[ 43.751368][ T25] audit: type=1800 audit(1573580942.296:21): pid=7448 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="bootlogs" dev="sda1" ino=2452 res=0 [ 43.803242][ T25] audit: type=1800 audit(1573580942.296:22): pid=7448 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="motd" dev="sda1" ino=2480 res=0 [....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [ 44.936528][ T7516] sshd (7516) used greatest stack depth: 10128 bytes left [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.10.9' (ECDSA) to the list of known hosts. 2019/11/12 17:49:14 fuzzer started 2019/11/12 17:49:15 dialing manager at 10.128.0.105:45453 2019/11/12 17:49:16 syscalls: 2566 2019/11/12 17:49:16 code coverage: enabled 2019/11/12 17:49:16 comparison tracing: enabled 2019/11/12 17:49:16 extra coverage: extra coverage is not supported by the kernel 2019/11/12 17:49:16 setuid sandbox: enabled 2019/11/12 17:49:16 namespace sandbox: enabled 2019/11/12 17:49:16 Android sandbox: /sys/fs/selinux/policy does not exist 2019/11/12 17:49:16 fault injection: enabled 2019/11/12 17:49:16 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/11/12 17:49:16 net packet injection: enabled 2019/11/12 17:49:16 net device setup: enabled 2019/11/12 17:49:16 concurrency sanitizer: enabled 2019/11/12 17:49:16 devlink PCI setup: PCI device 0000:00:10.0 is not available syzkaller login: [ 70.380489][ T7616] KCSAN: could not find function: 'poll_schedule_timeout' 2019/11/12 17:49:29 adding functions to KCSAN blacklist: 'find_next_bit' 'taskstats_exit' 'xas_clear_mark' 'blk_mq_sched_dispatch_requests' 'tick_nohz_idle_stop_tick' 'rq_depth_scale_up' 'pcpu_alloc' 'snd_seq_prioq_cell_out' '__hrtimer_run_queues' 'blk_mq_dispatch_rq_list' 'echo_char' 'wbt_issue' 'ext4_free_inodes_count' 'rcu_gp_fqs_check_wake' '__find_get_block' '__acct_update_integrals' 'mod_timer' 'blk_mq_get_request' 'copy_process' 'wbc_detach_inode' 'free_pid' '__delete_from_page_cache' 'add_timer' 'generic_fillattr' 'ext4_nonda_switch' 'kernfs_refresh_inode' 'list_lru_count_one' 'ext4_es_lookup_extent' 'blk_mq_run_hw_queue' 'vfs_fsync_range' 'find_get_pages_range_tag' 'kauditd_thread' 'generic_write_end' 'audit_log_start' '__perf_event_overflow' 'ep_poll' 'vm_area_dup' 'blk_mq_free_request' 'tick_do_update_jiffies64' 'process_srcu' 'do_syslog' 'mem_cgroup_select_victim_node' 'snd_rawmidi_kernel_write1' 'do_exit' '__d_lookup_done' 'timer_clear_idle' 'snd_seq_check_queue' '__mark_inode_dirty' 'inactive_list_is_low' 'futex_wait_queue_me' 'tomoyo_supervisor' 'pipe_poll' '__ext4_new_inode' 'do_nanosleep' 'icmp_global_allow' 'p9_poll_workfn' 'common_perm_cond' 'kvm_mmu_notifier_invalidate_range_end' 'ext4_mark_iloc_dirty' 'lruvec_lru_size' 'pipe_wait' 'mm_update_next_owner' 'n_tty_receive_buf_common' 'generic_file_read_iter' 'pid_update_inode' '__add_to_page_cache_locked' 'xas_find_marked' 'exit_signals' 'tcp_add_backlog' 'ksys_read' 'atime_needs_update' 'commit_echoes' 'run_timer_softirq' 'ext4_free_inode' '__wb_update_bandwidth' '__skb_try_recv_from_queue' 'ktime_get_real_seconds' 'dput' 'tick_sched_do_timer' 'ext4_has_free_clusters' 'p9_client_cb' 'virtqueue_disable_cb' 'dd_has_work' 'poll_schedule_timeout' 'do_signal_stop' 'sit_tunnel_xmit' 'clean_buffers' 17:52:54 executing program 0: 17:52:54 executing program 1: [ 275.740829][ T7619] IPVS: ftp: loaded support on port[0] = 21 [ 275.840903][ T7619] chnl_net:caif_netlink_parms(): no params data found [ 275.895608][ T7619] bridge0: port 1(bridge_slave_0) entered blocking state [ 275.902719][ T7619] bridge0: port 1(bridge_slave_0) entered disabled state [ 275.914688][ T7619] device bridge_slave_0 entered promiscuous mode [ 275.923142][ T7619] bridge0: port 2(bridge_slave_1) entered blocking state [ 275.930725][ T7619] bridge0: port 2(bridge_slave_1) entered disabled state [ 275.939199][ T7619] device bridge_slave_1 entered promiscuous mode [ 275.950943][ T7622] IPVS: ftp: loaded support on port[0] = 21 [ 275.972482][ T7619] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link 17:52:54 executing program 2: [ 275.992863][ T7619] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 276.041538][ T7619] team0: Port device team_slave_0 added [ 276.048815][ T7619] team0: Port device team_slave_1 added [ 276.137349][ T7619] device hsr_slave_0 entered promiscuous mode [ 276.185596][ T7619] device hsr_slave_1 entered promiscuous mode 17:52:54 executing program 3: [ 276.242298][ T7625] IPVS: ftp: loaded support on port[0] = 21 [ 276.254954][ T7622] chnl_net:caif_netlink_parms(): no params data found [ 276.360672][ T7619] bridge0: port 2(bridge_slave_1) entered blocking state [ 276.367829][ T7619] bridge0: port 2(bridge_slave_1) entered forwarding state [ 276.375097][ T7619] bridge0: port 1(bridge_slave_0) entered blocking state [ 276.382287][ T7619] bridge0: port 1(bridge_slave_0) entered forwarding state [ 276.630385][ T7622] bridge0: port 1(bridge_slave_0) entered blocking state [ 276.639321][ T7622] bridge0: port 1(bridge_slave_0) entered disabled state [ 276.666081][ T7622] device bridge_slave_0 entered promiscuous mode [ 276.711996][ T7649] IPVS: ftp: loaded support on port[0] = 21 [ 276.761044][ T7622] bridge0: port 2(bridge_slave_1) entered blocking state [ 276.786328][ T7622] bridge0: port 2(bridge_slave_1) entered disabled state [ 276.805370][ T7622] device bridge_slave_1 entered promiscuous mode [ 276.831145][ T7619] 8021q: adding VLAN 0 to HW filter on device bond0 [ 276.898370][ T26] bridge0: port 1(bridge_slave_0) entered disabled state [ 276.935461][ T26] bridge0: port 2(bridge_slave_1) entered disabled state 17:52:55 executing program 4: [ 276.955781][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 277.048117][ T7622] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 277.085478][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 277.093227][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 277.125926][ T7625] chnl_net:caif_netlink_parms(): no params data found [ 277.138407][ T7622] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 277.176440][ T7619] 8021q: adding VLAN 0 to HW filter on device team0 [ 277.230077][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 277.252509][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 277.286597][ T26] bridge0: port 1(bridge_slave_0) entered blocking state [ 277.293703][ T26] bridge0: port 1(bridge_slave_0) entered forwarding state [ 277.326701][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 277.356495][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 277.386650][ T26] bridge0: port 2(bridge_slave_1) entered blocking state [ 277.393717][ T26] bridge0: port 2(bridge_slave_1) entered forwarding state [ 277.436289][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 277.495718][ T7655] IPVS: ftp: loaded support on port[0] = 21 [ 277.511112][ T7622] team0: Port device team_slave_0 added [ 277.527195][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 277.556993][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 277.586890][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 277.606808][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 277.636208][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 277.667253][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 277.696637][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 277.729151][ T7619] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 277.756306][ T7619] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready 17:52:56 executing program 5: [ 277.774803][ T7622] team0: Port device team_slave_1 added [ 277.789838][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 277.801127][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 277.826749][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 277.863141][ T7625] bridge0: port 1(bridge_slave_0) entered blocking state [ 277.870599][ T7625] bridge0: port 1(bridge_slave_0) entered disabled state [ 277.879886][ T7625] device bridge_slave_0 entered promiscuous mode [ 277.897472][ T7619] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 277.933272][ T3016] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 277.943301][ T3016] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 277.951555][ T7625] bridge0: port 2(bridge_slave_1) entered blocking state [ 277.958665][ T7625] bridge0: port 2(bridge_slave_1) entered disabled state [ 277.966544][ T7625] device bridge_slave_1 entered promiscuous mode [ 277.979083][ T7649] chnl_net:caif_netlink_parms(): no params data found [ 278.037671][ T7622] device hsr_slave_0 entered promiscuous mode [ 278.095626][ T7622] device hsr_slave_1 entered promiscuous mode [ 278.165343][ T7622] debugfs: Directory 'hsr0' with parent '/' already present! [ 278.189767][ T7625] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 278.205967][ T7666] IPVS: ftp: loaded support on port[0] = 21 [ 278.287424][ T7625] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 278.344614][ T7655] chnl_net:caif_netlink_parms(): no params data found [ 278.456272][ T7649] bridge0: port 1(bridge_slave_0) entered blocking state [ 278.466502][ T7649] bridge0: port 1(bridge_slave_0) entered disabled state 17:52:57 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000480)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/raw6\x00') sendfile(r1, r2, 0x0, 0x40) [ 278.497180][ T7649] device bridge_slave_0 entered promiscuous mode [ 278.521728][ T7622] 8021q: adding VLAN 0 to HW filter on device bond0 [ 278.546475][ T7625] team0: Port device team_slave_0 added [ 278.559265][ T7649] bridge0: port 2(bridge_slave_1) entered blocking state [ 278.575671][ T7649] bridge0: port 2(bridge_slave_1) entered disabled state [ 278.583450][ T7649] device bridge_slave_1 entered promiscuous mode [ 278.643261][ T7622] 8021q: adding VLAN 0 to HW filter on device team0 [ 278.676415][ T7625] team0: Port device team_slave_1 added [ 278.688203][ T2936] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 278.705778][ T2936] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 278.728633][ T7655] bridge0: port 1(bridge_slave_0) entered blocking state 17:52:57 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x13, r0, 0x0) pipe(0x0) [ 278.739134][ T7655] bridge0: port 1(bridge_slave_0) entered disabled state [ 278.767554][ T7655] device bridge_slave_0 entered promiscuous mode [ 278.840552][ T7649] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 278.940890][ T7655] bridge0: port 2(bridge_slave_1) entered blocking state [ 278.950376][ T7655] bridge0: port 2(bridge_slave_1) entered disabled state 17:52:57 executing program 0: r0 = openat$dsp(0xffffffffffffff9c, 0x0, 0x0, 0x0) waitid(0x0, 0x0, &(0x7f0000000040), 0x0, 0x0) r1 = syz_open_dev$sg(0x0, 0x0, 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x60000008, 0x0) mprotect(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000240)='\x00\xc3\t\xbb\x0f\xac\x03,') getdents64(r2, &(0x7f0000000df0)=""/528, 0xfe06) r3 = gettid() writev(r1, &(0x7f0000000180)=[{&(0x7f0000000100)="99b9dfb3498773c05370ecb85f697dd286c8ef421ac7736439e02e01962fb97b50efb4b98a3d0fea564d9b7119a55aae2e5a58dda7dd731bad73e5dd23eeaf6da6e3104fd9024496fcb028c323733ea1a11567569ebd4e7ea6831ae0aa165e0be8020fbe09f0a58873e5b5013881c0702ea87d882469be", 0x77}, {&(0x7f0000000000)="01cb5177ad70a64432543fbd0c84cedb3a66661376d74145a75fcccf087091e8d812cb5cb7", 0x25}], 0x2) tkill(r3, 0x3f) ioctl$int_in(r0, 0x8010500c, &(0x7f0000000080)) [ 278.986389][ T7655] device bridge_slave_1 entered promiscuous mode [ 279.006704][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 279.025393][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 279.057596][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 279.064746][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state 17:52:57 executing program 0: r0 = openat$dsp(0xffffffffffffff9c, 0x0, 0x0, 0x0) waitid(0x0, 0x0, &(0x7f0000000040), 0x0, 0x0) r1 = syz_open_dev$sg(0x0, 0x0, 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x60000008, 0x0) mprotect(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000240)='\x00\xc3\t\xbb\x0f\xac\x03,') getdents64(r2, &(0x7f0000000df0)=""/528, 0xfe06) r3 = gettid() writev(r1, &(0x7f0000000180)=[{&(0x7f0000000100)="99b9dfb3498773c05370ecb85f697dd286c8ef421ac7736439e02e01962fb97b50efb4b98a3d0fea564d9b7119a55aae2e5a58dda7dd731bad73e5dd23eeaf6da6e3104fd9024496fcb028c323733ea1a11567569ebd4e7ea6831ae0aa165e0be8020fbe09f0a58873e5b5013881c0702ea87d882469be", 0x77}, {&(0x7f0000000000)="01cb5177ad70a64432543fbd0c84cedb3a66661376d74145a75fcccf087091e8d812cb5cb7", 0x25}], 0x2) tkill(r3, 0x3f) ioctl$int_in(r0, 0x8010500c, &(0x7f0000000080)) [ 279.117049][ T7649] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 279.187235][ T7625] device hsr_slave_0 entered promiscuous mode [ 279.215629][ T7625] device hsr_slave_1 entered promiscuous mode [ 279.255319][ T7625] debugfs: Directory 'hsr0' with parent '/' already present! [ 279.273149][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready 17:52:57 executing program 0: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x0) flistxattr(r0, 0x0, 0x0) [ 279.295836][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 279.328532][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 279.378187][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 279.385283][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 279.398184][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 279.443505][ T7622] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 279.475277][ T7622] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network 17:52:58 executing program 0: r0 = syz_open_dev$vbi(&(0x7f00000000c0)='/dev/vbi#\x00', 0x1, 0x2) write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000140)={0xf, 0x8}, 0x10) [ 279.535643][ T7650] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 279.545170][ T7650] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 279.608634][ T7650] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 279.631668][ T7650] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 279.676089][ T7650] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 279.698212][ T7650] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready 17:52:58 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000480)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/raw6\x00') sendfile(r1, r2, 0x0, 0xa3) [ 279.738166][ T7650] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 279.768950][ T7650] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 279.818000][ T7650] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 279.846408][ T7622] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 279.862389][ T7666] chnl_net:caif_netlink_parms(): no params data found [ 279.907305][ T7655] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 279.946202][ T7649] team0: Port device team_slave_0 added [ 279.958488][ T7649] team0: Port device team_slave_1 added [ 279.978283][ T7650] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 279.986736][ T7650] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 280.045873][ T7650] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 280.053329][ T7650] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 280.100593][ T7655] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 280.250496][ T7649] device hsr_slave_0 entered promiscuous mode [ 280.315524][ T7649] device hsr_slave_1 entered promiscuous mode [ 280.335380][ T7649] debugfs: Directory 'hsr0' with parent '/' already present! [ 280.343356][ T7666] bridge0: port 1(bridge_slave_0) entered blocking state [ 280.355328][ T7666] bridge0: port 1(bridge_slave_0) entered disabled state [ 280.363425][ T7666] device bridge_slave_0 entered promiscuous mode [ 280.396493][ T7666] bridge0: port 2(bridge_slave_1) entered blocking state [ 280.403572][ T7666] bridge0: port 2(bridge_slave_1) entered disabled state [ 280.456112][ T7666] device bridge_slave_1 entered promiscuous mode [ 280.486511][ T7666] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 280.539292][ T7655] team0: Port device team_slave_0 added [ 280.591234][ T7666] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 280.652076][ T7666] team0: Port device team_slave_0 added [ 280.680423][ T7655] team0: Port device team_slave_1 added [ 280.806807][ T7666] team0: Port device team_slave_1 added [ 280.823629][ T7625] 8021q: adding VLAN 0 to HW filter on device bond0 [ 280.890661][ T7655] device hsr_slave_0 entered promiscuous mode 17:52:59 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000a00)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000a40)=@ipv6_newroute={0x20, 0x18, 0xc828de00cc83eded, 0x0, 0x0, {0xa, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, [@RTA_METRICS={0x4}]}, 0x20}}, 0x0) [ 281.005581][ T7655] device hsr_slave_1 entered promiscuous mode [ 281.038659][ T7655] debugfs: Directory 'hsr0' with parent '/' already present! [ 281.143635][ T7625] 8021q: adding VLAN 0 to HW filter on device team0 [ 281.170771][ T7649] 8021q: adding VLAN 0 to HW filter on device bond0 [ 281.206704][ T7741] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 281.242843][ T7741] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 281.337519][ T7666] device hsr_slave_0 entered promiscuous mode [ 281.375623][ T7666] device hsr_slave_1 entered promiscuous mode [ 281.445304][ T7666] debugfs: Directory 'hsr0' with parent '/' already present! [ 281.539606][ T7650] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 281.572319][ T7650] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 281.659228][ T7650] bridge0: port 1(bridge_slave_0) entered blocking state [ 281.666340][ T7650] bridge0: port 1(bridge_slave_0) entered forwarding state [ 281.756101][ T7650] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 281.815854][ T7650] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 281.895570][ T7650] bridge0: port 2(bridge_slave_1) entered blocking state [ 281.902685][ T7650] bridge0: port 2(bridge_slave_1) entered forwarding state [ 281.996078][ T7650] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 282.066186][ T7650] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 282.136135][ T7649] 8021q: adding VLAN 0 to HW filter on device team0 [ 282.154491][ T7625] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 282.250499][ T7625] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 282.330543][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 282.358580][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 282.408584][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 282.468327][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 282.545943][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 282.554700][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 282.675997][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 282.738754][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 282.795763][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 282.851372][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 282.914562][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 283.039339][ T7741] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 283.068900][ T7741] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 283.115949][ T7741] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 283.185881][ T7741] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 283.255589][ T7741] bridge0: port 1(bridge_slave_0) entered blocking state [ 283.262655][ T7741] bridge0: port 1(bridge_slave_0) entered forwarding state [ 283.335691][ T7741] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 283.395750][ T7741] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 283.448191][ T7741] bridge0: port 2(bridge_slave_1) entered blocking state [ 283.455280][ T7741] bridge0: port 2(bridge_slave_1) entered forwarding state [ 283.538198][ T7741] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 283.599268][ T7741] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 283.646249][ T7741] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 283.675976][ T7741] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 283.715795][ T7655] 8021q: adding VLAN 0 to HW filter on device bond0 [ 283.778208][ T7650] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 283.800011][ T7650] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 283.866045][ T7650] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 283.914816][ T7650] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 283.948401][ T7650] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 283.980429][ T7625] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 284.013592][ T7649] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 284.055269][ T7649] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 284.112246][ T7655] 8021q: adding VLAN 0 to HW filter on device team0 [ 284.128717][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 284.170813][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 284.205921][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 284.245853][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 284.288787][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 284.324593][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 284.350797][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 284.396642][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 284.443857][ T7650] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 284.476086][ T7650] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 284.507682][ T7650] bridge0: port 1(bridge_slave_0) entered blocking state [ 284.514764][ T7650] bridge0: port 1(bridge_slave_0) entered forwarding state [ 284.580973][ T7649] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 284.609982][ T2936] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 284.630258][ T2936] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 284.660070][ T2936] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 284.686795][ T2936] bridge0: port 2(bridge_slave_1) entered blocking state [ 284.693857][ T2936] bridge0: port 2(bridge_slave_1) entered forwarding state [ 284.738431][ T2936] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 284.759417][ T2936] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 284.779063][ T2936] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 284.798708][ T2936] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 284.818893][ T2936] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 284.835431][ T2936] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 284.881837][ T7655] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 284.955334][ T7655] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 284.993560][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 285.005560][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 285.035757][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready 17:53:03 executing program 2: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) sendmmsg(r0, &(0x7f000000cd00)=[{{&(0x7f0000000080)=@isdn={0x22, 0x0, 0x0, 0x1}, 0x80, 0x0}}, {{&(0x7f0000004800)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x80, 0x0}}], 0x2, 0x0) [ 285.056138][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 285.064693][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 285.092068][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 285.112778][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 285.178131][ T7666] 8021q: adding VLAN 0 to HW filter on device bond0 [ 285.187068][ T7655] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 285.194716][ T2936] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 285.208555][ T2936] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 285.226914][ T2936] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 285.259637][ T7666] 8021q: adding VLAN 0 to HW filter on device team0 17:53:03 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000a00)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000a40)=@ipv6_newroute={0x1c, 0x18, 0xc828de00cc83eded, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}}, 0x1c}}, 0x0) [ 285.315620][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 285.323726][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 285.376150][ T2936] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 285.386245][ T2936] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 285.406208][ T2936] bridge0: port 1(bridge_slave_0) entered blocking state [ 285.413280][ T2936] bridge0: port 1(bridge_slave_0) entered forwarding state [ 285.422067][ T2936] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 285.430902][ T2936] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 285.439981][ T2936] bridge0: port 2(bridge_slave_1) entered blocking state [ 285.447122][ T2936] bridge0: port 2(bridge_slave_1) entered forwarding state [ 285.455083][ T2936] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 285.464085][ T2936] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 285.472945][ T2936] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 285.481536][ T2936] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 285.490456][ T2936] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 285.499075][ T2936] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 285.511407][ T7666] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 285.522759][ T7666] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 285.535149][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 285.543818][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 285.552333][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 285.560805][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 285.569675][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 285.578452][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 285.587240][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready 17:53:04 executing program 4: [ 285.630196][ T7666] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 285.653209][ T7741] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 285.666427][ T7741] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready 17:53:04 executing program 5: 17:53:04 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"/783], &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r2 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x0) dup2(r2, r1) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd}, 0xd) 17:53:04 executing program 1: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000001c0)={'ip6gre0\x00', 0x0}) bind$packet(r0, &(0x7f0000000040)={0x11, 0x0, r1}, 0x14) sendmmsg(r0, &(0x7f0000000d00), 0x1bdd307, 0x0) 17:53:04 executing program 2: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="b40f977c6e1f147b612cfb3a"], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) 17:53:04 executing program 3: r0 = syz_open_dev$sndctrl(&(0x7f0000000180)='/dev/snd/controlC#\x00', 0x20, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r0, 0xc10c5541, &(0x7f0000000400)={0x0, 0x2}) 17:53:04 executing program 4: [ 285.857670][ T7901] libceph: resolve '´—|n{a' (ret=-3): failed [ 285.892246][ T7908] libceph: resolve '´—|n{a' (ret=-3): failed 17:53:04 executing program 2: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="b40f977c6e1f147b612cfb3a"], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) 17:53:04 executing program 3: [ 285.906131][ T7901] libceph: parse_ips bad ip '´—|n{a,û' [ 285.917403][ T7908] libceph: parse_ips bad ip '´—|n{a,û' 17:53:04 executing program 1: 17:53:04 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"/783], &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r2 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x0) dup2(r2, r1) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd}, 0xd) 17:53:04 executing program 4: 17:53:04 executing program 5: [ 286.077925][ T7918] libceph: resolve '´—|n{a' (ret=-3): failed [ 286.111638][ T7918] libceph: parse_ips bad ip '´—|n{a,û' 17:53:04 executing program 2: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="b40f977c6e1f147b612cfb3a"], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) 17:53:04 executing program 3: 17:53:04 executing program 4: 17:53:04 executing program 1: 17:53:04 executing program 0: [ 286.310722][ T7928] libceph: resolve '´—|n{a' (ret=-3): failed [ 286.338938][ T7928] libceph: parse_ips bad ip '´—|n{a,û' 17:53:04 executing program 2: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="b40f977c6e1f147b612cfb3a"], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) 17:53:04 executing program 5: 17:53:05 executing program 1: 17:53:05 executing program 4: 17:53:05 executing program 3: 17:53:05 executing program 0: 17:53:05 executing program 2: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x1) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="b40f977c6e1f147b612cfb3a"], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) 17:53:05 executing program 5: [ 286.581850][ T7945] libceph: resolve '´—|n{a' (ret=-3): failed [ 286.615425][ T7945] libceph: parse_ips bad ip '´—|n{a,û' 17:53:05 executing program 4: 17:53:05 executing program 1: 17:53:05 executing program 0: 17:53:05 executing program 3: [ 286.776426][ T7956] libceph: resolve '´—|n{a' (ret=-3): failed [ 286.843018][ T7956] libceph: parse_ips bad ip '´—|n{a,û' 17:53:05 executing program 4: 17:53:05 executing program 5: 17:53:05 executing program 2: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x1) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="b40f977c6e1f147b612cfb3a"], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) 17:53:05 executing program 1: 17:53:05 executing program 3: 17:53:05 executing program 5: [ 287.085932][ T7971] libceph: resolve '´—|n{a' (ret=-3): failed [ 287.125161][ T7971] libceph: parse_ips bad ip '´—|n{a,û' 17:53:05 executing program 0: 17:53:05 executing program 3: 17:53:05 executing program 2: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x1) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="b40f977c6e1f147b612cfb3a"], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) 17:53:05 executing program 4: 17:53:05 executing program 1: 17:53:05 executing program 3: 17:53:05 executing program 0: [ 287.387044][ T7985] libceph: resolve '´—|n{a' (ret=-3): failed [ 287.416851][ T7985] libceph: parse_ips bad ip '´—|n{a,û' 17:53:06 executing program 5: 17:53:06 executing program 1: 17:53:06 executing program 4: 17:53:06 executing program 2: clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="b40f977c6e1f147b612cfb3a"], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) 17:53:06 executing program 3: 17:53:06 executing program 0: 17:53:06 executing program 4: 17:53:06 executing program 5: 17:53:06 executing program 1: 17:53:06 executing program 2: clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="b40f977c6e1f147b612cfb3a"], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) 17:53:06 executing program 0: 17:53:06 executing program 3: 17:53:06 executing program 4: 17:53:06 executing program 2: clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="b40f977c6e1f147b612cfb3a"], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) 17:53:06 executing program 1: 17:53:06 executing program 5: 17:53:06 executing program 4: 17:53:06 executing program 3: 17:53:06 executing program 0: 17:53:06 executing program 1: 17:53:06 executing program 5: 17:53:06 executing program 4: 17:53:06 executing program 0: 17:53:07 executing program 2: mknod$loop(0x0, 0x0, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="b40f977c6e1f147b612cfb3a"], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) 17:53:07 executing program 1: 17:53:07 executing program 3: 17:53:07 executing program 2: mknod$loop(0x0, 0x0, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="b40f977c6e1f147b612cfb3a"], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) 17:53:07 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x200000002, 0x0) bind$inet(r1, &(0x7f00000002c0)={0x2, 0x20000004e21, @multicast1}, 0x10) setsockopt$inet_udp_encap(r1, 0x11, 0x64, &(0x7f0000000000)=0x2, 0x4) syz_emit_ethernet(0x3e, &(0x7f0000000140)={@random="ed87a0b3e4bb", @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @multicast1}, @udp={0x0, 0x4e21, 0x1c, 0x0, [@guehdr={0x2, 0x0, 0x0, 0x0, 0x0, [0x0]}, @guehdr={0x1}], "fd50dbeec0102864"}}}}}, 0x0) 17:53:07 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f0000000480)=ANY=[@ANYBLOB="b7000000a5510700bfa30000000000001503000028feffff720af0fff8ffffff71a4f0ff00000000b706000001edff9fbd400200000000000406000001ed000071185400000000002d640000000000006a0a00fe00000000850000002e000000b70000000c0000009500000000000000023bc065b7a379d179fc9e94af69912461917adef6ee1c8a2b4f8ef1e50beca090f32050e436fe275daf11efd601b63f01c8e8b1b5e4fef3bef7054815ae98743d1ace4c46631256dd19aed0d600c095199fe3ff3128e599b0eaeba9d940a891b2a0cefc646cb77900000000000000ae296d8c52aa82d363c137cb06f21d21904dc057cab7f05e2fc3c012a7a32174c55e4e49e76abfae187fc0b6a93bdaa76741df1c00400ae9be59695ff5f7dcfa7bb6acf5f9acdc8441c90d67383ff16de9903906102558a545a1daca016584773566c38f9c807ffc336165d76412ab4ab5f114de340de85d8d7c4c292d3bfa0a9f108b138735b5135ea1efc7a3d5ac759e4a6802dba8aec3de336dec4170d72ece4d57207b02f6264061104202e302005eb2671867f37eb15c4d180db5d907f7c8ed79945b0b87b29fe3a64bd0471b66b2cae69dca19a040c6e115b25bba81216963f09fb2d177287d48ad123b30"], &(0x7f00000001c0)='\x00\xf1)\r*\xbbzL\x8e7\x9e\xaa\xb3y\xb9\xfa!\xad!\xb4\xd4\x94\xa0\x86\xcf\x12#\xb4\xd3n$\x85\x06k\xb2\xf9\xd5\"\xfe\x86 \b\x7f\xe8\x8a\xcf\x89\x9b\xbaR]\xf5{J\x84\x15\xf9)\xf3\xc8\xd5`\xe6\xe6\x9eI\x02\xce\x1fI\xa8w\xc3#\xba\xf5\xe9\xea>\xc7\xab2,\xa0\x84t\xce\x04Tf\xc5\xfe`\'\x9b\xe2MH%\x93\x028\xcb\x0f\xdb\x16\xe2l\x80\xe6\xcd\xceW\x01SS-o`X\xf6\xa4\xc1|\xbe\xc4\xf0\xac1zp\xc9\x89\xef.\xa4\x91\xb4\xf3('}, 0x48) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup(r0) r2 = accept4$inet6(r1, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, &(0x7f0000000280)=0x1c, 0x180000) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$nl_route_sched(r1, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0xe9e8a68ccea1958f}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=@deltaction={0x28, 0x31, 0x1, 0x70bd2a, 0x25dfdbff, {}, [@TCA_ACT_TAB={0x14, 0x1, [{0x10, 0x16, @TCA_ACT_INDEX={0x8, 0x3, 0x8b7}}]}]}, 0x28}, 0x1, 0x0, 0x0, 0x2ed43eaa6f3eea}, 0x10) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r3, 0x0, 0x0, 0x0, 0x0, 0xb2) fgetxattr(r2, &(0x7f00000002c0)=@random={'trusted.', '\x00\xf1)\r*\xbbzL\x8e7\x9e\xaa\xb3y\xb9\xfa!\xad!\xb4\xd4\x94\xa0\x86\xcf\x12#\xb4\xd3n$\x85\x06k\xb2\xf9\xd5\"\xfe\x86 \b\x7f\xe8\x8a\xcf\x89\x9b\xbaR]\xf5{J\x84\x15\xf9)\xf3\xc8\xd5`\xe6\xe6\x9eI\x02\xce\x1fI\xa8w\xc3#\xba\xf5\xe9\xea>\xc7\xab2,\xa0\x84t\xce\x04Tf\xc5\xfe`\'\x9b\xe2MH%\x93\x028\xcb\x0f\xdb\x16\xe2l\x80\xe6\xcd\xceW\x01SS-o`X\xf6\xa4\xc1|\xbe\xc4\xf0\xac1zp\xc9\x89\xef.\xa4\x91\xb4\xf3('}, &(0x7f0000000380)=""/103, 0x67) write$P9_RATTACH(r1, &(0x7f0000000140)={0x14, 0x69, 0x1, {0x8, 0x4}}, 0x14) 17:53:07 executing program 5: clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(&(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) write(r0, &(0x7f0000000340), 0x41395662) r1 = gettid() tkill(r1, 0x25) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={r1, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) 17:53:07 executing program 1: mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='tmpfs\x00', 0x0, 0x0) chdir(0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r0) mkdir(&(0x7f0000000440)='./file1\x00', 0x0) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) mknod$loop(&(0x7f0000000000)='.//ile0\x00', 0x0, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000400)='/dev/vcsa#\x00', 0xc8, 0x0) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000d40)='TIPCv2\x00') sendmsg$TIPC_NL_MON_GET(r1, &(0x7f0000000ec0)={0x0, 0x0, &(0x7f0000000e80)={&(0x7f0000000d80)={0xbc, r2, 0x400, 0x70bd26, 0x25dfdbfb, {}, [@TIPC_NLA_LINK={0xa8, 0x4, [@TIPC_NLA_LINK_PROP={0x44, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x19}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7ff}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xa}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xffff}]}, @TIPC_NLA_LINK_PROP={0x34, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x13}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x20}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1a}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x7}, @TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x20}]}, @TIPC_NLA_LINK_PROP={0x2c, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1d}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x24f9}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}]}]}]}, 0xbc}, 0x1, 0x0, 0x0, 0x1400005c}, 0x240009c4) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) renameat(r3, &(0x7f0000000180)='.//ile0\x00', r3, &(0x7f00000007c0)='./file0/f.le.\x00') 17:53:07 executing program 3: setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000002180), 0x3c3) socket$inet6(0xa, 0x2, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x13, 0x0, &(0x7f0000000280)) r2 = perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r2, 0x0) r3 = gettid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={r3, 0xffffffffffffffff, 0x0, 0x4, &(0x7f0000000200)='wlc\x00'}, 0x30) ptrace$cont(0x20, r4, 0x3, 0x7) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x4000, 0x60) syz_open_procfs(0x0, 0x0) setsockopt$IP_VS_SO_SET_DEL(0xffffffffffffffff, 0x0, 0x484, &(0x7f0000000140)={0x32, @local, 0x800, 0x0, 'wlc\x00', 0x2, 0x0, 0x28}, 0x2c) r5 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r5, &(0x7f00000002c0)=ANY=[@ANYBLOB="2321202e2f66696c65301a92137e67d9c0890e1641b0adfe7bcbff71c7d1cd6c70b3e2430802a6fa06ac7cc79b9699e95dd53c7828b054d1ebd54eef94d79231f2dddfee533c4493b9cdb39bbf3c0980da4b7722cfaaa3732ae36e35a2626ddb7e6fcc0f7a91"], 0xa) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r0, 0x29, 0xd3, &(0x7f00000000c0)={{0xa, 0x4e20, 0x2d4, @mcast1, 0x7}, {0xa, 0x4e20, 0x502f, @remote, 0x7}, 0x3000, [0x340, 0x9, 0x8001, 0x20, 0x5, 0x5, 0xffffff80]}, 0x5c) close(r5) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) getpid() r6 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r6, 0x11b, 0x4, &(0x7f00000000c0)={&(0x7f0000000000)=""/5, 0x222000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(r6, 0x11b, 0x5, &(0x7f00000004c0)=0x80, 0x4) setsockopt$XDP_RX_RING(r6, 0x11b, 0x2, &(0x7f0000000040)=0x80, 0x4) r7 = socket(0x100000000011, 0x2, 0x0) bind(r7, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r7, &(0x7f0000000240)={0x11, 0x0, 0x0}, &(0x7f00000002c0)=0xff55) setsockopt$XDP_UMEM_COMPLETION_RING(r6, 0x11b, 0x6, &(0x7f00000001c0)=0x400, 0x4) bind$xdp(r6, &(0x7f0000000900)={0x2c, 0x0, r8}, 0x10) stat(&(0x7f00000007c0)='./file1\x00', &(0x7f0000000800)) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c80, 0x0) ioctl$RTC_PLL_GET(0xffffffffffffffff, 0x801c7011, &(0x7f00000001c0)) setgid(0x0) ptrace(0x10, 0x0) 17:53:07 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="480000002400070500"/20, @ANYRES32=r3, @ANYBLOB="00000400f1ffffff0000000008000100687462001c0002001000020003000000000104f0b047c752ce2e000000000000ce204b707596906260a7cefc"], 0x48}}, 0x0) [ 288.826246][ T8070] overlayfs: conflicting lowerdir path 17:53:07 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) recvmmsg(r0, &(0x7f0000003480)=[{{0x0, 0x0, &(0x7f0000002700)=[{&(0x7f0000001240)=""/75, 0x4b}], 0x1}}], 0x330, 0x3f00, 0x0) shutdown(r0, 0x0) setsockopt$sock_int(r0, 0x1, 0x7, &(0x7f0000000300), 0x4) 17:53:07 executing program 2: mknod$loop(0x0, 0x0, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="b40f977c6e1f147b612cfb3a"], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) 17:53:07 executing program 5: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000740)='/dev/uhid\x00', 0x2, 0x0) write$UHID_INPUT2(r0, &(0x7f0000000780), 0x6) [ 288.964709][ T8076] overlayfs: workdir and upperdir must reside under the same mount 17:53:07 executing program 5: writev(0xffffffffffffffff, 0x0, 0x0) write$P9_RSTATFS(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) sched_setaffinity(0x0, 0x0, 0x0) ioctl$KVM_GET_LAPIC(0xffffffffffffffff, 0x8400ae8e, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(&(0x7f00000005c0)='./file1\x00', 0x0) readlinkat(0xffffffffffffffff, 0x0, &(0x7f00000001c0)=""/38, 0x26) getpgrp(0x0) r0 = syz_open_procfs(0x0, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, 0x0) setpriority(0x0, 0x0, 0xffff) pidfd_send_signal(0xffffffffffffffff, 0x7, 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 17:53:07 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) setsockopt$bt_l2cap_L2CAP_LM(r0, 0x6, 0x3, &(0x7f00000000c0)=0x1, 0x4) 17:53:07 executing program 1: mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='tmpfs\x00', 0x0, 0x0) chdir(0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r0) mkdir(&(0x7f0000000440)='./file1\x00', 0x0) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) mknod$loop(&(0x7f0000000000)='.//ile0\x00', 0x0, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000400)='/dev/vcsa#\x00', 0xc8, 0x0) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000d40)='TIPCv2\x00') sendmsg$TIPC_NL_MON_GET(r1, &(0x7f0000000ec0)={0x0, 0x0, &(0x7f0000000e80)={&(0x7f0000000d80)={0xbc, r2, 0x400, 0x70bd26, 0x25dfdbfb, {}, [@TIPC_NLA_LINK={0xa8, 0x4, [@TIPC_NLA_LINK_PROP={0x44, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x19}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7ff}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xa}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xffff}]}, @TIPC_NLA_LINK_PROP={0x34, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x13}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x20}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1a}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x7}, @TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x20}]}, @TIPC_NLA_LINK_PROP={0x2c, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1d}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x24f9}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}]}]}]}, 0xbc}, 0x1, 0x0, 0x0, 0x1400005c}, 0x240009c4) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) renameat(r3, &(0x7f0000000180)='.//ile0\x00', r3, &(0x7f00000007c0)='./file0/f.le.\x00') 17:53:07 executing program 0: sendmmsg$alg(0xffffffffffffffff, &(0x7f0000009700)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000170100000300000000000000000000001800000000000008170100000300000000000000000000dfa8000000000000001701000002000000940000007bf65fdc2a7c14581acb4e0e07aa04af59d74d0faeebc7a79b848803a04c73af1f3adb6648440daacb12eefe0741fdb5e0ca841d5fffa06c9e7fd2b09cbb4fd1faedf73265ba8c9ac9800c981255b3f7707f730f99acf38551ebb8397ffd3adc521caddb529366498b373b24be5b7db8730bb9ab8213a2b64e495143bb72c198aff301b3bf291ff67657fc33b942ac5a77cd00db5a9a593f76"], 0xdd}], 0x1, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_REGISTER_COALESCED_MMIO(0xffffffffffffffff, 0x4010ae67, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0xfefd, 0x0, 0x0, 0xfffffffffffffd9c) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000), 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 289.133876][ C0] hrtimer: interrupt took 61687 ns 17:53:07 executing program 2: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x1) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="b40f977c6e1f147b612cfb3a"], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) 17:53:07 executing program 3: setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000002180), 0x3c3) socket$inet6(0xa, 0x2, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x13, 0x0, &(0x7f0000000280)) r2 = perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r2, 0x0) r3 = gettid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={r3, 0xffffffffffffffff, 0x0, 0x4, &(0x7f0000000200)='wlc\x00'}, 0x30) ptrace$cont(0x20, r4, 0x3, 0x7) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x4000, 0x60) syz_open_procfs(0x0, 0x0) setsockopt$IP_VS_SO_SET_DEL(0xffffffffffffffff, 0x0, 0x484, &(0x7f0000000140)={0x32, @local, 0x800, 0x0, 'wlc\x00', 0x2, 0x0, 0x28}, 0x2c) r5 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r5, &(0x7f00000002c0)=ANY=[@ANYBLOB="2321202e2f66696c65301a92137e67d9c0890e1641b0adfe7bcbff71c7d1cd6c70b3e2430802a6fa06ac7cc79b9699e95dd53c7828b054d1ebd54eef94d79231f2dddfee533c4493b9cdb39bbf3c0980da4b7722cfaaa3732ae36e35a2626ddb7e6fcc0f7a91"], 0xa) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r0, 0x29, 0xd3, &(0x7f00000000c0)={{0xa, 0x4e20, 0x2d4, @mcast1, 0x7}, {0xa, 0x4e20, 0x502f, @remote, 0x7}, 0x3000, [0x340, 0x9, 0x8001, 0x20, 0x5, 0x5, 0xffffff80]}, 0x5c) close(r5) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) getpid() r6 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r6, 0x11b, 0x4, &(0x7f00000000c0)={&(0x7f0000000000)=""/5, 0x222000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(r6, 0x11b, 0x5, &(0x7f00000004c0)=0x80, 0x4) setsockopt$XDP_RX_RING(r6, 0x11b, 0x2, &(0x7f0000000040)=0x80, 0x4) r7 = socket(0x100000000011, 0x2, 0x0) bind(r7, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r7, &(0x7f0000000240)={0x11, 0x0, 0x0}, &(0x7f00000002c0)=0xff55) setsockopt$XDP_UMEM_COMPLETION_RING(r6, 0x11b, 0x6, &(0x7f00000001c0)=0x400, 0x4) bind$xdp(r6, &(0x7f0000000900)={0x2c, 0x0, r8}, 0x10) stat(&(0x7f00000007c0)='./file1\x00', &(0x7f0000000800)) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c80, 0x0) ioctl$RTC_PLL_GET(0xffffffffffffffff, 0x801c7011, &(0x7f00000001c0)) setgid(0x0) ptrace(0x10, 0x0) 17:53:07 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) setsockopt$bt_l2cap_L2CAP_LM(r0, 0x6, 0x3, &(0x7f0000006d40)=0x20, 0x4) [ 289.320793][ T8117] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. 17:53:08 executing program 3: r0 = socket(0x18, 0x1, 0x0) fcntl$lock(0xffffffffffffffff, 0x0, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) setsockopt(r0, 0x1000000029, 0x2e, &(0x7f0000000000)="ebffcbff13b9fd812eaa4e713048e69931929648", 0x14) [ 289.389041][ T8115] libceph: resolve '´—|n{a' (ret=-3): failed [ 289.409066][ T8120] overlayfs: conflicting lowerdir path [ 289.420817][ T8115] libceph: parse_ips bad ip '´—|n{a,û' 17:53:08 executing program 2: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x1) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="b40f977c6e1f147b612cfb3a"], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) 17:53:08 executing program 1: r0 = openat$dsp(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x60000008, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='\x00\xc3\t\xbb\x0f\xac\x03,') getdents64(r1, &(0x7f0000000df0)=""/528, 0xfe06) r2 = gettid() writev(0xffffffffffffffff, &(0x7f0000000180)=[{0x0}, {}], 0x2) tkill(r2, 0x3f) ioctl$int_in(r0, 0x8010500c, 0x0) 17:53:08 executing program 0: sendmmsg$alg(0xffffffffffffffff, &(0x7f0000009700)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000170100000300000000000000000000001800000000000008170100000300000000000000000000dfa8000000000000001701000002000000940000007bf65fdc2a7c14581acb4e0e07aa04af59d74d0faeebc7a79b848803a04c73af1f3adb6648440daacb12eefe0741fdb5e0ca841d5fffa06c9e7fd2b09cbb4fd1faedf73265ba8c9ac9800c981255b3f7707f730f99acf38551ebb8397ffd3adc521caddb529366498b373b24be5b7db8730bb9ab8213a2b64e495143bb72c198aff301b3bf291ff67657fc33b942ac5a77cd00db5a9a593f76"], 0xdd}], 0x1, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_REGISTER_COALESCED_MMIO(0xffffffffffffffff, 0x4010ae67, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0xfefd, 0x0, 0x0, 0xfffffffffffffd9c) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000), 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 17:53:08 executing program 4: waitid(0x0, 0x0, 0x0, 0x0, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x60000008, 0x0) mprotect(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='\x00\xc3\t\xbb\x0f\xac\x03,') getdents64(r0, &(0x7f0000000df0)=""/528, 0xfe06) r1 = gettid() tkill(r1, 0x3f) ioctl$int_in(0xffffffffffffffff, 0x0, &(0x7f0000000080)) 17:53:08 executing program 5: openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x84002, 0x0) 17:53:08 executing program 1: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dsp\x00', 0x0, 0x0) waitid(0x0, 0x0, &(0x7f0000000040), 0x0, 0x0) r1 = syz_open_dev$sg(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x60000008, 0x0) mprotect(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000240)='\x00\xc3\t\xbb\x0f\xac\x03,') getdents64(r2, &(0x7f0000000df0)=""/528, 0xfe06) gettid() writev(r1, &(0x7f0000000180)=[{&(0x7f0000000100)="99b9dfb3498773c05370ecb85f697dd286c8ef421ac7736439e02e01962fb97b50efb4b98a3d0fea564d9b7119a55aae2e5a58dda7dd731bad73e5dd23eeaf6da6e3104fd9024496fcb028c323733ea1a11567569ebd4e7ea6831ae0aa165e0be8020fbe09f0a58873e5b5013881c0702e", 0x71}, {&(0x7f0000000000)="01cb5177ad70a64432543fbd0c84cedb3a66661376d74145a7", 0x19}], 0x2) tkill(0x0, 0x3f) ioctl$int_in(r0, 0x8010500c, &(0x7f0000000080)) [ 289.700645][ T8141] libceph: resolve '´—|n{a' (ret=-3): failed 17:53:08 executing program 3: r0 = socket(0x18, 0x1, 0x0) fcntl$lock(0xffffffffffffffff, 0x0, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) setsockopt(r0, 0x1000000029, 0x2e, &(0x7f0000000000)="ebffcbff13b9fd812eaa4e713048e69931929648", 0x14) [ 289.760155][ T8141] libceph: parse_ips bad ip '´—|n{a,û' 17:53:08 executing program 2: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x1) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="b40f977c6e1f147b612cfb3a"], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) 17:53:08 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"/783], &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd}, 0xd) 17:53:08 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x50000}]}) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) 17:53:08 executing program 0: perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000300)='net/ip_vs_stats_percpu\x00') preadv(r0, &(0x7f0000000500)=[{&(0x7f0000000080)=""/102, 0x66}], 0x1, 0x0) 17:53:08 executing program 1: r0 = socket$inet(0x2, 0x0, 0x2) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x50, 0x0, &(0x7f0000000000)) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000240)='/dev/null\x00', 0x10000, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r1, 0x0, 0x48c, 0x0, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r1, 0x0, 0x60, &(0x7f0000000840)={'filter\x00', 0x7, 0x4, 0x488, 0x140, 0x280, 0x140, 0x3a0, 0x3a0, 0x3a0, 0x4, &(0x7f00000000c0), {[{{@uncond, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@mac=@remote, @empty, @local, @broadcast, 0x2}}}, {{@arp={@loopback, @remote, 0xffffff00, 0xff, @mac=@local, {[0x0, 0x0, 0x0, 0xff]}, @mac=@local, {[0x0, 0x0, 0x0, 0xb1004a5228bebdee, 0x80]}, 0x8, 0x0, 0x9, 0x7fff, 0x7, 0x0, 'rose0\x00', 'yam0\x00', {}, {0x101}}, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @mac=@dev={[], 0x18}, @initdev={0xac, 0x1e, 0x0, 0x0}, @remote, 0x1, 0xffffffff}}}, {{@arp={@local, @rand_addr=0x7fff, 0xffffffff, 0x0, @empty, {[0x0, 0x1fe, 0xff, 0x0, 0x101]}, @empty, {[0xff, 0x0, 0x142e2b4285f21f8, 0x0, 0xff]}, 0x0, 0xada9, 0x7, 0x7, 0xfc2e, 0x988, 'bcsh0\x00', 'ip6tnl0\x00', {0xff}}, 0xf0, 0x120}, @unspec=@CONNMARK={0x30, 'CONNMARK\x00', 0x1, {0x0, 0x1, 0x0, 0x2}}}], {{[], 0xc0, 0xe8}, {0x28}}}}, 0x4d8) ioctl$sock_SIOCOUTQNSD(r0, 0x894b, &(0x7f0000000080)) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=ANY=[@ANYBLOB="020700090200000000008000bd5a00000021472aefe41c4301889c91ff7f000000001600aa20675d9f82d3869feeed861c6cb504000000cad7cb69050046b6e50e067f000000000000c13746111828eb64b6169ad813b4f53f06d28f109c7d19da111c86fddf231ca45e0c0bb2ad56d90a00bb52e06457a7b371989220ed7d65e8f2f88cacce5c4e1f443497d3596ae701ae5ee9d386b9aeaf7fc57a677075a700"/171], 0x10}}, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0x4}, 0x20401, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = socket$inet6(0xa, 0x3, 0x100000001) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(0xffffffffffffffff, 0x10e, 0x8, &(0x7f0000000480)=0xfffeffff, 0x4) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) chroot(&(0x7f0000000080)='./file0\x00') mount(0x0, 0x0, &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000040)=ANY=[], &(0x7f00000001c0)='./file0\x00', 0x0, 0x5010, 0x0) mount(&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f00000002c0)='./file0\x00', 0x0, 0x5010, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) sendmmsg(r3, &(0x7f0000007e00), 0x400000000000058, 0x0) [ 290.139683][ T8169] libceph: resolve '´—|n{a' (ret=-3): failed [ 290.192403][ T8169] libceph: parse_ips bad ip '´—|n{a,û' 17:53:08 executing program 3: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) write(r1, &(0x7f00000001c0), 0xfffffef3) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) close(r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000180)={0x1ff}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 17:53:08 executing program 4: waitid(0x0, 0x0, 0x0, 0x0, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x60000008, 0x0) mprotect(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='\x00\xc3\t\xbb\x0f\xac\x03,') getdents64(r0, &(0x7f0000000df0)=""/528, 0xfe06) r1 = gettid() tkill(r1, 0x3f) ioctl$int_in(0xffffffffffffffff, 0x0, &(0x7f0000000080)) 17:53:08 executing program 5: waitid(0x0, 0x0, 0x0, 0x0, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x60000008, 0x0) mprotect(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='\x00\xc3\t\xbb\x0f\xac\x03,') getdents64(r0, &(0x7f0000000df0)=""/528, 0xfe06) r1 = gettid() tkill(r1, 0x3f) ioctl$int_in(0xffffffffffffffff, 0x0, &(0x7f0000000080)) 17:53:08 executing program 2: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) 17:53:09 executing program 0: perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000300)='net/ip_vs_stats_percpu\x00') preadv(r0, &(0x7f0000000500)=[{&(0x7f0000000080)=""/102, 0x66}], 0x1, 0x0) 17:53:09 executing program 4: waitid(0x0, 0x0, 0x0, 0x0, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x60000008, 0x0) mprotect(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='\x00\xc3\t\xbb\x0f\xac\x03,') getdents64(r0, &(0x7f0000000df0)=""/528, 0xfe06) r1 = gettid() tkill(r1, 0x3f) ioctl$int_in(0xffffffffffffffff, 0x0, &(0x7f0000000080)) 17:53:09 executing program 5: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000100)={0x30}, 0x30) 17:53:09 executing program 2: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) 17:53:09 executing program 2: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) 17:53:09 executing program 0: perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000300)='net/ip_vs_stats_percpu\x00') preadv(r0, &(0x7f0000000500)=[{&(0x7f0000000080)=""/102, 0x66}], 0x1, 0x0) 17:53:09 executing program 5: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000100)={0x30}, 0x30) 17:53:09 executing program 1: setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x60, &(0x7f0000000080)={0x0, @rand_addr, 0x0, 0x1, 'sh\x00\x00\x00\x00\x00P\x00\x01*h\xe1\x8d\x00', 0x0, 0x3fc}, 0x19) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0) 17:53:09 executing program 3: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) write(r1, &(0x7f00000001c0), 0xfffffef3) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) close(r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000180)={0x1ff}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 17:53:09 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="480000002400070500"/20, @ANYRES32=r2, @ANYBLOB="00000400f1ffffff0000000008000100687462001c000200180002000300000000010000000000000800000000000000ce204b707596906260a7cefc"], 0x48}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="34000000240007017000"/20, @ANYRES32=r2, @ANYBLOB="0000ffff0000ffff0000000065640000000004000200000000000000"], 0x34}}, 0x0) r3 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r3, &(0x7f0000000140), 0x332, 0x0) 17:53:09 executing program 0: perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000300)='net/ip_vs_stats_percpu\x00') preadv(r0, &(0x7f0000000500)=[{&(0x7f0000000080)=""/102, 0x66}], 0x1, 0x0) 17:53:09 executing program 2: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=ANY=[], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) 17:53:09 executing program 5: accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x1800) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) open(0x0, 0x80, 0x81b13b5e4dca33f1) r0 = socket$alg(0x26, 0x5, 0x0) vmsplice(r0, &(0x7f0000001740)=[{&(0x7f0000001480)="ae77e747904ee44ac13da6e1f7873fd0d5b3f1236d21fa64d11b9ec615f9012bb7fa87dbddb8348871c91098b5b8a6a8f05234705f4ccfe7bf0b51e93b7a719bfadedf7bed1693d7571151c8e41a8d8286a689945a0539ef647436179b1a43295373a38f487c104e645d0e400435d4d38bd4d640b32064cfc3ae4f264e23e341bf54b5d7dc4840c34500126866c93f7d3b5963b1afcb37646364cb02be63935ee5db718244ab9efd75b8ab579ec0a35db2002855a1a388587a21883fe3e27409d114e979de", 0xc5}, {&(0x7f0000001580)="4b89bd4ed62ebae4347d5d9a2d78116596ed11538d4afcf9a72af563fade4aa8bc9c66899d51f7100f481c12e7a8651ee4bebec0bb1328fd15f85733ac808071f192373c3ea2d8c77ecc927bbb89bb302223b0ee66fa1fb1614e32cac0754171e4a811d27892d69e5d1aeec3b75b99053849a24f332e627698c0f2e9c16ba3624b505ae39184b2f87766a3b42aaca0dec5ef92959a56c07e2bf95ff64cb1a66aec66", 0xa2}, {&(0x7f0000001640)="24bf5e48a0040c6fd7d57941fd62e4c18a0e8ccaeb2e124cbbb874c73188829678ab222175a2f32ca61621dfbb016f2c5dbc49ea3cbeba85078ceedc3a56f9c4b8d4708ffbd65a09c0b894c7f84aa2f515650a2c95a0227c982542082c8abcfcca8a7b8d8d4cb7c87f1301cb7375c91432435eaec1a705c087bb3a48e089c43bfaa4c49c82f9c47bf5c91bbb880cb6118d2867bee4452d66643d0206dbf1b29c5b75d3fec20b8333ef049c1d7c3e679114f95121cca6233b63f16144ab7504b3e2e83abb70341304ed2733af", 0xcc}], 0x3, 0x4) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) setitimer(0x1, &(0x7f0000000100)={{0x0, 0x2710}, {0x77359400}}, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r5, 0x29, 0x20, &(0x7f0000000000)={@mcast1, 0x0, 0x1, 0x0, 0x4}, 0x20) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r5, 0x29, 0xd3, &(0x7f00000003c0)={{0xa, 0x4e22, 0x400, @mcast1}, {0xa, 0x4e21, 0xffff, @rand_addr="2f6fb88a6f4a866f313275b644e1d026", 0x7}, 0x800, [0x1, 0x80, 0x1, 0xac03, 0x518, 0xb31b, 0x3, 0x2]}, 0x5c) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) getsockopt$bt_sco_SCO_CONNINFO(0xffffffffffffffff, 0x11, 0x2, &(0x7f00000002c0)=""/245, &(0x7f00000001c0)=0xf5) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r6 = syz_open_procfs(0x0, 0xffffffffffffffff) getdents64(r6, &(0x7f00000003c0)=""/4096, 0x1000) getdents64(r6, 0x0, 0x0) getsockopt$inet6_mtu(r6, 0x29, 0x17, &(0x7f0000000240), &(0x7f0000000440)=0x4) r7 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r7, &(0x7f0000000940)=[{&(0x7f00000008c0)=""/106, 0x6a}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xef}], 0x3, 0x0) 17:53:09 executing program 2: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=ANY=[], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) [ 291.335433][ T8286] EXT4-fs (loop1): bad geometry: block count 1080 exceeds size of device (32 blocks) [ 291.367845][ T8297] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.4'. 17:53:09 executing program 0: perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000500)=[{&(0x7f0000000080)=""/102, 0x66}], 0x1, 0x0) [ 291.380028][ T8297] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.4'. [ 291.401075][ T8304] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.4'. [ 291.504182][ T8290] ================================================================== [ 291.512326][ T8290] BUG: KCSAN: data-race in find_alive_thread / get_signal [ 291.519425][ T8290] [ 291.521751][ T8290] read to 0xffff88812040c124 of 4 bytes by task 8309 on cpu 0: [ 291.529296][ T8290] find_alive_thread+0xdd/0x130 [ 291.534151][ T8290] do_exit+0x67c/0x18f0 [ 291.538310][ T8290] do_group_exit+0xb4/0x1c0 [ 291.542820][ T8290] __x64_sys_exit_group+0x2e/0x30 [ 291.547856][ T8290] do_syscall_64+0xcc/0x370 [ 291.552360][ T8290] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 291.558237][ T8290] [ 291.560568][ T8290] write to 0xffff88812040c124 of 4 bytes by task 8290 on cpu 1: [ 291.568198][ T8290] get_signal+0x7c7/0x1320 [ 291.572614][ T8290] do_signal+0x3b/0xbf0 [ 291.576771][ T8290] exit_to_usermode_loop+0x250/0x2c0 [ 291.582046][ T8290] do_syscall_64+0x353/0x370 [ 291.586625][ T8290] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 291.592496][ T8290] [ 291.594805][ T8290] Reported by Kernel Concurrency Sanitizer on: [ 291.600949][ T8290] CPU: 1 PID: 8290 Comm: syz-executor.5 Not tainted 5.4.0-rc7+ #0 [ 291.608733][ T8290] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 291.618770][ T8290] ================================================================== [ 291.626817][ T8290] Kernel panic - not syncing: panic_on_warn set ... [ 291.633391][ T8290] CPU: 1 PID: 8290 Comm: syz-executor.5 Not tainted 5.4.0-rc7+ #0 [ 291.641175][ T8290] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 291.651213][ T8290] Call Trace: [ 291.654499][ T8290] dump_stack+0x11d/0x181 [ 291.658820][ T8290] panic+0x210/0x640 [ 291.662709][ T8290] ? vprintk_func+0x8d/0x140 [ 291.667295][ T8290] kcsan_report.cold+0xc/0x1a [ 291.671969][ T8290] kcsan_setup_watchpoint+0x3fe/0x460 [ 291.677334][ T8290] __tsan_unaligned_write4+0xc4/0x100 [ 291.682696][ T8290] get_signal+0x7c7/0x1320 [ 291.687106][ T8290] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 291.693338][ T8290] ? fput_many+0xec/0x130 [ 291.697665][ T8290] do_signal+0x3b/0xbf0 [ 291.701823][ T8290] ? __sys_recvmmsg+0xee/0x200 [ 291.706585][ T8290] exit_to_usermode_loop+0x250/0x2c0 [ 291.711864][ T8290] do_syscall_64+0x353/0x370 [ 291.716457][ T8290] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 291.722336][ T8290] RIP: 0033:0x45a219 [ 291.726238][ T8290] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 291.745827][ T8290] RSP: 002b:00007f5c5e2aec78 EFLAGS: 00000246 ORIG_RAX: 000000000000012b [ 291.754239][ T8290] RAX: fffffffffffffe00 RBX: 0000000000000005 RCX: 000000000045a219 [ 291.762212][ T8290] RDX: 0400000000000249 RSI: 0000000020008880 RDI: 0000000000000004 [ 291.770178][ T8290] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 291.778139][ T8290] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f5c5e2af6d4 [ 291.786101][ T8290] R13: 00000000004c7cda R14: 00000000004dde58 R15: 00000000ffffffff [ 291.795385][ T8290] Kernel Offset: disabled [ 291.799710][ T8290] Rebooting in 86400 seconds..