NY=[@ANYBLOB="4000000010001fff000000000000000000000000", @ANYRES32=0x0, @ANYBLOB="0000004bb14c484d8a0000000100200012001000010069703665727370616e0000000c000ae292d19586f259b118"], 0x40}}, 0x0) ioctl$KDGKBDIACR(r1, 0x4b4a, &(0x7f00000003c0)=""/147) r3 = syz_open_dev$usb(&(0x7f0000000240)='/dev/bus/usb/00#/00#\x00', 0x6, 0x3fffe) write$cgroup_type(r3, &(0x7f0000000280)='threaded\x00', 0x9) r4 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) getsockopt$bt_BT_SNDMTU(r4, 0x112, 0xc, &(0x7f0000000100)=0x16, &(0x7f00000001c0)=0x2) getsockopt$inet_sctp_SCTP_NODELAY(r3, 0x84, 0x3, &(0x7f0000000840), &(0x7f0000000880)=0x4) syz_open_dev$sndctrl(&(0x7f0000000900)='/dev/snd/controlC#\x00', 0x46c2, 0x101000) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(r4, 0x80045301, &(0x7f0000000200)) r5 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000500)='IPVS\x00') ioctl$VIDIOC_S_AUDIO(r3, 0x40345622, &(0x7f00000008c0)={0x4, "eee1f582878e90213a45b1a1aceab3e000b43061caed3b0188c456d23fc8fbd2", 0x2, 0x1}) sendmsg$IPVS_CMD_NEW_DEST(r4, &(0x7f0000000640)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x10080000}, 0xc, &(0x7f0000000600)={&(0x7f0000000540)={0x90, r5, 0x64de6ca551eb3db8, 0x70bd29, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0xfffffffffffff801}, @IPVS_CMD_ATTR_DEST={0x18, 0x2, [@IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@multicast1}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x2}, @IPVS_CMD_ATTR_SERVICE={0x54, 0x1, [@IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'lc\x00'}, @IPVS_SVC_ATTR_SCHED_NAME={0xc, 0x6, 'none\x00'}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_FWMARK={0x8}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x3c}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0x2}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x32}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@loopback}]}]}, 0x90}, 0x1, 0x0, 0x0, 0x80}, 0x4000000) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r4, 0x2405, r1) r6 = syz_open_dev$amidi(&(0x7f0000000140)='/dev/amidi#\x00', 0x1ff, 0x8002000) ioctl$DRM_IOCTL_AGP_ENABLE(r1, 0x40086432, &(0x7f00000006c0)=0xffff) sendmsg$IPVS_CMD_GET_DAEMON(r4, &(0x7f0000000800)={&(0x7f0000000700)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f00000007c0)={&(0x7f0000000740)={0x5c, r5, 0x402, 0x70bd25, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_SERVICE={0xc, 0x1, [@IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x84}]}, @IPVS_CMD_ATTR_DAEMON={0x18, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'ip_vti0\x00'}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x7}, @IPVS_CMD_ATTR_DEST={0x1c, 0x2, [@IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x7}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x3}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e22}]}]}, 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x24004081) ioctl$VIDIOC_TRY_EXT_CTRLS(r6, 0xc0205649, &(0x7f00000000c0)={0xbf0000, 0x0, 0x4, [], &(0x7f0000000080)={0x9b0b79, 0x7fffffff, [], @p_u16=&(0x7f0000000040)=0xffffffff}}) 16:04:19 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020200090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e0100000001000000000004002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}}, 0x0) [ 901.499098] IPVS: ftp: loaded support on port[0] = 21 [ 901.590018] libceph: parse_ips bad ip '[d::]: [ 901.590018] llb' [ 901.638031] libceph: parse_ips bad ip '[d::]: [ 901.638031] llb' [ 901.697698] netlink: 32 bytes leftover after parsing attributes in process `syz-executor3'. [ 901.752327] netlink: 32 bytes leftover after parsing attributes in process `syz-executor3'. [ 902.127914] IPVS: ftp: loaded support on port[0] = 21 [ 902.491427] bridge0: port 1(bridge_slave_0) entered blocking state [ 902.498304] bridge0: port 1(bridge_slave_0) entered disabled state [ 902.505780] device bridge_slave_0 entered promiscuous mode [ 902.554564] bridge0: port 2(bridge_slave_1) entered blocking state [ 902.561063] bridge0: port 2(bridge_slave_1) entered disabled state [ 902.569119] device bridge_slave_1 entered promiscuous mode [ 902.617985] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 902.666764] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 902.800677] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 902.833006] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 902.961626] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 902.968952] team0: Port device team_slave_0 added [ 902.997449] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 903.004597] team0: Port device team_slave_1 added [ 903.034578] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 903.081482] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 903.126678] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 903.158448] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 903.524848] bridge0: port 2(bridge_slave_1) entered blocking state [ 903.531745] bridge0: port 2(bridge_slave_1) entered forwarding state [ 903.538931] bridge0: port 1(bridge_slave_0) entered blocking state [ 903.545571] bridge0: port 1(bridge_slave_0) entered forwarding state [ 903.553517] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 903.648771] device bridge_slave_1 left promiscuous mode [ 903.654325] bridge0: port 2(bridge_slave_1) entered disabled state [ 903.664339] device bridge_slave_0 left promiscuous mode [ 903.670897] bridge0: port 1(bridge_slave_0) entered disabled state [ 903.705153] team0 (unregistering): Port device team_slave_1 removed [ 903.715125] team0 (unregistering): Port device team_slave_0 removed [ 903.728776] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 903.740462] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 903.769550] bond0 (unregistering): Released all slaves [ 904.297681] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 905.460750] 8021q: adding VLAN 0 to HW filter on device bond0 [ 905.577504] ip6_tunnel: ip6tnl1 xmit: Local address not yet configured! [ 905.643747] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 905.819985] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 905.826172] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 905.843009] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 905.996140] 8021q: adding VLAN 0 to HW filter on device team0 16:04:24 executing program 1: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[]::]:\nllb:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 16:04:24 executing program 0: r0 = memfd_create(&(0x7f0000000000)='\x00', 0x1) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000040)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000080)={r0, r0}) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e0100000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}}, 0x0) 16:04:24 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020200090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e010000000100007fffffff002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}}, 0x0) 16:04:24 executing program 4: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[d::]:\nllb:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x7000000, 0x0) 16:04:24 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = getpgrp(0x0) fcntl$setownex(r0, 0xf, &(0x7f0000000000)={0x0, r1}) sendmsg$nl_route(r0, &(0x7f0000001340)={0x0, 0x0, &(0x7f0000001300)={&(0x7f0000000180)=@newlink={0x40, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, @ip6erspan={{0x10, 0x1, 'ip6erspan\x00'}, {0xc, 0x4, [@gre_common_policy=[@IFLA_GRE_IFLAGS={0x8, 0x3}]]}}}]}, 0x40}}, 0x0) 16:04:24 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, 0x0, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_INFO(r1, 0x29, 0x40, &(0x7f00000000c0)={'security\x00\x00\x00\x00\x00\x00\x04\x00'}, &(0x7f0000000140)=0x54) [ 906.572494] ceph: device name is missing path (no : separator in []::]: [ 906.572494] llb:ÿ) [ 906.625058] libceph: parse_ips bad ip '[d::]: [ 906.625058] llb' [ 906.650713] IPVS: ftp: loaded support on port[0] = 21 [ 906.653759] libceph: parse_ips bad ip '[]::]: [ 906.653759] llb' [ 906.669671] libceph: parse_ips bad ip '[]::]: 16:04:24 executing program 4: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[d::]:\nllb:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0xedc000000000, 0x0) 16:04:24 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020200090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e0100000001000000200000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}}, 0x0) [ 906.669671] llb' 16:04:24 executing program 4: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[d::]:\nllb:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0xf0ffff, 0x0) 16:04:24 executing program 3: socketpair(0x1, 0x800, 0x101, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_sctp6_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f00000000c0), &(0x7f0000000100)=0xb) setsockopt(r0, 0xfffffffffffffff9, 0x4, &(0x7f0000000040)="2536f7e2386fe6b11374a23e063c5be9c94613bb5d77a7a7221d0436670bbbfa9317e85926e63e7fe2ee7b3b6eaf35cb54f9fa789eff52481d12248cdfe19c2c52ed26043b89818c3510b4119db49bbe34b70e1e6beb7b4540cfe38f35ae8fb2c079f7eb4059bdd16ca1702ca0c8e8430912160d0575ea0b92fd53c65500", 0x7e) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000001340)={0x0, 0x0, &(0x7f0000001300)={&(0x7f0000000180)=@newlink={0x40, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, @ip6erspan={{0x10, 0x1, 'ip6erspan\x00'}, {0xc, 0x4, [@gre_common_policy=[@IFLA_GRE_IFLAGS={0x8, 0x3}]]}}}]}, 0x40}}, 0x0) 16:04:24 executing program 1: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[]::]:\nllb:\xff', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 16:04:24 executing program 0: r0 = getgid() lstat(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(0xffffffffffffff9c, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)=0x0) getgroups(0x2, &(0x7f0000000280)=[0xee01, 0xffffffffffffffff]) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='system.posix_acl_default\x00', &(0x7f00000002c0)={{}, {0x1, 0x4}, [], {0x4, 0x6}, [{0x8, 0x6, r0}, {0x8, 0x0, r1}, {0x8, 0x6, r2}, {0x8, 0x1, r3}, {0x8, 0x2, r4}], {0x10, 0x1}, {0x20, 0x4}}, 0x4c, 0x1) r5 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r5, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e0100000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}}, 0x0) 16:04:24 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020200090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e0100000001000000400300002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}}, 0x0) 16:04:24 executing program 3: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x40, 0x0) syz_open_dev$media(&(0x7f00000002c0)='/dev/media#\x00', 0x8, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f00000001c0)={&(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ff8000/0x4000)=nil, &(0x7f0000ff9000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000a00000/0x600000)=nil, &(0x7f0000ecf000/0x2000)=nil, &(0x7f0000f27000/0x2000)=nil, &(0x7f0000000100)="d4663cfb895e392220e498ded14bc782e80f18746036b6fb71a3fd7e91e87341e28975dc08a13c44c5888b33a6f363225d62fbb2806bbbb332b00f80c8e3ea6500b0ee24310c83ec7bc38e15b4cc944fa3914cabfe2bd3fb4377f7c856fef4bfa5f0e24a92c0e91b014be37345debae96182010af4e52b89c985d9b5f138b105bbe33be7d4adf1331a182e445b6f984db6e28b6bbd65a8750d7b46b17ebbc37b7f47f8c2fd866350192401e45f774465bd11", 0xb2}, 0x68) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f0000000040)={'filter\x00'}, &(0x7f00000000c0)=0x44) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000001340)={0x0, 0x0, &(0x7f0000001300)={&(0x7f0000000180)=ANY=[]}, 0x1, 0x0, 0x0, 0x4e9913067a83fb11}, 0xffffffffffffffff) ioctl$KVM_HAS_DEVICE_ATTR(r0, 0x4018aee3, &(0x7f0000000280)={0x0, 0x6, 0x2, &(0x7f0000000240)=0x100000001}) [ 906.850381] ceph: device name is missing path (no : separator in []::]: [ 906.850381] llb:ÿ) 16:04:24 executing program 1: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[]::]:\nllb:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 16:04:24 executing program 0: sendmsg$key(0xffffffffffffffff, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000000)=ANY=[@ANYBLOB="020300090c000000ffffffffffff00ff0200130002a05f800c3acc1e0000000000000000000040030006000000000802004e0100000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e000000100000000000000006425756b40485733cbd17ac7a8e7694d664060c4e9b5bb4f326697ff3a01"], 0x60}}, 0x0) utime(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)={0x4, 0x7925}) 16:04:24 executing program 4: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[d::]:\nllb:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0xf0, 0x0) [ 907.002795] libceph: parse_ips bad ip '[]::]: [ 907.002795] llb' [ 907.020621] libceph: parse_ips bad ip '[]::]: [ 907.020621] llb' [ 907.219333] IPVS: ftp: loaded support on port[0] = 21 16:04:24 executing program 3: sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001340)={0x0, 0x0, &(0x7f0000001300)={&(0x7f0000000180)=@newlink={0x40, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, @ip6erspan={{0x10, 0x1, 'ip6erspan\x00'}, {0xc, 0x4, [@gre_common_policy=[@IFLA_GRE_IFLAGS={0x8, 0x3}]]}}}]}, 0x40}}, 0x0) 16:04:24 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020200090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e01000000010000e0000001002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}}, 0x0) 16:04:24 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000000)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e0100000001000000000000002402000100e5ffffff0000000200000000030005000000000002004e20e00000010000000000000000be6375cd8394caf899ba793e1434edbd1af976419e07478303d22d6494a6825382c8f08481000650d7130f0215e0322e9c59f53ba4a4905f7af1345a72e8ff14d4e266c28455e4b4cb4662a0b562d62b2fbbd4959c748015df7337621956737484a8a2b6f7756da90f8658b6464f9b6bd75a38da2be9456f1c8e2a2d8f932d827d7cd4ef126bb2ab08f0138153c66dd46f3ec5d7a8e02d8adcc3a3842e149d960f2a534fc85c59457bde78b03cf4cda5ad22ddd47655bb71b2c75a18"], 0x60}}, 0x0) 16:04:24 executing program 1: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[]::]:\nllb:\xc0', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 16:04:24 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, 0x0, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_INFO(r1, 0x29, 0x40, &(0x7f00000000c0)={'security\x00\x00\x00\x00\xc6\x00'}, &(0x7f0000000140)=0x54) 16:04:24 executing program 4: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[d::]:\nllb:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0xedc0, 0x0) 16:04:24 executing program 3: r0 = accept(0xffffffffffffff9c, &(0x7f0000000000)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000080)=0x80) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') sendmsg$IPVS_CMD_GET_DEST(r0, &(0x7f0000000340)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000001c0)={0x154, r1, 0x1, 0x70bd26, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0xd80d}, @IPVS_CMD_ATTR_SERVICE={0x58, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x66}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0xfffffffffffffffa}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x3f}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x3}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x72}, @IPVS_SVC_ATTR_PROTOCOL={0x8}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@local}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e22}]}, @IPVS_CMD_ATTR_DAEMON={0x30, 0x3, [@IPVS_DAEMON_ATTR_MCAST_TTL={0x8}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @ipv4={[], [], @multicast1}}, @IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x1f}]}, @IPVS_CMD_ATTR_DEST={0x1c, 0x2, [@IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x2}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x1f}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0xffffffff}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x5}, @IPVS_CMD_ATTR_DAEMON={0x2c, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @ipv4={[], [], @multicast2}}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'ip6gretap0\x00'}]}, @IPVS_CMD_ATTR_DEST={0x38, 0x2, [@IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e22}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@multicast2}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x2}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x3}, @IPVS_DEST_ATTR_WEIGHT={0x8}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x5}, @IPVS_CMD_ATTR_DEST={0x14, 0x2, [@IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x81}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x7}]}, @IPVS_CMD_ATTR_SERVICE={0xc, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x178d1889}]}]}, 0x154}, 0x1, 0x0, 0x0, 0x40c0}, 0x8000) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000001340)={0x0, 0x0, &(0x7f0000001300)={&(0x7f0000000180)=@newlink={0x40, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, @ip6erspan={{0x10, 0x1, 'ip6erspan\x00'}, {0xc, 0x4, [@gre_common_policy=[@IFLA_GRE_IFLAGS={0x8, 0x3}]]}}}]}, 0x40}}, 0x0) 16:04:25 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020200090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e0100000001000000034000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}}, 0x0) [ 907.341056] ceph: device name is missing path (no : separator in []::]: [ 907.341056] llb:À) 16:04:25 executing program 4: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[d::]:\nllb:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x600, 0x0) 16:04:25 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=ANY=[@ANYPTR], 0x8}}, 0x0) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vhci\x00', 0x200800, 0x0) connect$l2tp(r1, &(0x7f00000000c0)=@pppol2tp={0x18, 0x1, {0x0, r0, {0x2, 0x4e23, @local}, 0x0, 0x0, 0x3}}, 0x26) [ 907.438035] ceph: device name is missing path (no : separator in []::]: [ 907.438035] llb:À) [ 907.471388] IPVS: ftp: loaded support on port[0] = 21 16:04:25 executing program 3: r0 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x0, 0x2) ioctl$KVM_GET_API_VERSION(r0, 0xae00, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000001340)={0x0, 0x0, &(0x7f0000001300)={&(0x7f0000000180)=@newlink={0x40, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, @ip6erspan={{0x10, 0x1, 'ip6erspan\x00'}, {0xc, 0x4, [@gre_common_policy=[@IFLA_GRE_IFLAGS={0x8, 0x3}]]}}}]}, 0x40}}, 0x0) 16:04:25 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020200090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e0100000001000000000008002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}}, 0x0) 16:04:25 executing program 1: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[]::]:\nllb:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 16:04:25 executing program 4: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[d::]:\nllb:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x2000, 0x0) [ 907.521126] libceph: parse_ips bad ip '[d::]: [ 907.521126] llb' [ 907.555600] libceph: parse_ips bad ip '[d::]: [ 907.555600] llb' 16:04:25 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e0100000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}}, 0x0) ioctl$sock_SIOCSIFBR(r0, 0x8941, &(0x7f0000000040)=@add_del={0x2, &(0x7f0000000000)='team_slave_0\x00'}) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000200)={{{@in=@remote, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@mcast1}}, &(0x7f0000000300)=0xe8) ioctl$TUNSETIFINDEX(r0, 0x400454da, &(0x7f0000000340)=r1) 16:04:25 executing program 1: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[]::]:\nllb:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) [ 907.620114] libceph: parse_ips bad ip '[]::]: [ 907.620114] llb' [ 907.744260] libceph: parse_ips bad ip '[]::]: [ 907.744260] llb' [ 907.782589] libceph: parse_ips bad ip '[]::]: [ 907.782589] llb' 16:04:25 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, 0x0, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_INFO(r1, 0x29, 0x40, &(0x7f00000000c0)={'security\x00\x00\x00\x03\xf4\x00'}, &(0x7f0000000140)=0x54) 16:04:25 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020200090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e01000000010000fbffffff002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}}, 0x0) 16:04:25 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) r1 = syz_open_dev$cec(&(0x7f0000000000)='/dev/cec#\x00', 0x2, 0x2) socket$key(0xf, 0x3, 0x2) ioctl$KVM_GET_NESTED_STATE(r1, 0xc080aebe, &(0x7f0000000040)={0x0, 0x0, 0x2080}) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e0100000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}}, 0x0) 16:04:25 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x3, 0x2) getpeername$packet(r1, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000080)=0x14) sendmsg$nl_route(r0, &(0x7f0000001340)={0x0, 0x0, &(0x7f0000001300)={&(0x7f0000000180)=ANY=[@ANYBLOB="40d19defab57e36e534d6c2b40b0bdca828a2404", @ANYRES32=0x0, @ANYBLOB="0000000000000000200012001000010069703665727370616e0000000c0004000800030000000000"], 0x40}}, 0x0) 16:04:25 executing program 1: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[]::]:\nllb:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 16:04:25 executing program 4: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[d::]:\nllb:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x4, 0x0) 16:04:25 executing program 4: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[d::]:\nllb:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0xf6ffffff00000000, 0x0) [ 908.097525] libceph: parse_ips bad ip '[d::]: [ 908.097525] llb' [ 908.129300] libceph: parse_ips bad ip '[d::]: [ 908.129300] llb' [ 908.136895] libceph: parse_ips bad ip '[]::]: [ 908.136895] llb' 16:04:25 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020200090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e0100000001000008000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}}, 0x0) 16:04:25 executing program 3: getxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@random={'system.', 'ip6erspan\x00'}, &(0x7f0000000080)=""/185, 0xb9) r0 = socket$nl_route(0x10, 0x3, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000001c0)={{{@in6=@loopback, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@loopback}}, &(0x7f00000002c0)=0xe8) fstat(r0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) chown(&(0x7f0000000140)='./file0\x00', r1, r2) sendmsg$nl_route(r0, &(0x7f0000001340)={0x0, 0x0, &(0x7f0000001300)={&(0x7f0000000180)=@newlink={0x40, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, @ip6erspan={{0x10, 0x1, 'ip6erspan\x00'}, {0xc, 0x4, [@gre_common_policy=[@IFLA_GRE_IFLAGS={0x8, 0x3}]]}}}]}, 0x40}}, 0x0) [ 908.169625] libceph: parse_ips bad ip '[]::]: [ 908.169625] llb' [ 908.209051] IPVS: ftp: loaded support on port[0] = 21 16:04:25 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff0200137f1c7f4e651958cd37ed0002000000000000000000004e0100000001000000000000002401000100f8ffffff0000000200000000420005000000000002004e20e00005000000000000000000"], 0x787}}, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x80040, 0x0) r2 = inotify_add_watch(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x4000000) inotify_rm_watch(r1, r2) 16:04:25 executing program 1: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[]::]:\nllb:\x02', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 16:04:25 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020200090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e0100000001000000000001002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}}, 0x0) [ 908.367930] ceph: device name is missing path (no : separator in []::]: [ 908.367930] llb:) [ 908.690479] IPVS: ftp: loaded support on port[0] = 21 16:04:26 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, 0x0, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_INFO(r1, 0x29, 0x40, &(0x7f00000000c0)={'security\x00\x00\x00\x04\x00'}, &(0x7f0000000140)=0x54) 16:04:26 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001340)={0x0, 0x43, &(0x7f0000001300)={&(0x7f0000000000)=@newlink={0x40, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, @ip6erspan={{0x10, 0x1, 'ip6erspan\x00'}, {0xc, 0x4, [@gre_common_policy=[@IFLA_GRE_IFLAGS={0x8, 0x3}]]}}}]}, 0x40}}, 0xfffffffffffffffe) 16:04:26 executing program 1: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[]::]:\nllb:\x06', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 16:04:26 executing program 4: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[d::]:\nllb:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x40000, 0x0) 16:04:26 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) r1 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x100, 0x200) ioctl$VIDIOC_G_EDID(r1, 0xc0285628, &(0x7f0000000080)={0x0, 0x10000, 0xffff, [], &(0x7f0000000040)=0x3}) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000005004e0100000001000000080000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}}, 0x0) 16:04:26 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020200090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e0100000001000000000020002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}}, 0x0) 16:04:26 executing program 4: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[d::]:\nllb:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0xffffff7f00000000, 0x0) [ 908.859242] ceph: device name is missing path (no : separator in []::]: [ 908.859242] llb:) 16:04:26 executing program 1: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[]::]:\nllb:\xff', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 16:04:26 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000cb3ff8)='./file0\x00', 0x0) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mkdirat(r1, &(0x7f0000643ff8)='./file0\x00', 0x8000) r2 = open$dir(&(0x7f00004daff8)='./file0\x00', 0x0, 0x0) r3 = openat(r2, &(0x7f00006e9ff8)='./file0\x00', 0x0, 0x0) symlinkat(&(0x7f000001fff7)='./file0/file0\x00', r3, &(0x7f000001fff8)='./file0\x00') renameat2(r3, &(0x7f00000001c0)='./file0/file0/file0/file0\x00', r3, &(0x7f0000284000)='./file0/file0/file0/file0\x00', 0x0) sendmsg$nl_route(r0, &(0x7f0000001340)={0x0, 0x0, &(0x7f0000001300)={&(0x7f0000000180)=ANY=[@ANYBLOB="40002613c3151f0af827869a01ccfb6900000000", @ANYRES32=0x0, @ANYBLOB="0000000000000000200012001000010069703665727370616e0000000c0004000800030000000000"], 0x40}}, 0x0) 16:04:26 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e0100000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}}, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000040)=0xc) getpriority(0x0, r1) 16:04:26 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020200090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e0100000001000000040000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}}, 0x0) [ 909.002224] IPVS: ftp: loaded support on port[0] = 21 16:04:26 executing program 4: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[d::]:\nllb:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x40000000, 0x0) [ 909.033888] ceph: device name is missing path (no : separator in []::]: [ 909.033888] llb:ÿ) [ 909.261127] libceph: parse_ips bad ip '[d::]: [ 909.261127] llb' [ 909.306605] libceph: parse_ips bad ip '[d::]: [ 909.306605] llb' 16:04:27 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, 0x0, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_INFO(r1, 0x29, 0x40, &(0x7f00000000c0)={'security\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00~\x00'}, &(0x7f0000000140)=0x54) 16:04:27 executing program 3: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0x1, 0x2500c0) ioctl$VIDIOC_G_PRIORITY(r0, 0x80045643, 0x3) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x227, &(0x7f0000001300)={&(0x7f0000000040)=@newlink={0x40, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, @ip6erspan={{0x10, 0x1, 'ip6erspan\x00'}, {0xc, 0x4, [@gre_common_policy=[@IFLA_GRE_IFLAGS={0x8, 0x3}]]}}}]}, 0x40}}, 0x0) 16:04:27 executing program 1: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[]::]:\nllb:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 16:04:27 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020200090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e0100000001000000080000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}}, 0x0) 16:04:27 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e0100000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}}, 0x0) socket$key(0xf, 0x3, 0x2) 16:04:27 executing program 4: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[d::]:\nllb:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x5, 0x0) 16:04:27 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001340)={0x0, 0xfffffffffffffd2b, &(0x7f0000000000)={&(0x7f0000000180)=@newlink={0x40, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, @ip6erspan={{0x10, 0x1, 'ip6erspan\x00'}, {0xc, 0x4, [@gre_common_policy=[@IFLA_GRE_IFLAGS={0x8, 0x3}]]}}}]}, 0xfffffffffffffee6}}, 0x0) [ 909.631133] libceph: parse_ips bad ip '[]::]: [ 909.631133] llb' [ 909.637921] libceph: parse_ips bad ip '[d::]: [ 909.637921] llb' 16:04:27 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020200090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e0100000001000000000000102402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}}, 0x0) [ 909.680263] IPVS: ftp: loaded support on port[0] = 21 [ 909.690873] libceph: parse_ips bad ip '[d::]: [ 909.690873] llb' 16:04:27 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e0100000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}}, 0x0) 16:04:27 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001340)={0x0, 0x0, &(0x7f0000001300)={&(0x7f0000000180)=@ipmr_newroute={0x30, 0x18, 0x700, 0x70bd2c, 0x25dfdbfc, {0x80, 0x0, 0x34, 0x9, 0x0, 0x0, 0xff, 0xe, 0x1000}, [@RTA_GATEWAY={0x8, 0x5, @broadcast}, @RTA_MULTIPATH={0xc, 0x9, {0x6, 0x0, 0x101}}]}, 0x30}}, 0x0) connect(r0, &(0x7f0000000040)=@sco={0x1f, {0x800, 0x499, 0x4, 0x9, 0x10000, 0x7}}, 0x80) syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x2, 0x40000) [ 909.729083] libceph: parse_ips bad ip '[]::]: [ 909.729083] llb' 16:04:27 executing program 1: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[]::]:\nllb:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 16:04:27 executing program 4: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[d::]:\nllb:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x500000000000000, 0x0) [ 909.925214] libceph: parse_ips bad ip '[]::]: [ 909.925214] llb' [ 909.990500] libceph: parse_ips bad ip '[]::]: [ 909.990500] llb' 16:04:27 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, 0x0, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_INFO(r1, 0x29, 0x40, &(0x7f00000000c0)={'security\x00\x00\x00\x00\x8e\x00'}, &(0x7f0000000140)=0x54) 16:04:27 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020200090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e0100000001000000000000042402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}}, 0x0) 16:04:27 executing program 0: r0 = syz_open_dev$adsp(&(0x7f0000000280)='/dev/adsp#\x00', 0x2, 0x200) ioctl$SIOCGETNODEID(r0, 0x89e1, &(0x7f00000002c0)={0x4}) socket$key(0xf, 0x3, 0x2) 16:04:27 executing program 4: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[d::]:\nllb:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x6000000000000000, 0x0) 16:04:27 executing program 3: r0 = openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x800, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(r0, 0x119, 0x1, &(0x7f0000000100), 0x4) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000001340)={0x0, 0x0, &(0x7f0000001300)={&(0x7f0000000180)=@newlink={0x40, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, @ip6erspan={{0x10, 0x1, 'ip6erspan\x00'}, {0xc, 0x4, [@gre_common_policy=[@IFLA_GRE_IFLAGS={0x8, 0x3}]]}}}]}, 0x40}}, 0x20000040) 16:04:27 executing program 1: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[]::]:\nllb:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 16:04:27 executing program 4: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[d::]:\nllb:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x3000000, 0x0) [ 910.359945] libceph: parse_ips bad ip '[]::]: [ 910.359945] llb' 16:04:28 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020200090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e0100000001000000fffffffb2402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}}, 0x0) [ 910.408274] IPVS: ftp: loaded support on port[0] = 21 16:04:28 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000001ac0)={&(0x7f0000001a00), 0xc, &(0x7f0000000000)={&(0x7f0000001a40)=@ipv4_newrule={0x28, 0x20, 0x709, 0x0, 0x0, {0x2, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, [@FRA_SRC={0x8, 0x2, @broadcast}]}, 0x28}}, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000000)={{{@in=@remote, @in=@loopback}}, {{@in=@broadcast}, 0x0, @in6=@mcast2}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route(r0, 0xfffffffffffffffe, 0x4) r2 = syz_open_dev$radio(&(0x7f0000000140)='/dev/radio#\x00', 0x0, 0x2) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffff9c, 0x84, 0x71, &(0x7f0000000180)={0x0, 0x6}, &(0x7f00000001c0)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r2, 0x84, 0x1f, &(0x7f0000000200)={r3, @in={{0x2, 0x4e20, @rand_addr=0x90}}, 0x7fffffff, 0x1}, 0x90) 16:04:28 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000000)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e0100000001000000000000002402000100f8ffff00000000030005000000000002004e20e000000100000000000000000000612118f4a0c3c032f9ba9991fdd6e15036ad54b931162285c9fc8f382df065be305a8282f5aad592eda9e877342f71c08faa7a57fede2bf4dd489d30bd8a051666b663124901cce2ed47e1a2a03dc983dfba66e3559a"], 0x60}}, 0x0) [ 910.443952] libceph: parse_ips bad ip '[]::]: [ 910.443952] llb' [ 910.452945] libceph: parse_ips bad ip '[d::]: [ 910.452945] llb' 16:04:28 executing program 4: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[d::]:\nllb:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x5000000, 0x0) 16:04:28 executing program 1: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[]::]:\nllb:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) [ 910.644112] libceph: parse_ips bad ip '[]::]: [ 910.644112] llb' [ 910.675259] libceph: parse_ips bad ip '[d::]: [ 910.675259] llb' [ 910.683928] libceph: parse_ips bad ip '[]::]: [ 910.683928] llb' [ 910.719067] libceph: parse_ips bad ip '[d::]: [ 910.719067] llb' [ 910.898651] IPVS: ftp: loaded support on port[0] = 21 16:04:28 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, 0x0, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_INFO(r1, 0x29, 0x40, &(0x7f00000000c0)={'security\x00\x00\x00\x01\xdc\x00'}, &(0x7f0000000140)=0x54) 16:04:28 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020200090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e0100000001000000000000202402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}}, 0x0) 16:04:28 executing program 3: r0 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x5, 0x80000) r1 = gettid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000300)={{{@in=@remote, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @loopback}}, 0x0, @in6=@mcast1}}, &(0x7f0000000400)=0xe8) stat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r4 = syz_open_procfs$namespace(0x0, &(0x7f0000000500)='ns/ipc\x00') lseek(r0, 0x0, 0x2) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000540)='/dev/ptmx\x00', 0x4080, 0x0) r6 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000580)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffff9c, 0xc00c642e, &(0x7f00000005c0)={0x0, 0x80000, r0}) r8 = socket$nl_route(0x10, 0x3, 0x0) r9 = syz_open_dev$swradio(&(0x7f00000007c0)='/dev/swradio#\x00', 0x0, 0x2) r10 = socket$inet(0x2, 0x800, 0x0) r11 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000640)='/proc/self/attr/sockcreate\x00', 0x2, 0x0) r12 = syz_open_dev$swradio(&(0x7f0000000680)='/dev/swradio#\x00', 0x0, 0x2) r13 = syz_open_dev$amidi(&(0x7f00000006c0)='/dev/amidi#\x00', 0x5, 0x8800) sendmsg$unix(r0, &(0x7f0000000780)={&(0x7f0000000040)=@abs={0x0, 0x0, 0x4e23}, 0x6e, &(0x7f00000002c0)=[{&(0x7f00000001c0)="378b467cb3dad84152c5408079329f8bffab8b8e9bee5ad6572ad1f9d82a53d64bdeea34e60f12d03bb907d5ebc4fea09c2d82a9043e3be7638229267bd37fe2d1491b2f24314bceded307935f580a6fca753001468d311d007de44d1e5ed4150b64df07516a15f18b201723f928eebf222b4e99c45303b3e475aaefedc64e6ab2685ef747cd0099d9818b276de0aa8b05678aadcebe2ae7deb1a25417d0e3b0953015efd9affa60adbf74ddb120957e81fae5e6ad262a60acb449de633659979775993f13e023ed83be7b099a2fe88bad06206e9c13586f0c33933ae94f9dcb6b02c48cd494773cef6e698c4019c3ff0eece8b34b", 0xf5}, {&(0x7f00000000c0)="ca70a294ca6eb66180970853c7d7405b7910c4e2ef08adc3fceee051c93c4f5d4f977700cb1c18d4c9fe6b1249380fe343d054e428e19e1c1aafa34b86f9b3bbe484f5718fd9fa432c611502f13a2d59b306ff7763e0d104af735653d45927cf549aa48c48b7176e81c12bbdf346c48543ac193ffafb4d24ec8781afff8a328a06beefb7b38b7836", 0x88}], 0x2, &(0x7f0000000700)=[@cred={0x20, 0x1, 0x2, r1, r2, r3}, @rights={0x18, 0x1, 0x1, [r4, r5]}, @rights={0x30, 0x1, 0x1, [r6, r7, r8, r9, r10, r11, r12, r13]}], 0x68, 0x40004}, 0x8000) r14 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r14, &(0x7f0000001340)={0x0, 0x0, &(0x7f0000001300)={&(0x7f0000000800)=ANY=[@ANYBLOB="4000000010001fff000000000000000000000000", @ANYRES32=0x0, @ANYBLOB="00000000000000002000120010000c0004000800030020000000ebdd21b238d79e21d5088ff5ef0a2dac9a7994941b1ebee843171a0d50c7ab4d1d1baf3aa5f26a4dd29903d7bb68be115b6d430e93da7bb12b1463150cf9e2d77d879f98b39a060c0d87540bbd2aaf09b1d36edaf52516b3ab6c"], 0x40}}, 0x0) 16:04:28 executing program 1: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[]::]:\nllb:N', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 16:04:28 executing program 0: r0 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x7fffffff, 0x100) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_GET(r0, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x54, r1, 0x400, 0x70bd2d, 0x25dfdbfe, {}, [@TIPC_NLA_MON={0x24, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x3}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xbfc}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x8}]}, @TIPC_NLA_MON={0x1c, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x9}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x64}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x2d78}]}]}, 0x54}, 0x1, 0x0, 0x0, 0x80}, 0x40001) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e0100000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}}, 0x0) 16:04:28 executing program 4: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[d::]:\nllb:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0xf6ffffff, 0x0) 16:04:28 executing program 4: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[d::]:\nllb:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x300000000000000, 0x0) [ 911.023754] ceph: device name is missing path (no : separator in []::]: [ 911.023754] llb:N) 16:04:28 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) pipe(&(0x7f0000000000)={0xffffffffffffffff}) ioctl$VIDIOC_G_AUDIO(r1, 0x80345621, &(0x7f0000000040)) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e0100000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}}, 0x0) r2 = syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_RESET_LINK_STATS(r1, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x28, r2, 0x1, 0x70bd28, 0x25dfdbff, {{}, 0x0, 0x410c, 0x0, {0xc, 0x14, 'syz0\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x4008000}, 0x4001) 16:04:28 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020200090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e01000000010000007fffffff2402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}}, 0x0) 16:04:28 executing program 1: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[]::]:\nllb:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) [ 911.075528] IPVS: ftp: loaded support on port[0] = 21 [ 911.082730] netlink: 12 bytes leftover after parsing attributes in process `syz-executor3'. 16:04:28 executing program 4: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[d::]:\nllb:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x600000000000000, 0x0) 16:04:28 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020200090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e0100000001000000004003002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}}, 0x0) [ 911.287645] libceph: parse_ips bad ip '[]::]: [ 911.287645] llb' [ 911.580790] IPVS: ftp: loaded support on port[0] = 21 16:04:29 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, 0x0, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_INFO(r1, 0x29, 0x40, &(0x7f00000000c0)={'security\x00\x00\x00\xfe\x03\x00'}, &(0x7f0000000140)=0x54) 16:04:29 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001340)={0x0, 0x0, &(0x7f0000001300)={&(0x7f0000000080)=ANY=[@ANYBLOB="4000000010001f26a77a63e769dbbef10000000000000000000000", @ANYBLOB="593a07463808120fbfb3b7c7dbecd6ede379cdba4418e2d28877320340a6070fd2cb2add83387691e5da6ddaec92354c6c23f41b2f40584f3442b050a55404c1e32a6cf9aa82830e6a6772171f442657bef8176c95a7da", @ANYBLOB="0000000000000000200012001000010069703665727370616e0000000c0004000800030000000000"], 0x3}, 0x1, 0x0, 0x0, 0x4008010}, 0x0) 16:04:29 executing program 1: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[]::]:\nllb:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 16:04:29 executing program 4: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[d::]:\nllb:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x8cffffff00000000, 0x0) 16:04:29 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e0100000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}}, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x9, 0x200) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_DISABLE(r1, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x64, r2, 0x301, 0x70bd26, 0x25dfdbfe, {}, [@TIPC_NLA_BEARER={0xc, 0x1, [@TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x6}]}, @TIPC_NLA_MEDIA={0x4}, @TIPC_NLA_MEDIA={0x40, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x14}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1000}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}]}]}, 0x64}}, 0x20000080) 16:04:29 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020200090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e0100000001000000020000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}}, 0x0) [ 911.688595] libceph: parse_ips bad ip '[]::]: [ 911.688595] llb' 16:04:29 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000000)=ANY=[@ANYBLOB="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"], 0x60}}, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000200)='/dev/sequencer\x00', 0x440000, 0x0) setsockopt$TIPC_CONN_TIMEOUT(r1, 0x10f, 0x82, &(0x7f0000000240)=0x982, 0x4) fsetxattr$security_smack_transmute(r1, &(0x7f0000000280)='security.SMACK64TRANSMUTE\x00', &(0x7f00000002c0)='TRUE', 0x4, 0x3) ioctl$SCSI_IOCTL_DOORUNLOCK(r1, 0x5381) 16:04:29 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001340)={0x0, 0x0, &(0x7f0000001300)={&(0x7f0000000180)=@newlink={0x40, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, @ip6erspan={{0x10, 0x1, 'ip6erspan\x00'}, {0xc, 0x4, [@gre_common_policy=[@IFLA_GRE_IFLAGS={0x8, 0x3}]]}}}]}, 0x40}}, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/dev\x00') ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(r1, 0xc0045540, &(0x7f0000000040)=0x3ff) 16:04:29 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020200090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e0100000001000000100000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}}, 0x0) [ 911.742177] libceph: parse_ips bad ip '[]::]: [ 911.742177] llb' 16:04:29 executing program 4: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[d::]:\nllb:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x200000000000000, 0x0) 16:04:29 executing program 1: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[]::]:\nllb:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) [ 911.874362] IPVS: ftp: loaded support on port[0] = 21 16:04:29 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020200090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e0100000001000000010000e02402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}}, 0x0) [ 911.940284] libceph: parse_ips bad ip '[]::]: [ 911.940284] llb' [ 912.274706] IPVS: ftp: loaded support on port[0] = 21 16:04:30 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, 0x0, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_INFO(r1, 0x29, 0x40, &(0x7f00000000c0)={'security\x00\x00\x00\x00\x00\x02.\x00'}, &(0x7f0000000140)=0x54) 16:04:30 executing program 4: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[d::]:\nllb:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x6000000, 0x0) 16:04:30 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) syz_open_dev$usb(&(0x7f0000001300)='/dev/bus/usb/00#/00#\x00', 0xc48, 0x181403) sendmsg$key(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000001040)={&(0x7f0000000000)={0x2, 0x11, 0x6, 0x5, 0x208, 0x0, 0x70bd2d, 0x25dfdbfb, [@sadb_x_filter={0x5, 0x1a, @in6=@ipv4={[], [], @loopback}, @in=@empty, 0x2, 0x10, 0x4}, @sadb_key={0x201, 0x8, 0x8000, 0x0, "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"}]}, 0x1040}}, 0x40001) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e0100000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}}, 0x0) sendmsg$key(r0, &(0x7f00000012c0)={0x0, 0x0, &(0x7f0000001280)={&(0x7f00000010c0)={0x2, 0x17, 0xc800000000000000, 0x0, 0x35, 0x0, 0x70bd2a, 0x25dfdbfd, [@sadb_sa={0x2, 0x1, 0x4d5, 0x4, 0x5, 0x4e, 0x0, 0x1}, @sadb_spirange={0x2, 0x10, 0x4d3, 0x4d3}, @sadb_lifetime={0x4, 0x3, 0x1, 0x3, 0x59d6, 0x81}, @sadb_key={0x7, 0x9, 0x150, 0x0, "37125f66a44fc87a539aa4b255fbf9abcab87d927d0b043e3066694a1fe3d66299d557b2912389a3943c"}, @sadb_x_nat_t_port={0x1, 0x17, 0x4e24}, @sadb_key={0x21, 0x9, 0x7c8, 0x0, "ce9e747fe133ebf6b734bb27508c43f51081e7d4eb771471abd93ee7f34f1c26ee6d5dea753ca454d9d10073432c9ce0b920328aa4f0109b1be29543bc580e81dcd4b0f48e6b331fc3b7c7986e6c9b725b64f215b0ea05f20670754455d183168febd15eb2f1741ee90ea0cc87b672dd2b6308bfbda5b64fe83cb2704d8e8624e69cced5abe3911e1c8c0196ce535b23743794c374e003fcd79d90490baa1cf196e135a559638834e3ee36dfb322c1fec5e7b9873c0305428ea9f590d9326beefc9a9e5fa5bc2c4db34db0f831ce4d5ce81970ca8a4e900ad98f138839a067cd2e5a71990636678f156c4dc9f89230ee322dd600fdf24bea6e"}, @sadb_ident={0x2, 0xb, 0x1, 0x0, 0x2}]}, 0x1a8}}, 0x1) 16:04:30 executing program 1: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[]::]:\nllb:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 16:04:30 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000001300)={&(0x7f0000000180)=ANY=[@ANYBLOB="b900000010001fff000000000000000000000000", @ANYRES32=0x0, @ANYBLOB="0000000000000000200012001000010069703665727370616e0000000c0004000800030000000000"], 0x3}}, 0x0) r1 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x401, 0x141002) setsockopt$IP_VS_SO_SET_ADDDEST(r1, 0x0, 0x487, &(0x7f0000000040)={{0x0, @multicast2, 0x4e21, 0x3, 'ovf\x00', 0x4, 0x1, 0x68}, {@broadcast, 0x4e20, 0x2000, 0x2, 0xfffffffffffffffa, 0x6}}, 0x44) 16:04:30 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020200090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e0100000001000000000000022402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}}, 0x0) 16:04:30 executing program 4: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[d::]:\nllb:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x1000000, 0x0) [ 912.458870] libceph: parse_ips bad ip '[d::]: [ 912.458870] llb' [ 912.475789] libceph: parse_ips bad ip '[]::]: [ 912.475789] llb' 16:04:30 executing program 1: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[]::]:\nllb:\xf0', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 16:04:30 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020200090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e0100000001000000000000082402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}}, 0x0) [ 912.545123] IPVS: ftp: loaded support on port[0] = 21 16:04:30 executing program 3: socket$nl_route(0x10, 0x3, 0x0) r0 = syz_open_dev$swradio(&(0x7f0000000040)='/dev/swradio#\x00', 0x1, 0x2) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(r0, 0x402c5342, &(0x7f00000000c0)={0x4, 0x7ff, 0x3, {0x77359400}, 0x10000, 0x4}) sendmsg$nl_route(r0, &(0x7f0000001340)={0x0, 0x0, &(0x7f0000001300)={&(0x7f0000000080)=ANY=[@ANYBLOB="4000000010001fff000000000400000000000000", @ANYRES32=0x0, @ANYBLOB="0000000000000000200012001000010069703665727370616e0000000c0004000800030000000000"], 0x40}}, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000140)={0x0, @in={{0x2, 0x4e22, @multicast2}}, 0x6, 0xfffffffffffffff7}, &(0x7f0000000000)=0x90) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000200)={r1, 0x6}, &(0x7f0000000240)=0x8) 16:04:30 executing program 0: r0 = syz_open_dev$audion(&(0x7f00000010c0)='/dev/audio#\x00', 0x9, 0x400000000000400) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000001040)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ADD(r0, &(0x7f0000001200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000001080)={&(0x7f0000001100)={0xe0, r1, 0x721, 0x70bd2a, 0x25dfdbff, {}, [@TIPC_NLA_MON={0x44, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x7f}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x3ff}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x20000000200}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x3}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x3}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x2}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xfff}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x8}]}, @TIPC_NLA_LINK={0x44, 0x4, [@TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}]}, @TIPC_NLA_NET={0x20, 0x7, [@TIPC_NLA_NET_ID={0x8, 0x1, 0x1}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x7ff}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x9}]}, @TIPC_NLA_NODE={0x24, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x5}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x1}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0xfffffffffffffffa}]}]}, 0xe0}, 0x1, 0x0, 0x0, 0x800}, 0x10) setsockopt$inet6_dccp_buf(r0, 0x21, 0x8e, &(0x7f0000000040)="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", 0x1000) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000001240)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e0100000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e000000100000000000000000749588d59516eb8d1ba6d9753343625e1b0da7ac962137e049dc7788400f64df3f49ca71de21ef70d15f104458d932d8580f5d043fe33616487d6"], 0x60}}, 0x0) ioctl$sock_bt(r0, 0x5411, &(0x7f00000013c0)="01cad56a9f4bb626c14b8818caa0cc85ef0b770db978cfe0a015ff5f218d49542760a5af88f9cd79887cab4a13ec1d63d46eac6ff1c9a26c152175975559a2733df354db4b2c51186ffe16197ff12e6b5fcc99193e79f792f72b3a12f085193f02433dc5e567ae97441b34aa50b8f4118ae27e060509970dcfe9cb20200333ffb034f14257692d64c2a3b7c3ddaf14d7d7cc154ebeb1ae6fec4a507aea1731a30919e156b19a6b36a7464d168d5509cae0348de218576351fb520e0e2fcb6aaaab4ebf02506c9eb7a0702e5966d1cbae56e59dec746a09af86d480403f0dc487651ff58007ca36455a1689e601f0bc") ioctl$TUNGETSNDBUF(r0, 0x800454d3, &(0x7f0000001300)) sendto$inet6(r0, &(0x7f0000001340)="d2b225647b4b7cc37ee1060251c96a688860c20ef4715eafbe3c4083960047115b0fd313b313885f15cd27a18440d168c25641203763a927e3fd25077b0397402d2ff26fadacf9a8190982b7b795a9f2f297ffe757050894abf90ab847b3c5c4c92ba824728f74eb95e874b5580b1fcf1d577f3026", 0x75, 0x40000, 0x0, 0x0) [ 912.637242] libceph: parse_ips bad ip '[d::]: [ 912.637242] llb' 16:04:30 executing program 4: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[d::]:\nllb:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x60, 0x0) [ 912.679190] libceph: parse_ips bad ip '[d::]: [ 912.679190] llb' [ 912.748112] ceph: device name is missing path (no : separator in []::]: [ 912.748112] llb:ð) [ 912.759053] ceph: device name is missing path (no : separator in []::]: [ 912.759053] llb:ð) 16:04:30 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, 0x0, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_INFO(r1, 0x29, 0x40, &(0x7f00000000c0)={'security\x00\x00\x00\x00\x00\x00~\x00'}, &(0x7f0000000140)=0x54) 16:04:30 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000080)=ANY=[]}}, 0x0) 16:04:30 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020200090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e0100000001000000000000012402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}}, 0x0) 16:04:30 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x200, 0x0) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffff9c, 0x84, 0x13, &(0x7f00000000c0)={0x0, 0xfffffffffffffa24}, &(0x7f0000000100)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f0000000140)={r2, 0x200}, &(0x7f00000001c0)=0x8) sendmsg$nl_route(r0, &(0x7f0000001340)={0x0, 0x0, &(0x7f0000001300)={&(0x7f0000000180)=@newlink={0x40, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, @ip6erspan={{0x10, 0x1, 'ip6erspan\x00'}, {0xc, 0x4, [@gre_common_policy=[@IFLA_GRE_IFLAGS={0x8, 0x3}]]}}}]}, 0x40}}, 0x0) r3 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x40000, 0x0) write$FUSE_OPEN(r3, &(0x7f0000000040)={0x20, 0x0, 0x7, {0x0, 0x2}}, 0x20) 16:04:30 executing program 4: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[d::]:\nllb:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0xfffffff6, 0x0) 16:04:30 executing program 1: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[]::]:\nllb:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 16:04:30 executing program 4: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[d::]:\nllb:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x400000000000000, 0x0) [ 913.235668] libceph: parse_ips bad ip '[]::]: [ 913.235668] llb' [ 913.242571] libceph: parse_ips bad ip '[]::]: [ 913.242571] llb' 16:04:30 executing program 1: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[]::]:\nllb:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 16:04:30 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020200090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e0100000001000000fbffffff2402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}}, 0x0) 16:04:30 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001340)={0x0, 0x0, &(0x7f0000001300)={&(0x7f0000000000)=ANY=[@ANYBLOB="4000000010001fff50e0a0b2eab68c3e1e506d9b8a3025000000000000000000000000", @ANYRES32=0x0, @ANYBLOB="0000000000000000200012001000010069703665727370616e0000000c0004000800030000000000"], 0x40}}, 0x0) [ 913.299245] IPVS: ftp: loaded support on port[0] = 21 16:04:30 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rfkill\x00', 0x40001, 0x0) setsockopt$inet6_opts(r1, 0x29, 0x36, &(0x7f0000000200)=@routing={0x2b, 0xa, 0x2, 0xfffffffffffffc90, 0x0, [@mcast2, @local, @ipv4={[], [], @multicast2}, @local, @mcast2]}, 0x58) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000000)=ANY=[@ANYBLOB="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"], 0x60}}, 0x801) r2 = socket$netlink(0x10, 0x3, 0x14) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_DISABLE(r2, &(0x7f0000000380)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000340)={&(0x7f00000003c0)=ANY=[@ANYBLOB="70010000", @ANYRES16=r3, @ANYBLOB="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"], 0x170}}, 0x800) 16:04:31 executing program 4: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[d::]:\nllb:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0xc0ed0000, 0x0) [ 913.385295] netlink: 32 bytes leftover after parsing attributes in process `syz-executor3'. [ 913.409592] libceph: parse_ips bad ip '[]::]: [ 913.409592] llb' [ 913.478129] libceph: parse_ips bad ip '[]::]: [ 913.478129] llb' [ 913.532489] libceph: parse_ips bad ip '[d::]: [ 913.532489] llb' 16:04:31 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, 0x0, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_INFO(r1, 0x29, 0x40, &(0x7f00000000c0)={'security\x00\x00\x00\x03\xfa\x00'}, &(0x7f0000000140)=0x54) 16:04:31 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020200090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e0100000001000000e00000012402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}}, 0x0) 16:04:31 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000000)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02000000020000000000000000000000030006000000000002004e0100000001000000000000002402009abb0100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}}, 0x0) r1 = syz_open_dev$radio(&(0x7f00000000c0)='/dev/radio#\x00', 0x0, 0x2) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DAEMON(r1, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x82000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x20, r2, 0x402, 0x70bd2c, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_DAEMON={0xc, 0x3, [@IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x471}]}]}, 0x20}, 0x1, 0x0, 0x0, 0x20040000}, 0x4000010) fcntl$getownex(r0, 0x10, &(0x7f0000000080)) 16:04:31 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0xa0400, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r1, 0x40605346, &(0x7f00000000c0)={0x1, 0x0, {0x0, 0xa2cd8890a10ffb49, 0x2, 0x1, 0x2cc}}) sendmsg$nl_route(r0, &(0x7f0000001340)={0x0, 0x0, &(0x7f0000001300)={&(0x7f0000000000)=ANY=[@ANYBLOB="3400000000000000d00ed0502a9de4be6f9099f130b2a5ebc9b792bae1327152366b2754f96738d6d50000582a120cc1abcad80000000000000000000000e6a6af322600", @ANYRES32=0x0, @ANYBLOB="0000000000000000200012001000010069703665727370616e0000000c0004000800030000000000"], 0x40}}, 0x0) 16:04:31 executing program 1: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[]::]:\nllb:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='\neph\x00', 0x0, 0x0) 16:04:31 executing program 4: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[d::]:\nllb:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x2000000, 0x0) 16:04:31 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001340)={0x0, 0x0, &(0x7f0000001300)={&(0x7f0000000180)=@newlink={0x40, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, @ip6erspan={{0x10, 0x1, 'ip6erspan\x00'}, {0xc, 0x4, [@gre_common_policy=[@IFLA_GRE_IFLAGS={0x8, 0x3}]]}}}]}, 0x40}}, 0x0) r1 = syz_open_dev$radio(&(0x7f00000000c0)='/dev/radio#\x00', 0x0, 0x2) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_DISABLE(r1, &(0x7f0000000480)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1020}, 0xc, &(0x7f0000000440)={&(0x7f00000001c0)={0x250, r2, 0x510, 0x70bd29, 0x25dfdbfd, {}, [@TIPC_NLA_NET={0x5c, 0x7, [@TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x2f58a561}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x10000}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x2}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0xa0d}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x2}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x7}, @TIPC_NLA_NET_ID={0x8, 0x1, 0xa69}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x3}]}, @TIPC_NLA_BEARER={0xa8, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e23, 0x0, @dev={0xfe, 0x80, [], 0x20}, 0x7}}, {0x20, 0x2, @in6={0xa, 0x4e21, 0x1, @dev={0xfe, 0x80, [], 0xb}, 0x3}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e21, @multicast2}}, {0x14, 0x2, @in={0x2, 0x4e21, @multicast2}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xf}}}, {0x14, 0x2, @in={0x2, 0x4e23, @empty}}}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x397e5598}]}, @TIPC_NLA_NET={0x40, 0x7, [@TIPC_NLA_NET_NODEID={0xc, 0x3, 0xba33}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x1}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x9}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x7a91}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x8}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x6}]}, @TIPC_NLA_NET={0xc, 0x7, [@TIPC_NLA_NET_ID={0x8, 0x1, 0x3}]}, @TIPC_NLA_LINK={0x84, 0x4, [@TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x3c, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x6}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xf}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xc1}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x23}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xc}]}, @TIPC_NLA_LINK_PROP={0x14, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x17}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}]}, @TIPC_NLA_NET={0x54, 0x7, [@TIPC_NLA_NET_NODEID={0xc, 0x3, 0x8}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0xfffffffffffff353}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x5}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x10000}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x9}, @TIPC_NLA_NET_ADDR={0x8}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x7f}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x4}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x4}]}, @TIPC_NLA_MON={0x14, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x893}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x2}]}]}, 0x250}, 0x1, 0x0, 0x0, 0x4}, 0x4000000) [ 913.953646] libceph: parse_ips bad ip '[d::]: [ 913.953646] llb' [ 913.960526] libceph: parse_ips bad ip '[d::]: [ 913.960526] llb' 16:04:31 executing program 1: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[]::]:\nllb:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='%eph\x00', 0x0, 0x0) [ 914.011058] IPVS: ftp: loaded support on port[0] = 21 16:04:31 executing program 4: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[d::]:\nllb:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x300, 0x0) 16:04:31 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020200090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e0100000001000000000340002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}}, 0x0) 16:04:31 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) r1 = accept$inet(0xffffffffffffff9c, &(0x7f0000000000)={0x2, 0x0, @broadcast}, &(0x7f0000000040)=0x10) setsockopt$inet_sctp_SCTP_AUTOCLOSE(r1, 0x84, 0x4, &(0x7f0000000080)=0x7, 0x4) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300090c000000ffffffbfffffffff020013000200000000000000000000000300060000000c0002004e01000000010090ab832db55c0000000000002402000100f8ffffff0000000200000000030005000000000002004e20e000000100000000000000003e2b5474b9d1cf66b1fa98c30d8d4753efcca4c83302e3c22ba7fded6d9c"], 0x60}}, 0x0) [ 914.133070] libceph: parse_ips bad ip '[d::]: [ 914.133070] llb' [ 914.178850] libceph: parse_ips bad ip '[d::]: [ 914.178850] llb' 16:04:31 executing program 4: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[d::]:\nllb:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x4000000000000, 0x0) [ 914.530637] IPVS: ftp: loaded support on port[0] = 21 16:04:32 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, 0x0, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_INFO(r1, 0x29, 0x40, &(0x7f00000000c0)={'security\x00\x00\x00\x8e\x00'}, &(0x7f0000000140)=0x54) 16:04:32 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001340)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYRESOCT=0x0, @ANYRES32=0x0, @ANYRES32], 0x3}}, 0x0) open_by_handle_at(r0, &(0x7f0000000000)={0x38, 0x7f, "5e66f6283ba2f4e407d78bcbe1fd4a678910a4188d38824fce56db53f87907a3df2e46a6d0a6feddd1b0f11f102792c7"}, 0x0) 16:04:32 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020200090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e0100000001000000002000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}}, 0x0) 16:04:32 executing program 1: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[]::]:\nllb:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='c\nph\x00', 0x0, 0x0) 16:04:32 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x2, 0x9, 0xff, 0x7, 0xe, 0x0, 0x70bd2d, 0x25dfdbff, [@sadb_x_policy={0x8, 0x12, 0x4, 0x0, 0x0, 0x6e6bba, 0x81, {0x6, 0x7f, 0x401, 0x8, 0x0, 0xaa1, 0x0, @in6=@dev={0xfe, 0x80, [], 0xffffffff}, @in=@rand_addr=0x80000000}}, @sadb_lifetime={0x4, 0x3, 0x6d3, 0xa1ae, 0x7, 0x100000000}]}, 0x70}}, 0x44080) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e0100000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}}, 0x0) 16:04:32 executing program 4: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[d::]:\nllb:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x8cffffff, 0x0) 16:04:32 executing program 4: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[d::]:\nllb:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0xffffff7f, 0x0) 16:04:32 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020200090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e0100000001000000000020002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}}, 0x0) 16:04:32 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e0100000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}}, 0x0) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x105000, 0x0) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x2, 0xd, 0x80, 0x2, 0x8, 0x0, 0x70bd2d, 0x25dfdbfe, [@sadb_spirange={0x2, 0x10, 0x4d4, 0x4d2}, @sadb_x_nat_t_port={0x1, 0x16, 0x4e23}, @sadb_x_sec_ctx={0x1, 0x18, 0x1, 0x4726}, @sadb_x_sa2={0x2, 0x13, 0xffffffffffffffe0, 0x0, 0x0, 0x70bd2d, 0x3502}]}, 0x40}}, 0x800) write$P9_RAUTH(r1, &(0x7f0000000040)={0x14, 0x67, 0x1, {0x85, 0x4, 0x8}}, 0x14) [ 914.783307] IPVS: ftp: loaded support on port[0] = 21 16:04:32 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001340)={0x0, 0x0, &(0x7f0000001300)={&(0x7f0000000000)=ANY=[@ANYBLOB="4000000010001fff000000000000000000000000", @ANYRES32=0x0, @ANYBLOB="000000000000000020308fe4870001006970366572737004000000000c000400080003000098b1287a325d04c0d121185d31c225000000"], 0x40}}, 0x0) 16:04:32 executing program 1: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[]::]:\nllb:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='c%ph\x00', 0x0, 0x0) 16:04:32 executing program 4: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[d::]:\nllb:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x20000000, 0x0) [ 914.876666] netlink: 32 bytes leftover after parsing attributes in process `syz-executor3'. [ 914.952167] netlink: 32 bytes leftover after parsing attributes in process `syz-executor3'. [ 915.046808] libceph: parse_ips bad ip '[d::]: [ 915.046808] llb' 16:04:33 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, 0x0, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_INFO(r1, 0x29, 0x40, &(0x7f00000000c0)={'security\x00\x00\x00.\x02\x00'}, &(0x7f0000000140)=0x54) 16:04:33 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) umount2(&(0x7f0000000000)='./file0\x00', 0x8) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e0100000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}}, 0x0) 16:04:33 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020200090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e0100000001000000000200002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}}, 0x0) 16:04:33 executing program 1: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[]::]:\nllb:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ce\nh\x00', 0x0, 0x0) 16:04:33 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = syz_open_dev$adsp(&(0x7f00000000c0)='/dev/adsp#\x00', 0x81, 0x105040) ioctl$VIDIOC_S_JPEGCOMP(r1, 0x408c563e, &(0x7f00000001c0)={0x8, 0xd, 0x28, "db98724a7aa9c7fe4bcb6018df5fc7d70ac748982510faf482feb3208054f3565f3567a9f04a26dc6bec0ea76cf7ce0058d1c05581acfed4f6a82096", 0x35, "672caf1a6490a67ecccc9f845bb3bdbb14b12799ba81c67bd4a8be6c45e693cd87423e5708fc4f2f8a29cf412462dbc88cb44009bdb76b4d8e1d237e", 0xd0}) sendmsg$nl_route(r0, &(0x7f0000001340)={0x0, 0x0, &(0x7f0000001300)={&(0x7f0000000180)=@newlink={0x40, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, @ip6erspan={{0x10, 0x1, 'ip6erspan\x00'}, {0xc, 0x4, [@gre_common_policy=[@IFLA_GRE_IFLAGS={0x8, 0x3}]]}}}]}, 0x40}}, 0x0) r2 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x8, 0x20001) ioctl$TIOCGWINSZ(r2, 0x5413, &(0x7f0000000040)) ioctl$FS_IOC_SETVERSION(r2, 0x40087602, &(0x7f0000000080)=0xfffffffffffffc00) 16:04:33 executing program 4: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[d::]:\nllb:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x4000, 0x0) [ 915.423204] libceph: parse_ips bad ip '[d::]: [ 915.423204] llb' 16:04:33 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/am_droprate\x00', 0x2, 0x0) write$USERIO_CMD_SET_PORT_TYPE(r1, &(0x7f00000000c0)={0x1, 0x20}, 0x2) ioctl$VIDIOC_G_SELECTION(r1, 0xc040565e, &(0x7f0000000040)={0xf, 0x0, 0x7, {0x86, 0x7, 0x400, 0x3}}) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e0100000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}}, 0x0) bind$tipc(r1, &(0x7f0000000080)=@name={0x1e, 0x2, 0x1, {{0x42, 0x3}, 0x1}}, 0x10) 16:04:33 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020200090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e0100000001000000001000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}}, 0x0) [ 915.466589] libceph: parse_ips bad ip '[d::]: [ 915.466589] llb' [ 915.480481] IPVS: ftp: loaded support on port[0] = 21 16:04:33 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001340)={0x0, 0x0, &(0x7f0000001300)={&(0x7f0000000180)=@newlink={0x40, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, @ip6erspan={{0x10, 0x1, 'ip6erspan\x00'}, {0xc, 0x4, [@gre_common_policy=[@IFLA_GRE_IFLAGS={0x8, 0x3}]]}}}]}, 0x40}}, 0x0) r1 = accept$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000000)) getsockopt$inet_sctp6_SCTP_RTOINFO(0xffffffffffffff9c, 0x84, 0x0, &(0x7f0000000040)={0x0, 0x4, 0xffffffffffffffc0, 0x9}, &(0x7f0000000080)=0x10) r3 = creat(&(0x7f0000000100)='./file0\x00', 0x16) ioctl$DRM_IOCTL_AGP_ALLOC(r0, 0xc0206434, &(0x7f0000000140)={0x4, 0x0, 0x10001, 0x5}) ioctl$DRM_IOCTL_AGP_ALLOC(r3, 0xc0206434, &(0x7f00000001c0)={0x7aa, r4, 0x0, 0x35}) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f00000000c0)={r2, 0x1, 0x6, 0x2, 0x40, 0x3}, 0x14) 16:04:33 executing program 4: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[d::]:\nllb:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0xffffff8c, 0x0) 16:04:33 executing program 1: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[]::]:\nllb:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ce%h\x00', 0x0, 0x0) 16:04:33 executing program 1: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[]::]:\nllb:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='cep\n\x00', 0x0, 0x0) [ 915.987995] IPVS: ftp: loaded support on port[0] = 21 16:04:33 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, 0x0, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_INFO(r1, 0x29, 0x40, &(0x7f00000000c0)={'security\x00\x00\x00\x00\x00\x01V\x00'}, &(0x7f0000000140)=0x54) 16:04:33 executing program 4: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[d::]:\nllb:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x700000000000000, 0x0) 16:04:33 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020200090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e0100000001000000000400002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}}, 0x0) 16:04:33 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) r1 = dup2(r0, r0) getsockopt$inet_sctp6_SCTP_RECVRCVINFO(r1, 0x84, 0x20, &(0x7f0000000000), &(0x7f0000000040)=0x4) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e9e0f916e01000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}}, 0x0) 16:04:33 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001340)={0x0, 0x0, &(0x7f0000001300)={&(0x7f0000000080)=ANY=[@ANYBLOB="4000000005000000000000", @ANYRES32=0x0, @ANYBLOB="0000202000007c4d6d85c005000000fb0f00011869703665797300040008008c0c82719464dcff71f84dc1a4d4ee71cbb8842e2ef8ecd39cbf98e3354ab43e2598b9381e00998110293983c7eae0d9b9901fe64a6c6ff8f4f00379c3db8f2aa474be9ed75ad8ac0b42779740f49d2fb88e8aa042"], 0x40}}, 0x0) pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x4000) setsockopt$packet_buf(r1, 0x107, 0xd, &(0x7f00000001c0)="ff0f000073a90000003cee448231737fc7ef4f6d12ee3da7f9eb1b3632f95a603296f4ae4975a8cc12000000000000000000000000000000215279c212ba80fc3d2e76cabfdd8620b5fc82a3b64a96b07a0074d799b06870e9a5cde2c356c8c6f287", 0x18) 16:04:33 executing program 1: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[]::]:\nllb:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='cep%\x00', 0x0, 0x0) 16:04:33 executing program 4: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[d::]:\nllb:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x4000000, 0x0) 16:04:33 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001340)={0x0, 0x0, &(0x7f0000001300)={&(0x7f0000000180)=@newlink={0x40, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, @ip6erspan={{0x10, 0x1, 'ip6erspan\x00'}, {0xc, 0x4, [@gre_common_policy=[@IFLA_GRE_IFLAGS={0x8, 0x3}]]}}}]}, 0x40}}, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x440, 0x0) ioctl$KVM_S390_INTERRUPT_CPU(r1, 0x4010ae94, &(0x7f0000000040)={0x3, 0x8, 0x4}) fcntl$getflags(r1, 0x40b) 16:04:33 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020200090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e0100000001000000000800002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}}, 0x0) 16:04:33 executing program 1: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[]::]:\nllb:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\xff', 0x0, 0x0) 16:04:33 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000240)='/dev/dlm_plock\x00', 0x4a0142, 0x0) ioctl$KVM_GET_REGS(r1, 0x8090ae81, &(0x7f0000000280)) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000100)=ANY=[@ANYBLOB="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"], 0x60}}, 0x0) membarrier(0x8, 0x0) getsockopt$netlink(r1, 0x10e, 0x3, &(0x7f0000000340)=""/6, &(0x7f0000000380)=0x6) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x100, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_INFO(r2, 0x40bc5311, &(0x7f0000000040)={0x2aa, 0x3, 'client1\x00', 0x2, "405c403544bf0682", "bd25f764a1423d73afc052f14a3de5195e635746c969634dd2bb27538a2120de", 0x1f, 0x4}) [ 916.237633] IPVS: ftp: loaded support on port[0] = 21 16:04:33 executing program 4: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="59643a623a00d04bda9113fbcc35d3b3f656090051b745087f17d3609c0a9248f985d0b6b2784f944526ead56a9d95c238f3a4dbea3f7fe98268513476e3"], &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) [ 916.313460] libceph: parse_ips bad ip '[d::]: [ 916.313460] llb' [ 916.343022] libceph: parse_ips bad ip '[d::]: [ 916.343022] llb' [ 916.455406] libceph: parse_ips bad ip 'Yd:b' 16:04:34 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, 0x0, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_INFO(r1, 0x29, 0x40, &(0x7f00000000c0)={'security\x00\x00\x00\x00\x00\x03\x0e\x00'}, &(0x7f0000000140)=0x54) 16:04:34 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020200090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e0100000001000000000004002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}}, 0x0) 16:04:34 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001340)={0x0, 0x0, &(0x7f0000001300)={&(0x7f0000000180)=@newlink={0x40, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, @ip6erspan={{0x10, 0x1, 'ip6erspan\x00'}, {0xc, 0x4, [@gre_common_policy=[@IFLA_GRE_IFLAGS={0x8, 0x3}]]}}}]}, 0x40}}, 0x0) setsockopt$sock_timeval(r0, 0x1, 0x15, &(0x7f00000000c0)={0x77359400}, 0x10) sendto(r0, &(0x7f0000000000)="90d69381b3dee8afb8740eefbd4be33b286aa00b52a31304ccc9428d027bfd6852ecad1916", 0x25, 0x20040040, &(0x7f0000000040)=@ipx={0x4, 0x0, 0x7, "559014f013bb", 0x7fff}, 0x80) r1 = syz_open_dev$usbmon(&(0x7f0000000100)='/dev/usbmon#\x00', 0x2, 0x400102) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000140)={0x7, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) 16:04:34 executing program 4: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x7, 0x7fc) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000200)) r1 = syz_open_dev$evdev(&(0x7f00000005c0)='/dev/input/event#\x00', 0x0, 0x400000) getsockopt$inet_sctp6_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f0000000740), 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$vbi(&(0x7f00000000c0)='/dev/vbi#\x00', 0x3, 0x2) r3 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm-control\x00', 0x0, 0x0) ioctl$RTC_PIE_OFF(r3, 0x7006) setsockopt$RDS_GET_MR_FOR_DEST(0xffffffffffffffff, 0x114, 0x7, &(0x7f0000000880)={@un=@abs={0x1, 0x0, 0x4e21}, {&(0x7f0000000680)=""/183, 0xb7}, &(0x7f0000000300), 0x3}, 0xa0) r4 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x804c0, 0x0) ioctl$KVM_GET_NESTED_STATE(r4, 0xc080aebe, &(0x7f0000000ec0)={0x0, 0x0, 0x2080}) timer_settime(0x0, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}}, &(0x7f0000000380)) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000280)=r1, 0x2d290ebedb7b4151) r5 = socket(0x40000000015, 0x5, 0x0) fcntl$getflags(r2, 0x401) setsockopt$SO_RDS_TRANSPORT(r5, 0x114, 0x8, &(0x7f00000007c0)=0x800000000000002, 0x4) setsockopt$sock_int(r5, 0x1, 0x8, &(0x7f00006dbffc), 0x4) bind$inet(r5, &(0x7f0000000840)={0x2, 0x4e20, @loopback}, 0x10) ioctl$int_in(r5, 0x5421, &(0x7f0000000900)=0x6) setsockopt$RDS_CONG_MONITOR(r4, 0x114, 0x6, &(0x7f0000000080), 0x4) sendto$inet(r5, &(0x7f0000000a00)="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", 0x21d, 0x0, 0x0, 0x0) r6 = mq_open(&(0x7f00000003c0)='\aoj9\xbc\xf6u=w\x0e\xecuWOA\xe8\x85\x02^;\x8f\x9c\xd2a\xc1c\x1f8h\x84\x9ej2#\xe3g\xdd\x13\xedI\xdc\xa1\xfc1\xe5\x01VZ.\xfbD\x7f.\xbb\x99\xdb\xb7\xef\xbe\x1c\xc9\xb6\x17g\xff\xec\xf4\xe8lD{\xa8\x04\x0f\x8f\b\x8e\xf9ln\x90\xca\xf1\x97\xb6[\x14})\v\xeeU\x14o\x1b1fV\xbf\r\xa51zhq\x10\v\xf5\xb1g\x9c\x1c\x83b\xd3\xa3\xd7\xb9\xeb\xf9\xc0\xd1\x15\xf1\xa3\x8a^\xbe\x12\x97\xc8lf\x95\x9e \x00\x00\x00\x00\x00\x00\x00\x0er\x05\x1d\xd8\xaa\xf5\xd4\xc0\xd0\x80,\x05V\xe46/9x\xd5P\xd1v\'?\x1d|\xe5\xe2\xe9\x7fy|\x1f\xb47d\x10\x8c\xcc\x91\x82\x925\xeb\xe8\x88\"\x96B\xec\x9c\xa8\xa7\x7fr$\xb4\xa0', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000000340)={0x0, 0x8, 0x5, 0x20, 0x0, 0x0, 0x0, 0xfffffffffffffffd}) mq_timedsend(r6, &(0x7f0000000040), 0xda, 0x3ff, 0x0) r7 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x8000, 0x0) ioctl$GIO_SCRNMAP(r7, 0x4b40, &(0x7f0000000200)=""/122) ioctl$GIO_SCRNMAP(r7, 0x4b40, &(0x7f00000002c0)=""/60) mq_timedsend(r6, &(0x7f0000000080), 0x0, 0x0, 0x0) mq_timedreceive(r6, &(0x7f0000000100)=""/24, 0x18, 0x0, 0x0) getcwd(&(0x7f00000004c0)=""/118, 0xd7) unshare(0x800) pread64(r7, &(0x7f00000001c0)=""/25, 0x19, 0x0) sendto$inet(r5, &(0x7f0000000940)="21f76f000001009c8f3301ddf5a77831facaa98a398cb6ec217cf32f2d49c769451db8adf4557ef70259dced8eceaa2ebb8917ccbcf2b7c3a236a1d8162ffdd47aff5e8d53fca7c44d3f5b97e566b3247551a00af3de6d9c9cc49a26c64a26e5b313b52944650af26e0d65b654db4063bb3a486e4f2325237cc922d2c4ce10d9ae", 0x81, 0x0, 0x0, 0x0) 16:04:34 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e0100000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}}, 0x0) 16:04:34 executing program 1: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[]::]:\nllb:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 16:04:34 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) r1 = accept4$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000000), 0x800) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r1, 0x84, 0xc, &(0x7f0000000040)=0x2, 0x4) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000080)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e0100000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e000000143be80b54d7e5992497aa3434845e36a7976f2de35e6e5d04001a28cc3facf2540c2eacbfd5061bf5e52735eed7daeb7e5b85ed415d656827c25bf33709fb4311ed36f7a15542621a47da8210174f4860c739a2bda50d1de6d80fee88ea37ad1a4f7bc815c5e606f8e6be2a1b59c069847c5b96763df61881317f4ae1a9a3b75518c78657f1463"], 0x60}}, 0x0) [ 916.979681] IPVS: ftp: loaded support on port[0] = 21 16:04:34 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001340)={0x0, 0x0, &(0x7f0000001300)={&(0x7f0000000340)=ANY=[@ANYBLOB="4000897cd44203291ca761f89d000010001fff000000000000000000000000", @ANYRES32=0x0, @ANYBLOB="0000000000000000200012001000010069703665727370616e0000000c0004000800030000000000"], 0x40}}, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet6_mreq(r1, 0x29, 0x22f5b118d33438b5, &(0x7f0000000280)={@ipv4}, &(0x7f0000000300)=0x14) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(0xffffffffffffff9c, 0x84, 0x7b, &(0x7f0000000080)={0x0, 0x7}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f00000001c0)={r2, 0xb5, "e7f0a2b3831ba2147329d798febee0db1cbda232b3bae6e7aae570115d8c681d33801d03720e682e7148e4c63cd2691247b50f66e75fc4c34d66ee7f6a3e3c322e62187b3d59fd96b5a617caa6dc10ce2162a95f351e57209c74272ef434ad6a489bdc207bb8e768d7f87cbec5b0a0afad9fe83ae6065ad6c39f305f961b28673a6cd6b2a14e8a2eeb4737caebd526b33db8e2a6b9e57fc06cacd2984340cc8dbf35724a9b9b56ec45efdbb90497c2d5e3ce733296"}, &(0x7f00000002c0)=0xbd) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r1, 0x84, 0x6f, &(0x7f0000000140)={r2, 0x10, &(0x7f0000000100)=[@in={0x2, 0x4e20, @multicast1}]}, &(0x7f0000000180)=0x10) 16:04:34 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020200090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e0100000001000000000008002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}}, 0x0) 16:04:34 executing program 4: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x8840200, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f00000002c0)=ANY=[@ANYBLOB="53643a3a5d3a0a6c6c62a3ea8cc425ccfb275dbf7c64e7a61ffcde323eab22ce051bc6b7d583419e94a6daa009130981b081c4a1109258ac36dee4af76bad3b231b8ef74f2dd380dc1493dfd726a2bfd4df48a2772b094810914f7045c63707933d90100000001000000f0db506ca05f00c962edbd27f5ac7bfdfdd5d0aaaf1c09410f200465fd0d372cf0a0c9675aae642baa294f3e031668c7ef8a773b8f9e3811ffd70dc82ae036fd5f41103c99f137a728d2dca43087443fef20dda8c7c0dd1e031a3707aa000000000000"], &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 16:04:34 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e0100000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}}, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x80000, 0x0) r2 = syz_genetlink_get_family_id$nbd(&(0x7f0000000080)='nbd\x00') r3 = dup(r0) r4 = syz_open_dev$cec(&(0x7f00000000c0)='/dev/cec#\x00', 0x2, 0x2) r5 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x20000) r6 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140)='/dev/hwrng\x00', 0x200, 0x0) r7 = syz_open_dev$amidi(&(0x7f0000000180)='/dev/amidi#\x00', 0x1000000000000000, 0x181c00) r8 = openat$vhci(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vhci\x00', 0x40, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000002c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x70, r2, 0x220, 0x70bd26, 0x25dfdbfb, {}, [@NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x3}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_SOCKETS={0x3c, 0x7, [{0x8, 0x1, r3}, {0x8, 0x1, r4}, {0x8, 0x1, r0}, {0x8, 0x1, r5}, {0x8, 0x1, r6}, {0x8, 0x1, r7}, {0x8, 0x1, r8}]}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x8}]}, 0x70}, 0x1, 0x0, 0x0, 0x5}, 0x20000010) 16:04:34 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$BLKZEROOUT(r0, 0x127f, &(0x7f0000000140)={0x9c7c, 0x1}) fstat(r0, &(0x7f0000000000)) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x401, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r1, 0x4008240b, &(0x7f00000000c0)={0x1, 0x70, 0x9, 0x9, 0x2863da9e, 0x8, 0x0, 0x81, 0x10, 0xe, 0x5, 0x1df, 0x7, 0x9, 0x189, 0x67a6, 0x40, 0x9, 0xaf, 0x100, 0x7ff, 0x0, 0x1f, 0x8000, 0x3f, 0x8, 0x81, 0xc5e, 0x200000, 0x3, 0xffffffffffff7fff, 0x9, 0x4, 0x800, 0x9, 0x401, 0x8, 0x80, 0x0, 0x6, 0x1, @perf_config_ext={0xff, 0x6}, 0x10, 0xa1, 0x2, 0x1, 0x2a000000000000, 0x6, 0x5}) sendmsg$nl_route(r0, &(0x7f0000001340)={0x0, 0x0, &(0x7f0000001300)={&(0x7f0000000180)=@newlink={0x40, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, @ip6erspan={{0x10, 0x1, 'ip6erspan\x00'}, {0xc, 0x4, [@gre_common_policy=[@IFLA_GRE_IFLAGS={0x8, 0x3}]]}}}]}, 0x40}}, 0x0) [ 917.269113] ceph: device name is missing path (no : separator in Sd::]: [ 917.269113] llb£êŒÄ%Ìû']¿|dç¦üÞ2>«"ÎÆ·ÕƒAž”¦Ú   °Ä¡’X¬6Þä¯vºÓ²1¸ïtòÝ8 ÁI=ýrj+ýMôŠ'r°” ÷\cpy3Ù) [ 917.280827] IPVS: ftp: loaded support on port[0] = 21 [ 917.385192] ceph: device name is missing path (no : separator in Sd::]: [ 917.385192] llb£êŒÄ%Ìû']¿|dç¦üÞ2>«"ÎÆ·ÕƒAž”¦Ú   °Ä¡’X¬6Þä¯vºÓ²1¸ïtòÝ8 ÁI=ýrj+ýMôŠ'r°” ÷\cpy3Ù) [ 917.645594] IPVS: ftp: loaded support on port[0] = 21 [ 918.738077] bridge0: port 1(bridge_slave_0) entered blocking state [ 918.757497] bridge0: port 1(bridge_slave_0) entered disabled state [ 918.764988] device bridge_slave_0 entered promiscuous mode [ 918.838691] bridge0: port 2(bridge_slave_1) entered blocking state [ 918.845161] bridge0: port 2(bridge_slave_1) entered disabled state [ 918.858876] device bridge_slave_1 entered promiscuous mode [ 918.925277] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 919.029136] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 919.316909] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 919.372846] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 919.424093] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 919.431453] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 919.494553] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 919.509564] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 919.728333] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 919.735932] team0: Port device team_slave_0 added [ 919.789118] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 919.796859] team0: Port device team_slave_1 added [ 919.861801] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 919.952263] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 920.023228] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 920.030573] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 920.041278] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 920.139395] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 920.146583] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 920.158534] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready 16:04:37 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, 0x0, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_INFO(r1, 0x29, 0x40, &(0x7f00000000c0)={'security\x00\x00\x006\x00'}, &(0x7f0000000140)=0x54) 16:04:37 executing program 0: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x10000, 0x0) ioctl$sock_proto_private(r0, 0x89e7, &(0x7f0000000040)="eb6c6aa94e8cc4d463a5c8a04484b4ad939b50dc1273717b2898b4afef4feb9c01ffc3771f57f48f7b27192f516b511124ef377e550fbc6af626c27123132d31bf5bc0933e9906eddc74ab59ec24e3e987f2dadfec070c28c6bbc3ddba9efcbb79c0a4bfa907b710a37cd7a05ffb6728f6b313a16bc46fc56eb729e5ec53853660bfbd18b8dae63bd52d33f1516842c2e352f6171b584bbe2101a9c616d0764372359e6fb30ac37ef525aa728994") r1 = socket$key(0xf, 0x3, 0x2) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, &(0x7f0000001140)={@l2={0x1f, 0x9, {0x6, 0x10001, 0x80000000, 0xff, 0x9, 0x4}, 0x3}, {&(0x7f0000000100)=""/4096, 0x1000}, &(0x7f0000001100), 0x1}, 0xa0) sendmsg$key(r1, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff0200130002000000fb51592f8e9c4a03030006000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}}, 0x0) 16:04:37 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020200090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e0100000001000000000000202402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}}, 0x0) 16:04:37 executing program 3: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x80, 0x0) mprotect(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x1) ioctl$VIDIOC_DQEVENT(r0, 0x80885659, &(0x7f0000000040)) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000001340)={0x0, 0x0, &(0x7f0000001300)={&(0x7f0000000180)=@newlink={0x40, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, @ip6erspan={{0x10, 0x1, 'ip6erspan\x00'}, {0xc, 0x4, [@gre_common_policy=[@IFLA_GRE_IFLAGS={0x8, 0x3}]]}}}]}, 0x40}}, 0x0) 16:04:37 executing program 4: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) [ 920.360954] ceph: device name is missing path (no : separator in ./file0) [ 920.419168] ceph: device name is missing path (no : separator in ./file0) [ 920.477051] IPVS: ftp: loaded support on port[0] = 21 [ 920.779874] IPVS: ftp: loaded support on port[0] = 21 [ 921.106428] bridge0: port 2(bridge_slave_1) entered blocking state [ 921.112886] bridge0: port 2(bridge_slave_1) entered forwarding state [ 921.119621] bridge0: port 1(bridge_slave_0) entered blocking state [ 921.125999] bridge0: port 1(bridge_slave_0) entered forwarding state [ 921.133747] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 921.277570] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 922.560128] device bridge_slave_1 left promiscuous mode [ 922.565676] bridge0: port 2(bridge_slave_1) entered disabled state [ 922.586865] device bridge_slave_0 left promiscuous mode [ 922.593090] bridge0: port 1(bridge_slave_0) entered disabled state [ 922.646393] team0 (unregistering): Port device team_slave_1 removed [ 922.663307] team0 (unregistering): Port device team_slave_0 removed [ 922.680154] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 922.695207] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 922.750160] bond0 (unregistering): Released all slaves [ 923.007087] 8021q: adding VLAN 0 to HW filter on device bond0 [ 923.182062] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 923.356663] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 923.363015] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 923.379007] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 923.548004] 8021q: adding VLAN 0 to HW filter on device team0 16:04:42 executing program 1: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[]::]:\nllb:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x04', 0x0, 0x0) 16:04:42 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001340)={0x0, 0x0, &(0x7f0000001300)={&(0x7f0000000180)=@newlink={0x40, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, @ip6erspan={{0x10, 0x1, 'ip6erspan\x00'}, {0xc, 0x4, [@gre_common_policy=[@IFLA_GRE_IFLAGS={0x8, 0x3}]]}}}]}, 0x40}}, 0x0) mlock(&(0x7f0000fff000/0x1000)=nil, 0x1000) 16:04:42 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020200090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e0100000001000000000002002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}}, 0x0) 16:04:42 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000000)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e0100000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e200000100000000000000005e0516ce8cb53a5ccd53ff077352a8a43b9fcfb4b9abb5214dcef012f2fd9c97076717aceaab0abefaa78cc88135ad52741407eb9283d42f11d668ff5025367eaa68ee69a5c7e63724afe639c58e01d1347c9e66c577a242e69cabd4afe7ae0edee9a0dff8977d156143acbe59870b10555f3eae5e"], 0x60}}, 0x0) 16:04:42 executing program 4: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x7, 0x10000) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f00000001c0)={{{@in6=@loopback, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in=@empty}}, &(0x7f0000000140)=0xe8) r2 = getgid() fchownat(r0, &(0x7f00000000c0)='./file0\x00', r1, r2, 0x100) mount(&(0x7f0000000040)=@nullb='[d::]:\nllb:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 16:04:42 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, 0x0, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_INFO(r1, 0x29, 0x40, &(0x7f00000000c0)={'security\x00\x00\x00\x00?\x00'}, &(0x7f0000000140)=0x54) [ 924.625859] libceph: parse_ips bad ip '[]::]: [ 924.625859] llb' [ 924.671760] IPVS: ftp: loaded support on port[0] = 21 [ 924.685753] libceph: parse_ips bad ip '[d::]: [ 924.685753] llb' 16:04:42 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) prctl$PR_SVE_GET_VL(0x33, 0x907a) sendmsg$nl_route(r0, &(0x7f0000001340)={0x0, 0x0, &(0x7f0000001300)={&(0x7f0000000180)=@newlink={0x40, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, @ip6erspan={{0x10, 0x1, 'ip6erspan\x00'}, {0xc, 0x4, [@gre_common_policy=[@IFLA_GRE_IFLAGS={0x8, 0x3}]]}}}]}, 0x40}}, 0x0) r1 = shmget$private(0x0, 0x4000, 0x78000081, &(0x7f0000ff9000/0x4000)=nil) shmctl$IPC_RMID(r1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r3 = userfaultfd(0x0) ioctl$UFFDIO_API(r3, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r3, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r4 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r4, 0x84, 0x8, &(0x7f0000013e95), 0x4) getsockopt$IP_VS_SO_GET_SERVICE(r4, 0x0, 0x63, 0x0, &(0x7f0000000080)=0x1e) close(r4) close(r3) r5 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x100, 0x20000) ioctl$KVM_ARM_SET_DEVICE_ADDR(r5, 0x4010aeab, &(0x7f0000000040)={0x3, 0x101002}) [ 924.719805] libceph: parse_ips bad ip '[d::]: [ 924.719805] llb' 16:04:42 executing program 4: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x800) write$P9_RLERRORu(r0, &(0x7f00000000c0)={0x12, 0x7, 0x1, {{0x5, 'ceph\x00'}, 0x5}}, 0x12) mount(&(0x7f0000000040)=@nullb='[d::]:\nllb:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 16:04:42 executing program 1: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[]::]:\nllb:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x06', 0x0, 0x0) 16:04:42 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e0100000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}}, 0x0) 16:04:42 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020200090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e0100000001000000000010002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}}, 0x0) 16:04:42 executing program 1: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[]::]:\nllb:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) [ 924.933090] libceph: parse_ips bad ip '[d::]: [ 924.933090] llb' 16:04:42 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000140)=ANY=[@ANYBLOB="020300010c000000ffffffb69c6b1bff0200130002000000000000000000000003000600081d00000000000000000001000000000000002402000100f895c52b748a6d3980000000030005000000000002004e60e000000100000000000000005cc0659368f8dd8d8394eb03946412d068cd432754799cff7a2a1f44096f65462776e21b2fe6d3c76b163313fbb9d5335569fc07bdf7bae1e478f2675c09e358503e828aec1f3b32f39b9beca79444dd0000000000000000000000000000b9b86387374eae9cb85e241b74094428f5d08541af50c429afd91269f389f8862905e0030b6f1b47446c7053c5b95eee3996b3791c62d1b90e7f0821c44867430bf72895b3782f53130d3ebd9d8084b5372cf0c59e1c031e8ef4e1af7c6b0cd7ec0e645f6c3130e5ae97fb932fc300330cc9571a086f53850b2fbadb500e071c025ce57d494aa5a73b16c908f0e353481b7b08e3c94e221468015d99da3e9f1a9a6a36208c955e0fa5e987495d90efc049a893370b52f328b5b7000000000000000000000000000800007f1956878e88195cd046f36861f85085b37bc7105ce8942fca27850ed422690960048b5eefd8235fd97a600e33558506cdd89a201a19828bd2fd010ff3e927c172c1a9302e32f306b8a2ad4ad9182e7ee9be55c42ccf32de17b6ffb584c810bea9e13f03285312f7bb1201837445a4"], 0x60}}, 0x0) r1 = fcntl$getown(r0, 0x9) perf_event_open(&(0x7f0000000080)={0x5, 0x70, 0xfffffffffffffffc, 0x7c, 0x6, 0x200, 0x0, 0x3, 0x40010, 0x3, 0x6, 0x7, 0x800, 0x7, 0x3f, 0x3ff, 0x2, 0x4, 0x80, 0x1000, 0x5, 0x1000, 0x7, 0x5, 0x46, 0x80, 0x4, 0x10000, 0xa404, 0x907, 0x4000000000000, 0x101, 0x1, 0x8001, 0x2, 0x9, 0x2, 0x7, 0x0, 0x4, 0x1, @perf_config_ext={0x1000, 0x7ff}, 0x20500, 0x1, 0x27a8, 0x7, 0x5, 0x0, 0x11ca}, r1, 0xc, 0xffffffffffffff9c, 0x8) write(r0, &(0x7f0000000000)="92742a7edb63748852645a3ee0fe9bdfd320d144f3f178f1cadcb069095470e8e376c7caef5419bb2b38ba5c75d9b5ff581c63b620cd1ddf08c27f687302df782058565abc6ea214e8dabaeb5ceda6cb3a5e1811d823f37cd382", 0x5a) tgkill(r1, r1, 0xe) r2 = creat(&(0x7f0000000340)='./file0\x00', 0x148) write$P9_RSETATTR(r2, &(0x7f0000000380)={0x7, 0x1b, 0x1}, 0x7) r3 = creat(&(0x7f0000000100)='./file0\x00', 0x2) ioctl$LOOP_SET_DIRECT_IO(r3, 0x4c08, 0x3f) 16:04:42 executing program 4: r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm-monitor\x00', 0x0, 0x0) connect$unix(r0, &(0x7f0000000140)=@file={0x0, './file0\x00'}, 0x6e) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="db6c6c623a00"], &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 16:04:42 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020200090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e0100000001000000000000102402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}}, 0x0) 16:04:42 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001340)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="4000000010001fff000000000000000000000000", @ANYRES32=0x0, @ANYBLOB="00000000000000002000120010000100b66572730800000000000c00040008000300000000000000"], 0x3}}, 0x0) r1 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x7fffffff, 0x200000) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r1, 0xc0505405, &(0x7f00000000c0)={{0x2, 0x0, 0x1, 0x3, 0x7afc}, 0x40, 0x2, 0x2}) setsockopt$inet_tcp_buf(r1, 0x6, 0xd, &(0x7f0000000040)="d189aafbdf0ffcf3b71a2da004565158d278f9f32169db2aa71b868dbcbfdd99b1cb9928ba8f59f13b3668a2ab9321a23026e506d9a1ea4bd0642a34a6f0dc046eb4ba597664102387ff34784f4c6a599a16fe6017bb97c0d9dfc9960a78dae6a0e48a99937c915bd1fa", 0x6a) ioctl$KVM_X86_GET_MCE_CAP_SUPPORTED(r1, 0x8008ae9d, &(0x7f00000001c0)) [ 925.098863] libceph: parse_ips bad ip '[]::]: [ 925.098863] llb' 16:04:42 executing program 4: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x800000d0000003, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[d::]:\nllb:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) [ 925.145351] libceph: parse_ips bad ip 'Ûllb' [ 925.151563] libceph: parse_ips bad ip '[]::]: [ 925.151563] llb' [ 925.278087] libceph: parse_ips bad ip '[d::]: [ 925.278087] llb' [ 925.315877] libceph: parse_ips bad ip '[d::]: [ 925.315877] llb' 16:04:43 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020200090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e0100000001000000000000042402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}}, 0x0) 16:04:43 executing program 1: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[]::]:\nllb:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\xff', 0x0, 0x0) 16:04:43 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYRESDEC=0x0, @ANYRES64, @ANYRESDEC=r1, @ANYRES16=0x0], 0x32}}, 0x0) 16:04:43 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001340)={0x0, 0x0, &(0x7f0000001300)={&(0x7f0000000000)=ANY=[@ANYBLOB="4000000010001fff000000000000000000000000", @ANYRES32=0x0, @ANYRESHEX=r0], 0x3}}, 0x0) ioctl$VIDIOC_LOG_STATUS(r0, 0x5646, 0x0) r1 = memfd_create(&(0x7f0000000080)='\x00', 0x4) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f00000000c0)={{&(0x7f0000ffc000/0x3000)=nil, 0x3000}, 0x3}) accept(r0, 0x0, &(0x7f0000000040)) 16:04:43 executing program 4: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(r0, 0x40405514, &(0x7f00000000c0)={0xa, 0x2, 0x20, 0x9, 'syz0\x00', 0xfff}) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f00000001c0)=ANY=[@ANYBLOB="5b643a3a5d3a0a6c6ceed8fe6645ca3b3016388c3a6a9d2cfc3aa56060be0e08dee15f7f0387adf6cb7cc4c121db377f0daf73e4e1f4d4942273bf4101aa2c05eb9c60d2bfabe2e41868049ec87c8de2b47be0ca9ea5c64408c789dc4a52f43ce27b7bf18f4db9f4d4bdce303dca4d7e8e842e778243a404a5fbda19ed70da4d8197cd98371db081e0dcd9f1d9979d8562215f173a0113ab74e215c47d00cf497910cba8a715172da0b68f917c1619f5fcaa9cad1927d6c5defe4af63b3fb951b2166ab1a4c71c56ce"], &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 16:04:43 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, 0x0, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_INFO(r1, 0x29, 0x40, &(0x7f00000000c0)={'security\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00'}, &(0x7f0000000140)=0x54) 16:04:43 executing program 1: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[]::]:\nllb:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x7f', 0x0, 0x0) 16:04:43 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020200090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e0100000001000000000000082402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}}, 0x0) [ 925.589603] ceph: device name is missing path (no : separator in [d::]: [ 925.589603] llîØþfEÊ;08Œ:j,ü:¥``¾Þá_‡­öË|ÄÁ!Û7 ¯säáôÔ”"s¿Aª,ëœ`Ò¿«âähžÈ|â´{àÊž¥ÆDljÜJRô<â{{ñM¹ôÔ½Î0=ÊM~Ž„.w‚C¤¥ûÚípÚM—͘7°àÜÙñÙ—…b!_:«tâÄ}) 16:04:43 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) r1 = syz_open_dev$cec(&(0x7f0000000000)='/dev/cec#\x00', 0x2, 0x2) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffff9c, 0x84, 0x7c, &(0x7f0000000040)={0x0, 0x100, 0xb9}, &(0x7f0000000080)=0x8) setsockopt$inet_sctp_SCTP_ADD_STREAMS(r1, 0x84, 0x79, &(0x7f00000000c0)={r2, 0x1, 0x6}, 0x8) open$dir(&(0x7f0000000180)='./file0\x00', 0x200000, 0x4) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e0100000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}}, 0x0) bind$unix(r1, &(0x7f0000000100)=@file={0x0, './file0\x00'}, 0x6e) [ 925.660283] IPVS: ftp: loaded support on port[0] = 21 16:04:43 executing program 1: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[]::]:\nllb:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x05', 0x0, 0x0) 16:04:43 executing program 4: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) chdir(&(0x7f0000000000)='./file0\x00') clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[d::]:\nllb:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 16:04:43 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001340)={0x0, 0x0, &(0x7f0000001300)={&(0x7f0000000100)=ANY=[@ANYBLOB="400000005c041fff00443c70eb896b7f630000040e604885b00dfc0de55bbc", @ANYRES32=0x0, @ANYBLOB="000000000000000020703665727370616e0000000c0004000800030000000000e6f23e3480a9292d805d2fe57ce81a6ec23326ac1ff345b97a3d464628bd19e5f044c8d86584274c667c64c3faaeda7699ecb55ae4ce89d0f0ad3efbc1e69d0d609b1ca2a2eeac11b2c9c3d91a1894c5e13b69f28254f8f13dec79aea89af6513a44bf405d3807c6f40000000000000082d6fa55350fe991b14950607482b5170b194e3381c761f0f147929525a73dee35c8c286fe741af6fa24f98c3e59320bed2a4d0caf8b042c6adee4082ce940a8ec901206d78783eeeb000bacb2433df4d1470612d30545da606a871ff99c28b10d49"], 0x40}}, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000000)={0x0, 0x4, 0xf4b0, 0x100000001}) r1 = syz_open_dev$midi(&(0x7f00000002c0)='/dev/midi#\x00', 0x4, 0x44080) accept4$vsock_stream(r1, &(0x7f0000000300)={0x28, 0x0, 0x2710, @reserved}, 0x10, 0x80800) sysfs$3(0x3) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000240)='/dev/dlm-control\x00', 0x27ffff, 0x0) setsockopt$RDS_CONG_MONITOR(r2, 0x114, 0x6, &(0x7f0000000280), 0x4) r3 = syz_open_dev$midi(&(0x7f0000000040)='/dev/midi#\x00', 0x7, 0x0) getsockopt$inet_udp_int(r3, 0x11, 0x67, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 16:04:43 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020200090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e0100000001000000000000022402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}}, 0x0) 16:04:43 executing program 4: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x808, 0x0) mount(&(0x7f0000000040)=ANY=[@ANYBLOB='[d::]:\nllbz\x00'], &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) [ 925.814912] libceph: parse_ips bad ip '[d::]: [ 925.814912] llb' 16:04:43 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001340)={0x0, 0x0, &(0x7f0000001300)={&(0x7f0000000180)=@newlink={0x40, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, @ip6erspan={{0x10, 0x1, 'ip6erspan\x00'}, {0xc, 0x4, [@gre_common_policy=[@IFLA_GRE_IFLAGS={0x8, 0x3}]]}}}]}, 0x40}}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000000)={r0}) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x24, &(0x7f0000003c40)={@dev, @multicast2, 0x0}, &(0x7f0000003c80)=0xc) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000003cc0)={@remote, 0x15, r2}) 16:04:43 executing program 1: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[]::]:\nllb:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 16:04:43 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e0100000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}}, 0x0) r1 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) add_key$user(&(0x7f0000000080)='user\x00', &(0x7f00000000c0)={'syz', 0x1}, &(0x7f0000000200)="706280e5acb90df3f61554588f04ea8ae7c3e9386c0c13a953a8d5fe85162827bdabd6f281bdc0993f0bda4fdb32da618b7cdea012ad95ca6d662a7029f1d6b5011f9de55d01dba488045d7df5b1", 0x4e, r1) r2 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x1, 0x2) ioctl$KVM_DEASSIGN_PCI_DEVICE(r2, 0x4040ae72, &(0x7f0000000040)={0xffffffffffffff7f, 0x101, 0x1f, 0x7, 0x40}) sendmsg$key(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000280)={0x2, 0x11, 0x200000000000000, 0x8d907126a7deed6d, 0x27, 0x0, 0x70bd2c, 0x25dfdbfe, [@sadb_sa={0x2, 0x1, 0x4d4, 0x0, 0x5, 0x7c, 0x1, 0x80000000}, @sadb_x_sec_ctx={0x16, 0x18, 0x80000001, 0x81, 0xa8, "997e087b1376ecb3816628c2ed0b4f352ed115a716dc3559ecc3db2596d1d764f11aaa900a82634411ace0a3002e9b76366c5f4707ef003d76924eaaed9f5c2817bdeca24dabda756bdaa0e4bc2fdc3d9b049c7a0176a26963fd9226ae88e00b3e236cf83582d24532fd9e5712771462c9c75050a02d749f27966bf6a82022b319d1f1dcd32e5e9d7fc0a5cd8522aae318c7266c153be5590ab23e988d03e8f12e293f4ee3ad2bf0"}, @sadb_x_policy={0x8, 0x12, 0x4, 0x7, 0x0, 0x6e6bbe, 0x8, {0x6, 0xff, 0x0, 0x8, 0x0, 0x7, 0x0, @in6=@loopback, @in6=@remote}}, @sadb_x_kmaddress={0x5, 0x19, 0x0, @in={0x2, 0x4e22, @multicast1}, @in={0x2, 0x4e22, @loopback}}]}, 0x138}}, 0x80) [ 926.034510] ceph: device name is missing path (no : separator in [d::]: [ 926.034510] llbz) [ 926.057133] libceph: parse_ips bad ip '[]::]: [ 926.057133] llb' [ 926.090864] libceph: parse_ips bad ip '[]::]: [ 926.090864] llb' [ 926.287000] IPVS: ftp: loaded support on port[0] = 21 16:04:43 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, 0x0, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_INFO(r1, 0x29, 0x40, &(0x7f00000000c0)={'security\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02H\x00'}, &(0x7f0000000140)=0x54) 16:04:43 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020200090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e0100000001000000000000002408000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}}, 0x0) 16:04:43 executing program 1: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[]::]:\nllb:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 16:04:43 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001340)={0x0, 0x0, &(0x7f0000001300)={&(0x7f0000000180)=ANY=[@ANYBLOB="4000000010001fff00008f8b0f272906fbbe0000", @ANYRES32=0x0, @ANYBLOB="0000000000000000200012001000010069703665727370616e0000000c0004000800030000000000"], 0x40}}, 0x0) 16:04:43 executing program 4: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x813e, 0x40001) write$USERIO_CMD_SEND_INTERRUPT(r0, &(0x7f00000000c0)={0x2, 0x6}, 0xfcc7) mount(&(0x7f0000000040)=@nullb='[d::]:\nllb:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) getdents64(r0, &(0x7f00000001c0)=""/4096, 0x1000) 16:04:43 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000000)=ANY=[@ANYBLOB="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"], 0x60}}, 0x0) 16:04:44 executing program 1: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[]::]:\nllb:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) [ 926.388861] libceph: parse_ips bad ip '[]::]: [ 926.388861] llb' [ 926.409259] libceph: parse_ips bad ip '[]::]: [ 926.409259] llb' [ 926.419620] libceph: parse_ips bad ip '[d::]: [ 926.419620] llb' 16:04:44 executing program 0: getsockname$packet(0xffffffffffffff9c, &(0x7f0000000300)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000340)=0x14) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000400)='/dev/sequencer2\x00', 0x40000, 0x0) sendmsg$key(r1, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000000440)={0x2, 0x15, 0xfff, 0xf, 0x3f, 0x0, 0x70bd27, 0x25dfdbfd, [@sadb_x_sec_ctx={0x3, 0x18, 0x3f80000000, 0x4, 0xc, "6f810dcc2628d146eee93bea"}, @sadb_address={0x3, 0x17, 0x3c, 0x20, 0x0, @in={0x2, 0x4e23, @remote}}, @sadb_key={0x17, 0x0, 0x580, 0x0, "af0a29e9d0ca6d7600dbc82db671932e8539a89693229cfa79f3a7a9d783cec56c3f3d964f9caf9df36da848ad004646194f66ff710f7b717de7e27f0dc4490aa00650600c67fd2a5cc32ca8375ce674cf4f84443bc8b6cbe83fc2ce2a11d8cb44f129951af6c256b9c550bdd66ddf2d89c165cd5449a7624c47385dbfef92a367e6604f77a8eca3ccc59120e023d1470365978d1963783d1f5aa047c16580a278b7b3239054e9ac00b68e5aeecce061"}, @sadb_x_nat_t_port={0x1, 0x15, 0x4e22}, @sadb_spirange={0x2, 0x10, 0x4d4, 0x4d4}, @sadb_x_nat_t_port={0x1, 0x16, 0x4e24}, @sadb_x_sec_ctx={0x1c, 0x18, 0x17, 0x6, 0xd8, "c3685a205919bea33d2a9cb2d0a74bed3e5e14b089fb9043a87240b18b88cd9b3293c8748d702dc00839a79f39001479a9c3f28fd923b5c86243ad007bb64c790b32c81347cb14978082a680a39d68d14d994817807b48a25622f2e6d867e5c9e59ba0970065fb518c178211e9992047f2a2f443a89aacc9a7cdd12783e2e74c912461cbd446c518f212cc3f7f96468a9485d2275298c39b4d3aabba41f571f284dcd1ef29fabd3f7fa399d5c0789c2d187b9a936de44109f106318bd46c4fed254a22daf1844212b7c22fdfebbbdda6be12e612c314ed78"}]}, 0x1f8}}, 0x20008001) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0xf, 0x9, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x8}, [@jmp={0x5, 0x7, 0x0, 0xa, 0x9, 0xfffffffffffffff4, 0x1}, @ldst={0x0, 0x3, 0x2, 0x0, 0x9, 0x8, 0xfffffffffffffffc}, @ldst={0x2, 0x1, 0x7, 0xa, 0xa, 0x3c, 0xfffffffffffffffd}, @initr0={0x18, 0x0, 0x0, 0x0, 0xbac, 0x0, 0x0, 0x0, 0x5730}, @ldst={0x1, 0x2, 0x2, 0x7, 0x3, 0xffffffffffffffc0, 0xffffffffffffffff}]}, &(0x7f00000002c0)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x1, [], r0, 0xe}, 0x48) r2 = socket$key(0xf, 0x3, 0x2) ioctl$EVIOCGRAB(r1, 0x40044590, &(0x7f00000006c0)=0x24000000) sendmsg$key(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000000)={0x2, 0x15, 0x833b, 0x0, 0x33, 0x0, 0x70bd25, 0x25dfdbfc, [@sadb_ident={0x2, 0xa, 0x6, 0x0, 0x40}, @sadb_x_sec_ctx={0x1f, 0x18, 0x7ff, 0xff, 0xf0, "c3b8cefa3608129b61c57731124c251db73fb68311db79a5babd9e2e43f5daf75e4c75e379b237697511f130417681b23f462e8021b9c00a2062f6bb55194ffcbb9a0d601b1d4e97a55398af5665e99236b4ee2c811c9cf55247315a922a0252c2990a7a8b8746ebabf694840a9c761d593585e40b9814aa9ee92981b867cdd6a96dafdb02d295f6cf0f99f642e7eb5fe4fa0e95f86d95ea2fdf21f0e87dd0f99364da9178ee8f76e1e35992d5db196d971c7b06b522d283b1891d4804fa312d61525432f34a46621afb1d8fe67a71eea7a5a9ed8e71be3759945492b356cbc692ccc013b37f494a6174ef1dfb6040c0"}, @sadb_x_sa2={0x2, 0x13, 0x9, 0x0, 0x0, 0x70bd28, 0x3505}, @sadb_x_nat_t_type={0x1, 0x14, 0x7}, @sadb_x_filter={0x5, 0x1a, @in6=@mcast1, @in6=@dev={0xfe, 0x80, [], 0x14}, 0x11, 0x4, 0x4}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x5, {0x6, 0x6c, 0x7, 0x6, 0x0, 0x1f, 0x0, @in6=@mcast2, @in=@loopback}}]}, 0x198}}, 0x80) sendmsg$key(r2, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e0100000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}}, 0x0) 16:04:44 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020200090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e0100000001000000000000002403000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}}, 0x0) 16:04:44 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001340)={0x0, 0x0, &(0x7f0000001300)={&(0x7f0000000180)=@newlink={0x40, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, @ip6erspan={{0x10, 0x1, 'ip6erspan\x00'}, {0xc, 0x4, [@gre_common_policy=[@IFLA_GRE_IFLAGS={0x8, 0x3}]]}}}]}, 0x40}}, 0x0) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x2000, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r1, 0x400442c8, &(0x7f0000000040)={r0, 0x80000001, 0x5, "ee25f20650e66218546c468e63b27a5eb2e6d1c352c2a0b6b19dcc0db939a657fa4231d4039e8abdfae1805f424aaeb29428da0050efc04c016581d4dc54e4c8cc76ca924ba648e8ceba34aab6996b3f229ddbdc0f468c8257bb597d475fe733f626efdf9944e9a871272a186d110cb7458cbe33913816d2996b9211ae90bdbe236ed45188ab813b260e2be38b64a1"}) fstat(r1, &(0x7f0000000240)) [ 926.463141] libceph: parse_ips bad ip '[d::]: [ 926.463141] llb' [ 926.497309] IPVS: ftp: loaded support on port[0] = 21 16:04:44 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020200090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e010000000100000000000000240a000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}}, 0x0) 16:04:44 executing program 4: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="30cb36295d3a0a6c6c623a00"], &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x0, 0x2) ioctl$SCSI_IOCTL_SYNC(r0, 0x4) ioctl$DRM_IOCTL_AGP_INFO(r0, 0x80386433, &(0x7f00000000c0)=""/32) [ 926.594110] libceph: parse_ips bad ip '[]::]: [ 926.594110] llb' [ 926.660567] libceph: parse_ips bad ip '[]::]: [ 926.660567] llb' [ 926.923271] IPVS: ftp: loaded support on port[0] = 21 16:04:44 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, 0x0, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_INFO(r1, 0x29, 0x40, &(0x7f00000000c0)={'security\x00\x00\x00\x00\x00\x00\xd0\x00'}, &(0x7f0000000140)=0x54) 16:04:44 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x505940, 0x0) write$FUSE_POLL(r1, &(0x7f0000000040)={0xffffffffffffff44, 0x94de808d2927dd97, 0x1}, 0x18) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e0100000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}}, 0x0) 16:04:44 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020200090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e010000000100000000000000242c000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}}, 0x0) 16:04:44 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001340)={0x0, 0x0, &(0x7f0000001300)={&(0x7f0000000180)=@newlink={0x40, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, @ip6erspan={{0x10, 0x1, 'ip6erspan\x00'}, {0xc, 0x4, [@gre_common_policy=[@IFLA_GRE_IFLAGS={0x8, 0x3}]]}}}]}, 0x40}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) 16:04:44 executing program 1: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[]::]:\nllb:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 16:04:44 executing program 4: mknod$loop(&(0x7f0000000000)='./file1\x00', 0x3, 0x1) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[d::]:\nllb:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 16:04:44 executing program 4: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[d::]:\nllb:\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='\x1f\xba2\x16-', 0x800000, 0x0) [ 927.049609] libceph: parse_ips bad ip '[]::]: [ 927.049609] llb' 16:04:44 executing program 1: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[]::]:\nllb:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) [ 927.097233] IPVS: ftp: loaded support on port[0] = 21 16:04:44 executing program 0: r0 = syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0x100, 0x1) ioctl$SCSI_IOCTL_START_UNIT(r0, 0x5) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff020013000200000000000000000000000300060002783e0000000002004e0100000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e000000100000000000000000397e254c5dca6e65960284671e4411b09b6dc8103f8a1ac1d2c78641940a8a89a543a537a7a165e096167"], 0x60}}, 0x0) r2 = syz_open_dev$ndb(&(0x7f0000000000)='/dev/nbd#\x00', 0x0, 0x20000) ioctl$BLKBSZSET(r2, 0x40081271, &(0x7f0000000040)=0x10000) 16:04:44 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020200090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e0100000001000000000000002404000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}}, 0x0) 16:04:44 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001340)={0x0, 0x30f, &(0x7f0000000000)={&(0x7f0000000180)=@newlink={0x40, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, @ip6erspan={{0x10, 0x1, 'ip6erspan\x00'}, {0xc, 0x4, [@gre_common_policy=[@IFLA_GRE_IFLAGS={0x8, 0x3}]]}}}]}, 0x40}}, 0x0) 16:04:44 executing program 1: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[]::]:\nllb:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) [ 927.260272] libceph: parse_ips bad ip '[]::]: [ 927.260272] llb' [ 927.422649] libceph: parse_ips bad ip '[]::]: [ 927.422649] llb' [ 927.430902] libceph: parse_ips bad ip '[]::]: [ 927.430902] llb' [ 927.668704] IPVS: ftp: loaded support on port[0] = 21 16:04:45 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, 0x0, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_INFO(r1, 0x29, 0x40, &(0x7f00000000c0)={'security\x00\x00\x00\x00\x00\x02p\x00'}, &(0x7f0000000140)=0x54) 16:04:45 executing program 4: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x40000, 0x0) setsockopt$inet_sctp_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f00000000c0)=0x7, 0x4) mount(&(0x7f0000000040)=@nullb='[d::]:\nllb:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 16:04:45 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001340)={0x0, 0x0, &(0x7f0000001300)={&(0x7f0000000000)=ANY=[@ANYBLOB="4000000010001fff000000000000000000000000", @ANYRES32=0x0, @ANYBLOB="006970366572000c0004000800034751c4ae0000efddef09000000000000002f61ac7ef25bdafe003b9f3af98fcb0c467182b980fbd3038c2cd2676893b2ef3297180e372841fc6f0c00000000000000000000"], 0x40}}, 0x0) 16:04:45 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) r1 = dup2(r0, r0) ioctl$DRM_IOCTL_AGP_ALLOC(r1, 0xc0206434, &(0x7f0000000000)={0x9, 0x0, 0xd187af453274f106, 0x7f}) ioctl$DRM_IOCTL_AGP_ALLOC(r1, 0xc0206434, &(0x7f0000000040)={0x9, r2, 0x3, 0x7}) ioctl$PPPOEIOCSFWD(r1, 0x4008b100, &(0x7f0000001380)={0x18, 0x0, {0x2, @remote, 'sit0\x00'}}) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYRESOCT=r0], 0x17}}, 0x0) 16:04:45 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020200090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e0100000001000000000000002402001700f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}}, 0x0) 16:04:45 executing program 1: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[]::]:\nllb:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 16:04:45 executing program 4: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000001c0)={{{@in6=@loopback, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@mcast2}}, &(0x7f0000000140)=0xe8) lsetxattr$security_capability(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.capability\x00', &(0x7f00000002c0)=@v3={0x3000000, [{0x101, 0x3}, {0x20, 0x8}], r0}, 0x18, 0x2) clone(0x20000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=ANY=[@ANYBLOB='[dIK]:\nllb:\x00'], &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) [ 927.814385] libceph: parse_ips bad ip '[d::]: [ 927.814385] llb' [ 927.828053] netlink: 32 bytes leftover after parsing attributes in process `syz-executor3'. [ 927.859060] libceph: parse_ips bad ip '[]::]: [ 927.859060] llb' 16:04:45 executing program 3: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) ioctl$ASHMEM_GET_PIN_STATUS(r0, 0x7709, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000001340)={0x0, 0x0, &(0x7f0000001300)={&(0x7f0000000180)=ANY=[@ANYBLOB="4000000010001fff000000000000000000000000", @ANYRES32=0x0, @ANYBLOB="00f7a157dc0008002000120010fb000069703665727300616e0000000c0004000800030000000000"], 0x40}}, 0x0) 16:04:45 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020200090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e0100000001000000000000002402001800f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}}, 0x0) 16:04:45 executing program 0: r0 = open(&(0x7f00000001c0)='./file0\x00', 0x10c02, 0x0) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_INTERVAL(r0, 0xc040564b, &(0x7f0000000200)={0x10000, 0x0, 0x3011, 0xc00, 0x80000000, {0x6, 0x4}}) r1 = syz_open_dev$swradio(&(0x7f0000000100)='/dev/swradio#\x00', 0x1, 0x2) fallocate(r1, 0x2, 0x8, 0x10001) setsockopt$inet6_tcp_TCP_REPAIR(r1, 0x6, 0x13, &(0x7f0000000240), 0x4) ioctl$SCSI_IOCTL_SEND_COMMAND(r1, 0x1, &(0x7f0000000140)={0x59, 0xfff, 0x1aa, "fa6eed0443fa02506e1b3f18c627f340a2d45c97b704982bec0c8093bbe67d123bc68b647e8759a41a74c98ee84eab8be1550acb552bc6ea318641e241c75deea92351a1b35fad422aa5d576fee9e4b9ebaa11512867ae9819"}) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x440000, 0x0) ioctl$KDGKBDIACR(r2, 0x4b4a, &(0x7f0000000080)=""/82) ioctl$SG_GET_SG_TABLESIZE(r2, 0x227f, &(0x7f0000000040)) r3 = socket$key(0xf, 0x3, 0x2) ioctl$RNDADDTOENTCNT(r2, 0x40045201, &(0x7f0000000280)) sendmsg$key(r3, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x60}}, 0x0) [ 927.900894] IPVS: ftp: loaded support on port[0] = 21 [ 927.908943] libceph: parse_ips bad ip '[]::]: [ 927.908943] llb' [ 927.980593] netlink: 28 bytes leftover after parsing attributes in process `syz-executor3'. 16:04:45 executing program 1: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[]::]:\nllb:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 16:04:45 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001340)={0x0, 0x0, &(0x7f0000001300)={&(0x7f0000000180)=@newlink={0x40, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, @ip6erspan={{0x10, 0x1, 'ip6erspan\x00'}, {0xc, 0x4, [@gre_common_policy=[@IFLA_GRE_IFLAGS={0x8, 0x3}]]}}}]}, 0x40}}, 0x0) [ 928.133182] libceph: parse_ips bad ip '[]::]: [ 928.133182] llb' [ 928.435413] IPVS: ftp: loaded support on port[0] = 21 16:04:46 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, 0x0, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_INFO(r1, 0x29, 0x40, &(0x7f00000000c0)={'security\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03L\x00'}, &(0x7f0000000140)=0x54) 16:04:46 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020200090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e0100000001000000000000002402001a00f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}}, 0x0) 16:04:46 executing program 4: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[d::]:\nllb:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 16:04:46 executing program 1: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[]::]:\nllb:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 16:04:46 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e0100000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x62b7133567ddf07e}}, 0x0) fsetxattr$security_smack_entry(r0, &(0x7f0000000000)='security.SMACK64IPOUT\x00', &(0x7f0000000040)='(\\\x00', 0x3, 0x3) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x8000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000000c0)={0xffffffffffffffff}, 0x2, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f0000000140)={0x14, 0x88, 0xfa00, {r2, 0x30, 0x0, @ib={0x1b, 0x0, 0x76b3f85e, {"e0ee8612e64698e1bfae915d1f7141a4"}, 0x400, 0x9, 0x697}}}, 0x90) 16:04:46 executing program 3: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(0xffffffffffffffff, 0x402c5342, &(0x7f0000000100)) fdatasync(0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000080), 0x1c) r2 = dup2(r1, r1) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(r0, 0x402c5342, &(0x7f0000000580)={0x7fff, 0x8, 0x716, {0x77359400}, 0xa81, 0x6}) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet6_buf(r2, 0x29, 0x2f, &(0x7f0000000000), 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000340)={0x0, @in6={{0xa, 0x4e21, 0x8001, @local, 0x329}}, 0x5, 0xe85, 0x1, 0x3, 0xa0}, &(0x7f0000000400)=0x98) sendmsg$inet_sctp(r0, &(0x7f0000000540)={&(0x7f0000000000)=@in={0x2, 0x4e21, @rand_addr=0x1ff}, 0x10, &(0x7f0000000300)=[{&(0x7f00000001c0)="470030e3e36fcffeb76eb4add560cd4c1095b9701ccdc96cd0f687d37555d50c96669c62dca3cdb7c46ae3aa8d8766382e6542e18a55aeb9d4eefbbccc39e8ab6e5eb23e876bc0db6bc99944358cd9ab945718f09f8f6eaeb247c6fafed7da03215cff813b418a73b738fb997faafe069a05f9872aff5c03144217b76c8093fabd47179eb07335cb989f7d2747d5ac43dcf0a154f0ce88972d4c476b01b19a9efb9e690bba20a9617ef2addf6ef155acce4736160aab46ac75f5bb37ab15a4dcab59acc038da43edbbad28035ec0ff2074c37f1f", 0xd4}, {&(0x7f0000000040)="5ae11ad9f739128b548a6a8e44d83543abf7227f45d5fd1dc1aea58e982688a6155831876ab38a86ca99b704f2cb8916c0177c223f67c55e4b755ece3f", 0x3d}], 0x2, &(0x7f0000000440)=[@dstaddrv6={0x20, 0x84, 0x8, @dev={0xfe, 0x80, [], 0x10}}, @dstaddrv4={0x18}, @init={0x18, 0x84, 0x0, {0x9, 0x4, 0xce, 0x6}}, @dstaddrv4={0x18, 0x84, 0x7, @broadcast}, @dstaddrv4={0x18, 0x84, 0x7, @remote}, @prinfo={0x18, 0x84, 0x5, {0x20, 0x2}}, @prinfo={0x18, 0x84, 0x5, {0x0, 0x9}}, @sndrcv={0x30, 0x84, 0x1, {0x0, 0x3b, 0x9, 0xe1f, 0x4, 0x29, 0x266, 0x1, r3}}], 0xe0, 0x4008091}, 0x40) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000001340)={0x0, 0x0, &(0x7f0000001300)={&(0x7f0000000640)=ANY=[@ANYBLOB="4000000010001fff00000000da1a60a700a9f637936d08c8f6e23f45665db597000000", @ANYRES32=0x0, @ANYBLOB="0000000000000000200012001000010069703665727370616e0000000c0004000800030000000000"], 0x40}}, 0x0) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x102, 0x0) setsockopt$inet_icmp_ICMP_FILTER(r5, 0x1, 0x1, &(0x7f0000000600)={0x3}, 0xffffffffffffff79) mprotect(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x1000000) ioctl$KVM_CHECK_EXTENSION(r0, 0xae03, 0x2) [ 928.620432] netlink: 32 bytes leftover after parsing attributes in process `syz-executor3'. [ 928.630659] libceph: parse_ips bad ip '[]::]: [ 928.630659] llb' [ 928.639641] libceph: parse_ips bad ip '[d::]: [ 928.639641] llb' 16:04:46 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020200090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e0100000001000000000000002402003f00f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}}, 0x0) [ 928.680413] netlink: 32 bytes leftover after parsing attributes in process `syz-executor3'. [ 928.686810] IPVS: ftp: loaded support on port[0] = 21 [ 928.689265] libceph: parse_ips bad ip '[]::]: [ 928.689265] llb' 16:04:46 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001340)={0x0, 0x0, &(0x7f0000001300)={&(0x7f0000000000)=ANY=[@ANYBLOB="4000000010001fff000000000000000000000000", @ANYRES32=0x0, @ANYBLOB="0000000000000000200012001000010069703665727370616e0000000c000400080003000000000073584e84786ad0eb77e47c45ea96806530b236"], 0x40}}, 0x0) 16:04:46 executing program 0: r0 = creat(&(0x7f0000000240)='./file0\x00', 0x104) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000280)={0xffffffffffffffff}, 0x111, 0x1005}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f0000000300)={0x9, 0x108, 0xfa00, {r1, 0xd5, "825cac", "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"}}, 0x110) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e0100000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}}, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f00000004c0)=0xffffffffffffff3d) getsockname$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0x14) sendto(r2, &(0x7f00000000c0)="cc9e250ff212b79056406028b5e7a5d2981a4bdd181998e75882bcba68503538ccf5cef3101eba450d1750597a671d024197d2035683dd69de560dedd1833dfa1a8ba79c8fe633e27bbdcad02cdc246b8f3d9dae79af8f295195b923e19708399caffb253d33065cb9c14690a5c240f901bb8a0ae4b1187145d8", 0x7a, 0x4008000, &(0x7f00000001c0)=@hci={0x1f, r4}, 0x80) sched_getparam(r3, &(0x7f0000000080)) 16:04:46 executing program 4: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[d::]:\nllb:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) lsetxattr$security_evm(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.evm\x00', &(0x7f0000000140)=@md5={0x1, "7ff40cc0c78127cf85290fef5102483a"}, 0x11, 0x2) 16:04:46 executing program 1: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[]::]:\nllb:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 16:04:46 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020200090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e0100000001000000000000002402040000f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}}, 0x0) [ 928.878025] libceph: parse_ips bad ip '[]::]: [ 928.878025] llb' [ 928.890957] libceph: parse_ips bad ip '[]::]: [ 928.890957] llb' [ 929.420719] IPVS: ftp: loaded support on port[0] = 21 16:04:47 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, 0x0, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_INFO(r1, 0x29, 0x40, &(0x7f00000000c0)={'security\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x84\x00'}, &(0x7f0000000140)=0x54) 16:04:47 executing program 1: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[]::]:\nllb:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\xf0', 0x0, 0x0) 16:04:47 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) r1 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x4, 0x402001) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_INFO(r1, 0x40bc5311, &(0x7f0000000040)={0x2, 0x3, 'client1\x00', 0xffffffff80000000, "21a60240e5bcb153", "7b10141374ee094d7fcd60d15c10f0850e480e8ba97f10a79a18c672d3d14149", 0x587, 0xffffffff}) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e0100000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}}, 0x0) 16:04:47 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001340)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x40, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, @ip6erspan={{0x10, 0x1, 'ip6erspan\x00'}, {0xc, 0x4, [@gre_common_policy=[@IFLA_GRE_IFLAGS={0x8, 0x3}]]}}}]}, 0x40}}, 0x0) syz_open_dev$dmmidi(&(0x7f0000000080)='/dev/dmmidi#\x00', 0x3, 0x10000) 16:04:47 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020200090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e0100000001000000000000002402020100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}}, 0x0) 16:04:47 executing program 4: prctl$PR_SET_MM_AUXV(0x23, 0xc, &(0x7f00000001c0)="4e29840185fafabdffbfc61087029ded511c5c2e32ae756cfe5f7e0dc4936d4b3b4f0374ef475a314a5e1f13b669ca9344bc21b1d0f0bafd369be5516b15c86bad19e9856d5dc6036878574cc843057d0bbf64003ce6b11efddaed6b0180bfdf2b498195", 0x64) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[d::]:\nllb:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 16:04:47 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) accept$packet(0xffffffffffffff9c, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000280)=0xffffff27) sendmsg$nl_route(r0, &(0x7f0000001340)={0x0, 0x0, &(0x7f0000001300)={&(0x7f00000001c0)=@ipv4_newaddr={0x0, 0x14, 0x10, 0x70bd2d, 0x25dfdbfe, {0x2, 0x3f, 0x0, 0xff, r1}, [@IFA_LABEL={0x0, 0x3, 'lo\x00'}, @IFA_BROADCAST={0x0, 0x4, @loopback}, @IFA_BROADCAST={0x0, 0x4, @empty}, @IFA_LABEL={0x0, 0x3, 'bcsf0\x00'}, @IFA_CACHEINFO={0x0, 0x6, {0x401, 0x8, 0x6, 0x2}}, @IFA_FLAGS={0x0, 0x8, 0x488}, @IFA_LABEL={0x0, 0x3, 'bridge_slave_1\x00'}]}, 0x5f4}}, 0x80) 16:04:47 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020200090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e0100000001000000000000002402100100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}}, 0x0) [ 929.748964] IPVS: ftp: loaded support on port[0] = 21 16:04:47 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) r1 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x2, 0x400) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r1, 0x84, 0x6d, &(0x7f00000004c0)=ANY=[@ANYRES32=0x0, @ANYBLOB="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"], &(0x7f0000001500)=0x1008) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f0000001540)={0x2, 0x208, 0x10000, 0xc461, r2}, &(0x7f0000001580)=0x10) ioctl$KVM_GET_XSAVE(r1, 0x9000aea4, &(0x7f0000000080)) ioctl$KDSKBMETA(r1, 0x4b63, &(0x7f0000001680)=0x2000000008) getsockopt$IP_VS_SO_GET_INFO(r0, 0x0, 0x481, &(0x7f00000015c0), &(0x7f0000001640)=0xc) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000001600)=0x233bf7c0) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r1, &(0x7f0000000040)={0x2}) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000480)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) 16:04:47 executing program 1: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[]::]:\nllb:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x02', 0x0, 0x0) 16:04:47 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020200090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e0100000001000000000000002402030000f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}}, 0x0) 16:04:47 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001340)={0x0, 0x0, &(0x7f0000001300)={&(0x7f0000000000)=ANY=[@ANYBLOB="4000000010001fff000000000000000000000000", @ANYRES32=0x0, @ANYBLOB="000000000000000020001200100008000000360300000000000020ec4120707859d1ff31f241aaeb48d958f12b131fe019e7903a589516079c4642a0dfdfb7d189928938b1f3a6c5bf7bd81b5c4e87e98955fa2bd527f4497c588dc4fe5a68accf49fe192de9cb7170c7bccda8775406c35aea37752d2fd0819be36a055091fe2ab8d19f812e8cfda14c00ffd92f2d30044881fd65186d4aa9d56773b95de492ce76a3c8b16ab5098a576f47b610cd1711b0331e2089724c7a37f7172e36b2b100000000000000000000000000000000000000000000000000"], 0x3}, 0x1, 0x0, 0x0, 0x1}, 0x0) [ 930.061976] IPVS: ftp: loaded support on port[0] = 21 [ 930.384656] IPVS: ftp: loaded support on port[0] = 21 16:04:48 executing program 0: socket$key(0xf, 0x3, 0x2) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x480, 0x0) ioctl$UI_END_FF_UPLOAD(r0, 0x406855c9, &(0x7f0000000040)={0xe, 0x3, {0x55, 0x3ff, 0x2, {0xf2, 0x100000001}, {0x2, 0x3}, @cond=[{0x9, 0x80000000, 0x9, 0x1ff, 0xebd, 0x1ffc000000000000}, {0x2, 0xa99, 0x2, 0x5, 0xffff, 0x800}]}, {0x54, 0x1a, 0x4, {0x80, 0x7ff}, {0xfffffffffffffffa}, @ramp={0x8, 0xc852, {0x7, 0x4, 0x1, 0xfffffffffffffff8}}}}) 16:04:48 executing program 1: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[]::]:\nllb:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='cephN', 0x0, 0x0) 16:04:48 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001340)={0x0, 0x0, &(0x7f0000001300)={&(0x7f0000000000)=ANY=[@ANYBLOB="4000000010001fff000000000000000000000000", @ANYRES32=0x0, @ANYBLOB="00000000000000002000120024d31ae2030000000000d2bb201cb50ac9d717c01df1a05171d2a69bb56a577d8760b85aafeb1b0000000000"], 0x3}, 0x1, 0x0, 0x0, 0x4000}, 0x0) 16:04:48 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, 0x0, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_INFO(r1, 0x29, 0x40, &(0x7f00000000c0)={'security\x00\x00\x00\x00\x00\x03\xf4\x00'}, &(0x7f0000000140)=0x54) 16:04:48 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020200090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e0100000001000000000000002402080100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}}, 0x0) [ 930.695655] IPVS: ftp: loaded support on port[0] = 21 [ 930.963670] IPVS: ftp: loaded support on port[0] = 21 [ 931.251577] bridge0: port 1(bridge_slave_0) entered blocking state [ 931.258041] bridge0: port 1(bridge_slave_0) entered disabled state [ 931.264989] device bridge_slave_0 entered promiscuous mode [ 931.322532] bridge0: port 2(bridge_slave_1) entered blocking state [ 931.329541] bridge0: port 2(bridge_slave_1) entered disabled state [ 931.336653] device bridge_slave_1 entered promiscuous mode [ 931.398916] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 931.429881] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 931.575864] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 931.609164] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 931.806366] device bridge_slave_1 left promiscuous mode [ 931.815957] bridge0: port 2(bridge_slave_1) entered disabled state [ 931.833650] device bridge_slave_0 left promiscuous mode [ 931.841859] bridge0: port 1(bridge_slave_0) entered disabled state [ 931.981202] team0 (unregistering): Port device team_slave_1 removed [ 932.001546] team0 (unregistering): Port device team_slave_0 removed [ 932.014865] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 932.058619] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 932.116130] bond0 (unregistering): Released all slaves [ 932.252762] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 932.260463] team0: Port device team_slave_0 added [ 932.312035] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 932.322094] team0: Port device team_slave_1 added [ 932.372553] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 932.379646] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 932.390318] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 932.442367] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 932.450691] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 932.471573] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 932.520822] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 932.528439] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 932.538919] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 932.593015] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 932.600324] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 932.610897] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 933.215785] bridge0: port 2(bridge_slave_1) entered blocking state [ 933.222261] bridge0: port 2(bridge_slave_1) entered forwarding state [ 933.229190] bridge0: port 1(bridge_slave_0) entered blocking state [ 933.236009] bridge0: port 1(bridge_slave_0) entered forwarding state [ 933.246639] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 934.219021] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 935.133083] 8021q: adding VLAN 0 to HW filter on device bond0 [ 935.295044] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 935.463281] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 935.469999] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 935.485493] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 935.647770] 8021q: adding VLAN 0 to HW filter on device team0 16:04:53 executing program 4: listxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000240)=""/139, 0x8b) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000080)='./file0\x00', &(0x7f0000000300)='Gh\xe5e4Ra\xcaxi\xde\xfa<\xee\xd7\x01\xa9\x14u\xf5\x10Fd\xab~P\x129\xa5%@\x12\xbf:\xcf4AXHd\x9d\xf8\xba\x86\xbc\x18\xf3\xd3\x13\x9b?\xb9\xe5X\xbe\x1d\xf2G\x91W\xd0\xebC!w\xab\x17\xe1\xf3\xc2\xad\xf8\xb3([\x84\x8d\xce\x0e\xcb\xdf\xed\xce&\x8cO\xb9\xac\x8b:[\xa0\xf7\xce\xd8\xad\x84\xfcx8\x1b\x10\x8d\xcf\xa1\xf7\xbb\x81\xe6\xb1A:\xcf\xfd\xb4\x18\x0f\xf4\xa7Zf\xef\xf2\n<\xdf)\b\xae\xc0\"\xa0\xd8\t\xb7\xd4\xcd\xbaY=S9L3o5\xc3\xdb\xcf\xc1\xe3\xe3\xd3\x9b\xd4C\x8b\xf7+K\xb5\xf8\xefSg\xf9\xca\r\x1f\x1d', 0x0, 0x0) mount(&(0x7f0000000000)=@loop={'/dev/loop', 0x0}, &(0x7f00000000c0)='./file1\x00', &(0x7f0000000140)='exofs\x00', 0x200800, &(0x7f00000001c0)='mime_type*,vboxnet1ppp0selinux:nodev)cpuset\x8c{trustedmime_typewlan0@em0)selinux)%\x00') 16:04:53 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001340)={0x0, 0x0, &(0x7f0000001300)={&(0x7f0000000180)=@newlink={0x40, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, @ip6erspan={{0x10, 0x1, 'ip6erspan\x00'}, {0xc, 0x4, [@gre_common_policy=[@IFLA_GRE_IFLAGS={0x8, 0x3}]]}}}]}, 0x40}}, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x40000, 0x0) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000080)='fou\x00') sendmsg$FOU_CMD_GET(r1, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x101}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x54, r2, 0x200, 0x70bd2d, 0x25dfdbfb, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_AF={0x8, 0x2, 0xa}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0x7f}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e20}, @FOU_ATTR_TYPE={0x8, 0x4, 0x1}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_TYPE={0x8, 0x4, 0x3}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_IPPROTO={0x8}]}, 0x54}, 0x1, 0x0, 0x0, 0x4000000}, 0x40) 16:04:53 executing program 1: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[]::]:\nllb:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 16:04:53 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020200090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e0100000001000000000000002402040100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}}, 0x0) 16:04:53 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000140)=ANY=[@ANYRESOCT=r0], 0x17}}, 0x0) 16:04:53 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, 0x0, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_INFO(r1, 0x29, 0x40, &(0x7f00000000c0)={'security\x00\x00\x00\x00\xd0\x00'}, &(0x7f0000000140)=0x54) 16:04:54 executing program 1: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[]::]:\nllb:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) [ 936.334130] libceph: parse_ips bad ip '[d::]: [ 936.334130] llb' [ 936.365836] libceph: parse_ips bad ip '[]::]: [ 936.365836] llb' 16:04:54 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020200090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e0100000001000000000000002402000003f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}}, 0x0) [ 936.423170] IPVS: ftp: loaded support on port[0] = 21 16:04:54 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x406, r0) r2 = syz_genetlink_get_family_id$nbd(&(0x7f0000000040)='nbd\x00') sendmsg$NBD_CMD_RECONFIGURE(r1, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000c022}, 0xc, &(0x7f00000000c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB='8\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="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"], 0x38}, 0x1, 0x0, 0x0, 0x4000000}, 0x4000) sendmsg$nl_route(r0, &(0x7f0000001340)={0x0, 0x0, &(0x7f0000001300)={&(0x7f0000000180)=@newlink={0x40, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, @ip6erspan={{0x10, 0x1, 'ip6erspan\x00'}, {0xc, 0x4, [@gre_common_policy=[@IFLA_GRE_IFLAGS={0x8, 0x3}]]}}}]}, 0x40}}, 0x0) 16:04:54 executing program 0: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f00000001c0)={0xffffffffffffffff}) sendmsg$key(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000200)={0x2, 0xb, 0x8, 0x9, 0x4, 0x0, 0x70bd2d, 0x25dfdbff, [@sadb_x_nat_t_type={0x1, 0x14, 0x1}, @sadb_x_nat_t_type={0x1, 0x14, 0x100000001}]}, 0x20}}, 0x5) fgetxattr(r0, &(0x7f00000002c0)=@random={'os2.', 'cifs.idmap\x00'}, &(0x7f0000000300)=""/202, 0xca) r1 = socket$key(0xf, 0x3, 0x2) lstat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0}) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000400)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$VT_SETMODE(r3, 0x5602, &(0x7f0000000440)={0xfffffffffffffffc, 0x4, 0x36, 0x80, 0x1}) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r3, 0x84, 0x73, &(0x7f0000000480)={0x0, 0x10001, 0x10, 0x3ff, 0x5}, &(0x7f00000004c0)=0x18) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r3, 0x84, 0x1b, &(0x7f0000000500)={r4, 0xbe, "eb3d981aa00a980675bad5cd7d7f4052501c64d0d1cd985ab1f7b56cfa50230a5f1406b493b9d9b0279df28b1bb6097e358b5bb2fe36d741e7d6f4bf174212782f58071836fe5721f6a76fffd34a8f11b35e9c278990f27c089e3b33f2666bba378050b2390ac26b75df5de329c5f89c85033d3b4fdf4064bcbfd488bddd28b22a0e84ea1df6c111972216d8c8c766db3b2312c388d1e3022aa1e35029cd710c7d48f23eb8d6e7e07e442cf759951f3b2feb6cff1775d8d8a59d5aa62a38"}, &(0x7f0000000600)=0xc6) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r3, 0x29, 0xd2, &(0x7f0000000640)={{0xa, 0x4e20, 0xd9a7, @mcast2}, {0xa, 0x4e20, 0x5, @local, 0x7}, 0xa9c3, [0x6000000000000000, 0x3, 0x9a37, 0xd17, 0x1, 0x5, 0x1000, 0x1000]}, 0x5c) r5 = add_key(&(0x7f00000000c0)='cifs.idmap\x00', &(0x7f0000000100)={'syz', 0x1}, &(0x7f0000000140)="11f6f68ce2d20ce1288c57706f95a6f28a6c52626ea6368f3365363c3b885dc494eb7d579838a75f277bb232fa5d976cf07e375c5e61061f60f1272c99bf17132be5266482bf1008f2861350482f7539bd337bd4258e2061d7845970bb327e7ad2cef6be16a33d56da", 0x69, 0xfffffffffffffff9) keyctl$get_persistent(0x16, r2, r5) sendmsg$key(r1, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e0100000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}}, 0x0) [ 936.480467] libceph: parse_ips bad ip '[]::]: [ 936.480467] llb' [ 936.538543] QAT: Invalid ioctl 16:04:54 executing program 4: r0 = add_key$keyring(&(0x7f0000004e00)='keyring\x00', &(0x7f0000004e40)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$clear(0x7, r0) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x100, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000004dc0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x41000080}, 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=@newtaction={0x4bc4, 0x30, 0x4, 0x70bd2a, 0x25dfdbfe, {}, [{0x150, 0x1, @m_gact={0x14c, 0x18, {{0xc, 0x1, 'gact\x00'}, {0x7c, 0x2, [@TCA_GACT_PROB={0xc, 0x3, {0x2, 0x1a1, 0xffffffffffffffff}}, @TCA_GACT_PARMS={0x18, 0x2, {0x8, 0x100000000, 0x4, 0x101, 0x5740}}, @TCA_GACT_PARMS={0x18, 0x2, {0x1, 0x7fffffff, 0x8, 0x1, 0x2}}, @TCA_GACT_PARMS={0x18, 0x2, {0x7, 0x9, 0x20000000, 0x6, 0x9}}, @TCA_GACT_PROB={0xc, 0x3, {0x1, 0x1eff, 0x2}}, @TCA_GACT_PROB={0xc, 0x3, {0x0, 0x23bc, 0x8}}, @TCA_GACT_PROB={0xc, 0x3, {0x2, 0xefa}}]}, {0xbc, 0x6, "2c967b56f146b45c39872dbc6f1328215d003b0ab76d74228ce533bde197ddc11c0949bc7b5e11de0093c155441d1afe49148c82a21dda64314ef65ff67dff006fc67333b48e5ebe0124937950b400f2c100e0cf2e858762e6305ba4c606fe6188ad791df878024cced32dbda86a50a59771ddb8da4739e69b3eee415fd47e2dc4cae1e64c831731d2a5d79a6bb38e36d934b5cac57a0339fd1b70b35bc3b876a0aaab92a9d888f8f424445f889de0ca074e73af30"}}}}, {0x494c, 0x1, @m_pedit={0x4948, 0x12, {{0xc, 0x1, 'pedit\x00'}, {0x4928, 0x2, [@TCA_PEDIT_PARMS_EX={0xe68, 0x4, {{{0x3, 0x6, 0x0, 0x9, 0x4}, 0x3ff, 0x89e, [{0x8, 0x3ff, 0xfefa, 0xffffffff, 0x7, 0x1}, {0x8, 0x3, 0xb73, 0x6, 0x5e20, 0x100000001}, {0x9, 0x5, 0x500000, 0x4b, 0x5, 0xff}]}, [{0x81, 0x2, 0x8, 0x0, 0x3f, 0x6}, {0x6, 0x0, 0x0, 0xd805, 0x48fd90be, 0x10000}, {0xe9, 0x1, 0x9, 0x6, 0x41e9, 0x6}, {0xfffffffffffffffa, 0x1, 0x5, 0x9, 0x6}, {0x7fff, 0x7fffffff, 0x0, 0x0, 0x8, 0x4}, {0x5, 0xc40000, 0x5, 0x1000, 0x1ff, 0x8}, {0xffff, 0x3a, 0x6, 0x7ff, 0xff}, {0x8, 0x0, 0xfffffffffffffc00, 0xea9, 0x1f, 0x5}, {0x2, 0x9, 0xb6f, 0x9, 0x3, 0x80000000}, {0x9, 0x80, 0x4, 0x1, 0x1ff, 0x1}, {0x7c, 0xce9, 0x1, 0x7, 0x1, 0x800}, {0xffffffffffff946c, 0x80000000, 0x0, 0x10001, 0x2, 0x8001}, {0x1, 0x3, 0x68, 0x100, 0xffffffffffff6cae, 0x3}, {0x100, 0x30e3c850, 0x2, 0x0, 0x20, 0x2}, {0x80000001, 0x3a5a, 0x1, 0xfd30, 0x3, 0x80000000}, {0x8, 0x4, 0x0, 0x8, 0x5}, {0x8, 0x743b, 0x2, 0x0, 0x9, 0xffffffffffffffe0}, {0x8000, 0xe47a, 0x81, 0x22f, 0x401, 0x3}, {0x6, 0x2, 0x3, 0x3488, 0x5, 0x8}, {0xfffffffffffffaf1, 0x2, 0xc3d, 0x6, 0x40, 0x5}, {0x8000, 0xfffffffffffeffff, 0x0, 0x5, 0x9, 0x6}, {0x2, 0x9, 0x3, 0x5, 0x10000, 0x2}, {0x8, 0x9, 0x9, 0xe35, 0x8, 0xfff}, {0x2, 0x6, 0x4, 0x100000001, 0x0, 0x3}, {0x80, 0x2, 0x2, 0x80, 0x1, 0x7f}, {0xffff, 0x1, 0xff, 0x80000000, 0x4ea270d0}, {0x6, 0x3ff, 0x7fff, 0x10000, 0xfffffffffffeffff, 0x3}, {0x0, 0x9a9, 0xb2b, 0x10001, 0x2, 0xffffffff}, {0x400, 0x4, 0x6, 0x3, 0x100000, 0x97}, {0x9, 0x3, 0x1f, 0x100000000, 0x2}, {0xb6f, 0x6, 0x4, 0x200, 0x80000000, 0x1}, {0x1, 0x5, 0x100000001, 0x48a4, 0x4, 0x67f7}, {0x4, 0x8, 0x6, 0x1, 0x6}, {0x6, 0x4, 0x4000000000, 0x1, 0x8, 0x7}, {0x280000000, 0x5b, 0x4, 0xd4aa, 0x2, 0x400}, {0x4, 0x10001, 0x8, 0x9, 0x400, 0x5}, {0x70bf, 0x80000000800000, 0x8, 0x7fff, 0x4, 0x4}, {0x3ff, 0xa017, 0x7, 0x9, 0x6, 0x84cd}, {0x1, 0x7, 0x4, 0x1, 0x5, 0x3ff}, {0x200, 0x6000000000000, 0xfff, 0x40000000000, 0x9e, 0x67ad}, {0x3, 0x6, 0x1, 0x8, 0x2, 0x81d6}, {0x8, 0x0, 0x7f, 0x1020000000000, 0x6, 0xffffffffffffffe1}, {0x5, 0x38, 0x89, 0x1, 0x200, 0x1}, {0x1673cabf, 0xfb6, 0xa4fa, 0x0, 0xe8, 0x2}, {0x5, 0xfbc, 0x8, 0xff, 0x8, 0x2}, {0xffffffffffffff3d, 0x7f, 0xfffffffffffffffa, 0x6, 0x7, 0x4f}, {0xab8, 0x7fffffff, 0x6, 0x3, 0x9, 0x4}, {0x10000, 0x8, 0xffffffffffffff06, 0x1, 0x2c3, 0x5}, {0x20, 0x1f, 0x85b, 0x8, 0x7f, 0x100000001}, {0x8000, 0x1, 0x7, 0xe7, 0x401, 0x7fffffff}, {0xc14, 0x3bc4c5e7, 0x7, 0x40, 0x15, 0xfffffffffffffffa}, {0x40, 0x0, 0x3, 0x3800, 0x20}, {0x1, 0x80000001, 0xffffffffffffffc1, 0x7, 0x0, 0x2}, {0x8, 0x0, 0xfffffffffffffffe, 0x3, 0x2, 0x3}, {0xa2, 0x6, 0x2, 0x3, 0x100000001, 0xffffffff}, {0x8, 0x0, 0x9, 0x6, 0x6, 0x4}, {0x2, 0x101, 0x2, 0x2, 0x5, 0x7}, {0x26, 0x4, 0x3, 0x5, 0x4, 0x7f}, {0x7f, 0x5, 0xfffffffffffffffb, 0x6, 0x401, 0x80000000}, {0x3, 0x25e, 0x80000000000000, 0x90, 0x1, 0x7}, {0x10000, 0xda, 0x0, 0x1f, 0x0, 0x7}, {0xfffffffffffffffb, 0x101, 0x7ff, 0x4, 0x2, 0xed92}, {0x5945, 0x1, 0xff, 0x6, 0xe39c, 0x8c}, {0x7ff, 0x6, 0x80000000, 0x800, 0x1f, 0x7}, {0x7, 0xffffffff, 0x3f, 0x3df3, 0xfffffffffffffff9, 0x3}, {0x10001, 0x800, 0x5, 0x7, 0x6, 0x2}, {0xd4, 0x1000, 0xe3, 0x1b, 0x7, 0x1}, {0x1, 0x4, 0x1ff, 0x2, 0x2f32b38}, {0x80000000, 0x4, 0x7, 0xfffffffffffffffa, 0x6, 0xffffffffffffff25}, {0x7, 0x80000001, 0x0, 0x1ff, 0x100000001, 0xfffffffffffffffd}, {0x3, 0x3, 0x163, 0x81, 0x100, 0x7965}, {0x7fffffff, 0x2, 0x69, 0x8, 0x9, 0x2}, {0xa50, 0x8001, 0x100, 0xffffffffffffff7f, 0x7f, 0xffffffffffff8000}, {0xc118, 0x9, 0x4, 0x4c6c, 0x7, 0x2}, {0x6, 0x2, 0x401, 0xfffffffffffffffb, 0x8001, 0x400}, {0x40, 0x7f, 0xffffffff, 0x1, 0x401, 0x9}, {0x3, 0x9, 0x0, 0x1, 0x6, 0x9f}, {0x7, 0x9, 0xcf41, 0x8000, 0x8000, 0x8}, {0xffffffff, 0x5, 0x6, 0x9, 0x2}, {0x8, 0x0, 0x4, 0xffffffffffffffff, 0x7, 0xffffffff}, {0x80000001, 0x10000, 0x7ff, 0x81, 0x9}, {0x9, 0xffffffff, 0x100, 0x1000000000000000, 0xfff, 0x101}, {0x4, 0x4, 0x1, 0x6, 0x6c3, 0x40}, {0x7, 0x3, 0x4, 0x2, 0x7ff, 0x4}, {0x7fffffff, 0x496cf1e1, 0x0, 0x913c, 0x3949, 0x3}, {0x80, 0x5, 0x7ff, 0x5, 0x7, 0x2}, {0x0, 0x5, 0x401, 0x69, 0x7f, 0x400}, {0x6, 0x36fc33e, 0xeb, 0x40, 0xedf, 0x6}, {0x4, 0x8e0, 0xfffffffffffffffd, 0x9, 0x3, 0x9db}, {0x6, 0x6, 0x3, 0x1ff, 0x4}, {0x6d7, 0x1, 0x6, 0x4, 0x400, 0xfff}, {0x0, 0x20, 0x6, 0x3, 0x1}, {0x7ff, 0x7ff8000, 0x7, 0x0, 0x5, 0x5}, {0x267f, 0xf8d, 0x2, 0x7, 0x2, 0x7}, {0x8, 0xc467, 0x81, 0x3}, {0x8, 0x10001, 0x1, 0x3, 0x34570b0a, 0x9}, {0x571d, 0xf23a, 0x1ff, 0x4, 0x10001, 0x9}, {0x4, 0x427, 0x1, 0x9, 0xf8, 0x20}, {0x92, 0x2, 0x1, 0x1, 0x100, 0x1}, {0x3, 0x4, 0xffff, 0x81, 0x8, 0x20}, {0x1, 0x2, 0x0, 0x8000, 0x1ff, 0x6593}, {0x401, 0x1, 0x3380, 0x4, 0x3ff, 0x7}, {0xe0, 0x4, 0xfffffffffffffff8, 0xfffffffffffffffc, 0x3, 0x2}, {0x7, 0x4, 0x4, 0x8, 0x9, 0x8}, {0x8, 0x5, 0x9, 0x1, 0x80000000, 0x2}, {0xffff, 0x20200000000000, 0xfffffffffffffff8, 0x2, 0x54, 0xffff}, {0x4, 0x2, 0x0, 0x7fffffff, 0x53, 0x7}, {0x351c, 0x1, 0x100000000, 0x401, 0x95, 0x7}, {0x165e, 0x2, 0x8, 0x4, 0x81, 0xfffffffffffffffa}, {0x7, 0x4, 0x4e45, 0x0, 0x1, 0x400}, {0x7, 0x20, 0xffff, 0x62, 0x7, 0x2}, {0x3fc000000000000, 0x9, 0x4, 0x17a5, 0x6, 0x1}, {0x6, 0x1ff, 0x1, 0x6, 0x7fffffff, 0x80000000}, {0xc32, 0x9, 0x3831, 0x101, 0x4, 0x1}, {0x1000, 0x4, 0x7, 0x9, 0x2, 0x5}, {0x7f, 0x1, 0x2, 0x1, 0xffffffffffff7fff, 0xd9}, {0x20, 0xe71, 0x8, 0x400, 0x777bbbce, 0x4}, {0x100000000, 0xffff, 0x6, 0xfffffffffffffc01, 0xfffffffffffffffc, 0x7}, {0x1, 0x2, 0x2a89, 0x7ff, 0x3ff, 0x7}, {0xd5, 0x10001, 0xd5, 0xfffffffffffffffa, 0x1, 0x101}, {0x4, 0x10001, 0x1a6e75dd, 0x5, 0x5, 0x3}, {0x6, 0x200, 0x4, 0xfffffffffffffff8, 0x8a0, 0x81}, {0x1, 0xffffffffffffff80, 0xffffffffffff0629, 0x7, 0x6, 0x7}, {0x0, 0x10000, 0x2, 0x69, 0x7, 0x7f}, {0x2, 0x0, 0x100000000, 0x9, 0x1, 0x4}, {0x5ee, 0x8, 0x5, 0x4811, 0x7}, {0x1, 0x1, 0x8, 0xa71, 0x9, 0x4}, {0x0, 0x9, 0x10000, 0x4, 0x2, 0x101}], [{0x7}, {0x7, 0x1}, {0x2, 0x1}, {0x3}, {0x7}, {0x7, 0x1}, {0x2}, {}, {0x3, 0x1}, {0x4}, {0x5}, {0x4}, {0x2, 0x1}, {0x3, 0x1}, {0x3, 0x1}, {0x1, 0x1}, {0x2, 0x1}, {}, {0x3, 0x1}, {0x1}, {0x0, 0x1}, {0x7}, {}, {0x3}, {0x7, 0x1}, {0x5, 0x1}, {0x7}, {0x6, 0x1}, {0x1, 0x1}, {0x7, 0x1}, {0x3}, {0x5}, {0x7, 0x1}, {0x4, 0x1}, {0x5, 0x1}, {0x5, 0x1}, {0x5}, {0x7, 0x1}, {}, {0x5, 0x1}, {0x4, 0x1}, {0x2, 0x1}, {0x3, 0x1}, {0x4}, {0x4, 0x1}, {0x7}, {0x0, 0x1}, {0x2, 0x1}, {0x3, 0x1}, {0x5, 0x1}, {0x2, 0x1}, {0x3, 0x1}, {0x0, 0x1}, {}, {0x1, 0x1}, {0x7, 0x1}, {0x2, 0x1}, {0x5, 0x1}, {0x1, 0x1}, {0x3, 0x1}, {0x3}, {0x5}, {0x2, 0x1}, {0x2, 0x1}, {}, {0x5, 0x1}, {0x1, 0x1}, {0x1}, {0x4}, {0x0, 0x1}, {0x1}, {0x7, 0x1}, {0x1}, {0x5, 0x1}, {0x7, 0x1}, {0x5, 0x1}, {0x4, 0x1}, {0x3}, {0x3, 0x1}, {0x0, 0x1}, {0x5}, {0x1, 0x1}, {0x2}, {0x7, 0x1}, {0x7, 0x1}, {0x7}, {0x0, 0x1}, {0x5, 0x1}, {}, {}, {0x2}, {0x1}, {0x2, 0x1}, {0x1}, {0x2}, {0x4}, {}, {0x5, 0x1}, {0x3, 0x1}, {0x4, 0x1}, {0x2, 0x1}, {0x3}, {0x4, 0x1}, {0x3}, {0x7, 0x1}, {0x1}, {0x7}, {0x1}, {0x0, 0x1}, {0x7, 0x1}, {0x5, 0x1}, {0x1, 0x1}, {0x0, 0x1}, {0x1}, {0x1, 0xb2c092ed86c8bf55}, {0x3, 0x1}, {0x3}, {0x7}, {0x1, 0x1}, {0x2}, {0x1, 0x1}, {0x4}, {0x7, 0x1}, {0x5}, {0x7, 0x1}, {0x4, 0x1}, {0x9c34f8487e482148, 0x1}, {0x1}]}}, @TCA_PEDIT_PARMS_EX={0xe50, 0x4, {{{0x101, 0x3, 0x6, 0xcd, 0xffffffffffffff01}, 0x1c3dd0d5, 0x4, [{0x4000000000, 0x1, 0x7ff, 0x1, 0x400, 0xffffffff}, {0x400, 0x6, 0x9, 0x10ee, 0x0, 0x380000}]}, [{0x20, 0xa8, 0x401, 0x4, 0x0, 0x9f04}, {0x7, 0x80000001, 0x1, 0x5, 0xffffffff, 0x4}, {0x7f, 0x5, 0x5, 0x8, 0xff65, 0x2}, {0x4, 0x7f, 0x10000, 0x0, 0x1ff, 0x1}, {0x3, 0x2ec, 0x5, 0x5, 0x3, 0xa}, {0x1, 0x9, 0xff, 0x35, 0x6, 0x81}, {0x2, 0x40, 0x841, 0x6, 0x400, 0x3ff}, {0x5, 0x1, 0x5, 0x5915, 0x9c, 0x1}, {0x1, 0xfffffffffffffffc, 0x9, 0x7fff, 0x9, 0x7}, {0x20, 0x3, 0x3, 0x6, 0x66, 0x9}, {0x80000001, 0x3, 0x7fff, 0xffffffffffffffff, 0x9, 0x8}, {0x2, 0x3, 0x5, 0x10001, 0x9, 0x2}, {0x1cd, 0x7, 0x7f, 0x8, 0x95, 0x6}, {0x91a, 0x327, 0x6, 0x2, 0xfff}, {0xab, 0xbfd, 0x2, 0x59bb621b, 0x2, 0x8}, {0x328, 0x8, 0x0, 0x1, 0xfffffffffffffff8, 0x2}, {0x5, 0x5, 0x4, 0x3, 0x0, 0x1}, {0x8b, 0xba8, 0x80000000, 0x8000, 0x7f, 0x400}, {0x3, 0x2000000000, 0x800, 0x1f1, 0xc9eb, 0x5}, {0x0, 0x7, 0x1, 0x8, 0x5, 0x9}, {0x8, 0x100000001, 0xfff, 0x2a7d, 0x100000000, 0x28cd}, {0x1f, 0x40, 0x5, 0x1, 0x4, 0x1f}, {0x1, 0x0, 0x1, 0xfffffffffffffffd, 0x7f, 0x400}, {0x80, 0x10000, 0xfffffffffffffb57, 0x0, 0x8, 0x2}, {0x2, 0x2, 0x9, 0x4, 0x40, 0x401}, {0x7, 0x0, 0x1, 0x7, 0x6, 0xfffffffffffffff8}, {0x0, 0x100000001, 0x9, 0x4, 0x6, 0xffff}, {0xb7, 0x7, 0x9, 0xffffffff, 0x6, 0x200}, {0xee, 0x0, 0x9, 0x87d6, 0x100, 0x1ff}, {0x7, 0x100000000, 0xa8, 0x0, 0x80000000, 0x8}, {0x2, 0x3, 0x8, 0x1, 0x9, 0x3}, {0xffffffffffffff7f, 0x200, 0x0, 0x386d4d53, 0x9, 0x5}, {0x4, 0x2, 0x100, 0x9, 0x8, 0x100}, {0x4, 0x6, 0x8001, 0x5, 0x0, 0x9}, {0x0, 0x7f, 0x10000, 0x3, 0x8, 0xb7}, {0x3f, 0x5, 0x6, 0x9, 0xc1c, 0x8}, {0x4, 0x9, 0x0, 0x6, 0x8}, {0xfffffffffffffff9, 0x8, 0x5, 0x1, 0x9d7, 0x5}, {0x3f, 0x82, 0x4, 0x1, 0x9, 0x9}, {0xb284, 0x7, 0x8, 0x800, 0x4, 0x1}, {0x9, 0x7fffffff, 0x0, 0x100000001, 0x0, 0x7}, {0x8, 0x1, 0xa80, 0x9, 0x3ff, 0x5}, {0x4, 0x9, 0x3f59c970, 0xd6fe, 0x2, 0x2}, {0x6, 0x4e000000, 0x1, 0xe12, 0x1ff, 0xf5}, {0x1000, 0x20, 0x1, 0x2, 0x20, 0x9}, {0x1, 0xffff, 0x5, 0x81, 0x7ed7e7ec, 0x8}, {0x4, 0x91b8, 0x100000000, 0x5, 0x5, 0x10001}, {0x8, 0xfffffffffffffff8, 0x100, 0x7ff, 0xffffffff, 0x5}, {0x1ffe000000000, 0x80000000, 0x1, 0x7fffffff, 0x200, 0x1}, {0x80000000, 0x9, 0x3, 0x9, 0x0, 0x2}, {0x5, 0x9581, 0xd8, 0x7f, 0x8000, 0xfffffffff5635f47}, {0x5, 0x81, 0x0, 0x80, 0x4187, 0x81}, {0x9, 0x4, 0x1ff, 0x1000, 0x3732, 0x4}, {0xb43e, 0x8001, 0x1, 0x4, 0x100000001}, {0x101, 0x100, 0x3, 0x9, 0xcffe, 0xfff0}, {0x7, 0x1ff, 0x101, 0x0, 0x553, 0x100}, {0x1, 0xc6, 0x9, 0x6, 0x1, 0xf1}, {0x1, 0x80000000, 0x8000, 0x3, 0x0, 0x2}, {0x20, 0x6, 0x0, 0xfffffffffffffff7, 0xa3e, 0x3}, {0x6, 0x40, 0xac, 0x2, 0x4, 0x5}, {0x34, 0x37, 0x100000001, 0x7, 0x6, 0x401}, {0x7, 0x9, 0x6, 0x6, 0x9, 0x1}, {0xc000000000000000, 0x10000, 0x35bd, 0x4, 0x2, 0x7}, {0x43, 0x3, 0x40, 0x2, 0x3, 0x7}, {0x2, 0x1, 0x0, 0x9, 0x8000, 0x604}, {0x4b, 0x6, 0x43, 0x100000000, 0x7, 0x1}, {0x7, 0x2, 0xe58, 0xffffffffffffff81, 0xfffffffffffffffa, 0x1f}, {0x7ff, 0x9, 0x6, 0x4, 0x3, 0xffff}, {0x0, 0x100000000, 0x80000001, 0x4, 0xffff, 0x4}, {0xffff, 0x2, 0x8001, 0x6, 0x1000, 0x8}, {0xfffffffffffffffe, 0x80000001, 0x3, 0x0, 0x80, 0x40}, {0x6, 0xffffffffffff8001, 0xffffffff7fffffff, 0x0, 0xb9, 0x8}, {0x1fa, 0x100000000, 0xb5, 0x6, 0x3, 0x2d}, {0x278, 0x9, 0x9, 0x2, 0x4, 0x1000}, {0x5, 0x800, 0x6d7e, 0x8, 0x7, 0xffff}, {0x8, 0xffffffffffffffff, 0x9, 0x6, 0x401, 0x1}, {0x1000000000000, 0x6, 0x7b84, 0x3, 0x7b0, 0x400000000000000}, {0x8, 0x2, 0x5, 0x4, 0xf6}, {0x9, 0x0, 0x7fffffff, 0x8, 0x1, 0xc38}, {0x1, 0x80, 0x6, 0x6, 0xffff, 0x5}, {0x5, 0x2, 0x200, 0x1, 0x3, 0xa361}, {0x7, 0x80000000, 0xf340, 0x6, 0xc63, 0x5}, {0x3, 0x1ff, 0x8000000000000, 0x2, 0x9, 0x7}, {0x8, 0xf400, 0x0, 0x400, 0x100, 0x1}, {0x3, 0x5, 0x4d5, 0x2, 0x40, 0x1}, {0xde3, 0x0, 0x3, 0x30, 0x1000, 0x6}, {0x800, 0x6, 0x5, 0x7, 0x1, 0x1000}, {0xb0, 0x4, 0xfffffffffffffffd, 0x81, 0x3, 0xd28}, {0x7fffffff, 0x2000000000, 0xefc7, 0x800, 0x4, 0x6}, {0x7, 0x6, 0x5, 0x2, 0x1, 0x3}, {0x9, 0x0, 0x401, 0x3a9, 0x3, 0x6a8}, {0x6, 0x1, 0x101, 0x9, 0xd57, 0x8}, {0xfff, 0x8, 0x70d5, 0x1, 0x10000, 0x20}, {0x101, 0x3, 0xf0d0, 0xff8, 0xff, 0x3}, {0x5, 0x904, 0x4, 0x4, 0x3ff, 0x48}, {0x4, 0x2, 0x9, 0x5, 0x9, 0x7}, {0x3, 0x1000, 0x5, 0x8, 0x7edf, 0x5}, {0x11, 0x0, 0x8, 0x7, 0x9, 0xcc2}, {0x6, 0xffff, 0x7, 0xfff, 0x3, 0x100000001}, {0x1, 0x4, 0x4fc, 0x1, 0x3f, 0x8}, {0x5, 0x1, 0x6, 0x40000000, 0x1ff, 0x9}, {0xfffffffffffffffb, 0x7, 0x7, 0x3, 0x40, 0x8000}, {0x81, 0x6e9, 0x9, 0x6, 0xffffffff, 0xf8}, {0x0, 0x1ff, 0x7fff, 0x0, 0x1ff, 0x2}, {0x3, 0x100000000000, 0x4, 0x4, 0x0, 0x8}, {0x9, 0x8, 0x2, 0xfffffffffffffffe, 0x8, 0xfffffffffffff001}, {0x6, 0x80000001, 0x6, 0x401, 0x5, 0x50}, {0x2, 0x1, 0x0, 0x5, 0x5, 0x800}, {0x20000, 0x80, 0x2d4, 0x30e, 0xfffffffffffff707, 0x3ff}, {0x3ff, 0xea01, 0xcb3, 0xd14, 0x6, 0x3}, {0x100000000, 0x6, 0x7, 0x8001, 0xffffffffffffa7b4, 0x1000}, {0x7fff, 0x2, 0x7, 0x9, 0x95c, 0xffffffff}, {0x7, 0x46c, 0x101, 0x9, 0x401, 0x6}, {0xfffffffffffffff7, 0x473699c6, 0x1, 0x1, 0x5, 0x5}, {0x7, 0x9, 0xffffffffffffffc1, 0x9, 0xc0b, 0x3}, {0x1, 0x53, 0x64b9, 0x7, 0x800, 0x5}, {0x8, 0x2, 0x7, 0x1, 0x2, 0x5}, {0x766e, 0xab, 0x0, 0x908, 0x3ff, 0x6a}, {0x9, 0x1, 0x1ff, 0x3, 0x8, 0x115e9be8}, {0x5a85, 0x3, 0x10000, 0x0, 0x11, 0x3fe00}, {0x9, 0x0, 0x8, 0x6, 0x8, 0x9}, {0x572, 0xffff, 0x9, 0x1f, 0x1, 0xb46}, {0x0, 0x7f, 0xd91, 0x10000, 0x6, 0x20}, {0x3, 0x9, 0x0, 0xffffffff, 0x4, 0x1db}, {0x7ce, 0x8, 0x0, 0x7ff, 0x3f, 0x5}, {0x3, 0x5, 0x4, 0x777, 0xffff, 0x2}, {0x3, 0x101, 0x8, 0x7, 0x1f, 0x7}, {0x6, 0x6, 0x5ffb, 0x3, 0x7, 0x8}], [{0x3}, {0x3, 0x1}, {0x1}, {}, {0x5}, {0x2, 0x1}, {0x5}, {0x3}, {0x7}, {0x3, 0x1}, {0x7, 0x1}, {0x0, 0x1}, {0x1}, {0x0, 0x1}, {0x0, 0x1}, {0x7, 0x1}, {0x3}, {0x7, 0x1}, {0x2, 0x1}, {0x0, 0x1}, {}, {0x7}, {0x3, 0x1}, {0x2, 0x1}, {0x1}, {0x1, 0x1}, {0x3, 0x1}, {}, {0x3, 0x1}, {0x3}, {0x3, 0x1}, {0x2}, {0x5}, {0x1, 0x1}, {}, {0x4, 0x1}, {0x1, 0x1}, {0x5}, {0x1}, {0x5}, {}, {0x7, 0x1}, {0x7, 0x1}, {0x3, 0x1}, {0x3, 0x1}, {0x7, 0x1}, {0x3, 0x1}, {0x7, 0x1}, {0x4, 0x1}, {0x7, 0x1}, {0x3, 0x1}, {0x3, 0x1}, {0x3, 0x1}, {0x2, 0x1}, {0x7, 0x1}, {0x2, 0x1}, {0x7, 0x1}, {0x5}, {0x7}, {0x2, 0x1}, {0x5}, {0x5, 0x1}, {}, {0x3, 0x1}, {}, {0x3}, {0x0, 0x1}, {0x3}, {}, {0x3}, {0x3, 0x1}, {0x0, 0x1}, {0x0, 0x1}, {0x4}, {0x4, 0x1}, {0x2}, {0x1, 0x1}, {0x6, 0x1}, {0x5, 0x1}, {0x5, 0x1}, {0x2, 0x1}, {0x0, 0x1}, {0x1, 0x1}, {0x4, 0x1}, {0x0, 0x1}, {0x5, 0x1}, {0x3, 0x1}, {0x7}, {0x5}, {}, {0x3, 0x1}, {0x5}, {0x5}, {0x3, 0xbc425cc3fe5698f6}, {0x3, 0x1}, {0x2}, {0x5, 0x1}, {0x5}, {0x4}, {0x5}, {0x2, 0x1}, {0x3, 0x1}, {}, {}, {0x5}, {0x1, 0x1}, {0x2}, {0x3, 0x1}, {}, {}, {0x5, 0x1}, {0x5}, {0x1, 0x1}, {0x7, 0x1}, {0x5, 0x1}, {0x4}, {0x5, 0x1}, {0x7, 0x1}, {0x4}, {0x6, 0x1}, {0x0, 0x1}, {0x0, 0x1}, {0x3, 0x1}, {0x3, 0x1}, {0x5, 0x1}, {0x5, 0xc7fec0ae694d002e}, {0x3, 0x1}, {0x5, 0x1}]}}, @TCA_PEDIT_PARMS_EX={0xe38, 0x4, {{{0xfff, 0x10000, 0x4, 0x8, 0x6797}, 0x5, 0x5, [{0xa4, 0x0, 0x0, 0xc90, 0xb78, 0x4}]}, [{0x6, 0xe01, 0x4, 0x52, 0x0, 0x2}, {0xdf, 0xffffffffffff7fff, 0x8, 0xfffffffffffffffe, 0x4, 0x1521c0000000000}, {0x800, 0x4, 0x3b, 0x8, 0x3, 0x3800000000000000}, {0x5, 0x7fff, 0xff, 0x93dc, 0x80000000, 0xfffffffffffffe00}, {0x7, 0x7c84, 0x7fffffff, 0x7, 0x4, 0xbc2f}, {0x4, 0x9, 0x5, 0x6, 0x0, 0x25cbf402}, {0x1000, 0x4, 0x1, 0xfffffffffffffe01, 0x80, 0x7f}, {0x101, 0x10001, 0x55f5, 0x2, 0x3, 0x9}, {0x3, 0x0, 0x8000, 0x9, 0x8, 0x6}, {0x3, 0xc8, 0x8, 0x6, 0x0, 0xffff}, {0x7ff, 0x1, 0x6, 0x4, 0x5, 0x2e}, {0x1, 0x7, 0x5, 0x3ff, 0x10001, 0x8}, {0xfff, 0xe0, 0x4, 0x48, 0xfffffffffffffffd, 0x7}, {0x0, 0x5, 0x5432, 0x100000001, 0x76, 0x878}, {0x2, 0x5, 0x0, 0x6, 0x6, 0x1}, {0x0, 0xfff, 0x10000, 0x7, 0x20, 0x2}, {0x3, 0x5, 0x80000000, 0x7fff, 0xffffffff, 0x7ff}, {0x6, 0x2, 0x3, 0x7ff, 0x8, 0x2}, {0x8, 0xad4, 0x7, 0x3, 0x100000001, 0x2}, {0x9, 0x3, 0x7, 0x610, 0xfffffffffffffff9, 0x4}, {0x5ca, 0x20, 0x7fffffff, 0x100000001, 0x3, 0x20000000}, {0x442e, 0x0, 0x20, 0x46, 0x4, 0x4}, {0x84, 0x100000001, 0x8, 0x9, 0x401, 0x1}, {0x9, 0x10001, 0xfffffffffffffffb, 0x0, 0xffffffffffff2671, 0x800}, {0xff, 0x7, 0x1, 0x0, 0x7}, {0x7, 0x1d, 0x80, 0x0, 0x200, 0x7}, {0x2, 0x5, 0x6d, 0x3, 0x7fffffff, 0xb9}, {0x7ff, 0x5c2, 0x8, 0x55c, 0x1, 0x1}, {0x0, 0x0, 0x2, 0x6, 0x200, 0x282a}, {0x0, 0x8, 0x401, 0xffffffff7fffffff, 0x10001, 0x2}, {0x401, 0x5, 0x2, 0x2, 0xc3b, 0xffffffffffffffff}, {0x2, 0x1, 0x3ff, 0x3ff, 0x3, 0x2}, {0x0, 0x3, 0x1ff, 0x2909, 0x4, 0x8001}, {0x5, 0x1000, 0x6, 0x1b6, 0x9, 0x401}, {0x2, 0x32c5, 0x8001, 0xd39, 0x8, 0x8}, {0x6, 0x3, 0x7, 0x0, 0x101, 0x9}, {0x33, 0x3, 0x6, 0xfd5, 0x8000000000, 0x7ff}, {0x30f, 0x7, 0xbf, 0x3, 0x9, 0xff}, {0x5, 0x6, 0x7, 0x1, 0x5, 0xffffffffffffbbb8}, {0x7fff, 0xfffffffffffffff7, 0x9, 0x3, 0x800, 0x200}, {0x8001, 0x6, 0xef, 0x7ff, 0x94b, 0x2}, {0xcb, 0x7fffffff, 0x7fff, 0x200, 0x8, 0x5}, {0x1, 0x800, 0x80000001, 0x7ff, 0x7, 0x3ff}, {0x101, 0x2, 0x5, 0x328, 0xffffffffc3147a35, 0x3}, {0xffffffff, 0x401, 0x2, 0x0, 0x9, 0x5ea}, {0x3, 0x1, 0x8001, 0x20, 0x8000, 0x5}, {0x4, 0x95, 0x4, 0x2, 0x3d9, 0x88b}, {0x1, 0x5, 0x4, 0x8, 0x8, 0x6}, {0x8, 0x8001, 0x53, 0x400000000000, 0xfff, 0x8}, {0xffffffffffffffe1, 0x1, 0x6, 0xfffffffffffff704, 0x1f79, 0x3ff}, {0x0, 0x400, 0x2, 0xfff, 0x6, 0x8b0}, {0x4, 0x9, 0x9, 0x4, 0x0, 0x8}, {0x4, 0x3, 0x7, 0x7cd9, 0xfffffffffffff000, 0x5}, {0x100, 0x101, 0xc686, 0x89, 0x5, 0x3}, {0x7f, 0x1, 0x10001, 0x47, 0x201f4986, 0x2ae}, {0x3, 0x6, 0x7, 0x7, 0xff, 0x8}, {0x9, 0x6, 0x7fffffff, 0xfffffffffffffffb, 0x4, 0x5}, {0x2, 0xe9, 0x3, 0x5b6e, 0x3ff, 0x100}, {0x3, 0x5, 0xf6e, 0x80000000, 0x443c, 0x2}, {0x4, 0x7ff, 0x2, 0x0, 0x2, 0x1}, {0x6, 0x6, 0x0, 0x3, 0x8, 0x20000000000000}, {0x68f, 0xffff, 0x6, 0x4, 0x7, 0x8}, {0x40, 0x4, 0x3, 0x7, 0x200, 0x18}, {0x5, 0x9, 0x3, 0x9910, 0x3, 0x1}, {0x3, 0x9, 0x243b, 0x9, 0x8, 0x98d}, {0xa3f, 0x8000, 0x24, 0x9, 0x3ff, 0x8}, {0x25, 0x7f, 0x80000000, 0x4, 0xfffffffffffffffd, 0x7fff000}, {0x4, 0x3, 0x6, 0x2, 0x5, 0x6}, {0x80, 0x101, 0x10000000000, 0x9c, 0x1000, 0x3}, {0x8, 0x0, 0x8001, 0x1ff, 0xbc, 0x9}, {0x8, 0x3, 0x7, 0x2, 0x0, 0x1}, {0x3, 0x7, 0xdb, 0x7fffffff, 0xfffffffffffff4bd, 0x3}, {0x3, 0x2, 0x5, 0x6e3, 0xff, 0x5}, {0x7fffffff, 0x9, 0x8, 0x80, 0x0, 0x6546fa94}, {0x9, 0x3ff, 0x1000, 0x0, 0xba00000000000000, 0x7}, {0xfffffffffffffffc, 0x8, 0x0, 0xe93, 0x8, 0x100020000}, {0x1, 0xffffffffffffff23, 0x0, 0x6, 0x1, 0x5}, {0x4, 0x20, 0xffffffffffffca31, 0x7, 0x0, 0xcb}, {0x41, 0x401, 0x80000000, 0x6, 0x0, 0xbb}, {0xaa, 0x8eaa, 0x1ff, 0xed, 0x2, 0x1}, {0x4, 0x4, 0xe3, 0xfffffffffffffff7, 0x2, 0x2}, {0x7, 0x1, 0x80000000, 0x9, 0x5bfe9c1d, 0xba7}, {0x1, 0x7, 0x7f, 0x4, 0x7bd46d22, 0x5}, {0x81, 0x786, 0x200, 0x8, 0x2, 0x8}, {0x95, 0x584e, 0x887d, 0x3, 0xf01, 0x4fdb}, {0x9, 0x860, 0x100000001, 0x2, 0x9}, {0x3, 0x9, 0xa00000, 0x7f, 0x9, 0x80000001}, {0xffffffff, 0xffffffff, 0x0, 0x5, 0x5, 0x7ff}, {0x1f, 0x30, 0x6, 0x101, 0x3f, 0x100000000}, {0x80000001, 0x8, 0x9, 0x7f, 0x0, 0x1}, {0x80, 0x20, 0x8001, 0x10000, 0x1, 0x2}, {0xffffffffffffffca, 0x1, 0x6, 0x3, 0x9e2}, {0x401, 0x7, 0x80000001, 0x9, 0x1000, 0x10001}, {0x4, 0x9, 0x8, 0xfff, 0x1, 0x4}, {0x8, 0x100000000, 0x10000, 0x1, 0x100000000, 0x3}, {0xa85412d, 0x3, 0x40, 0x1c000000000, 0x3, 0xfff}, {0x9, 0x5, 0x7fffffff, 0x10000, 0x3, 0x2}, {0x8, 0x9, 0x6, 0x9, 0xef2, 0x81}, {0x0, 0x279, 0x9, 0x3, 0x0, 0x4}, {0x6cc000000000000, 0x8, 0x1, 0x1f, 0x401, 0x1}, {0x100, 0x10001, 0x2, 0x9, 0x2, 0x8000}, {0x2, 0x400, 0x2, 0xd0, 0x0, 0x6}, {0x100000001, 0x0, 0x6, 0x9, 0x9, 0x4}, {0x6, 0x11c, 0x2, 0x100, 0x20, 0xe77}, {0x4, 0x7fffffff, 0x8, 0x140000000000000, 0xffffffffffff0001, 0xfffffffffffffffe}, {0x3f, 0x2, 0x24e, 0x1, 0x6, 0x7}, {0x7, 0x20, 0x7, 0x9, 0x100000001}, {0x2d, 0x80000001, 0x8000, 0x80, 0x1ff, 0x9}, {0x10000, 0xb, 0xfff, 0x6, 0x1, 0x2}, {0x8, 0x7, 0xc7, 0x6, 0x4, 0x1}, {0x1, 0x4, 0x7f, 0x100000000, 0x1, 0x10001}, {0x3, 0x4, 0x7, 0x2, 0xffffffffffffffc0, 0x100}, {0x90, 0x10001, 0x2, 0x99, 0x5, 0x8}, {0x34, 0x1, 0x5, 0x0, 0x5, 0x5}, {0x3, 0x200, 0xffffffffb8ade1ce, 0x101, 0x4, 0x400}, {0x3, 0x7f, 0x80, 0x6, 0x5, 0x6}, {0x0, 0x7f, 0x9, 0x7, 0x4, 0x20}, {0x3, 0x17, 0xffff, 0x9, 0x9, 0x18}, {0x73, 0x8, 0x68, 0x7, 0x9, 0x5}, {0x3f, 0x6, 0x8, 0xfffffffffffff85e, 0x3, 0x7fff}, {0x5, 0x3ff, 0x400, 0x200, 0x285, 0x8001}, {0x80000001, 0xb8, 0x7, 0x543d, 0x0, 0x8}, {0x6, 0x23, 0xaa6, 0x6, 0x2, 0x5}, {0x6000000, 0xcf, 0x9, 0xfffffffffffffff8, 0x81}, {0x1, 0x9, 0x7fff, 0x0, 0x7ff, 0x5}, {0x20, 0x4, 0x5, 0x9, 0x0, 0x100000000}, {0xffffffff, 0x9c73, 0x6, 0x19, 0x7fffffff, 0x6}, {0x1f, 0x3, 0x8, 0x1, 0xea, 0xffffffffffffffff}], [{0x3}, {0x4, 0x2e01b0b90055adc}, {0x3, 0x1}, {0x0, 0x1}, {0x3}, {0x7, 0x1}, {0x2, 0x1}, {0x2, 0x1}, {0x7}, {0x0, 0x1}, {0x0, 0xc1f4ea8ba3e97bbc}, {0x3, 0x1}, {0x2, 0x1}, {0x0, 0x1}, {0x5, 0x1}, {0x5, 0x1}, {0x0, 0x1}, {0x3, 0x1}, {0x4}, {0x3, 0x1}, {0x4, 0x73de71e67bed1a8f}, {0x3}, {0x3}, {0x2}, {0x1, 0x1}, {0x5}, {0x1}, {0x1, 0x1}, {0x4, 0x1}, {0x3, 0x1}, {0x7, 0x1}, {0x2}, {0x1, 0x1}, {0x4}, {0x2, 0x1}, {0x3}, {0x0, 0x1}, {0x3, 0x1}, {0x3, 0x1}, {0x5, 0x1}, {0x7}, {0x5, 0x1}, {}, {0x5, 0x1}, {0x0, 0x1}, {0x7}, {0x4}, {}, {0x0, 0x1}, {0x1, 0x1}, {0x7}, {0x4, 0x1}, {0x4, 0x1}, {0x5, 0x1}, {0x2, 0x1}, {0x0, 0x1}, {0x1, 0x1}, {0x5}, {0x2, 0x1}, {0x5, 0x1}, {0x2, 0x1}, {0x3, 0x1}, {0x3, 0x1}, {0x7, 0x1}, {0x3, 0x1}, {0x0, 0x1}, {}, {0x5}, {0x4, 0x1}, {0x5, 0x1}, {0x3, 0x1}, {0x5, 0x1}, {0x7, 0x1}, {0x3}, {0x3}, {0x5, 0x1}, {0x2}, {0x0, 0x1}, {0x1, 0x1}, {0x2, 0x1}, {0x0, 0x1}, {0x6}, {0x5}, {0x0, 0x1}, {0x5, 0x1}, {0x5, 0x1}, {0x0, 0x1}, {0x3, 0x1}, {0x3, 0x1}, {0x1}, {0x5}, {0x7, 0x1}, {0x3}, {0x4, 0x1}, {0x0, 0x1}, {0x2, 0x1}, {0x3, 0x1}, {0x1, 0x1}, {0x2, 0x1}, {0x7}, {0x7}, {0x2}, {0x7}, {0x1, 0x1}, {0x4, 0x1}, {0x5}, {0x0, 0x1}, {}, {0x4}, {0x5, 0x1}, {0x7}, {0x1}, {0x3}, {0x0, 0x1}, {0x3, 0x1}, {}, {0x1, 0x1}, {0x7, 0x1}, {0x6}, {0x0, 0x1}, {0x3, 0x1}, {0x2, 0x1}, {0x2, 0x1}, {0x4}, {0x5, 0x1}, {0x5, 0x1}, {0x5, 0x1}, {0x0, 0x1}], 0x1}}, @TCA_PEDIT_PARMS={0xef8, 0x2, {{{0x3, 0x1c1e, 0x7, 0x8, 0x800}, 0x400, 0x200, [{0x3, 0x100000001, 0x400, 0x101, 0x1, 0x7}, {0x2, 0x5, 0x3, 0xffffffff, 0x6, 0x9}, {0xce6, 0x9e, 0x8, 0x5, 0x3, 0xdb}, {0x200, 0xffffffffffffffe0, 0xfffffffffffffff9, 0x9, 0xfffffffffffff000, 0x1}, {0x7fff, 0xcc1d, 0x40a2, 0x0, 0x19a, 0x8}, {0x2, 0x81, 0x6, 0x5, 0xffffffffffffffff, 0x400}, {0x8, 0x7, 0x2, 0x7, 0x40, 0x3ff}, {0x4, 0x8, 0x1, 0x9, 0x0, 0x6}, {0xfffffffffffffffa, 0x1, 0x9, 0x400, 0x5, 0x8}]}, [{0x1000, 0xfffffffffffffff8, 0x7, 0x5, 0x80, 0x100}, {0x0, 0x3, 0x7fffffff, 0x4, 0x40, 0x7ff}, {0x2c90, 0x3ff, 0xa0f, 0x8b84, 0x4, 0x6653}, {0x3, 0x558, 0x5, 0x8, 0x400, 0x32}, {0x7fa, 0x97, 0xffff, 0x7fff, 0x3f, 0x5}, {0x7f, 0x2, 0x4, 0x5, 0x6, 0x4}, {0x8, 0xffff, 0x800, 0x7, 0x3ff, 0x100000001}, {0x8001, 0xda, 0xfffffffffffffff9, 0xffffffff, 0x2, 0x1}, {0x7, 0x6, 0x8, 0x0, 0x1, 0x3f}, {0x40, 0x1, 0x2, 0xffff, 0x3ff, 0x8}, {0x5f6, 0x9, 0xfffffffffffff000, 0x7, 0x73, 0x9}, {0x3, 0x0, 0x3f, 0xffff, 0x41002a6d, 0x800}, {0x4, 0x3, 0x1, 0xb49, 0x84, 0x2}, {0x9, 0x7, 0x8001, 0xfffffffffffffff8, 0x3f, 0x2}, {0x2, 0x69a, 0xffff, 0xfff, 0x6, 0xfffffffffffffffb}, {0x1ff, 0x3b, 0x5, 0x4, 0x5, 0xd6a}, {0xfffffffffffffff8, 0x9, 0x1, 0xb145, 0x8001, 0x6}, {0x1, 0x101, 0x4, 0x1, 0xe01f, 0x2a2}, {0x0, 0x20, 0x4, 0x4, 0x4b, 0x7}, {0x4, 0xf7, 0x8, 0x1000, 0x7ff, 0x5}, {0xffffffff, 0x3, 0x2, 0x7f, 0x7, 0x2}, {0x401, 0x3b4, 0x6, 0x7025, 0x930, 0x1}, {0x5, 0x1ff, 0x7fff, 0x0, 0x4, 0x4}, {0x9, 0x19, 0x1e3, 0x9, 0x0, 0x81}, {0x10000, 0x1ff, 0x8000, 0x8000000, 0x3}, {0x80, 0x4, 0x3, 0xffffffffffffff01, 0x3, 0x2}, {0x6, 0x379, 0x1ff, 0x0, 0x0, 0x4}, {0x1, 0x3, 0x2, 0x0, 0x1, 0x6c85}, {0x9, 0x401, 0xffffffffffffffea, 0x6, 0xffffffff7fffffff, 0x1a2}, {0x3, 0x200, 0x118, 0x0, 0x4, 0x7f}, {0x81d, 0x9, 0x0, 0x2, 0x5, 0xffffffff}, {0x7, 0x6f6, 0x100000000000, 0xffff, 0x44d, 0x100000001}, {0x5, 0x2b, 0x7ff, 0xbcc, 0x4, 0x1}, {0xa891, 0x401, 0x9, 0x5, 0xfff, 0x9}, {0x2, 0xffffffff, 0x2, 0x4, 0x101, 0x40}, {0x5, 0xd53, 0x7fffffff, 0x8, 0x8, 0x4}, {0x100, 0x1, 0x514, 0x5, 0x9, 0x4}, {0xc389, 0x7, 0x8, 0x6, 0x8958, 0x1f}, {0x7ff, 0x1, 0x4b4d94c0, 0x7, 0x1, 0x1}, {0x6, 0x3f, 0x4, 0x0, 0x1, 0x4}, {0x1, 0x77, 0x5, 0x6, 0x813, 0x900}, {0xbcc6, 0x2, 0x2, 0xffffffffffffffff, 0xfffffffffffff000, 0x7}, {0x4, 0xffff, 0x8, 0x7f, 0x7, 0x80000000}, {0x0, 0x3, 0x4f, 0x8001, 0xffffffffffffffff, 0x4}, {0x4, 0x0, 0x24b, 0x35, 0x3, 0x6}, {0x8d, 0x6, 0x2b, 0x4, 0x1, 0x2}, {0x3, 0x5, 0x6, 0x2, 0x5, 0x7a6}, {0xfffffffffffffffb, 0x6, 0x80000000, 0xfffffffffffffffe, 0xe80, 0x7}, {0x1000, 0x9, 0xa0, 0x7, 0x100, 0x80000000}, {0x1, 0x1ff, 0x4, 0xa4, 0xcd7, 0x5}, {0xd6f, 0xffffffffffff8000, 0x6, 0xc5e3, 0x400, 0x1}, {0x20, 0x0, 0x0, 0x40, 0x21, 0x1}, {0x6, 0x40, 0x80000000, 0x3, 0x1000, 0x461}, {0x2, 0x400, 0x4, 0x1, 0x3ff, 0x5}, {0x80, 0x7, 0xb9, 0x8, 0x9}, {0x7ff, 0x1, 0x6, 0x4b, 0x1}, {0x6, 0xff, 0x100000001, 0x1000, 0x10000, 0x9}, {0x8, 0x6, 0x6, 0x3, 0x7ff, 0x5}, {0x4, 0x7ff, 0x4, 0x8, 0x200, 0x5}, {0x3, 0x2, 0x0, 0x6, 0x4, 0x4}, {0x1, 0x9, 0xabd6, 0x8000, 0x1, 0x200}, {0x8, 0x81, 0x5, 0xff, 0x9, 0x1a}, {0x10000, 0xffffffffffffffe0, 0x6, 0x6, 0x8, 0x9}, {0xfffffffffffffe00, 0x101, 0x9, 0x4, 0x1380, 0x80000000}, {0x8001, 0x8, 0xae88, 0x6, 0xfef5, 0x1ff}, {0x9, 0x81, 0x3, 0x20, 0xbc, 0x200}, {0x56, 0xffffffff00000000, 0x3d29, 0x8001, 0x7, 0x6}, {0x3, 0x81, 0x3, 0x5, 0x2}, {0x0, 0xffff, 0x8000, 0x74, 0x10001, 0x6}, {0x10000, 0x6050, 0x0, 0x0, 0x6, 0x9}, {0x4, 0x2441, 0x4, 0xff, 0x1, 0x3}, {0x7fff, 0x5, 0x3, 0x4, 0xffff, 0x7}, {0xb09f, 0x8c, 0xa699, 0x800, 0x120000}, {0x7, 0x7, 0x5, 0x100000001, 0x6, 0x7fff}, {0x7, 0x3, 0x1f, 0x4, 0xfffffffffffffff7, 0xfffffffffffffffb}, {0x5, 0x40, 0x8, 0xffffffffffffffff, 0x7, 0x81}, {0x7, 0x80000001, 0x8, 0x2, 0x8, 0x3}, {0x6, 0xa6, 0x3, 0x3ff, 0x8001, 0x101}, {0xe9d, 0x9, 0x8000, 0x20, 0x0, 0x80000001}, {0x7, 0xe4, 0x3, 0xb0eb, 0xfffffffffffffff9, 0x8}, {0xff, 0x5, 0x0, 0x3, 0xfffffffffffffff9, 0xfffffffffffffff9}, {0x1, 0x3f, 0x2, 0x5, 0x12f3c6ca, 0x3}, {0x9, 0x800, 0x0, 0x80000000, 0xfa6, 0x200}, {0x60c4, 0x8a3, 0x800, 0x40, 0x6e, 0xc6}, {0x3ff, 0x2, 0x7, 0x8, 0x9, 0x7fffffff}, {0x80000000, 0x4df, 0x0, 0x7fff, 0x1f, 0x2}, {0xda, 0x7, 0x3, 0x3, 0x80000001, 0x101}, {0x2, 0x101, 0x7a, 0x100, 0x6, 0x2}, {0x9, 0xfffffffffffffffc, 0x1ff, 0x7, 0xff, 0x3ff}, {0x2, 0x8, 0x8, 0x2, 0x1ff, 0xfff}, {0xae, 0xff, 0x0, 0xffffffff, 0x9, 0x6ab8}, {0xfff, 0x9e3, 0x1, 0x9, 0x6, 0xfff}, {0x4, 0xffff, 0x400, 0xa9e, 0x20, 0x5}, {0x1, 0x5, 0x3, 0x400, 0x7, 0x3}, {0x8, 0x1000, 0x2, 0x7, 0x6, 0x1}, {0x7, 0xfffffffffffffffa, 0x4, 0x1, 0x0, 0x7}, {0x10001, 0xf41d, 0xe3a, 0x6, 0x80000000, 0x1}, {0x1fc000000000, 0x7, 0xf3f, 0x1, 0x1f, 0x8}, {0x6fa00000, 0x3, 0x1f, 0x7, 0x6, 0xffff}, {0x4, 0x2, 0xd8, 0x41b3, 0x8, 0x8}, {0x0, 0x1bf, 0x400, 0xfffffffffffffffa, 0x0, 0x6}, {0x8, 0x5, 0x8, 0x1, 0xd9, 0x4}, {0x7, 0x7ff, 0x1, 0x7fff, 0x2, 0xff}, {0x20, 0x6, 0x0, 0x1646, 0x7, 0x3f}, {0x0, 0x0, 0x200, 0x1, 0xff, 0x10000}, {0x3, 0x5, 0x1, 0x10000, 0x4, 0x7fffffff}, {0x6, 0x2, 0xfffffffffffffffa, 0x2562, 0x7, 0xcf82}, {0x677bbca4, 0x4d0, 0x2, 0x5, 0xe29b, 0x7f}, {0x0, 0x9, 0x3, 0x7, 0x2, 0x7ff}, {0x5, 0x0, 0x5, 0x7, 0x7, 0x200}, {0x1, 0x10000, 0x3, 0x6, 0x20, 0xb0c}, {0xffffffffffffff81, 0x2, 0x1, 0x20, 0x0, 0x5}, {0x80000000, 0x10000, 0x7, 0x9, 0x9, 0x6}, {0x3, 0x3, 0x1, 0x9edc, 0x2}, {0x6, 0x8, 0x3, 0x8000, 0x1, 0xad}, {0x3, 0x8, 0xffffffff, 0x7ec, 0x2}, {0x2, 0x1f, 0x2f8c0449, 0x7, 0x9, 0x2000000000000000}, {0xfffffffffffffff8, 0x61, 0x9f1e, 0x3, 0xfffffffffffffffe, 0x7fff}, {0x1, 0xe8ee, 0x0, 0x9, 0xa5, 0xffffffff}, {0x8000, 0x3, 0x7c5e700d, 0x0, 0x24, 0x3}, {0xc2, 0x0, 0x4c, 0x2, 0x4a, 0xffffffffffffff01}, {0x70, 0x26800000000000, 0x1d, 0x3136, 0x4, 0xfffffffffffffc00}, {0x3, 0x80, 0xffffffffffffffff, 0x8, 0x3e03, 0x3}, {0x3, 0x1a55, 0x3, 0x10001, 0x5, 0x80000001}, {0x8, 0x5, 0x3f, 0x5, 0x4dbe00, 0x7}, {0x5, 0x7, 0x0, 0xcf, 0x6, 0x6}, {0x7ff, 0xfff, 0xfffffffffffffff9, 0xfff, 0x9, 0xfffffffffffffffe}, {0x1, 0x80000001, 0x5c, 0x81, 0x3, 0x9}], [{0x3, 0x1}, {0x4}, {0x0, 0x1}, {0x3}, {0x3, 0x1}, {0x2}, {0x0, 0xd2931c6e2274671}, {0x5, 0x1}, {0x2}, {0x5}, {0x1, 0x1}, {0x0, 0x1}, {0x5}, {0x3, 0x1}, {0x7}, {0x0, 0x1}, {0x3, 0x1}, {0x0, 0x1}, {0x7}, {0x5}, {0x7}, {0x1}, {0x7, 0x1}, {0x5, 0x1}, {0x0, 0x1}, {0x1}, {0x3, 0x1}, {}, {0x5, 0x1}, {0x3, 0x1}, {0x5, 0x1}, {}, {0x2}, {0x699db5a7c3068708, 0x1}, {0x2, 0x1}, {0x1}, {0x3, 0x1}, {0x4}, {0x5}, {0x0, 0x1}, {0x4}, {0x0, 0x1}, {0x2}, {0x5}, {0x2, 0x1}, {0x4, 0x1}, {0x0, 0x1}, {}, {0x1, 0x1}, {0x5}, {0x7, 0x1}, {0x3, 0x1}, {0x5}, {0x2}, {0x5}, {0x1, 0x1}, {0x4}, {0x1}, {0x5, 0x1}, {0x5}, {0x7, 0x1}, {0x5, 0x1}, {0x0, 0x1}, {0x5, 0x1}, {0x3, 0x1}, {}, {0x0, 0x1}, {0x5}, {0x3}, {}, {0x0, 0x1}, {0x4}, {0x0, 0x1}, {0x2, 0x1}, {}, {}, {}, {0x3}, {0x7, 0x1}, {0x0, 0x1}, {0x3, 0x1}, {0x2, 0x1}, {0x5, 0x1}, {0x2}, {0x7, 0x1}, {0x7}, {0x1, 0x1}, {0x1, 0x1}, {0x8ac0131248f9e5dc}, {0x3, 0x1}, {0x4}, {0x3, 0x1}, {0x4, 0x1}, {0x4}, {0x3, 0x1}, {0x3}, {0x1, 0x1}, {0x3, 0x1}, {0x7}, {0x1, 0x1}, {0x2, 0x1}, {}, {0x7, 0x1}, {0x0, 0x1}, {0x5, 0x1}, {0x3, 0x1}, {0x7, 0x1}, {0x5, 0x1}, {0x3}, {0x5}, {0x5}, {0x5}, {0x1, 0x1}, {}, {0x1, 0x1}, {0x4, 0x1}, {0x7, 0x1}, {0x2}, {0x7, 0x1}, {0x7}, {0x7, 0x1}, {0x1, 0x1}, {0x7, 0x1}, {0x4, 0x1}, {0x5, 0x1}, {}, {}, {0x0, 0x1}], 0x1}}, @TCA_PEDIT_PARMS={0xec8, 0x2, {{{0x0, 0x80000000, 0x8, 0x5, 0x3}, 0x4, 0x3f0c, [{0x81, 0x3700000000, 0x9d9, 0x1, 0x400, 0x81}, {0xffff, 0x8, 0x401, 0x3, 0x7, 0x80000001}, {0x1, 0x3f, 0x7ff, 0x1, 0x0, 0x1ff}, {0x9e, 0x9, 0x2189, 0x6, 0xff, 0x1ff}, {0x2, 0x4, 0x1d1, 0x7, 0x8, 0x800}, {0x8, 0xfff, 0x2, 0x101, 0x8, 0x7}, {0x3251, 0x4, 0x4, 0x9, 0xffffffffffffffc0, 0x6}]}, [{0x7ff000000000, 0xfff, 0xffffffffffffff01, 0x80000001, 0x7fff, 0x100}, {0x7fff, 0x2, 0x3, 0x1, 0x9, 0x2}, {0x6, 0x80000000, 0xa404, 0x100000001, 0x3ff, 0x3}, {0x0, 0x5, 0x0, 0x2749, 0x1, 0x7f}, {0x200, 0x2, 0x1, 0xd51d, 0xa46a, 0x9}, {0x9, 0x97, 0x5, 0x80, 0x1, 0x9d59}, {0x8, 0x4000000000000000, 0x5, 0x9c, 0x6, 0xfffffffffffffffd}, {0x401, 0x3, 0x100, 0xfffffffffffffffc, 0x4, 0x246dea25}, {0x9, 0x9, 0x4, 0x6, 0x7, 0x100000000000000}, {0x7f, 0x10000, 0x8, 0x9, 0x5, 0x7}, {0xff, 0x800, 0x20, 0x7, 0x8, 0x5}, {0x5, 0x2, 0x414, 0x200, 0x2bbf, 0x7fffffff}, {0x2c7c, 0x6, 0x4, 0xfffffffffffffffd, 0xbd, 0x7ff}, {0x3, 0x8, 0x5e93, 0x6d, 0xd7, 0x7}, {0x5, 0x0, 0x513, 0x0, 0xe32, 0x2}, {0x6, 0x100000000, 0x5, 0x2, 0xb2, 0xfff}, {0x401, 0x7, 0x5, 0xfffffffffffffbff, 0x10b79a87, 0xfff}, {0x1, 0x3, 0x8, 0x4, 0x3, 0xffffffffffffffe1}, {0x5, 0xa8d6, 0x0, 0x6, 0x6, 0x3}, {0x1, 0x5, 0xd2, 0x7, 0x10001, 0x1}, {0x1, 0x3, 0x9, 0x1, 0x9, 0x6}, {0x13f, 0x3, 0x800, 0x8000000000000000, 0x2, 0x3ff}, {0x4, 0xbdfe, 0x200, 0x80000001, 0x4, 0x3}, {0x0, 0x4, 0x0, 0x0, 0x0, 0xc000000000000}, {0x327, 0x0, 0x10001, 0xc80e, 0x3, 0x3}, {0x80000000, 0x7fff, 0x636, 0x6, 0x0, 0x80}, {0x9, 0x4, 0x5, 0xff, 0x4, 0x40}, {0x108, 0x80, 0xf6, 0xd2, 0xfffffffffffff001, 0x36c5}, {0x2c, 0xfff, 0x6, 0xd7b, 0x9, 0x5}, {0xd03, 0x82, 0x0, 0x80000001, 0x9db, 0x3}, {0x4, 0x5, 0x3, 0x101, 0x81, 0xfffffffffffffffb}, {0x8, 0x50a, 0x6, 0x6, 0x1e9}, {0xfff, 0x0, 0x3f, 0x6, 0x6, 0x400}, {0x10000, 0x1, 0x1, 0x6, 0x101, 0x3}, {0x1, 0x9, 0x3, 0x100000001, 0xffffffff, 0xffffffffffff94e8}, {0x9, 0x6, 0x0, 0x2, 0x0, 0x1000}, {0x4, 0x0, 0xfffffffffffffffc, 0x205e, 0x5, 0x2}, {0x6, 0x401, 0x1, 0x6, 0x0, 0x7}, {0x78e, 0x3, 0x4, 0x7, 0x322, 0x10000}, {0x6, 0x1, 0x101, 0x8001, 0x5bfb, 0x1ff}, {0x6, 0x8bc8, 0x8000, 0x8, 0x4, 0x9}, {0x7000, 0x3, 0x0, 0x10000, 0x1, 0x1}, {0x6, 0x0, 0x101, 0x5, 0x100000001, 0x2dec}, {0x6, 0x1ff, 0x1000, 0x1f, 0x2, 0x6}, {0x426, 0x9, 0x9, 0xffffffffffffde43, 0xe3e, 0x3}, {0xfd, 0x5, 0x8, 0x8, 0x0, 0x7fffffff}, {0x7, 0x2, 0x7, 0x9, 0x5, 0x4}, {0x6, 0x6, 0x0, 0x4, 0x2b4, 0x1}, {0x7, 0xfffffffffffffff7, 0x8001, 0x8, 0x9, 0x6}, {0x22, 0x4, 0x10001, 0xfffffffffffffffc, 0xffffffff00000000, 0x7fffffff}, {0x58f5, 0x5, 0x2, 0x6, 0x9, 0x8000}, {0xec3, 0x9, 0x71e, 0xffffffff, 0x5, 0x9}, {0xc7, 0x8001, 0x2, 0x800, 0x0, 0x8}, {0x7, 0x7fffffff, 0x7, 0x2, 0x5, 0x8a}, {0x7, 0x3, 0x80000000, 0x7ff, 0x6, 0x80000000}, {0x4, 0x8001, 0x10001, 0x4000000000000000, 0x8001, 0x6}, {0x7ff, 0x2, 0x8, 0x9, 0x80000000, 0x80}, {0x3f, 0xffff, 0x9, 0x9, 0x8001, 0x9ad0}, {0x1, 0x3, 0x4, 0xfff, 0x3, 0xff}, {0x1000, 0xffffffffffff2a08, 0x8, 0x6, 0x4}, {0x71a, 0xffffffff, 0x5, 0xffffffffffffff84, 0x9, 0x8}, {0x40, 0x5, 0x6, 0xffffffffffffff00, 0xb6c, 0x6}, {0xffffffffffffffff, 0x3, 0x0, 0x1f, 0x627, 0x36}, {0xffffffffffffff43, 0x223d, 0x2, 0x7fffffff, 0x80000001, 0x100}, {0x6, 0x1, 0x5, 0x8000, 0x400, 0x7fff}, {0x1000, 0x3, 0x3, 0x1, 0x1, 0xfffffffffffff191}, {0x40, 0x21e3, 0x1f, 0x0, 0x100, 0x8000}, {0x30000000, 0x3, 0x32, 0xfffffffffffffff8, 0x1, 0x40000000000000}, {0x675, 0xffffffffcb842547, 0x2, 0xffff, 0x7f, 0xbd4}, {0x9, 0x20, 0x3, 0x5, 0x8a, 0x5}, {0x9, 0x800, 0x6, 0x3f, 0x2, 0xffff}, {0xd4, 0xffff, 0xffffffffffffffc1, 0x3, 0x100000000, 0x7}, {0x4d08, 0x1, 0x0, 0x0, 0x1, 0x7}, {0x2, 0x8, 0x10000, 0xb9e9, 0x6, 0x3}, {0x2, 0x2, 0x10000, 0x81, 0x3cfc, 0x4}, {0x2, 0x4, 0x902c, 0x1, 0x10000, 0x7}, {0x0, 0x2, 0x77, 0x100000000, 0xffffffff, 0x3a}, {0x8001, 0xfffffffffffffff8, 0x7, 0xce, 0xfff, 0x4}, {0x8, 0x10001, 0x2, 0x2e, 0xff58, 0x2}, {0x3, 0x17, 0x10000, 0x4, 0x81, 0xfff}, {0xfff, 0x100, 0x6, 0x1, 0x7, 0xffffffffffffff45}, {0x1, 0xce3, 0x0, 0x800, 0x4, 0x2}, {0x1775, 0x2, 0x1, 0x7711, 0x0, 0x923c}, {0x7, 0x1f, 0x4, 0x3, 0x4, 0x5}, {0x1, 0xffffffffffff945e, 0x1000, 0xffffffffffffffc1, 0x3}, {0x6, 0xfff, 0x4, 0xbbd, 0xffff, 0x100000001}, {0x1, 0x6, 0x80000001, 0x6, 0x0, 0x7ff}, {0x6, 0x8001, 0x0, 0xffffffffffffff75, 0x5, 0x5}, {0x3, 0x100000001, 0x7fffffff, 0xffff, 0x7ff, 0x2}, {0x3, 0x1, 0x3f, 0x100, 0x81, 0x4f}, {0x80000000, 0x7fff, 0x8, 0x9, 0x9, 0x8}, {0x4, 0x3ff, 0x6a, 0x2, 0x6, 0x95}, {0x100000001, 0x5, 0x8, 0x1ff, 0x3, 0x80}, {0x9e, 0x9, 0xfffffffffffffffe, 0x5, 0xffffffffffffffe1}, {0x81, 0x2, 0x6, 0x9, 0x4, 0x6}, {0x3, 0x1, 0x1000, 0x5, 0x4, 0xb9}, {0x2, 0x3, 0x100000001, 0x8, 0x2, 0x6}, {0x30000000, 0x9, 0x1, 0x6, 0x8, 0x80}, {0x0, 0x3, 0x81, 0x37f9, 0x20, 0x2}, {0x3, 0x8, 0x1, 0x80000000000000, 0x5, 0x9}, {0x4, 0x3, 0x1, 0x8, 0x9, 0x6}, {0x1f, 0x5, 0x9, 0x8, 0x6, 0x1eea}, {0xefd4, 0x8, 0x6, 0x81, 0x7}, {0x3, 0x91, 0x9, 0x6, 0x3f, 0x3}, {0x25, 0xa29, 0x7, 0x1, 0x4b3, 0xe1f}, {0x100000001, 0x5, 0x6, 0x1, 0x7, 0xfffffffffffff800}, {0x6, 0x80, 0xffffffffffff8001, 0xab4, 0xe5, 0x1000}, {0xd91, 0xff, 0x100000000, 0x4, 0x3, 0x400}, {0xff, 0xffffffff, 0x80000000, 0xc, 0x100, 0x4}, {0x5, 0x8, 0xfffffffffffffff8, 0x1, 0x0, 0xbc6}, {0x3a, 0x7, 0x1000, 0x3, 0x10000}, {0x3ff00000000000, 0x6, 0x3, 0x7, 0xff, 0xa000000000000000}, {0x1, 0x7ff, 0x2, 0x800, 0x2, 0x3f}, {0x8, 0x100, 0x1f, 0x1f, 0x7fff, 0x5}, {0x4, 0x5, 0x0, 0x6, 0x7ff, 0x8}, {0x2, 0x7f5, 0x0, 0x800080, 0x0, 0x54}, {0xa7b, 0x6, 0x5, 0x3, 0x4c4, 0x3}, {0x7, 0x100000000, 0x6c, 0x400000000, 0x7}, {0x2, 0x6, 0x5f, 0x8001, 0x40, 0x6}, {0x10001, 0x40, 0x9, 0x40, 0x1, 0x2}, {0x4, 0x8, 0x100000001, 0x100000000, 0x7ff, 0x1ff}, {0xc20, 0x3, 0x4, 0x2, 0x7fff, 0x9}, {0x1, 0x7fffffff, 0x2, 0x100000000, 0x6, 0x2}, {0x3, 0x0, 0xffff, 0x9, 0x8, 0x6c}, {0x5, 0x9, 0x3ff, 0x1, 0x1, 0x4}, {0x9, 0x34cb, 0xc, 0x3, 0x2, 0x4}, {0x1f, 0x6, 0x0, 0x5, 0x5, 0x7}, {0x1, 0x7ff, 0x0, 0x7, 0x80000000, 0x577}], [{0x2}, {}, {0x7, 0x1}, {0x0, 0x1}, {0x4, 0x1}, {0x0, 0x1}, {0x4, 0x1}, {0x7}, {0x3, 0x1}, {0x2, 0x1}, {0x2}, {0x3, 0x1}, {0x3, 0x1}, {0x1, 0x1}, {}, {0x4, 0x1}, {}, {0x3, 0x1}, {}, {0x5, 0x1}, {}, {0x1, 0x1}, {0x5, 0x1}, {0x2, 0x1}, {0x5}, {0x0, 0x1}, {0x0, 0x1}, {0x7, 0x1}, {0x1}, {0x3}, {0x5}, {0x5, 0x1}, {0x5, 0x1}, {0x7}, {0x7}, {0x0, 0x1}, {0x3, 0x1}, {0x0, 0x1}, {0x2}, {0x4}, {0x1, 0x1}, {0x3, 0x1}, {0x5, 0x1}, {0x5}, {0x0, 0x1}, {0x2, 0x1}, {0x2}, {0x3, 0x1}, {0x1, 0x1}, {0x3, 0x1}, {}, {0x2}, {0x5, 0x1}, {0x5, 0x1}, {0x1}, {0x3}, {0x4}, {0x5, 0x1}, {}, {0x1}, {}, {0x7, 0x1}, {0x3}, {0x7, 0x1}, {}, {0x1}, {0x0, 0x1}, {0x1, 0x1}, {}, {0x1}, {0x7, 0x1}, {0x4, 0x1}, {0x0, 0x1}, {0x0, 0x1}, {0x4, 0x1}, {}, {0x1, 0x1}, {0x1}, {0x4, 0x1}, {0x4}, {0x7, 0x1}, {0x5}, {0x4, 0x1}, {0x1}, {0x4, 0x1}, {0x1, 0x1}, {0x2}, {0x3}, {0x3}, {0x0, 0x1}, {0x7, 0x1}, {0x5, 0x1}, {0x4, 0x1}, {0x5, 0x1}, {0x1, 0x1}, {0x5, 0x1}, {0x5, 0x1}, {0x1, 0x1}, {0x2, 0x1}, {0x1}, {0x43aa2066c31b13ff, 0x1}, {0x3}, {0x4, 0x1}, {0x4, 0x1}, {0x3, 0x1}, {0x7}, {0x0, 0x1}, {0x3, 0x1}, {0x5, 0x1}, {0x7, 0x1}, {0xc6bdd2318751186f}, {0x3, 0x1}, {0x0, 0x1}, {0x3}, {0x5, 0x1}, {}, {0x2}, {0x1}, {0x5, 0x1}, {0x0, 0x1}, {}, {0x5, 0x1}, {0x7, 0x1}, {0x0, 0x1}, {0x5}, {0x5, 0x1}, {0x7}, {0x2, 0x1}]}}, @TCA_PEDIT_KEYS_EX={0x74, 0x5, [@TCA_PEDIT_KEY_EX={0x3c, 0x6, [@TCA_PEDIT_KEY_EX_CMD={0x8, 0x2, 0x1}, @TCA_PEDIT_KEY_EX_HTYPE={0x8, 0x1, 0x1}, @TCA_PEDIT_KEY_EX_HTYPE={0x8, 0x1, 0x3}, @TCA_PEDIT_KEY_EX_CMD={0x8, 0x2, 0x1}, @TCA_PEDIT_KEY_EX_HTYPE={0x8, 0x1, 0x2}, @TCA_PEDIT_KEY_EX_HTYPE={0x8, 0x1, 0x2}, @TCA_PEDIT_KEY_EX_HTYPE={0x8, 0x1, 0x7}]}, @TCA_PEDIT_KEY_EX={0x34, 0x6, [@TCA_PEDIT_KEY_EX_CMD={0x8, 0x2, 0x1}, @TCA_PEDIT_KEY_EX_HTYPE={0x8, 0x1, 0x5}, @TCA_PEDIT_KEY_EX_CMD={0x8}, @TCA_PEDIT_KEY_EX_HTYPE={0x8, 0x1, 0x3}, @TCA_PEDIT_KEY_EX_HTYPE={0x8, 0x1, 0x2}, @TCA_PEDIT_KEY_EX_CMD={0x8}]}]}]}, {0xc, 0x6, "f7b9df1d49"}}}}, {0x114, 0x1, @m_ife={0x110, 0x6, {{0x8, 0x1, 'ife\x00'}, {0x50, 0x2, [@TCA_IFE_SMAC={0xc, 0x4, @broadcast}, @TCA_IFE_METALST={0x10, 0x6, [@IFE_META_PRIO={0x4, 0x3, @void}, @IFE_META_TCINDEX={0x8, 0x5, @val=0x9}]}, @TCA_IFE_DMAC={0xc, 0x3, @random="39ad46a64171"}, @TCA_IFE_METALST={0x18, 0x6, [@IFE_META_PRIO={0x8, 0x3, @val=0x7}, @IFE_META_SKBMARK={0x4, 0x1, @void}, @IFE_META_PRIO={0x8, 0x3, @val=0x1}]}, @TCA_IFE_SMAC={0xc, 0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}}]}, {0xb0, 0x6, "c990c7e497c64e5ed85ab072c44cc99873db0c64812ffa1b2d2269bd6c39a39a1892bf6b02ee1d90ebe1eedd361fbd06ff86ff367c860ec6357224559eb0e306bc833b1f77c066b7ba88db7e31ce3b1c4b75106be3df258293c966d9033a7f27024d3bc6095bbf5802d5f10536a815ce53ba4b23157de45ec1a522c31ba8e8dedac55c30dc5dd357d5ed7a6f02a595ea68b3eabafef182badf4d44d65518e1a3420498f0c6ca24d8927d1c31"}}}}]}, 0x4bc4}, 0x1, 0x0, 0x0, 0x44}, 0x4) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[d::]:\nllb:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000004e80)='/dev/fuse\x00', 0x2, 0x0) [ 936.605049] QAT: Invalid ioctl 16:04:54 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020200090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e0100000001000000000000002402001700f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}}, 0x0) 16:04:54 executing program 1: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[]::]:\nllb:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 16:04:54 executing program 3: openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x400, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001340)={0x0, 0x0, &(0x7f0000001300)={&(0x7f0000000180)=ANY=[@ANYBLOB='@\x00\x00\x00q', @ANYRES32=0x0, @ANYBLOB="0000000000000000200012001000010069703665727370616e0000000c0004000800030000000000"], 0x40}}, 0x0) r1 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x9, 0x50002) ioctl$UI_SET_FFBIT(r1, 0x4004556b, 0x4b) [ 936.682437] libceph: parse_ips bad ip '[d::]: [ 936.682437] llb' 16:04:54 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e0100000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}}, 0x0) r1 = dup2(r0, r0) ioctl$KDSKBSENT(r1, 0x4b49, &(0x7f0000000000)="eeca324d3d6b893ab08d0d83f37c794eb4b8b5ccac217cafba2e4ecf274ffcc20c11f5081807c74eda69a45b93e38d9853f79764de1e3126ee35f066d6afd948e4b57977f9835b14894ae0365f4236996e5d8dfebcebed7f273a5f6cb2dc279f8466d15193a2984db51b0593726508593e662671ce020fff2d7b") [ 936.724507] libceph: parse_ips bad ip '[]::]: [ 936.724507] llb' [ 936.732164] libceph: parse_ips bad ip '[d::]: [ 936.732164] llb' 16:04:54 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020200090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e0100000001000000000000002402001800f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}}, 0x0) 16:04:54 executing program 1: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[]::]:\nllb:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\a', 0x0, 0x0) 16:04:54 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, 0x0, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_INFO(r1, 0x29, 0x40, &(0x7f00000000c0)={'security\x00\x00\x00\x0e\x03\x00'}, &(0x7f0000000140)=0x54) 16:04:54 executing program 4: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000700)='/dev/hwrng\x00', 0x10001, 0x0) accept4$tipc(r0, &(0x7f0000000740)=@id, &(0x7f0000000780)=0x10, 0x80800) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="5f32d383d536a56ee2260ddc"], &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) execveat(r0, &(0x7f00000007c0)='./file0\x00', &(0x7f0000000880)=[&(0x7f0000000800)='/dev/usbmon#\x00', &(0x7f0000000840)='\x00'], &(0x7f0000000b00)=[&(0x7f00000008c0)='.\\),bdev@}+\x00', &(0x7f0000000900)='ppp0\x00', &(0x7f0000000940)='\x00', &(0x7f0000000980)='/dev/usbmon#\x00', &(0x7f00000009c0)='/dev/hwrng\x00', &(0x7f0000000a00)='proc[(\'\x00', &(0x7f0000000a40)='\x00', &(0x7f0000000a80)='%!\x00', &(0x7f0000000ac0)='cpuset\x00'], 0x1800) r1 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x800, 0x4000) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f00000006c0)=[@timestamp, @mss={0x2, 0x4}, @timestamp, @window={0x3, 0x1, 0x9}, @mss={0x2, 0x200}, @timestamp], 0x6) pwritev(r1, &(0x7f0000000600)=[{&(0x7f00000001c0)="61c78f4ee8d3f689d97557e7f59bc0c08dec2232b55b4fcea1e88a1f0374d527e5138018fe3401cf7543ed190fe1fad6d49256436ef0a8874cc94f580a0f6d5764af8f45466b49223fb7d7740e1be49f91bfe8ff48a97650f792dd9bf2", 0x5d}, {&(0x7f00000000c0)="ece9b11f25a25e3cc737f941f4be7646ddb7", 0x12}, {&(0x7f0000000240)="6c5c62dc8c3f988e519d65fb825fd64b153d2342e3ca4c5a496df3a9b37b491d24893d747634a8d50bdf584b2e50d7b52ab8c90a45be8c208c2ce46d6c21f03bd5198fdfa851d2b49e1e6828c41a4e5d0496b39c6e25374ed50b123908febb33864bbf220ff3047ac56c8ed254522a94593c8ed8ff80a8ee9c121563b442b3874bafd42a4f6b64c125f01a4332a9f627c46b6f80759dfd7b3e6550efc5c13c21b3173659cd1947ce0ce566772baa3860f72f813d", 0xb4}, {&(0x7f0000000300)="d9e3921f3ca69a7624071c835e29a22557e8fc9aee54e86b9ac4ce3315a7c63dadb2491b9d0bf1009a3c513c5af0dcff31611565eb2c42466042386fd80a583d33498d45ecef035ee9b56a42d48d8557194e6ee80b29806a598f78c1e40c875bc6b0ba5bd23425faeeddd4a92530005b373b374b29c9708249a324c0bafa84fbdd", 0x81}, {&(0x7f0000000140)="f7fc1156943965d740cbab7546a867aa153ca83d3bb0e58573becdd4657d05f86c62444251aa3f5cbdf82d7d3a24c71148e11dcc", 0x34}, {&(0x7f00000003c0)="6fd5a0f352c620e830a97a3c31045ab56c6a36d3d77ddb17811709492d1c3b356ad21bd125430f69c7705b144c392c5c5b364b9a7690f95b962a94a3db6279b70b014ed870e7d76adcc90419956ca937eddcb8f9e3b60abd9a8ff6f1e4b26a926ba966c8d30e9a4eefecee7341075d368fb97bf04dc16910aae32d59d9d391c62bb1b1d7d19bf222a3520d5ff7a1af10da5763295cb1097173586c070192ea85e086c1a795391425427a616dee5a0117c48a3364916a33081f0a62796b6538001461fca50f761bdbc90b12c8b82bbff41b52", 0xd2}, {&(0x7f00000004c0)="de6c5a1d1da81c37f8f2762d0e3a0c9f33bcef4462e6215ca99813c211b2575c2503e3017acb398f578ecd8140884488c6a81871c5c42a3bf1982b46e50a48c95da578345ffa52f25bbd24bfb129c2f363a9bf84ee38fa840235ca151224ee85c46177928b8aaa7150cfe0f9ca5b83e94c9c0b949e28", 0x76}, {&(0x7f0000000540)="ae39da1bf453533653653c301b2faeeea83810ed5c60e880c91f204ed2aa782f623ebcba14ca89f9feb5922195e59b0673cdb70457796c8c26baff70a4697a8cebc71ff8cbf9a6de80589acffd46bfefd0314d7c45e4033f4428ad19f3e32c08af", 0x61}, {&(0x7f00000005c0)="29e7fe7d35ae149663", 0x9}], 0x9, 0x0) getsockopt$inet_sctp6_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000bc0), &(0x7f0000000c00)=0xb) set_thread_area(&(0x7f0000000b80)={0x1f, 0x20000000, 0x6000, 0x9, 0x5, 0x3f, 0x3, 0x1, 0x9, 0x9c}) 16:04:54 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) recvmsg(r0, &(0x7f00000041c0)={&(0x7f0000003e40)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff}}, 0x80, &(0x7f0000004080)=[{&(0x7f0000003ec0)=""/63, 0x3f}, {&(0x7f0000003f00)=""/45, 0x2d}, {&(0x7f0000003f40)=""/151, 0x97}, {&(0x7f0000004000)=""/70, 0x46}], 0x4, &(0x7f00000040c0)=""/222, 0xde}, 0x20) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000004240)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r1, &(0x7f00000043c0)={&(0x7f0000004200)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000004380)={&(0x7f0000004280)={0xdc, r2, 0x100, 0x70bd25, 0x25dfdbfb, {}, [@TIPC_NLA_NET={0x3c, 0x7, [@TIPC_NLA_NET_NODEID={0xc, 0x3, 0x7}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x1}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x10001}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x3}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x4}]}, @TIPC_NLA_BEARER={0x8c, 0x1, [@TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'ib', 0x3a, 'ip6gre0\x00'}}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e23, 0xfffffffffffffbeb, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x21}}, 0x7a4}}, {0x20, 0x2, @in6={0xa, 0x4e23, 0x1, @remote, 0x80000000}}}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x7}, @TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e21, @loopback}}, {0x14, 0x2, @in={0x2, 0x4e24, @loopback}}}}]}]}, 0xdc}, 0x1, 0x0, 0x0, 0x40004}, 0x4) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0xfffffcae, &(0x7f0000000040)={&(0x7f0000000180)=@newlink={0x40, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, @ip6erspan={{0x10, 0x1, 'ip6erspan\x00'}, {0xc, 0x4, [@gre_common_policy=[@IFLA_GRE_IFLAGS={0x8, 0x3}]]}}}]}, 0x364}, 0x1, 0x0, 0x0, 0xfffffffffffffffc}, 0x4) 16:04:54 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000000)=ANY=[@ANYBLOB="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"], 0x60}}, 0x0) r1 = accept4$inet(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x0, @dev}, &(0x7f00000001c0)=0x10, 0x80000) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000000200)={0x0, 0x4}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f0000000280)={r2}, &(0x7f0000000300)=0xffffffb0) 16:04:54 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020200090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e0100000001000000000000002402001a00f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}}, 0x0) 16:04:54 executing program 1: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[]::]:\nllb:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) [ 937.358812] libceph: parse_ips bad ip '[]::]: [ 937.358812] llb' [ 937.374889] ceph: device name is missing path (no : separator in _2ÓƒÕ6¥nâ& Ü) 16:04:55 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020200090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e0100000001000000000000002402000400f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}}, 0x0) 16:04:55 executing program 1: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[]::]:\nllb:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 16:04:55 executing program 0: sendmsg$key(0xffffffffffffffff, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000000)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e0100000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000c469ca8b15e9481342ba4929017a7a22016de039c1deb28c600469fdd284da1c2d618ab5df27ba10e67eac29f4b5fce68273c302b90243d4b68ed18db9b6b3935bbc131c39f8267ef9e9d8ce0cc84720639527332c5906c119b32b8d5c889e1527444c4cc43a71b6c0c870b5cd1e61526fb476b42b5a1cd9068da4e2370b76cff901fc75f2c06f1da6"], 0x60}}, 0x0) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/autofs\x00', 0x40, 0x0) ioctl$EVIOCGUNIQ(r0, 0x80404508, &(0x7f0000000140)=""/134) [ 937.428379] IPVS: ftp: loaded support on port[0] = 21 [ 937.442480] ceph: device name is missing path (no : separator in _2ÓƒÕ6¥nâ& Ü) 16:04:55 executing program 4: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[d::]:\nllb:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) mount(&(0x7f0000000000)=@loop={'/dev/loop', 0x0}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='befs\x00', 0x40000, &(0x7f00000001c0)='$keyringem1\x00') 16:04:55 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r0, 0x0, 0x483, &(0x7f0000000000), &(0x7f0000000080)=0x68) sendmsg$nl_route(r0, &(0x7f0000001340)={0x0, 0x0, &(0x7f0000001300)={&(0x7f0000000180)=@newlink={0x40, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, @ip6erspan={{0x10, 0x1, 'ip6erspan\x00'}, {0xc, 0x4, [@gre_common_policy=[@IFLA_GRE_IFLAGS={0x8, 0x3}]]}}}]}, 0x40}}, 0x0) 16:04:55 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x400, 0x0) mmap$perf(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0xa, 0x12, r1, 0x48) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000000)=ANY=[@ANYBLOB="020300090c000000ffffffffffffff000000000000000000030006000000000002004e0100000001000000002402000100f8ffffff0000000200000000030005000000000002004e20e0000001371163cef1622d82000000728808a232c43f60210608f323e0bb6502a20e399e8af0b402e3bb8c195b97d350706af4b15aeb12c66178d22cbac9a860d27eab6946bb51dc4a14cd4fc2221d4e868c0fab91c6"], 0x60}}, 0x0) [ 937.596199] libceph: parse_ips bad ip '[]::]: [ 937.596199] llb' [ 937.618998] libceph: parse_ips bad ip '[d::]: [ 937.618998] llb' 16:04:55 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, 0x0, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_INFO(r1, 0x29, 0x40, &(0x7f00000000c0)={'security\x00\x00\x00(\x00'}, &(0x7f0000000140)=0x54) 16:04:55 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020200090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e0100000001000000000000002402000800f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}}, 0x0) 16:04:55 executing program 1: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[]::]:\nllb:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 16:04:55 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000000c0)={0x0, @in={{0x2, 0x4e23, @empty}}, [0x6, 0x9, 0x4, 0x1, 0x7, 0x8, 0xef9, 0x2, 0x8, 0xfffffffffffffff8, 0x40, 0xfffffffffffffffd, 0xd746, 0x40000000000, 0x5]}, &(0x7f00000001c0)=0x100) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r1, 0x84, 0x75, &(0x7f0000000200)={r2, 0x1}, 0x8) sendmsg$nl_route(r0, &(0x7f0000001340)={0x0, 0x0, &(0x7f0000001300)={&(0x7f0000000000)=ANY=[@ANYBLOB="10001fff0000000000002000000000000f3fe3ad3107a9a07179f205f68de588e9438a7567adab7a73ca336d934646bff4e98215b5bdcd2c20a7ceb898fb6d43c5282d0ff83f8c5ddca70ec228a8353672810d22", @ANYRES32=0x0, @ANYBLOB="0000000000000000200012001000010069703665727370616e0000000c0004000800030000000000"], 0x40}}, 0x0) 16:04:55 executing program 4: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/sys/net/ipv4/vs/sloppy_sctp\x00', 0x2, 0x0) symlinkat(&(0x7f0000000380)='./file0\x00', r0, &(0x7f0000000400)='./file0\x00') r1 = request_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)='loe+!eth0\x00', 0xfffffffffffffffc) add_key(&(0x7f00000000c0)='ceph\x00', &(0x7f0000000140)={'syz', 0x0}, &(0x7f00000001c0)="926cacf7184da849d9a2efa39f97fdd3c58b0fb7bbe2f31fce49aaccf02b3c1d56e6cad4af2f5f248ae9126c2636819f6526857319a1f7e6f8ef7a0418c2d8a4bfeb53e309095fa8f02e64c6cc08b49788831c3970231c02fd7f79df35c712fe6e0ff651af98a732eea75c995f85871aa6717c5b0de5eae17b2d1e12bdc1257234e3858e3dcd98815ba137ab6a675ea9642d1c2d894f8406f7d558d62c145bf7f44e5f472fe8a5ab4732a1bd4723ca2a593654cfd63dfe62216d8edbf20682ed18212dffd01a1534cb0a59bacb155246cbfbdef9fd96402b495e574de5f361a701e827", 0xe3, r1) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x400, 0x0) ioctl$UI_DEV_CREATE(r2, 0x5501) mount(&(0x7f0000000040)=@nullb='[d::]:\nllb:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 16:04:55 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) r1 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x2, 0x101801) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000040)={0x0, 0x6}, &(0x7f0000000080)=0x8) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f00000000c0)={r2, @in6={{0xa, 0x4e21, 0x10000, @ipv4={[], [], @loopback}, 0xba1}}}, 0x84) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e0100000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}}, 0x0) [ 938.151476] libceph: parse_ips bad ip '[d::]: [ 938.151476] llb' [ 938.158166] libceph: parse_ips bad ip '[]::]: [ 938.158166] llb' 16:04:55 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffff9c, 0x84, 0x73, &(0x7f0000000040)={0x0, 0x1, 0x0, 0x200, 0xfff}, &(0x7f0000000080)=0x18) setsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x1f, &(0x7f00000000c0)={r2, @in6={{0xa, 0x4e21, 0x1, @remote, 0x6}}, 0xff, 0xfffffffffffffffd}, 0x90) sendmsg$nl_route(r0, &(0x7f0000001340)={0x0, 0x0, &(0x7f0000001300)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000000010001fff000000000000000000000000", @ANYRES32=0x0, @ANYBLOB="0000000000000095cf8b9a020074784a880020001200100001006970366572670bde9cda716c6c31ca1aed8107bb8b7370616e0000000c0004000800030000400000cbba74"], 0x40}}, 0x0) setsockopt$bt_BT_SNDMTU(r1, 0x112, 0xc, &(0x7f0000000180)=0x100000000, 0x2) 16:04:55 executing program 1: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[]::]:\nllb:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 16:04:55 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020200090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e0100000001000000000000002402000200f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}}, 0x0) [ 938.197697] libceph: parse_ips bad ip '[d::]: [ 938.197697] llb' [ 938.221829] IPVS: ftp: loaded support on port[0] = 21 16:04:55 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e0100000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}}, 0x0) pipe(&(0x7f00000007c0)) r1 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0xda0f, 0x80001) fstat(r0, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000100)={0x0}, &(0x7f0000000140)=0xc) sendmsg$nl_generic(r1, &(0x7f0000000780)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000740)={&(0x7f0000000180)={0x5ac, 0x41, 0x202, 0x70bd28, 0x25dfdbfc, {0x1}, [@generic="41aaaae350ff434e4b8eb0ce37d993c16ee599557f6316aff26036c4236b44d2968a3ae9f2b5d68f0be0a2a9e20ca481b9adbbd32a24f141048af5a5d9aa69d0db2d293c27cbdc2f076ed5538a47bc9d0af5eea12fafa56cf51cd507eb24dc183b7edbfd2516233d7c2c95d0f014edb064be5a9774687300141ad46f874024b48ece58be7d0e888131d959b686a98bc014c9fb0338f7747520debc156bff0e0065460b482e6412fc1ca6b67d426018cbb1e675d4f38a9fb68fb0c74e3b920adedad44033fa67668979088555110e405a9e2887a77e64c881a6d0948c52539874d7d747a5c8ca2630568b91ec3675e2222ac2fd1ffa495ddf633742ce", @typed={0xc, 0x61, @u64=0x1}, @typed={0x8, 0x28, @u32=0x1}, @nested={0x1a8, 0x90, [@generic="dc7865dcda7605d69d26a61f49cd837e648f545eab881671ee8bbd931af4f01fafcaaad1a99ebf59e6daa7dc3f3b57067aafb0d47f62cbad35759150b0c0eab154a4d2bede0a800d8a09cfe068319715af4d968118eed617a897518dc0dd1e8802f847e71e695ad6264bd255f20451f0750d039a982dc3a0cd186e30534871428aef2e9cff02d8c34d05ee", @typed={0x14, 0x85, @ipv6=@remote}, @generic="5af2047134eeb68b6f9cb7d4f4ccb8d534023d9c6ce89710804a26427e6300a9ff372d212bf0aed091009945ff79537107856970cb3c65bb82b6496caae566edb74323743c37fa4c8aed2cfef07951e71ff9e39a812eef78200727d001cf91a6f7794ae98d4032c8874753277487945abe11475d24a1ec7c88f5e0734707cd141853efca202d39533a64e61980c513f7a0e62486073dc1d3bcc179", @typed={0x8, 0x4a, @u32=0x80}, @typed={0x8, 0x3c, @uid=r2}, @generic="f64da177f26b81086423258df8917ffab43bd3466d99f2b327ea88eba95effafd0b5a231202d8d1840ea33a20603162b15", @typed={0x8, 0x1, @fd=r0}, @typed={0x8, 0xa, @pid=r3}, @typed={0x4, 0x10}, @typed={0x14, 0x61, @ipv6}]}, @generic="a77358bcb630a8c2ee36f5ecb20888750e66de3669dd06946ad61147aee9e7c84689519be42f185bef2523adcf3f158de28da041a023b204c175556f2273876eb14a0a54e6b806baa587b5c8d946ec10d4ce441b20ac11aabb34fbe99244531c10cad398ba4a8e3611f4e32a594d84c1c67cb807e1241ca3f8c1311f56260fa046a93012ce2ec32f60bd39991ec38ab142c23a95c56591db5d824b2136b9969395f8b515dd6bd715976ffa71d0105cc3ceaea36a7f0bb74756c7378c48bc5df99327aa0245da57adf5de8826a83cc81469956d", @nested={0x134, 0x1, [@generic="44f874a5132962e97e534938185ae4f15be8029df59c5001dcfc9f91f37b4b4746be2f2144e5c7732fca19f67d2ab56391296cd536f88acf9fd91636a73777a1372574113ea1846ecc4b5bc47db096745989215923ecf5d634898fdddcae1c6cf7ea81af457676a2604f70aa0c66ef6d99c9ed144ab3531ee528e696368559dadf31104e21b623a6168175f79ab66b488ec0c6f530c150fe6e027249ef30b5467982b240cea027db07b72426b1aa405e4ee0a2153bd7", @generic="acbca1f002216516b125c9569453d6aceeffff6fc7aa2c9909db9cc6c92e315aa136c4a84eac34f7764494c19a0a662f3e4e93880b490a3656d1ba03e6363acafbccdec4c37c222fc73477a8079848940e241c27662b4271c6a9b3e5585a593720ca3ca3996249158075fb2e7596053daf430d2be62e7231"]}, @generic="8044949828d2fb39240a43f64dc4cb72d94d23a0a5ab145f6dbaa9b236d2b890ea1e50f74fd2cd9ff92175fd5e08a9a6018d7864b5e95f82262baef47dafd390506dd3eac9527baaea61f37d41413d45d101e3fbe1d35edb82e88ee24fee97ee858a93293b8057873f49a05311d449189114f0695a5d2896f6bf70cbd45c1052826ec3dadfc92c7a95d31ec7ccff2aac6a228f10031d347269c9480d75eb7f69e4774164806723fbe8010cfd48aad3af358114bc676c9519ef029b30f6bef3fc9ca3bf260a27007fb3df3258aa7dff02ccd214f96a2bb906"]}, 0x5ac}}, 0x8040) [ 938.290240] netlink: 32 bytes leftover after parsing attributes in process `syz-executor3'. 16:04:56 executing program 4: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x100000000010000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[d::]:\nllb:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) r0 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x1000, 0x109000) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x48c, &(0x7f00000000c0)={0x2, 'irlan0\x00'}, 0x18) 16:04:56 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020200090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e0100000001000000000000002402000110f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}}, 0x0) [ 938.383753] netlink: 32 bytes leftover after parsing attributes in process `syz-executor3'. [ 938.521005] libceph: parse_ips bad ip '[d::]: [ 938.521005] llb' [ 938.549295] libceph: parse_ips bad ip '[d::]: [ 938.549295] llb' 16:04:56 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, 0x0, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_INFO(r1, 0x29, 0x40, &(0x7f00000000c0)={'security\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00x\x00'}, &(0x7f0000000140)=0x54) 16:04:56 executing program 3: socket$nl_route(0x10, 0x3, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x80000, 0x0) sendmsg$kcm(r1, &(0x7f0000000440)={&(0x7f0000000080)=@generic={0x1f, "9a621b4f56828f229d440a096c40e83158c9aae74660338a1b8f8da6379e128c484fa0fc1046242a90006c3f696d3ff313e3dc7c7d9b3f13e54fb38d8ef5a66867d66b7c9f34e63bf3dd9de478bf298f9adde59dc51a90d5384ba5a1dfd202b68ba21292a9d7d32cc9cf934201a5ff5cb68e42fb4264e9bcc30f013ba5bc"}, 0x80, &(0x7f0000000280)=[{&(0x7f0000000100)="b037ede7fc49c30640e8", 0xa}, {&(0x7f00000001c0)="046e5218aa000c220f10c4fe2a38ecb03ddd804c9a229f87a649857c48d0a221cacbb8def5234b590d17e49c45e82f3905b9332e8ad10a378612747a2aa6f32ee402827a38fd75021db008fd7eac3d36e4407a5b800e1318", 0x58}, {&(0x7f0000000140)="ebc624ee30510c9e9778c48f1c4195a0777b231d0fe339", 0x17}, {&(0x7f0000000240)="cd8bdd6eb68ac108a8d4c18cd16d58d61072787cd23685526cfe341a6e1945117e21ae996b580bb70d77df8d82ecbafa7503c68f960f", 0x36}], 0x4, &(0x7f00000002c0)=[{0x70, 0x10e, 0x7, "569ab3b082424895e67768d63c3944984efb5d4d16b21f66f5b6dfb13a409f78647723872190b89733930732829cff823afbf32965370aba8e5db8bb6cc1ef15ab1269a0b735c6a5af78d0f55e5594ae7904409c4ce225dc4e"}, {0x58, 0x119, 0x0, "fe62622c8f23df93faf6456d4bcb93542cad4fd4da819efab793d540118fdb3c3555fd7dfec59f0dada3031b93cebf0a8b45e41ad1b44591cdc8425dbf3b4cddb411d4fb2d9eef"}, {0x80, 0xff, 0x8, "cddf7a0581d0ba3831602d0ed8e4fbc12c3e93b79c5cfbfaf3e0d31e7b4de97a7799edc1f254ad00ab0c7bb2c1b8e855468c168166f6e8cccbfd34b7c309d4c4b0ec027002ef7aeb8b191a45223fce9807718c440fc3f33054c18ed0348d616a8535dcabb035cdeb655fd789"}], 0x148}, 0x44) setsockopt$IP_VS_SO_SET_TIMEOUT(r1, 0x0, 0x48a, &(0x7f0000000040)={0x100000000, 0xfffffffffffff800, 0xab2}, 0xc) sendmsg$nl_route(r0, &(0x7f0000001340)={0x0, 0x0, &(0x7f0000001300)={&(0x7f0000000180)=@newlink={0x40, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, @ip6erspan={{0x10, 0x1, 'ip6erspan\x00'}, {0xc, 0x4, [@gre_common_policy=[@IFLA_GRE_IFLAGS={0x8, 0x3}]]}}}]}, 0x40}}, 0x0) 16:04:56 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020200090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e0100000001000000000000002402000102f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}}, 0x0) 16:04:56 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e0100000001000000000000ffff0000000200000000030005000000000002004e20e000000100000000000000000000000000000000"], 0x60}}, 0x0) 16:04:56 executing program 4: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000500)=@sg0='/dev/sg0\x00', &(0x7f0000000680)='./file0\x00', &(0x7f0000000540)='\x1bW_\xc5:F8j\xc4\xe70bg!\xf3Z\xbasM}\x10\am\x0e\x166\xa4[\x15-0\x12\x16\x1a\xe9\xe3W\n\xf2\xa6\x186\xfc\xac.\xe6\x006E\x06\x00\x00\x00\x00\x00\x00\x89\x18_1\x00\x80`B\xaa\xb2\xfd\xd7 \x93\x04\xd4,\xd7\xc6ev\xa2\x1f\xe3\x00\x00/Mg\xce:\xbaB\b\xf0\xcb\xf8\rb\xfd\xf7\xffZ\x89\xe2Yj\xb7\xd9\xe4(\rk\xab\x91v\x99^\xfe\x1e\xb4\xb0\x7f\xa0\xb9:\x90\\\xcd\x1c\xfeeH\xe4eX\xbd\xc3\x97\xd3I\xa9,\xfdT\x94N\x01zW\xdf\x91t\xd1\xfc\xa3\xc9-Y)2\x86!>\xd6\xddr\x94\x14\xbf\xc4\x06(\x9c\x94\x84\xady\xfcLq\xfa\x93\x9c\xa1\x1a\x80\xa1\x1d\xad\xd4\x87k\xc7\xdf\x93\x0f\xe9<\x9e\x90\x9dS[\xfa\xa7\x9b\x84\xe4\x9c\xfcF\\3\xf2\xcf\x896\x11\x87 6\xce\xa6\\\xe9\xd5j\xe2\x8b\x14\xb7\xe4\xa3\x1d\xf8tf\x90\x03Q\f#\xe5$B\xf5\x14k\xb0\x95*\xe3/\xd4\xa1\x8eq\'\xce\xcd8\x85\x1f\xc5+\xf3\xbe\xd1\xa0\x1a\xe3\xbc\x05\x80\x9a\x81\xe4( \x935\x82\xc6\x8f\x9e\x15\x8d_\xd7<\xd2\x88\xda$\xad\x1e;\xa3\xb6{\xda\xddI\xd3n\xb1', 0x1000000, 0x0) syz_open_dev$ndb(&(0x7f0000000000)='/dev/nbd#\x00', 0x0, 0x40000) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x200000, 0x0) setsockopt$RDS_GET_MR(r0, 0x114, 0x2, &(0x7f00000002c0)={{&(0x7f00000001c0)=""/195, 0xc3}, &(0x7f0000000140), 0x40}, 0x20) r1 = syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000380)={{{@in=@broadcast, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@local}}, &(0x7f0000000480)=0xe8) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000001040)={'syzkaller1\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000001080)={'vcan0\x00', 0x0}) accept$packet(r0, &(0x7f00000010c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001100)=0x14) accept$packet(r0, &(0x7f0000001140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001180)=0x14) getsockopt$inet6_mreq(r0, 0x29, 0x0, &(0x7f00000011c0)={@remote, 0x0}, &(0x7f0000001200)=0x14) getsockopt$inet6_mreq(r0, 0x29, 0x1f, &(0x7f0000001240)={@loopback, 0x0}, &(0x7f0000001280)=0x14) getsockopt$inet6_mreq(r0, 0x29, 0x1c, &(0x7f00000012c0)={@local, 0x0}, &(0x7f0000001300)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000001340)={{{@in=@empty, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000001440)=0xe8) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000001480)={0x0, @multicast2, @empty}, &(0x7f00000014c0)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000001500)={{{@in=@multicast2, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in6=@ipv4}}, &(0x7f0000001600)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000001740)={{{@in6=@loopback, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000001840)=0xe8) accept$packet(r0, &(0x7f0000001880)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000018c0)=0x14) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000002b40)={{{@in6=@loopback, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@remote}}, &(0x7f0000002c40)=0xe8) getsockname(r0, &(0x7f0000003d00)=@hci={0x1f, 0x0}, &(0x7f0000000100)=0x80) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000006240)={{{@in=@multicast2, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in6=@local}}, &(0x7f0000006340)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000006380)={{{@in6=@local, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@remote}}, &(0x7f0000006480)=0xe8) recvmmsg(r0, &(0x7f000000aa40)=[{{0x0, 0x0, &(0x7f0000006540)=[{&(0x7f00000064c0)=""/106, 0x6a}], 0x1, &(0x7f0000006580)=""/11, 0xb}, 0x6efd}, {{&(0x7f00000065c0)=@generic, 0x80, &(0x7f0000006840)=[{&(0x7f0000006640)=""/11, 0xb}, {&(0x7f0000006680)=""/162, 0xa2}, {&(0x7f0000006740)=""/197, 0xc5}], 0x3, &(0x7f0000006880)=""/69, 0x45}, 0x6}, {{&(0x7f0000006900)=@in={0x2, 0x0, @loopback}, 0x80, &(0x7f0000006cc0)=[{&(0x7f0000006980)=""/1, 0x1}, {&(0x7f00000069c0)=""/194, 0xc2}, {&(0x7f0000006ac0)=""/229, 0xe5}, {&(0x7f0000006bc0)=""/70, 0x46}, {&(0x7f0000006c40)=""/100, 0x64}], 0x5, &(0x7f0000006d40)=""/250, 0xfa}, 0xb8}, {{&(0x7f0000006e40)=@l2, 0x80, &(0x7f0000006f00)=[{&(0x7f0000006ec0)=""/8, 0x8}], 0x1}, 0x7}, {{&(0x7f0000006f40)=@l2, 0x80, &(0x7f0000008040)=[{&(0x7f0000006fc0)=""/4096, 0x1000}, {&(0x7f0000007fc0)=""/99, 0x63}], 0x2, &(0x7f0000008080)=""/71, 0x47}, 0x6}, {{&(0x7f0000008100)=@can={0x1d, 0x0}, 0x80, &(0x7f000000a680)=[{&(0x7f0000008180)=""/44, 0x2c}, {&(0x7f00000081c0)=""/122, 0x7a}, {&(0x7f0000008240)=""/4096, 0x1000}, {&(0x7f0000009240)=""/182, 0xb6}, {&(0x7f0000009300)=""/148, 0x94}, {&(0x7f00000093c0)=""/156, 0x9c}, {&(0x7f0000009480)=""/4096, 0x1000}, {&(0x7f000000a480)=""/239, 0xef}, {&(0x7f000000a580)=""/167, 0xa7}, {&(0x7f000000a640)=""/30, 0x1e}], 0xa}, 0x81d}, {{&(0x7f000000a740)=@sco, 0x80, &(0x7f000000aa00)=[{&(0x7f000000a7c0)=""/233, 0xe9}, {&(0x7f000000a8c0)=""/70, 0x46}, {&(0x7f000000a940)=""/168, 0xa8}], 0x3}, 0x6}], 0x7, 0x10000, &(0x7f000000ac00)={0x0, 0x1c9c380}) getpeername$packet(r0, &(0x7f000000b280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000b2c0)=0x14) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f000000b300)={0x0, @broadcast, @multicast1}, &(0x7f000000b340)=0xc) getpeername$packet(r0, &(0x7f000000b380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f000000b3c0)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f000000b400)={{{@in6=@ipv4={[], [], @multicast1}, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in6=@dev}}, &(0x7f000000b500)=0xe8) getsockopt$inet6_mreq(r0, 0x29, 0x0, &(0x7f000000b540)={@remote, 0x0}, &(0x7f000000b580)=0x14) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f000000b5c0)={{{@in=@loopback, @in6=@ipv4={[], [], @remote}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in6=@loopback}}, &(0x7f000000b6c0)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f000000bcc0)={{{@in=@multicast2, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in=@multicast2}}, &(0x7f000000bdc0)=0xe8) getsockname$packet(r0, &(0x7f000000be00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000be40)=0x14) accept4$packet(r0, &(0x7f000000bf00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000bf40)=0x14, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f000000c400)={{{@in=@broadcast, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in6}}, &(0x7f000000c500)=0xe8) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f000000c540)={{{@in6=@ipv4={[], [], @loopback}, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@loopback}}, &(0x7f000000c640)=0xe8) sendmsg$TEAM_CMD_OPTIONS_GET(r0, &(0x7f000000d0c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f000000d080)={&(0x7f000000c680)={0x9e0, r1, 0x8, 0x70bd2d, 0x25dfdbfc, {}, [{{0x8, 0x1, r2}, {0x144, 0x2, [{0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'broadcast\x00'}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0x20}}, {0x8, 0x6, r3}}}, {0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x4}}, {0x8, 0x6, r4}}}, {0x44, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x14, 0x4, 'activebackup\x00'}}}]}}, {{0x8, 0x1, r5}, {0x10c, 0x2, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r6}}}, {0x54, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x24, 0x4, [{0x1, 0x2, 0x7, 0x1}, {0x3f, 0x6, 0x5, 0x4ee29721}, {0xff, 0x9, 0x80000000, 0x6}, {0x4, 0x7, 0xb59b}]}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x3}}, {0x8}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x2b}}}]}}, {{0x8, 0x1, r7}, {0x18c, 0x2, [{0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x5}}}, {0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0x1c, 0x4, 'hash_to_port_mapping\x00'}}}, {0x44, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x14, 0x4, [{0x7e, 0x7, 0xffff, 0x10000}, {0x2, 0x1, 0x0, 0x1}]}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x6}}, {0x8, 0x6, r8}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8}}, {0x8, 0x6, r9}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0xfffffffffffffff9}}, {0x8, 0x6, r10}}}]}}, {{0x8, 0x1, r11}, {0x12c, 0x2, [{0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r12}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r13}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x1}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r14}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x20}}, {0x8, 0x6, r15}}}]}}, {{0x8, 0x1, r16}, {0xf8, 0x2, [{0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x800}}, {0x8, 0x6, r17}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r18}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x8000}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r19}}, {0x8}}}]}}, {{0x8, 0x1, r20}, {0x7c, 0x2, [{0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r21}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r22}}}]}}, {{0x8, 0x1, r23}, {0x100, 0x2, [{0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r24}}, {0x8}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r25}}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r26}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x2}}, {0x8, 0x6, r27}}}]}}, {{0x8, 0x1, r28}, {0x210, 0x2, [{0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x72578011}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x8}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x3}}}, {0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x7fffffff}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r29}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r30}}, {0x8}}}, {0x74, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x44, 0x4, [{0x1, 0x400, 0x80000000, 0xffffffff}, {0x9, 0x94e, 0x4, 0x2}, {0x1, 0x7, 0x1, 0x3}, {0x10000, 0x1f, 0x5, 0x81}, {0x7f, 0x9, 0x5, 0xfff}, {0x2e9, 0x9, 0xd80, 0x81}, {0x800, 0x0, 0x5, 0x8}, {0xac, 0x7ff, 0xfffffffffffffff9, 0x7f}]}}}]}}]}, 0x9e0}, 0x1, 0x0, 0x0, 0x4040010}, 0x10) 16:04:56 executing program 4: mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[d::]:\nllb:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 16:04:56 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=ANY=[@ANYRESHEX=r0], 0x12}}, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x5, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r1, 0xc08c5336, &(0x7f0000000140)={0x3, 0x454d, 0x800, 'queue0\x00', 0x3}) [ 939.158180] IPVS: ftp: loaded support on port[0] = 21 [ 939.220516] libceph: parse_ips bad ip '[d::]: [ 939.220516] llb' 16:04:56 executing program 1: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[]::]:\nllb:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 16:04:56 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020200090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e0100000001000000000000002402000108f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}}, 0x0) 16:04:56 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x3, 0x2) epoll_ctl$EPOLL_CTL_DEL(r1, 0x2, r0) sendmsg$nl_route(r0, &(0x7f0000001340)={0x0, 0x0, &(0x7f0000001300)={&(0x7f0000000180)=ANY=[@ANYBLOB="4000000010001fff000000000000000000000000", @ANYRES32=0x0, @ANYBLOB="00000000ffee79646168584bed970bdb54fa00000000200012001000010069703665727370616e00"], 0x40}}, 0x0) [ 939.274309] libceph: parse_ips bad ip '[d::]: [ 939.274309] llb' 16:04:56 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e0100000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}}, 0x0) r1 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x4, 0x440) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000040)={0x0, 0x6}, &(0x7f0000000080)=0x8) setsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x1f, &(0x7f0000000140)={r2, @in6={{0xa, 0x4e23, 0x1, @mcast2, 0x3f}}, 0x80000000, 0x4242}, 0x90) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f00000000c0)={r2, 0x3}, &(0x7f0000000100)=0x8) [ 939.321036] netlink: 32 bytes leftover after parsing attributes in process `syz-executor3'. 16:04:57 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020200090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e0100000001000000000000002402000104f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}}, 0x0) [ 939.637812] IPVS: ftp: loaded support on port[0] = 21 16:04:57 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, 0x0, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_INFO(r1, 0x29, 0x40, &(0x7f00000000c0)={'security\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x0e\x00'}, &(0x7f0000000140)=0x54) 16:04:57 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x3, 0x80000) ioctl$TCSETA(r1, 0x5406, &(0x7f0000000040)={0x5, 0x100000000, 0x74, 0x80000001, 0x389, 0x5, 0xa, 0x0, 0x0, 0x5}) sendmsg$nl_route(r0, &(0x7f0000001340)={0x0, 0x0, &(0x7f0000001300)={&(0x7f0000000180)=ANY=[@ANYBLOB="4000000010001fff000000000000000000000000", @ANYRES32=0x0, @ANYBLOB="0000000000dd000000200012001000010069703665727370616e0000000c0004000820030003c1eb"], 0x40}}, 0x0) 16:04:57 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/sco\x00') ioctl$sock_inet6_tcp_SIOCINQ(r0, 0x541b, &(0x7f00000000c0)) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f00000001c0)={{0x40, 0x7d2}, 'port1\x00', 0xc, 0x80000, 0xfc, 0x8000, 0xe6, 0x3, 0x9, 0x0, 0x6}) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[d::]:\nllb:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 16:04:57 executing program 0: 16:04:57 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020200090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e0100000001000000000000002402000100f8ffffff0000000100000000030005000000000002004e20e00000010000000000000000"], 0x60}}, 0x0) 16:04:57 executing program 4: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[d::]:\nllb:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x24200, 0x0) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffff9c, 0x84, 0x13, &(0x7f00000000c0)={0x0, 0x9}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f00000001c0)={r1, 0x7}, &(0x7f0000000200)=0x8) 16:04:57 executing program 0: [ 939.958177] libceph: parse_ips bad ip '[d::]: [ 939.958177] llb' [ 939.976311] netlink: 32 bytes leftover after parsing attributes in process `syz-executor3'. [ 940.072314] IPVS: ftp: loaded support on port[0] = 21 [ 940.134096] libceph: parse_ips bad ip '[d::]: [ 940.134096] llb' [ 940.461996] IPVS: ftp: loaded support on port[0] = 21 [ 940.668714] device bridge_slave_1 left promiscuous mode [ 940.674197] bridge0: port 2(bridge_slave_1) entered disabled state [ 940.682089] device bridge_slave_0 left promiscuous mode [ 940.688002] bridge0: port 1(bridge_slave_0) entered disabled state [ 940.725875] team0 (unregistering): Port device team_slave_1 removed [ 940.736525] team0 (unregistering): Port device team_slave_0 removed [ 940.746298] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 940.760853] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 940.792893] bond0 (unregistering): Released all slaves [ 940.893437] bridge0: port 1(bridge_slave_0) entered blocking state [ 940.899986] bridge0: port 1(bridge_slave_0) entered disabled state [ 940.907694] device bridge_slave_0 entered promiscuous mode [ 940.953723] bridge0: port 2(bridge_slave_1) entered blocking state [ 940.960266] bridge0: port 2(bridge_slave_1) entered disabled state [ 940.968141] device bridge_slave_1 entered promiscuous mode [ 941.011399] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 941.055671] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 941.199081] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 941.248179] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 941.476257] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 941.484027] team0: Port device team_slave_0 added [ 941.529617] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 941.537096] team0: Port device team_slave_1 added [ 941.585559] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 941.592500] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 941.609202] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 941.648697] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 941.655557] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 941.672558] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 941.713650] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 941.720881] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 941.737881] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 941.777329] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 941.784491] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 941.795971] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 942.284322] bridge0: port 2(bridge_slave_1) entered blocking state [ 942.290778] bridge0: port 2(bridge_slave_1) entered forwarding state [ 942.297519] bridge0: port 1(bridge_slave_0) entered blocking state [ 942.303890] bridge0: port 1(bridge_slave_0) entered forwarding state [ 942.312512] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 942.617490] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 943.726903] 8021q: adding VLAN 0 to HW filter on device bond0 [ 943.901899] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 944.072788] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 944.079799] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 944.088264] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 944.262177] 8021q: adding VLAN 0 to HW filter on device team0 16:05:02 executing program 1: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[]::]:\nllb:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 16:05:02 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020200090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e0100000001000000000000002402000100f8ffffff0000003f00000000030005000000000002004e20e00000010000000000000000"], 0x60}}, 0x0) 16:05:02 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = dup3(r0, r0, 0x80000) ioctl$VIDIOC_ENUMOUTPUT(r1, 0xc0485630, &(0x7f0000000000)={0x9, "6d8caa76ad2a2bbabf3794927d7157fcc177f7e0e458efceafcff8b3e13d0e0f", 0x1, 0x5, 0x6, 0x10000e0, 0x6}) sendmsg$nl_route(r0, &(0x7f0000001340)={0x0, 0x0, &(0x7f0000001300)={&(0x7f0000000180)=@newlink={0x40, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, @ip6erspan={{0x10, 0x1, 'ip6erspan\x00'}, {0xc, 0x4, [@gre_common_policy=[@IFLA_GRE_IFLAGS={0x8, 0x3}]]}}}]}, 0x40}}, 0x0) 16:05:02 executing program 4: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[d::]:\nllb:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 16:05:02 executing program 0: 16:05:02 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, 0x0, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_INFO(r1, 0x29, 0x40, &(0x7f00000000c0)={'security\x00\x00\x00\x00\x00\x00\xf4\x00'}, &(0x7f0000000140)=0x54) [ 945.233389] libceph: parse_ips bad ip '[]::]: [ 945.233389] llb' 16:05:02 executing program 3: get_mempolicy(&(0x7f0000000000), &(0x7f0000000040), 0x2, &(0x7f0000ffe000/0x2000)=nil, 0x4) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001340)={0x0, 0x0, &(0x7f0000001300)={&(0x7f0000000180)=ANY=[@ANYBLOB="4000000010001f6fa54852c8ad8f16f300000000", @ANYRES32=0x0, @ANYBLOB="0000000000000000200012001000010069703665727370616e0000000c0004000800030000000000"], 0x40}}, 0x0) [ 945.287023] IPVS: ftp: loaded support on port[0] = 21 [ 945.293126] libceph: parse_ips bad ip '[d::]: [ 945.293126] llb' [ 945.304207] libceph: parse_ips bad ip '[]::]: [ 945.304207] llb' 16:05:02 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020200090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e0100000001000000000000002402000100f8fffffffffffffd00000000030005000000000002004e20e00000010000000000000000"], 0x60}}, 0x0) 16:05:02 executing program 0: [ 945.351394] libceph: parse_ips bad ip '[]::]: [ 945.351394] llb' 16:05:03 executing program 4: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x1000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000140)={0xffffffffffffffff}}}, 0x20) fchmodat(r0, &(0x7f0000000240)='./file0\x00', 0x2) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000200)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f00000000c0), r1, 0x0, 0x2, 0x4}}, 0x20) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[d::]:\nllb:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 16:05:03 executing program 1: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[]::]:\nllb:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x03', 0x0, 0x0) 16:05:03 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001340)={0x0, 0x0, &(0x7f0000001300)={&(0x7f0000000180)=@newlink={0x40, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, @ip6erspan={{0x10, 0x1, 'ip6erspan\x00'}, {0xc, 0x4, [@gre_common_policy=[@IFLA_GRE_IFLAGS={0x8, 0x3}]]}}}]}, 0x40}}, 0x0) r1 = accept$inet6(0xffffffffffffff9c, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}, &(0x7f0000000040)=0x1c) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f0000000080)=0x400, 0x4) 16:05:03 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020200090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e0100000001000000000000002402000100f8ffffff0000000a00000000030005000000000002004e20e00000010000000000000000"], 0x60}}, 0x0) 16:05:03 executing program 0: 16:05:03 executing program 4: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lsetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)=@known='com.apple.FinderInfo\x00', &(0x7f0000000140)='ceph\x00', 0x5, 0x2) mount(&(0x7f0000000040)=@nullb='[d::]:\nllb:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) [ 945.537920] libceph: parse_ips bad ip '[d::]: [ 945.537920] llb' 16:05:03 executing program 1: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[]::]:\nllb:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 16:05:03 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='fdinfo\x00') getdents64(r0, &(0x7f0000000000)=""/60, 0x3c) getdents64(r0, &(0x7f0000000080)=""/104, 0x68) [ 945.664861] libceph: parse_ips bad ip '[d::]: [ 945.664861] llb' [ 945.701510] libceph: parse_ips bad ip '[d::]: [ 945.701510] llb' [ 945.723238] libceph: parse_ips bad ip '[]::]: [ 945.723238] llb' [ 945.743076] libceph: parse_ips bad ip '[]::]: [ 945.743076] llb' [ 945.890618] IPVS: ftp: loaded support on port[0] = 21 16:05:03 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, 0x0, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_INFO(r1, 0x29, 0x40, &(0x7f00000000c0)={'security\x00\x00\x00\x00\x00\x02\xf2\x00'}, &(0x7f0000000140)=0x54) 16:05:03 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x40902, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000180)={0x0}) ioctl$DRM_IOCTL_GET_SAREA_CTX(r1, 0xc010641d, &(0x7f00000002c0)={r2, &(0x7f00000001c0)=""/245}) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xffffffffffffff06, &(0x7f0000000080)={&(0x7f00000000c0)=@bridge_setlink={0x0, 0x13, 0x1, 0x70bd2a, 0x25dfdbfb, {0x7, 0x0, 0x0, 0x0, 0x20000, 0x22000}, [@IFLA_IFNAME={0x0, 0x3, 'syzkaller1\x00'}, @IFLA_LINK_NETNSID={0x0, 0x25, 0x400}, @IFLA_AF_SPEC={0x0, 0x1a, [{0x0, 0x1f}, {0x0, 0x1e}, {0x0, 0x2}, {0x0, 0x1f}, {0x0, 0x1c}, {0x0, 0x7}, {0x0, 0x7}, {0x0, 0x1c}]}, @IFLA_LINKINFO={0x0, 0x12, @ip6gre={{0x0, 0x1, 'ip6gre\x00'}, {0x0, 0x2, [@IFLA_GRE_LOCAL={0x0, 0x6, @local}, @IFLA_GRE_REMOTE={0x0, 0x7, @mcast1}, @IFLA_GRE_LOCAL={0x0, 0x6, @remote}]}}}, @IFLA_NUM_RX_QUEUES={0x0, 0x20, 0x7ff}, @IFLA_EXT_MASK={0x0, 0x1d, 0x2}]}, 0x3c}, 0x1, 0x0, 0x0, 0x400000000000}, 0x8000000000) ioctl$EXT4_IOC_MIGRATE(r0, 0x6609) 16:05:03 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020200090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e0100000001000000000000002402000100f8ffffff0400000200000000030005000000000002004e20e00000010000000000000000"], 0x60}}, 0x0) 16:05:03 executing program 4: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x40000, 0x0) getsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f00000000c0)=@sack_info={0x0, 0xfffffffffffff3e6, 0x4}, &(0x7f0000000140)=0xc) setsockopt$inet_sctp_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000040)=@assoc_id=r1, 0x4) mount(&(0x7f0000000200)=ANY=[@ANYBLOB="5b643a3a5d38312e64ec787a6b8f038bde0e4a3a0a6c6c623a00"], &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 16:05:03 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='fdinfo\x00') getdents64(r0, &(0x7f0000000000)=""/60, 0x3c) getdents64(r0, &(0x7f0000000080)=""/104, 0x68) 16:05:03 executing program 1: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[]::]:\nllb:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 16:05:03 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020200090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e0100000001000000000000002402000100f8ffffff0020000200000000030005000000000002004e20e00000010000000000000000"], 0x60}}, 0x0) [ 945.998258] libceph: parse_ips bad ip '[]::]: [ 945.998258] llb' [ 946.008464] QAT: Invalid ioctl [ 946.029629] libceph: parse_ips bad ip '[d::]81.dìxzk‹ÞJ: [ 946.029629] llb' [ 946.035385] libceph: parse_ips bad ip '[]::]: [ 946.035385] llb' 16:05:03 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='fdinfo\x00') getdents64(r0, &(0x7f0000000000)=""/60, 0x3c) getdents64(r0, &(0x7f0000000080)=""/104, 0x68) [ 946.078956] IPVS: ftp: loaded support on port[0] = 21 16:05:03 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001340)={0x0, 0x0, &(0x7f0000001300)={&(0x7f0000000180)=ANY=[@ANYBLOB="4000000410001fff000000002000470000000000", @ANYRES32=0x0, @ANYBLOB="0000000008000000200070616e0000000c00040008007bb36814030000000000"], 0x40}}, 0x0) 16:05:03 executing program 1: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[]::]:\nllb:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\xff', 0x0, 0x0) 16:05:03 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020200090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e0100000001000000000000002402000100f8ffffff0000000800000000030005000000000002004e20e00000010000000000000000"], 0x60}}, 0x0) 16:05:03 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='fdinfo\x00') getdents64(r0, &(0x7f0000000000)=""/60, 0x3c) getdents64(r0, &(0x7f0000000080)=""/104, 0x68) [ 946.500854] IPVS: ftp: loaded support on port[0] = 21 16:05:04 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, 0x0, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_INFO(r1, 0x29, 0x40, &(0x7f00000000c0)={'security\x00\x00\x00\xc6\x00'}, &(0x7f0000000140)=0x54) 16:05:04 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001340)={0x0, 0x0, &(0x7f0000001300)={&(0x7f0000000000)=ANY=[@ANYBLOB="4000000010001fff000000000000000000000000beda59007898779a53cb1c3edd8adbebfc70de3ca28a75010019345333e17e90712e21b5", @ANYRES32=0x0, @ANYBLOB="0000000000000000200012001000010069703665727370616e0000000c0004000800030000000000"], 0x40}}, 0x0) r1 = syz_open_dev$usb(&(0x7f0000000140)='/dev/bus/usb/00#/00#\x00', 0x1, 0x400) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_INTERVAL(r1, 0xc040564b, &(0x7f0000000180)={0x81, 0x0, 0x2011, 0x4c58, 0x7, {0x8, 0x9dcc}, 0x1}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000000c0)={r0, 0x28, &(0x7f0000000080)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000100)={r2, 0x8000, 0x18}, 0xc) 16:05:04 executing program 4: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0xa00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=ANY=[@ANYBLOB="5b643a3a5dd7ed395e242b5b3a0a6c6c623a00"], &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 16:05:04 executing program 1: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[]::]:\nllb:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\xc0', 0x0, 0x0) 16:05:04 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020200090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e0100000001000000000000002402000100f8ffffff0000002c00000000030005000000000002004e20e00000010000000000000000"], 0x60}}, 0x0) 16:05:04 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='fdinfo\x00') getdents64(r0, &(0x7f0000000000)=""/60, 0x3c) 16:05:04 executing program 1: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[]::]:\nllb:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) [ 946.645858] libceph: parse_ips bad ip '[d::]×í9^$+[: [ 946.645858] llb' [ 946.656142] netlink: 32 bytes leftover after parsing attributes in process `syz-executor3'. 16:05:04 executing program 0: getdents64(0xffffffffffffffff, &(0x7f0000000000)=""/60, 0x3c) 16:05:04 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020200090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e0100000001000000000000002402000100f8ffffff0000000300000000030005000000000002004e20e00000010000000000000000"], 0x60}}, 0x0) [ 946.703635] libceph: parse_ips bad ip '[d::]×í9^$+[: [ 946.703635] llb' [ 946.729602] netlink: 32 bytes leftover after parsing attributes in process `syz-executor3'. [ 946.734141] IPVS: ftp: loaded support on port[0] = 21 16:05:04 executing program 4: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="5b643aba5d5e8a6c6c623a00"], &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) r0 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x8, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000000c0)={r0, &(0x7f00000001c0)="cb33f3535ce8dc67de34880ac5b0983d99fbf07bfa24bebe9bd1f81c46f9b99a86e7425245d9710d148f5052916544e1741e5d435042f8221f6fb332e0c6bb8f532be46bcaa973b9e34693bc8c763c465e473d2576263450ac1f97ac74c33ff09ef096458156a8573b78cb5a125a18e8"}, 0x10) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$inet6_MCAST_MSFILTER(r1, 0x29, 0x30, &(0x7f0000000240)={0x400, {{0xa, 0x4e1d, 0x6ac, @ipv4={[], [], @broadcast}, 0x7ff}}, 0x1, 0x0, [{{0xa, 0x4e23, 0x6, @loopback, 0x8004}}, {{0xa, 0x4e24, 0x6, @remote, 0x8000}}, {{0xa, 0x4e24, 0xfffffffeffffffff, @loopback, 0xfffffffffffffffc}}]}, 0x210) 16:05:04 executing program 1: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[]::]:\nllb:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph`', 0x0, 0x0) [ 946.801542] libceph: parse_ips bad ip '[]::]: [ 946.801542] llb' 16:05:04 executing program 0: r0 = syz_open_procfs(0x0, 0x0) getdents64(r0, &(0x7f0000000000)=""/60, 0x3c) [ 946.954988] libceph: parse_ips bad ip '[d:º]^Šllb' [ 946.994493] libceph: parse_ips bad ip '[d:º]^Šllb' 16:05:05 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, 0x0, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_INFO(r1, 0x29, 0x40, &(0x7f00000000c0)={'security\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\xf2\x00'}, &(0x7f0000000140)=0x54) 16:05:05 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001340)={0x0, 0x0, &(0x7f0000001300)={&(0x7f0000000180)=@newlink={0x40, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, @ip6erspan={{0x10, 0x1, 'ip6erspan\x00'}, {0xc, 0x4, [@gre_common_policy=[@IFLA_GRE_IFLAGS={0x8, 0x3}]]}}}]}, 0x40}}, 0x0) r1 = dup3(r0, r0, 0x80000) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r1, 0x111, 0x4, 0x0, 0x4) 16:05:05 executing program 4: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nullb='[d::]:\nllb:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='hfsplus\x00', 0x0, 0x0) 16:05:05 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020200090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e0100000001000000000000002402000100f8ffffff7fffffff00000000030005000000000002004e20e00000010000000000000000"], 0x60}}, 0x0) 16:05:05 executing program 1: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[]::]:\nllb:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 16:05:05 executing program 0: syz_open_procfs(0x0, &(0x7f0000000040)='fdinfo\x00') getdents64(0xffffffffffffffff, &(0x7f0000000000)=""/60, 0x3c) 16:05:05 executing program 4: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000440)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='oom_adj\x00') ioctl$KVM_SET_XCRS(r0, 0x4188aea7, &(0x7f00000001c0)={0x4, 0x7fffffff, [{0xff, 0x0, 0x2}, {0x8, 0x0, 0x6}, {0x6cf, 0x0, 0xfff}, {0x7, 0x0, 0x1ff}]}) [ 947.427902] libceph: parse_ips bad ip '[]::]: [ 947.427902] llb' 16:05:05 executing program 1: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[]::]:\nllb:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 16:05:05 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020200090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e0100000001000000000000002402000100f8ffffff1000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}}, 0x0) 16:05:05 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='fdinfo\x00') getdents64(r0, 0x0, 0x0) [ 947.523348] IPVS: ftp: loaded support on port[0] = 21 [ 947.536904] libceph: parse_ips bad ip '[]::]: [ 947.536904] llb' 16:05:05 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x276, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="4000000010001fff000000000000000000000000", @ANYRES32=0x0, @ANYBLOB="000000004065727370616e0079a40c0004000820ebff00010000"], 0xfe60}}, 0x10) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000140)={0x1, 0x6, 0x1, 0x10000, 0x3, [{0x7, 0xff, 0x81}, {0x3000000000000, 0x5, 0x1, 0x0, 0x0, 0x800}, {0x1000, 0x75, 0xffffffff85fb1354, 0x0, 0x0, 0x5}]}) [ 947.635336] libceph: parse_ips bad ip '[d::]: [ 947.635336] llb' [ 947.646210] libceph: parse_ips bad ip '[]::]: [ 947.646210] llb' [ 947.673971] netlink: 32 bytes leftover after parsing attributes in process `syz-executor3'. 16:05:05 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020200090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e0100000001000000000000002402000100f8ffffff0800000200000000030005000000000002004e20e00000010000000000000000"], 0x60}}, 0x0) [ 947.685204] libceph: parse_ips bad ip '[d::]: [ 947.685204] llb' [ 947.722251] netlink: 32 bytes leftover after parsing attributes in process `syz-executor3'. 16:05:05 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, 0x0, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_INFO(r1, 0x29, 0x40, &(0x7f00000000c0)={'security\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02p\x00'}, &(0x7f0000000140)=0x54) 16:05:05 executing program 0: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nullb='[d::]:\nllb:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='hfsplus\x00', 0x0, 0x0) 16:05:05 executing program 4: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=ANY=[@ANYBLOB='[d):]:\nllb:\x00'], &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) r0 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x85be, 0x10600) ioctl$KDDISABIO(r0, 0x4b37) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) 16:05:05 executing program 1: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[]::]:\nllb:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\xf6', 0x0, 0x0) 16:05:05 executing program 3: r0 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000040), &(0x7f0000000080)=0x8) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000200)={0x0, 0x24, &(0x7f0000001300)={&(0x7f0000000000)=ANY=[@ANYBLOB="4000000010001fff000000000000000000000000", @ANYRES32=0x0, @ANYPTR=&(0x7f0000000140)=ANY=[@ANYRES16=0x0, @ANYRESOCT=r1, @ANYRESDEC=r1, @ANYRESOCT=r1, @ANYRES64=r1]], 0x3}}, 0x0) 16:05:05 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020200090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e0100000001000000000000002402000100f8ffffff0000000400000000030005000000000002004e20e00000010000000000000000"], 0x60}}, 0x0) [ 948.226912] libceph: parse_ips bad ip '[d):]: [ 948.226912] llb' 16:05:05 executing program 1: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[]::]:\nllb:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 16:05:05 executing program 4: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x803fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$vcsn(&(0x7f0000000380)='/dev/vcs#\x00', 0x40, 0x40000) ioctl$VIDIOC_G_JPEGCOMP(r0, 0x808c563d, &(0x7f00000003c0)) mount(&(0x7f00000001c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) r1 = syz_open_dev$audion(&(0x7f0000000340)='/dev/audio#\x00', 0x6, 0x801) ioctl$SNDRV_TIMER_IOCTL_START(r1, 0x54a0) prctl$PR_CAPBSET_READ(0x17, 0x1e) setxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)=@random={'system.', 'ceph\x00'}, &(0x7f0000000140)='system|vmnet1\x00', 0xe, 0x1) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x6500, 0x1) [ 948.268990] libceph: parse_ips bad ip '[d):]: [ 948.268990] llb' 16:05:05 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020200090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e0100000001000000000000082402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}}, 0x0) 16:05:06 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020200090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e0100000001000000000000002402000100f8ffffff0200000200000000030005000000000002004e20e00000010000000000000000"], 0x60}}, 0x0) [ 948.398100] libceph: parse_ips bad ip '[]::]: [ 948.398100] llb' [ 948.435942] libceph: parse_ips bad ip '[]::]: [ 948.435942] llb' [ 948.484421] libceph: parse_ips bad ip '[d::]: [ 948.484421] llb' 16:05:06 executing program 1: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[]::]:\nllb:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 16:05:06 executing program 0: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[]::]:\nllb:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) [ 948.567788] libceph: parse_ips bad ip '[d::]: [ 948.567788] llb' [ 948.631014] libceph: parse_ips bad ip '[]::]: [ 948.631014] llb' [ 948.650371] libceph: parse_ips bad ip '[]::]: [ 948.650371] llb' [ 948.694124] libceph: parse_ips bad ip '[]::]: [ 948.694124] llb' [ 949.048132] IPVS: ftp: loaded support on port[0] = 21 16:05:06 executing program 4: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000340)=ANY=[@ANYBLOB="5b643a3a5d3a0a866c7d3a0061140000eb5f2383ec5ddbb91485618ccee33b22c3762ee49a0eb4950110146f95beeeafb1516973385bb21bd78c32821d36ddf719525240bbd281fa415854b8e6054f254ca3094a3cea3ce3a51f715b453f78932b6a20711f1e773cd0046dce5f923cf157dbf27e31d219ed8b"], &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f00000001c0)={{{@in6=@dev, @in6=@ipv4={[], [], @empty}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in=@local}}, &(0x7f00000000c0)=0xe8) epoll_wait(r0, &(0x7f0000000040)=[{}, {}], 0x2, 0xffffffffffffff81) ioctl$sock_inet6_SIOCDELRT(r0, 0x890c, &(0x7f00000002c0)={@loopback, @loopback, @loopback, 0x80, 0x6, 0x8, 0x0, 0x382b, 0x40800100, r1}) ioctl$UFFDIO_COPY(r0, 0xc028aa03, &(0x7f0000000140)={&(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffb000/0x3000)=nil, 0x4000, 0x1}) 16:05:06 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020200090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e0100000001000000000000002402000100f8ffffff0010000200000000030005000000000002004e20e00000010000000000000000"], 0x60}}, 0x0) 16:05:06 executing program 0: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[]::]:\nllb:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 16:05:06 executing program 1: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[]::]:\nllb:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) [ 949.242438] libceph: parse_ips bad ip '[]::]: [ 949.242438] llb' [ 949.249199] libceph: parse_ips bad ip '[]::]: [ 949.249199] llb' [ 949.261596] libceph: parse_ips bad ip '[d::]: [ 949.261596] †l}' [ 949.291143] libceph: parse_ips bad ip '[]::]: [ 949.291143] llb' [ 949.310027] libceph: parse_ips bad ip '[d::]: [ 949.310027] †l}' 16:05:08 executing program 0: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x7, 0x7fc) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000200)) r1 = syz_open_dev$evdev(&(0x7f00000005c0)='/dev/input/event#\x00', 0x0, 0x400000) getsockopt$inet_sctp6_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f0000000740), 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$vbi(&(0x7f00000000c0)='/dev/vbi#\x00', 0x3, 0x2) r3 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm-control\x00', 0x0, 0x0) ioctl$RTC_PIE_OFF(r3, 0x7006) setsockopt$RDS_GET_MR_FOR_DEST(0xffffffffffffffff, 0x114, 0x7, &(0x7f0000000880)={@un=@abs={0x1, 0x0, 0x4e21}, {&(0x7f0000000680)=""/183, 0xb7}, &(0x7f0000000300), 0x3}, 0xa0) r4 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x804c0, 0x0) ioctl$KVM_GET_NESTED_STATE(r4, 0xc080aebe, &(0x7f0000000ec0)={0x0, 0x0, 0x2080}) timer_settime(0x0, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}}, &(0x7f0000000380)) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000280)=r1, 0x2d290ebedb7b4151) r5 = socket(0x40000000015, 0x5, 0x0) fcntl$getflags(r2, 0x401) setsockopt$SO_RDS_TRANSPORT(r5, 0x114, 0x8, &(0x7f00000007c0)=0x800000000000002, 0x4) setsockopt$sock_int(r5, 0x1, 0x8, &(0x7f00006dbffc), 0x4) bind$inet(r5, &(0x7f0000000840)={0x2, 0x4e20, @loopback}, 0x10) ioctl$int_in(r5, 0x5421, &(0x7f0000000900)=0x6) setsockopt$RDS_CONG_MONITOR(r4, 0x114, 0x6, &(0x7f0000000080), 0x4) sendto$inet(r5, &(0x7f0000000a00)="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", 0x21d, 0x0, 0x0, 0x0) r6 = mq_open(&(0x7f00000003c0)='\aoj9\xbc\xf6u=w\x0e\xecuWOA\xe8\x85\x02^;\x8f\x9c\xd2a\xc1c\x1f8h\x84\x9ej2#\xe3g\xdd\x13\xedI\xdc\xa1\xfc1\xe5\x01VZ.\xfbD\x7f.\xbb\x99\xdb\xb7\xef\xbe\x1c\xc9\xb6\x17g\xff\xec\xf4\xe8lD{\xa8\x04\x0f\x8f\b\x8e\xf9ln\x90\xca\xf1\x97\xb6[\x14})\v\xeeU\x14o\x1b1fV\xbf\r\xa51zhq\x10\v\xf5\xb1g\x9c\x1c\x83b\xd3\xa3\xd7\xb9\xeb\xf9\xc0\xd1\x15\xf1\xa3\x8a^\xbe\x12\x97\xc8lf\x95\x9e \x00\x00\x00\x00\x00\x00\x00\x0er\x05\x1d\xd8\xaa\xf5\xd4\xc0\xd0\x80,\x05V\xe46/9x\xd5P\xd1v\'?\x1d|\xe5\xe2\xe9\x7fy|\x1f\xb47d\x10\x8c\xcc\x91\x82\x925\xeb\xe8\x88\"\x96B\xec\x9c\xa8\xa7\x7fr$\xb4\xa0', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000000340)={0x0, 0x8, 0x5, 0x20, 0x0, 0x0, 0x0, 0xfffffffffffffffd}) mq_timedsend(r6, &(0x7f0000000040), 0xda, 0x3ff, 0x0) r7 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x8000, 0x0) ioctl$GIO_SCRNMAP(r7, 0x4b40, &(0x7f0000000200)=""/122) ioctl$GIO_SCRNMAP(r7, 0x4b40, &(0x7f00000002c0)=""/60) mq_timedsend(r6, &(0x7f0000000080), 0x0, 0x0, 0x0) mq_timedreceive(r6, &(0x7f0000000100)=""/24, 0x18, 0x0, 0x0) getcwd(&(0x7f00000004c0)=""/118, 0xd7) unshare(0x800) pread64(r7, &(0x7f00000001c0)=""/25, 0x19, 0x0) sendto$inet(r5, &(0x7f0000000940)="21f76f000001009c8f3301ddf5a77831facaa98a398cb6ec217cf32f2d49c769451db8adf4557ef70259dced8eceaa2ebb8917ccbcf2b7c3a236a1d8162ffdd47aff5e8d53fca7c44d3f5b97e566b3247551a00af3de6d9c9cc49a26c64a26e5b313b52944650af26e0d65b654db4063bb3a486e4f2325237cc922d2c4ce10d9ae", 0x81, 0x0, 0x0, 0x0) 16:05:08 executing program 3: syz_open_dev$usb(&(0x7f0000000240)='/dev/bus/usb/00#/00#\x00', 0x4, 0x40000) mknod$loop(&(0x7f0000000280)='./file0\x00', 0x300, 0x1) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001340)={0x0, 0x0, &(0x7f0000001300)={&(0x7f0000000180)=@newlink={0x40, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, @ip6erspan={{0x10, 0x1, 'ip6erspan\x00'}, {0xc, 0x4, [@gre_common_policy=[@IFLA_GRE_IFLAGS={0x8, 0x3}]]}}}]}, 0x40}}, 0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x900, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={r1, 0x28, &(0x7f0000000040)}, 0x10) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x1f, &(0x7f00000000c0)={0x0, @in6={{0xa, 0x4e23, 0x5, @loopback, 0x1}}, 0xde0, 0x2}, &(0x7f00000001c0)=0x90) setsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000200)={r2, 0x8}, 0x8) 16:05:08 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020200090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e0100000001000000000000002402000100f8ffffff0004000200000000030005000000000002004e20e00000010000000000000000"], 0x60}}, 0x0) 16:05:08 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, 0x0, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_INFO(r1, 0x29, 0x40, &(0x7f00000000c0)={'security\x00\x00\x00\x00\x00\x01d\x00'}, &(0x7f0000000140)=0x54) 16:05:08 executing program 4: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=ANY=[@ANYBLOB='b:\x00'], &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 16:05:08 executing program 1: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[]::]:\nllb:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) [ 950.926044] libceph: parse_ips bad ip 'b' 16:05:08 executing program 4: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000001c0)={{{@in6, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in=@loopback}}, &(0x7f0000000140)=0xe8) lsetxattr$security_capability(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.capability\x00', &(0x7f00000002c0)=@v3={0x3000000, [{0x6, 0x6}, {0xa746, 0x77b65406}], r0}, 0x18, 0x1) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[d::]:\nllb:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff}) r2 = getpgrp(0xffffffffffffffff) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r4 = openat$dir(0xffffffffffffff9c, &(0x7f0000000500)='./file0\x00', 0x0, 0x41) r5 = syz_open_dev$sndctrl(&(0x7f0000000540)='/dev/snd/controlC#\x00', 0x8, 0x0) r6 = socket$inet_dccp(0x2, 0x6, 0x0) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000580)={0x0, 0x0}) stat(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000006c0)={0x0, 0xffffffffffffff9c, 0x0, 0xa, &(0x7f0000000680)=':vboxnet1\x00', 0xffffffffffffffff}, 0x30) r11 = getgid() r12 = signalfd(0xffffffffffffff9c, &(0x7f0000000700)={0x800}, 0x8) r13 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000740)='/dev/ppp\x00', 0x8000, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000007c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x5, &(0x7f0000000780)=']\xd7%.\x00'}, 0x30) r15 = accept$alg(0xffffffffffffff9c, 0x0, 0x0) r16 = syz_open_dev$video(&(0x7f0000000800)='/dev/video#\x00', 0x9a, 0x80) r17 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000840)='/dev/vsock\x00', 0x200, 0x0) r18 = fcntl$getown(0xffffffffffffffff, 0x9) fstat(0xffffffffffffffff, &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r20 = socket$inet_tcp(0x2, 0x1, 0x0) r21 = openat$audio(0xffffffffffffff9c, &(0x7f0000000900)='/dev/audio\x00', 0x8000, 0x0) sendmsg$unix(r1, &(0x7f0000000a40)={&(0x7f0000000340)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000400)=[{&(0x7f00000003c0)}], 0x1, &(0x7f0000000940)=[@cred={0x20, 0x1, 0x2, r2, r0, r3}, @rights={0x20, 0x1, 0x1, [r4, r5, r6, r7]}, @cred={0x20, 0x1, 0x2, r8, r0, r9}, @cred={0x20, 0x1, 0x2, r10, r0, r11}, @rights={0x28, 0x1, 0x1, [r12, r13, r14, r15, r16, r17]}, @cred={0x20, 0x1, 0x2, r18, r0, r19}, @rights={0x18, 0x1, 0x1, [r20, r21]}], 0xe0, 0x40000}, 0x10) 16:05:08 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020200090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e0100000001000000000000002402000100f8ffffff0008000200000000030005000000000002004e20e00000010000000000000000"], 0x60}}, 0x0) [ 950.951999] libceph: parse_ips bad ip '[]::]: [ 950.951999] llb' [ 950.958698] libceph: parse_ips bad ip 'b' [ 950.964672] IPVS: ftp: loaded support on port[0] = 21 [ 950.988675] libceph: parse_ips bad ip '[]::]: [ 950.988675] llb' 16:05:08 executing program 1: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[]::]:\nllb:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 16:05:08 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000cb3ff8)='./file0\x00', 0x0) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mkdirat(r1, &(0x7f0000643ff8)='./file0\x00', 0x8000) r2 = open$dir(&(0x7f00004daff8)='./file0\x00', 0x0, 0x0) r3 = openat(r2, &(0x7f00006e9ff8)='./file0\x00', 0x0, 0x0) symlinkat(&(0x7f000001fff7)='./file0/file0\x00', r3, &(0x7f000001fff8)='./file0\x00') renameat2(r3, &(0x7f00000001c0)='./file0/file0/file0/file0\x00', r3, &(0x7f0000284000)='./file0/file0/file0/file0\x00', 0x0) sendmsg$nl_route(r0, &(0x7f0000001340)={0x0, 0x0, &(0x7f0000001300)={&(0x7f0000000180)=ANY=[@ANYBLOB="40002613c3151f0af827869a01ccfb6900000000", @ANYRES32=0x0, @ANYBLOB="0000000000000000200012001000010069703665727370616e0000000c0004000800030000000000"], 0x40}}, 0x0) 16:05:08 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001340)={0x0, 0x0, &(0x7f0000001300)={&(0x7f0000000180)=@newlink={0x40, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, @ip6erspan={{0x10, 0x1, 'ip6erspan\x00'}, {0xc, 0x4, [@gre_common_policy=[@IFLA_GRE_IFLAGS={0x8, 0x3}]]}}}]}, 0x40}}, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='f\\\xbe]\xf1\x9f a\x00') write$P9_RSTATFS(r1, &(0x7f0000000040)={0x43, 0x9, 0x2, {0x3, 0xbf, 0x6, 0x4, 0x1c, 0x65, 0x0, 0x0, 0x80000000}}, 0x43) [ 951.089193] libceph: parse_ips bad ip '[d::]: [ 951.089193] llb' [ 951.109605] libceph: parse_ips bad ip '[]::]: [ 951.109605] llb' 16:05:08 executing program 4: socketpair(0xf, 0x807, 0x2, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$IP_VS_SO_SET_FLUSH(r0, 0x0, 0x485, 0x0, 0x0) mknod$loop(&(0x7f0000000340)='./file0\x00', 0xfffffffffc, 0x1) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="5b643a3a0776e0536c623a00"], &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x20000, 0x0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00') sendmsg$IPVS_CMD_ZERO(r1, &(0x7f00000002c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000280)={&(0x7f00000001c0)={0x90, r2, 0x400, 0x70bd2d, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x4}, @IPVS_CMD_ATTR_SERVICE={0x28, 0x1, [@IPVS_SVC_ATTR_SCHED_NAME={0xc, 0x6, 'lblcr\x00'}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'wlc\x00'}, @IPVS_SVC_ATTR_FWMARK={0x8}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}]}, @IPVS_CMD_ATTR_DAEMON={0x14, 0x3, [@IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0xfffffffffffffff7}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e21}]}, @IPVS_CMD_ATTR_SERVICE={0x38, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0xfffffffffffffff9}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x58}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x31, 0x29}}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x1}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x9}]}]}, 0x90}, 0x1, 0x0, 0x0, 0x20040004}, 0x20040000) syz_open_dev$cec(&(0x7f0000000300)='/dev/cec#\x00', 0x2, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x1) [ 951.152818] libceph: parse_ips bad ip '[d::]: [ 951.152818] llb' [ 951.156884] libceph: parse_ips bad ip '[]::]: [ 951.156884] llb' 16:05:08 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020200090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e0100000001000000000000002402000100f8ffffff0000200200000000030005000000000002004e20e00000010000000000000000"], 0x60}}, 0x0) 16:05:08 executing program 1: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[]::]:\nllb:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\xff', 0x0, 0x0) 16:05:08 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = syz_open_dev$swradio(&(0x7f0000000140)='/dev/swradio#\x00', 0x0, 0x2) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) sendmsg$nl_route(r0, &(0x7f0000001340)={0x0, 0x0, &(0x7f0000001300)={&(0x7f0000000180)=@newlink={0x40, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, @ip6erspan={{0x10, 0x1, 'ip6erspan\x00'}, {0xc, 0x4, [@gre_common_policy=[@IFLA_GRE_IFLAGS={0x8, 0x3}]]}}}]}, 0x40}}, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000000)='security.capability\x00', &(0x7f0000000100)=@v3={0x3000000, [{0x1000, 0x3b}, {0x8, 0x80}]}, 0x18, 0x3) [ 951.578585] IPVS: ftp: loaded support on port[0] = 21 16:05:09 executing program 0 (fault-call:1 fault-nth:0): r0 = syz_open_procfs(0x0, &(0x7f0000000040)='fdinfo\x00') getdents64(r0, &(0x7f0000000000)=""/60, 0x3c) 16:05:09 executing program 1: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[]::]:\nllb:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 16:05:09 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020200090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e0100000001000000000000002402000100f8ffffff0002000200000000030005000000000002004e20e00000010000000000000000"], 0x60}}, 0x0) 16:05:09 executing program 4: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f00000001c0)=ANY=[@ANYBLOB="5b643a3a5d3a0a6c6c623a00fd1615720f76609e89aa45924fb80f70a25d5d496e020745b0e2d4a282e480866315f9991b260c9f2f3ac7e8778e837298873b619929ec0f774eff285a9d796245346eb18649322f72317f0df472ea3aada6fed807d2ca4c4eb0648d746d3d4bb95949937c205277064dc562c690d12c88c5c62ced1818ee65eada9147f72eaddf7bfa3a95c03a5d71c8b02ad2b756cb0069dde74a147cd92d8c9faf4f5f079ef2654bf737c834531b"], &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 16:05:09 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, 0x0, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_INFO(r1, 0x29, 0x40, &(0x7f00000000c0)={'security\x00\x00\x00\x1d\x00'}, &(0x7f0000000140)=0x54) 16:05:09 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001340)={0x0, 0x0, &(0x7f0000001300)={&(0x7f0000000180)=@newlink={0x40, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, @ip6erspan={{0x10, 0x1, 'ip6erspan\x00'}, {0xc, 0x4, [@gre_common_policy=[@IFLA_GRE_IFLAGS={0x8, 0x3}]]}}}]}, 0x40}}, 0x0) shmget$private(0x0, 0x2000, 0x1000, &(0x7f0000ffe000/0x2000)=nil) [ 951.683931] FAULT_INJECTION: forcing a failure. [ 951.683931] name failslab, interval 1, probability 0, space 0, times 0 [ 951.701224] libceph: parse_ips bad ip '[]::]: [ 951.701224] llb' [ 951.708909] libceph: parse_ips bad ip '[d::]: [ 951.708909] llb' [ 951.728957] libceph: parse_ips bad ip '[]::]: 16:05:09 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020200090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e0100000001000000000000002402000100f8ffffff0000000300000000030005000000000002004e20e00000010000000000000000"], 0x60}}, 0x0) [ 951.728957] llb' [ 951.745179] IPVS: ftp: loaded support on port[0] = 21 [ 951.753086] libceph: parse_ips bad ip '[d::]: [ 951.753086] llb' [ 951.761151] CPU: 1 PID: 12955 Comm: syz-executor0 Not tainted 4.20.0-rc7+ #381 [ 951.768541] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 951.777898] Call Trace: [ 951.780530] dump_stack+0x244/0x39d [ 951.784184] ? dump_stack_print_info.cold.1+0x20/0x20 [ 951.789399] should_fail.cold.4+0xa/0x17 [ 951.793491] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 951.798627] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 951.804186] ? check_preemption_disabled+0x48/0x280 [ 951.809233] ? debug_smp_processor_id+0x1c/0x20 [ 951.813918] ? zap_class+0x640/0x640 [ 951.817649] ? lock_unpin_lock+0x4a0/0x4a0 [ 951.821894] ? lock_unpin_lock+0x4a0/0x4a0 [ 951.826150] ? find_held_lock+0x36/0x1c0 [ 951.830228] ? __lock_is_held+0xb5/0x140 [ 951.834322] ? perf_trace_sched_process_exec+0x860/0x860 [ 951.839923] __should_failslab+0x124/0x180 [ 951.844642] should_failslab+0x9/0x14 [ 951.848470] kmem_cache_alloc+0x2be/0x730 [ 951.852877] ? mark_held_locks+0x130/0x130 [ 951.857497] __d_alloc+0xc8/0xb90 [ 951.861207] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 951.867071] ? check_preemption_disabled+0x48/0x280 [ 951.872107] ? shrink_dcache_for_umount+0x2b0/0x2b0 [ 951.877134] ? debug_smp_processor_id+0x1c/0x20 [ 951.877176] ? perf_trace_lock_acquire+0x15b/0x800 [ 951.877203] ? perf_trace_lock+0x7a0/0x7a0 [ 951.877222] ? lock_unpin_lock+0x4a0/0x4a0 [ 951.895539] ? print_usage_bug+0xc0/0xc0 [ 951.895557] ? zap_class+0x640/0x640 [ 951.895571] ? zap_class+0x640/0x640 [ 951.895587] ? perf_trace_lock+0x7a0/0x7a0 [ 951.895619] d_alloc+0x96/0x380 [ 951.895638] ? __d_alloc+0xb90/0xb90 [ 951.911337] d_alloc_parallel+0x15a/0x1f40 [ 951.922531] ? check_preemption_disabled+0x48/0x280 [ 951.922555] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 951.922573] ? rcu_softirq_qs+0x20/0x20 [ 951.922599] ? __d_lookup_rcu+0xaa0/0xaa0 [ 951.922627] ? __d_lookup+0x5b8/0x9e0 [ 951.940664] ? d_alloc_parallel+0x1f40/0x1f40 [ 951.940681] ? d_lookup+0x255/0x300 [ 951.940698] ? d_lookup+0x255/0x300 [ 951.940717] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 951.940741] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 951.949010] ? d_hash_and_lookup+0x150/0x1c0 [ 951.949045] ? trace_hardirqs_off_caller+0x310/0x310 [ 951.949076] ? debug_smp_processor_id+0x1c/0x20 [ 951.949097] ? __lockdep_init_map+0x105/0x590 [ 951.949116] ? __lockdep_init_map+0x105/0x590 [ 951.949138] ? lockdep_init_map+0x9/0x10 [ 951.961002] ? __init_waitqueue_head+0x9e/0x150 [ 951.961023] ? init_wait_entry+0x1c0/0x1c0 [ 951.961040] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 951.961080] proc_fill_cache+0x3d5/0x630 [ 951.976081] ? proc_fd_instantiate+0x200/0x200 [ 951.976113] ? proc_task_lookup+0x3b0/0x3b0 [ 951.976139] ? pointer+0x900/0x900 [ 951.976168] ? snprintf+0xae/0xe0 [ 951.993864] proc_readfd_common+0x7c9/0xe90 [ 951.993884] ? proc_fd_instantiate+0x200/0x200 [ 951.993909] ? proc_lookupfdinfo+0x30/0x30 [ 951.993933] ? lock_release+0xa00/0xa00 [ 952.002836] ? debug_lockdep_rcu_enabled+0x77/0x90 [ 952.012441] ? fsnotify_first_mark+0x350/0x350 [ 952.012494] ? down_read_killable+0x90/0x150 [ 952.012509] ? filename_create+0x460/0x5b0 [ 952.012526] ? down_write+0x130/0x130 [ 952.012549] proc_readfdinfo+0x24/0x30 [ 952.032775] iterate_dir+0x48c/0x5d0 [ 952.032808] ksys_getdents64+0x228/0x450 [ 952.032828] ? __ia32_sys_getdents+0x4f0/0x4f0 16:05:09 executing program 1: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[]::]:\nllb:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 16:05:09 executing program 3: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x100, 0x0) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_GET_SERVICE(r0, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x7c, r1, 0x4, 0x70bd27, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_DEST={0x30, 0x2, [@IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x8}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x1}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x3}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@multicast1}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x3}, @IPVS_CMD_ATTR_SERVICE={0x20, 0x1, [@IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@mcast1}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'rr\x00'}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0xf1c}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x7}]}, 0x7c}, 0x1, 0x0, 0x0, 0x20008080}, 0x4000000) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000001340)={0x0, 0x0, &(0x7f0000001300)={&(0x7f0000000180)=@newlink={0x40, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, @ip6erspan={{0x10, 0x1, 'ip6erspan\x00'}, {0xc, 0x4, [@gre_common_policy=[@IFLA_GRE_IFLAGS={0x8, 0x3}]]}}}]}, 0x40}}, 0x0) [ 952.032843] ? iterate_dir+0x5d0/0x5d0 [ 952.032870] ? trace_hardirqs_off_caller+0x310/0x310 [ 952.050569] __x64_sys_getdents64+0x73/0xb0 [ 952.050593] do_syscall_64+0x1b9/0x820 [ 952.050610] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 952.050630] ? syscall_return_slowpath+0x5e0/0x5e0 [ 952.050647] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 952.050667] ? trace_hardirqs_on_caller+0x310/0x310 [ 952.063872] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 952.063893] ? prepare_exit_to_usermode+0x291/0x3b0 [ 952.063919] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 952.063950] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 952.097659] RIP: 0033:0x457669 [ 952.097679] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 952.097688] RSP: 002b:00007f934afb1c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000d9 [ 952.097705] RAX: ffffffffffffffda RBX: 00007f934afb1c90 RCX: 0000000000457669 16:05:09 executing program 4: openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000001400)='/dev/qat_adf_ctl\x00', 0x8000, 0x0) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[d::]:\nllb:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) r0 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffff9c) recvmsg$kcm(r0, &(0x7f0000000140)={&(0x7f00000001c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000000000)=[{&(0x7f0000000240)=""/89, 0x59}, {&(0x7f00000002c0)=""/191, 0xbf}, {&(0x7f0000000380)=""/4096, 0x1000}, {&(0x7f0000001380)=""/113, 0x71}], 0x4, &(0x7f00000000c0)=""/40, 0x28}, 0x2040) [ 952.097715] RDX: 000000000000003c RSI: 0000000020000000 RDI: 0000000000000003 [ 952.097724] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 952.097734] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f934afb26d4 [ 952.097744] R13: 00000000004be08d R14: 00000000004cdf18 R15: 0000000000000004 [ 952.174337] libceph: parse_ips bad ip '[]::]: [ 952.174337] llb' [ 952.205357] libceph: parse_ips bad ip '[]::]: [ 952.205357] llb' 16:05:09 executing program 1: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[]::]:\nllb:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 16:05:09 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020200090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e0100000001000000000000002402000100f8ffffff0000000a00000000030005000000000002004e20e00000010000000000000000"], 0x60}}, 0x0) [ 952.286932] libceph: parse_ips bad ip '[d::]: [ 952.286932] llb' 16:05:10 executing program 0 (fault-call:1 fault-nth:1): r0 = syz_open_procfs(0x0, &(0x7f0000000040)='fdinfo\x00') getdents64(r0, &(0x7f0000000000)=""/60, 0x3c) 16:05:10 executing program 1: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[]::]:\nllb:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) [ 952.347906] libceph: parse_ips bad ip '[]::]: [ 952.347906] llb' [ 952.376434] libceph: parse_ips bad ip '[d::]: [ 952.376434] llb' [ 952.442423] FAULT_INJECTION: forcing a failure. [ 952.442423] name failslab, interval 1, probability 0, space 0, times 0 [ 952.460956] CPU: 0 PID: 13005 Comm: syz-executor0 Not tainted 4.20.0-rc7+ #381 [ 952.468344] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 952.477706] Call Trace: [ 952.480312] dump_stack+0x244/0x39d [ 952.483965] ? dump_stack_print_info.cold.1+0x20/0x20 [ 952.489186] should_fail.cold.4+0xa/0x17 [ 952.493268] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 952.498400] ? lock_downgrade+0x900/0x900 [ 952.502572] ? check_preemption_disabled+0x48/0x280 [ 952.507613] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 952.512554] ? kasan_check_read+0x11/0x20 [ 952.516735] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 952.522024] ? zap_class+0x640/0x640 [ 952.525753] ? trace_hardirqs_off_caller+0x310/0x310 [ 952.530875] ? find_held_lock+0x36/0x1c0 [ 952.534956] ? __lock_is_held+0xb5/0x140 [ 952.539109] ? devm_tinydrm_init+0xd8/0x190 [ 952.543472] ? perf_trace_sched_process_exec+0x860/0x860 [ 952.548955] __should_failslab+0x124/0x180 [ 952.553213] should_failslab+0x9/0x14 [ 952.557027] kmem_cache_alloc+0x2be/0x730 [ 952.561186] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 952.565790] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 952.571348] ? proc_i_callback+0x30/0x30 [ 952.575416] proc_alloc_inode+0x1b/0x190 [ 952.579487] alloc_inode+0x63/0x190 [ 952.579505] new_inode_pseudo+0x71/0x1a0 [ 952.579521] ? prune_icache_sb+0x1c0/0x1c0 [ 952.579539] ? __lockdep_init_map+0x105/0x590 [ 952.579570] new_inode+0x1c/0x40 [ 952.579590] proc_pid_make_inode+0x23/0x210 [ 952.579609] proc_fdinfo_instantiate+0x5a/0x150 [ 952.603663] proc_fill_cache+0x45e/0x630 [ 952.603682] ? proc_fd_instantiate+0x200/0x200 [ 952.603705] ? proc_task_lookup+0x3b0/0x3b0 [ 952.603729] ? pointer+0x900/0x900 [ 952.603757] ? snprintf+0xae/0xe0 [ 952.628348] proc_readfd_common+0x7c9/0xe90 [ 952.632686] ? proc_fd_instantiate+0x200/0x200 [ 952.637285] ? proc_lookupfdinfo+0x30/0x30 [ 952.637311] ? lock_release+0xa00/0xa00 [ 952.637332] ? debug_lockdep_rcu_enabled+0x77/0x90 [ 952.637351] ? fsnotify_first_mark+0x350/0x350 [ 952.637383] ? down_read_killable+0x90/0x150 [ 952.659482] ? filename_create+0x460/0x5b0 [ 952.659502] ? down_write+0x130/0x130 [ 952.659528] proc_readfdinfo+0x24/0x30 [ 952.659545] iterate_dir+0x48c/0x5d0 [ 952.659576] ksys_getdents64+0x228/0x450 [ 952.671475] ? __ia32_sys_getdents+0x4f0/0x4f0 [ 952.671491] ? iterate_dir+0x5d0/0x5d0 [ 952.671516] ? trace_hardirqs_off_caller+0x310/0x310 16:05:10 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020200090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e0100000001000000000000002402000100f8ffffff0000003f00000000030005000000000002004e20e00000010000000000000000"], 0x60}}, 0x0) [ 952.671541] __x64_sys_getdents64+0x73/0xb0 [ 952.671568] do_syscall_64+0x1b9/0x820 [ 952.687764] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 952.687786] ? syscall_return_slowpath+0x5e0/0x5e0 [ 952.687803] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 952.687823] ? trace_hardirqs_on_caller+0x310/0x310 [ 952.687841] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 952.687865] ? prepare_exit_to_usermode+0x291/0x3b0 [ 952.701151] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 952.701176] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 952.701190] RIP: 0033:0x457669 [ 952.701207] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 952.721313] RSP: 002b:00007f934afb1c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000d9 [ 952.721330] RAX: ffffffffffffffda RBX: 00007f934afb1c90 RCX: 0000000000457669 [ 952.721340] RDX: 000000000000003c RSI: 0000000020000000 RDI: 0000000000000003 [ 952.721350] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 16:05:10 executing program 4: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x80000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r0, &(0x7f0000000280)={0x4, 0x8, 0xfa00, {r1}}, 0x10) mount(&(0x7f00000001c0)=ANY=[@ANYBLOB="5b643a050000006c6c623a000600df0475175798c5bd1e23508bd253c7a57e89d314431b6479352c617bcf1b1737de81b40d56efa5e3f55445af1bcc12cdde2c0eb98079ae3c0ddadd9da667b3f16f477036f7c0a569900fbebbdf6e69"], &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) [ 952.721361] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f934afb26d4 [ 952.721371] R13: 00000000004be08d R14: 00000000004cdf18 R15: 0000000000000004 [ 952.809325] libceph: parse_ips bad ip '[]::]: [ 952.809325] llb' [ 952.828420] libceph: parse_ips bad ip '[]::]: [ 952.828420] llb' [ 952.881706] ceph: device name is missing path (no : separator in [d:) 16:05:10 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, 0x0, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_INFO(r1, 0x29, 0x40, &(0x7f00000000c0)={'security\x00\x00\x00.\x03\x00'}, &(0x7f0000000140)=0x54) 16:05:10 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020200090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e0100000001000000000000002402000100f8ffffff0000002c00000000030005000000000002004e20e00000010000000000000000"], 0x60}}, 0x0) 16:05:10 executing program 4: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[d::]:\nllb:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x7, 0x40000) ioctl$KDSKBSENT(r0, 0x4b49, &(0x7f00000001c0)="d6325b39e694126988299547d147ae92b5cbe997fdb6c705e473dc96df93b3bd5735510d8225368c1feef13fc277f929e6582226d136c25f41162b2932a86d375a64a5d66e183950e28cfc9fa1680f814271e5c0312b5dd4e4fede91420d8542622cec5c0981533f2427beddca1c187b1fa15eb1a40ec2bb9ff8713c35f696471e73624e5017672e45693c017332202f5ff4c7a80926c7ace6a7") 16:05:10 executing program 1: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[]::]:\nllb:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 16:05:10 executing program 3: r0 = syz_open_dev$mouse(&(0x7f00000000c0)='/dev/input/mouse#\x00', 0xcc, 0x101000) setsockopt$TIPC_DEST_DROPPABLE(r0, 0x10f, 0x81, &(0x7f0000000100)=0x9, 0x4) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000001340)={0x0, 0x0, &(0x7f0000001300)={&(0x7f0000000000)=ANY=[@ANYBLOB="40407d0010001fff000000000000000000000000a6be18c530f17f271ad843875201f166ff79ee", @ANYRES32=0x0, @ANYBLOB="00000000000000002000120010000100697036657273bbceb9924a7684fb04000800030000000000"], 0x40}}, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) 16:05:10 executing program 0 (fault-call:1 fault-nth:2): r0 = syz_open_procfs(0x0, &(0x7f0000000040)='fdinfo\x00') getdents64(r0, &(0x7f0000000000)=""/60, 0x3c) [ 953.250741] libceph: parse_ips bad ip '[]::]: [ 953.250741] llb' [ 953.261883] libceph: parse_ips bad ip '[d::]: [ 953.261883] llb' [ 953.277916] libceph: parse_ips bad ip '[]::]: [ 953.277916] llb' 16:05:10 executing program 1: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[]::]:\nllb:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 16:05:10 executing program 3: r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f00000002c0)="0bd8ce2e3fdc009a2644da0dc425d6ed4bddfa31718bd9fab5f34e39052f9d479d9267677ce261e73cfbb5c33791bdaf1e8d843b2392b34bda650d6b1de53f07ae8fd96ab82a0e7e3e4c9a32606930b9766c357cc5d49950ddaf902530095a", 0x5f, 0xfffffffffffffffa) lstat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000400)='./file0\x00', &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) keyctl$chown(0x4, r0, r1, r2) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video35\x00', 0x2, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = syz_open_dev$adsp(&(0x7f0000000040)='/dev/adsp#\x00', 0x3, 0x200) getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000080)=@assoc_value={0x0}, &(0x7f0000000140)=0xfffffffffffffceb) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f00000001c0)={r5, @in6={{0xa, 0x4e24, 0x4, @remote, 0x6}}}, &(0x7f0000000100)=0x84) sendmsg$nl_route(r3, &(0x7f0000001340)={0x0, 0x0, &(0x7f0000001300)={&(0x7f0000000180)=@newlink={0x40, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, @ip6erspan={{0x10, 0x1, 'ip6erspan\x00'}, {0xc, 0x4, [@gre_common_policy=[@IFLA_GRE_IFLAGS={0x8, 0x3}]]}}}]}, 0x40}}, 0x0) 16:05:10 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='fdinfo\x00') getdents64(r0, &(0x7f0000000000)=""/60, 0x3c) 16:05:10 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020200090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e0100000001000000000000002402000100f8ffffff0000020200000000030005000000000002004e20e00000010000000000000000"], 0x60}}, 0x0) [ 953.301562] libceph: parse_ips bad ip '[d::]: [ 953.301562] llb' [ 953.336578] IPVS: ftp: loaded support on port[0] = 21 16:05:11 executing program 4: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lsetxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='trusted.overlay.nlink\x00', &(0x7f0000000140)={'L+', 0x5}, 0x28, 0x3) mount(&(0x7f0000000040)=@nullb='[d::]:\nllb:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 16:05:11 executing program 1: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[]::]:\nllb:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) [ 953.432445] libceph: parse_ips bad ip '[]::]: [ 953.432445] llb' [ 953.535396] libceph: parse_ips bad ip '[]::]: [ 953.535396] llb' [ 953.569228] libceph: parse_ips bad ip '[d::]: [ 953.569228] llb' [ 953.618280] libceph: parse_ips bad ip '[]::]: [ 953.618280] llb' 16:05:11 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, 0x0, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_INFO(r1, 0x29, 0x40, &(0x7f00000000c0)={'security\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x96\x00'}, &(0x7f0000000140)=0x54) 16:05:11 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='fdinfo\x00') getdents64(r0, &(0x7f0000000000)=""/60, 0x18) 16:05:11 executing program 3: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000300)='/dev/snapshot\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000340)={0x0, 0x26}, &(0x7f0000000380)=0x8) setsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f00000003c0)={r1, @in={{0x2, 0x4e23, @empty}}}, 0x84) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = syz_open_dev$radio(&(0x7f0000000180)='/dev/radio#\x00', 0x0, 0x2) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r3, 0x40106614, &(0x7f00000002c0)={0x0, @speck128}) ioctl$SIOCGIFMTU(r3, 0x8921, &(0x7f00000001c0)) sendmsg$nl_route(r2, &(0x7f0000001340)={0x0, 0x0, &(0x7f0000001300)={&(0x7f0000000000)=ANY=[@ANYBLOB="400000001090b502e900000000e9ff0000000000e93427ba26470a4f754af6ff5b03a0e183", @ANYRES32=0x0, @ANYBLOB="0000000000000000200012001000010069703665727370616e0000000c0004000800030000000000"], 0x3}}, 0x404007f) perf_event_open(&(0x7f0000000240)={0x3, 0x70, 0x8, 0x4, 0x80000001, 0x100000000, 0x0, 0x7fff, 0x20, 0x9, 0x100000000, 0x2, 0x9a, 0x3, 0x7e, 0x1c, 0x5, 0x1, 0xfffffffffffffeff, 0x5d90e2b0, 0x2, 0x0, 0x100000001, 0x5, 0x7, 0x5, 0xffffffffffffffff, 0x4, 0x10a3, 0x80, 0x40, 0x6, 0x6, 0x409a, 0xfffffffffffffff8, 0x80, 0x1ff, 0xffffffff, 0x0, 0x6, 0x6, @perf_bp={&(0x7f0000000200), 0x8}, 0x800, 0x6, 0x2, 0x7, 0x0, 0xa5c6}, 0xffffffffffffffff, 0xe, r3, 0x2) r4 = fcntl$dupfd(r2, 0x406, r2) ioctl$sock_inet_SIOCSARP(r4, 0x8955, &(0x7f0000000100)={{0x2, 0x4e23, @loopback}, {0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xf}}, 0x60, {0x2, 0x4e23, @empty}, 'bond_slave_1\x00'}) setsockopt$packet_buf(r4, 0x107, 0x5, &(0x7f0000000080)="11434a9ad517d3c6d9230b3215c2eddcd119b6802eea028533e0df5f8e2a6bd74a18d4076db4c5bed0183238fea40aea0f9fe957a8489f90edc4c6f04352a7e941f45a50eb5b88b9493f8b5579", 0x4d) 16:05:11 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020200090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e0100000001000000000000002402000100f8ffffff0000100200000000030005000000000002004e20e00000010000000000000000"], 0x60}}, 0x0) 16:05:11 executing program 4: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[d::]:\nllb:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) umount2(&(0x7f0000000000)='./file0\x00', 0x1) 16:05:11 executing program 1: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[]::]:\nllb:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 16:05:11 executing program 1: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[]::]:\nllb:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 16:05:11 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020200090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e0100000001000000000000002402000100f8ffffff0000040200000000030005000000000002004e20e00000010000000000000000"], 0x60}}, 0x0) [ 953.988025] libceph: parse_ips bad ip '[]::]: [ 953.988025] llb' [ 953.998766] libceph: parse_ips bad ip '[d::]: [ 953.998766] llb' 16:05:11 executing program 4: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = request_key(&(0x7f0000000000)='syzkaller\x00', &(0x7f00000000c0)={'syz', 0x1}, &(0x7f0000000140)='[d::]:\nllb:\x00', 0xfffffffffffffff9) r1 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000240)="4d2f7c83bfb667201afac302be0a6d7b6775d23d12b9fba7bf787d31b02c4bca753dab8787ee4a4a9fd16ea3b0805842264d41e92875054709c666f2d79cc9a89648719b076bb12b3a0fc5e5db7ff5903227c3f161ae8d754132972c20a4e734ef9f233bda5bd143f255f777e7e13b478c3bd5f7359bb8e97fd608cea00a6f48d18336894448861aab418bff59db112f477840f7cc387bfdbddb3736", 0x9c, 0xfffffffffffffff9) recvmmsg(0xffffffffffffff9c, &(0x7f0000004f00)=[{{&(0x7f00000005c0)=@in={0x2, 0x0, @remote}, 0x80, &(0x7f0000001a00)=[{&(0x7f0000000640)=""/191, 0xbf}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f0000001700)=""/250, 0xfa}, {&(0x7f0000001800)=""/149, 0x95}, {&(0x7f00000018c0)=""/5, 0x5}, {&(0x7f0000001900)=""/161, 0xa1}, {&(0x7f00000019c0)=""/13, 0xd}], 0x7, &(0x7f0000001a80)=""/138, 0x8a}, 0xfff}, {{&(0x7f0000001b40)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000001e80)=[{&(0x7f0000001bc0)=""/65, 0x41}, {&(0x7f0000001c40)=""/150, 0x96}, {&(0x7f0000001d00)=""/64, 0x40}, {&(0x7f0000001d40)=""/171, 0xab}, {&(0x7f0000001e00)=""/27, 0x1b}, {&(0x7f0000001e40)=""/64, 0x40}], 0x6}, 0x1f}, {{&(0x7f0000001f00)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000003640)=[{&(0x7f0000001f80)=""/4096, 0x1000}, {&(0x7f0000002f80)=""/244, 0xf4}, {&(0x7f0000003080)=""/231, 0xe7}, {&(0x7f0000003180)=""/248, 0xf8}, {&(0x7f0000003280)=""/231, 0xe7}, {&(0x7f0000003380)=""/245, 0xf5}, {&(0x7f0000003480)=""/199, 0xc7}, {&(0x7f0000003580)=""/157, 0x9d}], 0x8, &(0x7f00000036c0)=""/34, 0x22}, 0x3}, {{0x0, 0x0, &(0x7f0000003700), 0x0, &(0x7f0000003740)=""/226, 0xe2}, 0x9}, {{&(0x7f0000003840)=@in={0x2, 0x0, @remote}, 0x80, &(0x7f00000049c0)=[{&(0x7f00000038c0)=""/4096, 0x1000}, {&(0x7f00000048c0)}, {&(0x7f0000004900)=""/191, 0xbf}], 0x3, &(0x7f0000004a00)=""/37, 0x25}, 0x100000000}, {{&(0x7f0000004a40)=@un=@abs, 0x80, &(0x7f0000004d00)=[{&(0x7f0000004ac0)=""/237, 0xed}, {&(0x7f0000004bc0)=""/119, 0x77}, {&(0x7f0000004c40)=""/173, 0xad}], 0x3, &(0x7f0000004d40)=""/52, 0x34}, 0x9}, {{&(0x7f0000004d80)=@pppoe={0x18, 0x0, {0x0, @broadcast}}, 0x80, &(0x7f0000004ec0)=[{&(0x7f0000004e00)=""/55, 0x37}, {&(0x7f0000004e40)}, {&(0x7f0000004e80)}], 0x3}, 0xb6000000000000}], 0x7, 0x12100, &(0x7f00000050c0)={0x0, 0x1c9c380}) bind$bt_rfcomm(r2, &(0x7f0000005100)={0x1f, {0x5, 0x80, 0x2, 0xff, 0x40, 0x6f6}, 0x6}, 0xa) r3 = add_key(&(0x7f0000000300)='big_key\x00', &(0x7f0000000340)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$dh_compute(0x17, &(0x7f0000000380)={r0, r1, r3}, &(0x7f00000003c0)=""/140, 0x8c, &(0x7f0000000580)={&(0x7f0000000480)={'md4-generic\x00'}, &(0x7f00000004c0)="bd4d412c251bd3dd8a4413bef6e50365b0ef634b61190373f6de70cecab7a0b01f16592c8a1399694164e07c23c82f0e2e5ca71d7f7606918dd18dd06d99752566198b982a2f16f8ada5ad9db5c90c96d0ba28340f61dabeb7dfd3373744d62e5e3678ab0d4dfc7d7e78739e31c709ca57efc304d083f51b68c0988d2fced1cb03333d423e5385b84d4f73a310930a4ae9852e46c13a3b532641", 0x9a}) mount(&(0x7f0000000040)=@nullb='[d::]:\nllb:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) [ 954.062454] IPVS: ftp: loaded support on port[0] = 21 16:05:11 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='fdinfo\x00') getdents64(r0, &(0x7f0000000000)=""/60, 0x2000003c) 16:05:11 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x10000, 0x200) r2 = syz_open_dev$radio(&(0x7f00000001c0)='/dev/radio#\x00', 0x2, 0x2) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f0000000080)={0x7fffffff, 0x20, 0xa38, 0x8, 0xffffffffffffff80}, 0x14) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r2, 0x84, 0x76, &(0x7f0000000280)={0x0, 0x23e}, &(0x7f00000002c0)=0x8) setsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r2, 0x84, 0x1f, &(0x7f0000000300)={r5, @in6={{0xa, 0x4e24, 0xc11, @remote, 0x3}}, 0x8, 0x1}, 0x90) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) symlink(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0/file0\x00') umount2(&(0x7f0000000000)='./file0/file0/file0\x00', 0x0) sendmsg$nl_route(r0, &(0x7f0000001340)={0x0, 0x0, &(0x7f0000001300)={&(0x7f0000000180)=@newlink={0x40, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, @ip6erspan={{0x10, 0x1, 'ip6erspan\x00'}, {0xc, 0x4, [@gre_common_policy=[@IFLA_GRE_IFLAGS={0x8, 0x3}]]}}}]}, 0x40}}, 0x0) setsockopt$sock_int(r1, 0x1, 0x1e, &(0x7f0000000040)=0x6, 0x4) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) openat$vimc2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/video2\x00', 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000140)='team_slave_1\x00', 0x10) 16:05:11 executing program 1: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[]::]:\nllb:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x8c', 0x0, 0x0) [ 954.158228] libceph: parse_ips bad ip '[]::]: [ 954.158228] llb' [ 954.188282] libceph: parse_ips bad ip '[d::]: [ 954.188282] llb' [ 954.584727] IPVS: ftp: loaded support on port[0] = 21 16:05:12 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, 0x0, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_INFO(r1, 0x29, 0x40, &(0x7f00000000c0)={'security\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8a\x00'}, &(0x7f0000000140)=0x54) 16:05:12 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='fdinfo\x00') getdents64(r0, &(0x7f0000000000)=""/60, 0x3c) 16:05:12 executing program 4: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ceph\x00', 0x0, 0x0) 16:05:12 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020200090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e0100000001000000000000002402000100f8ffffff0000080200000000030005000000000002004e20e00000010000000000000000"], 0x60}}, 0x0) 16:05:12 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001340)={0x0, 0x0, &(0x7f0000001300)={&(0x7f0000000180)=ANY=[@ANYBLOB="400000001fff0000000000000000000000000000", @ANYRES32=0x0, @ANYBLOB="0000000000000000200012001000010069703665727370616e0000000c0004000800030000000000"], 0x40}}, 0x0) write$binfmt_script(r0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x141) clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) ioctl$sock_inet6_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000100)) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) setitimer(0x1, &(0x7f0000000080)={{r1, r2/1000+10000}, {r3, r4/1000+30000}}, &(0x7f00000000c0)) 16:05:12 executing program 1: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[]::]:\nllb:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0xf6ffffff00000000, 0x0) [ 954.743329] IPVS: ftp: loaded support on port[0] = 21 16:05:12 executing program 1: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[]::]:\nllb:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0xf0ffff, 0x0) [ 954.767714] ceph: device name is missing path (no : separator in /dev/nbd4) 16:05:12 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='fdinfo\x00') ioctl$SCSI_IOCTL_PROBE_HOST(r0, 0x5385, &(0x7f0000000080)={0x52, ""/82}) getdents64(r0, &(0x7f0000000000)=""/60, 0x3c) 16:05:12 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020200090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e0100000001000000000000002402000100f8ffffff0000000300000000030005000000000002004e20e00000010000000000000000"], 0x60}}, 0x0) 16:05:12 executing program 3: sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001340)={0x0, 0x0, &(0x7f0000001300)={&(0x7f0000000180)=@newlink={0x40, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, @ip6erspan={{0x10, 0x1, 'ip6erspan\x00'}, {0xc, 0x4, [@gre_common_policy=[@IFLA_GRE_IFLAGS={0x8, 0x3}]]}}}]}, 0x40}}, 0x0) [ 954.819971] ceph: device name is missing path (no : separator in /dev/nbd4) 16:05:12 executing program 4: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x82a0, 0x1) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f00000000c0)='[d::]:\nllb:\x00', 0x2) mount(&(0x7f0000000140)=ANY=[@ANYBLOB="00003a3aff03001805c600200000001c35838653a6777721c6f2c73ce817df74f52f8f69ca94fc6311a3e8c2319a4c7e992199cbbe71fdec4e72038863844f3e46d10626c7eb272620f619f565a5d51f34cb67b6fd695e7d27d6c37550134904bf4995d6c943cefecd8d5aeb8d138205fd062a6aba3a5535e6e29762430418cce390fe869b94a22fbc319b7f8c0f03a4b784064556bf3f4ae57cec86fc1e835527fe11da250ee98c4526551934cb4c0576fa64dfe95bfffdcce83f1deb74398e6955"], &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) ioctl$TIOCLINUX5(r0, 0x541c, &(0x7f0000000040)={0x5, 0x8, 0x6, 0x1, 0x1}) 16:05:12 executing program 1: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[]::]:\nllb:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0xffffff7f, 0x0) [ 955.297148] IPVS: ftp: loaded support on port[0] = 21 16:05:12 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, 0x0, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_INFO(r1, 0x29, 0x40, &(0x7f00000000c0)={'security\x00\x00\x00\x00\x00\x00\x14\x00'}, &(0x7f0000000140)=0x54) 16:05:12 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020200090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e0100000001000000000000002402000100f8ffffff0000000400000000030005000000000002004e20e00000010000000000000000"], 0x60}}, 0x0) 16:05:12 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x0, 0x0) ioctl$VIDIOC_SUBDEV_S_SELECTION(r1, 0xc040563e, &(0x7f0000000040)={0x1, 0x0, 0x0, 0x2, {0x4, 0x1ff, 0xfff, 0xffffffff}}) sendmsg$nl_route(r0, &(0x7f0000001340)={0x0, 0x0, &(0x7f0000001300)={&(0x7f0000000180)=ANY=[@ANYBLOB="40000010001fff00000000000000000000000000", @ANYRES32=0x0, @ANYBLOB="00000000000000002000120071d001006970af5737d5c8f136657273cffe54ae3428d8b204000800"], 0x40}}, 0x0) 16:05:12 executing program 0: r0 = getgid() r1 = accept4(0xffffffffffffff9c, &(0x7f0000000400)=@nfc_llcp, &(0x7f0000000480)=0x80, 0x800) setsockopt$packet_rx_ring(r1, 0x107, 0x5, &(0x7f00000004c0)=@req3={0x28, 0x4, 0x5, 0x8000, 0x5, 0x9, 0xfffffffffffff000}, 0x1c) io_setup(0x5, &(0x7f0000000200)=0x0) r3 = socket$l2tp(0x18, 0x1, 0x1) r4 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer\x00', 0x30100, 0x0) bind$alg(r4, &(0x7f0000000380)={0x26, 'aead\x00', 0x0, 0x0, 'seqiv(aegis128-aesni)\x00'}, 0x58) io_cancel(r2, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x1, 0x20, r3, &(0x7f0000000240)="a9e38548bb0a8064f9fd", 0xa, 0x0, 0x0, 0x0, r4}, &(0x7f0000000300)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000000c0)={0x0, 0x0, 0x0}, &(0x7f0000000100)=0xc) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) setresgid(r0, r5, r6) ioctl$KDGETKEYCODE(r4, 0x4b4c, &(0x7f0000000340)={0x9, 0x8}) r7 = syz_open_procfs(0x0, &(0x7f0000000040)='fdinfo\x00') getdents64(r7, &(0x7f0000000000)=""/60, 0x3c) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x8000, 0x0) 16:05:12 executing program 1: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[]::]:\nllb:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x4000, 0x0) 16:05:12 executing program 4: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[d::]:\nllb:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000002c00)='/dev/vhci\x00', 0x100c0, 0x0) fsetxattr$trusted_overlay_origin(r0, &(0x7f0000002c40)='trusted.overlay.origin\x00', &(0x7f0000002c80)='y\x00', 0x2, 0x3) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/udp6\x00') ioctl$EVIOCGKEYCODE(r1, 0x80084504, &(0x7f00000001c0)=""/137) syz_genetlink_get_family_id$nbd(&(0x7f00000000c0)='nbd\x00') 16:05:13 executing program 4: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = dup(0xffffffffffffffff) ioctl$BLKBSZGET(r0, 0x80081270, &(0x7f0000000000)) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="173af5fb193c4f0000623200"], &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000280)={{{@in6, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@dev}}, &(0x7f0000000140)=0xe8) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f00000000c0), &(0x7f00000001c0)=0x14) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000380)={'veth0\x00', r1}) [ 955.407076] libceph: parse_ips bad ip '[]::]: [ 955.407076] llb' [ 955.416932] libceph: parse_ips bad ip '[d::]: [ 955.416932] llb' [ 955.458211] IPVS: ftp: loaded support on port[0] = 21 16:05:13 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001340)={0x0, 0x0, &(0x7f0000001300)={&(0x7f0000000000)=ANY=[@ANYBLOB="4000000010001fff000000000000000000000000", @ANYRES32=0x0, @ANYBLOB="0000000000000000200012001000010069703665627370616e0000200c000400080003000026f1074c631f4b124cbe2714aa2d29bc4dd32b10963a74eb6a790dbdd2b3a3126d1a2f3aa7466409b317e3df1e924b8d5541386e46cffe8373c004ad5a01f7cb98a7651fdf825dc47c6e4b4a4f032ab0cc0281634e4556d692cb3e5c987cc208158de774d08bdac79fdb62a2880000000000000000000000"], 0x40}}, 0x0) 16:05:13 executing program 4: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="5b643a3a5d3acc503a263a00"], &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x2200, 0x0) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00') sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r0, &(0x7f0000000380)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x6}, 0xc, &(0x7f0000000340)={&(0x7f0000000280)={0x9c, r1, 0x1, 0x70bd2d, 0x25dfdbfd, {}, [@TIPC_NLA_SOCK={0x14, 0x2, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0x6}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0xfff}]}, @TIPC_NLA_BEARER={0x28, 0x1, [@TIPC_NLA_BEARER_PROP={0x24, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x15}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xffffffff856809eb}]}]}, @TIPC_NLA_LINK={0x4c, 0x4, [@TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x1c, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfffffffffffffffe}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3ff}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x14, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}]}]}]}, 0x9c}, 0x1, 0x0, 0x0, 0x40000}, 0x2004c800) write$binfmt_script(r0, &(0x7f00000001c0)={'#! ', './file0', [{0x20, 'ceph\x00'}, {}, {0x20, 'ceph\x00'}], 0xa, "732a7673dedbbdfe8eb24ba375e7876ed37d450de8f8af422c45977000088720cdf939a8d81e9db4eabb98ee2059af53b837c93d5f90c77e0cd195b0ef3e6241fa766c8e21fec35c7ab7ef05b9b751987a69b3a4de451fb154d2995c2cf064298c2c0324b86133cf96ed9499"}, 0x84) 16:05:13 executing program 1: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[]::]:\nllb:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x600, 0x0) 16:05:13 executing program 0: fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000000080)={0x0, 0x0}) r1 = syz_open_procfs(r0, &(0x7f0000000040)='fdin[o\x00') getdents64(r1, &(0x7f0000000000)=""/60, 0x3c) [ 955.520631] ceph: device name is missing path (no : separator in :õû0xffffffffffffffff}, 0x800) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_bt_bnep_BNEPCONNADD(r1, 0x400442c8, &(0x7f0000000100)={r0, 0x6, 0x5, "583212a6b4091ed9096a5ef959bf3cad782ba2191be67bc44583592906ae73c1b4503a85523f8b47ee6d3970a49d175d2b032f84eaff0498188e7b1a98877a571018997a2bb0d596e7afe35b57e470"}) sendmsg$nl_route(r0, &(0x7f0000001340)={0x0, 0x0, &(0x7f0000001300)={&(0x7f0000000040)=ANY=[@ANYBLOB="400000007e001fff0000000000000000000000003b69a7bd85", @ANYRES32=0x0, @ANYBLOB="0000000000000000200012001000010069703665727370616e0000000c0004000800030000000000"], 0x40}}, 0x0) r2 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x14f, 0x2000) ioctl$KDMKTONE(r2, 0x4b30, 0x7) openat$vcs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcs\x00', 0x2, 0x0) 16:05:13 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020200090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e0100000001000000000000002402000100f8ffffff000000fdffffff00030005000000000002004e20e00000010000000000000000"], 0x60}}, 0x0) 16:05:13 executing program 4: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lsetxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f00000001c0)={0x0, 0xfb, 0x108, 0x4, 0x6, "f9bb9730b809d264cfccad2c9e69952c", "ab9ed698464763fe561bc6c16f7f06286621790fc85875a0c474c8796b5d970dd48f80d2b88e4786399707df4b708b4d6bbc8ae97aec65c6f58829522356ab32dbf10aa17769d2db9c12b4ac1fe00bbe86f0616255c38adce3bfe6ced6f396cb4c7a150422193a29a9ea416af5d6475b240f512f8f0c6da6292d7562d7ec2db03c848493d1f074d34f641588c3a085d381fb5cb92318943d7955fc3bed6fb6111aed9978820b30fc4afff2843207384b8157908fc84d72efcbf02ead6735805f83e5d6467361d75e0afb1d36f9b6e1a8122f02d670660d0b2f0c52ae9eecab7ddfe6251e8a7131f3ce8748fbbeb95e44b0872c"}, 0x108, 0x1) mount(&(0x7f0000000040)=@nullb='[d::]:\nllb:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) setxattr$trusted_overlay_upper(&(0x7f0000000140)='./file0\x00', &(0x7f0000000300)='trusted.overlay.upper\x00', &(0x7f0000000340)={0x0, 0xfb, 0xd6, 0x2, 0x0, "58838a1b9fdf2067155d38fff4e55f24", "c05542d3bf1b10ac6a02d45941ea6a68a2857fbe35fa88bdf2c8b905a3a7eb423d7076413a1367ce7999666e72d4aa7dcb381efb06a1f6ffdfc0ca16dfee76f8531ff46bf60748a5f66308bf0348d79b77bff6b6cfc70f485327694d31034e9a83cae48a62f45fa645df23e003f953b5502bdfff071e9e5731dc0322503a8960f0aeec15c289d6307a7f064c3d752669de4a60e55e4903306f817a001565d99011141f1c4f70a457b00b70814ee03d0605a429e4103d7bb7ff918b3a436a362b20"}, 0xd6, 0x3) chroot(&(0x7f0000000440)='./file0\x00') [ 956.359875] IPVS: ftp: loaded support on port[0] = 21 16:05:14 executing program 1: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[]::]:\nllb:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x6, 0x0) 16:05:14 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='fdinfo\x00') getdents64(r0, &(0x7f0000000080)=""/60, 0xfffffffffffffedd) ioctl$BLKFRASET(r0, 0x1264, &(0x7f0000000000)=0x94d7) 16:05:14 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020200090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e0100000001000000000000002402000100f8ffffff0000000a00000000030005000000000002004e20e00000010000000000000000"], 0x60}}, 0x0) 16:05:14 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) socket(0x8, 0x6, 0x81) sendmsg$nl_route(r0, &(0x7f0000001340)={0x0, 0x0, &(0x7f0000001300)={&(0x7f0000000000)=@newlink={0x40, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, @ip6erspan={{0x10, 0x1, 'ip6erspan\x00'}, {0xc, 0x4, [@gre_common_policy=[@IFLA_GRE_IFLAGS={0x8, 0x3}]]}}}]}, 0x40}, 0x1, 0x0, 0x0, 0x4000}, 0x0) 16:05:14 executing program 0: r0 = creat(&(0x7f0000000440)='./file0\x00', 0x1000000000001a0) ioctl$KVM_SET_SREGS(r0, 0x4138ae84, &(0x7f00000000c0)={{0x6000, 0x5000, 0xa, 0x5, 0x5731e05c, 0x3f, 0xffff, 0x3, 0x0, 0x4, 0x9, 0x7984}, {0xd000, 0x5000, 0xf, 0x80000000, 0xffffffffffff0272, 0x8001, 0x0, 0x6, 0x8, 0xe60, 0x7fffffff, 0x3ce5}, {0x10000, 0x0, 0xf, 0x6, 0x1, 0x7, 0x3, 0x0, 0x6, 0x3, 0x1, 0x1ff}, {0xf000, 0x107006, 0xb, 0x8, 0x3bc, 0x3, 0x4, 0x10000, 0x7f, 0x140000, 0x4, 0x4}, {0x2002, 0x5000, 0xe, 0x7202, 0x9, 0x8, 0x3, 0x3242, 0x7f, 0x1, 0x9, 0x50000}, {0x3000, 0x10000, 0x10, 0x38000000000, 0x1, 0x7, 0x0, 0x1, 0x800, 0x3ff, 0x2}, {0xf000, 0x2000, 0xb, 0x0, 0x100000001, 0x9, 0x7, 0x7, 0x0, 0x8, 0x9, 0xed}, {0xf000, 0x1, 0xf, 0xd928, 0x1, 0x7ff, 0x12f, 0x2, 0x1, 0x200, 0x3, 0x25c}, {0xd003, 0x1000}, {0x110000}, 0x80000010, 0x0, 0xd004, 0x0, 0x4, 0x1000, 0xd000, [0x8001, 0x8, 0x7, 0x1]}) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fdinfo\x00') ioctl$SNDRV_RAWMIDI_IOCTL_PVERSION(r0, 0x80045700, &(0x7f0000000200)) getdents64(r1, &(0x7f0000000000)=""/60, 0x3c) ioctl$DRM_IOCTL_MODE_GETRESOURCES(r0, 0xc04064a0, &(0x7f0000000340)={&(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000280)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000002c0)=[0x0, 0x0], &(0x7f0000000300)=[0x0, 0x0], 0x9, 0x9, 0x2, 0x2}) ioctl$SNDRV_TIMER_IOCTL_PVERSION(r0, 0x80045400, &(0x7f0000000380)) 16:05:14 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='fdinfo\x00') getdents64(r0, &(0x7f0000000000)=""/60, 0x3c) connect$l2tp(r0, &(0x7f0000000080)=@pppol2tp={0x18, 0x1, {0x0, r0, {0x2, 0x4e21, @empty}, 0x3, 0x3, 0x2, 0x3}}, 0x26) [ 956.913885] IPVS: ftp: loaded support on port[0] = 21 [ 957.165886] IPVS: ftp: loaded support on port[0] = 21 [ 958.472714] bridge0: port 1(bridge_slave_0) entered blocking state [ 958.479352] bridge0: port 1(bridge_slave_0) entered disabled state [ 958.487018] device bridge_slave_0 entered promiscuous mode [ 958.569609] bridge0: port 2(bridge_slave_1) entered blocking state [ 958.582878] bridge0: port 2(bridge_slave_1) entered disabled state [ 958.598571] device bridge_slave_1 entered promiscuous mode [ 958.671959] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 958.723246] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 958.883037] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 958.938615] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 959.353312] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 959.361356] team0: Port device team_slave_0 added [ 959.458277] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 959.465817] team0: Port device team_slave_1 added [ 959.582726] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 959.589704] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 959.608151] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 959.678789] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 959.685680] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 959.702977] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 959.738578] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 959.745765] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 959.765557] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 959.810155] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 959.817314] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 959.835016] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready 16:05:17 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, 0x0, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_INFO(r1, 0x29, 0x40, &(0x7f00000000c0)={'security\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\xa6\x00'}, &(0x7f0000000140)=0x54) 16:05:17 executing program 4: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x1ff) getsockopt$inet6_tcp_buf(r0, 0x6, 0x1f, &(0x7f00000000c0)=""/60, &(0x7f0000000140)=0x3c) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) prctl$PR_GET_CHILD_SUBREAPER(0x25) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[d::]:\nllb:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 16:05:17 executing program 3: sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001340)={0x0, 0xfffffffffffffd88, &(0x7f0000001300)={&(0x7f0000000180)=@newlink={0x40, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, @ip6erspan={{0x10, 0x1, 'ip6erspan\x00'}, {0xc, 0x4, [@gre_common_policy=[@IFLA_GRE_IFLAGS={0x8, 0x3}]]}}}]}, 0xe8}}, 0x0) 16:05:17 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020200090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e0100000001000000000000002402000100f8ffffff0000000200000001030005000000000002004e20e00000010000000000000000"], 0x60}}, 0x0) 16:05:17 executing program 0: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000080)=0x0) r2 = syz_open_procfs(r1, &(0x7f0000000040)='fdknfo\x00') getdents64(r2, &(0x7f0000000000)=""/60, 0x3c) write$P9_RXATTRWALK(r0, &(0x7f0000000100)={0xf, 0x1f, 0x2, 0x8}, 0xf) ioctl$VIDIOC_DECODER_CMD(r2, 0xc0485660, &(0x7f0000000140)={0x0, 0x3, @raw_data=[0x4, 0x2, 0x20, 0x100000000, 0xfff, 0xf2b, 0x4, 0x7, 0xab4, 0x20, 0xfffffffffffffff7, 0x1f, 0x1, 0x1, 0x5, 0x1f]}) 16:05:17 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='fdinfo\x00') getdents64(r0, &(0x7f0000000000)=""/60, 0x3c) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000000080)={0x0, 0xde, "d286f0aec8036615d78adfdc7d69d3afe17c59563cacd7c2d904f672a23ab72c7840a54e19122818e679a44dc19f47e61993abf86e7d06ef8d9fbaf84e422bb7a15268a6dd196e6074a2b942738ab4634cadaac80c27353147a42d41e2b0b03833e43ea3f5c953e91531012715cdc18347ce74d061c8498d483212179d2c194da27d7068caa3f429f159be4a984543ef82525ba966ff4c883f10b937bf30eacea5a56d40c9f140a90a2a55b03f818d8c3781ff9aca70379ba905a6f64695768912b2a86385b3c77f95076cb70f53977232ea9af95d0f02773db8f9146585"}, &(0x7f0000000180)=0xe6) getsockopt$XDP_MMAP_OFFSETS(r0, 0x11b, 0x1, &(0x7f0000000200), &(0x7f0000000280)=0x60) setsockopt$inet_sctp_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f00000001c0)={r1, 0x49f, 0x4c6d, 0x3}, 0x10) [ 960.196661] IPVS: ftp: loaded support on port[0] = 21 [ 960.333269] IPVS: ftp: loaded support on port[0] = 21 [ 960.696552] bridge0: port 2(bridge_slave_1) entered blocking state [ 960.703003] bridge0: port 2(bridge_slave_1) entered forwarding state [ 960.709751] bridge0: port 1(bridge_slave_0) entered blocking state [ 960.716133] bridge0: port 1(bridge_slave_0) entered forwarding state [ 960.724995] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 961.100207] device bridge_slave_1 left promiscuous mode [ 961.105783] bridge0: port 2(bridge_slave_1) entered disabled state [ 961.115943] device bridge_slave_0 left promiscuous mode [ 961.122097] bridge0: port 1(bridge_slave_0) entered disabled state [ 961.130119] device bridge_slave_1 left promiscuous mode [ 961.135551] bridge0: port 2(bridge_slave_1) entered disabled state [ 961.143191] device bridge_slave_0 left promiscuous mode [ 961.148756] bridge0: port 1(bridge_slave_0) entered disabled state [ 961.198199] team0 (unregistering): Port device team_slave_1 removed [ 961.208698] team0 (unregistering): Port device team_slave_0 removed [ 961.221924] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 961.234994] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 961.265204] bond0 (unregistering): Released all slaves [ 961.295090] team0 (unregistering): Port device team_slave_1 removed [ 961.306909] team0 (unregistering): Port device team_slave_0 removed [ 961.317808] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 961.329220] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 961.359813] bond0 (unregistering): Released all slaves [ 961.668518] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 962.056899] bridge0: port 1(bridge_slave_0) entered blocking state [ 962.063749] bridge0: port 1(bridge_slave_0) entered disabled state [ 962.071752] device bridge_slave_0 entered promiscuous mode [ 962.122679] bridge0: port 2(bridge_slave_1) entered blocking state [ 962.129259] bridge0: port 2(bridge_slave_1) entered disabled state [ 962.136732] device bridge_slave_1 entered promiscuous mode [ 962.216388] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 962.305895] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 962.597475] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 962.691619] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 962.768157] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 962.775028] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 962.840798] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 962.847774] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 963.103286] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 963.118298] team0: Port device team_slave_0 added [ 963.247499] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 963.255020] team0: Port device team_slave_1 added [ 963.330763] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 963.388709] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 963.492623] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 963.508144] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 963.525717] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 963.600300] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 963.607910] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 963.618399] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 964.050229] 8021q: adding VLAN 0 to HW filter on device bond0 [ 964.240913] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 964.343654] bridge0: port 2(bridge_slave_1) entered blocking state [ 964.350100] bridge0: port 2(bridge_slave_1) entered forwarding state [ 964.356780] bridge0: port 1(bridge_slave_0) entered blocking state [ 964.363221] bridge0: port 1(bridge_slave_0) entered forwarding state [ 964.371438] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 964.427124] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 964.433950] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 964.450088] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 964.622814] 8021q: adding VLAN 0 to HW filter on device team0 [ 964.727741] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready 16:05:24 executing program 1: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[]::]:\nllb:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0xfffffffffffff000, 0x0) 16:05:24 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = gettid() ioctl$sock_SIOCSPGRP(r0, 0x8902, &(0x7f0000000000)=r1) sendmsg$nl_route(r0, &(0x7f0000001340)={0x0, 0x0, &(0x7f0000001300)={&(0x7f0000000180)=@newlink={0x40, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, @ip6erspan={{0x10, 0x1, 'ip6erspan\x00'}, {0xc, 0x4, [@gre_common_policy=[@IFLA_GRE_IFLAGS={0x8, 0x3}]]}}}]}, 0x40}}, 0x0) 16:05:24 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020200090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e0100000001000000000000002402000100f8ffffff00000002010000e0030005000000000002004e20e00000010000000000000000"], 0x60}}, 0x0) 16:05:24 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='fdinfo\x00') ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000080)=0x8000) getdents64(r0, &(0x7f0000000000)=""/60, 0x3c) 16:05:24 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, 0x0, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_INFO(r1, 0x29, 0x40, &(0x7f00000000c0)={'security\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8e\x00'}, &(0x7f0000000140)=0x54) [ 966.412813] libceph: parse_ips bad ip '[]::]: [ 966.412813] llb' 16:05:24 executing program 1: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[]::]:\nllb:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0xedc000000000, 0x0) [ 966.480257] IPVS: ftp: loaded support on port[0] = 21 16:05:24 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020200090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e0100000001000000000000002402000100f8ffffff0000000204000000030005000000000002004e20e00000010000000000000000"], 0x60}}, 0x0) [ 967.148060] 8021q: adding VLAN 0 to HW filter on device bond0 [ 967.250481] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 967.351893] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 967.359298] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 967.366507] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 967.471273] 8021q: adding VLAN 0 to HW filter on device team0 16:05:26 executing program 3: r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x100, 0x0) getsockopt$inet6_mtu(r0, 0x29, 0x17, &(0x7f0000000040), &(0x7f0000000080)=0x4) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000001340)={0x0, 0x0, &(0x7f0000001300)={&(0x7f0000000180)=@newlink={0x40, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, @ip6erspan={{0x10, 0x1, 'ip6erspan\x00'}, {0xc, 0x4, [@gre_common_policy=[@IFLA_GRE_IFLAGS={0x8, 0x3}]]}}}]}, 0x40}}, 0x0) 16:05:26 executing program 0: r0 = gettid() r1 = syz_open_procfs(r0, &(0x7f0000000040)) getdents64(r1, &(0x7f0000000000)=""/60, 0x3c) rt_sigprocmask(0x0, &(0x7f00000001c0)={0x7}, &(0x7f0000000200), 0x8) ioctl$KVM_S390_VCPU_FAULT(r1, 0x4008ae52, &(0x7f0000000100)=0x401) ioctl$SG_SET_DEBUG(r1, 0x227e, &(0x7f0000000080)=0x100000000) ioctl$DRM_IOCTL_AGP_INFO(r1, 0x80386433, &(0x7f0000000640)=""/216) setsockopt$packet_tx_ring(r1, 0x107, 0xd, &(0x7f0000000040)=@req3={0x4, 0x5, 0x0, 0x0, 0x1, 0xffffffff, 0xffffffffffffffe0}, 0x1c) setsockopt$bt_BT_RCVMTU(r1, 0x112, 0xd, &(0x7f00000000c0)=0x4, 0x2) 16:05:26 executing program 1: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[]::]:\nllb:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x7000000, 0x0) 16:05:26 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020200090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e0100000001000000000000002402000100f8ffffff0000000200034000030005000000000002004e20e00000010000000000000000"], 0x60}}, 0x0) 16:05:26 executing program 4: r0 = syz_open_dev$sndmidi(&(0x7f0000000000)='/dev/snd/midiC#D#\x00', 0x1f, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_DRAIN(r0, 0x40045731, &(0x7f00000000c0)=0x1a45) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() mount(&(0x7f0000000040)=@nullb='[d::]:\nllb:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vhci\x00', 0x10201, 0x0) ioctl$KVM_X86_SETUP_MCE(r1, 0x4008ae9c, &(0x7f0000000280)={0x7, 0x1, 0x100000000}) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x4100, 0x0) getpeername$inet(r2, &(0x7f00000001c0)={0x2, 0x0, @remote}, &(0x7f0000000200)=0x10) lstat(&(0x7f0000000240)='./file0/file0\x00', &(0x7f00000002c0)) 16:05:26 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, 0x0, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_INFO(r1, 0x29, 0x40, &(0x7f00000000c0)={'security\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x04\x00'}, &(0x7f0000000140)=0x54) [ 968.486580] libceph: parse_ips bad ip '[d::]: [ 968.486580] llb' [ 968.517609] libceph: parse_ips bad ip '[]::]: [ 968.517609] llb' 16:05:26 executing program 1: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[]::]:\nllb:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0xedc0, 0x0) [ 968.564929] IPVS: ftp: loaded support on port[0] = 21 16:05:26 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020200090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e0100000001000000000000002402000100f8ffffff0000000200000020030005000000000002004e20e00000010000000000000000"], 0x60}}, 0x0) 16:05:26 executing program 3: sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001340)={0x0, 0x0, &(0x7f0000001300)={&(0x7f0000000180)=@newlink={0x40, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, @ip6erspan={{0x10, 0x1, 'ip6erspan\x00'}, {0xc, 0x4, [@gre_common_policy=[@IFLA_GRE_IFLAGS={0x8, 0x3}]]}}}]}, 0x40}}, 0x0) r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) getsockopt$inet_sctp_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000000)={0x0, 0xdd6}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000080)={r1, 0x800}, &(0x7f00000000c0)=0x8) [ 968.618746] libceph: parse_ips bad ip '[d::]: [ 968.618746] llb' 16:05:26 executing program 4: mknod$loop(&(0x7f0000000140)='./file0\x00', 0x2, 0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[d::]:\nllb:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 16:05:26 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='fdinfo\x00') getdents64(r0, &(0x7f0000000100)=""/60, 0x3c) 16:05:26 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020200090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e0100000001000000000000002402000100f8ffffff0000000200000008030005000000000002004e20e00000010000000000000000"], 0x60}}, 0x0) 16:05:26 executing program 4: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[d::]:\nllb:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) r0 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x100000000, 0x101000) ioctl$BLKREPORTZONE(r0, 0xc0101282, &(0x7f00000001c0)={0x8001, 0x7, 0x0, [{0x2, 0xbd8, 0x3, 0x4, 0x5, 0x639, 0x5}, {0x80000000, 0x3, 0x8, 0x4, 0x3, 0x0, 0x2}, {0x7, 0x1000, 0x101, 0x1, 0x4000, 0xfff, 0x4}, {0xfff, 0x1, 0xfffffffffffffe00, 0x80000000, 0x8, 0x0, 0x8}, {0x6, 0x9, 0x401, 0x7, 0x6, 0x80, 0x7f}, {0xffff, 0x5, 0x0, 0x80, 0x101, 0xfed, 0x8}, {0x10001, 0x9, 0x8, 0x6, 0x8, 0x4, 0x407c}]}) 16:05:26 executing program 1: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[]::]:\nllb:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x3, 0x0) [ 968.784248] libceph: parse_ips bad ip '[d::]: [ 968.784248] llb' 16:05:26 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net\x00') getdents64(r0, 0x0, 0x0) 16:05:26 executing program 0: r0 = syz_open_dev$amidi(&(0x7f0000000080)='/dev/amidi#\x00', 0x9, 0x40000) setsockopt$IP_VS_SO_SET_EDIT(r0, 0x0, 0x483, &(0x7f00000004c0)={0x8f, @rand_addr, 0x4e22, 0x2, 'ovf\x00', 0x1, 0x101, 0x27}, 0x2c) ioctl$KVM_SET_XSAVE(r0, 0x5000aea5, &(0x7f00000000c0)={"52aee4fb4f129cd3c0697b529ce378a31c569f9e3f7c3b681fd5950a5b696008f4d133421c5b41a30140380bc934f16ca18b66f8e4d9c4e1a6c1d636a5d70ac60ff24a5fb3d7f4ca5593c771bd8442c4d3e183480445805128c18285b2104a281441a781a972f429141f67114fa500ac9782da38d39ac72801cdc7ab102cdf30fd98dba5fcfc06a888921f4d7d7f7edfa3c9c61865eb13136b0f5b12fe7c099ca5f3b26993d4f68483f880b1bc3ce4c4115f87148d7ffbbb919adc06afbe56230646a95cdce5e7009c3345dada575b384a76b2a6d97df3f958d2c5e8b2479a1ac0001ac275861f70adb4bfbead1fa45bd4272dc30fbc696ab473e3ce44c5aab4e70eef06aca17d80e8dac6183997fa53fc7545db2594d0c3af3bd023a520a0bc3af8eb94e9d0cbe8edbba0adb9629de04dd40730e8411d522bd561fba25e275500a3b4ecaa0f9e4ae779a22242dbc4b3355020ef8dfa9ff4912f67fa1f2d00bb859f990fd6a561efd05a920c093c9a48ac75e1a86c10c75d9f46e4a590190cd5e717260dae9b2e60e651f9fa67169c899343b807a159d493806cb0e897f41034ac4a7ba3f1d8f966357c1fb11ab40796dfdaee7a95b0c2e0bb4da3f8708523b666164ee338c0b77699277907becaee2d7c6374319223a53091a17fb2421cce0bb1c15e2c5122450e2c797883a6b7a74adda742930e930acb681f5f426cb2001a14430f3f7e025cc39db0f94c73294a62d10c68d553e3cd792a19af777d2b4dfa7b909c1b6b993adb0902e7ab06b08d0964ca83d7b9fd6d7c2f6eb0c63db0b1829936c686e66210e801cb3a12a91ddf1e0ecd4c9dd600f0f2b37eb2cfd7a34c1762194c6f0229cd605d0d8104dd98d01c12253dd88c110e80c56664ee756a448f1adfb7fd03aeb3c99ed851aeda8285ae604d0f0ae7737dd421bc889ed272dcac7bdea26bdf9524292748de6e6cdab8e4152f9280e9712a2227b702d1c165dc1cd7875b97ec8adad7ff225ff29e7032ba39414e217e00e8b84461d28a349efaecc55708712d99cb2ec3b0eefd32c1fc71d577d9c3186436b11e878c7700b0534c3d8f11d66804178dc3e9d01b7e507711799c579dbf7abeee5e79b7a90bc94c50a87b6944ba3be46aad6ff489cfd96398712e3776985f9393aecfeb9af2a0ca4d0a7e8df85dd96d1b30ee2d5de5e10c86aac6fad6424fcdc55ce5997fd853d2c72dfdd4f93e5380d9cc7997eb67d2f6488ca7f47104d3ec7d9b2e3027247d540b15fdb927a958f9fb3c66131e50124a9163210fa03e2000df9e00d4f40c01d78551143aba1985bd654dc3deca7a962512fc9bce2f667e8ab6598e42fd9b6d963e83af3f68254a61fa7cbac40b0d5cae8891b92fc8a8b4e87a1de4c8f00caa4519d15f4ffdbcac61cf093d5c3aa1d0278d2f7d5fa9ca012c4b9b749986f143f5a8"}) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fdinfo\x00') getdents64(r1, &(0x7f0000000000)=""/60, 0x3c) 16:05:26 executing program 1: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[]::]:\nllb:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x2, 0x0) [ 968.906486] libceph: parse_ips bad ip '[]::]: [ 968.906486] llb' [ 969.012036] libceph: parse_ips bad ip '[d::]: [ 969.012036] llb' [ 969.045968] libceph: parse_ips bad ip '[]::]: [ 969.045968] llb' [ 969.095729] libceph: parse_ips bad ip '[]::]: [ 969.095729] llb' 16:05:26 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, 0x0, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_INFO(r1, 0x29, 0x40, &(0x7f00000000c0)={'security\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03N\x00'}, &(0x7f0000000140)=0x54) 16:05:26 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020200090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e0100000001000000000000002402000100f8ffffff0000000202000000030005000000000002004e20e00000010000000000000000"], 0x60}}, 0x0) 16:05:27 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='fdinfo\x00') ioctl$RTC_EPOCH_SET(r0, 0x4008700e, 0x3) ioctl$KVM_ASSIGN_PCI_DEVICE(r0, 0x8040ae69, &(0x7f0000000000)={0x2, 0x0, 0xfff, 0x2, 0x2}) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f00000000c0)={0x8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000000100)=0x24) getdents64(r0, &(0x7f0000000080)=""/60, 0xf1) 16:05:27 executing program 3: 16:05:27 executing program 4: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000002580)='/dev/vga_arbiter\x00', 0x200000, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, &(0x7f00000025c0)={0x0, 0xce, "fab995a6cfc56f51f16f91e87430f92feaea21127fa084b9cd949d7589bf823de2c4a47bb0d3ba890f51f793925a36ae18e580b2f7abe4b0e3cdd7f39c0c7f30936dd6dd95ca2e746722c902faec7c6eaa950bd6481f98f40ed6b7574e3a343d1ee8d04e69e61cddc0c8c98cc4cdbd5a23d7487aaacb82a0f8c516e6cea61950804a7b906768f44411f9c929e21e0e40f813609b017bc597c9fd703d75f087edbeff1fb36d8360813e694753318c2c96965d9c3bb0f6ad81ef813ba8945999ba296292b95e234e95d5ce8f44a965"}, &(0x7f00000026c0)=0xd6) setsockopt$inet_sctp6_SCTP_AUTH_DELETE_KEY(r0, 0x84, 0x19, &(0x7f0000002700)={r1, 0x7}, 0x8) mknod$loop(&(0x7f0000002a00)='./file0\x00', 0x0, 0x1) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/ipx\x00') r3 = accept4$alg(0xffffffffffffff9c, 0x0, 0x0, 0x80800) readv(r3, &(0x7f00000029c0)=[{&(0x7f0000002740)=""/166, 0xa6}, {&(0x7f0000002800)=""/182, 0xb6}, {&(0x7f00000028c0)=""/240, 0xf0}], 0x3) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffff9c, 0x84, 0xd, &(0x7f0000000f00)=@assoc_value={0x0, 0xffff}, &(0x7f0000002440)=0x8) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f0000002480)={r4, @in6={{0xa, 0x4e22, 0x8, @loopback, 0x7fff}}, 0xfff, 0x1, 0x1, 0x1ff, 0x3}, &(0x7f0000002540)=0x98) r5 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x4, 0x80) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000f40)={'bond_slave_0\x00', 0x0}) sendmmsg(r5, &(0x7f0000002380)=[{{&(0x7f00000001c0)=@nfc={0x27, 0x1, 0x2, 0x3}, 0x80, &(0x7f00000006c0)=[{&(0x7f00000000c0)="d8e78cbd0d87518b17f3fe42cba06ded9d70a4b9f6578a389d130439be7bcc121b68684f862ac05c8a16180f31dfa6b56c3d120d20a674cd", 0x38}, {&(0x7f0000000240)="930abb0becd7c525ede7c34ce25e81203771398246b704c038143d378bce927b24a1bfe06e04657f91bbe7280e46c02b7183a415f5f851f3914cf1917755e3384799392a993d98abf57f7e6e924d29576d195e028074f02d0c1afa6c3dec7cc299b0c48bef359658c122db39bdd9c3df4e527be2656d5edc91cce0f03e206cf0d83c72c0", 0x84}, {&(0x7f0000000140)="ae442730423ac583737b8077546a74290a5f37", 0x13}, {&(0x7f0000000300)="3054e2d2e57ecbc73ad774b12a92b6c7f13c02a371e9591c734f3e34ec51ecfd0bb3148eda143f58a1e237cad5690ae870780a5044f9113e763491f5872b24990f29d8e6240dba3053a79570a9756db5aa9aa58f1026", 0x56}, {&(0x7f0000000380)="30419d5dc86d1e5bd64e32ae3f7396ad2cfb42e1857790ccc39145f69875c266c9effe66a5da75e5578228ed29c9181e7300359e132a3a5dc177f872cfb43c947357cf2a99858bf18e2be98919b0a0d35043c3a1fb0e646b8836a9031a2af5f10470f7050a60cd92f4", 0x69}, {&(0x7f0000000400)="b94dd9548d033cfb321acac4ef75f342678b35bc0bd66a5b83859666d8510a1ca26954440492cb27aa850c204b63589d9245b851f4ecaa78249854b419d0a2c03e7e9d8a6685275757c8736e9f0d15ae909d14d51b9f483628af29ede981cb275e8ffca4d6adeddef3c22cbe3d94baf8635458cb7d24dfe90dd3944c9aa77062d620d58fe40aba649d873608fd1b072fecae1ef7e9213cb79a0ae8b9ada84b3903dd7b0818f52541ec5890b95f272a76305d46025ceb4afdef2eb2e2f68b251cbbd04ea9f387fc86b730", 0xca}, {&(0x7f0000000500)="9a4ec95a166789c22df78d294bc84e61fb35733ee1cfa4fdc3defaebf610a20a9d5cc82fcf1ddee65e646a16c92a0eef1c40640f0702bb16f258bb52edbe4eb22c73c44c0004de15c5187a33bee85c401417b222d6909a3c9c91518391cc569249d5af329762a53895dfbcb821daf05893fc91c72c8251fde96c28e7b6e67e0c86ea01c3bef38eb8739f22c394b4f03138bdda3980d2ab2eddc12470e688edcc38d3460ac4fc5b81687acdce31e299ae15d12cb8556e6c7ac24c0f2b489817bf1527e7b64195fe99434132b2f4b88aeacf0185fab3e9f56b9b4bce6d62fb24bc501934", 0xe3}, {&(0x7f0000000600)="cb474de2762de96443cdee013fb589fe293926c0b408d79f2bed46d01e2df946823be80e28aa503f1b41cabf5c838b690f1f33d76cfbdef662f3f10b5bb7d64affe59a20a7680951e6f03d4b9c3cc57c49", 0x51}, {&(0x7f0000000680)="eae1a695ed9f3413d9dad16dccab1559fd95c7d316d1db199c8e651f78df4b642ba56e1baad43886e6665e6a04f20cc72bd70f835a817cd2ef5fd26bb2e9fb", 0x3f}], 0x9, &(0x7f0000000780)=[{0x98, 0x1, 0x3, "c2f4ee7688b449db7f9751a34f9c138191f56ed23c8d59a466247b25666e3cde81983844aa064c613ed65475b05e0900ee4c8f2453db512efc07b2637171a66358243b71a780fcb1e862d6656654ccfb83c09b99fa25625797007d91220f890495b4d1747e974fe5a5877878c38fc32879342bd5395aa8a1d888e664930e547c4d180fcd879c23"}, {0x108, 0x0, 0x1000, "4dacafe0593c3649faac0aa18253305bea7176e398a40a3e2a0e3932de62f50adb0cfff8c2b00e1bb47cf982c7d83424262e1893898b79c451ceaa287b6053a79b102e8630b7b11fa473b3f6eee2a5d6d98d776dbc7da50aacc5c7360367c7d006b221e7b18df7de4401be7db051104d654da4f42b7d806767a61ebe7934791ab040634703fb07f25c9da4547b2846a970a29024ea99b87dd69efbf608797a13eabbd5765cdfaa1486870d13044196cd0848452ecbaac2f9987a90f4c3a34cc44c22288efe0938d264992459e2846f23e35e2eaf16939055dab711f5bab7e256d9425a06841c1e79ce823cc0ea4590f302fa061cf357"}], 0x1a0}, 0x2}, {{&(0x7f0000000940)=@tipc=@id={0x1e, 0x3, 0x2, {0x4e20, 0x2}}, 0x80, &(0x7f0000000ac0)=[{&(0x7f00000009c0)="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", 0xff}], 0x1, &(0x7f0000000b00)=[{0x20, 0x10a, 0x323, "69232502c003448ac9f104"}, {0x38, 0x84, 0x0, "58addc6d9b364cf1b2775adbacba639e0615198574ed785a74f9190ec360cb29f191d5"}, {0xc0, 0x101, 0xffffffff99e5989e, "d8bb7c1d86c98170376a00eeb9b70412daed99bf9f967a752af3ddf478677f23dcbc7fc073028e13fbaea07f50da7ec55b8e0361ea6af3ecdecbe5e347cc39ed0ff47c9442e0f2a572304c394c82cc2974c97e042b7300cdc1cb8bf461a87ce6c8bca07fc1630ac9d73ba21b4dc79050125913ff2f12b1e3f5a0487c9f1dda6d7071fd281a07b160211cea808544d7210cfa8faa76362ec84e503ad66ff9a58713d779fafc92e58756a6"}, {0xc8, 0x13b, 0x0, "98409b345eba1c0b6eaabf8406963a3fa8c66997d33b9651581e41dbe7bfa1db827b024aaf743f7727aaefd8f63737436a5cd6b3d757f5bdbfce252ef0f32ab293424ad9807f0d408b1bdcdaf683738c09d596aee891feb7108a717c7a606f5eb39459c22cbf5907fe6056ed2a94a0250274e6ebdca310c3ec17e9c66bad8f12f186cf850899f598a5718129dc15a936409b2a45b56eac6f8070a4935fe600bbef7321a5bb527b972430e1a03da9e8cfa943"}, {0xa8, 0x104, 0x2e8b, "432773e90f86aa5a02a59a5477bb9dd52dc7b88e85d67baf459100e72bddd40bd4cdf10090311396f24b5ecca6dd31294e9090fba1c8ca84e390da5f547458d2c4244e6dcd301694af67fb4b1c4b96599deed41673a5c738bd95e35ef5bce109b41d9de6561f27b84e5dd35f672abbfbf1f51cfe4bf2173833ea1629d01eb710c86381b2ac0b22485427ccf4368f56c61e2b9f12"}, {0xa8, 0x116, 0x1, "8fc708579772f9bbb1a8944342d97c7666738d111fa43d49e6846d35759a96a3dfdc0cfa01af2f4a8ae2b9294860056121e0a6a920b4e79aaff92bca149794037af94f56cc4e1b5000604768eb9df76e14d01e6abcdd2cd8aacd2c6930e4d0771ab3d4dcac9dbb6130f853da30ccaa22d4102642e4a6c4c38e4c06e9050685bf6aa87ba112ab005bbfc48aa4c12542c81d"}, {0x70, 0x107, 0x9, "714f8a40a6aaf2f5da85f1a41dae924183109cc25e3e2f0d663f9b355e8028edc2672b5ecd2f8bfae56b73334e1238aabbbdfe65a61d03269f9e232b2d4033b2dd074a9695f20a4c2bcc8cf8f1792b0face512bbb5a60eb663ccdf364d0d3033"}], 0x3a0}, 0x2}, {{&(0x7f0000000f80)=@xdp={0x2c, 0x3, r6, 0x3a}, 0x80, &(0x7f0000001240)=[{&(0x7f0000001000)="e5f1718b87ee86592c63fd03e2fe1757f25d1a72cf832fd1fe15a0599803d52bc987d1fa0cbad8d6509388980540bb3ff1199316d0632217c9b32bcc5d83e5ab5b872f61d514debb3d3cf0b5ca6b340a1466b8a2af1d3f35ae42acf9d5d8f2ac9152efc8e98f7a9c39d436c61b3b5f9f78a35699edf28157814f4f22dfb982cd8817dee6fba25c53b374f149affe57c9aaa3e9db3ab1f2d1189f2e543ec4337e11aaae27c7bf409bdc276d54c2765cbbea0b39871488", 0xb6}, {&(0x7f00000010c0)="d19a0f4ce1", 0x5}, {&(0x7f0000001100)="9628b6a66530f832763a7938f9c7f46c5c1a2caf317e254e045829f3af9556c1c1ebdf2031f8442c8b6de105f759", 0x2e}, {&(0x7f0000001140)="359144ebdf84f808", 0x8}, {&(0x7f0000001180)="ead4c745eca41e4b1b6abedafe717bbb34109fa1ad8200528f451dcc251eaeac774259316fd380e5", 0x28}, {&(0x7f00000011c0)="753c5f86dd05384ac55f2ab1d718b4d9857fdd127bbe6904a0f67bb5f6760d43ccb04edbc6884ef942ef8baa5a246bab0a588df01511d320a80cd5cd72cd87fb13db1b57c70241229161ca0a7bbd", 0x4e}], 0x6, &(0x7f00000012c0)=[{0x1010, 0x11d, 0x3c, "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"}, {0x80, 0x10a, 0xa1a, "20a57e8e97d44d657988a621d860a59d945b04be2ed9be8dda3673fdd474eb532e4b29bdcb4948bcf252461dd71dcdb102f82c7fca1a01f67dc3fa743ef3581e88e9ade29c307385fea9832ca65a419a11f0e7d4453c2d5d3076f62e9e3b5f7455196dffbda158e336"}], 0x1090}, 0x7}], 0x3, 0x8000) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[d::]:\nllb:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 16:05:27 executing program 1: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[]::]:\nllb:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0xfffff000, 0x0) 16:05:27 executing program 1: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[]::]:\nllb:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x4e000000, 0x0) [ 969.436777] libceph: parse_ips bad ip '[d::]: [ 969.436777] llb' 16:05:27 executing program 3: 16:05:27 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020200090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e0100000001000000000000002402000100f8ffffff00000002fffffffb030005000000000002004e20e00000010000000000000000"], 0x60}}, 0x0) 16:05:27 executing program 4: mknod$loop(&(0x7f00000001c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) rmdir(&(0x7f0000000000)='./file1\x00') r0 = syz_open_dev$mouse(&(0x7f00000000c0)='/dev/input/mouse#\x00', 0x7fffffff, 0x8000) inotify_add_watch(r0, &(0x7f0000000140)='./file0\x00', 0x10000008) mount(&(0x7f0000000040)=@nullb='[d::]:\nllb:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) [ 969.487640] libceph: parse_ips bad ip '[d::]: [ 969.487640] llb' [ 969.500632] IPVS: ftp: loaded support on port[0] = 21 16:05:27 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='fdinfo\x00') setsockopt$inet_int(r0, 0x0, 0x8, &(0x7f0000000080)=0x40, 0x4) getdents64(r0, &(0x7f0000000000)=""/60, 0x3c) setsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r0, 0x84, 0xc, &(0x7f0000000100)=0x80000000, 0xfffffef4) ioctl$DRM_IOCTL_DROP_MASTER(r0, 0x641f) 16:05:27 executing program 1: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[]::]:\nllb:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x3000000, 0x0) [ 969.612773] libceph: parse_ips bad ip '[]::]: [ 969.612773] llb' [ 969.662744] libceph: parse_ips bad ip '[d::]: [ 969.662744] llb' [ 969.703385] libceph: parse_ips bad ip '[]::]: [ 969.703385] llb' [ 969.948750] IPVS: ftp: loaded support on port[0] = 21 16:05:27 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020200090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e0100000001000000000000002402000100f8ffffff0000000200000002030005000000000002004e20e00000010000000000000000"], 0x60}}, 0x0) 16:05:27 executing program 3: 16:05:27 executing program 4: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f00000001c0)=ANY=[@ANYBLOB="5b643a3a5d3a0a6c6c623a007eca675373dc63f4b7474df13c3a0ed5d8f8fce6a1e0a59b8010cd5cb0e8023e51aaf8354c1e1852b948e951d4c84a36d08aa67d093b0ab0a6ba06136a4290e4cb71012f909a644b472fc07158ab212efcc3f900000000000009000000000000"], &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 16:05:27 executing program 1: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[]::]:\nllb:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0xf000, 0x0) 16:05:27 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, 0x0, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_INFO(r1, 0x29, 0x40, &(0x7f00000000c0)={'security\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01V\x00'}, &(0x7f0000000140)=0x54) 16:05:27 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='fdinfo\x00') getdents64(r0, &(0x7f0000000000)=""/60, 0xffffffffffffff42) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, &(0x7f00000001c0)={@pppol2tp={0x18, 0x1, {0x0, r0, {0x2, 0x4e23, @remote}, 0x3, 0x2, 0x4, 0x1}}, {&(0x7f0000000080)=""/251, 0xfb}, &(0x7f0000000180), 0xd021dba72282573}, 0xa0) sendto$packet(r0, &(0x7f0000000280)="5b412077e9ff90462e34bae863b4146de6bc20bc8eda95338f2f26f92a55f7a20fba8d329273ecd08f8c46999e5342a4e6283706237ba0a3f668c00aabafea88f775bd2157c5f2978d71e32dfe3dd7f4735f1e3cda8e63c1767a1ae705c0ee7b4c3ea010a05bbf9ed25dc56b1cccd7a3ff92376391334c9232051898491232da8740aac200ea45d01465e74458ebd2e4b34ee42798f1643ae344ea7bebfb89640e3a2f21ba10a346b07a16f303b89ceb789fa61de83123742f068d74fff84cc0e450ea78e9f453773b1b8728639fa54a17aabb", 0xd3, 0x20000001, 0x0, 0x0) 16:05:27 executing program 3: [ 970.063818] libceph: parse_ips bad ip '[d::]: [ 970.063818] llb' 16:05:27 executing program 4: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00') fsync(r0) sendmsg$TIPC_NL_PUBL_GET(r0, &(0x7f0000000380)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000340)={&(0x7f00000001c0)={0x160, r1, 0x29, 0x70bd2d, 0x25dfdbfe, {}, [@TIPC_NLA_LINK={0x28, 0x4, [@TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0xc595}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}]}, @TIPC_NLA_NET={0x1c, 0x7, [@TIPC_NLA_NET_ID={0x8, 0x1, 0x2}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x8}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x7ff}]}, @TIPC_NLA_NODE={0x34, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x80000001}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x5}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x7}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x8000}]}, @TIPC_NLA_MEDIA={0x78, 0x5, [@TIPC_NLA_MEDIA_PROP={0x4}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1000}]}, @TIPC_NLA_MEDIA_PROP={0x4}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0x4}, @TIPC_NLA_MEDIA_PROP={0x34, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x831}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3f}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1c}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}]}, @TIPC_NLA_SOCK={0x3c, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x1}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x797}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x17e3}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0xfffffffffffffff8}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}, @TIPC_NLA_NET={0x10, 0x7, [@TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0xee}]}, @TIPC_NLA_NODE={0x10, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x80}]}]}, 0x160}, 0x1, 0x0, 0x0, 0x4000}, 0x0) mount(&(0x7f0000000040)=@nullb='[d::]:\nllb:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 16:05:27 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='fdinfo\x00') lstat(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0}) setfsuid(r1) timerfd_settime(r0, 0x1, &(0x7f00000004c0)={{0x77359400}}, &(0x7f0000000500)) ioctl$SNDRV_TIMER_IOCTL_STOP(r0, 0x54a1) ioctl$FS_IOC_SETFSLABEL(r0, 0x41009432, &(0x7f0000000080)="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") ioctl$BLKREPORTZONE(r0, 0xc0101282, &(0x7f0000000240)=ANY=[@ANYBLOB="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"]) getdents64(r0, &(0x7f0000000000)=""/60, 0x3c) 16:05:27 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020200090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e0100000001000000000000002402000100f8ffffff0000000200000010030005000000000002004e20e00000010000000000000000"], 0x60}}, 0x0) [ 970.132331] IPVS: ftp: loaded support on port[0] = 21 16:05:27 executing program 1: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[]::]:\nllb:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0xf0ffffffffffff, 0x0) 16:05:27 executing program 3: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_ports\x00', 0x2, 0x0) r1 = getpgrp(0x0) write$cgroup_pid(r0, &(0x7f0000000040)=r1, 0x12) 16:05:27 executing program 1: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[]::]:\nllb:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0xfffffff6, 0x0) [ 970.210514] libceph: parse_ips bad ip '[d::]: [ 970.210514] llb' 16:05:27 executing program 1: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[]::]:\nllb:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x4, 0x0) 16:05:27 executing program 0: ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000080)) getdents64(0xffffffffffffffff, &(0x7f0000000100)=""/60, 0xd2) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, &(0x7f0000000140)="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") r0 = syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x40000) ioctl$BLKIOOPT(r0, 0x1279, &(0x7f00000000c0)) r1 = semget$private(0x0, 0x2, 0x0) semctl$SETALL(r1, 0x0, 0x11, &(0x7f0000000240)=[0xfffffffffffffff7, 0xfa83]) r2 = syz_open_dev$mice(&(0x7f00000002c0)='/dev/input/mice\x00', 0x0, 0x4800) setsockopt$inet_sctp6_SCTP_INITMSG(r2, 0x84, 0x2, &(0x7f0000000280)={0x1f, 0x0, 0x7}, 0x8) [ 970.285641] libceph: parse_ips bad ip '[d::]: [ 970.285641] llb' 16:05:27 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020200090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e0100000001000000000000002402000100f8ffffff000000027fffffff030005000000000002004e20e00000010000000000000000"], 0x60}}, 0x0) [ 970.508250] libceph: parse_ips bad ip '[]::]: [ 970.508250] llb' [ 970.558286] libceph: parse_ips bad ip '[]::]: [ 970.558286] llb' [ 970.693428] IPVS: ftp: loaded support on port[0] = 21 16:05:28 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, 0x0, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_INFO(r1, 0x29, 0x40, &(0x7f00000000c0)={'security\x00\x00\x00\x00(\x00'}, &(0x7f0000000140)=0x54) 16:05:28 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$EBT_SO_GET_ENTRIES(r0, 0x0, 0x81, &(0x7f0000000240)={'nat\x00', 0x0, 0x0, 0x0, [], 0x0, 0x0, 0x0}, &(0x7f0000000100)=0x78) 16:05:28 executing program 4: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=ANY=[@ANYBLOB='[d:\x00'], &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) r0 = getpid() ptrace$poke(0x4, r0, &(0x7f0000000000), 0x8) 16:05:28 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020200090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e0100000001000000000000002402000100f8ffffff00000002fbffffff030005000000000002004e20e00000010000000000000000"], 0x60}}, 0x0) 16:05:28 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='fdinfo\x00') getdents64(r0, &(0x7f0000000000)=""/60, 0x3c) shmget$private(0x0, 0x4000, 0x7c000100, &(0x7f0000ff9000/0x4000)=nil) shmget$private(0x0, 0x3000, 0x28, &(0x7f0000ff9000/0x3000)=nil) r1 = shmget(0x1, 0x4000, 0x1000, &(0x7f0000ffb000/0x4000)=nil) r2 = shmat(r1, &(0x7f0000ffa000/0x3000)=nil, 0xffe) ioctl$KVM_GET_EMULATED_CPUID(r0, 0xc008ae09, &(0x7f0000000100)=""/5) shmdt(r2) ioctl$KVM_DEASSIGN_DEV_IRQ(r0, 0x4040ae75, &(0x7f0000000080)={0x200000002, 0x8003f, 0x5}) syz_open_dev$media(&(0x7f00000000c0)='/dev/media#\x00', 0x8, 0x200) 16:05:28 executing program 1: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[]::]:\nllb:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x4000000000000000, 0x0) [ 970.858175] libceph: parse_ips bad ip '[d' 16:05:28 executing program 1: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[]::]:\nllb:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x500000000000000, 0x0) [ 970.899137] libceph: parse_ips bad ip '[d' 16:05:28 executing program 3: 16:05:28 executing program 0: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, 0xffffffffffffffff, 0x0, 0x2, &(0x7f00000000c0)='$\x00'}, 0x30) r1 = syz_open_procfs(r0, &(0x7f0000000080)='net/udplite6\x00') getdents64(r1, &(0x7f0000000000)=""/60, 0x3c) 16:05:28 executing program 1: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[]::]:\nllb:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x6000000000000000, 0x0) 16:05:28 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020200090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e0100000001000000000000002402000100f8ffffff0000000210000000030005000000000002004e20e00000010000000000000000"], 0x60}}, 0x0) [ 970.956980] IPVS: ftp: loaded support on port[0] = 21 16:05:28 executing program 4: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=ANY=[@ANYBLOB="5b643a3a5d04000000623a004776ef2f316d327a08000000000000a808e298676d214b10942e6862dae32e6d00000000000000000000"], &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) [ 971.098084] ceph: device name is missing path (no : separator in [d::]) 16:05:29 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, 0x0, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_INFO(r1, 0x29, 0x40, &(0x7f00000000c0)={'security\x00\x00\x00\xff\xff\xff\xff\xff\xff\xff\xff\x00'}, &(0x7f0000000140)=0x54) 16:05:29 executing program 0: r0 = dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x80000) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x7) r1 = socket$inet_smc(0x2b, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000080)=@ethtool_modinfo={0x42, 0x3, 0x8000, "aeff938596b72ede"}}) getsockopt$inet_sctp_SCTP_HMAC_IDENT(r1, 0x84, 0x16, &(0x7f0000000100)={0x3, [0x6, 0x4000000008, 0xfff]}, &(0x7f0000000140)=0xa) getdents64(0xffffffffffffffff, &(0x7f0000000000)=""/60, 0x3c) 16:05:29 executing program 3: 16:05:29 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020200090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e0100000001000000000000002402000100f8ffffff00000002e0000001030005000000000002004e20e00000010000000000000000"], 0x60}}, 0x0) 16:05:29 executing program 1: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[]::]:\nllb:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x5, 0x0) 16:05:29 executing program 4: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getxattr(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)=@known='com.apple.system.Security\x00', &(0x7f00000001c0)=""/182, 0xb6) mount(&(0x7f0000000040)=@nullb='[d::]:\nllb:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 16:05:29 executing program 3: [ 971.596161] libceph: parse_ips bad ip '[d::]: [ 971.596161] llb' [ 971.604101] libceph: parse_ips bad ip '[]::]: [ 971.604101] llb' 16:05:29 executing program 1: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[]::]:\nllb:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x200000000000000, 0x0) 16:05:29 executing program 4: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=ANY=[@ANYBLOB='/dov.loop0\x00'], &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 16:05:29 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020200090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e0100000001000000000000002402000100f8ffffff0000000208000000030005000000000002004e20e00000010000000000000000"], 0x60}}, 0x0) [ 971.639090] libceph: parse_ips bad ip '[]::]: [ 971.639090] llb' 16:05:29 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='fdinfo\x00') getdents64(r0, &(0x7f0000000000)=""/60, 0x3c) openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x200000, 0x83) [ 971.712829] IPVS: ftp: loaded support on port[0] = 21 16:05:29 executing program 3: [ 971.779704] ceph: device name is missing path (no : separator in /dov.loop0) [ 971.811751] ceph: device name is missing path (no : separator in /dov.loop0) 16:05:29 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, 0x0, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_INFO(r1, 0x29, 0x40, &(0x7f00000000c0)={'security\x00\x00\x00V\x00'}, &(0x7f0000000140)=0x54) 16:05:29 executing program 4: mknod$loop(&(0x7f0000000200)='./file0\x00', 0x200, 0x1) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[d::]:\nllb:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) r0 = accept4$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @local}, &(0x7f00000000c0)=0x1c, 0x80000) getsockopt$inet6_udp_int(r0, 0x11, 0x66, &(0x7f0000000140), &(0x7f00000001c0)=0x4) 16:05:29 executing program 0: socket$kcm(0x29, 0x7, 0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000100)={0x0}, &(0x7f0000000140)=0xc) r1 = syz_open_procfs(r0, &(0x7f0000000180)='projid_map\x00') getdents64(r1, &(0x7f0000000000)=""/60, 0x3c) 16:05:29 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020200090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e0100000001000000000000002402000100f8ffffff0000000200000004030005000000000002004e20e00000010000000000000000"], 0x60}}, 0x0) 16:05:29 executing program 1: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[]::]:\nllb:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x4000000000000, 0x0) 16:05:29 executing program 3: 16:05:29 executing program 1: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[]::]:\nllb:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x60000000, 0x0) 16:05:29 executing program 3: 16:05:30 executing program 4: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f00000001c0)=ANY=[@ANYBLOB="5b643a3a5d3a0a0251623a577ce611931f76a2ad0021e3243f4f3b17f6367f251b569e27ca4691d445efcf0e1cdd40e334c632de08c4c8196cc7850754dc13838e200042b76503bafba92f3358a0ad5b23090ef01b98aa4fd79f93ff3200f22bdaf9cadd7517c34925742d4d723dc0cb8ebf5c02f6a482324e54010a363daf13adddb0f723e4381cfe8c0ce4aabaceda3f809dfff85db077fd0d400bfa6f7d3685c5f13d0f25fcccb50388b3e6418d809d587d1bc080e9c6b8ea97b184cef5fca42c94449496793200bbab753061370fc070e263ad7dc1eb"], &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) [ 972.342056] libceph: parse_ips bad ip '[d::]: [ 972.342056] llb' 16:05:30 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020200090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e0100000001000000000000002402000100f8ffffff0000000200200000030005000000000002004e20e00000010000000000000000"], 0x60}}, 0x0) 16:05:30 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x92, 0x40) ioctl$RNDADDENTROPY(r1, 0x40085203, &(0x7f0000000100)={0xb82f, 0x1000, "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"}) r2 = fcntl$getown(r0, 0x9) r3 = syz_open_procfs(r2, &(0x7f0000000080)='fdinfo\x00') getdents64(r3, &(0x7f0000000000)=""/60, 0x3c) 16:05:30 executing program 3: [ 972.470272] libceph: parse_ips bad ip '[]::]: [ 972.470272] llb' [ 972.492443] IPVS: ftp: loaded support on port[0] = 21 [ 972.495961] ceph: device name is missing path (no : separator in [d::]: [ 972.495961] Qb:W|æ“v¢­) 16:05:30 executing program 1: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[]::]:\nllb:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x700, 0x0) 16:05:30 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020200090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e0100000001000000000000002402000100f8ffffff0000000200400300030005000000000002004e20e00000010000000000000000"], 0x60}}, 0x0) 16:05:30 executing program 4: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[d::]:\nllb:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) exit_group(0x184) 16:05:30 executing program 0: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(r0, 0x0, 0x487, &(0x7f00000000c0)={{0x6c, @multicast2, 0x4e24, 0x2, 'none\x00', 0x8, 0x1, 0x59}, {@multicast1, 0x4e20, 0x2000, 0x1, 0x1, 0xc5a}}, 0x44) fcntl$getownex(r0, 0x10, &(0x7f0000000200)={0x0, 0x0}) r2 = syz_open_procfs(r1, &(0x7f0000000240)='fdi\xb4\x9bs\x99\xa4~\x02') getdents64(r2, &(0x7f0000000000)=""/60, 0x3c) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f0000000140)={0x0, 0x9, 0x80000000, 0x0, 0x8}, 0x14) 16:05:30 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, 0x0, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_INFO(r1, 0x29, 0x40, &(0x7f00000000c0)={'security\x00\x00\x00d\x01\x00'}, &(0x7f0000000140)=0x54) 16:05:30 executing program 3: 16:05:30 executing program 3: 16:05:30 executing program 1: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[]::]:\nllb:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0xf0, 0x0) [ 973.011069] libceph: parse_ips bad ip '[d::]: [ 973.011069] llb' [ 973.033225] libceph: parse_ips bad ip '[]::]: [ 973.033225] llb' [ 973.051033] libceph: parse_ips bad ip '[d::]: [ 973.051033] llb' 16:05:30 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020200090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e0100000001000000000000002402000100f8ffffff0000000200040000030005000000000002004e20e00000010000000000000000"], 0x60}}, 0x0) 16:05:30 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fdinfo\x00') getdents64(r0, &(0x7f0000000000)=""/60, 0x3c) getdents64(r0, &(0x7f0000000080)=""/24, 0x18) syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x17, 0x80) [ 973.144509] IPVS: ftp: loaded support on port[0] = 21 16:05:30 executing program 3: 16:05:30 executing program 4: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(&(0x7f0000000000)={0xffffffffffffffff}) getsockopt$inet_int(r0, 0x0, 0x31, &(0x7f00000000c0), &(0x7f0000000140)=0x4) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="5b641a3a5d3a0a6c6c623a00"], &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 16:05:30 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020200090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e0100000001000000000000002402000100f8ffffff0000000200080000030005000000000002004e20e00000010000000000000000"], 0x60}}, 0x0) 16:05:30 executing program 1: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[]::]:\nllb:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x400000000000000, 0x0) 16:05:30 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='fdinfo\x00') r1 = openat$cgroup_ro(r0, &(0x7f00000000c0)='cpuset.effective_mems\x00', 0x0, 0x0) r2 = dup2(r1, r1) getdents64(r2, &(0x7f0000000180)=""/60, 0x3c) write$P9_RXATTRCREATE(r0, &(0x7f0000000080)={0x7, 0x21, 0x2}, 0x7) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x5) 16:05:30 executing program 3: [ 973.336887] libceph: parse_ips bad ip '[d:]: [ 973.336887] llb' [ 973.406982] libceph: parse_ips bad ip '[d:]: [ 973.406982] llb' [ 973.674031] IPVS: ftp: loaded support on port[0] = 21 16:05:31 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, 0x0, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_INFO(r1, 0x29, 0x40, &(0x7f00000000c0)={'security\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\xfa\x00'}, &(0x7f0000000140)=0x54) 16:05:31 executing program 1: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[]::]:\nllb:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x6000000, 0x0) 16:05:31 executing program 4: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = dup(0xffffffffffffffff) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MON_PEER_GET(r0, &(0x7f0000000400)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000140)={&(0x7f00000001c0)={0x234, r1, 0x700, 0x70bd27, 0x25dfdbfc, {}, [@TIPC_NLA_BEARER={0x80, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e22, 0x2, @dev={0xfe, 0x80, [], 0x1c}, 0x2}}, {0x14, 0x2, @in={0x2, 0x4e24, @rand_addr=0x7}}}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0xffff}, @TIPC_NLA_BEARER_PROP={0x24, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x80}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1d}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xc}]}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz2\x00'}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x6}]}, @TIPC_NLA_NET={0x4}, @TIPC_NLA_MON={0x14, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x5}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xdb}]}, @TIPC_NLA_NODE={0x44, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x3}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x3}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x9}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x7}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x7f}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_MEDIA={0x44, 0x5, [@TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}]}, @TIPC_NLA_MEDIA_PROP={0x24, 0x2, [@TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xffffffff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x18}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}]}, @TIPC_NLA_NET={0x18, 0x7, [@TIPC_NLA_NET_ID={0x8, 0x1, 0x7}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x2}]}, @TIPC_NLA_BEARER={0x7c, 0x1, [@TIPC_NLA_BEARER_PROP={0xc, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}]}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x10000}, @TIPC_NLA_BEARER_PROP={0x4c, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x100}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xd}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x10}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8270}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x17}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1e}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x19}]}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x6}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x4}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x1ff}]}, @TIPC_NLA_MON={0x2c, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x1}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x3}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x401}, @TIPC_NLA_MON_REF={0x8}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x2}]}, @TIPC_NLA_SOCK={0x10, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x100000000}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}, @TIPC_NLA_SOCK={0x30, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x2059}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x17}, @TIPC_NLA_SOCK_REF={0x8}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8}]}]}, 0x234}, 0x1, 0x0, 0x0, 0x20000000}, 0x1) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[d::]:\nllb:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 16:05:31 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='task\x00') getdents64(r0, &(0x7f0000000000)=""/60, 0x3c) write$uinput_user_dev(r0, &(0x7f0000000100)={'syz0\x00', {0x6, 0xbef}, 0x46, [0x0, 0x100000001, 0xfffffffffffffffc, 0x7f, 0x4000000000000000, 0x40, 0x2, 0x101, 0x0, 0x8, 0x6, 0x100, 0x6, 0x74, 0x1, 0x6, 0x6, 0xffffffff7fffffff, 0xffffffff00000000, 0x6, 0x200, 0x8001, 0x2, 0x585, 0xffff, 0x7, 0x0, 0x645, 0x1000, 0x9af, 0xffffffffffffffe0, 0x88, 0x6, 0x2, 0xfffffffffffffff9, 0x6, 0x5, 0x7, 0x21, 0x8001, 0x101, 0x4, 0x8, 0x800, 0x801, 0x0, 0x7507, 0x3, 0x1ff, 0x1, 0x2, 0x7, 0x0, 0x0, 0x1, 0x89, 0x8a59, 0x8, 0x2, 0x0, 0xffffffff00000001, 0xffffffff, 0xc5, 0x9d7], [0x6, 0x8000, 0x7, 0x1, 0x4, 0x1, 0x5, 0x80000000, 0x9, 0x100, 0x5, 0x1, 0x2, 0x8, 0xffffffffffffff7f, 0x6, 0xfffffffffffffffa, 0x7fffffff, 0x1, 0x9, 0x9, 0x7, 0x5, 0x2, 0x100000000, 0x0, 0x9, 0x40, 0x4d, 0xfffffffffffffffb, 0x6, 0x2, 0x2, 0x800, 0x100, 0x0, 0x1000, 0xfffffffffffffffd, 0x8, 0x8, 0x0, 0x7, 0x1, 0x100000000, 0xb2c, 0x7fffffff, 0x2, 0xffffffffffff2cda, 0x8000, 0x7, 0x9, 0x4, 0x81, 0xe7, 0x8, 0xffffffffffffff00, 0x3, 0x0, 0x6, 0x3, 0x7fff, 0x80000000, 0x80000001, 0x1], [0x10001, 0x8, 0x7fb0, 0x5, 0xcd36, 0x6, 0x7fff, 0x1, 0xffffffff, 0x80, 0x2, 0x81, 0x12b, 0x7, 0x9, 0xa6, 0x40, 0xc9, 0x3, 0xfff, 0x8, 0x80000000, 0x8, 0x6, 0xc0000000000, 0xfff, 0x6, 0x5, 0x9, 0x6, 0x6, 0x4d, 0x9, 0x75, 0x0, 0x0, 0xfffffffffffffffa, 0x8, 0x3, 0x6, 0x5, 0x15, 0x5, 0xa7d, 0x5, 0x73f0, 0x3, 0x4, 0x1, 0x401, 0x4, 0x1f, 0x3, 0x20, 0xf42, 0xf8, 0x1bfc, 0x80000001, 0x8, 0x3f, 0xe2, 0x200, 0x9, 0x3], [0x1, 0x685d, 0x200000000000, 0x800, 0x8, 0x0, 0x5, 0xff, 0x2, 0x0, 0x3, 0x40, 0x9, 0xfffffffeffffffff, 0x400, 0x1, 0xfcf, 0xff, 0x4, 0x8, 0x0, 0x8, 0x4, 0x7f, 0x9, 0x56, 0x5, 0x81, 0xe6, 0x3f, 0x44e2, 0xd8a, 0x56, 0x4, 0x800, 0x8, 0x9, 0x100000000, 0x1210000000, 0x2, 0x6, 0x81, 0x5, 0x1f, 0x1, 0x3, 0x7ff, 0x3, 0x1f, 0x7, 0xa58, 0x6, 0x3, 0xf0, 0x241, 0x200, 0xf3a8, 0x8, 0xffffffff, 0x5, 0xb50c, 0x0, 0x200, 0x5]}, 0x45c) 16:05:31 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020200090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e0100000001000000000000002402000100f8ffffff0000000200020000030005000000000002004e20e00000010000000000000000"], 0x60}}, 0x0) 16:05:31 executing program 3: 16:05:31 executing program 3: 16:05:31 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='fdinfo\x00') getdents64(r0, &(0x7f0000000000)=""/60, 0x3c) ioctl$KVM_S390_INTERRUPT_CPU(r0, 0x4010ae94, &(0x7f0000000080)={0x8001, 0x9, 0x5}) sendto$unix(0xffffffffffffff9c, &(0x7f00000000c0)="6c9b28987983ff838228b44d1e65e579f9342bcc381dfd4eb3c41b00c1c0689f2ef2cd5702a65c53bfad433a7dc33407deafc2c5842e006f84bb34a9df91a194128024538299d47e13211dc8be830d9b9bb65a78055e9e9add28e5dc305cad4e151d13e28e52a3b2588a38e9d6e4a39bc1d338416d0294bcf939340ff4b9", 0x7e, 0x40, &(0x7f0000000140)=@file={0x1, './file0\x00'}, 0x6e) [ 973.785597] libceph: parse_ips bad ip '[]::]: [ 973.785597] llb' [ 973.798841] libceph: parse_ips bad ip '[]::]: [ 973.798841] llb' [ 973.811507] libceph: parse_ips bad ip '[d::]: [ 973.811507] llb' 16:05:31 executing program 1: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[]::]:\nllb:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x20000000, 0x0) [ 973.856631] IPVS: ftp: loaded support on port[0] = 21 16:05:31 executing program 4: r0 = socket$packet(0x11, 0x0, 0x300) r1 = semget$private(0x0, 0x3, 0x0) semctl$IPC_STAT(r1, 0x0, 0x2, &(0x7f0000000000)) recvmmsg(r0, &(0x7f0000003780)=[{{&(0x7f00000001c0)=@generic, 0x80, &(0x7f0000000600)=[{&(0x7f0000000140)=""/50, 0x32}, {&(0x7f0000000240)=""/83, 0x53}, {&(0x7f00000002c0)=""/203, 0xcb}, {&(0x7f00000003c0)=""/55, 0x37}, {&(0x7f0000000400)=""/36, 0x24}, {&(0x7f0000000440)=""/214, 0xd6}, {&(0x7f0000000540)=""/41, 0x29}, {&(0x7f0000000580)=""/116, 0x74}], 0x8, &(0x7f0000000680)=""/4096, 0x1000}, 0x3f}, {{&(0x7f0000001680)=@hci, 0x80, &(0x7f00000019c0)=[{&(0x7f0000001700)=""/81, 0x51}, {&(0x7f0000001780)=""/176, 0xb0}, {&(0x7f0000001840)=""/106, 0x6a}, {&(0x7f00000018c0)=""/26, 0x1a}, {&(0x7f0000001900)=""/165, 0xa5}], 0x5, &(0x7f0000001a40)=""/222, 0xde}, 0x5}, {{0x0, 0x0, &(0x7f0000001e40)=[{&(0x7f0000001b40)=""/88, 0x58}, {&(0x7f0000001bc0)=""/209, 0xd1}, {&(0x7f0000001cc0)=""/7, 0x7}, {&(0x7f0000001d00)=""/66, 0x42}, {&(0x7f0000001d80)=""/181, 0xb5}], 0x5, &(0x7f0000001ec0)=""/160, 0xa0}, 0x7e}, {{&(0x7f0000001f80)=@ipx, 0x80, &(0x7f0000002200)=[{&(0x7f0000002000)=""/170, 0xaa}, {&(0x7f00000020c0)=""/119, 0x77}, {&(0x7f0000002140)=""/73, 0x49}, {&(0x7f00000021c0)=""/50, 0x32}], 0x4, &(0x7f0000002240)=""/22, 0x16}, 0x3}, {{&(0x7f0000002280)=@nl, 0x80, &(0x7f0000003600)=[{&(0x7f0000002300)=""/101, 0x65}, {&(0x7f0000002380)=""/133, 0x85}, {&(0x7f0000002440)=""/4096, 0x1000}, {&(0x7f0000003440)=""/207, 0xcf}, {&(0x7f0000003540)=""/163, 0xa3}], 0x5, &(0x7f0000003680)=""/199, 0xc7}, 0xfffffffffffffffd}], 0x5, 0x20, &(0x7f00000038c0)) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="5b6c3a3a5d3a0a0500000000"], &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) r2 = dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x0) ioctl$TIOCGSOFTCAR(r2, 0x5419, &(0x7f0000003900)) ioctl$RTC_PLL_SET(r2, 0x40207012, &(0x7f0000003940)={0x289, 0x6, 0x400, 0x6133f1c2, 0xffffffffffffb594, 0x5a, 0x400000000000005}) accept$packet(r2, 0x0, &(0x7f0000000000)) syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x3a7768b, 0x4c000) 16:05:31 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020200090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e0100000001000000000000002402000100f8ffffff0000000200100000030005000000000002004e20e00000010000000000000000"], 0x60}}, 0x0) 16:05:31 executing program 3: [ 973.950043] libceph: parse_ips bad ip '[]::]: [ 973.950043] llb' [ 973.977190] libceph: parse_ips bad ip '[]::]: [ 973.977190] llb' [ 974.296362] IPVS: ftp: loaded support on port[0] = 21 16:05:32 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, 0x0, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_INFO(r1, 0x29, 0x40, &(0x7f00000000c0)={'security\x00\x00\x00\x03\x82\x00'}, &(0x7f0000000140)=0x54) 16:05:32 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='fdinfo\x00') getdents64(r0, &(0x7f0000000000)=""/60, 0x3c) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000080)={@in={{0x2, 0x4e20, @broadcast}}, 0x0, 0x100000000, 0x0, "2330fe669bdaef8439a39219f5899d310ed8d628638c9c35113c02b2b902a21c45f59ff3cec5b9207b01e6cf6f7b5b4e023bc4fd96a247a77bba5a27d5b3dda6b5be662e4bee42882f059f5054db092d"}, 0xd8) 16:05:32 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020200090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e0100000001000000000000002402000100f8ffffff0000000200002000030005000000000002004e20e00000010000000000000000"], 0x60}}, 0x0) 16:05:32 executing program 4: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x3, 0x2) ioctl$VIDIOC_S_FREQUENCY(r0, 0x402c5639, &(0x7f00000000c0)={0x4, 0x0, 0xa595}) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[d::]:\nllb:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 16:05:32 executing program 3: 16:05:32 executing program 1: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[]::]:\nllb:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x40000000, 0x0) 16:05:32 executing program 4: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) setxattr$security_smack_transmute(&(0x7f00000000c0)='./file1\x00', &(0x7f0000000140)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000380)='TRUE', 0x4, 0x1) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[d::]:\nllb:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/rtc0\x00', 0x232200, 0x0) ioctl$KVM_SET_DEBUGREGS(r0, 0x4080aea2, &(0x7f0000000400)={[0x100004, 0x3000, 0x2, 0x100000], 0xc1, 0x21, 0x4}) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) ioctl$KVM_SET_FPU(r1, 0x41a0ae8d, &(0x7f00000001c0)={[], 0x6, 0x80000000, 0xffffffffffff0ce2, 0x0, 0x8, 0x0, 0x5000, [], 0x6}) 16:05:32 executing program 3: 16:05:32 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020200090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e0100000001000000000000002402000100f8ffffff0000000200000000010005000000000002004e20e00000010000000000000000"], 0x60}}, 0x0) [ 974.414101] libceph: parse_ips bad ip '[d::]: [ 974.414101] llb' [ 974.438238] libceph: parse_ips bad ip '[]::]: [ 974.438238] llb' [ 974.522843] IPVS: ftp: loaded support on port[0] = 21 [ 974.541349] libceph: parse_ips bad ip '[]::]: [ 974.541349] llb' 16:05:32 executing program 0: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vcs\x00', 0x201, 0x0) ioctl$UI_SET_PROPBIT(r0, 0x4004556e, 0x15) llistxattr(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/87, 0x57) uselib(&(0x7f0000000280)='./file0\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000300)='R\xce\x0f\x1au\x1b\xf0(\xb8\xa5;\xc6\xfa\v\xd3\x7f\x9b\xb6nX\x8a\xbe\xb9g\t\xb1\xcb\xeeSN\xca') fsetxattr$security_smack_transmute(r1, &(0x7f0000000200)='security.SMACK64TRANSMUTE\x00', &(0x7f00000002c0)='TRUE', 0x4, 0x3) lsetxattr$security_evm(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='security.evm\x00', &(0x7f00000001c0)=@sha1={0x1, "4071b2d34b7c7b5b8d9463cb97b64a3f0a2e7710"}, 0x15, 0x1) getdents64(r1, &(0x7f0000000000)=""/60, 0x3c) ioctl$sock_inet_tcp_SIOCOUTQNSD(r1, 0x894b, &(0x7f0000000040)) 16:05:32 executing program 3: 16:05:32 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020200090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e0100000001000000000000002402000100f8ffffff0000000200000000020005000000000002004e20e00000010000000000000000"], 0x60}}, 0x0) [ 974.571776] libceph: parse_ips bad ip '[d::]: [ 974.571776] llb' [ 974.610427] libceph: parse_ips bad ip '[d::]: [ 974.610427] llb' [ 974.972779] IPVS: ftp: loaded support on port[0] = 21 16:05:32 executing program 4: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$usbmon(&(0x7f0000000280)='/dev/usbmon#\x00', 0x7c, 0x200) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00') sendmsg$TIPC_NL_NET_SET(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x38, r1, 0x0, 0x70bd25, 0x25dfdbfe, {}, [@TIPC_NLA_SOCK={0x24, 0x2, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x3ff}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x9}]}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000000}, 0x1) mount(&(0x7f0000000040)=@nullb='[d::]:\nllb:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 16:05:32 executing program 1: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[]::]:\nllb:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x2000, 0x0) 16:05:32 executing program 0: r0 = syz_open_dev$video(&(0x7f0000000180)='/dev/video#\x00', 0x4, 0x0) ioctl$VIDIOC_SUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f00000001c0)={0x3, 0x100000000098f905, 0x3}) poll(&(0x7f0000000000)=[{r0}], 0x1, 0x0) acct(&(0x7f0000000200)='./file0\x00') pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCGIFMTU(r1, 0x8921, &(0x7f0000000280)) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='fdinfo\x00') setsockopt$SO_RDS_TRANSPORT(r2, 0x114, 0x8, &(0x7f0000000080), 0x4) getdents64(r2, &(0x7f0000000000)=""/60, 0x3c) ioctl$VIDIOC_SUBDEV_S_DV_TIMINGS(r2, 0xc0845657, &(0x7f00000000c0)={0x0, @reserved}) 16:05:32 executing program 3: 16:05:32 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, 0x0, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_INFO(r1, 0x29, 0x40, &(0x7f00000000c0)={'security\x00\x00\x00\x01d\x00'}, &(0x7f0000000140)=0x54) 16:05:32 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020200090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e0100000001000000000000002402000100f8ffffff0000000200000800030005000000000002004e20e00000010000000000000000"], 0x60}}, 0x0) 16:05:32 executing program 1: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[]::]:\nllb:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x500, 0x0) 16:05:32 executing program 3: r0 = gettid() syz_open_procfs(r0, &(0x7f0000001140)='\x00') [ 975.163930] libceph: parse_ips bad ip '[d::]: [ 975.163930] llb' 16:05:32 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='fdinfo\x00') getdents64(r0, &(0x7f0000000000)=""/60, 0x3c) getsockopt$sock_buf(r0, 0x1, 0x3f, &(0x7f0000000080)=""/254, &(0x7f00000001c0)=0xfe) 16:05:32 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020200090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e0100000001000000000000002402000100f8ffffff0000000200000200030005000000000002004e20e00000010000000000000000"], 0x60}}, 0x0) 16:05:32 executing program 4: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f00000000c0)='[d::]:\nllb:\x00', 0x7) sendmsg$TIPC_NL_MON_PEER_GET(r0, &(0x7f00000004c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40002000}, 0xc, &(0x7f0000000480)={&(0x7f00000002c0)={0x1a8, 0x0, 0x410, 0x70bd25, 0x25dfdbff, {}, [@TIPC_NLA_LINK={0x64, 0x4, [@TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0x54, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x17}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x12}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xff}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7fffffff}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xc0}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x13}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x80000000}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xffffffff00000000}]}]}, @TIPC_NLA_NET={0x2c, 0x7, [@TIPC_NLA_NET_NODEID={0xc, 0x3, 0x8383}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x7}, @TIPC_NLA_NET_ID={0x8, 0x1, 0xa3}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x4}]}, @TIPC_NLA_LINK={0x50, 0x4, [@TIPC_NLA_LINK_PROP={0x4c, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x2}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xc53f}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xd}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x2}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x52e}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}]}]}, @TIPC_NLA_SOCK={0x28, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x7fffffff}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x401}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x1}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0xfd}]}, @TIPC_NLA_BEARER={0x8c, 0x1, [@TIPC_NLA_BEARER_NAME={0x18, 0x1, @l2={'eth', 0x3a, 'veth0_to_bond\x00'}}, @TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e22, @broadcast}}, {0x14, 0x2, @in={0x2, 0x4e20, @multicast2}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e24, 0x5, @dev={0xfe, 0x80, [], 0xe}, 0x81}}, {0x20, 0x2, @in6={0xa, 0x4e24, 0x0, @mcast1, 0x101}}}}]}]}, 0x1a8}, 0x1, 0x0, 0x0, 0x1}, 0x5) r1 = open$dir(&(0x7f0000000000)='./file0\x00', 0x40000, 0x3) ioctl$VIDIOC_G_DV_TIMINGS(r1, 0xc0845658, &(0x7f00000001c0)={0x0, @bt={0x2, 0x41, 0x0, 0x1, 0x2, 0x81, 0x8, 0x3ff, 0x2, 0xb2f, 0x6, 0x1, 0x6, 0x1, 0x1, 0x4}}) mount(&(0x7f0000000040)=@nullb='[d::]:\nllb:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) [ 975.282508] IPVS: ftp: loaded support on port[0] = 21 [ 975.290323] libceph: parse_ips bad ip '[]::]: [ 975.290323] llb' 16:05:32 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='fdinfo\x00') socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x7fffffff) r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=@setneightbl={0x1c, 0x43, 0x301, 0x0, 0x0, {0xa}, [@NDTA_NAME={0x8, 0x1, '\x00'}]}, 0x1c}}, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) getdents64(r0, &(0x7f0000000000)=""/60, 0x3c) 16:05:32 executing program 1: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[]::]:\nllb:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x100000000000000, 0x0) 16:05:33 executing program 3: r0 = syz_open_dev$binder(&(0x7f0000872936)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000001c0)={0x2, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='\fc'], 0x0, 0x0, 0x0}) ppoll(&(0x7f0000000040)=[{r0}], 0x1, &(0x7f0000000100), 0x0, 0x0) 16:05:33 executing program 4: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = syz_open_dev$cec(&(0x7f0000000000)='/dev/cec#\x00', 0x0, 0x2) r1 = syz_genetlink_get_family_id$fou(&(0x7f0000000140)='fou\x00') sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0xc0080}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x20, r1, 0x2, 0x70bd2a, 0x25dfdbfb, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e23}]}, 0x20}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[d::]:\nllb:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 16:05:33 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020200090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e0100000001000000000000002402000100f8ffffff0000000200001000030005000000000002004e20e00000010000000000000000"], 0x60}}, 0x0) [ 975.450390] libceph: parse_ips bad ip '[d::]: [ 975.450390] llb' [ 975.618588] libceph: parse_ips bad ip '[d::]: [ 975.618588] llb' 16:05:33 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, 0x0, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_INFO(r1, 0x29, 0x40, &(0x7f00000000c0)={'security\x00\x00\x00\xdc\x01\x00'}, &(0x7f0000000140)=0x54) 16:05:33 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='\x00\x00\x00\x00\x01\x00\x00') getdents(r0, 0x0, 0x0) 16:05:33 executing program 1: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[]::]:\nllb:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x600000000000000, 0x0) 16:05:33 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020200090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e0100000001000000000000002402000100f8ffffff0000000200000020030005000000000002004e20e00000010000000000000000"], 0x60}}, 0x0) 16:05:33 executing program 4: r0 = shmget$private(0x0, 0x4000, 0x1, &(0x7f0000ffa000/0x4000)=nil) shmat(r0, &(0x7f0000ffb000/0x1000)=nil, 0x6000) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x80000) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(0xffffffffffffff9c, 0x84, 0x72, &(0x7f0000000280)={0x0, 0xfffffffffffffffa}, &(0x7f00000002c0)=0xc) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r1, 0x84, 0x78, &(0x7f0000000300)=r2, 0x4) mount(&(0x7f00000001c0)=ANY=[@ANYBLOB="5a643a3a0000000000000000cf21fa5fa2504e5b2e4e696266ee0254bd37beda08b96f3392e2c3d85f452efc78652c594e0c2df853b854be42bcaa4e0abee80a4072f57d7d5df65c594075043a501fdebb467c07437050761fa5938d3011f0030000003e534edcb580b37d942b3cae3db6fa0e2eba5291a857265b88dbcba40a7ab2c1d74eb58811c84c7f95d498f5d7845709d1a998050000000000000000f258ad16b42db8b9b1f339000000005b4a561e0000a9494b3dc7"], &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000040)='security.SMACK64\x00', &(0x7f00000000c0)='ceph\x00', 0x5, 0x0) 16:05:33 executing program 0: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/qat_adf_ctl\x00', 0x2, 0x0) fcntl$setflags(r0, 0x2, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='\t\x00\x00\x00\x96\xb0\x00I\x913\x87OK\x80\x96~\x1d\xa4\xa5\xaerB\x81\x94\x0e\xec\x16\x90\xb6B,jA\xcd$\xa5\xfb}!\x93\xc2\xb3\xfc\vh_\x11\xf1\xe4QEI\xde\x95sf\xaa\xed\x89\x9bl\xc7L\xb7\xd3\xb9o\xc1\x85&\xa5\xce\x03\x91\x9b\xdao\x06\xaa\xbc\xa9(\xd2\xc6\xcb#\xd3\xeep\xab\xab\xc8\xc0\x19\x19\xb9\x1dy\xc8d\x05\x9c\x8e\xcc\x97\x03\x91\xb6\xd7\f\xe5\x7f$`\x85\x88{\xd4e\xe4\xcef\x91') write$P9_RLOPEN(r0, &(0x7f00000000c0)={0x18, 0xd, 0x1, {{0x0, 0x1, 0x1}, 0x9}}, 0x18) getdents64(r1, &(0x7f0000000140)=""/60, 0xffffffffffffff1e) 16:05:33 executing program 1: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[]::]:\nllb:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x6000, 0x0) 16:05:33 executing program 4: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = gettid() syz_open_procfs(r0, &(0x7f0000000000)='projid_map\x00') clone(0x400002102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[d::]:\nllb:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) [ 976.048149] libceph: parse_ips bad ip 'Zd:' 16:05:33 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(r0, &(0x7f0000008880), 0x45b, 0x44000102, 0x0) setsockopt$inet6_int(r0, 0x29, 0x5, &(0x7f0000000100)=0x1, 0x4) sendto$inet6(r0, &(0x7f0000000140)='9', 0x1, 0x0, 0x0, 0x0) 16:05:33 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='fdinfo\x00') getdents64(r0, &(0x7f0000000000)=""/60, 0x3c) getdents64(r0, &(0x7f0000000080)=""/3, 0x3) 16:05:33 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020200090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e0100000001000000000000002402000100f8ffffff0000000200000400030005000000000002004e20e00000010000000000000000"], 0x60}}, 0x0) [ 976.189350] IPVS: ftp: loaded support on port[0] = 21 16:05:33 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020200090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e0100000001000000000000002402000100f8ffffff0000000200000008030005000000000002004e20e00000010000000000000000"], 0x60}}, 0x0) [ 976.336304] libceph: parse_ips bad ip '[d::]: [ 976.336304] llb' [ 976.368675] libceph: parse_ips bad ip '[d::]: [ 976.368675] llb' 16:05:34 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, 0x0, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_INFO(r1, 0x29, 0x40, &(0x7f00000000c0)={'security\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\xfe\x00'}, &(0x7f0000000140)=0x54) 16:05:34 executing program 4: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0xa2000, 0x0) ioctl$IOC_PR_REGISTER(r0, 0x401870c8, &(0x7f00000000c0)={0x3, 0x1}) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) mmap$binder(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x8, 0x8050, r0, 0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[d::]:\nllb:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) setsockopt$inet_mreq(r0, 0x0, 0x24, &(0x7f0000000140)={@multicast2, @local}, 0x8) 16:05:34 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='fdinfo\x00') getdents64(r0, &(0x7f0000000000)=""/60, 0x3c) r1 = dup3(r0, r0, 0x80000) getsockopt$IP_VS_SO_GET_TIMEOUT(r1, 0x0, 0x486, &(0x7f0000000140), &(0x7f0000000180)=0xc) getsockopt$inet_mreq(r0, 0x0, 0x24, &(0x7f00000000c0)={@loopback, @loopback}, &(0x7f0000000100)=0x8) socket$packet(0x11, 0x2, 0x300) r2 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)=0xffffffffffffffff, 0x4) ioctl$FICLONE(r0, 0x40049409, r2) 16:05:34 executing program 1: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[]::]:\nllb:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x4e00000000000000, 0x0) 16:05:34 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020200090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e0100000001000000000000002402000100f8ffffff0000000200000004030005000000000002004e20e00000010000000000000000"], 0x60}}, 0x0) 16:05:34 executing program 1: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[]::]:\nllb:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x300000000000000, 0x0) 16:05:34 executing program 4: r0 = accept4$inet(0xffffffffffffffff, &(0x7f0000000340), &(0x7f0000000380)=0x10, 0x0) getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffff9c, 0x84, 0xd, &(0x7f00000003c0)=@assoc_value={0x0, 0x300}, &(0x7f0000000400)=0x8) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000440)={r1, 0x3}, &(0x7f0000000480)=0x8) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=ANY=[@ANYBLOB='[d::P\x00\nllb:\x00'], &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff}) mknod$loop(&(0x7f0000000300)='./file0\x00', 0x200, 0x1) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffff9c, 0x84, 0x6d, &(0x7f00000001c0)={0x0, 0x67, "8eb171762b95a59d243cc8387f6ba86ecae6618a9a9c31fc0c4034ddf430a5a979c9f800e15b64fa571c4e31a6242cf4bed0e503f7e833280198021a3ee1c95b282115156eb0f7cfe27a4ede5168f06820e68945e759d1e2566c0ab8ea97b27652f0d6263b0a0f"}, &(0x7f00000000c0)=0x6f) r4 = getpgid(0x0) ioctl$sock_SIOCSPGRP(r2, 0x8902, &(0x7f00000004c0)=r4) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r2, 0x84, 0x1b, &(0x7f0000000240)={r3, 0xa4, "5715ca5a861b44b7e0d494f7857cb6dc9167146d467a59f51dd9f142a7a3a8c6214491889922f91918fd03aee1d0877e45b6c16acb4eb5627674a045b22836f51166009904de4fbd9c24a968867a70c1baeafeae04e0b036fafdf324db0098d92b3190464e951ea29ea35fb190705234525f50322541d626b1f5bece24949dbb126924c1d86c96532986062191dbb8726ef671e2af58a66101a634791a31305dc54dd6fb"}, &(0x7f0000000140)=0xac) [ 976.835749] libceph: parse_ips bad ip '[d::]: [ 976.835749] llb' 16:05:34 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='fdinfo\x00') ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685) getdents64(r0, &(0x7f0000000000)=""/60, 0x3c) [ 976.975655] IPVS: ftp: loaded support on port[0] = 21 [ 976.986155] ceph: device name is missing path (no : separator in [d::P) [ 977.029216] ceph: device name is missing path (no : separator in [d::P) 16:05:34 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f00000001c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000300)='net/if_inet6\x00') preadv(r0, &(0x7f00000017c0), 0x1d0, 0x0) 16:05:34 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020200090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e0100000001000000000000002402000100f8ffffff0000000200000002030005000000000002004e20e00000010000000000000000"], 0x60}}, 0x0) 16:05:34 executing program 4: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x597, 0x4200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x3, @broadcast}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fc, &(0x7f0000deaff0)={0x2, 0x3, @loopback}, 0x10) sendto(r1, &(0x7f0000000040), 0xfffffef4, 0x1, 0x0, 0x0) recvmmsg(r1, &(0x7f0000004740)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f00000001c0)=""/199, 0xc7}], 0x1}, 0x7}, {{&(0x7f0000000300)=@nl, 0x80, &(0x7f00000005c0)=[{&(0x7f0000000380)=""/13, 0xd}, {&(0x7f00000003c0)=""/58, 0x3a}, {&(0x7f0000000400)=""/118, 0x76}, {&(0x7f0000000480)=""/63, 0x3f}, {&(0x7f00000004c0)=""/105, 0x69}, {&(0x7f0000000540)=""/123, 0x7b}], 0x6, &(0x7f0000000640)=""/4096, 0x1000}, 0x7fff}, {{&(0x7f0000001640)=@generic, 0x80, &(0x7f00000026c0)=[{&(0x7f00000016c0)=""/4096, 0x1000}], 0x1, &(0x7f0000002700)=""/176, 0xb0}, 0x1}, {{&(0x7f00000027c0)=@ll, 0x80, &(0x7f0000002cc0)=[{&(0x7f0000002840)=""/49, 0x31}, {&(0x7f0000002880)=""/174, 0xae}, {&(0x7f0000002940)=""/169, 0xa9}, {&(0x7f0000002a00)=""/22, 0x16}, {&(0x7f0000002a40)=""/71, 0x47}, {&(0x7f0000002ac0)=""/11, 0xb}, {&(0x7f0000002b00)=""/163, 0xa3}, {&(0x7f0000002bc0)=""/50, 0x32}, {&(0x7f0000002c00)=""/100, 0x64}, {&(0x7f0000002c80)=""/1, 0x1}], 0xa, &(0x7f0000002d80)=""/12, 0xc}, 0x6}, {{&(0x7f0000002dc0)=@pppoe={0x18, 0x0, {0x0, @link_local}}, 0x80, &(0x7f0000002f00)=[{&(0x7f0000002e40)=""/133, 0x85}], 0x1, &(0x7f0000002f40)=""/71, 0x47}, 0x2}, {{&(0x7f0000002fc0)=@pptp={0x18, 0x2, {0x0, @remote}}, 0x80, &(0x7f0000004680)=[{&(0x7f0000003040)=""/94, 0x5e}, {&(0x7f00000030c0)=""/61, 0x3d}, {&(0x7f0000003100)=""/226, 0xe2}, {&(0x7f0000003200)=""/230, 0xe6}, {&(0x7f0000003300)=""/4096, 0x1000}, {&(0x7f0000004300)=""/214, 0xd6}, {&(0x7f0000004400)=""/180, 0xb4}, {&(0x7f00000044c0)=""/150, 0x96}, {&(0x7f0000004580)=""/24, 0x18}, {&(0x7f00000045c0)=""/187, 0xbb}], 0xa}}], 0x6, 0x20, &(0x7f00000048c0)={0x77359400}) shutdown(r1, 0x1) recvfrom$inet(r1, 0x0, 0x0, 0x40000101, 0x0, 0x0) ioctl$sock_SIOCGSKNS(r0, 0x894c, &(0x7f00000000c0)=0x30) ioctl$VT_RELDISP(r0, 0x5605) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) chmod(&(0x7f0000000140)='./file0\x00', 0x28) mount(&(0x7f0000000040)=@nullb='[d::]:\nllb:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 16:05:34 executing program 1: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[]::]:\nllb:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x5000000, 0x0) [ 977.224546] libceph: parse_ips bad ip '[]::]: [ 977.224546] llb' [ 977.289940] libceph: parse_ips bad ip '[d::]: [ 977.289940] llb' [ 977.534038] IPVS: ftp: loaded support on port[0] = 21 16:05:35 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, 0x0, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_INFO(r1, 0x29, 0x40, &(0x7f00000000c0)={'security\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00'}, &(0x7f0000000140)=0x54) 16:05:35 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='fdinfo\x00') fstatfs(r0, &(0x7f0000000080)=""/88) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000140)='TIPC\x00') getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f0000000240)={0x0, 0xcf, 0xfffffffffffffff9}, &(0x7f0000000280)=0x8) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r0, 0x84, 0x79, &(0x7f00000002c0)={r2, 0x2}, 0x8) sendmsg$TIPC_CMD_SET_NETID(r0, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x16}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x24, r1, 0x100, 0x70bd26, 0x25dfdbff, {{}, 0x0, 0x800b, 0x0, {0x8, 0x2, 0x1c000000}}, ["", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x40000}, 0x404c0c1) getdents64(r0, &(0x7f0000000000)=""/60, 0x3c) 16:05:35 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020200090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e0100000001000000000000002402000100f8ffffff0000000200000010030005000000000002004e20e00000010000000000000000"], 0x60}}, 0x0) 16:05:35 executing program 1: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[]::]:\nllb:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x8cffffff, 0x0) 16:05:35 executing program 3 (fault-call:2 fault-nth:0): mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[d::]:\nllbE\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 16:05:35 executing program 4: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f00000001c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 16:05:35 executing program 1: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[]::]:\nllb:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x40000, 0x0) [ 977.670999] libceph: parse_ips bad ip '[d::]: [ 977.670999] llb' [ 977.682939] FAULT_INJECTION: forcing a failure. [ 977.682939] name failslab, interval 1, probability 0, space 0, times 0 [ 977.725361] libceph: parse_ips bad ip '[d::]: [ 977.725361] llb' [ 977.748150] IPVS: ftp: loaded support on port[0] = 21 [ 977.756723] CPU: 0 PID: 14564 Comm: syz-executor3 Not tainted 4.20.0-rc7+ #381 [ 977.764108] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 977.773477] Call Trace: [ 977.776084] dump_stack+0x244/0x39d [ 977.779736] ? dump_stack_print_info.cold.1+0x20/0x20 [ 977.784954] should_fail.cold.4+0xa/0x17 [ 977.789033] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 977.794158] ? __f_unlock_pos+0x19/0x20 [ 977.798145] ? lock_downgrade+0x900/0x900 [ 977.802306] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 977.807854] ? proc_fail_nth_write+0x9e/0x210 [ 977.812365] ? find_held_lock+0x36/0x1c0 [ 977.816463] ? perf_trace_sched_process_exec+0x860/0x860 [ 977.821933] ? __lock_is_held+0xb5/0x140 [ 977.826019] __should_failslab+0x124/0x180 [ 977.830268] should_failslab+0x9/0x14 [ 977.834076] __kmalloc_track_caller+0x2d1/0x760 [ 977.838763] ? strncpy_from_user+0x5a0/0x5a0 [ 977.843178] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 977.848725] ? strndup_user+0x77/0xd0 [ 977.852545] memdup_user+0x2c/0xa0 [ 977.856110] strndup_user+0x77/0xd0 [ 977.859757] ksys_mount+0x3c/0x140 [ 977.863310] __x64_sys_mount+0xbe/0x150 [ 977.867297] do_syscall_64+0x1b9/0x820 [ 977.871195] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 977.876579] ? syscall_return_slowpath+0x5e0/0x5e0 [ 977.881514] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 977.886367] ? trace_hardirqs_on_caller+0x310/0x310 [ 977.891396] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 977.896430] ? prepare_exit_to_usermode+0x291/0x3b0 [ 977.901488] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 977.906351] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 977.911546] RIP: 0033:0x457669 [ 977.914762] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 977.933677] RSP: 002b:00007fb9974a7c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 977.941399] RAX: ffffffffffffffda RBX: 00007fb9974a7c90 RCX: 0000000000457669 [ 977.948680] RDX: 0000000020000100 RSI: 0000000020000080 RDI: 0000000020000040 [ 977.955953] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 977.963226] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fb9974a86d4 16:05:35 executing program 1: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[]::]:\nllb:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x1000000, 0x0) 16:05:35 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='fdinfo\x00') getdents64(r0, &(0x7f0000000000)=""/60, 0x3c) epoll_wait(r0, &(0x7f0000000080)=[{}, {}, {}, {}, {}, {}], 0x6, 0x9) [ 977.970506] R13: 00000000004c2de4 R14: 00000000004d51a8 R15: 0000000000000003 16:05:35 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020200090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e0100000001000000000000002402000100f8ffffff0000000200000000020005000000000002004e20e00000010000000000000000"], 0x60}}, 0x0) [ 978.003451] libceph: parse_ips bad ip '[]::]: [ 978.003451] llb' 16:05:35 executing program 4: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/qat_adf_ctl\x00', 0x40002, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000140)={&(0x7f0000000000)='./file0/file0\x00', r0}, 0x10) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[d::]:\nllb:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 16:05:35 executing program 1: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[]::]:\nllb:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0xf6ffffff, 0x0) [ 978.049860] libceph: parse_ips bad ip '[]::]: [ 978.049860] llb' [ 978.154070] libceph: parse_ips bad ip '[d::]: [ 978.154070] llb' 16:05:36 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, 0x0, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_INFO(r1, 0x29, 0x40, &(0x7f00000000c0)={'security\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00(\x00'}, &(0x7f0000000140)=0x54) 16:05:36 executing program 3: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[d::]:\nllbE\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 16:05:36 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='fdinfo\x00') getdents64(r0, &(0x7f0000000000)=""/60, 0xfffffffffffffe8a) 16:05:36 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020200090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e0100000001000000000000002402000100f8ffffff0000000200000000030405000000000002004e20e00000010000000000000000"], 0x60}}, 0x0) 16:05:36 executing program 4: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x1, 0x1) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lsetxattr$security_capability(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000200)='security.capability\x00', &(0x7f0000000240)=@v2={0x2000000, [{0x4, 0x1760000000}, {0x1, 0x9efb}]}, 0x14, 0x3) lsetxattr$security_selinux(&(0x7f0000000000)='./file1\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000140)='system_u:object_r:policy_src_t:s0\x00', 0x22, 0x1) mount(&(0x7f0000000040)=@nullb='[d::]:\nllb:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) r0 = syz_open_dev$dmmidi(&(0x7f0000000280)='/dev/dmmidi#\x00', 0x401, 0x20240) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) r2 = openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f0000000480)='/proc/self/attr/current\x00', 0x2, 0x0) r3 = socket$nl_crypto(0x10, 0x3, 0x15) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000004c0)='/proc/self/net/pfkey\x00', 0x482080, 0x0) r5 = socket$kcm(0x29, 0x0, 0x0) pipe2$9p(&(0x7f0000000500)={0xffffffffffffffff}, 0x800) sendmsg$unix(r0, &(0x7f0000000580)={&(0x7f00000002c0)=@file={0x1, './file1\x00'}, 0x6e, &(0x7f0000000440)=[{&(0x7f0000000340)="05075e028fd0e9de35511de10512db233c294b2384dc213c90ea69", 0x1b}, {&(0x7f0000000380)="2cfbeebf7e072c5b63f2f08ad53c488e0faf32ba24c55f3c3c76d4cde94c61b3b9e1e91175b247c0bbe0a6e3e0e93713a654035a804971a8766cd85d2ee6e72218c8c47e76861a0502c3d744a24d9fefba10165100e2b975eeddff256cbee590d705aafe", 0x64}, {&(0x7f0000000400)="a68ae02398f060348514540751f83cc7a2e9c2051085dc72cde1cdf8434750c1ba43942fcecb3d96eb0b40fb4235", 0x2e}], 0x3, &(0x7f0000000540)=[@rights={0x28, 0x1, 0x1, [r1, r2, r3, r4, r5, r6]}], 0x28, 0x20000000}, 0x890) 16:05:36 executing program 1: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[]::]:\nllb:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x2000000, 0x0) 16:05:36 executing program 0: openat$dlm_control(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/dlm-control\x00', 0x800, 0x0) r0 = dup2(0xffffffffffffff9c, 0xffffffffffffffff) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000400)=0x0) r2 = syz_open_procfs(r1, &(0x7f0000000000)='fdinfo\x00') getdents64(r2, &(0x7f00000000c0)=""/60, 0x3c) getsockname$packet(r2, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14) accept4$packet(r2, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000280)=0x14, 0x800) ioctl$DRM_IOCTL_MODESET_CTL(r2, 0x40086408, &(0x7f0000000180)={0x80000000, 0xffffffffffffff28}) setsockopt$inet6_mreq(r2, 0x29, 0x1f, &(0x7f0000000140)={@loopback, r3}, 0x14) ioctl$VHOST_GET_VRING_ENDIAN(r2, 0x4008af14, &(0x7f00000001c0)={0x1, 0x7ff}) ioctl$VHOST_GET_FEATURES(r2, 0x8008af00, &(0x7f0000000100)) [ 978.515863] libceph: parse_ips bad ip '[d::]: [ 978.515863] llb' [ 978.523165] ceph: device name is missing path (no : separator in [d::]: [ 978.523165] llbE) [ 978.532275] libceph: parse_ips bad ip '[]::]: [ 978.532275] llb' [ 978.549208] libceph: parse_ips bad ip '[]::]: [ 978.549208] llb' 16:05:36 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020200090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e0100000001000000000000002402000100f8ffffff000000020000000003f002000000000002004e20e00000010000000000000000"], 0x60}}, 0x0) [ 978.574792] libceph: parse_ips bad ip '[d::]: [ 978.574792] llb' 16:05:36 executing program 1: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[]::]:\nllb:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x300, 0x0) [ 978.639599] IPVS: ftp: loaded support on port[0] = 21 16:05:36 executing program 3: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='`d::]:\nllbE\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 16:05:36 executing program 4: lgetxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)=@random={'trusted.', '}lo\x00'}, &(0x7f0000000380)=""/212, 0xd4) r0 = syz_open_dev$dspn(&(0x7f00000015c0)='/dev/dsp#\x00', 0x4, 0x101000) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000001640)=@filter={'filter\x00', 0xe, 0x4, 0x3d0, 0x1e0, 0x0, 0x0, 0x1e0, 0x0, 0x338, 0x338, 0x338, 0x338, 0x338, 0x4, &(0x7f0000001600), {[{{@ip={@multicast1, @empty, 0xffffffff, 0xffffff00, 'ip6tnl0\x00', 'gretap0\x00', {}, {}, 0x6, 0x2, 0x10}, 0x0, 0xc0, 0xe8, 0x0, {}, [@common=@ttl={0x28, 'ttl\x00', 0x0, {0x2, 0x4}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x7}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x2, [0xfff, 0x6, 0x7, 0x9, 0x1, 0x2], 0x24, 0x9}, {0x1, [0x200, 0x40000000000, 0x7fff, 0x1, 0x7ff, 0x7], 0x1, 0x7f}}}}, {{@uncond, 0x0, 0xf8, 0x158, 0x0, {}, [@common=@socket0={0x20, 'socket\x00'}, @common=@set={0x40, 'set\x00', 0x0, {{0x8, [0x1ec, 0x6, 0x8, 0x6, 0x9, 0x5], 0x4, 0x80000001}}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @random="ecb9b78d57b8", 0x0, 0x0, [0x29, 0x8, 0x21, 0x1, 0x7, 0x33, 0x26, 0x2c, 0x2b, 0x25, 0x39, 0x22, 0x22, 0x31, 0x24, 0x1c], 0x3, 0x3, 0xfffffffffffffffb}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x430) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) lgetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@known='com.apple.system.Security\x00', &(0x7f0000000300)=""/68, 0x44) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f00000001c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 16:05:36 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='fdinfo\x00') getdents64(r0, &(0x7f0000000100)=""/60, 0x17) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x3, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r0) [ 978.716721] libceph: parse_ips bad ip '[]::]: [ 978.716721] llb' [ 978.851615] ceph: device name is missing path (no : separator in `d::]: [ 978.851615] llbE) [ 978.869177] ceph: device name is missing path (no : separator in [d::]: [ 978.869177] llb) [ 978.879915] ceph: device name is missing path (no : separator in `d::]: [ 978.879915] llbE) [ 978.900369] ceph: device name is missing path (no : separator in [d::]: [ 978.900369] llb) 16:05:36 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, 0x0, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_INFO(r1, 0x29, 0x40, &(0x7f00000000c0)={'security\x00\x00\x00\x00\x00\x01\xa6\x00'}, &(0x7f0000000140)=0x54) 16:05:36 executing program 1: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[]::]:\nllb:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x4e00, 0x0) 16:05:36 executing program 3: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='\nd::]:\nllbE\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 16:05:36 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020200090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e0100000001000000000000002402000100f8ffffff0000000200000000030018000000000002004e20e00000010000000000000000"], 0x60}}, 0x0) 16:05:36 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='fdinfo\x00') getdents64(r0, &(0x7f0000000000)=""/60, 0x3c) getsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000080), &(0x7f00000000c0)=0x8) 16:05:36 executing program 4: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[d::]:\nllb:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) setxattr$security_smack_entry(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.SMACK64IPIN\x00', &(0x7f0000000140)='\x17\x00', 0x2, 0x1) 16:05:36 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='fdinfo\x00') getdents64(r0, &(0x7f0000000000)=""/60, 0x3c) ioctl$KDSKBMETA(r0, 0x4b63, &(0x7f0000000080)=0xffffffffffffffc1) ioctl$NBD_DISCONNECT(r0, 0xab08) ioctl$PIO_FONTX(r0, 0x4b6c, &(0x7f00000000c0)="014f2bb6982afcd155ec89614d6a2e0866891e27fda297ab2987ec2c99e63459e5064a9a1f8015fede75b3a23c8028736a9b8a1d24974af502bf0189ef0f1762d7889de08f05464afb8a52d8f922ba72efe9d3955363492a68f7b389b07a26ecfc14a90c89291f24501f9129943143bd3fda2876453d") [ 979.249477] ceph: device name is missing path (no : separator in [ 979.249477] d::]: [ 979.249477] llbE) [ 979.250594] libceph: parse_ips bad ip '[d::]: [ 979.250594] llb' [ 979.269167] libceph: parse_ips bad ip '[]::]: [ 979.269167] llb' [ 979.280481] ceph: device name is missing path (no : separator in [ 979.280481] d::]: [ 979.280481] llbE) 16:05:36 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020200090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e0100000001000000000000002402000100f8ffffff000000020000000003001a000000000002004e20e00000010000000000000000"], 0x60}}, 0x0) 16:05:36 executing program 4: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x100, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffff9c, 0x84, 0x1f, &(0x7f00000001c0)={0x0, @in={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0xa}}}, 0x698c, 0xffffffff}, &(0x7f0000000140)=0x90) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f00000004c0)=ANY=[@ANYBLOB="52f47e3e7767a87f29e21cb7e3ce1c5bcd00def6a056e596c9d7a562c3e95bacbaa12de4f263f019e297415a90e11208a226b38a1c814575f93b", @ANYBLOB="0800e5a115f572f1bdfb87111eb2c6ea6c399a5e17ac22e91b0c4234053b8399a22b06c98f9c0dec8f6d3a6b06b506a4f87b86d0203a24eb6f21364b4c8179bb4ec47608ae0507f0401367e5ae92a3e640c03f03239aa574a4620d123b323f0567d2f0379cc7a68b10c10233f3d8cdd1cefcd6fa46f7b8d78748029694a26d9a998abed20d59dee274d59a467ac0f87e421b9fdf6ac3016a"], &(0x7f00000002c0)=0x2) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[d::]:\nllb:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) openat$vimc1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video1\x00', 0x2, 0x0) [ 979.296676] libceph: parse_ips bad ip '[]::]: [ 979.296676] llb' [ 979.315019] IPVS: ftp: loaded support on port[0] = 21 [ 979.318889] libceph: parse_ips bad ip '[d::]: [ 979.318889] llb' 16:05:37 executing program 3: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='%d::]:\nllbE\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 16:05:37 executing program 1: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[]::]:\nllb:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0xc0ed0000, 0x0) 16:05:37 executing program 0: r0 = openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/current\x00', 0x2, 0x0) sync_file_range(r0, 0x7, 0x1000000000009, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fdinfo\x00') getdents64(r1, &(0x7f0000000000)=""/60, 0x3c) [ 979.472492] ceph: device name is missing path (no : separator in %d::]: [ 979.472492] llbE) [ 979.499636] libceph: parse_ips bad ip '[]::]: [ 979.499636] llb' [ 979.509840] libceph: parse_ips bad ip '[d::]: [ 979.509840] llb' [ 979.539667] libceph: parse_ips bad ip '[]::]: [ 979.539667] llb' [ 979.774850] IPVS: ftp: loaded support on port[0] = 21 16:05:37 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, 0x0, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_INFO(r1, 0x29, 0x40, &(0x7f00000000c0)={'security\x00\x00\x00\x006\x00'}, &(0x7f0000000140)=0x54) 16:05:37 executing program 3: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[c::]:\nllbE\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 16:05:37 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020200090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e0100000001000000000000002402000100f8ffffff0000000200000000031005000000000002004e20e00000010000000000000000"], 0x60}}, 0x0) 16:05:37 executing program 4: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="03000000000000006c623a00"], &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0xd, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="850000000c0000005de7d8ff0c0000004588fdf80000ffff"], &(0x7f00000000c0)='GPL\x00', 0xd0d7, 0xfffffffffffffd40, &(0x7f00000001c0)=""/163, 0x41f00, 0x0, [], 0x0, 0x7}, 0x48) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000140)='trusted.overlay.redirect\x00', &(0x7f0000000300)='./file0\x00', 0x8, 0x3) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0xc, 0x100810, r0, 0x0) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000340)='/dev/dlm-monitor\x00', 0x1, 0x0) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r1, 0xc0305302, &(0x7f0000000380)={0x100000000, 0x100000000, 0x5d6, 0x1, 0x7b, 0xff}) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000003c0)={'team0\x00', 0x0}) connect$packet(r1, &(0x7f0000000400)={0x11, 0x2, r2, 0x1, 0x7, 0x6, @local}, 0x14) 16:05:37 executing program 1: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[]::]:\nllb:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x4e, 0x0) 16:05:37 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='fdinfo\x00') getdents64(r0, &(0x7f0000000080)=""/60, 0xfffffffffffffd37) 16:05:37 executing program 1: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[]::]:\nllb:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x60, 0x0) [ 979.867055] ceph: device name is missing path (no : separator in ) [ 979.882739] ceph: device name is missing path (no : separator in [c::]: [ 979.882739] llbE) 16:05:37 executing program 3: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[e::]:\nllbE\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 16:05:37 executing program 4: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=ANY=[@ANYBLOB="5b46a5ca708a8b8f643a3a5d3a0a6c6c623a00"], &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) [ 979.913280] ceph: device name is missing path (no : separator in ) 16:05:37 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='fdinfo\x00') ioctl$VIDIOC_ENUMOUTPUT(r0, 0xc0485630, &(0x7f0000000100)={0x100000000000000, "9eb6ea173a442245bc73f329579e48714d7221301212b9b734aa5db54282f038", 0x3, 0x9, 0x7fff, 0x1400}) getdents64(r0, &(0x7f0000000000)=""/60, 0x0) seccomp(0x0, 0x1, &(0x7f00000000c0)={0x7, &(0x7f0000000080)=[{0x3ff, 0x100, 0x8, 0x400000}, {0x4, 0x1, 0x6, 0x4e46}, {0xff, 0x400000000000, 0x7, 0x6}, {0x9, 0x2, 0x4, 0x2}, {0x5, 0xfffffffffffffff8, 0x101, 0x800}, {0xffffffffffffffc0, 0xfffffffffffffedf, 0x7, 0x7fff}, {0x5, 0x1000, 0x0, 0x100000001}]}) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000180)='/dev/snapshot\x00', 0x400000, 0x0) 16:05:37 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020200090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e0100000001000000000000002402000100f8ffffff0000000200000000030205000000000002004e20e00000010000000000000000"], 0x60}}, 0x0) 16:05:37 executing program 1: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[]::]:\nllb:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x4000000, 0x0) [ 980.021692] ceph: device name is missing path (no : separator in [e::]: [ 980.021692] llbE) [ 980.024456] IPVS: ftp: loaded support on port[0] = 21 [ 980.090088] libceph: parse_ips bad ip '[F¥ÊpŠ‹d::]: [ 980.090088] llb' [ 980.145900] libceph: parse_ips bad ip '[]::]: [ 980.145900] llb' [ 980.196864] libceph: parse_ips bad ip '[]::]: [ 980.196864] llb' [ 980.404770] IPVS: ftp: loaded support on port[0] = 21 16:05:38 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, 0x0, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_INFO(r1, 0x29, 0x40, &(0x7f00000000c0)={'security\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xc6\x00'}, &(0x7f0000000140)=0x54) 16:05:38 executing program 3: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[h::]:\nllbE\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 16:05:38 executing program 4: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4000400, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x6, 0xc0) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) sendfile(r0, r1, &(0x7f00000000c0), 0x0) mount(&(0x7f0000000040)=@nullb='[d::]:\nllb:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) gettid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000004c0)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000500)) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000540)) getpid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000580)) fcntl$getown(r0, 0x9) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000005c0)) r2 = getpid() getsockopt$inet_sctp6_SCTP_RECVNXTINFO(r1, 0x84, 0x21, &(0x7f0000000600), &(0x7f0000000640)=0x4) r3 = getpgid(r2) sched_setparam(r3, &(0x7f0000000140)) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000200)='/dev/hwrng\x00', 0x20000, 0x0) ioctl$KVM_CREATE_DEVICE(r0, 0xc00caee0, &(0x7f00000001c0)={0x2, r4}) r5 = request_key(&(0x7f0000000400)='encrypted\x00', &(0x7f0000000440)={'syz', 0x0}, &(0x7f0000000480)='ceph\x00', 0x0) keyctl$revoke(0x3, r5) r6 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') sendmsg$IPVS_CMD_GET_DEST(r4, &(0x7f00000003c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000380)={&(0x7f00000002c0)={0xa0, r6, 0x200, 0x70bd28, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_DEST={0x20, 0x2, [@IPVS_DEST_ATTR_ACTIVE_CONNS={0x8}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@local}]}, @IPVS_CMD_ATTR_DEST={0x24, 0x2, [@IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0x2}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e23}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x9}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0xffffffffffffff88}]}, @IPVS_CMD_ATTR_SERVICE={0x20, 0x1, [@IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x3e}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@rand_addr=0x9}]}, @IPVS_CMD_ATTR_DAEMON={0x14, 0x3, [@IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x1}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}]}, @IPVS_CMD_ATTR_SERVICE={0x14, 0x1, [@IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}]}]}, 0xa0}, 0x1, 0x0, 0x0, 0x40000}, 0x8010) 16:05:38 executing program 0: getdents64(0xffffffffffffffff, &(0x7f0000000000)=""/60, 0x3c) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x2000, 0x0) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000080)=0x8ec7) 16:05:38 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020200090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e0100000001000000000000002402000100f8ffffff0000000200000000030805000000000002004e20e00000010000000000000000"], 0x60}}, 0x0) 16:05:38 executing program 1: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[]::]:\nllb:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x8cffffff00000000, 0x0) 16:05:38 executing program 1: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[]::]:\nllb:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0xffffff7f00000000, 0x0) [ 980.556548] ceph: device name is missing path (no : separator in [h::]: [ 980.556548] llbE) 16:05:38 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020200090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e0100000001000000000000002402000100f8ffffff0000000200000000030002000000000002004e20e00000010000000000000000"], 0x60}}, 0x0) [ 980.603741] ceph: device name is missing path (no : separator in [h::]: [ 980.603741] llbE) 16:05:38 executing program 3: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[\n::]:\nllbE\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) [ 980.648892] IPVS: ftp: loaded support on port[0] = 21 16:05:38 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='fdinfo\x00') getdents64(r0, &(0x7f0000000000)=""/60, 0x3c) fcntl$getownex(r0, 0x10, &(0x7f0000000080)={0x0, 0x0}) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r0, 0xc1105518, &(0x7f0000000140)={{0xa, 0x7, 0x8, 0x2, 'syz0\x00', 0x6}, 0x2, 0x101, 0xff, r1, 0x9, 0x9, 'syz1\x00', &(0x7f00000000c0)=['/\x00', 'fdinfo\x00', '\x00', 'posix_acl_accessbdev[securityW:eth1,\x00', '\x00', 'fdinfo\x00', 'fdinfo\x00', 'fdinfo\x00', '\x00'], 0x46, [], [0x7, 0x2e, 0x2a01b4e9, 0x245]}) 16:05:38 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020200090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e0100000001000000000000002402000100f8ffffff0000000200000000030018000000000002004e20e00000010000000000000000"], 0x60}}, 0x0) 16:05:38 executing program 4: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x0, 0x0) r1 = syz_open_dev$sndpcmp(&(0x7f0000000140)='/dev/snd/pcmC#D#p\x00', 0x62, 0x101000) renameat(r0, &(0x7f00000000c0)='./file0\x00', r1, &(0x7f00000001c0)='./file0\x00') mount(&(0x7f0000000040)=@nullb='[d::]:\nllb:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) [ 980.746047] ceph: device name is missing path (no : separator in [ [ 980.746047] ::]: [ 980.746047] llbE) [ 981.213148] IPVS: ftp: loaded support on port[0] = 21 16:05:39 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, 0x0, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_INFO(r1, 0x29, 0x40, &(0x7f00000000c0)={'security\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\xf4\x00'}, &(0x7f0000000140)=0x54) 16:05:39 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='fdinfo\x00') writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000000)="5245e357e96318d7f42edbe2c375b244e1a8c3a737c9df17d9c3c359060feda08bb6bba5ae661a72e4cf60323436d0e2a51d7edc6298761cc6082f18", 0x3c}, {&(0x7f0000000080)="cf0818ac027c2624b5e7418a896ab4e2c3556722e6b8a852720b8fb91158bef841acf9e562ff5d094f88e1b94a3a29c9ed7235a9a45d8f37f2ccfb9a47b6b110eb0b11875abb09dd717ce17965af43e1a6a913e0ad61b28ddd1833d3ba88853545ff4f76a361cffd0b88", 0x6a}, {&(0x7f0000000140)="6812fbd27108db1127e8d8bb0f44bb00f91379630631434ffdb37705d2843171cbc206808047b5773f61", 0x2a}, {&(0x7f0000000180)="e1b0f8a63bb6d6060255dabe2d4050424de92b651426b77fa0f423855fdaa11c7fa58541", 0x24}], 0x4) clock_gettime(0xb, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, r3, &(0x7f0000fe7000/0x18000)=nil, &(0x7f0000000000)=[@text64={0x40, &(0x7f00000000c0)="c4c379146600006543a02d0000000000000064670f01cab8010000000f01d946d8f1e1b066ba400066edb9f60800000f32f2400f0964460f35", 0x39}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_PIT2(r2, 0x4040ae77, &(0x7f0000000100)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_PIT(r2, 0x8048ae66, &(0x7f00000001c0)={[{0x0, 0x0, 0x0, 0x0, 0x0, 0x3}]}) ioctl$KVM_RUN(r3, 0xae80, 0x0) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_GET_NETID(r0, &(0x7f0000000300)={&(0x7f0000000200), 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x1c, r4, 0x404, 0x70bd2a, 0x25dfdbfd, {}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x48840}, 0x40040) getdents64(r0, &(0x7f0000000100)=""/60, 0xa2b63368) preadv(r0, &(0x7f0000000580)=[{&(0x7f0000000340)=""/96, 0x60}, {&(0x7f00000003c0)=""/103, 0x67}, {&(0x7f0000000440)=""/183, 0xb7}, {&(0x7f0000000500)=""/89, 0x59}], 0x4, 0x0) 16:05:39 executing program 1: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[]::]:\nllb:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x700000000000000, 0x0) 16:05:39 executing program 3: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[%::]:\nllbE\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 16:05:39 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020200090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e0100000001000000000000002402000100f8ffffff000000020000000003001a000000000002004e20e00000010000000000000000"], 0x60}}, 0x0) [ 981.600790] ceph: device name is missing path (no : separator in [%::]: [ 981.600790] llbE) 16:05:39 executing program 3: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[\x1c::]:\nllbE\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 16:05:39 executing program 1: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[]::]:\nllb:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x7, 0x0) 16:05:39 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020200090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e0100000001000000000000002402000100f8ffffff0000000200000000030002f00000000002004e20e00000010000000000000000"], 0x60}}, 0x0) [ 981.641271] ceph: device name is missing path (no : separator in [%::]: [ 981.641271] llbE) [ 981.672882] IPVS: ftp: loaded support on port[0] = 21 16:05:39 executing program 4: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) prctl$PR_CAP_AMBIENT(0x2f, 0x1, 0x12) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="776402000000000000003a00"], &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 16:05:39 executing program 3: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[d\n:]:\nllbE\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) [ 981.757860] ceph: device name is missing path (no : separator in [::]: [ 981.757860] llbE) [ 981.768969] libceph: parse_ips bad ip '[]::]: [ 981.768969] llb' [ 981.782909] ceph: device name is missing path (no : separator in [::]: [ 981.782909] llbE) [ 981.793552] libceph: parse_ips bad ip '[]::]: [ 981.793552] llb' 16:05:39 executing program 1: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[]::]:\nllb:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0xffffff8c, 0x0) 16:05:39 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020200090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e0100000001000000000000002402000100f8ffffff0000000200000000030005000000020002004e20e00000010000000000000000"], 0x60}}, 0x0) [ 981.910254] ceph: device name is missing path (no : separator in [d [ 981.910254] :]: [ 981.910254] llbE) [ 981.988861] ceph: device name is missing path (no : separator in [d [ 981.988861] :]: [ 981.988861] llbE) [ 982.071675] IPVS: ftp: loaded support on port[0] = 21 16:05:39 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, 0x0, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_INFO(r1, 0x29, 0x40, &(0x7f00000000c0)={'security\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x9a\x00'}, &(0x7f0000000140)=0x54) 16:05:39 executing program 1: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[]::]:\nllb:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x2000000000000000, 0x0) 16:05:39 executing program 3: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[d%:]:\nllbE\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 16:05:39 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020200090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e0100000001000000000000002402000100f8ffffff0000000200000000030005e00000010002004e20e00000010000000000000000"], 0x60}}, 0x0) 16:05:39 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='fdinfo\x00') getdents64(r0, &(0x7f0000000000)=""/60, 0x3c) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x801, 0x0) [ 982.410646] ceph: device name is missing path (no : separator in [d%:]: [ 982.410646] llbE) 16:05:40 executing program 3: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[d`:]:\nllbE\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 16:05:40 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuset.memory_pressure\x00', 0x0, 0x0) getsockopt$inet_mreqsrc(r0, 0x0, 0x27, &(0x7f0000000100)={@multicast1, @remote, @broadcast}, &(0x7f0000000140)=0xc) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fdinfo\x00') linkat(r0, &(0x7f0000000180)='./file0\x00', r1, &(0x7f00000001c0)='./file0\x00', 0x400) syz_open_dev$ndb(&(0x7f0000000000)='/dev/nbd#\x00', 0x0, 0x200000) getdents64(r1, &(0x7f00000000c0)=""/60, 0x3c) [ 982.454761] IPVS: ftp: loaded support on port[0] = 21 16:05:40 executing program 1: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@loop={'/dev/loop', 0x0}, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) [ 982.561131] ceph: device name is missing path (no : separator in [d`:]: [ 982.561131] llbE) [ 982.596782] ceph: device name is missing path (no : separator in /dev/loop1) [ 982.638232] ceph: device name is missing path (no : separator in /dev/loop1) [ 983.006369] IPVS: ftp: loaded support on port[0] = 21 [ 983.538751] bridge0: port 1(bridge_slave_0) entered blocking state [ 983.545232] bridge0: port 1(bridge_slave_0) entered disabled state [ 983.552837] device bridge_slave_0 entered promiscuous mode [ 983.602919] bridge0: port 2(bridge_slave_1) entered blocking state [ 983.609526] bridge0: port 2(bridge_slave_1) entered disabled state [ 983.617024] device bridge_slave_1 entered promiscuous mode [ 983.665314] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 983.712950] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 983.858557] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 983.910669] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 984.144953] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 984.152546] team0: Port device team_slave_0 added [ 984.202291] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 984.210288] team0: Port device team_slave_1 added [ 984.258262] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 984.309714] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 984.316591] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 984.335328] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 984.376318] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 984.383806] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 984.401276] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 984.442742] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 984.450784] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 984.468530] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 984.976592] bridge0: port 2(bridge_slave_1) entered blocking state [ 984.983032] bridge0: port 2(bridge_slave_1) entered forwarding state [ 984.989761] bridge0: port 1(bridge_slave_0) entered blocking state [ 984.996137] bridge0: port 1(bridge_slave_0) entered forwarding state [ 985.004857] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 985.317679] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 987.606199] 8021q: adding VLAN 0 to HW filter on device bond0 [ 987.840407] device bridge_slave_1 left promiscuous mode [ 987.845975] bridge0: port 2(bridge_slave_1) entered disabled state [ 987.856275] device bridge_slave_0 left promiscuous mode [ 987.862151] bridge0: port 1(bridge_slave_0) entered disabled state [ 990.193438] team0 (unregistering): Port device team_slave_1 removed [ 990.206910] team0 (unregistering): Port device team_slave_0 removed [ 990.217259] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 990.231624] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 990.262295] bond0 (unregistering): Released all slaves [ 990.295650] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 990.461296] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 990.467950] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 990.475106] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 990.647123] 8021q: adding VLAN 0 to HW filter on device team0 16:05:49 executing program 3: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[d:\n]:\nllbE\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 16:05:49 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020200090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e0100000001000000000000002402000100f8ffffff0000000200000000030005040000000002004e20e00000010000000000000000"], 0x60}}, 0x0) 16:05:49 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='fdinfo\x00') setsockopt$bt_BT_CHANNEL_POLICY(r0, 0x112, 0xa, &(0x7f0000000080)=0x8001, 0x4) getdents64(r0, &(0x7f0000000000)=""/60, 0x3c) 16:05:49 executing program 4: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(&(0x7f0000000000)='./file0\x00', 0xe0c2, 0x0) mount(&(0x7f0000000040)=@nullb='[d::]:\nllb:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ceph\x00', 0x0, 0x0) 16:05:49 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, 0x0, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_INFO(r1, 0x29, 0x40, &(0x7f00000000c0)={'security\x00\x00\x00\x00\x00\x03\x10\x00'}, &(0x7f0000000140)=0x54) 16:05:49 executing program 1: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f00000001c0)=ANY=[@ANYBLOB="0200000000000000006257e82b777b89da3c5c3c73462352672b8ddd2a8a4a18ef5228fc7b38b1049b060f9ea465fb587a53eb01347d537e9b33ee1120d9e5eb281a0bf30c5605cb62e3def18419bcf3d8c124fad35fbe3c8eb180764a25c0fd35c811f0b4ac13e6dc0ce97bac009e173b60e03d8fbfea231016673a859e16a9021a467ac6bda7760c9347024f8130589baf77c32165602e5783c52f2567520238c646e3c661cae848b33be6e3263b502c13"], &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='io.stat\x00', 0x0, 0x0) sendmsg(r0, &(0x7f0000003cc0)={0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="28be03cd7fc7e87b57da4e2e79926b1e151d51a93320d845dcace2e57d56adee89471289fb35a5c89ce0bb74825df3c0a698f31e40530cbd68dc7926da703678167bb050dab57bb390bfff8769dbb2dec1a10269f24f42a5c02a582e3fb51e86414a256114cbbdc409db8d9bf42447543c27f30ee2a73bdd374f5ff819d4e963289e4e0ff9cb48d56e86caa825a6a5ea6aeda04bb67a614768dccf69117c9c97ee0d2baac083e48570ab6dfcf9102fcca629e3abeee802", 0xb7}, {&(0x7f0000000040)="5181d9b9da76f34a7faaaf88864c01f9739b7357a2bd8ff81dd4bb", 0x1b}, {&(0x7f00000000c0)="58a51a9a319453cc9c0b", 0xa}, {&(0x7f00000003c0)="49028453feefc46bd61fa6e6dbcfbd351ccfc0bcdfc81feedd5e6b7fc33cbc31fb0c9305f0c734d50bcc7202d7c0726fdd2dced3dc15207cb7a8af00137cf3c42325a6d45b4adc7038db2b714c39ef96ae8d8e8c", 0x54}, {&(0x7f0000000440)="23863121bffa2f0e91daf86d1d675e4d1e1bc3907b28bed4d6a77adb0729eb7603f3b5ef3bfe14498c44b76d329d54e27958a470af3dc55d131867c4d3a87ff3964d9f9b3f3e5b716260426fcb487039de04fd036f1baaa415c42d2bb35f0be364197e660e65c00009f30813c7df27f4290fb164a9dec2d7bda65ff16eeb576d9a114c90ade3b8a29512f81826cca0f09783bcf4bd6d113d52259419930448f5cbccf3513553198334eabc4ecf87cb81ec34cd1913", 0xb5}, {&(0x7f0000000500)="843d91b6bf39e116ffbc03331bc906c961cfd85045a4b1307d8ea2c7c9b36713a29abea2c1faa44b2806721851c26a228454090f6f47873c505f475bc4f71ebdc205d53ec46e14396c3a6abd15da1b28e9c3214da942703af829", 0x5a}, {&(0x7f0000000580)="1518174dfa8c1dc3a71f7e55ffd2ec4e7ff53d9cbf23d1b5565765096e11ca0d8ca848696589931a1483d23927472eb7c1c6c193b8e003a48f1d02508a0e4633325c9bc56f1eab4b456e4ba9147c137f206c845a9177beebb2e775bf17f8400811ceb24f4b99c93d1f0e67a94796f2afce3fd6a37b6a69ccfc874c92e26588b7a1f29b4ad0ef2f6886c5bac580e7e4920c7c0a089afb03a05eac6e9b70b65d3fd59fd0fd9631252b9ef1dcfe89ccbb273f2a92dd69c202612c35db262f88a95dff74f4b1648f6a6c97258ae958049511495d179b28e6c09b359518a3cac401106f", 0xe1}, {&(0x7f0000000140)}, {&(0x7f0000000680)="b58ae1b9d1a32ce367bdb27306c489283db4327f108ce05098e4985045b983de2c71625e175694990e1ed24912598e910d8bdbf58a2171d5c30ff1651ac98df6aecb76d41cb11e12de897f6c6b8f0c5eee64f1f30a1552b87af1b15d6f20466df211", 0x62}], 0x9, &(0x7f00000007c0)=[{0x1010, 0x117, 0x80000001, "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"}, {0x1010, 0x102, 0x1, "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"}, {0xa8, 0x10b, 0xbea, "60e2ba37dd6e9b7a24fa217e9b336edf36b4057568c11393498baabfa3e4087e5ab413362f88ae30344816c219c675fb55e411d2d9e7598e6447add12def0c3d39e5addb57ddfc7c3b2ec8271c4a3a35755c2bb2dd66c5cb55777373e77d0ca168e6403032f05d43876cbc2e02e04113ae6483f7e7993f550be00d513de78e2f9da45588660faf3d7da649bc421465d716d269d1e5700ae5"}, {0xe8, 0x109, 0x9, "44edf9300340c547a3ca0dca2d61414f544f27b8e6745b0683684e4b4d19944675d5f9fd6ac56058ff3648f41bf294e90692baa6109a02b2e1ebc8058c23afdd94a43a88152668aef00535564367c6c74b451320f36943e1d685c7964ae52c424968d9ae7b3eb852487b22b9fd2534573f39e371e982d8b5dd26e2b0daea65b86d16f32c0d05814f75bf8b4bfd14da2c142a9d6545f4320448baad833cf340614098b04fb880445b9e18a9f4183ef4b04d40a2ef003bd218101768637d267176e39a39f0ad6ed57ac5518dcc4150a3aaa5"}, {0x1010, 0x10d, 0x10000, "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"}, {0x10, 0x1, 0xbcb0}, {0x108, 0x10f, 0xfc, "e963bdb2f4bf13ed1776a0eed6566378005b666a79187e6864932c752e49f07cd062a978c8c640628c47e322688840f0377ee99068bccaaf29bb1eeea0814fededb999a21c0cb3c13130629068a822cda7ed2315ce1402600ae75f02ea308d9cf37f8d8d32ca3b73b435b6bbf46f36dad14ff0f723f27d4bc3fb7d1e0da5d491a0e52d95cf83bbfb1a54c2bdd281f037c7943f152edd75c6a718e27e5fe049a4a8820197f0d2c881c86531c934fc68ee0ffa0ea73ffdf55c76662e46cf6043bea499fe1a1716533604558b7402b9525ce6b4ef029b56b02333ea48e88e47132e285a40aaff5528cb0383ea86553e32dd73e3a4259a6919"}, {0x108, 0x116, 0x0, "51567cea22430b1f9abcb4417e1f9605dc99e35ca06fa5a2f1a86387f6c914bf93f9e34f15c684108869cf57212d01c1c4338a723839d4bf3ef21d8ac2ea51eacd8778217e02d9c9b96c5e9cdd4c0baf2609daeddd14ab2ee4c21a1ece66bd8dbd80d581d6acc9435c71d90eaed1f5e06c60f5ff0da7a6ebfc8feb10a47ee4308353c013689d8e8f87bb54d1ca5d6941fe860da8dcc3559dbff951b6b2a7ed30eb7536952ab4921295c61c38e435f976a46a9588e7e45bf258b056f8bc96cf303255a35e746bfc4489ec4c70092f2ea18d07bd99fbb425e46edd458f4623b569be4d465f93591d9779cedb41f4b94f77de"}, {0xf8, 0x119, 0xffffffffffffff6b, "a62c68a2d68df29d6ad39ff1f9a8a65c0d3c4a3f8688fff6c9558f4d58aaf4a38fdc500f3dbc2617d5321b1fe6e9e7c894762eddca8eace055cd24d7b0ae321e9792c54d363cf6aace90436d0be20c70320d82cbd52336f53a24ce6448ff9affff6f3af7f1647d028184483a1b7a34d037a63be939140322f88c4cedaa715849bea7adc28147f1ca0e743c80238f8e0e4ced4e03eacf868b2e10d7a8428b6400854db1483ed83e54be46e2c7f8a3d6bcbc45eed6407c89b77d4223620fb771c22c40e0de4abd9e9f4f628f8b2848ad8df322b0a16659f1890ae95d7dec5636c5fd254902d7"}], 0x34d8}, 0x40000) ioctl$sock_inet_SIOCDELRT(r0, 0x890c, &(0x7f0000000280)={0x0, {0x2, 0x4e23, @broadcast}, {0x2, 0x4e20, @rand_addr=0x400}, {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x16}}, 0x40, 0x0, 0x0, 0x0, 0x81, 0x0, 0x3, 0x9, 0x2}) [ 991.708420] ceph: device name is missing path (no : separator in wd) [ 991.717007] ceph: device name is missing path (no : separator in wd) [ 991.772250] ceph: device name is missing path (no : separator in [d: [ 991.772250] ]: [ 991.772250] llbE) [ 991.779241] IPVS: ftp: loaded support on port[0] = 21 [ 991.788165] ceph: device name is missing path (no : separator in ) 16:05:49 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='fdinfo\x00') bind$rds(r0, &(0x7f0000000040)={0x2, 0x4e21, @broadcast}, 0x10) setsockopt$RDS_RECVERR(r0, 0x114, 0x5, &(0x7f0000000080)=0x1, 0x3) getdents64(r0, &(0x7f00000000c0)=""/60, 0xd) 16:05:49 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020200090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e0100000001000000000000002402000100f8ffffff0000000200000000030005000000080002004e20e00000010000000000000000"], 0x60}}, 0x0) [ 991.822497] libceph: parse_ips bad ip '[d::]: [ 991.822497] llb' [ 991.829278] ceph: device name is missing path (no : separator in ) [ 991.852667] libceph: parse_ips bad ip '[d::]: [ 991.852667] llb' 16:05:49 executing program 4: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) prctl$PR_SET_PDEATHSIG(0x1, 0x5) mq_unlink(&(0x7f00000001c0)='vboxnet0\x00') clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x400000, 0x0) name_to_handle_at(r0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000300)=ANY=[@ANYBLOB="7100000008b2ec8df8b40e190000005526f94510e5953e3e2e95cbd633d8cc61bfc7bff71af6c37621f75820d2d1aa57279bed1f6e6f5b0ac3913e5170e75ab89d4cb5e00f78b68dc8050000000000008c58b011a92ab7bcbd6ab934e7b2d8665e4a122c4077e40f784feea3e9cd3909810b7ebbf5b4c26050c6cd6a250000000000000000ca14d967cd29d6725efd1274d2a26bd39dd5166fbfd45cdb9a8a5bfcb213bb102cdfbf08cc5b8c5fd5670fc4353fe821a82211890836d3e997"], &(0x7f0000000140), 0x1400) mount(&(0x7f0000000040)=@nullb='[d::]:\nllb:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 16:05:49 executing program 1: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[]::]:\nllb:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x8000, 0x0) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r0, 0x80045300, &(0x7f00000000c0)) [ 991.908030] ceph: device name is missing path (no : separator in [d: [ 991.908030] ]: [ 991.908030] llbE) 16:05:49 executing program 3: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[d:%]:\nllbE\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 16:05:49 executing program 4: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f00000001c0)=ANY=[@ANYBLOB="5b643a3a5d3a0a6c6c623a0084c4f96f59c3df4ec849c2f1f13ca2655551aef1f63769a8402b045a2035efc16cdeab13a20e19da9328ed72d03baf62aa27c057ca7249f3cc6deb97d13c8598e3af010aa18a858378bb706c85e5511e9bb6322cdd2dd7b1020d37d356e08250efbab1e3fd440e0c16d93f148e711bc53791bc5ef995a1f5e730d62217f087277d4f087200c508e137cbb9e9f73c24afbd01905fc318fe517c3a25185f6013a1300086233dca0120754a729670223e89d3c5215020c20f43286c540aa7ff2e53ea6409cb73203a208dd88920c249e466e836a56ce3a50d3ad77b91cd82b07ef01cb9389f7b9b792d1c6f3872e831aed89d77ae6689733d3218f83e3165612c7da479993c7a4e77d6a4"], &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) [ 992.005704] libceph: parse_ips bad ip '[d::]: [ 992.005704] llb' [ 992.030590] libceph: parse_ips bad ip '[]::]: [ 992.030590] llb' 16:05:49 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020200090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e0100000001000000000000002402000100f8ffffff0000000200000000030005000000010002004e20e00000010000000000000000"], 0x60}}, 0x0) 16:05:49 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='fdinfo\x00') getdents64(r0, &(0x7f0000000000)=""/60, 0x3c) setsockopt$inet_int(r0, 0x0, 0x7, &(0x7f0000000080)=0x5, 0x4) recvmmsg(r0, &(0x7f0000007540)=[{{&(0x7f0000000500)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev}}}, 0x80, &(0x7f0000000680)=[{&(0x7f0000000580)=""/236, 0xec}], 0x1, &(0x7f00000006c0)=""/53, 0x35}, 0x7}, {{&(0x7f0000000700)=@can={0x1d, 0x0}, 0x80, &(0x7f0000000c40)=[{&(0x7f0000000780)=""/235, 0xeb}, {&(0x7f0000000880)=""/54, 0x36}, {&(0x7f00000008c0)=""/52, 0x34}, {&(0x7f0000000900)=""/197, 0xc5}, {&(0x7f0000000a00)=""/150, 0x96}, {&(0x7f0000000ac0)=""/110, 0x6e}, {&(0x7f0000000b40)=""/239, 0xef}], 0x7}}, {{&(0x7f0000000cc0)=@generic, 0x80, &(0x7f0000002200)=[{&(0x7f0000000d40)=""/118, 0x76}, {&(0x7f0000000dc0)=""/37, 0x25}, {&(0x7f0000000e00)=""/193, 0xc1}, {&(0x7f0000000f00)=""/236, 0xec}, {&(0x7f0000001000)=""/4096, 0x1000}, {&(0x7f0000002000)=""/122, 0x7a}, {&(0x7f0000002080)=""/229, 0xe5}, {&(0x7f0000002180)=""/69, 0x45}], 0x8, &(0x7f0000002280)=""/4096, 0x1000}, 0x8}, {{&(0x7f0000003280)=@un=@abs, 0x80, &(0x7f0000005780)=[{&(0x7f0000003300)=""/58, 0x3a}, {&(0x7f0000003340)=""/239, 0xef}, {&(0x7f0000003440)=""/130, 0x82}, {&(0x7f0000003500)=""/23, 0x17}, {&(0x7f0000003540)=""/4096, 0x1000}, {&(0x7f0000004540)=""/1, 0x1}, {&(0x7f0000004580)=""/4096, 0x1000}, {&(0x7f0000005580)=""/166, 0xa6}, {&(0x7f0000005640)=""/120, 0x78}, {&(0x7f00000056c0)=""/148, 0x94}], 0xa, &(0x7f0000005840)=""/34, 0x22}, 0xfffffffffffffff8}, {{&(0x7f0000005880)=@sco, 0x80, &(0x7f0000005a00)=[{&(0x7f0000005900)=""/251, 0xfb}], 0x1, &(0x7f0000005a40)=""/22, 0x16}, 0x1ff000}, {{&(0x7f0000005a80)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000005c80)=[{&(0x7f0000005b00)=""/45, 0x2d}, {&(0x7f0000005b40)=""/159, 0x9f}, {&(0x7f0000005c00)=""/89, 0x59}], 0x3, &(0x7f0000005cc0)=""/43, 0x2b}}, {{&(0x7f0000005d00)=@tipc, 0x80, &(0x7f00000073c0)=[{&(0x7f0000005d80)=""/129, 0x81}, {&(0x7f0000005e40)=""/5, 0x5}, {&(0x7f0000005e80)=""/2, 0x2}, {&(0x7f0000005ec0)=""/224, 0xe0}, {&(0x7f0000005fc0)=""/250, 0xfa}, {&(0x7f00000060c0)=""/142, 0x8e}, {&(0x7f0000006180)=""/4096, 0x1000}, {&(0x7f0000007180)=""/86, 0x56}, {&(0x7f0000007200)=""/247, 0xf7}, {&(0x7f0000007300)=""/138, 0x8a}], 0xa, &(0x7f0000007480)=""/175, 0xaf}, 0x80}], 0x7, 0x100, &(0x7f0000007700)={0x77359400}) stat(&(0x7f0000007740)='./file0\x00', &(0x7f0000007780)={0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$nl_route(r0, &(0x7f00000078c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000007880)={&(0x7f0000007800)=@ipv6_delroute={0x44, 0x19, 0x0, 0x70bd26, 0x25dfdbfb, {0xa, 0x20, 0x10, 0x1, 0x0, 0x2, 0xff, 0x9, 0x200}, [@RTA_IIF={0x8, 0x1, r1}, @RTA_UID={0x8, 0x19, r2}, @RTA_ENCAP={0x18, 0x16, @typed={0x14, 0x69, @str='mime_typeppp1\x00'}}]}, 0x44}, 0x1, 0x0, 0x0, 0x90}, 0x80) [ 992.061555] libceph: parse_ips bad ip '[]::]: [ 992.061555] llb' 16:05:49 executing program 1: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x41000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[]::]:\nllb:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) [ 992.106540] ceph: device name is missing path (no : separator in [d:%]: [ 992.106540] llbE) 16:05:49 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020200090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e0100000001000000000000002402000100f8ffffff0000000200000000030005000000200002004e20e00000010000000000000000"], 0x60}}, 0x0) 16:05:49 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='fdinfo\x00') getdents64(r0, &(0x7f0000000000)=""/60, 0x3c) ioctl$NBD_CLEAR_SOCK(r0, 0xab04) [ 992.202641] ceph: device name is missing path (no : separator in [d:%]: [ 992.202641] llbE) [ 992.207298] libceph: parse_ips bad ip '[d::]: [ 992.207298] llb' [ 992.238635] libceph: parse_ips bad ip '[d::]: [ 992.238635] llb' [ 992.295063] libceph: parse_ips bad ip '[]::]: [ 992.295063] llb' [ 992.363739] IPVS: ftp: loaded support on port[0] = 21 [ 992.538270] libceph: parse_ips bad ip '[]::]: [ 992.538270] llb' [ 992.570334] IPVS: ftp: loaded support on port[0] = 21 [ 992.645390] IPVS: ftp: loaded support on port[0] = 21 16:05:50 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, 0x0, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_INFO(r1, 0x29, 0x40, &(0x7f00000000c0)={'security\x00\x00\x00\x00\x00\x02\xf8\x00'}, &(0x7f0000000140)=0x54) 16:05:50 executing program 3: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[d:`]:\nllbE\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 16:05:50 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='fdinfo\x00') writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000000)="5245e357e96318d7f42edbe2c375b244e1a8c3a737c9df17d9c3c359060feda08bb6bba5ae661a72e4cf60323436d0e2a51d7edc6298761cc6082f18", 0x3c}, {&(0x7f0000000080)="cf0818ac027c2624b5e7418a896ab4e2c3556722e6b8a852720b8fb91158bef841acf9e562ff5d094f88e1b94a3a29c9ed7235a9a45d8f37f2ccfb9a47b6b110eb0b11875abb09dd717ce17965af43e1a6a913e0ad61b28ddd1833d3ba88853545ff4f76a361cffd0b88", 0x6a}, {&(0x7f0000000140)="6812fbd27108db1127e8d8bb0f44bb00f91379630631434ffdb37705d2843171cbc206808047b5773f61", 0x2a}, {&(0x7f0000000180)="e1b0f8a63bb6d6060255dabe2d4050424de92b651426b77fa0f423855fdaa11c7fa58541", 0x24}], 0x4) clock_gettime(0xb, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, r3, &(0x7f0000fe7000/0x18000)=nil, &(0x7f0000000000)=[@text64={0x40, &(0x7f00000000c0)="c4c379146600006543a02d0000000000000064670f01cab8010000000f01d946d8f1e1b066ba400066edb9f60800000f32f2400f0964460f35", 0x39}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_PIT2(r2, 0x4040ae77, &(0x7f0000000100)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_PIT(r2, 0x8048ae66, &(0x7f00000001c0)={[{0x0, 0x0, 0x0, 0x0, 0x0, 0x3}]}) ioctl$KVM_RUN(r3, 0xae80, 0x0) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_GET_NETID(r0, &(0x7f0000000300)={&(0x7f0000000200), 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x1c, r4, 0x404, 0x70bd2a, 0x25dfdbfd, {}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x48840}, 0x40040) getdents64(r0, &(0x7f0000000100)=""/60, 0xa2b63368) preadv(r0, &(0x7f0000000580)=[{&(0x7f0000000340)=""/96, 0x60}, {&(0x7f00000003c0)=""/103, 0x67}, {&(0x7f0000000440)=""/183, 0xb7}, {&(0x7f0000000500)=""/89, 0x59}], 0x4, 0x0) 16:05:50 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020200090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e0100000001000000000000002402000100f8ffffff0000000200000000030005004003000002004e20e00000010000000000000000"], 0x60}}, 0x0) 16:05:50 executing program 0: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x400, 0x0) setsockopt$inet_sctp_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f00000000c0)={0x100000001, 0x50dc, 0x8, 0x7fffffff, 0x0, 0x4cee94ee, 0x8, 0x7fffffff, 0x8, 0x3ff, 0x10000}, 0xb) fcntl$getown(r0, 0x9) fcntl$getown(r0, 0x9) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f00000001c0)=0x0) r2 = syz_open_procfs(r1, &(0x7f0000000040)='\x00') getdents64(r2, &(0x7f0000000000)=""/60, 0x3c) syz_open_dev$media(&(0x7f0000000100)='/dev/media#\x00', 0x67da, 0x2000) 16:05:50 executing program 1: lsetxattr$trusted_overlay_redirect(&(0x7f00000001c0)='./file0\x00', &(0x7f0000001400)='trusted.overlay.redirect\x00', &(0x7f0000001440)='./file0\x00', 0x8, 0x3) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000001280)='/proc/sys/net/ipv4/vs/ignore_tunneled\x00', 0x2, 0x0) setsockopt$inet_sctp_SCTP_NODELAY(r0, 0x84, 0x3, &(0x7f00000012c0)=0x2, 0x4) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = request_key(&(0x7f0000000000)='cifs.spnego\x00', &(0x7f00000000c0)={'syz', 0x1}, &(0x7f0000000140)='\x00', 0xfffffffffffffffe) futimesat(r0, &(0x7f0000001300)='./file0\x00', &(0x7f0000001340)={{0x0, 0x2710}, {0x77359400}}) write$P9_RSETATTR(r0, &(0x7f0000000200)={0x7, 0x1b, 0x2}, 0x7) r2 = add_key(&(0x7f0000000080)='bcklc\xdd\x82\xa1,D\x00D\xaa\x80\xf7qw(+\xa2\xd5\x1d|\x00', &(0x7f00000002c0)={'syz', 0x2}, &(0x7f0000002580)="1c454947412991c7ea9efae14d78333693ff014b935257b801ac32ad2ed961bf6eb678982291fdc189896ced182e5590f7d910e36795a0dc9852969861091ff32ae7d031e48ff464318a8bff009914ab625ca40fd718a8b8c9109d73190ef2321ffabb1cb0090092c7420de078dbd3657081eca850459a6f73868f9613278f279f2652846c39806101955f6164793d1a6faded46cc13ee1b3111e0ad522f8c36e0ecf1648a9bdf4d9f30a62dde1146e3c40904e88110c63e2f484ac077c38432f1de9b425c32f1b614c7b511b5255a7dc93da20b896d4394fb57b8bc6df5aadf2fb2844b9d0069004d02e7ae03977a488039843affc159168766c5c1484f7ae1287df800f7e1d7c9373257c303b68c2cec089b459c8975f7873e0090a07010c22973bfd1251f8ed5e3c70778f98421a382c09fcb43345e5fb0213f7e9f390cc80ff5ed0ff8ab204531bad70b257c2da79052be79de510f49cdb918ac236a930f5419abe1efe1d0390c5241f50aacd33f685cf165ea404c6e9daa4e7d13855e9e3a93b7e2e37414ffb773218e958361871903a35506f081bb7d7cca2f980ab5265484b0103e5960dcc5a36a296cf9dc4eb727ddbb73ffd85f702ebeb479cb604ace9390901691e76f80baad4b46c575cd70c91df001a314b8afb89d71cefa1330bd45c75988cc90a6a3b3c97be8aed58929ec51249b008ff52895af75a126481bafd92b0d44e91fd702de9c8bbf6d987db9153b6af75d40ebd65bb890a749eaa01a657f73c2144de97b4a3451d0e917db631a1e678acf73d426c19a6c9e9ea5e7bbc07bd8380e4bbbf643c800f2c3c98d0ceb0860087b530c783f53ce4a0b09a1e9b857ce1ffb9759900ee2aa730d088df0a291de1782e1d2849fa599ae0b5806ec9635522458f7c506c03b4b3e9d0ecb8c53c20d72da4d24e21f08c16b2ed5f81f7b0dc34930d751ec610bbe94c9954026541dc4bba0b605eb9d1683385e2bfc4973438dc574919fa17e0f37904d30d0ccbb3be0d5b1005bf50f51c172d5ec15f3c24e89298104154d0e1901eb0b1582ddab8c946d77e8c2b783611cab74e4b5751a51dbbf7b4e2f25cfc28d86e80a0c25b3c2ac1e0a274e204d9e144e439f895c5458989ce81355b38b6d6eb601c6b3debd7008e005a849403307a2477bc9468ee766bc67f4d0c0d60d6f9e0318e6252140fa7b9a9124d322bc04114f6da4f10a05eb0042df448b3fd0025685d738f6aa84fef35894f31e97919f831a84d03201af74b7fda558c4998c189f1dcfafdbc68c61798783b8a7e6453fda854b661ec07962bab893207fdeba2b2e3e98d5664adef4eb155879a50b050e2e2827d9e959d1350ca68bdac2582d9321300b9d94583bd82ece12e22f4af0fb23bdeeeb6b63839d1e55e9b0b8ce169ee744d45d06199717547aab3c8191183db10ca03269068dbbcbeece53ae6522adcd1587c39cdd52d6c4da98dbbf5de3833c58e732d89fb543d83e067aa809cd98e4d9c41110537944593bb1a1c20d50fd3b69c93184f9a516f9d571ab4bfc0aafef501c04f232df0c02bcf6e9f855868210c54b3495ff4c4e3f64b96927b2be47c37fe8ea5e07466fe35d82cb1be7f861a9a06f77525b2af8c008a57d6e69cce2706d3160334d1f16fe8670797e8534f8b73dc3b76b9c41649a87d23faeebaf46319e4ed87209c8da6b350c9f98be328976394839bf1ea2ad13e7adb10ab4eeaf823c31b5c98beaaf4d8f875e5f62fdc6412d89128a2b8e8efd87c6d7e8ef853b3ac0ccb978be259110f9a20e92d7d7d709151acc7c81265b608451fd29e39dd6d27ba1e058be2452766ca4d33f4b7ca6e62c41840c0f21e09b386c387d3d6d1b148989b7fe94da9618893f626fb75a8e0abac6d904d2a2036edb40c7eed02651e9477e4c0f2f853a8470bd3463cf5e265a6434d2790d84bacb7d0b260ec7181309f8cf575a49c1f96c4a8c08897550d395071e7246b260de0ccc71d87ea7546617aa67225510cc33d8c6b0eebea1706e29eb3677ee1bb4dc7df25630508bf4d2fccf24e8d8ab96bdfe2caca6616aefc0969e4240e377f5c81d4b7a98df69c0890e4d713ee4441c9605a8dacc499c5471c9060c64b778ffa1adf3e74bf7eb7b9de411dc65d8168c0715813f6ebd2e2f60c08526ea79f221e049a31921ed4c020515a1eb80175a761170b9fef7082ef1ccfffa548a3a2af431f90246672b6dde9dd6f1cad5dd48e84fafae1a9b826d3990d80275f41b8231f9eb023af731855642d3df17ccf29ceaf67d1917c258070ed85e8979e8539deb502852c36b9a867d2c3ce227d0afcce348956358ca83f24b556cf02ba7f60f8c9a3773c43411560d35ac5a182ec6c0f7b919bd6d34e5cfa48fcfe1dcec1bfb26c5084a72fcebc95160be46ef29aacd27b69874dc4f86d60d05984704bae824f9d521b795d45820b2b33f7e89a04729e7d925a017967fd7ca692a7dc4c49a0f3cdd9eaa264836157ec4dffb6640b1d78ffe281e6d65d02be432dba7c848011a7a278ee8c0ee596c7460fe0f5e98f442cd8c165643b2e01fd6783f5ddbab9fba078af81e6a09abf6de730830b01e1625d941c18060a5c9293320ca600454006bd6e6d67585038b07a87350a4bcedb3411342f28d11cccf085d6057edac944e18f74b7bcf1641a5f6dde154ff6ad2a677ef62bccc2603b6162c63587d6734e0d0ad7f81019bd607f10d5fdef5a72a3bd1a5a52377d633ec6ce518f072331d0168c365955a845c040c218ed64d2deb1ca135ab35c57ed6cc49f0acc4f31869362e88f334a39aea179fea16fe679e5e03a91e661faebf1e49a9f347bb5ef0d053a708f4a59778963dd33ee11491a019d4674215a44f99e5eaa683a8b01672555b65b30df17f4fbdf1c5fee002ff8fa0f398d779533a8e2158492c0bff414f4210e90aead891ee231ba1a8e4c6b09cc0efbb500d33d3ebb3a50068a87a1594679716c78734a8cc589145c61731a7c5dc6b8d72eb6716e34232ba6869f9768f36e0d4215de60caffe19d20e7301436ec4eec42a67047ac61f7097c2dddba98aa4fc9aa9e9650333517095b402552253447cc8205c2d9c9d1e434081e56253eac3ac6dca91a85d6e07b943aeb8f7073f25b9ec5e417fad1cdd6313e57f175036818807f15dfdf930185c49762c8eecc3c8351a771e578d6e1edc63f45707290e956e8f4456dae4e3d17556de9fa2d48db6904b6122b213cb5d65e2630dc3f07dbc15fb2c4a5f164b84af3b0642ef9f3f1c23831c4c82cdced594feca962807ba78c5ed6ef930e90ee6410bfd6c8988e2976cf8c3308aef276dfae50ad2618a7537cf2c99eeb8591b21c924c448a3e156463f2614efa5a10e9d847678a1bff9f0c7f6e6b501d327043dafa61a6679570f8378ad6138b429be901df04b4dd1ddee0d7ef64f23866f8372164e0bcb0d8cc8a0c9d6dc6a6ac5a8fd7ba4b57f63597754af52aff7d1b3a02825ecb4d18a1f419d04c0b0bd1fb92a3e0f17a306a5a49b8d3eb037d91096eec2d441f5397f8222dcf87869ad2a24fde72f88adceaaf520a499e29af91ff263760feac3d34daf534a66143567cdb017d03d5a6ece12d5f28e1e54b1f67c376fd06a86703a5bf1db9a5d4aa66210deec18ce9fe8cb350809754bab7650f01db8e6757f15c8fdc665bd22e3538ea8f007578f3552b8ca7959363f74ec69c70285654138c71f6402a4499e12413d3d513f06c74dcd745e1536b1acf233066ef55fff6282567ba14e99e360ce5f093b62495d86dcb11aa7c899206d839839c9a24cda31c6d411fe6d9ddec9ce0382f6712329727ef785e0a2f45fb7905d1013361e3a4342bce6262935e3e2223e160db5f6d2e28d56ad4819552272261d96c9ceb744101e8aa44913688a5269183b53d7b55e59961ed1e309271f76a261ceb05e756d7de38b02f1fe399d6dba3fc895bc11a6b791d02526377200b831a5ddc53cb7d113eb1266d651fbab7a7d9630a39814d3e34f06888a917263a14ea7a45b41f7496244cc76b7f9d13f8fc2cacdde5e3b94496ad61cf20c5cd44d66392d728bc17dae6ed4f58d5730ea81a0969e7c9260eb48a4468b0fe2beb944cb5ca15489d5ee41ce8fbc149d325935c83fb6d33dcbf4fe2d197e825bc75ed1cec890f24a498b6884483ba38a5f061830b42329f01047c03c99369b73a56d0a62bdbbdc1292ec4d37c79a6737e93386cb8003b222d3a2b0bbe37be017f02cc99723123e11f2a579fcf4cf05589dced0d35ed1c0885fd5345b6b5b823721e781a18c9fabd74acbad65612c5dabaaf0f5530ccb94595cf1113262ee5c6953e9f01cb1117b36e436926b625a4568d577c068eec496f07ac6e8b7f1b80b72df395cb256a6c7925ae814d989850aad6e6bdb0bfcd1c8582926d10f13776cd89d6a2229bce9c041d54b7f0c3d23cb4657c3e882ce07de8a5cffd71c3de6ca7fe64f3f329712d5ec62ca72b8dfa27ceb7c1b03eb2d6d7f41a1a48e2999c5c51e137d05ab192fd38b23407313f61745e719e942255c7080faa2d9c0bb3c13b5fcc09e7a04997b25af555280885bfe3840bc437f4ba0fa0d1b185a3a1aac25b09de99626bad1eef812213625073785ca7afa50fb28a05f75876f79822b179c979f780a52680d27740d62909b096c6ac91f15eab685238310ce00bd4aa4eb42cf510b618153632002b2949f33cd198917924c350b2e32bfc67108c6c4e919ab749b8a479ddefeb7934e358ae5735c3bcc73fd31a375eeaa7e7cf1b47f33aa6c8f31cce50d3dd9ad2f3ec6a60a5d120476a6750a2461f152a6d1e88cdc4f32645b3e470ff48e5f9443955b6feaea831337c62a61ccd5633baaeabf461978416933ee4f1e6aab8f89af768a03e85ba051be965da340cf79f78e0e206cab4930e824a2bc664f7c52cefb4277504894b0c96ae5e6413f10a3160e869a9df7c7136be0f6f9010edcecf484e30a5a28c9d7c1c3e2f71e5f6570a52bc30620633f85b9e191d9cc1ec3b892a9be12d7fdcb66ba26f7a5903b068b3618845523cc353f08dd6e8c204d7341ff95a3bb4df5113f5279b984912d02571642d555445b1749faa008be15cc2f4171d0b91781c3b9b81e03116a5a1afcb0bf40f2236ae550cede72ed5b7ed32f149982c8489e19e15f07183922c23819086e078c2fd8d96d4b6e6ec9906527d6726d888b087af83faa77cd30b50777e352f684be5c4426dca38e8516008713237c2bce05d3d41fa2fe4c17a1592b29667d58e2d89d5c13fbd20d295c007fcdfdb93939635a9f78e96dfc2f7b65a4e81d83305858414f6d857b7b4950342674d723790271500c56d6698f575d12fdec3c496c3526879984c28f9cdfd660fdca789443304e0479345956cba1fa7a1bf17b33398d4b98d3933ade1bb7e7951f95d582b1e56ed7d5ab273378489ab10b6bed6e4e1baefdf568a137eff0624faa4bfff05028630c7a4c929c13749b58ba3e6d8eb6f8403399adda5650bd7b1cbcc3282424cca282bf7352bb97fd88d81103f7b325688285934305232e58239ba4169c3a0a219b2b63a6f3f66300bafe9c94599538de9052cd6411ea1e13577853e6769ae644ba4841b782176f028248a3fc01cdfaa7bfb95207c90f8e7ee48767680314ac96a97fa7b9250049b39e6725e0bf4f600b21ef37efab4dc83b768a5a3248b1c7c6b4c72c3af098b34173b201fbd812ce63c2b76a85973f9d7ea67b7ca87cc6f8e3c02970f425144d323d7aa1cd4370225251bbafc364427a6d5d60c99744492f7c049cbfd0cbcbd5ca66f2f51216861c30ee307db293509635dbd868242e9286618a5d5d011bd3109a4fc2f05ed33367d128c8a0a7bf8171711b39c681591405936e1243048efc522cd7ec139ce77699231af9f17e013d853f368522f9ee09dd7f1eca41fac5247703e1d33797d70d84e4573fd8d1a4e325d4a8d1801c3c6cc7323daa33bc479e867da985acf0", 0x1090, r1) keyctl$instantiate(0xc, r1, &(0x7f0000001380)=ANY=[@ANYBLOB="7570646174652064656661756c7420757365723a5b5d3a3a5d3a0a6c6c623a00006fbad14b7ea44d67777df70038750b17316513957c47630c57c24e5e3ca921c6"], 0x21, r2) mount(&(0x7f0000000040)=@nullb='[]::]:\nllb:\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x8008, 0x0) 16:05:50 executing program 1: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[]::]:\nllb:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 16:05:50 executing program 3: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[d::%:\nllbE\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) [ 992.809663] ceph: device name is missing path (no : separator in [d:`]: [ 992.809663] llbE) [ 992.846255] IPVS: ftp: loaded support on port[0] = 21 16:05:50 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020200090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e0100000001000000000000002402000100f8ffffff0000000200000000030005fffffffb0002004e20e00000010000000000000000"], 0x60}}, 0x0) 16:05:50 executing program 0: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, 0xffffffffffffff9c, 0x0, 0x3, &(0x7f0000000080)=':.\x00', 0xffffffffffffffff}, 0x30) r1 = syz_open_procfs(r0, &(0x7f0000000040)='td\x12\x02\b\xa9\x00') setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000140)=[@in={0x2, 0x4e22, @loopback}, @in={0x2, 0x4e20, @loopback}, @in6={0xa, 0x4e23, 0x4, @remote, 0xb3}, @in={0x2, 0x4e22, @multicast1}], 0x4c) getdents64(r1, &(0x7f0000000000)=""/60, 0x3c) ioctl$EVIOCRMFF(r1, 0x40044581, &(0x7f0000000100)=0x10000) 16:05:50 executing program 1: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[]::]:\nllb:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) [ 992.931527] libceph: parse_ips bad ip '[]::]: [ 992.931527] llb' [ 992.968395] ceph: device name is missing path (no : separator in [d::%: [ 992.968395] llbE) 16:05:50 executing program 3: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[d::`:\nllbE\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) [ 993.137730] ceph: device name is missing path (no : separator in [d::`: [ 993.137730] llbE) [ 993.183628] libceph: parse_ips bad ip '[]::]: [ 993.183628] llb' [ 993.236542] ceph: device name is missing path (no : separator in [d::`: [ 993.236542] llbE) 16:05:51 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, 0x0, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_INFO(r1, 0x29, 0x40, &(0x7f00000000c0)={'security\x00\x00\x00\x03\x10\x00'}, &(0x7f0000000140)=0x54) 16:05:51 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='fdinfo\x00') getdents64(r0, &(0x7f0000000000)=""/60, 0xbe) 16:05:51 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020200090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e0100000001000000000000002402000100f8ffffff0000000200000000030005020000000002004e20e00000010000000000000000"], 0x60}}, 0x0) 16:05:51 executing program 4 (fault-call:2 fault-nth:0): r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000b4508a)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x400000000009) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x0, 0x12, r0, 0x0) 16:05:51 executing program 1: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x180, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[]::]:\nllb:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 16:05:51 executing program 3: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[d::\n:\nllbE\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 16:05:51 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020200090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e0100000001000000000000002402000100f8ffffff0000000200000000030005fbffffff0002004e20e00000010000000000000000"], 0x60}}, 0x0) [ 993.578172] ceph: device name is missing path (no : separator in [d:: [ 993.578172] : [ 993.578172] llbE) [ 993.581896] FAULT_INJECTION: forcing a failure. [ 993.581896] name failslab, interval 1, probability 0, space 0, times 0 [ 993.608108] libceph: parse_ips bad ip '[]::]: [ 993.608108] llb' 16:05:51 executing program 3: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[d::]\n\nllbE\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 16:05:51 executing program 0: ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000000c0)) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000100)) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f00000002c0)=0x0) r1 = syz_open_procfs(r0, &(0x7f0000000340)='syscall\x00') getdents64(r1, &(0x7f0000000000)=""/60, 0x3c) [ 993.647602] CPU: 0 PID: 15329 Comm: syz-executor4 Not tainted 4.20.0-rc7+ #381 [ 993.654997] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 993.664355] Call Trace: [ 993.666957] dump_stack+0x244/0x39d [ 993.666982] ? dump_stack_print_info.cold.1+0x20/0x20 [ 993.667012] should_fail.cold.4+0xa/0x17 [ 993.675820] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 993.675852] ? mark_held_locks+0x130/0x130 [ 993.675870] ? zap_class+0x640/0x640 [ 993.693005] ? find_held_lock+0x36/0x1c0 [ 993.697111] ? __lock_is_held+0xb5/0x140 [ 993.701181] ? zlib_inflate+0x1bd8/0x60e0 [ 993.705359] ? perf_trace_sched_process_exec+0x860/0x860 [ 993.710823] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 993.710844] ? check_preemption_disabled+0x48/0x280 [ 993.710861] ? zap_class+0x640/0x640 [ 993.710884] __should_failslab+0x124/0x180 [ 993.725128] should_failslab+0x9/0x14 [ 993.725145] kmem_cache_alloc+0x2be/0x730 [ 993.725164] ? __lock_acquire+0x62f/0x4c20 [ 993.741559] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 993.747123] ? may_expand_vm+0x1e3/0x810 [ 993.751252] vm_area_dup+0x7a/0x230 [ 993.754562] ceph: device name is missing path (no : separator in [d::] [ 993.754562] [ 993.754562] llbE) [ 993.754906] ? vm_area_alloc+0x1d0/0x1d0 [ 993.769008] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 993.774566] __split_vma+0xae/0x570 [ 993.778219] ? find_vma+0x34/0x190 [ 993.781780] __do_munmap+0x314/0xf80 [ 993.785529] ? check_preemption_disabled+0x48/0x280 [ 993.790594] mmap_region+0x6a7/0x1cd0 [ 993.794450] ? __x64_sys_brk+0x8b0/0x8b0 16:05:51 executing program 3: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[d::]%\nllbE\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) [ 993.798569] ? zap_class+0x640/0x640 [ 993.802307] ? zap_class+0x640/0x640 [ 993.806055] ? get_pid_task+0xd6/0x1a0 [ 993.810011] ? mpx_unmapped_area_check+0xd8/0x108 [ 993.814904] ? arch_get_unmapped_area_topdown+0xc2/0x940 [ 993.814929] ? arch_get_unmapped_area+0x750/0x750 [ 993.814949] ? lock_acquire+0x1ed/0x520 [ 993.825230] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 993.834208] ? cap_mmap_addr+0x52/0x130 [ 993.838201] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 993.843749] ? security_mmap_addr+0x80/0xa0 16:05:51 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='fdinfo\x00') getdents64(r0, &(0x7f0000000000)=""/60, 0x3b) fcntl$notify(r0, 0x402, 0x4) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(r0, 0x80dc5521, &(0x7f0000000080)=""/146) [ 993.848102] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 993.853654] ? get_unmapped_area+0x292/0x3b0 [ 993.858081] do_mmap+0xa22/0x1230 [ 993.861565] ? mmap_region+0x1cd0/0x1cd0 [ 993.861591] ? vm_mmap_pgoff+0x1b5/0x2c0 [ 993.861625] ? down_read_killable+0x150/0x150 [ 993.861646] ? security_mmap_file+0x174/0x1b0 [ 993.869774] vm_mmap_pgoff+0x213/0x2c0 [ 993.869806] ? vma_is_stack_for_current+0xd0/0xd0 [ 993.869823] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 993.869842] ? check_preemption_disabled+0x48/0x280 [ 993.869894] ksys_mmap_pgoff+0x4da/0x660 [ 993.890534] cgroup: fork rejected by pids controller in /syz3 [ 993.893114] ? do_syscall_64+0x9a/0x820 [ 993.893138] ? find_mergeable_anon_vma+0xd0/0xd0 [ 993.893156] ? trace_hardirqs_on+0xbd/0x310 [ 993.893171] ? __ia32_sys_read+0xb0/0xb0 [ 993.893187] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 993.893208] ? trace_hardirqs_off_caller+0x310/0x310 [ 993.918603] ceph: device name is missing path (no : separator in [d::]% [ 993.918603] llbE) [ 993.921196] __x64_sys_mmap+0xe9/0x1b0 16:05:51 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='fdinfo\x00') getdents64(r0, &(0x7f0000000080)=""/60, 0x173) [ 993.921220] do_syscall_64+0x1b9/0x820 [ 993.921235] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 993.921253] ? syscall_return_slowpath+0x5e0/0x5e0 [ 993.921272] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 993.967278] ? trace_hardirqs_on_caller+0x310/0x310 [ 993.972311] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 993.977349] ? prepare_exit_to_usermode+0x291/0x3b0 [ 993.982388] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 993.987243] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 993.987257] RIP: 0033:0x457669 [ 993.987273] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 993.987286] RSP: 002b:00007fbc2fcf4c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000009 [ 994.014583] RAX: ffffffffffffffda RBX: 00007fbc2fcf4c90 RCX: 0000000000457669 [ 994.014594] RDX: 0000000000000000 RSI: 0000000000003000 RDI: 00000000206ff000 [ 994.014605] RBP: 000000000072bf00 R08: 0000000000000003 R09: 0000000000000000 [ 994.014615] R10: 0000000000000012 R11: 0000000000000246 R12: 00007fbc2fcf56d4 [ 994.014625] R13: 00000000004c2d75 R14: 00000000004d50e8 R15: 0000000000000004 [ 994.059947] libceph: parse_ips bad ip '[]::]: [ 994.059947] llb' [ 994.090369] IPVS: ftp: loaded support on port[0] = 21 16:05:52 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, 0x0, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_INFO(r1, 0x29, 0x40, &(0x7f00000000c0)={'security\x00\x00\x00\x14\x00'}, &(0x7f0000000140)=0x54) 16:05:52 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020200090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e0100000001000000000000002402000100f8ffffff00000002000000000300057fffffff0002004e20e00000010000000000000000"], 0x60}}, 0x0) 16:05:52 executing program 3: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[d::]`\nllbE\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 16:05:52 executing program 1: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x102, 0x0) setsockopt$inet_mreq(r0, 0x0, 0x24, &(0x7f00000000c0)={@local, @dev={0xac, 0x14, 0x14, 0x17}}, 0x8) clone(0x10000003, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) lsetxattr$security_smack_transmute(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000200)='TRUE', 0x4, 0x3) 16:05:52 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='fdinfo\x00') sendmsg$nl_netfilter(r0, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000010}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2c8000000b0b08012abd7000fbdbdf25030000030800130000000c0014000200000000000000040014000000"], 0x2c}, 0x1, 0x0, 0x0, 0x4041}, 0x10) getdents64(r0, &(0x7f0000000000)=""/60, 0x3c) 16:05:52 executing program 4 (fault-call:2 fault-nth:1): r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000b4508a)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x400000000009) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x0, 0x12, r0, 0x0) [ 994.478314] ceph: device name is missing path (no : separator in [d::]` [ 994.478314] llbE) [ 994.488541] FAULT_INJECTION: forcing a failure. [ 994.488541] name failslab, interval 1, probability 0, space 0, times 0 [ 994.507698] CPU: 1 PID: 15376 Comm: syz-executor4 Not tainted 4.20.0-rc7+ #381 [ 994.515086] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 994.524445] Call Trace: 16:05:52 executing program 1: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x14a01, 0x0) write$nbd(r0, &(0x7f00000001c0)={0x67446698, 0x1, 0x1, 0x2, 0x2, "9ae4cf787e6df3e6c53700ecd97980d6442f81e598bd6db4d209645cabfe6695a6af9b3bf706399301cebe57f5d48659b35176a3fcc31ab1642344aa"}, 0x4c) mount(&(0x7f0000000040)=@nullb='[]::]:\nllb:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) [ 994.527059] dump_stack+0x244/0x39d [ 994.530725] ? dump_stack_print_info.cold.1+0x20/0x20 [ 994.535938] ? is_bpf_text_address+0xd3/0x170 [ 994.540462] should_fail.cold.4+0xa/0x17 [ 994.544551] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 994.549684] ? save_stack+0xa9/0xd0 [ 994.553330] ? save_stack+0x43/0xd0 [ 994.556981] ? kasan_kmalloc+0xc7/0xe0 [ 994.560894] ? kasan_slab_alloc+0x12/0x20 [ 994.565066] ? kmem_cache_alloc+0x12e/0x730 [ 994.569410] ? vm_area_dup+0x7a/0x230 [ 994.573223] ? __split_vma+0xae/0x570 16:05:52 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='fdinfo\x00') setsockopt$inet6_icmp_ICMP_FILTER(r0, 0x1, 0x1, &(0x7f0000000100)={0x5}, 0x4) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000840)={0x53, 0xffffffffffffffff, 0xcf, 0xfffffffffffffe01, @scatter={0x3, 0x0, &(0x7f0000000140)=[{&(0x7f0000000340)=""/89, 0x59}, {&(0x7f00000003c0)=""/158, 0x9e}, {&(0x7f00000005c0)=""/211, 0xd3}]}, &(0x7f00000006c0)="5e7eb13bd8f3a99a6d9811bb7f16b2c06bb3837564f876c0518a46c6ffbc46eaf6011a441db3f071a8890419cf9ff473ce83c72271fb7cf9ddc6698e57fc0908c57e1f1991fb8da48c4b0ff64677b5a77fd0d04aeb8ae2a27c4db26a610a0cfb895ec4a4d1e893e26d42f4521612486337bf7b94bd6600a0a7763ff50b576946843b14cd46a468cd1edca83522f489cc9de2011a2bf409731478455105c9d6ba88370939f5c74e9d02bc7786f252921e8a4c06c135cc34c59ddc0d9654d08677aa51d3fd1066aee32116a2633f77df", &(0x7f00000007c0)=""/4, 0x1, 0x10, 0x0, &(0x7f0000000800)}) getsockopt$TIPC_CONN_TIMEOUT(r0, 0x10f, 0x82, &(0x7f0000000080), &(0x7f00000002c0)=0xffffffffffffffde) getdents64(r0, &(0x7f0000000000)=""/60, 0x3c) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r0, 0x40045532, &(0x7f0000000300)=0x9) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) write$UHID_INPUT2(r0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], 0x60) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000180)={0x0, @in6={{0xa, 0x4e23, 0x8, @mcast2, 0x5}}, 0xffff, 0x10001}, &(0x7f0000000240)=0x90) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f0000000280)={r2, 0x5, 0xf, 0x2f, 0x7ff, 0xffffffffffffffd2}, 0x14) openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0xc80, 0x0) [ 994.573240] ? __do_munmap+0x314/0xf80 [ 994.573254] ? mmap_region+0x6a7/0x1cd0 [ 994.573265] ? do_mmap+0xa22/0x1230 [ 994.573286] ? vm_mmap_pgoff+0x213/0x2c0 [ 994.580977] ? ksys_mmap_pgoff+0x4da/0x660 [ 994.580993] ? __x64_sys_mmap+0xe9/0x1b0 [ 994.581009] ? do_syscall_64+0x1b9/0x820 [ 994.581024] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 994.581046] ? percpu_ref_put_many+0x11c/0x260 [ 994.581065] ? lock_downgrade+0x900/0x900 [ 994.614967] ? check_preemption_disabled+0x48/0x280 [ 994.614993] ? kasan_check_read+0x11/0x20 [ 994.615024] ? zap_class+0x640/0x640 [ 994.615042] ? rcu_softirq_qs+0x20/0x20 [ 994.636047] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 994.641604] ? check_preemption_disabled+0x48/0x280 [ 994.646640] __should_failslab+0x124/0x180 [ 994.650894] should_failslab+0x9/0x14 [ 994.654709] kmem_cache_alloc+0x47/0x730 [ 994.658795] ? rcu_read_lock_sched_held+0x14f/0x180 [ 994.663835] anon_vma_clone+0x140/0x710 [ 994.667836] ? unlink_anon_vmas+0xa60/0xa60 [ 994.672178] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 994.677735] __split_vma+0x183/0x570 [ 994.681463] ? find_vma+0x34/0x190 [ 994.685041] __do_munmap+0x314/0xf80 [ 994.688777] ? check_preemption_disabled+0x48/0x280 [ 994.693817] mmap_region+0x6a7/0x1cd0 [ 994.697643] ? __x64_sys_brk+0x8b0/0x8b0 [ 994.701719] ? zap_class+0x640/0x640 [ 994.705466] ? zap_class+0x640/0x640 [ 994.709208] ? get_pid_task+0xd6/0x1a0 [ 994.713134] ? mpx_unmapped_area_check+0xd8/0x108 [ 994.718003] ? arch_get_unmapped_area_topdown+0xc2/0x940 [ 994.723471] ? arch_get_unmapped_area+0x750/0x750 16:05:52 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020200090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e0100000001000000000000002402000100f8ffffff0000000200000000030005000000040002004e20e00000010000000000000000"], 0x60}}, 0x0) [ 994.728341] ? lock_acquire+0x1ed/0x520 [ 994.732354] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 994.737379] ? cap_mmap_addr+0x52/0x130 [ 994.741373] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 994.746935] ? security_mmap_addr+0x80/0xa0 [ 994.751268] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 994.756819] ? get_unmapped_area+0x292/0x3b0 [ 994.761246] do_mmap+0xa22/0x1230 [ 994.764717] ? mmap_region+0x1cd0/0x1cd0 [ 994.768802] ? vm_mmap_pgoff+0x1b5/0x2c0 [ 994.772879] ? down_read_killable+0x150/0x150 [ 994.777382] ? security_mmap_file+0x174/0x1b0 [ 994.781910] vm_mmap_pgoff+0x213/0x2c0 [ 994.785821] ? vma_is_stack_for_current+0xd0/0xd0 [ 994.785839] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 994.785860] ? check_preemption_disabled+0x48/0x280 [ 994.801251] ksys_mmap_pgoff+0x4da/0x660 [ 994.805349] ? do_syscall_64+0x9a/0x820 [ 994.805372] ? find_mergeable_anon_vma+0xd0/0xd0 [ 994.805389] ? trace_hardirqs_on+0xbd/0x310 [ 994.805407] ? __ia32_sys_read+0xb0/0xb0 [ 994.822484] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe 16:05:52 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='fdinfo\x00') getdents64(r0, &(0x7f0000000000)=""/60, 0x3c) ioctl$VT_GETMODE(r0, 0x5601, &(0x7f0000000080)) [ 994.827856] ? trace_hardirqs_off_caller+0x310/0x310 [ 994.833002] __x64_sys_mmap+0xe9/0x1b0 [ 994.836926] do_syscall_64+0x1b9/0x820 [ 994.840840] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 994.846234] ? syscall_return_slowpath+0x5e0/0x5e0 [ 994.851185] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 994.851206] ? trace_hardirqs_on_caller+0x310/0x310 [ 994.851224] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 994.851245] ? prepare_exit_to_usermode+0x291/0x3b0 [ 994.871153] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 994.876019] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 994.881210] RIP: 0033:0x457669 [ 994.884411] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 994.884421] RSP: 002b:00007fbc2fcf4c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000009 [ 994.884437] RAX: ffffffffffffffda RBX: 00007fbc2fcf4c90 RCX: 0000000000457669 [ 994.884452] RDX: 0000000000000000 RSI: 0000000000003000 RDI: 00000000206ff000 [ 994.924200] IPVS: ftp: loaded support on port[0] = 21 [ 994.925632] RBP: 000000000072bf00 R08: 0000000000000003 R09: 0000000000000000 [ 994.925643] R10: 0000000000000012 R11: 0000000000000246 R12: 00007fbc2fcf56d4 [ 994.925654] R13: 00000000004c2d75 R14: 00000000004d50e8 R15: 0000000000000004 16:05:52 executing program 0: syz_open_procfs(0x0, &(0x7f0000000040)='fdinfo\x00') r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0x2000, 0x0) getdents64(r0, &(0x7f0000000000)=""/60, 0x3c) 16:05:52 executing program 3: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[d::]:%llbE\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) [ 995.088035] ceph: device name is missing path (no : separator in [d::]:%llbE) [ 995.147752] ceph: device name is missing path (no : separator in [d::]:%llbE) [ 995.516251] IPVS: ftp: loaded support on port[0] = 21 16:05:53 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, 0x0, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_INFO(r1, 0x29, 0x40, &(0x7f00000000c0)={'security\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xff\x00'}, &(0x7f0000000140)=0x54) 16:05:53 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020200090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e0100000001000000000000002402000100f8ffffff0000000200000000030005000000100002004e20e00000010000000000000000"], 0x60}}, 0x0) 16:05:53 executing program 4 (fault-call:2 fault-nth:2): r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000b4508a)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x400000000009) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x0, 0x12, r0, 0x0) 16:05:53 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='fdinfo\x00') getdents64(r0, &(0x7f0000000000)=""/60, 0x3c) setsockopt$inet_sctp_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f00000000c0)=0xffffffffffffffc0, 0x4) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000100)=[@in6={0xa, 0x4e22, 0x5, @loopback, 0x7fffffff}, @in6={0xa, 0x4e20, 0x93, @local, 0x4}], 0x38) ioctl$UI_SET_PHYS(r0, 0x4008556c, &(0x7f0000000080)='syz0\x00') 16:05:53 executing program 3: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[d::]:`llbE\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 16:05:53 executing program 1: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[]::]:\nllb:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x888, 0x0) [ 995.652687] FAULT_INJECTION: forcing a failure. [ 995.652687] name failslab, interval 1, probability 0, space 0, times 0 [ 995.676461] ceph: device name is missing path (no : separator in [d::]:`llbE) [ 995.684055] CPU: 1 PID: 15420 Comm: syz-executor4 Not tainted 4.20.0-rc7+ #381 [ 995.684070] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 16:05:53 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd)\xfaW\xe4\x00\xd0\xe5\xf1\xab\x17\xdbL\xdc\xfc\x14I\x9a\xe3\xff\x99\x04') getdents64(r0, &(0x7f00000001c0)=""/60, 0xfffffffffffffc20) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffff9c, 0xc0206434, &(0x7f0000000040)={0x9, 0x0, 0x10000, 0x6}) ioctl$DRM_IOCTL_AGP_BIND(r0, 0x40106436, &(0x7f0000000080)={r1, 0x100000200}) 16:05:53 executing program 3: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[d::]:\nulbE\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) [ 995.700774] Call Trace: [ 995.703375] dump_stack+0x244/0x39d [ 995.707021] ? dump_stack_print_info.cold.1+0x20/0x20 [ 995.712236] should_fail.cold.4+0xa/0x17 [ 995.716329] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 995.721443] ? zap_class+0x640/0x640 [ 995.725218] ? zap_class+0x640/0x640 [ 995.729009] ? find_held_lock+0x36/0x1c0 [ 995.733103] ? zap_class+0x640/0x640 [ 995.736942] ? find_held_lock+0x36/0x1c0 [ 995.741017] ? __lock_is_held+0xb5/0x140 [ 995.741051] ? perf_trace_sched_process_exec+0x860/0x860 [ 995.741066] ? up_read_non_owner+0x100/0x100 [ 995.741095] ? __down_interruptible+0x700/0x700 [ 995.755687] IPVS: ftp: loaded support on port[0] = 21 [ 995.759666] __should_failslab+0x124/0x180 [ 995.759689] should_failslab+0x9/0x14 [ 995.759706] kmem_cache_alloc+0x2be/0x730 [ 995.759728] ? __vma_adjust+0xab6/0x1810 [ 995.759750] vm_area_dup+0x7a/0x230 [ 995.781165] ? vm_area_alloc+0x1d0/0x1d0 [ 995.788885] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 995.788910] __split_vma+0xae/0x570 [ 995.788926] ? find_vma+0x34/0x190 [ 995.788949] __do_munmap+0x393/0xf80 [ 995.788972] ? check_preemption_disabled+0x48/0x280 [ 995.788996] mmap_region+0x6a7/0x1cd0 [ 995.789024] ? __x64_sys_brk+0x8b0/0x8b0 [ 995.818232] ? zap_class+0x640/0x640 [ 995.821960] ? zap_class+0x640/0x640 [ 995.825694] ? get_pid_task+0xd6/0x1a0 [ 995.829602] ? mpx_unmapped_area_check+0xd8/0x108 [ 995.834489] ? arch_get_unmapped_area_topdown+0xc2/0x940 [ 995.834515] ? arch_get_unmapped_area+0x750/0x750 [ 995.834534] ? lock_acquire+0x1ed/0x520 [ 995.834555] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 995.853862] ? cap_mmap_addr+0x52/0x130 [ 995.857852] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 995.857997] ceph: device name is missing path (no : separator in [d::]: [ 995.857997] ulbE) [ 995.863397] ? security_mmap_addr+0x80/0xa0 [ 995.863416] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 995.863435] ? get_unmapped_area+0x292/0x3b0 [ 995.863455] do_mmap+0xa22/0x1230 [ 995.863489] ? mmap_region+0x1cd0/0x1cd0 [ 995.893926] ? vm_mmap_pgoff+0x1b5/0x2c0 [ 995.893947] ? down_read_killable+0x150/0x150 16:05:53 executing program 3: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[d::]:\n\nlbE\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) [ 995.893965] ? security_mmap_file+0x174/0x1b0 [ 995.893993] vm_mmap_pgoff+0x213/0x2c0 [ 995.910931] ? vma_is_stack_for_current+0xd0/0xd0 [ 995.915805] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 995.921352] ? check_preemption_disabled+0x48/0x280 [ 995.921389] ksys_mmap_pgoff+0x4da/0x660 [ 995.921406] ? do_syscall_64+0x9a/0x820 [ 995.921429] ? find_mergeable_anon_vma+0xd0/0xd0 [ 995.921445] ? trace_hardirqs_on+0xbd/0x310 [ 995.921459] ? __ia32_sys_read+0xb0/0xb0 [ 995.921484] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 995.921502] ? trace_hardirqs_off_caller+0x310/0x310 [ 995.921527] __x64_sys_mmap+0xe9/0x1b0 [ 995.934559] do_syscall_64+0x1b9/0x820 [ 995.943618] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 995.943640] ? syscall_return_slowpath+0x5e0/0x5e0 [ 995.943657] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 995.943679] ? trace_hardirqs_on_caller+0x310/0x310 [ 995.986072] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 995.986113] ? prepare_exit_to_usermode+0x291/0x3b0 [ 995.986136] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 995.986161] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 996.006193] RIP: 0033:0x457669 [ 996.009399] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 996.028303] RSP: 002b:00007fbc2fcf4c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000009 [ 996.028319] RAX: ffffffffffffffda RBX: 00007fbc2fcf4c90 RCX: 0000000000457669 [ 996.028329] RDX: 0000000000000000 RSI: 0000000000003000 RDI: 00000000206ff000 16:05:53 executing program 4 (fault-call:2 fault-nth:3): r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000b4508a)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x400000000009) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x0, 0x12, r0, 0x0) [ 996.028339] RBP: 000000000072bf00 R08: 0000000000000003 R09: 0000000000000000 [ 996.028364] R10: 0000000000000012 R11: 0000000000000246 R12: 00007fbc2fcf56d4 [ 996.028374] R13: 00000000004c2d75 R14: 00000000004d50e8 R15: 0000000000000004 16:05:53 executing program 0: ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000080)=0x0) r1 = syz_open_procfs(r0, &(0x7f0000000040)='fding\x00\x00') getdents64(r1, &(0x7f0000000000)=""/60, 0x3c) [ 996.164252] FAULT_INJECTION: forcing a failure. [ 996.164252] name failslab, interval 1, probability 0, space 0, times 0 [ 996.190991] CPU: 1 PID: 15448 Comm: syz-executor4 Not tainted 4.20.0-rc7+ #381 [ 996.198365] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 996.207717] Call Trace: [ 996.207745] dump_stack+0x244/0x39d [ 996.207771] ? dump_stack_print_info.cold.1+0x20/0x20 [ 996.207796] ? is_bpf_text_address+0xd3/0x170 [ 996.207828] should_fail.cold.4+0xa/0x17 [ 996.214035] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 996.214069] ? save_stack+0xa9/0xd0 [ 996.214093] ? save_stack+0x43/0xd0 [ 996.214112] ? kasan_kmalloc+0xc7/0xe0 [ 996.244036] ? kasan_slab_alloc+0x12/0x20 [ 996.248217] ? kmem_cache_alloc+0x12e/0x730 [ 996.252563] ? vm_area_dup+0x7a/0x230 [ 996.256374] ? __split_vma+0xae/0x570 [ 996.260186] ? __do_munmap+0x393/0xf80 [ 996.264089] ? mmap_region+0x6a7/0x1cd0 [ 996.268063] ? do_mmap+0xa22/0x1230 [ 996.268086] ? vm_mmap_pgoff+0x213/0x2c0 [ 996.268102] ? ksys_mmap_pgoff+0x4da/0x660 [ 996.268118] ? __x64_sys_mmap+0xe9/0x1b0 [ 996.268134] ? do_syscall_64+0x1b9/0x820 [ 996.268149] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 996.268176] ? percpu_ref_put_many+0x11c/0x260 [ 996.268195] ? lock_downgrade+0x900/0x900 [ 996.268216] ? check_preemption_disabled+0x48/0x280 [ 996.288236] ? kasan_check_read+0x11/0x20 [ 996.288254] ? zap_class+0x640/0x640 [ 996.288270] ? rcu_softirq_qs+0x20/0x20 [ 996.288290] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 996.288308] ? check_preemption_disabled+0x48/0x280 [ 996.288336] __should_failslab+0x124/0x180 [ 996.288356] should_failslab+0x9/0x14 [ 996.288374] kmem_cache_alloc+0x47/0x730 [ 996.311613] ? rcu_read_lock_sched_held+0x14f/0x180 [ 996.311636] anon_vma_clone+0x140/0x710 [ 996.311678] ? unlink_anon_vmas+0xa60/0xa60 [ 996.311700] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 996.341982] __split_vma+0x183/0x570 [ 996.342000] ? find_vma+0x34/0x190 [ 996.342023] __do_munmap+0x393/0xf80 [ 996.342045] ? check_preemption_disabled+0x48/0x280 [ 996.342067] mmap_region+0x6a7/0x1cd0 [ 996.355363] ? __x64_sys_brk+0x8b0/0x8b0 [ 996.384703] ? zap_class+0x640/0x640 [ 996.388445] ? zap_class+0x640/0x640 [ 996.392193] ? get_pid_task+0xd6/0x1a0 [ 996.392230] ? mpx_unmapped_area_check+0xd8/0x108 [ 996.392268] ? arch_get_unmapped_area_topdown+0xc2/0x940 [ 996.392296] ? arch_get_unmapped_area+0x750/0x750 [ 996.406455] ? lock_acquire+0x1ed/0x520 [ 996.406472] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 996.406500] ? cap_mmap_addr+0x52/0x130 [ 996.406517] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 996.406536] ? security_mmap_addr+0x80/0xa0 [ 996.434177] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 996.439721] ? get_unmapped_area+0x292/0x3b0 [ 996.444140] do_mmap+0xa22/0x1230 [ 996.444178] ? mmap_region+0x1cd0/0x1cd0 [ 996.444194] ? vm_mmap_pgoff+0x1b5/0x2c0 [ 996.444211] ? down_read_killable+0x150/0x150 [ 996.444227] ? security_mmap_file+0x174/0x1b0 [ 996.464754] vm_mmap_pgoff+0x213/0x2c0 [ 996.468661] ? vma_is_stack_for_current+0xd0/0xd0 [ 996.473520] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 996.479069] ? check_preemption_disabled+0x48/0x280 [ 996.484133] ksys_mmap_pgoff+0x4da/0x660 [ 996.488200] ? do_syscall_64+0x9a/0x820 [ 996.492191] ? find_mergeable_anon_vma+0xd0/0xd0 [ 996.496971] ? trace_hardirqs_on+0xbd/0x310 [ 996.501298] ? __ia32_sys_read+0xb0/0xb0 [ 996.501315] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 996.501347] ? trace_hardirqs_off_caller+0x310/0x310 [ 996.501370] __x64_sys_mmap+0xe9/0x1b0 [ 996.501395] do_syscall_64+0x1b9/0x820 [ 996.519795] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 996.529047] ? syscall_return_slowpath+0x5e0/0x5e0 [ 996.529062] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 996.529101] ? trace_hardirqs_on_caller+0x310/0x310 [ 996.529119] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 996.529156] ? prepare_exit_to_usermode+0x291/0x3b0 [ 996.553952] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 996.558811] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 996.563999] RIP: 0033:0x457669 [ 996.564015] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 996.564024] RSP: 002b:00007fbc2fcf4c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000009 [ 996.564039] RAX: ffffffffffffffda RBX: 00007fbc2fcf4c90 RCX: 0000000000457669 [ 996.564047] RDX: 0000000000000000 RSI: 0000000000003000 RDI: 00000000206ff000 [ 996.564060] RBP: 000000000072bf00 R08: 0000000000000003 R09: 0000000000000000 16:05:54 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020200090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e0100000001000000000000002402000100f8ffffff0000000200000000030005100000000002004e20e00000010000000000000000"], 0x60}}, 0x0) [ 996.615670] R10: 0000000000000012 R11: 0000000000000246 R12: 00007fbc2fcf56d4 [ 996.615679] R13: 00000000004c2d75 R14: 00000000004d50e8 R15: 0000000000000004 [ 996.680582] IPVS: ftp: loaded support on port[0] = 21 [ 996.951510] IPVS: ftp: loaded support on port[0] = 21 [ 997.508948] device bridge_slave_1 left promiscuous mode [ 997.514472] bridge0: port 2(bridge_slave_1) entered disabled state [ 997.523364] device bridge_slave_0 left promiscuous mode [ 997.529158] bridge0: port 1(bridge_slave_0) entered disabled state [ 997.558632] team0 (unregistering): Port device team_slave_1 removed [ 997.569534] team0 (unregistering): Port device team_slave_0 removed [ 997.582281] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 997.593592] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 997.625499] bond0 (unregistering): Released all slaves [ 997.660676] bridge0: port 1(bridge_slave_0) entered blocking state [ 997.667039] bridge0: port 1(bridge_slave_0) entered disabled state [ 997.675587] device bridge_slave_0 entered promiscuous mode [ 997.721959] bridge0: port 2(bridge_slave_1) entered blocking state [ 997.728426] bridge0: port 2(bridge_slave_1) entered disabled state [ 997.735788] device bridge_slave_1 entered promiscuous mode [ 997.828562] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 997.906067] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 998.073208] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 998.163937] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 998.690067] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 998.705405] team0: Port device team_slave_0 added [ 998.775833] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 998.783557] team0: Port device team_slave_1 added [ 998.834619] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 998.938165] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 998.997850] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 999.005003] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 999.018126] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 999.098962] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 999.106088] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 999.122998] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 999.651793] bridge0: port 2(bridge_slave_1) entered blocking state [ 999.658223] bridge0: port 2(bridge_slave_1) entered forwarding state [ 999.664903] bridge0: port 1(bridge_slave_0) entered blocking state [ 999.671336] bridge0: port 1(bridge_slave_0) entered forwarding state [ 999.708232] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 999.947549] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready 16:05:57 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, 0x0, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_INFO(r1, 0x29, 0x40, &(0x7f00000000c0)={'security\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xa4\x00'}, &(0x7f0000000140)=0x54) 16:05:57 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020200090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e0100000001000000000000002402000100f8ffffff0000000200000000030005080000000002004e20e00000010000000000000000"], 0x60}}, 0x0) 16:05:57 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='fdinfo\x00') ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(r0, 0xc01064b5, &(0x7f00000000c0)={&(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x8}) getdents64(r0, &(0x7f0000000000)=""/60, 0x3c) 16:05:57 executing program 4 (fault-call:2 fault-nth:4): r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000b4508a)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x400000000009) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x0, 0x12, r0, 0x0) 16:05:57 executing program 3: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[d::]:\n.lbE\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) [ 1000.110331] FAULT_INJECTION: forcing a failure. [ 1000.110331] name failslab, interval 1, probability 0, space 0, times 0 [ 1000.161831] IPVS: ftp: loaded support on port[0] = 21 [ 1000.170764] CPU: 1 PID: 15571 Comm: syz-executor4 Not tainted 4.20.0-rc7+ #381 [ 1000.178140] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1000.178148] Call Trace: [ 1000.178189] dump_stack+0x244/0x39d [ 1000.178216] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1000.178250] should_fail.cold.4+0xa/0x17 [ 1000.178275] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1000.178305] ? save_stack+0xa9/0xd0 [ 1000.178324] ? zap_class+0x640/0x640 [ 1000.178343] ? zap_class+0x640/0x640 [ 1000.178361] ? find_held_lock+0x36/0x1c0 [ 1000.178388] ? find_held_lock+0x36/0x1c0 [ 1000.223326] ? __lock_is_held+0xb5/0x140 [ 1000.223494] ? xfs_allocbt_verify+0x28/0x4b0 [ 1000.223527] ? perf_trace_sched_process_exec+0x860/0x860 [ 1000.236028] ? kasan_check_read+0x11/0x20 [ 1000.236055] __should_failslab+0x124/0x180 [ 1000.236076] should_failslab+0x9/0x14 [ 1000.253730] kmem_cache_alloc+0x2be/0x730 [ 1000.257901] ? __vma_adjust+0x1810/0x1810 [ 1000.262070] vm_area_alloc+0x7a/0x1d0 [ 1000.265933] ? arch_release_thread_stack+0x10/0x10 [ 1000.270882] mmap_region+0x9d7/0x1cd0 [ 1000.274710] ? __x64_sys_brk+0x8b0/0x8b0 [ 1000.278812] ? zap_class+0x640/0x640 [ 1000.282541] ? zap_class+0x640/0x640 [ 1000.282563] ? get_pid_task+0xd6/0x1a0 [ 1000.282583] ? mpx_unmapped_area_check+0xd8/0x108 [ 1000.295049] ? arch_get_unmapped_area+0x750/0x750 [ 1000.299904] ? lock_acquire+0x1ed/0x520 [ 1000.299922] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1000.299939] ? cap_mmap_addr+0x52/0x130 [ 1000.299958] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1000.308944] ? security_mmap_addr+0x80/0xa0 [ 1000.308964] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1000.308985] ? get_unmapped_area+0x292/0x3b0 [ 1000.332711] do_mmap+0xa22/0x1230 [ 1000.332735] ? mmap_region+0x1cd0/0x1cd0 [ 1000.332756] ? vm_mmap_pgoff+0x1b5/0x2c0 [ 1000.344307] ? down_read_killable+0x150/0x150 [ 1000.348818] ? security_mmap_file+0x174/0x1b0 [ 1000.353329] vm_mmap_pgoff+0x213/0x2c0 [ 1000.353359] ? vma_is_stack_for_current+0xd0/0xd0 [ 1000.353379] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1000.362099] ? check_preemption_disabled+0x48/0x280 [ 1000.372803] ksys_mmap_pgoff+0x4da/0x660 [ 1000.376874] ? do_syscall_64+0x9a/0x820 [ 1000.376897] ? find_mergeable_anon_vma+0xd0/0xd0 [ 1000.376916] ? trace_hardirqs_on+0xbd/0x310 [ 1000.389963] ? __ia32_sys_read+0xb0/0xb0 [ 1000.389980] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1000.389998] ? trace_hardirqs_off_caller+0x310/0x310 [ 1000.390019] __x64_sys_mmap+0xe9/0x1b0 [ 1000.408506] do_syscall_64+0x1b9/0x820 [ 1000.412406] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1000.417801] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1000.422743] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1000.422764] ? trace_hardirqs_on_caller+0x310/0x310 [ 1000.422785] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1000.437659] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1000.442695] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1000.447559] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1000.452767] RIP: 0033:0x457669 [ 1000.455969] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1000.474890] RSP: 002b:00007fbc2fcf4c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000009 [ 1000.474907] RAX: ffffffffffffffda RBX: 00007fbc2fcf4c90 RCX: 0000000000457669 [ 1000.474917] RDX: 0000000000000000 RSI: 0000000000003000 RDI: 00000000206ff000 [ 1000.474927] RBP: 000000000072bf00 R08: 0000000000000003 R09: 0000000000000000 [ 1000.474937] R10: 0000000000000012 R11: 0000000000000246 R12: 00007fbc2fcf56d4 [ 1000.474946] R13: 00000000004c2d75 R14: 00000000004d50e8 R15: 0000000000000004 [ 1000.563237] IPVS: ftp: loaded support on port[0] = 21 [ 1000.956630] IPVS: ftp: loaded support on port[0] = 21 [ 1001.919514] bridge0: port 1(bridge_slave_0) entered blocking state [ 1001.925983] bridge0: port 1(bridge_slave_0) entered disabled state [ 1001.933644] device bridge_slave_0 entered promiscuous mode [ 1001.982520] bridge0: port 2(bridge_slave_1) entered blocking state [ 1001.989048] bridge0: port 2(bridge_slave_1) entered disabled state [ 1001.996442] device bridge_slave_1 entered promiscuous mode [ 1002.061067] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1002.108845] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1002.264696] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1002.336747] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1002.348989] device bridge_slave_1 left promiscuous mode [ 1002.354513] bridge0: port 2(bridge_slave_1) entered disabled state [ 1002.365699] device bridge_slave_0 left promiscuous mode [ 1002.372173] bridge0: port 1(bridge_slave_0) entered disabled state [ 1002.412182] team0 (unregistering): Port device team_slave_1 removed [ 1002.423406] team0 (unregistering): Port device team_slave_0 removed [ 1002.437230] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1002.450656] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1002.483640] bond0 (unregistering): Released all slaves [ 1002.727637] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1002.735053] team0: Port device team_slave_0 added [ 1002.825512] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1002.833185] team0: Port device team_slave_1 added [ 1002.898250] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 1002.905099] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1002.928316] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1002.980045] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 1002.986911] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1002.998427] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1003.043991] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1003.051205] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1003.067884] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1003.137177] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1003.157738] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1003.168001] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1003.384147] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1003.686656] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1004.001602] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 1004.009574] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1004.016688] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1004.040664] bridge0: port 2(bridge_slave_1) entered blocking state [ 1004.047031] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1004.053756] bridge0: port 1(bridge_slave_0) entered blocking state [ 1004.060195] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1004.075757] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 1004.303780] 8021q: adding VLAN 0 to HW filter on device team0 [ 1004.677445] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready 16:06:03 executing program 1: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/sequencer2\x00', 0x280080, 0x0) ioctl$TUNGETFEATURES(r0, 0x800454cf, &(0x7f0000000500)) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f00000002c0)=ANY=[@ANYBLOB="5b5d3a3a5d000a6c6c623a009cfe61b5067245da02e285c0ac19140b32d3aa3ddbf5db222ae19f55ef32c5bd9c67155d5a7a0201f38d67816ab9d1cf685d503ef46bbead68ae295f078c05d7791c6141bc115c3779a01b6643030097de3be2a56291e20ed96cfbc7c441dbdf049678f5b58f03f583e9e9175afac406bb199cd697cc081506fa769ea4903b45458917b935ed9ac109b6af319f15ae7c435531bfe04fa8"], &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm-control\x00', 0x2000, 0x0) setsockopt$l2tp_PPPOL2TP_SO_DEBUG(r1, 0x111, 0x1, 0x6, 0x4) ioctl$sock_SIOCBRDELBR(r1, 0x89a1, &(0x7f0000000200)='vcan0\x00') r2 = add_key$user(&(0x7f0000000240)='user\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000380), 0x0, 0xfffffffffffffffa) keyctl$get_security(0x11, r2, &(0x7f00000003c0)=""/67, 0x43) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuset.effective_cpus\x00', 0x0, 0x0) setsockopt$inet_dccp_int(r3, 0x21, 0xb, &(0x7f0000000040)=0x5, 0x4) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'team_slave_0\x00', 0x0}) getsockopt$inet_sctp6_SCTP_NODELAY(r3, 0x84, 0x3, &(0x7f0000000380), &(0x7f0000000440)=0x4) setsockopt$netlink_NETLINK_CAP_ACK(r3, 0x10e, 0xa, &(0x7f0000000480)=0x1, 0x4) bind$can_raw(r3, &(0x7f00000001c0)={0x1d, r4}, 0x10) setsockopt$l2tp_PPPOL2TP_SO_DEBUG(r3, 0x111, 0x1, 0x8, 0x4) 16:06:03 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020200090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e0100000001000000000000002402000100f8ffffff0000000200000000030005010000e00002004e20e00000010000000000000000"], 0x60}}, 0x0) 16:06:03 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='fdinfo\x00') r1 = msgget$private(0x0, 0x8) msgrcv(r1, &(0x7f0000000140)={0x0, ""/195}, 0xcb, 0x2, 0x800) getdents64(r0, &(0x7f0000000000)=""/60, 0x3c) fchmodat(r0, &(0x7f00000000c0)='./file0\x00', 0x100) ioctl$KVM_HYPERV_EVENTFD(r0, 0x4018aebd, &(0x7f0000000080)={0x0, r0, 0x1}) ioctl$PPPIOCSMRU(r0, 0x40047452, &(0x7f0000000100)=0x2) 16:06:03 executing program 4 (fault-call:2 fault-nth:5): r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000b4508a)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x400000000009) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x0, 0x12, r0, 0x0) 16:06:03 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, 0x0, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_INFO(r1, 0x29, 0x40, &(0x7f00000000c0)={'security\x00\x00\x00\x00\x00\x02\x84\x00'}, &(0x7f0000000140)=0x54) [ 1005.703842] libceph: parse_ips bad ip '[]::]: [ 1005.703842] llb' [ 1005.712233] libceph: parse_ips bad ip '[]::]: [ 1005.712233] llb' [ 1005.772755] IPVS: ftp: loaded support on port[0] = 21 16:06:03 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020200090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e0100000001000000000000002402000100f8ffffff0000000200000000030005000340000002004e20e00000010000000000000000"], 0x60}}, 0x0) 16:06:03 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000b4508a)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x400000000009) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x0, 0x12, r0, 0x0) 16:06:03 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='fdinfo\x00') getdents64(r0, &(0x7f0000000100)=""/60, 0xfffffffffffffd9a) prctl$PR_MCE_KILL_GET(0x22) ioctl$KVM_SET_REGS(r0, 0x4090ae82, &(0x7f0000000140)={[0x1f, 0x6, 0x8, 0x6, 0x1c0000000, 0x40, 0x7fff, 0x80000001, 0x2c, 0x3, 0x91dd, 0x7, 0x7, 0x4, 0x20, 0xd3ee], 0x3000, 0xd0000}) r1 = add_key(&(0x7f0000000000)='syzkaller\x00', &(0x7f0000000080)={'syz', 0x3}, &(0x7f0000000200)="f42a4cc5320aa157777ca45f375d68c307628625a39dbe2eb6208bcf3130dfff8b31fe1a94f6e0bb320fe3520d6a63ad212a0aedd87537a7a7c8daa4e6e56beb6f3a2d4fa3c909b74960053aba295439554fad04d1946668158db4404a9a436e56cabf8d67ca0e248a4e8f8d5e7881e392fece2e5478045054cc5660f45cde69cbeefc7c76b9db139c2eeb4e9c13e959721e3c5430b666be39bef66fd4852d3b82807a6b99d73eb1006293cfa3eb58f7d4a899c5d7071bd99d4ed251429121160a30ab39ea301e5a6bf04b746caf38bd", 0xd0, 0xffffffffffffffff) keyctl$get_security(0x11, r1, &(0x7f0000000300)=""/126, 0x7e) [ 1005.829506] ceph: device name is missing path (no : separator in []::]) [ 1005.853582] ceph: device name is missing path (no : separator in []::]) 16:06:03 executing program 1: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x200000000000006, 0x0) clone(0xa00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=ANY=[@ANYBLOB="5b5d3a3a5d4167156e9f1e2aa1b60b80b467"], &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) r0 = openat$vimc1(0xffffffffffffff9c, &(0x7f0000000200)='/dev/video1\x00', 0x2, 0x0) ioctl$VIDIOC_SUBDEV_G_FMT(r0, 0xc0585604, &(0x7f0000000140)={0x1, 0x0, {0x794c0ec4, 0x1, 0x2001, 0x4, 0x5, 0x0, 0x2, 0x1}}) syz_genetlink_get_family_id$tipc(&(0x7f00000001c0)='TIPC\x00') 16:06:03 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020200090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e0100000001000000000000002402000100f8ffffff0000000200000000030005002000000002004e20e00000010000000000000000"], 0x60}}, 0x0) 16:06:03 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000b4508a)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x400000000009) mmap(&(0x7f00006ff000/0x3000)=nil, 0x301e, 0x0, 0x12, r0, 0x0) [ 1005.995122] ceph: device name is missing path (no : separator in []::]AgnŸ*¡¶ €´g) [ 1006.026955] ceph: device name is missing path (no : separator in []::]AgnŸ*¡¶ €´g) [ 1006.632362] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1006.731701] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1006.832565] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 1006.838915] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1006.845909] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1006.943211] 8021q: adding VLAN 0 to HW filter on device team0 16:06:05 executing program 3: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[d::]:\nLlbE\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 16:06:05 executing program 0: getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000080), &(0x7f00000000c0)=0xc) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000140)=0x0) r1 = syz_open_procfs(r0, &(0x7f0000000100)='net/udp\x00') getdents64(r1, &(0x7f0000000000)=""/60, 0x3c) 16:06:05 executing program 1: r0 = socket(0x8, 0xa, 0x2) getsockname$unix(r0, &(0x7f00000001c0)=@abs, &(0x7f0000000000)=0x6e) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000340)=ANY=[@ANYBLOB="5b5d3a3a5d3a0a6c6c623a00da60a4debb3990dec03fe594eea66284435a2da44aeeff22b3fdf3121ff1e82dfd1a36a5d653eeec7791f78ea5d6ddaef5f9f7f1c9cb26f33073203b723d4988a9ce8376a88086beff66e4530c81a216b8b7b1c884e9097c35a34af1513e61511d05f1f09e6b73a2907eededbc762d274a6420312f8540cbaf726bcd244a568643aa238251bc43a6667da657a8a597cd615ec05e856465016c4515b00cf2c6bebf139d5ccd3d47a82a223a1700ee2b6b7872d446569b4da72bd167d600cc92214b5ae200cf349660b7b5d8cad1af"], &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 16:06:05 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000b4508a)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x400000000009) mmap(&(0x7f00006ff000/0x3000)=nil, 0x7ffffffff000, 0x0, 0x12, r0, 0x0) 16:06:05 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020200090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e0100000001000000000000002402000100f8ffffff000000020000000003000500e000000102004e20e00000010000000000000000"], 0x60}}, 0x0) 16:06:05 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, 0x0, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_INFO(r1, 0x29, 0x40, &(0x7f00000000c0)={'security\x00\x00\x00\x00@\x00'}, &(0x7f0000000140)=0x54) [ 1007.973312] ceph: device name is missing path (no : separator in [d::]: [ 1007.973312] .lbE) [ 1007.986805] ceph: device name is missing path (no : separator in [d::]: [ 1007.986805] .lbE) [ 1008.019609] libceph: parse_ips bad ip '[]::]: [ 1008.019609] llb' [ 1008.062951] IPVS: ftp: loaded support on port[0] = 21 16:06:05 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000b4508a)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x400000000009) mmap(&(0x7f00006ff000/0x3000)=nil, 0x400000001000, 0x0, 0x12, r0, 0x0) 16:06:05 executing program 0: shmget$private(0x0, 0x1000, 0x78000010, &(0x7f0000ffd000/0x1000)=nil) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='fdinfo\x00') getdents64(r0, &(0x7f0000000000)=""/60, 0x3c) r1 = shmget$private(0x0, 0x4000, 0x1, &(0x7f0000ffb000/0x4000)=nil) shmctl$SHM_INFO(r1, 0xe, &(0x7f0000000080)=""/118) 16:06:05 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020200090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e0100000001000000000000002402000100f8ffffff0000000200000000030005000200000002004e20e00000010000000000000000"], 0x60}}, 0x0) [ 1008.088061] ceph: device name is missing path (no : separator in [d::]: [ 1008.088061] LlbE) [ 1008.109508] libceph: parse_ips bad ip '[]::]: [ 1008.109508] llb' [ 1008.167629] ceph: device name is missing path (no : separator in [d::]: [ 1008.167629] LlbE) 16:06:05 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='fdinfo\x00') ioctl$KVM_PPC_ALLOCATE_HTAB(r0, 0xc004aea7, &(0x7f0000000100)=0x1) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000080), &(0x7f00000000c0)=0x4) getdents64(r0, &(0x7f0000000000)=""/60, 0x3c) 16:06:05 executing program 1: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000001c0)={{{@in, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000000140)=0xe8) munlock(&(0x7f0000001000/0x1000)=nil, 0x1000) prctl$PR_CAPBSET_READ(0x17, 0x17) lsetxattr$security_capability(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.capability\x00', &(0x7f00000002c0)=@v3={0x3000000, [{0x0, 0x9}, {0x3ff, 0x81}], r0}, 0x18, 0x2) mount(&(0x7f0000000040)=@nullb='[]::]:\nllb:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 16:06:05 executing program 3: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[d::]:\nlubE\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 16:06:05 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020200090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e0100000001000000000000002402000100f8ffffff0000000200000000030005000000002002004e20e00000010000000000000000"], 0x60}}, 0x0) 16:06:05 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000b4508a)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x400000000009) mmap(&(0x7f00006ff000/0x3000)=nil, 0x7fffdf900000, 0x0, 0x12, r0, 0x0) [ 1008.366710] libceph: parse_ips bad ip '[]::]: [ 1008.366710] llb' [ 1008.395876] libceph: parse_ips bad ip '[]::]: [ 1008.395876] llb' 16:06:06 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='fdinfo\x00') openat$cgroup_ro(r0, &(0x7f0000000000)='cgroup.controllers\x00', 0x0, 0x0) getdents64(r0, &(0x7f00000001c0)=""/60, 0xfffffffffffffdbb) 16:06:06 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020200090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e0100000001000000000000002402000100f8ffffff000000020000000003000500fffffffb02004e20e00000010000000000000000"], 0x60}}, 0x0) [ 1008.414435] ceph: device name is missing path (no : separator in [d::]: [ 1008.414435] lubE) 16:06:06 executing program 1: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x50800, 0x0) sendto$inet6(r0, &(0x7f00000001c0)="445a1f1f1ffaf117ee79dd5e4dd218ca9069bee434f081a9a7b284a3deb270663ed913c1ba1fa47f70dc41fe87b0a6cc49919c058a4e4d0ecdf49759080f67769d839e496c8c109e5cc2d000a9055e45327ef66cf52b6ee80ae51ff187495aa611c639", 0x63, 0x4000000, &(0x7f00000000c0)={0xa, 0x4e24, 0xf19, @mcast1, 0x6}, 0x1c) mount(&(0x7f0000000040)=@nullb='[]::]:\nllb:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) [ 1008.619500] libceph: parse_ips bad ip '[]::]: [ 1008.619500] llb' [ 1008.660421] libceph: parse_ips bad ip '[]::]: [ 1008.660421] llb' 16:06:06 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000b4508a)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x400000000009) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3003, 0x0, 0x12, r0, 0x0) 16:06:06 executing program 3: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[d::]:\nl\nbE\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 16:06:06 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020200090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e0100000001000000000000002402000100f8ffffff000000020000000003000500010000e002004e20e00000010000000000000000"], 0x60}}, 0x0) 16:06:06 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='fdinfo\x00') getdents64(r0, &(0x7f0000000000)=""/60, 0x3c) statx(r0, &(0x7f0000000080)='./file0\x00', 0x6000, 0x850, &(0x7f00000000c0)) ioctl$VIDIOC_SUBDEV_G_CROP(r0, 0xc038563b, &(0x7f00000001c0)={0x0, 0x0, {0x7, 0x8, 0x9, 0x7}}) 16:06:06 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, 0x0, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_INFO(r1, 0x29, 0x40, &(0x7f00000000c0)={'security\x00\x00\x00\xa8\x00'}, &(0x7f0000000140)=0x54) 16:06:06 executing program 1: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) acct(&(0x7f00000000c0)='./file0\x00') mount(&(0x7f0000000040)=ANY=[@ANYBLOB='[]::]:\nllb>\x00'], &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) [ 1008.926654] ceph: device name is missing path (no : separator in [d::]: [ 1008.926654] l [ 1008.926654] bE) [ 1008.950920] ceph: device name is missing path (no : separator in []::]: [ 1008.950920] llb>) [ 1008.966451] ceph: device name is missing path (no : separator in [d::]: [ 1008.966451] l [ 1008.966451] bE) 16:06:06 executing program 1: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x88000c01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = accept4$vsock_stream(0xffffffffffffff9c, &(0x7f0000000040)={0x28, 0x0, 0xffffffff, @hyper}, 0x10, 0x0) recvmmsg(r0, &(0x7f00000002c0)=[{{&(0x7f00000001c0)=@tipc, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000240)=""/121, 0x79}], 0x1, &(0x7f0000000140)=""/32, 0x20}, 0x70}], 0x1, 0x42, 0x0) mount(&(0x7f0000000000)=ANY=[@ANYBLOB="bfc6fdd3fab4b63f46fd6bc61ccccf239360f601"], &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 16:06:06 executing program 3: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[d::]:\nl.bE\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 16:06:06 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0x40001, 0x0) getsockopt$inet_sctp_SCTP_PR_STREAM_STATUS(r0, 0x84, 0x74, &(0x7f0000000200)=""/4096, &(0x7f0000000140)=0x1000) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000180)={0x0}, &(0x7f0000000080)=0xc) r2 = syz_open_procfs(r1, &(0x7f0000001440)='\x05\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00R\x9684\x15\x84\x16\xcf\xdbu\xf2gV\xa2\xc1UZ\xd0\xfb!\xb5l-\xe0$\"Hka\xda\xce}\xd9\xd4\nJw\xd4\x8f[\x1d*\xb7\x99\x9f\xc3+Du|.\xba\x80\xe4\xe9,E4\xe4\a\x80\x00\r\x05\x00\x00\x00\x00\x00\x00\x00T\xa3\x18;w\xd9\x96[4\xf8\xa0\xd0\xf6\xb2\xf5`\xc0\x00[6\xbb\xfbr\xad\'\xedA\xc2\x9b\xa9\x10\x19L\xf1jCs\x91\x9d\x99Fv)V7\xa8;\xdf\x81>M\x02mx\xc1 lTH\x8cy\x14\xed\xb0o\xa4P \xe5W\a\xe3\xecS-M\x9c\x964\xcb\x15\xc6\xa7=i\xca\x8e\r\x86\xb9\xda\x02\xb2\xca\x04p\ndd\r1\xb5]\r\xce\xc2\x06A\x1aLa\x99LT\xa9\x1c\x16\xe5\xb7sMg\xb5\xea\x05N\x94\xe1\x80N\x19\x9f\xed\x97\x01%\x165\x8c\xef\xbe\xcf\x02\x9c{\x13\x18\xa5\x8ab\xb0\x90\a(\xadU\xcd\xcf\xa2\x11<\xcf\xaf\xa5\xf9\xe6]\xcd') setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(r2, 0x84, 0x65, &(0x7f00000000c0)=[@in6={0xa, 0x4e22, 0x2, @mcast2}, @in6={0xa, 0x4e21, 0x9026, @local, 0x65928379}, @in6={0xa, 0x4e20, 0x10001, @dev={0xfe, 0x80, [], 0xb}, 0x5}, @in={0x2, 0x4e22, @broadcast}], 0x64) getdents64(r2, &(0x7f0000000000)=""/60, 0x3c) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r2, 0x84, 0x1f, &(0x7f0000001200)={0x0, @in6={{0xa, 0x4e24, 0x1ff, @ipv4={[], [], @multicast2}, 0x4}}, 0x1ff}, &(0x7f00000012c0)=0x90) mmap$xdp(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1, 0x10, r2, 0x80000000) setsockopt$inet_sctp6_SCTP_SET_PEER_PRIMARY_ADDR(r2, 0x84, 0x5, &(0x7f0000001300)={r3, @in={{0x2, 0x4e21, @rand_addr=0x3}}}, 0x84) 16:06:06 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020200090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e0100000001000000000000002402000100f8ffffff0000000200000000030005000000000402004e20e00000010000000000000000"], 0x60}}, 0x0) 16:06:06 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000b4508a)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x400000000009) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3002, 0x0, 0x12, r0, 0x0) [ 1009.038763] IPVS: ftp: loaded support on port[0] = 21 16:06:06 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='fdinfo\x00') getdents64(r0, &(0x7f0000000080)=""/60, 0x3c) [ 1009.151242] ceph: device name is missing path (no : separator in [d::]: [ 1009.151242] l.bE) [ 1009.160244] ceph: device name is missing path (no : separator in ¿ÆýÓú´¶?FýkÆÌÏ#“`ö) 16:06:06 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000b4508a)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x400000000009) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3004, 0x0, 0x12, r0, 0x0) 16:06:06 executing program 3: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[d::]:\nlLbE\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 16:06:06 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020200090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e0100000001000000000000002402000100f8ffffff000000020000000003000500fbffffff02004e20e00000010000000000000000"], 0x60}}, 0x0) [ 1009.232036] ceph: device name is missing path (no : separator in ¿ÆýÓú´¶?FýkÆÌÏ#“`ö) 16:06:06 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020200090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e0100000001000000000000002402000100f8ffffff0000000200000000030005001000000002004e20e00000010000000000000000"], 0x60}}, 0x0) [ 1009.376055] ceph: device name is missing path (no : separator in [d::]: [ 1009.376055] lLbE) [ 1009.584063] IPVS: ftp: loaded support on port[0] = 21 16:06:07 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, 0x0, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_INFO(r1, 0x29, 0x40, &(0x7f00000000c0)={'security\x00\x00\x00\x02\x00'}, &(0x7f0000000140)=0x54) 16:06:07 executing program 1: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[]::]:\nllb:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f00000000c0)={&(0x7f0000000000)='./file0\x00', 0x0, 0x18}, 0x10) 16:06:07 executing program 0: r0 = syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0xffffffffffffffe0, 0x2129a414282f4c9) ioctl$TIOCSWINSZ(r0, 0x5414, &(0x7f00000000c0)={0x6, 0x3f, 0x6, 0xffffffffffffffff}) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/rfcomm\x00') openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/attr/current\x00', 0x2, 0x0) getdents64(r1, &(0x7f0000000000)=""/60, 0x3c) 16:06:07 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000b4508a)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x400000000009) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x1e00000000000000, 0x12, r0, 0x0) 16:06:07 executing program 3: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[d::]:\nll\nE\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 16:06:07 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020200090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e0100000001000000000000002402000100f8ffffff0000000200000000030005000000001002004e20e00000010000000000000000"], 0x60}}, 0x0) 16:06:07 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000b4508a)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x400000000009) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x200000000000000, 0x12, r0, 0x0) [ 1009.707954] ceph: device name is missing path (no : separator in [d::]: [ 1009.707954] ll [ 1009.707954] E) [ 1009.727267] ceph: device name is missing path (no : separator in [d::]: [ 1009.727267] ll [ 1009.727267] E) [ 1009.738138] libceph: parse_ips bad ip '[]::]: [ 1009.738138] llb' [ 1009.746693] libceph: parse_ips bad ip '[]::]: [ 1009.746693] llb' 16:06:07 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020200090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e0100000001000000000000002402000100f8ffffff0000000200000000030005000000000802004e20e00000010000000000000000"], 0x60}}, 0x0) [ 1009.783311] IPVS: ftp: loaded support on port[0] = 21 16:06:07 executing program 0: getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000000c0)={0x0}, &(0x7f0000000100)=0xc) r1 = accept4$alg(0xffffffffffffff9c, 0x0, 0x0, 0x800) r2 = eventfd(0x7) dup2(r1, r2) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/schedule_icmp\x00', 0x2, 0x0) r3 = syz_open_procfs(r0, &(0x7f0000000280)='fdinfo\x00\x842j\r\xec\xb7\x18\x85\x9e\x02\xde0\xae\x1d~\xfb\x85\x1a\x04J\ap\xdd\x1f\x97\xf6') getsockopt$IP_VS_SO_GET_SERVICE(r3, 0x0, 0x483, &(0x7f0000000140), &(0x7f00000001c0)=0x68) getdents64(r3, &(0x7f0000000000)=""/60, 0x3c) 16:06:07 executing program 3: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[d::]:\nllb\n\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 16:06:07 executing program 1: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[]::]:\nllb:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 16:06:07 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020200090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e0100000001000000000000002402000100f8ffffff0000000200000000030005007fffffff02004e20e00000010000000000000000"], 0x60}}, 0x0) [ 1009.959680] ceph: device name is missing path (no : separator in [d::]: [ 1009.959680] llb [ 1009.959680] ) [ 1010.005724] libceph: parse_ips bad ip '[]::]: [ 1010.005724] llb' [ 1010.204660] IPVS: ftp: loaded support on port[0] = 21 16:06:07 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, 0x0, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_INFO(r1, 0x29, 0x40, &(0x7f00000000c0)={'security\x00\x00\x00\x01\x9a\x00'}, &(0x7f0000000140)=0x54) 16:06:07 executing program 0: r0 = syz_open_dev$cec(&(0x7f0000000100)='/dev/cec#\x00', 0x3, 0x2) ioctl$EVIOCGABS0(r0, 0x80184540, &(0x7f0000000140)=""/187) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fdinfo\x00') openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x401, 0x0) openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x202100, 0x0) getdents64(r1, &(0x7f00000000c0)=""/60, 0x3c) 16:06:07 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000b4508a)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x400000000009) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x300, 0x12, r0, 0x0) 16:06:07 executing program 3: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[d::]:\nllb:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 16:06:07 executing program 1: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x101, 0x0) lsetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)=@random={'security.', 'ceph\x00'}, &(0x7f0000000140)='ceph\x00', 0x5, 0x1) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="5b5d7465d78e0a6c6c623a00"], &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 16:06:07 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020200090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e0100000001000000000000002402000100f8ffffff0000000200000000030005000020000002004e20e00000010000000000000000"], 0x60}}, 0x0) [ 1010.317203] libceph: parse_ips bad ip '[]te׎ [ 1010.317203] llb' [ 1010.325440] libceph: parse_ips bad ip '[d::]: [ 1010.325440] llb' [ 1010.350496] libceph: parse_ips bad ip '[]te׎ [ 1010.350496] llb' 16:06:08 executing program 1: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$dmmidi(&(0x7f0000000140)='/dev/dmmidi#\x00', 0x6, 0x200000) r1 = syz_open_dev$sndpcmc(&(0x7f0000000640)='/dev/snd/pcmC#D#c\x00', 0x10000, 0x101000) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r1) r2 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x6, 0x0) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) write$uinput_user_dev(r2, &(0x7f00000001c0)={'syz0\x00', {0xfffffffffffffffa, 0x4, 0x9, 0xbf}, 0x56, [0x6, 0x1ff, 0xffffffffffffffff, 0x6, 0x7f, 0x101, 0x800000000000000, 0x401, 0xb6, 0x800, 0x5, 0x6, 0x8, 0x2b6, 0x9, 0x9, 0x40, 0x7fff, 0x8000, 0x6f, 0x9, 0x3, 0x3, 0x0, 0x7, 0x100, 0x8000, 0x800, 0x0, 0x2, 0x0, 0x1, 0x3, 0x8001, 0x0, 0x0, 0x8, 0x9, 0x6, 0x800, 0xfffffffffffffff8, 0xf19, 0x8, 0x5, 0x3, 0x2, 0x8, 0x3, 0x4, 0x6, 0x2, 0x7f, 0x0, 0x2, 0xff, 0x6, 0x2, 0x7, 0x2, 0x1, 0x1, 0x20, 0x1000, 0x1], [0x6, 0x6, 0x0, 0xffff, 0x0, 0x9, 0x9, 0x6, 0x0, 0x0, 0x5, 0x9, 0x9, 0x8000000000, 0x401, 0x8, 0xeb9, 0x6, 0x7f, 0x4, 0x6, 0x40, 0x2, 0x5df4b892, 0x6, 0x2, 0x41, 0x7, 0x92, 0x100000001, 0x2, 0x1, 0x0, 0x8, 0x1f, 0x80, 0x4, 0x3, 0xe75, 0x5, 0xf3, 0x4, 0x5, 0x6, 0x3, 0x1000, 0x83a, 0x7, 0x4, 0x1, 0x3f, 0x5, 0xa693, 0x80000001, 0x8, 0x9e, 0x1, 0x1, 0x1f, 0x2, 0x7, 0x92, 0x0, 0x8], [0x1, 0x10000, 0x9, 0x7, 0xff, 0x400, 0xb4, 0xffffffffffffffb7, 0x7ff, 0x7, 0x8, 0x401, 0x5, 0xc7, 0x7, 0x1492, 0x9, 0x7, 0x3, 0x6, 0x8, 0x5, 0xff, 0xff, 0x7, 0x8, 0x0, 0x400, 0x5, 0x8, 0x3ff, 0x6, 0x1, 0xff, 0x1, 0x8, 0x2, 0x47, 0xff, 0xfff, 0x3ff, 0x400, 0x5, 0x101, 0x80000001, 0x7, 0x4, 0x2, 0x3, 0x5, 0x1, 0xffffffffffffffff, 0x10000, 0x500, 0x7fffffff, 0x1, 0x5, 0x2a1b5b0b, 0x5, 0x1, 0x3f, 0x2, 0x6b43, 0x307d21b7], [0x9, 0x6, 0x0, 0x0, 0x81, 0x3, 0x7, 0x5, 0x4, 0x1, 0x9, 0x5, 0xfff, 0x1, 0x5a, 0xfffffffffffff001, 0x3f, 0x8, 0x42d, 0x3, 0x0, 0xffff, 0x8, 0x802, 0x1, 0x2, 0x1, 0x6, 0x40, 0x3f, 0x400, 0x27c9, 0x4, 0x9, 0x3, 0x7, 0x67, 0x40, 0x3b, 0x7, 0x0, 0x7f, 0x2, 0xffff, 0x9, 0x3f, 0x4, 0x4, 0x8, 0x4f7, 0x1, 0x2000000000000, 0x9, 0x101, 0x7, 0xe4d, 0x2, 0x25c4, 0x6, 0x20, 0x47833b81, 0x6, 0x4, 0x6]}, 0x45c) syz_open_dev$dri(&(0x7f0000000680)='/dev/dri/card#\x00', 0x4, 0x100) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="5b5d3a3a5d18703d8b764bc7"], &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 16:06:08 executing program 0: r0 = syz_open_dev$radio(&(0x7f0000000080)='/dev/radio#\x00', 0x1, 0x2) openat(r0, &(0x7f00000000c0)='./file0\x00', 0xa4000, 0x20) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fdinfo\x00') getdents64(r1, &(0x7f0000000000)=""/60, 0x3c) fstat(r1, &(0x7f0000000100)) 16:06:08 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000b4508a)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x400000000009) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x1e00, 0x12, r0, 0x0) 16:06:08 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020200090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e0100000001000000000000002402000100f8ffffff0000000200000000030005000003400002004e20e00000010000000000000000"], 0x60}}, 0x0) [ 1010.373395] libceph: parse_ips bad ip '[d::]: [ 1010.373395] llb' [ 1010.389353] IPVS: ftp: loaded support on port[0] = 21 16:06:08 executing program 3: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[d::]:\nllb`\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 16:06:08 executing program 0: r0 = syz_open_dev$midi(&(0x7f0000000100)='/dev/midi#\x00', 0x7, 0x2) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) pipe(&(0x7f0000000000)) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='fdinfo\x00') getdents64(r1, &(0x7f0000000180)=""/60, 0x46f) openat(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x20) [ 1010.537068] ceph: device name is missing path (no : separator in []::]p=‹vKÇ) [ 1010.585458] ceph: device name is missing path (no : separator in [d::]: [ 1010.585458] llb`) 16:06:08 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, 0x0, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_INFO(r1, 0x29, 0x40, &(0x7f00000000c0)={'security\x00\x00\x00\x00\x1d\x00'}, &(0x7f0000000140)=0x54) 16:06:08 executing program 1: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0xe9d23e539ad5fcb, 0x0) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r0, 0x84, 0xc, &(0x7f0000000280)=0x2, 0x4) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) r1 = accept4(0xffffffffffffffff, &(0x7f0000001680)=@nfc_llcp, &(0x7f0000001700)=0x80, 0x800) getsockopt$bt_BT_SNDMTU(r1, 0x112, 0xc, &(0x7f0000001740)=0x9, &(0x7f0000001780)=0x2) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vsock\x00', 0x20fffc, 0x0) ioctl$DRM_IOCTL_GET_MAGIC(r2, 0x80046402, &(0x7f0000000140)=0x100) mount(&(0x7f00000001c0)=ANY=[@ANYBLOB="5b5d3aa5ce6f6b948a8f9ef716bcb820f3313a5d3a0a6c6c62114e3a537fe423464e9320b8676c083a00efc2b97a8daed71464d0f443a7ff0124ab7ccfe07305bdfb57f1f47808b0fae3c22e4fb079f9a66017cd845874cb5d4102ddfacc5df54380c2e1597bbf27c7b8489d8d773979817f95b440e21cdf729c68ed95f0b348f763d43ab3f515e885a8f3546c7b55819bfd48a6d01a93f4a351703bb3ee01"], &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) umount2(&(0x7f0000000040)='./file0\x00', 0x2) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(r3, 0xc0405519, &(0x7f0000000000)={0x8, 0x5, 0x921e, 0x200, 'syz1\x00'}) 16:06:08 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000b4508a)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x400000000009) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x400000, 0x12, r0, 0x0) 16:06:08 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020200090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e0100000001000000000000002402000100f8ffffff0000000200000000030005000000000202004e20e00000010000000000000000"], 0x60}}, 0x0) 16:06:08 executing program 3: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[d::]:\nllbE\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 16:06:08 executing program 0: eventfd(0x7fffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='fdinfo\x00') ioctl$KDADDIO(r0, 0x4b34, 0x1) r1 = syz_genetlink_get_family_id$tipc(&(0x7f00000000c0)='TIPC\x00') sendmsg$TIPC_CMD_SET_NETID(r0, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x440000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x24, r1, 0xf00, 0x70bd26, 0x25dfdbfc, {{}, 0x0, 0x800b, 0x0, {0x8, 0x2, 0x2}}, [""]}, 0x24}, 0x1, 0x0, 0x0, 0x40000}, 0x4000) getdents64(r0, &(0x7f0000000000)=""/60, 0x3c) [ 1011.028449] ceph: device name is missing path (no : separator in [d::]: [ 1011.028449] llbE) [ 1011.058233] ceph: device name is missing path (no : separator in [d::]: [ 1011.058233] llbE) [ 1011.068961] libceph: parse_ips bad ip '[]:¥Îok”Šž÷¼¸ ó1:]: [ 1011.068961] llbN:Sä#FN“ ¸gl' 16:06:08 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020200090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e0100000001000000000000002402000100f8ffffff0000000200000000030005000000000102004e20e00000010000000000000000"], 0x60}}, 0x0) 16:06:08 executing program 1: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) mknod$loop(&(0x7f0000000000)='./file0\x00', 0xc0, 0x1) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[]::]:\nllb:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/mixer\x00', 0x2000, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r0, 0x10e, 0x4, &(0x7f0000000140)=0x800, 0x4) 16:06:08 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='fdinfo\x00') ioctl$sock_netdev_private(r0, 0x89fc, &(0x7f00000010c0)="5fb2addb710ddc8309029f0c1ff2eb250a73153011a36508fd8a477915eda58b5a170f6fab3403c00e9dbcfdce1d7e71fc455604b47e49e52a1c7e76a5137a216619e051d4a99ad7162277144f7f498c8e229095fb3e463b06531b791aaa7e17d54df104692893ca622a0b6b12eb569179a55c69fe4ac4bdfe301567b53402252bf0e0b35b6c7369fc5afe377d7038e6f8ca371b3c8a4d2073470c8502d444e5afb09394e0e53b846913b50993ae618286cea1c0f5796289180084823ea6fd0774c8eef66f3bd0faa69ca41829fe4a7d05fb3aa8941ec4c008741f0ead8a574436f591") write$P9_RLERRORu(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="6664696e666f002a86c40c3e124c2c8082fdffffff46273245f8f0fd22ac142047c57700a2ab82571d8c814abe39958ec08154dfc0b79d795f4e7ec52fcaacc9e66e5467a010e88466f1730129208c8f646fdf7261dc445147cc1ccb3b27dd68f123b44f078361b2db1f70f8f8cd7835bdd05bf957a20f19c45ee8edf617374a619667b823716bb6540454c45b824e679b3331802453b0e5fbc24e7c27490cc02425bffd6994633238905b141a19"], 0x14) getdents64(r0, &(0x7f0000000000)=""/60, 0x3c) write$P9_RRENAME(r0, &(0x7f00000011c0)={0x7, 0x15, 0x7}, 0x7) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f00000000c0)={0xaa, 0x56}) getdents64(r0, &(0x7f00000042c0)=""/4096, 0x1000) ioctl$KVM_IRQ_LINE_STATUS(r0, 0xc008ae67, &(0x7f0000001080)={0x8, 0xfff}) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r0, &(0x7f0000000100)={0xe000000f}) ioctl$RTC_PLL_GET(r0, 0x80207011, &(0x7f0000000080)) r1 = request_key(&(0x7f0000001200)='.dead\x00', &(0x7f0000001240)={'syz', 0x0}, &(0x7f0000001280)='fdinfo\x00', 0xfffffffffffffffc) keyctl$invalidate(0x15, r1) 16:06:08 executing program 3: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[d::]:\nllbE\xff', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) [ 1011.101898] libceph: parse_ips bad ip '[]:¥Îok”Šž÷¼¸ ó1:]: [ 1011.101898] llbN:Sä#FN“ ¸gl' [ 1011.137702] IPVS: ftp: loaded support on port[0] = 21 16:06:08 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000b4508a)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x400000000009) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x4, 0x12, r0, 0x0) 16:06:08 executing program 1: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x2000000000000, 0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) prctl$PR_SET_TSC(0x1a, 0x2) syz_open_dev$vivid(&(0x7f0000000140)='/dev/video#\x00', 0x1, 0x2) mount(&(0x7f0000000340)=ANY=[@ANYBLOB="5b593a3a5d3a0a00000000006313de677ba825f45de2d2139fd7f123100f9ac144b5f19bee2475a6c612b3ef1aba3b62d69ccb63e0b18b16e2acec46d5dcbfbf4db99764411bb27e46b6c4afbd92c65e9199cfdc4493ed8da64bc82881bb5a6277dd2c08b9acde1856c8b2ac4589cf6811bf61d9a5fda041af40d0de382ab8e406d74fa01dda6a54c2925ad1dc9c4f2e9c121ed182b13a615e9b254f8a7f5f95bff2ee9665597ec39783611d10e22d57ae2cccb876baf9c23908b9636fb3298890d2fca430130df2754a80cc19f6b76862ef1360e47a0c5d2a6720027e8ced739b36c57d28fe9eed61"], &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) r0 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x0, 0x2) bind$unix(r0, &(0x7f00000002c0)=@file={0x1, './file0\x00'}, 0x6e) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)) [ 1011.213046] libceph: parse_ips bad ip '[]::]: [ 1011.213046] llb' [ 1011.250977] ceph: device name is missing path (no : separator in [d::]: [ 1011.250977] llbEÿ) [ 1011.297740] ceph: device name is missing path (no : separator in [d::]: [ 1011.297740] llbEÿ) [ 1011.349295] ceph: device name is missing path (no : separator in [Y::]: [ 1011.349295] ) [ 1011.403430] ceph: device name is missing path (no : separator in [Y::]: [ 1011.403430] ) 16:06:09 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, 0x0, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_INFO(r1, 0x29, 0x40, &(0x7f00000000c0)={'security\x00\x00\x00\xfa\x03\x00'}, &(0x7f0000000140)=0x54) 16:06:09 executing program 3: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[d::]:\nllbE\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 16:06:09 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020200090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e0100000001000000000000002402000100f8ffffff0000000200000000030005000040030002004e20e00000010000000000000000"], 0x60}}, 0x0) 16:06:09 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000b4508a)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x400000000009) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x100000000000000, 0x12, r0, 0x0) 16:06:09 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='fdinfo\x00') clock_adjtime(0x5, &(0x7f0000000140)={0xfed, 0x0, 0x7, 0x3, 0x8, 0x100000001, 0x81, 0x0, 0x1, 0x2, 0x8001, 0x101, 0x80000001, 0xb667, 0x7, 0x3d, 0x101, 0x3, 0x35, 0x2, 0x7f, 0x8, 0x1f, 0x9, 0x5, 0xfb}) stat(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x8, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1, 0x18}]}, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) getdents64(r0, &(0x7f0000000000)=""/60, 0x3c) write$FUSE_GETXATTR(r0, &(0x7f0000000240)={0x18, 0x0, 0x6, {0x1}}, 0x18) 16:06:09 executing program 1: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=ANY=[@ANYBLOB="5b5d3a3a5d3a0a6c2b5ab608ac8df2"], &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) mount(&(0x7f0000000040)=@sg0='/dev/sg0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='gfs2meta\x00', 0x80000, &(0x7f00000001c0)='^,selinux*@\x00') [ 1011.789358] ceph: device name is missing path (no : separator in []::]: [ 1011.789358] l+Z¶¬ò) [ 1011.823305] ceph: device name is missing path (no : separator in []::]: [ 1011.823305] l+Z¶¬ò) [ 1011.832683] ceph: device name is missing path (no : separator in [d::]: 16:06:09 executing program 1: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x214100, 0x0) bind(r0, &(0x7f00000001c0)=@ipx={0x4, 0x1, 0xb5b, "6988afab1594", 0x1}, 0x80) chdir(&(0x7f0000000000)='./file0\x00') setxattr$security_evm(&(0x7f0000000140)='./file0\x00', &(0x7f0000000240)='security.evm\x00', &(0x7f0000000280)=@ng={0x4, 0xa, "c6d183b45abe71b7ebb95c0986d6b0"}, 0x11, 0x3) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lseek(r0, 0x0, 0x2) mount(&(0x7f0000000040)=@nullb='[]::]:\nllb:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) [ 1011.832683] llbE) [ 1011.843823] IPVS: ftp: loaded support on port[0] = 21 16:06:09 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020200090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e0100000001000000000000002402000100f8ffffff0000000200000000030005000400000002004e20e00000010000000000000000"], 0x60}}, 0x0) 16:06:09 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000b4508a)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x400000000009) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x4000, 0x12, r0, 0x0) 16:06:09 executing program 1: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x0, 0x2000) r1 = openat$md(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/md0\x00', 0x200, 0x0) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r1) mount(&(0x7f0000000040)=ANY=[@ANYBLOB='ov::]:\nllb:\x00'], &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) [ 1011.933619] libceph: parse_ips bad ip '[]::]: [ 1011.933619] llb' [ 1011.943751] ceph: device name is missing path (no : separator in [d::]: [ 1011.943751] llbE) 16:06:09 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020200090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e0100000001000000000000002402000100f8ffffff0000000200000000030005000800000002004e20e00000010000000000000000"], 0x60}}, 0x0) 16:06:09 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='fdinfo\x00') ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000080)={'veth0_to_bond\x00', {0x2, 0x4e24, @loopback}}) getdents64(r0, &(0x7f0000000000)=""/60, 0x3c) [ 1012.086122] libceph: parse_ips bad ip 'ov::]: [ 1012.086122] llb' 16:06:10 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, 0x0, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_INFO(r1, 0x29, 0x40, &(0x7f00000000c0)={'security\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x02\x00'}, &(0x7f0000000140)=0x54) 16:06:10 executing program 3: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[d::]:\nllbE\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 16:06:10 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000b4508a)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x400000000009) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x8000000000000000, 0x12, r0, 0x0) 16:06:10 executing program 1: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_open_dev$cec(&(0x7f00000001c0)='/dev/cec#\x00', 0x2, 0x2) r0 = fcntl$dupfd(0xffffffffffffff9c, 0x406, 0xffffffffffffff9c) ioctl$TCSBRK(r0, 0x5409, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x40, 0x0) ioctl$sock_inet6_tcp_SIOCATMARK(r1, 0x8905, &(0x7f00000000c0)) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="5b0486f3d5ff86d228e0f81e"], &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) syz_open_dev$dri(&(0x7f0000000140)='/dev/dri/card#\x00', 0x0, 0x2c040) 16:06:10 executing program 0: r0 = epoll_create1(0x7fffd) readahead(r0, 0x3ff, 0x8) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fdinfo\x00') ioctl$KVM_SET_TSC_KHZ(r1, 0xaea2, 0x800) socket$inet6_dccp(0xa, 0x6, 0x0) getdents64(r1, &(0x7f0000000100)=""/60, 0x3c) getsockopt$IP_VS_SO_GET_VERSION(r1, 0x0, 0x480, &(0x7f0000000000), &(0x7f0000000140)=0x40) ioctl$SCSI_IOCTL_PROBE_HOST(r1, 0x5385, &(0x7f0000000180)={0xad, ""/173}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x337) 16:06:10 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020200090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e0100000001000000000000002402000100f8ffffff0000000200000000030005000000000008004e20e00000010000000000000000"], 0x60}}, 0x0) 16:06:10 executing program 1: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x10400, 0x0) accept4$unix(r0, &(0x7f00000001c0), &(0x7f00000000c0)=0x6e, 0x80800) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[]::]:\nllb:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) [ 1012.584025] ceph: device name is missing path (no : separator in [†óÕÿ†Ò(àø) [ 1012.603982] ceph: device name is missing path (no : separator in [d::]: [ 1012.603982] llbE) 16:06:10 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020200090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e0100000001000000000000002402000100f8ffffff000000020000000003000500000000002c004e20e00000010000000000000000"], 0x60}}, 0x0) 16:06:10 executing program 0: r0 = accept(0xffffffffffffffff, &(0x7f0000000080)=@in={0x2, 0x0, @local}, &(0x7f0000000100)=0x80) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0xefce2dd3095da5ca}, 0xc, &(0x7f0000000280)={&(0x7f00000001c0)={0x94, r1, 0x800, 0x70bd2b, 0x25dfdbfd, {}, [@TIPC_NLA_BEARER={0x30, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e23, @remote}}, {0x14, 0x2, @in={0x2, 0x4e24, @local}}}}]}, @TIPC_NLA_NODE={0x30, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x75d}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x9}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x3}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_NET={0x20, 0x7, [@TIPC_NLA_NET_NODEID_W1={0xc}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x3}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x4}]}]}, 0x94}, 0x1, 0x0, 0x0, 0x800}, 0x10) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='fdinfo\x00') getdents64(r2, &(0x7f0000000000)=""/60, 0x3c) syz_open_dev$video4linux(&(0x7f0000000300)='/dev/v4l-subdev#\x00', 0x1, 0x129500) 16:06:10 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000b4508a)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x400000000009) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x2000000, 0x12, r0, 0x0) [ 1012.688919] IPVS: ftp: loaded support on port[0] = 21 [ 1012.728229] ceph: device name is missing path (no : separator in [d::]: [ 1012.728229] llbE) 16:06:10 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020200090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e0100000001000000000000002402000100f8ffffff0000000200000000030005000002000002004e20e00000010000000000000000"], 0x60}}, 0x0) [ 1012.806773] libceph: parse_ips bad ip '[]::]: [ 1012.806773] llb' 16:06:10 executing program 3: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[d::]:\nllbE\x7f', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) [ 1012.858209] libceph: parse_ips bad ip '[]::]: [ 1012.858209] llb' [ 1012.881180] ceph: device name is missing path (no : separator in [d::]: [ 1012.881180] llbE) [ 1013.159745] IPVS: ftp: loaded support on port[0] = 21 16:06:10 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, 0x0, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_INFO(r1, 0x29, 0x40, &(0x7f00000000c0)={'security\x00\x00\x00\x00\x00\x00\xc6\x00'}, &(0x7f0000000140)=0x54) 16:06:10 executing program 0: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r0, 0x0, 0x82, &(0x7f0000000140)={'broute\x00'}, &(0x7f0000000000)=0x78) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fdinfo\x00') getdents64(r1, &(0x7f0000000100)=""/60, 0x414) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r1, 0x84, 0x1b, &(0x7f00000001c0)={0x0, 0x55, "579d4e7f1e16094c5137933847396c54b59b68661961576fa0a1764a99c19c399b6a4af24d6f5f68516dbbbe3a67ae6f7be3861b53454511a1c0392f98a8da771f7df9ff4b446846fb472938704445d56b47886b18"}, &(0x7f0000000240)=0x5d) ustat(0x7f, &(0x7f0000000380)) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000280)={r2, @in={{0x2, 0x4e24, @remote}}, 0x4, 0x4, 0x9, 0x4, 0x42}, &(0x7f0000000340)=0x98) keyctl$set_reqkey_keyring(0xe, 0x1) sendfile(r1, r1, &(0x7f00000003c0), 0x2) ioctl$sock_inet_SIOCSARP(r1, 0x8955, &(0x7f0000000080)={{0x2, 0x4e24, @multicast1}, {0x307, @broadcast}, 0x1a, {0x2, 0x4e24, @multicast2}, 'syzkaller1\x00'}) 16:06:10 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000b4508a)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x400000000009) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x3000000, 0x12, r0, 0x0) 16:06:10 executing program 1: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) socket$inet_tcp(0x2, 0x1, 0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open$dir(&(0x7f0000000300)='./file0\x00', 0x80000000060401, 0x80) mount(&(0x7f00000001c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x880, 0x0) getsockopt$inet_sctp_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f00000000c0), &(0x7f0000000140)=0xb) 16:06:10 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020200090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e0100000001000000000000002402000100f8ffffff0000000200000000030005000008000002004e20e00000010000000000000000"], 0x60}}, 0x0) 16:06:10 executing program 3: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[d::]:\nllbE\xff', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 16:06:10 executing program 1: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x8a04000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[]::]:\nllb:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) [ 1013.270870] libceph: parse_ips bad ip '[]::]:llb' [ 1013.287898] libceph: parse_ips bad ip '[]::]:llb' [ 1013.294669] ceph: device name is missing path (no : separator in [d::]: [ 1013.294669] llbEÿ) 16:06:10 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020200090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e0100000001000000000000002402000100f8ffffff0000000200000000030005000000200002004e20e00000010000000000000000"], 0x60}}, 0x0) 16:06:10 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000b4508a)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x400000000009) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x1e, 0x12, r0, 0x0) [ 1013.330576] IPVS: ftp: loaded support on port[0] = 21 16:06:11 executing program 0: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080)={0x0}, &(0x7f0000000040)=0xc) r1 = syz_open_procfs(r0, &(0x7f0000000100)='net/netstat\x00') getdents64(r1, &(0x7f0000000200)=""/60, 0xfffffffffffffd11) setsockopt$packet_buf(r1, 0x107, 0x7, &(0x7f00000000c0)="6e595285fb081e29e4bd1f4dfc0b3232a28ff2080d79ed5c3b7ee9ad79b9cf3669c716118b2fcbddd3c47484752c8dc3a05bc0cae8e2eb0d494f8a82155c", 0x3e) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f0000000000)={0x30, 0x5, 0x0, {0x0, 0x4, 0xfffffffffffffff9, 0x1}}, 0x30) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r1, 0x29, 0xd3, &(0x7f0000000140)={{0xa, 0x4e24, 0x1, @mcast2, 0x7f}, {0xa, 0x4e23, 0x6, @dev={0xfe, 0x80, [], 0xa}, 0x40}, 0x4, [0x3, 0x3, 0xdd, 0x6, 0x102, 0x1, 0x9]}, 0xfffffffffffffe6e) [ 1013.450179] libceph: parse_ips bad ip '[]::]: [ 1013.450179] llb' 16:06:11 executing program 3: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[d::]:\nllbE\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 16:06:11 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020200090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e0100000001000000000000002402000100f8ffffff0000000200000000030005000000000001004e20e00000010000000000000000"], 0x60}}, 0x0) [ 1013.573055] ceph: device name is missing path (no : separator in [d::]: [ 1013.573055] llbE) [ 1013.800404] IPVS: ftp: loaded support on port[0] = 21 16:06:11 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, 0x0, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_INFO(r1, 0x29, 0x40, &(0x7f00000000c0)={'security\x00\x00\x00\x00\x14\x00'}, &(0x7f0000000140)=0x54) 16:06:11 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000b4508a)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x400000000009) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x1f00000000000000, 0x12, r0, 0x0) 16:06:11 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='fdinfo\x00') ioctl$VIDIOC_ENUMAUDIO(r0, 0xc0345641, &(0x7f0000000100)={0xffffffffffffa456, "90855c6420e998f7abcff5d8c3a2c3b15cf80776058ae2815df7e8ea927df4d2", 0x2, 0x1}) getdents64(r0, &(0x7f0000000000)=""/60, 0x3c) fsetxattr(r0, &(0x7f0000000080)=@known='trusted.overlay.nlink\x00', &(0x7f00000000c0)='posix_acl_access{\\\\selinux.\x15wlan0\x00', 0x22, 0x1) 16:06:11 executing program 3: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[d::]:\nllbE\x06', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 16:06:11 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020200090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e0100000001000000000000002402000100f8ffffff000000020000000003000500007fffffff004e20e00000010000000000000000"], 0x60}}, 0x0) 16:06:11 executing program 3: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[d::]:\nllbE`', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) [ 1013.939935] ceph: device name is missing path (no : separator in [d::]: [ 1013.939935] llbE) [ 1014.058856] ceph: device name is missing path (no : separator in [d::]: [ 1014.058856] llbE`) [ 1014.079521] IPVS: ftp: loaded support on port[0] = 21 [ 1014.090194] ceph: device name is missing path (no : separator in [d::]: [ 1014.090194] llbE`) 16:06:11 executing program 1: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 16:06:11 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='fdinfo\x00') getdents64(r0, &(0x7f0000000000)=""/60, 0x3c) io_setup(0x3ff, &(0x7f0000000080)=0x0) io_cancel(r1, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x3, 0xffffffff, r0, &(0x7f00000000c0)="12173f18291fde92a724f7cb616b5e2c85cfe68925ed604f43c9b48dbd095a931243379a3a77bf9872efc150632e387ad858997bae75a7fa5edcdb510f7967d51b3d9334d37a11c20b26d1796738307068ba95fcabd7e455817a12aad7e34c60a215dd2b0b1f94c2", 0x68, 0x1, 0x0, 0x3, r0}, &(0x7f0000000180)) 16:06:11 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020200090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e0100000001000000000000002402000100f8ffffff000000020000000003000500000000003f004e20e00000010000000000000000"], 0x60}}, 0x0) 16:06:11 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000b4508a)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x400000000009) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x3f00000000000000, 0x12, r0, 0x0) 16:06:11 executing program 3: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[d::]:\nllbE\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) [ 1014.197838] libceph: parse_ips bad ip '[]::]: [ 1014.197838] llb' 16:06:11 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000b4508a)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x400000000009) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x400000000000, 0x12, r0, 0x0) [ 1014.298903] ceph: device name is missing path (no : separator in [d::]: [ 1014.298903] llbE) 16:06:12 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, 0x0, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_INFO(r1, 0x29, 0x40, &(0x7f00000000c0)={'security\x00\x00\x00\x00\x00\x00\x8e\x00'}, &(0x7f0000000140)=0x54) 16:06:12 executing program 3: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[d::]:\nllbE\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 16:06:12 executing program 1: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x10, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x0, 0x18000) fstat(r0, &(0x7f00000001c0)) mount(&(0x7f0000000040)=@nullb='[]::]:\nllb:\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 16:06:12 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020200090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e0100000001000000000000002402000100f8ffffff00000002000000000300050000fffffffd004e20e00000010000000000000000"], 0x60}}, 0x0) 16:06:12 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='fdinfo\x00') getdents64(r0, &(0x7f0000000000)=""/60, 0x3c) symlinkat(&(0x7f0000000080)='./file0\x00', r0, &(0x7f00000000c0)='./file0\x00') ioctl$DRM_IOCTL_AGP_ALLOC(r0, 0xc0206434, &(0x7f0000000100)={0x3, 0x0, 0x10002, 0x5}) ioctl$DRM_IOCTL_AGP_BIND(r0, 0x40106436, &(0x7f0000000140)={r1, 0x1}) 16:06:12 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000b4508a)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x400000000009) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0xfcffffffffff0f00, 0x12, r0, 0x0) [ 1014.587156] ceph: device name is missing path (no : separator in [d::]: [ 1014.587156] llbE) 16:06:12 executing program 3: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[d::]:\nllbE\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) [ 1014.630858] ceph: device name is missing path (no : separator in [d::]: [ 1014.630858] llbE) [ 1014.654332] libceph: parse_ips bad ip '[]::]: [ 1014.654332] llb' [ 1014.668374] IPVS: ftp: loaded support on port[0] = 21 16:06:12 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='fdinfo\x00') getdents64(r0, &(0x7f0000000080)=""/60, 0x3c) 16:06:12 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000b4508a)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x400000000009) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x3f00, 0x12, r0, 0x0) 16:06:12 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020200090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e0100000001000000000000002402000100f8ffffff0000000200000000030005000004000002004e20e00000010000000000000000"], 0x60}}, 0x0) [ 1014.697466] libceph: parse_ips bad ip '[]::]: [ 1014.697466] llb' 16:06:12 executing program 1: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x1001, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[]::]:\nllb:\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 16:06:12 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/igmp6\x00') getdents64(r0, &(0x7f0000000000)=""/60, 0x3c) [ 1014.812498] ceph: device name is missing path (no : separator in [d::]: [ 1014.812498] llbE) [ 1014.949729] libceph: parse_ips bad ip '[]::]: [ 1014.949729] llb' 16:06:12 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, 0x0, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_INFO(r1, 0x29, 0x40, &(0x7f00000000c0)={'security\x00\x00\x00\x00\x00\x00\xa8\x00'}, &(0x7f0000000140)=0x54) 16:06:12 executing program 3: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[d::]:\nllbE\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 16:06:12 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020200090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e0100000001000000000000002402000100f8ffffff0000000200000000030005000000000004004e20e00000010000000000000000"], 0x60}}, 0x0) 16:06:12 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000b4508a)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x400000000009) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x1f00, 0x12, r0, 0x0) 16:06:12 executing program 0: bind$netlink(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x82) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r1, &(0x7f0000000700)=[{&(0x7f0000000740)='\'', 0x1}], 0x1, 0x81806) sendfile(r0, r0, 0x0, 0x1) ioctl$LOOP_CLR_FD(r0, 0x4c01) ioctl$LOOP_SET_FD(r0, 0x4c00, r1) sendfile(r0, r1, 0x0, 0x2) 16:06:12 executing program 1: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x165801, 0x0) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f00000000c0)={0x44, 0x3, 0x2000}, 0x4) mount(&(0x7f0000000040)=@nullb='[]::]:\nllb:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 16:06:13 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020200090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e0100000001000000000000002402000100f8ffffff000000020000000003000500000000000a004e20e00000010000000000000000"], 0x60}}, 0x0) [ 1015.344684] libceph: parse_ips bad ip '[]::]: [ 1015.344684] llb' [ 1015.355369] ceph: device name is missing path (no : separator in [d::]: [ 1015.355369] llbE) [ 1015.374520] ceph: device name is missing path (no : separator in [d::]: [ 1015.374520] llbE) 16:06:13 executing program 3: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[d::]:\nllbE\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 16:06:13 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000b4508a)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x400000000009) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x3, 0x12, r0, 0x0) [ 1015.405321] libceph: parse_ips bad ip '[]::]: [ 1015.405321] llb' [ 1015.432681] IPVS: ftp: loaded support on port[0] = 21 16:06:13 executing program 1: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=ANY=[@ANYBLOB="59e0cf66f64f26b22e7e39572f230529998c779f4a33305ed806d94c93faaf81"], &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x4) 16:06:13 executing program 0: 16:06:13 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020200090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e0100000001000000000000002402000100f8ffffff0000000200000000030005000000000003004e20e00000010000000000000000"], 0x60}}, 0x0) [ 1015.570334] ceph: device name is missing path (no : separator in [d::]: [ 1015.570334] llbE) [ 1015.639955] ceph: device name is missing path (no : separator in YàÏföO&².~9W/#)™ŒwŸJ30^ØÙL“ú¯) [ 1015.676358] ceph: device name is missing path (no : separator in [d::]: [ 1015.676358] llbE) [ 1015.720524] ceph: device name is missing path (no : separator in YàÏföO&².~9W/#)™ŒwŸJ30^ØÙL“ú¯) [ 1015.978963] IPVS: ftp: loaded support on port[0] = 21 16:06:13 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, 0x0, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_INFO(r1, 0x29, 0x40, &(0x7f00000000c0)={'security\x00\x00\x00\x00\x00\x03\x82\x00'}, &(0x7f0000000140)=0x54) 16:06:13 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000b4508a)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x400000000009) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0xffffffffffffc, 0x12, r0, 0x0) 16:06:13 executing program 0: 16:06:13 executing program 1: r0 = syz_open_dev$admmidi(&(0x7f00000003c0)='/dev/admmidi#\x00', 0x2, 0x4000) accept4$packet(0xffffffffffffffff, &(0x7f0000000700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000740)=0x14, 0x80000) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000780)={r1, 0x1, 0x6, @dev={[], 0x12}}, 0x10) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[]::]:\nllb:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000400)='/dev/vga_arbiter\x00', 0x20000, 0x0) syz_open_dev$ndb(&(0x7f0000000440)='/dev/nbd#\x00', 0x0, 0xc0) ioctl$DRM_IOCTL_AGP_ALLOC(r2, 0xc0206434, &(0x7f0000000000)={0x8bd, 0x0, 0x10000, 0x7f0b}) ioctl$DRM_IOCTL_AGP_ALLOC(r2, 0xc0206434, &(0x7f0000000140)={0x40080000000007ff, r3, 0x10000, 0x4}) ioctl$DRM_IOCTL_AGP_FREE(r2, 0x40206435, &(0x7f00000001c0)={0xffffffffffffff6a, r4, 0x0, 0x3}) r5 = semget$private(0x0, 0x3, 0x20) semctl$SEM_STAT(r5, 0x7, 0x12, &(0x7f00000007c0)=""/4096) ioctl$FS_IOC_FIEMAP(r2, 0xc020660b, &(0x7f0000000200)={0x6, 0x0, 0x7, 0xffffffff, 0x7, [{0x8ce6, 0x2, 0x1, 0x0, 0x0, 0x200}, {0x3f, 0xe376, 0x7, 0x0, 0x0, 0x800}, {0x2, 0x1ff, 0xfff}, {0x80, 0xff, 0x4, 0x0, 0x0, 0x2000}, {0x6430, 0x3, 0x20, 0x0, 0x0, 0x108}, {0x1ff, 0x84, 0x5, 0x0, 0x0, 0x8}, {0x3, 0xa1, 0x9, 0x0, 0x0, 0x800}]}) ioctl$SIOCSIFHWADDR(r2, 0x8924, &(0x7f00000000c0)={'ip6gre0\x00', @remote}) 16:06:13 executing program 3: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[d::]:\nllbE\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 16:06:13 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020200090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e0100000001000000000000002402000100f8ffffff0000000200000000030005000010000002004e20e00000010000000000000000"], 0x60}}, 0x0) 16:06:13 executing program 3: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[d::]:\nllbE\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 16:06:13 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-aesni\x00'}, 0x58) setsockopt$ALG_SET_AEAD_AUTHSIZE(r0, 0x117, 0x5, 0x0, 0x0) [ 1016.142507] ceph: device name is missing path (no : separator in [d::]: [ 1016.142507] llbE) [ 1016.163565] libceph: parse_ips bad ip '[]::]: [ 1016.163565] llb' 16:06:13 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020200090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e0100000001000000000000002402000100f8ffffff0000000200000000030005000000040002004e20e00000010000000000000000"], 0x60}}, 0x0) 16:06:13 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000b4508a)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x400000000009) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x300000000000000, 0x12, r0, 0x0) [ 1016.250299] IPVS: ftp: loaded support on port[0] = 21 16:06:13 executing program 3: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[d::]:\nllbE\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) [ 1016.272838] ceph: device name is missing path (no : separator in [d::]: [ 1016.272838] llbE) [ 1016.290011] libceph: parse_ips bad ip '[]::]: [ 1016.290011] llb' 16:06:14 executing program 1: mknod$loop(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r0 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x4, 0x82) bpf$OBJ_GET_MAP(0x7, &(0x7f00000000c0)={&(0x7f0000000040)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$ASHMEM_GET_NAME(r0, 0x81007702, &(0x7f00000001c0)=""/4096) mount(&(0x7f0000000040)=ANY=[], &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000180)='trusted.overlay.redirect\x00', &(0x7f00000011c0)='./file0\x00', 0x8, 0x3) [ 1016.421076] ceph: device name is missing path (no : separator in [d::]: [ 1016.421076] llbE) [ 1016.509571] ceph: device name is missing path (no : separator in ./file0) [ 1016.551916] ceph: device name is missing path (no : separator in ./file0) [ 1016.788863] IPVS: ftp: loaded support on port[0] = 21 16:06:14 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, 0x0, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_INFO(r1, 0x29, 0x40, &(0x7f00000000c0)={'security\x00\x00\x00\xf4\x00'}, &(0x7f0000000140)=0x54) 16:06:14 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020200090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e0100000001000000000000002402000100f8ffffff0000000200000000030005000000080002004e20e00000010000000000000000"], 0x60}}, 0x0) 16:06:14 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000b4508a)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x400000000009) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x1f000000, 0x12, r0, 0x0) 16:06:14 executing program 3: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[d::]:\nllbE\x02', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 16:06:14 executing program 0: socket$inet_tcp(0x2, 0x1, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x2102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000100)=@nbd={'/dev/nbd'}, &(0x7f0000001640)='./file0\x00', &(0x7f0000000040)='gfs2meta\x00', 0x0, 0x0) 16:06:14 executing program 1: clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000680)) r0 = socket(0x9, 0x800, 0x1) getsockname$tipc(r0, &(0x7f0000000740)=@id, &(0x7f0000000780)=0x10) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000006c0)={0x0}, &(0x7f0000000700)=0xc) r2 = getpgrp(r1) waitid(0x1, r2, 0x0, 0x40000000, &(0x7f00000001c0)) r3 = syz_open_dev$amidi(&(0x7f0000000340)='/dev/amidi#\x00', 0xbe81, 0x80) ioctl$VHOST_SET_VRING_BASE(r3, 0x4008af12, &(0x7f0000000380)={0x3, 0x3}) r4 = shmget(0x1, 0x3000, 0x400, &(0x7f0000ffd000/0x3000)=nil) shmctl$SHM_STAT(r4, 0xd, &(0x7f0000000500)=""/252) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="5b5d3a3a5d3a0a876c623a00"], &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) setxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000600)=@known='trusted.overlay.opaque\x00', &(0x7f0000000640)='eth1nodevppp1', 0xd, 0x3) r5 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x43, 0x0) prctl$PR_SET_DUMPABLE(0x4, 0x2) getsockopt$IP_VS_SO_GET_SERVICES(r5, 0x0, 0x482, &(0x7f0000000280)=""/176, &(0x7f0000000140)=0xb0) fgetxattr(r3, &(0x7f00000003c0)=@known='user.syz\x00', &(0x7f0000000400)=""/247, 0xf7) unlinkat(r5, &(0x7f00000000c0)='./file0\x00', 0x0) 16:06:14 executing program 0: socket$inet_tcp(0x2, 0x1, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x2102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000100)=@nbd={'/dev/nbd'}, &(0x7f0000001640)='./file0\x00', &(0x7f0000000040)='gfs2meta\x00', 0x0, 0x0) 16:06:14 executing program 1: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="5b5d3a3a5d3a0a6c5e65fd65"], &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) [ 1016.952934] gfs2: path_lookup on /dev/nbd returned error -2 [ 1016.977550] ceph: device name is missing path (no : separator in [d::]: [ 1016.977550] llbE) 16:06:14 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020200090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e0100000001000000000000002402000100f8ffffff0000000200000000030005000000020002004e20e00000010000000000000000"], 0x60}}, 0x0) [ 1017.059157] IPVS: ftp: loaded support on port[0] = 21 16:06:14 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000b4508a)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x400000000009) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x1e000000, 0x12, r0, 0x0) 16:06:14 executing program 0: socket$inet_tcp(0x2, 0x1, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x2102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000100)=@nbd={'/dev/nbd'}, &(0x7f0000001640)='./file0\x00', &(0x7f0000000040)='gfs2meta\x00', 0x0, 0x0) [ 1017.089371] gfs2: path_lookup on /dev/nbd returned error -2 16:06:14 executing program 1: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=ANY=[@ANYBLOB], &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) [ 1017.264043] gfs2: path_lookup on /dev/nbd returned error -2 16:06:15 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, 0x0, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_INFO(r1, 0x29, 0x40, &(0x7f00000000c0)={'security\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\xa0\x00'}, &(0x7f0000000140)=0x54) 16:06:15 executing program 3: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[d::]:\nllbE\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 16:06:15 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020200090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e0100000001000000000000002402000100f8ffffff0000000200000000030005000000100002004e20e00000010000000000000000"], 0x60}}, 0x0) 16:06:15 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000b4508a)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x400000000009) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x3f000000, 0x12, r0, 0x0) 16:06:15 executing program 1: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0xa, &(0x7f00000001c0)=[{0x7fffffff, 0x5, 0x9, 0x7fffffff}, {0x7fffffff, 0x1, 0x7, 0x3}, {0x6, 0x401, 0x3, 0x401}, {0x4, 0x2, 0x1, 0x1000}, {0xcc9, 0x1f, 0x7, 0x10001}, {0x8, 0x1, 0x3, 0x8001}, {0x81, 0x7763f40e, 0x10001, 0x4}, {0x100000000, 0xe81, 0x5, 0x81}, {0x2462, 0x0, 0x8, 0x1}, {0x3, 0x5, 0x57c, 0x9}]}) 16:06:15 executing program 0: socket$inet_tcp(0x2, 0x1, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x2102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000100)=@nbd={'/dev/nbd'}, &(0x7f0000001640)='./file0\x00', &(0x7f0000000040)='gfs2meta\x00', 0x0, 0x0) 16:06:15 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020200090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e0100000001000000000000002402000100f8ffffff0000000200000000030005000000002002004e20e00000010000000000000000"], 0x60}}, 0x0) [ 1017.636917] gfs2: path_lookup on /dev/nbd returned error -2 [ 1017.640066] ceph: device name is missing path (no : separator in [d::]: [ 1017.640066] llbE) 16:06:15 executing program 0: socket$inet_tcp(0x2, 0x1, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000100)=@nbd={'/dev/nbd'}, &(0x7f0000001640)='./file0\x00', &(0x7f0000000040)='gfs2meta\x00', 0x0, 0x0) 16:06:15 executing program 3: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[d::]:\nllbE\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 16:06:15 executing program 1: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$key(0xf, 0x3, 0x2) r0 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x2, 0x2) ioctl$KDSIGACCEPT(r0, 0x4b4e, 0x0) readahead(r0, 0x0, 0x6) mount(&(0x7f00000002c0)=ANY=[@ANYBLOB="5b03c95d3a3a5d3a0a6c6c623a00a76ab611f13fbce0f57ff9fc769d2ed3ea957cb216fdace8b451bce8a7c5810c0da8cc65e458187fc38f72b5e90e18f0478602d1438ba86477da3330b7d5e31b3b85e2b9c5812ef6329b9762e9a6a50cb16887e5e1c42fcd5d7be0d0fcd03e3568eb7a8d9c576b3abade751d428b0863b7ccc9e616eb0674d406ded93ea64e33ef1ac646c457c84ad2a7bcaa663775632dd38d252d2d6e48170970b8b7dcb9e781e2d278478b2626e35b4b7b63caacb968bf347b5472c02415926083ac1f2b8548c2fb01dd470c3e5b7c5e88501cadfbb2167951945ae7efaee0bc57a4"], &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(r0, 0xc0045540, &(0x7f0000000040)=0x4550) [ 1017.732463] IPVS: ftp: loaded support on port[0] = 21 16:06:15 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000b4508a)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x400000000009) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x2, 0x12, r0, 0x0) [ 1017.784584] ceph: device name is missing path (no : separator in [d::]: [ 1017.784584] llbE) 16:06:15 executing program 3: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[d::]:\nllbE\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) [ 1017.829386] gfs2: path_lookup on /dev/nbd returned error -2 [ 1017.854047] libceph: parse_ips bad ip '[É]::]: [ 1017.854047] llb' [ 1017.968161] ceph: device name is missing path (no : separator in [d::]: [ 1017.968161] llbE) [ 1018.021803] ceph: device name is missing path (no : separator in [d::]: [ 1018.021803] llbE) 16:06:15 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, 0x0, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_INFO(r1, 0x29, 0x40, &(0x7f00000000c0)={'security\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x10\x00'}, &(0x7f0000000140)=0x54) 16:06:15 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020200090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e0100000001000000000000002402000100f8ffffff0000000200000000030005000000000802004e20e00000010000000000000000"], 0x60}}, 0x0) 16:06:15 executing program 1: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff5, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=ANY=[@ANYBLOB="5b5d3a3a5d3a0a6c6c62331c20ce873fa6000000000000000000"], &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 16:06:15 executing program 0: socket$inet_tcp(0x2, 0x1, 0x0) clone(0x2102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000100)=@nbd={'/dev/nbd'}, &(0x7f0000001640)='./file0\x00', &(0x7f0000000040)='gfs2meta\x00', 0x0, 0x0) 16:06:15 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000b4508a)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x400000000009) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x400000000000000, 0x12, r0, 0x0) 16:06:15 executing program 3: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[d::]:\nllbE\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 16:06:16 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x2102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000100)=@nbd={'/dev/nbd'}, &(0x7f0000001640)='./file0\x00', &(0x7f0000000040)='gfs2meta\x00', 0x0, 0x0) 16:06:16 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020200090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e0100000001000000000000002402000100f8ffffff000000020000000003000500000000000a004e20e00000010000000000000000"], 0x60}}, 0x0) [ 1018.376517] ceph: device name is missing path (no : separator in [d::]: [ 1018.376517] llbE) [ 1018.393769] ceph: device name is missing path (no : separator in []::]: [ 1018.393769] llb3 ·?¦) 16:06:16 executing program 3: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[d::]:\nllbE\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 16:06:16 executing program 1: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x80, 0xffffffffffffffff) clone(0x79a692c652fa8a66, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[]::]:\nllb:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 16:06:16 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000b4508a)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x400000000009) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x1000000, 0x12, r0, 0x0) [ 1018.509677] IPVS: ftp: loaded support on port[0] = 21 [ 1018.534016] libceph: parse_ips bad ip '[]::]: [ 1018.534016] llb' [ 1018.547904] gfs2: path_lookup on /dev/nbd returned error -2 [ 1018.568672] ceph: device name is missing path (no : separator in [d::]: [ 1018.568672] llbE) 16:06:16 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020200090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e0100000001000000000000002402000100f8ffffff000000020000000003000500000000003f004e20e00000010000000000000000"], 0x60}}, 0x0) [ 1018.600564] ceph: device name is missing path (no : separator in [d::]: [ 1018.600564] llbE) [ 1018.989953] IPVS: ftp: loaded support on port[0] = 21 16:06:16 executing program 1: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x511000, 0x0) getsockopt$inet_sctp_SCTP_RECVNXTINFO(r0, 0x84, 0x21, &(0x7f00000000c0), &(0x7f0000000140)=0x4) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[]::]:\nllb:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 16:06:16 executing program 3: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[d::]:\nllbE\xc0', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 16:06:16 executing program 0: socket$inet_tcp(0x2, 0x1, 0x0) mkdir(0x0, 0x0) clone(0x2102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000100)=@nbd={'/dev/nbd'}, &(0x7f0000001640)='./file0\x00', &(0x7f0000000040)='gfs2meta\x00', 0x0, 0x0) 16:06:16 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000b4508a)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x400000000009) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x4000000, 0x12, r0, 0x0) 16:06:16 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, 0x0, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_INFO(r1, 0x29, 0x40, &(0x7f00000000c0)={'security\x00\x00\x00\x00\x00\x00\x8a\x00'}, &(0x7f0000000140)=0x54) 16:06:16 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020200090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e0100000001000000000000002402000100f8ffffff0000000200000000030005000000000003004e20e00000010000000000000000"], 0x60}}, 0x0) 16:06:16 executing program 0: socket$inet_tcp(0x2, 0x1, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000100)=@nbd={'/dev/nbd'}, &(0x7f0000001640)='./file0\x00', &(0x7f0000000040)='gfs2meta\x00', 0x0, 0x0) 16:06:16 executing program 3: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[d::]:\nllbE\xf0', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) [ 1019.096561] ceph: device name is missing path (no : separator in [d::]: [ 1019.096561] llbEÀ) [ 1019.103061] libceph: parse_ips bad ip '[]::]: [ 1019.103061] llb' 16:06:16 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020200090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e0100000001000000000000002402000100f8ffffff000000020000000003000500000000002c004e20e00000010000000000000000"], 0x60}}, 0x0) 16:06:16 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000b4508a)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x400000000009) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x0, 0x12, r0, 0x4) [ 1019.193616] IPVS: ftp: loaded support on port[0] = 21 [ 1019.210098] gfs2: path_lookup on /dev/nbd returned error -2 16:06:16 executing program 1: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000180)=ANY=[@ANYBLOB="5b5d3a3a553a0a6c18385e6b7de46c623a00"], &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) r0 = syz_open_dev$media(&(0x7f00000000c0)='/dev/media#\x00', 0x0, 0x402003) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r0, 0xc0045516, &(0x7f0000000140)=0x2) [ 1019.272013] ceph: device name is missing path (no : separator in [d::]: [ 1019.272013] llbEð) 16:06:16 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000b4508a)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x400000000009) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x0, 0x12, r0, 0x3000000) 16:06:17 executing program 0: socket$inet_tcp(0x2, 0x1, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x2102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000001640)='./file0\x00', &(0x7f0000000040)='gfs2meta\x00', 0x0, 0x0) 16:06:17 executing program 3: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[d::]:\nllbE\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 16:06:17 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020200090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e0100000001000000000000002402000100f8ffffff0000000200000000030005000000000202004e20e00000010000000000000000"], 0x60}}, 0x0) 16:06:17 executing program 0: socket$inet_tcp(0x2, 0x1, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x2102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000100)=@nbd={'/dev/nbd'}, 0x0, &(0x7f0000000040)='gfs2meta\x00', 0x0, 0x0) [ 1019.905813] IPVS: ftp: loaded support on port[0] = 21 16:06:17 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, 0x0, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_INFO(r1, 0x29, 0x40, &(0x7f00000000c0)={'security\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000140)=0x54) 16:06:17 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000b4508a)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x400000000009) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x0, 0x12, r0, 0x3f000000) 16:06:17 executing program 0: socket$inet_tcp(0x2, 0x1, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x2102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000100)=@nbd={'/dev/nbd'}, &(0x7f0000001640)='./file0\x00', 0x0, 0x0, 0x0) 16:06:17 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020200090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e0100000001000000000000002402000100f8ffffff0000000200000000030005000000001002004e20e00000010000000000000000"], 0x60}}, 0x0) 16:06:17 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000b4508a)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x400000000009) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x0, 0x12, r0, 0x400000) [ 1020.233889] IPVS: ftp: loaded support on port[0] = 21 16:06:17 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x800000000009031, 0xffffffffffffffff, 0x0) 16:06:18 executing program 1: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=ANY=[@ANYBLOB='S]::]:\nllb:\x00'], &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 16:06:18 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020200090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e0100000001000000000000002402000100f8ffffff0000000200000000030005000000000402004e20e00000010000000000000000"], 0x60}}, 0x0) 16:06:18 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000b4508a)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x400000000009) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x0, 0x12, r0, 0x200000000000000) [ 1020.609415] IPVS: ftp: loaded support on port[0] = 21 16:06:18 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000b4508a)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x400000000009) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x0, 0x12, r0, 0x1f00) 16:06:18 executing program 0: socket$packet(0x11, 0x3, 0x300) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) connect$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @multicast2}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x40000000000037b, 0x0) 16:06:18 executing program 3: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[d::]:\nllbE\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) [ 1021.019619] IPVS: ftp: loaded support on port[0] = 21 [ 1021.082418] IPVS: ftp: loaded support on port[0] = 21 [ 1022.851671] bridge0: port 1(bridge_slave_0) entered blocking state [ 1022.858244] bridge0: port 1(bridge_slave_0) entered disabled state [ 1022.887530] device bridge_slave_0 entered promiscuous mode [ 1022.929685] bridge0: port 1(bridge_slave_0) entered blocking state [ 1022.936170] bridge0: port 1(bridge_slave_0) entered disabled state [ 1022.944575] device bridge_slave_0 entered promiscuous mode [ 1022.998961] bridge0: port 2(bridge_slave_1) entered blocking state [ 1023.005997] bridge0: port 2(bridge_slave_1) entered disabled state [ 1023.017881] device bridge_slave_1 entered promiscuous mode [ 1023.040510] bridge0: port 2(bridge_slave_1) entered blocking state [ 1023.070851] bridge0: port 2(bridge_slave_1) entered disabled state [ 1023.085148] device bridge_slave_1 entered promiscuous mode [ 1023.100226] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1023.208676] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1023.217706] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1023.336142] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1023.528180] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1023.610523] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1023.645355] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1023.704317] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 1023.728542] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1023.776873] bond0: Enslaving bond_slave_1 as an active interface with an up link 16:06:21 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020200090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e0100000001000000000000002402000100f8ffffff0000000200000000030005000000000008004e20e00000010000000000000000"], 0x60}}, 0x0) 16:06:21 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000b4508a)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x400000000009) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x0, 0x12, r0, 0x2) 16:06:21 executing program 0: r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) quotactl(0x0, 0x0, 0x0, &(0x7f0000000080)) 16:06:21 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, 0x0, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_INFO(r1, 0x29, 0x40, &(0x7f00000000c0)={'security\x00\x00\x00\x00\x00\x00\xa4\x00'}, &(0x7f0000000140)=0x54) 16:06:21 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020200090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e0100000001000000000000002402000100f8ffffff000000020000000003000500000000002c004e20e00000010000000000000000"], 0x60}}, 0x0) [ 1024.103975] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1024.126872] team0: Port device team_slave_0 added 16:06:21 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000b4508a)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x400000000009) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x0, 0x12, r0, 0x300000000000000) [ 1024.191275] IPVS: ftp: loaded support on port[0] = 21 [ 1024.354448] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1024.363360] team0: Port device team_slave_1 added [ 1024.404642] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1024.428195] team0: Port device team_slave_0 added [ 1024.498574] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 1024.506738] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1024.521252] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1024.532874] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1024.558444] team0: Port device team_slave_1 added [ 1024.642097] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 1024.657041] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1024.668797] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1024.679542] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 1024.686399] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1024.695456] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1024.734415] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1024.742972] IPVS: ftp: loaded support on port[0] = 21 [ 1024.748767] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1024.756762] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1024.798733] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 1024.805915] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1024.820837] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1024.868955] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1024.876116] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1024.888860] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1024.934136] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1024.947826] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1024.955855] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1025.070364] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1025.084398] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1025.095974] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1026.073693] bridge0: port 2(bridge_slave_1) entered blocking state [ 1026.080137] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1026.086824] bridge0: port 1(bridge_slave_0) entered blocking state [ 1026.093263] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1026.138625] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 1026.278486] bridge0: port 2(bridge_slave_1) entered blocking state [ 1026.284894] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1026.291641] bridge0: port 1(bridge_slave_0) entered blocking state [ 1026.298064] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1026.328339] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 1026.497485] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1026.504882] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1028.429752] device bridge_slave_1 left promiscuous mode [ 1028.435313] bridge0: port 2(bridge_slave_1) entered disabled state [ 1028.445645] device bridge_slave_0 left promiscuous mode [ 1028.456458] bridge0: port 1(bridge_slave_0) entered disabled state [ 1028.465843] device bridge_slave_1 left promiscuous mode [ 1028.471467] bridge0: port 2(bridge_slave_1) entered disabled state [ 1028.478748] device bridge_slave_0 left promiscuous mode [ 1028.484170] bridge0: port 1(bridge_slave_0) entered disabled state [ 1028.538787] team0 (unregistering): Port device team_slave_1 removed [ 1028.550638] team0 (unregistering): Port device team_slave_0 removed [ 1028.560584] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1028.574875] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1028.606238] bond0 (unregistering): Released all slaves [ 1028.633151] team0 (unregistering): Port device team_slave_1 removed [ 1028.644663] team0 (unregistering): Port device team_slave_0 removed [ 1028.656384] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1028.668125] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1028.696301] bond0 (unregistering): Released all slaves [ 1029.707986] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1030.045120] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1030.054638] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1030.306856] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1030.412889] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 1030.426302] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1030.443348] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1030.619268] 8021q: adding VLAN 0 to HW filter on device team0 [ 1030.669606] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 1030.675791] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1030.685947] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1030.938575] 8021q: adding VLAN 0 to HW filter on device team0 16:06:29 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020200090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e0100000001000000000000002402000100f8ffffff0000000200000000030005000000000004004e20e00000010000000000000000"], 0x60}}, 0x0) 16:06:29 executing program 0: bind$netlink(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x82) ioctl$LOOP_SET_FD(r0, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_SET_BLOCK_SIZE(r0, 0x4c09, 0x8e) 16:06:29 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000b4508a)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x400000000009) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x0, 0x12, r0, 0xfcffffffffff0f00) [ 1032.052738] libceph: parse_ips bad ip 'S]::]: [ 1032.052738] llb' [ 1032.059777] libceph: parse_ips bad ip 'S]::]: [ 1032.059777] llb' 16:06:29 executing program 3: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[d::]:\nllbE\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 16:06:29 executing program 1: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) getrusage(0xffffffffffffffff, &(0x7f0000000480)) clone(0x40000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f00000001c0)=@loop={'/dev/loop', 0x0}, &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='btrfs\x00', 0x8040, 0x0) r0 = accept4$inet6(0xffffffffffffff9c, &(0x7f0000000040)={0xa, 0x0, 0x0, @dev}, &(0x7f0000000080)=0x1c, 0x80000) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000300)={{{@in=@broadcast, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in6=@local}}, &(0x7f00000000c0)=0xe8) sendto(r0, &(0x7f0000000200)="97c34ef1521f077683c63e0df29757222b6337e5a38062544da27c09659f05278b6b9430c7c891fa4a242495b46a9a3448a51956c300ba3a9eaad72bf5827a49c7463ba2750140f9f47488a7b74addd8df677a33b354f8baa1de0939d061b8922bd8c06fac647d32bfb8212e5a7b4d54af5f70eb84e7cd949d4113981bb01d80be913015c5d6ffdbaf1dd77d8a77d37efab1b86d0b0bd9337ed14cf182450d78e77fdab5668d4b2d3eb6caf3b50a5b22b1cc76ff1947ee9618805c951153e20a771dea94a628ec018361f064f85413219b8bec2365ba6c8c20ffbdfc7f3901b8a8af2906940ac8251a153666e65f98a7dcbf407c3298fb", 0xf7, 0x24000040, &(0x7f0000000400)=@xdp={0x2c, 0x5, r1, 0x12}, 0x80) 16:06:29 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, 0x0, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_INFO(r1, 0x29, 0x40, &(0x7f00000000c0)={'security\x00\x00\x00\x00\x00\x02\x04\x00'}, &(0x7f0000000140)=0x54) 16:06:29 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'syz_tun\x00'}) sendmsg$nl_route(r1, &(0x7f0000000240)={&(0x7f0000000000), 0xc, &(0x7f0000000200)={&(0x7f0000000180)=ANY=[@ANYBLOB="000002000a000200aaaaaa09aaaa0000"], 0x1}}, 0x0) 16:06:29 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020200090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e0100000001000000000000002402000100f8ffffff000000020000000003000500000000000a004e20e00000010000000000000000"], 0x60}}, 0x0) 16:06:29 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000b4508a)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x400000000009) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x0, 0x12, r0, 0x400000000000000) [ 1032.287117] ceph: device name is missing path (no : separator in [d::]: [ 1032.287117] llbE) [ 1032.296541] ceph: device name is missing path (no : separator in [d::]: [ 1032.296541] llbE) 16:06:30 executing program 0: 16:06:30 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000b4508a)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x400000000009) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x0, 0x12, r0, 0x3f00) 16:06:30 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020200090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e0100000001000000000000002402000100f8ffffff0000000200000000030005000000000003004e20e00000010000000000000000"], 0x60}}, 0x0) [ 1032.383094] IPVS: ftp: loaded support on port[0] = 21 [ 1032.389540] IPVS: ftp: loaded support on port[0] = 21 16:06:30 executing program 3: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[d::]:\nllbE\xff', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) [ 1032.480438] ceph: device name is missing path (no : separator in [d::]: [ 1032.480438] llbE) [ 1032.493612] ceph: device name is missing path (no : separator in [d::]: [ 1032.493612] llbE) 16:06:30 executing program 0: 16:06:30 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020200090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e0100000001000000000000002402000100f8ffffff0000000200000000030005000000000002104e20e00000010000000000000000"], 0x60}}, 0x0) 16:06:30 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000b4508a)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x400000000009) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x0, 0x12, r0, 0x100000000000000) [ 1032.571946] ceph: device name is missing path (no : separator in [d::]: [ 1032.571946] llbEÿ) [ 1032.623579] ceph: device name is missing path (no : separator in [d::]: [ 1032.623579] llbEÿ) [ 1032.816055] IPVS: ftp: loaded support on port[0] = 21 16:06:30 executing program 1: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x800, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[]::]:\nllb:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) [ 1032.949579] libceph: parse_ips bad ip '[]::]: [ 1032.949579] llb' [ 1032.957896] libceph: parse_ips bad ip '[]::]: [ 1032.957896] llb' 16:06:30 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, 0x0, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_INFO(r1, 0x29, 0x40, &(0x7f00000000c0)={'security\x00\x00\x00V\x01\x00'}, &(0x7f0000000140)=0x54) 16:06:30 executing program 3: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[d::]:\nllbE\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 16:06:30 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020200090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e0100000001000000000000002402000100f8ffffff0000000200000000030005000000000002044e20e00000010000000000000000"], 0x60}}, 0x0) 16:06:30 executing program 0 (fault-call:3 fault-nth:0): socket$inet_tcp(0x2, 0x1, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x2102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000100)=@nbd={'/dev/nbd'}, &(0x7f0000001640)='./file0\x00', &(0x7f0000000040)='gfs2meta\x00', 0x0, 0x0) 16:06:30 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000b4508a)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x400000000009) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x0, 0x12, r0, 0x1f000000) 16:06:30 executing program 1: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) write$smack_current(r0, &(0x7f0000000000)='\x00', 0x1) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[]::]:\nllb:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) [ 1033.053523] ceph: device name is missing path (no : separator in [d::]: [ 1033.053523] llbE) [ 1033.069560] libceph: parse_ips bad ip '[]::]: [ 1033.069560] llb' [ 1033.085678] FAULT_INJECTION: forcing a failure. [ 1033.085678] name failslab, interval 1, probability 0, space 0, times 0 16:06:30 executing program 3: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[d::]:\nllbE\xff', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 16:06:30 executing program 1: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x200, 0x0) ioctl$TUNGETIFF(r0, 0x800454d2, &(0x7f00000000c0)) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2(&(0x7f00000002c0)={0xffffffffffffffff}, 0x0) mount(&(0x7f0000000000)=ANY=[@ANYBLOB="5b5d3a0a6c6c9f645270ffbdf481623a10000800"], &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={0xffffffffffffffff, r0, 0x0, 0x5, &(0x7f0000000140)='ceph\x00'}, 0x30) fstat(r0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$sock_bt_hidp_HIDPCONNDEL(r1, 0x400448c9, &(0x7f0000000300)={{0xcd9, 0x8, 0x401, 0x4, 0x1, 0x8}, 0x2}) ioctl$DRM_IOCTL_GET_CLIENT(r0, 0xc0286405, &(0x7f0000000280)={0xfffffffffffff801, 0x3, r2, 0x0, r3, 0x0, 0x4, 0x8}) 16:06:30 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000b4508a)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x400000000009) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x0, 0x12, r0, 0x4000) [ 1033.099181] IPVS: ftp: loaded support on port[0] = 21 16:06:30 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020200090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e0100000001000000000000002402000100f8ffffff0000000200000000030005000000000002084e20e00000010000000000000000"], 0x60}}, 0x0) [ 1033.199396] ceph: device name is missing path (no : separator in []: [ 1033.199396] llŸdRpÿ½ôb:) [ 1033.202428] ceph: device name is missing path (no : separator in [d::]: [ 1033.202428] llbEÿ) [ 1033.243382] CPU: 0 PID: 17599 Comm: syz-executor0 Not tainted 4.20.0-rc7+ #381 [ 1033.250789] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1033.260162] Call Trace: [ 1033.262771] dump_stack+0x244/0x39d [ 1033.266429] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1033.271658] should_fail.cold.4+0xa/0x17 [ 1033.275740] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1033.276285] ceph: device name is missing path (no : separator in [d::]: [ 1033.276285] llbEÿ) [ 1033.280867] ? __f_unlock_pos+0x19/0x20 [ 1033.280888] ? lock_downgrade+0x900/0x900 [ 1033.280911] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1033.280945] ? proc_fail_nth_write+0x9e/0x210 [ 1033.280985] ? find_held_lock+0x36/0x1c0 [ 1033.281028] ? perf_trace_sched_process_exec+0x860/0x860 [ 1033.281043] ? __lock_is_held+0xb5/0x140 [ 1033.281085] __should_failslab+0x124/0x180 [ 1033.293811] should_failslab+0x9/0x14 [ 1033.293830] __kmalloc_track_caller+0x2d1/0x760 [ 1033.293851] ? strncpy_from_user+0x5a0/0x5a0 [ 1033.303524] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1033.303544] ? strndup_user+0x77/0xd0 [ 1033.303567] memdup_user+0x2c/0xa0 [ 1033.312114] strndup_user+0x77/0xd0 [ 1033.312136] ksys_mount+0x3c/0x140 [ 1033.312158] __x64_sys_mount+0xbe/0x150 [ 1033.312180] do_syscall_64+0x1b9/0x820 [ 1033.321683] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1033.321705] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1033.321721] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1033.321741] ? trace_hardirqs_on_caller+0x310/0x310 [ 1033.321761] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1033.334453] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1033.366821] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1033.366850] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1033.366864] RIP: 0033:0x457669 [ 1033.366885] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1033.397033] RSP: 002b:00007f934afb1c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 16:06:31 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020200090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e0100000001000000000000002402000100f8ffffff0000000200000000030005000000000002024e20e00000010000000000000000"], 0x60}}, 0x0) 16:06:31 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000b4508a)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x400000000009) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x0, 0x12, r0, 0x400000000000) [ 1033.397050] RAX: ffffffffffffffda RBX: 00007f934afb1c90 RCX: 0000000000457669 [ 1033.397060] RDX: 0000000020000040 RSI: 0000000020001640 RDI: 0000000020000100 [ 1033.397071] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1033.397081] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f934afb26d4 [ 1033.397091] R13: 00000000004c2de4 R14: 00000000004d51a8 R15: 0000000000000004 [ 1033.475676] ceph: device name is missing path (no : separator in []: [ 1033.475676] llŸdRpÿ½ôb:) [ 1033.724226] IPVS: ftp: loaded support on port[0] = 21 16:06:31 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, 0x0, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_INFO(r1, 0x29, 0x40, &(0x7f00000000c0)={'security\x00\x00\x00\x84\x02\x00'}, &(0x7f0000000140)=0x54) 16:06:31 executing program 1: r0 = accept$packet(0xffffffffffffff9c, 0x0, &(0x7f0000000000)) recvfrom(r0, &(0x7f00000001c0)=""/4096, 0x1000, 0x2, 0x0, 0x0) r1 = open(&(0x7f0000000140)='./file0\x00', 0x420000, 0x1) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffff9c, 0x84, 0x77, &(0x7f0000000180)={0x0, 0x9, 0x6, [0x7f, 0x40, 0x101, 0x1, 0x3ff, 0x2]}, &(0x7f00000011c0)=0x14) setsockopt$inet_sctp_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f0000001200)={r2, 0x5, 0x1}, 0x10) mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x220, 0x0) clone(0x2102001ff1, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[]::]:\nllb:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 16:06:31 executing program 3: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[d::]:\nllbE\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 16:06:31 executing program 0 (fault-call:3 fault-nth:1): socket$inet_tcp(0x2, 0x1, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x2102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000100)=@nbd={'/dev/nbd'}, &(0x7f0000001640)='./file0\x00', &(0x7f0000000040)='gfs2meta\x00', 0x0, 0x0) 16:06:31 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020200090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e0100000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000000300000000000000"], 0x60}}, 0x0) 16:06:31 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000b4508a)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x400000000009) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x0, 0x12, r0, 0x1f00000000000000) 16:06:31 executing program 3: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[d::]:\nllbE\x03', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) [ 1033.881616] ceph: device name is missing path (no : separator in [d::]: [ 1033.881616] llbE) [ 1033.886734] FAULT_INJECTION: forcing a failure. [ 1033.886734] name failslab, interval 1, probability 0, space 0, times 0 [ 1033.892633] libceph: parse_ips bad ip '[]::]: [ 1033.892633] llb' 16:06:31 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000b4508a)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x400000000009) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x0, 0x12, r0, 0x4000000) [ 1033.943160] CPU: 1 PID: 17643 Comm: syz-executor0 Not tainted 4.20.0-rc7+ #381 [ 1033.950557] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1033.959911] Call Trace: [ 1033.962581] dump_stack+0x244/0x39d [ 1033.966237] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1033.971474] should_fail.cold.4+0xa/0x17 [ 1033.975589] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1033.980712] ? save_stack+0x43/0xd0 [ 1033.980729] ? kasan_kmalloc+0xc7/0xe0 [ 1033.980748] ? __kmalloc_track_caller+0x157/0x760 [ 1033.993092] ? memdup_user+0x2c/0xa0 [ 1033.996829] ? do_syscall_64+0x1b9/0x820 [ 1033.996846] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1033.996867] ? proc_fail_nth_write+0x9e/0x210 [ 1034.010777] ? find_held_lock+0x36/0x1c0 [ 1034.011162] libceph: parse_ips bad ip '[]::]: [ 1034.011162] llb' [ 1034.014873] ? perf_trace_sched_process_exec+0x860/0x860 [ 1034.014893] ? lock_release+0xa00/0xa00 [ 1034.014918] ? perf_trace_sched_process_exec+0x860/0x860 [ 1034.036109] __should_failslab+0x124/0x180 16:06:31 executing program 1: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="5b5d680302074cc5be6d3800"], &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) getresuid(&(0x7f0000000140), &(0x7f00000001c0), &(0x7f0000000200)=0x0) lsetxattr$security_capability(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.capability\x00', &(0x7f0000000240)=@v3={0x3000000, [{0x9, 0x3baff618}, {0x1f, 0x1}], r0}, 0x18, 0x1) 16:06:31 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000b4508a)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x400000000009) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x0, 0x12, r0, 0x1e00) [ 1034.040366] should_failslab+0x9/0x14 [ 1034.044198] __kmalloc_track_caller+0x2d1/0x760 [ 1034.048889] ? strncpy_from_user+0x5a0/0x5a0 [ 1034.053316] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1034.058868] ? strndup_user+0x77/0xd0 [ 1034.062684] memdup_user+0x2c/0xa0 [ 1034.066237] strndup_user+0x77/0xd0 [ 1034.069883] ksys_mount+0x73/0x140 [ 1034.073443] __x64_sys_mount+0xbe/0x150 [ 1034.077443] do_syscall_64+0x1b9/0x820 [ 1034.081348] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1034.086726] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1034.091666] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1034.096541] ? trace_hardirqs_on_caller+0x310/0x310 [ 1034.096561] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1034.096581] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1034.106626] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1034.116479] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1034.119144] ceph: device name is missing path (no : separator in []hLžm8) [ 1034.121691] RIP: 0033:0x457669 [ 1034.121709] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1034.121718] RSP: 002b:00007f934afb1c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1034.121734] RAX: ffffffffffffffda RBX: 00007f934afb1c90 RCX: 0000000000457669 [ 1034.121750] RDX: 0000000020000040 RSI: 0000000020001640 RDI: 0000000020000100 [ 1034.167118] ceph: device name is missing path (no : separator in []hLžm8) [ 1034.173568] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 16:06:31 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020200090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e0100000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00200010000000000000000"], 0x60}}, 0x0) [ 1034.173579] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f934afb26d4 [ 1034.173588] R13: 00000000004c2de4 R14: 00000000004d51a8 R15: 0000000000000004 [ 1034.190618] IPVS: ftp: loaded support on port[0] = 21 [ 1034.227726] ceph: device name is missing path (no : separator in [d::]: [ 1034.227726] llbE) 16:06:31 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000b4508a)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x400000000009) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x0, 0x12, r0, 0x3) [ 1034.251688] ceph: device name is missing path (no : separator in [d::]: [ 1034.251688] llbE) [ 1034.637820] IPVS: ftp: loaded support on port[0] = 21 16:06:32 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, 0x0, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_INFO(r1, 0x29, 0x40, &(0x7f00000000c0)={'security\x00\x00\x00\x96\x01\x00'}, &(0x7f0000000140)=0x54) 16:06:32 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020200090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e0100000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e01000010000000000000000"], 0x60}}, 0x0) 16:06:32 executing program 1: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x10080000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000200)=ANY=[@ANYBLOB="5b8aa2c40b119d1e53199cfe04ffa72199f8e4742711e5bbf15479c3"], &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) r0 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x140) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f00000000c0)={0x0, 0x4}, &(0x7f0000000140)=0x8) setsockopt$inet_sctp_SCTP_ADD_STREAMS(r0, 0x84, 0x79, &(0x7f00000001c0)={r1, 0x8, 0x5}, 0x8) 16:06:32 executing program 3: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[d::]:\nllbE\x05', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 16:06:32 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000b4508a)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x400000000009) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x0, 0x12, r0, 0x8000000000000000) 16:06:32 executing program 0: socket$inet_tcp(0x2, 0x1, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x2102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000100)=@nbd={'/dev/nbd'}, &(0x7f0000001640)='./file0\x00', &(0x7f0000000040)='gfs2meta\x00', 0x0, 0x0) 16:06:32 executing program 0: socket$inet_tcp(0x2, 0x1, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x2102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000100)=@nbd={'\ndev/nbd'}, &(0x7f0000001640)='./file0\x00', &(0x7f0000000040)='gfs2meta\x00', 0x0, 0x0) [ 1034.813003] ceph: device name is missing path (no : separator in [Š¢Ä Sœþÿ§!™øät'å»ñTyÃ) [ 1034.823218] ceph: device name is missing path (no : separator in [d::]: [ 1034.823218] llbE) [ 1034.839093] gfs2: path_lookup on /dev/nbd returned error -2 16:06:32 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000b4508a)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x400000000009) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x0, 0x12, r0, 0x3f00000000000000) [ 1034.860968] ceph: device name is missing path (no : separator in [d::]: [ 1034.860968] llbE) [ 1034.869961] ceph: device name is missing path (no : separator in [Š¢Ä Sœþÿ§!™øät'å»ñTyÃ) 16:06:32 executing program 3: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[d::]:\nllbE\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 16:06:32 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020200090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e0100000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00400010000000000000000"], 0x60}}, 0x0) [ 1034.929881] IPVS: ftp: loaded support on port[0] = 21 [ 1034.969507] gfs2: path_lookup on [ 1034.969507] dev/nbd returned error -2 16:06:32 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000b4508a)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x400000000009) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x0, 0x12, r0, 0x300) 16:06:32 executing program 0: socket$inet_tcp(0x2, 0x1, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x2102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000100)=@nbd={'/Xev/nbd'}, &(0x7f0000001640)='./file0\x00', &(0x7f0000000040)='gfs2meta\x00', 0x0, 0x0) [ 1035.021880] ceph: device name is missing path (no : separator in [d::]: [ 1035.021880] llbE) [ 1035.034582] gfs2: path_lookup on [ 1035.034582] dev/nbd returned error -2 [ 1035.146359] gfs2: path_lookup on /Xev/nbd returned error -2 [ 1035.179929] gfs2: path_lookup on /Xev/nbd returned error -2 16:06:33 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, 0x0, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_INFO(r1, 0x29, 0x40, &(0x7f00000000c0)={'security\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x82\x00'}, &(0x7f0000000140)=0x54) 16:06:33 executing program 3: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[d::]:\nllbE\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 16:06:33 executing program 1: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x248000, 0x0) ioctl$GIO_UNIMAP(r0, 0x4b66, &(0x7f0000000140)={0x4, &(0x7f00000000c0)=[{}, {}, {}, {}]}) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[]::]:\nllb:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 16:06:33 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000b4508a)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x400000000009) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x0, 0x12, r0, 0xffffffffffffc) 16:06:33 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020200090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e0100000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00800010000000000000000"], 0x60}}, 0x0) 16:06:33 executing program 0: socket$inet_tcp(0x2, 0x1, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x2102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000100)=@nbd={'/cev/nbd'}, &(0x7f0000001640)='./file0\x00', &(0x7f0000000040)='gfs2meta\x00', 0x0, 0x0) [ 1035.618775] libceph: parse_ips bad ip '[]::]: [ 1035.618775] llb' [ 1035.638308] ceph: device name is missing path (no : separator in [d::]: [ 1035.638308] llbE) [ 1035.648080] gfs2: path_lookup on /cev/nbd returned error -2 [ 1035.659796] libceph: parse_ips bad ip '[]::]: [ 1035.659796] llb' 16:06:33 executing program 1: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) restart_syscall() mount(&(0x7f0000000040)=@nullb='[]::]:\nllb:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) [ 1035.680455] gfs2: path_lookup on /cev/nbd returned error -2 [ 1035.696511] ceph: device name is missing path (no : separator in [d::]: [ 1035.696511] llbE) 16:06:33 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020200090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e0100000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00020010000000000000000"], 0x60}}, 0x0) 16:06:33 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000b4508a)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x400000000009) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x0, 0x12, r0, 0x1e) [ 1035.729515] IPVS: ftp: loaded support on port[0] = 21 16:06:33 executing program 0: socket$inet_tcp(0x2, 0x1, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x2102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000100)=@nbd={'/#ev/nbd'}, &(0x7f0000001640)='./file0\x00', &(0x7f0000000040)='gfs2meta\x00', 0x0, 0x0) 16:06:33 executing program 3: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[d::]:\nllbE\xf6', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 16:06:33 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020200090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e0100000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00003000000000000000000"], 0x60}}, 0x0) [ 1035.838381] libceph: parse_ips bad ip '[]::]: [ 1035.838381] llb' [ 1035.881512] gfs2: path_lookup on /#ev/nbd returned error -2 [ 1035.970453] ceph: device name is missing path (no : separator in [d::]: [ 1035.970453] llbEö) [ 1035.975469] ceph: device name is missing path (no : separator in [d::]: [ 1035.975469] llbEö) 16:06:33 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, 0x0, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_INFO(r1, 0x29, 0x40, &(0x7f00000000c0)={'security\x00\x00\x00\x00\x00\x02H\x00'}, &(0x7f0000000140)=0x54) 16:06:33 executing program 0: socket$inet_tcp(0x2, 0x1, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x2102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000100)=@nbd={'/eev/nbd'}, &(0x7f0000001640)='./file0\x00', &(0x7f0000000040)='gfs2meta\x00', 0x0, 0x0) 16:06:33 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000b4508a)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x400000000009) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x0, 0x12, r0, 0x1e00000000000000) 16:06:33 executing program 1: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0x1) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$l2tp(0x18, 0x1, 0x1) sendto(r0, &(0x7f0000000000)="083755b9d886f17ba5963785f716792c088e5abf03874e", 0x17, 0x814, &(0x7f00000001c0)=@un=@abs={0x1, 0x0, 0x4e24}, 0x80) mount(&(0x7f0000000040)=@nullb='[]::]:\nllb:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 16:06:33 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020200090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e0100000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00002010000000000000000"], 0x60}}, 0x0) 16:06:33 executing program 3: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[d::]:\nllbE\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) [ 1036.395419] libceph: parse_ips bad ip '[]::]: [ 1036.395419] llb' [ 1036.397620] ceph: device name is missing path (no : separator in [d::]: [ 1036.397620] llbE) [ 1036.410354] libceph: parse_ips bad ip '[]::]: [ 1036.410354] llb' [ 1036.423519] gfs2: path_lookup on /eev/nbd returned error -2 16:06:34 executing program 0: socket$inet_tcp(0x2, 0x1, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x2102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000100)=@nbd={'/+ev/nbd'}, &(0x7f0000001640)='./file0\x00', &(0x7f0000000040)='gfs2meta\x00', 0x0, 0x0) 16:06:34 executing program 1: mknod$loop(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x5, 0x109000) getsockopt$inet_mreqn(r0, 0x0, 0x27, &(0x7f0000000140)={@broadcast, @remote, 0x0}, &(0x7f0000000180)=0xc) setsockopt$packet_drop_memb(r0, 0x107, 0x2, &(0x7f0000000200)={r1, 0x1, 0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x10) ioctl$TCSBRK(r0, 0x5409, 0x1000) inotify_add_watch(r0, &(0x7f00000000c0)='./file0\x00', 0x2000000) mount(&(0x7f0000000040)=@nullb='[]::]:\nllb:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 16:06:34 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020200090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e0100000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00004010000000000000000"], 0x60}}, 0x0) [ 1036.453526] IPVS: ftp: loaded support on port[0] = 21 [ 1036.468354] ceph: device name is missing path (no : separator in [d::]: [ 1036.468354] llbE) 16:06:34 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000b4508a)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x400000000009) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x0, 0x12, r0, 0x1000000) [ 1036.532300] libceph: parse_ips bad ip '[]::]: [ 1036.532300] llb' 16:06:34 executing program 3: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[d::]:\nllbE\x03', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 16:06:34 executing program 1: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[]::]:\nllb:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) r0 = getpid() sched_getattr(r0, &(0x7f0000000000), 0x30, 0x0) [ 1036.585532] gfs2: path_lookup on /+ev/nbd returned error -2 [ 1036.646858] ceph: device name is missing path (no : separator in [d::]: [ 1036.646858] llbE) [ 1036.671637] ceph: device name is missing path (no : separator in [d::]: [ 1036.671637] llbE) [ 1036.692443] libceph: parse_ips bad ip '[]::]: [ 1036.692443] llb' [ 1036.760321] libceph: parse_ips bad ip '[]::]: [ 1036.760321] llb' [ 1036.941405] IPVS: ftp: loaded support on port[0] = 21 16:06:34 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, 0x0, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_INFO(r1, 0x29, 0x40, &(0x7f00000000c0)={'security\x00\x00\x00\x00\x00\x03\xfc\x00'}, &(0x7f0000000140)=0x54) 16:06:34 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000b4508a)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x400000000009) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x0, 0x12, r0, 0x2000000) 16:06:34 executing program 0: socket$inet_tcp(0x2, 0x1, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x2102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000100)=@nbd={'/\nev/nbd'}, &(0x7f0000001640)='./file0\x00', &(0x7f0000000040)='gfs2meta\x00', 0x0, 0x0) 16:06:34 executing program 3: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[d::]:\nllbE\a', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 16:06:34 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020200090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e0100000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00010010000000000000000"], 0x60}}, 0x0) 16:06:34 executing program 1: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x54a40, 0x0) ioctl$RNDADDENTROPY(r0, 0x40085203, &(0x7f00000001c0)={0x401, 0xcc, "c3a05489aa9814b625a849e7c739c3288b2b3c4ac5a399dc9aa9ea8c67be9f14908ca2c156135656d47a49566606d9370bab9a3d780d56e94e2b73215424541973ef68d417cd5eff2ee8b6544c164f5d8752227a9145b06916e0592705660e691b98ffe5f4fa15190b7d8513f81970f9686b75a127e93c55342c27566ebef1901890874f77882ab1d6860a1338dc3b5a4d609ac311d42181424cf17635fe07bcface599fd528d3ca9b676c3380b0d64410ee4b111c558c7dfadf95216f5f8b17ed050d367b3398812d82562d"}) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[]::]:\nllb:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) [ 1037.049366] gfs2: path_lookup on / [ 1037.049366] ev/nbd returned error -2 [ 1037.070787] ceph: device name is missing path (no : separator in [d::]: [ 1037.070787] llbE) [ 1037.081214] libceph: parse_ips bad ip '[]::]: [ 1037.081214] llb' [ 1037.091223] cgroup: fork rejected by pids controller in /syz0 16:06:34 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020200090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e0100000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000170000000000000000"], 0x60}}, 0x0) 16:06:34 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000b4508a)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x400000000009) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x0, 0x12, r0, 0x1e000000) [ 1037.097335] IPVS: ftp: loaded support on port[0] = 21 [ 1037.108424] libceph: parse_ips bad ip '[]::]: [ 1037.108424] llb' 16:06:34 executing program 0: socket$inet_tcp(0x2, 0x1, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x2102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000100)=@nbd={'/%ev/nbd'}, &(0x7f0000001640)='./file0\x00', &(0x7f0000000040)='gfs2meta\x00', 0x0, 0x0) [ 1037.144007] ceph: device name is missing path (no : separator in [d::]: [ 1037.144007] llbE) 16:06:34 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020200090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e0100000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000180000000000000000"], 0x60}}, 0x0) 16:06:34 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000b4508a)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x400000000009) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/rtc0\x00', 0x101000, 0x0) setsockopt$netlink_NETLINK_CAP_ACK(r1, 0x10e, 0xa, &(0x7f00000002c0)=0x1af1, 0x4) r2 = semget$private(0x0, 0x3, 0x24) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000000)={{{@in=@loopback, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000100)=0xe8) r4 = getegid() lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) r6 = getegid() semctl$IPC_SET(r2, 0x0, 0x1, &(0x7f0000000200)={{0xfffffffffffffff7, r3, r4, r5, r6, 0x110, 0x3}, 0x7, 0x1, 0x2}) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f0000000300)={0x0, 0x5}, &(0x7f0000000340)=0x8) setsockopt$inet_sctp_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f0000000380)={r7, 0x9, 0x5, 0x8, 0x8000, 0x100000001}, 0x14) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x1000000, 0x12, r0, 0x0) 16:06:34 executing program 1: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="80000000"], &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) [ 1037.271226] gfs2: path_lookup on /%ev/nbd returned error -2 [ 1037.322169] ceph: device name is missing path (no : separator in €) [ 1037.598203] IPVS: ftp: loaded support on port[0] = 21 16:06:35 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, 0x0, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_INFO(r1, 0x29, 0x40, &(0x7f00000000c0)={'security\x00\x00\x00\x02\x01\x00'}, &(0x7f0000000140)=0x54) 16:06:35 executing program 4: r0 = syz_open_dev$midi(&(0x7f0000000080)='/dev/midi#\x00', 0x0, 0x402000) write$P9_RXATTRWALK(r0, &(0x7f00000000c0)={0xf, 0x1f, 0x1, 0x8}, 0xf) r1 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000b4508a)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r1, 0x40087703, 0x400000000009) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/nat_icmp_send\x00', 0x2, 0x0) ioctl$EVIOCSABS0(r2, 0x401845c0, &(0x7f0000000040)={0x9, 0x800, 0x0, 0x7, 0x3, 0x2}) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x200000000, 0x12, r1, 0x0) 16:06:35 executing program 1: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) init_module(&(0x7f0000000000)='\x00', 0x1, &(0x7f00000000c0)='cpuset+wlan0vmnet1keyring\x00') clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[]::]:\nllb:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 16:06:35 executing program 3: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[d::]:\nllbE\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 16:06:35 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020200090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e0100000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e000001a0000000000000000"], 0x60}}, 0x0) 16:06:35 executing program 0: socket$inet_tcp(0x2, 0x1, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x2102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000100)=@nbd={'/oev/nbd'}, &(0x7f0000001640)='./file0\x00', &(0x7f0000000040)='gfs2meta\x00', 0x0, 0x0) 16:06:35 executing program 1: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[]::]:\nllb:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r0, 0x84, 0x15, &(0x7f0000000440)={0x7f}, 0x1) r1 = accept4(0xffffffffffffff9c, &(0x7f00000001c0)=@xdp, &(0x7f00000000c0)=0x80, 0x80000) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f0000000140)) socketpair(0xa, 0x2, 0x1f, &(0x7f0000000000)) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000240)='/dev/snapshot\x00', 0x40000, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000400)={r2, &(0x7f0000000280)="2bddbc8210c25ec6af6e174ddbe8bfad34c5a22fbb74918e097bd9a68e50de7dacbf49535f5a68ce203f626410f227bbe06309df750a7a52983eef362016314e0b054c9d9bc1e2f0e436171c32c94577811c74a7c30423dc6d4e37a8b80c80435f27a62ad41a0f3da573bc7f0ef669f03fc393691c21a750e19a7a25d8eb991aaa867b20f3ac8a258bbab38dda2cd9ddff2c31eafcdd4a5c896bb07b68ce38779868e7ab8c48a85e9083b7ab3530b3eedd6cccef004a79d7f2654aa2fedae4a835a9b25790bff6298efe26eca94a1eafc3823c89de87ec860d8e05cd3e574a3004ea2ebf40915da64e22ba", &(0x7f0000000380)=""/71}, 0x18) 16:06:35 executing program 0: socket$inet_tcp(0x2, 0x1, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x2102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000100)=@nbd={'/lev/nbd'}, &(0x7f0000001640)='./file0\x00', &(0x7f0000000040)='gfs2meta\x00', 0x0, 0x0) 16:06:35 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020200090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e0100000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e000003f0000000000000000"], 0x60}}, 0x0) [ 1037.719914] libceph: parse_ips bad ip '[]::]: [ 1037.719914] llb' [ 1037.733603] ceph: device name is missing path (no : separator in [d::]: [ 1037.733603] llbE) [ 1037.733778] gfs2: path_lookup on /oev/nbd returned error -2 [ 1037.815386] IPVS: ftp: loaded support on port[0] = 21 16:06:35 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000b4508a)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x400000000009) mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) [ 1037.851580] ceph: device name is missing path (no : separator in [d::]: [ 1037.851580] llbE) [ 1037.859615] libceph: parse_ips bad ip '[]::]: [ 1037.859615] llb' 16:06:35 executing program 0: socket$inet_tcp(0x2, 0x1, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x2102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000100)=@nbd={'/sev/nbd'}, &(0x7f0000001640)='./file0\x00', &(0x7f0000000040)='gfs2meta\x00', 0x0, 0x0) 16:06:35 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020200090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e0100000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00004000000000000000000"], 0x60}}, 0x0) [ 1037.897736] gfs2: path_lookup on /lev/nbd returned error -2 [ 1037.922857] libceph: parse_ips bad ip '[]::]: [ 1037.922857] llb' [ 1038.100544] gfs2: path_lookup on /sev/nbd returned error -2 [ 1038.288182] IPVS: ftp: loaded support on port[0] = 21 16:06:36 executing program 1: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[]::]:\nllb:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 16:06:36 executing program 3: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[d::]:\nllbE\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 16:06:36 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020200090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e0100000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00008010000000000000000"], 0x60}}, 0x0) 16:06:36 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000b4508a)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x400000000009) preadv(r0, &(0x7f0000000240)=[{&(0x7f0000000000)=""/150, 0x96}, {&(0x7f0000000400)=""/24, 0x18}, {&(0x7f0000000100)=""/124, 0x7c}, {&(0x7f0000000180)=""/158, 0x9e}], 0x4, 0x16) r1 = syz_open_dev$admmidi(&(0x7f0000000280)='/dev/admmidi#\x00', 0x2, 0x8000) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000380)={r1, &(0x7f00000002c0)="4b660a0aa51b575bcfea66b0ca9e93b297985ca9f069a00aed89a70e1e8e6cb7c3c5ab33cca974f62a97b05f0c11d6be91a12f713d9e7b31fae94972f3675b065aaafbf1c5b3e598adeaf3e4b0d3ca601f889c9da43805eb3e0744fbe3444e82ca3d0566c99443754940d96efa29cbfa506d92424a84f5542ea343a892f0bf0a8020aa76719903e220abbc1de3e3634190b56389f8f14c464544958868db633bdc1a749d8407383bbbc314327e3dbd"}, 0x10) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x400000000, 0x12, r1, 0x0) r2 = fcntl$getown(r0, 0x9) ptrace$peek(0x2, r2, &(0x7f00000003c0)) 16:06:36 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, 0x0, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_INFO(r1, 0x29, 0x40, &(0x7f00000000c0)={'security\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\xdc\x00'}, &(0x7f0000000140)=0x54) 16:06:36 executing program 0: socket$inet_tcp(0x2, 0x1, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x2102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000100)=@nbd={'/0ev/nbd'}, &(0x7f0000001640)='./file0\x00', &(0x7f0000000040)='gfs2meta\x00', 0x0, 0x0) [ 1038.400583] libceph: parse_ips bad ip '[]::]: [ 1038.400583] llb' [ 1038.417772] gfs2: path_lookup on /0ev/nbd returned error -2 [ 1038.426529] ceph: device name is missing path (no : separator in [d::]: [ 1038.426529] llbE) [ 1038.445248] libceph: parse_ips bad ip '[]::]: 16:06:36 executing program 1: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=ANY=[@ANYBLOB='[]::]:\nqlb:\x00'], &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) [ 1038.445248] llb' 16:06:36 executing program 3: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[d::]:\nllbE\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 16:06:36 executing program 0: socket$inet_tcp(0x2, 0x1, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x2102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000100)=@nbd={'/.ev/nbd'}, &(0x7f0000001640)='./file0\x00', &(0x7f0000000040)='gfs2meta\x00', 0x0, 0x0) 16:06:36 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000b4508a)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x400000000009) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x0, 0x12, r0, 0x0) fdatasync(r0) 16:06:36 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020200090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e0100000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000180000000000000000"], 0x60}}, 0x0) [ 1038.509582] IPVS: ftp: loaded support on port[0] = 21 [ 1038.572097] libceph: parse_ips bad ip '[]::]: [ 1038.572097] qlb' [ 1038.598354] ceph: device name is missing path (no : separator in [d::]: [ 1038.598354] llbE) 16:06:36 executing program 1: clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[]::]:\nllb:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) [ 1038.617827] gfs2: path_lookup on /.ev/nbd returned error -2 16:06:36 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020200090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e0100000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e000001a0000000000000000"], 0x60}}, 0x0) [ 1038.679913] ceph: device name is missing path (no : separator in [d::]: [ 1038.679913] llbE) 16:06:36 executing program 3: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[d::]:\nllbE\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 16:06:36 executing program 0: socket$inet_tcp(0x2, 0x1, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x2102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000100)=@nbd={'//ev/nbd'}, &(0x7f0000001640)='./file0\x00', &(0x7f0000000040)='gfs2meta\x00', 0x0, 0x0) 16:06:36 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000b4508a)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x600000000003) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x0, 0x12, r0, 0x0) [ 1038.875655] gfs2: path_lookup on //ev/nbd returned error -2 [ 1038.900303] ceph: device name is missing path (no : separator in [d::]: [ 1038.900303] llbE) [ 1038.929961] ceph: device name is missing path (no : separator in [d::]: [ 1038.929961] llbE) 16:06:36 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, 0x0, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_INFO(r1, 0x29, 0x40, &(0x7f00000000c0)={'security\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf4\x00'}, &(0x7f0000000140)=0x54) 16:06:36 executing program 1: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = syz_open_dev$usb(&(0x7f00000001c0)='/dev/bus/usb/00#/00#\x00', 0x10000, 0x400000) write$P9_RREADDIR(r0, &(0x7f0000000200)={0xe4, 0x29, 0x1, {0x8, [{{0x20, 0x2, 0x8}, 0x800, 0x1, 0x7, './file0'}, {{0x8, 0x1, 0x3}, 0xfffffffffffffffd, 0x1, 0x7, './file0'}, {{0xc0, 0x3}, 0x0, 0x5, 0x7, './file0'}, {{0x8, 0x2, 0x2}, 0x1, 0x0, 0x7, './file0'}, {{0xa1, 0x0, 0x8}, 0x1, 0x9, 0x7, './file0'}, {{0x0, 0x0, 0x4}, 0x2826, 0x8, 0x7, './file0'}, {{0x2, 0x0, 0x4}, 0xfffffffffffffffd, 0xcb, 0x7, './file0'}]}}, 0xe4) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="5b5d3a4c8ca1e6f07e3a5d3a"], &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) ioctl$KVM_SET_VCPU_EVENTS(r0, 0x4040aea0, &(0x7f0000000400)={0x20, 0x3d, 0x0, 0x0, 0x0, 0x8001, 0x100, 0x4, 0x0, 0x6, 0x9, 0x7, 0x0, 0x1, 0x3f, 0x2, 0x7, 0x6, 0x2}) acct(&(0x7f0000000000)='./file0\x00') ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f00000000c0)={0xffffffffffffffff}) mmap$xdp(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x50013, r1, 0x180000000) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000480)={0x4, &(0x7f0000000440)=[{0x7, 0x4, 0x401, 0xfffffffffffffff7}, {0xffffffff, 0x0, 0x7ff, 0x297}, {0x1, 0xffffffff80000001, 0x0, 0x2}, {0x6, 0x1, 0xb064, 0xe}]}, 0x10) r2 = dup3(r1, r1, 0x80000) ioctl$TCSETSW(r2, 0x5403, &(0x7f0000000140)={0x6, 0x40, 0x9, 0xffff, 0x24d, 0xbdd, 0x7fffffff, 0x0, 0xffff, 0x5, 0x3ff, 0x3871}) setsockopt$inet_opts(r1, 0x0, 0x4, &(0x7f0000000300)="e8f17c1fd805ac5f76fa4863c0cde0cb0758b687b15611468527b7b61e4bf590e3bc04da375a1f193960310beddddb1541c132600ee3ba5d9a6f65a50c881c42c3bcbe5d52e3a6f7dae8c8a198569eac75516bf99df22ae701ce7467554bac71a7dbbb23505928802bb52809c41c5cc5e49919b14360e7a4b2e45bc286489f5a7b70b028c1d3d462f5053cae4f3f0b7eb7e438e8e79d11450bd0f01f4bb3d6ac666d2cf471130a6787623849bf2ea9bdc63a68e1a5fc3081aa78b9974e4307ca46cf746f95350051c65f5132534420d992d1f78d0aa66cb3d005be84", 0xdc) 16:06:36 executing program 0: socket$inet_tcp(0x2, 0x1, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x2102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000100)=@nbd={'/iev/nbd'}, &(0x7f0000001640)='./file0\x00', &(0x7f0000000040)='gfs2meta\x00', 0x0, 0x0) 16:06:36 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020200090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e0100000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000040000000000000000"], 0x60}}, 0x0) 16:06:36 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ashmem\x00', 0x4000, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x400000000009) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x0, 0x12, r0, 0x0) 16:06:36 executing program 3: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[d::]:\nllbE\x04', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 16:06:36 executing program 3: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[d::]:\nllbE\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 16:06:36 executing program 1: mknod$loop(&(0x7f0000000040)='./file0\x00', 0xfffffffffffffffa, 0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ceph\x00', 0x2000000, 0x0) [ 1039.320344] ceph: device name is missing path (no : separator in [d::]: [ 1039.320344] llbE) [ 1039.339182] libceph: parse_ips bad ip '[]:LŒ¡æð~:]' [ 1039.359579] gfs2: path_lookup on /iev/nbd returned error -2 16:06:37 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020200090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e0100000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000000300000000000000"], 0x60}}, 0x0) 16:06:37 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000b4508a)='/dev/ashmem\x00', 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x802, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x400000000009) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x0, 0x12, r0, 0x0) 16:06:37 executing program 0: socket$inet_tcp(0x2, 0x1, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x2102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000100)=@nbd={'/pev/nbd'}, &(0x7f0000001640)='./file0\x00', &(0x7f0000000040)='gfs2meta\x00', 0x0, 0x0) 16:06:37 executing program 1: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[]::]:\nllb:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) r0 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x7, 0x101400) getsockopt$TIPC_CONN_TIMEOUT(r0, 0x10f, 0x82, &(0x7f00000000c0), &(0x7f0000000140)=0x4) [ 1039.500483] IPVS: ftp: loaded support on port[0] = 21 [ 1039.537887] ceph: device name is missing path (no : separator in [d::]: [ 1039.537887] llbE) [ 1039.581798] ceph: device name is missing path (no : separator in [d::]: [ 1039.581798] llbE) [ 1039.656545] libceph: parse_ips bad ip '[]::]: [ 1039.656545] llb' [ 1039.713104] libceph: parse_ips bad ip '[]::]: [ 1039.713104] llb' [ 1040.060444] IPVS: ftp: loaded support on port[0] = 21 16:06:37 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, 0x0, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_INFO(r1, 0x29, 0x40, &(0x7f00000000c0)={'security\x00\x00\x00\x00\x00\x01\x96\x00'}, &(0x7f0000000140)=0x54) 16:06:37 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000b4508a)='/dev/ashmem\x00', 0x0, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x802, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x400000000009) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x0, 0x1e, r0, 0x0) 16:06:37 executing program 3: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[d::]:\nllbE\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 16:06:37 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020200090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e0100000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000020000000000000000"], 0x60}}, 0x0) 16:06:37 executing program 1: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/tcp\x00') recvmsg$kcm(r0, &(0x7f0000000140)={&(0x7f00000001c0)=@xdp, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000240)=""/242, 0xf2}, {&(0x7f0000000340)=""/4096, 0x1000}, {&(0x7f0000001340)=""/91, 0x5b}, {&(0x7f00000013c0)=""/4096, 0x1000}], 0x4, &(0x7f00000023c0)=""/164, 0xa4}, 0x42) clone(0x20010400, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[]::]:\nllb:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) [ 1040.312378] libceph: parse_ips bad ip '[]::]: [ 1040.312378] llb' [ 1040.328282] ceph: device name is missing path (no : separator in [d::]: [ 1040.328282] llbE) [ 1040.345763] IPVS: ftp: loaded support on port[0] = 21 16:06:38 executing program 3: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[d::]:\nllbE\xfe', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 16:06:38 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020200090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e0100000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e0000070ca2cc18188ffff00"], 0x60}}, 0x0) [ 1040.360344] libceph: parse_ips bad ip '[]::]: [ 1040.360344] llb' 16:06:38 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x400000000009) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x0, 0x12, r0, 0x0) fcntl$F_GET_RW_HINT(r0, 0x40b, &(0x7f0000000040)) 16:06:38 executing program 1: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="ed9f3f8d609b1d3a8badc5f0"], &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) [ 1040.469375] ceph: device name is missing path (no : separator in [d::]: [ 1040.469375] llbEþ) 16:06:38 executing program 3: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[d::]:\nllbE\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) [ 1040.597889] ceph: device name is missing path (no : separator in íŸ?`›:‹­Åð) [ 1040.638046] ceph: device name is missing path (no : separator in íŸ?`›:‹­Åð) [ 1040.649868] ceph: device name is missing path (no : separator in [d::]: [ 1040.649868] llbE) [ 1040.749722] ceph: device name is missing path (no : separator in [d::]: [ 1040.749722] llbE) 16:06:38 executing program 0: socket$inet_tcp(0x2, 0x1, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x2102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000100)=@nbd={'/uev/nbd'}, &(0x7f0000001640)='./file0\x00', &(0x7f0000000040)='gfs2meta\x00', 0x0, 0x0) 16:06:38 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020200090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e0100000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000170000000000000000"], 0x60}}, 0x0) 16:06:38 executing program 1: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[]::]:\nllb:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) r0 = openat$dsp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dsp\x00', 0x2200, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000280)={0x6, 0x118, 0xfa00, {{0x9, 0x7f, "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", 0xc3, 0x2e, 0x10001, 0x9d2, 0x100, 0x101, 0x0, 0x1}, r1}}, 0x120) accept$inet(r0, &(0x7f0000000140), &(0x7f0000000240)=0x10) 16:06:38 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000b4508a)='/dev/ashmem\x00', 0x0, 0x0) r1 = dup2(r0, r0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f0000000040)=0x6, 0x4) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x7fff) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x0, 0x12, r0, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x7ff, 0x80001) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f0000000040), 0x0) 16:06:38 executing program 3: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[d::]:\nllbE\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 16:06:38 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, 0x0, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_INFO(r1, 0x29, 0x40, &(0x7f00000000c0)={'security\x00\x00\x00\x00\xa8\x00'}, &(0x7f0000000140)=0x54) 16:06:38 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020200090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e0100000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000080000000000000000"], 0x60}}, 0x0) [ 1041.325760] IPVS: ftp: loaded support on port[0] = 21 [ 1041.396471] libceph: parse_ips bad ip '[]::]: [ 1041.396471] llb' [ 1041.403782] ceph: device name is missing path (no : separator in [d::]: [ 1041.403782] llbE) [ 1041.433228] libceph: parse_ips bad ip '[]::]: [ 1041.433228] llb' 16:06:39 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000b4508a)='/dev/ashmem\x00', 0x0, 0x0) syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0xffffffff, 0x10080) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x400000000009) mmap(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) 16:06:39 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020200090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e0100000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e000001fffffff0000000000"], 0x60}}, 0x0) [ 1041.443046] ceph: device name is missing path (no : separator in [d::]: [ 1041.443046] llbE) 16:06:39 executing program 1: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="3d034539f635cdcf6c623a00"], &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) [ 1041.480629] IPVS: ftp: loaded support on port[0] = 21 16:06:39 executing program 3: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[d::]:\nllbE\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 16:06:39 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020200090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e0100000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000011000000000000000"], 0x60}}, 0x0) [ 1041.608448] libceph: parse_ips bad ip '=E9ö5ÍÏlb' [ 1041.609071] libceph: parse_ips bad ip '=E9ö5ÍÏlb' [ 1042.536790] bridge0: port 1(bridge_slave_0) entered blocking state [ 1042.543756] bridge0: port 1(bridge_slave_0) entered disabled state [ 1042.551358] device bridge_slave_0 entered promiscuous mode [ 1042.597119] bridge0: port 2(bridge_slave_1) entered blocking state [ 1042.603781] bridge0: port 2(bridge_slave_1) entered disabled state [ 1042.612117] device bridge_slave_1 entered promiscuous mode [ 1042.642381] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1042.671615] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1042.749530] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1042.783514] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1043.433099] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1043.441016] team0: Port device team_slave_0 added [ 1043.470342] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1043.477677] team0: Port device team_slave_1 added [ 1043.747608] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 1043.754492] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1043.763482] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1043.933968] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 1043.941363] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1043.949467] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1044.214983] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1044.222316] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1044.232135] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1044.392592] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1044.399978] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1044.408178] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1045.132236] device bridge_slave_1 left promiscuous mode [ 1045.138693] bridge0: port 2(bridge_slave_1) entered disabled state [ 1045.146251] device bridge_slave_0 left promiscuous mode [ 1045.152536] bridge0: port 1(bridge_slave_0) entered disabled state [ 1047.300377] team0 (unregistering): Port device team_slave_1 removed [ 1047.311086] team0 (unregistering): Port device team_slave_0 removed [ 1047.321157] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1047.332445] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1047.363619] bond0 (unregistering): Released all slaves [ 1047.450733] bridge0: port 2(bridge_slave_1) entered blocking state [ 1047.457079] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1047.463767] bridge0: port 1(bridge_slave_0) entered blocking state [ 1047.470134] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1047.478066] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 1048.462219] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1049.149459] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1049.309516] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1049.466514] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 1049.473168] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1049.488413] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1049.639471] 8021q: adding VLAN 0 to HW filter on device team0 16:06:48 executing program 0: socket$inet_tcp(0x2, 0x1, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x2102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000100)=@nbd={'/Pev/nbd'}, &(0x7f0000001640)='./file0\x00', &(0x7f0000000040)='gfs2meta\x00', 0x0, 0x0) 16:06:48 executing program 3: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[d::]:\nllbE\x8c', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 16:06:48 executing program 4: ioctl$ASHMEM_SET_SIZE(0xffffffffffffffff, 0x40087703, 0x400000000009) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x0, 0x12, 0xffffffffffffffff, 0x0) syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0xb19, 0x0) 16:06:48 executing program 1: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) arch_prctl$ARCH_SET_GS(0x1001, 0x2) mount(&(0x7f0000000040)=@nullb='[]::]:\nllb:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 16:06:48 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020200090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e0100000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000400000000"], 0x60}}, 0x0) 16:06:48 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, 0x0, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_INFO(r1, 0x29, 0x40, &(0x7f00000000c0)={'security\x00\x00\x00\x9a\x01\x00'}, &(0x7f0000000140)=0x54) [ 1050.374987] gfs2: path_lookup on /uev/nbd returned error -2 [ 1050.414933] ceph: device name is missing path (no : separator in [d::]: [ 1050.414933] llbEŒ) 16:06:48 executing program 0: socket$inet_tcp(0x2, 0x1, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x2102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000100)=@nbd={'/xev/nbd'}, &(0x7f0000001640)='./file0\x00', &(0x7f0000000040)='gfs2meta\x00', 0x0, 0x0) [ 1050.420247] libceph: parse_ips bad ip '[]::]: [ 1050.420247] llb' [ 1050.436817] IPVS: ftp: loaded support on port[0] = 21 [ 1050.449976] ceph: device name is missing path (no : separator in [d::]: [ 1050.449976] llbEŒ) [ 1050.460614] gfs2: path_lookup on /Pev/nbd returned error -2 16:06:48 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020200090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e0100000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000002000000000"], 0x60}}, 0x0) 16:06:48 executing program 1: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x8084000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000180)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) 16:06:48 executing program 3: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[d::]:\nllbE\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 16:06:48 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020200090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e0100000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000001"], 0x60}}, 0x0) 16:06:48 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000b4508a)='/dev/ashmem\x00', 0x0, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x14000, 0x0) ioctl$TCGETS(r1, 0x5401, &(0x7f0000000040)) ioctl$SNDRV_CTL_IOCTL_TLV_READ(r1, 0xc008551a, &(0x7f00000001c0)={0x1, 0x28, [0x9, 0x400, 0x0, 0x3, 0x1, 0x0, 0x7, 0x6, 0x7, 0x5]}) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x400000000009) setsockopt$RDS_GET_MR(r1, 0x114, 0x2, &(0x7f0000000180)={{&(0x7f0000000080)=""/165, 0xa5}, &(0x7f0000000140), 0x1}, 0x20) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x0, 0x12, r0, 0x0) [ 1050.645868] gfs2: path_lookup on /xev/nbd returned error -2 16:06:48 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020200090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e0100000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000009c5d5a62df"], 0x60}}, 0x0) [ 1050.690694] gfs2: path_lookup on /xev/nbd returned error -2 [ 1050.705332] ceph: device name is missing path (no : separator in []::] [ 1050.705332] llbÃÒS„t8DÛÇøþWÀ˜‚”&ÃDO»‘VV…Ýö/) [ 1050.731301] ceph: device name is missing path (no : separator in [d::]: [ 1050.731301] llbE) 16:06:48 executing program 3: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[d::]:\nllbE\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 16:06:48 executing program 0: socket$inet_tcp(0x2, 0x1, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x2102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000100)=@nbd={'/*ev/nbd'}, &(0x7f0000001640)='./file0\x00', &(0x7f0000000040)='gfs2meta\x00', 0x0, 0x0) 16:06:48 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000b4508a)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x400000000009) r1 = add_key(&(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffa) keyctl$revoke(0x3, r1) mmap(&(0x7f00006ff000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) openat$vimc0(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video0\x00', 0x2, 0x0) 16:06:48 executing program 1: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000001c0)={{{@in6=@mcast1, @in6=@ipv4={[], [], @local}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@multicast1}}, &(0x7f0000000140)=0xe8) quotactl(0x5, &(0x7f00000000c0)='./file1\x00', r0, &(0x7f00000002c0)="c662f2da9d9ae76c36abd761c85081a7521a319911af3a3080c7283f49e28232b6a89cdbdf83eefdf5d88263794af1378a682615d26fa930a2e685fc1e0dcb81aba664c18f82c148ae04d273b6c7f59195ce333896b7efc8baf0c13d3ce9c54d41e458bc9cb213ceaf6204f56541a6250093361bf91eae2c6c44eb02c5f78497ef78c8f397eda273de26fbdfdb0dcfb81356120d2f79b832706974eb6f7540d4fd04769fee73e3a2b488d743fa1434dceb1fe42ffec5b9") mount(&(0x7f0000000040)=@nullb='[]::]:\nllb:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) truncate(&(0x7f0000000000)='./file0\x00', 0x8) [ 1050.892094] gfs2: path_lookup on /*ev/nbd returned error -2 [ 1050.913751] gfs2: path_lookup on /*ev/nbd returned error -2 [ 1050.939220] libceph: parse_ips bad ip '[]::]: [ 1050.939220] llb' [ 1051.165712] IPVS: ftp: loaded support on port[0] = 21 16:06:48 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, 0x0, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_INFO(r1, 0x29, 0x40, &(0x7f00000000c0)={'security\x00\x00\x00\xd0\x00'}, &(0x7f0000000140)=0x54) 16:06:48 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020200090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e0100000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000100000000"], 0x60}}, 0x0) 16:06:48 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000b4508a)='/dev/ashmem\x00', 0x0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000000)={0x0, r0, 0x26, 0x7ff, 0x80, 0xfffffffffffffffb}) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x400000000009) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x0, 0x12, r0, 0x0) pwrite64(r0, &(0x7f00000000c0)="deb14c919533afce9a3a412506a2c92ad0618ea10febc5c5e2a5bd66235c2ea821912706afa368389382e7334f0c8a22197ebb560bd1572ce567229ea8ccb00cedbd15a1c71a53a802c8d30314ff8fd09b2e208c2aedb865b5c709863f725fc419d17bc39e90f524c5aff34d13670fb88d3cb82e08f5baa153b4b957423d07600dc0424afd4d73873f237f997542f3a8bf5f7f30ec7b313c78344773fb684706b37136210c968aa1a3307d24c53794fffaafb6ac227636f3abd3e4fca1e344f4fdb8ae51466f7534e06ba2b8c8c1f4b9cd88144ce0b960a7579b6c330360e2b4e01ce877dfd8a94328742d012bf19cdc67de9f072cca98854e2ef5", 0xfb, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x40000, 0x0) ioctl$VIDIOC_SUBDEV_S_FRAME_INTERVAL(r1, 0xc0305616, &(0x7f0000000080)={0x0, {0xffffffff, 0x200}}) 16:06:48 executing program 0: socket$inet_tcp(0x2, 0x1, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x2102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000100)=@nbd={'/-ev/nbd'}, &(0x7f0000001640)='./file0\x00', &(0x7f0000000040)='gfs2meta\x00', 0x0, 0x0) 16:06:48 executing program 1: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="5b5d7a3a5d3a0a6c6c627ae7"], &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 16:06:48 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020200090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e0100000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010003400000000000"], 0x60}}, 0x0) 16:06:48 executing program 0: socket$inet_tcp(0x2, 0x1, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x2102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000100)=@nbd={'/d\nv/nbd'}, &(0x7f0000001640)='./file0\x00', &(0x7f0000000040)='gfs2meta\x00', 0x0, 0x0) [ 1051.305882] ceph: device name is missing path (no : separator in []z:]: [ 1051.305882] llbzç) [ 1051.326127] gfs2: path_lookup on /-ev/nbd returned error -2 [ 1051.329170] ceph: device name is missing path (no : separator in []z:]: [ 1051.329170] llbzç) 16:06:49 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000b4508a)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x400000000009) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x0, 0x12, r0, 0x0) r1 = accept$inet(0xffffffffffffffff, &(0x7f0000000000), &(0x7f00000000c0)=0xffffffffffffff77) setsockopt$inet_tcp_int(r1, 0x6, 0x26, &(0x7f0000000080)=0x5, 0x4) [ 1051.432885] IPVS: ftp: loaded support on port[0] = 21 [ 1051.440652] gfs2: path_lookup on /d [ 1051.440652] v/nbd returned error -2 16:06:49 executing program 3: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[d::]:\nllbE\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 16:06:49 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020200090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e0100000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e0000001df625a5d9c000000"], 0x60}}, 0x0) 16:06:49 executing program 1: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x6, 0x204000) ioctl$BINDER_SET_MAX_THREADS(r0, 0x40046205, 0x80) fcntl$getown(r0, 0x9) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=ANY=[@ANYBLOB='\a]::]:\nllb:\x00'], &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 16:06:49 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000b4508a)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x400000000009) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x0, 0x12, r0, 0x0) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x100, 0x0) ioctl$KVM_CHECK_EXTENSION_VM(r1, 0xae03, 0x8000800) [ 1051.591677] libceph: parse_ips bad ip ']::]: [ 1051.591677] llb' [ 1051.760462] IPVS: ftp: loaded support on port[0] = 21 16:06:49 executing program 1: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) unlink(&(0x7f0000000000)='./file0\x00') clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="090700000000000000621d00"], &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) accept(r0, &(0x7f00000001c0)=@l2, &(0x7f00000000c0)=0x80) 16:06:49 executing program 0: socket$inet_tcp(0x2, 0x1, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x2102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000100)=@nbd={'/d%v/nbd'}, &(0x7f0000001640)='./file0\x00', &(0x7f0000000040)='gfs2meta\x00', 0x0, 0x0) 16:06:49 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000b4508a)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x400000000009) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x0, 0x12, r0, 0x0) fcntl$setsig(r0, 0xa, 0x2c) r1 = syz_open_dev$cec(&(0x7f0000000000)='/dev/cec#\x00', 0x2, 0x2) recvfrom$inet6(r1, &(0x7f0000000040)=""/44, 0x2c, 0x2040, &(0x7f0000000080)={0xa, 0x4e20, 0x6, @dev={0xfe, 0x80, [], 0xe}, 0x6}, 0x1c) r2 = semget(0x2, 0x4, 0x51) semctl$GETVAL(r2, 0x0, 0xc, &(0x7f00000000c0)=""/29) 16:06:49 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, 0x0, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_INFO(r1, 0x29, 0x40, &(0x7f00000000c0)={'security\x00\x00\x00\x00\x00\x03.\x00'}, &(0x7f0000000140)=0x54) 16:06:49 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020200090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e0100000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010400000000000000"], 0x60}}, 0x0) 16:06:49 executing program 0: socket$inet_tcp(0x2, 0x1, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x2102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000100)=@nbd={'/ddv/nbd'}, &(0x7f0000001640)='./file0\x00', &(0x7f0000000040)='gfs2meta\x00', 0x0, 0x0) [ 1051.972944] gfs2: path_lookup on /d%v/nbd returned error -2 [ 1052.029817] IPVS: ftp: loaded support on port[0] = 21 16:06:49 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000b4508a)='/dev/ashmem\x00', 0x0, 0x0) r1 = syz_open_dev$sndpcmp(&(0x7f0000000080)='/dev/snd/pcmC#D#p\x00', 0x5, 0x301002) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') sendmsg$IPVS_CMD_GET_CONFIG(r1, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000002c0)={&(0x7f0000000140)={0x150, r2, 0x100, 0x70bd2a, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_DAEMON={0x7c, 0x3, [@IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @remote}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x4}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @remote}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'veth1_to_bond\x00'}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e22}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e20}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @loopback}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x5}, @IPVS_CMD_ATTR_DAEMON={0x30, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @rand_addr=0x6}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x3}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @broadcast}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast1}]}, @IPVS_CMD_ATTR_SERVICE={0x18, 0x1, [@IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@loopback}]}, @IPVS_CMD_ATTR_SERVICE={0x24, 0x1, [@IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'fo\x00'}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x73}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x6e}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x3}, @IPVS_CMD_ATTR_DEST={0xc, 0x2, [@IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xa}]}, @IPVS_CMD_ATTR_DAEMON={0x38, 0x3, [@IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x3}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e22}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x8000}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x9}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'syzkaller0\x00'}]}]}, 0x150}, 0x1, 0x0, 0x0, 0x10}, 0x4000004) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x400000000009) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x0, 0x12, r0, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(r1, 0x0, 0x485, 0x0, 0x0) r3 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x5, 0x103840) ioctl$TIOCSLCKTRMIOS(r1, 0x5457, &(0x7f0000000340)) setsockopt$ALG_SET_AEAD_AUTHSIZE(r1, 0x117, 0x5, 0x0, 0x5) fcntl$notify(r0, 0x402, 0x10) ioctl$KDSKBMETA(r3, 0x4b63, &(0x7f0000000040)=0x3) 16:06:49 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020200090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e0100000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010200000000000000"], 0x60}}, 0x0) [ 1052.093117] gfs2: path_lookup on /ddv/nbd returned error -2 [ 1053.050734] bridge0: port 1(bridge_slave_0) entered blocking state [ 1053.057224] bridge0: port 1(bridge_slave_0) entered disabled state [ 1053.066745] device bridge_slave_0 entered promiscuous mode [ 1053.110957] bridge0: port 2(bridge_slave_1) entered blocking state [ 1053.117642] bridge0: port 2(bridge_slave_1) entered disabled state [ 1053.124949] device bridge_slave_1 entered promiscuous mode [ 1053.168062] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1053.211256] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1053.345031] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1053.391873] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1053.533116] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1053.541115] team0: Port device team_slave_0 added [ 1053.566960] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1053.574225] team0: Port device team_slave_1 added [ 1053.599698] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1053.641453] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1053.666383] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1053.705207] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1054.001525] bridge0: port 2(bridge_slave_1) entered blocking state [ 1054.007993] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1054.014562] bridge0: port 1(bridge_slave_0) entered blocking state [ 1054.020987] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1054.028174] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 1054.168539] device bridge_slave_1 left promiscuous mode [ 1054.174074] bridge0: port 2(bridge_slave_1) entered disabled state [ 1054.181910] device bridge_slave_0 left promiscuous mode [ 1054.188811] bridge0: port 1(bridge_slave_0) entered disabled state [ 1054.221913] team0 (unregistering): Port device team_slave_1 removed [ 1054.233047] team0 (unregistering): Port device team_slave_0 removed [ 1054.246568] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1054.258222] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1054.285777] bond0 (unregistering): Released all slaves [ 1054.857473] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1055.699517] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1055.863115] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1056.019060] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 1056.025233] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1056.033158] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1056.124302] 8021q: adding VLAN 0 to HW filter on device team0 16:06:54 executing program 3: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[d::]:\nllbE\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 16:06:54 executing program 1: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vcs\x00', 0x4040, 0x0) write$apparmor_exec(r0, &(0x7f0000000140)={'exec ', '\\\x00'}, 0x7) accept$unix(r0, &(0x7f00000001c0)=@abs, &(0x7f00000000c0)=0x6e) add_key(&(0x7f0000000040)='encrypted\x00', &(0x7f0000000380)={'syz', 0x2}, &(0x7f0000000400)="0cb35fdb83e7640f58172da65e16fd100c9a8f1ef8a157cbf01aa3e359f6d9b3f8863f711fb51372a3dcbebb7f6b3f871c3cc59a22def9c3cf426145fe4f994d42f79cfad172b488c0b9845b7b9ac0aaca", 0x51, 0x0) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) rmdir(&(0x7f00000005c0)='./file0\x00') lsetxattr(&(0x7f0000000500)='./file0/file0\x00', &(0x7f0000000540)=@random={'osx.', 'ceph\x00'}, &(0x7f0000000580)='/cgroup\x00', 0x8, 0x1) statx(r0, &(0x7f0000000100)='./file0\x00', 0x100, 0x840, &(0x7f0000000280)) ioctl$SCSI_IOCTL_START_UNIT(r0, 0x5) mount(&(0x7f00000003c0)=@filename='./file0/file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ceph\x00', 0x8000, 0x0) 16:06:54 executing program 0: socket$inet_tcp(0x2, 0x1, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x2102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000100)=@nbd={'/de\n/nbd'}, &(0x7f0000001640)='./file0\x00', &(0x7f0000000040)='gfs2meta\x00', 0x0, 0x0) 16:06:54 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/ashmem\x00', 0x0, 0x0) r1 = syz_open_dev$cec(&(0x7f0000000640)='/dev/cec#\x00', 0x0, 0x2) ioctl$FIGETBSZ(r1, 0x2, &(0x7f0000000500)) ioctl$VIDIOC_EXPBUF(r1, 0xc0405610, &(0x7f0000000600)={0x0, 0x10000, 0x100000000, 0x4000, r1}) ioctl$TIOCGPTPEER(r1, 0x5441, 0x5) r2 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0xfffffffffffffed9, 0x80) writev(r1, &(0x7f0000000480)=[{&(0x7f0000000140)="5e69ab4cfba7ec3331522387cdab1a602223bba74f16db8118a2009c6a4c1158613d5ff56a3e8eca499a24f986c90144f079212eab585494c29a554b047ea3984372b3ab3c1bad02675bfd675541b6e1b48fe189078958a9fe64e6649e0910e03fca5b5b9866862f73c9186a510d8bd36e62c993be6711bc14908146acc0ff3be1f8dd330e1f0d412bba8278d6a7f2ee1ee96304faffffff60a395f7d188a86b2c63d01d107e77bbe065747650943c6eb2989bef9f6c2ccd44e30f", 0xbb}, {&(0x7f0000000200)="c2c9da7b766a11784bc9e24afb1a5571104a0bd415ddced568f57765d720e9ea9fb03965be51241974a6eddef83b20d10b4049351467aed20ed0186375233d80abaecd6f94d57fe6de61cfb56253dd89a35403b3f3b56b2e34ae1a45fc5d4464760855c84705e165", 0x168}, {&(0x7f0000000680)="d76fe143afbf45e6ca5a1325be898c95daadfa5590a3bb4f4720d31f43ad2addc393b41f4722bd7bd14170c2c13a7f2d2e6c8cff009fb40ab87bd4a1c95986a05c0f87ecb35180c69af0fb3a64c9a195b474da0ab88cb28000000000000000000000aca1134b24bb925505341add896b4c3a028107fca1d3eb7b3c8ac8d010a1804933f5d0d2db54702ee1c24ce654582391195bd458b56946c74dc55f59970d9f4187a0a7dfc16518851f3d1f29e7c32fcbe7f14e59ece63356df79699b403e736dc19221bc501d411e960d", 0xcc}, {&(0x7f0000000300)="ebc869cc7c9d1a77230aee6b059dd1096569b551922c0a5142ee3ded07d7dde4562699817123dda35a4294bdbbbaeecdaeef8bf4cbda58f795187385e6458e3d4dfc09f39cf9221de177cd05fb75a44228aa6216fcc1f687436750397531a9dde57d2644b42fd2eb3ea72da903ea5d65e0cffb964ef1892365099c801dd619d010a16052d93c2de71809a06afa32b0e54ad0b705e40bd9ad9aa5c53e0e0cd7d72455ce495b92517d9de615584c196d71f5bcb5c8fa713b410f2bba409271ff54b043b1784d9dfcfe817f9f1c6a5ad26d63edddeb", 0xd4}, {&(0x7f0000000780)="32ee00028127271e3d178be83c0b9e5c6f7473e6c280cb2f3cc9bbdb1d60f197a4b1e9faf7f2d32f9a99048481265d60d9a30bfd7d2ca17fdc2d3f5d83142ba21ef5c7a36bde", 0x46}], 0x5) set_thread_area(&(0x7f0000000580)={0x2, 0x1000, 0x1000, 0x44, 0xc38, 0x100000001, 0x2, 0x800, 0x7fffffff, 0x5}) setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f0000000800)={@in6={{0xa, 0x4e21, 0xffffffff, @mcast2, 0x100000001}}, 0x0, 0x0, 0x0, "704b608600b19330161266b09b89da8f76ea508610ed0509aad9431f97289f3ce47a210b4734b87ac0e6c981d163120cf201df3a959595d2859988e943c855f73ac6cd574944a53112e1060fb1c152c1"}, 0xd8) ioctl$PIO_FONTX(r2, 0x4b6c, &(0x7f0000000040)="1ec8df487893f6a25e5c98c7ceb44be107f96543329b28ccbd99e9ca32dfab8c2912df292a26d5c807af51dbbfb76d141ebd420952b0f8a78fabe121a804aa2b29e9ca75dd8de3bba9f28e430924ca72f4cb1fbf4b6540507550d127823c234a47c73c9ab90923e46eeaa015ac780c813fa2b1e144c3a429efda4f116c1963d22ee8") ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x400000000009) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000540)='/proc/sys/net/ipv4/vs/am_droprate\x00', 0x2, 0x0) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x0, 0x12, r0, 0x0) getsockopt$inet6_mtu(r2, 0x29, 0x17, &(0x7f0000000100), &(0x7f0000000280)=0x4) 16:06:54 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020200090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e0100000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e000000100000000010000e0"], 0x60}}, 0x0) 16:06:54 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, 0x0, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_INFO(r1, 0x29, 0x40, &(0x7f00000000c0)={'security\x00\x00\x00\x01V\x00'}, &(0x7f0000000140)=0x54) [ 1056.650717] ceph: device name is missing path (no : separator in [d::]: [ 1056.650717] llbE) 16:06:54 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020200090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e0100000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000002"], 0x60}}, 0x0) 16:06:54 executing program 0: socket$inet_tcp(0x2, 0x1, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x2102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000100)=@nbd={'/dev\nnbd'}, &(0x7f0000001640)='./file0\x00', &(0x7f0000000040)='gfs2meta\x00', 0x0, 0x0) 16:06:54 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000b4508a)='/dev/ashmem\x00', 0xfffffffffffffffd, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x200, 0x0) setsockopt$inet_mreqsrc(r1, 0x0, 0x28, &(0x7f0000000040)={@multicast2, @broadcast, @multicast1}, 0xc) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x400000000009) mmap(&(0x7f0000701000/0x2000)=nil, 0x2000, 0x2000002, 0x12, r0, 0x0) [ 1056.698260] gfs2: path_lookup on /de [ 1056.698260] /nbd returned error -2 [ 1056.706839] ceph: device name is missing path (no : separator in ./file0/file0) [ 1056.720105] IPVS: ftp: loaded support on port[0] = 21 [ 1056.738220] gfs2: path_lookup on /de [ 1056.738220] /nbd returned error -2 16:06:54 executing program 1: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f00000002c0)=ANY=[@ANYBLOB="5b5d3a3a5d3a0a6c2c623a00ef5faf36d5b0612bcd726118f674e5e547c1921ee2a81e6e8fc45bdaa8dd5fbddfbbbdd5adca7de8a86f33e2470335666ea0e76165b5ee682cad9960eb2535306d805eb16b6a11190f386a130e6344d8975f88dca5e46ddd20f5362627e2763a9b5aeaebdb669f4077eb010076f5c66555496cee2694e9946afa945c87782f9d1cc91c1586bcd9e62d40442b1c08cc58394e686b76c466046da702affd8fe538c3959d29984addd015a668931fb600"], &(0x7f0000000080)='./file0\x00', &(0x7f0000000380)='\x00\x00\x00\x00\x00', 0x0, 0x0) r0 = syz_open_dev$amidi(&(0x7f0000000140)='/dev/amidi#\x00', 0x6, 0x101) mknodat(r0, &(0x7f0000000280)='./file0/file0\x00', 0xc240, 0x1) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x2000, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x40000, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(r2, 0x0, 0x482, &(0x7f0000000100)=""/39, &(0x7f00000001c0)=0x27) ioctl$VHOST_NET_SET_BACKEND(r1, 0x4008af30, &(0x7f00000000c0)={0x1, r2}) [ 1056.817746] ceph: device name is missing path (no : separator in [d::]: [ 1056.817746] llbE) 16:06:54 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020200090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e0100000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010020000000000000"], 0x60}}, 0x0) 16:06:54 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x1ffd, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x400000000009) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x0, 0x12, r0, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x604100, 0x0) ioctl$SCSI_IOCTL_DOORUNLOCK(r1, 0x5381) [ 1056.870907] ceph: device name is missing path (no : separator in [d::]: [ 1056.870907] llbE) [ 1056.889037] gfs2: path_lookup on /dev [ 1056.889037] nbd returned error -2 [ 1056.926007] gfs2: path_lookup on /dev [ 1056.926007] nbd returned error -2 16:06:54 executing program 3: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[d::]:\nllbE\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 16:06:54 executing program 0: socket$inet_tcp(0x2, 0x1, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x2102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000100)=@nbd={'/dev//bd'}, &(0x7f0000001640)='./file0\x00', &(0x7f0000000040)='gfs2meta\x00', 0x0, 0x0) 16:06:54 executing program 1: r0 = memfd_create(&(0x7f00000001c0)='ppp0+,selfppp0vmnet1proc\']\x00', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000050000)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$KVM_SET_GUEST_DEBUG(r0, 0x4048ae9b, &(0x7f0000000200)={0x50000, 0x0, [0x7ff, 0xffffffffffffffff, 0x3, 0x7, 0x3d3d, 0x5, 0x0, 0x3]}) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() timer_create(0x0, &(0x7f0000066000)={0x0, 0x12}, &(0x7f0000000400)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x1c9c380}, {0x0, 0x9}}, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000140)='/dev/null\x00', 0x800, 0x0) ioctl$TCSETS(r0, 0x5402, 0x0) tkill(0x0, 0x0) r3 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_INFO(r3, 0x40bc5311, &(0x7f0000000000)={0x80, 0x1, 'clien\x00\x00\x00\x00\x00\x00\x04\x00\x02\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00', 0x0, "7fd82d5e02ca3901", "88e7ed00007fff051eae961ef6c6992b7e6e560000f9fff77711be18a3d918e0"}) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f00000001c0)='./file0\x00') creat(&(0x7f0000000700)='./bus\x00', 0x0) link(&(0x7f0000000080)='./bus\x00', &(0x7f00000000c0)='./file1\x00') openat$sequencer2(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/sequencer2\x00', 0x200, 0x0) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r2, 0x84, 0xc, &(0x7f0000000280)=0x3, 0x4) clone(0x2102001ef9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pivot_root(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00') mount(&(0x7f0000000040)=@nullb='[]::]:\nllb:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 16:06:54 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020200090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e0100000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000200000000"], 0x60}}, 0x0) 16:06:54 executing program 0: socket$inet_tcp(0x2, 0x1, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x2102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000100)=@nbd={'/dev/\nbd'}, &(0x7f0000001640)='./file0\x00', &(0x7f0000000040)='gfs2meta\x00', 0x0, 0x0) [ 1057.053894] gfs2: path_lookup on /dev//bd returned error -2 [ 1057.071649] ceph: device name is missing path (no : separator in [d::]: [ 1057.071649] llbE) [ 1057.129924] libceph: parse_ips bad ip '[]::]: [ 1057.129924] llb' [ 1057.160928] gfs2: path_lookup on /dev/ [ 1057.160928] bd returned error -2 [ 1057.334237] IPVS: ftp: loaded support on port[0] = 21 16:06:55 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, 0x0, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_INFO(r1, 0x29, 0x40, &(0x7f00000000c0)={'security\x00\x00\x00\xf8\x02\x00'}, &(0x7f0000000140)=0x54) 16:06:55 executing program 0: socket$inet_tcp(0x2, 0x1, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x2102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000100)=@nbd={'/dev/%bd'}, &(0x7f0000001640)='./file0\x00', &(0x7f0000000040)='gfs2meta\x00', 0x0, 0x0) 16:06:55 executing program 3: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[d::]:\nllbE\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='deph\x00', 0x0, 0x0) 16:06:55 executing program 1: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_dccp(0xa, 0x6, 0x0) getsockname(r0, &(0x7f00000001c0)=@pptp={0x18, 0x2, {0x0, @dev}}, &(0x7f0000000000)=0x80) r1 = syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x7, 0x440) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000240)=[@in={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x1e}}, @in={0x2, 0x4e21, @remote}, @in={0x2, 0x3f, @broadcast}, @in6={0xa, 0x4e22, 0x4, @ipv4={[], [], @local}, 0xcf49}, @in={0x2, 0x4e22, @broadcast}, @in6={0xa, 0x4e21, 0xac, @empty, 0x3}], 0x78) mount(&(0x7f0000000040)=@nullb='[]::]:\nllb:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 16:06:55 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020200090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e0100000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e0000001e000000100000000"], 0x60}}, 0x0) 16:06:55 executing program 4: r0 = syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x0) write$P9_RREMOVE(r0, &(0x7f0000000080)={0x7, 0x7b, 0x2}, 0x7) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f00000000c0)={@local, @rand_addr=0x9, 0x0, 0x5, [@local, @multicast2, @rand_addr=0x6, @broadcast, @dev={0xac, 0x14, 0x14, 0xe}]}, 0x24) r1 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000b4508a)='/dev/ashmem\x00', 0x0, 0x0) r2 = dup(r1) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='net/ip_vs_stats_percpu\x00') clone(0x10000000008000, 0x0, 0x0, 0x0, 0x0) clone(0x1100000, 0x0, 0x0, 0x0, 0x0) write$UHID_CREATE2(r3, &(0x7f00000001c0)={0xb, 'syz0\x00', 'syz1\x00', 'syz1\x00', 0x87, 0x80, 0x8, 0xffffffffffffffff, 0x8, 0x912, "fcb19f8e2a8144c8480deed6203801d3bf88c53030f9f037528d25fc721227682c70c756acd277a2779252076376ef31d6e920ffd5972b05cb0b9661176ecec724e5c88daeaeecde82ef91b9db09809f7bb947e6464e879d84051ade69f9fb5d5191aa2f22dd49bc0d7c53a822add460684a015144fa33e63f1e23a2b09d754a9a7ca137ee6f25"}, 0x19f) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) sendfile(r4, r3, 0x0, 0xe0) ioctl$VHOST_SET_VRING_KICK(r1, 0x4008af20, &(0x7f0000000000)={0x3, r2}) ioctl$ASHMEM_SET_SIZE(r1, 0x40087703, 0x2) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x0, 0x12, r1, 0x0) 16:06:55 executing program 0: socket$inet_tcp(0x2, 0x1, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x2102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000100)=@nbd={'/dev/.bd'}, &(0x7f0000001640)='./file0\x00', &(0x7f0000000040)='gfs2meta\x00', 0x0, 0x0) [ 1057.449784] gfs2: path_lookup on /dev/%bd returned error -2 [ 1057.453286] libceph: parse_ips bad ip '[]::]: [ 1057.453286] llb' [ 1057.461677] gfs2: path_lookup on /dev/%bd returned error -2 16:06:55 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020200090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e0100000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010040030000000000"], 0x60}}, 0x0) [ 1057.509211] IPVS: ftp: loaded support on port[0] = 21 16:06:55 executing program 1: mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x10, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[]::]:\nllb:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 16:06:55 executing program 3: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[d::]:\nllbE\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='\neph\x00', 0x0, 0x0) [ 1057.613336] gfs2: path_lookup on /dev/.bd returned error -2 [ 1057.625700] libceph: parse_ips bad ip '[]::]: [ 1057.625700] llb' 16:06:55 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000b4508a)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x400000000009) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x0, 0x12, r0, 0x0) arch_prctl$ARCH_MAP_VDSO_64(0x2003, 0x7f) 16:06:55 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020200090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e0100000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e000000100000000fffffffb"], 0x60}}, 0x0) [ 1057.664782] gfs2: path_lookup on /dev/.bd returned error -2 [ 1057.939870] IPVS: ftp: loaded support on port[0] = 21 16:06:55 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, 0x0, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_INFO(r1, 0x29, 0x40, &(0x7f00000000c0)={'security\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02.\x00'}, &(0x7f0000000140)=0x54) 16:06:55 executing program 0: socket$inet_tcp(0x2, 0x1, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x2102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000100)=@nbd={'/dev/n\nd'}, &(0x7f0000001640)='./file0\x00', &(0x7f0000000040)='gfs2meta\x00', 0x0, 0x0) 16:06:55 executing program 1: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_LOG_BASE(r0, 0x4008af04, &(0x7f0000000140)=&(0x7f00000000c0)) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[]::]:\nllb:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 16:06:55 executing program 3: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[d::]:\nllbE\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='%eph\x00', 0x0, 0x0) 16:06:55 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020200090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e0100000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000800000000"], 0x60}}, 0x0) 16:06:55 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x400000000009) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x0, 0x12, r0, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x7f, 0x8000) r2 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x0, 0x40000) fanotify_mark(r1, 0x23, 0x10, r2, &(0x7f00000000c0)='./file0\x00') r3 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/mixer\x00', 0x0, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r3, 0x6, 0x23, &(0x7f00000003c0)={&(0x7f0000701000/0x2000)=nil, 0x2000}, &(0x7f0000000400)=0x10) ioctl$BINDER_GET_NODE_DEBUG_INFO(r1, 0xc018620b, &(0x7f0000000100)={0x0}) r5 = mmap$binder(&(0x7f0000700000/0x2000)=nil, 0x2000, 0x2000004, 0x10110, r2, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000380)={0x90, 0x0, &(0x7f00000001c0)=[@free_buffer={0x40086303, r4}, @request_death={0x400c630e, 0x3, 0x3}, @release={0x40046306, 0x2}, @enter_looper, @acquire_done={0x40106309, r5}, @transaction_sg={0x40486311, {{0x1, 0x0, 0x3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10, &(0x7f0000000140), &(0x7f0000000180)=[0x28, 0x18]}, 0x4e}}, @increfs={0x40046304, 0x4}], 0xcc, 0x0, &(0x7f0000000280)="7e36bdd20a1477a8a9306ee5e26431fa79154df016dc07e84b0250d4246a680cf1a99f47eeaee3748f254662fec653396798f212e82e2b7c618e06e6a101cc177494ec7912e575ae2ab2a898aed4af2d58892a1c18d2d54d3d8dff973e7f7aa09cf5364705ed0c1c25522a5962c6d2df1d2d50a4428f6a16027d8b59b3ef84670c8dcc52f298b3fe781e019f72b69820c24646d5637f3db794782dc63ed58642a30c34e1ef15d3fa852b554e24a482083b4526576ff7fa0a2508b770699efc8fa37764d1ef75f70c419238f8"}) 16:06:55 executing program 3: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[d::]:\nllbE\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='c%ph\x00', 0x0, 0x0) [ 1058.035335] libceph: parse_ips bad ip '[]::]: [ 1058.035335] llb' [ 1058.062470] gfs2: path_lookup on /dev/n [ 1058.062470] d returned error -2 16:06:55 executing program 0: socket$inet_tcp(0x2, 0x1, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x2102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000100)=@nbd={'/dev/nbu'}, &(0x7f0000001640)='./file0\x00', &(0x7f0000000040)='gfs2meta\x00', 0x0, 0x0) [ 1058.093869] IPVS: ftp: loaded support on port[0] = 21 16:06:55 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000b4508a)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x400000000009) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x0, 0x12, r0, 0x0) r1 = syz_open_dev$amidi(&(0x7f00000000c0)='/dev/amidi#\x00', 0x0, 0x2) setsockopt$inet6_opts(r1, 0x29, 0x3f, &(0x7f0000000100)=@fragment={0xff, 0x0, 0x0, 0x3fca282f, 0x0, 0xffffffffffff7fff, 0x65}, 0x8) 16:06:55 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020200090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e0100000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e0000001fffffffb00000000"], 0x60}}, 0x0) 16:06:55 executing program 1: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x4, 0x208200) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f00000001c0)={0x0, 0x100, "20aea974ad3861682505394466f0edb5190de0403982a43250f3b989e2526820", 0xfffffffffffffffd, 0x3f, 0x7fff, 0x257, 0x100}) r1 = syz_open_dev$media(&(0x7f00000000c0)='/dev/media#\x00', 0x3, 0x0) ioctl$EVIOCGSW(r1, 0x8040451b, &(0x7f0000000240)=""/242) mount(&(0x7f0000000040)=@nullb='[]::]:\nllb:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='trusted.overlay.origin\x00', &(0x7f00000003c0)='y\x00', 0x2, 0x1) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000140)) [ 1058.188545] gfs2: path_lookup on /dev/nbu returned error -2 16:06:55 executing program 3: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[d::]:\nllbE\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='cdph\x00', 0x0, 0x0) 16:06:56 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, 0x0, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_INFO(r1, 0x29, 0x40, &(0x7f00000000c0)={'security\x00\x00\x00\x00~\x00'}, &(0x7f0000000140)=0x54) 16:06:56 executing program 3: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[d::]:\nllbE\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='c\nph\x00', 0x0, 0x0) 16:06:56 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000b4508a)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x400000000009) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x0, 0x10, r0, 0x0) 16:06:56 executing program 0: socket$inet_tcp(0x2, 0x1, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x2102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000100)=@nbd={'/dev/nb.'}, &(0x7f0000001640)='./file0\x00', &(0x7f0000000040)='gfs2meta\x00', 0x0, 0x0) 16:06:56 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020200090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e0100000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e0000001fbffffff00000000"], 0x60}}, 0x0) 16:06:56 executing program 0: socket$inet_tcp(0x2, 0x1, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x2102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000100)=@nbd={'/dev/nbo'}, &(0x7f0000001640)='./file0\x00', &(0x7f0000000040)='gfs2meta\x00', 0x0, 0x0) [ 1058.838034] gfs2: path_lookup on /dev/nb. returned error -2 [ 1058.860499] gfs2: path_lookup on /dev/nb. returned error -2 16:06:56 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000b4508a)='/dev/ashmem\x00', 0x0, 0x0) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x0, 0x12, r0, 0x0) 16:06:56 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020200090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e0100000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000004"], 0x60}}, 0x0) [ 1058.888680] IPVS: ftp: loaded support on port[0] = 21 16:06:56 executing program 3: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[d::]:\nllbE\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ce\nh\x00', 0x0, 0x0) 16:06:56 executing program 0: socket$inet_tcp(0x2, 0x1, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x2102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000100)=@nbd={'/dev/nbl'}, &(0x7f0000001640)='./file0\x00', &(0x7f0000000040)='gfs2meta\x00', 0x0, 0x0) [ 1058.988286] gfs2: path_lookup on /dev/nbo returned error -2 [ 1059.160376] gfs2: path_lookup on /dev/nbl returned error -2 16:06:56 executing program 1: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f00000001c0)={{{@in6=@loopback, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @empty}}, 0x0, @in=@multicast1}}, &(0x7f00000000c0)=0xe8) r1 = accept(0xffffffffffffffff, &(0x7f00000003c0)=@pppol2tp, &(0x7f0000000140)=0x80) r2 = syz_open_dev$mice(&(0x7f0000000580)='/dev/input/mice\x00', 0x0, 0x80) ioctl$FIONREAD(r2, 0x541b, &(0x7f00000005c0)) setsockopt$inet_group_source_req(r1, 0x0, 0x2e, &(0x7f0000000440)={0x9d65, {{0x2, 0x4e23, @empty}}, {{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x1c}}}}, 0x108) quotactl(0x5, &(0x7f0000000040)='./file0\x00', r0, &(0x7f00000002c0)="4f54d746637720aa6052bb03c7727ec0af75acd1b52fe610e7f1ee97d216a8b90f76f9293ee2380457a3f12027d907597d186635ddec9018a5cedb2071c97796b1db265ed9e376d86fad869cb451ceb2f21e95bbee5439e6fb5775457c29581ddcc347552f03ae36c70c90fc91e356876b4b1578eccd173eb97f266855344f3f75ca1b9304586dd6071446646b8383f7fa8c196e86cf955d2177dd55b9f0c9a9772f459c7fefaccb63299123185856316f965488931d937f8e7467ec525f7a25f6d4721fbf466f7096f5574a4e33a5dcfb45f2d7e5be5fab0bda714f9f72da74887b2e863db4956ab9288d6bd57217d9f3c3840b") mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=ANY=[@ANYBLOB="5b5d3a3a5d3a0a6c6c626da4e0d18aad3a00"], &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 16:06:56 executing program 4: r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=0xffffffffffffffff, 0x4) fremovexattr(r0, &(0x7f0000000040)=@random={'btrfs.', 'cgroupppp0\x00'}) r1 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000b4508a)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r1, 0x40087703, 0x400000000009) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x0, 0x12, r1, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000000c0)={{{@in6=@remote, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6}}, &(0x7f00000001c0)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000200)={{{@in=@local, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in6=@ipv4={[], [], @dev}}}, &(0x7f0000000300)=0xe8) r4 = getuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@dev, @in6=@ipv4={[], [], @local}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@multicast1}}, &(0x7f0000000440)=0xe8) getresuid(&(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)=0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000540)={0x0, 0x0}, &(0x7f0000000580)=0xc) getresuid(&(0x7f00000005c0), &(0x7f0000000600), &(0x7f0000000640)=0x0) getgroups(0x3, &(0x7f0000000680)=[0x0, 0x0, 0xee00]) r10 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000ac0)='/dev/vhci\x00', 0x800, 0x0) r11 = syz_genetlink_get_family_id$tipc(&(0x7f0000000b40)='TIPC\x00') sendmsg$TIPC_CMD_SET_NETID(r10, &(0x7f0000000c00)={&(0x7f0000000b00)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000bc0)={&(0x7f0000000b80)={0x24, r11, 0x400, 0x70bd2a, 0x25dfdbff, {{}, 0x0, 0x800b, 0x0, {0x8, 0x2, 0x9}}, [""]}, 0x24}, 0x1, 0x0, 0x0, 0x4000000}, 0x8040) getresgid(&(0x7f00000006c0), &(0x7f0000000700)=0x0, &(0x7f0000000740)) stat(&(0x7f0000000780)='./file0\x00', &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000000840)='./file0\x00', &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x6, &(0x7f00000009c0)=[0x0, 0xee00, 0xee00, 0xee00, 0xee00, 0xee00]) fsetxattr$system_posix_acl(r0, &(0x7f0000000080)='system.posix_acl_default\x00', &(0x7f0000000a00)={{}, {0x1, 0x4}, [{0x2, 0x6, r2}, {0x2, 0x6, r3}, {0x2, 0x4, r4}, {0x2, 0x2, r5}, {0x2, 0x2, r6}, {0x2, 0x2, r7}, {0x2, 0x6, r8}], {0x4, 0x4}, [{0x8, 0x2, r9}, {0x8, 0x2, r12}, {0x8, 0x1, r13}, {0x8, 0x2, r14}, {0x8, 0x0, r15}, {0x8, 0x1, r16}], {0x10, 0x5}, {0x20, 0x2}}, 0x8c, 0x1) socket$bt_rfcomm(0x1f, 0x3, 0x3) [ 1059.483886] IPVS: ftp: loaded support on port[0] = 21 16:06:57 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020200090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e0100000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000020"], 0x60}}, 0x0) 16:06:57 executing program 3: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[d::]:\nllbE\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ce%h\x00', 0x0, 0x0) 16:06:57 executing program 0: socket$inet_tcp(0x2, 0x1, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x2102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000100)=@nbd={'/dev/nb-'}, &(0x7f0000001640)='./file0\x00', &(0x7f0000000040)='gfs2meta\x00', 0x0, 0x0) 16:06:57 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000b4508a)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x400000000009) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x0, 0x12, r0, 0x0) 16:06:57 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, 0x0, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_INFO(r1, 0x29, 0x40, &(0x7f00000000c0)={'security\x00\x00\x00\x03\xfc\x00'}, &(0x7f0000000140)=0x54) 16:06:57 executing program 3: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[d::]:\nllbE\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='cepd\x00', 0x0, 0x0) 16:06:57 executing program 0: socket$inet_tcp(0x2, 0x1, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x2102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000100)=@nbd={'/dev/nb/'}, &(0x7f0000001640)='./file0\x00', &(0x7f0000000040)='gfs2meta\x00', 0x0, 0x0) [ 1059.698281] gfs2: path_lookup on /dev/nb- returned error -2 [ 1059.764457] IPVS: ftp: loaded support on port[0] = 21 16:06:57 executing program 4: r0 = socket$kcm(0x11, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000340)={&(0x7f0000000100)=@in6={0xa, 0x6558, 0xb, @mcast1={0xff, 0x1, [0x0, 0x300, 0x0, 0x0, 0x0, 0x100000000000000]}}, 0x80, 0x0}, 0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x20000, 0x0) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r1, 0x12, 0x2, &(0x7f0000000180)=""/193, &(0x7f0000000040)=0xc1) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x0, 0x12, 0xffffffffffffffff, 0x0) 16:06:57 executing program 3: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[d::]:\nllbE\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='cep\n\x00', 0x0, 0x0) 16:06:57 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020200090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e0100000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000017fffffff00000000"], 0x60}}, 0x0) [ 1059.863575] gfs2: path_lookup on /dev/nb/ returned error -2 [ 1059.920686] gfs2: path_lookup on /dev/nb/ returned error -2 [ 1060.732668] bridge0: port 1(bridge_slave_0) entered blocking state [ 1060.739472] bridge0: port 1(bridge_slave_0) entered disabled state [ 1060.746387] device bridge_slave_0 entered promiscuous mode [ 1060.775455] bridge0: port 2(bridge_slave_1) entered blocking state [ 1060.782369] bridge0: port 2(bridge_slave_1) entered disabled state [ 1060.789487] device bridge_slave_1 entered promiscuous mode [ 1060.815668] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1060.842619] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1060.920944] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1060.949958] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1061.088557] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1061.095729] team0: Port device team_slave_0 added [ 1061.136495] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1061.143846] team0: Port device team_slave_1 added [ 1061.186556] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1061.230023] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1061.261390] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1061.301974] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1061.539007] device bridge_slave_1 left promiscuous mode [ 1061.544572] bridge0: port 2(bridge_slave_1) entered disabled state [ 1061.552675] device bridge_slave_0 left promiscuous mode [ 1061.558687] bridge0: port 1(bridge_slave_0) entered disabled state [ 1061.595539] team0 (unregistering): Port device team_slave_1 removed [ 1061.605536] team0 (unregistering): Port device team_slave_0 removed [ 1061.615971] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1061.629245] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1061.656719] bond0 (unregistering): Released all slaves [ 1061.785086] bridge0: port 2(bridge_slave_1) entered blocking state [ 1061.791529] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1061.798253] bridge0: port 1(bridge_slave_0) entered blocking state [ 1061.804630] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1061.813313] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 1062.537914] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1063.517126] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1063.671650] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1063.810471] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 1063.816633] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1063.824026] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1063.913650] 8021q: adding VLAN 0 to HW filter on device team0 16:07:02 executing program 1: clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[]::]:\nllb:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 16:07:02 executing program 0: socket$inet_tcp(0x2, 0x1, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x2102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000100)=@nbd={'/dev/nbe'}, &(0x7f0000001640)='./file0\x00', &(0x7f0000000040)='gfs2meta\x00', 0x0, 0x0) 16:07:02 executing program 3: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[d::]:\nllbE\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='cep%\x00', 0x0, 0x0) 16:07:02 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000b4508a)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x400000000009) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x0, 0x12, r0, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x8, 0x2000) ioctl$DRM_IOCTL_AGP_ACQUIRE(r1, 0x6430) 16:07:02 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020200090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e0100000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000001000000000"], 0x60}}, 0x0) 16:07:02 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, 0x0, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_INFO(r1, 0x29, 0x40, &(0x7f00000000c0)={'security\x00\x00\x00\x03\xfe\x00'}, &(0x7f0000000140)=0x54) [ 1064.435177] libceph: parse_ips bad ip '[]::]: [ 1064.435177] llbm¤àÑŠ­' [ 1064.443286] libceph: parse_ips bad ip '[]::]: [ 1064.443286] llbm¤àÑŠ­' 16:07:02 executing program 3: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[d::]:\nllbE\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x05', 0x0, 0x0) 16:07:02 executing program 1: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=ANY=[@ANYBLOB], &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) [ 1064.481149] gfs2: path_lookup on /dev/nbe returned error -2 [ 1064.516502] gfs2: path_lookup on /dev/nbe returned error -2 [ 1064.520322] IPVS: ftp: loaded support on port[0] = 21 16:07:02 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000b4508a)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x400000000009) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x0, 0x12, r0, 0x0) 16:07:02 executing program 0: socket$inet_tcp(0x2, 0x1, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x2102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000100)=@nbd={'/dev/nbX'}, &(0x7f0000001640)='./file0\x00', &(0x7f0000000040)='gfs2meta\x00', 0x0, 0x0) 16:07:02 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020200090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e0100000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010800000000000000"], 0x60}}, 0x0) 16:07:02 executing program 3: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[d::]:\nllbE\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 16:07:02 executing program 0: socket$inet_tcp(0x2, 0x1, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x2102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000100)=@nbd={'/dev/nb\n'}, &(0x7f0000001640)='./file0\x00', &(0x7f0000000040)='gfs2meta\x00', 0x0, 0x0) 16:07:02 executing program 1: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f00000001c0)=ANY=[@ANYBLOB="0500000000ad0000006c623c00ff69df141c9c8b71af462b02daff12c0c9ad59ed3d5d916a0a2f3b35f50ee030bc5963b21fa8ca36854ad690eb36fa2a4b4da97f385508d1fe3484c074edc51c3079124df4d4e7d02ffa8c875a9ef306c787536c6fa15384e69eda9b528276bf094e15850c8be7e26d9e70ef59b691c7"], &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) [ 1064.636593] gfs2: path_lookup on /dev/nbX returned error -2 16:07:02 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000b4508a)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x400000000009) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x210402, 0x0) ioctl$KDSETKEYCODE(r1, 0x4b4d, &(0x7f0000000040)={0x5, 0xf49fb6f}) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x0, 0x12, r0, 0x0) [ 1064.701444] ceph: device name is missing path (no : separator in [d::]: [ 1064.701444] llbE) 16:07:02 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020200090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e0100000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000100"], 0x60}}, 0x0) [ 1064.749502] gfs2: path_lookup on /dev/nb [ 1064.749502] returned error -2 [ 1064.779917] ceph: device name is missing path (no : separator in [d::]: [ 1064.779917] llbE) 16:07:02 executing program 0: socket$inet_tcp(0x2, 0x1, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x2102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000100)=@nbd={'/dev/nbi'}, &(0x7f0000001640)='./file0\x00', &(0x7f0000000040)='gfs2meta\x00', 0x0, 0x0) [ 1064.810206] ceph: device name is missing path (no : separator in ) [ 1064.856632] ceph: device name is missing path (no : separator in ) [ 1064.929979] gfs2: path_lookup on /dev/nbi returned error -2 [ 1065.038083] IPVS: ftp: loaded support on port[0] = 21 16:07:02 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, 0x0, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_INFO(r1, 0x29, 0x40, &(0x7f00000000c0)={'security\x00\x00\x00~\x00'}, &(0x7f0000000140)=0x54) 16:07:02 executing program 0: socket$inet_tcp(0x2, 0x1, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x2102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000100)=@nbd={'/dev/nbp'}, &(0x7f0000001640)='./file0\x00', &(0x7f0000000040)='gfs2meta\x00', 0x0, 0x0) 16:07:02 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000b4508a)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x400000100009) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x0, 0x12, r0, 0x0) 16:07:02 executing program 3: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[d::]:\nllbE\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 16:07:02 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020200090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e0100000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e0000001000000007fffffff"], 0x60}}, 0x0) 16:07:02 executing program 1: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[]::]:\nllb:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) utimes(&(0x7f0000000200)='./file0\x00', &(0x7f00000001c0)={{0x77359400}}) [ 1065.128944] ceph: device name is missing path (no : separator in [d::]: [ 1065.128944] llbE) [ 1065.142241] libceph: parse_ips bad ip '[]::]: [ 1065.142241] llb' [ 1065.151181] gfs2: path_lookup on /dev/nbp returned error -2 [ 1065.155350] ceph: device name is missing path (no : separator in [d::]: [ 1065.155350] llbE) [ 1065.168349] gfs2: path_lookup on /dev/nbp returned error -2 [ 1065.173061] IPVS: ftp: loaded support on port[0] = 21 16:07:02 executing program 3: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[d::]:\nllbE\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 16:07:02 executing program 0: socket$inet_tcp(0x2, 0x1, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x2102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000100)=@nbd={'/dev/nb#'}, &(0x7f0000001640)='./file0\x00', &(0x7f0000000040)='gfs2meta\x00', 0x0, 0x0) 16:07:02 executing program 1: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[]::]:\nllb:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) [ 1065.175721] libceph: parse_ips bad ip '[]::]: [ 1065.175721] llb' 16:07:02 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ashmem\x00', 0x400000, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x400000000009) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x40, 0x0) ioctl$EVIOCGID(r1, 0x80084502, &(0x7f00000000c0)=""/86) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x0, 0x10, r0, 0x0) 16:07:02 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020200090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e0100000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e0000001010000e000000000"], 0x60}}, 0x0) [ 1065.230286] ceph: device name is missing path (no : separator in [d::]: [ 1065.230286] llbE) 16:07:02 executing program 3: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[d::]:\nllbE\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\xff', 0x0, 0x0) [ 1065.283879] gfs2: path_lookup on /dev/nb# returned error -2 [ 1065.354717] libceph: parse_ips bad ip '[]::]: [ 1065.354717] llb' [ 1065.430203] libceph: parse_ips bad ip '[]::]: [ 1065.430203] llb' [ 1065.591819] IPVS: ftp: loaded support on port[0] = 21 16:07:03 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, 0x0, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_INFO(r1, 0x29, 0x40, &(0x7f00000000c0)={'security\x00\x00\x00\x00\x00\x03\xfe\x00'}, &(0x7f0000000140)=0x54) 16:07:03 executing program 0: socket$inet_tcp(0x2, 0x1, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x2102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000100)=@nbd={'/dev/nbP'}, &(0x7f0000001640)='./file0\x00', &(0x7f0000000040)='gfs2meta\x00', 0x0, 0x0) 16:07:03 executing program 4: r0 = syz_open_dev$usbmon(&(0x7f0000000180)='/dev/usbmon#\x00', 0x9, 0x400) ioctl$TCXONC(r0, 0x540a, 0x3) r1 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000b4508a)='/dev/ashmem\x00', 0x4000000000000000, 0x0) ioctl$ASHMEM_SET_SIZE(r1, 0x40087703, 0x84) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x8000000002000003, 0x2000016, r1, 0xffffffffffffffff) writev(r1, &(0x7f0000000140)=[{&(0x7f0000000000)="fc83722e3d6c55487b605c2def2ead4a60e934", 0x13}, {&(0x7f0000000040)="92266c9aba4b2a523c9662b9f2fe5142adb246775425f9e2ecbe57f1bba22158213a560814eb54d78729", 0x2a}, {&(0x7f0000000080)="73cc36854a339941badf9f276207f60926434fea5fead31975e9606a81e479bf64a53a64c74f22924bda463700f0027b7589b8c2f29f3eee37c8ca46e8599bb3a011610c2d86c1829673e036617d7237e4e62f258c550f84be1164488d361d448725fbf90ab9b3377011b982200da19d7203d80c4b3e10614219f3ca975f937855ed775ed3a508f0c332fb58c5d90e2fb43b0ce6420256bf8db80ed450b3234ee9", 0xa1}], 0x3) 16:07:03 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020200090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e0100000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000008"], 0x60}}, 0x0) 16:07:03 executing program 3: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[d::]:\nllbE\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 16:07:03 executing program 1: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x80000000, 0x40) ioctl$TCXONC(r0, 0x540a, 0x3) mount(&(0x7f0000000040)=@nullb='[]::]:\nllb:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) [ 1065.693882] libceph: parse_ips bad ip '[]::]: [ 1065.693882] llb' [ 1065.721443] libceph: parse_ips bad ip '[]::]: [ 1065.721443] llb' [ 1065.727968] gfs2: path_lookup on /dev/nbP returned error -2 [ 1065.728942] IPVS: ftp: loaded support on port[0] = 21 16:07:03 executing program 1: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000001c0)={{{@in6=@dev, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@dev}}, &(0x7f00000000c0)=0xe8) getresgid(&(0x7f0000000400), &(0x7f0000000480), &(0x7f0000000380)=0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000140)={0xffffffffffffffff}, 0x13f, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000440)={0x5, 0x10, 0xfa00, {&(0x7f00000004c0), r2, 0x2}}, 0x18) chown(&(0x7f0000000000)='./file0\x00', r0, r1) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f00000002c0)={0x0, 0x7f}, &(0x7f0000000300)=0x8) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, &(0x7f0000000340)=r3, 0x4) sysfs$3(0x3) mount(&(0x7f00000006c0)=ANY=[@ANYBLOB="1c0d15872dd612a690d97567fba375cb883c033f980bc580f3cd43d5da34c552d57fdf440203000000d1166fbdf83b210f914c877b8f8a39c1ec268aae01f4dd8eee337c92a2e671c70f298cfbe43f07d5056eba9668840bdc204503e57820de53c829f8c48b85c0e08b030000000027374552c2083ebfaf5bbcfcf2ff4c1932d44708820dba27f00b837f3011117f0f7d4768080000002e73457820430d75c40542cfab3028ed82b6e58ab6af9c42d9642ddf1eb8ab99226643b66790ab27c5329c00000000000000"], &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 16:07:03 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000b4508a)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x400000000009) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000000)={0x7, 0x1, 0x5, 0x3, 0x80000000, 0x8}) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x0, 0x12, r0, 0x0) [ 1065.734091] ceph: device name is missing path (no : separator in [d::]: [ 1065.734091] llbE) 16:07:03 executing program 3: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[d::]:\nllbE\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 16:07:03 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020200090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e0100000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000034000"], 0x60}}, 0x0) 16:07:03 executing program 0: socket$inet_tcp(0x2, 0x1, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x2102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000100)=@nbd={'/dev/nbc'}, &(0x7f0000001640)='./file0\x00', &(0x7f0000000040)='gfs2meta\x00', 0x0, 0x0) [ 1065.863012] ceph: device name is missing path (no : separator in  ‡-Ö¦Ùugû£uˈ<?˜ Å€óÍCÕÚ4ÅRÕßD) 16:07:03 executing program 4: r0 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x4, 0x200000) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f0000000040)={0x6, 0xfff, 0x3, 0x7, 0x800}) socket$inet6_dccp(0xa, 0x6, 0x0) r1 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000b4508a)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r1, 0x40087703, 0x400000000009) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x0, 0x12, r1, 0x0) [ 1065.919889] ceph: device name is missing path (no : separator in [d::]: [ 1065.919889] llbE) [ 1065.932679] gfs2: path_lookup on /dev/nbc returned error -2 [ 1065.953039] gfs2: path_lookup on /dev/nbc returned error -2 [ 1066.011252] ceph: device name is missing path (no : separator in [d::]: [ 1066.011252] llbE) [ 1066.282338] IPVS: ftp: loaded support on port[0] = 21 16:07:04 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, 0x0, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_INFO(r1, 0x29, 0x40, &(0x7f00000000c0)={'security\x00\x00\x00\x02.\x00'}, &(0x7f0000000140)=0x54) 16:07:04 executing program 1: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$vbi(&(0x7f0000000200)='/dev/vbi#\x00', 0x0, 0x2) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x80000, 0x0) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, &(0x7f0000000140)={0x3, &(0x7f00000000c0)=[{}, {}, {0x0}]}) ioctl$DRM_IOCTL_NEW_CTX(r0, 0x40086425, &(0x7f00000001c0)={r1, 0x40000000007}) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="5b5d3a3a5d3a0a6c6c623ae1d78cf3d1fc000000000000004600"], &(0x7f0000000240)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000080)='trusted.overlay.redirect\x00', &(0x7f0000000280)='./file0\x00', 0x8, 0x2) 16:07:04 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020200090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e0100000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000010"], 0x60}}, 0x0) 16:07:04 executing program 0: socket$inet_tcp(0x2, 0x1, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x2102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000100)=@nbd={'/dev/nbx'}, &(0x7f0000001640)='./file0\x00', &(0x7f0000000040)='gfs2meta\x00', 0x0, 0x0) 16:07:04 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000b4508a)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x400000000009) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x1, 0x16, r0, 0x0) 16:07:04 executing program 3: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[d::]:\nllbE\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\xc0', 0x0, 0x0) [ 1066.451735] gfs2: path_lookup on /dev/nbx returned error -2 [ 1066.454388] ceph: device name is missing path (no : separator in []::]: [ 1066.454388] llb:á׌óÑü) [ 1066.498451] IPVS: ftp: loaded support on port[0] = 21 16:07:04 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020200090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e0100000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e000000100fbffffff000000"], 0x60}}, 0x0) 16:07:04 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000b4508a)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x400000000009) prctl$PR_GET_FP_MODE(0x2e) r1 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x400, 0x0) setsockopt$bt_BT_POWER(r1, 0x112, 0x9, &(0x7f0000000400)=0x80000000, 0x1) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x0, 0x12, r0, 0x0) r2 = syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x39300b74, 0x40001) ioctl$LOOP_GET_STATUS(r2, 0x4c03, &(0x7f0000000100)) getsockopt$ARPT_SO_GET_INFO(r2, 0x0, 0x60, &(0x7f0000000300)={'filter\x00'}, &(0x7f0000000380)=0x44) r3 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x80080, 0x0) getsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r3, 0x84, 0xc, &(0x7f0000000040), &(0x7f0000000080)=0x4) getsockopt$EBT_SO_GET_INIT_ENTRIES(r3, 0x0, 0x83, &(0x7f0000000240)={'nat\x00', 0x0, 0x4, 0x7, [], 0x3, &(0x7f00000001c0)=[{}, {}, {}], &(0x7f0000000200)=""/7}, &(0x7f00000002c0)=0x78) 16:07:04 executing program 0: socket$inet_tcp(0x2, 0x1, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x2102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000100)=@nbd={'/dev/nb*'}, &(0x7f0000001640)='./file0\x00', &(0x7f0000000040)='gfs2meta\x00', 0x0, 0x0) [ 1066.527225] ceph: device name is missing path (no : separator in []::]: [ 1066.527225] llb:á׌óÑü) 16:07:04 executing program 3: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[d::]:\nllbE\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\xff', 0x0, 0x0) [ 1066.580560] gfs2: path_lookup on /dev/nb* returned error -2 16:07:04 executing program 1: mknod$loop(&(0x7f0000000140)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x8000, 0x0) getsockname$tipc(r0, &(0x7f0000000180)=@id, &(0x7f0000000240)=0x10) r1 = syz_open_dev$dmmidi(&(0x7f0000000300)='/dev/dmmidi#\x00', 0x7, 0x0) r2 = semget$private(0x0, 0x4, 0x10) acct(&(0x7f0000000000)='./file0\x00') semtimedop(r2, &(0x7f0000000280)=[{0x3, 0x5, 0x1800}], 0x1, &(0x7f00000002c0)={0x0, 0x1c9c380}) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f00000001c0)=[@in6={0xa, 0x4e24, 0x8, @local, 0x200}, @in6={0xa, 0x4e22, 0x100000000, @local, 0x3}, @in={0x2, 0x4e24, @broadcast}, @in6={0xa, 0x4e21, 0x6, @local, 0x7f}], 0x64) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="5b4d3a3a723a0a6c86623a00"], &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 16:07:04 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020200090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e0100000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}}, 0x0) [ 1066.759970] libceph: parse_ips bad ip '[M::r: [ 1066.759970] l†b' [ 1067.169825] IPVS: ftp: loaded support on port[0] = 21 16:07:04 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, 0x0, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_INFO(r1, 0x29, 0x40, &(0x7f00000000c0)={'security\x00\x00\x00\x01\xa6\x00'}, &(0x7f0000000140)=0x54) 16:07:04 executing program 0: socket$inet_tcp(0x2, 0x1, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x2102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000100)=@nbd={'/dev/nb+'}, &(0x7f0000001640)='./file0\x00', &(0x7f0000000040)='gfs2meta\x00', 0x0, 0x0) 16:07:04 executing program 4: r0 = syz_open_dev$radio(&(0x7f00000000c0)='/dev/radio#\x00', 0x1, 0x2) getsockopt$EBT_SO_GET_INIT_INFO(r0, 0x0, 0x82, &(0x7f0000000100)={'nat\x00'}, &(0x7f0000000180)=0x78) r1 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000b4508a)='/dev/ashmem\x00', 0x0, 0x0) openat$audio(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/audio\x00', 0x1, 0x0) ioctl$ASHMEM_SET_SIZE(r1, 0x40087703, 0x4000800000000000) setxattr$trusted_overlay_opaque(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.opaque\x00', &(0x7f0000000080)='y\x00', 0x2, 0x3) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x0, 0x12, r1, 0x0) 16:07:04 executing program 1: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="5b5d3a3a5d3a80006c623a00"], &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video36\x00', 0x2, 0x0) 16:07:04 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020200090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e0100000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000034000000000"], 0x60}}, 0x0) 16:07:04 executing program 3: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[d::]:\nllbE\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 16:07:05 executing program 1: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x109002, 0x0) ioctl$EVIOCGKEY(r0, 0x80404518, &(0x7f00000001c0)=""/241) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mlock(&(0x7f0000000000/0x2000)=nil, 0x2000) mount(&(0x7f0000000000)=ANY=[@ANYBLOB="5b5d3a3a5d3a0a4f6c623a00f542698d557d60d52d8d9272499370f24ae0c4b1ad015256efb578e306336e46338ab92a5e52a706dc8acf"], &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 16:07:05 executing program 0: socket$inet_tcp(0x2, 0x1, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x2102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000100)=@nbd={'/dev/nbs'}, &(0x7f0000001640)='./file0\x00', &(0x7f0000000040)='gfs2meta\x00', 0x0, 0x0) [ 1067.334808] ceph: device name is missing path (no : separator in []::]:€) [ 1067.348541] gfs2: path_lookup on /dev/nb+ returned error -2 [ 1067.356363] IPVS: ftp: loaded support on port[0] = 21 [ 1067.367400] gfs2: path_lookup on /dev/nb+ returned error -2 16:07:05 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020200090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e0100000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000002000000"], 0x60}}, 0x0) 16:07:05 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000b4508a)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x400000000009) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x0, 0x12, r0, 0x0) [ 1067.481364] gfs2: path_lookup on /dev/nbs returned error -2 [ 1067.493076] libceph: parse_ips bad ip '[]::]: [ 1067.493076] Olb' 16:07:05 executing program 0: socket$inet_tcp(0x2, 0x1, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x2102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000100)=@nbd={'/dev/nb%'}, &(0x7f0000001640)='./file0\x00', &(0x7f0000000040)='gfs2meta\x00', 0x0, 0x0) 16:07:05 executing program 1: r0 = memfd_create(&(0x7f00000001c0)='ppp0+,selfppp0vmnet1proc\']\x00', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000050000)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$KVM_SET_GUEST_DEBUG(r0, 0x4048ae9b, &(0x7f0000000200)={0x50000, 0x0, [0x7ff, 0xffffffffffffffff, 0x3, 0x7, 0x3d3d, 0x5, 0x0, 0x3]}) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() timer_create(0x0, &(0x7f0000066000)={0x0, 0x12}, &(0x7f0000000400)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x1c9c380}, {0x0, 0x9}}, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000140)='/dev/null\x00', 0x800, 0x0) ioctl$TCSETS(r0, 0x5402, 0x0) tkill(0x0, 0x0) r3 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_INFO(r3, 0x40bc5311, &(0x7f0000000000)={0x80, 0x1, 'clien\x00\x00\x00\x00\x00\x00\x04\x00\x02\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00', 0x0, "7fd82d5e02ca3901", "88e7ed00007fff051eae961ef6c6992b7e6e560000f9fff77711be18a3d918e0"}) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f00000001c0)='./file0\x00') creat(&(0x7f0000000700)='./bus\x00', 0x0) link(&(0x7f0000000080)='./bus\x00', &(0x7f00000000c0)='./file1\x00') openat$sequencer2(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/sequencer2\x00', 0x200, 0x0) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r2, 0x84, 0xc, &(0x7f0000000280)=0x3, 0x4) clone(0x2102001ef9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pivot_root(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00') mount(&(0x7f0000000040)=@nullb='[]::]:\nllb:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) [ 1067.655584] gfs2: path_lookup on /dev/nb% returned error -2 [ 1067.670887] libceph: parse_ips bad ip '[]::]: [ 1067.670887] llb' [ 1067.679632] gfs2: path_lookup on /dev/nb% returned error -2 [ 1067.709912] IPVS: ftp: loaded support on port[0] = 21 [ 1068.004174] IPVS: ftp: loaded support on port[0] = 21 16:07:05 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, 0x0, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_INFO(r1, 0x29, 0x40, &(0x7f00000000c0)={'security\x00\x00\x00H\x02\x00'}, &(0x7f0000000140)=0x54) 16:07:05 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000b4508a)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x400000000009) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x0, 0x12, r0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000040)={0x7, &(0x7f0000000000)=[{0x18, 0x7f, 0x1, 0x81}, {0x7ff, 0x763f, 0x7fffffff, 0x1}, {0x4, 0x100000000, 0x61, 0x81}, {0xd3c0, 0xfe5, 0x3, 0x401}, {0x2, 0x3, 0x0, 0xffffffffffff8000}, {0x7fff, 0x4da8, 0x6, 0x1}, {0x9, 0x800, 0x8a, 0xfff}]}) 16:07:05 executing program 0: socket$inet_tcp(0x2, 0x1, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x2102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000100)=@nbd={'/dev/nb0'}, &(0x7f0000001640)='./file0\x00', &(0x7f0000000040)='gfs2meta\x00', 0x0, 0x0) 16:07:05 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020200090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e0100000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000010000000"], 0x60}}, 0x0) 16:07:05 executing program 1: r0 = memfd_create(&(0x7f00000001c0)='ppp0+,selfppp0vmnet1proc\']\x00', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000050000)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$KVM_SET_GUEST_DEBUG(r0, 0x4048ae9b, &(0x7f0000000200)={0x50000, 0x0, [0x7ff, 0xffffffffffffffff, 0x3, 0x7, 0x3d3d, 0x5, 0x0, 0x3]}) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() timer_create(0x0, &(0x7f0000066000)={0x0, 0x12}, &(0x7f0000000400)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x1c9c380}, {0x0, 0x9}}, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000140)='/dev/null\x00', 0x800, 0x0) ioctl$TCSETS(r0, 0x5402, 0x0) tkill(0x0, 0x0) r3 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_INFO(r3, 0x40bc5311, &(0x7f0000000000)={0x80, 0x1, 'clien\x00\x00\x00\x00\x00\x00\x04\x00\x02\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00', 0x0, "7fd82d5e02ca3901", "88e7ed00007fff051eae961ef6c6992b7e6e560000f9fff77711be18a3d918e0"}) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f00000001c0)='./file0\x00') creat(&(0x7f0000000700)='./bus\x00', 0x0) link(&(0x7f0000000080)='./bus\x00', &(0x7f00000000c0)='./file1\x00') openat$sequencer2(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/sequencer2\x00', 0x200, 0x0) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r2, 0x84, 0xc, &(0x7f0000000280)=0x3, 0x4) clone(0x2102001ef9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pivot_root(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00') mount(&(0x7f0000000040)=@nullb='[]::]:\nllb:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) [ 1068.183774] IPVS: ftp: loaded support on port[0] = 21 [ 1068.203023] gfs2: path_lookup on /dev/nb0 returned error -2 [ 1068.209024] audit: type=1326 audit(1545408425.818:33): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=19776 comm="syz-executor4" exe="/root/syz-executor4" sig=9 arch=c000003e syscall=228 compat=0 ip=0x45a4ca code=0x0 [ 1068.248418] libceph: parse_ips bad ip '[]::]: [ 1068.248418] llb' [ 1068.582500] IPVS: ftp: loaded support on port[0] = 21 [ 1068.878290] bridge0: port 1(bridge_slave_0) entered blocking state [ 1068.884732] bridge0: port 1(bridge_slave_0) entered disabled state [ 1068.891949] device bridge_slave_0 entered promiscuous mode [ 1068.922126] bridge0: port 2(bridge_slave_1) entered blocking state [ 1068.928618] bridge0: port 2(bridge_slave_1) entered disabled state [ 1068.935543] device bridge_slave_1 entered promiscuous mode [ 1068.964630] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1068.995238] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1069.134652] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1069.165901] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1069.348644] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1069.355811] team0: Port device team_slave_0 added [ 1069.402008] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1069.409196] team0: Port device team_slave_1 added [ 1069.437071] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1069.486501] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1069.516899] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1069.560896] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1069.639748] device bridge_slave_1 left promiscuous mode [ 1069.645273] bridge0: port 2(bridge_slave_1) entered disabled state [ 1069.655363] device bridge_slave_0 left promiscuous mode [ 1069.661624] bridge0: port 1(bridge_slave_0) entered disabled state [ 1069.694176] team0 (unregistering): Port device team_slave_1 removed [ 1069.706108] team0 (unregistering): Port device team_slave_0 removed [ 1069.720682] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1069.731436] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1069.758309] bond0 (unregistering): Released all slaves [ 1070.114010] bridge0: port 2(bridge_slave_1) entered blocking state [ 1070.120449] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1070.127119] bridge0: port 1(bridge_slave_0) entered blocking state [ 1070.133552] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1070.141582] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 1070.857998] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1071.895322] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1072.068847] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1072.168170] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 1072.174573] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1072.182414] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1072.279144] 8021q: adding VLAN 0 to HW filter on device team0 16:07:10 executing program 3: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[d::]:\nllbE\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 16:07:10 executing program 0: socket$inet_tcp(0x2, 0x1, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x2102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000100)=@nbd={'/dev/nbd', 0xffffffffffffffff, 0xf0}, &(0x7f0000001640)='./file0\x00', &(0x7f0000000040)='gfs2meta\x00', 0x0, 0x0) 16:07:10 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020200090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e0100000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000001000000"], 0x60}}, 0x0) 16:07:10 executing program 1: r0 = memfd_create(&(0x7f00000001c0)='ppp0+,selfppp0vmnet1proc\']\x00', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000050000)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$KVM_SET_GUEST_DEBUG(r0, 0x4048ae9b, &(0x7f0000000200)={0x50000, 0x0, [0x7ff, 0xffffffffffffffff, 0x3, 0x7, 0x3d3d, 0x5, 0x0, 0x3]}) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() timer_create(0x0, &(0x7f0000066000)={0x0, 0x12}, &(0x7f0000000400)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x1c9c380}, {0x0, 0x9}}, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000140)='/dev/null\x00', 0x800, 0x0) ioctl$TCSETS(r0, 0x5402, 0x0) tkill(0x0, 0x0) r3 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_INFO(r3, 0x40bc5311, &(0x7f0000000000)={0x80, 0x1, 'clien\x00\x00\x00\x00\x00\x00\x04\x00\x02\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00', 0x0, "7fd82d5e02ca3901", "88e7ed00007fff051eae961ef6c6992b7e6e560000f9fff77711be18a3d918e0"}) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f00000001c0)='./file0\x00') creat(&(0x7f0000000700)='./bus\x00', 0x0) link(&(0x7f0000000080)='./bus\x00', &(0x7f00000000c0)='./file1\x00') openat$sequencer2(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/sequencer2\x00', 0x200, 0x0) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r2, 0x84, 0xc, &(0x7f0000000280)=0x3, 0x4) clone(0x2102001ef9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pivot_root(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00') mount(&(0x7f0000000040)=@nullb='[]::]:\nllb:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 16:07:10 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, 0x0, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_INFO(r1, 0x29, 0x40, &(0x7f00000000c0)={'security\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000140)=0x54) 16:07:10 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000b4508a)='/dev/ashmem\x00', 0x40001, 0x0) r1 = syz_open_dev$midi(&(0x7f0000000080)='/dev/midi#\x00', 0x3, 0x80000) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x100, 0x0) ioctl$TIOCGSOFTCAR(r2, 0x5419, &(0x7f0000000040)) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x400000000009) write$cgroup_subtree(r1, 0xfffffffffffffffe, 0x0) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x2000000, 0x12, r0, 0x10000000) [ 1073.011746] ceph: device name is missing path (no : separator in [d::]: [ 1073.011746] llbE) [ 1073.023373] ceph: device name is missing path (no : separator in [d::]: [ 1073.023373] llbE) [ 1073.061294] gfs2: path_lookup on /dev/nbd returned error -2 [ 1073.111187] IPVS: ftp: loaded support on port[0] = 21 16:07:10 executing program 0: socket$inet_tcp(0x2, 0x1, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x2102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000100)=@nbd={'/dev/nbd', 0xffffffffffffffff, 0x600}, &(0x7f0000001640)='./file0\x00', &(0x7f0000000040)='gfs2meta\x00', 0x0, 0x0) 16:07:10 executing program 3: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[d::]:\nllbE\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) [ 1073.145693] ceph: device name is missing path (no : separator in [d::]: [ 1073.145693] llbE) [ 1073.158139] libceph: parse_ips bad ip '[]::]: [ 1073.158139] llb' 16:07:10 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020200090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e0100000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e000000100e0000001000000"], 0x60}}, 0x0) 16:07:10 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000b4508a)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x400000000009) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x400001, 0x0) mmap(&(0x7f00006ff000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) 16:07:10 executing program 1: r0 = memfd_create(&(0x7f00000001c0)='ppp0+,selfppp0vmnet1proc\']\x00', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000050000)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$KVM_SET_GUEST_DEBUG(r0, 0x4048ae9b, &(0x7f0000000200)={0x50000, 0x0, [0x7ff, 0xffffffffffffffff, 0x3, 0x7, 0x3d3d, 0x5, 0x0, 0x3]}) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() timer_create(0x0, &(0x7f0000066000)={0x0, 0x12}, &(0x7f0000000400)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x1c9c380}, {0x0, 0x9}}, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000140)='/dev/null\x00', 0x800, 0x0) ioctl$TCSETS(r0, 0x5402, 0x0) tkill(0x0, 0x0) r3 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_INFO(r3, 0x40bc5311, &(0x7f0000000000)={0x80, 0x1, 'clien\x00\x00\x00\x00\x00\x00\x04\x00\x02\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00', 0x0, "7fd82d5e02ca3901", "88e7ed00007fff051eae961ef6c6992b7e6e560000f9fff77711be18a3d918e0"}) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f00000001c0)='./file0\x00') creat(&(0x7f0000000700)='./bus\x00', 0x0) link(&(0x7f0000000080)='./bus\x00', &(0x7f00000000c0)='./file1\x00') openat$sequencer2(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/sequencer2\x00', 0x200, 0x0) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r2, 0x84, 0xc, &(0x7f0000000280)=0x3, 0x4) clone(0x2102001ef9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pivot_root(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00') [ 1073.267922] gfs2: path_lookup on /dev/nbd returned error -2 16:07:10 executing program 0: socket$inet_tcp(0x2, 0x1, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x2102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000100)=@nbd={'/dev/nbd', 0xffffffffffffffff, 0x500000000000000}, &(0x7f0000001640)='./file0\x00', &(0x7f0000000040)='gfs2meta\x00', 0x0, 0x0) [ 1073.319209] ceph: device name is missing path (no : separator in [d::]: [ 1073.319209] llbE) 16:07:11 executing program 3: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[d::]:\nllbE\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 16:07:11 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020200090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e0100000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e000000100df625a5d9c0000"], 0x60}}, 0x0) 16:07:11 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000b4508a)='/dev/ashmem\x00', 0x0, 0x0) r1 = getegid() lstat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) get_mempolicy(&(0x7f0000000100), &(0x7f0000000140), 0x8, &(0x7f00006ff000/0x10000)=nil, 0x0) setgroups(0x2, &(0x7f00000000c0)=[r1, r2]) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x400000000009) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x0, 0x200000001014, r0, 0x0) 16:07:11 executing program 0: socket$inet_tcp(0x2, 0x1, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x2102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000100)=@nbd={'/dev/nbd', 0xffffffffffffffff, 0x200000000000000}, &(0x7f0000001640)='./file0\x00', &(0x7f0000000040)='gfs2meta\x00', 0x0, 0x0) [ 1073.388610] gfs2: path_lookup on /dev/nbd returned error -2 [ 1073.514282] ceph: device name is missing path (no : separator in [d::]: [ 1073.514282] llbE) [ 1073.567747] gfs2: path_lookup on /dev/nbd returned error -2 16:07:11 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, 0x0, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_INFO(r1, 0x29, 0x40, &(0x7f00000000c0)={'security\x00\x00\x00\x00\x00\x00@\x00'}, &(0x7f0000000140)=0x54) 16:07:11 executing program 3: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[d::]:\nllbE\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x8c', 0x0, 0x0) 16:07:11 executing program 1: r0 = memfd_create(&(0x7f00000001c0)='ppp0+,selfppp0vmnet1proc\']\x00', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000050000)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$KVM_SET_GUEST_DEBUG(r0, 0x4048ae9b, &(0x7f0000000200)={0x50000, 0x0, [0x7ff, 0xffffffffffffffff, 0x3, 0x7, 0x3d3d, 0x5, 0x0, 0x3]}) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() timer_create(0x0, &(0x7f0000066000)={0x0, 0x12}, &(0x7f0000000400)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x1c9c380}, {0x0, 0x9}}, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000140)='/dev/null\x00', 0x800, 0x0) ioctl$TCSETS(r0, 0x5402, 0x0) tkill(0x0, 0x0) r3 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_INFO(r3, 0x40bc5311, &(0x7f0000000000)={0x80, 0x1, 'clien\x00\x00\x00\x00\x00\x00\x04\x00\x02\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00', 0x0, "7fd82d5e02ca3901", "88e7ed00007fff051eae961ef6c6992b7e6e560000f9fff77711be18a3d918e0"}) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f00000001c0)='./file0\x00') creat(&(0x7f0000000700)='./bus\x00', 0x0) link(&(0x7f0000000080)='./bus\x00', &(0x7f00000000c0)='./file1\x00') openat$sequencer2(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/sequencer2\x00', 0x200, 0x0) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r2, 0x84, 0xc, &(0x7f0000000280)=0x3, 0x4) clone(0x2102001ef9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 16:07:11 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020200090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e0100000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000340"], 0x60}}, 0x0) 16:07:11 executing program 0: socket$inet_tcp(0x2, 0x1, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x2102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000100)=@nbd={'/dev/nbd', 0xffffffffffffffff, 0x300000000000000}, &(0x7f0000001640)='./file0\x00', &(0x7f0000000040)='gfs2meta\x00', 0x0, 0x0) 16:07:11 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000b4508a)='/dev/ashmem\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x7fff) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x400000000009) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x0, 0x12, r0, 0x0) 16:07:11 executing program 0: socket$inet_tcp(0x2, 0x1, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x2102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000100)=@nbd={'/dev/nbd', 0xffffffffffffffff, 0xf6ffffff}, &(0x7f0000001640)='./file0\x00', &(0x7f0000000040)='gfs2meta\x00', 0x0, 0x0) 16:07:11 executing program 3: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[d::]:\nllbE\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) [ 1073.911024] gfs2: path_lookup on /dev/nbd returned error -2 16:07:11 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020200090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e0100000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}}, 0x0) 16:07:11 executing program 1: r0 = memfd_create(&(0x7f00000001c0)='ppp0+,selfppp0vmnet1proc\']\x00', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000050000)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$KVM_SET_GUEST_DEBUG(r0, 0x4048ae9b, &(0x7f0000000200)={0x50000, 0x0, [0x7ff, 0xffffffffffffffff, 0x3, 0x7, 0x3d3d, 0x5, 0x0, 0x3]}) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() timer_create(0x0, &(0x7f0000066000)={0x0, 0x12}, &(0x7f0000000400)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x1c9c380}, {0x0, 0x9}}, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000140)='/dev/null\x00', 0x800, 0x0) ioctl$TCSETS(r0, 0x5402, 0x0) tkill(0x0, 0x0) r3 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_INFO(r3, 0x40bc5311, &(0x7f0000000000)={0x80, 0x1, 'clien\x00\x00\x00\x00\x00\x00\x04\x00\x02\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00', 0x0, "7fd82d5e02ca3901", "88e7ed00007fff051eae961ef6c6992b7e6e560000f9fff77711be18a3d918e0"}) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f00000001c0)='./file0\x00') creat(&(0x7f0000000700)='./bus\x00', 0x0) link(&(0x7f0000000080)='./bus\x00', &(0x7f00000000c0)='./file1\x00') openat$sequencer2(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/sequencer2\x00', 0x200, 0x0) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r2, 0x84, 0xc, &(0x7f0000000280)=0x3, 0x4) 16:07:11 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x400000000009) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x0, 0x12, r0, 0x0) r1 = memfd_create(&(0x7f0000000000)='\x00', 0x7) ioctl$IOC_PR_PREEMPT_ABORT(r1, 0x401870cc, &(0x7f0000000040)={0x55, 0x2, 0x9b, 0x1}) ioctl$ASHMEM_SET_SIZE(r1, 0x40087703, 0x2) [ 1074.013901] IPVS: ftp: loaded support on port[0] = 21 [ 1074.030936] ceph: device name is missing path (no : separator in [d::]: [ 1074.030936] llbE) [ 1074.102963] gfs2: path_lookup on /dev/nbd returned error -2 [ 1074.124103] gfs2: path_lookup on /dev/nbd returned error -2 [ 1074.144252] ceph: device name is missing path (no : separator in [d::]: [ 1074.144252] llbE) 16:07:11 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020200090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e0100000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000020000000"], 0x60}}, 0x0) [ 1074.561841] IPVS: ftp: loaded support on port[0] = 21 16:07:12 executing program 3: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[d::]:\nllbE\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\a', 0x0, 0x0) 16:07:12 executing program 0: socket$inet_tcp(0x2, 0x1, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x2102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000100)=@nbd={'/dev/nbd', 0xffffffffffffffff, 0x2}, &(0x7f0000001640)='./file0\x00', &(0x7f0000000040)='gfs2meta\x00', 0x0, 0x0) 16:07:12 executing program 1: r0 = memfd_create(&(0x7f00000001c0)='ppp0+,selfppp0vmnet1proc\']\x00', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000050000)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$KVM_SET_GUEST_DEBUG(r0, 0x4048ae9b, &(0x7f0000000200)={0x50000, 0x0, [0x7ff, 0xffffffffffffffff, 0x3, 0x7, 0x3d3d, 0x5, 0x0, 0x3]}) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() timer_create(0x0, &(0x7f0000066000)={0x0, 0x12}, &(0x7f0000000400)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x1c9c380}, {0x0, 0x9}}, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000140)='/dev/null\x00', 0x800, 0x0) ioctl$TCSETS(r0, 0x5402, 0x0) tkill(0x0, 0x0) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_INFO(r2, 0x40bc5311, &(0x7f0000000000)={0x80, 0x1, 'clien\x00\x00\x00\x00\x00\x00\x04\x00\x02\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00', 0x0, "7fd82d5e02ca3901", "88e7ed00007fff051eae961ef6c6992b7e6e560000f9fff77711be18a3d918e0"}) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f00000001c0)='./file0\x00') creat(&(0x7f0000000700)='./bus\x00', 0x0) link(&(0x7f0000000080)='./bus\x00', &(0x7f00000000c0)='./file1\x00') openat$sequencer2(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/sequencer2\x00', 0x200, 0x0) 16:07:12 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000b4508a)='/dev/ashmem\x00', 0x0, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x20001, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000040)={0xffffffffffffffff}, 0x113}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r1, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e20, 0x2, @remote, 0x100000001}, {0xa, 0x4e20, 0xfffffffffffffa78, @local, 0x3}, r2, 0x5c}}, 0x48) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x400000000009) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x0, 0x12, r0, 0xfffffffffffffffc) 16:07:12 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020200090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e0100000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000008000000"], 0x60}}, 0x0) 16:07:12 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, 0x0, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_INFO(r1, 0x29, 0x40, &(0x7f00000000c0)={'security\x00\x00\x00\x01\x96\x00'}, &(0x7f0000000140)=0x54) 16:07:12 executing program 3: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[d::]:\nllbE\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) [ 1074.739441] gfs2: path_lookup on /dev/nbd returned error -2 16:07:12 executing program 0: socket$inet_tcp(0x2, 0x1, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x2102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000100)=@nbd={'/dev/nbd', 0xffffffffffffffff, 0x4800}, &(0x7f0000001640)='./file0\x00', &(0x7f0000000040)='gfs2meta\x00', 0x0, 0x0) 16:07:12 executing program 1: r0 = memfd_create(&(0x7f00000001c0)='ppp0+,selfppp0vmnet1proc\']\x00', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000050000)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$KVM_SET_GUEST_DEBUG(r0, 0x4048ae9b, &(0x7f0000000200)={0x50000, 0x0, [0x7ff, 0xffffffffffffffff, 0x3, 0x7, 0x3d3d, 0x5, 0x0, 0x3]}) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() timer_create(0x0, &(0x7f0000066000)={0x0, 0x12}, &(0x7f0000000400)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x1c9c380}, {0x0, 0x9}}, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000140)='/dev/null\x00', 0x800, 0x0) ioctl$TCSETS(r0, 0x5402, 0x0) tkill(0x0, 0x0) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_INFO(r2, 0x40bc5311, &(0x7f0000000000)={0x80, 0x1, 'clien\x00\x00\x00\x00\x00\x00\x04\x00\x02\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00', 0x0, "7fd82d5e02ca3901", "88e7ed00007fff051eae961ef6c6992b7e6e560000f9fff77711be18a3d918e0"}) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f00000001c0)='./file0\x00') creat(&(0x7f0000000700)='./bus\x00', 0x0) link(&(0x7f0000000080)='./bus\x00', &(0x7f00000000c0)='./file1\x00') 16:07:12 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020200090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e0100000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010004000000000000"], 0x60}}, 0x0) [ 1074.781610] gfs2: path_lookup on /dev/nbd returned error -2 [ 1074.804670] IPVS: ftp: loaded support on port[0] = 21 16:07:12 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000b4508a)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x7fff) ioctl$FITRIM(r0, 0xc0185879, &(0x7f0000000000)={0x6, 0xfffffffffffff801, 0xddf}) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x0, 0x12, r0, 0x0) [ 1074.854604] ceph: device name is missing path (no : separator in [d::]: [ 1074.854604] llbE) [ 1074.875141] ceph: device name is missing path (no : separator in [d::]: [ 1074.875141] llbE) 16:07:12 executing program 3: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[d::]:\nllbE\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x04', 0x0, 0x0) 16:07:12 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020200090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e0100000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000400300000000"], 0x60}}, 0x0) [ 1074.948161] gfs2: path_lookup on /dev/nbd returned error -2 16:07:12 executing program 0: socket$inet_tcp(0x2, 0x1, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x2102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000100)=@nbd={'/dev/nbd', 0xffffffffffffffff, 0x2000}, &(0x7f0000001640)='./file0\x00', &(0x7f0000000040)='gfs2meta\x00', 0x0, 0x0) 16:07:12 executing program 1: r0 = memfd_create(&(0x7f00000001c0)='ppp0+,selfppp0vmnet1proc\']\x00', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000050000)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$KVM_SET_GUEST_DEBUG(r0, 0x4048ae9b, &(0x7f0000000200)={0x50000, 0x0, [0x7ff, 0xffffffffffffffff, 0x3, 0x7, 0x3d3d, 0x5, 0x0, 0x3]}) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() timer_create(0x0, &(0x7f0000066000)={0x0, 0x12}, &(0x7f0000000400)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x1c9c380}, {0x0, 0x9}}, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000140)='/dev/null\x00', 0x800, 0x0) ioctl$TCSETS(r0, 0x5402, 0x0) tkill(0x0, 0x0) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_INFO(r2, 0x40bc5311, &(0x7f0000000000)={0x80, 0x1, 'clien\x00\x00\x00\x00\x00\x00\x04\x00\x02\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00', 0x0, "7fd82d5e02ca3901", "88e7ed00007fff051eae961ef6c6992b7e6e560000f9fff77711be18a3d918e0"}) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f00000001c0)='./file0\x00') link(&(0x7f0000000080)='./bus\x00', &(0x7f00000000c0)='./file1\x00') 16:07:12 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000b4508a)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x400000000009) r1 = socket$vsock_dgram(0x28, 0x2, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000000)) mmap(&(0x7f00006fd000/0x4000)=nil, 0x4000, 0x8, 0x12, r0, 0x7) 16:07:12 executing program 3: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[d::]:\nllbE\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) [ 1075.163164] gfs2: path_lookup on /dev/nbd returned error -2 [ 1075.174790] ceph: device name is missing path (no : separator in [d::]: [ 1075.174790] llbE) [ 1075.219916] ceph: device name is missing path (no : separator in [d::]: [ 1075.219916] llbE) 16:07:13 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, 0x0, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_INFO(r1, 0x29, 0x40, &(0x7f00000000c0)={'security\x00\x00\x00\x00\xa6\x01\x00'}, &(0x7f0000000140)=0x54) 16:07:13 executing program 0: socket$inet_tcp(0x2, 0x1, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x2102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000100)=@nbd={'/dev/nbd', 0xffffffffffffffff, 0x4000}, &(0x7f0000001640)='./file0\x00', &(0x7f0000000040)='gfs2meta\x00', 0x0, 0x0) 16:07:13 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000b4508a)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x400000000009) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x0, 0x12, r0, 0x0) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xea, 0x40000) 16:07:13 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020200090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e0100000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}}, 0x0) 16:07:13 executing program 3: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[d::]:\nllbE\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x06', 0x0, 0x0) 16:07:13 executing program 1: r0 = memfd_create(&(0x7f00000001c0)='ppp0+,selfppp0vmnet1proc\']\x00', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000050000)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$KVM_SET_GUEST_DEBUG(r0, 0x4048ae9b, &(0x7f0000000200)={0x50000, 0x0, [0x7ff, 0xffffffffffffffff, 0x3, 0x7, 0x3d3d, 0x5, 0x0, 0x3]}) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() timer_create(0x0, &(0x7f0000066000)={0x0, 0x12}, &(0x7f0000000400)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x1c9c380}, {0x0, 0x9}}, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000140)='/dev/null\x00', 0x800, 0x0) ioctl$TCSETS(r0, 0x5402, 0x0) tkill(0x0, 0x0) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_INFO(r2, 0x40bc5311, &(0x7f0000000000)={0x80, 0x1, 'clien\x00\x00\x00\x00\x00\x00\x04\x00\x02\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00', 0x0, "7fd82d5e02ca3901", "88e7ed00007fff051eae961ef6c6992b7e6e560000f9fff77711be18a3d918e0"}) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='ramfs\x00', 0x0, 0x0) creat(&(0x7f0000000700)='./bus\x00', 0x0) link(&(0x7f0000000080)='./bus\x00', &(0x7f00000000c0)='./file1\x00') 16:07:13 executing program 3: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[d::]:\nllbE\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 16:07:13 executing program 0: socket$inet_tcp(0x2, 0x1, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x2102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000100)=@nbd={'/dev/nbd', 0xffffffffffffffff, 0x7400000000000000}, &(0x7f0000001640)='./file0\x00', &(0x7f0000000040)='gfs2meta\x00', 0x0, 0x0) [ 1075.539972] gfs2: path_lookup on /dev/nbd returned error -2 16:07:13 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000b4508a)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x400000000009) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x0, 0x12, r0, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) 16:07:13 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020200090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e0100000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e000000100010000e0000000"], 0x60}}, 0x0) [ 1075.610809] IPVS: ftp: loaded support on port[0] = 21 16:07:13 executing program 1: r0 = memfd_create(&(0x7f00000001c0)='ppp0+,selfppp0vmnet1proc\']\x00', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000050000)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$KVM_SET_GUEST_DEBUG(r0, 0x4048ae9b, &(0x7f0000000200)={0x50000, 0x0, [0x7ff, 0xffffffffffffffff, 0x3, 0x7, 0x3d3d, 0x5, 0x0, 0x3]}) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() timer_create(0x0, &(0x7f0000066000)={0x0, 0x12}, &(0x7f0000000400)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x1c9c380}, {0x0, 0x9}}, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000140)='/dev/null\x00', 0x800, 0x0) ioctl$TCSETS(r0, 0x5402, 0x0) tkill(0x0, 0x0) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_INFO(r2, 0x40bc5311, &(0x7f0000000000)={0x80, 0x1, 'clien\x00\x00\x00\x00\x00\x00\x04\x00\x02\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00', 0x0, "7fd82d5e02ca3901", "88e7ed00007fff051eae961ef6c6992b7e6e560000f9fff77711be18a3d918e0"}) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) creat(&(0x7f0000000700)='./bus\x00', 0x0) link(&(0x7f0000000080)='./bus\x00', &(0x7f00000000c0)='./file1\x00') [ 1075.656210] ceph: device name is missing path (no : separator in [d::]: [ 1075.656210] llbE) 16:07:13 executing program 3: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[d::]:\nllbE\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) [ 1075.867787] ceph: device name is missing path (no : separator in [d::]: [ 1075.867787] llbE) [ 1075.901575] ceph: device name is missing path (no : separator in [d::]: [ 1075.901575] llbE) 16:07:13 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, 0x0, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_INFO(r1, 0x29, 0x40, &(0x7f00000000c0)={'security\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\xfa\x00'}, &(0x7f0000000140)=0x54) 16:07:13 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020200090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e0100000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010008000000000000"], 0x60}}, 0x0) 16:07:13 executing program 3: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[d::]:\nllbE\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph`', 0x0, 0x0) 16:07:13 executing program 1: r0 = memfd_create(&(0x7f00000001c0)='ppp0+,selfppp0vmnet1proc\']\x00', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000050000)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$KVM_SET_GUEST_DEBUG(r0, 0x4048ae9b, &(0x7f0000000200)={0x50000, 0x0, [0x7ff, 0xffffffffffffffff, 0x3, 0x7, 0x3d3d, 0x5, 0x0, 0x3]}) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() timer_create(0x0, &(0x7f0000066000)={0x0, 0x12}, &(0x7f0000000400)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x1c9c380}, {0x0, 0x9}}, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000140)='/dev/null\x00', 0x800, 0x0) ioctl$TCSETS(r0, 0x5402, 0x0) tkill(0x0, 0x0) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_INFO(r2, 0x40bc5311, &(0x7f0000000000)={0x80, 0x1, 'clien\x00\x00\x00\x00\x00\x00\x04\x00\x02\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00', 0x0, "7fd82d5e02ca3901", "88e7ed00007fff051eae961ef6c6992b7e6e560000f9fff77711be18a3d918e0"}) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) creat(&(0x7f0000000700)='./bus\x00', 0x0) link(&(0x7f0000000080)='./bus\x00', &(0x7f00000000c0)='./file1\x00') 16:07:13 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000b4508a)='/dev/ashmem\x00', 0x0, 0x0) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x800, 0x0) ioctl$VIDIOC_G_OUTPUT(r1, 0x8004562e, &(0x7f0000000040)) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x400000000009) mmap(&(0x7f0000701000/0x4000)=nil, 0x4000, 0x2, 0x10, r0, 0x0) 16:07:13 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x400000000009) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x0, 0x12, r0, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x8000, 0x0) ioctl$KVM_SET_CPUID(r1, 0x4008ae8a, &(0x7f0000000080)={0x5, 0x0, [{0x8000000d, 0x3, 0x9, 0xc2e, 0x7}, {0x80000007, 0x1, 0x5, 0x1000, 0xfff}, {0xc0000019, 0x3, 0x0, 0x9}, {0xb, 0x141c, 0x1, 0x1, 0x7}, {0x80000001, 0x100000001, 0x2, 0x80b, 0x80}]}) 16:07:13 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020200090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e0100000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000ffffff"], 0x60}}, 0x0) [ 1076.380058] IPVS: ftp: loaded support on port[0] = 21 16:07:14 executing program 0: socket$inet_tcp(0x2, 0x1, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x2102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000100)=@nbd={'/dev/nbd', 0xffffffffffffffff, 0x40000000}, &(0x7f0000001640)='./file0\x00', &(0x7f0000000040)='gfs2meta\x00', 0x0, 0x0) 16:07:14 executing program 1: r0 = memfd_create(&(0x7f00000001c0)='ppp0+,selfppp0vmnet1proc\']\x00', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000050000)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$KVM_SET_GUEST_DEBUG(r0, 0x4048ae9b, &(0x7f0000000200)={0x50000, 0x0, [0x7ff, 0xffffffffffffffff, 0x3, 0x7, 0x3d3d, 0x5, 0x0, 0x3]}) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() timer_create(0x0, &(0x7f0000066000)={0x0, 0x12}, &(0x7f0000000400)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x1c9c380}, {0x0, 0x9}}, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000140)='/dev/null\x00', 0x800, 0x0) ioctl$TCSETS(r0, 0x5402, 0x0) tkill(0x0, 0x0) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_INFO(r2, 0x40bc5311, &(0x7f0000000000)={0x80, 0x1, 'clien\x00\x00\x00\x00\x00\x00\x04\x00\x02\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00', 0x0, "7fd82d5e02ca3901", "88e7ed00007fff051eae961ef6c6992b7e6e560000f9fff77711be18a3d918e0"}) creat(&(0x7f0000000700)='./bus\x00', 0x0) link(&(0x7f0000000080)='./bus\x00', &(0x7f00000000c0)='./file1\x00') 16:07:14 executing program 3: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[d::]:\nllbE\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 16:07:14 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000b4508a)='/dev/ashmem\x00', 0x0, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x3, 0xa080) getsockopt$inet_int(r1, 0x0, 0x0, &(0x7f0000000080), &(0x7f00000000c0)=0x4) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x400000000009) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x0, 0x12, r0, 0x0) r2 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x100000000, 0x4000) ioctl$KDSETMODE(r2, 0x4b3a, 0x4) 16:07:14 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020200090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e0100000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e0000001000000009c5d5a62"], 0x60}}, 0x0) [ 1076.654580] ceph: device name is missing path (no : separator in [d::]: [ 1076.654580] llbE) [ 1076.851402] IPVS: ftp: loaded support on port[0] = 21 16:07:14 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, 0x0, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_INFO(r1, 0x29, 0x40, &(0x7f00000000c0)={'security\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01V\x00'}, &(0x7f0000000140)=0x54) 16:07:14 executing program 1: r0 = memfd_create(&(0x7f00000001c0)='ppp0+,selfppp0vmnet1proc\']\x00', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000050000)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$KVM_SET_GUEST_DEBUG(r0, 0x4048ae9b, &(0x7f0000000200)={0x50000, 0x0, [0x7ff, 0xffffffffffffffff, 0x3, 0x7, 0x3d3d, 0x5, 0x0, 0x3]}) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() timer_create(0x0, &(0x7f0000066000)={0x0, 0x12}, &(0x7f0000000400)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x1c9c380}, {0x0, 0x9}}, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000140)='/dev/null\x00', 0x800, 0x0) ioctl$TCSETS(r0, 0x5402, 0x0) tkill(0x0, 0x0) dup2(r1, r0) creat(&(0x7f0000000700)='./bus\x00', 0x0) link(&(0x7f0000000080)='./bus\x00', &(0x7f00000000c0)='./file1\x00') 16:07:14 executing program 3: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[d::]:\nllbE\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 16:07:14 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020200090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e0100000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000200000000000"], 0x60}}, 0x0) 16:07:14 executing program 4: r0 = accept(0xffffffffffffffff, 0x0, &(0x7f0000000080)) setsockopt$inet6_icmp_ICMP_FILTER(r0, 0x1, 0x1, &(0x7f00000000c0)={0x2}, 0x4) r1 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000b4508a)='/dev/ashmem\x00', 0x0, 0x0) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x10000, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r2, 0x4058534c, &(0x7f0000000140)={0x6, 0x799, 0x7fffffff, 0x800, 0x1, 0x1ff}) ioctl$ASHMEM_SET_SIZE(r1, 0x40087703, 0x400000000009) r3 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x1, 0x2) setsockopt$inet_tcp_TLS_TX(r3, 0x6, 0x1, &(0x7f0000000040), 0x4) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x0, 0x12, r1, 0x0) [ 1076.956384] ceph: device name is missing path (no : separator in [d::]: [ 1076.956384] llbE) 16:07:14 executing program 3: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[d::]:\nllbE\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\xff', 0x0, 0x0) 16:07:14 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020200090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e0100000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010002000000000000"], 0x60}}, 0x0) [ 1077.003705] ceph: device name is missing path (no : separator in [d::]: [ 1077.003705] llbE) [ 1077.031612] IPVS: ftp: loaded support on port[0] = 21 [ 1078.021250] bridge0: port 1(bridge_slave_0) entered blocking state [ 1078.028103] bridge0: port 1(bridge_slave_0) entered disabled state [ 1078.035569] device bridge_slave_0 entered promiscuous mode [ 1078.082477] bridge0: port 2(bridge_slave_1) entered blocking state [ 1078.089038] bridge0: port 2(bridge_slave_1) entered disabled state [ 1078.096465] device bridge_slave_1 entered promiscuous mode [ 1078.143344] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1078.188437] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1078.325697] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1078.376440] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1078.596768] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1078.604695] team0: Port device team_slave_0 added [ 1078.651359] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1078.658903] team0: Port device team_slave_1 added [ 1078.703647] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1078.753944] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1078.800476] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1078.847581] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1078.854765] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1078.864211] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1079.134706] bridge0: port 2(bridge_slave_1) entered blocking state [ 1079.141107] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1079.147806] bridge0: port 1(bridge_slave_0) entered blocking state [ 1079.154166] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1079.161463] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 1079.618601] device bridge_slave_1 left promiscuous mode [ 1079.624143] bridge0: port 2(bridge_slave_1) entered disabled state [ 1079.633087] device bridge_slave_0 left promiscuous mode [ 1079.639578] bridge0: port 1(bridge_slave_0) entered disabled state [ 1079.671430] team0 (unregistering): Port device team_slave_1 removed [ 1079.681710] team0 (unregistering): Port device team_slave_0 removed [ 1079.693990] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1079.705830] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1079.733876] bond0 (unregistering): Released all slaves [ 1079.817957] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1080.714245] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1080.878216] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1081.039568] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 1081.045852] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1081.063040] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1081.220179] 8021q: adding VLAN 0 to HW filter on device team0 16:07:19 executing program 0: socket$inet_tcp(0x2, 0x1, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x2102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000100)=@nbd={'/dev/nbd', 0xffffffffffffffff, 0x500}, &(0x7f0000001640)='./file0\x00', &(0x7f0000000040)='gfs2meta\x00', 0x0, 0x0) 16:07:19 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000b4508a)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfff) r1 = socket$inet_sctp(0x2, 0x5, 0x84) r2 = syz_open_dev$adsp(&(0x7f0000000040)='/dev/adsp#\x00', 0x4, 0x2381) ioctl$RTC_PIE_OFF(r2, 0x7006) setsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000000)={0x1, 0x7, 0x0, 0x9}, 0x8) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x0, 0x12, r0, 0x0) 16:07:19 executing program 1: r0 = memfd_create(&(0x7f00000001c0)='ppp0+,selfppp0vmnet1proc\']\x00', 0x0) syz_open_dev$sndseq(&(0x7f0000050000)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$KVM_SET_GUEST_DEBUG(r0, 0x4048ae9b, &(0x7f0000000200)={0x50000, 0x0, [0x7ff, 0xffffffffffffffff, 0x3, 0x7, 0x3d3d, 0x5, 0x0, 0x3]}) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() timer_create(0x0, &(0x7f0000066000)={0x0, 0x12}, &(0x7f0000000400)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x1c9c380}, {0x0, 0x9}}, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000140)='/dev/null\x00', 0x800, 0x0) ioctl$TCSETS(r0, 0x5402, 0x0) tkill(0x0, 0x0) creat(&(0x7f0000000700)='./bus\x00', 0x0) link(&(0x7f0000000080)='./bus\x00', &(0x7f00000000c0)='./file1\x00') 16:07:19 executing program 3: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[d::]:\nllbE\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 16:07:19 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020200090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e0100000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010010000000000000"], 0x60}}, 0x0) 16:07:19 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, 0x0, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_INFO(r1, 0x29, 0x40, &(0x7f00000000c0)={'security\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\xff\x00'}, &(0x7f0000000140)=0x54) [ 1081.839026] gfs2: path_lookup on /dev/nbd returned error -2 16:07:19 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020200090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e0100000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000004000000"], 0x60}}, 0x0) [ 1081.888251] ceph: device name is missing path (no : separator in [d::]: [ 1081.888251] llbE) [ 1081.911490] IPVS: ftp: loaded support on port[0] = 21 [ 1081.917967] gfs2: path_lookup on /dev/nbd returned error -2 16:07:19 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000b4508a)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x400000000009) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x0, 0x50, r0, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x181c00, 0x0) r2 = getuid() ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f00000004c0)=0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000500)={{{@in=@multicast2, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6}}, &(0x7f0000000600)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000640)={0x0, 0x0, 0x0}, &(0x7f0000000680)=0xc) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000006c0)=0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000700)={{{@in6=@local, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@loopback}}, &(0x7f0000000800)=0xe8) getresgid(&(0x7f0000000840), &(0x7f0000000880)=0x0, &(0x7f00000008c0)) sendmsg$netlink(r1, &(0x7f0000000980)={&(0x7f0000000040)=@proc={0x10, 0x0, 0x25dfdbff, 0x20000}, 0xc, &(0x7f0000000480)=[{&(0x7f0000000080)={0x400, 0x33, 0x202, 0x70bd2a, 0x25dfdbfb, "", [@generic="02f2dffc0d77cd974eaecc8b8d932b78803c8af209693c2238576a6f21b7305773ce929adeca5ccf75ac0e234a37284adb0bd62a064c702df5ce11d4c291518a08daacc12d46d67ce1e10de63e8c43d5feb7cfa7d92554", @generic="2d1e0ade61695e64124d83c8896886dfe26e0e0906667ff7036844f8709f90ed38a56be0d3d0fdb08c8ebef064b0b6f23d21c531df92297ecca335d547e753cc17cdf8a9e8ed0c50894513ce924f5e5e713790db3fd5a8ca2d8ed662c0ad0cc4cd6debb4f619d37a4b5862a2dcf6128b9822f483f247303afb1608ed8dc18c476dff9c724c0e18c21b443a8c85064a6f6e6abc05fbe10defae13b2e9c2d590d99d114387b947526b2041aa2b0c1e0e6904849863f636e8133ff6bea18655e8c0114928fd848325bd21b7f47a71ef33a9abd0792127c54e9a05d5898fec6d4562", @generic="b86b8aeedc66d6f436c537bc842d33", @nested={0x28, 0x6c, [@typed={0x10, 0x6d, @str='/dev/ashmem\x00'}, @typed={0x14, 0x78, @ipv6}]}, @nested={0x10c, 0x3b, [@typed={0x10, 0x74, @str='/dev/ashmem\x00'}, @generic="86cb2dff0773b838d8e3047b03e56d0a4adcddc0fd14d3d87867f848d19bdc85a6a7e7eb7d88104549fac96c0efe761f04a353794666f7b8bf2aa6a09e48106d1b9302249a942437feb74a704ff7d04dc93f843c76ca138ab3b97a499c6d279c98fa4e7efcf47ae70d2969779ed6e98ed703e47aed584553ab1e496c90213a72a99d3d8d6431d96a142e68651d7316224fcb61ec462c7118d16074f61b", @typed={0x10, 0x22, @str='/dev/ashmem\x00'}, @typed={0x8, 0x70, @uid=r2}, @typed={0x4, 0x3d}, @generic="2b6177b90cbf899b8c9d9cef8e4c6abf3b4fbc8c8ca8984c3fbb49f16c9b48b26241a88e07", @typed={0x14, 0x3, @ipv6}, @typed={0x4, 0x37}]}, @generic="c1e9b80fe7def258602ba1664fcb7b9a3fd3c90509c2e1bdb03d312b43872cbdeaa73ba017ae771ec8f0aac031583b87150a876672aea75edcba91c6ff888b8236e7556ffe1e3f21aa08e340800cab813bca0675f807fb68d6fe0de735fd8032c25d3cfbf21ddc3846edd1436f84ebc6664bf49d63d41979f3bcb2a57bdd366255b27d34852953e876fb6784fa1fb6620bfa50e5cf84e7a8b4be8015f2186156fa0f3baf645f019a700c234663f4754fbc400eeae5ab83bf5aa2951b88cbaf0f45907fd8d6124b0b92dc1d103f593ff862fa7bace5a8ca252d0133", @nested={0x28, 0x15, [@typed={0x1c, 0x66, @str='procbdevsystem\x87keyring+\x00'}, @typed={0x8, 0x9, @ipv4=@dev={0xac, 0x14, 0x14, 0xa}}]}, @generic="cdcebe361fd82b878800c7739e2f8ea48c7dfc782ce3cf0156e9e2babc6bafe1f8176dbee474efbc1ead056df9e87ee7cb4ef72fcff37b2f3a51f00fa6e9864ba93fbcc4e881c64c3aaa88ae823f4edb0b776cbb6c183211db412fd631147359152409e2c957e9166bd743ee5c39e65d9d"]}, 0x400}], 0x1, &(0x7f0000000900)=[@rights={0x18, 0x1, 0x1, [r0]}, @cred={0x20, 0x1, 0x2, r3, r4, r5}, @cred={0x20, 0x1, 0x2, r6, r7, r8}], 0x58, 0x8000}, 0x0) 16:07:19 executing program 0: socket$inet_tcp(0x2, 0x1, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x2102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000100)=@nbd={'/dev/nbd', 0xffffffffffffffff, 0x4c}, &(0x7f0000001640)='./file0\x00', &(0x7f0000000040)='gfs2meta\x00', 0x0, 0x0) 16:07:19 executing program 1: r0 = memfd_create(&(0x7f00000001c0)='ppp0+,selfppp0vmnet1proc\']\x00', 0x0) syz_open_dev$sndseq(&(0x7f0000050000)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$KVM_SET_GUEST_DEBUG(r0, 0x4048ae9b, &(0x7f0000000200)={0x50000, 0x0, [0x7ff, 0xffffffffffffffff, 0x3, 0x7, 0x3d3d, 0x5, 0x0, 0x3]}) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() timer_create(0x0, &(0x7f0000066000)={0x0, 0x12}, &(0x7f0000000400)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x1c9c380}, {0x0, 0x9}}, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000140)='/dev/null\x00', 0x800, 0x0) ioctl$TCSETS(r0, 0x5402, 0x0) creat(&(0x7f0000000700)='./bus\x00', 0x0) link(&(0x7f0000000080)='./bus\x00', &(0x7f00000000c0)='./file1\x00') [ 1081.952073] ceph: device name is missing path (no : separator in [d::]: [ 1081.952073] llbE) 16:07:19 executing program 3: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[d::]:\nllbE\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 16:07:19 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020200090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e0100000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e0000001007fffffff000000"], 0x60}}, 0x0) [ 1082.040609] gfs2: path_lookup on /dev/nbd returned error -2 16:07:19 executing program 0: socket$inet_tcp(0x2, 0x1, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x2102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000100)=@nbd={'/dev/nbd', 0xffffffffffffffff, 0x4}, &(0x7f0000001640)='./file0\x00', &(0x7f0000000040)='gfs2meta\x00', 0x0, 0x0) 16:07:19 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x400000000009) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x0, 0x12, r0, 0x0) [ 1082.099370] ceph: device name is missing path (no : separator in [d::]: [ 1082.099370] llbE) 16:07:19 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020200090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e0100000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}}, 0x0) 16:07:19 executing program 1: r0 = memfd_create(&(0x7f00000001c0)='ppp0+,selfppp0vmnet1proc\']\x00', 0x0) syz_open_dev$sndseq(&(0x7f0000050000)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$KVM_SET_GUEST_DEBUG(r0, 0x4048ae9b, &(0x7f0000000200)={0x50000, 0x0, [0x7ff, 0xffffffffffffffff, 0x3, 0x7, 0x3d3d, 0x5, 0x0, 0x3]}) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() timer_create(0x0, &(0x7f0000066000)={0x0, 0x12}, &(0x7f0000000400)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x1c9c380}, {0x0, 0x9}}, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000140)='/dev/null\x00', 0x800, 0x0) creat(&(0x7f0000000700)='./bus\x00', 0x0) link(&(0x7f0000000080)='./bus\x00', &(0x7f00000000c0)='./file1\x00') [ 1082.159015] ceph: device name is missing path (no : separator in [d::]: [ 1082.159015] llbE) 16:07:19 executing program 0: socket$inet_tcp(0x2, 0x1, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x2102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000100)=@nbd={'/dev/nbd', 0xffffffffffffffff, 0xffffff8c}, &(0x7f0000001640)='./file0\x00', &(0x7f0000000040)='gfs2meta\x00', 0x0, 0x0) [ 1082.214673] gfs2: path_lookup on /dev/nbd returned error -2 [ 1082.332769] gfs2: path_lookup on /dev/nbd returned error -2 [ 1082.476593] IPVS: ftp: loaded support on port[0] = 21 16:07:20 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020200090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e0100000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}}, 0x0) 16:07:20 executing program 3: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[d::]:\nllbE\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 16:07:20 executing program 1: r0 = memfd_create(&(0x7f00000001c0)='ppp0+,selfppp0vmnet1proc\']\x00', 0x0) syz_open_dev$sndseq(&(0x7f0000050000)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$KVM_SET_GUEST_DEBUG(r0, 0x4048ae9b, &(0x7f0000000200)={0x50000, 0x0, [0x7ff, 0xffffffffffffffff, 0x3, 0x7, 0x3d3d, 0x5, 0x0, 0x3]}) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() timer_create(0x0, &(0x7f0000066000)={0x0, 0x12}, &(0x7f0000000400)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x1c9c380}, {0x0, 0x9}}, 0x0) creat(&(0x7f0000000700)='./bus\x00', 0x0) link(&(0x7f0000000080)='./bus\x00', &(0x7f00000000c0)='./file1\x00') 16:07:20 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000b4508a)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x400000000009) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x0, 0x12, r0, 0x0) r1 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x7, 0x14002) ioctl$BLKDISCARD(r1, 0x1277, &(0x7f0000000040)=0x1) 16:07:20 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, 0x0, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_INFO(r1, 0x29, 0x40, &(0x7f00000000c0)={'security\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\xf8\x00'}, &(0x7f0000000140)=0x54) 16:07:20 executing program 0: socket$inet_tcp(0x2, 0x1, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x2102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000100)=@nbd={'/dev/nbd', 0xffffffffffffffff, 0x400000000000000}, &(0x7f0000001640)='./file0\x00', &(0x7f0000000040)='gfs2meta\x00', 0x0, 0x0) 16:07:20 executing program 0: socket$inet_tcp(0x2, 0x1, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x2102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000100)=@nbd={'/dev/nbd', 0xffffffffffffffff, 0xedc0}, &(0x7f0000001640)='./file0\x00', &(0x7f0000000040)='gfs2meta\x00', 0x0, 0x0) [ 1082.568264] gfs2: path_lookup on /dev/nbd returned error -2 16:07:20 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000b4508a)='/dev/ashmem\x00', 0x0, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e24, 0xad, @local, 0x9}, 0x1c) semget(0x3, 0x1, 0x4) r1 = semget(0x0, 0x2, 0x40) semget$private(0x0, 0x3, 0x25) semctl$SETVAL(r1, 0x4, 0x10, &(0x7f0000000000)=0x9) r2 = fcntl$dupfd(r0, 0x0, r0) ioctl$NBD_CLEAR_SOCK(r2, 0xab04) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x400000000009) setsockopt$inet6_udp_encap(r2, 0x11, 0x64, &(0x7f0000000200), 0xfffffffffffffd66) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x0, 0x11010, r0, 0x0) ioctl$TCSETAF(r2, 0x5408, &(0x7f0000000140)={0x72, 0x40, 0x8e11, 0x3, 0x80, 0x0, 0x7, 0x3, 0xefa8, 0x5}) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r0, 0x6612) inotify_init() lstat(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0}) setfsuid(r3) [ 1082.609042] ceph: device name is missing path (no : separator in [d::]: [ 1082.609042] llbE) [ 1082.642798] ceph: device name is missing path (no : separator in [d::]: [ 1082.642798] llbE) 16:07:20 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020200090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e0100000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}}, 0x0) 16:07:20 executing program 3: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[d::]:\nllbE\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 16:07:20 executing program 1: r0 = memfd_create(&(0x7f00000001c0)='ppp0+,selfppp0vmnet1proc\']\x00', 0x0) syz_open_dev$sndseq(&(0x7f0000050000)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$KVM_SET_GUEST_DEBUG(r0, 0x4048ae9b, &(0x7f0000000200)={0x50000, 0x0, [0x7ff, 0xffffffffffffffff, 0x3, 0x7, 0x3d3d, 0x5, 0x0, 0x3]}) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() timer_create(0x0, &(0x7f0000066000)={0x0, 0x12}, &(0x7f0000000400)) creat(&(0x7f0000000700)='./bus\x00', 0x0) link(&(0x7f0000000080)='./bus\x00', &(0x7f00000000c0)='./file1\x00') 16:07:20 executing program 0: socket$inet_tcp(0x2, 0x1, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x2102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000100)=@nbd={'/dev/nbd', 0xffffffffffffffff, 0x6000}, &(0x7f0000001640)='./file0\x00', &(0x7f0000000040)='gfs2meta\x00', 0x0, 0x0) [ 1082.714214] gfs2: path_lookup on /dev/nbd returned error -2 [ 1082.741922] IPVS: ftp: loaded support on port[0] = 21 [ 1082.787236] ceph: device name is missing path (no : separator in [d::]: [ 1082.787236] llbE) [ 1082.813735] gfs2: path_lookup on /dev/nbd returned error -2 16:07:20 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020200090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e0100000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000010000"], 0x60}}, 0x0) 16:07:20 executing program 4: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x38200, 0x0) ioctl$TCFLSH(r0, 0x540b, 0x3) r1 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000b4508a)='/dev/ashmem\x00', 0x0, 0x0) getsockopt$bt_BT_SECURITY(r0, 0x112, 0x4, &(0x7f0000000040), 0x2) ioctl$ASHMEM_SET_SIZE(r1, 0x40087703, 0x400000000009) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x0, 0x12, r1, 0x0) 16:07:20 executing program 0: socket$inet_tcp(0x2, 0x1, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x2102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000100)=@nbd={'/dev/nbd', 0xffffffffffffffff, 0x700}, &(0x7f0000001640)='./file0\x00', &(0x7f0000000040)='gfs2meta\x00', 0x0, 0x0) 16:07:20 executing program 1: r0 = memfd_create(&(0x7f00000001c0)='ppp0+,selfppp0vmnet1proc\']\x00', 0x0) syz_open_dev$sndseq(&(0x7f0000050000)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$KVM_SET_GUEST_DEBUG(r0, 0x4048ae9b, &(0x7f0000000200)={0x50000, 0x0, [0x7ff, 0xffffffffffffffff, 0x3, 0x7, 0x3d3d, 0x5, 0x0, 0x3]}) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() creat(&(0x7f0000000700)='./bus\x00', 0x0) link(&(0x7f0000000080)='./bus\x00', &(0x7f00000000c0)='./file1\x00') [ 1082.841876] gfs2: path_lookup on /dev/nbd returned error -2 [ 1082.848326] ceph: device name is missing path (no : separator in [d::]: [ 1082.848326] llbE) [ 1082.942216] gfs2: path_lookup on /dev/nbd returned error -2 [ 1083.175832] IPVS: ftp: loaded support on port[0] = 21 16:07:20 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, 0x0, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_INFO(r1, 0x29, 0x40, &(0x7f00000000c0)={'security\x00\x00\x00\x00\x00\x00\x01\x02\x00'}, &(0x7f0000000140)=0x54) 16:07:20 executing program 3: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[d::]:\nllbE\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x03', 0x0, 0x0) 16:07:20 executing program 1: r0 = memfd_create(&(0x7f00000001c0)='ppp0+,selfppp0vmnet1proc\']\x00', 0x0) syz_open_dev$sndseq(&(0x7f0000050000)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$KVM_SET_GUEST_DEBUG(r0, 0x4048ae9b, &(0x7f0000000200)={0x50000, 0x0, [0x7ff, 0xffffffffffffffff, 0x3, 0x7, 0x3d3d, 0x5, 0x0, 0x3]}) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000700)='./bus\x00', 0x0) link(&(0x7f0000000080)='./bus\x00', &(0x7f00000000c0)='./file1\x00') 16:07:20 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020200090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e0100000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000001"], 0x60}}, 0x0) 16:07:20 executing program 0: socket$inet_tcp(0x2, 0x1, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x2102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000100)=@nbd={'/dev/nbd', 0xffffffffffffffff, 0x7}, &(0x7f0000001640)='./file0\x00', &(0x7f0000000040)='gfs2meta\x00', 0x0, 0x0) 16:07:20 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000b4508a)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x400000000009) clock_getres(0x2, &(0x7f0000000000)) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x0, 0x12, r0, 0x0) 16:07:20 executing program 0: socket$inet_tcp(0x2, 0x1, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x2102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000100)=@nbd={'/dev/nbd', 0xffffffffffffffff, 0x6c}, &(0x7f0000001640)='./file0\x00', &(0x7f0000000040)='gfs2meta\x00', 0x0, 0x0) [ 1083.283241] gfs2: path_lookup on /dev/nbd returned error -2 16:07:20 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000b4508a)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x40000000000b) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x0, 0x12, r0, 0x0) 16:07:21 executing program 1: r0 = memfd_create(&(0x7f00000001c0)='ppp0+,selfppp0vmnet1proc\']\x00', 0x0) syz_open_dev$sndseq(&(0x7f0000050000)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$KVM_SET_GUEST_DEBUG(r0, 0x4048ae9b, &(0x7f0000000200)={0x50000, 0x0, [0x7ff, 0xffffffffffffffff, 0x3, 0x7, 0x3d3d, 0x5, 0x0, 0x3]}) creat(&(0x7f0000000700)='./bus\x00', 0x0) link(&(0x7f0000000080)='./bus\x00', &(0x7f00000000c0)='./file1\x00') [ 1083.365582] IPVS: ftp: loaded support on port[0] = 21 16:07:21 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020200090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e0100000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e000000100000000007fffff"], 0x60}}, 0x0) 16:07:21 executing program 3: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[d::]:\nllbE\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) [ 1083.475475] gfs2: path_lookup on /dev/nbd returned error -2 [ 1083.482323] gfs2: path_lookup on /dev/nbd returned error -2 16:07:21 executing program 0: socket$inet_tcp(0x2, 0x1, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x2102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000100)=@nbd={'/dev/nbd', 0xffffffffffffffff, 0x6800000000000000}, &(0x7f0000001640)='./file0\x00', &(0x7f0000000040)='gfs2meta\x00', 0x0, 0x0) [ 1083.528150] ceph: device name is missing path (no : separator in [d::]: [ 1083.528150] llbE) [ 1083.599000] gfs2: path_lookup on /dev/nbd returned error -2 [ 1083.840255] IPVS: ftp: loaded support on port[0] = 21 16:07:21 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, 0x0, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_INFO(r1, 0x29, 0x40, &(0x7f00000000c0)={'security\x00\x00\x00\x00.\x02\x00'}, &(0x7f0000000140)=0x54) 16:07:21 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020200090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e0100000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e000000100fffffffb000000"], 0x60}}, 0x0) 16:07:21 executing program 1: r0 = memfd_create(&(0x7f00000001c0)='ppp0+,selfppp0vmnet1proc\']\x00', 0x0) syz_open_dev$sndseq(&(0x7f0000050000)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$KVM_SET_GUEST_DEBUG(r0, 0x4048ae9b, &(0x7f0000000200)={0x50000, 0x0, [0x7ff, 0xffffffffffffffff, 0x3, 0x7, 0x3d3d, 0x5, 0x0, 0x3]}) creat(&(0x7f0000000700)='./bus\x00', 0x0) link(&(0x7f0000000080)='./bus\x00', &(0x7f00000000c0)='./file1\x00') 16:07:21 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000b4508a)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x400000000009) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x231) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IP_VS_SO_SET_TIMEOUT(r1, 0x0, 0x48a, &(0x7f0000000000)={0xfffffffffffff298, 0x7, 0xd21}, 0xc) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x0, 0x12, r0, 0x0) 16:07:21 executing program 3: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[d::]:\nllbE\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 16:07:21 executing program 0: socket$inet_tcp(0x2, 0x1, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x2102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000100)=@nbd={'/dev/nbd', 0xffffffffffffffff, 0x7a00000000000000}, &(0x7f0000001640)='./file0\x00', &(0x7f0000000040)='gfs2meta\x00', 0x0, 0x0) [ 1083.994793] ceph: device name is missing path (no : separator in [d::]: [ 1083.994793] llbE) [ 1084.000113] gfs2: path_lookup on /dev/nbd returned error -2 16:07:21 executing program 0: socket$inet_tcp(0x2, 0x1, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x2102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000100)=@nbd={'/dev/nbd', 0xffffffffffffffff, 0x8cffffff}, &(0x7f0000001640)='./file0\x00', &(0x7f0000000040)='gfs2meta\x00', 0x0, 0x0) 16:07:21 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000b4508a)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x400000000009) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x0, 0x12, r0, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000000)={&(0x7f0000700000/0x2000)=nil, 0x2000}, &(0x7f0000000040)=0x10) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r0, 0x400c6615, &(0x7f00000000c0)) [ 1084.041821] IPVS: ftp: loaded support on port[0] = 21 [ 1084.049190] ceph: device name is missing path (no : separator in [d::]: [ 1084.049190] llbE) 16:07:21 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020200090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e0100000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000020000000000"], 0x60}}, 0x0) 16:07:21 executing program 1: r0 = memfd_create(&(0x7f00000001c0)='ppp0+,selfppp0vmnet1proc\']\x00', 0x0) syz_open_dev$sndseq(&(0x7f0000050000)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$KVM_SET_GUEST_DEBUG(r0, 0x4048ae9b, &(0x7f0000000200)={0x50000, 0x0, [0x7ff, 0xffffffffffffffff, 0x3, 0x7, 0x3d3d, 0x5, 0x0, 0x3]}) creat(&(0x7f0000000700)='./bus\x00', 0x0) link(&(0x7f0000000080)='./bus\x00', &(0x7f00000000c0)='./file1\x00') 16:07:21 executing program 3: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[d::]:\nllbE\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) [ 1084.111718] gfs2: path_lookup on /dev/nbd returned error -2 16:07:21 executing program 0: socket$inet_tcp(0x2, 0x1, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x2102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000100)=@nbd={'/dev/nbd', 0xffffffffffffffff, 0x20000000}, &(0x7f0000001640)='./file0\x00', &(0x7f0000000040)='gfs2meta\x00', 0x0, 0x0) [ 1084.244950] ------------[ cut here ]------------ [ 1084.252859] BUG: unable to handle kernel paging request at ffffc90000003e88 [ 1084.259973] PGD 1da95a067 P4D 1da95a067 PUD 1da95b067 PMD 1da95d067 PTE 0 [ 1084.266914] Oops: 0000 [#1] PREEMPT SMP KASAN [ 1084.271426] CPU: 0 PID: 20832 Comm: syz-executor2 Not tainted 4.20.0-rc7+ #381 [ 1084.278781] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1084.288147] RIP: 0010:find_next_zero_bit+0x5a/0x140 [ 1084.293166] Code: dc 95 ee fd 48 89 d8 48 c1 e8 06 4d 8d 24 c6 48 b8 00 00 00 00 00 fc ff df 4c 89 e2 48 c1 ea 03 80 3c 02 00 0f 85 cf 00 00 00 <4d> 8b 24 24 89 d9 31 ff 48 83 e3 c0 4c 89 e0 49 c7 c4 ff ff ff ff [ 1084.312081] RSP: 0018:ffff88818e407010 EFLAGS: 00010046 [ 1084.317448] RAX: dffffc0000000000 RBX: 000000000001f44e RCX: ffffc90009e26000 [ 1084.324715] RDX: 1ffff920000007d1 RSI: ffffffff8390ee94 RDI: 0000000000000006 [ 1084.331985] RBP: ffff88818e407038 R08: ffff8881d25d8200 R09: 0000000000000000 [ 1084.339270] R10: ffffed1031c80e0b R11: 0000000000000003 R12: ffffc90000003e88 [ 1084.346545] R13: 000000000001f858 R14: ffffc90000000000 R15: ffffc90000000000 [ 1084.353816] FS: 00007f66e15b1700(0000) GS:ffff8881dae00000(0000) knlGS:0000000000000000 [ 1084.362055] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1084.367948] CR2: ffffc90000003e88 CR3: 00000001b9d50000 CR4: 00000000001426f0 [ 1084.375216] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 1084.382488] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 1084.389757] Call Trace: [ 1084.392370] bitmap_find_next_zero_area_off+0x84/0xd0 [ 1084.397570] pcpu_alloc_area+0x1ab/0x4a0 [ 1084.401642] pcpu_alloc+0x8b0/0x15e0 [ 1084.405363] ? pcpu_balance_workfn+0x1700/0x1700 [ 1084.410122] ? pcpu_balance_workfn+0x1700/0x1700 [ 1084.414885] ? kasan_kmalloc+0xc7/0xe0 [ 1084.418778] ? zap_class+0x640/0x640 [ 1084.422563] ? xdp_rxq_info_reg+0x11a/0x1b0 [ 1084.426903] ? alloc_netdev_mqs+0xba6/0xfe0 [ 1084.431235] ? __lock_is_held+0xb5/0x140 [ 1084.435305] __alloc_percpu_gfp+0x27/0x30 [ 1084.439506] dst_cache_init+0x2b/0xd0 [ 1084.443328] ? cpumask_next+0x41/0x50 [ 1084.447159] ip_tunnel_init+0x155/0x450 [ 1084.451174] erspan_tunnel_init+0x215/0x280 [ 1084.455501] ? gre_tap_init+0xb0/0xb0 [ 1084.459319] register_netdevice+0x332/0x11d0 [ 1084.463734] ? netdev_change_features+0x110/0x110 [ 1084.468580] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1084.474120] ? rtnl_is_locked+0xb5/0xf0 [ 1084.478093] ? rtnl_trylock+0x20/0x20 [ 1084.481895] ? lock_downgrade+0x900/0x900 [ 1084.486048] ? check_preemption_disabled+0x48/0x280 [ 1084.491068] __ip_tunnel_create+0x361/0x550 [ 1084.495396] ? ip_tunnel_encap_del_ops+0x70/0x70 [ 1084.500164] ip_tunnel_init_net+0x3fc/0xac0 [ 1084.504486] ? check_preemption_disabled+0x48/0x280 [ 1084.509527] ? ip_tunnel_ioctl+0xd50/0xd50 [ 1084.513766] ? __lock_is_held+0xb5/0x140 [ 1084.517839] ? __lock_is_held+0xb5/0x140 [ 1084.521908] erspan_init_net+0x29/0x30 [ 1084.525794] ? erspan_init_net+0x29/0x30 [ 1084.529858] ? ipgre_tap_exit_batch_net+0x30/0x30 [ 1084.534705] ops_init+0x101/0x560 [ 1084.538158] ? net_alloc_generic+0x70/0x70 [ 1084.542410] setup_net+0x362/0x8d0 [ 1084.545955] ? copy_net_ns+0x28c/0x4a0 [ 1084.549302] kobject: 'loop1' (000000004c0d9fb2): kobject_uevent_env [ 1084.549848] ? ops_init+0x560/0x560 [ 1084.549866] ? lock_release+0xa00/0xa00 [ 1084.549881] ? perf_trace_sched_process_exec+0x860/0x860 [ 1084.549902] ? rcu_pm_notify+0xc0/0xc0 [ 1084.556313] kobject: 'loop1' (000000004c0d9fb2): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 1084.559918] ? down_read_killable+0x90/0x150 [ 1084.559930] ? copy_net_ns+0x28c/0x4a0 [ 1084.559949] ? down_write+0x130/0x130 [ 1084.587434] kobject: 'loop4' (00000000c14b0004): kobject_uevent_env [ 1084.590947] copy_net_ns+0x2b1/0x4a0 [ 1084.590965] ? net_drop_ns+0x30/0x30 [ 1084.594773] kobject: 'loop4' (00000000c14b0004): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 1084.601151] ? do_mount+0x31f0/0x31f0 [ 1084.601173] ? kmem_cache_alloc+0x33a/0x730 [ 1084.626159] ? copy_fs_struct+0x240/0x2d0 [ 1084.630325] create_new_namespaces+0x6ad/0x900 [ 1084.634925] ? sys_ni_syscall+0x20/0x20 [ 1084.638916] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1084.644462] ? ns_capable_common+0x13f/0x170 [ 1084.648883] unshare_nsproxy_namespaces+0xc3/0x1f0 [ 1084.653822] ksys_unshare+0x79c/0x10b0 [ 1084.657756] ? posix_ktime_get_ts+0x15/0x20 [ 1084.662093] ? walk_process_tree+0x440/0x440 [ 1084.666532] ? _copy_to_user+0xc8/0x110 [ 1084.670530] ? put_timespec64+0x10f/0x1b0 [ 1084.674686] ? nsecs_to_jiffies+0x30/0x30 [ 1084.678849] ? do_syscall_64+0x9a/0x820 [ 1084.682830] ? do_syscall_64+0x9a/0x820 [ 1084.686814] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 1084.691409] ? trace_hardirqs_on+0xbd/0x310 [ 1084.695739] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1084.701291] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1084.706661] ? trace_hardirqs_off_caller+0x310/0x310 [ 1084.711779] __x64_sys_unshare+0x31/0x40 [ 1084.715854] do_syscall_64+0x1b9/0x820 [ 1084.716837] Trying to vfree() nonexistent vm area (00000000735b2a29) [ 1084.719749] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1084.719767] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1084.719781] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1084.719797] ? trace_hardirqs_on_caller+0x310/0x310 [ 1084.719818] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1084.726547] WARNING: CPU: 1 PID: 20848 at mm/vmalloc.c:1511 __vunmap+0x397/0x460 [ 1084.731663] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1084.736566] Kernel panic - not syncing: panic_on_warn set ... [ 1084.741399] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1084.774623] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1084.779821] RIP: 0033:0x457669 [ 1084.783019] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1084.801920] RSP: 002b:00007f66e15b0c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000110 [ 1084.809629] RAX: ffffffffffffffda RBX: 0000000000000001 RCX: 0000000000457669 [ 1084.816892] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 000000006c060000 [ 1084.824159] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1084.831422] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f66e15b16d4 [ 1084.838687] R13: 00000000004c5aa9 R14: 00000000004da2a8 R15: 00000000ffffffff [ 1084.845970] Modules linked in: [ 1084.849168] CR2: ffffc90000003e88 [ 1084.852622] ---[ end trace 6a6fcebfa39310bf ]--- [ 1084.857383] RIP: 0010:find_next_zero_bit+0x5a/0x140 [ 1084.862398] Code: dc 95 ee fd 48 89 d8 48 c1 e8 06 4d 8d 24 c6 48 b8 00 00 00 00 00 fc ff df 4c 89 e2 48 c1 ea 03 80 3c 02 00 0f 85 cf 00 00 00 <4d> 8b 24 24 89 d9 31 ff 48 83 e3 c0 4c 89 e0 49 c7 c4 ff ff ff ff [ 1084.881293] RSP: 0018:ffff88818e407010 EFLAGS: 00010046 [ 1084.886653] RAX: dffffc0000000000 RBX: 000000000001f44e RCX: ffffc90009e26000 [ 1084.893921] RDX: 1ffff920000007d1 RSI: ffffffff8390ee94 RDI: 0000000000000006 [ 1084.901186] RBP: ffff88818e407038 R08: ffff8881d25d8200 R09: 0000000000000000 [ 1084.908449] R10: ffffed1031c80e0b R11: 0000000000000003 R12: ffffc90000003e88 [ 1084.915719] R13: 000000000001f858 R14: ffffc90000000000 R15: ffffc90000000000 [ 1084.922988] FS: 00007f66e15b1700(0000) GS:ffff8881dae00000(0000) knlGS:0000000000000000 [ 1084.931207] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1084.937083] CR2: ffffc90000003e88 CR3: 00000001b9d50000 CR4: 00000000001426f0 [ 1084.944352] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 1084.951631] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 1085.951282] Shutting down cpus with NMI [ 1085.956251] Kernel Offset: disabled [ 1085.959875] Rebooting in 86400 seconds..