3c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r0, 0xfc0004) accept(r0, 0x0, 0x0) r1 = socket$inet(0xa, 0x801, 0x84) sendto(r1, &(0x7f0000000080)="d5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r1, 0xfc0004) accept(r1, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x4) writev(r2, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d36020a8447000b4e230f000e0000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed5e232e725839c97b910000", 0x104}], 0x1) 02:12:04 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r2 = gettid() process_vm_writev(r2, &(0x7f0000c22000)=[{&(0x7f000034afa4)=""/1, 0x1f80}], 0x2c3, &(0x7f0000c22fa0)=[{&(0x7f0000000080)=""/1, 0x2034afa5}], 0x1, 0x0) [ 533.148937][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 533.154668][T32047] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. [ 533.242446][T32046] ceph: No path or : separator in source 02:12:04 executing program 3: r0 = socket$inet(0xa, 0x801, 0x84) sendto(r0, &(0x7f0000000080)="f5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r0, 0xfc0004) accept(r0, 0x0, 0x0) r1 = socket$inet(0xa, 0x801, 0x84) sendto(r1, &(0x7f0000000080)="d5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r1, 0xfc0004) accept(r1, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x4) writev(r2, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d36020a8447000b4e230f000f0000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed5e232e725839c97b910000", 0x104}], 0x1) 02:12:04 executing program 3: r0 = socket$inet(0xa, 0x801, 0x84) sendto(r0, &(0x7f0000000080)="f5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r0, 0xfc0004) accept(r0, 0x0, 0x0) r1 = socket$inet(0xa, 0x801, 0x84) sendto(r1, &(0x7f0000000080)="d5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r1, 0xfc0004) accept(r1, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x4) writev(r2, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d36020a8447000b4e230f00600000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed5e232e725839c97b910000", 0x104}], 0x1) [ 533.405095][T32060] bond90: (slave veth253): Enslaving as an active interface with an up link [ 533.451852][T32046] ceph: No path or : separator in source [ 533.465168][T32047] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. 02:12:04 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) get_mempolicy(&(0x7f00000003c0), &(0x7f0000000400), 0x289, &(0x7f0000fef000/0x10000)=nil, 0x2) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="c6566ceda4e3f1c409e9515b62be0157ec2275042709d8548cb34a00665921c0c26bc59a07847331f37bc0ef75a5460fe26079bfc6bed87ef39b93f39b6bd4dea2a4b89759e1a77e64786f7d3c9ce12e6e7091ca71c3576afb000000000000000000", @ANYRES32, @ANYRES32=0x0, @ANYRESHEX=r1, @ANYRESDEC=r2], 0x5, 0x1) wait4(r1, 0x0, 0x40000000, &(0x7f0000000200)) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/tty/drivers\x00', 0x0, 0x0) read(r3, &(0x7f0000000280)=""/152, 0x20000318) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/tty/drivers\x00', 0x0, 0x0) read(r4, &(0x7f0000000280)=""/152, 0x20000318) ioctl$VIDIOC_QUERYBUF(r3, 0xc0585609, &(0x7f00000002c0)={0x0, 0x0, 0x4, 0x63d263814f78ec42, 0x401, {0x0, 0x2710}, {0x3, 0xc, 0x6, 0x0, 0x3, 0x9, "878b2cbe"}, 0x3, 0xb, @offset=0x8000, 0x400, 0x0, r4}) setsockopt$RDS_RECVERR(r5, 0x114, 0x5, &(0x7f0000000100), 0x4) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r6 = syz_open_dev$dri(&(0x7f00000001c0)='/dev/dri/card#\x00', 0x1, 0x0) mount(&(0x7f00000000c0)=ANY=[@ANYPTR64=&(0x7f0000000740)=ANY=[@ANYRESHEX=0x0, @ANYPTR, @ANYPTR64, @ANYBLOB="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", @ANYRESHEX=0x0, @ANYPTR64, @ANYRESHEX=r6, @ANYRES16=r0]], &(0x7f0000000180)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) [ 533.568420][T32060] bond90: (slave veth255): Enslaving as an active interface with an up link 02:12:05 executing program 3: r0 = socket$inet(0xa, 0x801, 0x84) sendto(r0, &(0x7f0000000080)="f5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r0, 0xfc0004) accept(r0, 0x0, 0x0) r1 = socket$inet(0xa, 0x801, 0x84) sendto(r1, &(0x7f0000000080)="d5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r1, 0xfc0004) accept(r1, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x4) writev(r2, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d36020a8447000b4e230f00bc0000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed5e232e725839c97b910000", 0x104}], 0x1) 02:12:05 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @remote}}) write$tun(r0, &(0x7f0000000180)={@void, @val={0x0, 0x0, 0x800e}, @mpls={[], @ipv6=@icmpv6={0x0, 0x6, "9eef7b", 0x9, 0x3c, 0x0, @remote, @mcast2, {[], @echo_request={0x80, 0x0, 0x0, 0x0, 0x0, "81"}}}}}, 0x3b) 02:12:05 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=ANY=[@ANYBLOB="3c00000010008506000000000000000000200000", @ANYRES32=r3, @ANYBLOB="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"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000540)={0x0, 0x3f6, &(0x7f0000000200)={&(0x7f00000008c0)=@newlink={0x50, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x50}}, 0x0) [ 533.822693][T32172] ceph: No path or : separator in source [ 533.934148][T32172] ceph: No path or : separator in source 02:12:05 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) get_mempolicy(&(0x7f00000003c0), &(0x7f0000000400), 0x289, &(0x7f0000fef000/0x10000)=nil, 0x2) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="c6566ceda4e3f1c409e9515b62be0157ec2275042709d8548cb34a00665921c0c26bc59a07847331f37bc0ef75a5460fe26079bfc6bed87ef39b93f39b6bd4dea2a4b89759e1a77e64786f7d3c9ce12e6e7091ca71c3576afb000000000000000000", @ANYRES32, @ANYRES32=0x0, @ANYRESHEX=r1, @ANYRESDEC=r2], 0x5, 0x1) wait4(r1, 0x0, 0x40000000, &(0x7f0000000200)) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/tty/drivers\x00', 0x0, 0x0) read(r3, &(0x7f0000000280)=""/152, 0x20000318) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/tty/drivers\x00', 0x0, 0x0) read(r4, &(0x7f0000000280)=""/152, 0x20000318) ioctl$VIDIOC_QUERYBUF(r3, 0xc0585609, &(0x7f00000002c0)={0x0, 0x0, 0x4, 0x63d263814f78ec42, 0x401, {0x0, 0x2710}, {0x3, 0xc, 0x6, 0x0, 0x3, 0x9, "878b2cbe"}, 0x3, 0xb, @offset=0x8000, 0x400, 0x0, r4}) setsockopt$RDS_RECVERR(r5, 0x114, 0x5, &(0x7f0000000100), 0x4) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r6 = syz_open_dev$dri(&(0x7f00000001c0)='/dev/dri/card#\x00', 0x1, 0x0) mount(&(0x7f00000000c0)=ANY=[@ANYPTR64=&(0x7f0000000740)=ANY=[@ANYRESHEX=0x0, @ANYPTR, @ANYPTR64, @ANYBLOB="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", @ANYRESHEX=0x0, @ANYPTR64, @ANYRESHEX=r6, @ANYRES16=r0]], &(0x7f0000000180)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) 02:12:05 executing program 3: r0 = socket$inet(0xa, 0x801, 0x84) sendto(r0, &(0x7f0000000080)="f5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r0, 0xfc0004) accept(r0, 0x0, 0x0) r1 = socket$inet(0xa, 0x801, 0x84) sendto(r1, &(0x7f0000000080)="d5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r1, 0xfc0004) accept(r1, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x4) writev(r2, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d36020a8447000b4e230f00f00000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed5e232e725839c97b910000", 0x104}], 0x1) [ 534.220367][T32194] ceph: No path or : separator in source 02:12:05 executing program 3: r0 = socket$inet(0xa, 0x801, 0x84) sendto(r0, &(0x7f0000000080)="f5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r0, 0xfc0004) accept(r0, 0x0, 0x0) r1 = socket$inet(0xa, 0x801, 0x84) sendto(r1, &(0x7f0000000080)="d5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r1, 0xfc0004) accept(r1, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x4) writev(r2, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d36020a8447000b4e230f001f0400a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed5e232e725839c97b910000", 0x104}], 0x1) [ 534.312648][T32200] ceph: No path or : separator in source [ 534.399857][T32182] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. 02:12:05 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000003c0)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) syz_open_procfs(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$DRM_IOCTL_SET_MASTER(0xffffffffffffffff, 0x641e) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VHOST_SET_LOG_FD(0xffffffffffffffff, 0x4004af07, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) recvfrom$inet6(r3, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0x0) shutdown(r3, 0x1) r4 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r4, &(0x7f00000000c0), 0xfffffdda, 0x1100, 0x0, 0x0) 02:12:05 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) get_mempolicy(&(0x7f00000003c0), &(0x7f0000000400), 0x289, &(0x7f0000fef000/0x10000)=nil, 0x2) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="c6566ceda4e3f1c409e9515b62be0157ec2275042709d8548cb34a00665921c0c26bc59a07847331f37bc0ef75a5460fe26079bfc6bed87ef39b93f39b6bd4dea2a4b89759e1a77e64786f7d3c9ce12e6e7091ca71c3576afb000000000000000000", @ANYRES32, @ANYRES32=0x0, @ANYRESHEX=r1, @ANYRESDEC=r2], 0x5, 0x1) wait4(r1, 0x0, 0x40000000, &(0x7f0000000200)) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/tty/drivers\x00', 0x0, 0x0) read(r3, &(0x7f0000000280)=""/152, 0x20000318) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/tty/drivers\x00', 0x0, 0x0) read(r4, &(0x7f0000000280)=""/152, 0x20000318) ioctl$VIDIOC_QUERYBUF(r3, 0xc0585609, &(0x7f00000002c0)={0x0, 0x0, 0x4, 0x63d263814f78ec42, 0x401, {0x0, 0x2710}, {0x3, 0xc, 0x6, 0x0, 0x3, 0x9, "878b2cbe"}, 0x3, 0xb, @offset=0x8000, 0x400, 0x0, r4}) setsockopt$RDS_RECVERR(r5, 0x114, 0x5, &(0x7f0000000100), 0x4) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r6 = syz_open_dev$dri(&(0x7f00000001c0)='/dev/dri/card#\x00', 0x1, 0x0) mount(&(0x7f00000000c0)=ANY=[@ANYPTR64=&(0x7f0000000740)=ANY=[@ANYRESHEX=0x0, @ANYPTR, @ANYPTR64, @ANYBLOB="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", @ANYRESHEX=0x0, @ANYPTR64, @ANYRESHEX=r6, @ANYRES16=r0]], &(0x7f0000000180)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) [ 534.510873][T32187] bond91: (slave veth257): Enslaving as an active interface with an up link [ 534.542295][T32182] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. [ 534.614946][T32211] ceph: No path or : separator in source [ 534.654961][T32182] bond91: (slave veth259): Enslaving as an active interface with an up link 02:12:06 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r2 = gettid() process_vm_writev(r2, &(0x7f0000c22000)=[{&(0x7f000034afa4)=""/1, 0x1f80}], 0x2c4, &(0x7f0000c22fa0)=[{&(0x7f0000000080)=""/1, 0x2034afa5}], 0x1, 0x0) 02:12:06 executing program 3: r0 = socket$inet(0xa, 0x801, 0x84) sendto(r0, &(0x7f0000000080)="f5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r0, 0xfc0004) accept(r0, 0x0, 0x0) r1 = socket$inet(0xa, 0x801, 0x84) sendto(r1, &(0x7f0000000080)="d5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r1, 0xfc0004) accept(r1, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x4) writev(r2, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d36020a8447000b4e230f00000a00a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed5e232e725839c97b910000", 0x104}], 0x1) [ 534.703283][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 534.712332][T32211] ceph: No path or : separator in source 02:12:06 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=ANY=[@ANYBLOB="3c00000010008506000000000000000000200000", @ANYRES32=r3, @ANYBLOB="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"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000540)={0x0, 0x3f8, &(0x7f0000000200)={&(0x7f00000008c0)=@newlink={0x50, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x50}}, 0x0) 02:12:06 executing program 3: r0 = socket$inet(0xa, 0x801, 0x84) sendto(r0, &(0x7f0000000080)="f5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r0, 0xfc0004) accept(r0, 0x0, 0x0) r1 = socket$inet(0xa, 0x801, 0x84) sendto(r1, &(0x7f0000000080)="d5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r1, 0xfc0004) accept(r1, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x4) writev(r2, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d36020a8447000b4e230f00000e00a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed5e232e725839c97b910000", 0x104}], 0x1) 02:12:06 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) get_mempolicy(&(0x7f00000003c0), &(0x7f0000000400), 0x289, &(0x7f0000fef000/0x10000)=nil, 0x2) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="c6566ceda4e3f1c409e9515b62be0157ec2275042709d8548cb34a00665921c0c26bc59a07847331f37bc0ef75a5460fe26079bfc6bed87ef39b93f39b6bd4dea2a4b89759e1a77e64786f7d3c9ce12e6e7091ca71c3576afb000000000000000000", @ANYRES32, @ANYRES32=0x0, @ANYRESHEX=r1, @ANYRESDEC=r2], 0x5, 0x1) wait4(r1, 0x0, 0x40000000, &(0x7f0000000200)) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/tty/drivers\x00', 0x0, 0x0) read(r3, &(0x7f0000000280)=""/152, 0x20000318) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/tty/drivers\x00', 0x0, 0x0) read(r4, &(0x7f0000000280)=""/152, 0x20000318) ioctl$VIDIOC_QUERYBUF(r3, 0xc0585609, &(0x7f00000002c0)={0x0, 0x0, 0x4, 0x63d263814f78ec42, 0x401, {0x0, 0x2710}, {0x3, 0xc, 0x6, 0x0, 0x3, 0x9, "878b2cbe"}, 0x3, 0xb, @offset=0x8000, 0x400, 0x0, r4}) setsockopt$RDS_RECVERR(r5, 0x114, 0x5, &(0x7f0000000100), 0x4) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r6 = syz_open_dev$dri(&(0x7f00000001c0)='/dev/dri/card#\x00', 0x1, 0x0) mount(&(0x7f00000000c0)=ANY=[@ANYPTR64=&(0x7f0000000740)=ANY=[@ANYRESHEX=0x0, @ANYPTR, @ANYPTR64, @ANYBLOB="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", @ANYRESHEX=0x0, @ANYPTR64, @ANYRESHEX=r6, @ANYRES16=r0]], &(0x7f0000000180)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) [ 535.172090][T32332] ceph: No path or : separator in source [ 535.446550][T32332] ceph: No path or : separator in source [ 535.484557][T32331] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. [ 535.572842][T32334] bond92: (slave veth261): Enslaving as an active interface with an up link [ 535.641720][T32331] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. 02:12:07 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @remote}}) write$tun(r0, &(0x7f0000000180)={@void, @val, @mpls={[], @ipv6=@icmpv6={0x0, 0x6, "9eef7b", 0x9, 0x3c, 0x0, @remote, @mcast2, {[], @echo_request={0x80, 0x0, 0x0, 0x0, 0x0, "81"}}}}}, 0x3b) 02:12:07 executing program 3: r0 = socket$inet(0xa, 0x801, 0x84) sendto(r0, &(0x7f0000000080)="f5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r0, 0xfc0004) accept(r0, 0x0, 0x0) r1 = socket$inet(0xa, 0x801, 0x84) sendto(r1, &(0x7f0000000080)="d5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r1, 0xfc0004) accept(r1, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x4) writev(r2, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d36020a8447000b4e230f00c00e00a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed5e232e725839c97b910000", 0x104}], 0x1) 02:12:07 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) get_mempolicy(&(0x7f00000003c0), &(0x7f0000000400), 0x289, &(0x7f0000fef000/0x10000)=nil, 0x2) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="c6566ceda4e3f1c409e9515b62be0157ec2275042709d8548cb34a00665921c0c26bc59a07847331f37bc0ef75a5460fe26079bfc6bed87ef39b93f39b6bd4dea2a4b89759e1a77e64786f7d3c9ce12e6e7091ca71c3576afb000000000000000000", @ANYRES32, @ANYRES32=0x0, @ANYRESHEX=r1, @ANYRESDEC=r2], 0x5, 0x1) wait4(r1, 0x0, 0x40000000, &(0x7f0000000200)) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/tty/drivers\x00', 0x0, 0x0) read(r3, &(0x7f0000000280)=""/152, 0x20000318) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/tty/drivers\x00', 0x0, 0x0) read(r4, &(0x7f0000000280)=""/152, 0x20000318) ioctl$VIDIOC_QUERYBUF(r3, 0xc0585609, &(0x7f00000002c0)={0x0, 0x0, 0x4, 0x63d263814f78ec42, 0x401, {0x0, 0x2710}, {0x3, 0xc, 0x6, 0x0, 0x3, 0x9, "878b2cbe"}, 0x3, 0xb, @offset=0x8000, 0x400, 0x0, r4}) setsockopt$RDS_RECVERR(r5, 0x114, 0x5, &(0x7f0000000100), 0x4) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r6 = syz_open_dev$dri(&(0x7f00000001c0)='/dev/dri/card#\x00', 0x1, 0x0) mount(&(0x7f00000000c0)=ANY=[@ANYPTR64=&(0x7f0000000740)=ANY=[@ANYRESHEX=0x0, @ANYPTR, @ANYPTR64, @ANYBLOB="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", @ANYRESHEX=0x0, @ANYPTR64, @ANYRESHEX=r6, @ANYRES16=r0]], &(0x7f0000000180)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) 02:12:07 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000003c0)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) syz_open_procfs(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$DRM_IOCTL_SET_MASTER(0xffffffffffffffff, 0x641e) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VHOST_SET_LOG_FD(0xffffffffffffffff, 0x4004af07, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) recvfrom$inet6(r3, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0x0) shutdown(r3, 0x1) r4 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r4, &(0x7f00000000c0), 0xfffffdda, 0x1200, 0x0, 0x0) [ 535.691598][T32334] bond92: (slave veth263): Enslaving as an active interface with an up link 02:12:07 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=ANY=[@ANYBLOB="3c00000010008506000000000000000000200000", @ANYRES32=r3, @ANYBLOB="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"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000540)={0x0, 0x3fa, &(0x7f0000000200)={&(0x7f00000008c0)=@newlink={0x50, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x50}}, 0x0) 02:12:07 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r2 = gettid() process_vm_writev(r2, &(0x7f0000c22000)=[{&(0x7f000034afa4)=""/1, 0x1f80}], 0x2c5, &(0x7f0000c22fa0)=[{&(0x7f0000000080)=""/1, 0x2034afa5}], 0x1, 0x0) [ 535.792270][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 02:12:07 executing program 3: r0 = socket$inet(0xa, 0x801, 0x84) sendto(r0, &(0x7f0000000080)="f5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r0, 0xfc0004) accept(r0, 0x0, 0x0) r1 = socket$inet(0xa, 0x801, 0x84) sendto(r1, &(0x7f0000000080)="d5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r1, 0xfc0004) accept(r1, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x4) writev(r2, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d36020a8447000b4e230f00000f00a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed5e232e725839c97b910000", 0x104}], 0x1) [ 535.966635][T32350] ceph: No path or : separator in source 02:12:07 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) get_mempolicy(&(0x7f00000003c0), &(0x7f0000000400), 0x289, &(0x7f0000fef000/0x10000)=nil, 0x2) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="c6566ceda4e3f1c409e9515b62be0157ec2275042709d8548cb34a00665921c0c26bc59a07847331f37bc0ef75a5460fe26079bfc6bed87ef39b93f39b6bd4dea2a4b89759e1a77e64786f7d3c9ce12e6e7091ca71c3576afb000000000000000000", @ANYRES32, @ANYRES32=0x0, @ANYRESHEX=r1, @ANYRESDEC=r2], 0x5, 0x1) wait4(r1, 0x0, 0x40000000, &(0x7f0000000200)) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/tty/drivers\x00', 0x0, 0x0) read(r3, &(0x7f0000000280)=""/152, 0x20000318) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/tty/drivers\x00', 0x0, 0x0) read(r4, &(0x7f0000000280)=""/152, 0x20000318) ioctl$VIDIOC_QUERYBUF(r3, 0xc0585609, &(0x7f00000002c0)={0x0, 0x0, 0x4, 0x63d263814f78ec42, 0x401, {0x0, 0x2710}, {0x3, 0xc, 0x6, 0x0, 0x3, 0x9, "878b2cbe"}, 0x3, 0xb, @offset=0x8000, 0x400, 0x0, r4}) setsockopt$RDS_RECVERR(r5, 0x114, 0x5, &(0x7f0000000100), 0x4) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r6 = syz_open_dev$dri(&(0x7f00000001c0)='/dev/dri/card#\x00', 0x1, 0x0) mount(&(0x7f00000000c0)=ANY=[@ANYPTR64=&(0x7f0000000740)=ANY=[@ANYRESHEX=0x0, @ANYPTR, @ANYPTR64, @ANYBLOB="974d3ab47b3b91beb0f4760669c8618bc33664faf9c8179efd568e4e4b38f30869aefe10a4ccb1c515487e645b4a11d7cd2fb39aa1efca7c3eb441061d2be4c165ca7304c2e94159863dcfcf75da45211fdd143b6c91d52ae9ac6a1c2f8173d8ee5682fc65a93dc45ead4a462d9e16ac3dff144c0fcc7d02fcf3fd3029b264f3550caaab22152365126be74a9ff91547eb273f83f2c2762b17b32d7d91ac013d6f5790d3bc09c1884d8c7f15be223a8c3b4e37186c641bc3501ca145f05e49aae1613402448c49a36a9b0055a9d5cc74edda0087d65f15d71e4e051cad208514ee99b6258f827a895d2eb4407e6b7b7a9d6bcc228e615d78a6a8b2c466d96a48ee2c7a736035e283917293271efdc7cbdf0a647917068ab197eec326359f829087bafd0fd95e5fcf645615f55040a847aab188c52f4dd3f61a15b2edfe22e6221a5b0b256f1d8da1e6b860b7c68213cc1fae88c0e86013d9000085216c3ee1ab6fd509500f038480929e335b4b3bb0150f881b831cc870de6d188bdd45a113989bc9d15fe2893ff94349", @ANYRESHEX=0x0, @ANYPTR64, @ANYRESHEX=r6, @ANYRES16=r0]], &(0x7f0000000180)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) [ 536.117019][T32350] ceph: No path or : separator in source 02:12:07 executing program 3: r0 = socket$inet(0xa, 0x801, 0x84) sendto(r0, &(0x7f0000000080)="f5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r0, 0xfc0004) accept(r0, 0x0, 0x0) r1 = socket$inet(0xa, 0x801, 0x84) sendto(r1, &(0x7f0000000080)="d5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r1, 0xfc0004) accept(r1, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x4) writev(r2, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d36020a8447000b4e230f00041f00a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed5e232e725839c97b910000", 0x104}], 0x1) [ 536.359216][T32375] ceph: No path or : separator in source 02:12:07 executing program 3: r0 = socket$inet(0xa, 0x801, 0x84) sendto(r0, &(0x7f0000000080)="f5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r0, 0xfc0004) accept(r0, 0x0, 0x0) r1 = socket$inet(0xa, 0x801, 0x84) sendto(r1, &(0x7f0000000080)="d5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r1, 0xfc0004) accept(r1, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x4) writev(r2, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d36020a8447000b4e230f00003f00a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed5e232e725839c97b910000", 0x104}], 0x1) [ 536.432039][T32381] ceph: No path or : separator in source 02:12:07 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) get_mempolicy(&(0x7f00000003c0), &(0x7f0000000400), 0x289, &(0x7f0000fef000/0x10000)=nil, 0x2) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="c6566ceda4e3f1c409e9515b62be0157ec2275042709d8548cb34a00665921c0c26bc59a07847331f37bc0ef75a5460fe26079bfc6bed87ef39b93f39b6bd4dea2a4b89759e1a77e64786f7d3c9ce12e6e7091ca71c3576afb000000000000000000", @ANYRES32, @ANYRES32=0x0, @ANYRESHEX=r1, @ANYRESDEC=r2], 0x5, 0x1) wait4(r1, 0x0, 0x40000000, &(0x7f0000000200)) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/tty/drivers\x00', 0x0, 0x0) read(r3, &(0x7f0000000280)=""/152, 0x20000318) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/tty/drivers\x00', 0x0, 0x0) read(r4, &(0x7f0000000280)=""/152, 0x20000318) ioctl$VIDIOC_QUERYBUF(r3, 0xc0585609, &(0x7f00000002c0)={0x0, 0x0, 0x4, 0x63d263814f78ec42, 0x401, {0x0, 0x2710}, {0x3, 0xc, 0x6, 0x0, 0x3, 0x9, "878b2cbe"}, 0x3, 0xb, @offset=0x8000, 0x400, 0x0, r4}) setsockopt$RDS_RECVERR(r5, 0x114, 0x5, &(0x7f0000000100), 0x4) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r6 = syz_open_dev$dri(&(0x7f00000001c0)='/dev/dri/card#\x00', 0x1, 0x0) mount(&(0x7f00000000c0)=ANY=[@ANYPTR64=&(0x7f0000000740)=ANY=[@ANYRESHEX=0x0, @ANYPTR, @ANYPTR64, @ANYBLOB="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", @ANYRESHEX=0x0, @ANYPTR64, @ANYRESHEX=r6, @ANYRES16=r0]], &(0x7f0000000180)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) [ 536.560631][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 536.592883][T32364] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. 02:12:08 executing program 3: r0 = socket$inet(0xa, 0x801, 0x84) sendto(r0, &(0x7f0000000080)="f5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r0, 0xfc0004) accept(r0, 0x0, 0x0) r1 = socket$inet(0xa, 0x801, 0x84) sendto(r1, &(0x7f0000000080)="d5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r1, 0xfc0004) accept(r1, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x4) writev(r2, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d36020a8447000b4e230f00006000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed5e232e725839c97b910000", 0x104}], 0x1) [ 536.769657][T32396] ceph: No path or : separator in source [ 536.777355][T32367] bond93: (slave veth265): Enslaving as an active interface with an up link [ 536.823384][T32364] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. [ 536.892681][T32396] ceph: No path or : separator in source [ 536.893167][T32399] bond93: (slave veth267): Enslaving as an active interface with an up link 02:12:08 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @remote}}) write$tun(r0, &(0x7f0000000180)={@void, @val={0x0, 0x0, 0x0, 0x2}, @mpls={[], @ipv6=@icmpv6={0x0, 0x6, "9eef7b", 0x9, 0x3c, 0x0, @remote, @mcast2, {[], @echo_request={0x80, 0x0, 0x0, 0x0, 0x0, "81"}}}}}, 0x3b) 02:12:08 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000003c0)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) syz_open_procfs(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$DRM_IOCTL_SET_MASTER(0xffffffffffffffff, 0x641e) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VHOST_SET_LOG_FD(0xffffffffffffffff, 0x4004af07, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) recvfrom$inet6(r3, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0x0) shutdown(r3, 0x1) r4 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r4, &(0x7f00000000c0), 0xfffffdda, 0x1400, 0x0, 0x0) 02:12:08 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r2 = gettid() process_vm_writev(r2, &(0x7f0000c22000)=[{&(0x7f000034afa4)=""/1, 0x1f80}], 0x2c6, &(0x7f0000c22fa0)=[{&(0x7f0000000080)=""/1, 0x2034afa5}], 0x1, 0x0) 02:12:08 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) get_mempolicy(&(0x7f00000003c0), &(0x7f0000000400), 0x289, &(0x7f0000fef000/0x10000)=nil, 0x2) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="c6566ceda4e3f1c409e9515b62be0157ec2275042709d8548cb34a00665921c0c26bc59a07847331f37bc0ef75a5460fe26079bfc6bed87ef39b93f39b6bd4dea2a4b89759e1a77e64786f7d3c9ce12e6e7091ca71c3576afb000000000000000000", @ANYRES32, @ANYRES32=0x0, @ANYRESHEX=r1, @ANYRESDEC=r2], 0x5, 0x1) wait4(r1, 0x0, 0x40000000, &(0x7f0000000200)) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/tty/drivers\x00', 0x0, 0x0) read(r3, &(0x7f0000000280)=""/152, 0x20000318) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/tty/drivers\x00', 0x0, 0x0) read(r4, &(0x7f0000000280)=""/152, 0x20000318) ioctl$VIDIOC_QUERYBUF(r3, 0xc0585609, &(0x7f00000002c0)={0x0, 0x0, 0x4, 0x63d263814f78ec42, 0x401, {0x0, 0x2710}, {0x3, 0xc, 0x6, 0x0, 0x3, 0x9, "878b2cbe"}, 0x3, 0xb, @offset=0x8000, 0x400, 0x0, r4}) setsockopt$RDS_RECVERR(r5, 0x114, 0x5, &(0x7f0000000100), 0x4) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r6 = syz_open_dev$dri(&(0x7f00000001c0)='/dev/dri/card#\x00', 0x1, 0x0) mount(&(0x7f00000000c0)=ANY=[@ANYPTR64=&(0x7f0000000740)=ANY=[@ANYRESHEX=0x0, @ANYPTR, @ANYPTR64, @ANYBLOB="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", @ANYRESHEX=0x0, @ANYPTR64, @ANYRESHEX=r6, @ANYRES16=r0]], &(0x7f0000000180)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) 02:12:08 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=ANY=[@ANYBLOB="3c00000010008506000000000000000000200000", @ANYRES32=r3, @ANYBLOB="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"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000540)={0x0, 0x3fc, &(0x7f0000000200)={&(0x7f00000008c0)=@newlink={0x50, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x50}}, 0x0) 02:12:08 executing program 3: r0 = socket$inet(0xa, 0x801, 0x84) sendto(r0, &(0x7f0000000080)="f5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r0, 0xfc0004) accept(r0, 0x0, 0x0) r1 = socket$inet(0xa, 0x801, 0x84) sendto(r1, &(0x7f0000000080)="d5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r1, 0xfc0004) accept(r1, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x4) writev(r2, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d36020a8447000b4e230f006a6400a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed5e232e725839c97b910000", 0x104}], 0x1) [ 537.487336][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 537.497270][T32518] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. [ 537.573107][T32517] ceph: No path or : separator in source 02:12:09 executing program 3: r0 = socket$inet(0xa, 0x801, 0x84) sendto(r0, &(0x7f0000000080)="f5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r0, 0xfc0004) accept(r0, 0x0, 0x0) r1 = socket$inet(0xa, 0x801, 0x84) sendto(r1, &(0x7f0000000080)="d5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r1, 0xfc0004) accept(r1, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x4) writev(r2, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d36020a8447000b4e230f00646a00a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed5e232e725839c97b910000", 0x104}], 0x1) [ 537.725504][T32517] ceph: No path or : separator in source 02:12:09 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) get_mempolicy(&(0x7f00000003c0), &(0x7f0000000400), 0x289, &(0x7f0000fef000/0x10000)=nil, 0x2) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="c6566ceda4e3f1c409e9515b62be0157ec2275042709d8548cb34a00665921c0c26bc59a07847331f37bc0ef75a5460fe26079bfc6bed87ef39b93f39b6bd4dea2a4b89759e1a77e64786f7d3c9ce12e6e7091ca71c3576afb000000000000000000", @ANYRES32, @ANYRES32=0x0, @ANYRESHEX=r1, @ANYRESDEC=r2], 0x5, 0x1) wait4(r1, 0x0, 0x40000000, &(0x7f0000000200)) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/tty/drivers\x00', 0x0, 0x0) read(r3, &(0x7f0000000280)=""/152, 0x20000318) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/tty/drivers\x00', 0x0, 0x0) read(r4, &(0x7f0000000280)=""/152, 0x20000318) ioctl$VIDIOC_QUERYBUF(r3, 0xc0585609, &(0x7f00000002c0)={0x0, 0x0, 0x4, 0x63d263814f78ec42, 0x401, {0x0, 0x2710}, {0x3, 0xc, 0x6, 0x0, 0x3, 0x9, "878b2cbe"}, 0x3, 0xb, @offset=0x8000, 0x400, 0x0, r4}) setsockopt$RDS_RECVERR(r5, 0x114, 0x5, &(0x7f0000000100), 0x4) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r6 = syz_open_dev$dri(&(0x7f00000001c0)='/dev/dri/card#\x00', 0x1, 0x0) mount(&(0x7f00000000c0)=ANY=[@ANYPTR64=&(0x7f0000000740)=ANY=[@ANYRESHEX=0x0, @ANYPTR, @ANYPTR64, @ANYBLOB="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", @ANYRESHEX=0x0, @ANYPTR64, @ANYRESHEX=r6, @ANYRES16=r0]], &(0x7f0000000180)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) [ 537.778248][T32524] bond94: (slave veth269): Enslaving as an active interface with an up link [ 537.850811][T32518] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. 02:12:09 executing program 3: r0 = socket$inet(0xa, 0x801, 0x84) sendto(r0, &(0x7f0000000080)="f5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r0, 0xfc0004) accept(r0, 0x0, 0x0) r1 = socket$inet(0xa, 0x801, 0x84) sendto(r1, &(0x7f0000000080)="d5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r1, 0xfc0004) accept(r1, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x4) writev(r2, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d36020a8447000b4e230f0000bc00a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed5e232e725839c97b910000", 0x104}], 0x1) [ 537.939193][T32524] bond94: (slave veth271): Enslaving as an active interface with an up link 02:12:09 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @remote}}) write$tun(r0, &(0x7f0000000180)={@void, @val={0x0, 0x0, 0x0, 0x3}, @mpls={[], @ipv6=@icmpv6={0x0, 0x6, "9eef7b", 0x9, 0x3c, 0x0, @remote, @mcast2, {[], @echo_request={0x80, 0x0, 0x0, 0x0, 0x0, "81"}}}}}, 0x3b) [ 538.113436][T32638] ceph: No path or : separator in source 02:12:09 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=ANY=[@ANYBLOB="3c00000010008506000000000000000000200000", @ANYRES32=r3, @ANYBLOB="fe000000000000001c0012000c000100626f6e6400000c0002000800010004000000b8aaf229d19e07fa27e19cdb41f3c39e1c530c8a20b6a9fe127726c243d7f374621b469127371bf17de09220927367b4f1296344846c3bc446955ce991bf484e3dd09935b91aa4de8a507f572a73649c4f95d6d7f9314a580c324bd6a406d53aae87a12b4588407e8ff59d05817ca2a9a3c5649653ffcca5e348e8af4e31c68b5e33d1bddafd3852cf3a31ea0c2843f7e1ff56d00261a99131dd98230bccf89e843da42c421f16c4a0f8a5a3966189d9c8b0eae35b2ae281fd146388a6beb30330de35293082f09e52361f2ba9acfc2677b569368a3f32dfc40b2ea49cfd1b1da4cddabab8889fb2167a7d1b985503375bf58a4f1f0983a1fc18f0b8a974b3372341c1ad56f39e69212b2074e9b3e90000"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000540)={0x0, 0x500, &(0x7f0000000200)={&(0x7f00000008c0)=@newlink={0x50, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x50}}, 0x0) [ 538.245156][T32638] ceph: No path or : separator in source 02:12:09 executing program 3: r0 = socket$inet(0xa, 0x801, 0x84) sendto(r0, &(0x7f0000000080)="f5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r0, 0xfc0004) accept(r0, 0x0, 0x0) r1 = socket$inet(0xa, 0x801, 0x84) sendto(r1, &(0x7f0000000080)="d5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r1, 0xfc0004) accept(r1, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x4) writev(r2, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d36020a8447000b4e230f000ec000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed5e232e725839c97b910000", 0x104}], 0x1) 02:12:09 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) get_mempolicy(&(0x7f00000003c0), &(0x7f0000000400), 0x289, &(0x7f0000fef000/0x10000)=nil, 0x2) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="c6566ceda4e3f1c409e9515b62be0157ec2275042709d8548cb34a00665921c0c26bc59a07847331f37bc0ef75a5460fe26079bfc6bed87ef39b93f39b6bd4dea2a4b89759e1a77e64786f7d3c9ce12e6e7091ca71c3576afb000000000000000000", @ANYRES32, @ANYRES32=0x0, @ANYRESHEX=r1, @ANYRESDEC=r2], 0x5, 0x1) wait4(r1, 0x0, 0x40000000, &(0x7f0000000200)) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/tty/drivers\x00', 0x0, 0x0) read(r3, &(0x7f0000000280)=""/152, 0x20000318) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/tty/drivers\x00', 0x0, 0x0) read(r4, &(0x7f0000000280)=""/152, 0x20000318) ioctl$VIDIOC_QUERYBUF(r3, 0xc0585609, &(0x7f00000002c0)={0x0, 0x0, 0x4, 0x63d263814f78ec42, 0x401, {0x0, 0x2710}, {0x3, 0xc, 0x6, 0x0, 0x3, 0x9, "878b2cbe"}, 0x3, 0xb, @offset=0x8000, 0x400, 0x0, r4}) setsockopt$RDS_RECVERR(r5, 0x114, 0x5, &(0x7f0000000100), 0x4) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r6 = syz_open_dev$dri(&(0x7f00000001c0)='/dev/dri/card#\x00', 0x1, 0x0) mount(&(0x7f00000000c0)=ANY=[@ANYPTR64=&(0x7f0000000740)=ANY=[@ANYRESHEX=0x0, @ANYPTR, @ANYPTR64, @ANYBLOB="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", @ANYRESHEX=0x0, @ANYPTR64, @ANYRESHEX=r6, @ANYRES16=r0]], &(0x7f0000000180)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) 02:12:09 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000003c0)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) syz_open_procfs(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$DRM_IOCTL_SET_MASTER(0xffffffffffffffff, 0x641e) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VHOST_SET_LOG_FD(0xffffffffffffffff, 0x4004af07, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) recvfrom$inet6(r3, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0x0) shutdown(r3, 0x1) r4 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r4, &(0x7f00000000c0), 0xfffffdda, 0x1600, 0x0, 0x0) 02:12:09 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r2 = gettid() process_vm_writev(r2, &(0x7f0000c22000)=[{&(0x7f000034afa4)=""/1, 0x1f80}], 0x2c7, &(0x7f0000c22fa0)=[{&(0x7f0000000080)=""/1, 0x2034afa5}], 0x1, 0x0) [ 538.516603][T32660] ceph: No path or : separator in source 02:12:09 executing program 3: r0 = socket$inet(0xa, 0x801, 0x84) sendto(r0, &(0x7f0000000080)="f5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r0, 0xfc0004) accept(r0, 0x0, 0x0) r1 = socket$inet(0xa, 0x801, 0x84) sendto(r1, &(0x7f0000000080)="d5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r1, 0xfc0004) accept(r1, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x4) writev(r2, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d36020a8447000b4e230f0000f000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed5e232e725839c97b910000", 0x104}], 0x1) [ 538.654234][T32660] ceph: No path or : separator in source 02:12:10 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) get_mempolicy(&(0x7f00000003c0), &(0x7f0000000400), 0x289, &(0x7f0000fef000/0x10000)=nil, 0x2) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="c6566ceda4e3f1c409e9515b62be0157ec2275042709d8548cb34a00665921c0c26bc59a07847331f37bc0ef75a5460fe26079bfc6bed87ef39b93f39b6bd4dea2a4b89759e1a77e64786f7d3c9ce12e6e7091ca71c3576afb000000000000000000", @ANYRES32, @ANYRES32=0x0, @ANYRESHEX=r1, @ANYRESDEC=r2], 0x5, 0x1) wait4(r1, 0x0, 0x40000000, &(0x7f0000000200)) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/tty/drivers\x00', 0x0, 0x0) read(r3, &(0x7f0000000280)=""/152, 0x20000318) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/tty/drivers\x00', 0x0, 0x0) read(r4, &(0x7f0000000280)=""/152, 0x20000318) ioctl$VIDIOC_QUERYBUF(r3, 0xc0585609, &(0x7f00000002c0)={0x0, 0x0, 0x4, 0x63d263814f78ec42, 0x401, {0x0, 0x2710}, {0x3, 0xc, 0x6, 0x0, 0x3, 0x9, "878b2cbe"}, 0x3, 0xb, @offset=0x8000, 0x400, 0x0, r4}) setsockopt$RDS_RECVERR(r5, 0x114, 0x5, &(0x7f0000000100), 0x4) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r6 = syz_open_dev$dri(&(0x7f00000001c0)='/dev/dri/card#\x00', 0x1, 0x0) mount(&(0x7f00000000c0)=ANY=[@ANYPTR64=&(0x7f0000000740)=ANY=[@ANYRESHEX=0x0, @ANYPTR, @ANYPTR64, @ANYBLOB="974d3ab47b3b91beb0f4760669c8618bc33664faf9c8179efd568e4e4b38f30869aefe10a4ccb1c515487e645b4a11d7cd2fb39aa1efca7c1eb441141d2be4c165ca7304c2e94159863dcfcf75da45211fdd143b6c91d52ae9ac6a1c2f8173d8ee5682fc65a93dc45ead4a462d9e16ac3dff144c0fcc7d02fcf3fd3029b264f3550caaab22152365126be74a9ff91547eb273f83f2c2762b17b32d7d91ac013d6f5790d3bc09c1884d8c7f15be223a8c3b4e37186c641bc3501ca145f05e49aae1613402448c49a36a9b0055a9d5cc74edda0087d65f15d71e4e051cad208514ee99b6258f827a895d2eb4407e6b7b7a9d6bcc228e615d78a6a8b2c466d96a48ee2c7a736035e283917293271efdc7cbdf0a647917068ab197eec326359f829087bafd0fd95e5fcf645615f55040a847aab188c52f4dd3f61a15b2edfe22e6221a5b0b256f1d8da1e6b860b7c68213cc1fae88c0e86013d9000085216c3ee1ab6fd509500f038480929e335b4b3bb0150f881b831cc870de6d188bdd45a113989bc9d15fe2893ff94349", @ANYRESHEX=0x0, @ANYPTR64, @ANYRESHEX=r6, @ANYRES16=r0]], &(0x7f0000000180)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) [ 538.749407][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 02:12:10 executing program 3: r0 = socket$inet(0xa, 0x801, 0x84) sendto(r0, &(0x7f0000000080)="f5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r0, 0xfc0004) accept(r0, 0x0, 0x0) r1 = socket$inet(0xa, 0x801, 0x84) sendto(r1, &(0x7f0000000080)="d5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r1, 0xfc0004) accept(r1, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x4) writev(r2, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d36020a8447000b4e230f00000200a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed5e232e725839c97b910000", 0x104}], 0x1) [ 538.971340][T32684] ceph: No path or : separator in source [ 539.034950][T32661] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. 02:12:10 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) get_mempolicy(&(0x7f00000003c0), &(0x7f0000000400), 0x289, &(0x7f0000fef000/0x10000)=nil, 0x2) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="c6566ceda4e3f1c409e9515b62be0157ec2275042709d8548cb34a00665921c0c26bc59a07847331f37bc0ef75a5460fe26079bfc6bed87ef39b93f39b6bd4dea2a4b89759e1a77e64786f7d3c9ce12e6e7091ca71c3576afb000000000000000000", @ANYRES32, @ANYRES32=0x0, @ANYRESHEX=r1, @ANYRESDEC=r2], 0x5, 0x1) wait4(r1, 0x0, 0x40000000, &(0x7f0000000200)) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/tty/drivers\x00', 0x0, 0x0) read(r3, &(0x7f0000000280)=""/152, 0x20000318) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/tty/drivers\x00', 0x0, 0x0) read(r4, &(0x7f0000000280)=""/152, 0x20000318) ioctl$VIDIOC_QUERYBUF(r3, 0xc0585609, &(0x7f00000002c0)={0x0, 0x0, 0x4, 0x63d263814f78ec42, 0x401, {0x0, 0x2710}, {0x3, 0xc, 0x6, 0x0, 0x3, 0x9, "878b2cbe"}, 0x3, 0xb, @offset=0x8000, 0x400, 0x0, r4}) setsockopt$RDS_RECVERR(r5, 0x114, 0x5, &(0x7f0000000100), 0x4) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r6 = syz_open_dev$dri(&(0x7f00000001c0)='/dev/dri/card#\x00', 0x1, 0x0) mount(&(0x7f00000000c0)=ANY=[@ANYPTR64=&(0x7f0000000740)=ANY=[@ANYRESHEX=0x0, @ANYPTR, @ANYPTR64, @ANYBLOB="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", @ANYRESHEX=0x0, @ANYPTR64, @ANYRESHEX=r6, @ANYRES16=r0]], &(0x7f0000000180)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) [ 539.088081][T32684] ceph: No path or : separator in source 02:12:10 executing program 3: r0 = socket$inet(0xa, 0x801, 0x84) sendto(r0, &(0x7f0000000080)="f5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r0, 0xfc0004) accept(r0, 0x0, 0x0) r1 = socket$inet(0xa, 0x801, 0x84) sendto(r1, &(0x7f0000000080)="d5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r1, 0xfc0004) accept(r1, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x4) writev(r2, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d36020a8447000b4e230f00000400a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed5e232e725839c97b910000", 0x104}], 0x1) [ 539.218673][T32694] ceph: No path or : separator in source [ 539.264356][T32664] bond95: (slave veth273): Enslaving as an active interface with an up link 02:12:10 executing program 3: r0 = socket$inet(0xa, 0x801, 0x84) sendto(r0, &(0x7f0000000080)="f5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r0, 0xfc0004) accept(r0, 0x0, 0x0) r1 = socket$inet(0xa, 0x801, 0x84) sendto(r1, &(0x7f0000000080)="d5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r1, 0xfc0004) accept(r1, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x4) writev(r2, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d36020a8447000b4e230f00000a00a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed5e232e725839c97b910000", 0x104}], 0x1) [ 539.413673][T32661] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. [ 539.440056][T32694] ceph: No path or : separator in source [ 539.522331][T32701] bond95: (slave veth275): Enslaving as an active interface with an up link [ 539.559916][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 02:12:11 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @remote}}) write$tun(r0, &(0x7f0000000180)={@void, @val={0x0, 0x0, 0x0, 0x4}, @mpls={[], @ipv6=@icmpv6={0x0, 0x6, "9eef7b", 0x9, 0x3c, 0x0, @remote, @mcast2, {[], @echo_request={0x80, 0x0, 0x0, 0x0, 0x0, "81"}}}}}, 0x3b) 02:12:11 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) get_mempolicy(&(0x7f00000003c0), &(0x7f0000000400), 0x289, &(0x7f0000fef000/0x10000)=nil, 0x2) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="c6566ceda4e3f1c409e9515b62be0157ec2275042709d8548cb34a00665921c0c26bc59a07847331f37bc0ef75a5460fe26079bfc6bed87ef39b93f39b6bd4dea2a4b89759e1a77e64786f7d3c9ce12e6e7091ca71c3576afb000000000000000000", @ANYRES32, @ANYRES32=0x0, @ANYRESHEX=r1, @ANYRESDEC=r2], 0x5, 0x1) wait4(r1, 0x0, 0x40000000, &(0x7f0000000200)) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/tty/drivers\x00', 0x0, 0x0) read(r3, &(0x7f0000000280)=""/152, 0x20000318) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/tty/drivers\x00', 0x0, 0x0) read(r4, &(0x7f0000000280)=""/152, 0x20000318) ioctl$VIDIOC_QUERYBUF(r3, 0xc0585609, &(0x7f00000002c0)={0x0, 0x0, 0x4, 0x63d263814f78ec42, 0x401, {0x0, 0x2710}, {0x3, 0xc, 0x6, 0x0, 0x3, 0x9, "878b2cbe"}, 0x3, 0xb, @offset=0x8000, 0x400, 0x0, r4}) setsockopt$RDS_RECVERR(r5, 0x114, 0x5, &(0x7f0000000100), 0x4) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r6 = syz_open_dev$dri(&(0x7f00000001c0)='/dev/dri/card#\x00', 0x1, 0x0) mount(&(0x7f00000000c0)=ANY=[@ANYPTR64=&(0x7f0000000740)=ANY=[@ANYRESHEX=0x0, @ANYPTR, @ANYPTR64, @ANYBLOB="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", @ANYRESHEX=0x0, @ANYPTR64, @ANYRESHEX=r6, @ANYRES16=r0]], &(0x7f0000000180)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) 02:12:11 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=ANY=[@ANYBLOB="3c00000010008506000000000000000000200000", @ANYRES32=r3, @ANYBLOB="fe000000000000001c0012000c000100626f6e6400000c0002000800010004000000b8aaf229d19e07fa27e19cdb41f3c39e1c530c8a20b6a9fe127726c243d7f374621b469127371bf17de09220927367b4f1296344846c3bc446955ce991bf484e3dd09935b91aa4de8a507f572a73649c4f95d6d7f9314a580c324bd6a406d53aae87a12b4588407e8ff59d05817ca2a9a3c5649653ffcca5e348e8af4e31c68b5e33d1bddafd3852cf3a31ea0c2843f7e1ff56d00261a99131dd98230bccf89e843da42c421f16c4a0f8a5a3966189d9c8b0eae35b2ae281fd146388a6beb30330de35293082f09e52361f2ba9acfc2677b569368a3f32dfc40b2ea49cfd1b1da4cddabab8889fb2167a7d1b985503375bf58a4f1f0983a1fc18f0b8a974b3372341c1ad56f39e69212b2074e9b3e90000"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000540)={0x0, 0x511, &(0x7f0000000200)={&(0x7f00000008c0)=@newlink={0x50, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x50}}, 0x0) 02:12:11 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000003c0)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) syz_open_procfs(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$DRM_IOCTL_SET_MASTER(0xffffffffffffffff, 0x641e) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VHOST_SET_LOG_FD(0xffffffffffffffff, 0x4004af07, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) recvfrom$inet6(r3, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0x0) shutdown(r3, 0x1) r4 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r4, &(0x7f00000000c0), 0xfffffdda, 0x1a00, 0x0, 0x0) 02:12:11 executing program 3: r0 = socket$inet(0xa, 0x801, 0x84) sendto(r0, &(0x7f0000000080)="f5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r0, 0xfc0004) accept(r0, 0x0, 0x0) r1 = socket$inet(0xa, 0x801, 0x84) sendto(r1, &(0x7f0000000080)="d5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r1, 0xfc0004) accept(r1, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x4) writev(r2, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d36020a8447000b4e230f00000e00a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed5e232e725839c97b910000", 0x104}], 0x1) 02:12:11 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r2 = gettid() process_vm_writev(r2, &(0x7f0000c22000)=[{&(0x7f000034afa4)=""/1, 0x1f80}], 0x2c8, &(0x7f0000c22fa0)=[{&(0x7f0000000080)=""/1, 0x2034afa5}], 0x1, 0x0) [ 540.069137][ T359] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. [ 540.096157][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 02:12:11 executing program 3: r0 = socket$inet(0xa, 0x801, 0x84) sendto(r0, &(0x7f0000000080)="f5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r0, 0xfc0004) accept(r0, 0x0, 0x0) r1 = socket$inet(0xa, 0x801, 0x84) sendto(r1, &(0x7f0000000080)="d5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r1, 0xfc0004) accept(r1, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x4) writev(r2, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d36020a8447000b4e230f00000f00a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed5e232e725839c97b910000", 0x104}], 0x1) [ 540.301898][ T357] ceph: No path or : separator in source [ 540.311957][ T359] bond96: (slave veth277): Enslaving as an active interface with an up link [ 540.356616][ T359] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. 02:12:11 executing program 3: r0 = socket$inet(0xa, 0x801, 0x84) sendto(r0, &(0x7f0000000080)="f5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r0, 0xfc0004) accept(r0, 0x0, 0x0) r1 = socket$inet(0xa, 0x801, 0x84) sendto(r1, &(0x7f0000000080)="d5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r1, 0xfc0004) accept(r1, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x4) writev(r2, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d36020a8447000b4e230f00006000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed5e232e725839c97b910000", 0x104}], 0x1) [ 540.454926][ T473] bond96: (slave veth279): Enslaving as an active interface with an up link 02:12:11 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @remote}}) write$tun(r0, &(0x7f0000000180)={@void, @val={0x0, 0x0, 0x0, 0x5}, @mpls={[], @ipv6=@icmpv6={0x0, 0x6, "9eef7b", 0x9, 0x3c, 0x0, @remote, @mcast2, {[], @echo_request={0x80, 0x0, 0x0, 0x0, 0x0, "81"}}}}}, 0x3b) 02:12:11 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=ANY=[@ANYBLOB="3c00000010008506000000000000000000200000", @ANYRES32=r3, @ANYBLOB="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"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000540)={0x0, 0x600, &(0x7f0000000200)={&(0x7f00000008c0)=@newlink={0x50, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x50}}, 0x0) 02:12:12 executing program 3: r0 = socket$inet(0xa, 0x801, 0x84) sendto(r0, &(0x7f0000000080)="f5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r0, 0xfc0004) accept(r0, 0x0, 0x0) r1 = socket$inet(0xa, 0x801, 0x84) sendto(r1, &(0x7f0000000080)="d5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r1, 0xfc0004) accept(r1, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x4) writev(r2, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d36020a8447000b4e230f0000bc00a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed5e232e725839c97b910000", 0x104}], 0x1) [ 540.710533][ T357] ceph: No path or : separator in source [ 540.721155][ T485] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. 02:12:12 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) get_mempolicy(&(0x7f00000003c0), &(0x7f0000000400), 0x289, &(0x7f0000fef000/0x10000)=nil, 0x2) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="c6566ceda4e3f1c409e9515b62be0157ec2275042709d8548cb34a00665921c0c26bc59a07847331f37bc0ef75a5460fe26079bfc6bed87ef39b93f39b6bd4dea2a4b89759e1a77e64786f7d3c9ce12e6e7091ca71c3576afb000000000000000000", @ANYRES32, @ANYRES32=0x0, @ANYRESHEX=r1, @ANYRESDEC=r2], 0x5, 0x1) wait4(r1, 0x0, 0x40000000, &(0x7f0000000200)) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/tty/drivers\x00', 0x0, 0x0) read(r3, &(0x7f0000000280)=""/152, 0x20000318) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/tty/drivers\x00', 0x0, 0x0) read(r4, &(0x7f0000000280)=""/152, 0x20000318) ioctl$VIDIOC_QUERYBUF(r3, 0xc0585609, &(0x7f00000002c0)={0x0, 0x0, 0x4, 0x63d263814f78ec42, 0x401, {0x0, 0x2710}, {0x3, 0xc, 0x6, 0x0, 0x3, 0x9, "878b2cbe"}, 0x3, 0xb, @offset=0x8000, 0x400, 0x0, r4}) setsockopt$RDS_RECVERR(r5, 0x114, 0x5, &(0x7f0000000100), 0x4) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r6 = syz_open_dev$dri(&(0x7f00000001c0)='/dev/dri/card#\x00', 0x1, 0x0) mount(&(0x7f00000000c0)=ANY=[@ANYPTR64=&(0x7f0000000740)=ANY=[@ANYRESHEX=0x0, @ANYPTR, @ANYPTR64, @ANYBLOB="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", @ANYRESHEX=0x0, @ANYPTR64, @ANYRESHEX=r6, @ANYRES16=r0]], &(0x7f0000000180)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) [ 540.852713][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 02:12:12 executing program 3: r0 = socket$inet(0xa, 0x801, 0x84) sendto(r0, &(0x7f0000000080)="f5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r0, 0xfc0004) accept(r0, 0x0, 0x0) r1 = socket$inet(0xa, 0x801, 0x84) sendto(r1, &(0x7f0000000080)="d5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r1, 0xfc0004) accept(r1, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x4) writev(r2, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d36020a8447000b4e230f0000f000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed5e232e725839c97b910000", 0x104}], 0x1) [ 540.987952][ T496] ceph: No path or : separator in source 02:12:12 executing program 3: r0 = socket$inet(0xa, 0x801, 0x84) sendto(r0, &(0x7f0000000080)="f5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r0, 0xfc0004) accept(r0, 0x0, 0x0) r1 = socket$inet(0xa, 0x801, 0x84) sendto(r1, &(0x7f0000000080)="d5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r1, 0xfc0004) accept(r1, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x4) writev(r2, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d36020a8447000b4e230f00001f04a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed5e232e725839c97b910000", 0x104}], 0x1) 02:12:12 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) get_mempolicy(&(0x7f00000003c0), &(0x7f0000000400), 0x289, &(0x7f0000fef000/0x10000)=nil, 0x2) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="c6566ceda4e3f1c409e9515b62be0157ec2275042709d8548cb34a00665921c0c26bc59a07847331f37bc0ef75a5460fe26079bfc6bed87ef39b93f39b6bd4dea2a4b89759e1a77e64786f7d3c9ce12e6e7091ca71c3576afb000000000000000000", @ANYRES32, @ANYRES32=0x0, @ANYRESHEX=r1, @ANYRESDEC=r2], 0x5, 0x1) wait4(r1, 0x0, 0x40000000, &(0x7f0000000200)) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/tty/drivers\x00', 0x0, 0x0) read(r3, &(0x7f0000000280)=""/152, 0x20000318) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/tty/drivers\x00', 0x0, 0x0) read(r4, &(0x7f0000000280)=""/152, 0x20000318) ioctl$VIDIOC_QUERYBUF(r3, 0xc0585609, &(0x7f00000002c0)={0x0, 0x0, 0x4, 0x63d263814f78ec42, 0x401, {0x0, 0x2710}, {0x3, 0xc, 0x6, 0x0, 0x3, 0x9, "878b2cbe"}, 0x3, 0xb, @offset=0x8000, 0x400, 0x0, r4}) setsockopt$RDS_RECVERR(r5, 0x114, 0x5, &(0x7f0000000100), 0x4) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r6 = syz_open_dev$dri(&(0x7f00000001c0)='/dev/dri/card#\x00', 0x1, 0x0) mount(&(0x7f00000000c0)=ANY=[@ANYPTR64=&(0x7f0000000740)=ANY=[@ANYRESHEX=0x0, @ANYPTR, @ANYPTR64, @ANYBLOB="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", @ANYRESHEX=0x0, @ANYPTR64, @ANYRESHEX=r6, @ANYRES16=r0]], &(0x7f0000000180)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) [ 541.159256][ T496] ceph: No path or : separator in source [ 541.427733][ T510] ceph: No path or : separator in source [ 541.512480][ T510] ceph: No path or : separator in source [ 541.515929][ T487] bond97: (slave veth281): Enslaving as an active interface with an up link [ 541.545886][ T485] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. 02:12:12 executing program 3: r0 = socket$inet(0xa, 0x801, 0x84) sendto(r0, &(0x7f0000000080)="f5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r0, 0xfc0004) accept(r0, 0x0, 0x0) r1 = socket$inet(0xa, 0x801, 0x84) sendto(r1, &(0x7f0000000080)="d5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r1, 0xfc0004) accept(r1, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x4) writev(r2, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d36020a8447000b4e230f0000000aa2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed5e232e725839c97b910000", 0x104}], 0x1) 02:12:12 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) get_mempolicy(&(0x7f00000003c0), &(0x7f0000000400), 0x289, &(0x7f0000fef000/0x10000)=nil, 0x2) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="c6566ceda4e3f1c409e9515b62be0157ec2275042709d8548cb34a00665921c0c26bc59a07847331f37bc0ef75a5460fe26079bfc6bed87ef39b93f39b6bd4dea2a4b89759e1a77e64786f7d3c9ce12e6e7091ca71c3576afb000000000000000000", @ANYRES32, @ANYRES32=0x0, @ANYRESHEX=r1, @ANYRESDEC=r2], 0x5, 0x1) wait4(r1, 0x0, 0x40000000, &(0x7f0000000200)) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/tty/drivers\x00', 0x0, 0x0) read(r3, &(0x7f0000000280)=""/152, 0x20000318) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/tty/drivers\x00', 0x0, 0x0) read(r4, &(0x7f0000000280)=""/152, 0x20000318) ioctl$VIDIOC_QUERYBUF(r3, 0xc0585609, &(0x7f00000002c0)={0x0, 0x0, 0x4, 0x63d263814f78ec42, 0x401, {0x0, 0x2710}, {0x3, 0xc, 0x6, 0x0, 0x3, 0x9, "878b2cbe"}, 0x3, 0xb, @offset=0x8000, 0x400, 0x0, r4}) setsockopt$RDS_RECVERR(r5, 0x114, 0x5, &(0x7f0000000100), 0x4) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r6 = syz_open_dev$dri(&(0x7f00000001c0)='/dev/dri/card#\x00', 0x1, 0x0) mount(&(0x7f00000000c0)=ANY=[@ANYPTR64=&(0x7f0000000740)=ANY=[@ANYRESHEX=0x0, @ANYPTR, @ANYPTR64, @ANYBLOB="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", @ANYRESHEX=0x0, @ANYPTR64, @ANYRESHEX=r6, @ANYRES16=r0]], &(0x7f0000000180)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) [ 541.594865][ T518] bond97: (slave veth283): Enslaving as an active interface with an up link 02:12:13 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r2 = gettid() process_vm_writev(r2, &(0x7f0000c22000)=[{&(0x7f000034afa4)=""/1, 0x1f80}], 0x2c9, &(0x7f0000c22fa0)=[{&(0x7f0000000080)=""/1, 0x2034afa5}], 0x1, 0x0) 02:12:13 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000003c0)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) syz_open_procfs(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$DRM_IOCTL_SET_MASTER(0xffffffffffffffff, 0x641e) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VHOST_SET_LOG_FD(0xffffffffffffffff, 0x4004af07, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) recvfrom$inet6(r3, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0x0) shutdown(r3, 0x1) r4 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r4, &(0x7f00000000c0), 0xfffffdda, 0x1b00, 0x0, 0x0) 02:12:13 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=ANY=[@ANYBLOB="3c00000010008506000000000000000000200000", @ANYRES32=r3, @ANYBLOB="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"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000540)={0x0, 0x700, &(0x7f0000000200)={&(0x7f00000008c0)=@newlink={0x50, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x50}}, 0x0) [ 541.840757][ T603] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. [ 541.905516][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 541.914801][ T571] ceph: No path or : separator in source [ 541.982247][ T571] ceph: No path or : separator in source [ 542.013409][ T635] bond98: (slave veth285): Enslaving as an active interface with an up link [ 542.190547][ T603] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. 02:12:13 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @remote}}) write$tun(r0, &(0x7f0000000180)={@void, @val={0x0, 0x0, 0x0, 0x6}, @mpls={[], @ipv6=@icmpv6={0x0, 0x6, "9eef7b", 0x9, 0x3c, 0x0, @remote, @mcast2, {[], @echo_request={0x80, 0x0, 0x0, 0x0, 0x0, "81"}}}}}, 0x3b) 02:12:13 executing program 3: r0 = socket$inet(0xa, 0x801, 0x84) sendto(r0, &(0x7f0000000080)="f5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r0, 0xfc0004) accept(r0, 0x0, 0x0) r1 = socket$inet(0xa, 0x801, 0x84) sendto(r1, &(0x7f0000000080)="d5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r1, 0xfc0004) accept(r1, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x4) writev(r2, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d36020a8447000b4e230f0000000ea2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed5e232e725839c97b910000", 0x104}], 0x1) 02:12:13 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) get_mempolicy(&(0x7f00000003c0), &(0x7f0000000400), 0x289, &(0x7f0000fef000/0x10000)=nil, 0x2) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="c6566ceda4e3f1c409e9515b62be0157ec2275042709d8548cb34a00665921c0c26bc59a07847331f37bc0ef75a5460fe26079bfc6bed87ef39b93f39b6bd4dea2a4b89759e1a77e64786f7d3c9ce12e6e7091ca71c3576afb000000000000000000", @ANYRES32, @ANYRES32=0x0, @ANYRESHEX=r1, @ANYRESDEC=r2], 0x5, 0x1) wait4(r1, 0x0, 0x40000000, &(0x7f0000000200)) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/tty/drivers\x00', 0x0, 0x0) read(r3, &(0x7f0000000280)=""/152, 0x20000318) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/tty/drivers\x00', 0x0, 0x0) read(r4, &(0x7f0000000280)=""/152, 0x20000318) ioctl$VIDIOC_QUERYBUF(r3, 0xc0585609, &(0x7f00000002c0)={0x0, 0x0, 0x4, 0x63d263814f78ec42, 0x401, {0x0, 0x2710}, {0x3, 0xc, 0x6, 0x0, 0x3, 0x9, "878b2cbe"}, 0x3, 0xb, @offset=0x8000, 0x400, 0x0, r4}) setsockopt$RDS_RECVERR(r5, 0x114, 0x5, &(0x7f0000000100), 0x4) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r6 = syz_open_dev$dri(&(0x7f00000001c0)='/dev/dri/card#\x00', 0x1, 0x0) mount(&(0x7f00000000c0)=ANY=[@ANYPTR64=&(0x7f0000000740)=ANY=[@ANYRESHEX=0x0, @ANYPTR, @ANYPTR64, @ANYBLOB="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", @ANYRESHEX=0x0, @ANYPTR64, @ANYRESHEX=r6, @ANYRES16=r0]], &(0x7f0000000180)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) [ 542.242914][ T635] bond98: (slave veth287): Enslaving as an active interface with an up link 02:12:13 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=ANY=[@ANYBLOB="3c00000010008506000000000000000000200000", @ANYRES32=r3, @ANYBLOB="fe000000000000001c0012000c000100626f6e6400000c0002000800010004000000b8aaf229d19e07fa27e19cdb41f3c39e1c530c8a20b6a9fe127726c243d7f374621b469127371bf17de09220927367b4f1296344846c3bc446955ce991bf484e3dd09935b91aa4de8a507f572a73649c4f95d6d7f9314a580c324bd6a406d53aae87a12b4588407e8ff59d05817ca2a9a3c5649653ffcca5e348e8af4e31c68b5e33d1bddafd3852cf3a31ea0c2843f7e1ff56d00261a99131dd98230bccf89e843da42c421f16c4a0f8a5a3966189d9c8b0eae35b2ae281fd146388a6beb30330de35293082f09e52361f2ba9acfc2677b569368a3f32dfc40b2ea49cfd1b1da4cddabab8889fb2167a7d1b985503375bf58a4f1f0983a1fc18f0b8a974b3372341c1ad56f39e69212b2074e9b3e90000"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000540)={0x0, 0x900, &(0x7f0000000200)={&(0x7f00000008c0)=@newlink={0x50, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x50}}, 0x0) 02:12:13 executing program 3: r0 = socket$inet(0xa, 0x801, 0x84) sendto(r0, &(0x7f0000000080)="f5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r0, 0xfc0004) accept(r0, 0x0, 0x0) r1 = socket$inet(0xa, 0x801, 0x84) sendto(r1, &(0x7f0000000080)="d5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r1, 0xfc0004) accept(r1, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x4) writev(r2, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d36020a8447000b4e230f0000c00ea2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed5e232e725839c97b910000", 0x104}], 0x1) [ 542.480384][ T648] ceph: No path or : separator in source 02:12:13 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r2 = gettid() process_vm_writev(r2, &(0x7f0000c22000)=[{&(0x7f000034afa4)=""/1, 0x1f80}], 0x2ca, &(0x7f0000c22fa0)=[{&(0x7f0000000080)=""/1, 0x2034afa5}], 0x1, 0x0) [ 542.623982][ T648] ceph: No path or : separator in source 02:12:14 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) get_mempolicy(&(0x7f00000003c0), &(0x7f0000000400), 0x289, &(0x7f0000fef000/0x10000)=nil, 0x2) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="c6566ceda4e3f1c409e9515b62be0157ec2275042709d8548cb34a00665921c0c26bc59a07847331f37bc0ef75a5460fe26079bfc6bed87ef39b93f39b6bd4dea2a4b89759e1a77e64786f7d3c9ce12e6e7091ca71c3576afb000000000000000000", @ANYRES32, @ANYRES32=0x0, @ANYRESHEX=r1, @ANYRESDEC=r2], 0x5, 0x1) wait4(r1, 0x0, 0x40000000, &(0x7f0000000200)) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/tty/drivers\x00', 0x0, 0x0) read(r3, &(0x7f0000000280)=""/152, 0x20000318) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/tty/drivers\x00', 0x0, 0x0) read(r4, &(0x7f0000000280)=""/152, 0x20000318) ioctl$VIDIOC_QUERYBUF(r3, 0xc0585609, &(0x7f00000002c0)={0x0, 0x0, 0x4, 0x63d263814f78ec42, 0x401, {0x0, 0x2710}, {0x3, 0xc, 0x6, 0x0, 0x3, 0x9, "878b2cbe"}, 0x3, 0xb, @offset=0x8000, 0x400, 0x0, r4}) setsockopt$RDS_RECVERR(r5, 0x114, 0x5, &(0x7f0000000100), 0x4) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r6 = syz_open_dev$dri(&(0x7f00000001c0)='/dev/dri/card#\x00', 0x1, 0x0) mount(&(0x7f00000000c0)=ANY=[@ANYPTR64=&(0x7f0000000740)=ANY=[@ANYRESHEX=0x0, @ANYPTR, @ANYPTR64, @ANYBLOB="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", @ANYRESHEX=0x0, @ANYPTR64, @ANYRESHEX=r6, @ANYRES16=r0]], &(0x7f0000000180)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) 02:12:14 executing program 3: r0 = socket$inet(0xa, 0x801, 0x84) sendto(r0, &(0x7f0000000080)="f5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r0, 0xfc0004) accept(r0, 0x0, 0x0) r1 = socket$inet(0xa, 0x801, 0x84) sendto(r1, &(0x7f0000000080)="d5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r1, 0xfc0004) accept(r1, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x4) writev(r2, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d36020a8447000b4e230f0000000fa2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed5e232e725839c97b910000", 0x104}], 0x1) [ 542.898757][ T670] ceph: No path or : separator in source 02:12:14 executing program 3: r0 = socket$inet(0xa, 0x801, 0x84) sendto(r0, &(0x7f0000000080)="f5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r0, 0xfc0004) accept(r0, 0x0, 0x0) r1 = socket$inet(0xa, 0x801, 0x84) sendto(r1, &(0x7f0000000080)="d5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r1, 0xfc0004) accept(r1, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x4) writev(r2, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d36020a8447000b4e230f0000041fa2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed5e232e725839c97b910000", 0x104}], 0x1) [ 543.025154][ T656] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. [ 543.048800][ T670] ceph: No path or : separator in source 02:12:14 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) get_mempolicy(&(0x7f00000003c0), &(0x7f0000000400), 0x289, &(0x7f0000fef000/0x10000)=nil, 0x2) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="c6566ceda4e3f1c409e9515b62be0157ec2275042709d8548cb34a00665921c0c26bc59a07847331f37bc0ef75a5460fe26079bfc6bed87ef39b93f39b6bd4dea2a4b89759e1a77e64786f7d3c9ce12e6e7091ca71c3576afb000000000000000000", @ANYRES32, @ANYRES32=0x0, @ANYRESHEX=r1, @ANYRESDEC=r2], 0x5, 0x1) wait4(r1, 0x0, 0x40000000, &(0x7f0000000200)) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/tty/drivers\x00', 0x0, 0x0) read(r3, &(0x7f0000000280)=""/152, 0x20000318) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/tty/drivers\x00', 0x0, 0x0) read(r4, &(0x7f0000000280)=""/152, 0x20000318) ioctl$VIDIOC_QUERYBUF(r3, 0xc0585609, &(0x7f00000002c0)={0x0, 0x0, 0x4, 0x63d263814f78ec42, 0x401, {0x0, 0x2710}, {0x3, 0xc, 0x6, 0x0, 0x3, 0x9, "878b2cbe"}, 0x3, 0xb, @offset=0x8000, 0x400, 0x0, r4}) setsockopt$RDS_RECVERR(r5, 0x114, 0x5, &(0x7f0000000100), 0x4) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r6 = syz_open_dev$dri(&(0x7f00000001c0)='/dev/dri/card#\x00', 0x1, 0x0) mount(&(0x7f00000000c0)=ANY=[@ANYPTR64=&(0x7f0000000740)=ANY=[@ANYRESHEX=0x0, @ANYPTR, @ANYPTR64, @ANYBLOB="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", @ANYRESHEX=0x0, @ANYPTR64, @ANYRESHEX=r6, @ANYRES16=r0]], &(0x7f0000000180)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) [ 543.184965][ T658] bond99: (slave veth289): Enslaving as an active interface with an up link 02:12:14 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000003c0)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) syz_open_procfs(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$DRM_IOCTL_SET_MASTER(0xffffffffffffffff, 0x641e) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VHOST_SET_LOG_FD(0xffffffffffffffff, 0x4004af07, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) recvfrom$inet6(r3, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0x0) shutdown(r3, 0x1) r4 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r4, &(0x7f00000000c0), 0xfffffdda, 0x1c00, 0x0, 0x0) [ 543.293874][ T656] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. [ 543.395586][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 02:12:14 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=ANY=[@ANYBLOB="3c00000010008506000000000000000000200000", @ANYRES32=r3, @ANYBLOB="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"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000540)={0x0, 0xa00, &(0x7f0000000200)={&(0x7f00000008c0)=@newlink={0x50, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x50}}, 0x0) [ 543.446316][ T682] ceph: No path or : separator in source [ 543.572794][ T682] ceph: No path or : separator in source [ 543.580725][ T796] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. [ 543.658767][ T798] bond100: (slave veth291): Enslaving as an active interface with an up link [ 543.677813][ T796] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. [ 543.703259][ T798] bond100: (slave veth293): Enslaving as an active interface with an up link 02:12:15 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @remote}}) write$tun(r0, &(0x7f0000000180)={@void, @val={0x0, 0x0, 0x0, 0x7}, @mpls={[], @ipv6=@icmpv6={0x0, 0x6, "9eef7b", 0x9, 0x3c, 0x0, @remote, @mcast2, {[], @echo_request={0x80, 0x0, 0x0, 0x0, 0x0, "81"}}}}}, 0x3b) 02:12:15 executing program 3: r0 = socket$inet(0xa, 0x801, 0x84) sendto(r0, &(0x7f0000000080)="f5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r0, 0xfc0004) accept(r0, 0x0, 0x0) r1 = socket$inet(0xa, 0x801, 0x84) sendto(r1, &(0x7f0000000080)="d5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r1, 0xfc0004) accept(r1, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x4) writev(r2, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d36020a8447000b4e230f0000003fa2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed5e232e725839c97b910000", 0x104}], 0x1) 02:12:15 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) get_mempolicy(&(0x7f00000003c0), &(0x7f0000000400), 0x289, &(0x7f0000fef000/0x10000)=nil, 0x2) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="c6566ceda4e3f1c409e9515b62be0157ec2275042709d8548cb34a00665921c0c26bc59a07847331f37bc0ef75a5460fe26079bfc6bed87ef39b93f39b6bd4dea2a4b89759e1a77e64786f7d3c9ce12e6e7091ca71c3576afb000000000000000000", @ANYRES32, @ANYRES32=0x0, @ANYRESHEX=r1, @ANYRESDEC=r2], 0x5, 0x1) wait4(r1, 0x0, 0x40000000, &(0x7f0000000200)) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/tty/drivers\x00', 0x0, 0x0) read(r3, &(0x7f0000000280)=""/152, 0x20000318) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/tty/drivers\x00', 0x0, 0x0) read(r4, &(0x7f0000000280)=""/152, 0x20000318) ioctl$VIDIOC_QUERYBUF(r3, 0xc0585609, &(0x7f00000002c0)={0x0, 0x0, 0x4, 0x63d263814f78ec42, 0x401, {0x0, 0x2710}, {0x3, 0xc, 0x6, 0x0, 0x3, 0x9, "878b2cbe"}, 0x3, 0xb, @offset=0x8000, 0x400, 0x0, r4}) setsockopt$RDS_RECVERR(r5, 0x114, 0x5, &(0x7f0000000100), 0x4) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r6 = syz_open_dev$dri(&(0x7f00000001c0)='/dev/dri/card#\x00', 0x1, 0x0) mount(&(0x7f00000000c0)=ANY=[@ANYPTR64=&(0x7f0000000740)=ANY=[@ANYRESHEX=0x0, @ANYPTR, @ANYPTR64, @ANYBLOB="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", @ANYRESHEX=0x0, @ANYPTR64, @ANYRESHEX=r6, @ANYRES16=r0]], &(0x7f0000000180)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) 02:12:15 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=ANY=[@ANYBLOB="3c00000010008506000000000000000000200000", @ANYRES32=r3, @ANYBLOB="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"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000540)={0x0, 0xb00, &(0x7f0000000200)={&(0x7f00000008c0)=@newlink={0x50, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x50}}, 0x0) 02:12:15 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r2 = gettid() process_vm_writev(r2, &(0x7f0000c22000)=[{&(0x7f000034afa4)=""/1, 0x1f80}], 0x2cb, &(0x7f0000c22fa0)=[{&(0x7f0000000080)=""/1, 0x2034afa5}], 0x1, 0x0) [ 543.843550][ T805] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. 02:12:15 executing program 3: r0 = socket$inet(0xa, 0x801, 0x84) sendto(r0, &(0x7f0000000080)="f5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r0, 0xfc0004) accept(r0, 0x0, 0x0) r1 = socket$inet(0xa, 0x801, 0x84) sendto(r1, &(0x7f0000000080)="d5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r1, 0xfc0004) accept(r1, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x4) writev(r2, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d36020a8447000b4e230f00000060a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed5e232e725839c97b910000", 0x104}], 0x1) [ 544.045118][ T806] ceph: No path or : separator in source 02:12:15 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) get_mempolicy(&(0x7f00000003c0), &(0x7f0000000400), 0x289, &(0x7f0000fef000/0x10000)=nil, 0x2) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="c6566ceda4e3f1c409e9515b62be0157ec2275042709d8548cb34a00665921c0c26bc59a07847331f37bc0ef75a5460fe26079bfc6bed87ef39b93f39b6bd4dea2a4b89759e1a77e64786f7d3c9ce12e6e7091ca71c3576afb000000000000000000", @ANYRES32, @ANYRES32=0x0, @ANYRESHEX=r1, @ANYRESDEC=r2], 0x5, 0x1) wait4(r1, 0x0, 0x40000000, &(0x7f0000000200)) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/tty/drivers\x00', 0x0, 0x0) read(r3, &(0x7f0000000280)=""/152, 0x20000318) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/tty/drivers\x00', 0x0, 0x0) read(r4, &(0x7f0000000280)=""/152, 0x20000318) ioctl$VIDIOC_QUERYBUF(r3, 0xc0585609, &(0x7f00000002c0)={0x0, 0x0, 0x4, 0x63d263814f78ec42, 0x401, {0x0, 0x2710}, {0x3, 0xc, 0x6, 0x0, 0x3, 0x9, "878b2cbe"}, 0x3, 0xb, @offset=0x8000, 0x400, 0x0, r4}) setsockopt$RDS_RECVERR(r5, 0x114, 0x5, &(0x7f0000000100), 0x4) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r6 = syz_open_dev$dri(&(0x7f00000001c0)='/dev/dri/card#\x00', 0x1, 0x0) mount(&(0x7f00000000c0)=ANY=[@ANYPTR64=&(0x7f0000000740)=ANY=[@ANYRESHEX=0x0, @ANYPTR, @ANYPTR64, @ANYBLOB="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", @ANYRESHEX=0x0, @ANYPTR64, @ANYRESHEX=r6, @ANYRES16=r0]], &(0x7f0000000180)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) [ 544.104749][ T806] ceph: No path or : separator in source [ 544.141611][ T811] bond101: (slave veth295): Enslaving as an active interface with an up link 02:12:15 executing program 3: r0 = socket$inet(0xa, 0x801, 0x84) sendto(r0, &(0x7f0000000080)="f5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r0, 0xfc0004) accept(r0, 0x0, 0x0) r1 = socket$inet(0xa, 0x801, 0x84) sendto(r1, &(0x7f0000000080)="d5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r1, 0xfc0004) accept(r1, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x4) writev(r2, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d36020a8447000b4e230f00006a64a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed5e232e725839c97b910000", 0x104}], 0x1) [ 544.407981][ T930] ceph: No path or : separator in source 02:12:15 executing program 3: r0 = socket$inet(0xa, 0x801, 0x84) sendto(r0, &(0x7f0000000080)="f5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r0, 0xfc0004) accept(r0, 0x0, 0x0) r1 = socket$inet(0xa, 0x801, 0x84) sendto(r1, &(0x7f0000000080)="d5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r1, 0xfc0004) accept(r1, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x4) writev(r2, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d36020a8447000b4e230f0000646aa2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed5e232e725839c97b910000", 0x104}], 0x1) [ 544.475033][ T936] ceph: No path or : separator in source 02:12:15 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=ANY=[@ANYBLOB="3c00000010008506000000000000000000200000", @ANYRES32=r3, @ANYBLOB="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"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000540)={0x0, 0xc00, &(0x7f0000000200)={&(0x7f00000008c0)=@newlink={0x50, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x50}}, 0x0) [ 544.515869][ T805] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. [ 544.548423][ T811] bond101: (slave veth297): Enslaving as an active interface with an up link 02:12:15 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000003c0)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) syz_open_procfs(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$DRM_IOCTL_SET_MASTER(0xffffffffffffffff, 0x641e) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VHOST_SET_LOG_FD(0xffffffffffffffff, 0x4004af07, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) recvfrom$inet6(r3, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0x0) shutdown(r3, 0x1) r4 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r4, &(0x7f00000000c0), 0xfffffdda, 0x1d4c, 0x0, 0x0) 02:12:15 executing program 3: r0 = socket$inet(0xa, 0x801, 0x84) sendto(r0, &(0x7f0000000080)="f5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r0, 0xfc0004) accept(r0, 0x0, 0x0) r1 = socket$inet(0xa, 0x801, 0x84) sendto(r1, &(0x7f0000000080)="d5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r1, 0xfc0004) accept(r1, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x4) writev(r2, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d36020a8447000b4e230f000000bca2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed5e232e725839c97b910000", 0x104}], 0x1) [ 544.730933][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 544.758705][ T950] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. 02:12:16 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @remote}}) write$tun(r0, &(0x7f0000000180)={@void, @val={0x0, 0x0, 0x0, 0x8}, @mpls={[], @ipv6=@icmpv6={0x0, 0x6, "9eef7b", 0x9, 0x3c, 0x0, @remote, @mcast2, {[], @echo_request={0x80, 0x0, 0x0, 0x0, 0x0, "81"}}}}}, 0x3b) 02:12:16 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) get_mempolicy(&(0x7f00000003c0), &(0x7f0000000400), 0x289, &(0x7f0000fef000/0x10000)=nil, 0x2) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="c6566ceda4e3f1c409e9515b62be0157ec2275042709d8548cb34a00665921c0c26bc59a07847331f37bc0ef75a5460fe26079bfc6bed87ef39b93f39b6bd4dea2a4b89759e1a77e64786f7d3c9ce12e6e7091ca71c3576afb000000000000000000", @ANYRES32, @ANYRES32=0x0, @ANYRESHEX=r1, @ANYRESDEC=r2], 0x5, 0x1) wait4(r1, 0x0, 0x40000000, &(0x7f0000000200)) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/tty/drivers\x00', 0x0, 0x0) read(r3, &(0x7f0000000280)=""/152, 0x20000318) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/tty/drivers\x00', 0x0, 0x0) read(r4, &(0x7f0000000280)=""/152, 0x20000318) ioctl$VIDIOC_QUERYBUF(r3, 0xc0585609, &(0x7f00000002c0)={0x0, 0x0, 0x4, 0x63d263814f78ec42, 0x401, {0x0, 0x2710}, {0x3, 0xc, 0x6, 0x0, 0x3, 0x9, "878b2cbe"}, 0x3, 0xb, @offset=0x8000, 0x400, 0x0, r4}) setsockopt$RDS_RECVERR(r5, 0x114, 0x5, &(0x7f0000000100), 0x4) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r6 = syz_open_dev$dri(&(0x7f00000001c0)='/dev/dri/card#\x00', 0x1, 0x0) mount(&(0x7f00000000c0)=ANY=[@ANYPTR64=&(0x7f0000000740)=ANY=[@ANYRESHEX=0x0, @ANYPTR, @ANYPTR64, @ANYBLOB="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", @ANYRESHEX=0x0, @ANYPTR64, @ANYRESHEX=r6, @ANYRES16=r0]], &(0x7f0000000180)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) 02:12:16 executing program 3: r0 = socket$inet(0xa, 0x801, 0x84) sendto(r0, &(0x7f0000000080)="f5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r0, 0xfc0004) accept(r0, 0x0, 0x0) r1 = socket$inet(0xa, 0x801, 0x84) sendto(r1, &(0x7f0000000080)="d5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r1, 0xfc0004) accept(r1, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x4) writev(r2, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d36020a8447000b4e230f00000ec0a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed5e232e725839c97b910000", 0x104}], 0x1) 02:12:16 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r2 = gettid() process_vm_writev(r2, &(0x7f0000c22000)=[{&(0x7f000034afa4)=""/1, 0x1f80}], 0x2cc, &(0x7f0000c22fa0)=[{&(0x7f0000000080)=""/1, 0x2034afa5}], 0x1, 0x0) [ 544.903928][ T955] bond102: (slave veth299): Enslaving as an active interface with an up link [ 544.942541][ T950] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. 02:12:16 executing program 3: r0 = socket$inet(0xa, 0x801, 0x84) sendto(r0, &(0x7f0000000080)="f5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r0, 0xfc0004) accept(r0, 0x0, 0x0) r1 = socket$inet(0xa, 0x801, 0x84) sendto(r1, &(0x7f0000000080)="d5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r1, 0xfc0004) accept(r1, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x4) writev(r2, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d36020a8447000b4e230f000000f0a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed5e232e725839c97b910000", 0x104}], 0x1) 02:12:16 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=ANY=[@ANYBLOB="3c00000010008506000000000000000000200000", @ANYRES32=r3, @ANYBLOB="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"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000540)={0x0, 0xe00, &(0x7f0000000200)={&(0x7f00000008c0)=@newlink={0x50, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x50}}, 0x0) [ 545.124952][ T964] ceph: No path or : separator in source [ 545.293372][ T964] ceph: No path or : separator in source 02:12:16 executing program 3: r0 = socket$inet(0xa, 0x801, 0x84) sendto(r0, &(0x7f0000000080)="f5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r0, 0xfc0004) accept(r0, 0x0, 0x0) r1 = socket$inet(0xa, 0x801, 0x84) sendto(r1, &(0x7f0000000080)="d5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r1, 0xfc0004) accept(r1, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x4) writev(r2, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d36020a8447000b4e230f00000002a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed5e232e725839c97b910000", 0x104}], 0x1) 02:12:16 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) get_mempolicy(&(0x7f00000003c0), &(0x7f0000000400), 0x289, &(0x7f0000fef000/0x10000)=nil, 0x2) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="c6566ceda4e3f1c409e9515b62be0157ec2275042709d8548cb34a00665921c0c26bc59a07847331f37bc0ef75a5460fe26079bfc6bed87ef39b93f39b6bd4dea2a4b89759e1a77e64786f7d3c9ce12e6e7091ca71c3576afb000000000000000000", @ANYRES32, @ANYRES32=0x0, @ANYRESHEX=r1, @ANYRESDEC=r2], 0x5, 0x1) wait4(r1, 0x0, 0x40000000, &(0x7f0000000200)) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/tty/drivers\x00', 0x0, 0x0) read(r3, &(0x7f0000000280)=""/152, 0x20000318) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/tty/drivers\x00', 0x0, 0x0) read(r4, &(0x7f0000000280)=""/152, 0x20000318) ioctl$VIDIOC_QUERYBUF(r3, 0xc0585609, &(0x7f00000002c0)={0x0, 0x0, 0x4, 0x63d263814f78ec42, 0x401, {0x0, 0x2710}, {0x3, 0xc, 0x6, 0x0, 0x3, 0x9, "878b2cbe"}, 0x3, 0xb, @offset=0x8000, 0x400, 0x0, r4}) setsockopt$RDS_RECVERR(r5, 0x114, 0x5, &(0x7f0000000100), 0x4) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r6 = syz_open_dev$dri(&(0x7f00000001c0)='/dev/dri/card#\x00', 0x1, 0x0) mount(&(0x7f00000000c0)=ANY=[@ANYPTR64=&(0x7f0000000740)=ANY=[@ANYRESHEX=0x0, @ANYPTR, @ANYPTR64, @ANYBLOB="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", @ANYRESHEX=0x0, @ANYPTR64, @ANYRESHEX=r6, @ANYRES16=r0]], &(0x7f0000000180)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) [ 545.514301][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 02:12:16 executing program 3: r0 = socket$inet(0xa, 0x801, 0x84) sendto(r0, &(0x7f0000000080)="f5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r0, 0xfc0004) accept(r0, 0x0, 0x0) r1 = socket$inet(0xa, 0x801, 0x84) sendto(r1, &(0x7f0000000080)="d5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r1, 0xfc0004) accept(r1, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x4) writev(r2, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d36020a8447000b4e230f00000004a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed5e232e725839c97b910000", 0x104}], 0x1) [ 545.605633][ T986] ceph: No path or : separator in source [ 545.720151][ T986] ceph: No path or : separator in source 02:12:17 executing program 3: r0 = socket$inet(0xa, 0x801, 0x84) sendto(r0, &(0x7f0000000080)="f5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r0, 0xfc0004) accept(r0, 0x0, 0x0) r1 = socket$inet(0xa, 0x801, 0x84) sendto(r1, &(0x7f0000000080)="d5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r1, 0xfc0004) accept(r1, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x4) writev(r2, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d36020a8447000b4e230f0000000aa2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed5e232e725839c97b910000", 0x104}], 0x1) [ 545.775875][ T979] bond103: (slave veth301): Enslaving as an active interface with an up link 02:12:17 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000003c0)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) syz_open_procfs(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$DRM_IOCTL_SET_MASTER(0xffffffffffffffff, 0x641e) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VHOST_SET_LOG_FD(0xffffffffffffffff, 0x4004af07, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) recvfrom$inet6(r3, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0x0) shutdown(r3, 0x1) r4 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r4, &(0x7f00000000c0), 0xfffffdda, 0x22e0, 0x0, 0x0) 02:12:17 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) get_mempolicy(&(0x7f00000003c0), &(0x7f0000000400), 0x289, &(0x7f0000fef000/0x10000)=nil, 0x2) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="c6566ceda4e3f1c409e9515b62be0157ec2275042709d8548cb34a00665921c0c26bc59a07847331f37bc0ef75a5460fe26079bfc6bed87ef39b93f39b6bd4dea2a4b89759e1a77e64786f7d3c9ce12e6e7091ca71c3576afb000000000000000000", @ANYRES32, @ANYRES32=0x0, @ANYRESHEX=r1, @ANYRESDEC=r2], 0x5, 0x1) wait4(r1, 0x0, 0x40000000, &(0x7f0000000200)) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/tty/drivers\x00', 0x0, 0x0) read(r3, &(0x7f0000000280)=""/152, 0x20000318) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/tty/drivers\x00', 0x0, 0x0) read(r4, &(0x7f0000000280)=""/152, 0x20000318) ioctl$VIDIOC_QUERYBUF(r3, 0xc0585609, &(0x7f00000002c0)={0x0, 0x0, 0x4, 0x63d263814f78ec42, 0x401, {0x0, 0x2710}, {0x3, 0xc, 0x6, 0x0, 0x3, 0x9, "878b2cbe"}, 0x3, 0xb, @offset=0x8000, 0x400, 0x0, r4}) setsockopt$RDS_RECVERR(r5, 0x114, 0x5, &(0x7f0000000100), 0x4) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r6 = syz_open_dev$dri(&(0x7f00000001c0)='/dev/dri/card#\x00', 0x1, 0x0) mount(&(0x7f00000000c0)=ANY=[@ANYPTR64=&(0x7f0000000740)=ANY=[@ANYRESHEX=0x0, @ANYPTR, @ANYPTR64, @ANYBLOB="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", @ANYRESHEX=0x0, @ANYPTR64, @ANYRESHEX=r6, @ANYRES16=r0]], &(0x7f0000000180)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) [ 545.935083][ T977] bond103: (slave veth303): Enslaving as an active interface with an up link [ 545.979317][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 545.993161][ T1002] ceph: No path or : separator in source [ 546.055557][ T1002] ceph: No path or : separator in source 02:12:17 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @remote}}) write$tun(r0, &(0x7f0000000180)={@void, @val={0x0, 0x0, 0x0, 0x11}, @mpls={[], @ipv6=@icmpv6={0x0, 0x6, "9eef7b", 0x9, 0x3c, 0x0, @remote, @mcast2, {[], @echo_request={0x80, 0x0, 0x0, 0x0, 0x0, "81"}}}}}, 0x3b) 02:12:17 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=ANY=[@ANYBLOB="3c00000010008506000000000000000000200000", @ANYRES32=r3, @ANYBLOB="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"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000540)={0x0, 0x1100, &(0x7f0000000200)={&(0x7f00000008c0)=@newlink={0x50, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x50}}, 0x0) 02:12:17 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r2 = gettid() process_vm_writev(r2, &(0x7f0000c22000)=[{&(0x7f000034afa4)=""/1, 0x1f80}], 0x2cd, &(0x7f0000c22fa0)=[{&(0x7f0000000080)=""/1, 0x2034afa5}], 0x1, 0x0) 02:12:17 executing program 3: r0 = socket$inet(0xa, 0x801, 0x84) sendto(r0, &(0x7f0000000080)="f5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r0, 0xfc0004) accept(r0, 0x0, 0x0) r1 = socket$inet(0xa, 0x801, 0x84) sendto(r1, &(0x7f0000000080)="d5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r1, 0xfc0004) accept(r1, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x4) writev(r2, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d36020a8447000b4e230f0000000ea2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed5e232e725839c97b910000", 0x104}], 0x1) 02:12:17 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) get_mempolicy(&(0x7f00000003c0), &(0x7f0000000400), 0x289, &(0x7f0000fef000/0x10000)=nil, 0x2) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="c6566ceda4e3f1c409e9515b62be0157ec2275042709d8548cb34a00665921c0c26bc59a07847331f37bc0ef75a5460fe26079bfc6bed87ef39b93f39b6bd4dea2a4b89759e1a77e64786f7d3c9ce12e6e7091ca71c3576afb000000000000000000", @ANYRES32, @ANYRES32=0x0, @ANYRESHEX=r1, @ANYRESDEC=r2], 0x5, 0x1) wait4(r1, 0x0, 0x40000000, &(0x7f0000000200)) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/tty/drivers\x00', 0x0, 0x0) read(r3, &(0x7f0000000280)=""/152, 0x20000318) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/tty/drivers\x00', 0x0, 0x0) read(r4, &(0x7f0000000280)=""/152, 0x20000318) ioctl$VIDIOC_QUERYBUF(r3, 0xc0585609, &(0x7f00000002c0)={0x0, 0x0, 0x4, 0x63d263814f78ec42, 0x401, {0x0, 0x2710}, {0x3, 0xc, 0x6, 0x0, 0x3, 0x9, "878b2cbe"}, 0x3, 0xb, @offset=0x8000, 0x400, 0x0, r4}) setsockopt$RDS_RECVERR(r5, 0x114, 0x5, &(0x7f0000000100), 0x4) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r6 = syz_open_dev$dri(&(0x7f00000001c0)='/dev/dri/card#\x00', 0x1, 0x0) mount(&(0x7f00000000c0)=ANY=[@ANYPTR64=&(0x7f0000000740)=ANY=[@ANYRESHEX=0x0, @ANYPTR, @ANYPTR64, @ANYBLOB="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", @ANYRESHEX=0x0, @ANYPTR64, @ANYRESHEX=r6, @ANYRES16=r0]], &(0x7f0000000180)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) [ 546.708702][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 02:12:18 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000003c0)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) syz_open_procfs(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$DRM_IOCTL_SET_MASTER(0xffffffffffffffff, 0x641e) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VHOST_SET_LOG_FD(0xffffffffffffffff, 0x4004af07, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) recvfrom$inet6(r3, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0x0) shutdown(r3, 0x1) r4 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r4, &(0x7f00000000c0), 0xfffffdda, 0x2ca0, 0x0, 0x0) 02:12:18 executing program 3: r0 = socket$inet(0xa, 0x801, 0x84) sendto(r0, &(0x7f0000000080)="f5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r0, 0xfc0004) accept(r0, 0x0, 0x0) r1 = socket$inet(0xa, 0x801, 0x84) sendto(r1, &(0x7f0000000080)="d5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r1, 0xfc0004) accept(r1, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x4) writev(r2, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d36020a8447000b4e230f0000000fa2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed5e232e725839c97b910000", 0x104}], 0x1) [ 546.786626][ T1122] ceph: No path or : separator in source [ 546.884522][ T1135] ceph: No path or : separator in source 02:12:18 executing program 3: r0 = socket$inet(0xa, 0x801, 0x84) sendto(r0, &(0x7f0000000080)="f5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r0, 0xfc0004) accept(r0, 0x0, 0x0) r1 = socket$inet(0xa, 0x801, 0x84) sendto(r1, &(0x7f0000000080)="d5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r1, 0xfc0004) accept(r1, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x4) writev(r2, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d36020a8447000b4e230f00000060a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed5e232e725839c97b910000", 0x104}], 0x1) 02:12:18 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) get_mempolicy(&(0x7f00000003c0), &(0x7f0000000400), 0x289, &(0x7f0000fef000/0x10000)=nil, 0x2) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="c6566ceda4e3f1c409e9515b62be0157ec2275042709d8548cb34a00665921c0c26bc59a07847331f37bc0ef75a5460fe26079bfc6bed87ef39b93f39b6bd4dea2a4b89759e1a77e64786f7d3c9ce12e6e7091ca71c3576afb000000000000000000", @ANYRES32, @ANYRES32=0x0, @ANYRESHEX=r1, @ANYRESDEC=r2], 0x5, 0x1) wait4(r1, 0x0, 0x40000000, &(0x7f0000000200)) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/tty/drivers\x00', 0x0, 0x0) read(r3, &(0x7f0000000280)=""/152, 0x20000318) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/tty/drivers\x00', 0x0, 0x0) read(r4, &(0x7f0000000280)=""/152, 0x20000318) ioctl$VIDIOC_QUERYBUF(r3, 0xc0585609, &(0x7f00000002c0)={0x0, 0x0, 0x4, 0x63d263814f78ec42, 0x401, {0x0, 0x2710}, {0x3, 0xc, 0x6, 0x0, 0x3, 0x9, "878b2cbe"}, 0x3, 0xb, @offset=0x8000, 0x400, 0x0, r4}) setsockopt$RDS_RECVERR(r5, 0x114, 0x5, &(0x7f0000000100), 0x4) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r6 = syz_open_dev$dri(&(0x7f00000001c0)='/dev/dri/card#\x00', 0x1, 0x0) mount(&(0x7f00000000c0)=ANY=[@ANYPTR64=&(0x7f0000000740)=ANY=[@ANYRESHEX=0x0, @ANYPTR, @ANYPTR64, @ANYBLOB="974d3ab47b3b91beb0f4760669c8618bc33664faf9c8179efd568e4e4b38f30869aefe10a4ccb1c515487e645b4a11d7cd2fb39aa1efca7c1eb441061d2be4c165ca6304c2e94159863dcfcf75da45211fdd143b6c91d52ae9ac6a1c2f8173d8ee5682fc65a93dc45ead4a462d9e16ac3dff144c0fcc7d02fcf3fd3029b264f3550caaab22152365126be74a9ff91547eb273f83f2c2762b17b32d7d91ac013d6f5790d3bc09c1884d8c7f15be223a8c3b4e37186c641bc3501ca145f05e49aae1613402448c49a36a9b0055a9d5cc74edda0087d65f15d71e4e051cad208514ee99b6258f827a895d2eb4407e6b7b7a9d6bcc228e615d78a6a8b2c466d96a48ee2c7a736035e283917293271efdc7cbdf0a647917068ab197eec326359f829087bafd0fd95e5fcf645615f55040a847aab188c52f4dd3f61a15b2edfe22e6221a5b0b256f1d8da1e6b860b7c68213cc1fae88c0e86013d9000085216c3ee1ab6fd509500f038480929e335b4b3bb0150f881b831cc870de6d188bdd45a113989bc9d15fe2893ff94349", @ANYRESHEX=0x0, @ANYPTR64, @ANYRESHEX=r6, @ANYRES16=r0]], &(0x7f0000000180)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) [ 547.032754][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 02:12:18 executing program 3: r0 = socket$inet(0xa, 0x801, 0x84) sendto(r0, &(0x7f0000000080)="f5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r0, 0xfc0004) accept(r0, 0x0, 0x0) r1 = socket$inet(0xa, 0x801, 0x84) sendto(r1, &(0x7f0000000080)="d5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r1, 0xfc0004) accept(r1, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x4) writev(r2, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d36020a8447000b4e230f000000bca2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed5e232e725839c97b910000", 0x104}], 0x1) [ 547.254727][ T1155] ceph: No path or : separator in source [ 547.381575][ T1163] ceph: No path or : separator in source [ 547.445273][ T1125] bond104: (slave veth305): Enslaving as an active interface with an up link 02:12:18 executing program 3: r0 = socket$inet(0xa, 0x801, 0x84) sendto(r0, &(0x7f0000000080)="f5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r0, 0xfc0004) accept(r0, 0x0, 0x0) r1 = socket$inet(0xa, 0x801, 0x84) sendto(r1, &(0x7f0000000080)="d5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r1, 0xfc0004) accept(r1, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x4) writev(r2, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d36020a8447000b4e230f00000000a20f5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed5e232e725839c97b910000", 0x104}], 0x1) [ 547.489637][ T1166] __nla_validate_parse: 3 callbacks suppressed [ 547.489648][ T1166] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. [ 547.551594][ T1167] bond104: (slave veth307): Enslaving as an active interface with an up link 02:12:18 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=ANY=[@ANYBLOB="3c00000010008506000000000000000000200000", @ANYRES32=r3, @ANYBLOB="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"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000540)={0x0, 0x1105, &(0x7f0000000200)={&(0x7f00000008c0)=@newlink={0x50, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x50}}, 0x0) [ 547.763749][ T1278] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. [ 547.776572][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 548.073002][ T1282] bond105: (slave veth309): Enslaving as an active interface with an up link [ 548.086997][ T1278] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. [ 548.105260][ T1282] bond105: (slave veth311): Enslaving as an active interface with an up link 02:12:19 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @remote}}) write$tun(r0, &(0x7f0000000180)={@void, @val={0x0, 0x0, 0x0, 0x31}, @mpls={[], @ipv6=@icmpv6={0x0, 0x6, "9eef7b", 0x9, 0x3c, 0x0, @remote, @mcast2, {[], @echo_request={0x80, 0x0, 0x0, 0x0, 0x0, "81"}}}}}, 0x3b) 02:12:19 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r2 = gettid() process_vm_writev(r2, &(0x7f0000c22000)=[{&(0x7f000034afa4)=""/1, 0x1f80}], 0x2ce, &(0x7f0000c22fa0)=[{&(0x7f0000000080)=""/1, 0x2034afa5}], 0x1, 0x0) 02:12:19 executing program 3: r0 = socket$inet(0xa, 0x801, 0x84) sendto(r0, &(0x7f0000000080)="f5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r0, 0xfc0004) accept(r0, 0x0, 0x0) r1 = socket$inet(0xa, 0x801, 0x84) sendto(r1, &(0x7f0000000080)="d5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r1, 0xfc0004) accept(r1, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x4) writev(r2, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d36020a8447000b4e230f00000000a2bc5605ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed5e232e725839c97b910000", 0x104}], 0x1) 02:12:19 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) get_mempolicy(&(0x7f00000003c0), &(0x7f0000000400), 0x289, &(0x7f0000fef000/0x10000)=nil, 0x2) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="c6566ceda4e3f1c409e9515b62be0157ec2275042709d8548cb34a00665921c0c26bc59a07847331f37bc0ef75a5460fe26079bfc6bed87ef39b93f39b6bd4dea2a4b89759e1a77e64786f7d3c9ce12e6e7091ca71c3576afb000000000000000000", @ANYRES32, @ANYRES32=0x0, @ANYRESHEX=r1, @ANYRESDEC=r2], 0x5, 0x1) wait4(r1, 0x0, 0x40000000, &(0x7f0000000200)) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/tty/drivers\x00', 0x0, 0x0) read(r3, &(0x7f0000000280)=""/152, 0x20000318) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/tty/drivers\x00', 0x0, 0x0) read(r4, &(0x7f0000000280)=""/152, 0x20000318) ioctl$VIDIOC_QUERYBUF(r3, 0xc0585609, &(0x7f00000002c0)={0x0, 0x0, 0x4, 0x63d263814f78ec42, 0x401, {0x0, 0x2710}, {0x3, 0xc, 0x6, 0x0, 0x3, 0x9, "878b2cbe"}, 0x3, 0xb, @offset=0x8000, 0x400, 0x0, r4}) setsockopt$RDS_RECVERR(r5, 0x114, 0x5, &(0x7f0000000100), 0x4) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r6 = syz_open_dev$dri(&(0x7f00000001c0)='/dev/dri/card#\x00', 0x1, 0x0) mount(&(0x7f00000000c0)=ANY=[@ANYPTR64=&(0x7f0000000740)=ANY=[@ANYRESHEX=0x0, @ANYPTR, @ANYPTR64, @ANYBLOB="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", @ANYRESHEX=0x0, @ANYPTR64, @ANYRESHEX=r6, @ANYRES16=r0]], &(0x7f0000000180)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) 02:12:19 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000003c0)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) syz_open_procfs(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$DRM_IOCTL_SET_MASTER(0xffffffffffffffff, 0x641e) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VHOST_SET_LOG_FD(0xffffffffffffffff, 0x4004af07, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) recvfrom$inet6(r3, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0x0) shutdown(r3, 0x1) r4 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r4, &(0x7f00000000c0), 0xfffffdda, 0x3075, 0x0, 0x0) 02:12:19 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=ANY=[@ANYBLOB="3c00000010008506000000000000000000200000", @ANYRES32=r3, @ANYBLOB="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"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000540)={0x0, 0x1200, &(0x7f0000000200)={&(0x7f00000008c0)=@newlink={0x50, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x50}}, 0x0) [ 548.345609][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 548.349473][ T1294] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. 02:12:19 executing program 3: r0 = socket$inet(0xa, 0x801, 0x84) sendto(r0, &(0x7f0000000080)="f5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r0, 0xfc0004) accept(r0, 0x0, 0x0) r1 = socket$inet(0xa, 0x801, 0x84) sendto(r1, &(0x7f0000000080)="d5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r1, 0xfc0004) accept(r1, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x4) writev(r2, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d36020a8447000b4e230f00000000a2bc5603ca02000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed5e232e725839c97b910000", 0x104}], 0x1) [ 548.461841][ T1291] ceph: No path or : separator in source [ 548.469093][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 548.513351][ T1291] ceph: No path or : separator in source 02:12:19 executing program 3: r0 = socket$inet(0xa, 0x801, 0x84) sendto(r0, &(0x7f0000000080)="f5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r0, 0xfc0004) accept(r0, 0x0, 0x0) r1 = socket$inet(0xa, 0x801, 0x84) sendto(r1, &(0x7f0000000080)="d5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r1, 0xfc0004) accept(r1, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x4) writev(r2, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d36020a8447000b4e230f00000000a2bc5603ca04000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed5e232e725839c97b910000", 0x104}], 0x1) 02:12:19 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) get_mempolicy(&(0x7f00000003c0), &(0x7f0000000400), 0x289, &(0x7f0000fef000/0x10000)=nil, 0x2) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="c6566ceda4e3f1c409e9515b62be0157ec2275042709d8548cb34a00665921c0c26bc59a07847331f37bc0ef75a5460fe26079bfc6bed87ef39b93f39b6bd4dea2a4b89759e1a77e64786f7d3c9ce12e6e7091ca71c3576afb000000000000000000", @ANYRES32, @ANYRES32=0x0, @ANYRESHEX=r1, @ANYRESDEC=r2], 0x5, 0x1) wait4(r1, 0x0, 0x40000000, &(0x7f0000000200)) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/tty/drivers\x00', 0x0, 0x0) read(r3, &(0x7f0000000280)=""/152, 0x20000318) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/tty/drivers\x00', 0x0, 0x0) read(r4, &(0x7f0000000280)=""/152, 0x20000318) ioctl$VIDIOC_QUERYBUF(r3, 0xc0585609, &(0x7f00000002c0)={0x0, 0x0, 0x4, 0x63d263814f78ec42, 0x401, {0x0, 0x2710}, {0x3, 0xc, 0x6, 0x0, 0x3, 0x9, "878b2cbe"}, 0x3, 0xb, @offset=0x8000, 0x400, 0x0, r4}) setsockopt$RDS_RECVERR(r5, 0x114, 0x5, &(0x7f0000000100), 0x4) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r6 = syz_open_dev$dri(&(0x7f00000001c0)='/dev/dri/card#\x00', 0x1, 0x0) mount(&(0x7f00000000c0)=ANY=[@ANYPTR64=&(0x7f0000000740)=ANY=[@ANYRESHEX=0x0, @ANYPTR, @ANYPTR64, @ANYBLOB="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", @ANYRESHEX=0x0, @ANYPTR64, @ANYRESHEX=r6, @ANYRES16=r0]], &(0x7f0000000180)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) 02:12:20 executing program 3: r0 = socket$inet(0xa, 0x801, 0x84) sendto(r0, &(0x7f0000000080)="f5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r0, 0xfc0004) accept(r0, 0x0, 0x0) r1 = socket$inet(0xa, 0x801, 0x84) sendto(r1, &(0x7f0000000080)="d5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r1, 0xfc0004) accept(r1, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x4) writev(r2, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d36020a8447000b4e230f00000000a2bc5603ca0a000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed5e232e725839c97b910000", 0x104}], 0x1) [ 548.792800][ T1423] ceph: No path or : separator in source [ 548.864674][ T1423] ceph: No path or : separator in source 02:12:20 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) get_mempolicy(&(0x7f00000003c0), &(0x7f0000000400), 0x289, &(0x7f0000fef000/0x10000)=nil, 0x2) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="c6566ceda4e3f1c409e9515b62be0157ec2275042709d8548cb34a00665921c0c26bc59a07847331f37bc0ef75a5460fe26079bfc6bed87ef39b93f39b6bd4dea2a4b89759e1a77e64786f7d3c9ce12e6e7091ca71c3576afb000000000000000000", @ANYRES32, @ANYRES32=0x0, @ANYRESHEX=r1, @ANYRESDEC=r2], 0x5, 0x1) wait4(r1, 0x0, 0x40000000, &(0x7f0000000200)) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/tty/drivers\x00', 0x0, 0x0) read(r3, &(0x7f0000000280)=""/152, 0x20000318) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/tty/drivers\x00', 0x0, 0x0) read(r4, &(0x7f0000000280)=""/152, 0x20000318) ioctl$VIDIOC_QUERYBUF(r3, 0xc0585609, &(0x7f00000002c0)={0x0, 0x0, 0x4, 0x63d263814f78ec42, 0x401, {0x0, 0x2710}, {0x3, 0xc, 0x6, 0x0, 0x3, 0x9, "878b2cbe"}, 0x3, 0xb, @offset=0x8000, 0x400, 0x0, r4}) setsockopt$RDS_RECVERR(r5, 0x114, 0x5, &(0x7f0000000100), 0x4) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r6 = syz_open_dev$dri(&(0x7f00000001c0)='/dev/dri/card#\x00', 0x1, 0x0) mount(&(0x7f00000000c0)=ANY=[@ANYPTR64=&(0x7f0000000740)=ANY=[@ANYRESHEX=0x0, @ANYPTR, @ANYPTR64, @ANYBLOB="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", @ANYRESHEX=0x0, @ANYPTR64, @ANYRESHEX=r6, @ANYRES16=r0]], &(0x7f0000000180)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) 02:12:20 executing program 3: r0 = socket$inet(0xa, 0x801, 0x84) sendto(r0, &(0x7f0000000080)="f5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r0, 0xfc0004) accept(r0, 0x0, 0x0) r1 = socket$inet(0xa, 0x801, 0x84) sendto(r1, &(0x7f0000000080)="d5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r1, 0xfc0004) accept(r1, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x4) writev(r2, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d36020a8447000b4e230f00000000a2bc5603ca0e000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed5e232e725839c97b910000", 0x104}], 0x1) [ 549.020929][ T1294] bond106: (slave veth313): Enslaving as an active interface with an up link [ 549.116496][ T1436] ceph: No path or : separator in source [ 549.135989][ T1294] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. [ 549.213297][ T1441] bond106: (slave veth315): Enslaving as an active interface with an up link [ 549.308895][ T1436] ceph: No path or : separator in source 02:12:20 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @remote}}) write$tun(r0, &(0x7f0000000180)={@void, @val={0x0, 0x0, 0x0, 0x300}, @mpls={[], @ipv6=@icmpv6={0x0, 0x6, "9eef7b", 0x9, 0x3c, 0x0, @remote, @mcast2, {[], @echo_request={0x80, 0x0, 0x0, 0x0, 0x0, "81"}}}}}, 0x3b) 02:12:20 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000003c0)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) syz_open_procfs(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$DRM_IOCTL_SET_MASTER(0xffffffffffffffff, 0x641e) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VHOST_SET_LOG_FD(0xffffffffffffffff, 0x4004af07, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) recvfrom$inet6(r3, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0x0) shutdown(r3, 0x1) r4 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r4, &(0x7f00000000c0), 0xfffffdda, 0x3a98, 0x0, 0x0) 02:12:20 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=ANY=[@ANYBLOB="3c00000010008506000000000000000000200000", @ANYRES32=r3, @ANYBLOB="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"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000540)={0x0, 0x1300, &(0x7f0000000200)={&(0x7f00000008c0)=@newlink={0x50, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x50}}, 0x0) 02:12:20 executing program 3: r0 = socket$inet(0xa, 0x801, 0x84) sendto(r0, &(0x7f0000000080)="f5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r0, 0xfc0004) accept(r0, 0x0, 0x0) r1 = socket$inet(0xa, 0x801, 0x84) sendto(r1, &(0x7f0000000080)="d5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r1, 0xfc0004) accept(r1, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x4) writev(r2, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d36020a8447000b4e230f00000000a2bc5603ca0f000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed5e232e725839c97b910000", 0x104}], 0x1) 02:12:20 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) get_mempolicy(&(0x7f00000003c0), &(0x7f0000000400), 0x289, &(0x7f0000fef000/0x10000)=nil, 0x2) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="c6566ceda4e3f1c409e9515b62be0157ec2275042709d8548cb34a00665921c0c26bc59a07847331f37bc0ef75a5460fe26079bfc6bed87ef39b93f39b6bd4dea2a4b89759e1a77e64786f7d3c9ce12e6e7091ca71c3576afb000000000000000000", @ANYRES32, @ANYRES32=0x0, @ANYRESHEX=r1, @ANYRESDEC=r2], 0x5, 0x1) wait4(r1, 0x0, 0x40000000, &(0x7f0000000200)) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/tty/drivers\x00', 0x0, 0x0) read(r3, &(0x7f0000000280)=""/152, 0x20000318) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/tty/drivers\x00', 0x0, 0x0) read(r4, &(0x7f0000000280)=""/152, 0x20000318) ioctl$VIDIOC_QUERYBUF(r3, 0xc0585609, &(0x7f00000002c0)={0x0, 0x0, 0x4, 0x63d263814f78ec42, 0x401, {0x0, 0x2710}, {0x3, 0xc, 0x6, 0x0, 0x3, 0x9, "878b2cbe"}, 0x3, 0xb, @offset=0x8000, 0x400, 0x0, r4}) setsockopt$RDS_RECVERR(r5, 0x114, 0x5, &(0x7f0000000100), 0x4) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r6 = syz_open_dev$dri(&(0x7f00000001c0)='/dev/dri/card#\x00', 0x1, 0x0) mount(&(0x7f00000000c0)=ANY=[@ANYPTR64=&(0x7f0000000740)=ANY=[@ANYRESHEX=0x0, @ANYPTR, @ANYPTR64, @ANYBLOB="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", @ANYRESHEX=0x0, @ANYPTR64, @ANYRESHEX=r6, @ANYRES16=r0]], &(0x7f0000000180)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) 02:12:20 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r2 = gettid() process_vm_writev(r2, &(0x7f0000c22000)=[{&(0x7f000034afa4)=""/1, 0x1f80}], 0x2cf, &(0x7f0000c22fa0)=[{&(0x7f0000000080)=""/1, 0x2034afa5}], 0x1, 0x0) [ 549.417767][ T1449] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. [ 549.493347][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 02:12:21 executing program 3: r0 = socket$inet(0xa, 0x801, 0x84) sendto(r0, &(0x7f0000000080)="f5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r0, 0xfc0004) accept(r0, 0x0, 0x0) r1 = socket$inet(0xa, 0x801, 0x84) sendto(r1, &(0x7f0000000080)="d5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r1, 0xfc0004) accept(r1, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x4) writev(r2, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d36020a8447000b4e230f00000000a2bc5603ca60000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed5e232e725839c97b910000", 0x104}], 0x1) [ 549.652976][ T1455] ceph: No path or : separator in source [ 549.766701][ T1460] bond107: (slave veth317): Enslaving as an active interface with an up link 02:12:21 executing program 3: r0 = socket$inet(0xa, 0x801, 0x84) sendto(r0, &(0x7f0000000080)="f5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r0, 0xfc0004) accept(r0, 0x0, 0x0) r1 = socket$inet(0xa, 0x801, 0x84) sendto(r1, &(0x7f0000000080)="d5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r1, 0xfc0004) accept(r1, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x4) writev(r2, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d36020a8447000b4e230f00000000a2bc5603cabc000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed5e232e725839c97b910000", 0x104}], 0x1) [ 549.812368][ T1449] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. [ 549.832218][ T1580] ceph: No path or : separator in source 02:12:21 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) get_mempolicy(&(0x7f00000003c0), &(0x7f0000000400), 0x289, &(0x7f0000fef000/0x10000)=nil, 0x2) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="c6566ceda4e3f1c409e9515b62be0157ec2275042709d8548cb34a00665921c0c26bc59a07847331f37bc0ef75a5460fe26079bfc6bed87ef39b93f39b6bd4dea2a4b89759e1a77e64786f7d3c9ce12e6e7091ca71c3576afb000000000000000000", @ANYRES32, @ANYRES32=0x0, @ANYRESHEX=r1, @ANYRESDEC=r2], 0x5, 0x1) wait4(r1, 0x0, 0x40000000, &(0x7f0000000200)) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/tty/drivers\x00', 0x0, 0x0) read(r3, &(0x7f0000000280)=""/152, 0x20000318) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/tty/drivers\x00', 0x0, 0x0) read(r4, &(0x7f0000000280)=""/152, 0x20000318) ioctl$VIDIOC_QUERYBUF(r3, 0xc0585609, &(0x7f00000002c0)={0x0, 0x0, 0x4, 0x63d263814f78ec42, 0x401, {0x0, 0x2710}, {0x3, 0xc, 0x6, 0x0, 0x3, 0x9, "878b2cbe"}, 0x3, 0xb, @offset=0x8000, 0x400, 0x0, r4}) setsockopt$RDS_RECVERR(r5, 0x114, 0x5, &(0x7f0000000100), 0x4) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r6 = syz_open_dev$dri(&(0x7f00000001c0)='/dev/dri/card#\x00', 0x1, 0x0) mount(&(0x7f00000000c0)=ANY=[@ANYPTR64=&(0x7f0000000740)=ANY=[@ANYRESHEX=0x0, @ANYPTR, @ANYPTR64, @ANYBLOB="974d3ab47b3b91beb0f4760669c8618bc33664faf9c8179efd568e4e4b38f30869aefe10a4ccb1c515487e645b4a11d7cd2fb39aa1efca7c1eb441061d2be4c165ca7004c2e94159863dcfcf75da45211fdd143b6c91d52ae9ac6a1c2f8173d8ee5682fc65a93dc45ead4a462d9e16ac3dff144c0fcc7d02fcf3fd3029b264f3550caaab22152365126be74a9ff91547eb273f83f2c2762b17b32d7d91ac013d6f5790d3bc09c1884d8c7f15be223a8c3b4e37186c641bc3501ca145f05e49aae1613402448c49a36a9b0055a9d5cc74edda0087d65f15d71e4e051cad208514ee99b6258f827a895d2eb4407e6b7b7a9d6bcc228e615d78a6a8b2c466d96a48ee2c7a736035e283917293271efdc7cbdf0a647917068ab197eec326359f829087bafd0fd95e5fcf645615f55040a847aab188c52f4dd3f61a15b2edfe22e6221a5b0b256f1d8da1e6b860b7c68213cc1fae88c0e86013d9000085216c3ee1ab6fd509500f038480929e335b4b3bb0150f881b831cc870de6d188bdd45a113989bc9d15fe2893ff94349", @ANYRESHEX=0x0, @ANYPTR64, @ANYRESHEX=r6, @ANYRES16=r0]], &(0x7f0000000180)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) 02:12:21 executing program 3: r0 = socket$inet(0xa, 0x801, 0x84) sendto(r0, &(0x7f0000000080)="f5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r0, 0xfc0004) accept(r0, 0x0, 0x0) r1 = socket$inet(0xa, 0x801, 0x84) sendto(r1, &(0x7f0000000080)="d5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r1, 0xfc0004) accept(r1, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x4) writev(r2, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d36020a8447000b4e230f00000000a2bc5603caf0000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed5e232e725839c97b910000", 0x104}], 0x1) [ 550.120221][ T1587] ceph: No path or : separator in source 02:12:21 executing program 3: r0 = socket$inet(0xa, 0x801, 0x84) sendto(r0, &(0x7f0000000080)="f5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r0, 0xfc0004) accept(r0, 0x0, 0x0) r1 = socket$inet(0xa, 0x801, 0x84) sendto(r1, &(0x7f0000000080)="d5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r1, 0xfc0004) accept(r1, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x4) writev(r2, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d36020a8447000b4e230f00000000a2bc5603ca1f040f7f89000000200000000101ff0000000309ff5bffff00c7e5ed5e232e725839c97b910000", 0x104}], 0x1) 02:12:21 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) get_mempolicy(&(0x7f00000003c0), &(0x7f0000000400), 0x289, &(0x7f0000fef000/0x10000)=nil, 0x2) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="c6566ceda4e3f1c409e9515b62be0157ec2275042709d8548cb34a00665921c0c26bc59a07847331f37bc0ef75a5460fe26079bfc6bed87ef39b93f39b6bd4dea2a4b89759e1a77e64786f7d3c9ce12e6e7091ca71c3576afb000000000000000000", @ANYRES32, @ANYRES32=0x0, @ANYRESHEX=r1, @ANYRESDEC=r2], 0x5, 0x1) wait4(r1, 0x0, 0x40000000, &(0x7f0000000200)) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/tty/drivers\x00', 0x0, 0x0) read(r3, &(0x7f0000000280)=""/152, 0x20000318) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/tty/drivers\x00', 0x0, 0x0) read(r4, &(0x7f0000000280)=""/152, 0x20000318) ioctl$VIDIOC_QUERYBUF(r3, 0xc0585609, &(0x7f00000002c0)={0x0, 0x0, 0x4, 0x63d263814f78ec42, 0x401, {0x0, 0x2710}, {0x3, 0xc, 0x6, 0x0, 0x3, 0x9, "878b2cbe"}, 0x3, 0xb, @offset=0x8000, 0x400, 0x0, r4}) setsockopt$RDS_RECVERR(r5, 0x114, 0x5, &(0x7f0000000100), 0x4) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r6 = syz_open_dev$dri(&(0x7f00000001c0)='/dev/dri/card#\x00', 0x1, 0x0) mount(&(0x7f00000000c0)=ANY=[@ANYPTR64=&(0x7f0000000740)=ANY=[@ANYRESHEX=0x0, @ANYPTR, @ANYPTR64, @ANYBLOB="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", @ANYRESHEX=0x0, @ANYPTR64, @ANYRESHEX=r6, @ANYRES16=r0]], &(0x7f0000000180)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) [ 550.199043][ T1587] ceph: No path or : separator in source [ 550.215261][ T1460] bond107: (slave veth319): Enslaving as an active interface with an up link [ 550.232768][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 02:12:21 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @remote}}) write$tun(r0, &(0x7f0000000180)={@void, @val={0x0, 0x0, 0x0, 0x500}, @mpls={[], @ipv6=@icmpv6={0x0, 0x6, "9eef7b", 0x9, 0x3c, 0x0, @remote, @mcast2, {[], @echo_request={0x80, 0x0, 0x0, 0x0, 0x0, "81"}}}}}, 0x3b) 02:12:21 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000003c0)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) syz_open_procfs(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$DRM_IOCTL_SET_MASTER(0xffffffffffffffff, 0x641e) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VHOST_SET_LOG_FD(0xffffffffffffffff, 0x4004af07, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) recvfrom$inet6(r3, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0x0) shutdown(r3, 0x1) r4 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r4, &(0x7f00000000c0), 0xfffffdda, 0x3f00, 0x0, 0x0) 02:12:21 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=ANY=[@ANYBLOB="3c00000010008506000000000000000000200000", @ANYRES32=r3, @ANYBLOB="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"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000540)={0x0, 0x1400, &(0x7f0000000200)={&(0x7f00000008c0)=@newlink={0x50, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x50}}, 0x0) 02:12:21 executing program 3: r0 = socket$inet(0xa, 0x801, 0x84) sendto(r0, &(0x7f0000000080)="f5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r0, 0xfc0004) accept(r0, 0x0, 0x0) r1 = socket$inet(0xa, 0x801, 0x84) sendto(r1, &(0x7f0000000080)="d5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r1, 0xfc0004) accept(r1, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x4) writev(r2, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d36020a8447000b4e230f00000000a2bc5603ca000a0f7f89000000200000000101ff0000000309ff5bffff00c7e5ed5e232e725839c97b910000", 0x104}], 0x1) [ 550.506981][ T1602] ceph: No path or : separator in source [ 550.529323][ T1611] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. [ 550.555107][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 550.741552][ T1602] ceph: No path or : separator in source 02:12:22 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r2 = gettid() process_vm_writev(r2, &(0x7f0000c22000)=[{&(0x7f000034afa4)=""/1, 0x1f80}], 0x2d0, &(0x7f0000c22fa0)=[{&(0x7f0000000080)=""/1, 0x2034afa5}], 0x1, 0x0) 02:12:22 executing program 3: r0 = socket$inet(0xa, 0x801, 0x84) sendto(r0, &(0x7f0000000080)="f5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r0, 0xfc0004) accept(r0, 0x0, 0x0) r1 = socket$inet(0xa, 0x801, 0x84) sendto(r1, &(0x7f0000000080)="d5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r1, 0xfc0004) accept(r1, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x4) writev(r2, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d36020a8447000b4e230f00000000a2bc5603ca000e0f7f89000000200000000101ff0000000309ff5bffff00c7e5ed5e232e725839c97b910000", 0x104}], 0x1) [ 550.788059][ T1616] bond108: (slave veth321): Enslaving as an active interface with an up link 02:12:22 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) get_mempolicy(&(0x7f00000003c0), &(0x7f0000000400), 0x289, &(0x7f0000fef000/0x10000)=nil, 0x2) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="c6566ceda4e3f1c409e9515b62be0157ec2275042709d8548cb34a00665921c0c26bc59a07847331f37bc0ef75a5460fe26079bfc6bed87ef39b93f39b6bd4dea2a4b89759e1a77e64786f7d3c9ce12e6e7091ca71c3576afb000000000000000000", @ANYRES32, @ANYRES32=0x0, @ANYRESHEX=r1, @ANYRESDEC=r2], 0x5, 0x1) wait4(r1, 0x0, 0x40000000, &(0x7f0000000200)) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/tty/drivers\x00', 0x0, 0x0) read(r3, &(0x7f0000000280)=""/152, 0x20000318) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/tty/drivers\x00', 0x0, 0x0) read(r4, &(0x7f0000000280)=""/152, 0x20000318) ioctl$VIDIOC_QUERYBUF(r3, 0xc0585609, &(0x7f00000002c0)={0x0, 0x0, 0x4, 0x63d263814f78ec42, 0x401, {0x0, 0x2710}, {0x3, 0xc, 0x6, 0x0, 0x3, 0x9, "878b2cbe"}, 0x3, 0xb, @offset=0x8000, 0x400, 0x0, r4}) setsockopt$RDS_RECVERR(r5, 0x114, 0x5, &(0x7f0000000100), 0x4) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r6 = syz_open_dev$dri(&(0x7f00000001c0)='/dev/dri/card#\x00', 0x1, 0x0) mount(&(0x7f00000000c0)=ANY=[@ANYPTR64=&(0x7f0000000740)=ANY=[@ANYRESHEX=0x0, @ANYPTR, @ANYPTR64, @ANYBLOB="974d3ab47b3b91beb0f4760669c8618bc33664faf9c8179efd568e4e4b38f30869aefe10a4ccb1c515487e645b4a11d7cd2fb39aa1efca7c1eb441061d2be4c165ca7804c2e94159863dcfcf75da45211fdd143b6c91d52ae9ac6a1c2f8173d8ee5682fc65a93dc45ead4a462d9e16ac3dff144c0fcc7d02fcf3fd3029b264f3550caaab22152365126be74a9ff91547eb273f83f2c2762b17b32d7d91ac013d6f5790d3bc09c1884d8c7f15be223a8c3b4e37186c641bc3501ca145f05e49aae1613402448c49a36a9b0055a9d5cc74edda0087d65f15d71e4e051cad208514ee99b6258f827a895d2eb4407e6b7b7a9d6bcc228e615d78a6a8b2c466d96a48ee2c7a736035e283917293271efdc7cbdf0a647917068ab197eec326359f829087bafd0fd95e5fcf645615f55040a847aab188c52f4dd3f61a15b2edfe22e6221a5b0b256f1d8da1e6b860b7c68213cc1fae88c0e86013d9000085216c3ee1ab6fd509500f038480929e335b4b3bb0150f881b831cc870de6d188bdd45a113989bc9d15fe2893ff94349", @ANYRESHEX=0x0, @ANYPTR64, @ANYRESHEX=r6, @ANYRES16=r0]], &(0x7f0000000180)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) 02:12:22 executing program 3: r0 = socket$inet(0xa, 0x801, 0x84) sendto(r0, &(0x7f0000000080)="f5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r0, 0xfc0004) accept(r0, 0x0, 0x0) r1 = socket$inet(0xa, 0x801, 0x84) sendto(r1, &(0x7f0000000080)="d5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r1, 0xfc0004) accept(r1, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x4) writev(r2, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d36020a8447000b4e230f00000000a2bc5603cac00e0f7f89000000200000000101ff0000000309ff5bffff00c7e5ed5e232e725839c97b910000", 0x104}], 0x1) [ 551.020692][ T1740] ceph: No path or : separator in source [ 551.153143][ T1740] ceph: No path or : separator in source 02:12:22 executing program 3: r0 = socket$inet(0xa, 0x801, 0x84) sendto(r0, &(0x7f0000000080)="f5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r0, 0xfc0004) accept(r0, 0x0, 0x0) r1 = socket$inet(0xa, 0x801, 0x84) sendto(r1, &(0x7f0000000080)="d5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r1, 0xfc0004) accept(r1, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x4) writev(r2, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d36020a8447000b4e230f00000000a2bc5603ca000f0f7f89000000200000000101ff0000000309ff5bffff00c7e5ed5e232e725839c97b910000", 0x104}], 0x1) 02:12:22 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) get_mempolicy(&(0x7f00000003c0), &(0x7f0000000400), 0x289, &(0x7f0000fef000/0x10000)=nil, 0x2) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="c6566ceda4e3f1c409e9515b62be0157ec2275042709d8548cb34a00665921c0c26bc59a07847331f37bc0ef75a5460fe26079bfc6bed87ef39b93f39b6bd4dea2a4b89759e1a77e64786f7d3c9ce12e6e7091ca71c3576afb000000000000000000", @ANYRES32, @ANYRES32=0x0, @ANYRESHEX=r1, @ANYRESDEC=r2], 0x5, 0x1) wait4(r1, 0x0, 0x40000000, &(0x7f0000000200)) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/tty/drivers\x00', 0x0, 0x0) read(r3, &(0x7f0000000280)=""/152, 0x20000318) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/tty/drivers\x00', 0x0, 0x0) read(r4, &(0x7f0000000280)=""/152, 0x20000318) ioctl$VIDIOC_QUERYBUF(r3, 0xc0585609, &(0x7f00000002c0)={0x0, 0x0, 0x4, 0x63d263814f78ec42, 0x401, {0x0, 0x2710}, {0x3, 0xc, 0x6, 0x0, 0x3, 0x9, "878b2cbe"}, 0x3, 0xb, @offset=0x8000, 0x400, 0x0, r4}) setsockopt$RDS_RECVERR(r5, 0x114, 0x5, &(0x7f0000000100), 0x4) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r6 = syz_open_dev$dri(&(0x7f00000001c0)='/dev/dri/card#\x00', 0x1, 0x0) mount(&(0x7f00000000c0)=ANY=[@ANYPTR64=&(0x7f0000000740)=ANY=[@ANYRESHEX=0x0, @ANYPTR, @ANYPTR64, @ANYBLOB="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", @ANYRESHEX=0x0, @ANYPTR64, @ANYRESHEX=r6, @ANYRES16=r0]], &(0x7f0000000180)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) [ 551.310781][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 02:12:22 executing program 3: r0 = socket$inet(0xa, 0x801, 0x84) sendto(r0, &(0x7f0000000080)="f5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r0, 0xfc0004) accept(r0, 0x0, 0x0) r1 = socket$inet(0xa, 0x801, 0x84) sendto(r1, &(0x7f0000000080)="d5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r1, 0xfc0004) accept(r1, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x4) writev(r2, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d36020a8447000b4e230f00000000a2bc5603ca041f0f7f89000000200000000101ff0000000309ff5bffff00c7e5ed5e232e725839c97b910000", 0x104}], 0x1) [ 551.488101][ T1756] ceph: No path or : separator in source [ 551.520722][ T1611] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. [ 551.572431][ T1756] ceph: No path or : separator in source 02:12:22 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) get_mempolicy(&(0x7f00000003c0), &(0x7f0000000400), 0x289, &(0x7f0000fef000/0x10000)=nil, 0x2) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="c6566ceda4e3f1c409e9515b62be0157ec2275042709d8548cb34a00665921c0c26bc59a07847331f37bc0ef75a5460fe26079bfc6bed87ef39b93f39b6bd4dea2a4b89759e1a77e64786f7d3c9ce12e6e7091ca71c3576afb000000000000000000", @ANYRES32, @ANYRES32=0x0, @ANYRESHEX=r1, @ANYRESDEC=r2], 0x5, 0x1) wait4(r1, 0x0, 0x40000000, &(0x7f0000000200)) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/tty/drivers\x00', 0x0, 0x0) read(r3, &(0x7f0000000280)=""/152, 0x20000318) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/tty/drivers\x00', 0x0, 0x0) read(r4, &(0x7f0000000280)=""/152, 0x20000318) ioctl$VIDIOC_QUERYBUF(r3, 0xc0585609, &(0x7f00000002c0)={0x0, 0x0, 0x4, 0x63d263814f78ec42, 0x401, {0x0, 0x2710}, {0x3, 0xc, 0x6, 0x0, 0x3, 0x9, "878b2cbe"}, 0x3, 0xb, @offset=0x8000, 0x400, 0x0, r4}) setsockopt$RDS_RECVERR(r5, 0x114, 0x5, &(0x7f0000000100), 0x4) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r6 = syz_open_dev$dri(&(0x7f00000001c0)='/dev/dri/card#\x00', 0x1, 0x0) mount(&(0x7f00000000c0)=ANY=[@ANYPTR64=&(0x7f0000000740)=ANY=[@ANYRESHEX=0x0, @ANYPTR, @ANYPTR64, @ANYBLOB="974d3ab47b3b91beb0f4760669c8618bc33664faf9c8179efd568e4e4b38f30869aefe10a4ccb1c515487e645b4a11d7cd2fb39aa1efca7c1eb441061d2be4c165ca7303c2e94159863dcfcf75da45211fdd143b6c91d52ae9ac6a1c2f8173d8ee5682fc65a93dc45ead4a462d9e16ac3dff144c0fcc7d02fcf3fd3029b264f3550caaab22152365126be74a9ff91547eb273f83f2c2762b17b32d7d91ac013d6f5790d3bc09c1884d8c7f15be223a8c3b4e37186c641bc3501ca145f05e49aae1613402448c49a36a9b0055a9d5cc74edda0087d65f15d71e4e051cad208514ee99b6258f827a895d2eb4407e6b7b7a9d6bcc228e615d78a6a8b2c466d96a48ee2c7a736035e283917293271efdc7cbdf0a647917068ab197eec326359f829087bafd0fd95e5fcf645615f55040a847aab188c52f4dd3f61a15b2edfe22e6221a5b0b256f1d8da1e6b860b7c68213cc1fae88c0e86013d9000085216c3ee1ab6fd509500f038480929e335b4b3bb0150f881b831cc870de6d188bdd45a113989bc9d15fe2893ff94349", @ANYRESHEX=0x0, @ANYPTR64, @ANYRESHEX=r6, @ANYRES16=r0]], &(0x7f0000000180)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) [ 551.623943][ T1616] bond108: (slave veth323): Enslaving as an active interface with an up link 02:12:23 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @remote}}) write$tun(r0, &(0x7f0000000180)={@void, @val={0x0, 0x0, 0x0, 0x600}, @mpls={[], @ipv6=@icmpv6={0x0, 0x6, "9eef7b", 0x9, 0x3c, 0x0, @remote, @mcast2, {[], @echo_request={0x80, 0x0, 0x0, 0x0, 0x0, "81"}}}}}, 0x3b) 02:12:23 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=ANY=[@ANYBLOB="3c00000010008506000000000000000000200000", @ANYRES32=r3, @ANYBLOB="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"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000540)={0x0, 0x1f00, &(0x7f0000000200)={&(0x7f00000008c0)=@newlink={0x50, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x50}}, 0x0) 02:12:23 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000003c0)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) syz_open_procfs(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$DRM_IOCTL_SET_MASTER(0xffffffffffffffff, 0x641e) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VHOST_SET_LOG_FD(0xffffffffffffffff, 0x4004af07, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) recvfrom$inet6(r3, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0x0) shutdown(r3, 0x1) r4 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r4, &(0x7f00000000c0), 0xfffffdda, 0x4000, 0x0, 0x0) 02:12:23 executing program 3: r0 = socket$inet(0xa, 0x801, 0x84) sendto(r0, &(0x7f0000000080)="f5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r0, 0xfc0004) accept(r0, 0x0, 0x0) r1 = socket$inet(0xa, 0x801, 0x84) sendto(r1, &(0x7f0000000080)="d5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r1, 0xfc0004) accept(r1, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x4) writev(r2, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d36020a8447000b4e230f00000000a2bc5603ca003f0f7f89000000200000000101ff0000000309ff5bffff00c7e5ed5e232e725839c97b910000", 0x104}], 0x1) [ 551.831785][ T1774] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. [ 551.918386][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 551.998090][ T1783] bond109: (slave veth325): Enslaving as an active interface with an up link 02:12:23 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r2 = gettid() process_vm_writev(r2, &(0x7f0000c22000)=[{&(0x7f000034afa4)=""/1, 0x1f80}], 0x2d1, &(0x7f0000c22fa0)=[{&(0x7f0000000080)=""/1, 0x2034afa5}], 0x1, 0x0) 02:12:23 executing program 3: r0 = socket$inet(0xa, 0x801, 0x84) sendto(r0, &(0x7f0000000080)="f5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r0, 0xfc0004) accept(r0, 0x0, 0x0) r1 = socket$inet(0xa, 0x801, 0x84) sendto(r1, &(0x7f0000000080)="d5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r1, 0xfc0004) accept(r1, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x4) writev(r2, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d36020a8447000b4e230f00000000a2bc5603ca00600f7f89000000200000000101ff0000000309ff5bffff00c7e5ed5e232e725839c97b910000", 0x104}], 0x1) [ 552.052093][ T1774] bond109: (slave veth327): Enslaving as an active interface with an up link 02:12:23 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=ANY=[@ANYBLOB="3c00000010008506000000000000000000200000", @ANYRES32=r3, @ANYBLOB="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"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000540)={0x0, 0x2000, &(0x7f0000000200)={&(0x7f00000008c0)=@newlink={0x50, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x50}}, 0x0) 02:12:23 executing program 3: r0 = socket$inet(0xa, 0x801, 0x84) sendto(r0, &(0x7f0000000080)="f5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r0, 0xfc0004) accept(r0, 0x0, 0x0) r1 = socket$inet(0xa, 0x801, 0x84) sendto(r1, &(0x7f0000000080)="d5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r1, 0xfc0004) accept(r1, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x4) writev(r2, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d36020a8447000b4e230f00000000a2bc5603ca6a640f7f89000000200000000101ff0000000309ff5bffff00c7e5ed5e232e725839c97b910000", 0x104}], 0x1) [ 552.313931][ T1767] ceph: No path or : separator in source 02:12:23 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) get_mempolicy(&(0x7f00000003c0), &(0x7f0000000400), 0x289, &(0x7f0000fef000/0x10000)=nil, 0x2) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="c6566ceda4e3f1c409e9515b62be0157ec2275042709d8548cb34a00665921c0c26bc59a07847331f37bc0ef75a5460fe26079bfc6bed87ef39b93f39b6bd4dea2a4b89759e1a77e64786f7d3c9ce12e6e7091ca71c3576afb000000000000000000", @ANYRES32, @ANYRES32=0x0, @ANYRESHEX=r1, @ANYRESDEC=r2], 0x5, 0x1) wait4(r1, 0x0, 0x40000000, &(0x7f0000000200)) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/tty/drivers\x00', 0x0, 0x0) read(r3, &(0x7f0000000280)=""/152, 0x20000318) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/tty/drivers\x00', 0x0, 0x0) read(r4, &(0x7f0000000280)=""/152, 0x20000318) ioctl$VIDIOC_QUERYBUF(r3, 0xc0585609, &(0x7f00000002c0)={0x0, 0x0, 0x4, 0x63d263814f78ec42, 0x401, {0x0, 0x2710}, {0x3, 0xc, 0x6, 0x0, 0x3, 0x9, "878b2cbe"}, 0x3, 0xb, @offset=0x8000, 0x400, 0x0, r4}) setsockopt$RDS_RECVERR(r5, 0x114, 0x5, &(0x7f0000000100), 0x4) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r6 = syz_open_dev$dri(&(0x7f00000001c0)='/dev/dri/card#\x00', 0x1, 0x0) mount(&(0x7f00000000c0)=ANY=[@ANYPTR64=&(0x7f0000000740)=ANY=[@ANYRESHEX=0x0, @ANYPTR, @ANYPTR64, @ANYBLOB="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", @ANYRESHEX=0x0, @ANYPTR64, @ANYRESHEX=r6, @ANYRES16=r0]], &(0x7f0000000180)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) 02:12:23 executing program 3: r0 = socket$inet(0xa, 0x801, 0x84) sendto(r0, &(0x7f0000000080)="f5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r0, 0xfc0004) accept(r0, 0x0, 0x0) r1 = socket$inet(0xa, 0x801, 0x84) sendto(r1, &(0x7f0000000080)="d5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r1, 0xfc0004) accept(r1, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x4) writev(r2, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d36020a8447000b4e230f00000000a2bc5603ca646a0f7f89000000200000000101ff0000000309ff5bffff00c7e5ed5e232e725839c97b910000", 0x104}], 0x1) 02:12:24 executing program 3: r0 = socket$inet(0xa, 0x801, 0x84) sendto(r0, &(0x7f0000000080)="f5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r0, 0xfc0004) accept(r0, 0x0, 0x0) r1 = socket$inet(0xa, 0x801, 0x84) sendto(r1, &(0x7f0000000080)="d5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r1, 0xfc0004) accept(r1, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x4) writev(r2, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d36020a8447000b4e230f00000000a2bc5603ca00bc0f7f89000000200000000101ff0000000309ff5bffff00c7e5ed5e232e725839c97b910000", 0x104}], 0x1) [ 552.695144][ T1928] ceph: No path or : separator in source 02:12:24 executing program 3: r0 = socket$inet(0xa, 0x801, 0x84) sendto(r0, &(0x7f0000000080)="f5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r0, 0xfc0004) accept(r0, 0x0, 0x0) r1 = socket$inet(0xa, 0x801, 0x84) sendto(r1, &(0x7f0000000080)="d5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r1, 0xfc0004) accept(r1, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x4) writev(r2, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d36020a8447000b4e230f00000000a2bc5603ca0ec00f7f89000000200000000101ff0000000309ff5bffff00c7e5ed5e232e725839c97b910000", 0x104}], 0x1) [ 552.843848][ T1913] __nla_validate_parse: 1 callbacks suppressed [ 552.843859][ T1913] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. [ 552.844931][ T1928] ceph: No path or : separator in source [ 553.024313][ T1917] bond110: (slave veth329): Enslaving as an active interface with an up link [ 553.064091][ T1913] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. 02:12:24 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @remote}}) write$tun(r0, &(0x7f0000000180)={@void, @val={0x0, 0x0, 0x0, 0x700}, @mpls={[], @ipv6=@icmpv6={0x0, 0x6, "9eef7b", 0x9, 0x3c, 0x0, @remote, @mcast2, {[], @echo_request={0x80, 0x0, 0x0, 0x0, 0x0, "81"}}}}}, 0x3b) 02:12:24 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) get_mempolicy(&(0x7f00000003c0), &(0x7f0000000400), 0x289, &(0x7f0000fef000/0x10000)=nil, 0x2) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="c6566ceda4e3f1c409e9515b62be0157ec2275042709d8548cb34a00665921c0c26bc59a07847331f37bc0ef75a5460fe26079bfc6bed87ef39b93f39b6bd4dea2a4b89759e1a77e64786f7d3c9ce12e6e7091ca71c3576afb000000000000000000", @ANYRES32, @ANYRES32=0x0, @ANYRESHEX=r1, @ANYRESDEC=r2], 0x5, 0x1) wait4(r1, 0x0, 0x40000000, &(0x7f0000000200)) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/tty/drivers\x00', 0x0, 0x0) read(r3, &(0x7f0000000280)=""/152, 0x20000318) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/tty/drivers\x00', 0x0, 0x0) read(r4, &(0x7f0000000280)=""/152, 0x20000318) ioctl$VIDIOC_QUERYBUF(r3, 0xc0585609, &(0x7f00000002c0)={0x0, 0x0, 0x4, 0x63d263814f78ec42, 0x401, {0x0, 0x2710}, {0x3, 0xc, 0x6, 0x0, 0x3, 0x9, "878b2cbe"}, 0x3, 0xb, @offset=0x8000, 0x400, 0x0, r4}) setsockopt$RDS_RECVERR(r5, 0x114, 0x5, &(0x7f0000000100), 0x4) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r6 = syz_open_dev$dri(&(0x7f00000001c0)='/dev/dri/card#\x00', 0x1, 0x0) mount(&(0x7f00000000c0)=ANY=[@ANYPTR64=&(0x7f0000000740)=ANY=[@ANYRESHEX=0x0, @ANYPTR, @ANYPTR64, @ANYBLOB="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", @ANYRESHEX=0x0, @ANYPTR64, @ANYRESHEX=r6, @ANYRES16=r0]], &(0x7f0000000180)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) 02:12:24 executing program 3: r0 = socket$inet(0xa, 0x801, 0x84) sendto(r0, &(0x7f0000000080)="f5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r0, 0xfc0004) accept(r0, 0x0, 0x0) r1 = socket$inet(0xa, 0x801, 0x84) sendto(r1, &(0x7f0000000080)="d5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r1, 0xfc0004) accept(r1, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x4) writev(r2, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d36020a8447000b4e230f00000000a2bc5603ca00f00f7f89000000200000000101ff0000000309ff5bffff00c7e5ed5e232e725839c97b910000", 0x104}], 0x1) 02:12:24 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000003c0)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) syz_open_procfs(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$DRM_IOCTL_SET_MASTER(0xffffffffffffffff, 0x641e) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VHOST_SET_LOG_FD(0xffffffffffffffff, 0x4004af07, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) recvfrom$inet6(r3, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0x0) shutdown(r3, 0x1) r4 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r4, &(0x7f00000000c0), 0xfffffdda, 0x4002, 0x0, 0x0) 02:12:24 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r2 = gettid() process_vm_writev(r2, &(0x7f0000c22000)=[{&(0x7f000034afa4)=""/1, 0x1f80}], 0x2d2, &(0x7f0000c22fa0)=[{&(0x7f0000000080)=""/1, 0x2034afa5}], 0x1, 0x0) [ 553.155276][ T1948] bond110: (slave veth331): Enslaving as an active interface with an up link 02:12:24 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=ANY=[@ANYBLOB="3c00000010008506000000000000000000200000", @ANYRES32=r3, @ANYBLOB="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"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000540)={0x0, 0x2002, &(0x7f0000000200)={&(0x7f00000008c0)=@newlink={0x50, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x50}}, 0x0) [ 553.269053][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 553.322507][ T1960] ceph: No path or : separator in source 02:12:24 executing program 3: r0 = socket$inet(0xa, 0x801, 0x84) sendto(r0, &(0x7f0000000080)="f5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r0, 0xfc0004) accept(r0, 0x0, 0x0) r1 = socket$inet(0xa, 0x801, 0x84) sendto(r1, &(0x7f0000000080)="d5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r1, 0xfc0004) accept(r1, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x4) writev(r2, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d36020a8447000b4e230f00000000a2bc5603ca00020f7f89000000200000000101ff0000000309ff5bffff00c7e5ed5e232e725839c97b910000", 0x104}], 0x1) 02:12:24 executing program 3: r0 = socket$inet(0xa, 0x801, 0x84) sendto(r0, &(0x7f0000000080)="f5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r0, 0xfc0004) accept(r0, 0x0, 0x0) r1 = socket$inet(0xa, 0x801, 0x84) sendto(r1, &(0x7f0000000080)="d5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r1, 0xfc0004) accept(r1, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x4) writev(r2, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d36020a8447000b4e230f00000000a2bc5603ca00040f7f89000000200000000101ff0000000309ff5bffff00c7e5ed5e232e725839c97b910000", 0x104}], 0x1) 02:12:25 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) get_mempolicy(&(0x7f00000003c0), &(0x7f0000000400), 0x289, &(0x7f0000fef000/0x10000)=nil, 0x2) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="c6566ceda4e3f1c409e9515b62be0157ec2275042709d8548cb34a00665921c0c26bc59a07847331f37bc0ef75a5460fe26079bfc6bed87ef39b93f39b6bd4dea2a4b89759e1a77e64786f7d3c9ce12e6e7091ca71c3576afb000000000000000000", @ANYRES32, @ANYRES32=0x0, @ANYRESHEX=r1, @ANYRESDEC=r2], 0x5, 0x1) wait4(r1, 0x0, 0x40000000, &(0x7f0000000200)) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/tty/drivers\x00', 0x0, 0x0) read(r3, &(0x7f0000000280)=""/152, 0x20000318) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/tty/drivers\x00', 0x0, 0x0) read(r4, &(0x7f0000000280)=""/152, 0x20000318) ioctl$VIDIOC_QUERYBUF(r3, 0xc0585609, &(0x7f00000002c0)={0x0, 0x0, 0x4, 0x63d263814f78ec42, 0x401, {0x0, 0x2710}, {0x3, 0xc, 0x6, 0x0, 0x3, 0x9, "878b2cbe"}, 0x3, 0xb, @offset=0x8000, 0x400, 0x0, r4}) setsockopt$RDS_RECVERR(r5, 0x114, 0x5, &(0x7f0000000100), 0x4) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r6 = syz_open_dev$dri(&(0x7f00000001c0)='/dev/dri/card#\x00', 0x1, 0x0) mount(&(0x7f00000000c0)=ANY=[@ANYPTR64=&(0x7f0000000740)=ANY=[@ANYRESHEX=0x0, @ANYPTR, @ANYPTR64, @ANYBLOB="974d3ab47b3b91beb0f4760669c8618bc33664faf9c8179efd568e4e4b38f30869aefe10a4ccb1c515487e645b4a11d7cd2fb39aa1efca7c1eb441061d2be4c165ca7307c2e94159863dcfcf75da45211fdd143b6c91d52ae9ac6a1c2f8173d8ee5682fc65a93dc45ead4a462d9e16ac3dff144c0fcc7d02fcf3fd3029b264f3550caaab22152365126be74a9ff91547eb273f83f2c2762b17b32d7d91ac013d6f5790d3bc09c1884d8c7f15be223a8c3b4e37186c641bc3501ca145f05e49aae1613402448c49a36a9b0055a9d5cc74edda0087d65f15d71e4e051cad208514ee99b6258f827a895d2eb4407e6b7b7a9d6bcc228e615d78a6a8b2c466d96a48ee2c7a736035e283917293271efdc7cbdf0a647917068ab197eec326359f829087bafd0fd95e5fcf645615f55040a847aab188c52f4dd3f61a15b2edfe22e6221a5b0b256f1d8da1e6b860b7c68213cc1fae88c0e86013d9000085216c3ee1ab6fd509500f038480929e335b4b3bb0150f881b831cc870de6d188bdd45a113989bc9d15fe2893ff94349", @ANYRESHEX=0x0, @ANYPTR64, @ANYRESHEX=r6, @ANYRES16=r0]], &(0x7f0000000180)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) [ 553.667523][ T1960] ceph: No path or : separator in source 02:12:25 executing program 3: r0 = socket$inet(0xa, 0x801, 0x84) sendto(r0, &(0x7f0000000080)="f5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r0, 0xfc0004) accept(r0, 0x0, 0x0) r1 = socket$inet(0xa, 0x801, 0x84) sendto(r1, &(0x7f0000000080)="d5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r1, 0xfc0004) accept(r1, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x4) writev(r2, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d36020a8447000b4e230f00000000a2bc5603ca000a0f7f89000000200000000101ff0000000309ff5bffff00c7e5ed5e232e725839c97b910000", 0x104}], 0x1) 02:12:25 executing program 3: r0 = socket$inet(0xa, 0x801, 0x84) sendto(r0, &(0x7f0000000080)="f5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r0, 0xfc0004) accept(r0, 0x0, 0x0) r1 = socket$inet(0xa, 0x801, 0x84) sendto(r1, &(0x7f0000000080)="d5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r1, 0xfc0004) accept(r1, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x4) writev(r2, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d36020a8447000b4e230f00000000a2bc5603ca000e0f7f89000000200000000101ff0000000309ff5bffff00c7e5ed5e232e725839c97b910000", 0x104}], 0x1) [ 554.041016][ T1971] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. [ 554.056970][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 554.070698][ T1986] ceph: No path or : separator in source [ 554.167145][ T1988] ceph: No path or : separator in source 02:12:25 executing program 3: r0 = socket$inet(0xa, 0x801, 0x84) sendto(r0, &(0x7f0000000080)="f5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r0, 0xfc0004) accept(r0, 0x0, 0x0) r1 = socket$inet(0xa, 0x801, 0x84) sendto(r1, &(0x7f0000000080)="d5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r1, 0xfc0004) accept(r1, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x4) writev(r2, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d36020a8447000b4e230f00000000a2bc5603ca000f0f7f89000000200000000101ff0000000309ff5bffff00c7e5ed5e232e725839c97b910000", 0x104}], 0x1) [ 554.213082][ T1975] bond111: (slave veth333): Enslaving as an active interface with an up link [ 554.278182][ T1971] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. [ 554.432004][ T2002] bond111: (slave veth335): Enslaving as an active interface with an up link 02:12:26 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @remote}}) write$tun(r0, &(0x7f0000000180)={@void, @val={0x0, 0x0, 0x0, 0xe80}, @mpls={[], @ipv6=@icmpv6={0x0, 0x6, "9eef7b", 0x9, 0x3c, 0x0, @remote, @mcast2, {[], @echo_request={0x80, 0x0, 0x0, 0x0, 0x0, "81"}}}}}, 0x3b) 02:12:26 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) get_mempolicy(&(0x7f00000003c0), &(0x7f0000000400), 0x289, &(0x7f0000fef000/0x10000)=nil, 0x2) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="c6566ceda4e3f1c409e9515b62be0157ec2275042709d8548cb34a00665921c0c26bc59a07847331f37bc0ef75a5460fe26079bfc6bed87ef39b93f39b6bd4dea2a4b89759e1a77e64786f7d3c9ce12e6e7091ca71c3576afb000000000000000000", @ANYRES32, @ANYRES32=0x0, @ANYRESHEX=r1, @ANYRESDEC=r2], 0x5, 0x1) wait4(r1, 0x0, 0x40000000, &(0x7f0000000200)) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/tty/drivers\x00', 0x0, 0x0) read(r3, &(0x7f0000000280)=""/152, 0x20000318) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/tty/drivers\x00', 0x0, 0x0) read(r4, &(0x7f0000000280)=""/152, 0x20000318) ioctl$VIDIOC_QUERYBUF(r3, 0xc0585609, &(0x7f00000002c0)={0x0, 0x0, 0x4, 0x63d263814f78ec42, 0x401, {0x0, 0x2710}, {0x3, 0xc, 0x6, 0x0, 0x3, 0x9, "878b2cbe"}, 0x3, 0xb, @offset=0x8000, 0x400, 0x0, r4}) setsockopt$RDS_RECVERR(r5, 0x114, 0x5, &(0x7f0000000100), 0x4) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r6 = syz_open_dev$dri(&(0x7f00000001c0)='/dev/dri/card#\x00', 0x1, 0x0) mount(&(0x7f00000000c0)=ANY=[@ANYPTR64=&(0x7f0000000740)=ANY=[@ANYRESHEX=0x0, @ANYPTR, @ANYPTR64, @ANYBLOB="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", @ANYRESHEX=0x0, @ANYPTR64, @ANYRESHEX=r6, @ANYRES16=r0]], &(0x7f0000000180)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) 02:12:26 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000003c0)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) syz_open_procfs(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$DRM_IOCTL_SET_MASTER(0xffffffffffffffff, 0x641e) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VHOST_SET_LOG_FD(0xffffffffffffffff, 0x4004af07, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) recvfrom$inet6(r3, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0x0) shutdown(r3, 0x1) r4 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r4, &(0x7f00000000c0), 0xfffffdda, 0x40d1, 0x0, 0x0) 02:12:26 executing program 3: r0 = socket$inet(0xa, 0x801, 0x84) sendto(r0, &(0x7f0000000080)="f5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r0, 0xfc0004) accept(r0, 0x0, 0x0) r1 = socket$inet(0xa, 0x801, 0x84) sendto(r1, &(0x7f0000000080)="d5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r1, 0xfc0004) accept(r1, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x4) writev(r2, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d36020a8447000b4e230f00000000a2bc5603ca00600f7f89000000200000000101ff0000000309ff5bffff00c7e5ed5e232e725839c97b910000", 0x104}], 0x1) 02:12:26 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r2 = gettid() process_vm_writev(r2, &(0x7f0000c22000)=[{&(0x7f000034afa4)=""/1, 0x1f80}], 0x2d3, &(0x7f0000c22fa0)=[{&(0x7f0000000080)=""/1, 0x2034afa5}], 0x1, 0x0) 02:12:26 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=ANY=[@ANYBLOB="3c00000010008506000000000000000000200000", @ANYRES32=r3, @ANYBLOB="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"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000540)={0x0, 0x2a00, &(0x7f0000000200)={&(0x7f00000008c0)=@newlink={0x50, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x50}}, 0x0) [ 554.919966][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 554.939427][ T2120] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. [ 554.972300][ T2119] ceph: No path or : separator in source 02:12:26 executing program 3: r0 = socket$inet(0xa, 0x801, 0x84) sendto(r0, &(0x7f0000000080)="f5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r0, 0xfc0004) accept(r0, 0x0, 0x0) r1 = socket$inet(0xa, 0x801, 0x84) sendto(r1, &(0x7f0000000080)="d5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r1, 0xfc0004) accept(r1, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x4) writev(r2, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d36020a8447000b4e230f00000000a2bc5603ca00bc0f7f89000000200000000101ff0000000309ff5bffff00c7e5ed5e232e725839c97b910000", 0x104}], 0x1) [ 555.088437][ T2119] ceph: No path or : separator in source [ 555.126360][ T2128] bond112: (slave veth337): Enslaving as an active interface with an up link 02:12:26 executing program 3: r0 = socket$inet(0xa, 0x801, 0x84) sendto(r0, &(0x7f0000000080)="f5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r0, 0xfc0004) accept(r0, 0x0, 0x0) r1 = socket$inet(0xa, 0x801, 0x84) sendto(r1, &(0x7f0000000080)="d5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r1, 0xfc0004) accept(r1, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x4) writev(r2, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d36020a8447000b4e230f00000000a2bc5603ca0000407f89000000200000000101ff0000000309ff5bffff00c7e5ed5e232e725839c97b910000", 0x104}], 0x1) [ 555.183135][ T2120] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. 02:12:26 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000003c0)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) syz_open_procfs(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$DRM_IOCTL_SET_MASTER(0xffffffffffffffff, 0x641e) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VHOST_SET_LOG_FD(0xffffffffffffffff, 0x4004af07, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) recvfrom$inet6(r3, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0x0) shutdown(r3, 0x1) r4 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r4, &(0x7f00000000c0), 0xfffffdda, 0x45c0, 0x0, 0x0) 02:12:26 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) get_mempolicy(&(0x7f00000003c0), &(0x7f0000000400), 0x289, &(0x7f0000fef000/0x10000)=nil, 0x2) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="c6566ceda4e3f1c409e9515b62be0157ec2275042709d8548cb34a00665921c0c26bc59a07847331f37bc0ef75a5460fe26079bfc6bed87ef39b93f39b6bd4dea2a4b89759e1a77e64786f7d3c9ce12e6e7091ca71c3576afb000000000000000000", @ANYRES32, @ANYRES32=0x0, @ANYRESHEX=r1, @ANYRESDEC=r2], 0x5, 0x1) wait4(r1, 0x0, 0x40000000, &(0x7f0000000200)) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/tty/drivers\x00', 0x0, 0x0) read(r3, &(0x7f0000000280)=""/152, 0x20000318) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/tty/drivers\x00', 0x0, 0x0) read(r4, &(0x7f0000000280)=""/152, 0x20000318) ioctl$VIDIOC_QUERYBUF(r3, 0xc0585609, &(0x7f00000002c0)={0x0, 0x0, 0x4, 0x63d263814f78ec42, 0x401, {0x0, 0x2710}, {0x3, 0xc, 0x6, 0x0, 0x3, 0x9, "878b2cbe"}, 0x3, 0xb, @offset=0x8000, 0x400, 0x0, r4}) setsockopt$RDS_RECVERR(r5, 0x114, 0x5, &(0x7f0000000100), 0x4) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r6 = syz_open_dev$dri(&(0x7f00000001c0)='/dev/dri/card#\x00', 0x1, 0x0) mount(&(0x7f00000000c0)=ANY=[@ANYPTR64=&(0x7f0000000740)=ANY=[@ANYRESHEX=0x0, @ANYPTR, @ANYPTR64, @ANYBLOB="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", @ANYRESHEX=0x0, @ANYPTR64, @ANYRESHEX=r6, @ANYRES16=r0]], &(0x7f0000000180)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) 02:12:26 executing program 3: r0 = socket$inet(0xa, 0x801, 0x84) sendto(r0, &(0x7f0000000080)="f5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r0, 0xfc0004) accept(r0, 0x0, 0x0) r1 = socket$inet(0xa, 0x801, 0x84) sendto(r1, &(0x7f0000000080)="d5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r1, 0xfc0004) accept(r1, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x4) writev(r2, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d36020a8447000b4e230f00000000a2bc5603ca00000f7f89020000200000000101ff0000000309ff5bffff00c7e5ed5e232e725839c97b910000", 0x104}], 0x1) [ 555.413564][ T2120] bond112: (slave veth339): Enslaving as an active interface with an up link [ 555.433738][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 02:12:26 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=ANY=[@ANYBLOB="3c00000010008506000000000000000000200000", @ANYRES32=r3, @ANYBLOB="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"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000540)={0x0, 0x3f00, &(0x7f0000000200)={&(0x7f00000008c0)=@newlink={0x50, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x50}}, 0x0) [ 555.504762][ T2248] ceph: No path or : separator in source 02:12:26 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @remote}}) write$tun(r0, &(0x7f0000000180)={@void, @val={0x0, 0x0, 0x0, 0x1100}, @mpls={[], @ipv6=@icmpv6={0x0, 0x6, "9eef7b", 0x9, 0x3c, 0x0, @remote, @mcast2, {[], @echo_request={0x80, 0x0, 0x0, 0x0, 0x0, "81"}}}}}, 0x3b) [ 555.619944][ T2248] ceph: No path or : separator in source [ 555.627483][ T2259] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. 02:12:27 executing program 3: r0 = socket$inet(0xa, 0x801, 0x84) sendto(r0, &(0x7f0000000080)="f5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r0, 0xfc0004) accept(r0, 0x0, 0x0) r1 = socket$inet(0xa, 0x801, 0x84) sendto(r1, &(0x7f0000000080)="d5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r1, 0xfc0004) accept(r1, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x4) writev(r2, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d36020a8447000b4e230f00000000a2bc5603ca00000f7f89040000200000000101ff0000000309ff5bffff00c7e5ed5e232e725839c97b910000", 0x104}], 0x1) 02:12:27 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) get_mempolicy(&(0x7f00000003c0), &(0x7f0000000400), 0x289, &(0x7f0000fef000/0x10000)=nil, 0x2) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="c6566ceda4e3f1c409e9515b62be0157ec2275042709d8548cb34a00665921c0c26bc59a07847331f37bc0ef75a5460fe26079bfc6bed87ef39b93f39b6bd4dea2a4b89759e1a77e64786f7d3c9ce12e6e7091ca71c3576afb000000000000000000", @ANYRES32, @ANYRES32=0x0, @ANYRESHEX=r1, @ANYRESDEC=r2], 0x5, 0x1) wait4(r1, 0x0, 0x40000000, &(0x7f0000000200)) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/tty/drivers\x00', 0x0, 0x0) read(r3, &(0x7f0000000280)=""/152, 0x20000318) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/tty/drivers\x00', 0x0, 0x0) read(r4, &(0x7f0000000280)=""/152, 0x20000318) ioctl$VIDIOC_QUERYBUF(r3, 0xc0585609, &(0x7f00000002c0)={0x0, 0x0, 0x4, 0x63d263814f78ec42, 0x401, {0x0, 0x2710}, {0x3, 0xc, 0x6, 0x0, 0x3, 0x9, "878b2cbe"}, 0x3, 0xb, @offset=0x8000, 0x400, 0x0, r4}) setsockopt$RDS_RECVERR(r5, 0x114, 0x5, &(0x7f0000000100), 0x4) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r6 = syz_open_dev$dri(&(0x7f00000001c0)='/dev/dri/card#\x00', 0x1, 0x0) mount(&(0x7f00000000c0)=ANY=[@ANYPTR64=&(0x7f0000000740)=ANY=[@ANYRESHEX=0x0, @ANYPTR, @ANYPTR64, @ANYBLOB="974d3ab47b3b91beb0f4760669c8618bc33664faf9c8179efd568e4e4b38f30869aefe10a4ccb1c515487e645b4a11d7cd2fb39aa1efca7c1eb441061d2be4c165ca7310c2e94159863dcfcf75da45211fdd143b6c91d52ae9ac6a1c2f8173d8ee5682fc65a93dc45ead4a462d9e16ac3dff144c0fcc7d02fcf3fd3029b264f3550caaab22152365126be74a9ff91547eb273f83f2c2762b17b32d7d91ac013d6f5790d3bc09c1884d8c7f15be223a8c3b4e37186c641bc3501ca145f05e49aae1613402448c49a36a9b0055a9d5cc74edda0087d65f15d71e4e051cad208514ee99b6258f827a895d2eb4407e6b7b7a9d6bcc228e615d78a6a8b2c466d96a48ee2c7a736035e283917293271efdc7cbdf0a647917068ab197eec326359f829087bafd0fd95e5fcf645615f55040a847aab188c52f4dd3f61a15b2edfe22e6221a5b0b256f1d8da1e6b860b7c68213cc1fae88c0e86013d9000085216c3ee1ab6fd509500f038480929e335b4b3bb0150f881b831cc870de6d188bdd45a113989bc9d15fe2893ff94349", @ANYRESHEX=0x0, @ANYPTR64, @ANYRESHEX=r6, @ANYRES16=r0]], &(0x7f0000000180)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) [ 555.820193][ T2264] bond113: (slave veth341): Enslaving as an active interface with an up link 02:12:27 executing program 3: r0 = socket$inet(0xa, 0x801, 0x84) sendto(r0, &(0x7f0000000080)="f5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r0, 0xfc0004) accept(r0, 0x0, 0x0) r1 = socket$inet(0xa, 0x801, 0x84) sendto(r1, &(0x7f0000000080)="d5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r1, 0xfc0004) accept(r1, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x4) writev(r2, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d36020a8447000b4e230f00000000a2bc5603ca00000f7f890a0000200000000101ff0000000309ff5bffff00c7e5ed5e232e725839c97b910000", 0x104}], 0x1) [ 555.932820][ T2264] bond113: (slave veth343): Enslaving as an active interface with an up link [ 556.006018][ T2259] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. [ 556.024096][ T2372] ceph: No path or : separator in source 02:12:27 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r2 = gettid() process_vm_writev(r2, &(0x7f0000c22000)=[{&(0x7f000034afa4)=""/1, 0x1f80}], 0x2d4, &(0x7f0000c22fa0)=[{&(0x7f0000000080)=""/1, 0x2034afa5}], 0x1, 0x0) 02:12:27 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @remote}}) write$tun(r0, &(0x7f0000000180)={@void, @val={0x0, 0x0, 0x0, 0x3100}, @mpls={[], @ipv6=@icmpv6={0x0, 0x6, "9eef7b", 0x9, 0x3c, 0x0, @remote, @mcast2, {[], @echo_request={0x80, 0x0, 0x0, 0x0, 0x0, "81"}}}}}, 0x3b) 02:12:27 executing program 3: r0 = socket$inet(0xa, 0x801, 0x84) sendto(r0, &(0x7f0000000080)="f5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r0, 0xfc0004) accept(r0, 0x0, 0x0) r1 = socket$inet(0xa, 0x801, 0x84) sendto(r1, &(0x7f0000000080)="d5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r1, 0xfc0004) accept(r1, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x4) writev(r2, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d36020a8447000b4e230f00000000a2bc5603ca00000f7f890e0000200000000101ff0000000309ff5bffff00c7e5ed5e232e725839c97b910000", 0x104}], 0x1) 02:12:27 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=ANY=[@ANYBLOB="3c00000010008506000000000000000000200000", @ANYRES32=r3, @ANYBLOB="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"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000540)={0x0, 0x4000, &(0x7f0000000200)={&(0x7f00000008c0)=@newlink={0x50, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x50}}, 0x0) [ 556.159988][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 02:12:27 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000003c0)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) syz_open_procfs(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$DRM_IOCTL_SET_MASTER(0xffffffffffffffff, 0x641e) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VHOST_SET_LOG_FD(0xffffffffffffffff, 0x4004af07, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) recvfrom$inet6(r3, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0x0) shutdown(r3, 0x1) r4 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r4, &(0x7f00000000c0), 0xfffffdda, 0x4c1d, 0x0, 0x0) [ 556.326532][ T2372] ceph: No path or : separator in source 02:12:27 executing program 3: r0 = socket$inet(0xa, 0x801, 0x84) sendto(r0, &(0x7f0000000080)="f5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r0, 0xfc0004) accept(r0, 0x0, 0x0) r1 = socket$inet(0xa, 0x801, 0x84) sendto(r1, &(0x7f0000000080)="d5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r1, 0xfc0004) accept(r1, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x4) writev(r2, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d36020a8447000b4e230f00000000a2bc5603ca00000f7f890f0000200000000101ff0000000309ff5bffff00c7e5ed5e232e725839c97b910000", 0x104}], 0x1) 02:12:27 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) get_mempolicy(&(0x7f00000003c0), &(0x7f0000000400), 0x289, &(0x7f0000fef000/0x10000)=nil, 0x2) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="c6566ceda4e3f1c409e9515b62be0157ec2275042709d8548cb34a00665921c0c26bc59a07847331f37bc0ef75a5460fe26079bfc6bed87ef39b93f39b6bd4dea2a4b89759e1a77e64786f7d3c9ce12e6e7091ca71c3576afb000000000000000000", @ANYRES32, @ANYRES32=0x0, @ANYRESHEX=r1, @ANYRESDEC=r2], 0x5, 0x1) wait4(r1, 0x0, 0x40000000, &(0x7f0000000200)) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/tty/drivers\x00', 0x0, 0x0) read(r3, &(0x7f0000000280)=""/152, 0x20000318) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/tty/drivers\x00', 0x0, 0x0) read(r4, &(0x7f0000000280)=""/152, 0x20000318) ioctl$VIDIOC_QUERYBUF(r3, 0xc0585609, &(0x7f00000002c0)={0x0, 0x0, 0x4, 0x63d263814f78ec42, 0x401, {0x0, 0x2710}, {0x3, 0xc, 0x6, 0x0, 0x3, 0x9, "878b2cbe"}, 0x3, 0xb, @offset=0x8000, 0x400, 0x0, r4}) setsockopt$RDS_RECVERR(r5, 0x114, 0x5, &(0x7f0000000100), 0x4) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r6 = syz_open_dev$dri(&(0x7f00000001c0)='/dev/dri/card#\x00', 0x1, 0x0) mount(&(0x7f00000000c0)=ANY=[@ANYPTR64=&(0x7f0000000740)=ANY=[@ANYRESHEX=0x0, @ANYPTR, @ANYPTR64, @ANYBLOB="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", @ANYRESHEX=0x0, @ANYPTR64, @ANYRESHEX=r6, @ANYRES16=r0]], &(0x7f0000000180)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) [ 556.473178][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 556.678887][ T2405] ceph: No path or : separator in source 02:12:28 executing program 3: r0 = socket$inet(0xa, 0x801, 0x84) sendto(r0, &(0x7f0000000080)="f5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r0, 0xfc0004) accept(r0, 0x0, 0x0) r1 = socket$inet(0xa, 0x801, 0x84) sendto(r1, &(0x7f0000000080)="d5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r1, 0xfc0004) accept(r1, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x4) writev(r2, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d36020a8447000b4e230f00000000a2bc5603ca00000f7f89600000200000000101ff0000000309ff5bffff00c7e5ed5e232e725839c97b910000", 0x104}], 0x1) [ 556.757852][ T2388] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. [ 556.790398][ T2405] ceph: No path or : separator in source 02:12:28 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) get_mempolicy(&(0x7f00000003c0), &(0x7f0000000400), 0x289, &(0x7f0000fef000/0x10000)=nil, 0x2) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="c6566ceda4e3f1c409e9515b62be0157ec2275042709d8548cb34a00665921c0c26bc59a07847331f37bc0ef75a5460fe26079bfc6bed87ef39b93f39b6bd4dea2a4b89759e1a77e64786f7d3c9ce12e6e7091ca71c3576afb000000000000000000", @ANYRES32, @ANYRES32=0x0, @ANYRESHEX=r1, @ANYRESDEC=r2], 0x5, 0x1) wait4(r1, 0x0, 0x40000000, &(0x7f0000000200)) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/tty/drivers\x00', 0x0, 0x0) read(r3, &(0x7f0000000280)=""/152, 0x20000318) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/tty/drivers\x00', 0x0, 0x0) read(r4, &(0x7f0000000280)=""/152, 0x20000318) ioctl$VIDIOC_QUERYBUF(r3, 0xc0585609, &(0x7f00000002c0)={0x0, 0x0, 0x4, 0x63d263814f78ec42, 0x401, {0x0, 0x2710}, {0x3, 0xc, 0x6, 0x0, 0x3, 0x9, "878b2cbe"}, 0x3, 0xb, @offset=0x8000, 0x400, 0x0, r4}) setsockopt$RDS_RECVERR(r5, 0x114, 0x5, &(0x7f0000000100), 0x4) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r6 = syz_open_dev$dri(&(0x7f00000001c0)='/dev/dri/card#\x00', 0x1, 0x0) mount(&(0x7f00000000c0)=ANY=[@ANYPTR64=&(0x7f0000000740)=ANY=[@ANYRESHEX=0x0, @ANYPTR, @ANYPTR64, @ANYBLOB="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", @ANYRESHEX=0x0, @ANYPTR64, @ANYRESHEX=r6, @ANYRES16=r0]], &(0x7f0000000180)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) 02:12:28 executing program 3: r0 = socket$inet(0xa, 0x801, 0x84) sendto(r0, &(0x7f0000000080)="f5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r0, 0xfc0004) accept(r0, 0x0, 0x0) r1 = socket$inet(0xa, 0x801, 0x84) sendto(r1, &(0x7f0000000080)="d5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r1, 0xfc0004) accept(r1, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x4) writev(r2, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d36020a8447000b4e230f00000000a2bc5603ca00000f7f89bc0000200000000101ff0000000309ff5bffff00c7e5ed5e232e725839c97b910000", 0x104}], 0x1) [ 557.033465][ T2393] bond114: (slave veth345): Enslaving as an active interface with an up link [ 557.042637][ T2419] ceph: No path or : separator in source 02:12:28 executing program 3: r0 = socket$inet(0xa, 0x801, 0x84) sendto(r0, &(0x7f0000000080)="f5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r0, 0xfc0004) accept(r0, 0x0, 0x0) r1 = socket$inet(0xa, 0x801, 0x84) sendto(r1, &(0x7f0000000080)="d5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r1, 0xfc0004) accept(r1, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x4) writev(r2, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d36020a8447000b4e230f00000000a2bc5603ca00000f7f89f00000200000000101ff0000000309ff5bffff00c7e5ed5e232e725839c97b910000", 0x104}], 0x1) [ 557.105270][ T2388] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. [ 557.144499][ T2419] ceph: No path or : separator in source [ 557.219454][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 557.247548][ T2422] bond114: (slave veth347): Enslaving as an active interface with an up link 02:12:28 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=ANY=[@ANYBLOB="3c00000010008506000000000000000000200000", @ANYRES32=r3, @ANYBLOB="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"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000540)={0x0, 0x4001, &(0x7f0000000200)={&(0x7f00000008c0)=@newlink={0x50, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x50}}, 0x0) 02:12:28 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r2 = gettid() process_vm_writev(r2, &(0x7f0000c22000)=[{&(0x7f000034afa4)=""/1, 0x1f80}], 0x2d5, &(0x7f0000c22fa0)=[{&(0x7f0000000080)=""/1, 0x2034afa5}], 0x1, 0x0) [ 557.787199][ T2538] bond115: (slave veth349): Enslaving as an active interface with an up link [ 557.822948][ T2536] bond115: (slave veth351): Enslaving as an active interface with an up link 02:12:29 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @remote}}) write$tun(r0, &(0x7f0000000180)={@void, @val={0x0, 0x0, 0x0, 0x800e}, @mpls={[], @ipv6=@icmpv6={0x0, 0x6, "9eef7b", 0x9, 0x3c, 0x0, @remote, @mcast2, {[], @echo_request={0x80, 0x0, 0x0, 0x0, 0x0, "81"}}}}}, 0x3b) 02:12:29 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) get_mempolicy(&(0x7f00000003c0), &(0x7f0000000400), 0x289, &(0x7f0000fef000/0x10000)=nil, 0x2) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="c6566ceda4e3f1c409e9515b62be0157ec2275042709d8548cb34a00665921c0c26bc59a07847331f37bc0ef75a5460fe26079bfc6bed87ef39b93f39b6bd4dea2a4b89759e1a77e64786f7d3c9ce12e6e7091ca71c3576afb000000000000000000", @ANYRES32, @ANYRES32=0x0, @ANYRESHEX=r1, @ANYRESDEC=r2], 0x5, 0x1) wait4(r1, 0x0, 0x40000000, &(0x7f0000000200)) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/tty/drivers\x00', 0x0, 0x0) read(r3, &(0x7f0000000280)=""/152, 0x20000318) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/tty/drivers\x00', 0x0, 0x0) read(r4, &(0x7f0000000280)=""/152, 0x20000318) ioctl$VIDIOC_QUERYBUF(r3, 0xc0585609, &(0x7f00000002c0)={0x0, 0x0, 0x4, 0x63d263814f78ec42, 0x401, {0x0, 0x2710}, {0x3, 0xc, 0x6, 0x0, 0x3, 0x9, "878b2cbe"}, 0x3, 0xb, @offset=0x8000, 0x400, 0x0, r4}) setsockopt$RDS_RECVERR(r5, 0x114, 0x5, &(0x7f0000000100), 0x4) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r6 = syz_open_dev$dri(&(0x7f00000001c0)='/dev/dri/card#\x00', 0x1, 0x0) mount(&(0x7f00000000c0)=ANY=[@ANYPTR64=&(0x7f0000000740)=ANY=[@ANYRESHEX=0x0, @ANYPTR, @ANYPTR64, @ANYBLOB="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", @ANYRESHEX=0x0, @ANYPTR64, @ANYRESHEX=r6, @ANYRES16=r0]], &(0x7f0000000180)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) 02:12:29 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000003c0)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) syz_open_procfs(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$DRM_IOCTL_SET_MASTER(0xffffffffffffffff, 0x641e) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VHOST_SET_LOG_FD(0xffffffffffffffff, 0x4004af07, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) recvfrom$inet6(r3, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0x0) shutdown(r3, 0x1) r4 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r4, &(0x7f00000000c0), 0xfffffdda, 0x60ae, 0x0, 0x0) 02:12:29 executing program 3: r0 = socket$inet(0xa, 0x801, 0x84) sendto(r0, &(0x7f0000000080)="f5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r0, 0xfc0004) accept(r0, 0x0, 0x0) r1 = socket$inet(0xa, 0x801, 0x84) sendto(r1, &(0x7f0000000080)="d5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r1, 0xfc0004) accept(r1, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x4) writev(r2, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d36020a8447000b4e230f00000000a2bc5603ca00000f7f891f0400200000000101ff0000000309ff5bffff00c7e5ed5e232e725839c97b910000", 0x104}], 0x1) 02:12:29 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=ANY=[@ANYBLOB="3c00000010008506000000000000000000200000", @ANYRES32=r3, @ANYBLOB="fe000000000000001c0012000c000100626f6e6400000c0002000800010004000000b8aaf229d19e07fa27e19cdb41f3c39e1c530c8a20b6a9fe127726c243d7f374621b469127371bf17de09220927367b4f1296344846c3bc446955ce991bf484e3dd09935b91aa4de8a507f572a73649c4f95d6d7f9314a580c324bd6a406d53aae87a12b4588407e8ff59d05817ca2a9a3c5649653ffcca5e348e8af4e31c68b5e33d1bddafd3852cf3a31ea0c2843f7e1ff56d00261a99131dd98230bccf89e843da42c421f16c4a0f8a5a3966189d9c8b0eae35b2ae281fd146388a6beb30330de35293082f09e52361f2ba9acfc2677b569368a3f32dfc40b2ea49cfd1b1da4cddabab8889fb2167a7d1b985503375bf58a4f1f0983a1fc18f0b8a974b3372341c1ad56f39e69212b2074e9b3e90000"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000540)={0x0, 0x4088, &(0x7f0000000200)={&(0x7f00000008c0)=@newlink={0x50, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x50}}, 0x0) 02:12:29 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r2 = gettid() process_vm_writev(r2, &(0x7f0000c22000)=[{&(0x7f000034afa4)=""/1, 0x1f80}], 0x2d6, &(0x7f0000c22fa0)=[{&(0x7f0000000080)=""/1, 0x2034afa5}], 0x1, 0x0) [ 557.969699][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 558.003323][ T2556] __nla_validate_parse: 2 callbacks suppressed [ 558.003334][ T2556] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. 02:12:29 executing program 3: r0 = socket$inet(0xa, 0x801, 0x84) sendto(r0, &(0x7f0000000080)="f5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r0, 0xfc0004) accept(r0, 0x0, 0x0) r1 = socket$inet(0xa, 0x801, 0x84) sendto(r1, &(0x7f0000000080)="d5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r1, 0xfc0004) accept(r1, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x4) writev(r2, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d36020a8447000b4e230f00000000a2bc5603ca00000f7f89000a00200000000101ff0000000309ff5bffff00c7e5ed5e232e725839c97b910000", 0x104}], 0x1) [ 558.166138][ T2555] ceph: No path or : separator in source [ 558.288359][ T2555] ceph: No path or : separator in source 02:12:29 executing program 3: r0 = socket$inet(0xa, 0x801, 0x84) sendto(r0, &(0x7f0000000080)="f5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r0, 0xfc0004) accept(r0, 0x0, 0x0) r1 = socket$inet(0xa, 0x801, 0x84) sendto(r1, &(0x7f0000000080)="d5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r1, 0xfc0004) accept(r1, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x4) writev(r2, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d36020a8447000b4e230f00000000a2bc5603ca00000f7f89000e00200000000101ff0000000309ff5bffff00c7e5ed5e232e725839c97b910000", 0x104}], 0x1) 02:12:29 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) get_mempolicy(&(0x7f00000003c0), &(0x7f0000000400), 0x289, &(0x7f0000fef000/0x10000)=nil, 0x2) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="c6566ceda4e3f1c409e9515b62be0157ec2275042709d8548cb34a00665921c0c26bc59a07847331f37bc0ef75a5460fe26079bfc6bed87ef39b93f39b6bd4dea2a4b89759e1a77e64786f7d3c9ce12e6e7091ca71c3576afb000000000000000000", @ANYRES32, @ANYRES32=0x0, @ANYRESHEX=r1, @ANYRESDEC=r2], 0x5, 0x1) wait4(r1, 0x0, 0x40000000, &(0x7f0000000200)) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/tty/drivers\x00', 0x0, 0x0) read(r3, &(0x7f0000000280)=""/152, 0x20000318) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/tty/drivers\x00', 0x0, 0x0) read(r4, &(0x7f0000000280)=""/152, 0x20000318) ioctl$VIDIOC_QUERYBUF(r3, 0xc0585609, &(0x7f00000002c0)={0x0, 0x0, 0x4, 0x63d263814f78ec42, 0x401, {0x0, 0x2710}, {0x3, 0xc, 0x6, 0x0, 0x3, 0x9, "878b2cbe"}, 0x3, 0xb, @offset=0x8000, 0x400, 0x0, r4}) setsockopt$RDS_RECVERR(r5, 0x114, 0x5, &(0x7f0000000100), 0x4) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r6 = syz_open_dev$dri(&(0x7f00000001c0)='/dev/dri/card#\x00', 0x1, 0x0) mount(&(0x7f00000000c0)=ANY=[@ANYPTR64=&(0x7f0000000740)=ANY=[@ANYRESHEX=0x0, @ANYPTR, @ANYPTR64, @ANYBLOB="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", @ANYRESHEX=0x0, @ANYPTR64, @ANYRESHEX=r6, @ANYRES16=r0]], &(0x7f0000000180)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) 02:12:29 executing program 3: r0 = socket$inet(0xa, 0x801, 0x84) sendto(r0, &(0x7f0000000080)="f5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r0, 0xfc0004) accept(r0, 0x0, 0x0) r1 = socket$inet(0xa, 0x801, 0x84) sendto(r1, &(0x7f0000000080)="d5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r1, 0xfc0004) accept(r1, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x4) writev(r2, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d36020a8447000b4e230f00000000a2bc5603ca00000f7f89c00e00200000000101ff0000000309ff5bffff00c7e5ed5e232e725839c97b910000", 0x104}], 0x1) [ 558.560972][ T2562] bond116: (slave veth353): Enslaving as an active interface with an up link [ 558.668651][ T2556] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. 02:12:30 executing program 3: r0 = socket$inet(0xa, 0x801, 0x84) sendto(r0, &(0x7f0000000080)="f5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r0, 0xfc0004) accept(r0, 0x0, 0x0) r1 = socket$inet(0xa, 0x801, 0x84) sendto(r1, &(0x7f0000000080)="d5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r1, 0xfc0004) accept(r1, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x4) writev(r2, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d36020a8447000b4e230f00000000a2bc5603ca00000f7f89000f00200000000101ff0000000309ff5bffff00c7e5ed5e232e725839c97b910000", 0x104}], 0x1) [ 558.711760][ T2562] bond116: (slave veth355): Enslaving as an active interface with an up link 02:12:30 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=ANY=[@ANYBLOB="3c00000010008506000000000000000000200000", @ANYRES32=r3, @ANYBLOB="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"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000540)={0x0, 0x4800, &(0x7f0000000200)={&(0x7f00000008c0)=@newlink={0x50, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x50}}, 0x0) 02:12:30 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @remote}}) write$tun(r0, &(0x7f0000000180)={@void, @val, @mpls={[], @ipv6=@icmpv6={0x0, 0x6, "9eef7b", 0x9, 0x3c, 0x0, @remote, @mcast2, {[], @echo_request={0x80, 0x0, 0x0, 0x0, 0x0, "81"}}}}}, 0x3b) [ 558.837760][ T2689] ceph: No path or : separator in source 02:12:30 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000003c0)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) syz_open_procfs(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$DRM_IOCTL_SET_MASTER(0xffffffffffffffff, 0x641e) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VHOST_SET_LOG_FD(0xffffffffffffffff, 0x4004af07, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) recvfrom$inet6(r3, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0x0) shutdown(r3, 0x1) r4 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r4, &(0x7f00000000c0), 0xfffffdda, 0x6300, 0x0, 0x0) [ 558.974586][ T2689] ceph: No path or : separator in source 02:12:30 executing program 3: r0 = socket$inet(0xa, 0x801, 0x84) sendto(r0, &(0x7f0000000080)="f5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r0, 0xfc0004) accept(r0, 0x0, 0x0) r1 = socket$inet(0xa, 0x801, 0x84) sendto(r1, &(0x7f0000000080)="d5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r1, 0xfc0004) accept(r1, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x4) writev(r2, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d36020a8447000b4e230f00000000a2bc5603ca00000f7f89041f00200000000101ff0000000309ff5bffff00c7e5ed5e232e725839c97b910000", 0x104}], 0x1) 02:12:30 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r2 = gettid() process_vm_writev(r2, &(0x7f0000c22000)=[{&(0x7f000034afa4)=""/1, 0x1f80}], 0x2d7, &(0x7f0000c22fa0)=[{&(0x7f0000000080)=""/1, 0x2034afa5}], 0x1, 0x0) 02:12:30 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) get_mempolicy(&(0x7f00000003c0), &(0x7f0000000400), 0x289, &(0x7f0000fef000/0x10000)=nil, 0x2) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="c6566ceda4e3f1c409e9515b62be0157ec2275042709d8548cb34a00665921c0c26bc59a07847331f37bc0ef75a5460fe26079bfc6bed87ef39b93f39b6bd4dea2a4b89759e1a77e64786f7d3c9ce12e6e7091ca71c3576afb000000000000000000", @ANYRES32, @ANYRES32=0x0, @ANYRESHEX=r1, @ANYRESDEC=r2], 0x5, 0x1) wait4(r1, 0x0, 0x40000000, &(0x7f0000000200)) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/tty/drivers\x00', 0x0, 0x0) read(r3, &(0x7f0000000280)=""/152, 0x20000318) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/tty/drivers\x00', 0x0, 0x0) read(r4, &(0x7f0000000280)=""/152, 0x20000318) ioctl$VIDIOC_QUERYBUF(r3, 0xc0585609, &(0x7f00000002c0)={0x0, 0x0, 0x4, 0x63d263814f78ec42, 0x401, {0x0, 0x2710}, {0x3, 0xc, 0x6, 0x0, 0x3, 0x9, "878b2cbe"}, 0x3, 0xb, @offset=0x8000, 0x400, 0x0, r4}) setsockopt$RDS_RECVERR(r5, 0x114, 0x5, &(0x7f0000000100), 0x4) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r6 = syz_open_dev$dri(&(0x7f00000001c0)='/dev/dri/card#\x00', 0x1, 0x0) mount(&(0x7f00000000c0)=ANY=[@ANYPTR64=&(0x7f0000000740)=ANY=[@ANYRESHEX=0x0, @ANYPTR, @ANYPTR64, @ANYBLOB="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", @ANYRESHEX=0x0, @ANYPTR64, @ANYRESHEX=r6, @ANYRES16=r0]], &(0x7f0000000180)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) [ 559.060326][ T2708] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. [ 559.168754][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 02:12:30 executing program 3: r0 = socket$inet(0xa, 0x801, 0x84) sendto(r0, &(0x7f0000000080)="f5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r0, 0xfc0004) accept(r0, 0x0, 0x0) r1 = socket$inet(0xa, 0x801, 0x84) sendto(r1, &(0x7f0000000080)="d5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r1, 0xfc0004) accept(r1, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x4) writev(r2, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d36020a8447000b4e230f00000000a2bc5603ca00000f7f89003f00200000000101ff0000000309ff5bffff00c7e5ed5e232e725839c97b910000", 0x104}], 0x1) [ 559.537864][ T2727] ceph: No path or : separator in source [ 559.577876][ T2712] bond117: (slave veth357): Enslaving as an active interface with an up link 02:12:30 executing program 3: r0 = socket$inet(0xa, 0x801, 0x84) sendto(r0, &(0x7f0000000080)="f5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r0, 0xfc0004) accept(r0, 0x0, 0x0) r1 = socket$inet(0xa, 0x801, 0x84) sendto(r1, &(0x7f0000000080)="d5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r1, 0xfc0004) accept(r1, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x4) writev(r2, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d36020a8447000b4e230f00000000a2bc5603ca00000f7f89006000200000000101ff0000000309ff5bffff00c7e5ed5e232e725839c97b910000", 0x104}], 0x1) 02:12:31 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) get_mempolicy(&(0x7f00000003c0), &(0x7f0000000400), 0x289, &(0x7f0000fef000/0x10000)=nil, 0x2) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="c6566ceda4e3f1c409e9515b62be0157ec2275042709d8548cb34a00665921c0c26bc59a07847331f37bc0ef75a5460fe26079bfc6bed87ef39b93f39b6bd4dea2a4b89759e1a77e64786f7d3c9ce12e6e7091ca71c3576afb000000000000000000", @ANYRES32, @ANYRES32=0x0, @ANYRESHEX=r1, @ANYRESDEC=r2], 0x5, 0x1) wait4(r1, 0x0, 0x40000000, &(0x7f0000000200)) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/tty/drivers\x00', 0x0, 0x0) read(r3, &(0x7f0000000280)=""/152, 0x20000318) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/tty/drivers\x00', 0x0, 0x0) read(r4, &(0x7f0000000280)=""/152, 0x20000318) ioctl$VIDIOC_QUERYBUF(r3, 0xc0585609, &(0x7f00000002c0)={0x0, 0x0, 0x4, 0x63d263814f78ec42, 0x401, {0x0, 0x2710}, {0x3, 0xc, 0x6, 0x0, 0x3, 0x9, "878b2cbe"}, 0x3, 0xb, @offset=0x8000, 0x400, 0x0, r4}) setsockopt$RDS_RECVERR(r5, 0x114, 0x5, &(0x7f0000000100), 0x4) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r6 = syz_open_dev$dri(&(0x7f00000001c0)='/dev/dri/card#\x00', 0x1, 0x0) mount(&(0x7f00000000c0)=ANY=[@ANYPTR64=&(0x7f0000000740)=ANY=[@ANYRESHEX=0x0, @ANYPTR, @ANYPTR64, @ANYBLOB="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", @ANYRESHEX=0x0, @ANYPTR64, @ANYRESHEX=r6, @ANYRES16=r0]], &(0x7f0000000180)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) [ 559.659078][ T2727] ceph: No path or : separator in source 02:12:31 executing program 3: r0 = socket$inet(0xa, 0x801, 0x84) sendto(r0, &(0x7f0000000080)="f5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r0, 0xfc0004) accept(r0, 0x0, 0x0) r1 = socket$inet(0xa, 0x801, 0x84) sendto(r1, &(0x7f0000000080)="d5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r1, 0xfc0004) accept(r1, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x4) writev(r2, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d36020a8447000b4e230f00000000a2bc5603ca00000f7f896a6400200000000101ff0000000309ff5bffff00c7e5ed5e232e725839c97b910000", 0x104}], 0x1) [ 559.885626][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 559.956436][ T2708] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. [ 559.978457][ T2739] ceph: No path or : separator in source 02:12:31 executing program 3: r0 = socket$inet(0xa, 0x801, 0x84) sendto(r0, &(0x7f0000000080)="f5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r0, 0xfc0004) accept(r0, 0x0, 0x0) r1 = socket$inet(0xa, 0x801, 0x84) sendto(r1, &(0x7f0000000080)="d5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r1, 0xfc0004) accept(r1, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x4) writev(r2, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d36020a8447000b4e230f00000000a2bc5603ca00000f7f89646a00200000000101ff0000000309ff5bffff00c7e5ed5e232e725839c97b910000", 0x104}], 0x1) 02:12:31 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=ANY=[@ANYBLOB="3c00000010008506000000000000000000200000", @ANYRES32=r3, @ANYBLOB="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"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000540)={0x0, 0x4a00, &(0x7f0000000200)={&(0x7f00000008c0)=@newlink={0x50, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x50}}, 0x0) [ 560.035645][ T2712] bond117: (slave veth359): Enslaving as an active interface with an up link [ 560.060092][ T2739] ceph: No path or : separator in source 02:12:31 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000003c0)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) syz_open_procfs(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$DRM_IOCTL_SET_MASTER(0xffffffffffffffff, 0x641e) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VHOST_SET_LOG_FD(0xffffffffffffffff, 0x4004af07, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) recvfrom$inet6(r3, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0x0) shutdown(r3, 0x1) r4 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r4, &(0x7f00000000c0), 0xfffffdda, 0x68a0, 0x0, 0x0) [ 560.200879][ T2786] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. [ 560.367853][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 560.382846][ T2859] bond118: (slave veth361): Enslaving as an active interface with an up link [ 560.643431][ T2786] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. [ 560.667166][ T2859] bond118: (slave veth363): Enslaving as an active interface with an up link 02:12:32 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @remote}}) write$tun(r0, &(0x7f0000000180)={@void, @val={0x0, 0x0, 0x0, 0x0, 0x2}, @mpls={[], @ipv6=@icmpv6={0x0, 0x6, "9eef7b", 0x9, 0x3c, 0x0, @remote, @mcast2, {[], @echo_request={0x80, 0x0, 0x0, 0x0, 0x0, "81"}}}}}, 0x3b) 02:12:32 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) get_mempolicy(&(0x7f00000003c0), &(0x7f0000000400), 0x289, &(0x7f0000fef000/0x10000)=nil, 0x2) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="c6566ceda4e3f1c409e9515b62be0157ec2275042709d8548cb34a00665921c0c26bc59a07847331f37bc0ef75a5460fe26079bfc6bed87ef39b93f39b6bd4dea2a4b89759e1a77e64786f7d3c9ce12e6e7091ca71c3576afb000000000000000000", @ANYRES32, @ANYRES32=0x0, @ANYRESHEX=r1, @ANYRESDEC=r2], 0x5, 0x1) wait4(r1, 0x0, 0x40000000, &(0x7f0000000200)) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/tty/drivers\x00', 0x0, 0x0) read(r3, &(0x7f0000000280)=""/152, 0x20000318) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/tty/drivers\x00', 0x0, 0x0) read(r4, &(0x7f0000000280)=""/152, 0x20000318) ioctl$VIDIOC_QUERYBUF(r3, 0xc0585609, &(0x7f00000002c0)={0x0, 0x0, 0x4, 0x63d263814f78ec42, 0x401, {0x0, 0x2710}, {0x3, 0xc, 0x6, 0x0, 0x3, 0x9, "878b2cbe"}, 0x3, 0xb, @offset=0x8000, 0x400, 0x0, r4}) setsockopt$RDS_RECVERR(r5, 0x114, 0x5, &(0x7f0000000100), 0x4) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r6 = syz_open_dev$dri(&(0x7f00000001c0)='/dev/dri/card#\x00', 0x1, 0x0) mount(&(0x7f00000000c0)=ANY=[@ANYPTR64=&(0x7f0000000740)=ANY=[@ANYRESHEX=0x0, @ANYPTR, @ANYPTR64, @ANYBLOB="974d3ab47b3b91beb0f4760669c8618bc33664faf9c8179efd568e4e4b38f30869aefe10a4ccb1c515487e645b4a11d7cd2fb39aa1efca7c1eb441061d2be4c165ca7304c2e94159863dcfcf2ada45211fdd143b6c91d52ae9ac6a1c2f8173d8ee5682fc65a93dc45ead4a462d9e16ac3dff144c0fcc7d02fcf3fd3029b264f3550caaab22152365126be74a9ff91547eb273f83f2c2762b17b32d7d91ac013d6f5790d3bc09c1884d8c7f15be223a8c3b4e37186c641bc3501ca145f05e49aae1613402448c49a36a9b0055a9d5cc74edda0087d65f15d71e4e051cad208514ee99b6258f827a895d2eb4407e6b7b7a9d6bcc228e615d78a6a8b2c466d96a48ee2c7a736035e283917293271efdc7cbdf0a647917068ab197eec326359f829087bafd0fd95e5fcf645615f55040a847aab188c52f4dd3f61a15b2edfe22e6221a5b0b256f1d8da1e6b860b7c68213cc1fae88c0e86013d9000085216c3ee1ab6fd509500f038480929e335b4b3bb0150f881b831cc870de6d188bdd45a113989bc9d15fe2893ff94349", @ANYRESHEX=0x0, @ANYPTR64, @ANYRESHEX=r6, @ANYRES16=r0]], &(0x7f0000000180)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) 02:12:32 executing program 3: r0 = socket$inet(0xa, 0x801, 0x84) sendto(r0, &(0x7f0000000080)="f5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r0, 0xfc0004) accept(r0, 0x0, 0x0) r1 = socket$inet(0xa, 0x801, 0x84) sendto(r1, &(0x7f0000000080)="d5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r1, 0xfc0004) accept(r1, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x4) writev(r2, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d36020a8447000b4e230f00000000a2bc5603ca00000f7f8900bc00200000000101ff0000000309ff5bffff00c7e5ed5e232e725839c97b910000", 0x104}], 0x1) 02:12:32 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r2 = gettid() process_vm_writev(r2, &(0x7f0000c22000)=[{&(0x7f000034afa4)=""/1, 0x1f80}], 0x2d8, &(0x7f0000c22fa0)=[{&(0x7f0000000080)=""/1, 0x2034afa5}], 0x1, 0x0) 02:12:32 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=ANY=[@ANYBLOB="3c00000010008506000000000000000000200000", @ANYRES32=r3, @ANYBLOB="fe000000000000001c0012000c000100626f6e6400000c0002000800010004000000b8aaf229d19e07fa27e19cdb41f3c39e1c530c8a20b6a9fe127726c243d7f374621b469127371bf17de09220927367b4f1296344846c3bc446955ce991bf484e3dd09935b91aa4de8a507f572a73649c4f95d6d7f9314a580c324bd6a406d53aae87a12b4588407e8ff59d05817ca2a9a3c5649653ffcca5e348e8af4e31c68b5e33d1bddafd3852cf3a31ea0c2843f7e1ff56d00261a99131dd98230bccf89e843da42c421f16c4a0f8a5a3966189d9c8b0eae35b2ae281fd146388a6beb30330de35293082f09e52361f2ba9acfc2677b569368a3f32dfc40b2ea49cfd1b1da4cddabab8889fb2167a7d1b985503375bf58a4f1f0983a1fc18f0b8a974b3372341c1ad56f39e69212b2074e9b3e90000"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000540)={0x0, 0x4a02, &(0x7f0000000200)={&(0x7f00000008c0)=@newlink={0x50, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x50}}, 0x0) [ 560.898731][ T2878] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. 02:12:32 executing program 3: r0 = socket$inet(0xa, 0x801, 0x84) sendto(r0, &(0x7f0000000080)="f5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r0, 0xfc0004) accept(r0, 0x0, 0x0) r1 = socket$inet(0xa, 0x801, 0x84) sendto(r1, &(0x7f0000000080)="d5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r1, 0xfc0004) accept(r1, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x4) writev(r2, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d36020a8447000b4e230f00000000a2bc5603ca00000f7f890ec000200000000101ff0000000309ff5bffff00c7e5ed5e232e725839c97b910000", 0x104}], 0x1) [ 561.033762][ T2877] ceph: No path or : separator in source 02:12:32 executing program 3: r0 = socket$inet(0xa, 0x801, 0x84) sendto(r0, &(0x7f0000000080)="f5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r0, 0xfc0004) accept(r0, 0x0, 0x0) r1 = socket$inet(0xa, 0x801, 0x84) sendto(r1, &(0x7f0000000080)="d5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r1, 0xfc0004) accept(r1, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x4) writev(r2, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d36020a8447000b4e230f00000000a2bc5603ca00000f7f8900f000200000000101ff0000000309ff5bffff00c7e5ed5e232e725839c97b910000", 0x104}], 0x1) [ 561.146903][ T2884] bond119: (slave veth365): Enslaving as an active interface with an up link 02:12:32 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000003c0)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) syz_open_procfs(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$DRM_IOCTL_SET_MASTER(0xffffffffffffffff, 0x641e) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VHOST_SET_LOG_FD(0xffffffffffffffff, 0x4004af07, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) recvfrom$inet6(r3, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0x0) shutdown(r3, 0x1) r4 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r4, &(0x7f00000000c0), 0xfffffdda, 0x7530, 0x0, 0x0) 02:12:32 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) get_mempolicy(&(0x7f00000003c0), &(0x7f0000000400), 0x289, &(0x7f0000fef000/0x10000)=nil, 0x2) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="c6566ceda4e3f1c409e9515b62be0157ec2275042709d8548cb34a00665921c0c26bc59a07847331f37bc0ef75a5460fe26079bfc6bed87ef39b93f39b6bd4dea2a4b89759e1a77e64786f7d3c9ce12e6e7091ca71c3576afb000000000000000000", @ANYRES32, @ANYRES32=0x0, @ANYRESHEX=r1, @ANYRESDEC=r2], 0x5, 0x1) wait4(r1, 0x0, 0x40000000, &(0x7f0000000200)) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/tty/drivers\x00', 0x0, 0x0) read(r3, &(0x7f0000000280)=""/152, 0x20000318) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/tty/drivers\x00', 0x0, 0x0) read(r4, &(0x7f0000000280)=""/152, 0x20000318) ioctl$VIDIOC_QUERYBUF(r3, 0xc0585609, &(0x7f00000002c0)={0x0, 0x0, 0x4, 0x63d263814f78ec42, 0x401, {0x0, 0x2710}, {0x3, 0xc, 0x6, 0x0, 0x3, 0x9, "878b2cbe"}, 0x3, 0xb, @offset=0x8000, 0x400, 0x0, r4}) setsockopt$RDS_RECVERR(r5, 0x114, 0x5, &(0x7f0000000100), 0x4) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r6 = syz_open_dev$dri(&(0x7f00000001c0)='/dev/dri/card#\x00', 0x1, 0x0) mount(&(0x7f00000000c0)=ANY=[@ANYPTR64=&(0x7f0000000740)=ANY=[@ANYRESHEX=0x0, @ANYPTR, @ANYPTR64, @ANYBLOB="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", @ANYRESHEX=0x0, @ANYPTR64, @ANYRESHEX=r6, @ANYRES16=r0]], &(0x7f0000000180)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) [ 561.193649][ T2985] ceph: No path or : separator in source [ 561.207641][ T2878] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. 02:12:32 executing program 3: r0 = socket$inet(0xa, 0x801, 0x84) sendto(r0, &(0x7f0000000080)="f5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r0, 0xfc0004) accept(r0, 0x0, 0x0) r1 = socket$inet(0xa, 0x801, 0x84) sendto(r1, &(0x7f0000000080)="d5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r1, 0xfc0004) accept(r1, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x4) writev(r2, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d36020a8447000b4e230f00000000a2bc5603ca00000f7f89000000400000000101ff0000000309ff5bffff00c7e5ed5e232e725839c97b910000", 0x104}], 0x1) [ 561.348993][ T2884] bond119: (slave veth367): Enslaving as an active interface with an up link [ 561.383626][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 02:12:32 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=ANY=[@ANYBLOB="3c00000010008506000000000000000000200000", @ANYRES32=r3, @ANYBLOB="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"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000540)={0x0, 0x4c00, &(0x7f0000000200)={&(0x7f00000008c0)=@newlink={0x50, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x50}}, 0x0) [ 561.470309][ T3015] ceph: No path or : separator in source [ 561.495449][ T3023] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. 02:12:32 executing program 3: r0 = socket$inet(0xa, 0x801, 0x84) sendto(r0, &(0x7f0000000080)="f5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r0, 0xfc0004) accept(r0, 0x0, 0x0) r1 = socket$inet(0xa, 0x801, 0x84) sendto(r1, &(0x7f0000000080)="d5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r1, 0xfc0004) accept(r1, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x4) writev(r2, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d36020a8447000b4e230f00000000a2bc5603ca00000f7f89000200200000000101ff0000000309ff5bffff00c7e5ed5e232e725839c97b910000", 0x104}], 0x1) 02:12:32 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @remote}}) write$tun(r0, &(0x7f0000000180)={@void, @val={0x0, 0x0, 0x0, 0x0, 0x3}, @mpls={[], @ipv6=@icmpv6={0x0, 0x6, "9eef7b", 0x9, 0x3c, 0x0, @remote, @mcast2, {[], @echo_request={0x80, 0x0, 0x0, 0x0, 0x0, "81"}}}}}, 0x3b) [ 561.630503][ T3028] bond120: (slave veth369): Enslaving as an active interface with an up link [ 561.651700][ T3023] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. 02:12:33 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) get_mempolicy(&(0x7f00000003c0), &(0x7f0000000400), 0x289, &(0x7f0000fef000/0x10000)=nil, 0x2) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="c6566ceda4e3f1c409e9515b62be0157ec2275042709d8548cb34a00665921c0c26bc59a07847331f37bc0ef75a5460fe26079bfc6bed87ef39b93f39b6bd4dea2a4b89759e1a77e64786f7d3c9ce12e6e7091ca71c3576afb000000000000000000", @ANYRES32, @ANYRES32=0x0, @ANYRESHEX=r1, @ANYRESDEC=r2], 0x5, 0x1) wait4(r1, 0x0, 0x40000000, &(0x7f0000000200)) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/tty/drivers\x00', 0x0, 0x0) read(r3, &(0x7f0000000280)=""/152, 0x20000318) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/tty/drivers\x00', 0x0, 0x0) read(r4, &(0x7f0000000280)=""/152, 0x20000318) ioctl$VIDIOC_QUERYBUF(r3, 0xc0585609, &(0x7f00000002c0)={0x0, 0x0, 0x4, 0x63d263814f78ec42, 0x401, {0x0, 0x2710}, {0x3, 0xc, 0x6, 0x0, 0x3, 0x9, "878b2cbe"}, 0x3, 0xb, @offset=0x8000, 0x400, 0x0, r4}) setsockopt$RDS_RECVERR(r5, 0x114, 0x5, &(0x7f0000000100), 0x4) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r6 = syz_open_dev$dri(&(0x7f00000001c0)='/dev/dri/card#\x00', 0x1, 0x0) mount(&(0x7f00000000c0)=ANY=[@ANYPTR64=&(0x7f0000000740)=ANY=[@ANYRESHEX=0x0, @ANYPTR, @ANYPTR64, @ANYBLOB="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", @ANYRESHEX=0x0, @ANYPTR64, @ANYRESHEX=r6, @ANYRES16=r0]], &(0x7f0000000180)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) [ 561.684076][ T3018] ceph: No path or : separator in source [ 561.864381][ T3028] bond120: (slave veth371): Enslaving as an active interface with an up link [ 561.891554][ T3105] ceph: No path or : separator in source 02:12:33 executing program 3: r0 = socket$inet(0xa, 0x801, 0x84) sendto(r0, &(0x7f0000000080)="f5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r0, 0xfc0004) accept(r0, 0x0, 0x0) r1 = socket$inet(0xa, 0x801, 0x84) sendto(r1, &(0x7f0000000080)="d5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r1, 0xfc0004) accept(r1, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x4) writev(r2, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d36020a8447000b4e230f00000000a2bc5603ca00000f7f89000400200000000101ff0000000309ff5bffff00c7e5ed5e232e725839c97b910000", 0x104}], 0x1) [ 561.976324][ T3105] ceph: No path or : separator in source [ 562.118615][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 02:12:33 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) get_mempolicy(&(0x7f00000003c0), &(0x7f0000000400), 0x289, &(0x7f0000fef000/0x10000)=nil, 0x2) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="c6566ceda4e3f1c409e9515b62be0157ec2275042709d8548cb34a00665921c0c26bc59a07847331f37bc0ef75a5460fe26079bfc6bed87ef39b93f39b6bd4dea2a4b89759e1a77e64786f7d3c9ce12e6e7091ca71c3576afb000000000000000000", @ANYRES32, @ANYRES32=0x0, @ANYRESHEX=r1, @ANYRESDEC=r2], 0x5, 0x1) wait4(r1, 0x0, 0x40000000, &(0x7f0000000200)) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/tty/drivers\x00', 0x0, 0x0) read(r3, &(0x7f0000000280)=""/152, 0x20000318) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/tty/drivers\x00', 0x0, 0x0) read(r4, &(0x7f0000000280)=""/152, 0x20000318) ioctl$VIDIOC_QUERYBUF(r3, 0xc0585609, &(0x7f00000002c0)={0x0, 0x0, 0x4, 0x63d263814f78ec42, 0x401, {0x0, 0x2710}, {0x3, 0xc, 0x6, 0x0, 0x3, 0x9, "878b2cbe"}, 0x3, 0xb, @offset=0x8000, 0x400, 0x0, r4}) setsockopt$RDS_RECVERR(r5, 0x114, 0x5, &(0x7f0000000100), 0x4) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r6 = syz_open_dev$dri(&(0x7f00000001c0)='/dev/dri/card#\x00', 0x1, 0x0) mount(&(0x7f00000000c0)=ANY=[@ANYPTR64=&(0x7f0000000740)=ANY=[@ANYRESHEX=0x0, @ANYPTR, @ANYPTR64, @ANYBLOB="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", @ANYRESHEX=0x0, @ANYPTR64, @ANYRESHEX=r6, @ANYRES16=r0]], &(0x7f0000000180)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) 02:12:33 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=ANY=[@ANYBLOB="3c00000010008506000000000000000000200000", @ANYRES32=r3, @ANYBLOB="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"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000540)={0x0, 0x4f01, &(0x7f0000000200)={&(0x7f00000008c0)=@newlink={0x50, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x50}}, 0x0) 02:12:33 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r2 = gettid() process_vm_writev(r2, &(0x7f0000c22000)=[{&(0x7f000034afa4)=""/1, 0x1f80}], 0x2d9, &(0x7f0000c22fa0)=[{&(0x7f0000000080)=""/1, 0x2034afa5}], 0x1, 0x0) 02:12:33 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @remote}}) write$tun(r0, &(0x7f0000000180)={@void, @val={0x0, 0x0, 0x0, 0x0, 0x4}, @mpls={[], @ipv6=@icmpv6={0x0, 0x6, "9eef7b", 0x9, 0x3c, 0x0, @remote, @mcast2, {[], @echo_request={0x80, 0x0, 0x0, 0x0, 0x0, "81"}}}}}, 0x3b) 02:12:33 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000003c0)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) syz_open_procfs(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$DRM_IOCTL_SET_MASTER(0xffffffffffffffff, 0x641e) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VHOST_SET_LOG_FD(0xffffffffffffffff, 0x4004af07, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) recvfrom$inet6(r3, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0x0) shutdown(r3, 0x1) r4 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r4, &(0x7f00000000c0), 0xfffffdda, 0x983a, 0x0, 0x0) 02:12:33 executing program 3: r0 = socket$inet(0xa, 0x801, 0x84) sendto(r0, &(0x7f0000000080)="f5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r0, 0xfc0004) accept(r0, 0x0, 0x0) r1 = socket$inet(0xa, 0x801, 0x84) sendto(r1, &(0x7f0000000080)="d5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r1, 0xfc0004) accept(r1, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x4) writev(r2, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d36020a8447000b4e230f00000000a2bc5603ca00000f7f89000a00200000000101ff0000000309ff5bffff00c7e5ed5e232e725839c97b910000", 0x104}], 0x1) [ 562.379410][ T3159] ceph: No path or : separator in source 02:12:33 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) get_mempolicy(&(0x7f00000003c0), &(0x7f0000000400), 0x289, &(0x7f0000fef000/0x10000)=nil, 0x2) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="c6566ceda4e3f1c409e9515b62be0157ec2275042709d8548cb34a00665921c0c26bc59a07847331f37bc0ef75a5460fe26079bfc6bed87ef39b93f39b6bd4dea2a4b89759e1a77e64786f7d3c9ce12e6e7091ca71c3576afb000000000000000000", @ANYRES32, @ANYRES32=0x0, @ANYRESHEX=r1, @ANYRESDEC=r2], 0x5, 0x1) wait4(r1, 0x0, 0x40000000, &(0x7f0000000200)) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/tty/drivers\x00', 0x0, 0x0) read(r3, &(0x7f0000000280)=""/152, 0x20000318) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/tty/drivers\x00', 0x0, 0x0) read(r4, &(0x7f0000000280)=""/152, 0x20000318) ioctl$VIDIOC_QUERYBUF(r3, 0xc0585609, &(0x7f00000002c0)={0x0, 0x0, 0x4, 0x63d263814f78ec42, 0x401, {0x0, 0x2710}, {0x3, 0xc, 0x6, 0x0, 0x3, 0x9, "878b2cbe"}, 0x3, 0xb, @offset=0x8000, 0x400, 0x0, r4}) setsockopt$RDS_RECVERR(r5, 0x114, 0x5, &(0x7f0000000100), 0x4) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r6 = syz_open_dev$dri(&(0x7f00000001c0)='/dev/dri/card#\x00', 0x1, 0x0) mount(&(0x7f00000000c0)=ANY=[@ANYPTR64=&(0x7f0000000740)=ANY=[@ANYRESHEX=0x0, @ANYPTR, @ANYPTR64, @ANYBLOB="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", @ANYRESHEX=0x0, @ANYPTR64, @ANYRESHEX=r6, @ANYRES16=r0]], &(0x7f0000000180)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) [ 562.521148][ T3166] bond121: (slave veth373): Enslaving as an active interface with an up link [ 562.523308][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 02:12:33 executing program 3: r0 = socket$inet(0xa, 0x801, 0x84) sendto(r0, &(0x7f0000000080)="f5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r0, 0xfc0004) accept(r0, 0x0, 0x0) r1 = socket$inet(0xa, 0x801, 0x84) sendto(r1, &(0x7f0000000080)="d5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r1, 0xfc0004) accept(r1, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x4) writev(r2, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d36020a8447000b4e230f00000000a2bc5603ca00000f7f89000e00200000000101ff0000000309ff5bffff00c7e5ed5e232e725839c97b910000", 0x104}], 0x1) [ 562.789819][ T3281] ceph: No path or : separator in source [ 562.809244][ T3166] bond121: (slave veth375): Enslaving as an active interface with an up link 02:12:34 executing program 3: r0 = socket$inet(0xa, 0x801, 0x84) sendto(r0, &(0x7f0000000080)="f5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r0, 0xfc0004) accept(r0, 0x0, 0x0) r1 = socket$inet(0xa, 0x801, 0x84) sendto(r1, &(0x7f0000000080)="d5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r1, 0xfc0004) accept(r1, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x4) writev(r2, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d36020a8447000b4e230f00000000a2bc5603ca00000f7f89000f00200000000101ff0000000309ff5bffff00c7e5ed5e232e725839c97b910000", 0x104}], 0x1) [ 562.861038][ T3289] ceph: No path or : separator in source 02:12:34 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=ANY=[@ANYBLOB="3c00000010008506000000000000000000200000", @ANYRES32=r3, @ANYBLOB="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"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000540)={0x0, 0x5865, &(0x7f0000000200)={&(0x7f00000008c0)=@newlink={0x50, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x50}}, 0x0) 02:12:34 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) get_mempolicy(&(0x7f00000003c0), &(0x7f0000000400), 0x289, &(0x7f0000fef000/0x10000)=nil, 0x2) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="c6566ceda4e3f1c409e9515b62be0157ec2275042709d8548cb34a00665921c0c26bc59a07847331f37bc0ef75a5460fe26079bfc6bed87ef39b93f39b6bd4dea2a4b89759e1a77e64786f7d3c9ce12e6e7091ca71c3576afb000000000000000000", @ANYRES32, @ANYRES32=0x0, @ANYRESHEX=r1, @ANYRESDEC=r2], 0x5, 0x1) wait4(r1, 0x0, 0x40000000, &(0x7f0000000200)) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/tty/drivers\x00', 0x0, 0x0) read(r3, &(0x7f0000000280)=""/152, 0x20000318) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/tty/drivers\x00', 0x0, 0x0) read(r4, &(0x7f0000000280)=""/152, 0x20000318) ioctl$VIDIOC_QUERYBUF(r3, 0xc0585609, &(0x7f00000002c0)={0x0, 0x0, 0x4, 0x63d263814f78ec42, 0x401, {0x0, 0x2710}, {0x3, 0xc, 0x6, 0x0, 0x3, 0x9, "878b2cbe"}, 0x3, 0xb, @offset=0x8000, 0x400, 0x0, r4}) setsockopt$RDS_RECVERR(r5, 0x114, 0x5, &(0x7f0000000100), 0x4) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r6 = syz_open_dev$dri(&(0x7f00000001c0)='/dev/dri/card#\x00', 0x1, 0x0) mount(&(0x7f00000000c0)=ANY=[@ANYPTR64=&(0x7f0000000740)=ANY=[@ANYRESHEX=0x0, @ANYPTR, @ANYPTR64, @ANYBLOB="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", @ANYRESHEX=0x0, @ANYPTR64, @ANYRESHEX=r6, @ANYRES16=r0]], &(0x7f0000000180)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) 02:12:34 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @remote}}) write$tun(r0, &(0x7f0000000180)={@void, @val={0x0, 0x0, 0x0, 0x0, 0x5}, @mpls={[], @ipv6=@icmpv6={0x0, 0x6, "9eef7b", 0x9, 0x3c, 0x0, @remote, @mcast2, {[], @echo_request={0x80, 0x0, 0x0, 0x0, 0x0, "81"}}}}}, 0x3b) 02:12:34 executing program 3: r0 = socket$inet(0xa, 0x801, 0x84) sendto(r0, &(0x7f0000000080)="f5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r0, 0xfc0004) accept(r0, 0x0, 0x0) r1 = socket$inet(0xa, 0x801, 0x84) sendto(r1, &(0x7f0000000080)="d5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r1, 0xfc0004) accept(r1, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x4) writev(r2, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d36020a8447000b4e230f00000000a2bc5603ca00000f7f89006000200000000101ff0000000309ff5bffff00c7e5ed5e232e725839c97b910000", 0x104}], 0x1) [ 563.132993][ T3303] __nla_validate_parse: 2 callbacks suppressed [ 563.133005][ T3303] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. [ 563.223200][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 02:12:34 executing program 3: r0 = socket$inet(0xa, 0x801, 0x84) sendto(r0, &(0x7f0000000080)="f5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r0, 0xfc0004) accept(r0, 0x0, 0x0) r1 = socket$inet(0xa, 0x801, 0x84) sendto(r1, &(0x7f0000000080)="d5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r1, 0xfc0004) accept(r1, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x4) writev(r2, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d36020a8447000b4e230f00000000a2bc5603ca00000f7f8900bc00200000000101ff0000000309ff5bffff00c7e5ed5e232e725839c97b910000", 0x104}], 0x1) 02:12:34 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r2 = gettid() process_vm_writev(r2, &(0x7f0000c22000)=[{&(0x7f000034afa4)=""/1, 0x1f80}], 0x2da, &(0x7f0000c22fa0)=[{&(0x7f0000000080)=""/1, 0x2034afa5}], 0x1, 0x0) 02:12:34 executing program 3: r0 = socket$inet(0xa, 0x801, 0x84) sendto(r0, &(0x7f0000000080)="f5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r0, 0xfc0004) accept(r0, 0x0, 0x0) r1 = socket$inet(0xa, 0x801, 0x84) sendto(r1, &(0x7f0000000080)="d5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r1, 0xfc0004) accept(r1, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x4) writev(r2, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d36020a8447000b4e230f00000000a2bc5603ca00000f7f8900f000200000000101ff0000000309ff5bffff00c7e5ed5e232e725839c97b910000", 0x104}], 0x1) [ 563.399790][ T3304] ceph: No path or : separator in source [ 563.406007][ T3306] bond122: (slave veth377): Enslaving as an active interface with an up link 02:12:34 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000003c0)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) syz_open_procfs(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$DRM_IOCTL_SET_MASTER(0xffffffffffffffff, 0x641e) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VHOST_SET_LOG_FD(0xffffffffffffffff, 0x4004af07, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) recvfrom$inet6(r3, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0x0) shutdown(r3, 0x1) r4 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r4, &(0x7f00000000c0), 0xfffffdda, 0xa02c, 0x0, 0x0) [ 563.531086][ T3304] ceph: No path or : separator in source 02:12:34 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) get_mempolicy(&(0x7f00000003c0), &(0x7f0000000400), 0x289, &(0x7f0000fef000/0x10000)=nil, 0x2) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="c6566ceda4e3f1c409e9515b62be0157ec2275042709d8548cb34a00665921c0c26bc59a07847331f37bc0ef75a5460fe26079bfc6bed87ef39b93f39b6bd4dea2a4b89759e1a77e64786f7d3c9ce12e6e7091ca71c3576afb000000000000000000", @ANYRES32, @ANYRES32=0x0, @ANYRESHEX=r1, @ANYRESDEC=r2], 0x5, 0x1) wait4(r1, 0x0, 0x40000000, &(0x7f0000000200)) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/tty/drivers\x00', 0x0, 0x0) read(r3, &(0x7f0000000280)=""/152, 0x20000318) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/tty/drivers\x00', 0x0, 0x0) read(r4, &(0x7f0000000280)=""/152, 0x20000318) ioctl$VIDIOC_QUERYBUF(r3, 0xc0585609, &(0x7f00000002c0)={0x0, 0x0, 0x4, 0x63d263814f78ec42, 0x401, {0x0, 0x2710}, {0x3, 0xc, 0x6, 0x0, 0x3, 0x9, "878b2cbe"}, 0x3, 0xb, @offset=0x8000, 0x400, 0x0, r4}) setsockopt$RDS_RECVERR(r5, 0x114, 0x5, &(0x7f0000000100), 0x4) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r6 = syz_open_dev$dri(&(0x7f00000001c0)='/dev/dri/card#\x00', 0x1, 0x0) mount(&(0x7f00000000c0)=ANY=[@ANYPTR64=&(0x7f0000000740)=ANY=[@ANYRESHEX=0x0, @ANYPTR, @ANYPTR64, @ANYBLOB="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", @ANYRESHEX=0x0, @ANYPTR64, @ANYRESHEX=r6, @ANYRES16=r0]], &(0x7f0000000180)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) 02:12:35 executing program 3: r0 = socket$inet(0xa, 0x801, 0x84) sendto(r0, &(0x7f0000000080)="f5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r0, 0xfc0004) accept(r0, 0x0, 0x0) r1 = socket$inet(0xa, 0x801, 0x84) sendto(r1, &(0x7f0000000080)="d5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r1, 0xfc0004) accept(r1, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x4) writev(r2, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d36020a8447000b4e230f00000000a2bc5603ca00000f7f89001f04200000000101ff0000000309ff5bffff00c7e5ed5e232e725839c97b910000", 0x104}], 0x1) [ 563.678484][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 563.873243][ T3432] ceph: No path or : separator in source 02:12:35 executing program 3: r0 = socket$inet(0xa, 0x801, 0x84) sendto(r0, &(0x7f0000000080)="f5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r0, 0xfc0004) accept(r0, 0x0, 0x0) r1 = socket$inet(0xa, 0x801, 0x84) sendto(r1, &(0x7f0000000080)="d5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r1, 0xfc0004) accept(r1, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x4) writev(r2, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d36020a8447000b4e230f00000000a2bc5603ca00000f7f8900000a200000000101ff0000000309ff5bffff00c7e5ed5e232e725839c97b910000", 0x104}], 0x1) [ 564.024805][ T3432] ceph: No path or : separator in source 02:12:35 executing program 3: r0 = socket$inet(0xa, 0x801, 0x84) sendto(r0, &(0x7f0000000080)="f5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r0, 0xfc0004) accept(r0, 0x0, 0x0) r1 = socket$inet(0xa, 0x801, 0x84) sendto(r1, &(0x7f0000000080)="d5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r1, 0xfc0004) accept(r1, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x4) writev(r2, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d36020a8447000b4e230f00000000a2bc5603ca00000f7f8900000e200000000101ff0000000309ff5bffff00c7e5ed5e232e725839c97b910000", 0x104}], 0x1) [ 564.212781][ T3303] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. [ 564.325572][ T3306] bond122: (slave veth379): Enslaving as an active interface with an up link 02:12:35 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=ANY=[@ANYBLOB="3c00000010008506000000000000000000200000", @ANYRES32=r3, @ANYBLOB="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"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000540)={0x0, 0x5a01, &(0x7f0000000200)={&(0x7f00000008c0)=@newlink={0x50, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x50}}, 0x0) 02:12:35 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) get_mempolicy(&(0x7f00000003c0), &(0x7f0000000400), 0x289, &(0x7f0000fef000/0x10000)=nil, 0x2) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="c6566ceda4e3f1c409e9515b62be0157ec2275042709d8548cb34a00665921c0c26bc59a07847331f37bc0ef75a5460fe26079bfc6bed87ef39b93f39b6bd4dea2a4b89759e1a77e64786f7d3c9ce12e6e7091ca71c3576afb000000000000000000", @ANYRES32, @ANYRES32=0x0, @ANYRESHEX=r1, @ANYRESDEC=r2], 0x5, 0x1) wait4(r1, 0x0, 0x40000000, &(0x7f0000000200)) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/tty/drivers\x00', 0x0, 0x0) read(r3, &(0x7f0000000280)=""/152, 0x20000318) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/tty/drivers\x00', 0x0, 0x0) read(r4, &(0x7f0000000280)=""/152, 0x20000318) ioctl$VIDIOC_QUERYBUF(r3, 0xc0585609, &(0x7f00000002c0)={0x0, 0x0, 0x4, 0x63d263814f78ec42, 0x401, {0x0, 0x2710}, {0x3, 0xc, 0x6, 0x0, 0x3, 0x9, "878b2cbe"}, 0x3, 0xb, @offset=0x8000, 0x400, 0x0, r4}) setsockopt$RDS_RECVERR(r5, 0x114, 0x5, &(0x7f0000000100), 0x4) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r6 = syz_open_dev$dri(&(0x7f00000001c0)='/dev/dri/card#\x00', 0x1, 0x0) mount(&(0x7f00000000c0)=ANY=[@ANYPTR64=&(0x7f0000000740)=ANY=[@ANYRESHEX=0x0, @ANYPTR, @ANYPTR64, @ANYBLOB="974d3ab47b3b91beb0f4760669c8618bc33664faf9c8179efd568e4e4b38f30869aefe10a4ccb1c515487e645b4a11d7cd2fb39aa1efca7c1eb441061d2be4c165ca7304c2e94159863dcfcf64da45211fdd143b6c91d52ae9ac6a1c2f8173d8ee5682fc65a93dc45ead4a462d9e16ac3dff144c0fcc7d02fcf3fd3029b264f3550caaab22152365126be74a9ff91547eb273f83f2c2762b17b32d7d91ac013d6f5790d3bc09c1884d8c7f15be223a8c3b4e37186c641bc3501ca145f05e49aae1613402448c49a36a9b0055a9d5cc74edda0087d65f15d71e4e051cad208514ee99b6258f827a895d2eb4407e6b7b7a9d6bcc228e615d78a6a8b2c466d96a48ee2c7a736035e283917293271efdc7cbdf0a647917068ab197eec326359f829087bafd0fd95e5fcf645615f55040a847aab188c52f4dd3f61a15b2edfe22e6221a5b0b256f1d8da1e6b860b7c68213cc1fae88c0e86013d9000085216c3ee1ab6fd509500f038480929e335b4b3bb0150f881b831cc870de6d188bdd45a113989bc9d15fe2893ff94349", @ANYRESHEX=0x0, @ANYPTR64, @ANYRESHEX=r6, @ANYRES16=r0]], &(0x7f0000000180)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) [ 564.456279][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 564.460582][ T3456] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. [ 564.598791][ T3453] ceph: No path or : separator in source 02:12:36 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @remote}}) write$tun(r0, &(0x7f0000000180)={@void, @val={0x0, 0x0, 0x0, 0x0, 0x6}, @mpls={[], @ipv6=@icmpv6={0x0, 0x6, "9eef7b", 0x9, 0x3c, 0x0, @remote, @mcast2, {[], @echo_request={0x80, 0x0, 0x0, 0x0, 0x0, "81"}}}}}, 0x3b) 02:12:36 executing program 3: r0 = socket$inet(0xa, 0x801, 0x84) sendto(r0, &(0x7f0000000080)="f5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r0, 0xfc0004) accept(r0, 0x0, 0x0) r1 = socket$inet(0xa, 0x801, 0x84) sendto(r1, &(0x7f0000000080)="d5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r1, 0xfc0004) accept(r1, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x4) writev(r2, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d36020a8447000b4e230f00000000a2bc5603ca00000f7f8900c00e200000000101ff0000000309ff5bffff00c7e5ed5e232e725839c97b910000", 0x104}], 0x1) 02:12:36 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r2 = gettid() process_vm_writev(r2, &(0x7f0000c22000)=[{&(0x7f000034afa4)=""/1, 0x1f80}], 0x2db, &(0x7f0000c22fa0)=[{&(0x7f0000000080)=""/1, 0x2034afa5}], 0x1, 0x0) 02:12:36 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000003c0)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) syz_open_procfs(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$DRM_IOCTL_SET_MASTER(0xffffffffffffffff, 0x641e) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VHOST_SET_LOG_FD(0xffffffffffffffff, 0x4004af07, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) recvfrom$inet6(r3, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0x0) shutdown(r3, 0x1) r4 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r4, &(0x7f00000000c0), 0xfffffdda, 0xa068, 0x0, 0x0) [ 564.653565][ T3459] bond123: (slave veth381): Enslaving as an active interface with an up link [ 564.675329][ T3455] ceph: No path or : separator in source [ 564.685017][ T3459] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. 02:12:36 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) get_mempolicy(&(0x7f00000003c0), &(0x7f0000000400), 0x289, &(0x7f0000fef000/0x10000)=nil, 0x2) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="c6566ceda4e3f1c409e9515b62be0157ec2275042709d8548cb34a00665921c0c26bc59a07847331f37bc0ef75a5460fe26079bfc6bed87ef39b93f39b6bd4dea2a4b89759e1a77e64786f7d3c9ce12e6e7091ca71c3576afb000000000000000000", @ANYRES32, @ANYRES32=0x0, @ANYRESHEX=r1, @ANYRESDEC=r2], 0x5, 0x1) wait4(r1, 0x0, 0x40000000, &(0x7f0000000200)) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/tty/drivers\x00', 0x0, 0x0) read(r3, &(0x7f0000000280)=""/152, 0x20000318) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/tty/drivers\x00', 0x0, 0x0) read(r4, &(0x7f0000000280)=""/152, 0x20000318) ioctl$VIDIOC_QUERYBUF(r3, 0xc0585609, &(0x7f00000002c0)={0x0, 0x0, 0x4, 0x63d263814f78ec42, 0x401, {0x0, 0x2710}, {0x3, 0xc, 0x6, 0x0, 0x3, 0x9, "878b2cbe"}, 0x3, 0xb, @offset=0x8000, 0x400, 0x0, r4}) setsockopt$RDS_RECVERR(r5, 0x114, 0x5, &(0x7f0000000100), 0x4) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r6 = syz_open_dev$dri(&(0x7f00000001c0)='/dev/dri/card#\x00', 0x1, 0x0) mount(&(0x7f00000000c0)=ANY=[@ANYPTR64=&(0x7f0000000740)=ANY=[@ANYRESHEX=0x0, @ANYPTR, @ANYPTR64, @ANYBLOB="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", @ANYRESHEX=0x0, @ANYPTR64, @ANYRESHEX=r6, @ANYRES16=r0]], &(0x7f0000000180)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) [ 564.789429][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 564.792917][ T3465] bond123: (slave veth383): Enslaving as an active interface with an up link 02:12:36 executing program 3: r0 = socket$inet(0xa, 0x801, 0x84) sendto(r0, &(0x7f0000000080)="f5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r0, 0xfc0004) accept(r0, 0x0, 0x0) r1 = socket$inet(0xa, 0x801, 0x84) sendto(r1, &(0x7f0000000080)="d5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r1, 0xfc0004) accept(r1, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x4) writev(r2, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d36020a8447000b4e230f00000000a2bc5603ca00000f7f8900000f200000000101ff0000000309ff5bffff00c7e5ed5e232e725839c97b910000", 0x104}], 0x1) 02:12:36 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=ANY=[@ANYBLOB="3c00000010008506000000000000000000200000", @ANYRES32=r3, @ANYBLOB="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"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000540)={0x0, 0x6000, &(0x7f0000000200)={&(0x7f00000008c0)=@newlink={0x50, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x50}}, 0x0) [ 564.925237][ T3515] ceph: No path or : separator in source [ 565.043177][ T3515] ceph: No path or : separator in source 02:12:36 executing program 3: r0 = socket$inet(0xa, 0x801, 0x84) sendto(r0, &(0x7f0000000080)="f5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r0, 0xfc0004) accept(r0, 0x0, 0x0) r1 = socket$inet(0xa, 0x801, 0x84) sendto(r1, &(0x7f0000000080)="d5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r1, 0xfc0004) accept(r1, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x4) writev(r2, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d36020a8447000b4e230f00000000a2bc5603ca00000f7f8900041f200000000101ff0000000309ff5bffff00c7e5ed5e232e725839c97b910000", 0x104}], 0x1) 02:12:36 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) get_mempolicy(&(0x7f00000003c0), &(0x7f0000000400), 0x289, &(0x7f0000fef000/0x10000)=nil, 0x2) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="c6566ceda4e3f1c409e9515b62be0157ec2275042709d8548cb34a00665921c0c26bc59a07847331f37bc0ef75a5460fe26079bfc6bed87ef39b93f39b6bd4dea2a4b89759e1a77e64786f7d3c9ce12e6e7091ca71c3576afb000000000000000000", @ANYRES32, @ANYRES32=0x0, @ANYRESHEX=r1, @ANYRESDEC=r2], 0x5, 0x1) wait4(r1, 0x0, 0x40000000, &(0x7f0000000200)) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/tty/drivers\x00', 0x0, 0x0) read(r3, &(0x7f0000000280)=""/152, 0x20000318) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/tty/drivers\x00', 0x0, 0x0) read(r4, &(0x7f0000000280)=""/152, 0x20000318) ioctl$VIDIOC_QUERYBUF(r3, 0xc0585609, &(0x7f00000002c0)={0x0, 0x0, 0x4, 0x63d263814f78ec42, 0x401, {0x0, 0x2710}, {0x3, 0xc, 0x6, 0x0, 0x3, 0x9, "878b2cbe"}, 0x3, 0xb, @offset=0x8000, 0x400, 0x0, r4}) setsockopt$RDS_RECVERR(r5, 0x114, 0x5, &(0x7f0000000100), 0x4) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r6 = syz_open_dev$dri(&(0x7f00000001c0)='/dev/dri/card#\x00', 0x1, 0x0) mount(&(0x7f00000000c0)=ANY=[@ANYPTR64=&(0x7f0000000740)=ANY=[@ANYRESHEX=0x0, @ANYPTR, @ANYPTR64, @ANYBLOB="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", @ANYRESHEX=0x0, @ANYPTR64, @ANYRESHEX=r6, @ANYRES16=r0]], &(0x7f0000000180)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) [ 565.296000][ T3615] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. 02:12:36 executing program 3: r0 = socket$inet(0xa, 0x801, 0x84) sendto(r0, &(0x7f0000000080)="f5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r0, 0xfc0004) accept(r0, 0x0, 0x0) r1 = socket$inet(0xa, 0x801, 0x84) sendto(r1, &(0x7f0000000080)="d5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r1, 0xfc0004) accept(r1, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x4) writev(r2, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d36020a8447000b4e230f00000000a2bc5603ca00000f7f8900003f200000000101ff0000000309ff5bffff00c7e5ed5e232e725839c97b910000", 0x104}], 0x1) [ 565.348737][ T3623] ceph: No path or : separator in source [ 565.459092][ T3623] ceph: No path or : separator in source [ 565.502304][ T3618] bond124: (slave veth385): Enslaving as an active interface with an up link [ 565.531154][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 565.545870][ T3615] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. 02:12:36 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) get_mempolicy(&(0x7f00000003c0), &(0x7f0000000400), 0x289, &(0x7f0000fef000/0x10000)=nil, 0x2) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="c6566ceda4e3f1c409e9515b62be0157ec2275042709d8548cb34a00665921c0c26bc59a07847331f37bc0ef75a5460fe26079bfc6bed87ef39b93f39b6bd4dea2a4b89759e1a77e64786f7d3c9ce12e6e7091ca71c3576afb000000000000000000", @ANYRES32, @ANYRES32=0x0, @ANYRESHEX=r1, @ANYRESDEC=r2], 0x5, 0x1) wait4(r1, 0x0, 0x40000000, &(0x7f0000000200)) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/tty/drivers\x00', 0x0, 0x0) read(r3, &(0x7f0000000280)=""/152, 0x20000318) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/tty/drivers\x00', 0x0, 0x0) read(r4, &(0x7f0000000280)=""/152, 0x20000318) ioctl$VIDIOC_QUERYBUF(r3, 0xc0585609, &(0x7f00000002c0)={0x0, 0x0, 0x4, 0x63d263814f78ec42, 0x401, {0x0, 0x2710}, {0x3, 0xc, 0x6, 0x0, 0x3, 0x9, "878b2cbe"}, 0x3, 0xb, @offset=0x8000, 0x400, 0x0, r4}) setsockopt$RDS_RECVERR(r5, 0x114, 0x5, &(0x7f0000000100), 0x4) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r6 = syz_open_dev$dri(&(0x7f00000001c0)='/dev/dri/card#\x00', 0x1, 0x0) mount(&(0x7f00000000c0)=ANY=[@ANYPTR64=&(0x7f0000000740)=ANY=[@ANYRESHEX=0x0, @ANYPTR, @ANYPTR64, @ANYBLOB="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", @ANYRESHEX=0x0, @ANYPTR64, @ANYRESHEX=r6, @ANYRES16=r0]], &(0x7f0000000180)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) 02:12:36 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r2 = gettid() process_vm_writev(r2, &(0x7f0000c22000)=[{&(0x7f000034afa4)=""/1, 0x1f80}], 0x2dc, &(0x7f0000c22fa0)=[{&(0x7f0000000080)=""/1, 0x2034afa5}], 0x1, 0x0) [ 565.687843][ T3618] bond124: (slave veth387): Enslaving as an active interface with an up link 02:12:37 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @remote}}) write$tun(r0, &(0x7f0000000180)={@void, @val={0x0, 0x0, 0x0, 0x0, 0x7}, @mpls={[], @ipv6=@icmpv6={0x0, 0x6, "9eef7b", 0x9, 0x3c, 0x0, @remote, @mcast2, {[], @echo_request={0x80, 0x0, 0x0, 0x0, 0x0, "81"}}}}}, 0x3b) 02:12:37 executing program 3: r0 = socket$inet(0xa, 0x801, 0x84) sendto(r0, &(0x7f0000000080)="f5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r0, 0xfc0004) accept(r0, 0x0, 0x0) r1 = socket$inet(0xa, 0x801, 0x84) sendto(r1, &(0x7f0000000080)="d5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r1, 0xfc0004) accept(r1, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x4) writev(r2, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d36020a8447000b4e230f00000000a2bc5603ca00000f7f89000060200000000101ff0000000309ff5bffff00c7e5ed5e232e725839c97b910000", 0x104}], 0x1) 02:12:37 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000003c0)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) syz_open_procfs(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$DRM_IOCTL_SET_MASTER(0xffffffffffffffff, 0x641e) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VHOST_SET_LOG_FD(0xffffffffffffffff, 0x4004af07, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) recvfrom$inet6(r3, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0x0) shutdown(r3, 0x1) r4 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r4, &(0x7f00000000c0), 0xfffffdda, 0xae60, 0x0, 0x0) 02:12:37 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=ANY=[@ANYBLOB="3c00000010008506000000000000000000200000", @ANYRES32=r3, @ANYBLOB="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"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000540)={0x0, 0x6558, &(0x7f0000000200)={&(0x7f00000008c0)=@newlink={0x50, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x50}}, 0x0) [ 565.894857][ T3639] ceph: No path or : separator in source [ 565.930920][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 565.938820][ T3657] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. [ 565.961402][ T3642] ceph: No path or : separator in source 02:12:37 executing program 3: r0 = socket$inet(0xa, 0x801, 0x84) sendto(r0, &(0x7f0000000080)="f5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r0, 0xfc0004) accept(r0, 0x0, 0x0) r1 = socket$inet(0xa, 0x801, 0x84) sendto(r1, &(0x7f0000000080)="d5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r1, 0xfc0004) accept(r1, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x4) writev(r2, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d36020a8447000b4e230f00000000a2bc5603ca00000f7f89006a64200000000101ff0000000309ff5bffff00c7e5ed5e232e725839c97b910000", 0x104}], 0x1) 02:12:37 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) get_mempolicy(&(0x7f00000003c0), &(0x7f0000000400), 0x289, &(0x7f0000fef000/0x10000)=nil, 0x2) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="c6566ceda4e3f1c409e9515b62be0157ec2275042709d8548cb34a00665921c0c26bc59a07847331f37bc0ef75a5460fe26079bfc6bed87ef39b93f39b6bd4dea2a4b89759e1a77e64786f7d3c9ce12e6e7091ca71c3576afb000000000000000000", @ANYRES32, @ANYRES32=0x0, @ANYRESHEX=r1, @ANYRESDEC=r2], 0x5, 0x1) wait4(r1, 0x0, 0x40000000, &(0x7f0000000200)) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/tty/drivers\x00', 0x0, 0x0) read(r3, &(0x7f0000000280)=""/152, 0x20000318) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/tty/drivers\x00', 0x0, 0x0) read(r4, &(0x7f0000000280)=""/152, 0x20000318) ioctl$VIDIOC_QUERYBUF(r3, 0xc0585609, &(0x7f00000002c0)={0x0, 0x0, 0x4, 0x63d263814f78ec42, 0x401, {0x0, 0x2710}, {0x3, 0xc, 0x6, 0x0, 0x3, 0x9, "878b2cbe"}, 0x3, 0xb, @offset=0x8000, 0x400, 0x0, r4}) setsockopt$RDS_RECVERR(r5, 0x114, 0x5, &(0x7f0000000100), 0x4) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r6 = syz_open_dev$dri(&(0x7f00000001c0)='/dev/dri/card#\x00', 0x1, 0x0) mount(&(0x7f00000000c0)=ANY=[@ANYPTR64=&(0x7f0000000740)=ANY=[@ANYRESHEX=0x0, @ANYPTR, @ANYPTR64, @ANYBLOB="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", @ANYRESHEX=0x0, @ANYPTR64, @ANYRESHEX=r6, @ANYRES16=r0]], &(0x7f0000000180)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) 02:12:37 executing program 3: r0 = socket$inet(0xa, 0x801, 0x84) sendto(r0, &(0x7f0000000080)="f5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r0, 0xfc0004) accept(r0, 0x0, 0x0) r1 = socket$inet(0xa, 0x801, 0x84) sendto(r1, &(0x7f0000000080)="d5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r1, 0xfc0004) accept(r1, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x4) writev(r2, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d36020a8447000b4e230f00000000a2bc5603ca00000f7f8900646a200000000101ff0000000309ff5bffff00c7e5ed5e232e725839c97b910000", 0x104}], 0x1) [ 566.202386][ T3667] bond125: (slave veth389): Enslaving as an active interface with an up link [ 566.246124][ T3657] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. [ 566.330679][ T3667] bond125: (slave veth391): Enslaving as an active interface with an up link [ 566.334024][ T3798] ceph: No path or : separator in source 02:12:37 executing program 3: r0 = socket$inet(0xa, 0x801, 0x84) sendto(r0, &(0x7f0000000080)="f5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r0, 0xfc0004) accept(r0, 0x0, 0x0) r1 = socket$inet(0xa, 0x801, 0x84) sendto(r1, &(0x7f0000000080)="d5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r1, 0xfc0004) accept(r1, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x4) writev(r2, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d36020a8447000b4e230f00000000a2bc5603ca00000f7f890000bc200000000101ff0000000309ff5bffff00c7e5ed5e232e725839c97b910000", 0x104}], 0x1) 02:12:37 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=ANY=[@ANYBLOB="3c00000010008506000000000000000000200000", @ANYRES32=r3, @ANYBLOB="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"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000540)={0x0, 0x6800, &(0x7f0000000200)={&(0x7f00000008c0)=@newlink={0x50, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x50}}, 0x0) 02:12:37 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @remote}}) write$tun(r0, &(0x7f0000000180)={@void, @val={0x0, 0x0, 0x0, 0x0, 0x8}, @mpls={[], @ipv6=@icmpv6={0x0, 0x6, "9eef7b", 0x9, 0x3c, 0x0, @remote, @mcast2, {[], @echo_request={0x80, 0x0, 0x0, 0x0, 0x0, "81"}}}}}, 0x3b) [ 566.564112][ T3798] ceph: No path or : separator in source [ 566.588911][ T3821] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. 02:12:38 executing program 3: r0 = socket$inet(0xa, 0x801, 0x84) sendto(r0, &(0x7f0000000080)="f5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r0, 0xfc0004) accept(r0, 0x0, 0x0) r1 = socket$inet(0xa, 0x801, 0x84) sendto(r1, &(0x7f0000000080)="d5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r1, 0xfc0004) accept(r1, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x4) writev(r2, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d36020a8447000b4e230f00000000a2bc5603ca00000f7f89000ec0200000000101ff0000000309ff5bffff00c7e5ed5e232e725839c97b910000", 0x104}], 0x1) [ 566.686994][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 02:12:38 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r2 = gettid() process_vm_writev(r2, &(0x7f0000c22000)=[{&(0x7f000034afa4)=""/1, 0x1f80}], 0x2dd, &(0x7f0000c22fa0)=[{&(0x7f0000000080)=""/1, 0x2034afa5}], 0x1, 0x0) 02:12:38 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) get_mempolicy(&(0x7f00000003c0), &(0x7f0000000400), 0x289, &(0x7f0000fef000/0x10000)=nil, 0x2) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="c6566ceda4e3f1c409e9515b62be0157ec2275042709d8548cb34a00665921c0c26bc59a07847331f37bc0ef75a5460fe26079bfc6bed87ef39b93f39b6bd4dea2a4b89759e1a77e64786f7d3c9ce12e6e7091ca71c3576afb000000000000000000", @ANYRES32, @ANYRES32=0x0, @ANYRESHEX=r1, @ANYRESDEC=r2], 0x5, 0x1) wait4(r1, 0x0, 0x40000000, &(0x7f0000000200)) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/tty/drivers\x00', 0x0, 0x0) read(r3, &(0x7f0000000280)=""/152, 0x20000318) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/tty/drivers\x00', 0x0, 0x0) read(r4, &(0x7f0000000280)=""/152, 0x20000318) ioctl$VIDIOC_QUERYBUF(r3, 0xc0585609, &(0x7f00000002c0)={0x0, 0x0, 0x4, 0x63d263814f78ec42, 0x401, {0x0, 0x2710}, {0x3, 0xc, 0x6, 0x0, 0x3, 0x9, "878b2cbe"}, 0x3, 0xb, @offset=0x8000, 0x400, 0x0, r4}) setsockopt$RDS_RECVERR(r5, 0x114, 0x5, &(0x7f0000000100), 0x4) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r6 = syz_open_dev$dri(&(0x7f00000001c0)='/dev/dri/card#\x00', 0x1, 0x0) mount(&(0x7f00000000c0)=ANY=[@ANYPTR64=&(0x7f0000000740)=ANY=[@ANYRESHEX=0x0, @ANYPTR, @ANYPTR64, @ANYBLOB="974d3ab47b3b91beb0f4760669c8618bc33664faf9c8179efd568e4e4b38f30869aefe10a4ccb1c515487e645b4a11d7cd2fb39aa1efca7c1eb441061d2be4c165ca7304c2e94159863dcfcf73da45211fdd143b6c91d52ae9ac6a1c2f8173d8ee5682fc65a93dc45ead4a462d9e16ac3dff144c0fcc7d02fcf3fd3029b264f3550caaab22152365126be74a9ff91547eb273f83f2c2762b17b32d7d91ac013d6f5790d3bc09c1884d8c7f15be223a8c3b4e37186c641bc3501ca145f05e49aae1613402448c49a36a9b0055a9d5cc74edda0087d65f15d71e4e051cad208514ee99b6258f827a895d2eb4407e6b7b7a9d6bcc228e615d78a6a8b2c466d96a48ee2c7a736035e283917293271efdc7cbdf0a647917068ab197eec326359f829087bafd0fd95e5fcf645615f55040a847aab188c52f4dd3f61a15b2edfe22e6221a5b0b256f1d8da1e6b860b7c68213cc1fae88c0e86013d9000085216c3ee1ab6fd509500f038480929e335b4b3bb0150f881b831cc870de6d188bdd45a113989bc9d15fe2893ff94349", @ANYRESHEX=0x0, @ANYPTR64, @ANYRESHEX=r6, @ANYRES16=r0]], &(0x7f0000000180)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) 02:12:38 executing program 3: r0 = socket$inet(0xa, 0x801, 0x84) sendto(r0, &(0x7f0000000080)="f5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r0, 0xfc0004) accept(r0, 0x0, 0x0) r1 = socket$inet(0xa, 0x801, 0x84) sendto(r1, &(0x7f0000000080)="d5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r1, 0xfc0004) accept(r1, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x4) writev(r2, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d36020a8447000b4e230f00000000a2bc5603ca00000f7f890000f0200000000101ff0000000309ff5bffff00c7e5ed5e232e725839c97b910000", 0x104}], 0x1) [ 566.944711][ T3834] ceph: No path or : separator in source [ 567.031061][ T3834] ceph: No path or : separator in source 02:12:38 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000003c0)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) syz_open_procfs(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$DRM_IOCTL_SET_MASTER(0xffffffffffffffff, 0x641e) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VHOST_SET_LOG_FD(0xffffffffffffffff, 0x4004af07, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) recvfrom$inet6(r3, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0x0) shutdown(r3, 0x1) r4 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r4, &(0x7f00000000c0), 0xfffffdda, 0xc045, 0x0, 0x0) 02:12:38 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) get_mempolicy(&(0x7f00000003c0), &(0x7f0000000400), 0x289, &(0x7f0000fef000/0x10000)=nil, 0x2) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="c6566ceda4e3f1c409e9515b62be0157ec2275042709d8548cb34a00665921c0c26bc59a07847331f37bc0ef75a5460fe26079bfc6bed87ef39b93f39b6bd4dea2a4b89759e1a77e64786f7d3c9ce12e6e7091ca71c3576afb000000000000000000", @ANYRES32, @ANYRES32=0x0, @ANYRESHEX=r1, @ANYRESDEC=r2], 0x5, 0x1) wait4(r1, 0x0, 0x40000000, &(0x7f0000000200)) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/tty/drivers\x00', 0x0, 0x0) read(r3, &(0x7f0000000280)=""/152, 0x20000318) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/tty/drivers\x00', 0x0, 0x0) read(r4, &(0x7f0000000280)=""/152, 0x20000318) ioctl$VIDIOC_QUERYBUF(r3, 0xc0585609, &(0x7f00000002c0)={0x0, 0x0, 0x4, 0x63d263814f78ec42, 0x401, {0x0, 0x2710}, {0x3, 0xc, 0x6, 0x0, 0x3, 0x9, "878b2cbe"}, 0x3, 0xb, @offset=0x8000, 0x400, 0x0, r4}) setsockopt$RDS_RECVERR(r5, 0x114, 0x5, &(0x7f0000000100), 0x4) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r6 = syz_open_dev$dri(&(0x7f00000001c0)='/dev/dri/card#\x00', 0x1, 0x0) mount(&(0x7f00000000c0)=ANY=[@ANYPTR64=&(0x7f0000000740)=ANY=[@ANYRESHEX=0x0, @ANYPTR, @ANYPTR64, @ANYBLOB="974d3ab47b3b91beb0f4760669c8618bc33664faf9c8179efd568e4e4b38f30869aefe10a4ccb1c515487e645b4a11d7cd2fb39aa1efca7c1eb441061d2be4c165ca7304c2e94159863dcfcf78da45211fdd143b6c91d52ae9ac6a1c2f8173d8ee5682fc65a93dc45ead4a462d9e16ac3dff144c0fcc7d02fcf3fd3029b264f3550caaab22152365126be74a9ff91547eb273f83f2c2762b17b32d7d91ac013d6f5790d3bc09c1884d8c7f15be223a8c3b4e37186c641bc3501ca145f05e49aae1613402448c49a36a9b0055a9d5cc74edda0087d65f15d71e4e051cad208514ee99b6258f827a895d2eb4407e6b7b7a9d6bcc228e615d78a6a8b2c466d96a48ee2c7a736035e283917293271efdc7cbdf0a647917068ab197eec326359f829087bafd0fd95e5fcf645615f55040a847aab188c52f4dd3f61a15b2edfe22e6221a5b0b256f1d8da1e6b860b7c68213cc1fae88c0e86013d9000085216c3ee1ab6fd509500f038480929e335b4b3bb0150f881b831cc870de6d188bdd45a113989bc9d15fe2893ff94349", @ANYRESHEX=0x0, @ANYPTR64, @ANYRESHEX=r6, @ANYRES16=r0]], &(0x7f0000000180)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) 02:12:38 executing program 3: r0 = socket$inet(0xa, 0x801, 0x84) sendto(r0, &(0x7f0000000080)="f5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r0, 0xfc0004) accept(r0, 0x0, 0x0) r1 = socket$inet(0xa, 0x801, 0x84) sendto(r1, &(0x7f0000000080)="d5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r1, 0xfc0004) accept(r1, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x4) writev(r2, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d36020a8447000b4e230f00000000a2bc5603ca00000f7f89000002200000000101ff0000000309ff5bffff00c7e5ed5e232e725839c97b910000", 0x104}], 0x1) [ 567.251182][ T3825] bond126: (slave veth393): Enslaving as an active interface with an up link [ 567.405535][ T3821] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. 02:12:38 executing program 3: r0 = socket$inet(0xa, 0x801, 0x84) sendto(r0, &(0x7f0000000080)="f5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r0, 0xfc0004) accept(r0, 0x0, 0x0) r1 = socket$inet(0xa, 0x801, 0x84) sendto(r1, &(0x7f0000000080)="d5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r1, 0xfc0004) accept(r1, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x4) writev(r2, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d36020a8447000b4e230f00000000a2bc5603ca00000f7f89000004200000000101ff0000000309ff5bffff00c7e5ed5e232e725839c97b910000", 0x104}], 0x1) [ 567.446603][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 567.463834][ T3825] bond126: (slave veth395): Enslaving as an active interface with an up link [ 567.484993][ T3851] ceph: No path or : separator in source 02:12:38 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=ANY=[@ANYBLOB="3c00000010008506000000000000000000200000", @ANYRES32=r3, @ANYBLOB="fe000000000000001c0012000c000100626f6e6400000c0002000800010004000000b8aaf229d19e07fa27e19cdb41f3c39e1c530c8a20b6a9fe127726c243d7f374621b469127371bf17de09220927367b4f1296344846c3bc446955ce991bf484e3dd09935b91aa4de8a507f572a73649c4f95d6d7f9314a580c324bd6a406d53aae87a12b4588407e8ff59d05817ca2a9a3c5649653ffcca5e348e8af4e31c68b5e33d1bddafd3852cf3a31ea0c2843f7e1ff56d00261a99131dd98230bccf89e843da42c421f16c4a0f8a5a3966189d9c8b0eae35b2ae281fd146388a6beb30330de35293082f09e52361f2ba9acfc2677b569368a3f32dfc40b2ea49cfd1b1da4cddabab8889fb2167a7d1b985503375bf58a4f1f0983a1fc18f0b8a974b3372341c1ad56f39e69212b2074e9b3e90000"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000540)={0x0, 0x6c00, &(0x7f0000000200)={&(0x7f00000008c0)=@newlink={0x50, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x50}}, 0x0) [ 567.603032][ T3851] ceph: No path or : separator in source [ 567.641151][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 02:12:39 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) get_mempolicy(&(0x7f00000003c0), &(0x7f0000000400), 0x289, &(0x7f0000fef000/0x10000)=nil, 0x2) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="c6566ceda4e3f1c409e9515b62be0157ec2275042709d8548cb34a00665921c0c26bc59a07847331f37bc0ef75a5460fe26079bfc6bed87ef39b93f39b6bd4dea2a4b89759e1a77e64786f7d3c9ce12e6e7091ca71c3576afb000000000000000000", @ANYRES32, @ANYRES32=0x0, @ANYRESHEX=r1, @ANYRESDEC=r2], 0x5, 0x1) wait4(r1, 0x0, 0x40000000, &(0x7f0000000200)) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/tty/drivers\x00', 0x0, 0x0) read(r3, &(0x7f0000000280)=""/152, 0x20000318) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/tty/drivers\x00', 0x0, 0x0) read(r4, &(0x7f0000000280)=""/152, 0x20000318) ioctl$VIDIOC_QUERYBUF(r3, 0xc0585609, &(0x7f00000002c0)={0x0, 0x0, 0x4, 0x63d263814f78ec42, 0x401, {0x0, 0x2710}, {0x3, 0xc, 0x6, 0x0, 0x3, 0x9, "878b2cbe"}, 0x3, 0xb, @offset=0x8000, 0x400, 0x0, r4}) setsockopt$RDS_RECVERR(r5, 0x114, 0x5, &(0x7f0000000100), 0x4) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r6 = syz_open_dev$dri(&(0x7f00000001c0)='/dev/dri/card#\x00', 0x1, 0x0) mount(&(0x7f00000000c0)=ANY=[@ANYPTR64=&(0x7f0000000740)=ANY=[@ANYRESHEX=0x0, @ANYPTR, @ANYPTR64, @ANYBLOB="974d3ab47b3b91beb0f4760669c8618bc33664faf9c8179efd568e4e4b38f30869aefe10a4ccb1c515487e645b4a11d7cd2fb39aa1efca7c1eb441061d2be4c165ca7304c2e94159863dcfcf75da09211fdd143b6c91d52ae9ac6a1c2f8173d8ee5682fc65a93dc45ead4a462d9e16ac3dff144c0fcc7d02fcf3fd3029b264f3550caaab22152365126be74a9ff91547eb273f83f2c2762b17b32d7d91ac013d6f5790d3bc09c1884d8c7f15be223a8c3b4e37186c641bc3501ca145f05e49aae1613402448c49a36a9b0055a9d5cc74edda0087d65f15d71e4e051cad208514ee99b6258f827a895d2eb4407e6b7b7a9d6bcc228e615d78a6a8b2c466d96a48ee2c7a736035e283917293271efdc7cbdf0a647917068ab197eec326359f829087bafd0fd95e5fcf645615f55040a847aab188c52f4dd3f61a15b2edfe22e6221a5b0b256f1d8da1e6b860b7c68213cc1fae88c0e86013d9000085216c3ee1ab6fd509500f038480929e335b4b3bb0150f881b831cc870de6d188bdd45a113989bc9d15fe2893ff94349", @ANYRESHEX=0x0, @ANYPTR64, @ANYRESHEX=r6, @ANYRES16=r0]], &(0x7f0000000180)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) 02:12:39 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r2 = gettid() process_vm_writev(r2, &(0x7f0000c22000)=[{&(0x7f000034afa4)=""/1, 0x1f80}], 0x2de, &(0x7f0000c22fa0)=[{&(0x7f0000000080)=""/1, 0x2034afa5}], 0x1, 0x0) [ 567.818852][ T3971] bond127: (slave veth397): Enslaving as an active interface with an up link [ 567.891432][ T3967] bond127: (slave veth399): Enslaving as an active interface with an up link 02:12:39 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @remote}}) write$tun(r0, &(0x7f0000000180)={@void, @val={0x0, 0x0, 0x0, 0x0, 0x11}, @mpls={[], @ipv6=@icmpv6={0x0, 0x6, "9eef7b", 0x9, 0x3c, 0x0, @remote, @mcast2, {[], @echo_request={0x80, 0x0, 0x0, 0x0, 0x0, "81"}}}}}, 0x3b) 02:12:39 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000003c0)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) syz_open_procfs(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$DRM_IOCTL_SET_MASTER(0xffffffffffffffff, 0x641e) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VHOST_SET_LOG_FD(0xffffffffffffffff, 0x4004af07, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) recvfrom$inet6(r3, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0x0) shutdown(r3, 0x1) r4 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r4, &(0x7f00000000c0), 0xfffffdda, 0xd140, 0x0, 0x0) 02:12:39 executing program 3: r0 = socket$inet(0xa, 0x801, 0x84) sendto(r0, &(0x7f0000000080)="f5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r0, 0xfc0004) accept(r0, 0x0, 0x0) r1 = socket$inet(0xa, 0x801, 0x84) sendto(r1, &(0x7f0000000080)="d5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r1, 0xfc0004) accept(r1, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x4) writev(r2, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d36020a8447000b4e230f00000000a2bc5603ca00000f7f8900000a200000000101ff0000000309ff5bffff00c7e5ed5e232e725839c97b910000", 0x104}], 0x1) 02:12:39 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=ANY=[@ANYBLOB="3c00000010008506000000000000000000200000", @ANYRES32=r3, @ANYBLOB="fe000000000000001c0012000c000100626f6e6400000c0002000800010004000000b8aaf229d19e07fa27e19cdb41f3c39e1c530c8a20b6a9fe127726c243d7f374621b469127371bf17de09220927367b4f1296344846c3bc446955ce991bf484e3dd09935b91aa4de8a507f572a73649c4f95d6d7f9314a580c324bd6a406d53aae87a12b4588407e8ff59d05817ca2a9a3c5649653ffcca5e348e8af4e31c68b5e33d1bddafd3852cf3a31ea0c2843f7e1ff56d00261a99131dd98230bccf89e843da42c421f16c4a0f8a5a3966189d9c8b0eae35b2ae281fd146388a6beb30330de35293082f09e52361f2ba9acfc2677b569368a3f32dfc40b2ea49cfd1b1da4cddabab8889fb2167a7d1b985503375bf58a4f1f0983a1fc18f0b8a974b3372341c1ad56f39e69212b2074e9b3e90000"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000540)={0x0, 0x6c01, &(0x7f0000000200)={&(0x7f00000008c0)=@newlink={0x50, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x50}}, 0x0) [ 568.065722][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 02:12:39 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) get_mempolicy(&(0x7f00000003c0), &(0x7f0000000400), 0x289, &(0x7f0000fef000/0x10000)=nil, 0x2) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="c6566ceda4e3f1c409e9515b62be0157ec2275042709d8548cb34a00665921c0c26bc59a07847331f37bc0ef75a5460fe26079bfc6bed87ef39b93f39b6bd4dea2a4b89759e1a77e64786f7d3c9ce12e6e7091ca71c3576afb000000000000000000", @ANYRES32, @ANYRES32=0x0, @ANYRESHEX=r1, @ANYRESDEC=r2], 0x5, 0x1) wait4(r1, 0x0, 0x40000000, &(0x7f0000000200)) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/tty/drivers\x00', 0x0, 0x0) read(r3, &(0x7f0000000280)=""/152, 0x20000318) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/tty/drivers\x00', 0x0, 0x0) read(r4, &(0x7f0000000280)=""/152, 0x20000318) ioctl$VIDIOC_QUERYBUF(r3, 0xc0585609, &(0x7f00000002c0)={0x0, 0x0, 0x4, 0x63d263814f78ec42, 0x401, {0x0, 0x2710}, {0x3, 0xc, 0x6, 0x0, 0x3, 0x9, "878b2cbe"}, 0x3, 0xb, @offset=0x8000, 0x400, 0x0, r4}) setsockopt$RDS_RECVERR(r5, 0x114, 0x5, &(0x7f0000000100), 0x4) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r6 = syz_open_dev$dri(&(0x7f00000001c0)='/dev/dri/card#\x00', 0x1, 0x0) mount(&(0x7f00000000c0)=ANY=[@ANYPTR64=&(0x7f0000000740)=ANY=[@ANYRESHEX=0x0, @ANYPTR, @ANYPTR64, @ANYBLOB="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", @ANYRESHEX=0x0, @ANYPTR64, @ANYRESHEX=r6, @ANYRES16=r0]], &(0x7f0000000180)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) [ 568.119351][ T3977] ceph: No path or : separator in source 02:12:39 executing program 3: r0 = socket$inet(0xa, 0x801, 0x84) sendto(r0, &(0x7f0000000080)="f5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r0, 0xfc0004) accept(r0, 0x0, 0x0) r1 = socket$inet(0xa, 0x801, 0x84) sendto(r1, &(0x7f0000000080)="d5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r1, 0xfc0004) accept(r1, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x4) writev(r2, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d36020a8447000b4e230f00000000a2bc5603ca00000f7f8900000e200000000101ff0000000309ff5bffff00c7e5ed5e232e725839c97b910000", 0x104}], 0x1) [ 568.357245][ T3999] ceph: No path or : separator in source 02:12:39 executing program 3: r0 = socket$inet(0xa, 0x801, 0x84) sendto(r0, &(0x7f0000000080)="f5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r0, 0xfc0004) accept(r0, 0x0, 0x0) r1 = socket$inet(0xa, 0x801, 0x84) sendto(r1, &(0x7f0000000080)="d5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r1, 0xfc0004) accept(r1, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x4) writev(r2, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d36020a8447000b4e230f00000000a2bc5603ca00000f7f8900000f200000000101ff0000000309ff5bffff00c7e5ed5e232e725839c97b910000", 0x104}], 0x1) [ 568.457567][ T3999] ceph: No path or : separator in source 02:12:39 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) get_mempolicy(&(0x7f00000003c0), &(0x7f0000000400), 0x289, &(0x7f0000fef000/0x10000)=nil, 0x2) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="c6566ceda4e3f1c409e9515b62be0157ec2275042709d8548cb34a00665921c0c26bc59a07847331f37bc0ef75a5460fe26079bfc6bed87ef39b93f39b6bd4dea2a4b89759e1a77e64786f7d3c9ce12e6e7091ca71c3576afb000000000000000000", @ANYRES32, @ANYRES32=0x0, @ANYRESHEX=r1, @ANYRESDEC=r2], 0x5, 0x1) wait4(r1, 0x0, 0x40000000, &(0x7f0000000200)) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/tty/drivers\x00', 0x0, 0x0) read(r3, &(0x7f0000000280)=""/152, 0x20000318) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/tty/drivers\x00', 0x0, 0x0) read(r4, &(0x7f0000000280)=""/152, 0x20000318) ioctl$VIDIOC_QUERYBUF(r3, 0xc0585609, &(0x7f00000002c0)={0x0, 0x0, 0x4, 0x63d263814f78ec42, 0x401, {0x0, 0x2710}, {0x3, 0xc, 0x6, 0x0, 0x3, 0x9, "878b2cbe"}, 0x3, 0xb, @offset=0x8000, 0x400, 0x0, r4}) setsockopt$RDS_RECVERR(r5, 0x114, 0x5, &(0x7f0000000100), 0x4) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r6 = syz_open_dev$dri(&(0x7f00000001c0)='/dev/dri/card#\x00', 0x1, 0x0) mount(&(0x7f00000000c0)=ANY=[@ANYPTR64=&(0x7f0000000740)=ANY=[@ANYRESHEX=0x0, @ANYPTR, @ANYPTR64, @ANYBLOB="974d3ab47b3b91beb0f4760669c8618bc33664faf9c8179efd568e4e4b38f30869aefe10a4ccb1c515487e645b4a11d7cd2fb39aa1efca7c1eb441061d2be4c165ca7304c2e94159863dcfcf75da45213edd143b6c91d52ae9ac6a1c2f8173d8ee5682fc65a93dc45ead4a462d9e16ac3dff144c0fcc7d02fcf3fd3029b264f3550caaab22152365126be74a9ff91547eb273f83f2c2762b17b32d7d91ac013d6f5790d3bc09c1884d8c7f15be223a8c3b4e37186c641bc3501ca145f05e49aae1613402448c49a36a9b0055a9d5cc74edda0087d65f15d71e4e051cad208514ee99b6258f827a895d2eb4407e6b7b7a9d6bcc228e615d78a6a8b2c466d96a48ee2c7a736035e283917293271efdc7cbdf0a647917068ab197eec326359f829087bafd0fd95e5fcf645615f55040a847aab188c52f4dd3f61a15b2edfe22e6221a5b0b256f1d8da1e6b860b7c68213cc1fae88c0e86013d9000085216c3ee1ab6fd509500f038480929e335b4b3bb0150f881b831cc870de6d188bdd45a113989bc9d15fe2893ff94349", @ANYRESHEX=0x0, @ANYPTR64, @ANYRESHEX=r6, @ANYRES16=r0]], &(0x7f0000000180)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) 02:12:39 executing program 3: r0 = socket$inet(0xa, 0x801, 0x84) sendto(r0, &(0x7f0000000080)="f5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r0, 0xfc0004) accept(r0, 0x0, 0x0) r1 = socket$inet(0xa, 0x801, 0x84) sendto(r1, &(0x7f0000000080)="d5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r1, 0xfc0004) accept(r1, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x4) writev(r2, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d36020a8447000b4e230f00000000a2bc5603ca00000f7f89000060200000000101ff0000000309ff5bffff00c7e5ed5e232e725839c97b910000", 0x104}], 0x1) [ 568.755913][ T4014] ceph: No path or : separator in source 02:12:40 executing program 3: r0 = socket$inet(0xa, 0x801, 0x84) sendto(r0, &(0x7f0000000080)="f5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r0, 0xfc0004) accept(r0, 0x0, 0x0) r1 = socket$inet(0xa, 0x801, 0x84) sendto(r1, &(0x7f0000000080)="d5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r1, 0xfc0004) accept(r1, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x4) writev(r2, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d36020a8447000b4e230f00000000a2bc5603ca00000f7f890000bc200000000101ff0000000309ff5bffff00c7e5ed5e232e725839c97b910000", 0x104}], 0x1) [ 568.804432][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 02:12:40 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) get_mempolicy(&(0x7f00000003c0), &(0x7f0000000400), 0x289, &(0x7f0000fef000/0x10000)=nil, 0x2) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="c6566ceda4e3f1c409e9515b62be0157ec2275042709d8548cb34a00665921c0c26bc59a07847331f37bc0ef75a5460fe26079bfc6bed87ef39b93f39b6bd4dea2a4b89759e1a77e64786f7d3c9ce12e6e7091ca71c3576afb000000000000000000", @ANYRES32, @ANYRES32=0x0, @ANYRESHEX=r1, @ANYRESDEC=r2], 0x5, 0x1) wait4(r1, 0x0, 0x40000000, &(0x7f0000000200)) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/tty/drivers\x00', 0x0, 0x0) read(r3, &(0x7f0000000280)=""/152, 0x20000318) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/tty/drivers\x00', 0x0, 0x0) read(r4, &(0x7f0000000280)=""/152, 0x20000318) ioctl$VIDIOC_QUERYBUF(r3, 0xc0585609, &(0x7f00000002c0)={0x0, 0x0, 0x4, 0x63d263814f78ec42, 0x401, {0x0, 0x2710}, {0x3, 0xc, 0x6, 0x0, 0x3, 0x9, "878b2cbe"}, 0x3, 0xb, @offset=0x8000, 0x400, 0x0, r4}) setsockopt$RDS_RECVERR(r5, 0x114, 0x5, &(0x7f0000000100), 0x4) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r6 = syz_open_dev$dri(&(0x7f00000001c0)='/dev/dri/card#\x00', 0x1, 0x0) mount(&(0x7f00000000c0)=ANY=[@ANYPTR64=&(0x7f0000000740)=ANY=[@ANYRESHEX=0x0, @ANYPTR, @ANYPTR64, @ANYBLOB="974d3ab47b3b91beb0f4760669c8618bc33664faf9c8179efd568e4e4b38f30869aefe10a4ccb1c515487e645b4a11d7cd2fb39aa1efca7c1eb441061d2be4c165ca7304c2e94159863dcfcf75da45215ddd143b6c91d52ae9ac6a1c2f8173d8ee5682fc65a93dc45ead4a462d9e16ac3dff144c0fcc7d02fcf3fd3029b264f3550caaab22152365126be74a9ff91547eb273f83f2c2762b17b32d7d91ac013d6f5790d3bc09c1884d8c7f15be223a8c3b4e37186c641bc3501ca145f05e49aae1613402448c49a36a9b0055a9d5cc74edda0087d65f15d71e4e051cad208514ee99b6258f827a895d2eb4407e6b7b7a9d6bcc228e615d78a6a8b2c466d96a48ee2c7a736035e283917293271efdc7cbdf0a647917068ab197eec326359f829087bafd0fd95e5fcf645615f55040a847aab188c52f4dd3f61a15b2edfe22e6221a5b0b256f1d8da1e6b860b7c68213cc1fae88c0e86013d9000085216c3ee1ab6fd509500f038480929e335b4b3bb0150f881b831cc870de6d188bdd45a113989bc9d15fe2893ff94349", @ANYRESHEX=0x0, @ANYPTR64, @ANYRESHEX=r6, @ANYRES16=r0]], &(0x7f0000000180)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) [ 568.860370][ T4014] ceph: No path or : separator in source [ 568.894466][ T3994] __nla_validate_parse: 2 callbacks suppressed [ 568.894477][ T3994] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. [ 569.064787][ T3997] bond128: (slave veth401): Enslaving as an active interface with an up link 02:12:40 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r2 = gettid() process_vm_writev(r2, &(0x7f0000c22000)=[{&(0x7f000034afa4)=""/1, 0x1f80}], 0x2df, &(0x7f0000c22fa0)=[{&(0x7f0000000080)=""/1, 0x2034afa5}], 0x1, 0x0) [ 569.114659][ T4031] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. [ 569.131022][ T4030] ceph: No path or : separator in source [ 569.214570][ T4030] ceph: No path or : separator in source [ 569.238024][ T4032] bond128: (slave veth403): Enslaving as an active interface with an up link 02:12:41 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @remote}}) write$tun(r0, &(0x7f0000000180)={@void, @val={0x0, 0x0, 0x0, 0x0, 0x31}, @mpls={[], @ipv6=@icmpv6={0x0, 0x6, "9eef7b", 0x9, 0x3c, 0x0, @remote, @mcast2, {[], @echo_request={0x80, 0x0, 0x0, 0x0, 0x0, "81"}}}}}, 0x3b) 02:12:41 executing program 3: r0 = socket$inet(0xa, 0x801, 0x84) sendto(r0, &(0x7f0000000080)="f5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r0, 0xfc0004) accept(r0, 0x0, 0x0) r1 = socket$inet(0xa, 0x801, 0x84) sendto(r1, &(0x7f0000000080)="d5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r1, 0xfc0004) accept(r1, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x4) writev(r2, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d36020a8447000b4e230f00000000a2bc5603ca00000f7f89000000400000000101ff0000000309ff5bffff00c7e5ed5e232e725839c97b910000", 0x104}], 0x1) 02:12:41 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000003c0)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) syz_open_procfs(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$DRM_IOCTL_SET_MASTER(0xffffffffffffffff, 0x641e) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VHOST_SET_LOG_FD(0xffffffffffffffff, 0x4004af07, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) recvfrom$inet6(r3, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0x0) shutdown(r3, 0x1) r4 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r4, &(0x7f00000000c0), 0xfffffdda, 0xe022, 0x0, 0x0) 02:12:41 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=ANY=[@ANYBLOB="3c00000010008506000000000000000000200000", @ANYRES32=r3, @ANYBLOB="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"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000540)={0x0, 0x7400, &(0x7f0000000200)={&(0x7f00000008c0)=@newlink={0x50, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x50}}, 0x0) 02:12:41 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) get_mempolicy(&(0x7f00000003c0), &(0x7f0000000400), 0x289, &(0x7f0000fef000/0x10000)=nil, 0x2) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="c6566ceda4e3f1c409e9515b62be0157ec2275042709d8548cb34a00665921c0c26bc59a07847331f37bc0ef75a5460fe26079bfc6bed87ef39b93f39b6bd4dea2a4b89759e1a77e64786f7d3c9ce12e6e7091ca71c3576afb000000000000000000", @ANYRES32, @ANYRES32=0x0, @ANYRESHEX=r1, @ANYRESDEC=r2], 0x5, 0x1) wait4(r1, 0x0, 0x40000000, &(0x7f0000000200)) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/tty/drivers\x00', 0x0, 0x0) read(r3, &(0x7f0000000280)=""/152, 0x20000318) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/tty/drivers\x00', 0x0, 0x0) read(r4, &(0x7f0000000280)=""/152, 0x20000318) ioctl$VIDIOC_QUERYBUF(r3, 0xc0585609, &(0x7f00000002c0)={0x0, 0x0, 0x4, 0x63d263814f78ec42, 0x401, {0x0, 0x2710}, {0x3, 0xc, 0x6, 0x0, 0x3, 0x9, "878b2cbe"}, 0x3, 0xb, @offset=0x8000, 0x400, 0x0, r4}) setsockopt$RDS_RECVERR(r5, 0x114, 0x5, &(0x7f0000000100), 0x4) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r6 = syz_open_dev$dri(&(0x7f00000001c0)='/dev/dri/card#\x00', 0x1, 0x0) mount(&(0x7f00000000c0)=ANY=[@ANYPTR64=&(0x7f0000000740)=ANY=[@ANYRESHEX=0x0, @ANYPTR, @ANYPTR64, @ANYBLOB="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", @ANYRESHEX=0x0, @ANYPTR64, @ANYRESHEX=r6, @ANYRES16=r0]], &(0x7f0000000180)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) 02:12:41 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r2 = gettid() process_vm_writev(r2, &(0x7f0000c22000)=[{&(0x7f000034afa4)=""/1, 0x1f80}], 0x2e0, &(0x7f0000c22fa0)=[{&(0x7f0000000080)=""/1, 0x2034afa5}], 0x1, 0x0) [ 569.901721][ T4157] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. [ 569.966681][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 569.994115][ T4156] ceph: No path or : separator in source 02:12:41 executing program 3: r0 = socket$inet(0xa, 0x801, 0x84) sendto(r0, &(0x7f0000000080)="f5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r0, 0xfc0004) accept(r0, 0x0, 0x0) r1 = socket$inet(0xa, 0x801, 0x84) sendto(r1, &(0x7f0000000080)="d5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r1, 0xfc0004) accept(r1, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x4) writev(r2, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d36020a8447000b4e230f00000000a2bc5603ca00000f7f89000000200000040001ff0000000309ff5bffff00c7e5ed5e232e725839c97b910000", 0x104}], 0x1) 02:12:41 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) get_mempolicy(&(0x7f00000003c0), &(0x7f0000000400), 0x289, &(0x7f0000fef000/0x10000)=nil, 0x2) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="c6566ceda4e3f1c409e9515b62be0157ec2275042709d8548cb34a00665921c0c26bc59a07847331f37bc0ef75a5460fe26079bfc6bed87ef39b93f39b6bd4dea2a4b89759e1a77e64786f7d3c9ce12e6e7091ca71c3576afb000000000000000000", @ANYRES32, @ANYRES32=0x0, @ANYRESHEX=r1, @ANYRESDEC=r2], 0x5, 0x1) wait4(r1, 0x0, 0x40000000, &(0x7f0000000200)) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/tty/drivers\x00', 0x0, 0x0) read(r3, &(0x7f0000000280)=""/152, 0x20000318) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/tty/drivers\x00', 0x0, 0x0) read(r4, &(0x7f0000000280)=""/152, 0x20000318) ioctl$VIDIOC_QUERYBUF(r3, 0xc0585609, &(0x7f00000002c0)={0x0, 0x0, 0x4, 0x63d263814f78ec42, 0x401, {0x0, 0x2710}, {0x3, 0xc, 0x6, 0x0, 0x3, 0x9, "878b2cbe"}, 0x3, 0xb, @offset=0x8000, 0x400, 0x0, r4}) setsockopt$RDS_RECVERR(r5, 0x114, 0x5, &(0x7f0000000100), 0x4) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r6 = syz_open_dev$dri(&(0x7f00000001c0)='/dev/dri/card#\x00', 0x1, 0x0) mount(&(0x7f00000000c0)=ANY=[@ANYPTR64=&(0x7f0000000740)=ANY=[@ANYRESHEX=0x0, @ANYPTR, @ANYPTR64, @ANYBLOB="974d3ab47b3b91beb0f4760669c8618bc33664faf9c8179efd568e4e4b38f30869aefe10a4ccb1c515487e645b4a11d7cd2fb39aa1efca7c1eb441061d2be4c165ca7304c2e94159863dcfcf75da45211fdd5d3b6c91d52ae9ac6a1c2f8173d8ee5682fc65a93dc45ead4a462d9e16ac3dff144c0fcc7d02fcf3fd3029b264f3550caaab22152365126be74a9ff91547eb273f83f2c2762b17b32d7d91ac013d6f5790d3bc09c1884d8c7f15be223a8c3b4e37186c641bc3501ca145f05e49aae1613402448c49a36a9b0055a9d5cc74edda0087d65f15d71e4e051cad208514ee99b6258f827a895d2eb4407e6b7b7a9d6bcc228e615d78a6a8b2c466d96a48ee2c7a736035e283917293271efdc7cbdf0a647917068ab197eec326359f829087bafd0fd95e5fcf645615f55040a847aab188c52f4dd3f61a15b2edfe22e6221a5b0b256f1d8da1e6b860b7c68213cc1fae88c0e86013d9000085216c3ee1ab6fd509500f038480929e335b4b3bb0150f881b831cc870de6d188bdd45a113989bc9d15fe2893ff94349", @ANYRESHEX=0x0, @ANYPTR64, @ANYRESHEX=r6, @ANYRES16=r0]], &(0x7f0000000180)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) [ 570.265518][ T4156] ceph: No path or : separator in source [ 570.292328][ T4163] bond129: (slave veth405): Enslaving as an active interface with an up link 02:12:41 executing program 3: r0 = socket$inet(0xa, 0x801, 0x84) sendto(r0, &(0x7f0000000080)="f5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r0, 0xfc0004) accept(r0, 0x0, 0x0) r1 = socket$inet(0xa, 0x801, 0x84) sendto(r1, &(0x7f0000000080)="d5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r1, 0xfc0004) accept(r1, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x4) writev(r2, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d36020a8447000b4e230f00000000a2bc5603ca00000f7f89000000200200000101ff0000000309ff5bffff00c7e5ed5e232e725839c97b910000", 0x104}], 0x1) [ 570.382218][ T4157] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. [ 570.498829][ T4163] bond129: (slave veth407): Enslaving as an active interface with an up link [ 570.557682][ T4291] ceph: No path or : separator in source 02:12:41 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=ANY=[@ANYBLOB="3c00000010008506000000000000000000200000", @ANYRES32=r3, @ANYBLOB="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"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000540)={0x0, 0x7401, &(0x7f0000000200)={&(0x7f00000008c0)=@newlink={0x50, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x50}}, 0x0) 02:12:41 executing program 3: r0 = socket$inet(0xa, 0x801, 0x84) sendto(r0, &(0x7f0000000080)="f5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r0, 0xfc0004) accept(r0, 0x0, 0x0) r1 = socket$inet(0xa, 0x801, 0x84) sendto(r1, &(0x7f0000000080)="d5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r1, 0xfc0004) accept(r1, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x4) writev(r2, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d36020a8447000b4e230f00000000a2bc5603ca00000f7f89000000200400000101ff0000000309ff5bffff00c7e5ed5e232e725839c97b910000", 0x104}], 0x1) [ 570.706582][ T4291] ceph: No path or : separator in source [ 570.725492][ T4300] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. 02:12:42 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r2 = gettid() process_vm_writev(r2, &(0x7f0000c22000)=[{&(0x7f000034afa4)=""/1, 0x1f80}], 0x2e1, &(0x7f0000c22fa0)=[{&(0x7f0000000080)=""/1, 0x2034afa5}], 0x1, 0x0) 02:12:42 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @remote}}) write$tun(r0, &(0x7f0000000180)={@void, @val={0x0, 0x0, 0x0, 0x0, 0x300}, @mpls={[], @ipv6=@icmpv6={0x0, 0x6, "9eef7b", 0x9, 0x3c, 0x0, @remote, @mcast2, {[], @echo_request={0x80, 0x0, 0x0, 0x0, 0x0, "81"}}}}}, 0x3b) 02:12:42 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) get_mempolicy(&(0x7f00000003c0), &(0x7f0000000400), 0x289, &(0x7f0000fef000/0x10000)=nil, 0x2) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="c6566ceda4e3f1c409e9515b62be0157ec2275042709d8548cb34a00665921c0c26bc59a07847331f37bc0ef75a5460fe26079bfc6bed87ef39b93f39b6bd4dea2a4b89759e1a77e64786f7d3c9ce12e6e7091ca71c3576afb000000000000000000", @ANYRES32, @ANYRES32=0x0, @ANYRESHEX=r1, @ANYRESDEC=r2], 0x5, 0x1) wait4(r1, 0x0, 0x40000000, &(0x7f0000000200)) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/tty/drivers\x00', 0x0, 0x0) read(r3, &(0x7f0000000280)=""/152, 0x20000318) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/tty/drivers\x00', 0x0, 0x0) read(r4, &(0x7f0000000280)=""/152, 0x20000318) ioctl$VIDIOC_QUERYBUF(r3, 0xc0585609, &(0x7f00000002c0)={0x0, 0x0, 0x4, 0x63d263814f78ec42, 0x401, {0x0, 0x2710}, {0x3, 0xc, 0x6, 0x0, 0x3, 0x9, "878b2cbe"}, 0x3, 0xb, @offset=0x8000, 0x400, 0x0, r4}) setsockopt$RDS_RECVERR(r5, 0x114, 0x5, &(0x7f0000000100), 0x4) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r6 = syz_open_dev$dri(&(0x7f00000001c0)='/dev/dri/card#\x00', 0x1, 0x0) mount(&(0x7f00000000c0)=ANY=[@ANYPTR64=&(0x7f0000000740)=ANY=[@ANYRESHEX=0x0, @ANYPTR, @ANYPTR64, @ANYBLOB="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", @ANYRESHEX=0x0, @ANYPTR64, @ANYRESHEX=r6, @ANYRES16=r0]], &(0x7f0000000180)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) [ 570.930544][ T4306] bond130: (slave veth409): Enslaving as an active interface with an up link [ 570.985865][ T4300] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. 02:12:42 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000003c0)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) syz_open_procfs(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$DRM_IOCTL_SET_MASTER(0xffffffffffffffff, 0x641e) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VHOST_SET_LOG_FD(0xffffffffffffffff, 0x4004af07, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) recvfrom$inet6(r3, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0x0) shutdown(r3, 0x1) r4 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r4, &(0x7f00000000c0), 0xfffffdda, 0xe803, 0x0, 0x0) 02:12:42 executing program 3: r0 = socket$inet(0xa, 0x801, 0x84) sendto(r0, &(0x7f0000000080)="f5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r0, 0xfc0004) accept(r0, 0x0, 0x0) r1 = socket$inet(0xa, 0x801, 0x84) sendto(r1, &(0x7f0000000080)="d5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r1, 0xfc0004) accept(r1, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x4) writev(r2, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d36020a8447000b4e230f00000000a2bc5603ca00000f7f89000000200a00000101ff0000000309ff5bffff00c7e5ed5e232e725839c97b910000", 0x104}], 0x1) [ 571.104929][ T4306] bond130: (slave veth411): Enslaving as an active interface with an up link 02:12:42 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=ANY=[@ANYBLOB="3c00000010008506000000000000000000200000", @ANYRES32=r3, @ANYBLOB="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"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000540)={0x0, 0x7a00, &(0x7f0000000200)={&(0x7f00000008c0)=@newlink={0x50, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x50}}, 0x0) [ 571.180629][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 571.217756][ T4421] ceph: No path or : separator in source 02:12:42 executing program 3: r0 = socket$inet(0xa, 0x801, 0x84) sendto(r0, &(0x7f0000000080)="f5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r0, 0xfc0004) accept(r0, 0x0, 0x0) r1 = socket$inet(0xa, 0x801, 0x84) sendto(r1, &(0x7f0000000080)="d5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r1, 0xfc0004) accept(r1, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x4) writev(r2, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d36020a8447000b4e230f00000000a2bc5603ca00000f7f89000000200e00000101ff0000000309ff5bffff00c7e5ed5e232e725839c97b910000", 0x104}], 0x1) 02:12:42 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @remote}}) write$tun(r0, &(0x7f0000000180)={@void, @val={0x0, 0x0, 0x0, 0x0, 0x500}, @mpls={[], @ipv6=@icmpv6={0x0, 0x6, "9eef7b", 0x9, 0x3c, 0x0, @remote, @mcast2, {[], @echo_request={0x80, 0x0, 0x0, 0x0, 0x0, "81"}}}}}, 0x3b) [ 571.315097][ T4421] ceph: No path or : separator in source [ 571.339748][ T4431] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. 02:12:42 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) get_mempolicy(&(0x7f00000003c0), &(0x7f0000000400), 0x289, &(0x7f0000fef000/0x10000)=nil, 0x2) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="c6566ceda4e3f1c409e9515b62be0157ec2275042709d8548cb34a00665921c0c26bc59a07847331f37bc0ef75a5460fe26079bfc6bed87ef39b93f39b6bd4dea2a4b89759e1a77e64786f7d3c9ce12e6e7091ca71c3576afb000000000000000000", @ANYRES32, @ANYRES32=0x0, @ANYRESHEX=r1, @ANYRESDEC=r2], 0x5, 0x1) wait4(r1, 0x0, 0x40000000, &(0x7f0000000200)) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/tty/drivers\x00', 0x0, 0x0) read(r3, &(0x7f0000000280)=""/152, 0x20000318) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/tty/drivers\x00', 0x0, 0x0) read(r4, &(0x7f0000000280)=""/152, 0x20000318) ioctl$VIDIOC_QUERYBUF(r3, 0xc0585609, &(0x7f00000002c0)={0x0, 0x0, 0x4, 0x63d263814f78ec42, 0x401, {0x0, 0x2710}, {0x3, 0xc, 0x6, 0x0, 0x3, 0x9, "878b2cbe"}, 0x3, 0xb, @offset=0x8000, 0x400, 0x0, r4}) setsockopt$RDS_RECVERR(r5, 0x114, 0x5, &(0x7f0000000100), 0x4) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r6 = syz_open_dev$dri(&(0x7f00000001c0)='/dev/dri/card#\x00', 0x1, 0x0) mount(&(0x7f00000000c0)=ANY=[@ANYPTR64=&(0x7f0000000740)=ANY=[@ANYRESHEX=0x0, @ANYPTR, @ANYPTR64, @ANYBLOB="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", @ANYRESHEX=0x0, @ANYPTR64, @ANYRESHEX=r6, @ANYRES16=r0]], &(0x7f0000000180)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) [ 571.638561][ T4437] bond131: (slave veth413): Enslaving as an active interface with an up link 02:12:43 executing program 3: r0 = socket$inet(0xa, 0x801, 0x84) sendto(r0, &(0x7f0000000080)="f5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r0, 0xfc0004) accept(r0, 0x0, 0x0) r1 = socket$inet(0xa, 0x801, 0x84) sendto(r1, &(0x7f0000000080)="d5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r1, 0xfc0004) accept(r1, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x4) writev(r2, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d36020a8447000b4e230f00000000a2bc5603ca00000f7f89000000200f00000101ff0000000309ff5bffff00c7e5ed5e232e725839c97b910000", 0x104}], 0x1) [ 571.691619][ T4505] ceph: No path or : separator in source [ 571.706457][ T4431] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. [ 571.789273][ T4505] ceph: No path or : separator in source 02:12:43 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=ANY=[@ANYBLOB="3c00000010008506000000000000000000200000", @ANYRES32=r3, @ANYBLOB="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"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000540)={0x0, 0x8100, &(0x7f0000000200)={&(0x7f00000008c0)=@newlink={0x50, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x50}}, 0x0) [ 571.834847][ T4437] bond131: (slave veth415): Enslaving as an active interface with an up link 02:12:43 executing program 3: r0 = socket$inet(0xa, 0x801, 0x84) sendto(r0, &(0x7f0000000080)="f5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r0, 0xfc0004) accept(r0, 0x0, 0x0) r1 = socket$inet(0xa, 0x801, 0x84) sendto(r1, &(0x7f0000000080)="d5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r1, 0xfc0004) accept(r1, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x4) writev(r2, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d36020a8447000b4e230f00000000a2bc5603ca00000f7f89000000206000000101ff0000000309ff5bffff00c7e5ed5e232e725839c97b910000", 0x104}], 0x1) 02:12:43 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r2 = gettid() process_vm_writev(r2, &(0x7f0000c22000)=[{&(0x7f000034afa4)=""/1, 0x1f80}], 0x2e2, &(0x7f0000c22fa0)=[{&(0x7f0000000080)=""/1, 0x2034afa5}], 0x1, 0x0) 02:12:43 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) get_mempolicy(&(0x7f00000003c0), &(0x7f0000000400), 0x289, &(0x7f0000fef000/0x10000)=nil, 0x2) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="c6566ceda4e3f1c409e9515b62be0157ec2275042709d8548cb34a00665921c0c26bc59a07847331f37bc0ef75a5460fe26079bfc6bed87ef39b93f39b6bd4dea2a4b89759e1a77e64786f7d3c9ce12e6e7091ca71c3576afb000000000000000000", @ANYRES32, @ANYRES32=0x0, @ANYRESHEX=r1, @ANYRESDEC=r2], 0x5, 0x1) wait4(r1, 0x0, 0x40000000, &(0x7f0000000200)) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/tty/drivers\x00', 0x0, 0x0) read(r3, &(0x7f0000000280)=""/152, 0x20000318) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/tty/drivers\x00', 0x0, 0x0) read(r4, &(0x7f0000000280)=""/152, 0x20000318) ioctl$VIDIOC_QUERYBUF(r3, 0xc0585609, &(0x7f00000002c0)={0x0, 0x0, 0x4, 0x63d263814f78ec42, 0x401, {0x0, 0x2710}, {0x3, 0xc, 0x6, 0x0, 0x3, 0x9, "878b2cbe"}, 0x3, 0xb, @offset=0x8000, 0x400, 0x0, r4}) setsockopt$RDS_RECVERR(r5, 0x114, 0x5, &(0x7f0000000100), 0x4) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r6 = syz_open_dev$dri(&(0x7f00000001c0)='/dev/dri/card#\x00', 0x1, 0x0) mount(&(0x7f00000000c0)=ANY=[@ANYPTR64=&(0x7f0000000740)=ANY=[@ANYRESHEX=0x0, @ANYPTR, @ANYPTR64, @ANYBLOB="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", @ANYRESHEX=0x0, @ANYPTR64, @ANYRESHEX=r6, @ANYRES16=r0]], &(0x7f0000000180)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) 02:12:43 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @remote}}) write$tun(r0, &(0x7f0000000180)={@void, @val={0x0, 0x0, 0x0, 0x0, 0x600}, @mpls={[], @ipv6=@icmpv6={0x0, 0x6, "9eef7b", 0x9, 0x3c, 0x0, @remote, @mcast2, {[], @echo_request={0x80, 0x0, 0x0, 0x0, 0x0, "81"}}}}}, 0x3b) [ 572.026506][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 572.074116][ T4563] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. 02:12:43 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000003c0)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) syz_open_procfs(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$DRM_IOCTL_SET_MASTER(0xffffffffffffffff, 0x641e) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VHOST_SET_LOG_FD(0xffffffffffffffff, 0x4004af07, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) recvfrom$inet6(r3, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0x0) shutdown(r3, 0x1) r4 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r4, &(0x7f00000000c0), 0xfffffdda, 0xf401, 0x0, 0x0) 02:12:43 executing program 3: r0 = socket$inet(0xa, 0x801, 0x84) sendto(r0, &(0x7f0000000080)="f5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r0, 0xfc0004) accept(r0, 0x0, 0x0) r1 = socket$inet(0xa, 0x801, 0x84) sendto(r1, &(0x7f0000000080)="d5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r1, 0xfc0004) accept(r1, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x4) writev(r2, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d36020a8447000b4e230f00000000a2bc5603ca00000f7f8900000020bc00000101ff0000000309ff5bffff00c7e5ed5e232e725839c97b910000", 0x104}], 0x1) 02:12:43 executing program 3: r0 = socket$inet(0xa, 0x801, 0x84) sendto(r0, &(0x7f0000000080)="f5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r0, 0xfc0004) accept(r0, 0x0, 0x0) r1 = socket$inet(0xa, 0x801, 0x84) sendto(r1, &(0x7f0000000080)="d5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r1, 0xfc0004) accept(r1, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x4) writev(r2, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d36020a8447000b4e230f00000000a2bc5603ca00000f7f8900000020f000000101ff0000000309ff5bffff00c7e5ed5e232e725839c97b910000", 0x104}], 0x1) [ 572.275450][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 572.277726][ T4560] ceph: No path or : separator in source [ 572.462031][ T4560] ceph: No path or : separator in source 02:12:43 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) get_mempolicy(&(0x7f00000003c0), &(0x7f0000000400), 0x289, &(0x7f0000fef000/0x10000)=nil, 0x2) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="c6566ceda4e3f1c409e9515b62be0157ec2275042709d8548cb34a00665921c0c26bc59a07847331f37bc0ef75a5460fe26079bfc6bed87ef39b93f39b6bd4dea2a4b89759e1a77e64786f7d3c9ce12e6e7091ca71c3576afb000000000000000000", @ANYRES32, @ANYRES32=0x0, @ANYRESHEX=r1, @ANYRESDEC=r2], 0x5, 0x1) wait4(r1, 0x0, 0x40000000, &(0x7f0000000200)) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/tty/drivers\x00', 0x0, 0x0) read(r3, &(0x7f0000000280)=""/152, 0x20000318) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/tty/drivers\x00', 0x0, 0x0) read(r4, &(0x7f0000000280)=""/152, 0x20000318) ioctl$VIDIOC_QUERYBUF(r3, 0xc0585609, &(0x7f00000002c0)={0x0, 0x0, 0x4, 0x63d263814f78ec42, 0x401, {0x0, 0x2710}, {0x3, 0xc, 0x6, 0x0, 0x3, 0x9, "878b2cbe"}, 0x3, 0xb, @offset=0x8000, 0x400, 0x0, r4}) setsockopt$RDS_RECVERR(r5, 0x114, 0x5, &(0x7f0000000100), 0x4) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r6 = syz_open_dev$dri(&(0x7f00000001c0)='/dev/dri/card#\x00', 0x1, 0x0) mount(&(0x7f00000000c0)=ANY=[@ANYPTR64=&(0x7f0000000740)=ANY=[@ANYRESHEX=0x0, @ANYPTR, @ANYPTR64, @ANYBLOB="974d3ab47b3b91beb0f4760669c8618bc33664faf9c8179efd568e4e4b38f30869aefe10a4ccb1c515487e645b4a11d7cd2fb39aa1efca7c1eb441061d2be4c165ca7304c2e94159863dcfcf75da45211fdd143b2b91d52ae9ac6a1c2f8173d8ee5682fc65a93dc45ead4a462d9e16ac3dff144c0fcc7d02fcf3fd3029b264f3550caaab22152365126be74a9ff91547eb273f83f2c2762b17b32d7d91ac013d6f5790d3bc09c1884d8c7f15be223a8c3b4e37186c641bc3501ca145f05e49aae1613402448c49a36a9b0055a9d5cc74edda0087d65f15d71e4e051cad208514ee99b6258f827a895d2eb4407e6b7b7a9d6bcc228e615d78a6a8b2c466d96a48ee2c7a736035e283917293271efdc7cbdf0a647917068ab197eec326359f829087bafd0fd95e5fcf645615f55040a847aab188c52f4dd3f61a15b2edfe22e6221a5b0b256f1d8da1e6b860b7c68213cc1fae88c0e86013d9000085216c3ee1ab6fd509500f038480929e335b4b3bb0150f881b831cc870de6d188bdd45a113989bc9d15fe2893ff94349", @ANYRESHEX=0x0, @ANYPTR64, @ANYRESHEX=r6, @ANYRES16=r0]], &(0x7f0000000180)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) 02:12:43 executing program 3: r0 = socket$inet(0xa, 0x801, 0x84) sendto(r0, &(0x7f0000000080)="f5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r0, 0xfc0004) accept(r0, 0x0, 0x0) r1 = socket$inet(0xa, 0x801, 0x84) sendto(r1, &(0x7f0000000080)="d5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r1, 0xfc0004) accept(r1, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x4) writev(r2, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d36020a8447000b4e230f00000000a2bc5603ca00000f7f89000000201f04000101ff0000000309ff5bffff00c7e5ed5e232e725839c97b910000", 0x104}], 0x1) 02:12:44 executing program 3: r0 = socket$inet(0xa, 0x801, 0x84) sendto(r0, &(0x7f0000000080)="f5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r0, 0xfc0004) accept(r0, 0x0, 0x0) r1 = socket$inet(0xa, 0x801, 0x84) sendto(r1, &(0x7f0000000080)="d5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r1, 0xfc0004) accept(r1, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x4) writev(r2, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d36020a8447000b4e230f00000000a2bc5603ca00000f7f8900000020000a000101ff0000000309ff5bffff00c7e5ed5e232e725839c97b910000", 0x104}], 0x1) [ 572.762894][ T4571] bond132: (slave veth417): Enslaving as an active interface with an up link [ 572.800973][ T4696] ceph: No path or : separator in source [ 572.825021][ T4571] bond132: (slave veth419): Enslaving as an active interface with an up link [ 572.834788][ T4563] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. 02:12:44 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=ANY=[@ANYBLOB="3c00000010008506000000000000000000200000", @ANYRES32=r3, @ANYBLOB="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"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000540)={0x0, 0x9402, &(0x7f0000000200)={&(0x7f00000008c0)=@newlink={0x50, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x50}}, 0x0) [ 572.879579][ T4704] ceph: No path or : separator in source 02:12:44 executing program 3: r0 = socket$inet(0xa, 0x801, 0x84) sendto(r0, &(0x7f0000000080)="f5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r0, 0xfc0004) accept(r0, 0x0, 0x0) r1 = socket$inet(0xa, 0x801, 0x84) sendto(r1, &(0x7f0000000080)="d5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r1, 0xfc0004) accept(r1, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x4) writev(r2, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d36020a8447000b4e230f00000000a2bc5603ca00000f7f8900000020000e000101ff0000000309ff5bffff00c7e5ed5e232e725839c97b910000", 0x104}], 0x1) 02:12:44 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) get_mempolicy(&(0x7f00000003c0), &(0x7f0000000400), 0x289, &(0x7f0000fef000/0x10000)=nil, 0x2) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="c6566ceda4e3f1c409e9515b62be0157ec2275042709d8548cb34a00665921c0c26bc59a07847331f37bc0ef75a5460fe26079bfc6bed87ef39b93f39b6bd4dea2a4b89759e1a77e64786f7d3c9ce12e6e7091ca71c3576afb000000000000000000", @ANYRES32, @ANYRES32=0x0, @ANYRESHEX=r1, @ANYRESDEC=r2], 0x5, 0x1) wait4(r1, 0x0, 0x40000000, &(0x7f0000000200)) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/tty/drivers\x00', 0x0, 0x0) read(r3, &(0x7f0000000280)=""/152, 0x20000318) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/tty/drivers\x00', 0x0, 0x0) read(r4, &(0x7f0000000280)=""/152, 0x20000318) ioctl$VIDIOC_QUERYBUF(r3, 0xc0585609, &(0x7f00000002c0)={0x0, 0x0, 0x4, 0x63d263814f78ec42, 0x401, {0x0, 0x2710}, {0x3, 0xc, 0x6, 0x0, 0x3, 0x9, "878b2cbe"}, 0x3, 0xb, @offset=0x8000, 0x400, 0x0, r4}) setsockopt$RDS_RECVERR(r5, 0x114, 0x5, &(0x7f0000000100), 0x4) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r6 = syz_open_dev$dri(&(0x7f00000001c0)='/dev/dri/card#\x00', 0x1, 0x0) mount(&(0x7f00000000c0)=ANY=[@ANYPTR64=&(0x7f0000000740)=ANY=[@ANYRESHEX=0x0, @ANYPTR, @ANYPTR64, @ANYBLOB="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", @ANYRESHEX=0x0, @ANYPTR64, @ANYRESHEX=r6, @ANYRES16=r0]], &(0x7f0000000180)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) [ 573.072045][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 02:12:44 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r2 = gettid() process_vm_writev(r2, &(0x7f0000c22000)=[{&(0x7f000034afa4)=""/1, 0x1f80}], 0x2e3, &(0x7f0000c22fa0)=[{&(0x7f0000000080)=""/1, 0x2034afa5}], 0x1, 0x0) 02:12:44 executing program 3: r0 = socket$inet(0xa, 0x801, 0x84) sendto(r0, &(0x7f0000000080)="f5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r0, 0xfc0004) accept(r0, 0x0, 0x0) r1 = socket$inet(0xa, 0x801, 0x84) sendto(r1, &(0x7f0000000080)="d5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r1, 0xfc0004) accept(r1, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x4) writev(r2, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d36020a8447000b4e230f00000000a2bc5603ca00000f7f8900000020c00e000101ff0000000309ff5bffff00c7e5ed5e232e725839c97b910000", 0x104}], 0x1) [ 573.179376][ T4719] ceph: No path or : separator in source [ 573.199589][ T4714] bond133: (slave veth421): Enslaving as an active interface with an up link 02:12:44 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @remote}}) write$tun(r0, &(0x7f0000000180)={@void, @val={0x0, 0x0, 0x0, 0x0, 0x700}, @mpls={[], @ipv6=@icmpv6={0x0, 0x6, "9eef7b", 0x9, 0x3c, 0x0, @remote, @mcast2, {[], @echo_request={0x80, 0x0, 0x0, 0x0, 0x0, "81"}}}}}, 0x3b) 02:12:44 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000003c0)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) syz_open_procfs(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$DRM_IOCTL_SET_MASTER(0xffffffffffffffff, 0x641e) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VHOST_SET_LOG_FD(0xffffffffffffffff, 0x4004af07, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) recvfrom$inet6(r3, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0x0) shutdown(r3, 0x1) r4 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r4, &(0x7f00000000c0), 0xfffffdda, 0xff00, 0x0, 0x0) [ 573.353475][ T4719] ceph: No path or : separator in source [ 573.420830][ T4712] bond133: (slave veth423): Enslaving as an active interface with an up link 02:12:44 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=ANY=[@ANYBLOB="3c00000010008506000000000000000000200000", @ANYRES32=r3, @ANYBLOB="fe000000000000001c0012000c000100626f6e6400000c0002000800010004000000b8aaf229d19e07fa27e19cdb41f3c39e1c530c8a20b6a9fe127726c243d7f374621b469127371bf17de09220927367b4f1296344846c3bc446955ce991bf484e3dd09935b91aa4de8a507f572a73649c4f95d6d7f9314a580c324bd6a406d53aae87a12b4588407e8ff59d05817ca2a9a3c5649653ffcca5e348e8af4e31c68b5e33d1bddafd3852cf3a31ea0c2843f7e1ff56d00261a99131dd98230bccf89e843da42c421f16c4a0f8a5a3966189d9c8b0eae35b2ae281fd146388a6beb30330de35293082f09e52361f2ba9acfc2677b569368a3f32dfc40b2ea49cfd1b1da4cddabab8889fb2167a7d1b985503375bf58a4f1f0983a1fc18f0b8a974b3372341c1ad56f39e69212b2074e9b3e90000"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000540)={0x0, 0xa602, &(0x7f0000000200)={&(0x7f00000008c0)=@newlink={0x50, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x50}}, 0x0) 02:12:44 executing program 3: r0 = socket$inet(0xa, 0x801, 0x84) sendto(r0, &(0x7f0000000080)="f5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r0, 0xfc0004) accept(r0, 0x0, 0x0) r1 = socket$inet(0xa, 0x801, 0x84) sendto(r1, &(0x7f0000000080)="d5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r1, 0xfc0004) accept(r1, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x4) writev(r2, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d36020a8447000b4e230f00000000a2bc5603ca00000f7f8900000020000f000101ff0000000309ff5bffff00c7e5ed5e232e725839c97b910000", 0x104}], 0x1) [ 573.499047][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 02:12:45 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) get_mempolicy(&(0x7f00000003c0), &(0x7f0000000400), 0x289, &(0x7f0000fef000/0x10000)=nil, 0x2) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="c6566ceda4e3f1c409e9515b62be0157ec2275042709d8548cb34a00665921c0c26bc59a07847331f37bc0ef75a5460fe26079bfc6bed87ef39b93f39b6bd4dea2a4b89759e1a77e64786f7d3c9ce12e6e7091ca71c3576afb000000000000000000", @ANYRES32, @ANYRES32=0x0, @ANYRESHEX=r1, @ANYRESDEC=r2], 0x5, 0x1) wait4(r1, 0x0, 0x40000000, &(0x7f0000000200)) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/tty/drivers\x00', 0x0, 0x0) read(r3, &(0x7f0000000280)=""/152, 0x20000318) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/tty/drivers\x00', 0x0, 0x0) read(r4, &(0x7f0000000280)=""/152, 0x20000318) ioctl$VIDIOC_QUERYBUF(r3, 0xc0585609, &(0x7f00000002c0)={0x0, 0x0, 0x4, 0x63d263814f78ec42, 0x401, {0x0, 0x2710}, {0x3, 0xc, 0x6, 0x0, 0x3, 0x9, "878b2cbe"}, 0x3, 0xb, @offset=0x8000, 0x400, 0x0, r4}) setsockopt$RDS_RECVERR(r5, 0x114, 0x5, &(0x7f0000000100), 0x4) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r6 = syz_open_dev$dri(&(0x7f00000001c0)='/dev/dri/card#\x00', 0x1, 0x0) mount(&(0x7f00000000c0)=ANY=[@ANYPTR64=&(0x7f0000000740)=ANY=[@ANYRESHEX=0x0, @ANYPTR, @ANYPTR64, @ANYBLOB="974d3ab47b3b91beb0f4760669c8618bc33664faf9c8179efd568e4e4b38f30869aefe10a4ccb1c515487e645b4a11d7cd2fb39aa1efca7c1eb441061d2be4c165ca7304c2e94159863dcfcf75da45211fdd143b2e91d52ae9ac6a1c2f8173d8ee5682fc65a93dc45ead4a462d9e16ac3dff144c0fcc7d02fcf3fd3029b264f3550caaab22152365126be74a9ff91547eb273f83f2c2762b17b32d7d91ac013d6f5790d3bc09c1884d8c7f15be223a8c3b4e37186c641bc3501ca145f05e49aae1613402448c49a36a9b0055a9d5cc74edda0087d65f15d71e4e051cad208514ee99b6258f827a895d2eb4407e6b7b7a9d6bcc228e615d78a6a8b2c466d96a48ee2c7a736035e283917293271efdc7cbdf0a647917068ab197eec326359f829087bafd0fd95e5fcf645615f55040a847aab188c52f4dd3f61a15b2edfe22e6221a5b0b256f1d8da1e6b860b7c68213cc1fae88c0e86013d9000085216c3ee1ab6fd509500f038480929e335b4b3bb0150f881b831cc870de6d188bdd45a113989bc9d15fe2893ff94349", @ANYRESHEX=0x0, @ANYPTR64, @ANYRESHEX=r6, @ANYRES16=r0]], &(0x7f0000000180)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) 02:12:45 executing program 3: r0 = socket$inet(0xa, 0x801, 0x84) sendto(r0, &(0x7f0000000080)="f5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r0, 0xfc0004) accept(r0, 0x0, 0x0) r1 = socket$inet(0xa, 0x801, 0x84) sendto(r1, &(0x7f0000000080)="d5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r1, 0xfc0004) accept(r1, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x4) writev(r2, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d36020a8447000b4e230f00000000a2bc5603ca00000f7f8900000020041f000101ff0000000309ff5bffff00c7e5ed5e232e725839c97b910000", 0x104}], 0x1) 02:12:45 executing program 3: r0 = socket$inet(0xa, 0x801, 0x84) sendto(r0, &(0x7f0000000080)="f5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r0, 0xfc0004) accept(r0, 0x0, 0x0) r1 = socket$inet(0xa, 0x801, 0x84) sendto(r1, &(0x7f0000000080)="d5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r1, 0xfc0004) accept(r1, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x4) writev(r2, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d36020a8447000b4e230f00000000a2bc5603ca00000f7f8900000020003f000101ff0000000309ff5bffff00c7e5ed5e232e725839c97b910000", 0x104}], 0x1) [ 573.904026][ T4845] __nla_validate_parse: 2 callbacks suppressed [ 573.904037][ T4845] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. [ 573.955435][ T4851] ceph: No path or : separator in source 02:12:45 executing program 3: r0 = socket$inet(0xa, 0x801, 0x84) sendto(r0, &(0x7f0000000080)="f5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r0, 0xfc0004) accept(r0, 0x0, 0x0) r1 = socket$inet(0xa, 0x801, 0x84) sendto(r1, &(0x7f0000000080)="d5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r1, 0xfc0004) accept(r1, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x4) writev(r2, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d36020a8447000b4e230f00000000a2bc5603ca00000f7f89000000200060000101ff0000000309ff5bffff00c7e5ed5e232e725839c97b910000", 0x104}], 0x1) [ 574.061612][ T4847] bond134: (slave veth425): Enslaving as an active interface with an up link [ 574.097541][ T4845] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. 02:12:45 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) get_mempolicy(&(0x7f00000003c0), &(0x7f0000000400), 0x289, &(0x7f0000fef000/0x10000)=nil, 0x2) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="c6566ceda4e3f1c409e9515b62be0157ec2275042709d8548cb34a00665921c0c26bc59a07847331f37bc0ef75a5460fe26079bfc6bed87ef39b93f39b6bd4dea2a4b89759e1a77e64786f7d3c9ce12e6e7091ca71c3576afb000000000000000000", @ANYRES32, @ANYRES32=0x0, @ANYRESHEX=r1, @ANYRESDEC=r2], 0x5, 0x1) wait4(r1, 0x0, 0x40000000, &(0x7f0000000200)) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/tty/drivers\x00', 0x0, 0x0) read(r3, &(0x7f0000000280)=""/152, 0x20000318) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/tty/drivers\x00', 0x0, 0x0) read(r4, &(0x7f0000000280)=""/152, 0x20000318) ioctl$VIDIOC_QUERYBUF(r3, 0xc0585609, &(0x7f00000002c0)={0x0, 0x0, 0x4, 0x63d263814f78ec42, 0x401, {0x0, 0x2710}, {0x3, 0xc, 0x6, 0x0, 0x3, 0x9, "878b2cbe"}, 0x3, 0xb, @offset=0x8000, 0x400, 0x0, r4}) setsockopt$RDS_RECVERR(r5, 0x114, 0x5, &(0x7f0000000100), 0x4) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r6 = syz_open_dev$dri(&(0x7f00000001c0)='/dev/dri/card#\x00', 0x1, 0x0) mount(&(0x7f00000000c0)=ANY=[@ANYPTR64=&(0x7f0000000740)=ANY=[@ANYRESHEX=0x0, @ANYPTR, @ANYPTR64, @ANYBLOB="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", @ANYRESHEX=0x0, @ANYPTR64, @ANYRESHEX=r6, @ANYRES16=r0]], &(0x7f0000000180)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) [ 574.134284][ T4851] ceph: No path or : separator in source [ 574.156381][ T4847] bond134: (slave veth427): Enslaving as an active interface with an up link 02:12:45 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @remote}}) write$tun(r0, &(0x7f0000000180)={@void, @val={0x0, 0x0, 0x0, 0x0, 0xe80}, @mpls={[], @ipv6=@icmpv6={0x0, 0x6, "9eef7b", 0x9, 0x3c, 0x0, @remote, @mcast2, {[], @echo_request={0x80, 0x0, 0x0, 0x0, 0x0, "81"}}}}}, 0x3b) [ 574.277485][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 574.339613][ T4873] ceph: No path or : separator in source 02:12:45 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r2 = gettid() process_vm_writev(r2, &(0x7f0000c22000)=[{&(0x7f000034afa4)=""/1, 0x1f80}], 0x2e4, &(0x7f0000c22fa0)=[{&(0x7f0000000080)=""/1, 0x2034afa5}], 0x1, 0x0) 02:12:45 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=ANY=[@ANYBLOB="3c00000010008506000000000000000000200000", @ANYRES32=r3, @ANYBLOB="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"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000540)={0x0, 0xb601, &(0x7f0000000200)={&(0x7f00000008c0)=@newlink={0x50, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x50}}, 0x0) 02:12:45 executing program 3: r0 = socket$inet(0xa, 0x801, 0x84) sendto(r0, &(0x7f0000000080)="f5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r0, 0xfc0004) accept(r0, 0x0, 0x0) r1 = socket$inet(0xa, 0x801, 0x84) sendto(r1, &(0x7f0000000080)="d5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r1, 0xfc0004) accept(r1, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x4) writev(r2, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d36020a8447000b4e230f00000000a2bc5603ca00000f7f89000000206a64000101ff0000000309ff5bffff00c7e5ed5e232e725839c97b910000", 0x104}], 0x1) 02:12:45 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000003c0)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) syz_open_procfs(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$DRM_IOCTL_SET_MASTER(0xffffffffffffffff, 0x641e) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VHOST_SET_LOG_FD(0xffffffffffffffff, 0x4004af07, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) recvfrom$inet6(r3, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0x0) shutdown(r3, 0x1) r4 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r4, &(0x7f00000000c0), 0xfffffdda, 0x20000, 0x0, 0x0) [ 574.515948][ T4872] ceph: No path or : separator in source 02:12:45 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) get_mempolicy(&(0x7f00000003c0), &(0x7f0000000400), 0x289, &(0x7f0000fef000/0x10000)=nil, 0x2) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="c6566ceda4e3f1c409e9515b62be0157ec2275042709d8548cb34a00665921c0c26bc59a07847331f37bc0ef75a5460fe26079bfc6bed87ef39b93f39b6bd4dea2a4b89759e1a77e64786f7d3c9ce12e6e7091ca71c3576afb000000000000000000", @ANYRES32, @ANYRES32=0x0, @ANYRESHEX=r1, @ANYRESDEC=r2], 0x5, 0x1) wait4(r1, 0x0, 0x40000000, &(0x7f0000000200)) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/tty/drivers\x00', 0x0, 0x0) read(r3, &(0x7f0000000280)=""/152, 0x20000318) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/tty/drivers\x00', 0x0, 0x0) read(r4, &(0x7f0000000280)=""/152, 0x20000318) ioctl$VIDIOC_QUERYBUF(r3, 0xc0585609, &(0x7f00000002c0)={0x0, 0x0, 0x4, 0x63d263814f78ec42, 0x401, {0x0, 0x2710}, {0x3, 0xc, 0x6, 0x0, 0x3, 0x9, "878b2cbe"}, 0x3, 0xb, @offset=0x8000, 0x400, 0x0, r4}) setsockopt$RDS_RECVERR(r5, 0x114, 0x5, &(0x7f0000000100), 0x4) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r6 = syz_open_dev$dri(&(0x7f00000001c0)='/dev/dri/card#\x00', 0x1, 0x0) mount(&(0x7f00000000c0)=ANY=[@ANYPTR64=&(0x7f0000000740)=ANY=[@ANYRESHEX=0x0, @ANYPTR, @ANYPTR64, @ANYBLOB="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", @ANYRESHEX=0x0, @ANYPTR64, @ANYRESHEX=r6, @ANYRES16=r0]], &(0x7f0000000180)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) 02:12:46 executing program 3: r0 = socket$inet(0xa, 0x801, 0x84) sendto(r0, &(0x7f0000000080)="f5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r0, 0xfc0004) accept(r0, 0x0, 0x0) r1 = socket$inet(0xa, 0x801, 0x84) sendto(r1, &(0x7f0000000080)="d5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r1, 0xfc0004) accept(r1, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x4) writev(r2, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d36020a8447000b4e230f00000000a2bc5603ca00000f7f8900000020646a000101ff0000000309ff5bffff00c7e5ed5e232e725839c97b910000", 0x104}], 0x1) [ 574.630045][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 574.882145][ T4900] ceph: No path or : separator in source 02:12:46 executing program 3: r0 = socket$inet(0xa, 0x801, 0x84) sendto(r0, &(0x7f0000000080)="f5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r0, 0xfc0004) accept(r0, 0x0, 0x0) r1 = socket$inet(0xa, 0x801, 0x84) sendto(r1, &(0x7f0000000080)="d5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r1, 0xfc0004) accept(r1, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x4) writev(r2, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d36020a8447000b4e230f00000000a2bc5603ca00000f7f890000002000bc000101ff0000000309ff5bffff00c7e5ed5e232e725839c97b910000", 0x104}], 0x1) [ 574.984950][ T4900] ceph: No path or : separator in source 02:12:46 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) get_mempolicy(&(0x7f00000003c0), &(0x7f0000000400), 0x289, &(0x7f0000fef000/0x10000)=nil, 0x2) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="c6566ceda4e3f1c409e9515b62be0157ec2275042709d8548cb34a00665921c0c26bc59a07847331f37bc0ef75a5460fe26079bfc6bed87ef39b93f39b6bd4dea2a4b89759e1a77e64786f7d3c9ce12e6e7091ca71c3576afb000000000000000000", @ANYRES32, @ANYRES32=0x0, @ANYRESHEX=r1, @ANYRESDEC=r2], 0x5, 0x1) wait4(r1, 0x0, 0x40000000, &(0x7f0000000200)) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/tty/drivers\x00', 0x0, 0x0) read(r3, &(0x7f0000000280)=""/152, 0x20000318) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/tty/drivers\x00', 0x0, 0x0) read(r4, &(0x7f0000000280)=""/152, 0x20000318) ioctl$VIDIOC_QUERYBUF(r3, 0xc0585609, &(0x7f00000002c0)={0x0, 0x0, 0x4, 0x63d263814f78ec42, 0x401, {0x0, 0x2710}, {0x3, 0xc, 0x6, 0x0, 0x3, 0x9, "878b2cbe"}, 0x3, 0xb, @offset=0x8000, 0x400, 0x0, r4}) setsockopt$RDS_RECVERR(r5, 0x114, 0x5, &(0x7f0000000100), 0x4) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r6 = syz_open_dev$dri(&(0x7f00000001c0)='/dev/dri/card#\x00', 0x1, 0x0) mount(&(0x7f00000000c0)=ANY=[@ANYPTR64=&(0x7f0000000740)=ANY=[@ANYRESHEX=0x0, @ANYPTR, @ANYPTR64, @ANYBLOB="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", @ANYRESHEX=0x0, @ANYPTR64, @ANYRESHEX=r6, @ANYRES16=r0]], &(0x7f0000000180)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) 02:12:46 executing program 3: r0 = socket$inet(0xa, 0x801, 0x84) sendto(r0, &(0x7f0000000080)="f5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r0, 0xfc0004) accept(r0, 0x0, 0x0) r1 = socket$inet(0xa, 0x801, 0x84) sendto(r1, &(0x7f0000000080)="d5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r1, 0xfc0004) accept(r1, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x4) writev(r2, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d36020a8447000b4e230f00000000a2bc5603ca00000f7f89000000200ec0000101ff0000000309ff5bffff00c7e5ed5e232e725839c97b910000", 0x104}], 0x1) [ 575.256781][ T4883] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. [ 575.296717][ T4914] ceph: No path or : separator in source [ 575.405654][ T4893] bond135: (slave veth429): Enslaving as an active interface with an up link [ 575.452102][ T4914] ceph: No path or : separator in source [ 575.467395][ T4918] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. 02:12:46 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000003c0)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) syz_open_procfs(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$DRM_IOCTL_SET_MASTER(0xffffffffffffffff, 0x641e) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VHOST_SET_LOG_FD(0xffffffffffffffff, 0x4004af07, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) recvfrom$inet6(r3, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0x0) shutdown(r3, 0x1) r4 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r4, &(0x7f00000000c0), 0xfffffdda, 0x50000, 0x0, 0x0) 02:12:46 executing program 3: r0 = socket$inet(0xa, 0x801, 0x84) sendto(r0, &(0x7f0000000080)="f5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r0, 0xfc0004) accept(r0, 0x0, 0x0) r1 = socket$inet(0xa, 0x801, 0x84) sendto(r1, &(0x7f0000000080)="d5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r1, 0xfc0004) accept(r1, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x4) writev(r2, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d36020a8447000b4e230f00000000a2bc5603ca00000f7f890000002000f0000101ff0000000309ff5bffff00c7e5ed5e232e725839c97b910000", 0x104}], 0x1) [ 575.514378][ T4919] bond135: (slave veth431): Enslaving as an active interface with an up link [ 575.665132][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 02:12:47 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @remote}}) write$tun(r0, &(0x7f0000000180)={@void, @val={0x0, 0x0, 0x0, 0x0, 0x1100}, @mpls={[], @ipv6=@icmpv6={0x0, 0x6, "9eef7b", 0x9, 0x3c, 0x0, @remote, @mcast2, {[], @echo_request={0x80, 0x0, 0x0, 0x0, 0x0, "81"}}}}}, 0x3b) 02:12:47 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) get_mempolicy(&(0x7f00000003c0), &(0x7f0000000400), 0x289, &(0x7f0000fef000/0x10000)=nil, 0x2) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="c6566ceda4e3f1c409e9515b62be0157ec2275042709d8548cb34a00665921c0c26bc59a07847331f37bc0ef75a5460fe26079bfc6bed87ef39b93f39b6bd4dea2a4b89759e1a77e64786f7d3c9ce12e6e7091ca71c3576afb000000000000000000", @ANYRES32, @ANYRES32=0x0, @ANYRESHEX=r1, @ANYRESDEC=r2], 0x5, 0x1) wait4(r1, 0x0, 0x40000000, &(0x7f0000000200)) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/tty/drivers\x00', 0x0, 0x0) read(r3, &(0x7f0000000280)=""/152, 0x20000318) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/tty/drivers\x00', 0x0, 0x0) read(r4, &(0x7f0000000280)=""/152, 0x20000318) ioctl$VIDIOC_QUERYBUF(r3, 0xc0585609, &(0x7f00000002c0)={0x0, 0x0, 0x4, 0x63d263814f78ec42, 0x401, {0x0, 0x2710}, {0x3, 0xc, 0x6, 0x0, 0x3, 0x9, "878b2cbe"}, 0x3, 0xb, @offset=0x8000, 0x400, 0x0, r4}) setsockopt$RDS_RECVERR(r5, 0x114, 0x5, &(0x7f0000000100), 0x4) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r6 = syz_open_dev$dri(&(0x7f00000001c0)='/dev/dri/card#\x00', 0x1, 0x0) mount(&(0x7f00000000c0)=ANY=[@ANYPTR64=&(0x7f0000000740)=ANY=[@ANYRESHEX=0x0, @ANYPTR, @ANYPTR64, @ANYBLOB="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", @ANYRESHEX=0x0, @ANYPTR64, @ANYRESHEX=r6, @ANYRES16=r0]], &(0x7f0000000180)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) 02:12:47 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=ANY=[@ANYBLOB="3c00000010008506000000000000000000200000", @ANYRES32=r3, @ANYBLOB="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"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000540)={0x0, 0xf000, &(0x7f0000000200)={&(0x7f00000008c0)=@newlink={0x50, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x50}}, 0x0) 02:12:47 executing program 3: r0 = socket$inet(0xa, 0x801, 0x84) sendto(r0, &(0x7f0000000080)="f5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r0, 0xfc0004) accept(r0, 0x0, 0x0) r1 = socket$inet(0xa, 0x801, 0x84) sendto(r1, &(0x7f0000000080)="d5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r1, 0xfc0004) accept(r1, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x4) writev(r2, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d36020a8447000b4e230f00000000a2bc5603ca00000f7f89000000200000000201ff0000000309ff5bffff00c7e5ed5e232e725839c97b910000", 0x104}], 0x1) 02:12:47 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r2 = gettid() process_vm_writev(r2, &(0x7f0000c22000)=[{&(0x7f000034afa4)=""/1, 0x1f80}], 0x2e5, &(0x7f0000c22fa0)=[{&(0x7f0000000080)=""/1, 0x2034afa5}], 0x1, 0x0) [ 576.316280][ T5048] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. 02:12:47 executing program 3: r0 = socket$inet(0xa, 0x801, 0x84) sendto(r0, &(0x7f0000000080)="f5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r0, 0xfc0004) accept(r0, 0x0, 0x0) r1 = socket$inet(0xa, 0x801, 0x84) sendto(r1, &(0x7f0000000080)="d5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r1, 0xfc0004) accept(r1, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x4) writev(r2, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d36020a8447000b4e230f00000000a2bc5603ca00000f7f89000000200000000401ff0000000309ff5bffff00c7e5ed5e232e725839c97b910000", 0x104}], 0x1) [ 576.430816][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 576.452152][ T5047] ceph: No path or : separator in source [ 576.464607][ T5053] bond136: (slave veth433): Enslaving as an active interface with an up link [ 576.478372][ T5048] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. 02:12:47 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000003c0)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) syz_open_procfs(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$DRM_IOCTL_SET_MASTER(0xffffffffffffffff, 0x641e) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VHOST_SET_LOG_FD(0xffffffffffffffff, 0x4004af07, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) recvfrom$inet6(r3, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0x0) shutdown(r3, 0x1) r4 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r4, &(0x7f00000000c0), 0xfffffdda, 0x51400, 0x0, 0x0) [ 576.554432][ T5053] bond136: (slave veth435): Enslaving as an active interface with an up link [ 576.581671][ T5047] ceph: No path or : separator in source 02:12:47 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=ANY=[@ANYBLOB="3c00000010008506000000000000000000200000", @ANYRES32=r3, @ANYBLOB="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"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000540)={0x0, 0xf403, &(0x7f0000000200)={&(0x7f00000008c0)=@newlink={0x50, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x50}}, 0x0) 02:12:48 executing program 3: r0 = socket$inet(0xa, 0x801, 0x84) sendto(r0, &(0x7f0000000080)="f5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r0, 0xfc0004) accept(r0, 0x0, 0x0) r1 = socket$inet(0xa, 0x801, 0x84) sendto(r1, &(0x7f0000000080)="d5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r1, 0xfc0004) accept(r1, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x4) writev(r2, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d36020a8447000b4e230f00000000a2bc5603ca00000f7f89000000200000000501ff0000000309ff5bffff00c7e5ed5e232e725839c97b910000", 0x104}], 0x1) [ 576.730577][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 576.755783][ T5169] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. 02:12:48 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) get_mempolicy(&(0x7f00000003c0), &(0x7f0000000400), 0x289, &(0x7f0000fef000/0x10000)=nil, 0x2) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="c6566ceda4e3f1c409e9515b62be0157ec2275042709d8548cb34a00665921c0c26bc59a07847331f37bc0ef75a5460fe26079bfc6bed87ef39b93f39b6bd4dea2a4b89759e1a77e64786f7d3c9ce12e6e7091ca71c3576afb000000000000000000", @ANYRES32, @ANYRES32=0x0, @ANYRESHEX=r1, @ANYRESDEC=r2], 0x5, 0x1) wait4(r1, 0x0, 0x40000000, &(0x7f0000000200)) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/tty/drivers\x00', 0x0, 0x0) read(r3, &(0x7f0000000280)=""/152, 0x20000318) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/tty/drivers\x00', 0x0, 0x0) read(r4, &(0x7f0000000280)=""/152, 0x20000318) ioctl$VIDIOC_QUERYBUF(r3, 0xc0585609, &(0x7f00000002c0)={0x0, 0x0, 0x4, 0x63d263814f78ec42, 0x401, {0x0, 0x2710}, {0x3, 0xc, 0x6, 0x0, 0x3, 0x9, "878b2cbe"}, 0x3, 0xb, @offset=0x8000, 0x400, 0x0, r4}) setsockopt$RDS_RECVERR(r5, 0x114, 0x5, &(0x7f0000000100), 0x4) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r6 = syz_open_dev$dri(&(0x7f00000001c0)='/dev/dri/card#\x00', 0x1, 0x0) mount(&(0x7f00000000c0)=ANY=[@ANYPTR64=&(0x7f0000000740)=ANY=[@ANYRESHEX=0x0, @ANYPTR, @ANYPTR64, @ANYBLOB="974d3ab47b3b91beb0f4760669c8618bc33664faf9c8179efd568e4e4b38f30869aefe10a4ccb1c515487e645b4a11d7cd2fb39aa1efca7c1eb441061d2be4c165ca7304c2e94159863dcfcf75da45211fdd143b7591d52ae9ac6a1c2f8173d8ee5682fc65a93dc45ead4a462d9e16ac3dff144c0fcc7d02fcf3fd3029b264f3550caaab22152365126be74a9ff91547eb273f83f2c2762b17b32d7d91ac013d6f5790d3bc09c1884d8c7f15be223a8c3b4e37186c641bc3501ca145f05e49aae1613402448c49a36a9b0055a9d5cc74edda0087d65f15d71e4e051cad208514ee99b6258f827a895d2eb4407e6b7b7a9d6bcc228e615d78a6a8b2c466d96a48ee2c7a736035e283917293271efdc7cbdf0a647917068ab197eec326359f829087bafd0fd95e5fcf645615f55040a847aab188c52f4dd3f61a15b2edfe22e6221a5b0b256f1d8da1e6b860b7c68213cc1fae88c0e86013d9000085216c3ee1ab6fd509500f038480929e335b4b3bb0150f881b831cc870de6d188bdd45a113989bc9d15fe2893ff94349", @ANYRESHEX=0x0, @ANYPTR64, @ANYRESHEX=r6, @ANYRES16=r0]], &(0x7f0000000180)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) 02:12:48 executing program 3: r0 = socket$inet(0xa, 0x801, 0x84) sendto(r0, &(0x7f0000000080)="f5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r0, 0xfc0004) accept(r0, 0x0, 0x0) r1 = socket$inet(0xa, 0x801, 0x84) sendto(r1, &(0x7f0000000080)="d5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r1, 0xfc0004) accept(r1, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x4) writev(r2, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d36020a8447000b4e230f00000000a2bc5603ca00000f7f89000000200000000801ff0000000309ff5bffff00c7e5ed5e232e725839c97b910000", 0x104}], 0x1) [ 576.994984][ T5173] bond137: (slave veth437): Enslaving as an active interface with an up link 02:12:48 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @remote}}) write$tun(r0, &(0x7f0000000180)={@void, @val={0x0, 0x0, 0x0, 0x0, 0x3100}, @mpls={[], @ipv6=@icmpv6={0x0, 0x6, "9eef7b", 0x9, 0x3c, 0x0, @remote, @mcast2, {[], @echo_request={0x80, 0x0, 0x0, 0x0, 0x0, "81"}}}}}, 0x3b) [ 577.081467][ T5169] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. [ 577.093408][ T5182] ceph: No path or : separator in source [ 577.190971][ T5173] bond137: (slave veth439): Enslaving as an active interface with an up link 02:12:48 executing program 3: r0 = socket$inet(0xa, 0x801, 0x84) sendto(r0, &(0x7f0000000080)="f5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r0, 0xfc0004) accept(r0, 0x0, 0x0) r1 = socket$inet(0xa, 0x801, 0x84) sendto(r1, &(0x7f0000000080)="d5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r1, 0xfc0004) accept(r1, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x4) writev(r2, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d36020a8447000b4e230f00000000a2bc5603ca00000f7f8900000020ffffff1f01ff0000000309ff5bffff00c7e5ed5e232e725839c97b910000", 0x104}], 0x1) 02:12:48 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=ANY=[@ANYBLOB="3c00000010008506000000000000000000200000", @ANYRES32=r3, @ANYBLOB="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"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000540)={0x0, 0xf603, &(0x7f0000000200)={&(0x7f00000008c0)=@newlink={0x50, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x50}}, 0x0) [ 577.375342][ T5182] ceph: No path or : separator in source 02:12:48 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r2 = gettid() process_vm_writev(r2, &(0x7f0000c22000)=[{&(0x7f000034afa4)=""/1, 0x1f80}], 0x2e6, &(0x7f0000c22fa0)=[{&(0x7f0000000080)=""/1, 0x2034afa5}], 0x1, 0x0) [ 577.441781][ T5300] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. 02:12:48 executing program 3: r0 = socket$inet(0xa, 0x801, 0x84) sendto(r0, &(0x7f0000000080)="f5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r0, 0xfc0004) accept(r0, 0x0, 0x0) r1 = socket$inet(0xa, 0x801, 0x84) sendto(r1, &(0x7f0000000080)="d5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r1, 0xfc0004) accept(r1, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x4) writev(r2, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d36020a8447000b4e230f00000000a2bc5603ca00000f7f89000000200000004001ff0000000309ff5bffff00c7e5ed5e232e725839c97b910000", 0x104}], 0x1) 02:12:48 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) get_mempolicy(&(0x7f00000003c0), &(0x7f0000000400), 0x289, &(0x7f0000fef000/0x10000)=nil, 0x2) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="c6566ceda4e3f1c409e9515b62be0157ec2275042709d8548cb34a00665921c0c26bc59a07847331f37bc0ef75a5460fe26079bfc6bed87ef39b93f39b6bd4dea2a4b89759e1a77e64786f7d3c9ce12e6e7091ca71c3576afb000000000000000000", @ANYRES32, @ANYRES32=0x0, @ANYRESHEX=r1, @ANYRESDEC=r2], 0x5, 0x1) wait4(r1, 0x0, 0x40000000, &(0x7f0000000200)) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/tty/drivers\x00', 0x0, 0x0) read(r3, &(0x7f0000000280)=""/152, 0x20000318) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/tty/drivers\x00', 0x0, 0x0) read(r4, &(0x7f0000000280)=""/152, 0x20000318) ioctl$VIDIOC_QUERYBUF(r3, 0xc0585609, &(0x7f00000002c0)={0x0, 0x0, 0x4, 0x63d263814f78ec42, 0x401, {0x0, 0x2710}, {0x3, 0xc, 0x6, 0x0, 0x3, 0x9, "878b2cbe"}, 0x3, 0xb, @offset=0x8000, 0x400, 0x0, r4}) setsockopt$RDS_RECVERR(r5, 0x114, 0x5, &(0x7f0000000100), 0x4) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r6 = syz_open_dev$dri(&(0x7f00000001c0)='/dev/dri/card#\x00', 0x1, 0x0) mount(&(0x7f00000000c0)=ANY=[@ANYPTR64=&(0x7f0000000740)=ANY=[@ANYRESHEX=0x0, @ANYPTR, @ANYPTR64, @ANYBLOB="974d3ab47b3b91beb0f4760669c8618bc33664faf9c8179efd568e4e4b38f30869aefe10a4ccb1c515487e645b4a11d7cd2fb39aa1efca7c1eb441061d2be4c165ca7304c2e94159863dcfcf75da45211fdd143b6c91d52ae9ac6a3e2f8173d8ee5682fc65a93dc45ead4a462d9e16ac3dff144c0fcc7d02fcf3fd3029b264f3550caaab22152365126be74a9ff91547eb273f83f2c2762b17b32d7d91ac013d6f5790d3bc09c1884d8c7f15be223a8c3b4e37186c641bc3501ca145f05e49aae1613402448c49a36a9b0055a9d5cc74edda0087d65f15d71e4e051cad208514ee99b6258f827a895d2eb4407e6b7b7a9d6bcc228e615d78a6a8b2c466d96a48ee2c7a736035e283917293271efdc7cbdf0a647917068ab197eec326359f829087bafd0fd95e5fcf645615f55040a847aab188c52f4dd3f61a15b2edfe22e6221a5b0b256f1d8da1e6b860b7c68213cc1fae88c0e86013d9000085216c3ee1ab6fd509500f038480929e335b4b3bb0150f881b831cc870de6d188bdd45a113989bc9d15fe2893ff94349", @ANYRESHEX=0x0, @ANYPTR64, @ANYRESHEX=r6, @ANYRES16=r0]], &(0x7f0000000180)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) [ 577.544568][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 02:12:49 executing program 3: r0 = socket$inet(0xa, 0x801, 0x84) sendto(r0, &(0x7f0000000080)="f5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r0, 0xfc0004) accept(r0, 0x0, 0x0) r1 = socket$inet(0xa, 0x801, 0x84) sendto(r1, &(0x7f0000000080)="d5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r1, 0xfc0004) accept(r1, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x4) writev(r2, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d36020a8447000b4e230f00000000a2bc5603ca00000f7f89000000200002000101ff0000000309ff5bffff00c7e5ed5e232e725839c97b910000", 0x104}], 0x1) [ 577.714722][ T5305] bond138: (slave veth441): Enslaving as an active interface with an up link 02:12:49 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000003c0)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) syz_open_procfs(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$DRM_IOCTL_SET_MASTER(0xffffffffffffffff, 0x641e) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VHOST_SET_LOG_FD(0xffffffffffffffff, 0x4004af07, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) recvfrom$inet6(r3, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0x0) shutdown(r3, 0x1) r4 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r4, &(0x7f00000000c0), 0xfffffdda, 0x8a200, 0x0, 0x0) 02:12:49 executing program 3: r0 = socket$inet(0xa, 0x801, 0x84) sendto(r0, &(0x7f0000000080)="f5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r0, 0xfc0004) accept(r0, 0x0, 0x0) r1 = socket$inet(0xa, 0x801, 0x84) sendto(r1, &(0x7f0000000080)="d5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r1, 0xfc0004) accept(r1, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x4) writev(r2, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d36020a8447000b4e230f00000000a2bc5603ca00000f7f89000000200004000101ff0000000309ff5bffff00c7e5ed5e232e725839c97b910000", 0x104}], 0x1) [ 577.840310][ T5300] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. [ 577.864132][ T5320] ceph: No path or : separator in source [ 577.964047][ T5320] ceph: No path or : separator in source 02:12:49 executing program 3: r0 = socket$inet(0xa, 0x801, 0x84) sendto(r0, &(0x7f0000000080)="f5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r0, 0xfc0004) accept(r0, 0x0, 0x0) r1 = socket$inet(0xa, 0x801, 0x84) sendto(r1, &(0x7f0000000080)="d5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r1, 0xfc0004) accept(r1, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x4) writev(r2, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d36020a8447000b4e230f00000000a2bc5603ca00000f7f8900000020000a000101ff0000000309ff5bffff00c7e5ed5e232e725839c97b910000", 0x104}], 0x1) 02:12:49 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @remote}}) write$tun(r0, &(0x7f0000000180)={@void, @val={0x0, 0x0, 0x0, 0x0, 0x800e}, @mpls={[], @ipv6=@icmpv6={0x0, 0x6, "9eef7b", 0x9, 0x3c, 0x0, @remote, @mcast2, {[], @echo_request={0x80, 0x0, 0x0, 0x0, 0x0, "81"}}}}}, 0x3b) [ 578.058628][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 578.165422][ T5305] bond138: (slave veth443): Enslaving as an active interface with an up link 02:12:49 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) get_mempolicy(&(0x7f00000003c0), &(0x7f0000000400), 0x289, &(0x7f0000fef000/0x10000)=nil, 0x2) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="c6566ceda4e3f1c409e9515b62be0157ec2275042709d8548cb34a00665921c0c26bc59a07847331f37bc0ef75a5460fe26079bfc6bed87ef39b93f39b6bd4dea2a4b89759e1a77e64786f7d3c9ce12e6e7091ca71c3576afb000000000000000000", @ANYRES32, @ANYRES32=0x0, @ANYRESHEX=r1, @ANYRESDEC=r2], 0x5, 0x1) wait4(r1, 0x0, 0x40000000, &(0x7f0000000200)) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/tty/drivers\x00', 0x0, 0x0) read(r3, &(0x7f0000000280)=""/152, 0x20000318) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/tty/drivers\x00', 0x0, 0x0) read(r4, &(0x7f0000000280)=""/152, 0x20000318) ioctl$VIDIOC_QUERYBUF(r3, 0xc0585609, &(0x7f00000002c0)={0x0, 0x0, 0x4, 0x63d263814f78ec42, 0x401, {0x0, 0x2710}, {0x3, 0xc, 0x6, 0x0, 0x3, 0x9, "878b2cbe"}, 0x3, 0xb, @offset=0x8000, 0x400, 0x0, r4}) setsockopt$RDS_RECVERR(r5, 0x114, 0x5, &(0x7f0000000100), 0x4) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r6 = syz_open_dev$dri(&(0x7f00000001c0)='/dev/dri/card#\x00', 0x1, 0x0) mount(&(0x7f00000000c0)=ANY=[@ANYPTR64=&(0x7f0000000740)=ANY=[@ANYRESHEX=0x0, @ANYPTR, @ANYPTR64, @ANYBLOB="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", @ANYRESHEX=0x0, @ANYPTR64, @ANYRESHEX=r6, @ANYRES16=r0]], &(0x7f0000000180)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) 02:12:49 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=ANY=[@ANYBLOB="3c00000010008506000000000000000000200000", @ANYRES32=r3, @ANYBLOB="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"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000540)={0x0, 0xf803, &(0x7f0000000200)={&(0x7f00000008c0)=@newlink={0x50, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x50}}, 0x0) 02:12:49 executing program 3: r0 = socket$inet(0xa, 0x801, 0x84) sendto(r0, &(0x7f0000000080)="f5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r0, 0xfc0004) accept(r0, 0x0, 0x0) r1 = socket$inet(0xa, 0x801, 0x84) sendto(r1, &(0x7f0000000080)="d5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r1, 0xfc0004) accept(r1, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x4) writev(r2, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d36020a8447000b4e230f00000000a2bc5603ca00000f7f8900000020000e000101ff0000000309ff5bffff00c7e5ed5e232e725839c97b910000", 0x104}], 0x1) [ 578.502754][ T5447] ceph: No path or : separator in source 02:12:49 executing program 3: r0 = socket$inet(0xa, 0x801, 0x84) sendto(r0, &(0x7f0000000080)="f5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r0, 0xfc0004) accept(r0, 0x0, 0x0) r1 = socket$inet(0xa, 0x801, 0x84) sendto(r1, &(0x7f0000000080)="d5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r1, 0xfc0004) accept(r1, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x4) writev(r2, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d36020a8447000b4e230f00000000a2bc5603ca00000f7f8900000020000f000101ff0000000309ff5bffff00c7e5ed5e232e725839c97b910000", 0x104}], 0x1) [ 578.583063][ T5456] bond139: (slave veth445): Enslaving as an active interface with an up link 02:12:50 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r2 = gettid() process_vm_writev(r2, &(0x7f0000c22000)=[{&(0x7f000034afa4)=""/1, 0x1f80}], 0x2e7, &(0x7f0000c22fa0)=[{&(0x7f0000000080)=""/1, 0x2034afa5}], 0x1, 0x0) 02:12:50 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @remote}}) write$tun(r0, &(0x7f0000000180)={@void, @val, @mpls={[], @ipv6=@icmpv6={0x0, 0x6, "9eef7b", 0x9, 0x3c, 0x0, @remote, @mcast2, {[], @echo_request={0x80, 0x0, 0x0, 0x0, 0x0, "81"}}}}}, 0x3b) 02:12:50 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=ANY=[@ANYBLOB="3c00000010008506000000000000000000200000", @ANYRES32=r3, @ANYBLOB="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"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000540)={0x0, 0xfa03, &(0x7f0000000200)={&(0x7f00000008c0)=@newlink={0x50, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x50}}, 0x0) [ 578.832028][ T5447] ceph: No path or : separator in source 02:12:50 executing program 3: r0 = socket$inet(0xa, 0x801, 0x84) sendto(r0, &(0x7f0000000080)="f5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r0, 0xfc0004) accept(r0, 0x0, 0x0) r1 = socket$inet(0xa, 0x801, 0x84) sendto(r1, &(0x7f0000000080)="d5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r1, 0xfc0004) accept(r1, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x4) writev(r2, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d36020a8447000b4e230f00000000a2bc5603ca00000f7f89000000200060000101ff0000000309ff5bffff00c7e5ed5e232e725839c97b910000", 0x104}], 0x1) [ 579.050218][ T5578] bond141: (slave veth449): Enslaving as an active interface with an up link 02:12:50 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000003c0)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) syz_open_procfs(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$DRM_IOCTL_SET_MASTER(0xffffffffffffffff, 0x641e) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VHOST_SET_LOG_FD(0xffffffffffffffff, 0x4004af07, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) recvfrom$inet6(r3, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0x0) shutdown(r3, 0x1) r4 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r4, &(0x7f00000000c0), 0xfffffdda, 0x140500, 0x0, 0x0) 02:12:50 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) get_mempolicy(&(0x7f00000003c0), &(0x7f0000000400), 0x289, &(0x7f0000fef000/0x10000)=nil, 0x2) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="c6566ceda4e3f1c409e9515b62be0157ec2275042709d8548cb34a00665921c0c26bc59a07847331f37bc0ef75a5460fe26079bfc6bed87ef39b93f39b6bd4dea2a4b89759e1a77e64786f7d3c9ce12e6e7091ca71c3576afb000000000000000000", @ANYRES32, @ANYRES32=0x0, @ANYRESHEX=r1, @ANYRESDEC=r2], 0x5, 0x1) wait4(r1, 0x0, 0x40000000, &(0x7f0000000200)) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/tty/drivers\x00', 0x0, 0x0) read(r3, &(0x7f0000000280)=""/152, 0x20000318) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/tty/drivers\x00', 0x0, 0x0) read(r4, &(0x7f0000000280)=""/152, 0x20000318) ioctl$VIDIOC_QUERYBUF(r3, 0xc0585609, &(0x7f00000002c0)={0x0, 0x0, 0x4, 0x63d263814f78ec42, 0x401, {0x0, 0x2710}, {0x3, 0xc, 0x6, 0x0, 0x3, 0x9, "878b2cbe"}, 0x3, 0xb, @offset=0x8000, 0x400, 0x0, r4}) setsockopt$RDS_RECVERR(r5, 0x114, 0x5, &(0x7f0000000100), 0x4) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r6 = syz_open_dev$dri(&(0x7f00000001c0)='/dev/dri/card#\x00', 0x1, 0x0) mount(&(0x7f00000000c0)=ANY=[@ANYPTR64=&(0x7f0000000740)=ANY=[@ANYRESHEX=0x0, @ANYPTR, @ANYPTR64, @ANYBLOB="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", @ANYRESHEX=0x0, @ANYPTR64, @ANYRESHEX=r6, @ANYRES16=r0]], &(0x7f0000000180)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) 02:12:50 executing program 3: r0 = socket$inet(0xa, 0x801, 0x84) sendto(r0, &(0x7f0000000080)="f5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r0, 0xfc0004) accept(r0, 0x0, 0x0) r1 = socket$inet(0xa, 0x801, 0x84) sendto(r1, &(0x7f0000000080)="d5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r1, 0xfc0004) accept(r1, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x4) writev(r2, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d36020a8447000b4e230f00000000a2bc5603ca00000f7f890000002000bc000101ff0000000309ff5bffff00c7e5ed5e232e725839c97b910000", 0x104}], 0x1) [ 579.345566][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 02:12:50 executing program 3: r0 = socket$inet(0xa, 0x801, 0x84) sendto(r0, &(0x7f0000000080)="f5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r0, 0xfc0004) accept(r0, 0x0, 0x0) r1 = socket$inet(0xa, 0x801, 0x84) sendto(r1, &(0x7f0000000080)="d5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r1, 0xfc0004) accept(r1, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x4) writev(r2, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d36020a8447000b4e230f00000000a2bc5603ca00000f7f890000002000f0000101ff0000000309ff5bffff00c7e5ed5e232e725839c97b910000", 0x104}], 0x1) [ 579.452396][ T5587] ceph: No path or : separator in source [ 579.549721][ T5602] ceph: No path or : separator in source 02:12:51 executing program 3: r0 = socket$inet(0xa, 0x801, 0x84) sendto(r0, &(0x7f0000000080)="f5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r0, 0xfc0004) accept(r0, 0x0, 0x0) r1 = socket$inet(0xa, 0x801, 0x84) sendto(r1, &(0x7f0000000080)="d5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r1, 0xfc0004) accept(r1, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x4) writev(r2, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d36020a8447000b4e230f00000000a2bc5603ca00000f7f8900000020001f040101ff0000000309ff5bffff00c7e5ed5e232e725839c97b910000", 0x104}], 0x1) [ 579.734194][ T5469] __nla_validate_parse: 3 callbacks suppressed [ 579.734204][ T5469] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. 02:12:51 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) get_mempolicy(&(0x7f00000003c0), &(0x7f0000000400), 0x289, &(0x7f0000fef000/0x10000)=nil, 0x2) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="c6566ceda4e3f1c409e9515b62be0157ec2275042709d8548cb34a00665921c0c26bc59a07847331f37bc0ef75a5460fe26079bfc6bed87ef39b93f39b6bd4dea2a4b89759e1a77e64786f7d3c9ce12e6e7091ca71c3576afb000000000000000000", @ANYRES32, @ANYRES32=0x0, @ANYRESHEX=r1, @ANYRESDEC=r2], 0x5, 0x1) wait4(r1, 0x0, 0x40000000, &(0x7f0000000200)) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/tty/drivers\x00', 0x0, 0x0) read(r3, &(0x7f0000000280)=""/152, 0x20000318) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/tty/drivers\x00', 0x0, 0x0) read(r4, &(0x7f0000000280)=""/152, 0x20000318) ioctl$VIDIOC_QUERYBUF(r3, 0xc0585609, &(0x7f00000002c0)={0x0, 0x0, 0x4, 0x63d263814f78ec42, 0x401, {0x0, 0x2710}, {0x3, 0xc, 0x6, 0x0, 0x3, 0x9, "878b2cbe"}, 0x3, 0xb, @offset=0x8000, 0x400, 0x0, r4}) setsockopt$RDS_RECVERR(r5, 0x114, 0x5, &(0x7f0000000100), 0x4) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r6 = syz_open_dev$dri(&(0x7f00000001c0)='/dev/dri/card#\x00', 0x1, 0x0) mount(&(0x7f00000000c0)=ANY=[@ANYPTR64=&(0x7f0000000740)=ANY=[@ANYRESHEX=0x0, @ANYPTR, @ANYPTR64, @ANYBLOB="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", @ANYRESHEX=0x0, @ANYPTR64, @ANYRESHEX=r6, @ANYRES16=r0]], &(0x7f0000000180)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) [ 579.846336][ T5578] bond141: (slave veth451): Enslaving as an active interface with an up link 02:12:51 executing program 3: r0 = socket$inet(0xa, 0x801, 0x84) sendto(r0, &(0x7f0000000080)="f5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r0, 0xfc0004) accept(r0, 0x0, 0x0) r1 = socket$inet(0xa, 0x801, 0x84) sendto(r1, &(0x7f0000000080)="d5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r1, 0xfc0004) accept(r1, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x4) writev(r2, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d36020a8447000b4e230f00000000a2bc5603ca00000f7f890000002000000a0101ff0000000309ff5bffff00c7e5ed5e232e725839c97b910000", 0x104}], 0x1) 02:12:51 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=ANY=[@ANYBLOB="3c00000010008506000000000000000000200000", @ANYRES32=r3, @ANYBLOB="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"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000540)={0x0, 0xfc03, &(0x7f0000000200)={&(0x7f00000008c0)=@newlink={0x50, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x50}}, 0x0) [ 580.036667][ T5617] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. [ 580.095348][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 580.142183][ T5613] ceph: No path or : separator in source [ 580.165453][ T5620] bond142: (slave veth453): Enslaving as an active interface with an up link [ 580.181571][ T5617] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. [ 580.208676][ T5620] bond142: (slave veth455): Enslaving as an active interface with an up link 02:12:51 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r2 = gettid() process_vm_writev(r2, &(0x7f0000c22000)=[{&(0x7f000034afa4)=""/1, 0x1f80}], 0x2e8, &(0x7f0000c22fa0)=[{&(0x7f0000000080)=""/1, 0x2034afa5}], 0x1, 0x0) 02:12:51 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @remote}}) write$tun(r0, &(0x7f0000000180)={@void, @val={0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, @mpls={[], @ipv6=@icmpv6={0x0, 0x6, "9eef7b", 0x9, 0x3c, 0x0, @remote, @mcast2, {[], @echo_request={0x80, 0x0, 0x0, 0x0, 0x0, "81"}}}}}, 0x3b) 02:12:51 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=ANY=[@ANYBLOB="3c00000010008506000000000000000000200000", @ANYRES32=r3, @ANYBLOB="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"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000540)={0x0, 0xfeff, &(0x7f0000000200)={&(0x7f00000008c0)=@newlink={0x50, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x50}}, 0x0) 02:12:51 executing program 3: r0 = socket$inet(0xa, 0x801, 0x84) sendto(r0, &(0x7f0000000080)="f5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r0, 0xfc0004) accept(r0, 0x0, 0x0) r1 = socket$inet(0xa, 0x801, 0x84) sendto(r1, &(0x7f0000000080)="d5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r1, 0xfc0004) accept(r1, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x4) writev(r2, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d36020a8447000b4e230f00000000a2bc5603ca00000f7f890000002000000e0101ff0000000309ff5bffff00c7e5ed5e232e725839c97b910000", 0x104}], 0x1) 02:12:51 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000003c0)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) syz_open_procfs(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$DRM_IOCTL_SET_MASTER(0xffffffffffffffff, 0x641e) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VHOST_SET_LOG_FD(0xffffffffffffffff, 0x4004af07, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) recvfrom$inet6(r3, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0x0) shutdown(r3, 0x1) r4 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r4, &(0x7f00000000c0), 0xfffffdda, 0x800000, 0x0, 0x0) 02:12:51 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) get_mempolicy(&(0x7f00000003c0), &(0x7f0000000400), 0x289, &(0x7f0000fef000/0x10000)=nil, 0x2) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="c6566ceda4e3f1c409e9515b62be0157ec2275042709d8548cb34a00665921c0c26bc59a07847331f37bc0ef75a5460fe26079bfc6bed87ef39b93f39b6bd4dea2a4b89759e1a77e64786f7d3c9ce12e6e7091ca71c3576afb000000000000000000", @ANYRES32, @ANYRES32=0x0, @ANYRESHEX=r1, @ANYRESDEC=r2], 0x5, 0x1) wait4(r1, 0x0, 0x40000000, &(0x7f0000000200)) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/tty/drivers\x00', 0x0, 0x0) read(r3, &(0x7f0000000280)=""/152, 0x20000318) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/tty/drivers\x00', 0x0, 0x0) read(r4, &(0x7f0000000280)=""/152, 0x20000318) ioctl$VIDIOC_QUERYBUF(r3, 0xc0585609, &(0x7f00000002c0)={0x0, 0x0, 0x4, 0x63d263814f78ec42, 0x401, {0x0, 0x2710}, {0x3, 0xc, 0x6, 0x0, 0x3, 0x9, "878b2cbe"}, 0x3, 0xb, @offset=0x8000, 0x400, 0x0, r4}) setsockopt$RDS_RECVERR(r5, 0x114, 0x5, &(0x7f0000000100), 0x4) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r6 = syz_open_dev$dri(&(0x7f00000001c0)='/dev/dri/card#\x00', 0x1, 0x0) mount(&(0x7f00000000c0)=ANY=[@ANYPTR64=&(0x7f0000000740)=ANY=[@ANYRESHEX=0x0, @ANYPTR, @ANYPTR64, @ANYBLOB="974d3ab47b3b91beb0f4760669c8618bc33664faf9c8179efd568e4e4b38f30869aefe10a4ccb1c515487e645b4a11d7cd2fb39aa1efca7c1eb441061d2be4c165ca7304c2e94159863dcfcf75da45211fdd143b6c91d52ae9ac6a1c2f812ad8ee5682fc65a93dc45ead4a462d9e16ac3dff144c0fcc7d02fcf3fd3029b264f3550caaab22152365126be74a9ff91547eb273f83f2c2762b17b32d7d91ac013d6f5790d3bc09c1884d8c7f15be223a8c3b4e37186c641bc3501ca145f05e49aae1613402448c49a36a9b0055a9d5cc74edda0087d65f15d71e4e051cad208514ee99b6258f827a895d2eb4407e6b7b7a9d6bcc228e615d78a6a8b2c466d96a48ee2c7a736035e283917293271efdc7cbdf0a647917068ab197eec326359f829087bafd0fd95e5fcf645615f55040a847aab188c52f4dd3f61a15b2edfe22e6221a5b0b256f1d8da1e6b860b7c68213cc1fae88c0e86013d9000085216c3ee1ab6fd509500f038480929e335b4b3bb0150f881b831cc870de6d188bdd45a113989bc9d15fe2893ff94349", @ANYRESHEX=0x0, @ANYPTR64, @ANYRESHEX=r6, @ANYRES16=r0]], &(0x7f0000000180)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) [ 580.474117][ T5635] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. [ 580.514434][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 02:12:51 executing program 3: r0 = socket$inet(0xa, 0x801, 0x84) sendto(r0, &(0x7f0000000080)="f5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r0, 0xfc0004) accept(r0, 0x0, 0x0) r1 = socket$inet(0xa, 0x801, 0x84) sendto(r1, &(0x7f0000000080)="d5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r1, 0xfc0004) accept(r1, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x4) writev(r2, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d36020a8447000b4e230f00000000a2bc5603ca00000f7f890000002000c00e0101ff0000000309ff5bffff00c7e5ed5e232e725839c97b910000", 0x104}], 0x1) [ 580.563355][ T5645] bond143: (slave veth457): Enslaving as an active interface with an up link [ 580.667396][ T5635] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. [ 580.748259][ T5638] ceph: No path or : separator in source 02:12:52 executing program 3: r0 = socket$inet(0xa, 0x801, 0x84) sendto(r0, &(0x7f0000000080)="f5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r0, 0xfc0004) accept(r0, 0x0, 0x0) r1 = socket$inet(0xa, 0x801, 0x84) sendto(r1, &(0x7f0000000080)="d5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r1, 0xfc0004) accept(r1, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x4) writev(r2, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d36020a8447000b4e230f00000000a2bc5603ca00000f7f890000002000000f0101ff0000000309ff5bffff00c7e5ed5e232e725839c97b910000", 0x104}], 0x1) [ 580.824242][ T5638] ceph: No path or : separator in source 02:12:52 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) get_mempolicy(&(0x7f00000003c0), &(0x7f0000000400), 0x289, &(0x7f0000fef000/0x10000)=nil, 0x2) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="c6566ceda4e3f1c409e9515b62be0157ec2275042709d8548cb34a00665921c0c26bc59a07847331f37bc0ef75a5460fe26079bfc6bed87ef39b93f39b6bd4dea2a4b89759e1a77e64786f7d3c9ce12e6e7091ca71c3576afb000000000000000000", @ANYRES32, @ANYRES32=0x0, @ANYRESHEX=r1, @ANYRESDEC=r2], 0x5, 0x1) wait4(r1, 0x0, 0x40000000, &(0x7f0000000200)) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/tty/drivers\x00', 0x0, 0x0) read(r3, &(0x7f0000000280)=""/152, 0x20000318) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/tty/drivers\x00', 0x0, 0x0) read(r4, &(0x7f0000000280)=""/152, 0x20000318) ioctl$VIDIOC_QUERYBUF(r3, 0xc0585609, &(0x7f00000002c0)={0x0, 0x0, 0x4, 0x63d263814f78ec42, 0x401, {0x0, 0x2710}, {0x3, 0xc, 0x6, 0x0, 0x3, 0x9, "878b2cbe"}, 0x3, 0xb, @offset=0x8000, 0x400, 0x0, r4}) setsockopt$RDS_RECVERR(r5, 0x114, 0x5, &(0x7f0000000100), 0x4) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r6 = syz_open_dev$dri(&(0x7f00000001c0)='/dev/dri/card#\x00', 0x1, 0x0) mount(&(0x7f00000000c0)=ANY=[@ANYPTR64=&(0x7f0000000740)=ANY=[@ANYRESHEX=0x0, @ANYPTR, @ANYPTR64, @ANYBLOB="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", @ANYRESHEX=0x0, @ANYPTR64, @ANYRESHEX=r6, @ANYRES16=r0]], &(0x7f0000000180)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) 02:12:52 executing program 3: r0 = socket$inet(0xa, 0x801, 0x84) sendto(r0, &(0x7f0000000080)="f5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r0, 0xfc0004) accept(r0, 0x0, 0x0) r1 = socket$inet(0xa, 0x801, 0x84) sendto(r1, &(0x7f0000000080)="d5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r1, 0xfc0004) accept(r1, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x4) writev(r2, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d36020a8447000b4e230f00000000a2bc5603ca00000f7f890000002000041f0101ff0000000309ff5bffff00c7e5ed5e232e725839c97b910000", 0x104}], 0x1) [ 581.124196][ T5762] ceph: No path or : separator in source [ 581.242898][ T5762] ceph: No path or : separator in source [ 581.252331][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 02:12:52 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) get_mempolicy(&(0x7f00000003c0), &(0x7f0000000400), 0x289, &(0x7f0000fef000/0x10000)=nil, 0x2) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="c6566ceda4e3f1c409e9515b62be0157ec2275042709d8548cb34a00665921c0c26bc59a07847331f37bc0ef75a5460fe26079bfc6bed87ef39b93f39b6bd4dea2a4b89759e1a77e64786f7d3c9ce12e6e7091ca71c3576afb000000000000000000", @ANYRES32, @ANYRES32=0x0, @ANYRESHEX=r1, @ANYRESDEC=r2], 0x5, 0x1) wait4(r1, 0x0, 0x40000000, &(0x7f0000000200)) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/tty/drivers\x00', 0x0, 0x0) read(r3, &(0x7f0000000280)=""/152, 0x20000318) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/tty/drivers\x00', 0x0, 0x0) read(r4, &(0x7f0000000280)=""/152, 0x20000318) ioctl$VIDIOC_QUERYBUF(r3, 0xc0585609, &(0x7f00000002c0)={0x0, 0x0, 0x4, 0x63d263814f78ec42, 0x401, {0x0, 0x2710}, {0x3, 0xc, 0x6, 0x0, 0x3, 0x9, "878b2cbe"}, 0x3, 0xb, @offset=0x8000, 0x400, 0x0, r4}) setsockopt$RDS_RECVERR(r5, 0x114, 0x5, &(0x7f0000000100), 0x4) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r6 = syz_open_dev$dri(&(0x7f00000001c0)='/dev/dri/card#\x00', 0x1, 0x0) mount(&(0x7f00000000c0)=ANY=[@ANYPTR64=&(0x7f0000000740)=ANY=[@ANYRESHEX=0x0, @ANYPTR, @ANYPTR64, @ANYBLOB="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", @ANYRESHEX=0x0, @ANYPTR64, @ANYRESHEX=r6, @ANYRES16=r0]], &(0x7f0000000180)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) 02:12:52 executing program 3: r0 = socket$inet(0xa, 0x801, 0x84) sendto(r0, &(0x7f0000000080)="f5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r0, 0xfc0004) accept(r0, 0x0, 0x0) r1 = socket$inet(0xa, 0x801, 0x84) sendto(r1, &(0x7f0000000080)="d5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r1, 0xfc0004) accept(r1, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x4) writev(r2, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d36020a8447000b4e230f00000000a2bc5603ca00000f7f890000002000003f0101ff0000000309ff5bffff00c7e5ed5e232e725839c97b910000", 0x104}], 0x1) [ 581.474567][ T5775] ceph: No path or : separator in source [ 581.500657][ T5645] bond143: (slave veth459): Enslaving as an active interface with an up link [ 581.587327][ T5775] ceph: No path or : separator in source 02:12:53 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r2 = gettid() process_vm_writev(r2, &(0x7f0000c22000)=[{&(0x7f000034afa4)=""/1, 0x1f80}], 0x2e9, &(0x7f0000c22fa0)=[{&(0x7f0000000080)=""/1, 0x2034afa5}], 0x1, 0x0) 02:12:53 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000003c0)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) syz_open_procfs(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$DRM_IOCTL_SET_MASTER(0xffffffffffffffff, 0x641e) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VHOST_SET_LOG_FD(0xffffffffffffffff, 0x4004af07, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) recvfrom$inet6(r3, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0x0) shutdown(r3, 0x1) r4 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r4, &(0x7f00000000c0), 0xfffffdda, 0xa20800, 0x0, 0x0) 02:12:53 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=ANY=[@ANYBLOB="3c00000010008506000000000000000000200000", @ANYRES32=r3, @ANYBLOB="fe000000000000001c0012000c000100626f6e6400000c0002000800010004000000b8aaf229d19e07fa27e19cdb41f3c39e1c530c8a20b6a9fe127726c243d7f374621b469127371bf17de09220927367b4f1296344846c3bc446955ce991bf484e3dd09935b91aa4de8a507f572a73649c4f95d6d7f9314a580c324bd6a406d53aae87a12b4588407e8ff59d05817ca2a9a3c5649653ffcca5e348e8af4e31c68b5e33d1bddafd3852cf3a31ea0c2843f7e1ff56d00261a99131dd98230bccf89e843da42c421f16c4a0f8a5a3966189d9c8b0eae35b2ae281fd146388a6beb30330de35293082f09e52361f2ba9acfc2677b569368a3f32dfc40b2ea49cfd1b1da4cddabab8889fb2167a7d1b985503375bf58a4f1f0983a1fc18f0b8a974b3372341c1ad56f39e69212b2074e9b3e90000"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000540)={0x0, 0xff0f, &(0x7f0000000200)={&(0x7f00000008c0)=@newlink={0x50, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x50}}, 0x0) 02:12:53 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @remote}}) write$tun(r0, &(0x7f0000000180)={@void, @val={0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, @mpls={[], @ipv6=@icmpv6={0x0, 0x6, "9eef7b", 0x9, 0x3c, 0x0, @remote, @mcast2, {[], @echo_request={0x80, 0x0, 0x0, 0x0, 0x0, "81"}}}}}, 0x3b) 02:12:53 executing program 3: r0 = socket$inet(0xa, 0x801, 0x84) sendto(r0, &(0x7f0000000080)="f5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r0, 0xfc0004) accept(r0, 0x0, 0x0) r1 = socket$inet(0xa, 0x801, 0x84) sendto(r1, &(0x7f0000000080)="d5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r1, 0xfc0004) accept(r1, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x4) writev(r2, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d36020a8447000b4e230f00000000a2bc5603ca00000f7f89000000200000600101ff0000000309ff5bffff00c7e5ed5e232e725839c97b910000", 0x104}], 0x1) 02:12:53 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) get_mempolicy(&(0x7f00000003c0), &(0x7f0000000400), 0x289, &(0x7f0000fef000/0x10000)=nil, 0x2) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="c6566ceda4e3f1c409e9515b62be0157ec2275042709d8548cb34a00665921c0c26bc59a07847331f37bc0ef75a5460fe26079bfc6bed87ef39b93f39b6bd4dea2a4b89759e1a77e64786f7d3c9ce12e6e7091ca71c3576afb000000000000000000", @ANYRES32, @ANYRES32=0x0, @ANYRESHEX=r1, @ANYRESDEC=r2], 0x5, 0x1) wait4(r1, 0x0, 0x40000000, &(0x7f0000000200)) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/tty/drivers\x00', 0x0, 0x0) read(r3, &(0x7f0000000280)=""/152, 0x20000318) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/tty/drivers\x00', 0x0, 0x0) read(r4, &(0x7f0000000280)=""/152, 0x20000318) ioctl$VIDIOC_QUERYBUF(r3, 0xc0585609, &(0x7f00000002c0)={0x0, 0x0, 0x4, 0x63d263814f78ec42, 0x401, {0x0, 0x2710}, {0x3, 0xc, 0x6, 0x0, 0x3, 0x9, "878b2cbe"}, 0x3, 0xb, @offset=0x8000, 0x400, 0x0, r4}) setsockopt$RDS_RECVERR(r5, 0x114, 0x5, &(0x7f0000000100), 0x4) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r6 = syz_open_dev$dri(&(0x7f00000001c0)='/dev/dri/card#\x00', 0x1, 0x0) mount(&(0x7f00000000c0)=ANY=[@ANYPTR64=&(0x7f0000000740)=ANY=[@ANYRESHEX=0x0, @ANYPTR, @ANYPTR64, @ANYBLOB="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", @ANYRESHEX=0x0, @ANYPTR64, @ANYRESHEX=r6, @ANYRES16=r0]], &(0x7f0000000180)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) [ 581.980128][ T5796] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. [ 582.028375][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 582.065518][ T5794] ceph: No path or : separator in source 02:12:53 executing program 3: r0 = socket$inet(0xa, 0x801, 0x84) sendto(r0, &(0x7f0000000080)="f5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r0, 0xfc0004) accept(r0, 0x0, 0x0) r1 = socket$inet(0xa, 0x801, 0x84) sendto(r1, &(0x7f0000000080)="d5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r1, 0xfc0004) accept(r1, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x4) writev(r2, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d36020a8447000b4e230f00000000a2bc5603ca00000f7f8900000020006a640101ff0000000309ff5bffff00c7e5ed5e232e725839c97b910000", 0x104}], 0x1) [ 582.255421][ T5794] ceph: No path or : separator in source 02:12:53 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) get_mempolicy(&(0x7f00000003c0), &(0x7f0000000400), 0x289, &(0x7f0000fef000/0x10000)=nil, 0x2) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="c6566ceda4e3f1c409e9515b62be0157ec2275042709d8548cb34a00665921c0c26bc59a07847331f37bc0ef75a5460fe26079bfc6bed87ef39b93f39b6bd4dea2a4b89759e1a77e64786f7d3c9ce12e6e7091ca71c3576afb000000000000000000", @ANYRES32, @ANYRES32=0x0, @ANYRESHEX=r1, @ANYRESDEC=r2], 0x5, 0x1) wait4(r1, 0x0, 0x40000000, &(0x7f0000000200)) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/tty/drivers\x00', 0x0, 0x0) read(r3, &(0x7f0000000280)=""/152, 0x20000318) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/tty/drivers\x00', 0x0, 0x0) read(r4, &(0x7f0000000280)=""/152, 0x20000318) ioctl$VIDIOC_QUERYBUF(r3, 0xc0585609, &(0x7f00000002c0)={0x0, 0x0, 0x4, 0x63d263814f78ec42, 0x401, {0x0, 0x2710}, {0x3, 0xc, 0x6, 0x0, 0x3, 0x9, "878b2cbe"}, 0x3, 0xb, @offset=0x8000, 0x400, 0x0, r4}) setsockopt$RDS_RECVERR(r5, 0x114, 0x5, &(0x7f0000000100), 0x4) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r6 = syz_open_dev$dri(&(0x7f00000001c0)='/dev/dri/card#\x00', 0x1, 0x0) mount(&(0x7f00000000c0)=ANY=[@ANYPTR64=&(0x7f0000000740)=ANY=[@ANYRESHEX=0x0, @ANYPTR, @ANYPTR64, @ANYBLOB="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", @ANYRESHEX=0x0, @ANYPTR64, @ANYRESHEX=r6, @ANYRES16=r0]], &(0x7f0000000180)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) 02:12:53 executing program 3: r0 = socket$inet(0xa, 0x801, 0x84) sendto(r0, &(0x7f0000000080)="f5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r0, 0xfc0004) accept(r0, 0x0, 0x0) r1 = socket$inet(0xa, 0x801, 0x84) sendto(r1, &(0x7f0000000080)="d5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r1, 0xfc0004) accept(r1, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x4) writev(r2, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d36020a8447000b4e230f00000000a2bc5603ca00000f7f890000002000646a0101ff0000000309ff5bffff00c7e5ed5e232e725839c97b910000", 0x104}], 0x1) [ 582.522745][ T5815] ceph: No path or : separator in source [ 582.589927][ T5802] bond144: (slave veth461): Enslaving as an active interface with an up link 02:12:53 executing program 3: r0 = socket$inet(0xa, 0x801, 0x84) sendto(r0, &(0x7f0000000080)="f5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r0, 0xfc0004) accept(r0, 0x0, 0x0) r1 = socket$inet(0xa, 0x801, 0x84) sendto(r1, &(0x7f0000000080)="d5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r1, 0xfc0004) accept(r1, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x4) writev(r2, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d36020a8447000b4e230f00000000a2bc5603ca00000f7f89000000200000bc0101ff0000000309ff5bffff00c7e5ed5e232e725839c97b910000", 0x104}], 0x1) 02:12:54 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) get_mempolicy(&(0x7f00000003c0), &(0x7f0000000400), 0x289, &(0x7f0000fef000/0x10000)=nil, 0x2) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="c6566ceda4e3f1c409e9515b62be0157ec2275042709d8548cb34a00665921c0c26bc59a07847331f37bc0ef75a5460fe26079bfc6bed87ef39b93f39b6bd4dea2a4b89759e1a77e64786f7d3c9ce12e6e7091ca71c3576afb000000000000000000", @ANYRES32, @ANYRES32=0x0, @ANYRESHEX=r1, @ANYRESDEC=r2], 0x5, 0x1) wait4(r1, 0x0, 0x40000000, &(0x7f0000000200)) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/tty/drivers\x00', 0x0, 0x0) read(r3, &(0x7f0000000280)=""/152, 0x20000318) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/tty/drivers\x00', 0x0, 0x0) read(r4, &(0x7f0000000280)=""/152, 0x20000318) ioctl$VIDIOC_QUERYBUF(r3, 0xc0585609, &(0x7f00000002c0)={0x0, 0x0, 0x4, 0x63d263814f78ec42, 0x401, {0x0, 0x2710}, {0x3, 0xc, 0x6, 0x0, 0x3, 0x9, "878b2cbe"}, 0x3, 0xb, @offset=0x8000, 0x400, 0x0, r4}) setsockopt$RDS_RECVERR(r5, 0x114, 0x5, &(0x7f0000000100), 0x4) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r6 = syz_open_dev$dri(&(0x7f00000001c0)='/dev/dri/card#\x00', 0x1, 0x0) mount(&(0x7f00000000c0)=ANY=[@ANYPTR64=&(0x7f0000000740)=ANY=[@ANYRESHEX=0x0, @ANYPTR, @ANYPTR64, @ANYBLOB="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", @ANYRESHEX=0x0, @ANYPTR64, @ANYRESHEX=r6, @ANYRES16=r0]], &(0x7f0000000180)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) [ 582.634680][ T5815] ceph: No path or : separator in source 02:12:54 executing program 3: r0 = socket$inet(0xa, 0x801, 0x84) sendto(r0, &(0x7f0000000080)="f5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r0, 0xfc0004) accept(r0, 0x0, 0x0) r1 = socket$inet(0xa, 0x801, 0x84) sendto(r1, &(0x7f0000000080)="d5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r1, 0xfc0004) accept(r1, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x4) writev(r2, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d36020a8447000b4e230f00000000a2bc5603ca00000f7f8900000020000ec00101ff0000000309ff5bffff00c7e5ed5e232e725839c97b910000", 0x104}], 0x1) [ 582.774746][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 582.809366][ T5796] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. [ 582.900007][ T5802] bond144: (slave veth463): Enslaving as an active interface with an up link [ 582.920030][ T5830] ceph: No path or : separator in source [ 583.044724][ T5830] ceph: No path or : separator in source 02:12:54 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r2 = gettid() process_vm_writev(r2, &(0x7f0000c22000)=[{&(0x7f000034afa4)=""/1, 0x1f80}], 0x2ea, &(0x7f0000c22fa0)=[{&(0x7f0000000080)=""/1, 0x2034afa5}], 0x1, 0x0) 02:12:54 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=ANY=[@ANYBLOB="3c00000010008506000000000000000000200000", @ANYRES32=r3, @ANYBLOB="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"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000540)={0x0, 0xff7f, &(0x7f0000000200)={&(0x7f00000008c0)=@newlink={0x50, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x50}}, 0x0) 02:12:54 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000003c0)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) syz_open_procfs(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$DRM_IOCTL_SET_MASTER(0xffffffffffffffff, 0x641e) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VHOST_SET_LOG_FD(0xffffffffffffffff, 0x4004af07, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) recvfrom$inet6(r3, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0x0) shutdown(r3, 0x1) r4 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r4, &(0x7f00000000c0), 0xfffffdda, 0x1000000, 0x0, 0x0) [ 583.366874][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 583.447816][ T5946] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. 02:12:55 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @remote}}) write$tun(r0, &(0x7f0000000180)={@void, @val={0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, @mpls={[], @ipv6=@icmpv6={0x0, 0x6, "9eef7b", 0x9, 0x3c, 0x0, @remote, @mcast2, {[], @echo_request={0x80, 0x0, 0x0, 0x0, 0x0, "81"}}}}}, 0x3b) 02:12:55 executing program 3: r0 = socket$inet(0xa, 0x801, 0x84) sendto(r0, &(0x7f0000000080)="f5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r0, 0xfc0004) accept(r0, 0x0, 0x0) r1 = socket$inet(0xa, 0x801, 0x84) sendto(r1, &(0x7f0000000080)="d5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r1, 0xfc0004) accept(r1, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x4) writev(r2, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d36020a8447000b4e230f00000000a2bc5603ca00000f7f89000000200000f00101ff0000000309ff5bffff00c7e5ed5e232e725839c97b910000", 0x104}], 0x1) 02:12:55 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) get_mempolicy(&(0x7f00000003c0), &(0x7f0000000400), 0x289, &(0x7f0000fef000/0x10000)=nil, 0x2) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="c6566ceda4e3f1c409e9515b62be0157ec2275042709d8548cb34a00665921c0c26bc59a07847331f37bc0ef75a5460fe26079bfc6bed87ef39b93f39b6bd4dea2a4b89759e1a77e64786f7d3c9ce12e6e7091ca71c3576afb000000000000000000", @ANYRES32, @ANYRES32=0x0, @ANYRESHEX=r1, @ANYRESDEC=r2], 0x5, 0x1) wait4(r1, 0x0, 0x40000000, &(0x7f0000000200)) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/tty/drivers\x00', 0x0, 0x0) read(r3, &(0x7f0000000280)=""/152, 0x20000318) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/tty/drivers\x00', 0x0, 0x0) read(r4, &(0x7f0000000280)=""/152, 0x20000318) ioctl$VIDIOC_QUERYBUF(r3, 0xc0585609, &(0x7f00000002c0)={0x0, 0x0, 0x4, 0x63d263814f78ec42, 0x401, {0x0, 0x2710}, {0x3, 0xc, 0x6, 0x0, 0x3, 0x9, "878b2cbe"}, 0x3, 0xb, @offset=0x8000, 0x400, 0x0, r4}) setsockopt$RDS_RECVERR(r5, 0x114, 0x5, &(0x7f0000000100), 0x4) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r6 = syz_open_dev$dri(&(0x7f00000001c0)='/dev/dri/card#\x00', 0x1, 0x0) mount(&(0x7f00000000c0)=ANY=[@ANYPTR64=&(0x7f0000000740)=ANY=[@ANYRESHEX=0x0, @ANYPTR, @ANYPTR64, @ANYBLOB="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", @ANYRESHEX=0x0, @ANYPTR64, @ANYRESHEX=r6, @ANYRES16=r0]], &(0x7f0000000180)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) [ 583.686096][ T5950] bond145: (slave veth465): Enslaving as an active interface with an up link [ 583.712356][ T5946] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. 02:12:55 executing program 3: r0 = socket$inet(0xa, 0x801, 0x84) sendto(r0, &(0x7f0000000080)="f5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r0, 0xfc0004) accept(r0, 0x0, 0x0) r1 = socket$inet(0xa, 0x801, 0x84) sendto(r1, &(0x7f0000000080)="d5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r1, 0xfc0004) accept(r1, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x4) writev(r2, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d36020a8447000b4e230f00000000a2bc5603ca00000f7f89000000200000040001ff0000000309ff5bffff00c7e5ed5e232e725839c97b910000", 0x104}], 0x1) [ 583.857487][ T5950] bond145: (slave veth467): Enslaving as an active interface with an up link [ 583.888804][ T5962] ceph: No path or : separator in source 02:12:55 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=ANY=[@ANYBLOB="3c00000010008506000000000000000000200000", @ANYRES32=r3, @ANYBLOB="fe000000000000001c0012000c000100626f6e6400000c0002000800010004000000b8aaf229d19e07fa27e19cdb41f3c39e1c530c8a20b6a9fe127726c243d7f374621b469127371bf17de09220927367b4f1296344846c3bc446955ce991bf484e3dd09935b91aa4de8a507f572a73649c4f95d6d7f9314a580c324bd6a406d53aae87a12b4588407e8ff59d05817ca2a9a3c5649653ffcca5e348e8af4e31c68b5e33d1bddafd3852cf3a31ea0c2843f7e1ff56d00261a99131dd98230bccf89e843da42c421f16c4a0f8a5a3966189d9c8b0eae35b2ae281fd146388a6beb30330de35293082f09e52361f2ba9acfc2677b569368a3f32dfc40b2ea49cfd1b1da4cddabab8889fb2167a7d1b985503375bf58a4f1f0983a1fc18f0b8a974b3372341c1ad56f39e69212b2074e9b3e90000"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000540)={0x0, 0xfffe, &(0x7f0000000200)={&(0x7f00000008c0)=@newlink={0x50, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x50}}, 0x0) 02:12:55 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r2 = gettid() process_vm_writev(r2, &(0x7f0000c22000)=[{&(0x7f000034afa4)=""/1, 0x1f80}], 0x2eb, &(0x7f0000c22fa0)=[{&(0x7f0000000080)=""/1, 0x2034afa5}], 0x1, 0x0) [ 584.049092][ T5962] ceph: No path or : separator in source 02:12:55 executing program 3: r0 = socket$inet(0xa, 0x801, 0x84) sendto(r0, &(0x7f0000000080)="f5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r0, 0xfc0004) accept(r0, 0x0, 0x0) r1 = socket$inet(0xa, 0x801, 0x84) sendto(r1, &(0x7f0000000080)="d5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r1, 0xfc0004) accept(r1, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x4) writev(r2, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d36020a8447000b4e230f00000000a2bc5603ca00000f7f89000000200000070001ff0000000309ff5bffff00c7e5ed5e232e725839c97b910000", 0x104}], 0x1) [ 584.123897][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 02:12:55 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) get_mempolicy(&(0x7f00000003c0), &(0x7f0000000400), 0x289, &(0x7f0000fef000/0x10000)=nil, 0x2) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="c6566ceda4e3f1c409e9515b62be0157ec2275042709d8548cb34a00665921c0c26bc59a07847331f37bc0ef75a5460fe26079bfc6bed87ef39b93f39b6bd4dea2a4b89759e1a77e64786f7d3c9ce12e6e7091ca71c3576afb000000000000000000", @ANYRES32, @ANYRES32=0x0, @ANYRESHEX=r1, @ANYRESDEC=r2], 0x5, 0x1) wait4(r1, 0x0, 0x40000000, &(0x7f0000000200)) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/tty/drivers\x00', 0x0, 0x0) read(r3, &(0x7f0000000280)=""/152, 0x20000318) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/tty/drivers\x00', 0x0, 0x0) read(r4, &(0x7f0000000280)=""/152, 0x20000318) ioctl$VIDIOC_QUERYBUF(r3, 0xc0585609, &(0x7f00000002c0)={0x0, 0x0, 0x4, 0x63d263814f78ec42, 0x401, {0x0, 0x2710}, {0x3, 0xc, 0x6, 0x0, 0x3, 0x9, "878b2cbe"}, 0x3, 0xb, @offset=0x8000, 0x400, 0x0, r4}) setsockopt$RDS_RECVERR(r5, 0x114, 0x5, &(0x7f0000000100), 0x4) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r6 = syz_open_dev$dri(&(0x7f00000001c0)='/dev/dri/card#\x00', 0x1, 0x0) mount(&(0x7f00000000c0)=ANY=[@ANYPTR64=&(0x7f0000000740)=ANY=[@ANYRESHEX=0x0, @ANYPTR, @ANYPTR64, @ANYBLOB="974d3ab47b3b91beb0f4760669c8618bc33664faf9c8179efd568e4e4b38f30869aefe10a4ccb1c515487e645b4a11d7cd2fb39aa1efca7c1eb441061d2be4c165ca7304c2e94159863dcfcf75da45211fdd143b6c91d52ae9ac6a1c2f8164d8ee5682fc65a93dc45ead4a462d9e16ac3dff144c0fcc7d02fcf3fd3029b264f3550caaab22152365126be74a9ff91547eb273f83f2c2762b17b32d7d91ac013d6f5790d3bc09c1884d8c7f15be223a8c3b4e37186c641bc3501ca145f05e49aae1613402448c49a36a9b0055a9d5cc74edda0087d65f15d71e4e051cad208514ee99b6258f827a895d2eb4407e6b7b7a9d6bcc228e615d78a6a8b2c466d96a48ee2c7a736035e283917293271efdc7cbdf0a647917068ab197eec326359f829087bafd0fd95e5fcf645615f55040a847aab188c52f4dd3f61a15b2edfe22e6221a5b0b256f1d8da1e6b860b7c68213cc1fae88c0e86013d9000085216c3ee1ab6fd509500f038480929e335b4b3bb0150f881b831cc870de6d188bdd45a113989bc9d15fe2893ff94349", @ANYRESHEX=0x0, @ANYPTR64, @ANYRESHEX=r6, @ANYRES16=r0]], &(0x7f0000000180)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) 02:12:55 executing program 3: r0 = socket$inet(0xa, 0x801, 0x84) sendto(r0, &(0x7f0000000080)="f5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r0, 0xfc0004) accept(r0, 0x0, 0x0) r1 = socket$inet(0xa, 0x801, 0x84) sendto(r1, &(0x7f0000000080)="d5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r1, 0xfc0004) accept(r1, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x4) writev(r2, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d36020a8447000b4e230f00000000a2bc5603ca00000f7f89000000200000020101ff0000000309ff5bffff00c7e5ed5e232e725839c97b910000", 0x104}], 0x1) [ 584.440655][ T6087] ceph: No path or : separator in source 02:12:55 executing program 3: r0 = socket$inet(0xa, 0x801, 0x84) sendto(r0, &(0x7f0000000080)="f5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r0, 0xfc0004) accept(r0, 0x0, 0x0) r1 = socket$inet(0xa, 0x801, 0x84) sendto(r1, &(0x7f0000000080)="d5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r1, 0xfc0004) accept(r1, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x4) writev(r2, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d36020a8447000b4e230f00000000a2bc5603ca00000f7f89000000200000040101ff0000000309ff5bffff00c7e5ed5e232e725839c97b910000", 0x104}], 0x1) [ 584.523639][ T6087] ceph: No path or : separator in source 02:12:56 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) get_mempolicy(&(0x7f00000003c0), &(0x7f0000000400), 0x289, &(0x7f0000fef000/0x10000)=nil, 0x2) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="c6566ceda4e3f1c409e9515b62be0157ec2275042709d8548cb34a00665921c0c26bc59a07847331f37bc0ef75a5460fe26079bfc6bed87ef39b93f39b6bd4dea2a4b89759e1a77e64786f7d3c9ce12e6e7091ca71c3576afb000000000000000000", @ANYRES32, @ANYRES32=0x0, @ANYRESHEX=r1, @ANYRESDEC=r2], 0x5, 0x1) wait4(r1, 0x0, 0x40000000, &(0x7f0000000200)) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/tty/drivers\x00', 0x0, 0x0) read(r3, &(0x7f0000000280)=""/152, 0x20000318) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/tty/drivers\x00', 0x0, 0x0) read(r4, &(0x7f0000000280)=""/152, 0x20000318) ioctl$VIDIOC_QUERYBUF(r3, 0xc0585609, &(0x7f00000002c0)={0x0, 0x0, 0x4, 0x63d263814f78ec42, 0x401, {0x0, 0x2710}, {0x3, 0xc, 0x6, 0x0, 0x3, 0x9, "878b2cbe"}, 0x3, 0xb, @offset=0x8000, 0x400, 0x0, r4}) setsockopt$RDS_RECVERR(r5, 0x114, 0x5, &(0x7f0000000100), 0x4) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r6 = syz_open_dev$dri(&(0x7f00000001c0)='/dev/dri/card#\x00', 0x1, 0x0) mount(&(0x7f00000000c0)=ANY=[@ANYPTR64=&(0x7f0000000740)=ANY=[@ANYRESHEX=0x0, @ANYPTR, @ANYPTR64, @ANYBLOB="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", @ANYRESHEX=0x0, @ANYPTR64, @ANYRESHEX=r6, @ANYRES16=r0]], &(0x7f0000000180)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) [ 584.707835][ T6075] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. [ 584.829318][ T6102] ceph: No path or : separator in source [ 584.912268][ T6102] ceph: No path or : separator in source [ 584.917771][ T6077] bond146: (slave veth469): Enslaving as an active interface with an up link 02:12:56 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000003c0)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) syz_open_procfs(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$DRM_IOCTL_SET_MASTER(0xffffffffffffffff, 0x641e) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VHOST_SET_LOG_FD(0xffffffffffffffff, 0x4004af07, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) recvfrom$inet6(r3, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0x0) shutdown(r3, 0x1) r4 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r4, &(0x7f00000000c0), 0xfffffdda, 0x2000000, 0x0, 0x0) [ 584.996818][ T6075] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. 02:12:56 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @remote}}) write$tun(r0, &(0x7f0000000180)={@void, @val={0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, @mpls={[], @ipv6=@icmpv6={0x0, 0x6, "9eef7b", 0x9, 0x3c, 0x0, @remote, @mcast2, {[], @echo_request={0x80, 0x0, 0x0, 0x0, 0x0, "81"}}}}}, 0x3b) 02:12:56 executing program 3: r0 = socket$inet(0xa, 0x801, 0x84) sendto(r0, &(0x7f0000000080)="f5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r0, 0xfc0004) accept(r0, 0x0, 0x0) r1 = socket$inet(0xa, 0x801, 0x84) sendto(r1, &(0x7f0000000080)="d5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r1, 0xfc0004) accept(r1, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x4) writev(r2, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d36020a8447000b4e230f00000000a2bc5603ca00000f7f890000002000000a0101ff0000000309ff5bffff00c7e5ed5e232e725839c97b910000", 0x104}], 0x1) 02:12:56 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) get_mempolicy(&(0x7f00000003c0), &(0x7f0000000400), 0x289, &(0x7f0000fef000/0x10000)=nil, 0x2) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="c6566ceda4e3f1c409e9515b62be0157ec2275042709d8548cb34a00665921c0c26bc59a07847331f37bc0ef75a5460fe26079bfc6bed87ef39b93f39b6bd4dea2a4b89759e1a77e64786f7d3c9ce12e6e7091ca71c3576afb000000000000000000", @ANYRES32, @ANYRES32=0x0, @ANYRESHEX=r1, @ANYRESDEC=r2], 0x5, 0x1) wait4(r1, 0x0, 0x40000000, &(0x7f0000000200)) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/tty/drivers\x00', 0x0, 0x0) read(r3, &(0x7f0000000280)=""/152, 0x20000318) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/tty/drivers\x00', 0x0, 0x0) read(r4, &(0x7f0000000280)=""/152, 0x20000318) ioctl$VIDIOC_QUERYBUF(r3, 0xc0585609, &(0x7f00000002c0)={0x0, 0x0, 0x4, 0x63d263814f78ec42, 0x401, {0x0, 0x2710}, {0x3, 0xc, 0x6, 0x0, 0x3, 0x9, "878b2cbe"}, 0x3, 0xb, @offset=0x8000, 0x400, 0x0, r4}) setsockopt$RDS_RECVERR(r5, 0x114, 0x5, &(0x7f0000000100), 0x4) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r6 = syz_open_dev$dri(&(0x7f00000001c0)='/dev/dri/card#\x00', 0x1, 0x0) mount(&(0x7f00000000c0)=ANY=[@ANYPTR64=&(0x7f0000000740)=ANY=[@ANYRESHEX=0x0, @ANYPTR, @ANYPTR64, @ANYBLOB="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", @ANYRESHEX=0x0, @ANYPTR64, @ANYRESHEX=r6, @ANYRES16=r0]], &(0x7f0000000180)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) [ 585.064385][ T6104] bond146: (slave veth471): Enslaving as an active interface with an up link [ 585.103517][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 02:12:56 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=ANY=[@ANYBLOB="3c00000010008506000000000000000000200000", @ANYRES32=r3, @ANYBLOB="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"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000540)={0x0, 0x1f75f, &(0x7f0000000200)={&(0x7f00000008c0)=@newlink={0x50, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x50}}, 0x0) 02:12:56 executing program 3: r0 = socket$inet(0xa, 0x801, 0x84) sendto(r0, &(0x7f0000000080)="f5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r0, 0xfc0004) accept(r0, 0x0, 0x0) r1 = socket$inet(0xa, 0x801, 0x84) sendto(r1, &(0x7f0000000080)="d5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r1, 0xfc0004) accept(r1, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x4) writev(r2, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d36020a8447000b4e230f00000000a2bc5603ca00000f7f890000002000000e0101ff0000000309ff5bffff00c7e5ed5e232e725839c97b910000", 0x104}], 0x1) [ 585.266977][ T6117] ceph: No path or : separator in source 02:12:56 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r2 = gettid() process_vm_writev(r2, &(0x7f0000c22000)=[{&(0x7f000034afa4)=""/1, 0x1f80}], 0x2ec, &(0x7f0000c22fa0)=[{&(0x7f0000000080)=""/1, 0x2034afa5}], 0x1, 0x0) [ 585.360050][ T6117] ceph: No path or : separator in source 02:12:56 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) get_mempolicy(&(0x7f00000003c0), &(0x7f0000000400), 0x289, &(0x7f0000fef000/0x10000)=nil, 0x2) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="c6566ceda4e3f1c409e9515b62be0157ec2275042709d8548cb34a00665921c0c26bc59a07847331f37bc0ef75a5460fe26079bfc6bed87ef39b93f39b6bd4dea2a4b89759e1a77e64786f7d3c9ce12e6e7091ca71c3576afb000000000000000000", @ANYRES32, @ANYRES32=0x0, @ANYRESHEX=r1, @ANYRESDEC=r2], 0x5, 0x1) wait4(r1, 0x0, 0x40000000, &(0x7f0000000200)) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/tty/drivers\x00', 0x0, 0x0) read(r3, &(0x7f0000000280)=""/152, 0x20000318) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/tty/drivers\x00', 0x0, 0x0) read(r4, &(0x7f0000000280)=""/152, 0x20000318) ioctl$VIDIOC_QUERYBUF(r3, 0xc0585609, &(0x7f00000002c0)={0x0, 0x0, 0x4, 0x63d263814f78ec42, 0x401, {0x0, 0x2710}, {0x3, 0xc, 0x6, 0x0, 0x3, 0x9, "878b2cbe"}, 0x3, 0xb, @offset=0x8000, 0x400, 0x0, r4}) setsockopt$RDS_RECVERR(r5, 0x114, 0x5, &(0x7f0000000100), 0x4) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r6 = syz_open_dev$dri(&(0x7f00000001c0)='/dev/dri/card#\x00', 0x1, 0x0) mount(&(0x7f00000000c0)=ANY=[@ANYPTR64=&(0x7f0000000740)=ANY=[@ANYRESHEX=0x0, @ANYPTR, @ANYPTR64, @ANYBLOB="974d3ab47b3b91beb0f4760669c8618bc33664faf9c8179efd568e4e4b38f30869aefe10a4ccb1c515487e645b4a11d7cd2fb39aa1efca7c1eb441061d2be4c165ca7304c2e94159863dcfcf75da45211fdd143b6c91d52ae9ac6a1c2f816fd8ee5682fc65a93dc45ead4a462d9e16ac3dff144c0fcc7d02fcf3fd3029b264f3550caaab22152365126be74a9ff91547eb273f83f2c2762b17b32d7d91ac013d6f5790d3bc09c1884d8c7f15be223a8c3b4e37186c641bc3501ca145f05e49aae1613402448c49a36a9b0055a9d5cc74edda0087d65f15d71e4e051cad208514ee99b6258f827a895d2eb4407e6b7b7a9d6bcc228e615d78a6a8b2c466d96a48ee2c7a736035e283917293271efdc7cbdf0a647917068ab197eec326359f829087bafd0fd95e5fcf645615f55040a847aab188c52f4dd3f61a15b2edfe22e6221a5b0b256f1d8da1e6b860b7c68213cc1fae88c0e86013d9000085216c3ee1ab6fd509500f038480929e335b4b3bb0150f881b831cc870de6d188bdd45a113989bc9d15fe2893ff94349", @ANYRESHEX=0x0, @ANYPTR64, @ANYRESHEX=r6, @ANYRES16=r0]], &(0x7f0000000180)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) 02:12:56 executing program 3: r0 = socket$inet(0xa, 0x801, 0x84) sendto(r0, &(0x7f0000000080)="f5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r0, 0xfc0004) accept(r0, 0x0, 0x0) r1 = socket$inet(0xa, 0x801, 0x84) sendto(r1, &(0x7f0000000080)="d5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r1, 0xfc0004) accept(r1, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x4) writev(r2, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d36020a8447000b4e230f00000000a2bc5603ca00000f7f890000002000000f0101ff0000000309ff5bffff00c7e5ed5e232e725839c97b910000", 0x104}], 0x1) [ 585.767561][ T6140] ceph: No path or : separator in source 02:12:57 executing program 3: r0 = socket$inet(0xa, 0x801, 0x84) sendto(r0, &(0x7f0000000080)="f5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r0, 0xfc0004) accept(r0, 0x0, 0x0) r1 = socket$inet(0xa, 0x801, 0x84) sendto(r1, &(0x7f0000000080)="d5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r1, 0xfc0004) accept(r1, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x4) writev(r2, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d36020a8447000b4e230f00000000a2bc5603ca00000f7f89000000200000600101ff0000000309ff5bffff00c7e5ed5e232e725839c97b910000", 0x104}], 0x1) 02:12:57 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) get_mempolicy(&(0x7f00000003c0), &(0x7f0000000400), 0x289, &(0x7f0000fef000/0x10000)=nil, 0x2) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="c6566ceda4e3f1c409e9515b62be0157ec2275042709d8548cb34a00665921c0c26bc59a07847331f37bc0ef75a5460fe26079bfc6bed87ef39b93f39b6bd4dea2a4b89759e1a77e64786f7d3c9ce12e6e7091ca71c3576afb000000000000000000", @ANYRES32, @ANYRES32=0x0, @ANYRESHEX=r1, @ANYRESDEC=r2], 0x5, 0x1) wait4(r1, 0x0, 0x40000000, &(0x7f0000000200)) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/tty/drivers\x00', 0x0, 0x0) read(r3, &(0x7f0000000280)=""/152, 0x20000318) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/tty/drivers\x00', 0x0, 0x0) read(r4, &(0x7f0000000280)=""/152, 0x20000318) ioctl$VIDIOC_QUERYBUF(r3, 0xc0585609, &(0x7f00000002c0)={0x0, 0x0, 0x4, 0x63d263814f78ec42, 0x401, {0x0, 0x2710}, {0x3, 0xc, 0x6, 0x0, 0x3, 0x9, "878b2cbe"}, 0x3, 0xb, @offset=0x8000, 0x400, 0x0, r4}) setsockopt$RDS_RECVERR(r5, 0x114, 0x5, &(0x7f0000000100), 0x4) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r6 = syz_open_dev$dri(&(0x7f00000001c0)='/dev/dri/card#\x00', 0x1, 0x0) mount(&(0x7f00000000c0)=ANY=[@ANYPTR64=&(0x7f0000000740)=ANY=[@ANYRESHEX=0x0, @ANYPTR, @ANYPTR64, @ANYBLOB="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", @ANYRESHEX=0x0, @ANYPTR64, @ANYRESHEX=r6, @ANYRES16=r0]], &(0x7f0000000180)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) [ 585.950943][ T6140] ceph: No path or : separator in source 02:12:57 executing program 3: r0 = socket$inet(0xa, 0x801, 0x84) sendto(r0, &(0x7f0000000080)="f5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r0, 0xfc0004) accept(r0, 0x0, 0x0) r1 = socket$inet(0xa, 0x801, 0x84) sendto(r1, &(0x7f0000000080)="d5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r1, 0xfc0004) accept(r1, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x4) writev(r2, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d36020a8447000b4e230f00000000a2bc5603ca00000f7f89000000200000bc0101ff0000000309ff5bffff00c7e5ed5e232e725839c97b910000", 0x104}], 0x1) [ 586.092214][ T6129] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. [ 586.212942][ T6157] ceph: No path or : separator in source [ 586.274975][ T6135] bond147: (slave veth473): Enslaving as an active interface with an up link 02:12:57 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000003c0)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) syz_open_procfs(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$DRM_IOCTL_SET_MASTER(0xffffffffffffffff, 0x641e) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VHOST_SET_LOG_FD(0xffffffffffffffff, 0x4004af07, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) recvfrom$inet6(r3, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0x0) shutdown(r3, 0x1) r4 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r4, &(0x7f00000000c0), 0xfffffdda, 0x3000000, 0x0, 0x0) [ 586.316978][ T6129] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. [ 586.362944][ T6165] bond147: (slave veth475): Enslaving as an active interface with an up link [ 586.406259][ T6157] ceph: No path or : separator in source [ 586.491754][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 02:12:58 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @remote}}) write$tun(r0, &(0x7f0000000180)={@void, @val={0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, @mpls={[], @ipv6=@icmpv6={0x0, 0x6, "9eef7b", 0x9, 0x3c, 0x0, @remote, @mcast2, {[], @echo_request={0x80, 0x0, 0x0, 0x0, 0x0, "81"}}}}}, 0x3b) 02:12:58 executing program 3: r0 = socket$inet(0xa, 0x801, 0x84) sendto(r0, &(0x7f0000000080)="f5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r0, 0xfc0004) accept(r0, 0x0, 0x0) r1 = socket$inet(0xa, 0x801, 0x84) sendto(r1, &(0x7f0000000080)="d5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r1, 0xfc0004) accept(r1, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x4) writev(r2, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d36020a8447000b4e230f00000000a2bc5603ca00000f7f89000000200000000501ff0000000309ff5bffff00c7e5ed5e232e725839c97b910000", 0x104}], 0x1) 02:12:58 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=ANY=[@ANYBLOB="3c00000010008506000000000000000000200000", @ANYRES32=r3, @ANYBLOB="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"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000540)={0x0, 0x1f760, &(0x7f0000000200)={&(0x7f00000008c0)=@newlink={0x50, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x50}}, 0x0) 02:12:58 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) get_mempolicy(&(0x7f00000003c0), &(0x7f0000000400), 0x289, &(0x7f0000fef000/0x10000)=nil, 0x2) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="c6566ceda4e3f1c409e9515b62be0157ec2275042709d8548cb34a00665921c0c26bc59a07847331f37bc0ef75a5460fe26079bfc6bed87ef39b93f39b6bd4dea2a4b89759e1a77e64786f7d3c9ce12e6e7091ca71c3576afb000000000000000000", @ANYRES32, @ANYRES32=0x0, @ANYRESHEX=r1, @ANYRESDEC=r2], 0x5, 0x1) wait4(r1, 0x0, 0x40000000, &(0x7f0000000200)) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/tty/drivers\x00', 0x0, 0x0) read(r3, &(0x7f0000000280)=""/152, 0x20000318) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/tty/drivers\x00', 0x0, 0x0) read(r4, &(0x7f0000000280)=""/152, 0x20000318) ioctl$VIDIOC_QUERYBUF(r3, 0xc0585609, &(0x7f00000002c0)={0x0, 0x0, 0x4, 0x63d263814f78ec42, 0x401, {0x0, 0x2710}, {0x3, 0xc, 0x6, 0x0, 0x3, 0x9, "878b2cbe"}, 0x3, 0xb, @offset=0x8000, 0x400, 0x0, r4}) setsockopt$RDS_RECVERR(r5, 0x114, 0x5, &(0x7f0000000100), 0x4) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r6 = syz_open_dev$dri(&(0x7f00000001c0)='/dev/dri/card#\x00', 0x1, 0x0) mount(&(0x7f00000000c0)=ANY=[@ANYPTR64=&(0x7f0000000740)=ANY=[@ANYRESHEX=0x0, @ANYPTR, @ANYPTR64, @ANYBLOB="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", @ANYRESHEX=0x0, @ANYPTR64, @ANYRESHEX=r6, @ANYRES16=r0]], &(0x7f0000000180)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) 02:12:58 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r2 = gettid() process_vm_writev(r2, &(0x7f0000c22000)=[{&(0x7f000034afa4)=""/1, 0x1f80}], 0x2ed, &(0x7f0000c22fa0)=[{&(0x7f0000000080)=""/1, 0x2034afa5}], 0x1, 0x0) [ 587.071775][ T6282] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. 02:12:58 executing program 3: r0 = socket$inet(0xa, 0x801, 0x84) sendto(r0, &(0x7f0000000080)="f5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r0, 0xfc0004) accept(r0, 0x0, 0x0) r1 = socket$inet(0xa, 0x801, 0x84) sendto(r1, &(0x7f0000000080)="d5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r1, 0xfc0004) accept(r1, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x4) writev(r2, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d36020a8447000b4e230f00000000a2bc5603ca00000f7f89000000200000004001ff0000000309ff5bffff00c7e5ed5e232e725839c97b910000", 0x104}], 0x1) [ 587.211410][ T6283] ceph: No path or : separator in source [ 587.224373][ T6287] bond148: (slave veth477): Enslaving as an active interface with an up link [ 587.285357][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 587.359575][ T6283] ceph: No path or : separator in source [ 587.384714][ T6282] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. 02:12:58 executing program 3: r0 = socket$inet(0xa, 0x801, 0x84) sendto(r0, &(0x7f0000000080)="f5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r0, 0xfc0004) accept(r0, 0x0, 0x0) r1 = socket$inet(0xa, 0x801, 0x84) sendto(r1, &(0x7f0000000080)="d5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r1, 0xfc0004) accept(r1, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x4) writev(r2, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d36020a8447000b4e230f00000000a2bc5603ca00000f7f89000000200000000201ff0000000309ff5bffff00c7e5ed5e232e725839c97b910000", 0x104}], 0x1) 02:12:58 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) get_mempolicy(&(0x7f00000003c0), &(0x7f0000000400), 0x289, &(0x7f0000fef000/0x10000)=nil, 0x2) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="c6566ceda4e3f1c409e9515b62be0157ec2275042709d8548cb34a00665921c0c26bc59a07847331f37bc0ef75a5460fe26079bfc6bed87ef39b93f39b6bd4dea2a4b89759e1a77e64786f7d3c9ce12e6e7091ca71c3576afb000000000000000000", @ANYRES32, @ANYRES32=0x0, @ANYRESHEX=r1, @ANYRESDEC=r2], 0x5, 0x1) wait4(r1, 0x0, 0x40000000, &(0x7f0000000200)) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/tty/drivers\x00', 0x0, 0x0) read(r3, &(0x7f0000000280)=""/152, 0x20000318) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/tty/drivers\x00', 0x0, 0x0) read(r4, &(0x7f0000000280)=""/152, 0x20000318) ioctl$VIDIOC_QUERYBUF(r3, 0xc0585609, &(0x7f00000002c0)={0x0, 0x0, 0x4, 0x63d263814f78ec42, 0x401, {0x0, 0x2710}, {0x3, 0xc, 0x6, 0x0, 0x3, 0x9, "878b2cbe"}, 0x3, 0xb, @offset=0x8000, 0x400, 0x0, r4}) setsockopt$RDS_RECVERR(r5, 0x114, 0x5, &(0x7f0000000100), 0x4) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r6 = syz_open_dev$dri(&(0x7f00000001c0)='/dev/dri/card#\x00', 0x1, 0x0) mount(&(0x7f00000000c0)=ANY=[@ANYPTR64=&(0x7f0000000740)=ANY=[@ANYRESHEX=0x0, @ANYPTR, @ANYPTR64, @ANYBLOB="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", @ANYRESHEX=0x0, @ANYPTR64, @ANYRESHEX=r6, @ANYRES16=r0]], &(0x7f0000000180)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) 02:12:58 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000003c0)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) syz_open_procfs(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$DRM_IOCTL_SET_MASTER(0xffffffffffffffff, 0x641e) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VHOST_SET_LOG_FD(0xffffffffffffffff, 0x4004af07, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) recvfrom$inet6(r3, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0x0) shutdown(r3, 0x1) r4 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r4, &(0x7f00000000c0), 0xfffffdda, 0x4000000, 0x0, 0x0) 02:12:59 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=ANY=[@ANYBLOB="3c00000010008506000000000000000000200000", @ANYRES32=r3, @ANYBLOB="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"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000540)={0x0, 0x1f761, &(0x7f0000000200)={&(0x7f00000008c0)=@newlink={0x50, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x50}}, 0x0) [ 587.651712][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 02:12:59 executing program 3: r0 = socket$inet(0xa, 0x801, 0x84) sendto(r0, &(0x7f0000000080)="f5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r0, 0xfc0004) accept(r0, 0x0, 0x0) r1 = socket$inet(0xa, 0x801, 0x84) sendto(r1, &(0x7f0000000080)="d5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r1, 0xfc0004) accept(r1, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x4) writev(r2, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d36020a8447000b4e230f00000000a2bc5603ca00000f7f89000000200000000401ff0000000309ff5bffff00c7e5ed5e232e725839c97b910000", 0x104}], 0x1) [ 587.695373][ T6407] ceph: No path or : separator in source [ 587.808150][ T6416] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. 02:12:59 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @remote}}) write$tun(r0, &(0x7f0000000180)={@void, @val={0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, @mpls={[], @ipv6=@icmpv6={0x0, 0x6, "9eef7b", 0x9, 0x3c, 0x0, @remote, @mcast2, {[], @echo_request={0x80, 0x0, 0x0, 0x0, 0x0, "81"}}}}}, 0x3b) [ 587.868379][ T6407] ceph: No path or : separator in source 02:12:59 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) get_mempolicy(&(0x7f00000003c0), &(0x7f0000000400), 0x289, &(0x7f0000fef000/0x10000)=nil, 0x2) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="c6566ceda4e3f1c409e9515b62be0157ec2275042709d8548cb34a00665921c0c26bc59a07847331f37bc0ef75a5460fe26079bfc6bed87ef39b93f39b6bd4dea2a4b89759e1a77e64786f7d3c9ce12e6e7091ca71c3576afb000000000000000000", @ANYRES32, @ANYRES32=0x0, @ANYRESHEX=r1, @ANYRESDEC=r2], 0x5, 0x1) wait4(r1, 0x0, 0x40000000, &(0x7f0000000200)) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/tty/drivers\x00', 0x0, 0x0) read(r3, &(0x7f0000000280)=""/152, 0x20000318) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/tty/drivers\x00', 0x0, 0x0) read(r4, &(0x7f0000000280)=""/152, 0x20000318) ioctl$VIDIOC_QUERYBUF(r3, 0xc0585609, &(0x7f00000002c0)={0x0, 0x0, 0x4, 0x63d263814f78ec42, 0x401, {0x0, 0x2710}, {0x3, 0xc, 0x6, 0x0, 0x3, 0x9, "878b2cbe"}, 0x3, 0xb, @offset=0x8000, 0x400, 0x0, r4}) setsockopt$RDS_RECVERR(r5, 0x114, 0x5, &(0x7f0000000100), 0x4) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r6 = syz_open_dev$dri(&(0x7f00000001c0)='/dev/dri/card#\x00', 0x1, 0x0) mount(&(0x7f00000000c0)=ANY=[@ANYPTR64=&(0x7f0000000740)=ANY=[@ANYRESHEX=0x0, @ANYPTR, @ANYPTR64, @ANYBLOB="974d3ab47b3b91beb0f4760669c8618bc33664faf9c8179efd568e4e4b38f30869aefe10a4ccb1c515487e645b4a11d7cd2fb39aa1efca7c1eb441061d2be4c165ca7304c2e94159863dcfcf75da45211fdd143b6c91d52ae9ac6a1c2f8173d8ee4282fc65a93dc45ead4a462d9e16ac3dff144c0fcc7d02fcf3fd3029b264f3550caaab22152365126be74a9ff91547eb273f83f2c2762b17b32d7d91ac013d6f5790d3bc09c1884d8c7f15be223a8c3b4e37186c641bc3501ca145f05e49aae1613402448c49a36a9b0055a9d5cc74edda0087d65f15d71e4e051cad208514ee99b6258f827a895d2eb4407e6b7b7a9d6bcc228e615d78a6a8b2c466d96a48ee2c7a736035e283917293271efdc7cbdf0a647917068ab197eec326359f829087bafd0fd95e5fcf645615f55040a847aab188c52f4dd3f61a15b2edfe22e6221a5b0b256f1d8da1e6b860b7c68213cc1fae88c0e86013d9000085216c3ee1ab6fd509500f038480929e335b4b3bb0150f881b831cc870de6d188bdd45a113989bc9d15fe2893ff94349", @ANYRESHEX=0x0, @ANYPTR64, @ANYRESHEX=r6, @ANYRES16=r0]], &(0x7f0000000180)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) 02:12:59 executing program 3: r0 = socket$inet(0xa, 0x801, 0x84) sendto(r0, &(0x7f0000000080)="f5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r0, 0xfc0004) accept(r0, 0x0, 0x0) r1 = socket$inet(0xa, 0x801, 0x84) sendto(r1, &(0x7f0000000080)="d5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r1, 0xfc0004) accept(r1, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x4) writev(r2, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d36020a8447000b4e230f00000000a2bc5603ca00000f7f89000000200000000501ff0000000309ff5bffff00c7e5ed5e232e725839c97b910000", 0x104}], 0x1) [ 587.960210][ T6421] bond149: (slave veth481): Enslaving as an active interface with an up link [ 588.255110][ T6431] ceph: No path or : separator in source 02:12:59 executing program 3: r0 = socket$inet(0xa, 0x801, 0x84) sendto(r0, &(0x7f0000000080)="f5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r0, 0xfc0004) accept(r0, 0x0, 0x0) r1 = socket$inet(0xa, 0x801, 0x84) sendto(r1, &(0x7f0000000080)="d5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r1, 0xfc0004) accept(r1, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x4) writev(r2, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d36020a8447000b4e230f00000000a2bc5603ca00000f7f89000000200000000801ff0000000309ff5bffff00c7e5ed5e232e725839c97b910000", 0x104}], 0x1) [ 588.363511][ T6431] ceph: No path or : separator in source 02:12:59 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) get_mempolicy(&(0x7f00000003c0), &(0x7f0000000400), 0x289, &(0x7f0000fef000/0x10000)=nil, 0x2) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="c6566ceda4e3f1c409e9515b62be0157ec2275042709d8548cb34a00665921c0c26bc59a07847331f37bc0ef75a5460fe26079bfc6bed87ef39b93f39b6bd4dea2a4b89759e1a77e64786f7d3c9ce12e6e7091ca71c3576afb000000000000000000", @ANYRES32, @ANYRES32=0x0, @ANYRESHEX=r1, @ANYRESDEC=r2], 0x5, 0x1) wait4(r1, 0x0, 0x40000000, &(0x7f0000000200)) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/tty/drivers\x00', 0x0, 0x0) read(r3, &(0x7f0000000280)=""/152, 0x20000318) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/tty/drivers\x00', 0x0, 0x0) read(r4, &(0x7f0000000280)=""/152, 0x20000318) ioctl$VIDIOC_QUERYBUF(r3, 0xc0585609, &(0x7f00000002c0)={0x0, 0x0, 0x4, 0x63d263814f78ec42, 0x401, {0x0, 0x2710}, {0x3, 0xc, 0x6, 0x0, 0x3, 0x9, "878b2cbe"}, 0x3, 0xb, @offset=0x8000, 0x400, 0x0, r4}) setsockopt$RDS_RECVERR(r5, 0x114, 0x5, &(0x7f0000000100), 0x4) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r6 = syz_open_dev$dri(&(0x7f00000001c0)='/dev/dri/card#\x00', 0x1, 0x0) mount(&(0x7f00000000c0)=ANY=[@ANYPTR64=&(0x7f0000000740)=ANY=[@ANYRESHEX=0x0, @ANYPTR, @ANYPTR64, @ANYBLOB="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", @ANYRESHEX=0x0, @ANYPTR64, @ANYRESHEX=r6, @ANYRES16=r0]], &(0x7f0000000180)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) [ 588.565271][ T6416] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. [ 588.654832][ T6421] bond149: (slave veth483): Enslaving as an active interface with an up link [ 588.690656][ T6448] ceph: No path or : separator in source 02:13:00 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r2 = gettid() process_vm_writev(r2, &(0x7f0000c22000)=[{&(0x7f000034afa4)=""/1, 0x1f80}], 0x2ee, &(0x7f0000c22fa0)=[{&(0x7f0000000080)=""/1, 0x2034afa5}], 0x1, 0x0) 02:13:00 executing program 3: r0 = socket$inet(0xa, 0x801, 0x84) sendto(r0, &(0x7f0000000080)="f5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r0, 0xfc0004) accept(r0, 0x0, 0x0) r1 = socket$inet(0xa, 0x801, 0x84) sendto(r1, &(0x7f0000000080)="d5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r1, 0xfc0004) accept(r1, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x4) writev(r2, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d36020a8447000b4e230f00000000a2bc5603ca00000f7f89000000200000000102ff0000000309ff5bffff00c7e5ed5e232e725839c97b910000", 0x104}], 0x1) 02:13:00 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=ANY=[@ANYBLOB="3c00000010008506000000000000000000200000", @ANYRES32=r3, @ANYBLOB="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"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000540)={0x0, 0x1f762, &(0x7f0000000200)={&(0x7f00000008c0)=@newlink={0x50, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x50}}, 0x0) 02:13:00 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000003c0)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) syz_open_procfs(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$DRM_IOCTL_SET_MASTER(0xffffffffffffffff, 0x641e) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VHOST_SET_LOG_FD(0xffffffffffffffff, 0x4004af07, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) recvfrom$inet6(r3, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0x0) shutdown(r3, 0x1) r4 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r4, &(0x7f00000000c0), 0xfffffdda, 0x5000000, 0x0, 0x0) [ 588.874452][ T6448] ceph: No path or : separator in source 02:13:00 executing program 3: r0 = socket$inet(0xa, 0x801, 0x84) sendto(r0, &(0x7f0000000080)="f5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r0, 0xfc0004) accept(r0, 0x0, 0x0) r1 = socket$inet(0xa, 0x801, 0x84) sendto(r1, &(0x7f0000000080)="d5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r1, 0xfc0004) accept(r1, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x4) writev(r2, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d36020a8447000b4e230f00000000a2bc5603ca00000f7f89000000200000000104ff0000000309ff5bffff00c7e5ed5e232e725839c97b910000", 0x104}], 0x1) [ 588.966214][ T6564] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. [ 589.033678][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 02:13:00 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) get_mempolicy(&(0x7f00000003c0), &(0x7f0000000400), 0x289, &(0x7f0000fef000/0x10000)=nil, 0x2) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="c6566ceda4e3f1c409e9515b62be0157ec2275042709d8548cb34a00665921c0c26bc59a07847331f37bc0ef75a5460fe26079bfc6bed87ef39b93f39b6bd4dea2a4b89759e1a77e64786f7d3c9ce12e6e7091ca71c3576afb000000000000000000", @ANYRES32, @ANYRES32=0x0, @ANYRESHEX=r1, @ANYRESDEC=r2], 0x5, 0x1) wait4(r1, 0x0, 0x40000000, &(0x7f0000000200)) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/tty/drivers\x00', 0x0, 0x0) read(r3, &(0x7f0000000280)=""/152, 0x20000318) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/tty/drivers\x00', 0x0, 0x0) read(r4, &(0x7f0000000280)=""/152, 0x20000318) ioctl$VIDIOC_QUERYBUF(r3, 0xc0585609, &(0x7f00000002c0)={0x0, 0x0, 0x4, 0x63d263814f78ec42, 0x401, {0x0, 0x2710}, {0x3, 0xc, 0x6, 0x0, 0x3, 0x9, "878b2cbe"}, 0x3, 0xb, @offset=0x8000, 0x400, 0x0, r4}) setsockopt$RDS_RECVERR(r5, 0x114, 0x5, &(0x7f0000000100), 0x4) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r6 = syz_open_dev$dri(&(0x7f00000001c0)='/dev/dri/card#\x00', 0x1, 0x0) mount(&(0x7f00000000c0)=ANY=[@ANYPTR64=&(0x7f0000000740)=ANY=[@ANYRESHEX=0x0, @ANYPTR, @ANYPTR64, @ANYBLOB="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", @ANYRESHEX=0x0, @ANYPTR64, @ANYRESHEX=r6, @ANYRES16=r0]], &(0x7f0000000180)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) 02:13:00 executing program 3: r0 = socket$inet(0xa, 0x801, 0x84) sendto(r0, &(0x7f0000000080)="f5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r0, 0xfc0004) accept(r0, 0x0, 0x0) r1 = socket$inet(0xa, 0x801, 0x84) sendto(r1, &(0x7f0000000080)="d5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r1, 0xfc0004) accept(r1, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x4) writev(r2, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d36020a8447000b4e230f00000000a2bc5603ca00000f7f89000000200000000105ff0000000309ff5bffff00c7e5ed5e232e725839c97b910000", 0x104}], 0x1) [ 589.437595][ T6566] bond150: (slave veth485): Enslaving as an active interface with an up link [ 589.473017][ T6579] ceph: No path or : separator in source 02:13:00 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @remote}}) write$tun(r0, &(0x7f0000000180)={@void, @val={0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, @mpls={[], @ipv6=@icmpv6={0x0, 0x6, "9eef7b", 0x9, 0x3c, 0x0, @remote, @mcast2, {[], @echo_request={0x80, 0x0, 0x0, 0x0, 0x0, "81"}}}}}, 0x3b) 02:13:00 executing program 3: r0 = socket$inet(0xa, 0x801, 0x84) sendto(r0, &(0x7f0000000080)="f5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r0, 0xfc0004) accept(r0, 0x0, 0x0) r1 = socket$inet(0xa, 0x801, 0x84) sendto(r1, &(0x7f0000000080)="d5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r1, 0xfc0004) accept(r1, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x4) writev(r2, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d36020a8447000b4e230f00000000a2bc5603ca00000f7f89000000200000000108ff0000000309ff5bffff00c7e5ed5e232e725839c97b910000", 0x104}], 0x1) [ 589.560253][ T6566] bond150: (slave veth487): Enslaving as an active interface with an up link [ 589.578802][ T6564] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. 02:13:01 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=ANY=[@ANYBLOB="3c00000010008506000000000000000000200000", @ANYRES32=r3, @ANYBLOB="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"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000540)={0x0, 0x1f763, &(0x7f0000000200)={&(0x7f00000008c0)=@newlink={0x50, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x50}}, 0x0) [ 589.690897][ T6579] ceph: No path or : separator in source 02:13:01 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) get_mempolicy(&(0x7f00000003c0), &(0x7f0000000400), 0x289, &(0x7f0000fef000/0x10000)=nil, 0x2) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="c6566ceda4e3f1c409e9515b62be0157ec2275042709d8548cb34a00665921c0c26bc59a07847331f37bc0ef75a5460fe26079bfc6bed87ef39b93f39b6bd4dea2a4b89759e1a77e64786f7d3c9ce12e6e7091ca71c3576afb000000000000000000", @ANYRES32, @ANYRES32=0x0, @ANYRESHEX=r1, @ANYRESDEC=r2], 0x5, 0x1) wait4(r1, 0x0, 0x40000000, &(0x7f0000000200)) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/tty/drivers\x00', 0x0, 0x0) read(r3, &(0x7f0000000280)=""/152, 0x20000318) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/tty/drivers\x00', 0x0, 0x0) read(r4, &(0x7f0000000280)=""/152, 0x20000318) ioctl$VIDIOC_QUERYBUF(r3, 0xc0585609, &(0x7f00000002c0)={0x0, 0x0, 0x4, 0x63d263814f78ec42, 0x401, {0x0, 0x2710}, {0x3, 0xc, 0x6, 0x0, 0x3, 0x9, "878b2cbe"}, 0x3, 0xb, @offset=0x8000, 0x400, 0x0, r4}) setsockopt$RDS_RECVERR(r5, 0x114, 0x5, &(0x7f0000000100), 0x4) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r6 = syz_open_dev$dri(&(0x7f00000001c0)='/dev/dri/card#\x00', 0x1, 0x0) mount(&(0x7f00000000c0)=ANY=[@ANYPTR64=&(0x7f0000000740)=ANY=[@ANYRESHEX=0x0, @ANYPTR, @ANYPTR64, @ANYBLOB="974d3ab47b3b91beb0f4760669c8618bc33664faf9c8179efd568e4e4b38f30869aefe10a4ccb1c515487e645b4a11d7cd2fb39aa1efca7c1eb441061d2be4c165ca7304c2e94159863dcfcf75da45211fdd143b6c91d52ae9ac6a1c2f8173d8ee4582fc65a93dc45ead4a462d9e16ac3dff144c0fcc7d02fcf3fd3029b264f3550caaab22152365126be74a9ff91547eb273f83f2c2762b17b32d7d91ac013d6f5790d3bc09c1884d8c7f15be223a8c3b4e37186c641bc3501ca145f05e49aae1613402448c49a36a9b0055a9d5cc74edda0087d65f15d71e4e051cad208514ee99b6258f827a895d2eb4407e6b7b7a9d6bcc228e615d78a6a8b2c466d96a48ee2c7a736035e283917293271efdc7cbdf0a647917068ab197eec326359f829087bafd0fd95e5fcf645615f55040a847aab188c52f4dd3f61a15b2edfe22e6221a5b0b256f1d8da1e6b860b7c68213cc1fae88c0e86013d9000085216c3ee1ab6fd509500f038480929e335b4b3bb0150f881b831cc870de6d188bdd45a113989bc9d15fe2893ff94349", @ANYRESHEX=0x0, @ANYPTR64, @ANYRESHEX=r6, @ANYRES16=r0]], &(0x7f0000000180)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) [ 589.838342][ T6594] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. 02:13:01 executing program 3: r0 = socket$inet(0xa, 0x801, 0x84) sendto(r0, &(0x7f0000000080)="f5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r0, 0xfc0004) accept(r0, 0x0, 0x0) r1 = socket$inet(0xa, 0x801, 0x84) sendto(r1, &(0x7f0000000080)="d5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r1, 0xfc0004) accept(r1, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x4) writev(r2, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d36020a8447000b4e230f00000000a2bc5603ca00000f7f89000000200000000101ff0000000109ff5bffff00c7e5ed5e232e725839c97b910000", 0x104}], 0x1) [ 590.009864][ T6603] ceph: No path or : separator in source [ 590.101219][ T6601] bond151: (slave veth489): Enslaving as an active interface with an up link [ 590.146385][ T6601] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. [ 590.161042][ T6603] ceph: No path or : separator in source 02:13:01 executing program 3: r0 = socket$inet(0xa, 0x801, 0x84) sendto(r0, &(0x7f0000000080)="f5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r0, 0xfc0004) accept(r0, 0x0, 0x0) r1 = socket$inet(0xa, 0x801, 0x84) sendto(r1, &(0x7f0000000080)="d5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r1, 0xfc0004) accept(r1, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x4) writev(r2, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d36020a8447000b4e230f00000000a2bc5603ca00000f7f89000000200000000101ff0200000309ff5bffff00c7e5ed5e232e725839c97b910000", 0x104}], 0x1) 02:13:01 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r2 = gettid() process_vm_writev(r2, &(0x7f0000c22000)=[{&(0x7f000034afa4)=""/1, 0x1f80}], 0x2ef, &(0x7f0000c22fa0)=[{&(0x7f0000000080)=""/1, 0x2034afa5}], 0x1, 0x0) 02:13:01 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000003c0)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) syz_open_procfs(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$DRM_IOCTL_SET_MASTER(0xffffffffffffffff, 0x641e) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VHOST_SET_LOG_FD(0xffffffffffffffff, 0x4004af07, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) recvfrom$inet6(r3, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0x0) shutdown(r3, 0x1) r4 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r4, &(0x7f00000000c0), 0xfffffdda, 0x6000000, 0x0, 0x0) 02:13:01 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) get_mempolicy(&(0x7f00000003c0), &(0x7f0000000400), 0x289, &(0x7f0000fef000/0x10000)=nil, 0x2) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="c6566ceda4e3f1c409e9515b62be0157ec2275042709d8548cb34a00665921c0c26bc59a07847331f37bc0ef75a5460fe26079bfc6bed87ef39b93f39b6bd4dea2a4b89759e1a77e64786f7d3c9ce12e6e7091ca71c3576afb000000000000000000", @ANYRES32, @ANYRES32=0x0, @ANYRESHEX=r1, @ANYRESDEC=r2], 0x5, 0x1) wait4(r1, 0x0, 0x40000000, &(0x7f0000000200)) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/tty/drivers\x00', 0x0, 0x0) read(r3, &(0x7f0000000280)=""/152, 0x20000318) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/tty/drivers\x00', 0x0, 0x0) read(r4, &(0x7f0000000280)=""/152, 0x20000318) ioctl$VIDIOC_QUERYBUF(r3, 0xc0585609, &(0x7f00000002c0)={0x0, 0x0, 0x4, 0x63d263814f78ec42, 0x401, {0x0, 0x2710}, {0x3, 0xc, 0x6, 0x0, 0x3, 0x9, "878b2cbe"}, 0x3, 0xb, @offset=0x8000, 0x400, 0x0, r4}) setsockopt$RDS_RECVERR(r5, 0x114, 0x5, &(0x7f0000000100), 0x4) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r6 = syz_open_dev$dri(&(0x7f00000001c0)='/dev/dri/card#\x00', 0x1, 0x0) mount(&(0x7f00000000c0)=ANY=[@ANYPTR64=&(0x7f0000000740)=ANY=[@ANYRESHEX=0x0, @ANYPTR, @ANYPTR64, @ANYBLOB="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", @ANYRESHEX=0x0, @ANYPTR64, @ANYRESHEX=r6, @ANYRES16=r0]], &(0x7f0000000180)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) [ 590.378720][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 02:13:01 executing program 3: r0 = socket$inet(0xa, 0x801, 0x84) sendto(r0, &(0x7f0000000080)="f5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r0, 0xfc0004) accept(r0, 0x0, 0x0) r1 = socket$inet(0xa, 0x801, 0x84) sendto(r1, &(0x7f0000000080)="d5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r1, 0xfc0004) accept(r1, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x4) writev(r2, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d36020a8447000b4e230f00000000a2bc5603ca00000f7f89000000200000000101ff0400000309ff5bffff00c7e5ed5e232e725839c97b910000", 0x104}], 0x1) [ 590.657980][ T6731] ceph: No path or : separator in source 02:13:02 executing program 3: r0 = socket$inet(0xa, 0x801, 0x84) sendto(r0, &(0x7f0000000080)="f5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r0, 0xfc0004) accept(r0, 0x0, 0x0) r1 = socket$inet(0xa, 0x801, 0x84) sendto(r1, &(0x7f0000000080)="d5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r1, 0xfc0004) accept(r1, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x4) writev(r2, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d36020a8447000b4e230f00000000a2bc5603ca00000f7f89000000200000000101ff0a00000309ff5bffff00c7e5ed5e232e725839c97b910000", 0x104}], 0x1) [ 590.737411][ T6731] ceph: No path or : separator in source 02:13:02 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) get_mempolicy(&(0x7f00000003c0), &(0x7f0000000400), 0x289, &(0x7f0000fef000/0x10000)=nil, 0x2) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="c6566ceda4e3f1c409e9515b62be0157ec2275042709d8548cb34a00665921c0c26bc59a07847331f37bc0ef75a5460fe26079bfc6bed87ef39b93f39b6bd4dea2a4b89759e1a77e64786f7d3c9ce12e6e7091ca71c3576afb000000000000000000", @ANYRES32, @ANYRES32=0x0, @ANYRESHEX=r1, @ANYRESDEC=r2], 0x5, 0x1) wait4(r1, 0x0, 0x40000000, &(0x7f0000000200)) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/tty/drivers\x00', 0x0, 0x0) read(r3, &(0x7f0000000280)=""/152, 0x20000318) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/tty/drivers\x00', 0x0, 0x0) read(r4, &(0x7f0000000280)=""/152, 0x20000318) ioctl$VIDIOC_QUERYBUF(r3, 0xc0585609, &(0x7f00000002c0)={0x0, 0x0, 0x4, 0x63d263814f78ec42, 0x401, {0x0, 0x2710}, {0x3, 0xc, 0x6, 0x0, 0x3, 0x9, "878b2cbe"}, 0x3, 0xb, @offset=0x8000, 0x400, 0x0, r4}) setsockopt$RDS_RECVERR(r5, 0x114, 0x5, &(0x7f0000000100), 0x4) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r6 = syz_open_dev$dri(&(0x7f00000001c0)='/dev/dri/card#\x00', 0x1, 0x0) mount(&(0x7f00000000c0)=ANY=[@ANYPTR64=&(0x7f0000000740)=ANY=[@ANYRESHEX=0x0, @ANYPTR, @ANYPTR64, @ANYBLOB="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", @ANYRESHEX=0x0, @ANYPTR64, @ANYRESHEX=r6, @ANYRES16=r0]], &(0x7f0000000180)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) [ 591.026502][ T6745] ceph: No path or : separator in source [ 591.174789][ T6745] ceph: No path or : separator in source 02:13:02 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @remote}}) write$tun(r0, &(0x7f0000000180)={@void, @val={0x0, 0x0, 0x0, 0x0, 0x0, 0x11}, @mpls={[], @ipv6=@icmpv6={0x0, 0x6, "9eef7b", 0x9, 0x3c, 0x0, @remote, @mcast2, {[], @echo_request={0x80, 0x0, 0x0, 0x0, 0x0, "81"}}}}}, 0x3b) 02:13:02 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=ANY=[@ANYBLOB="3c00000010008506000000000000000000200000", @ANYRES32=r3, @ANYBLOB="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"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000540)={0x0, 0x1f764, &(0x7f0000000200)={&(0x7f00000008c0)=@newlink={0x50, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x50}}, 0x0) 02:13:02 executing program 3: r0 = socket$inet(0xa, 0x801, 0x84) sendto(r0, &(0x7f0000000080)="f5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r0, 0xfc0004) accept(r0, 0x0, 0x0) r1 = socket$inet(0xa, 0x801, 0x84) sendto(r1, &(0x7f0000000080)="d5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r1, 0xfc0004) accept(r1, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x4) writev(r2, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d36020a8447000b4e230f00000000a2bc5603ca00000f7f89000000200000000101ff0e00000309ff5bffff00c7e5ed5e232e725839c97b910000", 0x104}], 0x1) 02:13:02 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000003c0)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) syz_open_procfs(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$DRM_IOCTL_SET_MASTER(0xffffffffffffffff, 0x641e) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VHOST_SET_LOG_FD(0xffffffffffffffff, 0x4004af07, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) recvfrom$inet6(r3, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0x0) shutdown(r3, 0x1) r4 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r4, &(0x7f00000000c0), 0xfffffdda, 0x7000000, 0x0, 0x0) 02:13:02 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r2 = gettid() process_vm_writev(r2, &(0x7f0000c22000)=[{&(0x7f000034afa4)=""/1, 0x1f80}], 0x2f0, &(0x7f0000c22fa0)=[{&(0x7f0000000080)=""/1, 0x2034afa5}], 0x1, 0x0) 02:13:02 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) get_mempolicy(&(0x7f00000003c0), &(0x7f0000000400), 0x289, &(0x7f0000fef000/0x10000)=nil, 0x2) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="c6566ceda4e3f1c409e9515b62be0157ec2275042709d8548cb34a00665921c0c26bc59a07847331f37bc0ef75a5460fe26079bfc6bed87ef39b93f39b6bd4dea2a4b89759e1a77e64786f7d3c9ce12e6e7091ca71c3576afb000000000000000000", @ANYRES32, @ANYRES32=0x0, @ANYRESHEX=r1, @ANYRESDEC=r2], 0x5, 0x1) wait4(r1, 0x0, 0x40000000, &(0x7f0000000200)) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/tty/drivers\x00', 0x0, 0x0) read(r3, &(0x7f0000000280)=""/152, 0x20000318) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/tty/drivers\x00', 0x0, 0x0) read(r4, &(0x7f0000000280)=""/152, 0x20000318) ioctl$VIDIOC_QUERYBUF(r3, 0xc0585609, &(0x7f00000002c0)={0x0, 0x0, 0x4, 0x63d263814f78ec42, 0x401, {0x0, 0x2710}, {0x3, 0xc, 0x6, 0x0, 0x3, 0x9, "878b2cbe"}, 0x3, 0xb, @offset=0x8000, 0x400, 0x0, r4}) setsockopt$RDS_RECVERR(r5, 0x114, 0x5, &(0x7f0000000100), 0x4) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r6 = syz_open_dev$dri(&(0x7f00000001c0)='/dev/dri/card#\x00', 0x1, 0x0) mount(&(0x7f00000000c0)=ANY=[@ANYPTR64=&(0x7f0000000740)=ANY=[@ANYRESHEX=0x0, @ANYPTR, @ANYPTR64, @ANYBLOB="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", @ANYRESHEX=0x0, @ANYPTR64, @ANYRESHEX=r6, @ANYRES16=r0]], &(0x7f0000000180)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) [ 591.473847][ T6766] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. [ 591.485100][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 591.570635][ T6764] ceph: No path or : separator in source [ 591.590227][ T6771] bond153: (slave veth493): Enslaving as an active interface with an up link [ 591.606744][ T6766] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. 02:13:03 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=ANY=[@ANYBLOB="3c00000010008506000000000000000000200000", @ANYRES32=r3, @ANYBLOB="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"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000540)={0x0, 0x1f765, &(0x7f0000000200)={&(0x7f00000008c0)=@newlink={0x50, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x50}}, 0x0) [ 591.633150][ T6771] bond153: (slave veth495): Enslaving as an active interface with an up link 02:13:03 executing program 3: r0 = socket$inet(0xa, 0x801, 0x84) sendto(r0, &(0x7f0000000080)="f5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r0, 0xfc0004) accept(r0, 0x0, 0x0) r1 = socket$inet(0xa, 0x801, 0x84) sendto(r1, &(0x7f0000000080)="d5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r1, 0xfc0004) accept(r1, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x4) writev(r2, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d36020a8447000b4e230f00000000a2bc5603ca00000f7f89000000200000000101ff0f00000309ff5bffff00c7e5ed5e232e725839c97b910000", 0x104}], 0x1) 02:13:03 executing program 3: r0 = socket$inet(0xa, 0x801, 0x84) sendto(r0, &(0x7f0000000080)="f5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r0, 0xfc0004) accept(r0, 0x0, 0x0) r1 = socket$inet(0xa, 0x801, 0x84) sendto(r1, &(0x7f0000000080)="d5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r1, 0xfc0004) accept(r1, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x4) writev(r2, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d36020a8447000b4e230f00000000a2bc5603ca00000f7f89000000200000000101ff6000000309ff5bffff00c7e5ed5e232e725839c97b910000", 0x104}], 0x1) [ 591.803363][ T6880] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. [ 591.839946][ T6764] ceph: No path or : separator in source 02:13:03 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) get_mempolicy(&(0x7f00000003c0), &(0x7f0000000400), 0x289, &(0x7f0000fef000/0x10000)=nil, 0x2) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="c6566ceda4e3f1c409e9515b62be0157ec2275042709d8548cb34a00665921c0c26bc59a07847331f37bc0ef75a5460fe26079bfc6bed87ef39b93f39b6bd4dea2a4b89759e1a77e64786f7d3c9ce12e6e7091ca71c3576afb000000000000000000", @ANYRES32, @ANYRES32=0x0, @ANYRESHEX=r1, @ANYRESDEC=r2], 0x5, 0x1) wait4(r1, 0x0, 0x40000000, &(0x7f0000000200)) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/tty/drivers\x00', 0x0, 0x0) read(r3, &(0x7f0000000280)=""/152, 0x20000318) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/tty/drivers\x00', 0x0, 0x0) read(r4, &(0x7f0000000280)=""/152, 0x20000318) ioctl$VIDIOC_QUERYBUF(r3, 0xc0585609, &(0x7f00000002c0)={0x0, 0x0, 0x4, 0x63d263814f78ec42, 0x401, {0x0, 0x2710}, {0x3, 0xc, 0x6, 0x0, 0x3, 0x9, "878b2cbe"}, 0x3, 0xb, @offset=0x8000, 0x400, 0x0, r4}) setsockopt$RDS_RECVERR(r5, 0x114, 0x5, &(0x7f0000000100), 0x4) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r6 = syz_open_dev$dri(&(0x7f00000001c0)='/dev/dri/card#\x00', 0x1, 0x0) mount(&(0x7f00000000c0)=ANY=[@ANYPTR64=&(0x7f0000000740)=ANY=[@ANYRESHEX=0x0, @ANYPTR, @ANYPTR64, @ANYBLOB="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", @ANYRESHEX=0x0, @ANYPTR64, @ANYRESHEX=r6, @ANYRES16=r0]], &(0x7f0000000180)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) 02:13:03 executing program 3: r0 = socket$inet(0xa, 0x801, 0x84) sendto(r0, &(0x7f0000000080)="f5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r0, 0xfc0004) accept(r0, 0x0, 0x0) r1 = socket$inet(0xa, 0x801, 0x84) sendto(r1, &(0x7f0000000080)="d5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r1, 0xfc0004) accept(r1, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x4) writev(r2, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d36020a8447000b4e230f00000000a2bc5603ca00000f7f89000000200000000101ffbc00000309ff5bffff00c7e5ed5e232e725839c97b910000", 0x104}], 0x1) [ 592.129024][ T6883] bond154: (slave veth497): Enslaving as an active interface with an up link [ 592.267554][ T6893] ceph: No path or : separator in source 02:13:03 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @remote}}) write$tun(r0, &(0x7f0000000180)={@void, @val={0x0, 0x0, 0x0, 0x0, 0x0, 0x31}, @mpls={[], @ipv6=@icmpv6={0x0, 0x6, "9eef7b", 0x9, 0x3c, 0x0, @remote, @mcast2, {[], @echo_request={0x80, 0x0, 0x0, 0x0, 0x0, "81"}}}}}, 0x3b) 02:13:03 executing program 3: r0 = socket$inet(0xa, 0x801, 0x84) sendto(r0, &(0x7f0000000080)="f5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r0, 0xfc0004) accept(r0, 0x0, 0x0) r1 = socket$inet(0xa, 0x801, 0x84) sendto(r1, &(0x7f0000000080)="d5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r1, 0xfc0004) accept(r1, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x4) writev(r2, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d36020a8447000b4e230f00000000a2bc5603ca00000f7f89000000200000000101fff000000309ff5bffff00c7e5ed5e232e725839c97b910000", 0x104}], 0x1) [ 592.336553][ T6883] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. 02:13:03 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r2 = gettid() process_vm_writev(r2, &(0x7f0000c22000)=[{&(0x7f000034afa4)=""/1, 0x1f80}], 0x2f1, &(0x7f0000c22fa0)=[{&(0x7f0000000080)=""/1, 0x2034afa5}], 0x1, 0x0) [ 592.472035][ T6893] ceph: No path or : separator in source 02:13:03 executing program 3: r0 = socket$inet(0xa, 0x801, 0x84) sendto(r0, &(0x7f0000000080)="f5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r0, 0xfc0004) accept(r0, 0x0, 0x0) r1 = socket$inet(0xa, 0x801, 0x84) sendto(r1, &(0x7f0000000080)="d5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r1, 0xfc0004) accept(r1, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x4) writev(r2, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d36020a8447000b4e230f00000000a2bc5603ca00000f7f89000000200000000101ff1f04000309ff5bffff00c7e5ed5e232e725839c97b910000", 0x104}], 0x1) 02:13:04 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000003c0)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) syz_open_procfs(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$DRM_IOCTL_SET_MASTER(0xffffffffffffffff, 0x641e) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VHOST_SET_LOG_FD(0xffffffffffffffff, 0x4004af07, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) recvfrom$inet6(r3, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0x0) shutdown(r3, 0x1) r4 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r4, &(0x7f00000000c0), 0xfffffdda, 0x8000000, 0x0, 0x0) 02:13:04 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) get_mempolicy(&(0x7f00000003c0), &(0x7f0000000400), 0x289, &(0x7f0000fef000/0x10000)=nil, 0x2) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="c6566ceda4e3f1c409e9515b62be0157ec2275042709d8548cb34a00665921c0c26bc59a07847331f37bc0ef75a5460fe26079bfc6bed87ef39b93f39b6bd4dea2a4b89759e1a77e64786f7d3c9ce12e6e7091ca71c3576afb000000000000000000", @ANYRES32, @ANYRES32=0x0, @ANYRESHEX=r1, @ANYRESDEC=r2], 0x5, 0x1) wait4(r1, 0x0, 0x40000000, &(0x7f0000000200)) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/tty/drivers\x00', 0x0, 0x0) read(r3, &(0x7f0000000280)=""/152, 0x20000318) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/tty/drivers\x00', 0x0, 0x0) read(r4, &(0x7f0000000280)=""/152, 0x20000318) ioctl$VIDIOC_QUERYBUF(r3, 0xc0585609, &(0x7f00000002c0)={0x0, 0x0, 0x4, 0x63d263814f78ec42, 0x401, {0x0, 0x2710}, {0x3, 0xc, 0x6, 0x0, 0x3, 0x9, "878b2cbe"}, 0x3, 0xb, @offset=0x8000, 0x400, 0x0, r4}) setsockopt$RDS_RECVERR(r5, 0x114, 0x5, &(0x7f0000000100), 0x4) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r6 = syz_open_dev$dri(&(0x7f00000001c0)='/dev/dri/card#\x00', 0x1, 0x0) mount(&(0x7f00000000c0)=ANY=[@ANYPTR64=&(0x7f0000000740)=ANY=[@ANYRESHEX=0x0, @ANYPTR, @ANYPTR64, @ANYBLOB="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", @ANYRESHEX=0x0, @ANYPTR64, @ANYRESHEX=r6, @ANYRES16=r0]], &(0x7f0000000180)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) 02:13:04 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=ANY=[@ANYBLOB="3c00000010008506000000000000000000200000", @ANYRES32=r3, @ANYBLOB="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"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000540)={0x0, 0x1f766, &(0x7f0000000200)={&(0x7f00000008c0)=@newlink={0x50, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x50}}, 0x0) 02:13:04 executing program 3: r0 = socket$inet(0xa, 0x801, 0x84) sendto(r0, &(0x7f0000000080)="f5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r0, 0xfc0004) accept(r0, 0x0, 0x0) r1 = socket$inet(0xa, 0x801, 0x84) sendto(r1, &(0x7f0000000080)="d5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r1, 0xfc0004) accept(r1, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x4) writev(r2, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d36020a8447000b4e230f00000000a2bc5603ca00000f7f89000000200000000101ff000a000309ff5bffff00c7e5ed5e232e725839c97b910000", 0x104}], 0x1) [ 592.826923][ T7027] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. [ 592.841565][ T7022] ceph: No path or : separator in source [ 592.872891][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 02:13:04 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) get_mempolicy(&(0x7f00000003c0), &(0x7f0000000400), 0x289, &(0x7f0000fef000/0x10000)=nil, 0x2) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="c6566ceda4e3f1c409e9515b62be0157ec2275042709d8548cb34a00665921c0c26bc59a07847331f37bc0ef75a5460fe26079bfc6bed87ef39b93f39b6bd4dea2a4b89759e1a77e64786f7d3c9ce12e6e7091ca71c3576afb000000000000000000", @ANYRES32, @ANYRES32=0x0, @ANYRESHEX=r1, @ANYRESDEC=r2], 0x5, 0x1) wait4(r1, 0x0, 0x40000000, &(0x7f0000000200)) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/tty/drivers\x00', 0x0, 0x0) read(r3, &(0x7f0000000280)=""/152, 0x20000318) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/tty/drivers\x00', 0x0, 0x0) read(r4, &(0x7f0000000280)=""/152, 0x20000318) ioctl$VIDIOC_QUERYBUF(r3, 0xc0585609, &(0x7f00000002c0)={0x0, 0x0, 0x4, 0x63d263814f78ec42, 0x401, {0x0, 0x2710}, {0x3, 0xc, 0x6, 0x0, 0x3, 0x9, "878b2cbe"}, 0x3, 0xb, @offset=0x8000, 0x400, 0x0, r4}) setsockopt$RDS_RECVERR(r5, 0x114, 0x5, &(0x7f0000000100), 0x4) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r6 = syz_open_dev$dri(&(0x7f00000001c0)='/dev/dri/card#\x00', 0x1, 0x0) mount(&(0x7f00000000c0)=ANY=[@ANYPTR64=&(0x7f0000000740)=ANY=[@ANYRESHEX=0x0, @ANYPTR, @ANYPTR64, @ANYBLOB="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", @ANYRESHEX=0x0, @ANYPTR64, @ANYRESHEX=r6, @ANYRES16=r0]], &(0x7f0000000180)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) 02:13:04 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @remote}}) write$tun(r0, &(0x7f0000000180)={@void, @val={0x0, 0x0, 0x0, 0x0, 0x0, 0x300}, @mpls={[], @ipv6=@icmpv6={0x0, 0x6, "9eef7b", 0x9, 0x3c, 0x0, @remote, @mcast2, {[], @echo_request={0x80, 0x0, 0x0, 0x0, 0x0, "81"}}}}}, 0x3b) 02:13:04 executing program 3: r0 = socket$inet(0xa, 0x801, 0x84) sendto(r0, &(0x7f0000000080)="f5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r0, 0xfc0004) accept(r0, 0x0, 0x0) r1 = socket$inet(0xa, 0x801, 0x84) sendto(r1, &(0x7f0000000080)="d5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r1, 0xfc0004) accept(r1, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x4) writev(r2, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d36020a8447000b4e230f00000000a2bc5603ca00000f7f89000000200000000101ff000e000309ff5bffff00c7e5ed5e232e725839c97b910000", 0x104}], 0x1) [ 593.008867][ T7039] ceph: No path or : separator in source [ 593.042855][ T7032] bond155: (slave veth501): Enslaving as an active interface with an up link [ 593.116388][ T7032] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. [ 593.272917][ T7045] bond155: (slave veth503): Enslaving as an active interface with an up link [ 593.306376][ T7050] ceph: No path or : separator in source 02:13:04 executing program 3: r0 = socket$inet(0xa, 0x801, 0x84) sendto(r0, &(0x7f0000000080)="f5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r0, 0xfc0004) accept(r0, 0x0, 0x0) r1 = socket$inet(0xa, 0x801, 0x84) sendto(r1, &(0x7f0000000080)="d5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r1, 0xfc0004) accept(r1, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x4) writev(r2, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d36020a8447000b4e230f00000000a2bc5603ca00000f7f89000000200000000101ffc00e000309ff5bffff00c7e5ed5e232e725839c97b910000", 0x104}], 0x1) 02:13:04 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=ANY=[@ANYBLOB="3c00000010008506000000000000000000200000", @ANYRES32=r3, @ANYBLOB="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"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000540)={0x0, 0x1f767, &(0x7f0000000200)={&(0x7f00000008c0)=@newlink={0x50, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x50}}, 0x0) [ 593.474394][ T7050] ceph: No path or : separator in source 02:13:04 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) get_mempolicy(&(0x7f00000003c0), &(0x7f0000000400), 0x289, &(0x7f0000fef000/0x10000)=nil, 0x2) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="c6566ceda4e3f1c409e9515b62be0157ec2275042709d8548cb34a00665921c0c26bc59a07847331f37bc0ef75a5460fe26079bfc6bed87ef39b93f39b6bd4dea2a4b89759e1a77e64786f7d3c9ce12e6e7091ca71c3576afb000000000000000000", @ANYRES32, @ANYRES32=0x0, @ANYRESHEX=r1, @ANYRESDEC=r2], 0x5, 0x1) wait4(r1, 0x0, 0x40000000, &(0x7f0000000200)) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/tty/drivers\x00', 0x0, 0x0) read(r3, &(0x7f0000000280)=""/152, 0x20000318) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/tty/drivers\x00', 0x0, 0x0) read(r4, &(0x7f0000000280)=""/152, 0x20000318) ioctl$VIDIOC_QUERYBUF(r3, 0xc0585609, &(0x7f00000002c0)={0x0, 0x0, 0x4, 0x63d263814f78ec42, 0x401, {0x0, 0x2710}, {0x3, 0xc, 0x6, 0x0, 0x3, 0x9, "878b2cbe"}, 0x3, 0xb, @offset=0x8000, 0x400, 0x0, r4}) setsockopt$RDS_RECVERR(r5, 0x114, 0x5, &(0x7f0000000100), 0x4) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r6 = syz_open_dev$dri(&(0x7f00000001c0)='/dev/dri/card#\x00', 0x1, 0x0) mount(&(0x7f00000000c0)=ANY=[@ANYPTR64=&(0x7f0000000740)=ANY=[@ANYRESHEX=0x0, @ANYPTR, @ANYPTR64, @ANYBLOB="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", @ANYRESHEX=0x0, @ANYPTR64, @ANYRESHEX=r6, @ANYRES16=r0]], &(0x7f0000000180)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) 02:13:04 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r2 = gettid() process_vm_writev(r2, &(0x7f0000c22000)=[{&(0x7f000034afa4)=""/1, 0x1f80}], 0x2f2, &(0x7f0000c22fa0)=[{&(0x7f0000000080)=""/1, 0x2034afa5}], 0x1, 0x0) [ 593.547637][ T7164] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. 02:13:05 executing program 3: r0 = socket$inet(0xa, 0x801, 0x84) sendto(r0, &(0x7f0000000080)="f5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r0, 0xfc0004) accept(r0, 0x0, 0x0) r1 = socket$inet(0xa, 0x801, 0x84) sendto(r1, &(0x7f0000000080)="d5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r1, 0xfc0004) accept(r1, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x4) writev(r2, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d36020a8447000b4e230f00000000a2bc5603ca00000f7f89000000200000000101ff000f000309ff5bffff00c7e5ed5e232e725839c97b910000", 0x104}], 0x1) [ 593.651269][ T7168] bond156: (slave veth505): Enslaving as an active interface with an up link [ 593.685115][ T7164] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. [ 593.753448][ T7168] bond156: (slave veth507): Enslaving as an active interface with an up link 02:13:05 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000003c0)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) syz_open_procfs(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$DRM_IOCTL_SET_MASTER(0xffffffffffffffff, 0x641e) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VHOST_SET_LOG_FD(0xffffffffffffffff, 0x4004af07, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) recvfrom$inet6(r3, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0x0) shutdown(r3, 0x1) r4 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r4, &(0x7f00000000c0), 0xfffffdda, 0x9000000, 0x0, 0x0) 02:13:05 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @remote}}) write$tun(r0, &(0x7f0000000180)={@void, @val={0x0, 0x0, 0x0, 0x0, 0x0, 0x500}, @mpls={[], @ipv6=@icmpv6={0x0, 0x6, "9eef7b", 0x9, 0x3c, 0x0, @remote, @mcast2, {[], @echo_request={0x80, 0x0, 0x0, 0x0, 0x0, "81"}}}}}, 0x3b) 02:13:05 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=ANY=[@ANYBLOB="3c00000010008506000000000000000000200000", @ANYRES32=r3, @ANYBLOB="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"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000540)={0x0, 0x1f768, &(0x7f0000000200)={&(0x7f00000008c0)=@newlink={0x50, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x50}}, 0x0) [ 593.914322][ T7178] ceph: No path or : separator in source 02:13:05 executing program 3: r0 = socket$inet(0xa, 0x801, 0x84) sendto(r0, &(0x7f0000000080)="f5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r0, 0xfc0004) accept(r0, 0x0, 0x0) r1 = socket$inet(0xa, 0x801, 0x84) sendto(r1, &(0x7f0000000080)="d5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r1, 0xfc0004) accept(r1, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x4) writev(r2, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d36020a8447000b4e230f00000000a2bc5603ca00000f7f89000000200000000101ff041f000309ff5bffff00c7e5ed5e232e725839c97b910000", 0x104}], 0x1) [ 594.099933][ T7178] ceph: No path or : separator in source [ 594.109612][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 02:13:05 executing program 3: r0 = socket$inet(0xa, 0x801, 0x84) sendto(r0, &(0x7f0000000080)="f5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r0, 0xfc0004) accept(r0, 0x0, 0x0) r1 = socket$inet(0xa, 0x801, 0x84) sendto(r1, &(0x7f0000000080)="d5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r1, 0xfc0004) accept(r1, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x4) writev(r2, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d36020a8447000b4e230f00000000a2bc5603ca00000f7f89000000200000000101ff003f000309ff5bffff00c7e5ed5e232e725839c97b910000", 0x104}], 0x1) 02:13:05 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) get_mempolicy(&(0x7f00000003c0), &(0x7f0000000400), 0x289, &(0x7f0000fef000/0x10000)=nil, 0x2) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="c6566ceda4e3f1c409e9515b62be0157ec2275042709d8548cb34a00665921c0c26bc59a07847331f37bc0ef75a5460fe26079bfc6bed87ef39b93f39b6bd4dea2a4b89759e1a77e64786f7d3c9ce12e6e7091ca71c3576afb000000000000000000", @ANYRES32, @ANYRES32=0x0, @ANYRESHEX=r1, @ANYRESDEC=r2], 0x5, 0x1) wait4(r1, 0x0, 0x40000000, &(0x7f0000000200)) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/tty/drivers\x00', 0x0, 0x0) read(r3, &(0x7f0000000280)=""/152, 0x20000318) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/tty/drivers\x00', 0x0, 0x0) read(r4, &(0x7f0000000280)=""/152, 0x20000318) ioctl$VIDIOC_QUERYBUF(r3, 0xc0585609, &(0x7f00000002c0)={0x0, 0x0, 0x4, 0x63d263814f78ec42, 0x401, {0x0, 0x2710}, {0x3, 0xc, 0x6, 0x0, 0x3, 0x9, "878b2cbe"}, 0x3, 0xb, @offset=0x8000, 0x400, 0x0, r4}) setsockopt$RDS_RECVERR(r5, 0x114, 0x5, &(0x7f0000000100), 0x4) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r6 = syz_open_dev$dri(&(0x7f00000001c0)='/dev/dri/card#\x00', 0x1, 0x0) mount(&(0x7f00000000c0)=ANY=[@ANYPTR64=&(0x7f0000000740)=ANY=[@ANYRESHEX=0x0, @ANYPTR, @ANYPTR64, @ANYBLOB="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", @ANYRESHEX=0x0, @ANYPTR64, @ANYRESHEX=r6, @ANYRES16=r0]], &(0x7f0000000180)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) 02:13:05 executing program 3: r0 = socket$inet(0xa, 0x801, 0x84) sendto(r0, &(0x7f0000000080)="f5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r0, 0xfc0004) accept(r0, 0x0, 0x0) r1 = socket$inet(0xa, 0x801, 0x84) sendto(r1, &(0x7f0000000080)="d5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r1, 0xfc0004) accept(r1, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x4) writev(r2, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d36020a8447000b4e230f00000000a2bc5603ca00000f7f89000000200000000101ff0060000309ff5bffff00c7e5ed5e232e725839c97b910000", 0x104}], 0x1) [ 594.631295][ T7190] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. [ 594.644180][ T7209] ceph: No path or : separator in source 02:13:06 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) get_mempolicy(&(0x7f00000003c0), &(0x7f0000000400), 0x289, &(0x7f0000fef000/0x10000)=nil, 0x2) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="c6566ceda4e3f1c409e9515b62be0157ec2275042709d8548cb34a00665921c0c26bc59a07847331f37bc0ef75a5460fe26079bfc6bed87ef39b93f39b6bd4dea2a4b89759e1a77e64786f7d3c9ce12e6e7091ca71c3576afb000000000000000000", @ANYRES32, @ANYRES32=0x0, @ANYRESHEX=r1, @ANYRESDEC=r2], 0x5, 0x1) wait4(r1, 0x0, 0x40000000, &(0x7f0000000200)) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/tty/drivers\x00', 0x0, 0x0) read(r3, &(0x7f0000000280)=""/152, 0x20000318) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/tty/drivers\x00', 0x0, 0x0) read(r4, &(0x7f0000000280)=""/152, 0x20000318) ioctl$VIDIOC_QUERYBUF(r3, 0xc0585609, &(0x7f00000002c0)={0x0, 0x0, 0x4, 0x63d263814f78ec42, 0x401, {0x0, 0x2710}, {0x3, 0xc, 0x6, 0x0, 0x3, 0x9, "878b2cbe"}, 0x3, 0xb, @offset=0x8000, 0x400, 0x0, r4}) setsockopt$RDS_RECVERR(r5, 0x114, 0x5, &(0x7f0000000100), 0x4) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r6 = syz_open_dev$dri(&(0x7f00000001c0)='/dev/dri/card#\x00', 0x1, 0x0) mount(&(0x7f00000000c0)=ANY=[@ANYPTR64=&(0x7f0000000740)=ANY=[@ANYRESHEX=0x0, @ANYPTR, @ANYPTR64, @ANYBLOB="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", @ANYRESHEX=0x0, @ANYPTR64, @ANYRESHEX=r6, @ANYRES16=r0]], &(0x7f0000000180)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) [ 594.710820][ T7217] ceph: No path or : separator in source 02:13:06 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r2 = gettid() process_vm_writev(r2, &(0x7f0000c22000)=[{&(0x7f000034afa4)=""/1, 0x1f80}], 0x2f3, &(0x7f0000c22fa0)=[{&(0x7f0000000080)=""/1, 0x2034afa5}], 0x1, 0x0) [ 594.784260][ T7193] bond157: (slave veth509): Enslaving as an active interface with an up link [ 594.874771][ T7222] bond157: (slave veth511): Enslaving as an active interface with an up link 02:13:06 executing program 3: r0 = socket$inet(0xa, 0x801, 0x84) sendto(r0, &(0x7f0000000080)="f5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r0, 0xfc0004) accept(r0, 0x0, 0x0) r1 = socket$inet(0xa, 0x801, 0x84) sendto(r1, &(0x7f0000000080)="d5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r1, 0xfc0004) accept(r1, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x4) writev(r2, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d36020a8447000b4e230f00000000a2bc5603ca00000f7f89000000200000000101ff6a64000309ff5bffff00c7e5ed5e232e725839c97b910000", 0x104}], 0x1) [ 594.924759][ T7224] ceph: No path or : separator in source 02:13:06 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=ANY=[@ANYBLOB="3c00000010008506000000000000000000200000", @ANYRES32=r3, @ANYBLOB="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"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000540)={0x0, 0x1f769, &(0x7f0000000200)={&(0x7f00000008c0)=@newlink={0x50, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x50}}, 0x0) 02:13:06 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000003c0)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) syz_open_procfs(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$DRM_IOCTL_SET_MASTER(0xffffffffffffffff, 0x641e) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VHOST_SET_LOG_FD(0xffffffffffffffff, 0x4004af07, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) recvfrom$inet6(r3, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0x0) shutdown(r3, 0x1) r4 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r4, &(0x7f00000000c0), 0xfffffdda, 0xa000000, 0x0, 0x0) [ 595.016439][ T7221] cgroup: fork rejected by pids controller in /syz1 [ 595.168992][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 595.208645][ T7331] bond158: (slave veth513): Enslaving as an active interface with an up link 02:13:06 executing program 3: r0 = socket$inet(0xa, 0x801, 0x84) sendto(r0, &(0x7f0000000080)="f5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r0, 0xfc0004) accept(r0, 0x0, 0x0) r1 = socket$inet(0xa, 0x801, 0x84) sendto(r1, &(0x7f0000000080)="d5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r1, 0xfc0004) accept(r1, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x4) writev(r2, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d36020a8447000b4e230f00000000a2bc5603ca00000f7f89000000200000000101ff646a000309ff5bffff00c7e5ed5e232e725839c97b910000", 0x104}], 0x1) [ 595.222149][ T7331] __nla_validate_parse: 2 callbacks suppressed [ 595.222161][ T7331] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. [ 595.253648][ T7392] bond158: (slave veth515): Enslaving as an active interface with an up link 02:13:07 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @remote}}) write$tun(r0, &(0x7f0000000180)={@void, @val={0x0, 0x0, 0x0, 0x0, 0x0, 0x600}, @mpls={[], @ipv6=@icmpv6={0x0, 0x6, "9eef7b", 0x9, 0x3c, 0x0, @remote, @mcast2, {[], @echo_request={0x80, 0x0, 0x0, 0x0, 0x0, "81"}}}}}, 0x3b) 02:13:07 executing program 3: r0 = socket$inet(0xa, 0x801, 0x84) sendto(r0, &(0x7f0000000080)="f5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r0, 0xfc0004) accept(r0, 0x0, 0x0) r1 = socket$inet(0xa, 0x801, 0x84) sendto(r1, &(0x7f0000000080)="d5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r1, 0xfc0004) accept(r1, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x4) writev(r2, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d36020a8447000b4e230f00000000a2bc5603ca00000f7f89000000200000000101ff00bc000309ff5bffff00c7e5ed5e232e725839c97b910000", 0x104}], 0x1) 02:13:07 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=ANY=[@ANYBLOB="3c00000010008506000000000000000000200000", @ANYRES32=r3, @ANYBLOB="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"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000540)={0x0, 0x1f76a, &(0x7f0000000200)={&(0x7f00000008c0)=@newlink={0x50, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x50}}, 0x0) 02:13:07 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r2 = gettid() process_vm_writev(r2, &(0x7f0000c22000)=[{&(0x7f000034afa4)=""/1, 0x1f80}], 0x2f4, &(0x7f0000c22fa0)=[{&(0x7f0000000080)=""/1, 0x2034afa5}], 0x1, 0x0) 02:13:07 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) get_mempolicy(&(0x7f00000003c0), &(0x7f0000000400), 0x289, &(0x7f0000fef000/0x10000)=nil, 0x2) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="c6566ceda4e3f1c409e9515b62be0157ec2275042709d8548cb34a00665921c0c26bc59a07847331f37bc0ef75a5460fe26079bfc6bed87ef39b93f39b6bd4dea2a4b89759e1a77e64786f7d3c9ce12e6e7091ca71c3576afb000000000000000000", @ANYRES32, @ANYRES32=0x0, @ANYRESHEX=r1, @ANYRESDEC=r2], 0x5, 0x1) wait4(r1, 0x0, 0x40000000, &(0x7f0000000200)) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/tty/drivers\x00', 0x0, 0x0) read(r3, &(0x7f0000000280)=""/152, 0x20000318) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/tty/drivers\x00', 0x0, 0x0) read(r4, &(0x7f0000000280)=""/152, 0x20000318) ioctl$VIDIOC_QUERYBUF(r3, 0xc0585609, &(0x7f00000002c0)={0x0, 0x0, 0x4, 0x63d263814f78ec42, 0x401, {0x0, 0x2710}, {0x3, 0xc, 0x6, 0x0, 0x3, 0x9, "878b2cbe"}, 0x3, 0xb, @offset=0x8000, 0x400, 0x0, r4}) setsockopt$RDS_RECVERR(r5, 0x114, 0x5, &(0x7f0000000100), 0x4) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r6 = syz_open_dev$dri(&(0x7f00000001c0)='/dev/dri/card#\x00', 0x1, 0x0) mount(&(0x7f00000000c0)=ANY=[@ANYPTR64=&(0x7f0000000740)=ANY=[@ANYRESHEX=0x0, @ANYPTR, @ANYPTR64, @ANYBLOB="974d3ab47b3b91beb0f4760669c8618bc33664faf9c8179efd568e4e4b38f30869aefe10a4ccb1c515487e645b4a11d7cd2fb39aa1efca7c1eb441061d2be4c165ca7304c2e94159863dcfcf75da45211fdd143b6c91d52ae9ac6a1c2f8173d8ee5d82fc65a93dc45ead4a462d9e16ac3dff144c0fcc7d02fcf3fd3029b264f3550caaab22152365126be74a9ff91547eb273f83f2c2762b17b32d7d91ac013d6f5790d3bc09c1884d8c7f15be223a8c3b4e37186c641bc3501ca145f05e49aae1613402448c49a36a9b0055a9d5cc74edda0087d65f15d71e4e051cad208514ee99b6258f827a895d2eb4407e6b7b7a9d6bcc228e615d78a6a8b2c466d96a48ee2c7a736035e283917293271efdc7cbdf0a647917068ab197eec326359f829087bafd0fd95e5fcf645615f55040a847aab188c52f4dd3f61a15b2edfe22e6221a5b0b256f1d8da1e6b860b7c68213cc1fae88c0e86013d9000085216c3ee1ab6fd509500f038480929e335b4b3bb0150f881b831cc870de6d188bdd45a113989bc9d15fe2893ff94349", @ANYRESHEX=0x0, @ANYPTR64, @ANYRESHEX=r6, @ANYRES16=r0]], &(0x7f0000000180)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) [ 595.928603][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 596.067147][ T7464] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. [ 596.123967][ T7458] ceph: No path or : separator in source 02:13:07 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000003c0)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) syz_open_procfs(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$DRM_IOCTL_SET_MASTER(0xffffffffffffffff, 0x641e) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VHOST_SET_LOG_FD(0xffffffffffffffff, 0x4004af07, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) recvfrom$inet6(r3, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0x0) shutdown(r3, 0x1) r4 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r4, &(0x7f00000000c0), 0xfffffdda, 0xb000000, 0x0, 0x0) [ 596.242621][ T7458] ceph: No path or : separator in source 02:13:07 executing program 3: r0 = socket$inet(0xa, 0x801, 0x84) sendto(r0, &(0x7f0000000080)="f5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r0, 0xfc0004) accept(r0, 0x0, 0x0) r1 = socket$inet(0xa, 0x801, 0x84) sendto(r1, &(0x7f0000000080)="d5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r1, 0xfc0004) accept(r1, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x4) writev(r2, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d36020a8447000b4e230f00000000a2bc5603ca00000f7f89000000200000000101ff0ec0000309ff5bffff00c7e5ed5e232e725839c97b910000", 0x104}], 0x1) [ 596.390419][ T7467] bond159: (slave veth517): Enslaving as an active interface with an up link [ 596.435425][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 596.463111][ T7464] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. 02:13:07 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) get_mempolicy(&(0x7f00000003c0), &(0x7f0000000400), 0x289, &(0x7f0000fef000/0x10000)=nil, 0x2) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="c6566ceda4e3f1c409e9515b62be0157ec2275042709d8548cb34a00665921c0c26bc59a07847331f37bc0ef75a5460fe26079bfc6bed87ef39b93f39b6bd4dea2a4b89759e1a77e64786f7d3c9ce12e6e7091ca71c3576afb000000000000000000", @ANYRES32, @ANYRES32=0x0, @ANYRESHEX=r1, @ANYRESDEC=r2], 0x5, 0x1) wait4(r1, 0x0, 0x40000000, &(0x7f0000000200)) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/tty/drivers\x00', 0x0, 0x0) read(r3, &(0x7f0000000280)=""/152, 0x20000318) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/tty/drivers\x00', 0x0, 0x0) read(r4, &(0x7f0000000280)=""/152, 0x20000318) ioctl$VIDIOC_QUERYBUF(r3, 0xc0585609, &(0x7f00000002c0)={0x0, 0x0, 0x4, 0x63d263814f78ec42, 0x401, {0x0, 0x2710}, {0x3, 0xc, 0x6, 0x0, 0x3, 0x9, "878b2cbe"}, 0x3, 0xb, @offset=0x8000, 0x400, 0x0, r4}) setsockopt$RDS_RECVERR(r5, 0x114, 0x5, &(0x7f0000000100), 0x4) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r6 = syz_open_dev$dri(&(0x7f00000001c0)='/dev/dri/card#\x00', 0x1, 0x0) mount(&(0x7f00000000c0)=ANY=[@ANYPTR64=&(0x7f0000000740)=ANY=[@ANYRESHEX=0x0, @ANYPTR, @ANYPTR64, @ANYBLOB="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", @ANYRESHEX=0x0, @ANYPTR64, @ANYRESHEX=r6, @ANYRES16=r0]], &(0x7f0000000180)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) [ 596.578813][ T7467] bond159: (slave veth519): Enslaving as an active interface with an up link 02:13:08 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @remote}}) write$tun(r0, &(0x7f0000000180)={@void, @val={0x0, 0x0, 0x0, 0x0, 0x0, 0x700}, @mpls={[], @ipv6=@icmpv6={0x0, 0x6, "9eef7b", 0x9, 0x3c, 0x0, @remote, @mcast2, {[], @echo_request={0x80, 0x0, 0x0, 0x0, 0x0, "81"}}}}}, 0x3b) 02:13:08 executing program 3: r0 = socket$inet(0xa, 0x801, 0x84) sendto(r0, &(0x7f0000000080)="f5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r0, 0xfc0004) accept(r0, 0x0, 0x0) r1 = socket$inet(0xa, 0x801, 0x84) sendto(r1, &(0x7f0000000080)="d5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r1, 0xfc0004) accept(r1, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x4) writev(r2, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d36020a8447000b4e230f00000000a2bc5603ca00000f7f89000000200000000101ff00f0000309ff5bffff00c7e5ed5e232e725839c97b910000", 0x104}], 0x1) 02:13:08 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=ANY=[@ANYBLOB="3c00000010008506000000000000000000200000", @ANYRES32=r3, @ANYBLOB="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"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000540)={0x0, 0x1f76b, &(0x7f0000000200)={&(0x7f00000008c0)=@newlink={0x50, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x50}}, 0x0) [ 597.005010][ T7586] ceph: No path or : separator in source 02:13:08 executing program 3: r0 = socket$inet(0xa, 0x801, 0x84) sendto(r0, &(0x7f0000000080)="f5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r0, 0xfc0004) accept(r0, 0x0, 0x0) r1 = socket$inet(0xa, 0x801, 0x84) sendto(r1, &(0x7f0000000080)="d5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r1, 0xfc0004) accept(r1, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x4) writev(r2, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d36020a8447000b4e230f00000000a2bc5603ca00000f7f89000000200000000101ff0000000509ff5bffff00c7e5ed5e232e725839c97b910000", 0x104}], 0x1) 02:13:08 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r2 = gettid() process_vm_writev(r2, &(0x7f0000c22000)=[{&(0x7f000034afa4)=""/1, 0x1f80}], 0x2f5, &(0x7f0000c22fa0)=[{&(0x7f0000000080)=""/1, 0x2034afa5}], 0x1, 0x0) 02:13:08 executing program 3: r0 = socket$inet(0xa, 0x801, 0x84) sendto(r0, &(0x7f0000000080)="f5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r0, 0xfc0004) accept(r0, 0x0, 0x0) r1 = socket$inet(0xa, 0x801, 0x84) sendto(r1, &(0x7f0000000080)="d5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r1, 0xfc0004) accept(r1, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x4) writev(r2, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d36020a8447000b4e230f00000000a2bc5603ca00000f7f89000000200000000101ff0000004009ff5bffff00c7e5ed5e232e725839c97b910000", 0x104}], 0x1) 02:13:08 executing program 3: r0 = socket$inet(0xa, 0x801, 0x84) sendto(r0, &(0x7f0000000080)="f5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r0, 0xfc0004) accept(r0, 0x0, 0x0) r1 = socket$inet(0xa, 0x801, 0x84) sendto(r1, &(0x7f0000000080)="d5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r1, 0xfc0004) accept(r1, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x4) writev(r2, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d36020a8447000b4e230f00000000a2bc5603ca00000f7f89000000200000000101ff0002000309ff5bffff00c7e5ed5e232e725839c97b910000", 0x104}], 0x1) [ 597.651078][ T7595] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. 02:13:09 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) get_mempolicy(&(0x7f00000003c0), &(0x7f0000000400), 0x289, &(0x7f0000fef000/0x10000)=nil, 0x2) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="c6566ceda4e3f1c409e9515b62be0157ec2275042709d8548cb34a00665921c0c26bc59a07847331f37bc0ef75a5460fe26079bfc6bed87ef39b93f39b6bd4dea2a4b89759e1a77e64786f7d3c9ce12e6e7091ca71c3576afb000000000000000000", @ANYRES32, @ANYRES32=0x0, @ANYRESHEX=r1, @ANYRESDEC=r2], 0x5, 0x1) wait4(r1, 0x0, 0x40000000, &(0x7f0000000200)) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/tty/drivers\x00', 0x0, 0x0) read(r3, &(0x7f0000000280)=""/152, 0x20000318) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/tty/drivers\x00', 0x0, 0x0) read(r4, &(0x7f0000000280)=""/152, 0x20000318) ioctl$VIDIOC_QUERYBUF(r3, 0xc0585609, &(0x7f00000002c0)={0x0, 0x0, 0x4, 0x63d263814f78ec42, 0x401, {0x0, 0x2710}, {0x3, 0xc, 0x6, 0x0, 0x3, 0x9, "878b2cbe"}, 0x3, 0xb, @offset=0x8000, 0x400, 0x0, r4}) setsockopt$RDS_RECVERR(r5, 0x114, 0x5, &(0x7f0000000100), 0x4) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r6 = syz_open_dev$dri(&(0x7f00000001c0)='/dev/dri/card#\x00', 0x1, 0x0) mount(&(0x7f00000000c0)=ANY=[@ANYPTR64=&(0x7f0000000740)=ANY=[@ANYRESHEX=0x0, @ANYPTR, @ANYPTR64, @ANYBLOB="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", @ANYRESHEX=0x0, @ANYPTR64, @ANYRESHEX=r6, @ANYRES16=r0]], &(0x7f0000000180)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) [ 597.738710][ T7586] ceph: No path or : separator in source [ 597.813893][ T7598] bond160: (slave veth521): Enslaving as an active interface with an up link 02:13:09 executing program 3: r0 = socket$inet(0xa, 0x801, 0x84) sendto(r0, &(0x7f0000000080)="f5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r0, 0xfc0004) accept(r0, 0x0, 0x0) r1 = socket$inet(0xa, 0x801, 0x84) sendto(r1, &(0x7f0000000080)="d5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r1, 0xfc0004) accept(r1, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x4) writev(r2, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d36020a8447000b4e230f00000000a2bc5603ca00000f7f89000000200000000101ff0004000309ff5bffff00c7e5ed5e232e725839c97b910000", 0x104}], 0x1) 02:13:09 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000003c0)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) syz_open_procfs(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$DRM_IOCTL_SET_MASTER(0xffffffffffffffff, 0x641e) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VHOST_SET_LOG_FD(0xffffffffffffffff, 0x4004af07, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) recvfrom$inet6(r3, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0x0) shutdown(r3, 0x1) r4 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r4, &(0x7f00000000c0), 0xfffffdda, 0xc000000, 0x0, 0x0) [ 597.921732][ T7619] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. [ 598.021322][ T7626] ceph: No path or : separator in source 02:13:09 executing program 3: r0 = socket$inet(0xa, 0x801, 0x84) sendto(r0, &(0x7f0000000080)="f5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r0, 0xfc0004) accept(r0, 0x0, 0x0) r1 = socket$inet(0xa, 0x801, 0x84) sendto(r1, &(0x7f0000000080)="d5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r1, 0xfc0004) accept(r1, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x4) writev(r2, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d36020a8447000b4e230f00000000a2bc5603ca00000f7f89000000200000000101ff000a000309ff5bffff00c7e5ed5e232e725839c97b910000", 0x104}], 0x1) [ 598.091304][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 598.111426][ T7620] bond160: (slave veth523): Enslaving as an active interface with an up link [ 598.150895][ T7626] ceph: No path or : separator in source 02:13:09 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=ANY=[@ANYBLOB="3c00000010008506000000000000000000200000", @ANYRES32=r3, @ANYBLOB="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"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000540)={0x0, 0x1f76c, &(0x7f0000000200)={&(0x7f00000008c0)=@newlink={0x50, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x50}}, 0x0) [ 598.347110][ T7745] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. [ 598.508422][ T7748] bond161: (slave veth525): Enslaving as an active interface with an up link [ 598.539312][ T7745] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. [ 598.579007][ T7748] bond161: (slave veth527): Enslaving as an active interface with an up link 02:13:10 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @remote}}) write$tun(r0, &(0x7f0000000180)={@void, @val={0x0, 0x0, 0x0, 0x0, 0x0, 0xe80}, @mpls={[], @ipv6=@icmpv6={0x0, 0x6, "9eef7b", 0x9, 0x3c, 0x0, @remote, @mcast2, {[], @echo_request={0x80, 0x0, 0x0, 0x0, 0x0, "81"}}}}}, 0x3b) 02:13:10 executing program 3: r0 = socket$inet(0xa, 0x801, 0x84) sendto(r0, &(0x7f0000000080)="f5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r0, 0xfc0004) accept(r0, 0x0, 0x0) r1 = socket$inet(0xa, 0x801, 0x84) sendto(r1, &(0x7f0000000080)="d5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r1, 0xfc0004) accept(r1, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x4) writev(r2, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d36020a8447000b4e230f00000000a2bc5603ca00000f7f89000000200000000101ff000e000309ff5bffff00c7e5ed5e232e725839c97b910000", 0x104}], 0x1) 02:13:10 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r2 = gettid() process_vm_writev(r2, &(0x7f0000c22000)=[{&(0x7f000034afa4)=""/1, 0x1f80}], 0x2f6, &(0x7f0000c22fa0)=[{&(0x7f0000000080)=""/1, 0x2034afa5}], 0x1, 0x0) 02:13:10 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) get_mempolicy(&(0x7f00000003c0), &(0x7f0000000400), 0x289, &(0x7f0000fef000/0x10000)=nil, 0x2) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="c6566ceda4e3f1c409e9515b62be0157ec2275042709d8548cb34a00665921c0c26bc59a07847331f37bc0ef75a5460fe26079bfc6bed87ef39b93f39b6bd4dea2a4b89759e1a77e64786f7d3c9ce12e6e7091ca71c3576afb000000000000000000", @ANYRES32, @ANYRES32=0x0, @ANYRESHEX=r1, @ANYRESDEC=r2], 0x5, 0x1) wait4(r1, 0x0, 0x40000000, &(0x7f0000000200)) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/tty/drivers\x00', 0x0, 0x0) read(r3, &(0x7f0000000280)=""/152, 0x20000318) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/tty/drivers\x00', 0x0, 0x0) read(r4, &(0x7f0000000280)=""/152, 0x20000318) ioctl$VIDIOC_QUERYBUF(r3, 0xc0585609, &(0x7f00000002c0)={0x0, 0x0, 0x4, 0x63d263814f78ec42, 0x401, {0x0, 0x2710}, {0x3, 0xc, 0x6, 0x0, 0x3, 0x9, "878b2cbe"}, 0x3, 0xb, @offset=0x8000, 0x400, 0x0, r4}) setsockopt$RDS_RECVERR(r5, 0x114, 0x5, &(0x7f0000000100), 0x4) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r6 = syz_open_dev$dri(&(0x7f00000001c0)='/dev/dri/card#\x00', 0x1, 0x0) mount(&(0x7f00000000c0)=ANY=[@ANYPTR64=&(0x7f0000000740)=ANY=[@ANYRESHEX=0x0, @ANYPTR, @ANYPTR64, @ANYBLOB="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", @ANYRESHEX=0x0, @ANYPTR64, @ANYRESHEX=r6, @ANYRES16=r0]], &(0x7f0000000180)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) 02:13:10 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=ANY=[@ANYBLOB="3c00000010008506000000000000000000200000", @ANYRES32=r3, @ANYBLOB="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"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000540)={0x0, 0x1f76d, &(0x7f0000000200)={&(0x7f00000008c0)=@newlink={0x50, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x50}}, 0x0) [ 598.783806][ T7760] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. 02:13:10 executing program 3: r0 = socket$inet(0xa, 0x801, 0x84) sendto(r0, &(0x7f0000000080)="f5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r0, 0xfc0004) accept(r0, 0x0, 0x0) r1 = socket$inet(0xa, 0x801, 0x84) sendto(r1, &(0x7f0000000080)="d5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r1, 0xfc0004) accept(r1, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x4) writev(r2, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d36020a8447000b4e230f00000000a2bc5603ca00000f7f89000000200000000101ff000f000309ff5bffff00c7e5ed5e232e725839c97b910000", 0x104}], 0x1) [ 598.861130][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 598.897052][ T7761] ceph: No path or : separator in source 02:13:10 executing program 3: r0 = socket$inet(0xa, 0x801, 0x84) sendto(r0, &(0x7f0000000080)="f5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r0, 0xfc0004) accept(r0, 0x0, 0x0) r1 = socket$inet(0xa, 0x801, 0x84) sendto(r1, &(0x7f0000000080)="d5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r1, 0xfc0004) accept(r1, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x4) writev(r2, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d36020a8447000b4e230f00000000a2bc5603ca00000f7f89000000200000000101ff0060000309ff5bffff00c7e5ed5e232e725839c97b910000", 0x104}], 0x1) 02:13:10 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000003c0)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) syz_open_procfs(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$DRM_IOCTL_SET_MASTER(0xffffffffffffffff, 0x641e) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VHOST_SET_LOG_FD(0xffffffffffffffff, 0x4004af07, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) recvfrom$inet6(r3, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0x0) shutdown(r3, 0x1) r4 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r4, &(0x7f00000000c0), 0xfffffdda, 0xd000000, 0x0, 0x0) [ 599.091396][ T7764] bond162: (slave veth529): Enslaving as an active interface with an up link [ 599.187261][ T7761] ceph: No path or : separator in source 02:13:10 executing program 3: r0 = socket$inet(0xa, 0x801, 0x84) sendto(r0, &(0x7f0000000080)="f5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r0, 0xfc0004) accept(r0, 0x0, 0x0) r1 = socket$inet(0xa, 0x801, 0x84) sendto(r1, &(0x7f0000000080)="d5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r1, 0xfc0004) accept(r1, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x4) writev(r2, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d36020a8447000b4e230f00000000a2bc5603ca00000f7f89000000200000000101ff00bc000309ff5bffff00c7e5ed5e232e725839c97b910000", 0x104}], 0x1) 02:13:10 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) get_mempolicy(&(0x7f00000003c0), &(0x7f0000000400), 0x289, &(0x7f0000fef000/0x10000)=nil, 0x2) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="c6566ceda4e3f1c409e9515b62be0157ec2275042709d8548cb34a00665921c0c26bc59a07847331f37bc0ef75a5460fe26079bfc6bed87ef39b93f39b6bd4dea2a4b89759e1a77e64786f7d3c9ce12e6e7091ca71c3576afb000000000000000000", @ANYRES32, @ANYRES32=0x0, @ANYRESHEX=r1, @ANYRESDEC=r2], 0x5, 0x1) wait4(r1, 0x0, 0x40000000, &(0x7f0000000200)) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/tty/drivers\x00', 0x0, 0x0) read(r3, &(0x7f0000000280)=""/152, 0x20000318) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/tty/drivers\x00', 0x0, 0x0) read(r4, &(0x7f0000000280)=""/152, 0x20000318) ioctl$VIDIOC_QUERYBUF(r3, 0xc0585609, &(0x7f00000002c0)={0x0, 0x0, 0x4, 0x63d263814f78ec42, 0x401, {0x0, 0x2710}, {0x3, 0xc, 0x6, 0x0, 0x3, 0x9, "878b2cbe"}, 0x3, 0xb, @offset=0x8000, 0x400, 0x0, r4}) setsockopt$RDS_RECVERR(r5, 0x114, 0x5, &(0x7f0000000100), 0x4) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r6 = syz_open_dev$dri(&(0x7f00000001c0)='/dev/dri/card#\x00', 0x1, 0x0) mount(&(0x7f00000000c0)=ANY=[@ANYPTR64=&(0x7f0000000740)=ANY=[@ANYRESHEX=0x0, @ANYPTR, @ANYPTR64, @ANYBLOB="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", @ANYRESHEX=0x0, @ANYPTR64, @ANYRESHEX=r6, @ANYRES16=r0]], &(0x7f0000000180)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) [ 599.232631][ T7760] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. [ 599.263652][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 599.338020][ T7764] bond162: (slave veth531): Enslaving as an active interface with an up link 02:13:10 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=ANY=[@ANYBLOB="3c00000010008506000000000000000000200000", @ANYRES32=r3, @ANYBLOB="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"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000540)={0x0, 0x1f76e, &(0x7f0000000200)={&(0x7f00000008c0)=@newlink={0x50, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x50}}, 0x0) 02:13:10 executing program 3: r0 = socket$inet(0xa, 0x801, 0x84) sendto(r0, &(0x7f0000000080)="f5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r0, 0xfc0004) accept(r0, 0x0, 0x0) r1 = socket$inet(0xa, 0x801, 0x84) sendto(r1, &(0x7f0000000080)="d5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r1, 0xfc0004) accept(r1, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x4) writev(r2, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d36020a8447000b4e230f00000000a2bc5603ca00000f7f89000000200000000101ff00f0000309ff5bffff00c7e5ed5e232e725839c97b910000", 0x104}], 0x1) [ 599.556269][ T7895] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. [ 599.614657][ T7890] ceph: No path or : separator in source 02:13:11 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @remote}}) write$tun(r0, &(0x7f0000000180)={@void, @val={0x0, 0x0, 0x0, 0x0, 0x0, 0x1100}, @mpls={[], @ipv6=@icmpv6={0x0, 0x6, "9eef7b", 0x9, 0x3c, 0x0, @remote, @mcast2, {[], @echo_request={0x80, 0x0, 0x0, 0x0, 0x0, "81"}}}}}, 0x3b) [ 599.730588][ T7890] ceph: No path or : separator in source [ 599.793833][ T7901] bond163: (slave veth533): Enslaving as an active interface with an up link 02:13:11 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) get_mempolicy(&(0x7f00000003c0), &(0x7f0000000400), 0x289, &(0x7f0000fef000/0x10000)=nil, 0x2) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="c6566ceda4e3f1c409e9515b62be0157ec2275042709d8548cb34a00665921c0c26bc59a07847331f37bc0ef75a5460fe26079bfc6bed87ef39b93f39b6bd4dea2a4b89759e1a77e64786f7d3c9ce12e6e7091ca71c3576afb000000000000000000", @ANYRES32, @ANYRES32=0x0, @ANYRESHEX=r1, @ANYRESDEC=r2], 0x5, 0x1) wait4(r1, 0x0, 0x40000000, &(0x7f0000000200)) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/tty/drivers\x00', 0x0, 0x0) read(r3, &(0x7f0000000280)=""/152, 0x20000318) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/tty/drivers\x00', 0x0, 0x0) read(r4, &(0x7f0000000280)=""/152, 0x20000318) ioctl$VIDIOC_QUERYBUF(r3, 0xc0585609, &(0x7f00000002c0)={0x0, 0x0, 0x4, 0x63d263814f78ec42, 0x401, {0x0, 0x2710}, {0x3, 0xc, 0x6, 0x0, 0x3, 0x9, "878b2cbe"}, 0x3, 0xb, @offset=0x8000, 0x400, 0x0, r4}) setsockopt$RDS_RECVERR(r5, 0x114, 0x5, &(0x7f0000000100), 0x4) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r6 = syz_open_dev$dri(&(0x7f00000001c0)='/dev/dri/card#\x00', 0x1, 0x0) mount(&(0x7f00000000c0)=ANY=[@ANYPTR64=&(0x7f0000000740)=ANY=[@ANYRESHEX=0x0, @ANYPTR, @ANYPTR64, @ANYBLOB="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", @ANYRESHEX=0x0, @ANYPTR64, @ANYRESHEX=r6, @ANYRES16=r0]], &(0x7f0000000180)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) [ 599.987979][ T7895] bond163: (slave veth535): Enslaving as an active interface with an up link 02:13:11 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r2 = gettid() process_vm_writev(r2, &(0x7f0000c22000)=[{&(0x7f000034afa4)=""/1, 0x1f80}], 0x2f7, &(0x7f0000c22fa0)=[{&(0x7f0000000080)=""/1, 0x2034afa5}], 0x1, 0x0) 02:13:11 executing program 3: r0 = socket$inet(0xa, 0x801, 0x84) sendto(r0, &(0x7f0000000080)="f5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r0, 0xfc0004) accept(r0, 0x0, 0x0) r1 = socket$inet(0xa, 0x801, 0x84) sendto(r1, &(0x7f0000000080)="d5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r1, 0xfc0004) accept(r1, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x4) writev(r2, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d36020a8447000b4e230f00000000a2bc5603ca00000f7f89000000200000000101ff001f040309ff5bffff00c7e5ed5e232e725839c97b910000", 0x104}], 0x1) 02:13:11 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=ANY=[@ANYBLOB="3c00000010008506000000000000000000200000", @ANYRES32=r3, @ANYBLOB="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"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000540)={0x0, 0x1f76f, &(0x7f0000000200)={&(0x7f00000008c0)=@newlink={0x50, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x50}}, 0x0) [ 600.170457][ T7964] ceph: No path or : separator in source 02:13:11 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000003c0)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) syz_open_procfs(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$DRM_IOCTL_SET_MASTER(0xffffffffffffffff, 0x641e) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VHOST_SET_LOG_FD(0xffffffffffffffff, 0x4004af07, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) recvfrom$inet6(r3, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0x0) shutdown(r3, 0x1) r4 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r4, &(0x7f00000000c0), 0xfffffdda, 0xe000000, 0x0, 0x0) [ 600.307710][ T8025] __nla_validate_parse: 1 callbacks suppressed [ 600.307722][ T8025] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. 02:13:11 executing program 3: r0 = socket$inet(0xa, 0x801, 0x84) sendto(r0, &(0x7f0000000080)="f5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r0, 0xfc0004) accept(r0, 0x0, 0x0) r1 = socket$inet(0xa, 0x801, 0x84) sendto(r1, &(0x7f0000000080)="d5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r1, 0xfc0004) accept(r1, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x4) writev(r2, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d36020a8447000b4e230f00000000a2bc5603ca00000f7f89000000200000000101ff00000a0309ff5bffff00c7e5ed5e232e725839c97b910000", 0x104}], 0x1) 02:13:11 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @remote}}) write$tun(r0, &(0x7f0000000180)={@void, @val={0x0, 0x0, 0x0, 0x0, 0x0, 0x3100}, @mpls={[], @ipv6=@icmpv6={0x0, 0x6, "9eef7b", 0x9, 0x3c, 0x0, @remote, @mcast2, {[], @echo_request={0x80, 0x0, 0x0, 0x0, 0x0, "81"}}}}}, 0x3b) [ 600.411773][ T7964] ceph: No path or : separator in source [ 600.482636][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 600.664545][ T8033] bond164: (slave veth537): Enslaving as an active interface with an up link 02:13:12 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) get_mempolicy(&(0x7f00000003c0), &(0x7f0000000400), 0x289, &(0x7f0000fef000/0x10000)=nil, 0x2) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="c6566ceda4e3f1c409e9515b62be0157ec2275042709d8548cb34a00665921c0c26bc59a07847331f37bc0ef75a5460fe26079bfc6bed87ef39b93f39b6bd4dea2a4b89759e1a77e64786f7d3c9ce12e6e7091ca71c3576afb000000000000000000", @ANYRES32, @ANYRES32=0x0, @ANYRESHEX=r1, @ANYRESDEC=r2], 0x5, 0x1) wait4(r1, 0x0, 0x40000000, &(0x7f0000000200)) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/tty/drivers\x00', 0x0, 0x0) read(r3, &(0x7f0000000280)=""/152, 0x20000318) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/tty/drivers\x00', 0x0, 0x0) read(r4, &(0x7f0000000280)=""/152, 0x20000318) ioctl$VIDIOC_QUERYBUF(r3, 0xc0585609, &(0x7f00000002c0)={0x0, 0x0, 0x4, 0x63d263814f78ec42, 0x401, {0x0, 0x2710}, {0x3, 0xc, 0x6, 0x0, 0x3, 0x9, "878b2cbe"}, 0x3, 0xb, @offset=0x8000, 0x400, 0x0, r4}) setsockopt$RDS_RECVERR(r5, 0x114, 0x5, &(0x7f0000000100), 0x4) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r6 = syz_open_dev$dri(&(0x7f00000001c0)='/dev/dri/card#\x00', 0x1, 0x0) mount(&(0x7f00000000c0)=ANY=[@ANYPTR64=&(0x7f0000000740)=ANY=[@ANYRESHEX=0x0, @ANYPTR, @ANYPTR64, @ANYBLOB="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", @ANYRESHEX=0x0, @ANYPTR64, @ANYRESHEX=r6, @ANYRES16=r0]], &(0x7f0000000180)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) [ 600.726645][ T8025] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. [ 600.866450][ T8033] bond164: (slave veth539): Enslaving as an active interface with an up link 02:13:12 executing program 3: r0 = socket$inet(0xa, 0x801, 0x84) sendto(r0, &(0x7f0000000080)="f5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r0, 0xfc0004) accept(r0, 0x0, 0x0) r1 = socket$inet(0xa, 0x801, 0x84) sendto(r1, &(0x7f0000000080)="d5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r1, 0xfc0004) accept(r1, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x4) writev(r2, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d36020a8447000b4e230f00000000a2bc5603ca00000f7f89000000200000000101ff00000e0309ff5bffff00c7e5ed5e232e725839c97b910000", 0x104}], 0x1) 02:13:12 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=ANY=[@ANYBLOB="3c00000010008506000000000000000000200000", @ANYRES32=r3, @ANYBLOB="fe000000000000001c0012000c000100626f6e6400000c0002000800010004000000b8aaf229d19e07fa27e19cdb41f3c39e1c530c8a20b6a9fe127726c243d7f374621b469127371bf17de09220927367b4f1296344846c3bc446955ce991bf484e3dd09935b91aa4de8a507f572a73649c4f95d6d7f9314a580c324bd6a406d53aae87a12b4588407e8ff59d05817ca2a9a3c5649653ffcca5e348e8af4e31c68b5e33d1bddafd3852cf3a31ea0c2843f7e1ff56d00261a99131dd98230bccf89e843da42c421f16c4a0f8a5a3966189d9c8b0eae35b2ae281fd146388a6beb30330de35293082f09e52361f2ba9acfc2677b569368a3f32dfc40b2ea49cfd1b1da4cddabab8889fb2167a7d1b985503375bf58a4f1f0983a1fc18f0b8a974b3372341c1ad56f39e69212b2074e9b3e90000"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000540)={0x0, 0x1f770, &(0x7f0000000200)={&(0x7f00000008c0)=@newlink={0x50, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x50}}, 0x0) [ 600.992278][ T8150] ceph: No path or : separator in source 02:13:12 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @remote}}) write$tun(r0, &(0x7f0000000180)={@void, @val={0x0, 0x0, 0x0, 0x0, 0x0, 0x800e}, @mpls={[], @ipv6=@icmpv6={0x0, 0x6, "9eef7b", 0x9, 0x3c, 0x0, @remote, @mcast2, {[], @echo_request={0x80, 0x0, 0x0, 0x0, 0x0, "81"}}}}}, 0x3b) [ 601.162142][ T8159] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. [ 601.179877][ T8150] ceph: No path or : separator in source 02:13:12 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r2 = gettid() process_vm_writev(r2, &(0x7f0000c22000)=[{&(0x7f000034afa4)=""/1, 0x1f80}], 0x2f8, &(0x7f0000c22fa0)=[{&(0x7f0000000080)=""/1, 0x2034afa5}], 0x1, 0x0) 02:13:12 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) get_mempolicy(&(0x7f00000003c0), &(0x7f0000000400), 0x289, &(0x7f0000fef000/0x10000)=nil, 0x2) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="c6566ceda4e3f1c409e9515b62be0157ec2275042709d8548cb34a00665921c0c26bc59a07847331f37bc0ef75a5460fe26079bfc6bed87ef39b93f39b6bd4dea2a4b89759e1a77e64786f7d3c9ce12e6e7091ca71c3576afb000000000000000000", @ANYRES32, @ANYRES32=0x0, @ANYRESHEX=r1, @ANYRESDEC=r2], 0x5, 0x1) wait4(r1, 0x0, 0x40000000, &(0x7f0000000200)) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/tty/drivers\x00', 0x0, 0x0) read(r3, &(0x7f0000000280)=""/152, 0x20000318) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/tty/drivers\x00', 0x0, 0x0) read(r4, &(0x7f0000000280)=""/152, 0x20000318) ioctl$VIDIOC_QUERYBUF(r3, 0xc0585609, &(0x7f00000002c0)={0x0, 0x0, 0x4, 0x63d263814f78ec42, 0x401, {0x0, 0x2710}, {0x3, 0xc, 0x6, 0x0, 0x3, 0x9, "878b2cbe"}, 0x3, 0xb, @offset=0x8000, 0x400, 0x0, r4}) setsockopt$RDS_RECVERR(r5, 0x114, 0x5, &(0x7f0000000100), 0x4) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r6 = syz_open_dev$dri(&(0x7f00000001c0)='/dev/dri/card#\x00', 0x1, 0x0) mount(&(0x7f00000000c0)=ANY=[@ANYPTR64=&(0x7f0000000740)=ANY=[@ANYRESHEX=0x0, @ANYPTR, @ANYPTR64, @ANYBLOB="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", @ANYRESHEX=0x0, @ANYPTR64, @ANYRESHEX=r6, @ANYRES16=r0]], &(0x7f0000000180)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) 02:13:12 executing program 3: r0 = socket$inet(0xa, 0x801, 0x84) sendto(r0, &(0x7f0000000080)="f5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r0, 0xfc0004) accept(r0, 0x0, 0x0) r1 = socket$inet(0xa, 0x801, 0x84) sendto(r1, &(0x7f0000000080)="d5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r1, 0xfc0004) accept(r1, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x4) writev(r2, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d36020a8447000b4e230f00000000a2bc5603ca00000f7f89000000200000000101ff00c00e0309ff5bffff00c7e5ed5e232e725839c97b910000", 0x104}], 0x1) [ 601.461130][ T8273] ceph: No path or : separator in source [ 601.516495][ T8165] bond165: (slave veth541): Enslaving as an active interface with an up link 02:13:12 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) get_mempolicy(&(0x7f00000003c0), &(0x7f0000000400), 0x289, &(0x7f0000fef000/0x10000)=nil, 0x2) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="c6566ceda4e3f1c409e9515b62be0157ec2275042709d8548cb34a00665921c0c26bc59a07847331f37bc0ef75a5460fe26079bfc6bed87ef39b93f39b6bd4dea2a4b89759e1a77e64786f7d3c9ce12e6e7091ca71c3576afb000000000000000000", @ANYRES32, @ANYRES32=0x0, @ANYRESHEX=r1, @ANYRESDEC=r2], 0x5, 0x1) wait4(r1, 0x0, 0x40000000, &(0x7f0000000200)) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/tty/drivers\x00', 0x0, 0x0) read(r3, &(0x7f0000000280)=""/152, 0x20000318) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/tty/drivers\x00', 0x0, 0x0) read(r4, &(0x7f0000000280)=""/152, 0x20000318) ioctl$VIDIOC_QUERYBUF(r3, 0xc0585609, &(0x7f00000002c0)={0x0, 0x0, 0x4, 0x63d263814f78ec42, 0x401, {0x0, 0x2710}, {0x3, 0xc, 0x6, 0x0, 0x3, 0x9, "878b2cbe"}, 0x3, 0xb, @offset=0x8000, 0x400, 0x0, r4}) setsockopt$RDS_RECVERR(r5, 0x114, 0x5, &(0x7f0000000100), 0x4) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r6 = syz_open_dev$dri(&(0x7f00000001c0)='/dev/dri/card#\x00', 0x1, 0x0) mount(&(0x7f00000000c0)=ANY=[@ANYPTR64=&(0x7f0000000740)=ANY=[@ANYRESHEX=0x0, @ANYPTR, @ANYPTR64, @ANYBLOB="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", @ANYRESHEX=0x0, @ANYPTR64, @ANYRESHEX=r6, @ANYRES16=r0]], &(0x7f0000000180)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) [ 601.560431][ T8273] ceph: No path or : separator in source [ 601.584920][ T8159] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. 02:13:12 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000003c0)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) syz_open_procfs(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$DRM_IOCTL_SET_MASTER(0xffffffffffffffff, 0x641e) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VHOST_SET_LOG_FD(0xffffffffffffffff, 0x4004af07, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) recvfrom$inet6(r3, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0x0) shutdown(r3, 0x1) r4 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r4, &(0x7f00000000c0), 0xfffffdda, 0xf000000, 0x0, 0x0) 02:13:13 executing program 3: r0 = socket$inet(0xa, 0x801, 0x84) sendto(r0, &(0x7f0000000080)="f5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r0, 0xfc0004) accept(r0, 0x0, 0x0) r1 = socket$inet(0xa, 0x801, 0x84) sendto(r1, &(0x7f0000000080)="d5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r1, 0xfc0004) accept(r1, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x4) writev(r2, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d36020a8447000b4e230f00000000a2bc5603ca00000f7f89000000200000000101ff00000f0309ff5bffff00c7e5ed5e232e725839c97b910000", 0x104}], 0x1) [ 601.808404][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 02:13:13 executing program 3: r0 = socket$inet(0xa, 0x801, 0x84) sendto(r0, &(0x7f0000000080)="f5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r0, 0xfc0004) accept(r0, 0x0, 0x0) r1 = socket$inet(0xa, 0x801, 0x84) sendto(r1, &(0x7f0000000080)="d5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r1, 0xfc0004) accept(r1, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x4) writev(r2, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d36020a8447000b4e230f00000000a2bc5603ca00000f7f89000000200000000101ff00041f0309ff5bffff00c7e5ed5e232e725839c97b910000", 0x104}], 0x1) [ 601.861982][ T8290] ceph: No path or : separator in source [ 601.963585][ T8290] ceph: No path or : separator in source 02:13:13 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) get_mempolicy(&(0x7f00000003c0), &(0x7f0000000400), 0x289, &(0x7f0000fef000/0x10000)=nil, 0x2) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="c6566ceda4e3f1c409e9515b62be0157ec2275042709d8548cb34a00665921c0c26bc59a07847331f37bc0ef75a5460fe26079bfc6bed87ef39b93f39b6bd4dea2a4b89759e1a77e64786f7d3c9ce12e6e7091ca71c3576afb000000000000000000", @ANYRES32, @ANYRES32=0x0, @ANYRESHEX=r1, @ANYRESDEC=r2], 0x5, 0x1) wait4(r1, 0x0, 0x40000000, &(0x7f0000000200)) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/tty/drivers\x00', 0x0, 0x0) read(r3, &(0x7f0000000280)=""/152, 0x20000318) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/tty/drivers\x00', 0x0, 0x0) read(r4, &(0x7f0000000280)=""/152, 0x20000318) ioctl$VIDIOC_QUERYBUF(r3, 0xc0585609, &(0x7f00000002c0)={0x0, 0x0, 0x4, 0x63d263814f78ec42, 0x401, {0x0, 0x2710}, {0x3, 0xc, 0x6, 0x0, 0x3, 0x9, "878b2cbe"}, 0x3, 0xb, @offset=0x8000, 0x400, 0x0, r4}) setsockopt$RDS_RECVERR(r5, 0x114, 0x5, &(0x7f0000000100), 0x4) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r6 = syz_open_dev$dri(&(0x7f00000001c0)='/dev/dri/card#\x00', 0x1, 0x0) mount(&(0x7f00000000c0)=ANY=[@ANYPTR64=&(0x7f0000000740)=ANY=[@ANYRESHEX=0x0, @ANYPTR, @ANYPTR64, @ANYBLOB="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", @ANYRESHEX=0x0, @ANYPTR64, @ANYRESHEX=r6, @ANYRES16=r0]], &(0x7f0000000180)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) 02:13:13 executing program 3: r0 = socket$inet(0xa, 0x801, 0x84) sendto(r0, &(0x7f0000000080)="f5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r0, 0xfc0004) accept(r0, 0x0, 0x0) r1 = socket$inet(0xa, 0x801, 0x84) sendto(r1, &(0x7f0000000080)="d5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r1, 0xfc0004) accept(r1, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x4) writev(r2, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d36020a8447000b4e230f00000000a2bc5603ca00000f7f89000000200000000101ff00003f0309ff5bffff00c7e5ed5e232e725839c97b910000", 0x104}], 0x1) [ 602.209494][ T8165] bond165: (slave veth543): Enslaving as an active interface with an up link 02:13:13 executing program 3: r0 = socket$inet(0xa, 0x801, 0x84) sendto(r0, &(0x7f0000000080)="f5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r0, 0xfc0004) accept(r0, 0x0, 0x0) r1 = socket$inet(0xa, 0x801, 0x84) sendto(r1, &(0x7f0000000080)="d5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r1, 0xfc0004) accept(r1, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x4) writev(r2, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d36020a8447000b4e230f00000000a2bc5603ca00000f7f89000000200000000101ff0000600309ff5bffff00c7e5ed5e232e725839c97b910000", 0x104}], 0x1) 02:13:13 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=ANY=[@ANYBLOB="3c00000010008506000000000000000000200000", @ANYRES32=r3, @ANYBLOB="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"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000540)={0x0, 0x1f771, &(0x7f0000000200)={&(0x7f00000008c0)=@newlink={0x50, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x50}}, 0x0) 02:13:13 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @remote}}) write$tun(r0, &(0x7f0000000180)={@void, @val, @mpls={[], @ipv6=@icmpv6={0x0, 0x6, "9eef7b", 0x9, 0x3c, 0x0, @remote, @mcast2, {[], @echo_request={0x80, 0x0, 0x0, 0x0, 0x0, "81"}}}}}, 0x3b) [ 602.343972][ T8306] ceph: No path or : separator in source [ 602.510115][ T8306] ceph: No path or : separator in source 02:13:14 executing program 3: r0 = socket$inet(0xa, 0x801, 0x84) sendto(r0, &(0x7f0000000080)="f5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r0, 0xfc0004) accept(r0, 0x0, 0x0) r1 = socket$inet(0xa, 0x801, 0x84) sendto(r1, &(0x7f0000000080)="d5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r1, 0xfc0004) accept(r1, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x4) writev(r2, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d36020a8447000b4e230f00000000a2bc5603ca00000f7f89000000200000000101ff006a640309ff5bffff00c7e5ed5e232e725839c97b910000", 0x104}], 0x1) 02:13:14 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r2 = gettid() process_vm_writev(r2, &(0x7f0000c22000)=[{&(0x7f000034afa4)=""/1, 0x1f80}], 0x2f9, &(0x7f0000c22fa0)=[{&(0x7f0000000080)=""/1, 0x2034afa5}], 0x1, 0x0) 02:13:14 executing program 3: r0 = socket$inet(0xa, 0x801, 0x84) sendto(r0, &(0x7f0000000080)="f5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r0, 0xfc0004) accept(r0, 0x0, 0x0) r1 = socket$inet(0xa, 0x801, 0x84) sendto(r1, &(0x7f0000000080)="d5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r1, 0xfc0004) accept(r1, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x4) writev(r2, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d36020a8447000b4e230f00000000a2bc5603ca00000f7f89000000200000000101ff00646a0309ff5bffff00c7e5ed5e232e725839c97b910000", 0x104}], 0x1) 02:13:14 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) get_mempolicy(&(0x7f00000003c0), &(0x7f0000000400), 0x289, &(0x7f0000fef000/0x10000)=nil, 0x2) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="c6566ceda4e3f1c409e9515b62be0157ec2275042709d8548cb34a00665921c0c26bc59a07847331f37bc0ef75a5460fe26079bfc6bed87ef39b93f39b6bd4dea2a4b89759e1a77e64786f7d3c9ce12e6e7091ca71c3576afb000000000000000000", @ANYRES32, @ANYRES32=0x0, @ANYRESHEX=r1, @ANYRESDEC=r2], 0x5, 0x1) wait4(r1, 0x0, 0x40000000, &(0x7f0000000200)) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/tty/drivers\x00', 0x0, 0x0) read(r3, &(0x7f0000000280)=""/152, 0x20000318) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/tty/drivers\x00', 0x0, 0x0) read(r4, &(0x7f0000000280)=""/152, 0x20000318) ioctl$VIDIOC_QUERYBUF(r3, 0xc0585609, &(0x7f00000002c0)={0x0, 0x0, 0x4, 0x63d263814f78ec42, 0x401, {0x0, 0x2710}, {0x3, 0xc, 0x6, 0x0, 0x3, 0x9, "878b2cbe"}, 0x3, 0xb, @offset=0x8000, 0x400, 0x0, r4}) setsockopt$RDS_RECVERR(r5, 0x114, 0x5, &(0x7f0000000100), 0x4) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r6 = syz_open_dev$dri(&(0x7f00000001c0)='/dev/dri/card#\x00', 0x1, 0x0) mount(&(0x7f00000000c0)=ANY=[@ANYPTR64=&(0x7f0000000740)=ANY=[@ANYRESHEX=0x0, @ANYPTR, @ANYPTR64, @ANYBLOB="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", @ANYRESHEX=0x0, @ANYPTR64, @ANYRESHEX=r6, @ANYRES16=r0]], &(0x7f0000000180)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) [ 602.945794][ T8320] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. 02:13:14 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000003c0)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) syz_open_procfs(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$DRM_IOCTL_SET_MASTER(0xffffffffffffffff, 0x641e) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VHOST_SET_LOG_FD(0xffffffffffffffff, 0x4004af07, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) recvfrom$inet6(r3, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0x0) shutdown(r3, 0x1) r4 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r4, &(0x7f00000000c0), 0xfffffdda, 0x10000000, 0x0, 0x0) [ 603.040635][ T8324] bond166: (slave veth545): Enslaving as an active interface with an up link [ 603.080454][ T8320] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. 02:13:14 executing program 3: r0 = socket$inet(0xa, 0x801, 0x84) sendto(r0, &(0x7f0000000080)="f5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r0, 0xfc0004) accept(r0, 0x0, 0x0) r1 = socket$inet(0xa, 0x801, 0x84) sendto(r1, &(0x7f0000000080)="d5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r1, 0xfc0004) accept(r1, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x4) writev(r2, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d36020a8447000b4e230f00000000a2bc5603ca00000f7f89000000200000000101ff0000bc0309ff5bffff00c7e5ed5e232e725839c97b910000", 0x104}], 0x1) [ 603.148795][ T8339] ceph: No path or : separator in source [ 603.164398][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 02:13:14 executing program 3: r0 = socket$inet(0xa, 0x801, 0x84) sendto(r0, &(0x7f0000000080)="f5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r0, 0xfc0004) accept(r0, 0x0, 0x0) r1 = socket$inet(0xa, 0x801, 0x84) sendto(r1, &(0x7f0000000080)="d5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r1, 0xfc0004) accept(r1, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x4) writev(r2, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d36020a8447000b4e230f00000000a2bc5603ca00000f7f89000000200000000101ff000ec00309ff5bffff00c7e5ed5e232e725839c97b910000", 0x104}], 0x1) [ 603.267045][ T8339] ceph: No path or : separator in source 02:13:14 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) get_mempolicy(&(0x7f00000003c0), &(0x7f0000000400), 0x289, &(0x7f0000fef000/0x10000)=nil, 0x2) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="c6566ceda4e3f1c409e9515b62be0157ec2275042709d8548cb34a00665921c0c26bc59a07847331f37bc0ef75a5460fe26079bfc6bed87ef39b93f39b6bd4dea2a4b89759e1a77e64786f7d3c9ce12e6e7091ca71c3576afb000000000000000000", @ANYRES32, @ANYRES32=0x0, @ANYRESHEX=r1, @ANYRESDEC=r2], 0x5, 0x1) wait4(r1, 0x0, 0x40000000, &(0x7f0000000200)) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/tty/drivers\x00', 0x0, 0x0) read(r3, &(0x7f0000000280)=""/152, 0x20000318) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/tty/drivers\x00', 0x0, 0x0) read(r4, &(0x7f0000000280)=""/152, 0x20000318) ioctl$VIDIOC_QUERYBUF(r3, 0xc0585609, &(0x7f00000002c0)={0x0, 0x0, 0x4, 0x63d263814f78ec42, 0x401, {0x0, 0x2710}, {0x3, 0xc, 0x6, 0x0, 0x3, 0x9, "878b2cbe"}, 0x3, 0xb, @offset=0x8000, 0x400, 0x0, r4}) setsockopt$RDS_RECVERR(r5, 0x114, 0x5, &(0x7f0000000100), 0x4) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r6 = syz_open_dev$dri(&(0x7f00000001c0)='/dev/dri/card#\x00', 0x1, 0x0) mount(&(0x7f00000000c0)=ANY=[@ANYPTR64=&(0x7f0000000740)=ANY=[@ANYRESHEX=0x0, @ANYPTR, @ANYPTR64, @ANYBLOB="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", @ANYRESHEX=0x0, @ANYPTR64, @ANYRESHEX=r6, @ANYRES16=r0]], &(0x7f0000000180)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) 02:13:14 executing program 3: r0 = socket$inet(0xa, 0x801, 0x84) sendto(r0, &(0x7f0000000080)="f5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r0, 0xfc0004) accept(r0, 0x0, 0x0) r1 = socket$inet(0xa, 0x801, 0x84) sendto(r1, &(0x7f0000000080)="d5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r1, 0xfc0004) accept(r1, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x4) writev(r2, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d36020a8447000b4e230f00000000a2bc5603ca00000f7f89000000200000000101ff0000f00309ff5bffff00c7e5ed5e232e725839c97b910000", 0x104}], 0x1) [ 603.568280][ T8359] ceph: No path or : separator in source [ 603.604354][ T8324] bond166: (slave veth547): Enslaving as an active interface with an up link 02:13:15 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=ANY=[@ANYBLOB="3c00000010008506000000000000000000200000", @ANYRES32=r3, @ANYBLOB="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"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000540)={0x0, 0x1f772, &(0x7f0000000200)={&(0x7f00000008c0)=@newlink={0x50, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x50}}, 0x0) [ 603.671698][ T8359] ceph: No path or : separator in source 02:13:15 executing program 3: r0 = socket$inet(0xa, 0x801, 0x84) sendto(r0, &(0x7f0000000080)="f5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r0, 0xfc0004) accept(r0, 0x0, 0x0) r1 = socket$inet(0xa, 0x801, 0x84) sendto(r1, &(0x7f0000000080)="d5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r1, 0xfc0004) accept(r1, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x4) writev(r2, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d36020a8447000b4e230f00000000a2bc5603ca00000f7f89000000200000000101ff0000020309ff5bffff00c7e5ed5e232e725839c97b910000", 0x104}], 0x1) [ 603.907116][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 604.172732][ T8471] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. [ 604.205585][ T8473] bond167: (slave veth549): Enslaving as an active interface with an up link [ 604.233688][ T8471] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. 02:13:15 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @remote}}) write$tun(r0, &(0x7f0000000180)={@void, @val, @mpls={[], @ipv6=@icmpv6={0x2, 0x6, "9eef7b", 0x9, 0x3c, 0x0, @remote, @mcast2, {[], @echo_request={0x80, 0x0, 0x0, 0x0, 0x0, "81"}}}}}, 0x3b) 02:13:15 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) get_mempolicy(&(0x7f00000003c0), &(0x7f0000000400), 0x289, &(0x7f0000fef000/0x10000)=nil, 0x2) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="c6566ceda4e3f1c409e9515b62be0157ec2275042709d8548cb34a00665921c0c26bc59a07847331f37bc0ef75a5460fe26079bfc6bed87ef39b93f39b6bd4dea2a4b89759e1a77e64786f7d3c9ce12e6e7091ca71c3576afb000000000000000000", @ANYRES32, @ANYRES32=0x0, @ANYRESHEX=r1, @ANYRESDEC=r2], 0x5, 0x1) wait4(r1, 0x0, 0x40000000, &(0x7f0000000200)) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/tty/drivers\x00', 0x0, 0x0) read(r3, &(0x7f0000000280)=""/152, 0x20000318) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/tty/drivers\x00', 0x0, 0x0) read(r4, &(0x7f0000000280)=""/152, 0x20000318) ioctl$VIDIOC_QUERYBUF(r3, 0xc0585609, &(0x7f00000002c0)={0x0, 0x0, 0x4, 0x63d263814f78ec42, 0x401, {0x0, 0x2710}, {0x3, 0xc, 0x6, 0x0, 0x3, 0x9, "878b2cbe"}, 0x3, 0xb, @offset=0x8000, 0x400, 0x0, r4}) setsockopt$RDS_RECVERR(r5, 0x114, 0x5, &(0x7f0000000100), 0x4) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r6 = syz_open_dev$dri(&(0x7f00000001c0)='/dev/dri/card#\x00', 0x1, 0x0) mount(&(0x7f00000000c0)=ANY=[@ANYPTR64=&(0x7f0000000740)=ANY=[@ANYRESHEX=0x0, @ANYPTR, @ANYPTR64, @ANYBLOB="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", @ANYRESHEX=0x0, @ANYPTR64, @ANYRESHEX=r6, @ANYRES16=r0]], &(0x7f0000000180)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) 02:13:15 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r2 = gettid() process_vm_writev(r2, &(0x7f0000c22000)=[{&(0x7f000034afa4)=""/1, 0x1f80}], 0x2fa, &(0x7f0000c22fa0)=[{&(0x7f0000000080)=""/1, 0x2034afa5}], 0x1, 0x0) 02:13:15 executing program 3: r0 = socket$inet(0xa, 0x801, 0x84) sendto(r0, &(0x7f0000000080)="f5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r0, 0xfc0004) accept(r0, 0x0, 0x0) r1 = socket$inet(0xa, 0x801, 0x84) sendto(r1, &(0x7f0000000080)="d5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r1, 0xfc0004) accept(r1, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x4) writev(r2, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d36020a8447000b4e230f00000000a2bc5603ca00000f7f89000000200000000101ff0000040309ff5bffff00c7e5ed5e232e725839c97b910000", 0x104}], 0x1) 02:13:15 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000003c0)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) syz_open_procfs(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$DRM_IOCTL_SET_MASTER(0xffffffffffffffff, 0x641e) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VHOST_SET_LOG_FD(0xffffffffffffffff, 0x4004af07, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) recvfrom$inet6(r3, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0x0) shutdown(r3, 0x1) r4 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r4, &(0x7f00000000c0), 0xfffffdda, 0x11000000, 0x0, 0x0) 02:13:15 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=ANY=[@ANYBLOB="3c00000010008506000000000000000000200000", @ANYRES32=r3, @ANYBLOB="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"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000540)={0x0, 0x1f773, &(0x7f0000000200)={&(0x7f00000008c0)=@newlink={0x50, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x50}}, 0x0) [ 604.500329][ T8495] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. [ 604.550823][ T8490] ceph: No path or : separator in source [ 604.565795][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 02:13:16 executing program 3: r0 = socket$inet(0xa, 0x801, 0x84) sendto(r0, &(0x7f0000000080)="f5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r0, 0xfc0004) accept(r0, 0x0, 0x0) r1 = socket$inet(0xa, 0x801, 0x84) sendto(r1, &(0x7f0000000080)="d5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r1, 0xfc0004) accept(r1, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x4) writev(r2, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d36020a8447000b4e230f00000000a2bc5603ca00000f7f89000000200000000101ff00000a0309ff5bffff00c7e5ed5e232e725839c97b910000", 0x104}], 0x1) [ 604.692697][ T8490] ceph: No path or : separator in source 02:13:16 executing program 3: r0 = socket$inet(0xa, 0x801, 0x84) sendto(r0, &(0x7f0000000080)="f5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r0, 0xfc0004) accept(r0, 0x0, 0x0) r1 = socket$inet(0xa, 0x801, 0x84) sendto(r1, &(0x7f0000000080)="d5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r1, 0xfc0004) accept(r1, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x4) writev(r2, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d36020a8447000b4e230f00000000a2bc5603ca00000f7f89000000200000000101ff00000e0309ff5bffff00c7e5ed5e232e725839c97b910000", 0x104}], 0x1) [ 604.758577][ T8502] bond169: (slave veth553): Enslaving as an active interface with an up link [ 604.852954][ T8495] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. 02:13:16 executing program 3: r0 = socket$inet(0xa, 0x801, 0x84) sendto(r0, &(0x7f0000000080)="f5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r0, 0xfc0004) accept(r0, 0x0, 0x0) r1 = socket$inet(0xa, 0x801, 0x84) sendto(r1, &(0x7f0000000080)="d5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r1, 0xfc0004) accept(r1, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x4) writev(r2, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d36020a8447000b4e230f00000000a2bc5603ca00000f7f89000000200000000101ff00000f0309ff5bffff00c7e5ed5e232e725839c97b910000", 0x104}], 0x1) [ 604.958197][ T8502] bond169: (slave veth555): Enslaving as an active interface with an up link 02:13:16 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=ANY=[@ANYBLOB="3c00000010008506000000000000000000200000", @ANYRES32=r3, @ANYBLOB="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"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000540)={0x0, 0x1f774, &(0x7f0000000200)={&(0x7f00000008c0)=@newlink={0x50, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x50}}, 0x0) 02:13:16 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) get_mempolicy(&(0x7f00000003c0), &(0x7f0000000400), 0x289, &(0x7f0000fef000/0x10000)=nil, 0x2) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="c6566ceda4e3f1c409e9515b62be0157ec2275042709d8548cb34a00665921c0c26bc59a07847331f37bc0ef75a5460fe26079bfc6bed87ef39b93f39b6bd4dea2a4b89759e1a77e64786f7d3c9ce12e6e7091ca71c3576afb000000000000000000", @ANYRES32, @ANYRES32=0x0, @ANYRESHEX=r1, @ANYRESDEC=r2], 0x5, 0x1) wait4(r1, 0x0, 0x40000000, &(0x7f0000000200)) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/tty/drivers\x00', 0x0, 0x0) read(r3, &(0x7f0000000280)=""/152, 0x20000318) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/tty/drivers\x00', 0x0, 0x0) read(r4, &(0x7f0000000280)=""/152, 0x20000318) ioctl$VIDIOC_QUERYBUF(r3, 0xc0585609, &(0x7f00000002c0)={0x0, 0x0, 0x4, 0x63d263814f78ec42, 0x401, {0x0, 0x2710}, {0x3, 0xc, 0x6, 0x0, 0x3, 0x9, "878b2cbe"}, 0x3, 0xb, @offset=0x8000, 0x400, 0x0, r4}) setsockopt$RDS_RECVERR(r5, 0x114, 0x5, &(0x7f0000000100), 0x4) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r6 = syz_open_dev$dri(&(0x7f00000001c0)='/dev/dri/card#\x00', 0x1, 0x0) mount(&(0x7f00000000c0)=ANY=[@ANYPTR64=&(0x7f0000000740)=ANY=[@ANYRESHEX=0x0, @ANYPTR, @ANYPTR64, @ANYBLOB="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", @ANYRESHEX=0x0, @ANYPTR64, @ANYRESHEX=r6, @ANYRES16=r0]], &(0x7f0000000180)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) 02:13:16 executing program 3: r0 = socket$inet(0xa, 0x801, 0x84) sendto(r0, &(0x7f0000000080)="f5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r0, 0xfc0004) accept(r0, 0x0, 0x0) r1 = socket$inet(0xa, 0x801, 0x84) sendto(r1, &(0x7f0000000080)="d5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r1, 0xfc0004) accept(r1, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x4) writev(r2, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d36020a8447000b4e230f00000000a2bc5603ca00000f7f89000000200000000101ff0000600309ff5bffff00c7e5ed5e232e725839c97b910000", 0x104}], 0x1) 02:13:16 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @remote}}) write$tun(r0, &(0x7f0000000180)={@void, @val, @mpls={[], @ipv6=@icmpv6={0x3, 0x6, "9eef7b", 0x9, 0x3c, 0x0, @remote, @mcast2, {[], @echo_request={0x80, 0x0, 0x0, 0x0, 0x0, "81"}}}}}, 0x3b) [ 605.305141][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 02:13:16 executing program 3: r0 = socket$inet(0xa, 0x801, 0x84) sendto(r0, &(0x7f0000000080)="f5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r0, 0xfc0004) accept(r0, 0x0, 0x0) r1 = socket$inet(0xa, 0x801, 0x84) sendto(r1, &(0x7f0000000080)="d5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r1, 0xfc0004) accept(r1, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x4) writev(r2, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d36020a8447000b4e230f00000000a2bc5603ca00000f7f89000000200000000101ff0000bc0309ff5bffff00c7e5ed5e232e725839c97b910000", 0x104}], 0x1) 02:13:16 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r2 = gettid() process_vm_writev(r2, &(0x7f0000c22000)=[{&(0x7f000034afa4)=""/1, 0x1f80}], 0x2fb, &(0x7f0000c22fa0)=[{&(0x7f0000000080)=""/1, 0x2034afa5}], 0x1, 0x0) [ 605.425296][ T8626] bond170: (slave veth557): Enslaving as an active interface with an up link [ 605.455373][ T8625] ceph: No path or : separator in source 02:13:16 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) get_mempolicy(&(0x7f00000003c0), &(0x7f0000000400), 0x289, &(0x7f0000fef000/0x10000)=nil, 0x2) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="c6566ceda4e3f1c409e9515b62be0157ec2275042709d8548cb34a00665921c0c26bc59a07847331f37bc0ef75a5460fe26079bfc6bed87ef39b93f39b6bd4dea2a4b89759e1a77e64786f7d3c9ce12e6e7091ca71c3576afb000000000000000000", @ANYRES32, @ANYRES32=0x0, @ANYRESHEX=r1, @ANYRESDEC=r2], 0x5, 0x1) wait4(r1, 0x0, 0x40000000, &(0x7f0000000200)) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/tty/drivers\x00', 0x0, 0x0) read(r3, &(0x7f0000000280)=""/152, 0x20000318) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/tty/drivers\x00', 0x0, 0x0) read(r4, &(0x7f0000000280)=""/152, 0x20000318) ioctl$VIDIOC_QUERYBUF(r3, 0xc0585609, &(0x7f00000002c0)={0x0, 0x0, 0x4, 0x63d263814f78ec42, 0x401, {0x0, 0x2710}, {0x3, 0xc, 0x6, 0x0, 0x3, 0x9, "878b2cbe"}, 0x3, 0xb, @offset=0x8000, 0x400, 0x0, r4}) setsockopt$RDS_RECVERR(r5, 0x114, 0x5, &(0x7f0000000100), 0x4) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r6 = syz_open_dev$dri(&(0x7f00000001c0)='/dev/dri/card#\x00', 0x1, 0x0) mount(&(0x7f00000000c0)=ANY=[@ANYPTR64=&(0x7f0000000740)=ANY=[@ANYRESHEX=0x0, @ANYPTR, @ANYPTR64, @ANYBLOB="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", @ANYRESHEX=0x0, @ANYPTR64, @ANYRESHEX=r6, @ANYRES16=r0]], &(0x7f0000000180)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x2, 0x0) 02:13:16 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000003c0)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) syz_open_procfs(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$DRM_IOCTL_SET_MASTER(0xffffffffffffffff, 0x641e) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VHOST_SET_LOG_FD(0xffffffffffffffff, 0x4004af07, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) recvfrom$inet6(r3, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0x0) shutdown(r3, 0x1) r4 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r4, &(0x7f00000000c0), 0xfffffdda, 0x12000000, 0x0, 0x0) [ 605.477865][ T8621] __nla_validate_parse: 1 callbacks suppressed [ 605.477875][ T8621] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. 02:13:17 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=ANY=[@ANYBLOB="3c00000010008506000000000000000000200000", @ANYRES32=r3, @ANYBLOB="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"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000540)={0x0, 0x1f775, &(0x7f0000000200)={&(0x7f00000008c0)=@newlink={0x50, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x50}}, 0x0) 02:13:17 executing program 3: r0 = socket$inet(0xa, 0x801, 0x84) sendto(r0, &(0x7f0000000080)="f5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r0, 0xfc0004) accept(r0, 0x0, 0x0) r1 = socket$inet(0xa, 0x801, 0x84) sendto(r1, &(0x7f0000000080)="d5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r1, 0xfc0004) accept(r1, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x4) writev(r2, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d36020a8447000b4e230f00000000a2bc5603ca00000f7f89000000200000000101ff0000000509ff5bffff00c7e5ed5e232e725839c97b910000", 0x104}], 0x1) [ 605.671531][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 605.722615][ T8744] ceph: No path or : separator in source [ 605.780828][ T8755] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. 02:13:17 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) get_mempolicy(&(0x7f00000003c0), &(0x7f0000000400), 0x289, &(0x7f0000fef000/0x10000)=nil, 0x2) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="c6566ceda4e3f1c409e9515b62be0157ec2275042709d8548cb34a00665921c0c26bc59a07847331f37bc0ef75a5460fe26079bfc6bed87ef39b93f39b6bd4dea2a4b89759e1a77e64786f7d3c9ce12e6e7091ca71c3576afb000000000000000000", @ANYRES32, @ANYRES32=0x0, @ANYRESHEX=r1, @ANYRESDEC=r2], 0x5, 0x1) wait4(r1, 0x0, 0x40000000, &(0x7f0000000200)) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/tty/drivers\x00', 0x0, 0x0) read(r3, &(0x7f0000000280)=""/152, 0x20000318) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/tty/drivers\x00', 0x0, 0x0) read(r4, &(0x7f0000000280)=""/152, 0x20000318) ioctl$VIDIOC_QUERYBUF(r3, 0xc0585609, &(0x7f00000002c0)={0x0, 0x0, 0x4, 0x63d263814f78ec42, 0x401, {0x0, 0x2710}, {0x3, 0xc, 0x6, 0x0, 0x3, 0x9, "878b2cbe"}, 0x3, 0xb, @offset=0x8000, 0x400, 0x0, r4}) setsockopt$RDS_RECVERR(r5, 0x114, 0x5, &(0x7f0000000100), 0x4) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r6 = syz_open_dev$dri(&(0x7f00000001c0)='/dev/dri/card#\x00', 0x1, 0x0) mount(&(0x7f00000000c0)=ANY=[@ANYPTR64=&(0x7f0000000740)=ANY=[@ANYRESHEX=0x0, @ANYPTR, @ANYPTR64, @ANYBLOB="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", @ANYRESHEX=0x0, @ANYPTR64, @ANYRESHEX=r6, @ANYRES16=r0]], &(0x7f0000000180)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x3, 0x0) [ 605.859342][ T8744] ceph: No path or : separator in source 02:13:17 executing program 3: r0 = socket$inet(0xa, 0x801, 0x84) sendto(r0, &(0x7f0000000080)="f5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r0, 0xfc0004) accept(r0, 0x0, 0x0) r1 = socket$inet(0xa, 0x801, 0x84) sendto(r1, &(0x7f0000000080)="d5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r1, 0xfc0004) accept(r1, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x4) writev(r2, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d36020a8447000b4e230f00000000a2bc5603ca00000f7f89000000200000000101ff0000c00e09ff5bffff00c7e5ed5e232e725839c97b910000", 0x104}], 0x1) 02:13:17 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @remote}}) write$tun(r0, &(0x7f0000000180)={@void, @val, @mpls={[], @ipv6=@icmpv6={0x4, 0x6, "9eef7b", 0x9, 0x3c, 0x0, @remote, @mcast2, {[], @echo_request={0x80, 0x0, 0x0, 0x0, 0x0, "81"}}}}}, 0x3b) [ 605.970395][ T8758] bond171: (slave veth559): Enslaving as an active interface with an up link [ 606.079055][ T8763] ceph: No path or : separator in source 02:13:17 executing program 3: r0 = socket$inet(0xa, 0x801, 0x84) sendto(r0, &(0x7f0000000080)="f5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r0, 0xfc0004) accept(r0, 0x0, 0x0) r1 = socket$inet(0xa, 0x801, 0x84) sendto(r1, &(0x7f0000000080)="d5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r1, 0xfc0004) accept(r1, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x4) writev(r2, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d36020a8447000b4e230f00000000a2bc5603ca00000f7f89000000200000000101ff0000004009ff5bffff00c7e5ed5e232e725839c97b910000", 0x104}], 0x1) [ 606.192770][ T8763] ceph: No path or : separator in source [ 606.234340][ T8758] bond171: (slave veth561): Enslaving as an active interface with an up link 02:13:17 executing program 3: r0 = socket$inet(0xa, 0x801, 0x84) sendto(r0, &(0x7f0000000080)="f5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r0, 0xfc0004) accept(r0, 0x0, 0x0) r1 = socket$inet(0xa, 0x801, 0x84) sendto(r1, &(0x7f0000000080)="d5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r1, 0xfc0004) accept(r1, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x4) writev(r2, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d36020a8447000b4e230f00000000a2bc5603ca00000f7f89000000200000000101ff0000000509ff5bffff00c7e5ed5e232e725839c97b910000", 0x104}], 0x1) 02:13:17 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) get_mempolicy(&(0x7f00000003c0), &(0x7f0000000400), 0x289, &(0x7f0000fef000/0x10000)=nil, 0x2) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="c6566ceda4e3f1c409e9515b62be0157ec2275042709d8548cb34a00665921c0c26bc59a07847331f37bc0ef75a5460fe26079bfc6bed87ef39b93f39b6bd4dea2a4b89759e1a77e64786f7d3c9ce12e6e7091ca71c3576afb000000000000000000", @ANYRES32, @ANYRES32=0x0, @ANYRESHEX=r1, @ANYRESDEC=r2], 0x5, 0x1) wait4(r1, 0x0, 0x40000000, &(0x7f0000000200)) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/tty/drivers\x00', 0x0, 0x0) read(r3, &(0x7f0000000280)=""/152, 0x20000318) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/tty/drivers\x00', 0x0, 0x0) read(r4, &(0x7f0000000280)=""/152, 0x20000318) ioctl$VIDIOC_QUERYBUF(r3, 0xc0585609, &(0x7f00000002c0)={0x0, 0x0, 0x4, 0x63d263814f78ec42, 0x401, {0x0, 0x2710}, {0x3, 0xc, 0x6, 0x0, 0x3, 0x9, "878b2cbe"}, 0x3, 0xb, @offset=0x8000, 0x400, 0x0, r4}) setsockopt$RDS_RECVERR(r5, 0x114, 0x5, &(0x7f0000000100), 0x4) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r6 = syz_open_dev$dri(&(0x7f00000001c0)='/dev/dri/card#\x00', 0x1, 0x0) mount(&(0x7f00000000c0)=ANY=[@ANYPTR64=&(0x7f0000000740)=ANY=[@ANYRESHEX=0x0, @ANYPTR, @ANYPTR64, @ANYBLOB="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", @ANYRESHEX=0x0, @ANYPTR64, @ANYRESHEX=r6, @ANYRES16=r0]], &(0x7f0000000180)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x4, 0x0) [ 606.346757][ T8755] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. 02:13:17 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=ANY=[@ANYBLOB="3c00000010008506000000000000000000200000", @ANYRES32=r3, @ANYBLOB="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"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000540)={0x0, 0x1f776, &(0x7f0000000200)={&(0x7f00000008c0)=@newlink={0x50, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x50}}, 0x0) [ 606.450338][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 606.588028][ T8890] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. [ 606.631679][ T8885] ceph: No path or : separator in source [ 606.754799][ T8885] ceph: No path or : separator in source [ 606.794177][ T8894] bond172: (slave veth563): Enslaving as an active interface with an up link 02:13:18 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r2 = gettid() process_vm_writev(r2, &(0x7f0000c22000)=[{&(0x7f000034afa4)=""/1, 0x1f80}], 0x2fc, &(0x7f0000c22fa0)=[{&(0x7f0000000080)=""/1, 0x2034afa5}], 0x1, 0x0) 02:13:18 executing program 3: r0 = socket$inet(0xa, 0x801, 0x84) sendto(r0, &(0x7f0000000080)="f5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r0, 0xfc0004) accept(r0, 0x0, 0x0) r1 = socket$inet(0xa, 0x801, 0x84) sendto(r1, &(0x7f0000000080)="d5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r1, 0xfc0004) accept(r1, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x4) writev(r2, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d36020a8447000b4e230f00000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff02c7e5ed5e232e725839c97b910000", 0x104}], 0x1) 02:13:18 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000003c0)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) syz_open_procfs(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$DRM_IOCTL_SET_MASTER(0xffffffffffffffff, 0x641e) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VHOST_SET_LOG_FD(0xffffffffffffffff, 0x4004af07, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) recvfrom$inet6(r3, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0x0) shutdown(r3, 0x1) r4 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r4, &(0x7f00000000c0), 0xfffffdda, 0x14000000, 0x0, 0x0) 02:13:18 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) get_mempolicy(&(0x7f00000003c0), &(0x7f0000000400), 0x289, &(0x7f0000fef000/0x10000)=nil, 0x2) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="c6566ceda4e3f1c409e9515b62be0157ec2275042709d8548cb34a00665921c0c26bc59a07847331f37bc0ef75a5460fe26079bfc6bed87ef39b93f39b6bd4dea2a4b89759e1a77e64786f7d3c9ce12e6e7091ca71c3576afb000000000000000000", @ANYRES32, @ANYRES32=0x0, @ANYRESHEX=r1, @ANYRESDEC=r2], 0x5, 0x1) wait4(r1, 0x0, 0x40000000, &(0x7f0000000200)) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/tty/drivers\x00', 0x0, 0x0) read(r3, &(0x7f0000000280)=""/152, 0x20000318) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/tty/drivers\x00', 0x0, 0x0) read(r4, &(0x7f0000000280)=""/152, 0x20000318) ioctl$VIDIOC_QUERYBUF(r3, 0xc0585609, &(0x7f00000002c0)={0x0, 0x0, 0x4, 0x63d263814f78ec42, 0x401, {0x0, 0x2710}, {0x3, 0xc, 0x6, 0x0, 0x3, 0x9, "878b2cbe"}, 0x3, 0xb, @offset=0x8000, 0x400, 0x0, r4}) setsockopt$RDS_RECVERR(r5, 0x114, 0x5, &(0x7f0000000100), 0x4) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r6 = syz_open_dev$dri(&(0x7f00000001c0)='/dev/dri/card#\x00', 0x1, 0x0) mount(&(0x7f00000000c0)=ANY=[@ANYPTR64=&(0x7f0000000740)=ANY=[@ANYRESHEX=0x0, @ANYPTR, @ANYPTR64, @ANYBLOB="974d3ab47b3b91beb0f4760669c8618bc33664faf9c8179efd568e4e4b38f30869aefe10a4ccb1c515487e645b4a11d7cd2fb39aa1efca7c1eb441061d2be4c165ca7304c2e94159863dcfcf75da45211fdd143b6c91d52ae9ac6a1c2f8173d8ee5682fc65a93dc45ead4a462d9e16ac3dff144c0fcc7d02fcf3fd3029b264f3550caaab22152365126be74a9ff91547eb273f83f2c2762b17b32d7d91ac013d6f5790d3bc09c1884d8c7f15be223a8c3b4e37186c641bc3501ca145f05e49aae1613402448c49a36a9b0055a9d5cc74edda0087d65f15d71e4e051cad208514ee99b6258f827a895d2eb4407e6b7b7a9d6bcc228e615d78a6a8b2c466d96a48ee2c7a736035e283917293271efdc7cbdf0a647917068ab197eec326359f829087bafd0fd95e5fcf645615f55040a847aab188c52f4dd3f61a15b2edfe22e6221a5b0b256f1d8da1e6b860b7c68213cc1fae88c0e86013d9000085216c3ee1ab6fd509500f038480929e335b4b3bb0150f881b831cc870de6d188bdd45a113989bc9d15fe2893ff94349", @ANYRESHEX=0x0, @ANYPTR64, @ANYRESHEX=r6, @ANYRES16=r0]], &(0x7f0000000180)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x5, 0x0) 02:13:18 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @remote}}) write$tun(r0, &(0x7f0000000180)={@void, @val, @mpls={[], @ipv6=@icmpv6={0x5, 0x6, "9eef7b", 0x9, 0x3c, 0x0, @remote, @mcast2, {[], @echo_request={0x80, 0x0, 0x0, 0x0, 0x0, "81"}}}}}, 0x3b) [ 606.951899][ T8894] bond172: (slave veth565): Enslaving as an active interface with an up link [ 606.989214][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 02:13:18 executing program 3: r0 = socket$inet(0xa, 0x801, 0x84) sendto(r0, &(0x7f0000000080)="f5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r0, 0xfc0004) accept(r0, 0x0, 0x0) r1 = socket$inet(0xa, 0x801, 0x84) sendto(r1, &(0x7f0000000080)="d5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r1, 0xfc0004) accept(r1, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x4) writev(r2, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d36020a8447000b4e230f00000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff04c7e5ed5e232e725839c97b910000", 0x104}], 0x1) [ 607.049736][ T8890] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. [ 607.081866][ T8907] ceph: No path or : separator in source 02:13:18 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=ANY=[@ANYBLOB="3c00000010008506000000000000000000200000", @ANYRES32=r3, @ANYBLOB="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"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000540)={0x0, 0x1f777, &(0x7f0000000200)={&(0x7f00000008c0)=@newlink={0x50, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x50}}, 0x0) [ 607.210167][ T8907] ceph: No path or : separator in source 02:13:18 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) get_mempolicy(&(0x7f00000003c0), &(0x7f0000000400), 0x289, &(0x7f0000fef000/0x10000)=nil, 0x2) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="c6566ceda4e3f1c409e9515b62be0157ec2275042709d8548cb34a00665921c0c26bc59a07847331f37bc0ef75a5460fe26079bfc6bed87ef39b93f39b6bd4dea2a4b89759e1a77e64786f7d3c9ce12e6e7091ca71c3576afb000000000000000000", @ANYRES32, @ANYRES32=0x0, @ANYRESHEX=r1, @ANYRESDEC=r2], 0x5, 0x1) wait4(r1, 0x0, 0x40000000, &(0x7f0000000200)) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/tty/drivers\x00', 0x0, 0x0) read(r3, &(0x7f0000000280)=""/152, 0x20000318) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/tty/drivers\x00', 0x0, 0x0) read(r4, &(0x7f0000000280)=""/152, 0x20000318) ioctl$VIDIOC_QUERYBUF(r3, 0xc0585609, &(0x7f00000002c0)={0x0, 0x0, 0x4, 0x63d263814f78ec42, 0x401, {0x0, 0x2710}, {0x3, 0xc, 0x6, 0x0, 0x3, 0x9, "878b2cbe"}, 0x3, 0xb, @offset=0x8000, 0x400, 0x0, r4}) setsockopt$RDS_RECVERR(r5, 0x114, 0x5, &(0x7f0000000100), 0x4) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r6 = syz_open_dev$dri(&(0x7f00000001c0)='/dev/dri/card#\x00', 0x1, 0x0) mount(&(0x7f00000000c0)=ANY=[@ANYPTR64=&(0x7f0000000740)=ANY=[@ANYRESHEX=0x0, @ANYPTR, @ANYPTR64, @ANYBLOB="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", @ANYRESHEX=0x0, @ANYPTR64, @ANYRESHEX=r6, @ANYRES16=r0]], &(0x7f0000000180)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x6, 0x0) 02:13:18 executing program 3: r0 = socket$inet(0xa, 0x801, 0x84) sendto(r0, &(0x7f0000000080)="f5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r0, 0xfc0004) accept(r0, 0x0, 0x0) r1 = socket$inet(0xa, 0x801, 0x84) sendto(r1, &(0x7f0000000080)="d5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r1, 0xfc0004) accept(r1, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x4) writev(r2, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d36020a8447000b4e230f00000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff0ac7e5ed5e232e725839c97b910000", 0x104}], 0x1) 02:13:18 executing program 3: r0 = socket$inet(0xa, 0x801, 0x84) sendto(r0, &(0x7f0000000080)="f5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r0, 0xfc0004) accept(r0, 0x0, 0x0) r1 = socket$inet(0xa, 0x801, 0x84) sendto(r1, &(0x7f0000000080)="d5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r1, 0xfc0004) accept(r1, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x4) writev(r2, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d36020a8447000b4e230f00000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff0ec7e5ed5e232e725839c97b910000", 0x104}], 0x1) [ 607.530058][ T9028] ceph: No path or : separator in source [ 607.642002][ T9028] ceph: No path or : separator in source 02:13:19 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) get_mempolicy(&(0x7f00000003c0), &(0x7f0000000400), 0x289, &(0x7f0000fef000/0x10000)=nil, 0x2) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="c6566ceda4e3f1c409e9515b62be0157ec2275042709d8548cb34a00665921c0c26bc59a07847331f37bc0ef75a5460fe26079bfc6bed87ef39b93f39b6bd4dea2a4b89759e1a77e64786f7d3c9ce12e6e7091ca71c3576afb000000000000000000", @ANYRES32, @ANYRES32=0x0, @ANYRESHEX=r1, @ANYRESDEC=r2], 0x5, 0x1) wait4(r1, 0x0, 0x40000000, &(0x7f0000000200)) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/tty/drivers\x00', 0x0, 0x0) read(r3, &(0x7f0000000280)=""/152, 0x20000318) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/tty/drivers\x00', 0x0, 0x0) read(r4, &(0x7f0000000280)=""/152, 0x20000318) ioctl$VIDIOC_QUERYBUF(r3, 0xc0585609, &(0x7f00000002c0)={0x0, 0x0, 0x4, 0x63d263814f78ec42, 0x401, {0x0, 0x2710}, {0x3, 0xc, 0x6, 0x0, 0x3, 0x9, "878b2cbe"}, 0x3, 0xb, @offset=0x8000, 0x400, 0x0, r4}) setsockopt$RDS_RECVERR(r5, 0x114, 0x5, &(0x7f0000000100), 0x4) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r6 = syz_open_dev$dri(&(0x7f00000001c0)='/dev/dri/card#\x00', 0x1, 0x0) mount(&(0x7f00000000c0)=ANY=[@ANYPTR64=&(0x7f0000000740)=ANY=[@ANYRESHEX=0x0, @ANYPTR, @ANYPTR64, @ANYBLOB="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", @ANYRESHEX=0x0, @ANYPTR64, @ANYRESHEX=r6, @ANYRES16=r0]], &(0x7f0000000180)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x7, 0x0) [ 607.738155][ T9027] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. [ 607.762050][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 02:13:19 executing program 3: r0 = socket$inet(0xa, 0x801, 0x84) sendto(r0, &(0x7f0000000080)="f5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r0, 0xfc0004) accept(r0, 0x0, 0x0) r1 = socket$inet(0xa, 0x801, 0x84) sendto(r1, &(0x7f0000000080)="d5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r1, 0xfc0004) accept(r1, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x4) writev(r2, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d36020a8447000b4e230f00000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff0fc7e5ed5e232e725839c97b910000", 0x104}], 0x1) [ 607.854937][ T9030] bond173: (slave veth567): Enslaving as an active interface with an up link [ 607.869837][ T9027] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. [ 607.998854][ T9030] bond173: (slave veth569): Enslaving as an active interface with an up link 02:13:19 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r2 = gettid() process_vm_writev(r2, &(0x7f0000c22000)=[{&(0x7f000034afa4)=""/1, 0x1f80}], 0x2fd, &(0x7f0000c22fa0)=[{&(0x7f0000000080)=""/1, 0x2034afa5}], 0x1, 0x0) 02:13:19 executing program 3: r0 = socket$inet(0xa, 0x801, 0x84) sendto(r0, &(0x7f0000000080)="f5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r0, 0xfc0004) accept(r0, 0x0, 0x0) r1 = socket$inet(0xa, 0x801, 0x84) sendto(r1, &(0x7f0000000080)="d5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r1, 0xfc0004) accept(r1, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x4) writev(r2, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d36020a8447000b4e230f00000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff60c7e5ed5e232e725839c97b910000", 0x104}], 0x1) 02:13:19 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) get_mempolicy(&(0x7f00000003c0), &(0x7f0000000400), 0x289, &(0x7f0000fef000/0x10000)=nil, 0x2) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="c6566ceda4e3f1c409e9515b62be0157ec2275042709d8548cb34a00665921c0c26bc59a07847331f37bc0ef75a5460fe26079bfc6bed87ef39b93f39b6bd4dea2a4b89759e1a77e64786f7d3c9ce12e6e7091ca71c3576afb000000000000000000", @ANYRES32, @ANYRES32=0x0, @ANYRESHEX=r1, @ANYRESDEC=r2], 0x5, 0x1) wait4(r1, 0x0, 0x40000000, &(0x7f0000000200)) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/tty/drivers\x00', 0x0, 0x0) read(r3, &(0x7f0000000280)=""/152, 0x20000318) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/tty/drivers\x00', 0x0, 0x0) read(r4, &(0x7f0000000280)=""/152, 0x20000318) ioctl$VIDIOC_QUERYBUF(r3, 0xc0585609, &(0x7f00000002c0)={0x0, 0x0, 0x4, 0x63d263814f78ec42, 0x401, {0x0, 0x2710}, {0x3, 0xc, 0x6, 0x0, 0x3, 0x9, "878b2cbe"}, 0x3, 0xb, @offset=0x8000, 0x400, 0x0, r4}) setsockopt$RDS_RECVERR(r5, 0x114, 0x5, &(0x7f0000000100), 0x4) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r6 = syz_open_dev$dri(&(0x7f00000001c0)='/dev/dri/card#\x00', 0x1, 0x0) mount(&(0x7f00000000c0)=ANY=[@ANYPTR64=&(0x7f0000000740)=ANY=[@ANYRESHEX=0x0, @ANYPTR, @ANYPTR64, @ANYBLOB="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", @ANYRESHEX=0x0, @ANYPTR64, @ANYRESHEX=r6, @ANYRES16=r0]], &(0x7f0000000180)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x8, 0x0) 02:13:19 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000003c0)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) syz_open_procfs(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$DRM_IOCTL_SET_MASTER(0xffffffffffffffff, 0x641e) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VHOST_SET_LOG_FD(0xffffffffffffffff, 0x4004af07, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) recvfrom$inet6(r3, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0x0) shutdown(r3, 0x1) r4 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r4, &(0x7f00000000c0), 0xfffffdda, 0x16000000, 0x0, 0x0) 02:13:19 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @remote}}) write$tun(r0, &(0x7f0000000180)={@void, @val, @mpls={[], @ipv6=@icmpv6={0x6, 0x6, "9eef7b", 0x9, 0x3c, 0x0, @remote, @mcast2, {[], @echo_request={0x80, 0x0, 0x0, 0x0, 0x0, "81"}}}}}, 0x3b) 02:13:19 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=ANY=[@ANYBLOB="3c00000010008506000000000000000000200000", @ANYRES32=r3, @ANYBLOB="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"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000540)={0x0, 0x1f778, &(0x7f0000000200)={&(0x7f00000008c0)=@newlink={0x50, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x50}}, 0x0) [ 608.198274][ T9060] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. [ 608.251628][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 608.309999][ T9062] ceph: No path or : separator in source 02:13:19 executing program 3: r0 = socket$inet(0xa, 0x801, 0x84) sendto(r0, &(0x7f0000000080)="f5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r0, 0xfc0004) accept(r0, 0x0, 0x0) r1 = socket$inet(0xa, 0x801, 0x84) sendto(r1, &(0x7f0000000080)="d5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r1, 0xfc0004) accept(r1, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x4) writev(r2, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d36020a8447000b4e230f00000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffffbcc7e5ed5e232e725839c97b910000", 0x104}], 0x1) [ 608.397351][ T9062] ceph: No path or : separator in source [ 608.424160][ T9063] bond174: (slave veth571): Enslaving as an active interface with an up link 02:13:19 executing program 3: r0 = socket$inet(0xa, 0x801, 0x84) sendto(r0, &(0x7f0000000080)="f5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r0, 0xfc0004) accept(r0, 0x0, 0x0) r1 = socket$inet(0xa, 0x801, 0x84) sendto(r1, &(0x7f0000000080)="d5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r1, 0xfc0004) accept(r1, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x4) writev(r2, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d36020a8447000b4e230f00000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed5e232e725839c97b910200", 0x104}], 0x1) 02:13:19 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) get_mempolicy(&(0x7f00000003c0), &(0x7f0000000400), 0x289, &(0x7f0000fef000/0x10000)=nil, 0x2) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="c6566ceda4e3f1c409e9515b62be0157ec2275042709d8548cb34a00665921c0c26bc59a07847331f37bc0ef75a5460fe26079bfc6bed87ef39b93f39b6bd4dea2a4b89759e1a77e64786f7d3c9ce12e6e7091ca71c3576afb000000000000000000", @ANYRES32, @ANYRES32=0x0, @ANYRESHEX=r1, @ANYRESDEC=r2], 0x5, 0x1) wait4(r1, 0x0, 0x40000000, &(0x7f0000000200)) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/tty/drivers\x00', 0x0, 0x0) read(r3, &(0x7f0000000280)=""/152, 0x20000318) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/tty/drivers\x00', 0x0, 0x0) read(r4, &(0x7f0000000280)=""/152, 0x20000318) ioctl$VIDIOC_QUERYBUF(r3, 0xc0585609, &(0x7f00000002c0)={0x0, 0x0, 0x4, 0x63d263814f78ec42, 0x401, {0x0, 0x2710}, {0x3, 0xc, 0x6, 0x0, 0x3, 0x9, "878b2cbe"}, 0x3, 0xb, @offset=0x8000, 0x400, 0x0, r4}) setsockopt$RDS_RECVERR(r5, 0x114, 0x5, &(0x7f0000000100), 0x4) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r6 = syz_open_dev$dri(&(0x7f00000001c0)='/dev/dri/card#\x00', 0x1, 0x0) mount(&(0x7f00000000c0)=ANY=[@ANYPTR64=&(0x7f0000000740)=ANY=[@ANYRESHEX=0x0, @ANYPTR, @ANYPTR64, @ANYBLOB="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", @ANYRESHEX=0x0, @ANYPTR64, @ANYRESHEX=r6, @ANYRES16=r0]], &(0x7f0000000180)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x10, 0x0) 02:13:20 executing program 3: r0 = socket$inet(0xa, 0x801, 0x84) sendto(r0, &(0x7f0000000080)="f5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r0, 0xfc0004) accept(r0, 0x0, 0x0) r1 = socket$inet(0xa, 0x801, 0x84) sendto(r1, &(0x7f0000000080)="d5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r1, 0xfc0004) accept(r1, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x4) writev(r2, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d36020a8447000b4e230f00000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed5e232e725839c97b910400", 0x104}], 0x1) [ 608.734416][ T9184] ceph: No path or : separator in source [ 608.859634][ T9184] ceph: No path or : separator in source 02:13:20 executing program 3: r0 = socket$inet(0xa, 0x801, 0x84) sendto(r0, &(0x7f0000000080)="f5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r0, 0xfc0004) accept(r0, 0x0, 0x0) r1 = socket$inet(0xa, 0x801, 0x84) sendto(r1, &(0x7f0000000080)="d5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r1, 0xfc0004) accept(r1, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x4) writev(r2, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d36020a8447000b4e230f00000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed5e232e725839c97b910a00", 0x104}], 0x1) 02:13:20 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) get_mempolicy(&(0x7f00000003c0), &(0x7f0000000400), 0x289, &(0x7f0000fef000/0x10000)=nil, 0x2) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="c6566ceda4e3f1c409e9515b62be0157ec2275042709d8548cb34a00665921c0c26bc59a07847331f37bc0ef75a5460fe26079bfc6bed87ef39b93f39b6bd4dea2a4b89759e1a77e64786f7d3c9ce12e6e7091ca71c3576afb000000000000000000", @ANYRES32, @ANYRES32=0x0, @ANYRESHEX=r1, @ANYRESDEC=r2], 0x5, 0x1) wait4(r1, 0x0, 0x40000000, &(0x7f0000000200)) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/tty/drivers\x00', 0x0, 0x0) read(r3, &(0x7f0000000280)=""/152, 0x20000318) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/tty/drivers\x00', 0x0, 0x0) read(r4, &(0x7f0000000280)=""/152, 0x20000318) ioctl$VIDIOC_QUERYBUF(r3, 0xc0585609, &(0x7f00000002c0)={0x0, 0x0, 0x4, 0x63d263814f78ec42, 0x401, {0x0, 0x2710}, {0x3, 0xc, 0x6, 0x0, 0x3, 0x9, "878b2cbe"}, 0x3, 0xb, @offset=0x8000, 0x400, 0x0, r4}) setsockopt$RDS_RECVERR(r5, 0x114, 0x5, &(0x7f0000000100), 0x4) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r6 = syz_open_dev$dri(&(0x7f00000001c0)='/dev/dri/card#\x00', 0x1, 0x0) mount(&(0x7f00000000c0)=ANY=[@ANYPTR64=&(0x7f0000000740)=ANY=[@ANYRESHEX=0x0, @ANYPTR, @ANYPTR64, @ANYBLOB="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", @ANYRESHEX=0x0, @ANYPTR64, @ANYRESHEX=r6, @ANYRES16=r0]], &(0x7f0000000180)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x48, 0x0) [ 608.980370][ T9060] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. [ 609.147254][ T9063] bond174: (slave veth573): Enslaving as an active interface with an up link 02:13:20 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r2 = gettid() process_vm_writev(r2, &(0x7f0000c22000)=[{&(0x7f000034afa4)=""/1, 0x1f80}], 0x2fe, &(0x7f0000c22fa0)=[{&(0x7f0000000080)=""/1, 0x2034afa5}], 0x1, 0x0) 02:13:20 executing program 3: r0 = socket$inet(0xa, 0x801, 0x84) sendto(r0, &(0x7f0000000080)="f5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r0, 0xfc0004) accept(r0, 0x0, 0x0) r1 = socket$inet(0xa, 0x801, 0x84) sendto(r1, &(0x7f0000000080)="d5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r1, 0xfc0004) accept(r1, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x4) writev(r2, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d36020a8447000b4e230f00000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed5e232e725839c97b910e00", 0x104}], 0x1) 02:13:20 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=ANY=[@ANYBLOB="3c00000010008506000000000000000000200000", @ANYRES32=r3, @ANYBLOB="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"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000540)={0x0, 0x1f779, &(0x7f0000000200)={&(0x7f00000008c0)=@newlink={0x50, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x50}}, 0x0) 02:13:20 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000003c0)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) syz_open_procfs(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$DRM_IOCTL_SET_MASTER(0xffffffffffffffff, 0x641e) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VHOST_SET_LOG_FD(0xffffffffffffffff, 0x4004af07, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) recvfrom$inet6(r3, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0x0) shutdown(r3, 0x1) r4 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r4, &(0x7f00000000c0), 0xfffffdda, 0x1a000000, 0x0, 0x0) 02:13:20 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) get_mempolicy(&(0x7f00000003c0), &(0x7f0000000400), 0x289, &(0x7f0000fef000/0x10000)=nil, 0x2) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="c6566ceda4e3f1c409e9515b62be0157ec2275042709d8548cb34a00665921c0c26bc59a07847331f37bc0ef75a5460fe26079bfc6bed87ef39b93f39b6bd4dea2a4b89759e1a77e64786f7d3c9ce12e6e7091ca71c3576afb000000000000000000", @ANYRES32, @ANYRES32=0x0, @ANYRESHEX=r1, @ANYRESDEC=r2], 0x5, 0x1) wait4(r1, 0x0, 0x40000000, &(0x7f0000000200)) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/tty/drivers\x00', 0x0, 0x0) read(r3, &(0x7f0000000280)=""/152, 0x20000318) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/tty/drivers\x00', 0x0, 0x0) read(r4, &(0x7f0000000280)=""/152, 0x20000318) ioctl$VIDIOC_QUERYBUF(r3, 0xc0585609, &(0x7f00000002c0)={0x0, 0x0, 0x4, 0x63d263814f78ec42, 0x401, {0x0, 0x2710}, {0x3, 0xc, 0x6, 0x0, 0x3, 0x9, "878b2cbe"}, 0x3, 0xb, @offset=0x8000, 0x400, 0x0, r4}) setsockopt$RDS_RECVERR(r5, 0x114, 0x5, &(0x7f0000000100), 0x4) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r6 = syz_open_dev$dri(&(0x7f00000001c0)='/dev/dri/card#\x00', 0x1, 0x0) mount(&(0x7f00000000c0)=ANY=[@ANYPTR64=&(0x7f0000000740)=ANY=[@ANYRESHEX=0x0, @ANYPTR, @ANYPTR64, @ANYBLOB="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", @ANYRESHEX=0x0, @ANYPTR64, @ANYRESHEX=r6, @ANYRES16=r0]], &(0x7f0000000180)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x4c, 0x0) 02:13:20 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @remote}}) write$tun(r0, &(0x7f0000000180)={@void, @val, @mpls={[], @ipv6=@icmpv6={0x7, 0x6, "9eef7b", 0x9, 0x3c, 0x0, @remote, @mcast2, {[], @echo_request={0x80, 0x0, 0x0, 0x0, 0x0, "81"}}}}}, 0x3b) [ 609.486534][ T9217] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. [ 609.556934][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 02:13:20 executing program 3: r0 = socket$inet(0xa, 0x801, 0x84) sendto(r0, &(0x7f0000000080)="f5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r0, 0xfc0004) accept(r0, 0x0, 0x0) r1 = socket$inet(0xa, 0x801, 0x84) sendto(r1, &(0x7f0000000080)="d5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r1, 0xfc0004) accept(r1, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x4) writev(r2, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d36020a8447000b4e230f00000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed5e232e725839c97b910f00", 0x104}], 0x1) [ 609.734595][ T9224] bond175: (slave veth575): Enslaving as an active interface with an up link 02:13:21 executing program 3: r0 = socket$inet(0xa, 0x801, 0x84) sendto(r0, &(0x7f0000000080)="f5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r0, 0xfc0004) accept(r0, 0x0, 0x0) r1 = socket$inet(0xa, 0x801, 0x84) sendto(r1, &(0x7f0000000080)="d5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r1, 0xfc0004) accept(r1, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x4) writev(r2, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d36020a8447000b4e230f00000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed5e232e725839c97b916000", 0x104}], 0x1) 02:13:21 executing program 3: r0 = socket$inet(0xa, 0x801, 0x84) sendto(r0, &(0x7f0000000080)="f5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r0, 0xfc0004) accept(r0, 0x0, 0x0) r1 = socket$inet(0xa, 0x801, 0x84) sendto(r1, &(0x7f0000000080)="d5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r1, 0xfc0004) accept(r1, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x4) writev(r2, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d36020a8447000b4e230f00000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed5e232e725839c97b91bc00", 0x104}], 0x1) 02:13:21 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) get_mempolicy(&(0x7f00000003c0), &(0x7f0000000400), 0x289, &(0x7f0000fef000/0x10000)=nil, 0x2) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="c6566ceda4e3f1c409e9515b62be0157ec2275042709d8548cb34a00665921c0c26bc59a07847331f37bc0ef75a5460fe26079bfc6bed87ef39b93f39b6bd4dea2a4b89759e1a77e64786f7d3c9ce12e6e7091ca71c3576afb000000000000000000", @ANYRES32, @ANYRES32=0x0, @ANYRESHEX=r1, @ANYRESDEC=r2], 0x5, 0x1) wait4(r1, 0x0, 0x40000000, &(0x7f0000000200)) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/tty/drivers\x00', 0x0, 0x0) read(r3, &(0x7f0000000280)=""/152, 0x20000318) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/tty/drivers\x00', 0x0, 0x0) read(r4, &(0x7f0000000280)=""/152, 0x20000318) ioctl$VIDIOC_QUERYBUF(r3, 0xc0585609, &(0x7f00000002c0)={0x0, 0x0, 0x4, 0x63d263814f78ec42, 0x401, {0x0, 0x2710}, {0x3, 0xc, 0x6, 0x0, 0x3, 0x9, "878b2cbe"}, 0x3, 0xb, @offset=0x8000, 0x400, 0x0, r4}) setsockopt$RDS_RECVERR(r5, 0x114, 0x5, &(0x7f0000000100), 0x4) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r6 = syz_open_dev$dri(&(0x7f00000001c0)='/dev/dri/card#\x00', 0x1, 0x0) mount(&(0x7f00000000c0)=ANY=[@ANYPTR64=&(0x7f0000000740)=ANY=[@ANYRESHEX=0x0, @ANYPTR, @ANYPTR64, @ANYBLOB="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", @ANYRESHEX=0x0, @ANYPTR64, @ANYRESHEX=r6, @ANYRES16=r0]], &(0x7f0000000180)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x68, 0x0) 02:13:21 executing program 3: r0 = socket$inet(0xa, 0x801, 0x84) sendto(r0, &(0x7f0000000080)="f5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r0, 0xfc0004) accept(r0, 0x0, 0x0) r1 = socket$inet(0xa, 0x801, 0x84) sendto(r1, &(0x7f0000000080)="d5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r1, 0xfc0004) accept(r1, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x4) writev(r2, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d36020a8447000b4e230f00000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed5e232e725839c97b91f000", 0x104}], 0x1) 02:13:21 executing program 3: r0 = socket$inet(0xa, 0x801, 0x84) sendto(r0, &(0x7f0000000080)="f5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r0, 0xfc0004) accept(r0, 0x0, 0x0) r1 = socket$inet(0xa, 0x801, 0x84) sendto(r1, &(0x7f0000000080)="d5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r1, 0xfc0004) accept(r1, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x4) writev(r2, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d36020a8447000b4e230f00000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed5e232e725839c97b911f04", 0x104}], 0x1) [ 610.514500][ T9217] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. [ 610.571610][ T9224] bond175: (slave veth577): Enslaving as an active interface with an up link 02:13:22 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r2 = gettid() process_vm_writev(r2, &(0x7f0000c22000)=[{&(0x7f000034afa4)=""/1, 0x1f80}], 0x2ff, &(0x7f0000c22fa0)=[{&(0x7f0000000080)=""/1, 0x2034afa5}], 0x1, 0x0) 02:13:22 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000003c0)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) syz_open_procfs(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$DRM_IOCTL_SET_MASTER(0xffffffffffffffff, 0x641e) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VHOST_SET_LOG_FD(0xffffffffffffffff, 0x4004af07, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) recvfrom$inet6(r3, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0x0) shutdown(r3, 0x1) r4 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r4, &(0x7f00000000c0), 0xfffffdda, 0x1b000000, 0x0, 0x0) 02:13:22 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) get_mempolicy(&(0x7f00000003c0), &(0x7f0000000400), 0x289, &(0x7f0000fef000/0x10000)=nil, 0x2) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="c6566ceda4e3f1c409e9515b62be0157ec2275042709d8548cb34a00665921c0c26bc59a07847331f37bc0ef75a5460fe26079bfc6bed87ef39b93f39b6bd4dea2a4b89759e1a77e64786f7d3c9ce12e6e7091ca71c3576afb000000000000000000", @ANYRES32, @ANYRES32=0x0, @ANYRESHEX=r1, @ANYRESDEC=r2], 0x5, 0x1) wait4(r1, 0x0, 0x40000000, &(0x7f0000000200)) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/tty/drivers\x00', 0x0, 0x0) read(r3, &(0x7f0000000280)=""/152, 0x20000318) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/tty/drivers\x00', 0x0, 0x0) read(r4, &(0x7f0000000280)=""/152, 0x20000318) ioctl$VIDIOC_QUERYBUF(r3, 0xc0585609, &(0x7f00000002c0)={0x0, 0x0, 0x4, 0x63d263814f78ec42, 0x401, {0x0, 0x2710}, {0x3, 0xc, 0x6, 0x0, 0x3, 0x9, "878b2cbe"}, 0x3, 0xb, @offset=0x8000, 0x400, 0x0, r4}) setsockopt$RDS_RECVERR(r5, 0x114, 0x5, &(0x7f0000000100), 0x4) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r6 = syz_open_dev$dri(&(0x7f00000001c0)='/dev/dri/card#\x00', 0x1, 0x0) mount(&(0x7f00000000c0)=ANY=[@ANYPTR64=&(0x7f0000000740)=ANY=[@ANYRESHEX=0x0, @ANYPTR, @ANYPTR64, @ANYBLOB="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", @ANYRESHEX=0x0, @ANYPTR64, @ANYRESHEX=r6, @ANYRES16=r0]], &(0x7f0000000180)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x6c, 0x0) 02:13:22 executing program 3: r0 = socket$inet(0xa, 0x801, 0x84) sendto(r0, &(0x7f0000000080)="f5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r0, 0xfc0004) accept(r0, 0x0, 0x0) r1 = socket$inet(0xa, 0x801, 0x84) sendto(r1, &(0x7f0000000080)="d5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r1, 0xfc0004) accept(r1, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x4) writev(r2, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d36020a8447000b4e230f00000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed5e232e725839c97b91000a", 0x104}], 0x1) 02:13:22 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=ANY=[@ANYBLOB="3c00000010008506000000000000000000200000", @ANYRES32=r3, @ANYBLOB="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"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000540)={0x0, 0x1f77a, &(0x7f0000000200)={&(0x7f00000008c0)=@newlink={0x50, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x50}}, 0x0) [ 610.754701][ T9636] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. [ 610.766456][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 02:13:22 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @remote}}) write$tun(r0, &(0x7f0000000180)={@void, @val, @mpls={[], @ipv6=@icmpv6={0x8, 0x6, "9eef7b", 0x9, 0x3c, 0x0, @remote, @mcast2, {[], @echo_request={0x80, 0x0, 0x0, 0x0, 0x0, "81"}}}}}, 0x3b) 02:13:22 executing program 3: r0 = socket$inet(0xa, 0x801, 0x84) sendto(r0, &(0x7f0000000080)="f5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r0, 0xfc0004) accept(r0, 0x0, 0x0) r1 = socket$inet(0xa, 0x801, 0x84) sendto(r1, &(0x7f0000000080)="d5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r1, 0xfc0004) accept(r1, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x4) writev(r2, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d36020a8447000b4e230f00000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed5e232e725839c97b91000e", 0x104}], 0x1) [ 610.991591][ T9644] bond176: (slave veth579): Enslaving as an active interface with an up link 02:13:22 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) get_mempolicy(&(0x7f00000003c0), &(0x7f0000000400), 0x289, &(0x7f0000fef000/0x10000)=nil, 0x2) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="c6566ceda4e3f1c409e9515b62be0157ec2275042709d8548cb34a00665921c0c26bc59a07847331f37bc0ef75a5460fe26079bfc6bed87ef39b93f39b6bd4dea2a4b89759e1a77e64786f7d3c9ce12e6e7091ca71c3576afb000000000000000000", @ANYRES32, @ANYRES32=0x0, @ANYRESHEX=r1, @ANYRESDEC=r2], 0x5, 0x1) wait4(r1, 0x0, 0x40000000, &(0x7f0000000200)) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/tty/drivers\x00', 0x0, 0x0) read(r3, &(0x7f0000000280)=""/152, 0x20000318) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/tty/drivers\x00', 0x0, 0x0) read(r4, &(0x7f0000000280)=""/152, 0x20000318) ioctl$VIDIOC_QUERYBUF(r3, 0xc0585609, &(0x7f00000002c0)={0x0, 0x0, 0x4, 0x63d263814f78ec42, 0x401, {0x0, 0x2710}, {0x3, 0xc, 0x6, 0x0, 0x3, 0x9, "878b2cbe"}, 0x3, 0xb, @offset=0x8000, 0x400, 0x0, r4}) setsockopt$RDS_RECVERR(r5, 0x114, 0x5, &(0x7f0000000100), 0x4) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r6 = syz_open_dev$dri(&(0x7f00000001c0)='/dev/dri/card#\x00', 0x1, 0x0) mount(&(0x7f00000000c0)=ANY=[@ANYPTR64=&(0x7f0000000740)=ANY=[@ANYRESHEX=0x0, @ANYPTR, @ANYPTR64, @ANYBLOB="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", @ANYRESHEX=0x0, @ANYPTR64, @ANYRESHEX=r6, @ANYRES16=r0]], &(0x7f0000000180)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x74, 0x0) [ 611.068003][ T9636] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. 02:13:22 executing program 3: r0 = socket$inet(0xa, 0x801, 0x84) sendto(r0, &(0x7f0000000080)="f5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r0, 0xfc0004) accept(r0, 0x0, 0x0) r1 = socket$inet(0xa, 0x801, 0x84) sendto(r1, &(0x7f0000000080)="d5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r1, 0xfc0004) accept(r1, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x4) writev(r2, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d36020a8447000b4e230f00000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed5e232e725839c97b91c00e", 0x104}], 0x1) [ 611.179123][ T9644] bond176: (slave veth581): Enslaving as an active interface with an up link 02:13:22 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=ANY=[@ANYBLOB="3c00000010008506000000000000000000200000", @ANYRES32=r3, @ANYBLOB="fe000000000000001c0012000c000100626f6e6400000c0002000800010004000000b8aaf229d19e07fa27e19cdb41f3c39e1c530c8a20b6a9fe127726c243d7f374621b469127371bf17de09220927367b4f1296344846c3bc446955ce991bf484e3dd09935b91aa4de8a507f572a73649c4f95d6d7f9314a580c324bd6a406d53aae87a12b4588407e8ff59d05817ca2a9a3c5649653ffcca5e348e8af4e31c68b5e33d1bddafd3852cf3a31ea0c2843f7e1ff56d00261a99131dd98230bccf89e843da42c421f16c4a0f8a5a3966189d9c8b0eae35b2ae281fd146388a6beb30330de35293082f09e52361f2ba9acfc2677b569368a3f32dfc40b2ea49cfd1b1da4cddabab8889fb2167a7d1b985503375bf58a4f1f0983a1fc18f0b8a974b3372341c1ad56f39e69212b2074e9b3e90000"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000540)={0x0, 0x1f77b, &(0x7f0000000200)={&(0x7f00000008c0)=@newlink={0x50, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x50}}, 0x0) 02:13:22 executing program 3: r0 = socket$inet(0xa, 0x801, 0x84) sendto(r0, &(0x7f0000000080)="f5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r0, 0xfc0004) accept(r0, 0x0, 0x0) r1 = socket$inet(0xa, 0x801, 0x84) sendto(r1, &(0x7f0000000080)="d5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r1, 0xfc0004) accept(r1, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x4) writev(r2, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d36020a8447000b4e230f00000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed5e232e725839c97b91000f", 0x104}], 0x1) [ 611.377062][ T9775] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. 02:13:22 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @remote}}) write$tun(r0, &(0x7f0000000180)={@void, @val, @mpls={[], @ipv6=@icmpv6={0x0, 0x2, "9eef7b", 0x9, 0x3c, 0x0, @remote, @mcast2, {[], @echo_request={0x80, 0x0, 0x0, 0x0, 0x0, "81"}}}}}, 0x3b) [ 611.503244][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 611.555972][ T9778] bond177: (slave veth583): Enslaving as an active interface with an up link [ 611.580711][ T9775] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. [ 611.655232][ T9778] bond177: (slave veth585): Enslaving as an active interface with an up link 02:13:23 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r2 = gettid() process_vm_writev(r2, &(0x7f0000c22000)=[{&(0x7f000034afa4)=""/1, 0x1f80}], 0x300, &(0x7f0000c22fa0)=[{&(0x7f0000000080)=""/1, 0x2034afa5}], 0x1, 0x0) 02:13:23 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) get_mempolicy(&(0x7f00000003c0), &(0x7f0000000400), 0x289, &(0x7f0000fef000/0x10000)=nil, 0x2) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="c6566ceda4e3f1c409e9515b62be0157ec2275042709d8548cb34a00665921c0c26bc59a07847331f37bc0ef75a5460fe26079bfc6bed87ef39b93f39b6bd4dea2a4b89759e1a77e64786f7d3c9ce12e6e7091ca71c3576afb000000000000000000", @ANYRES32, @ANYRES32=0x0, @ANYRESHEX=r1, @ANYRESDEC=r2], 0x5, 0x1) wait4(r1, 0x0, 0x40000000, &(0x7f0000000200)) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/tty/drivers\x00', 0x0, 0x0) read(r3, &(0x7f0000000280)=""/152, 0x20000318) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/tty/drivers\x00', 0x0, 0x0) read(r4, &(0x7f0000000280)=""/152, 0x20000318) ioctl$VIDIOC_QUERYBUF(r3, 0xc0585609, &(0x7f00000002c0)={0x0, 0x0, 0x4, 0x63d263814f78ec42, 0x401, {0x0, 0x2710}, {0x3, 0xc, 0x6, 0x0, 0x3, 0x9, "878b2cbe"}, 0x3, 0xb, @offset=0x8000, 0x400, 0x0, r4}) setsockopt$RDS_RECVERR(r5, 0x114, 0x5, &(0x7f0000000100), 0x4) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r6 = syz_open_dev$dri(&(0x7f00000001c0)='/dev/dri/card#\x00', 0x1, 0x0) mount(&(0x7f00000000c0)=ANY=[@ANYPTR64=&(0x7f0000000740)=ANY=[@ANYRESHEX=0x0, @ANYPTR, @ANYPTR64, @ANYBLOB="974d3ab47b3b91beb0f4760669c8618bc33664faf9c8179efd568e4e4b38f30869aefe10a4ccb1c515487e645b4a11d7cd2fb39aa1efca7c1eb441061d2be4c165ca7304c2e94159863dcfcf75da45211fdd143b6c91d52ae9ac6a1c2f8173d8ee5682fc65a93dc45ead4a462d9e16ac3dff144c0fcc7d02fcf3fd3029b264f3550caaab22152365126be74a9ff91547eb273f83f2c2762b17b32d7d91ac013d6f5790d3bc09c1884d8c7f15be223a8c3b4e37186c641bc3501ca145f05e49aae1613402448c49a36a9b0055a9d5cc74edda0087d65f15d71e4e051cad208514ee99b6258f827a895d2eb4407e6b7b7a9d6bcc228e615d78a6a8b2c466d96a48ee2c7a736035e283917293271efdc7cbdf0a647917068ab197eec326359f829087bafd0fd95e5fcf645615f55040a847aab188c52f4dd3f61a15b2edfe22e6221a5b0b256f1d8da1e6b860b7c68213cc1fae88c0e86013d9000085216c3ee1ab6fd509500f038480929e335b4b3bb0150f881b831cc870de6d188bdd45a113989bc9d15fe2893ff94349", @ANYRESHEX=0x0, @ANYPTR64, @ANYRESHEX=r6, @ANYRES16=r0]], &(0x7f0000000180)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x7a, 0x0) 02:13:23 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000003c0)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) syz_open_procfs(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$DRM_IOCTL_SET_MASTER(0xffffffffffffffff, 0x641e) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VHOST_SET_LOG_FD(0xffffffffffffffff, 0x4004af07, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) recvfrom$inet6(r3, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0x0) shutdown(r3, 0x1) r4 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r4, &(0x7f00000000c0), 0xfffffdda, 0x1c000000, 0x0, 0x0) 02:13:23 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=ANY=[@ANYBLOB="3c00000010008506000000000000000000200000", @ANYRES32=r3, @ANYBLOB="fe000000000000001c0012000c000100626f6e6400000c0002000800010004000000b8aaf229d19e07fa27e19cdb41f3c39e1c530c8a20b6a9fe127726c243d7f374621b469127371bf17de09220927367b4f1296344846c3bc446955ce991bf484e3dd09935b91aa4de8a507f572a73649c4f95d6d7f9314a580c324bd6a406d53aae87a12b4588407e8ff59d05817ca2a9a3c5649653ffcca5e348e8af4e31c68b5e33d1bddafd3852cf3a31ea0c2843f7e1ff56d00261a99131dd98230bccf89e843da42c421f16c4a0f8a5a3966189d9c8b0eae35b2ae281fd146388a6beb30330de35293082f09e52361f2ba9acfc2677b569368a3f32dfc40b2ea49cfd1b1da4cddabab8889fb2167a7d1b985503375bf58a4f1f0983a1fc18f0b8a974b3372341c1ad56f39e69212b2074e9b3e90000"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000540)={0x0, 0x1f77c, &(0x7f0000000200)={&(0x7f00000008c0)=@newlink={0x50, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x50}}, 0x0) 02:13:23 executing program 3: r0 = socket$inet(0xa, 0x801, 0x84) sendto(r0, &(0x7f0000000080)="f5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r0, 0xfc0004) accept(r0, 0x0, 0x0) r1 = socket$inet(0xa, 0x801, 0x84) sendto(r1, &(0x7f0000000080)="d5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r1, 0xfc0004) accept(r1, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x4) writev(r2, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d36020a8447000b4e230f00000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed5e232e725839c97b91041f", 0x104}], 0x1) [ 611.989776][ T9803] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. [ 612.050274][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 02:13:23 executing program 3: r0 = socket$inet(0xa, 0x801, 0x84) sendto(r0, &(0x7f0000000080)="f5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r0, 0xfc0004) accept(r0, 0x0, 0x0) r1 = socket$inet(0xa, 0x801, 0x84) sendto(r1, &(0x7f0000000080)="d5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r1, 0xfc0004) accept(r1, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x4) writev(r2, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d36020a8447000b4e230f00000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed5e232e725839c97b91003f", 0x104}], 0x1) [ 612.261374][ T9807] bond178: (slave veth587): Enslaving as an active interface with an up link 02:13:23 executing program 3: r0 = socket$inet(0xa, 0x801, 0x84) sendto(r0, &(0x7f0000000080)="f5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r0, 0xfc0004) accept(r0, 0x0, 0x0) r1 = socket$inet(0xa, 0x801, 0x84) sendto(r1, &(0x7f0000000080)="d5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r1, 0xfc0004) accept(r1, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x4) writev(r2, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d36020a8447000b4e230f00000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed5e232e725839c97b910060", 0x104}], 0x1) 02:13:23 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) get_mempolicy(&(0x7f00000003c0), &(0x7f0000000400), 0x289, &(0x7f0000fef000/0x10000)=nil, 0x2) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="c6566ceda4e3f1c409e9515b62be0157ec2275042709d8548cb34a00665921c0c26bc59a07847331f37bc0ef75a5460fe26079bfc6bed87ef39b93f39b6bd4dea2a4b89759e1a77e64786f7d3c9ce12e6e7091ca71c3576afb000000000000000000", @ANYRES32, @ANYRES32=0x0, @ANYRESHEX=r1, @ANYRESDEC=r2], 0x5, 0x1) wait4(r1, 0x0, 0x40000000, &(0x7f0000000200)) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/tty/drivers\x00', 0x0, 0x0) read(r3, &(0x7f0000000280)=""/152, 0x20000318) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/tty/drivers\x00', 0x0, 0x0) read(r4, &(0x7f0000000280)=""/152, 0x20000318) ioctl$VIDIOC_QUERYBUF(r3, 0xc0585609, &(0x7f00000002c0)={0x0, 0x0, 0x4, 0x63d263814f78ec42, 0x401, {0x0, 0x2710}, {0x3, 0xc, 0x6, 0x0, 0x3, 0x9, "878b2cbe"}, 0x3, 0xb, @offset=0x8000, 0x400, 0x0, r4}) setsockopt$RDS_RECVERR(r5, 0x114, 0x5, &(0x7f0000000100), 0x4) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r6 = syz_open_dev$dri(&(0x7f00000001c0)='/dev/dri/card#\x00', 0x1, 0x0) mount(&(0x7f00000000c0)=ANY=[@ANYPTR64=&(0x7f0000000740)=ANY=[@ANYRESHEX=0x0, @ANYPTR, @ANYPTR64, @ANYBLOB="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", @ANYRESHEX=0x0, @ANYPTR64, @ANYRESHEX=r6, @ANYRES16=r0]], &(0x7f0000000180)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0xf0, 0x0) [ 612.446876][ T9803] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. [ 612.580968][ T9807] bond178: (slave veth589): Enslaving as an active interface with an up link 02:13:23 executing program 3: r0 = socket$inet(0xa, 0x801, 0x84) sendto(r0, &(0x7f0000000080)="f5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r0, 0xfc0004) accept(r0, 0x0, 0x0) r1 = socket$inet(0xa, 0x801, 0x84) sendto(r1, &(0x7f0000000080)="d5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r1, 0xfc0004) accept(r1, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x4) writev(r2, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d36020a8447000b4e230f00000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed5e232e725839c97b916a64", 0x104}], 0x1) 02:13:24 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=ANY=[@ANYBLOB="3c00000010008506000000000000000000200000", @ANYRES32=r3, @ANYBLOB="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"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000540)={0x0, 0x1f77d, &(0x7f0000000200)={&(0x7f00000008c0)=@newlink={0x50, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x50}}, 0x0) 02:13:24 executing program 3: r0 = socket$inet(0xa, 0x801, 0x84) sendto(r0, &(0x7f0000000080)="f5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r0, 0xfc0004) accept(r0, 0x0, 0x0) r1 = socket$inet(0xa, 0x801, 0x84) sendto(r1, &(0x7f0000000080)="d5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r1, 0xfc0004) accept(r1, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x4) writev(r2, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d36020a8447000b4e230f00000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed5e232e725839c97b91646a", 0x104}], 0x1) 02:13:24 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @remote}}) write$tun(r0, &(0x7f0000000180)={@void, @val, @mpls={[], @ipv6=@icmpv6={0x0, 0x3, "9eef7b", 0x9, 0x3c, 0x0, @remote, @mcast2, {[], @echo_request={0x80, 0x0, 0x0, 0x0, 0x0, "81"}}}}}, 0x3b) [ 612.837220][ T9943] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. 02:13:24 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r2 = gettid() process_vm_writev(r2, &(0x7f0000c22000)=[{&(0x7f000034afa4)=""/1, 0x1f80}], 0x301, &(0x7f0000c22fa0)=[{&(0x7f0000000080)=""/1, 0x2034afa5}], 0x1, 0x0) 02:13:24 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) get_mempolicy(&(0x7f00000003c0), &(0x7f0000000400), 0x289, &(0x7f0000fef000/0x10000)=nil, 0x2) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="c6566ceda4e3f1c409e9515b62be0157ec2275042709d8548cb34a00665921c0c26bc59a07847331f37bc0ef75a5460fe26079bfc6bed87ef39b93f39b6bd4dea2a4b89759e1a77e64786f7d3c9ce12e6e7091ca71c3576afb000000000000000000", @ANYRES32, @ANYRES32=0x0, @ANYRESHEX=r1, @ANYRESDEC=r2], 0x5, 0x1) wait4(r1, 0x0, 0x40000000, &(0x7f0000000200)) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/tty/drivers\x00', 0x0, 0x0) read(r3, &(0x7f0000000280)=""/152, 0x20000318) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/tty/drivers\x00', 0x0, 0x0) read(r4, &(0x7f0000000280)=""/152, 0x20000318) ioctl$VIDIOC_QUERYBUF(r3, 0xc0585609, &(0x7f00000002c0)={0x0, 0x0, 0x4, 0x63d263814f78ec42, 0x401, {0x0, 0x2710}, {0x3, 0xc, 0x6, 0x0, 0x3, 0x9, "878b2cbe"}, 0x3, 0xb, @offset=0x8000, 0x400, 0x0, r4}) setsockopt$RDS_RECVERR(r5, 0x114, 0x5, &(0x7f0000000100), 0x4) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r6 = syz_open_dev$dri(&(0x7f00000001c0)='/dev/dri/card#\x00', 0x1, 0x0) mount(&(0x7f00000000c0)=ANY=[@ANYPTR64=&(0x7f0000000740)=ANY=[@ANYRESHEX=0x0, @ANYPTR, @ANYPTR64, @ANYBLOB="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", @ANYRESHEX=0x0, @ANYPTR64, @ANYRESHEX=r6, @ANYRES16=r0]], &(0x7f0000000180)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x300, 0x0) 02:13:24 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000003c0)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) syz_open_procfs(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$DRM_IOCTL_SET_MASTER(0xffffffffffffffff, 0x641e) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VHOST_SET_LOG_FD(0xffffffffffffffff, 0x4004af07, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) recvfrom$inet6(r3, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0x0) shutdown(r3, 0x1) r4 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r4, &(0x7f00000000c0), 0xfffffdda, 0x1d100b64, 0x0, 0x0) [ 613.062181][ T9948] bond179: (slave veth591): Enslaving as an active interface with an up link [ 613.089305][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 613.116589][ T9943] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. 02:13:24 executing program 3: r0 = socket$inet(0xa, 0x801, 0x84) sendto(r0, &(0x7f0000000080)="f5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r0, 0xfc0004) accept(r0, 0x0, 0x0) r1 = socket$inet(0xa, 0x801, 0x84) sendto(r1, &(0x7f0000000080)="d5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r1, 0xfc0004) accept(r1, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x4) writev(r2, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d36020a8447000b4e230f00000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed5e232e725839c97b9100bc", 0x104}], 0x1) [ 613.229298][ T9948] bond179: (slave veth593): Enslaving as an active interface with an up link 02:13:24 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) get_mempolicy(&(0x7f00000003c0), &(0x7f0000000400), 0x289, &(0x7f0000fef000/0x10000)=nil, 0x2) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="c6566ceda4e3f1c409e9515b62be0157ec2275042709d8548cb34a00665921c0c26bc59a07847331f37bc0ef75a5460fe26079bfc6bed87ef39b93f39b6bd4dea2a4b89759e1a77e64786f7d3c9ce12e6e7091ca71c3576afb000000000000000000", @ANYRES32, @ANYRES32=0x0, @ANYRESHEX=r1, @ANYRESDEC=r2], 0x5, 0x1) wait4(r1, 0x0, 0x40000000, &(0x7f0000000200)) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/tty/drivers\x00', 0x0, 0x0) read(r3, &(0x7f0000000280)=""/152, 0x20000318) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/tty/drivers\x00', 0x0, 0x0) read(r4, &(0x7f0000000280)=""/152, 0x20000318) ioctl$VIDIOC_QUERYBUF(r3, 0xc0585609, &(0x7f00000002c0)={0x0, 0x0, 0x4, 0x63d263814f78ec42, 0x401, {0x0, 0x2710}, {0x3, 0xc, 0x6, 0x0, 0x3, 0x9, "878b2cbe"}, 0x3, 0xb, @offset=0x8000, 0x400, 0x0, r4}) setsockopt$RDS_RECVERR(r5, 0x114, 0x5, &(0x7f0000000100), 0x4) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r6 = syz_open_dev$dri(&(0x7f00000001c0)='/dev/dri/card#\x00', 0x1, 0x0) mount(&(0x7f00000000c0)=ANY=[@ANYPTR64=&(0x7f0000000740)=ANY=[@ANYRESHEX=0x0, @ANYPTR, @ANYPTR64, @ANYBLOB="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", @ANYRESHEX=0x0, @ANYPTR64, @ANYRESHEX=r6, @ANYRES16=r0]], &(0x7f0000000180)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x500, 0x0) 02:13:24 executing program 3: r0 = socket$inet(0xa, 0x801, 0x84) sendto(r0, &(0x7f0000000080)="f5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r0, 0xfc0004) accept(r0, 0x0, 0x0) r1 = socket$inet(0xa, 0x801, 0x84) sendto(r1, &(0x7f0000000080)="d5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r1, 0xfc0004) accept(r1, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x4) writev(r2, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d36020a8447000b4e230f00000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed5e232e725839c97b910ec0", 0x104}], 0x1) 02:13:24 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=ANY=[@ANYBLOB="3c00000010008506000000000000000000200000", @ANYRES32=r3, @ANYBLOB="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"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000540)={0x0, 0x1f77e, &(0x7f0000000200)={&(0x7f00000008c0)=@newlink={0x50, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x50}}, 0x0) [ 613.555538][T10172] ceph: No path or : separator in source 02:13:24 executing program 3: r0 = socket$inet(0xa, 0x801, 0x84) sendto(r0, &(0x7f0000000080)="f5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r0, 0xfc0004) accept(r0, 0x0, 0x0) r1 = socket$inet(0xa, 0x801, 0x84) sendto(r1, &(0x7f0000000080)="d5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r1, 0xfc0004) accept(r1, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x4) writev(r2, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d36020a8447000b4e230f00000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed5e232e725839c97b9100f0", 0x104}], 0x1) 02:13:25 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @remote}}) write$tun(r0, &(0x7f0000000180)={@void, @val, @mpls={[], @ipv6=@icmpv6={0x0, 0x4, "9eef7b", 0x9, 0x3c, 0x0, @remote, @mcast2, {[], @echo_request={0x80, 0x0, 0x0, 0x0, 0x0, "81"}}}}}, 0x3b) [ 613.714784][T10172] ceph: No path or : separator in source [ 613.751745][T10177] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. 02:13:25 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) get_mempolicy(&(0x7f00000003c0), &(0x7f0000000400), 0x289, &(0x7f0000fef000/0x10000)=nil, 0x2) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="c6566ceda4e3f1c409e9515b62be0157ec2275042709d8548cb34a00665921c0c26bc59a07847331f37bc0ef75a5460fe26079bfc6bed87ef39b93f39b6bd4dea2a4b89759e1a77e64786f7d3c9ce12e6e7091ca71c3576afb000000000000000000", @ANYRES32, @ANYRES32=0x0, @ANYRESHEX=r1, @ANYRESDEC=r2], 0x5, 0x1) wait4(r1, 0x0, 0x40000000, &(0x7f0000000200)) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/tty/drivers\x00', 0x0, 0x0) read(r3, &(0x7f0000000280)=""/152, 0x20000318) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/tty/drivers\x00', 0x0, 0x0) read(r4, &(0x7f0000000280)=""/152, 0x20000318) ioctl$VIDIOC_QUERYBUF(r3, 0xc0585609, &(0x7f00000002c0)={0x0, 0x0, 0x4, 0x63d263814f78ec42, 0x401, {0x0, 0x2710}, {0x3, 0xc, 0x6, 0x0, 0x3, 0x9, "878b2cbe"}, 0x3, 0xb, @offset=0x8000, 0x400, 0x0, r4}) setsockopt$RDS_RECVERR(r5, 0x114, 0x5, &(0x7f0000000100), 0x4) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r6 = syz_open_dev$dri(&(0x7f00000001c0)='/dev/dri/card#\x00', 0x1, 0x0) mount(&(0x7f00000000c0)=ANY=[@ANYPTR64=&(0x7f0000000740)=ANY=[@ANYRESHEX=0x0, @ANYPTR, @ANYPTR64, @ANYBLOB="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", @ANYRESHEX=0x0, @ANYPTR64, @ANYRESHEX=r6, @ANYRES16=r0]], &(0x7f0000000180)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x600, 0x0) 02:13:25 executing program 3: r0 = socket$inet(0xa, 0x801, 0x84) sendto(r0, &(0x7f0000000080)="f5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r0, 0xfc0004) accept(r0, 0x0, 0x0) r1 = socket$inet(0xa, 0x801, 0x84) sendto(r1, &(0x7f0000000080)="d5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r1, 0xfc0004) accept(r1, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x4) writev(r2, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d36020a8447000b4e230f00000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed5e232e725839c97b910040", 0x104}], 0x1) [ 613.882617][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 02:13:25 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000003c0)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) syz_open_procfs(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$DRM_IOCTL_SET_MASTER(0xffffffffffffffff, 0x641e) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VHOST_SET_LOG_FD(0xffffffffffffffff, 0x4004af07, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) recvfrom$inet6(r3, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0x0) shutdown(r3, 0x1) r4 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r4, &(0x7f00000000c0), 0xfffffdda, 0x30750000, 0x0, 0x0) [ 613.954604][T10180] bond180: (slave veth595): Enslaving as an active interface with an up link [ 614.064803][T10177] bond180: (slave veth597): Enslaving as an active interface with an up link [ 614.089872][T10199] ceph: No path or : separator in source [ 614.172452][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 02:13:25 executing program 3: r0 = socket$inet(0xa, 0x801, 0x84) sendto(r0, &(0x7f0000000080)="f5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r0, 0xfc0004) accept(r0, 0x0, 0x0) r1 = socket$inet(0xa, 0x801, 0x84) sendto(r1, &(0x7f0000000080)="d5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r1, 0xfc0004) accept(r1, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x4) writev(r2, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d36020a8447000b4e230f00000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed5e232e725839c97b910003", 0x104}], 0x1) 02:13:25 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=ANY=[@ANYBLOB="3c00000010008506000000000000000000200000", @ANYRES32=r3, @ANYBLOB="fe000000000000001c0012000c000100626f6e6400000c0002000800010004000000b8aaf229d19e07fa27e19cdb41f3c39e1c530c8a20b6a9fe127726c243d7f374621b469127371bf17de09220927367b4f1296344846c3bc446955ce991bf484e3dd09935b91aa4de8a507f572a73649c4f95d6d7f9314a580c324bd6a406d53aae87a12b4588407e8ff59d05817ca2a9a3c5649653ffcca5e348e8af4e31c68b5e33d1bddafd3852cf3a31ea0c2843f7e1ff56d00261a99131dd98230bccf89e843da42c421f16c4a0f8a5a3966189d9c8b0eae35b2ae281fd146388a6beb30330de35293082f09e52361f2ba9acfc2677b569368a3f32dfc40b2ea49cfd1b1da4cddabab8889fb2167a7d1b985503375bf58a4f1f0983a1fc18f0b8a974b3372341c1ad56f39e69212b2074e9b3e90000"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000540)={0x0, 0x1f77f, &(0x7f0000000200)={&(0x7f00000008c0)=@newlink={0x50, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x50}}, 0x0) 02:13:25 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r2 = gettid() process_vm_writev(r2, &(0x7f0000c22000)=[{&(0x7f000034afa4)=""/1, 0x1f80}], 0x302, &(0x7f0000c22fa0)=[{&(0x7f0000000080)=""/1, 0x2034afa5}], 0x1, 0x0) [ 614.225043][T10199] ceph: No path or : separator in source 02:13:25 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) get_mempolicy(&(0x7f00000003c0), &(0x7f0000000400), 0x289, &(0x7f0000fef000/0x10000)=nil, 0x2) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="c6566ceda4e3f1c409e9515b62be0157ec2275042709d8548cb34a00665921c0c26bc59a07847331f37bc0ef75a5460fe26079bfc6bed87ef39b93f39b6bd4dea2a4b89759e1a77e64786f7d3c9ce12e6e7091ca71c3576afb000000000000000000", @ANYRES32, @ANYRES32=0x0, @ANYRESHEX=r1, @ANYRESDEC=r2], 0x5, 0x1) wait4(r1, 0x0, 0x40000000, &(0x7f0000000200)) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/tty/drivers\x00', 0x0, 0x0) read(r3, &(0x7f0000000280)=""/152, 0x20000318) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/tty/drivers\x00', 0x0, 0x0) read(r4, &(0x7f0000000280)=""/152, 0x20000318) ioctl$VIDIOC_QUERYBUF(r3, 0xc0585609, &(0x7f00000002c0)={0x0, 0x0, 0x4, 0x63d263814f78ec42, 0x401, {0x0, 0x2710}, {0x3, 0xc, 0x6, 0x0, 0x3, 0x9, "878b2cbe"}, 0x3, 0xb, @offset=0x8000, 0x400, 0x0, r4}) setsockopt$RDS_RECVERR(r5, 0x114, 0x5, &(0x7f0000000100), 0x4) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r6 = syz_open_dev$dri(&(0x7f00000001c0)='/dev/dri/card#\x00', 0x1, 0x0) mount(&(0x7f00000000c0)=ANY=[@ANYPTR64=&(0x7f0000000740)=ANY=[@ANYRESHEX=0x0, @ANYPTR, @ANYPTR64, @ANYBLOB="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", @ANYRESHEX=0x0, @ANYPTR64, @ANYRESHEX=r6, @ANYRES16=r0]], &(0x7f0000000180)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x700, 0x0) 02:13:25 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @remote}}) write$tun(r0, &(0x7f0000000180)={@void, @val, @mpls={[], @ipv6=@icmpv6={0x0, 0x5, "9eef7b", 0x9, 0x3c, 0x0, @remote, @mcast2, {[], @echo_request={0x80, 0x0, 0x0, 0x0, 0x0, "81"}}}}}, 0x3b) 02:13:25 executing program 3: r0 = socket$inet(0xa, 0x801, 0x84) sendto(r0, &(0x7f0000000080)="f5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r0, 0xfc0004) accept(r0, 0x0, 0x0) r1 = socket$inet(0xa, 0x801, 0x84) sendto(r1, &(0x7f0000000080)="d5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r1, 0xfc0004) accept(r1, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x4) writev(r2, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d36020a8447000b4e230f00000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed5e232e725839c97b91ffff", 0x104}], 0x1) [ 614.552098][T10331] ceph: No path or : separator in source [ 614.585361][T10335] bond181: (slave veth599): Enslaving as an active interface with an up link [ 614.694976][T10326] bond181: (slave veth601): Enslaving as an active interface with an up link 02:13:26 executing program 3: r0 = socket$inet(0xa, 0x801, 0x84) sendto(r0, &(0x7f0000000080)="f5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r0, 0xfc0004) accept(r0, 0x0, 0x0) r1 = socket$inet(0xa, 0x801, 0x84) sendto(r1, &(0x7f0000000080)="d5", 0x1, 0x0, &(0x7f0000000100)=@generic={0xa, "6a64c974246412fdb7e4937f9442856bb59c929ee4a4d8ed023d4fb8c157aefef87528417a5dbb266c1215687e3a3e7cac9293f2c6dffd1fb0bc81692c0a16348217ea1350bab263aea5aec5295a7daf06e02021d0ce17fa039ec38c86840a6dabc8024e80511492c3c476ff0173c6ec799414bcb3331ed847386283e44a"}, 0x80) listen(r1, 0xfc0004) accept(r1, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x4) writev(r2, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d36020a8447000b4e230f00000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed5e232e725839c97b910000", 0x104}], 0x1) 02:13:26 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=ANY=[@ANYBLOB="3c00000010008506000000000000000000200000", @ANYRES32=r3, @ANYBLOB="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"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000540)={0x0, 0x1f780, &(0x7f0000000200)={&(0x7f00000008c0)=@newlink={0x50, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x50}}, 0x0) 02:13:26 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) get_mempolicy(&(0x7f00000003c0), &(0x7f0000000400), 0x289, &(0x7f0000fef000/0x10000)=nil, 0x2) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="c6566ceda4e3f1c409e9515b62be0157ec2275042709d8548cb34a00665921c0c26bc59a07847331f37bc0ef75a5460fe26079bfc6bed87ef39b93f39b6bd4dea2a4b89759e1a77e64786f7d3c9ce12e6e7091ca71c3576afb000000000000000000", @ANYRES32, @ANYRES32=0x0, @ANYRESHEX=r1, @ANYRESDEC=r2], 0x5, 0x1) wait4(r1, 0x0, 0x40000000, &(0x7f0000000200)) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/tty/drivers\x00', 0x0, 0x0) read(r3, &(0x7f0000000280)=""/152, 0x20000318) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/tty/drivers\x00', 0x0, 0x0) read(r4, &(0x7f0000000280)=""/152, 0x20000318) ioctl$VIDIOC_QUERYBUF(r3, 0xc0585609, &(0x7f00000002c0)={0x0, 0x0, 0x4, 0x63d263814f78ec42, 0x401, {0x0, 0x2710}, {0x3, 0xc, 0x6, 0x0, 0x3, 0x9, "878b2cbe"}, 0x3, 0xb, @offset=0x8000, 0x400, 0x0, r4}) setsockopt$RDS_RECVERR(r5, 0x114, 0x5, &(0x7f0000000100), 0x4) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r6 = syz_open_dev$dri(&(0x7f00000001c0)='/dev/dri/card#\x00', 0x1, 0x0) mount(&(0x7f00000000c0)=ANY=[@ANYPTR64=&(0x7f0000000740)=ANY=[@ANYRESHEX=0x0, @ANYPTR, @ANYPTR64, @ANYBLOB="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", @ANYRESHEX=0x0, @ANYPTR64, @ANYRESHEX=r6, @ANYRES16=r0]], &(0x7f0000000180)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x1020, 0x0) 02:13:26 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @remote}}) write$tun(r0, &(0x7f0000000180)={@void, @val, @mpls={[], @ipv6=@icmpv6={0x0, 0x8, "9eef7b", 0x9, 0x3c, 0x0, @remote, @mcast2, {[], @echo_request={0x80, 0x0, 0x0, 0x0, 0x0, "81"}}}}}, 0x3b) [ 614.919688][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 02:13:26 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r2 = gettid() process_vm_writev(r2, &(0x7f0000c22000)=[{&(0x7f000034afa4)=""/1, 0x1f80}], 0x303, &(0x7f0000c22fa0)=[{&(0x7f0000000080)=""/1, 0x2034afa5}], 0x1, 0x0) 02:13:26 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000003c0)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) syz_open_procfs(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$DRM_IOCTL_SET_MASTER(0xffffffffffffffff, 0x641e) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VHOST_SET_LOG_FD(0xffffffffffffffff, 0x4004af07, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) recvfrom$inet6(r3, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0x0) shutdown(r3, 0x1) r4 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r4, &(0x7f00000000c0), 0xfffffdda, 0x3f000000, 0x0, 0x0) [ 615.044509][T10572] bond182: (slave veth603): Enslaving as an active interface with an up link [ 615.112011][T10593] ================================================================== [ 615.120129][T10593] BUG: KASAN: use-after-free in __lock_acquire+0x3a8b/0x4a00 [ 615.127502][T10593] Read of size 8 at addr ffff8880a897d360 by task syz-executor.3/10593 [ 615.135733][T10593] [ 615.138077][T10593] CPU: 1 PID: 10593 Comm: syz-executor.3 Not tainted 5.6.0-rc1-syzkaller #0 [ 615.146831][T10593] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 615.156892][T10593] Call Trace: [ 615.160211][T10593] dump_stack+0x197/0x210 [ 615.164573][T10593] ? __lock_acquire+0x3a8b/0x4a00 [ 615.169626][T10593] print_address_description.constprop.0.cold+0xd4/0x30b [ 615.176658][T10593] ? __lock_acquire+0x3a8b/0x4a00 [ 615.181688][T10593] ? __lock_acquire+0x3a8b/0x4a00 [ 615.186822][T10593] __kasan_report.cold+0x1b/0x32 [ 615.191766][T10593] ? __lock_acquire+0x3a8b/0x4a00 [ 615.196811][T10593] kasan_report+0x12/0x20 [ 615.201151][T10593] __asan_report_load8_noabort+0x14/0x20 [ 615.206791][T10593] __lock_acquire+0x3a8b/0x4a00 [ 615.211909][T10593] ? put_task_struct_rcu_user+0x8f/0xc0 [ 615.217466][T10593] ? finish_task_switch+0x526/0x750 [ 615.222671][T10593] ? mark_held_locks+0xf0/0xf0 [ 615.227441][T10593] ? __schedule+0x93c/0x1f90 [ 615.232040][T10593] lock_acquire+0x190/0x410 [ 615.236555][T10593] ? __lock_sock+0x16d/0x290 [ 615.241155][T10593] _raw_spin_lock_bh+0x33/0x50 [ 615.245924][T10593] ? __lock_sock+0x16d/0x290 [ 615.250635][T10593] __lock_sock+0x16d/0x290 [ 615.255196][T10593] ? __sk_dst_check+0x2e0/0x2e0 [ 615.260057][T10593] ? finish_wait+0x260/0x260 [ 615.264664][T10593] lock_sock_nested+0xfe/0x120 [ 615.269533][T10593] sctp_sock_dump+0x122/0xb20 [ 615.274281][T10593] sctp_for_each_transport+0x2b4/0x350 [ 615.279746][T10593] ? sctp_tsp_dump_one+0x690/0x690 [ 615.284859][T10593] ? sctp_v6_copy_ip_options.cold+0x28/0x28 [ 615.290756][T10593] ? sctp_transport_get_next+0x150/0x150 [ 615.296397][T10593] ? sctp_for_each_endpoint+0x131/0x1c0 [ 615.298510][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 615.301947][T10593] ? _raw_read_unlock_bh+0x2c/0x30 [ 615.301964][T10593] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 615.301977][T10593] ? sctp_for_each_endpoint+0x166/0x1c0 [ 615.301997][T10593] sctp_diag_dump+0x33e/0x450 [ 615.334027][T10593] ? sctp_diag_dump_one+0x4d0/0x4d0 [ 615.339231][T10593] ? kasan_kmalloc+0x9/0x10 [ 615.343741][T10593] ? __kmalloc_node_track_caller+0x4e/0x70 [ 615.349562][T10593] ? mutex_lock_nested+0x16/0x20 [ 615.354577][T10593] __inet_diag_dump+0x9e/0x130 [ 615.359346][T10593] inet_diag_dump+0x9b/0x110 [ 615.363946][T10593] netlink_dump+0x558/0xfb0 [ 615.368462][T10593] ? __netlink_sendskb+0xc0/0xc0 [ 615.373410][T10593] __netlink_dump_start+0x673/0x930 [ 615.378724][T10593] inet_diag_handler_cmd+0x262/0x320 [ 615.384018][T10593] ? inet_diag_rcv_msg_compat+0x350/0x350 [ 615.389802][T10593] ? sock_diag_rcv+0x1c/0x40 [ 615.394403][T10593] ? inet_diag_dump_compat+0x320/0x320 [ 615.399878][T10593] sock_diag_rcv_msg+0x319/0x410 [ 615.404831][T10593] netlink_rcv_skb+0x177/0x450 [ 615.409598][T10593] ? sock_diag_bind+0x80/0x80 [ 615.414278][T10593] ? netlink_ack+0xb50/0xb50 [ 615.418877][T10593] ? __kasan_check_read+0x11/0x20 [ 615.423917][T10593] sock_diag_rcv+0x2b/0x40 [ 615.428343][T10593] netlink_unicast+0x59e/0x7e0 [ 615.433120][T10593] ? netlink_attachskb+0x870/0x870 [ 615.438375][T10593] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 615.444107][T10593] ? __check_object_size+0x3d/0x437 [ 615.449324][T10593] netlink_sendmsg+0x91c/0xea0 [ 615.454101][T10593] ? netlink_unicast+0x7e0/0x7e0 [ 615.459048][T10593] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 615.464613][T10593] ? apparmor_socket_sendmsg+0x2a/0x30 [ 615.470084][T10593] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 615.476335][T10593] ? security_socket_sendmsg+0x8d/0xc0 [ 615.481810][T10593] ? netlink_unicast+0x7e0/0x7e0 [ 615.486755][T10593] sock_sendmsg+0xd7/0x130 [ 615.491180][T10593] sock_write_iter+0x2cb/0x400 [ 615.495951][T10593] ? sock_sendmsg+0x130/0x130 [ 615.500647][T10593] ? common_file_perm+0x2f3/0x940 [ 615.505690][T10593] do_iter_readv_writev+0x5f8/0x8f0 [ 615.510912][T10593] ? no_seek_end_llseek_size+0x70/0x70 [ 615.516381][T10593] ? apparmor_file_permission+0x27/0x30 [ 615.521938][T10593] ? rw_verify_area+0x126/0x360 [ 615.526794][T10593] do_iter_write+0x184/0x610 [ 615.531388][T10593] ? dup_iter+0x260/0x260 [ 615.535753][T10593] vfs_writev+0x1b3/0x2f0 [ 615.540095][T10593] ? vfs_iter_write+0xb0/0xb0 [ 615.544866][T10593] ? __kasan_check_read+0x11/0x20 [ 615.549904][T10593] ? ksys_dup3+0x3e0/0x3e0 [ 615.554327][T10593] ? __kasan_check_read+0x11/0x20 [ 615.559354][T10593] ? __fget_light+0x1ad/0x270 02:13:26 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) get_mempolicy(&(0x7f00000003c0), &(0x7f0000000400), 0x289, &(0x7f0000fef000/0x10000)=nil, 0x2) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="c6566ceda4e3f1c409e9515b62be0157ec2275042709d8548cb34a00665921c0c26bc59a07847331f37bc0ef75a5460fe26079bfc6bed87ef39b93f39b6bd4dea2a4b89759e1a77e64786f7d3c9ce12e6e7091ca71c3576afb000000000000000000", @ANYRES32, @ANYRES32=0x0, @ANYRESHEX=r1, @ANYRESDEC=r2], 0x5, 0x1) wait4(r1, 0x0, 0x40000000, &(0x7f0000000200)) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/tty/drivers\x00', 0x0, 0x0) read(r3, &(0x7f0000000280)=""/152, 0x20000318) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/tty/drivers\x00', 0x0, 0x0) read(r4, &(0x7f0000000280)=""/152, 0x20000318) ioctl$VIDIOC_QUERYBUF(r3, 0xc0585609, &(0x7f00000002c0)={0x0, 0x0, 0x4, 0x63d263814f78ec42, 0x401, {0x0, 0x2710}, {0x3, 0xc, 0x6, 0x0, 0x3, 0x9, "878b2cbe"}, 0x3, 0xb, @offset=0x8000, 0x400, 0x0, r4}) setsockopt$RDS_RECVERR(r5, 0x114, 0x5, &(0x7f0000000100), 0x4) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r6 = syz_open_dev$dri(&(0x7f00000001c0)='/dev/dri/card#\x00', 0x1, 0x0) mount(&(0x7f00000000c0)=ANY=[@ANYPTR64=&(0x7f0000000740)=ANY=[@ANYRESHEX=0x0, @ANYPTR, @ANYPTR64, @ANYBLOB="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", @ANYRESHEX=0x0, @ANYPTR64, @ANYRESHEX=r6, @ANYRES16=r0]], &(0x7f0000000180)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x2000, 0x0) [ 615.564038][T10593] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 615.570290][T10593] do_writev+0x2b0/0x330 [ 615.574540][T10593] ? vfs_writev+0x2f0/0x2f0 [ 615.579047][T10593] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 615.584513][T10593] ? do_syscall_64+0x26/0x790 [ 615.589192][T10593] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 615.595260][T10593] ? do_syscall_64+0x26/0x790 [ 615.599943][T10593] __x64_sys_writev+0x75/0xb0 [ 615.604625][T10593] do_syscall_64+0xfa/0x790 02:13:26 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) get_mempolicy(&(0x7f00000003c0), &(0x7f0000000400), 0x289, &(0x7f0000fef000/0x10000)=nil, 0x2) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="c6566ceda4e3f1c409e9515b62be0157ec2275042709d8548cb34a00665921c0c26bc59a07847331f37bc0ef75a5460fe26079bfc6bed87ef39b93f39b6bd4dea2a4b89759e1a77e64786f7d3c9ce12e6e7091ca71c3576afb000000000000000000", @ANYRES32, @ANYRES32=0x0, @ANYRESHEX=r1, @ANYRESDEC=r2], 0x5, 0x1) wait4(r1, 0x0, 0x40000000, &(0x7f0000000200)) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/tty/drivers\x00', 0x0, 0x0) read(r3, &(0x7f0000000280)=""/152, 0x20000318) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/tty/drivers\x00', 0x0, 0x0) read(r4, &(0x7f0000000280)=""/152, 0x20000318) ioctl$VIDIOC_QUERYBUF(r3, 0xc0585609, &(0x7f00000002c0)={0x0, 0x0, 0x4, 0x63d263814f78ec42, 0x401, {0x0, 0x2710}, {0x3, 0xc, 0x6, 0x0, 0x3, 0x9, "878b2cbe"}, 0x3, 0xb, @offset=0x8000, 0x400, 0x0, r4}) setsockopt$RDS_RECVERR(r5, 0x114, 0x5, &(0x7f0000000100), 0x4) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r6 = syz_open_dev$dri(&(0x7f00000001c0)='/dev/dri/card#\x00', 0x1, 0x0) mount(&(0x7f00000000c0)=ANY=[@ANYPTR64=&(0x7f0000000740)=ANY=[@ANYRESHEX=0x0, @ANYPTR, @ANYPTR64, @ANYBLOB="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", @ANYRESHEX=0x0, @ANYPTR64, @ANYRESHEX=r6, @ANYRES16=r0]], &(0x7f0000000180)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x2010, 0x0) [ 615.609134][T10593] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 615.615024][T10593] RIP: 0033:0x45c6c9 [ 615.618923][T10593] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 615.638531][T10593] RSP: 002b:00007efebd492c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000014 [ 615.646945][T10593] RAX: ffffffffffffffda RBX: 00007efebd4936d4 RCX: 000000000045c6c9 [ 615.654921][T10593] RDX: 0000000000000001 RSI: 0000000020000000 RDI: 0000000000000007 [ 615.662892][T10593] RBP: 000000000076c118 R08: 0000000000000000 R09: 0000000000000000 [ 615.670864][T10593] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 615.678861][T10593] R13: 0000000000000cde R14: 00000000004cafe2 R15: 000000000076c124 [ 615.686838][T10593] [ 615.689166][T10593] Allocated by task 10576: [ 615.693590][T10593] save_stack+0x23/0x90 [ 615.697749][T10593] __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 615.703385][T10593] kasan_slab_alloc+0xf/0x20 [ 615.707979][T10593] kmem_cache_alloc+0x121/0x710 [ 615.712831][T10593] sk_prot_alloc+0x67/0x310 [ 615.717511][T10593] sk_alloc+0x39/0xfd0 [ 615.721583][T10593] inet6_create+0x35b/0xf80 [ 615.726090][T10593] __sock_create+0x3ce/0x730 [ 615.730685][T10593] __sys_socket+0x103/0x220 [ 615.735193][T10593] __x64_sys_socket+0x73/0xb0 [ 615.739872][T10593] do_syscall_64+0xfa/0x790 [ 615.744378][T10593] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 615.750268][T10593] [ 615.752588][T10593] Freed by task 10568: [ 615.756666][T10593] save_stack+0x23/0x90 [ 615.760825][T10593] __kasan_slab_free+0x102/0x150 [ 615.765770][T10593] kasan_slab_free+0xe/0x10 [ 615.770278][T10593] kmem_cache_free+0x86/0x320 [ 615.774964][T10593] __sk_destruct+0x4e6/0x7f0 [ 615.779557][T10593] sk_destruct+0xd5/0x110 [ 615.783885][T10593] __sk_free+0xfb/0x3f0 [ 615.788043][T10593] sk_free+0x83/0xb0 [ 615.791943][T10593] sctp_close+0x7c4/0x960 [ 615.796310][T10593] inet_release+0xed/0x200 [ 615.800732][T10593] inet6_release+0x53/0x80 [ 615.805357][T10593] __sock_release+0xce/0x280 [ 615.809944][T10593] sock_close+0x1e/0x30 02:13:27 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) get_mempolicy(&(0x7f00000003c0), &(0x7f0000000400), 0x289, &(0x7f0000fef000/0x10000)=nil, 0x2) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="c6566ceda4e3f1c409e9515b62be0157ec2275042709d8548cb34a00665921c0c26bc59a07847331f37bc0ef75a5460fe26079bfc6bed87ef39b93f39b6bd4dea2a4b89759e1a77e64786f7d3c9ce12e6e7091ca71c3576afb000000000000000000", @ANYRES32, @ANYRES32=0x0, @ANYRESHEX=r1, @ANYRESDEC=r2], 0x5, 0x1) wait4(r1, 0x0, 0x40000000, &(0x7f0000000200)) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/tty/drivers\x00', 0x0, 0x0) read(r3, &(0x7f0000000280)=""/152, 0x20000318) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/tty/drivers\x00', 0x0, 0x0) read(r4, &(0x7f0000000280)=""/152, 0x20000318) ioctl$VIDIOC_QUERYBUF(r3, 0xc0585609, &(0x7f00000002c0)={0x0, 0x0, 0x4, 0x63d263814f78ec42, 0x401, {0x0, 0x2710}, {0x3, 0xc, 0x6, 0x0, 0x3, 0x9, "878b2cbe"}, 0x3, 0xb, @offset=0x8000, 0x400, 0x0, r4}) setsockopt$RDS_RECVERR(r5, 0x114, 0x5, &(0x7f0000000100), 0x4) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r6 = syz_open_dev$dri(&(0x7f00000001c0)='/dev/dri/card#\x00', 0x1, 0x0) mount(&(0x7f00000000c0)=ANY=[@ANYPTR64=&(0x7f0000000740)=ANY=[@ANYRESHEX=0x0, @ANYPTR, @ANYPTR64, @ANYBLOB="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", @ANYRESHEX=0x0, @ANYPTR64, @ANYRESHEX=r6, @ANYRES16=r0]], &(0x7f0000000180)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x4800, 0x0) [ 615.814101][T10593] __fput+0x2ff/0x890 [ 615.818088][T10593] ____fput+0x16/0x20 [ 615.822213][T10593] task_work_run+0x145/0x1c0 [ 615.826868][T10593] get_signal+0x206e/0x24f0 [ 615.831418][T10593] do_signal+0x87/0x1700 [ 615.835762][T10593] exit_to_usermode_loop+0x286/0x380 [ 615.841086][T10593] do_syscall_64+0x676/0x790 [ 615.845683][T10593] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 615.851568][T10593] [ 615.853907][T10593] The buggy address belongs to the object at ffff8880a897d2c0 [ 615.853907][T10593] which belongs to the cache SCTPv6(60:syz3) of size 1960 [ 615.868398][T10593] The buggy address is located 160 bytes inside of [ 615.868398][T10593] 1960-byte region [ffff8880a897d2c0, ffff8880a897da68) [ 615.881750][T10593] The buggy address belongs to the page: [ 615.887392][T10593] page:ffffea0002a25f00 refcount:1 mapcount:0 mapping:ffff8880a36b28c0 index:0x0 compound_mapcount: 0 [ 615.898435][T10593] flags: 0xfffe0000010200(slab|head) [ 615.903727][T10593] raw: 00fffe0000010200 ffffea00024ef608 ffffea000136cc08 ffff8880a36b28c0 [ 615.912429][T10593] raw: 0000000000000000 ffff8880a897c240 0000000100000003 0000000000000000 [ 615.921007][T10593] page dumped because: kasan: bad access detected [ 615.927415][T10593] [ 615.929739][T10593] Memory state around the buggy address: [ 615.935483][T10593] ffff8880a897d200: fb fb fb fb fb fc fc fc fc fc fc fc fc fc fc fc [ 615.943548][T10593] ffff8880a897d280: fc fc fc fc fc fc fc fc fb fb fb fb fb fb fb fb [ 615.946163][T10704] ceph: No path or : separator in source [ 615.951699][T10593] >ffff8880a897d300: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 615.951706][T10593] ^ [ 615.951716][T10593] ffff8880a897d380: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 615.951725][T10593] ffff8880a897d400: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 615.951729][T10593] ================================================================== [ 615.951733][T10593] Disabling lock debugging due to kernel taint [ 615.951740][T10593] Kernel panic - not syncing: panic_on_warn set ... 02:13:27 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) get_mempolicy(&(0x7f00000003c0), &(0x7f0000000400), 0x289, &(0x7f0000fef000/0x10000)=nil, 0x2) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="c6566ceda4e3f1c409e9515b62be0157ec2275042709d8548cb34a00665921c0c26bc59a07847331f37bc0ef75a5460fe26079bfc6bed87ef39b93f39b6bd4dea2a4b89759e1a77e64786f7d3c9ce12e6e7091ca71c3576afb000000000000000000", @ANYRES32, @ANYRES32=0x0, @ANYRESHEX=r1, @ANYRESDEC=r2], 0x5, 0x1) wait4(r1, 0x0, 0x40000000, &(0x7f0000000200)) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/tty/drivers\x00', 0x0, 0x0) read(r3, &(0x7f0000000280)=""/152, 0x20000318) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/tty/drivers\x00', 0x0, 0x0) read(r4, &(0x7f0000000280)=""/152, 0x20000318) ioctl$VIDIOC_QUERYBUF(r3, 0xc0585609, &(0x7f00000002c0)={0x0, 0x0, 0x4, 0x63d263814f78ec42, 0x401, {0x0, 0x2710}, {0x3, 0xc, 0x6, 0x0, 0x3, 0x9, "878b2cbe"}, 0x3, 0xb, @offset=0x8000, 0x400, 0x0, r4}) setsockopt$RDS_RECVERR(r5, 0x114, 0x5, &(0x7f0000000100), 0x4) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r6 = syz_open_dev$dri(&(0x7f00000001c0)='/dev/dri/card#\x00', 0x1, 0x0) mount(&(0x7f00000000c0)=ANY=[@ANYPTR64=&(0x7f0000000740)=ANY=[@ANYRESHEX=0x0, @ANYPTR, @ANYPTR64, @ANYBLOB="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", @ANYRESHEX=0x0, @ANYPTR64, @ANYRESHEX=r6, @ANYRES16=r0]], &(0x7f0000000180)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x4c00, 0x0) [ 615.951758][T10593] CPU: 1 PID: 10593 Comm: syz-executor.3 Tainted: G B 5.6.0-rc1-syzkaller #0 [ 615.951766][T10593] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 615.951770][T10593] Call Trace: [ 615.951792][T10593] dump_stack+0x197/0x210 [ 615.951814][T10593] panic+0x2e3/0x75c [ 615.990293][T10704] ceph: No path or : separator in source [ 615.996918][T10593] ? add_taint.cold+0x16/0x16 [ 615.996936][T10593] ? __lock_acquire+0x3a8b/0x4a00 [ 615.996953][T10593] ? trace_hardirqs_off+0x62/0x240 [ 615.996966][T10593] ? trace_hardirqs_off+0x59/0x240 [ 615.996980][T10593] ? __lock_acquire+0x3a8b/0x4a00 [ 615.996995][T10593] end_report+0x47/0x4f [ 615.997006][T10593] ? __lock_acquire+0x3a8b/0x4a00 [ 615.997021][T10593] __kasan_report.cold+0xe/0x32 [ 615.997044][T10593] ? __lock_acquire+0x3a8b/0x4a00 [ 616.037333][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 616.037485][T10593] kasan_report+0x12/0x20 [ 616.106355][T10593] __asan_report_load8_noabort+0x14/0x20 [ 616.111997][T10593] __lock_acquire+0x3a8b/0x4a00 [ 616.116856][T10593] ? put_task_struct_rcu_user+0x8f/0xc0 [ 616.122523][T10593] ? finish_task_switch+0x526/0x750 [ 616.127729][T10593] ? mark_held_locks+0xf0/0xf0 [ 616.132500][T10593] ? __schedule+0x93c/0x1f90 [ 616.137100][T10593] lock_acquire+0x190/0x410 [ 616.141610][T10593] ? __lock_sock+0x16d/0x290 [ 616.146212][T10593] _raw_spin_lock_bh+0x33/0x50 [ 616.150985][T10593] ? __lock_sock+0x16d/0x290 [ 616.155578][T10593] __lock_sock+0x16d/0x290 [ 616.158833][T10711] ceph: No path or : separator in source [ 616.160002][T10593] ? __sk_dst_check+0x2e0/0x2e0 [ 616.160018][T10593] ? finish_wait+0x260/0x260 [ 616.160038][T10593] lock_sock_nested+0xfe/0x120 [ 616.160065][T10593] sctp_sock_dump+0x122/0xb20 [ 616.184610][T10593] sctp_for_each_transport+0x2b4/0x350 [ 616.190086][T10593] ? sctp_tsp_dump_one+0x690/0x690 [ 616.195228][T10593] ? sctp_v6_copy_ip_options.cold+0x28/0x28 [ 616.201152][T10593] ? sctp_transport_get_next+0x150/0x150 [ 616.206800][T10593] ? sctp_for_each_endpoint+0x131/0x1c0 02:13:27 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) get_mempolicy(&(0x7f00000003c0), &(0x7f0000000400), 0x289, &(0x7f0000fef000/0x10000)=nil, 0x2) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="c6566ceda4e3f1c409e9515b62be0157ec2275042709d8548cb34a00665921c0c26bc59a07847331f37bc0ef75a5460fe26079bfc6bed87ef39b93f39b6bd4dea2a4b89759e1a77e64786f7d3c9ce12e6e7091ca71c3576afb000000000000000000", @ANYRES32, @ANYRES32=0x0, @ANYRESHEX=r1, @ANYRESDEC=r2], 0x5, 0x1) wait4(r1, 0x0, 0x40000000, &(0x7f0000000200)) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/tty/drivers\x00', 0x0, 0x0) read(r3, &(0x7f0000000280)=""/152, 0x20000318) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/tty/drivers\x00', 0x0, 0x0) read(r4, &(0x7f0000000280)=""/152, 0x20000318) ioctl$VIDIOC_QUERYBUF(r3, 0xc0585609, &(0x7f00000002c0)={0x0, 0x0, 0x4, 0x63d263814f78ec42, 0x401, {0x0, 0x2710}, {0x3, 0xc, 0x6, 0x0, 0x3, 0x9, "878b2cbe"}, 0x3, 0xb, @offset=0x8000, 0x400, 0x0, r4}) setsockopt$RDS_RECVERR(r5, 0x114, 0x5, &(0x7f0000000100), 0x4) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r6 = syz_open_dev$dri(&(0x7f00000001c0)='/dev/dri/card#\x00', 0x1, 0x0) mount(&(0x7f00000000c0)=ANY=[@ANYPTR64=&(0x7f0000000740)=ANY=[@ANYRESHEX=0x0, @ANYPTR, @ANYPTR64, @ANYBLOB="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", @ANYRESHEX=0x0, @ANYPTR64, @ANYRESHEX=r6, @ANYRES16=r0]], &(0x7f0000000180)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x6800, 0x0) [ 616.210122][T10711] ceph: No path or : separator in source [ 616.212361][T10593] ? _raw_read_unlock_bh+0x2c/0x30 [ 616.212378][T10593] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 616.212393][T10593] ? sctp_for_each_endpoint+0x166/0x1c0 [ 616.212417][T10593] sctp_diag_dump+0x33e/0x450 [ 616.239229][T10593] ? sctp_diag_dump_one+0x4d0/0x4d0 [ 616.244443][T10593] ? kasan_kmalloc+0x9/0x10 [ 616.248960][T10593] ? __kmalloc_node_track_caller+0x4e/0x70 [ 616.254777][T10593] ? mutex_lock_nested+0x16/0x20 [ 616.259741][T10593] __inet_diag_dump+0x9e/0x130 [ 616.264542][T10593] inet_diag_dump+0x9b/0x110 [ 616.269173][T10593] netlink_dump+0x558/0xfb0 [ 616.273765][T10593] ? __netlink_sendskb+0xc0/0xc0 [ 616.278714][T10593] __netlink_dump_start+0x673/0x930 [ 616.283926][T10593] inet_diag_handler_cmd+0x262/0x320 [ 616.289224][T10593] ? inet_diag_rcv_msg_compat+0x350/0x350 [ 616.294946][T10593] ? sock_diag_rcv+0x1c/0x40 [ 616.299547][T10593] ? inet_diag_dump_compat+0x320/0x320 [ 616.305034][T10593] sock_diag_rcv_msg+0x319/0x410 [ 616.309984][T10593] netlink_rcv_skb+0x177/0x450 [ 616.314787][T10593] ? sock_diag_bind+0x80/0x80 [ 616.319494][T10593] ? netlink_ack+0xb50/0xb50 [ 616.324100][T10593] ? __kasan_check_read+0x11/0x20 [ 616.329211][T10593] sock_diag_rcv+0x2b/0x40 [ 616.333629][T10593] netlink_unicast+0x59e/0x7e0 [ 616.338399][T10593] ? netlink_attachskb+0x870/0x870 [ 616.343513][T10593] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 616.349235][T10593] ? __check_object_size+0x3d/0x437 [ 616.354442][T10593] netlink_sendmsg+0x91c/0xea0 [ 616.359211][T10593] ? netlink_unicast+0x7e0/0x7e0 02:13:27 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) get_mempolicy(&(0x7f00000003c0), &(0x7f0000000400), 0x289, &(0x7f0000fef000/0x10000)=nil, 0x2) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="c6566ceda4e3f1c409e9515b62be0157ec2275042709d8548cb34a00665921c0c26bc59a07847331f37bc0ef75a5460fe26079bfc6bed87ef39b93f39b6bd4dea2a4b89759e1a77e64786f7d3c9ce12e6e7091ca71c3576afb000000000000000000", @ANYRES32, @ANYRES32=0x0, @ANYRESHEX=r1, @ANYRESDEC=r2], 0x5, 0x1) wait4(r1, 0x0, 0x40000000, &(0x7f0000000200)) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/tty/drivers\x00', 0x0, 0x0) read(r3, &(0x7f0000000280)=""/152, 0x20000318) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/tty/drivers\x00', 0x0, 0x0) read(r4, &(0x7f0000000280)=""/152, 0x20000318) ioctl$VIDIOC_QUERYBUF(r3, 0xc0585609, &(0x7f00000002c0)={0x0, 0x0, 0x4, 0x63d263814f78ec42, 0x401, {0x0, 0x2710}, {0x3, 0xc, 0x6, 0x0, 0x3, 0x9, "878b2cbe"}, 0x3, 0xb, @offset=0x8000, 0x400, 0x0, r4}) setsockopt$RDS_RECVERR(r5, 0x114, 0x5, &(0x7f0000000100), 0x4) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r6 = syz_open_dev$dri(&(0x7f00000001c0)='/dev/dri/card#\x00', 0x1, 0x0) mount(&(0x7f00000000c0)=ANY=[@ANYPTR64=&(0x7f0000000740)=ANY=[@ANYRESHEX=0x0, @ANYPTR, @ANYPTR64, @ANYBLOB="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", @ANYRESHEX=0x0, @ANYPTR64, @ANYRESHEX=r6, @ANYRES16=r0]], &(0x7f0000000180)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x6c00, 0x0) [ 616.364154][T10593] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 616.369706][T10593] ? apparmor_socket_sendmsg+0x2a/0x30 [ 616.375273][T10593] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 616.381515][T10593] ? security_socket_sendmsg+0x8d/0xc0 [ 616.386983][T10593] ? netlink_unicast+0x7e0/0x7e0 [ 616.391932][T10593] sock_sendmsg+0xd7/0x130 [ 616.396353][T10593] sock_write_iter+0x2cb/0x400 [ 616.401119][T10593] ? sock_sendmsg+0x130/0x130 [ 616.405812][T10593] ? common_file_perm+0x2f3/0x940 [ 616.410854][T10593] do_iter_readv_writev+0x5f8/0x8f0 [ 616.416068][T10593] ? no_seek_end_llseek_size+0x70/0x70 [ 616.421534][T10593] ? apparmor_file_permission+0x27/0x30 [ 616.427095][T10593] ? rw_verify_area+0x126/0x360 [ 616.431956][T10593] do_iter_write+0x184/0x610 [ 616.436555][T10593] ? dup_iter+0x260/0x260 [ 616.440904][T10593] vfs_writev+0x1b3/0x2f0 [ 616.445240][T10593] ? vfs_iter_write+0xb0/0xb0 [ 616.449919][T10593] ? __kasan_check_read+0x11/0x20 [ 616.454955][T10593] ? ksys_dup3+0x3e0/0x3e0 [ 616.459380][T10593] ? __kasan_check_read+0x11/0x20 [ 616.464409][T10593] ? __fget_light+0x1ad/0x270 [ 616.469097][T10593] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 616.475350][T10593] do_writev+0x2b0/0x330 [ 616.479603][T10593] ? vfs_writev+0x2f0/0x2f0 [ 616.484117][T10593] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 616.489598][T10593] ? do_syscall_64+0x26/0x790 [ 616.494287][T10593] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 616.500361][T10593] ? do_syscall_64+0x26/0x790 [ 616.505055][T10593] __x64_sys_writev+0x75/0xb0 [ 616.509742][T10593] do_syscall_64+0xfa/0x790 [ 616.514261][T10593] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 616.520258][T10593] RIP: 0033:0x45c6c9 [ 616.524266][T10593] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 616.543941][T10593] RSP: 002b:00007efebd492c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000014 [ 616.552354][T10593] RAX: ffffffffffffffda RBX: 00007efebd4936d4 RCX: 000000000045c6c9 [ 616.560315][T10593] RDX: 0000000000000001 RSI: 0000000020000000 RDI: 0000000000000007 [ 616.568274][T10593] RBP: 000000000076c118 R08: 0000000000000000 R09: 0000000000000000 [ 616.576235][T10593] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 616.584210][T10593] R13: 0000000000000cde R14: 00000000004cafe2 R15: 000000000076c124 [ 616.593732][T10593] Kernel Offset: disabled [ 616.598058][T10593] Rebooting in 86400 seconds..