[....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[ 31.226629] random: sshd: uninitialized urandom read (32 bytes read) [?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 syzkaller login: [ 34.525454] random: sshd: uninitialized urandom read (32 bytes read) [ 35.097888] random: sshd: uninitialized urandom read (32 bytes read) [ 36.510125] random: sshd: uninitialized urandom read (32 bytes read) Warning: Permanently added '10.128.0.56' (ECDSA) to the list of known hosts. [ 42.035140] random: sshd: uninitialized urandom read (32 bytes read) 2018/06/09 19:48:13 fuzzer started [ 43.670178] random: cc1: uninitialized urandom read (8 bytes read) 2018/06/09 19:48:16 dialing manager at 10.128.0.26:42821 [ 69.841062] can: request_module (can-proto-0) failed. [ 69.852204] can: request_module (can-proto-0) failed. 2018/06/09 19:48:42 kcov=true, comps=false 19:48:49 executing program 0: r0 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x7, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000040)='highspeed\x00', 0xa) ioctl$TIOCLINUX6(r0, 0x541c, &(0x7f0000000080)={0x6, 0x3}) ioctl$KDDELIO(r0, 0x4b35, 0x5ad) r1 = socket$alg(0x26, 0x5, 0x0) r2 = fcntl$dupfd(r1, 0x406, r1) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f00000000c0)={0x0, 0xffffffff, 0xeac38966499e82f7, 0x4, 0x5, 0x6, 0x2, 0x81, 0x0}, &(0x7f0000000100)=0x20) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r2, 0x84, 0x18, &(0x7f0000000140)={r3, 0x3}, 0x8) r4 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x4a0901, 0x0) setsockopt$bt_BT_DEFER_SETUP(r4, 0x112, 0x7, &(0x7f00000001c0)=0x7fffffff, 0x4) r5 = semget(0x2, 0x1, 0x2) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000200)={{{@in6=@mcast2, @in=@rand_addr, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in6}}, &(0x7f0000000300)=0xe8) lstat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresuid(&(0x7f0000000400)=0x0, &(0x7f0000000440), &(0x7f0000000480)) r10 = getgid() semctl$IPC_SET(r5, 0x0, 0x1, &(0x7f00000004c0)={{0xfffffffffffffff8, r6, r8, r9, r10, 0x11, 0x57a}, 0x5, 0x3, 0x377a}) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000540)={r3, @in={{0x2, 0x4e22, @rand_addr=0x9ad7}}}, &(0x7f0000000600)=0x84) ioctl$FS_IOC_SETFSLABEL(r4, 0x41009432, &(0x7f0000000640)="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") setreuid(r7, r6) semctl$IPC_STAT(r5, 0x0, 0x2, &(0x7f0000000740)=""/148) remap_file_pages(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x2000000, 0x1, 0x4000) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r4, 0x84, 0x1b, &(0x7f0000000800)={r3, 0x1000, "ef86e2722ba86e567a7cf15c0e6147d50ef9d5b8f61175f55d6bde5d45d17297896d3f9ff489ba5e1c52ebfd98888811cc77b36eae0d0f0f5b4c4c0ef8e6357d56c691107b88ffa6ba63a51fa594a1b3f150e2fa37d879f77f6075c7949ba77aba003922a989ff71ed1bdad1d20d7aa5e119cd3b9bc214ae721dbe92d9f01d7908e147b32e2b5f6b3601f0a96c69d5419823d735e63a235bb82790a5c3557d62b249dc653e234f6e707d1845c941d230c1cbf62a5332e917b8bf3d165c93111c161f71292764b5619f8e582819454f27ebc7ff89c3ef2f5217df3da72c4a059a297586d8d26840b7166ca6eac45db9bdcd69140d8ecc52d2cb7fa049b727f3218d89870c4c24a6843a568b040f6af2b8ed2464ae0ec91581b010e2b972c11f8a1e2fc3befc25e9a1a1874ae55ec161ab6911fa20cd13a2cd811aa958c8c6fe8a0ce0a84cba9b670a794188841ee9f5616789aadd78469fb7d6b186b86df786d277a00c67b332f6e9c0d5cfdf97e6fbdaa8844bb9aa506fd9ddda849f2fffed1bc1fd95688972c410326ba365d28f27357be0a0f834c6c2dbef06877e10a5f49915dbb23095b8596c9d8b8fa6aa4a4cc5b92844291c539f34a11eda841f6e78bf55c39bb2b0859d106a5809ef6e49bbfee7bc198173a614781642335707e83759da3804839af2f88cc004fae79d47c2d536b381af5e1aa650bd48aeb29239031a59428cbfaa3ef041fb851edba2fb02db720b02cd6e33cd8e22fced39abcb463da89d05aacd145c49965f5f2a79fb4d1e51cde393092ada863634d3711e6e4894f1226cfed86b131d8d61a5e611dd7b12bfd9efc6671af6584aafd6d5d541eae5e84afbd685e69d1933c70e9419b5cc95cb4c580278282753559f3214b00a7d8448e823404265ae8b2bc9d71d28b810b992746b447598821f5d7f799c4b080d7efc0df01c81346c7d3f94252d12b158e5eaf8d5e9090eb0d8cd1353234251c506c5f24aedb21bc48c507befac92991459d922fe3674c5330f2d28ebe3e08bc2c3df2e7047acd3124a7906eca0c1dd29d07cb26eebbdbe4db0b351aabe3c1aa9741f1319bfd3ad8917ced58d78f46569c4e5506cdff29355a800399c7b6fb41818fae4352a3124956c1d7b24067ffaf33205a727c89afc667329d3068b747f957694d8a6b6fb49e2f0f2dc1f97ced82c16fd0530fbca2a3dde9c2eaa5c0e04fe099c47e53beb0e9f30afd6b4e540c7fad7094df80a9f9b674d2a168081553940ebc58f0a542861cac9da9f8591d612b6e7954308f053e53230a6d5219fe326421d9a3bc125dfdda3fc60e5039885406a7407a7ea686220eb432fc54d93249984d085f65f891cfff871ae9cf2ea093d2c6d8b10acf43d21f4a166d41a1fac7fb4d5566e8b88a938d5667bd18dbd7308c13da38027a50d6faf01510184fd45b5773fab2fe304a3172aea3c42f7540889df639d633d351272e22a35a95aace66c25bf8880021c6490a3bf000a280bc42ab200d51365a8d1469cabaf50d22cefb653ce6b092bc1bb9289277823bba3d33655cc2a158704d1a29a9f39a18fb2d0d1f2865889c5da39bb6b3964bb094c5810e071159f14546fb89dc22d9c0f5fb18705a2750ef7c51efbe5feac8940fa7ca35891b9a822147f02e800fead11a4ff1ea6a70a0242e15c6602c0914bbc337c5f3802f68a012940d536edab37bbd8d96f2552be037d704fff3a1f0a3d5a6648f12f4f1cdef9d7b244534e10e0b1a3f587c17456ae51ee5aecad206a3df143d7bd39464ac1b200202c5732e5f56dd8c68086be4b939ca9d97aedef96762f97af9e9b61378119ec1253f0f8fd8f6639a5cd8fa555e751ef51d7fe32a52556ec45fac5fee287b776e198a0d1e8ebee099786ed922f465b127ce39116b19cf0940a1886d080daf4e87f09433d7823e2f7be7dab75e043d45ab25ab96975c61983183a96d8d6c569b86e8f636c72003678007029da554ac946780525ba3d52a38e5aa4b90a499dd792c2856f0ed2b314b5791219ec695f5f1d5e61f3dadd1d45df7d2b34a3ad3bfd0d0b9a459fee3ba8ca377b68d449dbc5ec38e006e5c35f1cfba0d3462f9fb70d1c0cb64c64358bbeafa089ddf4de273321397c0d2eed967187b5ab6f57b85f9fa4d48d1c54f58cddd56a1adad3820be792dec328b818e98df21930f58e6535fcffcac5bd1db4e3095331336e2158960a35ec0bc59e95f07a6f77d23b1bb601dc8e1146796507c045026cfad01c6c6d0f60afb7fe1ba275a9621159c4911256eb69822be5e2173699364a815832ff63de98ffaaf4807f7077eb809ee048d91d79e7cd9484ef12d07300f03df91e59d8e2cd48114e64779b0cfaa3b370ffeebbf39a8d15b0d40b107e9245ad722514755f92254bade8328d57e7ebcfde4402f16431c0f9012c7c6cd016b170b18d2d731637c876d3a95af88801db18ed7e735e3035a5d6a23381d3bfcd83a576bc3d977c2c18f1b5f9ed76853b52f81a969d013cb223217d0bdcfe3a71a55b537959fa40fb0bd74dada0b1bf5a34a21dd05d8335286714b1d4efd4c267613f83b491e3a64bff04e5c85b0e4a524560838bff516ebc7a4059d57f46936ff7384691c907f0367bbf66e4a3f9031dc0a5411add1f6e2f8c07eae4100f4d6fe297170f25af00c5e3701b7b5847ce49d4e5e28fb41850f1ecefa3f20fe5aa1db8104435302a0dcbbeccc72a1568bcb9fab63bdca5104fc366e8e2364f65a5a38190459f454ace6f7e1e2b6271fca488abcc7ef3ff095dde9c6988250b148516649744bf88d64b168b796277f295efe85148488852962b84c62be246aa9070887105f343c93da5a93aca91df85246219713db0c059152a3fb287ff87ad022bff4d6ce483f5fd1f9a1416fc5a2921deb89cdafe01b457074b9550763ce9487bf7d69d7766ac23706e086ef975340cd0623ba86e226b9fffb2024c691b531abeeadb225561b33272a739876e476cf0cd481b668ffff068acc5c397135b7080ce6d379a79c326c5b14cf3b5c002cd9e0267a0d8267c4521afca8ba18ecf5e629aff7c43063a25be4e3dfcb18e38e28a5521eff42bfa370db81f113731ceea5a6b29b3cad2a849b571ff7b650485acf9c7b6fc452258f631b3519b630143990b32ef0a03ff7d56dea15d8990e9089682ff06b445df1ddd01be19ab106975476696e0254b67a26034647496158f59e2b68b143be204e2febcd832beeb9f9cf004b7a7c7e462c435b8a8508a5f6f311504ea17ce2cb1e6745a2edf93154378c7f93890284e682c74cb8ecfc269f9d1347149570fc31cebc5dd581544aaa17b48f3d95307b164acbae8cb18a3b7455792d95511e2f5b8f362efe496c8b7924a46a76273a36fe0e9f93163b79c1145b30d2fdb0310556bd7475ced1961a489afd78f0664a6238cb75fec6caecf716ae9dea9b4e060ffce068c947bc87d56870d7e75fa4d5a3686f502284434de781bd4c8ee782bcef4e5b0c8b7e5fe0665491595fa68aa4e14554708f7f796c1b6de598a675407d4ec92b396a7cf8d4d2c82f9ee40a0b817f87b1047eacd7ce5723a7ede041f909660270db3b0f8cb5d794bdfbf87590ca481824a2ccc2c5651e94e1098958d627445d762cd929744b912847a469a1a4faf13eb39bdc070ba59f68c350eb7e189d971d6bac3a04f54fba5afa361a5fabb5c0206e5296a8693dfd58a27a0aa0c4b90b771bec1e4277d9fa23ef35abed9a37ec779aef0828af8adc512bb6c255ffe4ea2709540017cf908134d2efc8927b1a188bc18fab7caf5875a1abdbca7f1410c1446f7565f9e6efb388cbe049d949002b6618138ff3bb550eb9df3fe4cbe15b3e935765daeed07cbf2d48c55965bb0c647b80b757904d8b3c66816b39761098274909b68b7c1833850863dbc2567d04adb27b871e5e4cb3edb646484446290ad43f3b21d000adfb4174125d9492dd25b680970c225af743061fef8d8873e5651c7d9797cdf1dc8b9522ce71bcb84976673c32e406ff021d4a31a1afd45a1cf948e30c83b7bd91bcac26bd39ba49706d5401337ef2715e5698afe925aedb9369e60e505a2019c447e7e727a2c5752d430f37ca6776935b1dc0fd453f744d5a7cf2faeed081e611e0ef03ed9b5a4b5884db6cee560cfd13e6202e4829f46e03675bd7481f553cc0e9f29d662b096faf9f271c100df22784225418f1e975aae7686bba9c4711d95046de335e39a60bf628494d32fa7c1668a1910a6e1bc309a6c05321eff676393657d3c763fa6bafb072c0e2cf087d46691f4a23965e77105c8d019e1b44cedae6221c6e9e3da7e91bcc63338f5db6134e857d0eb09135175fbc74118d128a723b6d97a7693f241328c6aa70ee1707476df7e98acb74f6fd25984f9265ad60ffc3e4d569d095b9efeb8c8109f78b308f8bf8e05414ad8bb352d67fd4dc7e7e8f3725eb569be1ab4f95eb720ab11d2ce58ee2ecc8f0a0fb9bac71907554a390eadeec4618a1aee129484babb686cae79d9ba149a264d90962e8ef923719285af24cce312a6462799023c397ba39deb7ce6ace42951760dbde28bb1643082e5079f17e56434eadc70fd2c3eff6a9a46fb1643c97f9fa108fa5f0d04f529143124ba6e9d673fa36ae3e23bf4c14a19b631581bc097fa32e697fb081c72068250254361c981603e027b01077e319a1ab388a3fe4dbfb9e72f999345a6fcaa96a4c86900db2b5c41a06e013c43804c8e4b2c80d77d42902a2a534ab501fb42769932f7ae2f05d668dcb6401d34acb2983fbbdb3b19b2bb214dbd2eabfbbcc2bc78bde7add6cf2a1b94058d9196706d0fec975c23d45cad4246580a4b25909a27f0f09612405bb4abd69351213adc3696b9292f8292df7c88608fe22913eb83a4e88895a37d806ec2f2279d03ce0d5a61b99a958d57e2a40033e1d0a09d1f81459f88c1652b56a47ece6091127e2d0aa7ec1ab87c27b9b72c2eb218cd5beced72b9a719243308585446be82acc4d3da89e302631d7182eadee94a1a57f968423f6d8340f84596faaac9e191ee79dd72e6a4c86768a2599ff898b1f288c328f60b37498c10e183a35447eefb18d9792c52570a528310810d19723adb066e627fb4f1de91fe14f48136e4265b76c42decc94bffc3ec51696abedae17e11361660ff86ed1dfd010295959fde79f5df34b19e1eada63f7ec2d83d6c090155d3af4196b7104e369d4bf0a08378e475f233720a9b67cf15aaed12031ba9ecd51a61360ca5b6677dd930e8d7265e47ab39b36337ace04723a8bfcb467d275504001cd44249ac0df343c1a1beb42c3f87c148305313f777ef31ba60b3378927ab1ad47843b59a097dddb1d4a63fc337d388c4599bec92622ebf5a55e8ea744d7bd035655f3908ce472f17c81278ec8754d39c062ebb532f2422970d0868ab6c4252aa6058ed44e04ccdd7437c6996dd30872dc23c074e8c568f8025ab4ea6fc000d038e5d761279f0ea4f2477fc5475cfc8b87b36e64afa52960e2768cee02e78e8cab03def8e618d6db2a76d39dce9fd43d130138729eb6bbcbbeac52e33231ff289ca566687ad816bda0479ac6e4644d51f3d8cc338e7cb782e751af3cd2de67134aa0c3d9215ff1b8156eeb95bc62181cdf976c781f1812f94513594550a4367fc6fdbf4948e1ef3d3da5f4c0bb9eb756e2bc1daa6d0e150f103e717bf7865185c6f2143aa09b74be565374688aa6287506a316de51c9b5c593a343521ec4bbe0b6841238135e0af2d1c471087781c892b961f"}, &(0x7f0000001840)=0x1008) setresgid(r8, r8, r8) socket$nl_crypto(0x10, 0x3, 0x15) r11 = memfd_create(&(0x7f0000001880)="c17472757374656400", 0x2) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r2, 0x84, 0x13, &(0x7f00000018c0)=0x9, 0x4) getsockopt$bt_l2cap_L2CAP_CONNINFO(r11, 0x6, 0x2, &(0x7f0000001900), &(0x7f0000001940)=0x6) getsockopt$ARPT_SO_GET_REVISION_TARGET(r2, 0x0, 0x63, &(0x7f0000001980)={'ah\x00'}, &(0x7f00000019c0)=0x1e) setsockopt$EBT_SO_SET_ENTRIES(r4, 0x0, 0x80, &(0x7f0000001f80)=@filter={'filter\x00', 0xe, 0x3, 0x508, [0x0, 0x20001a40, 0x20001c00, 0x20001f18], 0x0, &(0x7f0000001a00), &(0x7f0000001a40)=[{0x0, '\x00', 0x0, 0x73541eac18a68f46, 0x1, [{{{0x3, 0x1, 0x600, 'bridge0\x00', 'dummy0\x00', 'bcsf0\x00', 'gre0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}, [0x0, 0xff, 0xff, 0xff, 0xff], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0xff, 0x0, 0xff, 0xff, 0x0, 0xff], 0xe0, 0x140, 0x190, [@m802_3={'802_3\x00', 0x8, {{0x8e, 0x7ff, 0x2, 0x5}}}, @connbytes={'connbytes\x00', 0x18, {{0x2, 0x6, 0x2, 0x1}}}]}, [@common=@STANDARD={'\x00', 0x8}, @common=@STANDARD={'\x00', 0x8, {0xffffffffffffffff}}]}, @common=@log={'log\x00', 0x28, {{0x401, "a5de9f7a749a6f658c79385e6ee0cc07c2d9e6cb93cb2933d04e6da3a7f5", 0x4}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x2, [{{{0x11, 0x1, 0x86dd, 'veth1\x00', 'team_slave_0\x00', 'bpq0\x00', '\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [0xff, 0x0, 0xff, 0xff, 0xff], @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [0x0, 0xff, 0xff, 0xff, 0x0, 0xff], 0x1c8, 0x218, 0x248, [@vlan={'vlan\x00', 0x8, {{0x1, 0x3, 0x8884, 0x5, 0x6}}}, @comment={'comment\x00', 0x100}]}, [@common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0xc00000000000000, 'syz0\x00', 0x1f}}}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x7ff}}}}, {{{0x5, 0x8, 0x884c, 'ifb0\x00', 'veth0_to_bridge\x00', 'vcan0\x00', 'erspan0\x00', @random='Y$7.=r', [0x0, 0xff, 0x0, 0xff, 0x0, 0xff], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0x57793a9f6c5797e1, 0x0, 0xff, 0xff, 0xff], 0x70, 0x70, 0xa0}}, @common=@STANDARD={'\x00', 0x8, {0xfffffffffffffffe}}}]}, {0x0, '\x00', 0x3, 0xffffffffffffffff}]}, 0x580) ioctl$PERF_EVENT_IOC_RESET(r4, 0x2403, 0xc4) 19:48:49 executing program 3: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x202080, 0x0) setsockopt$packet_buf(r0, 0x107, 0x0, &(0x7f0000000040)="918c31f606fa060a81b81c3fc34b7e043aac926b94961a807319c34a7e2da13a30249913e08080e1a264e03e0ba79da2a8cdee6acef128b97a8ced340fcecfd8b8f41dd947b6748e6fa4a3005bd60b902afbc57d40267cefc06f77b2ca196a6ad9b5fb9ac6d5b2e0377d2a579f413c402f31fa6bdb75d8a46146d0c94a9069b2397743aa", 0x84) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r0, 0x54a2) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000100)={0x1, [0x0]}, &(0x7f0000000140)=0x8) setsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000180)=@assoc_value={r1, 0x5}, 0x8) socket$vsock_dgram(0x28, 0x2, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f00000001c0)={0x3, [0x0, 0x0, 0x0]}, &(0x7f0000000200)=0x10) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000240)={r4, 0xfff}, &(0x7f0000000280)=0x8) ioctl$VHOST_GET_FEATURES(r0, 0x8008af00, &(0x7f00000002c0)) r6 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$SNDRV_CTL_IOCTL_PCM_INFO(r0, 0xc1205531, &(0x7f0000000300)={0x2, 0x842, 0x10000000200000, 0xa0a0, [], [], [], 0xc20000000, 0x9, 0x80000000, 0x7, "948b5eaadb3016624c8f9d42f5a6767a"}) getresuid(&(0x7f0000000440), &(0x7f0000000480), &(0x7f00000004c0)) accept4$alg(r0, 0x0, 0x0, 0x800) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000500)={0x1, 0x3, 0xe, 0x2, 0x84, 0x989, 0x1f, 0xffffffff00000001, r2}, 0x20) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000540)={r3, 0x1}, &(0x7f0000000580)=0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f00000005c0)={0x8, 0x4, 0x8, 0x4, r7}, 0x10) r8 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000600)='/proc/self/net/pfkey\x00', 0x800, 0x0) setsockopt$sock_int(r6, 0x1, 0x27, &(0x7f0000000640)=0x6, 0x4) syz_open_dev$sndseq(&(0x7f0000000680)='/dev/snd/seq\x00', 0x0, 0x400) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f00000006c0)=@assoc_value={r5, 0xfffffffffffffff8}, &(0x7f0000000700)=0x8) ioctl$SIOCGIFHWADDR(r0, 0x8927, &(0x7f0000000740)) sendmsg$nl_crypto(r8, &(0x7f0000000900)={&(0x7f0000000780)={0x10}, 0xc, &(0x7f00000008c0)={&(0x7f00000007c0)=@alg={0xe8, 0x10, 0x800, 0x70bd25, 0x25dfdbff, {{'drbg_pr_ctr_aes128\x00'}, [], [], 0x2000, 0x2000}, [{0x8, 0x1, 0x6}]}, 0xe8}, 0x1, 0x0, 0x0, 0x4}, 0x0) getpeername$netlink(r6, &(0x7f0000000940), &(0x7f0000000980)=0xc) r10 = syz_open_dev$audion(&(0x7f00000009c0)='/dev/audio#\x00', 0x1, 0x800) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000a00)={{0xa, 0x4e23, 0x7, @local={0xfe, 0x80, [], 0xaa}, 0x10001}, {0xa, 0x4e22, 0x7ff, @ipv4={[], [0xff, 0xff], @multicast1=0xe0000001}, 0x200}, 0x4, [0x3f, 0x1, 0x7ff, 0x0, 0x8, 0x7fffffff, 0xffffffffffffffff, 0x9]}, 0x5c) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r8, 0x84, 0x1b, &(0x7f0000000a80)={r9, 0x5a, "92ca7172d8db258008c6a04eaa73f5abd7e38718bf278def3785ba06657b53a4b9c99c43034eeee0438605f95ed96cc7cbbb104009311dbb1e9eb3f6a6b76a02003ff9081a08decb9a544569e0204eafc72ebbbe64b3889ade32"}, &(0x7f0000000b00)=0x62) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f0000000b40)={r9, 0x10000, 0x7}, 0x8) getsockopt$inet6_int(r10, 0x29, 0x16, &(0x7f0000000b80), &(0x7f0000000bc0)=0x4) getsockopt$packet_int(r8, 0x107, 0x1f, &(0x7f0000000c00), &(0x7f0000000c40)=0x4) rt_sigpending(&(0x7f0000000c80), 0x8) 19:48:49 executing program 4: r0 = accept$inet(0xffffffffffffff9c, &(0x7f0000000000)={0x0, 0x0, @broadcast}, &(0x7f0000000040)=0x10) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffff9c, 0x84, 0x73, &(0x7f0000000080)={0x0, 0x8000, 0x20, 0x5, 0xc4b}, &(0x7f00000000c0)=0x18) setsockopt$inet_sctp_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000000100)=@assoc_value={r1, 0x3f}, 0x8) getsockopt$inet_sctp_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f0000000140)={r1, 0x5a5, 0xffffffffffffa1f7, 0x6, 0xfffffffeffffffff, 0x800, 0x6, 0x100, {r1, @in={{0x2, 0x4e21, @multicast2=0xe0000002}}, 0xb2, 0x5, 0x4, 0x81, 0x200}}, &(0x7f0000000200)=0xb0) ioctl$TIOCGLCKTRMIOS(r0, 0x5456, &(0x7f0000000240)={0x0, 0xfffffffffffffff7, 0x400000000000, 0x3, 0x1, 0x2, 0x8, 0x87, 0x0, 0x5, 0x7ff, 0x4}) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000000280)={r2, 0x5d0, 0x30}, 0xc) r3 = syz_open_dev$usbmon(&(0x7f00000002c0)='/dev/usbmon#\x00', 0x2, 0x80000) ioctl$KDGETKEYCODE(r3, 0x4b4c, &(0x7f0000000300)={0x468, 0x9}) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000340)={{{@in6=@local, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@loopback}}, &(0x7f0000000440)=0xe8) r5 = request_key(&(0x7f0000000480)='user\x00', &(0x7f00000004c0)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000500)='/dev/usbmon#\x00', 0xfffffffffffffffd) keyctl$get_persistent(0x16, r4, r5) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r3, 0x84, 0x10, &(0x7f0000000540)=@sack_info={r2, 0x9, 0xfffffffffffffffb}, &(0x7f0000000580)=0xc) ioctl$LOOP_SET_CAPACITY(r3, 0x4c07) setsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r3, 0x84, 0x1f, &(0x7f00000005c0)={r6, @in={{0x2, 0x4e24, @broadcast=0xffffffff}}, 0x8001, 0x80000000}, 0x90) r7 = semget(0x3, 0x2, 0x40) semctl$IPC_RMID(r7, 0x0, 0x0) r8 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000680)='/dev/snapshot\x00', 0x1, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) r10 = socket(0x1a, 0x80006, 0x21) ioctl$TIOCNOTTY(r3, 0x5422) r11 = getpgrp(0x0) migrate_pages(r11, 0x10001, &(0x7f0000000700)=0x8000, &(0x7f0000000740)=0x4) ioctl$SIOCSIFMTU(r3, 0x8922, &(0x7f0000000780)={'bond_slave_0\x00'}) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r3, 0x84, 0x20, &(0x7f00000007c0), &(0x7f0000000800)=0x4) ioctl$BLKROSET(r9, 0x125d, &(0x7f0000000840)) ioctl$sock_SIOCBRDELBR(r9, 0x89a1, &(0x7f0000000880)='veth0\x00') bind$ipx(r10, &(0x7f00000008c0)={0x4, 0x9, 0x1, "184c85bc87b6", 0x7fff}, 0x10) getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f0000000900)={0x0, 0x0, 0x0}, &(0x7f0000000940)=0xc) setgid(r12) ioctl$UFFDIO_API(r8, 0xc018aa3f, &(0x7f0000000980)={0xaa}) 19:48:49 executing program 5: r0 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x7, 0x20400) write$cgroup_type(r0, &(0x7f0000000040)='threaded\x00', 0x9) ioctl$sock_bt_bnep_BNEPGETSUPPFEAT(r0, 0x800442d4, &(0x7f0000000080)=0x20) fcntl$setlease(r0, 0x400, 0x2) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f00000000c0)=0x10, 0x4) ioctl$PPPIOCGMRU(r0, 0x80047453, &(0x7f0000000100)) ioctl$EVIOCGMASK(r0, 0x80104592, &(0x7f0000000240)={0x17, 0xfb, &(0x7f0000000140)="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"}) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f00000002c0)='IPVS\x00') sendmsg$IPVS_CMD_ZERO(r0, &(0x7f00000003c0)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000380)={&(0x7f0000000300)={0x68, r1, 0x610, 0x70bd26, 0x25dfdbfb, {0x10}, [@IPVS_CMD_ATTR_DAEMON={0xc, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x1}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0xfffffffffffff800}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x3ff}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x80000001}, @IPVS_CMD_ATTR_DEST={0xc, 0x2, [@IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0x2}]}, @IPVS_CMD_ATTR_DEST={0x24, 0x2, [@IPVS_DEST_ATTR_WEIGHT={0x8, 0x4}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x100}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xa}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x7}]}]}, 0x68}, 0x1, 0x0, 0x0, 0x800}, 0x4) bind$vsock_dgram(r0, &(0x7f0000000400)={0x28, 0x0, 0xffffffff, @my=0x0}, 0x10) setsockopt$ax25_buf(r0, 0x101, 0x19, &(0x7f0000000440)="e3d10637c967641163cabbf984697c57c3a8195d791975bb82bdc9c9df73a5f682730015c74651783fa7e55863ac65084001ce406b69fbeb861965ded79cebad3f8a6157f8df3ef8ee091d3fa34c288b2649b0de571e8edb15be9c375a2a6378c0bb6adefc28bba8a8e124572bc8a2df6ff493683eb2f4717fab85c6f6de46d337914ceeb51a49f5fa4b89f71003f6635856112cc48cb38d19c161675cb09775eca291406b146b9168fb856ac92df284ef51804907b7a17ec3adffd86b7e656d89d9a569b18fa1cf41c40291a12c57413cf41b3f8ece991dc1b62a53026332032d16b1bb", 0xe4) sync_file_range(r0, 0x7ff, 0x3, 0x1) ioctl$EVIOCRMFF(r0, 0x40044581, &(0x7f0000000540)=0x6) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000580)='/dev/ppp\x00', 0x4001, 0x0) ioctl$EVIOCGPROP(r0, 0x80404509, &(0x7f00000005c0)=""/30) sendto(r0, &(0x7f0000000600)="8ebf9ee0eaec324e9fb869205c6efca0e5554cc0b727ef584fc550f31276ffe7b8c61e575a3af48c12b31aebf76ec6718808ee27d312f7162184def909e8d852879d8c69bafb07afb61e18f628a2f4f979ac5dae37958533bf2d5db3abc60087a6e8f68f0c3c9e52d54bc65549b59fe837e977a2dd7e9e08319f8892a89a97d65e85827085dd949f80a14e7319c1aea66a42f9ff794a08018b3dae89b78cbbaefc565814a37c478d375735669ebaf35b6ed0cb85a18cb6aeae9fe0d79c8948", 0xbf, 0x4, &(0x7f00000006c0)=@llc={0x1a, 0x30e, 0x6, 0xffffffffffffff45, 0x5, 0x7ff}, 0x80) close(r0) ioctl$TIOCGETD(r0, 0x5424, &(0x7f0000000740)) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000780)={0xe01, 0x8, 0x80, 0x7fffffff, 0xfffffffffffffffe, 0xc2b5, 0xd4ec0000, 0x0, 0x8, 0xfffffffffffffff8, 0x9}) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r2, 0xc0a85320, &(0x7f00000007c0)={{0x7, 0x1f}, 'port0\x00', 0x40, 0x20, 0x3, 0x4, 0x80, 0x977, 0x376, 0x0, 0x5, 0x1}) setsockopt$netrom_NETROM_T2(r2, 0x103, 0x2, &(0x7f0000000880)=0x8, 0x4) r3 = semget$private(0x0, 0x3, 0x404) semctl$GETPID(r3, 0x0, 0xb, &(0x7f00000008c0)=""/11) ioctl$sock_FIOGETOWN(r2, 0x8903, &(0x7f0000000900)=0x0) ioctl$sock_FIOSETOWN(r0, 0x8901, &(0x7f0000000940)=r4) ioctl$sock_bt_hidp_HIDPCONNADD(r0, 0x400448c8, &(0x7f0000000a40)={r0, r0, 0x7fffffff, 0x60, &(0x7f0000000980)="d772248b3f63a7a14844fb5e108e4e19d00492eaeee59447a2584d3094128161ba3079fa8d0fe89ecaf33e46c8c49d422cf55215c1b8baf9986ffb69b8e849ee2e15d8696101b2d1c75a74065a9cee390880220cc58c4050eb205b409f6d9d120d9dde4332f19c9799d8a0aced1451ba73cf926552a73b17a1d223fdb1f806e517", 0x9, 0x1, 0x5, 0x5a94, 0x10001, 0x6, 0x6, "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"}) accept4$bt_l2cap(r0, &(0x7f0000001a80), &(0x7f0000001ac0)=0xe, 0x80000) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000001b00)={0x2000, 0x7f80000000000, 0x0, 0x1, 0x200, 0x1f, 0x2, 0x29a3, 0x45, 0x0, 0x9, 0x9}) connect$inet(r0, &(0x7f0000001b40)={0x2, 0x4e24, @loopback=0x7f000001}, 0x10) ioctl$GIO_SCRNMAP(r0, 0x4b40, &(0x7f0000001b80)=""/3) 19:48:49 executing program 6: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x200, 0x0) ioctl$PIO_FONTX(r0, 0x4b6c, &(0x7f0000000040)="b3f6437ead3b1258d84e4e2c242bdbc8f99f4704ebb879f498ae3058d3d7afd9dfd8c6eea364102160521782cbe358cccc2cd21ac7a295cbadcb33d2f18ea2d713f574de2bafde38d01e8b9b6b9aa9ce599c750ac598eb48345096636c6e2e086c30dadff9e38968caf85157dbc75a540c9c95f350658ff4f1597f847ffa285570e28dce0a275db0428c23d1f1bd76287de6ae7699281734f49fa2d3f72877bb0469ffc199e897dca49e989fcd3c644e3f9167a533ee362f2be38e7e935f2157c5d7c8efcdeb25b5828b10879b5a") ioctl$BLKTRACESTART(r0, 0x1274, 0x0) ioctl$TIOCSWINSZ(r0, 0x5414, &(0x7f0000000140)={0xbd, 0x395f, 0x1, 0x101}) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000180)=[@in6={0xa, 0x4e20, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0x3f}], 0x1c) ioctl$KDGETLED(r0, 0x4b31, &(0x7f00000001c0)) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) fcntl$setownex(r0, 0xf, &(0x7f0000000280)={0x1, r1}) getsockopt$inet6_tcp_buf(r0, 0x6, 0x0, &(0x7f00000002c0)=""/212, &(0x7f00000003c0)=0xd4) ioctl$KDSIGACCEPT(r0, 0x4b4e, 0x18) accept4$vsock_stream(r0, &(0x7f0000000400)={0x28, 0x0, 0x2711, @my=0x1}, 0x10, 0x80000) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000440)='/proc/sys/net/ipv4/vs/conntrack\x00', 0x2, 0x0) ptrace$setregs(0xf, r1, 0x40, &(0x7f0000000480)="b54f39656ce2c2e743084cbd4ba1a69e6bff9c318120d483a21553893d71539f8f409235368e1c3db822193d3584b611373b3bb1a5421343e53cda535405f6ac9b2b62ba2082dfcde753f4abcb46aebd3b371ee708d45563e5ccd70b34e5a327d7fda786f292df4b2aefc9f7c3e0d8974109d0fbdda374854001884274e1dbb903f056bd415559688bab2850b087a4444e99443794830c20e5bd63793d5f3d1a17d5fc49af9b80c1f3e224bdf37727f7f787420c5f42b673cb299899f25ed458") ioctl$TUNATTACHFILTER(r3, 0x401054d5, &(0x7f0000000580)={0x1, &(0x7f0000000540)=[{0x4, 0x7, 0x8, 0x9}]}) r4 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/snapshot\x00', 0x80, 0x0) ioctl$TCSETS(r4, 0x5402, &(0x7f0000000600)={0x0, 0x6, 0x1dc0, 0x2, 0x2, 0x80000000, 0x6, 0xffff, 0x1000, 0x1, 0x101}) ioctl$sock_ipx_SIOCAIPXITFCRT(r3, 0x89e0, &(0x7f0000000640)) openat$uinput(0xffffffffffffff9c, &(0x7f0000000680)='/dev/uinput\x00', 0x2000, 0x0) bind$can_raw(r0, &(0x7f00000006c0)={0x1d}, 0x10) syz_open_dev$ndb(&(0x7f0000000700)='/dev/nbd#\x00', 0x0, 0x80) exit(0x7ff) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r1, 0x20, &(0x7f0000000740)=""/97) r5 = accept(r0, &(0x7f00000007c0)=@alg, &(0x7f0000000840)=0x80) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r3, 0x84, 0x72, &(0x7f0000000880)={0x0, 0x8, 0x30}, &(0x7f00000008c0)=0xc) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r3, 0x84, 0x6c, &(0x7f0000000900)={r6, 0x91, "a2df1df0535b9b6dc55448a19345a5087c990717d6ff0a567c233cda1640b4af2a1250a181f5bb5719df08e32732845ef1de1b2502e570b296d2d565dbf9a91dacbfe49dfcd10d97bf404655c13e86e5191a7222f6f6ec00beb758df1dff83f354fb9333152d7abdfc4ebed8089317fe20890c31874054503371e1b37d1c4cb56513f579397517371dac7ebdd187178b99"}, &(0x7f00000009c0)=0x99) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r5, 0x84, 0x64, &(0x7f0000000a00)=[@in={0x2, 0x4e23}, @in={0x2, 0x4e24}, @in6={0xa, 0x4e23, 0x9, @empty, 0xf2}, @in6={0xa, 0x4e23, 0x10000, @empty, 0x8}, @in={0x2, 0x4e21, @rand_addr=0x2}, @in6={0xa, 0x4e22, 0x1, @ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14, 0xc}}, 0x8}, @in6={0xa, 0x4e22, 0x1, @empty, 0x20}], 0xa0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_NUMBER(r3, 0x84, 0x1c, &(0x7f0000000ac0), &(0x7f0000000b00)=0x4) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, &(0x7f0000000b40), 0x8) setfsgid(r2) lremovexattr(&(0x7f0000000b80)='./file0\x00', &(0x7f0000000bc0)=@random={'user.', '\x00'}) 19:48:49 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000001c0)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="080100001d00110c00000000000000000c0010000100000000000000e4000600000000000000000000000000000000007f0000010000000000000000000000004e2200cf4e2100000a00202033000000", @ANYRES32=0x0, @ANYBLOB="fe8000000000000000000000000000aa000004d60000000000000100000000000000000000000000d2f388720000000045070000000000000600000000000000fdffffffffffffff3f00000000000000090000000000000001800000000000000300000000000000080000000000000004000000000000000600000000000000070000000000000058000000001000007f00000025bd700002350000020001080a0000000000000008001900ff008c4f"], 0x3}, 0x1, 0x0, 0x0, 0x1}, 0x0) 19:48:49 executing program 7: r0 = request_key(&(0x7f0000000000)='trusted\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000080)='procvboxnet1-(\x00', 0xfffffffffffffff8) r1 = request_key(&(0x7f00000000c0)='rxrpc_s\x00', &(0x7f0000000100)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000140)='eth1\x00', 0xfffffffffffffffa) keyctl$negate(0xd, r0, 0x200, r1) r2 = syz_open_dev$random(&(0x7f0000000180)='/dev/random\x00', 0x0, 0x24a42) ioctl$RNDCLEARPOOL(r2, 0x5206, &(0x7f00000001c0)=0xffffffffffffff01) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_inet_SIOCDARP(r4, 0x8953, &(0x7f0000000240)={{0x2, 0x4e22, @rand_addr=0x7f}, {0x306}, 0x20, {0x2, 0x4e22, @broadcast=0xffffffff}, 'tunl0\x00'}) getegid() ioctl$EVIOCSMASK(r3, 0x40104593, &(0x7f0000000340)={0x0, 0x74, &(0x7f00000002c0)="9c39feb1e4d96193e51ec711d29d688897a2a75380fda23fb8acf865eb28235e4cc8cfeb2b8551997f6d89c42c15d6751759cd95e6a41d312667e3c06306afa1efe580c4fd05016de4cc943a455354c56bfe81ce1cc6fc3c9f6d49f28c03debc1a508ae6ddcf6e5a6fa01489ec6413996c15e930"}) userfaultfd(0x800) ioctl$sock_inet6_udp_SIOCINQ(r4, 0x541b, &(0x7f0000000380)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$EVIOCGABS2F(r4, 0x8018456f, &(0x7f0000000400)=""/35) r6 = semget$private(0x0, 0x3, 0x300) semctl$SEM_STAT(r6, 0x0, 0x12, &(0x7f0000000440)=""/8) getsockopt$sock_linger(r4, 0x1, 0xd, &(0x7f0000000480), &(0x7f00000004c0)=0x8) ioctl$TUNGETVNETHDRSZ(r3, 0x800454d7, &(0x7f0000000500)) write$binfmt_aout(r4, &(0x7f0000000540)={{0x107, 0xfffffffffffffffb, 0xffffffffffffffff, 0x254, 0x303, 0x81, 0x2b4, 0x80}, "e6c97adf93ddd9285187763607262dddf3e18d95a6197adce45f6492fe3b640cf56dcd54792cb71400f1e74672a6fc3999b610b2e9", [[], [], [], [], []]}, 0x555) semget$private(0x0, 0x0, 0x442) ioctl$VHOST_SET_VRING_NUM(r4, 0x4008af10, &(0x7f0000000ac0)={0x1, 0x6467fbfc}) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000b00)) arch_prctl(0x1004, &(0x7f0000000b40)="f3ace2860c4b70f324be1468636ee12e1f5980ac8586d25bf0899efbcf7146c00dc26478026846a85fbb2dcd1e039907adf70905c7f1e45e926726c21bd4d096dd4a082ca125f25ce07c0ff518c7a204601177cc2e03bc1ac480c8f29b9581b5e7159256e5a170b671605ef73f6fc0320300e5163d3c4c076ad687425368ad7697068aa095c5283fec57da325490200d652df8765b660dc11ccbb461b9c7c3de31b686327192655543d133") ioctl$DRM_IOCTL_SET_VERSION(r4, 0xc0106407, &(0x7f0000000c00)={0xb0, 0x100, 0x80000001, 0x40}) ioctl$TIOCNXCL(r3, 0x540d) r7 = getpgrp(0xffffffffffffffff) ptrace$setsig(0x4203, r7, 0x3f, &(0x7f0000000c40)={0x7, 0x1756, 0x0, 0x5}) ioctl$DRM_IOCTL_GEM_FLINK(r4, 0xc008640a, &(0x7f0000000c80)={0x0}) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r4, 0xc00c642d, &(0x7f0000000cc0)={r8, 0x80000, r4}) ioctl$PPPIOCSFLAGS(r4, 0x40047459, &(0x7f0000000d00)=0x441200) shutdown(r5, 0x0) 19:48:49 executing program 1: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_int(r0, 0x29, 0x19, &(0x7f0000000000)=0x5, 0xffac) syz_emit_ethernet(0x6e, &(0x7f0000101000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @link_local={0x1, 0x80, 0xc2}, [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x38, 0x3a, 0x0, @ipv4={[], [0xff, 0xff], @rand_addr}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x3a, 0x0, @mcast2={0xff, 0x2, [], 0x1}, @dev={0xfe, 0x80}, [], "802a08000000006b"}}}}}}}, 0x0) [ 79.755352] IPVS: ftp: loaded support on port[0] = 21 [ 79.757519] IPVS: ftp: loaded support on port[0] = 21 [ 79.765255] IPVS: ftp: loaded support on port[0] = 21 [ 79.784200] IPVS: ftp: loaded support on port[0] = 21 [ 79.802456] IPVS: ftp: loaded support on port[0] = 21 [ 79.836473] IPVS: ftp: loaded support on port[0] = 21 [ 79.854627] IPVS: ftp: loaded support on port[0] = 21 [ 79.864179] IPVS: ftp: loaded support on port[0] = 21 [ 81.455444] ip (4728) used greatest stack depth: 54352 bytes left [ 82.629871] ip (4825) used greatest stack depth: 54328 bytes left [ 83.056359] ip (4857) used greatest stack depth: 54040 bytes left [ 83.131759] bridge0: port 1(bridge_slave_0) entered blocking state [ 83.138251] bridge0: port 1(bridge_slave_0) entered disabled state [ 83.173625] device bridge_slave_0 entered promiscuous mode [ 83.207592] bridge0: port 1(bridge_slave_0) entered blocking state [ 83.214106] bridge0: port 1(bridge_slave_0) entered disabled state [ 83.244181] device bridge_slave_0 entered promiscuous mode [ 83.285846] bridge0: port 1(bridge_slave_0) entered blocking state [ 83.292331] bridge0: port 1(bridge_slave_0) entered disabled state [ 83.308782] device bridge_slave_0 entered promiscuous mode [ 83.334945] bridge0: port 1(bridge_slave_0) entered blocking state [ 83.341493] bridge0: port 1(bridge_slave_0) entered disabled state [ 83.362229] device bridge_slave_0 entered promiscuous mode [ 83.383682] bridge0: port 1(bridge_slave_0) entered blocking state [ 83.390146] bridge0: port 1(bridge_slave_0) entered disabled state [ 83.410608] device bridge_slave_0 entered promiscuous mode [ 83.430782] bridge0: port 2(bridge_slave_1) entered blocking state [ 83.437388] bridge0: port 2(bridge_slave_1) entered disabled state [ 83.447195] device bridge_slave_1 entered promiscuous mode [ 83.455600] bridge0: port 1(bridge_slave_0) entered blocking state [ 83.462159] bridge0: port 1(bridge_slave_0) entered disabled state [ 83.483351] device bridge_slave_0 entered promiscuous mode [ 83.513497] bridge0: port 2(bridge_slave_1) entered blocking state [ 83.519985] bridge0: port 2(bridge_slave_1) entered disabled state [ 83.535777] device bridge_slave_1 entered promiscuous mode [ 83.545615] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 83.553784] bridge0: port 2(bridge_slave_1) entered blocking state [ 83.560302] bridge0: port 2(bridge_slave_1) entered disabled state [ 83.594461] device bridge_slave_1 entered promiscuous mode [ 83.609971] bridge0: port 1(bridge_slave_0) entered blocking state [ 83.616476] bridge0: port 1(bridge_slave_0) entered disabled state [ 83.635418] device bridge_slave_0 entered promiscuous mode [ 83.651114] bridge0: port 2(bridge_slave_1) entered blocking state [ 83.657605] bridge0: port 2(bridge_slave_1) entered disabled state [ 83.675762] device bridge_slave_1 entered promiscuous mode [ 83.682764] bridge0: port 1(bridge_slave_0) entered blocking state [ 83.689224] bridge0: port 1(bridge_slave_0) entered disabled state [ 83.700235] device bridge_slave_0 entered promiscuous mode [ 83.715957] bridge0: port 2(bridge_slave_1) entered blocking state [ 83.722505] bridge0: port 2(bridge_slave_1) entered disabled state [ 83.742005] device bridge_slave_1 entered promiscuous mode [ 83.763092] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 83.770788] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 83.779907] bridge0: port 2(bridge_slave_1) entered blocking state [ 83.786433] bridge0: port 2(bridge_slave_1) entered disabled state [ 83.798202] device bridge_slave_1 entered promiscuous mode [ 83.821996] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 83.834584] bridge0: port 2(bridge_slave_1) entered blocking state [ 83.841111] bridge0: port 2(bridge_slave_1) entered disabled state [ 83.893670] device bridge_slave_1 entered promiscuous mode [ 83.912945] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 83.923487] bridge0: port 2(bridge_slave_1) entered blocking state [ 83.929979] bridge0: port 2(bridge_slave_1) entered disabled state [ 83.960464] device bridge_slave_1 entered promiscuous mode [ 83.988387] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 83.999630] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 84.015571] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 84.027865] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 84.080392] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 84.124421] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 84.164700] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 84.192346] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 84.252333] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 84.304646] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 84.405427] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 84.453865] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 84.671990] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 84.688352] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 84.698900] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 84.758326] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 84.810332] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 84.888195] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 84.913549] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 84.925449] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 84.934256] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 84.962645] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 84.979844] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 85.010822] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 85.040224] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 85.081924] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 85.145161] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 85.155178] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 85.162613] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 85.172246] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 85.239512] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 85.261685] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 85.278603] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 85.285638] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 85.298606] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 85.306459] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 85.353409] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 85.362381] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 85.402449] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 85.440618] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 85.447717] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 85.499774] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 85.506796] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 85.522236] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 85.531633] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 85.570432] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 85.577586] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 85.627205] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 85.634230] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 85.742192] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 85.749294] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 85.805805] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 85.812850] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 85.858292] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 85.865317] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 85.928554] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 85.964177] team0: Port device team_slave_0 added [ 86.011611] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 86.044470] team0: Port device team_slave_0 added [ 86.075158] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 86.091877] team0: Port device team_slave_0 added [ 86.138996] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 86.154558] team0: Port device team_slave_0 added [ 86.182818] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 86.204963] team0: Port device team_slave_1 added [ 86.237994] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 86.262014] team0: Port device team_slave_1 added [ 86.275302] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 86.295533] team0: Port device team_slave_0 added [ 86.321559] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 86.331161] team0: Port device team_slave_1 added [ 86.404005] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 86.433564] team0: Port device team_slave_1 added [ 86.446816] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 86.456598] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 86.480138] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 86.503820] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 86.514950] team0: Port device team_slave_0 added [ 86.534557] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 86.544927] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 86.565646] team0: Port device team_slave_1 added [ 86.572319] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 86.583381] team0: Port device team_slave_0 added [ 86.599652] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 86.613729] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 86.640288] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 86.652099] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 86.659194] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 86.676333] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 86.702532] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 86.722589] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 86.739804] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 86.750145] team0: Port device team_slave_0 added [ 86.757091] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 86.767319] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 86.777965] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 86.795256] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 86.802487] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 86.825727] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 86.842696] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 86.852447] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 86.868670] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 86.877502] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 86.896088] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 86.921699] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 86.933659] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 86.943840] team0: Port device team_slave_1 added [ 86.954916] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 86.964750] team0: Port device team_slave_1 added [ 86.972740] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 86.990145] team0: Port device team_slave_1 added [ 87.005600] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 87.015428] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 87.033203] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 87.059923] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 87.068818] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 87.079958] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 87.098409] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 87.125754] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 87.142592] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 87.152851] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 87.161767] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 87.177274] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 87.187206] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 87.199450] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 87.210940] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 87.240368] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 87.261138] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 87.276083] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 87.290905] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 87.306748] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 87.314990] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 87.334530] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 87.351428] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 87.365422] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 87.380774] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 87.397268] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 87.412670] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 87.423909] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 87.432717] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 87.448270] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 87.459763] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 87.467682] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 87.475641] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 87.489699] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 87.498443] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 87.506395] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 87.542533] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 87.570291] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 87.602841] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 87.616445] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 87.627201] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 87.641958] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 87.651204] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 87.659164] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 87.667447] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 87.688333] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 87.712988] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 87.722718] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 87.740253] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 87.750268] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 87.762577] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 87.775399] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 87.782830] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 87.808862] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 87.829231] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 87.858996] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 87.879924] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 87.889273] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 87.897398] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 87.905759] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 87.946568] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 87.972540] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 87.986247] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 88.005474] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 88.019180] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 88.026855] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 88.064331] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 88.094366] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 88.123983] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 88.171642] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 88.179216] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 88.196064] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 89.949128] bridge0: port 2(bridge_slave_1) entered blocking state [ 89.955609] bridge0: port 2(bridge_slave_1) entered forwarding state [ 89.962412] bridge0: port 1(bridge_slave_0) entered blocking state [ 89.972337] bridge0: port 1(bridge_slave_0) entered forwarding state [ 90.009539] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 90.020086] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 90.046586] bridge0: port 2(bridge_slave_1) entered blocking state [ 90.053121] bridge0: port 2(bridge_slave_1) entered forwarding state [ 90.059905] bridge0: port 1(bridge_slave_0) entered blocking state [ 90.066333] bridge0: port 1(bridge_slave_0) entered forwarding state [ 90.074783] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 90.086506] bridge0: port 2(bridge_slave_1) entered blocking state [ 90.093011] bridge0: port 2(bridge_slave_1) entered forwarding state [ 90.099906] bridge0: port 1(bridge_slave_0) entered blocking state [ 90.106388] bridge0: port 1(bridge_slave_0) entered forwarding state [ 90.118496] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 90.138426] bridge0: port 2(bridge_slave_1) entered blocking state [ 90.144881] bridge0: port 2(bridge_slave_1) entered forwarding state [ 90.151669] bridge0: port 1(bridge_slave_0) entered blocking state [ 90.158116] bridge0: port 1(bridge_slave_0) entered forwarding state [ 90.224968] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 90.280197] bridge0: port 2(bridge_slave_1) entered blocking state [ 90.286674] bridge0: port 2(bridge_slave_1) entered forwarding state [ 90.293486] bridge0: port 1(bridge_slave_0) entered blocking state [ 90.299946] bridge0: port 1(bridge_slave_0) entered forwarding state [ 90.339291] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 90.413422] bridge0: port 2(bridge_slave_1) entered blocking state [ 90.419878] bridge0: port 2(bridge_slave_1) entered forwarding state [ 90.426656] bridge0: port 1(bridge_slave_0) entered blocking state [ 90.433105] bridge0: port 1(bridge_slave_0) entered forwarding state [ 90.487304] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 90.570731] bridge0: port 2(bridge_slave_1) entered blocking state [ 90.577198] bridge0: port 2(bridge_slave_1) entered forwarding state [ 90.584073] bridge0: port 1(bridge_slave_0) entered blocking state [ 90.590501] bridge0: port 1(bridge_slave_0) entered forwarding state [ 90.622450] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 90.633794] bridge0: port 2(bridge_slave_1) entered blocking state [ 90.641262] bridge0: port 2(bridge_slave_1) entered forwarding state [ 90.648131] bridge0: port 1(bridge_slave_0) entered blocking state [ 90.654606] bridge0: port 1(bridge_slave_0) entered forwarding state [ 90.666253] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 91.039274] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 91.060885] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 91.080873] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 91.094419] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 91.110804] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 91.120741] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 91.128946] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 98.703597] 8021q: adding VLAN 0 to HW filter on device bond0 [ 98.795654] 8021q: adding VLAN 0 to HW filter on device bond0 [ 98.828471] 8021q: adding VLAN 0 to HW filter on device bond0 [ 98.980386] 8021q: adding VLAN 0 to HW filter on device bond0 [ 99.081586] 8021q: adding VLAN 0 to HW filter on device bond0 [ 99.179144] 8021q: adding VLAN 0 to HW filter on device bond0 [ 99.318243] 8021q: adding VLAN 0 to HW filter on device bond0 [ 99.429518] 8021q: adding VLAN 0 to HW filter on device bond0 [ 99.525764] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 99.535747] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 99.663980] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 99.794509] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 99.873797] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 100.028687] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 100.101402] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 100.279547] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 100.287159] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 100.298287] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 100.325585] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 100.364831] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 100.371248] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 100.383603] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 100.501114] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 100.507464] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 100.522832] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 100.554702] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 100.565706] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 100.580147] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 100.796921] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 100.803307] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 100.814783] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 100.858352] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 100.864801] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 100.882986] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 101.017215] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 101.023790] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 101.034752] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 101.094708] 8021q: adding VLAN 0 to HW filter on device team0 [ 101.122298] 8021q: adding VLAN 0 to HW filter on device team0 [ 101.300635] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 101.307148] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 101.338544] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 101.372838] 8021q: adding VLAN 0 to HW filter on device team0 [ 101.550844] 8021q: adding VLAN 0 to HW filter on device team0 [ 101.614006] 8021q: adding VLAN 0 to HW filter on device team0 [ 101.786108] 8021q: adding VLAN 0 to HW filter on device team0 [ 101.807248] 8021q: adding VLAN 0 to HW filter on device team0 [ 102.232951] 8021q: adding VLAN 0 to HW filter on device team0 19:49:17 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) lseek(r0, 0x0, 0x1) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}, [], {0x95}}, &(0x7f0000000340)='syzller\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x4, 0xb7, &(0x7f0000000380)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(0xffffffffffffffff, 0x84, 0x65, &(0x7f0000000440), 0x0) write$binfmt_aout(r0, &(0x7f00000004c0), 0x20) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000280)={0xffffffffffffffff}) recvmsg$netrom(r3, &(0x7f00000001c0)={&(0x7f0000000040)=@full={{0x3, {"d81c4c9a052e72"}, 0x1000}, [{"e3b543348a84b1"}, {"05f8633958e687"}, {"80d085982dcdb2"}, {"b427832c52f493"}, {"d0350b28de01e0"}, {"d2781c2cb27585"}, {"2ba26338c53a73"}, {"dfb413e113411d"}]}, 0x48, &(0x7f00000000c0)=[{&(0x7f0000000600)="90740da643995291b484b670ed53fd95b899946aecfb70889efff49cb60536c7ee1156412c3c4985fb11c49acc9619c01adda15f03051c6397d4699faa30379ee72d0c1f47c039b69d636ec431e18bacf5f28201da6cc91d714c0a3fd64bec7894e85739d0b53159be293e57c2a47c40b52ed1806fce4a85c739b7bf1392d624f8299c5b8196968c08722c0d8ddfe3d8bc5927ff3a3c3a3bfdbe62346827eeb760722bbf56b91085c8a4fde3261ee688d7", 0xb1}], 0x1, &(0x7f0000000780)=[{0x38, 0x29, 0x7a, "018a78abc8d3da4d88015beb5bbb534caf056fbadb8e8bcd1efa58ad8ad4706240"}, {0x1010, 0x10b, 0x96, "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"}], 0x1048, 0x20044000}, 0x12060) 19:49:17 executing program 1: r0 = memfd_create(&(0x7f0000000040)='b\n\x00\x00\x00', 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x12, r0, 0x0) 19:49:17 executing program 7: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000e05000)={0x2, 0xd, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in=@rand_addr, @in6=@mcast2={0xff, 0x2, [], 0x1}}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @dev={0xac, 0x14}}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0xa0}, 0x1}, 0x0) 19:49:17 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18}, [], {0x95}}, &(0x7f0000000340)='syzller\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x4, 0xb7, &(0x7f0000000380)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) write$binfmt_aout(r0, &(0x7f00000004c0), 0x20) dup2(r1, r2) 19:49:17 executing program 7: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}, [], {0x95}}, &(0x7f0000000340)='syzller\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x4, 0xb7, &(0x7f0000000380)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) write$binfmt_aout(r0, &(0x7f00000004c0), 0x20) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000280)={0xffffffffffffffff}) recvmmsg(r3, &(0x7f00000002c0), 0x40000f7, 0x3, &(0x7f0000000200)) 19:49:17 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}, [], {0x95}}, &(0x7f0000000340)='syzller\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x4, 0xb7, &(0x7f0000000380)=""/183, 0x1}, 0x48) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8901, &(0x7f0000000000)={"65727370616e3000000000000200"}) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) bind$inet(0xffffffffffffffff, &(0x7f0000e5b000)={0x2, 0x0, @multicast1=0xe0000001}, 0x10) write$binfmt_aout(r0, &(0x7f00000004c0), 0x20) dup2(r1, r2) 19:49:17 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}, [], {0x95}}, &(0x7f0000000340)='syzller\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x4, 0xb7, &(0x7f0000000380)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) write$binfmt_aout(r0, &(0x7f00000004c0), 0x20) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000280)={0xffffffffffffffff}) recvmmsg(r3, &(0x7f00000002c0), 0x40000f7, 0x0, &(0x7f0000000200)) dup2(r1, r2) 19:49:17 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18}, [], {0x95}}, &(0x7f0000000340)='syzller\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x4, 0xb7, &(0x7f0000000380)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) write$binfmt_aout(r0, &(0x7f00000004c0), 0x20) dup2(r1, r2) [ 106.834427] mmap: syz-executor0 (6670) uses deprecated remap_file_pages() syscall. See Documentation/vm/remap_file_pages.txt. 19:49:18 executing program 0: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000c67000)={0xa, 0x4e20}, 0x1c) syz_genetlink_get_family_id$ipvs(&(0x7f0000003b40)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000003c80)={&(0x7f0000003b00)={0x10}, 0xc, &(0x7f0000003c40)={&(0x7f0000003bc0)={0x44, 0x0, 0x800, 0x0, 0x25dfdbff, {0x7}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast1={0xff, 0x1, [], 0x1}}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @rand_addr}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x9}]}, 0x44}, 0x1, 0x0, 0x0, 0x4000090}, 0x0) listen(r0, 0x39) r1 = socket$inet_dccp(0x2, 0x6, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet(r1, &(0x7f0000000140)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x12}}, 0x10) r2 = accept4(r0, &(0x7f00000001c0)=@in={0x0, 0x0, @local}, &(0x7f0000000180)=0x80, 0x800) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000340)=""/4096, 0x1000, 0x0, 0x0, 0x0) sendmmsg$unix(r2, &(0x7f0000006180), 0x1b3, 0x0) memfd_create(&(0x7f0000000100)='^*wlan0lo\x00', 0x1) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000039c0)={{{@in6=@remote, @in6=@loopback}}, {{@in=@dev}, 0x0, @in=@local}}, &(0x7f0000003ac0)=0xe8) process_vm_readv(0x0, &(0x7f0000002540)=[{&(0x7f0000001340)=""/80, 0x50}, {&(0x7f00000013c0)=""/4096, 0x1000}, {&(0x7f0000002440)=""/178, 0xb2}], 0x3, &(0x7f0000003880)=[{&(0x7f00000025c0)}, {&(0x7f0000002600)=""/68, 0x44}, {&(0x7f0000003740)=""/55, 0x37}], 0x3, 0x0) 19:49:18 executing program 4: 19:49:18 executing program 7: 19:49:18 executing program 6: 19:49:18 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}, [], {0x95}}, &(0x7f0000000340)='syzller\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x4, 0xb7, &(0x7f0000000380)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) write$binfmt_aout(r0, &(0x7f00000004c0), 0x20) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000280)={0xffffffffffffffff}) recvmmsg(r3, &(0x7f00000002c0), 0x40000f7, 0x0, &(0x7f0000000200)) dup2(r1, r2) 19:49:18 executing program 3: 19:49:18 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}, [], {0x95}}, &(0x7f0000000340)='syzller\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x4, 0xb7, &(0x7f0000000380)=""/183, 0x1}, 0x48) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8901, &(0x7f0000000000)={"65727370616e3000000000000200"}) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) bind$inet(0xffffffffffffffff, &(0x7f0000e5b000)={0x2, 0x0, @multicast1=0xe0000001}, 0x10) write$binfmt_aout(r0, &(0x7f00000004c0), 0x20) dup2(r1, r2) 19:49:18 executing program 1: 19:49:18 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cts(cbc(blowfish))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000001200)="e0008012", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001480)={0x0, 0x0, &(0x7f00000001c0), 0x304, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3}], 0x18}, 0x0) recvmsg(r1, &(0x7f00000012c0)={&(0x7f0000f7ffa8)=@alg, 0x80, &(0x7f0000000140)=[{&(0x7f0000000200)=""/4096, 0x7ffff000}], 0x1, &(0x7f0000001240)=""/87, 0x57}, 0x0) 19:49:18 executing program 7: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") mount(&(0x7f0000000200)='0:file:\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 19:49:18 executing program 4: 19:49:18 executing program 1: 19:49:19 executing program 6: [ 108.041949] libceph: parse_ips bad ip '0:file' 19:49:19 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}, [], {0x95}}, &(0x7f0000000340)='syzller\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x4, 0xb7, &(0x7f0000000380)=""/183, 0x1}, 0x48) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8901, &(0x7f0000000000)={"65727370616e3000000000000200"}) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) bind$inet(0xffffffffffffffff, &(0x7f0000e5b000)={0x2, 0x0, @multicast1=0xe0000001}, 0x10) write$binfmt_aout(r0, &(0x7f00000004c0), 0x20) dup2(r1, r2) 19:49:19 executing program 4: 19:49:19 executing program 6: 19:49:19 executing program 0: 19:49:19 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}, [], {0x95}}, &(0x7f0000000340)='syzller\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x4, 0xb7, &(0x7f0000000380)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) write$binfmt_aout(r0, &(0x7f00000004c0), 0x20) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000280)={0xffffffffffffffff}) recvmmsg(r3, &(0x7f00000002c0), 0x40000f7, 0x0, &(0x7f0000000200)) dup2(r1, r2) 19:49:19 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}, [], {0x95}}, &(0x7f0000000340)='syzller\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x4, 0xb7, &(0x7f0000000380)=""/183, 0x1}, 0x48) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8901, &(0x7f0000000000)={"65727370616e3000000000000200"}) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) bind$inet(0xffffffffffffffff, &(0x7f0000e5b000)={0x2, 0x0, @multicast1=0xe0000001}, 0x10) write$binfmt_aout(r0, &(0x7f00000004c0), 0x20) dup2(r1, r2) 19:49:19 executing program 1: 19:49:19 executing program 7: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") mount(&(0x7f0000000200)='0:file:\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 19:49:19 executing program 6: 19:49:19 executing program 4: 19:49:19 executing program 3: [ 108.737823] libceph: parse_ips bad ip '0:file' 19:49:19 executing program 6: 19:49:19 executing program 4: 19:49:20 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cts(cbc(blowfish))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000001200)="e0008012", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001480)={0x0, 0x0, &(0x7f00000001c0), 0x304, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmsg(r1, &(0x7f00000012c0)={&(0x7f0000f7ffa8)=@alg, 0x80, &(0x7f0000000140)=[{&(0x7f0000000200)=""/4096, 0x7ffff000}], 0x1, &(0x7f0000001240)=""/87, 0x57}, 0x0) 19:49:20 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}, [], {0x95}}, &(0x7f0000000340)='syzller\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x4, 0xb7, &(0x7f0000000380)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) write$binfmt_aout(r0, &(0x7f00000004c0), 0x20) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000280)={0xffffffffffffffff}) recvmmsg(r3, &(0x7f00000002c0), 0x40000f7, 0x0, &(0x7f0000000200)) dup2(r1, r2) 19:49:20 executing program 3: 19:49:20 executing program 7: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") mount(&(0x7f0000000200)='0:file:\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 19:49:20 executing program 1: 19:49:20 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}, [], {0x95}}, &(0x7f0000000340)='syzller\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x4, 0xb7, &(0x7f0000000380)=""/183, 0x1}, 0x48) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8901, &(0x7f0000000000)={"65727370616e3000000000000200"}) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) bind$inet(0xffffffffffffffff, &(0x7f0000e5b000)={0x2, 0x0, @multicast1=0xe0000001}, 0x10) dup2(r1, r2) 19:49:20 executing program 6: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r1) r2 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r2, 0x8200) r3 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) write$binfmt_elf32(r2, &(0x7f0000000400)=ANY=[@ANYBLOB="7f454c46040401ffff7f00000000000003000a44a502000026030000380000005f000000fbffffff060020000200090009000500000000000000000040000000ff070000c70000000400000001000000010000000000010001000000000000000100000000800000ffffffff080000000700000000000800a476da66df7bb9cacaa303bf81f09e71106b780301849ac4a50ffa012d174f2c0299a35e1b71464656f9b090df7591df039b824572be8f2332b456c7ca7c14ba9bc240347ca7d8a5447908df8face174f1c9bb5948aec4737b8d0da838585f465ad9b22ed0c1bb24aa4840bb0b1839b11216b273c97f0a9366a79c94a69eda6a959c688bdfac7f1e2b401a3d71c0e67159db6b0b47e2759467e1f31d8a455b19e5aea12e790ee8c501e2e80c78f6e5bf5eb7ce125c740acb8347fcfde4e11d4d40cfc462596a12e5bc83e543ef2c6cfcbca7bf8b51fc1bbf4a460b19d757bb9366b481550085d469797b115fa74eee60c8d465406f35fc7a1f5652a9c2a967d980221dd51869f38687c0c11eb0e0e739d27f12c7d2160d5e7f348e30c98548d185b94ae28ba4590edbaa6b8e0fed5a3e2babeaca3c5ca8f7e830e16e32daa389d816e965610201b201127d036ca6be74ac5bc800785ee46823145d43ee459d52d2d702f16180064ddf62eff8f653f67d6a58aea1358f484fd09084417925444a93af6e79cef4f565cc1a5d9c96a4790c561c230bc38aec48141e60a6d5491d00e3b3394e92ab3cd7964e020a64a73a18c60925285cc4a6f8adf7e5536a420b7f647709fbcaa9e46fa720f3921abe4a1c971dbece1a485bb8bc9dd77c1bb8142ca5846271b9f301364ac7f8848a0e9b89783b649dda7fabc05afd8c25e3fd3f7f7ab82b3f8a23bd806ee358ab5a66cbc92bf3ffb02802e4ca7597b544f63309ed12170d2432396735a58628d053c2108195219f54dddda09058c267a187dd7d846890124eab414f143825079268b09f916a097fabc1edf565f6f51ebda83f4d2553281592cb1b62a4ea13b2ce545abda1545771c697707b077bf7b11cfb8ff65498dc9ff5f82f3fd92e4522634514a78abd523f91ac824abd2f492e183858e4ae89fef5c8503d92cbd7c000d4989f0477499178adc91fb9e510eead49643d5969e988c44ad3a4056103c630976680f57f48e4819c617146791546fb5e27b627d6fb449ddcfa5b6299297d8448d6f623207387f9f7d99ae61fc09023116938afc90286232a9fbd68b73951e2c0cf8abc9e3749ca87b394ef40c86be13d8d77b30c98f056581b3ae8a04e5adba4716330c794d1a25f204df8b27cb09fff270f55763616769fd9b1471a0c69210ef0763e4559cdd18284a7bb6e6a8acfc93bcf891fb388de9715b5747c25b714cf9d8f781fa466efe7a9d97ae1d879437b539c2b425a9f39fc6af07f56b2e785c00955ce21ff82a6db52a027270a10b4543ee89e80a1a7b7a093ad354ccfad4c9abff6cd910a51fe6d2734a6b6df3403ee1a35f2d74e4b83d92ed06d9847ffe7a39c5bbbc4c19829fad91cf3d5f28707a9bcabcb882fb65d4f9057d6139373e29202a1c37df31e506166e6a376b789235a91f4f706d3add68ba215717c6dc39a87b9a45175d228af7fef45b516af1ea54d02db0921154045943198039661bbfdfbfbd8944b2a56be71a077f3a53e25d7f65d858fd54bf7435b53228443797435290ec398cdb19bb4511e8471a217998e050c2ff5b8fd840d5ba541282a52c336292f0799b413b339069af980e914dbfc0b03a87d8a37b28a2220110e1f67014a973e631ec164f9f316da0b81d71919890d9e86d936b212d0521da1b55f4d11a21c04dd7a09892052798e89122b41ee6af5d90d1b20b91fe4ca888ad991c992035848d7d7462ec0111a49a9d8e990f81ce23392af53a1618d212a18f6221a14eb4cbe643588db6e470ad2db15065cc28c1aeae7504c7be8e7a09ef9b17b36b85ebbf9966b41984c5a9fab5cfa816b1a0cffc5130d3afd97728323f4a7b9dcdfb50bcef75a510597dca705781119dd5c1925b222ae908fc733b8cc02101c22c26eaeed81a5035d44ef1cf6394144d39c869f61bd8c9b54d4c5530e873cabf3f9595e8fc9ce2c01c70cc1ef9581f0963400c4a1e21432a56a0b5441839ace44f0806e6e336f125cda12ab7018c38bd0060172a693da55d7da98cdc821258d413a287983dccc3204839454fad81020ea1cdaddec8efd2d9168b8672f020638e356bd0884522dc086a9068ea3036bb10a0d0e56f5741a32e568bd7c0bc9008ad115b9253701b4afd5483ddfc251400032cf692a355de4d62f930edbb70727e4b3a85d4b11b7785a9e7a550ed545af91b03aa678f1ec6eba8c1b26897018f4418152bea95a81d8cfd227914b9f17c99a40e48972b69980890863e76dfedc8ba58cc0ee1cc676a0a1aedf289a9f6f79c8a6451cffa2e48879b033cf913168b6af086e243f43b2325fc30453b499c49debc999475b3999eae36c475c3e59f32be2ac932ffb9c352d3e8963dbaccb3428d8f41be6ddf3fe09bb099f3665cef45c3d00062f0f353f618bf08b2cb7523ac43d26d03f35a97994c9b712de3a96220362e3214609e5854211e0ca6e5261afec1b13e061c1b102dd647211cb279fb123d3b255a54dba13357e2cd97f97878ca019a45a2357ac113867c2a69a5a8077b18d11d4eb6e07af666df6810d9d65ca3369d31e9d37582dd831798344de98aed67924b392ef50c8329d7a9e3670324802853a9e35f23b0ad479306049bb649639e3af2c3048d6ec215cf84f6db94814e3e76718dbd90316c31b899680c79450eaaf80040116960e2520c60bd37bee2cea22c9156dea5250ed30f7358777a8417d7acb7fa4155393ebf07b49ee62b66a0c093fc5b8e21d4bc5bd06bc1ca7afdc514a9b62c9d45e990166fff8bc2c9f10392fda86a591ccc2dab560b5df3a3e8fe5b836802ecffe77a59691c3d3cecf17139997e3e6e7ecf9b7e77bec1fb0d6fb7e300b944ed0f42114393e84bd3b40623df4dab4c74ce095690d59c4a647b9ad1ae154cdd3a63378443cea57fb943391979caaecb2d8fc05ddf8d5aee93ca06b0317bf9027228985ed5fdb8011e7e10460e187330a87646bfb1805381a413933d2d39bf3c36df3efbaa9c16e3f0b0da4966bb2185666a5bac251ef072b24c170f89790c464ec917c716196dea4550c44e29aea277df20204c9b23cec944394e26d6b7488bec86b2a20c0578881268f72dbbe5e54f25baed31df35362b6ed3f410f98c92de27f58beec749d2e57bb1628a4f790b8626cb8e712b29acf8aed9455bf429dffc6e844ff219eb9b46a78fedc7aaf517edb6768e95b12ddee012dc1fbfabf2dc6de831d1a37404b5798ebe5fed4734bf17142cefedc1dd975e98b309ca03dfa0ac3fc8b41205999857cf9827dea41b194027d1fc842fb4fc99191b737f47bbdf0f6975d3f17bdc344014bec8c8616f82052d82566ea5f71a6a7b09905d713362c80c59b99ea27f285cfa2ced94c772ebe4b707e2c567c505cc9c083be32a83f9e875e150b28b9d3fda490eff4d9cbb52efcbc1969aeebe4dbbd3d03e2bd064d7d17cdbb35a24450725cc68b9668a80aaa7af9d240a45020a044e5bdc8568aea8e9cc847d02f1543c01bff01222977b1a406e6961bd9760a1df6eb0c01d825fb91cff87ade07d9bd6d4a781a7e7789570bea1939322f18d4402c13ba7c56462ef5932ffb54d9d65bcc50b797cd043985e5a8fccee3d83dfd68fe47c7364970d515c5d0dbd064db1695a1889b69cc7ac39f9b8fbf66f7810f78c0bb88673621c1e06301f5c55ed4be229861a9cad18b5ea4d8e290152792aae2f5d7476bbc91aa46f146f939a029e32ee2e813d7f9b2c7fd78605a05a743ec98cd8950e9bba14401657ee9c36941d34bf1fd511b5adc94f2768364f203fe68bc3a44fcf20c985cdc51854207c9896bf6c39e4264c3443958057b38b64ea77c6bb495fa5e6a039ccd176ee98cea66bf5fac5189533309a341f542830a211f1c6ee5dd70f9b9ba3c15909762077d7055af730230ee9cc24c7884d2fd439144c551b1de5b88eaec1215d3564459f287a15567bb85953ab49a2051420319472d3912b98ff9a766cd66676401babb58756c542315706c2dd92837817eb7ee82ffaba18336de5bab6a798a88e08ee004b0357af1bf970316879f9d47ccea50d83cc2c04f595ca389fe513d27f5fcc85573ea43cddad61bde08831c89c045d557799ecdba1284b314f3bc8afa03a27b5f40c968924f063b2a6c35477f84472bbeb80b65dca834459618cd8a89d4c37bb0c643690727d0820904b9aeb576ec2c663a2f13a75da31a77fa71b91da11423dd402d4b0e836f46d698c1e73e969a40093ac388202f10bcfb73a72aa00a4dacc3f41cc1ffd5d149c56fe838d1aa0111f2614b12ed77e4edf5ea40634640079f88e2b622183d75c330f4978c0fa696e8aa1227e63a2483db20254337e99812332e8aee5412bab2231f17726d4dfa1c94316293624030174891296af730fc5dbfc73f6cf51a9db556e4037563a3c112bef9d8f1618eab3bee49457d33cc4321c32734081378e72761dc0fe4fa3af6d9d40653dbe88a95101f8cb41d49ed6490a9b16e0e4056567c502dd8925719ba6999fc6fb98a241ab73d5ceb4c9948744aa5ff7ddba3c6857206d0f5bca56d19e9eb0e5aa938414e928d14b44aabf5aeb08c564a6912fbba349dcc3ef8e91a77a6bc66cad9fad45e6c2ae81b9a2766275a0382dd85b486714a6a9890651eae04fc51aa2bb15705fbc7dee2224c3abe14b2cb9a5d580fb12fdba8322f4245df7ff65547044e6bb8129be0c7ccc2affbf933804e6972d337c478b7e4c36738796da234524bf9d33183b46bdd5b2c0205b002990587120665701fb30adea2efc92d3fef038d911ed47525a043f61949b9e71a04459b2d581c144176a3e466ce75cf5c68f16047c1a2728f8d2f437648fbf5b1314a73a7fffefa013ef8b4eb9ec8a45313a95c0f917734b128bba7621a38a89a6e4a31e9ab49bc1dcdc4fc89946633c422e2c23d2afd2329fc042233e39b6ae23f5ef89d7712176a719598d1d46b3a840705f4182324806e489088c9f2edbdf205fc30326b4adb9a96971d6219abad5318bb8e42625dbab7e182651beff3727fad18ee95b97ed67ed1e29cd101b1aa411906ca71ff6c544953a2a4e95fe6f3a2d49674505cee2759727889b40146953a3cba12f293034780742b8cee0743c71966296f0cf8a903cc79dac694fead06c1f4fb5199007e4a5e149d6542e82fd1cdc7d1b9afa95b4a395695da8328ef4fcfc5176c81687da0f0629be61b4f6688028af3dfb5597c5495aea4a1b0c443188ae394ded5e82f1543936763ac1c9a26631b521552292f2c8b962b300a05dc4a6694463b93775784aa6712412f55d787f7ec56ebd5b6122484060be81c6dda753ee89239e1280c2337f625b2e2be39fbe4367514356e7aa1d19c2023e0e3ac5756ef74b5ba57860118f682e4b7ab8ef6535396963108e8d0c087d63e0b8809dd5d8d07c226d708106393862d47c6af613697646fdc6dbaa0f116929a8d03d78db0099e6f6f25bb5b52418d13b01a28a099bd1940c678044db2190491ab9c0b3f19c492dbc712f471e1af9c2600521260d25c5253604a3059f29144e0902168262714cc1f2568bcf62a0122578a7e2223d01e2e8a40b92df657d525021f95bd09bc55d6ecb3e7dc30c0730ad1a4"], 0x1001) sendfile(r3, r3, 0x0, 0x7fff) 19:49:20 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000a61000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSWINSZ(r0, 0x5414, &(0x7f0000000380)={0x0, 0x0, 0x0, 0xffffffff}) [ 109.633643] libceph: parse_ips bad ip '0:file' 19:49:20 executing program 1: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f0000cab000)=0x5) setresuid(r1, 0x0, 0x0) setreuid(0x0, 0x0) 19:49:20 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = accept4(r0, &(0x7f00000002c0)=@in6={0x0, 0x0, 0x0, @local}, &(0x7f0000000340)=0x80, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000280), 0xa5, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_opts(r1, 0x29, 0x37, &(0x7f0000000040)=@fragment, 0x8) [ 110.558808] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 19:49:21 executing program 6: r0 = socket(0x11, 0x100000803, 0x0) getpeername(r0, &(0x7f0000000040)=@llc={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f00000000c0)=0x80) r1 = socket(0xa, 0x1, 0x0) ioctl(r1, 0x8912, &(0x7f0000000000)="4626262c8523bf012cf66f") ioctl$sock_ifreq(r0, 0x8970, &(0x7f0000000100)={'veth0_to_team\x00', @ifru_ivalue}) 19:49:21 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}, [], {0x95}}, &(0x7f0000000340)='syzller\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x4, 0xb7, &(0x7f0000000380)=""/183, 0x1}, 0x48) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8901, &(0x7f0000000000)={"65727370616e3000000000000200"}) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) bind$inet(0xffffffffffffffff, &(0x7f0000e5b000)={0x2, 0x0, @multicast1=0xe0000001}, 0x10) dup2(r1, r2) 19:49:21 executing program 0: r0 = memfd_create(&(0x7f0000000040)='b\n\x00\x00\x00', 0x4) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x12, r0, 0x0) 19:49:21 executing program 7: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") mount(&(0x7f0000000200)='0:file:\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 19:49:21 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) listen(r0, 0xffffffffffffff7f) r1 = accept4(r0, &(0x7f0000000340)=@alg, &(0x7f0000000040)=0x80, 0x0) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r2, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) write$binfmt_misc(r2, &(0x7f0000000240)=ANY=[@ANYBLOB], 0x34000) write$binfmt_misc(r1, &(0x7f0000000080)=ANY=[@ANYBLOB='s'], 0x1) 19:49:21 executing program 1: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) close(r0) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r2, 0xc004743e, &(0x7f000082ef0a)=""/246) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000c85000)={0x80002006}) epoll_pwait(r1, &(0x7f0000000040)=[{}], 0x1, 0x0, &(0x7f0000000080), 0x8) ioctl$DRM_IOCTL_AGP_RELEASE(r2, 0x6431) 19:49:21 executing program 3: r0 = syz_open_dev$amidi(&(0x7f0000000040)='/dev/amidi#\x00', 0x40, 0x0) mq_timedsend(r0, &(0x7f0000000100)="0e20f62a3f821ffb57f1d6ed3bb0d0974dee348c83a407312c8ed70cf81cfc4fa1d8f202749aca621dae45d4771ca92618ffc4a05c5dfee798d5665df18f0a7043f85f0e9d38e125b441e976ccc20f210465a375796a5bf10d38ce00139f4ac8a3ab4dc23e8dd6d06f083f3042b3432f842c7157e864680836ee2e7aa358df56282c8f1947fb0cececb94c", 0x8b, 0x5, &(0x7f0000000080)) symlinkat(&(0x7f0000000000)='./file0\x00', 0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00') dup2(0xffffffffffffff9c, 0xffffffffffffffff) 19:49:21 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}, [], {0x95}}, &(0x7f0000000340)='syzller\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x4, 0xb7, &(0x7f0000000380)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) write$binfmt_aout(r0, &(0x7f00000004c0), 0x20) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000280)={0xffffffffffffffff}) recvmmsg(r3, &(0x7f00000002c0), 0x40000f7, 0x0, &(0x7f0000000200)) [ 110.700409] random: crng init done [ 110.744290] libceph: parse_ips bad ip '0:file' 19:49:21 executing program 0: io_setup(0x3, &(0x7f0000000140)=0x0) r1 = socket$unix(0x1, 0x2, 0x0) chmod(&(0x7f0000000080)='./file0\x00', 0x10) r2 = socket$inet_smc(0x2b, 0x1, 0x0) socket$unix(0x1, 0x5, 0x0) getsockopt$inet_mreqsrc(r2, 0x0, 0x28, &(0x7f00000000c0)={@rand_addr, @rand_addr, @loopback}, &(0x7f0000000100)=0xc) io_submit(r0, 0x1, &(0x7f00000026c0)=[&(0x7f00000001c0)={0x0, 0x0, 0x0, 0x1, 0x0, r1, &(0x7f0000000080)}]) pwrite64(r1, &(0x7f0000000000)="0fec03187ff9f40e606422b212f667b7340e4326fe5f37fbe147", 0x1a, 0x0) 19:49:21 executing program 7: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) socket$inet6(0xa, 0x1, 0x0) mount(&(0x7f0000000200)='0:file:\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 19:49:21 executing program 6: r0 = socket$inet(0x2, 0x3, 0x1c) sendto$inet(r0, &(0x7f00000000c0), 0x0, 0x0, &(0x7f0000000100)={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x10) ioctl$sock_netrom_SIOCGSTAMPNS(r0, 0x8907, &(0x7f0000000040)) recvmsg(r0, &(0x7f00000003c0)={&(0x7f0000000140)=@pppol2tpin6, 0x80, &(0x7f0000000300), 0x0, &(0x7f0000000380)=""/39, 0x27}, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/psched\x00') ioctl$EVIOCGABS2F(r1, 0x8018456f, &(0x7f00000001c0)=""/212) 19:49:21 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f760070") pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(r2, 0xc0a85322, &(0x7f00000001c0)) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f00000002c0)={0x0, @in6={{0xa, 0x4e21, 0xfffffffffffffffb, @remote={0xfe, 0x80, [], 0xbb}, 0x3}}, 0x0, 0x2, 0x7, 0xfffffffffffffffe, 0xe0}, &(0x7f0000000040)=0x98) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r2, 0x84, 0x6d, &(0x7f0000000480)={r3, 0x9d, "a75898928b082a5058e069af7183996beb2a28d7fbd73bca3ae75db46c64d67ee8d2943a7895b210ee5b72629130214e207d2fefb8524579ef6b2270e8c90ebd76df85383152c5926403e8c500eb62a45bea7454f3e77e8fb2c9c4597d2427037450e77cdeb0e6f2c18c2ab482efd4f682679e95d9922155df2d5880f6df11d7979591529084f50ad5a358534a08851dd058474247e464b04b79e47e2f"}, &(0x7f0000000140)=0xa5) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r4, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x34000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x14, 0x10, 0x701, 0x0, 0x0, {0x3}}, 0x14}, 0x1}, 0x0) recvmmsg(r4, &(0x7f0000000740)=[{{&(0x7f0000000400)=@pppol2tpv3in6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @ipv4={[], [], @multicast1}}}}, 0x80, &(0x7f0000000680), 0x0, &(0x7f00000006c0)=""/92, 0x5c}}], 0x1, 0x0, &(0x7f00000007c0)={0x77359400}) 19:49:21 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}, [], {0x95}}, &(0x7f0000000340)='syzller\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x4, 0xb7, &(0x7f0000000380)=""/183, 0x1}, 0x48) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8901, &(0x7f0000000000)={"65727370616e3000000000000200"}) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) bind$inet(0xffffffffffffffff, &(0x7f0000e5b000)={0x2, 0x0, @multicast1=0xe0000001}, 0x10) dup2(r1, r2) [ 110.977845] libceph: parse_ips bad ip '0:file' 19:49:22 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') readv(0xffffffffffffffff, &(0x7f0000002340)=[{&(0x7f0000001300)=""/4096, 0x1000}], 0x1) readv(r0, &(0x7f0000000000), 0x0) 19:49:22 executing program 6: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x100, 0x0) sendmsg$kcm(r1, &(0x7f0000001380)={&(0x7f00000001c0)=@nfc_llcp={0x27, 0x0, 0x1, 0x470b88e5a719f726, 0x9, 0x5, "d16a6789e639e27d33148e1c7869b3700016643ee108ecd53413db501eb2de7e5176922dac7c7242be874017db1f2228653ac21680846b6f866a8206e75d1f", 0x3f}, 0x80, &(0x7f0000001240)=[{&(0x7f0000000240)="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", 0x1000}], 0x1, &(0x7f0000001280)=[{0x20, 0x1bf, 0x5, "5b407607dfbafb5645abbf5f8423"}, {0xa8, 0xff, 0x6, "1a065f71b31aaece37022557ce2cfdb94cd72bf3e1ebbe7529a2397ca2b046d947c87063f08981e3086c46bc6e90685db6460d948e7927dfcadfb6442479305dc6e88cd7c3d22991edd7025c8113b7ddf1cc4908fcb75125586ab66248fa2c1e6ecaabfa1621751a1fcffa7c962aa978011ecd29a6f84658934d815a9a96279c099de8e0b2e55b832e0bd391d3ca67224be98adfcb0c7407"}], 0xc8, 0x4008090}, 0x20008800) r2 = socket(0x8000000001b, 0x2, 0xffffffffffffffff) r3 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x800, 0x0) ioctl$DRM_IOCTL_MODE_GETCRTC(r3, 0xc06864a1, &(0x7f0000000140)={&(0x7f0000000080)=[0x7, 0xff, 0x6570, 0x6745, 0x1, 0x101], 0x6, 0x2, 0x4000000000000000, 0x9, 0x7f, 0x8, {0xa998, 0x100, 0x3f, 0xc66, 0x9, 0x300000000, 0x0, 0x96, 0x101, 0x6, 0x6, 0x800000000000, 0x5, 0x8, "3c021417c640d2463d9aa6838c532939ee075ab2259d54ea12258833731794d2"}}) getsockopt$sock_buf(r2, 0x1, 0xf, &(0x7f0000b56f40)=""/192, &(0x7f0000000000)=0x141) 19:49:22 executing program 7: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) socket$inet6(0xa, 0x1, 0x0) mount(&(0x7f0000000200)='0:file:\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 19:49:22 executing program 0: r0 = socket$inet(0x2, 0x4, 0x7) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000080)={'filter\x00', 0x7, 0x4, 0x480, 0x258, 0x140, 0x140, 0x398, 0x398, 0x398, 0x4, &(0x7f0000000000), {[{{@uncond, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@mac=@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @empty, @dev={0xac, 0x14, 0x14, 0x1e}, @multicast2=0xe0000002, 0x1, 0xffffffff}}}, {{@arp={@multicast2=0xe0000002, @local={0xac, 0x14, 0x14, 0xaa}, 0xff0000ff, 0xffffffff, @empty, {[0xff, 0xff, 0xff, 0x0, 0x0, 0xff]}, @mac=@random="a368faa98474", {[0x0, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x0, 0x9, 0x9, 0x7, 0x0, 0x80000001, 'veth0\x00', 'bcsh0\x00', {}, {}, 0x0, 0x241}, 0xf0, 0x118}, @unspec=@NFQUEUE3={0x28, 'NFQUEUE\x00', 0x3, {0x6, 0x78e, 0x2}}}, {{@uncond, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@mac=@random="3b8015c520be", @empty, @rand_addr=0x2aab09d, @multicast2=0xe0000002, 0xf}}}], {{[], 0xc0, 0xe8}, {0x28, '\x00', 0x0, 0xfffffffffffffffe}}}}, 0x4d0) fchmod(r0, 0x30) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000b80)=@broute={'broute\x00', 0x20, 0x2, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000080], 0x0, &(0x7f0000000040), &(0x7f0000000440)=ANY=[]}, 0x78) 19:49:22 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) socket$inet6(0xa, 0x1, 0x0) mount(&(0x7f0000000200)='0:file:\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 19:49:22 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, &(0x7f000000a000)) r0 = inotify_init1(0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") inotify_add_watch(r0, &(0x7f0000ac5000)='./file0\x00', 0xa400295c) r2 = open(&(0x7f0000000040)='./file0\x00', 0x1, 0x0) mkdirat(r2, &(0x7f0000000140)='./file0\x00', 0x140) [ 111.227008] libceph: parse_ips bad ip '0:file' [ 111.259784] libceph: parse_ips bad ip '0:file' 19:49:22 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}, [], {0x95}}, &(0x7f0000000340)='syzller\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x4, 0xb7, &(0x7f0000000380)=""/183, 0x1}, 0x48) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8901, &(0x7f0000000000)={"65727370616e3000000000000200"}) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) write$binfmt_aout(r0, &(0x7f00000004c0), 0x20) dup2(r1, r2) 19:49:22 executing program 7: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) socket$inet6(0xa, 0x1, 0x0) mount(&(0x7f0000000200)='0:file:\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 19:49:22 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) socket$inet6(0xa, 0x1, 0x0) mount(&(0x7f0000000200)='0:file:\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 19:49:22 executing program 6: r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x8200) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r1, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001ac0)=[{&(0x7f0000001080)=@file={0x0, './bus\x00'}, 0x6e, &(0x7f00000015c0)=[{&(0x7f0000002040)="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", 0xfc1}], 0x1}], 0x1, 0x0) mmap(&(0x7f000000a000/0x4000)=nil, 0x4000, 0x0, 0x20011, r1, 0x0) mlock(&(0x7f0000002000/0x1000)=nil, 0x1000) fchmod(r0, 0x20) mbind(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, &(0x7f00000001c0), 0x20, 0x2) 19:49:22 executing program 0: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000469ffc)=0x7fe, 0x4) setsockopt$inet_opts(r0, 0x0, 0x9, &(0x7f0000000180)="9086615dd79a481369741faacbda3ce183013df00c3f9f646b1e3170278a284cd53f5295789498d6bc725505f4c3316ab324cb717002a6a981b846", 0x3b) sendto$inet(r0, &(0x7f00000000c0), 0x0, 0x0, &(0x7f0000000100)={0x2, 0x4e24, @local={0xac, 0x14, 0x14, 0xaa}}, 0x10) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000140)=0x148, 0x4) recvfrom$inet(r0, &(0x7f0000000000)=""/248, 0xf8, 0x40012000, 0x0, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f00000001c0)={{0x2, 0x4e20, @multicast1=0xe0000001}, {0x307, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}, 0x10, {0x2, 0x4e20}, 'nr0\x00'}) 19:49:22 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0x4}, 0x1c) sendto$inet6(0xffffffffffffff9c, &(0x7f0000000040)="2f01897ee49fd566f7fb91f75eaa2bae7202af6a904021b88d749056d55f090866e9db2819cb3d13537c73a3e1c22d8f80ba751da589d30c09ceb1e41f3d89e13d4a72aa20b8e866a2f09e797782cfa964ecc4581244d7841265315800f1673fc44c87c8eeb688df346298d4d269c64ff6a9bf987c3d3088cc636d43d8e1a075524fec647675a10adbd61fb839a2ed8d75db76e8083e969fb768bb339e75bfc9e2d5ae11a25f19a5e034bab9af147c", 0xaf, 0x20004004, &(0x7f0000000100)={0xa, 0x4e24, 0x77d, @mcast2={0xff, 0x2, [], 0x1}, 0x8}, 0x1c) sendto$inet6(r0, &(0x7f0000000000), 0x0, 0x0, &(0x7f0000000300)={0x2, 0x4e22, 0x3e8, @ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14}}}, 0x1c) 19:49:22 executing program 1: mount(&(0x7f0000018000)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f00000002c0)='proc\x00', 0x0, &(0x7f000000a000)) syz_fuseblk_mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='./file0/bus/file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={0xffffffffffffff9c, 0x3, 0x1, 0x496d, &(0x7f0000000080)=[0x0], 0x1}, 0x20) ioctl$GIO_UNISCRNMAP(r0, 0x4b69, &(0x7f0000000100)=""/134) ioctl$BLKBSZSET(r0, 0x40081271, &(0x7f00000001c0)=0x7) 19:49:22 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}, [], {0x95}}, &(0x7f0000000340)='syzller\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x4, 0xb7, &(0x7f0000000380)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) write$binfmt_aout(r0, &(0x7f00000004c0), 0x20) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000280)={0xffffffffffffffff}) recvmmsg(r3, &(0x7f00000002c0), 0x40000f7, 0x0, &(0x7f0000000200)) [ 111.661463] libceph: parse_ips bad ip '0:file' [ 111.679284] libceph: parse_ips bad ip '0:file' 19:49:22 executing program 1: r0 = accept(0xffffffffffffffff, &(0x7f0000000640), &(0x7f00000006c0)=0x80) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffff9c, 0x84, 0x1, &(0x7f0000000700)={0x0, 0x1000, 0x8, 0x6, 0x3, 0xff}, &(0x7f0000000740)=0x14) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000780)={r1, 0x58f}, &(0x7f00000007c0)=0x8) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r2, &(0x7f0000d65000)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f00004ca000)={&(0x7f0000690000)={0x1c, 0x9, 0x100000000000006, 0x1, 0x0, 0x0, {}, [@nested={0x8, 0x1, [@generic="06"]}]}, 0x1c}, 0x1}, 0x0) getresgid(&(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)=0x0) lstat(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r5 = getgid() getresgid(&(0x7f00000001c0)=0x0, &(0x7f0000000200), &(0x7f0000000240)) stat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)=0x0) getgroups(0x6, &(0x7f0000000400)=[r3, r4, r5, r6, r7, r8]) 19:49:22 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) socket$inet6(0xa, 0x1, 0x0) mount(&(0x7f0000000200)='0:file:\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 19:49:22 executing program 0: openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x1, 0x0) syz_open_dev$sndseq(&(0x7f0000053ff3)='/dev/snd/seq\x00', 0x0, 0x0) 19:49:22 executing program 4: r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$midi(&(0x7f0000000140)='/dev/midi#\x00', 0x2, 0x200201) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000180)={0x0, 0x80}, &(0x7f00000001c0)=0x8) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f0000000200)={r2, 0x140}, &(0x7f0000000240)=0x8) r3 = openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x2000, 0x8) setsockopt$l2tp_PPPOL2TP_SO_SENDSEQ(r3, 0x111, 0x3, 0x0, 0x4) openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x82, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/autofs\x00', 0x20400, 0x0) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r4, 0x8912, &(0x7f0000000080)="0047fc2f07d82c99240970") r5 = perf_event_open(&(0x7f0000940000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, r0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x7ff) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x2400, 0x101) 19:49:22 executing program 6: r0 = socket$packet(0x11, 0x913a7420b12c17e1, 0x300) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x80000, 0x0) ioctl$TUNDETACHFILTER(r1, 0x401054d6, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000240)={"e6b214873d5f746f5f62526964676500", 0x0}) r3 = socket$nl_route(0x10, 0x3, 0x0) socketpair(0x40000011, 0x2, 0x5, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNDETACHFILTER(r4, 0x401054d6, 0x0) sendmsg$nl_route(r3, &(0x7f0000000180)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)=ANY=[@ANYBLOB="d008858317b30600030000", @ANYRES32=r2, @ANYBLOB="000000000000000008001a0004000000"], 0x28}, 0x1}, 0x0) setsockopt$netrom_NETROM_T4(r4, 0x103, 0x6, &(0x7f00000001c0)=0x6, 0x4) 19:49:22 executing program 7: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) ioctl(0xffffffffffffffff, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") mount(&(0x7f0000000200)='0:file:\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) [ 111.865353] libceph: parse_ips bad ip '0:file' 19:49:22 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}, [], {0x95}}, &(0x7f0000000340)='syzller\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x4, 0xb7, &(0x7f0000000380)=""/183, 0x1}, 0x48) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8901, &(0x7f0000000000)={"65727370616e3000000000000200"}) r2 = socket$kcm(0x29, 0x5, 0x0) write$binfmt_aout(r0, &(0x7f00000004c0), 0x20) dup2(r1, r2) [ 111.958192] netlink: 'syz-executor1': attribute type 1 has an invalid length. [ 111.974339] libceph: parse_ips bad ip '0:file' [ 112.013090] netlink: 'syz-executor1': attribute type 1 has an invalid length. 19:49:23 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000200)='0:file:\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 19:49:23 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14}}, 0x10) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000440)=[@in6={0xa, 0x4e23, 0x336f, @loopback={0x0, 0x1}, 0x9}, @in6={0xa, 0x4e22, 0xa8b2, @mcast2={0xff, 0x2, [], 0x1}, 0x3}, @in={0x2, 0x4e20, @loopback=0x7f000001}, @in6={0xa, 0x4e21, 0x0, @loopback={0x0, 0x1}, 0x100}, @in={0x2, 0x4e20, @local={0xac, 0x14, 0x14, 0xaa}}, @in={0x2, 0x4e20, @remote={0xac, 0x14, 0x14, 0xbb}}, @in6={0xa, 0x4e24, 0x110, @dev={0xfe, 0x80, [], 0xa}, 0x100000000}], 0xa0) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f00000000c0)=[{0x3}, {0x3, 0x7}], 0x2) sendto$inet(r0, &(0x7f0000000000), 0xa4, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) getsockopt$inet_mreqsrc(r0, 0x0, 0x26, &(0x7f0000000000)={@broadcast, @local, @multicast1}, &(0x7f0000000040)=0xc) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000015c0)="766574683100000000ffffffffffef00", 0xb) writev(r0, &(0x7f0000001400)=[{&(0x7f00000013c0)='8', 0x1}], 0x1) close(r0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000003c0)={r0, 0x0, 0xa7, 0x5c, &(0x7f0000000180)="18393710cac40ec6d8b0281ab843a64692b0980195a37e4a848fabba467657cf46be0e95df17300ed81d93a19461e2838f6b6ccca759431f3ed9e1c41614e6e59fac1df335b3b540823255198145c7d88ccc8fd0e4abfc9111895a63b8133f0d97b1bec6f197938f47d24071368feb1dc892efa4918fc2ff6542cdbbbf06b8072216ff4c145a59867a6a2fbc1758e70aad1ce36e384dcaf3cae495169dbb1bc338d88e21b15645", &(0x7f0000000340)=""/92, 0x4}, 0x28) r1 = syz_open_procfs(0x0, &(0x7f0000000540)='net/ip_mr_vif\x00') ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r1, 0xc058534f, &(0x7f0000000580)={{}, 0x1, 0x7, 0xbd3, {0x4, 0x8}, 0x100000001, 0x4}) socketpair$inet6(0xa, 0x5, 0x2, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000600)={{{@in6=@local}}, {{@in6=@mcast2}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f0000000700)=0xe8) setsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000400)=0x899, 0x4) fcntl$F_GET_FILE_RW_HINT(r2, 0x40d, &(0x7f0000000140)) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000000240)={0x0, @empty, @remote}, &(0x7f0000000280)=0xc) ioctl$sock_inet6_SIOCADDRT(r2, 0x890b, &(0x7f00000002c0)={@local={0xfe, 0x80, [], 0xaa}, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, 0x3, 0x80000001, 0x0, 0x400, 0x1, 0x81, r3}) socketpair$ax25(0x3, 0x3, 0xcc, &(0x7f0000000500)) 19:49:23 executing program 6: mprotect(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0) r0 = socket$bt_rfcomm(0x1f, 0x3, 0x3) writev(r0, &(0x7f0000000340)=[{&(0x7f0000000140)}, {&(0x7f0000000180)="18d33d0b3c2d153dfebb8a79cef4070322572f42635fdd5ca24d91a9ab", 0x1d}, {&(0x7f00000001c0)="f5b848f9e2f8daf1509bd0ad14b1eb3286672036fd28126a5274dbd784ce3108bb08222cd2d135bc4245634841693aef2f8938c21467d90419436609278f5a2145bc1d1f2757ecd364053509c6bc4993389b6b3f72478bf81c656b8f0a2eec42a09f2777462ce77079c2b4620a9ca72367880f5d2e014e7928099d407a4fe102ac1169bf5a9fb95508df6675a4b158d6c362130a24bd221449f073d616c96ac90a3ab562002cec03cc8c8a", 0xab}, {&(0x7f0000000280)="1ac3914f12b284e6c850086279bf8acaeb2fb86ec03c2e9a2e3f3dbc49953f4c6b4fb6584cee74619905d91f4bfdbe7e3db18086249f5ce4c021a28c9c59725f8ac8ff530bf0d6998d50e4f32fcb05927685462c5b8d0d918b5d8bfbcb6df98cbfccfcc6158843767922846a52ba9ed7bba9318b1ab5a29097bf3a075b12c3b836b48d8ce914f6bea69c9cdf8e2fed280c75aff7773a64626aa22988", 0x9c}], 0x4) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x10000, 0x0) recvfrom$inet(r2, &(0x7f0000000080)=""/183, 0xb7, 0x0, 0x0, 0x0) ioctl$int_in(r1, 0x40000000af01, &(0x7f0000000040)) ioctl$VHOST_SET_MEM_TABLE(r1, 0x4008af04, &(0x7f0000002c40)) 19:49:23 executing program 7: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) ioctl(0xffffffffffffffff, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") mount(&(0x7f0000000200)='0:file:\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 19:49:23 executing program 4: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x82) r1 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000040)='9', 0x1}], 0x1, 0x881806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r1, &(0x7f0000000000), 0x8000) sendfile(r0, r0, 0x0, 0x6) syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0x4, 0x480) 19:49:23 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}, [], {0x95}}, &(0x7f0000000340)='syzller\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x4, 0xb7, &(0x7f0000000380)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) write$binfmt_aout(r0, &(0x7f00000004c0), 0x20) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000280)={0xffffffffffffffff}) recvmmsg(r3, &(0x7f00000002c0), 0x40000f7, 0x0, &(0x7f0000000200)) 19:49:23 executing program 1: r0 = syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, &(0x7f0000000080)={0x0, 0x0, 0x101, 'queue0\x00', 0xfb}) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r0, 0xc08c5336, &(0x7f0000000340)={0x0, 0x0, 0x1ff, 'queue1\x00'}) 19:49:23 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}, [], {0x95}}, &(0x7f0000000340)='syzller\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x4, 0xb7, &(0x7f0000000380)=""/183, 0x1}, 0x48) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8901, &(0x7f0000000000)={"65727370616e3000000000000200"}) r2 = socket$kcm(0x29, 0x5, 0x0) write$binfmt_aout(r0, &(0x7f00000004c0), 0x20) dup2(r1, r2) [ 112.505761] libceph: parse_ips bad ip '0:file' [ 112.516576] libceph: parse_ips bad ip '0:file' 19:49:23 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000080)='cpuset.mems\x00', 0x2, 0x0) r2 = dup(r1) r3 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x0) setsockopt$netrom_NETROM_T1(r2, 0x103, 0x1, &(0x7f0000000040)=0x4, 0x4) ftruncate(r3, 0x80080) sendfile(r2, r3, &(0x7f0000d83ff8), 0x2008000fffffffe) 19:49:23 executing program 7: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) ioctl(0xffffffffffffffff, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") mount(&(0x7f0000000200)='0:file:\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 19:49:23 executing program 3: mount(&(0x7f0000000200)='0:file:\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 19:49:23 executing program 6: unshare(0x70000300) r0 = accept4$inet(0xffffffffffffff9c, 0x0, &(0x7f0000000140), 0x80800) setsockopt$inet_tcp_int(r0, 0x6, 0x18, &(0x7f00000001c0)=0x3ff80, 0x4) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt(r1, 0x400000000000003a, 0x0, &(0x7f0000261f44)=""/188, &(0x7f0000000180)=0xfffffff3) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={0xffffffffffffffff, 0x2, 0x0, 0x100, &(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0], 0x4}, 0x20) ioctl$EVIOCGMTSLOTS(r2, 0x8040450a, &(0x7f0000000280)=""/238) r3 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffff9c, 0x84, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x7, 0x3ff}, &(0x7f0000000080)=0x10) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r3, 0x84, 0x71, &(0x7f00000000c0)={r4, 0x1}, &(0x7f0000000100)=0x3b6) 19:49:23 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="2957e1311f16f477671070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000005cc0)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c\x00'}, 0x58) r2 = accept4(r1, 0x0, &(0x7f0000000040), 0x0) bind$netlink(r2, &(0x7f0000000000)={0x10, 0x0, 0x25dfdbfc, 0x10202000}, 0xc) recvfrom$inet6(r2, &(0x7f0000000000), 0x0, 0x0, &(0x7f0000000080)={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xaa}}, 0x1c) r3 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x80700, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r3, 0xc0605345, &(0x7f0000000140)={0x6, 0x3, {0x0, 0x0, 0x1, 0xfffffffffffffffe, 0x9}}) [ 112.756611] libceph: parse_ips bad ip '0:file' 19:49:23 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}, [], {0x95}}, &(0x7f0000000340)='syzller\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x4, 0xb7, &(0x7f0000000380)=""/183, 0x1}, 0x48) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8901, &(0x7f0000000000)={"65727370616e3000000000000200"}) r2 = socket$kcm(0x29, 0x5, 0x0) write$binfmt_aout(r0, &(0x7f00000004c0), 0x20) dup2(r1, r2) 19:49:24 executing program 3: mount(&(0x7f0000000200)='0:file:\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 19:49:24 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x8) setns(r0, 0x2000000) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400000000400}, 0x10) r1 = socket(0x11, 0x4000000000080003, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000000040)=0x6f, 0x4) setsockopt$packet_int(r1, 0x107, 0xa, &(0x7f0000788000)=0x2, 0x4) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000440)={'syz_tun\x00', 0x0}) bind$packet(r1, &(0x7f0000000000)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}, 0x3a) write$binfmt_elf64(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="7f450e46ff2b07e0070080000000000002003e00020009003c020000000000004000000000000000780200000000000900800000ff7f382002000300000009000000006000020000000000000000000000000000010000000100000000000000800000000000000007000000000000000300000000000000eb9fb7791ef0dccb067792751dc292c23ebd3f71edd7fabfc824efb25d13608afdd9979920060ec31be79657626651aa72d8dc1c9e"], 0x9d) setsockopt(r1, 0x107, 0x5, &(0x7f0000001000), 0xc5) 19:49:24 executing program 7: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") mount(&(0x7f0000000200)='0:file:\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 19:49:24 executing program 6: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000c34000)={0xaa}) r1 = gettid() getresuid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000100)) process_vm_writev(r1, &(0x7f0000c22000)=[{&(0x7f000034afa4)=""/1, 0x1}], 0x1, &(0x7f0000c22fa0)=[{&(0x7f0000000080)=""/1, 0x1}], 0x197, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x2000001, 0x32, 0xffffffffffffffff, 0x0) close(r0) 19:49:24 executing program 4: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) timerfd_gettime(r0, &(0x7f0000000140)) r1 = socket(0x11, 0x802, 0x2) connect$vsock_stream(r1, &(0x7f0000000000)={0x28, 0x0, 0x0, @hyper}, 0x10) write(r1, &(0x7f0000d02fb4)="220000002100070700be00000900070102e9dc1e0000ff000000000005000280ff45", 0x22) timer_create(0x7, &(0x7f0000000040)={0x0, 0x1e}, &(0x7f0000000080)=0x0) timer_gettime(r2, &(0x7f00000000c0)) 19:49:24 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}, [], {0x95}}, &(0x7f0000000340)='syzller\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x4, 0xb7, &(0x7f0000000380)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) write$binfmt_aout(r0, &(0x7f00000004c0), 0x20) recvmmsg(0xffffffffffffffff, &(0x7f00000002c0), 0x40000f7, 0x0, &(0x7f0000000200)) dup2(r1, r2) 19:49:24 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}, [], {0x95}}, &(0x7f0000000340)='syzller\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x4, 0xb7, &(0x7f0000000380)=""/183, 0x1}, 0x48) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8901, &(0x7f0000000000)={"65727370616e3000000000000200"}) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f000031aff8)={r0, r1}) write$binfmt_aout(r0, &(0x7f00000004c0), 0x20) dup2(r1, 0xffffffffffffffff) 19:49:24 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f0000942000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) setsockopt$sock_int(r1, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) connect$inet(r1, &(0x7f0000606ff0)={0x2, 0x4e20, @loopback=0x7f000001}, 0x10) sendto$inet(r1, &(0x7f0000773000), 0xadca, 0xc870a3c305c5634f, &(0x7f0000257ff0)={0x2, 0x0, @multicast2=0xe0000002}, 0x10) socket$inet6(0xa, 0x5, 0x41) connect$inet(r1, &(0x7f0000000080)={0x2, 0x4e22, @multicast1=0xe0000001}, 0x10) close(0xffffffffffffffff) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cuse\x00', 0x2000, 0x0) ioctl$EVIOCGKEYCODE(r2, 0x80084504, &(0x7f0000000040)=""/48) 19:49:24 executing program 7: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") mount(&(0x7f0000000200)='0:file:\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 19:49:24 executing program 3: mount(&(0x7f0000000200)='0:file:\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 19:49:24 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") r1 = syz_open_dev$amidi(&(0x7f0000000040)='/dev/amidi#\x00', 0x1, 0x801) ioctl$EVIOCSKEYCODE(r1, 0x40084504, &(0x7f0000000140)=[0x3, 0x5]) r2 = memfd_create(&(0x7f0000000080)="2e993f97e9100a2bec29d89b8bfcbc002c6210ffffff1ec6f35f8352a100751810dd53d4d389a821562b24f21f856aa94cfda35ea67335975463824ca734d8125f27e75cca4604a556c74f98c8effc42cdbbffcb07ff7c60b32b", 0x80000000000002) ftruncate(r2, 0x94d) fcntl$addseals(r2, 0x409, 0x4) lsetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=@random={'security.', '/dev/amidi#\x00'}, &(0x7f0000000200)="2e993f97e9100a2bec29d89b8bfcbc002c6210ffffff1ec6f35f8352a100751810dd53d4d389a821562b24f21f856aa94cfda35ea67335975463824ca734d8125f27e75cca4604a556c74f98c8effc42cdbbffcb07ff7c60b32b", 0x5a, 0x1) epoll_ctl$EPOLL_CTL_DEL(r2, 0x2, r2) write$binfmt_aout(r2, &(0x7f0000000000)={{0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfffffffffffffffb}}, 0x20) 19:49:24 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}, [], {0x95}}, &(0x7f0000000340)='syzller\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x4, 0xb7, &(0x7f0000000380)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000280)={0xffffffffffffffff}) recvmmsg(r3, &(0x7f00000002c0), 0x40000f7, 0x0, &(0x7f0000000200)) dup2(r1, r2) 19:49:24 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f760070") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)={0xaa}) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x0, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x1a, &(0x7f00000002c0)={0x0, {{0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}}}, 0x90) close(r2) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(0xffffffffffffffff, 0x28, 0x1, &(0x7f0000000200), 0x8) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x4082) r4 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) pwritev(r4, &(0x7f00000000c0)=[{&(0x7f0000000b80)="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", 0xbee}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) sendfile(r3, r3, &(0x7f0000000080), 0x102000004) setsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r4, 0x84, 0x12, &(0x7f0000000000), 0x4) 19:49:24 executing program 6: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000340)='attr/prev\x00') r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, 0x0) r2 = add_key(&(0x7f0000000080)='asymmetric\x00', &(0x7f0000000140)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000180)="107df4bab3b8e73ab83b1b3c69d62f6203f232ba514a03c794abede4d8ba8df9d2a55f272033ebbcda9a9a18a9bc1d1378d14ea6", 0x34, 0xfffffffffffffff8) keyctl$unlink(0x9, r1, r2) exit(0x0) ioctl(r0, 0x8, &(0x7f00000001c0)="359316be42b3db12e6c04d431cfacb5a058044b4ae1a720d95b7481df1cdf445ed822e2eb42f0b4b9e4dab6aacbfd98d543d8149b3ba53604b570bb42d15eefdc23396216ed3a2b02c") pread64(r0, &(0x7f00000000c0)=""/100, 0x64, 0x0) 19:49:24 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}, [], {0x95}}, &(0x7f0000000340)='syzller\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x4, 0xb7, &(0x7f0000000380)=""/183, 0x1}, 0x48) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) write$binfmt_aout(r0, &(0x7f00000004c0), 0x20) dup2(r1, r2) 19:49:24 executing program 7: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") mount(&(0x7f0000000200)='0:file:\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 19:49:24 executing program 3 (fault-call:1 fault-nth:0): mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000200)='0:file:\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 19:49:24 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x105082) r1 = memfd_create(&(0x7f0000000140)="000000008c00400001000000000000", 0x0) setsockopt$inet6_udp_encap(r1, 0x11, 0x64, &(0x7f0000000040)=0x5, 0x4) pwritev(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="a8", 0x1}], 0x1, 0x1081003) read(r0, &(0x7f0000000000)=""/19, 0xffffffe7) 19:49:24 executing program 4: r0 = socket$inet6_sctp(0xa, 0x80000000000001, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}], 0x1c) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000107ff8)={0x0, 0x10040000}, 0x8) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x79, &(0x7f000081e000)={0x0, 0x0, 0xe803}, 0x8) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, &(0x7f0000000000)={0x0, 0x70, "ee0af057373313b7175a80f59b9418d0210fb4b8d25128a04dd5dc2132205f2f0266cf634d113c23fcc2de75cc86a326141557dd4d2c6d94b7f2aa21d63380bb32e2e5a684bd77aa3468fc6cca9c3ba1350c05a1242426aa9cc5783c8feee02b403b76d0807bac36faec7573a70c5011"}, &(0x7f0000000080)=0x78) setsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f00000000c0)=@assoc_id=r1, 0x4) [ 113.888839] FAULT_INJECTION: forcing a failure. [ 113.888839] name failslab, interval 1, probability 0, space 0, times 1 [ 113.900305] CPU: 0 PID: 7067 Comm: syz-executor3 Not tainted 4.17.0+ #5 [ 113.907123] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 113.916511] Call Trace: [ 113.919155] dump_stack+0x185/0x1d0 [ 113.922871] should_fail+0x87b/0xab0 [ 113.926661] __should_failslab+0x278/0x2a0 [ 113.930977] should_failslab+0x29/0x70 19:49:24 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f000031aff8)={r0}) write$binfmt_aout(r0, &(0x7f00000004c0), 0x20) dup2(0xffffffffffffffff, r1) [ 113.934943] __kmalloc_track_caller+0x1ff/0xc80 [ 113.939779] ? strndup_user+0x134/0x1f0 [ 113.943822] ? fsnotify+0x7df/0x17d0 [ 113.947979] ? strnlen_user+0x44/0x390 [ 113.952018] memdup_user+0x7c/0x200 [ 113.955720] strndup_user+0x134/0x1f0 [ 113.959583] ksys_mount+0xc4/0x3d0 [ 113.963336] ? fput+0x25c/0x2e0 [ 113.966710] __x64_sys_mount+0x157/0x1c0 [ 113.970825] ? ksys_mount+0x3d0/0x3d0 [ 113.974666] do_syscall_64+0x15b/0x230 [ 113.978609] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 113.983832] RIP: 0033:0x4559f9 [ 113.987828] RSP: 002b:00007f5ac1080c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 113.995598] RAX: ffffffffffffffda RBX: 00007f5ac10816d4 RCX: 00000000004559f9 [ 114.002994] RDX: 0000000020000100 RSI: 00000000200001c0 RDI: 0000000020000200 [ 114.009896] sctp: [Deprecated]: syz-executor4 (pid 7072) Use of int in maxseg socket option. [ 114.009896] Use struct sctp_assoc_value instead [ 114.010296] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 114.010315] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000013 19:49:25 executing program 7: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r0 = socket$inet6(0xa, 0x0, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") mount(&(0x7f0000000200)='0:file:\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 19:49:25 executing program 0: r0 = socket$rds(0x15, 0x5, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000100)="2957e1311f16f477671070") bind$rds(r0, &(0x7f0000000180)={0x2, 0x0, @loopback=0x7f000001}, 0x10) socketpair$ax25(0x3, 0x2, 0xcf, &(0x7f0000000000)) sendmsg$rds(r0, &(0x7f00001c3000)={&(0x7f0000014000)={0x2, 0x0, @multicast1=0xe0000001}, 0x10, &(0x7f0000000100), 0x0, &(0x7f0000000280)=[@rdma_args={0x48, 0x148, 0x1, {{}, {&(0x7f0000000400)=""/209, 0xd1}, &(0x7f0000000140)}}], 0x48}, 0x0) [ 114.010333] R13: 00000000004c1cc7 R14: 00000000004ceee8 R15: 0000000000000000 19:49:25 executing program 3 (fault-call:1 fault-nth:1): mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000200)='0:file:\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) [ 114.107815] sctp: [Deprecated]: syz-executor4 (pid 7077) Use of int in maxseg socket option. [ 114.107815] Use struct sctp_assoc_value instead [ 114.238740] FAULT_INJECTION: forcing a failure. [ 114.238740] name failslab, interval 1, probability 0, space 0, times 0 [ 114.250425] CPU: 1 PID: 7094 Comm: syz-executor3 Not tainted 4.17.0+ #5 [ 114.257260] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 114.266647] Call Trace: [ 114.269299] dump_stack+0x185/0x1d0 [ 114.273028] should_fail+0x87b/0xab0 [ 114.276803] __should_failslab+0x278/0x2a0 [ 114.281458] should_failslab+0x29/0x70 [ 114.285477] __kmalloc_track_caller+0x1ff/0xc80 [ 114.290236] ? strndup_user+0x134/0x1f0 [ 114.294293] ? kmsan_set_origin+0x9e/0x160 [ 114.298596] ? kmsan_internal_unpoison_shadow+0x83/0xe0 [ 114.304060] ? strnlen_user+0x44/0x390 [ 114.308020] memdup_user+0x7c/0x200 [ 114.311739] strndup_user+0x134/0x1f0 [ 114.315707] ksys_mount+0x193/0x3d0 [ 114.319422] ? fput+0x25c/0x2e0 [ 114.322843] __x64_sys_mount+0x157/0x1c0 [ 114.326970] ? ksys_mount+0x3d0/0x3d0 [ 114.330934] do_syscall_64+0x15b/0x230 [ 114.334886] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 114.340109] RIP: 0033:0x4559f9 [ 114.343329] RSP: 002b:00007f5ac1080c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 114.351091] RAX: ffffffffffffffda RBX: 00007f5ac10816d4 RCX: 00000000004559f9 [ 114.357003] libceph: parse_ips bad ip '0:file' [ 114.358395] RDX: 0000000020000100 RSI: 00000000200001c0 RDI: 0000000020000200 [ 114.358415] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 114.358433] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000013 19:49:25 executing program 7: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r0 = socket$inet6(0xa, 0x0, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") mount(&(0x7f0000000200)='0:file:\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 19:49:25 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}, [], {0x95}}, &(0x7f0000000340)='syzller\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x4, 0xb7, &(0x7f0000000380)=""/183, 0x1}, 0x48) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) write$binfmt_aout(r0, &(0x7f00000004c0), 0x20) dup2(r1, r2) 19:49:25 executing program 0: r0 = syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x40, 0x8200) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000001000)={0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x73}, &(0x7f000000affc)=0x20) sigaltstack(&(0x7f0000001000/0x1000)=nil, &(0x7f0000000000)) sigaltstack(&(0x7f0000000000/0x6000)=nil, 0x0) setsockopt$bt_BT_RCVMTU(r0, 0x112, 0xd, &(0x7f0000000080)=0x2312, 0x2) 19:49:25 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f760070") r1 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x8, 0x0) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(r1, 0xc01064b5, &(0x7f0000000080)={&(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9}) r2 = socket(0x10, 0x802, 0x0) write(r2, &(0x7f0000000200)="240000001a0025f0006bb4f7fdff141c020b5aff6e10b500000780cc0800190001000000", 0x24) [ 114.358465] R13: 00000000004c1cc7 R14: 00000000004ceee8 R15: 0000000000000001 [ 114.529505] libceph: parse_ips bad ip '0:file' 19:49:25 executing program 6: r0 = socket$inet6(0xa, 0x1, 0x0) socketpair$packet(0x11, 0x3, 0x300, &(0x7f0000000040)) ioctl(r0, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") open(&(0x7f00009e1000)='./file0\x00', 0x8040, 0x0) fcntl$setlease(r0, 0x400, 0xfffffffbffffffff) 19:49:25 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") r1 = socket$inet(0x2, 0x3, 0x1) getsockopt$IPT_SO_GET_REVISION_TARGET(r1, 0x0, 0x43, &(0x7f0000000040)={'ah\x00'}, &(0x7f00000000c0)=0x3f4) 19:49:25 executing program 0: clock_getres(0x5, &(0x7f0000000000)) r0 = epoll_create(0x100020) fcntl$notify(r0, 0x0, 0x282) pselect6(0x408, &(0x7f0000000680), &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000380), &(0x7f00000006c0)={&(0x7f00000003c0), 0x8}) 19:49:25 executing program 3 (fault-call:1 fault-nth:2): mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000200)='0:file:\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 19:49:25 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}, [], {0x95}}, &(0x7f0000000340)='syzller\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x4, 0xb7, &(0x7f0000000380)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000280)={0xffffffffffffffff}) recvmmsg(r3, &(0x7f00000002c0), 0x40000f7, 0x0, &(0x7f0000000200)) dup2(r1, r2) 19:49:25 executing program 4: r0 = socket$inet6(0xa, 0x80003, 0x1f) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000001c0)={{{@in=@broadcast=0xffffffff, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x5c}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x2b}, 0x0, @in6=@remote={0xfe, 0x80, [], 0xbb}}}, 0xe8) r1 = accept(r0, 0x0, &(0x7f0000000000)) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r1, 0x84, 0x12, &(0x7f0000000040), &(0x7f00000000c0)=0x4) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback={0x0, 0x1}}, 0x1c) 19:49:25 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}, [], {0x95}}, &(0x7f0000000340)='syzller\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x4, 0xb7, &(0x7f0000000380)=""/183, 0x1}, 0x48) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) write$binfmt_aout(r0, &(0x7f00000004c0), 0x20) dup2(r1, r2) 19:49:25 executing program 7: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r0 = socket$inet6(0xa, 0x0, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") mount(&(0x7f0000000200)='0:file:\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) [ 114.869438] libceph: parse_ips bad ip '0:file' [ 114.988149] FAULT_INJECTION: forcing a failure. [ 114.988149] name failslab, interval 1, probability 0, space 0, times 0 [ 114.999513] CPU: 1 PID: 7149 Comm: syz-executor3 Not tainted 4.17.0+ #5 [ 115.006483] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 115.015877] Call Trace: [ 115.018538] dump_stack+0x185/0x1d0 [ 115.022340] should_fail+0x87b/0xab0 [ 115.026114] __should_failslab+0x278/0x2a0 [ 115.030433] should_failslab+0x29/0x70 [ 115.034392] kmem_cache_alloc+0x129/0xb70 [ 115.038594] ? kmsan_set_origin_inline+0x6b/0x120 [ 115.043499] ? getname_flags+0x12a/0xaa0 [ 115.047618] ? __kmalloc_track_caller+0x98f/0xc80 [ 115.052906] getname_flags+0x12a/0xaa0 [ 115.056854] user_path_at_empty+0xbb/0x140 [ 115.061147] do_mount+0x2a4/0x4ed0 [ 115.064741] ? copy_mount_options+0x41/0x540 [ 115.069442] ? ksys_mount+0x251/0x3d0 [ 115.073308] ksys_mount+0x32e/0x3d0 [ 115.077008] __x64_sys_mount+0x157/0x1c0 [ 115.081140] ? ksys_mount+0x3d0/0x3d0 [ 115.084965] do_syscall_64+0x15b/0x230 [ 115.088905] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 115.094135] RIP: 0033:0x4559f9 [ 115.097325] RSP: 002b:00007f5ac1080c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 115.105058] RAX: ffffffffffffffda RBX: 00007f5ac10816d4 RCX: 00000000004559f9 [ 115.112355] RDX: 0000000020000100 RSI: 00000000200001c0 RDI: 0000000020000200 [ 115.119645] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 115.126959] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000013 [ 115.134241] R13: 00000000004c1cc7 R14: 00000000004ceee8 R15: 0000000000000002 19:49:26 executing program 1: r0 = socket$inet(0x2, 0x3, 0x2) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000040)={0x0, 0x400}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f00000000c0)={r1, 0xb153}, &(0x7f0000000100)=0x8) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) setsockopt$inet_int(r0, 0x0, 0xd0, &(0x7f0000000000), 0x4) 19:49:26 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}, [], {0x95}}, &(0x7f0000000340)='syzller\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x4, 0xb7, &(0x7f0000000380)=""/183, 0x1}, 0x48) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) write$binfmt_aout(r0, &(0x7f00000004c0), 0x20) dup2(r1, r2) 19:49:26 executing program 7: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(0xffffffffffffffff, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") mount(&(0x7f0000000200)='0:file:\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 19:49:26 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="2957e1311f16f477671070") r1 = memfd_create(&(0x7f0000000080)="2e993f97e9100a2bec29d89b8bfcbc002c6210ffffff1ec6f35f8352a100751810dd53d4d389a821562b24f21f856aa94cfda35ea67335975463824ca734d8125f27e75cca4604a556c74f98c8effc42cdbbffcb07ff7c60b32b", 0x80000000000002) ftruncate(r1, 0x94d) fcntl$addseals(r1, 0x409, 0x4) setsockopt$inet6_udp_encap(r1, 0x11, 0x64, &(0x7f0000000000)=0x5, 0x4) ioctl$TCSETA(r1, 0x4030582a, &(0x7f0000760000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000d8}) 19:49:26 executing program 6: r0 = memfd_create(&(0x7f0000000080)='\t', 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000040)=0xc) r1 = syz_open_dev$sndseq(&(0x7f000011c000)='/dev/snd/seq\x00', 0x0, 0x8000000000102) r2 = dup2(r1, r0) ioctl$PPPIOCSFLAGS(r2, 0x40047459, &(0x7f00000000c0)=0x40) write$sndseq(r0, &(0x7f0000e6ffd0)=[{0x1ff, 0x8, 0x0, 0x3fd, @tick, {}, {}, @control}], 0x30) 19:49:26 executing program 4: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x202000, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000140)={{{@in6=@dev, @in6=@ipv4={[], [], @remote}}}, {{@in6=@dev}, 0x0, @in6=@local}}, &(0x7f0000000240)=0xe8) r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffb) r2 = add_key$keyring(&(0x7f00000005c0)='keyring\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) keyctl$set_reqkey_keyring(0x5, 0xfffffffffffffffd) add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f0000000100)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x23e, r2) 19:49:26 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}, [], {0x95}}, &(0x7f0000000340)='syzller\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x4, 0xb7, &(0x7f0000000380)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000280)={0xffffffffffffffff}) recvmmsg(r3, &(0x7f00000002c0), 0x40000f7, 0x0, &(0x7f0000000200)) dup2(r1, r2) 19:49:26 executing program 3 (fault-call:1 fault-nth:3): mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000200)='0:file:\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) [ 115.756650] libceph: parse_ips bad ip '0:file' [ 115.764653] FAULT_INJECTION: forcing a failure. [ 115.764653] name failslab, interval 1, probability 0, space 0, times 0 [ 115.776142] CPU: 0 PID: 7173 Comm: syz-executor3 Not tainted 4.17.0+ #5 [ 115.782939] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 115.792331] Call Trace: [ 115.794999] dump_stack+0x185/0x1d0 [ 115.798667] should_fail+0x87b/0xab0 [ 115.802425] __should_failslab+0x278/0x2a0 [ 115.806693] should_failslab+0x29/0x70 [ 115.810591] kmem_cache_alloc+0x129/0xb70 [ 115.814769] ? alloc_vfsmnt+0x7b/0xcf0 [ 115.818679] ? get_fs_type+0x348/0x9c0 [ 115.822578] alloc_vfsmnt+0x7b/0xcf0 [ 115.826316] ? try_module_get+0x61/0x3d0 [ 115.830391] ? get_fs_type+0x348/0x9c0 [ 115.834385] vfs_kern_mount+0xaf/0x990 [ 115.838387] do_mount+0xca5/0x4ed0 [ 115.841948] ? copy_mount_options+0x41/0x540 [ 115.846376] ? ksys_mount+0x251/0x3d0 [ 115.850213] ksys_mount+0x32e/0x3d0 [ 115.853874] __x64_sys_mount+0x157/0x1c0 [ 115.857952] ? ksys_mount+0x3d0/0x3d0 [ 115.861768] do_syscall_64+0x15b/0x230 [ 115.865672] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 115.870866] RIP: 0033:0x4559f9 [ 115.874052] RSP: 002b:00007f5ac1080c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 115.881769] RAX: ffffffffffffffda RBX: 00007f5ac10816d4 RCX: 00000000004559f9 [ 115.889041] RDX: 0000000020000100 RSI: 00000000200001c0 RDI: 0000000020000200 [ 115.896316] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 115.903862] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000013 [ 115.911136] R13: 00000000004c1cc7 R14: 00000000004ceee8 R15: 0000000000000003 19:49:27 executing program 7: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(0xffffffffffffffff, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") mount(&(0x7f0000000200)='0:file:\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 19:49:27 executing program 4: setrlimit(0xb, &(0x7f00000000c0)) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) ioctl$sock_bt_hidp_HIDPCONNDEL(r0, 0x400448c9, &(0x7f0000000180)={{0xff, 0xfffffffffffffffa, 0x5, 0x401, 0x4, 0xa4}, 0xfffffffffffffff7}) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f00000001c0)=0x0) ptrace$setregset(0x4205, r1, 0x203, &(0x7f0000000300)={&(0x7f0000000200)="a6947c582a9c66835b9b11a7ef3843098e0c6bc2272cbbabc93cebd723231d27447627ff7b918ed5302e0a333552e2386e9c9c7cb691afc196d77abc8f340b9a0196ade7e13941a1b07bdc95f871fe79e067b94dfca7dca76a3a2ad9acab71ed9fb1a3c6d64c34ee30f629cad892b811e90e5e82201a3e6066a0b32ce315bbb4975a7830b9e08d0279c07cdb66e3def7dadd04579df89ba0ab3146928c707b07fee58102e904e13d29fe436f5abc887e8472b2f38a3cc6221bd8b5e63c6dd8372494d677d087ecdad7a2bb52674b09dcbafd", 0xd2}) timer_create(0x0, &(0x7f0000000380)={0x0, 0x0, 0x0, @thr={&(0x7f0000000280), &(0x7f0000000300)}}, &(0x7f0000000100)) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x420482, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000040)={'syzkaller0\x00', 0x2000}) ioctl$EVIOCGNAME(r0, 0x80404506, &(0x7f00000003c0)=""/241) ioctl$SG_SET_FORCE_PACK_ID(r2, 0x227b, &(0x7f0000000080)) 19:49:27 executing program 6: r0 = socket(0x200000000010, 0x2, 0x4) write(r0, &(0x7f0000000000)="2400000024007f0000001200000001000d0f23ff0100000000000000f1ffffff1300ff10", 0x24) 19:49:27 executing program 1: set_mempolicy(0x8003, &(0x7f0000000e00)=0x9, 0xffc) r0 = syz_open_dev$loop(&(0x7f0000000280)='/dev/loop#\x00', 0x0, 0x105082) r1 = memfd_create(&(0x7f0000000140)="000000008c00000000000000000000", 0x0) pwritev(r1, &(0x7f0000f50f90)=[{&(0x7f0000000100)="a8", 0x1}], 0x1, 0x81003) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r1, &(0x7f00000ddff8), 0x102002f01) [ 116.086534] libceph: parse_ips bad ip '0:file' 19:49:27 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}, [], {0x95}}, &(0x7f0000000340)='syzller\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x4, 0xb7, &(0x7f0000000380)=""/183, 0x1}, 0x48) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) write$binfmt_aout(r0, &(0x7f00000004c0), 0x20) dup2(r1, r2) 19:49:27 executing program 3 (fault-call:1 fault-nth:4): mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000200)='0:file:\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 19:49:27 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000200)={0xaa}) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) pipe(&(0x7f0000000000)={0xffffffffffffffff}) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r2, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x1ff}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r3, 0x84, 0x1b, &(0x7f0000000140)={r4, 0x3e, "ceaf6778e159b088f90967965ce6338b04c3cb9648c6032ab42b87e95b23f4bd9a62600648a11b85ec3578f2ed6d532506deaabd6af9fb6efc3dd01107e0"}, &(0x7f00000000c0)=0x46) setsockopt$IPT_SO_SET_REPLACE(r2, 0x0, 0x60, &(0x7f0000000240)=ANY=[@ANYBLOB="66696c7465720000000000000000000000000000fc00000000000000000000000e0000000080000000000000ffffffff0000000000", @ANYBLOB="ac1414bbe0000001000000000000000073797a6b616c6c65723000000000000062726964676530000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009800c00000000000000000000000000000000000000000000000000028005443504d53530000000000000000000000000000000000000000000000000000000000000000ac1414aa7f00000100000000000000006e72300000000000000000000000000065727370616e30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009800f8000000000000000000000000000000000000000000000000006000434c555354455249500000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000626f6e645f736c6176655f310000000076657468315f746f5f7465616d000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009800f800000000000000000000000000000000000000000000000000600053455400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000000000000000000000000000000002800000000000000000000eaffffffffffffff00000000000000000000000000feffffff00000000"], 0x2) close(r2) close(r1) [ 116.307707] FAULT_INJECTION: forcing a failure. [ 116.307707] name failslab, interval 1, probability 0, space 0, times 0 [ 116.319185] CPU: 1 PID: 7203 Comm: syz-executor3 Not tainted 4.17.0+ #5 [ 116.325973] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 116.335451] Call Trace: [ 116.338109] dump_stack+0x185/0x1d0 [ 116.341826] should_fail+0x87b/0xab0 [ 116.345606] __should_failslab+0x278/0x2a0 [ 116.349912] should_failslab+0x29/0x70 [ 116.352934] libceph: parse_ips bad ip '0:file' [ 116.353875] __kmalloc_track_caller+0x1ff/0xc80 [ 116.353927] ? alloc_vfsmnt+0x30d/0xcf0 [ 116.353961] ? ida_get_new_above+0xc39/0x1000 [ 116.354033] kstrdup_const+0x154/0x270 [ 116.375662] alloc_vfsmnt+0x30d/0xcf0 [ 116.379550] vfs_kern_mount+0xaf/0x990 [ 116.383529] do_mount+0xca5/0x4ed0 [ 116.387138] ? copy_mount_options+0x41/0x540 [ 116.391607] ? ksys_mount+0x251/0x3d0 [ 116.395496] ksys_mount+0x32e/0x3d0 [ 116.399198] __x64_sys_mount+0x157/0x1c0 [ 116.403314] ? ksys_mount+0x3d0/0x3d0 [ 116.407187] do_syscall_64+0x15b/0x230 [ 116.411152] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 116.416373] RIP: 0033:0x4559f9 [ 116.419588] RSP: 002b:00007f5ac1080c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 116.427431] RAX: ffffffffffffffda RBX: 00007f5ac10816d4 RCX: 00000000004559f9 [ 116.434750] RDX: 0000000020000100 RSI: 00000000200001c0 RDI: 0000000020000200 [ 116.442153] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 116.449473] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000013 19:49:27 executing program 7: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(0xffffffffffffffff, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") mount(&(0x7f0000000200)='0:file:\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 19:49:27 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}, [], {0x95}}, &(0x7f0000000340)='syzller\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x4, 0xb7, &(0x7f0000000380)=""/183, 0x1}, 0x48) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) write$binfmt_aout(r0, &(0x7f00000004c0), 0x20) dup2(r1, r2) 19:49:27 executing program 6: unshare(0x2000400) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00009e3ff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000000)) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/autofs\x00', 0x40, 0x0) getsockopt$bt_BT_SECURITY(r1, 0x112, 0x4, &(0x7f0000000140), 0x2) r2 = socket$inet6(0xa, 0x20000000000002, 0x0) ioctl(r2, 0x4000008912, &(0x7f00000002c0)="295ee1311f16f477671070") syz_open_pts(r0, 0x0) [ 116.456786] R13: 00000000004c1cc7 R14: 00000000004ceee8 R15: 0000000000000004 19:49:28 executing program 4: r0 = socket$inet6(0xa, 0x80002, 0x88) setsockopt$sock_int(r0, 0x1, 0x2a, &(0x7f0000feb000), 0x4) recvfrom$inet6(r0, &(0x7f0000e89f47)=""/185, 0xffffffffffffff3f, 0x1000026, 0x0, 0x0) bind$inet6(r0, &(0x7f00008a8000)={0xa, 0x3, 0x0, @mcast1={0xff, 0x1, [], 0x1}}, 0x1c) r1 = socket$inet6(0xa, 0x8000000000000802, 0x88) sendmsg$inet_sctp(r1, &(0x7f0000a29000)={&(0x7f00005dafe4)=@in6={0xa, 0x3, 0x0, @mcast2={0xff, 0x2, [], 0x1}}, 0x1c, &(0x7f0000fc8000)}, 0x8000) sendto$inet6(r1, &(0x7f0000b0cf6e), 0xffed, 0x0, &(0x7f000001b000)={0xa}, 0x1c) 19:49:28 executing program 7: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x0, &(0x7f0000000000)="295ee1311f16f477671070") mount(&(0x7f0000000200)='0:file:\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 19:49:28 executing program 6: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000008000)={0x0, 0x1, &(0x7f0000001fe8)=ANY=[@ANYBLOB="9a01ca97f19f1d5a75"], &(0x7f0000003ff6)='syzkaller\x00', 0x0, 0xc3, &(0x7f0000009f3d)=""/195}, 0x48) r2 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) fcntl$dupfd(r0, 0x406, r1) ioctl$UFFDIO_ZEROPAGE(r2, 0xc020aa04, &(0x7f0000000040)={&(0x7f0000ffd000/0x2000)=nil, 0x2000}) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x5, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x5c}, [@ldst={0x7}], {0x95}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0x437, &(0x7f000000cf3d)=""/195}, 0x48) 19:49:28 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}, [], {0x95}}, &(0x7f0000000340)='syzller\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x4, 0xb7, &(0x7f0000000380)=""/183, 0x1}, 0x48) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) write$binfmt_aout(r0, &(0x7f00000004c0), 0x20) dup2(r1, r2) 19:49:28 executing program 1: ioctl(0xffffffffffffffff, 0x0, &(0x7f00000002c0)="025cc83d6d345f8f76") r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f00001edff0)={0x2, 0x10000004e20, @multicast1=0xe0000001}, 0x10) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x10) recvmmsg(r0, &(0x7f0000000180), 0xbeeff187181e26, 0x40000002, 0x0) setsockopt$inet_int(r0, 0x0, 0x17, &(0x7f0000000040)=0x3, 0x4) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") getsockopt$inet6_udp_int(r1, 0x11, 0x6f, &(0x7f0000000080), &(0x7f00000000c0)=0x4) sendto$inet(r0, &(0x7f0000c95ffd), 0x49b8, 0x0, &(0x7f000057bff0)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) 19:49:28 executing program 3 (fault-call:1 fault-nth:5): mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000200)='0:file:\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 19:49:28 executing program 0: unshare(0x64000400) r0 = epoll_create1(0x0) r1 = fcntl$dupfd(r0, 0x0, r0) r2 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r2, &(0x7f0000000040)) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r2, &(0x7f0000000000)) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000080)={0x0}, &(0x7f00000000c0)=0xc) setpriority(0x1, r3, 0x7ff) 19:49:28 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}, [], {0x95}}, &(0x7f0000000340)='syzller\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x4, 0xb7, &(0x7f0000000380)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x5, 0x0) write$binfmt_aout(r0, &(0x7f00000004c0), 0x20) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000280)={0xffffffffffffffff}) recvmmsg(r3, &(0x7f00000002c0), 0x40000f7, 0x0, &(0x7f0000000200)) dup2(r1, r2) [ 117.208315] FAULT_INJECTION: forcing a failure. [ 117.208315] name failslab, interval 1, probability 0, space 0, times 0 [ 117.220436] CPU: 0 PID: 7239 Comm: syz-executor3 Not tainted 4.17.0+ #5 [ 117.227364] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 117.236844] Call Trace: [ 117.239480] dump_stack+0x185/0x1d0 [ 117.243140] should_fail+0x87b/0xab0 [ 117.246884] __should_failslab+0x278/0x2a0 [ 117.251175] should_failslab+0x29/0x70 [ 117.255100] __kmalloc+0xbe/0x350 [ 117.258579] ? ceph_mount+0x94/0x30a0 [ 117.262483] ? ceph_mount+0x121/0x30a0 [ 117.266387] ? ceph_mount+0x99/0x30a0 [ 117.270204] ceph_mount+0x121/0x30a0 [ 117.273961] ? kmsan_set_origin+0x9e/0x160 [ 117.278315] ? f2fs_init_acl+0x1530/0x1530 [ 117.282574] mount_fs+0x29b/0x780 [ 117.286073] vfs_kern_mount+0x222/0x990 [ 117.290097] do_mount+0xca5/0x4ed0 [ 117.293667] ? copy_mount_options+0x41/0x540 [ 117.298104] ? ksys_mount+0x251/0x3d0 [ 117.301947] ksys_mount+0x32e/0x3d0 [ 117.305613] __x64_sys_mount+0x157/0x1c0 [ 117.309783] ? ksys_mount+0x3d0/0x3d0 [ 117.313611] do_syscall_64+0x15b/0x230 [ 117.317524] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 117.322726] RIP: 0033:0x4559f9 [ 117.325920] RSP: 002b:00007f5ac1080c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 117.334628] RAX: ffffffffffffffda RBX: 00007f5ac10816d4 RCX: 00000000004559f9 [ 117.341914] RDX: 0000000020000100 RSI: 00000000200001c0 RDI: 0000000020000200 [ 117.349195] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 117.356493] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000013 [ 117.363785] R13: 00000000004c1cc7 R14: 00000000004ceee8 R15: 0000000000000005 [ 117.382894] libceph: parse_ips bad ip '0:file' [ 117.392133] IPVS: ftp: loaded support on port[0] = 21 19:49:28 executing program 7: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x0, &(0x7f0000000000)="295ee1311f16f477671070") mount(&(0x7f0000000200)='0:file:\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 19:49:28 executing program 6: r0 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000fca000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}}, 0x88) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}}}, 0x88) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000200)=ANY=[], 0x0) 19:49:28 executing program 5: bind$inet(0xffffffffffffffff, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) connect$inet(0xffffffffffffffff, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}, [], {0x95}}, &(0x7f0000000340)='syzller\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x4, 0xb7, &(0x7f0000000380)=""/183, 0x1}, 0x48) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f000031aff8)={0xffffffffffffffff, r0}) write$binfmt_aout(0xffffffffffffffff, &(0x7f00000004c0), 0x20) dup2(r0, r1) [ 117.500793] libceph: parse_ips bad ip '0:file' 19:49:28 executing program 7: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x0, &(0x7f0000000000)="295ee1311f16f477671070") mount(&(0x7f0000000200)='0:file:\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 19:49:28 executing program 0: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) close(r0) socket$rds(0x15, 0x5, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000c85000)) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f0000000180)={0x40002014}) poll(&(0x7f0000000080)=[{r1}], 0x1, 0x0) 19:49:28 executing program 3 (fault-call:1 fault-nth:6): mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000200)='0:file:\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) [ 117.675137] libceph: parse_ips bad ip '0:file' [ 117.745235] FAULT_INJECTION: forcing a failure. [ 117.745235] name failslab, interval 1, probability 0, space 0, times 0 [ 117.756681] CPU: 1 PID: 7264 Comm: syz-executor3 Not tainted 4.17.0+ #5 [ 117.763471] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 117.772857] Call Trace: [ 117.775512] dump_stack+0x185/0x1d0 [ 117.779189] should_fail+0x87b/0xab0 [ 117.782958] __should_failslab+0x278/0x2a0 [ 117.787261] should_failslab+0x29/0x70 [ 117.791212] __kmalloc_track_caller+0x1ff/0xc80 [ 117.795945] ? kmsan_set_origin+0x9e/0x160 [ 117.800234] ? ceph_mount+0x271/0x30a0 [ 117.804195] ? kmsan_internal_unpoison_shadow+0x83/0xe0 [ 117.809613] kstrdup+0xd0/0x1a0 [ 117.812952] ceph_mount+0x271/0x30a0 [ 117.816743] ? kmsan_set_origin+0x9e/0x160 [ 117.821119] ? f2fs_init_acl+0x1530/0x1530 [ 117.825396] mount_fs+0x29b/0x780 [ 117.828911] vfs_kern_mount+0x222/0x990 [ 117.832952] do_mount+0xca5/0x4ed0 [ 117.836544] ? copy_mount_options+0x41/0x540 [ 117.841003] ? ksys_mount+0x251/0x3d0 [ 117.844872] ksys_mount+0x32e/0x3d0 [ 117.848568] __x64_sys_mount+0x157/0x1c0 [ 117.852677] ? ksys_mount+0x3d0/0x3d0 [ 117.856517] do_syscall_64+0x15b/0x230 [ 117.860454] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 117.865684] RIP: 0033:0x4559f9 [ 117.868896] RSP: 002b:00007f5ac1080c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 117.876650] RAX: ffffffffffffffda RBX: 00007f5ac10816d4 RCX: 00000000004559f9 [ 117.883961] RDX: 0000000020000100 RSI: 00000000200001c0 RDI: 0000000020000200 19:49:28 executing program 0: mprotect(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x1000008) r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000040)={0x1d}, 0x2) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x400, 0x0) fchmodat(r1, &(0x7f0000000100)='./file0\x00', 0x2) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 19:49:28 executing program 7: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000000)) mount(&(0x7f0000000200)='0:file:\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) [ 117.891255] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 117.898547] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000013 [ 117.905843] R13: 00000000004c1cc7 R14: 00000000004ceee8 R15: 0000000000000006 [ 117.952749] libceph: parse_ips bad ip '0:file' 19:49:29 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}, [], {0x95}}, &(0x7f0000000340)='syzller\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x4, 0xb7, &(0x7f0000000380)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x5, 0x0) write$binfmt_aout(r0, &(0x7f00000004c0), 0x20) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000280)={0xffffffffffffffff}) recvmmsg(r3, &(0x7f00000002c0), 0x40000f7, 0x0, &(0x7f0000000200)) dup2(r1, r2) 19:49:29 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x2b, 0x0, @local={0xfe, 0x80, [], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000002c0)={0x0, 0x0, [0x0, 0x800]}) 19:49:29 executing program 4: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000003000)='/dev/sequencer2\x00', 0x0, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000080)="295ee1311f16f477671070") r2 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x3, 0x0) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r2, 0x10e, 0x2, &(0x7f0000000040)=0x16, 0x4) ioctl$KDGKBLED(r0, 0xc0045103, &(0x7f000084dfff)) 19:49:29 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f760070") r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x20000, 0xc4) setsockopt$RDS_GET_MR_FOR_DEST(r1, 0x114, 0x7, &(0x7f00000001c0)={@rc={0x1f, {0x80000001, 0x20004000000, 0x2, 0xff, 0x3f, 0x190d}, 0xffffffffffff8001}, {&(0x7f0000000100)=""/79, 0x4f}, &(0x7f0000000180), 0x1}, 0xa0) socket$pppoe(0x18, 0x1, 0x0) r2 = socket$inet_sctp(0x2, 0x1, 0x84) sendto$inet(r2, &(0x7f0000000000)="f2", 0x1, 0x0, &(0x7f00000000c0)={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x10) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000040)=0x0) fcntl$setown(r2, 0x8, r3) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r2, 0x84, 0x6d, &(0x7f0000000780)={0x0, 0x190, "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"}, &(0x7f00000017c0)=0x198) 19:49:29 executing program 5: bind$inet(0xffffffffffffffff, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) connect$inet(0xffffffffffffffff, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}, [], {0x95}}, &(0x7f0000000340)='syzller\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x4, 0xb7, &(0x7f0000000380)=""/183, 0x1}, 0x48) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f000031aff8)={0xffffffffffffffff, r0}) write$binfmt_aout(0xffffffffffffffff, &(0x7f00000004c0), 0x20) dup2(r0, r1) 19:49:29 executing program 3 (fault-call:1 fault-nth:7): mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000200)='0:file:\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 19:49:29 executing program 7: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000000)) mount(&(0x7f0000000200)='0:file:\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 19:49:29 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f00000003c0)=""/246) close(r1) ioctl$GIO_CMAP(r1, 0x4b70, &(0x7f0000000080)) [ 118.575348] libceph: parse_ips bad ip '0:file' [ 118.583180] FAULT_INJECTION: forcing a failure. [ 118.583180] name failslab, interval 1, probability 0, space 0, times 0 [ 118.594538] CPU: 1 PID: 7296 Comm: syz-executor3 Not tainted 4.17.0+ #5 [ 118.601327] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 118.610727] Call Trace: [ 118.613375] dump_stack+0x185/0x1d0 [ 118.617092] should_fail+0x87b/0xab0 [ 118.620874] __should_failslab+0x278/0x2a0 [ 118.625181] should_failslab+0x29/0x70 [ 118.629140] __kmalloc+0xbe/0x350 [ 118.632644] ? ceph_parse_options+0x130/0x26a0 [ 118.637287] ? ceph_parse_options+0x17a/0x26a0 [ 118.641912] ? ceph_parse_options+0x135/0x26a0 [ 118.646545] ? ceph_mount+0x880/0x30a0 [ 118.650556] ceph_parse_options+0x17a/0x26a0 [ 118.654992] ? __kmalloc_track_caller+0x9d3/0xc80 [ 118.659934] ? ceph_set_super+0x400/0x400 [ 118.664210] ceph_mount+0x880/0x30a0 [ 118.667969] ? f2fs_init_acl+0x1530/0x1530 [ 118.672224] mount_fs+0x29b/0x780 [ 118.675709] vfs_kern_mount+0x222/0x990 [ 118.679714] do_mount+0xca5/0x4ed0 [ 118.683277] ? copy_mount_options+0x41/0x540 [ 118.687705] ? ksys_mount+0x251/0x3d0 [ 118.691537] ksys_mount+0x32e/0x3d0 [ 118.695195] __x64_sys_mount+0x157/0x1c0 [ 118.699266] ? ksys_mount+0x3d0/0x3d0 [ 118.703095] do_syscall_64+0x15b/0x230 [ 118.707005] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 118.712217] RIP: 0033:0x4559f9 [ 118.715403] RSP: 002b:00007f5ac1080c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 118.723120] RAX: ffffffffffffffda RBX: 00007f5ac10816d4 RCX: 00000000004559f9 [ 118.730406] RDX: 0000000020000100 RSI: 00000000200001c0 RDI: 0000000020000200 [ 118.737684] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 118.744952] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000013 [ 118.752231] R13: 00000000004c1cc7 R14: 00000000004ceee8 R15: 0000000000000007 19:49:29 executing program 6: r0 = socket$inet6(0xa, 0x80803, 0x2f) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @loopback=0x7f000001}}, 0x1c) getsockopt$inet6_buf(r0, 0x29, 0xd3, &(0x7f0000000200)=""/246, &(0x7f0000000040)=0xf6) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000100)={{{@in6=@local={0xfe, 0x80, [], 0xaa}, @in=@multicast1=0xe0000001, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x33}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1=0xe0000001, 0x0, 0x32}, 0x0, @in=@remote={0xac, 0x14, 0x14, 0xbb}}}, 0xe8) connect$inet6(r0, &(0x7f00000000c0)={0xa}, 0x1c) 19:49:29 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000001080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f00000000c0)={0xaa}) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f000086c000)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) read(r0, &(0x7f0000465f8e)=""/114, 0x72) read(r1, &(0x7f00000010c0)=""/4096, 0x1000) timer_create(0x1, &(0x7f0000000040)={0x0, 0x2c, 0x2, @tid=0xffffffffffffffff}, &(0x7f0000000080)=0x0) timer_settime(r2, 0x1, &(0x7f0000000100)={{0x77359400}, {0x0, 0x1c9c380}}, &(0x7f0000000140)) ioctl$UFFDIO_UNREGISTER(r1, 0x8010aa01, &(0x7f0000000000)={&(0x7f000013f000/0x1000)=nil, 0x1000}) 19:49:29 executing program 0: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x200000, 0x0) ioctl$VHOST_GET_FEATURES(r0, 0x8008af00, &(0x7f0000000080)) syz_emit_ethernet(0x3a, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv4={0x800, {{0x6, 0x4, 0x0, 0x0, 0x2c, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @rand_addr=0x80000000, {[@timestamp={0xffffff89, 0x2}]}}, @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, &(0x7f0000000000)) 19:49:29 executing program 7: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000000)) mount(&(0x7f0000000200)='0:file:\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) [ 118.943344] libceph: parse_ips bad ip '0:file' 19:49:30 executing program 1: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/sys/net/ipv4/vs/sync_ports\x00', 0x2, 0x0) ioctl$VHOST_GET_VRING_ENDIAN(r0, 0x4008af14, &(0x7f0000000200)={0x3, 0x8001}) r1 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x9, 0x4000) ioctl$BLKROTATIONAL(r1, 0x127e, &(0x7f00000000c0)) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'lo\x00', &(0x7f0000000000)=@ethtool_cmd={0x15}}) ioctl$sock_netdev_private(r2, 0x89f7, &(0x7f0000000100)="cb6777cd003a54cc398c6553a0eaa6d1b79af5c579ef409f8a064bae72f1ea9b88f413f39f72b403b2d058870e77d519a1814fe1685d60c1c7923b6b2269da3f70e74bf5e02c706e89b91957452400c335d36b67d38e3cbdcb7321c5ed1be75cb547abb65f54bc2966353f2041ebb225d0dc6bb5e1c398b5a38bc57737b673d6b03ed7aff1d1719cb9cda6e049ed980d4af384ba986fa468ce1e3bf4ced1ca0490cad1ac1e82ea829b2c9c0e1c04d60a67af421c5599cf2331") 19:49:30 executing program 3 (fault-call:1 fault-nth:8): mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000200)='0:file:\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 19:49:30 executing program 6: r0 = socket$inet6(0xa, 0x80803, 0x2f) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @loopback=0x7f000001}}, 0x1c) getsockopt$inet6_buf(r0, 0x29, 0xd3, &(0x7f0000000200)=""/246, &(0x7f0000000040)=0xf6) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000100)={{{@in6=@local={0xfe, 0x80, [], 0xaa}, @in=@multicast1=0xe0000001, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x33}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1=0xe0000001, 0x0, 0x32}, 0x0, @in=@remote={0xac, 0x14, 0x14, 0xbb}}}, 0xe8) connect$inet6(r0, &(0x7f00000000c0)={0xa}, 0x1c) 19:49:30 executing program 0: ustat(0x1, &(0x7f0000000140)) r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x4, 0x1) getsockname$netrom(r0, &(0x7f0000000040), &(0x7f0000000080)=0x10) socketpair(0x19, 0x3, 0x4, &(0x7f00000000c0)) 19:49:30 executing program 5: bind$inet(0xffffffffffffffff, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) connect$inet(0xffffffffffffffff, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}, [], {0x95}}, &(0x7f0000000340)='syzller\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x4, 0xb7, &(0x7f0000000380)=""/183, 0x1}, 0x48) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f000031aff8)={0xffffffffffffffff, r0}) write$binfmt_aout(0xffffffffffffffff, &(0x7f00000004c0), 0x20) dup2(r0, r1) 19:49:30 executing program 7: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000000)="295ee1311f16") mount(&(0x7f0000000200)='0:file:\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 19:49:30 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x1000001, 0x20033, r0, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f0000867ff8), &(0x7f0000000000)=0x8) 19:49:30 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}, [], {0x95}}, &(0x7f0000000340)='syzller\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x4, 0xb7, &(0x7f0000000380)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x5, 0x0) write$binfmt_aout(r0, &(0x7f00000004c0), 0x20) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000280)={0xffffffffffffffff}) recvmmsg(r3, &(0x7f00000002c0), 0x40000f7, 0x0, &(0x7f0000000200)) dup2(r1, r2) [ 119.779601] FAULT_INJECTION: forcing a failure. [ 119.779601] name failslab, interval 1, probability 0, space 0, times 0 [ 119.783384] libceph: parse_ips bad ip '0:file' [ 119.791095] CPU: 1 PID: 7339 Comm: syz-executor3 Not tainted 4.17.0+ #5 [ 119.802322] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 119.802335] Call Trace: [ 119.802402] dump_stack+0x185/0x1d0 [ 119.818008] should_fail+0x87b/0xab0 [ 119.821860] __should_failslab+0x278/0x2a0 [ 119.826167] should_failslab+0x29/0x70 [ 119.830099] __kmalloc+0xbe/0x350 [ 119.833575] ? ceph_parse_options+0x130/0x26a0 [ 119.838256] ? ceph_parse_options+0x1db/0x26a0 [ 119.842860] ? ceph_mount+0x880/0x30a0 [ 119.846789] ceph_parse_options+0x1db/0x26a0 [ 119.851226] ? __kmalloc_track_caller+0x9d3/0xc80 [ 119.856116] ? ceph_set_super+0x400/0x400 [ 119.860289] ceph_mount+0x880/0x30a0 [ 119.864048] ? f2fs_init_acl+0x1530/0x1530 [ 119.868307] mount_fs+0x29b/0x780 [ 119.871789] vfs_kern_mount+0x222/0x990 [ 119.875791] do_mount+0xca5/0x4ed0 [ 119.879346] ? copy_mount_options+0x41/0x540 [ 119.883772] ? ksys_mount+0x251/0x3d0 [ 119.887605] ksys_mount+0x32e/0x3d0 [ 119.891262] __x64_sys_mount+0x157/0x1c0 [ 119.895332] ? ksys_mount+0x3d0/0x3d0 [ 119.899134] do_syscall_64+0x15b/0x230 [ 119.903039] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 119.908230] RIP: 0033:0x4559f9 [ 119.911416] RSP: 002b:00007f5ac1080c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 119.919135] RAX: ffffffffffffffda RBX: 00007f5ac10816d4 RCX: 00000000004559f9 [ 119.926405] RDX: 0000000020000100 RSI: 00000000200001c0 RDI: 0000000020000200 [ 119.933674] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 119.940941] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000013 [ 119.948212] R13: 00000000004c1cc7 R14: 00000000004ceee8 R15: 0000000000000008 19:49:31 executing program 6: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1, 0xb2, 0x4, 0x7}, 0x2c) unshare(0x24020400) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r0, &(0x7f0000000000), &(0x7f00000000c0)}, 0x20) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000080)={&(0x7f0000000040)='./file0\x00', 0x0, 0x10}, 0x10) 19:49:31 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000940)='/dev/rtc0\x00', 0x0, 0x0) getsockopt$inet6_tcp_buf(r1, 0x6, 0xb, &(0x7f0000000980)=""/199, &(0x7f0000000a80)=0xc7) bind$alg(r0, &(0x7f0000000b00)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x1009d) write$binfmt_elf32(r0, &(0x7f0000000080)={{0x7f, 0x45, 0x4c, 0x46, 0x8, 0x0, 0x6, 0x100, 0xac2f, 0x2, 0x3f, 0x3f, 0xc, 0x38, 0xf2, 0x4000000000000, 0x80, 0x20, 0x1, 0x101, 0x7fffffff, 0x6}, [{0x6474e551, 0x3, 0x6, 0x656, 0x8, 0xff, 0x14d2, 0x6}], "70c467a17bc9bd59a7e38462d7026567f6f8764363195d90c337295027b7994d19767a4f4392fd61f8e7cb62c9f4c0ffa815bc", [[], [], [], [], [], [], [], []]}, 0x88b) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000ac0)='tunl0\x00', 0x10) r2 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)}, 0x8001) unshare(0x40600) poll(&(0x7f0000000040)=[{r2}], 0x1, 0x0) 19:49:31 executing program 7: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000000)="295ee1311f16") mount(&(0x7f0000000200)='0:file:\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 19:49:31 executing program 4: r0 = syz_open_dev$sndpcmc(&(0x7f0000000040)='/dev/snd/pcmC#D#c\x00', 0x8, 0xa87c9d6137394d1f) setsockopt$inet_tcp_TLS_TX(r0, 0x6, 0x1, &(0x7f0000000080)={0x303, 0x33}, 0x4) ioctl$LOOP_SET_BLOCK_SIZE(r0, 0x4c09, 0x6) vmsplice(r0, &(0x7f00000004c0)=[{&(0x7f00000000c0)="16502460269e4788887831f4b9b2c528b2537cbc0d2cda6162577f7f292fdf4d37533746d7b3c9474b13fd8f30dd7a73a68d48619c511948ff34046087b2b22679d31061b5a91e3f04bb4d7123ae4e97cd0eb6369fe7ce38152f20e01b7c9cf414b6", 0x62}, {&(0x7f0000000200)="ba26debdfecb614bbaa78f7f22695dd0b5ba4e1caac891925720873e086679b61ccef2a5b50487ad9445903b64a5d7e4e7304402c2e31d3a1ea4bf17e1b91614c2ad0ad245ec60c9ab1fefffe2f5cd52ac68a6d8abffe4c9d657161a6e90b7c393a2db5ec9612d4629d0c97258e7bd4ed58375171ace9b088fd761bba75c5aa0cec8ce702ea24861ceef346b78959e8253a25294e0da", 0x96}, {&(0x7f00000002c0)="a9c6808cf2544ed7a4a84227cdb79d5aca44b2f721e8d0945e80e4f8e1de657d5cdf40b4a992aa5e599f3d0dae596af42ebbee9844429c218d6d8286817609c5098b2eb56f340fc8d2c97407494e4eec4eace613346346693a7a793f05de9cda64a5cc26bc607f7d8da4ae1410a5200db6daa7846833614eb3393606e36a", 0x7e}, {&(0x7f0000000140)="9dead7f5c808742013cc8b79edd6fe610c0ffdbfd1b4897313c6fb333697f229", 0x20}, {&(0x7f0000000340)="7df20ab80b7d116fca978daa8c9a5e3252bc1f7bcc604b1471ab5ae4fc976b8b90b596dc5e53b2981d45", 0x2a}, {&(0x7f0000000380)="c44c402a511e1104934755d2b82cb993e0b623cddaf61882ed60905e85dc59ef0a61cfccdb167a1e266c0af5dc743e6bdeec4ad0eca836e23d26ec014f0e0a4ff5941740c35e512cab2a90e79aee6ed77395ed1808c33da03567309ef8f740822233035d89", 0x65}, {&(0x7f0000000400)="6c6e99788b13810c914467f23cca6f99b15cdeb8babc1dfb17cfc13fe791477531844eab0fd087880e277c4ac70ffd6358c36c08820201b736d3558d2ace7e79391c8ca96706106b8f254a3d9528ded7a07939027c80821ae0f909fe185e7d82116a11712c158aadf2368613be357792e2153f1d320500ee840816d7b1c24a00c0eeaa64e0a8e0c6ae8aa716fb266772751187872ad17077bb30b73ffb0ab21ef3ad130e01b5c80e30f81b6dc8685a848abbb01648786e30404174fcb3093e9c", 0xc0}], 0x7, 0x8) r1 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ifreq(r1, 0x400008930, &(0x7f0000000000)={"766361b0f53a1830691a870000008000", @ifru_map}) getsockopt$inet_sctp_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f0000000180)={0x0, 0x8, 0x5ec4, 0x2}, &(0x7f00000001c0)=0x10) setsockopt$ALG_SET_AEAD_AUTHSIZE(r0, 0x117, 0x5, 0x0, 0x80000000) 19:49:31 executing program 0: r0 = socket$can_raw(0x1d, 0x3, 0x1) r1 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r1, 0x4000008812, &(0x7f0000000840)="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") rt_sigpending(&(0x7f0000000000), 0x8) r2 = syz_open_dev$midi(&(0x7f0000000040)='/dev/midi#\x00', 0x1, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r2, 0x0, 0x60, &(0x7f0000000340)={'filter\x00', 0x7, 0x4, 0x4a8, 0x140, 0x140, 0x140, 0x3c0, 0x3c0, 0x3c0, 0x4, &(0x7f0000000100), {[{{@uncond, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @mac=@random="86f8fb9dc906", @multicast2=0xe0000002, @multicast1=0xe0000001, 0x9}}}, {{@uncond, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @empty, @broadcast=0xffffffff, @dev={0xac, 0x14, 0x14, 0x12}, 0xf, 0xffffffff}}}, {{@arp={@empty, @local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x0, @mac, {[0xff, 0xff, 0xff, 0xff]}, @mac, {[0xff, 0x0, 0x0, 0xff, 0x0, 0xff]}, 0x8001, 0x8, 0x401, 0x0, 0x2, 0x0, 'erspan0\x00', 'dummy0\x00', {0xff}, {}, 0x0, 0x100}, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@mac=@link_local={0x1, 0x80, 0xc2}, @empty, @dev={0xac, 0x14, 0x14, 0xd}, @empty, 0x1, 0xffffffff}}}], {{[], 0xc0, 0xe8}, {0x28, '\x00', 0x0, 0xfffffffffffffffe}}}}, 0x4f8) ioctl$VHOST_SET_LOG_BASE(r2, 0x4008af04, &(0x7f00000000c0)=&(0x7f0000000080)) ioctl$DRM_IOCTL_GEM_OPEN(r2, 0xc010640b, &(0x7f0000000140)={0x0, 0x0, 0xffffffffffffffff}) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r0, &(0x7f0000000200)={0x16}) ioctl$DRM_IOCTL_GEM_FLINK(r0, 0xc008640a, &(0x7f0000000180)={0x0}) ioctl$DRM_IOCTL_GEM_OPEN(r2, 0xc010640b, &(0x7f00000001c0)={r3, r4, 0x100000001}) 19:49:31 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}, [], {0x95}}, &(0x7f0000000340)='syzller\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x4, 0xb7, &(0x7f0000000380)=""/183, 0x1}, 0x48) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) write$binfmt_aout(r0, &(0x7f00000004c0), 0x20) dup2(r1, r2) 19:49:31 executing program 3 (fault-call:1 fault-nth:9): mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000200)='0:file:\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) [ 120.173752] libceph: parse_ips bad ip '0:file' 19:49:31 executing program 1: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffff9c, 0xc00c642d, &(0x7f0000000080)={0x0, 0x80000, 0xffffffffffffff9c}) r2 = syz_open_dev$mouse(&(0x7f00000000c0)='/dev/input/mouse#\x00', 0x8c, 0x101000) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r0, 0xc00c642d, &(0x7f0000000100)={r1, 0x0, r2}) r3 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x10000, @local={0xfe, 0x80, [], 0xaa}, 0x9}, 0x1c) sendmsg(r3, &(0x7f0000000a40)={0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f0000000240)="3a9a0e63c9476288b671afdbd53a5994e137381f62021d1951b627b8dda57a5d17d744648c81c570", 0x28}], 0x1, &(0x7f0000003b40)}, 0x0) setsockopt$inet_sctp6_SCTP_NODELAY(r3, 0x84, 0x3, &(0x7f0000000000)=0xda6, 0x4) [ 120.276610] libceph: parse_ips bad ip '0:file' 19:49:31 executing program 4: unshare(0x2000400) r0 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x9, 0x800) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(r0, 0x404c534a, &(0x7f0000000080)={0x9ff9, 0x101, 0x100}) setsockopt(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000040)="c611852f8cb11c68416e2fb3b71a33eb178e6238b8347515", 0x18) r1 = socket$inet(0x2, 0x6, 0x0) setsockopt(r1, 0x0, 0x40, &(0x7f0000000000), 0x0) 19:49:31 executing program 6: r0 = socket$inet6(0xa, 0x41000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="025cc83d6d345f8f760070") r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendto$inet(r1, &(0x7f0000000080)="208f6c370fc7620f6c985075f08ebcd859071cdbefd798e7edade1a26fe1bf9af0fe8ae4344c5e1ecae1f27f68046decc52b744fa2b0506a557ace1c4eb4373931f896ed3f62444dec89cd2f70e4447b2b0812a40d380314b6f3ee3a5100c29f10b9c092ad10a0dc63ba3ceb7210c44aa4616b8e9694a52dbf98730ad68eeb", 0x7f, 0x80, &(0x7f0000000100)={0x2, 0x4e21, @multicast2=0xe0000002}, 0x10) r2 = socket$inet(0x2, 0x3, 0x3e) sendto$inet(r2, &(0x7f0000ef4000), 0x0, 0x0, &(0x7f0000ee9ff0)={0x2}, 0x10) recvmmsg(r2, &(0x7f0000000140), 0x50, 0x2, &(0x7f00000001c0)={0x0, 0x989680}) 19:49:31 executing program 7: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000000)="295ee1311f16") mount(&(0x7f0000000200)='0:file:\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 19:49:31 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(r1, 0xc0105303, &(0x7f0000000040)={0x5, 0x7ff, 0xa4c6}) mount(&(0x7f0000000200)='0:file:\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) sendfile(r0, r0, &(0x7f00000000c0)=0x3e, 0x1) 19:49:31 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x2, &(0x7f0000000040)="295ee1311f050000000000000034de8364f55322d0776710701ae37c5ed0120877956d76a54e0e6395937d230fa797a49702ce9363b572d6638ef5ffcb3d426dd8d8b39e83a551a88501acf96f145a4ea95e894af737431da3ca80ba7611b14185c41e8f3df8") syslog(0x3, &(0x7f0000001240)=""/4096, 0x8001) 19:49:31 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}, [], {0x95}}, &(0x7f0000000340)='syzller\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x4, 0xb7, &(0x7f0000000380)=""/183, 0x1}, 0x48) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) write$binfmt_aout(r0, &(0x7f00000004c0), 0x20) dup2(r1, r2) 19:49:31 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}, [], {0x95}}, &(0x7f0000000340)='syzller\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x4, 0xb7, &(0x7f0000000380)=""/183}, 0x48) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f000031aff8)={r0, r1}) write$binfmt_aout(r0, &(0x7f00000004c0), 0x20) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000280)={0xffffffffffffffff}) recvmmsg(r2, &(0x7f00000002c0), 0x40000f7, 0x0, &(0x7f0000000200)) dup2(r1, 0xffffffffffffffff) 19:49:31 executing program 1: r0 = syz_open_dev$mice(&(0x7f0000000340)='/dev/input/mice\x00', 0x0, 0x64002) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(0xffffffffffffff9c, 0x84, 0x6c, &(0x7f0000000380)={0x0}, &(0x7f00000003c0)=0x8) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f0000000400)={r1, 0x9, 0x4}, &(0x7f0000000440)=0x8) ioctl$TIOCSLCKTRMIOS(r0, 0x5457, &(0x7f0000000480)) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000008000)={0x0, 0x1, &(0x7f0000001fe8)=ANY=[@ANYBLOB="a6bd19ca420f485ad5"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0xc3, &(0x7f0000009f3d)=""/195}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x5, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffffb5}, [@ldst={0x7, 0x0, 0x5, 0x731}], {0x95}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) r3 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x2c0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000000c0)=0x0) sendmsg$nl_netfilter(r3, &(0x7f0000000300)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f00000002c0)={&(0x7f0000000100)={0x1c0, 0x13, 0xf, 0x200, 0x70bd29, 0x25dfdbfc, {0xf, 0x0, 0x8}, [@generic="288b22368533cf006f9061b2062644469a44d4ba20e2e55a402ab8c1ab79fb7df38ae8a3ed9b21b8c20f4498369245bb707f27bb74669a89b62c5ea8fc10226b6ed4a0c0112e92702ae3ece190b815a73d2d481034eb020cf4fcd40f85add5dd95b7f21279fb5dff2cfc8bf4649c1a59d2f2c9749e4f5d37b7b7f2702f1d5aceeec691498fa331a8a3fde67f98300535c5f276450acf0ceabc1600c51d7728865ec7b2d0e452e6ef60e0c0d35926c393344d50304041746efc88fdb0ceeb16", @typed={0x8, 0x65, @pid=r4}, @typed={0x8, 0x8, @fd=r2}, @typed={0x4, 0x81}, @typed={0x8, 0x8f, @ipv4=@rand_addr=0x8001}, @generic="52ba95a80c61cffc8159897862dd18a05150f661d93fff6cd91113b63e221bd913b29ed642391bbf70821a15561fa8cc348a68d3a36077edc0a6520318b13853a7b2932308f39ad04e720db4b3ff317ca13afa711b533a3669b5d22d3b85e608e6b567c9a062a00806f5cbf558594ed4bfcf45d5eca373b6724bd60825980ed3c97df7a665416d25455c0335ac2aa9d23ffbe6e8a3a936a00968281cd7bdd49ccd23a2b465d6f5dd74ae0978163a11023ff6913ec13d7c72db63e0ed17a8a727da03305d89c199cf9bb76d917c1e"]}, 0x1c0}, 0x1, 0x0, 0x0, 0x11}, 0x8881) setsockopt$inet6_MRT6_DEL_MFC(r3, 0x29, 0xcd, &(0x7f00000004c0)={{0xa, 0x4e22, 0x800, @empty, 0x2c}, {0xa, 0x4e24, 0xed, @empty, 0x351}, 0x1, [0x6, 0x4e, 0xfffffffffffffffb, 0x7, 0x7, 0x3, 0x371, 0x2]}, 0x5c) [ 120.724365] libceph: parse_ips bad ip '0:file' [ 120.745963] libceph: parse_ips bad ip '0:file' [ 120.762415] libceph: parse_ips bad ip '0:file' 19:49:31 executing program 1: 19:49:31 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}, [], {0x95}}, &(0x7f0000000340)='syzller\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x4, 0xb7, &(0x7f0000000380)=""/183, 0x1}, 0x48) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) write$binfmt_aout(r0, &(0x7f00000004c0), 0x20) dup2(r1, r2) 19:49:31 executing program 4: 19:49:31 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='btrfs\x00', 0xc800, &(0x7f0000000140)="9474b978d08d6a6f2f510af815e68c6e7dc65a70e60875200eab315e9e75993c6593ac912142dbf65f6827bb179ee9d9745c0915cd4c0461f87a6965d6d0e2852fe41a9c57f0c1627120e7dc3999c92c091470ba63b784045c27b805e48f32ebdac78a93") mount(&(0x7f0000000200)='0:file:\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) setsockopt$sock_int(0xffffffffffffff9c, 0x1, 0xb, &(0x7f0000000240)=0xd26, 0x4) 19:49:31 executing program 6: 19:49:31 executing program 7: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000000)="295ee1311f16f47767") mount(&(0x7f0000000200)='0:file:\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 19:49:32 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f000031aff8)={r0}) write$binfmt_aout(r0, &(0x7f00000004c0), 0x20) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000280)={0xffffffffffffffff}) recvmmsg(r2, &(0x7f00000002c0), 0x40000f7, 0x0, &(0x7f0000000200)) dup2(0xffffffffffffffff, r1) [ 120.983319] libceph: parse_ips bad ip '0:file' 19:49:32 executing program 4: 19:49:32 executing program 1: [ 121.041498] libceph: parse_ips bad ip '0:file' [ 121.043141] libceph: parse_ips bad ip '0:file' 19:49:32 executing program 6: 19:49:32 executing program 7: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000000)="295ee1311f16f47767") mount(&(0x7f0000000200)='0:file:\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) [ 121.251514] libceph: parse_ips bad ip '0:file' 19:49:32 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000200)='./file1\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) mount(&(0x7f0000000000)='0:file:\x00', &(0x7f0000000040)='0:file:\x00', &(0x7f00000000c0)='hfsplus\x00', 0x10, &(0x7f0000000240)="ac2f57167dbf8f6bc7cdd125767a47b48263b6dfc9c21f299c7c1207244531454d7d20e73276f5871b5b815a7191e343cffcc401a7dfc58753074c744b2292bc9c451b9f2679ea1a67d4fc1562c3ce5828d1d32cab097da85994c36d4db299365f668fbec6af5205395afe1fd9a514b886bddeedc55ad6eb287dcbdf8fe42487fcd15fa061a6321db168a8920c5e7610f17aaeb25fa9c0ec6fdb91499d27d0355b8f3db6529ba18d53eb") 19:49:32 executing program 0: 19:49:32 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x0, @multicast1=0xe0000001}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}, [], {0x95}}, &(0x7f0000000340)='syzller\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x4, 0xb7, &(0x7f0000000380)=""/183, 0x1}, 0x48) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) write$binfmt_aout(r0, &(0x7f00000004c0), 0x20) dup2(r1, r2) 19:49:32 executing program 4: 19:49:32 executing program 1: 19:49:32 executing program 6: 19:49:32 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f000031aff8)={r0}) write$binfmt_aout(r0, &(0x7f00000004c0), 0x20) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000280)={0xffffffffffffffff}) recvmmsg(r2, &(0x7f00000002c0), 0x40000f7, 0x0, &(0x7f0000000200)) dup2(0xffffffffffffffff, r1) 19:49:32 executing program 7: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000000)="295ee1311f16f47767") mount(&(0x7f0000000200)='0:file:\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) [ 122.020104] ceph: device name is missing path (no : separator in ./file1) [ 122.025701] libceph: parse_ips bad ip '0:file' 19:49:33 executing program 6: 19:49:33 executing program 4: 19:49:33 executing program 0: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") mount(&(0x7f0000000200)='::,ile:\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 19:49:33 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndseq(&(0x7f0000000180)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, &(0x7f0000000040)={0x0, 0x0, 0x0, 'queue0\x00'}) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(r0, 0xc08c5335, &(0x7f00000001c0)={0x0, 0x80, 0x3, 'queue1\x00'}) [ 122.076263] ceph: device name is missing path (no : separator in ./file1) 19:49:33 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) mq_open(&(0x7f0000000000)='\x00', 0x0, 0x0, &(0x7f0000000040)) mount(&(0x7f0000000200)='0:file:\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) r0 = syz_open_dev$tun(&(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x200000) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000240)={{{@in=@broadcast, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@rand_addr}, 0x0, @in=@loopback}}, &(0x7f0000000040)=0xe8) ioctl$TUNSETIFINDEX(r0, 0x400454da, &(0x7f00000000c0)=r1) 19:49:33 executing program 7: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000000)="295ee1311f16f4776710") mount(&(0x7f0000000200)='0:file:\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) [ 122.218566] libceph: parse_ips bad ip '::,ile' 19:49:33 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x0, @multicast1=0xe0000001}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}, [], {0x95}}, &(0x7f0000000340)='syzller\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x4, 0xb7, &(0x7f0000000380)=""/183, 0x1}, 0x48) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) write$binfmt_aout(r0, &(0x7f00000004c0), 0x20) dup2(r1, r2) 19:49:33 executing program 4: msgrcv(0x0, &(0x7f0000000000), 0x137, 0xfffffffffffffffd, 0x0) msgsnd(0x0, &(0x7f0000000080)={0x3}, 0x8, 0x0) [ 122.316975] libceph: parse_ips bad ip '0:file' 19:49:33 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f000031aff8)={r0}) write$binfmt_aout(r0, &(0x7f00000004c0), 0x20) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000280)={0xffffffffffffffff}) recvmmsg(r2, &(0x7f00000002c0), 0x40000f7, 0x0, &(0x7f0000000200)) dup2(0xffffffffffffffff, r1) 19:49:33 executing program 3: mkdir(&(0x7f0000000140)='./file1\x00', 0x20) mount(&(0x7f0000000200)='0:file:\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000100)="04f29668f0", 0x0, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x141002, 0x0) r1 = syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001b00)={{{@in6=@ipv4={[], [], @dev}, @in6=@ipv4={[], [], @multicast1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@rand_addr}, 0x0, @in=@multicast2}}, &(0x7f0000001c00)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000001d00)={'vcan0\x00', 0x0}) accept4$packet(0xffffffffffffffff, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000001d80)=0x14, 0x80000) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000001dc0)={@mcast2, 0x0}, &(0x7f0000001e00)=0x14) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000001ec0)={'vcan0\x00', 0x0}) accept4$packet(0xffffffffffffffff, &(0x7f0000001fc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000002000)=0x14, 0x80000) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f0000002040)={'team0\x00', 0x0}) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x24, &(0x7f0000002080)={@local, @local, 0x0}, &(0x7f00000020c0)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000002100)={{{@in6=@loopback, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@rand_addr}, 0x0, @in6=@mcast2}}, &(0x7f0000002200)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f0000002240)={0x0, 0x0, 0x0}, &(0x7f0000002280)=0x14, 0x80800) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000022c0)={{{@in6, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in=@rand_addr}}, &(0x7f00000023c0)=0xe8) sendmsg$TEAM_CMD_NOOP(r0, &(0x7f0000002980)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2100000}, 0xc, &(0x7f0000002940)={&(0x7f0000002400)={0x510, r1, 0x200, 0x70bd2d, 0x25dfdbfd, {}, [{{0x8, 0x1, r2}, {0x1b4, 0x2, [{0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8, 0x3, 0x3}, {0x8, 0x4, 0x1}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8, 0x3, 0x3}, {0x8, 0x4, 0xcc}}}, {0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8, 0x3, 0x5}, {0x1c, 0x4, 'hash_to_port_mapping\x00'}}}, {0x44, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8, 0x3, 0x5}, {0x14, 0x4, 'activebackup\x00'}}}, {0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8, 0x3, 0x5}, {0xc, 0x4, 'hash\x00'}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8, 0x3, 0x6}, {0x4, 0x4}}, {0x8, 0x6, r3}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8, 0x3, 0x3}, {0x8, 0x4, r4}}}]}}, {{0x8, 0x1, r5}, {0x17c, 0x2, [{0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8, 0x3, 0x3}, {0x8, 0x4, 0x9}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8, 0x3, 0xb}, {0x8, 0x4, 0x5}}, {0x8, 0x7}}}, {0x3c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8, 0x3, 0xb}, {0xc, 0x4, [{0x3, 0x5, 0x0, 0x9}]}}}, {0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8, 0x3, 0x5}, {0x1c, 0x4, 'hash_to_port_mapping\x00'}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8, 0x3, 0xb}, {0x8, 0x4, 0x8}}, {0x8, 0x6, r6}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8, 0x3, 0x3}, {0x8, 0x4, 0x9}}}]}}, {{0x8, 0x1, r7}, {0xbc, 0x2, [{0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8, 0x3, 0x3}, {0x8, 0x4, r8}}, {0x8, 0x7}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8, 0x3, 0x6}, {0x4, 0x4}}, {0x8, 0x6, r9}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8, 0x3, 0x6}, {0x4, 0x4}}, {0x8, 0x6, r10}}}]}}, {{0x8, 0x1, r11}, {0xf0, 0x2, [{0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8, 0x3, 0x3}, {0x8, 0x4, 0x80000000}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8, 0x3, 0xb}, {0x8, 0x4, 0x1}}, {0x8, 0x7}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8, 0x3, 0x3}, {0x8, 0x4, 0x6}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8, 0x3, 0x6}, {0x4, 0x4}}, {0x8, 0x6, r12}}}]}}]}, 0x510}, 0x1, 0x0, 0x0, 0x10}, 0x24048040) 19:49:33 executing program 6: r0 = socket$alg(0x26, 0x5, 0x0) sendto(r0, &(0x7f00000000c0)="ad1fd29c6d5c5bbfe459205b9d85549fdf01ebe472b1c4a652129b3d083cb5a4808b967936c693e161cd4f18ad17b7d3a539db15d6f601ba57334ea40dc070d042515ed74985516e92e47126c1c17fc41f7dcb59a0565ac9dc9c35fa347a127bf62ae0dffb617d6a3e64b261bfd586a22e", 0x71, 0x4000, &(0x7f0000000140)=@nfc={0x27, 0x0, 0x0, 0x5}, 0x80) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write$evdev(r1, &(0x7f0000000200)=[{{0x77359400}}], 0xffa7) write(r2, &(0x7f00000001c0)="61b5", 0x1) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000240)={{{@in=@multicast1, @in6=@ipv4={[], [], @rand_addr}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@rand_addr}, 0x0, @in=@loopback}}, &(0x7f0000000080)=0xe8) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000340)={0x0, 0x0}, &(0x7f0000000380)=0xc) sendmsg$nl_xfrm(r2, &(0x7f0000000600)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f00000005c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB="e40100001300200128bd7b00fedbdf25ac1414aa0000000000007f0000000000000000000000000000000000000000014e2200034e2000050a0080a087000000", @ANYRES32=r3, @ANYRES32=r4, @ANYBLOB="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"], 0x1e4}, 0x1, 0x0, 0x0, 0x800}, 0x4000000) socket$bt_hidp(0x1f, 0x3, 0x6) recvmmsg(r2, &(0x7f0000001ec0)=[{{&(0x7f0000000880)=@in6={0x0, 0x0, 0x0, @dev}, 0x80, &(0x7f0000001900)=[{&(0x7f0000000900)=""/4096, 0x1000}], 0x1, &(0x7f0000001940)=""/42, 0x2a}}, {{&(0x7f0000001c40)=@in6={0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000001e80), 0x36c}}], 0x2, 0x0, &(0x7f0000002040)={0x0, 0x1c9c380}) 19:49:33 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") mount(&(0x7f0000000200)='::.ile:\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 19:49:33 executing program 0: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") mount(&(0x7f0000000200)='::,ile:\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 19:49:33 executing program 4: r0 = syz_open_dev$mice(&(0x7f0000000340)='/dev/input/mice\x00', 0x0, 0x64002) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(0xffffffffffffff9c, 0x84, 0x6c, &(0x7f0000000380)={0x0}, &(0x7f00000003c0)=0x8) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f0000000400)={r1, 0x9, 0x4}, &(0x7f0000000440)=0x8) ioctl$TIOCSLCKTRMIOS(r0, 0x5457, &(0x7f0000000480)) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000008000)={0x0, 0x1, &(0x7f0000001fe8)=ANY=[@ANYBLOB="a6bd19ca420f485ad5"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0xc3, &(0x7f0000009f3d)=""/195}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x5, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffffb5}, [@ldst={0x7, 0x0, 0x5, 0x731}], {0x95}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) r3 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x2c0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000000c0)=0x0) sendmsg$nl_netfilter(r3, &(0x7f0000000300)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f00000002c0)={&(0x7f0000000100)={0x1c0, 0x13, 0xf, 0x200, 0x70bd29, 0x25dfdbfc, {0xf, 0x0, 0x8}, [@generic="288b22368533cf006f9061b2062644469a44d4ba20e2e55a402ab8c1ab79fb7df38ae8a3ed9b21b8c20f4498369245bb707f27bb74669a89b62c5ea8fc10226b6ed4a0c0112e92702ae3ece190b815a73d2d481034eb020cf4fcd40f85add5dd95b7f21279fb5dff2cfc8bf4649c1a59d2f2c9749e4f5d37b7b7f2702f1d5aceeec691498fa331a8a3fde67f98300535c5f276450acf0ceabc1600c51d7728865ec7b2d0e452e6ef60e0c0d35926c393344d50304041746efc88fdb0ceeb16", @typed={0x8, 0x65, @pid=r4}, @typed={0x8, 0x8, @fd=r2}, @typed={0x4, 0x81}, @typed={0x8, 0x8f, @ipv4=@rand_addr=0x8001}, @generic="52ba95a80c61cffc8159897862dd18a05150f661d93fff6cd91113b63e221bd913b29ed642391bbf70821a15561fa8cc348a68d3a36077edc0a6520318b13853a7b2932308f39ad04e720db4b3ff317ca13afa711b533a3669b5d22d3b85e608e6b567c9a062a00806f5cbf558594ed4bfcf45d5eca373b6724bd60825980ed3c97df7a665416d25455c0335ac2aa9d23ffbe6e8a3a936a00968281cd7bdd49ccd23a2b465d6f5dd74ae0978163a11023ff6913ec13d7c72db63e0ed17a8a727da03305d89c199cf9bb76d917c1e"]}, 0x1c0}, 0x1, 0x0, 0x0, 0x11}, 0x8881) setsockopt$inet6_MRT6_DEL_MFC(r3, 0x29, 0xcd, &(0x7f00000004c0)={{0xa, 0x4e22, 0x800, @empty, 0x2c}, {0xa, 0x4e24, 0xed, @empty, 0x351}, 0x1, [0x6, 0x4e, 0xfffffffffffffffb, 0x7, 0x7, 0x3, 0x371, 0x2]}, 0x5c) 19:49:33 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x0, @multicast1=0xe0000001}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}, [], {0x95}}, &(0x7f0000000340)='syzller\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x4, 0xb7, &(0x7f0000000380)=""/183, 0x1}, 0x48) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) write$binfmt_aout(r0, &(0x7f00000004c0), 0x20) dup2(r1, r2) 19:49:33 executing program 7: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000000)="295ee1311f16f4776710") mount(&(0x7f0000000200)='0:file:\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) [ 123.011784] libceph: parse_ips bad ip '::.ile' [ 123.019806] libceph: parse_ips bad ip '::,ile' [ 123.022424] libceph: parse_ips bad ip '0:file' 19:49:34 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") mount(&(0x7f0000000200)='::.ile:\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 19:49:34 executing program 7: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000000)="295ee1311f16f4776710") mount(&(0x7f0000000200)='0:file:\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 19:49:34 executing program 0: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") mount(&(0x7f0000000200)='::,ile:\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 19:49:34 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="025cc83d6d345f8f760070") r1 = syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x0, 0x10001) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000040)) writev(r1, &(0x7f00000004c0)=[{&(0x7f0000000240)}, {&(0x7f0000000440)="c83dc16f52dc81a7def25d1e29da968cb1a1f227a29835846271e844a36175e09ed9b18f2cbea09bf80f89b0215d4f3ddd65e69adc01215911a24b235fe5bc5afcb0034a44ebe09d1c1206d9f7df81101c63581dccde91cc0fdda8bf92c84097397434c23db418e8d332a10afa853741a63240d6", 0x74}], 0x2) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r1, &(0x7f0000000080)={0x1}) 19:49:34 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000200)='0:file:\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x80080, 0x140) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mounts\x00') getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f00000000c0)={0x0, 0x3d, 0x3, [0x80000000, 0x369, 0xff]}, &(0x7f0000000140)=0xe) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000000180)={r1, 0x6, 0x30}, &(0x7f0000000240)=0xc) [ 123.210421] libceph: parse_ips bad ip '::.ile' 19:49:34 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) connect$inet(0xffffffffffffffff, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}, [], {0x95}}, &(0x7f0000000340)='syzller\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x4, 0xb7, &(0x7f0000000380)=""/183, 0x1}, 0x48) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) write$binfmt_aout(r0, &(0x7f00000004c0), 0x20) dup2(r1, r2) [ 123.233879] libceph: parse_ips bad ip '0:file' [ 123.252341] libceph: parse_ips bad ip '::,ile' [ 123.268862] libceph: parse_ips bad ip '0:file' [ 123.297520] libceph: parse_ips bad ip '0:file' 19:49:34 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") mount(&(0x7f0000000200)='::.ile:\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 19:49:34 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") mmap(&(0x7f00004b3000/0x3000)=nil, 0x3000, 0x0, 0x31, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f00000001c0), 0xfffffef3) read(r1, &(0x7f0000000000)=""/250, 0xfffffffffffffcb9) 19:49:34 executing program 7 (fault-call:3 fault-nth:0): mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") mount(&(0x7f0000000200)='0:file:\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 19:49:34 executing program 0: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") mount(&(0x7f0000000200)='::,ile:\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 19:49:34 executing program 3: mkdir(&(0x7f0000000080)='0:file:\x00', 0x3) mount(&(0x7f0000000200)='0:file:\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) r0 = request_key(&(0x7f0000000000)='encrypted\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a, 0x3}, &(0x7f00000000c0)='+\x00', 0x0) keyctl$invalidate(0x15, r0) 19:49:34 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) connect$inet(0xffffffffffffffff, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}, [], {0x95}}, &(0x7f0000000340)='syzller\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x4, 0xb7, &(0x7f0000000380)=""/183, 0x1}, 0x48) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) write$binfmt_aout(r0, &(0x7f00000004c0), 0x20) dup2(r1, r2) 19:49:34 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}, [], {0x95}}, &(0x7f0000000340)='syzller\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x4, 0xb7, &(0x7f0000000380)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) write$binfmt_aout(r0, &(0x7f00000004c0), 0x20) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000280)={0xffffffffffffffff}) recvmmsg(r3, &(0x7f00000002c0), 0x40000f7, 0x0, &(0x7f0000000200)) dup2(r1, r2) 19:49:34 executing program 6: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x800, 0x0) io_setup(0x5b3, &(0x7f0000000040)=0x0) io_submit(r1, 0x1, &(0x7f00000000c0)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000000), 0xfffffffffffffc7a, 0x0, 0x0, 0x1}]) r2 = socket$inet6(0xa, 0x7fc, 0x10001) setsockopt$inet6_MCAST_LEAVE_GROUP(r2, 0x29, 0x2d, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}}, 0x88) [ 124.011536] FAULT_INJECTION: forcing a failure. [ 124.011536] name failslab, interval 1, probability 0, space 0, times 0 [ 124.023108] CPU: 1 PID: 7549 Comm: syz-executor7 Not tainted 4.17.0+ #5 [ 124.029905] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 124.039284] Call Trace: [ 124.041909] dump_stack+0x185/0x1d0 [ 124.045588] should_fail+0x87b/0xab0 [ 124.049327] __should_failslab+0x278/0x2a0 [ 124.053602] should_failslab+0x29/0x70 [ 124.057514] __kmalloc_track_caller+0x1ff/0xc80 [ 124.062210] ? strndup_user+0x134/0x1f0 [ 124.066207] ? fsnotify+0x7df/0x17d0 [ 124.070083] ? strnlen_user+0x44/0x390 [ 124.073985] memdup_user+0x7c/0x200 [ 124.077643] strndup_user+0x134/0x1f0 [ 124.081481] ksys_mount+0xc4/0x3d0 [ 124.085056] ? fput+0x25c/0x2e0 [ 124.088362] __x64_sys_mount+0x157/0x1c0 [ 124.092441] ? ksys_mount+0x3d0/0x3d0 [ 124.096259] do_syscall_64+0x15b/0x230 [ 124.100169] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 124.105372] RIP: 0033:0x4559f9 [ 124.108573] RSP: 002b:00007fb4b3c2ac68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 124.116322] RAX: ffffffffffffffda RBX: 00007fb4b3c2b6d4 RCX: 00000000004559f9 [ 124.123607] RDX: 0000000020000100 RSI: 00000000200001c0 RDI: 0000000020000200 [ 124.130883] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 124.138194] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 124.145471] R13: 00000000004c1cc7 R14: 00000000004ceee8 R15: 0000000000000000 [ 124.157817] libceph: parse_ips bad ip '::,ile' 19:49:35 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) getxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@known='system.posix_acl_access\x00', &(0x7f0000000240)=""/188, 0xbc) mount(&(0x7f0000000200)='0:file:\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) [ 124.164513] libceph: parse_ips bad ip '::.ile' 19:49:35 executing program 6: mkdir(&(0x7f000000dff6)='./control\x00', 0x0) r0 = open(&(0x7f0000028000)='./control\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f0000000140)={0x0, 0x63, "caddcce83932ea31cdfaaf3182ec017da37d7e68ddbfa944864cce7ce9f2f3bc7da3d6826b2afaf0971fda9e94e8c2d48d13bc81a103b587c721e4be7d8f8afd6e42258dfd2dd33d5ac824ec8c7b8408abc177ad3c6a32b130d49494cbfb99842244bf"}, &(0x7f00000000c0)=0x6b) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000200)={r1, 0x3c, &(0x7f00000001c0)=[@in6={0xa, 0x4e20, 0x100000000, @dev={0xfe, 0x80, [], 0x1f}, 0x9}, @in={0x2, 0x4e20, @local={0xac, 0x14, 0x14, 0xaa}}, @in={0x2, 0x4e22, @local={0xac, 0x14, 0x14, 0xaa}}]}, &(0x7f0000000240)=0x10) mkdirat(r0, &(0x7f0000000000)='./control\x00', 0x4) symlink(&(0x7f0000000040)='./control\x00', &(0x7f0000000080)='./file1\x00') bind$ipx(r0, &(0x7f0000000380)={0x4, 0x0, 0x647, "4205ef40fa7f"}, 0x10) mkdirat(r0, &(0x7f0000044ff6)='./control\x00', 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000280)={r1, @in={{0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0xb}}}}, &(0x7f0000000340)=0x84) mkdirat(r0, &(0x7f00008b8ff6)='./file0\x00', 0x0) renameat2(r0, &(0x7f0000036ff6)='./file0\x00', r0, &(0x7f0000000100)='./control\x00', 0x1) 19:49:35 executing program 0: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) socket$inet6(0xa, 0x1, 0x0) mount(&(0x7f0000000200)='::,ile:\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 19:49:35 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}, [], {0x95}}, &(0x7f0000000340)='syzller\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x4, 0xb7, &(0x7f0000000380)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) write$binfmt_aout(r0, &(0x7f00000004c0), 0x20) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000280)={0xffffffffffffffff}) recvmmsg(r3, &(0x7f00000002c0), 0x40000f7, 0x0, &(0x7f0000000200)) dup2(r1, r2) [ 124.260983] libceph: parse_ips bad ip '0:file' 19:49:35 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") mount(&(0x7f0000000200)='::.ile:\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 19:49:35 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) connect$inet(0xffffffffffffffff, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}, [], {0x95}}, &(0x7f0000000340)='syzller\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x4, 0xb7, &(0x7f0000000380)=""/183, 0x1}, 0x48) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) write$binfmt_aout(r0, &(0x7f00000004c0), 0x20) dup2(r1, r2) [ 124.317960] libceph: parse_ips bad ip '0:file' [ 124.346200] libceph: parse_ips bad ip '::,ile' [ 124.388436] libceph: parse_ips bad ip '::.ile' 19:49:35 executing program 0: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) socket$inet6(0xa, 0x1, 0x0) mount(&(0x7f0000000200)='::,ile:\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 19:49:35 executing program 7 (fault-call:3 fault-nth:1): mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") mount(&(0x7f0000000200)='0:file:\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 19:49:35 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000200)='0:file:\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) syz_open_dev$sndpcmc(&(0x7f00000002c0)='/dev/snd/pcmC#D#c\x00', 0x10000, 0x4000) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000440)='/dev/sequencer2\x00', 0x400000, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000540)='/dev/snapshot\x00', 0x2, 0x0) r1 = accept$ipx(r0, &(0x7f0000000400), &(0x7f0000000380)=0x2676d1ca) fallocate(r1, 0x58, 0x83a2, 0x4) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x202, 0x0) r3 = syz_open_dev$adsp(&(0x7f0000000140)='/dev/adsp#\x00', 0x4, 0x4000) ioctl$TUNSETFILTEREBPF(r2, 0x800454e1, &(0x7f0000000180)=r3) 19:49:35 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) socket$inet6(0xa, 0x1, 0x0) mount(&(0x7f0000000200)='::.ile:\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 19:49:35 executing program 6: r0 = epoll_create(0x4) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, 0xffffffffffffffff, &(0x7f0000000000)={0xfffffffffffffffc}) epoll_wait(r0, &(0x7f0000000100)=[{}], 0x1, 0x0) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000003580)={&(0x7f0000000040)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000003480)=[{&(0x7f0000000140)=""/4096, 0x1000}, {&(0x7f0000001140)=""/230, 0xe6}, {&(0x7f0000001240)=""/4096, 0x1000}, {&(0x7f0000002240)=""/118, 0x76}, {&(0x7f00000000c0)=""/47, 0x2f}, {&(0x7f00000022c0)=""/21, 0x15}, {&(0x7f0000002300)=""/4096, 0x1000}, {&(0x7f0000003300)=""/166, 0xa6}, {&(0x7f00000033c0)=""/97, 0x61}, {&(0x7f0000003440)=""/12, 0xc}], 0xa, &(0x7f0000003540)=""/27, 0x1b, 0x8000}, 0x0) setsockopt$sock_linger(r1, 0x1, 0xd, &(0x7f00000035c0)={0x0, 0x10000}, 0x8) 19:49:35 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}, [], {0x95}}, &(0x7f0000000340)='syzller\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x4, 0xb7, &(0x7f0000000380)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) write$binfmt_aout(r0, &(0x7f00000004c0), 0x20) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000280)={0xffffffffffffffff}) recvmmsg(r3, &(0x7f00000002c0), 0x40000f7, 0x0, &(0x7f0000000200)) dup2(r1, r2) 19:49:35 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x1, &(0x7f0000000080)="295ee1311f16f4772f34cdde77112397762ce775b46a671070") r1 = socket(0x800000001e, 0x4, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x0, 0xfffffffffffffff7}, 0x124) sendmsg$xdp(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000011c0)="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", 0xe4d}], 0x1, 0x0, 0x0, 0x20000000}, 0x0) 19:49:35 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}, [], {0x95}}, &(0x7f0000000340)='syzller\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x4, 0xb7, &(0x7f0000000380)=""/183, 0x1}, 0x48) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) write$binfmt_aout(r0, &(0x7f00000004c0), 0x20) dup2(r1, r2) [ 124.985414] libceph: parse_ips bad ip '::.ile' [ 125.000221] libceph: parse_ips bad ip '::,ile' [ 125.005357] libceph: parse_ips bad ip '0:file' [ 125.027006] libceph: parse_ips bad ip '0:file' 19:49:36 executing program 0: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) socket$inet6(0xa, 0x1, 0x0) mount(&(0x7f0000000200)='::,ile:\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 19:49:36 executing program 6: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) socket$inet6(0xa, 0x1, 0x0) mount(&(0x7f0000000200)='::,ile:\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 19:49:36 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}, [], {0x95}}, &(0x7f0000000340)='syzller\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x4, 0xb7, &(0x7f0000000380)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) write$binfmt_aout(r0, &(0x7f00000004c0), 0x20) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000280)={0xffffffffffffffff}) recvmmsg(r3, &(0x7f00000002c0), 0x40000f7, 0x0, &(0x7f0000000200)) dup2(r1, r2) 19:49:36 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) socket$inet6(0xa, 0x1, 0x0) mount(&(0x7f0000000200)='::.ile:\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 19:49:36 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x10000, 0x0) getsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffff9c, 0x84, 0x10, &(0x7f0000000040)=@sack_info={0x0, 0x5, 0x1f}, &(0x7f00000000c0)=0xc) setsockopt$inet_sctp6_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f0000000100)={r1, 0xffffffffffffffc1, 0x2, 0x7}, 0x10) 19:49:36 executing program 4: r0 = socket$can_raw(0x1d, 0x3, 0x1) sendmsg$can_raw(r0, &(0x7f0000000180)={&(0x7f0000000000)={0x1d}, 0x10, &(0x7f0000000140)={&(0x7f0000000040)=@canfd={{}, 0x0, 0x0, 0x0, 0x0, "46996a476fd88e3019816e67baac4f170748c26c829b1aebb49b62c55c90c73b200ce5c230ab25ff4422fb4cf9f3e025d661b62ecc54fd94f5819c72bec51b22"}, 0x48}, 0x1, 0x0, 0x0, 0x3}, 0xfffffffffffffffe) [ 125.184002] libceph: parse_ips bad ip '::,ile' [ 125.206762] FAULT_INJECTION: forcing a failure. [ 125.206762] name failslab, interval 1, probability 0, space 0, times 0 [ 125.208059] libceph: parse_ips bad ip '::,ile' [ 125.218225] CPU: 0 PID: 7595 Comm: syz-executor7 Not tainted 4.17.0+ #5 [ 125.229665] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 125.239055] Call Trace: [ 125.241706] dump_stack+0x185/0x1d0 [ 125.245417] should_fail+0x87b/0xab0 [ 125.249199] __should_failslab+0x278/0x2a0 19:49:36 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}, [], {0x95}}, &(0x7f0000000340)='syzller\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x4, 0xb7, &(0x7f0000000380)=""/183, 0x1}, 0x48) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) write$binfmt_aout(r0, &(0x7f00000004c0), 0x20) dup2(r1, r2) [ 125.254215] should_failslab+0x29/0x70 [ 125.258185] __kmalloc_track_caller+0x1ff/0xc80 [ 125.262935] ? strndup_user+0x134/0x1f0 [ 125.267084] ? kmsan_set_origin+0x9e/0x160 [ 125.271408] ? kmsan_internal_unpoison_shadow+0x83/0xe0 [ 125.276839] ? strnlen_user+0x44/0x390 [ 125.280786] memdup_user+0x7c/0x200 [ 125.284485] strndup_user+0x134/0x1f0 [ 125.288354] ksys_mount+0x193/0x3d0 [ 125.292057] ? fput+0x25c/0x2e0 [ 125.295434] __x64_sys_mount+0x157/0x1c0 [ 125.299580] ? ksys_mount+0x3d0/0x3d0 [ 125.303430] do_syscall_64+0x15b/0x230 [ 125.307391] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 125.312622] RIP: 0033:0x4559f9 [ 125.315855] RSP: 002b:00007fb4b3c2ac68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 125.324208] RAX: ffffffffffffffda RBX: 00007fb4b3c2b6d4 RCX: 00000000004559f9 [ 125.331495] RDX: 0000000020000100 RSI: 00000000200001c0 RDI: 0000000020000200 [ 125.339621] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 125.346901] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 125.354173] R13: 00000000004c1cc7 R14: 00000000004ceee8 R15: 0000000000000001 19:49:36 executing program 0: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) ioctl(0xffffffffffffffff, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") mount(&(0x7f0000000200)='::,ile:\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) [ 125.397963] libceph: parse_ips bad ip '::.ile' 19:49:36 executing program 6: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) socket$inet6(0xa, 0x1, 0x0) mount(&(0x7f0000000200)='::,ile:\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) [ 125.466003] libceph: parse_ips bad ip '::,ile' [ 125.540333] libceph: parse_ips bad ip '::,ile' 19:49:36 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}, [], {0x95}}, &(0x7f0000000340)='syzller\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x4, 0xb7, &(0x7f0000000380)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) write$binfmt_aout(r0, &(0x7f00000004c0), 0x20) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000280)={0xffffffffffffffff}) recvmmsg(r3, &(0x7f00000002c0), 0x40000f7, 0x0, &(0x7f0000000200)) dup2(r1, r2) 19:49:36 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000200)='0:file:\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 19:49:36 executing program 0: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) ioctl(0xffffffffffffffff, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") mount(&(0x7f0000000200)='::,ile:\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 19:49:36 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) socket$inet6(0xa, 0x1, 0x0) mount(&(0x7f0000000200)='::,ile:\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 19:49:36 executing program 7 (fault-call:3 fault-nth:2): mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") mount(&(0x7f0000000200)='0:file:\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 19:49:36 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}, [], {0x95}}, &(0x7f0000000340)='syzller\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x4, 0xb7, &(0x7f0000000380)=""/183, 0x1}, 0x48) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) write$binfmt_aout(r0, &(0x7f00000004c0), 0x20) dup2(r1, r2) 19:49:36 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) socket$inet6(0xa, 0x1, 0x0) mount(&(0x7f0000000200)='::.ile:\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 19:49:36 executing program 6: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) socket$inet6(0xa, 0x1, 0x0) mount(&(0x7f0000000200)='::,ile:\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) [ 125.705963] libceph: parse_ips bad ip '0:file' [ 125.718427] libceph: parse_ips bad ip '::,ile' [ 125.726260] libceph: parse_ips bad ip '::,ile' [ 125.726463] libceph: parse_ips bad ip '::.ile' [ 125.751846] libceph: parse_ips bad ip '::,ile' [ 125.762399] libceph: parse_ips bad ip '0:file' [ 125.769750] FAULT_INJECTION: forcing a failure. [ 125.769750] name failslab, interval 1, probability 0, space 0, times 0 [ 125.781386] CPU: 1 PID: 7651 Comm: syz-executor7 Not tainted 4.17.0+ #5 [ 125.788269] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 125.797653] Call Trace: [ 125.800274] dump_stack+0x185/0x1d0 [ 125.803995] should_fail+0x87b/0xab0 [ 125.807747] __should_failslab+0x278/0x2a0 [ 125.812021] should_failslab+0x29/0x70 [ 125.815932] kmem_cache_alloc+0x129/0xb70 [ 125.820088] ? kmsan_set_origin_inline+0x6b/0x120 [ 125.824941] ? getname_flags+0x12a/0xaa0 [ 125.829024] ? __kmalloc_track_caller+0x98f/0xc80 [ 125.833887] getname_flags+0x12a/0xaa0 [ 125.837816] user_path_at_empty+0xbb/0x140 [ 125.842080] do_mount+0x2a4/0x4ed0 [ 125.845639] ? copy_mount_options+0x41/0x540 [ 125.850070] ? ksys_mount+0x251/0x3d0 [ 125.853909] ksys_mount+0x32e/0x3d0 [ 125.857564] __x64_sys_mount+0x157/0x1c0 [ 125.861649] ? ksys_mount+0x3d0/0x3d0 [ 125.865474] do_syscall_64+0x15b/0x230 [ 125.869376] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 125.874569] RIP: 0033:0x4559f9 [ 125.877769] RSP: 002b:00007fb4b3c2ac68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 125.885666] RAX: ffffffffffffffda RBX: 00007fb4b3c2b6d4 RCX: 00000000004559f9 [ 125.892954] RDX: 0000000020000100 RSI: 00000000200001c0 RDI: 0000000020000200 19:49:36 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) socket$inet6(0xa, 0x1, 0x0) mount(&(0x7f0000000200)='::,ile:\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) [ 125.900243] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 125.907512] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 125.914786] R13: 00000000004c1cc7 R14: 00000000004ceee8 R15: 0000000000000002 19:49:36 executing program 0: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) ioctl(0xffffffffffffffff, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") mount(&(0x7f0000000200)='::,ile:\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 19:49:36 executing program 6: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000200)='::,ile:\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 19:49:36 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='0:file:\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 19:49:37 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) ioctl(0xffffffffffffffff, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") mount(&(0x7f0000000200)='::.ile:\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) [ 126.037465] libceph: parse_ips bad ip '::,ile' [ 126.038625] libceph: parse_ips bad ip '::,ile' [ 126.060866] libceph: parse_ips bad ip '0:file' [ 126.088260] libceph: parse_ips bad ip '::,ile' 19:49:37 executing program 7 (fault-call:3 fault-nth:3): mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") mount(&(0x7f0000000200)='0:file:\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) [ 126.117921] libceph: parse_ips bad ip '::.ile' 19:49:37 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") mount(&(0x7f0000000200)='::,ile:\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 19:49:37 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) socket$inet6(0xa, 0x1, 0x0) mount(&(0x7f0000000200)='::,ile:\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) [ 126.290728] libceph: parse_ips bad ip '::,ile' [ 126.383569] FAULT_INJECTION: forcing a failure. [ 126.383569] name failslab, interval 1, probability 0, space 0, times 0 [ 126.394988] CPU: 0 PID: 7673 Comm: syz-executor7 Not tainted 4.17.0+ #5 [ 126.401962] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 126.411355] Call Trace: [ 126.414031] dump_stack+0x185/0x1d0 [ 126.417723] should_fail+0x87b/0xab0 [ 126.421520] __should_failslab+0x278/0x2a0 [ 126.425831] should_failslab+0x29/0x70 [ 126.429874] kmem_cache_alloc+0x129/0xb70 [ 126.434070] ? alloc_vfsmnt+0x7b/0xcf0 [ 126.438010] ? get_fs_type+0x348/0x9c0 [ 126.442088] alloc_vfsmnt+0x7b/0xcf0 [ 126.445836] ? try_module_get+0x61/0x3d0 [ 126.449918] ? get_fs_type+0x348/0x9c0 [ 126.453930] vfs_kern_mount+0xaf/0x990 [ 126.457900] do_mount+0xca5/0x4ed0 [ 126.461466] ? copy_mount_options+0x41/0x540 [ 126.466015] ? ksys_mount+0x251/0x3d0 [ 126.469955] ksys_mount+0x32e/0x3d0 [ 126.473611] __x64_sys_mount+0x157/0x1c0 [ 126.477684] ? ksys_mount+0x3d0/0x3d0 [ 126.481492] do_syscall_64+0x15b/0x230 [ 126.485398] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 126.490600] RIP: 0033:0x4559f9 [ 126.493788] RSP: 002b:00007fb4b3c2ac68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 126.501599] RAX: ffffffffffffffda RBX: 00007fb4b3c2b6d4 RCX: 00000000004559f9 [ 126.508887] RDX: 0000000020000100 RSI: 00000000200001c0 RDI: 0000000020000200 [ 126.516166] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 126.523454] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 19:49:37 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x3, &(0x7f00009ff000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}, [], {0x95}}, &(0x7f0000000340)='syzller\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x4, 0xb7, &(0x7f0000000380)=""/183, 0x1}, 0x48) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) write$binfmt_aout(r0, &(0x7f00000004c0), 0x20) dup2(r1, r2) 19:49:37 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000200)='0:file:\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) set_robust_list(&(0x7f0000000180)={&(0x7f0000000040)={&(0x7f0000000240)}, 0x0, &(0x7f0000000140)={&(0x7f0000000280)}}, 0x18) 19:49:37 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") mount(&(0x7f0000000200)='::,ile:\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 19:49:37 executing program 6: mount(&(0x7f0000000200)='::,ile:\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 19:49:37 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) ioctl(0xffffffffffffffff, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") mount(&(0x7f0000000200)='::.ile:\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 19:49:37 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}, [], {0x95}}, &(0x7f0000000340)='syzller\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x4, 0xb7, &(0x7f0000000380)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) write$binfmt_aout(r0, &(0x7f00000004c0), 0x20) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000280)={0xffffffffffffffff}) recvmmsg(r3, &(0x7f00000002c0), 0x40000f7, 0x0, &(0x7f0000000200)) dup2(r1, r2) 19:49:37 executing program 7 (fault-call:3 fault-nth:4): mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") mount(&(0x7f0000000200)='0:file:\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 19:49:37 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000200)='::,ile:\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) [ 126.531707] R13: 00000000004c1cc7 R14: 00000000004ceee8 R15: 0000000000000003 [ 126.594329] libceph: parse_ips bad ip '0:file' [ 126.599840] libceph: parse_ips bad ip '::,ile' [ 126.605521] libceph: parse_ips bad ip '::.ile' [ 126.622013] libceph: parse_ips bad ip '0:file' [ 126.673451] FAULT_INJECTION: forcing a failure. [ 126.673451] name failslab, interval 1, probability 0, space 0, times 0 [ 126.686890] CPU: 0 PID: 7700 Comm: syz-executor7 Not tainted 4.17.0+ #5 [ 126.693692] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 126.703087] Call Trace: [ 126.705738] dump_stack+0x185/0x1d0 [ 126.709449] should_fail+0x87b/0xab0 [ 126.713224] __should_failslab+0x278/0x2a0 [ 126.717558] should_failslab+0x29/0x70 19:49:37 executing program 6: mount(&(0x7f0000000200)='::,ile:\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) [ 126.721523] __kmalloc_track_caller+0x1ff/0xc80 [ 126.726267] ? alloc_vfsmnt+0x30d/0xcf0 [ 126.730294] ? ida_get_new_above+0xc39/0x1000 [ 126.734880] kstrdup_const+0x154/0x270 [ 126.738850] alloc_vfsmnt+0x30d/0xcf0 [ 126.742719] vfs_kern_mount+0xaf/0x990 [ 126.746701] do_mount+0xca5/0x4ed0 [ 126.750326] ? copy_mount_options+0x41/0x540 [ 126.754803] ? ksys_mount+0x251/0x3d0 [ 126.758783] ksys_mount+0x32e/0x3d0 [ 126.762508] __x64_sys_mount+0x157/0x1c0 [ 126.766636] ? ksys_mount+0x3d0/0x3d0 19:49:37 executing program 2: bind$inet(0xffffffffffffffff, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) connect$inet(0xffffffffffffffff, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}, [], {0x95}}, &(0x7f0000000340)='syzller\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x4, 0xb7, &(0x7f0000000380)=""/183}, 0x48) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f000031aff8)={0xffffffffffffffff, r0}) write$binfmt_aout(0xffffffffffffffff, &(0x7f00000004c0), 0x20) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000280)={0xffffffffffffffff}) recvmmsg(r2, &(0x7f00000002c0), 0x40000f7, 0x0, &(0x7f0000000200)) dup2(r0, r1) 19:49:37 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18}, [], {0x95}}, &(0x7f0000000340)='syzller\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x4, 0xb7, &(0x7f0000000380)=""/183, 0x1}, 0x48) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) write$binfmt_aout(r0, &(0x7f00000004c0), 0x20) dup2(r1, r2) [ 126.770482] do_syscall_64+0x15b/0x230 [ 126.774432] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 126.780177] RIP: 0033:0x4559f9 [ 126.783392] RSP: 002b:00007fb4b3c2ac68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 126.791157] RAX: ffffffffffffffda RBX: 00007fb4b3c2b6d4 RCX: 00000000004559f9 [ 126.798471] RDX: 0000000020000100 RSI: 00000000200001c0 RDI: 0000000020000200 [ 126.805774] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 126.813169] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 19:49:37 executing program 3: mkdir(&(0x7f0000000080)='0:file:\x00', 0x0) r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0xfffffffffffffeff, 0x40000) socket$inet6(0xa, 0x1, 0x4) connect$pptp(r0, &(0x7f0000000040)={0x18, 0x2, {0x3, @loopback=0x7f000001}}, 0x1e) r1 = semget$private(0x0, 0x1, 0x0) getsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f0000000140), &(0x7f0000000180)=0x4) ioctl$TIOCMGET(r0, 0x5415, &(0x7f0000001300)) ioctl$TIOCGETD(r0, 0x5424, &(0x7f00000000c0)) semctl$GETPID(r1, 0x3, 0xb, &(0x7f0000000240)=""/4096) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000001240)="4c75a99715ba29799d0a23ea7e6f3a444565f9c268ac4e2425dc581dc781b4fe2086012b7599e8daa15e0350ccebd126dfed0d4e8e08642e7d55a95082b3daedd5f776057b2d2dfd14fb1d2e0545150b13f94b80692f96e1f6c60c3fe23bcf0214b264043ecafd2ab5e39e7559606d01dc1fe755f9864ad7d1c1d98c3bc4f2d7db7df2bba8", 0x85) mount(&(0x7f0000000200)='0:file:\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 19:49:37 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") mount(&(0x7f0000000200)='::,ile:\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) [ 126.820507] R13: 00000000004c1cc7 R14: 00000000004ceee8 R15: 0000000000000004 19:49:37 executing program 4: mount(&(0x7f0000000200)='::,ile:\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 19:49:37 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) ioctl(0xffffffffffffffff, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") mount(&(0x7f0000000200)='::.ile:\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 19:49:38 executing program 0: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r0 = socket$inet6(0xa, 0x0, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") mount(&(0x7f0000000200)='::,ile:\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 19:49:38 executing program 6: mount(&(0x7f0000000200)='::,ile:\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) [ 127.023188] libceph: parse_ips bad ip '::.ile' 19:49:38 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18}, [], {0x95}}, &(0x7f0000000340)='syzller\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0, 0xb7, &(0x7f0000000380)=""/183, 0x1}, 0x48) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) write$binfmt_aout(r0, &(0x7f00000004c0), 0x20) dup2(r1, r2) 19:49:38 executing program 6: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18}, [], {0x95}}, &(0x7f0000000340)='syzller\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x4, 0xb7, &(0x7f0000000380)=""/183, 0x1}, 0x48) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) write$binfmt_aout(r0, &(0x7f00000004c0), 0x20) dup2(r1, r2) 19:49:38 executing program 4: mount(&(0x7f0000000200)='::,ile:\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 19:49:38 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") mount(&(0x7f0000000200)='::.ile:\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) [ 127.191430] libceph: parse_ips bad ip '::,ile' 19:49:38 executing program 7 (fault-call:3 fault-nth:5): mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") mount(&(0x7f0000000200)='0:file:\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 19:49:38 executing program 0: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r0 = socket$inet6(0xa, 0x0, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") mount(&(0x7f0000000200)='::,ile:\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) [ 127.401395] FAULT_INJECTION: forcing a failure. [ 127.401395] name failslab, interval 1, probability 0, space 0, times 0 [ 127.412852] CPU: 0 PID: 7755 Comm: syz-executor7 Not tainted 4.17.0+ #5 [ 127.419817] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 127.429312] Call Trace: [ 127.431972] dump_stack+0x185/0x1d0 [ 127.435679] should_fail+0x87b/0xab0 [ 127.439468] __should_failslab+0x278/0x2a0 [ 127.443795] should_failslab+0x29/0x70 [ 127.447769] __kmalloc+0xbe/0x350 [ 127.451279] ? ceph_mount+0x94/0x30a0 [ 127.455139] ? ceph_mount+0x121/0x30a0 [ 127.459106] ? ceph_mount+0x99/0x30a0 [ 127.462974] ceph_mount+0x121/0x30a0 [ 127.466875] ? kmsan_set_origin+0x9e/0x160 [ 127.471188] ? f2fs_init_acl+0x1530/0x1530 [ 127.475490] mount_fs+0x29b/0x780 [ 127.479015] vfs_kern_mount+0x222/0x990 [ 127.483091] do_mount+0xca5/0x4ed0 [ 127.486706] ? copy_mount_options+0x41/0x540 [ 127.491182] ? ksys_mount+0x251/0x3d0 [ 127.495072] ksys_mount+0x32e/0x3d0 [ 127.498784] __x64_sys_mount+0x157/0x1c0 [ 127.502995] ? ksys_mount+0x3d0/0x3d0 [ 127.506844] do_syscall_64+0x15b/0x230 [ 127.510794] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 127.516024] RIP: 0033:0x4559f9 [ 127.519247] RSP: 002b:00007fb4b3c2ac68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 127.527011] RAX: ffffffffffffffda RBX: 00007fb4b3c2b6d4 RCX: 00000000004559f9 [ 127.534323] RDX: 0000000020000100 RSI: 00000000200001c0 RDI: 0000000020000200 [ 127.541633] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 127.548941] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 127.556268] R13: 00000000004c1cc7 R14: 00000000004ceee8 R15: 0000000000000005 [ 127.588853] libceph: parse_ips bad ip '::,ile' 19:49:38 executing program 2: bind$inet(0xffffffffffffffff, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) connect$inet(0xffffffffffffffff, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}, [], {0x95}}, &(0x7f0000000340)='syzller\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x4, 0xb7, &(0x7f0000000380)=""/183}, 0x48) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f000031aff8)={0xffffffffffffffff, r0}) write$binfmt_aout(0xffffffffffffffff, &(0x7f00000004c0), 0x20) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000280)={0xffffffffffffffff}) recvmmsg(r2, &(0x7f00000002c0), 0x40000f7, 0x0, &(0x7f0000000200)) dup2(r0, r1) 19:49:38 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={0xffffffffffffff9c, 0x2, 0x1, 0x48ae, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x8}, 0x20) connect$unix(r0, &(0x7f0000000140)=@file={0x1, '0:file:\x00'}, 0x6e) mount(&(0x7f0000000200)='0:file:\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) mkdirat$cgroup(r0, &(0x7f00000000c0)='syz0\x00', 0x1ff) 19:49:38 executing program 4: mount(&(0x7f0000000200)='::,ile:\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 19:49:38 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18}, [], {0x95}}, &(0x7f0000000340)='syzller\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x4, 0xb7, &(0x7f0000000380)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) write$binfmt_aout(r0, &(0x7f00000004c0), 0x20) dup2(r1, r2) 19:49:38 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") mount(&(0x7f0000000200)='::.ile:\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 19:49:38 executing program 7 (fault-call:3 fault-nth:6): mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") mount(&(0x7f0000000200)='0:file:\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 19:49:38 executing program 6: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18}, [], {0x95}}, &(0x7f0000000340)='syzller\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x4, 0xb7, &(0x7f0000000380)=""/183, 0x1}, 0x48) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) write$binfmt_aout(r0, &(0x7f00000004c0), 0x20) dup2(r1, r2) 19:49:38 executing program 0: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r0 = socket$inet6(0xa, 0x0, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") mount(&(0x7f0000000200)='::,ile:\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) [ 127.835302] libceph: parse_ips bad ip '0:file' [ 127.843017] FAULT_INJECTION: forcing a failure. [ 127.843017] name failslab, interval 1, probability 0, space 0, times 0 [ 127.854492] CPU: 0 PID: 7776 Comm: syz-executor7 Not tainted 4.17.0+ #5 [ 127.861403] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 127.870800] Call Trace: [ 127.873463] dump_stack+0x185/0x1d0 [ 127.877162] should_fail+0x87b/0xab0 [ 127.880961] __should_failslab+0x278/0x2a0 [ 127.885287] should_failslab+0x29/0x70 [ 127.889250] __kmalloc_track_caller+0x1ff/0xc80 [ 127.894161] ? kmsan_set_origin+0x9e/0x160 [ 127.898463] ? ceph_mount+0x271/0x30a0 [ 127.902424] ? kmsan_internal_unpoison_shadow+0x83/0xe0 [ 127.907858] kstrdup+0xd0/0x1a0 [ 127.911240] libceph: parse_ips bad ip '::,ile' [ 127.911288] ceph_mount+0x271/0x30a0 [ 127.911361] ? kmsan_set_origin+0x9e/0x160 [ 127.923876] ? f2fs_init_acl+0x1530/0x1530 [ 127.928142] mount_fs+0x29b/0x780 [ 127.931632] vfs_kern_mount+0x222/0x990 [ 127.935657] do_mount+0xca5/0x4ed0 [ 127.939228] ? copy_mount_options+0x41/0x540 [ 127.943655] ? ksys_mount+0x251/0x3d0 [ 127.947505] ksys_mount+0x32e/0x3d0 [ 127.951175] __x64_sys_mount+0x157/0x1c0 [ 127.955252] ? ksys_mount+0x3d0/0x3d0 [ 127.959065] do_syscall_64+0x15b/0x230 [ 127.964361] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 127.969557] RIP: 0033:0x4559f9 [ 127.972746] RSP: 002b:00007fb4b3c2ac68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 19:49:39 executing program 4 (fault-call:1 fault-nth:0): mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000200)='::,ile:\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) [ 127.980468] RAX: ffffffffffffffda RBX: 00007fb4b3c2b6d4 RCX: 00000000004559f9 [ 127.987741] RDX: 0000000020000100 RSI: 00000000200001c0 RDI: 0000000020000200 [ 127.995019] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 128.002296] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 128.009572] R13: 00000000004c1cc7 R14: 00000000004ceee8 R15: 0000000000000006 [ 128.043728] libceph: parse_ips bad ip '0:file' 19:49:39 executing program 0: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(0xffffffffffffffff, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") mount(&(0x7f0000000200)='::,ile:\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) [ 128.097883] FAULT_INJECTION: forcing a failure. [ 128.097883] name failslab, interval 1, probability 0, space 0, times 0 [ 128.109456] CPU: 0 PID: 7786 Comm: syz-executor4 Not tainted 4.17.0+ #5 [ 128.116244] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 128.125630] Call Trace: [ 128.128264] dump_stack+0x185/0x1d0 [ 128.131944] should_fail+0x87b/0xab0 [ 128.135710] __should_failslab+0x278/0x2a0 [ 128.139984] should_failslab+0x29/0x70 [ 128.143892] __kmalloc_track_caller+0x1ff/0xc80 [ 128.148585] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 128.153990] ? strndup_user+0x134/0x1f0 [ 128.157999] ? finish_lock_switch+0x25/0x50 [ 128.162356] ? strnlen_user+0x44/0x390 [ 128.166296] memdup_user+0x7c/0x200 [ 128.169972] strndup_user+0x134/0x1f0 [ 128.173806] ksys_mount+0xc4/0x3d0 [ 128.177379] ? fput+0x25c/0x2e0 [ 128.180688] __x64_sys_mount+0x157/0x1c0 [ 128.184780] ? ksys_mount+0x3d0/0x3d0 [ 128.188596] do_syscall_64+0x15b/0x230 [ 128.192530] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 128.197727] RIP: 0033:0x4559f9 [ 128.200915] RSP: 002b:00007fca3e8fdc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 128.208652] RAX: ffffffffffffffda RBX: 00007fca3e8fe6d4 RCX: 00000000004559f9 [ 128.215931] RDX: 0000000020000100 RSI: 00000000200001c0 RDI: 0000000020000200 [ 128.223215] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 128.230493] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000013 [ 128.237773] R13: 00000000004c1cc7 R14: 00000000004ceee8 R15: 0000000000000000 [ 128.277954] libceph: parse_ips bad ip '::,ile' 19:49:39 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") mount(&(0x7f0000000200)='::.ile:\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 19:49:39 executing program 2: bind$inet(0xffffffffffffffff, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) connect$inet(0xffffffffffffffff, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}, [], {0x95}}, &(0x7f0000000340)='syzller\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x4, 0xb7, &(0x7f0000000380)=""/183}, 0x48) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f000031aff8)={0xffffffffffffffff, r0}) write$binfmt_aout(0xffffffffffffffff, &(0x7f00000004c0), 0x20) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000280)={0xffffffffffffffff}) recvmmsg(r2, &(0x7f00000002c0), 0x40000f7, 0x0, &(0x7f0000000200)) dup2(r0, r1) 19:49:39 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x4000000004002) r1 = dup2(r0, r0) ioctl$LOOP_SET_STATUS(r1, 0x127f, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "4134e475824fbfaeefb278580e4aedd886c0b629cd32c56ebff94329c3a32a4b8c171676b94083085709923fd77ead8ca0073183b09c62b90673944ded2f276e", "49710f29a576931228cd8c92a1b9375555874f087c556b616155647a2732f399"}) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000200)='0:file:\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 19:49:39 executing program 0: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(0xffffffffffffffff, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") mount(&(0x7f0000000200)='::,ile:\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 19:49:39 executing program 7 (fault-call:3 fault-nth:7): mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") mount(&(0x7f0000000200)='0:file:\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 19:49:39 executing program 6 (fault-call:1 fault-nth:0): mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000200)='::,ile:\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 19:49:39 executing program 4 (fault-call:1 fault-nth:1): mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000200)='::,ile:\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 19:49:39 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18}, [], {0x95}}, &(0x7f0000000340)='syzller\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x4, 0xb7, &(0x7f0000000380)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) write$binfmt_aout(r0, &(0x7f00000004c0), 0x20) dup2(r1, r2) [ 128.815498] libceph: parse_ips bad ip '0:file' [ 128.825224] libceph: parse_ips bad ip '::,ile' [ 128.825269] FAULT_INJECTION: forcing a failure. [ 128.825269] name failslab, interval 1, probability 0, space 0, times 0 [ 128.841570] CPU: 1 PID: 7812 Comm: syz-executor6 Not tainted 4.17.0+ #5 [ 128.848362] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 128.857750] Call Trace: [ 128.860379] dump_stack+0x185/0x1d0 [ 128.864067] should_fail+0x87b/0xab0 [ 128.867878] __should_failslab+0x278/0x2a0 [ 128.872151] should_failslab+0x29/0x70 [ 128.876080] __kmalloc_track_caller+0x1ff/0xc80 [ 128.880793] ? strndup_user+0x134/0x1f0 [ 128.884826] ? fsnotify+0x7df/0x17d0 [ 128.888567] ? strnlen_user+0x44/0x390 [ 128.892479] memdup_user+0x7c/0x200 [ 128.896138] strndup_user+0x134/0x1f0 [ 128.899973] ksys_mount+0xc4/0x3d0 [ 128.903552] ? fput+0x25c/0x2e0 [ 128.906860] __x64_sys_mount+0x157/0x1c0 [ 128.910937] ? ksys_mount+0x3d0/0x3d0 [ 128.914748] do_syscall_64+0x15b/0x230 [ 128.918661] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 128.923861] RIP: 0033:0x4559f9 [ 128.927060] RSP: 002b:00007f5646584c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 128.934796] RAX: ffffffffffffffda RBX: 00007f56465856d4 RCX: 00000000004559f9 [ 128.942076] RDX: 0000000020000100 RSI: 00000000200001c0 RDI: 0000000020000200 [ 128.949365] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 128.956654] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000013 [ 128.963961] R13: 00000000004c1cc7 R14: 00000000004ceee8 R15: 0000000000000000 [ 128.980262] FAULT_INJECTION: forcing a failure. [ 128.980262] name failslab, interval 1, probability 0, space 0, times 0 [ 128.987094] libceph: parse_ips bad ip '0:file' [ 128.992471] CPU: 0 PID: 7811 Comm: syz-executor4 Not tainted 4.17.0+ #5 [ 129.003037] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 129.012429] Call Trace: [ 129.015075] dump_stack+0x185/0x1d0 [ 129.018749] should_fail+0x87b/0xab0 [ 129.022483] __should_failslab+0x278/0x2a0 [ 129.026740] should_failslab+0x29/0x70 [ 129.030924] __kmalloc_track_caller+0x1ff/0xc80 [ 129.035653] ? strndup_user+0x134/0x1f0 [ 129.039662] ? kmsan_set_origin+0x9e/0x160 [ 129.043939] ? kmsan_internal_unpoison_shadow+0x83/0xe0 [ 129.049340] ? strnlen_user+0x44/0x390 [ 129.053252] memdup_user+0x7c/0x200 [ 129.056926] strndup_user+0x134/0x1f0 [ 129.060767] ksys_mount+0x193/0x3d0 [ 129.064449] ? fput+0x25c/0x2e0 [ 129.067764] __x64_sys_mount+0x157/0x1c0 [ 129.071863] ? ksys_mount+0x3d0/0x3d0 [ 129.075688] do_syscall_64+0x15b/0x230 [ 129.079617] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 129.084814] RIP: 0033:0x4559f9 [ 129.088031] RSP: 002b:00007fca3e8fdc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 129.095762] RAX: ffffffffffffffda RBX: 00007fca3e8fe6d4 RCX: 00000000004559f9 [ 129.103058] RDX: 0000000020000100 RSI: 00000000200001c0 RDI: 0000000020000200 [ 129.110339] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 129.117616] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000013 [ 129.124900] R13: 00000000004c1cc7 R14: 00000000004ceee8 R15: 0000000000000001 [ 129.141226] FAULT_INJECTION: forcing a failure. [ 129.141226] name failslab, interval 1, probability 0, space 0, times 0 [ 129.152648] CPU: 1 PID: 7809 Comm: syz-executor7 Not tainted 4.17.0+ #5 19:49:40 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r0 = socket$inet6(0xa, 0x0, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") mount(&(0x7f0000000200)='::.ile:\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) [ 129.159486] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 129.168879] Call Trace: [ 129.171538] dump_stack+0x185/0x1d0 [ 129.175261] should_fail+0x87b/0xab0 [ 129.179047] __should_failslab+0x278/0x2a0 [ 129.183384] should_failslab+0x29/0x70 [ 129.187343] __kmalloc+0xbe/0x350 [ 129.190853] ? ceph_parse_options+0x130/0x26a0 [ 129.195492] ? ceph_parse_options+0x17a/0x26a0 [ 129.200129] ? ceph_parse_options+0x135/0x26a0 [ 129.204770] ? ceph_mount+0x880/0x30a0 [ 129.208714] ceph_parse_options+0x17a/0x26a0 19:49:40 executing program 0: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(0xffffffffffffffff, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") mount(&(0x7f0000000200)='::,ile:\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) [ 129.213198] ? __kmalloc_track_caller+0x9d3/0xc80 [ 129.218121] ? ceph_set_super+0x400/0x400 [ 129.222351] ceph_mount+0x880/0x30a0 [ 129.226931] ? f2fs_init_acl+0x1530/0x1530 [ 129.231231] mount_fs+0x29b/0x780 [ 129.234773] vfs_kern_mount+0x222/0x990 [ 129.238831] do_mount+0xca5/0x4ed0 [ 129.242454] ? copy_mount_options+0x41/0x540 [ 129.246927] ? ksys_mount+0x251/0x3d0 [ 129.250812] ksys_mount+0x32e/0x3d0 [ 129.254554] __x64_sys_mount+0x157/0x1c0 [ 129.258675] ? ksys_mount+0x3d0/0x3d0 [ 129.262531] do_syscall_64+0x15b/0x230 19:49:40 executing program 3: mkdir(&(0x7f0000000080)='/\x00', 0xfffffffffffffffe) stat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000240)) r0 = dup(0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f00000000c0)={0x0, 0x20, 0x0, 0x7fffffff}, &(0x7f0000000140)=0x10) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000180)={0x80000000, 0x100, 0x203, 0x400000, 0x1, 0x0, 0x5, 0x4, r1}, &(0x7f00000001c0)=0x20) mount(&(0x7f0000000200)='0:file:\x00', &(0x7f0000000000)='./file0\x00', &(0x7f00000002c0)='ceph\x00', 0x3, 0x0) 19:49:40 executing program 6 (fault-call:1 fault-nth:1): mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000200)='::,ile:\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) [ 129.266478] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 129.271697] RIP: 0033:0x4559f9 [ 129.274927] RSP: 002b:00007fb4b3c2ac68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 129.282706] RAX: ffffffffffffffda RBX: 00007fb4b3c2b6d4 RCX: 00000000004559f9 [ 129.290101] RDX: 0000000020000100 RSI: 00000000200001c0 RDI: 0000000020000200 [ 129.297426] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 129.304746] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 129.312064] R13: 00000000004c1cc7 R14: 00000000004ceee8 R15: 0000000000000007 [ 129.357294] libceph: parse_ips bad ip '::,ile' [ 129.373372] FAULT_INJECTION: forcing a failure. [ 129.373372] name failslab, interval 1, probability 0, space 0, times 0 [ 129.384806] CPU: 0 PID: 7829 Comm: syz-executor6 Not tainted 4.17.0+ #5 [ 129.391597] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 129.400991] Call Trace: [ 129.403648] dump_stack+0x185/0x1d0 [ 129.407340] should_fail+0x87b/0xab0 [ 129.411085] __should_failslab+0x278/0x2a0 [ 129.415342] should_failslab+0x29/0x70 [ 129.419268] __kmalloc_track_caller+0x1ff/0xc80 [ 129.423992] ? strndup_user+0x134/0x1f0 [ 129.428012] ? kmsan_set_origin+0x9e/0x160 [ 129.432286] ? kmsan_internal_unpoison_shadow+0x83/0xe0 [ 129.437681] ? strnlen_user+0x44/0x390 [ 129.441589] memdup_user+0x7c/0x200 [ 129.445251] strndup_user+0x134/0x1f0 [ 129.449084] ksys_mount+0x193/0x3d0 [ 129.452744] ? fput+0x25c/0x2e0 [ 129.456063] __x64_sys_mount+0x157/0x1c0 [ 129.460152] ? ksys_mount+0x3d0/0x3d0 [ 129.463977] do_syscall_64+0x15b/0x230 [ 129.467923] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 129.473129] RIP: 0033:0x4559f9 [ 129.476322] RSP: 002b:00007f5646584c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 129.484052] RAX: ffffffffffffffda RBX: 00007f56465856d4 RCX: 00000000004559f9 [ 129.491344] RDX: 0000000020000100 RSI: 00000000200001c0 RDI: 0000000020000200 [ 129.498630] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 19:49:40 executing program 0: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x0, &(0x7f0000000000)="295ee1311f16f477671070") mount(&(0x7f0000000200)='::,ile:\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) [ 129.505911] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000013 [ 129.513369] R13: 00000000004c1cc7 R14: 00000000004ceee8 R15: 0000000000000001 19:49:40 executing program 4 (fault-call:1 fault-nth:2): mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000200)='::,ile:\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) [ 129.566331] libceph: parse_ips bad ip '::,ile' [ 129.573009] libceph: parse_ips bad ip '::.ile' [ 129.725745] FAULT_INJECTION: forcing a failure. [ 129.725745] name failslab, interval 1, probability 0, space 0, times 0 [ 129.737202] CPU: 0 PID: 7842 Comm: syz-executor4 Not tainted 4.17.0+ #5 [ 129.743995] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 129.753381] Call Trace: [ 129.756030] dump_stack+0x185/0x1d0 [ 129.759898] should_fail+0x87b/0xab0 [ 129.763694] __should_failslab+0x278/0x2a0 [ 129.768038] should_failslab+0x29/0x70 [ 129.771986] kmem_cache_alloc+0x129/0xb70 [ 129.776185] ? kmsan_set_origin_inline+0x6b/0x120 [ 129.781102] ? getname_flags+0x12a/0xaa0 [ 129.785202] ? __kmalloc_track_caller+0x98f/0xc80 [ 129.790195] getname_flags+0x12a/0xaa0 [ 129.794156] user_path_at_empty+0xbb/0x140 [ 129.798431] do_mount+0x2a4/0x4ed0 [ 129.801995] ? copy_mount_options+0x41/0x540 [ 129.806432] ? ksys_mount+0x251/0x3d0 [ 129.810273] ksys_mount+0x32e/0x3d0 [ 129.813953] __x64_sys_mount+0x157/0x1c0 [ 129.818042] ? ksys_mount+0x3d0/0x3d0 [ 129.821851] do_syscall_64+0x15b/0x230 [ 129.825753] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 129.830963] RIP: 0033:0x4559f9 [ 129.834161] RSP: 002b:00007fca3e8fdc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 129.841876] RAX: ffffffffffffffda RBX: 00007fca3e8fe6d4 RCX: 00000000004559f9 [ 129.849158] RDX: 0000000020000100 RSI: 00000000200001c0 RDI: 0000000020000200 [ 129.856429] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 129.863701] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000013 19:49:40 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000200)='0:file:\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) mount(&(0x7f0000000000)='0:file:\x00', &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0)='sysv\x00', 0x802, &(0x7f0000000240)="58c8beb4480b7fe1cbd30aa0ccc1be73b29b7f5790c2b504eabf006ff4ab92a1fe12439b76e635c067c112d413b9a4099d52c888fa6d4f2000a945e1d05ae3a305a6902a2bff1eafce04518e8c35ccad7360837a73ce500abf39e73cdae2a8e4966737844e9da9898e48c51c8d341fb905f18f2c363bf963bbc04fc199092ee82034e54591ccc9a48e37ef8b5832") 19:49:40 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}, [], {0x95}}, &(0x7f0000000340)='syzller\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x4, 0xb7, &(0x7f0000000380)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) write$binfmt_aout(r0, &(0x7f00000004c0), 0x20) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000280)={0xffffffffffffffff}) recvmmsg(r3, &(0x7f00000002c0), 0x40000f7, 0x0, &(0x7f0000000200)) dup2(r1, r2) 19:49:40 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r0 = socket$inet6(0xa, 0x0, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") mount(&(0x7f0000000200)='::.ile:\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 19:49:40 executing program 6 (fault-call:1 fault-nth:2): mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000200)='::,ile:\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 19:49:40 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18}, [], {0x95}}, &(0x7f0000000340)='syzller\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x4, 0xb7, &(0x7f0000000380)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f000031aff8)={r0, r1}) write$binfmt_aout(r0, &(0x7f00000004c0), 0x20) dup2(r1, r2) 19:49:40 executing program 0: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x0, &(0x7f0000000000)="295ee1311f16f477671070") mount(&(0x7f0000000200)='::,ile:\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 19:49:40 executing program 4 (fault-call:1 fault-nth:3): mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000200)='::,ile:\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 19:49:40 executing program 7 (fault-call:3 fault-nth:8): mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") mount(&(0x7f0000000200)='0:file:\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) [ 129.870987] R13: 00000000004c1cc7 R14: 00000000004ceee8 R15: 0000000000000002 [ 129.951969] FAULT_INJECTION: forcing a failure. [ 129.951969] name failslab, interval 1, probability 0, space 0, times 0 [ 129.952860] libceph: parse_ips bad ip '0:file' [ 129.963350] CPU: 1 PID: 7857 Comm: syz-executor6 Not tainted 4.17.0+ #5 [ 129.963379] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 129.970696] FAULT_INJECTION: forcing a failure. [ 129.970696] name failslab, interval 1, probability 0, space 0, times 0 [ 129.974718] Call Trace: [ 129.974768] dump_stack+0x185/0x1d0 [ 129.974827] should_fail+0x87b/0xab0 [ 130.005293] __should_failslab+0x278/0x2a0 [ 130.009563] should_failslab+0x29/0x70 [ 130.013499] kmem_cache_alloc+0x129/0xb70 [ 130.017667] ? kmsan_set_origin_inline+0x6b/0x120 [ 130.022549] ? getname_flags+0x12a/0xaa0 [ 130.026628] ? __kmalloc_track_caller+0x98f/0xc80 [ 130.031494] getname_flags+0x12a/0xaa0 [ 130.035429] user_path_at_empty+0xbb/0x140 [ 130.039703] do_mount+0x2a4/0x4ed0 [ 130.043274] ? copy_mount_options+0x41/0x540 [ 130.047715] ? ksys_mount+0x251/0x3d0 [ 130.051574] ksys_mount+0x32e/0x3d0 [ 130.055247] __x64_sys_mount+0x157/0x1c0 [ 130.059328] ? ksys_mount+0x3d0/0x3d0 [ 130.063143] do_syscall_64+0x15b/0x230 [ 130.067075] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 130.072276] RIP: 0033:0x4559f9 [ 130.075472] RSP: 002b:00007f5646584c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 130.083200] RAX: ffffffffffffffda RBX: 00007f56465856d4 RCX: 00000000004559f9 [ 130.090487] RDX: 0000000020000100 RSI: 00000000200001c0 RDI: 0000000020000200 [ 130.097773] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 130.105067] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000013 [ 130.112346] R13: 00000000004c1cc7 R14: 00000000004ceee8 R15: 0000000000000002 [ 130.119655] CPU: 0 PID: 7856 Comm: syz-executor7 Not tainted 4.17.0+ #5 [ 130.126443] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 130.135831] Call Trace: [ 130.138490] dump_stack+0x185/0x1d0 [ 130.142242] should_fail+0x87b/0xab0 [ 130.146019] __should_failslab+0x278/0x2a0 [ 130.150333] should_failslab+0x29/0x70 [ 130.154302] __kmalloc+0xbe/0x350 [ 130.157248] FAULT_INJECTION: forcing a failure. [ 130.157248] name failslab, interval 1, probability 0, space 0, times 0 [ 130.157823] ? ceph_parse_options+0x130/0x26a0 [ 130.174388] ? ceph_parse_options+0x1db/0x26a0 [ 130.179038] ? ceph_mount+0x880/0x30a0 [ 130.182975] ceph_parse_options+0x1db/0x26a0 [ 130.187422] ? __kmalloc_track_caller+0x9d3/0xc80 [ 130.192322] ? ceph_set_super+0x400/0x400 [ 130.196525] ceph_mount+0x880/0x30a0 [ 130.200283] ? f2fs_init_acl+0x1530/0x1530 [ 130.204556] mount_fs+0x29b/0x780 [ 130.208069] vfs_kern_mount+0x222/0x990 [ 130.212080] do_mount+0xca5/0x4ed0 [ 130.215649] ? copy_mount_options+0x41/0x540 [ 130.220082] ? ksys_mount+0x251/0x3d0 [ 130.223922] ksys_mount+0x32e/0x3d0 [ 130.227600] __x64_sys_mount+0x157/0x1c0 [ 130.231689] ? ksys_mount+0x3d0/0x3d0 [ 130.235497] do_syscall_64+0x15b/0x230 [ 130.239405] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 130.244622] RIP: 0033:0x4559f9 [ 130.247815] RSP: 002b:00007fb4b3c2ac68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 130.255544] RAX: ffffffffffffffda RBX: 00007fb4b3c2b6d4 RCX: 00000000004559f9 [ 130.262819] RDX: 0000000020000100 RSI: 00000000200001c0 RDI: 0000000020000200 [ 130.270098] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 130.277388] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 130.284663] R13: 00000000004c1cc7 R14: 00000000004ceee8 R15: 0000000000000008 [ 130.291965] CPU: 1 PID: 7860 Comm: syz-executor4 Not tainted 4.17.0+ #5 [ 130.298754] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 130.308146] Call Trace: [ 130.310796] dump_stack+0x185/0x1d0 [ 130.314510] should_fail+0x87b/0xab0 [ 130.318313] __should_failslab+0x278/0x2a0 [ 130.322614] should_failslab+0x29/0x70 [ 130.326546] kmem_cache_alloc+0x129/0xb70 [ 130.330744] ? alloc_vfsmnt+0x7b/0xcf0 [ 130.334701] ? get_fs_type+0x348/0x9c0 [ 130.338635] alloc_vfsmnt+0x7b/0xcf0 [ 130.342393] ? try_module_get+0x61/0x3d0 [ 130.346489] ? get_fs_type+0x348/0x9c0 [ 130.350409] vfs_kern_mount+0xaf/0x990 [ 130.354338] do_mount+0xca5/0x4ed0 [ 130.357908] ? copy_mount_options+0x41/0x540 [ 130.362338] ? ksys_mount+0x251/0x3d0 [ 130.366172] ksys_mount+0x32e/0x3d0 [ 130.369828] __x64_sys_mount+0x157/0x1c0 [ 130.374862] ? ksys_mount+0x3d0/0x3d0 [ 130.378675] do_syscall_64+0x15b/0x230 [ 130.382587] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 130.387783] RIP: 0033:0x4559f9 [ 130.390977] RSP: 002b:00007fca3e8fdc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 130.398717] RAX: ffffffffffffffda RBX: 00007fca3e8fe6d4 RCX: 00000000004559f9 [ 130.405995] RDX: 0000000020000100 RSI: 00000000200001c0 RDI: 0000000020000200 [ 130.413284] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 130.420564] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000013 [ 130.427842] R13: 00000000004c1cc7 R14: 00000000004ceee8 R15: 0000000000000003 [ 130.440616] libceph: parse_ips bad ip '::,ile' [ 130.447404] libceph: parse_ips bad ip '0:file' 19:49:41 executing program 6 (fault-call:1 fault-nth:3): mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000200)='::,ile:\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) [ 130.470094] libceph: parse_ips bad ip '::.ile' 19:49:41 executing program 0: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x0, &(0x7f0000000000)="295ee1311f16f477671070") mount(&(0x7f0000000200)='::,ile:\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 19:49:41 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000200)='0:file:\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) r0 = socket$nl_crypto(0x10, 0x3, 0x15) bind(r0, &(0x7f0000000240)=@pptp={0x18, 0x2, {0x1, @rand_addr=0x1000}}, 0x80) r1 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x9, 0x1) getpeername$unix(r1, &(0x7f0000000140), &(0x7f0000000040)=0x6e) 19:49:41 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r0 = socket$inet6(0xa, 0x0, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") mount(&(0x7f0000000200)='::.ile:\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) [ 130.572019] FAULT_INJECTION: forcing a failure. [ 130.572019] name failslab, interval 1, probability 0, space 0, times 0 [ 130.583502] CPU: 0 PID: 7870 Comm: syz-executor6 Not tainted 4.17.0+ #5 [ 130.590293] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 130.599682] Call Trace: [ 130.602336] dump_stack+0x185/0x1d0 [ 130.606031] should_fail+0x87b/0xab0 [ 130.609827] __should_failslab+0x278/0x2a0 [ 130.614132] should_failslab+0x29/0x70 [ 130.618084] kmem_cache_alloc+0x129/0xb70 19:49:41 executing program 7 (fault-call:3 fault-nth:9): mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") mount(&(0x7f0000000200)='0:file:\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 19:49:41 executing program 4 (fault-call:1 fault-nth:4): mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000200)='::,ile:\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 19:49:41 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}, [], {0x95}}, &(0x7f0000000340)='syzller\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x4, 0xb7, &(0x7f0000000380)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) write$binfmt_aout(r0, &(0x7f00000004c0), 0x20) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000280)={0xffffffffffffffff}) recvmmsg(r3, &(0x7f00000002c0), 0x40000f7, 0x0, &(0x7f0000000200)) dup2(r1, r2) [ 130.622268] ? alloc_vfsmnt+0x7b/0xcf0 [ 130.626226] ? get_fs_type+0x348/0x9c0 [ 130.630163] alloc_vfsmnt+0x7b/0xcf0 [ 130.633955] ? try_module_get+0x61/0x3d0 [ 130.638074] ? get_fs_type+0x348/0x9c0 [ 130.642039] vfs_kern_mount+0xaf/0x990 [ 130.646269] do_mount+0xca5/0x4ed0 [ 130.649880] ? copy_mount_options+0x41/0x540 [ 130.654357] ? ksys_mount+0x251/0x3d0 [ 130.658249] ksys_mount+0x32e/0x3d0 [ 130.661961] __x64_sys_mount+0x157/0x1c0 [ 130.666083] ? ksys_mount+0x3d0/0x3d0 [ 130.669935] do_syscall_64+0x15b/0x230 [ 130.673894] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 130.679117] RIP: 0033:0x4559f9 [ 130.682336] RSP: 002b:00007f5646584c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 130.690091] RAX: ffffffffffffffda RBX: 00007f56465856d4 RCX: 00000000004559f9 [ 130.697393] RDX: 0000000020000100 RSI: 00000000200001c0 RDI: 0000000020000200 [ 130.704702] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 130.712011] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000013 [ 130.719321] R13: 00000000004c1cc7 R14: 00000000004ceee8 R15: 0000000000000003 [ 130.732867] libceph: parse_ips bad ip '0:file' [ 130.768721] FAULT_INJECTION: forcing a failure. [ 130.768721] name failslab, interval 1, probability 0, space 0, times 0 [ 130.776916] libceph: parse_ips bad ip '0:file' [ 130.780201] CPU: 1 PID: 7883 Comm: syz-executor4 Not tainted 4.17.0+ #5 [ 130.791508] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 130.800895] Call Trace: [ 130.803549] dump_stack+0x185/0x1d0 [ 130.807289] should_fail+0x87b/0xab0 [ 130.811065] __should_failslab+0x278/0x2a0 [ 130.815364] should_failslab+0x29/0x70 [ 130.819324] __kmalloc_track_caller+0x1ff/0xc80 [ 130.824066] ? alloc_vfsmnt+0x30d/0xcf0 [ 130.828096] ? ida_get_new_above+0xc39/0x1000 [ 130.832679] kstrdup_const+0x154/0x270 [ 130.836624] alloc_vfsmnt+0x30d/0xcf0 [ 130.840512] vfs_kern_mount+0xaf/0x990 [ 130.844493] do_mount+0xca5/0x4ed0 [ 130.848112] ? copy_mount_options+0x41/0x540 [ 130.852592] ? ksys_mount+0x251/0x3d0 [ 130.856502] ksys_mount+0x32e/0x3d0 [ 130.860214] __x64_sys_mount+0x157/0x1c0 [ 130.864336] ? ksys_mount+0x3d0/0x3d0 [ 130.868189] do_syscall_64+0x15b/0x230 [ 130.872133] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 130.877352] RIP: 0033:0x4559f9 [ 130.880552] RSP: 002b:00007fca3e8fdc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 130.888301] RAX: ffffffffffffffda RBX: 00007fca3e8fe6d4 RCX: 00000000004559f9 [ 130.895586] RDX: 0000000020000100 RSI: 00000000200001c0 RDI: 0000000020000200 [ 130.902867] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 130.910142] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000013 19:49:41 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18}, [], {0x95}}, &(0x7f0000000340)='syzller\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x4, 0xb7, &(0x7f0000000380)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f000031aff8)={r0, r1}) write$binfmt_aout(r0, &(0x7f00000004c0), 0x20) dup2(r1, r2) [ 130.917420] R13: 00000000004c1cc7 R14: 00000000004ceee8 R15: 0000000000000004 [ 130.927566] libceph: parse_ips bad ip '::,ile' 19:49:41 executing program 6 (fault-call:1 fault-nth:4): mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000200)='::,ile:\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) [ 130.960334] libceph: parse_ips bad ip '0:file' [ 130.991776] libceph: parse_ips bad ip '::.ile' 19:49:42 executing program 4 (fault-call:1 fault-nth:5): mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000200)='::,ile:\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) [ 131.040714] FAULT_INJECTION: forcing a failure. [ 131.040714] name failslab, interval 1, probability 0, space 0, times 0 [ 131.052200] CPU: 1 PID: 7898 Comm: syz-executor6 Not tainted 4.17.0+ #5 [ 131.058994] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 131.068385] Call Trace: [ 131.071042] dump_stack+0x185/0x1d0 [ 131.074754] should_fail+0x87b/0xab0 [ 131.078537] __should_failslab+0x278/0x2a0 [ 131.082843] should_failslab+0x29/0x70 [ 131.086819] __kmalloc_track_caller+0x1ff/0xc80 [ 131.091564] ? alloc_vfsmnt+0x30d/0xcf0 [ 131.095594] ? ida_get_new_above+0xc39/0x1000 [ 131.100186] kstrdup_const+0x154/0x270 [ 131.104150] alloc_vfsmnt+0x30d/0xcf0 [ 131.107991] vfs_kern_mount+0xaf/0x990 [ 131.111926] do_mount+0xca5/0x4ed0 [ 131.115501] ? copy_mount_options+0x41/0x540 [ 131.119936] ? ksys_mount+0x251/0x3d0 [ 131.123782] ksys_mount+0x32e/0x3d0 [ 131.127448] __x64_sys_mount+0x157/0x1c0 [ 131.131526] ? ksys_mount+0x3d0/0x3d0 [ 131.135338] do_syscall_64+0x15b/0x230 [ 131.139423] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 131.144631] RIP: 0033:0x4559f9 [ 131.147829] RSP: 002b:00007f5646584c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 131.155554] RAX: ffffffffffffffda RBX: 00007f56465856d4 RCX: 00000000004559f9 [ 131.162840] RDX: 0000000020000100 RSI: 00000000200001c0 RDI: 0000000020000200 [ 131.170131] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 131.177410] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000013 19:49:42 executing program 0: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000000)) mount(&(0x7f0000000200)='::,ile:\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 19:49:42 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(0xffffffffffffffff, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") mount(&(0x7f0000000200)='::.ile:\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) [ 131.184692] R13: 00000000004c1cc7 R14: 00000000004ceee8 R15: 0000000000000004 [ 131.229405] FAULT_INJECTION: forcing a failure. [ 131.229405] name failslab, interval 1, probability 0, space 0, times 0 [ 131.237068] libceph: parse_ips bad ip '::.ile' [ 131.240814] CPU: 1 PID: 7905 Comm: syz-executor4 Not tainted 4.17.0+ #5 [ 131.248752] libceph: parse_ips bad ip '::,ile' [ 131.252194] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 131.252206] Call Trace: [ 131.252261] dump_stack+0x185/0x1d0 [ 131.252302] should_fail+0x87b/0xab0 [ 131.252360] __should_failslab+0x278/0x2a0 [ 131.280562] should_failslab+0x29/0x70 [ 131.284524] __kmalloc+0xbe/0x350 [ 131.288034] ? ceph_mount+0x94/0x30a0 [ 131.291896] ? ceph_mount+0x121/0x30a0 [ 131.295841] ? ceph_mount+0x99/0x30a0 [ 131.299708] ceph_mount+0x121/0x30a0 [ 131.303515] ? kmsan_set_origin+0x9e/0x160 [ 131.307815] ? f2fs_init_acl+0x1530/0x1530 [ 131.312097] mount_fs+0x29b/0x780 [ 131.315621] vfs_kern_mount+0x222/0x990 [ 131.319668] do_mount+0xca5/0x4ed0 [ 131.323272] ? copy_mount_options+0x41/0x540 [ 131.327731] ? ksys_mount+0x251/0x3d0 [ 131.331603] ksys_mount+0x32e/0x3d0 [ 131.335311] __x64_sys_mount+0x157/0x1c0 [ 131.339450] ? ksys_mount+0x3d0/0x3d0 [ 131.343285] do_syscall_64+0x15b/0x230 [ 131.347219] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 131.352436] RIP: 0033:0x4559f9 [ 131.355681] RSP: 002b:00007fca3e8fdc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 131.363437] RAX: ffffffffffffffda RBX: 00007fca3e8fe6d4 RCX: 00000000004559f9 [ 131.370830] RDX: 0000000020000100 RSI: 00000000200001c0 RDI: 0000000020000200 19:49:42 executing program 6 (fault-call:1 fault-nth:5): mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000200)='::,ile:\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 19:49:42 executing program 0: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000000)) mount(&(0x7f0000000200)='::,ile:\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 19:49:42 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18}, [], {0x95}}, &(0x7f0000000340)='syzller\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x4, 0xb7, &(0x7f0000000380)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f000031aff8)={r0, r1}) write$binfmt_aout(r0, &(0x7f00000004c0), 0x20) dup2(r1, r2) 19:49:42 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(0xffffffffffffffff, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") mount(&(0x7f0000000200)='::.ile:\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) [ 131.378142] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 131.385471] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000013 [ 131.392782] R13: 00000000004c1cc7 R14: 00000000004ceee8 R15: 0000000000000005 19:49:42 executing program 3: r0 = socket$unix(0x1, 0x3, 0x0) ioctl$FS_IOC_GETFSLABEL(r0, 0x81009431, &(0x7f0000000240)) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000200)='0:file:\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) r1 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000180)='cgroup.max.descendants\x00', 0x2, 0x0) r2 = getpgid(0xffffffffffffffff) fcntl$setown(r1, 0x8, r2) [ 131.431371] libceph: parse_ips bad ip '::,ile' [ 131.480301] libceph: parse_ips bad ip '::.ile' 19:49:42 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18}, [], {0x95}}, &(0x7f0000000340)='syzller\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x4, 0xb7, &(0x7f0000000380)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={0xffffffffffffffff, r1}) write$binfmt_aout(r0, &(0x7f00000004c0), 0x20) dup2(r1, r2) [ 131.540500] FAULT_INJECTION: forcing a failure. [ 131.540500] name failslab, interval 1, probability 0, space 0, times 0 [ 131.551906] CPU: 1 PID: 7923 Comm: syz-executor6 Not tainted 4.17.0+ #5 [ 131.558693] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 131.568083] Call Trace: [ 131.570737] dump_stack+0x185/0x1d0 [ 131.574449] should_fail+0x87b/0xab0 [ 131.578226] __should_failslab+0x278/0x2a0 [ 131.582543] should_failslab+0x29/0x70 [ 131.586491] __kmalloc+0xbe/0x350 [ 131.590084] ? ceph_mount+0x94/0x30a0 [ 131.593948] ? ceph_mount+0x121/0x30a0 [ 131.597894] ? ceph_mount+0x99/0x30a0 [ 131.601884] ceph_mount+0x121/0x30a0 [ 131.605680] ? kmsan_set_origin+0x9e/0x160 [ 131.609976] ? f2fs_init_acl+0x1530/0x1530 [ 131.614267] mount_fs+0x29b/0x780 [ 131.617794] vfs_kern_mount+0x222/0x990 [ 131.621852] do_mount+0xca5/0x4ed0 [ 131.625462] ? copy_mount_options+0x41/0x540 [ 131.629934] ? ksys_mount+0x251/0x3d0 [ 131.633813] ksys_mount+0x32e/0x3d0 19:49:42 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(0xffffffffffffffff, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") mount(&(0x7f0000000200)='::.ile:\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 19:49:42 executing program 0: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000000)) mount(&(0x7f0000000200)='::,ile:\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) [ 131.634793] libceph: parse_ips bad ip '0:file' [ 131.637510] __x64_sys_mount+0x157/0x1c0 [ 131.637545] ? ksys_mount+0x3d0/0x3d0 [ 131.637584] do_syscall_64+0x15b/0x230 [ 131.654206] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 131.659623] RIP: 0033:0x4559f9 [ 131.662842] RSP: 002b:00007f5646584c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 131.667136] libceph: parse_ips bad ip '0:file' [ 131.670764] RAX: ffffffffffffffda RBX: 00007f56465856d4 RCX: 00000000004559f9 [ 131.670783] RDX: 0000000020000100 RSI: 00000000200001c0 RDI: 0000000020000200 [ 131.670801] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 131.670819] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000013 [ 131.670836] R13: 00000000004c1cc7 R14: 00000000004ceee8 R15: 0000000000000005 [ 131.693164] FAULT_INJECTION: forcing a failure. [ 131.693164] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 131.724477] CPU: 1 PID: 7876 Comm: syz-executor7 Not tainted 4.17.0+ #5 [ 131.724661] libceph: parse_ips bad ip '::,ile' [ 131.731246] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 131.731258] Call Trace: [ 131.731308] dump_stack+0x185/0x1d0 [ 131.731344] should_fail+0x87b/0xab0 [ 131.731381] __alloc_pages_nodemask+0x600/0x5cc0 [ 131.731421] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 131.741639] libceph: parse_ips bad ip '::.ile' [ 131.745372] ? is_bpf_text_address+0xb4/0x4b0 [ 131.745406] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 131.745435] ? __module_address+0x6a/0x600 [ 131.745505] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 131.745538] ? is_bpf_text_address+0xb4/0x4b0 [ 131.745574] ? __is_insn_slot_addr+0x198/0x1c0 [ 131.798697] ? kmsan_set_origin_inline+0x6b/0x120 [ 131.803586] alloc_pages_current+0x6b1/0x970 [ 131.808038] __get_free_pages+0x2d/0xc0 [ 131.812050] unmap_page_range+0x26d2/0x3be0 [ 131.816447] unmap_single_vma+0x445/0x5e0 [ 131.820660] unmap_vmas+0x1f4/0x360 [ 131.824361] exit_mmap+0x4d7/0x980 [ 131.827947] __mmput+0x158/0x600 [ 131.831349] ? __msan_get_context_state+0x20/0xf0 [ 131.836340] mmput+0xab/0xf0 [ 131.839411] exit_mm+0x6ed/0x7a0 [ 131.842857] do_exit+0xc12/0x3930 [ 131.846389] do_group_exit+0x1a0/0x360 [ 131.850341] get_signal+0x1405/0x1ec0 [ 131.854192] ? __msan_poison_alloca+0x15c/0x1d0 [ 131.858896] ? __switch_to+0x2b3/0x420 [ 131.862846] ? switch_fpu_finish+0x6e/0x4f0 [ 131.867211] ? __switch_to+0x2b3/0x420 [ 131.871153] ? apic_timer_interrupt+0xa/0x20 [ 131.875616] ? prepare_exit_to_usermode+0x271/0x3a0 [ 131.880686] ? prepare_exit_to_usermode+0x271/0x3a0 [ 131.885757] do_signal+0xb8/0x1d20 [ 131.889453] ? __msan_poison_alloca+0x15c/0x1d0 [ 131.894182] ? kmsan_set_origin_inline+0x6b/0x120 [ 131.899072] ? __msan_poison_alloca+0x15c/0x1d0 [ 131.903792] ? syscall_return_slowpath+0xe9/0x710 [ 131.908686] ? prepare_exit_to_usermode+0x4a/0x3a0 [ 131.913658] ? syscall_return_slowpath+0xe9/0x710 [ 131.918539] ? prepare_exit_to_usermode+0xec/0x3a0 [ 131.923537] prepare_exit_to_usermode+0x271/0x3a0 [ 131.928430] syscall_return_slowpath+0xe9/0x710 [ 131.933184] ? __x64_sys_mount+0x157/0x1c0 [ 131.937470] do_syscall_64+0x1ad/0x230 [ 131.941407] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 131.946630] RIP: 0033:0x4559f9 [ 131.949847] RSP: 002b:00007fb4b3c2ac68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 131.957600] RAX: ffffffffffffffea RBX: 00007fb4b3c2b6d4 RCX: 00000000004559f9 [ 131.964906] RDX: 0000000020000100 RSI: 00000000200001c0 RDI: 0000000020000200 [ 131.972216] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 131.979521] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 131.986824] R13: 00000000004c1cc7 R14: 00000000004ceee8 R15: 0000000000000009 [ 132.004137] ================================================================== [ 132.011552] BUG: KMSAN: uninit-value in rcu_cblist_dequeue+0x233/0x270 [ 132.018222] CPU: 0 PID: 8 Comm: ksoftirqd/0 Not tainted 4.17.0+ #5 [ 132.024538] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 132.033918] Call Trace: [ 132.036516] dump_stack+0x185/0x1d0 [ 132.040133] kmsan_report+0x188/0x2a0 [ 132.043919] __msan_warning_32+0x70/0xc0 [ 132.047967] rcu_cblist_dequeue+0x233/0x270 [ 132.052275] rcu_process_callbacks+0x19a7/0x2060 [ 132.057032] ? run_ksoftirqd+0x1f/0x40 [ 132.060912] ? run_timer_softirq+0x14/0x70 [ 132.065137] ? rcu_scheduler_starting+0xe0/0xe0 [ 132.069791] __do_softirq+0x592/0x979 [ 132.073576] ? ksoftirqd_should_run+0x30/0x30 [ 132.078068] run_ksoftirqd+0x1f/0x40 [ 132.081852] smpboot_thread_fn+0x4ac/0x9a0 [ 132.086074] kthread+0x4db/0x6c0 [ 132.089431] ? cpu_report_death+0x1f0/0x1f0 [ 132.093741] ? kthread_blkcg+0xf0/0xf0 [ 132.097614] ret_from_fork+0x35/0x40 [ 132.101310] [ 132.102918] Uninit was stored to memory at: [ 132.107248] kmsan_internal_chain_origin+0x12b/0x210 [ 132.112419] __msan_chain_origin+0x69/0xc0 [ 132.116635] rcu_segcblist_enqueue+0x24c/0x2d0 [ 132.121214] __call_rcu+0x227/0xef0 [ 132.124825] call_rcu_sched+0x32/0x40 [ 132.128624] release_task+0x24b9/0x2530 [ 132.132585] do_exit+0x2e11/0x3930 [ 132.136116] do_group_exit+0x1a0/0x360 [ 132.140077] get_signal+0x1405/0x1ec0 [ 132.143865] do_signal+0xb8/0x1d20 [ 132.147389] prepare_exit_to_usermode+0x271/0x3a0 [ 132.152214] syscall_return_slowpath+0xe9/0x710 [ 132.156866] do_syscall_64+0x1ad/0x230 [ 132.160749] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 132.165922] Local variable description: ----path@walk_component [ 132.172055] Variable was created at: [ 132.175761] walk_component+0x5b/0xbb0 [ 132.179625] link_path_walk+0x943/0x2150 [ 132.183660] ================================================================== [ 132.190994] Disabling lock debugging due to kernel taint [ 132.196424] Kernel panic - not syncing: panic_on_warn set ... [ 132.196424] [ 132.203771] CPU: 0 PID: 8 Comm: ksoftirqd/0 Tainted: G B 4.17.0+ #5 [ 132.211629] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 132.220964] Call Trace: [ 132.223548] dump_stack+0x185/0x1d0 [ 132.227247] panic+0x3d0/0x990 [ 132.230431] kmsan_report+0x29e/0x2a0 [ 132.234216] __msan_warning_32+0x70/0xc0 [ 132.238259] rcu_cblist_dequeue+0x233/0x270 [ 132.242567] rcu_process_callbacks+0x19a7/0x2060 [ 132.247305] ? run_ksoftirqd+0x1f/0x40 [ 132.251362] ? run_timer_softirq+0x14/0x70 [ 132.255579] ? rcu_scheduler_starting+0xe0/0xe0 [ 132.260235] __do_softirq+0x592/0x979 [ 132.264030] ? ksoftirqd_should_run+0x30/0x30 [ 132.268507] run_ksoftirqd+0x1f/0x40 [ 132.272205] smpboot_thread_fn+0x4ac/0x9a0 [ 132.276427] kthread+0x4db/0x6c0 [ 132.279862] ? cpu_report_death+0x1f0/0x1f0 [ 132.284166] ? kthread_blkcg+0xf0/0xf0 [ 132.288039] ret_from_fork+0x35/0x40 [ 132.292292] Dumping ftrace buffer: [ 132.295818] (ftrace buffer empty) [ 132.299505] Kernel Offset: disabled [ 132.303109] Rebooting in 86400 seconds..