[ 95.061341][ T32] audit: type=1800 audit(1577818890.101:25): pid=11012 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="cron" dev="sda1" ino=2414 res=0 [ 95.093846][ T32] audit: type=1800 audit(1577818890.131:26): pid=11012 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="mcstrans" dev="sda1" ino=2457 res=0 [ 95.137573][ T32] audit: type=1800 audit(1577818890.161:27): pid=11012 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="restorecond" dev="sda1" ino=2436 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [ 96.455861][T11080] sshd (11080) used greatest stack depth: 53984 bytes left [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.239' (ECDSA) to the list of known hosts. 2019/12/31 19:01:44 fuzzer started 2019/12/31 19:01:49 dialing manager at 10.128.0.26:34231 2019/12/31 19:01:49 syscalls: 2551 2019/12/31 19:01:49 code coverage: enabled 2019/12/31 19:01:49 comparison tracing: CONFIG_KCOV_ENABLE_COMPARISONS is not enabled 2019/12/31 19:01:49 extra coverage: enabled 2019/12/31 19:01:49 setuid sandbox: enabled 2019/12/31 19:01:49 namespace sandbox: enabled 2019/12/31 19:01:49 Android sandbox: /sys/fs/selinux/policy does not exist 2019/12/31 19:01:49 fault injection: enabled 2019/12/31 19:01:49 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/12/31 19:01:49 net packet injection: enabled 2019/12/31 19:01:49 net device setup: enabled 2019/12/31 19:01:49 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 2019/12/31 19:01:49 devlink PCI setup: PCI device 0000:00:10.0 is not available 19:05:36 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) syzkaller login: [ 342.074123][T11179] IPVS: ftp: loaded support on port[0] = 21 [ 342.249867][T11179] chnl_net:caif_netlink_parms(): no params data found [ 342.339069][T11179] bridge0: port 1(bridge_slave_0) entered blocking state [ 342.346887][T11179] bridge0: port 1(bridge_slave_0) entered disabled state [ 342.356095][T11179] device bridge_slave_0 entered promiscuous mode [ 342.367427][T11179] bridge0: port 2(bridge_slave_1) entered blocking state [ 342.375759][T11179] bridge0: port 2(bridge_slave_1) entered disabled state [ 342.384934][T11179] device bridge_slave_1 entered promiscuous mode [ 342.428588][T11179] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 342.443508][T11179] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 342.484347][T11179] team0: Port device team_slave_0 added [ 342.495153][T11179] team0: Port device team_slave_1 added [ 342.579612][T11179] device hsr_slave_0 entered promiscuous mode [ 342.704878][T11179] device hsr_slave_1 entered promiscuous mode [ 343.030071][T11179] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 343.081279][T11179] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 343.230976][T11179] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 343.505346][T11179] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 343.862374][T11179] 8021q: adding VLAN 0 to HW filter on device bond0 [ 343.888506][ T31] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 343.898565][ T31] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 343.919065][T11179] 8021q: adding VLAN 0 to HW filter on device team0 [ 343.936087][ T31] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 343.945956][ T31] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 343.956140][ T31] bridge0: port 1(bridge_slave_0) entered blocking state [ 343.964024][ T31] bridge0: port 1(bridge_slave_0) entered forwarding state [ 344.015325][ T31] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 344.024791][ T31] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 344.035064][ T31] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 344.044410][ T31] bridge0: port 2(bridge_slave_1) entered blocking state [ 344.052660][ T31] bridge0: port 2(bridge_slave_1) entered forwarding state [ 344.061556][ T31] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 344.072815][ T31] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 344.083658][ T31] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 344.093953][ T31] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 344.104900][ T31] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 344.115204][ T31] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 344.125575][ T31] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 344.135871][ T31] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 344.151406][ T31] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 344.161210][ T31] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 344.170731][ T31] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 344.187915][T11179] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 344.230083][ T2731] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 344.238289][ T2731] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 344.260277][T11179] 8021q: adding VLAN 0 to HW filter on device batadv0 19:05:40 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 19:05:40 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) semget$private(0x0, 0x2, 0x0) 19:05:40 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000780)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'nr0\x01\x00', 0x1132}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6}]}) 19:05:40 executing program 0: creat(&(0x7f0000000240)='./bus\x00', 0x0) 19:05:40 executing program 0: set_mempolicy(0x1, 0x0, 0x0) pipe2$9p(&(0x7f0000001480), 0x0) 19:05:40 executing program 1: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x40000, 0x0) ioctl$RNDADDENTROPY(r0, 0x40085203, &(0x7f0000000040)={0x7, 0x50, "c45e30b67a85c26f0a4f23f635f54b658b2c4228ba4beff0919b28531ea6bb78280343715f45a764ae56fa236f6ce94a1662af69a0e8daf4ee9c5a4dbd00fe6d5b8e9fe60079d11768247dd741a267b5"}) ioctl$SG_SET_FORCE_PACK_ID(r0, 0x227b, &(0x7f00000000c0)) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) ioctl$VIDIOC_PREPARE_BUF(0xffffffffffffffff, 0xc058565d, &(0x7f0000000140)={0x5, 0x0, 0x4, 0x45c86619ff81ed78, 0x79d, {r1, r2/1000+10000}, {0x5, 0xfda128a9fc0943bf, 0xfc, 0xd4, 0x80, 0x81, "8654ff05"}, 0x9, 0x2, @userptr=0x2, 0x0, 0x0, 0xffffffffffffffff}) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r3, 0x84, 0xc, &(0x7f00000001c0)=0x7, 0x4) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200)='/dev/btrfs-control\x00', 0x40, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000240)={0x0, @rand_addr, @dev}, &(0x7f0000000280)=0xc) setsockopt$inet6_IPV6_XFRM_POLICY(r4, 0x29, 0x23, &(0x7f00000002c0)={{{@in=@local, @in=@multicast1, 0x4e23, 0x81, 0x4e21, 0x6, 0x2, 0x80, 0x40, 0x0, r5, 0xffffffffffffffff}, {0x8000, 0x2, 0x2, 0x4, 0x10025acb, 0x8, 0x7, 0x101}, {0x9, 0x4, 0x8000, 0xffffffffffffffff}, 0x6, 0x6e6bb6, 0x0, 0x0, 0x7}, {{@in=@multicast1, 0x4d2, 0x32}, 0xa, @in6=@remote, 0x3501, 0x2, 0x1, 0x9, 0x5212f119, 0x8, 0x1}}, 0xe8) sendmsg$nl_route(r0, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)=@mpls_newroute={0x70, 0x18, 0x0, 0x70bd27, 0x25dfdbfd, {0x1c, 0x0, 0x80, 0x0, 0x4972ad22c3528f0a, 0x1, 0xff, 0x0, 0x700}, [@RTA_VIA={0x14, 0x12, {0x8, "16880709acc8ad6d78c772a496c6"}}, @RTA_OIF={0x8, 0x4, r5}, @RTA_VIA={0x14, 0x12, {0x3, "224398db215da2ffb970844fd20c"}}, @RTA_VIA={0x14, 0x12, {0x3, "97e044ad1c0a8c2da3237d517ca3"}}, @RTA_DST={0x8, 0x1, {0xedc, 0x0, 0x1}}, @RTA_DST={0x8, 0x1, {0x100, 0x0, 0x1}}]}, 0x70}, 0x1, 0x0, 0x0, 0x4041}, 0x5) ioctl$TIOCL_GETMOUSEREPORTING(r4, 0x541c, &(0x7f0000000500)) fcntl$getownex(r3, 0x10, &(0x7f0000000540)={0x0, 0x0}) ptrace$setsig(0x4203, r6, 0x1, &(0x7f0000000580)={0x20, 0x5, 0x1}) syz_open_dev$sndtimer(&(0x7f0000000600)='/dev/snd/timer\x00', 0x0, 0x10800) ioctl$VIDIOC_G_EXT_CTRLS(r4, 0xc0205647, &(0x7f00000006c0)={0xa40004, 0x0, 0x3f, 0xffffffffffffffff, 0x0, &(0x7f0000000680)={0x9909dc, 0x1, [], @p_u16=&(0x7f0000000640)=0x529b}}) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r7, 0x6, 0x21, &(0x7f0000000700)="39d4e05c987c2083f25e6e795d86a016", 0x10) futex(&(0x7f0000000740), 0x1, 0x2, &(0x7f0000000780), &(0x7f00000007c0)=0x2, 0x1) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, &(0x7f0000000800)={0x0, 0x6, 0x1}) mq_unlink(&(0x7f0000000840)='trusted[$^,{cgroup\x00') r8 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_IP_IPSEC_POLICY(r8, 0x0, 0x10, &(0x7f0000000f80)={{{@in=@dev, @in6=@ipv4={[], [], @loopback}}}, {{}, 0x0, @in6=@initdev}}, &(0x7f0000001080)=0xe8) ioctl$PPPIOCCONNECT(0xffffffffffffffff, 0x4004743a, &(0x7f00000010c0)=0x2) readv(r7, &(0x7f0000001380)=[{&(0x7f0000001100)=""/221, 0xdd}, {&(0x7f0000001200)=""/242, 0xf2}, {&(0x7f0000001300)=""/93, 0x5d}], 0x3) r9 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000013c0)='/dev/sequencer2\x00', 0x400, 0x0) write$snddsp(r9, &(0x7f0000001400)="bb1cdf8359e59c3c3b56472387937ad4025d242aceecc6a4a4fc7a68e917e24a1662b0213647e659d793b5", 0x2b) ioctl$sock_SIOCSIFVLAN_GET_VLAN_REALDEV_NAME_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000001440)={0x8, 'eql\x00', {'nlmon0\x00'}, 0x40}) r10 = pkey_alloc(0x0, 0x7) pkey_mprotect(&(0x7f0000fed000/0x12000)=nil, 0x12000, 0x0, r10) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, &(0x7f00000014c0)={0x9d0000, 0x9, 0x7d, r4, 0x0, &(0x7f0000001480)={0x980924, 0x994, [], @value=0x5}}) r12 = syz_genetlink_get_family_id$tipc2(&(0x7f0000001540)='TIPCv2\x00') sendmsg$TIPC_NL_NODE_GET(r11, &(0x7f0000001600)={&(0x7f0000001500)={0x10, 0x0, 0x0, 0x3971f995005aea0e}, 0xc, &(0x7f00000015c0)={&(0x7f0000001580)={0x34, r12, 0x400, 0x70bd2a, 0x25dfdbfe, {}, [@TIPC_NLA_SOCK={0x20, 0x2, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x2}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x66}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x9}]}]}, 0x34}, 0x1, 0x0, 0x0, 0x10}, 0x4880) 19:05:40 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VIDIOC_PREPARE_BUF(0xffffffffffffffff, 0xc058565d, &(0x7f0000000000)={0x1, 0xc, 0x4, 0x40000, 0x8, {}, {0x3, 0x2, 0x7, 0x0, 0x1, 0x9, "ac9574df"}, 0x7, 0x3, @userptr=0x10001, 0x101, 0x0, r1}) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f00000000c0)={'filter\x00'}, &(0x7f0000000180)=0x54) r3 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_open_procfs(0x0, &(0x7f0000000100)='setgroups\x00') close(r4) r5 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_EVENTS(r5, 0x84, 0xb, &(0x7f0000000040)={0x0, 0x3, 0x40}, 0x296) shutdown(r5, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r5, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x10, &(0x7f00000002c0)=[@in={0x2, 0x0, @local}]}, &(0x7f0000000180)=0x10) r6 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r6, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r8, 0x0, r9, 0x0, 0x70196c71, 0x0) r10 = syz_open_procfs(0x0, &(0x7f0000000100)='setgroups\x00') close(r10) r11 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_EVENTS(r11, 0x84, 0xb, &(0x7f0000000040)={0x0, 0x3, 0x40}, 0x296) shutdown(r11, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r11, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x10, &(0x7f0000000840)=[@in={0x2, 0x0, @local}]}, &(0x7f0000000180)=0x10) r12 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r12, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r11, 0x84, 0x72, &(0x7f0000000080)={r13}, 0xc) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r10, 0x84, 0x77, &(0x7f0000000000)={r13, 0x1000, 0x5, [0x7, 0x101, 0x800, 0x200, 0xfdd1]}, &(0x7f0000000180)=0x12) r14 = socket$inet6_tcp(0xa, 0x1, 0x0) r15 = fcntl$dupfd(r14, 0x0, r14) ioctl$PERF_EVENT_IOC_ENABLE(r15, 0x8912, 0x400200) r16 = socket$inet6_tcp(0xa, 0x1, 0x0) r17 = fcntl$dupfd(r16, 0x0, r16) ioctl$PERF_EVENT_IOC_ENABLE(r17, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000880)={r13, 0x100, 0x173d331b721e8886}, 0xffffffffffffff3b) r18 = socket$inet6_tcp(0xa, 0x1, 0x0) r19 = fcntl$dupfd(r18, 0x0, r18) ioctl$PERF_EVENT_IOC_ENABLE(r19, 0x8912, 0x400200) socket$inet6_tcp(0xa, 0x1, 0x0) r20 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r20, 0x0, r20) r21 = fcntl$dupfd(r3, 0x0, r20) ioctl$PERF_EVENT_IOC_ENABLE(r21, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r21, 0x84, 0x77, &(0x7f00000008c0)=ANY=[@ANYRES32=r7, @ANYBLOB="0010040000030070e92e86d1c214e9ef4c672e864001ad3ddb8e88ab9e000017e0fd8f134c0ee489eae83d83c0ad4b85e2041718a3d27ef97738b117af8969d283ecd2"], &(0x7f0000000180)=0x12) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r2, 0x84, 0x18, &(0x7f00000001c0)={r7, 0xb52}, &(0x7f00000002c0)=0x8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000300)={r22, 0x1e, "710d6696301f186944c58dc4e7c57696a0e159adb3317c43b28b4b15ce30"}, &(0x7f0000000340)=0x26) socket$inet6_sctp(0xa, 0x5, 0x84) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r23, 0x0, r24, 0x0, 0x70196c71, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r24, 0x0, 0x60, &(0x7f00000003c0)={'filter\x00', 0x7, 0x4, 0x408, 0x210, 0x210, 0x100, 0x320, 0x320, 0x320, 0x4, &(0x7f0000000380), {[{{@arp={@multicast2, @local, 0x0, 0xffffffff, 0xa, 0xd, {@mac=@dev={[], 0x2d}, {[0x0, 0x181, 0xff, 0x7639f96811313783, 0xff, 0x7f]}}, {@empty, {[0x0, 0xff, 0x0, 0x0, 0x0, 0x383c8038401e28d3]}}, 0x247, 0x4, 0x60, 0x80, 0xfffe, 0x4, 'nr0\x00', 'erspan0\x00', {0xff}, {}, 0x0, 0x20}, 0xc0, 0x100}, @unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "f9c85c8bf7ae443f74d4a6d07c8029edb057a74c53080f1ae1bed6434c79"}}, {{@arp={@multicast1, @multicast2, 0xffffff00, 0xff, 0x6, 0x8, {@empty, {[0xff, 0xff, 0x7f, 0x1fe, 0x8d21a7b4e5ed86c4, 0xff]}}, {@empty, {[0xff, 0xff, 0x1fe, 0x0, 0xa466a08413710bc9]}}, 0x6, 0x7, 0x20, 0x800, 0x7f, 0x4, 'team0\x00', 'bridge_slave_0\x00', {}, {}, 0x0, 0x8}, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @empty, @broadcast, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x2}}}, {{@uncond, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @mac, @rand_addr=0x10000, @broadcast, 0x1, 0x1}}}], {{[], 0xc0, 0xe8}, {0x28}}}}, 0x458) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB="340000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="243e16b5000000000c002b008e4419e7b5e6172f2ea91068cf73036b03af000000c34c4093198c125b4b585329840e0a3994303738913fbf8814c2d56882ff68e414c8a88be5d04d1c1875d7a203d26fa1"], 0x34}}, 0x0) [ 346.009301][T11210] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 346.247867][T11211] IPVS: ftp: loaded support on port[0] = 21 [ 346.428888][T11211] chnl_net:caif_netlink_parms(): no params data found [ 346.507631][T11211] bridge0: port 1(bridge_slave_0) entered blocking state [ 346.514958][T11211] bridge0: port 1(bridge_slave_0) entered disabled state [ 346.524404][T11211] device bridge_slave_0 entered promiscuous mode [ 346.535255][T11211] bridge0: port 2(bridge_slave_1) entered blocking state [ 346.542475][T11211] bridge0: port 2(bridge_slave_1) entered disabled state [ 346.552463][T11211] device bridge_slave_1 entered promiscuous mode [ 346.592117][T11211] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 346.606270][T11211] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 346.646971][T11211] team0: Port device team_slave_0 added [ 346.658261][T11211] team0: Port device team_slave_1 added [ 346.898785][T11211] device hsr_slave_0 entered promiscuous mode [ 347.024267][T11211] device hsr_slave_1 entered promiscuous mode [ 347.154575][T11211] debugfs: Directory 'hsr0' with parent '/' already present! [ 347.164284][T11213] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 19:05:42 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b40000000000000062000000000000007b013000200000009500000000000020"], &(0x7f0000003ff6)='G\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xfffffffffffffff6}, 0x48) [ 347.241682][T11211] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 347.290729][T11211] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 347.330182][T11211] netdevsim netdevsim1 netdevsim2: renamed from eth2 19:05:42 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x2, &(0x7f0000000140)=[{0x54}, {0x6, 0x0, 0x0, 0xffffffff7fffffff}]}) ioctl$VIDIOC_PREPARE_BUF(0xffffffffffffffff, 0xc058565d, &(0x7f0000000040)={0x8, 0x5, 0x4, 0x2000, 0x7, {}, {0x1, 0x0, 0x81, 0x80, 0x0, 0x5, "6e4aa419"}, 0x3ff, 0xfbdbc667bd853b73, @planes=&(0x7f0000000000)={0x7f, 0x1, @userptr=0xf68a, 0x101}, 0x20, 0x0, r0}) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) ioctl$SOUND_MIXER_READ_RECMASK(r1, 0x80044dfd, &(0x7f0000000100)) [ 347.401500][T11211] netdevsim netdevsim1 netdevsim3: renamed from eth3 19:05:42 executing program 0: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) getpid() r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) clone3(&(0x7f00000005c0)={0x6240447d993d0188, &(0x7f0000000240), &(0x7f00000003c0), &(0x7f0000000400), {}, 0x0, 0x0, 0x0, &(0x7f0000000540)}, 0x50) r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @ipv4={[], [], @local}}, 0x1c) fcntl$getownex(r1, 0x10, &(0x7f0000000600)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000640)=0x0) getpgrp(r2) syz_open_dev$radio(0x0, 0x0, 0x2) ioctl$VIDIOC_QUERYMENU(0xffffffffffffffff, 0xc02c5625, &(0x7f0000000080)={0x98f904, 0x0, @value}) clock_adjtime(0x0, &(0x7f00000000c0)={0x7, 0x2, 0x9, 0xffffffff, 0x6, 0x800000, 0x401, 0x200, 0x0, 0x1a74a503, 0x3, 0x0, 0x9, 0x664, 0x80, 0x0, 0x6c, 0x9, 0x8000008, 0x0, 0x5, 0x3, 0x9, 0xfffffffffffffff5, 0xffffffffffff3691, 0xbba}) r3 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x20) setsockopt$inet6_int(r3, 0x29, 0x0, 0x0, 0x0) open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x40) getpgid(0x0) memfd_create(&(0x7f0000000140)='lotrusted\x1a\x00', 0x0) syz_open_dev$sndseq(0x0, 0x0, 0x1) writev(0xffffffffffffffff, &(0x7f0000000040), 0x0) ppoll(&(0x7f0000000200)=[{}], 0x1, &(0x7f0000000280), 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = inotify_init1(0xc1000) fcntl$setown(r4, 0x8, 0xffffffffffffffff) fcntl$getownex(r4, 0x10, &(0x7f00000000c0)) openat$full(0xffffffffffffff9c, &(0x7f0000000380)='/dev/full\x00', 0x0, 0x0) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) r6 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x20, 0x80000) r7 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r7) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r7) ioctl$LOOP_CTL_ADD(r6, 0x4c80, r7) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, r7) ioctl$LOOP_CTL_ADD(r5, 0x4c80, 0x0) r8 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r8, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r8, 0x4c80, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x20) r9 = socket(0xa, 0x3, 0x8) syz_open_dev$amidi(&(0x7f0000000340)='/dev/amidi#\x00', 0x9c4, 0x70000) ioctl$sock_inet_SIOCSIFFLAGS(r9, 0x89a2, &(0x7f0000000180)={'bridge0\x00\x00\x01\x00', 0x4}) socket(0x1e, 0x2, 0x0) [ 347.690758][T11211] 8021q: adding VLAN 0 to HW filter on device bond0 [ 347.716274][ T2731] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 347.726900][ T2731] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 347.735974][ C0] hrtimer: interrupt took 59767 ns [ 347.750752][T11211] 8021q: adding VLAN 0 to HW filter on device team0 [ 347.801936][ T31] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 347.812178][ T31] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 347.821489][ T31] bridge0: port 1(bridge_slave_0) entered blocking state [ 347.830183][ T31] bridge0: port 1(bridge_slave_0) entered forwarding state [ 347.893073][T11211] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 347.903733][T11211] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 347.920933][ T31] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 347.930328][ T31] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 347.940054][ T31] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 347.949234][ T31] bridge0: port 2(bridge_slave_1) entered blocking state [ 347.956607][ T31] bridge0: port 2(bridge_slave_1) entered forwarding state [ 347.965421][ T31] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 347.975937][ T31] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 347.986494][ T31] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 347.997091][ T31] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 348.007125][ T31] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 348.017434][ T31] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 348.027719][ T31] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 348.037151][ T31] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 348.047354][ T31] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 348.056881][ T31] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 348.067303][T11224] bridge0: port 3(gretap0) entered blocking state [ 348.074512][T11224] bridge0: port 3(gretap0) entered disabled state [ 348.082818][T11224] device gretap0 entered promiscuous mode [ 348.089896][T11224] bridge0: port 3(gretap0) entered blocking state [ 348.096751][T11224] bridge0: port 3(gretap0) entered forwarding state [ 348.115374][T11182] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 348.126348][T11182] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 348.159011][T11182] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 348.166895][T11182] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 348.182770][T11211] 8021q: adding VLAN 0 to HW filter on device batadv0 19:05:43 executing program 1: r0 = socket(0x50000000010, 0x6, 0x0) mkdir(&(0x7f0000000400)='./file0\x00', 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r1, 0x0, r1) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(r1, 0x8983, &(0x7f0000000080)={0x6, 'bcsf0\x00', {0xfff}}) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='devpts\x00*\x98\xf9\n\x10\x99\xe7\x80\xd6\xe1\x06', 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='mountinfo\x00') sendfile(r0, r2, 0x0, 0x80000002) 19:05:43 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf8\xdb\x8c\xbf$1U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00\xd7\x1a\x18s\x9f\xe5\xff\x93\xbe\x8e\xe6{\xe7\xf4\xd1\xc8M\xb06 \x92\x81\xa4h\x8f\xfc6\x90 \x81Y\xa4U\xb7*Z.\xdaG\xf6\x81\xb0\x8d\xcd\xce\xe3\x96\xa6/\x1d\x9aIC\\\xb6\x01\xd6\x04\'\x80\x90\xf9&\xf1\x16J\xaa\tMo\x16\xbe~\x82\x1ah\x06\x00\x00\x00\x00\x00\x00\x00\x00\xe0e\x01\\\xc2\xc1}\xcb\xa0[d\xb8\x98\x189\xdc\x16#\xc5\x90AZ\x80\xad\xa4Fya\xdf$\xc4\xab*Q{\x9d\xf3\xcc\x01#\xc3\xf1\xb4\xda\x81\xd8\xb3\xc0BB\xca(', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x10012, r1, 0x0) socketpair(0x0, 0x5, 0xff, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r3, 0x0, r4, 0x0, 0x70196c71, 0x0) setsockopt$netlink_NETLINK_CAP_ACK(r4, 0x10e, 0xa, &(0x7f0000000040)=0x6, 0x4) fcntl$setstatus(r2, 0x4, 0x400) setsockopt$packet_int(r0, 0x107, 0x13, &(0x7f0000000000)=0x5, 0x4) socket$nl_netfilter(0x10, 0x3, 0xc) 19:05:43 executing program 0: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) getpid() r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) clone3(&(0x7f00000005c0)={0x6240447d993d0188, &(0x7f0000000240), &(0x7f00000003c0), &(0x7f0000000400), {}, 0x0, 0x0, 0x0, &(0x7f0000000540)}, 0x50) r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @ipv4={[], [], @local}}, 0x1c) fcntl$getownex(r1, 0x10, &(0x7f0000000600)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000640)=0x0) getpgrp(r2) syz_open_dev$radio(0x0, 0x0, 0x2) ioctl$VIDIOC_QUERYMENU(0xffffffffffffffff, 0xc02c5625, &(0x7f0000000080)={0x98f904, 0x0, @value}) clock_adjtime(0x0, &(0x7f00000000c0)={0x7, 0x2, 0x9, 0xffffffff, 0x6, 0x800000, 0x401, 0x200, 0x0, 0x1a74a503, 0x3, 0x0, 0x9, 0x664, 0x80, 0x0, 0x6c, 0x9, 0x8000008, 0x0, 0x5, 0x3, 0x9, 0xfffffffffffffff5, 0xffffffffffff3691, 0xbba}) r3 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x20) setsockopt$inet6_int(r3, 0x29, 0x0, 0x0, 0x0) open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x40) getpgid(0x0) memfd_create(&(0x7f0000000140)='lotrusted\x1a\x00', 0x0) syz_open_dev$sndseq(0x0, 0x0, 0x1) writev(0xffffffffffffffff, &(0x7f0000000040), 0x0) ppoll(&(0x7f0000000200)=[{}], 0x1, &(0x7f0000000280), 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = inotify_init1(0xc1000) fcntl$setown(r4, 0x8, 0xffffffffffffffff) fcntl$getownex(r4, 0x10, &(0x7f00000000c0)) openat$full(0xffffffffffffff9c, &(0x7f0000000380)='/dev/full\x00', 0x0, 0x0) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) r6 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x20, 0x80000) r7 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r7) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r7) ioctl$LOOP_CTL_ADD(r6, 0x4c80, r7) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, r7) ioctl$LOOP_CTL_ADD(r5, 0x4c80, 0x0) r8 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r8, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r8, 0x4c80, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x20) r9 = socket(0xa, 0x3, 0x8) syz_open_dev$amidi(&(0x7f0000000340)='/dev/amidi#\x00', 0x9c4, 0x70000) ioctl$sock_inet_SIOCSIFFLAGS(r9, 0x89a2, &(0x7f0000000180)={'bridge0\x00\x00\x01\x00', 0x4}) socket(0x1e, 0x2, 0x0) 19:05:44 executing program 1: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) getpid() r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) clone3(&(0x7f00000005c0)={0x6240447d993d0188, &(0x7f0000000240), &(0x7f00000003c0), &(0x7f0000000400), {}, 0x0, 0x0, 0x0, &(0x7f0000000540)}, 0x50) r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @ipv4={[], [], @local}}, 0x1c) fcntl$getownex(r1, 0x10, &(0x7f0000000600)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000640)=0x0) getpgrp(r2) syz_open_dev$radio(0x0, 0x0, 0x2) ioctl$VIDIOC_QUERYMENU(0xffffffffffffffff, 0xc02c5625, &(0x7f0000000080)={0x98f904, 0x0, @value}) clock_adjtime(0x0, &(0x7f00000000c0)={0x7, 0x2, 0x9, 0xffffffff, 0x6, 0x800000, 0x401, 0x200, 0x0, 0x1a74a503, 0x3, 0x0, 0x9, 0x664, 0x80, 0x0, 0x6c, 0x9, 0x8000008, 0x0, 0x5, 0x3, 0x9, 0xfffffffffffffff5, 0xffffffffffff3691, 0xbba}) r3 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x20) setsockopt$inet6_int(r3, 0x29, 0x0, 0x0, 0x0) open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x40) getpgid(0x0) memfd_create(&(0x7f0000000140)='lotrusted\x1a\x00', 0x0) syz_open_dev$sndseq(0x0, 0x0, 0x1) writev(0xffffffffffffffff, &(0x7f0000000040), 0x0) ppoll(&(0x7f0000000200)=[{}], 0x1, &(0x7f0000000280), 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = inotify_init1(0xc1000) fcntl$setown(r4, 0x8, 0xffffffffffffffff) fcntl$getownex(r4, 0x10, &(0x7f00000000c0)) openat$full(0xffffffffffffff9c, &(0x7f0000000380)='/dev/full\x00', 0x0, 0x0) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) r6 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x20, 0x80000) r7 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r7) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r7) ioctl$LOOP_CTL_ADD(r6, 0x4c80, r7) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, r7) ioctl$LOOP_CTL_ADD(r5, 0x4c80, 0x0) r8 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r8, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r8, 0x4c80, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x20) r9 = socket(0xa, 0x3, 0x8) syz_open_dev$amidi(&(0x7f0000000340)='/dev/amidi#\x00', 0x9c4, 0x70000) ioctl$sock_inet_SIOCSIFFLAGS(r9, 0x89a2, &(0x7f0000000180)={'bridge0\x00\x00\x01\x00', 0x4}) socket(0x1e, 0x2, 0x0) 19:05:44 executing program 0: ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$LOOP_SET_STATUS(r1, 0x4c02, &(0x7f00000002c0)={0x0, {}, 0x0, {}, 0x3, 0x11, 0x0, 0x0, "fb4c2db961120d93f770fe02ca8d5fe057a0a7fb70f73e5ee8beffc1ec31a27c74e7c785a6aa20a90bebd8ad6934d603970f00", "3dc099a62077b61d5b711d2361f791f99629e031e35d384fbdfcd241ea02d00c"}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) r3 = dup(r2) syz_open_dev$mouse(&(0x7f0000000140)='/dev/input/mouse#\x00', 0x1, 0x663b8f9ef191f10b) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0xa, &(0x7f00000001c0)=0x7f, 0xffffffffffffff90) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e20}, 0x1c) sendto$inet6(r2, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r3, 0x29, 0xb, &(0x7f0000000280)=0x2, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x19, &(0x7f0000000180)=0x6, 0x4) ioctl$TUNSETVNETHDRSZ(r3, 0x400454d8, &(0x7f0000000040)=0xd17) ioctl$TIOCNXCL(r3, 0x540d) mlock2(&(0x7f0000ffa000/0x6000)=nil, 0x6000, 0x0) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f00000000c0)={0x0, 0x4}, 0xc) open(&(0x7f0000001b40)='./bus\x00', 0x0, 0x0) accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d) r4 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40046602, 0x0) pread64(0xffffffffffffffff, 0x0, 0xffffffc4, 0x0) ftruncate(r4, 0x7fff) sendfile(r3, r4, 0x0, 0x8000fffffffe) [ 349.388636][T11252] bridge0: port 3(gretap0) entered blocking state [ 349.397470][T11252] bridge0: port 3(gretap0) entered disabled state [ 349.414502][T11252] device gretap0 entered promiscuous mode [ 349.426244][T11252] bridge0: port 3(gretap0) entered blocking state [ 349.434108][T11252] bridge0: port 3(gretap0) entered forwarding state [ 349.511495][T11255] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 19:05:44 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r1 = dup(r0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) accept4$vsock_stream(r3, &(0x7f0000000080)={0x28, 0x0, 0x0, @hyper}, 0x10, 0x80000) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r4 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r4, 0x0) syz_emit_ethernet(0x32, &(0x7f0000000040)={@local, @dev, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x24, 0x0, 0x0, 0x0, 0x21, 0x0, @remote={0xac, 0x24}, @local}, @dccp={{0x0, 0x4e20, 0x4, 0x60, 0x0, 0x0, 0x3, 0x2, 0x0, "e57044", 0x0, "cd98e8"}}}}}}, 0x0) r5 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000240)={'syz_tun\x00', 0x0}) r7 = syz_open_procfs(0x0, &(0x7f0000000100)='setgroups\x00') close(r7) r8 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_EVENTS(r8, 0x84, 0xb, &(0x7f0000000040)={0x0, 0x3, 0x40, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe}, 0xe) shutdown(r8, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r8, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x10, &(0x7f00000002c0)=[@in={0x2, 0x0, @local}]}, &(0x7f0000000180)=0x10) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r1, 0xc08c5336, &(0x7f0000000340)={0xe1, 0x8000000, 0x0, 'queue0\x00', 0x7fffffff}) r9 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r9, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r8, 0x84, 0x72, &(0x7f0000000080)={r10}, 0xc) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r7, 0x84, 0x77, &(0x7f0000000000)={r10, 0x1000, 0x5, [0x7, 0x0, 0x800, 0x200, 0xfdd1]}, &(0x7f0000000180)=0x12) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r3, 0x84, 0x18, &(0x7f00000000c0)={r10, 0x4}, 0x8) r11 = socket$nl_route(0x10, 0x3, 0x0) r12 = gettid() sendmsg$nl_route(r11, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000280)=@newlink={0xa8, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@IFLA_NET_NS_PID={0x8, 0x13, r12}, @IFLA_XDP={0x80, 0x2b, [@IFLA_XDP_FD={0x7c, 0x1, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}}]}]}, 0xa8}}, 0x0) ptrace$peek(0x2, r12, &(0x7f0000000000)) 19:05:44 executing program 1: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) getpid() r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) clone3(&(0x7f00000005c0)={0x6240447d993d0188, &(0x7f0000000240), &(0x7f00000003c0), &(0x7f0000000400), {}, 0x0, 0x0, 0x0, &(0x7f0000000540)}, 0x50) r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @ipv4={[], [], @local}}, 0x1c) fcntl$getownex(r1, 0x10, &(0x7f0000000600)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000640)=0x0) getpgrp(r2) syz_open_dev$radio(0x0, 0x0, 0x2) ioctl$VIDIOC_QUERYMENU(0xffffffffffffffff, 0xc02c5625, &(0x7f0000000080)={0x98f904, 0x0, @value}) clock_adjtime(0x0, &(0x7f00000000c0)={0x7, 0x2, 0x9, 0xffffffff, 0x6, 0x800000, 0x401, 0x200, 0x0, 0x1a74a503, 0x3, 0x0, 0x9, 0x664, 0x80, 0x0, 0x6c, 0x9, 0x8000008, 0x0, 0x5, 0x3, 0x9, 0xfffffffffffffff5, 0xffffffffffff3691, 0xbba}) r3 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x20) setsockopt$inet6_int(r3, 0x29, 0x0, 0x0, 0x0) open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x40) getpgid(0x0) memfd_create(&(0x7f0000000140)='lotrusted\x1a\x00', 0x0) syz_open_dev$sndseq(0x0, 0x0, 0x1) writev(0xffffffffffffffff, &(0x7f0000000040), 0x0) ppoll(&(0x7f0000000200)=[{}], 0x1, &(0x7f0000000280), 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = inotify_init1(0xc1000) fcntl$setown(r4, 0x8, 0xffffffffffffffff) fcntl$getownex(r4, 0x10, &(0x7f00000000c0)) openat$full(0xffffffffffffff9c, &(0x7f0000000380)='/dev/full\x00', 0x0, 0x0) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) r6 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x20, 0x80000) r7 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r7) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r7) ioctl$LOOP_CTL_ADD(r6, 0x4c80, r7) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, r7) ioctl$LOOP_CTL_ADD(r5, 0x4c80, 0x0) r8 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r8, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r8, 0x4c80, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x20) r9 = socket(0xa, 0x3, 0x8) syz_open_dev$amidi(&(0x7f0000000340)='/dev/amidi#\x00', 0x9c4, 0x70000) ioctl$sock_inet_SIOCSIFFLAGS(r9, 0x89a2, &(0x7f0000000180)={'bridge0\x00\x00\x01\x00', 0x4}) socket(0x1e, 0x2, 0x0) [ 349.870561][T11259] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 349.879949][T11259] A link change request failed with some changes committed already. Interface syz_tun may have been left with an inconsistent configuration, please check. 19:05:45 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r0, 0x0, r0) openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r3, 0x0, r4, 0x0, 0x70196c71, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x7) r5 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r6, 0x0, r7, 0x0, 0x70196c71, 0x0) ioctl$KVM_SET_TSS_ADDR(r7, 0xae47, 0x0) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="140000002200000127bd70000000000000000000"], 0x14}}, 0x40) 19:05:45 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x3) setsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f0000000100)=@dstopts, 0x8) setsockopt$inet6_buf(r0, 0x29, 0x39, &(0x7f0000000000)="ff02040000eeff0000000000000000000000000000020205", 0x18) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @local}, 0x1c) r1 = semget$private(0x0, 0x0, 0x208) semctl$GETPID(r1, 0x1, 0xb, &(0x7f0000000040)=""/113) r2 = socket(0x10, 0x2, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000480)=@setlink={0x70, 0x13, 0x711, 0x0, 0x0, {}, [@IFLA_ADDRESS={0xc, 0x1, @remote}, @IFLA_IFNAME={0x14, 0x3, 'veth1_to_team\x00'}, @IFLA_VFINFO_LIST={0x30, 0x16, [{0x2c, 0x1, [@IFLA_VF_MAC={0x28, 0x2, {0xfffffffc}}]}]}]}, 0x70}}, 0x0) [ 350.547118][T11274] A link change request failed with some changes committed already. Interface veth1_to_team may have been left with an inconsistent configuration, please check. 19:05:45 executing program 1: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000000)={@mcast2}, 0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r4, 0x0, r5, 0x0, 0x70196c71, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(r5, 0x810c5701, &(0x7f0000000500)) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r3, 0x0, r6, 0x0, 0x70196c71, 0x0) getsockopt$sock_linger(r3, 0x1, 0xd, &(0x7f0000000100), &(0x7f00000001c0)=0x8) close(r2) socket(0x10, 0x80002, 0x0) r7 = socket(0x11, 0x800000003, 0x0) bind(r7, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r7, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000640)=ANY=[@ANYBLOB="d0080000aff6b1fb7f0675a2d93ec293cfffffffb80e0ccb59c552fb51a1b91293b6f30c2534b18887e17eaa3ed9", @ANYRES32=r8, @ANYBLOB="00000000ffffffff000e00000800010063627100a408020004"], 0x3}}, 0x0) r9 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/autofs\x00', 0x0, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000340)='TIPCv2\x00') sendmsg$TIPC_NL_NAME_TABLE_GET(r9, &(0x7f00000004c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x800000a1}, 0xc, &(0x7f0000000480)={&(0x7f00000006c0)={0x140, 0x0, 0x200, 0x70bd2b, 0x25dfdbfd, {}, [@TIPC_NLA_LINK={0x10, 0x4, [@TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}]}, @TIPC_NLA_LINK={0x58, 0x4, [@TIPC_NLA_LINK_PROP={0x54, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0xb5}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x101}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x101}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x101}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x9}]}]}, @TIPC_NLA_BEARER={0xc4, 0x1, [@TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x5}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e23, 0x7, @mcast1, 0x5}}, {0x14, 0x2, @in={0x2, 0x4e20, @multicast1}}}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x5}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e24, 0x0, @dev={0xfe, 0x80, [], 0x2d}, 0x9}}, {0x14, 0x2, @in={0x2, 0x4e21, @loopback}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e23, 0xbb, @loopback, 0xffff8001}}, {0xfffffffffffffefb, 0x2, @in={0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x1b}}}}}, @TIPC_NLA_BEARER_DOMAIN={0x8}]}]}, 0x140}, 0x1, 0x0, 0x0, 0x8000}, 0x4) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) 19:05:46 executing program 2: mknod(&(0x7f0000000000)='./file0\x00', 0x10, 0x273c) open$dir(&(0x7f0000000040)='./file0\x00', 0x40000, 0x40) r0 = semget(0x1, 0x1, 0x3c) semctl$GETZCNT(r0, 0x4, 0xf, &(0x7f0000000080)=""/42) r1 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f00000000c0)={0x0, 0x6, 0x10, 0x7, 0x401}, &(0x7f0000000100)=0x18) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f0000000140)={r2, @in={{0x2, 0x4e20, @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x7e7, 0x8001, 0xfff, 0x7, 0xff}, &(0x7f0000000200)=0x98) r3 = dup(r1) getsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r3, 0x84, 0xc, &(0x7f0000000240), &(0x7f0000000280)=0x4) getuid() r4 = syz_open_dev$vcsn(&(0x7f00000002c0)='/dev/vcs#\x00', 0x4, 0x800) sendmsg(r4, &(0x7f0000000700)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f0000000300)="214152e5642dc0a3654ee0f927e1f97e230a0e014730e4c9184b145854e165d50e0d6534659cd5c62114a7bbb5f646f2dda81bbba825c31eda94874a90e5c516bd", 0x41}], 0x1, &(0x7f00000003c0)=[{0x20, 0x107, 0xf5b, "fa38f5781f3f47ebac74"}, {0x90, 0x10c, 0xcbc, "2eadaed6b1e615757bd919c3d6ad95b3bcd6272e15caf924fb65774eb4d78cfc11d474e7ecb7403964e84b24121fbd5cb8c1f0f65e9deae7bc046bcfa746480a36969eb879f1fd95ce7ef50702ce93df1b47a418bba01ccfdf526482d86b8d63453588befb01dbe6a136d944a287bd78f8fa4b73939b4f6e8c"}, {0x60, 0x103, 0x8, "9e5087e1cb9cfe7e4872b5e94599611d8cbfe0ff7098966d751318baa22ce1599eb126cba8ebea812347d0600017ef8d032eb7d48098fdeb1e27fd2fb52e2f15559f6a67738575d0e218ba2483940b"}, {0x108, 0x100, 0x6, "b9f6b38539222dc0d83ac91c4a6b1f49076b88df566a17016dffe5e11f3408e815437cda0065802971481045c9a031ac1fb9289d0af1c8d6bb35d6aec430dc27b078bb871a078feea5c102ef93c953d77a430fd8ae2e28b1f4066af574d198b6e7eeff4a9a499a0dba2a808c20aa3d34ebea9b39f391992225de33360fb4ae0a73333a0152eaad8442de746f04c7bf81675eac76c51ef906a3cee9666268bd1416911dae4caf032377fffd048409eb3cc5f8929cebe3abb1a215058e2dc481d621eef04fe2e912ca071b37a74c2b480f2a12af94cdeb9b1d0caca5d9e16458498f562a5faba25d12977c2c90166f309a7ea2fda8bacf0d"}, {0x18, 0x103, 0x200, "956f1380"}, {0xe0, 0x108, 0x4, "2a9a6e8eb71551fa195c0a6e2fcf4d0aaad1d7c04f91f9fbec22efef217b39ccde5cc7ef59b9628f47571daafd06cd82e6db3d45c5a6be1cae127fca80d802ebce52500f649774b4bb7fce668a2a8011230f726ef41ed4827c11652e6a49b7f52fdaabbe128380eced663ca352a233dc9b64c9e6a2684a083a53ae10287885b709e6f7d77919c34e3b0270d47b157359f35bbe4b3905e6bee4084d4ead8dcf33d4eed66f3ca662c061e6ba09efd992830e03c933899b25a29faad40c23cc83a5b4ce0b968602cd6b24"}], 0x310}, 0x4000000) r5 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000740)='/dev/vcsu\x00', 0x200000, 0x0) move_mount(r5, &(0x7f0000000780)='./file0\x00', 0xffffffffffffffff, &(0x7f00000007c0)='./file0\x00', 0x2) ioctl$UI_SET_PHYS(r3, 0x4008556c, &(0x7f0000000800)='syz1\x00') ioctl$VIDIOC_TRY_EXT_CTRLS(r1, 0xc0205649, &(0x7f00000008c0)={0xfffffff, 0x7ff, 0xfffff000, r3, 0x0, &(0x7f0000000880)={0x9a0920, 0x0, [], @p_u8=&(0x7f0000000840)=0x3f}}) ioctl$VIDIOC_S_AUDOUT(r6, 0x40345632, &(0x7f0000000900)={0xff, "937ae01f88a7697048c0de4ce2d6ba4a521a7892f89f548c723c2570af7dd7c9", 0x2, 0x1}) getsockopt$CAN_RAW_FD_FRAMES(r4, 0x65, 0x5, &(0x7f0000000940), &(0x7f0000000980)=0x4) ioctl$sock_inet6_tcp_SIOCOUTQNSD(r5, 0x894b, &(0x7f00000009c0)) r7 = openat$vimc0(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/video0\x00', 0x2, 0x0) ioctl$FIBMAP(r7, 0x1, &(0x7f0000000a40)=0x10000) bind$unix(r5, &(0x7f0000000a80)=@file={0x1, './file0\x00'}, 0x6e) write$FUSE_DIRENT(r6, &(0x7f0000000b00)={0x158, 0xfffffffffffffff5, 0x2, [{0x3, 0xd7, 0x5, 0x9, 'syz1\x00'}, {0x0, 0x8, 0xa, 0x1, '/dev/vcsu\x00'}, {0x0, 0x1, 0x0, 0x4}, {0x4, 0x1, 0x1e, 0x1, 'posix_acl_access(-systemmd5sum'}, {0x2, 0x80000000, 0xa, 0x7, '/dev/vcs#\x00'}, {0x5, 0x3f, 0xa, 0x1e, '/dev/vcs#\x00'}, {0x3, 0x8c1, 0x22, 0x1, 'systemwlan1eth1/]+^.\x1e{@-//\x95[vmnet0'}, {0x0, 0x6b, 0x5, 0x6, 'syz1\x00'}]}, 0x158) ioctl$VIDIOC_G_EXT_CTRLS(r4, 0xc0205647, &(0x7f0000000d00)={0x9a0000, 0x4, 0x56, 0xffffffffffffffff, 0x0, &(0x7f0000000cc0)={0x4b84ef, 0x127, [], @p_u32=&(0x7f0000000c80)=0x5}}) recvmmsg(r4, &(0x7f0000003ec0)=[{{&(0x7f0000001040)=@ipx, 0x80, &(0x7f00000014c0)=[{&(0x7f00000010c0)=""/200, 0xc8}, {&(0x7f00000011c0)=""/54, 0x36}, {&(0x7f0000001200)=""/247, 0xf7}, {&(0x7f0000001300)=""/238, 0xee}, {&(0x7f0000001400)=""/33, 0x21}, {&(0x7f0000001440)=""/101, 0x65}], 0x6, &(0x7f0000001540)=""/4096, 0x1000}, 0x6}, {{&(0x7f0000002540)=@pppol2tp, 0x80, &(0x7f0000003800)=[{&(0x7f00000025c0)=""/153, 0x99}, {&(0x7f0000002680)=""/229, 0xe5}, {&(0x7f0000002780)=""/126, 0x7e}, {&(0x7f0000002800)=""/4096, 0x1000}], 0x4, &(0x7f0000003840)=""/165, 0xa5}, 0x6}, {{&(0x7f0000003900)=@can={0x1d, 0x0}, 0x80, &(0x7f0000003e40)=[{&(0x7f0000003980)=""/184, 0xb8}, {&(0x7f0000003a40)=""/208, 0xd0}, {&(0x7f0000003b40)=""/254, 0xfe}, {&(0x7f0000003c40)=""/110, 0x6e}, {&(0x7f0000003cc0)=""/253, 0xfd}, {&(0x7f0000003dc0)}, {&(0x7f0000003e00)}], 0x7}, 0xf65}], 0x3, 0x40002003, &(0x7f0000003f80)={0x0, 0x989680}) setsockopt$packet_drop_memb(r8, 0x107, 0x2, &(0x7f0000003fc0)={r9, 0x1, 0x6, @remote}, 0x10) fsconfig$FSCONFIG_SET_PATH(r6, 0x3, &(0x7f0000004000)='systemwlan1eth1/]+^.\x1e{@-//\x95[vmnet0', &(0x7f0000004040)='./file0\x00', 0xffffffffffffffff) ioctl$VIDIOC_TRY_EXT_CTRLS(0xffffffffffffffff, 0xc0205649, &(0x7f0000004100)={0xa00000, 0x401, 0x9, 0xffffffffffffffff, 0x0, &(0x7f00000040c0)={0x98090d, 0x6, [], @p_u16=&(0x7f0000004080)=0x1ff}}) ioctl$KVM_X86_GET_MCE_CAP_SUPPORTED(r10, 0x8008ae9d, &(0x7f0000004140)=""/162) mlock2(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0) 19:05:46 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_IGMP_VERSION={0x8}]}}}]}, 0x3c}}, 0x0) r2 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r2, &(0x7f0000000140), 0xd3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r3, 0x0, r4, 0x0, 0x70196c71, 0x0) getsockopt$TIPC_SOCK_RECVQ_DEPTH(r4, 0x10f, 0x84, &(0x7f0000000100), &(0x7f0000000140)=0xffffffffffffffd6) 19:05:46 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) r3 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0xff, 0x40000) setsockopt$pppl2tp_PPPOL2TP_SO_SENDSEQ(r3, 0x111, 0x3, 0x0, 0x4) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = socket$nl_route(0x10, 0x3, 0x0) splice(r4, 0x0, r6, 0x0, 0x8003, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="fc0000001d000704ab095806090007000aab08000600000002ffff93210001", 0x1f) write$binfmt_elf64(r5, &(0x7f0000000000)=ANY=[], 0xfffffd88) [ 351.524201][T11287] netlink: 'syz-executor.0': attribute type 43 has an invalid length. [ 351.808433][T11294] IPVS: ftp: loaded support on port[0] = 21 [ 351.996014][T11294] chnl_net:caif_netlink_parms(): no params data found [ 352.076760][T11294] bridge0: port 1(bridge_slave_0) entered blocking state [ 352.084380][T11294] bridge0: port 1(bridge_slave_0) entered disabled state [ 352.095164][T11294] device bridge_slave_0 entered promiscuous mode [ 352.108011][T11294] bridge0: port 2(bridge_slave_1) entered blocking state [ 352.115429][T11294] bridge0: port 2(bridge_slave_1) entered disabled state [ 352.124915][T11294] device bridge_slave_1 entered promiscuous mode [ 352.169312][T11294] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 352.184248][T11294] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 352.226486][T11294] team0: Port device team_slave_0 added [ 352.237954][T11294] team0: Port device team_slave_1 added [ 352.353131][T11294] device hsr_slave_0 entered promiscuous mode [ 352.385316][T11294] device hsr_slave_1 entered promiscuous mode [ 352.424675][T11294] debugfs: Directory 'hsr0' with parent '/' already present! [ 352.434515][T11289] netlink: 'syz-executor.0': attribute type 43 has an invalid length. 19:05:47 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='setgroups\x00') close(r1) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_EVENTS(r2, 0x84, 0xb, &(0x7f0000000040)={0x0, 0x3, 0x40}, 0x296) shutdown(r2, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r2, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x10, &(0x7f00000002c0)=[@in={0x2, 0x0, @local}]}, &(0x7f0000000180)=0x10) r3 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r3, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000080)={r4}, 0xc) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000000000)={r4, 0x1000, 0x5, [0x7, 0x0, 0x800, 0x200, 0xfdd1]}, &(0x7f0000000180)=0x12) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000100)={r4, 0x2, 0x1, 0x7, 0x400, 0x4}, 0x14) r5 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r5, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0xd}, 0x1c) modify_ldt$read(0x0, &(0x7f00000001c0)=""/31, 0x1f) signalfd(0xffffffffffffffff, &(0x7f0000000080), 0x8) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000016c0)) io_setup(0x3b24, &(0x7f0000000000)=0x0) io_submit(r6, 0x6c2, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r5, &(0x7f0000000780), 0x4000}]) 19:05:47 executing program 1: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000100)={0x0, 0xfffffff8}, 0xc) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000040)="660f382b1a0f01dfdde80f32d9e90f086665676426f7c5000000000f2245deef0f23f5", 0x23}], 0xaaaaaaaaaaab1c3, 0x0, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000400)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_GET(r5, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000440)={0x20, r6, 0x415, 0x0, 0x0, {}, [@TIPC_NLA_MEDIA={0xc, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}]}]}, 0x20}}, 0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(r4, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x4816105}, 0xc, &(0x7f0000000200)={&(0x7f0000000380)={0xe4, r6, 0x400, 0x70bd29, 0x25dfdbfb, {}, [@TIPC_NLA_NODE={0xc, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x400}]}, @TIPC_NLA_MON={0x34, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x8}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x6}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x11d5}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x9}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x3ff}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x9}]}, @TIPC_NLA_MEDIA={0x44, 0x5, [@TIPC_NLA_MEDIA_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x12}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xa81}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xe}]}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x16}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}]}]}, @TIPC_NLA_SOCK={0x4c, 0x2, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0x8}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x20}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x58fe60da}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x7}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x80000001}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x80000001}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x5}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}]}, 0xe4}, 0x1, 0x0, 0x0, 0x8000}, 0x20010) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) openat$cuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/cuse\x00', 0x2, 0x0) r7 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) r8 = socket$inet6_tcp(0xa, 0x1, 0x0) r9 = fcntl$dupfd(r8, 0x0, r8) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) ioctl$KVM_SET_REGS(r9, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x40000004, 0x0, 0x0, 0x0, 0x4cb, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x3], 0x12000}) ioctl$KVM_RUN(r7, 0xae80, 0x0) [ 352.757511][T11294] netdevsim netdevsim2 netdevsim0: renamed from eth0 19:05:47 executing program 0: r0 = socket$kcm(0x2b, 0x8000000000001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socket$kcm(0x2, 0x3, 0x2) r1 = socket$kcm(0x2, 0x3, 0x2) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000700)={'team0\x00\x00\x00\x00\a\x00\x00\xf7\x00', @broadcast}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r2, 0x0, r2) accept4(r2, &(0x7f0000000000)=@l2tp6={0xa, 0x0, 0x0, @loopback}, &(0x7f0000000080)=0x80, 0x800) [ 352.830037][T11294] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 352.880964][T11294] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 352.888510][T11303] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. [ 352.913182][T11294] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 353.050126][T11307] device team0 entered promiscuous mode [ 353.056878][T11307] device team_slave_0 entered promiscuous mode [ 353.063664][T11307] device team_slave_1 entered promiscuous mode 19:05:48 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$netlink(0x10, 0x3, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000040)) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='net/dev_mcast\x00') r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) r4 = dup(0xffffffffffffffff) getpeername$packet(r4, 0x0, 0x0) ioctl$VFIO_SET_IOMMU(0xffffffffffffffff, 0x3b66, 0xd9f0986a28e2824b) ioctl$TCSETS(r3, 0x40045431, &(0x7f00003b9fdc)={0x0, 0x0, 0x0, 0x0, 0x0, "deffffffffffffa70000000000000800"}) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r2, 0xc0505350, &(0x7f00000001c0)={{0x0, 0x8}, {0x1, 0x2}, 0x59c, 0x1, 0xe1}) r5 = syz_open_pts(r3, 0x2a801) sendfile(r5, r2, 0x0, 0x6f0a77bd) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000000)={r2}) socketpair$unix(0x1, 0x0, 0x0, 0x0) r6 = dup(0xffffffffffffffff) getpeername$packet(r6, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x12) ioctl$VFIO_IOMMU_GET_INFO(0xffffffffffffffff, 0x3b70, &(0x7f0000000300)={0x18}) write$tun(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="0000000000000000000000000000000000000000609f116001e10000fe8000030000000000000000000000bbc3c29c9949d4880efc713cd8ac837813000804040000ffddff01000000000000000000000000000100000000000000000000000000000001fe880000000000000000000000000001ff02000000000000000000000000000100120409000000000000000000000000000000000000000100000000000000000000000000000000fe88000000000000000000000000000100000000000000000000000000000000fe88000000000000000000000000000100000000000000000000ffff0000000021001c1944fb9a4104c49a871acf68005345913a039f67651d5c42fdaad900caff020000000000000000000000000001000000000101907801000000010000000100000001"], 0x1) [ 353.214594][T11294] 8021q: adding VLAN 0 to HW filter on device bond0 [ 353.252423][ T31] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready 19:05:48 executing program 1: r0 = socket$inet(0x10, 0x2, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) dup(r1) pipe(&(0x7f0000000000)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0xa7) sendmsg(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000380)="24000000200007041dfffd946f610500810000001f004203000008000800170006e7fe7e280000001100fffdba16a0aa1c0900000000000012000000000000eff24d8238cfa40e000000bf54", 0x4c}], 0x1}, 0x0) [ 353.261651][ T31] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 353.279345][T11294] 8021q: adding VLAN 0 to HW filter on device team0 [ 353.307602][ T31] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 353.317434][ T31] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 353.328369][ T31] bridge0: port 1(bridge_slave_0) entered blocking state [ 353.335744][ T31] bridge0: port 1(bridge_slave_0) entered forwarding state [ 353.418386][T11320] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. 19:05:48 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cpuacct.stat\x00', 0x0, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000140)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, @vti={{0x8, 0x1, 'vti\x00'}, {0x14, 0x2, [@IFLA_VTI_REMOTE={0x8, 0x5, @multicast2}, @IFLA_VTI_LOCAL={0x8, 0x4, @dev}]}}}]}, 0x40}}, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r2, 0x8983, &(0x7f00000002c0)={0x2, 'rose0\x00', {0x41}, 0x7}) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0xe8, &(0x7f0000000480)=[@in={0x2, 0x4e20, @rand_addr=0x9}, @in6={0xa, 0x4e21, 0x8000, @mcast2}, @in6={0xa, 0x4e22, 0x1, @local, 0x81}, @in6={0xa, 0x4e23, 0x9, @empty, 0x2}, @in6={0xa, 0x4e22, 0x40, @local, 0x253}, @in={0x2, 0x4e20, @empty}, @in={0x2, 0x4e20}, @in6={0xa, 0x4e22, 0x8, @ipv4={[], [], @rand_addr=0x81}, 0xdec}, @in6={0xa, 0x4e23, 0x9, @ipv4={[], [], @multicast1}, 0x1fe000}, @in={0x2, 0x4e23, @initdev={0xac, 0x1e, 0x1, 0x0}}]}, &(0x7f0000000040)=0x10) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000180)={r4, 0x101}, 0x8) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000580)=""/143, &(0x7f0000000340)=0xfee5) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000000000/0x1000)=nil}) r5 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r5, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0xfb]}) ioctl$KVM_RUN(r5, 0xae80, 0x0) recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000440)={0x2, 0x4e21, @remote}, 0x10) sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000008c0)={0xa0, 0x0, 0x0, 0x3, 0x0, {}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x8}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x6c}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x1000}, @IPVS_CMD_ATTR_DEST={0xc, 0x2, [@IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0xfffff000}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x6}, @IPVS_CMD_ATTR_SERVICE={0x50, 0x1, [@IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e22}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x6473aea8}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x2e}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'sh\x00'}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x32}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0x2}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x4}}]}, @IPVS_CMD_ATTR_DEST={0xc, 0x2, [@IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x7fff}]}]}, 0xa0}}, 0x0) ioctl$KVM_RUN(r5, 0xae80, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000140)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, @vti={{0x8, 0x1, 'vti\x00'}, {0x14, 0x2, [@IFLA_VTI_REMOTE={0x8, 0x5, @multicast2}, @IFLA_VTI_LOCAL={0x8, 0x4, @dev}]}}}]}, 0x40}}, 0x0) ioctl$KVM_NMI(r5, 0xae9a) ioctl$KVM_SET_REGS(r5, 0x4090ae82, &(0x7f0000000380)) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) r7 = dup2(r6, r6) getsockopt$inet6_int(r7, 0x29, 0x4c, 0x0, &(0x7f0000000040)) r8 = socket$inet6(0xa, 0x3, 0x4) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x8, 0x20010, r8, 0xc85cf000) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r8, 0x29, 0x20, &(0x7f0000000040)={@loopback, 0x0, 0x0, 0x1, 0x3}, 0x20) connect$inet6(r8, &(0x7f0000000500)={0xa, 0x0, 0x40f6, @dev={0xfe, 0x80, [], 0xb}, 0x401}, 0xfffffffffffffff8) clone3(&(0x7f0000000840)={0x100000, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000540)=0x0, {0x13}, &(0x7f00000006c0)=""/139, 0x8b, &(0x7f0000000780)=""/149, &(0x7f0000000580)=[0xffffffffffffffff], 0x1}, 0x50) r10 = syz_open_procfs(r9, &(0x7f0000000400)='net/ip6_flowlabel\x00n\xc0@\xd0\xe6\xbbQ\xd7\xff?\x00\x87\x04\x00\x00\x00\x00\x00\x00\x00\x1f[\xf4Ci|\x1f\x00\x00\x002\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x8b\"\x7fG3\xc1E\xe6e6G@\x9f\xb7\' \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xd5\x85\x89\xfc\xd2\xd7\x00\x00\x00\x00\x00\x10\x00\x00\x00\x00') sendfile(r8, r10, &(0x7f0000000240)=0x200, 0x4000000000dc) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000380)={0x0}) ioctl$DRM_IOCTL_GET_CTX(r10, 0xc0086423, &(0x7f00000003c0)={r11}) ioctl$DRM_IOCTL_GET_SAREA_CTX(r7, 0xc010641d, &(0x7f0000000300)={r11, &(0x7f0000000640)=""/126}) ioctl$KVM_RUN(r5, 0xae80, 0x0) [ 353.831533][T11294] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 353.842654][T11294] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 353.865048][ T3386] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 353.874179][ T3386] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 353.886087][ T3386] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 353.895489][ T3386] bridge0: port 2(bridge_slave_1) entered blocking state [ 353.902902][ T3386] bridge0: port 2(bridge_slave_1) entered forwarding state [ 353.911999][ T3386] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 353.923280][ T3386] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 353.934008][ T3386] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 353.944342][ T3386] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 353.954628][ T3386] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 353.966050][ T3386] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 353.976258][ T3386] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 353.985644][ T3386] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 353.995562][ T3386] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 354.005299][ T3386] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 354.027756][ T3386] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 354.037556][ T3386] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready 19:05:49 executing program 1: r0 = socket(0x10, 0x80002, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="600000002a0007000000ec100000000000000000", @ANYRES32=r2, @ANYBLOB="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"], 0x60}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x332, 0x0) setxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@random={'osx.', 'bridge_slave_1\x00'}, &(0x7f0000000080)='\x00', 0x1, 0x1) [ 354.139659][ T3386] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 354.147620][ T3386] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 354.176738][T11294] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 354.304169][T11336] netlink: 52 bytes leftover after parsing attributes in process `syz-executor.1'. [ 354.366264][T11337] netlink: 52 bytes leftover after parsing attributes in process `syz-executor.1'. 19:05:49 executing program 0: openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video37\x00', 0x2, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000003740)={0x0, 0xffffffffffffffd4, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x20, 0x10, 0x701, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x44040}}, 0x20}, 0x1, 0x0, 0x0, 0x70fb1910980f4d29}, 0x0) 19:05:49 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r1, &(0x7f0000000080)={0x2}) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000640)=""/148, 0x94}], 0x100000000000026e, 0x0) syz_open_dev$vivid(&(0x7f0000000000)='/dev/video#\x00', 0x0, 0x2) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter6\x00') preadv(r2, &(0x7f0000000100), 0x174, 0x4000006800) 19:05:49 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000340)='/\bt\x00\x00netGtun@', 0x40, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x6011}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net\x00') fchdir(r1) exit(0x0) lchown(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) 19:05:49 executing program 2: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x420080, 0x0) ioctl$SG_GET_COMMAND_Q(r0, 0x2270, &(0x7f0000000140)) r1 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r4, 0x0, r5, 0x0, 0x70196c71, 0x0) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) timerfd_gettime(r6, &(0x7f00000000c0)) getsockname$packet(r5, &(0x7f0000001a40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000001a80)=0x14) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000001ac0)=@newlink={0xf8, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x400}, [@IFLA_NUM_TX_QUEUES={0x8, 0x1f, 0x100}, @IFLA_VF_PORTS={0xc8, 0x18, [{0x58, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "14de305e72f46b0e2167db629e4ffedc"}, @IFLA_PORT_PROFILE={0x8, 0x2, '\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "2e3a295db5ecae81b866ecbd55946826"}, @IFLA_PORT_PROFILE={0xc, 0x2, 'nodev\x00'}, @IFLA_PORT_PROFILE={0x8, 0x2, '\x00'}, @IFLA_PORT_VF={0x8, 0x1, 0x1}, @IFLA_PORT_VF={0x8, 0x1, 0x5}]}, {0x28, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "7be30900f10400"}, @IFLA_PORT_REQUEST={0x8}, @IFLA_PORT_REQUEST={0x8, 0x6, 0xa}]}, {0x44, 0x1, [@IFLA_PORT_REQUEST={0x8, 0x6, 0x7f}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "081cc26e208d1c7b046dd020478fca3d"}, @IFLA_PORT_PROFILE={0x10, 0x2, 'bdevvmnet1(\x00'}, @IFLA_PORT_PROFILE={0x14, 0x2, 'eth0cpuset&:\x00'}]}]}, @IFLA_LINK={0x8, 0x5, r7}]}, 0xf8}}, 0x0) 19:05:50 executing program 1: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='new default user:syz 040'], 0x1, 0x0) r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f00000001c0)={'syz'}, &(0x7f00000002c0)='X', 0x1, 0xfffffffffffffffe) keyctl$read(0xb, r0, &(0x7f0000000240)=""/112, 0x349b7f55) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r1, 0x0, r2, 0x0, 0x70196c71, 0x0) ioctl$VIDIOC_DQBUF(r2, 0xc0585611, &(0x7f00000005c0)={0x5, 0x4, 0x4, 0x0, 0x7, {0x0, 0x2710}, {0x4, 0x302f95ac908d1685, 0xe8, 0x7f, 0x3, 0x0, "ef3f42fd"}, 0x6, 0x1, @userptr=0x100, 0x7f, 0x0, 0xffffffffffffffff}) r4 = syz_open_procfs(0x0, &(0x7f0000000100)='setgroups\x00') close(r4) r5 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_EVENTS(r5, 0x84, 0xb, &(0x7f0000000040)={0x0, 0x3, 0x40}, 0x296) shutdown(r5, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r5, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x10, &(0x7f00000002c0)=[@in={0x2, 0x0, @local}]}, &(0x7f0000000180)=0x10) r6 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r6, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r5, 0x84, 0x72, &(0x7f0000000080)={r7}, 0xc) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r4, 0x84, 0x77, &(0x7f0000000000)={r7, 0x1000, 0x5, [0x7, 0x0, 0x800, 0x200, 0xfdd1]}, &(0x7f0000000180)=0x12) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r3, 0x84, 0x1, &(0x7f0000000640)={r7, 0x1, 0x5e96, 0xc3f, 0x9b6, 0x7}, 0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r8, 0x0, r9, 0x0, 0x70196c71, 0x0) write$vhost_msg(r9, &(0x7f0000000080)={0x1, {&(0x7f0000000300)=""/219, 0xdb, &(0x7f0000000400)=""/248, 0x2, 0x4}}, 0x48) r10 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) r11 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r12 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000080)='/proc/capi/capi20\x00', 0x2, 0x0) ioctl$LOOP_CTL_REMOVE(r12, 0x4c81, r11) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r11) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r15, 0x0, r16, 0x0, 0x70196c71, 0x0) getdents64(r16, &(0x7f0000000500)=""/135, 0x87) splice(r13, 0x0, r14, 0x0, 0x70196c71, 0x0) ioctl$FITRIM(r13, 0xc0185879, &(0x7f0000000200)={0x4, 0x47c, 0x4}) ioctl$LOOP_CTL_REMOVE(r10, 0x4c81, r11) ioctl$LOOP_CTL_ADD(r9, 0x4c80, r11) 19:05:50 executing program 0: pwrite64(0xffffffffffffffff, &(0x7f0000000180)="b3", 0x1, 0x0) r0 = socket$inet(0x2, 0x80a, 0x0) r1 = socket$inet(0x2, 0x3, 0x8) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) r4 = syz_open_procfs(0x0, &(0x7f0000000100)='setgroups\x00') close(r4) r5 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_EVENTS(r5, 0x84, 0xb, &(0x7f0000000040)={0x0, 0x3, 0x40}, 0x296) shutdown(r5, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r5, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x10, &(0x7f00000002c0)=[@in={0x2, 0x0, @local}]}, &(0x7f0000000180)=0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r6, 0x0, r7, 0x0, 0x70196c71, 0x0) ioctl$KVM_ASSIGN_SET_MSIX_ENTRY(r7, 0x4010ae74, &(0x7f0000000140)={0x1, 0x400, 0x2}) r8 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r8, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r5, 0x84, 0x72, &(0x7f0000000080)={r9}, 0xc) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r4, 0x84, 0x77, &(0x7f0000000000)={r9, 0x1000, 0x5, [0x7, 0x0, 0x800, 0x200, 0xfdd1]}, &(0x7f0000000180)=0x12) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r2, 0x84, 0x75, &(0x7f0000000080)={r9, 0x100}, 0x8) keyctl$update(0x2, r3, &(0x7f0000000240)="db40951195b65329509626699071a860088261af3fd5f91a", 0x18) write$P9_RVERSION(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="52d70000323030302e4c"], 0x15) r10 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r3, r10, r3}, &(0x7f00000000c0)=""/83, 0xffffffffffffffc9, 0x0) 19:05:51 executing program 2: bind$alg(0xffffffffffffffff, &(0x7f0000001000)={0x26, 'hash\x00', 0x0, 0x0, 'michael_mic\x00'}, 0x58) mlock2(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$binfmt_elf64(r2, &(0x7f0000001080)={{0x7f, 0x45, 0x4c, 0x46, 0x3, 0xd8, 0x2, 0x0, 0x0, 0x3, 0x38, 0x3, 0x3ae, 0x40, 0xa7, 0x5, 0x9, 0x38, 0x2, 0x8000, 0x1, 0x8}, [{0x4, 0x9, 0x3, 0x1bf1, 0x6, 0x4, 0x4, 0x5}], "56781af7ef0b95f80080eceea21d9cf4bd4755c46d8ee3087ec85272dbb38c382e38015a8a39c5e6e6b8a97c1695a9fc9085490e8168518a89a7d9329d9d6cb960415956dae41373eb57a7ac4aa620be4e829a2fed1916c8d676e368fc50e9d0946b852bc543f718b411071aca9bc2e79cca4d8b9bdbe562b8999e5ebb70aacfaf32acc0b134260959d858e61972a3a92e6d86e2d1b091f590db7bcd8e7391f167250b81fcb8847c1c549efaf6a537795e05fd1b3c4d35da2f72c64d3e5a528e25733b6435c1bc03c6ce1cce51fd3ef1e225b5a4fb26126f25bc30b05d1234e2d37dad38be04cb9944c1e560db102d2bdd1b2c5f31b55fbe0035a4b0f9352eacec0aeb3aca247e4152d162df7b10e0b1df18bc3343bdfa7417645257b95ded106072c88cac004386b4fe1c636dcfd9e2cc247e30abf1e76022b661f38086e8f4bd98d61a0ecbd6d9ba661f504cf3346ae309bbcf5aeb1cb59cf2e9e6dbd06b9e7951495df1b62f558f40b6eda7ebe91a675731f6303a817eac5dd7e18f60b8e2257fd8eac51f31f0544317adcad5aa04df2cf576daced68c51d494eeb0e3e992d2b947707cb5d0c7ce5ec23904484703eeb2c6015820b399cd0a1dca46dd6948192c84f2d204b53ebfb1b086e5bdc7125e1b2b8afc0ec53d11a9bc7ceb877402e99bf682e55e54ac659c9a657eea83b8647fb21d679d8c7a05446fbeb37a382ac34de470cb5d56272663d721a8412b5c932e544563a3d1e34b2b37440b8f1ec214b085e3480045f1a6f25a1d3b21ccab3f32acf0558b9955487e8fef1ff86bd25ff1dcfdb4710a659d5e97ff8e42e44df1800dadd187ef01daf8195ee77be68ae2fe01aadaf0e41c3589e08b0377c429e6ce15b7ebd5beae1ee2b391a13323175268b2bb2ff621683755daee76385d49676f8d5a5317a9ba972d76b54a378f0a463883cf5aee41c2e3f980de94d1a137156de9358a927da73eb1c6bf89ee18db6e73dd8c444f3967aad425e76609c4051267b71fceb8676dd85d106bf6908c77440adbdcbe23181f16698fd5ef8f30a26f707ec8337753e488e06a29d80fdbeade7000afd5eb1aa9cea33f6564eaf49730c06820be0038869aecb0157bfad050d0ce9389071fa797b168f98941498001e7ca5480095b6f6badd7a2b73070049f29ec6a6af52125de162ede6bff4c2449ed8c500eb213300b9b420f9034bceed157ddbbd7d14fc941d33cd8946fc72dc5a39f314468d564fb8088e19ae9f188259cae5bc2b72e5b73ac3a4620617a16f03cd1995dad1756441f99495a755f2d1ae13d899c2529f06420b77dc2a87ea172140108debb77a4deb4cde05baf006f1b895fcbdbecbae80de8f59e6eaa72088033a0690dc6c6cee6c482b6b4471fecea85eb517d3fffa9bbb1f00adb41a0946ba33a80b6ab95af69f3aa5740b8d822035cb7e1fa7d043f22434a196f712012ca9ca47158d08884e7b3eb6e8542ce330dc3b4b23b25733ff7374a7295d2430c2e6bfb599098cc5db8406de4e510b54c699dde4d3ade5e08d407483c20a2b328681edc0ad108829b2a2386ed91e63877e796d2fd1c6c093b566e7263b7d260198200ac231f7ba232146d0b80e3238e89427528837a45adc60beedba61dbcb59dc757489fb04e5184a3f13c2a6519cd4c76e118ce4eceb87cf4a2b798d89d5aad1e9befea5b23152bca5c3a15653e8e09847115ace3ce9f93da679559e4d3732956e99f16b7b0ab6806f09b8740a1ce8a5ae9e55c9803e82f063c9e702deca46853591245a594e8ba40e827a55512d0abdaa4270adba4ed5793637488ec115a10377046ec6b8dfbac7dd3090aa35d8afc813d7a30b5a809f02ebcd8d2d48f07d346747ad481f48ce1185548b668265fba513847d818b3b0ec7322d042d3754058bcda1ba680b1324290b5717114307e9e06d81f8be0bc222c69ce62ec527cdacfa7a7fff2bb1ca48fd5431e87deb1a2b0e95193352a3f223ae47c6694c12da48f710dcaa88dd5b41974e39093d78dc054c6b4c1b395d273309bd2d0a82ab23d163a0231278161ffc31736b148cd948b2b04fb57c7bcaaec57ff0734ce842c6c54ac23a25a14b8339b1463493042d55b99c5054561cee50b1e154036bbe8bbb8bfc62c834209b05a2c4e9f86f9e68c19bf4a91e3af6bce854cdaf766ea4ed4b443bfdcad05c55249cc0c6044cf37ed817699973c21d825750894737278b516650b2f21a687f77b77f0b4b0728d1af37bf25831c6f713809d4792085f23f709baca5e8bb9fd84ad621ae01e7a10fbac9743b473bb162384f05485dbcee0e33442483aab49785b69400ae0543ce82f20b0e8935c5a3a172f5c9cc71fb5b45a21bed11ce5aa23cef79cdb7a51614ca576790e2c4f5a0486ebde8920bc1fb1358bb62873a2bf93bb186d9e5321bf628e622925ac0d004d938a9c56328a9a681a2dae0e2bb01e76425fdd01c40a8717f212b6aecad4a71d9fc17f3f8aef0966ecf77223f00ea4f6af1f6aaf0f516a9cd5b6072ea0dffbd111c22c4ecf05375e96403a385b397c3ed280fa50a9150dcc28dddd38b4d58890d365e62434a2b928a3ab17d75f38adf3d1838e7cf82ffab21a83a0c0f4157d3f8bdfaa7d2c5321a079bf5ccf4c6b776b8bfc3bde30b9adb536c7b4956f859595a27205f67e54a6672256bccfb4fb6026a31f306e288fe5723d6d31c385b5dbff2165596fc6b927117736f4f65d0d31db2fa41074f10fd51edab9dc100963bec3d77fe310fd4b9435c2e5ce36e847f5dab6b92e6e3f922e34e1b329bc01932d9f4fde44d66cb60d11df6932d1cdabffbb6a381971995112781abdde985fbfe649b56599c17e2b9e484596a227bb947c34f354dbf4221a83e0f3ac4c38d8b2c13ac8234f0582e0f9944e12cc4231d2067c3211854485814d04f3226c3e34b20039e9bfd7fa57dde392f89431895c572f9c490701fa877dd2fcfdff45dddca59a7cd9dda2a3bd2febe26dd24266ec785887efe60cf91db24d072d937ea661301ae23a114916d697a4fc89ea0a73721c8a5be8eb3e1257c224de54a4cc5666f01c394c1927c4e19b079a88a27861e52c3dd27a98550e2039464205f3294d282404455ccceca27d5132cc2795843b9bc36142703a99c42e785b90e2592983a9a35d195ea70eb4490e72116824fb64684a0b890890e9252ba99e3c318f51c52e27e617ebc7d4e0914f066c9ad88efa7d0ae2b54052401413e07743bfbfa4ce7716990320d1ddfbb042ccb96caad5c0db97457c5335c1a327414288f77838794f31209a06cf67b8ce1fe96831a13098ef53294398c7c09b04def5d5a5af43fb5e0474ce5ec8468bea91e3bef4702336eb819b4a9b438db2f527cbc0997501e345e74969491c34dcff5411e34867ccdae0dd6eed633561f22be363cdd96623bf48faad5ec1ce0f72b410eac88a6b7b2c8f14e4eebdda9520f4dc4d221e28636d76626bc8b22516826241d9c00162c375b8a08f904297aa1d5c2b066894dc2bf4c0315803b576301819d5df7ee69e29de7e0aca01388f1637432e80b07f9ae7811943492cef62ffafde53bb16732686aed35f0316bcfb3cc6f0666ee12677e8985e3bcdb93424633e5fa81539298ef58c156df050bd4e3f1d8ddf76ad6c9567d6530836955b980c2d59345321f12a4a05244fed8bd220410109e098042610398f57d69ddfa832893fc6a3273a6b47d7ff90db38672339bc69a66e72d76b41a9fbe8acbc636eeb491092efbc1ad365b832b64c647c7bcf61b95d4c590405b4a5018ce01758ad3a2fb8d00e765c620af080167896f665c3c996f0860de8c7cf4858d12a90bdcc5f7d5350dfbebbf4618f50e6cfe95baebf1f3335af490653800824a5d383caa28bad80b401278f539f4f9d104b8c41eef38887da3db43322b3f590cf9b43161a6054f8d24bc90853f8fbcdad5616c4c544701fe92495c00a9c73afd2d8a560e2a89eb91722339677abb2845bc07e3df3cee992b6bb38f89353129f2f73874ff7cc02882b00f1ded168f9cf215f923f2544bd38d7f87185b043f0782d0b67d853a701d2500f4d32ddb40ab79a3a8bdd32e9479d1f3ee7e7f910164e1529df583900356dab7227de82400184922e290f992f8f7052d477b4930cde0864d7e66a4be28730d947b58ba6354c9554b624af206dd63497c5e41c0ba5064e848a47f5bfac4eb427d4450158ea0534da6d742c005a11727a1ba05731f545d5372f393278e39c1e884692916d205ae80214c1e600037ed86418ce00f5765e9898beaa4e10fe663c98c5053f9f9ee084a4b38900f0b08148d41f6de731b666722f191fc9eadcc7d261c2e49723cd122c4f6268e7f78dc5fbe51d8bc772a29f73b5b4c334b424e60268953a1f96bd3191a9f974c0de0e0346b7abb07079b9ea13126b8c81a225f49b8b920ee5ab37f2c3d8302124d48f6df139bff073aac64d69f367f4bf029528a74535781175ef9c2cbc06799ca7781ec24d21209373e917558dc9c485a7a55de8a5a5f569dfdd1103585162b98b8de39111714bdb9bdfc5a46bf195cce2a9ad9dd7bf005064e3a5962abdf26a2f7c16f52299acb14202e5eee096d0e2184a6aa362373674bdea28fb229bacb402da9df96be14a97451321e7c9196d6e2130bc4fe7db75300be5f774112fb41011d99556c3a5adcd0ee8f6b1ae3570565f6e03d12893db6249c1064c411975ce89090ffc82aac838182bf2b7ffd32d0b73a50e7afc0cacde67c240b0bf42f6b2273cabc1401cc95cd28b4d002ced108f203206d59280b403697486976a293051c61245ddc0215319821ee6c59c7d9004cc734985136d55681f5c4aa92972a5e88deb27de637d2d0c64878fcc9f43567168a90149c33e00f1fc6db839b51f09e9c964dd34e0172ba6adcf563f0fc029b5608c6034a05fa32890a6975fdef6cfc7b62a46ccdbbfa6fa607a31bbc009162b6b64e9c16849782ef14486781d09a56912a7bbbc78d9ecca809bf28cd20806f896890b7640206cf0cd92a8769dedc98ddcf8655414cbf781d612347bff582473bd608dbd2b09a706b7141cd01e236171b071e07eedc8eb0c588e973e7c7a4ceeb125289743143b36597214f5ccc0ba2e0ef27d7393ca0da255c55bd86e699106b08e794386465b68fab310f2b4b6ed0040a27bdaf5ff68e6b9cfe6b6b189f21b2d8de5a6a0a4b976e6944a362805648892926e2fa29f35c70abed0005eeda6590c73ee8f749d9cc4c9951838c61403357f6befb8f573af79abe680cba441a0ab0fbe0069c6effcd6dd9f932e6f30e4fd45ce7d99f491d34deedd0f8ac6d2b6d25cded18c0254d01be9fda6eec23aa6bda3892737e388ddeb17099a1342e18f4d0f6f9060626d43cba7919e4bdd35c192857a1a1ce78cfb07d09336136832baac3789953c13141c5b647ba95e39f1c253efd355af57d7bae9099d03fc67ef067abb1b1542b6243ca8f7808ab9da282e4ec84e1f93798dac81497a5ade0f392fdb5ecb41654e08fb19884d396c08227aa2df46e53de934136a51f165be27240c4d6e4474a36dd062b1a8c01c27d026577b253d8a685168ddd1a2d94c4a0a5510d82da10d6b3c4f7e9c894b6e8f43549fce95b7352eac3ef96f5017964526d6a3246886418139a97718ee317eeaf4d59366be549bc08b19087ff5c46530ac0035b1708f53910749f9f2aa398639fc6bba43be84bd34092f6034a378c9463118ab0f66a4d2ea75e47ad959d0424f324ccb58b2eda370788d14f09bfed0ae0b", [[], [], [], [], [], [], []]}, 0x1778) r3 = syz_open_procfs(0x0, &(0x7f0000000400)='smaps\x00') bind$alg(r0, &(0x7f0000001000)={0x26, 'hash\x00', 0x0, 0x0, 'michael_mic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00005ec000)="366521ab415b7ac7", 0x8) read(r3, &(0x7f00000001c0)=""/117, 0xffffffdf) r4 = accept$alg(r0, 0x0, 0x0) sendfile(r4, r3, 0x0, 0xa3a) [ 356.006879][T11374] syz-executor.0 uses obsolete (PF_INET,SOCK_PACKET) 19:05:51 executing program 2: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) uselib(&(0x7f0000000000)='./file0\x00') mount(&(0x7f0000000180)=ANY=[@ANYBLOB="5b643a3a5d2c0b7d46552c3aec5cb2b2b289ea512541497e4156bfe0a99e0593dd0fbefc14d460ea5845ece88e98228885a6c428eab00e4cc3d3bed4dda286fcdfca5f2f"], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) 19:05:51 executing program 2: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) uselib(&(0x7f0000000000)='./file0\x00') mount(&(0x7f0000000180)=ANY=[@ANYBLOB="5b643a3a5d2c0b7d46552c3aec5cb2b2b289ea512541497e4156bfe0a99e0593dd0fbefc14d460ea5845ece88e98228885a6c428eab00e4cc3d3bed4dda286fcdfca5f2f"], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) [ 356.159766][T11379] ceph: No path or : separator in source 19:05:51 executing program 2: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) uselib(&(0x7f0000000000)='./file0\x00') mount(&(0x7f0000000180)=ANY=[@ANYBLOB="5b643a3a5d2c0b7d46552c3aec5cb2b2b289ea512541497e4156bfe0a99e0593dd0fbefc14d460ea5845ece88e98228885a6c428eab00e4cc3d3bed4dda286fcdfca5f2f"], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) [ 356.241656][T11385] ceph: No path or : separator in source [ 356.306096][T11361] encrypted_key: keyword 'new' not allowed when called from .update method 19:05:51 executing program 2: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) uselib(&(0x7f0000000000)='./file0\x00') mount(&(0x7f0000000180)=ANY=[@ANYBLOB="5b643a3a5d2c0b7d46552c3aec5cb2b2b289ea512541497e4156bfe0a99e0593dd0fbefc14d460ea5845ece88e98228885a6c428eab00e4cc3d3bed4dda286fcdfca5f2f"], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) [ 356.348175][T11389] ceph: No path or : separator in source 19:05:51 executing program 2: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000180)=ANY=[@ANYBLOB="5b643a3a5d2c0b7d46552c3aec5cb2b2b289ea512541497e4156bfe0a99e0593dd0fbefc14d460ea5845ece88e98228885a6c428eab00e4cc3d3bed4dda286fcdfca5f2f"], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) [ 356.456899][T11393] ceph: No path or : separator in source 19:05:51 executing program 1: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='new default user:syz 040'], 0x1, 0x0) r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f00000001c0)={'syz'}, &(0x7f00000002c0)='X', 0x1, 0xfffffffffffffffe) keyctl$read(0xb, r0, &(0x7f0000000240)=""/112, 0x349b7f55) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r1, 0x0, r2, 0x0, 0x70196c71, 0x0) ioctl$VIDIOC_DQBUF(r2, 0xc0585611, &(0x7f00000005c0)={0x5, 0x4, 0x4, 0x0, 0x7, {0x0, 0x2710}, {0x4, 0x302f95ac908d1685, 0xe8, 0x7f, 0x3, 0x0, "ef3f42fd"}, 0x6, 0x1, @userptr=0x100, 0x7f, 0x0, 0xffffffffffffffff}) r4 = syz_open_procfs(0x0, &(0x7f0000000100)='setgroups\x00') close(r4) r5 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_EVENTS(r5, 0x84, 0xb, &(0x7f0000000040)={0x0, 0x3, 0x40}, 0x296) shutdown(r5, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r5, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x10, &(0x7f00000002c0)=[@in={0x2, 0x0, @local}]}, &(0x7f0000000180)=0x10) r6 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r6, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r5, 0x84, 0x72, &(0x7f0000000080)={r7}, 0xc) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r4, 0x84, 0x77, &(0x7f0000000000)={r7, 0x1000, 0x5, [0x7, 0x0, 0x800, 0x200, 0xfdd1]}, &(0x7f0000000180)=0x12) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r3, 0x84, 0x1, &(0x7f0000000640)={r7, 0x1, 0x5e96, 0xc3f, 0x9b6, 0x7}, 0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r8, 0x0, r9, 0x0, 0x70196c71, 0x0) write$vhost_msg(r9, &(0x7f0000000080)={0x1, {&(0x7f0000000300)=""/219, 0xdb, &(0x7f0000000400)=""/248, 0x2, 0x4}}, 0x48) r10 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) r11 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r12 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000080)='/proc/capi/capi20\x00', 0x2, 0x0) ioctl$LOOP_CTL_REMOVE(r12, 0x4c81, r11) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r11) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r15, 0x0, r16, 0x0, 0x70196c71, 0x0) getdents64(r16, &(0x7f0000000500)=""/135, 0x87) splice(r13, 0x0, r14, 0x0, 0x70196c71, 0x0) ioctl$FITRIM(r13, 0xc0185879, &(0x7f0000000200)={0x4, 0x47c, 0x4}) ioctl$LOOP_CTL_REMOVE(r10, 0x4c81, r11) ioctl$LOOP_CTL_ADD(r9, 0x4c80, r11) 19:05:51 executing program 2: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000000180)=ANY=[@ANYBLOB="5b643a3a5d2c0b7d46552c3aec5cb2b2b289ea512541497e4156bfe0a99e0593dd0fbefc14d460ea5845ece88e98228885a6c428eab00e4cc3d3bed4dda286fcdfca5f2f"], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) [ 356.607545][T11397] ceph: No path or : separator in source [ 356.699573][T11403] ceph: No path or : separator in source 19:05:51 executing program 2: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000000180)=ANY=[@ANYBLOB="5b643a3a5d2c0b7d46552c3aec5cb2b2b289ea512541497e4156bfe0a99e0593dd0fbefc14d460ea5845ece88e98228885a6c428eab00e4cc3d3bed4dda286fcdfca5f2f"], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) [ 356.838543][T11409] ceph: No path or : separator in source 19:05:51 executing program 2: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000000180)=ANY=[@ANYBLOB="5b643a3a5d2c0b7d46552c3aec5cb2b2b289ea512541497e4156bfe0a99e0593dd0fbefc14d460ea5845ece88e98228885a6c428eab00e4cc3d3bed4dda286fcdfca5f2f"], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) 19:05:52 executing program 0: r0 = syz_open_dev$swradio(&(0x7f00000002c0)='/dev/swradio#\x00', 0x0, 0x2) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = epoll_create1(0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_GET_NETID(r5, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c, r6, 0x400, 0x70bd26, 0x25dfdbff, {}, ["", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x10}, 0xa8) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r0, &(0x7f0000000280)={0x20000001}) epoll_pwait(r3, &(0x7f00008c9fc4)=[{}], 0x1, 0xa9886ef, 0x0, 0xffffffffffffff09) [ 356.974633][T11415] ceph: No path or : separator in source 19:05:52 executing program 2: clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000180)=ANY=[@ANYBLOB="5b643a3a5d2c0b7d46552c3aec5cb2b2b289ea512541497e4156bfe0a99e0593dd0fbefc14d460ea5845ece88e98228885a6c428eab00e4cc3d3bed4dda286fcdfca5f2f"], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) 19:05:52 executing program 2: clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000180)=ANY=[@ANYBLOB="5b643a3a5d2c0b7d46552c3aec5cb2b2b289ea512541497e4156bfe0a99e0593dd0fbefc14d460ea5845ece88e98228885a6c428eab00e4cc3d3bed4dda286fcdfca5f2f"], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) 19:05:52 executing program 2: clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000180)=ANY=[@ANYBLOB="5b643a3a5d2c0b7d46552c3aec5cb2b2b289ea512541497e4156bfe0a99e0593dd0fbefc14d460ea5845ece88e98228885a6c428eab00e4cc3d3bed4dda286fcdfca5f2f"], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) 19:05:52 executing program 2: mknod$loop(0x0, 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000180)=ANY=[@ANYBLOB="5b643a3a5d2c0b7d46552c3aec5cb2b2b289ea512541497e4156bfe0a99e0593dd0fbefc14d460ea5845ece88e98228885a6c428eab00e4cc3d3bed4dda286fcdfca5f2f"], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) 19:05:52 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000140)={0xa, 0xe22}, 0x1c) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$DRM_IOCTL_SET_VERSION(r2, 0xc0106407, &(0x7f0000000000)={0x6, 0x10001, 0x40, 0x80}) listen(r0, 0x0) r3 = socket$netlink(0x10, 0x3, 0x8000000004) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmsg(r2, &(0x7f0000001580)={&(0x7f0000000180)=@rxrpc=@in4={0x21, 0x4, 0x2, 0x10, {0x2, 0x4e23, @empty}}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000280)="2763a125a687f577d5cc630d6e107d1744f7cfa8cc72912df29671a0c5f0d695d783744adbb6eca39b616084aa2774bda9ae99d0f1b06771e5ece6bd5445765c84f0bf6d3f2de99c2a9f538dad03f2dd8f09a01f90699dd001d5cf0e5c98326296cd0f2fe043a108b8026acd3c81e3ac4fc109201594200f767e69faba5b58f8902fbe024f783d65270fb0c46c6e2e3a0b0cfb96270ed4d967207a7b817b62ec5975cdea08", 0xa5}, {&(0x7f0000000040)="68f2c27c789aff547ba0ba8dbe7f029e9a0f0833ae3b23b9e5d11776909b5608fb83a28a86c99b7fd2a1a8f936319e9f32a5f7bb014166569d0e33", 0x3b}, {&(0x7f0000000340)="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", 0x1000}], 0x3, &(0x7f0000001340)=[{0x100, 0x1, 0xed4, "1949169369df7db0797e8689dba05a644aac4091a2437e8a1033d48f252a7d7b9b4e587698ba967cdbaec36e7575a11bbab480f1337d757754c8a3bb99c39a1c76cffad0be8cb08ec2da67ce78158be1a67b43bf198852ccfb78cb4ca33a367b2bcb050b134c542aa5fa065d5d020a9c2dbec06d336c5fa95be73024961b82d72d0af7248ad5da43a92ca386321542c80a717ecc0eb541d2d073276f6e5307f6f9f3f161ed7af0bed0542af91bb8c6e0f4d005658957427d2a0e489fa925f0929b722e18df540690cf3c59481a8d6cd650ec001b7b0c0ed499cbb680dbcd91936bd97bc1c8f3f09c9a570f2da21008ce"}, {0x30, 0xff, 0x416, "8d42f7d2c55071a11997412601d20dd601f81a1c1ef027aead34567d"}, {0x78, 0x100, 0x2, "95e3bf012437a4b9b821214b9656c2e63044b7fd26f108c32c7e17a54fa60e929f3685c5e8b1925d81b7e58e2118781c3905aa0959a4e63162f3b159744d31de7e0500d1268b285de0ef778541123bf0f5a3acf6d075debf62cc1084127b0ac7f4e4bdbba3b39c"}, {0x68, 0x116, 0x401, "1775e74bb7ad2cf0a995c5fe16bf5ac37b4416eaac65f4e27b5676eac7e44e7500e1badf99711e1614b08fa1efa8dd123f9efbbb5441781a93243e417956ff05134d82a8bf139cb5065847174beb40c6b785d0a234"}], 0x210}, 0x800) bind$inet6(r4, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) writev(r3, &(0x7f0000000080)=[{&(0x7f0000000200)="580000001400add427323b470c45b4560a067fffffff81004e22000d00ff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) 19:05:52 executing program 2: mknod$loop(0x0, 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000180)=ANY=[@ANYBLOB="5b643a3a5d2c0b7d46552c3aec5cb2b2b289ea512541497e4156bfe0a99e0593dd0fbefc14d460ea5845ece88e98228885a6c428eab00e4cc3d3bed4dda286fcdfca5f2f"], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) 19:05:52 executing program 1: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x100082) r2 = memfd_create(&(0x7f00000002c0)='wlan1\x00d5sum\x00', 0x100000000) r3 = gettid() rt_sigqueueinfo(r3, 0x1c, &(0x7f0000000200)={0x0, 0x0, 0x10001}) pipe(&(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = getpid() sched_setscheduler(r5, 0x5, &(0x7f0000000380)) r6 = socket$packet(0x11, 0x3, 0x300) r7 = dup(r6) setsockopt$packet_int(r7, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x400000000008, 0x26d) r8 = getpgrp(0x0) capget(&(0x7f0000000000)={0x0, r8}, 0x0) r9 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r10 = socket$kcm(0x11, 0xa, 0x300) ioctl$sock_kcm_SIOCKCMUNATTACH(r10, 0x5452, &(0x7f0000000040)) fcntl$getownex(r10, 0x10, &(0x7f0000000580)={0x0, 0x0}) r12 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r13, &(0x7f0000000140)=ANY=[], 0xfef0) fsetxattr$system_posix_acl(r12, &(0x7f0000000240)='system.posix_acl_access\x00', &(0x7f0000000b00)=ANY=[@ANYBLOB="020000000100eb8000000000020001", @ANYRES32, @ANYRESOCT=r1, @ANYBLOB="b8e365400357609aeb2c35eb6346b93ee6a8ccac064b28045fb5ccc42eb61c604bd9bc6f06af127321df7559522954af9fbdf181f025e9a65d7a17310597d62a318833df89a57e5b53778aa3e66844fc416fc7e2cee11b08996b374e80f61120050000006c77795ceead35bdcf1b23c88334501831ff741891ff83bd8103282caf9b66fa23cc7ad8ce987b956942c2650306152e474b", @ANYBLOB='\x00', @ANYRES32=0x0, @ANYRESDEC, @ANYRESDEC], 0x8, 0x0) r14 = socket(0xa, 0x3, 0x8) r15 = syz_open_dev$amidi(&(0x7f0000000340)='/dev/amidi#\x00', 0x9c4, 0x70000) ioctl$sock_inet_SIOCSIFFLAGS(r14, 0x89a2, &(0x7f0000000180)={'bridge0\x00\x00\x01\x00', 0x4}) write$RDMA_USER_CM_CMD_CREATE_ID(r15, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}}}, 0x20) sendmsg$key(r14, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[], 0x1de}}, 0x0) r17 = gettid() waitid(0x83b895581628fca4, r17, &(0x7f0000000040), 0x2, &(0x7f0000000480)) sendmsg$key(r14, &(0x7f00000006c0)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000540)=ANY=[@ANYPTR64=&(0x7f0000000640)=ANY=[@ANYRES64, @ANYRESHEX=r16, @ANYRESDEC=r17]], 0xfffffffffffffe56}}, 0x20004850) r18 = memfd_create(&(0x7f00000000c0)='queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00', 0x0) r19 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x9a0efa2b65aacb27) r20 = dup2(r19, r18) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r20, 0xc08c5332, &(0x7f0000000140)={0x0, 0x0, 0x0, 'queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00'}) r21 = gettid() r22 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r22, 0x8933, &(0x7f0000000240)={'syz_tun\x00', 0x0}) r24 = socket$nl_route(0x10, 0x3, 0x0) r25 = gettid() sendmsg$nl_route(r24, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000280)=@newlink={0xa8, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r23}, [@IFLA_NET_NS_PID={0xffffffffffffff8a, 0x13, r25}, @IFLA_XDP={0x80, 0x2b, [@IFLA_XDP_FD={0x7c, 0x1, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}}]}]}, 0xa8}}, 0x0) r26 = getpgid(r25) prctl$PR_SET_PTRACER(0x59616d61, r26) r27 = syz_open_dev$sg(&(0x7f0000001580)='/dev/sg#\x00', 0x0, 0x40) writev(r27, &(0x7f0000000000)=[{&(0x7f0000000100)="ae88bff8240000005a90f57f07703aeff0f64ebbee07962c22772e11b44e69d90cf41bdd2ac8bb8c43b460e46292", 0x2e}, {&(0x7f0000000180)="53000000c90dca807737f408177021bd01d3be55090000000001a0000000000000000000", 0x29c}], 0x2) ioctl$SG_GET_REQUEST_TABLE(r27, 0x227d, &(0x7f0000000780)) kcmp(r21, r17, 0x0, 0xffffffffffffffff, r27) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={0x4, 0x2, 0x0, 0xffff}, &(0x7f00000005c0), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000018c0)={r17, r20, 0x0, 0xd, &(0x7f0000001880)='bond_slave_0\x00', r28}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r28}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000002380)='\x00', r28}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000007c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x17, &(0x7f0000000780)='cgroup.subtree_control\x00', r28}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r28}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={r11, r12, 0x0, 0x1, &(0x7f0000000080)='\x00', r28}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={0x0, r9, 0x0, 0x4, &(0x7f0000000180)='em1\x00', r28}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)={r28}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, 0xffffffffffffffff, 0x0, 0xc, &(0x7f0000000080)='/dev/autofs\x00', r28}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r8, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000000)='\x00', r28}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000740)={r28}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={r29, r7, 0x0, 0x5, &(0x7f0000000000)='ppp1\x00', r28}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r5, r4, 0x0, 0x14, &(0x7f0000000180)='&$vboxnet1security!\x00', r28}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000100)='\x00', r28}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000240)={r28}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000340)={r28}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r28}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r3, 0xffffffffffffffff, 0x0, 0x84, &(0x7f00000001c0)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7', r28}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0xffffffffffffffff, r0, 0x0, 0x2, &(0x7f0000000000)='(\x00', r28}, 0x30) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) pwritev(r2, &(0x7f00000000c0)=[{&(0x7f00000005c0)='\'', 0x1}], 0x1, 0x81806) r30 = socket$inet6_tcp(0xa, 0x1, 0x0) r31 = fcntl$dupfd(r30, 0x0, r30) ioctl$PERF_EVENT_IOC_ENABLE(r31, 0x8912, 0x400200) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(r31, 0xc04c5349, 0x0) fsetxattr$security_smack_transmute(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) pkey_alloc(0x0, 0x2) pkey_alloc(0x0, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(r1, r2, 0x0, 0x20000102000007) openat$vimc0(0xffffffffffffff9c, &(0x7f0000000380)='/dev/video0\x00', 0x2, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000000180)='nbd\x00') ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000800)={0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, "b92481f2b6049517f74de08916cf213343b15d035fc2fe51426f3c9125e1da89cad2929cd06aca1bd4b0a988279268e61234ff8a41cd19abd481eb55130d64ca", "a3510a8deb27705deb2fac58f4f379ddd8e50e8d868ee0425ecfc1c6f4a716df3e4be867d973bcc3e056a1a04eafdeacbd0e434a62db69a6bd53316c42f16b21", "f0642b0793a51cd04ad5c00d6cf24b506d17a8df96c5968a4226e09f847e4b08"}) 19:05:52 executing program 2: mknod$loop(0x0, 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000180)=ANY=[@ANYBLOB="5b643a3a5d2c0b7d46552c3aec5cb2b2b289ea512541497e4156bfe0a99e0593dd0fbefc14d460ea5845ece88e98228885a6c428eab00e4cc3d3bed4dda286fcdfca5f2f"], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) 19:05:53 executing program 2: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000180)=ANY=[@ANYBLOB="5b643a3a5d2c0b7d46552c3aec5cb2b2b289ea512541497e4156bfe0a99e0593dd0fbefc14d460ea5845ece88e98228885a6c428eab00e4cc3d3bed4dda286fcdfca5f2f"], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) [ 357.941629][T11442] netlink: 136 bytes leftover after parsing attributes in process `syz-executor.1'. [ 358.359238][T11456] ceph: No path or : separator in source 19:05:53 executing program 2: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000180)=ANY=[@ANYBLOB="5b643a3a5d2c0b7d46552c3aec5cb2b2b289ea512541497e4156bfe0a99e0593dd0fbefc14d460ea5845ece88e98228885a6c428eab00e4cc3d3bed4dda286fcdfca5f2f"], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) [ 358.574068][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 358.580415][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 358.713266][T11460] ceph: No path or : separator in source 19:05:53 executing program 2: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000180)=ANY=[@ANYBLOB="5b643a3a5d2c0b7d46552c3aec5cb2b2b289ea512541497e4156bfe0a99e0593dd0fbefc14d460ea5845ece88e98228885a6c428eab00e4cc3d3bed4dda286fcdfca5f2f"], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) 19:05:54 executing program 1: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x100082) r2 = memfd_create(&(0x7f00000002c0)='wlan1\x00d5sum\x00', 0x100000000) r3 = gettid() rt_sigqueueinfo(r3, 0x1c, &(0x7f0000000200)={0x0, 0x0, 0x10001}) pipe(&(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = getpid() sched_setscheduler(r5, 0x5, &(0x7f0000000380)) r6 = socket$packet(0x11, 0x3, 0x300) r7 = dup(r6) setsockopt$packet_int(r7, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x400000000008, 0x26d) r8 = getpgrp(0x0) capget(&(0x7f0000000000)={0x0, r8}, 0x0) r9 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r10 = socket$kcm(0x11, 0xa, 0x300) ioctl$sock_kcm_SIOCKCMUNATTACH(r10, 0x5452, &(0x7f0000000040)) fcntl$getownex(r10, 0x10, &(0x7f0000000580)={0x0, 0x0}) r12 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r13, &(0x7f0000000140)=ANY=[], 0xfef0) fsetxattr$system_posix_acl(r12, &(0x7f0000000240)='system.posix_acl_access\x00', &(0x7f0000000b00)=ANY=[@ANYBLOB="020000000100eb8000000000020001", @ANYRES32, @ANYRESOCT=r1, @ANYBLOB="b8e365400357609aeb2c35eb6346b93ee6a8ccac064b28045fb5ccc42eb61c604bd9bc6f06af127321df7559522954af9fbdf181f025e9a65d7a17310597d62a318833df89a57e5b53778aa3e66844fc416fc7e2cee11b08996b374e80f61120050000006c77795ceead35bdcf1b23c88334501831ff741891ff83bd8103282caf9b66fa23cc7ad8ce987b956942c2650306152e474b", @ANYBLOB='\x00', @ANYRES32=0x0, @ANYRESDEC, @ANYRESDEC], 0x8, 0x0) r14 = socket(0xa, 0x3, 0x8) r15 = syz_open_dev$amidi(&(0x7f0000000340)='/dev/amidi#\x00', 0x9c4, 0x70000) ioctl$sock_inet_SIOCSIFFLAGS(r14, 0x89a2, &(0x7f0000000180)={'bridge0\x00\x00\x01\x00', 0x4}) write$RDMA_USER_CM_CMD_CREATE_ID(r15, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}}}, 0x20) sendmsg$key(r14, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[], 0x1de}}, 0x0) r17 = gettid() waitid(0x83b895581628fca4, r17, &(0x7f0000000040), 0x2, &(0x7f0000000480)) sendmsg$key(r14, &(0x7f00000006c0)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000540)=ANY=[@ANYPTR64=&(0x7f0000000640)=ANY=[@ANYRES64, @ANYRESHEX=r16, @ANYRESDEC=r17]], 0xfffffffffffffe56}}, 0x20004850) r18 = memfd_create(&(0x7f00000000c0)='queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00', 0x0) r19 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x9a0efa2b65aacb27) r20 = dup2(r19, r18) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r20, 0xc08c5332, &(0x7f0000000140)={0x0, 0x0, 0x0, 'queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00'}) r21 = gettid() r22 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r22, 0x8933, &(0x7f0000000240)={'syz_tun\x00', 0x0}) r24 = socket$nl_route(0x10, 0x3, 0x0) r25 = gettid() sendmsg$nl_route(r24, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000280)=@newlink={0xa8, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r23}, [@IFLA_NET_NS_PID={0xffffffffffffff8a, 0x13, r25}, @IFLA_XDP={0x80, 0x2b, [@IFLA_XDP_FD={0x7c, 0x1, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}}]}]}, 0xa8}}, 0x0) r26 = getpgid(r25) prctl$PR_SET_PTRACER(0x59616d61, r26) r27 = syz_open_dev$sg(&(0x7f0000001580)='/dev/sg#\x00', 0x0, 0x40) writev(r27, &(0x7f0000000000)=[{&(0x7f0000000100)="ae88bff8240000005a90f57f07703aeff0f64ebbee07962c22772e11b44e69d90cf41bdd2ac8bb8c43b460e46292", 0x2e}, {&(0x7f0000000180)="53000000c90dca807737f408177021bd01d3be55090000000001a0000000000000000000", 0x29c}], 0x2) ioctl$SG_GET_REQUEST_TABLE(r27, 0x227d, &(0x7f0000000780)) kcmp(r21, r17, 0x0, 0xffffffffffffffff, r27) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={0x4, 0x2, 0x0, 0xffff}, &(0x7f00000005c0), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000018c0)={r17, r20, 0x0, 0xd, &(0x7f0000001880)='bond_slave_0\x00', r28}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r28}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000002380)='\x00', r28}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000007c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x17, &(0x7f0000000780)='cgroup.subtree_control\x00', r28}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r28}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={r11, r12, 0x0, 0x1, &(0x7f0000000080)='\x00', r28}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={0x0, r9, 0x0, 0x4, &(0x7f0000000180)='em1\x00', r28}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)={r28}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, 0xffffffffffffffff, 0x0, 0xc, &(0x7f0000000080)='/dev/autofs\x00', r28}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r8, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000000)='\x00', r28}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000740)={r28}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={r29, r7, 0x0, 0x5, &(0x7f0000000000)='ppp1\x00', r28}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r5, r4, 0x0, 0x14, &(0x7f0000000180)='&$vboxnet1security!\x00', r28}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000100)='\x00', r28}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000240)={r28}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000340)={r28}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r28}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r3, 0xffffffffffffffff, 0x0, 0x84, &(0x7f00000001c0)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7', r28}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0xffffffffffffffff, r0, 0x0, 0x2, &(0x7f0000000000)='(\x00', r28}, 0x30) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) pwritev(r2, &(0x7f00000000c0)=[{&(0x7f00000005c0)='\'', 0x1}], 0x1, 0x81806) r30 = socket$inet6_tcp(0xa, 0x1, 0x0) r31 = fcntl$dupfd(r30, 0x0, r30) ioctl$PERF_EVENT_IOC_ENABLE(r31, 0x8912, 0x400200) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(r31, 0xc04c5349, 0x0) fsetxattr$security_smack_transmute(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) pkey_alloc(0x0, 0x2) pkey_alloc(0x0, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(r1, r2, 0x0, 0x20000102000007) openat$vimc0(0xffffffffffffff9c, &(0x7f0000000380)='/dev/video0\x00', 0x2, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000000180)='nbd\x00') ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000800)={0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, "b92481f2b6049517f74de08916cf213343b15d035fc2fe51426f3c9125e1da89cad2929cd06aca1bd4b0a988279268e61234ff8a41cd19abd481eb55130d64ca", "a3510a8deb27705deb2fac58f4f379ddd8e50e8d868ee0425ecfc1c6f4a716df3e4be867d973bcc3e056a1a04eafdeacbd0e434a62db69a6bd53316c42f16b21", "f0642b0793a51cd04ad5c00d6cf24b506d17a8df96c5968a4226e09f847e4b08"}) [ 359.033954][T11469] ceph: No path or : separator in source 19:05:54 executing program 2: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) [ 359.133960][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 359.140387][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 359.156189][T11470] netlink: 136 bytes leftover after parsing attributes in process `syz-executor.1'. 19:05:54 executing program 2: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) 19:05:54 executing program 2: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) 19:05:54 executing program 2: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000180)=ANY=[], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) [ 359.980688][T11487] ceph: Bad value for 'source' 19:05:55 executing program 2: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000180)=ANY=[], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) [ 360.169012][T11491] ceph: Bad value for 'source' 19:05:55 executing program 2: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000180)=ANY=[], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) [ 360.383991][T11495] ceph: Bad value for 'source' 19:05:55 executing program 2: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000180)=ANY=[@ANYBLOB], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) [ 360.609990][T11500] ceph: Bad value for 'source' 19:05:55 executing program 2: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000180)=ANY=[@ANYBLOB], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) 19:05:55 executing program 2: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000180)=ANY=[@ANYBLOB], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) [ 360.712814][T11504] ceph: Bad value for 'source' 19:05:55 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000180)=ANY=[], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) 19:05:55 executing program 2: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000180)=ANY=[@ANYBLOB="5b643a3a5d2c0b7d46552c3aec5cb2b2b289ea512541497e4156bfe0a99e0593dd0f"], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) [ 360.825022][T11508] ceph: Bad value for 'source' 19:05:56 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000180)=ANY=[], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) 19:05:56 executing program 2: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000180)=ANY=[@ANYBLOB="5b643a3a5d2c0b7d46552c3aec5cb2b2b289ea512541497e4156bfe0a99e0593dd0f"], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) [ 360.951020][T11515] ceph: Bad value for 'source' [ 360.958719][T11514] ceph: No path or : separator in source 19:05:56 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000180)=ANY=[], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) [ 361.101309][T11522] ceph: Bad value for 'source' [ 361.119129][T11524] ceph: No path or : separator in source 19:05:56 executing program 2: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000180)=ANY=[@ANYBLOB="5b643a3a5d2c0b7d46552c3aec5cb2b2b289ea512541497e4156bfe0a99e0593dd0f"], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) 19:05:56 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000000180)=ANY=[], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) [ 361.226742][T11529] ceph: Bad value for 'source' [ 361.316739][T11534] ceph: Bad value for 'source' 19:05:56 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000000180)=ANY=[], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) [ 361.354045][T11535] ceph: No path or : separator in source 19:05:56 executing program 2: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000180)=ANY=[@ANYBLOB="5b643a3a5d2c0b7d46552c3aec5cb2b2b289ea512541497e4156bfe0a99e0593dd0fbefc14d460ea5845ece88e98228885a6c4"], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) [ 361.500529][T11540] ceph: Bad value for 'source' 19:05:56 executing program 2: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000180)=ANY=[@ANYBLOB="5b643a3a5d2c0b7d46552c3aec5cb2b2b289ea512541497e4156bfe0a99e0593dd0fbefc14d460ea5845ece88e98228885a6c4"], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) [ 361.546531][T11542] ceph: No path or : separator in source 19:05:56 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000000180)=ANY=[], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) 19:05:56 executing program 2: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000180)=ANY=[@ANYBLOB="5b643a3a5d2c0b7d46552c3aec5cb2b2b289ea512541497e4156bfe0a99e0593dd0fbefc14d460ea5845ece88e98228885a6c4"], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) [ 361.632082][T11545] ceph: No path or : separator in source 19:05:56 executing program 3: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x100082) r2 = memfd_create(&(0x7f00000002c0)='wlan1\x00d5sum\x00', 0x100000000) r3 = gettid() rt_sigqueueinfo(r3, 0x1c, &(0x7f0000000200)={0x0, 0x0, 0x10001}) pipe(&(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = getpid() sched_setscheduler(r5, 0x5, &(0x7f0000000380)) r6 = socket$packet(0x11, 0x3, 0x300) r7 = dup(r6) setsockopt$packet_int(r7, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x400000000008, 0x26d) r8 = getpgrp(0x0) capget(&(0x7f0000000000)={0x0, r8}, 0x0) r9 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r10 = socket$kcm(0x11, 0xa, 0x300) ioctl$sock_kcm_SIOCKCMUNATTACH(r10, 0x5452, &(0x7f0000000040)) fcntl$getownex(r10, 0x10, &(0x7f0000000580)={0x0, 0x0}) r12 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r13, &(0x7f0000000140)=ANY=[], 0xfef0) fsetxattr$system_posix_acl(r12, &(0x7f0000000240)='system.posix_acl_access\x00', &(0x7f0000000b00)=ANY=[@ANYBLOB="020000000100eb8000000000020001", @ANYRES32, @ANYRESOCT=r1, @ANYBLOB="b8e365400357609aeb2c35eb6346b93ee6a8ccac064b28045fb5ccc42eb61c604bd9bc6f06af127321df7559522954af9fbdf181f025e9a65d7a17310597d62a318833df89a57e5b53778aa3e66844fc416fc7e2cee11b08996b374e80f61120050000006c77795ceead35bdcf1b23c88334501831ff741891ff83bd8103282caf9b66fa23cc7ad8ce987b956942c2650306152e474b", @ANYBLOB='\x00', @ANYRES32=0x0, @ANYRESDEC, @ANYRESDEC], 0x8, 0x0) r14 = socket(0xa, 0x3, 0x8) r15 = syz_open_dev$amidi(&(0x7f0000000340)='/dev/amidi#\x00', 0x9c4, 0x70000) ioctl$sock_inet_SIOCSIFFLAGS(r14, 0x89a2, &(0x7f0000000180)={'bridge0\x00\x00\x01\x00', 0x4}) write$RDMA_USER_CM_CMD_CREATE_ID(r15, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}}}, 0x20) sendmsg$key(r14, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[], 0x1de}}, 0x0) r17 = gettid() waitid(0x83b895581628fca4, r17, &(0x7f0000000040), 0x2, &(0x7f0000000480)) sendmsg$key(r14, &(0x7f00000006c0)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000540)=ANY=[@ANYPTR64=&(0x7f0000000640)=ANY=[@ANYRES64, @ANYRESHEX=r16, @ANYRESDEC=r17]], 0xfffffffffffffe56}}, 0x20004850) r18 = memfd_create(&(0x7f00000000c0)='queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00', 0x0) r19 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x9a0efa2b65aacb27) r20 = dup2(r19, r18) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r20, 0xc08c5332, &(0x7f0000000140)={0x0, 0x0, 0x0, 'queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00'}) r21 = gettid() r22 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r22, 0x8933, &(0x7f0000000240)={'syz_tun\x00', 0x0}) r24 = socket$nl_route(0x10, 0x3, 0x0) r25 = gettid() sendmsg$nl_route(r24, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000280)=@newlink={0xa8, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r23}, [@IFLA_NET_NS_PID={0xffffffffffffff8a, 0x13, r25}, @IFLA_XDP={0x80, 0x2b, [@IFLA_XDP_FD={0x7c, 0x1, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}}]}]}, 0xa8}}, 0x0) r26 = getpgid(r25) prctl$PR_SET_PTRACER(0x59616d61, r26) r27 = syz_open_dev$sg(&(0x7f0000001580)='/dev/sg#\x00', 0x0, 0x40) writev(r27, &(0x7f0000000000)=[{&(0x7f0000000100)="ae88bff8240000005a90f57f07703aeff0f64ebbee07962c22772e11b44e69d90cf41bdd2ac8bb8c43b460e46292", 0x2e}, {&(0x7f0000000180)="53000000c90dca807737f408177021bd01d3be55090000000001a0000000000000000000", 0x29c}], 0x2) ioctl$SG_GET_REQUEST_TABLE(r27, 0x227d, &(0x7f0000000780)) kcmp(r21, r17, 0x0, 0xffffffffffffffff, r27) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={0x4, 0x2, 0x0, 0xffff}, &(0x7f00000005c0), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000018c0)={r17, r20, 0x0, 0xd, &(0x7f0000001880)='bond_slave_0\x00', r28}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r28}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000002380)='\x00', r28}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000007c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x17, &(0x7f0000000780)='cgroup.subtree_control\x00', r28}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r28}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={r11, r12, 0x0, 0x1, &(0x7f0000000080)='\x00', r28}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={0x0, r9, 0x0, 0x4, &(0x7f0000000180)='em1\x00', r28}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)={r28}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, 0xffffffffffffffff, 0x0, 0xc, &(0x7f0000000080)='/dev/autofs\x00', r28}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r8, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000000)='\x00', r28}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000740)={r28}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={r29, r7, 0x0, 0x5, &(0x7f0000000000)='ppp1\x00', r28}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r5, r4, 0x0, 0x14, &(0x7f0000000180)='&$vboxnet1security!\x00', r28}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000100)='\x00', r28}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000240)={r28}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000340)={r28}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r28}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r3, 0xffffffffffffffff, 0x0, 0x84, &(0x7f00000001c0)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7', r28}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0xffffffffffffffff, r0, 0x0, 0x2, &(0x7f0000000000)='(\x00', r28}, 0x30) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) pwritev(r2, &(0x7f00000000c0)=[{&(0x7f00000005c0)='\'', 0x1}], 0x1, 0x81806) r30 = socket$inet6_tcp(0xa, 0x1, 0x0) r31 = fcntl$dupfd(r30, 0x0, r30) ioctl$PERF_EVENT_IOC_ENABLE(r31, 0x8912, 0x400200) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(r31, 0xc04c5349, 0x0) fsetxattr$security_smack_transmute(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) pkey_alloc(0x0, 0x2) pkey_alloc(0x0, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(r1, r2, 0x0, 0x20000102000007) openat$vimc0(0xffffffffffffff9c, &(0x7f0000000380)='/dev/video0\x00', 0x2, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000000180)='nbd\x00') ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000800)={0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, "b92481f2b6049517f74de08916cf213343b15d035fc2fe51426f3c9125e1da89cad2929cd06aca1bd4b0a988279268e61234ff8a41cd19abd481eb55130d64ca", "a3510a8deb27705deb2fac58f4f379ddd8e50e8d868ee0425ecfc1c6f4a716df3e4be867d973bcc3e056a1a04eafdeacbd0e434a62db69a6bd53316c42f16b21", "f0642b0793a51cd04ad5c00d6cf24b506d17a8df96c5968a4226e09f847e4b08"}) 19:05:56 executing program 2: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000180)=ANY=[@ANYBLOB="5b643a3a5d2c0b7d46552c3aec5cb2b2b289ea512541497e4156bfe0a99e0593dd0fbefc14d460ea5845ece88e98228885a6c428eab00e4cc3d3bed4"], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) [ 361.767617][T11550] ceph: No path or : separator in source [ 361.779935][T11553] ceph: Bad value for 'source' 19:05:56 executing program 1: clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000180)=ANY=[], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) 19:05:56 executing program 2: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000180)=ANY=[@ANYBLOB="5b643a3a5d2c0b7d46552c3aec5cb2b2b289ea512541497e4156bfe0a99e0593dd0fbefc14d460ea5845ece88e98228885a6c428eab00e4cc3d3bed4"], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) [ 361.894156][T11557] ceph: No path or : separator in source 19:05:57 executing program 2: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000180)=ANY=[@ANYBLOB="5b643a3a5d2c0b7d46552c3aec5cb2b2b289ea512541497e4156bfe0a99e0593dd0fbefc14d460ea5845ece88e98228885a6c428eab00e4cc3d3bed4"], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) [ 362.094771][T11565] ceph: No path or : separator in source 19:05:57 executing program 1: clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000180)=ANY=[], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) 19:05:57 executing program 2: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000180)=ANY=[@ANYBLOB="5b643a3a5d2c0b7d46552c3aec5cb2b2b289ea512541497e4156bfe0a99e0593dd0fbefc14d460ea5845ece88e98228885a6c428eab00e4cc3d3bed4dda286fc"], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) [ 362.356693][T11573] ceph: No path or : separator in source 19:05:57 executing program 1: clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000180)=ANY=[], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) [ 362.526097][T11578] ceph: No path or : separator in source 19:05:57 executing program 2: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000180)=ANY=[@ANYBLOB="5b643a3a5d2c0b7d46552c3aec5cb2b2b289ea512541497e4156bfe0a99e0593dd0fbefc14d460ea5845ece88e98228885a6c428eab00e4cc3d3bed4dda286fc"], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) 19:05:57 executing program 2: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000180)=ANY=[@ANYBLOB="5b643a3a5d2c0b7d46552c3aec5cb2b2b289ea512541497e4156bfe0a99e0593dd0fbefc14d460ea5845ece88e98228885a6c428eab00e4cc3d3bed4dda286fc"], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) 19:05:57 executing program 1: mknod$loop(0x0, 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000180)=ANY=[], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) [ 362.673282][T11585] ceph: No path or : separator in source [ 362.895634][T11593] ceph: No path or : separator in source 19:05:58 executing program 1: mknod$loop(0x0, 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000180)=ANY=[], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) [ 363.084486][T11597] IPVS: ftp: loaded support on port[0] = 21 [ 363.542452][T11597] chnl_net:caif_netlink_parms(): no params data found [ 363.666166][T11597] bridge0: port 1(bridge_slave_0) entered blocking state [ 363.673544][T11597] bridge0: port 1(bridge_slave_0) entered disabled state [ 363.682895][T11597] device bridge_slave_0 entered promiscuous mode [ 363.695829][T11597] bridge0: port 2(bridge_slave_1) entered blocking state [ 363.703127][T11597] bridge0: port 2(bridge_slave_1) entered disabled state [ 363.712719][T11597] device bridge_slave_1 entered promiscuous mode [ 363.762916][T11597] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 363.779458][T11597] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 363.821503][T11597] team0: Port device team_slave_0 added [ 363.834168][T11597] team0: Port device team_slave_1 added [ 363.961603][T11597] device hsr_slave_0 entered promiscuous mode [ 363.996113][T11597] device hsr_slave_1 entered promiscuous mode [ 364.083531][T11597] debugfs: Directory 'hsr0' with parent '/' already present! [ 364.173830][T11597] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 364.280401][T11597] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 364.460373][T11597] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 364.615654][T11597] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 364.815945][T11597] 8021q: adding VLAN 0 to HW filter on device bond0 [ 364.841703][ T3386] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 364.851111][ T3386] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 364.869901][T11597] 8021q: adding VLAN 0 to HW filter on device team0 [ 364.897040][ T3386] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 364.907451][ T3386] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 364.916942][ T3386] bridge0: port 1(bridge_slave_0) entered blocking state [ 364.924234][ T3386] bridge0: port 1(bridge_slave_0) entered forwarding state [ 364.941345][ T3386] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 364.956227][ T2731] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 364.966017][ T2731] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 364.975341][ T2731] bridge0: port 2(bridge_slave_1) entered blocking state [ 364.982540][ T2731] bridge0: port 2(bridge_slave_1) entered forwarding state [ 365.026444][ T2731] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 365.037067][ T2731] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 365.047785][ T2731] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 365.058471][ T2731] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 365.068751][ T2731] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 365.079108][ T2731] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 365.096145][ T2731] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 365.106667][ T2731] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 365.116275][ T2731] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 365.152961][T11597] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 365.165643][T11597] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 365.176902][ T3386] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 365.186888][ T3386] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 365.228915][ T2731] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 365.236747][ T2731] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 365.259308][T11597] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 365.443754][T11605] bridge0: port 3(gretap0) entered blocking state [ 365.451833][T11605] bridge0: port 3(gretap0) entered disabled state [ 365.470035][T11605] device gretap0 entered promiscuous mode [ 365.480222][T11605] bridge0: port 3(gretap0) entered blocking state [ 365.487773][T11605] bridge0: port 3(gretap0) entered forwarding state [ 365.508286][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 365.516279][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 365.561430][T11605] netlink: 136 bytes leftover after parsing attributes in process `syz-executor.3'. [ 365.625153][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 365.634218][ C1] protocol 88fb is buggy, dev hsr_slave_1 19:06:01 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000180)=ANY=[@ANYBLOB="5b643a3a5d2c0b7d46552c3aec5cb2b2b289ea512541497e4156bfe0a99e0593dd0fbefc14d460ea5845ece88e98228885a6c428eab00e4cc3d3bed4dda286fcdfca5f2f"], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) 19:06:01 executing program 2: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000180)=ANY=[@ANYBLOB="5b643a3a5d2c0b7d46552c3aec5cb2b2b289ea512541497e4156bfe0a99e0593dd0fbefc14d460ea5845ece88e98228885a6c428eab00e4cc3d3bed4dda286fcdfca"], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) 19:06:01 executing program 1: mknod$loop(0x0, 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000180)=ANY=[], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) 19:06:01 executing program 0: setsockopt$CAN_RAW_JOIN_FILTERS(0xffffffffffffffff, 0x65, 0x6, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$bt_bnep(0x1f, 0x3, 0x4) ioctl$EXT4_IOC_SETFLAGS(r1, 0x40086602, &(0x7f00000000c0)=0x40) openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x4000, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r3, 0x0, r4, 0x0, 0x70196c71, 0x0) ioctl$VT_RESIZE(r4, 0x5609, &(0x7f0000001440)={0x1f, 0x1, 0x6}) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r2, 0x0, r5, 0x0, 0x70196c71, 0x0) r6 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001340)='l2tp\x00') sendmsg$L2TP_CMD_SESSION_MODIFY(r5, &(0x7f0000001400)={&(0x7f0000001300)={0x10, 0x0, 0x0, 0x1010}, 0xc, &(0x7f00000013c0)={&(0x7f0000001380)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r6, @ANYBLOB="000226bd7000fcdbdf2507001d0d080012004032a900000008001d000700"], 0x24}, 0x1, 0x0, 0x0, 0x10}, 0x8000000) r7 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)}, 0x0) r8 = socket$inet(0x10, 0x2, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, 0x0) ioctl$sock_ifreq(r8, 0x89f1, &(0x7f0000000180)={'ip6gre0\x00\xeej\x01\x0f\'\x0e\x03\x00', @ifru_flags}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETOFFLOAD(r9, 0x400454d0, 0x2) ioctl$DRM_IOCTL_VERSION(0xffffffffffffffff, 0xc0406400, &(0x7f0000000140)={0x538b, 0x7, 0xfffff9ce, 0x3a, &(0x7f0000000100)=""/58, 0xd3, &(0x7f00000001c0)=""/211, 0x1000, &(0x7f00000002c0)=""/4096}) r10 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r10, 0x0, r10) r11 = socket$inet6_tcp(0xa, 0x1, 0x0) r12 = fcntl$dupfd(r11, 0x0, r11) ioctl$PERF_EVENT_IOC_ENABLE(r12, 0x8912, 0x400200) setsockopt$IP_VS_SO_SET_EDIT(r12, 0x0, 0x483, &(0x7f00000012c0)={0x2f, @broadcast, 0x4e20, 0x4, 'lblcr\x00', 0x42, 0x1, 0x55}, 0x2c) setsockopt$inet6_IPV6_ADDRFORM(r10, 0x29, 0x1, &(0x7f0000000080), 0x4) [ 366.515579][T11609] ceph: No path or : separator in source 19:06:01 executing program 2: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000180)=ANY=[@ANYBLOB="5b643a3a5d2c0b7d46552c3aec5cb2b2b289ea512541497e4156bfe0a99e0593dd0fbefc14d460ea5845ece88e98228885a6c428eab00e4cc3d3bed4dda286fcdfca"], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) 19:06:01 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000180)=ANY=[], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) [ 366.697176][T11622] ceph: No path or : separator in source 19:06:01 executing program 2: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000180)=ANY=[@ANYBLOB="5b643a3a5d2c0b7d46552c3aec5cb2b2b289ea512541497e4156bfe0a99e0593dd0fbefc14d460ea5845ece88e98228885a6c428eab00e4cc3d3bed4dda286fcdfca"], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) [ 366.760440][T11623] IPVS: set_ctl: invalid protocol: 47 255.255.255.255:20000 [ 366.783165][T11626] ceph: No path or : separator in source 19:06:01 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=@ipv6_newrule={0x44, 0x20, 0x1, 0x8, 0x0, {0xa, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, [@FRA_DST={0x14, 0x1, @initdev={0xfe, 0x88, [], 0x0, 0x0}}, @FRA_DST={0xfffffffffffffde9, 0x1, @local}]}, 0x44}, 0x1, 0x0, 0x0, 0x8010}, 0x0) 19:06:02 executing program 2: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000180)=ANY=[@ANYBLOB="5b643a3a5d2c0b7d46552c3aec5cb2b2b289ea512541497e4156bfe0a99e0593dd0fbefc14d460ea5845ece88e98228885a6c428eab00e4cc3d3bed4dda286fcdfca5f"], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) [ 366.944274][T11634] ceph: No path or : separator in source [ 366.964822][T11631] ceph: Bad value for 'source' [ 367.010841][T11638] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.3'. 19:06:02 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000180)=ANY=[], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) [ 367.089198][T11641] ceph: No path or : separator in source 19:06:02 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffffdd}, [@ldst={0x3, 0x5, 0x3, 0x1c10a1, 0x0, 0x42}]}, &(0x7f0000003ff6)='G\x00', 0x7, 0xfd90, &(0x7f0000000080)=""/195, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1ae, 0x10, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x100}}, 0x288) 19:06:02 executing program 2: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000180)=ANY=[@ANYBLOB="5b643a3a5d2c0b7d46552c3aec5cb2b2b289ea512541497e4156bfe0a99e0593dd0fbefc14d460ea5845ece88e98228885a6c428eab00e4cc3d3bed4dda286fcdfca5f"], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) 19:06:02 executing program 2: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000180)=ANY=[@ANYBLOB="5b643a3a5d2c0b7d46552c3aec5cb2b2b289ea512541497e4156bfe0a99e0593dd0fbefc14d460ea5845ece88e98228885a6c428eab00e4cc3d3bed4dda286fcdfca5f"], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) [ 367.331854][T11645] ceph: Bad value for 'source' [ 367.345660][T11653] ceph: No path or : separator in source [ 367.399902][T11614] IPVS: set_ctl: invalid protocol: 47 255.255.255.255:20000 19:06:02 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000180)=ANY=[], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) 19:06:02 executing program 3: statx(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x4000, 0x1, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r2, 0x0, r3, 0x0, 0x70196c71, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f00000002c0)={{{@in6=@local, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}}, &(0x7f00000003c0)=0xe8) getresgid(&(0x7f0000000400), &(0x7f0000000440)=0x0, &(0x7f0000000480)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000014c0)={0x0, 0x0, 0x0}, 0x0) semctl$IPC_SET(0x0, 0x0, 0x1, &(0x7f0000002380)={{0x0, 0x0, r6, 0xffffffffffffffff}}) stat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000014c0)={0x0, 0x0, 0x0}, 0x0) semctl$IPC_SET(0x0, 0x0, 0x1, &(0x7f0000002380)={{0x0, 0x0, r8, 0xffffffffffffffff}}) statx(0xffffffffffffff9c, &(0x7f0000000580)='./file0\x00', 0x0, 0x800, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000014c0)={0x0, 0x0, 0x0}, 0x0) semctl$IPC_SET(0x0, 0x0, 0x1, &(0x7f0000002380)={{0x0, 0x0, r10, 0xffffffffffffffff}}) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='system.posix_acl_default\x00', &(0x7f00000006c0)=ANY=[@ANYBLOB="02000000010000000000000002000600", @ANYRES32=r0, @ANYBLOB="02000200", @ANYRES32=r1, @ANYBLOB, @ANYRES32=r4, @ANYBLOB="040001000000000008000400", @ANYRES32=r5, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=r6, @ANYBLOB="08000100", @ANYRES32=r7, @ANYBLOB="08000400", @ANYRES32=r8, @ANYBLOB="08000200", @ANYRES32=r9, @ANYBLOB="08000100", @ANYRES32=r10, @ANYBLOB="10000400000000002000020000000000"], 0x6c, 0x1) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty=[0x0, 0x4888, 0x0, 0x0, 0x0, 0x1400000000000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @local={0xac, 0x13, 0xffffffffffffffff}, @remote}, @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10}}}}}}, 0x0) [ 367.561421][T11660] ceph: No path or : separator in source 19:06:02 executing program 2: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000180)=ANY=[@ANYBLOB="5b643a3a5d2c0b7d46552c3aec5cb2b2b289ea512541497e4156bfe0a99e0593dd0fbefc14d460ea5845ece88e98228885a6c428eab00e4cc3d3bed4dda286fcdfca5f2f"], 0x0, &(0x7f0000000140)='ceph\x00', 0x0, 0x0) 19:06:02 executing program 0: pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r4, &(0x7f0000000040)=ANY=[], 0xfe22) tee(r3, r4, 0x2, 0x2) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c000000240089"], 0x1}}, 0x0) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@newae={0x40, 0x1e, 0x0, 0x0, 0x0, {{@in6=@remote}, @in6=@loopback}}, 0x40}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xffc1) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) [ 367.711108][T11663] ceph: Bad value for 'source' 19:06:02 executing program 2: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000180)=ANY=[@ANYBLOB="5b643a3a5d2c0b7d46552c3aec5cb2b2b289ea512541497e4156bfe0a99e0593dd0fbefc14d460ea5845ece88e98228885a6c428eab00e4cc3d3bed4dda286fcdfca5f2f"], 0x0, &(0x7f0000000140)='ceph\x00', 0x0, 0x0) 19:06:02 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) [ 367.818195][T11673] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.0'. 19:06:03 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) [ 367.927454][T11677] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.0'. 19:06:03 executing program 0: r0 = gettid() r1 = openat$adsp1(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/adsp1\x00', 0x0, 0x0) read$dsp(r1, &(0x7f0000000100)=""/129, 0x81) prctl$PR_SET_PTRACER(0x59616d61, r0) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000000)) timer_settime(0x0, 0x0, &(0x7f0000000300)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) tkill(r0, 0x16) 19:06:03 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) 19:06:03 executing program 2: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000180)=ANY=[@ANYBLOB="5b643a3a5d2c0b7d46552c3aec5cb2b2b289ea512541497e4156bfe0a99e0593dd0fbefc14d460ea5845ece88e98228885a6c428eab00e4cc3d3bed4dda286fcdfca5f2f"], 0x0, &(0x7f0000000140)='ceph\x00', 0x0, 0x0) 19:06:03 executing program 2: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000180)=ANY=[@ANYBLOB="5b643a3a5d2c0b7d46552c3aec5cb2b2b289ea512541497e4156bfe0a99e0593dd0fbefc14d460ea5845ece88e98228885a6c428eab00e4cc3d3bed4dda286fcdfca5f2f"], &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) 19:06:03 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000180)=ANY=[], 0x0, &(0x7f0000000140)='ceph\x00', 0x0, 0x0) 19:06:03 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000180)=ANY=[], 0x0, &(0x7f0000000140)='ceph\x00', 0x0, 0x0) 19:06:03 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_S_INPUT(0xffffffffffffffff, 0xc0045627, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='mofo\x00\x00\x00\x00\x00\x00') pread64(r0, &(0x7f0000001680)=""/4096, 0x1000, 0x48) ioctl$VIDIOC_LOG_STATUS(r0, 0x5646, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r1, 0x0, r2, 0x0, 0x70196c71, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000180)=0xf) semget$private(0x0, 0x20000000102, 0x0) semop(0x0, &(0x7f0000000000)=[{0x2}, {}, {0x0, 0x2}], 0x3) semctl$IPC_INFO(0x0, 0x2, 0x3, &(0x7f0000005980)=""/4107) ioctl$EVIOCGBITSND(0xffffffffffffffff, 0x80404532, &(0x7f0000000340)=""/255) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$SCSI_IOCTL_START_UNIT(r4, 0x5) getpid() ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000002c0)={0x0, 0x0}) r6 = syz_open_procfs(r5, &(0x7f00000000c0)='net/tcp\x00') getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000040)=@assoc_value={0x0, 0x6}, &(0x7f0000000080)=0x8) setsockopt$inet_sctp_SCTP_CONTEXT(r6, 0x84, 0x11, &(0x7f00000001c0)={r7}, 0x8) pread64(r6, &(0x7f0000001680)=""/4096, 0x1000, 0x48) r8 = syz_open_procfs(0x0, &(0x7f0000000600)='net/ptype\x00\xa8\x19Al\f()\xfb}\xe8+\x89\x90h\xfdY\xc0:\xd9\x11\\?\x14\xe4\xff\x13\xe0$\xa0\xd2|\xd6\x03T\x9a]p\xab\x9d\xbb\xf8\xa0\x8d\xc3\xbb\xe7\x01I\xe8\x04i\x03\xb9K\xb5L[\x14l\xe7') pread64(r8, &(0x7f0000001680)=""/4096, 0x1000, 0x48) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, &(0x7f0000002740)) ioctl$DRM_IOCTL_GEM_CLOSE(r6, 0x40086409, &(0x7f0000002780)) semctl$GETZCNT(0x0, 0x2, 0xf, &(0x7f0000000440)=""/4096) syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='\"\x10\x00\xe1\x14') sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000027c0)=ANY=[]}}, 0x0) 19:06:03 executing program 2: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000180)=ANY=[@ANYBLOB="5b643a3a5d2c0b7d46552c3aec5cb2b2b289ea512541497e4156bfe0a99e0593dd0fbefc14d460ea5845ece88e98228885a6c428eab00e4cc3d3bed4dda286fcdfca5f2f"], &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) 19:06:03 executing program 2: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000180)=ANY=[@ANYBLOB="5b643a3a5d2c0b7d46552c3aec5cb2b2b289ea512541497e4156bfe0a99e0593dd0fbefc14d460ea5845ece88e98228885a6c428eab00e4cc3d3bed4dda286fcdfca5f2f"], &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) 19:06:03 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000180)=ANY=[], 0x0, &(0x7f0000000140)='ceph\x00', 0x0, 0x0) 19:06:04 executing program 2 (fault-call:2 fault-nth:0): mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000180)=ANY=[@ANYBLOB="5b643a3a5d2c0b7d46552c3aec5cb2b2b289ea512541497e4156bfe0a99e0593dd0fbefc14d460ea5845ece88e98228885a6c428eab00e4cc3d3bed4dda286fcdfca5f2f"], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) 19:06:04 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000180)=ANY=[], &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) [ 369.242316][T11733] FAULT_INJECTION: forcing a failure. [ 369.242316][T11733] name failslab, interval 1, probability 0, space 0, times 1 [ 369.256133][T11733] CPU: 1 PID: 11733 Comm: syz-executor.2 Not tainted 5.5.0-rc1-syzkaller #0 [ 369.264874][T11733] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 369.274988][T11733] Call Trace: [ 369.278349][T11733] dump_stack+0x1c9/0x220 [ 369.282809][T11733] should_fail+0xa3f/0xa50 [ 369.288664][T11733] __should_failslab+0x264/0x280 [ 369.293690][T11733] should_failslab+0x29/0x70 [ 369.298890][T11733] __kmalloc_track_caller+0x1ad/0xf10 [ 369.304328][T11733] ? ksys_mount+0xc4/0x3d0 [ 369.308805][T11733] strndup_user+0x166/0x380 [ 369.313376][T11733] ksys_mount+0xc4/0x3d0 [ 369.317740][T11733] ? prepare_exit_to_usermode+0x1ca/0x530 [ 369.323518][T11733] __se_sys_mount+0xe5/0x110 [ 369.328163][T11733] __x64_sys_mount+0x62/0x80 [ 369.332804][T11733] do_syscall_64+0xb6/0x160 [ 369.337430][T11733] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 369.343362][T11733] RIP: 0033:0x45a9e9 [ 369.347302][T11733] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 369.367100][T11733] RSP: 002b:00007fb71865fc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 369.375581][T11733] RAX: ffffffffffffffda RBX: 00007fb71865fc90 RCX: 000000000045a9e9 [ 369.383621][T11733] RDX: 0000000020000140 RSI: 00000000200000c0 RDI: 0000000020000180 [ 369.391656][T11733] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 369.399784][T11733] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fb7186606d4 [ 369.408179][T11733] R13: 00000000004c7ea4 R14: 00000000004df0e8 R15: 0000000000000003 19:06:04 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000180)=ANY=[], &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) 19:06:04 executing program 0: r0 = memfd_create(&(0x7f0000000140)='lotrusted\x1a\x00', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r4, 0xc08c5332, &(0x7f0000000280)={0x0, 0x0, 0x0, 'queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00'}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, &(0x7f00000001c0)={0x4f48b, 0x0, 0x0, 'queue0\x00\t\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xe7\x02\x00'}) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000040)={0x7, 'gre0\x00', 0x1}, 0x18) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10}, 0x0, 0x0, r4, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r5, 0x0, r6, 0x0, 0x70196c71, 0x0) write$sndseq(r6, &(0x7f00000000c0)=[{0x3, 0x5, 0x80, 0x5, @time={0x1f, 0x7fffffff}, {0x1b, 0x4}, {0x20, 0x9}, @queue={0x7f, {0x7, 0x3}}}], 0x31943080) 19:06:04 executing program 2: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="5b643a3a5d2c0b7d46552c3aec4fb2b2b289ea5125ac2e8f1621060d59183177d78d1ca2ee41497e4156bfe0a99e0593fd32befc14d463ea5845ece88e98228885a6c428eab00e4cc3d30bd3c31f55314689d12cbcc838c42c9637026d031046903bcb7f6dc283e18996bdbf4fc3616c59ddba403ffe98a21c1408a14dd5cd7c8d9f3644b7"], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket(0x1, 0xa, 0x7f) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r2, 0x10e, 0x8, &(0x7f0000000040)=0x80000000, 0x4) splice(r0, 0x0, r0, 0x0, 0x70196c71, 0x0) ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000000)=@usbdevfs_disconnect={0x1}) [ 369.651737][T11723] semctl(GETNCNT/GETZCNT) is since 3.16 Single Unix Specification compliant. [ 369.651737][T11723] The task syz-executor.3 (11723) triggered the difference, watch for misbehavior. 19:06:04 executing program 3: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="9c0000002c00f794729d0000f27796fa68ef1fb9", @ANYRES32=r1, @ANYBLOB="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"], 0x9c}}, 0x0) r2 = socket(0x4000000000010, 0x1000000000080002, 0x0) sendmmsg$alg(r2, &(0x7f0000000140), 0x42, 0x0) 19:06:04 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000180)=ANY=[], &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) [ 369.823811][T11749] ceph: No path or : separator in source [ 369.848895][T11752] ceph: No path or : separator in source 19:06:05 executing program 1 (fault-call:2 fault-nth:0): mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000180)=ANY=[], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) 19:06:05 executing program 2: r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dlm-monitor\x00', 0x200, 0x0) setsockopt$inet_tcp_TLS_TX(r0, 0x6, 0x1, &(0x7f0000000240)=@gcm_256={{0x304}, "7164648d6b953500", "df19d22bd0a84c9c8e4e60c0c6f515ec963fa25eca052be233f3db4cb6a16a97", "d637b2ff", "331ed4d82e5acb80"}, 0x38) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000180)=ANY=[@ANYBLOB="5b643a3a5d2c0b7d46552c3aec5cb2b2b289ea512541497e4156bfe0a99e0593dd0fbefc14d460ea5845ece88e98228885a6c428eab00e4cc3d3bed4dda286fcdfca5f2f"], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r1, 0x0, r2, 0x0, 0x70196c71, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) ioctl$SNDRV_CTL_IOCTL_TLV_WRITE(r3, 0xc008551b, &(0x7f0000000100)={0x1}) [ 370.001741][T11761] netlink: 108 bytes leftover after parsing attributes in process `syz-executor.3'. [ 370.096894][T11761] netlink: 108 bytes leftover after parsing attributes in process `syz-executor.3'. [ 370.152894][T11767] ceph: No path or : separator in source [ 370.179019][T11769] FAULT_INJECTION: forcing a failure. [ 370.179019][T11769] name failslab, interval 1, probability 0, space 0, times 0 [ 370.192420][T11769] CPU: 1 PID: 11769 Comm: syz-executor.1 Not tainted 5.5.0-rc1-syzkaller #0 [ 370.201195][T11769] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 370.211835][T11769] Call Trace: [ 370.215257][T11769] dump_stack+0x1c9/0x220 [ 370.219697][T11769] should_fail+0xa3f/0xa50 [ 370.224257][T11769] __should_failslab+0x264/0x280 [ 370.229920][T11769] should_failslab+0x29/0x70 [ 370.234613][T11769] __kmalloc_track_caller+0x1ad/0xf10 [ 370.240133][T11769] ? ksys_mount+0xc4/0x3d0 [ 370.244742][T11769] strndup_user+0x166/0x380 [ 370.249313][T11769] ksys_mount+0xc4/0x3d0 [ 370.253789][T11769] ? prepare_exit_to_usermode+0x1ca/0x530 [ 370.259669][T11769] __se_sys_mount+0xe5/0x110 [ 370.264313][T11769] __x64_sys_mount+0x62/0x80 [ 370.268942][T11769] do_syscall_64+0xb6/0x160 [ 370.273505][T11769] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 370.279431][T11769] RIP: 0033:0x45a9e9 [ 370.283373][T11769] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 19:06:05 executing program 3: r0 = socket(0xa, 0x802, 0x0) setsockopt$inet_int(r0, 0x0, 0xf, &(0x7f0000000040)=0x6, 0x4) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0xfffffffc, @ipv4={[], [], @broadcast}}, 0xfffffffffffffe4f) [ 370.303551][T11769] RSP: 002b:00007f45bc846c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 370.312215][T11769] RAX: ffffffffffffffda RBX: 00007f45bc846c90 RCX: 000000000045a9e9 [ 370.320247][T11769] RDX: 0000000020000140 RSI: 00000000200000c0 RDI: 0000000020000180 [ 370.328865][T11769] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 370.337063][T11769] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f45bc8476d4 [ 370.345064][T11769] R13: 00000000004c7ea4 R14: 00000000004df0e8 R15: 0000000000000003 [ 370.368962][T11772] ceph: No path or : separator in source 19:06:05 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000180)=ANY=[], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x4040, 0x0) ioctl$KDDISABIO(r0, 0x4b37) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000040)=ANY=[], 0xfe22) recvmsg(r1, &(0x7f0000000200)={&(0x7f0000000180)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000040)=""/33, 0x21}], 0x1}, 0x20) 19:06:05 executing program 2: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00') r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000480)='/proc/capi/capi20ncci\x00', 0x8000, 0x0) write$P9_RREMOVE(r0, &(0x7f00000004c0)={0xfffffffffffffde2, 0x7b, 0x2}, 0x7) pause() sendmsg$TIPC_NL_MON_GET(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x801004}, 0xc, &(0x7f0000000100)={&(0x7f0000000740)=ANY=[@ANYBLOB="18020000", @ANYRES64, @ANYRESHEX=r0], 0x3}, 0x1, 0x0, 0x0, 0x40c0000}, 0xa87aa890446eb478) mount(&(0x7f0000000200)=ANY=[@ANYBLOB="5b643ac65d2c0b2b5a5a0d3aec5c8ffb8d7fd01ee1d1d0b2b2b289ea512541497e4156bfe0a99e0593dd0fbefc14d460ea5845ece88e98228885a6c428eab00e4cc3d3bed4dda286fcdfca5f2f"], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) write$FUSE_STATFS(0xffffffffffffffff, &(0x7f0000000180)={0x60, 0x0, 0x8, {{0x585, 0x9, 0x0, 0x1, 0x94, 0x3f, 0x4, 0x933}}}, 0x60) [ 370.596447][T11781] ceph: Bad value for 'source' [ 370.637417][T11783] ceph: Bad value for 'source' [ 370.668348][T11787] ceph: No path or : separator in source 19:06:05 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00') r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000480)='/proc/capi/capi20ncci\x00', 0x8000, 0x0) write$P9_RREMOVE(r0, &(0x7f00000004c0)={0xfffffffffffffde2, 0x7b, 0x2}, 0x7) pause() sendmsg$TIPC_NL_MON_GET(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x801004}, 0xc, &(0x7f0000000100)={&(0x7f0000000740)=ANY=[@ANYBLOB="18020000", @ANYRES64, @ANYRESHEX=r0], 0x3}, 0x1, 0x0, 0x0, 0x40c0000}, 0xa87aa890446eb478) mount(&(0x7f0000000200)=ANY=[@ANYBLOB="5b643ac65d2c0b2b5a5a0d3aec5c8ffb8d7fd01ee1d1d0b2b2b289ea512541497e4156bfe0a99e0593dd0fbefc14d460ea5845ece88e98228885a6c428eab00e4cc3d3bed4dda286fcdfca5f2f"], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) write$FUSE_STATFS(0xffffffffffffffff, &(0x7f0000000180)={0x60, 0x0, 0x8, {{0x585, 0x9, 0x0, 0x1, 0x94, 0x3f, 0x4, 0x933}}}, 0x60) 19:06:05 executing program 0: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x40, 0x0) accept$packet(r0, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000080)=0x14) prctl$PR_SET_TIMERSLACK(0x1d, 0x5) r1 = syz_open_dev$ttys(0xc, 0x2, 0x1) ioctl$TIOCCONS(r1, 0x541d) [ 370.711577][T11788] ceph: No path or : separator in source 19:06:05 executing program 2: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$VIDIOC_S_EXT_CTRLS(r2, 0xc0205648, &(0x7f0000000240)={0x9e0000, 0x8, 0x100, r0, 0x0, &(0x7f0000000200)={0x98090a, 0x7, [], @p_u16=&(0x7f0000000100)=0x3f}}) write$RDMA_USER_CM_CMD_GET_EVENT(r3, &(0x7f0000000400)={0xc, 0x8, 0xfa00, {&(0x7f0000000280)}}, 0x10) setsockopt$XDP_TX_RING(0xffffffffffffffff, 0x11b, 0x3, &(0x7f0000000440)=0x12010, 0x4) fcntl$dupfd(r0, 0x0, r0) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vsock\x00', 0x101000, 0x0) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r4, 0x84, 0xc, &(0x7f00000004c0)=0xfffffffb, 0x4) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000000)={{0xa, 0x4e24, 0x0, @mcast2, 0x2}, {0xa, 0x4e25, 0x3, @empty, 0xb59}, 0x1, [0x400, 0x7f, 0x1, 0x1c000, 0x0, 0x6, 0xcf94, 0xffffffff]}, 0x5c) mount(&(0x7f0000000180)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) 19:06:05 executing program 1: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/attr/current\x00', 0x2, 0x0) mount(&(0x7f0000000180)=ANY=[], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) 19:06:05 executing program 4: r0 = shmget(0x0, 0x3000, 0x80, &(0x7f0000ffa000/0x3000)=nil) shmctl$SHM_INFO(r0, 0xe, &(0x7f0000000000)=""/211) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x4000) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(r1, 0x8982, &(0x7f0000000140)={0x0, 'bridge0\x00', {0x1}, 0x7}) r2 = openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000180)='/proc/thread-self/attr/current\x00', 0x2, 0x0) write$binfmt_aout(r2, &(0x7f00000001c0)={{0x107, 0x0, 0x1, 0x29b, 0x92, 0x3, 0x1a8, 0x85}, "a1fe5e2468426e98006ceaeb74d7625d0c566caf3d00f3839e678bf5b473f54d6766c0f238b0cc309838a965a6e6ad586fdfd7429bc895873001b23749955d194e3a4db04c14cbf384813b68a096f28719f372827cae76be83a0687c37628bf8e9a078d67a2718eecda9b01fd81adf3862d380f4935783a90454816605bdf2dbc11905b3303a0d7b87e5dc2716337e14a26e373996c7c5f162972e6cbca10a6571ac4b68722630b78e68f65a8dbb24", [[], [], [], [], [], [], [], []]}, 0x8cf) r3 = shmget(0x1, 0x2000, 0x10, &(0x7f0000ffa000/0x2000)=nil) shmctl$IPC_RMID(r3, 0x0) r4 = socket$vsock_stream(0x28, 0x1, 0x0) recvmsg(r4, &(0x7f00000010c0)={&(0x7f0000000e40)=@ipx, 0x80, &(0x7f0000001000)=[{&(0x7f0000000ec0)=""/198, 0xc6}, {&(0x7f0000000fc0)=""/19, 0x13}], 0x2, &(0x7f0000001040)=""/103, 0x67}, 0x41) r5 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000001100)='/dev/sequencer2\x00', 0x101000, 0x0) setsockopt$inet_udp_encap(r5, 0x11, 0x64, &(0x7f0000001140), 0x4) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001180)='cpuset.effective_cpus\x00', 0x0, 0x0) ioctl$SG_GET_PACK_ID(r6, 0x227c, &(0x7f00000011c0)) mq_timedsend(r5, &(0x7f0000001200)="ed6901e63d8129827f47e35b86e036d155ae7847a72c2aa2d6cf3a4ee334ceab837578f6e226ccbe607423ca093712dae4139e348d60133a8213b89497dec34007638ea51d49d56abd822a1b42703f30cef72b83de40e954cff698420fb0a66ad163443ff1d2b3a603e92e9e34aca79c5cb2ff1b06427cbf55ad5fedeec56b10680dbd4a22b79afcde6be0821cbbadf2c274daf21776ddc162d45145ab0e5e57f9e4", 0xa2, 0xfff, &(0x7f00000012c0)={0x77359400}) ioctl$KVM_SET_CPUID(0xffffffffffffffff, 0x4008ae8a, &(0x7f0000001300)={0x2, 0x0, [{0x2, 0x7, 0xde180000, 0xfffffff9, 0xffff}, {0x0, 0x2509, 0x5, 0x1, 0x9}]}) r7 = syz_open_dev$vbi(&(0x7f0000001340)='/dev/vbi#\x00', 0x3, 0x2) ioctl$VIDIOC_ENUMAUDIO(r7, 0xc0345641, &(0x7f0000001380)={0x1, "7ff85c0108565ce0a584ecc25461606fdad5933c14663f3f76e505c540b445f9", 0x1, 0x2}) r8 = fcntl$dupfd(0xffffffffffffffff, 0x406, r4) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r8, 0x6, 0x21, &(0x7f00000013c0)="71c3088e5809ec9bf421057233dfe92c", 0x10) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000001400)={0x0, 0x80}, &(0x7f0000001440)=0x8) setsockopt$inet_sctp_SCTP_CONTEXT(r6, 0x84, 0x11, &(0x7f0000001480)={r9, 0x7ff}, 0x8) readv(r7, &(0x7f0000001b40)=[{&(0x7f00000014c0)=""/187, 0xbb}, {&(0x7f0000001580)=""/125, 0x7d}, {&(0x7f0000001600)}, {&(0x7f0000001640)=""/139, 0x8b}, {&(0x7f0000001700)=""/237, 0xed}, {&(0x7f0000001800)=""/246, 0xf6}, {&(0x7f0000001900)=""/144, 0x90}, {&(0x7f00000019c0)=""/138, 0x8a}, {&(0x7f0000001a80)=""/61, 0x3d}, {&(0x7f0000001ac0)=""/128, 0x80}], 0xa) r10 = syz_open_dev$loop(&(0x7f0000001c00)='/dev/loop#\x00', 0x6, 0x40) ioctl$LOOP_GET_STATUS64(r10, 0x4c05, &(0x7f0000001c40)) unlink(&(0x7f0000001d40)='./file0\x00') r11 = add_key$user(&(0x7f0000001d80)='user\x00', &(0x7f0000001dc0)={'syz', 0x0}, &(0x7f0000001e00)="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", 0xfd, 0xfffffffffffffffc) keyctl$assume_authority(0x10, r11) r12 = ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0xffffffff) ioctl$TIOCGPKT(r12, 0x80045438, &(0x7f0000001f00)) 19:06:06 executing program 2: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = dup2(r1, 0xffffffffffffffff) sendmsg$kcm(r2, &(0x7f0000000040)={&(0x7f0000000280)=@llc={0x1a, 0x3, 0x81, 0xc4, 0x0, 0x47, @local}, 0x80, &(0x7f0000000640)=[{&(0x7f0000000300)="3bfc1de5ac007dcdd47a247f61046de41fe881f6794de35131ff0cadd5c4086e2b84bb73dbf14995eeedb52dee0ef32d5d438adc320c3785cb17f3d00c803ae6f33f9bf798b47bdab573560e1a52af5b9c3b67265d2486a019b4891f4112ab597e9fb65889b21e24e1601c953cafa6eca87d49f4ce3c2fc6c8c89b433ed4175a943a1d95d2da32abcbe9615cdbbf55e71e5f69c7b600dc096c273550b161aa92706fe78b46df1964e6e59ef12a343cd63e61dc5587843b10ec72f39839ef9637ab86e9", 0xc3}, {&(0x7f0000000400)="7f065079d183f5243e3536ba894feef3111523b5162dae40632d593e382be3b500ac1cee34220ea248589de4ac10e8cc261fee29ca65e6e213941de732f4a7e9f5d95248c9684c", 0x47}, {&(0x7f0000000480)="9e077b4817d21f3f594449aa3a5d689a105f36c11d43c37b4b3e1a52f5b9a6366f18ded293966534dfaf89113ce9910d567d0d6a9549780811c8b1722d75ad0e72f4218d66d11cb95914e2", 0x4b}, {&(0x7f0000000500)="877d2a2cd19b683135dada074d0ae171d61312df7083696989acfde6dd5181a1749d643ff54150b686a97141053e5a2e255befc56d9bc6e2881d7eba1f455047869b06b3afad151367f11a8befbb0c77f569f2b5de075278756876295f8303749b165d8ba534b9d6a0cca0b4506381687736dbc10955b75a90f6f28dfe2bb3705995", 0x79}, {&(0x7f00000005c0)="8d613048a69532484aa050b02a84f60d58cc62de2a08810a79f31e50ebe25bc077321e9e6b1be86849e0ae9912524771cca946786801529f953fdc5a6795e2667be9be85f83c57", 0x47}], 0x5, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], 0x1a0}, 0x805) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r3, 0x0, r5, 0x0, 0x70196c71, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r6, 0x0, r7, 0x0, 0x70196c71, 0x0) mount(&(0x7f0000000200)=ANY=[@ANYRES16=0x0, @ANYPTR=&(0x7f0000000040)=ANY=[], @ANYRESOCT=r6, @ANYRESHEX, @ANYRESDEC=r4, @ANYRESHEX], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x48050, 0x0) [ 371.004024][T11808] ceph: No path or : separator in source [ 371.038626][T11810] ceph: Bad value for 'source' 19:06:06 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=ANY=[], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x400, 0x0) [ 371.074199][T11811] ceph: Bad value for 'source' 19:06:06 executing program 0: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$VIDIOC_TRY_FMT(r0, 0xc0d05640, &(0x7f00000001c0)={0xa, @raw_data="4065bd7c4af41b360272342ad63f06c4072050052d5f362983ec6740801cc3a0593c90189f054585910577c6749e5a341696adbfb432f4b957ec3c66861d92d93aaa8f0f4a646653e8473cb901326c42bd6c50dc5d6b244593813060054831db2dc83f1dc908b1c2b544cba6ff89e6d4f4f8abd81e4995b0640725ab715234f7b9ae329b1f0fb3a9c84677b6566c55bf1bd2ce398d5bd1b10722671f3b2a7cdd2ae9e42706df9d43dd1f2981d734ec69ef9175b9b3b6c5c39b08b7ed1904ebafd52872bc69977cc8"}) prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f0000000080)={0x19c, &(0x7f0000000040)=[{0x8, 0x9, 0x0, 0x80007}]}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='net/anycast6\x00') ioctl$VT_ACTIVATE(0xffffffffffffffff, 0x5606, 0x2ce783dc) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000029c0)='/dev/full\x00', 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000002a40)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000002a00)={0xffffffffffffffff}, 0x106, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r1, &(0x7f0000002a80)={0x15, 0x110, 0xfa00, {r2, 0x6, 0x0, 0x0, 0x0, @ib={0x1b, 0xfffe, 0x5, {"52086ff10e27aaf76963f585ee4c1aeb"}, 0x5, 0x1, 0x7d4}, @in6={0xa, 0x4e22, 0x1, @local, 0x9}}}, 0x118) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000240)={'syz_tun\x00', 0x0}) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = gettid() sendmsg$nl_route(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000280)=@newlink={0xa8, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_NET_NS_PID={0x8, 0x13, r6}, @IFLA_XDP={0x80, 0x2b, [@IFLA_XDP_FD={0x7c, 0x1, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}}]}]}, 0xa8}}, 0x0) r7 = getpgid(r6) sched_getscheduler(r7) r8 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r9, 0x0, r10, 0x0, 0x70196c71, 0x0) recvmsg$can_bcm(r10, &(0x7f0000002940)={&(0x7f0000001340)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, &(0x7f0000002840)=[{&(0x7f00000013c0)=""/242, 0xf2}, {&(0x7f00000014c0)=""/163, 0xa3}, {&(0x7f0000001580)=""/178, 0xb2}, {&(0x7f0000001640)=""/206, 0xce}, {&(0x7f0000001740)=""/239, 0xef}, {&(0x7f0000001840)=""/4096, 0x1000}], 0xfffffffffffffd4, &(0x7f00000028c0)=""/113, 0x71}, 0x20000040) r11 = openat$null(0xffffffffffffff9c, &(0x7f0000000140)='/dev/null\x00', 0x1, 0x0) r12 = socket$inet6_tcp(0xa, 0x1, 0x0) r13 = fcntl$dupfd(r12, 0x0, r12) ioctl$PERF_EVENT_IOC_ENABLE(r13, 0x8912, 0x400200) ioctl$KVM_KVMCLOCK_CTRL(r13, 0xaead) getsockopt$ARPT_SO_GET_ENTRIES(r11, 0x0, 0x61, &(0x7f00000002c0)={'filter\x00', 0x1000, "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"}, &(0x7f0000001300)=0x1024) write$P9_RWRITE(r8, &(0x7f0000002980)={0xb, 0x77, 0x1, 0x100000}, 0xb) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f00000000c0)={0x1, 0x0, 0x5, 0x8}, 0x10) readv(0xffffffffffffffff, &(0x7f00000014c0), 0x7) [ 371.186407][T11812] cgroup: fork rejected by pids controller in /syz2 [ 371.269418][T11827] ceph: Bad value for 'source' [ 371.357104][T11854] ceph: Bad value for 'source' [ 371.376195][T11879] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 371.385112][T11879] A link change request failed with some changes committed already. Interface syz_tun may have been left with an inconsistent configuration, please check. 19:06:06 executing program 2: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r2, 0x0, 0x70196c71, 0x0) ioctl$int_out(r1, 0x0, &(0x7f0000000040)) ioctl$VIDIOC_TRY_EXT_CTRLS(r2, 0xc0205649, &(0x7f0000000440)={0xa20000, 0x0, 0x1, 0xffffffffffffffff, 0x0, &(0x7f0000000400)={0xa00901, 0x9, [], @value64=0x6}}) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r3, 0x84, 0xa, &(0x7f0000000480)={0x7, 0x0, 0x10203, 0x400, 0x44, 0xfffffffb, 0x80000000, 0x1}, 0x20) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000180)=ANY=[@ANYBLOB="5b643a3a5d2c0b7d46552c3aec5cb2b289ea512541497e4156bfe0a99e0593dd0fbefc14d460ea5845ece88e98228885a6c428eab00e4cc3d3bed4dda286fcdfca5f2f00"], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) prctl$PR_SET_MM_AUXV(0x23, 0xc, &(0x7f0000000200)="1a1d14d3861a36870a3439b9a8b6d450982f1b7dada377f4815b16969e0e7c412f6853d40180655c030a7a79862b39e00616dd063289634a7a60d702adf9f3ae5e7aa568c39053dba767a13ba807ef979fef533719acaf4572c11e1f2779d18f2c4841eb394d3038dc216ee07d0846f17059c912893088", 0x77) [ 371.453959][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 371.460450][ C1] protocol 88fb is buggy, dev hsr_slave_1 19:06:06 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_procfs(0x0, &(0x7f0000000100)='setgroups\x00') close(r2) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_EVENTS(r3, 0x84, 0xb, &(0x7f0000000040)={0x0, 0x3, 0x40}, 0x296) shutdown(r3, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r3, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x10, &(0x7f00000002c0)=[@in={0x2, 0x0, @local}]}, &(0x7f0000000180)=0x10) r4 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r3, 0x84, 0x72, &(0x7f0000000080)={r5}, 0xc) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f0000000000)={r5, 0x1000, 0x5, [0x7, 0x0, 0x800, 0x200, 0xfdd1]}, &(0x7f0000000180)=0x12) setsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000000)={r5, 0x4}, 0x8) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000180)=ANY=[], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) [ 371.614429][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 371.620746][ C0] protocol 88fb is buggy, dev hsr_slave_1 19:06:06 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00') r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000480)='/proc/capi/capi20ncci\x00', 0x8000, 0x0) write$P9_RREMOVE(r0, &(0x7f00000004c0)={0xfffffffffffffde2, 0x7b, 0x2}, 0x7) pause() sendmsg$TIPC_NL_MON_GET(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x801004}, 0xc, &(0x7f0000000100)={&(0x7f0000000740)=ANY=[@ANYBLOB="18020000", @ANYRES64, @ANYRESHEX=r0], 0x3}, 0x1, 0x0, 0x0, 0x40c0000}, 0xa87aa890446eb478) mount(&(0x7f0000000200)=ANY=[@ANYBLOB="5b643ac65d2c0b2b5a5a0d3aec5c8ffb8d7fd01ee1d1d0b2b2b289ea512541497e4156bfe0a99e0593dd0fbefc14d460ea5845ece88e98228885a6c428eab00e4cc3d3bed4dda286fcdfca5f2f"], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) write$FUSE_STATFS(0xffffffffffffffff, &(0x7f0000000180)={0x60, 0x0, 0x8, {{0x585, 0x9, 0x0, 0x1, 0x94, 0x3f, 0x4, 0x933}}}, 0x60) [ 371.798658][T11955] ceph: No path or : separator in source 19:06:06 executing program 1: clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) ioctl$VIDIOC_DQBUF(0xffffffffffffffff, 0xc0585611, &(0x7f0000000180)={0x4, 0x1, 0x4, 0x20000, 0x100, {r0, r1/1000+10000}, {0x5, 0x2991187648b9bdac, 0x4, 0x2, 0x1, 0x7f, "4434260f"}, 0x9ad, 0x3e3f7aab5ad78cb1, @offset=0xfffffe01, 0xd8a, 0x0, 0xffffffffffffffff}) ioctl$EVIOCGKEYCODE(r2, 0x80084504, &(0x7f0000000040)) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000180)=ANY=[], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) [ 371.854002][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 371.860347][ C1] protocol 88fb is buggy, dev hsr_slave_1 19:06:07 executing program 2: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lsetxattr$security_ima(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.ima\x00', &(0x7f0000000200)=@v1={0x2, "ffb50c51954217e9b69d04"}, 0xc, 0x1) syz_emit_ethernet(0x4a, &(0x7f00000000c0)=ANY=[@ANYBLOB="aaaaaaaaaaaa02000000030008004500003c0090000000069078ac1314bbac1414bb00000000", @ANYRES32=0x41424344, @ANYRES32=0x42424242, @ANYBLOB="a00000009078000000060ca89c5d0303000008395068e401b4000000"], 0x0) mount(&(0x7f0000000180)=ANY=[@ANYBLOB="5b643a3a5d2c0b7d46552c3aec5cb2b2b289ea512541497e4156bfe0a99e0593dd0fbefc14d460ea5845ece88e98228885a6c428eab00e4cc3d3bed4dda286fcdfca5f2f"], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r1, 0x0, 0x70196c71, 0x0) accept(r1, &(0x7f0000000240)=@ethernet={0x0, @remote}, &(0x7f00000002c0)=0x80) 19:06:07 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00') r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000480)='/proc/capi/capi20ncci\x00', 0x8000, 0x0) write$P9_RREMOVE(r0, &(0x7f00000004c0)={0xfffffffffffffde2, 0x7b, 0x2}, 0x7) pause() sendmsg$TIPC_NL_MON_GET(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x801004}, 0xc, &(0x7f0000000100)={&(0x7f0000000740)=ANY=[@ANYBLOB="18020000", @ANYRES64, @ANYRESHEX=r0], 0x3}, 0x1, 0x0, 0x0, 0x40c0000}, 0xa87aa890446eb478) mount(&(0x7f0000000200)=ANY=[@ANYBLOB="5b643ac65d2c0b2b5a5a0d3aec5c8ffb8d7fd01ee1d1d0b2b2b289ea512541497e4156bfe0a99e0593dd0fbefc14d460ea5845ece88e98228885a6c428eab00e4cc3d3bed4dda286fcdfca5f2f"], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) write$FUSE_STATFS(0xffffffffffffffff, &(0x7f0000000180)={0x60, 0x0, 0x8, {{0x585, 0x9, 0x0, 0x1, 0x94, 0x3f, 0x4, 0x933}}}, 0x60) [ 372.030043][T12037] IPVS: ftp: loaded support on port[0] = 21 [ 372.069434][T12040] ceph: No path or : separator in source [ 372.155835][T12042] ceph: No path or : separator in source [ 372.258523][T11879] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 372.272549][T11879] A link change request failed with some changes committed already. Interface syz_tun may have been left with an inconsistent configuration, please check. [ 372.285513][T12045] ceph: No path or : separator in source 19:06:07 executing program 1: openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r0, 0x0, r0) fsetxattr$smack_xattr_label(r0, &(0x7f0000000040)='security.SMACK64IPOUT\x00', &(0x7f0000000180)={'security.SMACK64IPOUT\x00'}, 0x17, 0x2) clone(0x1004007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r1, 0x0, r2, 0x0, 0x70196c71, 0x0) ioctl$PPPIOCGUNIT(r2, 0x80047456, &(0x7f0000000100)) mount(&(0x7f0000000180)=ANY=[], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) [ 372.329253][T12065] ceph: No path or : separator in source [ 372.375191][T12087] ceph: No path or : separator in source [ 372.450468][T12037] chnl_net:caif_netlink_parms(): no params data found [ 372.538379][T12156] ceph: No path or : separator in source [ 372.562616][T12037] bridge0: port 1(bridge_slave_0) entered blocking state [ 372.570081][T12037] bridge0: port 1(bridge_slave_0) entered disabled state [ 372.579475][T12037] device bridge_slave_0 entered promiscuous mode 19:06:07 executing program 0: clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) ioctl$VIDIOC_DQBUF(0xffffffffffffffff, 0xc0585611, &(0x7f0000000180)={0x4, 0x1, 0x4, 0x20000, 0x100, {r0, r1/1000+10000}, {0x5, 0x2991187648b9bdac, 0x4, 0x2, 0x1, 0x7f, "4434260f"}, 0x9ad, 0x3e3f7aab5ad78cb1, @offset=0xfffffe01, 0xd8a, 0x0, 0xffffffffffffffff}) ioctl$EVIOCGKEYCODE(r2, 0x80084504, &(0x7f0000000040)) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000180)=ANY=[], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) [ 372.594925][T12037] bridge0: port 2(bridge_slave_1) entered blocking state [ 372.603121][T12037] bridge0: port 2(bridge_slave_1) entered disabled state [ 372.613535][T12037] device bridge_slave_1 entered promiscuous mode [ 372.715355][T12037] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 372.755716][T12037] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 372.835738][T12037] team0: Port device team_slave_0 added [ 372.837508][T12164] ceph: No path or : separator in source [ 372.845867][T12037] team0: Port device team_slave_1 added [ 372.939742][T12037] device hsr_slave_0 entered promiscuous mode [ 372.974460][T12037] device hsr_slave_1 entered promiscuous mode [ 373.043558][T12037] debugfs: Directory 'hsr0' with parent '/' already present! [ 373.163621][T12037] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 373.272519][T12037] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 373.320676][T12037] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 373.497994][T12037] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 373.739751][T12037] 8021q: adding VLAN 0 to HW filter on device bond0 [ 373.775455][ T2731] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 373.786678][ T2731] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 373.804221][T12037] 8021q: adding VLAN 0 to HW filter on device team0 [ 373.822975][ T2731] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 373.833993][ T2731] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 373.844365][ T2731] bridge0: port 1(bridge_slave_0) entered blocking state [ 373.851567][ T2731] bridge0: port 1(bridge_slave_0) entered forwarding state [ 373.925773][ T2731] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 373.935272][ T2731] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 373.945159][ T2731] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 373.958410][ T2731] bridge0: port 2(bridge_slave_1) entered blocking state [ 373.965981][ T2731] bridge0: port 2(bridge_slave_1) entered forwarding state [ 373.975015][ T2731] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 373.986035][ T2731] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 373.997271][ T2731] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 374.008135][ T2731] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 374.018388][ T2731] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 374.028942][ T2731] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 374.039247][ T2731] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 374.049134][ T2731] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 374.058733][ T2731] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 374.068450][ T2731] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 374.080856][T12037] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 374.097782][ T2731] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 374.143171][ T3386] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 374.151567][ T3386] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 374.176083][T12037] 8021q: adding VLAN 0 to HW filter on device batadv0 19:06:09 executing program 4: r0 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0807b5055e0bcfe8474071") ioctl$VIDIOC_TRY_EXT_CTRLS(0xffffffffffffffff, 0xc0205649, &(0x7f0000000200)={0xa20000, 0x2, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000180)={0x9a0910, 0x3, [], @p_u16=&(0x7f0000000140)=0x6}}) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r1, 0x40505330, &(0x7f0000000240)={{0x81, 0x5}, {0x4, 0x40}, 0xff, 0x0, 0x2}) r2 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r2, &(0x7f0000000300)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) sendmsg(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000080)='+', 0x1}], 0x2d5}, 0xc100) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000)='/de$\xe6\xa4Eg\x00', 0x880603, 0x0) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r3, 0x84, 0x8, &(0x7f0000000040), &(0x7f00000000c0)=0x4) recvmmsg(0xffffffffffffffff, &(0x7f0000004e00)=[{{0x0, 0x0, &(0x7f0000001000)}, 0x3}], 0x1, 0x0, 0x0) r4 = dup(0xffffffffffffffff) ioctl$KVM_REGISTER_COALESCED_MMIO(r4, 0x4010ae67, &(0x7f00000002c0)={0x6000, 0x102000}) writev(r2, &(0x7f0000000400)=[{&(0x7f0000000480)="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", 0xffe4}], 0x1) 19:06:09 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000240)={'syz_tun\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r4, 0x0, r5, 0x0, 0x70196c71, 0x0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r5, 0x4040534e, &(0x7f0000000540)={0x4, @tick, 0x7, {0x7}, 0x7f, 0x0, 0x1}) sendmsg$nl_route(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000280)=ANY=[@ANYBLOB="a800000010000100"/20, @ANYRES32=r1, @ANYBLOB="00f7ffffffffffff07001300", @ANYRES32=r3, @ANYBLOB="80002b007c000100"/72, @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00', @ANYRES32, @ANYBLOB="080000000000000000000000000000001000"/30, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00'], 0xa8}}, 0x0) r6 = syz_open_procfs(r3, &(0x7f0000000100)='net/rt6_stats\x00') setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r6, 0x84, 0x6e, &(0x7f00000004c0)=[@in={0x2, 0x4e23, @multicast1}, @in6={0xa, 0x4e20, 0x4, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0xb6}, @in6={0xa, 0x4e24, 0x1000, @mcast1, 0x6}, @in={0x2, 0x4e21, @initdev={0xac, 0x1e, 0x1, 0x0}}], 0x58) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r7 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x288b7c586aded3a8, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) syz_open_dev$video(&(0x7f0000000580)='/dev/video#\x00', 0xf5, 0x80800) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r8, 0x0, r9, 0x0, 0x70196c71, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(r9, 0x84, 0x2, &(0x7f0000000440), &(0x7f0000000480)=0x8) mlock(&(0x7f0000ffa000/0x4000)=nil, 0x4000) ioctl$VIDIOC_ENUMOUTPUT(r7, 0xc0485630, &(0x7f0000000200)={0x1000, "40b4caed5e93b6698574aab9c9477ebb0508d1c543effbcb873e262a5e3d921b", 0x3, 0x3, 0x1, 0xc00000, 0x2}) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x80, 0x1) mount(&(0x7f0000000340)=ANY=[@ANYBLOB="5b643a3a5d2c0b7d46552c3ab3434dbe512541497e4156bfe0a99e0593dd0fbefc14d460ea5845ece88e98228885a6c4a8eab00e4cc3d3bed45f2f82bd2273e025c165914ac2f2d23d7f051ac0c8a7cc177cd4b273f9ffd6ff196525984336f7bf9f9a2f8974b1990685e04027c4763cbc7182fd6a07ec1440f9b104790079946d84fb39b22d5c2f47bfa438f56eb2660d427546947b288f73ac12654d050928748fad1053d1e45117efab4b83fe2746df3f955a9b92808eb5893de50e83ad56f11666188ad16feb56a61a14743d85b4fa30c4c9"], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) 19:06:09 executing program 0: clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) ioctl$VIDIOC_DQBUF(0xffffffffffffffff, 0xc0585611, &(0x7f0000000180)={0x4, 0x1, 0x4, 0x20000, 0x100, {r0, r1/1000+10000}, {0x5, 0x2991187648b9bdac, 0x4, 0x2, 0x1, 0x7f, "4434260f"}, 0x9ad, 0x3e3f7aab5ad78cb1, @offset=0xfffffe01, 0xd8a, 0x0, 0xffffffffffffffff}) ioctl$EVIOCGKEYCODE(r2, 0x80084504, &(0x7f0000000040)) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000180)=ANY=[], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) 19:06:09 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00') r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000480)='/proc/capi/capi20ncci\x00', 0x8000, 0x0) write$P9_RREMOVE(r0, &(0x7f00000004c0)={0xfffffffffffffde2, 0x7b, 0x2}, 0x7) pause() sendmsg$TIPC_NL_MON_GET(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x801004}, 0xc, &(0x7f0000000100)={&(0x7f0000000740)=ANY=[@ANYBLOB="18020000", @ANYRES64, @ANYRESHEX=r0], 0x3}, 0x1, 0x0, 0x0, 0x40c0000}, 0xa87aa890446eb478) mount(&(0x7f0000000200)=ANY=[@ANYBLOB="5b643ac65d2c0b2b5a5a0d3aec5c8ffb8d7fd01ee1d1d0b2b2b289ea512541497e4156bfe0a99e0593dd0fbefc14d460ea5845ece88e98228885a6c428eab00e4cc3d3bed4dda286fcdfca5f2f"], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) 19:06:09 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r2, 0x0, 0x70196c71, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r3, 0x0, r4, 0x0, 0x70196c71, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r5, 0x0, r6, 0x0, 0x70196c71, 0x0) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) r8 = fcntl$dupfd(r7, 0x0, r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r9, 0x0, r10, 0x0, 0x70196c71, 0x0) r11 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r11, 0x0, r11) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r12, 0x0, r13, 0x0, 0x70196c71, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r14, 0x0, r15, 0x0, 0x70196c71, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r16, 0x0, r17, 0x0, 0x70196c71, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r18, 0x0, r19, 0x0, 0x70196c71, 0x0) r20 = socket$inet6_tcp(0xa, 0x1, 0x0) r21 = fcntl$dupfd(r20, 0x0, r20) ioctl$PERF_EVENT_IOC_ENABLE(r21, 0x8912, 0x400200) r22 = socket$inet6_tcp(0xa, 0x1, 0x0) r23 = fcntl$dupfd(r22, 0x0, r22) ioctl$PERF_EVENT_IOC_ENABLE(r23, 0x8912, 0x400200) r24 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r24, 0x0, r24) mount(&(0x7f0000002400)=ANY=[@ANYRESOCT, @ANYRESHEX=r23, @ANYRESHEX=r24, @ANYPTR, @ANYPTR64=&(0x7f0000000040)=ANY=[@ANYRES32, @ANYPTR64=&(0x7f0000000200)=ANY=[@ANYBLOB="8c26d4a6538c6f33311f511d9581db6a16e8e4ed4763caeba9541a848effd6a94f41868d0d00e9b002166fbb69e1d52f4c4d251458c852174111a3fb7dc637353b11fd963ec4539d38e27e05f8d7ac0446ceed8263e81118a6093bc0db", @ANYRESHEX=r4, @ANYRESDEC=r1, @ANYPTR64=&(0x7f0000001300)=ANY=[@ANYRES16=0x0, @ANYRES16, @ANYRES32=r14, @ANYPTR=&(0x7f0000000180)=ANY=[@ANYRESHEX=0x0, @ANYRESOCT, @ANYRES16, @ANYRES16=r17, @ANYPTR64], @ANYRES64=r19], @ANYRESOCT=r6]], @ANYBLOB="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", @ANYPTR=&(0x7f0000001340)=ANY=[@ANYRESDEC=0x0, @ANYRESDEC=r9, @ANYRES64, @ANYRES32=r12, @ANYRES64=r21]], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) 19:06:09 executing program 0: clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) ioctl$VIDIOC_DQBUF(0xffffffffffffffff, 0xc0585611, &(0x7f0000000180)={0x4, 0x1, 0x4, 0x20000, 0x100, {r0, r1/1000+10000}, {0x5, 0x2991187648b9bdac, 0x4, 0x2, 0x1, 0x7f, "4434260f"}, 0x9ad, 0x3e3f7aab5ad78cb1, @offset=0xfffffe01, 0xd8a, 0x0, 0xffffffffffffffff}) ioctl$EVIOCGKEYCODE(r2, 0x80084504, &(0x7f0000000040)) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000180)=ANY=[], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) [ 374.616969][T12176] ceph: No path or : separator in source 19:06:09 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00') r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000480)='/proc/capi/capi20ncci\x00', 0x8000, 0x0) write$P9_RREMOVE(r0, &(0x7f00000004c0)={0xfffffffffffffde2, 0x7b, 0x2}, 0x7) pause() sendmsg$TIPC_NL_MON_GET(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x801004}, 0xc, &(0x7f0000000100)={&(0x7f0000000740)=ANY=[@ANYBLOB="18020000", @ANYRES64, @ANYRESHEX=r0], 0x3}, 0x1, 0x0, 0x0, 0x40c0000}, 0xa87aa890446eb478) mount(&(0x7f0000000200)=ANY=[@ANYBLOB="5b643ac65d2c0b2b5a5a0d3aec5c8ffb8d7fd01ee1d1d0b2b2b289ea512541497e4156bfe0a99e0593dd0fbefc14d460ea5845ece88e98228885a6c428eab00e4cc3d3bed4dda286fcdfca5f2f"], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) 19:06:09 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x8, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='\x00\xf1)\r*\xbbzL\x8e7\x9e\xaa\xb3y\xb9\xfa!\xad!\xb4\xd4\x94\xa0\x86\xcf\x12#\xb4\xd3n$\x85\x06k\xb2\xf9\xd5\"\xfe\x86 \b\x7f\xe8\x8a\xcf\x89\x9b\xbaR]\xf5{J\x84\x15\xf9)\xf3\xc8\xd5`\xe6\xe6\x9eI\x02\xce\x1fI\xa8w\xc3#\xba\xf5\xe9\xea>\xc7\xab2,\xa0\x84t\xce\x04Tf\xc5\xfe`\'\x9b\xe2MH%\x93\x028\xcb\x0f\xdb\x16\xe2l\x80\xe6\xcd\xceW\x01SS-o`X\xf6\xa4\xc1|\xbe\xc4\xf0\xac1zp\xc9\x89\xef.\xa4\x91\xb4\xf3(', 0x0, 0x0, 0x0, 0x0, 0x4, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000)={0x0, 0x1}}, 0x1bd) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r2, 0x0, r3, 0x0, 0x70196c71, 0x0) setsockopt$inet6_IPV6_ADDRFORM(r3, 0x29, 0x1, &(0x7f0000000040), 0x4) 19:06:10 executing program 0: clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) ioctl$VIDIOC_DQBUF(0xffffffffffffffff, 0xc0585611, &(0x7f0000000180)={0x4, 0x1, 0x4, 0x20000, 0x100, {r0, r1/1000+10000}, {0x5, 0x2991187648b9bdac, 0x4, 0x2, 0x1, 0x7f, "4434260f"}, 0x9ad, 0x3e3f7aab5ad78cb1, @offset=0xfffffe01, 0xd8a, 0x0, 0xffffffffffffffff}) ioctl$EVIOCGKEYCODE(r2, 0x80084504, &(0x7f0000000040)) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000000180)=ANY=[], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) [ 374.997618][T12236] ceph: No path or : separator in source 19:06:10 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000180)={{{@in=@empty, @in=@multicast1}}, {{@in6=@loopback}, 0x0, @in=@empty}}, &(0x7f0000000000)=0xe8) mount(&(0x7f0000000180)=ANY=[], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) [ 375.043097][T12282] ceph: No path or : separator in source [ 375.170341][T12307] ceph: No path or : separator in source 19:06:10 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r1, 0x0, 0x70196c71, 0x0) mount(&(0x7f0000000180)=ANY=[@ANYRES32, @ANYBLOB="dbcc73543e82ae65899c3d78538a252434b2e1409549cd20c9b7f80b8ce75112dd27ca442048285258818eb3db59bb3b8abb9800032b6bc9b047574674ea728974e93e133c0608453b33fbef767cf9ea876c540b785ee32a2d817fb6b88b425965e475ba8b5be9ecb0372e3c12514f5045b368d227", @ANYRESHEX=r1, @ANYRES16], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) 19:06:10 executing program 0: clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) ioctl$VIDIOC_DQBUF(0xffffffffffffffff, 0xc0585611, &(0x7f0000000180)={0x4, 0x1, 0x4, 0x20000, 0x100, {r0, r1/1000+10000}, {0x5, 0x2991187648b9bdac, 0x4, 0x2, 0x1, 0x7f, "4434260f"}, 0x9ad, 0x3e3f7aab5ad78cb1, @offset=0xfffffe01, 0xd8a, 0x0, 0xffffffffffffffff}) ioctl$EVIOCGKEYCODE(r2, 0x80084504, &(0x7f0000000040)) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000000180)=ANY=[], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) [ 375.215606][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 375.221929][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 375.252412][T12312] ceph: Bad value for 'source' 19:06:10 executing program 2: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r2, 0x0, r3, 0x0, 0x70196c71, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r3, 0x0, 0x82, &(0x7f0000000180)={'nat\x00'}, &(0x7f0000000040)=0x78) ioctl$VIDIOC_ENUM_FMT(r1, 0xc0405602, &(0x7f0000000000)={0x9, 0x8, 0x0, "1e5824a817c03ed04626442e51523e7722cb7e15d4fa1a8ed34b6dd27867485b", 0x20493859}) mount(&(0x7f0000000200)=ANY=[@ANYBLOB="5b643a3a5d2c0b7d46552c3aec5cb2b2b288ea510b41497e4000000000000000dd0fbefc14d460ea5845ece88e98228885a6c428eab00e4cc3d395dadda2862f00000000f26e5a46b5e6741b460787e9882c48e5a40891c3a08391a358009c9b64"], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) 19:06:10 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000180)=ANY=[], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) r0 = accept(0xffffffffffffffff, &(0x7f0000000000)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000100)=0x80) getsockopt$TIPC_NODE_RECVQ_DEPTH(r0, 0x10f, 0x83, &(0x7f0000000180), &(0x7f00000001c0)=0x4) lsetxattr$security_selinux(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='security.selinux\x00', &(0x7f0000000280)='system_u:object_r:dhcpd_var_run_t:s0\x00', 0x25, 0x1) [ 375.545600][T12322] ceph: No path or : separator in source [ 375.653217][T12379] ceph: Bad value for 'source' 19:06:10 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = accept$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @loopback}, &(0x7f0000000040)=0x10) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000100)={0x64f107a82534b86, 'veth1_to_bond\x00', 0x1}, 0x18) mount(&(0x7f0000000180)=ANY=[], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) [ 375.687327][T12398] ceph: Bad value for 'source' 19:06:10 executing program 0: clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) ioctl$VIDIOC_DQBUF(0xffffffffffffffff, 0xc0585611, &(0x7f0000000180)={0x4, 0x1, 0x4, 0x20000, 0x100, {r0, r1/1000+10000}, {0x5, 0x2991187648b9bdac, 0x4, 0x2, 0x1, 0x7f, "4434260f"}, 0x9ad, 0x3e3f7aab5ad78cb1, @offset=0xfffffe01, 0xd8a, 0x0, 0xffffffffffffffff}) ioctl$EVIOCGKEYCODE(r2, 0x80084504, &(0x7f0000000040)) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000000180)=ANY=[], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) [ 375.847123][T12434] ceph: Bad value for 'source' 19:06:10 executing program 2: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000180)=ANY=[@ANYBLOB="5b643a3a5d2c0b7d46552c3aec5cb2b2b289ea512541497e4156bfe0a99e0593dd0fbefc14d460ea5845ece88e98228885a6c428eab00e4cc3d3bed4dda286fcdfca5f2f"], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r1, 0x0, 0x70196c71, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r3, 0x84, 0x7c, &(0x7f0000000000)={0x0, 0x9, 0x7}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000100)={r4, 0x5}, &(0x7f0000000200)=0x8) 19:06:10 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00') r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000480)='/proc/capi/capi20ncci\x00', 0x8000, 0x0) write$P9_RREMOVE(r0, &(0x7f00000004c0)={0xfffffffffffffde2, 0x7b, 0x2}, 0x7) pause() sendmsg$TIPC_NL_MON_GET(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x801004}, 0xc, &(0x7f0000000100)={&(0x7f0000000740)=ANY=[@ANYBLOB="18020000", @ANYRES64, @ANYRESHEX=r0], 0x3}, 0x1, 0x0, 0x0, 0x40c0000}, 0xa87aa890446eb478) mount(&(0x7f0000000200)=ANY=[@ANYBLOB="5b643ac65d2c0b2b5a5a0d3aec5c8ffb8d7fd01ee1d1d0b2b2b289ea512541497e4156bfe0a99e0593dd0fbefc14d460ea5845ece88e98228885a6c428eab00e4cc3d3bed4dda286fcdfca5f2f"], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) [ 375.883066][T12436] ceph: Bad value for 'source' 19:06:11 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(&(0x7f0000003b80)={0xffffffffffffffff, 0xffffffffffffffff}) getpeername$unix(r0, &(0x7f0000003bc0)=@abs, &(0x7f0000003c40)=0x6e) mount(&(0x7f0000000180)=ANY=[], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) 19:06:11 executing program 4: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1) close(r1) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000000)={'syz_tun\x00', 0x0}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="410000001400490900000000000000000a000000", @ANYRES32=r5, @ANYBLOB="1400010000000000000000000000000000000005"], 0x3}}, 0x0) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) setsockopt$inet_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000040)={0xfffffffa}, 0x4) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r6, 0x0, r6) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0}) newfstatat(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x400) fchown(r6, r7, r8) [ 376.005263][T12441] ceph: No path or : separator in source [ 376.089554][T12448] ceph: No path or : separator in source 19:06:11 executing program 0: clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) ioctl$VIDIOC_DQBUF(0xffffffffffffffff, 0xc0585611, &(0x7f0000000180)={0x4, 0x1, 0x4, 0x20000, 0x100, {r0, r1/1000+10000}, {0x5, 0x2991187648b9bdac, 0x4, 0x2, 0x1, 0x7f, "4434260f"}, 0x9ad, 0x3e3f7aab5ad78cb1, @offset=0xfffffe01, 0xd8a, 0x0, 0xffffffffffffffff}) ioctl$EVIOCGKEYCODE(r2, 0x80084504, &(0x7f0000000040)) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000180)=ANY=[], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) [ 376.164950][T12452] netlink: 21 bytes leftover after parsing attributes in process `syz-executor.4'. 19:06:11 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00') r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000480)='/proc/capi/capi20ncci\x00', 0x8000, 0x0) write$P9_RREMOVE(r0, &(0x7f00000004c0)={0xfffffffffffffde2, 0x7b, 0x2}, 0x7) pause() sendmsg$TIPC_NL_MON_GET(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x801004}, 0xc, &(0x7f0000000100)={&(0x7f0000000740)=ANY=[@ANYBLOB="18020000", @ANYRES64, @ANYRESHEX=r0], 0x3}, 0x1, 0x0, 0x0, 0x40c0000}, 0xa87aa890446eb478) write$FUSE_STATFS(0xffffffffffffffff, &(0x7f0000000180)={0x60, 0x0, 0x8, {{0x585, 0x9, 0x0, 0x1, 0x94, 0x3f, 0x4, 0x933}}}, 0x60) [ 376.238301][T12479] ceph: Bad value for 'source' [ 376.296944][T12500] ceph: Bad value for 'source' 19:06:11 executing program 0: clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) ioctl$VIDIOC_DQBUF(0xffffffffffffffff, 0xc0585611, &(0x7f0000000180)={0x4, 0x1, 0x4, 0x20000, 0x100, {r0, r1/1000+10000}, {0x5, 0x2991187648b9bdac, 0x4, 0x2, 0x1, 0x7f, "4434260f"}, 0x9ad, 0x3e3f7aab5ad78cb1, @offset=0xfffffe01, 0xd8a, 0x0, 0xffffffffffffffff}) ioctl$EVIOCGKEYCODE(r2, 0x80084504, &(0x7f0000000040)) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000180)=ANY=[], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) 19:06:11 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000100)='/dev/btrfs-control\x00', 0x1, 0x0) pipe2(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x84000) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f00000003c0)={0x0, 0x1}, &(0x7f0000000400)=0x8) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r1, 0x84, 0x6c, &(0x7f0000000440)={r2, 0xeb, "d3b591dd5b3ee60827d3791aefed94a831cd1d29f60134e86262d92a377bcfe1a8be1aac930592b170db49da66d88d6e038d7e4ea9060ae0c3b33593d9bc3e8d2bfaf988429e330887c45c16da104f4c16ddbb0bda063ca30d876f523c1fdfa008d2459f18b1e8a7d8adb1912a6dbe136b91c46cd2c21755b726214828f8165b2a5f050c2545e8a699a662ced6afb1e2748bec835c54ca8bb9def8e8d6414ca20c915d16b3a0f4503b02ccbbf417a88542b741833432ef151d91ae077ea638b96602b0186354caf28008572474b43455a8656132aec7e68d59a80572be673cdd61714d29abcb77ae770fdc"}, &(0x7f0000000540)=0xf3) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, &(0x7f0000000180)={0x0, 0xfc, "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"}, &(0x7f00000002c0)=0x104) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000300)={r3, 0x6}, &(0x7f0000000340)=0x8) mount(&(0x7f0000000180)=ANY=[], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) link(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00') 19:06:11 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00') r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000480)='/proc/capi/capi20ncci\x00', 0x8000, 0x0) write$P9_RREMOVE(r0, &(0x7f00000004c0)={0xfffffffffffffde2, 0x7b, 0x2}, 0x7) pause() write$FUSE_STATFS(0xffffffffffffffff, &(0x7f0000000180)={0x60, 0x0, 0x8, {{0x585, 0x9, 0x0, 0x1, 0x94, 0x3f, 0x4, 0x933}}}, 0x60) 19:06:11 executing program 0: clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) ioctl$VIDIOC_DQBUF(0xffffffffffffffff, 0xc0585611, &(0x7f0000000180)={0x4, 0x1, 0x4, 0x20000, 0x100, {r0, r1/1000+10000}, {0x5, 0x2991187648b9bdac, 0x4, 0x2, 0x1, 0x7f, "4434260f"}, 0x9ad, 0x3e3f7aab5ad78cb1, @offset=0xfffffe01, 0xd8a, 0x0, 0xffffffffffffffff}) ioctl$EVIOCGKEYCODE(r2, 0x80084504, &(0x7f0000000040)) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000180)=ANY=[], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) 19:06:11 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000400)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_GET(r3, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000440)={0x20, r4, 0x415, 0x0, 0x0, {}, [@TIPC_NLA_MEDIA={0xc, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}]}]}, 0x20}}, 0x0) sendmsg$TIPC_NL_BEARER_ENABLE(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000005c0)={0x54, r4, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x40, 0x1, [@TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz0\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x0, @multicast1=0xac14140d}}, {0x14, 0x2, @in={0x2, 0x0, @dev}}}}]}]}, 0x54}}, 0x0) 19:06:11 executing program 2: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x80, 0xffffffffffffffff) lsetxattr$trusted_overlay_redirect(&(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='trusted.overlay.redirect\x00', &(0x7f0000000240)='./file1\x00', 0x8, 0x3) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$TIPC_GROUP_JOIN(r1, 0x10f, 0x87, &(0x7f0000000000), &(0x7f0000000040)=0x4) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r2, 0x0, r3, 0x0, 0x70196c71, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r4, &(0x7f0000000040)=ANY=[], 0xfe22) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = fcntl$dupfd(r5, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r7, 0x0, r8, 0x0, 0x70196c71, 0x0) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) r10 = fcntl$dupfd(r9, 0x0, r9) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r11, 0x0, r12, 0x0, 0x70196c71, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r13, 0x0, r14, 0x0, 0x70196c71, 0x0) mount(&(0x7f00000003c0)=ANY=[@ANYPTR=&(0x7f0000000340)=ANY=[@ANYRESOCT=r3, @ANYPTR64, @ANYPTR64=&(0x7f00000002c0)=ANY=[@ANYRES16=r4, @ANYPTR, @ANYRES16, @ANYRES64=0x0, @ANYRESDEC], @ANYPTR=&(0x7f0000000300)=ANY=[@ANYRES16=r6, @ANYPTR, @ANYBLOB="d0b6", @ANYRESHEX=r7], @ANYRES64, @ANYRESOCT=r0, @ANYRESDEC, @ANYRESOCT=r10, @ANYRES32=r0], @ANYRES32=r12, @ANYRES16=r14], &(0x7f0000000400)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x80, 0x0) openat$dsp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dsp\x00', 0x48000, 0x0) [ 376.769857][T12583] ceph: Bad value for 'source' [ 376.788043][T12577] tipc: Started in network mode [ 376.793233][T12577] tipc: Own node identity ac14140d, cluster identity 4711 [ 376.800760][T12577] vcan0: MTU too low for tipc bearer [ 376.806560][T12577] tipc: Enabling of bearer rejected, failed to enable media [ 376.860087][T12590] ceph: Bad value for 'source' 19:06:11 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x80, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r5, &(0x7f0000000040)=ANY=[], 0xfe22) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) r7 = fcntl$dupfd(r6, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) splice(r5, 0x0, r7, 0x0, 0x70196c71, 0x0) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f0000000180)='tls\x00', 0x4) splice(r1, 0x0, r2, 0x0, 0x5, 0x2) setsockopt$inet6_dccp_buf(r2, 0x21, 0x1, &(0x7f0000000280)="b632d33737c05b325337a56488a89f9d5431468b5dbc", 0xfffffffffffffdcb) r8 = fcntl$dupfd(r0, 0x0, r0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240)='/dev/hwrng\x00', 0x2000, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r8, 0x84, 0x7, &(0x7f0000000000), &(0x7f0000000040)=0x4) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) r10 = fcntl$dupfd(r9, 0x0, r9) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r3, 0xc0045516, &(0x7f0000000440)=0x1ff) ioctl$SNDRV_PCM_IOCTL_USER_PVERSION(r10, 0x40044104, &(0x7f0000000200)=0x38) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000180)=ANY=[], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x10c48, 0x0) r11 = socket$inet6_tcp(0xa, 0x1, 0x0) r12 = fcntl$dupfd(r11, 0x0, r11) ioctl$PERF_EVENT_IOC_ENABLE(r12, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r12, 0x84, 0x6c, &(0x7f00000002c0)=ANY=[@ANYRES32=0x0, @ANYBLOB="ca00000023d0c0e9e71f454972a4e9ea14c8d0ea7f94fc7f785049097cc43c05b93664caf150dce8c3f30da51fe4664bbd9d5e868e85baeaef12dc544491f2a6f5b41b7ae5e526cb634a3962325b2f3ab718c495b632d1ff4fbe6bf5b5cd708ac067c193b8440aa0d5025582a09156f63f77dc5121732cc186a06a738122ee3240d51301e2f615c5b6fc6fb01d08deb9bd9937bdbef520e0b1e21417da067125e3d4193eba7ed97fd21c24b3a80cb86cf23f17d4e5176a71db3ce3bed67132f955fcafd9287aad66f86b76e689ae"], &(0x7f00000003c0)=0xd2) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r10, 0x84, 0x22, &(0x7f0000000400)={0x2, 0x0, 0xbd, 0x6, r13}, 0x10) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, &(0x7f0000000100)={0x1, 0x6, 0x1ff}) 19:06:12 executing program 0: clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) ioctl$VIDIOC_DQBUF(0xffffffffffffffff, 0xc0585611, &(0x7f0000000180)={0x4, 0x1, 0x4, 0x20000, 0x100, {r0, r1/1000+10000}, {0x5, 0x2991187648b9bdac, 0x4, 0x2, 0x1, 0x7f, "4434260f"}, 0x9ad, 0x3e3f7aab5ad78cb1, @offset=0xfffffe01, 0xd8a}) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000180)=ANY=[], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) [ 376.889913][T12594] vcan0: MTU too low for tipc bearer [ 376.896092][T12594] tipc: Enabling of bearer rejected, failed to enable media 19:06:12 executing program 4: r0 = socket$inet(0xa, 0x801, 0x84) sendmmsg$inet(r0, &(0x7f0000002340)=[{{&(0x7f0000000380)={0x2, 0x0, @loopback}, 0x10, &(0x7f0000000440)=[{&(0x7f00000003c0)="10", 0x1}], 0x1}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f00000009c0)=[@ip_pktinfo={{0x1c, 0x84, 0x6, {0x0, @empty, @dev={0xac, 0x14, 0x14, 0x18}}}}], 0x20}}], 0x2, 0x0) [ 377.138210][T12678] ceph: No path or : separator in source 19:06:12 executing program 0: clock_gettime(0x0, &(0x7f0000000000)) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000180)=ANY=[], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) 19:06:12 executing program 2: openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x404002, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000180)=ANY=[@ANYBLOB="5b643a3a5d2c0b7d46552c3aec5cb2b2b289ea512541497e4156bfe0a99e0593dd0fbefc14d460ea5845ece88e98228885a6c428eab00e4cc3d3bed4dda286fcdfca5f2f"], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) 19:06:12 executing program 4: pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x800) ioctl$EVIOCGKEY(r0, 0x80404518, &(0x7f0000000040)) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0xffffffffffffff57}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492b41fd983f79e65199615607672c590100000000000000a53367f05f4ad614", 0x57}], 0x4, 0x0) ptrace$setopts(0x4200, r1, 0x0, 0x2) tkill(r1, 0x3c) ptrace$cont(0x18, r1, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001380)={r0, 0x0, 0x5f, 0xf5, &(0x7f0000000040)="2be8d35114f426149b174830b3c3370873420d66bd5eb8cdc1a74d38f5d3360347bce80f553f5087fc7417529ce365725bfb72b082643e027f8ae14e811eb55b6eabb50d447b79edd1ac4dd50b78b82c1bdc7e6302fdd6e7a0189064343825", &(0x7f0000000100)=""/245, 0x4, 0x0, 0x1000, 0xcf, &(0x7f0000000380)="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", &(0x7f0000000200)="a5aa285a32f848482f5fc9f87512d8140806fa0dc12b6be5f0ec11af394389d113c1eeb432b207d5522726aa8b24e5f6c96db87899b29da669dfc4d10221f743bfe4e6eaaa40667177fd5290f132f191af656a833f0fdc568022c6ed59f909c3f352a1abb5fb82004389d0b9edd7374f882a0810de952016609b93689d78738ead4f20d9f3f5c95db9edeb3027db654bd28135997cfbb6e7d8f9879dc77f9aa06766b16956c816a6a84316e05491643994ff0c7f06f85865a43d12c80c20d445e157be4230fa67808a9520a0822f9e"}, 0x40) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0xd6, 0x81) [ 377.418797][T12712] ceph: Bad value for 'source' 19:06:12 executing program 0: clock_gettime(0x0, &(0x7f0000000000)) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000180)=ANY=[], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) [ 377.449771][T12715] ceph: No path or : separator in source 19:06:12 executing program 4: add_key$keyring(0x0, &(0x7f0000000900)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) request_key(0x0, &(0x7f0000000840)={'\x00\x97\xdf', 0x3}, &(0x7f0000000880)='./cgroup.net/syz1\x00', 0x0) add_key$keyring(&(0x7f0000000100)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) r0 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0x0) add_key$keyring(0x0, &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0, r0) add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = dup(r2) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000080)={0x0, r3}, 0x10) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) r4 = syz_open_dev$loop(&(0x7f0000000500)='/dev/loop#\x00', 0x0, 0x100082) r5 = memfd_create(&(0x7f0000000540)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000040), 0x4) connect$inet6(0xffffffffffffffff, 0x0, 0x0) ioctl$VIDIOC_SUBDEV_S_SELECTION(0xffffffffffffffff, 0xc040563e, &(0x7f0000000180)={0x3, 0x0, 0x101, 0x1, {0x4, 0x0, 0x80000000, 0x3}}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x20000, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x2, 0x800) ioctl$VT_RESIZE(r6, 0x5609, &(0x7f0000000300)={0x100, 0x4, 0x7}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x2000002}, 0xc, &(0x7f00000004c0)={&(0x7f0000000680)=ANY=[@ANYBLOB="2be78b6507bff296e92506737d5cb2cf6ec1d1693637a243bc6e0420d9574f34fd0e5e020000000000000035277848cde0dd567760f11e24e12a24055f6004af76930adaaf4815c72cd697069211b40f7277f67ddc5ac85507a9e5a7a82d671d55258a4e743c681d9fe40097cf3f2f0f7fcf716852fc7a7d53a0900512b078c2e4471bf53741382a6c8f8ed51db160802daecacbdc7b72e8b2e8badd9f336c9c6871f9ca3e612e442f7fe71c7324602e9c027b098499e9ba6a16962b84b4c86ab3323a206dffc68542537b04822e2516b48db6f89e8ed04b07b383e1297611faf091"], 0x1}, 0x1, 0x0, 0x0, 0x4048024}, 0x4000000) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, &(0x7f0000000000)=ANY=[@ANYBLOB="0780140001008e0000c08100e91059090944f1cd1830a14623386aa3010000003f0ba37addc5cc0a130356d1800087090d9a0046d4d41007"], 0x1) pwritev(r5, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000200)={'gretap0\x00', {0x2, 0x4e23, @loopback}}) sendto$packet(0xffffffffffffffff, &(0x7f0000000240)="8c6afbc18295209d3afd2fdfa79f0b5dff7fa7f9745afe84b0e3064767e50f60a2d6b11d85967d31afaed05441e3605647bc0e7e209596824ddcf166c92999088280229a0ff4f172a00ccb4ac0965ad1e16ce1b3731291c1342e6b7a84285c2ce01ff376432225b320daa46f2fe7785c581f1abfb49337c33a5e9835de9d19f3af72c04f7b9a559807aa4bad25ba1522a02aca6fbd2a57da241f8b948953d367f8268f1bf76792dcbb2b5f", 0xab, 0x4000, &(0x7f0000000400)={0x11, 0x8, 0x0, 0x1, 0xfe, 0x6, @random="2e17d5349ce9"}, 0x14) ioctl$LOOP_CHANGE_FD(r4, 0x4c00, r5) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) sendfile(r4, r4, 0x0, 0x40fdf) 19:06:12 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00') r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000480)='/proc/capi/capi20ncci\x00', 0x8000, 0x0) write$P9_RREMOVE(r0, &(0x7f00000004c0)={0xfffffffffffffde2, 0x7b, 0x2}, 0x7) pause() write$FUSE_STATFS(0xffffffffffffffff, &(0x7f0000000180)={0x60, 0x0, 0x8, {{0x585, 0x9, 0x0, 0x1, 0x94, 0x3f, 0x4, 0x933}}}, 0x60) [ 377.636238][T12757] ceph: Bad value for 'source' 19:06:12 executing program 0: clock_gettime(0x0, &(0x7f0000000000)) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000180)=ANY=[], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) 19:06:12 executing program 2: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) r1 = epoll_create1(0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000240)) r2 = syz_open_pts(r0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r2, &(0x7f0000000080)) ioctl$TCSETS(r2, 0x5402, &(0x7f0000000040)) ioctl$TCSETSW(r2, 0x5403, &(0x7f0000000100)={0x4, 0x0, 0x0, 0x10001, 0x4}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r3, 0x0, r3) mount(&(0x7f0000000300)=ANY=[], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000400)='h\x00\x00\x00\x00\x86\x03\xaadh\xeese\xb3Vk@f\xcc\xefD1#j\xf1\xd7\xe3\xef6md}\xd9\xe3\xb1\xa9\x14\xf2(`&\xc5\xbao\xc4\xaa\xd5C]\xf4\xd4\xfa\xd5\tec0\xaa\xe5x/|\xef\xd4f\xf5YQd\xf3', 0x80000, 0x0) 19:06:13 executing program 4: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f00000001c0)={'syz1\x00\x00\xff\xff\xff\x94\x00', {}, 0x0, [], [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x4202]}, 0x45c) ioctl$BINDER_GET_NODE_DEBUG_INFO(r0, 0x5101, 0x0) close(r0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = open$dir(&(0x7f0000000540)='./file0\x00', 0x88140, 0x0) r3 = dup2(r1, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r4, 0x0, r5, 0x0, 0x70196c71, 0x0) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r8, 0x0, r9, 0x0, 0x70196c71, 0x0) ioctl$VIDIOC_QUERYBUF(r5, 0xc0585609, &(0x7f0000000080)={0x480, 0x5, 0x4, 0x80000000, 0x4, {r6, r7/1000+30000}, {0x0, 0xed26d87f38d2ce56, 0x5, 0x9, 0x1f, 0x9, "d88531f3"}, 0x2, 0x2, @offset=0xffff, 0x8000, 0x0, r8}) ioctl$PPPIOCGL2TPSTATS(r10, 0x80487436, &(0x7f0000000100)="5c6dfd8188978db8007c4e607aa800d481ac") [ 377.964648][T12835] ceph: Bad value for 'source' 19:06:13 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, 0x0) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000180)=ANY=[], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x20000, 0x0) 19:06:13 executing program 0: ioctl$VIDIOC_DQBUF(0xffffffffffffffff, 0xc0585611, &(0x7f0000000180)={0x4, 0x1, 0x4, 0x20000, 0x100, {}, {0x5, 0x2991187648b9bdac, 0x4, 0x2, 0x1, 0x7f, "4434260f"}, 0x9ad, 0x3e3f7aab5ad78cb1, @offset=0xfffffe01, 0xd8a}) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000180)=ANY=[], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) 19:06:13 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00') r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000480)='/proc/capi/capi20ncci\x00', 0x8000, 0x0) write$P9_RREMOVE(r0, &(0x7f00000004c0)={0xfffffffffffffde2, 0x7b, 0x2}, 0x7) pause() write$FUSE_STATFS(0xffffffffffffffff, &(0x7f0000000180)={0x60, 0x0, 0x8, {{0x585, 0x9, 0x0, 0x1, 0x94, 0x3f, 0x4, 0x933}}}, 0x60) 19:06:13 executing program 0: ioctl$VIDIOC_DQBUF(0xffffffffffffffff, 0xc0585611, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000180)=ANY=[], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) [ 378.287497][T12901] ceph: No path or : separator in source 19:06:13 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00') r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000480)='/proc/capi/capi20ncci\x00', 0x8000, 0x0) pause() sendmsg$TIPC_NL_MON_GET(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x801004}, 0xc, &(0x7f0000000100)={&(0x7f0000000740)=ANY=[@ANYBLOB="18020000", @ANYRES64, @ANYRESHEX=r0], 0x3}, 0x1, 0x0, 0x0, 0x40c0000}, 0xa87aa890446eb478) write$FUSE_STATFS(0xffffffffffffffff, &(0x7f0000000180)={0x60, 0x0, 0x8, {{0x585, 0x9, 0x0, 0x1, 0x94, 0x3f, 0x4, 0x933}}}, 0x60) 19:06:13 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r1, 0x0, 0x70196c71, 0x0) ioctl$TIOCGSOFTCAR(r1, 0x5419, &(0x7f0000000000)) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$SG_SCSI_RESET(r3, 0x2284, 0x0) mount(&(0x7f0000000180)=ANY=[], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) 19:06:13 executing program 0: ioctl$VIDIOC_DQBUF(0xffffffffffffffff, 0xc0585611, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000180)=ANY=[], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) [ 378.523176][T12966] ceph: Bad value for 'source' 19:06:13 executing program 2: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000180)=ANY=[@ANYPTR=&(0x7f0000000040)=ANY=[@ANYRES32, @ANYRES32]], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) 19:06:13 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000180)=ANY=[], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x1, 0x400) [ 378.718056][T12975] ceph: Bad value for 'source' 19:06:13 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00') r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000480)='/proc/capi/capi20ncci\x00', 0x8000, 0x0) pause() sendmsg$TIPC_NL_MON_GET(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x801004}, 0xc, &(0x7f0000000100)={&(0x7f0000000740)=ANY=[@ANYBLOB="18020000", @ANYRES64, @ANYRESHEX=r0], 0x3}, 0x1, 0x0, 0x0, 0x40c0000}, 0xa87aa890446eb478) write$FUSE_STATFS(0xffffffffffffffff, &(0x7f0000000180)={0x60, 0x0, 0x8, {{0x585, 0x9, 0x0, 0x1, 0x94, 0x3f, 0x4, 0x933}}}, 0x60) [ 378.810110][T12977] ceph: Bad value for 'source' 19:06:13 executing program 0: ioctl$VIDIOC_DQBUF(0xffffffffffffffff, 0xc0585611, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000180)=ANY=[], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) [ 378.897518][T12983] ceph: No path or : separator in source [ 378.970000][T12990] ceph: Bad value for 'source' [ 379.012934][T13009] ceph: Bad value for 'source' [ 379.029888][T13017] ceph: Bad value for 'source' 19:06:14 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1000000, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x3ff, 0x70d001) mknodat(r1, 0x0, 0x2, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="5000000010003b0e00"/20, @ANYRES32=0x0, @ANYBLOB="000000010000000008000a00", @ANYRES32=0x6, @ANYBLOB="120012000c0001007665746800000000180002000a00010002000000", @ANYRES32=0x0, @ANYBLOB="b4dc4f73ba213795"], 0x50}}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) r4 = dup3(r2, r3, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = socket$inet6_sctp(0xa, 0x1, 0x84) r6 = socket$inet6_sctp(0xa, 0x5, 0x84) r7 = dup2(r6, r5) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f00000001c0)) r8 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r8, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r7, 0x84, 0x73, &(0x7f0000000000)={r9, 0x0, 0x10}, &(0x7f0000000080)=0x18) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, &(0x7f00000002c0)={r9, 0xc, "0c41f0ec61693d5a83effebd"}, &(0x7f0000000300)=0x14) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r4, 0x84, 0x75, &(0x7f0000000100)={r9, 0x1ff}, 0xfffffffffffffdba) r10 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200)='/dev/btrfs-control\x00', 0x222000, 0x0) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r10, 0x84, 0x1, &(0x7f0000000240)={0x0, 0x57, 0x8, 0x7, 0x8, 0x8}, 0x14) 19:06:14 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00') pause() sendmsg$TIPC_NL_MON_GET(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x801004}, 0xc, &(0x7f0000000100)={&(0x7f0000000740)=ANY=[@ANYBLOB="18020000", @ANYRES64, @ANYRESHEX], 0x3}, 0x1, 0x0, 0x0, 0x40c0000}, 0xa87aa890446eb478) write$FUSE_STATFS(0xffffffffffffffff, &(0x7f0000000180)={0x60, 0x0, 0x8, {{0x585, 0x9, 0x0, 0x1, 0x94, 0x3f, 0x4, 0x933}}}, 0x60) 19:06:14 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000040)=ANY=[], 0xfe22) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x40, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000040)=r2, 0x4) r3 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$TIPC_MCAST_REPLICAST(r3, 0x10f, 0x86) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000180)={'#! ', './file0', [{0x20, 'ceph\x00'}, {}, {0x20, 'ceph\x00'}, {0x20, 'ceph\x00'}, {0x20, 'X'}, {0x20, 'ceph\x00'}, {0x20, 'mime_type'}, {}], 0xa, "155cc6e2ed33866056ce3e00d32fc2b9d50478c9e5e47318727444c84f3f2d5dd4fb4cc2ee894cbc42d375dd5240f15569889d32ae9cc8135f2bec0f65defa8935cc316f51f15a57d49e5becfb2f2706bab4d6adfe14afabe80ada7eaf51852e9d57e8cede1b956f2331f5a233425c7d854242fd6240d015d569c8f664e8e1f7a68ad3d3387f51244bc42c0dc03b11ef6a4ba05efbf1f4a43b8208466f213e671964377d3136790253327a2e2bfc107a746d4f3ddef54e4ee4fd6d554eeedf364c"}, 0xf2) mount(&(0x7f0000000180)=ANY=[], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) 19:06:14 executing program 0: ioctl$VIDIOC_DQBUF(0xffffffffffffffff, 0xc0585611, &(0x7f0000000180)={0x0, 0x1, 0x4, 0x20000, 0x100, {}, {0x5, 0x2991187648b9bdac, 0x4, 0x2, 0x1, 0x7f, "4434260f"}, 0x9ad, 0x3e3f7aab5ad78cb1, @offset=0xfffffe01, 0xd8a}) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000180)=ANY=[], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) 19:06:14 executing program 2: mknod$loop(&(0x7f0000000080)='./file0\x00', 0xc000, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000180)=ANY=[], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x10a0, 0x0) [ 379.354561][T13103] ceph: No path or : separator in source 19:06:14 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000180)=ANY=[], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r1, 0x0, 0x70196c71, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000000)={0x0, 0x19, "12d522f52cab2676e43bfae5682dc411c0cdc36588be3c38a1"}, &(0x7f0000000040)=0x21) getsockopt$inet_sctp_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f0000000100)={r2, 0x5, 0x4, 0x6, 0x1, 0x1}, &(0x7f0000000180)=0x14) 19:06:14 executing program 0: ioctl$VIDIOC_DQBUF(0xffffffffffffffff, 0xc0585611, &(0x7f0000000180)={0x0, 0x1, 0x4, 0x20000, 0x100, {}, {0x5, 0x2991187648b9bdac, 0x4, 0x2, 0x1, 0x7f, "4434260f"}, 0x9ad, 0x3e3f7aab5ad78cb1, @offset=0xfffffe01, 0xd8a}) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000180)=ANY=[], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) [ 379.398093][T13111] ceph: Bad value for 'source' [ 379.411947][T13109] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. [ 379.422001][T13109] netlink: 2 bytes leftover after parsing attributes in process `syz-executor.4'. [ 379.557820][T13120] ceph: Bad value for 'source' [ 379.613076][T13137] ceph: No path or : separator in source 19:06:14 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) syz_open_dev$ptys(0xc, 0x3, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000180)=ANY=[], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) [ 379.686402][T13160] ceph: Bad value for 'source' 19:06:14 executing program 0: ioctl$VIDIOC_DQBUF(0xffffffffffffffff, 0xc0585611, &(0x7f0000000180)={0x0, 0x1, 0x4, 0x20000, 0x100, {}, {0x5, 0x2991187648b9bdac, 0x4, 0x2, 0x1, 0x7f, "4434260f"}, 0x9ad, 0x3e3f7aab5ad78cb1, @offset=0xfffffe01, 0xd8a}) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000180)=ANY=[], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) 19:06:14 executing program 0: ioctl$VIDIOC_DQBUF(0xffffffffffffffff, 0xc0585611, &(0x7f0000000180)={0x4, 0x0, 0x4, 0x20000, 0x100, {}, {0x5, 0x2991187648b9bdac, 0x4, 0x2, 0x1, 0x7f, "4434260f"}, 0x9ad, 0x3e3f7aab5ad78cb1, @offset=0xfffffe01, 0xd8a}) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000180)=ANY=[], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) [ 379.889914][T13210] ceph: Bad value for 'source' [ 379.923683][T13145] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. [ 379.933008][T13145] netlink: 2 bytes leftover after parsing attributes in process `syz-executor.4'. [ 380.009512][T13238] ceph: Bad value for 'source' 19:06:15 executing program 1: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000180)=ANY=[], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) 19:06:15 executing program 0: ioctl$VIDIOC_DQBUF(0xffffffffffffffff, 0xc0585611, &(0x7f0000000180)={0x4, 0x0, 0x4, 0x0, 0x100, {}, {0x5, 0x2991187648b9bdac, 0x4, 0x2, 0x1, 0x7f, "4434260f"}, 0x9ad, 0x3e3f7aab5ad78cb1, @offset=0xfffffe01, 0xd8a}) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000180)=ANY=[], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) [ 380.047065][T13244] ceph: No path or : separator in source [ 380.230080][T13250] ceph: No path or : separator in source [ 380.281670][T13253] ceph: Bad value for 'source' 19:06:15 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1000000, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x3ff, 0x70d001) mknodat(r1, 0x0, 0x2, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="5000000010003b0e00"/20, @ANYRES32=0x0, @ANYBLOB="000000010000000008000a00", @ANYRES32=0x6, @ANYBLOB="120012000c0001007665746800000000180002000a00010002000000", @ANYRES32=0x0, @ANYBLOB="b4dc4f73ba213795"], 0x50}}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) r4 = dup3(r2, r3, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = socket$inet6_sctp(0xa, 0x1, 0x84) r6 = socket$inet6_sctp(0xa, 0x5, 0x84) r7 = dup2(r6, r5) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f00000001c0)) r8 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r8, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r7, 0x84, 0x73, &(0x7f0000000000)={r9, 0x0, 0x10}, &(0x7f0000000080)=0x18) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, &(0x7f00000002c0)={r9, 0xc, "0c41f0ec61693d5a83effebd"}, &(0x7f0000000300)=0x14) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r4, 0x84, 0x75, &(0x7f0000000100)={r9, 0x1ff}, 0xfffffffffffffdba) r10 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200)='/dev/btrfs-control\x00', 0x222000, 0x0) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r10, 0x84, 0x1, &(0x7f0000000240)={0x0, 0x57, 0x8, 0x7, 0x8, 0x8}, 0x14) 19:06:15 executing program 2: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000180)=ANY=[@ANYBLOB="5b643a3a5d2c0b7d46552c3aec5cb2b2b289ea512541497e4156bfe0a99e0593dd0fbefc14d460ea5845ece88e98228885a6d3bed4dda286fcdfca5f2f00000000000000"], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) 19:06:15 executing program 0: ioctl$VIDIOC_DQBUF(0xffffffffffffffff, 0xc0585611, &(0x7f0000000180)={0x4, 0x0, 0x4, 0x0, 0x0, {}, {0x5, 0x2991187648b9bdac, 0x4, 0x2, 0x1, 0x7f, "4434260f"}, 0x9ad, 0x3e3f7aab5ad78cb1, @offset=0xfffffe01, 0xd8a}) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000180)=ANY=[], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) 19:06:15 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00') pause() sendmsg$TIPC_NL_MON_GET(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x801004}, 0xc, &(0x7f0000000100)={&(0x7f0000000740)=ANY=[@ANYBLOB="18020000", @ANYRES64, @ANYRESHEX], 0x3}, 0x1, 0x0, 0x0, 0x40c0000}, 0xa87aa890446eb478) write$FUSE_STATFS(0xffffffffffffffff, &(0x7f0000000180)={0x60, 0x0, 0x8, {{0x585, 0x9, 0x0, 0x1, 0x94, 0x3f, 0x4, 0x933}}}, 0x60) [ 380.359688][T13258] ceph: Bad value for 'source' 19:06:15 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') munlock(&(0x7f0000ffc000/0x2000)=nil, 0x2000) sendmsg$TIPC_NL_NAME_TABLE_GET(r1, &(0x7f00000003c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000380)={&(0x7f0000000200)={0x170, r2, 0x300, 0x70bd27, 0x25dfdbfc, {}, [@TIPC_NLA_LINK={0x10, 0x4, [@TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}]}, @TIPC_NLA_LINK={0x9c, 0x4, [@TIPC_NLA_LINK_PROP={0x34, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0xfffffffe}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x20}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xc}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xa373}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x13}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}]}, @TIPC_NLA_LINK_PROP={0x2c, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5cf279f2}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x11}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xffffffff}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7fff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x6}]}, @TIPC_NLA_LINK_PROP={0x14, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x200}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}]}, @TIPC_NLA_LINK_PROP={0x24, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1f}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x3}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}]}]}, @TIPC_NLA_LINK={0x88, 0x4, [@TIPC_NLA_LINK_PROP={0x24, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7fffffff}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x101}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}]}, @TIPC_NLA_LINK_PROP={0x54, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x4}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x2}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xb}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xfc5f}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xa40}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x80000001}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x20}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}]}, @TIPC_NLA_BEARER={0x1c, 0x1, [@TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x8001}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'ib', 0x3a, 'bond0\x00'}}]}, @TIPC_NLA_SOCK={0xc, 0x2, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0x1ff}]}]}, 0x170}, 0x1, 0x0, 0x0, 0x8000}, 0x40a0) newfstatat(0xffffffffffffff9c, &(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000180), 0x1800) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000180)=ANY=[], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) [ 380.410930][T13263] ceph: No path or : separator in source [ 380.427920][T13265] ceph: No path or : separator in source [ 380.506338][T13274] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. [ 380.516420][T13274] netlink: 2 bytes leftover after parsing attributes in process `syz-executor.4'. [ 380.587293][T13315] ceph: Bad value for 'source' 19:06:15 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00') pause() sendmsg$TIPC_NL_MON_GET(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x801004}, 0xc, &(0x7f0000000100)={&(0x7f0000000740)=ANY=[@ANYBLOB="18020000", @ANYRES64, @ANYRESHEX], 0x3}, 0x1, 0x0, 0x0, 0x40c0000}, 0xa87aa890446eb478) write$FUSE_STATFS(0xffffffffffffffff, &(0x7f0000000180)={0x60, 0x0, 0x8, {{0x585, 0x9, 0x0, 0x1, 0x94, 0x3f, 0x4, 0x933}}}, 0x60) 19:06:15 executing program 0: ioctl$VIDIOC_DQBUF(0xffffffffffffffff, 0xc0585611, &(0x7f0000000180)={0x4, 0x0, 0x4, 0x0, 0x0, {}, {0x5, 0x2991187648b9bdac, 0x4, 0x2, 0x1, 0x7f, "4434260f"}, 0x9ad, 0x3e3f7aab5ad78cb1, @offset=0xfffffe01, 0xd8a}) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000180)=ANY=[], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) 19:06:15 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pause() sendmsg$TIPC_NL_MON_GET(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x801004}, 0xc, &(0x7f0000000100)={&(0x7f0000000740)=ANY=[@ANYBLOB="18020000", @ANYRES64, @ANYRESHEX], 0x3}, 0x1, 0x0, 0x0, 0x40c0000}, 0xa87aa890446eb478) write$FUSE_STATFS(0xffffffffffffffff, &(0x7f0000000180)={0x60, 0x0, 0x8, {{0x585, 0x9, 0x0, 0x1, 0x94, 0x3f, 0x4, 0x933}}}, 0x60) [ 380.810597][T13352] ceph: No path or : separator in source 19:06:15 executing program 0: ioctl$VIDIOC_DQBUF(0xffffffffffffffff, 0xc0585611, &(0x7f0000000180)={0x4, 0x0, 0x4, 0x0, 0x0, {}, {0x0, 0x2991187648b9bdac, 0x4, 0x2, 0x1, 0x7f, "4434260f"}, 0x9ad, 0x3e3f7aab5ad78cb1, @offset=0xfffffe01, 0xd8a}) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000180)=ANY=[], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) 19:06:15 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000180)=ANY=[], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap$usbfs(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x10010, r1, 0x3) write$UHID_GET_REPORT_REPLY(r1, &(0x7f0000000000)={0xa, {0x6, 0x8, 0x2}}, 0xa) 19:06:15 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) pause() sendmsg$TIPC_NL_MON_GET(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x801004}, 0xc, &(0x7f0000000100)={&(0x7f0000000740)=ANY=[@ANYBLOB="18020000", @ANYRES64, @ANYRESHEX], 0x3}, 0x1, 0x0, 0x0, 0x40c0000}, 0xa87aa890446eb478) write$FUSE_STATFS(0xffffffffffffffff, &(0x7f0000000180)={0x60, 0x0, 0x8, {{0x585, 0x9, 0x0, 0x1, 0x94, 0x3f, 0x4, 0x933}}}, 0x60) 19:06:16 executing program 0: ioctl$VIDIOC_DQBUF(0xffffffffffffffff, 0xc0585611, &(0x7f0000000180)={0x4, 0x0, 0x4, 0x0, 0x0, {}, {0x0, 0x2991187648b9bdac, 0x4, 0x2, 0x1, 0x7f, "4434260f"}, 0x9ad, 0x3e3f7aab5ad78cb1, @offset=0xfffffe01, 0xd8a}) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000180)=ANY=[], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) [ 381.010934][T13396] ceph: No path or : separator in source [ 381.070693][T13400] ceph: Bad value for 'source' 19:06:16 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1000000, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x3ff, 0x70d001) mknodat(r1, 0x0, 0x2, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="5000000010003b0e00"/20, @ANYRES32=0x0, @ANYBLOB="000000010000000008000a00", @ANYRES32=0x6, @ANYBLOB="120012000c0001007665746800000000180002000a00010002000000", @ANYRES32=0x0, @ANYBLOB="b4dc4f73ba213795"], 0x50}}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) r4 = dup3(r2, r3, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = socket$inet6_sctp(0xa, 0x1, 0x84) r6 = socket$inet6_sctp(0xa, 0x5, 0x84) r7 = dup2(r6, r5) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f00000001c0)) r8 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r8, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r7, 0x84, 0x73, &(0x7f0000000000)={r9, 0x0, 0x10}, &(0x7f0000000080)=0x18) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, &(0x7f00000002c0)={r9, 0xc, "0c41f0ec61693d5a83effebd"}, &(0x7f0000000300)=0x14) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r4, 0x84, 0x75, &(0x7f0000000100)={r9, 0x1ff}, 0xfffffffffffffdba) r10 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200)='/dev/btrfs-control\x00', 0x222000, 0x0) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r10, 0x84, 0x1, &(0x7f0000000240)={0x0, 0x57, 0x8, 0x7, 0x8, 0x8}, 0x14) 19:06:16 executing program 2: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000200)='/dev/bsg\x00', 0x800, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in=@multicast1, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in=@multicast2}}, &(0x7f0000000340)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000014c0)={0x0, 0x0, 0x0}, 0x0) semctl$IPC_SET(0x0, 0x0, 0x1, &(0x7f0000002380)={{0x0, 0x0, r2, 0xffffffffffffffff}}) mount$fuseblk(&(0x7f0000000000)='/dev/loop0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='fuseblk\x00', 0x800, &(0x7f0000000380)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[], [{@func={'func', 0x3d, 'FILE_CHECK'}}]}}) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sigaltstack(&(0x7f0000ffa000/0x4000)=nil, &(0x7f0000000440)) mount(&(0x7f0000000180)=ANY=[@ANYBLOB="5b643a3a5d2c0b7d46552c3aec5cb2b2b289ea512541497e4156bf0173baa993dd0fbefc14d460ea5845ece88e98228885a6c428eab00e4cc3d3bed4dda286fcdfca5f2f"], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='v7\x00', 0x20, 0x0) [ 381.123726][T13399] cgroup: fork rejected by pids controller in /syz1 19:06:16 executing program 0: ioctl$VIDIOC_DQBUF(0xffffffffffffffff, 0xc0585611, &(0x7f0000000180)={0x4, 0x0, 0x4, 0x0, 0x0, {}, {0x0, 0x0, 0x4, 0x2, 0x1, 0x7f, "4434260f"}, 0x9ad, 0x3e3f7aab5ad78cb1, @offset=0xfffffe01, 0xd8a}) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000180)=ANY=[], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) [ 381.168961][T13406] ceph: No path or : separator in source [ 381.251177][T13427] fuseblk: Unknown parameter 'func' [ 381.331772][T13440] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. [ 381.342414][T13440] netlink: 2 bytes leftover after parsing attributes in process `syz-executor.4'. 19:06:16 executing program 0: ioctl$VIDIOC_DQBUF(0xffffffffffffffff, 0xc0585611, &(0x7f0000000180)={0x4, 0x0, 0x4, 0x0, 0x0, {}, {0x0, 0x0, 0x0, 0x2, 0x1, 0x7f, "4434260f"}, 0x9ad, 0x3e3f7aab5ad78cb1, @offset=0xfffffe01, 0xd8a}) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000180)=ANY=[], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) [ 381.431039][T13525] ceph: No path or : separator in source 19:06:16 executing program 0: ioctl$VIDIOC_DQBUF(0xffffffffffffffff, 0xc0585611, &(0x7f0000000180)={0x4, 0x0, 0x4, 0x0, 0x0, {}, {0x0, 0x0, 0x0, 0x0, 0x1, 0x7f, "4434260f"}, 0x9ad, 0x3e3f7aab5ad78cb1, @offset=0xfffffe01, 0xd8a}) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000180)=ANY=[], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) [ 381.551273][T13568] ceph: No path or : separator in source 19:06:16 executing program 2: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000180)=ANY=[@ANYBLOB="5b643a3a5d2c0b7d46552c3aec5cb2b2b289ea512541497e4156bfe0a99e0593dd0fbefc14d460ea5845ece88e98228885a6c428eab00e4cc3d3bed4dda286fcdfca5f2f"], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$PPPIOCSMAXCID(r3, 0x40047451, &(0x7f0000000000)=0x800) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$NS_GET_NSTYPE(r1, 0xb703, 0x0) [ 381.789944][T13625] ceph: No path or : separator in source 19:06:16 executing program 0: ioctl$VIDIOC_DQBUF(0xffffffffffffffff, 0xc0585611, &(0x7f0000000180)={0x4, 0x0, 0x4, 0x0, 0x0, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, "4434260f"}, 0x9ad, 0x3e3f7aab5ad78cb1, @offset=0xfffffe01, 0xd8a}) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000180)=ANY=[], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) 19:06:16 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='erofs\x00', 0x420, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f0000000040)='SEG6\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r0, &(0x7f0000000040)=ANY=[], 0xfe22) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = dup2(r0, r2) r4 = syz_open_procfs(0x0, &(0x7f0000000100)='setgroups\x00') close(r4) r5 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_EVENTS(r5, 0x84, 0xb, &(0x7f0000000040)={0x0, 0x3, 0x40}, 0x296) shutdown(r5, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r5, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x10, &(0x7f00000002c0)=[@in={0x2, 0x0, @local}]}, &(0x7f0000000180)=0x10) r6 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r6, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r5, 0x84, 0x72, &(0x7f0000000080)={r7}, 0xc) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r4, 0x84, 0x77, &(0x7f0000000000)={r7, 0x1000, 0x5, [0x7, 0x0, 0x800, 0x200, 0xfdd1]}, &(0x7f0000000180)=0x12) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r3, 0x84, 0x73, &(0x7f00000027c0)={r7, 0x4, 0x30, 0x0, 0x9}, &(0x7f0000002800)=0x18) 19:06:17 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000200)=ANY=[@ANYBLOB="7261770000000000000000000000000000000000000000000000000000000000020000000300000080020000000000002801000028e8010000e8010000e8010000e8010000e801000003000000000000000000000000000000ac141400000000000000000069726c616e30000000000000000000007665746830000000000000000000000000000000000000000000000000000000000000000000000000000000000000002100000000000000c0002801000000000000000000000000000000000000000050006d756c7469706f72740000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000068004354000000000000000000000000000000000000000000000000000000020000000000000000000000007070747000000000000000000000000073797a3000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009800c00000000000000000020000000000000000000000002800727066696c74657200000000000000000000000000000000000000000000000000000000000028005443504d53530000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000004feffffff00"/736], 0x2e0) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x480a02, 0x0) getsockopt$EBT_SO_GET_INIT_ENTRIES(r1, 0x0, 0x83, &(0x7f0000000140)={'nat\x00', 0x0, 0x3, 0x44, [], 0x1, &(0x7f0000000080)=[{}], &(0x7f00000000c0)=""/68}, &(0x7f00000001c0)=0x78) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e21, 0x6, @mcast1, 0x679}, 0x1c) 19:06:17 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) pause() sendmsg$TIPC_NL_MON_GET(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x801004}, 0xc, &(0x7f0000000100)={&(0x7f0000000740)=ANY=[@ANYBLOB="18020000", @ANYRES64, @ANYRESHEX], 0x3}, 0x1, 0x0, 0x0, 0x40c0000}, 0xa87aa890446eb478) write$FUSE_STATFS(0xffffffffffffffff, &(0x7f0000000180)={0x60, 0x0, 0x8, {{0x585, 0x9, 0x0, 0x1, 0x94, 0x3f, 0x4, 0x933}}}, 0x60) 19:06:17 executing program 0: ioctl$VIDIOC_DQBUF(0xffffffffffffffff, 0xc0585611, &(0x7f0000000180)={0x4, 0x0, 0x4, 0x0, 0x0, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "4434260f"}, 0x9ad, 0x3e3f7aab5ad78cb1, @offset=0xfffffe01, 0xd8a}) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000180)=ANY=[], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) [ 382.039436][T13635] ceph: No path or : separator in source [ 382.051313][T13637] ceph: No path or : separator in source 19:06:17 executing program 4: clone(0x2280000, 0x0, 0x0, 0x0, &(0x7f0000000040)='\x00') 19:06:17 executing program 0: ioctl$VIDIOC_DQBUF(0xffffffffffffffff, 0xc0585611, &(0x7f0000000180)={0x4, 0x0, 0x4, 0x0, 0x0, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "4434260f"}, 0x0, 0x3e3f7aab5ad78cb1, @offset=0xfffffe01, 0xd8a}) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000180)=ANY=[], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) [ 382.261576][T13715] ceph: No path or : separator in source 19:06:17 executing program 0: ioctl$VIDIOC_DQBUF(0xffffffffffffffff, 0xc0585611, &(0x7f0000000180)={0x4, 0x0, 0x4, 0x0, 0x0, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "4434260f"}, 0x0, 0x0, @offset=0xfffffe01, 0xd8a}) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000180)=ANY=[], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) [ 382.466482][T13854] ceph: No path or : separator in source 19:06:17 executing program 2: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=ANY=[@ANYBLOB="5b643a3a0100010046552c3aec5cb2b2b289ea512541497e4156bfe0a99e0593dd0fbefc14d460ea5845ece88e98228885a6c428eab00e4cc3d3bed4dda286fcdfca5f2f18809ac94d499f0c7333a4162fff13c9f99d842dc9a357e24643c05cfa3eb67b285cde843d5a3b0bb1ef17be88febc43fe0fefd95e3fc8e0aee7"], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) 19:06:17 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r2, 0x0, r3, 0x0, 0x70196c71, 0x0) ioctl$TIOCPKT(r3, 0x5420, &(0x7f0000000100)=0xf9d) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) fspick(r1, &(0x7f0000000040)='./file0\x00', 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000180)=ANY=[], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$TIOCL_GETMOUSEREPORTING(r5, 0x541c, &(0x7f0000000000)) 19:06:17 executing program 0: ioctl$VIDIOC_DQBUF(0xffffffffffffffff, 0xc0585611, &(0x7f0000000180)={0x4, 0x0, 0x4, 0x0, 0x0, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "4434260f"}, 0x0, 0x0, @offset=0xfffffe01, 0xd8a}) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000180)=ANY=[], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) [ 382.689767][T13865] ceph: No path or : separator in source 19:06:17 executing program 0: ioctl$VIDIOC_DQBUF(0xffffffffffffffff, 0xc0585611, &(0x7f0000000180)={0x4, 0x0, 0x4, 0x0, 0x0, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "4434260f"}, 0x0, 0x0, @offset, 0xd8a}) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000180)=ANY=[], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) [ 382.848825][T13873] ceph: No path or : separator in source [ 382.859964][T13875] ceph: No path or : separator in source 19:06:17 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000300)='/dev/sg#\x00', 0x0, 0x2) write$binfmt_script(r0, &(0x7f0000000640)=ANY=[@ANYBLOB="2321202e2f66696c65300ad1266d12e95afed85a1bf38a2f1b4ba88686b1d7eefe93e8a0dc000000000000000000"], 0x2e) ioctl$SG_IO(r0, 0x2285, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="2321202e2f66697371cb6939730200696e75787d6c3177ee76440ad2dedc6f5c20026465762f61646900000000000000"], 0x30) write$binfmt_script(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="2321202e2f66696c65300ab8d958259b7169b2d643c65434fc53e2538fbfd5866cd9cf2f180b8b4d8ded"], 0x2a) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) write$binfmt_script(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="2321202e2f66696c65300ab74a7cc56f53a36d8e2de5b52cea6d5cb6d88b46abd07b533304f2ab780c44"], 0x2a) write(r0, &(0x7f00000001c0)="18b6e6aa8e22d2497e8d6ca1773a174b23785455e78f082dec8e0d1ee53de1ef71aaeea2ac2b06a75701491066bb2b0f", 0x30) write$binfmt_script(r0, &(0x7f0000000680)=ANY=[@ANYBLOB="2321202e2f66696c65300ab265136b93f120327c104d4bee521ccf9dae655fd47f412b6da5a1d40c356bf59f61455fbc"], 0x30) write$binfmt_script(r0, &(0x7f0000000740)={'#! ', './file0', [], 0xa, "0f54a34e53949d1b82edd34e25814f2d5a1f1e9210026a8332bbedfd6552b621673248bba4"}, 0x30) write$binfmt_elf64(r0, &(0x7f00000006c0)={{0x7f, 0x45, 0x4c, 0x46, 0xff, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x1, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x9}]}, 0x78) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$binfmt_elf32(r0, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x27d) socket$isdn_base(0x22, 0x3, 0x0) [ 382.900181][T13876] ceph: Bad value for 'source' 19:06:18 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) pause() sendmsg$TIPC_NL_MON_GET(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x801004}, 0xc, &(0x7f0000000100)={&(0x7f0000000740)=ANY=[@ANYBLOB="18020000", @ANYRES64, @ANYRESHEX], 0x3}, 0x1, 0x0, 0x0, 0x40c0000}, 0xa87aa890446eb478) write$FUSE_STATFS(0xffffffffffffffff, &(0x7f0000000180)={0x60, 0x0, 0x8, {{0x585, 0x9, 0x0, 0x1, 0x94, 0x3f, 0x4, 0x933}}}, 0x60) [ 383.066004][T13931] ceph: No path or : separator in source [ 383.086252][T13930] sg_write: data in/out 219/78 bytes for SCSI command 0x0-- guessing data in; [ 383.086252][T13930] program syz-executor.4 not setting count and/or reply_len properly 19:06:18 executing program 0: ioctl$VIDIOC_DQBUF(0xffffffffffffffff, 0xc0585611, &(0x7f0000000180)={0x4, 0x0, 0x4, 0x0, 0x0, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "4434260f"}, 0x0, 0x0, @offset, 0xd8a}) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000180)=ANY=[], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) 19:06:18 executing program 2: r0 = creat(&(0x7f0000000000)='./file0\x00', 0xc4) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000040)) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000180)=ANY=[@ANYBLOB="5b643a3a5d2c0b7d46552c3aec5cb2b2b289ea512541497e4156bfe0a99e0593dd0fbefc14d460ea5845ece88e98228885a6c428eab00e4cc3d3bed4dda286fcdfca5f2f"], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) 19:06:18 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(cipher_null)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x10000080800) sendto$unix(r1, &(0x7f0000000140), 0x14ded905162a6a4b, 0x0, 0x0, 0x429) recvfrom(r1, &(0x7f0000001240)=""/4096, 0xffffff7e, 0x0, 0x0, 0x0) 19:06:18 executing program 0: ioctl$VIDIOC_DQBUF(0xffffffffffffffff, 0xc0585611, &(0x7f0000000180)={0x4, 0x0, 0x4, 0x0, 0x0, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "4434260f"}, 0x0, 0x0, @offset, 0xd8a}) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000180)=ANY=[], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) [ 383.318009][T13994] ceph: No path or : separator in source 19:06:18 executing program 0: ioctl$VIDIOC_DQBUF(0xffffffffffffffff, 0xc0585611, &(0x7f0000000180)={0x4, 0x0, 0x4, 0x0, 0x0, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "4434260f"}}) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000180)=ANY=[], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) [ 383.506271][T14002] ceph: No path or : separator in source [ 383.513960][T14006] ceph: No path or : separator in source [ 383.581289][T13876] ceph: Bad value for 'source' 19:06:18 executing program 4: semop(0x0, &(0x7f0000000100), 0x2d) semtimedop(0x0, &(0x7f0000000000)=[{0x1}], 0x1, 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/nullb0\x00', 0x40300, 0x0) io_setup(0x4, &(0x7f0000000080)=0x0) pread64(r0, &(0x7f0000000180)=""/224, 0xe0, 0x0) io_submit(r1, 0x2000000000000246, &(0x7f0000001540)=[&(0x7f0000000140)={0x40000031, 0x2759, 0xd, 0x0, 0x0, r0, &(0x7f0000000000), 0xfffffce4}]) 19:06:18 executing program 0: ioctl$VIDIOC_DQBUF(0xffffffffffffffff, 0xc0585611, &(0x7f0000000180)={0x4, 0x0, 0x4, 0x0, 0x0, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "4434260f"}}) mknod$loop(0x0, 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000180)=ANY=[], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) [ 383.657922][T14064] ceph: No path or : separator in source 19:06:19 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000000180)=ANY=[], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x60001, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, &(0x7f0000000240)={@sco={0x1f, {0x1f, 0x3f, 0x31, 0x20, 0x81, 0xfe}}, {&(0x7f0000000180)=""/170, 0xaa}, &(0x7f0000000040), 0x22}, 0xa0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_SET_IRQCHIP(r2, 0x8208ae63, &(0x7f0000000300)={0x1, 0x0, @ioapic={0x3000, 0x5, 0x2, 0x0, 0x0, [{0x85, 0x0, 0x6, [], 0x14}, {0x40, 0x8, 0x7, [], 0x1}, {0x1f, 0x81, 0x8, [], 0x40}, {0x40, 0x38, 0x1, [], 0x7}, {0x20, 0x4, 0x1, [], 0xc9}, {0x6, 0x7, 0x9, [], 0x1}, {0x7, 0xf8, 0x3, [], 0x5}, {0x2, 0x2a, 0x33, [], 0x2}, {0x4, 0x3, 0x4}, {0x93, 0x6, 0xe1}, {0x0, 0x5, 0x7f, [], 0x6}, {0x7f, 0x80, 0x1, [], 0xff}, {0x6, 0x1, 0xc0, [], 0x1}, {0x80, 0xe4, 0x1, [], 0x1}, {0xdb, 0x80, 0x5, [], 0x6}, {0x6, 0x4, 0x2, [], 0x4}, {0x1f, 0x0, 0xc0, [], 0x1}, {0x9, 0x2, 0x0, [], 0x40}, {0x0, 0xf7, 0x4, [], 0x8}, {0x5, 0x7f, 0xd6, [], 0x4}, {0x9a, 0x5f, 0x4, [], 0x3f}, {0x8, 0x5, 0xf0, [], 0x2e}, {0x4, 0xb0, 0x9, [], 0x3a}, {0x4, 0x9, 0x0, [], 0x40}]}}) 19:06:19 executing program 0: ioctl$VIDIOC_DQBUF(0xffffffffffffffff, 0xc0585611, &(0x7f0000000180)={0x4, 0x0, 0x4, 0x0, 0x0, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "4434260f"}}) mknod$loop(0x0, 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000180)=ANY=[], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) 19:06:19 executing program 2: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000180)=ANY=[@ANYBLOB="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"/265], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) 19:06:19 executing program 0: ioctl$VIDIOC_DQBUF(0xffffffffffffffff, 0xc0585611, &(0x7f0000000180)={0x4, 0x0, 0x4, 0x0, 0x0, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "4434260f"}}) mknod$loop(0x0, 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000180)=ANY=[], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) 19:06:19 executing program 3: clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pause() sendmsg$TIPC_NL_MON_GET(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x801004}, 0xc, &(0x7f0000000100)={&(0x7f0000000740)=ANY=[@ANYBLOB="18020000", @ANYRES64, @ANYRESHEX], 0x3}, 0x1, 0x0, 0x0, 0x40c0000}, 0xa87aa890446eb478) write$FUSE_STATFS(0xffffffffffffffff, &(0x7f0000000180)={0x60, 0x0, 0x8, {{0x585, 0x9, 0x0, 0x1, 0x94, 0x3f, 0x4, 0x933}}}, 0x60) 19:06:19 executing program 4: mount(0x0, 0x0, 0x0, 0x80000, 0x0) unshare(0x200) r0 = syz_open_procfs$namespace(0x0, &(0x7f00000005c0)='ns/mnt\x00\x16p\x88\xd2\xc6\x80\xbf7\x04k\xa8\x92\xa6\xf5\r7N#\f\x01\xdb\xea\x12\xb8\x8f\x81\xf9K\xea3\xf8b\xd9\x10\x9alz\x81^\x1ed%tji6\xefV\x8e\x1f \xa8\xab\x1e\x10\x1bb\xab\xdb\x84\xe0dw\xeb\xfb\xc0\xd4U\xc2)\xb6\xa7$\x1c\x88\x17\x8a{{\x9e;\xb4\xa0k\xce\xa5\x1ep\xf5\x01\xc9\xc9\xed 0>/vi\x1d\xc9\x98\'\xd3pk7\xb12\x1d)\xe7@\x1b~z\xf7\xe1f\xf2*E\x12\xa1\x0f\xf3\xe6\xd9^C\xf9\xbe=U\xf1hpX\xc8\xa1\xca\x99\x947v\x04\xe6\x18i*\x02O<&\x9d\x01\xaf\x04{\x06\xf6\xba\xbbGU\xf2\x00\x97\'\xef\xac ^\x84\xc35\t\x8e\xb8\xdf\x01\x00\x00\x00\x00\x00\x00\x00\xa3\x83\x1a\n_\x81\xce\x06\x93\xc6r$O\x99\x94OM\x01z6{\xf2<6\xa3\xbce\xd8\xb3U\xb8\xc69\xa28\xa6zD\xa6C\x11\xf6D\xac\xb9\x9cV\xc5n\x9a\xbc\x84I~3\x9a\xf1\x14\x87\x19\bJ\xe6\xf4\xb9_\xb3Z\xa0w\xe5\x97K\x97\x88\xc0\']\xab&\xb6\xc2\v\xaf\x06\xa8\xff\x02\x98o+\xb5\xe0\xc9L,\xfe/\x05(\xc4\x9f\x14f\xc8\x12\x9e\xa7\x06E\xea\xdc\xf2\x91jKVC\xe4\xed\x11\x933\xf1\r\xbf?Q\x14\xa1\xb3\x1b\xb6\xfb}\xe7s6+\xa4\x1e\xf8\xfb\x8e\xa1\xd6P\x03l\xb3\xe6\x03\xfa\x14\xca\xfej6T\xe7P') setns(r0, 0x0) socket(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r1, 0x0, r2, 0x0, 0x70196c71, 0x0) accept4$vsock_stream(r2, &(0x7f00000000c0)={0x28, 0x0, 0x0, @host}, 0x10, 0x80000) r3 = syz_open_procfs(0x0, &(0x7f0000000100)='fdinfo/3\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r4, 0x0, r5, 0x0, 0x70196c71, 0x0) sendfile(r4, r3, 0x0, 0x3) openat$cgroup_ro(r3, &(0x7f0000000040)='cpuset.effective_mems\x00', 0x0, 0x0) ioctl$VT_SETMODE(r3, 0x5602, &(0x7f0000000000)={0x6, 0x0, 0xd5f, 0x0, 0x1f}) perf_event_open(&(0x7f000001d000)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$netlink(0xffffffffffffffff, &(0x7f0000000080), 0xc) clone(0x78424100, 0x0, 0x0, 0x0, 0x0) [ 384.147691][T14232] ceph: Bad value for 'source' [ 384.151987][T14229] ceph: No path or : separator in source [ 384.185875][T14232] ceph: Bad value for 'source' 19:06:19 executing program 3: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pause() sendmsg$TIPC_NL_MON_GET(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x801004}, 0xc, &(0x7f0000000100)={&(0x7f0000000740)=ANY=[@ANYBLOB="18020000", @ANYRES64, @ANYRESHEX], 0x3}, 0x1, 0x0, 0x0, 0x40c0000}, 0xa87aa890446eb478) write$FUSE_STATFS(0xffffffffffffffff, &(0x7f0000000180)={0x60, 0x0, 0x8, {{0x585, 0x9, 0x0, 0x1, 0x94, 0x3f, 0x4, 0x933}}}, 0x60) 19:06:19 executing program 0: ioctl$VIDIOC_DQBUF(0xffffffffffffffff, 0xc0585611, &(0x7f0000000180)={0x4, 0x0, 0x4, 0x0, 0x0, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "4434260f"}}) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000180)=ANY=[], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) 19:06:19 executing program 2: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000180)=ANY=[@ANYBLOB="5b643a3a5d348ee92c0b7d46552c3aec5cb2b2b289ea512541497e4156bfe0a99e0593dd0fbefc14d460ea5845ece88e98228885a6c428eab00e4cc3d3bed4dda286fcdf"], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) 19:06:19 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) pipe(&(0x7f00000001c0)) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r4, 0x0, r5, 0x0, 0x70196c71, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r6, 0x0, r7, 0x0, 0x70196c71, 0x0) r8 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r8, 0x0, r8) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r9, 0x0, r9) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r10, 0x0, r11, 0x0, 0x70196c71, 0x0) mount(&(0x7f0000000200)=ANY=[@ANYRES16, @ANYPTR=&(0x7f0000000340)=ANY=[@ANYPTR64=&(0x7f0000000040)=ANY=[@ANYRESOCT, @ANYRES32=r1, @ANYRES16], @ANYRESHEX=r10, @ANYPTR, @ANYRESDEC=r9, @ANYPTR=&(0x7f0000000100)=ANY=[@ANYRESOCT, @ANYRES64=0x0, @ANYRESDEC=r8, @ANYPTR64], @ANYRESHEX=r4, @ANYRESDEC=r6, @ANYPTR, @ANYRES64]], &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0xe0c0ddbf113ccc41, 0x0) [ 384.639990][T14455] ceph: No path or : separator in source [ 384.763035][T14460] ceph: No path or : separator in source 19:06:19 executing program 0: ioctl$VIDIOC_DQBUF(0xffffffffffffffff, 0xc0585611, &(0x7f0000000180)={0x4, 0x0, 0x4, 0x0, 0x0, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "4434260f"}}) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000180)=ANY=[], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) [ 385.047622][T14661] ceph: No path or : separator in source 19:06:20 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000180)=ANY=[], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x4f9411f5274d87, 0x0) 19:06:20 executing program 0: ioctl$VIDIOC_DQBUF(0xffffffffffffffff, 0xc0585611, &(0x7f0000000180)={0x4, 0x0, 0x4, 0x0, 0x0, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "4434260f"}}) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000180)=ANY=[], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) 19:06:20 executing program 4: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2a, &(0x7f00000003c0)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0x108) r1 = socket(0xa, 0x0, 0xff) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000080)={0x1, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) setsockopt$inet6_group_source_req(r1, 0x29, 0x2f, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) close(r0) 19:06:20 executing program 2: clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000180)=ANY=[@ANYBLOB="5b643a3a5d2c0b7d46552c3aec5cb2b2b289ea512541497e4156bfe0a99e0593dd0fbefc14d460ea5845ece88e98228885a6c428eab00e4cc3d3bed4dda286fcdfca5f2f"], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$KDSETMODE(r1, 0x4b3a, 0x1) 19:06:20 executing program 3: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pause() sendmsg$TIPC_NL_MON_GET(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x801004}, 0xc, &(0x7f0000000100)={&(0x7f0000000740)=ANY=[@ANYBLOB="18020000", @ANYRES64, @ANYRESHEX], 0x3}, 0x1, 0x0, 0x0, 0x40c0000}, 0xa87aa890446eb478) write$FUSE_STATFS(0xffffffffffffffff, &(0x7f0000000180)={0x60, 0x0, 0x8, {{0x585, 0x9, 0x0, 0x1, 0x94, 0x3f, 0x4, 0x933}}}, 0x60) [ 385.425551][T14673] cgroup: fork rejected by pids controller in /syz0 19:06:20 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r2, 0x0, r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r3, 0x0, r3) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r4, 0x0, r5, 0x0, 0x70196c71, 0x0) mount(&(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f0000000180)=ANY=[@ANYRES64=r1, @ANYBLOB="138b063572f3df297dbf96bd5c83a2e118e4126d85a6481235e0b1dc27ff0450c8e5725cf9626ef33537fbc420cd327a64062c035b31c9ebbb19a7d7a1cea49892395cd23ca9c4fb8edc1937441ec84946ec2c0d87fb5584595ece121473d27038393997f043e52a06d71e02c926f0ae2e5fd3696fcbeafa18a5f121663f7b1553231b07d53d735fba4feb8f2625c296dd314237e4ea16cdd34d8ddc3f207b36dd477a9e037ab6"], @ANYBLOB="4b48a20f0860096c758e2d9364587443daf895da55ee1fc41ebe0bba7556c299edac7989c3f9ddb0", @ANYPTR=&(0x7f0000000100)=ANY=[@ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESDEC, @ANYRES64=r2, @ANYPTR, @ANYRESOCT=0x0, @ANYRESDEC], @ANYRES64, @ANYRESOCT=r3], @ANYRES16, @ANYPTR], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) r6 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x440, 0x0) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(r6, 0x80045301, &(0x7f0000000040)) 19:06:20 executing program 2: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000180)=ANY=[@ANYBLOB="5b643a3a5d2c0b7d46552c3aec5cb2b2b289ea512541497e4156bfe0a99e0593dd0fbefc14d460ea5845ece88e98228885a6c428eab00e4cc3d3bed4dda286fcdfca5f2f"], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$VIDIOC_G_SELECTION(r1, 0xc040565e, &(0x7f0000000000)={0x7, 0x1, 0x2, {0x9, 0x20, 0x1b01, 0x5}}) 19:06:20 executing program 4: write(0xffffffffffffffff, &(0x7f0000000040)="260e1711927fe8e2f3e83e6299", 0x1df) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$BLKFLSBUF(r1, 0x1261, &(0x7f0000000080)=0x34) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r2, 0x0, r3, 0x0, 0x70196c71, 0x0) ioctl$void(r2, 0x1e1a0724999128ad) 19:06:20 executing program 0: ioctl$VIDIOC_DQBUF(0xffffffffffffffff, 0xc0585611, &(0x7f0000000180)={0x4, 0x0, 0x4, 0x0, 0x0, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "4434260f"}}) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) [ 386.032979][T15009] ceph: No path or : separator in source 19:06:21 executing program 0: ioctl$VIDIOC_DQBUF(0xffffffffffffffff, 0xc0585611, &(0x7f0000000180)={0x4, 0x0, 0x4, 0x0, 0x0, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "4434260f"}}) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) 19:06:21 executing program 5: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x48301, 0x0) ioctl$VHOST_SET_VRING_BUSYLOOP_TIMEOUT(r0, 0x4008af23, &(0x7f0000000040)) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000080)='/dev/cachefiles\x00', 0x680000, 0x0) ioctl$TIOCSRS485(r1, 0x542f, &(0x7f00000000c0)={0x7ff, 0x1, 0x9}) socket$pppoe(0x18, 0x1, 0x0) r2 = syz_open_dev$video4linux(&(0x7f0000000100)='/dev/v4l-subdev#\x00', 0x1, 0xa0) ioctl$VIDIOC_G_STD(r2, 0x80085617, &(0x7f0000000140)) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x581c81, 0x0) ioctl$KDFONTOP_GET(r3, 0x4b72, &(0x7f00000005c0)={0x1, 0x1, 0xa, 0x8, 0x56, &(0x7f00000001c0)}) open$dir(&(0x7f0000000600)='./file0\x00', 0x0, 0x10) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000640)='cpuacct.usage_percpu\x00', 0x0, 0x0) setsockopt$ALG_SET_AEAD_AUTHSIZE(r4, 0x117, 0x5, 0x0, 0xfff) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000680)='cpuset.effective_mems\x00', 0x0, 0x0) ioctl$KVM_SET_TSC_KHZ(r5, 0xaea2, 0x0) getsockopt$TIPC_SRC_DROPPABLE(r1, 0x10f, 0x80, &(0x7f00000006c0), &(0x7f0000000700)=0x4) r6 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000740)='/proc/capi/capi20ncci\x00', 0x40, 0x0) ioctl$USBDEVFS_RELEASEINTERFACE(r6, 0x80045510, &(0x7f0000000780)=0x1) r7 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/vcsa\x00', 0x2, 0x0) connect$pppoe(r7, &(0x7f0000000800)={0x18, 0x0, {0x1, @local, 'rose0\x00'}}, 0x1e) ioctl$sock_inet_tcp_SIOCATMARK(r3, 0x8905, &(0x7f0000000840)) r8 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000880)='/dev/dri/renderD128\x00', 0x40, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f00000008c0)={0x7fff, 0x0, 0x1}) ioctl$DRM_IOCTL_SG_FREE(r8, 0x40106439, &(0x7f0000000900)={0xc000000000000000, r9}) r10 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000940)='/dev/vsock\x00', 0x40, 0x0) setsockopt$CAIFSO_LINK_SELECT(r10, 0x116, 0x7f, &(0x7f0000000980)=0x7fff, 0x4) ioctl$CAPI_SET_FLAGS(0xffffffffffffffff, 0x80044324, &(0x7f00000009c0)) r11 = accept4$inet(0xffffffffffffffff, &(0x7f0000000a00)={0x2, 0x0, @multicast1}, &(0x7f0000000a40)=0x10, 0x96ba9e3e4547fc4f) ftruncate(r11, 0x6) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000a80)={0xfffffffa, 0x1f}, 0xc) ioctl$VIDIOC_G_EXT_CTRLS(r0, 0xc0205647, &(0x7f0000000b40)={0x980000, 0x972, 0xdd7, r7, 0x0, &(0x7f0000000b00)={0x990903, 0x4, [], @string=&(0x7f0000000ac0)=0x8}}) fsconfig$FSCONFIG_SET_FD(r12, 0x5, &(0x7f0000000b80)='/proc/capi/capi20ncci\x00', 0x0, 0xffffffffffffffff) 19:06:21 executing program 2: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000180)=ANY=[@ANYBLOB="5d2c0b7d46552c3aec5cb2b2b289ea512541497e4156bfe0a99e0593dd0fbe0000000000000006e88e98228885a6c428eab00e4cc3d3bed4dda286fcdfca5f2f00000000"], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) 19:06:21 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000180)={{{@in6=@loopback, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in6=@loopback}}, &(0x7f0000000100)=0xe8) setxattr$security_capability(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000040)='security.capability\x00', &(0x7f0000000280)=@v3={0x3000000, [{0x401, 0x80000000}, {0x5, 0x4}], r0}, 0x18, 0x1) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/snapshot\x00', 0x94000, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vcsa\x00', 0x20000, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) getsockopt$inet_sctp_SCTP_ASSOCINFO(r5, 0x84, 0x1, &(0x7f0000000380)={0x0, 0x1ff, 0x8, 0x7, 0xd00}, &(0x7f0000000400)=0x14) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000440)={r6, 0x61, "ced960f3ad40d2ba8a21086ed5ed6684785ad4f8db027514b7286ca9bac9f07a8d3766373c4dbf160d925cb367c9f6ad4389b71814f7701c622734d2438e4446d6e2c48ea61860a49e6b4e50bc42eb5fe1bcea224c732f8bb7cc454921d37a12d1"}, &(0x7f00000004c0)=0x69) r7 = socket$netlink(0x10, 0x3, 0x0) r8 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r8, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r8, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r7, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r9}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000000000a2a30005000000", @ANYRES32=r9, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(r7, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="500000002800210400"/20, @ANYRES32=r9, @ANYBLOB="00000000ffffffff000000000c0080eb8600000075701000200002001c0002000500000000000800050062706600040002000400060000ff156569735843de8b4c1ef779b8d8f7bf7afb33e23753792ac1f351b2483d67b19c323679afde2698ebe5f83bc5b1d2c1df41944400193870e465324b63063fc06b6d0e583c75ba0a6d8da2ca131e39aeef0f"], 0x50}}, 0x0) connect$packet(r1, &(0x7f0000000300)={0x11, 0x5, r9, 0x1, 0x7}, 0x14) mount(&(0x7f0000000180)=ANY=[], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) 19:06:21 executing program 0: ioctl$VIDIOC_DQBUF(0xffffffffffffffff, 0xc0585611, &(0x7f0000000180)={0x4, 0x0, 0x4, 0x0, 0x0, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "4434260f"}}) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) 19:06:21 executing program 3: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pause() sendmsg$TIPC_NL_MON_GET(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x801004}, 0xc, &(0x7f0000000100)={&(0x7f0000000740)=ANY=[@ANYBLOB="18020000", @ANYRES64, @ANYRESHEX], 0x3}, 0x1, 0x0, 0x0, 0x40c0000}, 0xa87aa890446eb478) write$FUSE_STATFS(0xffffffffffffffff, &(0x7f0000000180)={0x60, 0x0, 0x8, {{0x585, 0x9, 0x0, 0x1, 0x94, 0x3f, 0x4, 0x933}}}, 0x60) [ 386.814053][T15226] ceph: No path or : separator in source [ 386.883622][T15225] ceph: Bad value for 'source' 19:06:22 executing program 0: ioctl$VIDIOC_DQBUF(0xffffffffffffffff, 0xc0585611, &(0x7f0000000180)={0x4, 0x0, 0x4, 0x0, 0x0, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "4434260f"}}) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000180)=ANY=[], 0x0, &(0x7f0000000140)='ceph\x00', 0x0, 0x0) 19:06:22 executing program 4: mmap(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xae3f64455c393079, 0xffffffffffffffff, 0x0) 19:06:22 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x400, 0x0) ioctl$VIDIOC_S_EDID(r0, 0xc0285629, &(0x7f0000000240)={0x0, 0x5bad, 0x1, [], &(0x7f0000000100)=0x5b}) recvfrom$inet(r0, &(0x7f0000000180)=""/155, 0x9b, 0x30000, &(0x7f0000000040)={0x2, 0x4e24, @rand_addr=0x9d2}, 0x10) mount(&(0x7f0000000180)=ANY=[], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) 19:06:22 executing program 2: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r1, 0x0, 0x70196c71, 0x0) ioctl$GIO_UNIMAP(r1, 0x4b66, &(0x7f0000000040)={0x6, &(0x7f0000000000)=[{}, {}, {}, {}, {}, {}]}) clone(0x40000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000280)=ANY=[@ANYBLOB="5b64c9895f60c77cde3a3a5d2c0b7d46552c3aec5cb2b2b289ea512541497e4156bfe0a99e0593dd0fbefc14d460ea5845ece88e98228885a6c428eab00e4cc3d3dbd4dda286fcdfca5f2fd614e24fe9b1733d359171b6669682c25ff5d5cd88afe5d3d6146b8a2ad308bf85d84eddab9d26d9378774e55ab9a198ef1a21f49c0c34c9559d301bcae2fef19a9b0407825164ac9093986509a9254f601d52a59ae9d7bb2b5e71d8846dd3226866978b690fd7a6ff8806be608d51be938690dd8873ee4488044aa73b0ad027dc985abb8874dd53ac76b21f1c4dd44c8cc3043ee67e99f2dd78ef4eee30da0f88ed5e1c4484d5e9c3"], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) 19:06:22 executing program 4: socket$inet(0x2, 0xa, 0x0) socket(0x11, 0x800000003, 0x0) 19:06:22 executing program 0: ioctl$VIDIOC_DQBUF(0xffffffffffffffff, 0xc0585611, &(0x7f0000000180)={0x4, 0x0, 0x4, 0x0, 0x0, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "4434260f"}}) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000180)=ANY=[], 0x0, &(0x7f0000000140)='ceph\x00', 0x0, 0x0) 19:06:22 executing program 3: clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pause() sendmsg$TIPC_NL_MON_GET(0xffffffffffffffff, 0x0, 0xa87aa890446eb478) write$FUSE_STATFS(0xffffffffffffffff, &(0x7f0000000180)={0x60, 0x0, 0x8, {{0x585, 0x9, 0x0, 0x1, 0x94, 0x3f, 0x4, 0x933}}}, 0x60) [ 387.710789][T15457] ceph: Bad value for 'source' [ 388.136720][T15571] IPVS: ftp: loaded support on port[0] = 21 [ 388.245788][T15571] chnl_net:caif_netlink_parms(): no params data found [ 388.297282][T15571] bridge0: port 1(bridge_slave_0) entered blocking state [ 388.304917][T15571] bridge0: port 1(bridge_slave_0) entered disabled state [ 388.313431][T15571] device bridge_slave_0 entered promiscuous mode [ 388.322295][T15571] bridge0: port 2(bridge_slave_1) entered blocking state [ 388.329744][T15571] bridge0: port 2(bridge_slave_1) entered disabled state [ 388.338279][T15571] device bridge_slave_1 entered promiscuous mode [ 388.369220][T15571] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 388.381683][T15571] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 388.409938][T15571] team0: Port device team_slave_0 added [ 388.418640][T15571] team0: Port device team_slave_1 added [ 388.488715][T15571] device hsr_slave_0 entered promiscuous mode [ 388.544483][T15571] device hsr_slave_1 entered promiscuous mode [ 388.593633][T15571] debugfs: Directory 'hsr0' with parent '/' already present! [ 388.642442][T15571] netdevsim netdevsim5 netdevsim0: renamed from eth0 [ 388.697490][T15571] netdevsim netdevsim5 netdevsim1: renamed from eth1 [ 388.757526][T15571] netdevsim netdevsim5 netdevsim2: renamed from eth2 [ 388.829845][T15571] netdevsim netdevsim5 netdevsim3: renamed from eth3 [ 388.907036][T15571] bridge0: port 2(bridge_slave_1) entered blocking state [ 388.914517][T15571] bridge0: port 2(bridge_slave_1) entered forwarding state [ 388.922199][T15571] bridge0: port 1(bridge_slave_0) entered blocking state [ 388.929539][T15571] bridge0: port 1(bridge_slave_0) entered forwarding state [ 388.997420][T15571] 8021q: adding VLAN 0 to HW filter on device bond0 [ 389.017641][ T2731] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 389.028160][ T2731] bridge0: port 1(bridge_slave_0) entered disabled state [ 389.037996][ T2731] bridge0: port 2(bridge_slave_1) entered disabled state [ 389.048876][ T2731] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 389.067390][T15571] 8021q: adding VLAN 0 to HW filter on device team0 [ 389.088842][ T2731] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 389.100195][ T2731] bridge0: port 1(bridge_slave_0) entered blocking state [ 389.107541][ T2731] bridge0: port 1(bridge_slave_0) entered forwarding state [ 389.116521][ T2731] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 389.126043][ T2731] bridge0: port 2(bridge_slave_1) entered blocking state [ 389.133186][ T2731] bridge0: port 2(bridge_slave_1) entered forwarding state [ 389.165124][ T3386] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 389.197455][ T3386] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 389.210160][ T3386] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 389.220376][ T3386] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 389.229588][ T3386] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 389.263855][ T2731] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 389.271607][ T2731] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 389.288102][T15571] 8021q: adding VLAN 0 to HW filter on device batadv0 19:06:24 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x1b, &(0x7f0000001700)=0x1b, 0x4) 19:06:24 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nullb='/dev/nullb0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='bdev\x00', 0x410, &(0x7f0000000180)='-\x00') clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000180)=ANY=[], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) 19:06:24 executing program 0: ioctl$VIDIOC_DQBUF(0xffffffffffffffff, 0xc0585611, &(0x7f0000000180)={0x4, 0x0, 0x4, 0x0, 0x0, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "4434260f"}}) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000180)=ANY=[], 0x0, &(0x7f0000000140)='ceph\x00', 0x0, 0x0) 19:06:24 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000002f40)='l2tp\x00') sendmsg$L2TP_CMD_SESSION_DELETE(r0, &(0x7f0000003000)={0x0, 0x0, &(0x7f0000002fc0)={&(0x7f0000002f80)={0x14, r1, 0x1}, 0x14}}, 0x0) 19:06:24 executing program 3: clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pause() sendmsg$TIPC_NL_MON_GET(0xffffffffffffffff, 0x0, 0x0) write$FUSE_STATFS(0xffffffffffffffff, &(0x7f0000000180)={0x60, 0x0, 0x8, {{0x585, 0x9, 0x0, 0x1, 0x94, 0x3f, 0x4, 0x933}}}, 0x60) 19:06:24 executing program 2: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x200, 0x0) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000180)=ANY=[@ANYBLOB="5b643a3a5d2c0b7d46552c3aec5cb2b2b289ea512541497e4156bfe0a99e0593dd0fbefc14d460ea5845ece88e98228885a6c428eab00e4cc3d3bed4dda286fcdfca5f2f"], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) 19:06:24 executing program 3: clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pause() sendmsg$TIPC_NL_MON_GET(0xffffffffffffffff, 0x0, 0x0) write$FUSE_STATFS(0xffffffffffffffff, 0x0, 0x0) [ 389.531048][T15584] bdev: Unknown parameter '-' [ 389.588863][T15590] ceph: No path or : separator in source 19:06:24 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, 0x0, 0x0) 19:06:24 executing program 0: ioctl$VIDIOC_DQBUF(0xffffffffffffffff, 0xc0585611, &(0x7f0000000180)={0x4, 0x0, 0x4, 0x0, 0x0, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "4434260f"}}) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000180)=ANY=[], &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) 19:06:24 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000000780)={@rand_addr="f6b122a9a7513df31ac3b336377ec03c"}, 0x14) 19:06:24 executing program 4: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) ioctl$sock_SIOCDELRT(r0, 0x890c, 0x0) 19:06:25 executing program 3: pipe(&(0x7f0000001980)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000001800)=[{&(0x7f0000000140)="8d", 0x2bb}], 0x1, 0x1) r2 = socket$alg(0x26, 0x5, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000000100)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000300)={0xa0, 0x0, 0x0, 0x0, 0x0, {}, [@TIPC_NLA_LINK={0x30, 0x4, [@TIPC_NLA_LINK_PROP={0x14, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1f}, @TIPC_NLA_PROP_WIN={0x8}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}]}, @TIPC_NLA_LINK={0x4c, 0x4, [@TIPC_NLA_LINK_PROP={0x4}, @TIPC_NLA_LINK_PROP={0x1c, 0x7, [@TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}, @TIPC_NLA_PROP_MTU={0x8}]}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}]}, @TIPC_NLA_NODE={0x10, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}]}]}, 0xa0}}, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c81", 0x10) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 19:06:25 executing program 0: ioctl$VIDIOC_DQBUF(0xffffffffffffffff, 0xc0585611, &(0x7f0000000180)={0x4, 0x0, 0x4, 0x0, 0x0, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "4434260f"}}) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000180)=ANY=[], &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) 19:06:25 executing program 1: clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$snapshot(0xffffffffffffff9c, 0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$DRM_IOCTL_GET_UNIQUE(r2, 0xc0106401, &(0x7f0000000080)={0x43, &(0x7f0000001200)=""/67}) ioctl$EVIOCGNAME(r0, 0x80404506, &(0x7f0000000180)=""/4096) mount(&(0x7f0000000180)=ANY=[], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) setxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.upper\x00', &(0x7f0000000100)={0x0, 0xfb, 0x17, 0x4, 0xfe, "2a066d55d18dbc61de839c9ee08e15e8", "dccd"}, 0x17, 0x3) 19:06:25 executing program 2: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$TIOCGISO7816(r1, 0x80285442, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r2, &(0x7f0000000040)=ANY=[], 0xfe22) ioctl$SNDCTL_DSP_GETISPACE(0xffffffffffffffff, 0x8010500d, &(0x7f0000000180)) mount(&(0x7f0000000040)=ANY=[@ANYRESDEC=r2], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)='c\x1cw\xc9\x9b\xe9[\x1c\x84\xd4G\vn\x92\xfc\xd7\xc6c\x0fE}\x04#\x9b\x8a\x969\x9b\x13\x87aP\x02o\xeb\xfau:\xca|({\xf8\xa1\x90\xf0\x94`*hu2\x99\xb1\xb2XJ\xff&\xcc\aA+\xaa\x19\x87{\xd3s\xdd\xe1*\xd1X\xd5\x97\tO~\xde\x15\x84wHF\x1c\xc8\x81wm\xa0\x1b\xfc\xe7\xf4\xc8w\xddI\xb65L\xb6\xcf^\xdcE\xdf\xacqN\x9d9(+\xc1\x13+\xa0@\xbeC_\x00\x9dMO\xc0\xb38\xc2\xb7\xa3\v3\xfe\x0f\xf7\xf2\x1b6l0\xcb\xa6\xa8\x17`;\xb6z\r\x83\x85\xa6\xdcH\xa3\xec{T\xc3n\xe1\xe2+\xf68\x9f\xceh\x9c\xd6_\xe8\x84\x9a\xa3\xd7\xe6\x85\x82\x83\xee\n\xe9\xd8\xa5\x16\xd53{\xcdRU\xa8\x95\x93\xdf\xbf\xe4)Qi\xfd\xadr\xcb\x11\xaeQ\xd3\xf1\xf2\x7fC\xc7\x1es%\xcf\xd1\xaf\r&\xee\x8a\x17\x88\xcb\x81\xcf\xdbk0\xe1-\x0eIH\x9eC2i~\xeb\x15>S\xd9\x06\xb9\xdff\\}\xa0y\xf6', 0x0, 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f0000000140)='/dev/nullb0\x00', 0x202002, 0x0) 19:06:25 executing program 5: bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) write$cgroup_int(r0, &(0x7f0000000080), 0x15d4b87) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) 19:06:25 executing program 4: r0 = socket$isdn_base(0x22, 0x3, 0x0) socket$isdn_base(0x22, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = getpid() r3 = getpid() getpid() r4 = socket$xdp(0x2c, 0x3, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) sendmmsg$unix(r1, &(0x7f0000005e40)=[{&(0x7f00000000c0)=@file={0x0, './file0\x00'}, 0x6e, 0x0, 0x0, &(0x7f0000005640)=[@cred={{0x1c, 0x1, 0x2, {r2}}}, @cred={{0x1c, 0x1, 0x2, {r3}}}, @rights={{0x18, 0x1, 0x1, [r0, r4]}}], 0x58}], 0x1, 0x0) 19:06:25 executing program 0: ioctl$VIDIOC_DQBUF(0xffffffffffffffff, 0xc0585611, &(0x7f0000000180)={0x4, 0x0, 0x4, 0x0, 0x0, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "4434260f"}}) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000180)=ANY=[], &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) 19:06:25 executing program 4: r0 = socket$isdn_base(0x22, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, &(0x7f00000016c0)) 19:06:25 executing program 3: socket$kcm(0x11, 0x8000000002, 0x300) socket$kcm(0x10, 0x2, 0x4) socket$kcm(0x11, 0x8000000002, 0x300) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00#\x7f\x80P=r\xc4\x17I~\x85\xadq\xd6\xde@\xb3\xd5\x9f2R\xa3Z\xd3\x9b\xbd\xa1\xa3/\xc0\x91J\x01!8#\x04\x0f\xc3\xb7\x95\xdc\xaa\x91\xfb\xa1]PVH\xaa\x19\x04\x80\x94\'\xc7\fL\xac\xcf:\x92N\x94\xde\x87\xc4\x9b\x87\xd2\xcc{X\xedVr\xecP\xf9&^I\x9f}3U?\x1a\r\x9d', 0x200002, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(r1, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x4e21, @rand_addr=0x7fffffff}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r1, &(0x7f0000000280)={[{0x0, 'memory'}]}, 0xfdef) 19:06:25 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000200)=ANY=[@ANYBLOB="bf16000000000000b7070000010000004870000000000000bc700000000000009500faff000000008aa1210b29017b83c8e96e6405f7e93dba4d64b5030b3388b0409a814343f1ae341b74efa745a12f5c0685e5261482e31e0cacc902c97e6145201b062261ef487a4d26342c94f56a39359ba56724e4535d80ffbd6848d53382c262869ba15d8f0c2211a2b975eb2b9d08501c56ab5aa0d110c5d197e50ff28b4a3b05489d1d1245cb774879b0871dd71703eefe87d7919c5ea2a361b18cca1a363b2b28add653"], &(0x7f0000000140)='vS\xfdIG|\x8aL[\xf2\'\x9c\xea\xb1\xc0\xb1\x19\x91\x9d/Q\xd9\xe3T\xce\xdax;\x02%\xc5\x1c\xd5GA\xad[(\xbblZ\x01\x1dF\x92#]%sj\xd0i\xc6C\x1f&\xe2\xc5\xa5z\x7f\xe1 \xfb\xc27\x03\x84\x8e\xef\x82-\xfc$$\xaf\v\xbd\x95\x1e\x0f\xbeVI\xec\r!\f\x86\xf5\xfb[Y\x1e\xd4\xdfc\xb1\xc8\xa2\xc1/5\xffr\x1f\x80@\xb8F\xea\xde\x93\xa1\xcb6\xee\xf2\xce\x95\xf2\xfdxR\x17F\xad\xc1~\xa2\x97=O^o\"\xbb\xa8\x9746'}, 0x48) 19:06:25 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x100, 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, &(0x7f0000000180)={'HL\x00'}, &(0x7f00000001c0)=0x1e) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000180)=ANY=[], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000240)) clock_gettime(0x0, &(0x7f00000002c0)={0x0, 0x0}) utimes(&(0x7f0000000200)='./file0\x00', &(0x7f0000000280)={{0x0, 0x2710}, {r0, r1/1000+10000}}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(0xffffffffffffffff, 0x54a2) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r2, 0x0, r3, 0x0, 0x70196c71, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, &(0x7f0000000300)={{{@in=@dev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in=@empty}}, &(0x7f0000000400)=0xe8) ioctl$SOUND_MIXER_WRITE_RECSRC(r5, 0xc0044dff, &(0x7f0000000040)=0xffffff00) r7 = syz_open_dev$media(&(0x7f0000000100)='/dev/media#\x00', 0x3, 0x2c2040) ioctl$SG_GET_PACK_ID(r7, 0x227c, &(0x7f0000001840)) sendmsg$sock(r2, &(0x7f0000001800)={&(0x7f0000000440)=@xdp={0x2c, 0x8a2c28d07d6949c1, r6, 0x3}, 0x80, &(0x7f0000001780)=[{&(0x7f00000004c0)="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", 0x1000}, {&(0x7f00000014c0)="15b2f9d64cbf840f70056689855c29801f9e9d349e22abc78dcb23a174d13beedd5beb811c1512d48627bf54de848468082e3486f10800d87b69eb9d1fb3c476224e489f7371a0ed1ef48d3706e9f10c0c10cbc920c398", 0x57}, {&(0x7f0000001540)="3115a4a9dd422720dea3ed86ad5abed9e2511aa3", 0x14}, {&(0x7f0000001580)="7d919da2b25a727507a4cb9dd3c1b9c4260b3b0c31c221319bfc3037e63f0b5749a5177fe171e90af332dae38dad4febfb865196d4b5ba68a88159621e035ce2d4146d28527bb5406620c0c2e6b69d194a4a3ef9750bcc2fd77db881a4808c31d1614a5a0d2475911eb14bc980a1a895a2ca5e375763ac678af16f85f6412626d1689743bc2be3323992836084bc6871a8719eec56eace2eb5079694c4b481d977cfdf9245fe9e948d0c43509153d9060010f52263717fc19d165818ac634db8", 0xc0}, {&(0x7f0000001640)="adb6628733a255b1be0a0e5363a88dad633689f582212686772f5bfb7d115373d2dd1e45583d0414c56043094379f4f4384b69b741e61b166335e2edd20cce012ebdacb9fea7ad92693adf4594609daaeb1168439d1baa7eb74dc51ad72197d781a70ef8680f9801fc3f881186806e862b59cfd571419338be57904c920176c42b2e", 0x82}, {&(0x7f0000001700)="43f2f321bd8bab5e78ec6658b06c2f0c63d9d1b70ed27cbc9ce355a68950c497fc4862c4334f256513bf9bfc179bcd60284c1b09d31aa3507d930d3dae9bbab66e0ffcf6c8c9", 0x46}], 0x6}, 0xc368ecd956765202) 19:06:25 executing program 2: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=ANY=[], &(0x7f0000000240)='./file0\x00', &(0x7f0000000100)='c\x00\x00\x00\x00', 0x40, 0x0) write$input_event(0xffffffffffffffff, &(0x7f0000000000)={{}, 0x0, 0x6f, 0xd7}, 0x18) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x800) [ 391.015482][T16054] ceph: No path or : separator in source 19:06:26 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) connect(r0, &(0x7f0000000200)=@hci, 0x80) [ 391.134048][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 391.140408][ C1] protocol 88fb is buggy, dev hsr_slave_1 19:06:26 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r0, &(0x7f0000001600)='io.max\x00', 0x2, 0x0) openat$cgroup_int(r0, &(0x7f000000fcc0)='io.max\x00', 0x2, 0x0) 19:06:26 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) socket$kcm(0x11, 0xa, 0x300) socket$kcm(0x2, 0x1000000000000002, 0x0) socket$kcm(0x29, 0x2, 0x0) socket$kcm(0xa, 0x2, 0x11) socket$kcm(0x11, 0x200000000000002, 0x300) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(r1, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r1, 0x0, 0x0) 19:06:26 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_NEW_DAEMON(r0, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000480)={0x3c, 0x0, 0x0, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_DAEMON={0x112, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0xe9}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x4d, 0x2, 'lo\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8}]}]}, 0xffffffffffffff76}}, 0x0) 19:06:26 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000180)=ANY=[], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x301, 0xa0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = fcntl$dupfd(0xffffffffffffffff, 0x9210ecb7e08edd76, r2) renameat2(r0, &(0x7f0000000040)='./file0\x00', r3, &(0x7f0000000100)='./file0\x00', 0x4) [ 391.550508][T16276] ceph: Bad value for 'source' 19:06:26 executing program 2: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mincore(&(0x7f0000ffb000/0x2000)=nil, 0x2000, &(0x7f0000000780)=""/147) lsetxattr$trusted_overlay_upper(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='trusted.overlay.upper\x00', &(0x7f00000001c0)={0x0, 0xfb, 0x67, 0x6, 0x3, "0edae543edc7652151879090d9041d0e", "b9b75a2c0ee7f1cfd790114bcaed166cc7a863d93b7f2973dbf7249d15e373b532dfb2dcf2d39b95e1b6aedee360dda7da35f7a6f24205ec5d80fe41e463f585657f509564192cccedbb9a7fb5b933f4e2e8"}, 0x67, 0x2) mount(&(0x7f0000000000)=ANY=[@ANYBLOB="5b643a3a01040000f0ffffffeb5cb2b2b289ea51250593dd0fbefc14d460ea5845ece88e98228885a6c428eab00e4cc3d3bed4dda286fcdfca5f2f0000000000000000008325ef3db969eacb855dd140cbeb44d532d3d6780e7b0176523863bf5e92a811437a159c5cd571"], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r1, 0x0, 0x70196c71, 0x0) sendmsg$kcm(r1, &(0x7f0000000740)={&(0x7f0000000240)=@nfc={0x27, 0x1, 0x1, 0x2}, 0x80, &(0x7f00000006c0)=[{&(0x7f00000002c0)="e721d32fc9a420219d42d570d03211418eee2edaedb99b318c067101700d95f17f3792762b3ffe29840bbe766664bd742b1a238cc995d88035f3e160c5d6809602da24d69ba87cf10429e48fea5615977bf7c007b245f59f179c562b6b7aac107984ca0b945039886a83a08304f118f9106a42ba239d3a17c9ea71786e254a6a3f5935c2cb0c458b4bd87e92b0732a46bb95cb1d3869cd887f0d89872724563b6b02beedc3db06704cf5aecafe924d9885cc7042e714f1239a1dbb581e63006da64e8a352482ac7d244f", 0xca}, {&(0x7f00000003c0), 0x5b}, {&(0x7f0000000400)="5b0236e3a9861ad1e3c086d2c24480c7bdf892d6fb4626fc6aa3f486aabc61e5fd1a0195e70ab63e797c9dac1a92557e65b2afa58313dd76413ef4aeaed5d4a07407499060b97a72233516b7eb4f64e365fd8ba40232b411eb455d2155a93e79a5fd0965fe14fd194d5e95de99fa0393bcd7974532c7d59adbdabd42e52fdbc2b4a19778cd6a78e8ee5f675476fb4e7479688dcc7d76725824708328696e62b1960c524645a291895c849a7c20b1b7d0e6d40f92efd11cae276f8be89357bba84ce267f55485c29aa2c480b41641bdd55c4f9eeaae86c90698dd68b91b168e31589bebc271183fef7f1ce42af180e1", 0xef}, {&(0x7f0000000500)="810d6d2a0e7abda63b43b25f73d61a47022e3111c66a8486d65c1ea997bb2afb5f4ec58fb0bf462b7c2f34299fd5ab939063db53ac8d51628f4e078557d597b38ed3be045a509bbb2428ae4de145bd43e9f9d03c8ef55469c9a6bcd8d60d4b69d0f5cf7758c782491ecd44920c56eea436718f0a7d527dfbb81dddfee3f474e039075f132942a8bba04842f67a38675042ec9b461e54debe", 0x98}, {&(0x7f00000005c0)="72f9c2e487d1611dee8c152ac4d03887883ddd63a7427b8518a8fe5f9571f435fe5fe2e828827e8544cb15941bfb00e0de25e3ea0961d827c85252a209cf50bf13edbe8271b8029ed177c7c486546a0a2bd838cc1d565130a426e1a2ef08d334c82608b522a78013aaa1a9721fa0e91b097af2b03b52a4aba841d8652e1eaa68fdcab32f4f0acd3a779c1242031986cf49f05350f51997b892182fcccfb2a4538a650bd76a81533ee2c4f883ff2c8de1541ddca107f676e7b028f56e5614438caeba879447780d7b7cbab3447d2ead618cc7320f814d7a7cea493c87091be011c45ac9", 0xe3}], 0x5}, 0x20008005) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r2, 0x0, r3, 0x0, 0x70196c71, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f00000003c0)={@dev={0xfe, 0x80, [], 0x16}, 0x19, 0x3, 0x0, 0x4, 0xfffa, 0x2}, 0x20) 19:06:26 executing program 4: r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_TX_RING(r0, 0x11b, 0x3, &(0x7f0000002740), 0x4) 19:06:26 executing program 3: setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0xffffffffffffffef) [ 391.805216][T16330] ceph: No path or : separator in source [ 391.854028][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 391.860473][ C1] protocol 88fb is buggy, dev hsr_slave_1 19:06:27 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000004c0)={0x28, 0x22, 0x829, 0x0, 0x0, {0x4, 0x1000000}, [@typed={0x14, 0x11, @ipv6=@local}]}, 0x28}, 0x1, 0xfdffffff00000000}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") getsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f00000002c0)=@assoc_value={0x0, 0x9}, &(0x7f0000000300)=0x8) sendmsg$nl_generic(r1, &(0x7f0000000180)={0x0, 0xc502, &(0x7f0000000100)={&(0x7f00000004c0)={0x28, 0x22, 0x829, 0x0, 0x0, {0x5, 0x1000000}, [@typed={0x14, 0x11, @ipv6=@local}]}, 0x28}, 0x1, 0xfdffffff00000000}, 0x0) 19:06:27 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f00000000c0)={0x0, 0x10, &(0x7f0000000000)=[@in={0x2, 0x0, @rand_addr=0x80000001}]}, &(0x7f0000000100)=0x10) 19:06:27 executing program 3: r0 = socket$kcm(0x11, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f0000000000)=[{&(0x7f0000000100)="9e4301000080000000011fe4ac14140ce0", 0x11}], 0x1}, 0x0) 19:06:27 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000000)=0x16c, 0x4) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100), 0x4) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, 0x0, 0x0, 0x3e8}, 0x0) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 19:06:27 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$inet_dccp_buf(r1, 0x21, 0xec, &(0x7f0000000180)="5cd9a54c5a03affc4bbf69cd922f3a057f3379dce300703332446464c6a46598649a9c72c0027e393ee48b7d06051c5b2467b0565c62b257ae10381c6c0ae347e71944646b0fcabf3f0e8dfa1173c4c8124703cf11b68c7b8cec5e52d1d2345576a20ca9f72989dfddda261599372d8e33fdde79f129c2d994cf64d1981d454fc34110f8dd047041622d911ec0f8b58258c0bafd670054890b47803baeea144f3ebd33669fcf68c6411b00c1a94686bcc219c7b66c8437da7dd031a01e73bc52e7e168547efc56e23a2715ef05fe039ec080806998019ee1e8c53bfc4631d5ebbbbcba5f85edfa6f59bb746338c0490dcc63c9fc3525", 0xf6) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000180)=ANY=[], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) 19:06:27 executing program 2: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) prctl$PR_MCE_KILL_GET(0x22) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000180)=ANY=[], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='binfmt_misc\x00', 0x12025, 0x0) [ 392.371305][T16608] ===================================================== [ 392.378436][T16608] BUG: KMSAN: uninit-value in __flow_hash_from_keys+0x694/0xd50 [ 392.386116][T16608] CPU: 1 PID: 16608 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 392.395716][T16608] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 392.405767][T16608] Call Trace: [ 392.409081][T16608] dump_stack+0x1c9/0x220 [ 392.413445][T16608] kmsan_report+0xf8/0x1e0 [ 392.417857][T16608] __msan_warning+0x58/0xa0 [ 392.422531][T16608] __flow_hash_from_keys+0x694/0xd50 [ 392.427807][T16608] ? kmsan_internal_set_origin+0x6a/0xb0 [ 392.433806][T16608] __skb_get_hash+0x140/0x3e0 [ 392.438476][T16608] ? kmsan_internal_set_origin+0x6a/0xb0 [ 392.444185][T16608] ip_tunnel_xmit+0x7f8/0x3480 [ 392.448960][T16608] ? kmsan_get_metadata+0x11e/0x190 [ 392.454244][T16608] gre_tap_xmit+0xa73/0xb80 [ 392.458747][T16608] ? gre_tap_init+0x650/0x650 [ 392.463429][T16608] dev_hard_start_xmit+0x51a/0xab0 [ 392.468824][T16608] sch_direct_xmit+0x515/0x18c0 [ 392.473900][T16608] __dev_queue_xmit+0x208e/0x4280 [ 392.478917][T16608] ? kmsan_get_metadata+0x11e/0x190 [ 392.484108][T16608] ? kmsan_get_shadow_origin_ptr+0x81/0xb0 [ 392.489920][T16608] dev_queue_xmit+0x4b/0x60 [ 392.494448][T16608] br_dev_queue_push_xmit+0x803/0x8b0 [ 392.499825][T16608] __br_forward+0xa60/0xe30 [ 392.504328][T16608] ? fdb_add_hw_addr+0x510/0x510 [ 392.509255][T16608] br_flood+0xb4f/0xfe0 [ 392.513506][T16608] br_dev_xmit+0x134f/0x16e0 [ 392.518113][T16608] ? br_net_exit+0x230/0x230 [ 392.522691][T16608] dev_hard_start_xmit+0x51a/0xab0 [ 392.527815][T16608] __dev_queue_xmit+0x3837/0x4280 [ 392.532832][T16608] ? kmsan_get_metadata+0x11e/0x190 [ 392.538054][T16608] dev_queue_xmit+0x4b/0x60 [ 392.542612][T16608] neigh_resolve_output+0xab7/0xb50 [ 392.547831][T16608] ? neigh_event_ns+0x370/0x370 [ 392.552695][T16608] ip_finish_output2+0x1a9c/0x25d0 [ 392.557833][T16608] __ip_finish_output+0xaf8/0xda0 [ 392.562861][T16608] ip_finish_output+0x2db/0x420 [ 392.567735][T16608] ip_output+0x593/0x680 [ 392.571992][T16608] ? ip_mc_finish_output+0x6d0/0x6d0 [ 392.577269][T16608] ? ip_finish_output+0x420/0x420 [ 392.582303][T16608] ip_local_out+0x164/0x1d0 [ 392.587521][T16608] iptunnel_xmit+0x870/0xde0 [ 392.592131][T16608] ip_tunnel_xmit+0x2d7c/0x3480 [ 392.597010][T16608] ipgre_xmit+0xff3/0x1120 [ 392.601432][T16608] ? ipgre_close+0x240/0x240 [ 392.606271][T16608] dev_hard_start_xmit+0x51a/0xab0 [ 392.611519][T16608] __dev_queue_xmit+0x3837/0x4280 [ 392.616564][T16608] dev_queue_xmit+0x4b/0x60 [ 392.621058][T16608] ? netdev_core_pick_tx+0x4d0/0x4d0 [ 392.626443][T16608] packet_sendmsg+0x836f/0x92a0 [ 392.631372][T16608] ? aa_label_sk_perm+0x6d6/0x940 [ 392.636414][T16608] ? kmsan_get_shadow_origin_ptr+0x81/0xb0 [ 392.642216][T16608] ? kmsan_get_metadata+0x4f/0x190 [ 392.647412][T16608] ? kmsan_internal_set_origin+0x6a/0xb0 [ 392.653049][T16608] ? kmsan_get_metadata+0x4f/0x190 [ 392.658155][T16608] ? kmsan_internal_set_origin+0x6a/0xb0 [ 392.663791][T16608] ? kmsan_get_metadata+0x11e/0x190 [ 392.669014][T16608] ? kmsan_get_shadow_origin_ptr+0x81/0xb0 [ 392.674847][T16608] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 392.681082][T16608] ? aa_sk_perm+0x828/0xcc0 [ 392.685727][T16608] ? compat_packet_setsockopt+0x360/0x360 [ 392.691646][T16608] ____sys_sendmsg+0x1362/0x13f0 [ 392.696614][T16608] __sys_sendmsg+0x4f0/0x5e0 [ 392.701239][T16608] ? kmsan_copy_to_user+0x81/0x90 [ 392.706457][T16608] ? _copy_to_user+0x168/0x1f0 [ 392.711227][T16608] ? kmsan_get_metadata+0x11e/0x190 [ 392.716422][T16608] ? kmsan_get_metadata+0x11e/0x190 [ 392.721648][T16608] __se_sys_sendmsg+0x97/0xb0 [ 392.726344][T16608] __x64_sys_sendmsg+0x4a/0x70 [ 392.731150][T16608] do_syscall_64+0xb6/0x160 [ 392.735814][T16608] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 392.741720][T16608] RIP: 0033:0x45a9e9 [ 392.745620][T16608] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 392.765435][T16608] RSP: 002b:00007f45caa54c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 392.773848][T16608] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 000000000045a9e9 [ 392.783118][T16608] RDX: 0000000000000000 RSI: 0000000020000200 RDI: 0000000000000003 [ 392.791274][T16608] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 392.799259][T16608] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f45caa556d4 [ 392.807942][T16608] R13: 00000000004c9c03 R14: 00000000004e1ea8 R15: 00000000ffffffff [ 392.815924][T16608] [ 392.818242][T16608] Uninit was stored to memory at: [ 392.823437][T16608] kmsan_internal_chain_origin+0xc5/0x140 [ 392.830841][T16608] kmsan_memcpy_memmove_metadata+0x25c/0x2e0 [ 392.836857][T16608] kmsan_memcpy_metadata+0xb/0x10 [ 392.841879][T16608] __msan_memcpy+0x44/0x50 [ 392.846319][T16608] __skb_flow_dissect+0x3997/0x8000 [ 392.851520][T16608] __skb_get_hash+0x114/0x3e0 [ 392.856191][T16608] ip_tunnel_xmit+0x7f8/0x3480 [ 392.860955][T16608] gre_tap_xmit+0xa73/0xb80 [ 392.865670][T16608] dev_hard_start_xmit+0x51a/0xab0 [ 392.870785][T16608] sch_direct_xmit+0x515/0x18c0 [ 392.875645][T16608] __dev_queue_xmit+0x208e/0x4280 [ 392.880677][T16608] dev_queue_xmit+0x4b/0x60 [ 392.885181][T16608] br_dev_queue_push_xmit+0x803/0x8b0 [ 392.890544][T16608] __br_forward+0xa60/0xe30 [ 392.895035][T16608] br_flood+0xb4f/0xfe0 [ 392.899348][T16608] br_dev_xmit+0x134f/0x16e0 [ 392.903943][T16608] dev_hard_start_xmit+0x51a/0xab0 [ 392.909086][T16608] __dev_queue_xmit+0x3837/0x4280 [ 392.914149][T16608] dev_queue_xmit+0x4b/0x60 [ 392.918729][T16608] neigh_resolve_output+0xab7/0xb50 [ 392.923938][T16608] ip_finish_output2+0x1a9c/0x25d0 [ 392.929066][T16608] __ip_finish_output+0xaf8/0xda0 [ 392.934086][T16608] ip_finish_output+0x2db/0x420 [ 392.939214][T16608] ip_output+0x593/0x680 [ 392.943487][T16608] ip_local_out+0x164/0x1d0 [ 392.947988][T16608] iptunnel_xmit+0x870/0xde0 [ 392.952587][T16608] ip_tunnel_xmit+0x2d7c/0x3480 [ 392.957428][T16608] ipgre_xmit+0xff3/0x1120 [ 392.961850][T16608] dev_hard_start_xmit+0x51a/0xab0 [ 392.966977][T16608] __dev_queue_xmit+0x3837/0x4280 [ 392.972012][T16608] dev_queue_xmit+0x4b/0x60 [ 392.976523][T16608] packet_sendmsg+0x836f/0x92a0 [ 392.982322][T16608] ____sys_sendmsg+0x1362/0x13f0 [ 392.987289][T16608] __sys_sendmsg+0x4f0/0x5e0 [ 392.991900][T16608] __se_sys_sendmsg+0x97/0xb0 [ 392.996578][T16608] __x64_sys_sendmsg+0x4a/0x70 [ 393.001362][T16608] do_syscall_64+0xb6/0x160 [ 393.005868][T16608] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 393.011745][T16608] [ 393.014079][T16608] Uninit was stored to memory at: [ 393.019097][T16608] kmsan_internal_chain_origin+0xc5/0x140 [ 393.024805][T16608] kmsan_memcpy_memmove_metadata+0x25c/0x2e0 [ 393.030777][T16608] kmsan_memcpy_metadata+0xb/0x10 [ 393.035806][T16608] __msan_memcpy+0x44/0x50 [ 393.040215][T16608] pskb_expand_head+0x383/0x1b00 [ 393.045145][T16608] gre_tap_xmit+0x79c/0xb80 [ 393.049652][T16608] dev_hard_start_xmit+0x51a/0xab0 [ 393.054769][T16608] sch_direct_xmit+0x515/0x18c0 [ 393.059638][T16608] __dev_queue_xmit+0x208e/0x4280 [ 393.064678][T16608] dev_queue_xmit+0x4b/0x60 [ 393.069183][T16608] br_dev_queue_push_xmit+0x803/0x8b0 [ 393.074571][T16608] __br_forward+0xa60/0xe30 [ 393.079248][T16608] br_flood+0xb4f/0xfe0 [ 393.083572][T16608] br_dev_xmit+0x134f/0x16e0 [ 393.088155][T16608] dev_hard_start_xmit+0x51a/0xab0 [ 393.093271][T16608] __dev_queue_xmit+0x3837/0x4280 [ 393.098303][T16608] dev_queue_xmit+0x4b/0x60 [ 393.102795][T16608] neigh_resolve_output+0xab7/0xb50 [ 393.107982][T16608] ip_finish_output2+0x1a9c/0x25d0 [ 393.113098][T16608] __ip_finish_output+0xaf8/0xda0 [ 393.118128][T16608] ip_finish_output+0x2db/0x420 [ 393.122970][T16608] ip_output+0x593/0x680 [ 393.127301][T16608] ip_local_out+0x164/0x1d0 [ 393.131800][T16608] iptunnel_xmit+0x870/0xde0 [ 393.136384][T16608] ip_tunnel_xmit+0x2d7c/0x3480 [ 393.141231][T16608] ipgre_xmit+0xff3/0x1120 [ 393.145638][T16608] dev_hard_start_xmit+0x51a/0xab0 [ 393.150825][T16608] __dev_queue_xmit+0x3837/0x4280 [ 393.155964][T16608] dev_queue_xmit+0x4b/0x60 [ 393.160600][T16608] packet_sendmsg+0x836f/0x92a0 [ 393.165469][T16608] ____sys_sendmsg+0x1362/0x13f0 [ 393.170894][T16608] __sys_sendmsg+0x4f0/0x5e0 [ 393.176207][T16608] __se_sys_sendmsg+0x97/0xb0 [ 393.181150][T16608] __x64_sys_sendmsg+0x4a/0x70 [ 393.186037][T16608] do_syscall_64+0xb6/0x160 [ 393.190540][T16608] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 393.196425][T16608] [ 393.198750][T16608] Uninit was stored to memory at: [ 393.203787][T16608] kmsan_internal_chain_origin+0xc5/0x140 [ 393.209588][T16608] kmsan_memcpy_memmove_metadata+0x25c/0x2e0 [ 393.215578][T16608] kmsan_memcpy_metadata+0xb/0x10 [ 393.220595][T16608] __msan_memcpy+0x44/0x50 [ 393.225366][T16608] pskb_expand_head+0x383/0x1b00 [ 393.230313][T16608] ip_tunnel_xmit+0x2a3b/0x3480 [ 393.235181][T16608] ipgre_xmit+0xff3/0x1120 [ 393.239608][T16608] dev_hard_start_xmit+0x51a/0xab0 [ 393.244834][T16608] __dev_queue_xmit+0x3837/0x4280 [ 393.249890][T16608] dev_queue_xmit+0x4b/0x60 [ 393.254400][T16608] packet_sendmsg+0x836f/0x92a0 [ 393.259250][T16608] ____sys_sendmsg+0x1362/0x13f0 [ 393.264195][T16608] __sys_sendmsg+0x4f0/0x5e0 [ 393.268794][T16608] __se_sys_sendmsg+0x97/0xb0 [ 393.273807][T16608] __x64_sys_sendmsg+0x4a/0x70 [ 393.278566][T16608] do_syscall_64+0xb6/0x160 [ 393.283068][T16608] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 393.288962][T16608] [ 393.291281][T16608] Uninit was created at: [ 393.295701][T16608] kmsan_internal_poison_shadow+0x5c/0xf0 [ 393.301425][T16608] kmsan_slab_alloc+0x8b/0xe0 [ 393.306122][T16608] __kmalloc_node_track_caller+0xe47/0x11f0 [ 393.312034][T16608] __alloc_skb+0x309/0xa50 [ 393.316532][T16608] alloc_skb_with_frags+0x18c/0xa80 [ 393.321911][T16608] sock_alloc_send_pskb+0xae9/0xc70 [ 393.328640][T16608] packet_sendmsg+0x6562/0x92a0 [ 393.333515][T16608] ____sys_sendmsg+0x1362/0x13f0 [ 393.338459][T16608] __sys_sendmsg+0x4f0/0x5e0 [ 393.343044][T16608] __se_sys_sendmsg+0x97/0xb0 [ 393.347751][T16608] __x64_sys_sendmsg+0x4a/0x70 [ 393.352637][T16608] do_syscall_64+0xb6/0x160 [ 393.357158][T16608] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 393.363045][T16608] ===================================================== [ 393.370059][T16608] Disabling lock debugging due to kernel taint [ 393.376217][T16608] Kernel panic - not syncing: panic_on_warn set ... [ 393.383364][T16608] CPU: 1 PID: 16608 Comm: syz-executor.3 Tainted: G B 5.5.0-rc1-syzkaller #0 [ 393.393435][T16608] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 393.403494][T16608] Call Trace: [ 393.406784][T16608] dump_stack+0x1c9/0x220 [ 393.411375][T16608] panic+0x3c9/0xc1e [ 393.415333][T16608] kmsan_report+0x1e0/0x1e0 [ 393.420059][T16608] __msan_warning+0x58/0xa0 [ 393.424584][T16608] __flow_hash_from_keys+0x694/0xd50 [ 393.429966][T16608] ? kmsan_internal_set_origin+0x6a/0xb0 [ 393.435605][T16608] __skb_get_hash+0x140/0x3e0 [ 393.440274][T16608] ? kmsan_internal_set_origin+0x6a/0xb0 [ 393.445935][T16608] ip_tunnel_xmit+0x7f8/0x3480 [ 393.450707][T16608] ? kmsan_get_metadata+0x11e/0x190 [ 393.455899][T16608] gre_tap_xmit+0xa73/0xb80 [ 393.460405][T16608] ? gre_tap_init+0x650/0x650 [ 393.465073][T16608] dev_hard_start_xmit+0x51a/0xab0 [ 393.470203][T16608] sch_direct_xmit+0x515/0x18c0 [ 393.475319][T16608] __dev_queue_xmit+0x208e/0x4280 [ 393.480334][T16608] ? kmsan_get_metadata+0x11e/0x190 [ 393.485523][T16608] ? kmsan_get_shadow_origin_ptr+0x81/0xb0 [ 393.491357][T16608] dev_queue_xmit+0x4b/0x60 [ 393.495860][T16608] br_dev_queue_push_xmit+0x803/0x8b0 [ 393.501244][T16608] __br_forward+0xa60/0xe30 [ 393.505757][T16608] ? fdb_add_hw_addr+0x510/0x510 [ 393.510685][T16608] br_flood+0xb4f/0xfe0 [ 393.514851][T16608] br_dev_xmit+0x134f/0x16e0 [ 393.519463][T16608] ? br_net_exit+0x230/0x230 [ 393.524041][T16608] dev_hard_start_xmit+0x51a/0xab0 [ 393.529167][T16608] __dev_queue_xmit+0x3837/0x4280 [ 393.534190][T16608] ? kmsan_get_metadata+0x11e/0x190 [ 393.539401][T16608] dev_queue_xmit+0x4b/0x60 [ 393.544157][T16608] neigh_resolve_output+0xab7/0xb50 [ 393.549359][T16608] ? neigh_event_ns+0x370/0x370 [ 393.554224][T16608] ip_finish_output2+0x1a9c/0x25d0 [ 393.559360][T16608] __ip_finish_output+0xaf8/0xda0 [ 393.564396][T16608] ip_finish_output+0x2db/0x420 [ 393.569247][T16608] ip_output+0x593/0x680 [ 393.573489][T16608] ? ip_mc_finish_output+0x6d0/0x6d0 [ 393.578766][T16608] ? ip_finish_output+0x420/0x420 [ 393.583785][T16608] ip_local_out+0x164/0x1d0 [ 393.588289][T16608] iptunnel_xmit+0x870/0xde0 [ 393.592891][T16608] ip_tunnel_xmit+0x2d7c/0x3480 [ 393.597854][T16608] ipgre_xmit+0xff3/0x1120 [ 393.602271][T16608] ? ipgre_close+0x240/0x240 [ 393.606853][T16608] dev_hard_start_xmit+0x51a/0xab0 [ 393.611968][T16608] __dev_queue_xmit+0x3837/0x4280 [ 393.617003][T16608] dev_queue_xmit+0x4b/0x60 [ 393.621498][T16608] ? netdev_core_pick_tx+0x4d0/0x4d0 [ 393.626804][T16608] packet_sendmsg+0x836f/0x92a0 [ 393.631645][T16608] ? aa_label_sk_perm+0x6d6/0x940 [ 393.636665][T16608] ? kmsan_get_shadow_origin_ptr+0x81/0xb0 [ 393.643423][T16608] ? kmsan_get_metadata+0x4f/0x190 [ 393.648526][T16608] ? kmsan_internal_set_origin+0x6a/0xb0 [ 393.654166][T16608] ? kmsan_get_metadata+0x4f/0x190 [ 393.659268][T16608] ? kmsan_internal_set_origin+0x6a/0xb0 [ 393.665243][T16608] ? kmsan_get_metadata+0x11e/0x190 [ 393.670432][T16608] ? kmsan_get_shadow_origin_ptr+0x81/0xb0 [ 393.676322][T16608] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 393.682639][T16608] ? aa_sk_perm+0x828/0xcc0 [ 393.687167][T16608] ? compat_packet_setsockopt+0x360/0x360 [ 393.692895][T16608] ____sys_sendmsg+0x1362/0x13f0 [ 393.697850][T16608] __sys_sendmsg+0x4f0/0x5e0 [ 393.702454][T16608] ? kmsan_copy_to_user+0x81/0x90 [ 393.707483][T16608] ? _copy_to_user+0x168/0x1f0 [ 393.712942][T16608] ? kmsan_get_metadata+0x11e/0x190 [ 393.718319][T16608] ? kmsan_get_metadata+0x11e/0x190 [ 393.723697][T16608] __se_sys_sendmsg+0x97/0xb0 [ 393.728503][T16608] __x64_sys_sendmsg+0x4a/0x70 [ 393.733279][T16608] do_syscall_64+0xb6/0x160 [ 393.737795][T16608] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 393.743686][T16608] RIP: 0033:0x45a9e9 [ 393.747575][T16608] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 393.767352][T16608] RSP: 002b:00007f45caa54c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 393.775767][T16608] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 000000000045a9e9 [ 393.783874][T16608] RDX: 0000000000000000 RSI: 0000000020000200 RDI: 0000000000000003 [ 393.791936][T16608] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 393.800190][T16608] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f45caa556d4 [ 393.808156][T16608] R13: 00000000004c9c03 R14: 00000000004e1ea8 R15: 00000000ffffffff [ 393.817844][T16608] Kernel Offset: 0xc200000 from 0xffffffff81000000 (relocation range: 0xffffffff80000000-0xffffffffbfffffff) [ 393.829603][T16608] Rebooting in 86400 seconds..