&(0x7f0000000080)=ANY=[], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 23:34:22 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_DEL(r0, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="ac00000002090101000000000000000100000009700002002c000100140003006ed80a0ec3677685b4c446deabbe2e8d14000400000000000000400000000000000000000c00020005000100060000000c000200050001003a00000014000100080001007f000001080002007f000001e891871d58a4030c00020005000100880000000c00040008000500f2ff001f0c000200060003000000000008000500000000150800060000000000"], 0xac}, 0x1, 0x0, 0x0, 0x40081}, 0x40000d0) [ 1562.718508][ T2806] FAT-fs (loop3): Unrecognized mount option "sHortname=winÿ" or missing value [ 1562.748120][ T2818] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1562.758463][ T2818] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. 23:34:22 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_DEL(r0, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="ac00000002090101000000000000000200000009700002002c000100140003006ed80a0ec3677685b4c446deabbe2e8d14000400000000000000400000000000000000000c00020005000100060000000c000200050001003a00000014000100080001007f000001080002007f000001e891871d58a4030c00020005000100880000000c00040008000500f2ff001f0c000200060003000000000008000500000000150800060000000000"], 0xac}, 0x1, 0x0, 0x0, 0x40081}, 0x40000d0) [ 1562.778530][ T2820] FAT-fs (loop3): Unrecognized mount option "sHortname=winÿ" or missing value [ 1562.863357][ T2823] kAFS: Bad value for 'source' 23:34:22 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000000)=ANY=[@ANYBLOB='%'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x1100000000000000, 0x0) 23:34:22 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000000)=0x9) r2 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000080)='l2tp\x00') sendmsg$L2TP_CMD_SESSION_GET(r1, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="000826bd7000fedbdf250800000006001b004e220053000000004e210000"], 0x24}, 0x1, 0x0, 0x0, 0x800}, 0x10) r3 = socket$inet(0x2, 0x2, 0x2200000088) sendto$inet(r3, 0x0, 0x30, 0x0, &(0x7f0000319ff0)={0x2, 0x4e20}, 0x10) [ 1562.894685][ T2827] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.0'. 23:34:22 executing program 3: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_GET(r0, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000240)={0x17c, r1, 0x400, 0x70bd2a, 0x25dfdbfc, {}, [@TIPC_NLA_MEDIA={0xd8, 0x5, [@TIPC_NLA_MEDIA_PROP={0x34, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8e}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x24}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x400}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x44, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x401}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xfffffffd}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}, @TIPC_NLA_PROP_TOL={0x8}]}, @TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0x4c, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x80}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x80}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7fff}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x40}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1f}]}]}, @TIPC_NLA_BEARER={0x2c, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @l2={'ib', 0x3a, 'vcan0\x00'}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x6}, @TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz0\x00'}]}, @TIPC_NLA_LINK={0x4c, 0x4, [@TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x1c, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x11}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfffffff9}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x89f}]}, @TIPC_NLA_LINK_PROP={0x1c, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8001}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1ff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xc}]}, @TIPC_NLA_LINK_PROP={0x4}]}, @TIPC_NLA_NODE={0x18, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x1}, @TIPC_NLA_NODE_UP={0x4}]}]}, 0x17c}, 0x1, 0x0, 0x0, 0x3a57e49b10761442}, 0x0) mount(&(0x7f0000000000)=ANY=[@ANYBLOB='%'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1562.955476][ T2827] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. 23:34:22 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000080)=ANY=[@ANYBLOB], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 23:34:22 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_DEL(r0, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="ac00000002090101000000000000000300000009700002002c000100140003006ed80a0ec3677685b4c446deabbe2e8d14000400000000000000400000000000000000000c00020005000100060000000c000200050001003a00000014000100080001007f000001080002007f000001e891871d58a4030c00020005000100880000000c00040008000500f2ff001f0c000200060003000000000008000500000000150800060000000000"], 0xac}, 0x1, 0x0, 0x0, 0x40081}, 0x40000d0) [ 1563.077977][ T2835] kAFS: unparsable volume name 23:34:22 executing program 3: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000000)=ANY=[@ANYBLOB="10"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 23:34:22 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x38, 0x2}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x38, 0x2}, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x38, 0x2}, 0x0) r4 = getpid() sched_setattr(r4, &(0x7f0000000040)={0x38, 0x2}, 0x0) r5 = getpid() sched_setattr(r5, &(0x7f0000000040)={0x38, 0x2}, 0x0) mount(&(0x7f0000000440)=ANY=[@ANYPTR64=&(0x7f00000003c0)=ANY=[@ANYRES64=r0, @ANYPTR64, @ANYRESHEX, @ANYPTR64=&(0x7f0000000480)=ANY=[@ANYRES64=r5, @ANYBLOB="a46ea0590ff4b51c406d7f22d3d54b051e849d82979569861f0293f61b72e26cde683175b33fe97a8c6c82e17f685ee218deca14416b7b9dff66cf7409649a4d128cc4295e9c6d67827cc58a982102d8496e361d9a05916e12aede8f36686ba47de5d659da6284e071ec6f86ff696edf66f0aeda801d43df0aa6515ad1d7de22eaecf9f287fc96fd4999dd966f412fad27c96938ec9bc59c1f32e92d5b54960d1846e8fde6cadae81e145d0148d0d987b0beeeae9a5aa73ae5ec6598059900648c218020ed7e43cb515c140057cec2fb69d40cc94986525c6a2699fda21d724dc8b07e8a4d4d74879581cea19e", @ANYRESOCT=r1, @ANYRES64, @ANYRESDEC, @ANYRES64, @ANYRESOCT], @ANYPTR=&(0x7f00000001c0)=ANY=[@ANYRES64=r2, @ANYPTR64, @ANYRESOCT=r3, @ANYRESOCT], @ANYRES16=r4, @ANYRES16, @ANYRESOCT]], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) r6 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$isdn(0x22, 0x3, 0x10) ioctl$KVM_GET_MSR_INDEX_LIST(r6, 0xc004ae02, &(0x7f0000000080)={0x6, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r8 = dup(r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) name_to_handle_at(r8, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)={0x42, 0x0, "06bb5e17ed06a423336817024d70e3446159c4fcb43ae01b7c844b5a4667348acb8ebdf9d09c3194d3960c3c87ac32e33dbecb2cc7fd5e309d96"}, &(0x7f0000000040), 0x0) 23:34:22 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000000)=ANY=[@ANYBLOB='%'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x1200000000000000, 0x0) [ 1563.223276][ T2852] kAFS: Bad value for 'source' 23:34:22 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_DEL(r0, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="ac00000002090101000000000000000400000009700002002c000100140003006ed80a0ec3677685b4c446deabbe2e8d14000400000000000000400000000000000000000c00020005000100060000000c000200050001003a00000014000100080001007f000001080002007f000001e891871d58a4030c00020005000100880000000c00040008000500f2ff001f0c000200060003000000000008000500000000150800060000000000"], 0xac}, 0x1, 0x0, 0x0, 0x40081}, 0x40000d0) [ 1563.292535][ T2908] kAFS: unparsable volume name [ 1563.337814][ T2938] kAFS: unparsable volume name 23:34:22 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000080)=ANY=[@ANYBLOB], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1563.373957][ T2952] kAFS: unparsable volume name 23:34:22 executing program 1: socket$inet(0x2, 0x2, 0x2200000088) 23:34:23 executing program 3: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000100)=ANY=[@ANYBLOB="c307579d05000000000000004f25"], &(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/asound/seq/clients\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_CARD_INFO(r0, 0x81785501, &(0x7f0000000240)=""/255) 23:34:23 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000000)=ANY=[@ANYBLOB='#'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') [ 1563.450569][ T2968] validate_nla: 82 callbacks suppressed [ 1563.450578][ T2968] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 23:34:23 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000000)=ANY=[@ANYBLOB='%'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x2000000000000000, 0x0) [ 1563.526640][ T2971] kAFS: Bad value for 'source' [ 1563.540534][ T2968] netlink: 'syz-executor.0': attribute type 2 has an invalid length. [ 1563.548782][ T2968] netlink: 'syz-executor.0': attribute type 2 has an invalid length. 23:34:23 executing program 1: r0 = socket$inet(0x2, 0x2, 0x2200000088) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x200001, 0x0) ioctl$KVM_IRQ_LINE(r1, 0x4008ae61, &(0x7f0000000040)={0x4244, 0x4}) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000319ff0)={0x2, 0x4e20, @empty}, 0x10) [ 1563.627117][ T2976] kAFS: unparsable volume name 23:34:23 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000080)=ANY=[@ANYBLOB], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1563.658705][ T2968] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 1563.669812][ T2980] kAFS: unparsable volume name [ 1563.677027][ T2976] kAFS: unparsable volume name 23:34:23 executing program 5: setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f00000001c0)={&(0x7f0000000040)=""/198, 0x110e000, 0x0, 0x0, 0x1}, 0x20) mount(&(0x7f00000002c0)=ANY=[@ANYRES64=0x0], &(0x7f0000000140)='./file0\x00', &(0x7f0000000000)='afs\x00', 0x0, 0x0) [ 1563.728363][ T2980] kAFS: unparsable volume name 23:34:23 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_DEL(r0, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="ac00000002090101000000000000000500000009700002002c000100140003006ed80a0ec3677685b4c446deabbe2e8d14000400000000000000400000000000000000000c00020005000100060000000c000200050001003a00000014000100080001007f000001080002007f000001e891871d58a4030c00020005000100880000000c00040008000500f2ff001f0c000200060003000000000008000500000000150800060000000000"], 0xac}, 0x1, 0x0, 0x0, 0x40081}, 0x40000d0) 23:34:23 executing program 3: ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000040)=0x0) syz_open_procfs$namespace(r0, &(0x7f0000000080)='ns/net\x00') mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000000)=ANY=[@ANYBLOB='%'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 23:34:23 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000000)=ANY=[@ANYBLOB='%'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x2010000000000000, 0x0) [ 1563.820139][ T3065] kAFS: Bad value for 'source' 23:34:23 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=@newlink={0x34, 0x10, 0x401, 0x70bd26, 0x0, {0x0, 0x0, 0x0, 0x0, 0x8, 0x100}, [@IFLA_LINKINFO={0x14, 0x12, @bridge={{0xb, 0x1, 'bridge\x00'}, {0x4}}}]}, 0x34}}, 0x0) r2 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r2, &(0x7f0000000140), 0xd3, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000000)=ANY=[@ANYBLOB='#'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) sendmsg$NFNL_MSG_ACCT_GET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="98000000010701040000000000000000010000050c0006400000000000000b6008000540000000000c00078008000240000000034c000780080001400000000508000140000000060800024000000000080002400700000000000000000002000800024000000002080002400000000208000140000003ff08000140400000000900010073797a31000000000c0006409da4505a7299e581"], 0x98}, 0x1, 0x0, 0x0, 0x800}, 0x40000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$DRM_IOCTL_AGP_ACQUIRE(r4, 0x6430) 23:34:23 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000080)=ANY=[@ANYBLOB="256bf0ab859d53b5cc3b30225f2d01b8da40f4632de09fb30a6941162fedeffdcfc662ffb4"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 23:34:23 executing program 1: socket$inet(0x2, 0x2, 0x2200000088) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x100, 0x0) r3 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f00000000c0)='NLBL_UNLBL\x00') sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r2, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x28, r3, 0x8, 0x70bd2a, 0x25dfdbfb, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}]}, 0x28}, 0x1, 0x0, 0x0, 0x851}, 0x40000) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$DRM_IOCTL_ADD_MAP(r1, 0xc0286415, &(0x7f0000000000)={0x0, 0x7, 0x3, 0x3, &(0x7f0000ffc000/0x3000)=nil, 0x7fffffff}) [ 1563.901957][ T3093] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 1563.932646][ T3093] netlink: 'syz-executor.0': attribute type 2 has an invalid length. [ 1563.982811][ T3093] netlink: 'syz-executor.0': attribute type 2 has an invalid length. [ 1564.000747][ T3100] kAFS: unparsable volume name [ 1564.031606][ T3093] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 23:34:23 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000000)=ANY=[@ANYBLOB='%'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x2500000000000000, 0x0) [ 1564.080905][ T3109] kAFS: No cell specified 23:34:23 executing program 3: socket$bt_cmtp(0x1f, 0x3, 0x5) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000000)=ANY=[@ANYBLOB='5'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 23:34:23 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_DEL(r0, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="ac00000002090101000000000000000600000009700002002c000100140003006ed80a0ec3677685b4c446deabbe2e8d14000400000000000000400000000000000000000c00020005000100060000000c000200050001003a00000014000100080001007f000001080002007f000001e891871d58a4030c00020005000100880000000c00040008000500f2ff001f0c000200060003000000000008000500000000150800060000000000"], 0xac}, 0x1, 0x0, 0x0, 0x40081}, 0x40000d0) [ 1564.102171][ T3111] kAFS: unparsable volume name [ 1564.146636][ T3111] kAFS: unparsable volume name 23:34:23 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000080)=ANY=[@ANYBLOB="256bf0ab859d53b5cc3b30225f2d01b8da40f4632de09fb30a6941162fedeffdcfc662ffb4"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 23:34:23 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2}, 0x0) mount(&(0x7f0000000040)=ANY=[@ANYRES16=r0], &(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='configfs\x00', 0x0, 0x0) [ 1564.232271][ T3191] kAFS: unparsable volume name [ 1564.265452][ T3224] kAFS: unparsable volume name [ 1564.279504][ T3225] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 1564.305031][ T3227] kAFS: No cell specified 23:34:23 executing program 1: r0 = socket$inet(0x2, 0x2, 0x2200000088) mount$9p_xen(&(0x7f0000000000)='syz\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='9p\x00', 0x4824420, &(0x7f00000000c0)={'trans=xen,', {[{@nodevmap='nodevmap'}], [{@subj_type={'subj_type'}}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}]}}) sendto$inet(r0, 0x0, 0x30, 0x0, &(0x7f0000319ff0)={0x2, 0x4e20}, 0x10) 23:34:23 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000000)=ANY=[@ANYBLOB='%'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x3f00000000000000, 0x0) 23:34:23 executing program 3: mkdir(&(0x7f0000000200)='./file0\x00', 0x40) mount(&(0x7f0000000000)=ANY=[@ANYBLOB="04"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1564.317526][ T3225] netlink: 'syz-executor.0': attribute type 2 has an invalid length. 23:34:23 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000080)=ANY=[@ANYBLOB="256bf0ab859d53b5cc3b30225f2d01b8da40f4632de09fb30a6941162fedeffdcfc662ffb4"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 23:34:24 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_DEL(r0, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="ac00000002090101000000000000000700000009700002002c000100140003006ed80a0ec3677685b4c446deabbe2e8d14000400000000000000400000000000000000000c00020005000100060000000c000200050001003a00000014000100080001007f000001080002007f000001e891871d58a4030c00020005000100880000000c00040008000500f2ff001f0c000200060003000000000008000500000000150800060000000000"], 0xac}, 0x1, 0x0, 0x0, 0x40081}, 0x40000d0) 23:34:24 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGRAB(r0, 0x40044590, 0x0) ioctl$EVIOCGREP(r0, 0x80084503, &(0x7f0000000040)=""/253) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000000)=ANY=[@ANYBLOB='#'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1564.507062][ T3299] kAFS: unparsable volume name 23:34:24 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000000)=ANY=[@ANYBLOB='%'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x4000000000000000, 0x0) [ 1564.557865][ T3345] kAFS: No cell specified 23:34:24 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) r2 = socket$unix(0x1, 0x1, 0x0) recvfrom$unix(r2, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$SIOCX25GCALLUSERDATA(r1, 0x89e4, &(0x7f0000000000)={0x45, "027ae5491b08a2272ec002370cfd6659faa3b37285ebec0bdd2d53d5db0d18a2fd260df66fe53fc58d584c560962e7385b96377d22693de896bfcdb595bbef2d82def03831342cad2684805eb068b10c40d8ab9a8f197abbdf144cc44d02016d55be07624fb11418a16aa3a3c148c54581c37d89812cecb474afb17d930592f9"}) mkdir(&(0x7f0000000200)='./file0\x00', 0x2) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) write$FUSE_NOTIFY_INVAL_INODE(r4, &(0x7f0000000100)={0x28, 0x2, 0x0, {0x1, 0x8, 0x1}}, 0x28) mount(&(0x7f0000000240)=ANY=[@ANYRESHEX=r1], &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='autofs\x00', 0x0, 0x0) [ 1564.608419][ T3346] kAFS: No cell specified 23:34:24 executing program 1: r0 = socket$inet(0x2, 0x2, 0x2200000088) sendto$inet(r0, 0x0, 0x30, 0x0, &(0x7f0000319ff0)={0x2, 0x4e20}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$DRM_IOCTL_VERSION(r2, 0xc0406400, &(0x7f0000000280)={0xa45c, 0x9, 0x5, 0xa0, &(0x7f0000000000)=""/160, 0xc3, &(0x7f00000000c0)=""/195, 0x83, &(0x7f00000001c0)=""/131}) 23:34:24 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000080)=ANY=[@ANYBLOB="256bf0ab859d53b5cc3b30225f2d01b8da40f4632de09fb30a6941162fedeffdcfc662ffb405659d208b5aa8068932536fa33dc021c29489"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 23:34:24 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_DEL(r0, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="ac00000002090101000000000000000800000009700002002c000100140003006ed80a0ec3677685b4c446deabbe2e8d14000400000000000000400000000000000000000c00020005000100060000000c000200050001003a00000014000100080001007f000001080002007f000001e891871d58a4030c00020005000100880000000c00040008000500f2ff001f0c000200060003000000000008000500000000150800060000000000"], 0xac}, 0x1, 0x0, 0x0, 0x40081}, 0x40000d0) [ 1564.702426][ T3357] kAFS: No cell specified 23:34:24 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000000)=ANY=[@ANYBLOB='%'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x4800000000000000, 0x0) [ 1564.750085][ T3355] autofs4:pid:3355:autofs_fill_super: called with bogus options 23:34:24 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_DEL(r0, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="ac00000002090101000000000000000900000009700002002c000100140003006ed80a0ec3677685b4c446deabbe2e8d14000400000000000000400000000000000000000c00020005000100060000000c000200050001003a00000014000100080001007f000001080002007f000001e891871d58a4030c00020005000100880000000c00040008000500f2ff001f0c000200060003000000000008000500000000150800060000000000"], 0xac}, 0x1, 0x0, 0x0, 0x40081}, 0x40000d0) 23:34:24 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) [ 1564.836280][ T3441] kAFS: No cell specified 23:34:24 executing program 1: r0 = add_key$keyring(&(0x7f0000000980)='keyring\x00', &(0x7f00000007c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000a00)="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", 0x1001, r0) r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) getsockopt$IP_SET_OP_GET_BYINDEX(r2, 0x1, 0x53, &(0x7f0000000080)={0x7, 0x7, 0x2}, &(0x7f0000000200)=0x28) r3 = dup(r2) add_key$user(&(0x7f0000000280)='user\x00', &(0x7f00000002c0)={'syz', 0x0}, &(0x7f0000000300)="3309f6657e5e3b0a84437877458071ea8a76699ae318f8501306372ce8104612d0e494cacb401f4cab4d9f3206d1ae7b8b3e3cab9b5eb02ce1e927812fd6f246aea7ab3e30e0531cf1ec59003c4813b369d72fa0a01f4e96ea97a574b72a84d1b8b8199fdbc8f8058e0a5cdcfb6bfc79961028861464dd4c", 0x78, 0xfffffffffffffffa) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f00000001c0)=ANY=[@ANYBLOB="37d9999a", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32, @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000000100)=0x9) r5 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(r5, 0x8982, &(0x7f0000000240)={0x8, 'erspan0\x00', {'syz_tun\x00'}, 0x2}) setsockopt$inet_sctp_SCTP_RTOINFO(r3, 0x84, 0x0, &(0x7f0000000140)={r4, 0x2, 0x7, 0xcad3}, 0x10) r6 = request_key(&(0x7f0000000440)='logon\x00', &(0x7f0000000480)={'syz', 0x1}, &(0x7f00000004c0)='keyring\x00', 0xfffffffffffffffe) add_key$keyring(&(0x7f00000003c0)='keyring\x00', &(0x7f0000000400)={'syz', 0x0}, 0x0, 0x0, r6) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r8 = dup(r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) bind$isdn_base(r8, &(0x7f0000000380)={0x22, 0x1f, 0x81, 0xc3, 0x3f}, 0x6) keyctl$reject(0x13, r0, 0x38, 0xfffffffffffffffe, r1) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000319ff0)={0x2, 0x4e20, @remote}, 0x10) 23:34:24 executing program 3: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x38, 0x2}, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYRES64=0x0], &(0x7f0000000280)='./file0\x00', &(0x7f00000000c0)='ceph\x00', 0x0, 0x0) 23:34:24 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_DEL(r0, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="ac00000002090101000000000000000a00000009700002002c000100140003006ed80a0ec3677685b4c446deabbe2e8d14000400000000000000400000000000000000000c00020005000100060000000c000200050001003a00000014000100080001007f000001080002007f000001e891871d58a4030c00020005000100880000000c00040008000500f2ff001f0c000200060003000000000008000500000000150800060000000000"], 0xac}, 0x1, 0x0, 0x0, 0x40081}, 0x40000d0) 23:34:24 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000080)=ANY=[@ANYBLOB="256bf0ab859d53b5cc3b30225f2d01b8da40f4632de09fb30a6941162fedeffdcfc662ffb405659d208b5aa8068932536fa33dc021c29489"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 23:34:24 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000000)=ANY=[@ANYBLOB='%'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x4c00000000000000, 0x0) 23:34:24 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) socket$bt_hidp(0x1f, 0x3, 0x6) accept(0xffffffffffffffff, &(0x7f0000000040)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @remote}}}, &(0x7f00000000c0)=0x80) r0 = io_uring_setup(0x93f, &(0x7f0000000240)={0x0, 0x0, 0x14, 0x1, 0x2b6}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000001c0)={&(0x7f0000000000)='./file0\x00', r2}, 0x10) io_uring_register$IORING_UNREGISTER_EVENTFD(r0, 0x5, 0x0, 0x0) mount(&(0x7f0000000100)=ANY=[@ANYBLOB="f9782344feb24a1172844f"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1565.068617][ T3549] ceph: Bad value for 'source' [ 1565.082256][ T3550] kAFS: No cell specified 23:34:24 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_DEL(r0, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="ac00000002090101000000000000000b00000009700002002c000100140003006ed80a0ec3677685b4c446deabbe2e8d14000400000000000000400000000000000000000c00020005000100060000000c000200050001003a00000014000100080001007f000001080002007f000001e891871d58a4030c00020005000100880000000c00040008000500f2ff001f0c000200060003000000000008000500000000150800060000000000"], 0xac}, 0x1, 0x0, 0x0, 0x40081}, 0x40000d0) 23:34:24 executing program 3: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000080)=ANY=[@ANYBLOB="2571bde6f0715164353cbecac4e2f87bf0cb7602f73c78e35dba19b309494c5f5d93f1eec922196ec25b2f65074ac6fdd7d79a4201266704bdba7169e7531b96017ff29d718e52ce5abec160e2f4060c14523fb70377a28216be420add3843d80097340bb973a99100ae4c0e77e9625e50"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 23:34:24 executing program 1: r0 = socket$inet(0x2, 0x2, 0x2200000088) r1 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGRAB(r1, 0x40044590, 0x0) ioctl$EVIOCGABS2F(r1, 0x8018456f, &(0x7f0000000000)=""/125) sendto$inet(r0, 0x0, 0x30, 0x0, &(0x7f0000319ff0)={0x2, 0x4e20}, 0x10) 23:34:24 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000080)=ANY=[@ANYBLOB="256bf0ab859d53b5cc3b30225f2d01b8da40f4632de09fb30a6941162fedeffdcfc662ffb405659d208b5aa8068932536fa33dc021c29489"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 23:34:24 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000000)=ANY=[@ANYBLOB='%'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x5c00000000000000, 0x0) [ 1565.259008][ T3638] kAFS: unparsable volume name [ 1565.287747][ T3641] kAFS: No cell specified 23:34:24 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba435012283a089fc983e7797f790cc60ad10d95f2a8747c39e41860ddbb79b93206e6f48a9ea06150a16bf95ae2d84306db26a6bb1bd468b60742d67da92db43ff8c974cf390b52dcd196768dec9d1c446868948f6dff93998d866da8831456f1b44f5e3620fa5858fc705beaa9a64a41d9d6855f7f3dce7a4e8121eea8778045"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 23:34:24 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_DEL(r0, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="ac00000002090101000000000000000c00000009700002002c000100140003006ed80a0ec3677685b4c446deabbe2e8d14000400000000000000400000000000000000000c00020005000100060000000c000200050001003a00000014000100080001007f000001080002007f000001e891871d58a4030c00020005000100880000000c00040008000500f2ff001f0c000200060003000000000008000500000000150800060000000000"], 0xac}, 0x1, 0x0, 0x0, 0x40081}, 0x40000d0) [ 1565.347145][ T3650] kAFS: No cell specified 23:34:25 executing program 3: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000000)=ANY=[@ANYBLOB='%'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="020000000100000000000000040001000015000008000000", @ANYRES32=r1, @ANYBLOB="08e50000", @ANYRES32=r1, @ANYBLOB="08000200", @ANYRES32=r3, @ANYBLOB="10000400000000002000020000000000"], 0x3c, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) openat$vcsu(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vcsu\x00', 0x4040, 0x0) setuid(r5) mount$9p_virtio(&(0x7f0000000040)='syz\x00', &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0)='9p\x00', 0x92d8f29b1b02c443, &(0x7f0000000240)={'trans=virtio,', {[{@dfltgid={'dfltgid', 0x3d, r1}}, {@nodevmap='nodevmap'}], [{@uid_gt={'uid>', r5}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}]}}) 23:34:25 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000080)=ANY=[@ANYBLOB="256bf0ab859d53b5cc3b30225f2d01b8da40f4632de09fb30a6941162fedeffdcfc662ffb405659d208b5aa8068932536fa33dc021c29489a5546ba3d7c8a51106"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 23:34:25 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000000)=ANY=[@ANYBLOB='%'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x6000000000000000, 0x0) [ 1565.553728][ T3776] kAFS: No cell specified 23:34:25 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_DEL(r0, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="ac00000002090101000000000000000d00000009700002002c000100140003006ed80a0ec3677685b4c446deabbe2e8d14000400000000000000400000000000000000000c00020005000100060000000c000200050001003a00000014000100080001007f000001080002007f000001e891871d58a4030c00020005000100880000000c00040008000500f2ff001f0c000200060003000000000008000500000000150800060000000000"], 0xac}, 0x1, 0x0, 0x0, 0x40081}, 0x40000d0) 23:34:25 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) chdir(&(0x7f0000000040)='./file0\x00') mount(&(0x7f0000000400)=ANY=[@ANYBLOB="dfc2cbfb78fe5469be59fb3e2e2187606142dfd355510668c07e90c205dac94ff511fbb040ffe4e07485cdcd095d0baa9fec4bf402bdce78a78d5a98491833079451d1203ccb9eafcef92b719bc589fcd192a97f6b9647a54185d9463277498d2365b6f33a538c47cfb0a79335fa0857ba0b1fb11906304eabc097b577498c02c151ced0b2a45f923c1fffabf7ab1b54bc3cc774509000000000000000000000000000367e5c2ada0dcd470db4a3f2ef96dd2e9d4ae901ffffff598acc000000", @ANYPTR], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1565.594386][ T3782] kAFS: unparsable volume name 23:34:25 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000080)=ANY=[@ANYBLOB="256bf0ab859d53b5cc3b30225f2d01b8da40f4632de09fb30a6941162fedeffdcfc662ffb405659d208b5aa8068932536fa33dc021c29489a5546ba3d7c8a51106"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 23:34:25 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) sendto$netrom(r1, &(0x7f0000000300)="973c36b947481706919c595aa250ff9fee63f7448fba75fe129fe7145ac4e4b7544a73a11c3b0ce2706cc90b750989ebe9b55eca5a1f4c8c45c8ecccc8ef8e78d7d9fe0e30145c5b46c511e25c5ebccd541ce34b4cede2026dc0ba0d47b3fb1d4b6f9d95542b2501f77fee2ad3fa38dd5df5123ea786d556280a08582dccb4c77954d4e501ec4cda01a4e6836550a259a2c72a811d8d2c85e84147789ca39ba7c1", 0xa1, 0x10, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$KVM_GET_IRQCHIP(r1, 0xc208ae62, &(0x7f0000000000)) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000280)={0x7, &(0x7f0000000240)=[{0x3ff, 0x20, 0xff, 0x1}, {0x9, 0x4, 0x1f, 0xffffffff}, {0xffff}, {0xe8, 0xff, 0x80, 0x7f}, {0x2, 0x81, 0x9, 0x8}, {0x2, 0xe8, 0x1f, 0x200}, {0x1, 0x9, 0x3f, 0x7}]}) r2 = socket$inet(0x2, 0x2, 0x2200000088) sendto$inet(r2, 0x0, 0x30, 0x0, &(0x7f0000319ff0)={0x2, 0x4e20}, 0x10) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f00000002c0)='NLBL_CALIPSO\x00') clock_settime(0x1, &(0x7f00000003c0)) 23:34:25 executing program 3: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) r0 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)={&(0x7f0000000080)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f00000001c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000100)={&(0x7f0000000040)='./file0\x00', r0}, 0x10) mount(&(0x7f00000002c0)=ANY=[@ANYRESDEC=r0], &(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000240)='afs\x00', 0x0, 0x0) r1 = syz_open_dev$usbmon(&(0x7f00000015c0)='/dev/usbmon#\x00', 0x5, 0x804) r2 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2008}, 0x1c) listen(r2, 0x0) ioctl$FICLONE(r1, 0x40049409, r2) 23:34:25 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000000)=ANY=[@ANYBLOB='%'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x6800000000000000, 0x0) 23:34:25 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000300)=ANY=[@ANYBLOB="4b8ae2f8560a259f06e4a98cf7315e8629003c12ccd2e1b6c2b725fd5fd81d5992049a3496ad94a79009679c89a954e79f9f711e01a13330450c9efb51955f9903a38736f75618080edc00000000000000000000707222201329bbcaae77aa0f5fee5844e5f5a923809164aab0a557c8895b2ec1509bb9e529f80c5b83254b2d31e476e29bf7ca6de1be402002dab300100b9d5f331b8003bd0270aca88a854a2383f82585ce3080cae68d6fa804f862614627d08076d160e7c44cae00"/202], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_virtio(&(0x7f0000000000)='syz\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x8084, &(0x7f00000002c0)={'trans=virtio,', {[{@cache_fscache='cache=fscache'}], [{@uid_lt={'uid<', r0}}]}}) r1 = syz_open_dev$vcsu(&(0x7f0000000080)='/dev/vcsu#\x00', 0x5, 0x123000) setsockopt$SO_J1939_ERRQUEUE(r1, 0x6b, 0x4, &(0x7f00000000c0)=0x1, 0x4) 23:34:25 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_DEL(r0, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="ac00000002090101000000000000000e00000009700002002c000100140003006ed80a0ec3677685b4c446deabbe2e8d14000400000000000000400000000000000000000c00020005000100060000000c000200050001003a00000014000100080001007f000001080002007f000001e891871d58a4030c00020005000100880000000c00040008000500f2ff001f0c000200060003000000000008000500000000150800060000000000"], 0xac}, 0x1, 0x0, 0x0, 0x40081}, 0x40000d0) [ 1565.789020][ T3797] kAFS: No cell specified 23:34:25 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000080)=ANY=[@ANYBLOB="256bf0ab859d53b5cc3b30225f2d01b8da40f4632de09fb30a6941162fedeffdcfc662ffb405659d208b5aa8068932536fa33dc021c29489a5546ba3d7c8a51106"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1565.920780][ T3850] kAFS: unparsable volume name 23:34:25 executing program 3: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) pipe2(&(0x7f0000000040)={0xffffffffffffffff}, 0x84000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x38, 0x2}, 0x0) write$cgroup_pid(r2, &(0x7f0000000000)=r3, 0x12) unlinkat(r0, &(0x7f0000000080)='./file0\x00', 0x200) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 23:34:25 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000000)=ANY=[@ANYBLOB='%'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x6c00000000000000, 0x0) [ 1565.956520][ T3850] 9pnet_virtio: no channels available for device syz 23:34:25 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$DRM_IOCTL_GET_CAP(r1, 0xc010640c, &(0x7f0000000000)={0x2, 0x3}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$RDS_CONG_MONITOR(r3, 0x114, 0x6, &(0x7f0000000080)=0x1, 0x4) r4 = socket$inet(0x2, 0x2, 0x2200000088) sendto$inet(r4, 0x0, 0x0, 0x0, &(0x7f0000000040)={0x2, 0x4e24, @rand_addr=0x1}, 0x10) 23:34:25 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_DEL(r0, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="ac00000002090101000000000000000f00000009700002002c000100140003006ed80a0ec3677685b4c446deabbe2e8d14000400000000000000400000000000000000000c00020005000100060000000c000200050001003a00000014000100080001007f000001080002007f000001e891871d58a4030c00020005000100880000000c00040008000500f2ff001f0c000200060003000000000008000500000000150800060000000000"], 0xac}, 0x1, 0x0, 0x0, 0x40081}, 0x40000d0) [ 1566.021596][ T3914] 9pnet_virtio: no channels available for device syz [ 1566.023581][ T3917] kAFS: No cell specified [ 1566.066450][ T3850] kAFS: unparsable volume name [ 1566.078900][ T3923] kAFS: unparsable volume name 23:34:25 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000080)=ANY=[@ANYBLOB="256bf0ab859d53b5cc3b30225f2d01b8da40f4632de09fb30a6941162fedeffdcfc662ffb405659d208b5aa8068932536fa33dc021c29489a5546ba3d7c8a5110639ca4b99ee"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 23:34:25 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000000)=ANY=[@ANYBLOB='\x00'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 23:34:25 executing program 3: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="25ba4943fd67759948e07a0208c1d92ca37301a8963bf8d7525fd8b9ad2dccf1"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) prctl$PR_GET_NO_NEW_PRIVS(0x27) 23:34:25 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_DEL(r0, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="ac00000002090101000000000000001000000009700002002c000100140003006ed80a0ec3677685b4c446deabbe2e8d14000400000000000000400000000000000000000c00020005000100060000000c000200050001003a00000014000100080001007f000001080002007f000001e891871d58a4030c00020005000100880000000c00040008000500f2ff001f0c000200060003000000000008000500000000150800060000000000"], 0xac}, 0x1, 0x0, 0x0, 0x40081}, 0x40000d0) 23:34:25 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000000)=ANY=[@ANYBLOB='%'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x7400000000000000, 0x0) 23:34:25 executing program 1: r0 = socket$inet(0x2, 0x2, 0x2200000088) sendto$inet(r0, 0x0, 0x30, 0x0, &(0x7f0000319ff0)={0x2, 0x4e20}, 0x10) r1 = dup(0xffffffffffffffff) getsockopt$sock_linger(r1, 0x1, 0xd, &(0x7f0000000080), &(0x7f00000000c0)=0x8) ioctl$SNDCTL_DSP_GETFMTS(r1, 0x8004500b, &(0x7f0000000040)=0x7f) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x160eced8, 0x2180) [ 1566.270235][ T4045] kAFS: Bad value for 'source' [ 1566.284134][ T4044] kAFS: No cell specified [ 1566.321924][ T4050] kAFS: No cell specified 23:34:25 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000000)=ANY=[@ANYBLOB='#'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1566.350489][ T4050] kAFS: No cell specified 23:34:25 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_DEL(r0, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="ac00000002090101000000000000001100000009700002002c000100140003006ed80a0ec3677685b4c446deabbe2e8d14000400000000000000400000000000000000000c00020005000100060000000c000200050001003a00000014000100080001007f000001080002007f000001e891871d58a4030c00020005000100880000000c00040008000500f2ff001f0c000200060003000000000008000500000000150800060000000000"], 0xac}, 0x1, 0x0, 0x0, 0x40081}, 0x40000d0) 23:34:25 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000080)=ANY=[@ANYBLOB="256bf0ab859d53b5cc3b30225f2d01b8da40f4632de09fb30a6941162fedeffdcfc662ffb405659d208b5aa8068932536fa33dc021c29489a5546ba3d7c8a5110639ca4b99ee"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 23:34:26 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000000)=ANY=[@ANYBLOB='%'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x7a00000000000000, 0x0) 23:34:26 executing program 3: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000000)=ANY=[@ANYBLOB='%'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) mount(&(0x7f0000000040)=@sg0='/dev/sg0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x6000492, &(0x7f0000000100)='afs\x00') [ 1566.463491][ T4103] kAFS: unparsable volume name 23:34:26 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_DEL(r0, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="ac00000002090101000000000000001200000009700002002c000100140003006ed80a0ec3677685b4c446deabbe2e8d14000400000000000000400000000000000000000c00020005000100060000000c000200050001003a00000014000100080001007f000001080002007f000001e891871d58a4030c00020005000100880000000c00040008000500f2ff001f0c000200060003000000000008000500000000150800060000000000"], 0xac}, 0x1, 0x0, 0x0, 0x40081}, 0x40000d0) [ 1566.527501][ T4157] kAFS: No cell specified 23:34:26 executing program 1: r0 = socket$inet(0x2, 0x2, 0x2200000088) sendto$inet(r0, 0x0, 0x30, 0x0, &(0x7f0000319ff0)={0x2, 0x4e20}, 0x10) ioctl$sock_SIOCSIFVLAN_GET_VLAN_REALDEV_NAME_CMD(r0, 0x8983, &(0x7f0000000000)={0x8, 'ip_vti0\x00', {'sit0\x00'}}) 23:34:26 executing program 5: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x40, 0x0) ioctl$SNDRV_TIMER_IOCTL_STOP(r0, 0x54a1) mkdir(&(0x7f0000000200)='./file0\x00', 0x114) mount(&(0x7f0000000000)=ANY=[@ANYBLOB='#'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) getitimer(0x2, &(0x7f0000000080)) [ 1566.569346][ T4172] kAFS: unparsable volume name 23:34:26 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000080)=ANY=[@ANYBLOB="256bf0ab859d53b5cc3b30225f2d01b8da40f4632de09fb30a6941162fedeffdcfc662ffb405659d208b5aa8068932536fa33dc021c29489a5546ba3d7c8a5110639ca4b99ee"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1566.597841][ T4172] proc: Unknown parameter 'afs' [ 1566.641940][ T4172] kAFS: unparsable volume name 23:34:26 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000000)=ANY=[@ANYBLOB='%'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x8cffffff00000000, 0x0) 23:34:26 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_DEL(r0, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="ac00000002090101000000000000001300000009700002002c000100140003006ed80a0ec3677685b4c446deabbe2e8d14000400000000000000400000000000000000000c00020005000100060000000c000200050001003a00000014000100080001007f000001080002007f000001e891871d58a4030c00020005000100880000000c00040008000500f2ff001f0c000200060003000000000008000500000000150800060000000000"], 0xac}, 0x1, 0x0, 0x0, 0x40081}, 0x40000d0) [ 1566.676693][ T4180] proc: Unknown parameter 'afs' [ 1566.700558][ T4183] kAFS: unparsable volume name [ 1566.746140][ T4183] kAFS: unparsable volume name 23:34:26 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000000)=ANY=[@ANYBLOB='%'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0xf6ffffff00000000, 0x0) 23:34:26 executing program 3: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000040)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 23:34:26 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_DEL(r0, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="ac00000002090101000000000000001400000009700002002c000100140003006ed80a0ec3677685b4c446deabbe2e8d14000400000000000000400000000000000000000c00020005000100060000000c000200050001003a00000014000100080001007f000001080002007f000001e891871d58a4030c00020005000100880000000c00040008000500f2ff001f0c000200060003000000000008000500000000150800060000000000"], 0xac}, 0x1, 0x0, 0x0, 0x40081}, 0x40000d0) [ 1566.790663][ T4225] kAFS: No cell specified 23:34:26 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2}, 0x0) mount(&(0x7f0000000080)=ANY=[@ANYPTR64=&(0x7f0000000100)=ANY=[@ANYPTR=&(0x7f00000000c0)=ANY=[@ANYPTR=&(0x7f0000000240)=ANY=[@ANYRES32, @ANYBLOB="921f54066dd02deb7040be45f7a303379dea545b52e561f1b9f8436c82b9a98cc81c4ac0b8c87e36da2863311bf51367d8f6a1561c015447b82b0b0c1fcb8ccf3aceb5e0b2ca6788a182e4f5a2b8b96f48ebb2fded2693d93ad743c17624481f4598f675e7c2aa27d823f6c5f96372a6061b4105dea8eec4e4ba19e4d4c6e9735fb5c01d31727c893d402e", @ANYPTR64, @ANYRES16, @ANYRESDEC, @ANYPTR64, @ANYBLOB="f058d17bacf56bc5be2393ab6afd9b12675c2e838aeb776264486d4bb516d90eaf8b1854b8d97efa4e043d66c8e6ed238e52e2978d945b8a9703f6ce60160d8d288193c26a7cc6a4a7e5774ca97bc3cad8cfd6592548df93b883"], @ANYRESOCT=0x0], @ANYRES32]], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) prctl$PR_SET_SPECULATION_CTRL(0x35, 0x0) 23:34:26 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000080)=ANY=[@ANYBLOB="256bf0ab859d53b5cc3b30225f2d01b8da40f4632de09fb30a6941162fedeffdcfc662ffb405659d208b5aa8068932536fa33dc021c29489a5546ba3d7c8a5110639ca4b99eeacab"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 23:34:26 executing program 1: r0 = socket$inet(0x2, 0x2, 0x2200000088) sendto$inet(r0, 0x0, 0x30, 0x0, &(0x7f0000319ff0)={0x2, 0x4e20}, 0x10) socket$key(0xf, 0x3, 0x2) [ 1566.922507][ T4302] kAFS: Bad value for 'source' [ 1566.951326][ T4305] __nla_validate_parse: 34 callbacks suppressed [ 1566.951335][ T4305] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.0'. 23:34:26 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000000)=ANY=[@ANYBLOB='%'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0xffffff7f00000000, 0x0) [ 1566.994038][ T4309] kAFS: No cell specified 23:34:26 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2008}, 0x1c) listen(r1, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r1, 0x29, 0x41, &(0x7f0000000080)={'raw\x00', 0x2, [{}, {}]}, 0x48) r2 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$TCXONC(r4, 0x540a, 0x8000) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000100)) ioctl$TIOCMBIC(r2, 0x5417, &(0x7f0000000040)=0xffff8001) io_uring_setup(0xf0e, &(0x7f0000000240)={0x0, 0x0, 0x8, 0x1, 0xf4}) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000000)=ANY=[@ANYBLOB='%'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1567.021360][ T4305] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1567.045693][ T4311] kAFS: Bad value for 'source' 23:34:26 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000080)=ANY=[@ANYBLOB="256bf0ab859d53b5cc3b30225f2d01b8da40f4632de09fb30a6941162fedeffdcfc662ffb405659d208b5aa8068932536fa33dc021c29489a5546ba3d7c8a5110639ca4b99eeacab"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1567.097893][ T4311] kAFS: Bad value for 'source' 23:34:26 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_DEL(r0, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="ac00000002090101000000000000002000000009700002002c000100140003006ed80a0ec3677685b4c446deabbe2e8d14000400000000000000400000000000000000000c00020005000100060000000c000200050001003a00000014000100080001007f000001080002007f000001e891871d58a4030c00020005000100880000000c00040008000500f2ff001f0c000200060003000000000008000500000000150800060000000000"], 0xac}, 0x1, 0x0, 0x0, 0x40081}, 0x40000d0) 23:34:26 executing program 5: mount(&(0x7f0000000000)=ANY=[@ANYBLOB='+'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1567.171029][ T4400] kAFS: unparsable volume name 23:34:26 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000000)=ANY=[@ANYBLOB='%'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0xffffffff00000000, 0x0) 23:34:26 executing program 1: r0 = socket$inet(0x2, 0x2, 0x2200000088) sendto$inet(r0, 0x0, 0x0, 0x40000, &(0x7f0000000100)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0xb}}, 0x10) getcwd(&(0x7f0000000000)=""/22, 0x16) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/tty/drivers\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_sctp_SCTP_AUTOCLOSE(r3, 0x84, 0x4, &(0x7f0000000240)=0x1, 0x4) r4 = syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r1, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x4c, r4, 0x20, 0x70bd27, 0x25dfdbfd, {}, [@SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x401}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x9}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x10000}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7ff}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x3}]}, 0x4c}, 0x1, 0x0, 0x0, 0x20000801}, 0x800) 23:34:26 executing program 3: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f00000000c0)=ANY=[@ANYPTR=&(0x7f0000000080)=ANY=[@ANYRES16]], &(0x7f0000000040)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1567.256561][ T4425] kAFS: No cell specified [ 1567.283321][ T4426] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1567.310459][ T4426] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. 23:34:26 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000000)=ANY=[@ANYBLOB='#'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v1={0x1000000, [{0x6, 0x20}]}, 0xc, 0x2) 23:34:26 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000080)=ANY=[@ANYBLOB="256bf0ab859d53b5cc3b30225f2d01b8da40f4632de09fb30a6941162fedeffdcfc662ffb405659d208b5aa8068932536fa33dc021c29489a5546ba3d7c8a5110639ca4b99eeacab"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1567.370181][ T4437] kAFS: unparsable volume name 23:34:26 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x8001) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f00000000c0)=ANY=[@ANYBLOB="cdbb1b3b35080d58be9a4c07c72725d99330a69cc67e6f4595189f8262505e44dacd3409d525ce7e20169db56852cfb021635797ea0f219a8545e539c903f4994cb7c2149f3349"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000000)='afs\x00', 0x0, 0x0) 23:34:27 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_DEL(r0, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="ac00000002090101000000000000002500000009700002002c000100140003006ed80a0ec3677685b4c446deabbe2e8d14000400000000000000400000000000000000000c00020005000100060000000c000200050001003a00000014000100080001007f000001080002007f000001e891871d58a4030c00020005000100880000000c00040008000500f2ff001f0c000200060003000000000008000500000000150800060000000000"], 0xac}, 0x1, 0x0, 0x0, 0x40081}, 0x40000d0) 23:34:27 executing program 3: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="69b957de15293cb4dfeacbd092830300b621"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1567.519948][ T4546] kAFS: unparsable volume name 23:34:27 executing program 1: r0 = socket$inet(0x2, 0x2, 0x2200000088) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000319ff0)={0x2, 0x4e20}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$SNDRV_PCM_IOCTL_PAUSE(r2, 0x40044145, &(0x7f0000000040)=0x10001) syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0xfff, 0x22041) [ 1567.543396][ T4548] kAFS: No cell specified [ 1567.562155][ T4546] kAFS: unparsable volume name [ 1567.568564][ T4551] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1567.571802][ T4550] kAFS: unparsable volume name 23:34:27 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000080)=ANY=[@ANYBLOB="256bf0ab859d53b5cc3b30225f2d01b8da40f4632de09fb30a6941162fedeffdcfc662ffb405659d208b5aa8068932536fa33dc021c29489a5546ba3d7c8a5110639ca4b99eeacab90"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 23:34:27 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) r0 = openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/nvme-fabrics\x00', 0x149400, 0x0) ioctl$DRM_IOCTL_WAIT_VBLANK(r0, 0xc018643a, &(0x7f0000000100)={0x1, 0x5, 0x32}) mount(&(0x7f0000000000)=ANY=[@ANYBLOB='#'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r3) mount$9p_xen(&(0x7f00000001c0)='syz\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='9p\x00', 0x812048, &(0x7f0000000340)={'trans=xen,', {[{@cachetag={'cachetag', 0x3d, '+)mime_type'}}, {@debug={'debug', 0x3d, 0x6}}, {@mmap='mmap'}], [{@subj_type={'subj_type', 0x3d, 'osx.'}}, {@permit_directio='permit_directio'}, {@fsname={'fsname', 0x3d, 'afs\x00'}}, {@fowner_lt={'fowner<', r1}}, {@fsmagic={'fsmagic', 0x3d, 0xfffffffffffffffd}}, {@measure='measure'}, {@uid_eq={'uid', 0x3d, r3}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}}) removexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'osx.', 'nodevGPL:/\x00'}) [ 1567.613001][ T4556] kAFS: unparsable volume name [ 1567.620420][ T4551] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1567.631861][ T4554] kAFS: unparsable volume name 23:34:27 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) lgetxattr(&(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)=@known='system.posix_acl_default\x00', &(0x7f0000000240)=""/23, 0x17) r2 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dri/renderD128\x00', 0x109200, 0x0) socketpair(0x30, 0x5, 0x2, &(0x7f0000000280)) r3 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x32000, 0x0) ioctl$DRM_IOCTL_VERSION(r3, 0xc0406400, &(0x7f0000000500)={0x9, 0xfffffffb, 0x7f, 0x2a, &(0x7f0000000340)=""/42, 0x60, &(0x7f0000000380)=""/96, 0xd3, &(0x7f0000000400)=""/211}) ioctl$DRM_IOCTL_AGP_INFO(r2, 0x80386433, &(0x7f0000000080)=""/43) mount(&(0x7f00000002c0)=ANY=[@ANYBLOB="254a53f8b7fb2c13d579083844d7c39d28f468fe70d07d166985c2baaaba9bc5af18b40b3c293d67cb24ed730866283cae898f7db7e97772bdc3680057f8ed19bc64350f155a4817959f067c843086b414719e"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f00000000c0)='batadv\x00') 23:34:27 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nvme-fabrics\x00', 0x40c00, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r2, 0x6, 0x13, &(0x7f00000000c0)=0x2ab1b4568ee8557b, 0x4) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000040)={0x3}) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000000)=ANY=[@ANYBLOB='%'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1567.758363][ T4564] kAFS: No cell specified 23:34:27 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$rds(0x15, 0x5, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r2, &(0x7f0000000040)={0x9}) socket$inet(0x2, 0xa, 0x89) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r4 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r4, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2008}, 0x1c) listen(r4, 0x0) r5 = dup3(0xffffffffffffffff, r4, 0x80000) setsockopt$packet_int(r5, 0x107, 0x9, &(0x7f0000000000)=0x57e, 0x4) r6 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) getsockopt$inet_opts(r6, 0x0, 0x1f, &(0x7f0000001040)=""/4092, &(0x7f0000001000)=0xffc) 23:34:27 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_DEL(r0, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="ac00000002090101000000000000003f00000009700002002c000100140003006ed80a0ec3677685b4c446deabbe2e8d14000400000000000000400000000000000000000c00020005000100060000000c000200050001003a00000014000100080001007f000001080002007f000001e891871d58a4030c00020005000100880000000c00040008000500f2ff001f0c000200060003000000000008000500000000150800060000000000"], 0xac}, 0x1, 0x0, 0x0, 0x40081}, 0x40000d0) [ 1567.780043][ T4563] kAFS: unparsable volume name 23:34:27 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000080)=ANY=[@ANYBLOB="256bf0ab859d53b5cc3b30225f2d01b8da40f4632de09fb30a6941162fedeffdcfc662ffb405659d208b5aa8068932536fa33dc021c29489a5546ba3d7c8a5110639ca4b99eeacab90"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 23:34:27 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000000)=ANY=[@ANYBLOB='#'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) mount(&(0x7f0000000040)=@sg0='/dev/sg0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='affs\x00', 0x1000, &(0x7f0000000100)='\x16\x00') [ 1567.864815][ T4570] kAFS: No cell specified [ 1567.888983][ T4571] kAFS: unparsable volume name [ 1567.919042][ T4577] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1567.930782][ T4576] kAFS: No cell specified [ 1567.947005][ T4577] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. 23:34:27 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$FBIOGET_VSCREENINFO(r4, 0x4600, &(0x7f0000000080)) r5 = getpid() sched_setattr(r5, &(0x7f0000000040)={0x38, 0x2}, 0x0) r6 = getpid() sched_setattr(r6, &(0x7f0000000040)={0x38, 0x2}, 0x0) mount(&(0x7f0000000300)=ANY=[@ANYPTR64=&(0x7f0000000380)=ANY=[@ANYRES16=r1, @ANYRESOCT=r5, @ANYRES64, @ANYRES32, @ANYRESHEX=r0, @ANYRES16=r4, @ANYRESDEC, @ANYRES64=r3, @ANYRES32=r6, @ANYBLOB="318e28cdfe487022e6610270c3d7cc9fde16214bae7e742b8e64b3fa284ef27dc5d989e233253499695aa17552c4376ded0f2eba408f8229f2bc2db4b199a3f6647ff3e9561666af3e9da9ca420d7c8385ce2b69b84c8add3a5b8ec4c6efc00ff65ca1b9439f1707"]], &(0x7f0000000140)='./file0\x00', &(0x7f0000000240)='selinuxfs\x00', 0x882010, 0x0) [ 1567.988681][ T4607] kAFS: unparsable volume name [ 1568.015503][ T4644] kAFS: No cell specified 23:34:27 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x8) mount(&(0x7f0000000000)=ANY=[@ANYBLOB='%'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) r0 = socket$inet6(0xa, 0x6, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/meminfo\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PR_STREAM_STATUS(r1, 0x84, 0x74, &(0x7f00000001c0)=""/205, &(0x7f00000002c0)=0xcd) r2 = socket$inet6(0xa, 0x6, 0x0) r3 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2008}, 0x1c) listen(r3, 0x0) fsetxattr$trusted_overlay_redirect(r3, &(0x7f0000000380)='trusted.overlay.redirect\x00', &(0x7f00000003c0)='./file0\x00', 0x8, 0x1) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2008}, 0x1c) listen(r2, 0x0) getsockopt$inet6_buf(r2, 0x29, 0x23, &(0x7f0000000300)=""/45, &(0x7f0000000340)=0x2d) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2008}, 0x1c) seccomp$SECCOMP_GET_ACTION_AVAIL(0x2, 0x0, &(0x7f0000000500)=0x6) r4 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r4, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2008}, 0x1c) listen(r4, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0xa, 0x2, 0x0) setsockopt$inet_int(r6, 0x0, 0x8, &(0x7f0000000040)=0xd3, 0x4) getsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f0000000140)={0x0, @rand_addr, @initdev}, &(0x7f0000000180)=0xc) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000440)=ANY=[@ANYBLOB="680000001000050700"/20, @ANYRES32=0x0, @ANYBLOB="25100200000000003400120009000100766c616e000000002400020006000100000000000000000000000000000c000200090000000a0000000a000500140000000000000008000a00", @ANYRES32=r7, @ANYBLOB], 0x68}}, 0x0) sendto(r4, &(0x7f0000000400)="a446eb7490893b5199f951e3b311dbdd13846d4d120aebbccfc1d1a91f512e5e956ef44fc841e59393a31fdb3e0f82bbcf142f7037eaa93fab3b82dcf06201f0eeb91b31db2bf819bb6c21e6fd41b1b4e84e3813a82352fc0ef3444e16f910ac9c", 0x61, 0x20000000, &(0x7f0000000480)=@can={0x1d, r7}, 0x80) listen(r0, 0x0) getsockopt$inet_sctp6_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000040), &(0x7f0000000080)=0xe) [ 1568.051747][ T4607] kAFS: unparsable volume name 23:34:27 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_DEL(r0, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="ac00000002090101000000000000004000000009700002002c000100140003006ed80a0ec3677685b4c446deabbe2e8d14000400000000000000400000000000000000000c00020005000100060000000c000200050001003a00000014000100080001007f000001080002007f000001e891871d58a4030c00020005000100880000000c00040008000500f2ff001f0c000200060003000000000008000500000000150800060000000000"], 0xac}, 0x1, 0x0, 0x0, 0x40081}, 0x40000d0) 23:34:27 executing program 1: r0 = socket$inet(0x2, 0x2, 0x2200000088) sendto$inet(r0, 0x0, 0x30, 0x0, &(0x7f0000319ff0)={0x2, 0x4e20}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) syz_open_dev$swradio(&(0x7f0000000040)='/dev/swradio#\x00', 0x1, 0x2) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$PPPIOCSMRU1(r2, 0x40047452, &(0x7f0000000000)=0x5) 23:34:27 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000080)=ANY=[@ANYBLOB="256bf0ab859d53b5cc3b30225f2d01b8da40f4632de09fb30a6941162fedeffdcfc662ffb405659d208b5aa8068932536fa33dc021c29489a5546ba3d7c8a5110639ca4b99eeacab90"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 23:34:27 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000000)=ANY=[@ANYBLOB='#'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) syz_mount_image$vfat(&(0x7f0000000040)='vfat\x00', &(0x7f0000000080)='./file0\x00', 0x9, 0x2, &(0x7f0000000100)=[{&(0x7f0000000240)="ab7701ae213983b60bac9fbc8c95d49be73e400be7c8963276986edefa968582b88c09212d8819b481127a8c3102a029cb525c437d6dba5a0944b0ae8e731da05bfe9099593c9b14fdb749b50124ff2462858058ca4bf984f84a18c791f16008515c55c39c3c8516c12187e6b8e66ef8a56dc5560364c4de5ee684da66d829738f6f4db789689b1217b60c8ac9668fac6c810611734e4233b4d9a2c07f12a921307ddfbbf6bd362a097fcb01e3abdebaa1104f3f7415c041cfc5b906199bb6ac03", 0xc1}, {&(0x7f00000000c0)="a6b6a7ba9b44686dfce5e1997a03939e85dee436f1e73efe0e110896ed44fd1b087d7f3fabb57426869bc6e579981d60", 0x30, 0x10000}], 0x220442, &(0x7f00000003c0)={[{@utf8no='utf8=0'}, {@rodir='rodir'}, {@shortname_mixed='shortname=mixed'}, {@iocharset={'iocharset', 0x3d, 'cp737'}}], [{@dont_appraise='dont_appraise'}, {@fowner_gt={'fowner>', r0}}, {@fowner_eq={'fowner', 0x3d, r2}}, {@smackfsroot={'smackfsroot', 0x3d, 'afs\x00'}}, {@dont_measure='dont_measure'}, {@func={'func', 0x3d, 'BPRM_CHECK'}}, {@audit='audit'}, {@pcr={'pcr', 0x3d, 0x10}}]}) [ 1568.165109][ T4688] kAFS: unparsable volume name [ 1568.207119][ T4688] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1568.235430][ T4695] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.0'. 23:34:27 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000080)=ANY=[@ANYBLOB="256bf0ab859d53b5cc3b30225f2d01b8da40f4632de09fb30a6941162fedeffdcfc662ffb405659d208b5aa8068932536fa33dc021c29489a5546ba3d7c8a5110639ca4b99eeacab902e"], 0x0, &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1568.259679][ T4700] kAFS: No cell specified [ 1568.267347][ T4701] kAFS: unparsable volume name 23:34:27 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_DEL(r0, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="ac00000002090101000000000000004800000009700002002c000100140003006ed80a0ec3677685b4c446deabbe2e8d14000400000000000000400000000000000000000c00020005000100060000000c000200050001003a00000014000100080001007f000001080002007f000001e891871d58a4030c00020005000100880000000c00040008000500f2ff001f0c000200060003000000000008000500000000150800060000000000"], 0xac}, 0x1, 0x0, 0x0, 0x40081}, 0x40000d0) 23:34:27 executing program 5: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000040)='/dev/bsg\x00', 0x2102, 0x0) write$P9_RSTAT(r0, &(0x7f0000000080)={0x68, 0x7d, 0x2, {0x0, 0x61, 0xfff, 0x31fc, {0x4}, 0x1100000, 0x40, 0x6, 0x9, 0x2, ',.', 0x27, 'ppp1self,!-,$mime_type^\xfdvboxnet1*cpuset', 0x1, '-', 0x4, 'afs\x00'}}, 0x68) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000000)=ANY=[@ANYBLOB='#'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 23:34:27 executing program 1: r0 = socket$inet(0x2, 0x2, 0x2200000088) sendto$inet(r0, 0x0, 0x30, 0x0, &(0x7f0000319ff0)={0x2, 0x4e20}, 0x10) openat$adsp1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/adsp1\x00', 0x1001, 0x0) [ 1568.365363][ T4688] kAFS: unparsable volume name 23:34:28 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x38, 0x2}, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x38, 0x2}, 0x0) r4 = getpid() sched_setattr(r4, &(0x7f0000000040)={0x38, 0x2}, 0x0) mount(&(0x7f0000000080)=ANY=[@ANYRES32=r1, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESHEX=r2, @ANYBLOB="cb81b20ce6bf50b458b9e7ffc70a6215a6495e3287476d1ba3b128db36691a5a7fc2290152afcd3f67b8776d2ed7a1fd570ca20e11807ce04815dbc4dfadc9fe583e59c042c2c5dcf99b64ac7fb6f53ab5500bf88fb733a0b525731c2f4363c15eaf2300d0fbbab246c837e09ddd699c4551710ddec26adf6dde8a5b642bef65d9d82128222fb18db5d05c92fd9a8bdc85ecd57d009e77663e0907dd709d7210a04835fdf6ddd7ccf591781303184943c8228771971744959df3e56c94ecbda3", @ANYRES32], @ANYRESHEX, @ANYRES16=r3, @ANYRESDEC=r4, @ANYRES16=r0], &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='hpfs\x00', 0x0, 0x0) r5 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r5, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2008}, 0x1c) listen(r5, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQNSD(r5, 0x894b, &(0x7f0000000040)) 23:34:28 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000080)=ANY=[@ANYBLOB="256bf0ab859d53b5cc3b30225f2d01b8da40f4632de09fb30a6941162fedeffdcfc662ffb405659d208b5aa8068932536fa33dc021c29489a5546ba3d7c8a5110639ca4b99eeacab902e"], 0x0, &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1568.489632][ T4821] kAFS: unparsable volume name 23:34:28 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_DEL(r0, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="ac00000002090101000000000000004c00000009700002002c000100140003006ed80a0ec3677685b4c446deabbe2e8d14000400000000000000400000000000000000000c00020005000100060000000c000200050001003a00000014000100080001007f000001080002007f000001e891871d58a4030c00020005000100880000000c00040008000500f2ff001f0c000200060003000000000008000500000000150800060000000000"], 0xac}, 0x1, 0x0, 0x0, 0x40081}, 0x40000d0) [ 1568.664653][ T4833] validate_nla: 78 callbacks suppressed [ 1568.664661][ T4833] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 23:34:28 executing program 3: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0)='sysfs\x00', 0x843c, 0x0) mount(&(0x7f0000000000)=@filename='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='mqueue\x00', 0x100000, &(0x7f0000000140)='sysfs\x00') r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2}, 0x0) r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2008}, 0x1c) listen(r1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$TIOCGSID(r3, 0x5429, &(0x7f00000006c0)=0x0) r5 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r5, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2008}, 0x1c) listen(r5, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, &(0x7f0000000700)={{{@in=@multicast2, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in=@loopback}}, &(0x7f0000000800)=0xe8) r7 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) r9 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="337964fb70f2c282", @ANYRES32=r8, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=r8, @ANYBLOB="08000200", @ANYRES32=r10, @ANYBLOB="10000400000000002000020000000000"], 0x3c, 0x0) setsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000840)={r4, r6, r10}, 0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in=@empty, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@multicast2}}, &(0x7f00000003c0)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000400)={{{@in6=@remote, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@local}}, &(0x7f0000000500)=0xe8) stat(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$overlay(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='overlay\x00', 0x2000, &(0x7f0000000600)={[{@metacopy_on='metacopy=on'}, {@nfs_export_on='nfs_export=on'}], [{@smackfstransmute={'smackfstransmute', 0x3d, 'eth1'}}, {@fowner_gt={'fowner>', r11}}, {@euid_gt={'euid>', r12}}, {@appraise='appraise'}, {@measure='measure'}, {@dont_hash='dont_hash'}, {@context={'context', 0x3d, 'sysadm_u'}}, {@fowner_gt={'fowner>', r13}}]}) ptrace$setsig(0x4203, 0x0, 0x7fd, &(0x7f0000000180)={0x14, 0x3, 0x9}) 23:34:28 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) r0 = geteuid() r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) r3 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="020000000100000000000000040001000015000008000000", @ANYRES32=r2, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=r2, @ANYBLOB="08000200", @ANYRES32=r4, @ANYBLOB="10000400000000002000020000000000"], 0x3c, 0x0) lchown(&(0x7f0000000500)='./file0\x00', r0, r2) chdir(&(0x7f0000000000)='./file0\x00') open$dir(&(0x7f0000000080)='./file0\x00', 0x32b681, 0x1c4) r5 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r6) syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f00000000c0)='./file0\x00', 0xfffffffeffffffff, 0x4, &(0x7f00000003c0)=[{&(0x7f0000000100)="c47ace776d0957b2b50299ceccd33186e0e160566ec07799804372fb21ddc65c90", 0x21, 0x20f}, {&(0x7f0000000240)="49bc3911fa840a16a652749520f82ae1ebcab580f6c4cbf8c5e749695b906bfd0dce5a21767f211103d59f481b2a3cc81ba6fa247cc671b760d4f316a2be9d8d2f67f0735f67c72730d8ac579c445e96032a3bd92cf43a6a3f33851be3d2cb006bca27e42f4b0699e38d66407e1bf85aeeac854d9abc0c627639160322cfc78d10b37819cd8e4c182417c922facd7dee03ee3cf9ff7b12c651aa3118cd4cb6f96dbf6a47053823ec758940c2ee9c6b5338551181576b7e8da0118c9c73f157c042", 0xc1, 0x8}, {&(0x7f0000000140)="756da38dcddd1a6e8bb69c427a379c8af61bd09d300e45f07e5d7cd202f4b32f8aa2585cf5770c700de973980396cb63af192245b2fee42fcc7cca328af4402b3b4f5d78124279bb0f0b4e5a4969593354eedda0bf4c18eb48fbf7f72e8a25a4999343757da917e3d899042d69527316d76e8e62176353594b736c70c7816755aa4d78fb86fa572473660e0514adf20ea0211c4a2927c7eea8be9ced9873357368b52198d2664b9c8a6928911f16bbfeab64bf957fda56645b22a3", 0xbb, 0x1}, {&(0x7f0000000340)="bc536478eba06ca61f591b7d8f4e6a844337d504edf5efe4afaed532453ce97b4219918233fe235d5f2bc030a41e51dae63656b766e1fcf27b0100ace0e2474dfb7e0bdef500e62d7a1ad2910d4a04b4f15a4d21fe81c6087a1d9e8676a17cf06424a46514142343c3d7501798b6651a266fdc96", 0x74, 0x5}], 0x20, &(0x7f0000000440)={[{@discard='discard'}, {@ignore_local_fs='ignore_local_fs'}, {@acl='acl'}, {@quota='quota'}, {@quota_off='quota=off'}, {@upgrade='upgrade'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@permit_directio='permit_directio'}, {@dont_measure='dont_measure'}, {@euid_lt={'euid<', r6}}, {@pcr={'pcr', 0x3d, 0x2e}}, {@dont_hash='dont_hash'}, {@euid_lt={'euid<', 0xee01}}]}) 23:34:28 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000080)=ANY=[@ANYBLOB="256bf0ab859d53b5cc3b30225f2d01b8da40f4632de09fb30a6941162fedeffdcfc662ffb405659d208b5aa8068932536fa33dc021c29489a5546ba3d7c8a5110639ca4b99eeacab902e"], 0x0, &(0x7f0000000180)='afs\x00', 0x0, 0x0) 23:34:28 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$VHOST_GET_VRING_ENDIAN(r2, 0x4008af14, &(0x7f0000000040)={0x0, 0x1}) r3 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000000)=ANY=[@ANYBLOB='o'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) syz_genetlink_get_family_id$devlink(&(0x7f0000000080)='devlink\x00') [ 1568.709632][ T4833] netlink: 'syz-executor.0': attribute type 2 has an invalid length. 23:34:28 executing program 1: r0 = socket$inet(0x2, 0x2, 0x2200000088) r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2008}, 0x1c) listen(r1, 0x0) r2 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2008}, 0x1c) listen(r2, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000580)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000140)={0xffffffffffffffff}, 0x2}}, 0x20) r6 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r6, &(0x7f0000000080)={0x12, 0x10, 0xfa00, {&(0x7f00000000c0), r5, r4}}, 0x18) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r3, &(0x7f0000000000)={0x15, 0x110, 0xfa00, {r5, 0x10001, 0x0, 0x0, 0x0, @in={0x2, 0x4e23, @broadcast}, @in6={0xa, 0x4e20, 0x0, @empty, 0x3}}}, 0x118) sendto$inet(r0, 0x0, 0x30, 0x0, &(0x7f0000319ff0)={0x2, 0x4e20}, 0x10) 23:34:28 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000080)=ANY=[@ANYBLOB="256bf0ab859d53b5cc3b30225f2d01b8da40f4632de09fb30a6941162fedeffdcfc662ffb405659d208b5aa8068932536fa33dc021c29489a5546ba3d7c8a5110639ca4b99eeacab902e"], &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) [ 1568.787039][ T4833] netlink: 'syz-executor.0': attribute type 2 has an invalid length. [ 1568.817070][ T4833] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 23:34:28 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_DEL(r0, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="ac00000002090101000000000000006000000009700002002c000100140003006ed80a0ec3677685b4c446deabbe2e8d14000400000000000000400000000000000000000c00020005000100060000000c000200050001003a00000014000100080001007f000001080002007f000001e891871d58a4030c00020005000100880000000c00040008000500f2ff001f0c000200060003000000000008000500000000150800060000000000"], 0xac}, 0x1, 0x0, 0x0, 0x40081}, 0x40000d0) 23:34:28 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(0xffffffffffffffff, 0xc04c5349, &(0x7f0000000080)={0x2aaa0, 0x80, 0xffff}) syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x100, 0x842) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="55ebe923bd06db839f50f187595a1eff5e303c9dbe6000536b991f9998f3e45af68ad2c1ccac09322925257238f9af13d1aba24d"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) timer_create(0x7, &(0x7f0000000100)={0x0, 0x41, 0x4, @thr={&(0x7f0000000240)="e1b8672d400c84fddf7bc2ea632b8bcf5ea943d125f2bd49021efaa119dd48ed18dba4b19c0e11532ef07cd1e74521f3e67767d71c0d858d796a6820417f0564fd75e8f374a1c08530a4e470d1f5b8857d38fc8dc8fbf0fc66662d61a7872cfaba4048a319564e403f5092c0cd6ec725deb11de099d06bad624cdd4fd344f00e657bd85cb9049c562e14abf9f23c3843bbf72af8cd538f44a2efb8bba619f2945b733bf39f4321c4dd149d4af7b7bd4b62b221c3cd6481c80dce3bbc19659203", &(0x7f0000000300)="318826aadbc34c699826242de76fc4455931a0760f4ba255dc50fd47f33af447ca413273cac3f751e0ccb6ef348d4ca83db01797fd7c526fe8e9cec3dee299958ea9e9a4c740800cca552abb712a8852de46b3044f635e4dcf98cd68a234cac7da9158bcf7ca6ba85c0e637fe28b594267f64f947e82479f0c74c071d7a46bd7718ab2d7735ef62cac82091427bc36c017ff28f99499688b9795ec"}}, &(0x7f00000001c0)=0x0) timer_getoverrun(r2) setsockopt$TIPC_MCAST_REPLICAST(0xffffffffffffffff, 0x10f, 0x86) [ 1568.960999][ T4867] kAFS: unparsable volume name [ 1568.996094][ T4957] kAFS: unparsable volume name 23:34:28 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000080)=ANY=[@ANYBLOB="256bf0ab859d53b5cc3b30225f2d01b8da40f4632de09fb30a6941162fedeffdcfc662ffb405659d208b5aa8068932536fa33dc021c29489a5546ba3d7c8a5110639ca4b99eeacab902e"], &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) 23:34:28 executing program 1: r0 = socket$inet(0x2, 0x2, 0x2200000088) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-vsock\x00', 0x2, 0x0) sendto$inet(r0, 0x0, 0x30, 0x0, &(0x7f0000319ff0)={0x2, 0x4e20}, 0x10) 23:34:28 executing program 3: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000000)=ANY=[@ANYBLOB='%'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x400, 0x0) ioctl$TCGETA(r0, 0x5405, &(0x7f0000000080)) [ 1569.022284][ T4958] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 23:34:28 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000000)=ANY=[@ANYBLOB='%'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) r2 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2008}, 0x1c) listen(r2, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000380)=@raw={'raw\x00', 0x3c1, 0x3, 0x2f8, 0x0, 0xd0, 0xd0, 0xd0, 0xd0, 0x228, 0x228, 0x228, 0x228, 0x228, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0xa8, 0xd0}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00', 0x0, {0xffff}}}, {{@uncond, 0x0, 0x138, 0x158, 0x0, {}, [@common=@srh1={{0x90, 'srh\x00'}, {0x0, 0x0, 0x0, 0x0, 0x0, @dev, @loopback, @local}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x358) setsockopt$inet_sctp6_SCTP_AUTOCLOSE(r2, 0x84, 0x4, &(0x7f0000000040)=0x8000, 0x4) [ 1569.080750][ T4958] netlink: 'syz-executor.0': attribute type 2 has an invalid length. [ 1569.150088][ T4958] netlink: 'syz-executor.0': attribute type 2 has an invalid length. [ 1569.164476][ T4967] kAFS: unparsable volume name [ 1569.198660][ T4967] kAFS: unparsable volume name [ 1569.214827][ T4969] kAFS: unparsable volume name [ 1569.230588][ T4958] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 23:34:28 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000000)=ANY=[@ANYBLOB='#'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) stat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0}) newfstatat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x800) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000340)=0xc) lstat(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000000500)='./file1\x00', &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0}) statx(0xffffffffffffffff, &(0x7f00000005c0)='./file0\x00', 0x100, 0x100, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r7 = getgid() r8 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r8, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) r10 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r10, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r13 = dup(r12) ioctl$PERF_EVENT_IOC_ENABLE(r13, 0x8912, 0x400200) getpeername$ax25(r13, &(0x7f0000000880)={{0x3, @bcast}, [@bcast, @netrom, @rose, @remote, @remote, @bcast]}, &(0x7f0000000900)=0x48) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f0000000780)=ANY=[@ANYBLOB="020000000100000000000000040001000015000008000000", @ANYRES32=r9, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=r9, @ANYBLOB="08000200", @ANYRES32=r11, @ANYBLOB="1000044018000000200002000000000098a18a88deb39361f9f75d99c3ceba648efc7ad8c8e4744e352623238e3792440a18ce794e108ccc42e77fa120c24bfbe80619a2701e398640ebdbafbc9292b10317e76a364e47be7c4245a562fcfbb32499f4d753ea2793d140c8879ecf2fd9e6d0d2e824967293497dea1ef78509d479cc30323dbcf9448b74d4d7881d4cea4e1047f1d8ff9b13d604dacfb84e801c1de544291975026be6bd0e4c4df1f7aab6dcd5"], 0x3c, 0x0) r14 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r14, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) r16 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r16, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="020000000100000000000000040001000015000008000000", @ANYRES32=r15, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=r15, @ANYBLOB="08000200", @ANYRES32=r17, @ANYBLOB="10000400000000002000020000000000"], 0x3c, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='system.posix_acl_default\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x4, r0}, {0x2, 0x4, r1}, {0x2, 0x3, r2}, {0x2, 0x1, r3}, {0x2, 0x0, r4}, {0x2, 0x6, r5}], {0x4, 0x3}, [{0x8, 0x4, r6}, {0x8, 0x4, r7}, {0x8, 0x2, r11}, {0x8, 0x3, r17}], {0x10, 0x3}, {0x20, 0x2}}, 0x74, 0x3) [ 1569.248329][ T4969] xt_TCPMSS: path-MTU clamping only supported in FORWARD, OUTPUT and POSTROUTING hooks 23:34:28 executing program 3: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f00000000c0)=0x0) mount$overlay(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='overlay\x00', 0x802000, &(0x7f0000000240)={[{@nfs_export_off='nfs_export=off'}, {@index_off='index=off'}, {@default_permissions='default_permissions'}], [{@context={'context', 0x3d, 'staff_u'}}, {@obj_role={'obj_role', 0x3d, 'afs\x00'}}, {@subj_type={'subj_type', 0x3d, '%!em0$'}}, {@hash='hash'}, {@fowner_lt={'fowner<', r0}}]}) mount(&(0x7f0000000000)=ANY=[@ANYBLOB='%'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 23:34:28 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$inet_dccp_buf(r1, 0x21, 0xc, &(0x7f0000001240)="7c8fdc1431b2216ed112e12929a88015aab4d616bac70e0884651c559c5cac6fb03d41bbdf2d670d08964fde1867f3709d7a8895d6945e5f3a0238d9bcce4016efe982e10c490a9610f779c1ddec35d6e915da72c52b2efac3cdccc801f6dc0e0b1725666036a606c33d10fa89c9847165d44f186b84702d4f75c60b5275f7c48281bf3481ca469df6abef27937d40fbe15a518746a6fff9f403f081a46910b52ea57d40a1e568c6e9f500bbb39a18ee35279c46a84aa7a4ccc723b9119f0644ebdde4bf389170308022a81494249eabef3d9d2b6c5987700b1ecac571d2", 0xde) ioctl$VIDIOC_SUBDEV_G_FRAME_INTERVAL(r1, 0xc0305615, &(0x7f0000000000)={0x0, {0x2, 0xcf0}}) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) r2 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-monitor\x00', 0x4200, 0x0) ioctl$VIDIOC_S_HW_FREQ_SEEK(r2, 0x40305652, &(0x7f00000001c0)={0x8000, 0x5, 0x8d, 0xffff, 0x7fff, 0x4, 0x59b}) ioctl$KVM_GET_SUPPORTED_CPUID(r2, 0xc008ae05, &(0x7f0000000240)=""/4096) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r4 = dup(r3) ioctl$SCSI_IOCTL_PROBE_HOST(0xffffffffffffffff, 0x5385, &(0x7f0000001340)=ANY=[@ANYBLOB="00000000dce3aa7f07feb30145b85dff54da3ada346032eae8f4adcb3cc55ee9425820e0c520358b46e5236516e11f4a0c897bc5a765f5e4481304b4ef320639c29264be4ea5f2b93891e73206008d740cc1618fd9c35d6822d135795aef117ba7d8f58ed3e306e45b8c65ea000000000000000079ac9b59d1df3b0b70ba8c9fea0d"]) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$VIDIOC_S_JPEGCOMP(r4, 0x408c563e, &(0x7f0000000080)={0x7fff, 0x1ff, 0x29, "5b12f18bd0488c1e85ec9aca22ee37852d760b8d51553cd54111641c5071a106630a3ac05050484f04186a72d717d9e11ca7ed1bf1421527ccc1636a", 0x17, "d785df2948025c343133f8abe425cb09c37b9bfadb50281baf51511e26e0aec303371d25af23f91d00c2ee944efa1ec9d3c55c52466aae716f9dc743", 0x28}) [ 1569.301696][ T5063] kAFS: unparsable volume name 23:34:28 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000080)=ANY=[@ANYBLOB="256bf0ab859d53b5cc3b30225f2d01b8da40f4632de09fb30a6941162fedeffdcfc662ffb405659d208b5aa8068932536fa33dc021c29489a5546ba3d7c8a5110639ca4b99eeacab902e"], &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) 23:34:28 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_DEL(r0, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="ac00000002090101000000000000006800000009700002002c000100140003006ed80a0ec3677685b4c446deabbe2e8d14000400000000000000400000000000000000000c00020005000100060000000c000200050001003a00000014000100080001007f000001080002007f000001e891871d58a4030c00020005000100880000000c00040008000500f2ff001f0c000200060003000000000008000500000000150800060000000000"], 0xac}, 0x1, 0x0, 0x0, 0x40081}, 0x40000d0) [ 1569.341928][ T5078] kAFS: unparsable volume name [ 1569.394636][ T5078] kAFS: unparsable volume name 23:34:28 executing program 1: r0 = socket$inet(0x2, 0x2, 0x2200000088) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ocfs2_control\x00', 0x141240, 0x0) write$UHID_INPUT2(r2, &(0x7f00000000c0)={0xc, {0x3a, "d6efde3d615ee3161626924722b7edc0cc3ffd9c5e90849a67f03d0efa9029dac2d55cac44a484a880dfb1a267077fd1e3cf8ef1ff24b979ae39"}}, 0x40) r3 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r4, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2008}, 0x1c) listen(r4, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x1b, &(0x7f0000000100)=0xff, 0x4) recvfrom$phonet(r3, &(0x7f0000000000)=""/23, 0x17, 0x1, &(0x7f0000000040)={0x23, 0xd4, 0xff, 0x1}, 0x10) sendto$inet6(r2, &(0x7f0000000140)="188d5f3c23c3c5844f87d542b0b4d39889b247a4519a65ba3bb37109942754bc94937f02f175dfe3698b14e6588313288cdf9e1614bc3ad7a7", 0x39, 0x88c, &(0x7f00000001c0)={0xa, 0x4e23, 0x1ef, @ipv4={[], [], @remote}, 0x10001}, 0x1c) sendto$inet(r0, 0x0, 0x30, 0x0, &(0x7f0000319ff0)={0x2, 0x4e20}, 0x10) 23:34:29 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000000)=ANY=[@ANYBLOB='%'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) r2 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2008}, 0x1c) listen(r2, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000380)=@raw={'raw\x00', 0x3c1, 0x3, 0x2f8, 0x0, 0xd0, 0xd0, 0xd0, 0xd0, 0x228, 0x228, 0x228, 0x228, 0x228, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0xa8, 0xd0}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00', 0x0, {0xffff}}}, {{@uncond, 0x0, 0x138, 0x158, 0x0, {}, [@common=@srh1={{0x90, 'srh\x00'}, {0x0, 0x0, 0x0, 0x0, 0x0, @dev, @loopback, @local}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x358) setsockopt$inet_sctp6_SCTP_AUTOCLOSE(r2, 0x84, 0x4, &(0x7f0000000040)=0x8000, 0x4) [ 1569.456098][ T5088] kAFS: unparsable volume name [ 1569.465458][ T5091] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 23:34:29 executing program 3: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000000)=ANY=[@ANYBLOB="06"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 23:34:29 executing program 5: setxattr$smack_xattr_label(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.SMACK64MMAP\x00', &(0x7f00000000c0)={'afs\x00'}, 0x5, 0x3) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000080)=ANY=[@ANYBLOB='#', @ANYRESHEX], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x18000, 0x0) [ 1569.526069][ T5091] netlink: 'syz-executor.0': attribute type 2 has an invalid length. [ 1569.626020][ T5104] kAFS: unparsable volume name 23:34:29 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000000)=ANY=[@ANYBLOB='%'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) r2 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2008}, 0x1c) listen(r2, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000380)=@raw={'raw\x00', 0x3c1, 0x3, 0x2f8, 0x0, 0xd0, 0xd0, 0xd0, 0xd0, 0x228, 0x228, 0x228, 0x228, 0x228, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0xa8, 0xd0}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00', 0x0, {0xffff}}}, {{@uncond, 0x0, 0x138, 0x158, 0x0, {}, [@common=@srh1={{0x90, 'srh\x00'}, {0x0, 0x0, 0x0, 0x0, 0x0, @dev, @loopback, @local}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x358) setsockopt$inet_sctp6_SCTP_AUTOCLOSE(r2, 0x84, 0x4, &(0x7f0000000040)=0x8000, 0x4) 23:34:29 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x38, 0x2}, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x38, 0x2}, 0x0) mount(&(0x7f0000000040)=ANY=[@ANYRESDEC=r3], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1569.649517][ T5104] xt_TCPMSS: path-MTU clamping only supported in FORWARD, OUTPUT and POSTROUTING hooks [ 1569.669604][ T5157] kAFS: No cell specified 23:34:29 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_DEL(r0, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="ac00000002090101000000000000006c00000009700002002c000100140003006ed80a0ec3677685b4c446deabbe2e8d14000400000000000000400000000000000000000c00020005000100060000000c000200050001003a00000014000100080001007f000001080002007f000001e891871d58a4030c00020005000100880000000c00040008000500f2ff001f0c000200060003000000000008000500000000150800060000000000"], 0xac}, 0x1, 0x0, 0x0, 0x40081}, 0x40000d0) [ 1569.707269][ T5187] kAFS: No cell specified [ 1569.752904][ T5203] kAFS: unparsable volume name 23:34:29 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000000)=ANY=[@ANYBLOB='#'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) recvmsg$kcm(r1, &(0x7f0000000440)={&(0x7f00000000c0)=@ax25={{0x3, @default}, [@bcast, @remote, @null, @null, @bcast, @remote, @bcast, @netrom]}, 0x80, &(0x7f0000000300)=[{&(0x7f0000000240)=""/152, 0x98}, {&(0x7f00000001c0)}], 0x2, &(0x7f0000000340)=""/224, 0xe0}, 0x10100) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)={&(0x7f0000000040)='./file0\x00', 0x0, 0x20}, 0x10) 23:34:29 executing program 1: r0 = socket$inet(0x2, 0x2, 0x2200000088) sendto$inet(r0, 0x0, 0x30, 0x0, &(0x7f0000319ff0)={0x2, 0x4e20}, 0x10) syz_genetlink_get_family_id$batadv(&(0x7f0000000000)='batadv\x00') [ 1569.779959][ T5212] kAFS: unparsable volume name [ 1569.812021][ T5216] kAFS: unparsable volume name 23:34:29 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_DEL(r0, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="ac00000002090101000000000000007400000009700002002c000100140003006ed80a0ec3677685b4c446deabbe2e8d14000400000000000000400000000000000000000c00020005000100060000000c000200050001003a00000014000100080001007f000001080002007f000001e891871d58a4030c00020005000100880000000c00040008000500f2ff001f0c000200060003000000000008000500000000150800060000000000"], 0xac}, 0x1, 0x0, 0x0, 0x40081}, 0x40000d0) 23:34:29 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$PPPIOCGFLAGS(r1, 0x8004745a, &(0x7f0000000040)) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000000)=ANY=[@ANYBLOB='%'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1569.847367][ T5217] kAFS: unparsable volume name 23:34:29 executing program 3: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000000)=ANY=[@ANYBLOB], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$TCSETA(r1, 0x5406, &(0x7f0000000040)={0x401, 0x800, 0x200, 0x0, 0x1a, "a686922b5d63989e"}) [ 1569.882409][ T5217] xt_TCPMSS: path-MTU clamping only supported in FORWARD, OUTPUT and POSTROUTING hooks [ 1569.924052][ T5224] kAFS: unparsable volume name 23:34:29 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000000)=ANY=[@ANYBLOB='%'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) r2 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2008}, 0x1c) listen(r2, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000380)=@raw={'raw\x00', 0x3c1, 0x3, 0x2f8, 0x0, 0xd0, 0xd0, 0xd0, 0xd0, 0x228, 0x228, 0x228, 0x228, 0x228, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0xa8, 0xd0}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00', 0x0, {0xffff}}}, {{@uncond, 0x0, 0x138, 0x158, 0x0, {}, [@common=@srh1={{0x90, 'srh\x00'}, {0x0, 0x0, 0x0, 0x0, 0x0, @dev, @loopback, @local}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x358) setsockopt$inet_sctp6_SCTP_AUTOCLOSE(r2, 0x84, 0x4, &(0x7f0000000040)=0x8000, 0x4) 23:34:29 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_DEL(r0, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="ac00000002090101000000000000007a00000009700002002c000100140003006ed80a0ec3677685b4c446deabbe2e8d14000400000000000000400000000000000000000c00020005000100060000000c000200050001003a00000014000100080001007f000001080002007f000001e891871d58a4030c00020005000100880000000c00040008000500f2ff001f0c000200060003000000000008000500000000150800060000000000"], 0xac}, 0x1, 0x0, 0x0, 0x40081}, 0x40000d0) [ 1569.986907][ T5265] kAFS: unparsable volume name [ 1570.025776][ T5335] kAFS: Bad value for 'source' 23:34:29 executing program 1: r0 = socket$inet(0x2, 0x2, 0x2200000088) getpeername$packet(0xffffffffffffffff, &(0x7f0000003c40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000003c80)=0x14) sendto$packet(0xffffffffffffffff, &(0x7f0000000040)="d79fa7e36d02671e42d151a4ef1f431484f43192e78bc59f3565c0a6c8ec2f72d493", 0x22, 0x24040000, &(0x7f0000003cc0)={0x11, 0x7, r1, 0x1, 0x81, 0x6, @broadcast}, 0x14) sendto$inet(r0, 0x0, 0x30, 0x0, &(0x7f0000319ff0)={0x2, 0x4e20}, 0x10) write$P9_RWRITE(0xffffffffffffffff, &(0x7f0000000000)={0xb, 0x77, 0x1, 0x20}, 0xb) [ 1570.049463][ T5335] kAFS: Bad value for 'source' 23:34:29 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x401) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000000)=ANY=[@ANYBLOB='%'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2008}, 0x1c) listen(r1, 0x0) fcntl$setpipe(r1, 0x407, 0x5) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40e080, 0x0) sendmsg$IPCTNL_MSG_TIMEOUT_GET(r2, &(0x7f00000001c0)={&(0x7f0000000080), 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x20, 0x1, 0x8, 0x401, 0x0, 0x0, {0x5, 0x0, 0x1ff}, [@CTA_TIMEOUT_NAME={0x9, 0x1, 'syz1\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x4000000}, 0x1) [ 1570.109886][ T5341] kAFS: unparsable volume name 23:34:29 executing program 3: pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$EVIOCSREP(r0, 0x40084503, &(0x7f00000002c0)=[0x3, 0x3]) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000000)=ANY=[@ANYBLOB='%'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x1000000, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) getresgid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)=0x0) lchown(&(0x7f0000000040)='./file0\x00', r2, r3) [ 1570.138264][ T5341] xt_TCPMSS: path-MTU clamping only supported in FORWARD, OUTPUT and POSTROUTING hooks 23:34:29 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000000)=ANY=[@ANYBLOB='%'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) r2 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2008}, 0x1c) listen(r2, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000380)=@raw={'raw\x00', 0x3c1, 0x3, 0x2f8, 0x0, 0xd0, 0xd0, 0xd0, 0xd0, 0x228, 0x228, 0x228, 0x228, 0x228, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0xa8, 0xd0}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00', 0x0, {0xffff}}}, {{@uncond, 0x0, 0x138, 0x158, 0x0, {}, [@common=@srh1={{0x90, 'srh\x00'}, {0x0, 0x0, 0x0, 0x0, 0x0, @dev, @loopback, @local}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x358) 23:34:29 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_DEL(r0, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="ac0000000209010100000000ffffff9e00000009700002002c000100140003006ed80a0ec3677685b4c446deabbe2e8d14000400000000000000400000000000000000000c00020005000100060000000c000200050001003a00000014000100080001007f000001080002007f000001e891871d58a4030c00020005000100880000000c00040008000500f2ff001f0c000200060003000000000008000500000000150800060000000000"], 0xac}, 0x1, 0x0, 0x0, 0x40081}, 0x40000d0) [ 1570.199285][ T5369] kAFS: unparsable volume name [ 1570.233455][ T5445] kAFS: unparsable volume name [ 1570.260045][ T5450] kAFS: unparsable volume name [ 1570.339305][ T5459] kAFS: unparsable volume name [ 1570.376435][ T5459] xt_TCPMSS: path-MTU clamping only supported in FORWARD, OUTPUT and POSTROUTING hooks 23:34:30 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000080)=ANY=[@ANYBLOB="7c769537f6c339b5d4618f30ce0e4b80b12ca7c8d2af04a2ea44b0f5dcc05219f6cd860891af6ee39df1d5b106f7a5e13fdabf86abd47b6d5ebdd1bba0366b224c75e4b711268bd71ab2c1976fa2d8b1f4c23b700358c6b29dc1d7946d11e2ec45e4f793bb2cecd3ef621a598979e59563f1"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 23:34:30 executing program 1: r0 = socket$inet(0x2, 0x2, 0x2200000088) openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x224200, 0x0) sendto$inet(r0, 0x0, 0x30, 0x0, &(0x7f0000319ff0)={0x2, 0x4e20}, 0x10) 23:34:30 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x2c8040, 0x0) ioctl$EVIOCSABS3F(r1, 0x401845ff, &(0x7f0000000040)={0x7f, 0x80000000, 0x2, 0x69ee, 0x101, 0x3}) r2 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = syz_open_dev$vcsn(&(0x7f0000000080)='/dev/vcs#\x00', 0x0, 0x20040) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r4, 0x2405, r5) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000000)=ANY=[@ANYBLOB], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 23:34:30 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000000)=ANY=[@ANYBLOB='%'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) r2 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2008}, 0x1c) listen(r2, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000380)=@raw={'raw\x00', 0x3c1, 0x3, 0x2f8, 0x0, 0xd0, 0xd0, 0xd0, 0xd0, 0x228, 0x228, 0x228, 0x228, 0x228, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0xa8, 0xd0}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00', 0x0, {0xffff}}}, {{@uncond, 0x0, 0x138, 0x158, 0x0, {}, [@common=@srh1={{0x90, 'srh\x00'}, {0x0, 0x0, 0x0, 0x0, 0x0, @dev, @loopback, @local}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x358) 23:34:30 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_DEL(r0, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="ac000000020901010000000000003bda00000009700002002c000100140003006ed80a0ec3677685b4c446deabbe2e8d14000400000000000000400000000000000000000c00020005000100060000000c000200050001003a00000014000100080001007f000001080002007f000001e891871d58a4030c00020005000100880000000c00040008000500f2ff001f0c000200060003000000000008000500000000150800060000000000"], 0xac}, 0x1, 0x0, 0x0, 0x40081}, 0x40000d0) 23:34:30 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) connect$pppoe(r1, &(0x7f0000000000)={0x18, 0x0, {0x2}}, 0x1e) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000500)={r1, &(0x7f0000000440), &(0x7f0000000700)=""/243, 0x4}, 0x20) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$cgroup_int(r5, &(0x7f0000000140), 0xff4d) r6 = syz_genetlink_get_family_id$nbd(&(0x7f0000000280)='nbd\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r8 = dup(r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) write$FUSE_POLL(r8, &(0x7f0000000380)={0x18, 0x0, 0x7, {0x1f}}, 0x18) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000004c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000480)={&(0x7f00000002c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES16=r6, @ANYBLOB="01002abd7000fddbdf25020000000c00020013550000000000000c00060000000000000000000c00030003000000000000000c00070008000100", @ANYRES32, @ANYBLOB="0c0006000200000000000000"], 0x50}, 0x1, 0x0, 0x0, 0x40}, 0x80) sendmsg$NBD_CMD_STATUS(r4, &(0x7f00000005c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x2c, r6, 0x200, 0x70bd28, 0x25dfdbff, {}, [@NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x400000000000003}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x8001}]}, 0x2c}, 0x1, 0x0, 0x0, 0x44000}, 0xc000) sendmsg$NBD_CMD_RECONFIGURE(r3, &(0x7f0000000240)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000001c0)={&(0x7f0000000100)={0x20, r6, 0x20, 0x70bd26, 0x25dfdbfb, {}, [@NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0xc}]}, 0x20}, 0x1, 0x0, 0x0, 0x4000}, 0x4004880) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="00753d5e100300000000000000d692587362aca6f4b9040737d2190392e7cdc540b685c06db7a6bd3416da85c076b228ad13eff65761fbc61c60b8873f0f1cbbad20749e12886b48ee04c88d1f1404bffcdb00cb24caa121ab6b4ea731aec0753e7e3f1bbe1eb3b3f080965501"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000600)={{{@in=@empty, @in6=@ipv4={[], [], @initdev}}}, {{@in=@remote}, 0x0, @in=@initdev}}, &(0x7f0000000340)=0xe8) [ 1570.709953][ T5224] kAFS: unparsable volume name 23:34:30 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_DEL(r0, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="ac0000000209010100000000ffffffef00000009700002002c000100140003006ed80a0ec3677685b4c446deabbe2e8d14000400000000000000400000000000000000000c00020005000100060000000c000200050001003a00000014000100080001007f000001080002007f000001e891871d58a4030c00020005000100880000000c00040008000500f2ff001f0c000200060003000000000008000500000000150800060000000000"], 0xac}, 0x1, 0x0, 0x0, 0x40081}, 0x40000d0) 23:34:30 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) write$evdev(0xffffffffffffffff, &(0x7f00000000c0)=[{{r2, r3/1000+30000}, 0x3, 0x49e}, {{0x0, 0x7530}, 0x12, 0x1, 0x4}, {{r4, r5/1000+30000}, 0x11, 0x6, 0xaaa}], 0x48) mount(&(0x7f0000000000)=ANY=[@ANYBLOB='%'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1570.837516][ T5474] kAFS: unparsable volume name [ 1570.842701][ T5487] kAFS: unparsable volume name 23:34:30 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000000)=ANY=[@ANYBLOB='%'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) r2 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2008}, 0x1c) listen(r2, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000380)=@raw={'raw\x00', 0x3c1, 0x3, 0x2f8, 0x0, 0xd0, 0xd0, 0xd0, 0xd0, 0x228, 0x228, 0x228, 0x228, 0x228, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0xa8, 0xd0}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00', 0x0, {0xffff}}}, {{@uncond, 0x0, 0x138, 0x158, 0x0, {}, [@common=@srh1={{0x90, 'srh\x00'}, {0x0, 0x0, 0x0, 0x0, 0x0, @dev, @loopback, @local}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x358) 23:34:30 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x17c) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$BLKROSET(r4, 0x125d, &(0x7f0000000000)=0x10000) r5 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) write$USERIO_CMD_SET_PORT_TYPE(0xffffffffffffffff, &(0x7f00000000c0)={0x1, 0x84}, 0x2) [ 1570.881076][ T5476] kAFS: Bad value for 'source' 23:34:30 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_DEL(r0, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="ac0000000209010100000000fffffff000000009700002002c000100140003006ed80a0ec3677685b4c446deabbe2e8d14000400000000000000400000000000000000000c00020005000100060000000c000200050001003a00000014000100080001007f000001080002007f000001e891871d58a4030c00020005000100880000000c00040008000500f2ff001f0c000200060003000000000008000500000000150800060000000000"], 0xac}, 0x1, 0x0, 0x0, 0x40081}, 0x40000d0) [ 1570.992977][ T5558] kAFS: unparsable volume name [ 1571.021514][ T5586] kAFS: Bad value for 'source' 23:34:30 executing program 1: r0 = socket$inet(0x2, 0x2, 0x2200000088) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000000)={&(0x7f0000bfe000/0x400000)=nil, 0x400000}, &(0x7f0000000040)=0x10) sendto$inet(r0, 0x0, 0x30, 0x0, &(0x7f0000319ff0)={0x2, 0x4e20}, 0x10) socket$can_raw(0x1d, 0x3, 0x1) 23:34:30 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000000)=ANY=[@ANYBLOB='%'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) r2 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2008}, 0x1c) listen(r2, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000380)=@raw={'raw\x00', 0x3c1, 0x3, 0x2f8, 0x0, 0xd0, 0xd0, 0xd0, 0xd0, 0x228, 0x228, 0x228, 0x228, 0x228, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0xa8, 0xd0}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00', 0x0, {0xffff}}}, {{@uncond, 0x0, 0x138, 0x158, 0x0, {}, [@common=@srh1={{0x90, 'srh\x00'}, {0x0, 0x0, 0x0, 0x0, 0x0, @dev, @loopback, @local}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x358) 23:34:30 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2008}, 0x1c) listen(r1, 0x0) r2 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000000)=ANY=[@ANYBLOB='%'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1571.051666][ T5594] kAFS: unparsable volume name 23:34:30 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000000)=ANY=[@ANYBLOB='#'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) fanotify_mark(r1, 0xe0, 0x9, r3, &(0x7f00000000c0)='./file0\x00') r4 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0xfffffffffffffffb, 0x101b00) ioctl$KVM_REINJECT_CONTROL(r4, 0xae71, &(0x7f0000000080)={0x80}) 23:34:30 executing program 3: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) lsetxattr$trusted_overlay_redirect(&(0x7f0000000100)='./file1\x00', &(0x7f0000000080)='trusted.overlay.redirect\x00', &(0x7f00000000c0)='./file0\x00', 0x8, 0x5) mount(&(0x7f0000000000)=ANY=[@ANYBLOB="ac"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) fchmodat(r1, &(0x7f0000000040)='.\x00', 0x4) 23:34:30 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_DEL(r0, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="ac0000000209010100000000fffffffc00000009700002002c000100140003006ed80a0ec3677685b4c446deabbe2e8d14000400000000000000400000000000000000000c00020005000100060000000c000200050001003a00000014000100080001007f000001080002007f000001e891871d58a4030c00020005000100880000000c00040008000500f2ff001f0c000200060003000000000008000500000000150800060000000000"], 0xac}, 0x1, 0x0, 0x0, 0x40081}, 0x40000d0) [ 1571.216615][ T5611] kAFS: unparsable volume name [ 1571.231927][ T5623] kAFS: unparsable volume name [ 1571.241056][ T5609] kAFS: unparsable volume name 23:34:30 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000000)=ANY=[@ANYBLOB='%'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) r2 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2008}, 0x1c) listen(r2, 0x0) r3 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000380)=@raw={'raw\x00', 0x3c1, 0x3, 0x2f8, 0x0, 0xd0, 0xd0, 0xd0, 0xd0, 0x228, 0x228, 0x228, 0x228, 0x228, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0xa8, 0xd0}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00', 0x0, {0xffff}}}, {{@uncond, 0x0, 0x138, 0x158, 0x0, {}, [@common=@srh1={{0x90, 'srh\x00'}, {0x0, 0x0, 0x0, 0x0, 0x0, @dev, @loopback, @local}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x358) 23:34:30 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) setxattr$smack_xattr_label(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='security.SMACK64EXEC\x00', &(0x7f00000000c0)={'afs\x00'}, 0x5, 0x1) mount(&(0x7f0000000000)=ANY=[@ANYBLOB='#'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x1a4002, 0x0) 23:34:30 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sysvipc/shm\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r1, 0x40045532, &(0x7f0000000040)=0x2) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$MON_IOCH_MFLUSH(r3, 0x9208, 0x9) mmap$snddsp_control(&(0x7f0000ffd000/0x3000)=nil, 0x1000, 0x8, 0x4010, r3, 0x83000000) r4 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) socket$l2tp6(0xa, 0x2, 0x73) r5 = openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nvme-fabrics\x00', 0x24080, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r5, 0xc058534f, &(0x7f0000000240)={{0x71, 0x6}, 0x1, 0x7fffffff, 0x80000001, {0x2, 0x3f}, 0xe, 0x20}) syz_open_dev$vcsu(&(0x7f00000000c0)='/dev/vcsu#\x00', 0x7, 0x200080) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000400)={0x3f, 0xc, 0x4, 0xe000, 0x0, {0x0, 0x2710}, {0x4, 0x0, 0x8, 0x7f, 0x3, 0x40, "e8329782"}, 0x1, 0x2, @planes=&(0x7f00000001c0)={0xa7e, 0x3ff, @userptr=0x5, 0x5}, 0x480000, 0x0, r3}) getsockopt$inet6_IPV6_IPSEC_POLICY(r6, 0x29, 0x22, &(0x7f0000000300)={{{@in6=@loopback, @in=@remote}}, {{@in6=@loopback}, 0x0, @in6=@empty}}, &(0x7f0000000080)=0xe8) mount(&(0x7f00000007c0)=ANY=[@ANYBLOB="0035dba829798cf05a13a0d61321831b57e154c27fcfa58b574c6b79fca5d1b5bf2a51624e0fd771cc23daa6bfcab69d51fc85d1f3e4473f4b48c4a4579f492b7c2337f8cd08098aa7638e0765021a9a9d273ac8cbf45fa3778a0cfa2a645288b486ca718425fd9095db5cacb490dacc8b31f60d4445160b8f37bc83878e702722798fac241d96475b8c9ddf9d532482c6779f3a9d615d985ba92e4069087506a898638fcbfd776688ab8a478ead92ed14d84660d06c79d101abcc807e2c493802baa485c13f24ed0418b00e31e41e0d7ba0b4ae580a7907a59d7b6d9bf4ba2d94ccdfad5efc0a4622c932b3d15798542e16ea289fbc6522a9c15c9cc8682d3042ee134241b1378da037bed4869ee75f0b7dcf90b30dcda4a7988ee7bda8b0e5706596a96c2429fc026aa99b6bcb3693e69b428c0ea3d298432429809a3bb4329dd174e108d011f69986fde6eb3a606e3f0b9c349a3f283ddf84fcf2c9b61e175eb57d48d09b2c58477c300b26835ba96289001992048548c76e4c9926aeed1ad78dfd5e201f548a80266015599dd9d230e6f963a1596b63c3d3feead430b5edd010c87077d810cfb105603e7c36ffc3fe675196c8cb7430cec1321c1d4ab4e7570805a6d1448e2d76b43f0d48c507b19e4a3a3b97f1f3d392be0064d27b3920ab461c94918093b16ce24ec38e16c1ddab7e09f9e68329634dc6b0956bbe97afad5062e2de94ff4a12ef2fab56aad999530513531f60f67597"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1571.283068][ T5688] kAFS: unparsable volume name 23:34:30 executing program 1: r0 = socket$inet(0x2, 0x2, 0x2200000088) sendto$inet(r0, 0x0, 0x30, 0x0, &(0x7f0000319ff0)={0x2, 0x4e20}, 0x10) r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2008}, 0x1c) listen(r1, 0x0) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc058560f, &(0x7f0000000000)={0x2, 0xf, 0x4, 0x80000000, 0x8, {0x0, 0x7530}, {0x4, 0x8, 0x3, 0x1, 0x2, 0x7, "de753f5b"}, 0x10000, 0x4, @offset, 0x3, 0x0, r1}) ioctl$EVIOCGMTSLOTS(r2, 0x8040450a, &(0x7f0000000080)=""/49) 23:34:30 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_DEL(r0, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="ac00000002090101000000007fffffff00000009700002002c000100140003006ed80a0ec3677685b4c446deabbe2e8d14000400000000000000400000000000000000000c00020005000100060000000c000200050001003a00000014000100080001007f000001080002007f000001e891871d58a4030c00020005000100880000000c00040008000500f2ff001f0c000200060003000000000008000500000000150800060000000000"], 0xac}, 0x1, 0x0, 0x0, 0x40081}, 0x40000d0) [ 1571.331585][ T5718] kAFS: unparsable volume name 23:34:31 executing program 5: socketpair(0x1e, 0x5, 0x3f, &(0x7f0000000040)={0xffffffffffffffff}) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x48c, &(0x7f0000000080)={0x1, 'veth1_virt_wifi\x00', 0x2}, 0x18) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000000)=ANY=[@ANYBLOB='#'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 23:34:31 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) 23:34:31 executing program 3: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) rt_sigtimedwait(&(0x7f0000000280)={[0x9ca8]}, &(0x7f00000002c0), &(0x7f0000000340)={0x0, 0x1c9c380}, 0x8) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x400, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$NS_GET_OWNER_UID(r1, 0xb704, &(0x7f00000000c0)=0x0) r3 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) r5 = accept4$llc(0xffffffffffffffff, 0x0, &(0x7f0000000240), 0x800) r6 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r6, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2008}, 0x1c) listen(r6, 0x0) fcntl$dupfd(r5, 0x0, r6) r7 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="020000000100000000000000040001000015000008000000", @ANYRES32=r4, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=r4, @ANYBLOB="08000200", @ANYRES32=r8, @ANYBLOB="10000400000000002000020000000000"], 0x3c, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r10 = dup(r9) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r12 = dup(r11) ioctl$PERF_EVENT_IOC_ENABLE(r12, 0x8912, 0x400200) ioctl$VIDIOC_QBUF(r12, 0xc058560f, &(0x7f0000000440)={0x10001, 0x5, 0x4, 0x1, 0x20, {0x0, 0x2710}, {0x5, 0x2, 0x1, 0x61, 0x4, 0x80, "d06c98b8"}, 0x8, 0x2, @userptr=0x3, 0x4, 0x0, 0xffffffffffffffff}) fchownat(r13, &(0x7f00000004c0)='./file0\x00', r2, r4, 0x400) ioctl$sock_SIOCBRADDBR(r3, 0x89a0, &(0x7f00000001c0)='netpci0\x00') mount(&(0x7f0000000000)=ANY=[@ANYBLOB='%'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) llistxattr(&(0x7f0000000380)='./file0/file0\x00', &(0x7f00000003c0)=""/98, 0x62) [ 1571.487437][ T5728] kAFS: unparsable volume name 23:34:31 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_DEL(r0, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="ac0000000209010100000000ffffffff00000009700002002c000100140003006ed80a0ec3677685b4c446deabbe2e8d14000400000000000000400000000000000000000c00020005000100060000000c000200050001003a00000014000100080001007f000001080002007f000001e891871d58a4030c00020005000100880000000c00040008000500f2ff001f0c000200060003000000000008000500000000150800060000000000"], 0xac}, 0x1, 0x0, 0x0, 0x40081}, 0x40000d0) [ 1571.547461][ T5728] xt_TCPMSS: path-MTU clamping only supported in FORWARD, OUTPUT and POSTROUTING hooks [ 1571.577728][ T5808] kAFS: unparsable volume name 23:34:31 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000000)=ANY=[@ANYBLOB='%'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) r2 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2008}, 0x1c) listen(r2, 0x0) r3 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000380)=@raw={'raw\x00', 0x3c1, 0x3, 0x2f8, 0x0, 0xd0, 0xd0, 0xd0, 0xd0, 0x228, 0x228, 0x228, 0x228, 0x228, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0xa8, 0xd0}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00', 0x0, {0xffff}}}, {{@uncond, 0x0, 0x138, 0x158, 0x0, {}, [@common=@srh1={{0x90, 'srh\x00'}, {0x0, 0x0, 0x0, 0x0, 0x0, @dev, @loopback, @local}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x358) [ 1571.646267][ T5812] kAFS: unparsable volume name 23:34:31 executing program 1: r0 = socket$inet(0x2, 0x2, 0x2200000088) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x301802, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$IMCTRLREQ(r4, 0x80044945, &(0x7f0000000200)={0x4003, 0xc9d, 0xc000000, 0xffffffff}) sendto$inet(r0, 0x0, 0x0, 0x44094, &(0x7f0000000040)={0x2, 0x4e22, @rand_addr=0x10003}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) setsockopt$inet_tcp_TCP_QUEUE_SEQ(r6, 0x6, 0x15, &(0x7f0000000000)=0x6, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r8 = dup(r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r8, 0xc0a85352, &(0x7f0000000240)={{0xce, 0x13}, 'port0\x00', 0x20, 0x80040, 0x4, 0x9, 0x56fc, 0x5, 0x6, 0x0, 0x0, 0xff}) r9 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGRAB(r9, 0x40044590, 0x0) ioctl$EVIOCGPHYS(r9, 0x80404507, &(0x7f0000000080)=""/253) 23:34:31 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x0, 0x0, 0x4000}, 0x0) mount(&(0x7f00000000c0)=ANY=[@ANYPTR64=&(0x7f0000000080)=ANY=[@ANYPTR64=&(0x7f0000000100)=ANY=[@ANYRES32, @ANYRESHEX, @ANYRESHEX=r0, @ANYPTR64, @ANYRES16], @ANYBLOB="ddcc82443180bd71", @ANYPTR]], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x41002, 0x0) 23:34:31 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000000)=ANY=[@ANYBLOB='%'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 23:34:31 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_DEL(r0, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="ac00000002090101000200000000000000000009700002002c000100140003006ed80a0ec3677685b4c446deabbe2e8d14000400000000000000400000000000000000000c00020005000100060000000c000200050001003a00000014000100080001007f000001080002007f000001e891871d58a4030c00020005000100880000000c00040008000500f2ff001f0c000200060003000000000008000500000000150800060000000000"], 0xac}, 0x1, 0x0, 0x0, 0x40081}, 0x40000d0) [ 1571.739528][ T5847] kAFS: unparsable volume name [ 1571.773875][ T5855] kAFS: unparsable volume name [ 1571.787643][ T5855] xt_TCPMSS: path-MTU clamping only supported in FORWARD, OUTPUT and POSTROUTING hooks [ 1571.801694][ T5859] kAFS: unparsable volume name 23:34:31 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000000)=ANY=[@ANYBLOB='%'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) r2 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2008}, 0x1c) listen(r2, 0x0) r3 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000380)=@raw={'raw\x00', 0x3c1, 0x3, 0x2f8, 0x0, 0xd0, 0xd0, 0xd0, 0xd0, 0x228, 0x228, 0x228, 0x228, 0x228, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0xa8, 0xd0}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00', 0x0, {0xffff}}}, {{@uncond, 0x0, 0x138, 0x158, 0x0, {}, [@common=@srh1={{0x90, 'srh\x00'}, {0x0, 0x0, 0x0, 0x0, 0x0, @dev, @loopback, @local}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x358) 23:34:31 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="7db5afbf99b0a81d856196d32960d8e23ccbab9608dcd0c6d52674db45490f0a02e4c21983e6eabff41e292d7eeef1e050aaec24189f53f27fc841b52967e6506e8faf30fd22c23c36580000000000000401072b74f191d3f0f6b719d2271b2f345f635301dce4ce0333003230ce07cb6f3a46059d4f1976514137af258e6a9e2d3fb2b3df5e6beca04d57259c09000000000000"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) ioctl$USBDEVFS_SETCONFIGURATION(r0, 0x80045505, &(0x7f0000000040)=0x4) 23:34:31 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_DEL(r0, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="ac00000002090101000300000000000000000009700002002c000100140003006ed80a0ec3677685b4c446deabbe2e8d14000400000000000000400000000000000000000c00020005000100060000000c000200050001003a00000014000100080001007f000001080002007f000001e891871d58a4030c00020005000100880000000c00040008000500f2ff001f0c000200060003000000000008000500000000150800060000000000"], 0xac}, 0x1, 0x0, 0x0, 0x40081}, 0x40000d0) [ 1571.834034][ T5863] kAFS: unparsable volume name 23:34:31 executing program 1: r0 = socket$inet(0x2, 0x2, 0x20) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getsockopt$inet_mreqsrc(r2, 0x0, 0x28, &(0x7f0000000000)={@rand_addr, @remote, @broadcast}, &(0x7f0000000040)=0xc) mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x104) sendto$inet(r0, 0x0, 0x30, 0x0, &(0x7f0000319ff0)={0x2, 0x4e20}, 0x10) getitimer(0x1, &(0x7f00000000c0)) 23:34:31 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000000)=ANY=[@ANYBLOB='$'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1571.930946][ T5869] kAFS: unparsable volume name [ 1571.979680][ T5871] kAFS: unparsable volume name [ 1572.007195][ T5875] __nla_validate_parse: 34 callbacks suppressed [ 1572.007204][ T5875] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1572.011398][ T5871] xt_TCPMSS: path-MTU clamping only supported in FORWARD, OUTPUT and POSTROUTING hooks [ 1572.038764][ T5869] kAFS: unparsable volume name [ 1572.039107][ T5876] kAFS: unparsable volume name 23:34:31 executing program 3: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000000)=ANY=[@ANYBLOB='%'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$SNDRV_TIMER_IOCTL_STATUS64(r3, 0x80605414, &(0x7f0000000380)) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$tipc(&(0x7f0000000100)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r5, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000001c0)={0x28, r6, 0x101, 0x0, 0x0, {{}, {0x0, 0x410c}, {0x8, 0x14, 'syz0\x00'}}}, 0x28}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r8 = dup(r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r8, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, 0x0, 0x2, 0x70bd2b, 0x25dfdbff, {}, ["", "", "", "", "", "", ""]}, 0x1c}}, 0x0) sendmsg$TIPC_CMD_SHOW_LINK_STATS(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000001c0)={0x28, r6, 0x101, 0x0, 0x0, {{}, {0x0, 0x410c}, {0xc, 0x14, 'syz0\x00'}}}, 0x28}}, 0x0) sendmsg$TIPC_CMD_DISABLE_BEARER(r1, &(0x7f0000000100)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x2c, r6, 0x200, 0x70bd25, 0x25dfdbfb, {{}, {}, {0x10, 0x13, @udp='udp:syz2\x00'}}, ["", "", "", "", "", ""]}, 0x2c}, 0x1, 0x0, 0x0, 0x40091}, 0x4000000) [ 1572.051139][ T5875] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1572.064481][ T5880] kAFS: unparsable volume name 23:34:31 executing program 5: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2008}, 0x1c) listen(r0, 0x0) signalfd(r0, &(0x7f0000000000)={[0x6]}, 0x8) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="991eb79faa6f634ee6b5467653fe1be55baeb69d3dd9483c023ac4fd4d13677c2d33467597802fc558b3de5f124e5436a0016298fc21811a7977f5a6e9a2b2148f84b1f09ca8898301804ac771bf8babd40e61560076da9e883c62383efcfad2451fcbc6632060fe2fc7a9d0750aa1bc2e5a745e41bba3c02bf56882bcb465e2a6cec025282cf629f81a836b53c5cf101c3f28d86b31bd53977da078a122fec4b78baf9d"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 23:34:31 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_DEL(r0, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="ac00000002090101000400000000000000000009700002002c000100140003006ed80a0ec3677685b4c446deabbe2e8d14000400000000000000400000000000000000000c00020005000100060000000c000200050001003a00000014000100080001007f000001080002007f000001e891871d58a4030c00020005000100880000000c00040008000500f2ff001f0c000200060003000000000008000500000000150800060000000000"], 0xac}, 0x1, 0x0, 0x0, 0x40081}, 0x40000d0) [ 1572.117826][ T5957] kAFS: unparsable volume name 23:34:31 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$sock_TIOCOUTQ(r1, 0x5411, &(0x7f0000000080)) setsockopt$bt_hci_HCI_TIME_STAMP(0xffffffffffffffff, 0x0, 0x3, &(0x7f0000000000)=0x7f, 0x4) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x38, 0x2}, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x38, 0x2}, 0x0) mount(&(0x7f0000000100)=ANY=[@ANYPTR64=&(0x7f00000003c0)=ANY=[@ANYRES64=r2, @ANYRESDEC, @ANYRESDEC=0x0, @ANYRES16=r1, @ANYBLOB="6f1fa8e499ef39dd247c4bea9b2bbc91832400b641d1b2b9fb", @ANYBLOB="e4c2c74047fa9b1a7c31f0d9f8c21c854cda34fc2d8a413f6c172812deb476b028542fe558e27bbfe2ec8c7c611c83cb1bcb3bd334e0b960647b77915d6a0fb5d5ae0cfa1f06a8d22b89e9352ad2363c8b8db2f041d648efbee2c22313801843b0c118e8aac9bf65bc19593dbb13ad4b21edbff0b34e0c116590cfcb94969759cbf4762b89e657b1a103a43c899080323d0f812af6257d15fb56f4a3ebf747fc543827703a63895135cc5699893100a5d18739e8f7798539b310e15ce42c1db70367a899f7b932045d2bbd1678ee497bf9918ca40452f627d20dd73a062687a810e0c5d80e245ee4b3ceff8b3c17085ad12991dac21e8c091d", @ANYBLOB="5adc8f4c", @ANYRESHEX=r3, @ANYRES16, @ANYRES64, @ANYRES32=r1, @ANYRESOCT, @ANYRESOCT]], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x140005, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x541200, 0x2) ioctl$UI_SET_SNDBIT(r4, 0x4004556a, 0x0) [ 1572.185746][ T5957] kAFS: unparsable volume name 23:34:31 executing program 1: r0 = socket$inet(0x2, 0x2, 0x2200000088) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000319ff0)={0x2, 0x4e23}, 0xffffff18) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000000)={@in6={{0xa, 0x4e24, 0x8, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0xffffffff}}, 0x0, 0x0, 0x0, 0x0, "c252b616f465bab11845cc90e3a8d922884518d63bdd26685f29a0950af2483eb26c6616b3ca9f1be0644da7c5273507cbe07d32d63b65b851e1a7acd77dae5b939319a9ee407c40018167b209f74d04"}, 0xd8) r2 = socket$inet6(0xa, 0x6, 0x0) r3 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2008}, 0x1c) listen(r3, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2008}, 0x1c) listen(r2, 0x0) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(r2, 0x8982, &(0x7f0000000140)={0x8, 'netpci0\x00', {'tunl0\x00'}, 0xc9cc}) 23:34:31 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000000)=ANY=[@ANYBLOB='%'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) r2 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2008}, 0x1c) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000380)=@raw={'raw\x00', 0x3c1, 0x3, 0x2f8, 0x0, 0xd0, 0xd0, 0xd0, 0xd0, 0x228, 0x228, 0x228, 0x228, 0x228, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0xa8, 0xd0}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00', 0x0, {0xffff}}}, {{@uncond, 0x0, 0x138, 0x158, 0x0, {}, [@common=@srh1={{0x90, 'srh\x00'}, {0x0, 0x0, 0x0, 0x0, 0x0, @dev, @loopback, @local}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x358) [ 1572.216750][ T5990] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.0'. 23:34:31 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000000)=ANY=[@ANYBLOB='%'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00') sendmsg$NL80211_CMD_SET_WIPHY(r1, &(0x7f00000001c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x40, r2, 0x100, 0x70bd2a, 0x25dfdbfe, {}, [@NL80211_ATTR_TXQ_LIMIT={0x8, 0x10a, 0x1}, @NL80211_ATTR_WIPHY_RETRY_LONG={0x5, 0x3e, 0xa}, @NL80211_ATTR_WIPHY_TX_POWER_LEVEL={0x8, 0x62, 0x5}, @NL80211_ATTR_WIPHY_NAME={0x1c, 0x2, 'veth0\x00'}]}, 0x40}, 0x1, 0x0, 0x0, 0x800}, 0x800) [ 1572.273264][ T5993] kAFS: unparsable volume name [ 1572.278410][ T5990] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. 23:34:31 executing program 3: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$cgroup_ro(r1, &(0x7f0000000000)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(r2, 0xc0a85322, &(0x7f0000000240)) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x700, 0x0) connect$llc(r3, &(0x7f0000000080)={0x1a, 0x303, 0x3f, 0x4, 0x3f, 0x5, @dev={[], 0x2c}}, 0x10) 23:34:31 executing program 5: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(&(0x7f0000000000)=ANY=[@ANYBLOB], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 23:34:31 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_DEL(r0, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="ac00000002090101000500000000000000000009700002002c000100140003006ed80a0ec3677685b4c446deabbe2e8d14000400000000000000400000000000000000000c00020005000100060000000c000200050001003a00000014000100080001007f000001080002007f000001e891871d58a4030c00020005000100880000000c00040008000500f2ff001f0c000200060003000000000008000500000000150800060000000000"], 0xac}, 0x1, 0x0, 0x0, 0x40081}, 0x40000d0) [ 1572.416117][ T6062] kAFS: unparsable volume name [ 1572.418887][ T6047] kAFS: unparsable volume name [ 1572.437402][ T6082] kAFS: unparsable volume name [ 1572.454248][ T6047] xt_TCPMSS: path-MTU clamping only supported in FORWARD, OUTPUT and POSTROUTING hooks [ 1572.454301][ T6098] kAFS: unparsable volume name [ 1572.475562][ T6091] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1572.488620][ T6094] kAFS: Bad value for 'source' [ 1572.494938][ T6109] kAFS: unparsable volume name 23:34:32 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000000)=ANY=[@ANYBLOB='%'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) r2 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2008}, 0x1c) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000380)=@raw={'raw\x00', 0x3c1, 0x3, 0x2f8, 0x0, 0xd0, 0xd0, 0xd0, 0xd0, 0x228, 0x228, 0x228, 0x228, 0x228, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0xa8, 0xd0}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00', 0x0, {0xffff}}}, {{@uncond, 0x0, 0x138, 0x158, 0x0, {}, [@common=@srh1={{0x90, 'srh\x00'}, {0x0, 0x0, 0x0, 0x0, 0x0, @dev, @loopback, @local}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x358) 23:34:32 executing program 1: socket$inet(0x2, 0x2, 0x2200000088) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x2, 0x6be2835d2d4643ed) sendto$inet(r2, 0x0, 0x0, 0x24040000, &(0x7f0000000000)={0x2, 0x4e20, @empty}, 0x10) 23:34:32 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(&(0x7f0000000000)=ANY=[@ANYBLOB='%'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 23:34:32 executing program 3: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000000)=ANY=[@ANYBLOB='%'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000040)={0x2, 'bridge0\x00', {}, 0x3ff}) [ 1572.515705][ T6091] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. 23:34:32 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000000)=ANY=[@ANYBLOB='#'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = geteuid() r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r4) lstat(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_rdma(&(0x7f0000000240)='127.0.0.1\x00', &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1000000, &(0x7f00000003c0)={'trans=rdma,', {'port', 0x3d, 0x4e21}, 0x2c, {[{@common=@nodevmap='nodevmap'}, {@timeout={'timeout', 0x3d, 0x42}}, {@sq={'sq', 0x3d, 0xffff}}, {@sq={'sq', 0x3d, 0x8001}}, {@common=@posixacl='posixacl'}], [{@func={'func', 0x3d, 'POLICY_CHECK'}}, {@seclabel='seclabel'}, {@fowner_lt={'fowner<', r2}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '[]'}}, {@smackfshat={'smackfshat', 0x3d, 'md5sumnodevwlan0ppp0)'}}, {@uid_gt={'uid>', r4}}, {@audit='audit'}, {@uid_eq={'uid', 0x3d, r5}}]}}) ioctl$VIDIOC_PREPARE_BUF(r1, 0xc058565d, &(0x7f0000000040)={0x8, 0x4, 0x4, 0x1000000, 0x7, {}, {0x4, 0x8, 0x81, 0x0, 0x89, 0x6e, "410dbd52"}, 0xff, 0x4, @userptr, 0x5, 0x0, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r8 = dup(r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) write$RDMA_USER_CM_CMD_CREATE_ID(r8, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x1a0, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r6, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r9, 0x80000000}}, 0x10) [ 1572.634924][ T6122] kAFS: unparsable volume name [ 1572.656883][ T6125] kAFS: unparsable volume name [ 1572.672014][ T6122] xt_TCPMSS: path-MTU clamping only supported in FORWARD, OUTPUT and POSTROUTING hooks [ 1572.689765][ T6128] kAFS: unparsable volume name [ 1572.696877][ T6130] kAFS: unparsable volume name 23:34:32 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000000)=ANY=[@ANYBLOB='%'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) socket$inet6(0xa, 0x6, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000380)=@raw={'raw\x00', 0x3c1, 0x3, 0x2f8, 0x0, 0xd0, 0xd0, 0xd0, 0xd0, 0x228, 0x228, 0x228, 0x228, 0x228, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0xa8, 0xd0}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00', 0x0, {0xffff}}}, {{@uncond, 0x0, 0x138, 0x158, 0x0, {}, [@common=@srh1={{0x90, 'srh\x00'}, {0x0, 0x0, 0x0, 0x0, 0x0, @dev, @loopback, @local}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x358) 23:34:32 executing program 1: r0 = socket$inet(0x2, 0x2, 0x2200000088) sendto$inet(r0, 0x0, 0x0, 0x840, &(0x7f0000319ff0)={0x2, 0x4e20, @broadcast}, 0x10) 23:34:32 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_DEL(r0, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="ac00000002090101000600000000000000000009700002002c000100140003006ed80a0ec3677685b4c446deabbe2e8d14000400000000000000400000000000000000000c00020005000100060000000c000200050001003a00000014000100080001007f000001080002007f000001e891871d58a4030c00020005000100880000000c00040008000500f2ff001f0c000200060003000000000008000500000000150800060000000000"], 0xac}, 0x1, 0x0, 0x0, 0x40081}, 0x40000d0) [ 1572.708824][ T6132] kAFS: unparsable volume name [ 1572.718992][ T6130] kAFS: unparsable volume name 23:34:32 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) accept4$rose(r1, &(0x7f0000000100)=@full={0xb, @dev, @rose, 0x0, [@default, @bcast, @netrom, @netrom, @null, @null]}, &(0x7f0000000080)=0xfffffffffffffeb1, 0x80800) r2 = openat$ttynull(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ttynull\x00', 0x400, 0x0) ioctl$FS_IOC_MEASURE_VERITY(r2, 0xc0046686, &(0x7f0000000240)={0x1, 0x5b, "e196d3b6337f6dcfd7bbb215ea79d283083d9e48a05fde84cb0c195608e925ad901128a1fe35580e7ceea8a18c1d0185cb75002f46158ed574819df93a5a0ed30c0715944c9eaa47f7d41eee4d126efb2db2fa23364218eee8dba3"}) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0xa, 0x2, 0x0) setsockopt$inet_int(r4, 0x0, 0x8, &(0x7f0000000040)=0xd3, 0x4) getsockopt$inet_pktinfo(r4, 0x0, 0x8, &(0x7f0000000140)={0x0, @rand_addr, @initdev}, &(0x7f0000000180)=0xc) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000440)=@newlink={0x68, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x21025}, [@IFLA_LINKINFO={0x34, 0x12, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x24, 0x2, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_FLAGS={0xc}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x9, 0xa}}]}}}, @IFLA_ADDRESS={0xa, 0x5, @empty=[0x14]}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x68}}, 0x0) r6 = socket$netlink(0x10, 0x3, 0x4) ioctl$ifreq_SIOCGIFINDEX_team(r6, 0x8933, &(0x7f0000000040)={'team0\x00', r5}) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000000)=ANY=[@ANYBLOB='#'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) prctl$PR_SET_TSC(0x1a, 0x0) [ 1572.762128][ T6135] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.0'. 23:34:32 executing program 2: socketpair$unix(0x1, 0x6, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2008}, 0x1c) listen(r2, 0x0) r3 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000000)=ANY=[@ANYBLOB='%'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) write$cgroup_type(r0, &(0x7f0000000080)='threaded\x00', 0x9) lsetxattr$security_smack_transmute(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='security.SMACK64TRANSMUTE\x00', &(0x7f00000001c0)='TRUE', 0x4, 0x1) [ 1572.803726][ T6140] kAFS: unparsable volume name [ 1572.811375][ T6135] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. 23:34:32 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000000)=ANY=[@ANYBLOB='%'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) socket$inet6(0xa, 0x6, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000380)=@raw={'raw\x00', 0x3c1, 0x3, 0x2f8, 0x0, 0xd0, 0xd0, 0xd0, 0xd0, 0x228, 0x228, 0x228, 0x228, 0x228, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0xa8, 0xd0}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00', 0x0, {0xffff}}}, {{@uncond, 0x0, 0x138, 0x158, 0x0, {}, [@common=@srh1={{0x90, 'srh\x00'}, {0x0, 0x0, 0x0, 0x0, 0x0, @dev, @loopback, @local}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x358) 23:34:32 executing program 3: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000a40)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) recvmsg$can_j1939(r1, &(0x7f0000000a00)={&(0x7f0000000240)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, 0x80, &(0x7f0000000940)=[{&(0x7f00000002c0)=""/255, 0xff}, {&(0x7f00000003c0)=""/69, 0x45}, {&(0x7f0000000440)=""/237, 0xed}, {&(0x7f0000000540)=""/156, 0x9c}, {&(0x7f0000000600)=""/251, 0xfb}, {&(0x7f0000000040)=""/27, 0x1b}, {&(0x7f0000000700)=""/177, 0xb1}, {&(0x7f00000007c0)=""/132, 0x84}, {&(0x7f0000000880)=""/158, 0x9e}], 0x9, &(0x7f00000001c0)=""/43, 0x2b}, 0x40010000) r2 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2008}, 0x1c) listen(r2, 0x0) connect(r2, &(0x7f0000000e80)=@sco={0x1f, @none}, 0x80) chroot(&(0x7f0000000080)='./file1\x00') mount(&(0x7f00000000c0)=ANY=[@ANYBLOB="ec4612b7acf8f6001ea6008d4a54a112942bc3f294375dac211c36ed865ef9bbe7a7fce022bf64d8f859016d99b515e4000000000000005b359b5d168e3b682cd3a499d19774e500000000000000"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = socket$inet_sctp(0x2, 0x5, 0x84) r8 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r8, 0x84, 0x14, &(0x7f0000000080)=@assoc_value={0x0}, &(0x7f0000000040)=0x160) setsockopt$inet_sctp_SCTP_DELAYED_SACK(r7, 0x84, 0x10, &(0x7f00000000c0)=@assoc_value={r9}, 0x8) prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r6, 0x84, 0xf, &(0x7f0000000a80)={r9, @in={{0x2, 0x4e23, @multicast1}}, 0x40, 0x6, 0x76, 0x3, 0x10ffc614}, &(0x7f0000000b40)=0x98) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r4, 0x84, 0x1b, &(0x7f0000000b80)={r10, 0xcb, "1d7dcb73c9c0f487f8acb522bde8b30787c5cfa0239a4ae0adcddadd812d0f8699553951873cc0065a62d41b94dfb7ac5d2673231103e5f0e58a34ac68137a0ef133e38dda2c509257c54b09e9c71ae6424f4e504bb65b3f46ad1bc1d1981d7645dc276113480de6fe1db8d16396c55b5eadbc1e87852a1f1d66a6b08df687bcd05071a7ff070e89f32fba7200596e5fd07ea60b1a39435db34cbce815700c4b9ddd48946ea9e7b08b2a07edca3eb09578991e06cc9466e23097e3cc4b886b2832565d00942a206ed6adfd"}, &(0x7f0000000c80)=0xd3) pipe(&(0x7f0000000cc0)={0xffffffffffffffff}) r12 = syz_genetlink_get_family_id$tipc(&(0x7f0000000d40)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_PRI(r11, &(0x7f0000000e40)={&(0x7f0000000d00)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000e00)={&(0x7f0000000d80)={0x68, r12, 0x2, 0x70bd2a, 0x25dfdbff, {{}, {}, {0x4c, 0x18, {0x20, @link='broadcast-link\x00'}}}, ["", "", "", "", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x40010}, 0x4045) open$dir(&(0x7f0000000000)='./file1\x00', 0x3c1ac3, 0x0) 23:34:32 executing program 1: openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/current\x00', 0x2, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x30, 0x0, &(0x7f0000319ff0)={0x2, 0x4e20}, 0x10) 23:34:32 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_DEL(r0, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="ac00000002090101000700000000000000000009700002002c000100140003006ed80a0ec3677685b4c446deabbe2e8d14000400000000000000400000000000000000000c00020005000100060000000c000200050001003a00000014000100080001007f000001080002007f000001e891871d58a4030c00020005000100880000000c00040008000500f2ff001f0c000200060003000000000008000500000000150800060000000000"], 0xac}, 0x1, 0x0, 0x0, 0x40081}, 0x40000d0) [ 1572.965872][ T6155] kAFS: unparsable volume name [ 1572.977369][ T6152] kAFS: unparsable volume name [ 1573.003373][ T6157] kAFS: unparsable volume name 23:34:32 executing program 2: r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000000)=ANY=[@ANYBLOB='%'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 23:34:32 executing program 1: r0 = socket$inet(0x2, 0x2, 0x2200000088) sendto$inet(r0, 0x0, 0x30, 0x0, &(0x7f0000319ff0)={0x2, 0x4e20}, 0x10) signalfd4(r0, &(0x7f0000000000)={[0x400]}, 0x8, 0x80000) r1 = semget$private(0x0, 0x4, 0x0) semop(r1, &(0x7f0000000040)=[{0x0, 0xffffffff}], 0x1) semctl$IPC_RMID(r1, 0x0, 0x0) semctl$GETPID(r1, 0x3, 0xb, &(0x7f0000000040)=""/237) r2 = syz_open_dev$audion(&(0x7f0000000480)='/dev/audio#\x00', 0xc5c, 0x24c80) sendto$inet(r2, &(0x7f0000000380)="1ed64c60833b0477dc1c26f57efd203f09630bc2e8446a353d6a1745804dc180c71dbd8c48f20b49465381d822dbd24f810ca541bcc6a261841d9191df9628b283a982d5814d0dd36a17b8bac7f79a9ae8c754fe015b9b4bd63c438c16d5d6d8eca25b4dc00230b2bf5a50d2d0c9cc1bd666f1bbda66623cb7b2acf3b2434d2db29a06d4a2bcf5fa3342ae51b5a6005675ef14b9c3dbc20d8dac70", 0x9b, 0x20010810, &(0x7f00000002c0)={0x2, 0x4e22, @loopback}, 0x10) socket$caif_seqpacket(0x25, 0x5, 0x2) r3 = socket$inet(0x2c, 0x3, 0x0) sendto$inet(r3, 0x0, 0x0, 0x0, 0x0, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETTABLE(r4, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)={0x20, 0x1, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, 0x20}}, 0x0) sendmsg$NFULNL_MSG_CONFIG(r4, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x810004}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x1c, 0x1, 0x4, 0x201, 0x0, 0x0, {0x0, 0x0, 0x6}, [@NFULA_CFG_TIMEOUT={0x8, 0x4, 0x1, 0x0, 0x101}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40000}, 0x800) [ 1573.029695][ T6161] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1573.030747][ T6162] kAFS: unparsable volume name [ 1573.050177][ T6161] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1573.069843][ T6163] kAFS: unparsable volume name 23:34:32 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_DEL(r0, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="ac00000002090101000800000000000000000009700002002c000100140003006ed80a0ec3677685b4c446deabbe2e8d14000400000000000000400000000000000000000c00020005000100060000000c000200050001003a00000014000100080001007f000001080002007f000001e891871d58a4030c00020005000100880000000c00040008000500f2ff001f0c000200060003000000000008000500000000150800060000000000"], 0xac}, 0x1, 0x0, 0x0, 0x40081}, 0x40000d0) [ 1573.113312][ T6150] sctp: [Deprecated]: syz-executor.3 (pid 6150) Use of struct sctp_assoc_value in delayed_ack socket option. [ 1573.113312][ T6150] Use struct sctp_sack_info instead [ 1573.128652][ T6170] kAFS: unparsable volume name 23:34:32 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000000)=ANY=[@ANYBLOB='%'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) socket$inet6(0xa, 0x6, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000380)=@raw={'raw\x00', 0x3c1, 0x3, 0x2f8, 0x0, 0xd0, 0xd0, 0xd0, 0xd0, 0x228, 0x228, 0x228, 0x228, 0x228, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0xa8, 0xd0}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00', 0x0, {0xffff}}}, {{@uncond, 0x0, 0x138, 0x158, 0x0, {}, [@common=@srh1={{0x90, 'srh\x00'}, {0x0, 0x0, 0x0, 0x0, 0x0, @dev, @loopback, @local}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x358) [ 1573.166772][ T6194] kAFS: unparsable volume name 23:34:32 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_DEL(r0, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="ac00000002090101000900000000000000000009700002002c000100140003006ed80a0ec3677685b4c446deabbe2e8d14000400000000000000400000000000000000000c00020005000100060000000c000200050001003a00000014000100080001007f000001080002007f000001e891871d58a4030c00020005000100880000000c00040008000500f2ff001f0c000200060003000000000008000500000000150800060000000000"], 0xac}, 0x1, 0x0, 0x0, 0x40081}, 0x40000d0) 23:34:32 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) rename(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='\x00') r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000000)=ANY=[@ANYBLOB='%'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 23:34:32 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000000)=ANY=[@ANYBLOB='#'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) truncate(&(0x7f0000000040)='./file0\x00', 0x8) 23:34:32 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) write$FUSE_IOCTL(r3, &(0x7f0000000080)={0x20, 0xfffffffffffffffe, 0x2, {0x5, 0x4, 0x1}}, 0x20) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$KVM_GET_DEBUGREGS(r5, 0x8080aea1, &(0x7f0000000000)) sendto$inet(r1, 0x0, 0x0, 0x0, &(0x7f0000319ff0)={0x2, 0x4e23}, 0x10) 23:34:32 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000000)=ANY=[@ANYBLOB='%'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2008}, 0x1c) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000380)=@raw={'raw\x00', 0x3c1, 0x3, 0x2f8, 0x0, 0xd0, 0xd0, 0xd0, 0xd0, 0x228, 0x228, 0x228, 0x228, 0x228, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0xa8, 0xd0}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00', 0x0, {0xffff}}}, {{@uncond, 0x0, 0x138, 0x158, 0x0, {}, [@common=@srh1={{0x90, 'srh\x00'}, {0x0, 0x0, 0x0, 0x0, 0x0, @dev, @loopback, @local}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x358) [ 1573.313831][ T6279] kAFS: unparsable volume name [ 1573.343960][ T6282] kAFS: unparsable volume name [ 1573.440889][ T6329] kAFS: unparsable volume name [ 1573.472414][ T6329] kAFS: unparsable volume name [ 1573.505340][ T6381] kAFS: unparsable volume name 23:34:33 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2008}, 0x1c) listen(r2, 0x0) getsockopt$inet6_tcp_buf(r2, 0x6, 0x21, &(0x7f0000000080)=""/107, &(0x7f0000000100)=0x6b) ioctl$SIOCPNDELRESOURCE(r1, 0x89ef, &(0x7f0000000040)=0x5) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000000)=ANY=[@ANYBLOB='%'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 23:34:33 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_DEL(r0, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="ac00000002090101000a00000000000000000009700002002c000100140003006ed80a0ec3677685b4c446deabbe2e8d14000400000000000000400000000000000000000c00020005000100060000000c000200050001003a00000014000100080001007f000001080002007f000001e891871d58a4030c00020005000100880000000c00040008000500f2ff001f0c000200060003000000000008000500000000150800060000000000"], 0xac}, 0x1, 0x0, 0x0, 0x40081}, 0x40000d0) 23:34:33 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) fchmodat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x14) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0xb3) ioctl$VIDIOC_DQBUF(0xffffffffffffffff, 0xc0585611, &(0x7f0000000180)={0x6, 0x8, 0x4, 0x100, 0x4, {}, {0x5, 0x8, 0x2, 0x8, 0x3f, 0x8, "b380e9fa"}, 0x3f, 0x2, @userptr=0x4, 0x6, 0x0, 0xffffffffffffffff}) accept4$bt_l2cap(r1, &(0x7f0000000100), &(0x7f0000000240)=0xe, 0x80800) r2 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000280)='/dev/nvram\x00', 0x41, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r1, 0xc0086420, &(0x7f00000002c0)={0x0}) r4 = syz_open_dev$mice(&(0x7f0000000340)='/dev/input/mice\x00', 0x0, 0x40400) setsockopt$bt_BT_CHANNEL_POLICY(r4, 0x112, 0xa, &(0x7f0000000380)=0x10000, 0x4) ioctl$DRM_IOCTL_UNLOCK(r2, 0x4008642b, &(0x7f0000000300)={r3, 0x39}) ioctl$EXT4_IOC_MIGRATE(r0, 0x6609) mount(&(0x7f0000000000)=ANY=[@ANYBLOB='#'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x210408, 0x0) 23:34:33 executing program 1: sendmsg$NLBL_MGMT_C_PROTOCOLS(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x68, 0x0, 0x10, 0x70bd25, 0x25dfdbfb, {}, [@NLBL_MGMT_A_CV4DOI={0x8}, @NLBL_MGMT_A_CV4DOI={0x8, 0x4, 0x1}, @NLBL_MGMT_A_CLPDOI={0x8, 0xc, 0x1}, @NLBL_MGMT_A_IPV4ADDR={0x8, 0x7, @remote}, @NLBL_MGMT_A_IPV6MASK={0x14, 0x6, @mcast1}, @NLBL_MGMT_A_DOMAIN={0x16, 0x1, '/proc/thread-self\x00'}, @NLBL_MGMT_A_PROTOCOL={0x8, 0x2, 0x3}]}, 0x68}, 0x1, 0x0, 0x0, 0x884}, 0x40890) r0 = socket$inet(0x2, 0x80000, 0x98) sendto$inet(r0, 0x0, 0x0, 0x64040048, &(0x7f0000000080)={0x2, 0x4e23, @empty}, 0x10) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000040)=0x83d, 0x4) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self\x00', 0x900, 0x0) 23:34:33 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000000)=ANY=[@ANYBLOB='%'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2008}, 0x1c) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000380)=@raw={'raw\x00', 0x3c1, 0x3, 0x2f8, 0x0, 0xd0, 0xd0, 0xd0, 0xd0, 0x228, 0x228, 0x228, 0x228, 0x228, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0xa8, 0xd0}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00', 0x0, {0xffff}}}, {{@uncond, 0x0, 0x138, 0x158, 0x0, {}, [@common=@srh1={{0x90, 'srh\x00'}, {0x0, 0x0, 0x0, 0x0, 0x0, @dev, @loopback, @local}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x358) [ 1573.728059][ T6163] kAFS: unparsable volume name [ 1573.733886][ T6160] sctp: [Deprecated]: syz-executor.3 (pid 6160) Use of struct sctp_assoc_value in delayed_ack socket option. [ 1573.733886][ T6160] Use struct sctp_sack_info instead [ 1573.804844][ T6404] kAFS: unparsable volume name 23:34:33 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff}) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') sendmsg$TIPC_NL_MON_PEER_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000009c0)={0x14, r2, 0x701, 0x0, 0x0, {0xd, 0x0, 0x1a0ffffffff}}, 0x14}}, 0x0) sendmsg$TIPC_NL_BEARER_ADD(r0, &(0x7f0000000300)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x200004}, 0xc, &(0x7f00000002c0)={&(0x7f00000001c0)={0xe4, r2, 0x200, 0x70bd29, 0x25dfdbfb, {}, [@TIPC_NLA_BEARER={0xa4, 0x1, [@TIPC_NLA_BEARER_PROP={0x54, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xb}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4749}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xb}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x9}, @TIPC_NLA_PROP_TOL={0x8}]}, @TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e24, @multicast1}}, {0x14, 0x2, @in={0x2, 0x4e20, @broadcast}}}}]}, @TIPC_NLA_NODE={0xc, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_LINK={0x20, 0x4, [@TIPC_NLA_LINK_PROP={0x1c, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x36}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1f}]}]}]}, 0xe4}, 0x1, 0x0, 0x0, 0x4000}, 0x20000010) syz_open_dev$cec(&(0x7f0000000080)='/dev/cec#\x00', 0x3, 0x2) mount(&(0x7f0000000000)=ANY=[@ANYBLOB='\x00'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 23:34:33 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000000)=ANY=[@ANYBLOB='%'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2008}, 0x1c) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000380)=@raw={'raw\x00', 0x3c1, 0x3, 0x2f8, 0x0, 0xd0, 0xd0, 0xd0, 0xd0, 0x228, 0x228, 0x228, 0x228, 0x228, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0xa8, 0xd0}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00', 0x0, {0xffff}}}, {{@uncond, 0x0, 0x138, 0x158, 0x0, {}, [@common=@srh1={{0x90, 'srh\x00'}, {0x0, 0x0, 0x0, 0x0, 0x0, @dev, @loopback, @local}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x358) [ 1573.826682][ T6406] validate_nla: 76 callbacks suppressed [ 1573.826690][ T6406] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 1573.848631][ T6407] kAFS: unparsable volume name [ 1573.856243][ T6409] kAFS: unparsable volume name [ 1573.874939][ T6413] kAFS: Bad value for 'source' [ 1573.887180][ T6406] netlink: 'syz-executor.0': attribute type 2 has an invalid length. [ 1573.923975][ T6404] kAFS: unparsable volume name [ 1573.929111][ T6406] netlink: 'syz-executor.0': attribute type 2 has an invalid length. [ 1573.960731][ T6406] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 23:34:33 executing program 3: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000000)=ANY=[@ANYBLOB='%'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2008}, 0x1c) listen(r0, 0x0) r1 = dup(r0) ioctl$KVM_GET_NESTED_STATE(r1, 0xc080aebe, &(0x7f0000000240)={{0x0, 0x0, 0x80}}) 23:34:33 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2008}, 0x1c) listen(r0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$IMGETVERSION(r2, 0x80044942, &(0x7f00000001c0)) setsockopt$inet6_dccp_buf(r0, 0x21, 0xc, &(0x7f0000000040)="38c49954e986b0b339eae95e45427716b546f98945ef9455b50d49bbd0c4064b547d54f36f01db179fc7966c0968ed5f065822c37c793662416f01c544d5c7b2039da15b9f9a5a29cbb147ec3efa770a0856c0e25ae2b8aa21c85194dbb395476d131a01b09f738784b8843ca820d97a9b6d2c669b6a23e87905631fce9e5e25ba106fce12849d388508f8aa0877c9601ffb1b213d3a8ce0af39d2115032db052e5fcc80158314afa20040e47b561a7e77163a5d3ed0eab9e914827b2f4315d3258d8f85d6dd4d174aacea17978668ad0e184ddf6433a260f3b2904218e2ed1f5e38791da6ae92204ec1b94f21c3172a48b84cdead", 0xf5) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) connect$can_bcm(r2, &(0x7f0000000240), 0x10) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000000)=ANY=[@ANYBLOB='%'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1573.986955][ T6503] kAFS: unparsable volume name 23:34:33 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) r2 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2008}, 0x1c) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000380)=@raw={'raw\x00', 0x3c1, 0x3, 0x2f8, 0x0, 0xd0, 0xd0, 0xd0, 0xd0, 0x228, 0x228, 0x228, 0x228, 0x228, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0xa8, 0xd0}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00', 0x0, {0xffff}}}, {{@uncond, 0x0, 0x138, 0x158, 0x0, {}, [@common=@srh1={{0x90, 'srh\x00'}, {0x0, 0x0, 0x0, 0x0, 0x0, @dev, @loopback, @local}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x358) 23:34:33 executing program 5: fstat(0xffffffffffffffff, &(0x7f0000000080)) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000100)=ANY=[@ANYRESDEC], &(0x7f0000000040)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$KDDELIO(r1, 0x4b35, 0x5) [ 1574.142874][ T6529] kAFS: unparsable volume name [ 1574.171072][ T6526] kAFS: unparsable volume name 23:34:33 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_DEL(r0, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="ac00000002090101000b00000000000000000009700002002c000100140003006ed80a0ec3677685b4c446deabbe2e8d14000400000000000000400000000000000000000c00020005000100060000000c000200050001003a00000014000100080001007f000001080002007f000001e891871d58a4030c00020005000100880000000c00040008000500f2ff001f0c000200060003000000000008000500000000150800060000000000"], 0xac}, 0x1, 0x0, 0x0, 0x40081}, 0x40000d0) 23:34:33 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) r2 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2008}, 0x1c) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000380)=@raw={'raw\x00', 0x3c1, 0x3, 0x2f8, 0x0, 0xd0, 0xd0, 0xd0, 0xd0, 0x228, 0x228, 0x228, 0x228, 0x228, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0xa8, 0xd0}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00', 0x0, {0xffff}}}, {{@uncond, 0x0, 0x138, 0x158, 0x0, {}, [@common=@srh1={{0x90, 'srh\x00'}, {0x0, 0x0, 0x0, 0x0, 0x0, @dev, @loopback, @local}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x358) [ 1574.191604][ T6529] kAFS: unparsable volume name [ 1574.194529][ T6534] kAFS: unparsable volume name 23:34:33 executing program 1: r0 = socket$inet(0x2, 0x2, 0x2200000088) ioctl$BLKPG(0xffffffffffffffff, 0x1269, &(0x7f0000000080)={0x7, 0x0, 0x84, &(0x7f0000000340)="cad0211ce59d4276d8c730a712373d18e43c6b4b7f793b4bca9c4484064c8cca34a2600289d54f3d86bc6c147ce5bee8a6a393ea59c3ae6d63951eab1aac48c86bf7f81d2a0379c080c1815a6af27ed92c2b995cb128a701a06392b5818c52491fcd42ef410e6e9e330575798797c4c9c42e00d40c8cbebefc35069eee6714da7d0190d7"}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000300)='/dev/null\x00', 0x0, 0x0) r3 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2008}, 0x1c) listen(r3, 0x0) r4 = socket$inet6(0xa, 0x4, 0x0) bind$inet6(r4, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2008}, 0x1c) r5 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r5, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2008}, 0x1c) listen(r5, 0x0) io_uring_register$IORING_REGISTER_FILES(r2, 0x2, &(0x7f00000002c0)=[r3, r4, r5], 0x3) r6 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/autofs\x00', 0x4000, 0x0) write$UHID_SET_REPORT_REPLY(r7, &(0x7f00000005c0)=ANY=[@ANYBLOB="0e00000008000000fa08af0050b5df7e475f4c8738b5a394da286a703f9a200634aae5915ee0c99a2a9a42758f92443a23f4d1644ee0bec8b126e864bd1de1eeb17a187ac97850a0b7ea962278c57f7285caa55a916989f872fc0e4291899339adf3f91eea9ee5a1014a6dda6b05c826bc02c71e828d14273117616a50c65488e40877de5fee90b1bfd25f1c04e9b86df2a906c542d87b1874da12d49c7997362d14664636f6bee0af0d9e18602209909733f5bfc24ec50513192680ca2637e048dbfdb6826db13913c5027b83fc0014d5b182ac623fa8531438afea81e15fde1b1a9c26412d672a1ead56761e62f5debeafe40db597697261d7a80cef3a50c5ddb6c4043cf859d6417cb5292539eb63ce882111e60086f7fc9f6bd443aad5e33882cab7d255277bf4f7cc7165eab8ee138215146a37dbadeda6c2e7137605ed4cbbb74ee6c5c608863cc475736cf39f26bf350300befccf4abb55ab225b3f087712afe0e1a5f1000000000000000000000000e8662617a8cd19236d57debab250cce2b9ab4268f2784891d8744c526b6aaae916bc3ba7740733a78ee37907b4f052ff686cf015d17a2a16884894f69bb87d96d8cfe9d99431889b6d0c79d10ef87f84b25ff78c2666c23ddb3913352539f76180a34602f983a6ac0257cb393ce213b90420af9e8d157c091210e3b362d14d9c304c5ddf4a6425a084c4be93ed66784670e5784c6d3fea5a519a300b15d6daa999ac8bb3a028dd11e4fe95119023b28784c0a554bd819c00"], 0xbb) r8 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r8, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2008}, 0x1c) listen(r8, 0x0) r9 = dup3(r8, r2, 0x0) ioctl$VFIO_GET_API_VERSION(r9, 0x3b64) r10 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000580)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r10, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000140)={0xffffffffffffffff}, 0x2}}, 0x20) r12 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r12, &(0x7f0000000080)={0x12, 0x10, 0xfa00, {&(0x7f00000000c0), r11, r10}}, 0x18) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r9, &(0x7f0000000400)={0x10, 0x30, 0xfa00, {&(0x7f0000000280), 0x3, {0xa, 0x4e23, 0x20, @rand_addr="3fd73deaacd8270702345122ae41b8d6", 0x1}, r11}}, 0x38) getsockopt$llc_int(r6, 0x10c, 0xc, &(0x7f00000000c0), &(0x7f0000000100)=0x4) ioctl$sock_SIOCGIFVLAN_SET_VLAN_FLAG_CMD(r7, 0x8982, &(0x7f0000000040)={0x7, 'macsec0\x00', {0xa05b}, 0xf6}) sendto$inet(r0, 0x0, 0x30, 0x0, &(0x7f0000319ff0)={0x2, 0x4e20}, 0x10) [ 1574.237364][ T6540] kAFS: unparsable volume name 23:34:33 executing program 3: ioctl$TIOCVHANGUP(0xffffffffffffffff, 0x5437, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2008}, 0x1c) listen(r2, 0x0) connect$x25(0xffffffffffffffff, &(0x7f0000000440)={0x9, @null=' \x00'}, 0x12) r3 = socket$l2tp(0x2, 0x2, 0x73) setsockopt(r3, 0x7ff, 0x45, &(0x7f00000003c0)="f633df4b30685f7f72af52657aa53527579c8e871a042484d6edb4accdbca72d3849bb7844d735c01f431bd60b5c318cc0e888f3826dfd391624f29366e77bab048efce64ec49dce149384c1981aaaab759dafb25c03ce49d6c31f6795", 0x5d) ioctl$VIDIOC_PREPARE_BUF(r1, 0xc058565d, &(0x7f0000000080)={0x2e6, 0x1, 0x4, 0x0, 0x3ff, {}, {0x4, 0x6, 0xa2, 0x38, 0x0, 0x3f, "0d3b8512"}, 0x6, 0x2, @planes=&(0x7f0000000040)={0x7fffffff, 0x5, @fd, 0x4}, 0xb0, 0x0, r2}) ioctl$EVIOCGKEYCODE_V2(r1, 0x80284504, &(0x7f00000002c0)=""/69) getpeername$unix(r4, &(0x7f0000000240), &(0x7f0000000100)=0x6e) r5 = accept4$packet(r4, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000340)=0x14, 0x800) accept4(r5, 0x0, &(0x7f0000000380), 0x0) mount(&(0x7f0000000000)=ANY=[@ANYBLOB='%'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 23:34:33 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$IPSET_CMD_RENAME(r1, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x44, 0x5, 0x6, 0x101, 0x0, 0x0, {0xa}, [@IPSET_ATTR_SETNAME2={0x9, 0x3, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME2={0x9, 0x3, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x44}, 0x1, 0x0, 0x0, 0xc050}, 0x800) mount(&(0x7f0000000000)=ANY=[@ANYBLOB='#'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1574.278505][ T6544] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 1574.298531][ T6544] netlink: 'syz-executor.0': attribute type 2 has an invalid length. [ 1574.376946][ T6544] netlink: 'syz-executor.0': attribute type 2 has an invalid length. [ 1574.412758][ T6607] kAFS: unparsable volume name [ 1574.421047][ T6566] tcpmss_tg6_check: 7 callbacks suppressed 23:34:34 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) r2 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) shmat(r2, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffffff) r3 = shmat(r2, &(0x7f0000ff9000/0x4000)=nil, 0x5000) shmdt(r3) mount(&(0x7f0000000080)=ANY=[@ANYBLOB="25b1339c366ff230239120f8f9ae34d28bc9e64ecca9345423a3214de053c1b6a647159299e0e08670bca48975c03e043bd324260179f33e5a6ada29674973b5ce5122a471839131337404234cb1eb853804faa06e68b19aefb7223b72bf3e4f13203d2bcdc3ef2c3e51be0eb0a98ce0cc40d8f9"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1574.421054][ T6566] xt_TCPMSS: path-MTU clamping only supported in FORWARD, OUTPUT and POSTROUTING hooks [ 1574.447052][ T6544] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 1574.462232][ T6642] kAFS: unparsable volume name [ 1574.471989][ T6657] kAFS: unparsable volume name 23:34:34 executing program 1: openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$RTC_WKALM_SET(r2, 0x4028700f, &(0x7f0000000180)={0x0, 0x1, {0x26, 0xb, 0x11, 0xb, 0xb, 0x1, 0x5, 0x82, 0xffffffffffffffff}}) r3 = socket$inet(0x2, 0x4, 0x6) r4 = socket$inet6(0xa, 0x6, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f00000001c0)={0x3, 0xda6, 0xe75, 0x4, 0x8000}) bind$inet6(r4, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2008}, 0x1c) syz_open_dev$sg(&(0x7f0000000140)='/dev/sg#\x00', 0x2, 0x100) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) recvmsg$can_j1939(r6, &(0x7f0000000400)={&(0x7f0000000280)=@l2tp6={0xa, 0x0, 0x0, @mcast1}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000300)=""/43, 0x2b}, {&(0x7f0000000340)=""/68, 0x44}], 0x2}, 0x2) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ubi_ctrl\x00', 0x0, 0x0) listen(r4, 0x0) preadv(r4, &(0x7f0000000100)=[{&(0x7f0000000040)=""/141, 0x8d}], 0x1, 0x6) sendto$inet(r3, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x2, 0x4e20, @broadcast}, 0x10) 23:34:34 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) r2 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2008}, 0x1c) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000380)=@raw={'raw\x00', 0x3c1, 0x3, 0x2f8, 0x0, 0xd0, 0xd0, 0xd0, 0xd0, 0x228, 0x228, 0x228, 0x228, 0x228, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0xa8, 0xd0}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00', 0x0, {0xffff}}}, {{@uncond, 0x0, 0x138, 0x158, 0x0, {}, [@common=@srh1={{0x90, 'srh\x00'}, {0x0, 0x0, 0x0, 0x0, 0x0, @dev, @loopback, @local}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x358) [ 1574.527497][ T26] audit: type=1800 audit(1579649674.070:65): pid=6664 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed comm="syz-executor.2" name="SYSV00000000" dev="hugetlbfs" ino=3 res=0 23:34:34 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_DEL(r0, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="ac00000002090101000c00000000000000000009700002002c000100140003006ed80a0ec3677685b4c446deabbe2e8d14000400000000000000400000000000000000000c00020005000100060000000c000200050001003a00000014000100080001007f000001080002007f000001e891871d58a4030c00020005000100880000000c00040008000500f2ff001f0c000200060003000000000008000500000000150800060000000000"], 0xac}, 0x1, 0x0, 0x0, 0x40081}, 0x40000d0) 23:34:34 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) write$evdev(r1, &(0x7f0000000080)=[{{}, 0x12, 0x9, 0x7fff}, {{0x0, 0x2710}, 0x17, 0x3, 0x7ff}, {{0x0, 0x2710}, 0x12, 0x7fff, 0x3f}], 0x48) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400201) read$midi(r1, &(0x7f00000001c0)=""/248, 0xf8) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(&(0x7f0000000000)=ANY=[@ANYBLOB='%'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1574.630427][ T26] audit: type=1800 audit(1579649674.070:66): pid=6664 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed comm="syz-executor.2" name="SYSV00000000" dev="hugetlbfs" ino=4 res=0 23:34:34 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto$isdn(r3, &(0x7f0000000040)={0x4, 0x5, "e4bab62a0a762ae43e8abb4832e554d3597a643fef398efe116d5356ff2a910063f07c0bb9c0e139563e51af7e5f2c5b6b7ba1339b226672e99d7a2d1495348511881a3c81cbaebb4406615b0377cbb4826bc718a7a7b985489adbb13764c72f9229f7dc3e113ebd29d8d257d74d08733c1df64bbb1c3d3e5a495a68f062ca4d80f4caa4b82b601ee6ed3e45818c067ed777a4b9f9dea517354f4d60f5f394e88292fb0f6124ab9862babdd0581f69bd76e4cdd36f5f660c1e66a0c47df34aa577a06b0c"}, 0xcc, 0x400c5, &(0x7f00000001c0)={0x22, 0x0, 0x5, 0x1f, 0x8e}, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000000)=ANY=[@ANYBLOB='%'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1574.682590][ T6670] xt_TCPMSS: path-MTU clamping only supported in FORWARD, OUTPUT and POSTROUTING hooks 23:34:34 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2008}, 0x1c) listen(r0, 0x0) r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2008}, 0x1c) listen(r1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) io_submit(0x0, 0x1, &(0x7f0000000240)=[&(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x9, r1, &(0x7f0000000100)="90ccfc4c2d7d96e48bf3", 0xa, 0xfffffffffffffff7, 0x0, 0x1, r3}]) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000640)=ANY=[@ANYBLOB="72617700000000000000000000000000000000000000000000000000000000000900000003000000580300000000000000010000000000000001000000000000880200008802000088020000880200008802000003000000", @ANYPTR=&(0x7f0000000040)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000f42b000000001000"/48], @ANYBLOB="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"], 0x3b8) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='ocfs2\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$USBDEVFS_RESETEP(r5, 0x80045503, &(0x7f00000000c0)={0xb, 0x1}) [ 1574.727332][ T6690] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 1574.761584][ T6731] kAFS: unparsable volume name 23:34:34 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount(&(0x7f0000000000)=ANY=[@ANYBLOB='%'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) r2 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2008}, 0x1c) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000380)=@raw={'raw\x00', 0x3c1, 0x3, 0x2f8, 0x0, 0xd0, 0xd0, 0xd0, 0xd0, 0x228, 0x228, 0x228, 0x228, 0x228, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0xa8, 0xd0}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00', 0x0, {0xffff}}}, {{@uncond, 0x0, 0x138, 0x158, 0x0, {}, [@common=@srh1={{0x90, 'srh\x00'}, {0x0, 0x0, 0x0, 0x0, 0x0, @dev, @loopback, @local}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x358) [ 1574.803633][ T6690] netlink: 'syz-executor.0': attribute type 2 has an invalid length. [ 1574.837420][ T6767] x_tables: duplicate underflow at hook 3 [ 1574.867311][ T6781] kAFS: unparsable volume name 23:34:34 executing program 1: r0 = socket$inet(0x2, 0x2, 0x2200000088) getsockname$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, &(0x7f0000000040)=0x10) sendto$inet(r0, 0x0, 0x0, 0x8000, &(0x7f0000319ff0)={0x2, 0x4e22}, 0x10) 23:34:34 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_DEL(r0, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="ac00000002090101000d00000000000000000009700002002c000100140003006ed80a0ec3677685b4c446deabbe2e8d14000400000000000000400000000000000000000c00020005000100060000000c000200050001003a00000014000100080001007f000001080002007f000001e891871d58a4030c00020005000100880000000c00040008000500f2ff001f0c000200060003000000000008000500000000150800060000000000"], 0xac}, 0x1, 0x0, 0x0, 0x40081}, 0x40000d0) 23:34:34 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) dup(r0) mount(&(0x7f0000000000)=ANY=[@ANYBLOB='%'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2008}, 0x1c) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000380)=@raw={'raw\x00', 0x3c1, 0x3, 0x2f8, 0x0, 0xd0, 0xd0, 0xd0, 0xd0, 0x228, 0x228, 0x228, 0x228, 0x228, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0xa8, 0xd0}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00', 0x0, {0xffff}}}, {{@uncond, 0x0, 0x138, 0x158, 0x0, {}, [@common=@srh1={{0x90, 'srh\x00'}, {0x0, 0x0, 0x0, 0x0, 0x0, @dev, @loopback, @local}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x358) [ 1574.894661][ T6767] x_tables: duplicate underflow at hook 3 [ 1574.908072][ T6789] xt_TCPMSS: path-MTU clamping only supported in FORWARD, OUTPUT and POSTROUTING hooks [ 1574.908109][ T6790] kAFS: unparsable volume name 23:34:34 executing program 5: mkdir(&(0x7f0000000040)='./file0\x00', 0x1e5) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x7, 0x6}, 0x0) mount(&(0x7f0000000080)=ANY=[@ANYRES16=r0], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='afs\x00', 0x0, 0x0) set_robust_list(&(0x7f0000000200)={&(0x7f0000000140)={&(0x7f0000000000)}, 0x800, &(0x7f00000001c0)={&(0x7f0000000180)}}, 0x18) 23:34:34 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) io_uring_enter(r2, 0x7, 0x4a, 0x3, &(0x7f0000000000)={[0x19a6]}, 0x8) r3 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="9fc225"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 23:34:34 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_DEL(r0, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="ac00000002090101000e00000000000000000009700002002c000100140003006ed80a0ec3677685b4c446deabbe2e8d14000400000000000000400000000000000000000c00020005000100060000000c000200050001003a00000014000100080001007f000001080002007f000001e891871d58a4030c00020005000100880000000c00040008000500f2ff001f0c000200060003000000000008000500000000150800060000000000"], 0xac}, 0x1, 0x0, 0x0, 0x40081}, 0x40000d0) [ 1575.096426][ T6879] xt_TCPMSS: path-MTU clamping only supported in FORWARD, OUTPUT and POSTROUTING hooks 23:34:34 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) dup(r0) mount(&(0x7f0000000000)=ANY=[@ANYBLOB='%'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2008}, 0x1c) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000380)=@raw={'raw\x00', 0x3c1, 0x3, 0x2f8, 0x0, 0xd0, 0xd0, 0xd0, 0xd0, 0x228, 0x228, 0x228, 0x228, 0x228, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0xa8, 0xd0}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00', 0x0, {0xffff}}}, {{@uncond, 0x0, 0x138, 0x158, 0x0, {}, [@common=@srh1={{0x90, 'srh\x00'}, {0x0, 0x0, 0x0, 0x0, 0x0, @dev, @loopback, @local}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x358) 23:34:34 executing program 1: r0 = socket$inet(0x2, 0x2, 0x2200000088) sendto$inet(r0, &(0x7f0000000000)="cd6f6906dece81720eaea7123aca757d5d5413b96920a00c9bb983aaf73c69de796a23af7a9bb8f636f61cc979a612297502e4b618a0f20704b1c49b67fa027f2b7fd7677632e69d9510731dc158966f9e8d8354a28216b767a1c2fd620a7514e4f3ff7e2bebdd4d99ddbdd8d9b093292300d7ba4260343ad02ff9827cf00866142badf682e1b34d680ddc7ffe33ae73844afe8eafa0eb5f2c022a11ef3a8fc91ff403422cd03478343c5a2842c4470c6bcdcb005cf2a14f80d0cdeb46bdca6a2323add061dfcc809d54eb26ebf71a2ed7a81b7dde97b30d273ca403d9d81bb889b612d402241faed765b34f920e8965b53d5385275cbf68d5624d885b8914096b02057d9b85ed8f18fcf3ce6d22784b058fa80c7dc5cf9f51940708c1b803394e891734e217b38f0f9d990aa3475c9f23afc9ab8f0f9f517e315869f874842e9e4531b31a16cc61f4e1b200a5a6cc92b80847d53c05ed2c78bcd8ce9128868a8f7808ed5a7f47afd9d6a4f08d7f159277bdc8f91f113681b65763f45b459731758ee544cca1515620faaae9b120fe60d1d3b665b3e6e1475d7a926238066d012fa850a0c9d473bcbe7dd7c28f1a30deddfc6640de5ce883e23ecc112d1103212cdf1046729a0ccd75c1e334ada962b3ca0357e5f6edae4d4de3c9331c50cb561125c981ab21f1946b1914972d22b728ce355b3b07d3acae847cf83acccf71435967067c3f9870053a01e5e0f9c9671534fedf4a44529ad27d6ae39c0ee118743cd040ff4b0375b3a0bc1070f149835a3ec81ea1712afa1e236680333d1ef09d11094513762527312e86d4ea3655e43d08b0910c2752559d94519e6552fde09a01220f26a4bd78fcda1fce129907a6e3dfa331720efa8ce2685d809b2cf65d8ffc9b6d4295d8086c77d221dc9b6e6e0c335944fee5bea95607e49612e4b49f2adfa83b2d989a847758d19754bacf760c8eb3fcf222df8bdb5d817a39cd042f14d1dd7a922bbba98260a016a5c1c13a2721039a53a6a6d5ddfd6f446025b61076de78fadac7aa3a175b2a63c767cbc350a10fb4782296801d97962b04d1bdebd71dd277870c3c4ce0ebdfa43aff14dcdc102467626fe0e7f1d507ed2b9dc4338b39e2cf412910d337266890cf94290ff01c584d1f97fe119def45bfea490c010c11519c21c590d8d184d6b51241c683a6da648e6d6f368dfc937b0e2f744b5f4f3f0e2e2d9114e16e9987200b88cb49e529aa2e8ceb745cc991e2278fcb9d41f46df6d81389c18a9b80026823e38895803ec646fc52342a879dd03b1950209d0c52650d5f15b11f9e38bae53bb8b0465832277d773386c6fd33319f297d4059068497a057726a8f65b1017108b8e397a6d29ad69aa4613d5fdac39572ea58f3afb5074866f5f8fdf5d7a859f5802416e14995deaec1a8f19791ee8c9cced5ccf3f8f1af7d4d95533e9a6e59ba1f029bc9d4841255e3f4bf2e1fb7f0d24b023508bc216bdafd7bae5db2b93c9ad5ff77fe8f91c7c62ed75e211bef9cad1f607f2015e6d9f94088937cb604dced0c0135d0426c8ca4f4713f5d4e7c1181e2b30add0de0e1ce05e03bc8fe785b08f8dc61934e1e59727f2ce65ed87d242eeca13f86b66aaa7a906127fd86a25319d94ef77fbc8b97493e83e0ad010036a642d426a68984d9bc217965580d72ba726f345da6bde47134b16a4fb3f0d6203839994a487a414d2234ab82a11c01443931242438a9b509ae51fe4df8c3319d9efe167293423fdd6c73acceb432fba031e159652709f9062d259e4e05da6dba3da9204ef68a84c27648451f49682942476b45e15ba6f5e3d25dd971b0c015a826bf4e166da64f163e118d7720cf365db2948629570c56741181d258accdf7196150e57556768a6b8e7068efb94c7fb70378e3b0202fca5efb90c0a52a13e208aeaaf8d852a3b9f498e040522a3cf3b71096be8f1a01754350afedd111cfeba4f9cc2c679a761d5f828253630dc7694db958fc915cde03894178a1fe1742468c9d25db5b08d159ad5dda17556484b713776cc57a000b18f149f3af76f8d41ca12ebece849cb4eb11034993d8e83b10e2a803827e74f2a9ce38969175138344910fd67218922f81c99270dc99cdfb2c5580279497b15a883c2fa09d346c846d14f0517e66b88c17581bdf453c87c0bfa973edf078811d07fcf5fc0e43527a0853c087c54b65f2474c553dec3f22b2321e610957f5e9077de9baa04eec51e464a8470b8736df5f54bd69097ec8305426ed9a8567c7bfeb54382d36620080a7d91b86d845d6a911df47ab91e3ff40996c9d28b045c2add6b60ed88da06f72e12dc50313cbc74b3b6c4f41cc5e4b84ca0b8579f8442af72b3de48e5ae0757ffc63166c19d71ca643b7fdc9c90c1eb51b1f33999e5bab9d755efda2cf1974a3e19638f52a77a387e1ede7f7292e7774712f24990b1f62d2bb0e5d912f30f2b166603fcf49430834de9c235f9abd8efbb5d75e6a5ecdf2d51ec7ca0716508a9bce31d297544d3b213533455da905f541de3fe08425ae24249dfe4b0a862ef82c5de0f7e20c3839f2c36a2930a17faf6054bf4184e4acfef41bfbf59e538ae503544fd01c777ceb3728e4e95c676e021e4c849589a170ae3fd96582e2075884a29d0e6396bad45d5144adca807256ac68aaea2087cbb9a07c9ff5b2a5850294bf5641935d76c7b269fcedf4206504c03fa83fdf59893d23d3a2b07ed014250a187be46cd65f6e9aa08197cc54f6499ac1feb4678f4fc9f84c70a1b38d8a6e37319824cddd9277ae4f576af6dde32243b09698a6cfb4ba92a5fc243e97e4fb3f465f1528f1c673b9d8f01b90e0e5933db91ab31997cbdaa0e63867dd9c0098d4d14142748445b9d6c32ecb24a51e6cb40e52e1a83f5dce4d473a277c380d20fec95e7f6e9f52a94bd90faf02959d5f17343c4088fb658bac2c9c92a3c0c2169333a5e5ce18f6fc3e2e75e48e657aed58e02fa9cff8b10f2e45bf651489fa9bda878c6175e70807293a563281612743df44624782518732557a5940a3c78fb6a92771fdaaa84d161f93c3eb4bf091c42546f274a39cb46bb0bae6e6a7946e5256a5a35087eae1bf1c82285f19874fdc555e3f687ef23d262d85f5bac403b7f6ca419a1a3a3fd426730a2cb84d447089afd09d364c7e23542485056542847e529425de5c9bba9b7b06ce114c660af52f7f0a52e58f2136f06ae516d4a9eac15a133a1d3020326fe781e39e3531a7a81e4ef0f074db12dff1574c212c6df4be930f95a48bd7d3b600562e34211ea66684956ff9821979beb57c06e76d4132c58f107d947b0fd13f6ec08bc8c0f13d7d5011490a03502ce6e8d25df540eca5b60488261102402445ec30647804c3bd8fefddb9c66de59a952c2bc639a23c079020703d245a298f8ac02519e5837144463f16fde6b3828e554b0a3a8fb98a9f7a77c77996c3911a19a0a2d99fd0430f037171a22939da285b8ffff5e8aa4121e0d37ff36da3ff38c69a787233c03b3759635f742bbaa105f975a212ffdf5dd247054905123094c245d6bd2172fa85a8893f913c64bdb625f7be4ea97e901d7a30ff48fbeebfbbee8fd091ec7ce329a0335b1c11ee84c070fc6734f28451c3bb16df50e614be526d8a8e40aeb6180a50160143a62e4b5a8b8e49a5535373b803a1a6cbf5842274e0ec788e6c22774e26c502482a31ae12dbacdf55f9f3a65cf2d65222538b7f8796e6bdac012819e50a116a13da08ba429ef292336a8bf53cd0dd8db93b39340c3844e0053b763b37d967a854ac7dac558f1b37ecc1ab8843335ada72bbe3b4cb788b9379801f1d1f058cd257f72265bb422948e5623eb35a3dabddf9fe049f20e22f85ca5627690c6965bf17e13aeff4876a1c15d1b2d788caed038ad072d662ee1c180866fe4bcfef976c4b3b7ab5cd492ef590a4071a8ef4fbdfe4358deba897e51441770898186c57865e87636cb1f915bd5687a640e7e096fe9db72b29c39496707261aad2963344c5b0ee1d603d75c2ae134614f99c88a3aa272202ca05f5079517b79fb97eae3221b11dda1343aad0575da541cc611081d93d665b51e181c32dc2f32f244e0510244213c7669266873d09cd2d960da49d2000b865df8ef99e49c1688baa9ca35573fcb2be53aecbedc1e7eca9b76dfd697726e9288d7e94fddcc2b5819dc6c1846c237dbe33e0b1615ef16fc10bc3d50915f968f9638a002f5aac5e660170e92d8897bf6ce93ab60f5b4b03f864719c89d5fc3c3b647e7f489035fa54231bce0903007083f465b73a2752971f88ea49665ee5e1ff0bd0e7e9d0cf2f754a2991666c820e6f68130326e40929214ab9f840d679cb2a63a578948d2f8a47e2774143f572c972cd2fbc093982724008a5de388ecbc21fb122824b7fcf86409aa226c735e78bdfb8effdb3563e9547bc34aeae7b1c9fdc9602d37b6243da886a6c956c9eea2bea1bc1dee9f7204745f2e064e5600b57d119d41cf5c8ecc0e637e624a5e1c62f04c06b1c42449c15db44ad3d4a206881d432339a437c2d0964f7de3300b2a257983a682a7352d5b65cde8f9c13a6bfaefc45c9c66e0e5f1988a616d4401df001223b017d9363c43853a3d24e77e6c4d0f479217e971496c23f303dd845de827ae991f49ab63552e182985676a97cbee3244e6df04bb4a771b53f8e761cbd550747ba4ef92fce330de2cf88d56f5f6b86ad904a4388f03b31922db31eb858b8b4bb1fea1094a95fe161cfac6444cec6e59fd5bc4bd5119f81bd0ff73c4b84ca4577ecfa5178dc24d7a0cf8f9d06ab6b74768750d511f5cd462d5f298b340c02800c8e901790d1e9ea1a6f4b039309551655aeb0584e5b58cb1adc262429954f28b70e8f96ca080f01ba83bf8acfcd03c9f90ab572b259fb3ccf59f2e05ffc3e429518dd04f1a1216ed5c608600c3d18fda97abc2c58364604daabe3a0c156b987158eac510478db8daf964ab4f541d556e0b1359fc655cc50e2f04727c173998224a3440f407e014079ac2ea64f6bc8aa086725f17679ebd47f4859dbe3ccfa7c170500cf4e3d23697d7814978b15264f6ad2bb7e53dc2c990f53b9b55d071fd770e746599fd4f4349504ca3df3b494f4183a9e33a0caa3b4057d9eb667443e49d9048df77327a9bf0aa7595e9a3066c95148d4e322470b9921ca61f50a88badadc8a8b77ba1b1eee91e6586961aed82de3b10624a5bf5b30cc91b08ff806d2c8e3856bb991d1ce99d3bfba5fb3f5586ed9da91db169a8e4f9c5ca987bfb658e382e80769c9f0ef43f90308a15b7b9b1bd997eb5866357baad9425b74fef76902196a58a623787e8bf6ba0fc901cdad8ba1e9aba11af139c2c496bbf096bc70d9164ccd77e3626aa7948f2e914829f56db5573e888c6d88653758e02e58f2c260e4709299444b2f47b20ee56d81a27bf7c2e1cc6fddae56ac0f934d54b57b16498b6c4f4ee11814803de1a2309b21d814509266de6e35973364d3dc0f1c762f7d850cd45568f2ac264c5cf447332628639846f5d9ab1a995efe981e761cf038ae83a04104b15555ee69aa9fd155750f686b27ce1467f54db11c450510c11a62934ccec19bcd05a1bd0078f6f55dbfeb729da0d140cb31528ba8cbfb05e37d3bd05ad42b09b73a712f1f2bfaaf332a2bcf6bd2be195e96371ca3228e3cad5efba8aa69af7b2a4f1f951a2545ef7d540dbeb0c9c2a7027c4398671ddf395f50f6659a308075aa29f3f34584208abe9a8669e3cbbf80d0df9f39", 0x1000, 0x11, &(0x7f0000001000)={0x2, 0x4e20, @remote}, 0x10) sendto$inet(r0, 0x0, 0x30, 0x0, &(0x7f0000319ff0)={0x2, 0x4e20}, 0x10) [ 1575.160505][ T6904] kAFS: unparsable volume name [ 1575.201145][ T6908] kAFS: unparsable volume name [ 1575.239670][ T6911] kAFS: unparsable volume name [ 1575.266759][ T6914] xt_TCPMSS: path-MTU clamping only supported in FORWARD, OUTPUT and POSTROUTING hooks [ 1575.548430][ T6920] kAFS: unparsable volume name 23:34:35 executing program 3: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2008}, 0x1c) listen(r2, 0x0) r3 = socket$inet_sctp(0x2, 0x5, 0x84) r4 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0x14, &(0x7f0000000080)=@assoc_value={0x0}, &(0x7f0000000040)=0x160) setsockopt$inet_sctp_SCTP_DELAYED_SACK(r3, 0x84, 0x10, &(0x7f00000000c0)=@assoc_value={r5}, 0x8) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r2, 0x84, 0x1f, &(0x7f0000000040)={r5, @in6={{0xa, 0x4e24, 0x2, @mcast2, 0xefa}}, 0x5647, 0x2}, &(0x7f0000000100)=0x90) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000240)={r6, @in6={{0xa, 0x4e20, 0x3, @local, 0xffff}}, 0x3, 0x1, 0x0, 0x7, 0x7c, 0x1, 0x69}, &(0x7f00000001c0)=0x9c) getsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r1, 0x84, 0xc, &(0x7f0000000380), &(0x7f00000003c0)=0x4) mount(&(0x7f0000000300)=ANY=[@ANYBLOB="5d06af69d7d67f7e786659186239340045bb557ee60dafe76c1ecf8edf048bb758bad4c44b7363ea135ba731c006a1d0e8f4235a9452a75751e3cfc1c70b68e06bd08ec13b86220c6e5cc4ee2641221ab6fe80cf807dcce14b589a344c06c4e3b3d771e33f103532da330d84ed69c955682d369a070c99590bf925"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 23:34:35 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) syz_mount_image$nfs4(&(0x7f0000000040)='nfs4\x00', &(0x7f0000000080)='./file0\x00', 0x1, 0xa, &(0x7f00000009c0)=[{&(0x7f0000000240)="5d0e7f3b69d9b4d7774748f7b6e57d7703c8f90b15b7fac029525187f5b2a3b7c0999a8bff34a4189b73b6c007446ed45214e8e65077cf9c8c6a0d3dc7a56b422c64f243bccd66ba98265049a659a1698525d09dfe9a4c06ce6c741e024758744160bc9189d9376406603bd67f5a4cae9487ab21b2ba9b4bf4c34491d1c1c6e3ef6c46afb906b8051113f9a0df00", 0x8e, 0x3f}, {&(0x7f0000000300)="7caf2e4c89c36d451077084c96000dd3ae1b4c73bf69c838cd53c58ca0758d05df745571c2ac80a24d191a50e2ee935c08f83ea8d342036d0a6f59f537e43ebf610ac7e9bf676ab324c53bca5ef4774bd0cf3dd622c2649cd45176f2b4e6b77956f98260c33fdaf57a903eae5511654ebdcba2f6daa48b210d5ec04f4c382e91a473e32906dd67bf9c6dbbb35dee2d301523fa0f2eddb39bb357c394357822b02f106b7ff90185ecc4293f72d797776b55161ef891308c44daf75114a29f34a7bff9c60288f9043e807a09f2b0702dbef27af1", 0xd3, 0x400}, {&(0x7f00000000c0)="2665059a9056ebabc23b37ce5ead0eae1a3bc64807f6f6a4f228f001f41a85ed415cb32330999254abc66082702fc5dd5f05bc43e2b0d03a3e9c3dc4d0b26c00773d42f46fac8d17f544e211c2d6c40089d9be04d170379ee11035b0e988e79f8b86fd82ddd7cf40d2ca9508c1560f8707d42934d518c2", 0x77, 0x3}, {&(0x7f0000000400)="e1eec5fb3286bcc1ff47910d02ae7f1a35e55dfe2a4ea3f0c17c8822c77c58523d79c09a392fc5b5720c2df5737147f4c94ac2dac740a5eaf2553ab776108d0f67298f4f5c34415941194f", 0x4b, 0xec}, {&(0x7f0000000480)="a34665833abf037a3e2c3888357788b5f8e4478132c374ef411ba1e9768c7e7b540c1e0741bdb86e767b4148731408686aeee744cc781a14efd116310d09775a0a1d36030dacb307a90c207296f4fe910b62d57104346b9793322e590cc8a90fc36dbb56e9dbfb0568ca08950062dbfa52c3124e25ee3d86f5b105306ffe8a5174a6fad0e763964f9091a64a81e5b343750af995b5c96fa2d6199f55ce9658913f0393f1d16f1fd3426882e901c0d518a8a6e404654b8abbabffe63b9877eed3cee0a20835", 0xc5, 0xc795}, {&(0x7f0000000580)="040ac3f961832908c5149573a31f6853f64228045d454e30637ee1a0ea002e0099294a6dd3b1bca46b9bd6c8d9c61e069a2c047f2f64dcb4053a0083b50e007b3ff93fe7e3fdffde6fb8bc76378a89ee04b6b0e9770d6800114f7a6138c3c5ad0df87f0231489b202d13e9fcfcd10336987f11e253fa55ceb0a228d9c64381990b392ea28206ad38f36e3660e56d8c75fc6079f46a9565f8dc6e29806eae67deb68267815972d5ff43e8441188b0d309b8443d0373873a56dc8d2483a895638feb05fde57ba99fce1def3fb4f89c20798b7c00f039a7f160a4cb33244310f30bb46f9c26457c368056b398", 0xeb, 0x1}, {&(0x7f0000000680)="56b43fa3e8c7807bb2533c10b531c73e8c2f202a03946b09a6c6442faf18efd57afa9742945eb9ae9d7d122ea666d6d419f7452f10e33924d5f128f1d458356f410d342116ac139fe7b7b69fc1508d57ee03c7c171df6284543668130d2bcae2e900646c1fc75ac80bfaf0f725c21dca6b23f5a502dc72584343acfb9d8cedb3e271576cff1231ba2251", 0x8a, 0x7}, {&(0x7f0000000740)="52fba362bb7dbd6583f38a0924df71bd68628680ec642cf66bd76e23855a43e1abb7df85a7147e57a00dec2abbebd58aa93f12e04b7b8431b72691193df79f88097c8e9c2a27f2bf328c1ff06eac22080a922fb049da3d62d5a9f72d2bdc61ee0524a53f8492d32440eded20b67970c6860141819e4a5e4898aba25b18546ed97ca27c29dd7985ab2251c6612ad7c20e7493b6799425125328acf8722523e96b2fc307e56b7858046c146ac0e5696ac5eb666503524cbc0dd6b1fd0a7cfe1974a659beddc2acfadb802fa57290312f5f23c2781bb7af65c8fa", 0xd9, 0x1}, {&(0x7f0000000840)="4b848d75e4dcf03caf19594b1b0545cfc96844d6655a53f92e44dbfc37b53820b62313106bad0783fc174592ba8c6e5a08b6d85767f67d401a91f406481e1f59a1666164f0a521a32ef5605c273c0b2d59b920df96f68edf9063d29a38b46ad7bcf1da320d5f64812d8929c7b1bd0881dc03d25c4dcd50cc85750eb9fca8dac58b113f67a4b7109d4742356d298c5555589a899d1bf3bc5393ef55cbd639e0f11ff8d640c5878e70d1497eab145c92724d03ddd3056b9e0954b7b5564d2fd5a78a1d3285978364c64bc4cc71fea123d9a5d6b4678a36ac7c487c0776", 0xdc, 0x3ff}, {&(0x7f0000000940)="06e404d438788f670755cdb34a41865d3d5f4d1791e4d73acebe5e804ec60c87c0552c0d2abcdceee6af88748e18ec2e93796d4eddc0bf22ef1e3c14f979280f892f45211f183331a7f74554d83abf240a95be3a9bd9961f11", 0x59, 0x8}], 0x420, &(0x7f00000001c0)='ppp0\'nodevem0\x00') mount$9p_tcp(&(0x7f0000000ac0)='127.0.0.1\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000b40)='9p\x00', 0x120010, &(0x7f0000000b80)={'trans=tcp,', {'port', 0x3d, 0x4e21}, 0x2c, {[{@cache_mmap='cache=mmap'}], [{@seclabel='seclabel'}, {@smackfsfloor={'smackfsfloor', 0x3d, ')&user$\x10&/'}}, {@func={'func', 0x3d, 'MODULE_CHECK'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}, {@fsname={'fsname', 0x3d, 'nfs4\x00'}}]}}) mount(&(0x7f0000000000)=ANY=[@ANYBLOB='#'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000c40)={0x49, 0x29, 0x1, {0xff, [{{0x40, 0x0, 0x2}, 0x0, 0x5, 0x7, './file0'}, {{0x2, 0x1, 0x7}, 0x80000001, 0x7, 0x7, './file0'}]}}, 0x49) 23:34:35 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) dup(r0) mount(&(0x7f0000000000)=ANY=[@ANYBLOB='%'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2008}, 0x1c) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000380)=@raw={'raw\x00', 0x3c1, 0x3, 0x2f8, 0x0, 0xd0, 0xd0, 0xd0, 0xd0, 0x228, 0x228, 0x228, 0x228, 0x228, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0xa8, 0xd0}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00', 0x0, {0xffff}}}, {{@uncond, 0x0, 0x138, 0x158, 0x0, {}, [@common=@srh1={{0x90, 'srh\x00'}, {0x0, 0x0, 0x0, 0x0, 0x0, @dev, @loopback, @local}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x358) 23:34:35 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="65e9e8c2af832ea880fe4f7c4ab06d246e18fe8f754c15607aaaf594d57a60c1a4239b0c5d66f84d519b9210f21aac090161278af94656405046a139576f11e70fb60bc0984a5bc7e8f1a4959bcbebed05767cbb56363b5293a60e927cf867906407bfbc46209ca19b439b7292294ede4ebccb6aa2aae23a6028c38304f027dd43b8923491cae8c16f35ed06a7d036"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 23:34:35 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_DEL(r0, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="ac00000002090101000f00000000000000000009700002002c000100140003006ed80a0ec3677685b4c446deabbe2e8d14000400000000000000400000000000000000000c00020005000100060000000c000200050001003a00000014000100080001007f000001080002007f000001e891871d58a4030c00020005000100880000000c00040008000500f2ff001f0c000200060003000000000008000500000000150800060000000000"], 0xac}, 0x1, 0x0, 0x0, 0x40081}, 0x40000d0) 23:34:35 executing program 1: socket$inet(0x2, 0x2, 0x2200000088) rt_sigpending(&(0x7f00000001c0), 0x8) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/tty/drivers\x00', 0x0, 0x0) open_by_handle_at(0xffffffffffffffff, &(0x7f00000000c0)={0x9d, 0x3, "ad3a0ac7ee72ce25037ec4c2ae5131347dd929a59521b22ffceb4941eefa5074c92fdb3006447bfe89301eb9ec4ce7a286f1d9cf07e42489359839e52108d13a6974b2c4fe4c1e58e21a887904c8dc23ec9ba5b90c257b3b69aa90438c2b792f121bedf87b5cfa92e67c5daf181d390b8c66851fb64c177ff6a03b74442184a010afecc7b0bf69bec42bcb8a2abd3b0dc2dfb7e5b1"}, 0x800) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$FUSE_NOTIFY_STORE(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="2c00a9a97da97a6bab8ffa213f0000000000000000000004000000e2f9fa7b285af67d64178e67a8a4000000000000af0000000000000000000000000000000086962694074a44e2361d80b8429a9073f1a2fb44bca3d774c8f8598fdbb51e872d2ce458a0b3fb8e85b25c88720322d9905a9d6856b7f6daa8b22deac88ffb32087cd9bc3af853d13d11d1a19e83e9ad88027b4bde1a9584413899d168"], 0x2c) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000080)={0x5, 0x6}, 0xc) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendto$inet(r4, 0x0, 0x0, 0x4044081, &(0x7f00000002c0)={0x2, 0x4e20, @empty}, 0xfffffffffffffe0f) [ 1575.637710][ T6927] kAFS: unparsable volume name [ 1575.655187][ T6930] kAFS: unparsable volume name [ 1575.671957][ T6923] xt_TCPMSS: path-MTU clamping only supported in FORWARD, OUTPUT and POSTROUTING hooks 23:34:35 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) mount(&(0x7f0000000000)=ANY=[@ANYBLOB='%'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2008}, 0x1c) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000380)=@raw={'raw\x00', 0x3c1, 0x3, 0x2f8, 0x0, 0xd0, 0xd0, 0xd0, 0xd0, 0x228, 0x228, 0x228, 0x228, 0x228, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0xa8, 0xd0}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00', 0x0, {0xffff}}}, {{@uncond, 0x0, 0x138, 0x158, 0x0, {}, [@common=@srh1={{0x90, 'srh\x00'}, {0x0, 0x0, 0x0, 0x0, 0x0, @dev, @loopback, @local}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x358) [ 1575.736122][ T6935] sctp: [Deprecated]: syz-executor.3 (pid 6935) Use of struct sctp_assoc_value in delayed_ack socket option. [ 1575.736122][ T6935] Use struct sctp_sack_info instead [ 1575.794387][ T6936] kAFS: unparsable volume name 23:34:35 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_DEL(r0, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="ac00000002090101001000000000000000000009700002002c000100140003006ed80a0ec3677685b4c446deabbe2e8d14000400000000000000400000000000000000000c00020005000100060000000c000200050001003a00000014000100080001007f000001080002007f000001e891871d58a4030c00020005000100880000000c00040008000500f2ff001f0c000200060003000000000008000500000000150800060000000000"], 0xac}, 0x1, 0x0, 0x0, 0x40081}, 0x40000d0) [ 1575.847730][ T6935] kAFS: unparsable volume name [ 1575.852084][ T7041] kAFS: unparsable volume name 23:34:35 executing program 1: socket$inet(0x2, 0xa, 0x80) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) r2 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2008}, 0x1c) listen(r2, 0x0) r3 = socket$inet_sctp(0x2, 0x5, 0x84) r4 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0x14, &(0x7f0000000080)=@assoc_value={0x0}, &(0x7f0000000040)=0x160) r6 = openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x40, 0x0) ioctl$VIDIOC_S_SELECTION(r6, 0xc040565f, &(0x7f0000000200)={0x6, 0x0, 0x2, {0x4, 0x6, 0x81df, 0xe7e6}}) setsockopt$inet_sctp_SCTP_DELAYED_SACK(r3, 0x84, 0x10, &(0x7f00000000c0)=@assoc_value={r5}, 0x8) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r2, 0x84, 0x1f, &(0x7f0000000080)={r5, @in={{0x2, 0x4e23, @multicast1}}, 0x9, 0x6}, &(0x7f0000000140)=0x90) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r1, 0x0, 0x61, &(0x7f0000000000)={'filter\x00', 0x4}, 0x68) 23:34:35 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000005c000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f00000000c0)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8dd65660f382201c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d6830f01caed", 0x14}], 0x1, 0x0, 0x0, 0x25a) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x1) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) perf_event_open(&(0x7f0000000000)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, @perf_config_ext={0x2, 0x7}, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f000002e000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./bus\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000049000/0x18000)=nil, &(0x7f0000000080)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0xffffffffffffff11) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000000)=ANY=[@ANYBLOB='%'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x324ba99, 0x0) r5 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r5, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2008}, 0x1c) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r5, 0x6, 0x15, &(0x7f0000000040)=0xfb, 0x4) r6 = semget$private(0x0, 0x4, 0x0) semop(r6, &(0x7f0000000040)=[{0x0, 0xffffffff}], 0x1) semctl$IPC_RMID(r6, 0x0, 0x0) semctl$GETPID(r6, 0x0, 0xb, &(0x7f0000000080)=""/129) [ 1575.891143][ T7044] sctp: [Deprecated]: syz-executor.3 (pid 7044) Use of struct sctp_assoc_value in delayed_ack socket option. [ 1575.891143][ T7044] Use struct sctp_sack_info instead [ 1575.896970][ T7049] xt_TCPMSS: path-MTU clamping only supported in FORWARD, OUTPUT and POSTROUTING hooks 23:34:35 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) mount(&(0x7f0000000000)=ANY=[@ANYBLOB='%'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2008}, 0x1c) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000380)=@raw={'raw\x00', 0x3c1, 0x3, 0x2f8, 0x0, 0xd0, 0xd0, 0xd0, 0xd0, 0x228, 0x228, 0x228, 0x228, 0x228, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0xa8, 0xd0}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00', 0x0, {0xffff}}}, {{@uncond, 0x0, 0x138, 0x158, 0x0, {}, [@common=@srh1={{0x90, 'srh\x00'}, {0x0, 0x0, 0x0, 0x0, 0x0, @dev, @loopback, @local}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x358) 23:34:35 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_DEL(r0, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="ac00000002090101001100000000000000000009700002002c000100140003006ed80a0ec3677685b4c446deabbe2e8d14000400000000000000400000000000000000000c00020005000100060000000c000200050001003a00000014000100080001007f000001080002007f000001e891871d58a4030c00020005000100880000000c00040008000500f2ff001f0c000200060003000000000008000500000000150800060000000000"], 0xac}, 0x1, 0x0, 0x0, 0x40081}, 0x40000d0) [ 1575.985083][ T7052] sctp: [Deprecated]: syz-executor.1 (pid 7052) Use of struct sctp_assoc_value in delayed_ack socket option. [ 1575.985083][ T7052] Use struct sctp_sack_info instead [ 1576.013718][ T7048] kAFS: unparsable volume name [ 1576.114954][ T7162] xt_TCPMSS: path-MTU clamping only supported in FORWARD, OUTPUT and POSTROUTING hooks 23:34:35 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) mount(&(0x7f0000000000)=ANY=[@ANYBLOB='%'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2008}, 0x1c) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000380)=@raw={'raw\x00', 0x3c1, 0x3, 0x2f8, 0x0, 0xd0, 0xd0, 0xd0, 0xd0, 0x228, 0x228, 0x228, 0x228, 0x228, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0xa8, 0xd0}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00', 0x0, {0xffff}}}, {{@uncond, 0x0, 0x138, 0x158, 0x0, {}, [@common=@srh1={{0x90, 'srh\x00'}, {0x0, 0x0, 0x0, 0x0, 0x0, @dev, @loopback, @local}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x358) 23:34:35 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000000)=ANY=[@ANYBLOB="8698e581b99da5298cb50aa37afccb74"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x81000, 0x0) socketpair(0xf, 0x1, 0x6, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') sendmsg$TIPC_NL_MON_PEER_GET(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000009c0)={0x14, r4, 0x701, 0x0, 0x0, {0xd, 0x0, 0x1a0ffffffff}}, 0x14}}, 0x0) sendmsg$TIPC_NL_NET_SET(r2, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000100)={&(0x7f0000000340)={0x58, r4, 0x4, 0x70bd2d, 0x25dfdbfd, {}, [@TIPC_NLA_LINK={0x44, 0x4, [@TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x34, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7f}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xb2b2}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1f}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x17}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}]}]}]}, 0x58}, 0x1, 0x0, 0x0, 0x24060081}, 0xc00) recvfrom$inet6(r0, &(0x7f0000000240)=""/213, 0xd5, 0x40002001, &(0x7f0000000080)={0xa, 0x4e23, 0x7, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x1}, 0x1c) mlock2(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0xb30e2171d581e502) 23:34:35 executing program 1: r0 = socket$inet(0x2, 0x4, 0x2200000088) ioctl$VIDIOC_TRY_EXT_CTRLS(0xffffffffffffffff, 0xc0205649, &(0x7f0000000040)={0x9b0000, 0x7, 0x3, 0xffffffffffffffff, 0x0, &(0x7f0000000000)={0x9b090b, 0x2, [], @value=0x9}}) ioctl$USBDEVFS_DISCARDURB(r1, 0x550b, &(0x7f0000000080)=0x9) syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0x0, 0x8000) r2 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2008}, 0x1c) listen(r2, 0x0) pread64(r2, &(0x7f0000000100)=""/182, 0xb6, 0xffffffffffffff81) sendto$inet(r0, 0x0, 0x30, 0x0, &(0x7f0000319ff0)={0x2, 0x4e20}, 0x10) 23:34:35 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_DEL(r0, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="ac00000002090101001200000000000000000009700002002c000100140003006ed80a0ec3677685b4c446deabbe2e8d14000400000000000000400000000000000000000c00020005000100060000000c000200050001003a00000014000100080001007f000001080002007f000001e891871d58a4030c00020005000100880000000c00040008000500f2ff001f0c000200060003000000000008000500000000150800060000000000"], 0xac}, 0x1, 0x0, 0x0, 0x40081}, 0x40000d0) 23:34:35 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x2) mount(&(0x7f0000000000)=ANY=[@ANYBLOB='%'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2008}, 0x1c) listen(r0, 0x0) recvmmsg(r0, &(0x7f0000007e40)=[{{&(0x7f00000000c0)=@phonet, 0x80, &(0x7f0000002580)=[{&(0x7f00000001c0)=""/224, 0xe0}, {&(0x7f00000002c0)=""/4096, 0x1000}, {&(0x7f0000000040)=""/46, 0x2e}, {&(0x7f00000012c0)=""/213, 0xd5}, {&(0x7f00000013c0)=""/4096, 0x1000}, {&(0x7f00000023c0)=""/93, 0x5d}, {&(0x7f0000002440)=""/180, 0xb4}, {&(0x7f0000002500)=""/125, 0x7d}], 0x8, &(0x7f0000002600)=""/125, 0x7d}, 0x67a4}, {{&(0x7f0000002680)=@phonet, 0x80, &(0x7f0000003c40)=[{&(0x7f0000002700)=""/194, 0xc2}, {&(0x7f0000002800)=""/209, 0xd1}, {&(0x7f0000002900)=""/36, 0x24}, {&(0x7f0000002940)=""/168, 0xa8}, {&(0x7f0000002a00)=""/241, 0xf1}, {&(0x7f0000002b00)=""/4096, 0x1000}, {&(0x7f00000057c0)=""/24, 0x18}, {&(0x7f0000003b40)=""/39, 0x27}, {&(0x7f0000003b80)=""/139, 0x8b}], 0x9}, 0xfff}, {{&(0x7f0000003d00)=@phonet, 0x80, &(0x7f0000005140)=[{&(0x7f0000003d80)=""/177, 0xb1}, {&(0x7f0000003e40)=""/175, 0xaf}, {&(0x7f0000003f00)=""/243, 0xf3}, {&(0x7f0000004000)=""/80, 0x50}, {&(0x7f0000004080)=""/4096, 0x1000}, {&(0x7f0000005080)=""/146, 0x92}], 0x6, &(0x7f00000051c0)=""/68, 0x44}, 0x3}, {{&(0x7f0000005240)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @broadcast}}, 0x80, &(0x7f0000005580)=[{&(0x7f0000005800)=""/82, 0x52}, {&(0x7f0000005340)=""/47, 0x2f}, {&(0x7f0000005380)=""/234, 0xea}, {&(0x7f0000005480)=""/254, 0xfe}], 0x4, &(0x7f00000055c0)=""/187, 0xbb}}, {{&(0x7f0000005880)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @initdev}}}, 0x80, &(0x7f0000007bc0)=[{&(0x7f0000005900)=""/154, 0x9a}, {&(0x7f00000059c0)=""/48, 0x30}, {&(0x7f0000005a00)=""/4088, 0xff8}, {&(0x7f0000006a00)=""/93, 0x5d}, {&(0x7f0000006a80)=""/4096, 0x1000}, {&(0x7f0000007a80)=""/138, 0x8a}, {&(0x7f0000007b40)=""/88, 0x58}], 0x7, &(0x7f0000007c40)=""/142, 0x8e}, 0x3}, {{&(0x7f0000007d00)=@tipc=@id, 0x80, &(0x7f0000007dc0)=[{&(0x7f0000007d80)=""/42, 0x2a}], 0x1, &(0x7f0000007e00)=""/60, 0x3c}, 0x7ff}], 0x6, 0x1, &(0x7f0000005780)={0x77359400}) [ 1576.351643][ T7175] xt_TCPMSS: path-MTU clamping only supported in FORWARD, OUTPUT and POSTROUTING hooks 23:34:35 executing program 4: r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mount(&(0x7f0000000000)=ANY=[@ANYBLOB='%'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2008}, 0x1c) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000380)=@raw={'raw\x00', 0x3c1, 0x3, 0x2f8, 0x0, 0xd0, 0xd0, 0xd0, 0xd0, 0x228, 0x228, 0x228, 0x228, 0x228, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0xa8, 0xd0}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00', 0x0, {0xffff}}}, {{@uncond, 0x0, 0x138, 0x158, 0x0, {}, [@common=@srh1={{0x90, 'srh\x00'}, {0x0, 0x0, 0x0, 0x0, 0x0, @dev, @loopback, @local}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x358) 23:34:36 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_DEL(r0, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="ac00000002090101001300000000000000000009700002002c000100140003006ed80a0ec3677685b4c446deabbe2e8d14000400000000000000400000000000000000000c00020005000100060000000c000200050001003a00000014000100080001007f000001080002007f000001e891871d58a4030c00020005000100880000000c00040008000500f2ff001f0c000200060003000000000008000500000000150800060000000000"], 0xac}, 0x1, 0x0, 0x0, 0x40081}, 0x40000d0) 23:34:36 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000000)=ANY=[@ANYBLOB], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1576.469326][ T7225] kAFS: unparsable volume name [ 1576.514664][ T7225] kAFS: unparsable volume name 23:34:36 executing program 1: r0 = socket$inet(0x2, 0x2, 0x2200000088) sendto$inet(r0, 0x0, 0x30, 0x0, &(0x7f0000319ff0)={0x2, 0x4e20}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KDDISABIO(r2, 0x4b37) 23:34:36 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) socket$bt_rfcomm(0x1f, 0x1, 0x3) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000000)=ANY=[@ANYBLOB], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) r2 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2008}, 0x1c) listen(r2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc) ioctl$TIOCSCTTY(0xffffffffffffffff, 0x540e, 0xff) [ 1576.570859][ T7292] xt_TCPMSS: path-MTU clamping only supported in FORWARD, OUTPUT and POSTROUTING hooks 23:34:36 executing program 4: r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mount(&(0x7f0000000000)=ANY=[@ANYBLOB='%'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2008}, 0x1c) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000380)=@raw={'raw\x00', 0x3c1, 0x3, 0x2f8, 0x0, 0xd0, 0xd0, 0xd0, 0xd0, 0x228, 0x228, 0x228, 0x228, 0x228, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0xa8, 0xd0}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00', 0x0, {0xffff}}}, {{@uncond, 0x0, 0x138, 0x158, 0x0, {}, [@common=@srh1={{0x90, 'srh\x00'}, {0x0, 0x0, 0x0, 0x0, 0x0, @dev, @loopback, @local}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x358) 23:34:36 executing program 3: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000000)=ANY=[@ANYBLOB='%'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) r0 = gettid() ptrace$setsig(0x4203, r0, 0x6895, &(0x7f0000000040)={0x19, 0x6d1, 0x1}) [ 1576.653023][ T7299] kAFS: Bad value for 'source' 23:34:36 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_DEL(r0, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="ac00000002090101001400000000000000000009700002002c000100140003006ed80a0ec3677685b4c446deabbe2e8d14000400000000000000400000000000000000000c00020005000100060000000c000200050001003a00000014000100080001007f000001080002007f000001e891871d58a4030c00020005000100880000000c00040008000500f2ff001f0c000200060003000000000008000500000000150800060000000000"], 0xac}, 0x1, 0x0, 0x0, 0x40081}, 0x40000d0) [ 1576.771135][ T7308] kAFS: Bad value for 'source' 23:34:36 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) r0 = getpid() r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x38, 0x2}, 0x0) sched_setattr(r1, &(0x7f0000000040)={0x38, 0x2}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x38, 0x2}, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x38, 0x2}, 0x0) mount(&(0x7f0000000100)=ANY=[@ANYPTR64=&(0x7f0000000240)=ANY=[@ANYRES16=r0, @ANYRESOCT=r2, @ANYRESHEX=r3, @ANYBLOB="b4a66a8cf9abdb9cdae5c7176f7a2bbe578c7aba0505d4fcd82d86ca25e3d03cb5037f079459d004fa43b32ddd00519b99dda2fc24c2283b76bf421ac2b2b0ed7df6b9b0664f02429e22d2d0a0c80a02f5380850240534b1c3f6eff803ed3f49fe3904adee23eb3232ce513aaf6953e474468d77e019db6cc1c54a4afd30624cbc0e74ab8ad5a31dfb224f8a3cb0fad3780f945911940fb203f9ee9edfa922fd31ec03c6dfc3c17697f45040fa46586f8dcd35bcf1d546f9a9ef84ce213bfc46a081171ecef365147c22d4949290813d0d221b447b3884c76b13b7c4d349dce95ec891fd1a2924ed56db32594c1894687a26a5a796351f96de9fd360719032466040e02434e6633e83d70e14bf6813646fbc5a226aa15d6134d624f800c25a339021bfc4ebf4f553d8330a19ca1599b408f376c185bbfc07826e480e6ed3a7f797cb4fba9548a8619c165edb7f72308be7d041ccf6e7c167d0087c4b54e0416e680aea4e134356cbf999e8bb6a4ed76830738f4749eac3739f0540ef886de742ce79ad2ebd386c0cb5670fd0fddf8d7d418234529e757f88a457436042cafdd43fe0f78b900d2c091e663fc385168f4ff5ec84dc3e6457b9a3a6fd670ca58bedf2d295c968e5de6ffadebfdacaad76940dd8574b7c18dd8ced5b81dc8d8d08d6951f1b48ee872a696d47241f6410320278fc9ea5ddca1db5ec007175c62a055e87941842af3b8eba36fb989c05e806606b10b3b7e005ad47cc6f32fe9bb05349d1fb707b3d7f53bbad7e8f58f238e7f0ca1f4893ab1220b9734d059a5700eb26cbd65e731842f452a46ec7a3df31d574181d5c97555ba1896c5cb9bd6e1ef9e531515d3a77d1839c4d9720ebc6809e98fbe3c5f054e8402ef97f640e9f3a8a8c6baf7a24a01aeebdb653321eefda0880207175d2f1e674e3cbf781d282aecc0a73fa339ba2a0b81eaa7628e4284cccf30d48311c91c5bfef000e5f42b1c4608e88f99a73ff2a968987f4e1add15f890034804a76e243519f344529bc0a2dfa33a28184e2201f36d8ae3ce5be8c876081e629792ddcfd3a2d625be603c8870e64ee7bc37d699e41b4a93d416bbc1f9a922cbc500917f53437a9bacabad8012ea6e2832e81aa4519296aa003c48e1ded616bed40ecb3c247bfcf654363a1cf2146b85c1c62bdcf007794a6a652b2eb69654c717df5a938d8d2f178cf3833127735b5f941917eb89a24617a707925828268a28c74c7dbd533b872719020ad20b32fbabba7b1e4493c186203982e2338ef9380e27100e09d21702bff61a0f297d1a04b6f2c0b1a9a4810fa29d30044b339b4dbb4c729826308882627c27dc56abb34fdf8964560e791b988e8c9ca90882d90011840e45dc39d368ec8e4691ab8a25879e2af07ae4f5007074416269b98aa3bb6d7d32258a0a8da30f29d2888895ca062deb50a3b08075994a21e6c1a58d70351725802e1c058e45aa7a44d11480d8c65c186b9eff6652f16689494674e963b7f3aceaa9a87d10784ec7d905296f4828187352e74dd2bb406f384a874d4d19a425601f92dda85ec78061c6d7db84af0fa65b32d3138f20ece8a14d5203a72e24669b122972b00669394780c2a79cc53641307b1472f90e03701c9835895107e4e024e52c30502b066689def2e0f5ebb69de568a42d4efc5dff2a241d2c70ceabda8078167bb24b46db4e6411e3e986a0538ef3ffb06005520461388fd6303b717c3e8ea2ea0168a39edf769051b1599407c3ce0fe4b80538ac1e7d4442339c3caefb4a0ee22321bfe881699d568a31e36e97276c310be535059d7c574547d6ae893fa46cffbf80767f3e5cf317ae65ffcebe6572c784ae0d93c5576ad9b48410caf3868fd41969a753f259fc2628239bd031ceecad06080436aaa0a17b217daacfbb5122cae0b8e0fedf74c2f8239bf1606d46a986e8e2f2ab971d88d174a77ad4b6eca2365709cc89944edd64fe1556574ea5c67b1556a079659062917db3740a5ffba738fee60467a656b527adbc9da6a640b22c47d97560cbb50db9775ab2ce7d4ffc21aa7e13daf2bd65349fdc2e4ff3a853a01e0862fdd2e0cc4a0a73bf67affca142ebe72c7b067c0a9b193bd72bf74cd336ab9788ed11b1ba1f4af967cb17c1c7e1fbcac52ec61d96c16c38433f6face3b36332d44d1895b4c0e1c7ed2fd12f5d9cc99e57a12d69c3030897a627ed95a2d60b481f031bd76585e0ae8783ccf431acaafd9a9bea66f2f4ff4c224bbb7e6b74d489ddf8b66c1376c9d38109126748e72ab9172e0933294745379b96105f01b34079f302e5911a406858a326e08b62bf153e9d6ce0783219aa4af3933045ec1889586055d2dac3b6c8b618f341f85e338b8da568426ab9d1e9a5dbf76d474989f43f553ca23d94023151e20dc6491e5a7b1f59d737a390825886f11df140538b529766c52844b10c62c432b9521d1b13a67731aa7ea588590f40c4efd2c47faa40ff5749134c056ba2fe2bfc11238d2361a1fe12cc14a2a00af1874d23bbef16ee59c9ef52d33a07801812d3a77628a5feaa0e12a13a79ae57922b6c23c0efbda21b92c8d9bd40033e7a13e4b6808fb44eaee6ee79ac2926df84a64b41dcd8f9b1e399a9092ea936812beb1d85ca508ea694625f5243b29da8ad4228307ea854dc5fbea49a6088711de3c0db4a7d4ec133b6e9216fd8a8b8b66817618c5352e75d12d252b45b41e6adbb15f719c029f57230bc52bfcf00ebea54864ac22ea5644b8fc45008f3e5eb4f9475874880122a42d53e24b17535b79e32b24f547fd0074d6dbaf0f4c0750539d36ba7faa376ba851f10fb03f5a9af21b92b816f1898206a56f0a73ae146f61c835b14db8a0d6e8045670d9fd863b3183094d24cc34fc4fcd712c9c7c9de29facdc0049d2fdd9984f234bc9cb817d9d3ae58167bfb2636ae5197e0f37d74841206f9db68d503cba4ce96a934e448593f05960b2189c72b4bd79bf89023cb7410374fce0d09ced4b477125fb69fe0157ed45b4aca797db3c18ad18af51714946595dd13479e1b61e32400ec0e5d638108c40bae70ed535a1952c9f508c55e89673debe465ce0ffdd4e7aebcb9b7403132cff6c16575350e7f502962bec345cacf7b6da8b21b15c01d52bdcd83323b2b12eb2a85d65a3352a435e813b5cbc5ae00416992dab72ee545dadaab6936da1f503d669bfdd6cc0012e574f3d5d7bc72553abc6d89bd5c23ae1fbf4301e4b320abe87ab85c2513f1add582193b23ea9504fa4e5b1b6b2dbae456be4a6d585c36a0ebdbc154e0ab3020fbb76cf15dc48aae1657ba33870edcbdeffc16867bc683d4d6e6dc9fe87f54cb0c17b9e54a4feb476b01a72ebebd28dd49ea581d42c3d675a7846379fc10ad3e7e666532f0a7702d81a802c0e32f6c6dcf9d82c56ec57c2680f1f0e4275bbd8d85ecdaa94e50a1fb1ca8b23ef0a1a208f03133a131ec3e0e0d793dc14eb7b1d17e80b7eb62edd16d1ddd8c9bb603eb92e1bf8bb66150fe780193ae175a6ff22fdc07483e1ba3590ed3b66503251b77199d6747ec5e747c0627a2f5f62dae8c08283d9ef6ab1d77da6624705c17dc3e40cf4824b2d6c3a6d6eb857e9c2f21a7b3726fc836f7cff2b5117fc3386e4f56c6dc0a338e60db78d7b749a2dafb726b289f47b30ae26d860a0c93d664db9b305f41e6cb629b0ce643c997b6d2cbb77923ae8726f7dd71e3072ffbc2669d46ffaa3209a79258fd682bec3d4e7a7e73ba0ff003b211eb6cce9435ac11935785a59f732b032d4aca8b1e85a813fdf719cdce05b090f049f2d773205c6ac5e7f2f08c143f21cee1a79fa79127da4c062bfd7994f8d1676ca5fc755ddb864780237c38e3ce4747db785ca5c86897f60969c566646ca4a2db05c6845524eb3c32bc532620c815a5a19cac1d1a822752667f34c9d382601d4ae7dbb9f21c18b3f62b8373a6d4f74646ec4037d13789f591164b9e6a3206f80891832244843789b1ff3f0a614ff2fa7222e2dddfa7562d7bc0e38cbeefb00f440eebca315a145a09d0b845f33ab0e9e501bdb360a881bd20ebae25c435bca32f1d6220f03711742eff6588e2e1991bbafe1dcb71d847e77a9ef4d53c4b44db7cee02526a4758a998296800ce3a710a7e120dba7ff6f1024e87a69156e02c50f1d56891763febab0cc3c7bdca1c470cc6cdd7be6a0cfc43454ccdfc93de147c0ecceefab9484688f92ef93753ed06143b331ba409c14572682d51ea9f58f137ef4b95ee5dcb397b1575c79503f7321368472c478656191287e039e9030b6164064397b8c5dcc127f40878250b1733920988f5e9333fdd577bb7fcf2045ec05a3418596e155dc33ff98ca92d4de5e87848f71994b5e2ab91f9b41f1b01b97e0e9ddb21b69444ba7b48f2da70e3f6dc1e73c015136d374041f885d8d08382315c075cdc23d7e0f4a9896f2c6d6df8f89366d5e44da67ed33095d6a2d7f8ab1880dbadb33f4b4510b636d165c0ef7fc9b5b6e5c5c9ac0d12441c0341f75871455378042c1a4e566bdc9d7ee6e8882242c76de81932293d02b76285e77644e114148ea9c4f7aa3c63899a44e6f0063b607d6966f8cb37f7c2b50ca33ee93b160ef170f9d751402b54acf80dccd51592764c027a6a1b9661c92094e333dd4594f77c063fca5ca3e11c0105887c5e1834ca430ba5fb38d09018c743f1820d1dec7e903805fe43b4b9775d7ae7e0e0b05ba69bd280ce11c6bd53cc99cee31d99e298c37e0f8b6ec9a11eee4e4cda4fd3175f2fab39e84c48cb9720fa7dbcbe03541427065f8a173f85eb366d7c098fb57ad888484794bd5b61d695bfd4fd86af74e0f134f9f828d1ddf8853fd4d10417fb959aa3be8b92d691629c772a6e14b0af7f1dc492a00713b0671c14d4594532196b2a6535c78cc2d0139cb84ba4ab1e44c571d4c00909693ab131a6c80eca57de0cdf029c7546dff223ee288f1a133b5b06dd6b7bc9531280a16aee64b3fd23bc107d138ea45758412d93349eaf13b541f378117b0be05b721cd5e46ca0fdf98ca1be39edfe24599024614dd375002c3ca0d91fea90a471271911f64d28d5fa1400b9d353aa08050a3bdf8adcd28039b18395d7786f1bed002869426163f704cbf5f10aaa5701b4d2b3a6de8825ed5b347b656332f2be2919e39b296292c7c546e61daffc48bd470cdd66fe6a6e0dee75d50c9091b5aa0b2e91d01269023b7c87ed39f84e8ebe1b8d6fe2494eefd2cd860a3365d5752fd7911cab8f51ab421b9cbdf2ede9b61d3e54026fa1eda4dcc77365628741599f6db779acfbd4b902a406d82c47c91daf784c7b470849900775706ed88cb5dbb08bf0a85acf8e4009930500cdc32135656024c4cd6e306c1c6e791f98713fa8f2adb41dcb121b773746080951503aad351d5e297f5bdbd2e5ef0d912067fee59860cd29bea634d38b4b9caa1a4008b5c8ac33ec25c5353663fbf91581b3aab4ea2369b723ed47a1f822bffd96004194058da620cd5c763ea98c0c480c30c4f70af2d0d3c92f4ad64e121587770b6e6bd34e31e1378cab7fa0a443e72e13ae4ffd76ce6a484eef4b2e598511a78d6eb38c675eeb3b9f0576ac1e054b5b4983bd585f3a6bbe3f139eb2fa2cb5a57d5e21cdfb6eb207194c0fbea62fb3c4426800e593299a6febab7d6a57affbbdba2bfeb4f1445d2971f96b588795080d164fe1ff8d70d1ab1bd95da7f31b0b12970858b251fe8d2f852d9300a90212d56073284925d740d991c7759e25c9a374ce38cc6bc2b", @ANYRES64=0x0, @ANYPTR64=&(0x7f00000001c0)=ANY=[@ANYPTR, @ANYRES32=r3, @ANYRESHEX=0x0]]], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='efs\x00', 0x10000, 0x0) 23:34:36 executing program 4: r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mount(&(0x7f0000000000)=ANY=[@ANYBLOB='%'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2008}, 0x1c) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000380)=@raw={'raw\x00', 0x3c1, 0x3, 0x2f8, 0x0, 0xd0, 0xd0, 0xd0, 0xd0, 0x228, 0x228, 0x228, 0x228, 0x228, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0xa8, 0xd0}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00', 0x0, {0xffff}}}, {{@uncond, 0x0, 0x138, 0x158, 0x0, {}, [@common=@srh1={{0x90, 'srh\x00'}, {0x0, 0x0, 0x0, 0x0, 0x0, @dev, @loopback, @local}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x358) [ 1576.825889][ T7308] kAFS: unparsable volume name [ 1576.829192][ T7336] kAFS: unparsable volume name [ 1576.854679][ T7336] kAFS: unparsable volume name 23:34:36 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_DEL(r0, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="ac00000002090101002500000000000000000009700002002c000100140003006ed80a0ec3677685b4c446deabbe2e8d14000400000000000000400000000000000000000c00020005000100060000000c000200050001003a00000014000100080001007f000001080002007f000001e891871d58a4030c00020005000100880000000c00040008000500f2ff001f0c000200060003000000000008000500000000150800060000000000"], 0xac}, 0x1, 0x0, 0x0, 0x40081}, 0x40000d0) 23:34:36 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) dup(r0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000000)=ANY=[@ANYBLOB='%'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 23:34:36 executing program 1: r0 = socket$inet(0x2, 0x2, 0x2200000088) sendto$inet(r0, 0x0, 0xfffffffffffffe95, 0x404c005, &(0x7f0000000000)={0x2, 0x4e20, @remote}, 0x10) 23:34:36 executing program 3: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$MISDN_TIME_STAMP(r1, 0x0, 0x1, &(0x7f0000000500), 0x4) mount(&(0x7f0000000000)=ANY=[@ANYBLOB='%'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) syz_mount_image$nfs4(&(0x7f0000000040)='nfs4\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000240)="2b191b656b4622d67d3b9950f1561cad5c36514e8e4a35e71e4c6fcf1d535ee3d117251dc66b7727102d66e91b0f960d31b4e6a41767dfbf825117900a27db41007527fc3f20783254d0997e57cb42717d9249b643cd7061dbb10f4915d135891a0141e942e1cf6461563d00b1df2f5402377b17cc892ffd5d2226dbe14c14c064ab25631fa75b6a0ad32a83f4ebdf376da31c188120b6e32c2fc5399ddc7e38466191718536f5d9d054e21d111d16557e15fc663e83ad94dee0e5ff8e786adfa6545d8df534aec5fb860a2ae9551998d97db6abc4c11fe1f165a141d5be7f51b5", 0xe1, 0x6}, {&(0x7f00000000c0)="f905968215ddf378eb8e3f9fa865affae0e3d5572b9048bb90f7ef485203b2b15483aa34ea90a45a9b329b1f73ceac2a1ce25abd15279842197ea6cec936e802586b159e1c0b41cc0d163746eeee0e68a59d0b1fe959f9e10011839b810a1b0ea25c27", 0x63, 0xffffffff}, {&(0x7f0000000340)="35649df1f52f4e69b5d8098dcb625ac2455a0bd11841a9d12ec2a354743f9e5a920629c1b880d93bf3c110b57bb12a06b8ea43be7edc4a33cf726a8cf3be18d6f08c5735abfee1ebd435e107ad59360e327c64aa0fa6a6eb11ba950d7cc467fbbc9ec925a3433e57cb0f2bd6d73af7a979ccf0cbafa7864fb3a79f72166aa989fbd325b2a39f0eefcd59a7c10f856a6546b6af408542743ceae6ef2f1373cce5268e0148de478f66e66d3894b179c01d4edccd5906708baa37c0bae5e9d833ba27208bd53e65bdc3634c8d1c7ae5f1a118ee94651f1d3a3d8f4a7f", 0xdb, 0x2}, {&(0x7f00000001c0)="be7ddec23c044993a6194544d11e4267710fd407954939d7d1323818e21a0cb2373988065ab9759254abe3ba22cb22573b1b2c8f7f3fbfd2", 0x38, 0x6466}], 0x10, &(0x7f00000004c0)='afs\x00') 23:34:36 executing program 4: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount(&(0x7f0000000000)=ANY=[@ANYBLOB='%'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) r2 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2008}, 0x1c) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000380)=@raw={'raw\x00', 0x3c1, 0x3, 0x2f8, 0x0, 0xd0, 0xd0, 0xd0, 0xd0, 0x228, 0x228, 0x228, 0x228, 0x228, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0xa8, 0xd0}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00', 0x0, {0xffff}}}, {{@uncond, 0x0, 0x138, 0x158, 0x0, {}, [@common=@srh1={{0x90, 'srh\x00'}, {0x0, 0x0, 0x0, 0x0, 0x0, @dev, @loopback, @local}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x358) [ 1577.091976][ T7426] __nla_validate_parse: 26 callbacks suppressed [ 1577.091984][ T7426] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1577.157247][ T7435] kAFS: unparsable volume name [ 1577.176691][ T7426] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. 23:34:36 executing program 5: mkdir(&(0x7f0000000040)='./file0\x00', 0x1) mount(&(0x7f0000000080)=ANY=[@ANYRES16], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1577.224262][ T7437] kAFS: unparsable volume name 23:34:36 executing program 1: r0 = socket$inet(0x2, 0x2, 0x2200000088) sendto$inet(r0, 0x0, 0x30, 0x0, &(0x7f0000319ff0)={0x2, 0x4e20}, 0x10) r1 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x4cb9, 0x10100) ioctl$VIDIOC_G_JPEGCOMP(r1, 0x808c563d, &(0x7f0000000040)) socket$nl_route(0x10, 0x3, 0x0) socket$kcm(0x29, 0x6, 0x0) 23:34:36 executing program 2: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000040)='dummy0\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000000)=ANY=[@ANYBLOB='%'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 23:34:36 executing program 4: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount(&(0x7f0000000000)=ANY=[@ANYBLOB='%'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) r2 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2008}, 0x1c) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000380)=@raw={'raw\x00', 0x3c1, 0x3, 0x2f8, 0x0, 0xd0, 0xd0, 0xd0, 0xd0, 0x228, 0x228, 0x228, 0x228, 0x228, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0xa8, 0xd0}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00', 0x0, {0xffff}}}, {{@uncond, 0x0, 0x138, 0x158, 0x0, {}, [@common=@srh1={{0x90, 'srh\x00'}, {0x0, 0x0, 0x0, 0x0, 0x0, @dev, @loopback, @local}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x358) [ 1577.327764][ T7448] kAFS: unparsable volume name 23:34:36 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_DEL(r0, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="ac00000002090101004800000000000000000009700002002c000100140003006ed80a0ec3677685b4c446deabbe2e8d14000400000000000000400000000000000000000c00020005000100060000000c000200050001003a00000014000100080001007f000001080002007f000001e891871d58a4030c00020005000100880000000c00040008000500f2ff001f0c000200060003000000000008000500000000150800060000000000"], 0xac}, 0x1, 0x0, 0x0, 0x40081}, 0x40000d0) [ 1577.354092][ T7437] kAFS: unparsable volume name 23:34:36 executing program 4: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount(&(0x7f0000000000)=ANY=[@ANYBLOB='%'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) r2 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2008}, 0x1c) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000380)=@raw={'raw\x00', 0x3c1, 0x3, 0x2f8, 0x0, 0xd0, 0xd0, 0xd0, 0xd0, 0x228, 0x228, 0x228, 0x228, 0x228, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0xa8, 0xd0}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00', 0x0, {0xffff}}}, {{@uncond, 0x0, 0x138, 0x158, 0x0, {}, [@common=@srh1={{0x90, 'srh\x00'}, {0x0, 0x0, 0x0, 0x0, 0x0, @dev, @loopback, @local}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x358) 23:34:37 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) fsetxattr(r0, &(0x7f0000000040)=@known='trusted.overlay.upper\x00', &(0x7f0000000080)='afs\x00', 0x4, 0x0) mount(&(0x7f0000000000)=ANY=[@ANYBLOB='#'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1577.458175][ T7514] kAFS: unparsable volume name [ 1577.476665][ T7515] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1577.532835][ T7515] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. 23:34:37 executing program 1: r0 = socket$inet(0x2, 0x2, 0x2200000088) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000319ff0)={0x2, 0x4e20, @local}, 0x10) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000000)={0x6, 'geneve0\x00', {0x256223db}, 0x9}) [ 1577.578229][ T7566] kAFS: unparsable volume name [ 1577.624472][ T7569] kAFS: unparsable volume name 23:34:37 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_DEL(r0, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="ac00000002090101004c00000000000000000009700002002c000100140003006ed80a0ec3677685b4c446deabbe2e8d14000400000000000000400000000000000000000c00020005000100060000000c000200050001003a00000014000100080001007f000001080002007f000001e891871d58a4030c00020005000100880000000c00040008000500f2ff001f0c000200060003000000000008000500000000150800060000000000"], 0xac}, 0x1, 0x0, 0x0, 0x40081}, 0x40000d0) 23:34:37 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000000)=ANY=[@ANYBLOB], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x10401, 0x0) write$P9_RREADDIR(r0, &(0x7f0000000080)={0x68, 0x29, 0x1, {0x3ff, [{{0x1, 0x1, 0x1}, 0x7ff, 0x6, 0x7, './file0'}, {{0x46, 0x0, 0x1}, 0x200, 0x5, 0x7, './file0'}, {{0x8, 0x2, 0x4}, 0x8001, 0x2, 0x7, './file0'}]}}, 0x68) r1 = getpid() setxattr$trusted_overlay_opaque(&(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='trusted.overlay.opaque\x00', &(0x7f0000000240)='y\x00', 0x2, 0x1) sched_setattr(r1, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x9}, 0x0) getpgid(r1) 23:34:37 executing program 4: socketpair$unix(0x1, 0x5, 0x0, 0x0) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mount(&(0x7f0000000000)=ANY=[@ANYBLOB='%'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2008}, 0x1c) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000380)=@raw={'raw\x00', 0x3c1, 0x3, 0x2f8, 0x0, 0xd0, 0xd0, 0xd0, 0xd0, 0x228, 0x228, 0x228, 0x228, 0x228, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0xa8, 0xd0}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00', 0x0, {0xffff}}}, {{@uncond, 0x0, 0x138, 0x158, 0x0, {}, [@common=@srh1={{0x90, 'srh\x00'}, {0x0, 0x0, 0x0, 0x0, 0x0, @dev, @loopback, @local}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x358) 23:34:37 executing program 1: r0 = socket$inet(0x2, 0x1, 0x2200000088) sendto$inet(r0, 0x0, 0x30, 0x0, &(0x7f0000319ff0)={0x2, 0x4e20}, 0x10) r1 = socket$inet6(0xa, 0x6, 0x0) ioctl$VIDIOC_QUERYSTD(0xffffffffffffffff, 0x8008563f, &(0x7f0000000080)) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2008}, 0x1c) listen(r1, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0xa, 0x2, 0x0) setsockopt$inet_int(r3, 0x0, 0x8, &(0x7f0000000040)=0xd3, 0x4) getsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000000140)={0x0, @rand_addr, @initdev}, &(0x7f0000000180)=0xc) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000440)=@newlink={0x68, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x21025}, [@IFLA_LINKINFO={0x34, 0x12, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x24, 0x2, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_FLAGS={0xc}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x9, 0xa}}]}}}, @IFLA_ADDRESS={0xa, 0x5, @empty=[0x14]}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x68}}, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000000)={@dev={0xfe, 0x80, [], 0x15}, 0x72, r4}) [ 1577.794829][ T7678] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1577.815676][ T7681] kAFS: Bad value for 'source' [ 1577.822931][ T7681] kAFS: unparsable volume name [ 1577.827929][ T7678] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. 23:34:37 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='.\x00', 0x80) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="94346d91aa9920f4860016f435"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 23:34:37 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6(0xa, 0x6, 0x0) r4 = socket$inet6(0xa, 0x4, 0x1) bind$inet6(r4, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2008}, 0x1c) listen(r4, 0x0) ioctl$void(r4, 0x5450) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2008}, 0x1c) listen(r3, 0x0) r5 = openat$drirender128(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dri/renderD128\x00', 0x8000, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r5, 0x800c6613, &(0x7f00000003c0)=@v1={0x0, @adiantum, 0x1, "6e87e949c54465c6"}) ioctl$VIDIOC_TRY_EXT_CTRLS(r2, 0xc0205649, &(0x7f0000000100)={0xfffffff, 0x400, 0x1, r3, 0x0, &(0x7f00000000c0)={0x9a0918, 0x7ff}}) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(r6, 0xc08c5335, &(0x7f0000000240)={0x401, 0x22, 0x1, 'queue1\x00', 0x400}) r7 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ioctl$LOOP_GET_STATUS(r7, 0x4c03, &(0x7f0000000000)) mount(&(0x7f0000000400)=ANY=[@ANYBLOB="301f64cb7bd539b46858bf6500f8aaa58f4562273288767b33ff32c5ffbb9075d17c5814d4c970caffe64019a9f587f29ce7a322c41979ee807d68e09fa15969bae0664a1b8144e1799fd75b62055d8bed77c76ed105d0d2260a8ca7ab0ebeeabe0bec2ea0e2bb105a1ea66ab93152f4e0d7e79da7805a7f828cdee63e52ff310cfeff882cca73a5c6d9f1ed479de6e65d327ad0bbbcc394acfdfff415dabed309d461e0269b480b699a8f8a41ff8000213ba754e8084a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 23:34:37 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_DEL(r0, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="ac00000002090101006000000000000000000009700002002c000100140003006ed80a0ec3677685b4c446deabbe2e8d14000400000000000000400000000000000000000c00020005000100060000000c000200050001003a00000014000100080001007f000001080002007f000001e891871d58a4030c00020005000100880000000c00040008000500f2ff001f0c000200060003000000000008000500000000150800060000000000"], 0xac}, 0x1, 0x0, 0x0, 0x40081}, 0x40000d0) 23:34:37 executing program 4: socketpair$unix(0x1, 0x5, 0x0, 0x0) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mount(&(0x7f0000000000)=ANY=[@ANYBLOB='%'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2008}, 0x1c) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000380)=@raw={'raw\x00', 0x3c1, 0x3, 0x2f8, 0x0, 0xd0, 0xd0, 0xd0, 0xd0, 0x228, 0x228, 0x228, 0x228, 0x228, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0xa8, 0xd0}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00', 0x0, {0xffff}}}, {{@uncond, 0x0, 0x138, 0x158, 0x0, {}, [@common=@srh1={{0x90, 'srh\x00'}, {0x0, 0x0, 0x0, 0x0, 0x0, @dev, @loopback, @local}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x358) [ 1578.059631][ T7737] kAFS: unparsable volume name [ 1578.060384][ T7762] kAFS: unparsable volume name [ 1578.087576][ T7769] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.0'. 23:34:37 executing program 1: r0 = socket$inet(0x2, 0x2, 0xf9) sendto$inet(r0, 0x0, 0x30, 0x0, &(0x7f0000319ff0)={0x2, 0x4e20}, 0x10) 23:34:37 executing program 4: socketpair$unix(0x1, 0x5, 0x0, 0x0) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mount(&(0x7f0000000000)=ANY=[@ANYBLOB='%'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2008}, 0x1c) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000380)=@raw={'raw\x00', 0x3c1, 0x3, 0x2f8, 0x0, 0xd0, 0xd0, 0xd0, 0xd0, 0x228, 0x228, 0x228, 0x228, 0x228, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0xa8, 0xd0}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00', 0x0, {0xffff}}}, {{@uncond, 0x0, 0x138, 0x158, 0x0, {}, [@common=@srh1={{0x90, 'srh\x00'}, {0x0, 0x0, 0x0, 0x0, 0x0, @dev, @loopback, @local}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x358) 23:34:37 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$FIGETBSZ(r1, 0x2, &(0x7f0000000000)) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000080)=ANY=[@ANYBLOB="25363f359fd59c436bc3f755dec2930d0ecb5f107d9f4717146d0f9c893eb26746ed30230cbbc349c5f25387b8ce7f166408c8ab6e9e16c79989e14963763d1ff0bb1d20c7f900"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1578.136423][ T7769] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. 23:34:37 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_DEL(r0, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="ac00000002090101006800000000000000000009700002002c000100140003006ed80a0ec3677685b4c446deabbe2e8d14000400000000000000400000000000000000000c00020005000100060000000c000200050001003a00000014000100080001007f000001080002007f000001e891871d58a4030c00020005000100880000000c00040008000500f2ff001f0c000200060003000000000008000500000000150800060000000000"], 0xac}, 0x1, 0x0, 0x0, 0x40081}, 0x40000d0) 23:34:37 executing program 5: r0 = syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x0, 0x40) ioctl$VIDIOC_ENUM_FREQ_BANDS(r0, 0xc0405665, &(0x7f0000000100)={0x40, 0x3, 0x80000000, 0x40, 0x2, 0x8, 0x4}) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000000)=ANY=[@ANYBLOB='\x00'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x100) mkdirat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x100) 23:34:37 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mount(&(0x7f0000000000)=ANY=[@ANYBLOB='%'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2008}, 0x1c) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000380)=@raw={'raw\x00', 0x3c1, 0x3, 0x2f8, 0x0, 0xd0, 0xd0, 0xd0, 0xd0, 0x228, 0x228, 0x228, 0x228, 0x228, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0xa8, 0xd0}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00', 0x0, {0xffff}}}, {{@uncond, 0x0, 0x138, 0x158, 0x0, {}, [@common=@srh1={{0x90, 'srh\x00'}, {0x0, 0x0, 0x0, 0x0, 0x0, @dev, @loopback, @local}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x358) [ 1578.373625][ T7821] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1578.400418][ T7821] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1578.431444][ T7826] kAFS: Bad value for 'source' [ 1578.438314][ T7825] kAFS: No cell specified 23:34:38 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x38, 0x2}, 0x0) r4 = getpid() sched_setattr(r4, &(0x7f0000000040)={0x38, 0x2}, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYPTR=&(0x7f0000001480)=ANY=[@ANYRESOCT=r3, @ANYBLOB="329f1af09662e5e9c67d73cd3673227fa7d9254b10c4556c1434273e66a23eb8d0ac140caef0473893b01e404354caea5a416840f2816c83ce3c255aac4545f1daf8284e0686ebda693b3defeecf25c32cb2c6d5c58009461fb0373dc83b18392d156efd5de477f72a60f35529a1862e96aa807700c8087acaa591e4967eb44c2a55a3043f5e94b67bad3e1c17dee54d241af9079a44ae82b04a20fc9162c36e09862cd89a226d1e07dc03d255b930f95918", @ANYRESOCT=r1, @ANYPTR=&(0x7f0000000000)=ANY=[@ANYBLOB="bad682c082748ffee2ff4b08410eb3266f6b4af37acd380b53e04ecca5890e0150532f7ca535abd8edb988044f3aeae90976edd2a3ab698e8769e0296d13593e317b003cca21", @ANYRES16=r0, @ANYRES32, @ANYRES16, @ANYBLOB="85da78e4f4d90dffc76d4e20a245f287f26b21c716c258bd460c5b017b9e2a446ff2e4bd840c35b15508a55756d0fcc0493d5d4b0879bcfe72cdd091c2b1ab4a81e36e4cdcd68ebec8380eb189843d7b3b51cacaa85e79966607f30628fc31b053a9a3162bb5601a856ecd2a999c3cc5bc27cab2091faf2dbb287a24d4cb189b5e5a3d99bdc36f5bed1d862c"], @ANYBLOB="402ec7a0eabf3fc13811b4e19512bc00ed6570bb6deeb8634491d1a223563f45be65503ae4c87599e645f4666bb7080436f90f087913474d8b", @ANYRES32=0x0, @ANYRESOCT=r4, @ANYRES32=0x0, @ANYPTR64=&(0x7f0000000440)=ANY=[@ANYBLOB="59fb080c29dda8ca199b03db29a0080f9c359143458a85b3ec35a4620038b562772b50683762d6df52687b04c7940ead2cecaf6f6f699fc6aef2393c33aa25e5cb49edccb7d55102c93887b6f8e5276849bf755ae58f4b5576d4317bb2e939d1c5437789e3cffa9e8bfd446529752c33d7f2e955737c5881036f889ba378fc9a6a1c2dcd6d6a526ecf5d92d8017b6cee12a536d1236fff89860ca78d64a98873f325f8c0091bfc1b84f05869f292d9c3ec6ce1a294417e10819c8de7423839aacd11ab40aa6750666593e200d5fada52002062ec0582516e276bd0e4e3dd1e904f6eaeabaa1efb48c3daf9cf301363e98650bde15a5d628fdb1f6345f2d6844757c855ec8f0b97502021f6e76ab50c942514479659c65755005cfe4bd8b4f3dcf499f27ee526940eba3be5a829bc5d43043999cc70139fa72fc6858920a87aa47583dcb058e75c8da5c5dea847f3954ac403eb22ec91209b9c2c279cde7989261bed90a754eabcfed5b340e7767ca745626835142675c029424d8d02f20d07775c6673dcf2750e02796b9f669ebdfa6541003baa6e9ac9edc60d6b2717a2c31fdaa91b62dd79b2715af00850870a464d371335381064ff7828fa8da4e01f4b777edcc3a206abfb30aedd031fd2e472e4ad21b8bd81c4261faeaa10bb784e3dab4c432305d984f6f0773dd4f4a23da710492674f76c79f75073c7d5fe28657aa79a969e296f06757f0e3e2e984e895da59a9380bbc9351d028ae4921abf8cf3763db4ed3f53362d7637cc7505307635d5eafd63ddbb51a87037cbfc9293c7b5960d849a610be5789bc377838ccb180a1e6d9da11873d1177d2074f1d7c34528ef46cd1014ff955c3936a008503de688265cac30d532da9ea9347a1541202cdf1f71b3d06c76fd541391be51559700bb34630bd5e246913cbdf5b3a7d311c3a2c5ae2fccf37fc09d92264dc4640c3e0a0dde500300f229ce29468c6cba3ac0db0b91ae9d18070a028a766c5fb6190c53236a6732371e5e2cffa03678a798cf7fdd00dbee2528d433f57c41821137e43c505082154774d90e7dfd1ecb399d2bb09b3541e67e1368957c40cb30c791012866137c39326bed16f71b9c2570d088332bb745d32a221a9b82956ce467159adff396a0a1f2c1a5a455e207b159e34e07854499a90efbb6996c4a309b2ca5f6b13ce7ca65f5bf6d7554bb27bc7662505f61e7c28931240a21379e175c5b8cd0d94d048d6369da57ea5c9535ebe10530c27dc04e2a16fcc6e859e41a223ffe7e6fe4590a7f418015a484d9174872fd12a530b840bc2dcaa31ee183d35befc6a70d66c99952b8849f5c3abf4deaa2dd966526fa6ff758ebae28a4dc8774e337e1053e74c6c3c48ec83345d8046f51c42184af89de4425ad2d61a56a3f9d16649234c1dd3c855dbff1c1f903e8689ab4fb0317f96be4f3c0274a686e056f5244e479e7ae6b79f7e312e1be76ce7010e7dd79a743d71e3fdd661ec4d41fbbf855436ce14c6f0254ef49394a2da6285cb552452b37baa57b76b8961b93b7fc54968b5e50abb8911588f3060c33202fc3921f9d4bd385f4d4fb34ec8392e9bf0affc0f5f9f4687e5366410dac1b31311be87f461702f1ccb79f08cd22290b3a1b573a06ad7a232ce667a5362025e1acb507b4157c69f36c8b26f9b068fb5da3138a083012ce59582fffe1213f5674aa1f34ef965333d9ad524ee0d993dbc89e278966bcc1d22b4429338a575c1ef2c9940f170076f1453339c1e2dcc5032a5907527f56e8bb5ec18bb7e9eb56581213aeda0657e3f0aa30051d5d84e747c74c75d8bf08e268fd6cd71d8f5190f4dbc0a91320f00a964b838102e59d572bd6848a1d3b00e30f760f3d9e0a66befb4dc653c7d4216dbc3b942a29223eb68bb0b86041f2a295ae4c021a548535943a5ef1997f472694919237a47e1d7047d864e8c0c4bb86b1c80cb85fc2122c081fb85a909233ebac3fc893a16d02c4a319009946b5c872ddb7a3e48d5d435db02ada641e6a5ec04a472431279c01118151c00d51abb8f1fc47cfe92bf89b4d6c8fb7d40663ea6918d5578b7d3a2118c056b2d037ef0d3d9be1974288a9383c6ec8c6a9a3584ce47c10fd4240f01ce33c764032c7127ffc59817186b34e6566b5dc4b9c5719f8b00e28788c8b2ed6cb6e2ab401d955e86d217c4362b4a47a974335316a2a0b3de503516056588645332e1768bef88b195e64d1590f114a362a755b9b2748aba2eb89c1539bbc6bffb0d0fe99642ae5fc95feaa4298541cea1b429ef34a6c5b450a9c019340c3429eeda49aa9b1357ef92ed4ff0b891ab65fdce7154875cf9e3e62c989e64b96c6e1d70127dab1b0d4ff14371b411d82eaa64cf149425c4f99faf4aa985c1e5b46f35ff167262efba9c8af6b03d839b91ba30e45a18084a0704904c4823ba3e460e51fe0564fc1d4c659e35e8154abf1bf48cd34f187ceb9b636243f8cad4ee290765b667903e201de5ef95e9f3ce3aae5273c081e22f6397b27fb654dedfcacadffcd61137f5e275f4a0a7e6881a78c6c4f1521e2d5d335c9ec3ca1fa2a95b1957d0d720cd359f491c8ffb82f958a89e2dda25221e1fdcd108c9050a90493d0f426fb2d9fb4a37ac8018ba6e882de53a6565508e211473f313ddf86a8da47b6b1a0d2630aeb69222c632773996d6a5e52932fe27f5b53c5556e04c51f838d8b0054b607bd9ad2930a9e2172409824e9a02c9fd24fee2d7984f56dd173b06c46a4295cd7a101a29e413b90a2f69a7772e07b889a5058c0ae42cf5d40fd3a7cb7d78beae7aa8941495bf6fbccd03b9a66f68ced3f99b0e05407b206222614f518f383ebe6348bce83812914dbe3703bab25ee278540de214c609ea84082d16480abf7a88dc92b74a2f26d2443343619f548fb6c5c19e886c211c963e0d5f3fee2ad840f6bd4b30cc34306871d393db23ee9d2ecd539b577b140754410b671d67aa5c51a189253a8104c0de611c130b8e1355bdcd7783c0cbc727810b31f750d0c2971c580bde4eb9d279f5e5cc90b8feb3049e3079475167560126778d3efc5f0a486c2474a3d53dedeb4d2d51f2f95d7c22ac911a2e5e37e36f627e3c5dc558fe950fc9e6cb31813751af317130b048830c06bfbcbec6efde34cd89135375db911cd1f2243018e3ea771a35c4c87553316b37200302059df87bec084b31cd16147cd8d15194a61b4531ce922644396dfbf3f75342890da677e75d4ac3802cb819f85e08eab6fd9ca150f09ac19bc8a8024ba3d4a0e4dcce5ebf631a77ed81b7ada68dcc2acdabc4c1cf527e53481e5be2a7ab801f3a26cc3fa674614cb881f43b5443866d81cb7550f3ad4e34d9a1bbca1e2ce383b888d2438487233ffbedc66e102bdf057d7646b077df67835c7017a5c3e93a855911ab48a634159865fbc24693dbbf0daee69a73d60cb960e5d79a7ce46d8e328470a646a6f047cd9b2ff89fdbd5869c6455fab80c19c1065a42ffbe63f59dfafb3f34a5055a19cf25ac2b628022376e6340f9a610abf71fea095af4d41af9e7d97c7e4acab36c3dfd9125587cdbb2f9b03b3647da830011dd806728de7a0dc0347c3e6a9c0ee5cd2d1893a081c171735ca2e1ca20e18ca46af75abfd281f30e76b1d1c9a725007e79574620b0ea2e7d4509627dce6c302e2193f1207c8a775738c2fc3fe22184ef92a9ad8411561ec8cc126eded0e432a8406334532dcca7945f96817f4b87b57b4b21bc7b34a6f9764af2b7f915c8ba76a19b325614d5fd6d8dd9a76356b5ecc6b34a9aefe6caa685b62545dba11817a96399ea6f75612f5a5529fa91d81718107e4d71e6de95f6b37d05757715081c6ac929435e5da95d1a6d202d2239075bc8573b1586dacbf17c49a511beaaeb16ba88146f3ff0c09b8ebfdaa70adc8829361c49039360f88fadcd175a6987f8156f274b0d48050df5d157e82e95aa58bf6de7268efc38a850c901c5a39009dd80168d75abafb7418e203a4c812687aa04d02a46987791d4a633276a9c58d3dcf9c8e3cc88b157e0fd2072e301de69c6b771eb47b87df95ddc1c0d44082e0e8447d9190095a18b74a8a7d6628a563c1ba7b2d5088d3cb126b75e81ec47e26fe6494143f323f81f0957ee430951676c3040a8086938d8d3d0f0cb1942ab66b5c50924d51f2d429b76d9e0bc7254ec401254c02b67c53eb2fbdeb115da8afe3f165be1c23a079003b219bf4c4f590a0e484808489f87638a2caeca80a3e0a4f1a08aa8386ed0d97005415a8de4edb7f2b0737ca64a6b031bbfce4a654a5e7d0785f90f0da6b5f800ef3b042e736e0159dfb5b08f2feae92d8baa6a3742a02abf7b5f19a0d6d4e2e1d6a34c08467aa8ea23aca5c2b8d82bd1eeaff17123f291c28ec9eee9854b6c828bcc8faf95a5671c401ae75a1924f58d1aeaad5bb93aec5179e884f2427086e8072e10884baea43ce45174e1bca127630ce8055ac82cbb37b8c012ba2fc85fcea4353e1063b5ef176064c2988a13e4e23d869cf7a5871fd3ac5e624bf989a5634b38298e05829d984aa49bde82a34ea8ba4fa6031b5135d072baa5236fcaf30b5a802e47a749c675f491a7137ea54c370d2864b1f4487ec2c8bef9938ae59c39779a2ca43807375aee774df2c35ec7a4269af77fc3b09ed00a69e70680b9d0744b0a23645fdc26942fa6775c8f9d948df792a819a3ea7319663a8ed9d27e38827a96079a5464e9220b33a644c66dbfaee342ecf129f51593f0de24ba31f8c8fc7d6d5fcc282ecf29fbb4e627ed28ac65023989a70a0f3d5f21af323267612a0372ec32958a4ee53510d7cfbb713ea93f48d02fe63bdbb881bd0aeeea8d6c6878f13d1241dbeeb4653c98ea5952a75a2464e75c98bccc89cc0139488f213b7bc5df6df98ff983f0e69b1e49aa047782f34f67357d96338111e013cd9c64242eb3415216189d618d4178358fadb0ac7c29c2b9121a8f89a9bccf35d5aa3766c4558efb7b7e035ba4af0370c752dc63c97d3a32a36f4faecd0c54134c5d1005fa3e7e174779c4bff0b124ca855edbcf6ccc42fc2ffdef4e1b4cf01168a1641fa14697a6eee772adf8bb617e831e6135f865213526ab7b096689bcb37c1525afedc4f03dd0c1eed1e7d6176d847f15350488cac7c29a1a953655230ac28cedd5299b901657fd050b590d04e23e622d408ea5aded237545a4fe50942a88a69064208fd294e87660e4b5dc3e62dda7b2b93e4718e2ae46347db1333f2b727f94bf29e5f0f486f24e13e8c9d6f88351a426c896a08cc9a2bad5e56acf10108c2a9b5f8a215fff811c4a60757354f58a4d9b873b9b46acee3558a946018affbf76006b205f00c975c07e911a1181de6fce1c58f1dc2be32105133f510d75ccc0dc71c714b563c0a8e1dd3707b0ffe1cf006eaea47e241a52cafa90736bc9fdf519dedac75c6143c747b5c40fee9724e746b056ae7f0c58d32fe170b17a5b021e03fd7f7fff5de95eb2b25444f10aa63f63ed44145fe7ada4828da1f23ffe740528f5b94f92fe2c2276413955fb9a67521a7263112e483ffbe77814cf4783bc00d065d2f93bb57787ea2ed709944a7f4f04401303d2cf86026b7688b6aa532d0f908bb5abb478aec66503a7acf815536f9831243c2f7a9b80f18b630a79192afac2ce3a4b72e32243f1900af6428ecb91cad3caa86a51462b5cc4cc2d80623f82e6a6047868bd9888dcf9cde5defbe44256d034d007bba976324a3aa2536a110f9b49e2386fd5abdca4f5f9ca7f472", @ANYPTR64, @ANYRES32, @ANYRES32=r0, @ANYPTR]]], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 23:34:38 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_DEL(r0, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="ac00000002090101006c00000000000000000009700002002c000100140003006ed80a0ec3677685b4c446deabbe2e8d14000400000000000000400000000000000000000c00020005000100060000000c000200050001003a00000014000100080001007f000001080002007f000001e891871d58a4030c00020005000100880000000c00040008000500f2ff001f0c000200060003000000000008000500000000150800060000000000"], 0xac}, 0x1, 0x0, 0x0, 0x40081}, 0x40000d0) [ 1578.515520][ T7826] kAFS: Bad value for 'source' 23:34:38 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mount(&(0x7f0000000000)=ANY=[@ANYBLOB='%'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2008}, 0x1c) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000380)=@raw={'raw\x00', 0x3c1, 0x3, 0x2f8, 0x0, 0xd0, 0xd0, 0xd0, 0xd0, 0x228, 0x228, 0x228, 0x228, 0x228, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0xa8, 0xd0}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00', 0x0, {0xffff}}}, {{@uncond, 0x0, 0x138, 0x158, 0x0, {}, [@common=@srh1={{0x90, 'srh\x00'}, {0x0, 0x0, 0x0, 0x0, 0x0, @dev, @loopback, @local}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x358) [ 1578.639230][ T7943] kAFS: unparsable volume name 23:34:38 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_DEL(r0, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="ac00000002090101007400000000000000000009700002002c000100140003006ed80a0ec3677685b4c446deabbe2e8d14000400000000000000400000000000000000000c00020005000100060000000c000200050001003a00000014000100080001007f000001080002007f000001e891871d58a4030c00020005000100880000000c00040008000500f2ff001f0c000200060003000000000008000500000000150800060000000000"], 0xac}, 0x1, 0x0, 0x0, 0x40081}, 0x40000d0) 23:34:38 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="6c0000003100040028bd7000fedbdf25000000002c0001000c0017000c000300018000000c000f00080001006e6174001000010009000100766c616e000000002c00010010001c00090001006373756d000000000c001e0008000300000000000c000f000800030005000000"], 0x6c}, 0x1, 0x0, 0x0, 0x4000040}, 0x8000) mount(&(0x7f0000000300)=ANY=[@ANYBLOB="6f0c66500b529c19e32b8363b59b20dd98e644a1fa29ba00b985716156c4265723"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', &(0x7f0000000280), 0x400) [ 1578.682280][ T7945] kAFS: unparsable volume name 23:34:38 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mount(&(0x7f0000000000)=ANY=[@ANYBLOB='%'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2008}, 0x1c) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000380)=@raw={'raw\x00', 0x3c1, 0x3, 0x2f8, 0x0, 0xd0, 0xd0, 0xd0, 0xd0, 0x228, 0x228, 0x228, 0x228, 0x228, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0xa8, 0xd0}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00', 0x0, {0xffff}}}, {{@uncond, 0x0, 0x138, 0x158, 0x0, {}, [@common=@srh1={{0x90, 'srh\x00'}, {0x0, 0x0, 0x0, 0x0, 0x0, @dev, @loopback, @local}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x358) [ 1578.785971][ T7954] kAFS: unparsable volume name 23:34:38 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) connect$netlink(0xffffffffffffffff, &(0x7f0000000040)=@unspec, 0xc) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0xaa, 0x0, 0x7f, 0x81, 0x0, 0xffff, 0x84880, 0x8, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x101, 0x2, @perf_bp={&(0x7f0000000080)}, 0x20002, 0x0, 0x81, 0x6, 0x3, 0x123, 0xce}, 0xffffffffffffffff, 0xb, r3, 0x1) r5 = socket$can_bcm(0x1d, 0x2, 0x2) r6 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$FS_IOC_SETFSLABEL(r6, 0x41009432, &(0x7f00000002c0)="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") r7 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r7, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2008}, 0x1c) listen(r7, 0x0) ppoll(&(0x7f00000001c0)=[{r1, 0x2420}, {r1, 0x2000}, {}, {r4, 0x2011}, {r5, 0x230}, {r7, 0x20c}], 0x6, &(0x7f0000000240), &(0x7f0000000280)={[0x7]}, 0x8) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000000)=ANY=[@ANYBLOB='%'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1578.848858][ T7957] kAFS: unparsable volume name 23:34:38 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_DEL(r0, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="ac00000002090101007a00000000000000000009700002002c000100140003006ed80a0ec3677685b4c446deabbe2e8d14000400000000000000400000000000000000000c00020005000100060000000c000200050001003a00000014000100080001007f000001080002007f000001e891871d58a4030c00020005000100880000000c00040008000500f2ff001f0c000200060003000000000008000500000000150800060000000000"], 0xac}, 0x1, 0x0, 0x0, 0x40081}, 0x40000d0) [ 1578.907028][ T7961] kAFS: unparsable volume name 23:34:38 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) mount(&(0x7f0000000000)=ANY=[@ANYBLOB='%'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2008}, 0x1c) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000380)=@raw={'raw\x00', 0x3c1, 0x3, 0x2f8, 0x0, 0xd0, 0xd0, 0xd0, 0xd0, 0x228, 0x228, 0x228, 0x228, 0x228, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0xa8, 0xd0}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00', 0x0, {0xffff}}}, {{@uncond, 0x0, 0x138, 0x158, 0x0, {}, [@common=@srh1={{0x90, 'srh\x00'}, {0x0, 0x0, 0x0, 0x0, 0x0, @dev, @loopback, @local}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x358) 23:34:38 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) syz_mount_image$reiserfs(&(0x7f0000000000)='reiserfs\x00', &(0x7f0000000040)='./file1\x00', 0xffffffff, 0x2, &(0x7f0000000240)=[{&(0x7f0000000080)="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", 0xfd, 0x40}, {&(0x7f0000000180)="ced94b3da5e9da2cf5fd2fe66aa57e40517158ac4027f6022d72cc13ab0d44b0fc11f0a17a7453131c26efc53350b7410c132c251116919d9920cc90ae390cf5ca8a2001a4a924dd15079caabb0457b335343b9d37cb94bc5075395c52416737685818", 0x63, 0x800}], 0x3009010, &(0x7f0000000340)=ANY=[@ANYBLOB="6a71666d743d7666736f6c642c636f6e762c6a71666d743d76667376302c757365725f78617474722c6e6f757365725f78617474722c646f6e745f61707072616973652c7065726d69745f646972656308d96f2c007685e1df10923d53489dbe7c13bd59c42246b763e1ced90612d644e1bc8223facf39bdd36a2b08993116b5487a095c02ac21"]) [ 1578.930826][ T7963] validate_nla: 62 callbacks suppressed [ 1578.930842][ T7963] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 1578.955897][ T7964] kAFS: unparsable volume name [ 1579.001680][ T7963] netlink: 'syz-executor.0': attribute type 2 has an invalid length. [ 1579.043917][ T7963] netlink: 'syz-executor.0': attribute type 2 has an invalid length. 23:34:38 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) mount(&(0x7f0000000000)=ANY=[@ANYBLOB='%'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2008}, 0x1c) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000380)=@raw={'raw\x00', 0x3c1, 0x3, 0x2f8, 0x0, 0xd0, 0xd0, 0xd0, 0xd0, 0x228, 0x228, 0x228, 0x228, 0x228, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0xa8, 0xd0}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00', 0x0, {0xffff}}}, {{@uncond, 0x0, 0x138, 0x158, 0x0, {}, [@common=@srh1={{0x90, 'srh\x00'}, {0x0, 0x0, 0x0, 0x0, 0x0, @dev, @loopback, @local}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x358) 23:34:38 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000380)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x14, r3, 0x1, 0x0, 0x10000}, 0x14}}, 0x0) sendmsg$SEG6_CMD_GET_TUNSRC(r1, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x70, r3, 0x100, 0x70bd29, 0x25dfdbfd, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0x81}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x3}, @SEG6_ATTR_DST={0x14, 0x1, @ipv4={[], [], @empty}}, @SEG6_ATTR_SECRETLEN={0x5}, @SEG6_ATTR_SECRET={0x18, 0x4, [0x0, 0x6, 0x7, 0x8, 0x1ff]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x400}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x70}, 0x1, 0x0, 0x0, 0x8000}, 0x4000) r4 = socket$inet(0x2, 0x2, 0x2200000088) sendto$inet(r4, 0x0, 0x30, 0x0, &(0x7f0000319ff0)={0x2, 0x4e20}, 0x10) [ 1579.103562][ T7963] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 23:34:38 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_DEL(r0, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="ac00000002090101000003000000000000000009700002002c000100140003006ed80a0ec3677685b4c446deabbe2e8d14000400000000000000400000000000000000000c00020005000100060000000c000200050001003a00000014000100080001007f000001080002007f000001e891871d58a4030c00020005000100880000000c00040008000500f2ff001f0c000200060003000000000008000500000000150800060000000000"], 0xac}, 0x1, 0x0, 0x0, 0x40081}, 0x40000d0) 23:34:38 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000100)={&(0x7f00000000c0)='./file0\x00', r1}, 0x10) llistxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=""/18, 0x12) mount(&(0x7f0000000000)=ANY=[@ANYBLOB="04"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 23:34:38 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) r2 = syz_open_dev$video(&(0x7f0000000180)='/dev/video#\x00', 0x0, 0x0) ioctl$VIDIOC_TRY_FMT(r2, 0xc0d05605, &(0x7f0000000080)={0x1, @raw_data="a3e9aa51de0c9acc42473132cd09fb8d0d383ec49b46b5dfcf06513bd1a74666414f70c0ed43929f63dc48cd0d0355a23143777f8cc1a0eab52c5b8e7f154d9cdc15505c9a2b9fe914dc2bb3ac7c1a45c5528ebd34e2cfd35c3ba75403b54d5f4f0521e971dbb75b9be1791e34157ede123917cccc23512c23f0aee0e67127e3730f0370f5b1a0e19096612a57a4a8796cb52e6f804e1c5812ba058902496d2213db711331e3a3cbe492b6d707936ed1fbe72cdaabdba154ce00"}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000280)='nl80211\x00') sendmsg$NL80211_CMD_JOIN_MESH(r5, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000300)={&(0x7f00000004c0)=ANY=[@ANYBLOB="1c0000000d2949835168f19675afab9aafe2d52bc136befb27c15ec1100c017dc82984d10506d9758dcdb8244cadd7438ff137df159ef296d3cfe4a0db5cbd3b7582efd18ed583d43d3e536a70bffeae47097c3f42911eb3d26019a5de1464", @ANYRES16=r6, @ANYBLOB="3d062dbd7000fddbdf25440000000800010003000000"], 0x1c}}, 0x2004c080) sendmsg$NL80211_CMD_GET_REG(r4, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0xa0}, 0xc, &(0x7f0000000080)={&(0x7f00000001c0)={0x7c, r6, 0x300, 0x70bd28, 0x25dfdbfe, {}, [@NL80211_ATTR_USER_REG_HINT_TYPE={0x8, 0x9a, 0x2}, @NL80211_ATTR_USER_REG_HINT_TYPE={0x8, 0x9a, 0x2}, @NL80211_ATTR_USER_REG_HINT_TYPE={0x8}, @NL80211_ATTR_REG_ALPHA2={0x7, 0x21, 'bb\x00'}, @NL80211_ATTR_SOCKET_OWNER={0x4}, @NL80211_ATTR_REG_RULES={0x3c, 0x22, [@NL80211_ATTR_POWER_RULE_MAX_EIRP={0x8, 0x6, 0xfffffff8}, @NL80211_ATTR_POWER_RULE_MAX_EIRP={0x8, 0x6, 0x3}, @NL80211_ATTR_FREQ_RANGE_END={0x8, 0x3, 0x1}, @NL80211_ATTR_REG_RULE_FLAGS={0x8, 0x1, 0x7}, @NL80211_ATTR_FREQ_RANGE_END={0x8, 0x3, 0x40}, @NL80211_ATTR_DFS_CAC_TIME={0x8, 0x7, 0x8}, @NL80211_ATTR_POWER_RULE_MAX_ANT_GAIN={0x8, 0x5, 0x8}]}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x3}]}, 0x7c}, 0x1, 0x0, 0x0, 0x20004880}, 0x208c800) mkdir(&(0x7f00000000c0)='./file0\x00', 0x100) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r8 = dup(r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x1f, &(0x7f0000000380)={0x0, @in6={{0xa, 0x4e20, 0x6057e402, @dev={0xfe, 0x80, [], 0x17}, 0x5}}, 0x200, 0x8dc}, &(0x7f0000000440)=0x90) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r8, 0x84, 0x7c, &(0x7f0000000480)={r9, 0x8, 0x2}, 0x8) mount(&(0x7f0000000000)=ANY=[@ANYBLOB='%'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 23:34:38 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) mount(&(0x7f0000000000)=ANY=[@ANYBLOB='%'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2008}, 0x1c) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000380)=@raw={'raw\x00', 0x3c1, 0x3, 0x2f8, 0x0, 0xd0, 0xd0, 0xd0, 0xd0, 0x228, 0x228, 0x228, 0x228, 0x228, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0xa8, 0xd0}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00', 0x0, {0xffff}}}, {{@uncond, 0x0, 0x138, 0x158, 0x0, {}, [@common=@srh1={{0x90, 'srh\x00'}, {0x0, 0x0, 0x0, 0x0, 0x0, @dev, @loopback, @local}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x358) [ 1579.297601][ T8054] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 1579.320640][ T8054] netlink: 'syz-executor.0': attribute type 2 has an invalid length. [ 1579.328835][ T8054] netlink: 'syz-executor.0': attribute type 2 has an invalid length. [ 1579.345165][ T8033] kAFS: unparsable volume name [ 1579.371831][ T8086] kAFS: unparsable volume name 23:34:38 executing program 1: r0 = socket$inet(0x2, 0x3, 0x1) sendto$inet(r0, 0x0, 0x30, 0x0, &(0x7f0000319ff0)={0x2, 0x4e20}, 0x10) [ 1579.404307][ T8094] kAFS: unparsable volume name [ 1579.406256][ T8054] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 23:34:39 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nvram\x00', 0x498c00, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x4faf0b02b9db1d77) mount(&(0x7f0000000000)=ANY=[@ANYBLOB='%'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) timer_create(0x1, &(0x7f0000000540)={0x0, 0x6, 0x1, @thr={&(0x7f00000003c0)="4e4b54a8de8efd82c29929e52a020a35612eae89b4e1eacb0b047d81a3ebb07093c0f87f485130d8ac1f5b6ab58947541bfd4a05ab7cfe6db0e5d7248fd39cf5c0102cb1236e423e8433b538367042ea98c0682762ecfbc31b34cc8d1e7aef1b332c528eb70fa9e9ab6efcaa403ae8ba6ab08277ff23ac369006eae4ee3597758776b690dbc8c41e11b3538f1d67dbb324bf03ed9eed924fae568914de8fbdd39e938bbc06defd89c437aec9e0a987e6d9463739678c1b1760df26739c6156a1f22f8e46bad21e7de334906b83e9c0d23750ba37f24a99c1b5810c6e52390dbc3700", &(0x7f00000004c0)="ebe5678a5b6af7cde123d6fa1f635778f9214f7c424e9cd4585ea0acf2fb8b01fa398e02efd792df4bb39fc4a339808ddbc90e602e70dca951441298ca982370bed486b77b225884546eb34010292bd35b98a6443f01283d2f447e7d824057897e94c752adbdf5f40f8265"}}, &(0x7f0000000580)=0x0) timer_gettime(r3, &(0x7f00000005c0)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r6, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2008}, 0x1c) listen(r6, 0x0) ioctl$VIDIOC_TRY_EXT_CTRLS(r5, 0xc0205649, &(0x7f0000000100)={0xfffffff, 0xfffffffc, 0x6, r6, 0x0, &(0x7f00000000c0)={0x9b0940, 0x9b44, [], @p_u8=&(0x7f0000000080)=0x8}}) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r2, 0x84, 0x75, &(0x7f00000001c0)={0x0, 0x8}, &(0x7f0000000240)=0x8) r8 = socket$inet_sctp(0x2, 0x5, 0x84) r9 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r9, 0x84, 0x14, &(0x7f0000000080)=@assoc_value={0x0}, &(0x7f0000000040)=0x160) setsockopt$inet_sctp_SCTP_DELAYED_SACK(r8, 0x84, 0x10, &(0x7f00000000c0)=@assoc_value={r10}, 0x8) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r7, 0x84, 0x70, &(0x7f0000000280)={r10, @in={{0x2, 0x4e22, @multicast1}}, [0x9, 0x800, 0x8001, 0xf82c, 0xffff, 0x20, 0x100000000, 0x400, 0x7f, 0x9, 0x78, 0x1b9400000, 0x6, 0x7fffffff, 0x4]}, &(0x7f0000000380)=0x100) [ 1579.478889][ T8097] tcpmss_tg6_check: 13 callbacks suppressed [ 1579.478897][ T8097] xt_TCPMSS: path-MTU clamping only supported in FORWARD, OUTPUT and POSTROUTING hooks 23:34:39 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000000)=ANY=[@ANYBLOB='#'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) chdir(&(0x7f0000000340)='./file0\x00') chdir(&(0x7f00000001c0)='./file0\x00') r0 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000240)={0xf0, r0, 0x800, 0x70bd2a, 0x25dfdbfd, {}, [@TIPC_NLA_MON={0x2c, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x81}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xa0}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x2}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xff}]}, @TIPC_NLA_SOCK={0x3c, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x7}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x10001}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0xffffffff}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x80000001}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x1f}]}, @TIPC_NLA_MEDIA={0x28, 0x5, [@TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}]}, @TIPC_NLA_MON={0x34, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x7ff}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x5}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x5}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x8}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x4ac}]}, @TIPC_NLA_NODE={0x14, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x10000000}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x8001}]}, @TIPC_NLA_LINK={0x4}]}, 0xf0}, 0x1, 0x0, 0x0, 0x841}, 0x4000014) lgetxattr(&(0x7f00000006c0)='./file0\x00', &(0x7f0000000700)=@known='system.posix_acl_default\x00', &(0x7f0000000740)=""/178, 0xb2) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') sendmsg$TIPC_NL_MON_PEER_GET(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000009c0)={0x14, r4, 0x701, 0x0, 0x0, {0xd, 0x0, 0x1a0ffffffff}}, 0x14}}, 0x0) sendmsg$TIPC_NL_BEARER_ENABLE(r2, &(0x7f0000000680)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000640)={&(0x7f00000003c0)={0x24c, r4, 0x10, 0x70bd2b, 0x25dfdbfb, {}, [@TIPC_NLA_BEARER={0x38, 0x1, [@TIPC_NLA_BEARER_DOMAIN={0x8}, @TIPC_NLA_BEARER_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xa0a}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x14}]}, @TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz2\x00'}]}, @TIPC_NLA_NET={0x50, 0x7, [@TIPC_NLA_NET_ID={0x8, 0x1, 0x7fffffff}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x9}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x9}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x5}, @TIPC_NLA_NET_ID={0x8, 0x1, 0xffffffff}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x4ca3}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x80000000}, @TIPC_NLA_NET_ID={0x8, 0x1, 0xc5}]}, @TIPC_NLA_NODE={0x18, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x5}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x200}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_MEDIA={0xec, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x34, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xff}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xffff}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0x4c, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x15}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3ebc}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x101}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x40}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xd0}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x80000000}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}]}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xfff}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xf0}]}, @TIPC_NLA_MEDIA_PROP={0x24, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4ea}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x81}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x6}]}]}, @TIPC_NLA_NODE={0x20, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x100}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x1ff}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_MEDIA={0x18, 0x5, [@TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0xffffffff}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}]}, @TIPC_NLA_BEARER={0x14, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz1\x00'}]}, @TIPC_NLA_NODE={0x34, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x5}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x9}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x5}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_MEDIA={0x24, 0x5, [@TIPC_NLA_MEDIA_PROP={0x4}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfffffff9}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1f}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}]}]}, @TIPC_NLA_NODE={0x8, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_UP={0x4}]}]}, 0x24c}, 0x1, 0x0, 0x0, 0x10810}, 0x4005) 23:34:39 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_DEL(r0, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="ac00000002090101000005000000000000000009700002002c000100140003006ed80a0ec3677685b4c446deabbe2e8d14000400000000000000400000000000000000000c00020005000100060000000c000200050001003a00000014000100080001007f000001080002007f000001e891871d58a4030c00020005000100880000000c00040008000500f2ff001f0c000200060003000000000008000500000000150800060000000000"], 0xac}, 0x1, 0x0, 0x0, 0x40081}, 0x40000d0) 23:34:39 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) mount(&(0x7f0000000000)=ANY=[@ANYBLOB='%'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) r2 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2008}, 0x1c) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000380)=@raw={'raw\x00', 0x3c1, 0x3, 0x2f8, 0x0, 0xd0, 0xd0, 0xd0, 0xd0, 0x228, 0x228, 0x228, 0x228, 0x228, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0xa8, 0xd0}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00', 0x0, {0xffff}}}, {{@uncond, 0x0, 0x138, 0x158, 0x0, {}, [@common=@srh1={{0x90, 'srh\x00'}, {0x0, 0x0, 0x0, 0x0, 0x0, @dev, @loopback, @local}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x358) [ 1579.553679][ T8102] kAFS: unparsable volume name [ 1579.605775][ T8102] sctp: [Deprecated]: syz-executor.2 (pid 8102) Use of struct sctp_assoc_value in delayed_ack socket option. [ 1579.605775][ T8102] Use struct sctp_sack_info instead [ 1579.644054][ T8105] kAFS: unparsable volume name 23:34:39 executing program 1: r0 = socket$inet(0x2, 0x2, 0x2200000088) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000280)='nl80211\x00') sendmsg$NL80211_CMD_JOIN_MESH(r3, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, r4, 0x63d, 0x70bd2d, 0x25dfdbfd, {}, [@NL80211_ATTR_WIPHY={0x8, 0x1, 0x3}]}, 0x1c}}, 0x2004c080) sendmsg$NL80211_CMD_SET_BEACON(r2, &(0x7f0000000880)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000840)={&(0x7f0000002140)={0x820, r4, 0x200, 0x70bd28, 0x25dfdbfc, {}, [@NL80211_ATTR_BEACON_HEAD={0x11d, 0xe, "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"}, @NL80211_ATTR_CIPHER_SUITES_PAIRWISE={0x10, 0x49, [0xfac05, 0xfac04, 0xfac02]}, @NL80211_ATTR_TX_RATES={0xa8, 0x5a, [@NL80211_BAND_5GHZ={0xa4, 0x1, [@NL80211_TXRATE_VHT={0x14, 0x3, {[0x400, 0x59b, 0x3, 0x4, 0x2, 0x1, 0x11e, 0x100]}}, @NL80211_TXRATE_VHT={0x14, 0x3, {[0x5, 0x5, 0x3ff, 0x23, 0x400, 0x4, 0x5, 0x5c]}}, @NL80211_TXRATE_VHT={0x14, 0x3, {[0x7, 0x2, 0x8000, 0x6, 0xffff, 0x0, 0x6, 0x1]}}, @NL80211_TXRATE_LEGACY={0xd, 0x1, "2949ff2943d1f8b988"}, @NL80211_TXRATE_VHT={0x14, 0x3, {[0x7fff, 0xeb00, 0xfff7, 0x6, 0x100, 0x8, 0x8, 0x7f]}}, @NL80211_TXRATE_LEGACY={0x1c, 0x1, "f8daf95c26323990416b5f03e1b13fdf64cb48afebec3614"}, @NL80211_TXRATE_GI={0x5, 0x4, 0x1}, @NL80211_TXRATE_GI={0x5, 0x4, 0x2}, @NL80211_TXRATE_VHT={0x14, 0x3, {[0x9, 0x800, 0x7dd, 0x7f, 0xff, 0x6, 0x7d67, 0x9]}}]}]}, @NL80211_ATTR_SSID={0x12, 0x34, "fe85bb97be820fdb89c1f9923f92"}, @NL80211_ATTR_CIPHER_SUITE_GROUP={0x8, 0x4a, 0xfac01}, @NL80211_ATTR_IE_PROBE_RESP={0x5fc, 0x7f, "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"}, @NL80211_ATTR_SSID={0x1b, 0x34, "e1cd7fbd24d8ce0e2f8b23d8592eea2949681a55109462"}]}, 0x820}, 0x1, 0x0, 0x0, 0x4}, 0x40000) sendto$inet(r0, 0x0, 0x30, 0x0, &(0x7f0000319ff0)={0x2, 0x4e20}, 0x10) [ 1579.654238][ T8107] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 1579.676297][ T8107] netlink: 'syz-executor.0': attribute type 2 has an invalid length. [ 1579.677424][ T8109] xt_TCPMSS: path-MTU clamping only supported in FORWARD, OUTPUT and POSTROUTING hooks [ 1579.687196][ T8105] kAFS: unparsable volume name 23:34:39 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) mount(&(0x7f0000000000)=ANY=[@ANYBLOB='%'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) r2 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2008}, 0x1c) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000380)=@raw={'raw\x00', 0x3c1, 0x3, 0x2f8, 0x0, 0xd0, 0xd0, 0xd0, 0xd0, 0x228, 0x228, 0x228, 0x228, 0x228, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0xa8, 0xd0}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00', 0x0, {0xffff}}}, {{@uncond, 0x0, 0x138, 0x158, 0x0, {}, [@common=@srh1={{0x90, 'srh\x00'}, {0x0, 0x0, 0x0, 0x0, 0x0, @dev, @loopback, @local}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x358) [ 1579.712597][ T8102] kAFS: unparsable volume name 23:34:39 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_DEL(r0, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="ac00000002090101000006000000000000000009700002002c000100140003006ed80a0ec3677685b4c446deabbe2e8d14000400000000000000400000000000000000000c00020005000100060000000c000200050001003a00000014000100080001007f000001080002007f000001e891871d58a4030c00020005000100880000000c00040008000500f2ff001f0c000200060003000000000008000500000000150800060000000000"], 0xac}, 0x1, 0x0, 0x0, 0x40081}, 0x40000d0) [ 1579.740024][ T8113] sctp: [Deprecated]: syz-executor.2 (pid 8113) Use of struct sctp_assoc_value in delayed_ack socket option. [ 1579.740024][ T8113] Use struct sctp_sack_info instead 23:34:39 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000000)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 23:34:39 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_DEL(r0, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="ac00000002090101000007000000000000000009700002002c000100140003006ed80a0ec3677685b4c446deabbe2e8d14000400000000000000400000000000000000000c00020005000100060000000c000200050001003a00000014000100080001007f000001080002007f000001e891871d58a4030c00020005000100880000000c00040008000500f2ff001f0c000200060003000000000008000500000000150800060000000000"], 0xac}, 0x1, 0x0, 0x0, 0x40081}, 0x40000d0) 23:34:39 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000000)=ANY=[@ANYBLOB='%'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) getresuid(&(0x7f0000000100), &(0x7f00000001c0)=0x0, &(0x7f0000000240)) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000280)={{{@in=@empty, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in6=@dev}}, &(0x7f0000000380)=0xe8) mount$binder(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='binder\x00', 0x10000, &(0x7f00000003c0)={[{@stats='stats=global'}, {@max={'max', 0x3d, 0x2}}, {@stats='stats=global'}, {@stats='stats=global'}], [{@subj_type={'subj_type', 0x3d, 'afs\x00'}}, {@smackfshat={'smackfshat'}}, {@smackfshat={'smackfshat', 0x3d, '-nodev*@&(selfeth1'}}, {@uid_lt={'uid<', r2}}, {@euid_lt={'euid<', r3}}, {@fsname={'fsname', 0x3d, '/'}}]}) [ 1579.875195][ T8221] xt_TCPMSS: path-MTU clamping only supported in FORWARD, OUTPUT and POSTROUTING hooks [ 1579.892529][ T8225] kAFS: unparsable volume name 23:34:39 executing program 1: r0 = socket$inet(0x2, 0x2, 0x2200000088) r1 = dup(0xffffffffffffffff) bind$inet(r1, &(0x7f00000000c0)={0x2, 0x4e20, @empty}, 0x10) sendto$inet(r0, 0x0, 0x30, 0x0, &(0x7f0000319ff0)={0x2, 0x4e20}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) read$snddsp(r4, &(0x7f00000001c0)=""/216, 0xd8) r5 = dup(r2) ioctl$sock_inet_tcp_SIOCATMARK(r5, 0x8905, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x52, 0x65, 0x7f, 0x1f, 0x0, 0x3, 0x10801, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x4, @perf_config_ext={0x1, 0xccd}, 0x8c01, 0x1ff, 0x6, 0x3, 0x8af, 0x100, 0x7}, 0xffffffffffffffff, 0x4, r5, 0x1) 23:34:39 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) mount(&(0x7f0000000000)=ANY=[@ANYBLOB='%'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) r2 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2008}, 0x1c) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000380)=@raw={'raw\x00', 0x3c1, 0x3, 0x2f8, 0x0, 0xd0, 0xd0, 0xd0, 0xd0, 0x228, 0x228, 0x228, 0x228, 0x228, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0xa8, 0xd0}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00', 0x0, {0xffff}}}, {{@uncond, 0x0, 0x138, 0x158, 0x0, {}, [@common=@srh1={{0x90, 'srh\x00'}, {0x0, 0x0, 0x0, 0x0, 0x0, @dev, @loopback, @local}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x358) 23:34:39 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000080)=ANY=[@ANYBLOB="00184a13ae7b747ff1ef9f0507fc97614feb470e312c520e62a890581f5021740165bb58bf01aad617b269979840a815c6599fef29890ba350689412396d3171d4c77e491d2294da305c"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) setxattr$security_capability(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000040)='security.capability\x00', &(0x7f0000000100)=@v2={0x2000000, [{0x2, 0xc34}, {0x1, 0x3}]}, 0x14, 0x3) [ 1580.030121][ T8231] kAFS: unparsable volume name [ 1580.054186][ T8231] Invalid mount options [ 1580.067758][ T8235] xt_TCPMSS: path-MTU clamping only supported in FORWARD, OUTPUT and POSTROUTING hooks 23:34:39 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) r2 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2008}, 0x1c) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000380)=@raw={'raw\x00', 0x3c1, 0x3, 0x2f8, 0x0, 0xd0, 0xd0, 0xd0, 0xd0, 0x228, 0x228, 0x228, 0x228, 0x228, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0xa8, 0xd0}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00', 0x0, {0xffff}}}, {{@uncond, 0x0, 0x138, 0x158, 0x0, {}, [@common=@srh1={{0x90, 'srh\x00'}, {0x0, 0x0, 0x0, 0x0, 0x0, @dev, @loopback, @local}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x358) 23:34:39 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_DEL(r0, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="ac00000002090101000009000000000000000009700002002c000100140003006ed80a0ec3677685b4c446deabbe2e8d14000400000000000000400000000000000000000c00020005000100060000000c000200050001003a00000014000100080001007f000001080002007f000001e891871d58a4030c00020005000100880000000c00040008000500f2ff001f0c000200060003000000000008000500000000150800060000000000"], 0xac}, 0x1, 0x0, 0x0, 0x40081}, 0x40000d0) [ 1580.101117][ T8238] kAFS: unparsable volume name [ 1580.114105][ T8231] Invalid mount options [ 1580.168140][ T8295] kAFS: Bad value for 'source' [ 1580.181705][ T8295] kAFS: Bad value for 'source' 23:34:39 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$inet6_MRT6_DEL_MFC(r0, 0x29, 0xcd, &(0x7f0000000040)={{0xa, 0x4e20, 0x0, @remote, 0x20}, {0xa, 0x4e21, 0x2, @mcast1}, 0x3000, [0x8000, 0x2, 0xffffffff, 0x3, 0x7f, 0x8, 0xcd9e, 0x9]}, 0x5c) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000000)=ANY=[@ANYBLOB='%'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1580.252708][ T8347] xt_TCPMSS: path-MTU clamping only supported in FORWARD, OUTPUT and POSTROUTING hooks 23:34:39 executing program 1: r0 = socket$inet(0x2, 0x80000, 0x89) sendto$inet(r0, 0x0, 0x30, 0x0, &(0x7f0000319ff0)={0x2, 0x4e20}, 0x10) setsockopt$inet_sctp_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000000)=ANY=[@ANYBLOB="06800000000000006f"], 0x10) 23:34:39 executing program 5: socketpair(0x1f, 0x80000, 0x8, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$kcm(r0, &(0x7f0000001a40)={&(0x7f0000000080)=@llc={0x1a, 0x13, 0x2, 0x6, 0x4, 0x81, @random="f10cca4edc62"}, 0xe3, &(0x7f00000017c0)=[{&(0x7f0000000240)="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", 0x1000}, {&(0x7f0000000100)="eea673954958dcc1b07f23f7c9cb82660a2e4c50617cebffff5349dc4c1397bca0e533760c7d699317a9ea7b8fa008b81fc39789fc254702a3dac1", 0x3b}, {&(0x7f0000001240)="4875dc6c67b7309d7281f2981886bb78151af7072e05556989d100060993a116b26ac3d67c9cca05ab6f3e0100b3d2d10cb8726be2d997ff8b3eab200298fd5ecf90ea67440d7582c5a74b453ab47853271529a52c7d0502597406e3f415c149ba52d272919a7ecc9323467a96a410a0066c2f160119ce74277ad780bc26186b220913ee2e5cdab3e96d65b7bfba2c6d52541577d991600192476997cc56cf7176448768ae9781178151ca104f2db3aadb72e5bfd22946", 0xb7}, {&(0x7f0000001300)="36b7092b7d70e8b11225d63cc467b8732a9987f3d4121267350f4106aded3c6003b94e8c7f74344e9c83b1527620b5f1d96f66223186000e477bad20a392a120f407bbb3f09e3c854514e3ac946b65eb39715d24d004894a1487756740339285b6da9daa58602485be155a2be5b9f926372c6c10941670b31e2d11af4744c6bb244f8601749448f134e1192c7e9fbe72d3bd1fac2a", 0x95}, {&(0x7f00000013c0)="8f585cfde4fce2b30448e5214429e8afbdb9ed1b640f6a49737750c7df63a6ba815d9fa112abc53128390675dbe03fa44157510fdeb0ec4ba03e93e9d00c254d7b0fb8388cd1ddec1be058b65b12e0610d6e31b350e4a2a7d3ff7bfc5acf79bd9fc3be82bdef13c24ee64efa24cda64b338ba48efb7128c779f8f4b8d8112a8182efa353b4a1536233961fbaa14a1c2c9480b2395db894219cc8a4a5104ce95629111ceba6756222ff5e67e7b1881897aec04474a22923b36d26b66604b1ba2a849217b541c9d2f08b22da9b55c24078f0881dbebf1cf54305d9d266", 0xdc}, {&(0x7f00000014c0)="2eb30b66bba8d1b8f97a8108b8242bd3109851a41e2cb1d7de650fcb16a17c4c68b4cb6b1552c5a1624c94450e63731d2b49f60f8c9b577ed44b1dcea09a5a44e0b7ebbe4285eee06a507d0af1dd92cd6a90fefa69a6be1b033228edd846e898b1102330e80f69ee976ba3d69148a09c0fb4c01c2dbb517829315594d00a83280a0639ec36b6a959a98bc7153c4515224b2f315d3d4f50125a3ce48b5f9a2a3ad56234a5720223ec0047351e0d23fb1b3e70b14c7d069d0eb91af3514b28f49e32a36d11133b", 0xc6}, {&(0x7f00000015c0)="b9691f7316879070bed7a89d0228c72d324e8c1b918cfbfd5781ea8aefe0bf596a765233d6ec63cc505bcedb1dfa3cfc8a1315aead67297588328ecbacfc7df8fc546551dbaa2963b2655ddcdc5dc29268e0a3393f243a1a8b457148b0ced2cce520c3bbb4dd02927c9877ff80b8b1dbd3aab81613edbd32b3be5e4fc02edc34aee9c82701bee003f51117a4fb7f151896bc8d9e074d45eb98a2ae41ae6d7a4053b92a616c8fdacc93294fae88cedcc1558b4f0139977d2c6710bd012a9d047d721677d9f9f232e5c3f355504521f3cd20db8ff4a0ebcfa4a8cfd26fe914823b944359663fdacf7c2cb3438422ee6f8c3edb1fef194948964d28e9d84f", 0xfd}, {&(0x7f00000001c0)="9972aaac5e0955aca0d42162f7dd97d3fc34657a43904430337d5a668c16eb15148148b0e837d82e89", 0x29}, {&(0x7f00000016c0)="fc17a738515f2f2b45016ee5bcf4ae837c705c7093a9ceb7f9ca94bdf53b6beb83401d1ac1a1f9769dc4015374ce5004523f7fc2f1d0c754c257bce9dbcfba1371d3813ff39b87c76d6e088624934db9c952a83dfdad450ed85365aebad07d1d6cb571e10e814f3e02c7ed940e5ccdbf75b4788f999e75b2cada5dde3d3cc0dbf3864bdf4f1ecfcbdeb9f78f98fe3fa2732a3028569a99b37557c2c623779d5958a972509b41b711333dd2ead08236da3f268c434a2acd6d866d5660a2a239792e0518b563811ba04ed88bdf9f5d9c53ee1186da30146c678fb658fc566a56a42ac70ebb7f2e", 0xe6}], 0x9, &(0x7f0000001880)=[{0xf8, 0x195, 0x9, "da230d3a622e6d130ae817ef6e706c5326603fdf970872b4218b2a7764e4f4f6ac97fc372b074ea6db833ed783e01510fd2e34bf2b1d6b532c196db2107deb59e1be55136ac55aa9f4312cecb646cf5eb4d03b59e2f36f6ab3064f3250135cf37602c9ede1489b2a1ae9ae6e3574d22ae82c2a9ff96c38aa1d3846e06f3cd8b4d604f5e924ae8571a9c552310013d984a9e04c74270ffebf5a250503d20fb1ada03289768581c65e8734de21396368b8d01440c8fbe7263259543e22ffd8c9d4bacc59ee0351e4e7e6a8456b6e8de2882f29a51f09ef0b2421cad3dc658016a6fe0de2"}, {0xb8, 0x113, 0x4, "ff2b0611965f0984433401a3be39da056b52051fbda99f3aeda6b29002797555cb8d5f869c6ef68d0781e1c199abb5c4e90e9153ff02439d0b4d6a468473573b0ce85b58a0425f683d8583f869172e8133592dd491b9ecde0f7bab56c09b697e4be571146023b6f74d9077ecdb1077e2db1ecb55be0ac0bf294c341f6b37036f102fea70efe97f9f6e49708be99cfa37b037919b0c93edd0b9dec2f6442a0545cc88da46f3b167"}], 0x1b0}, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="da46eab6a717cbc6f7a0ad26b63d27"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 23:34:39 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) r2 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2008}, 0x1c) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000380)=@raw={'raw\x00', 0x3c1, 0x3, 0x2f8, 0x0, 0xd0, 0xd0, 0xd0, 0xd0, 0x228, 0x228, 0x228, 0x228, 0x228, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0xa8, 0xd0}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00', 0x0, {0xffff}}}, {{@uncond, 0x0, 0x138, 0x158, 0x0, {}, [@common=@srh1={{0x90, 'srh\x00'}, {0x0, 0x0, 0x0, 0x0, 0x0, @dev, @loopback, @local}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x358) 23:34:39 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_DEL(r0, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="ac0000000209010100000a000000000000000009700002002c000100140003006ed80a0ec3677685b4c446deabbe2e8d14000400000000000000400000000000000000000c00020005000100060000000c000200050001003a00000014000100080001007f000001080002007f000001e891871d58a4030c00020005000100880000000c00040008000500f2ff001f0c000200060003000000000008000500000000150800060000000000"], 0xac}, 0x1, 0x0, 0x0, 0x40081}, 0x40000d0) [ 1580.383274][ T8352] kAFS: unparsable volume name [ 1580.386951][ T8354] kAFS: unparsable volume name [ 1580.462503][ T8389] xt_TCPMSS: path-MTU clamping only supported in FORWARD, OUTPUT and POSTROUTING hooks 23:34:40 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000000)=ANY=[@ANYBLOB='c'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x6003c, 0x0) 23:34:40 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_DEL(r0, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="ac0000000209010100000b000000000000000009700002002c000100140003006ed80a0ec3677685b4c446deabbe2e8d14000400000000000000400000000000000000000c00020005000100060000000c000200050001003a00000014000100080001007f000001080002007f000001e891871d58a4030c00020005000100880000000c00040008000500f2ff001f0c000200060003000000000008000500000000150800060000000000"], 0xac}, 0x1, 0x0, 0x0, 0x40081}, 0x40000d0) 23:34:40 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) r2 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2008}, 0x1c) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000380)=@raw={'raw\x00', 0x3c1, 0x3, 0x2f8, 0x0, 0xd0, 0xd0, 0xd0, 0xd0, 0x228, 0x228, 0x228, 0x228, 0x228, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0xa8, 0xd0}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00', 0x0, {0xffff}}}, {{@uncond, 0x0, 0x138, 0x158, 0x0, {}, [@common=@srh1={{0x90, 'srh\x00'}, {0x0, 0x0, 0x0, 0x0, 0x0, @dev, @loopback, @local}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x358) 23:34:40 executing program 1: r0 = socket$inet(0x2, 0x2, 0x2200000088) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000319ff0)={0x2, 0x4e23}, 0x10) [ 1580.668966][ T8476] xt_TCPMSS: path-MTU clamping only supported in FORWARD, OUTPUT and POSTROUTING hooks 23:34:40 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_DEL(r0, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="ac0000000209010100000c000000000000000009700002002c000100140003006ed80a0ec3677685b4c446deabbe2e8d14000400000000000000400000000000000000000c00020005000100060000000c000200050001003a00000014000100080001007f000001080002007f000001e891871d58a4030c00020005000100880000000c00040008000500f2ff001f0c000200060003000000000008000500000000150800060000000000"], 0xac}, 0x1, 0x0, 0x0, 0x40081}, 0x40000d0) 23:34:40 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount(0x0, 0x0, &(0x7f0000000180)='afs\x00', 0x0, 0x0) r2 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2008}, 0x1c) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000380)=@raw={'raw\x00', 0x3c1, 0x3, 0x2f8, 0x0, 0xd0, 0xd0, 0xd0, 0xd0, 0x228, 0x228, 0x228, 0x228, 0x228, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0xa8, 0xd0}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00', 0x0, {0xffff}}}, {{@uncond, 0x0, 0x138, 0x158, 0x0, {}, [@common=@srh1={{0x90, 'srh\x00'}, {0x0, 0x0, 0x0, 0x0, 0x0, @dev, @loopback, @local}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x358) 23:34:40 executing program 5: prctl$PR_MCE_KILL_GET(0x22) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000000)=ANY=[@ANYBLOB='#'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x1, 0x0) 23:34:40 executing program 1: r0 = socket$inet(0x2, 0x2, 0x2200000088) rt_sigaction(0x0, &(0x7f0000000140)={&(0x7f0000000100)="c402a598ce410f9720440f91e1f3adc4a23504747505c401a912993c0803e18fc95097e643d18b2f0000008f09b001ac6c00000100c401fc77", 0x40000001, 0xfffffffffffffffe, {[0x5]}}, &(0x7f0000000240)={&(0x7f0000000180)="c4e27935dd410fe0bab60e90bef30f16bef5000000c421d565fff30f7027b48fe808ef5500b4c4c25546d1f0805a0dcdc421a5d9ec660f14c2", 0x0, &(0x7f00000001c0)="450f1f00c4a17d70b3420000000c6643c7f886d9c4836d5f411901dbe3673e470f0f9d00000000b066410f3a61ada500000000c4c1e1ecfcc422f0f35b79c46115f3747706"}, 0x8, &(0x7f0000000280)) sendto$inet(r0, 0x0, 0x30, 0x0, &(0x7f0000319ff0)={0x2, 0x4e20}, 0x10) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x9, 0x9685, 0x0, 0x12, 0x8, 0x0, "eea36fa0187173b44be3742638ff8564e1acefa2e2aea9b26e75cfc0bd77e0c5f2d7f48e3f366b05702e528750ed2d115fba7fe76d873f9d63c8556e13ebd725", "975ad026e1799a4fe62220ed1eeea95f0fc03ea8b23c0a6f8b68acb8df5c8e76a49cff8dd9b86f0f9d4e6d3d0d28d625a49fbc651cc0e7aa717d30a3cf79a460", "6b1ca0382328fd23fc472c3145806cbf302769f1b778ae29c93ee72537d86965", [0xc2, 0x3]}) 23:34:40 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x38, 0x2}, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x38, 0x2}, 0x0) r4 = getpid() sched_setattr(r4, &(0x7f0000000040)={0x38, 0x2}, 0x0) mount(&(0x7f0000000400)=ANY=[@ANYRES64, @ANYPTR], &(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='securityfs\x00', 0x2004, 0x0) [ 1580.803179][ T8481] xt_TCPMSS: path-MTU clamping only supported in FORWARD, OUTPUT and POSTROUTING hooks 23:34:40 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount(0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2008}, 0x1c) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000380)=@raw={'raw\x00', 0x3c1, 0x3, 0x2f8, 0x0, 0xd0, 0xd0, 0xd0, 0xd0, 0x228, 0x228, 0x228, 0x228, 0x228, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0xa8, 0xd0}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00', 0x0, {0xffff}}}, {{@uncond, 0x0, 0x138, 0x158, 0x0, {}, [@common=@srh1={{0x90, 'srh\x00'}, {0x0, 0x0, 0x0, 0x0, 0x0, @dev, @loopback, @local}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x358) [ 1580.865826][ T8491] kAFS: unparsable volume name 23:34:40 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_DEL(r0, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="ac0000000209010100000d000000000000000009700002002c000100140003006ed80a0ec3677685b4c446deabbe2e8d14000400000000000000400000000000000000000c00020005000100060000000c000200050001003a00000014000100080001007f000001080002007f000001e891871d58a4030c00020005000100880000000c00040008000500f2ff001f0c000200060003000000000008000500000000150800060000000000"], 0xac}, 0x1, 0x0, 0x0, 0x40081}, 0x40000d0) 23:34:40 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f0000000200)='./file0\x00', 0x8) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="250340a32f35e24133ec44f1e579340680c509000000000000007866ed981a83dbee49baeebb4d69ad61e383ce9522d03556eb7aa3023ecc"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1580.892221][ T8492] kAFS: unparsable volume name 23:34:40 executing program 1: r0 = socket$inet(0x2, 0x2, 0x2200000088) sendto$inet(r0, 0x0, 0x30, 0x0, &(0x7f0000319ff0)={0x2, 0x4e20}, 0x10) ioctl$sock_inet_SIOCRTMSG(r0, 0x890d, &(0x7f0000000040)={0x0, {0x2, 0x4e24, @rand_addr=0x5}, {0x2, 0x4e24, @loopback}, {0x2, 0x7, @local}, 0x1d, 0x0, 0x0, 0x0, 0xfe01, &(0x7f0000000000)='veth1\x00', 0x4, 0x2, 0x5}) 23:34:40 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_DEL(r0, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="ac0000000209010100000e000000000000000009700002002c000100140003006ed80a0ec3677685b4c446deabbe2e8d14000400000000000000400000000000000000000c00020005000100060000000c000200050001003a00000014000100080001007f000001080002007f000001e891871d58a4030c00020005000100880000000c00040008000500f2ff001f0c000200060003000000000008000500000000150800060000000000"], 0xac}, 0x1, 0x0, 0x0, 0x40081}, 0x40000d0) [ 1580.995459][ T8499] xt_TCPMSS: path-MTU clamping only supported in FORWARD, OUTPUT and POSTROUTING hooks 23:34:40 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r0, 0x8982, &(0x7f00000000c0)={0x1, 'veth0_to_bridge\x00', {}, 0x8}) mount(&(0x7f0000000000)=ANY=[@ANYBLOB="b8"], &(0x7f0000000040)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x2000815, 0x0) rmdir(&(0x7f0000000080)='./file0\x00') 23:34:40 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount(0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x0, 0x0) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2008}, 0x1c) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000380)=@raw={'raw\x00', 0x3c1, 0x3, 0x2f8, 0x0, 0xd0, 0xd0, 0xd0, 0xd0, 0x228, 0x228, 0x228, 0x228, 0x228, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0xa8, 0xd0}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00', 0x0, {0xffff}}}, {{@uncond, 0x0, 0x138, 0x158, 0x0, {}, [@common=@srh1={{0x90, 'srh\x00'}, {0x0, 0x0, 0x0, 0x0, 0x0, @dev, @loopback, @local}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x358) [ 1581.082453][ T8505] kAFS: No cell specified [ 1581.115415][ T8611] kAFS: No cell specified 23:34:40 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000000)=ANY=[@ANYBLOB='%'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1581.205998][ T8617] xt_TCPMSS: path-MTU clamping only supported in FORWARD, OUTPUT and POSTROUTING hooks 23:34:40 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_DEL(r0, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="ac0000000209010100000f000000000000000009700002002c000100140003006ed80a0ec3677685b4c446deabbe2e8d14000400000000000000400000000000000000000c00020005000100060000000c000200050001003a00000014000100080001007f000001080002007f000001e891871d58a4030c00020005000100880000000c00040008000500f2ff001f0c000200060003000000000008000500000000150800060000000000"], 0xac}, 0x1, 0x0, 0x0, 0x40081}, 0x40000d0) 23:34:40 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000000)=ANY=[@ANYBLOB='#'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) setxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f00000000c0)=@md5={0x1, "9f024d00bf4598780587dbc6d01477ec"}, 0x11, 0x1) [ 1581.350983][ T8623] kAFS: unparsable volume name 23:34:40 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount(0x0, 0x0, 0x0, 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2008}, 0x1c) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000380)=@raw={'raw\x00', 0x3c1, 0x3, 0x2f8, 0x0, 0xd0, 0xd0, 0xd0, 0xd0, 0x228, 0x228, 0x228, 0x228, 0x228, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0xa8, 0xd0}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00', 0x0, {0xffff}}}, {{@uncond, 0x0, 0x138, 0x158, 0x0, {}, [@common=@srh1={{0x90, 'srh\x00'}, {0x0, 0x0, 0x0, 0x0, 0x0, @dev, @loopback, @local}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x358) 23:34:40 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_DEL(r0, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="ac00000002090101000011000000000000000009700002002c000100140003006ed80a0ec3677685b4c446deabbe2e8d14000400000000000000400000000000000000000c00020005000100060000000c000200050001003a00000014000100080001007f000001080002007f000001e891871d58a4030c00020005000100880000000c00040008000500f2ff001f0c000200060003000000000008000500000000150800060000000000"], 0xac}, 0x1, 0x0, 0x0, 0x40081}, 0x40000d0) [ 1581.372786][ T8627] kAFS: unparsable volume name [ 1581.382832][ T8628] kAFS: unparsable volume name [ 1581.399575][ T8628] kAFS: unparsable volume name 23:34:41 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount(0x0, 0x0, 0x0, 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2008}, 0x1c) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000380)=@raw={'raw\x00', 0x3c1, 0x3, 0x2f8, 0x0, 0xd0, 0xd0, 0xd0, 0xd0, 0x228, 0x228, 0x228, 0x228, 0x228, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0xa8, 0xd0}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00', 0x0, {0xffff}}}, {{@uncond, 0x0, 0x138, 0x158, 0x0, {}, [@common=@srh1={{0x90, 'srh\x00'}, {0x0, 0x0, 0x0, 0x0, 0x0, @dev, @loopback, @local}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x358) 23:34:41 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2}, 0x0) mount(&(0x7f0000000080)=ANY=[@ANYBLOB='#', @ANYBLOB="287116bc8c9ce68f162e0a4a6477df7bce6135b2160d0b938ccaf3c28de32cb91cc1674c6074b48a97aa5da2bc5d73c4d42cb253159a296198a402d044af35d59ec06388a863c302a28e9bdf4c1c07eca45455c53828acd3be86385887ff09f4f808d5b7442941d84fbb43482381b86f71b6a841419ba1535ad8dac3fd0c6394d8ee425dcc690f227d9d68922ea3ae1b6b7564b82680ddf3fc1fb6796162de683ace27382af9686a2445ebae6507671e74b6b2961e54", @ANYRES16], &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)='mqueue\x00', 0x0, 0x0) 23:34:41 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_DEL(r0, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="ac00000002090101000012000000000000000009700002002c000100140003006ed80a0ec3677685b4c446deabbe2e8d14000400000000000000400000000000000000000c00020005000100060000000c000200050001003a00000014000100080001007f000001080002007f000001e891871d58a4030c00020005000100880000000c00040008000500f2ff001f0c000200060003000000000008000500000000150800060000000000"], 0xac}, 0x1, 0x0, 0x0, 0x40081}, 0x40000d0) 23:34:41 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000040)=ANY=[@ANYRESDEC], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlinkat(r0, &(0x7f0000000000)='./file0/file0\x00', 0x200) 23:34:41 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount(0x0, 0x0, 0x0, 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2008}, 0x1c) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000380)=@raw={'raw\x00', 0x3c1, 0x3, 0x2f8, 0x0, 0xd0, 0xd0, 0xd0, 0xd0, 0x228, 0x228, 0x228, 0x228, 0x228, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0xa8, 0xd0}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00', 0x0, {0xffff}}}, {{@uncond, 0x0, 0x138, 0x158, 0x0, {}, [@common=@srh1={{0x90, 'srh\x00'}, {0x0, 0x0, 0x0, 0x0, 0x0, @dev, @loopback, @local}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x358) [ 1581.788440][ T8656] kAFS: unparsable volume name 23:34:41 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_DEL(r0, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="ac00000002090101000013000000000000000009700002002c000100140003006ed80a0ec3677685b4c446deabbe2e8d14000400000000000000400000000000000000000c00020005000100060000000c000200050001003a00000014000100080001007f000001080002007f000001e891871d58a4030c00020005000100880000000c00040008000500f2ff001f0c000200060003000000000008000500000000150800060000000000"], 0xac}, 0x1, 0x0, 0x0, 0x40081}, 0x40000d0) 23:34:41 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$FICLONE(r3, 0x40049409, r4) getsockopt$EBT_SO_GET_ENTRIES(r4, 0x0, 0x81, &(0x7f0000000240)={'filter\x00', 0x0, 0x3, 0x6b, [], 0x2, &(0x7f0000000040)=[{}, {}], &(0x7f0000000080)=""/107}, &(0x7f0000000100)=0x78) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(r4, 0xc008551c, &(0x7f0000000580)={0x0, 0x14, [0xfffffffb, 0x4, 0x3, 0x0, 0x1]}) fsetxattr(r3, &(0x7f0000000380)=@random={'system.', 'selinux\x00'}, &(0x7f00000003c0)='-#:\xad+\x00', 0x6, 0x0) r5 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r5, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2008}, 0x1c) listen(r5, 0x0) fadvise64(r5, 0x1, 0x1, 0x4) sendmsg$nl_route(r1, &(0x7f0000000540)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000500)={&(0x7f00000005c0)=@ipv4_deladdr={0x8c, 0x15, 0x10, 0x70bd2d, 0x25dfdbfd, {0x2, 0x20, 0x12, 0xff}, [@IFA_BROADCAST={0x8, 0x4, @broadcast}, @IFA_CACHEINFO={0x14, 0x6, {0x7fff, 0x3, 0x5, 0x4}}, @IFA_LABEL={0x14, 0x3, 'veth1_to_team\x00'}, @IFA_LABEL={0x14, 0x3, 'team_slave_0\x00'}, @IFA_ADDRESS={0x8, 0x1, @rand_addr=0x5}, @IFA_LABEL={0x14, 0x3, 'ip6erspan0\x00'}, @IFA_CACHEINFO={0x14, 0x6, {0x2, 0x3, 0x7, 0x3}}]}, 0x8c}, 0x1, 0x0, 0x0, 0x20008010}, 0x4000800) ioctl$EVIOCGVERSION(r4, 0x80044501, &(0x7f0000000340)=""/64) modify_ldt$write(0x1, &(0x7f0000000400)={0x50e, 0x20000800, 0x1000, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1}, 0x10) mount(&(0x7f0000000000)=ANY=[@ANYBLOB='%'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) r6 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r6, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2008}, 0x1c) listen(r6, 0x0) getsockname(r6, &(0x7f0000000480)=@x25={0x9, @remote}, &(0x7f0000000680)=0x80) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000002c0)={0x1, 0x28, &(0x7f00000001c0)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000300)={r7, 0x6}, 0xc) [ 1581.811944][ T8656] kAFS: unparsable volume name [ 1581.900795][ T8665] kAFS: unparsable volume name 23:34:41 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount(0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x0, 0x0) bind$inet6(r2, 0x0, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000380)=@raw={'raw\x00', 0x3c1, 0x3, 0x2f8, 0x0, 0xd0, 0xd0, 0xd0, 0xd0, 0x228, 0x228, 0x228, 0x228, 0x228, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0xa8, 0xd0}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00', 0x0, {0xffff}}}, {{@uncond, 0x0, 0x138, 0x158, 0x0, {}, [@common=@srh1={{0x90, 'srh\x00'}, {0x0, 0x0, 0x0, 0x0, 0x0, @dev, @loopback, @local}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x358) 23:34:41 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_DEL(r0, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="ac00000002090101000014000000000000000009700002002c000100140003006ed80a0ec3677685b4c446deabbe2e8d14000400000000000000400000000000000000000c00020005000100060000000c000200050001003a00000014000100080001007f000001080002007f000001e891871d58a4030c00020005000100880000000c00040008000500f2ff001f0c000200060003000000000008000500000000150800060000000000"], 0xac}, 0x1, 0x0, 0x0, 0x40081}, 0x40000d0) [ 1581.981808][ T8667] kAFS: unparsable volume name 23:34:41 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_DEL(r0, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="ac00000002090101000020000000000000000009700002002c000100140003006ed80a0ec3677685b4c446deabbe2e8d14000400000000000000400000000000000000000c00020005000100060000000c000200050001003a00000014000100080001007f000001080002007f000001e891871d58a4030c00020005000100880000000c00040008000500f2ff001f0c000200060003000000000008000500000000150800060000000000"], 0xac}, 0x1, 0x0, 0x0, 0x40081}, 0x40000d0) 23:34:41 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount(0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x0, 0x0) bind$inet6(r2, 0x0, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000380)=@raw={'raw\x00', 0x3c1, 0x3, 0x2f8, 0x0, 0xd0, 0xd0, 0xd0, 0xd0, 0x228, 0x228, 0x228, 0x228, 0x228, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0xa8, 0xd0}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00', 0x0, {0xffff}}}, {{@uncond, 0x0, 0x138, 0x158, 0x0, {}, [@common=@srh1={{0x90, 'srh\x00'}, {0x0, 0x0, 0x0, 0x0, 0x0, @dev, @loopback, @local}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x358) [ 1582.172340][ T8682] __nla_validate_parse: 36 callbacks suppressed [ 1582.172348][ T8682] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.0'. 23:34:41 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="020000000100000000000000040001000015000008000000", @ANYRES32=r1, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=r1, @ANYBLOB="08000200", @ANYRES32=r3, @ANYBLOB="10000400000000002000020000000000"], 0x3c, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r5) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x3, &(0x7f0000000480)=[{&(0x7f0000000280)="3160d453ba8d1909d6d75ba7508adc9e4043a431953a3cd38b7fa36e3b0b61a05ae29cf97f8c706b905f2f9e4fc6efc2841ab16b15617d894b1d42e70afccb4e11c30a6bb7b08efe45817fd70a03de6d0de7709a5a406358ff1b31c6585aee31ceb205d50f0728bed3567e94122ebe46734cb6cf882db71055347d584ef50e70b7d8f540340079c252b7873a231af6c8c7950328570ee41270340b4de11eaa9837cb1f", 0xa3, 0x20}, {&(0x7f0000000340)="aa7a5b2b00d6566983d238b34b676cde61afc788a7e44c567dcf6cb3b2ec05ce49fc01114c5d872682d32a9a04ea0a2d5e016ec26be3ef82fbf5c4b1ecb126ad081e9fc4e265b06eddc7b8ceb82a097c4e294683ebf544fb25d6b19c82b791210bb1d172df4ce2d62a9b783741aaf6fcf28dcf93452b2cfee9461ab776aab280776805fa5ea4e47c7cbfc3b5bbb322fec00f924ae1262361d74e2c1a8930123519", 0xa1, 0x1f}, {&(0x7f0000000400)="6f0f6f11ea706cdfcb627b1b988992f05f69316cd1076d7b8f62adce6e60f0ddcafc5d2b5dfaf7c8749e71f9f843abca19271de32a468176cc955b6e17901c036145a808880104feaa77906cc4f1a346808a657ab51ac9df91e28a9d8c99292e73ae551ca6ed42bcb010be5b946382ce5a48ad93657b546f8ad4667d042b29", 0x7f, 0x4}], 0xa0, &(0x7f0000000500)={[{@gid={'gid', 0x3d, r1}}], [{@euid_gt={'euid>', r5}}]}) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="e55190a3afb28680fcfef32c651813df70962f7d6fdbe411c49fdfc82a6deacd7ea687b514a07dce06a42ca3c8aa60dd0c1e6293ad", @ANYPTR=&(0x7f0000000040)=ANY=[@ANYBLOB="21bfcb5a1ea109af6c39cb9cffe5f4f23111ad09397bf29989c8be8171cb68f094d5c8840e0db118f8951f05d86cb6d5a72335747b00bb5a1acdc3d49e57077b63b645e02a85ab8ddb41ec700c8df6c92928d687ebb63f9adccf61cce5b5d079cadb9080c7a42eed7bee72a5530a800f7cfe7238f265c17af73512d0095ee099a01136b5935abe0d194a870ffa47fe0f760eda0dddd520ded3784125e3dbc27a46d020c61f7e00d5e44b6278d9ae3c6f03115880279119eb97193486abb0ca63dd17db42f6499be6c02bddc7377f"]], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 23:34:41 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount(0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x0, 0x0) bind$inet6(r2, 0x0, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000380)=@raw={'raw\x00', 0x3c1, 0x3, 0x2f8, 0x0, 0xd0, 0xd0, 0xd0, 0xd0, 0x228, 0x228, 0x228, 0x228, 0x228, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0xa8, 0xd0}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00', 0x0, {0xffff}}}, {{@uncond, 0x0, 0x138, 0x158, 0x0, {}, [@common=@srh1={{0x90, 'srh\x00'}, {0x0, 0x0, 0x0, 0x0, 0x0, @dev, @loopback, @local}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x358) 23:34:41 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r0) write$binfmt_elf64(r1, &(0x7f00000008c0)={{0x7f, 0x45, 0x4c, 0x46, 0x7f, 0xa4, 0x5, 0x3, 0x2, 0x0, 0x3e, 0x1, 0x1d4, 0x40, 0x39e, 0x6, 0x8, 0x38, 0x2, 0x9, 0x1, 0x7f}, [], "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", [[], [], [], [], []]}, 0x641) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000000)=ANY=[@ANYBLOB='%'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 23:34:41 executing program 1: r0 = socket$inet(0x2, 0x800, 0xa8) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000319ff0)={0x2, 0x4e20, @multicast2}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) r1 = socket$inet6(0xa, 0x6, 0x0) clock_gettime(0x3, &(0x7f0000000bc0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000100)={0x0, 0x0}) ioprio_get$pid(0x1, r2) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2008}, 0x1c) listen(r1, 0x0) r3 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x4) r4 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r4, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2008}, 0x1c) r5 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000c80)='/dev/dlm-control\x00', 0x8100, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001d00)={r5, &(0x7f0000000cc0)="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", &(0x7f0000001cc0)=""/58, 0x4}, 0x20) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r7 = dup(r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) sendmsg$OSF_MSG_ADD(r7, &(0x7f0000000b80)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000b40)={&(0x7f00000001c0)={0x964, 0x0, 0x5, 0x301, 0x0, 0x0, {0x2, 0x0, 0xa}, [{{0x254, 0x1, {{0x3, 0x1e}, 0x20, 0x5, 0x4, 0x128d, 0x16, 'syz0\x00', "e79df6c72ede593e68c586f63550b01104bb02bf04c10f445bfbb1d3352de790", "5b2a8014e84b892d884509d37fae7be133eac3044c9e890bcb0f722a283b8c02", [{0xfffe, 0x98, {0x0, 0x4}}, {0x9, 0x7, {0x2, 0xffffffff}}, {0x0, 0x100, {0x0, 0x800}}, {0x140, 0x0, {0x2, 0x2}}, {0x3ff, 0xb5, {0x0, 0x3}}, {0x1, 0x4, {0x2, 0x401}}, {0x7, 0x5, {0x3, 0x1}}, {0x1, 0x7, {0x1, 0x2}}, {0x800, 0xffd9, {0x2, 0x40}}, {0x8001, 0x9, {0x2, 0x4}}, {0x5, 0x501, {0x3, 0xfff}}, {0x1, 0x0, {0x2, 0x6}}, {0x8, 0x8a8, {0x0, 0x3}}, {0x4, 0x9, {0x3, 0x3}}, {0x8, 0x8, {0x3, 0xdbc}}, {0xfff7, 0x1, {0x2, 0x10000}}, {0x9, 0x20, {0x0, 0x7}}, {0x7, 0x3f, {0x3, 0xfffffff7}}, {0x4, 0x3, {0x3, 0x9}}, {0x4, 0x2, {0x2, 0x6}}, {0x3ff, 0x4, {0x1, 0x8}}, {0x9, 0x1, {0x1, 0x20}}, {0x401, 0x4, {0x3, 0x1e}}, {0x0, 0x1, {0x2, 0x9}}, {0x1, 0x4, {0x2, 0x3}}, {0x7fff, 0x1, {0x1, 0x3}}, {0x7, 0x0, {0x3, 0x24}}, {0x6b38, 0x40, {0x1, 0x81}}, {0x8001, 0x2, {0x0, 0xffff0001}}, {0x7f, 0x81, {0x2, 0x4}}, {0x3, 0x7, {0x3}}, {0x4, 0x3, {0xe3d66f0f1395333d, 0x9}}, {0x1, 0x0, {0x0, 0x200}}, {0x7ff, 0x1, {0x3, 0x6}}, {0x1, 0x5, {0x6, 0x5}}, {0x0, 0x2, {0x2, 0x6}}, {0x1, 0x5, {0x2, 0x3}}, {0x8, 0xfff8, {0x1, 0xc00}}, {0x515, 0x5, {0x0, 0x3}}, {0x101, 0x9bf, {0x0, 0x401}}]}}}, {{0x254, 0x1, {{0x0, 0x7ff}, 0x40, 0x40, 0x4, 0x4, 0x16, 'syz0\x00', "f71cd4a8901a11a642a29696d08b7602037b82894aff68d59fd67f36b1a4f199", "1a30d2bb26ed59b62b1aa973757fe283c7e2f203655f5b86892da3af38ee4891", [{0x5, 0x20, {0x1, 0x9}}, {0x7fff, 0x9, {0x1, 0x80ed}}, {0x0, 0x9, {0x1, 0x10000000}}, {0x6, 0x9ac5, {0x2, 0x9}}, {0x80, 0x3f, {0x1, 0x7}}, {0x100, 0x5, {0x3, 0x8}}, {0x8000, 0x8001, {0x1, 0x9}}, {0x8, 0x1, {0x0, 0x1ff}}, {0x20, 0x7fff, {0x3, 0x4}}, {0x5c, 0x7fff, {0x2, 0x20081}}, {0x7, 0x1ff, {0x3, 0x81}}, {0x3, 0x5, {0x3, 0x4}}, {0x1, 0x85, {0x1, 0x10001}}, {0x3, 0x8, {0x2, 0x2}}, {0x100, 0xb1ef, {0x0, 0x4}}, {0x80, 0x5, {0x2, 0xfa9c}}, {0x7, 0x7, {0x3, 0x8000}}, {0x7, 0x4d1f, {0x2, 0x1}}, {0x4, 0x2, {0x2, 0x6}}, {0x100, 0x3efd, {0x0, 0x80}}, {0x6, 0x5, {0x3, 0x2}}, {0x5, 0x3, {0x0, 0xb3}}, {0x8, 0x9, {0x0, 0x80}}, {0x7, 0x80, {0x2, 0xaa0}}, {0x0, 0x100, {0x0, 0x8}}, {0x5, 0xb133, {0x2, 0x3}}, {0x6, 0x8, {0x2, 0xac}}, {0x7, 0x6, {0x2, 0x5}}, {0x1ff, 0x2, {0x0, 0x7}}, {0x1, 0x3, {0x1, 0x1}}, {0x1, 0x6, {0x1, 0x3d}}, {0x9, 0x2, {0x3, 0x7}}, {0x7, 0x3f, {0x2, 0x8}}, {0x1f, 0x6, {0x2, 0x7f}}, {0x6, 0x1, {0x1, 0x6}}, {0x200, 0x8, {0x2, 0xc0000}}, {0x7ff, 0xf565, {0x1, 0xfffffff9}}, {0x4, 0x101, {0x2, 0x10000}}, {0x72a2, 0x8, {0x2, 0xfd}}, {0x30, 0x1ff, {0x0, 0x1000}}]}}}, {{0x254, 0x1, {{0x2, 0x10000}, 0x3, 0x3, 0x7, 0x226, 0x1a, 'syz0\x00', "cc1731eac06b949081ebc1ea9dc4231fdc63720162cc4304d247bf3d97d4c63a", "22fdad52a40698fccc68e5b00a867f49a585e8a00fe0278af764d985dc150502", [{0x3, 0xc1d, {0x3, 0x65c8}}, {0x1, 0x2, {0x2, 0x20}}, {0x1, 0x1002, {0x0, 0x6}}, {0xff, 0x1, {0x1, 0x2}}, {0x1, 0x89, {0x0, 0x3e}}, {0x42, 0x55, {0x2, 0x8396}}, {0x3f, 0x1, {0x3, 0x1}}, {0x5, 0x6, {0x3, 0x5}}, {0x5, 0x6, {0x0, 0xe0a1}}, {0x4de8, 0x8, {0x2, 0x3f}}, {0x9, 0x401, {0x2, 0x10000}}, {0x3ff, 0x7ff, {0x2, 0x5}}, {0x5, 0x0, {0x1}}, {0x295, 0x6, {0x0, 0xfffffeff}}, {0x3, 0x59, {0x3}}, {0x1, 0x7ff, {0x1, 0x7}}, {0x8000, 0x80, {0x2, 0xffff}}, {0x2, 0x8000, {0x2, 0xbb}}, {0x7, 0x4, {0x1, 0x9}}, {0xc4, 0x800, {0x2, 0x6}}, {0x20, 0x1f, {0x1}}, {0x18e, 0x4, {0x0, 0x1e6}}, {0x9, 0x8eb, {0x0, 0x3add}}, {0x1d, 0x3ff, {0x0, 0x8}}, {0x0, 0x6, {0x0, 0xfffffffe}}, {0x8000, 0x7, {0x2, 0x400}}, {0x40, 0x4, {0x2, 0x400}}, {0x4, 0xc0a, {0x0, 0x1}}, {0x6bb, 0x4, {0x2}}, {0x1000, 0xd1, {0x3, 0xfffffffd}}, {0x81, 0x1, {0x2, 0x1000}}, {0xde, 0x3, {0x1, 0x6ae}}, {0xff, 0x4, {0x1, 0xff}}, {0x200, 0x6, {0x3}}, {0x0, 0x4e, {0x0, 0x5}}, {0xffe0, 0x800, {0x0, 0x7}}, {0xe46, 0x9, {0x0, 0x8}}, {0x3, 0x200, {0x2, 0xa9}}, {0x2, 0x8000, {0x0, 0x5}}, {0xb85, 0x313a, {0x0, 0x4}}]}}}, {{0x254, 0x1, {{0x3, 0x3d}, 0x9, 0x1, 0xfbc, 0x3, 0xe, 'syz1\x00', "1d739148a4a42c3b31f12463055bb3b9d6e3caf6d914db7efc2428186d55864c", "b53f7f8d6258dfbe884d90a82d0ea268358e88b88e4fabcfd1512c28d8693544", [{0x200, 0xbb, {0x2, 0x6}}, {0xf, 0xffff, {0x0, 0x10000}}, {0x3, 0x3, {0x0, 0x12}}, {0xc6e9, 0x1, {0x2, 0x7fffffff}}, {0x1, 0x6, {0x0, 0x4}}, {0xffff, 0xd1, {0x1, 0xdb}}, {0x3, 0x2, {0x0, 0x7bfe}}, {0x1, 0xfff, {0x3, 0x7}}, {0x6bc, 0x2, {0x3, 0x3ff}}, {0x5da7, 0x8000, {0x3, 0x9000000}}, {0x3f, 0x1, {0x2, 0xffffffff}}, {0xfffe, 0xfff, {0x1, 0x9}}, {0x1, 0x3, {0x3, 0x9519}}, {0x9, 0x5, {0x2, 0xff}}, {0x6, 0x8, {0x2, 0x9}}, {0x1, 0x41b9, {0x1, 0xb93}}, {0x0, 0x0, {0x1, 0x80000001}}, {0x3, 0xfffa, {0x0, 0x5}}, {0x8, 0x8, {0x0, 0xa5b6}}, {0x3ff, 0x80, {0x3, 0xffffffff}}, {0xde, 0x1, {0x2, 0xffff9a36}}, {0x7c0, 0x7fff, {0x3, 0x3}}, {0x401, 0x8}, {0x881, 0x8, {0x0, 0x4}}, {0x8, 0x5, {0x3, 0x3}}, {0x800, 0x8001, {0x0, 0x1}}, {0xd5de, 0x46, {0x0, 0xff}}, {0x1, 0x7566, {0x2, 0xfffffff8}}, {0x1, 0x7, {0x0, 0x6}}, {0x7f, 0x0, {0x1, 0x7}}, {0xfff, 0xa4dc, {0x0, 0x9}}, {0x6, 0x0, {0x3, 0x10000}}, {0x3f, 0x101, {0x3, 0x5}}, {0xe4, 0xd35b, {0x0, 0x256}}, {0x4, 0xf5, {0x3, 0x1}}, {0x200, 0x3ff, {0x2, 0x1}}, {0x3, 0x4, {0x1, 0xd31}}, {0x7, 0x8, {0x0, 0x1}}, {0x3ff, 0x4, {0x1, 0x294}}, {0x6, 0x18, {0x1, 0x2}}]}}}]}, 0x964}, 0x1, 0x0, 0x0, 0x8810}, 0x40000) listen(r4, 0x0) fcntl$F_SET_RW_HINT(r4, 0x40c, &(0x7f00000000c0)=0x2) r8 = openat(r3, &(0x7f0000000000)='./file0\x00', 0x80000, 0x146) setsockopt$ALG_SET_KEY(r8, 0x117, 0x1, &(0x7f0000000040)="28eab9", 0x3) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r10 = dup(r9) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000c40)={&(0x7f0000000c00)='systemself\x00', r10}, 0x10) [ 1582.260525][ T8682] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. 23:34:41 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_DEL(r0, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="ac00000002090101000025000000000000000009700002002c000100140003006ed80a0ec3677685b4c446deabbe2e8d14000400000000000000400000000000000000000c00020005000100060000000c000200050001003a00000014000100080001007f000001080002007f000001e891871d58a4030c00020005000100880000000c00040008000500f2ff001f0c000200060003000000000008000500000000150800060000000000"], 0xac}, 0x1, 0x0, 0x0, 0x40081}, 0x40000d0) [ 1582.377046][ T8696] kAFS: unparsable volume name [ 1582.407063][ T8708] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.0'. 23:34:42 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000000)=ANY=[@ANYBLOB='\x00'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 23:34:42 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000100)=ANY=[], &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='cramfs\x00', 0x1014417, 0x0) [ 1582.473578][ T8708] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. 23:34:42 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount(0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x0, 0x0) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev}, 0x1c) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000380)=@raw={'raw\x00', 0x3c1, 0x3, 0x2f8, 0x0, 0xd0, 0xd0, 0xd0, 0xd0, 0x228, 0x228, 0x228, 0x228, 0x228, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0xa8, 0xd0}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00', 0x0, {0xffff}}}, {{@uncond, 0x0, 0x138, 0x158, 0x0, {}, [@common=@srh1={{0x90, 'srh\x00'}, {0x0, 0x0, 0x0, 0x0, 0x0, @dev, @loopback, @local}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x358) 23:34:42 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_DEL(r0, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="ac0000000209010100da3b000000000000000009700002002c000100140003006ed80a0ec3677685b4c446deabbe2e8d14000400000000000000400000000000000000000c00020005000100060000000c000200050001003a00000014000100080001007f000001080002007f000001e891871d58a4030c00020005000100880000000c00040008000500f2ff001f0c000200060003000000000008000500000000150800060000000000"], 0xac}, 0x1, 0x0, 0x0, 0x40081}, 0x40000d0) 23:34:42 executing program 1: r0 = socket$inet(0x2, 0x2, 0x2200000088) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000319ff0)={0x2, 0x4e20, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2008}, 0x1c) listen(r1, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, &(0x7f0000000180)={&(0x7f0000ffb000/0x3000)=nil, 0x3000}, &(0x7f00000001c0)=0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$VIDIOC_PREPARE_BUF(0xffffffffffffffff, 0xc058565d, &(0x7f0000000200)={0x9, 0x3, 0x4, 0x80000000, 0xa, {0x77359400}, {0x5, 0x8, 0x80, 0x11, 0xf9, 0x2, "cb7168f4"}, 0x7, 0x3, @fd=r3, 0x4, 0x0, 0xffffffffffffffff}) ioctl$KVM_UNREGISTER_COALESCED_MMIO(r4, 0x4010ae68, &(0x7f0000000280)={0x1, 0x9000}) getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp_SCTP_RESET_ASSOC(r0, 0x84, 0x78, &(0x7f0000000080)=r5, 0x4) ioctl$SNDRV_PCM_IOCTL_SYNC_PTR(0xffffffffffffffff, 0xc0884123, &(0x7f00000000c0)={0x2, "d21c86226d764a75f5686a23addb0002a9336095cc56a379824d7ca3bf2426d7a949c49c5558c2d828f5f9f6a215eb5f40be75c5ab5c3c26c750050f7244d458", {0xb18, 0x1}}) [ 1582.644352][ T8825] kAFS: Bad value for 'source' 23:34:42 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="23c027082e5071c34f361d"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1582.758749][ T8886] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1582.780172][ T8886] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. 23:34:42 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount(0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x0, 0x0) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev}, 0x1c) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000380)=@raw={'raw\x00', 0x3c1, 0x3, 0x2f8, 0x0, 0xd0, 0xd0, 0xd0, 0xd0, 0x228, 0x228, 0x228, 0x228, 0x228, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0xa8, 0xd0}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00', 0x0, {0xffff}}}, {{@uncond, 0x0, 0x138, 0x158, 0x0, {}, [@common=@srh1={{0x90, 'srh\x00'}, {0x0, 0x0, 0x0, 0x0, 0x0, @dev, @loopback, @local}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x358) [ 1582.892405][ T8959] kAFS: No cell specified 23:34:42 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_DEL(r0, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="ac0000000209010100003f000000000000000009700002002c000100140003006ed80a0ec3677685b4c446deabbe2e8d14000400000000000000400000000000000000000c00020005000100060000000c000200050001003a00000014000100080001007f000001080002007f000001e891871d58a4030c00020005000100880000000c00040008000500f2ff001f0c000200060003000000000008000500000000150800060000000000"], 0xac}, 0x1, 0x0, 0x0, 0x40081}, 0x40000d0) 23:34:42 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) dup(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0xfff7fffffffffffa) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000080)={0x6, &(0x7f0000000040)=[{0x5, 0x5, 0xec, 0x16}, {0x6662, 0x4, 0x40}, {0xf000, 0x7, 0x3f, 0x7}, {0xbb4, 0x81, 0x20, 0x3}, {0x8, 0x31, 0x8, 0x1ff}, {0xb, 0x80, 0x9, 0x9}]}) mount(&(0x7f0000000000)=ANY=[@ANYBLOB='/'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 23:34:42 executing program 1: r0 = socket$inet(0x2, 0x3, 0x2200000088) sendto$inet(r0, 0x0, 0x30, 0x0, &(0x7f0000319ff0)={0x2, 0x4e20}, 0x10) 23:34:42 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2}, 0x0) r1 = syz_open_procfs(r0, &(0x7f0000000040)='net/psched\x00') r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x1841, 0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000100)={0x100000, &(0x7f0000000080), 0x0, r2, 0x4}) mount(&(0x7f0000000000)=ANY=[@ANYBLOB='\x00'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1583.036548][ T8982] kAFS: unparsable volume name [ 1583.069788][ T8989] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.0'. 23:34:42 executing program 1: openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsu\x00', 0x410200, 0x0) r0 = socket$inet(0x2, 0x2, 0x2200000088) sendto$inet(r0, 0x0, 0x30, 0x0, &(0x7f0000319ff0)={0x2, 0x4e20}, 0x10) [ 1583.092641][ T8991] kAFS: unparsable volume name [ 1583.104690][ T8990] kAFS: Bad value for 'source' [ 1583.109118][ T8989] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1583.133470][ T8992] kAFS: Bad value for 'source' 23:34:42 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount(0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x0, 0x0) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev}, 0x1c) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000380)=@raw={'raw\x00', 0x3c1, 0x3, 0x2f8, 0x0, 0xd0, 0xd0, 0xd0, 0xd0, 0x228, 0x228, 0x228, 0x228, 0x228, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0xa8, 0xd0}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00', 0x0, {0xffff}}}, {{@uncond, 0x0, 0x138, 0x158, 0x0, {}, [@common=@srh1={{0x90, 'srh\x00'}, {0x0, 0x0, 0x0, 0x0, 0x0, @dev, @loopback, @local}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x358) 23:34:42 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount(&(0x7f0000000040)=@md0='/dev/md0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='gfs2\x00', 0x800004, &(0x7f0000000100)='&\\cpusetlokeyringeth1^wlan0mime_type\x00') mkdir(&(0x7f0000000200)='./file0\x00', 0x0) arch_prctl$ARCH_SET_GS(0x1001, &(0x7f00000001c0)) mount(&(0x7f0000000000)=ANY=[@ANYBLOB='%'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 23:34:42 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_DEL(r0, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="ac00000002090101000040000000000000000009700002002c000100140003006ed80a0ec3677685b4c446deabbe2e8d14000400000000000000400000000000000000000c00020005000100060000000c000200050001003a00000014000100080001007f000001080002007f000001e891871d58a4030c00020005000100880000000c00040008000500f2ff001f0c000200060003000000000008000500000000150800060000000000"], 0xac}, 0x1, 0x0, 0x0, 0x40081}, 0x40000d0) 23:34:42 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2}, 0x0) r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2008}, 0x1c) listen(r1, 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r1, 0x6612) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x38, 0x1}, 0x0) pipe(&(0x7f0000000080)) mount(&(0x7f00000002c0)=ANY=[@ANYRESHEX=r2], &(0x7f00000001c0)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x9000, 0x0) [ 1583.321763][ T9069] kAFS: unparsable volume name [ 1583.345120][ T9105] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1583.369589][ T9069] gfs2: Unknown parameter '&\cpusetlokeyringeth1^wlan0mime_type' 23:34:42 executing program 1: r0 = socket$inet(0x2, 0x2, 0x2200000088) sendto$inet(r0, 0x0, 0x30, 0x0, &(0x7f0000319ff0)={0x2, 0x4e20}, 0x10) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r4) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x5d1e, 0x2, &(0x7f00000001c0)=[{&(0x7f0000000080)="fe8b17fa3c", 0x5, 0x8}, {&(0x7f00000000c0)="e504149f64b08841064310c662dba40c61a16960ecf6f369cdd53c43efc8c61c0dee9f6e2cc40ec43413d21283df0f49420313b3ce87f3d4ea5545b6877a636abbc09e705dd6d2bc6a808129cdd7db026cce4f046dec42eec62593b7e4c6943f550b6639332dea3f48ea3237df21e861f2608914f542153280c0f9d5b10a5a84abd7514c1477c874601ae402b9f0c287fa837e14469687f3585a30e76df1a1534dcaed628a72586567d6e26ed632586c7f5a641ea329a3e322a7604fccd9e206f5ce0b34177dc8071b3c7d0f1f33bad291e218211cef1a5a4075a05b6687d2f72ac84cd35172ad35ae8e17fc65cf9abbdc", 0xf1, 0x2}], 0x2000000, &(0x7f0000000200)={[{@noquota='noquota'}, {@discard='discard'}, {@noquota='noquota'}, {@locktable={'locktable', 0x3d, ')-'}}, {@quota='quota'}, {@discard='discard'}, {@data_ordered='data=ordered'}, {@hostdata={'hostdata', 0x3d, 'vmnet0.$nodevGPL'}}, {@quota_account='quota=account'}], [{@uid_eq={'uid', 0x3d, r2}}, {@obj_role={'obj_role'}}, {@uid_eq={'uid', 0x3d, r4}}, {@appraise_type='appraise_type=imasig'}, {@pcr={'pcr', 0x3d, 0x3e}}, {@func={'func', 0x3d, 'KEXEC_INITRAMFS_CHECK'}}]}) [ 1583.395391][ T9105] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1583.399976][ T9111] kAFS: unparsable volume name 23:34:43 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000000)=ANY=[@ANYBLOB='%'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 23:34:43 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount(0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x0, 0x0) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2008}, 0x1c) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000380)=@raw={'raw\x00', 0x3c1, 0x3, 0x2f8, 0x0, 0xd0, 0xd0, 0xd0, 0xd0, 0x228, 0x228, 0x228, 0x228, 0x228, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0xa8, 0xd0}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00', 0x0, {0xffff}}}, {{@uncond, 0x0, 0x138, 0x158, 0x0, {}, [@common=@srh1={{0x90, 'srh\x00'}, {0x0, 0x0, 0x0, 0x0, 0x0, @dev, @loopback, @local}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x358) 23:34:43 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_DEL(r0, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="ac00000002090101000048000000000000000009700002002c000100140003006ed80a0ec3677685b4c446deabbe2e8d14000400000000000000400000000000000000000c00020005000100060000000c000200050001003a00000014000100080001007f000001080002007f000001e891871d58a4030c00020005000100880000000c00040008000500f2ff001f0c000200060003000000000008000500000000150800060000000000"], 0xac}, 0x1, 0x0, 0x0, 0x40081}, 0x40000d0) 23:34:43 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) r2 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2008}, 0x1c) ioctl$RNDADDENTROPY(r1, 0x40085203, &(0x7f0000000600)={0xa3b, 0x29, "1e897f390580f139cc39ec7b3e592938c9e62b3aa5ec70b99e5dae24694eb967b277950f49b9c60050"}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$BLKSECTGET(r4, 0x1267, &(0x7f0000000640)) listen(r2, 0x0) ioctl$sock_SIOCGSKNS(r2, 0x894c, &(0x7f0000000540)=0x1000) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) recvmsg$can_raw(r1, &(0x7f0000000500)={&(0x7f0000000040)=@in={0x2, 0x0, @multicast2}, 0x80, &(0x7f00000001c0)=[{&(0x7f00000000c0)=""/127, 0x7f}, {&(0x7f0000000240)=""/162, 0xa2}, {&(0x7f0000000300)=""/164, 0xa4}, {&(0x7f00000003c0)=""/253, 0xfd}], 0x4, &(0x7f00000004c0)=""/34, 0x22}, 0x2) mount(&(0x7f00000005c0)=ANY=[@ANYBLOB="23211ff2be2e098ac942be7d66f91e574117a7d8dc9c17a05b463e"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000580)) 23:34:43 executing program 1: r0 = socket$inet(0x2, 0x2, 0x2200000088) sendto$inet(r0, 0x0, 0x0, 0x20040000, &(0x7f0000319ff0)={0x2, 0x4e20, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) [ 1583.610195][ T9195] kAFS: unparsable volume name [ 1583.664879][ T9234] kAFS: unparsable volume name 23:34:43 executing program 1: syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000040)='./file0\x00', 0x2, 0x9, &(0x7f0000002440)=[{&(0x7f0000000080)="87aad1a0826520b687aaf69b4eb0e595d0f35d4eccd3077afddfd7e927d66ff3f2ad6e4d38f138bacb81c80bfd4ced60191af91a8d078f929009e32d734857ac1a8ec42f01ec3cae25d7f4310c16c91347667c6e0bed5a0c76333a7a292ea26cb5dc0cbaed73db9c7f35613235d6c8435646bd3fc6df80bfd88b03c70d19e98d52c531a96363556de67d7856", 0x8c, 0x2}, {&(0x7f0000000140)="80f01480f99607314bed92d879f63c156f17c9dc840a258ecc93d96f7b38a2ad2dd9339eed7a4335a8b147f93f60b98c4b0f087e69f2aca32882f33e98dc45a57e134047cdeb7a2678101186614a18904fb6ab1d40b7081826d519de1347fcf246c8b9be8b50c93ace60f806a7e7f02130f3bac6e6521e3c52d442eb2648d3eea6f3aa69be2cc125474be806e11c75a72dab7b171f3e001f59be2579d7f922", 0x9f, 0x3f}, {&(0x7f0000000200)="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", 0x1000, 0x3}, {&(0x7f0000001200)="d0b9b4f0fa0c64bc05109143a1dd91a7671486b61837ea5b2ddfdedfffdbfaf5937fd4c15c48aa80ba018ff3da9c4c5509000fe0d2a72952c061a4b703949ecf3e81ffc8ae7a171c3d9a4f26d3db129f6f948ba2ca25412aec8045f2c116cbe5ed56b42c445671", 0x67, 0x7}, {&(0x7f0000001280)="7710c0eacd9a35ac13583267a891fb41e0148809128db3d5a0bb319d629be4d7ec75c1e2441be3cacdbedd52310b37446f83f0cae498576c3a6780d7b3091bd6b934d7b425dd73556b93a543bec450944bc7881e026c9cdab4f84634ae95da5fcbc9860b6eed5e660fda27ca8cb343292a9907edff0cb1d0e95ff73f49e0e54d266ed5eefa75a121901ad1d64ed52a9dbe72bee1c6c829295f8a45aebad506af5b855e8c21f4a33408eed8", 0xab, 0x3}, {&(0x7f0000001340), 0x0, 0xff}, {&(0x7f0000001380)="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", 0x1000, 0x9}, {&(0x7f0000002380)="f79587dfecb496dadd7766ee7f84a936829de030438b81c7fc494d53436903bef4a055d310949b1a2262ff991924ad8c94a05b772f8319e539bde1ad6f6ace1d6ec6e4b61a6d3843ce9794fb0b1d2d2482caa290ea354a27d6cdf70ebbe8704a7aa088a26be70674b89818bdc3", 0x6d, 0x6}, {&(0x7f0000002400)="fbc7a493c183e983975d2805db87df99bace7f", 0x13, 0xffffffff}], 0x100000, 0x0) r0 = socket$inet(0x2, 0x2, 0x2200000088) sendto$inet(r0, 0x0, 0x30, 0x0, &(0x7f0000319ff0)={0x2, 0x4e20}, 0x10) 23:34:43 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount(0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x0, 0x0) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2008}, 0x1c) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000380)=@raw={'raw\x00', 0x3c1, 0x3, 0x2f8, 0x0, 0xd0, 0xd0, 0xd0, 0xd0, 0x228, 0x228, 0x228, 0x228, 0x228, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0xa8, 0xd0}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00', 0x0, {0xffff}}}, {{@uncond, 0x0, 0x138, 0x158, 0x0, {}, [@common=@srh1={{0x90, 'srh\x00'}, {0x0, 0x0, 0x0, 0x0, 0x0, @dev, @loopback, @local}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x358) 23:34:43 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_DEL(r0, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="ac0000000209010100004c000000000000000009700002002c000100140003006ed80a0ec3677685b4c446deabbe2e8d14000400000000000000400000000000000000000c00020005000100060000000c000200050001003a00000014000100080001007f000001080002007f000001e891871d58a4030c00020005000100880000000c00040008000500f2ff001f0c000200060003000000000008000500000000150800060000000000"], 0xac}, 0x1, 0x0, 0x0, 0x40081}, 0x40000d0) [ 1583.698309][ T9237] kAFS: No cell specified 23:34:43 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x38, 0x2}, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x38, 0x2}, 0x0) r4 = getpid() sched_setattr(r4, &(0x7f0000000040)={0x38, 0x2}, 0x0) r5 = getpid() sched_setattr(r5, &(0x7f0000000040)={0x38, 0x2}, 0x0) r6 = getpid() sched_setattr(r6, &(0x7f0000000040)={0x38, 0x2}, 0x0) mount(&(0x7f0000000500)=ANY=[@ANYRESDEC, @ANYRESHEX=r0, @ANYRESDEC=r0, @ANYBLOB="920f4a502fd29b6379d90c3ba417e7f7c1a22e26231acf77439461f48a050cb89749d6e1b31c6252d89ed726abce24c9534617ae2db371c40dc4f7f256af4074ad4eb8d016d1d36a871533a06f67dcfad0"], &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='ceph\x00', 0x10801c4, 0x0) 23:34:43 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_DEL(r0, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="ac00000002090101000060000000000000000009700002002c000100140003006ed80a0ec3677685b4c446deabbe2e8d14000400000000000000400000000000000000000c00020005000100060000000c000200050001003a00000014000100080001007f000001080002007f000001e891871d58a4030c00020005000100880000000c00040008000500f2ff001f0c000200060003000000000008000500000000150800060000000000"], 0xac}, 0x1, 0x0, 0x0, 0x40081}, 0x40000d0) 23:34:43 executing program 1: socket$inet(0x2, 0x2, 0x2200000088) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendto$inet(r1, 0x0, 0x0, 0x4000, &(0x7f0000319ff0)={0x2, 0x4e2c}, 0x10) 23:34:43 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount(0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x0, 0x0) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2008}, 0x1c) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000380)=@raw={'raw\x00', 0x3c1, 0x3, 0x2f8, 0x0, 0xd0, 0xd0, 0xd0, 0xd0, 0x228, 0x228, 0x228, 0x228, 0x228, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0xa8, 0xd0}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00', 0x0, {0xffff}}}, {{@uncond, 0x0, 0x138, 0x158, 0x0, {}, [@common=@srh1={{0x90, 'srh\x00'}, {0x0, 0x0, 0x0, 0x0, 0x0, @dev, @loopback, @local}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x358) [ 1583.957081][ T9356] validate_nla: 82 callbacks suppressed [ 1583.957089][ T9356] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 23:34:43 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000000)=ANY=[@ANYBLOB='%'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1584.000446][ T9356] netlink: 'syz-executor.0': attribute type 2 has an invalid length. [ 1584.019537][ T9356] netlink: 'syz-executor.0': attribute type 2 has an invalid length. [ 1584.044266][ T9356] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 23:34:43 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_DEL(r0, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="ac00000002090101000068000000000000000009700002002c000100140003006ed80a0ec3677685b4c446deabbe2e8d14000400000000000000400000000000000000000c00020005000100060000000c000200050001003a00000014000100080001007f000001080002007f000001e891871d58a4030c00020005000100880000000c00040008000500f2ff001f0c000200060003000000000008000500000000150800060000000000"], 0xac}, 0x1, 0x0, 0x0, 0x40081}, 0x40000d0) [ 1584.098847][ T9379] cgroup: fork rejected by pids controller in /syz4 [ 1584.133847][ T9373] kAFS: unparsable volume name [ 1584.165246][ T9434] kAFS: unparsable volume name 23:34:43 executing program 1: r0 = socket$inet(0x2, 0x2, 0x2200000088) sendto$inet(r0, 0x0, 0x30, 0x0, &(0x7f0000319ff0)={0x2, 0x4e20}, 0x10) stat(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0}) r2 = geteuid() syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000040)='./file0\x00', 0x9, 0x9, &(0x7f0000000640)=[{&(0x7f0000000080)="c8bd34cf3c23497f00618464d9577b654c4393b4d6f069f39b347c74d7cff1a3306a2c46f7151de61996d0ad78acb6560e6b3e1391fc2a07b918af8fc176ed1f59108e70541354b98a84980c08d6ad22a919d25c68722771b291", 0x5a, 0x5}, {&(0x7f0000000100)="13d3b9f75d77897f50dce3ba8685e25fab9b5959d09d3b210877abfa1bcf7408183eb2e10d5b70dd70035e15f1b646f82b6d2018eeaa6a362e59e7d184890cf27be06e8f8e97e739359690848d77bd998fc5ba1f5a137e5c33f9b9ee52f1f2cb344a9cba27f31bda655ed9d82f5e90ef27ef35d92f7bb675cd35d6abd3cc28638473276c00d1da5eefcf11b633f5c4885b0e74286af40ecf", 0x98, 0x3}, {&(0x7f00000001c0)="5afe8b3893d4d17db83dfbeee149aaa6264aecc526050dfb2f9d6d735a829324512cad9b8963324d6032e247106f3485d48f2c635876df2b", 0x38, 0x100}, {&(0x7f0000000200)="b217b1274b1280ddaa2ec486bcebacb94d558fd3b8efea4578f72b1684f98e02c3453a4ea0c182a65b4a0fe8c94032b146fa8ec312e1e2c4bc20df403ccd8f1f88f17eda8d69214a88017d8f165a5c5f23ac24f405616ddf7cd99f29975233561a2d4f2dd8d1ce67890b6e29730937c0a353c945589a12aa442212509d102a45be2421f96fa4a52ffc777d71d91866fbffc8ec85b6773c3b158ee8e17fb64fffe5ae6c476740fd6778ae0063bd0f4ffaf23ff7daf25589fbfe4753ac6b3fe98abc55af1cedfaa53aa8072f608dcf2763", 0xd0, 0x200}, {&(0x7f0000000300)="7eb16d38a3d5d3fb3102a9aaade858f55190159488e3fdcda02f999129af611c88b104a5b27b22e095a41472f8010e26d3", 0x31, 0x43b1}, {&(0x7f0000000340)="288dc55b082f97f617b369ed1c92b21c38f04ccaddd08392ea45d195771c2ab8945cb622cf22dfd96c719cde8cf2a3e0f8fa789469998cf792dcfa5e9b827b05952239fa17c2f37c35b36ced94003849bfebf27788e176d7bafb4d287795c15549835f0a5fb3ec31f1a24b935c4b27bde21a638728dd98d67f70d6e1187ef197abc5aea6a87299414e217e39b2a9fae12655ad3f73a4d998c6ae7a6d05c65bf1d1772cc0607f85edc902cbda60cf8571d98ebe918ecbe12428d979507674092f", 0xc0, 0x7f}, {&(0x7f0000000400)="9b5bad927e9042ba462b630a57e1cbc992fdc2310a31256123b58ecbfc63e2bcec6770f40d2f6b6b879f302e3ee5fa693ad73055be0e0981c7e4424f6cf4f6891a8bb82dc0efa33de0cbc14ae978419c3dfe56b34398c017678dba3d375217b63c717f31017f5d05f58f996ae092145f4100c942e469830b4d2bbf10fa6041", 0x7f, 0x5}, {&(0x7f0000000480)="8e8572cc67be9e7fdf29ee01c27c67b927330564e9a39e666f66bdbe9262c53683d7f0dfaa1a477c2d64a3e845221f5d099fa7d68466691a66669ff8c760f20c5ab8f54eb0243788f39dad442b5ea6af5b4e06d186de9d3c2ccb1cc9a7bd339f2cc03801372e89f28e258aa51fa4a628208484d3e1a3df69f24e6d979e7170e4add59a5350b1d3ce9bb87a9a24991734087ff55cba4bebd7971ac877ab2f78727223c89c638f2fba7331b6dea768ceff85f46686e684dbaa24e3f4f72ddf71ab09aebb70eb72aff9c31dec104f21", 0xce, 0x100000000}, {&(0x7f0000000580)="221c1770392f585cee46a8705ddf4a52cbdbfab40912afcb92a80c6611174a6f8544908121966d565761851a73fec1884c20cda857bc2de283f61b4bced5975595969293dc1e552f84f1187fcf41b9273150b4385336ae8c7dcadf8e12aecdf921e89e00817537c6005604183c401df361ac4261fe934adbf7a17df1ef657218b4bda70a9bd92c96ef6f47417e5a685575f7281845403c7e88e8b01f4360ea1bbbe431701e026acb630b3ae70cfcbf3cb5e862254eaf1c", 0xb7, 0x401}], 0x20004, &(0x7f0000000800)={[{@acl='acl'}, {@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}], [{@subj_role={'subj_role', 0x3d, 'em1&security&'}}, {@fowner_lt={'fowner<', r1}}, {@fowner_lt={'fowner<', r2}}, {@smackfsroot={'smackfsroot'}}]}) [ 1584.222725][ T9474] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 1584.267777][ T9474] netlink: 'syz-executor.0': attribute type 2 has an invalid length. [ 1584.317305][ T9474] netlink: 'syz-executor.0': attribute type 2 has an invalid length. [ 1584.345810][ T9474] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 23:34:44 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000000)=ANY=[@ANYBLOB="a3"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 23:34:44 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x40000400204) write$rfkill(r1, &(0x7f00000000c0)={0x1, 0x7, 0x2, 0x1}, 0x8) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r3 = dup(r2) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = syz_genetlink_get_family_id$nl80211(&(0x7f00000001c0)='nl80211\x00') sendmsg$NL80211_CMD_START_AP(r5, &(0x7f00000002c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000280)={&(0x7f0000000380)=ANY=[@ANYBLOB="1800000068cffe6b40050ce3d30363dd76b6be9f36595c001dd16b08963c23f59ba7e7b6d08a95c41007a0dca71886008dabf51a603109a6a18df56ad96a9a3ea25453d12037f7030a41d9975d941828a2f4b535c2f14f6797492024170c7f5eecb5be76f3d23c749e1bdb904400fe718b0e79299bcefe35193859abe0b85419936d0f67ec36c95a6c4fc7ea26b8e847b3de30cbf83e18a0907da4f48765f720196c9ec8c758b97d5812cd630f5845d154ef690eddd4283febab2677201cc045a3ca92c026be5c916146089b9a5fad7ec423a67e0bdfd30dffd4f5bf8ff0f6b5f4ca0fe9c5ce70586ff51cd34d8ebd0b9babee78c24ff69d", @ANYRES16=r6, @ANYBLOB="020028bd7000fddbdf250f0000000400e200"], 0x18}, 0x1, 0x0, 0x0, 0x4008040}, 0x4000) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$DRM_IOCTL_MARK_BUFS(r3, 0x40206417, &(0x7f0000000080)={0x4, 0x2, 0x9, 0x3, 0x7, 0x800}) mount(&(0x7f0000000000)=ANY=[@ANYBLOB='%'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 23:34:44 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount(0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x0, 0x0) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2008}, 0x1c) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000380)=@raw={'raw\x00', 0x3c1, 0x3, 0x2f8, 0x0, 0xd0, 0xd0, 0xd0, 0xd0, 0x228, 0x228, 0x228, 0x228, 0x228, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0xa8, 0xd0}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00', 0x0, {0xffff}}}, {{@uncond, 0x0, 0x138, 0x158, 0x0, {}, [@common=@srh1={{0x90, 'srh\x00'}, {0x0, 0x0, 0x0, 0x0, 0x0, @dev, @loopback, @local}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x358) 23:34:44 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_DEL(r0, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="ac0000000209010100006c000000000000000009700002002c000100140003006ed80a0ec3677685b4c446deabbe2e8d14000400000000000000400000000000000000000c00020005000100060000000c000200050001003a00000014000100080001007f000001080002007f000001e891871d58a4030c00020005000100880000000c00040008000500f2ff001f0c000200060003000000000008000500000000150800060000000000"], 0xac}, 0x1, 0x0, 0x0, 0x40081}, 0x40000d0) 23:34:44 executing program 1: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2008}, 0x1c) listen(r0, 0x0) r1 = accept(r0, 0x0, &(0x7f0000000000)) recvfrom$netrom(r1, &(0x7f0000000040)=""/22, 0x16, 0x10021, &(0x7f0000000080)={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x6}, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @default, @bcast, @bcast, @null, @null]}, 0x48) r2 = syz_open_dev$video4linux(&(0x7f0000000140)='/dev/v4l-subdev#\x00', 0x4, 0x8080) ioctl$VIDIOC_SUBDEV_S_SELECTION(r2, 0xc040563e, &(0x7f00000001c0)={0x1, 0x0, 0x2, 0x2, {0x5a3, 0x7ff, 0x1, 0x400}}) socket$inet(0x2, 0x2, 0x2200000088) r3 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000200)='/dev/cachefiles\x00', 0x28200, 0x0) setsockopt$inet_opts(r3, 0x0, 0x4, &(0x7f0000000240)="0aa5b7cd008200a4f78f8542630464d5b9235e5a405a2e1ad60f41ce305b522f41c1029053381503c82055c93b0174ba8a3bf13d6a954e4e6d659b399f268785a8be43271f456de7d8cdc864ebb258e257d605c5804a441402dadb4ffbd4beb4ce3e4fc7a67fcbb45de17fe5b303140b8d4ddfb84de63e5f5c195e5d7fb815af09e47d018c5b7434da067f9d9a3fecaa42", 0x91) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendto$inet(r5, 0x0, 0xfffffffffffffe9b, 0x0, &(0x7f0000000100)={0x2, 0xe21, @multicast1}, 0x10) [ 1584.413298][ T9237] kAFS: No cell specified [ 1584.504040][ T9581] kAFS: unparsable volume name [ 1584.519971][ T9585] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 1584.536995][ T9589] kAFS: unparsable volume name [ 1584.542922][ T9585] netlink: 'syz-executor.0': attribute type 2 has an invalid length. [ 1584.564122][ T9590] kAFS: unparsable volume name 23:34:44 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_DEL(r0, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="ac00000002090101000074000000000000000009700002002c000100140003006ed80a0ec3677685b4c446deabbe2e8d14000400000000000000400000000000000000000c00020005000100060000000c000200050001003a00000014000100080001007f000001080002007f000001e891871d58a4030c00020005000100880000000c00040008000500f2ff001f0c000200060003000000000008000500000000150800060000000000"], 0xac}, 0x1, 0x0, 0x0, 0x40081}, 0x40000d0) 23:34:44 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGRAB(r0, 0x40044590, 0x0) ioctl$EVIOCGMASK(r0, 0x80104592, &(0x7f0000000080)={0x5, 0xf, &(0x7f0000000040)="bcb39e0be3071690d2c296817f645b"}) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000000)=ANY=[@ANYBLOB='#'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 23:34:44 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount(0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x0, 0x0) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2008}, 0x1c) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000380)=@raw={'raw\x00', 0x3c1, 0x3, 0x2f8, 0x0, 0xd0, 0xd0, 0xd0, 0xd0, 0x228, 0x228, 0x228, 0x228, 0x228, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0xa8, 0xd0}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00', 0x0, {0xffff}}}, {{@uncond, 0x0, 0x138, 0x158, 0x0, {}, [@common=@srh1={{0x90, 'srh\x00'}, {0x0, 0x0, 0x0, 0x0, 0x0, @dev, @loopback, @local}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x358) 23:34:44 executing program 2: ptrace$getsig(0x4202, 0xffffffffffffffff, 0x3, &(0x7f0000000080)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x1000002, 0x1010, r2, 0x0) r3 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="d58a7c59f43be9fbffffffffffffff5a12548810c4777d08d2620aae1197a8e471c0a2833e8b2cb09839b6f411000011f56e57c21ddd99fa624f7906b54a896284e4f48495d0915615346270be45e9c5022993dba1a283d993f605b9c945bb5cb476c7401525811c3a140b636c6322ed363e355c8c2069a3bdcd72521cd03c1edc012d538e76d4ce7325d8da672935be4b9fa9bfb18e58ec1a9920b2ad4ae1ade0"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 23:34:44 executing program 1: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/consoles\x00', 0x0, 0x0) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000080)='NLBL_MGMT\x00') sendmsg$NLBL_MGMT_C_ADDDEF(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x40, r1, 0x4, 0x70bd2b, 0x25dfdbfb, {}, [@NLBL_MGMT_A_IPV6MASK={0x14, 0x6, @dev={0xfe, 0x80, [], 0x10}}, @NLBL_MGMT_A_IPV4MASK={0x8, 0x8, @loopback}, @NLBL_MGMT_A_IPV4MASK={0x8, 0x8, @remote}, @NLBL_MGMT_A_CLPDOI={0x8, 0xc, 0x1}]}, 0x40}, 0x1, 0x0, 0x0, 0x40000}, 0x20000850) socket$inet(0x2, 0x2, 0x2200000088) [ 1584.796809][ T9732] kAFS: No cell specified [ 1584.800345][ T9705] kAFS: unparsable volume name 23:34:44 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x38, 0x2}, 0x0) mount(&(0x7f00000000c0)=ANY=[@ANYBLOB="9649d2d7af043501bfc8eeeba58f06ee130f5c7c555f636239484f64b92e329d68d2c047417f52014c2f0a7573e78265d06c8bc7e22f2e9300ded2371f54bbffc0f39b16d762bc", @ANYRESOCT], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x800002, 0x0) 23:34:44 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_DEL(r0, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="ac0000000209010100007a000000000000000009700002002c000100140003006ed80a0ec3677685b4c446deabbe2e8d14000400000000000000400000000000000000000c00020005000100060000000c000200050001003a00000014000100080001007f000001080002007f000001e891871d58a4030c00020005000100880000000c00040008000500f2ff001f0c000200060003000000000008000500000000150800060000000000"], 0xac}, 0x1, 0x0, 0x0, 0x40081}, 0x40000d0) 23:34:44 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount(0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x0, 0x0) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2008}, 0x1c) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000380)=@raw={'raw\x00', 0x3c1, 0x3, 0x2f8, 0x0, 0xd0, 0xd0, 0xd0, 0xd0, 0x228, 0x228, 0x228, 0x228, 0x228, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0xa8, 0xd0}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00', 0x0, {0xffff}}}, {{@uncond, 0x0, 0x138, 0x158, 0x0, {}, [@common=@srh1={{0x90, 'srh\x00'}, {0x0, 0x0, 0x0, 0x0, 0x0, @dev, @loopback, @local}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x358) [ 1584.902479][ T9887] kAFS: No cell specified 23:34:44 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00') sendmsg$NL80211_CMD_TRIGGER_SCAN(r1, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x18, r2, 0x400, 0x70bd2d, 0x25dfdbfc, {}, [@NL80211_ATTR_TX_NO_CCK_RATE={0x4}]}, 0x18}, 0x1, 0x0, 0x0, 0x20004810}, 0x28004005) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="23b3fa355e76330a3f677afa4701f6caf437d86a94e12a1e9680f80e78c54dfb4fd6fc864dc3eaa59629c7957041a89e6135ed1a3099cf7ce6a92093952e08d69f54eefc0a3a8f0384fcddcc705d3190000000000000225cc25959cbb8fa21ec56ad9e1fd1c6d5b81cdead36926a45d28ff9eec27c30f94dcd81d33ac9c4219ea645056f26311330b57dafa1b874a9b4169b9e2fcf1b53a4d8865e14414d5e3d97118dfae9ead95a2d15238f4103ed60829c75d9db3e16561d2c9186ba1a4a0587c17f804d38d2629960de798872f8e6a4f230"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 23:34:44 executing program 1: r0 = socket$inet(0x2, 0x2, 0x2200000088) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) ioctl$KVM_SET_CLOCK(r1, 0x4030ae7b, &(0x7f0000000040)={0x7}) sendto$inet(r0, 0x0, 0x30, 0x0, &(0x7f0000319ff0)={0x2, 0x4e20}, 0x10) [ 1585.022231][ T9919] kAFS: unparsable volume name 23:34:44 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_DEL(r0, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="ac00000002090101003bda000000000000000009700002002c000100140003006ed80a0ec3677685b4c446deabbe2e8d14000400000000000000400000000000000000000c00020005000100060000000c000200050001003a00000014000100080001007f000001080002007f000001e891871d58a4030c00020005000100880000000c00040008000500f2ff001f0c000200060003000000000008000500000000150800060000000000"], 0xac}, 0x1, 0x0, 0x0, 0x40081}, 0x40000d0) [ 1585.057572][ T9921] kAFS: unparsable volume name 23:34:44 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount(0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x0, 0x0) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2008}, 0x1c) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, 0x0, 0x0) 23:34:44 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x38, 0x2}, 0x0) mount(&(0x7f00000001c0)=ANY=[@ANYRESOCT=r2], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='binder\x00', 0x308a024, 0x0) 23:34:44 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_DEL(r0, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="ac00000002090101000000000100000000000009700002002c000100140003006ed80a0ec3677685b4c446deabbe2e8d14000400000000000000400000000000000000000c00020005000100060000000c000200050001003a00000014000100080001007f000001080002007f000001e891871d58a4030c00020005000100880000000c00040008000500f2ff001f0c000200060003000000000008000500000000150800060000000000"], 0xac}, 0x1, 0x0, 0x0, 0x40081}, 0x40000d0) [ 1585.201219][ T9929] kAFS: unable to lookup cell '³ú5^v3 [ 1585.201219][ T9929] ?gzúGöÊô7Øj”á*–€øxÅMûOÖü†MÃ꥖)Ç•pA¨ža5í0™Ï|æ© “•.ÖŸTîü [ 1585.201219][ T9929] ' [ 1585.291570][T10012] kAFS: unable to lookup cell '³ú5^v3 [ 1585.291570][T10012] ?gzúGöÊô7Øj”á*–€øxÅMûOÖü†MÃ꥖)Ç•pA¨ža5í0™Ï|æ© “•.ÖŸTîü [ 1585.291570][T10012] ' 23:34:44 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount(0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x0, 0x0) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2008}, 0x1c) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, 0x0, 0x0) 23:34:44 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_DEL(r0, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="ac00000002090101000000000200000000000009700002002c000100140003006ed80a0ec3677685b4c446deabbe2e8d14000400000000000000400000000000000000000c00020005000100060000000c000200050001003a00000014000100080001007f000001080002007f000001e891871d58a4030c00020005000100880000000c00040008000500f2ff001f0c000200060003000000000008000500000000150800060000000000"], 0xac}, 0x1, 0x0, 0x0, 0x40081}, 0x40000d0) 23:34:44 executing program 1: r0 = socket$inet(0x2, 0x2, 0x2200000088) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000319ff0)={0x2, 0x4e20, @rand_addr=0xfffffffc}, 0x10) syz_mount_image$nfs4(&(0x7f0000000000)='nfs4\x00', &(0x7f0000000040)='./file0\x00', 0xb4e2, 0x4, &(0x7f0000000300)=[{&(0x7f0000000080)="9c895b2967e67a9e1c849622a8619207a087be478f8aedea02ec4675618c41c6f18dc4fc8f298cc8b5b7a000cb53db1d69866e4c65ca95c753f415eab4782efd1697be123f42caa4fd5d62d792305de52d65b58d3ccc42158da04bc9982f857f9dd5f4855ca017aa02883d48c9b3440e77b7bc6fd7f877d38f80c4a30524f775b7dd829aa6c10103bdb696221168", 0x8e, 0x9}, {&(0x7f0000000140)="1e4a911ee959432f054e5b42304d5f71d82f8017f053e75694e208abd20927e97628e2dc3fe3b968b2e6e1fc01374389ba8e8471", 0x34, 0xf2}, {&(0x7f0000000180)="9203c9c9176e6aada4b22082f94f824aa84cec3ab0c0c46df459a536915d4ffee611e0a5ef6bd0469658dfc5a5a618492ca6c563719058f64e2f04767942d5015f6561bf", 0x44, 0xfd}, {&(0x7f0000000200)="22602f216d380de74fca937d501a18594148f132bc8c146bf0cd1a8d59232aae1c7898a0455ba799c622a52457acb70881362c9b8632950b06a57218ec12846ec77a7bb322f2d706e13c1426f388dc56a5c40bbdcd532505035d5a6b951fce79c558bbcbbe49b34772a84d3492e155eb9df58392e07c25a6b507d2c22370f021e814654114ae937bc94a33996227ad06dab7b6652765f176c9bf039a9522b8e5c9ec709b2f20f42c6b94a0d32355a6a0966a89a77dd3449bbf9c9a808bf0c1cdab58513bc0fc3857dfb7f2c215c2ec", 0xcf, 0x10000}], 0x182000a, &(0x7f0000000380)='lowlan0mime_typeppp1em0md5sum\x00') 23:34:45 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x102, 0x0) openat$cgroup(r2, &(0x7f0000000080)='syz1\x00', 0x200002, 0x0) mount(&(0x7f0000000000)=ANY=[@ANYBLOB="02"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) 23:34:45 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) r2 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2008}, 0x1c) ioctl$RNDADDENTROPY(r1, 0x40085203, &(0x7f0000000600)={0xa3b, 0x29, "1e897f390580f139cc39ec7b3e592938c9e62b3aa5ec70b99e5dae24694eb967b277950f49b9c60050"}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$BLKSECTGET(r4, 0x1267, &(0x7f0000000640)) listen(r2, 0x0) ioctl$sock_SIOCGSKNS(r2, 0x894c, &(0x7f0000000540)=0x1000) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) recvmsg$can_raw(r1, &(0x7f0000000500)={&(0x7f0000000040)=@in={0x2, 0x0, @multicast2}, 0x80, &(0x7f00000001c0)=[{&(0x7f00000000c0)=""/127, 0x7f}, {&(0x7f0000000240)=""/162, 0xa2}, {&(0x7f0000000300)=""/164, 0xa4}, {&(0x7f00000003c0)=""/253, 0xfd}], 0x4, &(0x7f00000004c0)=""/34, 0x22}, 0x2) mount(&(0x7f00000005c0)=ANY=[@ANYBLOB="23211ff2be2e098ac942be7d66f91e574117a7d8dc9c17a05b463e"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000580)) [ 1585.546460][T10057] kAFS: unparsable volume name [ 1585.581182][T10092] kAFS: unparsable volume name 23:34:45 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount(0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x0, 0x0) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2008}, 0x1c) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, 0x0, 0x0) 23:34:45 executing program 1: r0 = socket$inet(0x2, 0x2, 0x2200000088) sendto$inet(r0, 0x0, 0x30, 0x0, &(0x7f0000319ff0)={0x2, 0x4e20}, 0x10) ioctl$sock_inet_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000000)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r2, 0x4008240b, &(0x7f0000000040)={0x3, 0x70, 0x3f, 0x1, 0x0, 0x8, 0x0, 0x7, 0x100, 0x8, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x4, @perf_config_ext={0x8, 0x8}, 0x21, 0x7, 0x34f00000, 0x9, 0xa5a1, 0x80, 0xd0}) 23:34:45 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_DEL(r0, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="ac00000002090101000000000300000000000009700002002c000100140003006ed80a0ec3677685b4c446deabbe2e8d14000400000000000000400000000000000000000c00020005000100060000000c000200050001003a00000014000100080001007f000001080002007f000001e891871d58a4030c00020005000100880000000c00040008000500f2ff001f0c000200060003000000000008000500000000150800060000000000"], 0xac}, 0x1, 0x0, 0x0, 0x40081}, 0x40000d0) [ 1585.796399][T10175] kAFS: No cell specified 23:34:45 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_DEL(r0, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="ac00000002090101000000000400000000000009700002002c000100140003006ed80a0ec3677685b4c446deabbe2e8d14000400000000000000400000000000000000000c00020005000100060000000c000200050001003a00000014000100080001007f000001080002007f000001e891871d58a4030c00020005000100880000000c00040008000500f2ff001f0c000200060003000000000008000500000000150800060000000000"], 0xac}, 0x1, 0x0, 0x0, 0x40081}, 0x40000d0) 23:34:45 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount(0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x0, 0x0) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2008}, 0x1c) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000380)=@raw={'raw\x00', 0x3c1, 0x3, 0x268, 0x0, 0xd0, 0xd0, 0xd0, 0xd0, 0x228, 0x228, 0x228, 0x228, 0x228, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0xa8, 0xd0}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00', 0x0, {0xffff}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x2c8) 23:34:45 executing program 1: r0 = socket$inet(0x2, 0x2, 0x2200000088) sendto$inet(r0, 0x0, 0x30, 0x0, &(0x7f0000319ff0)={0x2, 0x4e20}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_msfilter(r2, 0x0, 0x29, &(0x7f0000000000)={@dev={0xac, 0x14, 0x14, 0xa}, @multicast1, 0x1, 0x7, [@multicast2, @empty, @broadcast, @rand_addr=0xd52, @multicast1, @rand_addr=0xfbff, @local]}, 0x2c) 23:34:45 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_DEL(r0, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="ac00000002090101000000000500000000000009700002002c000100140003006ed80a0ec3677685b4c446deabbe2e8d14000400000000000000400000000000000000000c00020005000100060000000c000200050001003a00000014000100080001007f000001080002007f000001e891871d58a4030c00020005000100880000000c00040008000500f2ff001f0c000200060003000000000008000500000000150800060000000000"], 0xac}, 0x1, 0x0, 0x0, 0x40081}, 0x40000d0) 23:34:45 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_DEL(r0, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="ac00000002090101000000000600000000000009700002002c000100140003006ed80a0ec3677685b4c446deabbe2e8d14000400000000000000400000000000000000000c00020005000100060000000c000200050001003a00000014000100080001007f000001080002007f000001e891871d58a4030c00020005000100880000000c00040008000500f2ff001f0c000200060003000000000008000500000000150800060000000000"], 0xac}, 0x1, 0x0, 0x0, 0x40081}, 0x40000d0) 23:34:45 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) ioctl$SIOCX25GFACILITIES(0xffffffffffffffff, 0x89e2, &(0x7f0000000040)) mount(&(0x7f0000000080)=ANY=[@ANYRES32], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$SIOCX25GDTEFACILITIES(r4, 0x89ea, &(0x7f00000001c0)) r5 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r5, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2008}, 0x1c) listen(r5, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0xc) r7 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r10 = dup(r9) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) r11 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r11, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2008}, 0x1c) listen(r11, 0x0) r12 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r12, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2008}, 0x1c) listen(r12, 0x0) r13 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r13, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2008}, 0x1c) listen(r13, 0x0) r14 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r14, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2008}, 0x1c) listen(r14, 0x0) r15 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r15, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2008}, 0x1c) listen(r15, 0x0) io_uring_register$IORING_REGISTER_FILES(r10, 0x2, &(0x7f0000001480)=[r3, r0, r2, r11, r1, r12, r13, r14, 0xffffffffffffffff, r15], 0xa) setuid(r8) syz_mount_image$afs(&(0x7f0000000000)='afs\x00', &(0x7f00000000c0)='./file0\x00', 0x80000000016, 0x2, &(0x7f0000000100)=[{&(0x7f0000000240)="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", 0x1000, 0xfffffffffffffffc}, {&(0x7f0000001240)="65470a8d621ce56759c7a34ec2a2e224f6b19ecc5defe21912a5d665c7ebec2cf788c73e6499c5475a54cd1704af4ea378a2a8df4aad5db2cca3e48446783fac05932e5b9c2a8de6c09bf06e1131e36a208383ccf47cf2cb6496fc0d89e2f7138047565dac4a1f66bb99cf323bd36f19b0f1d69788bdcb6eabf6a1c426d51c2ce961b8cf2aa48c09ea3eaa36b5786330f5e752118b04d21a351aa2580e631ce594796b83728decfeb1868433", 0xac, 0x2}], 0x44, &(0x7f0000001300)=ANY=[@ANYBLOB="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", @ANYRESDEC=r6, @ANYBLOB="2c736d61636b66736861743d616673002c66756e633d4649524d574152455f434845434b2c736d61636b6673726f6f743d1f17e53361666a002c00"]) 23:34:45 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount(0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x0, 0x0) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2008}, 0x1c) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000380)=@raw={'raw\x00', 0x3c1, 0x3, 0x268, 0x0, 0xd0, 0xd0, 0xd0, 0xd0, 0x228, 0x228, 0x228, 0x228, 0x228, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0xa8, 0xd0}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00', 0x0, {0xffff}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x2c8) [ 1586.233626][T10379] kAFS: unparsable volume name 23:34:45 executing program 1: r0 = socket$inet(0x2, 0xb, 0x89) sendto$inet(r0, 0x0, 0x30, 0x0, &(0x7f0000319ff0)={0x2, 0x4e20}, 0x10) [ 1586.296249][T10379] kAFS: unparsable volume name [ 1586.364908][T10379] kAFS: unparsable volume name [ 1586.393058][T10408] kAFS: unparsable volume name 23:34:46 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) r2 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2008}, 0x1c) ioctl$RNDADDENTROPY(r1, 0x40085203, &(0x7f0000000600)={0xa3b, 0x29, "1e897f390580f139cc39ec7b3e592938c9e62b3aa5ec70b99e5dae24694eb967b277950f49b9c60050"}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$BLKSECTGET(r4, 0x1267, &(0x7f0000000640)) listen(r2, 0x0) ioctl$sock_SIOCGSKNS(r2, 0x894c, &(0x7f0000000540)=0x1000) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) recvmsg$can_raw(r1, &(0x7f0000000500)={&(0x7f0000000040)=@in={0x2, 0x0, @multicast2}, 0x80, &(0x7f00000001c0)=[{&(0x7f00000000c0)=""/127, 0x7f}, {&(0x7f0000000240)=""/162, 0xa2}, {&(0x7f0000000300)=""/164, 0xa4}, {&(0x7f00000003c0)=""/253, 0xfd}], 0x4, &(0x7f00000004c0)=""/34, 0x22}, 0x2) mount(&(0x7f00000005c0)=ANY=[@ANYBLOB="23211ff2be2e098ac942be7d66f91e574117a7d8dc9c17a05b463e"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000580)) 23:34:46 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_DEL(r0, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="ac00000002090101000000000700000000000009700002002c000100140003006ed80a0ec3677685b4c446deabbe2e8d14000400000000000000400000000000000000000c00020005000100060000000c000200050001003a00000014000100080001007f000001080002007f000001e891871d58a4030c00020005000100880000000c00040008000500f2ff001f0c000200060003000000000008000500000000150800060000000000"], 0xac}, 0x1, 0x0, 0x0, 0x40081}, 0x40000d0) 23:34:46 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount(0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x0, 0x0) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2008}, 0x1c) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000380)=@raw={'raw\x00', 0x3c1, 0x3, 0x268, 0x0, 0xd0, 0xd0, 0xd0, 0xd0, 0x228, 0x228, 0x228, 0x228, 0x228, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0xa8, 0xd0}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00', 0x0, {0xffff}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x2c8) 23:34:46 executing program 1: openat$nvram(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nvram\x00', 0x402, 0x0) r0 = socket$inet(0x2, 0x2, 0x2200000088) sendto$inet(r0, 0x0, 0x30, 0x0, &(0x7f0000319ff0)={0x2, 0x4e20}, 0x10) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) r2 = socket$inet(0x2, 0x80001, 0x84) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0x14, &(0x7f0000000080)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockname$l2tp(r2, &(0x7f0000000340)={0x2, 0x0, @dev}, &(0x7f0000000380)=0x10) r6 = socket$nl_route(0x10, 0x3, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(r6, 0x0, 0x482, &(0x7f0000000180)=""/214, &(0x7f0000000280)=0xd6) setsockopt$inet_sctp_SCTP_DELAYED_SACK(r1, 0x84, 0x10, &(0x7f00000003c0)=@assoc_value={r5, 0x80000}, 0x8) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000000040)={r5, 0x9}, &(0x7f0000000080)=0x8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r9 = dup(r8) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) getsockopt$bt_l2cap_L2CAP_CONNINFO(r9, 0x6, 0x2, &(0x7f00000002c0), &(0x7f0000000300)=0x6) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f00000000c0)={0x691, 0x4, 0x8, 0x5081, r7}, &(0x7f0000000100)=0x10) 23:34:46 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_DEL(r0, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="ac00000002090101000000000800000000000009700002002c000100140003006ed80a0ec3677685b4c446deabbe2e8d14000400000000000000400000000000000000000c00020005000100060000000c000200050001003a00000014000100080001007f000001080002007f000001e891871d58a4030c00020005000100880000000c00040008000500f2ff001f0c000200060003000000000008000500000000150800060000000000"], 0xac}, 0x1, 0x0, 0x0, 0x40081}, 0x40000d0) 23:34:46 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2008}, 0x1c) listen(r2, 0x0) ioctl$int_out(r2, 0x2, &(0x7f0000000080)) r3 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000040)=ANY=[@ANYRES16=r1], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x820880, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$UI_END_FF_ERASE(r5, 0x400c55cb, &(0x7f0000000000)={0x0, 0x75, 0x7fff}) [ 1586.647161][T10420] sctp: [Deprecated]: syz-executor.1 (pid 10420) Use of struct sctp_assoc_value in delayed_ack socket option. [ 1586.647161][T10420] Use struct sctp_sack_info instead [ 1586.673268][T10424] kAFS: No cell specified 23:34:46 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_DEL(r0, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="ac00000002090101000000000900000000000009700002002c000100140003006ed80a0ec3677685b4c446deabbe2e8d14000400000000000000400000000000000000000c00020005000100060000000c000200050001003a00000014000100080001007f000001080002007f000001e891871d58a4030c00020005000100880000000c00040008000500f2ff001f0c000200060003000000000008000500000000150800060000000000"], 0xac}, 0x1, 0x0, 0x0, 0x40081}, 0x40000d0) 23:34:46 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount(0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x0, 0x0) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2008}, 0x1c) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000380)=@raw={'raw\x00', 0x3c1, 0x3, 0x2f8, 0x0, 0xd0, 0xd0, 0xd0, 0xd0, 0x228, 0x228, 0x228, 0x228, 0x228, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0xa8, 0xd0}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00'}}, {{@uncond, 0x0, 0x138, 0x158, 0x0, {}, [@common=@srh1={{0x90, 'srh\x00'}, {0x0, 0x0, 0x0, 0x0, 0x0, @dev, @loopback, @local}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x358) 23:34:46 executing program 1: r0 = socket$inet(0x2, 0x2, 0x2200000088) sendto$inet(r0, 0x0, 0x0, 0x20040090, &(0x7f0000000000)={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x34}}, 0x10) 23:34:46 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_DEL(r0, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="ac00000002090101000000000a00000000000009700002002c000100140003006ed80a0ec3677685b4c446deabbe2e8d14000400000000000000400000000000000000000c00020005000100060000000c000200050001003a00000014000100080001007f000001080002007f000001e891871d58a4030c00020005000100880000000c00040008000500f2ff001f0c000200060003000000000008000500000000150800060000000000"], 0xac}, 0x1, 0x0, 0x0, 0x40081}, 0x40000d0) [ 1586.993214][T10541] xt_TCPMSS: Only works on TCP SYN packets 23:34:46 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount(0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x0, 0x0) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2008}, 0x1c) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000380)=@raw={'raw\x00', 0x3c1, 0x3, 0x2f8, 0x0, 0xd0, 0xd0, 0xd0, 0xd0, 0x228, 0x228, 0x228, 0x228, 0x228, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0xa8, 0xd0}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00'}}, {{@uncond, 0x0, 0x138, 0x158, 0x0, {}, [@common=@srh1={{0x90, 'srh\x00'}, {0x0, 0x0, 0x0, 0x0, 0x0, @dev, @loopback, @local}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x358) 23:34:46 executing program 1: r0 = socket$inet(0x2, 0x2, 0x2200000088) removexattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@known='trusted.overlay.impure\x00') sendto$inet(r0, 0x0, 0x30, 0x0, &(0x7f0000319ff0)={0x2, 0x4e20}, 0x10) [ 1587.204979][T10606] xt_TCPMSS: Only works on TCP SYN packets 23:34:46 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) r2 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2008}, 0x1c) ioctl$RNDADDENTROPY(r1, 0x40085203, &(0x7f0000000600)={0xa3b, 0x29, "1e897f390580f139cc39ec7b3e592938c9e62b3aa5ec70b99e5dae24694eb967b277950f49b9c60050"}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$BLKSECTGET(r4, 0x1267, &(0x7f0000000640)) listen(r2, 0x0) ioctl$sock_SIOCGSKNS(r2, 0x894c, &(0x7f0000000540)=0x1000) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) recvmsg$can_raw(r1, &(0x7f0000000500)={&(0x7f0000000040)=@in={0x2, 0x0, @multicast2}, 0x80, &(0x7f00000001c0)=[{&(0x7f00000000c0)=""/127, 0x7f}, {&(0x7f0000000240)=""/162, 0xa2}, {&(0x7f0000000300)=""/164, 0xa4}, {&(0x7f00000003c0)=""/253, 0xfd}], 0x4, &(0x7f00000004c0)=""/34, 0x22}, 0x2) mount(&(0x7f00000005c0)=ANY=[@ANYBLOB="23211ff2be2e098ac942be7d66f91e574117a7d8dc9c17a05b463e"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000580)) 23:34:46 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_DEL(r0, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="ac00000002090101000000000b00000000000009700002002c000100140003006ed80a0ec3677685b4c446deabbe2e8d14000400000000000000400000000000000000000c00020005000100060000000c000200050001003a00000014000100080001007f000001080002007f000001e891871d58a4030c00020005000100880000000c00040008000500f2ff001f0c000200060003000000000008000500000000150800060000000000"], 0xac}, 0x1, 0x0, 0x0, 0x40081}, 0x40000d0) 23:34:46 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000000)=ANY=[@ANYBLOB='%'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_NEW_SERVICE(r2, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=ANY=[@ANYBLOB="18000000", @ANYRES16=r3, @ANYBLOB="0000157b52d9b1c969263a544fd36afc832cf026dfe804bef2c8026695a336b831000004000100"], 0x18}}, 0x0) sendmsg$IPVS_CMD_SET_DEST(r1, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x38, r3, 0x400, 0x70bd2c, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_DEST={0x24, 0x2, [@IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x6c1}, @IPVS_DEST_ATTR_FWD_METHOD={0x6, 0x3, 0x1}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x10001}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0xfffffff9}]}]}, 0x38}, 0x1, 0x0, 0x0, 0x20000060}, 0x20000001) 23:34:46 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount(0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x0, 0x0) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2008}, 0x1c) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000380)=@raw={'raw\x00', 0x3c1, 0x3, 0x2f8, 0x0, 0xd0, 0xd0, 0xd0, 0xd0, 0x228, 0x228, 0x228, 0x228, 0x228, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0xa8, 0xd0}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00'}}, {{@uncond, 0x0, 0x138, 0x158, 0x0, {}, [@common=@srh1={{0x90, 'srh\x00'}, {0x0, 0x0, 0x0, 0x0, 0x0, @dev, @loopback, @local}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x358) 23:34:46 executing program 1: socket$inet(0x2, 0x2, 0x2200000088) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendto$inet(r1, 0x0, 0x0, 0x0, &(0x7f0000319ff0)={0x2, 0x4e20}, 0x10) [ 1587.426820][T10658] __nla_validate_parse: 34 callbacks suppressed [ 1587.426829][T10658] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1587.522629][T10658] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1587.541301][T10699] kAFS: unparsable volume name [ 1587.557076][T10756] xt_TCPMSS: Only works on TCP SYN packets 23:34:47 executing program 1: r0 = socket$inet(0x2, 0x2, 0x2200000088) sendto$inet(r0, 0x0, 0x30, 0x0, &(0x7f0000319ff0)={0x2, 0x4e20}, 0x10) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000000), &(0x7f0000000040)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f00000000c0)={0x0, 0x4}, &(0x7f0000000100)=0x8) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r2, 0x84, 0x1f, &(0x7f0000000140)={r3, @in6={{0xa, 0x4e22, 0xfff, @empty, 0x9}}, 0x2, 0x5ef0}, &(0x7f0000000200)=0x90) ioctl$USBDEVFS_DISCARDURB(0xffffffffffffffff, 0x550b, &(0x7f0000000080)=0x862b) [ 1587.602351][T10772] kAFS: No cell specified [ 1587.602941][T10771] kAFS: No cell specified 23:34:47 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_DEL(r0, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="ac00000002090101000000000c00000000000009700002002c000100140003006ed80a0ec3677685b4c446deabbe2e8d14000400000000000000400000000000000000000c00020005000100060000000c000200050001003a00000014000100080001007f000001080002007f000001e891871d58a4030c00020005000100880000000c00040008000500f2ff001f0c000200060003000000000008000500000000150800060000000000"], 0xac}, 0x1, 0x0, 0x0, 0x40081}, 0x40000d0) [ 1587.727697][T10837] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1587.766536][T10837] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. 23:34:47 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2008}, 0x1c) listen(r1, 0x0) r2 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2008}, 0x1c) listen(r2, 0x0) r3 = dup3(r1, r2, 0x0) ioctl$UI_ABS_SETUP(r3, 0x401c5504, &(0x7f0000000040)={0x5, {0x5, 0x0, 0x1, 0x1000, 0xcf}}) r4 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000000)=ANY=[@ANYBLOB='%'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 23:34:47 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="23c027082e5071c34f361d"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 23:34:47 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_DEL(r0, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="ac00000002090101000000000d00000000000009700002002c000100140003006ed80a0ec3677685b4c446deabbe2e8d14000400000000000000400000000000000000000c00020005000100060000000c000200050001003a00000014000100080001007f000001080002007f000001e891871d58a4030c00020005000100880000000c00040008000500f2ff001f0c000200060003000000000008000500000000150800060000000000"], 0xac}, 0x1, 0x0, 0x0, 0x40081}, 0x40000d0) [ 1587.877982][T10882] kAFS: unparsable volume name [ 1587.896604][T10883] kAFS: No cell specified [ 1587.911743][T10884] kAFS: unparsable volume name 23:34:47 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) ioctl$TUNSETSNDBUF(r1, 0x400454d4, &(0x7f0000000040)=0x9) mount(&(0x7f0000000000)=ANY=[@ANYBLOB='%'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 23:34:47 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="23c027082e5071c34f361d"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1587.954975][T10886] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1587.978250][T10886] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1588.088975][T10890] kAFS: unparsable volume name [ 1588.158480][T10893] kAFS: No cell specified 23:34:47 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) r2 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2008}, 0x1c) ioctl$RNDADDENTROPY(r1, 0x40085203, &(0x7f0000000600)={0xa3b, 0x29, "1e897f390580f139cc39ec7b3e592938c9e62b3aa5ec70b99e5dae24694eb967b277950f49b9c60050"}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$BLKSECTGET(r4, 0x1267, &(0x7f0000000640)) listen(r2, 0x0) ioctl$sock_SIOCGSKNS(r2, 0x894c, &(0x7f0000000540)=0x1000) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) recvmsg$can_raw(r1, &(0x7f0000000500)={&(0x7f0000000040)=@in={0x2, 0x0, @multicast2}, 0x80, &(0x7f00000001c0)=[{&(0x7f00000000c0)=""/127, 0x7f}, {&(0x7f0000000240)=""/162, 0xa2}, {&(0x7f0000000300)=""/164, 0xa4}, {&(0x7f00000003c0)=""/253, 0xfd}], 0x4, &(0x7f00000004c0)=""/34, 0x22}, 0x2) mount(&(0x7f00000005c0)=ANY=[@ANYBLOB="23211ff2be2e098ac942be7d66f91e574117a7d8dc9c17a05b463e"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 23:34:47 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_DEL(r0, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="ac00000002090101000000000e00000000000009700002002c000100140003006ed80a0ec3677685b4c446deabbe2e8d14000400000000000000400000000000000000000c00020005000100060000000c000200050001003a00000014000100080001007f000001080002007f000001e891871d58a4030c00020005000100880000000c00040008000500f2ff001f0c000200060003000000000008000500000000150800060000000000"], 0xac}, 0x1, 0x0, 0x0, 0x40081}, 0x40000d0) 23:34:47 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000040)=ANY=[@ANYBLOB='\x00\x00\x00@\x00\x00\x00\x00\x00'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 23:34:47 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="23c027082e5071c34f361d"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1588.388684][T10900] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1588.426691][T10900] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. 23:34:48 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_DEL(r0, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="ac00000002090101000000000f00000000000009700002002c000100140003006ed80a0ec3677685b4c446deabbe2e8d14000400000000000000400000000000000000000c00020005000100060000000c000200050001003a00000014000100080001007f000001080002007f000001e891871d58a4030c00020005000100880000000c00040008000500f2ff001f0c000200060003000000000008000500000000150800060000000000"], 0xac}, 0x1, 0x0, 0x0, 0x40081}, 0x40000d0) 23:34:48 executing program 4: mount(&(0x7f0000000040)=ANY=[@ANYBLOB="23c027082e5071c34f361d"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1588.453145][T10903] kAFS: No cell specified [ 1588.456784][T10904] kAFS: Bad value for 'source' [ 1588.463643][T10905] kAFS: No cell specified [ 1588.492752][T10906] kAFS: Bad value for 'source' 23:34:48 executing program 2: r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000000)=ANY=[@ANYBLOB='%'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1588.598380][T10909] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.0'. 23:34:48 executing program 4: mount(&(0x7f0000000040)=ANY=[@ANYBLOB="23c027082e5071c34f361d"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1588.642287][T10909] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1588.704950][T10915] kAFS: unparsable volume name 23:34:48 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_DEL(r0, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="ac00000002090101000000001000000000000009700002002c000100140003006ed80a0ec3677685b4c446deabbe2e8d14000400000000000000400000000000000000000c00020005000100060000000c000200050001003a00000014000100080001007f000001080002007f000001e891871d58a4030c00020005000100880000000c00040008000500f2ff001f0c000200060003000000000008000500000000150800060000000000"], 0xac}, 0x1, 0x0, 0x0, 0x40081}, 0x40000d0) 23:34:48 executing program 4: mount(&(0x7f0000000040)=ANY=[@ANYBLOB="23c027082e5071c34f361d"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 23:34:48 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r4, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2008}, 0x1c) listen(r4, 0x0) sendmsg$sock(r4, &(0x7f0000000540)={&(0x7f0000000280)=@ipx={0x4, 0x5, 0x3, "80315fd87c0b", 0x6}, 0x80, &(0x7f0000000480)=[{&(0x7f0000000300)="860c1af52f2f8e45ece276d24b92bf19ee2abf120c97f9abc4fa287c8ac47e35c6ae9728e0b792d4ea6f3893d569b62e253cf2dd7060fc5f24e20251831ba1d859bd08e83937819ea83be374b864aa8942857e331da5d145737c185224add1a782dfe2aa72b6ee033a73c57b5c95d7dd6696985e144739cb6ca851463cd5d75dcc95f7caae8abd", 0x87}, {&(0x7f00000003c0)="b48deaa33400424098a3c261ca5df14780bdc1ff9e8961f997d3c16533a2063165828d49b83114662d3667a3495280a2df5f8b68f0e2cec7fc51a42763af7fc4c9c277faecdb36d1e8597e807ad330d7f9031b35114fadc000e8659589a0eb0c236949b5e8c72f0fcc4c0373aae163c15641524a355ebf5c39a5c1729caa30a19046070a095ffc542bc793ca6d52722082bfa2da3d11ec7489ae9ca5f89dfaf8e60ed341", 0xa4}], 0x2, &(0x7f00000004c0)=[@txtime={{0x18, 0x1, 0x3d, 0x20}}, @txtime={{0x18, 0x1, 0x3d, 0x8}}, @timestamping={{0x14, 0x1, 0x25, 0x1e1}}, @timestamping={{0x14, 0x1, 0x25, 0x8}}, @txtime={{0x18, 0x1, 0x3d, 0x7f}}], 0x78}, 0x400c011) ioctl$RTC_VL_READ(r3, 0x80047013, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r6 = dup(r5) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r8 = dup(r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) getsockopt$XDP_STATISTICS(r8, 0x11b, 0x7, &(0x7f00000001c0), &(0x7f0000000240)=0x18) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) sendmsg$IPCTNL_MSG_CT_GET_UNCONFIRMED(r6, &(0x7f0000000100)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, 0x7, 0x1, 0x101, 0x0, 0x0, {0xa, 0x0, 0xa}, ["", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x20000000}, 0x20044804) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000080)=ANY=[], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x5002c, 0x0) 23:34:48 executing program 4: mkdir(0x0, 0x0) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="23c027082e5071c34f361d"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 23:34:48 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) r2 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2008}, 0x1c) ioctl$RNDADDENTROPY(r1, 0x40085203, &(0x7f0000000600)={0xa3b, 0x29, "1e897f390580f139cc39ec7b3e592938c9e62b3aa5ec70b99e5dae24694eb967b277950f49b9c60050"}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$BLKSECTGET(r4, 0x1267, &(0x7f0000000640)) listen(r2, 0x0) ioctl$sock_SIOCGSKNS(r2, 0x894c, &(0x7f0000000540)=0x1000) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount(&(0x7f00000005c0)=ANY=[@ANYBLOB="23211ff2be2e098ac942be7d66f91e574117a7d8dc9c17a05b463e"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 23:34:48 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_DEL(r0, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="ac00000002090101000000001100000000000009700002002c000100140003006ed80a0ec3677685b4c446deabbe2e8d14000400000000000000400000000000000000000c00020005000100060000000c000200050001003a00000014000100080001007f000001080002007f000001e891871d58a4030c00020005000100880000000c00040008000500f2ff001f0c000200060003000000000008000500000000150800060000000000"], 0xac}, 0x1, 0x0, 0x0, 0x40081}, 0x40000d0) 23:34:48 executing program 4: mkdir(0x0, 0x0) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="23c027082e5071c34f361d"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 23:34:48 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) pread64(r0, &(0x7f0000000000)=""/110, 0x6e, 0x6) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="250c69f2fe0487131a928e875a2850e44f8ed1d66221fda28373a3b5b48d93b3dbae7b2c56553d659ae0d961a718b8f6613134385b3ab24779e101566b7b6d83156bcdb2bcc88985efe94eb8d9aeba34d5818a5dd914a51583e68abd7e9cfbfd1bc40fcaff6fd694721253c4fa6ccfd2e0659478acd6cb20574f00ff1f93d1c43b19edd20456e26a7d71888535be5d98d4aecb254c9584376e201a421a1de660f6f6625a26da33856dd6a3355e5dfe35c6d9788a60038c2f13101c0cdae76175b3fa88c61ab7bde11590a2324fd01d28be597cf55b8a733dfd27325b7d949317a0a2c3"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1589.286017][T10940] validate_nla: 74 callbacks suppressed [ 1589.286026][T10940] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 1589.310379][T10940] netlink: 'syz-executor.0': attribute type 2 has an invalid length. 23:34:48 executing program 4: mkdir(0x0, 0x0) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="23c027082e5071c34f361d"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 23:34:48 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000000)="700a6c184646638c2a4f3b9fa9074e64a9647566844525e24067", 0x1a) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x38, 0x2}, 0x0) mount(&(0x7f00000001c0)=ANY=[@ANYPTR=&(0x7f0000000240)=ANY=[@ANYBLOB="269f147b0e72967ced122f1ad49138b11dff8b62a32d96eb1306037aacd852056c26b2a9d84b5e18f6cc5ad0ed2f8d05e184c12b1f704719491cbb55ca8266eb5144bde8891394c5aca581e721a4", @ANYRESHEX=r2]], &(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='openpromfs\x00', 0x0, 0x0) [ 1589.368310][T10940] netlink: 'syz-executor.0': attribute type 2 has an invalid length. [ 1589.370031][T10944] kAFS: No cell specified 23:34:49 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 23:34:49 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) r2 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2008}, 0x1c) ioctl$RNDADDENTROPY(r1, 0x40085203, &(0x7f0000000600)={0xa3b, 0x29, "1e897f390580f139cc39ec7b3e592938c9e62b3aa5ec70b99e5dae24694eb967b277950f49b9c60050"}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$BLKSECTGET(r4, 0x1267, &(0x7f0000000640)) listen(r2, 0x0) ioctl$sock_SIOCGSKNS(r2, 0x894c, &(0x7f0000000540)=0x1000) mount(&(0x7f00000005c0)=ANY=[@ANYBLOB="23211ff2be2e098ac942be7d66f91e574117a7d8dc9c17a05b463e"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1589.457035][T10940] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 23:34:49 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_DEL(r0, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="ac00000002090101000000001200000000000009700002002c000100140003006ed80a0ec3677685b4c446deabbe2e8d14000400000000000000400000000000000000000c00020005000100060000000c000200050001003a00000014000100080001007f000001080002007f000001e891871d58a4030c00020005000100880000000c00040008000500f2ff001f0c000200060003000000000008000500000000150800060000000000"], 0xac}, 0x1, 0x0, 0x0, 0x40081}, 0x40000d0) [ 1589.599432][T10954] kAFS: No cell specified 23:34:49 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) r2 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2008}, 0x1c) listen(r2, 0x0) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) fcntl$dupfd(r2, 0x406, r3) mount(&(0x7f0000000000)=ANY=[@ANYBLOB='%'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) accept4$llc(r1, &(0x7f0000000080)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f00000000c0)=0x10, 0xf40b1e0be3be90e8) [ 1589.664229][T10957] kAFS: No cell specified 23:34:49 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1589.711763][T10961] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 1589.719961][T10961] netlink: 'syz-executor.0': attribute type 2 has an invalid length. [ 1589.747183][T10962] kAFS: unparsable volume name [ 1589.753073][T10961] netlink: 'syz-executor.0': attribute type 2 has an invalid length. 23:34:49 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) r2 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2008}, 0x1c) ioctl$RNDADDENTROPY(r1, 0x40085203, &(0x7f0000000600)={0xa3b, 0x29, "1e897f390580f139cc39ec7b3e592938c9e62b3aa5ec70b99e5dae24694eb967b277950f49b9c60050"}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$BLKSECTGET(r4, 0x1267, &(0x7f0000000640)) listen(r2, 0x0) mount(&(0x7f00000005c0)=ANY=[@ANYBLOB="23211ff2be2e098ac942be7d66f91e574117a7d8dc9c17a05b463e"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1589.807518][T10965] kAFS: unparsable volume name [ 1589.814874][T10961] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 1589.845070][T10970] kAFS: No cell specified 23:34:49 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/protocols\x00') setsockopt$netlink_NETLINK_TX_RING(r2, 0x10e, 0x7, &(0x7f0000000080)={0xe13, 0x9, 0x65, 0x3}, 0x10) mount(&(0x7f0000000000)=ANY=[@ANYBLOB='%'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1589.902643][T10972] kAFS: No cell specified 23:34:49 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 23:34:49 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) r2 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2008}, 0x1c) ioctl$RNDADDENTROPY(r1, 0x40085203, &(0x7f0000000600)={0xa3b, 0x29, "1e897f390580f139cc39ec7b3e592938c9e62b3aa5ec70b99e5dae24694eb967b277950f49b9c60050"}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$BLKSECTGET(r4, 0x1267, &(0x7f0000000640)) mount(&(0x7f00000005c0)=ANY=[@ANYBLOB="23211ff2be2e098ac942be7d66f91e574117a7d8dc9c17a05b463e"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 23:34:49 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_DEL(r0, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="ac00000002090101000000001300000000000009700002002c000100140003006ed80a0ec3677685b4c446deabbe2e8d14000400000000000000400000000000000000000c00020005000100060000000c000200050001003a00000014000100080001007f000001080002007f000001e891871d58a4030c00020005000100880000000c00040008000500f2ff001f0c000200060003000000000008000500000000150800060000000000"], 0xac}, 0x1, 0x0, 0x0, 0x40081}, 0x40000d0) [ 1590.020803][T10977] kAFS: unparsable volume name [ 1590.031240][T10979] kAFS: unparsable volume name [ 1590.039354][T10978] kAFS: No cell specified 23:34:49 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000040)=ANY=[], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 23:34:49 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000000)=ANY=[@ANYBLOB='%'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/btrfs-control\x00', 0x404800, 0x0) ioctl$IOC_PR_RESERVE(r2, 0x401070c9, &(0x7f0000000080)={0x0, 0x200}) [ 1590.126009][T10984] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 1590.151204][T10983] kAFS: No cell specified [ 1590.160533][T10984] netlink: 'syz-executor.0': attribute type 2 has an invalid length. 23:34:49 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) r2 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2008}, 0x1c) ioctl$RNDADDENTROPY(r1, 0x40085203, &(0x7f0000000600)={0xa3b, 0x29, "1e897f390580f139cc39ec7b3e592938c9e62b3aa5ec70b99e5dae24694eb967b277950f49b9c60050"}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) mount(&(0x7f00000005c0)=ANY=[@ANYBLOB="23211ff2be2e098ac942be7d66f91e574117a7d8dc9c17a05b463e"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1590.237845][T10989] kAFS: Bad value for 'source' 23:34:49 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_DEL(r0, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="ac00000002090101000000001400000000000009700002002c000100140003006ed80a0ec3677685b4c446deabbe2e8d14000400000000000000400000000000000000000c00020005000100060000000c000200050001003a00000014000100080001007f000001080002007f000001e891871d58a4030c00020005000100880000000c00040008000500f2ff001f0c000200060003000000000008000500000000150800060000000000"], 0xac}, 0x1, 0x0, 0x0, 0x40081}, 0x40000d0) [ 1590.262562][T10990] kAFS: unparsable volume name 23:34:49 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000040)=ANY=[], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1590.325301][T10996] kAFS: unparsable volume name [ 1590.335448][T10994] kAFS: No cell specified 23:34:49 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x40000, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000000)=ANY=[@ANYBLOB='%'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1590.466010][T11000] kAFS: Bad value for 'source' 23:34:50 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) r2 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2008}, 0x1c) ioctl$RNDADDENTROPY(r1, 0x40085203, &(0x7f0000000600)={0xa3b, 0x29, "1e897f390580f139cc39ec7b3e592938c9e62b3aa5ec70b99e5dae24694eb967b277950f49b9c60050"}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) dup(r3) mount(&(0x7f00000005c0)=ANY=[@ANYBLOB="23211ff2be2e098ac942be7d66f91e574117a7d8dc9c17a05b463e"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 23:34:50 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_DEL(r0, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="ac00000002090101000000002000000000000009700002002c000100140003006ed80a0ec3677685b4c446deabbe2e8d14000400000000000000400000000000000000000c00020005000100060000000c000200050001003a00000014000100080001007f000001080002007f000001e891871d58a4030c00020005000100880000000c00040008000500f2ff001f0c000200060003000000000008000500000000150800060000000000"], 0xac}, 0x1, 0x0, 0x0, 0x40081}, 0x40000d0) 23:34:50 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000040)=ANY=[], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1590.523676][T11002] kAFS: unparsable volume name [ 1590.636342][T11009] kAFS: No cell specified 23:34:50 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2008}, 0x1c) listen(r1, 0x0) r2 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000080)=ANY=[@ANYBLOB="2527c59a890e2ff672558d226d0eb703c1b68bd065d94912031c8c619b34abb5f9245b3f921d4c06b75938d568a16f6aa3bae56c136ba79ae64948764e04aece6b5ed34e"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1590.697631][T11012] kAFS: Bad value for 'source' 23:34:50 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) r2 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2008}, 0x1c) ioctl$RNDADDENTROPY(r1, 0x40085203, &(0x7f0000000600)={0xa3b, 0x29, "1e897f390580f139cc39ec7b3e592938c9e62b3aa5ec70b99e5dae24694eb967b277950f49b9c60050"}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) dup(r3) mount(&(0x7f00000005c0)=ANY=[@ANYBLOB="23211ff2be2e098ac942be7d66f91e574117a7d8dc9c17a05b463e"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 23:34:50 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_DEL(r0, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="ac00000002090101000000002500000000000009700002002c000100140003006ed80a0ec3677685b4c446deabbe2e8d14000400000000000000400000000000000000000c00020005000100060000000c000200050001003a00000014000100080001007f000001080002007f000001e891871d58a4030c00020005000100880000000c00040008000500f2ff001f0c000200060003000000000008000500000000150800060000000000"], 0xac}, 0x1, 0x0, 0x0, 0x40081}, 0x40000d0) 23:34:50 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000040)=ANY=[@ANYBLOB], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1590.848637][T11017] kAFS: No cell specified [ 1590.849496][T11020] kAFS: No cell specified 23:34:50 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_DEL(r0, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="ac00000002090101000000003f00000000000009700002002c000100140003006ed80a0ec3677685b4c446deabbe2e8d14000400000000000000400000000000000000000c00020005000100060000000c000200050001003a00000014000100080001007f000001080002007f000001e891871d58a4030c00020005000100880000000c00040008000500f2ff001f0c000200060003000000000008000500000000150800060000000000"], 0xac}, 0x1, 0x0, 0x0, 0x40081}, 0x40000d0) [ 1590.911054][T11022] kAFS: Bad value for 'source' 23:34:50 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) r2 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2008}, 0x1c) ioctl$RNDADDENTROPY(r1, 0x40085203, &(0x7f0000000600)={0xa3b, 0x29, "1e897f390580f139cc39ec7b3e592938c9e62b3aa5ec70b99e5dae24694eb967b277950f49b9c60050"}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) dup(r3) mount(&(0x7f00000005c0)=ANY=[@ANYBLOB="23211ff2be2e098ac942be7d66f91e574117a7d8dc9c17a05b463e"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 23:34:50 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_DEL(r0, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="ac00000002090101000000004000000000000009700002002c000100140003006ed80a0ec3677685b4c446deabbe2e8d14000400000000000000400000000000000000000c00020005000100060000000c000200050001003a00000014000100080001007f000001080002007f000001e891871d58a4030c00020005000100880000000c00040008000500f2ff001f0c000200060003000000000008000500000000150800060000000000"], 0xac}, 0x1, 0x0, 0x0, 0x40081}, 0x40000d0) 23:34:50 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, &(0x7f0000000040)=0x3, 0x2) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000080)=ANY=[@ANYRESOCT=0x0], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 23:34:50 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000040)=ANY=[@ANYBLOB], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1591.044853][T11029] kAFS: No cell specified [ 1591.116966][T11035] kAFS: unparsable volume name 23:34:50 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) r2 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2008}, 0x1c) ioctl$RNDADDENTROPY(r1, 0x40085203, &(0x7f0000000600)={0xa3b, 0x29, "1e897f390580f139cc39ec7b3e592938c9e62b3aa5ec70b99e5dae24694eb967b277950f49b9c60050"}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) mount(&(0x7f00000005c0)=ANY=[@ANYBLOB="23211ff2be2e098ac942be7d66f91e574117a7d8dc9c17a05b463e"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1591.184214][T11038] kAFS: Bad value for 'source' 23:34:50 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_DEL(r0, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="ac00000002090101000000004800000000000009700002002c000100140003006ed80a0ec3677685b4c446deabbe2e8d14000400000000000000400000000000000000000c00020005000100060000000c000200050001003a00000014000100080001007f000001080002007f000001e891871d58a4030c00020005000100880000000c00040008000500f2ff001f0c000200060003000000000008000500000000150800060000000000"], 0xac}, 0x1, 0x0, 0x0, 0x40081}, 0x40000d0) 23:34:50 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000040)=ANY=[@ANYBLOB], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 23:34:50 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="0018a244350000"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1591.317736][T11043] kAFS: No cell specified [ 1591.350504][T11047] kAFS: Bad value for 'source' [ 1591.382038][T11048] kAFS: Bad value for 'source' 23:34:50 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) r2 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2008}, 0x1c) ioctl$RNDADDENTROPY(r1, 0x40085203, &(0x7f0000000600)={0xa3b, 0x29, "1e897f390580f139cc39ec7b3e592938c9e62b3aa5ec70b99e5dae24694eb967b277950f49b9c60050"}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) mount(&(0x7f00000005c0)=ANY=[@ANYBLOB="23211ff2be2e098ac942be7d66f91e574117a7d8dc9c17a05b463e"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 23:34:50 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="23c027082e50"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1591.405275][T11050] kAFS: Bad value for 'source' 23:34:51 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_DEL(r0, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="ac00000002090101000000004c00000000000009700002002c000100140003006ed80a0ec3677685b4c446deabbe2e8d14000400000000000000400000000000000000000c00020005000100060000000c000200050001003a00000014000100080001007f000001080002007f000001e891871d58a4030c00020005000100880000000c00040008000500f2ff001f0c000200060003000000000008000500000000150800060000000000"], 0xac}, 0x1, 0x0, 0x0, 0x40081}, 0x40000d0) 23:34:51 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) ioctl$SIOCGSTAMP(r1, 0x8906, &(0x7f0000000040)) mount(&(0x7f0000000000)=ANY=[@ANYBLOB='%'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1591.539386][T11054] kAFS: No cell specified [ 1591.550917][T11058] kAFS: No cell specified 23:34:51 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) r2 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2008}, 0x1c) ioctl$RNDADDENTROPY(r1, 0x40085203, &(0x7f0000000600)={0xa3b, 0x29, "1e897f390580f139cc39ec7b3e592938c9e62b3aa5ec70b99e5dae24694eb967b277950f49b9c60050"}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) mount(&(0x7f00000005c0)=ANY=[@ANYBLOB="23211ff2be2e098ac942be7d66f91e574117a7d8dc9c17a05b463e"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 23:34:51 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000040)=ANY=[@ANYBLOB='#'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 23:34:51 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_DEL(r0, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="ac00000002090101000000006000000000000009700002002c000100140003006ed80a0ec3677685b4c446deabbe2e8d14000400000000000000400000000000000000000c00020005000100060000000c000200050001003a00000014000100080001007f000001080002007f000001e891871d58a4030c00020005000100880000000c00040008000500f2ff001f0c000200060003000000000008000500000000150800060000000000"], 0xac}, 0x1, 0x0, 0x0, 0x40081}, 0x40000d0) [ 1591.661228][T11061] kAFS: unparsable volume name [ 1591.736880][T11068] kAFS: No cell specified 23:34:51 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_DEL(r0, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="ac00000002090101000000006800000000000009700002002c000100140003006ed80a0ec3677685b4c446deabbe2e8d14000400000000000000400000000000000000000c00020005000100060000000c000200050001003a00000014000100080001007f000001080002007f000001e891871d58a4030c00020005000100880000000c00040008000500f2ff001f0c000200060003000000000008000500000000150800060000000000"], 0xac}, 0x1, 0x0, 0x0, 0x40081}, 0x40000d0) 23:34:51 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000040)=ANY=[@ANYRES64], &(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='afs\x00', 0x0, 0x0) [ 1591.769862][T11070] kAFS: unparsable volume name 23:34:51 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) r2 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2008}, 0x1c) ioctl$RNDADDENTROPY(r1, 0x40085203, &(0x7f0000000600)={0xa3b, 0x29, "1e897f390580f139cc39ec7b3e592938c9e62b3aa5ec70b99e5dae24694eb967b277950f49b9c60050"}) r3 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) mount(&(0x7f00000005c0)=ANY=[@ANYBLOB="23211ff2be2e098ac942be7d66f91e574117a7d8dc9c17a05b463e"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1591.876740][T11075] kAFS: unparsable volume name 23:34:51 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000040)=ANY=[@ANYBLOB='#'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1591.908820][T11078] kAFS: unparsable volume name 23:34:51 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_DEL(r0, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="ac00000002090101000000006c00000000000009700002002c000100140003006ed80a0ec3677685b4c446deabbe2e8d14000400000000000000400000000000000000000c00020005000100060000000c000200050001003a00000014000100080001007f000001080002007f000001e891871d58a4030c00020005000100880000000c00040008000500f2ff001f0c000200060003000000000008000500000000150800060000000000"], 0xac}, 0x1, 0x0, 0x0, 0x40081}, 0x40000d0) [ 1591.982867][T11080] kAFS: No cell specified [ 1592.005363][T11083] kAFS: unparsable volume name 23:34:51 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000040)=ANY=[@ANYBLOB='#'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 23:34:51 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_DEL(r0, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="ac00000002090101000000007400000000000009700002002c000100140003006ed80a0ec3677685b4c446deabbe2e8d14000400000000000000400000000000000000000c00020005000100060000000c000200050001003a00000014000100080001007f000001080002007f000001e891871d58a4030c00020005000100880000000c00040008000500f2ff001f0c000200060003000000000008000500000000150800060000000000"], 0xac}, 0x1, 0x0, 0x0, 0x40081}, 0x40000d0) 23:34:51 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) r2 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2008}, 0x1c) ioctl$RNDADDENTROPY(r1, 0x40085203, &(0x7f0000000600)={0xa3b, 0x29, "1e897f390580f139cc39ec7b3e592938c9e62b3aa5ec70b99e5dae24694eb967b277950f49b9c60050"}) r3 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) mount(&(0x7f00000005c0)=ANY=[@ANYBLOB="23211ff2be2e098ac942be7d66f91e574117a7d8dc9c17a05b463e"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1592.179193][T11093] kAFS: unparsable volume name [ 1592.199367][T11092] kAFS: No cell specified 23:34:51 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="23c02708"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 23:34:51 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_DEL(r0, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="ac00000002090101000000007a00000000000009700002002c000100140003006ed80a0ec3677685b4c446deabbe2e8d14000400000000000000400000000000000000000c00020005000100060000000c000200050001003a00000014000100080001007f000001080002007f000001e891871d58a4030c00020005000100880000000c00040008000500f2ff001f0c000200060003000000000008000500000000150800060000000000"], 0xac}, 0x1, 0x0, 0x0, 0x40081}, 0x40000d0) 23:34:51 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) r2 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2008}, 0x1c) ioctl$RNDADDENTROPY(r1, 0x40085203, &(0x7f0000000600)={0xa3b, 0x29, "1e897f390580f139cc39ec7b3e592938c9e62b3aa5ec70b99e5dae24694eb967b277950f49b9c60050"}) r3 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) mount(&(0x7f00000005c0)=ANY=[@ANYBLOB="23211ff2be2e098ac942be7d66f91e574117a7d8dc9c17a05b463e"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1592.349388][T11100] kAFS: No cell specified 23:34:51 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="23c02708"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1592.411850][T11102] kAFS: No cell specified 23:34:52 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_DEL(r0, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="ac0000000209010100ffffff9e00000000000009700002002c000100140003006ed80a0ec3677685b4c446deabbe2e8d14000400000000000000400000000000000000000c00020005000100060000000c000200050001003a00000014000100080001007f000001080002007f000001e891871d58a4030c00020005000100880000000c00040008000500f2ff001f0c000200060003000000000008000500000000150800060000000000"], 0xac}, 0x1, 0x0, 0x0, 0x40081}, 0x40000d0) 23:34:52 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) dup(r0) r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2008}, 0x1c) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) mount(&(0x7f00000005c0)=ANY=[@ANYBLOB="23211ff2be2e098ac942be7d66f91e574117a7d8dc9c17a05b463e"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1592.507282][T11106] kAFS: No cell specified [ 1592.549263][T11108] __nla_validate_parse: 32 callbacks suppressed [ 1592.549273][T11108] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1592.587706][T11108] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. 23:34:52 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="23c02708"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1592.618182][T11111] kAFS: No cell specified 23:34:52 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x38, 0x2}, 0x0) r4 = getpid() sched_setattr(r4, &(0x7f0000000040)={0x38, 0x2}, 0x0) r5 = getpid() sched_setattr(r5, &(0x7f0000000040)={0x38, 0x2}, 0x0) r6 = getpid() sched_setattr(r6, &(0x7f0000000040)={0x38, 0x2}, 0x0) r7 = getpid() sched_setattr(r7, &(0x7f0000000040)={0x38, 0x2}, 0x0) r8 = getpid() sched_setattr(r8, &(0x7f0000000040)={0x38, 0x2}, 0x0) r9 = getpid() sched_setattr(r9, &(0x7f0000000040)={0x38, 0x2}, 0x0) r10 = getpid() sched_setattr(r10, &(0x7f0000000040)={0x38, 0x2}, 0x0) r11 = getpid() sched_setattr(r11, &(0x7f0000000040)={0x38, 0x2}, 0x0) r12 = getpid() sched_setattr(r12, &(0x7f0000000040)={0x38, 0x2}, 0x0) r13 = getpid() sched_setattr(r13, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0) r14 = getpid() sched_setattr(r14, &(0x7f0000000040)={0x38, 0x2}, 0x0) r15 = getpid() sched_setattr(r15, &(0x7f0000000040)={0x38, 0x2}, 0x0) r16 = getpid() mount(&(0x7f0000001340)=ANY=[@ANYRESOCT=0x0, @ANYPTR64=&(0x7f0000000080)=ANY=[@ANYRESHEX=r1], @ANYRESOCT, @ANYRESDEC, @ANYPTR=&(0x7f00000000c0)=ANY=[@ANYPTR=&(0x7f0000001700)=ANY=[@ANYPTR=&(0x7f00000013c0)=ANY=[@ANYRESHEX=0x0, @ANYRES32=r10, @ANYRES16=r11], @ANYBLOB="89fb3b5f3cc70fbe4dd986c00a99249fe257e87f18e960f26f33335a13bcf7a4147ada6516ceac27708efe7f69e25e62e993b0a5fb9e35b9420fb511161881f59aad4dfa31154234d354a39cc4f896616d2b7055bbf764920d98e7073119c86c43ec4439000a29de3aa757170dd6dbaa04a6a7be137d6271a482e1303aa023cd9d3bd953e7a50ccd1193e33dd8eae20357", @ANYPTR64=&(0x7f0000001400)=ANY=[@ANYRESHEX=r12, @ANYRESOCT, @ANYRES64=r13], @ANYRESHEX=r0, @ANYPTR=&(0x7f0000001440)=ANY=[@ANYRES16, @ANYRESOCT=r14], @ANYPTR64=&(0x7f0000000240)=ANY=[@ANYBLOB="1e35bb3fd689b47ae92ec7b177279addfb4c01008fb5f5d0c52210af599b625ccd7374729205133bc2c5024b2b4becaa42de2d3ac29219ecf34379492bf51edb5358a13e4aa1a7628a09e9bcbb08d38c83b7788cdc7a2ca777ac5d3e17987828bef966a8110db4233ba99248c53123506818d9f264312bfe24cfc1ef490911615654824247a6b8a34ffd6d8cb49ac231b00ef53ccea50e70ac07922b4605d0b52bdd40", @ANYRES64], @ANYPTR64=&(0x7f0000000300)=ANY=[@ANYRESOCT=r1, @ANYRES16, @ANYRES64, @ANYRES64, @ANYBLOB="956145eb1ac4f2f444460d8f0f34b27e30a7a01c635744e71db9a4c82ee399614ef84eb1b537512785853eb1a812b291606cf249c9cd6ee04004ad14cf825a86b22e45786c2e74db1d87ba26bf10d96f638b8fec67e4e6db90a552e334fa727ca2b3ec4bdb0703321482604be8dc41310480331ed4e12f6df6ae8f071dad66917208e37a6d5514ecf5c77dcac5d8972f90fc794a6a009b199ba4fed7c39d15902bd518b7956c013529fb0d1887ee40a575c6c416baa79396b8c32407de4fde28c5ebd1ab65e2a9a6b72ecd819006c1f703ae8889d569452b3b52775496ed838448dd383a429a738fe480fcc73b33", @ANYRESOCT=r13, @ANYRES16], @ANYRES64=r2, @ANYPTR64=&(0x7f00000015c0)=ANY=[@ANYBLOB="1c4ee9537017edee226108965033f8fb65332783fce89903ea045ce3c5a0fb543b776d00000000000000007eb2c3fe1e3be1343d678b9e33a375d31a0e84a8ad4df30b5164abb906d0d431bdf2b4bf200252f25e1e9cba95c327c551a603af370a3b757cb4f0a52981363692213e27b9356979eb0dcf7f0f46c86b020583b897d55bbcac5bf3086823d7e3574f151f97c261be3adaa608cdbb4c5978850c6834678385974f2b6bc136a7941a5cdeabb7217ee1b5f7ad795c65447d9e164c4afd74a1a4adf6387eac3b849123cc963cdfe0a6a4f06e5683539278f01dfc1b3951c3f091f9c9b9a02884f51344380ae1532c", @ANYRES32=r4, @ANYRESOCT=r15, @ANYRESDEC=r16]], @ANYRES32=r3, @ANYRES16=r4, @ANYPTR64=&(0x7f0000001800)=ANY=[@ANYRES32, @ANYRESDEC=r5, @ANYRESOCT=r6, @ANYRESDEC, @ANYPTR64, @ANYBLOB="6fe299b75414779b1b7ed9c300d22d561593950a58fc7f0c9752093dc9b17a9a3e34cb13c434b891a6bfbf07c37a3d02fe39b7d8046cc5b2dbdc49489e7a5b4ed4273444b1a851ade4fd2d050000001d8e3b81fd958cf9bae0bc1750939032e6f015019200", @ANYRESOCT, @ANYRES32], @ANYBLOB="ecc4920a7c52c82e4ad0", @ANYRESOCT=r8, @ANYRESOCT, @ANYRES32=r2], @ANYRESOCT, @ANYPTR=&(0x7f0000001300)=ANY=[@ANYPTR=&(0x7f00000001c0)=ANY=[@ANYRESDEC=r9], @ANYRES16], @ANYPTR64], &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='bdev\x00', 0x0, 0x0) 23:34:52 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) dup(r0) socket$inet6(0xa, 0x6, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mount(&(0x7f00000005c0)=ANY=[@ANYBLOB="23211ff2be2e098ac942be7d66f91e574117a7d8dc9c17a05b463e"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 23:34:52 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_DEL(r0, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="ac000000020901010000003bda00000000000009700002002c000100140003006ed80a0ec3677685b4c446deabbe2e8d14000400000000000000400000000000000000000c00020005000100060000000c000200050001003a00000014000100080001007f000001080002007f000001e891871d58a4030c00020005000100880000000c00040008000500f2ff001f0c000200060003000000000008000500000000150800060000000000"], 0xac}, 0x1, 0x0, 0x0, 0x40081}, 0x40000d0) [ 1592.729946][T11114] kAFS: No cell specified 23:34:52 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="23c027082e"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1592.820181][T11121] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1592.853955][T11120] kAFS: No cell specified [ 1592.865359][T11121] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1592.928014][T11125] kAFS: No cell specified 23:34:52 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) dup(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mount(&(0x7f00000005c0)=ANY=[@ANYBLOB="23211ff2be2e098ac942be7d66f91e574117a7d8dc9c17a05b463e"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 23:34:52 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="23c027082e"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 23:34:52 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2008}, 0x1c) listen(r2, 0x0) getsockopt$inet6_mreq(r2, 0x29, 0x1c, &(0x7f0000000b80)={@loopback, 0x0}, &(0x7f0000000bc0)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000c80)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000c40)={&(0x7f0000000c00)=@newtclass={0x2c, 0x28, 0x4, 0x70bd25, 0x25dfdbfb, {0x0, 0x0, 0x0, r3, {0xffff, 0xeed576624989e56c}, {0x2, 0xf}, {0xa, 0xf}}, [@TCA_RATE={0x6, 0x5, {0x0, 0x8}}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000}, 0x4000800) r4 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r4, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2008}, 0x1c) listen(r4, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r4, 0x8933, &(0x7f0000000040)={'vxcan0\x00', 0x0}) ioctl$TUNSETIFINDEX(r1, 0x400454da, &(0x7f0000000080)=r5) mkdir(&(0x7f00000000c0)='./file0\x00', 0x81) mount(&(0x7f0000000000)=ANY=[@ANYBLOB='%'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 23:34:52 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_DEL(r0, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="ac0000000209010100ffffffef00000000000009700002002c000100140003006ed80a0ec3677685b4c446deabbe2e8d14000400000000000000400000000000000000000c00020005000100060000000c000200050001003a00000014000100080001007f000001080002007f000001e891871d58a4030c00020005000100880000000c00040008000500f2ff001f0c000200060003000000000008000500000000150800060000000000"], 0xac}, 0x1, 0x0, 0x0, 0x40081}, 0x40000d0) [ 1593.109398][T11131] kAFS: No cell specified [ 1593.129276][T11132] kAFS: unparsable volume name [ 1593.144736][T11134] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1593.162591][T11135] kAFS: No cell specified [ 1593.178437][T11134] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. 23:34:52 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount(&(0x7f00000005c0)=ANY=[@ANYBLOB="23211ff2be2e098ac942be7d66f91e574117a7d8dc9c17a05b463e"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 23:34:52 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="23c027082e"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 23:34:52 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000000)=ANY=[@ANYBLOB='%'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='devpts\x00', 0x0, 0x0) 23:34:52 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_DEL(r0, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="ac0000000209010100fffffff000000000000009700002002c000100140003006ed80a0ec3677685b4c446deabbe2e8d14000400000000000000400000000000000000000c00020005000100060000000c000200050001003a00000014000100080001007f000001080002007f000001e891871d58a4030c00020005000100880000000c00040008000500f2ff001f0c000200060003000000000008000500000000150800060000000000"], 0xac}, 0x1, 0x0, 0x0, 0x40081}, 0x40000d0) [ 1593.364809][T11143] kAFS: No cell specified 23:34:53 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount(&(0x7f00000005c0)=ANY=[@ANYBLOB="23211ff2be2e098ac942be7d66f91e574117a7d8dc9c17a05b463e"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1593.399882][T11145] kAFS: No cell specified [ 1593.406601][T11147] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1593.438884][T11147] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. 23:34:53 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$P9_RLOPEN(0xffffffffffffffff, &(0x7f0000000040)={0x18, 0xd, 0x1, {{0x8, 0x2, 0x4}, 0xfffffff8}}, 0x18) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000000)=ANY=[@ANYBLOB='%'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) socket$isdn(0x22, 0x3, 0x10) 23:34:53 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="23c027082e50"], 0x0, &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1593.532765][T11152] kAFS: No cell specified 23:34:53 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount(&(0x7f00000005c0)=ANY=[@ANYBLOB="23211ff2be2e098ac942be7d66f91e574117a7d8dc9c17a05b463e"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 23:34:53 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_DEL(r0, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="ac0000000209010100fffffffc00000000000009700002002c000100140003006ed80a0ec3677685b4c446deabbe2e8d14000400000000000000400000000000000000000c00020005000100060000000c000200050001003a00000014000100080001007f000001080002007f000001e891871d58a4030c00020005000100880000000c00040008000500f2ff001f0c000200060003000000000008000500000000150800060000000000"], 0xac}, 0x1, 0x0, 0x0, 0x40081}, 0x40000d0) 23:34:53 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="23c027082e50"], 0x0, &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1593.699107][T11159] kAFS: unparsable volume name [ 1593.717477][T11162] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1593.718595][T11159] kAFS: unparsable volume name 23:34:53 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount(&(0x7f00000005c0)=ANY=[@ANYBLOB="23211ff2be2e098ac942be7d66f91e574117a7d8dc9c17a05b463e"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1593.768420][T11162] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. 23:34:53 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="25160d9bc731eb3bbc8449d31c9f2ad3871806779c17b5bbfa6d632578267af39531455412051b36ff000000cbf50251474a473d7399e2aa44c25e734f3aedebcee58337dff8a8b28371c37fa97f1e929d66b70470b470b13cefacac83b50e1c8152ccbd907fb98722a24b5cdff9c2177f00392a25514005f2c30c06c038e520985a980cfed1e83115eacf4cb4c992"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r3 = dup(r2) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0xdcb) setsockopt$IP_VS_SO_SET_EDIT(r5, 0x0, 0x483, &(0x7f0000000000)={0x3a, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x4e24, 0x0, 'rr\x00', 0x2, 0xbd, 0x4a}, 0x2c) ioctl$SIOCPNENABLEPIPE(r3, 0x89ed, 0x0) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r3, &(0x7f00000000c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000080)={0xffffffffffffffff}, 0x3, {0xa, 0x4e20, 0x0, @dev={0xfe, 0x80, [], 0x2f}, 0xe}}}, 0x38) unshare(0x4000100) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r1, &(0x7f0000000100)={0x11, 0x10, 0xfa00, {&(0x7f0000000040), r6}}, 0x18) 23:34:53 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_DEL(r0, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="ac00000002090101007fffffff00000000000009700002002c000100140003006ed80a0ec3677685b4c446deabbe2e8d14000400000000000000400000000000000000000c00020005000100060000000c000200050001003a00000014000100080001007f000001080002007f000001e891871d58a4030c00020005000100880000000c00040008000500f2ff001f0c000200060003000000000008000500000000150800060000000000"], 0xac}, 0x1, 0x0, 0x0, 0x40081}, 0x40000d0) 23:34:53 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="23c027082e50"], 0x0, &(0x7f0000000180)='afs\x00', 0x0, 0x0) 23:34:53 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount(&(0x7f00000005c0)=ANY=[@ANYBLOB="23211ff2be2e098ac942be7d66f91e574117a7d8dc9c17a05b463e"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1593.997363][T11173] kAFS: No cell specified [ 1594.025550][T11178] kAFS: No cell specified 23:34:53 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_DEL(r0, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="ac00000002090101009effffff00000000000009700002002c000100140003006ed80a0ec3677685b4c446deabbe2e8d14000400000000000000400000000000000000000c00020005000100060000000c000200050001003a00000014000100080001007f000001080002007f000001e891871d58a4030c00020005000100880000000c00040008000500f2ff001f0c000200060003000000000008000500000000150800060000000000"], 0xac}, 0x1, 0x0, 0x0, 0x40081}, 0x40000d0) 23:34:53 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="25e92cbdb0977ccf472f1100000000db9d192d28fe5eac3341df36e92f45488fb283f23e0cd879cc33195de5bd01fcb87266332cef7c748acc4344a2c5b167f876bf8aa5fd2b31bc597f54279fd04505000000000000b4550c5dcc1c0dca49d34a5c9a9bdd65a953fa834262c5d5dff10d47c76153f23260c4f68f317c9255e37fcbcef838837f8b5e01b482d467d6cfd4cf67a31ad0822d30d3de554588b09ded171f92ee4466400076ae5c14b488248d81b97fdfc49819628d"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 23:34:53 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="23c027082e50"], &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) 23:34:53 executing program 5: mkdir(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount(&(0x7f00000005c0)=ANY=[@ANYBLOB="23211ff2be2e098ac942be7d66f91e574117a7d8dc9c17a05b463e"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1594.239099][T11187] kAFS: No cell specified 23:34:53 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_DEL(r0, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="ac0000000209010100efffffff00000000000009700002002c000100140003006ed80a0ec3677685b4c446deabbe2e8d14000400000000000000400000000000000000000c00020005000100060000000c000200050001003a00000014000100080001007f000001080002007f000001e891871d58a4030c00020005000100880000000c00040008000500f2ff001f0c000200060003000000000008000500000000150800060000000000"], 0xac}, 0x1, 0x0, 0x0, 0x40081}, 0x40000d0) [ 1594.286027][T11193] kAFS: No cell specified 23:34:53 executing program 5: mkdir(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount(&(0x7f00000005c0)=ANY=[@ANYBLOB="23211ff2be2e098ac942be7d66f91e574117a7d8dc9c17a05b463e"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 23:34:53 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="23c027082e50"], &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) 23:34:53 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000040)={0x0, 0x8, 0x2, 0x1, 0x323, 0x8}, &(0x7f0000000080)=0x14) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f00000000c0)={0x1, 0xffff, 0x200, 0x1000, 0xe, 0x101, 0x6, 0xcb, r2}, &(0x7f0000000100)=0x20) mount(&(0x7f0000000000)=ANY=[@ANYBLOB='%'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1594.370648][T11196] validate_nla: 78 callbacks suppressed [ 1594.370657][T11196] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 1594.435395][T11196] netlink: 'syz-executor.0': attribute type 2 has an invalid length. [ 1594.479950][T11196] netlink: 'syz-executor.0': attribute type 2 has an invalid length. 23:34:54 executing program 5: mkdir(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount(&(0x7f00000005c0)=ANY=[@ANYBLOB="23211ff2be2e098ac942be7d66f91e574117a7d8dc9c17a05b463e"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1594.522298][T11196] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 1594.536437][T11205] kAFS: unparsable volume name 23:34:54 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="23c027082e50"], &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) [ 1594.604220][T11210] kAFS: unparsable volume name 23:34:54 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_DEL(r0, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="ac0000000209010100f0ffffff00000000000009700002002c000100140003006ed80a0ec3677685b4c446deabbe2e8d14000400000000000000400000000000000000000c00020005000100060000000c000200050001003a00000014000100080001007f000001080002007f000001e891871d58a4030c00020005000100880000000c00040008000500f2ff001f0c000200060003000000000008000500000000150800060000000000"], 0xac}, 0x1, 0x0, 0x0, 0x40081}, 0x40000d0) 23:34:54 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount(&(0x7f00000005c0)=ANY=[@ANYBLOB="23211ff2be2e098ac942be7d66f91e574117a7d8dc9c17a05b463e"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 23:34:54 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) ioctl$KVM_UNREGISTER_COALESCED_MMIO(0xffffffffffffffff, 0x4010ae68, &(0x7f00000000c0)={0x3000, 0x118000}) mount(&(0x7f00000002c0)=ANY=[@ANYBLOB="25a364e8ad973b7e8365423cbffc49bf0f01732fe725c9740b84224c2e85e6ac21ea4adae816ad0ea7a11b9d81b17a39248b8eaf16e78e201c6d786e14b12dd0260b21d31285d071e75a166e2b00000000000000"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$UI_SET_ABSBIT(r5, 0x40045567, 0x5) linkat(r1, &(0x7f0000000040)='./file0\x00', r3, &(0x7f0000000080)='./file0\x00', 0x400) [ 1594.802235][T11220] kAFS: No cell specified [ 1594.809650][T11221] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 1594.843699][T11222] kAFS: No cell specified [ 1594.852666][T11221] netlink: 'syz-executor.0': attribute type 2 has an invalid length. 23:34:54 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="23c027082e"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 23:34:54 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount(&(0x7f00000005c0)=ANY=[@ANYBLOB="23211ff2be2e098ac942be7d66f91e574117a7d8dc9c17a05b463e"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1594.890693][T11221] netlink: 'syz-executor.0': attribute type 2 has an invalid length. [ 1594.917501][T11224] kAFS: No cell specified [ 1594.931521][T11221] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 1595.007881][T11230] kAFS: No cell specified [ 1595.015306][T11231] kAFS: No cell specified 23:34:54 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_DEL(r0, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="ac0000000209010100fcffffff00000000000009700002002c000100140003006ed80a0ec3677685b4c446deabbe2e8d14000400000000000000400000000000000000000c00020005000100060000000c000200050001003a00000014000100080001007f000001080002007f000001e891871d58a4030c00020005000100880000000c00040008000500f2ff001f0c000200060003000000000008000500000000150800060000000000"], 0xac}, 0x1, 0x0, 0x0, 0x40081}, 0x40000d0) 23:34:54 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2008}, 0x1c) listen(r1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e21, 0x8, @mcast2, 0x2}, 0x1c) listen(r0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$VIDIOC_QUERYBUF(r3, 0xc0585609, &(0x7f0000000380)={0x4, 0x2, 0x4, 0x70000, 0x90e, {}, {0x4, 0x1, 0x8, 0x8, 0x7f, 0x3f, "0f7ad9e2"}, 0x1f, 0x2, @userptr=0xfffffffffffffffb, 0x9, 0x0, 0xffffffffffffffff}) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000080)={'gre0\x00', 0x20}) r5 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r5, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2008}, 0x1c) listen(r5, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r5, 0x800c6613, &(0x7f00000000c0)=@v2={0x2, @aes256, 0x4, [], "c64a13b6fff27ca1b19b8ead31d92cd3"}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r7 = dup(r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 23:34:54 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount(&(0x7f00000005c0)=ANY=[@ANYBLOB="23211ff2be2e098ac942be7d66f91e574117a7d8dc9c17a05b463e"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 23:34:54 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="23c027082e"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1595.128069][T11234] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 1595.160465][T11234] netlink: 'syz-executor.0': attribute type 2 has an invalid length. [ 1595.191928][T11239] kAFS: No cell specified [ 1595.217099][T11238] kAFS: unparsable volume name 23:34:54 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mount(&(0x7f00000005c0)=ANY=[@ANYBLOB="23211ff2be2e098ac942be7d66f91e574117a7d8dc9c17a05b463e"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 23:34:54 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_DEL(r0, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="ac00000002090101000000000000000001000009700002002c000100140003006ed80a0ec3677685b4c446deabbe2e8d14000400000000000000400000000000000000000c00020005000100060000000c000200050001003a00000014000100080001007f000001080002007f000001e891871d58a4030c00020005000100880000000c00040008000500f2ff001f0c000200060003000000000008000500000000150800060000000000"], 0xac}, 0x1, 0x0, 0x0, 0x40081}, 0x40000d0) [ 1595.301303][T11243] kAFS: No cell specified 23:34:54 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000040)=ANY=[@ANYRES16=r0], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x40019, 0x0) 23:34:54 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="23c027082e"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1595.384638][T11248] kAFS: No cell specified 23:34:55 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_DEL(r0, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="ac00000002090101000000000000000002000009700002002c000100140003006ed80a0ec3677685b4c446deabbe2e8d14000400000000000000400000000000000000000c00020005000100060000000c000200050001003a00000014000100080001007f000001080002007f000001e891871d58a4030c00020005000100880000000c00040008000500f2ff001f0c000200060003000000000008000500000000150800060000000000"], 0xac}, 0x1, 0x0, 0x0, 0x40081}, 0x40000d0) [ 1595.510508][T11255] kAFS: No cell specified 23:34:55 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mount(&(0x7f00000005c0)=ANY=[@ANYBLOB="23211ff2be2e098ac942be7d66f91e574117a7d8dc9c17a05b463e"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 23:34:55 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getsockopt$nfc_llcp(r2, 0x118, 0x0, &(0x7f0000000040)=""/233, 0xe9) r3 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000000)=ANY=[@ANYBLOB='%'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 23:34:55 executing program 4: mount(&(0x7f0000000040)=ANY=[@ANYBLOB="23c027082e"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1595.616873][T11262] kAFS: No cell specified 23:34:55 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_DEL(r0, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="ac00000002090101000000000000000003000009700002002c000100140003006ed80a0ec3677685b4c446deabbe2e8d14000400000000000000400000000000000000000c00020005000100060000000c000200050001003a00000014000100080001007f000001080002007f000001e891871d58a4030c00020005000100880000000c00040008000500f2ff001f0c000200060003000000000008000500000000150800060000000000"], 0xac}, 0x1, 0x0, 0x0, 0x40081}, 0x40000d0) [ 1595.654676][T11263] kAFS: unparsable volume name [ 1595.688045][T11269] kAFS: unparsable volume name 23:34:55 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mount(&(0x7f00000005c0)=ANY=[@ANYBLOB="23211ff2be2e098ac942be7d66f91e574117a7d8dc9c17a05b463e"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 23:34:55 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_DEL(r0, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="ac00000002090101000000000000000004000009700002002c000100140003006ed80a0ec3677685b4c446deabbe2e8d14000400000000000000400000000000000000000c00020005000100060000000c000200050001003a00000014000100080001007f000001080002007f000001e891871d58a4030c00020005000100880000000c00040008000500f2ff001f0c000200060003000000000008000500000000150800060000000000"], 0xac}, 0x1, 0x0, 0x0, 0x40081}, 0x40000d0) 23:34:55 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x290080, 0x0) write$input_event(r2, &(0x7f00000002c0)={{0x77359400}, 0x15, 0x7, 0x1000}, 0x18) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x6) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000080)={0x4, 0x70, 0x80, 0x40, 0x48, 0xc0, 0x0, 0x10000, 0x28, 0x4, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7, 0x4, @perf_bp={&(0x7f0000000040)}, 0x21709fa48d0befc6, 0x38f, 0x7, 0x6, 0x200, 0x4, 0xea13}, 0xffffffffffffffff, 0xb, r1, 0x0) mount(&(0x7f0000000000)=ANY=[@ANYBLOB='~'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) getpeername$ax25(r1, &(0x7f0000000240)={{0x3, @bcast}, [@rose, @default, @null, @netrom, @bcast, @netrom, @bcast, @default]}, &(0x7f0000000100)=0x48) 23:34:55 executing program 4: mount(&(0x7f0000000040)=ANY=[@ANYBLOB="23c027082e"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1595.822425][T11274] kAFS: No cell specified [ 1595.909584][T11280] kAFS: unparsable volume name 23:34:55 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mount(&(0x7f00000005c0)=ANY=[@ANYBLOB="23211ff2be2e098ac942be7d66f91e574117a7d8dc9c17a05b463e"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 23:34:55 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_DEL(r0, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="ac00000002090101000000000000000005000009700002002c000100140003006ed80a0ec3677685b4c446deabbe2e8d14000400000000000000400000000000000000000c00020005000100060000000c000200050001003a00000014000100080001007f000001080002007f000001e891871d58a4030c00020005000100880000000c00040008000500f2ff001f0c000200060003000000000008000500000000150800060000000000"], 0xac}, 0x1, 0x0, 0x0, 0x40081}, 0x40000d0) 23:34:55 executing program 4: mount(&(0x7f0000000040)=ANY=[@ANYBLOB="23c027082e"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1595.936703][T11280] kAFS: unparsable volume name [ 1595.983737][T11285] kAFS: No cell specified 23:34:55 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mount(&(0x7f00000005c0)=ANY=[@ANYBLOB="23211ff2be2e098ac942be7d66f91e574117a7d8dc9c17a05b463e"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 23:34:55 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_DEL(r0, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="ac00000002090101000000000000000006000009700002002c000100140003006ed80a0ec3677685b4c446deabbe2e8d14000400000000000000400000000000000000000c00020005000100060000000c000200050001003a00000014000100080001007f000001080002007f000001e891871d58a4030c00020005000100880000000c00040008000500f2ff001f0c000200060003000000000008000500000000150800060000000000"], 0xac}, 0x1, 0x0, 0x0, 0x40081}, 0x40000d0) 23:34:55 executing program 4: mkdir(0x0, 0x0) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="23c027082e"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1596.174215][T11296] kAFS: No cell specified 23:34:55 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_DEL(r0, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="ac00000002090101000000000000000007000009700002002c000100140003006ed80a0ec3677685b4c446deabbe2e8d14000400000000000000400000000000000000000c00020005000100060000000c000200050001003a00000014000100080001007f000001080002007f000001e891871d58a4030c00020005000100880000000c00040008000500f2ff001f0c000200060003000000000008000500000000150800060000000000"], 0xac}, 0x1, 0x0, 0x0, 0x40081}, 0x40000d0) 23:34:55 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x12001, 0x0) r3 = socket$inet_sctp(0x2, 0x5, 0x84) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$TCSETA(r5, 0x5406, &(0x7f0000000100)={0x548, 0x43, 0x5, 0xf62, 0x18, "a0f591d6f8f0cc81"}) r6 = socket$inet(0x2, 0x80001, 0x84) seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x2, &(0x7f0000000300)={0x7, &(0x7f00000001c0)=[{0x22, 0x0, 0xf3, 0xc7f}, {0x5, 0x7, 0x5, 0x7}, {0x3f, 0x0, 0x0, 0x6}, {0x7ff, 0x80, 0x7f, 0xffff}, {0x0, 0xf, 0x40, 0x3}, {0x5, 0x0, 0x9, 0x80}, {0x825, 0xe0, 0x80, 0x1033}]}) getsockopt$inet_sctp_SCTP_MAX_BURST(r6, 0x84, 0x14, &(0x7f0000000080)=@assoc_value={0x0}, &(0x7f0000000040)=0x160) setsockopt$inet_sctp_SCTP_DELAYED_SACK(r3, 0x84, 0x10, &(0x7f00000000c0)=@assoc_value={r7}, 0x8) getsockopt$inet_sctp_SCTP_CONTEXT(r1, 0x84, 0x11, &(0x7f0000000080)={r7, 0x8}, &(0x7f00000000c0)=0x8) setsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r2, 0x84, 0x6, &(0x7f0000000240)={r8, @in6={{0xa, 0x4e21, 0x4fe4, @local, 0x1}}}, 0x84) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="68768ba25a0d379bfeec363e9f"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 23:34:55 executing program 4: mkdir(0x0, 0x0) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="23c027082e"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1596.268455][T11300] sctp: [Deprecated]: syz-executor.2 (pid 11300) Use of struct sctp_assoc_value in delayed_ack socket option. [ 1596.268455][T11300] Use struct sctp_sack_info instead 23:34:55 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mount(&(0x7f00000005c0)=ANY=[@ANYBLOB="23211ff2be2e098ac942be7d66f91e574117a7d8dc9c17a05b463e"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1596.331057][T11300] kAFS: unparsable volume name 23:34:55 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_DEL(r0, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="ac00000002090101000000000000000008000009700002002c000100140003006ed80a0ec3677685b4c446deabbe2e8d14000400000000000000400000000000000000000c00020005000100060000000c000200050001003a00000014000100080001007f000001080002007f000001e891871d58a4030c00020005000100880000000c00040008000500f2ff001f0c000200060003000000000008000500000000150800060000000000"], 0xac}, 0x1, 0x0, 0x0, 0x40081}, 0x40000d0) [ 1596.365303][T11309] sctp: [Deprecated]: syz-executor.2 (pid 11309) Use of struct sctp_assoc_value in delayed_ack socket option. [ 1596.365303][T11309] Use struct sctp_sack_info instead 23:34:55 executing program 4: mkdir(0x0, 0x0) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="23c027082e"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1596.421295][T11310] kAFS: No cell specified [ 1596.423035][T11306] kAFS: unparsable volume name 23:34:56 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) mount(&(0x7f00000005c0)=ANY=[@ANYBLOB="23211ff2be2e098ac942be7d66f91e574117a7d8dc9c17a05b463e"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 23:34:56 executing program 2: setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(0xffffffffffffffff, 0x10e, 0x8, &(0x7f0000000080)=0x6, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="10947ac11dbe4fe9612aaa0f2ee88b4fc3c077a07d27132bc080bd8f5de79ebab84fc8eeb50dd75b7cca90692b5454f1f8414c8b48b7bbd44909f8a45b78f7c9c049021a0494231ebb59a8223c1a1c5a5f80b9463004c9b4e817f63a869b8a266e0306b77be41a966d081614af95a0c45e5c178c1fa9a4fb467d373c0f9b0000f8f9f1de9cec816a0842011ff3d9b632a3411ab3db15e47f8c04d83354419454ab68471eb207503d98dbeae114cfc29f93cf7fdfde0abe5cde6ccb309f67d3228f"], &(0x7f0000000040)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r1, 0x400c6615, &(0x7f0000000000)={0x0, @adiantum}) 23:34:56 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_DEL(r0, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="ac00000002090101000000000000000009000009700002002c000100140003006ed80a0ec3677685b4c446deabbe2e8d14000400000000000000400000000000000000000c00020005000100060000000c000200050001003a00000014000100080001007f000001080002007f000001e891871d58a4030c00020005000100880000000c00040008000500f2ff001f0c000200060003000000000008000500000000150800060000000000"], 0xac}, 0x1, 0x0, 0x0, 0x40081}, 0x40000d0) 23:34:56 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1596.610806][T11320] kAFS: unparsable volume name [ 1596.629022][T11322] kAFS: No cell specified [ 1596.635014][T11320] kAFS: unparsable volume name [ 1596.721563][T11327] kAFS: No cell specified 23:34:56 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) mount(&(0x7f00000005c0)=ANY=[@ANYBLOB="23211ff2be2e098ac942be7d66f91e574117a7d8dc9c17a05b463e"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 23:34:56 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_DEL(r0, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="ac0000000209010100000000000000000a000009700002002c000100140003006ed80a0ec3677685b4c446deabbe2e8d14000400000000000000400000000000000000000c00020005000100060000000c000200050001003a00000014000100080001007f000001080002007f000001e891871d58a4030c00020005000100880000000c00040008000500f2ff001f0c000200060003000000000008000500000000150800060000000000"], 0xac}, 0x1, 0x0, 0x0, 0x40081}, 0x40000d0) 23:34:56 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) close(r0) ioctl$BLKROSET(r1, 0x125d, &(0x7f0000000000)=0x7fffffff) 23:34:56 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1596.832059][T11334] kAFS: No cell specified 23:34:56 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_DEL(r0, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="ac0000000209010100000000000000000b000009700002002c000100140003006ed80a0ec3677685b4c446deabbe2e8d14000400000000000000400000000000000000000c00020005000100060000000c000200050001003a00000014000100080001007f000001080002007f000001e891871d58a4030c00020005000100880000000c00040008000500f2ff001f0c000200060003000000000008000500000000150800060000000000"], 0xac}, 0x1, 0x0, 0x0, 0x40081}, 0x40000d0) 23:34:56 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) mount(&(0x7f00000005c0)=ANY=[@ANYBLOB="23211ff2be2e098ac942be7d66f91e574117a7d8dc9c17a05b463e"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 23:34:56 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="0984751edacd2321d5bafb252741a47e7969e13144f65ba33a4c0dd9e4923c50a922ad53931f815f39b72efb57395de479b9c5d8dbafc20c43d5656c973251565b2499a66602643000f7e91f6e228ff879da3c5f7be76b74dd46ca756ce1a9585ff268bc0d75c7cec9a95ed200"/129], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1596.952687][T11339] kAFS: No cell specified 23:34:56 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 23:34:56 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_DEL(r0, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="ac0000000209010100000000000000000c000009700002002c000100140003006ed80a0ec3677685b4c446deabbe2e8d14000400000000000000400000000000000000000c00020005000100060000000c000200050001003a00000014000100080001007f000001080002007f000001e891871d58a4030c00020005000100880000000c00040008000500f2ff001f0c000200060003000000000008000500000000150800060000000000"], 0xac}, 0x1, 0x0, 0x0, 0x40081}, 0x40000d0) [ 1597.056155][T11346] kAFS: No cell specified [ 1597.099361][T11347] kAFS: unparsable volume name [ 1597.125007][T11351] kAFS: unparsable volume name 23:34:56 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) mount(&(0x7f00000005c0)=ANY=[@ANYBLOB="23211ff2be2e098ac942be7d66f91e574117a7d8dc9c17a05b463e"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1597.160539][T11353] kAFS: No cell specified 23:34:56 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_DEL(r0, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="ac0000000209010100000000000000000d000009700002002c000100140003006ed80a0ec3677685b4c446deabbe2e8d14000400000000000000400000000000000000000c00020005000100060000000c000200050001003a00000014000100080001007f000001080002007f000001e891871d58a4030c00020005000100880000000c00040008000500f2ff001f0c000200060003000000000008000500000000150800060000000000"], 0xac}, 0x1, 0x0, 0x0, 0x40081}, 0x40000d0) 23:34:56 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106, 0x4}}, 0x20) r4 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/sys/net/ipv4/vs/sync_persist_mode\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r2, &(0x7f0000000240)={0x12, 0x10, 0xfa00, {&(0x7f0000000080), r3, r4}}, 0x18) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000340)=ANY=[@ANYBLOB="25d8ffff00005c32e3ed5731516b916e041a818e076289a975d41ffabab98d32e66968fdd7d4e6bad9c9511b53dfd323e541f00e83247b1fec64fcf46ce79a1a263bda4f1f43e34e154513e4e4201abf91c5d930ccf547c7cf921469c5dd7d3295195cec952ad6d73447e79800cb8d3d43c09b36960fcf58f359b551ea04236ff87c1cca76e758b9e5f89c0a85abafb9ee52cf490cb44d1426b8490d710c469ddbf24b664a53e71f0054d8ad"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1597.239559][T11356] kAFS: No cell specified 23:34:56 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000040)=ANY=[], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1597.369941][T11363] kAFS: No cell specified 23:34:56 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) mount(&(0x7f00000005c0)=ANY=[@ANYBLOB="23211ff2be2e098ac942be7d66f91e574117a7d8dc9c17a05b463e"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1597.397526][T11366] kAFS: No cell specified [ 1597.417333][T11368] kAFS: Bad value for 'source' 23:34:57 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_DEL(r0, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="ac0000000209010100000000000000000e000009700002002c000100140003006ed80a0ec3677685b4c446deabbe2e8d14000400000000000000400000000000000000000c00020005000100060000000c000200050001003a00000014000100080001007f000001080002007f000001e891871d58a4030c00020005000100880000000c00040008000500f2ff001f0c000200060003000000000008000500000000150800060000000000"], 0xac}, 0x1, 0x0, 0x0, 0x40081}, 0x40000d0) [ 1597.459938][T11370] kAFS: No cell specified 23:34:57 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000040)=ANY=[], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 23:34:57 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000040)=ANY=[@ANYRESOCT=r1], &(0x7f0000000140)='./file1\x00', &(0x7f0000000180)='aio\x00', 0x3111050, 0x0) 23:34:57 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) mount(&(0x7f00000005c0)=ANY=[@ANYBLOB="23211ff2be2e098ac942be7d66f91e574117a7d8dc9c17a05b463e"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1597.603279][T11377] kAFS: Bad value for 'source' 23:34:57 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_DEL(r0, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="ac0000000209010100000000000000000f000009700002002c000100140003006ed80a0ec3677685b4c446deabbe2e8d14000400000000000000400000000000000000000c00020005000100060000000c000200050001003a00000014000100080001007f000001080002007f000001e891871d58a4030c00020005000100880000000c00040008000500f2ff001f0c000200060003000000000008000500000000150800060000000000"], 0xac}, 0x1, 0x0, 0x0, 0x40081}, 0x40000d0) [ 1597.647380][T11382] kAFS: No cell specified [ 1597.691692][T11384] __nla_validate_parse: 38 callbacks suppressed [ 1597.691701][T11384] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.0'. 23:34:57 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000040)=ANY=[], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 23:34:57 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 23:34:57 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) write$P9_RSTAT(r1, &(0x7f0000000080)={0x3e, 0x7d, 0x1, {0x0, 0x37, 0xfff, 0x3, {0x20, 0x0, 0x3}, 0x3000000, 0x8, 0x3ff, 0x4e84, 0x0, '', 0x4, 'afs\x00'}}, 0x3e) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$KVM_SET_DEVICE_ATTR(r5, 0x4018aee1, &(0x7f00000000c0)={0x0, 0x3ee, 0x400000000, &(0x7f0000000040)=0xfffffffffffffffb}) mount(&(0x7f0000000000)=ANY=[@ANYBLOB='%'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1597.753063][T11384] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1597.814462][T11391] kAFS: Bad value for 'source' [ 1597.848792][T11393] kAFS: No cell specified 23:34:57 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_DEL(r0, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="ac00000002090101000000000000000010000009700002002c000100140003006ed80a0ec3677685b4c446deabbe2e8d14000400000000000000400000000000000000000c00020005000100060000000c000200050001003a00000014000100080001007f000001080002007f000001e891871d58a4030c00020005000100880000000c00040008000500f2ff001f0c000200060003000000000008000500000000150800060000000000"], 0xac}, 0x1, 0x0, 0x0, 0x40081}, 0x40000d0) 23:34:57 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000040)=ANY=[@ANYBLOB], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1597.877003][T11392] kAFS: unparsable volume name [ 1597.911272][T11395] kAFS: unparsable volume name 23:34:57 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 23:34:57 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getsockopt$bt_BT_SNDMTU(r2, 0x112, 0xc, &(0x7f0000000040), &(0x7f0000000080)=0x2) r3 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000000)=ANY=[@ANYBLOB='%'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1597.945193][T11398] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1597.974587][T11398] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1598.023460][T11401] kAFS: Bad value for 'source' [ 1598.074983][T11404] kAFS: No cell specified 23:34:57 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000040)=ANY=[@ANYBLOB], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 23:34:57 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_DEL(r0, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="ac00000002090101000000000000000011000009700002002c000100140003006ed80a0ec3677685b4c446deabbe2e8d14000400000000000000400000000000000000000c00020005000100060000000c000200050001003a00000014000100080001007f000001080002007f000001e891871d58a4030c00020005000100880000000c00040008000500f2ff001f0c000200060003000000000008000500000000150800060000000000"], 0xac}, 0x1, 0x0, 0x0, 0x40081}, 0x40000d0) [ 1598.130231][T11405] kAFS: unparsable volume name [ 1598.157031][T11408] kAFS: unparsable volume name 23:34:57 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1598.188758][T11410] kAFS: Bad value for 'source' [ 1598.198600][T11411] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1598.224719][T11411] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1598.274348][T11415] kAFS: No cell specified 23:34:57 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) write$eventfd(0xffffffffffffffff, &(0x7f0000000080)=0x7e, 0x8) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000000)=ANY=[@ANYBLOB='%'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r5) lstat(&(0x7f00000014c0)='./file0\x00', &(0x7f0000001500)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x6, 0x6, &(0x7f0000001400)=[{&(0x7f0000001600)="6e5e0b53000000c3c6e2f1e1016757b4044cdc5f61d8b7881128e611d88898bddb79f20afe6dd2fde7f89b7f47e6567b2c534347cbd571b5f15dc96dfbaeb123e9dd600362f3f49444e28b5b35ab9c5176d2b73957ddf0a6acad6383baa4bc61d1f9a37e2298b22c646e98", 0x6b, 0x1}, {&(0x7f00000002c0)="44429fb4482b8335510d34aac89c7bd8db7cae951f24633daaa398842372d92f4a1455abfbee50fd7f7d68ca2020795d7e739a4d6f6ce1ca850bd7c216797174d8b6969def796f6daf", 0x49, 0x9}, {&(0x7f0000000100), 0x0, 0x1}, {&(0x7f00000001c0)="1dbc2a145dd077e78f0680bf70376c2ecd23a3239c138de784b40a18bf04a54159d319043afe7994fb32cecfbf1b827937ebef8bc0c2d60838e9cc79", 0x3c}, {&(0x7f0000000340)="01f66067e3e4569af88236f388ea3bba4a06e1b4e8ebfd82a88833d091c13c230acb9eb34ee22f6bd37694fdd987a091b0f09fe2b5691aa6c209a13d19b3380f2ad0fc6eb8ee2df7b0c71bfe5d7a0b537375b715092e1d29973b1f3a31a89eaba8a3d6f8754f97e7361e3b7e105ad89f7d15eab1094b98e28afe44a9500f4d0063f1", 0x82, 0x9}, {&(0x7f0000000400)="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", 0x1000, 0x7fffffff}], 0x100002, &(0x7f0000001580)={[{@norecovery='norecovery'}], [{@smackfsroot={'smackfsroot', 0x3d, 'afs\x00'}}, {@appraise='appraise'}, {@euid_lt={'euid<', r5}}, {@euid_gt={'euid>', r6}}]}) 23:34:57 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_DEL(r0, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="ac00000002090101000000000000000012000009700002002c000100140003006ed80a0ec3677685b4c446deabbe2e8d14000400000000000000400000000000000000000c00020005000100060000000c000200050001003a00000014000100080001007f000001080002007f000001e891871d58a4030c00020005000100880000000c00040008000500f2ff001f0c000200060003000000000008000500000000150800060000000000"], 0xac}, 0x1, 0x0, 0x0, 0x40081}, 0x40000d0) 23:34:57 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000040)=ANY=[@ANYBLOB], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 23:34:57 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount(&(0x7f00000005c0)=ANY=[], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1598.384969][T11419] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1598.420675][T11419] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1598.434844][T11420] kAFS: unparsable volume name [ 1598.469936][T11425] kAFS: unparsable volume name [ 1598.488434][T11424] kAFS: Bad value for 'source' 23:34:58 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_DEL(r0, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="ac00000002090101000000000000000013000009700002002c000100140003006ed80a0ec3677685b4c446deabbe2e8d14000400000000000000400000000000000000000c00020005000100060000000c000200050001003a00000014000100080001007f000001080002007f000001e891871d58a4030c00020005000100880000000c00040008000500f2ff001f0c000200060003000000000008000500000000150800060000000000"], 0xac}, 0x1, 0x0, 0x0, 0x40081}, 0x40000d0) [ 1598.532316][T11426] kAFS: Bad value for 'source' 23:34:58 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000000)=ANY=[@ANYBLOB='%'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) r2 = syz_open_dev$sndmidi(&(0x7f0000000040)='/dev/snd/midiC#D#\x00', 0x7ff, 0x204100) r3 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2008}, 0x1c) listen(r3, 0x0) dup3(r2, r3, 0x80000) 23:34:58 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="23c027"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1598.585443][T11429] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1598.637870][T11429] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. 23:34:58 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount(&(0x7f00000005c0)=ANY=[], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1598.679590][T11434] kAFS: unparsable volume name [ 1598.726344][T11436] kAFS: No cell specified 23:34:58 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_DEL(r0, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="ac00000002090101000000000000000014000009700002002c000100140003006ed80a0ec3677685b4c446deabbe2e8d14000400000000000000400000000000000000000c00020005000100060000000c000200050001003a00000014000100080001007f000001080002007f000001e891871d58a4030c00020005000100880000000c00040008000500f2ff001f0c000200060003000000000008000500000000150800060000000000"], 0xac}, 0x1, 0x0, 0x0, 0x40081}, 0x40000d0) [ 1598.802054][T11438] kAFS: Bad value for 'source' 23:34:58 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) dup(r0) dup(0xffffffffffffffff) r1 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x6) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000000)=ANY=[@ANYBLOB='%'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x80400, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x38, 0x2}, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r2, 0xc1105517, &(0x7f0000000240)={{0x1, 0x0, 0x20, 0x8, '\x00', 0x2}, 0x6, 0x20, 0x3, r3, 0x7, 0x3, 'syz0\x00', &(0x7f0000000080)=['afs\x00', '/md5sumppp1}\x00', '\x00', 'afs\x00', 'afs\x00', 'afs\x00', 'cgroup\\\\-\x00'], 0x28, [], [0x8d, 0x81, 0xed27, 0x1]}) 23:34:58 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="23c027"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 23:34:58 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_DEL(r0, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="ac00000002090101000000000000000020000009700002002c000100140003006ed80a0ec3677685b4c446deabbe2e8d14000400000000000000400000000000000000000c00020005000100060000000c000200050001003a00000014000100080001007f000001080002007f000001e891871d58a4030c00020005000100880000000c00040008000500f2ff001f0c000200060003000000000008000500000000150800060000000000"], 0xac}, 0x1, 0x0, 0x0, 0x40081}, 0x40000d0) 23:34:58 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount(&(0x7f00000005c0)=ANY=[], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1598.968150][T11444] kAFS: No cell specified [ 1598.984767][T11449] kAFS: unparsable volume name [ 1599.012616][T11449] kAFS: unparsable volume name [ 1599.056940][T11453] kAFS: Bad value for 'source' 23:34:58 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_DEL(r0, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="ac00000002090101000000000000000025000009700002002c000100140003006ed80a0ec3677685b4c446deabbe2e8d14000400000000000000400000000000000000000c00020005000100060000000c000200050001003a00000014000100080001007f000001080002007f000001e891871d58a4030c00020005000100880000000c00040008000500f2ff001f0c000200060003000000000008000500000000150800060000000000"], 0xac}, 0x1, 0x0, 0x0, 0x40081}, 0x40000d0) 23:34:58 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount(&(0x7f00000005c0)=ANY=[@ANYBLOB], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 23:34:58 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000080)=ANY=[@ANYBLOB="dc44fdd2221f02ad9d93bf060731a3ce5439a5765e7bb1a2cf7d09d9760a47d010fbfea0289503daf62a796f0b8015e89627a25e9c308ac1b53212d805088fadcf5cc4869d7690d4054aa198271c86df1984bff5cfd2c7b653a291f5a92045eeaa23272979c0a4a57efd67d1f9b1593944787403c506bffd5c6e6c24"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 23:34:58 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="23c027"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1599.196241][T11460] kAFS: No cell specified 23:34:58 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_DEL(r0, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="ac0000000209010100000000000000003f000009700002002c000100140003006ed80a0ec3677685b4c446deabbe2e8d14000400000000000000400000000000000000000c00020005000100060000000c000200050001003a00000014000100080001007f000001080002007f000001e891871d58a4030c00020005000100880000000c00040008000500f2ff001f0c000200060003000000000008000500000000150800060000000000"], 0xac}, 0x1, 0x0, 0x0, 0x40081}, 0x40000d0) 23:34:58 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="23c02708"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1599.252230][T11463] kAFS: unparsable volume name [ 1599.253831][T11464] kAFS: Bad value for 'source' [ 1599.289760][T11466] kAFS: unparsable volume name 23:34:58 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount(&(0x7f00000005c0)=ANY=[@ANYBLOB], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 23:34:58 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_DEL(r0, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="ac00000002090101000000000000000040000009700002002c000100140003006ed80a0ec3677685b4c446deabbe2e8d14000400000000000000400000000000000000000c00020005000100060000000c000200050001003a00000014000100080001007f000001080002007f000001e891871d58a4030c00020005000100880000000c00040008000500f2ff001f0c000200060003000000000008000500000000150800060000000000"], 0xac}, 0x1, 0x0, 0x0, 0x40081}, 0x40000d0) 23:34:59 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) mount(&(0x7f0000000000)=ANY=[@ANYBLOB='%'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2008}, 0x1c) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000380)=@raw={'raw\x00', 0x3c1, 0x3, 0x2f8, 0x0, 0xd0, 0xd0, 0xd0, 0xd0, 0x228, 0x228, 0x228, 0x228, 0x228, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0xa8, 0xd0}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00', 0x0, {0xffff}}}, {{@uncond, 0x0, 0x138, 0x158, 0x0, {}, [@common=@srh1={{0x90, 'srh\x00'}, {0x0, 0x0, 0x0, 0x0, 0x0, @dev, @loopback, @local}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x358) [ 1599.407430][T11471] validate_nla: 94 callbacks suppressed [ 1599.407439][T11471] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 1599.470553][T11471] netlink: 'syz-executor.0': attribute type 2 has an invalid length. [ 1599.496274][T11476] kAFS: Bad value for 'source' [ 1599.507880][T11471] netlink: 'syz-executor.0': attribute type 2 has an invalid length. 23:34:59 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount(&(0x7f00000005c0)=ANY=[@ANYBLOB], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1599.513810][T11477] tcpmss_tg6_check: 12 callbacks suppressed [ 1599.513818][T11477] xt_TCPMSS: path-MTU clamping only supported in FORWARD, OUTPUT and POSTROUTING hooks [ 1599.538212][T11471] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 1599.540000][T11479] kAFS: No cell specified 23:34:59 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) mount(&(0x7f0000000000)=ANY=[@ANYBLOB='%'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2008}, 0x1c) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000380)=@raw={'raw\x00', 0x3c1, 0x3, 0x2f8, 0x0, 0xd0, 0xd0, 0xd0, 0xd0, 0x228, 0x228, 0x228, 0x228, 0x228, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0xa8, 0xd0}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00', 0x0, {0xffff}}}, {{@uncond, 0x0, 0x138, 0x158, 0x0, {}, [@common=@srh1={{0x90, 'srh\x00'}, {0x0, 0x0, 0x0, 0x0, 0x0, @dev, @loopback, @local}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x358) 23:34:59 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="23c02708"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 23:34:59 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_DEL(r0, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="ac00000002090101000000000000000048000009700002002c000100140003006ed80a0ec3677685b4c446deabbe2e8d14000400000000000000400000000000000000000c00020005000100060000000c000200050001003a00000014000100080001007f000001080002007f000001e891871d58a4030c00020005000100880000000c00040008000500f2ff001f0c000200060003000000000008000500000000150800060000000000"], 0xac}, 0x1, 0x0, 0x0, 0x40081}, 0x40000d0) [ 1599.671980][T11483] kAFS: Bad value for 'source' [ 1599.726743][T11487] xt_TCPMSS: path-MTU clamping only supported in FORWARD, OUTPUT and POSTROUTING hooks [ 1599.776746][T11491] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 1599.782727][T11490] kAFS: No cell specified 23:34:59 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount(&(0x7f00000005c0)=ANY=[@ANYBLOB="23211ff2be2e098ac942be7d66f9"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 23:34:59 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) mount(&(0x7f0000000000)=ANY=[@ANYBLOB='%'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2008}, 0x1c) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000380)=@raw={'raw\x00', 0x3c1, 0x3, 0x2f8, 0x0, 0xd0, 0xd0, 0xd0, 0xd0, 0x228, 0x228, 0x228, 0x228, 0x228, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0xa8, 0xd0}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00', 0x0, {0xffff}}}, {{@uncond, 0x0, 0x138, 0x158, 0x0, {}, [@common=@srh1={{0x90, 'srh\x00'}, {0x0, 0x0, 0x0, 0x0, 0x0, @dev, @loopback, @local}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x358) [ 1599.821459][T11491] netlink: 'syz-executor.0': attribute type 2 has an invalid length. [ 1599.829615][T11491] netlink: 'syz-executor.0': attribute type 2 has an invalid length. 23:34:59 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="23c02708"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1599.870081][T11496] kAFS: No cell specified 23:34:59 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount(&(0x7f00000005c0)=ANY=[@ANYBLOB='#'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1599.894907][T11491] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 1599.914373][T11497] xt_TCPMSS: path-MTU clamping only supported in FORWARD, OUTPUT and POSTROUTING hooks [ 1599.994224][T11502] kAFS: No cell specified 23:34:59 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) mount(&(0x7f0000000000)=ANY=[@ANYBLOB='%'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2008}, 0x1c) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000380)=@raw={'raw\x00', 0x3c1, 0x3, 0x2f8, 0x0, 0xd0, 0xd0, 0xd0, 0xd0, 0x228, 0x228, 0x228, 0x228, 0x228, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0xa8, 0xd0}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00', 0x0, {0xffff}}}, {{@uncond, 0x0, 0x138, 0x158, 0x0, {}, [@common=@srh1={{0x90, 'srh\x00'}, {0x0, 0x0, 0x0, 0x0, 0x0, @dev, @loopback, @local}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x358) 23:34:59 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_DEL(r0, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="ac0000000209010100000000000000004c000009700002002c000100140003006ed80a0ec3677685b4c446deabbe2e8d14000400000000000000400000000000000000000c00020005000100060000000c000200050001003a00000014000100080001007f000001080002007f000001e891871d58a4030c00020005000100880000000c00040008000500f2ff001f0c000200060003000000000008000500000000150800060000000000"], 0xac}, 0x1, 0x0, 0x0, 0x40081}, 0x40000d0) 23:34:59 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="23c027082e"], 0x0, &(0x7f0000000180)='afs\x00', 0x0, 0x0) 23:34:59 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) mount(&(0x7f0000000000)=ANY=[@ANYBLOB='%'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2008}, 0x1c) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000380)=@raw={'raw\x00', 0x3c1, 0x3, 0x2f8, 0x0, 0xd0, 0xd0, 0xd0, 0xd0, 0x228, 0x228, 0x228, 0x228, 0x228, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0xa8, 0xd0}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00', 0x0, {0xffff}}}, {{@uncond, 0x0, 0x138, 0x158, 0x0, {}, [@common=@srh1={{0x90, 'srh\x00'}, {0x0, 0x0, 0x0, 0x0, 0x0, @dev, @loopback, @local}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x358) [ 1600.101429][T11509] kAFS: unparsable volume name [ 1600.108174][T11510] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 1600.137428][T11510] netlink: 'syz-executor.0': attribute type 2 has an invalid length. 23:34:59 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount(&(0x7f00000005c0)=ANY=[@ANYBLOB='#'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 23:34:59 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_DEL(r0, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="ac00000002090101000000000000000060000009700002002c000100140003006ed80a0ec3677685b4c446deabbe2e8d14000400000000000000400000000000000000000c00020005000100060000000c000200050001003a00000014000100080001007f000001080002007f000001e891871d58a4030c00020005000100880000000c00040008000500f2ff001f0c000200060003000000000008000500000000150800060000000000"], 0xac}, 0x1, 0x0, 0x0, 0x40081}, 0x40000d0) 23:34:59 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="23c027082e"], 0x0, &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1600.302071][T11518] kAFS: unparsable volume name 23:34:59 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) mount(&(0x7f0000000000)=ANY=[@ANYBLOB='%'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2008}, 0x1c) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000380)=@raw={'raw\x00', 0x3c1, 0x3, 0x2f8, 0x0, 0xd0, 0xd0, 0xd0, 0xd0, 0x228, 0x228, 0x228, 0x228, 0x228, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0xa8, 0xd0}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00', 0x0, {0xffff}}}, {{@uncond, 0x0, 0x138, 0x158, 0x0, {}, [@common=@srh1={{0x90, 'srh\x00'}, {0x0, 0x0, 0x0, 0x0, 0x0, @dev, @loopback, @local}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x358) 23:34:59 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount(&(0x7f00000005c0)=ANY=[@ANYBLOB='#'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 23:34:59 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_DEL(r0, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="ac00000002090101000000000000000068000009700002002c000100140003006ed80a0ec3677685b4c446deabbe2e8d14000400000000000000400000000000000000000c00020005000100060000000c000200050001003a00000014000100080001007f000001080002007f000001e891871d58a4030c00020005000100880000000c00040008000500f2ff001f0c000200060003000000000008000500000000150800060000000000"], 0xac}, 0x1, 0x0, 0x0, 0x40081}, 0x40000d0) [ 1600.508921][T11531] kAFS: unparsable volume name 23:35:00 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="23c027082e"], 0x0, &(0x7f0000000180)='afs\x00', 0x0, 0x0) 23:35:00 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) mount(&(0x7f0000000000)=ANY=[@ANYBLOB='%'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2008}, 0x1c) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000380)=@raw={'raw\x00', 0x3c1, 0x3, 0x2f8, 0x0, 0xd0, 0xd0, 0xd0, 0xd0, 0x228, 0x228, 0x228, 0x228, 0x228, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0xa8, 0xd0}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00', 0x0, {0xffff}}}, {{@uncond, 0x0, 0x138, 0x158, 0x0, {}, [@common=@srh1={{0x90, 'srh\x00'}, {0x0, 0x0, 0x0, 0x0, 0x0, @dev, @loopback, @local}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x358) 23:35:00 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_DEL(r0, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="ac0000000209010100000000000000006c000009700002002c000100140003006ed80a0ec3677685b4c446deabbe2e8d14000400000000000000400000000000000000000c00020005000100060000000c000200050001003a00000014000100080001007f000001080002007f000001e891871d58a4030c00020005000100880000000c00040008000500f2ff001f0c000200060003000000000008000500000000150800060000000000"], 0xac}, 0x1, 0x0, 0x0, 0x40081}, 0x40000d0) 23:35:00 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount(&(0x7f00000005c0)=ANY=[@ANYBLOB="23211ff2be2e098a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 23:35:00 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="23c027082e"], &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) [ 1600.735238][T11544] xt_TCPMSS: path-MTU clamping only supported in FORWARD, OUTPUT and POSTROUTING hooks 23:35:00 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_DEL(r0, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="ac00000002090101000000000000000074000009700002002c000100140003006ed80a0ec3677685b4c446deabbe2e8d14000400000000000000400000000000000000000c00020005000100060000000c000200050001003a00000014000100080001007f000001080002007f000001e891871d58a4030c00020005000100880000000c00040008000500f2ff001f0c000200060003000000000008000500000000150800060000000000"], 0xac}, 0x1, 0x0, 0x0, 0x40081}, 0x40000d0) [ 1600.782545][T11546] kAFS: No cell specified 23:35:00 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) mount(&(0x7f0000000000)=ANY=[@ANYBLOB='%'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2008}, 0x1c) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000380)=@raw={'raw\x00', 0x3c1, 0x3, 0x2f8, 0x0, 0xd0, 0xd0, 0xd0, 0xd0, 0x228, 0x228, 0x228, 0x228, 0x228, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0xa8, 0xd0}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00', 0x0, {0xffff}}}, {{@uncond, 0x0, 0x138, 0x158, 0x0, {}, [@common=@srh1={{0x90, 'srh\x00'}, {0x0, 0x0, 0x0, 0x0, 0x0, @dev, @loopback, @local}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x358) 23:35:00 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount(&(0x7f00000005c0)=ANY=[@ANYBLOB='#!'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 23:35:00 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="23c027082e"], &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) [ 1600.940065][T11555] xt_TCPMSS: path-MTU clamping only supported in FORWARD, OUTPUT and POSTROUTING hooks [ 1600.996436][T11558] kAFS: No cell specified 23:35:00 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount(&(0x7f00000005c0)=ANY=[@ANYBLOB='#!'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 23:35:00 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_DEL(r0, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="ac0000000209010100000000000000007a000009700002002c000100140003006ed80a0ec3677685b4c446deabbe2e8d14000400000000000000400000000000000000000c00020005000100060000000c000200050001003a00000014000100080001007f000001080002007f000001e891871d58a4030c00020005000100880000000c00040008000500f2ff001f0c000200060003000000000008000500000000150800060000000000"], 0xac}, 0x1, 0x0, 0x0, 0x40081}, 0x40000d0) 23:35:00 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) mount(&(0x7f0000000000)=ANY=[@ANYBLOB='%'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2008}, 0x1c) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000380)=@raw={'raw\x00', 0x3c1, 0x3, 0x2f8, 0x0, 0xd0, 0xd0, 0xd0, 0xd0, 0x228, 0x228, 0x228, 0x228, 0x228, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0xa8, 0xd0}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00', 0x0, {0xffff}}}, {{@uncond, 0x0, 0x138, 0x158, 0x0, {}, [@common=@srh1={{0x90, 'srh\x00'}, {0x0, 0x0, 0x0, 0x0, 0x0, @dev, @loopback, @local}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x358) 23:35:00 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_DEL(r0, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="ac000000020901010000000000ffffff9e000009700002002c000100140003006ed80a0ec3677685b4c446deabbe2e8d14000400000000000000400000000000000000000c00020005000100060000000c000200050001003a00000014000100080001007f000001080002007f000001e891871d58a4030c00020005000100880000000c00040008000500f2ff001f0c000200060003000000000008000500000000150800060000000000"], 0xac}, 0x1, 0x0, 0x0, 0x40081}, 0x40000d0) [ 1601.164741][T11568] kAFS: No cell specified 23:35:00 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="23c027082e"], &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) [ 1601.201635][T11569] xt_TCPMSS: path-MTU clamping only supported in FORWARD, OUTPUT and POSTROUTING hooks 23:35:00 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount(&(0x7f00000005c0)=ANY=[@ANYBLOB='#!'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 23:35:00 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) mount(&(0x7f0000000000)=ANY=[@ANYBLOB='%'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) socket$inet6(0xa, 0x6, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000380)=@raw={'raw\x00', 0x3c1, 0x3, 0x2f8, 0x0, 0xd0, 0xd0, 0xd0, 0xd0, 0x228, 0x228, 0x228, 0x228, 0x228, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0xa8, 0xd0}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00', 0x0, {0xffff}}}, {{@uncond, 0x0, 0x138, 0x158, 0x0, {}, [@common=@srh1={{0x90, 'srh\x00'}, {0x0, 0x0, 0x0, 0x0, 0x0, @dev, @loopback, @local}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x358) [ 1601.313903][T11576] kAFS: No cell specified 23:35:00 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_DEL(r0, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="ac00000002090101000000000000003bda000009700002002c000100140003006ed80a0ec3677685b4c446deabbe2e8d14000400000000000000400000000000000000000c00020005000100060000000c000200050001003a00000014000100080001007f000001080002007f000001e891871d58a4030c00020005000100880000000c00040008000500f2ff001f0c000200060003000000000008000500000000150800060000000000"], 0xac}, 0x1, 0x0, 0x0, 0x40081}, 0x40000d0) [ 1601.391349][T11581] xt_TCPMSS: path-MTU clamping only supported in FORWARD, OUTPUT and POSTROUTING hooks 23:35:01 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount(&(0x7f00000005c0)=ANY=[@ANYBLOB="23211ff2be"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 23:35:01 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) mount(&(0x7f0000000000)=ANY=[@ANYBLOB='%'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) socket$inet6(0xa, 0x6, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000380)=@raw={'raw\x00', 0x3c1, 0x3, 0x2f8, 0x0, 0xd0, 0xd0, 0xd0, 0xd0, 0x228, 0x228, 0x228, 0x228, 0x228, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0xa8, 0xd0}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00', 0x0, {0xffff}}}, {{@uncond, 0x0, 0x138, 0x158, 0x0, {}, [@common=@srh1={{0x90, 'srh\x00'}, {0x0, 0x0, 0x0, 0x0, 0x0, @dev, @loopback, @local}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x358) 23:35:01 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x1e5) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x7, 0x6}, 0x0) mount(&(0x7f0000000080)=ANY=[@ANYRES16=r0], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='afs\x00', 0x0, 0x0) set_robust_list(&(0x7f0000000200)={&(0x7f0000000140)={&(0x7f0000000000)}, 0x800, &(0x7f00000001c0)={&(0x7f0000000180)}}, 0x18) [ 1601.536271][T11591] kAFS: No cell specified 23:35:01 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_DEL(r0, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="ac000000020901010000000000ffffffef000009700002002c000100140003006ed80a0ec3677685b4c446deabbe2e8d14000400000000000000400000000000000000000c00020005000100060000000c000200050001003a00000014000100080001007f000001080002007f000001e891871d58a4030c00020005000100880000000c00040008000500f2ff001f0c000200060003000000000008000500000000150800060000000000"], 0xac}, 0x1, 0x0, 0x0, 0x40081}, 0x40000d0) [ 1601.562010][T11592] xt_TCPMSS: path-MTU clamping only supported in FORWARD, OUTPUT and POSTROUTING hooks [ 1601.572511][T11593] kAFS: unparsable volume name 23:35:01 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount(&(0x7f00000005c0)=ANY=[@ANYBLOB="23211ff2be"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 23:35:01 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) mount(&(0x7f0000000000)=ANY=[@ANYBLOB='%'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000380)=@raw={'raw\x00', 0x3c1, 0x3, 0x2f8, 0x0, 0xd0, 0xd0, 0xd0, 0xd0, 0x228, 0x228, 0x228, 0x228, 0x228, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0xa8, 0xd0}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00', 0x0, {0xffff}}}, {{@uncond, 0x0, 0x138, 0x158, 0x0, {}, [@common=@srh1={{0x90, 'srh\x00'}, {0x0, 0x0, 0x0, 0x0, 0x0, @dev, @loopback, @local}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x358) 23:35:01 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) r2 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) shmat(r2, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffffff) r3 = shmat(r2, &(0x7f0000ff9000/0x4000)=nil, 0x5000) shmdt(r3) mount(&(0x7f0000000080)=ANY=[@ANYBLOB="25b1339c366ff230239120f8f9ae34d28bc9e64ecca9345423a3214de053c1b6a647159299e0e08670bca48975c03e043bd324260179f33e5a6ada29674973b5ce5122a471839131337404234cb1eb853804faa06e68b19aefb7223b72bf3e4f13203d2bcdc3ef2c3e51be0eb0a98ce0cc40d8f9"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 23:35:01 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_DEL(r0, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="ac000000020901010000000000fffffff0000009700002002c000100140003006ed80a0ec3677685b4c446deabbe2e8d14000400000000000000400000000000000000000c00020005000100060000000c000200050001003a00000014000100080001007f000001080002007f000001e891871d58a4030c00020005000100880000000c00040008000500f2ff001f0c000200060003000000000008000500000000150800060000000000"], 0xac}, 0x1, 0x0, 0x0, 0x40081}, 0x40000d0) [ 1601.713308][T11602] xt_TCPMSS: path-MTU clamping only supported in FORWARD, OUTPUT and POSTROUTING hooks [ 1601.752456][T11605] kAFS: No cell specified 23:35:01 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000380)=@raw={'raw\x00', 0x3c1, 0x3, 0x2f8, 0x0, 0xd0, 0xd0, 0xd0, 0xd0, 0x228, 0x228, 0x228, 0x228, 0x228, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0xa8, 0xd0}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00', 0x0, {0xffff}}}, {{@uncond, 0x0, 0x138, 0x158, 0x0, {}, [@common=@srh1={{0x90, 'srh\x00'}, {0x0, 0x0, 0x0, 0x0, 0x0, @dev, @loopback, @local}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x358) [ 1601.784173][ T26] audit: type=1800 audit(1579649701.330:67): pid=11606 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed comm="syz-executor.4" name="SYSV00000000" dev="hugetlbfs" ino=3 res=0 23:35:01 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) r2 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) shmat(r2, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffffff) r3 = shmat(r2, &(0x7f0000ff9000/0x4000)=nil, 0x5000) shmdt(r3) mount(&(0x7f0000000080)=ANY=[@ANYBLOB="25b1339c366ff230239120f8f9ae34d28bc9e64ecca9345423a3214de053c1b6a647159299e0e08670bca48975c03e043bd324260179f33e5a6ada29674973b5ce5122a471839131337404234cb1eb853804faa06e68b19aefb7223b72bf3e4f13203d2bcdc3ef2c3e51be0eb0a98ce0cc40d8f9"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 23:35:01 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount(&(0x7f00000005c0)=ANY=[@ANYBLOB="23211ff2be"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 23:35:01 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_DEL(r0, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="ac000000020901010000000000fffffffc000009700002002c000100140003006ed80a0ec3677685b4c446deabbe2e8d14000400000000000000400000000000000000000c00020005000100060000000c000200050001003a00000014000100080001007f000001080002007f000001e891871d58a4030c00020005000100880000000c00040008000500f2ff001f0c000200060003000000000008000500000000150800060000000000"], 0xac}, 0x1, 0x0, 0x0, 0x40081}, 0x40000d0) [ 1601.930040][T11616] xt_TCPMSS: path-MTU clamping only supported in FORWARD, OUTPUT and POSTROUTING hooks [ 1601.952543][ T26] audit: type=1800 audit(1579649701.500:68): pid=11617 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed comm="syz-executor.4" name="SYSV00000000" dev="hugetlbfs" ino=4 res=0 23:35:01 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000380)=@raw={'raw\x00', 0x3c1, 0x3, 0x2f8, 0x0, 0xd0, 0xd0, 0xd0, 0xd0, 0x228, 0x228, 0x228, 0x228, 0x228, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0xa8, 0xd0}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00', 0x0, {0xffff}}}, {{@uncond, 0x0, 0x138, 0x158, 0x0, {}, [@common=@srh1={{0x90, 'srh\x00'}, {0x0, 0x0, 0x0, 0x0, 0x0, @dev, @loopback, @local}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x358) [ 1601.986076][T11619] kAFS: No cell specified 23:35:01 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_DEL(r0, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="ac0000000209010100000000007fffffff000009700002002c000100140003006ed80a0ec3677685b4c446deabbe2e8d14000400000000000000400000000000000000000c00020005000100060000000c000200050001003a00000014000100080001007f000001080002007f000001e891871d58a4030c00020005000100880000000c00040008000500f2ff001f0c000200060003000000000008000500000000150800060000000000"], 0xac}, 0x1, 0x0, 0x0, 0x40081}, 0x40000d0) 23:35:01 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) r2 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) shmat(r2, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffffff) r3 = shmat(r2, &(0x7f0000ff9000/0x4000)=nil, 0x5000) shmdt(r3) mount(&(0x7f0000000080)=ANY=[@ANYBLOB="25b1339c366ff230239120f8f9ae34d28bc9e64ecca9345423a3214de053c1b6a647159299e0e08670bca48975c03e043bd324260179f33e5a6ada29674973b5ce5122a471839131337404234cb1eb853804faa06e68b19aefb7223b72bf3e4f13203d2bcdc3ef2c3e51be0eb0a98ce0cc40d8f9"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 23:35:01 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000380)=@raw={'raw\x00', 0x3c1, 0x3, 0x2f8, 0x0, 0xd0, 0xd0, 0xd0, 0xd0, 0x228, 0x228, 0x228, 0x228, 0x228, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0xa8, 0xd0}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00', 0x0, {0xffff}}}, {{@uncond, 0x0, 0x138, 0x158, 0x0, {}, [@common=@srh1={{0x90, 'srh\x00'}, {0x0, 0x0, 0x0, 0x0, 0x0, @dev, @loopback, @local}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x358) 23:35:01 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_DEL(r0, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="ac000000020901010000000000ffffffff000009700002002c000100140003006ed80a0ec3677685b4c446deabbe2e8d14000400000000000000400000000000000000000c00020005000100060000000c000200050001003a00000014000100080001007f000001080002007f000001e891871d58a4030c00020005000100880000000c00040008000500f2ff001f0c000200060003000000000008000500000000150800060000000000"], 0xac}, 0x1, 0x0, 0x0, 0x40081}, 0x40000d0) [ 1602.132310][ T26] audit: type=1800 audit(1579649701.680:69): pid=11629 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed comm="syz-executor.4" name="SYSV00000000" dev="hugetlbfs" ino=5 res=0 23:35:01 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount(&(0x7f00000005c0)=ANY=[@ANYBLOB="23211ff2be2e09"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 23:35:01 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) r2 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) shmat(r2, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffffff) r3 = shmat(r2, &(0x7f0000ff9000/0x4000)=nil, 0x5000) shmdt(r3) [ 1602.252865][T11637] kAFS: No cell specified 23:35:01 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) mount(&(0x7f0000000000)=ANY=[@ANYBLOB='%'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000380)=@raw={'raw\x00', 0x3c1, 0x3, 0x2f8, 0x0, 0xd0, 0xd0, 0xd0, 0xd0, 0x228, 0x228, 0x228, 0x228, 0x228, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0xa8, 0xd0}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00', 0x0, {0xffff}}}, {{@uncond, 0x0, 0x138, 0x158, 0x0, {}, [@common=@srh1={{0x90, 'srh\x00'}, {0x0, 0x0, 0x0, 0x0, 0x0, @dev, @loopback, @local}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x358) 23:35:01 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_DEL(r0, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="ac00000002090101000002000000000000000009700002002c000100140003006ed80a0ec3677685b4c446deabbe2e8d14000400000000000000400000000000000000000c00020005000100060000000c000200050001003a00000014000100080001007f000001080002007f000001e891871d58a4030c00020005000100880000000c00040008000500f2ff001f0c000200060003000000000008000500000000150800060000000000"], 0xac}, 0x1, 0x0, 0x0, 0x40081}, 0x40000d0) [ 1602.335734][ T26] audit: type=1800 audit(1579649701.880:70): pid=11642 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed comm="syz-executor.4" name="SYSV00000000" dev="hugetlbfs" ino=6 res=0 23:35:01 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount(&(0x7f00000005c0)=ANY=[@ANYBLOB="23211ff2be2e"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 23:35:02 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) mount(&(0x7f0000000000)=ANY=[@ANYBLOB='%'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000380)=@raw={'raw\x00', 0x3c1, 0x3, 0x2f8, 0x0, 0xd0, 0xd0, 0xd0, 0xd0, 0x228, 0x228, 0x228, 0x228, 0x228, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0xa8, 0xd0}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00', 0x0, {0xffff}}}, {{@uncond, 0x0, 0x138, 0x158, 0x0, {}, [@common=@srh1={{0x90, 'srh\x00'}, {0x0, 0x0, 0x0, 0x0, 0x0, @dev, @loopback, @local}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x358) [ 1602.455578][T11649] kAFS: No cell specified 23:35:02 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) r2 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) shmat(r2, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffffff) r3 = shmat(r2, &(0x7f0000ff9000/0x4000)=nil, 0x5000) shmdt(r3) 23:35:02 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_DEL(r0, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="ac00000002090101000003000000000000000009700002002c000100140003006ed80a0ec3677685b4c446deabbe2e8d14000400000000000000400000000000000000000c00020005000100060000000c000200050001003a00000014000100080001007f000001080002007f000001e891871d58a4030c00020005000100880000000c00040008000500f2ff001f0c000200060003000000000008000500000000150800060000000000"], 0xac}, 0x1, 0x0, 0x0, 0x40081}, 0x40000d0) 23:35:02 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) mount(&(0x7f0000000000)=ANY=[@ANYBLOB='%'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000380)=@raw={'raw\x00', 0x3c1, 0x3, 0x2f8, 0x0, 0xd0, 0xd0, 0xd0, 0xd0, 0x228, 0x228, 0x228, 0x228, 0x228, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0xa8, 0xd0}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00', 0x0, {0xffff}}}, {{@uncond, 0x0, 0x138, 0x158, 0x0, {}, [@common=@srh1={{0x90, 'srh\x00'}, {0x0, 0x0, 0x0, 0x0, 0x0, @dev, @loopback, @local}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x358) 23:35:02 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount(&(0x7f00000005c0)=ANY=[@ANYBLOB="23211ff2be2e"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1602.645062][ T26] audit: type=1800 audit(1579649702.190:71): pid=11657 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed comm="syz-executor.4" name="SYSV00000000" dev="hugetlbfs" ino=7 res=0 23:35:02 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) r2 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) shmat(r2, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffffff) shmat(r2, &(0x7f0000ff9000/0x4000)=nil, 0x5000) [ 1602.712788][T11664] kAFS: No cell specified 23:35:02 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount(&(0x7f00000005c0)=ANY=[@ANYBLOB="23211ff2be2e"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 23:35:02 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_DEL(r0, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="ac00000002090101000004000000000000000009700002002c000100140003006ed80a0ec3677685b4c446deabbe2e8d14000400000000000000400000000000000000000c00020005000100060000000c000200050001003a00000014000100080001007f000001080002007f000001e891871d58a4030c00020005000100880000000c00040008000500f2ff001f0c000200060003000000000008000500000000150800060000000000"], 0xac}, 0x1, 0x0, 0x0, 0x40081}, 0x40000d0) 23:35:02 executing program 2: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) mount(&(0x7f0000000000)=ANY=[@ANYBLOB='%'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000380)=@raw={'raw\x00', 0x3c1, 0x3, 0x2f8, 0x0, 0xd0, 0xd0, 0xd0, 0xd0, 0x228, 0x228, 0x228, 0x228, 0x228, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0xa8, 0xd0}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00', 0x0, {0xffff}}}, {{@uncond, 0x0, 0x138, 0x158, 0x0, {}, [@common=@srh1={{0x90, 'srh\x00'}, {0x0, 0x0, 0x0, 0x0, 0x0, @dev, @loopback, @local}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x358) [ 1602.831996][ T26] audit: type=1800 audit(1579649702.380:72): pid=11670 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed comm="syz-executor.4" name="SYSV00000000" dev="hugetlbfs" ino=8 res=0 23:35:02 executing program 2: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) mount(&(0x7f0000000000)=ANY=[@ANYBLOB='%'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000380)=@raw={'raw\x00', 0x3c1, 0x3, 0x2f8, 0x0, 0xd0, 0xd0, 0xd0, 0xd0, 0x228, 0x228, 0x228, 0x228, 0x228, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0xa8, 0xd0}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00', 0x0, {0xffff}}}, {{@uncond, 0x0, 0x138, 0x158, 0x0, {}, [@common=@srh1={{0x90, 'srh\x00'}, {0x0, 0x0, 0x0, 0x0, 0x0, @dev, @loopback, @local}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x358) [ 1602.878913][T11675] __nla_validate_parse: 42 callbacks suppressed [ 1602.878922][T11675] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1602.901125][T11674] kAFS: No cell specified [ 1602.919336][T11675] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. 23:35:02 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) r2 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) shmat(r2, &(0x7f0000ff9000/0x4000)=nil, 0x5000) 23:35:02 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount(&(0x7f00000005c0)=ANY=[@ANYBLOB="23211ff2be2e09"], 0x0, &(0x7f0000000180)='afs\x00', 0x0, 0x0) 23:35:02 executing program 2: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) mount(&(0x7f0000000000)=ANY=[@ANYBLOB='%'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000380)=@raw={'raw\x00', 0x3c1, 0x3, 0x2f8, 0x0, 0xd0, 0xd0, 0xd0, 0xd0, 0x228, 0x228, 0x228, 0x228, 0x228, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0xa8, 0xd0}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00', 0x0, {0xffff}}}, {{@uncond, 0x0, 0x138, 0x158, 0x0, {}, [@common=@srh1={{0x90, 'srh\x00'}, {0x0, 0x0, 0x0, 0x0, 0x0, @dev, @loopback, @local}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x358) 23:35:02 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_DEL(r0, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="ac00000002090101000005000000000000000009700002002c000100140003006ed80a0ec3677685b4c446deabbe2e8d14000400000000000000400000000000000000000c00020005000100060000000c000200050001003a00000014000100080001007f000001080002007f000001e891871d58a4030c00020005000100880000000c00040008000500f2ff001f0c000200060003000000000008000500000000150800060000000000"], 0xac}, 0x1, 0x0, 0x0, 0x40081}, 0x40000d0) 23:35:02 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) r2 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) shmat(r2, &(0x7f0000ff9000/0x4000)=nil, 0x5000) [ 1603.156757][T11692] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.0'. 23:35:02 executing program 2: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) mount(&(0x7f0000000000)=ANY=[@ANYBLOB='%'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000380)=@raw={'raw\x00', 0x3c1, 0x3, 0x2f8, 0x0, 0xd0, 0xd0, 0xd0, 0xd0, 0x228, 0x228, 0x228, 0x228, 0x228, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0xa8, 0xd0}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00', 0x0, {0xffff}}}, {{@uncond, 0x0, 0x138, 0x158, 0x0, {}, [@common=@srh1={{0x90, 'srh\x00'}, {0x0, 0x0, 0x0, 0x0, 0x0, @dev, @loopback, @local}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x358) 23:35:02 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount(&(0x7f00000005c0)=ANY=[@ANYBLOB="23211ff2be2e09"], 0x0, &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1603.201545][T11692] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. 23:35:02 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_DEL(r0, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="ac00000002090101000006000000000000000009700002002c000100140003006ed80a0ec3677685b4c446deabbe2e8d14000400000000000000400000000000000000000c00020005000100060000000c000200050001003a00000014000100080001007f000001080002007f000001e891871d58a4030c00020005000100880000000c00040008000500f2ff001f0c000200060003000000000008000500000000150800060000000000"], 0xac}, 0x1, 0x0, 0x0, 0x40081}, 0x40000d0) 23:35:02 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) r2 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) shmat(r2, &(0x7f0000ff9000/0x4000)=nil, 0x5000) 23:35:03 executing program 2: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) mount(&(0x7f0000000000)=ANY=[@ANYBLOB='%'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000380)=@raw={'raw\x00', 0x3c1, 0x3, 0x2f8, 0x0, 0xd0, 0xd0, 0xd0, 0xd0, 0x228, 0x228, 0x228, 0x228, 0x228, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0xa8, 0xd0}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00', 0x0, {0xffff}}}, {{@uncond, 0x0, 0x138, 0x158, 0x0, {}, [@common=@srh1={{0x90, 'srh\x00'}, {0x0, 0x0, 0x0, 0x0, 0x0, @dev, @loopback, @local}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x358) 23:35:03 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount(&(0x7f00000005c0)=ANY=[@ANYBLOB="23211ff2be2e09"], 0x0, &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1603.403803][T11710] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1603.420536][T11710] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. 23:35:03 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffffff) shmat(0x0, &(0x7f0000ff9000/0x4000)=nil, 0x5000) 23:35:03 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_DEL(r0, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="ac00000002090101000007000000000000000009700002002c000100140003006ed80a0ec3677685b4c446deabbe2e8d14000400000000000000400000000000000000000c00020005000100060000000c000200050001003a00000014000100080001007f000001080002007f000001e891871d58a4030c00020005000100880000000c00040008000500f2ff001f0c000200060003000000000008000500000000150800060000000000"], 0xac}, 0x1, 0x0, 0x0, 0x40081}, 0x40000d0) 23:35:03 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount(&(0x7f00000005c0)=ANY=[@ANYBLOB="23211ff2be2e09"], &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) 23:35:03 executing program 2: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) mount(&(0x7f0000000000)=ANY=[@ANYBLOB='%'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000380)=@raw={'raw\x00', 0x3c1, 0x3, 0x2f8, 0x0, 0xd0, 0xd0, 0xd0, 0xd0, 0x228, 0x228, 0x228, 0x228, 0x228, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0xa8, 0xd0}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00', 0x0, {0xffff}}}, {{@uncond, 0x0, 0x138, 0x158, 0x0, {}, [@common=@srh1={{0x90, 'srh\x00'}, {0x0, 0x0, 0x0, 0x0, 0x0, @dev, @loopback, @local}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x358) [ 1603.671270][T11722] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.0'. 23:35:03 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffffff) shmat(0x0, &(0x7f0000ff9000/0x4000)=nil, 0x5000) 23:35:03 executing program 2: socketpair$unix(0x1, 0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) mount(&(0x7f0000000000)=ANY=[@ANYBLOB='%'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000380)=@raw={'raw\x00', 0x3c1, 0x3, 0x2f8, 0x0, 0xd0, 0xd0, 0xd0, 0xd0, 0x228, 0x228, 0x228, 0x228, 0x228, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0xa8, 0xd0}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00', 0x0, {0xffff}}}, {{@uncond, 0x0, 0x138, 0x158, 0x0, {}, [@common=@srh1={{0x90, 'srh\x00'}, {0x0, 0x0, 0x0, 0x0, 0x0, @dev, @loopback, @local}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x358) [ 1603.719864][T11722] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. 23:35:03 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_DEL(r0, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="ac00000002090101000008000000000000000009700002002c000100140003006ed80a0ec3677685b4c446deabbe2e8d14000400000000000000400000000000000000000c00020005000100060000000c000200050001003a00000014000100080001007f000001080002007f000001e891871d58a4030c00020005000100880000000c00040008000500f2ff001f0c000200060003000000000008000500000000150800060000000000"], 0xac}, 0x1, 0x0, 0x0, 0x40081}, 0x40000d0) 23:35:03 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount(&(0x7f00000005c0)=ANY=[@ANYBLOB="23211ff2be2e09"], &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) 23:35:03 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffffff) shmat(0x0, &(0x7f0000ff9000/0x4000)=nil, 0x5000) 23:35:03 executing program 2: socketpair$unix(0x1, 0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) mount(&(0x7f0000000000)=ANY=[@ANYBLOB='%'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000380)=@raw={'raw\x00', 0x3c1, 0x3, 0x2f8, 0x0, 0xd0, 0xd0, 0xd0, 0xd0, 0x228, 0x228, 0x228, 0x228, 0x228, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0xa8, 0xd0}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00', 0x0, {0xffff}}}, {{@uncond, 0x0, 0x138, 0x158, 0x0, {}, [@common=@srh1={{0x90, 'srh\x00'}, {0x0, 0x0, 0x0, 0x0, 0x0, @dev, @loopback, @local}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x358) [ 1603.935179][T11739] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1603.970462][T11739] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. 23:35:03 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_DEL(r0, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="ac00000002090101000009000000000000000009700002002c000100140003006ed80a0ec3677685b4c446deabbe2e8d14000400000000000000400000000000000000000c00020005000100060000000c000200050001003a00000014000100080001007f000001080002007f000001e891871d58a4030c00020005000100880000000c00040008000500f2ff001f0c000200060003000000000008000500000000150800060000000000"], 0xac}, 0x1, 0x0, 0x0, 0x40081}, 0x40000d0) 23:35:03 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) shmat(r2, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffffff) shmat(r2, &(0x7f0000ff9000/0x4000)=nil, 0x5000) 23:35:03 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount(&(0x7f00000005c0)=ANY=[@ANYBLOB="23211ff2be2e09"], &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) 23:35:03 executing program 2: socketpair$unix(0x1, 0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) mount(&(0x7f0000000000)=ANY=[@ANYBLOB='%'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000380)=@raw={'raw\x00', 0x3c1, 0x3, 0x2f8, 0x0, 0xd0, 0xd0, 0xd0, 0xd0, 0x228, 0x228, 0x228, 0x228, 0x228, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0xa8, 0xd0}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00', 0x0, {0xffff}}}, {{@uncond, 0x0, 0x138, 0x158, 0x0, {}, [@common=@srh1={{0x90, 'srh\x00'}, {0x0, 0x0, 0x0, 0x0, 0x0, @dev, @loopback, @local}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x358) 23:35:03 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_DEL(r0, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="ac0000000209010100000a000000000000000009700002002c000100140003006ed80a0ec3677685b4c446deabbe2e8d14000400000000000000400000000000000000000c00020005000100060000000c000200050001003a00000014000100080001007f000001080002007f000001e891871d58a4030c00020005000100880000000c00040008000500f2ff001f0c000200060003000000000008000500000000150800060000000000"], 0xac}, 0x1, 0x0, 0x0, 0x40081}, 0x40000d0) [ 1604.203543][ T26] audit: type=1800 audit(1579649703.750:73): pid=11756 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed comm="syz-executor.4" name="SYSV00000000" dev="hugetlbfs" ino=12 res=0 23:35:03 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) dup(r0) r1 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) shmat(r1, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffffff) shmat(r1, &(0x7f0000ff9000/0x4000)=nil, 0x5000) 23:35:03 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) mount(&(0x7f0000000000)=ANY=[@ANYBLOB='%'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000380)=@raw={'raw\x00', 0x3c1, 0x3, 0x2f8, 0x0, 0xd0, 0xd0, 0xd0, 0xd0, 0x228, 0x228, 0x228, 0x228, 0x228, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0xa8, 0xd0}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00', 0x0, {0xffff}}}, {{@uncond, 0x0, 0x138, 0x158, 0x0, {}, [@common=@srh1={{0x90, 'srh\x00'}, {0x0, 0x0, 0x0, 0x0, 0x0, @dev, @loopback, @local}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x358) 23:35:03 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount(&(0x7f00000005c0)=ANY=[@ANYBLOB="23211ff2be2e"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1604.361090][ T26] audit: type=1800 audit(1579649703.910:74): pid=11767 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed comm="syz-executor.4" name="SYSV00000000" dev="hugetlbfs" ino=13 res=0 23:35:04 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_DEL(r0, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="ac0000000209010100000b000000000000000009700002002c000100140003006ed80a0ec3677685b4c446deabbe2e8d14000400000000000000400000000000000000000c00020005000100060000000c000200050001003a00000014000100080001007f000001080002007f000001e891871d58a4030c00020005000100880000000c00040008000500f2ff001f0c000200060003000000000008000500000000150800060000000000"], 0xac}, 0x1, 0x0, 0x0, 0x40081}, 0x40000d0) 23:35:04 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) mount(&(0x7f0000000000)=ANY=[@ANYBLOB='%'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000380)=@raw={'raw\x00', 0x3c1, 0x3, 0x2f8, 0x0, 0xd0, 0xd0, 0xd0, 0xd0, 0x228, 0x228, 0x228, 0x228, 0x228, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0xa8, 0xd0}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00', 0x0, {0xffff}}}, {{@uncond, 0x0, 0x138, 0x158, 0x0, {}, [@common=@srh1={{0x90, 'srh\x00'}, {0x0, 0x0, 0x0, 0x0, 0x0, @dev, @loopback, @local}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x358) 23:35:04 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) dup(r0) r1 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) shmat(r1, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffffff) shmat(r1, &(0x7f0000ff9000/0x4000)=nil, 0x5000) [ 1604.462512][T11774] kAFS: No cell specified [ 1604.533483][ T26] audit: type=1800 audit(1579649704.080:75): pid=11782 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed comm="syz-executor.4" name="SYSV00000000" dev="hugetlbfs" ino=14 res=0 [ 1604.537762][T11783] validate_nla: 86 callbacks suppressed [ 1604.537770][T11783] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 23:35:04 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount(&(0x7f00000005c0)=ANY=[@ANYBLOB="23211ff2be2e"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 23:35:04 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) dup(r0) r1 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) shmat(r1, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffffff) shmat(r1, &(0x7f0000ff9000/0x4000)=nil, 0x5000) [ 1604.657437][T11784] tcpmss_tg6_check: 15 callbacks suppressed [ 1604.657445][T11784] xt_TCPMSS: path-MTU clamping only supported in FORWARD, OUTPUT and POSTROUTING hooks [ 1604.680478][T11783] netlink: 'syz-executor.0': attribute type 2 has an invalid length. [ 1604.689257][T11783] netlink: 'syz-executor.0': attribute type 2 has an invalid length. 23:35:04 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) shmat(r0, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffffff) shmat(r0, &(0x7f0000ff9000/0x4000)=nil, 0x5000) [ 1604.707229][T11787] kAFS: No cell specified [ 1604.724863][ T26] audit: type=1800 audit(1579649704.270:76): pid=11792 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed comm="syz-executor.4" name="SYSV00000000" dev="hugetlbfs" ino=15 res=0 23:35:04 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) mount(&(0x7f0000000000)=ANY=[@ANYBLOB='%'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000380)=@raw={'raw\x00', 0x3c1, 0x3, 0x2f8, 0x0, 0xd0, 0xd0, 0xd0, 0xd0, 0x228, 0x228, 0x228, 0x228, 0x228, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0xa8, 0xd0}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00', 0x0, {0xffff}}}, {{@uncond, 0x0, 0x138, 0x158, 0x0, {}, [@common=@srh1={{0x90, 'srh\x00'}, {0x0, 0x0, 0x0, 0x0, 0x0, @dev, @loopback, @local}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x358) [ 1604.800425][T11783] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 23:35:04 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount(&(0x7f00000005c0)=ANY=[@ANYBLOB="23211ff2be2e"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 23:35:04 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) shmat(r0, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffffff) shmat(r0, &(0x7f0000ff9000/0x4000)=nil, 0x5000) 23:35:04 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_DEL(r0, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="ac0000000209010100000c000000000000000009700002002c000100140003006ed80a0ec3677685b4c446deabbe2e8d14000400000000000000400000000000000000000c00020005000100060000000c000200050001003a00000014000100080001007f000001080002007f000001e891871d58a4030c00020005000100880000000c00040008000500f2ff001f0c000200060003000000000008000500000000150800060000000000"], 0xac}, 0x1, 0x0, 0x0, 0x40081}, 0x40000d0) [ 1604.893654][T11799] xt_TCPMSS: path-MTU clamping only supported in FORWARD, OUTPUT and POSTROUTING hooks 23:35:04 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000380)=@raw={'raw\x00', 0x3c1, 0x3, 0x2f8, 0x0, 0xd0, 0xd0, 0xd0, 0xd0, 0x228, 0x228, 0x228, 0x228, 0x228, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0xa8, 0xd0}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00', 0x0, {0xffff}}}, {{@uncond, 0x0, 0x138, 0x158, 0x0, {}, [@common=@srh1={{0x90, 'srh\x00'}, {0x0, 0x0, 0x0, 0x0, 0x0, @dev, @loopback, @local}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x358) [ 1605.001073][T11806] kAFS: No cell specified 23:35:04 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) shmat(r0, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffffff) shmat(r0, &(0x7f0000ff9000/0x4000)=nil, 0x5000) [ 1605.022146][T11809] xt_TCPMSS: path-MTU clamping only supported in FORWARD, OUTPUT and POSTROUTING hooks [ 1605.045868][T11811] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 23:35:04 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) dup(r0) mount(&(0x7f00000005c0)=ANY=[@ANYBLOB="23211ff2be2e"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 23:35:04 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000380)=@raw={'raw\x00', 0x3c1, 0x3, 0x2f8, 0x0, 0xd0, 0xd0, 0xd0, 0xd0, 0x228, 0x228, 0x228, 0x228, 0x228, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0xa8, 0xd0}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00', 0x0, {0xffff}}}, {{@uncond, 0x0, 0x138, 0x158, 0x0, {}, [@common=@srh1={{0x90, 'srh\x00'}, {0x0, 0x0, 0x0, 0x0, 0x0, @dev, @loopback, @local}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x358) [ 1605.106913][T11811] netlink: 'syz-executor.0': attribute type 2 has an invalid length. [ 1605.149343][T11811] netlink: 'syz-executor.0': attribute type 2 has an invalid length. [ 1605.185603][T11811] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 23:35:04 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_DEL(r0, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="ac0000000209010100000d000000000000000009700002002c000100140003006ed80a0ec3677685b4c446deabbe2e8d14000400000000000000400000000000000000000c00020005000100060000000c000200050001003a00000014000100080001007f000001080002007f000001e891871d58a4030c00020005000100880000000c00040008000500f2ff001f0c000200060003000000000008000500000000150800060000000000"], 0xac}, 0x1, 0x0, 0x0, 0x40081}, 0x40000d0) 23:35:04 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) mount(0x0, 0x0, &(0x7f0000000180)='afs\x00', 0x0, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000380)=@raw={'raw\x00', 0x3c1, 0x3, 0x2f8, 0x0, 0xd0, 0xd0, 0xd0, 0xd0, 0x228, 0x228, 0x228, 0x228, 0x228, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0xa8, 0xd0}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00', 0x0, {0xffff}}}, {{@uncond, 0x0, 0x138, 0x158, 0x0, {}, [@common=@srh1={{0x90, 'srh\x00'}, {0x0, 0x0, 0x0, 0x0, 0x0, @dev, @loopback, @local}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x358) [ 1605.212484][T11819] xt_TCPMSS: path-MTU clamping only supported in FORWARD, OUTPUT and POSTROUTING hooks [ 1605.250865][T11822] kAFS: No cell specified 23:35:04 executing program 4: r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) shmat(r1, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffffff) shmat(r1, &(0x7f0000ff9000/0x4000)=nil, 0x5000) [ 1605.310095][T11825] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 1605.333791][T11827] xt_TCPMSS: path-MTU clamping only supported in FORWARD, OUTPUT and POSTROUTING hooks 23:35:04 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) dup(r0) mount(&(0x7f00000005c0)=ANY=[@ANYBLOB="23211ff2be2e"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1605.355158][T11825] netlink: 'syz-executor.0': attribute type 2 has an invalid length. 23:35:04 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000380)=@raw={'raw\x00', 0x3c1, 0x3, 0x2f8, 0x0, 0xd0, 0xd0, 0xd0, 0xd0, 0x228, 0x228, 0x228, 0x228, 0x228, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0xa8, 0xd0}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00', 0x0, {0xffff}}}, {{@uncond, 0x0, 0x138, 0x158, 0x0, {}, [@common=@srh1={{0x90, 'srh\x00'}, {0x0, 0x0, 0x0, 0x0, 0x0, @dev, @loopback, @local}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x358) 23:35:05 executing program 4: r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) shmat(r1, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffffff) shmat(r1, &(0x7f0000ff9000/0x4000)=nil, 0x5000) [ 1605.452531][T11834] xt_TCPMSS: path-MTU clamping only supported in FORWARD, OUTPUT and POSTROUTING hooks 23:35:05 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_DEL(r0, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="ac0000000209010100000e000000000000000009700002002c000100140003006ed80a0ec3677685b4c446deabbe2e8d14000400000000000000400000000000000000000c00020005000100060000000c000200050001003a00000014000100080001007f000001080002007f000001e891871d58a4030c00020005000100880000000c00040008000500f2ff001f0c000200060003000000000008000500000000150800060000000000"], 0xac}, 0x1, 0x0, 0x0, 0x40081}, 0x40000d0) 23:35:05 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000380)=@raw={'raw\x00', 0x3c1, 0x3, 0x2f8, 0x0, 0xd0, 0xd0, 0xd0, 0xd0, 0x228, 0x228, 0x228, 0x228, 0x228, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0xa8, 0xd0}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00', 0x0, {0xffff}}}, {{@uncond, 0x0, 0x138, 0x158, 0x0, {}, [@common=@srh1={{0x90, 'srh\x00'}, {0x0, 0x0, 0x0, 0x0, 0x0, @dev, @loopback, @local}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x358) 23:35:05 executing program 4: r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) shmat(r1, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffffff) shmat(r1, &(0x7f0000ff9000/0x4000)=nil, 0x5000) [ 1605.559867][T11841] kAFS: No cell specified [ 1605.643876][T11847] xt_TCPMSS: path-MTU clamping only supported in FORWARD, OUTPUT and POSTROUTING hooks 23:35:05 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) dup(r0) mount(&(0x7f00000005c0)=ANY=[@ANYBLOB="23211ff2be2e"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 23:35:05 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000380)=@raw={'raw\x00', 0x3c1, 0x3, 0x2f8, 0x0, 0xd0, 0xd0, 0xd0, 0xd0, 0x228, 0x228, 0x228, 0x228, 0x228, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0xa8, 0xd0}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00', 0x0, {0xffff}}}, {{@uncond, 0x0, 0x138, 0x158, 0x0, {}, [@common=@srh1={{0x90, 'srh\x00'}, {0x0, 0x0, 0x0, 0x0, 0x0, @dev, @loopback, @local}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x358) 23:35:05 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_DEL(r0, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="ac0000000209010100000f000000000000000009700002002c000100140003006ed80a0ec3677685b4c446deabbe2e8d14000400000000000000400000000000000000000c00020005000100060000000c000200050001003a00000014000100080001007f000001080002007f000001e891871d58a4030c00020005000100880000000c00040008000500f2ff001f0c000200060003000000000008000500000000150800060000000000"], 0xac}, 0x1, 0x0, 0x0, 0x40081}, 0x40000d0) 23:35:05 executing program 4: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) shmat(r2, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffffff) shmat(r2, &(0x7f0000ff9000/0x4000)=nil, 0x5000) [ 1605.795750][T11854] kAFS: No cell specified 23:35:05 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_DEL(r0, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="ac00000002090101000010000000000000000009700002002c000100140003006ed80a0ec3677685b4c446deabbe2e8d14000400000000000000400000000000000000000c00020005000100060000000c000200050001003a00000014000100080001007f000001080002007f000001e891871d58a4030c00020005000100880000000c00040008000500f2ff001f0c000200060003000000000008000500000000150800060000000000"], 0xac}, 0x1, 0x0, 0x0, 0x40081}, 0x40000d0) 23:35:05 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) mount(&(0x7f00000005c0)=ANY=[@ANYBLOB="23211ff2be2e"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1605.869388][T11859] xt_TCPMSS: path-MTU clamping only supported in FORWARD, OUTPUT and POSTROUTING hooks 23:35:05 executing program 4: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) shmat(r2, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffffff) shmat(r2, &(0x7f0000ff9000/0x4000)=nil, 0x5000) 23:35:05 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000380)=@raw={'raw\x00', 0x3c1, 0x3, 0x2f8, 0x0, 0xd0, 0xd0, 0xd0, 0xd0, 0x228, 0x228, 0x228, 0x228, 0x228, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0xa8, 0xd0}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00', 0x0, {0xffff}}}, {{@uncond, 0x0, 0x138, 0x158, 0x0, {}, [@common=@srh1={{0x90, 'srh\x00'}, {0x0, 0x0, 0x0, 0x0, 0x0, @dev, @loopback, @local}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x358) 23:35:05 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_DEL(r0, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="ac00000002090101000011000000000000000009700002002c000100140003006ed80a0ec3677685b4c446deabbe2e8d14000400000000000000400000000000000000000c00020005000100060000000c000200050001003a00000014000100080001007f000001080002007f000001e891871d58a4030c00020005000100880000000c00040008000500f2ff001f0c000200060003000000000008000500000000150800060000000000"], 0xac}, 0x1, 0x0, 0x0, 0x40081}, 0x40000d0) [ 1605.993599][T11867] kAFS: No cell specified 23:35:05 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) mount(&(0x7f00000005c0)=ANY=[@ANYBLOB="23211ff2be2e"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 23:35:05 executing program 4: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) shmat(r2, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffffff) shmat(r2, &(0x7f0000ff9000/0x4000)=nil, 0x5000) [ 1606.154061][T11873] xt_TCPMSS: path-MTU clamping only supported in FORWARD, OUTPUT and POSTROUTING hooks [ 1606.184229][T11879] kAFS: No cell specified 23:35:05 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_DEL(r0, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="ac00000002090101000012000000000000000009700002002c000100140003006ed80a0ec3677685b4c446deabbe2e8d14000400000000000000400000000000000000000c00020005000100060000000c000200050001003a00000014000100080001007f000001080002007f000001e891871d58a4030c00020005000100880000000c00040008000500f2ff001f0c000200060003000000000008000500000000150800060000000000"], 0xac}, 0x1, 0x0, 0x0, 0x40081}, 0x40000d0) 23:35:05 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) mount(&(0x7f00000005c0)=ANY=[@ANYBLOB="23211ff2be2e"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 23:35:05 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000380)=@raw={'raw\x00', 0x3c1, 0x3, 0x2f8, 0x0, 0xd0, 0xd0, 0xd0, 0xd0, 0x228, 0x228, 0x228, 0x228, 0x228, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0xa8, 0xd0}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00', 0x0, {0xffff}}}, {{@uncond, 0x0, 0x138, 0x158, 0x0, {}, [@common=@srh1={{0x90, 'srh\x00'}, {0x0, 0x0, 0x0, 0x0, 0x0, @dev, @loopback, @local}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x358) 23:35:05 executing program 4: socketpair$unix(0x1, 0x5, 0x0, 0x0) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) shmat(r1, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffffff) shmat(r1, &(0x7f0000ff9000/0x4000)=nil, 0x5000) 23:35:06 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_DEL(r0, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="ac00000002090101000013000000000000000009700002002c000100140003006ed80a0ec3677685b4c446deabbe2e8d14000400000000000000400000000000000000000c00020005000100060000000c000200050001003a00000014000100080001007f000001080002007f000001e891871d58a4030c00020005000100880000000c00040008000500f2ff001f0c000200060003000000000008000500000000150800060000000000"], 0xac}, 0x1, 0x0, 0x0, 0x40081}, 0x40000d0) [ 1606.426499][T11893] kAFS: No cell specified [ 1606.441989][T11892] xt_TCPMSS: path-MTU clamping only supported in FORWARD, OUTPUT and POSTROUTING hooks 23:35:06 executing program 4: socketpair$unix(0x1, 0x5, 0x0, 0x0) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) shmat(r1, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffffff) shmat(r1, &(0x7f0000ff9000/0x4000)=nil, 0x5000) 23:35:06 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mount(&(0x7f00000005c0)=ANY=[@ANYBLOB="23211ff2be2e"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 23:35:06 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000380)=@raw={'raw\x00', 0x3c1, 0x3, 0x2f8, 0x0, 0xd0, 0xd0, 0xd0, 0xd0, 0x228, 0x228, 0x228, 0x228, 0x228, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0xa8, 0xd0}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00', 0x0, {0xffff}}}, {{@uncond, 0x0, 0x138, 0x158, 0x0, {}, [@common=@srh1={{0x90, 'srh\x00'}, {0x0, 0x0, 0x0, 0x0, 0x0, @dev, @loopback, @local}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x358) 23:35:06 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_DEL(r0, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="ac00000002090101000014000000000000000009700002002c000100140003006ed80a0ec3677685b4c446deabbe2e8d14000400000000000000400000000000000000000c00020005000100060000000c000200050001003a00000014000100080001007f000001080002007f000001e891871d58a4030c00020005000100880000000c00040008000500f2ff001f0c000200060003000000000008000500000000150800060000000000"], 0xac}, 0x1, 0x0, 0x0, 0x40081}, 0x40000d0) 23:35:06 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000380)=@raw={'raw\x00', 0x3c1, 0x3, 0x2f8, 0x0, 0xd0, 0xd0, 0xd0, 0xd0, 0x228, 0x228, 0x228, 0x228, 0x228, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0xa8, 0xd0}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00', 0x0, {0xffff}}}, {{@uncond, 0x0, 0x138, 0x158, 0x0, {}, [@common=@srh1={{0x90, 'srh\x00'}, {0x0, 0x0, 0x0, 0x0, 0x0, @dev, @loopback, @local}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x358) [ 1606.665761][T11907] kAFS: No cell specified 23:35:06 executing program 4: socketpair$unix(0x1, 0x5, 0x0, 0x0) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) shmat(r1, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffffff) shmat(r1, &(0x7f0000ff9000/0x4000)=nil, 0x5000) 23:35:06 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mount(&(0x7f00000005c0)=ANY=[@ANYBLOB="23211ff2be2e"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 23:35:06 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_DEL(r0, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="ac00000002090101000025000000000000000009700002002c000100140003006ed80a0ec3677685b4c446deabbe2e8d14000400000000000000400000000000000000000c00020005000100060000000c000200050001003a00000014000100080001007f000001080002007f000001e891871d58a4030c00020005000100880000000c00040008000500f2ff001f0c000200060003000000000008000500000000150800060000000000"], 0xac}, 0x1, 0x0, 0x0, 0x40081}, 0x40000d0) [ 1606.805405][ T26] kauditd_printk_skb: 11 callbacks suppressed [ 1606.805415][ T26] audit: type=1800 audit(1579649706.350:88): pid=11916 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed comm="syz-executor.4" name="SYSV00000000" dev="hugetlbfs" ino=27 res=0 23:35:06 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000380)=@raw={'raw\x00', 0x3c1, 0x3, 0x2f8, 0x0, 0xd0, 0xd0, 0xd0, 0xd0, 0x228, 0x228, 0x228, 0x228, 0x228, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0xa8, 0xd0}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00', 0x0, {0xffff}}}, {{@uncond, 0x0, 0x138, 0x158, 0x0, {}, [@common=@srh1={{0x90, 'srh\x00'}, {0x0, 0x0, 0x0, 0x0, 0x0, @dev, @loopback, @local}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x358) 23:35:06 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) shmat(r1, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffffff) shmat(r1, &(0x7f0000ff9000/0x4000)=nil, 0x5000) 23:35:06 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, 0x0, 0x0) [ 1606.951621][T11922] kAFS: No cell specified [ 1606.999153][ T26] audit: type=1800 audit(1579649706.540:89): pid=11927 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed comm="syz-executor.4" name="SYSV00000000" dev="hugetlbfs" ino=28 res=0 23:35:06 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) shmat(r1, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffffff) shmat(r1, &(0x7f0000ff9000/0x4000)=nil, 0x5000) 23:35:06 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mount(&(0x7f00000005c0)=ANY=[@ANYBLOB="23211ff2be2e"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 23:35:06 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_DEL(r0, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="ac00000002090101000048000000000000000009700002002c000100140003006ed80a0ec3677685b4c446deabbe2e8d14000400000000000000400000000000000000000c00020005000100060000000c000200050001003a00000014000100080001007f000001080002007f000001e891871d58a4030c00020005000100880000000c00040008000500f2ff001f0c000200060003000000000008000500000000150800060000000000"], 0xac}, 0x1, 0x0, 0x0, 0x40081}, 0x40000d0) 23:35:06 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, 0x0, 0x0) [ 1607.122655][ T26] audit: type=1800 audit(1579649706.670:90): pid=11933 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed comm="syz-executor.4" name="SYSV00000000" dev="hugetlbfs" ino=29 res=0 23:35:06 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) shmat(r1, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffffff) shmat(r1, &(0x7f0000ff9000/0x4000)=nil, 0x5000) 23:35:06 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_DEL(r0, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="ac0000000209010100004c000000000000000009700002002c000100140003006ed80a0ec3677685b4c446deabbe2e8d14000400000000000000400000000000000000000c00020005000100060000000c000200050001003a00000014000100080001007f000001080002007f000001e891871d58a4030c00020005000100880000000c00040008000500f2ff001f0c000200060003000000000008000500000000150800060000000000"], 0xac}, 0x1, 0x0, 0x0, 0x40081}, 0x40000d0) 23:35:06 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount(&(0x7f00000005c0)=ANY=[@ANYBLOB="23211ff2be2e"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1607.284291][ T26] audit: type=1800 audit(1579649706.830:91): pid=11943 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed comm="syz-executor.4" name="SYSV00000000" dev="hugetlbfs" ino=30 res=0 23:35:06 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) shmat(r1, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffffff) shmat(r1, &(0x7f0000ff9000/0x4000)=nil, 0x5000) [ 1607.486375][ T26] audit: type=1800 audit(1579649707.030:92): pid=11955 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed comm="syz-executor.4" name="SYSV00000000" dev="hugetlbfs" ino=31 res=0 23:35:07 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount(&(0x7f00000005c0)=ANY=[@ANYBLOB="23211ff2be2e"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 23:35:07 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_DEL(r0, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="ac00000002090101000060000000000000000009700002002c000100140003006ed80a0ec3677685b4c446deabbe2e8d14000400000000000000400000000000000000000c00020005000100060000000c000200050001003a00000014000100080001007f000001080002007f000001e891871d58a4030c00020005000100880000000c00040008000500f2ff001f0c000200060003000000000008000500000000150800060000000000"], 0xac}, 0x1, 0x0, 0x0, 0x40081}, 0x40000d0) 23:35:07 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, 0x0, 0x0) 23:35:07 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) shmat(r1, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffffff) shmat(r1, &(0x7f0000ff9000/0x4000)=nil, 0x5000) [ 1607.783078][ T26] audit: type=1800 audit(1579649707.330:93): pid=11965 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed comm="syz-executor.4" name="SYSV00000000" dev="hugetlbfs" ino=32 res=0 23:35:07 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount(&(0x7f00000005c0)=ANY=[@ANYBLOB="23211ff2be2e"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 23:35:07 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000380)=@raw={'raw\x00', 0x3c1, 0x3, 0x268, 0x0, 0xd0, 0xd0, 0xd0, 0xd0, 0x228, 0x228, 0x228, 0x228, 0x228, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0xa8, 0xd0}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00', 0x0, {0xffff}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x2c8) 23:35:07 executing program 1: r0 = socket$inet(0x2, 0x2, 0x89) sendto$inet(r0, 0x0, 0x30, 0x0, &(0x7f0000319ff0)={0x2, 0x4e20}, 0x10) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000)='/dev/bsg\x00', 0xc9ddee3bc253e6cc, 0x0) ioctl$SCSI_IOCTL_DOORUNLOCK(r1, 0x5381) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sync_ports\x00', 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) ioctl$KVM_TRANSLATE(r3, 0xc018ae85, &(0x7f0000000200)={0x0, 0x100000, 0x25, 0x1, 0x40}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000080)='ip_vti0\x00', 0x10) r6 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000040)='NLBL_MGMT\x00') sendmsg$NLBL_MGMT_C_ADDDEF(r5, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000}, 0xfffffffffffffead, &(0x7f00000000c0)={&(0x7f0000000080)={0x38, r6, 0x10, 0x70bd25, 0x25dfdbff, {}, [@NLBL_MGMT_A_FAMILY={0x6, 0xb, 0x26}, @NLBL_MGMT_A_IPV6ADDR={0x14, 0x5, @local}, @NLBL_MGMT_A_FAMILY={0x0, 0xb, 0x29}]}, 0x38}, 0x1, 0x0, 0x0, 0x40}, 0x20000000) sendmsg$NLBL_MGMT_C_PROTOCOLS(r4, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x6c, r6, 0x10, 0x70bd2a, 0x25dfdbfc, {}, [@NLBL_MGMT_A_PROTOCOL={0x8, 0x2, 0x3}, @NLBL_MGMT_A_IPV6ADDR={0x14, 0x5, @initdev={0xfe, 0x88, [], 0x1, 0x0}}, @NLBL_MGMT_A_IPV6ADDR={0x14, 0x5, @mcast1}, @NLBL_MGMT_A_DOMAIN={0x5, 0x1, '\x00'}, @NLBL_MGMT_A_CV4DOI={0x8, 0x4, 0x1}, @NLBL_MGMT_A_PROTOCOL={0x8, 0x2, 0x3}, @NLBL_MGMT_A_IPV4MASK={0x8, 0x8, @multicast2}, @NLBL_MGMT_A_IPV4ADDR={0x8, 0x7, @broadcast}]}, 0x6c}, 0x1, 0x0, 0x0, 0x48804}, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r2, 0x40345410, &(0x7f0000000080)={{0x0, 0x2, 0x6, 0x0, 0x7}}) ioctl$KDGETLED(0xffffffffffffffff, 0x4b31, &(0x7f0000000240)) 23:35:07 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) shmat(r1, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffffff) shmat(r1, &(0x7f0000ff9000/0x4000)=nil, 0x5000) 23:35:07 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_DEL(r0, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="ac00000002090101000068000000000000000009700002002c000100140003006ed80a0ec3677685b4c446deabbe2e8d14000400000000000000400000000000000000000c00020005000100060000000c000200050001003a00000014000100080001007f000001080002007f000001e891871d58a4030c00020005000100880000000c00040008000500f2ff001f0c000200060003000000000008000500000000150800060000000000"], 0xac}, 0x1, 0x0, 0x0, 0x40081}, 0x40000d0) [ 1607.966603][T11979] __nla_validate_parse: 32 callbacks suppressed [ 1607.966613][T11979] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1607.985007][ T26] audit: type=1800 audit(1579649707.530:94): pid=11976 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed comm="syz-executor.4" name="SYSV00000000" dev="hugetlbfs" ino=33 res=0 23:35:07 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000380)=@raw={'raw\x00', 0x3c1, 0x3, 0x268, 0x0, 0xd0, 0xd0, 0xd0, 0xd0, 0x228, 0x228, 0x228, 0x228, 0x228, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0xa8, 0xd0}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00', 0x0, {0xffff}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x2c8) 23:35:07 executing program 5: mkdir(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount(&(0x7f00000005c0)=ANY=[@ANYBLOB="23211ff2be2e"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 23:35:07 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) r2 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) shmat(r2, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffffff) shmat(r2, &(0x7f0000ff9000/0x4000)=nil, 0x5000) [ 1608.107519][T11979] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. 23:35:07 executing program 5: mkdir(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount(&(0x7f00000005c0)=ANY=[@ANYBLOB="23211ff2be2e"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 23:35:07 executing program 1: r0 = socket$inet(0x2, 0x2, 0x78) sendto$inet(r0, 0x0, 0x0, 0x850, &(0x7f0000319ff0)={0x2, 0x4e20}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r1) ioctl$RTC_EPOCH_SET(r3, 0x4008700e, 0x8000) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$SNDCTL_DSP_GETOSPACE(r3, 0x8010500c, &(0x7f0000000000)) r4 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') ioctl$VHOST_VSOCK_SET_RUNNING(r4, 0x4004af61, &(0x7f00000000c0)) ioctl$UI_SET_MSCBIT(0xffffffffffffffff, 0x40045568, 0x20) getsockopt$inet_opts(r2, 0x0, 0x9, &(0x7f00000001c0)=""/249, &(0x7f0000000080)=0xf9) 23:35:07 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000380)=@raw={'raw\x00', 0x3c1, 0x3, 0x268, 0x0, 0xd0, 0xd0, 0xd0, 0xd0, 0x228, 0x228, 0x228, 0x228, 0x228, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0xa8, 0xd0}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00', 0x0, {0xffff}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x2c8) 23:35:07 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_DEL(r0, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="ac0000000209010100006c000000000000000009700002002c000100140003006ed80a0ec3677685b4c446deabbe2e8d14000400000000000000400000000000000000000c00020005000100060000000c000200050001003a00000014000100080001007f000001080002007f000001e891871d58a4030c00020005000100880000000c00040008000500f2ff001f0c000200060003000000000008000500000000150800060000000000"], 0xac}, 0x1, 0x0, 0x0, 0x40081}, 0x40000d0) [ 1608.253481][ T26] audit: type=1800 audit(1579649707.800:95): pid=12093 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed comm="syz-executor.4" name="SYSV00000000" dev="hugetlbfs" ino=34 res=0 23:35:07 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) r2 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) shmat(r2, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffffff) shmat(r2, &(0x7f0000ff9000/0x4000)=nil, 0x5000) [ 1608.399346][T12102] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.0'. 23:35:08 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000380)=@raw={'raw\x00', 0x3c1, 0x3, 0x2f8, 0x0, 0xd0, 0xd0, 0xd0, 0xd0, 0x228, 0x228, 0x228, 0x228, 0x228, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0xa8, 0xd0}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00'}}, {{@uncond, 0x0, 0x138, 0x158, 0x0, {}, [@common=@srh1={{0x90, 'srh\x00'}, {0x0, 0x0, 0x0, 0x0, 0x0, @dev, @loopback, @local}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x358) 23:35:08 executing program 5: mkdir(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount(&(0x7f00000005c0)=ANY=[@ANYBLOB="23211ff2be2e"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1608.449668][T12102] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1608.527715][ T26] audit: type=1800 audit(1579649708.070:96): pid=12202 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed comm="syz-executor.4" name="SYSV00000000" dev="hugetlbfs" ino=35 res=0 23:35:08 executing program 1: r0 = socket$inet(0x2, 0x2, 0x2200000088) sendto$inet(r0, 0x0, 0x30, 0x0, &(0x7f0000319ff0)={0x2, 0x4e20}, 0x10) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) 23:35:08 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_DEL(r0, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="ac00000002090101000074000000000000000009700002002c000100140003006ed80a0ec3677685b4c446deabbe2e8d14000400000000000000400000000000000000000c00020005000100060000000c000200050001003a00000014000100080001007f000001080002007f000001e891871d58a4030c00020005000100880000000c00040008000500f2ff001f0c000200060003000000000008000500000000150800060000000000"], 0xac}, 0x1, 0x0, 0x0, 0x40081}, 0x40000d0) 23:35:08 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) r2 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) shmat(r2, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffffff) shmat(r2, &(0x7f0000ff9000/0x4000)=nil, 0x5000) 23:35:08 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount(&(0x7f00000005c0)=ANY=[@ANYBLOB="23211ff2be2e"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1608.640629][T12215] xt_TCPMSS: Only works on TCP SYN packets 23:35:08 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000380)=@raw={'raw\x00', 0x3c1, 0x3, 0x2f8, 0x0, 0xd0, 0xd0, 0xd0, 0xd0, 0x228, 0x228, 0x228, 0x228, 0x228, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0xa8, 0xd0}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00'}}, {{@uncond, 0x0, 0x138, 0x158, 0x0, {}, [@common=@srh1={{0x90, 'srh\x00'}, {0x0, 0x0, 0x0, 0x0, 0x0, @dev, @loopback, @local}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x358) [ 1608.690029][T12220] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1608.710450][T12220] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1608.761262][ T26] audit: type=1800 audit(1579649708.310:97): pid=12238 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed comm="syz-executor.4" name="SYSV00000000" dev="hugetlbfs" ino=36 res=0 [ 1608.797619][T12262] kAFS: No cell specified 23:35:08 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = shmget$private(0x0, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) shmat(r2, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffffff) shmat(r2, &(0x7f0000ff9000/0x4000)=nil, 0x5000) 23:35:08 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_DEL(r0, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="ac0000000209010100007a000000000000000009700002002c000100140003006ed80a0ec3677685b4c446deabbe2e8d14000400000000000000400000000000000000000c00020005000100060000000c000200050001003a00000014000100080001007f000001080002007f000001e891871d58a4030c00020005000100880000000c00040008000500f2ff001f0c000200060003000000000008000500000000150800060000000000"], 0xac}, 0x1, 0x0, 0x0, 0x40081}, 0x40000d0) [ 1608.855389][T12329] xt_TCPMSS: Only works on TCP SYN packets 23:35:08 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000380)=@raw={'raw\x00', 0x3c1, 0x3, 0x2f8, 0x0, 0xd0, 0xd0, 0xd0, 0xd0, 0x228, 0x228, 0x228, 0x228, 0x228, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0xa8, 0xd0}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00'}}, {{@uncond, 0x0, 0x138, 0x158, 0x0, {}, [@common=@srh1={{0x90, 'srh\x00'}, {0x0, 0x0, 0x0, 0x0, 0x0, @dev, @loopback, @local}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x358) 23:35:08 executing program 1: r0 = socket$inet(0x2, 0x2, 0x2200000088) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000319ff0)={0x2, 0x4e20, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x10) 23:35:08 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount(&(0x7f00000005c0)=ANY=[@ANYBLOB="23211ff2be2e"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 23:35:08 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = shmget$private(0x0, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) shmat(r2, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffffff) shmat(r2, &(0x7f0000ff9000/0x4000)=nil, 0x5000) [ 1609.006431][T12340] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1609.013440][T12341] xt_TCPMSS: Only works on TCP SYN packets 23:35:08 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000000)=ANY=[@ANYBLOB='%'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) socket$inet6(0xa, 0x6, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000380)=@raw={'raw\x00', 0x3c1, 0x3, 0x2f8, 0x0, 0xd0, 0xd0, 0xd0, 0xd0, 0x228, 0x228, 0x228, 0x228, 0x228, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0xa8, 0xd0}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00', 0x0, {0xffff}}}, {{@uncond, 0x0, 0x138, 0x158, 0x0, {}, [@common=@srh1={{0x90, 'srh\x00'}, {0x0, 0x0, 0x0, 0x0, 0x0, @dev, @loopback, @local}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x358) [ 1609.058687][T12340] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1609.088453][T12344] kAFS: No cell specified 23:35:08 executing program 1: sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x400c048, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x33}}, 0x10) 23:35:08 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount(&(0x7f00000005c0)=ANY=[@ANYBLOB="23211ff2be2e"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 23:35:08 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_DEL(r0, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="ac00000002090101000000030000000000000009700002002c000100140003006ed80a0ec3677685b4c446deabbe2e8d14000400000000000000400000000000000000000c00020005000100060000000c000200050001003a00000014000100080001007f000001080002007f000001e891871d58a4030c00020005000100880000000c00040008000500f2ff001f0c000200060003000000000008000500000000150800060000000000"], 0xac}, 0x1, 0x0, 0x0, 0x40081}, 0x40000d0) [ 1609.256465][T12351] kAFS: unparsable volume name 23:35:08 executing program 2: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba435012283a089fc983e7797f790cc60ad10d95f2a8747c39e41860ddbb79b93206e6f48a9ea06150a16bf95ae2d84306db26a6bb1bd468b60742d67da92db43ff8c974cf390b52dcd196768dec9d1c446868948f6dff93998d866da8831456f1b44f5e3620fa5858fc705beaa9a64a41d9d6855f7f3dce7a4e8121eea8778045"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 23:35:08 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = shmget$private(0x0, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) shmat(r2, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffffff) shmat(r2, &(0x7f0000ff9000/0x4000)=nil, 0x5000) 23:35:08 executing program 1: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000080)=ANY=[@ANYBLOB], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1609.334448][T12357] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1609.359551][T12359] kAFS: No cell specified [ 1609.399061][T12357] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. 23:35:09 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mount(&(0x7f00000005c0)=ANY=[@ANYBLOB="23211ff2be2e"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 23:35:09 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffffff) shmat(r2, &(0x7f0000ff9000/0x4000)=nil, 0x5000) 23:35:09 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_DEL(r0, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="ac00000002090101000000050000000000000009700002002c000100140003006ed80a0ec3677685b4c446deabbe2e8d14000400000000000000400000000000000000000c00020005000100060000000c000200050001003a00000014000100080001007f000001080002007f000001e891871d58a4030c00020005000100880000000c00040008000500f2ff001f0c000200060003000000000008000500000000150800060000000000"], 0xac}, 0x1, 0x0, 0x0, 0x40081}, 0x40000d0) 23:35:09 executing program 2: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba435012283a089fc983e7797f790cc60ad10d95f2a8747c39e41860ddbb79b93206e6f48a9ea06150a16bf95ae2d84306db26a6bb1bd468b60742d67da92db43ff8c974cf390b52dcd196768dec9d1c446868948f6dff93998d866da8831456f1b44f5e3620fa5858fc705beaa9a64a41d9d6855f7f3dce7a4e8121eea8778045"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1609.570953][T12425] kAFS: No cell specified [ 1609.623034][T12444] validate_nla: 66 callbacks suppressed [ 1609.623045][T12444] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 23:35:09 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mount(&(0x7f00000005c0)=ANY=[@ANYBLOB="23211ff2be2e"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1609.694192][T12444] netlink: 'syz-executor.0': attribute type 2 has an invalid length. 23:35:09 executing program 1: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000080)=ANY=[@ANYBLOB], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 23:35:09 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffffff) shmat(r2, &(0x7f0000ff9000/0x4000)=nil, 0x5000) 23:35:09 executing program 2: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba435012283a089fc983e7797f790cc60ad10d95f2a8747c39e41860ddbb79b93206e6f48a9ea06150a16bf95ae2d84306db26a6bb1bd468b60742d67da92db43ff8c974cf390b52dcd196768dec9d1c446868948f6dff93998d866da8831456f1b44f5e3620fa5858fc705beaa9a64a41d9d6855f7f3dce7a4e8121eea8778045"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1609.795710][T12480] kAFS: No cell specified [ 1609.810495][T12444] netlink: 'syz-executor.0': attribute type 2 has an invalid length. 23:35:09 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mount(&(0x7f00000005c0)=ANY=[@ANYBLOB="23211ff2be2e"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1609.841084][T12483] kAFS: Bad value for 'source' [ 1609.878365][T12444] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 23:35:09 executing program 1: setsockopt$nfc_llcp_NFC_LLCP_MIUX(0xffffffffffffffff, 0x118, 0x1, &(0x7f0000000000)=0x40, 0x4) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="2379cfc9a91cad276bdbff988d1c25cc668f3ef074d8f10a177ff4dcdc9f1ae596017801b2711d216e52cd673243d2ca6fe9e7debc96939bc655cab3bd238d4f0532ad57f219092d04640bc61ff3c34dc979f9cf33f6270e65473ea77cbeb2d24ad5e98daef33ccdfd023621eb09bb39fef0f46fe34d039f1e9ce20d797cdeb68b2c8b04ebb4c6c6fd2c6f4ffa1f59b32fbe969c2aa25d3496b6c0c73e71867d1b5396ef0d00733ec4630aff755cf67e1f3c8e3e166f2d18d44c7ec512aee8c1755f1208552c21929ff21cdbcec0129eb8d7a14d2e1d1b6079a7c956d07b47fb8756ef45837e655bd4cf5032cc45e0bc270adcbc1d9b57c219cbebc92e958df100"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1609.993514][T12491] kAFS: No cell specified 23:35:09 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_DEL(r0, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="ac00000002090101000000060000000000000009700002002c000100140003006ed80a0ec3677685b4c446deabbe2e8d14000400000000000000400000000000000000000c00020005000100060000000c000200050001003a00000014000100080001007f000001080002007f000001e891871d58a4030c00020005000100880000000c00040008000500f2ff001f0c000200060003000000000008000500000000150800060000000000"], 0xac}, 0x1, 0x0, 0x0, 0x40081}, 0x40000d0) 23:35:09 executing program 2: mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba435012283a089fc983e7797f790cc60ad10d95f2a8747c39e41860ddbb79b93206e6f48a9ea06150a16bf95ae2d84306db26a6bb1bd468b60742d67da92db43ff8c974cf390b52dcd196768dec9d1c446868948f6dff93998d866da8831456f1b44f5e3620fa5858fc705beaa9a64a41d9d6855f7f3dce7a4e8121eea8778045"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 23:35:09 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffffff) shmat(r2, &(0x7f0000ff9000/0x4000)=nil, 0x5000) 23:35:09 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mount(&(0x7f00000005c0)=ANY=[@ANYBLOB="23211ff2be2e"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1610.116458][T12495] kAFS: No cell specified [ 1610.152366][T12498] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 1610.192870][T12498] netlink: 'syz-executor.0': attribute type 2 has an invalid length. [ 1610.229054][T12504] kAFS: No cell specified [ 1610.234237][T12498] netlink: 'syz-executor.0': attribute type 2 has an invalid length. 23:35:09 executing program 2: mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba435012283a089fc983e7797f790cc60ad10d95f2a8747c39e41860ddbb79b93206e6f48a9ea06150a16bf95ae2d84306db26a6bb1bd468b60742d67da92db43ff8c974cf390b52dcd196768dec9d1c446868948f6dff93998d866da8831456f1b44f5e3620fa5858fc705beaa9a64a41d9d6855f7f3dce7a4e8121eea8778045"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 23:35:09 executing program 1: setsockopt$nfc_llcp_NFC_LLCP_MIUX(0xffffffffffffffff, 0x118, 0x1, &(0x7f0000000000)=0x40, 0x4) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 23:35:09 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) shmat(r2, &(0x7f0000000000/0x4000)=nil, 0x0) shmat(r2, &(0x7f0000ff9000/0x4000)=nil, 0x5000) [ 1610.256279][T12498] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 23:35:09 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mount(&(0x7f00000005c0)=ANY=[@ANYBLOB="23211ff2be2e"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 23:35:09 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_DEL(r0, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="ac00000002090101000000070000000000000009700002002c000100140003006ed80a0ec3677685b4c446deabbe2e8d14000400000000000000400000000000000000000c00020005000100060000000c000200050001003a00000014000100080001007f000001080002007f000001e891871d58a4030c00020005000100880000000c00040008000500f2ff001f0c000200060003000000000008000500000000150800060000000000"], 0xac}, 0x1, 0x0, 0x0, 0x40081}, 0x40000d0) [ 1610.403668][T12511] kAFS: No cell specified 23:35:10 executing program 2: mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba435012283a089fc983e7797f790cc60ad10d95f2a8747c39e41860ddbb79b93206e6f48a9ea06150a16bf95ae2d84306db26a6bb1bd468b60742d67da92db43ff8c974cf390b52dcd196768dec9d1c446868948f6dff93998d866da8831456f1b44f5e3620fa5858fc705beaa9a64a41d9d6855f7f3dce7a4e8121eea8778045"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1610.471281][T12515] kAFS: No cell specified 23:35:10 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) shmat(r2, &(0x7f0000000000/0x4000)=nil, 0x0) shmat(r2, &(0x7f0000ff9000/0x4000)=nil, 0x5000) [ 1610.518116][T12518] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 23:35:10 executing program 2: mkdir(0x0, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba435012283a089fc983e7797f790cc60ad10d95f2a8747c39e41860ddbb79b93206e6f48a9ea06150a16bf95ae2d84306db26a6bb1bd468b60742d67da92db43ff8c974cf390b52dcd196768dec9d1c446868948f6dff93998d866da8831456f1b44f5e3620fa5858fc705beaa9a64a41d9d6855f7f3dce7a4e8121eea8778045"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1610.593993][T12518] netlink: 'syz-executor.0': attribute type 2 has an invalid length. 23:35:10 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mount(&(0x7f00000005c0)=ANY=[@ANYBLOB="23211ff2be2e"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 23:35:10 executing program 1: setsockopt$nfc_llcp_NFC_LLCP_MIUX(0xffffffffffffffff, 0x118, 0x1, &(0x7f0000000000)=0x40, 0x4) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 23:35:10 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) shmat(r2, &(0x7f0000000000/0x4000)=nil, 0x0) shmat(r2, &(0x7f0000ff9000/0x4000)=nil, 0x5000) 23:35:10 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_DEL(r0, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="ac00000002090101000000090000000000000009700002002c000100140003006ed80a0ec3677685b4c446deabbe2e8d14000400000000000000400000000000000000000c00020005000100060000000c000200050001003a00000014000100080001007f000001080002007f000001e891871d58a4030c00020005000100880000000c00040008000500f2ff001f0c000200060003000000000008000500000000150800060000000000"], 0xac}, 0x1, 0x0, 0x0, 0x40081}, 0x40000d0) 23:35:10 executing program 2: mkdir(0x0, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba435012283a089fc983e7797f790cc60ad10d95f2a8747c39e41860ddbb79b93206e6f48a9ea06150a16bf95ae2d84306db26a6bb1bd468b60742d67da92db43ff8c974cf390b52dcd196768dec9d1c446868948f6dff93998d866da8831456f1b44f5e3620fa5858fc705beaa9a64a41d9d6855f7f3dce7a4e8121eea8778045"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1610.795808][T12532] kAFS: No cell specified [ 1610.797732][T12534] kAFS: No cell specified 23:35:10 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) shmat(r2, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffffff) shmat(0x0, &(0x7f0000ff9000/0x4000)=nil, 0x5000) 23:35:10 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) mount(&(0x7f00000005c0)=ANY=[@ANYBLOB="23211ff2be2e"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 23:35:10 executing program 1: setsockopt$nfc_llcp_NFC_LLCP_MIUX(0xffffffffffffffff, 0x118, 0x1, &(0x7f0000000000)=0x40, 0x4) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 23:35:10 executing program 2: mkdir(0x0, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba435012283a089fc983e7797f790cc60ad10d95f2a8747c39e41860ddbb79b93206e6f48a9ea06150a16bf95ae2d84306db26a6bb1bd468b60742d67da92db43ff8c974cf390b52dcd196768dec9d1c446868948f6dff93998d866da8831456f1b44f5e3620fa5858fc705beaa9a64a41d9d6855f7f3dce7a4e8121eea8778045"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 23:35:10 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_DEL(r0, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="ac000000020901010000000a0000000000000009700002002c000100140003006ed80a0ec3677685b4c446deabbe2e8d14000400000000000000400000000000000000000c00020005000100060000000c000200050001003a00000014000100080001007f000001080002007f000001e891871d58a4030c00020005000100880000000c00040008000500f2ff001f0c000200060003000000000008000500000000150800060000000000"], 0xac}, 0x1, 0x0, 0x0, 0x40081}, 0x40000d0) 23:35:10 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) shmat(r2, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffffff) shmat(0x0, &(0x7f0000ff9000/0x4000)=nil, 0x5000) [ 1611.047023][T12546] kAFS: No cell specified 23:35:10 executing program 1: setsockopt$nfc_llcp_NFC_LLCP_MIUX(0xffffffffffffffff, 0x118, 0x1, &(0x7f0000000000)=0x40, 0x4) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 23:35:10 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_DEL(r0, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="ac000000020901010000000b0000000000000009700002002c000100140003006ed80a0ec3677685b4c446deabbe2e8d14000400000000000000400000000000000000000c00020005000100060000000c000200050001003a00000014000100080001007f000001080002007f000001e891871d58a4030c00020005000100880000000c00040008000500f2ff001f0c000200060003000000000008000500000000150800060000000000"], 0xac}, 0x1, 0x0, 0x0, 0x40081}, 0x40000d0) 23:35:10 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) mount(&(0x7f00000005c0)=ANY=[@ANYBLOB="23211ff2be2e"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 23:35:10 executing program 2: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1611.261850][T12562] kAFS: No cell specified 23:35:10 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) shmat(r2, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffffff) shmat(0x0, &(0x7f0000ff9000/0x4000)=nil, 0x5000) 23:35:10 executing program 1: setsockopt$nfc_llcp_NFC_LLCP_MIUX(0xffffffffffffffff, 0x118, 0x1, &(0x7f0000000000)=0x40, 0x4) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1611.353885][T12568] kAFS: No cell specified 23:35:10 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) mount(&(0x7f00000005c0)=ANY=[@ANYBLOB="23211ff2be2e"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 23:35:10 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_DEL(r0, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="ac000000020901010000000c0000000000000009700002002c000100140003006ed80a0ec3677685b4c446deabbe2e8d14000400000000000000400000000000000000000c00020005000100060000000c000200050001003a00000014000100080001007f000001080002007f000001e891871d58a4030c00020005000100880000000c00040008000500f2ff001f0c000200060003000000000008000500000000150800060000000000"], 0xac}, 0x1, 0x0, 0x0, 0x40081}, 0x40000d0) 23:35:11 executing program 2: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 23:35:11 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) shmat(r2, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffffff) shmat(r2, &(0x7f0000ff9000/0x4000)=nil, 0x0) 23:35:11 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_DEL(r0, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="ac000000020901010000000d0000000000000009700002002c000100140003006ed80a0ec3677685b4c446deabbe2e8d14000400000000000000400000000000000000000c00020005000100060000000c000200050001003a00000014000100080001007f000001080002007f000001e891871d58a4030c00020005000100880000000c00040008000500f2ff001f0c000200060003000000000008000500000000150800060000000000"], 0xac}, 0x1, 0x0, 0x0, 0x40081}, 0x40000d0) 23:35:11 executing program 1: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1611.552713][T12580] kAFS: No cell specified 23:35:11 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) mount(&(0x7f00000005c0)=ANY=[@ANYBLOB="23211ff2be2e"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1611.611642][T12581] kAFS: No cell specified [ 1611.643822][T12586] kAFS: No cell specified 23:35:11 executing program 2: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 23:35:11 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) shmat(r2, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffffff) shmat(r2, &(0x7f0000ff9000/0x4000)=nil, 0x0) 23:35:11 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_DEL(r0, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="ac000000020901010000000e0000000000000009700002002c000100140003006ed80a0ec3677685b4c446deabbe2e8d14000400000000000000400000000000000000000c00020005000100060000000c000200050001003a00000014000100080001007f000001080002007f000001e891871d58a4030c00020005000100880000000c00040008000500f2ff001f0c000200060003000000000008000500000000150800060000000000"], 0xac}, 0x1, 0x0, 0x0, 0x40081}, 0x40000d0) 23:35:11 executing program 1: mkdir(0x0, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="2379cfc9a91cad276bdbff988d1c25cc668f3ef074d8f10a177ff4dcdc9f1ae596017801b2711d216e52cd673243d2ca6fe9e7debc96939bc655cab3bd238d4f0532ad57f219092d04640bc61ff3c34dc979f9cf33f6270e65473ea77cbeb2d24ad5e98daef33ccdfd023621eb09bb39fef0f46fe34d039f1e9ce20d797cdeb68b2c8b04ebb4c6c6fd2c6f4ffa1f59b32fbe969c2aa25d3496b6c0c73e71867d1b5396ef0d00733ec4630aff755cf67e1f3c8e3e166f2d18d44c7ec512aee8c1755f1208552c21929ff21cdbcec0129eb8d7a14d2e1d1b6079a7c956d07b47fb8756ef45837e655bd4cf5032cc45e0bc270adcbc1d9b57c219cbebc92e958df100"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1611.821876][T12592] kAFS: No cell specified [ 1611.850429][ T26] kauditd_printk_skb: 4 callbacks suppressed [ 1611.850441][ T26] audit: type=1800 audit(1579649711.390:102): pid=12597 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed comm="syz-executor.4" name="SYSV00000000" dev="hugetlbfs" ino=50 res=0 [ 1611.880034][T12598] kAFS: No cell specified 23:35:11 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) shmat(r2, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffffff) shmat(r2, &(0x7f0000ff9000/0x4000)=nil, 0x0) 23:35:11 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) mount(&(0x7f00000005c0)=ANY=[@ANYBLOB="23211ff2be2e"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 23:35:11 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_DEL(r0, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="ac000000020901010000000f0000000000000009700002002c000100140003006ed80a0ec3677685b4c446deabbe2e8d14000400000000000000400000000000000000000c00020005000100060000000c000200050001003a00000014000100080001007f000001080002007f000001e891871d58a4030c00020005000100880000000c00040008000500f2ff001f0c000200060003000000000008000500000000150800060000000000"], 0xac}, 0x1, 0x0, 0x0, 0x40081}, 0x40000d0) 23:35:11 executing program 1: mkdir(0x0, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 23:35:11 executing program 2: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1612.048935][ T26] audit: type=1800 audit(1579649711.590:103): pid=12606 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed comm="syz-executor.4" name="SYSV00000000" dev="hugetlbfs" ino=51 res=0 23:35:11 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000080)=ANY=[@ANYBLOB="256bf0ab859d53b5cc3b30225f2d01b8da40f4632de09fb30a6941162fedeffdcfc662ffb405659d208b5aa8068932536fa33dc021c29489a5546ba3d7c8a5110639ca4b99eeacab902e757cf913302076342861fa6899aef4fe0e6d2c86"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 23:35:11 executing program 1: mkdir(0x0, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1612.131222][T12610] kAFS: No cell specified [ 1612.147639][T12612] kAFS: Bad value for 'source' 23:35:11 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_DEL(r0, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="ac00000002090101000000110000000000000009700002002c000100140003006ed80a0ec3677685b4c446deabbe2e8d14000400000000000000400000000000000000000c00020005000100060000000c000200050001003a00000014000100080001007f000001080002007f000001e891871d58a4030c00020005000100880000000c00040008000500f2ff001f0c000200060003000000000008000500000000150800060000000000"], 0xac}, 0x1, 0x0, 0x0, 0x40081}, 0x40000d0) 23:35:11 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) mount(&(0x7f00000005c0)=ANY=[@ANYBLOB="23211ff2be2e"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 23:35:11 executing program 1: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 23:35:11 executing program 2: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1612.295951][T12618] kAFS: No cell specified [ 1612.362596][T12623] kAFS: No cell specified 23:35:12 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DEST(r2, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, r3, 0x400, 0x70bd2d, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x8e000000}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000810}, 0x8000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = syz_genetlink_get_family_id$nl80211(&(0x7f00000003c0)='nl80211\x00') r7 = socket$netlink(0x10, 0x3, 0x0) r8 = socket(0xa, 0x2, 0x0) setsockopt$inet_int(r8, 0x0, 0x8, &(0x7f0000000040)=0xd3, 0x4) getsockopt$inet_pktinfo(r8, 0x0, 0x8, &(0x7f0000000140)={0x0, @rand_addr, @initdev}, &(0x7f0000000180)=0xc) sendmsg$nl_route(r7, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000440)=@newlink={0x68, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x21025}, [@IFLA_LINKINFO={0x34, 0x12, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x24, 0x2, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_FLAGS={0xc}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x9, 0xa}}]}}}, @IFLA_ADDRESS={0xa, 0x5, @empty=[0x14]}, @IFLA_MASTER={0x8, 0xa, r9}]}, 0x68}}, 0x0) r10 = socket$netlink(0x10, 0x3, 0x0) r11 = socket(0xa, 0x2, 0x0) setsockopt$inet_int(r11, 0x0, 0x8, &(0x7f0000000040)=0xd3, 0x4) getsockopt$inet_pktinfo(r11, 0x0, 0x8, &(0x7f0000000140)={0x0, @rand_addr, @initdev}, &(0x7f0000000180)=0xc) sendmsg$nl_route(r10, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000440)=@newlink={0x68, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x21025}, [@IFLA_LINKINFO={0x34, 0x12, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x24, 0x2, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_FLAGS={0xc}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x9, 0xa}}]}}}, @IFLA_ADDRESS={0xa, 0x5, @empty=[0x14]}, @IFLA_MASTER={0x8, 0xa, r12}]}, 0x68}}, 0x0) sendmsg$NL80211_CMD_NEW_INTERFACE(r5, &(0x7f00000004c0)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x50, r6, 0x400, 0x70bd2d, 0x25dfdbfd, {}, [@NL80211_ATTR_IFNAME={0x14, 0x4, 'veth1\x00'}, @NL80211_ATTR_IFTYPE={0x8, 0x5, 0x6}, @NL80211_ATTR_IFINDEX={0x8, 0x3, r9}, @NL80211_ATTR_IFINDEX={0x8, 0x3, r12}, @NL80211_ATTR_IFINDEX={0x8}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0xffffffffffffffff}]}, 0x50}, 0x1, 0x0, 0x0, 0x4000000}, 0x20000010) r13 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r13, 0x8912, 0x400200) r14 = add_key$keyring(&(0x7f0000000980)='keyring\x00', &(0x7f00000007c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) write$RDMA_USER_CM_CMD_CREATE_ID(r13, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000040)={0xffffffffffffffff}, 0x106, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r13, &(0x7f0000000100)={0xe, 0x18, 0xfa00, @id_resuseaddr={&(0x7f0000000000), r15, 0x0, 0x1, 0x4}}, 0x20) r16 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000a00)="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", 0x1001, r14) r17 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r17, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2008}, 0x1c) listen(r17, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140)='/dev/hwrng\x00', 0x600, 0x0) fstat(r17, &(0x7f00000001c0)) keyctl$read(0xb, r16, &(0x7f0000005340)=""/4096, 0xd900) 23:35:12 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_DEL(r0, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="ac00000002090101000000120000000000000009700002002c000100140003006ed80a0ec3677685b4c446deabbe2e8d14000400000000000000400000000000000000000c00020005000100060000000c000200050001003a00000014000100080001007f000001080002007f000001e891871d58a4030c00020005000100880000000c00040008000500f2ff001f0c000200060003000000000008000500000000150800060000000000"], 0xac}, 0x1, 0x0, 0x0, 0x40081}, 0x40000d0) [ 1612.422192][T12625] kAFS: No cell specified 23:35:12 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1612.491355][T12628] kAFS: Bad value for 'source' 23:35:12 executing program 1: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 23:35:12 executing program 2: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 23:35:12 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_DEL(r0, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="ac00000002090101000000130000000000000009700002002c000100140003006ed80a0ec3677685b4c446deabbe2e8d14000400000000000000400000000000000000000c00020005000100060000000c000200050001003a00000014000100080001007f000001080002007f000001e891871d58a4030c00020005000100880000000c00040008000500f2ff001f0c000200060003000000000008000500000000150800060000000000"], 0xac}, 0x1, 0x0, 0x0, 0x40081}, 0x40000d0) [ 1612.619521][T12635] kAFS: No cell specified [ 1612.671409][T12640] kAFS: No cell specified 23:35:12 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1612.740685][T12674] kAFS: Bad value for 'source' 23:35:12 executing program 1: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 23:35:12 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_DEL(r0, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="ac00000002090101000000140000000000000009700002002c000100140003006ed80a0ec3677685b4c446deabbe2e8d14000400000000000000400000000000000000000c00020005000100060000000c000200050001003a00000014000100080001007f000001080002007f000001e891871d58a4030c00020005000100880000000c00040008000500f2ff001f0c000200060003000000000008000500000000150800060000000000"], 0xac}, 0x1, 0x0, 0x0, 0x40081}, 0x40000d0) 23:35:12 executing program 2: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1612.852679][T12728] kAFS: No cell specified [ 1612.907102][T12740] kAFS: No cell specified 23:35:12 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 23:35:12 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_DEL(r0, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="ac00000002090101000000200000000000000009700002002c000100140003006ed80a0ec3677685b4c446deabbe2e8d14000400000000000000400000000000000000000c00020005000100060000000c000200050001003a00000014000100080001007f000001080002007f000001e891871d58a4030c00020005000100880000000c00040008000500f2ff001f0c000200060003000000000008000500000000150800060000000000"], 0xac}, 0x1, 0x0, 0x0, 0x40081}, 0x40000d0) [ 1612.975642][T12753] kAFS: Bad value for 'source' 23:35:12 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DEST(r2, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, r3, 0x400, 0x70bd2d, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x8e000000}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000810}, 0x8000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = syz_genetlink_get_family_id$nl80211(&(0x7f00000003c0)='nl80211\x00') r7 = socket$netlink(0x10, 0x3, 0x0) r8 = socket(0xa, 0x2, 0x0) setsockopt$inet_int(r8, 0x0, 0x8, &(0x7f0000000040)=0xd3, 0x4) getsockopt$inet_pktinfo(r8, 0x0, 0x8, &(0x7f0000000140)={0x0, @rand_addr, @initdev}, &(0x7f0000000180)=0xc) sendmsg$nl_route(r7, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000440)=@newlink={0x68, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x21025}, [@IFLA_LINKINFO={0x34, 0x12, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x24, 0x2, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_FLAGS={0xc}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x9, 0xa}}]}}}, @IFLA_ADDRESS={0xa, 0x5, @empty=[0x14]}, @IFLA_MASTER={0x8, 0xa, r9}]}, 0x68}}, 0x0) r10 = socket$netlink(0x10, 0x3, 0x0) r11 = socket(0xa, 0x2, 0x0) setsockopt$inet_int(r11, 0x0, 0x8, &(0x7f0000000040)=0xd3, 0x4) getsockopt$inet_pktinfo(r11, 0x0, 0x8, &(0x7f0000000140)={0x0, @rand_addr, @initdev}, &(0x7f0000000180)=0xc) sendmsg$nl_route(r10, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000440)=@newlink={0x68, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x21025}, [@IFLA_LINKINFO={0x34, 0x12, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x24, 0x2, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_FLAGS={0xc}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x9, 0xa}}]}}}, @IFLA_ADDRESS={0xa, 0x5, @empty=[0x14]}, @IFLA_MASTER={0x8, 0xa, r12}]}, 0x68}}, 0x0) sendmsg$NL80211_CMD_NEW_INTERFACE(r5, &(0x7f00000004c0)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x50, r6, 0x400, 0x70bd2d, 0x25dfdbfd, {}, [@NL80211_ATTR_IFNAME={0x14, 0x4, 'veth1\x00'}, @NL80211_ATTR_IFTYPE={0x8, 0x5, 0x6}, @NL80211_ATTR_IFINDEX={0x8, 0x3, r9}, @NL80211_ATTR_IFINDEX={0x8, 0x3, r12}, @NL80211_ATTR_IFINDEX={0x8}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0xffffffffffffffff}]}, 0x50}, 0x1, 0x0, 0x0, 0x4000000}, 0x20000010) r13 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r13, 0x8912, 0x400200) r14 = add_key$keyring(&(0x7f0000000980)='keyring\x00', &(0x7f00000007c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) write$RDMA_USER_CM_CMD_CREATE_ID(r13, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000040)={0xffffffffffffffff}, 0x106, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r13, &(0x7f0000000100)={0xe, 0x18, 0xfa00, @id_resuseaddr={&(0x7f0000000000), r15, 0x0, 0x1, 0x4}}, 0x20) r16 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000a00)="46ac5128da090e4899c34a28efeb85968ead969e21e33725a7edc030260cdb3ca79964a6e93ce51185f005b7dac052cb797af438c32c29b736fb12c63dd0e504445044a1ae9c10fd8171232ed7dcb08e9acaf4c569c4c1805c47994118fc35ff7f03407dc7093fa7d3132d276a10768b2711cd1c6ecd3545692431856b6e0651412ff7b73711097f061a1b67f6c3d7605eab3b675b6c061e6ef32b7ea8847b6f84da1334d35322b94447bfaca74b152eb64cfa54cb63126c2cc662e7898e6459ed40c4566403f303d341c9c34c6049d9f8e1c2a9483f003c20e66886d0e1629f498668c202f183de294d03da07c9f5feb65bc196554a79a2f255828c1f1cf9a09654f9df849443e8d290debcc78efbdca391a348b33f18ef618011273faa1f095298dd71db08a90e177a1e9a0c771deca3b51670a26850b89d4439574328c19d9e91766dd52169e0ad5011e4acc005861b3b3146d67445e6f6c75ce4af9d8db6963887d79113613267c5bc42fb0aca828590fb291ce8836d3cd391d364efdbb7015d8ec643d83b623380c21c6ebbf774498c94e60838a45d4692bfe73aaea2bbcecb6dcec20e5aa48a950428e2372009212f2f6be608cdec5ff84108f3f3d2e42c99a6d4cd4577ec9f39a51533efe71d494ccadb66eddd4cc0e56b33eefb0ada68ae36c905a977d9042a63299d2130f4e85357b0078c31bc45b00f5ccd879a6735d85882bfddbc6f2cff4a2b976b29e5a8adc74893c748b297a660ba0f64ad8a6ac6fcf180b6a4357ad6733cb75035cd58631142bd720cf52bcd1438647cbe1058e32d33c38f1327bef3f6b1c815ab4f2d47366473ae37c65a2d1df88823dd4c326d640c50e5bddfa976f04cd034331b632cd7a8bbc838081f28f6e24ed646721cea36e56501f9085e428a6c94b7ba5431f59651f36c8f715e4547ffed53c03cc58d2d4382193625cf69c197c4eb3c3c86c291d693837ab7eb23d61d2518379f0c61acf67425afa1ff8d1fac196a7ef9f6f9b514a2028ae010d1bf10833940294c400401ec706ce366dc4c62f6c55c6985a31592360cc7e6cc30a90cae1891b4cffb882b0329457503055db6a8e3b651b3302c24e6d149e8368ee6d3bafbc417256d042b4b87cb1bf46169ad1a593da66b2c6f453180f2c51be35c431e1af07e54c1251334415135422fa81b015a7a746c1979827e3d32057d408016cdc2b641a42626bbf8b7970a5638e9e48783ff80ded5b5184b69d41e60ba9e2ff7ef3e85b4419db2b064d64f833dc2035a6cc3ea28335ad94eb5ba974d9799ce94565559e6a7636b725c4c3dc1702af3c0f3d9dc77f6d404b7c8ff2cec1b4e703451a1d2750d9a22e9f4b5e27da765d228f09bbd30088ac9dff793ec759161849cf4217f5684bff8eddd65be61d3ed2dcc7bae8ab5e1260c3a90cdb37626c4871098802b34f271d8a091b0517bd1588b43cf21b2e3fe676e34d115a56d450d50a97ac7e2ea5904f9695dbde822dba41ac3a1190d63ef486a1829d38b005f9458a82533a555a2f674eea95af7ef7f0cf9654e0ed8d2ab722ca065fd97e6518b76a39cc1b04dc49c395f3aad5e05c76c1881f6a85fee6c6fba8340692eb0b7f3f948350e6947dac635cfef9e4ff4d3f756802cbd97e8c5845b25bc5a021d9875277f197d1bce55661e6961dd788a444962e33fa582a01d0bd61aaa22a76adf68b3169d3f0b49", 0x1001, r14) r17 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r17, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2008}, 0x1c) listen(r17, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140)='/dev/hwrng\x00', 0x600, 0x0) fstat(r17, &(0x7f00000001c0)) keyctl$read(0xb, r16, &(0x7f0000005340)=""/4096, 0xd900) 23:35:12 executing program 3: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x22080, 0x0) ioctl$RNDADDTOENTCNT(r0, 0x40045201, &(0x7f0000000100)=0x7) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x2, 0x101000) openat$null(0xffffffffffffff9c, &(0x7f0000000580)='/dev/null\x00', 0x8840, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000240)=ANY=[@ANYBLOB="7261770000000000000000000000000000000000000000000080000000000000090000000300000098020000c800000000000000000000000000000000000000000200000002000000020000000200000002000003000000", @ANYPTR=&(0x7f0000000080)=ANY=[@ANYBLOB="0000000000400000000000000000000000000000000000008814e43000"/41], @ANYBLOB="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"], 0x2f8) ioctl$DRM_IOCTL_GEM_OPEN(r0, 0xc010640b, &(0x7f00000001c0)={0x0, 0x0, 0x3}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r4 = dup(r3) ioctl$SIOCX25GSUBSCRIP(r4, 0x89e0, &(0x7f00000005c0)={'vxcan1\x00', 0x8000, 0x1}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r0, 0xc00c642e, &(0x7f0000000540)={r2, 0x0, r4}) mount(&(0x7f0000000000)=ANY=[@ANYBLOB="9f"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 23:35:12 executing program 1: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1613.047608][T12757] __nla_validate_parse: 28 callbacks suppressed [ 1613.047616][T12757] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1613.057688][T12758] kAFS: No cell specified 23:35:12 executing program 2: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 23:35:12 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount(&(0x7f00000005c0)=ANY=[], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1613.143301][T12765] kAFS: Bad value for 'source' [ 1613.163154][T12763] kAFS: unparsable volume name [ 1613.180522][T12757] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. 23:35:12 executing program 1: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1613.271494][T12770] kAFS: Bad value for 'source' 23:35:12 executing program 3: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="f12d00000001ff000000"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 23:35:12 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_DEL(r0, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="ac00000002090101000000250000000000000009700002002c000100140003006ed80a0ec3677685b4c446deabbe2e8d14000400000000000000400000000000000000000c00020005000100060000000c000200050001003a00000014000100080001007f000001080002007f000001e891871d58a4030c00020005000100880000000c00040008000500f2ff001f0c000200060003000000000008000500000000150800060000000000"], 0xac}, 0x1, 0x0, 0x0, 0x40081}, 0x40000d0) [ 1613.375314][T12781] kAFS: Bad value for 'source' [ 1613.393442][T12777] kAFS: Bad value for 'source' 23:35:12 executing program 2: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1613.433980][T12812] kAFS: unparsable volume name 23:35:13 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount(&(0x7f00000005c0)=ANY=[], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 23:35:13 executing program 1: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1613.465002][T12824] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1613.477883][T12824] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1613.575290][T12852] kAFS: Bad value for 'source' 23:35:13 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_DEL(r0, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="ac000000020901010000da3b0000000000000009700002002c000100140003006ed80a0ec3677685b4c446deabbe2e8d14000400000000000000400000000000000000000c00020005000100060000000c000200050001003a00000014000100080001007f000001080002007f000001e891871d58a4030c00020005000100880000000c00040008000500f2ff001f0c000200060003000000000008000500000000150800060000000000"], 0xac}, 0x1, 0x0, 0x0, 0x40081}, 0x40000d0) [ 1613.669685][T12880] kAFS: Bad value for 'source' [ 1613.683724][T12881] kAFS: Bad value for 'source' [ 1613.696306][T12892] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.0'. 23:35:13 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DEST(r2, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, r3, 0x400, 0x70bd2d, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x8e000000}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000810}, 0x8000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = syz_genetlink_get_family_id$nl80211(&(0x7f00000003c0)='nl80211\x00') r7 = socket$netlink(0x10, 0x3, 0x0) r8 = socket(0xa, 0x2, 0x0) setsockopt$inet_int(r8, 0x0, 0x8, &(0x7f0000000040)=0xd3, 0x4) getsockopt$inet_pktinfo(r8, 0x0, 0x8, &(0x7f0000000140)={0x0, @rand_addr, @initdev}, &(0x7f0000000180)=0xc) sendmsg$nl_route(r7, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000440)=@newlink={0x68, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x21025}, [@IFLA_LINKINFO={0x34, 0x12, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x24, 0x2, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_FLAGS={0xc}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x9, 0xa}}]}}}, @IFLA_ADDRESS={0xa, 0x5, @empty=[0x14]}, @IFLA_MASTER={0x8, 0xa, r9}]}, 0x68}}, 0x0) r10 = socket$netlink(0x10, 0x3, 0x0) r11 = socket(0xa, 0x2, 0x0) setsockopt$inet_int(r11, 0x0, 0x8, &(0x7f0000000040)=0xd3, 0x4) getsockopt$inet_pktinfo(r11, 0x0, 0x8, &(0x7f0000000140)={0x0, @rand_addr, @initdev}, &(0x7f0000000180)=0xc) sendmsg$nl_route(r10, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000440)=@newlink={0x68, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x21025}, [@IFLA_LINKINFO={0x34, 0x12, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x24, 0x2, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_FLAGS={0xc}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x9, 0xa}}]}}}, @IFLA_ADDRESS={0xa, 0x5, @empty=[0x14]}, @IFLA_MASTER={0x8, 0xa, r12}]}, 0x68}}, 0x0) sendmsg$NL80211_CMD_NEW_INTERFACE(r5, &(0x7f00000004c0)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x50, r6, 0x400, 0x70bd2d, 0x25dfdbfd, {}, [@NL80211_ATTR_IFNAME={0x14, 0x4, 'veth1\x00'}, @NL80211_ATTR_IFTYPE={0x8, 0x5, 0x6}, @NL80211_ATTR_IFINDEX={0x8, 0x3, r9}, @NL80211_ATTR_IFINDEX={0x8, 0x3, r12}, @NL80211_ATTR_IFINDEX={0x8}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0xffffffffffffffff}]}, 0x50}, 0x1, 0x0, 0x0, 0x4000000}, 0x20000010) r13 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r13, 0x8912, 0x400200) r14 = add_key$keyring(&(0x7f0000000980)='keyring\x00', &(0x7f00000007c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) write$RDMA_USER_CM_CMD_CREATE_ID(r13, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000040)={0xffffffffffffffff}, 0x106, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r13, &(0x7f0000000100)={0xe, 0x18, 0xfa00, @id_resuseaddr={&(0x7f0000000000), r15, 0x0, 0x1, 0x4}}, 0x20) r16 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000a00)="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", 0x1001, r14) r17 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r17, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2008}, 0x1c) listen(r17, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140)='/dev/hwrng\x00', 0x600, 0x0) fstat(r17, &(0x7f00000001c0)) keyctl$read(0xb, r16, &(0x7f0000005340)=""/4096, 0xd900) 23:35:13 executing program 3: mkdir(&(0x7f0000000200)='./file0\x00', 0x6) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) read$usbfs(r1, &(0x7f0000000240)=""/4096, 0x1000) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) symlinkat(&(0x7f0000000000)='./file0\x00', r1, &(0x7f0000000040)='./file0\x00') 23:35:13 executing program 2: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba435012283a089fc983e7797f790cc60ad10d95f2a8747c39e41860ddbb79b93206e6f48a9ea06150a16b"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 23:35:13 executing program 1: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1613.747825][T12892] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. 23:35:13 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount(&(0x7f00000005c0)=ANY=[], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 23:35:13 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_DEL(r0, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="ac000000020901010000003f0000000000000009700002002c000100140003006ed80a0ec3677685b4c446deabbe2e8d14000400000000000000400000000000000000000c00020005000100060000000c000200050001003a00000014000100080001007f000001080002007f000001e891871d58a4030c00020005000100880000000c00040008000500f2ff001f0c000200060003000000000008000500000000150800060000000000"], 0xac}, 0x1, 0x0, 0x0, 0x40081}, 0x40000d0) 23:35:13 executing program 2: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba435012283a089fc983e7797f790cc60ad10d95f2a8747c39e41860ddbb79b93206e6f48a9ea06150a16b"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1613.887798][T12902] kAFS: Bad value for 'source' 23:35:13 executing program 1: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1613.960244][T12906] kAFS: Bad value for 'source' 23:35:13 executing program 2: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB='#'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 23:35:13 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount(&(0x7f00000005c0)=ANY=[@ANYBLOB], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1613.981400][T12912] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1614.013610][T12912] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. 23:35:13 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_DEL(r0, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="ac00000002090101000000400000000000000009700002002c000100140003006ed80a0ec3677685b4c446deabbe2e8d14000400000000000000400000000000000000000c00020005000100060000000c000200050001003a00000014000100080001007f000001080002007f000001e891871d58a4030c00020005000100880000000c00040008000500f2ff001f0c000200060003000000000008000500000000150800060000000000"], 0xac}, 0x1, 0x0, 0x0, 0x40081}, 0x40000d0) [ 1614.096124][T12957] kAFS: Bad value for 'source' 23:35:13 executing program 1: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1614.172685][T12968] kAFS: unparsable volume name [ 1614.180099][T13004] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1614.196519][T13004] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1614.211445][T13023] kAFS: Bad value for 'source' [ 1614.277266][T13026] kAFS: Bad value for 'source' 23:35:13 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba435012283a089fc983e7797f790cc60ad10d95f2a8747c39e41860ddbb79b93206e6f48a9ea06150a16b"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 23:35:14 executing program 3: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) chdir(&(0x7f0000000040)='./file0\x00') mount(&(0x7f0000000000)=ANY=[@ANYBLOB='%'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 23:35:14 executing program 2: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB='#'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 23:35:14 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount(&(0x7f00000005c0)=ANY=[@ANYBLOB], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 23:35:14 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_DEL(r0, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="ac00000002090101000000480000000000000009700002002c000100140003006ed80a0ec3677685b4c446deabbe2e8d14000400000000000000400000000000000000000c00020005000100060000000c000200050001003a00000014000100080001007f000001080002007f000001e891871d58a4030c00020005000100880000000c00040008000500f2ff001f0c000200060003000000000008000500000000150800060000000000"], 0xac}, 0x1, 0x0, 0x0, 0x40081}, 0x40000d0) 23:35:14 executing program 1: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="2379cfc9a91cad276bdbff988d1c25cc668f3ef074d8f10a177ff4dcdc9f1ae596017801b2711d216e52cd673243d2ca6fe9e7debc96939bc655cab3bd238d4f0532ad57f219092d04640bc61ff3c34dc979f9cf33f6270e65473ea77cbeb2d24ad5e98daef33ccdfd023621eb09bb39fef0f46fe34d039f1e9ce20d797cdeb68b"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 23:35:14 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba435012283a089fc983e7797f790cc60ad10d95f2a8747c39e41860ddbb79b93206e6f48a9ea06150a16b"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1614.704685][T13039] validate_nla: 72 callbacks suppressed [ 1614.704694][T13039] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 1614.710562][T13038] kAFS: unparsable volume name [ 1614.727661][T13042] kAFS: No cell specified [ 1614.739402][T13041] kAFS: Bad value for 'source' [ 1614.740547][T13039] netlink: 'syz-executor.0': attribute type 2 has an invalid length. 23:35:14 executing program 1: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB='#'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 23:35:14 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount(&(0x7f00000005c0)=ANY=[@ANYBLOB], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 23:35:14 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba435012283a089fc983e7797f790cc60ad10d95f2a8747c39e41860ddbb79b93206e6f48a9ea06150a16b"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 23:35:14 executing program 2: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB='#'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1614.785633][T13039] netlink: 'syz-executor.0': attribute type 2 has an invalid length. [ 1614.813278][T13039] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 23:35:14 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_DEL(r0, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="ac000000020901010000004c0000000000000009700002002c000100140003006ed80a0ec3677685b4c446deabbe2e8d14000400000000000000400000000000000000000c00020005000100060000000c000200050001003a00000014000100080001007f000001080002007f000001e891871d58a4030c00020005000100880000000c00040008000500f2ff001f0c000200060003000000000008000500000000150800060000000000"], 0xac}, 0x1, 0x0, 0x0, 0x40081}, 0x40000d0) [ 1614.873709][T13049] kAFS: unparsable volume name 23:35:14 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = add_key$keyring(&(0x7f0000000980)='keyring\x00', &(0x7f00000007c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000a00)="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", 0x1001, r2) write$FUSE_OPEN(r1, &(0x7f0000000080)={0x20, 0xfffffffffffffffe, 0x8}, 0x20) r3 = add_key$keyring(&(0x7f0000000980)='keyring\x00', &(0x7f00000007c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$KVM_GET_XCRS(r5, 0x8188aea6, &(0x7f0000000140)={0x1, 0x5, [{0x6, 0x0, 0x1}]}) add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000a00)="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", 0x1001, r3) r6 = add_key$keyring(&(0x7f0000000980)='keyring\x00', &(0x7f00000007c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r8 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r8, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r9) setfsuid(r9) r10 = dup(r7) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) connect$l2tp(r10, &(0x7f0000000100)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x35}, 0x3}, 0x10) r11 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000a00)="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", 0x1001, r6) keyctl$read(0xb, r11, &(0x7f0000005340)=""/4096, 0xd900) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r3, &(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000040)=@chain={'key_or_keyring:', r11, ':chain\x00'}) 23:35:14 executing program 1: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB='#'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 23:35:14 executing program 4: mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba435012283a089fc983e7797f790cc60ad10d95f2a8747c39e41860ddbb79b93206e6f48a9ea06150a16b"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1615.019286][T13060] kAFS: unparsable volume name [ 1615.044687][T13059] kAFS: Bad value for 'source' 23:35:14 executing program 2: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1615.095231][T13091] kAFS: unparsable volume name 23:35:14 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount(&(0x7f00000005c0)=ANY=[@ANYBLOB="23211f"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 23:35:14 executing program 4: mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba435012283a089fc983e7797f790cc60ad10d95f2a8747c39e41860ddbb79b93206e6f48a9ea06150a16b"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 23:35:14 executing program 1: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB='#'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 23:35:14 executing program 3: r0 = socket$inet(0x2, 0x2, 0x2200000088) sendto$inet(r0, 0x0, 0x30, 0x0, &(0x7f0000319ff0)={0x2, 0x4e25}, 0x10) 23:35:14 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_DEL(r0, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="ac00000002090101000000600000000000000009700002002c000100140003006ed80a0ec3677685b4c446deabbe2e8d14000400000000000000400000000000000000000c00020005000100060000000c000200050001003a00000014000100080001007f000001080002007f000001e891871d58a4030c00020005000100880000000c00040008000500f2ff001f0c000200060003000000000008000500000000150800060000000000"], 0xac}, 0x1, 0x0, 0x0, 0x40081}, 0x40000d0) [ 1615.236026][T13170] kAFS: No cell specified 23:35:14 executing program 2: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 23:35:14 executing program 4: mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba435012283a089fc983e7797f790cc60ad10d95f2a8747c39e41860ddbb79b93206e6f48a9ea06150a16b"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1615.339014][T13176] kAFS: No cell specified [ 1615.363497][T13180] kAFS: unparsable volume name 23:35:15 executing program 3 (fault-call:5 fault-nth:0): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) shmat(r2, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffffff) shmat(r2, &(0x7f0000ff9000/0x4000)=nil, 0x5000) [ 1615.405745][T13183] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 23:35:15 executing program 1: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="2379cfc9a91cad276bdbff988d1c25cc668f3ef074d8f10a177ff4dcdc9f1ae596017801b2711d216e52cd673243d2ca6fe9e7debc96939bc655cab3bd238d4f05"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 23:35:15 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount(&(0x7f00000005c0)=ANY=[@ANYBLOB="23211f"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1615.457301][T13183] netlink: 'syz-executor.0': attribute type 2 has an invalid length. [ 1615.478876][T13186] kAFS: No cell specified [ 1615.534603][T13183] netlink: 'syz-executor.0': attribute type 2 has an invalid length. 23:35:15 executing program 4: mkdir(0x0, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba435012283a089fc983e7797f790cc60ad10d95f2a8747c39e41860ddbb79b93206e6f48a9ea06150a16b"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1615.590557][T13183] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 1615.599209][ T26] audit: type=1800 audit(1579649715.140:104): pid=13194 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed comm="syz-executor.3" name="SYSV00000000" dev="hugetlbfs" ino=3 res=0 [ 1615.613624][T13194] FAULT_INJECTION: forcing a failure. [ 1615.613624][T13194] name failslab, interval 1, probability 0, space 0, times 0 23:35:15 executing program 2: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1615.638740][T13196] kAFS: No cell specified [ 1615.649739][T13195] kAFS: No cell specified 23:35:15 executing program 1: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB='#'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1615.700724][T13194] CPU: 1 PID: 13194 Comm: syz-executor.3 Not tainted 5.5.0-rc7-syzkaller #0 [ 1615.709544][T13194] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1615.719900][T13194] Call Trace: [ 1615.723335][T13194] dump_stack+0x1fb/0x318 [ 1615.727690][T13194] should_fail+0x608/0x770 [ 1615.732139][T13194] __should_failslab+0x11a/0x160 [ 1615.737127][T13194] should_failslab+0x9/0x20 [ 1615.741799][T13194] kmem_cache_alloc_trace+0x5d/0x2f0 [ 1615.743647][T13201] kAFS: No cell specified [ 1615.747208][T13194] ? do_shmat+0x5cd/0xc60 [ 1615.747223][T13194] do_shmat+0x5cd/0xc60 [ 1615.747241][T13194] __x64_sys_shmat+0x9a/0x100 [ 1615.747261][T13194] do_syscall_64+0xf7/0x1c0 [ 1615.769608][T13194] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1615.775607][T13194] RIP: 0033:0x45b349 [ 1615.779567][T13194] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 23:35:15 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_DEL(r0, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="ac00000002090101000000680000000000000009700002002c000100140003006ed80a0ec3677685b4c446deabbe2e8d14000400000000000000400000000000000000000c00020005000100060000000c000200050001003a00000014000100080001007f000001080002007f000001e891871d58a4030c00020005000100880000000c00040008000500f2ff001f0c000200060003000000000008000500000000150800060000000000"], 0xac}, 0x1, 0x0, 0x0, 0x40081}, 0x40000d0) 23:35:15 executing program 2: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba435012283a089fc983e7797f790cc60ad10d95f2a8"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1615.785349][T13203] kAFS: unparsable volume name [ 1615.799372][T13194] RSP: 002b:00007f87ff7f6c78 EFLAGS: 00000246 ORIG_RAX: 000000000000001e [ 1615.799386][T13194] RAX: ffffffffffffffda RBX: 00007f87ff7f76d4 RCX: 000000000045b349 [ 1615.799391][T13194] RDX: 0000000000005000 RSI: 0000000020ff9000 RDI: 0000000000000003 [ 1615.799398][T13194] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1615.799404][T13194] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000006 23:35:15 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount(&(0x7f00000005c0)=ANY=[@ANYBLOB="23211f"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1615.799410][T13194] R13: 0000000000000af2 R14: 00000000004cbe61 R15: 0000000000000000 23:35:15 executing program 1: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB='#'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1615.914844][T13208] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 1615.939657][T13208] netlink: 'syz-executor.0': attribute type 2 has an invalid length. 23:35:15 executing program 3 (fault-call:5 fault-nth:1): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) shmat(r2, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffffff) shmat(r2, &(0x7f0000ff9000/0x4000)=nil, 0x5000) [ 1615.975076][T13211] kAFS: No cell specified 23:35:15 executing program 4: mkdir(0x0, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba435012283a089fc983e7797f790cc60ad10d95f2a8747c39e41860ddbb79b93206e6f48a9ea06150a16b"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 23:35:15 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount(&(0x7f00000005c0)=ANY=[@ANYBLOB="23211ff2be"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1616.074423][ T26] audit: type=1800 audit(1579649715.620:105): pid=13215 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed comm="syz-executor.3" name="SYSV00000000" dev="hugetlbfs" ino=4 res=0 [ 1616.101708][T13218] kAFS: unparsable volume name [ 1616.114832][T13215] FAULT_INJECTION: forcing a failure. 23:35:15 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_DEL(r0, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="ac000000020901010000006c0000000000000009700002002c000100140003006ed80a0ec3677685b4c446deabbe2e8d14000400000000000000400000000000000000000c00020005000100060000000c000200050001003a00000014000100080001007f000001080002007f000001e891871d58a4030c00020005000100880000000c00040008000500f2ff001f0c000200060003000000000008000500000000150800060000000000"], 0xac}, 0x1, 0x0, 0x0, 0x40081}, 0x40000d0) [ 1616.114832][T13215] name failslab, interval 1, probability 0, space 0, times 0 [ 1616.171635][T13215] CPU: 1 PID: 13215 Comm: syz-executor.3 Not tainted 5.5.0-rc7-syzkaller #0 [ 1616.180390][T13215] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1616.190471][T13215] Call Trace: [ 1616.193786][T13215] dump_stack+0x1fb/0x318 [ 1616.198440][T13215] should_fail+0x608/0x770 [ 1616.202927][T13215] __should_failslab+0x11a/0x160 [ 1616.207888][T13215] ? __alloc_file+0x2c/0x390 [ 1616.212526][T13215] should_failslab+0x9/0x20 [ 1616.217061][T13215] kmem_cache_alloc+0x56/0x2e0 [ 1616.221859][T13215] __alloc_file+0x2c/0x390 [ 1616.226320][T13215] alloc_empty_file+0xac/0x1b0 [ 1616.231112][T13215] alloc_file+0x60/0x4c0 [ 1616.235387][T13215] alloc_file_clone+0x26/0xa0 [ 1616.240091][T13215] do_shmat+0x635/0xc60 [ 1616.244392][T13215] __x64_sys_shmat+0x9a/0x100 [ 1616.249162][T13215] do_syscall_64+0xf7/0x1c0 [ 1616.253833][T13215] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1616.259760][T13215] RIP: 0033:0x45b349 23:35:15 executing program 2: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 23:35:15 executing program 1: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB='#'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 23:35:15 executing program 4: mkdir(0x0, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba435012283a089fc983e7797f790cc60ad10d95f2a8747c39e41860ddbb79b93206e6f48a9ea06150a16b"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1616.263682][T13215] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1616.283475][T13215] RSP: 002b:00007f87ff7f6c78 EFLAGS: 00000246 ORIG_RAX: 000000000000001e [ 1616.291907][T13215] RAX: ffffffffffffffda RBX: 00007f87ff7f76d4 RCX: 000000000045b349 [ 1616.292817][T13228] kAFS: No cell specified [ 1616.299976][T13215] RDX: 0000000000005000 RSI: 0000000020ff9000 RDI: 0000000000000004 [ 1616.299984][T13215] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1616.299990][T13215] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000006 [ 1616.299995][T13215] R13: 0000000000000af2 R14: 00000000004cbe61 R15: 0000000000000001 23:35:15 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_DEL(r0, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="ac00000002090101000000740000000000000009700002002c000100140003006ed80a0ec3677685b4c446deabbe2e8d14000400000000000000400000000000000000000c00020005000100060000000c000200050001003a00000014000100080001007f000001080002007f000001e891871d58a4030c00020005000100880000000c00040008000500f2ff001f0c000200060003000000000008000500000000150800060000000000"], 0xac}, 0x1, 0x0, 0x0, 0x40081}, 0x40000d0) 23:35:15 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount(&(0x7f00000005c0)=ANY=[@ANYBLOB="23211ff2be"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1616.397647][T13233] kAFS: unparsable volume name 23:35:16 executing program 3 (fault-call:5 fault-nth:2): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) shmat(r2, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffffff) shmat(r2, &(0x7f0000ff9000/0x4000)=nil, 0x5000) 23:35:16 executing program 1: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="2379cfc9a91cad276bdbff988d1c25cc668f3ef074d8f10a177ff4dcdc9f1ae596"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 23:35:16 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1616.489910][T13238] kAFS: No cell specified 23:35:16 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_DEL(r0, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="ac000000020901010000007a0000000000000009700002002c000100140003006ed80a0ec3677685b4c446deabbe2e8d14000400000000000000400000000000000000000c00020005000100060000000c000200050001003a00000014000100080001007f000001080002007f000001e891871d58a4030c00020005000100880000000c00040008000500f2ff001f0c000200060003000000000008000500000000150800060000000000"], 0xac}, 0x1, 0x0, 0x0, 0x40081}, 0x40000d0) 23:35:16 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount(&(0x7f00000005c0)=ANY=[@ANYBLOB="23211ff2be"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1616.581055][ T26] audit: type=1800 audit(1579649716.130:106): pid=13245 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed comm="syz-executor.3" name="SYSV00000000" dev="hugetlbfs" ino=5 res=0 [ 1616.583136][T13245] FAULT_INJECTION: forcing a failure. [ 1616.583136][T13245] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1616.613846][T13245] CPU: 0 PID: 13245 Comm: syz-executor.3 Not tainted 5.5.0-rc7-syzkaller #0 [ 1616.622791][T13245] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1616.632861][T13245] Call Trace: [ 1616.636175][T13245] dump_stack+0x1fb/0x318 [ 1616.640530][T13245] should_fail+0x608/0x770 [ 1616.644977][T13245] should_fail_alloc_page+0x4f/0x60 [ 1616.650200][T13245] prepare_alloc_pages+0x283/0x460 [ 1616.655352][T13245] __alloc_pages_nodemask+0xb2/0x5d0 [ 1616.660647][T13245] ? __kasan_kmalloc+0x183/0x1c0 [ 1616.665646][T13245] kmem_getpages+0x4c/0x930 [ 1616.670187][T13245] cache_grow_begin+0x7e/0x2e0 [ 1616.674991][T13245] ? debug_smp_processor_id+0x9/0x20 23:35:16 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_DEL(r0, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="ac0000000209010100003bda0000000000000009700002002c000100140003006ed80a0ec3677685b4c446deabbe2e8d14000400000000000000400000000000000000000c00020005000100060000000c000200050001003a00000014000100080001007f000001080002007f000001e891871d58a4030c00020005000100880000000c00040008000500f2ff001f0c000200060003000000000008000500000000150800060000000000"], 0xac}, 0x1, 0x0, 0x0, 0x40081}, 0x40000d0) [ 1616.680297][T13245] cache_alloc_refill+0x328/0x400 [ 1616.687362][T13245] ? debug_smp_processor_id+0x9/0x20 [ 1616.692677][T13245] kmem_cache_alloc+0x2b9/0x2e0 [ 1616.697547][T13245] ? __alloc_file+0x2c/0x390 [ 1616.702183][T13245] __alloc_file+0x2c/0x390 [ 1616.706624][T13245] alloc_empty_file+0xac/0x1b0 [ 1616.711416][T13245] alloc_file+0x60/0x4c0 [ 1616.715673][T13245] alloc_file_clone+0x26/0xa0 [ 1616.720366][T13245] do_shmat+0x635/0xc60 [ 1616.724830][T13245] __x64_sys_shmat+0x9a/0x100 [ 1616.729542][T13245] do_syscall_64+0xf7/0x1c0 [ 1616.734092][T13245] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1616.740039][T13245] RIP: 0033:0x45b349 [ 1616.743836][T13251] kAFS: No cell specified [ 1616.743958][T13245] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1616.768020][T13245] RSP: 002b:00007f87ff7f6c78 EFLAGS: 00000246 ORIG_RAX: 000000000000001e 23:35:16 executing program 2: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 23:35:16 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount(&(0x7f00000005c0)=ANY=[@ANYBLOB="23211ff2be2e"], 0x0, &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1616.777230][T13245] RAX: ffffffffffffffda RBX: 00007f87ff7f76d4 RCX: 000000000045b349 [ 1616.783757][T13246] kAFS: No cell specified [ 1616.785346][T13245] RDX: 0000000000005000 RSI: 0000000020ff9000 RDI: 0000000000000005 [ 1616.797668][T13245] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1616.805673][T13245] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000006 [ 1616.813662][T13245] R13: 0000000000000af2 R14: 00000000004cbe61 R15: 0000000000000002 [ 1616.844789][T13254] kAFS: No cell specified 23:35:16 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1616.879978][T13257] kAFS: No cell specified 23:35:16 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_DEL(r0, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="ac00000002090101000000000001000000000009700002002c000100140003006ed80a0ec3677685b4c446deabbe2e8d14000400000000000000400000000000000000000c00020005000100060000000c000200050001003a00000014000100080001007f000001080002007f000001e891871d58a4030c00020005000100880000000c00040008000500f2ff001f0c000200060003000000000008000500000000150800060000000000"], 0xac}, 0x1, 0x0, 0x0, 0x40081}, 0x40000d0) 23:35:16 executing program 2: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 23:35:16 executing program 1: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB='#'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 23:35:16 executing program 3 (fault-call:5 fault-nth:3): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) shmat(r2, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffffff) shmat(r2, &(0x7f0000ff9000/0x4000)=nil, 0x5000) [ 1617.004058][T13263] kAFS: No cell specified 23:35:16 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_DEL(r0, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="ac00000002090101000000000002000000000009700002002c000100140003006ed80a0ec3677685b4c446deabbe2e8d14000400000000000000400000000000000000000c00020005000100060000000c000200050001003a00000014000100080001007f000001080002007f000001e891871d58a4030c00020005000100880000000c00040008000500f2ff001f0c000200060003000000000008000500000000150800060000000000"], 0xac}, 0x1, 0x0, 0x0, 0x40081}, 0x40000d0) 23:35:16 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 23:35:16 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount(&(0x7f00000005c0)=ANY=[@ANYBLOB="23211ff2be2e"], 0x0, &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1617.100354][T13270] kAFS: No cell specified [ 1617.119197][ T26] audit: type=1800 audit(1579649716.660:107): pid=13271 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed comm="syz-executor.3" name="SYSV00000000" dev="hugetlbfs" ino=6 res=0 [ 1617.156415][T13272] kAFS: unparsable volume name 23:35:16 executing program 2: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba435012283a089fc983e779"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 23:35:16 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) shmat(r2, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffffff) shmat(r2, &(0x7f0000ff9000/0x4000)=nil, 0x5000) 23:35:16 executing program 1: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB='#'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 23:35:16 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_DEL(r0, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="ac00000002090101000000000003000000000009700002002c000100140003006ed80a0ec3677685b4c446deabbe2e8d14000400000000000000400000000000000000000c00020005000100060000000c000200050001003a00000014000100080001007f000001080002007f000001e891871d58a4030c00020005000100880000000c00040008000500f2ff001f0c000200060003000000000008000500000000150800060000000000"], 0xac}, 0x1, 0x0, 0x0, 0x40081}, 0x40000d0) [ 1617.281175][T13281] kAFS: No cell specified 23:35:16 executing program 2: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba43"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 23:35:16 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount(&(0x7f00000005c0)=ANY=[@ANYBLOB="23211ff2be2e"], 0x0, &(0x7f0000000180)='afs\x00', 0x0, 0x0) 23:35:16 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1617.355760][ T26] audit: type=1800 audit(1579649716.900:108): pid=13286 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed comm="syz-executor.3" name="SYSV00000000" dev="hugetlbfs" ino=7 res=0 23:35:17 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_DEL(r0, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="ac00000002090101000000000004000000000009700002002c000100140003006ed80a0ec3677685b4c446deabbe2e8d14000400000000000000400000000000000000000c00020005000100060000000c000200050001003a00000014000100080001007f000001080002007f000001e891871d58a4030c00020005000100880000000c00040008000500f2ff001f0c000200060003000000000008000500000000150800060000000000"], 0xac}, 0x1, 0x0, 0x0, 0x40081}, 0x40000d0) 23:35:17 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) shmat(r2, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffffff) shmat(r2, &(0x7f0000ff9000/0x4000)=nil, 0x5002) [ 1617.461098][T13293] kAFS: unparsable volume name 23:35:17 executing program 1: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB='#'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1617.560019][T13302] kAFS: No cell specified [ 1617.579161][T13299] kAFS: Bad value for 'source' 23:35:17 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount(&(0x7f00000005c0)=ANY=[@ANYBLOB="23211ff2be2e"], &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) 23:35:17 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 23:35:17 executing program 2: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba43"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 23:35:17 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_DEL(r0, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="ac00000002090101000000000005000000000009700002002c000100140003006ed80a0ec3677685b4c446deabbe2e8d14000400000000000000400000000000000000000c00020005000100060000000c000200050001003a00000014000100080001007f000001080002007f000001e891871d58a4030c00020005000100880000000c00040008000500f2ff001f0c000200060003000000000008000500000000150800060000000000"], 0xac}, 0x1, 0x0, 0x0, 0x40081}, 0x40000d0) [ 1617.629950][ T26] audit: type=1800 audit(1579649717.170:109): pid=13304 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed comm="syz-executor.3" name="SYSV00000000" dev="hugetlbfs" ino=8 res=0 [ 1617.694501][T13307] kAFS: unparsable volume name 23:35:17 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) ioctl$TIOCNOTTY(r1, 0x5422) r2 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) shmat(r3, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffffff) shmat(r3, &(0x7f0000ff9000/0x4000)=nil, 0x5000) [ 1617.800874][T13316] kAFS: No cell specified 23:35:17 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_DEL(r0, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="ac00000002090101000000000006000000000009700002002c000100140003006ed80a0ec3677685b4c446deabbe2e8d14000400000000000000400000000000000000000c00020005000100060000000c000200050001003a00000014000100080001007f000001080002007f000001e891871d58a4030c00020005000100880000000c00040008000500f2ff001f0c000200060003000000000008000500000000150800060000000000"], 0xac}, 0x1, 0x0, 0x0, 0x40081}, 0x40000d0) 23:35:17 executing program 1: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="2379cfc9a91cad276bdbff988d1c25cc66"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 23:35:17 executing program 2: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba43"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 23:35:17 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount(&(0x7f00000005c0)=ANY=[@ANYBLOB="23211ff2be2e"], &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) [ 1617.868693][T13322] kAFS: Bad value for 'source' 23:35:17 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1617.912157][ T26] audit: type=1800 audit(1579649717.460:110): pid=13323 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed comm="syz-executor.3" name="SYSV00000000" dev="hugetlbfs" ino=10 res=0 [ 1617.999166][T13331] kAFS: No cell specified [ 1618.023631][T13332] kAFS: No cell specified 23:35:17 executing program 3: truncate(&(0x7f0000000000)='./file0\x00', 0x77) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) shmat(r2, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffffff) shmat(r2, &(0x7f0000ff9000/0x4000)=nil, 0x5000) 23:35:17 executing program 1: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB='#'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 23:35:17 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount(&(0x7f00000005c0)=ANY=[@ANYBLOB="23211ff2be2e"], &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) 23:35:17 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_DEL(r0, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="ac00000002090101000000000007000000000009700002002c000100140003006ed80a0ec3677685b4c446deabbe2e8d14000400000000000000400000000000000000000c00020005000100060000000c000200050001003a00000014000100080001007f000001080002007f000001e891871d58a4030c00020005000100880000000c00040008000500f2ff001f0c000200060003000000000008000500000000150800060000000000"], 0xac}, 0x1, 0x0, 0x0, 0x40081}, 0x40000d0) 23:35:17 executing program 2: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba435012283a08"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1618.147365][T13339] kAFS: Bad value for 'source' [ 1618.188730][ T26] audit: type=1800 audit(1579649717.730:111): pid=13345 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed comm="syz-executor.3" name="SYSV00000000" dev="hugetlbfs" ino=12 res=0 [ 1618.213681][T13348] __nla_validate_parse: 26 callbacks suppressed [ 1618.213689][T13348] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.0'. 23:35:17 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x3) r6 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) shmat(r6, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffffff) shmat(r6, &(0x7f0000ff9000/0x4000)=nil, 0x5000) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f0000000000)=0x4, 0x4) [ 1618.241807][T13349] kAFS: unparsable volume name [ 1618.259680][T13348] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. 23:35:17 executing program 2: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba43"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 23:35:17 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 23:35:17 executing program 1: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB='#'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1618.291604][ T26] audit: type=1800 audit(1579649717.780:112): pid=13345 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed comm="syz-executor.3" name="SYSV00000000" dev="hugetlbfs" ino=13 res=0 23:35:18 executing program 5 (fault-call:4 fault-nth:0): mkdir(&(0x7f0000000200)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount(&(0x7f00000005c0)=ANY=[@ANYBLOB="23211ff2be2e"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 23:35:18 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_DEL(r0, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="ac00000002090101000000000008000000000009700002002c000100140003006ed80a0ec3677685b4c446deabbe2e8d14000400000000000000400000000000000000000c00020005000100060000000c000200050001003a00000014000100080001007f000001080002007f000001e891871d58a4030c00020005000100880000000c00040008000500f2ff001f0c000200060003000000000008000500000000150800060000000000"], 0xac}, 0x1, 0x0, 0x0, 0x40081}, 0x40000d0) [ 1618.480448][ T26] audit: type=1800 audit(1579649717.980:113): pid=13362 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed comm="syz-executor.3" name="SYSV00000000" dev="hugetlbfs" ino=14 res=0 [ 1618.491890][T13364] kAFS: unparsable volume name [ 1618.525875][T13366] kAFS: Bad value for 'source' [ 1618.533475][T13369] kAFS: No cell specified 23:35:18 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1618.595334][T13370] FAULT_INJECTION: forcing a failure. [ 1618.595334][T13370] name failslab, interval 1, probability 0, space 0, times 0 [ 1618.601797][T13372] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1618.624293][T13370] CPU: 0 PID: 13370 Comm: syz-executor.5 Not tainted 5.5.0-rc7-syzkaller #0 [ 1618.633318][T13370] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 23:35:18 executing program 1: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB='#'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 23:35:18 executing program 2: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba43"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1618.643682][T13370] Call Trace: [ 1618.646998][T13370] dump_stack+0x1fb/0x318 [ 1618.651364][T13370] should_fail+0x608/0x770 [ 1618.655975][T13370] __should_failslab+0x11a/0x160 [ 1618.660935][T13370] ? __se_sys_mount+0x42/0x110 [ 1618.665836][T13370] should_failslab+0x9/0x20 [ 1618.670448][T13370] __kmalloc_track_caller+0x79/0x340 [ 1618.676214][T13370] strndup_user+0x76/0x150 [ 1618.680826][T13370] __se_sys_mount+0x42/0x110 [ 1618.686391][T13370] __x64_sys_mount+0xbf/0xd0 [ 1618.692477][T13370] do_syscall_64+0xf7/0x1c0 [ 1618.697037][T13370] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1618.702943][T13370] RIP: 0033:0x45b349 [ 1618.706887][T13370] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1618.728673][T13370] RSP: 002b:00007f5a8be38c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1618.737274][T13370] RAX: ffffffffffffffda RBX: 00007f5a8be396d4 RCX: 000000000045b349 23:35:18 executing program 3: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cuse\x00', 0x2, 0x0) write$FUSE_STATFS(r0, &(0x7f0000000040)={0x60, 0x0, 0x8, {{0x3000000000, 0x7, 0x0, 0x3ff, 0xfff, 0x3, 0x6, 0x7}}}, 0x60) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) socket$caif_seqpacket(0x25, 0x5, 0x3) r4 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f00000000c0)={0x2e, 0x4, 0x0, {0x0, 0x4, 0x6, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x2e) shmat(r4, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffffff) shmat(r3, &(0x7f0000000000/0x4000)=nil, 0x0) shmat(r3, &(0x7f0000ff9000/0x4000)=nil, 0x5000) [ 1618.745269][T13370] RDX: 0000000020000180 RSI: 0000000020000140 RDI: 00000000200005c0 [ 1618.753259][T13370] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1618.758121][T13372] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1618.761337][T13370] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000006 [ 1618.761346][T13370] R13: 0000000000000725 R14: 00000000004c8a46 R15: 0000000000000000 [ 1618.825246][T13379] kAFS: Bad value for 'source' [ 1618.851976][ T26] audit: type=1800 audit(1579649718.400:114): pid=13406 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed comm="syz-executor.3" name="SYSV00000000" dev="hugetlbfs" ino=17 res=0 23:35:18 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1618.898858][T13440] kAFS: No cell specified 23:35:18 executing program 5 (fault-call:4 fault-nth:1): mkdir(&(0x7f0000000200)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount(&(0x7f00000005c0)=ANY=[@ANYBLOB="23211ff2be2e"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 23:35:18 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_DEL(r0, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="ac00000002090101000000000009000000000009700002002c000100140003006ed80a0ec3677685b4c446deabbe2e8d14000400000000000000400000000000000000000c00020005000100060000000c000200050001003a00000014000100080001007f000001080002007f000001e891871d58a4030c00020005000100880000000c00040008000500f2ff001f0c000200060003000000000008000500000000150800060000000000"], 0xac}, 0x1, 0x0, 0x0, 0x40081}, 0x40000d0) [ 1618.936624][ T26] audit: type=1800 audit(1579649718.460:115): pid=13406 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed comm="syz-executor.3" name="SYSV00000000" dev="hugetlbfs" ino=19 res=0 23:35:18 executing program 2: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba43"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 23:35:18 executing program 1: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="2379cfc9a91cad276b"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 23:35:18 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_RESET_STATS(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x48, r2, 0x4, 0x70bd2a, 0x25dfdbfd, {}, [@TIPC_NLA_NODE={0x18, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x9}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8}]}, @TIPC_NLA_MEDIA={0x4}, @TIPC_NLA_NODE={0x18, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0xcacc}]}]}, 0x48}, 0x1, 0x0, 0x0, 0x410}, 0x20004000) r3 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) shmat(r3, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffffff) shmat(r3, &(0x7f0000ff9000/0x4000)=nil, 0x5000) [ 1619.042104][T13487] kAFS: Bad value for 'source' 23:35:18 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1619.143846][T13495] kAFS: No cell specified [ 1619.144118][T13493] FAULT_INJECTION: forcing a failure. [ 1619.144118][T13493] name failslab, interval 1, probability 0, space 0, times 0 [ 1619.158338][T13498] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1619.171151][T13496] kAFS: No cell specified 23:35:18 executing program 2: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba43501228"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 23:35:18 executing program 1: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB='#'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1619.175888][ T26] audit: type=1800 audit(1579649718.720:116): pid=13497 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed comm="syz-executor.3" name="SYSV00000000" dev="hugetlbfs" ino=20 res=0 [ 1619.195669][T13498] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1619.254715][T13493] CPU: 1 PID: 13493 Comm: syz-executor.5 Not tainted 5.5.0-rc7-syzkaller #0 [ 1619.263437][T13493] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1619.273508][T13493] Call Trace: [ 1619.276847][T13493] dump_stack+0x1fb/0x318 [ 1619.281203][T13493] should_fail+0x608/0x770 [ 1619.285658][T13493] __should_failslab+0x11a/0x160 [ 1619.290620][T13493] ? __se_sys_mount+0x85/0x110 [ 1619.295403][T13493] should_failslab+0x9/0x20 [ 1619.299925][T13493] __kmalloc_track_caller+0x79/0x340 [ 1619.305238][T13493] strndup_user+0x76/0x150 [ 1619.309686][T13493] __se_sys_mount+0x85/0x110 [ 1619.312677][T13507] kAFS: No cell specified [ 1619.314293][T13493] __x64_sys_mount+0xbf/0xd0 [ 1619.314313][T13493] do_syscall_64+0xf7/0x1c0 [ 1619.314329][T13493] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1619.314347][T13493] RIP: 0033:0x45b349 [ 1619.337706][T13493] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1619.357324][T13493] RSP: 002b:00007f5a8be38c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1619.365749][T13493] RAX: ffffffffffffffda RBX: 00007f5a8be396d4 RCX: 000000000045b349 [ 1619.373824][T13493] RDX: 0000000020000180 RSI: 0000000020000140 RDI: 00000000200005c0 [ 1619.382021][T13493] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1619.390020][T13493] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000006 23:35:18 executing program 2: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba43501228"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 23:35:18 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = shmget$private(0x0, 0x4000, 0x78000000, &(0x7f0000000000/0x4000)=nil) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000040)='NLBL_CALIPSO\x00') shmat(r2, &(0x7f0000000000/0x4000)=nil, 0xffffffffffff9fff) shmat(r2, &(0x7f0000ff9000/0x4000)=nil, 0x5000) ioctl$DRM_IOCTL_RM_MAP(r1, 0x4028641b, &(0x7f0000000000)={0x0, 0x0, 0x5, 0x10, &(0x7f0000ffa000/0x3000)=nil, 0x9}) [ 1619.398007][T13493] R13: 0000000000000725 R14: 00000000004c8a46 R15: 0000000000000001 [ 1619.406787][T13510] kAFS: unparsable volume name 23:35:19 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 23:35:19 executing program 5 (fault-call:4 fault-nth:2): mkdir(&(0x7f0000000200)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount(&(0x7f00000005c0)=ANY=[@ANYBLOB="23211ff2be2e"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 23:35:19 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_DEL(r0, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="ac0000000209010100000000000a000000000009700002002c000100140003006ed80a0ec3677685b4c446deabbe2e8d14000400000000000000400000000000000000000c00020005000100060000000c000200050001003a00000014000100080001007f000001080002007f000001e891871d58a4030c00020005000100880000000c00040008000500f2ff001f0c000200060003000000000008000500000000150800060000000000"], 0xac}, 0x1, 0x0, 0x0, 0x40081}, 0x40000d0) [ 1619.491812][T13514] kAFS: No cell specified 23:35:19 executing program 1: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB='#'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 23:35:19 executing program 2: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba43501228"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1619.577671][T13521] kAFS: No cell specified [ 1619.585770][T13520] FAULT_INJECTION: forcing a failure. [ 1619.585770][T13520] name failslab, interval 1, probability 0, space 0, times 0 [ 1619.657365][T13520] CPU: 1 PID: 13520 Comm: syz-executor.5 Not tainted 5.5.0-rc7-syzkaller #0 [ 1619.666094][T13520] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1619.676169][T13520] Call Trace: [ 1619.676349][T13528] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1619.679471][T13520] dump_stack+0x1fb/0x318 [ 1619.679491][T13520] should_fail+0x608/0x770 [ 1619.679509][T13520] __should_failslab+0x11a/0x160 [ 1619.702626][T13520] ? getname_flags+0xba/0x640 [ 1619.707322][T13520] should_failslab+0x9/0x20 [ 1619.711841][T13520] kmem_cache_alloc+0x56/0x2e0 [ 1619.716628][T13520] getname_flags+0xba/0x640 [ 1619.721164][T13520] user_path_at_empty+0x2d/0x50 [ 1619.726132][T13520] do_mount+0xd4/0x25a0 [ 1619.730360][T13520] ? copy_mount_options+0xdc/0x3c0 [ 1619.735516][T13520] __se_sys_mount+0xdd/0x110 [ 1619.740296][T13520] __x64_sys_mount+0xbf/0xd0 [ 1619.742701][T13528] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. 23:35:19 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) ioctl$ASHMEM_SET_SIZE(0xffffffffffffffff, 0x40087703, 0x1f) ioctl$BLKSECDISCARD(r1, 0x127d, &(0x7f0000000000)=0x2) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) getsockopt$TIPC_IMPORTANCE(r5, 0x10f, 0x7f, &(0x7f0000000040), &(0x7f0000000080)=0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = dup(r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e0000001c0081", 0x7}], 0x1, 0x0, 0x0, 0x10}, 0x0) r9 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r9, &(0x7f0000000080)={0x0, 0x3b, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e0000002e00815be00f80ecdb4cb904064865160800030068000000000004140e000a001500cd5edc2976d153b4", 0x235}], 0x1, 0x0, 0x0, 0xe00}, 0x0) r10 = dup(r6) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) ioctl$VFIO_SET_IOMMU(r10, 0x3b66, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r11 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) shmat(r11, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffffff) shmat(r11, &(0x7f0000ff9000/0x4000)=nil, 0x5000) 23:35:19 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1619.744900][T13520] do_syscall_64+0xf7/0x1c0 [ 1619.744919][T13520] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1619.744934][T13520] RIP: 0033:0x45b349 [ 1619.768632][T13520] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1619.768655][T13531] kAFS: No cell specified [ 1619.788351][T13520] RSP: 002b:00007f5a8be38c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1619.788365][T13520] RAX: ffffffffffffffda RBX: 00007f5a8be396d4 RCX: 000000000045b349 [ 1619.788371][T13520] RDX: 0000000020000180 RSI: 0000000020000140 RDI: 00000000200005c0 [ 1619.788376][T13520] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1619.788382][T13520] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000006 [ 1619.788388][T13520] R13: 0000000000000725 R14: 00000000004c8a46 R15: 0000000000000002 [ 1619.818656][T13532] kAFS: unparsable volume name 23:35:19 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_DEL(r0, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="ac0000000209010100000000000b000000000009700002002c000100140003006ed80a0ec3677685b4c446deabbe2e8d14000400000000000000400000000000000000000c00020005000100060000000c000200050001003a00000014000100080001007f000001080002007f000001e891871d58a4030c00020005000100880000000c00040008000500f2ff001f0c000200060003000000000008000500000000150800060000000000"], 0xac}, 0x1, 0x0, 0x0, 0x40081}, 0x40000d0) 23:35:19 executing program 1: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB='#'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1619.890116][T13536] kAFS: No cell specified 23:35:19 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba435012283a089fc983e7797f790cc60ad10d95f2a8"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 23:35:19 executing program 3: socket$inet6_tcp(0xa, 0x1, 0x0) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x8000, 0x0) ioctl$VIDIOC_G_EXT_CTRLS(r0, 0xc0205647, &(0x7f00000000c0)={0x9d0000, 0x200, 0xc, 0xffffffffffffffff, 0x0, &(0x7f0000000080)={0x9b0942, 0x0, [], @ptr}}) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vsock\x00', 0x10000, 0x0) ioctl$KVM_DEASSIGN_PCI_DEVICE(r2, 0x4040ae72, &(0x7f0000000040)={0x10001, 0x3, 0x1}) dup(0xffffffffffffffff) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x133800, 0x0) getsockopt$inet_mreqsrc(r3, 0x0, 0x26, &(0x7f0000000140)={@multicast1, @initdev, @multicast2}, &(0x7f0000000180)=0xc) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x4) r4 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) connect$nfc_raw(r6, &(0x7f0000000300)={0x27, 0x1, 0x1, 0x5}, 0x10) shmat(r4, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffffff) r7 = shmget$private(0x0, 0x2000, 0x80, &(0x7f0000002000/0x2000)=nil) shmctl$SHM_UNLOCK(r7, 0xc) ioctl$SOUND_MIXER_READ_RECMASK(r1, 0x80044dfd, &(0x7f00000002c0)) shmat(r4, &(0x7f0000ff9000/0x4000)=nil, 0x5000) setsockopt$CAIFSO_REQ_PARAM(r1, 0x116, 0x80, &(0x7f00000001c0)="b7f4ef7e296c3e9f570af759b8bf3af0bee2dc02bce9e23e6d877c4730833fb1a454cf38dad7544e9844c29cf1b1e483265ad7332c50cdd9f1fd49c148735236debcb4eec59981781778b12136990809d5e57f17c66b31b9b300dcf5936dbe7c9cdefac628e294344959d3789831acae726b24195c74459553b8cf3ab4e7da09816a3782d121a39eed1d530aa6dd6b6282dbb37af3d05e8a5ec311a870bfd2300aba9d16314b3bee609d4cf670a08cd94bbf6697af6da9181d239184c4f0095d", 0xc0) 23:35:19 executing program 2: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba435012283a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 23:35:19 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1620.023420][T13544] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1620.058807][T13544] validate_nla: 58 callbacks suppressed [ 1620.058813][T13544] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 1620.170462][T13544] netlink: 'syz-executor.0': attribute type 2 has an invalid length. [ 1620.187352][T13653] kAFS: No cell specified 23:35:19 executing program 5 (fault-call:4 fault-nth:3): mkdir(&(0x7f0000000200)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount(&(0x7f00000005c0)=ANY=[@ANYBLOB="23211ff2be2e"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 23:35:19 executing program 1: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="2379cfc9a9"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 23:35:19 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1620.220513][T13544] netlink: 'syz-executor.0': attribute type 2 has an invalid length. 23:35:19 executing program 2: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba43501228"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1620.291020][T13544] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 1620.299308][T13544] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. 23:35:19 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) shmget(0x3, 0x4000, 0x80, &(0x7f0000000000/0x4000)=nil) r3 = shmget$private(0x0, 0x1000, 0x4, &(0x7f0000fff000/0x1000)=nil) shmat(r3, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffffff) shmat(r3, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffbfff) shmat(r2, &(0x7f0000ff9000/0x4000)=nil, 0x5000) [ 1620.351004][T13661] kAFS: No cell specified [ 1620.382807][T13664] FAULT_INJECTION: forcing a failure. [ 1620.382807][T13664] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1620.386582][T13666] kAFS: No cell specified [ 1620.396503][T13664] CPU: 0 PID: 13664 Comm: syz-executor.5 Not tainted 5.5.0-rc7-syzkaller #0 [ 1620.396511][T13664] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1620.396515][T13664] Call Trace: [ 1620.396537][T13664] dump_stack+0x1fb/0x318 [ 1620.396555][T13664] should_fail+0x608/0x770 23:35:20 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_DEL(r0, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="ac0000000209010100000000000c000000000009700002002c000100140003006ed80a0ec3677685b4c446deabbe2e8d14000400000000000000400000000000000000000c00020005000100060000000c000200050001003a00000014000100080001007f000001080002007f000001e891871d58a4030c00020005000100880000000c00040008000500f2ff001f0c000200060003000000000008000500000000150800060000000000"], 0xac}, 0x1, 0x0, 0x0, 0x40081}, 0x40000d0) [ 1620.396572][T13664] should_fail_alloc_page+0x4f/0x60 [ 1620.396583][T13664] prepare_alloc_pages+0x283/0x460 [ 1620.396598][T13664] __alloc_pages_nodemask+0xb2/0x5d0 [ 1620.396609][T13664] ? __kasan_kmalloc+0x183/0x1c0 [ 1620.396623][T13664] kmem_getpages+0x4c/0x930 [ 1620.396636][T13664] cache_grow_begin+0x7e/0x2e0 [ 1620.396647][T13664] ? debug_smp_processor_id+0x9/0x20 [ 1620.396660][T13664] cache_alloc_refill+0x328/0x400 [ 1620.396671][T13664] ? debug_smp_processor_id+0x9/0x20 23:35:20 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1620.396684][T13664] kmem_cache_alloc+0x2b9/0x2e0 [ 1620.396692][T13664] ? getname_flags+0xba/0x640 [ 1620.396703][T13664] getname_flags+0xba/0x640 [ 1620.396718][T13664] user_path_at_empty+0x2d/0x50 [ 1620.396729][T13664] do_mount+0xd4/0x25a0 [ 1620.396744][T13664] ? copy_mount_options+0xdc/0x3c0 [ 1620.396757][T13664] __se_sys_mount+0xdd/0x110 [ 1620.396768][T13664] __x64_sys_mount+0xbf/0xd0 [ 1620.396783][T13664] do_syscall_64+0xf7/0x1c0 [ 1620.396797][T13664] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1620.396807][T13664] RIP: 0033:0x45b349 [ 1620.396820][T13664] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1620.396825][T13664] RSP: 002b:00007f5a8be38c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1620.396840][T13664] RAX: ffffffffffffffda RBX: 00007f5a8be396d4 RCX: 000000000045b349 [ 1620.507569][T13668] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 23:35:20 executing program 1: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB='#'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1620.508031][T13664] RDX: 0000000020000180 RSI: 0000000020000140 RDI: 00000000200005c0 [ 1620.508039][T13664] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1620.508047][T13664] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000006 [ 1620.508060][T13664] R13: 0000000000000725 R14: 00000000004c8a46 R15: 0000000000000003 [ 1620.534781][T13670] kAFS: No cell specified 23:35:20 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VIDIOC_CREATE_BUFS(r3, 0xc100565c, &(0x7f0000000040)={0xffffffff, 0x612, 0x2, {0x8, @pix={0x7, 0x8, 0x20343059, 0x9, 0x4, 0x19e0, 0x7, 0x10000, 0x1, 0x1, 0x1, 0x3}}, 0x100}) r4 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) shmat(r4, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffffff) shmat(r4, &(0x7f0000ff9000/0x4000)=nil, 0x5000) syz_open_dev$cec(&(0x7f0000000140)='/dev/cec#\x00', 0x1, 0x2) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000001c0)='/dev/cec#\x00', r6}, 0x10) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000280)={&(0x7f0000000240)='./file0\x00', r2}, 0x10) r7 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/qat_adf_ctl\x00', 0x4002, 0x0) close(r7) [ 1620.640454][T13668] netlink: 'syz-executor.0': attribute type 2 has an invalid length. [ 1620.648642][T13668] netlink: 'syz-executor.0': attribute type 2 has an invalid length. [ 1620.665420][T13668] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 1620.674835][T13674] kAFS: No cell specified 23:35:20 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_DEL(r0, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="ac0000000209010100000000000d000000000009700002002c000100140003006ed80a0ec3677685b4c446deabbe2e8d14000400000000000000400000000000000000000c00020005000100060000000c000200050001003a00000014000100080001007f000001080002007f000001e891871d58a4030c00020005000100880000000c00040008000500f2ff001f0c000200060003000000000008000500000000150800060000000000"], 0xac}, 0x1, 0x0, 0x0, 0x40081}, 0x40000d0) [ 1620.694544][T13676] kAFS: unparsable volume name 23:35:20 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba435012283a089fc983e779"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 23:35:20 executing program 1: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB='#'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1620.779571][T13681] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 1620.798090][T13681] netlink: 'syz-executor.0': attribute type 2 has an invalid length. [ 1620.821972][T13684] kAFS: unparsable volume name [ 1620.901573][T13664] kAFS: No cell specified 23:35:20 executing program 5 (fault-call:4 fault-nth:4): mkdir(&(0x7f0000000200)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount(&(0x7f00000005c0)=ANY=[@ANYBLOB="23211ff2be2e"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 23:35:20 executing program 2: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba43501228"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 23:35:20 executing program 3: r0 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x8001, 0x80001) ioctl$PIO_UNISCRNMAP(r0, 0x4b6a, &(0x7f0000000040)="cd209d8f74d15dce3fd5667f257f8c42eaf0e78ebc60386d0710215028af78a61f74cd6bd2a31e94ea855fc6") socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = shmget$private(0x0, 0x1000, 0x800, &(0x7f0000ffd000/0x1000)=nil) shmat(r3, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffffff) shmat(r3, &(0x7f0000ff9000/0x4000)=nil, 0x5000) 23:35:20 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_DEL(r0, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="ac0000000209010100000000000e000000000009700002002c000100140003006ed80a0ec3677685b4c446deabbe2e8d14000400000000000000400000000000000000000c00020005000100060000000c000200050001003a00000014000100080001007f000001080002007f000001e891871d58a4030c00020005000100880000000c00040008000500f2ff001f0c000200060003000000000008000500000000150800060000000000"], 0xac}, 0x1, 0x0, 0x0, 0x40081}, 0x40000d0) 23:35:20 executing program 1: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB='#'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 23:35:20 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba43"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 23:35:20 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_DEL(r0, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="ac0000000209010100000000000f000000000009700002002c000100140003006ed80a0ec3677685b4c446deabbe2e8d14000400000000000000400000000000000000000c00020005000100060000000c000200050001003a00000014000100080001007f000001080002007f000001e891871d58a4030c00020005000100880000000c00040008000500f2ff001f0c000200060003000000000008000500000000150800060000000000"], 0xac}, 0x1, 0x0, 0x0, 0x40081}, 0x40000d0) [ 1621.062226][T13697] kAFS: No cell specified [ 1621.065388][T13698] kAFS: No cell specified [ 1621.072340][T13699] kAFS: unparsable volume name 23:35:20 executing program 2: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba43501228"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 23:35:20 executing program 1: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="2379cf"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 23:35:20 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba43"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1621.125827][T13702] FAULT_INJECTION: forcing a failure. [ 1621.125827][T13702] name failslab, interval 1, probability 0, space 0, times 0 [ 1621.260464][T13702] CPU: 0 PID: 13702 Comm: syz-executor.5 Not tainted 5.5.0-rc7-syzkaller #0 [ 1621.272319][T13702] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1621.276439][T13713] kAFS: No cell specified [ 1621.282396][T13702] Call Trace: [ 1621.282422][T13702] dump_stack+0x1fb/0x318 [ 1621.282441][T13702] should_fail+0x608/0x770 [ 1621.282458][T13702] __should_failslab+0x11a/0x160 [ 1621.282471][T13702] ? tomoyo_encode2+0x262/0x580 [ 1621.282483][T13702] should_failslab+0x9/0x20 [ 1621.282496][T13702] __kmalloc+0x7a/0x340 [ 1621.282509][T13702] tomoyo_encode2+0x262/0x580 [ 1621.282523][T13702] tomoyo_encode+0x29/0x40 [ 1621.282535][T13702] tomoyo_mount_permission+0x216/0xa30 [ 1621.282547][T13702] ? debug_smp_processor_id+0x9/0x20 [ 1621.282560][T13702] ? filename_lookup+0x4b0/0x690 [ 1621.282577][T13702] ? kmem_cache_free+0xd8/0xf0 [ 1621.313739][T13711] kAFS: No cell specified [ 1621.317424][T13702] tomoyo_sb_mount+0x35/0x40 [ 1621.317440][T13702] security_sb_mount+0x6f/0xd0 [ 1621.317456][T13702] do_mount+0x107/0x25a0 [ 1621.364987][T13702] ? copy_mount_options+0xdc/0x3c0 [ 1621.370225][T13702] __se_sys_mount+0xdd/0x110 [ 1621.374857][T13702] __x64_sys_mount+0xbf/0xd0 [ 1621.379493][T13702] do_syscall_64+0xf7/0x1c0 [ 1621.384014][T13702] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1621.389920][T13702] RIP: 0033:0x45b349 23:35:21 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba43"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 23:35:21 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_DEL(r0, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="ac00000002090101000000000010000000000009700002002c000100140003006ed80a0ec3677685b4c446deabbe2e8d14000400000000000000400000000000000000000c00020005000100060000000c000200050001003a00000014000100080001007f000001080002007f000001e891871d58a4030c00020005000100880000000c00040008000500f2ff001f0c000200060003000000000008000500000000150800060000000000"], 0xac}, 0x1, 0x0, 0x0, 0x40081}, 0x40000d0) [ 1621.393824][T13702] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1621.413438][T13702] RSP: 002b:00007f5a8be38c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1621.421949][T13702] RAX: ffffffffffffffda RBX: 00007f5a8be396d4 RCX: 000000000045b349 [ 1621.429926][T13702] RDX: 0000000020000180 RSI: 0000000020000140 RDI: 00000000200005c0 [ 1621.438164][T13702] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1621.446149][T13702] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000006 [ 1621.454133][T13702] R13: 0000000000000725 R14: 00000000004c8a46 R15: 0000000000000004 23:35:21 executing program 5 (fault-call:4 fault-nth:5): mkdir(&(0x7f0000000200)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount(&(0x7f00000005c0)=ANY=[@ANYBLOB="23211ff2be2e"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 23:35:21 executing program 2: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba435012283a"], 0x0, &(0x7f0000000180)='afs\x00', 0x0, 0x0) 23:35:21 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000000000), 0x4) sendmsg$key(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x2, 0xd, 0xff, 0x8, 0x5, 0x0, 0x70bd2b, 0x25dfdbfc, [@sadb_address={0x3, 0x7, 0x3c, 0xa0, 0x0, @in={0x2, 0x4e24, @broadcast}}]}, 0x28}}, 0x0) r3 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r5, 0x84, 0xf, &(0x7f00000001c0)={0x0, @in6={{0xa, 0x4e24, 0x3ff, @mcast2, 0x2}}, 0x80, 0x6, 0x100, 0x8, 0x6}, &(0x7f0000000100)=0x98) shmat(r3, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffffff) r6 = add_key$keyring(&(0x7f0000000980)='keyring\x00', &(0x7f00000007c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) r7 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000a00)="46ac5128da090e4899c34a28efeb85968ead969e21e33725a7edc030260cdb3ca79964a6e93ce51185f005b7dac052cb797af438c32c29b736fb12c63dd0e504445044a1ae9c10fd8171232ed7dcb08e9acaf4c569c4c1805c47994118fc35ff7f03407dc7093fa7d3132d276a10768b2711cd1c6ecd3545692431856b6e0651412ff7b73711097f061a1b67f6c3d7605eab3b675b6c061e6ef32b7ea8847b6f84da1334d35322b94447bfaca74b152eb64cfa54cb63126c2cc662e7898e6459ed40c4566403f303d341c9c34c6049d9f8e1c2a9483f003c20e66886d0e1629f498668c202f183de294d03da07c9f5feb65bc196554a79a2f255828c1f1cf9a09654f9df849443e8d290debcc78efbdca391a348b33f18ef618011273faa1f095298dd71db08a90e177a1e9a0c771deca3b51670a26850b89d4439574328c19d9e91766dd52169e0ad5011e4acc005861b3b3146d67445e6f6c75ce4af9d8db6963887d79113613267c5bc42fb0aca828590fb291ce8836d3cd391d364efdbb7015d8ec643d83b623380c21c6ebbf774498c94e60838a45d4692bfe73aaea2bbcecb6dcec20e5aa48a950428e2372009212f2f6be608cdec5ff84108f3f3d2e42c99a6d4cd4577ec9f39a51533efe71d494ccadb66eddd4cc0e56b33eefb0ada68ae36c905a977d9042a63299d2130f4e85357b0078c31bc45b00f5ccd879a6735d85882bfddbc6f2cff4a2b976b29e5a8adc74893c748b297a660ba0f64ad8a6ac6fcf180b6a4357ad6733cb75035cd58631142bd720cf52bcd1438647cbe1058e32d33c38f1327bef3f6b1c815ab4f2d47366473ae37c65a2d1df88823dd4c326d640c50e5bddfa976f04cd034331b632cd7a8bbc838081f28f6e24ed646721cea36e56501f9085e428a6c94b7ba5431f59651f36c8f715e4547ffed53c03cc58d2d4382193625cf69c197c4eb3c3c86c291d693837ab7eb23d61d2518379f0c61acf67425afa1ff8d1fac196a7ef9f6f9b514a2028ae010d1bf10833940294c400401ec706ce366dc4c62f6c55c6985a31592360cc7e6cc30a90cae1891b4cffb882b0329457503055db6a8e3b651b3302c24e6d149e8368ee6d3bafbc417256d042b4b87cb1bf46169ad1a593da66b2c6f453180f2c51be35c431e1af07e54c1251334415135422fa81b015a7a746c1979827e3d32057d408016cdc2b641a42626bbf8b7970a5638e9e48783ff80ded5b5184b69d41e60ba9e2ff7ef3e85b4419db2b064d64f833dc2035a6cc3ea28335ad94eb5ba974d9799ce94565559e6a7636b725c4c3dc1702af3c0f3d9dc77f6d404b7c8ff2cec1b4e703451a1d2750d9a22e9f4b5e27da765d228f09bbd30088ac9dff793ec759161849cf4217f5684bff8eddd65be61d3ed2dcc7bae8ab5e1260c3a90cdb37626c4871098802b34f271d8a091b0517bd1588b43cf21b2e3fe676e34d115a56d450d50a97ac7e2ea5904f9695dbde822dba41ac3a1190d63ef486a1829d38b005f9458a82533a555a2f674eea95af7ef7f0cf9654e0ed8d2ab722ca065fd97e6518b76a39cc1b04dc49c395f3aad5e05c76c1881f6a85fee6c6fba8340692eb0b7f3f948350e6947dac635cfef9e4ff4d3f756802cbd97e8c5845b25bc5a021d9875277f197d1bce55661e6961dd788a444962e33fa582a01d0bd61aaa22a76adf68b3169d3f0b49", 0x1001, r6) keyctl$read(0xb, r7, &(0x7f0000005340)=""/4096, 0xd900) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f00000002c0)={r7, 0xaf, 0xb1}, &(0x7f0000000300)={'enc=', 'pkcs1', ' hash=', {'sha384-avx\x00'}}, &(0x7f0000000380)="6be2e5ee807bdf383e3008dedda4b81f486cacd6ea75f79908f07ef348703bc423a2770c4b8e94e925bc52832ce75ab3d55b8395a7573d6b9c01a5edf14733e7db252921918f4e41fd26f4bcb66deb04abb6f6993d0b36dc93342e1a68bc5cac4195104a7e73f24827bad71c775b18e7ff829c3d5c76516dcd5c6e35997a75287e5fa5302b970a54c0ffbce29ccd931d746f4fe2be701a948d31bc51069a597e1db0c138de1db3043e9c55baa9393e", &(0x7f0000000440)=""/177) shmat(r3, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffffff) r8 = openat$null(0xffffffffffffff9c, &(0x7f0000000140)='/dev/null\x00', 0x4ba0, 0x0) ioctl$UFFDIO_REGISTER(r8, 0xc020aa00, &(0x7f0000000280)={{&(0x7f0000ff9000/0x1000)=nil, 0x1000}}) shmat(r2, &(0x7f0000ff9000/0x4000)=nil, 0x5000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r10 = dup(r9) ioctl$VIDIOC_G_CROP(r1, 0xc014563b, &(0x7f0000000540)={0x3, {0x0, 0xeb5, 0x2, 0x1}}) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) ioctl$DRM_IOCTL_WAIT_VBLANK(r10, 0xc018643a, &(0x7f0000000500)={0x10000000, 0x7, 0x1e}) 23:35:21 executing program 1: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="2379cf"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 23:35:21 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_DEL(r0, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="ac00000002090101000000000011000000000009700002002c000100140003006ed80a0ec3677685b4c446deabbe2e8d14000400000000000000400000000000000000000c00020005000100060000000c000200050001003a00000014000100080001007f000001080002007f000001e891871d58a4030c00020005000100880000000c00040008000500f2ff001f0c000200060003000000000008000500000000150800060000000000"], 0xac}, 0x1, 0x0, 0x0, 0x40081}, 0x40000d0) [ 1621.519866][T13819] kAFS: No cell specified 23:35:21 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba435012283a08"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 23:35:21 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_DEL(r0, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="ac00000002090101000000000012000000000009700002002c000100140003006ed80a0ec3677685b4c446deabbe2e8d14000400000000000000400000000000000000000c00020005000100060000000c000200050001003a00000014000100080001007f000001080002007f000001e891871d58a4030c00020005000100880000000c00040008000500f2ff001f0c000200060003000000000008000500000000150800060000000000"], 0xac}, 0x1, 0x0, 0x0, 0x40081}, 0x40000d0) 23:35:21 executing program 2: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba435012283a"], 0x0, &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1621.714126][T13864] FAULT_INJECTION: forcing a failure. [ 1621.714126][T13864] name failslab, interval 1, probability 0, space 0, times 0 [ 1621.761737][T13864] CPU: 0 PID: 13864 Comm: syz-executor.5 Not tainted 5.5.0-rc7-syzkaller #0 [ 1621.770486][T13864] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1621.780727][T13864] Call Trace: [ 1621.784043][T13864] dump_stack+0x1fb/0x318 [ 1621.788398][T13864] should_fail+0x608/0x770 [ 1621.792851][T13864] __should_failslab+0x11a/0x160 [ 1621.797814][T13864] ? tomoyo_realpath_from_path+0xe8/0x6b0 [ 1621.803557][T13864] should_failslab+0x9/0x20 [ 1621.808083][T13864] __kmalloc+0x7a/0x340 [ 1621.812263][T13864] ? tomoyo_realpath_from_path+0xdb/0x6b0 [ 1621.818006][T13864] ? kfree+0x1f/0x220 [ 1621.822013][T13864] tomoyo_realpath_from_path+0xe8/0x6b0 [ 1621.827683][T13864] tomoyo_mount_permission+0x294/0xa30 [ 1621.833162][T13864] ? debug_smp_processor_id+0x9/0x20 [ 1621.838470][T13864] ? filename_lookup+0x4b0/0x690 [ 1621.843436][T13864] ? kmem_cache_free+0xd8/0xf0 [ 1621.848245][T13864] tomoyo_sb_mount+0x35/0x40 [ 1621.852858][T13864] security_sb_mount+0x6f/0xd0 [ 1621.857646][T13864] do_mount+0x107/0x25a0 23:35:21 executing program 2: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba435012283a"], 0x0, &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1621.861915][T13864] ? copy_mount_options+0xdc/0x3c0 [ 1621.867080][T13864] __se_sys_mount+0xdd/0x110 [ 1621.871704][T13864] __x64_sys_mount+0xbf/0xd0 [ 1621.876318][T13864] do_syscall_64+0xf7/0x1c0 [ 1621.880845][T13864] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1621.886745][T13864] RIP: 0033:0x45b349 [ 1621.890657][T13864] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 23:35:21 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_DEL(r0, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="ac00000002090101000000000013000000000009700002002c000100140003006ed80a0ec3677685b4c446deabbe2e8d14000400000000000000400000000000000000000c00020005000100060000000c000200050001003a00000014000100080001007f000001080002007f000001e891871d58a4030c00020005000100880000000c00040008000500f2ff001f0c000200060003000000000008000500000000150800060000000000"], 0xac}, 0x1, 0x0, 0x0, 0x40081}, 0x40000d0) 23:35:21 executing program 1: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="2379cf"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 23:35:21 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) shmat(r2, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffffff) shmat(r2, &(0x7f0000ff9000/0x4000)=nil, 0x0) [ 1621.910731][T13864] RSP: 002b:00007f5a8be38c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1621.919246][T13864] RAX: ffffffffffffffda RBX: 00007f5a8be396d4 RCX: 000000000045b349 [ 1621.927270][T13864] RDX: 0000000020000180 RSI: 0000000020000140 RDI: 00000000200005c0 [ 1621.935353][T13864] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1621.943346][T13864] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000006 [ 1621.951339][T13864] R13: 0000000000000725 R14: 00000000004c8a46 R15: 0000000000000005 [ 1622.050626][T13864] ERROR: Out of memory at tomoyo_realpath_from_path. [ 1622.070036][T13951] kAFS: No cell specified 23:35:21 executing program 5 (fault-call:4 fault-nth:6): mkdir(&(0x7f0000000200)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount(&(0x7f00000005c0)=ANY=[@ANYBLOB="23211ff2be2e"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 23:35:21 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba43"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 23:35:21 executing program 2: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba435012283a"], &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) 23:35:21 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_DEL(r0, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="ac00000002090101000000000014000000000009700002002c000100140003006ed80a0ec3677685b4c446deabbe2e8d14000400000000000000400000000000000000000c00020005000100060000000c000200050001003a00000014000100080001007f000001080002007f000001e891871d58a4030c00020005000100880000000c00040008000500f2ff001f0c000200060003000000000008000500000000150800060000000000"], 0xac}, 0x1, 0x0, 0x0, 0x40081}, 0x40000d0) 23:35:21 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) shmat(r2, &(0x7f0000ff9000/0x4000)=nil, 0x5000) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001500)='/dev/hwrng\x00', 0x40000, 0x0) write$vhci(r3, &(0x7f0000001540)=@HCI_ACLDATA_PKT={0x2, "0452"}, 0x3) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) connect$bt_rfcomm(r5, &(0x7f00000014c0)={0x1f, @fixed={[], 0x11}, 0xa5}, 0xa) r6 = fspick(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x1) vmsplice(r6, &(0x7f0000001400)=[{&(0x7f0000000040)="cc790e6371b02eebb8c5fae859b46dae9df97248e89837c196e28fc4c539dc3e25a8b99be863a4884701859fa23032cdd3edb17764882b44050dbaf0b54ec3cc006e1d55a3f7ae61c9730806dab11488eb31382d772dd31139907a4e504b52e1b6e8067e7e11155bf7bb014530159cafc9dde6d3ab102dbd69f3cb02decee1f54255da436f491e72ccc13a9b4c9d74c729740e532f88cff8421bf1705c6fc3241a", 0xa1}, {&(0x7f0000000100)="43e2e9d6221ba188fb0c1d01c5aeb0ffee08875868de5d5c8c37f4945c5323325abf714eba64ba8bf1d1265711fa0bc7523d2a68fa650e3fdfea047b138d8a0daff216ec03590333ab209a3d20eb895177ce01", 0x53}, {&(0x7f00000001c0)="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", 0x1000}, {&(0x7f00000011c0)="4cb8da6074c0cdb621c16a331b6f8bb211c9d477abd3a8b38e27a11a50dd90be3f14c0d0429e3b403c6480f220f3a8ad1335c47cdffd2310ca103a7d1d89c7a942af8b07db743278cd85c7f007042255179c4d", 0x53}, {&(0x7f0000001240)="c8", 0x1}, {&(0x7f0000001280)="3733bce959e818e16ca6871bcac97998bd9a33794335b74aa2ef96bab9197e065812ab129b7d9369d2fbf3de49a4fca997440fb4b21b909728a0efc0ee79d36b3c575c822eabb270c80b563b80101f0680fa9128e920a9e1cedf709997374a1710896e78cc9daf968bc4712c727010b06b6be66a30eed987d072ff", 0x7b}, {&(0x7f0000001300)="dd6b11c09d033e0b6103a81a077e60f6e2127d93ed9ba45c81c47a617e85e9cc6833ae8a63491e348dee0aea7ce644ce25e716a6c9a62084908199644656182cd25349dff032806827fa57240781fe784915652eaa2edc01e61b61e6f1715c02a416ec2dc64a2746cb49eba13c7d92d621118a42a0ec5943342038b90f19", 0x7e}, {&(0x7f0000001380)="c23f1376c5dda8fec298009d5cefca203aea7a6a9a02406401825d9d80", 0x1d}, {&(0x7f00000013c0)="a259a8ed7d8d", 0x6}], 0x9, 0x1) 23:35:21 executing program 1: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB='#'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 23:35:21 executing program 2: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba435012283a"], &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) [ 1622.270994][T13965] kAFS: No cell specified [ 1622.291061][T13968] kAFS: unparsable volume name 23:35:21 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_DEL(r0, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="ac00000002090101000000000020000000000009700002002c000100140003006ed80a0ec3677685b4c446deabbe2e8d14000400000000000000400000000000000000000c00020005000100060000000c000200050001003a00000014000100080001007f000001080002007f000001e891871d58a4030c00020005000100880000000c00040008000500f2ff001f0c000200060003000000000008000500000000150800060000000000"], 0xac}, 0x1, 0x0, 0x0, 0x40081}, 0x40000d0) [ 1622.312078][T13969] FAULT_INJECTION: forcing a failure. [ 1622.312078][T13969] name failslab, interval 1, probability 0, space 0, times 0 23:35:21 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba43"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 23:35:21 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @dev, 0x2008}, 0x1c) listen(r0, 0x0) r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2008}, 0x1c) listen(r1, 0x0) r2 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2008}, 0x1c) listen(r2, 0x0) r3 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2008}, 0x1c) listen(r3, 0x0) r4 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r4, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2008}, 0x1c) listen(r4, 0x0) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) shmat(r6, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffffff) shmat(r6, &(0x7f0000ff9000/0x4000)=nil, 0x5000) [ 1622.380455][T13969] CPU: 1 PID: 13969 Comm: syz-executor.5 Not tainted 5.5.0-rc7-syzkaller #0 [ 1622.389182][T13969] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1622.399453][T13969] Call Trace: [ 1622.402769][T13969] dump_stack+0x1fb/0x318 [ 1622.407124][T13969] should_fail+0x608/0x770 [ 1622.411592][T13969] __should_failslab+0x11a/0x160 [ 1622.416558][T13969] ? tomoyo_encode2+0x262/0x580 [ 1622.421435][T13969] should_failslab+0x9/0x20 [ 1622.425971][T13969] __kmalloc+0x7a/0x340 23:35:22 executing program 1: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB='#'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1622.430164][T13969] ? __kasan_check_write+0x14/0x20 [ 1622.435299][T13969] tomoyo_encode2+0x262/0x580 [ 1622.440005][T13969] tomoyo_encode+0x29/0x40 [ 1622.444589][T13969] tomoyo_mount_permission+0x3ff/0xa30 [ 1622.450082][T13969] ? debug_smp_processor_id+0x9/0x20 [ 1622.455423][T13969] ? kmem_cache_free+0xd8/0xf0 [ 1622.460248][T13969] tomoyo_sb_mount+0x35/0x40 [ 1622.464872][T13969] security_sb_mount+0x6f/0xd0 [ 1622.469673][T13969] do_mount+0x107/0x25a0 [ 1622.473957][T13969] ? copy_mount_options+0xdc/0x3c0 [ 1622.479100][T13969] __se_sys_mount+0xdd/0x110 [ 1622.483809][T13969] __x64_sys_mount+0xbf/0xd0 [ 1622.488444][T13969] do_syscall_64+0xf7/0x1c0 [ 1622.493112][T13969] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1622.499031][T13969] RIP: 0033:0x45b349 [ 1622.502973][T13969] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1622.522711][T13969] RSP: 002b:00007f5a8be38c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 23:35:22 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) r3 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) shmat(r3, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffffff) shmat(r3, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffffff) r4 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x0, 0x200c1) ioctl$BLKPBSZGET(r4, 0x127b, &(0x7f0000000040)) shmat(r2, &(0x7f0000ff9000/0x4000)=nil, 0x5000) sendmsg$kcm(r1, &(0x7f0000001540)={&(0x7f0000000080)=@l2={0x1f, 0x4, @fixed={[], 0x11}, 0x5, 0x1}, 0x80, &(0x7f0000000140)=[{&(0x7f0000000100)="51d9c48cb684e22e26cc0ac04a68762e2c9dcde3b0135d1f7bdcf6eb2fd025bd5d91f95f", 0x24}, {&(0x7f00000001c0)="8bf0bcfd29737539485588dc0ee0a82ce044a55a8c5a56153201a7887d3054c48b44f7e695e84f4900acbf70f3cfcae850384a5a4d88c23954ecffc1e6d101ae4fcf8775528715967a3b7f307908fe95ed11f48ac19fa4b36616dcf9cf51ba7dfdc10c6fb1284c623c5d66fe927486e7cb4433beb974ea010115e3ef04bd4b9e2df712f595996ed8c33b91166662ca9c6e99de9562eb1653cbd1fb4344094dca56e49f6fa391f2894d", 0xa9}, {&(0x7f0000000280)="30c9946d4ee17aa2c67816e439d7f5e0b1822106e5a3f7ff15bb6f340c3f9e61719b221c5f25fce95dec6d5c339a8f852d0bef3dd3c19956a182a836f39543d5fb19affada2b06cb843c0b409cb9a0841de187c94ce0c89d2844121611fb9fae6ac3bce6", 0x64}, {&(0x7f0000000300)="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", 0x1000}], 0x4, &(0x7f0000001300)=[{0x88, 0x10f, 0x7, "cf49a83dcfdca8f176003bdad1f48362c44896528c91ce15d316f56def94d2d75f194b42f2b23c18b201ba6a5d8e461532ef24dd4ca789b7d290e5e6ee6809caadccf64e87aa78123d39cc8665db8de78ddb1475df2c32a642b5e0fcc004c3e295d1432ad0c28fed0dfcab39bb374cd350265fffb8"}, {0xe8, 0x3a, 0x8001, "0b3d2c38d5b2bd336a93a6cb1d01ea131c38fa19fa9343f9c3a45a78b5384f80e5432266807c371004addf4f7a0bc4c73d3d35512b80c4e561167927244dc02cc957b81bcf0af18e784164f5702159d62f149e02efa663696b84f890aeb0eaf73e8afb82033296446f56cbd394954e2decb69967c30c051400dfc811f89edf763dd803448e2b24215e6dfa389591bc199b747861f549dc337a5d1aaf8b333489ac74bf913cea6ff53bc250fbf1de528fc5c843afc9dd97a1faa1cea3fe5a53fb6a2f342e4768a5b2a056aed4a2c9e13e9b87ad0bbc21"}, {0x50, 0x115, 0x5, "d9492180b0641cc2d3cc1ca46e1d542ac9efa74fd495ae8584a0607e72ca09a164394e1a21ca0722d9a28c962953f526d0524a2d51d244b6cb7cf404f0"}, {0x70, 0x110, 0x21b7, "8409ac5782231857d8c5e6b1269c3f784abc4ca708336ba2c9e765415493c31f70eb9e3535a568bb02414424a5ff981576504f7ef049b4bc15dc14b1d0d97e9e6920512a673b8ed3d1336f78f4ae2348839c89c849f16f05dc5ccab7"}], 0x230}, 0x4000800) [ 1622.531144][T13969] RAX: ffffffffffffffda RBX: 00007f5a8be396d4 RCX: 000000000045b349 [ 1622.539137][T13969] RDX: 0000000020000180 RSI: 0000000020000140 RDI: 00000000200005c0 [ 1622.547130][T13969] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1622.555136][T13969] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000006 [ 1622.563433][T13969] R13: 0000000000000725 R14: 00000000004c8a46 R15: 0000000000000006 [ 1622.565571][T13981] kAFS: unparsable volume name [ 1622.573367][ T26] kauditd_printk_skb: 8 callbacks suppressed [ 1622.573377][ T26] audit: type=1800 audit(1579649721.930:125): pid=13975 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed comm="syz-executor.3" name="SYSV00000000" dev="hugetlbfs" ino=43 res=0 [ 1622.650885][T13986] kAFS: No cell specified [ 1622.655637][ T26] audit: type=1800 audit(1579649721.930:126): pid=13975 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed comm="syz-executor.3" name="SYSV00000000" dev="hugetlbfs" ino=44 res=0 [ 1622.698118][ T26] audit: type=1800 audit(1579649722.130:127): pid=13983 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed comm="syz-executor.3" name="SYSV00000000" dev="hugetlbfs" ino=46 res=0 23:35:22 executing program 5 (fault-call:4 fault-nth:7): mkdir(&(0x7f0000000200)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount(&(0x7f00000005c0)=ANY=[@ANYBLOB="23211ff2be2e"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 23:35:22 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_DEL(r0, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="ac00000002090101000000000025000000000009700002002c000100140003006ed80a0ec3677685b4c446deabbe2e8d14000400000000000000400000000000000000000c00020005000100060000000c000200050001003a00000014000100080001007f000001080002007f000001e891871d58a4030c00020005000100880000000c00040008000500f2ff001f0c000200060003000000000008000500000000150800060000000000"], 0xac}, 0x1, 0x0, 0x0, 0x40081}, 0x40000d0) 23:35:22 executing program 2: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba435012283a"], &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) 23:35:22 executing program 1: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB='#'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 23:35:22 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba43"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 23:35:22 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) shmat(r2, &(0x7f0000ffd000/0x3000)=nil, 0xffffffffffff3fff) r3 = semget$private(0x0, 0x4, 0x0) semop(r3, &(0x7f0000000040)=[{0x0, 0xffffffff}], 0x1) semctl$IPC_RMID(r3, 0x0, 0x0) r4 = geteuid() r5 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) r7 = socket(0x10, 0x2, 0x0) r8 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r8, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2008}, 0x1c) listen(r8, 0x0) ioctl$sock_FIOGETOWN(r8, 0x8903, &(0x7f0000000240)) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="020000000100000000000000040001000015000008000000", @ANYRES32=r6, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=r6, @ANYBLOB="08000200", @ANYRES32=r9, @ANYBLOB="10000400000000002000020000000000"], 0x3c, 0x0) r10 = getuid() statx(r1, &(0x7f0000000000)='./file0\x00', 0x800, 0x20, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r12 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r12, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2008}, 0x1c) listen(r12, 0x0) getsockopt$SO_TIMESTAMP(r12, 0x1, 0x3f, &(0x7f0000000280), &(0x7f00000002c0)=0x4) semctl$IPC_SET(r3, 0x0, 0x1, &(0x7f00000001c0)={{0x2, r4, r9, r10, r11, 0x93423eb8513c843f, 0x7fff}, 0x6f305922, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff}) shmat(r2, &(0x7f0000ff9000/0x4000)=nil, 0x5000) [ 1622.855919][T13996] kAFS: No cell specified 23:35:22 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000000000), 0x4) sendmsg$key(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x2, 0xd, 0xff, 0x8, 0x5, 0x0, 0x70bd2b, 0x25dfdbfc, [@sadb_address={0x3, 0x7, 0x3c, 0xa0, 0x0, @in={0x2, 0x4e24, @broadcast}}]}, 0x28}}, 0x0) r3 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r5, 0x84, 0xf, &(0x7f00000001c0)={0x0, @in6={{0xa, 0x4e24, 0x3ff, @mcast2, 0x2}}, 0x80, 0x6, 0x100, 0x8, 0x6}, &(0x7f0000000100)=0x98) shmat(r3, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffffff) r6 = add_key$keyring(&(0x7f0000000980)='keyring\x00', &(0x7f00000007c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) r7 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000a00)="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", 0x1001, r6) keyctl$read(0xb, r7, &(0x7f0000005340)=""/4096, 0xd900) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f00000002c0)={r7, 0xaf, 0xb1}, &(0x7f0000000300)={'enc=', 'pkcs1', ' hash=', {'sha384-avx\x00'}}, &(0x7f0000000380)="6be2e5ee807bdf383e3008dedda4b81f486cacd6ea75f79908f07ef348703bc423a2770c4b8e94e925bc52832ce75ab3d55b8395a7573d6b9c01a5edf14733e7db252921918f4e41fd26f4bcb66deb04abb6f6993d0b36dc93342e1a68bc5cac4195104a7e73f24827bad71c775b18e7ff829c3d5c76516dcd5c6e35997a75287e5fa5302b970a54c0ffbce29ccd931d746f4fe2be701a948d31bc51069a597e1db0c138de1db3043e9c55baa9393e", &(0x7f0000000440)=""/177) shmat(r3, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffffff) r8 = openat$null(0xffffffffffffff9c, &(0x7f0000000140)='/dev/null\x00', 0x4ba0, 0x0) ioctl$UFFDIO_REGISTER(r8, 0xc020aa00, &(0x7f0000000280)={{&(0x7f0000ff9000/0x1000)=nil, 0x1000}}) shmat(r2, &(0x7f0000ff9000/0x4000)=nil, 0x5000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r10 = dup(r9) ioctl$VIDIOC_G_CROP(r1, 0xc014563b, &(0x7f0000000540)={0x3, {0x0, 0xeb5, 0x2, 0x1}}) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) ioctl$DRM_IOCTL_WAIT_VBLANK(r10, 0xc018643a, &(0x7f0000000500)={0x10000000, 0x7, 0x1e}) [ 1622.884955][T14001] kAFS: unparsable volume name 23:35:22 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_DEL(r0, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="ac0000000209010100000000003f000000000009700002002c000100140003006ed80a0ec3677685b4c446deabbe2e8d14000400000000000000400000000000000000000c00020005000100060000000c000200050001003a00000014000100080001007f000001080002007f000001e891871d58a4030c00020005000100880000000c00040008000500f2ff001f0c000200060003000000000008000500000000150800060000000000"], 0xac}, 0x1, 0x0, 0x0, 0x40081}, 0x40000d0) 23:35:22 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba43501228"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 23:35:22 executing program 1: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB='#y'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1622.963222][T14005] FAULT_INJECTION: forcing a failure. [ 1622.963222][T14005] name failslab, interval 1, probability 0, space 0, times 0 23:35:22 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) sendmsg$IPSET_CMD_RENAME(r1, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000280)=ANY=[@ANYBLOB="28000000050601020000000000000000060900020073797a3100000000290c00c518a1856d06e107429ad6000700000000000094a13aa135dd92d0fdfa65331852804db8d3e07b3dc4d547f584ee106cba63d4626f65a1e1e02e716ba392d8a929f94d6d4fbc5243fc3eaa4f54a623efae6d15a32090f22ce6e2f9b2e51ac928e713536cda1f7817e3b02e1dec29d47b566c2be9c23ce73e719fb8c7ad094f29"], 0x28}, 0x1, 0x0, 0x0, 0x40}, 0x0) r3 = syz_open_dev$cec(&(0x7f0000000000)='/dev/cec#\x00', 0x2, 0x2) ioctl$VIDIOC_S_AUDOUT(r3, 0x40345632, &(0x7f0000000040)={0x0, "11e43da3549e4871435cb5354777cf602ea3a68edb1439bca3bc4d7bec34abb0", 0x3, 0x1}) shmat(r2, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffffff) shmat(r2, &(0x7f0000ff9000/0x4000)=nil, 0x5000) [ 1623.041653][T14005] CPU: 0 PID: 14005 Comm: syz-executor.5 Not tainted 5.5.0-rc7-syzkaller #0 [ 1623.050387][T14005] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1623.061613][T14005] Call Trace: [ 1623.065586][T14005] dump_stack+0x1fb/0x318 [ 1623.069950][T14005] should_fail+0x608/0x770 [ 1623.074409][T14005] __should_failslab+0x11a/0x160 [ 1623.079377][T14005] should_failslab+0x9/0x20 [ 1623.083906][T14005] kmem_cache_alloc_trace+0x5d/0x2f0 [ 1623.089216][T14005] ? alloc_fs_context+0x64/0x6a0 [ 1623.094193][T14005] alloc_fs_context+0x64/0x6a0 [ 1623.099141][T14005] ? _raw_read_unlock+0x27/0x40 [ 1623.104028][T14005] fs_context_for_mount+0x24/0x30 [ 1623.109086][T14005] do_mount+0x12dc/0x25a0 [ 1623.113463][T14005] ? copy_mount_options+0xdc/0x3c0 [ 1623.118650][T14005] __se_sys_mount+0xdd/0x110 [ 1623.123285][T14005] __x64_sys_mount+0xbf/0xd0 [ 1623.128608][T14005] do_syscall_64+0xf7/0x1c0 [ 1623.133140][T14005] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1623.139071][T14005] RIP: 0033:0x45b349 [ 1623.142982][T14005] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1623.147092][T14013] kAFS: No cell specified [ 1623.162829][T14005] RSP: 002b:00007f5a8be38c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1623.162843][T14005] RAX: ffffffffffffffda RBX: 00007f5a8be396d4 RCX: 000000000045b349 23:35:22 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_DEL(r0, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="ac00000002090101000000000040000000000009700002002c000100140003006ed80a0ec3677685b4c446deabbe2e8d14000400000000000000400000000000000000000c00020005000100060000000c000200050001003a00000014000100080001007f000001080002007f000001e891871d58a4030c00020005000100880000000c00040008000500f2ff001f0c000200060003000000000008000500000000150800060000000000"], 0xac}, 0x1, 0x0, 0x0, 0x40081}, 0x40000d0) [ 1623.162849][T14005] RDX: 0000000020000180 RSI: 0000000020000140 RDI: 00000000200005c0 [ 1623.162855][T14005] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1623.162860][T14005] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000006 [ 1623.162866][T14005] R13: 0000000000000725 R14: 00000000004c8a46 R15: 0000000000000007 [ 1623.218190][ T26] audit: type=1800 audit(1579649722.740:128): pid=14014 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed comm="syz-executor.2" name="SYSV00000000" dev="hugetlbfs" ino=6 res=0 [ 1623.234980][T14017] kAFS: No cell specified [ 1623.327049][T14022] __nla_validate_parse: 24 callbacks suppressed [ 1623.327057][T14022] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1623.349866][T14022] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. 23:35:22 executing program 5 (fault-call:4 fault-nth:8): mkdir(&(0x7f0000000200)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount(&(0x7f00000005c0)=ANY=[@ANYBLOB="23211ff2be2e"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 23:35:22 executing program 2: socket$inet6_tcp(0xa, 0x1, 0x0) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x8000, 0x0) ioctl$VIDIOC_G_EXT_CTRLS(r0, 0xc0205647, &(0x7f00000000c0)={0x9d0000, 0x200, 0xc, 0xffffffffffffffff, 0x0, &(0x7f0000000080)={0x9b0942, 0x0, [], @ptr}}) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vsock\x00', 0x10000, 0x0) ioctl$KVM_DEASSIGN_PCI_DEVICE(r2, 0x4040ae72, &(0x7f0000000040)={0x10001, 0x3, 0x1}) dup(0xffffffffffffffff) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x133800, 0x0) getsockopt$inet_mreqsrc(r3, 0x0, 0x26, &(0x7f0000000140)={@multicast1, @initdev, @multicast2}, &(0x7f0000000180)=0xc) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x4) r4 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) connect$nfc_raw(r6, &(0x7f0000000300)={0x27, 0x1, 0x1, 0x5}, 0x10) shmat(r4, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffffff) r7 = shmget$private(0x0, 0x2000, 0x80, &(0x7f0000002000/0x2000)=nil) shmctl$SHM_UNLOCK(r7, 0xc) ioctl$SOUND_MIXER_READ_RECMASK(r1, 0x80044dfd, &(0x7f00000002c0)) shmat(r4, &(0x7f0000ff9000/0x4000)=nil, 0x5000) setsockopt$CAIFSO_REQ_PARAM(r1, 0x116, 0x80, &(0x7f00000001c0)="b7f4ef7e296c3e9f570af759b8bf3af0bee2dc02bce9e23e6d877c4730833fb1a454cf38dad7544e9844c29cf1b1e483265ad7332c50cdd9f1fd49c148735236debcb4eec59981781778b12136990809d5e57f17c66b31b9b300dcf5936dbe7c9cdefac628e294344959d3789831acae726b24195c74459553b8cf3ab4e7da09816a3782d121a39eed1d530aa6dd6b6282dbb37af3d05e8a5ec311a870bfd2300aba9d16314b3bee609d4cf670a08cd94bbf6697af6da9181d239184c4f0095d", 0xc0) 23:35:22 executing program 1: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB='#'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 23:35:22 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) shmat(r2, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffffff) r3 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) shmat(r3, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffffff) shmat(r3, &(0x7f0000ff9000/0x4000)=nil, 0x6000) 23:35:22 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_DEL(r0, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="ac00000002090101000000000048000000000009700002002c000100140003006ed80a0ec3677685b4c446deabbe2e8d14000400000000000000400000000000000000000c00020005000100060000000c000200050001003a00000014000100080001007f000001080002007f000001e891871d58a4030c00020005000100880000000c00040008000500f2ff001f0c000200060003000000000008000500000000150800060000000000"], 0xac}, 0x1, 0x0, 0x0, 0x40081}, 0x40000d0) 23:35:22 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba43501228"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1623.478236][T14027] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1623.493174][ T26] audit: type=1800 audit(1579649723.040:129): pid=14030 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed comm="syz-executor.3" name="SYSV00000000" dev="hugetlbfs" ino=50 res=0 [ 1623.496566][T14033] kAFS: unparsable volume name [ 1623.557046][T14027] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1623.559812][T14036] kAFS: No cell specified [ 1623.575487][ T26] audit: type=1800 audit(1579649723.070:130): pid=14030 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed comm="syz-executor.3" name="SYSV00000000" dev="hugetlbfs" ino=51 res=0 [ 1623.579560][T14037] FAULT_INJECTION: forcing a failure. 23:35:23 executing program 2 (fault-call:1 fault-nth:0): mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba435012283a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 23:35:23 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETTABLE(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)=ANY=[@ANYBLOB="20000000010a0104000000000000000000000000090000"], 0x20}}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(r2, &(0x7f0000000080)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000040)={&(0x7f00000001c0)={0x268, 0x0, 0x2, 0x101, 0x0, 0x0, {0x1}, [@CTA_EXPECT_NAT={0x3c, 0xa, [@CTA_EXPECT_NAT_TUPLE={0x38, 0x2, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x3}, @CTA_TUPLE_PROTO={0xc, 0x2, {0x5, 0x1, 0x6}}, @CTA_TUPLE_PROTO={0xc, 0x2, {0x5, 0x1, 0x21}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x4}, @CTA_TUPLE_PROTO={0xc, 0x2, {0x5, 0x1, 0x3a}}]}]}, @CTA_EXPECT_HELP_NAME={0xf, 0x6, 'tftp-20000\x00'}, @CTA_EXPECT_TIMEOUT={0x8, 0x4, 0x7fffffff}, @CTA_EXPECT_ZONE={0x6}, @CTA_EXPECT_TUPLE={0x90, 0x2, [@CTA_TUPLE_IP={0x2c, 0x1, @ipv6={{0x14, 0x3, @empty}, {0x14, 0x4, @rand_addr="a5d6b9f1d4702317e60bf85969af76a6"}}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x2}, @CTA_TUPLE_IP={0x14, 0x1, @ipv4={{0x8, 0x1, @broadcast}, {0x8, 0x2, @loopback}}}, @CTA_TUPLE_IP={0x14, 0x1, @ipv4={{0x8, 0x1, @dev={0xac, 0x14, 0x14, 0x15}}, {0x8, 0x2, @remote}}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x5}, @CTA_TUPLE_PROTO={0xc, 0x2, {0x5, 0x1, 0x6}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x4}, @CTA_TUPLE_PROTO={0xc, 0x2, {0x5, 0x1, 0x3a}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x4}]}, @CTA_EXPECT_TIMEOUT={0x8, 0x4, 0x7}, @CTA_EXPECT_TUPLE={0x64, 0x2, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x4}, @CTA_TUPLE_IP={0x14, 0x1, @ipv4={{0x8, 0x1, @dev={0xac, 0x14, 0x14, 0x27}}, {0x8, 0x2, @local}}}, @CTA_TUPLE_IP={0x2c, 0x1, @ipv6={{0x14, 0x3, @loopback}, {0x14, 0x4, @empty}}}, @CTA_TUPLE_PROTO={0xc, 0x2, {0x5, 0x1, 0x21}}, @CTA_TUPLE_PROTO={0xc, 0x2, {0x5, 0x1, 0x11}}]}, @CTA_EXPECT_ID={0x8, 0x5, 0x5}, @CTA_EXPECT_TUPLE={0x7c, 0x2, [@CTA_TUPLE_PROTO={0xc, 0x2, {0x5, 0x1, 0x88}}, @CTA_TUPLE_IP={0x14, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @rand_addr=0x80000000}}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x2}, @CTA_TUPLE_IP={0x14, 0x1, @ipv4={{0x8, 0x1, @remote}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x25}}}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x2}, @CTA_TUPLE_PROTO={0xc, 0x2, {0x5, 0x1, 0x88}}, @CTA_TUPLE_PROTO={0xc, 0x2, {0x5, 0x1, 0x2f}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x2}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x4}, @CTA_TUPLE_PROTO={0xc, 0x2, {0x5, 0x1, 0x3a}}]}, @CTA_EXPECT_TUPLE={0x78, 0x2, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x2}, @CTA_TUPLE_PROTO={0xc, 0x2, {0x5, 0x1, 0x1}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_IP={0x14, 0x1, @ipv4={{0x8, 0x1, @dev={0xac, 0x14, 0x14, 0x1f}}, {0x8, 0x2, @multicast2}}}, @CTA_TUPLE_PROTO={0xc, 0x2, {0x5, 0x1, 0x6}}, @CTA_TUPLE_IP={0x2c, 0x1, @ipv6={{0x14, 0x3, @remote}, {0x14, 0x4, @mcast2}}}, @CTA_TUPLE_PROTO={0xc, 0x2, {0x5, 0x1, 0x2f}}]}]}, 0x268}, 0x1, 0x0, 0x0, 0x40680d4}, 0xf33abae415e80337) ioctl$SNDRV_PCM_IOCTL_XRUN(r1, 0x4148, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r3 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) shmat(r3, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffffff) shmat(r3, &(0x7f0000ff9000/0x4000)=nil, 0x5000) [ 1623.579560][T14037] name failslab, interval 1, probability 0, space 0, times 0 [ 1623.629951][T14037] CPU: 0 PID: 14037 Comm: syz-executor.5 Not tainted 5.5.0-rc7-syzkaller #0 [ 1623.638819][T14037] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1623.648916][T14037] Call Trace: [ 1623.652273][T14037] dump_stack+0x1fb/0x318 [ 1623.656632][T14037] should_fail+0x608/0x770 [ 1623.661102][T14037] __should_failslab+0x11a/0x160 [ 1623.666067][T14037] should_failslab+0x9/0x20 [ 1623.670607][T14037] kmem_cache_alloc_trace+0x5d/0x2f0 [ 1623.675925][T14037] ? afs_init_fs_context+0x53/0x290 [ 1623.676748][ T26] audit: type=1800 audit(1579649723.080:131): pid=14034 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed comm="syz-executor.2" name="SYSV00000000" dev="hugetlbfs" ino=7 res=0 [ 1623.681143][T14037] afs_init_fs_context+0x53/0x290 [ 1623.681160][T14037] alloc_fs_context+0x564/0x6a0 [ 1623.681179][T14037] fs_context_for_mount+0x24/0x30 [ 1623.681191][T14037] do_mount+0x12dc/0x25a0 [ 1623.681207][T14037] ? copy_mount_options+0xdc/0x3c0 [ 1623.681222][T14037] __se_sys_mount+0xdd/0x110 23:35:23 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba43501228"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1623.681235][T14037] __x64_sys_mount+0xbf/0xd0 [ 1623.681251][T14037] do_syscall_64+0xf7/0x1c0 [ 1623.681267][T14037] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1623.681282][T14037] RIP: 0033:0x45b349 [ 1623.736115][T14040] FAULT_INJECTION: forcing a failure. [ 1623.736115][T14040] name failslab, interval 1, probability 0, space 0, times 0 23:35:23 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_DEL(r0, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="ac0000000209010100000000004c000000000009700002002c000100140003006ed80a0ec3677685b4c446deabbe2e8d14000400000000000000400000000000000000000c00020005000100060000000c000200050001003a00000014000100080001007f000001080002007f000001e891871d58a4030c00020005000100880000000c00040008000500f2ff001f0c000200060003000000000008000500000000150800060000000000"], 0xac}, 0x1, 0x0, 0x0, 0x40081}, 0x40000d0) 23:35:23 executing program 1: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB='#'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1623.738733][T14037] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1623.738742][T14037] RSP: 002b:00007f5a8be38c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1623.738752][T14037] RAX: ffffffffffffffda RBX: 00007f5a8be396d4 RCX: 000000000045b349 [ 1623.738758][T14037] RDX: 0000000020000180 RSI: 0000000020000140 RDI: 00000000200005c0 [ 1623.738764][T14037] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1623.738770][T14037] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000006 [ 1623.738777][T14037] R13: 0000000000000725 R14: 00000000004c8a46 R15: 0000000000000008 23:35:23 executing program 5 (fault-call:4 fault-nth:9): mkdir(&(0x7f0000000200)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount(&(0x7f00000005c0)=ANY=[@ANYBLOB="23211ff2be2e"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1623.882368][ T26] audit: type=1800 audit(1579649723.430:132): pid=14043 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed comm="syz-executor.3" name="SYSV00000000" dev="hugetlbfs" ino=54 res=0 [ 1623.921055][T14049] kAFS: unparsable volume name [ 1623.947893][T14052] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1623.950625][T14051] kAFS: No cell specified [ 1623.971666][T14040] CPU: 0 PID: 14040 Comm: syz-executor.2 Not tainted 5.5.0-rc7-syzkaller #0 [ 1623.980393][T14040] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1623.990460][T14040] Call Trace: [ 1623.993782][T14040] dump_stack+0x1fb/0x318 [ 1623.997047][T14054] FAULT_INJECTION: forcing a failure. [ 1623.997047][T14054] name failslab, interval 1, probability 0, space 0, times 0 [ 1623.998221][T14040] should_fail+0x608/0x770 [ 1623.998242][T14040] __should_failslab+0x11a/0x160 [ 1623.998255][T14040] ? __se_sys_mount+0x42/0x110 [ 1623.998272][T14040] should_failslab+0x9/0x20 [ 1624.011185][T14052] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1624.015289][T14040] __kmalloc_track_caller+0x79/0x340 [ 1624.015306][T14040] strndup_user+0x76/0x150 [ 1624.015322][T14040] __se_sys_mount+0x42/0x110 [ 1624.015336][T14040] __x64_sys_mount+0xbf/0xd0 [ 1624.015350][T14040] do_syscall_64+0xf7/0x1c0 [ 1624.015370][T14040] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1624.068455][T14040] RIP: 0033:0x45b349 [ 1624.072473][T14040] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 23:35:23 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba435012283a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 23:35:23 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_DEL(r0, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="ac00000002090101000000000060000000000009700002002c000100140003006ed80a0ec3677685b4c446deabbe2e8d14000400000000000000400000000000000000000c00020005000100060000000c000200050001003a00000014000100080001007f000001080002007f000001e891871d58a4030c00020005000100880000000c00040008000500f2ff001f0c000200060003000000000008000500000000150800060000000000"], 0xac}, 0x1, 0x0, 0x0, 0x40081}, 0x40000d0) [ 1624.092094][T14040] RSP: 002b:00007fe347094c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1624.100527][T14040] RAX: ffffffffffffffda RBX: 00007fe3470956d4 RCX: 000000000045b349 [ 1624.108541][T14040] RDX: 0000000020000180 RSI: 0000000020000140 RDI: 0000000020000240 [ 1624.116533][T14040] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1624.124528][T14040] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 [ 1624.132524][T14040] R13: 0000000000000725 R14: 00000000004c8a46 R15: 0000000000000000 23:35:23 executing program 1: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB='#'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1624.165256][T14054] CPU: 1 PID: 14054 Comm: syz-executor.5 Not tainted 5.5.0-rc7-syzkaller #0 [ 1624.174079][T14054] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1624.185885][T14054] Call Trace: [ 1624.189206][T14054] dump_stack+0x1fb/0x318 [ 1624.193566][T14054] should_fail+0x608/0x770 [ 1624.198011][T14054] __should_failslab+0x11a/0x160 [ 1624.203052][T14054] should_failslab+0x9/0x20 [ 1624.207613][T14054] kmem_cache_alloc_trace+0x5d/0x2f0 23:35:23 executing program 1: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB='#y'], 0x0, &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1624.212929][T14054] ? alloc_fs_context+0x64/0x6a0 [ 1624.217898][T14054] alloc_fs_context+0x64/0x6a0 [ 1624.222461][T14061] kAFS: unparsable volume name [ 1624.222789][T14054] ? _raw_read_unlock+0x27/0x40 [ 1624.232500][T14054] fs_context_for_mount+0x24/0x30 [ 1624.237546][T14054] do_mount+0x12dc/0x25a0 [ 1624.241926][T14054] ? copy_mount_options+0xdc/0x3c0 [ 1624.247065][T14054] __se_sys_mount+0xdd/0x110 [ 1624.251687][T14054] __x64_sys_mount+0xbf/0xd0 [ 1624.256322][T14054] do_syscall_64+0xf7/0x1c0 23:35:23 executing program 1: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB='#y'], 0x0, &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1624.260862][T14054] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1624.266911][T14054] RIP: 0033:0x45b349 [ 1624.270824][T14054] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1624.290599][T14054] RSP: 002b:00007f5a8be38c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1624.299129][T14054] RAX: ffffffffffffffda RBX: 00007f5a8be396d4 RCX: 000000000045b349 [ 1624.307651][T14054] RDX: 0000000020000180 RSI: 0000000020000140 RDI: 00000000200005c0 23:35:23 executing program 1: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB='#y'], 0x0, &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1624.315985][T14054] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1624.324000][T14054] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000006 [ 1624.332096][T14054] R13: 0000000000000725 R14: 00000000004c8a46 R15: 0000000000000009 23:35:23 executing program 2 (fault-call:1 fault-nth:1): mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba435012283a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 23:35:23 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba435012283a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 23:35:24 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba43501228"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 23:35:24 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2008}, 0x1c) listen(r0, 0x0) r1 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) ioctl$VIDIOC_DQBUF(r1, 0xc0585611, &(0x7f0000000040)={0x80000000, 0xc, 0x4, 0x10000, 0xfa8, {}, {0x3, 0x8, 0x6d, 0x4, 0x8, 0x98, "bcfa6b01"}, 0x0, 0x3, @planes=&(0x7f0000000000)={0x7, 0x3f, @fd=r1, 0x5a}, 0x6c, 0x0, 0xffffffffffffffff}) ioctl$PPPIOCSPASS(0xffffffffffffffff, 0x40107447, &(0x7f0000000140)={0x2, &(0x7f0000000100)=[{0x81, 0x7f, 0x9, 0x6}, {0x0, 0x80, 0x3f}]}) signalfd4(r3, &(0x7f00000000c0)={[0x4]}, 0x8, 0x0) r4 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) shmat(r4, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffffff) r5 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) shmat(r5, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffffff) shmat(r2, &(0x7f0000ffa000/0x1000)=nil, 0x2b63432cf047bce1) shmat(r2, &(0x7f0000ff9000/0x4000)=nil, 0x5000) [ 1624.412637][T14069] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1624.445879][T14069] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1624.503895][ T26] audit: type=1800 audit(1579649724.050:133): pid=14076 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed comm="syz-executor.3" name="SYSV00000000" dev="hugetlbfs" ino=57 res=0 23:35:24 executing program 1: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB='#y'], &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) [ 1624.549409][T14077] FAULT_INJECTION: forcing a failure. [ 1624.549409][T14077] name failslab, interval 1, probability 0, space 0, times 0 23:35:24 executing program 5 (fault-call:4 fault-nth:10): mkdir(&(0x7f0000000200)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount(&(0x7f00000005c0)=ANY=[@ANYBLOB="23211ff2be2e"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1624.580757][ T26] audit: type=1800 audit(1579649724.080:134): pid=14076 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed comm="syz-executor.3" name="SYSV00000000" dev="hugetlbfs" ino=58 res=0 [ 1624.607520][T14077] CPU: 1 PID: 14077 Comm: syz-executor.2 Not tainted 5.5.0-rc7-syzkaller #0 [ 1624.608492][T14081] kAFS: No cell specified [ 1624.616245][T14077] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1624.616252][T14077] Call Trace: [ 1624.616281][T14077] dump_stack+0x1fb/0x318 [ 1624.616298][T14077] should_fail+0x608/0x770 [ 1624.616318][T14077] __should_failslab+0x11a/0x160 [ 1624.616331][T14077] ? __se_sys_mount+0x85/0x110 [ 1624.616344][T14077] should_failslab+0x9/0x20 [ 1624.616358][T14077] __kmalloc_track_caller+0x79/0x340 [ 1624.616376][T14077] strndup_user+0x76/0x150 [ 1624.616387][T14077] __se_sys_mount+0x85/0x110 [ 1624.616399][T14077] __x64_sys_mount+0xbf/0xd0 [ 1624.616414][T14077] do_syscall_64+0xf7/0x1c0 [ 1624.616429][T14077] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1624.616441][T14077] RIP: 0033:0x45b349 23:35:24 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) setsockopt$inet_sctp6_SCTP_AUTOCLOSE(r1, 0x84, 0x4, &(0x7f0000000000)=0x3, 0x4) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) shmat(r2, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffffff) shmat(r2, &(0x7f0000ff9000/0x4000)=nil, 0x5000) [ 1624.616454][T14077] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1624.616461][T14077] RSP: 002b:00007fe347094c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1624.616473][T14077] RAX: ffffffffffffffda RBX: 00007fe3470956d4 RCX: 000000000045b349 [ 1624.616481][T14077] RDX: 0000000020000180 RSI: 0000000020000140 RDI: 0000000020000240 [ 1624.616488][T14077] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 23:35:24 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_DEL(r0, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="ac00000002090101000000000068000000000009700002002c000100140003006ed80a0ec3677685b4c446deabbe2e8d14000400000000000000400000000000000000000c00020005000100060000000c000200050001003a00000014000100080001007f000001080002007f000001e891871d58a4030c00020005000100880000000c00040008000500f2ff001f0c000200060003000000000008000500000000150800060000000000"], 0xac}, 0x1, 0x0, 0x0, 0x40081}, 0x40000d0) 23:35:24 executing program 2 (fault-call:1 fault-nth:2): mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba435012283a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1624.616495][T14077] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 [ 1624.616502][T14077] R13: 0000000000000725 R14: 00000000004c8a46 R15: 0000000000000001 [ 1624.786788][T14088] FAULT_INJECTION: forcing a failure. [ 1624.786788][T14088] name failslab, interval 1, probability 0, space 0, times 0 [ 1624.855090][T14088] CPU: 0 PID: 14088 Comm: syz-executor.5 Not tainted 5.5.0-rc7-syzkaller #0 [ 1624.863851][T14088] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1624.876411][T14088] Call Trace: [ 1624.879719][T14088] dump_stack+0x1fb/0x318 [ 1624.884071][T14088] should_fail+0x608/0x770 [ 1624.888514][T14088] __should_failslab+0x11a/0x160 [ 1624.889230][T14096] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.0'. 23:35:24 executing program 1: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB='#y'], &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) [ 1624.893523][T14088] should_failslab+0x9/0x20 [ 1624.893540][T14088] kmem_cache_alloc_trace+0x5d/0x2f0 [ 1624.893553][T14088] ? afs_init_fs_context+0x53/0x290 [ 1624.893568][T14088] afs_init_fs_context+0x53/0x290 [ 1624.893585][T14088] alloc_fs_context+0x564/0x6a0 [ 1624.893606][T14088] fs_context_for_mount+0x24/0x30 [ 1624.893617][T14088] do_mount+0x12dc/0x25a0 [ 1624.893633][T14088] ? copy_mount_options+0xdc/0x3c0 [ 1624.893648][T14088] __se_sys_mount+0xdd/0x110 [ 1624.893661][T14088] __x64_sys_mount+0xbf/0xd0 [ 1624.893675][T14088] do_syscall_64+0xf7/0x1c0 [ 1624.893691][T14088] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1624.893702][T14088] RIP: 0033:0x45b349 [ 1624.893713][T14088] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1624.893720][T14088] RSP: 002b:00007f5a8be38c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1624.907465][T14097] FAULT_INJECTION: forcing a failure. [ 1624.907465][T14097] name failslab, interval 1, probability 0, space 0, times 0 [ 1624.907804][T14088] RAX: ffffffffffffffda RBX: 00007f5a8be396d4 RCX: 000000000045b349 [ 1624.907811][T14088] RDX: 0000000020000180 RSI: 0000000020000140 RDI: 00000000200005c0 [ 1624.907818][T14088] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1624.907825][T14088] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000006 [ 1624.907831][T14088] R13: 0000000000000725 R14: 00000000004c8a46 R15: 000000000000000a [ 1624.928382][T14096] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1624.979673][T14097] CPU: 1 PID: 14097 Comm: syz-executor.2 Not tainted 5.5.0-rc7-syzkaller #0 [ 1625.066281][T14097] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1625.076358][T14097] Call Trace: [ 1625.079672][T14097] dump_stack+0x1fb/0x318 [ 1625.084025][T14097] should_fail+0x608/0x770 [ 1625.088493][T14097] __should_failslab+0x11a/0x160 [ 1625.092869][T14103] kAFS: No cell specified [ 1625.093450][T14097] ? getname_flags+0xba/0x640 [ 1625.102550][T14097] should_failslab+0x9/0x20 [ 1625.107103][T14097] kmem_cache_alloc+0x56/0x2e0 [ 1625.111900][T14097] getname_flags+0xba/0x640 [ 1625.116444][T14097] user_path_at_empty+0x2d/0x50 [ 1625.121309][T14097] do_mount+0xd4/0x25a0 [ 1625.131656][T14097] ? copy_mount_options+0xdc/0x3c0 [ 1625.136878][T14097] __se_sys_mount+0xdd/0x110 [ 1625.141522][T14097] __x64_sys_mount+0xbf/0xd0 [ 1625.146145][T14097] do_syscall_64+0xf7/0x1c0 23:35:24 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba43501228"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 23:35:24 executing program 1: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB='#y'], &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) 23:35:24 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba43501228"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 23:35:24 executing program 1: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba435012283a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1625.150673][T14097] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1625.156583][T14097] RIP: 0033:0x45b349 [ 1625.160497][T14097] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1625.180319][T14097] RSP: 002b:00007fe347073c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1625.188074][T14109] kAFS: No cell specified [ 1625.188752][T14097] RAX: ffffffffffffffda RBX: 00007fe3470746d4 RCX: 000000000045b349 23:35:24 executing program 2 (fault-call:1 fault-nth:3): mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba435012283a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1625.188760][T14097] RDX: 0000000020000180 RSI: 0000000020000140 RDI: 0000000020000240 [ 1625.188766][T14097] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 1625.188773][T14097] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 [ 1625.188779][T14097] R13: 0000000000000725 R14: 00000000004c8a46 R15: 0000000000000002 [ 1625.329142][T14115] FAULT_INJECTION: forcing a failure. [ 1625.329142][T14115] name failslab, interval 1, probability 0, space 0, times 0 [ 1625.342948][T14115] CPU: 1 PID: 14115 Comm: syz-executor.2 Not tainted 5.5.0-rc7-syzkaller #0 [ 1625.351651][T14115] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1625.361727][T14115] Call Trace: [ 1625.365042][T14115] dump_stack+0x1fb/0x318 [ 1625.369412][T14115] should_fail+0x608/0x770 [ 1625.373866][T14115] __should_failslab+0x11a/0x160 [ 1625.378931][T14115] ? tomoyo_encode2+0x262/0x580 [ 1625.383815][T14115] should_failslab+0x9/0x20 [ 1625.388435][T14115] __kmalloc+0x7a/0x340 [ 1625.392629][T14115] tomoyo_encode2+0x262/0x580 [ 1625.397350][T14115] tomoyo_encode+0x29/0x40 [ 1625.401810][T14115] tomoyo_mount_permission+0x216/0xa30 [ 1625.407311][T14115] ? debug_smp_processor_id+0x9/0x20 [ 1625.412636][T14115] ? filename_lookup+0x4b0/0x690 [ 1625.417611][T14115] ? kmem_cache_free+0xd8/0xf0 [ 1625.422429][T14115] tomoyo_sb_mount+0x35/0x40 [ 1625.427076][T14115] security_sb_mount+0x6f/0xd0 [ 1625.431869][T14115] do_mount+0x107/0x25a0 [ 1625.436271][T14115] ? copy_mount_options+0xdc/0x3c0 [ 1625.441415][T14115] __se_sys_mount+0xdd/0x110 [ 1625.446062][T14115] __x64_sys_mount+0xbf/0xd0 [ 1625.450688][T14115] do_syscall_64+0xf7/0x1c0 [ 1625.455227][T14115] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1625.461137][T14115] RIP: 0033:0x45b349 [ 1625.465169][T14115] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1625.484882][T14115] RSP: 002b:00007fe347094c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1625.493314][T14115] RAX: ffffffffffffffda RBX: 00007fe3470956d4 RCX: 000000000045b349 [ 1625.501410][T14115] RDX: 0000000020000180 RSI: 0000000020000140 RDI: 0000000020000240 [ 1625.509413][T14115] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1625.517496][T14115] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 [ 1625.526446][T14115] R13: 0000000000000725 R14: 00000000004c8a46 R15: 0000000000000003 23:35:25 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba435012283a"], 0x0, &(0x7f0000000180)='afs\x00', 0x0, 0x0) 23:35:25 executing program 1: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba435012283a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 23:35:25 executing program 5 (fault-call:4 fault-nth:11): mkdir(&(0x7f0000000200)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount(&(0x7f00000005c0)=ANY=[@ANYBLOB="23211ff2be2e"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 23:35:25 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_DEL(r0, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="ac0000000209010100000000006c000000000009700002002c000100140003006ed80a0ec3677685b4c446deabbe2e8d14000400000000000000400000000000000000000c00020005000100060000000c000200050001003a00000014000100080001007f000001080002007f000001e891871d58a4030c00020005000100880000000c00040008000500f2ff001f0c000200060003000000000008000500000000150800060000000000"], 0xac}, 0x1, 0x0, 0x0, 0x40081}, 0x40000d0) 23:35:25 executing program 2 (fault-call:1 fault-nth:4): mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba435012283a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 23:35:25 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba435012283a"], 0x0, &(0x7f0000000180)='afs\x00', 0x0, 0x0) 23:35:25 executing program 1: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba435012283a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1625.767136][T14128] validate_nla: 62 callbacks suppressed [ 1625.767144][T14128] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 1625.796821][T14127] FAULT_INJECTION: forcing a failure. [ 1625.796821][T14127] name failslab, interval 1, probability 0, space 0, times 0 [ 1625.815990][T14129] FAULT_INJECTION: forcing a failure. [ 1625.815990][T14129] name failslab, interval 1, probability 0, space 0, times 0 [ 1625.835394][T14128] netlink: 'syz-executor.0': attribute type 2 has an invalid length. [ 1625.839305][T14127] CPU: 0 PID: 14127 Comm: syz-executor.5 Not tainted 5.5.0-rc7-syzkaller #0 [ 1625.852200][T14127] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1625.862532][T14127] Call Trace: [ 1625.865937][T14127] dump_stack+0x1fb/0x318 [ 1625.870402][T14127] should_fail+0x608/0x770 [ 1625.874856][T14127] __should_failslab+0x11a/0x160 [ 1625.879820][T14127] ? vfs_parse_fs_string+0xed/0x1a0 [ 1625.885042][T14127] should_failslab+0x9/0x20 [ 1625.889736][T14127] __kmalloc_track_caller+0x79/0x340 [ 1625.895044][T14127] ? rcu_lock_release+0x21/0x30 [ 1625.899914][T14127] ? afs_init_fs_context+0x1ee/0x290 [ 1625.905234][T14127] kmemdup_nul+0x2a/0xa0 [ 1625.909117][T14128] netlink: 'syz-executor.0': attribute type 2 has an invalid length. [ 1625.909503][T14127] vfs_parse_fs_string+0xed/0x1a0 [ 1625.922769][T14127] do_mount+0x13ed/0x25a0 [ 1625.927134][T14127] ? copy_mount_options+0xdc/0x3c0 [ 1625.932268][T14127] __se_sys_mount+0xdd/0x110 [ 1625.936902][T14127] __x64_sys_mount+0xbf/0xd0 [ 1625.941522][T14127] do_syscall_64+0xf7/0x1c0 [ 1625.946062][T14127] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1625.951976][T14127] RIP: 0033:0x45b349 [ 1625.955891][T14127] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1625.975515][T14127] RSP: 002b:00007f5a8be38c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1625.983971][T14127] RAX: ffffffffffffffda RBX: 00007f5a8be396d4 RCX: 000000000045b349 [ 1625.992237][T14127] RDX: 0000000020000180 RSI: 0000000020000140 RDI: 00000000200005c0 [ 1626.000378][T14127] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1626.008368][T14127] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000006 [ 1626.016447][T14127] R13: 0000000000000725 R14: 00000000004c8a46 R15: 000000000000000b [ 1626.021390][T14128] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 1626.033306][T14129] CPU: 0 PID: 14129 Comm: syz-executor.2 Not tainted 5.5.0-rc7-syzkaller #0 [ 1626.042013][T14129] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1626.052082][T14129] Call Trace: [ 1626.055426][T14129] dump_stack+0x1fb/0x318 [ 1626.059785][T14129] should_fail+0x608/0x770 [ 1626.064325][T14129] __should_failslab+0x11a/0x160 [ 1626.069315][T14129] ? tomoyo_realpath_from_path+0xe8/0x6b0 [ 1626.075189][T14129] should_failslab+0x9/0x20 [ 1626.079721][T14129] __kmalloc+0x7a/0x340 [ 1626.083916][T14129] ? tomoyo_realpath_from_path+0xdb/0x6b0 [ 1626.089669][T14129] ? kfree+0x1f/0x220 [ 1626.093704][T14129] tomoyo_realpath_from_path+0xe8/0x6b0 [ 1626.099291][T14129] tomoyo_mount_permission+0x294/0xa30 [ 1626.104773][T14129] ? debug_smp_processor_id+0x9/0x20 [ 1626.110090][T14129] ? filename_lookup+0x4b0/0x690 23:35:25 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba435012283a"], 0x0, &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1626.115060][T14129] ? kmem_cache_free+0xd8/0xf0 [ 1626.119877][T14129] tomoyo_sb_mount+0x35/0x40 [ 1626.124712][T14129] security_sb_mount+0x6f/0xd0 [ 1626.129505][T14129] do_mount+0x107/0x25a0 [ 1626.133785][T14129] ? copy_mount_options+0xdc/0x3c0 [ 1626.138937][T14129] __se_sys_mount+0xdd/0x110 [ 1626.143588][T14129] __x64_sys_mount+0xbf/0xd0 [ 1626.148205][T14129] do_syscall_64+0xf7/0x1c0 [ 1626.152843][T14129] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1626.158752][T14129] RIP: 0033:0x45b349 [ 1626.162664][T14129] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1626.182415][T14129] RSP: 002b:00007fe347094c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1626.190849][T14129] RAX: ffffffffffffffda RBX: 00007fe3470956d4 RCX: 000000000045b349 [ 1626.198849][T14129] RDX: 0000000020000180 RSI: 0000000020000140 RDI: 0000000020000240 [ 1626.206847][T14129] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 23:35:25 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba435012283a"], &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) 23:35:25 executing program 1: mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba435012283a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1626.214859][T14129] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 [ 1626.222852][T14129] R13: 0000000000000725 R14: 00000000004c8a46 R15: 0000000000000004 23:35:25 executing program 5 (fault-call:4 fault-nth:12): mkdir(&(0x7f0000000200)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount(&(0x7f00000005c0)=ANY=[@ANYBLOB="23211ff2be2e"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 23:35:25 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_DEL(r0, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="ac00000002090101000000000074000000000009700002002c000100140003006ed80a0ec3677685b4c446deabbe2e8d14000400000000000000400000000000000000000c00020005000100060000000c000200050001003a00000014000100080001007f000001080002007f000001e891871d58a4030c00020005000100880000000c00040008000500f2ff001f0c000200060003000000000008000500000000150800060000000000"], 0xac}, 0x1, 0x0, 0x0, 0x40081}, 0x40000d0) [ 1626.384952][T14146] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 1626.410482][T14146] netlink: 'syz-executor.0': attribute type 2 has an invalid length. 23:35:25 executing program 1: mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba435012283a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1626.428990][T14146] netlink: 'syz-executor.0': attribute type 2 has an invalid length. [ 1626.439170][T14146] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 23:35:26 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_DEL(r0, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="ac0000000209010100000000007a000000000009700002002c000100140003006ed80a0ec3677685b4c446deabbe2e8d14000400000000000000400000000000000000000c00020005000100060000000c000200050001003a00000014000100080001007f000001080002007f000001e891871d58a4030c00020005000100880000000c00040008000500f2ff001f0c000200060003000000000008000500000000150800060000000000"], 0xac}, 0x1, 0x0, 0x0, 0x40081}, 0x40000d0) [ 1626.483326][T14148] kAFS: No cell specified 23:35:26 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba435012283a"], &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) [ 1626.560222][T14153] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 1626.588594][T14129] ERROR: Out of memory at tomoyo_realpath_from_path. 23:35:26 executing program 1: mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba435012283a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1626.615138][T14153] netlink: 'syz-executor.0': attribute type 2 has an invalid length. 23:35:26 executing program 2: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba435012283a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 23:35:26 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount(&(0x7f00000005c0)=ANY=[@ANYBLOB="23211ff2be2e"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 23:35:26 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_DEL(r0, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="ac000000020901010000ffffff9e000000000009700002002c000100140003006ed80a0ec3677685b4c446deabbe2e8d14000400000000000000400000000000000000000c00020005000100060000000c000200050001003a00000014000100080001007f000001080002007f000001e891871d58a4030c00020005000100880000000c00040008000500f2ff001f0c000200060003000000000008000500000000150800060000000000"], 0xac}, 0x1, 0x0, 0x0, 0x40081}, 0x40000d0) 23:35:26 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba435012283a"], &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) 23:35:26 executing program 1: mkdir(0x0, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba435012283a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 23:35:26 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_DEL(r0, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="ac00000002090101000000003bda000000000009700002002c000100140003006ed80a0ec3677685b4c446deabbe2e8d14000400000000000000400000000000000000000c00020005000100060000000c000200050001003a00000014000100080001007f000001080002007f000001e891871d58a4030c00020005000100880000000c00040008000500f2ff001f0c000200060003000000000008000500000000150800060000000000"], 0xac}, 0x1, 0x0, 0x0, 0x40081}, 0x40000d0) [ 1626.998850][T14172] kAFS: No cell specified 23:35:26 executing program 4 (fault-call:1 fault-nth:0): mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba435012283a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 23:35:26 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_DEL(r0, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="ac000000020901010000ffffffef000000000009700002002c000100140003006ed80a0ec3677685b4c446deabbe2e8d14000400000000000000400000000000000000000c00020005000100060000000c000200050001003a00000014000100080001007f000001080002007f000001e891871d58a4030c00020005000100880000000c00040008000500f2ff001f0c000200060003000000000008000500000000150800060000000000"], 0xac}, 0x1, 0x0, 0x0, 0x40081}, 0x40000d0) 23:35:26 executing program 1: mkdir(0x0, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba435012283a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 23:35:26 executing program 2: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="259afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba435012283a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 23:35:26 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount(&(0x7f00000005c0)=ANY=[@ANYBLOB="25211ff2be2e"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1627.134050][T14178] FAULT_INJECTION: forcing a failure. [ 1627.134050][T14178] name failslab, interval 1, probability 0, space 0, times 0 [ 1627.209618][T14178] CPU: 0 PID: 14178 Comm: syz-executor.4 Not tainted 5.5.0-rc7-syzkaller #0 [ 1627.218483][T14178] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1627.228568][T14178] Call Trace: [ 1627.231892][T14178] dump_stack+0x1fb/0x318 [ 1627.236538][T14178] should_fail+0x608/0x770 [ 1627.240983][T14178] __should_failslab+0x11a/0x160 [ 1627.245952][T14178] ? __se_sys_mount+0x42/0x110 [ 1627.251180][T14178] should_failslab+0x9/0x20 [ 1627.255724][T14178] __kmalloc_track_caller+0x79/0x340 [ 1627.261048][T14178] strndup_user+0x76/0x150 [ 1627.265491][T14178] __se_sys_mount+0x42/0x110 [ 1627.266355][T14187] kAFS: No cell specified [ 1627.270130][T14178] __x64_sys_mount+0xbf/0xd0 [ 1627.270151][T14178] do_syscall_64+0xf7/0x1c0 [ 1627.270168][T14178] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1627.270183][T14178] RIP: 0033:0x45b349 23:35:26 executing program 1: mkdir(0x0, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba435012283a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1627.293524][T14178] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1627.300009][T14188] kAFS: No cell specified [ 1627.313155][T14178] RSP: 002b:00007f4813e17c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1627.313168][T14178] RAX: ffffffffffffffda RBX: 00007f4813e186d4 RCX: 000000000045b349 [ 1627.313174][T14178] RDX: 0000000020000180 RSI: 0000000020000140 RDI: 0000000020000240 [ 1627.313179][T14178] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1627.313185][T14178] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 23:35:26 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_DEL(r0, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="ac000000020901010000fffffff0000000000009700002002c000100140003006ed80a0ec3677685b4c446deabbe2e8d14000400000000000000400000000000000000000c00020005000100060000000c000200050001003a00000014000100080001007f000001080002007f000001e891871d58a4030c00020005000100880000000c00040008000500f2ff001f0c000200060003000000000008000500000000150800060000000000"], 0xac}, 0x1, 0x0, 0x0, 0x40081}, 0x40000d0) [ 1627.313191][T14178] R13: 0000000000000725 R14: 00000000004c8a46 R15: 0000000000000000 23:35:26 executing program 2: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="5c9afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba435012283a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 23:35:27 executing program 1: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 23:35:27 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_DEL(r0, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="ac000000020901010000fffffffc000000000009700002002c000100140003006ed80a0ec3677685b4c446deabbe2e8d14000400000000000000400000000000000000000c00020005000100060000000c000200050001003a00000014000100080001007f000001080002007f000001e891871d58a4030c00020005000100880000000c00040008000500f2ff001f0c000200060003000000000008000500000000150800060000000000"], 0xac}, 0x1, 0x0, 0x0, 0x40081}, 0x40000d0) [ 1627.538212][T14197] kAFS: unparsable volume name [ 1627.549271][T14196] kAFS: No cell specified 23:35:27 executing program 2: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe255d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba435012283a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 23:35:27 executing program 4 (fault-call:1 fault-nth:1): mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba435012283a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 23:35:27 executing program 1: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 23:35:27 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount(&(0x7f00000005c0)=ANY=[@ANYBLOB="5c211ff2be2e"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 23:35:27 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_DEL(r0, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="ac0000000209010100007fffffff000000000009700002002c000100140003006ed80a0ec3677685b4c446deabbe2e8d14000400000000000000400000000000000000000c00020005000100060000000c000200050001003a00000014000100080001007f000001080002007f000001e891871d58a4030c00020005000100880000000c00040008000500f2ff001f0c000200060003000000000008000500000000150800060000000000"], 0xac}, 0x1, 0x0, 0x0, 0x40081}, 0x40000d0) [ 1627.794899][T14211] FAULT_INJECTION: forcing a failure. [ 1627.794899][T14211] name failslab, interval 1, probability 0, space 0, times 0 [ 1627.805298][T14212] kAFS: unparsable volume name [ 1627.829394][T14209] kAFS: No cell specified 23:35:27 executing program 2: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe2e5d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba435012283a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1627.848495][T14214] kAFS: unparsable volume name [ 1627.860960][T14211] CPU: 1 PID: 14211 Comm: syz-executor.4 Not tainted 5.5.0-rc7-syzkaller #0 [ 1627.869679][T14211] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1627.879741][T14211] Call Trace: [ 1627.883053][T14211] dump_stack+0x1fb/0x318 [ 1627.887433][T14211] should_fail+0x608/0x770 [ 1627.891872][T14211] __should_failslab+0x11a/0x160 [ 1627.896814][T14211] ? __se_sys_mount+0x85/0x110 [ 1627.901606][T14211] should_failslab+0x9/0x20 [ 1627.906126][T14211] __kmalloc_track_caller+0x79/0x340 [ 1627.911445][T14211] strndup_user+0x76/0x150 [ 1627.915877][T14211] __se_sys_mount+0x85/0x110 [ 1627.920487][T14211] __x64_sys_mount+0xbf/0xd0 [ 1627.925170][T14211] do_syscall_64+0xf7/0x1c0 [ 1627.929693][T14211] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1627.935606][T14211] RIP: 0033:0x45b349 [ 1627.939519][T14211] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1627.959131][T14211] RSP: 002b:00007f4813e17c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1627.967559][T14211] RAX: ffffffffffffffda RBX: 00007f4813e186d4 RCX: 000000000045b349 [ 1627.975646][T14211] RDX: 0000000020000180 RSI: 0000000020000140 RDI: 0000000020000240 [ 1627.983647][T14211] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 23:35:27 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_DEL(r0, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="ac0000000209010100009effffff000000000009700002002c000100140003006ed80a0ec3677685b4c446deabbe2e8d14000400000000000000400000000000000000000c00020005000100060000000c000200050001003a00000014000100080001007f000001080002007f000001e891871d58a4030c00020005000100880000000c00040008000500f2ff001f0c000200060003000000000008000500000000150800060000000000"], 0xac}, 0x1, 0x0, 0x0, 0x40081}, 0x40000d0) 23:35:27 executing program 1: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1627.991633][T14211] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 [ 1627.999637][T14211] R13: 0000000000000725 R14: 00000000004c8a46 R15: 0000000000000001 23:35:27 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount(&(0x7f00000005c0)=ANY=[@ANYBLOB="235c1ff2be2e"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 23:35:27 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_DEL(r0, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="ac000000020901010000efffffff000000000009700002002c000100140003006ed80a0ec3677685b4c446deabbe2e8d14000400000000000000400000000000000000000c00020005000100060000000c000200050001003a00000014000100080001007f000001080002007f000001e891871d58a4030c00020005000100880000000c00040008000500f2ff001f0c000200060003000000000008000500000000150800060000000000"], 0xac}, 0x1, 0x0, 0x0, 0x40081}, 0x40000d0) 23:35:27 executing program 2: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe2f5d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba435012283a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1628.121204][T14224] kAFS: No cell specified [ 1628.134481][T14225] kAFS: No cell specified [ 1628.172435][T14229] kAFS: No cell specified 23:35:27 executing program 1: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 23:35:27 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_DEL(r0, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="ac000000020901010000f0ffffff000000000009700002002c000100140003006ed80a0ec3677685b4c446deabbe2e8d14000400000000000000400000000000000000000c00020005000100060000000c000200050001003a00000014000100080001007f000001080002007f000001e891871d58a4030c00020005000100880000000c00040008000500f2ff001f0c000200060003000000000008000500000000150800060000000000"], 0xac}, 0x1, 0x0, 0x0, 0x40081}, 0x40000d0) [ 1628.306564][ T5679] ------------[ cut here ]------------ [ 1628.312746][ T5679] name 'šþ/]uwo,"¹cðacýµ‚•´[²$ð“5x~µsþ&æ¡tw}ùª™zºcp(' [ 1628.320107][ T5679] WARNING: CPU: 0 PID: 5679 at fs/proc/generic.c:178 __proc_create+0x25a/0xb60 [ 1628.322108][T14236] kAFS: Bad value for 'source' [ 1628.329053][ T5679] Kernel panic - not syncing: panic_on_warn set ... [ 1628.329078][ T5679] CPU: 0 PID: 5679 Comm: kworker/0:1 Not tainted 5.5.0-rc7-syzkaller #0 [ 1628.329084][ T5679] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1628.329186][ T5679] Workqueue: afs afs_manage_cell [ 1628.363863][ T5679] Call Trace: [ 1628.367166][ T5679] dump_stack+0x1fb/0x318 [ 1628.371508][ T5679] panic+0x264/0x7a9 [ 1628.375414][ T5679] ? __warn+0x105/0x210 [ 1628.379597][ T5679] ? __proc_create+0x25a/0xb60 [ 1628.384377][ T5679] __warn+0x209/0x210 [ 1628.388374][ T5679] ? __proc_create+0x25a/0xb60 [ 1628.393152][ T5679] report_bug+0x1b6/0x2f0 [ 1628.397508][ T5679] ? __proc_create+0x25a/0xb60 [ 1628.402372][ T5679] do_error_trap+0xda/0x440 [ 1628.406912][ T5679] do_invalid_op+0x36/0x40 [ 1628.411359][ T5679] ? __proc_create+0x25a/0xb60 [ 1628.416146][ T5679] invalid_op+0x23/0x30 [ 1628.420325][ T5679] RIP: 0010:__proc_create+0x25a/0xb60 [ 1628.425716][ T5679] Code: 07 00 00 49 89 c6 e8 f5 48 94 ff e9 56 fe ff ff e8 eb 48 94 ff 48 8b 75 b8 45 31 ed 48 c7 c7 39 52 e1 88 31 c0 e8 36 55 66 ff <0f> 0b 48 c7 c7 88 43 11 89 e8 08 de 1a 06 e9 bc 00 00 00 e8 be 48 [ 1628.445624][ T5679] RSP: 0018:ffffc900084afa90 EFLAGS: 00010246 [ 1628.451731][ T5679] RAX: 96387eb5e8c54d00 RBX: 0000000000000005 RCX: ffff888095fba200 [ 1628.459717][ T5679] RDX: 0000000000000000 RSI: 0000000000000001 RDI: 0000000000000000 [ 1628.467736][ T5679] RBP: ffffc900084afb00 R08: ffffffff815f9d24 R09: ffffed1015d84592 [ 1628.475727][ T5679] R10: ffffed1015d84592 R11: 0000000000000000 R12: dffffc0000000000 [ 1628.483712][ T5679] R13: 0000000000000000 R14: 0000000000000002 R15: 0000000000000000 [ 1628.491786][ T5679] ? vprintk_emit+0x2d4/0x3a0 [ 1628.496505][ T5679] ? rcu_read_lock_sched_held+0x10b/0x170 [ 1628.502253][ T5679] proc_mkdir_data+0x8b/0x150 [ 1628.508445][ T5679] afs_proc_cell_setup+0x9d/0x150 [ 1628.513501][ T5679] afs_manage_cell+0x750/0x1500 [ 1628.518402][ T5679] ? rcu_read_lock_sched_held+0x10b/0x170 [ 1628.524251][ T5679] process_one_work+0x7f5/0x10d0 [ 1628.529232][ T5679] worker_thread+0xbbc/0x1630 [ 1628.533958][ T5679] kthread+0x332/0x350 [ 1628.538051][ T5679] ? rcu_lock_release+0x30/0x30 [ 1628.542922][ T5679] ? kthread_blkcg+0xe0/0xe0 [ 1628.547535][ T5679] ret_from_fork+0x24/0x30 [ 1628.553367][ T5679] Kernel Offset: disabled [ 1628.557820][ T5679] Rebooting in 86400 seconds..