[ 73.739191][ T26] audit: type=1800 audit(1564964046.341:27): pid=10036 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="restorecond" dev="sda1" ino=2436 res=0 [ 73.778449][ T26] audit: type=1800 audit(1564964046.341:28): pid=10036 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="ssh" dev="sda1" ino=2417 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. [ 74.507947][ T26] audit: type=1800 audit(1564964047.151:29): pid=10036 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="rc.local" dev="sda1" ino=2432 res=0 [ 74.528539][ T26] audit: type=1800 audit(1564964047.151:30): pid=10036 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="rmnologin" dev="sda1" ino=2423 res=0 Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.223' (ECDSA) to the list of known hosts. 2019/08/05 00:14:17 fuzzer started 2019/08/05 00:14:20 dialing manager at 10.128.0.26:41727 2019/08/05 00:14:20 syscalls: 2484 2019/08/05 00:14:20 code coverage: enabled 2019/08/05 00:14:20 comparison tracing: enabled 2019/08/05 00:14:20 extra coverage: extra coverage is not supported by the kernel 2019/08/05 00:14:20 setuid sandbox: enabled 2019/08/05 00:14:20 namespace sandbox: enabled 2019/08/05 00:14:20 Android sandbox: /sys/fs/selinux/policy does not exist 2019/08/05 00:14:20 fault injection: enabled 2019/08/05 00:14:20 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/08/05 00:14:20 net packet injection: enabled 2019/08/05 00:14:20 net device setup: enabled 00:15:48 executing program 0: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(0xffffffffffffffff, 0xc0a85320, 0x0) fsconfig$FSCONFIG_SET_FLAG(0xffffffffffffffff, 0x0, &(0x7f0000000200)='lazytime\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000580)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0x0, r1, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) msgget(0x0, 0x220) prctl$PR_MCE_KILL_GET(0x22) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$capi20(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCGICOUNT(0xffffffffffffffff, 0x545d, 0x0) lseek(r0, 0x0, 0x0) 00:15:48 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x0, @local, 0x2}, 0x1c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x4e20, 0x0, @ipv4={[], [], @loopback}}, 0x1c) sendmmsg(r0, &(0x7f0000002780)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) syzkaller login: [ 176.131692][T10202] IPVS: ftp: loaded support on port[0] = 21 [ 176.273060][T10202] chnl_net:caif_netlink_parms(): no params data found [ 176.315491][T10202] bridge0: port 1(bridge_slave_0) entered blocking state [ 176.324006][T10202] bridge0: port 1(bridge_slave_0) entered disabled state [ 176.332570][T10202] device bridge_slave_0 entered promiscuous mode [ 176.340593][T10202] bridge0: port 2(bridge_slave_1) entered blocking state [ 176.348671][T10202] bridge0: port 2(bridge_slave_1) entered disabled state [ 176.356811][T10202] device bridge_slave_1 entered promiscuous mode [ 176.368253][T10205] IPVS: ftp: loaded support on port[0] = 21 [ 176.383411][T10202] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 176.394985][T10202] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 00:15:49 executing program 2: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000280)={0x7fff}) [ 176.423445][T10202] team0: Port device team_slave_0 added [ 176.435603][T10202] team0: Port device team_slave_1 added 00:15:49 executing program 3: r0 = syz_open_dev$sndtimer(&(0x7f0000000000)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_GINFO(r0, 0xc0f85403, &(0x7f00000000c0)={{}, 0x0, 0x0, 'id1\x00', 'timer0\x00'}) [ 176.548532][T10202] device hsr_slave_0 entered promiscuous mode [ 176.576228][T10202] device hsr_slave_1 entered promiscuous mode [ 176.655794][T10207] IPVS: ftp: loaded support on port[0] = 21 [ 176.657065][T10202] bridge0: port 2(bridge_slave_1) entered blocking state [ 176.669026][T10202] bridge0: port 2(bridge_slave_1) entered forwarding state [ 176.676575][T10202] bridge0: port 1(bridge_slave_0) entered blocking state [ 176.683644][T10202] bridge0: port 1(bridge_slave_0) entered forwarding state [ 176.782993][T10209] IPVS: ftp: loaded support on port[0] = 21 [ 176.817430][T10205] chnl_net:caif_netlink_parms(): no params data found [ 176.855571][T10202] 8021q: adding VLAN 0 to HW filter on device bond0 00:15:49 executing program 4: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000280)={0x7fff, 0x1}) [ 176.918643][T10202] 8021q: adding VLAN 0 to HW filter on device team0 [ 176.929826][ T3081] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 176.946998][ T3081] bridge0: port 1(bridge_slave_0) entered disabled state [ 176.967516][ T3081] bridge0: port 2(bridge_slave_1) entered disabled state [ 176.987796][ T3081] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 177.059083][T10205] bridge0: port 1(bridge_slave_0) entered blocking state [ 177.068078][T10205] bridge0: port 1(bridge_slave_0) entered disabled state [ 177.076395][T10205] device bridge_slave_0 entered promiscuous mode [ 177.095015][T10215] IPVS: ftp: loaded support on port[0] = 21 00:15:49 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x4e20, 0x0, @ipv4={[], [], @loopback}}, 0x1c) sendmmsg(r0, &(0x7f0000002780)=[{{0x0, 0x0, 0x0}}, {{&(0x7f00000005c0)=@pptp={0x18, 0x2, {0x0, @dev}}, 0x80, 0x0}}], 0x2, 0x0) [ 177.116688][ T3081] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 177.125181][ T3081] bridge0: port 1(bridge_slave_0) entered blocking state [ 177.132385][ T3081] bridge0: port 1(bridge_slave_0) entered forwarding state [ 177.153766][T10205] bridge0: port 2(bridge_slave_1) entered blocking state [ 177.161498][T10205] bridge0: port 2(bridge_slave_1) entered disabled state [ 177.171206][T10205] device bridge_slave_1 entered promiscuous mode [ 177.200263][T10211] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 177.209520][T10211] bridge0: port 2(bridge_slave_1) entered blocking state [ 177.216610][T10211] bridge0: port 2(bridge_slave_1) entered forwarding state [ 177.236050][T10207] chnl_net:caif_netlink_parms(): no params data found [ 177.278454][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 177.287471][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 177.295949][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 177.322665][T10205] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 177.345426][T10202] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 177.347013][T10217] IPVS: ftp: loaded support on port[0] = 21 [ 177.358832][T10202] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 177.390646][T10205] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 177.400807][ T2858] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 177.409767][ T2858] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 177.418163][ T2858] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 177.426962][ T2858] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 177.435368][ T2858] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 177.452477][T10209] chnl_net:caif_netlink_parms(): no params data found [ 177.503428][T10205] team0: Port device team_slave_0 added [ 177.514121][T10207] bridge0: port 1(bridge_slave_0) entered blocking state [ 177.521346][T10207] bridge0: port 1(bridge_slave_0) entered disabled state [ 177.529337][T10207] device bridge_slave_0 entered promiscuous mode [ 177.542015][T10207] bridge0: port 2(bridge_slave_1) entered blocking state [ 177.549141][T10207] bridge0: port 2(bridge_slave_1) entered disabled state [ 177.557035][T10207] device bridge_slave_1 entered promiscuous mode [ 177.564812][T10205] team0: Port device team_slave_1 added [ 177.601401][T10207] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 177.613550][T10207] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 177.623783][T10209] bridge0: port 1(bridge_slave_0) entered blocking state [ 177.631255][T10209] bridge0: port 1(bridge_slave_0) entered disabled state [ 177.639008][T10209] device bridge_slave_0 entered promiscuous mode [ 177.671511][T10209] bridge0: port 2(bridge_slave_1) entered blocking state [ 177.679621][T10209] bridge0: port 2(bridge_slave_1) entered disabled state [ 177.687667][T10209] device bridge_slave_1 entered promiscuous mode [ 177.748825][T10205] device hsr_slave_0 entered promiscuous mode [ 177.796281][T10205] device hsr_slave_1 entered promiscuous mode [ 177.836014][T10205] debugfs: Directory 'hsr0' with parent '/' already present! [ 177.847533][T10202] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 177.869537][T10207] team0: Port device team_slave_0 added [ 177.877589][T10207] team0: Port device team_slave_1 added [ 177.889579][T10209] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 177.938837][T10209] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 177.963517][T10209] team0: Port device team_slave_0 added [ 177.970647][T10209] team0: Port device team_slave_1 added [ 178.037566][T10207] device hsr_slave_0 entered promiscuous mode [ 178.106300][T10207] device hsr_slave_1 entered promiscuous mode [ 178.156089][T10207] debugfs: Directory 'hsr0' with parent '/' already present! [ 178.189317][T10215] chnl_net:caif_netlink_parms(): no params data found [ 178.238775][T10209] device hsr_slave_0 entered promiscuous mode [ 178.286150][T10209] device hsr_slave_1 entered promiscuous mode [ 178.336020][T10209] debugfs: Directory 'hsr0' with parent '/' already present! 00:15:51 executing program 0: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000c34000)) unshare(0x24020400) ioctl$UFFDIO_ZEROPAGE(r0, 0xc028aa03, &(0x7f0000000080)={{&(0x7f0000291000/0x400000)=nil, 0x400002}}) 00:15:51 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") init_module(&(0x7f0000000180)='@lo[[vmnet1\x00', 0xffed6, &(0x7f0000000140)='{\x00') [ 178.469825][T10215] bridge0: port 1(bridge_slave_0) entered blocking state [ 178.484046][T10215] bridge0: port 1(bridge_slave_0) entered disabled state [ 178.492718][T10215] device bridge_slave_0 entered promiscuous mode [ 178.518637][T10217] chnl_net:caif_netlink_parms(): no params data found [ 178.536566][T10215] bridge0: port 2(bridge_slave_1) entered blocking state [ 178.544329][T10215] bridge0: port 2(bridge_slave_1) entered disabled state [ 178.560044][T10215] device bridge_slave_1 entered promiscuous mode 00:15:51 executing program 0: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, 0x0) mount(&(0x7f0000000240), &(0x7f0000000140)='.', 0x0, 0x3002480, 0x0) [ 178.610823][T10205] 8021q: adding VLAN 0 to HW filter on device bond0 [ 178.619757][T10215] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 178.650303][T10207] 8021q: adding VLAN 0 to HW filter on device bond0 00:15:51 executing program 0: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000c34000)) unshare(0x24020400) ioctl$UFFDIO_REGISTER(r0, 0xc020aa04, 0x0) [ 178.660606][T10209] 8021q: adding VLAN 0 to HW filter on device bond0 [ 178.682641][T10215] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 00:15:51 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_SET_LAPIC(r3, 0x4400ae8f, &(0x7f00000004c0)={"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"}) [ 178.712507][T10207] 8021q: adding VLAN 0 to HW filter on device team0 [ 178.724899][T10211] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 178.733031][T10211] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 178.744988][T10211] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 178.760785][T10211] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 178.773547][T10249] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. [ 178.775542][T10205] 8021q: adding VLAN 0 to HW filter on device team0 [ 178.798832][T10217] bridge0: port 1(bridge_slave_0) entered blocking state [ 178.813181][T10217] bridge0: port 1(bridge_slave_0) entered disabled state [ 178.822842][T10217] device bridge_slave_0 entered promiscuous mode [ 178.847807][T10209] 8021q: adding VLAN 0 to HW filter on device team0 00:15:51 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dlm-monitor\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_open_dev$mice(&(0x7f0000000300)='/dev/input/mice\x00', 0x0, 0x0) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f0000000040)={0x0, 0x40}, 0x8) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000000000/0x1000)=nil}) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000340)={0xff, @rand_addr=0x8, 0x4e24, 0x0, 'fo\x00'}, 0x2c) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000140), 0xc, 0x0}, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb]}) ioctl$KVM_ASSIGN_SET_MSIX_NR(0xffffffffffffffff, 0x4008ae73, &(0x7f0000000180)={0x0, 0x47c}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$KVM_RUN(r2, 0xae80, 0x0) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, &(0x7f0000000000)=0x9, 0x8f7a99bbe5b13b0f) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 178.886969][ T3081] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 178.899555][ T3081] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 178.908926][ T3081] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 178.920724][ T3081] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 178.929542][ T3081] bridge0: port 1(bridge_slave_0) entered blocking state [ 178.936634][ T3081] bridge0: port 1(bridge_slave_0) entered forwarding state [ 178.958055][ T3081] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 178.969902][ T3081] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 178.980490][ T3081] bridge0: port 2(bridge_slave_1) entered blocking state [ 178.988972][ T3081] bridge0: port 2(bridge_slave_1) entered forwarding state [ 178.997577][ T3081] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 179.006190][ T3081] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 179.014470][ T3081] bridge0: port 1(bridge_slave_0) entered blocking state [ 179.022440][ T3081] bridge0: port 1(bridge_slave_0) entered forwarding state [ 179.030465][ T3081] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 179.039097][ T3081] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 179.047708][ T3081] bridge0: port 2(bridge_slave_1) entered blocking state [ 179.054766][ T3081] bridge0: port 2(bridge_slave_1) entered forwarding state [ 179.062521][ T3081] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 179.072044][T10217] bridge0: port 2(bridge_slave_1) entered blocking state [ 179.079403][T10217] bridge0: port 2(bridge_slave_1) entered disabled state [ 179.087466][T10217] device bridge_slave_1 entered promiscuous mode [ 179.124899][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 179.139014][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 179.147734][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 179.161659][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 179.170877][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 179.182867][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 179.191500][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 179.203529][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 179.212074][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 179.224257][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 179.232926][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 179.244424][ T22] bridge0: port 1(bridge_slave_0) entered blocking state [ 179.251525][ T22] bridge0: port 1(bridge_slave_0) entered forwarding state [ 179.262751][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 179.271809][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 179.282866][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 179.292842][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 179.304471][ T22] bridge0: port 2(bridge_slave_1) entered blocking state [ 179.311562][ T22] bridge0: port 2(bridge_slave_1) entered forwarding state [ 179.321946][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 179.330709][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 179.342420][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 179.351160][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 179.362338][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 179.383449][T10207] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 179.397219][T10207] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 179.412621][T10215] team0: Port device team_slave_0 added [ 179.424439][T10205] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 179.439831][T10205] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 179.453914][T10211] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 179.466473][T10211] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 179.474451][T10211] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 179.486073][T10211] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 179.494462][T10211] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 179.506917][T10211] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 179.515295][T10211] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 179.526356][T10211] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 179.535500][T10211] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 179.559403][T10215] team0: Port device team_slave_1 added [ 179.567145][T10217] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 179.586316][T10211] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 179.594668][T10211] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 179.603855][T10211] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 179.612852][T10211] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 179.621696][T10211] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 179.631085][T10211] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 179.651441][T10209] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 179.666330][T10209] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 179.693102][T10205] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 179.705519][T10217] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 179.717080][T10207] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 179.724630][T10211] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 179.737928][T10211] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 179.749480][T10211] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 179.758377][T10211] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 179.767760][T10211] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 179.787446][T10209] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 179.808643][T10211] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready 00:15:52 executing program 0: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents(r0, &(0x7f00000003c0)=""/96, 0x2c) getdents64(r0, &(0x7f0000000440)=""/186, 0x760) [ 179.878603][T10215] device hsr_slave_0 entered promiscuous mode [ 179.908355][T10215] device hsr_slave_1 entered promiscuous mode [ 179.986053][T10215] debugfs: Directory 'hsr0' with parent '/' already present! [ 179.996469][T10217] team0: Port device team_slave_0 added [ 180.003441][T10217] team0: Port device team_slave_1 added [ 180.087726][T10217] device hsr_slave_0 entered promiscuous mode [ 180.136522][T10217] device hsr_slave_1 entered promiscuous mode [ 180.196269][T10217] debugfs: Directory 'hsr0' with parent '/' already present! [ 180.264477][T10215] 8021q: adding VLAN 0 to HW filter on device bond0 [ 180.305209][T10215] 8021q: adding VLAN 0 to HW filter on device team0 [ 180.323713][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 180.345001][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 180.368195][T10283] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 00:15:53 executing program 1: r0 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000400)={'syz'}, &(0x7f00000001c0)="04", 0x1, 0xfffffffffffffffd) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000100)='/dev/btrfs-control\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000040)={r1, r0, r1}, 0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000080)={'sha384-generic\x00'}}) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f0000000080)={0x0, 0x0, 0xfffffffeffffffff}) ioctl$DRM_IOCTL_GEM_FLINK(0xffffffffffffffff, 0xc008640a, 0x0) 00:15:53 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2400000033001905000000000000000001000000ffd38d9308000100e01e011b04000800"], 0x24}}, 0x0) 00:15:53 executing program 2: syz_emit_ethernet(0x74, &(0x7f0000000100)={@local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x2, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 180.424878][ T2858] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 180.438991][ T2858] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 180.489319][ T2858] bridge0: port 1(bridge_slave_0) entered blocking state [ 180.496487][ T2858] bridge0: port 1(bridge_slave_0) entered forwarding state [ 180.531216][ T2858] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 180.540204][ T2858] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 180.549856][ T2858] bridge0: port 2(bridge_slave_1) entered blocking state [ 180.556965][ T2858] bridge0: port 2(bridge_slave_1) entered forwarding state [ 180.565865][ C1] hrtimer: interrupt took 26401 ns [ 180.574137][ T2858] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 180.602474][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 180.622984][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 180.632270][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 180.644153][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 180.653166][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 180.665060][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 180.679501][T10217] 8021q: adding VLAN 0 to HW filter on device bond0 [ 180.689315][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 180.698219][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 180.706561][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 180.717422][T10215] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 180.729624][T10215] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 180.745837][T10217] 8021q: adding VLAN 0 to HW filter on device team0 [ 180.756703][T10297] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 180.765140][T10297] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 180.773798][T10297] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 180.784482][T10297] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 180.818273][T10218] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 180.830867][T10218] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 180.840051][T10218] bridge0: port 1(bridge_slave_0) entered blocking state [ 180.847149][T10218] bridge0: port 1(bridge_slave_0) entered forwarding state [ 180.858775][T10218] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 180.868468][T10218] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 180.879296][T10218] bridge0: port 2(bridge_slave_1) entered blocking state [ 180.886394][T10218] bridge0: port 2(bridge_slave_1) entered forwarding state [ 180.895242][T10218] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 180.905811][T10218] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 180.925623][T10217] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 180.939899][T10217] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 180.953686][T10215] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 180.968957][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 180.979988][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 180.998271][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 181.010587][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 181.020130][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 181.028829][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 181.037116][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 181.045437][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 181.054211][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 181.071037][T10218] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 181.079473][T10218] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 181.091175][T10217] 8021q: adding VLAN 0 to HW filter on device batadv0 00:15:53 executing program 4: r0 = socket$pptp(0x18, 0x1, 0x2) bind$pptp(r0, &(0x7f0000000000), 0x1e) bind$pptp(r0, &(0x7f0000000040)={0x18, 0x2, {0x0, @broadcast}}, 0x1e) 00:15:53 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x8, 0x3, &(0x7f0000000080)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x61, 0x54}}, &(0x7f0000281ffc)='G\xffL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe80, 0x0, &(0x7f0000000200)="5c71f905cac413551b2ac06c86dd", 0x0, 0xfffffffe}, 0x28) 00:15:53 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x8, 0x3, &(0x7f0000000080)=ANY=[@ANYBLOB="850000006000000054000000000000009500000000000000"], &(0x7f0000281ffc)='G\xffL\x00'}, 0x48) 00:15:53 executing program 0: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents(r0, &(0x7f00000002c0)=""/96, 0x5b) getdents64(r0, &(0x7f0000000440)=""/186, 0x760) 00:15:53 executing program 2: unshare(0x24020400) r0 = socket$pptp(0x18, 0x1, 0x2) connect(r0, 0x0, 0x0) 00:15:53 executing program 1: r0 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000400)={'syz'}, &(0x7f00000001c0)="04", 0x1, 0xfffffffffffffffd) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000100)='/dev/btrfs-control\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000040)={r1, r0, r1}, 0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000080)={'sha384-generic\x00'}}) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f0000000080)={0x0, 0x0, 0xfffffffeffffffff}) ioctl$DRM_IOCTL_GEM_FLINK(0xffffffffffffffff, 0xc008640a, 0x0) [ 181.219355][T10312] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 00:15:53 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x8}]}, &(0x7f0000f6bffb)='GPL\x00'}, 0x48) 00:15:54 executing program 2: r0 = syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0x29, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(r0, 0xc4c85512, &(0x7f0000000580)={{0x2, 0x0, 0x0, 0x0, 'syz1\x00'}}) 00:15:54 executing program 0: unshare(0x24020400) r0 = syz_open_dev$sndtimer(&(0x7f0000000140)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f00000002c0)={{0xffffffffffffffff}}) 00:15:54 executing program 4: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000000100)={0x0, 0x0, 0x0, &(0x7f0000000080)=""/97, 0x0}) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000480)=ANY=[]) ioctl$VHOST_VSOCK_SET_RUNNING(r0, 0x4004af61, &(0x7f00000006c0)=0x5) 00:15:54 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x8}]}, &(0x7f0000f6bffb)='GPL\x00'}, 0x48) 00:15:54 executing program 2: r0 = syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0x29, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(r0, 0xc4c85512, &(0x7f0000000580)={{0x2, 0x0, 0x0, 0x0, 'syz1\x00'}}) 00:15:54 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = gettid() rt_tgsigqueueinfo(r1, r1, 0x0, &(0x7f0000000080)) 00:15:54 executing program 2: r0 = syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0x29, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(r0, 0xc4c85512, &(0x7f0000000580)={{0x2, 0x0, 0x0, 0x0, 'syz1\x00'}}) 00:15:54 executing program 0: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) sync_file_range(r0, 0x0, 0x0, 0x3) 00:15:54 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x8}]}, &(0x7f0000f6bffb)='GPL\x00'}, 0x48) 00:15:54 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x8, 0x3, &(0x7f0000000080)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x61, 0x54}}, &(0x7f0000281ffc)='G\xffL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe80, 0x0, &(0x7f0000000200)="5c71f905cac413551b2ac06c86dd", 0x0, 0xfffffffe}, 0x28) 00:15:54 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x3c}]}, &(0x7f0000f6bffb)='GPL\x00'}, 0x48) 00:15:54 executing program 1: r0 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000400)={'syz'}, &(0x7f00000001c0)="04", 0x1, 0xfffffffffffffffd) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000100)='/dev/btrfs-control\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000040)={r1, r0, r1}, 0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000080)={'sha384-generic\x00'}}) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f0000000080)={0x0, 0x0, 0xfffffffeffffffff}) ioctl$DRM_IOCTL_GEM_FLINK(0xffffffffffffffff, 0xc008640a, 0x0) 00:15:54 executing program 2: r0 = syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0x29, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(r0, 0xc4c85512, &(0x7f0000000580)={{0x2, 0x0, 0x0, 0x0, 'syz1\x00'}}) 00:15:54 executing program 0: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='sysfs\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents(r0, &(0x7f00000003c0)=""/96, 0x2c) getdents64(r0, 0x0, 0x18) 00:15:54 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x8, 0x3, &(0x7f0000000080)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x61, 0x54}}, &(0x7f0000281ffc)='G\xffL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe, 0x0, &(0x7f0000000200)="5c71f905cac413551b2ac06c86dd", 0x0, 0xe000000}, 0x28) 00:15:54 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x8}]}, &(0x7f0000f6bffb)='GPL\x00'}, 0x48) 00:15:55 executing program 2: ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000580)={{0x2, 0x0, 0x0, 0x0, 'syz1\x00'}}) 00:15:55 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x7, 0x4, 0x200, 0x80000000000004, 0x0, 0x0}, 0x3c) bpf$MAP_UPDATE_ELEM(0xc, &(0x7f0000000680)={r0, 0x0, 0x0}, 0x20) 00:15:55 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x8}]}, &(0x7f0000f6bffb)='GPL\x00'}, 0x48) 00:15:55 executing program 2: ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000580)={{0x2, 0x0, 0x0, 0x0, 'syz1\x00'}}) 00:15:55 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0xffffffffffffff7c, &(0x7f00000bfff0)={&(0x7f0000006440)=ANY=[@ANYBLOB="b8000000140001000000000000000000ff010000000000000000000000000001e000000100000000000000000000000000ffffffff0000000a00000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000010000000000000000000000000000000037ac1b953e2bb5a700000000139981357ad9a8090000000000000036558234ba5bda3300000000000000000000000000000000000000000000000000000000000000050080000000000000000000"], 0xb8}}, 0x0) [ 182.791025][T10412] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.0'. 00:15:55 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = gettid() rt_sigqueueinfo(r1, 0x1c, &(0x7f0000000000)={0x0, 0x0, 0x3}) 00:15:55 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x8}]}, &(0x7f0000f6bffb)='GPL\x00'}, 0x48) 00:15:55 executing program 2: ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000580)={{0x2, 0x0, 0x0, 0x0, 'syz1\x00'}}) 00:15:55 executing program 0: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/mixer\x00', 0x200000, 0x0) unshare(0x24020400) readahead(r0, 0x0, 0x0) 00:15:55 executing program 1: r0 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000400)={'syz'}, &(0x7f00000001c0)="04", 0x1, 0xfffffffffffffffd) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000100)='/dev/btrfs-control\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000040)={r1, r0, r1}, 0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000080)={'sha384-generic\x00'}}) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f0000000080)={0x0, 0x0, 0xfffffffeffffffff}) ioctl$DRM_IOCTL_GEM_FLINK(0xffffffffffffffff, 0xc008640a, 0x0) 00:15:55 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000080)={0x0, 0xffffffffffffff7c, &(0x7f00000bfff0)={&(0x7f0000006440)=ANY=[@ANYBLOB="b8000000190001000000000000000000ff010000000000000000000000000001e000000100000000000000000000000000000000000000000a00000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000010000000000000000000000000000000037ac1b953e2bb5a700000000139981357ad9a8090000000000000036558234ba5bda3300000000000000000000000000000000000000000000000000000000000000050080000000000000000000"], 0xb8}}, 0x0) 00:15:55 executing program 2: r0 = syz_open_dev$sndctrl(0x0, 0x29, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(r0, 0xc4c85512, &(0x7f0000000580)={{0x2, 0x0, 0x0, 0x0, 'syz1\x00'}}) 00:15:55 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x8}]}, &(0x7f0000f6bffb)='GPL\x00'}, 0x48) 00:15:55 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = socket(0xa, 0x6, 0x0) setsockopt$IP_VS_SO_SET_ADD(r1, 0x0, 0x482, &(0x7f0000000040)={0x11, @empty, 0x11, 0x0, 'wrr\x00', 0x3}, 0x2c) 00:15:55 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = gettid() rt_sigqueueinfo(r1, 0x1c, &(0x7f0000000000)={0x0, 0x0, 0x3}) 00:15:56 executing program 2: r0 = syz_open_dev$sndctrl(0x0, 0x29, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(r0, 0xc4c85512, &(0x7f0000000580)={{0x2, 0x0, 0x0, 0x0, 'syz1\x00'}}) [ 183.353842][T10442] IPVS: ip_vs_svc_hash(): request for already hashed, called from do_ip_vs_set_ctl+0xe01/0xee0 00:15:56 executing program 2: r0 = syz_open_dev$sndctrl(0x0, 0x29, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(r0, 0xc4c85512, &(0x7f0000000580)={{0x2, 0x0, 0x0, 0x0, 'syz1\x00'}}) 00:15:56 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = gettid() rt_sigqueueinfo(r1, 0x1c, &(0x7f0000000000)={0x0, 0x0, 0x3}) 00:15:56 executing program 4: syz_mount_image$ntfs(&(0x7f0000003b40)='ntfs\x00', &(0x7f0000003b80)='./file0\x00', 0x0, 0x2, &(0x7f0000004180)=[{&(0x7f0000003bc0)="8c2e465f2b35762cdadbc37df12f6b0a5cefe6561e65b8ccf36134af3820339c03b35dd84f80fb096582449fcee7c8db08fbdce6cf40340b39a5b2a68669d382388b0a9171fa4415", 0x48, 0x9}, {0x0, 0x0, 0xea4}], 0x0, 0x0) 00:15:56 executing program 3: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x8}]}, &(0x7f0000f6bffb)='GPL\x00'}, 0x48) 00:15:56 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = socket(0xa, 0x6, 0x0) setsockopt$IP_VS_SO_SET_ADD(r1, 0x0, 0x482, &(0x7f0000000040)={0x11, @empty, 0x11, 0x0, 'wrr\x00', 0x3}, 0x2c) [ 183.602801][T10456] ntfs: (device loop4): is_boot_sector_ntfs(): Invalid boot sector checksum. [ 183.659433][T10456] ntfs: (device loop4): read_ntfs_boot_sector(): Primary boot sector is invalid. [ 183.672752][T10466] IPVS: ip_vs_svc_hash(): request for already hashed, called from do_ip_vs_set_ctl+0xe01/0xee0 [ 183.726151][T10456] ntfs: (device loop4): read_ntfs_boot_sector(): Mount option errors=recover not used. Aborting without trying to recover. [ 183.746400][T10456] ntfs: (device loop4): ntfs_fill_super(): Not an NTFS volume. [ 183.842782][T10456] ntfs: (device loop4): is_boot_sector_ntfs(): Invalid boot sector checksum. [ 183.878637][T10456] ntfs: (device loop4): read_ntfs_boot_sector(): Primary boot sector is invalid. 00:15:56 executing program 1: set_mempolicy(0x8001, &(0x7f0000000100)=0x4, 0x8) 00:15:56 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = gettid() rt_sigqueueinfo(r1, 0x1c, &(0x7f0000000000)={0x0, 0x0, 0x3}) 00:15:56 executing program 2: r0 = syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(r0, 0xc4c85512, &(0x7f0000000580)={{0x2, 0x0, 0x0, 0x0, 'syz1\x00'}}) 00:15:56 executing program 3: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x8}]}, &(0x7f0000f6bffb)='GPL\x00'}, 0x48) 00:15:56 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = socket(0xa, 0x6, 0x0) setsockopt$IP_VS_SO_SET_ADD(r1, 0x0, 0x482, &(0x7f0000000040)={0x11, @empty, 0x11, 0x0, 'wrr\x00', 0x3}, 0x2c) [ 183.901810][T10456] ntfs: (device loop4): read_ntfs_boot_sector(): Mount option errors=recover not used. Aborting without trying to recover. 00:15:56 executing program 2: r0 = syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(r0, 0xc4c85512, &(0x7f0000000580)={{0x2, 0x0, 0x0, 0x0, 'syz1\x00'}}) 00:15:56 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") rt_sigqueueinfo(0x0, 0x1c, &(0x7f0000000000)={0x0, 0x0, 0x3}) 00:15:56 executing program 1: unshare(0x24020400) r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) [ 183.946062][T10456] ntfs: (device loop4): ntfs_fill_super(): Not an NTFS volume. [ 183.979606][T10478] IPVS: ip_vs_svc_hash(): request for already hashed, called from do_ip_vs_set_ctl+0xe01/0xee0 00:15:56 executing program 3: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x8}]}, &(0x7f0000f6bffb)='GPL\x00'}, 0x48) 00:15:56 executing program 4: syz_mount_image$ntfs(&(0x7f0000003b40)='ntfs\x00', &(0x7f0000003b80)='./file0\x00', 0x0, 0x2, &(0x7f0000004180)=[{&(0x7f0000003bc0)="8c2e465f2b35762cdadbc37df12f6b0a5cefe6561e65b8ccf36134af3820339c03b35dd84f80fb096582449fcee7c8db08fbdce6cf40340b39a5b2a68669d382388b0a9171fa4415", 0x48, 0x9}, {0x0, 0x0, 0xea4}], 0x0, 0x0) 00:15:56 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = socket(0xa, 0x6, 0x0) setsockopt$IP_VS_SO_SET_ADD(r1, 0x0, 0x482, &(0x7f0000000040)={0x11, @empty, 0x11, 0x0, 'wrr\x00', 0x3}, 0x2c) 00:15:56 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") rt_sigqueueinfo(0x0, 0x1c, &(0x7f0000000000)={0x0, 0x0, 0x3}) 00:15:56 executing program 2: r0 = syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(r0, 0xc4c85512, &(0x7f0000000580)={{0x2, 0x0, 0x0, 0x0, 'syz1\x00'}}) 00:15:56 executing program 1: r0 = socket$vsock_stream(0x28, 0x1, 0x0) shutdown(r0, 0x2000000) [ 184.163991][T10496] IPVS: ip_vs_svc_hash(): request for already hashed, called from do_ip_vs_set_ctl+0xe01/0xee0 00:15:56 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000040)={0x11, @empty, 0x11, 0x0, 'wrr\x00', 0x3}, 0x2c) 00:15:56 executing program 3: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x8}]}, &(0x7f0000f6bffb)='GPL\x00'}, 0x48) [ 184.243934][T10504] ntfs: (device loop4): is_boot_sector_ntfs(): Invalid boot sector checksum. 00:15:56 executing program 1: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='devtmpfs\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents(r0, &(0x7f00000003c0)=""/96, 0x2c) getdents64(r0, 0x0, 0x18) 00:15:56 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") rt_sigqueueinfo(0x0, 0x1c, &(0x7f0000000000)={0x0, 0x0, 0x3}) 00:15:57 executing program 2: syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0x29, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000580)={{0x2, 0x0, 0x0, 0x0, 'syz1\x00'}}) [ 184.300820][T10504] ntfs: (device loop4): read_ntfs_boot_sector(): Primary boot sector is invalid. 00:15:57 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000040)={0x11, @empty, 0x11, 0x0, 'wrr\x00', 0x3}, 0x2c) 00:15:57 executing program 4: syz_mount_image$ntfs(&(0x7f0000003b40)='ntfs\x00', &(0x7f0000003b80)='./file0\x00', 0x0, 0x2, &(0x7f0000004180)=[{&(0x7f0000003bc0)="8c2e465f2b35762cdadbc37df12f6b0a5cefe6561e65b8ccf36134af3820339c03b35dd84f80fb096582449fcee7c8db08fbdce6cf40340b39a5b2a68669d382388b0a9171fa4415", 0x48, 0x9}, {0x0, 0x0, 0xea4}], 0x0, 0x0) 00:15:57 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000040)={0x11, @empty, 0x11, 0x0, 'wrr\x00', 0x3}, 0x2c) 00:15:57 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) r1 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f0000000440)=""/186, 0x760) getdents(r1, &(0x7f00000002c0)=""/137, 0x20000349) 00:15:57 executing program 3: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x8}]}, &(0x7f0000f6bffb)='GPL\x00'}, 0x48) 00:15:57 executing program 2: syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0x29, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000580)={{0x2, 0x0, 0x0, 0x0, 'syz1\x00'}}) 00:15:57 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) r0 = gettid() rt_sigqueueinfo(r0, 0x1c, &(0x7f0000000000)={0x0, 0x0, 0x3}) 00:15:57 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket(0xa, 0x6, 0x0) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000040)={0x11, @empty, 0x11, 0x0, 'wrr\x00', 0x3}, 0x2c) 00:15:57 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) r1 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f0000000440)=""/186, 0x760) getdents(r1, &(0x7f00000002c0)=""/137, 0x20000349) 00:15:57 executing program 4: syz_mount_image$ntfs(&(0x7f0000003b40)='ntfs\x00', &(0x7f0000003b80)='./file0\x00', 0x0, 0x2, &(0x7f0000004180)=[{&(0x7f0000003bc0)="8c2e465f2b35762cdadbc37df12f6b0a5cefe6561e65b8ccf36134af3820339c03b35dd84f80fb096582449fcee7c8db08fbdce6cf40340b39a5b2a68669d382388b0a9171fa4415", 0x48, 0x9}, {0x0, 0x0, 0xea4}], 0x0, 0x0) [ 184.672239][T10550] IPVS: ip_vs_svc_hash(): request for already hashed, called from do_ip_vs_set_ctl+0xe01/0xee0 00:15:57 executing program 2: syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0x29, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000580)={{0x2, 0x0, 0x0, 0x0, 'syz1\x00'}}) 00:15:57 executing program 3: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x8}]}, &(0x7f0000f6bffb)='GPL\x00'}, 0x48) 00:15:57 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) r0 = gettid() rt_sigqueueinfo(r0, 0x1c, &(0x7f0000000000)={0x0, 0x0, 0x3}) 00:15:57 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket(0xa, 0x6, 0x0) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000040)={0x11, @empty, 0x11, 0x0, 'wrr\x00', 0x3}, 0x2c) 00:15:57 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) r1 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f0000000440)=""/186, 0x760) getdents(r1, &(0x7f00000002c0)=""/137, 0x20000349) 00:15:57 executing program 2: r0 = syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0x29, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(r0, 0xc4c85512, 0x0) [ 184.921056][T10567] IPVS: ip_vs_svc_hash(): request for already hashed, called from do_ip_vs_set_ctl+0xe01/0xee0 00:15:57 executing program 4: syz_mount_image$ntfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x2, &(0x7f0000004180)=[{&(0x7f0000003bc0)="8c2e465f2b35762cdadbc37df12f6b0a5cefe6561e65b8ccf36134af3820339c03b35dd84f80fb096582449fcee7c8db08fbdce6cf40340b39a5b2a68669d382388b0a9171fa4415", 0x48, 0x9}, {0x0, 0x0, 0xea4}], 0x0, 0x0) 00:15:57 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) r0 = gettid() rt_sigqueueinfo(r0, 0x1c, &(0x7f0000000000)={0x0, 0x0, 0x3}) 00:15:57 executing program 3: socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x8}]}, &(0x7f0000f6bffb)='GPL\x00'}, 0x48) 00:15:57 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket(0xa, 0x6, 0x0) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000040)={0x11, @empty, 0x11, 0x0, 'wrr\x00', 0x3}, 0x2c) 00:15:57 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) r1 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f0000000440)=""/186, 0x760) getdents(r1, &(0x7f00000002c0)=""/137, 0x20000349) 00:15:57 executing program 2: r0 = syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0x29, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(r0, 0xc4c85512, 0x0) 00:15:57 executing program 4: syz_mount_image$ntfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x2, &(0x7f0000004180)=[{&(0x7f0000003bc0)="8c2e465f2b35762cdadbc37df12f6b0a5cefe6561e65b8ccf36134af3820339c03b35dd84f80fb096582449fcee7c8db08fbdce6cf40340b39a5b2a68669d382388b0a9171fa4415", 0x48, 0x9}, {0x0, 0x0, 0xea4}], 0x0, 0x0) 00:15:57 executing program 5: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r0 = gettid() rt_sigqueueinfo(r0, 0x1c, &(0x7f0000000000)={0x0, 0x0, 0x3}) 00:15:57 executing program 3: socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x8}]}, &(0x7f0000f6bffb)='GPL\x00'}, 0x48) [ 185.196640][T10596] IPVS: ip_vs_svc_hash(): request for already hashed, called from do_ip_vs_set_ctl+0xe01/0xee0 00:15:57 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) r1 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents(r1, &(0x7f00000002c0)=""/137, 0x20000349) 00:15:57 executing program 5: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r0 = gettid() rt_sigqueueinfo(r0, 0x1c, &(0x7f0000000000)={0x0, 0x0, 0x3}) 00:15:58 executing program 2: r0 = syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0x29, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(r0, 0xc4c85512, 0x0) 00:15:58 executing program 0: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r0 = socket(0xa, 0x6, 0x0) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000040)={0x11, @empty, 0x11, 0x0, 'wrr\x00', 0x3}, 0x2c) 00:15:58 executing program 3: socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x8}]}, &(0x7f0000f6bffb)='GPL\x00'}, 0x48) 00:15:58 executing program 4: syz_mount_image$ntfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x2, &(0x7f0000004180)=[{&(0x7f0000003bc0)="8c2e465f2b35762cdadbc37df12f6b0a5cefe6561e65b8ccf36134af3820339c03b35dd84f80fb096582449fcee7c8db08fbdce6cf40340b39a5b2a68669d382388b0a9171fa4415", 0x48, 0x9}, {0x0, 0x0, 0xea4}], 0x0, 0x0) 00:15:58 executing program 5: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r0 = gettid() rt_sigqueueinfo(r0, 0x1c, &(0x7f0000000000)={0x0, 0x0, 0x3}) 00:15:58 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) r1 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents(r1, &(0x7f00000002c0)=""/137, 0x20000349) [ 185.506133][T10624] IPVS: ip_vs_svc_hash(): request for already hashed, called from do_ip_vs_set_ctl+0xe01/0xee0 00:15:58 executing program 2: r0 = syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0x29, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(r0, 0xc4c85512, &(0x7f0000000580)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00'}}) 00:15:58 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x8}]}, &(0x7f0000f6bffb)='GPL\x00'}, 0x48) 00:15:58 executing program 0: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r0 = socket(0xa, 0x6, 0x0) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000040)={0x11, @empty, 0x11, 0x0, 'wrr\x00', 0x3}, 0x2c) 00:15:58 executing program 2: r0 = syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0x29, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(r0, 0xc4c85512, &(0x7f0000000580)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00'}}) 00:15:58 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r0 = gettid() rt_sigqueueinfo(r0, 0x1c, &(0x7f0000000000)={0x0, 0x0, 0x3}) 00:15:58 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) r1 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents(r1, &(0x7f00000002c0)=""/137, 0x20000349) [ 185.730902][T10644] IPVS: ip_vs_svc_hash(): request for already hashed, called from do_ip_vs_set_ctl+0xe01/0xee0 00:15:58 executing program 4: syz_mount_image$ntfs(&(0x7f0000003b40)='ntfs\x00', 0x0, 0x0, 0x2, &(0x7f0000004180)=[{&(0x7f0000003bc0)="8c2e465f2b35762cdadbc37df12f6b0a5cefe6561e65b8ccf36134af3820339c03b35dd84f80fb096582449fcee7c8db08fbdce6cf40340b39a5b2a68669d382388b0a9171fa4415", 0x48, 0x9}, {0x0, 0x0, 0xea4}], 0x0, 0x0) 00:15:58 executing program 0: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r0 = socket(0xa, 0x6, 0x0) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000040)={0x11, @empty, 0x11, 0x0, 'wrr\x00', 0x3}, 0x2c) 00:15:58 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r0 = gettid() rt_sigqueueinfo(r0, 0x1c, &(0x7f0000000000)={0x0, 0x0, 0x3}) 00:15:58 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x8}]}, &(0x7f0000f6bffb)='GPL\x00'}, 0x48) 00:15:58 executing program 2: r0 = syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0x29, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(r0, 0xc4c85512, &(0x7f0000000580)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00'}}) 00:15:58 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) getdents64(0xffffffffffffffff, &(0x7f0000000440)=""/186, 0x760) getdents(0xffffffffffffffff, &(0x7f00000002c0)=""/137, 0x20000349) [ 185.945853][T10665] IPVS: ip_vs_svc_hash(): request for already hashed, called from do_ip_vs_set_ctl+0xe01/0xee0 00:15:58 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r0 = gettid() rt_sigqueueinfo(r0, 0x1c, &(0x7f0000000000)={0x0, 0x0, 0x3}) 00:15:58 executing program 4: syz_mount_image$ntfs(&(0x7f0000003b40)='ntfs\x00', 0x0, 0x0, 0x2, &(0x7f0000004180)=[{&(0x7f0000003bc0)="8c2e465f2b35762cdadbc37df12f6b0a5cefe6561e65b8ccf36134af3820339c03b35dd84f80fb096582449fcee7c8db08fbdce6cf40340b39a5b2a68669d382388b0a9171fa4415", 0x48, 0x9}, {0x0, 0x0, 0xea4}], 0x0, 0x0) 00:15:58 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r0 = socket(0xa, 0x6, 0x0) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000040)={0x11, @empty, 0x11, 0x0, 'wrr\x00', 0x3}, 0x2c) 00:15:58 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) r1 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f0000000440)=""/186, 0x760) getdents(r1, &(0x7f00000002c0)=""/137, 0x20000349) 00:15:58 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) getdents64(0xffffffffffffffff, &(0x7f0000000440)=""/186, 0x760) getdents(0xffffffffffffffff, &(0x7f00000002c0)=""/137, 0x20000349) 00:15:58 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x8}]}, &(0x7f0000f6bffb)='GPL\x00'}, 0x48) 00:15:58 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = gettid() rt_sigqueueinfo(r1, 0x1c, &(0x7f0000000000)={0x0, 0x0, 0x3}) 00:15:58 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r0 = socket(0xa, 0x6, 0x0) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000040)={0x11, @empty, 0x11, 0x0, 'wrr\x00', 0x3}, 0x2c) [ 186.174923][T10684] IPVS: ip_vs_svc_hash(): request for already hashed, called from do_ip_vs_set_ctl+0xe01/0xee0 00:15:58 executing program 4: syz_mount_image$ntfs(&(0x7f0000003b40)='ntfs\x00', 0x0, 0x0, 0x2, &(0x7f0000004180)=[{&(0x7f0000003bc0)="8c2e465f2b35762cdadbc37df12f6b0a5cefe6561e65b8ccf36134af3820339c03b35dd84f80fb096582449fcee7c8db08fbdce6cf40340b39a5b2a68669d382388b0a9171fa4415", 0x48, 0x9}, {0x0, 0x0, 0xea4}], 0x0, 0x0) 00:15:59 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) r1 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f0000000440)=""/186, 0x760) getdents(r1, &(0x7f00000002c0)=""/137, 0x20000349) 00:15:59 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = gettid() rt_sigqueueinfo(r1, 0x1c, &(0x7f0000000000)={0x0, 0x0, 0x3}) [ 186.331678][T10700] IPVS: ip_vs_svc_hash(): request for already hashed, called from do_ip_vs_set_ctl+0xe01/0xee0 00:15:59 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) getdents64(0xffffffffffffffff, &(0x7f0000000440)=""/186, 0x760) getdents(0xffffffffffffffff, &(0x7f00000002c0)=""/137, 0x20000349) 00:15:59 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x8}]}, &(0x7f0000f6bffb)='GPL\x00'}, 0x48) 00:15:59 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = gettid() rt_sigqueueinfo(r1, 0x1c, &(0x7f0000000000)={0x0, 0x0, 0x3}) 00:15:59 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r0 = socket(0xa, 0x6, 0x0) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000040)={0x11, @empty, 0x11, 0x0, 'wrr\x00', 0x3}, 0x2c) 00:15:59 executing program 4: syz_mount_image$ntfs(&(0x7f0000003b40)='ntfs\x00', &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 00:15:59 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) r1 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f0000000440)=""/186, 0x760) getdents(r1, &(0x7f00000002c0)=""/137, 0x20000349) 00:15:59 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x8}]}, &(0x7f0000f6bffb)='GPL\x00'}, 0x48) 00:15:59 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r1 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f0000000440)=""/186, 0x760) getdents(r1, &(0x7f00000002c0)=""/137, 0x20000349) [ 186.610317][T10723] IPVS: ip_vs_svc_hash(): request for already hashed, called from do_ip_vs_set_ctl+0xe01/0xee0 00:15:59 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) r1 = gettid() rt_sigqueueinfo(r1, 0x1c, &(0x7f0000000000)={0x0, 0x0, 0x3}) 00:15:59 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = socket(0xa, 0x6, 0x0) setsockopt$IP_VS_SO_SET_ADD(r1, 0x0, 0x482, &(0x7f0000000040)={0x11, @empty, 0x11, 0x0, 'wrr\x00', 0x3}, 0x2c) 00:15:59 executing program 4: syz_mount_image$ntfs(&(0x7f0000003b40)='ntfs\x00', &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 00:15:59 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r1 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f0000000440)=""/186, 0x760) getdents(r1, &(0x7f00000002c0)=""/137, 0x20000349) [ 186.810715][T10744] IPVS: ip_vs_svc_hash(): request for already hashed, called from do_ip_vs_set_ctl+0xe01/0xee0 00:15:59 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) r1 = gettid() rt_sigqueueinfo(r1, 0x1c, &(0x7f0000000000)={0x0, 0x0, 0x3}) 00:15:59 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) r1 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f0000000440)=""/186, 0x760) 00:15:59 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x8}]}, &(0x7f0000f6bffb)='GPL\x00'}, 0x48) 00:15:59 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = socket(0xa, 0x6, 0x0) setsockopt$IP_VS_SO_SET_ADD(r1, 0x0, 0x482, &(0x7f0000000040)={0x11, @empty, 0x11, 0x0, 'wrr\x00', 0x3}, 0x2c) 00:15:59 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r1 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f0000000440)=""/186, 0x760) getdents(r1, &(0x7f00000002c0)=""/137, 0x20000349) 00:15:59 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) r1 = gettid() rt_sigqueueinfo(r1, 0x1c, &(0x7f0000000000)={0x0, 0x0, 0x3}) 00:15:59 executing program 4: syz_mount_image$ntfs(&(0x7f0000003b40)='ntfs\x00', &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 00:15:59 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) getdents64(0xffffffffffffffff, &(0x7f0000000440)=""/186, 0x760) [ 187.109076][T10766] IPVS: ip_vs_svc_hash(): request for already hashed, called from do_ip_vs_set_ctl+0xe01/0xee0 00:15:59 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, 0x0, 0x0) 00:15:59 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) r1 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f0000000440)=""/186, 0x760) getdents(r1, &(0x7f00000002c0)=""/137, 0x20000349) 00:15:59 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)) r1 = gettid() rt_sigqueueinfo(r1, 0x1c, &(0x7f0000000000)={0x0, 0x0, 0x3}) 00:15:59 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = socket(0xa, 0x6, 0x0) setsockopt$IP_VS_SO_SET_ADD(r1, 0x0, 0x482, &(0x7f0000000040)={0x11, @empty, 0x11, 0x0, 'wrr\x00', 0x3}, 0x2c) 00:15:59 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) getdents64(0xffffffffffffffff, &(0x7f0000000440)=""/186, 0x760) 00:16:00 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, 0x0, 0x0) 00:16:00 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)) r1 = gettid() rt_sigqueueinfo(r1, 0x1c, &(0x7f0000000000)={0x0, 0x0, 0x3}) [ 187.386563][T10787] IPVS: ip_vs_svc_hash(): request for already hashed, called from do_ip_vs_set_ctl+0xe01/0xee0 00:16:00 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)) r1 = gettid() rt_sigqueueinfo(r1, 0x1c, &(0x7f0000000000)={0x0, 0x0, 0x3}) 00:16:00 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, 0x0, 0x0) 00:16:00 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) r1 = socket(0xa, 0x6, 0x0) setsockopt$IP_VS_SO_SET_ADD(r1, 0x0, 0x482, &(0x7f0000000040)={0x11, @empty, 0x11, 0x0, 'wrr\x00', 0x3}, 0x2c) 00:16:00 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) getdents64(0xffffffffffffffff, &(0x7f0000000440)=""/186, 0x760) 00:16:00 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) r1 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f0000000440)=""/186, 0x760) getdents(r1, &(0x7f00000002c0)=""/137, 0x20000349) 00:16:00 executing program 4: syz_mount_image$ntfs(&(0x7f0000003b40)='ntfs\x00', &(0x7f0000003b80)='./file0\x00', 0x0, 0x1, &(0x7f0000004180)=[{&(0x7f0000003bc0)="8c2e465f2b35762cdadbc37df12f6b0a5cefe6561e65b8ccf36134af3820339c03b35dd84f80fb096582449fcee7c8db08fbdce6cf40340b39a5b2a68669d382388b0a9171fa4415", 0x48, 0x9}], 0x0, 0x0) 00:16:00 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0b") r1 = gettid() rt_sigqueueinfo(r1, 0x1c, &(0x7f0000000000)={0x0, 0x0, 0x3}) 00:16:00 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x0, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x8}]}, &(0x7f0000f6bffb)='GPL\x00'}, 0x48) [ 187.665001][T10818] IPVS: ip_vs_svc_hash(): request for already hashed, called from do_ip_vs_set_ctl+0xe01/0xee0 00:16:00 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) r1 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f0000000440)=""/186, 0x760) getdents(r1, &(0x7f00000002c0)=""/137, 0x20000349) 00:16:00 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r1 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f0000000440)=""/186, 0x760) 00:16:00 executing program 4: syz_mount_image$ntfs(&(0x7f0000003b40)='ntfs\x00', &(0x7f0000003b80)='./file0\x00', 0x0, 0x1, &(0x7f0000004180)=[{&(0x7f0000003bc0)="8c2e465f2b35762cdadbc37df12f6b0a5cefe6561e65b8ccf36134af3820339c03b35dd84f80fb096582449fcee7c8db08fbdce6cf40340b39a5b2a68669d382388b0a9171fa4415", 0x48, 0x9}], 0x0, 0x0) 00:16:00 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0b") r1 = gettid() rt_sigqueueinfo(r1, 0x1c, &(0x7f0000000000)={0x0, 0x0, 0x3}) 00:16:00 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) r1 = socket(0xa, 0x6, 0x0) setsockopt$IP_VS_SO_SET_ADD(r1, 0x0, 0x482, &(0x7f0000000040)={0x11, @empty, 0x11, 0x0, 'wrr\x00', 0x3}, 0x2c) 00:16:00 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x0, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x8}]}, &(0x7f0000f6bffb)='GPL\x00'}, 0x48) 00:16:00 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000440)=""/186, 0x760) getdents(r0, &(0x7f00000002c0)=""/137, 0x20000349) 00:16:00 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r1 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f0000000440)=""/186, 0x760) [ 188.005067][T10845] IPVS: ip_vs_svc_hash(): request for already hashed, called from do_ip_vs_set_ctl+0xe01/0xee0 00:16:00 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x0, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x8}]}, &(0x7f0000f6bffb)='GPL\x00'}, 0x48) 00:16:00 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0b") r1 = gettid() rt_sigqueueinfo(r1, 0x1c, &(0x7f0000000000)={0x0, 0x0, 0x3}) 00:16:00 executing program 4: syz_mount_image$ntfs(&(0x7f0000003b40)='ntfs\x00', &(0x7f0000003b80)='./file0\x00', 0x0, 0x1, &(0x7f0000004180)=[{&(0x7f0000003bc0)="8c2e465f2b35762cdadbc37df12f6b0a5cefe6561e65b8ccf36134af3820339c03b35dd84f80fb096582449fcee7c8db08fbdce6cf40340b39a5b2a68669d382388b0a9171fa4415", 0x48, 0x9}], 0x0, 0x0) 00:16:00 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000440)=""/186, 0x760) getdents(r0, &(0x7f00000002c0)=""/137, 0x20000349) 00:16:00 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r1 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f0000000440)=""/186, 0x760) 00:16:00 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) r1 = socket(0xa, 0x6, 0x0) setsockopt$IP_VS_SO_SET_ADD(r1, 0x0, 0x482, &(0x7f0000000040)={0x11, @empty, 0x11, 0x0, 'wrr\x00', 0x3}, 0x2c) 00:16:00 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0xa, 0x0, 0x0, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) 00:16:00 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000440)=""/186, 0x760) getdents(r0, &(0x7f00000002c0)=""/137, 0x20000349) 00:16:00 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) r1 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f0000000440)=""/186, 0x760) 00:16:00 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47b") r1 = gettid() rt_sigqueueinfo(r1, 0x1c, &(0x7f0000000000)={0x0, 0x0, 0x3}) 00:16:00 executing program 4: syz_mount_image$ntfs(&(0x7f0000003b40)='ntfs\x00', &(0x7f0000003b80)='./file0\x00', 0x0, 0x2, &(0x7f0000004180)=[{&(0x7f0000003bc0)="8c2e465f2b35762cdadbc37df12f6b0a5cefe6561e65b8ccf36134af3820339c03b35dd84f80fb096582449fcee7c8db08fbdce6cf40340b39a5b2a68669d382388b0a9171fa4415", 0x48, 0x9}, {0x0}], 0x0, 0x0) [ 188.334195][T10873] IPVS: ip_vs_svc_hash(): request for already hashed, called from do_ip_vs_set_ctl+0xe01/0xee0 00:16:01 executing program 1: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000440)=""/186, 0x760) getdents(r0, &(0x7f00000002c0)=""/137, 0x20000349) 00:16:01 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) r1 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f0000000440)=""/186, 0x760) 00:16:01 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)) r1 = socket(0xa, 0x6, 0x0) setsockopt$IP_VS_SO_SET_ADD(r1, 0x0, 0x482, &(0x7f0000000040)={0x11, @empty, 0x11, 0x0, 'wrr\x00', 0x3}, 0x2c) [ 188.571985][T10894] IPVS: ip_vs_svc_hash(): request for already hashed, called from do_ip_vs_set_ctl+0xe01/0xee0 00:16:01 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0xa, 0x0, 0x0, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) 00:16:01 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47b") r1 = gettid() rt_sigqueueinfo(r1, 0x1c, &(0x7f0000000000)={0x0, 0x0, 0x3}) 00:16:01 executing program 4: syz_mount_image$ntfs(&(0x7f0000003b40)='ntfs\x00', &(0x7f0000003b80)='./file0\x00', 0x0, 0x2, &(0x7f0000004180)=[{&(0x7f0000003bc0)="8c2e465f2b35762cdadbc37df12f6b0a5cefe6561e65b8ccf36134af3820339c03b35dd84f80fb096582449fcee7c8db08fbdce6cf40340b39a5b2a68669d382388b0a9171fa4415", 0x48, 0x9}, {0x0}], 0x0, 0x0) 00:16:01 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) r1 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f0000000440)=""/186, 0x760) 00:16:01 executing program 1: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000440)=""/186, 0x760) getdents(r0, &(0x7f00000002c0)=""/137, 0x20000349) 00:16:01 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)) r1 = socket(0xa, 0x6, 0x0) setsockopt$IP_VS_SO_SET_ADD(r1, 0x0, 0x482, &(0x7f0000000040)={0x11, @empty, 0x11, 0x0, 'wrr\x00', 0x3}, 0x2c) [ 188.720208][T10908] __ntfs_error: 17 callbacks suppressed [ 188.720218][T10908] ntfs: (device loop4): ntfs_fill_super(): Unable to determine device size. 00:16:01 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47b") r1 = gettid() rt_sigqueueinfo(r1, 0x1c, &(0x7f0000000000)={0x0, 0x0, 0x3}) 00:16:01 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0xa, 0x0, 0x0, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) [ 188.816903][T10916] IPVS: ip_vs_svc_hash(): request for already hashed, called from do_ip_vs_set_ctl+0xe01/0xee0 00:16:01 executing program 1: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000440)=""/186, 0x760) getdents(r0, &(0x7f00000002c0)=""/137, 0x20000349) 00:16:01 executing program 4: syz_mount_image$ntfs(&(0x7f0000003b40)='ntfs\x00', &(0x7f0000003b80)='./file0\x00', 0x0, 0x2, &(0x7f0000004180)=[{&(0x7f0000003bc0)="8c2e465f2b35762cdadbc37df12f6b0a5cefe6561e65b8ccf36134af3820339c03b35dd84f80fb096582449fcee7c8db08fbdce6cf40340b39a5b2a68669d382388b0a9171fa4415", 0x48, 0x9}, {0x0}], 0x0, 0x0) 00:16:01 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf0") r1 = gettid() rt_sigqueueinfo(r1, 0x1c, &(0x7f0000000000)={0x0, 0x0, 0x3}) 00:16:01 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000440)=""/186, 0x760) 00:16:01 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)) r1 = socket(0xa, 0x6, 0x0) setsockopt$IP_VS_SO_SET_ADD(r1, 0x0, 0x482, &(0x7f0000000040)={0x11, @empty, 0x11, 0x0, 'wrr\x00', 0x3}, 0x2c) 00:16:01 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0xa, 0x3, &(0x7f0000346fc8)=@framed, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) [ 189.024203][T10931] ntfs: (device loop4): ntfs_fill_super(): Unable to determine device size. 00:16:01 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000440)=""/186, 0x760) getdents(r0, &(0x7f00000002c0)=""/137, 0x20000349) 00:16:01 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf0") r1 = gettid() rt_sigqueueinfo(r1, 0x1c, &(0x7f0000000000)={0x0, 0x0, 0x3}) [ 189.099835][T10940] IPVS: ip_vs_svc_hash(): request for already hashed, called from do_ip_vs_set_ctl+0xe01/0xee0 00:16:01 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000440)=""/186, 0x760) 00:16:01 executing program 4: syz_mount_image$ntfs(&(0x7f0000003b40)='ntfs\x00', &(0x7f0000003b80)='./file0\x00', 0x0, 0x1, &(0x7f0000004180)=[{0x0, 0x0, 0xea4}], 0x0, 0x0) 00:16:01 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0b") r1 = socket(0xa, 0x6, 0x0) setsockopt$IP_VS_SO_SET_ADD(r1, 0x0, 0x482, &(0x7f0000000040)={0x11, @empty, 0x11, 0x0, 'wrr\x00', 0x3}, 0x2c) 00:16:01 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0xa, 0x3, &(0x7f0000346fc8)=@framed, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) 00:16:01 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf0") r1 = gettid() rt_sigqueueinfo(r1, 0x1c, &(0x7f0000000000)={0x0, 0x0, 0x3}) [ 189.330918][T10960] ntfs: (device loop4): read_ntfs_boot_sector(): Primary boot sector is invalid. 00:16:02 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000440)=""/186, 0x760) getdents(r0, &(0x7f00000002c0)=""/137, 0x20000349) 00:16:02 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000440)=""/186, 0x760) [ 189.391807][T10963] IPVS: ip_vs_svc_hash(): request for already hashed, called from do_ip_vs_set_ctl+0xe01/0xee0 00:16:02 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") gettid() rt_sigqueueinfo(0x0, 0x1c, &(0x7f0000000000)={0x0, 0x0, 0x3}) [ 189.470749][T10960] ntfs: (device loop4): read_ntfs_boot_sector(): Mount option errors=recover not used. Aborting without trying to recover. 00:16:02 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0b") r1 = socket(0xa, 0x6, 0x0) setsockopt$IP_VS_SO_SET_ADD(r1, 0x0, 0x482, &(0x7f0000000040)={0x11, @empty, 0x11, 0x0, 'wrr\x00', 0x3}, 0x2c) 00:16:02 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0xa, 0x3, &(0x7f0000346fc8)=@framed, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) [ 189.518432][T10960] ntfs: (device loop4): ntfs_fill_super(): Not an NTFS volume. 00:16:02 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000440)=""/186, 0x760) getdents(r0, &(0x7f00000002c0)=""/137, 0x20000349) 00:16:02 executing program 2: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000440)=""/186, 0x760) 00:16:02 executing program 4: syz_mount_image$ntfs(&(0x7f0000003b40)='ntfs\x00', &(0x7f0000003b80)='./file0\x00', 0x0, 0x1, &(0x7f0000004180)=[{0x0, 0x0, 0xea4}], 0x0, 0x0) 00:16:02 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") gettid() rt_sigqueueinfo(0x0, 0x1c, &(0x7f0000000000)={0x0, 0x0, 0x3}) [ 189.665657][T10983] IPVS: ip_vs_svc_hash(): request for already hashed, called from do_ip_vs_set_ctl+0xe01/0xee0 00:16:02 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x0, 0x0, 0x6, 0x0, 0x1, 0x8}]}, &(0x7f0000f6bffb)='GPL\x00'}, 0x48) 00:16:02 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") gettid() rt_sigqueueinfo(0x0, 0x1c, &(0x7f0000000000)={0x0, 0x0, 0x3}) 00:16:02 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0b") r1 = socket(0xa, 0x6, 0x0) setsockopt$IP_VS_SO_SET_ADD(r1, 0x0, 0x482, &(0x7f0000000040)={0x11, @empty, 0x11, 0x0, 'wrr\x00', 0x3}, 0x2c) 00:16:02 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) r1 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f0000000440)=""/186, 0x760) getdents(r1, &(0x7f00000002c0)=""/137, 0x20000349) 00:16:02 executing program 2: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000440)=""/186, 0x760) [ 189.790350][T10997] ntfs: (device loop4): read_ntfs_boot_sector(): Primary boot sector is invalid. [ 189.819164][T10997] ntfs: (device loop4): read_ntfs_boot_sector(): Mount option errors=recover not used. Aborting without trying to recover. 00:16:02 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = gettid() rt_sigqueueinfo(r1, 0x0, &(0x7f0000000000)={0x0, 0x0, 0x3}) [ 189.936103][T11010] IPVS: ip_vs_svc_hash(): request for already hashed, called from do_ip_vs_set_ctl+0xe01/0xee0 [ 189.963198][T10997] ntfs: (device loop4): ntfs_fill_super(): Not an NTFS volume. 00:16:02 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x0, 0x0, 0x6, 0x0, 0x1, 0x8}]}, &(0x7f0000f6bffb)='GPL\x00'}, 0x48) 00:16:02 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47b") r1 = socket(0xa, 0x6, 0x0) setsockopt$IP_VS_SO_SET_ADD(r1, 0x0, 0x482, &(0x7f0000000040)={0x11, @empty, 0x11, 0x0, 'wrr\x00', 0x3}, 0x2c) 00:16:02 executing program 2: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000440)=""/186, 0x760) 00:16:02 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) r1 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f0000000440)=""/186, 0x760) getdents(r1, &(0x7f00000002c0)=""/137, 0x20000349) 00:16:02 executing program 4: syz_mount_image$ntfs(&(0x7f0000003b40)='ntfs\x00', &(0x7f0000003b80)='./file0\x00', 0x0, 0x1, &(0x7f0000004180)=[{0x0, 0x0, 0xea4}], 0x0, 0x0) 00:16:02 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = gettid() rt_sigqueueinfo(r1, 0x0, &(0x7f0000000000)={0x0, 0x0, 0x3}) [ 190.178442][T11029] IPVS: ip_vs_svc_hash(): request for already hashed, called from do_ip_vs_set_ctl+0xe01/0xee0 00:16:02 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) r1 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f0000000440)=""/186, 0x760) getdents(r1, &(0x7f00000002c0)=""/137, 0x20000349) 00:16:02 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47b") r1 = socket(0xa, 0x6, 0x0) setsockopt$IP_VS_SO_SET_ADD(r1, 0x0, 0x482, &(0x7f0000000040)={0x11, @empty, 0x11, 0x0, 'wrr\x00', 0x3}, 0x2c) 00:16:02 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x0, 0x0, 0x6, 0x0, 0x1, 0x8}]}, &(0x7f0000f6bffb)='GPL\x00'}, 0x48) [ 190.260728][T11034] ntfs: (device loop4): read_ntfs_boot_sector(): Primary boot sector is invalid. 00:16:02 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000440)=""/186, 0x760) 00:16:03 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = gettid() rt_sigqueueinfo(r1, 0x0, &(0x7f0000000000)={0x0, 0x0, 0x3}) [ 190.317481][T11034] ntfs: (device loop4): read_ntfs_boot_sector(): Mount option errors=recover not used. Aborting without trying to recover. [ 190.409954][T11053] IPVS: ip_vs_svc_hash(): request for already hashed, called from do_ip_vs_set_ctl+0xe01/0xee0 00:16:03 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000440)=""/186, 0x760) 00:16:03 executing program 4: syz_mount_image$ntfs(&(0x7f0000003b40)='ntfs\x00', &(0x7f0000003b80)='./file0\x00', 0x0, 0x2, &(0x7f0000004180)=[{0x0, 0x0, 0x9}, {0x0, 0x0, 0xea4}], 0x0, 0x0) 00:16:03 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = gettid() rt_sigqueueinfo(r1, 0x1c, 0x0) 00:16:03 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x0, 0x0, 0x1, 0x8}]}, &(0x7f0000f6bffb)='GPL\x00'}, 0x48) 00:16:03 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) r1 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f0000000440)=""/186, 0x760) getdents(r1, &(0x7f00000002c0)=""/137, 0x20000349) 00:16:03 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47b") r1 = socket(0xa, 0x6, 0x0) setsockopt$IP_VS_SO_SET_ADD(r1, 0x0, 0x482, &(0x7f0000000040)={0x11, @empty, 0x11, 0x0, 'wrr\x00', 0x3}, 0x2c) 00:16:03 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000440)=""/186, 0x760) 00:16:03 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = gettid() rt_sigqueueinfo(r1, 0x1c, 0x0) [ 190.678179][T11072] IPVS: ip_vs_svc_hash(): request for already hashed, called from do_ip_vs_set_ctl+0xe01/0xee0 00:16:03 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x0, 0x0, 0x1, 0x8}]}, &(0x7f0000f6bffb)='GPL\x00'}, 0x48) 00:16:03 executing program 4: syz_mount_image$ntfs(&(0x7f0000003b40)='ntfs\x00', &(0x7f0000003b80)='./file0\x00', 0x0, 0x2, &(0x7f0000004180)=[{0x0, 0x0, 0x9}, {0x0, 0x0, 0xea4}], 0x0, 0x0) 00:16:03 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf0") r1 = socket(0xa, 0x6, 0x0) setsockopt$IP_VS_SO_SET_ADD(r1, 0x0, 0x482, &(0x7f0000000040)={0x11, @empty, 0x11, 0x0, 'wrr\x00', 0x3}, 0x2c) 00:16:03 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) r1 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f0000000440)=""/186, 0x760) getdents(r1, &(0x7f00000002c0)=""/137, 0x20000349) 00:16:03 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) r1 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f0000000440)=""/186, 0x760) 00:16:03 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = gettid() rt_sigqueueinfo(r1, 0x1c, 0x0) 00:16:03 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x0, 0x0, 0x1, 0x8}]}, &(0x7f0000f6bffb)='GPL\x00'}, 0x48) 00:16:03 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf0") r1 = socket(0xa, 0x6, 0x0) setsockopt$IP_VS_SO_SET_ADD(r1, 0x0, 0x482, &(0x7f0000000040)={0x11, @empty, 0x11, 0x0, 'wrr\x00', 0x3}, 0x2c) [ 190.914156][T11089] IPVS: ip_vs_svc_hash(): request for already hashed, called from do_ip_vs_set_ctl+0xe01/0xee0 00:16:03 executing program 4: syz_mount_image$ntfs(&(0x7f0000003b40)='ntfs\x00', &(0x7f0000003b80)='./file0\x00', 0x0, 0x2, &(0x7f0000004180)=[{0x0, 0x0, 0x9}, {0x0, 0x0, 0xea4}], 0x0, 0x0) 00:16:03 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = gettid() rt_sigqueueinfo(r1, 0x1c, &(0x7f0000000000)) 00:16:03 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) r1 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f0000000440)=""/186, 0x760) 00:16:03 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) r1 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f0000000440)=""/186, 0x760) getdents(r1, &(0x7f00000002c0)=""/137, 0x20000349) [ 191.110908][T11107] IPVS: ip_vs_svc_hash(): request for already hashed, called from do_ip_vs_set_ctl+0xe01/0xee0 00:16:03 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x0, 0x8}]}, &(0x7f0000f6bffb)='GPL\x00'}, 0x48) 00:16:03 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf0") r1 = socket(0xa, 0x6, 0x0) setsockopt$IP_VS_SO_SET_ADD(r1, 0x0, 0x482, &(0x7f0000000040)={0x11, @empty, 0x11, 0x0, 'wrr\x00', 0x3}, 0x2c) 00:16:03 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = gettid() rt_sigqueueinfo(r1, 0x1c, &(0x7f0000000000)) 00:16:03 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) r1 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f0000000440)=""/186, 0x760) 00:16:04 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) r1 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f0000000440)=""/186, 0x760) getdents(r1, &(0x7f00000002c0)=""/137, 0x20000349) 00:16:04 executing program 4: syz_mount_image$ntfs(&(0x7f0000003b40)='ntfs\x00', &(0x7f0000003b80)='./file0\x00', 0x0, 0x2, &(0x7f0000004180)=[{&(0x7f0000003bc0), 0x0, 0x9}, {0x0, 0x0, 0xea4}], 0x0, 0x0) [ 191.343762][T11127] IPVS: ip_vs_svc_hash(): request for already hashed, called from do_ip_vs_set_ctl+0xe01/0xee0 00:16:04 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x0, 0x8}]}, &(0x7f0000f6bffb)='GPL\x00'}, 0x48) 00:16:04 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = gettid() rt_sigqueueinfo(r1, 0x1c, &(0x7f0000000000)) 00:16:04 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) r1 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f0000000440)=""/186, 0x760) 00:16:04 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = socket(0x0, 0x6, 0x0) setsockopt$IP_VS_SO_SET_ADD(r1, 0x0, 0x482, &(0x7f0000000040)={0x11, @empty, 0x11, 0x0, 'wrr\x00', 0x3}, 0x2c) 00:16:04 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) r1 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f0000000440)=""/186, 0x760) getdents(r1, &(0x7f00000002c0)=""/137, 0x20000349) 00:16:04 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2400000033001905000000000000000004000000ffd38d9304000100e01e011b04000800"], 0x24}}, 0x0) 00:16:04 executing program 4: syz_mount_image$ntfs(&(0x7f0000003b40)='ntfs\x00', &(0x7f0000003b80)='./file0\x00', 0x0, 0x2, &(0x7f0000004180)=[{&(0x7f0000003bc0), 0x0, 0x9}, {0x0, 0x0, 0xea4}], 0x0, 0x0) 00:16:04 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x0, 0x8}]}, &(0x7f0000f6bffb)='GPL\x00'}, 0x48) 00:16:04 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) r1 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f0000000440)=""/186, 0x760) 00:16:04 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = socket(0x0, 0x6, 0x0) setsockopt$IP_VS_SO_SET_ADD(r1, 0x0, 0x482, &(0x7f0000000040)={0x11, @empty, 0x11, 0x0, 'wrr\x00', 0x3}, 0x2c) 00:16:04 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) r1 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f0000000440)=""/186, 0x760) getdents(r1, &(0x7f00000002c0)=""/137, 0x20000349) [ 191.728980][T11162] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. [ 191.760054][T11162] openvswitch: netlink: Either Ethernet header or EtherType is required. 00:16:04 executing program 5: 00:16:04 executing program 4: syz_mount_image$ntfs(&(0x7f0000003b40)='ntfs\x00', &(0x7f0000003b80)='./file0\x00', 0x0, 0x2, &(0x7f0000004180)=[{&(0x7f0000003bc0), 0x0, 0x9}, {0x0, 0x0, 0xea4}], 0x0, 0x0) 00:16:04 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = socket(0x0, 0x6, 0x0) setsockopt$IP_VS_SO_SET_ADD(r1, 0x0, 0x482, &(0x7f0000000040)={0x11, @empty, 0x11, 0x0, 'wrr\x00', 0x3}, 0x2c) 00:16:04 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1}]}, &(0x7f0000f6bffb)='GPL\x00'}, 0x48) 00:16:04 executing program 5: 00:16:04 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) r1 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f0000000440)=""/186, 0x760) 00:16:04 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0b") mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) r1 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f0000000440)=""/186, 0x760) getdents(r1, &(0x7f00000002c0)=""/137, 0x20000349) 00:16:04 executing program 4: syz_mount_image$ntfs(&(0x7f0000003b40)='ntfs\x00', &(0x7f0000003b80)='./file0\x00', 0x0, 0x2, &(0x7f0000004180)=[{&(0x7f0000003bc0)="8c2e465f2b35762cdadbc37df12f6b0a5cefe6561e65b8ccf36134af3820339c03b35dd8", 0x24, 0x9}, {0x0, 0x0, 0xea4}], 0x0, 0x0) 00:16:04 executing program 5: 00:16:04 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = socket(0xa, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADD(r1, 0x0, 0x482, &(0x7f0000000040)={0x11, @empty, 0x11, 0x0, 'wrr\x00', 0x3}, 0x2c) 00:16:04 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1}]}, &(0x7f0000f6bffb)='GPL\x00'}, 0x48) 00:16:04 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) r1 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f0000000440)=""/186, 0x760) 00:16:04 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0b") mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) r1 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f0000000440)=""/186, 0x760) getdents(r1, &(0x7f00000002c0)=""/137, 0x20000349) 00:16:04 executing program 5: 00:16:05 executing program 4: syz_mount_image$ntfs(&(0x7f0000003b40)='ntfs\x00', &(0x7f0000003b80)='./file0\x00', 0x0, 0x2, &(0x7f0000004180)=[{&(0x7f0000003bc0)="8c2e465f2b35762cdadbc37df12f6b0a5cefe6561e65b8ccf36134af3820339c03b35dd8", 0x24, 0x9}, {0x0, 0x0, 0xea4}], 0x0, 0x0) 00:16:05 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1}]}, &(0x7f0000f6bffb)='GPL\x00'}, 0x48) 00:16:05 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = socket(0xa, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADD(r1, 0x0, 0x482, &(0x7f0000000040)={0x11, @empty, 0x11, 0x0, 'wrr\x00', 0x3}, 0x2c) 00:16:05 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) r1 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f0000000440)=""/186, 0x760) 00:16:05 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0b") mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) r1 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f0000000440)=""/186, 0x760) getdents(r1, &(0x7f00000002c0)=""/137, 0x20000349) 00:16:05 executing program 5: 00:16:05 executing program 4: syz_mount_image$ntfs(&(0x7f0000003b40)='ntfs\x00', &(0x7f0000003b80)='./file0\x00', 0x0, 0x2, &(0x7f0000004180)=[{&(0x7f0000003bc0)="8c2e465f2b35762cdadbc37df12f6b0a5cefe6561e65b8ccf36134af3820339c03b35dd8", 0x24, 0x9}, {0x0, 0x0, 0xea4}], 0x0, 0x0) 00:16:05 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x8}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) 00:16:05 executing program 5: 00:16:05 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = socket(0xa, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADD(r1, 0x0, 0x482, &(0x7f0000000040)={0x11, @empty, 0x11, 0x0, 'wrr\x00', 0x3}, 0x2c) 00:16:05 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47b") mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) r1 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f0000000440)=""/186, 0x760) getdents(r1, &(0x7f00000002c0)=""/137, 0x20000349) 00:16:05 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) r1 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f0000000440)=""/186, 0x760) 00:16:05 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x8}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) 00:16:05 executing program 4: syz_mount_image$ntfs(&(0x7f0000003b40)='ntfs\x00', &(0x7f0000003b80)='./file0\x00', 0x0, 0x2, &(0x7f0000004180)=[{&(0x7f0000003bc0)="8c2e465f2b35762cdadbc37df12f6b0a5cefe6561e65b8ccf36134af3820339c03b35dd84f80fb096582449fcee7c8db08fbdce6cf40", 0x36, 0x9}, {0x0, 0x0, 0xea4}], 0x0, 0x0) 00:16:05 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000440)={'team0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000040)={&(0x7f0000000280)={0x10, 0xf000}, 0x59, &(0x7f0000000200)={&(0x7f0000000240)=@bridge_delneigh={0x28, 0x1c, 0xf07, 0x0, 0x0, {0x7, 0x0, 0x0, r2}, [@NDA_LLADDR={0xa, 0x2, @local}]}, 0x42e}}, 0x0) 00:16:05 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47b") mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) r1 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f0000000440)=""/186, 0x760) getdents(r1, &(0x7f00000002c0)=""/137, 0x20000349) 00:16:05 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") socket(0xa, 0x6, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000040)={0x11, @empty, 0x11, 0x0, 'wrr\x00', 0x3}, 0x2c) 00:16:05 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x8}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) 00:16:05 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0xd, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x5, 0x1, 0x98}]}, &(0x7f0000f6bffb)='GPL\x00'}, 0x48) 00:16:05 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0b") mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) r1 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f0000000440)=""/186, 0x760) 00:16:05 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") socket(0xa, 0x6, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000040)={0x11, @empty, 0x11, 0x0, 'wrr\x00', 0x3}, 0x2c) 00:16:05 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47b") mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) r1 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f0000000440)=""/186, 0x760) getdents(r1, &(0x7f00000002c0)=""/137, 0x20000349) 00:16:05 executing program 4: syz_mount_image$ntfs(&(0x7f0000003b40)='ntfs\x00', &(0x7f0000003b80)='./file0\x00', 0x0, 0x2, &(0x7f0000004180)=[{&(0x7f0000003bc0)="8c2e465f2b35762cdadbc37df12f6b0a5cefe6561e65b8ccf36134af3820339c03b35dd84f80fb096582449fcee7c8db08fbdce6cf40", 0x36, 0x9}, {0x0, 0x0, 0xea4}], 0x0, 0x0) 00:16:05 executing program 5: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000240)='/dev/nullb0\x00', 0x4000000104002, 0x0) writev(r0, &(0x7f0000002740)=[{&(0x7f0000001400), 0x600}, {&(0x7f0000002400)="785cb3170fad099f9309f7a5df3949c85f7ea337ff0ff8cad26fd27489c6c9083ecf378f0032800aece680b3128873584ffe2d103a64c6c7ac5829e72a23370b35fad7abb3328b9be0333e9db6458aecfdd43db2706aaac05fb63018f1f35a41189bea4f385b894d1b0a4b818f675529d2379f85033fbb7f8fb39bc17fa9806c3906bea24d447a9f0fdf6ba9ce041405fdde4d06ffa45a247ad1cadf8d627692cbd5fa380ab60739addbd393e9b01142a1bc3f34ac7cf68d89f954fa01c927e83e67ff48d0bdd22713f3ef9453a54801cdf8605d12b8da97b3c0f7", 0x7ffff000}, {&(0x7f0000002500)}, {&(0x7f0000002580)="e95ca5f096ee71", 0x7}], 0x4) 00:16:05 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x8}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x70) 00:16:06 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf0") mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) r1 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f0000000440)=""/186, 0x760) getdents(r1, &(0x7f00000002c0)=""/137, 0x20000349) 00:16:06 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") socket(0xa, 0x6, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000040)={0x11, @empty, 0x11, 0x0, 'wrr\x00', 0x3}, 0x2c) 00:16:06 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0b") mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) r1 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f0000000440)=""/186, 0x760) 00:16:06 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x8}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x70) 00:16:06 executing program 4: syz_mount_image$ntfs(&(0x7f0000003b40)='ntfs\x00', &(0x7f0000003b80)='./file0\x00', 0x0, 0x2, &(0x7f0000004180)=[{&(0x7f0000003bc0)="8c2e465f2b35762cdadbc37df12f6b0a5cefe6561e65b8ccf36134af3820339c03b35dd84f80fb096582449fcee7c8db08fbdce6cf40", 0x36, 0x9}, {0x0, 0x0, 0xea4}], 0x0, 0x0) 00:16:06 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = socket(0xa, 0x6, 0x0) setsockopt$IP_VS_SO_SET_ADD(r1, 0x0, 0x482, 0x0, 0x0) 00:16:06 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf0") mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) r1 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f0000000440)=""/186, 0x760) getdents(r1, &(0x7f00000002c0)=""/137, 0x20000349) 00:16:06 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0b") mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) r1 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f0000000440)=""/186, 0x760) 00:16:06 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x8}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x70) 00:16:06 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = socket(0xa, 0x6, 0x0) setsockopt$IP_VS_SO_SET_ADD(r1, 0x0, 0x482, 0x0, 0x0) 00:16:06 executing program 5: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000240)='/dev/nullb0\x00', 0x4000000104002, 0x0) writev(r0, &(0x7f0000002740)=[{&(0x7f0000001400), 0x600}, {&(0x7f0000002400)="785cb3170fad099f9309f7a5df3949c85f7ea337ff0ff8cad26fd27489c6c9083ecf378f0032800aece680b3128873584ffe2d103a64c6c7ac5829e72a23370b35fad7abb3328b9be0333e9db6458aecfdd43db2706aaac05fb63018f1f35a41189bea4f385b894d1b0a4b818f675529d2379f85033fbb7f8fb39bc17fa9806c3906bea24d447a9f0fdf6ba9ce041405fdde4d06ffa45a247ad1cadf8d627692cbd5fa380ab60739addbd393e9b01142a1bc3f34ac7cf68d89f954fa01c927e83e67ff48d0bdd22713f3ef9453a54801cdf8605d12b8da97b3c0f7", 0x7ffff000}, {&(0x7f0000002500)}, {&(0x7f0000002580)="e95ca5f096ee71", 0x7}], 0x4) 00:16:06 executing program 4: syz_mount_image$ntfs(&(0x7f0000003b40)='ntfs\x00', &(0x7f0000003b80)='./file0\x00', 0x0, 0x2, &(0x7f0000004180)=[{&(0x7f0000003bc0)="8c2e465f2b35762cdadbc37df12f6b0a5cefe6561e65b8ccf36134af3820339c03b35dd84f80fb096582449fcee7c8db08fbdce6cf40340b39a5b2a68669d3", 0x3f, 0x9}, {0x0, 0x0, 0xea4}], 0x0, 0x0) 00:16:06 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = socket(0xa, 0x6, 0x0) setsockopt$IP_VS_SO_SET_ADD(r1, 0x0, 0x482, 0x0, 0x0) 00:16:06 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf0") mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) r1 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f0000000440)=""/186, 0x760) getdents(r1, &(0x7f00000002c0)=""/137, 0x20000349) 00:16:06 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x8}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x70) 00:16:06 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47b") mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) r1 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f0000000440)=""/186, 0x760) 00:16:06 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47b") mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) r1 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f0000000440)=""/186, 0x760) [ 194.173004][T11361] __ntfs_error: 37 callbacks suppressed [ 194.173014][T11361] ntfs: (device loop4): read_ntfs_boot_sector(): Primary boot sector is invalid. 00:16:06 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x8}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x70) 00:16:06 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = socket(0xa, 0x6, 0x0) setsockopt$IP_VS_SO_SET_ADD(r1, 0x0, 0x482, &(0x7f0000000040)={0x0, @empty, 0x11, 0x0, 'wrr\x00', 0x3}, 0x2c) 00:16:06 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") mkdir(0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) r1 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f0000000440)=""/186, 0x760) getdents(r1, &(0x7f00000002c0)=""/137, 0x20000349) [ 194.257892][T11361] ntfs: (device loop4): read_ntfs_boot_sector(): Mount option errors=recover not used. Aborting without trying to recover. [ 194.322702][T11361] ntfs: (device loop4): ntfs_fill_super(): Not an NTFS volume. 00:16:07 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47b") mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) r1 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f0000000440)=""/186, 0x760) 00:16:07 executing program 4: syz_mount_image$ntfs(&(0x7f0000003b40)='ntfs\x00', &(0x7f0000003b80)='./file0\x00', 0x0, 0x2, &(0x7f0000004180)=[{&(0x7f0000003bc0)="8c2e465f2b35762cdadbc37df12f6b0a5cefe6561e65b8ccf36134af3820339c03b35dd84f80fb096582449fcee7c8db08fbdce6cf40340b39a5b2a68669d3", 0x3f, 0x9}, {0x0, 0x0, 0xea4}], 0x0, 0x0) [ 194.417966][T11377] IPVS: set_ctl: invalid protocol: 0 0.0.0.0:17 [ 194.561639][T11386] ntfs: (device loop4): read_ntfs_boot_sector(): Primary boot sector is invalid. [ 194.632201][T11386] ntfs: (device loop4): read_ntfs_boot_sector(): Mount option errors=recover not used. Aborting without trying to recover. [ 194.652072][T11386] ntfs: (device loop4): ntfs_fill_super(): Not an NTFS volume. 00:16:07 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x8}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x70) 00:16:07 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = socket(0xa, 0x6, 0x0) setsockopt$IP_VS_SO_SET_ADD(r1, 0x0, 0x482, &(0x7f0000000040)={0x0, @empty, 0x11, 0x0, 'wrr\x00', 0x3}, 0x2c) 00:16:07 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") mkdir(0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) r1 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f0000000440)=""/186, 0x760) getdents(r1, &(0x7f00000002c0)=""/137, 0x20000349) 00:16:07 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf0") mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) r1 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f0000000440)=""/186, 0x760) 00:16:07 executing program 5: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000240)='/dev/nullb0\x00', 0x4000000104002, 0x0) writev(r0, &(0x7f0000002740)=[{&(0x7f0000001400), 0x600}, {&(0x7f0000002400)="785cb3170fad099f9309f7a5df3949c85f7ea337ff0ff8cad26fd27489c6c9083ecf378f0032800aece680b3128873584ffe2d103a64c6c7ac5829e72a23370b35fad7abb3328b9be0333e9db6458aecfdd43db2706aaac05fb63018f1f35a41189bea4f385b894d1b0a4b818f675529d2379f85033fbb7f8fb39bc17fa9806c3906bea24d447a9f0fdf6ba9ce041405fdde4d06ffa45a247ad1cadf8d627692cbd5fa380ab60739addbd393e9b01142a1bc3f34ac7cf68d89f954fa01c927e83e67ff48d0bdd22713f3ef9453a54801cdf8605d12b8da97b3c0f7", 0x7ffff000}, {&(0x7f0000002500)}, {&(0x7f0000002580)="e95ca5f096ee71", 0x7}], 0x4) 00:16:07 executing program 4: syz_mount_image$ntfs(&(0x7f0000003b40)='ntfs\x00', &(0x7f0000003b80)='./file0\x00', 0x0, 0x2, &(0x7f0000004180)=[{&(0x7f0000003bc0)="8c2e465f2b35762cdadbc37df12f6b0a5cefe6561e65b8ccf36134af3820339c03b35dd84f80fb096582449fcee7c8db08fbdce6cf40340b39a5b2a68669d3", 0x3f, 0x9}, {0x0, 0x0, 0xea4}], 0x0, 0x0) [ 194.958344][T11405] ntfs: (device loop4): read_ntfs_boot_sector(): Primary boot sector is invalid. [ 194.977816][T11405] ntfs: (device loop4): read_ntfs_boot_sector(): Mount option errors=recover not used. Aborting without trying to recover. 00:16:07 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") unshare(0x2000400) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f00000000c0)={0x0, 0x1c, &(0x7f0000000000)=[@in6={0xa, 0x0, 0x0, @rand_addr="6e31bfd72c89323c0c80b5167329292c"}]}, &(0x7f0000000100)=0x10) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r0, 0x84, 0x73, &(0x7f0000000340)={r2}, &(0x7f0000000380)=0x18) 00:16:07 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") mkdir(0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) r1 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f0000000440)=""/186, 0x760) getdents(r1, &(0x7f00000002c0)=""/137, 0x20000349) 00:16:07 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf0") mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) r1 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f0000000440)=""/186, 0x760) [ 195.006756][T11404] IPVS: set_ctl: invalid protocol: 0 0.0.0.0:17 [ 195.026262][T11405] ntfs: (device loop4): ntfs_fill_super(): Not an NTFS volume. 00:16:07 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = socket(0xa, 0x6, 0x0) setsockopt$IP_VS_SO_SET_ADD(r1, 0x0, 0x482, &(0x7f0000000040)={0x0, @empty, 0x11, 0x0, 'wrr\x00', 0x3}, 0x2c) 00:16:07 executing program 3: ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) sendto$netrom(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000280)={{0x3, @default, 0x1}, [@null, @default, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}, 0x48) dup3(r0, r1, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x10, 0xffffffffffffffff, 0x0) socket$inet_udp(0x2, 0x2, 0x0) syz_open_dev$media(0x0, 0x0, 0x100) [ 195.200652][T11422] IPVS: set_ctl: invalid protocol: 0 0.0.0.0:17 00:16:07 executing program 4: syz_mount_image$ntfs(&(0x7f0000003b40)='ntfs\x00', &(0x7f0000003b80)='./file0\x00', 0x0, 0x2, &(0x7f0000004180)=[{&(0x7f0000003bc0)="8c2e465f2b35762cdadbc37df12f6b0a5cefe6561e65b8ccf36134af3820339c03b35dd84f80fb096582449fcee7c8db08fbdce6cf40340b39a5b2a68669d382388b0a91", 0x44, 0x9}, {0x0, 0x0, 0xea4}], 0x0, 0x0) 00:16:07 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf0") mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) r1 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f0000000440)=""/186, 0x760) 00:16:07 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, 0x0, &(0x7f0000000280)='proc\x00', 0x0, 0x0) r1 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f0000000440)=""/186, 0x760) getdents(r1, &(0x7f00000002c0)=""/137, 0x20000349) 00:16:07 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = socket(0xa, 0x6, 0x0) setsockopt$IP_VS_SO_SET_ADD(r1, 0x0, 0x482, &(0x7f0000000040)={0x11, @empty, 0x0, 0x0, 'wrr\x00', 0x3}, 0x2c) [ 195.403261][T11436] IPVS: ip_vs_svc_hash(): request for already hashed, called from do_ip_vs_set_ctl+0xe01/0xee0 [ 195.405570][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:16:08 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, 0x0, &(0x7f0000000280)='proc\x00', 0x0, 0x0) r1 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f0000000440)=""/186, 0x760) getdents(r1, &(0x7f00000002c0)=""/137, 0x20000349) [ 195.485380][T11437] ntfs: (device loop4): read_ntfs_boot_sector(): Primary boot sector is invalid. [ 195.596955][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:16:08 executing program 5: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000240)='/dev/nullb0\x00', 0x4000000104002, 0x0) writev(r0, &(0x7f0000002740)=[{&(0x7f0000001400), 0x600}, {&(0x7f0000002400)="785cb3170fad099f9309f7a5df3949c85f7ea337ff0ff8cad26fd27489c6c9083ecf378f0032800aece680b3128873584ffe2d103a64c6c7ac5829e72a23370b35fad7abb3328b9be0333e9db6458aecfdd43db2706aaac05fb63018f1f35a41189bea4f385b894d1b0a4b818f675529d2379f85033fbb7f8fb39bc17fa9806c3906bea24d447a9f0fdf6ba9ce041405fdde4d06ffa45a247ad1cadf8d627692cbd5fa380ab60739addbd393e9b01142a1bc3f34ac7cf68d89f954fa01c927e83e67ff48d0bdd22713f3ef9453a54801cdf8605d12b8da97b3c0f7", 0x7ffff000}, {&(0x7f0000002500)}, {&(0x7f0000002580)="e95ca5f096ee71", 0x7}], 0x4) 00:16:08 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") mkdir(0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) r1 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f0000000440)=""/186, 0x760) 00:16:08 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = socket(0xa, 0x6, 0x0) setsockopt$IP_VS_SO_SET_ADD(r1, 0x0, 0x482, &(0x7f0000000040)={0x11, @empty, 0x0, 0x0, 'wrr\x00'}, 0x2c) 00:16:08 executing program 4: syz_mount_image$ntfs(&(0x7f0000003b40)='ntfs\x00', &(0x7f0000003b80)='./file0\x00', 0x0, 0x2, &(0x7f0000004180)=[{&(0x7f0000003bc0)="8c2e465f2b35762cdadbc37df12f6b0a5cefe6561e65b8ccf36134af3820339c03b35dd84f80fb096582449fcee7c8db08fbdce6cf40340b39a5b2a68669d382388b0a91", 0x44, 0x9}, {0x0, 0x0, 0xea4}], 0x0, 0x0) 00:16:08 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, 0x0, &(0x7f0000000280)='proc\x00', 0x0, 0x0) r1 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f0000000440)=""/186, 0x760) getdents(r1, &(0x7f00000002c0)=""/137, 0x20000349) 00:16:08 executing program 3: ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) sendto$netrom(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000280)={{0x3, @default, 0x1}, [@null, @default, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}, 0x48) dup3(r0, r1, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x10, 0xffffffffffffffff, 0x0) socket$inet_udp(0x2, 0x2, 0x0) syz_open_dev$media(0x0, 0x0, 0x100) 00:16:08 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = socket(0xa, 0x6, 0x0) setsockopt$IP_VS_SO_SET_ADD(r1, 0x0, 0x482, &(0x7f0000000040)={0x11, @empty, 0x0, 0x0, 'wrr\x00'}, 0x2c) 00:16:08 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") mkdir(0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) r1 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f0000000440)=""/186, 0x760) [ 195.934552][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:16:08 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) r1 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f0000000440)=""/186, 0x760) getdents(r1, &(0x7f00000002c0)=""/137, 0x20000349) 00:16:08 executing program 4: syz_mount_image$ntfs(&(0x7f0000003b40)='ntfs\x00', &(0x7f0000003b80)='./file0\x00', 0x0, 0x2, &(0x7f0000004180)=[{&(0x7f0000003bc0)="8c2e465f2b35762cdadbc37df12f6b0a5cefe6561e65b8ccf36134af3820339c03b35dd84f80fb096582449fcee7c8db08fbdce6cf40340b39a5b2a68669d382388b0a91", 0x44, 0x9}, {0x0, 0x0, 0xea4}], 0x0, 0x0) 00:16:08 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = socket(0xa, 0x6, 0x0) setsockopt$IP_VS_SO_SET_ADD(r1, 0x0, 0x482, &(0x7f0000000040)={0x11, @empty, 0x0, 0x0, 'wrr\x00'}, 0x2c) 00:16:08 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) r1 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f0000000440)=""/186, 0x760) getdents(r1, &(0x7f00000002c0)=""/137, 0x20000349) 00:16:09 executing program 5: writev(0xffffffffffffffff, &(0x7f0000002740)=[{&(0x7f0000001400), 0x600}, {&(0x7f0000002400)="785cb3170fad099f9309f7a5df3949c85f7ea337ff0ff8cad26fd27489c6c9083ecf378f0032800aece680b3128873584ffe2d103a64c6c7ac5829e72a23370b35fad7abb3328b9be0333e9db6458aecfdd43db2706aaac05fb63018f1f35a41189bea4f385b894d1b0a4b818f675529d2379f85033fbb7f8fb39bc17fa9806c3906bea24d447a9f0fdf6ba9ce041405fdde4d06ffa45a247ad1cadf8d627692cbd5fa380ab60739addbd393e9b01142a1bc3f34ac7cf68d89f954fa01c927e83e67ff48d0bdd22713f3ef9453a54801cdf8605d12b8da97b3c0f7", 0x7ffff000}, {&(0x7f0000002500)}, {&(0x7f0000002580)="e95ca5f096ee71", 0x7}], 0x4) 00:16:09 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") mkdir(0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) r1 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f0000000440)=""/186, 0x760) 00:16:09 executing program 4: syz_mount_image$ntfs(&(0x7f0000003b40)='ntfs\x00', &(0x7f0000003b80)='./file0\x00', 0x0, 0x2, &(0x7f0000004180)=[{&(0x7f0000003bc0)="8c2e465f2b35762cdadbc37df12f6b0a5cefe6561e65b8ccf36134af3820339c03b35dd84f80fb096582449fcee7c8db08fbdce6cf40340b39a5b2a68669d382388b0a9171fa", 0x46, 0x9}, {0x0, 0x0, 0xea4}], 0x0, 0x0) 00:16:09 executing program 0: ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) sendto$netrom(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000280)={{0x3, @default, 0x1}, [@null, @default, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}, 0x48) dup3(r0, r1, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x10, 0xffffffffffffffff, 0x0) socket$inet_udp(0x2, 0x2, 0x0) syz_open_dev$media(0x0, 0x0, 0x100) 00:16:09 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) r1 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f0000000440)=""/186, 0x760) getdents(r1, &(0x7f00000002c0)=""/137, 0x20000349) [ 196.778463][T11461] ================================================================== [ 196.786585][T11461] BUG: KASAN: use-after-free in tls_sk_proto_cleanup+0x37f/0x3e0 [ 196.794299][T11461] Read of size 1 at addr ffff88806922f294 by task syz-executor.3/11461 [ 196.802529][T11461] [ 196.804871][T11461] CPU: 1 PID: 11461 Comm: syz-executor.3 Not tainted 5.3.0-rc2-next-20190802 #58 [ 196.813974][T11461] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 196.816560][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 196.825241][T11461] Call Trace: [ 196.825266][T11461] dump_stack+0x172/0x1f0 [ 196.825295][T11461] ? tls_sk_proto_cleanup+0x37f/0x3e0 [ 196.849276][T11461] print_address_description.cold+0xd4/0x306 [ 196.855271][T11461] ? tls_sk_proto_cleanup+0x37f/0x3e0 [ 196.860650][T11461] ? tls_sk_proto_cleanup+0x37f/0x3e0 [ 196.866031][T11461] __kasan_report.cold+0x1b/0x36 [ 196.870995][T11461] ? trace_hardirqs_on+0x1c0/0x240 [ 196.876134][T11461] ? tls_sk_proto_cleanup+0x37f/0x3e0 [ 196.881512][T11461] kasan_report+0x12/0x17 [ 196.885844][T11461] __asan_report_load1_noabort+0x14/0x20 [ 196.891568][T11461] tls_sk_proto_cleanup+0x37f/0x3e0 [ 196.896784][T11461] ? wait_on_pending_writer+0x420/0x420 [ 196.902353][T11461] tls_sk_proto_unhash+0x90/0x3f0 [ 196.907554][T11461] tcp_set_state+0x5b9/0x7d0 [ 196.912268][T11461] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 196.919150][T11461] ? __sk_mem_reduce_allocated+0x1b0/0x560 [ 196.925268][T11461] ? tcp_alloc_md5sig_pool+0x4a0/0x4a0 [ 196.930735][T11461] ? __sk_mem_reclaim+0x55/0x70 [ 196.935588][T11461] ? tcp_write_queue_purge+0x5d8/0x1310 [ 196.941156][T11461] ? tcp_reset+0xc4/0x500 [ 196.945486][T11461] tcp_done+0xe2/0x320 [ 196.949561][T11461] tcp_reset+0x132/0x500 [ 196.953805][T11461] tcp_validate_incoming+0xa2d/0x1660 [ 196.959182][T11461] tcp_rcv_established+0x6b5/0x1e70 [ 196.964388][T11461] ? __this_cpu_preempt_check+0x3a/0x210 [ 196.970024][T11461] ? tcp_data_queue+0x4860/0x4860 [ 196.975053][T11461] tcp_v6_do_rcv+0x41e/0x12c0 [ 196.979739][T11461] __release_sock+0x129/0x390 [ 196.984417][T11461] release_sock+0x59/0x1c0 [ 196.988851][T11461] sk_stream_wait_memory+0x65a/0xfc0 [ 196.994138][T11461] ? sk_stream_kill_queues+0x520/0x520 [ 196.999608][T11461] ? __sanitizer_cov_trace_cmp8+0xf/0x20 [ 197.005242][T11461] ? prepare_to_wait_exclusive+0x320/0x320 [ 197.011156][T11461] ? __phys_addr+0xa4/0x120 [ 197.015662][T11461] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 197.021910][T11461] ? tls_get_rec+0x4a1/0x590 [ 197.026504][T11461] tls_sw_sendmsg+0x673/0x17b0 [ 197.031298][T11461] ? tx_work_handler+0x180/0x180 [ 197.036262][T11461] ? inet_send_prepare+0x60/0x4f0 [ 197.041422][T11461] ? inet_send_prepare+0x60/0x4f0 [ 197.047255][T11461] inet6_sendmsg+0x9e/0xe0 [ 197.051683][T11461] ? inet6_ioctl+0x1c0/0x1c0 [ 197.056277][T11461] sock_sendmsg+0xd7/0x130 [ 197.060696][T11461] __sys_sendto+0x262/0x380 [ 197.065204][T11461] ? __ia32_sys_getpeername+0xb0/0xb0 [ 197.070589][T11461] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 197.076837][T11461] ? put_timespec64+0xda/0x140 [ 197.081611][T11461] ? nsecs_to_jiffies+0x30/0x30 [ 197.086479][T11461] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 197.092737][T11461] ? __x64_sys_clock_gettime+0x16d/0x240 [ 197.098389][T11461] __x64_sys_sendto+0xe1/0x1a0 [ 197.103322][T11461] do_syscall_64+0xfa/0x760 [ 197.108301][T11461] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 197.114202][T11461] RIP: 0033:0x459829 [ 197.118101][T11461] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 197.137708][T11461] RSP: 002b:00007f3e5663ec78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 197.146116][T11461] RAX: ffffffffffffffda RBX: 0000000000000006 RCX: 0000000000459829 [ 197.154088][T11461] RDX: ffffffffffffffc1 RSI: 00000000200005c0 RDI: 0000000000000004 [ 197.162747][T11461] RBP: 000000000075bf20 R08: 0000000000000000 R09: 1201000000003618 [ 197.170721][T11461] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3e5663f6d4 [ 197.178699][T11461] R13: 00000000004c77d9 R14: 00000000004dcf90 R15: 00000000ffffffff [ 197.186763][T11461] [ 197.189098][T11461] Allocated by task 11461: [ 197.193519][T11461] save_stack+0x23/0x90 [ 197.197674][T11461] __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 197.203305][T11461] kasan_kmalloc+0x9/0x10 [ 197.207631][T11461] kmem_cache_alloc_trace+0x158/0x790 [ 197.212997][T11461] create_ctx+0x46/0x260 [ 197.217237][T11461] tls_init+0x134/0x560 [ 197.221396][T11461] tcp_set_ulp+0x330/0x640 [ 197.225950][T11461] do_tcp_setsockopt.isra.0+0x363/0x24f0 [ 197.232219][T11461] tcp_setsockopt+0xbe/0xe0 [ 197.236728][T11461] sock_common_setsockopt+0x94/0xd0 [ 197.241926][T11461] __sys_setsockopt+0x261/0x4c0 [ 197.246953][T11461] __x64_sys_setsockopt+0xbe/0x150 [ 197.252180][T11461] do_syscall_64+0xfa/0x760 [ 197.256770][T11461] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 197.262653][T11461] [ 197.264975][T11461] Freed by task 22: [ 197.268802][T11461] save_stack+0x23/0x90 [ 197.273076][T11461] __kasan_slab_free+0x102/0x150 [ 197.278024][T11461] kasan_slab_free+0xe/0x10 [ 197.282524][T11461] kfree+0x10a/0x2c0 [ 197.286421][T11461] tls_ctx_free.part.0+0x3a/0x40 [ 197.291367][T11461] tls_ctx_free_deferred+0x9f/0x130 [ 197.297109][T11461] process_one_work+0x9af/0x1740 [ 197.302052][T11461] worker_thread+0x98/0xe40 [ 197.306769][T11461] kthread+0x361/0x430 [ 197.310839][T11461] ret_from_fork+0x24/0x30 [ 197.315241][T11461] [ 197.317568][T11461] The buggy address belongs to the object at ffff88806922f280 [ 197.317568][T11461] which belongs to the cache kmalloc-512 of size 512 [ 197.331633][T11461] The buggy address is located 20 bytes inside of [ 197.331633][T11461] 512-byte region [ffff88806922f280, ffff88806922f480) [ 197.344809][T11461] The buggy address belongs to the page: [ 197.350445][T11461] page:ffffea0001a48bc0 refcount:1 mapcount:0 mapping:ffff8880aa400a80 index:0xffff88806922fc80 [ 197.360866][T11461] flags: 0x1fffc0000000200(slab) [ 197.366015][T11461] raw: 01fffc0000000200 ffffea00026a66c8 ffffea00023ac048 ffff8880aa400a80 [ 197.374604][T11461] raw: ffff88806922fc80 ffff88806922f000 0000000100000005 0000000000000000 [ 197.383177][T11461] page dumped because: kasan: bad access detected [ 197.389690][T11461] [ 197.392010][T11461] Memory state around the buggy address: [ 197.397637][T11461] ffff88806922f180: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 197.406080][T11461] ffff88806922f200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 197.414141][T11461] >ffff88806922f280: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 197.422192][T11461] ^ [ 197.426834][T11461] ffff88806922f300: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 197.434896][T11461] ffff88806922f380: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 197.442950][T11461] ================================================================== [ 197.550121][T11461] Kernel panic - not syncing: panic_on_warn set ... [ 197.556772][T11461] CPU: 0 PID: 11461 Comm: syz-executor.3 Tainted: G B 5.3.0-rc2-next-20190802 #58 [ 197.567265][T11461] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 197.577319][T11461] Call Trace: [ 197.580618][T11461] dump_stack+0x172/0x1f0 [ 197.584957][T11461] panic+0x2dc/0x755 [ 197.588853][T11461] ? add_taint.cold+0x16/0x16 [ 197.593542][T11461] ? tls_sk_proto_cleanup+0x37f/0x3e0 [ 197.598919][T11461] ? preempt_schedule+0x4b/0x60 [ 197.603776][T11461] ? ___preempt_schedule+0x16/0x20 [ 197.608917][T11461] ? trace_hardirqs_on+0x5e/0x240 [ 197.613954][T11461] ? tls_sk_proto_cleanup+0x37f/0x3e0 [ 197.619354][T11461] end_report+0x47/0x4f [ 197.623528][T11461] ? tls_sk_proto_cleanup+0x37f/0x3e0 [ 197.628903][T11461] __kasan_report.cold+0xe/0x36 [ 197.633766][T11461] ? trace_hardirqs_on+0x1c0/0x240 [ 197.638887][T11461] ? tls_sk_proto_cleanup+0x37f/0x3e0 [ 197.644266][T11461] kasan_report+0x12/0x17 [ 197.648601][T11461] __asan_report_load1_noabort+0x14/0x20 [ 197.654243][T11461] tls_sk_proto_cleanup+0x37f/0x3e0 [ 197.659446][T11461] ? wait_on_pending_writer+0x420/0x420 [ 197.665002][T11461] tls_sk_proto_unhash+0x90/0x3f0 [ 197.670034][T11461] tcp_set_state+0x5b9/0x7d0 [ 197.672371][ T3879] kobject: 'loop5' (00000000496bda1c): kobject_uevent_env [ 197.674634][T11461] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 197.681835][ T3879] kobject: 'loop5' (00000000496bda1c): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 197.687960][T11461] ? __sk_mem_reduce_allocated+0x1b0/0x560 [ 197.687974][T11461] ? tcp_alloc_md5sig_pool+0x4a0/0x4a0 [ 197.687988][T11461] ? __sk_mem_reclaim+0x55/0x70 [ 197.688008][T11461] ? tcp_write_queue_purge+0x5d8/0x1310 [ 197.719891][T11461] ? tcp_reset+0xc4/0x500 [ 197.724230][T11461] tcp_done+0xe2/0x320 [ 197.728308][T11461] tcp_reset+0x132/0x500 [ 197.732549][T11461] tcp_validate_incoming+0xa2d/0x1660 [ 197.737907][T11461] tcp_rcv_established+0x6b5/0x1e70 [ 197.743090][T11461] ? __this_cpu_preempt_check+0x3a/0x210 [ 197.748710][T11461] ? tcp_data_queue+0x4860/0x4860 [ 197.753721][T11461] tcp_v6_do_rcv+0x41e/0x12c0 [ 197.758470][T11461] __release_sock+0x129/0x390 [ 197.763145][T11461] release_sock+0x59/0x1c0 [ 197.767564][T11461] sk_stream_wait_memory+0x65a/0xfc0 [ 197.772836][T11461] ? sk_stream_kill_queues+0x520/0x520 [ 197.778288][T11461] ? __sanitizer_cov_trace_cmp8+0xf/0x20 [ 197.783912][T11461] ? prepare_to_wait_exclusive+0x320/0x320 [ 197.789704][T11461] ? __phys_addr+0xa4/0x120 [ 197.794208][T11461] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 197.800436][T11461] ? tls_get_rec+0x4a1/0x590 [ 197.805006][T11461] tls_sw_sendmsg+0x673/0x17b0 [ 197.809774][T11461] ? tx_work_handler+0x180/0x180 [ 197.814720][T11461] ? inet_send_prepare+0x60/0x4f0 [ 197.820175][T11461] ? inet_send_prepare+0x60/0x4f0 [ 197.825197][T11461] inet6_sendmsg+0x9e/0xe0 [ 197.829623][T11461] ? inet6_ioctl+0x1c0/0x1c0 [ 197.834198][T11461] sock_sendmsg+0xd7/0x130 [ 197.838596][T11461] __sys_sendto+0x262/0x380 [ 197.843099][T11461] ? __ia32_sys_getpeername+0xb0/0xb0 [ 197.848458][T11461] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 197.854700][T11461] ? put_timespec64+0xda/0x140 [ 197.859460][T11461] ? nsecs_to_jiffies+0x30/0x30 [ 197.864304][T11461] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 197.870558][T11461] ? __x64_sys_clock_gettime+0x16d/0x240 [ 197.876173][T11461] __x64_sys_sendto+0xe1/0x1a0 [ 197.880920][T11461] do_syscall_64+0xfa/0x760 [ 197.885407][T11461] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 197.891277][T11461] RIP: 0033:0x459829 [ 197.895162][T11461] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 197.914771][T11461] RSP: 002b:00007f3e5663ec78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 197.923180][T11461] RAX: ffffffffffffffda RBX: 0000000000000006 RCX: 0000000000459829 [ 197.931137][T11461] RDX: ffffffffffffffc1 RSI: 00000000200005c0 RDI: 0000000000000004 [ 197.939093][T11461] RBP: 000000000075bf20 R08: 0000000000000000 R09: 1201000000003618 [ 197.947044][T11461] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3e5663f6d4 [ 197.954998][T11461] R13: 00000000004c77d9 R14: 00000000004dcf90 R15: 00000000ffffffff [ 197.964103][T11461] Kernel Offset: disabled [ 197.968439][T11461] Rebooting in 86400 seconds..