)=ANY=[@ANYBLOB='%'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:49:27 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:49:27 executing program 0: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:49:27 executing program 5: mkdir(0x0, 0x0) mount(&(0x7f00000015c0)=ANY=[@ANYBLOB='#'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:49:27 executing program 2: write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000140)={[{0x0, 'pids'}]}, 0x6) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000040), 0x12) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000380)='ns/cgroup\x00') 09:49:27 executing program 1: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(r0, 0x80dc5521, &(0x7f00000000c0)=""/153) 09:49:27 executing program 3: mount(&(0x7f00000015c0)=ANY=[@ANYBLOB='%'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 199.871676][T10603] kAFS: Bad value for 'source' 09:49:27 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000080)=ANY=[], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:49:27 executing program 0: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:49:27 executing program 1: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(r0, 0x80dc5521, &(0x7f00000000c0)=""/153) 09:49:27 executing program 5: mkdir(0x0, 0x0) mount(&(0x7f00000015c0)=ANY=[@ANYBLOB='#'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:49:27 executing program 3: mkdir(0x0, 0x0) mount(&(0x7f00000015c0)=ANY=[@ANYBLOB='%'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 200.129667][T10623] kAFS: Bad value for 'source' [ 200.185062][T10626] kAFS: Bad value for 'source' 09:49:27 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r1, &(0x7f0000000040)={0x0, 0x60, &(0x7f0000000140)=[{&(0x7f00000001c0)="39000000140081ae0000dc676f97daf01e23578134662c300b2c000500018701546fabca1b4e7d06a6580e88370200c54c1960b89c0eebb373", 0x39}], 0x1}, 0x0) 09:49:27 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000080)=ANY=[], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:49:27 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(r0, 0x80dc5521, &(0x7f00000000c0)=""/153) 09:49:27 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:49:27 executing program 0: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:49:27 executing program 3: mkdir(0x0, 0x0) mount(&(0x7f00000015c0)=ANY=[@ANYBLOB='%'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 200.483215][T10647] kAFS: Bad value for 'source' 09:49:27 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(r0, 0x80dc5521, &(0x7f00000000c0)=""/153) [ 200.509674][T10650] kAFS: Bad value for 'source' 09:49:28 executing program 3: mkdir(0x0, 0x0) mount(&(0x7f00000015c0)=ANY=[@ANYBLOB='%'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:49:28 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000080)=ANY=[], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:49:28 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:49:28 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x70b4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000002fc0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000040)=@framed, &(0x7f0000000080)='GPL\x00', 0x5, 0x1f6, &(0x7f00000002c0)=""/168, 0x0, 0x0, [], 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x1}, 0x6d) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f0000002a80)=ANY=[@ANYBLOB="180000000000000000000000000000009500fa0000000000b3d6fbdaef9f7d4e1a5b276570dd9934843e3cfc6b3282d976ef3190ed183edd9f8f456a870ca7555cbc7fd526dbd9e8f3860bf492a8e4afc28ac1f48f4c4bbb43728e1ac1b67474e56a20ddb70311ad550db6bd9f561574901163080600836830e6d293f4d9d1fa470fd23e9c9282eadac0b0dcc2f39ca2f02c19ee61748e1db2740a6b7109dbcb87212b861303286dd6b455d54509792ce29d6f7189ebd9ab73c3c4a780ea140f2e8780d8281d2d6010ac5c2bc3af73954abd5a6616591783410393ec5d28da5fb2689dc07129bf3bca7b35d937221a739396bbf8e00ac47c463a6ec8bad33a89c8c020148e0e9522fe0e4dcdb8a4c2a5dffe42896d2bed45040a513dbf05f30165ec0e879bfd4c3c92c37d697551a80e37c13ee9d77b15e19515c5685d2c77ce89ee99c8ea74f28d8a085db78dab969934ee9b8909ae91b287a39149ef8217baebce4e5108c232858edcabec8e7ab062b1fa81a47463a38fa0f147fda1a8b38ef57b03b85b2582730dfff52d5039d41ef8e253723055c34299079fa387ba400ec9432fa638292892374f87a2805e98f34b179ea01aad9a991d102b6351f8af25183d753e22d94369dec1416b3661632681b0f66b11a3fc18f7967aba0ff9fa901c12ec55d3f5b3c68bd2e507a35a4e43f64bb49d0b6c52fe49308e5ecdb03d5cad40b9999d4eae7176cea5c643815bdf6cfef3562cced066cad487543e6fad13c7e78915e204db795164bc0f1955de204510b49b139503082dafb7a032cde4f95d354d2cfc08f6585f81bbd23be69479e999a2c3683058bcc341271ba1e9540499669c403199a8d7dab9be31db3895249ad9e1f5c14aeab82df3a736673724261e6fae02242ad78e55853ad57f111a5eb2fbcbec000000000000"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup/syz0\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r2, r1, 0xd, 0x2}, 0x10) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000100)={r2, r1, 0x8000000000d}, 0x10) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000780)='/dev/net/tun\x00', 0x200201, 0x0) ioctl$TUNSETPERSIST(r3, 0x400454cb, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f00000000c0)={0x0}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f000000b100)={&(0x7f000000af00)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, &(0x7f0000000740)=[{0x0}], 0x1, &(0x7f0000000640)=""/239, 0xef}, 0x20) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cgroup.controllers\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024, 0x0, 0x0, 0x0, 0x100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0)=r4, 0x4) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='cpuacct.stat\x00', 0x0, 0x0) ioctl$SIOCSIFHWADDR(r5, 0x8924, &(0x7f0000000580)={'veth0_to_bridge\x00', @dev}) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000180)=r5) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, r5) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000540)={0x7, 0x70, 0x1c, 0x0, 0xff, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x3, 0x4, @perf_config_ext={0x4, 0x6}, 0x4000, 0x0, 0x0, 0x3, 0x1, 0xf623, 0x9}, r4, 0x9, 0xffffffffffffffff, 0x4) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x10000020d) socketpair(0xf, 0x1, 0x9, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$kcm(r6, &(0x7f0000000a00)={&(0x7f00000004c0)=@phonet={0x23, 0x1, 0x0, 0x20}, 0x80, &(0x7f0000000600)=[{&(0x7f0000000540)}, {0x0}], 0x2, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], 0x1e2}, 0x0) gettid() openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYPTR64], 0xff39) 09:49:28 executing program 0: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="2398c593a2303d8df8dc1623f67a060d"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 200.765453][T10666] kAFS: Bad value for 'source' 09:49:28 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:49:28 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000080)=ANY=[@ANYBLOB], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:49:28 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(r0, 0x80dc5521, &(0x7f00000000c0)=""/153) 09:49:28 executing program 3: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:49:28 executing program 2: 09:49:28 executing program 0: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="2398c593a2303d8df8dc1623f67a060d"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 201.076322][T10683] kAFS: Bad value for 'source' 09:49:28 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f00000015c0)=ANY=[], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:49:28 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(r0, 0x80dc5521, &(0x7f00000000c0)=""/153) 09:49:28 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000080)=ANY=[@ANYBLOB], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:49:28 executing program 2: 09:49:28 executing program 3: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 201.281353][T10695] kAFS: Bad value for 'source' 09:49:28 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(r0, 0x80dc5521, &(0x7f00000000c0)=""/153) 09:49:28 executing program 0: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="2398c593a2303d8df8dc1623f67a060d"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 201.360690][T10698] kAFS: Bad value for 'source' 09:49:28 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f00000015c0)=ANY=[], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:49:28 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000080)=ANY=[@ANYBLOB], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:49:29 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(r0, 0x80dc5521, &(0x7f00000000c0)=""/153) 09:49:29 executing program 2: 09:49:29 executing program 3: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 201.632443][T10716] kAFS: Bad value for 'source' [ 201.639773][T10715] kAFS: Bad value for 'source' 09:49:29 executing program 0: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="2398c593a2303d8df8dc1623f67a060de466e34712df2321"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:49:29 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f00000015c0)=ANY=[], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:49:29 executing program 2: 09:49:29 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000080)=ANY=[@ANYBLOB='%'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:49:29 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndctrl(0x0, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(r0, 0x80dc5521, &(0x7f00000000c0)=""/153) 09:49:29 executing program 3: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f00000015c0)=ANY=[], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:49:29 executing program 0: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="2398c593a2303d8df8dc1623f67a060de466e34712df2321"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:49:29 executing program 2: [ 201.947106][T10734] kAFS: unparsable volume name [ 201.965738][T10735] kAFS: Bad value for 'source' 09:49:29 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000080)=ANY=[@ANYBLOB='%'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:49:29 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndctrl(0x0, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(r0, 0x80dc5521, &(0x7f00000000c0)=""/153) [ 202.139493][T10743] kAFS: Bad value for 'source' 09:49:29 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f00000015c0)=ANY=[@ANYBLOB], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:49:29 executing program 2: 09:49:29 executing program 3: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f00000015c0)=ANY=[], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 202.269853][T10748] kAFS: unparsable volume name 09:49:29 executing program 0: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="2398c593a2303d8df8dc1623f67a060de466e34712df2321"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 202.352495][T10753] kAFS: Bad value for 'source' 09:49:29 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000080)=ANY=[@ANYBLOB='%'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:49:29 executing program 2: [ 202.438071][T10760] kAFS: Bad value for 'source' 09:49:29 executing program 3: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f00000015c0)=ANY=[], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:49:30 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f00000015c0)=ANY=[@ANYBLOB], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:49:30 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndctrl(0x0, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(r0, 0x80dc5521, &(0x7f00000000c0)=""/153) [ 202.602868][T10766] kAFS: unparsable volume name 09:49:30 executing program 0: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="2398c593a2303d8df8dc1623f67a060de466e34712df232157116a41"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:49:30 executing program 2: 09:49:30 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000080)=ANY=[@ANYBLOB='%U'], 0x0, &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 202.670106][T10773] kAFS: Bad value for 'source' [ 202.682889][T10774] kAFS: Bad value for 'source' 09:49:30 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f00000015c0)=ANY=[@ANYBLOB], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:49:30 executing program 3: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f00000015c0)=ANY=[@ANYBLOB], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:49:30 executing program 0: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="2398c593a2303d8df8dc1623f67a060de466e34712df232157116a41"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:49:30 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(0xffffffffffffffff, 0x80dc5521, &(0x7f00000000c0)=""/153) 09:49:30 executing program 2: 09:49:30 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000080)=ANY=[@ANYBLOB='%U'], 0x0, &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 202.977362][T10788] kAFS: Bad value for 'source' [ 202.994261][T10789] kAFS: Bad value for 'source' 09:49:30 executing program 3: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f00000015c0)=ANY=[@ANYBLOB], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:49:30 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f00000015c0)=ANY=[@ANYBLOB='#'], 0x0, &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:49:30 executing program 2: 09:49:30 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(0xffffffffffffffff, 0x80dc5521, &(0x7f00000000c0)=""/153) 09:49:30 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000080)=ANY=[@ANYBLOB='%U'], 0x0, &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:49:30 executing program 0: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="2398c593a2303d8df8dc1623f67a060de466e34712df232157116a41"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:49:30 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f00000015c0)=ANY=[@ANYBLOB='#'], 0x0, &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:49:30 executing program 2: [ 203.391844][T10812] kAFS: Bad value for 'source' 09:49:30 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(0xffffffffffffffff, 0x80dc5521, &(0x7f00000000c0)=""/153) 09:49:31 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000080)=ANY=[@ANYBLOB='%U'], &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) 09:49:31 executing program 3: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f00000015c0)=ANY=[@ANYBLOB], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:49:31 executing program 0: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="2398c593a2303d8df8dc1623f67a060de466e34712df232157116a41dc2b"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:49:31 executing program 2: 09:49:31 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f00000015c0)=ANY=[@ANYBLOB='#'], 0x0, &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:49:31 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(r0, 0x80dc5521, 0x0) 09:49:31 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000080)=ANY=[@ANYBLOB='%U'], &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) 09:49:31 executing program 0: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="2398c593a2303d8df8dc1623f67a060de466e34712df232157116a41dc2b"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:49:31 executing program 2: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x80000000000002, 0x300) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000000)={'team_slave_0\x00', &(0x7f0000000080)=@ethtool_sset_info={0x37, 0x0, 0x6c97}}) [ 203.920863][T10839] kAFS: Bad value for 'source' 09:49:31 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f00000015c0)=ANY=[@ANYBLOB='#'], &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) 09:49:31 executing program 3: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f00000015c0)=ANY=[@ANYBLOB='%'], 0x0, &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:49:31 executing program 0: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="2398c593a2303d8df8dc1623f67a060de466e34712df232157116a41dc2b"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:49:31 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(r0, 0x80dc5521, 0x0) 09:49:31 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000080)=ANY=[@ANYBLOB='%U'], &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) 09:49:31 executing program 2: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x80000000000002, 0x300) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000000)={'team_slave_0\x00', &(0x7f0000000080)=@ethtool_sset_info={0x37, 0x0, 0x6c97}}) 09:49:31 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f00000015c0)=ANY=[@ANYBLOB='#'], &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) 09:49:31 executing program 3: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f00000015c0)=ANY=[@ANYBLOB='%'], 0x0, &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:49:31 executing program 0: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="2398c593a2303d8df8dc1623f67a060de466e34712df232157116a41dc2b32"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:49:31 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(r0, 0x80dc5521, 0x0) 09:49:32 executing program 4: 09:49:32 executing program 2: 09:49:32 executing program 3: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f00000015c0)=ANY=[@ANYBLOB='%'], 0x0, &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:49:32 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f00000015c0)=ANY=[@ANYBLOB='#'], &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) 09:49:32 executing program 0: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="2398c593a2303d8df8dc1623f67a060de466e34712df232157116a41dc2b32"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:49:32 executing program 1: 09:49:32 executing program 4: 09:49:32 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(r0, 0x80dc5521, 0x0) 09:49:32 executing program 3: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f00000015c0)=ANY=[@ANYBLOB='%'], &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) 09:49:32 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f00000015c0)=ANY=[@ANYBLOB], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:49:32 executing program 0: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="2398c593a2303d8df8dc1623f67a060de466e34712df232157116a41dc2b32"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:49:32 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(0xffffffffffffffff, 0x80dc5521, &(0x7f00000000c0)=""/153) 09:49:32 executing program 1: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f00000015c0)=ANY=[], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:49:32 executing program 3: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f00000015c0)=ANY=[@ANYBLOB='%'], &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) [ 205.315333][T10922] kAFS: Bad value for 'source' 09:49:32 executing program 5 (fault-call:1 fault-nth:0): mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f00000015c0)=ANY=[@ANYBLOB='#'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 205.351670][T10924] kAFS: Bad value for 'source' 09:49:32 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(r0, 0x80dc5521, 0x0) 09:49:32 executing program 0: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="2398c593a2303d8df8dc1623f67a060de466e34712df232157116a41dc2b323a"], 0x0, &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:49:33 executing program 1 (fault-call:2 fault-nth:0): perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(r0, 0x80dc5521, &(0x7f00000000c0)=""/153) 09:49:33 executing program 4 (fault-call:1 fault-nth:0): mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000080)=ANY=[@ANYBLOB='%U'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:49:33 executing program 3: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f00000015c0)=ANY=[@ANYBLOB='%'], &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) [ 205.581834][T10937] FAULT_INJECTION: forcing a failure. [ 205.581834][T10937] name failslab, interval 1, probability 0, space 0, times 1 09:49:33 executing program 0: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="2398c593a2303d8df8dc1623f67a060de466e34712df232157116a41dc2b323a"], 0x0, &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 205.676112][T10937] CPU: 0 PID: 10937 Comm: syz-executor.5 Not tainted 5.5.0-rc5-syzkaller #0 [ 205.684848][T10937] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 205.695466][T10937] Call Trace: [ 205.699212][T10937] dump_stack+0x197/0x210 [ 205.703579][T10937] should_fail.cold+0xa/0x15 [ 205.708460][T10937] ? fault_create_debugfs_attr+0x180/0x180 [ 205.714387][T10937] ? ___might_sleep+0x163/0x2c0 [ 205.719267][T10937] __should_failslab+0x121/0x190 09:49:33 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x6, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) r0 = semget(0x3, 0x3, 0x200) semctl$IPC_RMID(r0, 0x0, 0x0) semctl$SEM_INFO(r0, 0x3, 0x13, &(0x7f00000003c0)=""/4096) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000300)='cgroup2\x00', 0x0, 0x0) rmdir(&(0x7f0000000140)='./file0//ile0\x00') syz_open_dev$mice(0x0, 0x0, 0x0) getpgrp(0x0) open(&(0x7f0000000300)='.\x00', 0x0, 0x68) mkdir(&(0x7f0000000000)='./file0//ile0\x00', 0xcfa5) r1 = open(&(0x7f0000000080)='./file0\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r1, 0x0) mkdir(&(0x7f00000000c0)='./file0//ile0\x00', 0x99c24a96ca835726) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000380)) r3 = dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x4, 0x5, 0x53, 0x7f, 0x0, 0x101, 0x64820, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x8, 0x2, @perf_bp={&(0x7f0000000000), 0x1}, 0x100, 0x5, 0x3, 0x9, 0x3ff, 0x2, 0x8000}, r2, 0xe, r3, 0x1) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r1, 0xc1105511, &(0x7f0000000180)={{0x0, 0x5, 0x1, 0xa54, 'syz1\x00', 0x7e5a}, 0x6, 0x20000002, 0x3, r2, 0x5, 0x369f, 'syz1\x00', &(0x7f0000000080)=['cgroup2\x00', 'cgroup2\x00', '\x00', 'eth0%posix_acl_access@eth0\x00', 'cgroup2\x00'], 0x34, [], [0x9, 0xc6ff, 0x92a, 0x8]}) [ 205.724242][T10937] should_failslab+0x9/0x14 [ 205.728767][T10937] __kmalloc_track_caller+0x2dc/0x760 [ 205.734171][T10937] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 205.740427][T10937] ? fput_many+0x12c/0x1a0 [ 205.744859][T10937] ? strndup_user+0x77/0xd0 [ 205.749375][T10937] memdup_user+0x26/0xd0 [ 205.753795][T10937] strndup_user+0x77/0xd0 [ 205.758153][T10937] copy_mount_string+0x2a/0x40 [ 205.762923][T10937] __ia32_compat_sys_mount+0xcf/0x790 [ 205.768294][T10937] ? trace_hardirqs_on+0x67/0x240 [ 205.773336][T10937] do_fast_syscall_32+0x27b/0xe16 [ 205.778387][T10937] entry_SYSENTER_compat+0x70/0x7f [ 205.783496][T10937] RIP: 0023:0xf7fa7a39 [ 205.787562][T10937] Code: 00 00 00 89 d3 5b 5e 5f 5d c3 b8 80 96 98 00 eb c4 8b 04 24 c3 8b 1c 24 c3 8b 34 24 c3 8b 3c 24 c3 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 205.808173][T10937] RSP: 002b:00000000f5da30cc EFLAGS: 00000296 ORIG_RAX: 0000000000000015 [ 205.816594][T10937] RAX: ffffffffffffffda RBX: 00000000200015c0 RCX: 0000000020000140 [ 205.824557][T10937] RDX: 0000000020000180 RSI: 0000000000000000 RDI: 0000000000000000 [ 205.832559][T10937] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 205.840628][T10937] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 205.848610][T10937] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 205.901320][T10945] FAULT_INJECTION: forcing a failure. [ 205.901320][T10945] name failslab, interval 1, probability 0, space 0, times 1 [ 205.950349][T10945] CPU: 1 PID: 10945 Comm: syz-executor.4 Not tainted 5.5.0-rc5-syzkaller #0 [ 205.959093][T10945] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 205.969184][T10945] Call Trace: [ 205.969216][T10945] dump_stack+0x197/0x210 [ 205.969245][T10945] should_fail.cold+0xa/0x15 [ 205.981816][T10945] ? fault_create_debugfs_attr+0x180/0x180 [ 205.987667][T10945] ? ___might_sleep+0x163/0x2c0 [ 205.992573][T10945] __should_failslab+0x121/0x190 [ 205.997547][T10945] should_failslab+0x9/0x14 [ 206.002075][T10945] __kmalloc_track_caller+0x2dc/0x760 [ 206.007485][T10945] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 206.013758][T10945] ? fput_many+0x12c/0x1a0 [ 206.018208][T10945] ? strndup_user+0x77/0xd0 [ 206.022750][T10945] memdup_user+0x26/0xd0 [ 206.027031][T10945] strndup_user+0x77/0xd0 [ 206.031401][T10945] copy_mount_string+0x2a/0x40 [ 206.036202][T10945] __ia32_compat_sys_mount+0xcf/0x790 [ 206.041608][T10945] ? trace_hardirqs_on+0x67/0x240 [ 206.046673][T10945] do_fast_syscall_32+0x27b/0xe16 [ 206.051892][T10945] entry_SYSENTER_compat+0x70/0x7f [ 206.057027][T10945] RIP: 0023:0xf7fdca39 [ 206.061121][T10945] Code: 00 00 00 89 d3 5b 5e 5f 5d c3 b8 80 96 98 00 eb c4 8b 04 24 c3 8b 1c 24 c3 8b 34 24 c3 8b 3c 24 c3 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 206.080759][T10945] RSP: 002b:00000000f5dd80cc EFLAGS: 00000296 ORIG_RAX: 0000000000000015 [ 206.089206][T10945] RAX: ffffffffffffffda RBX: 0000000020000080 RCX: 0000000020000140 09:49:33 executing program 0: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="2398c593a2303d8df8dc1623f67a060de466e34712df232157116a41dc2b323a"], 0x0, &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 206.097208][T10945] RDX: 0000000020000180 RSI: 0000000000000000 RDI: 0000000000000000 [ 206.105223][T10945] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 206.113229][T10945] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 206.121235][T10945] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 09:49:33 executing program 2: ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, 0x0) socketpair$unix(0x1, 0x2000000000000003, 0x0, &(0x7f0000000240)) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x40, 0x8001, 0x0, 0x0, 0x0, 0x9, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x212e0}, 0x0, 0x3, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r1, 0x29, 0xb, &(0x7f0000000280)=0x2, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$TUNSETVNETHDRSZ(0xffffffffffffffff, 0x400454d8, &(0x7f0000000040)) ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d) mlock2(&(0x7f0000ffa000/0x6000)=nil, 0x6000, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, 0x0) open(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ftruncate(0xffffffffffffffff, 0x0) accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d) r2 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40046602, 0x0) pread64(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @mcast1, 0x7b}, 0x1c) listen(r3, 0x0) ftruncate(r2, 0x7fff) sendfile(r1, r2, 0x0, 0x8000fffffffe) [ 206.155279][T10956] FAULT_INJECTION: forcing a failure. [ 206.155279][T10956] name failslab, interval 1, probability 0, space 0, times 0 09:49:33 executing program 4 (fault-call:1 fault-nth:1): mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000080)=ANY=[@ANYBLOB='%U'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 206.209384][T10956] CPU: 0 PID: 10956 Comm: syz-executor.1 Not tainted 5.5.0-rc5-syzkaller #0 [ 206.218108][T10956] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 206.228199][T10956] Call Trace: [ 206.231551][T10956] dump_stack+0x197/0x210 [ 206.235928][T10956] should_fail.cold+0xa/0x15 [ 206.240562][T10956] ? fault_create_debugfs_attr+0x180/0x180 [ 206.246586][T10956] ? ___might_sleep+0x163/0x2c0 [ 206.251479][T10956] __should_failslab+0x121/0x190 [ 206.256459][T10956] should_failslab+0x9/0x14 [ 206.260989][T10956] __kmalloc+0x2e0/0x770 [ 206.265252][T10956] ? mark_held_locks+0xf0/0xf0 [ 206.270065][T10956] ? tomoyo_realpath_from_path+0xc5/0x660 [ 206.270090][T10956] tomoyo_realpath_from_path+0xc5/0x660 [ 206.270112][T10956] ? tomoyo_path_number_perm+0x193/0x520 [ 206.287026][T10956] tomoyo_path_number_perm+0x1dd/0x520 [ 206.292518][T10956] ? tomoyo_path_number_perm+0x193/0x520 [ 206.298179][T10956] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 206.304006][T10956] ? perf_trace_lock_acquire+0xf5/0x530 [ 206.309564][T10956] ? native_iret+0x7/0x7 [ 206.309632][T10956] ? __fget+0x37f/0x550 [ 206.318005][T10956] ? ksys_dup3+0x3e0/0x3e0 [ 206.318616][T10959] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. [ 206.322457][T10956] ? fput_many+0x12c/0x1a0 [ 206.322502][T10956] tomoyo_file_ioctl+0x23/0x30 [ 206.322522][T10956] security_file_ioctl+0x77/0xc0 [ 206.322548][T10956] __ia32_compat_sys_ioctl+0xcc/0x610 [ 206.322569][T10956] ? trace_hardirqs_on+0x67/0x240 [ 206.322599][T10956] do_fast_syscall_32+0x27b/0xe16 [ 206.350511][T10956] entry_SYSENTER_compat+0x70/0x7f [ 206.350528][T10956] RIP: 0023:0xf7fb0a39 [ 206.350547][T10956] Code: 00 00 00 89 d3 5b 5e 5f 5d c3 b8 80 96 98 00 eb c4 8b 04 24 c3 8b 1c 24 c3 8b 34 24 c3 8b 3c 24 c3 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 206.350555][T10956] RSP: 002b:00000000f5d8b0cc EFLAGS: 00000296 ORIG_RAX: 0000000000000036 09:49:33 executing program 0: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="2398c593a2303d8df8dc1623f67a060de466e34712df232157116a41dc2b323a"], &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) [ 206.350570][T10956] RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 0000000080dc5521 [ 206.350580][T10956] RDX: 00000000200000c0 RSI: 0000000000000000 RDI: 0000000000000000 [ 206.350590][T10956] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 206.350599][T10956] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 206.350607][T10956] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 09:49:33 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f00000015c0)=ANY=[@ANYBLOB='#'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:49:33 executing program 3 (fault-call:1 fault-nth:0): mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f00000015c0)=ANY=[@ANYBLOB='%'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 206.488184][T10963] FAULT_INJECTION: forcing a failure. [ 206.488184][T10963] name failslab, interval 1, probability 0, space 0, times 0 [ 206.511846][T10963] CPU: 1 PID: 10963 Comm: syz-executor.4 Not tainted 5.5.0-rc5-syzkaller #0 [ 206.520591][T10963] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 206.530685][T10963] Call Trace: [ 206.534007][T10963] dump_stack+0x197/0x210 [ 206.538371][T10963] should_fail.cold+0xa/0x15 [ 206.538401][T10968] FAULT_INJECTION: forcing a failure. [ 206.538401][T10968] name failslab, interval 1, probability 0, space 0, times 0 [ 206.542994][T10963] ? fault_create_debugfs_attr+0x180/0x180 [ 206.543019][T10963] ? ___might_sleep+0x163/0x2c0 [ 206.543043][T10963] __should_failslab+0x121/0x190 [ 206.543063][T10963] should_failslab+0x9/0x14 [ 206.543085][T10963] __kmalloc_track_caller+0x2dc/0x760 [ 206.581208][T10963] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 206.587473][T10963] ? strndup_user+0x77/0xd0 [ 206.592003][T10963] memdup_user+0x26/0xd0 [ 206.596248][T10963] strndup_user+0x77/0xd0 [ 206.600581][T10963] copy_mount_string+0x2a/0x40 [ 206.605342][T10963] __ia32_compat_sys_mount+0xfb/0x790 [ 206.610714][T10963] ? trace_hardirqs_on+0x67/0x240 [ 206.615738][T10963] do_fast_syscall_32+0x27b/0xe16 [ 206.620775][T10963] entry_SYSENTER_compat+0x70/0x7f [ 206.625872][T10963] RIP: 0023:0xf7fdca39 [ 206.629946][T10963] Code: 00 00 00 89 d3 5b 5e 5f 5d c3 b8 80 96 98 00 eb c4 8b 04 24 c3 8b 1c 24 c3 8b 34 24 c3 8b 3c 24 c3 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 206.649539][T10963] RSP: 002b:00000000f5dd80cc EFLAGS: 00000296 ORIG_RAX: 0000000000000015 [ 206.657943][T10963] RAX: ffffffffffffffda RBX: 0000000020000080 RCX: 0000000020000140 [ 206.665904][T10963] RDX: 0000000020000180 RSI: 0000000000000000 RDI: 0000000000000000 [ 206.673881][T10963] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 09:49:34 executing program 0: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="2398c593a2303d8df8dc1623f67a060de466e34712df232157116a41dc2b323a"], &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) [ 206.681864][T10963] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 206.690172][T10963] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 206.724556][T10968] CPU: 0 PID: 10968 Comm: syz-executor.3 Not tainted 5.5.0-rc5-syzkaller #0 [ 206.733443][T10968] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 206.743525][T10968] Call Trace: [ 206.746858][T10968] dump_stack+0x197/0x210 [ 206.751232][T10968] should_fail.cold+0xa/0x15 [ 206.755859][T10968] ? fault_create_debugfs_attr+0x180/0x180 [ 206.761714][T10968] ? ___might_sleep+0x163/0x2c0 [ 206.766605][T10968] __should_failslab+0x121/0x190 [ 206.771573][T10968] should_failslab+0x9/0x14 [ 206.776111][T10968] __kmalloc_track_caller+0x2dc/0x760 [ 206.781526][T10968] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 206.787806][T10968] ? fput_many+0x12c/0x1a0 [ 206.789414][T10971] kAFS: unparsable volume name [ 206.792254][T10968] ? strndup_user+0x77/0xd0 [ 206.792276][T10968] memdup_user+0x26/0xd0 [ 206.792292][T10968] strndup_user+0x77/0xd0 [ 206.792314][T10968] copy_mount_string+0x2a/0x40 [ 206.792333][T10968] __ia32_compat_sys_mount+0xcf/0x790 [ 206.792352][T10968] ? trace_hardirqs_on+0x67/0x240 [ 206.792377][T10968] do_fast_syscall_32+0x27b/0xe16 [ 206.792398][T10968] entry_SYSENTER_compat+0x70/0x7f [ 206.792411][T10968] RIP: 0023:0xf7f16a39 [ 206.792435][T10968] Code: 00 00 00 89 d3 5b 5e 5f 5d c3 b8 80 96 98 00 eb c4 8b 04 24 c3 8b 1c 24 c3 8b 34 24 c3 8b 3c 24 c3 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 206.792451][T10968] RSP: 002b:00000000f5d120cc EFLAGS: 00000296 ORIG_RAX: 0000000000000015 [ 206.797465][T10956] ERROR: Out of memory at tomoyo_realpath_from_path. [ 206.801841][T10968] RAX: ffffffffffffffda RBX: 00000000200015c0 RCX: 0000000020000140 [ 206.801852][T10968] RDX: 0000000020000180 RSI: 0000000000000000 RDI: 0000000000000000 [ 206.801859][T10968] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 206.801868][T10968] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 206.801876][T10968] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 09:49:34 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(r0, 0x80dc5521, &(0x7f00000000c0)=""/153) 09:49:34 executing program 0: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="2398c593a2303d8df8dc1623f67a060de466e34712df232157116a41dc2b323a"], &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) 09:49:34 executing program 2: ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, 0x0) socketpair$unix(0x1, 0x2000000000000003, 0x0, &(0x7f0000000240)) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x40, 0x8001, 0x0, 0x0, 0x0, 0x9, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x212e0}, 0x0, 0x3, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r1, 0x29, 0xb, &(0x7f0000000280)=0x2, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$TUNSETVNETHDRSZ(0xffffffffffffffff, 0x400454d8, &(0x7f0000000040)) ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d) mlock2(&(0x7f0000ffa000/0x6000)=nil, 0x6000, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, 0x0) open(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ftruncate(0xffffffffffffffff, 0x0) accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d) r2 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40046602, 0x0) pread64(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @mcast1, 0x7b}, 0x1c) listen(r3, 0x0) ftruncate(r2, 0x7fff) sendfile(r1, r2, 0x0, 0x8000fffffffe) 09:49:34 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f00000015c0)=ANY=[@ANYBLOB='%'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:49:34 executing program 3 (fault-call:1 fault-nth:1): mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f00000015c0)=ANY=[@ANYBLOB='%'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:49:34 executing program 4 (fault-call:1 fault-nth:2): mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000080)=ANY=[@ANYBLOB='%U'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 207.315043][T10989] kAFS: unparsable volume name [ 207.344089][T10994] FAULT_INJECTION: forcing a failure. [ 207.344089][T10994] name failslab, interval 1, probability 0, space 0, times 0 [ 207.361640][T10990] FAULT_INJECTION: forcing a failure. [ 207.361640][T10990] name failslab, interval 1, probability 0, space 0, times 0 09:49:34 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f00000015c0)=ANY=[@ANYBLOB='/'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 207.410732][T10994] CPU: 0 PID: 10994 Comm: syz-executor.3 Not tainted 5.5.0-rc5-syzkaller #0 [ 207.419507][T10994] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 207.429582][T10994] Call Trace: [ 207.432908][T10994] dump_stack+0x197/0x210 [ 207.437276][T10994] should_fail.cold+0xa/0x15 [ 207.441900][T10994] ? fault_create_debugfs_attr+0x180/0x180 [ 207.447742][T10994] ? ___might_sleep+0x163/0x2c0 [ 207.452632][T10994] __should_failslab+0x121/0x190 [ 207.457605][T10994] should_failslab+0x9/0x14 [ 207.462120][T10994] __kmalloc_track_caller+0x2dc/0x760 [ 207.462144][T10994] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 207.462161][T10994] ? strndup_user+0x77/0xd0 [ 207.462179][T10994] memdup_user+0x26/0xd0 [ 207.462197][T10994] strndup_user+0x77/0xd0 [ 207.462215][T10994] copy_mount_string+0x2a/0x40 [ 207.462236][T10994] __ia32_compat_sys_mount+0xfb/0x790 [ 207.473836][T10994] ? trace_hardirqs_on+0x67/0x240 [ 207.473861][T10994] do_fast_syscall_32+0x27b/0xe16 [ 207.473883][T10994] entry_SYSENTER_compat+0x70/0x7f [ 207.473895][T10994] RIP: 0023:0xf7f16a39 [ 207.473912][T10994] Code: 00 00 00 89 d3 5b 5e 5f 5d c3 b8 80 96 98 00 eb c4 8b 04 24 c3 8b 1c 24 c3 8b 34 24 c3 8b 3c 24 c3 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 207.473919][T10994] RSP: 002b:00000000f5d120cc EFLAGS: 00000296 ORIG_RAX: 0000000000000015 [ 207.473934][T10994] RAX: ffffffffffffffda RBX: 00000000200015c0 RCX: 0000000020000140 [ 207.473942][T10994] RDX: 0000000020000180 RSI: 0000000000000000 RDI: 0000000000000000 [ 207.473950][T10994] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 207.473957][T10994] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 207.473973][T10994] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 207.539546][T11000] kAFS: unparsable volume name [ 207.560644][T10990] CPU: 0 PID: 10990 Comm: syz-executor.4 Not tainted 5.5.0-rc5-syzkaller #0 [ 207.598415][T10990] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 207.608494][T10990] Call Trace: [ 207.611813][T10990] dump_stack+0x197/0x210 [ 207.616188][T10990] should_fail.cold+0xa/0x15 [ 207.620948][T10990] ? __kasan_check_read+0x11/0x20 [ 207.626017][T10990] ? fault_create_debugfs_attr+0x180/0x180 [ 207.631869][T10990] ? ___might_sleep+0x163/0x2c0 [ 207.636747][T10990] __should_failslab+0x121/0x190 [ 207.641714][T10990] should_failslab+0x9/0x14 [ 207.646224][T10990] kmem_cache_alloc+0x2aa/0x710 [ 207.651068][T10990] ? find_held_lock+0x35/0x130 [ 207.655840][T10990] ? __might_fault+0x12b/0x1e0 [ 207.660666][T10990] getname_flags+0xd6/0x5b0 [ 207.665169][T10990] user_path_at_empty+0x2f/0x50 [ 207.670044][T10990] do_mount+0x150/0x1b50 [ 207.674290][T10990] ? copy_mount_string+0x40/0x40 [ 207.679220][T10990] ? _copy_from_user+0x12c/0x1a0 [ 207.684160][T10990] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 207.690395][T10990] ? memdup_user+0x80/0xd0 [ 207.694813][T10990] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 207.701048][T10990] ? copy_mount_options+0x2e8/0x3f0 [ 207.706248][T10990] __ia32_compat_sys_mount+0x664/0x790 [ 207.711705][T10990] ? trace_hardirqs_on+0x67/0x240 [ 207.716731][T10990] do_fast_syscall_32+0x27b/0xe16 [ 207.721756][T10990] entry_SYSENTER_compat+0x70/0x7f [ 207.726859][T10990] RIP: 0023:0xf7fdca39 [ 207.730922][T10990] Code: 00 00 00 89 d3 5b 5e 5f 5d c3 b8 80 96 98 00 eb c4 8b 04 24 c3 8b 1c 24 c3 8b 34 24 c3 8b 3c 24 c3 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 207.750529][T10990] RSP: 002b:00000000f5dd80cc EFLAGS: 00000296 ORIG_RAX: 0000000000000015 [ 207.758979][T10990] RAX: ffffffffffffffda RBX: 0000000020000080 RCX: 0000000020000140 [ 207.766970][T10990] RDX: 0000000020000180 RSI: 0000000000000000 RDI: 0000000000000000 [ 207.774943][T10990] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 207.782912][T10990] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 207.790892][T10990] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 09:49:35 executing program 0: ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, 0x0) socketpair$unix(0x1, 0x2000000000000003, 0x0, &(0x7f0000000240)) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x40, 0x8001, 0x0, 0x0, 0x0, 0x9, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x212e0}, 0x0, 0x3, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r1, 0x29, 0xb, &(0x7f0000000280)=0x2, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$TUNSETVNETHDRSZ(0xffffffffffffffff, 0x400454d8, &(0x7f0000000040)) ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d) mlock2(&(0x7f0000ffa000/0x6000)=nil, 0x6000, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, 0x0) open(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ftruncate(0xffffffffffffffff, 0x0) accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d) r2 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40046602, 0x0) pread64(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @mcast1, 0x7b}, 0x1c) listen(r3, 0x0) ftruncate(r2, 0x7fff) sendfile(r1, r2, 0x0, 0x8000fffffffe) 09:49:35 executing program 4 (fault-call:1 fault-nth:3): mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000080)=ANY=[@ANYBLOB='%U'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:49:35 executing program 2 (fault-call:1 fault-nth:0): mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="2398c593a2303d8df8dc1623f67a060de466e34712df232157116a41dc2b323a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:49:35 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f00000015c0)=ANY=[@ANYBLOB='\\'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:49:35 executing program 3 (fault-call:1 fault-nth:2): mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f00000015c0)=ANY=[@ANYBLOB='%'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 208.043103][T11010] FAULT_INJECTION: forcing a failure. [ 208.043103][T11010] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 208.056355][T11010] CPU: 0 PID: 11010 Comm: syz-executor.4 Not tainted 5.5.0-rc5-syzkaller #0 [ 208.065053][T11010] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 208.075110][T11010] Call Trace: [ 208.078405][T11010] dump_stack+0x197/0x210 [ 208.082733][T11010] should_fail.cold+0xa/0x15 [ 208.087355][T11010] ? fault_create_debugfs_attr+0x180/0x180 [ 208.093184][T11010] ? __kasan_check_read+0x11/0x20 [ 208.098201][T11010] ? __lock_acquire+0x16f2/0x4a00 [ 208.103218][T11010] ? _parse_integer+0x190/0x190 [ 208.108080][T11010] should_fail_alloc_page+0x50/0x60 [ 208.113269][T11010] __alloc_pages_nodemask+0x1a1/0x910 [ 208.118631][T11010] ? fs_reclaim_release+0xf/0x30 [ 208.123571][T11010] ? __alloc_pages_slowpath+0x2920/0x2920 [ 208.129292][T11010] ? fs_reclaim_release+0xf/0x30 [ 208.134225][T11010] ? fault_create_debugfs_attr+0x180/0x180 [ 208.140021][T11010] cache_grow_begin+0x90/0xc60 [ 208.144774][T11010] ? getname_flags+0xd6/0x5b0 [ 208.149443][T11010] ? trace_hardirqs_off+0x62/0x240 [ 208.154543][T11010] kmem_cache_alloc+0x64e/0x710 [ 208.159474][T11010] ? find_held_lock+0x35/0x130 [ 208.164233][T11010] getname_flags+0xd6/0x5b0 [ 208.168728][T11010] user_path_at_empty+0x2f/0x50 [ 208.173570][T11010] do_mount+0x150/0x1b50 [ 208.177807][T11010] ? copy_mount_string+0x40/0x40 [ 208.182733][T11010] ? _copy_from_user+0x12c/0x1a0 [ 208.187663][T11010] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 208.193897][T11010] ? memdup_user+0x80/0xd0 [ 208.198302][T11010] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 208.204532][T11010] ? copy_mount_options+0x2e8/0x3f0 [ 208.209734][T11010] __ia32_compat_sys_mount+0x664/0x790 [ 208.215183][T11010] ? trace_hardirqs_on+0x67/0x240 [ 208.220199][T11010] do_fast_syscall_32+0x27b/0xe16 [ 208.225215][T11010] entry_SYSENTER_compat+0x70/0x7f [ 208.230312][T11010] RIP: 0023:0xf7fdca39 [ 208.234485][T11010] Code: 00 00 00 89 d3 5b 5e 5f 5d c3 b8 80 96 98 00 eb c4 8b 04 24 c3 8b 1c 24 c3 8b 34 24 c3 8b 3c 24 c3 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 208.254102][T11010] RSP: 002b:00000000f5dd80cc EFLAGS: 00000296 ORIG_RAX: 0000000000000015 [ 208.262514][T11010] RAX: ffffffffffffffda RBX: 0000000020000080 RCX: 0000000020000140 [ 208.270477][T11010] RDX: 0000000020000180 RSI: 0000000000000000 RDI: 0000000000000000 [ 208.278437][T11010] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 208.286398][T11010] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 208.294377][T11010] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 208.324156][T11011] FAULT_INJECTION: forcing a failure. [ 208.324156][T11011] name failslab, interval 1, probability 0, space 0, times 0 [ 208.336203][T11008] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. [ 208.363122][T11011] CPU: 0 PID: 11011 Comm: syz-executor.2 Not tainted 5.5.0-rc5-syzkaller #0 [ 208.371862][T11011] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 208.381946][T11011] Call Trace: [ 208.385264][T11011] dump_stack+0x197/0x210 [ 208.389642][T11011] should_fail.cold+0xa/0x15 [ 208.394270][T11011] ? fault_create_debugfs_attr+0x180/0x180 [ 208.400109][T11011] ? ___might_sleep+0x163/0x2c0 [ 208.404996][T11011] __should_failslab+0x121/0x190 [ 208.409963][T11011] should_failslab+0x9/0x14 [ 208.414491][T11011] __kmalloc_track_caller+0x2dc/0x760 [ 208.419910][T11011] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 208.426187][T11011] ? fput_many+0x12c/0x1a0 [ 208.430639][T11011] ? strndup_user+0x77/0xd0 [ 208.435168][T11011] memdup_user+0x26/0xd0 [ 208.439436][T11011] strndup_user+0x77/0xd0 [ 208.443796][T11011] copy_mount_string+0x2a/0x40 [ 208.448589][T11011] __ia32_compat_sys_mount+0xcf/0x790 [ 208.453987][T11011] ? trace_hardirqs_on+0x67/0x240 [ 208.459052][T11011] do_fast_syscall_32+0x27b/0xe16 [ 208.464111][T11011] entry_SYSENTER_compat+0x70/0x7f [ 208.469229][T11011] RIP: 0023:0xf7f24a39 [ 208.473331][T11011] Code: 00 00 00 89 d3 5b 5e 5f 5d c3 b8 80 96 98 00 eb c4 8b 04 24 c3 8b 1c 24 c3 8b 34 24 c3 8b 3c 24 c3 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 208.492942][T11011] RSP: 002b:00000000f5d200cc EFLAGS: 00000296 ORIG_RAX: 0000000000000015 [ 208.492956][T11011] RAX: ffffffffffffffda RBX: 0000000020000240 RCX: 0000000020000140 [ 208.492963][T11011] RDX: 0000000020000180 RSI: 0000000000000000 RDI: 0000000000000000 [ 208.492971][T11011] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 208.492978][T11011] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 208.492985][T11011] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 09:49:36 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(r0, 0x2, &(0x7f00000000c0)=""/153) 09:49:36 executing program 4 (fault-call:1 fault-nth:4): mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000080)=ANY=[@ANYBLOB='%U'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:49:36 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x100000000011, 0x2, 0x0) bind(r3, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f0000000240)={0x11, 0x0, 0x0}, &(0x7f00000002c0)=0x14) r5 = openat$ocfs2_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ocfs2_control\x00', 0x2, 0x0) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r5, 0x84, 0x7, &(0x7f0000000100)={0x100}, 0x4) sendmsg$nl_route(r2, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)=ANY=[@ANYBLOB="2c0000001600010800000000000000000a0000009d5ce9a504bb3cb434d2bea9dfd2035d07a6a1725957857843f3e89525884e828f38d2d615a0a0c08ce1606551b673b8baf379fa043e9c6f67cf680a605425600fade208959099e07f850d891924ccfcdb201cda", @ANYRES32=r4, @ANYBLOB="14000200fe8000000000000000000000000000aa"], 0x2c}}, 0x0) setsockopt$inet6_IPV6_PKTINFO(r1, 0x29, 0x32, &(0x7f0000000000)={@rand_addr="4d8f73a13612f1f21ddc8f9a01c4d0be", r4}, 0x14) sendmsg$netlink(r0, &(0x7f0000000fc0)={0x0, 0x0, &(0x7f0000000e00)=[{&(0x7f00000009c0)=ANY=[@ANYBLOB="1c00000020002907000000679100fcffffff5c0b863c450400008000"], 0x1c}], 0x1}, 0x0) 09:49:36 executing program 2 (fault-call:1 fault-nth:1): mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="2398c593a2303d8df8dc1623f67a060de466e34712df232157116a41dc2b323a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 208.785082][T11019] FAULT_INJECTION: forcing a failure. [ 208.785082][T11019] name failslab, interval 1, probability 0, space 0, times 0 [ 208.817832][T11024] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. [ 208.829333][T11026] FAULT_INJECTION: forcing a failure. [ 208.829333][T11026] name failslab, interval 1, probability 0, space 0, times 0 [ 208.831544][T11019] CPU: 0 PID: 11019 Comm: syz-executor.2 Not tainted 5.5.0-rc5-syzkaller #0 [ 208.848880][T11025] FAULT_INJECTION: forcing a failure. [ 208.848880][T11025] name failslab, interval 1, probability 0, space 0, times 0 [ 208.850650][T11019] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 208.850658][T11019] Call Trace: [ 208.850684][T11019] dump_stack+0x197/0x210 [ 208.850710][T11019] should_fail.cold+0xa/0x15 [ 208.850728][T11019] ? fault_create_debugfs_attr+0x180/0x180 [ 208.850751][T11019] ? ___might_sleep+0x163/0x2c0 [ 208.850773][T11019] __should_failslab+0x121/0x190 [ 208.850789][T11019] should_failslab+0x9/0x14 [ 208.850810][T11019] __kmalloc_track_caller+0x2dc/0x760 [ 208.867252][T11029] kAFS: unparsable volume name [ 208.873598][T11019] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 208.873618][T11019] ? strndup_user+0x77/0xd0 [ 208.873634][T11019] memdup_user+0x26/0xd0 [ 208.873650][T11019] strndup_user+0x77/0xd0 [ 208.873672][T11019] copy_mount_string+0x2a/0x40 [ 208.873691][T11019] __ia32_compat_sys_mount+0xfb/0x790 [ 208.873710][T11019] ? trace_hardirqs_on+0x67/0x240 [ 208.873733][T11019] do_fast_syscall_32+0x27b/0xe16 [ 208.873754][T11019] entry_SYSENTER_compat+0x70/0x7f [ 208.873775][T11019] RIP: 0023:0xf7f24a39 [ 208.964877][T11019] Code: 00 00 00 89 d3 5b 5e 5f 5d c3 b8 80 96 98 00 eb c4 8b 04 24 c3 8b 1c 24 c3 8b 34 24 c3 8b 3c 24 c3 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 208.984505][T11019] RSP: 002b:00000000f5d200cc EFLAGS: 00000296 ORIG_RAX: 0000000000000015 [ 208.992937][T11019] RAX: ffffffffffffffda RBX: 0000000020000240 RCX: 0000000020000140 [ 209.000947][T11019] RDX: 0000000020000180 RSI: 0000000000000000 RDI: 0000000000000000 [ 209.008933][T11019] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 209.016904][T11019] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 209.024887][T11019] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 209.032886][T11026] CPU: 1 PID: 11026 Comm: syz-executor.4 Not tainted 5.5.0-rc5-syzkaller #0 [ 209.041573][T11026] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 209.041580][T11026] Call Trace: [ 209.041606][T11026] dump_stack+0x197/0x210 [ 209.041629][T11026] should_fail.cold+0xa/0x15 [ 209.041650][T11026] ? fault_create_debugfs_attr+0x180/0x180 [ 209.041671][T11026] ? ___might_sleep+0x163/0x2c0 [ 209.041692][T11026] __should_failslab+0x121/0x190 [ 209.041716][T11026] should_failslab+0x9/0x14 09:49:36 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f00000015c0)=ANY=[@ANYBLOB='#'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 209.070030][T11026] __kmalloc+0x2e0/0x770 [ 209.070051][T11026] ? save_stack+0x5c/0x90 [ 209.070070][T11026] ? tomoyo_encode2.part.0+0xf5/0x400 [ 209.070096][T11026] tomoyo_encode2.part.0+0xf5/0x400 [ 209.103503][T11026] ? do_fast_syscall_32+0x27b/0xe16 [ 209.108753][T11026] tomoyo_encode+0x2b/0x50 [ 209.113202][T11026] tomoyo_mount_acl+0xe0/0x840 [ 209.117992][T11026] ? debug_check_no_obj_freed+0x20a/0x43f [ 209.123741][T11026] ? __kasan_check_read+0x11/0x20 [ 209.129485][T11026] ? mark_lock+0xc2/0x1220 09:49:36 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f00000015c0)=ANY=[@ANYBLOB='#'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x2, 0x0) [ 209.133935][T11026] ? tomoyo_check_mount_acl+0x1b0/0x1b0 [ 209.139520][T11026] ? __kasan_check_read+0x11/0x20 [ 209.143528][T11034] kAFS: unparsable volume name [ 209.144587][T11026] ? __lock_acquire+0x8a0/0x4a00 [ 209.144610][T11026] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 209.144627][T11026] ? debug_smp_processor_id+0x33/0x18a [ 209.144649][T11026] ? perf_trace_lock_acquire+0xf5/0x530 [ 209.171600][T11026] ? lock_acquire+0x190/0x410 [ 209.176311][T11026] ? tomoyo_mount_permission+0x10a/0x400 [ 209.181991][T11026] tomoyo_mount_permission+0x16a/0x400 [ 209.187459][T11026] ? tomoyo_mount_permission+0x10a/0x400 [ 209.193093][T11026] ? tomoyo_mount_acl+0x840/0x840 [ 209.193126][T11026] ? strncpy_from_user+0x2b4/0x400 [ 209.193144][T11026] tomoyo_sb_mount+0x35/0x40 [ 209.193161][T11026] security_sb_mount+0x87/0xd0 [ 209.193186][T11026] do_mount+0x1d4/0x1b50 [ 209.216904][T11026] ? copy_mount_string+0x40/0x40 [ 209.221873][T11026] ? _copy_from_user+0x12c/0x1a0 [ 209.226847][T11026] ? memdup_user+0x80/0xd0 [ 209.231295][T11026] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 209.237572][T11026] ? copy_mount_options+0x2e8/0x3f0 [ 209.238654][T11037] kAFS: unparsable volume name [ 209.242803][T11026] __ia32_compat_sys_mount+0x664/0x790 [ 209.242827][T11026] ? trace_hardirqs_on+0x67/0x240 [ 209.242852][T11026] do_fast_syscall_32+0x27b/0xe16 [ 209.242875][T11026] entry_SYSENTER_compat+0x70/0x7f [ 209.242887][T11026] RIP: 0023:0xf7fdca39 09:49:36 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f00000015c0)=ANY=[@ANYBLOB='#'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x3, 0x0) 09:49:36 executing program 2 (fault-call:1 fault-nth:2): mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="2398c593a2303d8df8dc1623f67a060de466e34712df232157116a41dc2b323a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 209.242911][T11026] Code: 00 00 00 89 d3 5b 5e 5f 5d c3 b8 80 96 98 00 eb c4 8b 04 24 c3 8b 1c 24 c3 8b 34 24 c3 8b 3c 24 c3 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 209.291955][T11026] RSP: 002b:00000000f5dd80cc EFLAGS: 00000296 ORIG_RAX: 0000000000000015 [ 209.300398][T11026] RAX: ffffffffffffffda RBX: 0000000020000080 RCX: 0000000020000140 [ 209.308417][T11026] RDX: 0000000020000180 RSI: 0000000000000000 RDI: 0000000000000000 [ 209.316406][T11026] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 209.324383][T11026] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 209.324393][T11026] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 209.349772][T11025] CPU: 1 PID: 11025 Comm: syz-executor.3 Not tainted 5.5.0-rc5-syzkaller #0 [ 209.358499][T11025] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 209.368571][T11025] Call Trace: [ 209.371906][T11025] dump_stack+0x197/0x210 [ 209.376042][T11039] FAULT_INJECTION: forcing a failure. [ 209.376042][T11039] name failslab, interval 1, probability 0, space 0, times 0 [ 209.376272][T11025] should_fail.cold+0xa/0x15 [ 209.393463][T11025] ? __kasan_check_read+0x11/0x20 [ 209.398530][T11025] ? fault_create_debugfs_attr+0x180/0x180 [ 209.404379][T11025] ? ___might_sleep+0x163/0x2c0 [ 209.409261][T11025] __should_failslab+0x121/0x190 [ 209.409285][T11025] should_failslab+0x9/0x14 [ 209.409301][T11025] kmem_cache_alloc+0x2aa/0x710 [ 209.409318][T11025] ? find_held_lock+0x35/0x130 [ 209.409337][T11025] ? __might_fault+0x12b/0x1e0 [ 209.409361][T11025] getname_flags+0xd6/0x5b0 [ 209.423267][T11041] kAFS: unparsable volume name [ 209.423783][T11025] user_path_at_empty+0x2f/0x50 [ 209.447505][T11025] do_mount+0x150/0x1b50 [ 209.447533][T11025] ? copy_mount_string+0x40/0x40 [ 209.447553][T11025] ? _copy_from_user+0x12c/0x1a0 [ 209.447583][T11025] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 209.467941][T11025] ? memdup_user+0x80/0xd0 [ 209.472403][T11025] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 209.472426][T11025] ? copy_mount_options+0x2e8/0x3f0 [ 209.472456][T11025] __ia32_compat_sys_mount+0x664/0x790 [ 209.472475][T11025] ? trace_hardirqs_on+0x67/0x240 [ 209.472506][T11025] do_fast_syscall_32+0x27b/0xe16 [ 209.472527][T11025] entry_SYSENTER_compat+0x70/0x7f [ 209.472557][T11025] RIP: 0023:0xf7f16a39 [ 209.508680][T11025] Code: 00 00 00 89 d3 5b 5e 5f 5d c3 b8 80 96 98 00 eb c4 8b 04 24 c3 8b 1c 24 c3 8b 34 24 c3 8b 3c 24 c3 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 209.528313][T11025] RSP: 002b:00000000f5d120cc EFLAGS: 00000296 ORIG_RAX: 0000000000000015 09:49:37 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f00000015c0)=ANY=[@ANYBLOB='#'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x4, 0x0) [ 209.536761][T11025] RAX: ffffffffffffffda RBX: 00000000200015c0 RCX: 0000000020000140 [ 209.544749][T11025] RDX: 0000000020000180 RSI: 0000000000000000 RDI: 0000000000000000 [ 209.552725][T11025] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 209.560699][T11025] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 209.560708][T11025] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 209.593448][T11039] CPU: 0 PID: 11039 Comm: syz-executor.2 Not tainted 5.5.0-rc5-syzkaller #0 [ 209.602173][T11039] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 209.612247][T11039] Call Trace: [ 209.615562][T11039] dump_stack+0x197/0x210 [ 209.619939][T11039] should_fail.cold+0xa/0x15 [ 209.624543][T11039] ? __kasan_check_read+0x11/0x20 [ 209.629581][T11039] ? fault_create_debugfs_attr+0x180/0x180 [ 209.635597][T11039] ? ___might_sleep+0x163/0x2c0 [ 209.640468][T11039] __should_failslab+0x121/0x190 [ 209.645418][T11039] should_failslab+0x9/0x14 [ 209.649914][T11039] kmem_cache_alloc+0x2aa/0x710 [ 209.654754][T11039] ? find_held_lock+0x35/0x130 [ 209.659512][T11039] ? __might_fault+0x12b/0x1e0 [ 209.664283][T11039] getname_flags+0xd6/0x5b0 [ 209.668788][T11039] user_path_at_empty+0x2f/0x50 [ 209.673674][T11039] do_mount+0x150/0x1b50 [ 209.677963][T11039] ? copy_mount_string+0x40/0x40 [ 209.682919][T11039] ? _copy_from_user+0x12c/0x1a0 [ 209.687868][T11039] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 209.694109][T11039] ? memdup_user+0x80/0xd0 [ 209.698521][T11039] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 209.704762][T11039] ? copy_mount_options+0x2e8/0x3f0 [ 209.709966][T11039] __ia32_compat_sys_mount+0x664/0x790 [ 209.715439][T11039] ? trace_hardirqs_on+0x67/0x240 [ 209.720477][T11039] do_fast_syscall_32+0x27b/0xe16 [ 209.725509][T11039] entry_SYSENTER_compat+0x70/0x7f [ 209.730618][T11039] RIP: 0023:0xf7f24a39 [ 209.734696][T11039] Code: 00 00 00 89 d3 5b 5e 5f 5d c3 b8 80 96 98 00 eb c4 8b 04 24 c3 8b 1c 24 c3 8b 34 24 c3 8b 3c 24 c3 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 209.754411][T11039] RSP: 002b:00000000f5d200cc EFLAGS: 00000296 ORIG_RAX: 0000000000000015 [ 209.762840][T11039] RAX: ffffffffffffffda RBX: 0000000020000240 RCX: 0000000020000140 [ 209.770839][T11039] RDX: 0000000020000180 RSI: 0000000000000000 RDI: 0000000000000000 [ 209.778821][T11039] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 209.786786][T11039] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 09:49:37 executing program 4 (fault-call:1 fault-nth:5): mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000080)=ANY=[@ANYBLOB='%U'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 209.794753][T11039] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 209.828477][T11032] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. 09:49:37 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(r0, 0x10, &(0x7f00000000c0)=""/153) [ 209.928478][T11049] kAFS: unparsable volume name 09:49:37 executing program 3: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f00000015c0)=ANY=[@ANYBLOB='%'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:49:37 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f00000015c0)=ANY=[@ANYBLOB='#'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x5, 0x0) [ 209.952070][T11048] FAULT_INJECTION: forcing a failure. [ 209.952070][T11048] name failslab, interval 1, probability 0, space 0, times 0 09:49:37 executing program 0: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f00000015c0)=ANY=[@ANYBLOB='#'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x3, 0x0) [ 210.041746][T11048] CPU: 1 PID: 11048 Comm: syz-executor.4 Not tainted 5.5.0-rc5-syzkaller #0 [ 210.050473][T11048] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 210.060548][T11048] Call Trace: [ 210.063867][T11048] dump_stack+0x197/0x210 [ 210.068219][T11048] should_fail.cold+0xa/0x15 [ 210.072815][T11048] ? fault_create_debugfs_attr+0x180/0x180 [ 210.078623][T11048] ? ___might_sleep+0x163/0x2c0 [ 210.083485][T11048] __should_failslab+0x121/0x190 [ 210.088422][T11048] should_failslab+0x9/0x14 [ 210.092918][T11048] __kmalloc+0x2e0/0x770 [ 210.097164][T11048] ? __kmalloc+0x608/0x770 [ 210.101590][T11048] ? tomoyo_realpath_from_path+0xc5/0x660 [ 210.107330][T11048] tomoyo_realpath_from_path+0xc5/0x660 [ 210.112906][T11048] tomoyo_mount_acl+0x149/0x840 [ 210.117754][T11048] ? debug_check_no_obj_freed+0x20a/0x43f [ 210.123479][T11048] ? __kasan_check_read+0x11/0x20 [ 210.128636][T11048] ? mark_lock+0xc2/0x1220 [ 210.133092][T11048] ? tomoyo_check_mount_acl+0x1b0/0x1b0 [ 210.138652][T11048] ? __kasan_check_read+0x11/0x20 [ 210.143681][T11048] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 210.149926][T11048] ? debug_smp_processor_id+0x33/0x18a [ 210.155390][T11048] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 210.161566][T11048] ? lock_acquire+0x190/0x410 [ 210.166249][T11048] ? tomoyo_mount_permission+0x10a/0x400 [ 210.171891][T11048] tomoyo_mount_permission+0x16a/0x400 [ 210.177349][T11048] ? tomoyo_mount_permission+0x10a/0x400 [ 210.182983][T11048] ? tomoyo_mount_acl+0x840/0x840 [ 210.188028][T11048] ? strncpy_from_user+0x2b4/0x400 [ 210.193151][T11048] tomoyo_sb_mount+0x35/0x40 [ 210.197758][T11048] security_sb_mount+0x87/0xd0 [ 210.202532][T11048] do_mount+0x1d4/0x1b50 [ 210.206783][T11048] ? copy_mount_string+0x40/0x40 [ 210.211714][T11048] ? _copy_from_user+0x12c/0x1a0 [ 210.216658][T11048] ? memdup_user+0x80/0xd0 [ 210.221076][T11048] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 210.227334][T11048] ? copy_mount_options+0x2e8/0x3f0 [ 210.232540][T11048] __ia32_compat_sys_mount+0x664/0x790 [ 210.237996][T11048] ? trace_hardirqs_on+0x67/0x240 [ 210.243040][T11048] do_fast_syscall_32+0x27b/0xe16 [ 210.248067][T11048] entry_SYSENTER_compat+0x70/0x7f [ 210.253180][T11048] RIP: 0023:0xf7fdca39 [ 210.257270][T11048] Code: 00 00 00 89 d3 5b 5e 5f 5d c3 b8 80 96 98 00 eb c4 8b 04 24 c3 8b 1c 24 c3 8b 34 24 c3 8b 3c 24 c3 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 210.277074][T11048] RSP: 002b:00000000f5dd80cc EFLAGS: 00000296 ORIG_RAX: 0000000000000015 [ 210.285506][T11048] RAX: ffffffffffffffda RBX: 0000000020000080 RCX: 0000000020000140 [ 210.293472][T11048] RDX: 0000000020000180 RSI: 0000000000000000 RDI: 0000000000000000 [ 210.301438][T11048] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 210.309525][T11048] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 210.317499][T11048] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 210.410852][T11055] kAFS: unparsable volume name [ 210.419737][T11060] kAFS: unparsable volume name [ 210.431560][T11048] ERROR: Out of memory at tomoyo_realpath_from_path. [ 210.447144][T11061] kAFS: unparsable volume name 09:49:38 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f00000015c0)=ANY=[@ANYBLOB='#'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x6, 0x0) 09:49:38 executing program 4 (fault-call:1 fault-nth:6): mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000080)=ANY=[@ANYBLOB='%U'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:49:38 executing program 3: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f00000015c0)=ANY=[@ANYBLOB='\t'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:49:38 executing program 0: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f00000015c0)=ANY=[@ANYBLOB='#'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x3, 0x0) [ 210.704194][T11069] FAULT_INJECTION: forcing a failure. [ 210.704194][T11069] name failslab, interval 1, probability 0, space 0, times 0 [ 210.729544][T11072] kAFS: unparsable volume name [ 210.764165][T11074] kAFS: unparsable volume name [ 210.772578][T11075] kAFS: unparsable volume name [ 210.782174][T11069] CPU: 0 PID: 11069 Comm: syz-executor.4 Not tainted 5.5.0-rc5-syzkaller #0 [ 210.790943][T11069] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 210.801021][T11069] Call Trace: [ 210.804344][T11069] dump_stack+0x197/0x210 [ 210.808726][T11069] should_fail.cold+0xa/0x15 09:49:38 executing program 2: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="2398c593a2303d8df8dc1623f67a060de466e34712df232157116a41dc2b323a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 210.813363][T11069] ? fault_create_debugfs_attr+0x180/0x180 [ 210.819243][T11069] ? ___might_sleep+0x163/0x2c0 [ 210.824154][T11069] __should_failslab+0x121/0x190 [ 210.829261][T11069] should_failslab+0x9/0x14 [ 210.833783][T11069] __kmalloc+0x2e0/0x770 [ 210.838040][T11069] ? tomoyo_encode2.part.0+0xf5/0x400 [ 210.843417][T11069] tomoyo_encode2.part.0+0xf5/0x400 [ 210.848610][T11069] ? __get_fs_type+0x9a/0xd0 [ 210.853203][T11069] tomoyo_encode+0x2b/0x50 [ 210.857615][T11069] tomoyo_mount_acl+0x320/0x840 [ 210.862468][T11069] ? debug_check_no_obj_freed+0x20a/0x43f [ 210.868190][T11069] ? mark_lock+0xc2/0x1220 [ 210.872604][T11069] ? tomoyo_check_mount_acl+0x1b0/0x1b0 [ 210.878146][T11069] ? __kasan_check_read+0x11/0x20 [ 210.883171][T11069] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 210.889409][T11069] ? debug_smp_processor_id+0x33/0x18a [ 210.894891][T11069] ? lock_acquire+0x190/0x410 [ 210.899567][T11069] ? tomoyo_mount_permission+0x10a/0x400 [ 210.905205][T11069] tomoyo_mount_permission+0x16a/0x400 [ 210.910669][T11069] ? tomoyo_mount_permission+0x10a/0x400 [ 210.916302][T11069] ? tomoyo_mount_acl+0x840/0x840 [ 210.921354][T11069] ? strncpy_from_user+0x2b4/0x400 [ 210.926464][T11069] tomoyo_sb_mount+0x35/0x40 [ 210.931063][T11069] security_sb_mount+0x87/0xd0 [ 210.935831][T11069] do_mount+0x1d4/0x1b50 [ 210.940210][T11069] ? copy_mount_string+0x40/0x40 [ 210.945189][T11069] ? _copy_from_user+0x12c/0x1a0 [ 210.950139][T11069] ? memdup_user+0x80/0xd0 [ 210.954549][T11069] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 210.960787][T11069] ? copy_mount_options+0x2e8/0x3f0 [ 210.966002][T11069] __ia32_compat_sys_mount+0x664/0x790 [ 210.971473][T11069] ? trace_hardirqs_on+0x67/0x240 [ 210.976500][T11069] do_fast_syscall_32+0x27b/0xe16 [ 210.981554][T11069] entry_SYSENTER_compat+0x70/0x7f [ 210.986737][T11069] RIP: 0023:0xf7fdca39 [ 210.990843][T11069] Code: 00 00 00 89 d3 5b 5e 5f 5d c3 b8 80 96 98 00 eb c4 8b 04 24 c3 8b 1c 24 c3 8b 34 24 c3 8b 3c 24 c3 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 211.010454][T11069] RSP: 002b:00000000f5dd80cc EFLAGS: 00000296 ORIG_RAX: 0000000000000015 [ 211.018864][T11069] RAX: ffffffffffffffda RBX: 0000000020000080 RCX: 0000000020000140 [ 211.026828][T11069] RDX: 0000000020000180 RSI: 0000000000000000 RDI: 0000000000000000 [ 211.034797][T11069] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 211.042772][T11069] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 211.050740][T11069] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 09:49:38 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f00000015c0)=ANY=[@ANYBLOB='#'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x7, 0x0) 09:49:38 executing program 3: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f00000015c0)=ANY=[@ANYBLOB='\n'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:49:38 executing program 0: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f00000015c0)=ANY=[@ANYBLOB='#'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x3, 0x0) [ 211.303408][T11083] kAFS: unparsable volume name [ 211.433979][T11087] kAFS: unparsable volume name [ 211.452382][T11086] kAFS: unparsable volume name 09:49:39 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(r0, 0x4c01, &(0x7f00000000c0)=""/153) 09:49:39 executing program 3: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f00000015c0)=ANY=[@ANYBLOB='/'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:49:39 executing program 2: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="0798c593a2303d8df8dc1623f67a060de466e34712df232157116a41dc2b323a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:49:39 executing program 0: mount(&(0x7f00000015c0)=ANY=[@ANYBLOB='#'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x3, 0x0) 09:49:39 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f00000015c0)=ANY=[@ANYBLOB='#'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x8, 0x0) 09:49:39 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000080)=ANY=[@ANYBLOB='%U'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 211.866003][T11105] kAFS: unparsable volume name [ 211.878705][T11103] kAFS: unparsable volume name [ 211.884107][T11099] kAFS: unparsable volume name 09:49:39 executing program 0: mount(&(0x7f00000015c0)=ANY=[@ANYBLOB='#'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x3, 0x0) 09:49:39 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000080)=ANY=[@ANYBLOB='\\U'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:49:39 executing program 2: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="2598c593a2303d8df8dc1623f67a060de466e34712df232157116a41dc2b323a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:49:39 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f00000015c0)=ANY=[@ANYBLOB='#'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x9, 0x0) 09:49:39 executing program 3: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f00000015c0)=ANY=[@ANYBLOB='4'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 212.189040][T11120] kAFS: unparsable volume name [ 212.206359][T11122] kAFS: unparsable volume name 09:49:39 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(r0, 0x540a, &(0x7f00000000c0)=""/153) 09:49:39 executing program 0: mount(&(0x7f00000015c0)=ANY=[@ANYBLOB='#'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x3, 0x0) [ 212.242859][T11123] kAFS: unparsable volume name 09:49:39 executing program 2: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="5c98c593a2303d8df8dc1623f67a060de466e34712df232157116a41dc2b323a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:49:39 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f00000015c0)=ANY=[@ANYBLOB='#'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0xa, 0x0) 09:49:39 executing program 3: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f00000015c0)=ANY=[@ANYBLOB='\\'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:49:39 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000080)=ANY=[@ANYBLOB='%/'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 212.452429][T11133] kAFS: unparsable volume name 09:49:40 executing program 0: mkdir(0x0, 0x0) mount(&(0x7f00000015c0)=ANY=[@ANYBLOB='#'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x3, 0x0) [ 212.515769][T11137] kAFS: unparsable volume name [ 212.576920][T11139] kAFS: unparsable volume name 09:49:40 executing program 2: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="2398c593a2253d8df8dc1623f67a060de466e34712df232157116a41dc2b323a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:49:40 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f00000015c0)=ANY=[@ANYBLOB='#'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x10, 0x0) 09:49:40 executing program 3: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f00000015c0)=ANY=[@ANYBLOB='c'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:49:40 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(r0, 0x541b, &(0x7f00000000c0)=""/153) 09:49:40 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000080)=ANY=[@ANYBLOB='%\\'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:49:40 executing program 0: mkdir(0x0, 0x0) mount(&(0x7f00000015c0)=ANY=[@ANYBLOB='#'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x3, 0x0) [ 212.812416][T11153] kAFS: unparsable volume name [ 212.856469][T11155] kAFS: unparsable volume name 09:49:40 executing program 2: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="2398c593a2333d8df8dc1623f67a060de466e34712df232157116a41dc2b323a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:49:40 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f00000015c0)=ANY=[@ANYBLOB='#'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x48, 0x0) 09:49:40 executing program 0: mkdir(0x0, 0x0) mount(&(0x7f00000015c0)=ANY=[@ANYBLOB='#'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x3, 0x0) 09:49:40 executing program 3: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f00000015c0)=ANY=[@ANYBLOB="ff"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:49:40 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000080)=ANY=[@ANYBLOB='%U'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:49:40 executing program 2: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="2398c593a25c3d8df8dc1623f67a060de466e34712df232157116a41dc2b323a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:49:40 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(r0, 0x5421, &(0x7f00000000c0)=""/153) 09:49:40 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f00000015c0)=ANY=[@ANYBLOB='#'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x4c, 0x0) 09:49:40 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000080)=ANY=[@ANYBLOB='%U'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x2, 0x0) 09:49:40 executing program 0: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x3, 0x0) [ 213.322342][T11182] kAFS: unparsable volume name 09:49:40 executing program 3: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f00000015c0)=ANY=[@ANYBLOB='%'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:49:40 executing program 2: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="2398c593a2305c8df8dc1623f67a060de466e34712df232157116a41dc2b323a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:49:41 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f00000015c0)=ANY=[@ANYBLOB='#'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x68, 0x0) 09:49:41 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000080)=ANY=[@ANYBLOB='%U'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x3, 0x0) 09:49:41 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(r0, 0x5450, &(0x7f00000000c0)=""/153) 09:49:41 executing program 0: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x3, 0x0) [ 213.651334][T11201] kAFS: unparsable volume name [ 213.766029][T11201] kAFS: unparsable volume name 09:49:41 executing program 2: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="2398c593a2303d8df8dc1e23f67a060de466e34712df232157116a41dc2b323a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:49:41 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000080)=ANY=[@ANYBLOB='%U'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x4, 0x0) 09:49:41 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f00000015c0)=ANY=[@ANYBLOB='#'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x6c, 0x0) 09:49:41 executing program 3: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f00000015c0)=ANY=[@ANYBLOB='%'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x2, 0x0) 09:49:41 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(r0, 0x5452, &(0x7f00000000c0)=""/153) 09:49:41 executing program 0: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x3, 0x0) [ 214.137498][T11233] kAFS: unparsable volume name 09:49:41 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f00000015c0)=ANY=[@ANYBLOB='#'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x74, 0x0) 09:49:41 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000080)=ANY=[@ANYBLOB='%U'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x5, 0x0) 09:49:41 executing program 2: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="2398c593a2303d8df8dc5c23f67a060de466e34712df232157116a41dc2b323a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:49:41 executing program 3: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f00000015c0)=ANY=[@ANYBLOB='%'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x3, 0x0) 09:49:41 executing program 0: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(0x0, 0x0, &(0x7f0000000180)='afs\x00', 0x3, 0x0) 09:49:41 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(r0, 0x5460, &(0x7f00000000c0)=""/153) 09:49:41 executing program 2: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="2398c593a2303d8df8dc1607f67a060de466e34712df232157116a41dc2b323a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 214.494825][T11250] kAFS: unparsable volume name 09:49:42 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f00000015c0)=ANY=[@ANYBLOB='#'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x7a, 0x0) 09:49:42 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000080)=ANY=[@ANYBLOB='%U'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x6, 0x0) 09:49:42 executing program 0: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(0x0, 0x0, &(0x7f0000000180)='afs\x00', 0x3, 0x0) 09:49:42 executing program 3: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f00000015c0)=ANY=[@ANYBLOB='%'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x4, 0x0) 09:49:42 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(r0, 0x6364, &(0x7f00000000c0)=""/153) 09:49:42 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f00000015c0)=ANY=[@ANYBLOB='#'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0xf0, 0x0) 09:49:42 executing program 2: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="2398c593a2303d8df8dc1625f67a060de466e34712df232157116a41dc2b323a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 214.819504][T11269] kAFS: unparsable volume name 09:49:42 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000080)=ANY=[@ANYBLOB='%U'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x7, 0x0) 09:49:42 executing program 3: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f00000015c0)=ANY=[@ANYBLOB='%'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x5, 0x0) 09:49:42 executing program 0: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(0x0, 0x0, &(0x7f0000000180)='afs\x00', 0x3, 0x0) [ 215.096342][T11284] kAFS: unparsable volume name 09:49:42 executing program 2: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="2398c593a2303d8df8dc165cf67a060de466e34712df232157116a41dc2b323a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:49:42 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f00000015c0)=ANY=[@ANYBLOB='#'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x300, 0x0) 09:49:42 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000080)=ANY=[@ANYBLOB='%U'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x8, 0x0) 09:49:42 executing program 3: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f00000015c0)=ANY=[@ANYBLOB='%'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x6, 0x0) 09:49:42 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(r0, 0x8912, &(0x7f00000000c0)=""/153) 09:49:42 executing program 0: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x3, 0x0) [ 215.332979][T11295] kAFS: unparsable volume name [ 215.423301][T11304] kAFS: unparsable volume name 09:49:42 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f00000015c0)=ANY=[@ANYBLOB='#'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x500, 0x0) 09:49:42 executing program 2: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="2398c593a2303d8df8dc1623f65c060de466e34712df232157116a41dc2b323a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:49:42 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000080)=ANY=[@ANYBLOB='%U'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x10, 0x0) 09:49:42 executing program 3: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f00000015c0)=ANY=[@ANYBLOB='%'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x7, 0x0) [ 215.599841][T11311] kAFS: unparsable volume name 09:49:43 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(r0, 0x8933, &(0x7f00000000c0)=""/153) 09:49:43 executing program 0: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x3, 0x0) 09:49:43 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f00000015c0)=ANY=[@ANYBLOB='#'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x600, 0x0) [ 215.733286][T11318] kAFS: unparsable volume name 09:49:43 executing program 2: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="2398c593a2303d8df8dc1623f67a020de466e34712df232157116a41dc2b323a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:49:43 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000080)=ANY=[@ANYBLOB='%U'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0xf0, 0x0) 09:49:43 executing program 3: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f00000015c0)=ANY=[@ANYBLOB='%'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x8, 0x0) [ 215.929681][T11328] kAFS: unparsable volume name [ 216.033338][T11328] kAFS: unparsable volume name 09:49:43 executing program 2: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="2398c593a2303d8df8dc1623f67a030de466e34712df232157116a41dc2b323a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:49:43 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(r0, 0x40045431, &(0x7f00000000c0)=""/153) [ 216.061484][T11340] kAFS: unparsable volume name 09:49:43 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000080)=ANY=[@ANYBLOB='%U'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x300, 0x0) 09:49:43 executing program 0: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x3, 0x0) 09:49:43 executing program 3: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f00000015c0)=ANY=[@ANYBLOB='%'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x9, 0x0) 09:49:43 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f00000015c0)=ANY=[@ANYBLOB='#'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x700, 0x0) 09:49:43 executing program 2: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="2398c593a2303d8df8dc1623f67a040de466e34712df232157116a41dc2b323a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 216.357788][T11358] kAFS: unparsable volume name [ 216.431777][T11361] kAFS: unparsable volume name 09:49:43 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f00000015c0)=ANY=[@ANYBLOB='#'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x900, 0x0) 09:49:43 executing program 0: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:49:43 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000080)=ANY=[@ANYBLOB='%U'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x500, 0x0) 09:49:43 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(r0, 0x400454ca, &(0x7f00000000c0)=""/153) 09:49:44 executing program 3: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f00000015c0)=ANY=[@ANYBLOB='%'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0xa, 0x0) 09:49:44 executing program 2: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="2398c593a2303d8df8dc1623f67a050de466e34712df232157116a41dc2b323a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 216.663278][T11375] kAFS: unparsable volume name 09:49:44 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000080)=ANY=[@ANYBLOB='%U'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x600, 0x0) 09:49:44 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f00000015c0)=ANY=[@ANYBLOB='#'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0xa00, 0x0) 09:49:44 executing program 0: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 216.812967][T11384] kAFS: unparsable volume name 09:49:44 executing program 2: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="2398c593a2303d8df8dc1623f67a070de466e34712df232157116a41dc2b323a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:49:44 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(r0, 0x40049409, &(0x7f00000000c0)=""/153) 09:49:44 executing program 3: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f00000015c0)=ANY=[@ANYBLOB='%'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x10, 0x0) [ 217.051806][T11395] kAFS: unparsable volume name 09:49:44 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000080)=ANY=[@ANYBLOB='%U'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x700, 0x0) 09:49:44 executing program 0: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 217.149126][T11403] kAFS: unparsable volume name 09:49:44 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f00000015c0)=ANY=[@ANYBLOB='#'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x1020, 0x0) 09:49:44 executing program 2: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="2398c593a2303d8df8dc1623f67a100de466e34712df232157116a41dc2b323a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:49:44 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(r0, 0x40186366, &(0x7f00000000c0)=""/153) 09:49:44 executing program 3: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f00000015c0)=ANY=[@ANYBLOB='%'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x48, 0x0) 09:49:44 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000080)=ANY=[@ANYBLOB='%U'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x1020, 0x0) 09:49:44 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f00000015c0)=ANY=[@ANYBLOB='#'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x2000, 0x0) 09:49:44 executing program 0: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="2398c593a2303d8df8dc165cf67a060de466e34712df232157116a41dc2b323a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:49:45 executing program 2: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="2398c593a2303d8df8dc1623f67a120de466e34712df232157116a41dc2b323a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:49:45 executing program 3: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f00000015c0)=ANY=[@ANYBLOB='%'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x4c, 0x0) 09:49:45 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(r0, 0x401c5820, &(0x7f00000000c0)=""/153) 09:49:45 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000080)=ANY=[@ANYBLOB='%U'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x2000, 0x0) 09:49:45 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f00000015c0)=ANY=[@ANYBLOB='#'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x2010, 0x0) 09:49:45 executing program 2: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="2398c593a2303d8df8dc1623f67a140de466e34712df232157116a41dc2b323a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:49:45 executing program 0: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="2398c593a2303d8df8dc165cf67a060de466e34712df232157116a41dc2b323a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:49:45 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000080)=ANY=[@ANYBLOB='%U'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x2010, 0x0) 09:49:45 executing program 3: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f00000015c0)=ANY=[@ANYBLOB='%'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x60, 0x0) 09:49:45 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f00000015c0)=ANY=[@ANYBLOB='#'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x4000, 0x0) 09:49:45 executing program 0: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="2398c593a2303d8df8dc165cf67a060de466e34712df232157116a41dc2b323a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:49:45 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(r0, 0x4020940d, &(0x7f00000000c0)=""/153) 09:49:45 executing program 2: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="2398c593a2303d8df8dc1623f67a1e0de466e34712df232157116a41dc2b323a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:49:45 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000080)=ANY=[@ANYBLOB='%U'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x4000, 0x0) 09:49:45 executing program 3: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f00000015c0)=ANY=[@ANYBLOB='%'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x68, 0x0) [ 218.319168][T11467] kAFS: unparsable volume name 09:49:45 executing program 2: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="2398c593a2303d8df8dc1623f67a5c0de466e34712df232157116a41dc2b323a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:49:45 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f00000015c0)=ANY=[@ANYBLOB='#'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x4800, 0x0) 09:49:45 executing program 0: mount(&(0x7f0000000240)=ANY=[@ANYBLOB="2398c593a2303d8df8dc165cf67a060de466e34712df232157116a41dc2b323a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:49:45 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000080)=ANY=[@ANYBLOB='%U'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0xedc0, 0x0) 09:49:45 executing program 3: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f00000015c0)=ANY=[@ANYBLOB='%'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x6c, 0x0) 09:49:46 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(r0, 0x402c5828, &(0x7f00000000c0)=""/153) [ 218.631441][T11486] kAFS: unparsable volume name 09:49:46 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000080)=ANY=[@ANYBLOB='%U'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0xf000, 0x0) 09:49:46 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f00000015c0)=ANY=[@ANYBLOB='#'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x4c00, 0x0) 09:49:46 executing program 2: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="2398c593a2303d8df8dc1623f67a0610e466e34712df232157116a41dc2b323a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:49:46 executing program 0: mount(&(0x7f0000000240)=ANY=[@ANYBLOB="2398c593a2303d8df8dc165cf67a060de466e34712df232157116a41dc2b323a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:49:46 executing program 3: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f00000015c0)=ANY=[@ANYBLOB='%'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x74, 0x0) 09:49:46 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000080)=ANY=[@ANYBLOB='%U'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0xff00, 0x0) 09:49:46 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(r0, 0x402c5829, &(0x7f00000000c0)=""/153) [ 219.040061][T11512] kAFS: unparsable volume name 09:49:46 executing program 0: mount(&(0x7f0000000240)=ANY=[@ANYBLOB="2398c593a2303d8df8dc165cf67a060de466e34712df232157116a41dc2b323a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:49:46 executing program 3: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f00000015c0)=ANY=[@ANYBLOB='%'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x7a, 0x0) 09:49:46 executing program 2: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="2398c593a2303d8df8dc1623f67a0612e466e34712df232157116a41dc2b323a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:49:46 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f00000015c0)=ANY=[@ANYBLOB='#'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x6800, 0x0) 09:49:46 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000080)=ANY=[@ANYBLOB='%U'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x44000, 0x0) 09:49:46 executing program 0: mkdir(0x0, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="2398c593a2303d8df8dc165cf67a060de466e34712df232157116a41dc2b323a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:49:46 executing program 3: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f00000015c0)=ANY=[@ANYBLOB='%'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0xf0, 0x0) 09:49:46 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(r0, 0x402c582a, &(0x7f00000000c0)=""/153) 09:49:46 executing program 2: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="2398c593a2303d8df8dc1623f67a0614e466e34712df232157116a41dc2b323a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:49:46 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f00000015c0)=ANY=[@ANYBLOB='#'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x6c00, 0x0) 09:49:47 executing program 0: mkdir(0x0, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="2398c593a2303d8df8dc165cf67a060de466e34712df232157116a41dc2b323a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:49:47 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000080)=ANY=[@ANYBLOB='%U'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x400400, 0x0) 09:49:47 executing program 3: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f00000015c0)=ANY=[@ANYBLOB='%'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x300, 0x0) 09:49:47 executing program 2: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="2398c593a2303d8df8dc1623f67a061ee466e34712df232157116a41dc2b323a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:49:47 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f00000015c0)=ANY=[@ANYBLOB='#'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x7400, 0x0) 09:49:47 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(r0, 0x402c582b, &(0x7f00000000c0)=""/153) 09:49:47 executing program 0: mkdir(0x0, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="2398c593a2303d8df8dc165cf67a060de466e34712df232157116a41dc2b323a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:49:47 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000080)=ANY=[@ANYBLOB='%U'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0xf0ffff, 0x0) 09:49:47 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f00000015c0)=ANY=[@ANYBLOB='#'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x7a00, 0x0) 09:49:47 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000080)=ANY=[@ANYBLOB='%U'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x1000000, 0x0) [ 220.203437][T11576] kAFS: unparsable volume name 09:49:47 executing program 0: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:49:47 executing program 2: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="2398c593a2303d8df8dc1623f67a065ce466e34712df232157116a41dc2b323a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:49:47 executing program 3: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f00000015c0)=ANY=[@ANYBLOB='%'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x500, 0x0) 09:49:47 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(r0, 0x402c5839, &(0x7f00000000c0)=""/153) 09:49:47 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f00000015c0)=ANY=[@ANYBLOB='#'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0xedc0, 0x0) 09:49:47 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000080)=ANY=[@ANYBLOB='%U'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x2000000, 0x0) [ 220.513132][T11595] kAFS: unparsable volume name 09:49:48 executing program 0: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:49:48 executing program 2: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="2398c593a2303d8df8dc1623f67a060de425e34712df232157116a41dc2b323a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:49:48 executing program 3: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f00000015c0)=ANY=[@ANYBLOB='%'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x600, 0x0) 09:49:48 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f00000015c0)=ANY=[@ANYBLOB='#'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0xf000, 0x0) 09:49:48 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(r0, 0x40405514, &(0x7f00000000c0)=""/153) 09:49:48 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000080)=ANY=[@ANYBLOB='%U'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x3000000, 0x0) 09:49:48 executing program 0: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 220.851382][T11614] kAFS: unparsable volume name 09:49:48 executing program 2: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="2398c593a2303d8df8dc1623f67a060de42ee34712df232157116a41dc2b323a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:49:48 executing program 3: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f00000015c0)=ANY=[@ANYBLOB='%'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x700, 0x0) 09:49:48 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000080)=ANY=[@ANYBLOB='%U'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x4000000, 0x0) 09:49:48 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f00000015c0)=ANY=[@ANYBLOB='#'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0xff00, 0x0) 09:49:48 executing program 0: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:49:48 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(r0, 0x40405515, &(0x7f00000000c0)=""/153) [ 221.203485][T11633] kAFS: unparsable volume name 09:49:48 executing program 2: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="2398c593a2303d8df8dc1623f67a060de42fe34712df232157116a41dc2b323a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 09:49:48 executing program 3: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f00000015c0)=ANY=[@ANYBLOB='%'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x900, 0x0) 09:49:48 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000080)=ANY=[@ANYBLOB='%U'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x5000000, 0x0) 09:49:48 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f00000015c0)=ANY=[@ANYBLOB='#'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x44000, 0x0) [ 221.357188][T11644] kAFS: Bad value for 'source' [ 221.462129][ T2683] ------------[ cut here ]------------ [ 221.468065][ T2683] name '哢0=#z /g#!wja+2' [ 221.473986][ T2683] WARNING: CPU: 0 PID: 2683 at fs/proc/generic.c:178 __xlate_proc_name+0xe7/0x110 [ 221.483226][ T2683] Kernel panic - not syncing: panic_on_warn set ... [ 221.489851][ T2683] CPU: 0 PID: 2683 Comm: kworker/0:2 Not tainted 5.5.0-rc5-syzkaller #0 [ 221.493489][T11654] kAFS: unparsable volume name [ 221.498224][ T2683] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 221.498263][ T2683] Workqueue: afs afs_manage_cell [ 221.498271][ T2683] Call Trace: [ 221.498296][ T2683] dump_stack+0x197/0x210 [ 221.498322][ T2683] ? __xlate_proc_name+0x10/0x110 [ 221.530746][ T2683] panic+0x2e3/0x75c [ 221.534665][ T2683] ? add_taint.cold+0x16/0x16 [ 221.539378][ T2683] ? __kasan_check_write+0x14/0x20 [ 221.544519][ T2683] ? __warn.cold+0x14/0x3e [ 221.548967][ T2683] ? __warn+0xd9/0x1cf [ 221.553066][ T2683] ? __xlate_proc_name+0xe7/0x110 [ 221.558115][ T2683] __warn.cold+0x2f/0x3e 09:49:49 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000080)=ANY=[@ANYBLOB='%U'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x6000000, 0x0) [ 221.562386][ T2683] ? __xlate_proc_name+0xe7/0x110 [ 221.567435][ T2683] report_bug+0x289/0x300 [ 221.571791][ T2683] do_error_trap+0x11b/0x200 [ 221.576411][ T2683] do_invalid_op+0x37/0x50 [ 221.580850][ T2683] ? __xlate_proc_name+0xe7/0x110 [ 221.585892][ T2683] invalid_op+0x23/0x30 [ 221.590070][ T2683] RIP: 0010:__xlate_proc_name+0xe7/0x110 09:49:49 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f00000015c0)=ANY=[@ANYBLOB='#'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x200000, 0x0) 09:49:49 executing program 3: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f00000015c0)=ANY=[@ANYBLOB='%'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0xa00, 0x0) [ 221.595717][ T2683] Code: 3f eb 90 ff 44 89 e0 48 83 c4 08 5b 41 5c 41 5d 41 5e 41 5f 5d c3 e8 28 eb 90 ff 4c 89 fe 48 c7 c7 40 18 39 88 e8 88 99 61 ff <0f> 0b 41 bc fe ff ff ff eb cb 4c 89 f7 e8 37 a4 ce ff e9 3d ff ff [ 221.615335][ T2683] RSP: 0018:ffffc90007c4f9d0 EFLAGS: 00010282 [ 221.621424][ T2683] RAX: 0000000000000000 RBX: ffff888095d05d49 RCX: 0000000000000000 [ 221.629412][ T2683] RDX: 0000000000000000 RSI: ffffffff815e8506 RDI: fffff52000f89f2c [ 221.637407][ T2683] RBP: ffffc90007c4fa00 R08: ffff8880a040c180 R09: fffffbfff165eba6 [ 221.645392][ T2683] R10: fffffbfff165eba5 R11: ffffffff8b2f5d2f R12: 0000000000000000 [ 221.653383][ T2683] R13: ffff888095d05d39 R14: ffffc90007c4fb08 R15: ffff888095d05d39 [ 221.661371][ T2683] ? vprintk_func+0x86/0x189 [ 221.665959][ T2683] __proc_create+0xac/0x860 [ 221.670457][ T2683] ? pde_free+0x110/0x110 [ 221.674799][ T2683] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 221.680943][ T2683] proc_mkdir_data+0xbc/0x1b0 [ 221.685621][ T2683] ? proc_symlink+0x1c0/0x1c0 [ 221.690286][ T2683] ? fscache_free_cookie+0x110/0x1c0 [ 221.695563][ T2683] afs_proc_cell_setup+0x95/0x190 [ 221.700596][ T2683] afs_manage_cell+0x54b/0x1410 [ 221.705469][ T2683] ? afs_put_cell.part.0+0x180/0x180 [ 221.710766][ T2683] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 221.716337][ T2683] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 221.722316][ T2683] ? trace_hardirqs_on+0x67/0x240 [ 221.727365][ T2683] process_one_work+0x9af/0x1740 [ 221.732300][ T2683] ? pwq_dec_nr_in_flight+0x320/0x320 [ 221.737661][ T2683] ? lock_acquire+0x190/0x410 [ 221.742334][ T2683] worker_thread+0x98/0xe40 [ 221.746839][ T2683] kthread+0x361/0x430 [ 221.750918][ T2683] ? process_one_work+0x1740/0x1740 [ 221.756144][ T2683] ? kthread_mod_delayed_work+0x1f0/0x1f0 [ 221.761870][ T2683] ret_from_fork+0x24/0x30 [ 221.767877][ T2683] Kernel Offset: disabled [ 221.772365][ T2683] Rebooting in 86400 seconds..