000000000), 0x10}, 0x78) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x5, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) [ 515.028452][T21105] 8021q: adding VLAN 0 to HW filter on device ipvlan115 18:12:06 executing program 1: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$FS_IOC_RESVSP(r0, 0x402c5828, &(0x7f00000000c0)={0x0, 0x1, 0x0, 0x3078}) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x200000000}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x9) preadv(r1, &(0x7f0000000240)=[{&(0x7f0000000040)=""/94, 0x5e}, {&(0x7f00000000c0)=""/93, 0x5d}, {&(0x7f0000000140)=""/58, 0x3a}], 0x3, 0xd9f, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000002340)='./file0\x00', 0x0, 0x108) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000180)={'team0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @local}, 0x14) writev(r2, &(0x7f0000000280)=[{&(0x7f00000008c0)="110eaa1a9896d57019effc8c79961d0f73ccf3afca3754e2e7a31f536bcb7204bed59311e29c96e1c2b663d61e5b0c0a76ea50cbddaa69f578b8600f77cf1a538ac900673696245b6de4283c979a2eccd71f9583dacf650575d1398678895da32663735b4d0cabfe7e972e59c2b4b4c9c89d0b82ca2267ad5062303e8abcb79600010506702eb912e3957e507aec4e2180699a738f6753509a12282a1d7181887f6c2e03de1da0dfe3b4efbb10e9b59301b4ef8a1d", 0xb5}, {&(0x7f0000000980)="34c30d95766fefbb7bdc40a3242505587bbc8584c2bc2003185f5ce116eea020efa91e2aae1eae2b8e848ac13c3dcedbbbc82adb1e70be8eecedba37be82545f2abda4f0a0e0fd0edd6bd03bb8e9bb91c39a2c828511aef3e684ad4c21ec0c146b9570139e31cd", 0x67}], 0x2) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'macvtap0\x00'}) ioctl$PPPIOCSFLAGS1(0xffffffffffffffff, 0x40047459, &(0x7f00000001c0)) recvmmsg(0xffffffffffffffff, &(0x7f0000002200)=[{{&(0x7f0000000340)=@in={0x2, 0x0, @multicast1}, 0x80, &(0x7f0000000440)=[{&(0x7f00000004c0)=""/88, 0x58}, {&(0x7f0000000b40)=""/4096, 0x1000}], 0x2, &(0x7f0000000740)=""/192, 0xc0}, 0x3}, {{&(0x7f0000000800)=@sco={0x1f, @none}, 0x80, &(0x7f0000000480)=[{&(0x7f0000001b40)=""/82, 0x52}], 0x1, &(0x7f0000001bc0)=""/206, 0xce}, 0x7}, {{&(0x7f0000001cc0)=@in={0x2, 0x0, @broadcast}, 0x80, &(0x7f0000000880)=[{&(0x7f0000001d40)=""/146, 0x92}, {&(0x7f0000001e00)=""/231, 0xe7}], 0x2, &(0x7f0000001f00)=""/239, 0xef}, 0x3}, {{&(0x7f0000002000)=@xdp, 0x80, &(0x7f00000020c0)=[{&(0x7f0000002080)=""/58, 0x3a}], 0x1, &(0x7f0000002100)=""/251, 0xfb}, 0x9}], 0x4, 0x40, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000002380)=ANY=[@ANYBLOB="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", @ANYRESDEC=r0, @ANYBLOB="b21b22b0b59f1a76abb6323c16886f3d2569d595dca4af1ac9160b24b62e47302e148fa17433c275945e36a713e5fad2e8abc9651d17b22d7d092020f73d100115fed606c66c84318df7895b1e5780f3c785bfb92571cf1bc9", @ANYRES32=0x0, @ANYRES32, @ANYRES32=0x0], &(0x7f0000000300)=0x18) r5 = socket(0x1, 0x803, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8936, &(0x7f0000000080)={@rand_addr=' \x01\x00', 0x44, r4}) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) r7 = socket(0x10, 0x8000000803, 0x0) sendmsg$nl_route(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000a00)=@newlink={0x7c, 0x10, 0x401, 0x3001, 0x25dfdbfc, {0x0, 0x0, 0x0, 0x0, 0x534ad, 0x42a03}, [@IFLA_LINKINFO={0x4c, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x3c, 0x2, 0x0, 0x1, [@IFLA_IPVLAN_MODE={0x6, 0x1, 0x2}, @IFLA_IPVLAN_FLAGS={0x6, 0x2, 0x2}, @IFLA_IPVLAN_FLAGS={0x6, 0x2, 0x1}, @IFLA_IPVLAN_FLAGS={0x6, 0x2, 0x2}, @IFLA_IPVLAN_FLAGS={0x6, 0x2, 0x3}, @IFLA_IPVLAN_MODE={0x6}, @IFLA_IPVLAN_FLAGS={0x6, 0x2, 0x2}]}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x7c}}, 0x0) 18:12:06 executing program 5: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$FS_IOC_RESVSP(r0, 0x402c5828, &(0x7f00000000c0)={0x0, 0x1, 0xa8f, 0x3078}) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x200000000}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x9) preadv(r1, &(0x7f0000000240)=[{&(0x7f0000000040)=""/94, 0x5e}, {&(0x7f00000000c0)=""/93, 0x5d}, {&(0x7f0000000140)=""/58, 0x3a}], 0x3, 0xd9f, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000002340)='./file0\x00', 0x0, 0x108) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000180)={'team0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @local}, 0x14) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'macvtap0\x00'}) ioctl$PPPIOCSFLAGS1(0xffffffffffffffff, 0x40047459, &(0x7f00000001c0)) recvmmsg(0xffffffffffffffff, &(0x7f0000002200)=[{{&(0x7f0000000340)=@in={0x2, 0x0, @multicast1}, 0x80, &(0x7f0000000440)=[{&(0x7f00000004c0)=""/88, 0x58}, {&(0x7f0000000b40)=""/4096, 0x1000}], 0x2, &(0x7f0000000740)=""/192, 0xc0}, 0x3}, {{&(0x7f0000000800)=@sco={0x1f, @none}, 0x80, &(0x7f0000000480)=[{&(0x7f0000001b40)=""/82, 0x52}], 0x1, &(0x7f0000001bc0)=""/206, 0xce}, 0x7}, {{&(0x7f0000001cc0)=@in={0x2, 0x0, @broadcast}, 0x80, &(0x7f0000000880)=[{&(0x7f0000001d40)=""/146, 0x92}, {&(0x7f0000001e00)=""/231, 0xe7}], 0x2, &(0x7f0000001f00)=""/239, 0xef}, 0x3}, {{&(0x7f0000002000)=@xdp, 0x80, &(0x7f00000020c0)=[{&(0x7f0000002080)=""/58, 0x3a}], 0x1, &(0x7f0000002100)=""/251, 0xfb}, 0x9}], 0x4, 0x40, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000002380)=ANY=[@ANYBLOB="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", @ANYRESDEC=r0, @ANYBLOB="b21b22b0b59f1a76abb6323c16886f3d2569d595dca4af1ac9160b24b62e47302e148fa17433c275945e36a713e5fad2e8abc9651d17b22d7d092020f73d100115fed606c66c84318df7895b1e5780f3c785bfb92571cf1bc9", @ANYRES32=0x0, @ANYRES32, @ANYRES32=0x0], &(0x7f0000000300)=0x18) r5 = socket(0x1, 0x803, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8936, &(0x7f0000000080)={@rand_addr=' \x01\x00', 0x44, r4}) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) r7 = socket(0x10, 0x8000000803, 0x0) sendmsg$nl_route(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000a00)=@newlink={0x7c, 0x10, 0x401, 0x3001, 0x25dfdbfc, {0x0, 0x0, 0x0, 0x0, 0x534ad, 0x42a03}, [@IFLA_LINKINFO={0x4c, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x3c, 0x2, 0x0, 0x1, [@IFLA_IPVLAN_MODE={0x6, 0x1, 0x2}, @IFLA_IPVLAN_FLAGS={0x6, 0x2, 0x2}, @IFLA_IPVLAN_FLAGS={0x6, 0x2, 0x1}, @IFLA_IPVLAN_FLAGS={0x6, 0x2, 0x2}, @IFLA_IPVLAN_FLAGS={0x6, 0x2, 0x3}, @IFLA_IPVLAN_MODE={0x6}, @IFLA_IPVLAN_FLAGS={0x6, 0x2, 0x2}]}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x7c}}, 0x0) 18:12:06 executing program 2: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$FS_IOC_RESVSP(r0, 0x402c5828, &(0x7f00000000c0)={0x0, 0x1, 0xa8f, 0x3078}) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x200000000}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x9) preadv(r1, &(0x7f0000000240)=[{&(0x7f0000000040)=""/94, 0x5e}, {&(0x7f00000000c0)=""/93, 0x5d}, {&(0x7f0000000140)=""/58, 0x3a}], 0x3, 0xd9f, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000002340)='./file0\x00', 0x0, 0x108) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000180)={'team0\x00', 0x0}) writev(r2, &(0x7f0000000280)=[{&(0x7f00000008c0)="110eaa1a9896d57019effc8c79961d0f73ccf3afca3754e2e7a31f536bcb7204bed59311e29c96e1c2b663d61e5b0c0a76ea50cbddaa69f578b8600f77cf1a538ac900673696245b6de4283c979a2eccd71f9583dacf650575d1398678895da32663735b4d0cabfe7e972e59c2b4b4c9c89d0b82ca2267ad5062303e8abcb79600010506702eb912e3957e507aec4e2180699a738f6753509a12282a1d7181887f6c2e03de1da0dfe3b4efbb10e9b59301b4ef8a1d", 0xb5}, {&(0x7f0000000980)="34c30d95766fefbb7bdc40a3242505587bbc8584c2bc2003185f5ce116eea020efa91e2aae1eae2b8e848ac13c3dcedbbbc82adb1e70be8eecedba37be82545f2abda4f0a0e0fd0edd6bd03bb8e9bb91c39a2c828511aef3e684ad4c21ec0c146b9570139e31cd", 0x67}], 0x2) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'macvtap0\x00'}) ioctl$PPPIOCSFLAGS1(0xffffffffffffffff, 0x40047459, &(0x7f00000001c0)) recvmmsg(0xffffffffffffffff, &(0x7f0000002200)=[{{&(0x7f0000000340)=@in={0x2, 0x0, @multicast1}, 0x80, &(0x7f0000000440)=[{&(0x7f00000004c0)=""/88, 0x58}, {&(0x7f0000000b40)=""/4096, 0x1000}], 0x2, &(0x7f0000000740)=""/192, 0xc0}, 0x3}, {{&(0x7f0000000800)=@sco={0x1f, @none}, 0x80, &(0x7f0000000480)=[{&(0x7f0000001b40)=""/82, 0x52}], 0x1, &(0x7f0000001bc0)=""/206, 0xce}, 0x7}, {{&(0x7f0000001cc0)=@in={0x2, 0x0, @broadcast}, 0x80, &(0x7f0000000880)=[{&(0x7f0000001d40)=""/146, 0x92}, {&(0x7f0000001e00)=""/231, 0xe7}], 0x2, &(0x7f0000001f00)=""/239, 0xef}, 0x3}, {{&(0x7f0000002000)=@xdp, 0x80, &(0x7f00000020c0)=[{&(0x7f0000002080)=""/58, 0x3a}], 0x1, &(0x7f0000002100)=""/251, 0xfb}, 0x9}], 0x4, 0x40, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000002380)=ANY=[@ANYBLOB="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", @ANYRESDEC=r0, @ANYBLOB="b21b22b0b59f1a76abb6323c16886f3d2569d595dca4af1ac9160b24b62e47302e148fa17433c275945e36a713e5fad2e8abc9651d17b22d7d092020f73d100115fed606c66c84318df7895b1e5780f3c785bfb92571cf1bc9", @ANYRES32=0x0, @ANYRES32, @ANYRES32=0x0], &(0x7f0000000300)=0x18) r5 = socket(0x1, 0x803, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8936, &(0x7f0000000080)={@rand_addr=' \x01\x00', 0x44, r4}) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) r7 = socket(0x10, 0x8000000803, 0x0) sendmsg$nl_route(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000a00)=@newlink={0x7c, 0x10, 0x401, 0x3001, 0x25dfdbfc, {0x0, 0x0, 0x0, 0x0, 0x534ad, 0x42a03}, [@IFLA_LINKINFO={0x4c, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x3c, 0x2, 0x0, 0x1, [@IFLA_IPVLAN_MODE={0x6, 0x1, 0x2}, @IFLA_IPVLAN_FLAGS={0x6, 0x2, 0x2}, @IFLA_IPVLAN_FLAGS={0x6, 0x2, 0x1}, @IFLA_IPVLAN_FLAGS={0x6, 0x2, 0x2}, @IFLA_IPVLAN_FLAGS={0x6, 0x2, 0x3}, @IFLA_IPVLAN_MODE={0x6}, @IFLA_IPVLAN_FLAGS={0x6, 0x2, 0x2}]}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x7c}}, 0x0) 18:12:06 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="b4050000000000006110580000000000c60000000000000095000002000000002ac73fe427abdf478e0357f2d32986f50b892b5007921cd48fe43b23be60a2dbc9778bb665510e3e22fcb26adfdc05e55a4933e62a23"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x5, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) [ 515.174696][T21115] 8021q: adding VLAN 0 to HW filter on device ipvlan2 18:12:06 executing program 0: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$FS_IOC_RESVSP(r0, 0x402c5828, &(0x7f00000000c0)={0x0, 0x1, 0xa8f, 0x3078}) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x200000000}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x9) preadv(r1, &(0x7f0000000240)=[{&(0x7f0000000040)=""/94, 0x5e}, {&(0x7f00000000c0)=""/93, 0x5d}, {&(0x7f0000000140)=""/58, 0x3a}], 0x3, 0xd9f, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000002340)='./file0\x00', 0x0, 0x108) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000180)={'team0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @local}, 0x14) writev(r2, &(0x7f0000000280)=[{&(0x7f00000008c0)="110eaa1a9896d57019effc8c79961d0f73ccf3afca3754e2e7a31f536bcb7204bed59311e29c96e1c2b663d61e5b0c0a76ea50cbddaa69f578b8600f77cf1a538ac900673696245b6de4283c979a2eccd71f9583dacf650575d1398678895da32663735b4d0cabfe7e972e59c2b4b4c9c89d0b82ca2267ad5062303e8abcb79600010506702eb912e3957e507aec4e2180699a738f6753509a12282a1d7181887f6c2e03de1da0dfe3b4efbb10e9b59301b4ef8a1d", 0xb5}, {&(0x7f0000000980)="34c30d95766fefbb7bdc40a3242505587bbc8584c2bc2003185f5ce116eea020efa91e2aae1eae2b8e848ac13c3dcedbbbc82adb1e70be8eecedba37be82545f2abda4f0a0e0fd0edd6bd03bb8e9bb91c39a2c828511aef3e684ad4c21ec0c146b9570139e31cd", 0x67}], 0x2) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'macvtap0\x00'}) ioctl$PPPIOCSFLAGS1(0xffffffffffffffff, 0x40047459, &(0x7f00000001c0)) recvmmsg(0xffffffffffffffff, &(0x7f0000002200)=[{{&(0x7f0000000340)=@in={0x2, 0x0, @multicast1}, 0x80, &(0x7f0000000440)=[{&(0x7f00000004c0)=""/88, 0x58}, {&(0x7f0000000b40)=""/4096, 0x1000}], 0x2, &(0x7f0000000740)=""/192, 0xc0}, 0x3}, {{&(0x7f0000000800)=@sco={0x1f, @none}, 0x80, &(0x7f0000000480)=[{&(0x7f0000001b40)=""/82, 0x52}], 0x1, &(0x7f0000001bc0)=""/206, 0xce}, 0x7}, {{&(0x7f0000001cc0)=@in={0x2, 0x0, @broadcast}, 0x80, &(0x7f0000000880)=[{&(0x7f0000001d40)=""/146, 0x92}, {&(0x7f0000001e00)=""/231, 0xe7}], 0x2, &(0x7f0000001f00)=""/239, 0xef}, 0x3}, {{&(0x7f0000002000)=@xdp, 0x80, &(0x7f00000020c0)=[{&(0x7f0000002080)=""/58, 0x3a}], 0x1, &(0x7f0000002100)=""/251, 0xfb}, 0x9}], 0x4, 0x40, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000002380)=ANY=[@ANYBLOB="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", @ANYRESDEC=r0, @ANYBLOB="b21b22b0b59f1a76abb6323c16886f3d2569d595dca4af1ac9160b24b62e47302e148fa17433c275945e36a713e5fad2e8abc9651d17b22d7d092020f73d100115fed606c66c84318df7895b1e5780f3c785bfb92571cf1bc9", @ANYRES32=0x0, @ANYRES32, @ANYRES32=0x0], &(0x7f0000000300)=0x18) r5 = socket(0x1, 0x803, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8936, &(0x7f0000000080)={@rand_addr=' \x01\x00', 0x44, r4}) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) r7 = socket(0x10, 0x0, 0x0) sendmsg$nl_route(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000a00)=@newlink={0x7c, 0x10, 0x401, 0x3001, 0x25dfdbfc, {0x0, 0x0, 0x0, 0x0, 0x534ad, 0x42a03}, [@IFLA_LINKINFO={0x4c, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x3c, 0x2, 0x0, 0x1, [@IFLA_IPVLAN_MODE={0x6, 0x1, 0x2}, @IFLA_IPVLAN_FLAGS={0x6, 0x2, 0x2}, @IFLA_IPVLAN_FLAGS={0x6, 0x2, 0x1}, @IFLA_IPVLAN_FLAGS={0x6, 0x2, 0x2}, @IFLA_IPVLAN_FLAGS={0x6, 0x2, 0x3}, @IFLA_IPVLAN_MODE={0x6}, @IFLA_IPVLAN_FLAGS={0x6, 0x2, 0x2}]}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x7c}}, 0x0) [ 515.218534][T21115] team0: Device ipvlan2 is already an upper device of the team interface 18:12:06 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="b4050000000000006110580000000000c60000000000000095000002000000002ac73fe427abdf478e0357f2d32986f50b892b5007921cd48fe43b23be60a2dbc9778bb665510e3e22fcb26adfdc05e55a4933e62a23abb4baca4ec89323257db59db5eeda384459dd00d41b6aab85df5cab39e726769e2291b626d120a9247579"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x5, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) 18:12:06 executing program 0: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$FS_IOC_RESVSP(r0, 0x402c5828, &(0x7f00000000c0)={0x0, 0x1, 0xa8f, 0x3078}) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x200000000}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x9) preadv(r1, &(0x7f0000000240)=[{&(0x7f0000000040)=""/94, 0x5e}, {&(0x7f00000000c0)=""/93, 0x5d}, {&(0x7f0000000140)=""/58, 0x3a}], 0x3, 0xd9f, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000002340)='./file0\x00', 0x0, 0x108) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000180)={'team0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @local}, 0x14) writev(r2, &(0x7f0000000280)=[{&(0x7f00000008c0)="110eaa1a9896d57019effc8c79961d0f73ccf3afca3754e2e7a31f536bcb7204bed59311e29c96e1c2b663d61e5b0c0a76ea50cbddaa69f578b8600f77cf1a538ac900673696245b6de4283c979a2eccd71f9583dacf650575d1398678895da32663735b4d0cabfe7e972e59c2b4b4c9c89d0b82ca2267ad5062303e8abcb79600010506702eb912e3957e507aec4e2180699a738f6753509a12282a1d7181887f6c2e03de1da0dfe3b4efbb10e9b59301b4ef8a1d", 0xb5}, {&(0x7f0000000980)="34c30d95766fefbb7bdc40a3242505587bbc8584c2bc2003185f5ce116eea020efa91e2aae1eae2b8e848ac13c3dcedbbbc82adb1e70be8eecedba37be82545f2abda4f0a0e0fd0edd6bd03bb8e9bb91c39a2c828511aef3e684ad4c21ec0c146b9570139e31cd", 0x67}], 0x2) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'macvtap0\x00'}) ioctl$PPPIOCSFLAGS1(0xffffffffffffffff, 0x40047459, &(0x7f00000001c0)) recvmmsg(0xffffffffffffffff, &(0x7f0000002200)=[{{&(0x7f0000000340)=@in={0x2, 0x0, @multicast1}, 0x80, &(0x7f0000000440)=[{&(0x7f00000004c0)=""/88, 0x58}, {&(0x7f0000000b40)=""/4096, 0x1000}], 0x2, &(0x7f0000000740)=""/192, 0xc0}, 0x3}, {{&(0x7f0000000800)=@sco={0x1f, @none}, 0x80, &(0x7f0000000480)=[{&(0x7f0000001b40)=""/82, 0x52}], 0x1, &(0x7f0000001bc0)=""/206, 0xce}, 0x7}, {{&(0x7f0000001cc0)=@in={0x2, 0x0, @broadcast}, 0x80, &(0x7f0000000880)=[{&(0x7f0000001d40)=""/146, 0x92}, {&(0x7f0000001e00)=""/231, 0xe7}], 0x2, &(0x7f0000001f00)=""/239, 0xef}, 0x3}, {{&(0x7f0000002000)=@xdp, 0x80, &(0x7f00000020c0)=[{&(0x7f0000002080)=""/58, 0x3a}], 0x1, &(0x7f0000002100)=""/251, 0xfb}, 0x9}], 0x4, 0x40, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000002380)=ANY=[@ANYBLOB="050000004f2fe4e7fe91d1f169b7f431831544d94b6dbcca36d501829c64f0c28565fbc3e562e329d779aef804590001804797c4378192536ca659efcf0a6cb16b0ba5b79cfefdc8e93c46dfa0c119d12be6495820cc0b34645475d4da28535803ddcfd16f5df589e2f1ac230118eafd75a63c016b3a1663bc141e5ed84016b6b02854a48c0ec71a36a1ad145c5d2216e964a34cdf686b0a089443bd0f8c210860754d133e2c97ce8a25ee4d4eb5abb779387ca2cd9e870d5cb5854616c65c24f259eeaa625432fa25dd2832dc14f9a78ebf3a24277da2b55d09ed6a1dca07d4fb9ed592a64782b6939500505805d12b2776980c4b250f17b0b9a8fda266d7f084a9cd1022d2d670f793298bcf83b9a25e4ae25ac23ce06ef88068108ec131b23695772064709b1dbee85e5c2a0c4cf809dbd8b5617f8c6f6fba013f019829c83bd4cf10be5c6da663ce7cbf9b19ebd88bedb114ec207599273b55ec5f4cd35914f897ee8afc7663255678f6853e5cfa0dfa079ba560c7ddbc56e6352397b7266ac906a0ce0fb810eb00000000000000000000000000000000000000000000000000c54baf95f669d6810040c457be8ca739b4ec785f005bb4faa01270b999b6c9899cd9e8997d359b77c00a68341ca40b4c0e06884b6384ef6e", @ANYRESDEC=r0, @ANYBLOB="b21b22b0b59f1a76abb6323c16886f3d2569d595dca4af1ac9160b24b62e47302e148fa17433c275945e36a713e5fad2e8abc9651d17b22d7d092020f73d100115fed606c66c84318df7895b1e5780f3c785bfb92571cf1bc9", @ANYRES32=0x0, @ANYRES32, @ANYRES32=0x0], &(0x7f0000000300)=0x18) r5 = socket(0x1, 0x803, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8936, &(0x7f0000000080)={@rand_addr=' \x01\x00', 0x44, r4}) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) socket(0x10, 0x8000000803, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000a00)=@newlink={0x7c, 0x10, 0x401, 0x3001, 0x25dfdbfc, {0x0, 0x0, 0x0, 0x0, 0x534ad, 0x42a03}, [@IFLA_LINKINFO={0x4c, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x3c, 0x2, 0x0, 0x1, [@IFLA_IPVLAN_MODE={0x6, 0x1, 0x2}, @IFLA_IPVLAN_FLAGS={0x6, 0x2, 0x2}, @IFLA_IPVLAN_FLAGS={0x6, 0x2, 0x1}, @IFLA_IPVLAN_FLAGS={0x6, 0x2, 0x2}, @IFLA_IPVLAN_FLAGS={0x6, 0x2, 0x3}, @IFLA_IPVLAN_MODE={0x6}, @IFLA_IPVLAN_FLAGS={0x6, 0x2, 0x2}]}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x7c}}, 0x0) [ 515.351356][T21122] 8021q: adding VLAN 0 to HW filter on device ipvlan2 [ 515.428261][T21124] 8021q: adding VLAN 0 to HW filter on device ipvlan3 [ 515.447479][T21124] team0: Device ipvlan3 is already an upper device of the team interface 18:12:06 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="b4050000000000006110580000000000c60000000000000095000002000000002ac73fe427abdf478e0357f2d32986f50b892b5007921cd48fe43b23be60a2dbc9778bb665510e3e22fcb26adfdc05e55a4933e62a23abb4baca4ec89323257db59db5eeda384459dd00d41b6aab85df5cab39e726769e2291b626d120a9247579"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x5, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) 18:12:07 executing program 0: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$FS_IOC_RESVSP(r0, 0x402c5828, &(0x7f00000000c0)={0x0, 0x1, 0xa8f, 0x3078}) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x200000000}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x9) preadv(r1, &(0x7f0000000240)=[{&(0x7f0000000040)=""/94, 0x5e}, {&(0x7f00000000c0)=""/93, 0x5d}, {&(0x7f0000000140)=""/58, 0x3a}], 0x3, 0xd9f, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000002340)='./file0\x00', 0x0, 0x108) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000180)={'team0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @local}, 0x14) writev(r2, &(0x7f0000000280)=[{&(0x7f00000008c0)="110eaa1a9896d57019effc8c79961d0f73ccf3afca3754e2e7a31f536bcb7204bed59311e29c96e1c2b663d61e5b0c0a76ea50cbddaa69f578b8600f77cf1a538ac900673696245b6de4283c979a2eccd71f9583dacf650575d1398678895da32663735b4d0cabfe7e972e59c2b4b4c9c89d0b82ca2267ad5062303e8abcb79600010506702eb912e3957e507aec4e2180699a738f6753509a12282a1d7181887f6c2e03de1da0dfe3b4efbb10e9b59301b4ef8a1d", 0xb5}, {&(0x7f0000000980)="34c30d95766fefbb7bdc40a3242505587bbc8584c2bc2003185f5ce116eea020efa91e2aae1eae2b8e848ac13c3dcedbbbc82adb1e70be8eecedba37be82545f2abda4f0a0e0fd0edd6bd03bb8e9bb91c39a2c828511aef3e684ad4c21ec0c146b9570139e31cd", 0x67}], 0x2) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'macvtap0\x00'}) ioctl$PPPIOCSFLAGS1(0xffffffffffffffff, 0x40047459, &(0x7f00000001c0)) recvmmsg(0xffffffffffffffff, &(0x7f0000002200)=[{{&(0x7f0000000340)=@in={0x2, 0x0, @multicast1}, 0x80, &(0x7f0000000440)=[{&(0x7f00000004c0)=""/88, 0x58}, {&(0x7f0000000b40)=""/4096, 0x1000}], 0x2, &(0x7f0000000740)=""/192, 0xc0}, 0x3}, {{&(0x7f0000000800)=@sco={0x1f, @none}, 0x80, &(0x7f0000000480)=[{&(0x7f0000001b40)=""/82, 0x52}], 0x1, &(0x7f0000001bc0)=""/206, 0xce}, 0x7}, {{&(0x7f0000001cc0)=@in={0x2, 0x0, @broadcast}, 0x80, &(0x7f0000000880)=[{&(0x7f0000001d40)=""/146, 0x92}, {&(0x7f0000001e00)=""/231, 0xe7}], 0x2, &(0x7f0000001f00)=""/239, 0xef}, 0x3}, {{&(0x7f0000002000)=@xdp, 0x80, &(0x7f00000020c0)=[{&(0x7f0000002080)=""/58, 0x3a}], 0x1, &(0x7f0000002100)=""/251, 0xfb}, 0x9}], 0x4, 0x40, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000002380)=ANY=[@ANYBLOB="050000004f2fe4e7fe91d1f169b7f431831544d94b6dbcca36d501829c64f0c28565fbc3e562e329d779aef804590001804797c4378192536ca659efcf0a6cb16b0ba5b79cfefdc8e93c46dfa0c119d12be6495820cc0b34645475d4da28535803ddcfd16f5df589e2f1ac230118eafd75a63c016b3a1663bc141e5ed84016b6b02854a48c0ec71a36a1ad145c5d2216e964a34cdf686b0a089443bd0f8c210860754d133e2c97ce8a25ee4d4eb5abb779387ca2cd9e870d5cb5854616c65c24f259eeaa625432fa25dd2832dc14f9a78ebf3a24277da2b55d09ed6a1dca07d4fb9ed592a64782b6939500505805d12b2776980c4b250f17b0b9a8fda266d7f084a9cd1022d2d670f793298bcf83b9a25e4ae25ac23ce06ef88068108ec131b23695772064709b1dbee85e5c2a0c4cf809dbd8b5617f8c6f6fba013f019829c83bd4cf10be5c6da663ce7cbf9b19ebd88bedb114ec207599273b55ec5f4cd35914f897ee8afc7663255678f6853e5cfa0dfa079ba560c7ddbc56e6352397b7266ac906a0ce0fb810eb00000000000000000000000000000000000000000000000000c54baf95f669d6810040c457be8ca739b4ec785f005bb4faa01270b999b6c9899cd9e8997d359b77c00a68341ca40b4c0e06884b6384ef6e", @ANYRESDEC=r0, @ANYBLOB="b21b22b0b59f1a76abb6323c16886f3d2569d595dca4af1ac9160b24b62e47302e148fa17433c275945e36a713e5fad2e8abc9651d17b22d7d092020f73d100115fed606c66c84318df7895b1e5780f3c785bfb92571cf1bc9", @ANYRES32=0x0, @ANYRES32, @ANYRES32=0x0], &(0x7f0000000300)=0x18) r5 = socket(0x1, 0x803, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8936, &(0x7f0000000080)={@rand_addr=' \x01\x00', 0x44, r4}) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) socket(0x10, 0x8000000803, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000a00)=@newlink={0x7c, 0x10, 0x401, 0x3001, 0x25dfdbfc, {0x0, 0x0, 0x0, 0x0, 0x534ad, 0x42a03}, [@IFLA_LINKINFO={0x4c, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x3c, 0x2, 0x0, 0x1, [@IFLA_IPVLAN_MODE={0x6, 0x1, 0x2}, @IFLA_IPVLAN_FLAGS={0x6, 0x2, 0x2}, @IFLA_IPVLAN_FLAGS={0x6, 0x2, 0x1}, @IFLA_IPVLAN_FLAGS={0x6, 0x2, 0x2}, @IFLA_IPVLAN_FLAGS={0x6, 0x2, 0x3}, @IFLA_IPVLAN_MODE={0x6}, @IFLA_IPVLAN_FLAGS={0x6, 0x2, 0x2}]}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x7c}}, 0x0) [ 515.539639][T21123] 8021q: adding VLAN 0 to HW filter on device ipvlan116 [ 515.567975][T21123] team0: Device ipvlan116 is already an upper device of the team interface 18:12:07 executing program 3: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$FS_IOC_RESVSP(r0, 0x402c5828, &(0x7f00000000c0)={0x0, 0x1, 0xa8f, 0x3078}) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x200000000}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x9) preadv(r1, &(0x7f0000000240)=[{&(0x7f0000000040)=""/94, 0x5e}, {&(0x7f00000000c0)=""/93, 0x5d}, {&(0x7f0000000140)=""/58, 0x3a}], 0x3, 0xd9f, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000002340)='./file0\x00', 0x0, 0x108) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000180)={'team0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @local}, 0x14) writev(r2, &(0x7f0000000280)=[{&(0x7f00000008c0)="110eaa1a9896d57019effc8c79961d0f73ccf3afca3754e2e7a31f536bcb7204bed59311e29c96e1c2b663d61e5b0c0a76ea50cbddaa69f578b8600f77cf1a538ac900673696245b6de4283c979a2eccd71f9583dacf650575d1398678895da32663735b4d0cabfe7e972e59c2b4b4c9c89d0b82ca2267ad5062303e8abcb79600010506702eb912e3957e507aec4e2180699a738f6753509a12282a1d7181887f6c2e03de1da0dfe3b4efbb10e9b59301b4ef8a1d", 0xb5}, {&(0x7f0000000980)="34c30d95766fefbb7bdc40a3242505587bbc8584c2bc2003185f5ce116eea020efa91e2aae1eae2b8e848ac13c3dcedbbbc82adb1e70be8eecedba37be82545f2abda4f0a0e0fd0edd6bd03bb8e9bb91c39a2c828511aef3e684ad4c21ec0c146b9570139e31cd", 0x67}], 0x2) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'macvtap0\x00'}) ioctl$PPPIOCSFLAGS1(0xffffffffffffffff, 0x40047459, &(0x7f00000001c0)) recvmmsg(0xffffffffffffffff, &(0x7f0000002200)=[{{&(0x7f0000000340)=@in={0x2, 0x0, @multicast1}, 0x80, &(0x7f0000000440)=[{&(0x7f00000004c0)=""/88, 0x58}, {&(0x7f0000000b40)=""/4096, 0x1000}], 0x2, &(0x7f0000000740)=""/192, 0xc0}, 0x3}, {{&(0x7f0000000800)=@sco={0x1f, @none}, 0x80, &(0x7f0000000480)=[{&(0x7f0000001b40)=""/82, 0x52}], 0x1, &(0x7f0000001bc0)=""/206, 0xce}, 0x7}, {{&(0x7f0000001cc0)=@in={0x2, 0x0, @broadcast}, 0x80, &(0x7f0000000880)=[{&(0x7f0000001d40)=""/146, 0x92}, {&(0x7f0000001e00)=""/231, 0xe7}], 0x2, &(0x7f0000001f00)=""/239, 0xef}, 0x3}, {{&(0x7f0000002000)=@xdp, 0x80, &(0x7f00000020c0)=[{&(0x7f0000002080)=""/58, 0x3a}], 0x1, &(0x7f0000002100)=""/251, 0xfb}, 0x9}], 0x4, 0x40, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000002380)=ANY=[@ANYBLOB="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", @ANYRESDEC=r0, @ANYBLOB="b21b22b0b59f1a76abb6323c16886f3d2569d595dca4af1ac9160b24b62e47302e148fa17433c275945e36a713e5fad2e8abc9651d17b22d7d092020f73d100115fed606c66c84318df7895b1e5780f3c785bfb92571cf1bc9", @ANYRES32=0x0, @ANYRES32, @ANYRES32=0x0], &(0x7f0000000300)=0x18) socket(0x1, 0x803, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8936, &(0x7f0000000080)={@rand_addr=' \x01\x00', 0x44, r4}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000a00)=@newlink={0x7c, 0x10, 0x401, 0x3001, 0x25dfdbfc, {0x0, 0x0, 0x0, 0x0, 0x534ad, 0x42a03}, [@IFLA_LINKINFO={0x4c, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x3c, 0x2, 0x0, 0x1, [@IFLA_IPVLAN_MODE={0x6, 0x1, 0x2}, @IFLA_IPVLAN_FLAGS={0x6, 0x2, 0x2}, @IFLA_IPVLAN_FLAGS={0x6, 0x2, 0x1}, @IFLA_IPVLAN_FLAGS={0x6, 0x2, 0x2}, @IFLA_IPVLAN_FLAGS={0x6, 0x2, 0x3}, @IFLA_IPVLAN_MODE={0x6}, @IFLA_IPVLAN_FLAGS={0x6, 0x2, 0x2}]}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8}]}, 0x7c}}, 0x0) 18:12:07 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="b4050000000000006110580000000000c60000000000000095000002000000002ac73fe427abdf478e0357f2d32986f50b892b5007921cd48fe43b23be60a2dbc9778bb665510e3e22fcb26adfdc05e55a4933e62a23abb4baca4ec89323257db59db5eeda384459dd00d41b6aab85df5cab39e726769e2291b626d120a9247579"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x5, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) 18:12:07 executing program 0: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$FS_IOC_RESVSP(r0, 0x402c5828, &(0x7f00000000c0)={0x0, 0x1, 0xa8f, 0x3078}) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x200000000}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x9) preadv(r1, &(0x7f0000000240)=[{&(0x7f0000000040)=""/94, 0x5e}, {&(0x7f00000000c0)=""/93, 0x5d}, {&(0x7f0000000140)=""/58, 0x3a}], 0x3, 0xd9f, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000002340)='./file0\x00', 0x0, 0x108) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000180)={'team0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @local}, 0x14) writev(r2, &(0x7f0000000280)=[{&(0x7f00000008c0)="110eaa1a9896d57019effc8c79961d0f73ccf3afca3754e2e7a31f536bcb7204bed59311e29c96e1c2b663d61e5b0c0a76ea50cbddaa69f578b8600f77cf1a538ac900673696245b6de4283c979a2eccd71f9583dacf650575d1398678895da32663735b4d0cabfe7e972e59c2b4b4c9c89d0b82ca2267ad5062303e8abcb79600010506702eb912e3957e507aec4e2180699a738f6753509a12282a1d7181887f6c2e03de1da0dfe3b4efbb10e9b59301b4ef8a1d", 0xb5}, {&(0x7f0000000980)="34c30d95766fefbb7bdc40a3242505587bbc8584c2bc2003185f5ce116eea020efa91e2aae1eae2b8e848ac13c3dcedbbbc82adb1e70be8eecedba37be82545f2abda4f0a0e0fd0edd6bd03bb8e9bb91c39a2c828511aef3e684ad4c21ec0c146b9570139e31cd", 0x67}], 0x2) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'macvtap0\x00'}) ioctl$PPPIOCSFLAGS1(0xffffffffffffffff, 0x40047459, &(0x7f00000001c0)) recvmmsg(0xffffffffffffffff, &(0x7f0000002200)=[{{&(0x7f0000000340)=@in={0x2, 0x0, @multicast1}, 0x80, &(0x7f0000000440)=[{&(0x7f00000004c0)=""/88, 0x58}, {&(0x7f0000000b40)=""/4096, 0x1000}], 0x2, &(0x7f0000000740)=""/192, 0xc0}, 0x3}, {{&(0x7f0000000800)=@sco={0x1f, @none}, 0x80, &(0x7f0000000480)=[{&(0x7f0000001b40)=""/82, 0x52}], 0x1, &(0x7f0000001bc0)=""/206, 0xce}, 0x7}, {{&(0x7f0000001cc0)=@in={0x2, 0x0, @broadcast}, 0x80, &(0x7f0000000880)=[{&(0x7f0000001d40)=""/146, 0x92}, {&(0x7f0000001e00)=""/231, 0xe7}], 0x2, &(0x7f0000001f00)=""/239, 0xef}, 0x3}, {{&(0x7f0000002000)=@xdp, 0x80, &(0x7f00000020c0)=[{&(0x7f0000002080)=""/58, 0x3a}], 0x1, &(0x7f0000002100)=""/251, 0xfb}, 0x9}], 0x4, 0x40, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000002380)=ANY=[@ANYBLOB="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", @ANYRESDEC=r0, @ANYBLOB="b21b22b0b59f1a76abb6323c16886f3d2569d595dca4af1ac9160b24b62e47302e148fa17433c275945e36a713e5fad2e8abc9651d17b22d7d092020f73d100115fed606c66c84318df7895b1e5780f3c785bfb92571cf1bc9", @ANYRES32=0x0, @ANYRES32, @ANYRES32=0x0], &(0x7f0000000300)=0x18) r5 = socket(0x1, 0x803, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8936, &(0x7f0000000080)={@rand_addr=' \x01\x00', 0x44, r4}) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) socket(0x10, 0x8000000803, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000a00)=@newlink={0x7c, 0x10, 0x401, 0x3001, 0x25dfdbfc, {0x0, 0x0, 0x0, 0x0, 0x534ad, 0x42a03}, [@IFLA_LINKINFO={0x4c, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x3c, 0x2, 0x0, 0x1, [@IFLA_IPVLAN_MODE={0x6, 0x1, 0x2}, @IFLA_IPVLAN_FLAGS={0x6, 0x2, 0x2}, @IFLA_IPVLAN_FLAGS={0x6, 0x2, 0x1}, @IFLA_IPVLAN_FLAGS={0x6, 0x2, 0x2}, @IFLA_IPVLAN_FLAGS={0x6, 0x2, 0x3}, @IFLA_IPVLAN_MODE={0x6}, @IFLA_IPVLAN_FLAGS={0x6, 0x2, 0x2}]}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x7c}}, 0x0) 18:12:07 executing program 1: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$FS_IOC_RESVSP(r0, 0x402c5828, &(0x7f00000000c0)={0x0, 0x1, 0xa8f, 0x3078}) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x200000000}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x9) preadv(r1, &(0x7f0000000240)=[{&(0x7f0000000040)=""/94, 0x5e}, {&(0x7f00000000c0)=""/93, 0x5d}, {&(0x7f0000000140)=""/58, 0x3a}], 0x3, 0xd9f, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000002340)='./file0\x00', 0x0, 0x108) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000180)={'team0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @local}, 0x14) writev(r2, &(0x7f0000000280)=[{&(0x7f00000008c0)="110eaa1a9896d57019effc8c79961d0f73ccf3afca3754e2e7a31f536bcb7204bed59311e29c96e1c2b663d61e5b0c0a76ea50cbddaa69f578b8600f77cf1a538ac900673696245b6de4283c979a2eccd71f9583dacf650575d1398678895da32663735b4d0cabfe7e972e59c2b4b4c9c89d0b82ca2267ad5062303e8abcb79600010506702eb912e3957e507aec4e2180699a738f6753509a12282a1d7181887f6c2e03de1da0dfe3b4efbb10e9b59301b4ef8a1d", 0xb5}, {&(0x7f0000000980)="34c30d95766fefbb7bdc40a3242505587bbc8584c2bc2003185f5ce116eea020efa91e2aae1eae2b8e848ac13c3dcedbbbc82adb1e70be8eecedba37be82545f2abda4f0a0e0fd0edd6bd03bb8e9bb91c39a2c828511aef3e684ad4c21ec0c146b9570139e31cd", 0x67}], 0x2) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'macvtap0\x00'}) ioctl$PPPIOCSFLAGS1(0xffffffffffffffff, 0x40047459, &(0x7f00000001c0)) recvmmsg(0xffffffffffffffff, &(0x7f0000002200)=[{{&(0x7f0000000340)=@in={0x2, 0x0, @multicast1}, 0x80, &(0x7f0000000440)=[{&(0x7f00000004c0)=""/88, 0x58}, {&(0x7f0000000b40)=""/4096, 0x1000}], 0x2, &(0x7f0000000740)=""/192, 0xc0}, 0x3}, {{&(0x7f0000000800)=@sco={0x1f, @none}, 0x80, &(0x7f0000000480)=[{&(0x7f0000001b40)=""/82, 0x52}], 0x1, &(0x7f0000001bc0)=""/206, 0xce}, 0x7}, {{&(0x7f0000001cc0)=@in={0x2, 0x0, @broadcast}, 0x80, &(0x7f0000000880)=[{&(0x7f0000001d40)=""/146, 0x92}, {&(0x7f0000001e00)=""/231, 0xe7}], 0x2, &(0x7f0000001f00)=""/239, 0xef}, 0x3}, {{&(0x7f0000002000)=@xdp, 0x80, &(0x7f00000020c0)=[{&(0x7f0000002080)=""/58, 0x3a}], 0x1, &(0x7f0000002100)=""/251, 0xfb}, 0x9}], 0x4, 0x40, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000002380)=ANY=[@ANYBLOB="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", @ANYRESDEC=r0, @ANYBLOB="b21b22b0b59f1a76abb6323c16886f3d2569d595dca4af1ac9160b24b62e47302e148fa17433c275945e36a713e5fad2e8abc9651d17b22d7d092020f73d100115fed606c66c84318df7895b1e5780f3c785bfb92571cf1bc9", @ANYRES32=0x0, @ANYRES32, @ANYRES32=0x0], &(0x7f0000000300)=0x18) r5 = socket(0x1, 0x803, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) r7 = socket(0x10, 0x8000000803, 0x0) sendmsg$nl_route(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000a00)=@newlink={0x7c, 0x10, 0x401, 0x3001, 0x25dfdbfc, {0x0, 0x0, 0x0, 0x0, 0x534ad, 0x42a03}, [@IFLA_LINKINFO={0x4c, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x3c, 0x2, 0x0, 0x1, [@IFLA_IPVLAN_MODE={0x6, 0x1, 0x2}, @IFLA_IPVLAN_FLAGS={0x6, 0x2, 0x2}, @IFLA_IPVLAN_FLAGS={0x6, 0x2, 0x1}, @IFLA_IPVLAN_FLAGS={0x6, 0x2, 0x2}, @IFLA_IPVLAN_FLAGS={0x6, 0x2, 0x3}, @IFLA_IPVLAN_MODE={0x6}, @IFLA_IPVLAN_FLAGS={0x6, 0x2, 0x2}]}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x7c}}, 0x0) 18:12:07 executing program 5: r0 = syz_usb_connect(0x0, 0x24, &(0x7f0000000ac0)=ANY=[@ANYBLOB="12010000c0bb9b40b72040158fef000000010902120001000000000904000000ff"], 0x0) syz_usb_control_io$hid(r0, 0x0, 0x0) syz_usb_control_io(r0, 0x0, &(0x7f0000000740)={0x84, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x40, 0x21, 0x1, 0x1f}}) syz_usb_control_io(r0, 0x0, &(0x7f00000027c0)={0x84, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000002780)={0x40, 0x21, 0x1}}) syz_usb_control_io(r0, 0x0, &(0x7f0000000e80)={0x84, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000e40)={0x40, 0x21, 0x1, 0x2}}) syz_usb_control_io(r0, 0x0, &(0x7f0000000940)={0x84, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000900)={0x40, 0x21, 0x1}}) syz_usb_control_io$hid(r0, 0x0, &(0x7f00000003c0)={0x2c, &(0x7f00000002c0), 0x0, 0x0, 0x0, 0x0}) syz_usb_control_io$hid(r0, 0x0, &(0x7f0000001040)={0x2c, &(0x7f0000000080)=ANY=[], 0x0, 0x0, 0x0, 0x0}) r1 = syz_usb_connect$printer(0x6, 0x2d, &(0x7f0000000000)={{0x12, 0x1, 0x110, 0x0, 0x0, 0x0, 0x8, 0x525, 0xa4a8, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x1b, 0x1, 0x1, 0xa4, 0xf0, 0x3, [{{0x9, 0x4, 0x0, 0x20, 0x2, 0x7, 0x1, 0x1, 0x7, "", {{{0x9, 0x5, 0x1, 0x2, 0x3ff, 0x6, 0x0, 0x9}}}}}]}}]}}, &(0x7f0000000100)={0xa, &(0x7f0000000040)={0xa, 0x6, 0x200, 0x7, 0x1, 0x9, 0x40, 0x5}, 0x2f, &(0x7f0000000080)={0x5, 0xf, 0x2f, 0x3, [@ssp_cap={0x24, 0x10, 0xa, 0x1, 0x6, 0x7, 0xf, 0x400, [0xdf80, 0xc0ff, 0x3fc0, 0xf, 0xc000, 0xff3fa0]}, @ptm_cap={0x3}, @ptm_cap={0x3}]}, 0x2, [{0x4, &(0x7f00000000c0)=@lang_id={0x4, 0x3, 0x827}}, {0x9c, &(0x7f0000000180)=@string={0x9c, 0x3, "429801cd7446ce34f7403e8f4125bad0ba40d78cd8ccdfc9f6749d607369884ec5a9b609ad4d7a5eb52bd572363917ac7cf75ecb6b2ed26030cba306b572b197813dc7485e4ca4f5d452d3a492ca09b91ac362e6448409db5517f20e38df2e1c234982287ee2b1c823fbb32fcc08e9118f12c410a5a14f03b6c6bd14735377c84f0f4d6e0371fef89c4eea409f0305260102881ac739cda371f5"}}]}) syz_usb_control_io(r1, &(0x7f0000000500)={0x2c, &(0x7f0000000240)=ANY=[@ANYBLOB="00115c0000005c22bbf4deaf612f9e6aa31492060f07254f71199146706bb6a4ecf09820cf5fe02a58226016830fd27a330af9c1519368cfb0511a52003856bf1914559987d4ba918da74aedfa2d19fdac6293d83c70c228766de123213444173bf8"], &(0x7f0000000400)={0x0, 0x3, 0xd6, @string={0xd6, 0x3, "3b2586a9b03b6b7b7326eb59ef570b63d28d819db9b045bc95f61946c2305470ec287bf1ae7423387805a9987419bdb8c73e6d610b99fe79e55ee8377050d30589eeb83843b81343d357e42eb4da139f7774bd3f2a7353080c671223ed31af2e04a333fe124ba2f2271ff97f2c941d8171d9d6cbbfce105e9b5bb511245286f542b32ae84343eea7088837efe731d87aa6d57bce18bc80b7b9a66ad7e10c6976906438256b456e6d99063e8b69d1067cd6820880d8c591e96770ddc9f3b89225b24ceb8b0267f146764fad57f0d1377177682546"}}, &(0x7f0000000300)={0x0, 0xf, 0x13, {0x5, 0xf, 0x13, 0x2, [@wireless={0xb, 0x10, 0x1, 0x2, 0x0, 0x8, 0x5, 0x40}, @ptm_cap={0x3}]}}, &(0x7f0000000340)={0x20, 0x29, 0xf, {0xf, 0x29, 0xe1, 0x10, 0xff, 0x9, "50a94181", "03925640"}}, &(0x7f0000000380)={0x20, 0x2a, 0xc, {0xc, 0x2a, 0x0, 0x18, 0x3f, 0x7, 0xb7, 0x4, 0x400}}}, &(0x7f0000000b40)={0x84, &(0x7f0000000540)={0x0, 0x18, 0x1e, "ab3b8d3dcef36b28e2007dd1627adbb9e0b819251825f419a3e19d2e8df9"}, &(0x7f0000000580)={0x0, 0xa, 0x1, 0x80}, &(0x7f00000005c0)={0x0, 0x8, 0x1, 0x4}, &(0x7f0000000600)={0x20, 0x0, 0x4, {0x1, 0x1}}, &(0x7f0000000640)={0x20, 0x0, 0x8, {0x40, 0x20, [0xf0]}}, &(0x7f0000000680)={0x40, 0x7, 0x2, 0x3}, &(0x7f00000006c0)={0x40, 0x9, 0x1, 0x7f}, &(0x7f0000000700)={0x40, 0xb, 0x2, "047c"}, &(0x7f0000000800)={0x40, 0xf, 0x2, 0x8}, &(0x7f0000000840)={0x40, 0x13, 0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, &(0x7f0000000880)={0x40, 0x17, 0x6, @broadcast}, &(0x7f00000008c0)={0x40, 0x19, 0x2, "9354"}, &(0x7f0000000a00)={0x40, 0x1a, 0x2, 0xd08}, &(0x7f0000000a40)={0x40, 0x1c, 0x1, 0x5}, &(0x7f0000000a80)={0x40, 0x1e, 0x1, 0x6}, &(0x7f0000000b00)={0x40, 0x21, 0x1, 0x9}}) syz_usb_control_io(r0, 0x0, 0x0) syz_usb_control_io(r0, 0x0, 0x0) 18:12:07 executing program 2: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$FS_IOC_RESVSP(r0, 0x402c5828, &(0x7f00000000c0)={0x0, 0x1, 0xa8f, 0x3078}) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x200000000}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x9) preadv(r1, &(0x7f0000000240)=[{&(0x7f0000000040)=""/94, 0x5e}, {&(0x7f00000000c0)=""/93, 0x5d}, {&(0x7f0000000140)=""/58, 0x3a}], 0x3, 0xd9f, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000002340)='./file0\x00', 0x0, 0x108) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000180)={'team0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @local}, 0x14) writev(r2, &(0x7f0000000280)=[{&(0x7f00000008c0)="110eaa1a9896d57019effc8c79961d0f73ccf3afca3754e2e7a31f536bcb7204bed59311e29c96e1c2b663d61e5b0c0a76ea50cbddaa69f578b8600f77cf1a538ac900673696245b6de4283c979a2eccd71f9583dacf650575d1398678895da32663735b4d0cabfe7e972e59c2b4b4c9c89d0b82ca2267ad5062303e8abcb79600010506702eb912e3957e507aec4e2180699a738f6753509a12282a1d7181887f6c2e03de1da0dfe3b4efbb10e9b59301b4ef8a1d", 0xb5}, {&(0x7f0000000980)="34c30d95766fefbb7bdc40a3242505587bbc8584c2bc2003185f5ce116eea020efa91e2aae1eae2b8e848ac13c3dcedbbbc82adb1e70be8eecedba37be82545f2abda4f0a0e0fd0edd6bd03bb8e9bb91c39a2c828511aef3e684ad4c21ec0c146b9570139e31cd", 0x67}], 0x2) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'macvtap0\x00'}) recvmmsg(0xffffffffffffffff, &(0x7f0000002200)=[{{&(0x7f0000000340)=@in={0x2, 0x0, @multicast1}, 0x80, &(0x7f0000000440)=[{&(0x7f00000004c0)=""/88, 0x58}, {&(0x7f0000000b40)=""/4096, 0x1000}], 0x2, &(0x7f0000000740)=""/192, 0xc0}, 0x3}, {{&(0x7f0000000800)=@sco={0x1f, @none}, 0x80, &(0x7f0000000480)=[{&(0x7f0000001b40)=""/82, 0x52}], 0x1, &(0x7f0000001bc0)=""/206, 0xce}, 0x7}, {{&(0x7f0000001cc0)=@in={0x2, 0x0, @broadcast}, 0x80, &(0x7f0000000880)=[{&(0x7f0000001d40)=""/146, 0x92}, {&(0x7f0000001e00)=""/231, 0xe7}], 0x2, &(0x7f0000001f00)=""/239, 0xef}, 0x3}, {{&(0x7f0000002000)=@xdp, 0x80, &(0x7f00000020c0)=[{&(0x7f0000002080)=""/58, 0x3a}], 0x1, &(0x7f0000002100)=""/251, 0xfb}, 0x9}], 0x4, 0x40, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000002380)=ANY=[@ANYBLOB="050000004f2fe4e7fe91d1f169b7f431831544d94b6dbcca36d501829c64f0c28565fbc3e562e329d779aef804590001804797c4378192536ca659efcf0a6cb16b0ba5b79cfefdc8e93c46dfa0c119d12be6495820cc0b34645475d4da28535803ddcfd16f5df589e2f1ac230118eafd75a63c016b3a1663bc141e5ed84016b6b02854a48c0ec71a36a1ad145c5d2216e964a34cdf686b0a089443bd0f8c210860754d133e2c97ce8a25ee4d4eb5abb779387ca2cd9e870d5cb5854616c65c24f259eeaa625432fa25dd2832dc14f9a78ebf3a24277da2b55d09ed6a1dca07d4fb9ed592a64782b6939500505805d12b2776980c4b250f17b0b9a8fda266d7f084a9cd1022d2d670f793298bcf83b9a25e4ae25ac23ce06ef88068108ec131b23695772064709b1dbee85e5c2a0c4cf809dbd8b5617f8c6f6fba013f019829c83bd4cf10be5c6da663ce7cbf9b19ebd88bedb114ec207599273b55ec5f4cd35914f897ee8afc7663255678f6853e5cfa0dfa079ba560c7ddbc56e6352397b7266ac906a0ce0fb810eb00000000000000000000000000000000000000000000000000c54baf95f669d6810040c457be8ca739b4ec785f005bb4faa01270b999b6c9899cd9e8997d359b77c00a68341ca40b4c0e06884b6384ef6e", @ANYRESDEC=r0, @ANYBLOB="b21b22b0b59f1a76abb6323c16886f3d2569d595dca4af1ac9160b24b62e47302e148fa17433c275945e36a713e5fad2e8abc9651d17b22d7d092020f73d100115fed606c66c84318df7895b1e5780f3c785bfb92571cf1bc9", @ANYRES32=0x0, @ANYRES32, @ANYRES32=0x0], &(0x7f0000000300)=0x18) r5 = socket(0x1, 0x803, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8936, &(0x7f0000000080)={@rand_addr=' \x01\x00', 0x44, r4}) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) r7 = socket(0x10, 0x8000000803, 0x0) sendmsg$nl_route(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000a00)=@newlink={0x7c, 0x10, 0x401, 0x3001, 0x25dfdbfc, {0x0, 0x0, 0x0, 0x0, 0x534ad, 0x42a03}, [@IFLA_LINKINFO={0x4c, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x3c, 0x2, 0x0, 0x1, [@IFLA_IPVLAN_MODE={0x6, 0x1, 0x2}, @IFLA_IPVLAN_FLAGS={0x6, 0x2, 0x2}, @IFLA_IPVLAN_FLAGS={0x6, 0x2, 0x1}, @IFLA_IPVLAN_FLAGS={0x6, 0x2, 0x2}, @IFLA_IPVLAN_FLAGS={0x6, 0x2, 0x3}, @IFLA_IPVLAN_MODE={0x6}, @IFLA_IPVLAN_FLAGS={0x6, 0x2, 0x2}]}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x7c}}, 0x0) 18:12:07 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="b4050000000000006110580000000000c60000000000000095000002000000002ac73fe427abdf478e0357f2d32986f50b892b5007921cd48fe43b23be60a2dbc9778bb665510e3e22fcb26adfdc05e55a4933e62a23abb4baca4ec89323257db59db5eeda384459dd00d41b6aab85df5cab39e726769e2291b626d120a9247579f0b8edd8f16683e0623366ac632c24921d2153423774"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x5, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) 18:12:07 executing program 0: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$FS_IOC_RESVSP(r0, 0x402c5828, &(0x7f00000000c0)={0x0, 0x1, 0xa8f, 0x3078}) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x200000000}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x9) preadv(r1, &(0x7f0000000240)=[{&(0x7f0000000040)=""/94, 0x5e}, {&(0x7f00000000c0)=""/93, 0x5d}, {&(0x7f0000000140)=""/58, 0x3a}], 0x3, 0xd9f, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000002340)='./file0\x00', 0x0, 0x108) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000180)={'team0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @local}, 0x14) writev(r2, &(0x7f0000000280)=[{&(0x7f00000008c0)="110eaa1a9896d57019effc8c79961d0f73ccf3afca3754e2e7a31f536bcb7204bed59311e29c96e1c2b663d61e5b0c0a76ea50cbddaa69f578b8600f77cf1a538ac900673696245b6de4283c979a2eccd71f9583dacf650575d1398678895da32663735b4d0cabfe7e972e59c2b4b4c9c89d0b82ca2267ad5062303e8abcb79600010506702eb912e3957e507aec4e2180699a738f6753509a12282a1d7181887f6c2e03de1da0dfe3b4efbb10e9b59301b4ef8a1d", 0xb5}, {&(0x7f0000000980)="34c30d95766fefbb7bdc40a3242505587bbc8584c2bc2003185f5ce116eea020efa91e2aae1eae2b8e848ac13c3dcedbbbc82adb1e70be8eecedba37be82545f2abda4f0a0e0fd0edd6bd03bb8e9bb91c39a2c828511aef3e684ad4c21ec0c146b9570139e31cd", 0x67}], 0x2) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'macvtap0\x00'}) ioctl$PPPIOCSFLAGS1(0xffffffffffffffff, 0x40047459, &(0x7f00000001c0)) recvmmsg(0xffffffffffffffff, &(0x7f0000002200)=[{{&(0x7f0000000340)=@in={0x2, 0x0, @multicast1}, 0x80, &(0x7f0000000440)=[{&(0x7f00000004c0)=""/88, 0x58}, {&(0x7f0000000b40)=""/4096, 0x1000}], 0x2, &(0x7f0000000740)=""/192, 0xc0}, 0x3}, {{&(0x7f0000000800)=@sco={0x1f, @none}, 0x80, &(0x7f0000000480)=[{&(0x7f0000001b40)=""/82, 0x52}], 0x1, &(0x7f0000001bc0)=""/206, 0xce}, 0x7}, {{&(0x7f0000001cc0)=@in={0x2, 0x0, @broadcast}, 0x80, &(0x7f0000000880)=[{&(0x7f0000001d40)=""/146, 0x92}, {&(0x7f0000001e00)=""/231, 0xe7}], 0x2, &(0x7f0000001f00)=""/239, 0xef}, 0x3}, {{&(0x7f0000002000)=@xdp, 0x80, &(0x7f00000020c0)=[{&(0x7f0000002080)=""/58, 0x3a}], 0x1, &(0x7f0000002100)=""/251, 0xfb}, 0x9}], 0x4, 0x40, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000002380)=ANY=[@ANYBLOB="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", @ANYRESDEC=r0, @ANYBLOB="b21b22b0b59f1a76abb6323c16886f3d2569d595dca4af1ac9160b24b62e47302e148fa17433c275945e36a713e5fad2e8abc9651d17b22d7d092020f73d100115fed606c66c84318df7895b1e5780f3c785bfb92571cf1bc9", @ANYRES32=0x0, @ANYRES32, @ANYRES32=0x0], &(0x7f0000000300)=0x18) r5 = socket(0x1, 0x803, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8936, &(0x7f0000000080)={@rand_addr=' \x01\x00', 0x44, r4}) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) r6 = socket(0x10, 0x8000000803, 0x0) sendmsg$nl_route(r6, 0x0, 0x0) 18:12:07 executing program 3: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$FS_IOC_RESVSP(r0, 0x402c5828, &(0x7f00000000c0)={0x0, 0x1, 0xa8f, 0x3078}) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x200000000}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x9) preadv(r1, &(0x7f0000000240)=[{&(0x7f0000000040)=""/94, 0x5e}, {&(0x7f00000000c0)=""/93, 0x5d}, {&(0x7f0000000140)=""/58, 0x3a}], 0x3, 0xd9f, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000002340)='./file0\x00', 0x0, 0x108) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000180)={'team0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @local}, 0x14) writev(r2, &(0x7f0000000280)=[{&(0x7f00000008c0)="110eaa1a9896d57019effc8c79961d0f73ccf3afca3754e2e7a31f536bcb7204bed59311e29c96e1c2b663d61e5b0c0a76ea50cbddaa69f578b8600f77cf1a538ac900673696245b6de4283c979a2eccd71f9583dacf650575d1398678895da32663735b4d0cabfe7e972e59c2b4b4c9c89d0b82ca2267ad5062303e8abcb79600010506702eb912e3957e507aec4e2180699a738f6753509a12282a1d7181887f6c2e03de1da0dfe3b4efbb10e9b59301b4ef8a1d", 0xb5}, {&(0x7f0000000980)="34c30d95766fefbb7bdc40a3242505587bbc8584c2bc2003185f5ce116eea020efa91e2aae1eae2b8e848ac13c3dcedbbbc82adb1e70be8eecedba37be82545f2abda4f0a0e0fd0edd6bd03bb8e9bb91c39a2c828511aef3e684ad4c21ec0c146b9570139e31cd", 0x67}], 0x2) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'macvtap0\x00'}) ioctl$PPPIOCSFLAGS1(0xffffffffffffffff, 0x40047459, &(0x7f00000001c0)) recvmmsg(0xffffffffffffffff, &(0x7f0000002200)=[{{&(0x7f0000000340)=@in={0x2, 0x0, @multicast1}, 0x80, &(0x7f0000000440)=[{&(0x7f00000004c0)=""/88, 0x58}, {&(0x7f0000000b40)=""/4096, 0x1000}], 0x2, &(0x7f0000000740)=""/192, 0xc0}, 0x3}, {{&(0x7f0000000800)=@sco={0x1f, @none}, 0x80, &(0x7f0000000480)=[{&(0x7f0000001b40)=""/82, 0x52}], 0x1, &(0x7f0000001bc0)=""/206, 0xce}, 0x7}, {{&(0x7f0000001cc0)=@in={0x2, 0x0, @broadcast}, 0x80, &(0x7f0000000880)=[{&(0x7f0000001d40)=""/146, 0x92}, {&(0x7f0000001e00)=""/231, 0xe7}], 0x2, &(0x7f0000001f00)=""/239, 0xef}, 0x3}, {{&(0x7f0000002000)=@xdp, 0x80, &(0x7f00000020c0)=[{&(0x7f0000002080)=""/58, 0x3a}], 0x1, &(0x7f0000002100)=""/251, 0xfb}, 0x9}], 0x4, 0x40, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000002380)=ANY=[@ANYBLOB="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", @ANYRESDEC=r0, @ANYBLOB="b21b22b0b59f1a76abb6323c16886f3d2569d595dca4af1ac9160b24b62e47302e148fa17433c275945e36a713e5fad2e8abc9651d17b22d7d092020f73d100115fed606c66c84318df7895b1e5780f3c785bfb92571cf1bc9", @ANYRES32=0x0, @ANYRES32, @ANYRES32=0x0], &(0x7f0000000300)=0x18) socket(0x1, 0x803, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8936, &(0x7f0000000080)={@rand_addr=' \x01\x00', 0x44, r4}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000a00)=@newlink={0x7c, 0x10, 0x401, 0x3001, 0x25dfdbfc, {0x0, 0x0, 0x0, 0x0, 0x534ad, 0x42a03}, [@IFLA_LINKINFO={0x4c, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x3c, 0x2, 0x0, 0x1, [@IFLA_IPVLAN_MODE={0x6, 0x1, 0x2}, @IFLA_IPVLAN_FLAGS={0x6, 0x2, 0x2}, @IFLA_IPVLAN_FLAGS={0x6, 0x2, 0x1}, @IFLA_IPVLAN_FLAGS={0x6, 0x2, 0x2}, @IFLA_IPVLAN_FLAGS={0x6, 0x2, 0x3}, @IFLA_IPVLAN_MODE={0x6}, @IFLA_IPVLAN_FLAGS={0x6, 0x2, 0x2}]}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8}]}, 0x7c}}, 0x0) [ 515.975856][T21143] 8021q: adding VLAN 0 to HW filter on device ipvlan2 18:12:07 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="b4050000000000006110580000000000c60000000000000095000002000000002ac73fe427abdf478e0357f2d32986f50b892b5007921cd48fe43b23be60a2dbc9778bb665510e3e22fcb26adfdc05e55a4933e62a23abb4baca4ec89323257db59db5eeda384459dd00d41b6aab85df5cab39e726769e2291b626d120a9247579f0b8edd8f16683e0623366ac632c24921d2153423774"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x5, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) [ 516.043897][T21143] team0: Device ipvlan2 is already an upper device of the team interface 18:12:07 executing program 3: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$FS_IOC_RESVSP(r0, 0x402c5828, &(0x7f00000000c0)={0x0, 0x1, 0xa8f, 0x3078}) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x200000000}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x9) preadv(r1, &(0x7f0000000240)=[{&(0x7f0000000040)=""/94, 0x5e}, {&(0x7f00000000c0)=""/93, 0x5d}, {&(0x7f0000000140)=""/58, 0x3a}], 0x3, 0xd9f, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000002340)='./file0\x00', 0x0, 0x108) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000180)={'team0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @local}, 0x14) writev(r2, &(0x7f0000000280)=[{&(0x7f00000008c0)="110eaa1a9896d57019effc8c79961d0f73ccf3afca3754e2e7a31f536bcb7204bed59311e29c96e1c2b663d61e5b0c0a76ea50cbddaa69f578b8600f77cf1a538ac900673696245b6de4283c979a2eccd71f9583dacf650575d1398678895da32663735b4d0cabfe7e972e59c2b4b4c9c89d0b82ca2267ad5062303e8abcb79600010506702eb912e3957e507aec4e2180699a738f6753509a12282a1d7181887f6c2e03de1da0dfe3b4efbb10e9b59301b4ef8a1d", 0xb5}, {&(0x7f0000000980)="34c30d95766fefbb7bdc40a3242505587bbc8584c2bc2003185f5ce116eea020efa91e2aae1eae2b8e848ac13c3dcedbbbc82adb1e70be8eecedba37be82545f2abda4f0a0e0fd0edd6bd03bb8e9bb91c39a2c828511aef3e684ad4c21ec0c146b9570139e31cd", 0x67}], 0x2) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'macvtap0\x00'}) ioctl$PPPIOCSFLAGS1(0xffffffffffffffff, 0x40047459, &(0x7f00000001c0)) recvmmsg(0xffffffffffffffff, &(0x7f0000002200)=[{{&(0x7f0000000340)=@in={0x2, 0x0, @multicast1}, 0x80, &(0x7f0000000440)=[{&(0x7f00000004c0)=""/88, 0x58}, {&(0x7f0000000b40)=""/4096, 0x1000}], 0x2, &(0x7f0000000740)=""/192, 0xc0}, 0x3}, {{&(0x7f0000000800)=@sco={0x1f, @none}, 0x80, &(0x7f0000000480)=[{&(0x7f0000001b40)=""/82, 0x52}], 0x1, &(0x7f0000001bc0)=""/206, 0xce}, 0x7}, {{&(0x7f0000001cc0)=@in={0x2, 0x0, @broadcast}, 0x80, &(0x7f0000000880)=[{&(0x7f0000001d40)=""/146, 0x92}, {&(0x7f0000001e00)=""/231, 0xe7}], 0x2, &(0x7f0000001f00)=""/239, 0xef}, 0x3}, {{&(0x7f0000002000)=@xdp, 0x80, &(0x7f00000020c0)=[{&(0x7f0000002080)=""/58, 0x3a}], 0x1, &(0x7f0000002100)=""/251, 0xfb}, 0x9}], 0x4, 0x40, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000002380)=ANY=[@ANYBLOB="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", @ANYRESDEC=r0, @ANYBLOB="b21b22b0b59f1a76abb6323c16886f3d2569d595dca4af1ac9160b24b62e47302e148fa17433c275945e36a713e5fad2e8abc9651d17b22d7d092020f73d100115fed606c66c84318df7895b1e5780f3c785bfb92571cf1bc9", @ANYRES32=0x0, @ANYRES32, @ANYRES32=0x0], &(0x7f0000000300)=0x18) socket(0x1, 0x803, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8936, &(0x7f0000000080)={@rand_addr=' \x01\x00', 0x44, r4}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000a00)=@newlink={0x7c, 0x10, 0x401, 0x3001, 0x25dfdbfc, {0x0, 0x0, 0x0, 0x0, 0x534ad, 0x42a03}, [@IFLA_LINKINFO={0x4c, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x3c, 0x2, 0x0, 0x1, [@IFLA_IPVLAN_MODE={0x6, 0x1, 0x2}, @IFLA_IPVLAN_FLAGS={0x6, 0x2, 0x2}, @IFLA_IPVLAN_FLAGS={0x6, 0x2, 0x1}, @IFLA_IPVLAN_FLAGS={0x6, 0x2, 0x2}, @IFLA_IPVLAN_FLAGS={0x6, 0x2, 0x3}, @IFLA_IPVLAN_MODE={0x6}, @IFLA_IPVLAN_FLAGS={0x6, 0x2, 0x2}]}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8}]}, 0x7c}}, 0x0) 18:12:07 executing program 0: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$FS_IOC_RESVSP(r0, 0x402c5828, &(0x7f00000000c0)={0x0, 0x1, 0xa8f, 0x3078}) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x200000000}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x9) preadv(r1, &(0x7f0000000240)=[{&(0x7f0000000040)=""/94, 0x5e}, {&(0x7f00000000c0)=""/93, 0x5d}, {&(0x7f0000000140)=""/58, 0x3a}], 0x3, 0xd9f, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000002340)='./file0\x00', 0x0, 0x108) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000180)={'team0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @local}, 0x14) writev(r2, &(0x7f0000000280)=[{&(0x7f00000008c0)="110eaa1a9896d57019effc8c79961d0f73ccf3afca3754e2e7a31f536bcb7204bed59311e29c96e1c2b663d61e5b0c0a76ea50cbddaa69f578b8600f77cf1a538ac900673696245b6de4283c979a2eccd71f9583dacf650575d1398678895da32663735b4d0cabfe7e972e59c2b4b4c9c89d0b82ca2267ad5062303e8abcb79600010506702eb912e3957e507aec4e2180699a738f6753509a12282a1d7181887f6c2e03de1da0dfe3b4efbb10e9b59301b4ef8a1d", 0xb5}, {&(0x7f0000000980)="34c30d95766fefbb7bdc40a3242505587bbc8584c2bc2003185f5ce116eea020efa91e2aae1eae2b8e848ac13c3dcedbbbc82adb1e70be8eecedba37be82545f2abda4f0a0e0fd0edd6bd03bb8e9bb91c39a2c828511aef3e684ad4c21ec0c146b9570139e31cd", 0x67}], 0x2) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'macvtap0\x00'}) ioctl$PPPIOCSFLAGS1(0xffffffffffffffff, 0x40047459, &(0x7f00000001c0)) recvmmsg(0xffffffffffffffff, &(0x7f0000002200)=[{{&(0x7f0000000340)=@in={0x2, 0x0, @multicast1}, 0x80, &(0x7f0000000440)=[{&(0x7f00000004c0)=""/88, 0x58}, {&(0x7f0000000b40)=""/4096, 0x1000}], 0x2, &(0x7f0000000740)=""/192, 0xc0}, 0x3}, {{&(0x7f0000000800)=@sco={0x1f, @none}, 0x80, &(0x7f0000000480)=[{&(0x7f0000001b40)=""/82, 0x52}], 0x1, &(0x7f0000001bc0)=""/206, 0xce}, 0x7}, {{&(0x7f0000001cc0)=@in={0x2, 0x0, @broadcast}, 0x80, &(0x7f0000000880)=[{&(0x7f0000001d40)=""/146, 0x92}, {&(0x7f0000001e00)=""/231, 0xe7}], 0x2, &(0x7f0000001f00)=""/239, 0xef}, 0x3}, {{&(0x7f0000002000)=@xdp, 0x80, &(0x7f00000020c0)=[{&(0x7f0000002080)=""/58, 0x3a}], 0x1, &(0x7f0000002100)=""/251, 0xfb}, 0x9}], 0x4, 0x40, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000002380)=ANY=[@ANYBLOB="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", @ANYRESDEC=r0, @ANYBLOB="b21b22b0b59f1a76abb6323c16886f3d2569d595dca4af1ac9160b24b62e47302e148fa17433c275945e36a713e5fad2e8abc9651d17b22d7d092020f73d100115fed606c66c84318df7895b1e5780f3c785bfb92571cf1bc9", @ANYRES32=0x0, @ANYRES32, @ANYRES32=0x0], &(0x7f0000000300)=0x18) r5 = socket(0x1, 0x803, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8936, &(0x7f0000000080)={@rand_addr=' \x01\x00', 0x44, r4}) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) r6 = socket(0x10, 0x8000000803, 0x0) sendmsg$nl_route(r6, 0x0, 0x0) [ 516.202080][T21146] 8021q: adding VLAN 0 to HW filter on device ipvlan3 [ 516.215804][ T4390] usb 6-1: new high-speed USB device number 39 using dummy_hcd 18:12:07 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="b4050000000000006110580000000000c60000000000000095000002000000002ac73fe427abdf478e0357f2d32986f50b892b5007921cd48fe43b23be60a2dbc9778bb665510e3e22fcb26adfdc05e55a4933e62a23abb4baca4ec89323257db59db5eeda384459dd00d41b6aab85df5cab39e726769e2291b626d120a9247579f0b8edd8f16683e0623366ac632c24921d2153423774"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x5, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) [ 516.257412][T21146] team0: Device ipvlan3 is already an upper device of the team interface 18:12:07 executing program 3: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$FS_IOC_RESVSP(r0, 0x402c5828, &(0x7f00000000c0)={0x0, 0x1, 0xa8f, 0x3078}) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x200000000}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x9) preadv(r1, &(0x7f0000000240)=[{&(0x7f0000000040)=""/94, 0x5e}, {&(0x7f00000000c0)=""/93, 0x5d}, {&(0x7f0000000140)=""/58, 0x3a}], 0x3, 0xd9f, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000002340)='./file0\x00', 0x0, 0x108) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000180)={'team0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @local}, 0x14) writev(r2, &(0x7f0000000280)=[{&(0x7f00000008c0)="110eaa1a9896d57019effc8c79961d0f73ccf3afca3754e2e7a31f536bcb7204bed59311e29c96e1c2b663d61e5b0c0a76ea50cbddaa69f578b8600f77cf1a538ac900673696245b6de4283c979a2eccd71f9583dacf650575d1398678895da32663735b4d0cabfe7e972e59c2b4b4c9c89d0b82ca2267ad5062303e8abcb79600010506702eb912e3957e507aec4e2180699a738f6753509a12282a1d7181887f6c2e03de1da0dfe3b4efbb10e9b59301b4ef8a1d", 0xb5}, {&(0x7f0000000980)="34c30d95766fefbb7bdc40a3242505587bbc8584c2bc2003185f5ce116eea020efa91e2aae1eae2b8e848ac13c3dcedbbbc82adb1e70be8eecedba37be82545f2abda4f0a0e0fd0edd6bd03bb8e9bb91c39a2c828511aef3e684ad4c21ec0c146b9570139e31cd", 0x67}], 0x2) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'macvtap0\x00'}) ioctl$PPPIOCSFLAGS1(0xffffffffffffffff, 0x40047459, &(0x7f00000001c0)) recvmmsg(0xffffffffffffffff, &(0x7f0000002200)=[{{&(0x7f0000000340)=@in={0x2, 0x0, @multicast1}, 0x80, &(0x7f0000000440)=[{&(0x7f00000004c0)=""/88, 0x58}, {&(0x7f0000000b40)=""/4096, 0x1000}], 0x2, &(0x7f0000000740)=""/192, 0xc0}, 0x3}, {{&(0x7f0000000800)=@sco={0x1f, @none}, 0x80, &(0x7f0000000480)=[{&(0x7f0000001b40)=""/82, 0x52}], 0x1, &(0x7f0000001bc0)=""/206, 0xce}, 0x7}, {{&(0x7f0000001cc0)=@in={0x2, 0x0, @broadcast}, 0x80, &(0x7f0000000880)=[{&(0x7f0000001d40)=""/146, 0x92}, {&(0x7f0000001e00)=""/231, 0xe7}], 0x2, &(0x7f0000001f00)=""/239, 0xef}, 0x3}, {{&(0x7f0000002000)=@xdp, 0x80, &(0x7f00000020c0)=[{&(0x7f0000002080)=""/58, 0x3a}], 0x1, &(0x7f0000002100)=""/251, 0xfb}, 0x9}], 0x4, 0x40, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000002380)=ANY=[@ANYBLOB="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", @ANYRESDEC=r0, @ANYBLOB="b21b22b0b59f1a76abb6323c16886f3d2569d595dca4af1ac9160b24b62e47302e148fa17433c275945e36a713e5fad2e8abc9651d17b22d7d092020f73d100115fed606c66c84318df7895b1e5780f3c785bfb92571cf1bc9", @ANYRES32=0x0, @ANYRES32, @ANYRES32=0x0], &(0x7f0000000300)=0x18) socket(0x1, 0x803, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8936, &(0x7f0000000080)={@rand_addr=' \x01\x00', 0x44, r4}) 18:12:07 executing program 2: syz_mount_image$ntfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f00000013c0)={[{@fmask}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'syzkaller1\x00'}}]}) (fail_nth: 1) 18:12:08 executing program 1: syz_mount_image$ntfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x218400, &(0x7f00000013c0)) (fail_nth: 1) [ 516.585994][ T4390] usb 6-1: New USB device found, idVendor=20b7, idProduct=1540, bcdDevice=ef.8f [ 516.610447][ T4390] usb 6-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 516.656908][T21165] FAULT_INJECTION: forcing a failure. [ 516.656908][T21165] name failslab, interval 1, probability 0, space 0, times 0 [ 516.694284][ T4390] usb 6-1: config 0 descriptor?? [ 516.724544][T21167] FAULT_INJECTION: forcing a failure. [ 516.724544][T21167] name failslab, interval 1, probability 0, space 0, times 0 [ 516.741023][T21165] CPU: 1 PID: 21165 Comm: syz-executor.2 Not tainted 5.16.0-rc5-syzkaller #0 [ 516.749827][T21165] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 516.759898][T21165] Call Trace: [ 516.763194][T21165] [ 516.766136][T21165] dump_stack_lvl+0x201/0x2d8 [ 516.770842][T21165] ? show_regs_print_info+0x12/0x12 [ 516.776065][T21165] ? log_buf_vmcoreinfo_setup+0x498/0x498 [ 516.781815][T21165] ? __might_sleep+0xe0/0xe0 [ 516.786433][T21165] should_fail+0x384/0x4b0 [ 516.790878][T21165] ? __se_sys_memfd_create+0xe9/0x460 [ 516.796266][T21165] should_failslab+0x5/0x20 [ 516.800782][T21165] __kmalloc+0x94/0x380 [ 516.805043][T21165] ? strnlen_user+0x1a7/0x260 [ 516.809739][T21165] __se_sys_memfd_create+0xe9/0x460 [ 516.815566][T21165] do_syscall_64+0x44/0xd0 [ 516.820012][T21165] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 516.826357][T21165] RIP: 0033:0x7f3831feee99 [ 516.830778][T21165] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 516.850398][T21165] RSP: 002b:00007f3830963f28 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 516.858839][T21165] RAX: ffffffffffffffda RBX: 00000000200000c0 RCX: 00007f3831feee99 [ 516.866912][T21165] RDX: 00007f3830963fe0 RSI: 0000000000000000 RDI: 00007f3832048168 [ 516.874921][T21165] RBP: 0000000000000000 R08: 00007f3830963fd8 R09: 00007f38309641d0 [ 516.882913][T21165] R10: 00007f3830963fdc R11: 0000000000000246 R12: 0000000020000040 [ 516.890986][T21165] R13: 0000000020000080 R14: 0000000000000000 R15: 00000000200013c0 [ 516.898995][T21165] [ 516.922762][T21167] CPU: 0 PID: 21167 Comm: syz-executor.1 Not tainted 5.16.0-rc5-syzkaller #0 [ 516.931568][T21167] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 516.941735][T21167] Call Trace: [ 516.945017][T21167] [ 516.947959][T21167] dump_stack_lvl+0x201/0x2d8 [ 516.952666][T21167] ? show_regs_print_info+0x12/0x12 [ 516.957876][T21167] ? log_buf_vmcoreinfo_setup+0x498/0x498 [ 516.963634][T21167] ? __might_sleep+0xe0/0xe0 [ 516.968261][T21167] should_fail+0x384/0x4b0 [ 516.972704][T21167] ? __se_sys_memfd_create+0xe9/0x460 [ 516.978100][T21167] should_failslab+0x5/0x20 [ 516.982607][T21167] __kmalloc+0x94/0x380 [ 516.986772][T21167] ? strnlen_user+0x1a7/0x260 [ 516.991552][T21167] __se_sys_memfd_create+0xe9/0x460 [ 516.996772][T21167] do_syscall_64+0x44/0xd0 [ 517.001202][T21167] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 517.007099][T21167] RIP: 0033:0x7fd8f7409e99 [ 517.011545][T21167] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 517.031150][T21167] RSP: 002b:00007fd8f5d7ef28 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 517.039580][T21167] RAX: ffffffffffffffda RBX: 00000000200000c0 RCX: 00007fd8f7409e99 [ 517.047544][T21167] RDX: 00007fd8f5d7efe0 RSI: 0000000000000000 RDI: 00007fd8f7463168 [ 517.055503][T21167] RBP: 0000000000000000 R08: 00007fd8f5d7efd8 R09: 00007fd8f5d7f1d0 [ 517.063479][T21167] R10: 00007fd8f5d7efdc R11: 0000000000000246 R12: 0000000020000040 [ 517.071439][T21167] R13: 0000000020000080 R14: 0000000000000000 R15: 00000000200013c0 [ 517.079414][T21167] [ 518.005952][ T4390] usb 6-1: ATUSB: AT86RF230 version 0 [ 518.225960][ T4390] usb 6-1: Firmware: major: 0, minor: 0, hardware type: ATUSB (0) [ 518.238389][ T4390] usb 6-1: Firmware version (0.0) predates our first public release. [ 518.265787][ T4390] usb 6-1: Please update to version 0.2 or newer [ 518.435949][ T4390] usb 6-1: Firmware: build [ 519.079780][ T3671] usb 6-1: USB disconnect, device number 39 18:12:11 executing program 5: r0 = syz_io_uring_setup(0x3ede, &(0x7f0000000240), &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) socket$l2tp6(0xa, 0x2, 0x73) openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/locks\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READ=@pass_buffer={0x16, 0x0, 0x0, @fd_index=0x5, 0xffffffffffffffff, &(0x7f0000000040)=""/17, 0x11}, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000002040)=[{{&(0x7f0000001380)=@in6={0xa, 0x0, 0x0, @private0}, 0x80, 0x0}}], 0x1, 0x0) io_uring_enter(r0, 0x26, 0x0, 0x0, 0x0, 0x0) (fail_nth: 1) 18:12:11 executing program 0: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$FS_IOC_RESVSP(r0, 0x402c5828, &(0x7f00000000c0)={0x0, 0x1, 0xa8f, 0x3078}) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x200000000}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x9) preadv(r1, &(0x7f0000000240)=[{&(0x7f0000000040)=""/94, 0x5e}, {&(0x7f00000000c0)=""/93, 0x5d}, {&(0x7f0000000140)=""/58, 0x3a}], 0x3, 0xd9f, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000002340)='./file0\x00', 0x0, 0x108) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000180)={'team0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @local}, 0x14) writev(r2, &(0x7f0000000280)=[{&(0x7f00000008c0)="110eaa1a9896d57019effc8c79961d0f73ccf3afca3754e2e7a31f536bcb7204bed59311e29c96e1c2b663d61e5b0c0a76ea50cbddaa69f578b8600f77cf1a538ac900673696245b6de4283c979a2eccd71f9583dacf650575d1398678895da32663735b4d0cabfe7e972e59c2b4b4c9c89d0b82ca2267ad5062303e8abcb79600010506702eb912e3957e507aec4e2180699a738f6753509a12282a1d7181887f6c2e03de1da0dfe3b4efbb10e9b59301b4ef8a1d", 0xb5}, {&(0x7f0000000980)="34c30d95766fefbb7bdc40a3242505587bbc8584c2bc2003185f5ce116eea020efa91e2aae1eae2b8e848ac13c3dcedbbbc82adb1e70be8eecedba37be82545f2abda4f0a0e0fd0edd6bd03bb8e9bb91c39a2c828511aef3e684ad4c21ec0c146b9570139e31cd", 0x67}], 0x2) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'macvtap0\x00'}) ioctl$PPPIOCSFLAGS1(0xffffffffffffffff, 0x40047459, &(0x7f00000001c0)) recvmmsg(0xffffffffffffffff, &(0x7f0000002200)=[{{&(0x7f0000000340)=@in={0x2, 0x0, @multicast1}, 0x80, &(0x7f0000000440)=[{&(0x7f00000004c0)=""/88, 0x58}, {&(0x7f0000000b40)=""/4096, 0x1000}], 0x2, &(0x7f0000000740)=""/192, 0xc0}, 0x3}, {{&(0x7f0000000800)=@sco={0x1f, @none}, 0x80, &(0x7f0000000480)=[{&(0x7f0000001b40)=""/82, 0x52}], 0x1, &(0x7f0000001bc0)=""/206, 0xce}, 0x7}, {{&(0x7f0000001cc0)=@in={0x2, 0x0, @broadcast}, 0x80, &(0x7f0000000880)=[{&(0x7f0000001d40)=""/146, 0x92}, {&(0x7f0000001e00)=""/231, 0xe7}], 0x2, &(0x7f0000001f00)=""/239, 0xef}, 0x3}, {{&(0x7f0000002000)=@xdp, 0x80, &(0x7f00000020c0)=[{&(0x7f0000002080)=""/58, 0x3a}], 0x1, &(0x7f0000002100)=""/251, 0xfb}, 0x9}], 0x4, 0x40, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000002380)=ANY=[@ANYBLOB="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", @ANYRESDEC=r0, @ANYBLOB="b21b22b0b59f1a76abb6323c16886f3d2569d595dca4af1ac9160b24b62e47302e148fa17433c275945e36a713e5fad2e8abc9651d17b22d7d092020f73d100115fed606c66c84318df7895b1e5780f3c785bfb92571cf1bc9", @ANYRES32=0x0, @ANYRES32, @ANYRES32=0x0], &(0x7f0000000300)=0x18) r5 = socket(0x1, 0x803, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8936, &(0x7f0000000080)={@rand_addr=' \x01\x00', 0x44, r4}) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) r6 = socket(0x10, 0x8000000803, 0x0) sendmsg$nl_route(r6, 0x0, 0x0) 18:12:11 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="b4050000000000006110580000000000c60000000000000095000002000000002ac73fe427abdf478e0357f2d32986f50b892b5007921cd48fe43b23be60a2dbc9778bb665510e3e22fcb26adfdc05e55a4933e62a23abb4baca4ec89323257db59db5eeda384459dd00d41b6aab85df5cab39e726769e2291b626d120a9247579f0b8edd8f16683e0623366ac632c24921d21534237743354f09cc29be2f72dfa8b"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x5, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) 18:12:11 executing program 1: syz_mount_image$ntfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x218400, &(0x7f00000013c0)) (fail_nth: 2) 18:12:11 executing program 3: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$FS_IOC_RESVSP(r0, 0x402c5828, &(0x7f00000000c0)={0x0, 0x1, 0xa8f, 0x3078}) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x200000000}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x9) preadv(r1, &(0x7f0000000240)=[{&(0x7f0000000040)=""/94, 0x5e}, {&(0x7f00000000c0)=""/93, 0x5d}, {&(0x7f0000000140)=""/58, 0x3a}], 0x3, 0xd9f, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000002340)='./file0\x00', 0x0, 0x108) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000180)={'team0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @local}, 0x14) writev(r2, &(0x7f0000000280)=[{&(0x7f00000008c0)="110eaa1a9896d57019effc8c79961d0f73ccf3afca3754e2e7a31f536bcb7204bed59311e29c96e1c2b663d61e5b0c0a76ea50cbddaa69f578b8600f77cf1a538ac900673696245b6de4283c979a2eccd71f9583dacf650575d1398678895da32663735b4d0cabfe7e972e59c2b4b4c9c89d0b82ca2267ad5062303e8abcb79600010506702eb912e3957e507aec4e2180699a738f6753509a12282a1d7181887f6c2e03de1da0dfe3b4efbb10e9b59301b4ef8a1d", 0xb5}, {&(0x7f0000000980)="34c30d95766fefbb7bdc40a3242505587bbc8584c2bc2003185f5ce116eea020efa91e2aae1eae2b8e848ac13c3dcedbbbc82adb1e70be8eecedba37be82545f2abda4f0a0e0fd0edd6bd03bb8e9bb91c39a2c828511aef3e684ad4c21ec0c146b9570139e31cd", 0x67}], 0x2) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'macvtap0\x00'}) ioctl$PPPIOCSFLAGS1(0xffffffffffffffff, 0x40047459, &(0x7f00000001c0)) recvmmsg(0xffffffffffffffff, &(0x7f0000002200)=[{{&(0x7f0000000340)=@in={0x2, 0x0, @multicast1}, 0x80, &(0x7f0000000440)=[{&(0x7f00000004c0)=""/88, 0x58}, {&(0x7f0000000b40)=""/4096, 0x1000}], 0x2, &(0x7f0000000740)=""/192, 0xc0}, 0x3}, {{&(0x7f0000000800)=@sco={0x1f, @none}, 0x80, &(0x7f0000000480)=[{&(0x7f0000001b40)=""/82, 0x52}], 0x1, &(0x7f0000001bc0)=""/206, 0xce}, 0x7}, {{&(0x7f0000001cc0)=@in={0x2, 0x0, @broadcast}, 0x80, &(0x7f0000000880)=[{&(0x7f0000001d40)=""/146, 0x92}, {&(0x7f0000001e00)=""/231, 0xe7}], 0x2, &(0x7f0000001f00)=""/239, 0xef}, 0x3}, {{&(0x7f0000002000)=@xdp, 0x80, &(0x7f00000020c0)=[{&(0x7f0000002080)=""/58, 0x3a}], 0x1, &(0x7f0000002100)=""/251, 0xfb}, 0x9}], 0x4, 0x40, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000002380)=ANY=[@ANYBLOB="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", @ANYRESDEC=r0, @ANYBLOB="b21b22b0b59f1a76abb6323c16886f3d2569d595dca4af1ac9160b24b62e47302e148fa17433c275945e36a713e5fad2e8abc9651d17b22d7d092020f73d100115fed606c66c84318df7895b1e5780f3c785bfb92571cf1bc9", @ANYRES32=0x0, @ANYRES32, @ANYRES32=0x0], &(0x7f0000000300)=0x18) socket(0x1, 0x803, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8936, &(0x7f0000000080)={@rand_addr=' \x01\x00', 0x44, r4}) 18:12:11 executing program 2: syz_mount_image$ntfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f00000013c0)={[{@fmask}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'syzkaller1\x00'}}]}) (fail_nth: 2) [ 519.645504][T21176] FAULT_INJECTION: forcing a failure. [ 519.645504][T21176] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 519.670057][T21180] FAULT_INJECTION: forcing a failure. [ 519.670057][T21180] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 519.694356][T21182] FAULT_INJECTION: forcing a failure. [ 519.694356][T21182] name failslab, interval 1, probability 0, space 0, times 0 [ 519.705626][T21180] CPU: 0 PID: 21180 Comm: syz-executor.1 Not tainted 5.16.0-rc5-syzkaller #0 [ 519.715737][T21180] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 519.725805][T21180] Call Trace: [ 519.729356][T21180] [ 519.732292][T21180] dump_stack_lvl+0x201/0x2d8 [ 519.736991][T21180] ? show_regs_print_info+0x12/0x12 [ 519.742205][T21180] ? log_buf_vmcoreinfo_setup+0x498/0x498 [ 519.747929][T21180] ? __might_fault+0xb6/0x110 [ 519.752614][T21180] ? __lock_acquire+0x2b00/0x2b00 [ 519.757651][T21180] should_fail+0x384/0x4b0 [ 519.762081][T21180] _copy_from_user+0x2d/0x170 [ 519.766761][T21180] __se_sys_memfd_create+0x125/0x460 [ 519.772059][T21180] do_syscall_64+0x44/0xd0 [ 519.776574][T21180] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 519.782555][T21180] RIP: 0033:0x7fd8f7409e99 [ 519.786976][T21180] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 519.806582][T21180] RSP: 002b:00007fd8f5d7ef28 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 519.815007][T21180] RAX: ffffffffffffffda RBX: 00000000200000c0 RCX: 00007fd8f7409e99 [ 519.822984][T21180] RDX: 00007fd8f5d7efe0 RSI: 0000000000000000 RDI: 00007fd8f7463168 [ 519.830962][T21180] RBP: 0000000000000000 R08: 00007fd8f5d7efd8 R09: 00007fd8f5d7f1d0 [ 519.838945][T21180] R10: 00007fd8f5d7efdc R11: 0000000000000246 R12: 0000000020000040 [ 519.846925][T21180] R13: 0000000020000080 R14: 0000000000000000 R15: 00000000200013c0 [ 519.854918][T21180] [ 519.857936][T21182] CPU: 1 PID: 21182 Comm: syz-executor.5 Not tainted 5.16.0-rc5-syzkaller #0 [ 519.866717][T21182] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 519.876782][T21182] Call Trace: [ 519.880067][T21182] [ 519.883002][T21182] dump_stack_lvl+0x201/0x2d8 [ 519.887699][T21182] ? show_regs_print_info+0x12/0x12 [ 519.892913][T21182] ? log_buf_vmcoreinfo_setup+0x498/0x498 [ 519.898659][T21182] should_fail+0x384/0x4b0 [ 519.903093][T21182] should_failslab+0x5/0x20 [ 519.907607][T21182] kmem_cache_alloc_bulk+0x69/0x590 [ 519.912832][T21182] __io_alloc_req_refill+0x2b1/0x4fe [ 519.918127][T21182] ? _raw_spin_unlock+0x40/0x40 [ 519.922993][T21182] ? io_submit_flush_completions+0x4b2/0x4b2 [ 519.928994][T21182] io_submit_sqes+0x5263/0xa7c0 [ 519.933862][T21182] ? atomic_dec_and_mutex_lock+0xb0/0xb0 [ 519.939508][T21182] ? rcu_read_lock_sched_held+0x89/0x130 [ 519.945217][T21182] ? io_uring_add_tctx_node+0x5c0/0x5c0 [ 519.950782][T21182] ? percpu_ref_tryget+0x200/0x200 [ 519.955922][T21182] __se_sys_io_uring_enter+0x21f/0x1cb0 [ 519.961495][T21182] ? __x64_sys_io_uring_enter+0xf0/0xf0 [ 519.967068][T21182] ? lockdep_hardirqs_on_prepare+0x412/0x780 [ 519.973066][T21182] ? __bpf_trace_rcu_stall_warning+0x10/0x10 [ 519.979061][T21182] ? print_irqtrace_events+0x220/0x220 [ 519.984531][T21182] ? vtime_user_exit+0x2b2/0x3e0 [ 519.989495][T21182] ? syscall_enter_from_user_mode+0x2e/0x1b0 [ 519.995483][T21182] ? lockdep_hardirqs_on+0x95/0x140 [ 520.000694][T21182] ? __x64_sys_io_uring_enter+0x1d/0xf0 [ 520.006258][T21182] do_syscall_64+0x44/0xd0 [ 520.010700][T21182] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 520.016607][T21182] RIP: 0033:0x7f35cea03e99 [ 520.021037][T21182] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 18:12:11 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="b4050000000000006110580000000000c60000000000000095000002000000002ac73fe427abdf478e0357f2d32986f50b892b5007921cd48fe43b23be60a2dbc9778bb665510e3e22fcb26adfdc05e55a4933e62a23abb4baca4ec89323257db59db5eeda384459dd00d41b6aab85df5cab39e726769e2291b626d120a9247579f0b8edd8f16683e0623366ac632c24921d21534237743354f09cc29be2f72dfa8b"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x5, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) 18:12:11 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="b4050000000000006110580000000000c60000000000000095000002000000002ac73fe427abdf478e0357f2d32986f50b892b5007921cd48fe43b23be60a2dbc9778bb665510e3e22fcb26adfdc05e55a4933e62a23abb4baca4ec89323257db59db5eeda384459dd00d41b6aab85df5cab39e726769e2291b626d120a9247579f0b8edd8f16683e0623366ac632c24921d21534237743354f09cc29be2f72dfa8b"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x5, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) 18:12:11 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="b4050000000000006110580000000000c60000000000000095000002000000002ac73fe427abdf478e0357f2d32986f50b892b5007921cd48fe43b23be60a2dbc9778bb665510e3e22fcb26adfdc05e55a4933e62a23abb4baca4ec89323257db59db5eeda384459dd00d41b6aab85df5cab39e726769e2291b626d120a9247579f0b8edd8f16683e0623366ac632c24921d21534237743354f09cc29be2f72dfa8b05320110bc"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x5, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) 18:12:11 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="b4050000000000006110580000000000c60000000000000095000002000000002ac73fe427abdf478e0357f2d32986f50b892b5007921cd48fe43b23be60a2dbc9778bb665510e3e22fcb26adfdc05e55a4933e62a23abb4baca4ec89323257db59db5eeda384459dd00d41b6aab85df5cab39e726769e2291b626d120a9247579f0b8edd8f16683e0623366ac632c24921d21534237743354f09cc29be2f72dfa8b05320110bc"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x5, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) 18:12:11 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="b4050000000000006110580000000000c60000000000000095000002000000002ac73fe427abdf478e0357f2d32986f50b892b5007921cd48fe43b23be60a2dbc9778bb665510e3e22fcb26adfdc05e55a4933e62a23abb4baca4ec89323257db59db5eeda384459dd00d41b6aab85df5cab39e726769e2291b626d120a9247579f0b8edd8f16683e0623366ac632c24921d21534237743354f09cc29be2f72dfa8b05320110bc"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x5, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) [ 520.040657][T21182] RSP: 002b:00007f35cd379168 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa [ 520.049111][T21182] RAX: ffffffffffffffda RBX: 00007f35ceb16f60 RCX: 00007f35cea03e99 [ 520.057119][T21182] RDX: 0000000000000000 RSI: 0000000000000026 RDI: 0000000000000003 [ 520.065109][T21182] RBP: 00007f35cd3791d0 R08: 0000000000000000 R09: 0000000000000000 [ 520.073096][T21182] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 520.081083][T21182] R13: 00007ffe041c3bcf R14: 00007f35cd379300 R15: 0000000000022000 [ 520.089269][T21182] 18:12:11 executing program 1: syz_mount_image$ntfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x218400, &(0x7f00000013c0)) (fail_nth: 3) [ 520.108245][T21176] CPU: 0 PID: 21176 Comm: syz-executor.2 Not tainted 5.16.0-rc5-syzkaller #0 [ 520.117053][T21176] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 520.127204][T21176] Call Trace: [ 520.130499][T21176] [ 520.133441][T21176] dump_stack_lvl+0x201/0x2d8 [ 520.138144][T21176] ? show_regs_print_info+0x12/0x12 [ 520.143363][T21176] ? log_buf_vmcoreinfo_setup+0x498/0x498 [ 520.149108][T21176] ? __might_fault+0xb6/0x110 [ 520.153969][T21176] ? __lock_acquire+0x2b00/0x2b00 [ 520.159010][T21176] should_fail+0x384/0x4b0 [ 520.163449][T21176] _copy_from_user+0x2d/0x170 [ 520.168143][T21176] __se_sys_memfd_create+0x125/0x460 [ 520.173452][T21176] do_syscall_64+0x44/0xd0 [ 520.177890][T21176] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 520.183808][T21176] RIP: 0033:0x7f3831feee99 [ 520.188315][T21176] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 520.202539][T21195] FAULT_INJECTION: forcing a failure. [ 520.202539][T21195] name failslab, interval 1, probability 0, space 0, times 0 [ 520.207926][T21176] RSP: 002b:00007f3830963f28 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 520.207955][T21176] RAX: ffffffffffffffda RBX: 00000000200000c0 RCX: 00007f3831feee99 [ 520.207970][T21176] RDX: 00007f3830963fe0 RSI: 0000000000000000 RDI: 00007f3832048168 [ 520.207983][T21176] RBP: 0000000000000000 R08: 00007f3830963fd8 R09: 00007f38309641d0 [ 520.207995][T21176] R10: 00007f3830963fdc R11: 0000000000000246 R12: 0000000020000040 [ 520.208008][T21176] R13: 0000000020000080 R14: 0000000000000000 R15: 00000000200013c0 [ 520.208036][T21176] [ 520.284501][T21195] CPU: 0 PID: 21195 Comm: syz-executor.1 Not tainted 5.16.0-rc5-syzkaller #0 [ 520.293310][T21195] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 520.303376][T21195] Call Trace: [ 520.306666][T21195] [ 520.309611][T21195] dump_stack_lvl+0x201/0x2d8 [ 520.314323][T21195] ? show_regs_print_info+0x12/0x12 [ 520.319547][T21195] ? log_buf_vmcoreinfo_setup+0x498/0x498 [ 520.325292][T21195] ? __might_sleep+0xe0/0xe0 [ 520.329895][T21195] ? rcu_read_lock_sched_held+0x89/0x130 [ 520.335549][T21195] should_fail+0x384/0x4b0 [ 520.339985][T21195] ? shmem_alloc_inode+0x16/0x30 [ 520.344948][T21195] should_failslab+0x5/0x20 [ 520.349470][T21195] kmem_cache_alloc+0x72/0x310 [ 520.354255][T21195] ? shmem_match+0x150/0x150 [ 520.358867][T21195] shmem_alloc_inode+0x16/0x30 [ 520.363655][T21195] new_inode_pseudo+0x61/0x220 [ 520.368444][T21195] new_inode+0x25/0x1d0 [ 520.372643][T21195] ? __lock_acquire+0x2b00/0x2b00 [ 520.377698][T21195] shmem_get_inode+0x116/0x7d0 [ 520.382495][T21195] ? shmem_fill_super+0xb50/0xb50 [ 520.387566][T21195] ? _raw_spin_unlock+0x24/0x40 [ 520.394717][T21195] ? alloc_fd+0x5e1/0x680 [ 520.399073][T21195] __shmem_file_setup+0x11e/0x270 [ 520.404124][T21195] __se_sys_memfd_create+0x1d5/0x460 [ 520.409438][T21195] do_syscall_64+0x44/0xd0 [ 520.413874][T21195] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 520.419779][T21195] RIP: 0033:0x7fd8f7409e99 [ 520.424207][T21195] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 520.443829][T21195] RSP: 002b:00007fd8f5d7ef28 EFLAGS: 00000246 ORIG_RAX: 000000000000013f 18:12:11 executing program 5: r0 = syz_io_uring_setup(0x3ede, &(0x7f0000000240), &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) socket$l2tp6(0xa, 0x2, 0x73) openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/locks\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READ=@pass_buffer={0x16, 0x0, 0x0, @fd_index=0x5, 0xffffffffffffffff, &(0x7f0000000040)=""/17, 0x11}, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000002040)=[{{&(0x7f0000001380)=@in6={0xa, 0x0, 0x0, @private0}, 0x80, 0x0}}], 0x1, 0x0) io_uring_enter(r0, 0x26, 0x0, 0x0, 0x0, 0x0) (fail_nth: 2) 18:12:11 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="b4050000000000006110580000000000c60000000000000095000002000000002ac73fe427abdf478e0357f2d32986f50b892b5007921cd48fe43b23be60a2dbc9778bb665510e3e22fcb26adfdc05e55a4933e62a23abb4baca4ec89323257db59db5eeda384459dd00d41b6aab85df5cab39e726769e2291b626d120a9247579f0b8edd8f16683e0623366ac632c24921d21534237743354f09cc29be2f72dfa8b05320110bcea53bb"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x5, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) 18:12:11 executing program 0: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$FS_IOC_RESVSP(r0, 0x402c5828, &(0x7f00000000c0)={0x0, 0x1, 0xa8f, 0x3078}) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x200000000}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x9) preadv(r1, &(0x7f0000000240)=[{&(0x7f0000000040)=""/94, 0x5e}, {&(0x7f00000000c0)=""/93, 0x5d}, {&(0x7f0000000140)=""/58, 0x3a}], 0x3, 0xd9f, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000002340)='./file0\x00', 0x0, 0x108) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000180)={'team0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @local}, 0x14) writev(r2, &(0x7f0000000280)=[{&(0x7f00000008c0)="110eaa1a9896d57019effc8c79961d0f73ccf3afca3754e2e7a31f536bcb7204bed59311e29c96e1c2b663d61e5b0c0a76ea50cbddaa69f578b8600f77cf1a538ac900673696245b6de4283c979a2eccd71f9583dacf650575d1398678895da32663735b4d0cabfe7e972e59c2b4b4c9c89d0b82ca2267ad5062303e8abcb79600010506702eb912e3957e507aec4e2180699a738f6753509a12282a1d7181887f6c2e03de1da0dfe3b4efbb10e9b59301b4ef8a1d", 0xb5}, {&(0x7f0000000980)="34c30d95766fefbb7bdc40a3242505587bbc8584c2bc2003185f5ce116eea020efa91e2aae1eae2b8e848ac13c3dcedbbbc82adb1e70be8eecedba37be82545f2abda4f0a0e0fd0edd6bd03bb8e9bb91c39a2c828511aef3e684ad4c21ec0c146b9570139e31cd", 0x67}], 0x2) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'macvtap0\x00'}) ioctl$PPPIOCSFLAGS1(0xffffffffffffffff, 0x40047459, &(0x7f00000001c0)) recvmmsg(0xffffffffffffffff, &(0x7f0000002200)=[{{&(0x7f0000000340)=@in={0x2, 0x0, @multicast1}, 0x80, &(0x7f0000000440)=[{&(0x7f00000004c0)=""/88, 0x58}, {&(0x7f0000000b40)=""/4096, 0x1000}], 0x2, &(0x7f0000000740)=""/192, 0xc0}, 0x3}, {{&(0x7f0000000800)=@sco={0x1f, @none}, 0x80, &(0x7f0000000480)=[{&(0x7f0000001b40)=""/82, 0x52}], 0x1, &(0x7f0000001bc0)=""/206, 0xce}, 0x7}, {{&(0x7f0000001cc0)=@in={0x2, 0x0, @broadcast}, 0x80, &(0x7f0000000880)=[{&(0x7f0000001d40)=""/146, 0x92}, {&(0x7f0000001e00)=""/231, 0xe7}], 0x2, &(0x7f0000001f00)=""/239, 0xef}, 0x3}, {{&(0x7f0000002000)=@xdp, 0x80, &(0x7f00000020c0)=[{&(0x7f0000002080)=""/58, 0x3a}], 0x1, &(0x7f0000002100)=""/251, 0xfb}, 0x9}], 0x4, 0x40, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000002380)=ANY=[@ANYBLOB="050000004f2fe4e7fe91d1f169b7f431831544d94b6dbcca36d501829c64f0c28565fbc3e562e329d779aef804590001804797c4378192536ca659efcf0a6cb16b0ba5b79cfefdc8e93c46dfa0c119d12be6495820cc0b34645475d4da28535803ddcfd16f5df589e2f1ac230118eafd75a63c016b3a1663bc141e5ed84016b6b02854a48c0ec71a36a1ad145c5d2216e964a34cdf686b0a089443bd0f8c210860754d133e2c97ce8a25ee4d4eb5abb779387ca2cd9e870d5cb5854616c65c24f259eeaa625432fa25dd2832dc14f9a78ebf3a24277da2b55d09ed6a1dca07d4fb9ed592a64782b6939500505805d12b2776980c4b250f17b0b9a8fda266d7f084a9cd1022d2d670f793298bcf83b9a25e4ae25ac23ce06ef88068108ec131b23695772064709b1dbee85e5c2a0c4cf809dbd8b5617f8c6f6fba013f019829c83bd4cf10be5c6da663ce7cbf9b19ebd88bedb114ec207599273b55ec5f4cd35914f897ee8afc7663255678f6853e5cfa0dfa079ba560c7ddbc56e6352397b7266ac906a0ce0fb810eb00000000000000000000000000000000000000000000000000c54baf95f669d6810040c457be8ca739b4ec785f005bb4faa01270b999b6c9899cd9e8997d359b77c00a68341ca40b4c0e06884b6384ef6e", @ANYRESDEC=r0, @ANYBLOB="b21b22b0b59f1a76abb6323c16886f3d2569d595dca4af1ac9160b24b62e47302e148fa17433c275945e36a713e5fad2e8abc9651d17b22d7d092020f73d100115fed606c66c84318df7895b1e5780f3c785bfb92571cf1bc9", @ANYRES32=0x0, @ANYRES32, @ANYRES32=0x0], &(0x7f0000000300)=0x18) r5 = socket(0x1, 0x803, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8936, &(0x7f0000000080)={@rand_addr=' \x01\x00', 0x44, r4}) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) r6 = socket(0x10, 0x8000000803, 0x0) sendmsg$nl_route(r6, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) 18:12:11 executing program 2: syz_mount_image$ntfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f00000013c0)={[{@fmask}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'syzkaller1\x00'}}]}) (fail_nth: 3) [ 520.452273][T21195] RAX: ffffffffffffffda RBX: 00000000200000c0 RCX: 00007fd8f7409e99 [ 520.460623][T21195] RDX: 00007fd8f5d7efe0 RSI: 0000000000000000 RDI: 00007fd8f7463168 [ 520.468617][T21195] RBP: 0000000000000000 R08: 00007fd8f5d7efd8 R09: 00007fd8f5d7f1d0 [ 520.476735][T21195] R10: 00007fd8f5d7efdc R11: 0000000000000246 R12: 0000000020000040 [ 520.484723][T21195] R13: 0000000020000080 R14: 0000000000000000 R15: 00000000200013c0 [ 520.492734][T21195] 18:12:12 executing program 3: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$FS_IOC_RESVSP(r0, 0x402c5828, &(0x7f00000000c0)={0x0, 0x1, 0xa8f, 0x3078}) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x200000000}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x9) preadv(r1, &(0x7f0000000240)=[{&(0x7f0000000040)=""/94, 0x5e}, {&(0x7f00000000c0)=""/93, 0x5d}, {&(0x7f0000000140)=""/58, 0x3a}], 0x3, 0xd9f, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000002340)='./file0\x00', 0x0, 0x108) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000180)={'team0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @local}, 0x14) writev(r2, &(0x7f0000000280)=[{&(0x7f00000008c0)="110eaa1a9896d57019effc8c79961d0f73ccf3afca3754e2e7a31f536bcb7204bed59311e29c96e1c2b663d61e5b0c0a76ea50cbddaa69f578b8600f77cf1a538ac900673696245b6de4283c979a2eccd71f9583dacf650575d1398678895da32663735b4d0cabfe7e972e59c2b4b4c9c89d0b82ca2267ad5062303e8abcb79600010506702eb912e3957e507aec4e2180699a738f6753509a12282a1d7181887f6c2e03de1da0dfe3b4efbb10e9b59301b4ef8a1d", 0xb5}, {&(0x7f0000000980)="34c30d95766fefbb7bdc40a3242505587bbc8584c2bc2003185f5ce116eea020efa91e2aae1eae2b8e848ac13c3dcedbbbc82adb1e70be8eecedba37be82545f2abda4f0a0e0fd0edd6bd03bb8e9bb91c39a2c828511aef3e684ad4c21ec0c146b9570139e31cd", 0x67}], 0x2) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'macvtap0\x00'}) ioctl$PPPIOCSFLAGS1(0xffffffffffffffff, 0x40047459, &(0x7f00000001c0)) recvmmsg(0xffffffffffffffff, &(0x7f0000002200)=[{{&(0x7f0000000340)=@in={0x2, 0x0, @multicast1}, 0x80, &(0x7f0000000440)=[{&(0x7f00000004c0)=""/88, 0x58}, {&(0x7f0000000b40)=""/4096, 0x1000}], 0x2, &(0x7f0000000740)=""/192, 0xc0}, 0x3}, {{&(0x7f0000000800)=@sco={0x1f, @none}, 0x80, &(0x7f0000000480)=[{&(0x7f0000001b40)=""/82, 0x52}], 0x1, &(0x7f0000001bc0)=""/206, 0xce}, 0x7}, {{&(0x7f0000001cc0)=@in={0x2, 0x0, @broadcast}, 0x80, &(0x7f0000000880)=[{&(0x7f0000001d40)=""/146, 0x92}, {&(0x7f0000001e00)=""/231, 0xe7}], 0x2, &(0x7f0000001f00)=""/239, 0xef}, 0x3}, {{&(0x7f0000002000)=@xdp, 0x80, &(0x7f00000020c0)=[{&(0x7f0000002080)=""/58, 0x3a}], 0x1, &(0x7f0000002100)=""/251, 0xfb}, 0x9}], 0x4, 0x40, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000002380)=ANY=[@ANYBLOB="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", @ANYRESDEC=r0, @ANYBLOB="b21b22b0b59f1a76abb6323c16886f3d2569d595dca4af1ac9160b24b62e47302e148fa17433c275945e36a713e5fad2e8abc9651d17b22d7d092020f73d100115fed606c66c84318df7895b1e5780f3c785bfb92571cf1bc9", @ANYRES32=0x0, @ANYRES32, @ANYRES32=0x0], &(0x7f0000000300)=0x18) socket(0x1, 0x803, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8936, &(0x7f0000000080)={@rand_addr=' \x01\x00', 0x44, r4}) 18:12:12 executing program 1: syz_mount_image$ntfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x218400, &(0x7f00000013c0)) (fail_nth: 4) [ 520.519122][T21200] FAULT_INJECTION: forcing a failure. [ 520.519122][T21200] name failslab, interval 1, probability 0, space 0, times 0 [ 520.554931][T21203] FAULT_INJECTION: forcing a failure. [ 520.554931][T21203] name failslab, interval 1, probability 0, space 0, times 0 18:12:12 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="b4050000000000006110580000000000c60000000000000095000002000000002ac73fe427abdf478e0357f2d32986f50b892b5007921cd48fe43b23be60a2dbc9778bb665510e3e22fcb26adfdc05e55a4933e62a23abb4baca4ec89323257db59db5eeda384459dd00d41b6aab85df5cab39e726769e2291b626d120a9247579f0b8edd8f16683e0623366ac632c24921d21534237743354f09cc29be2f72dfa8b05320110bcea53bb"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x5, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) [ 520.582564][T21203] CPU: 0 PID: 21203 Comm: syz-executor.2 Not tainted 5.16.0-rc5-syzkaller #0 [ 520.591458][T21203] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 520.601535][T21203] Call Trace: [ 520.604832][T21203] [ 520.607825][T21203] dump_stack_lvl+0x201/0x2d8 [ 520.612535][T21203] ? show_regs_print_info+0x12/0x12 [ 520.617771][T21203] ? log_buf_vmcoreinfo_setup+0x498/0x498 [ 520.623518][T21203] ? __might_sleep+0xe0/0xe0 [ 520.628133][T21203] ? rcu_read_lock_sched_held+0x89/0x130 [ 520.633878][T21203] should_fail+0x384/0x4b0 [ 520.638325][T21203] ? shmem_alloc_inode+0x16/0x30 [ 520.643286][T21203] should_failslab+0x5/0x20 [ 520.647806][T21203] kmem_cache_alloc+0x72/0x310 [ 520.652587][T21203] ? shmem_match+0x150/0x150 [ 520.657217][T21203] shmem_alloc_inode+0x16/0x30 [ 520.662000][T21203] new_inode_pseudo+0x61/0x220 [ 520.666798][T21203] new_inode+0x25/0x1d0 [ 520.670976][T21203] ? __lock_acquire+0x2b00/0x2b00 [ 520.676026][T21203] shmem_get_inode+0x116/0x7d0 [ 520.680812][T21203] ? shmem_fill_super+0xb50/0xb50 [ 520.685863][T21203] ? _raw_spin_unlock+0x24/0x40 [ 520.690727][T21203] ? alloc_fd+0x5e1/0x680 [ 520.695065][T21203] __shmem_file_setup+0x11e/0x270 [ 520.700101][T21203] __se_sys_memfd_create+0x1d5/0x460 [ 520.705390][T21203] do_syscall_64+0x44/0xd0 [ 520.709805][T21203] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 520.715713][T21203] RIP: 0033:0x7f3831feee99 [ 520.720132][T21203] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 520.739820][T21203] RSP: 002b:00007f3830963f28 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 520.748231][T21203] RAX: ffffffffffffffda RBX: 00000000200000c0 RCX: 00007f3831feee99 [ 520.756194][T21203] RDX: 00007f3830963fe0 RSI: 0000000000000000 RDI: 00007f3832048168 [ 520.764156][T21203] RBP: 0000000000000000 R08: 00007f3830963fd8 R09: 00007f38309641d0 [ 520.772123][T21203] R10: 00007f3830963fdc R11: 0000000000000246 R12: 0000000020000040 [ 520.780176][T21203] R13: 0000000020000080 R14: 0000000000000000 R15: 00000000200013c0 [ 520.788152][T21203] [ 520.795188][T21206] FAULT_INJECTION: forcing a failure. [ 520.795188][T21206] name failslab, interval 1, probability 0, space 0, times 0 [ 520.804853][T21200] CPU: 0 PID: 21200 Comm: syz-executor.5 Not tainted 5.16.0-rc5-syzkaller #0 [ 520.817220][T21200] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 520.827291][T21200] Call Trace: [ 520.830582][T21200] [ 520.833518][T21200] dump_stack_lvl+0x201/0x2d8 [ 520.838221][T21200] ? show_regs_print_info+0x12/0x12 [ 520.843433][T21200] ? log_buf_vmcoreinfo_setup+0x498/0x498 [ 520.849170][T21200] ? __might_sleep+0xe0/0xe0 [ 520.853781][T21200] should_fail+0x384/0x4b0 [ 520.858217][T21200] ? kvmalloc_node+0x81/0x110 [ 520.862901][T21200] should_failslab+0x5/0x20 [ 520.867406][T21200] __kmalloc_node+0x97/0x420 [ 520.872012][T21200] kvmalloc_node+0x81/0x110 [ 520.876529][T21200] seq_read_iter+0x205/0xdc0 [ 520.881129][T21200] ? rcu_lock_release+0x20/0x20 [ 520.885992][T21200] proc_reg_read_iter+0x19c/0x260 [ 520.891005][T21200] ? proc_reg_write+0x2c0/0x2c0 [ 520.895944][T21200] io_issue_sqe+0x144c/0x9590 [ 520.900631][T21200] ? rcu_read_lock_sched_held+0x89/0x130 [ 520.906259][T21200] ? __bpf_trace_rcu_stall_warning+0x10/0x10 [ 520.912238][T21200] ? __io_queue_sqe+0x780/0x780 [ 520.917103][T21200] ? reacquire_held_locks+0x620/0x620 [ 520.922466][T21200] ? mark_lock+0x191/0x1e00 [ 520.927413][T21200] ? reacquire_held_locks+0x620/0x620 [ 520.932776][T21200] ? mark_lock+0x191/0x1e00 [ 520.937299][T21200] ? reacquire_held_locks+0x620/0x620 [ 520.942670][T21200] ? stack_trace_save+0x1e0/0x1e0 [ 520.947691][T21200] ? reacquire_held_locks+0x620/0x620 [ 520.953055][T21200] ? mark_lock+0x191/0x1e00 [ 520.957552][T21200] ? kernel_text_address+0x9e/0xd0 [ 520.962660][T21200] ? __kernel_text_address+0x9/0x40 [ 520.967849][T21200] ? unwind_get_return_address+0x48/0x80 [ 520.973474][T21200] ? __print_lock_name+0x1d0/0x1d0 [ 520.978587][T21200] ? arch_stack_walk+0xf8/0x140 [ 520.983439][T21200] ? __lock_acquire+0x1382/0x2b00 [ 520.988463][T21200] ? __lock_acquire+0x1382/0x2b00 [ 520.993489][T21200] ? __lock_acquire+0x1382/0x2b00 [ 520.998521][T21200] ? __lock_acquire+0x1382/0x2b00 [ 521.003568][T21200] ? rcu_read_lock_sched_held+0x89/0x130 [ 521.009193][T21200] ? __bpf_trace_rcu_stall_warning+0x10/0x10 [ 521.015329][T21200] ? rcu_read_lock_sched_held+0x89/0x130 [ 521.021042][T21200] ? __bpf_trace_rcu_stall_warning+0x10/0x10 [ 521.027014][T21200] ? io_file_get_flags+0x2cd/0x350 [ 521.032124][T21200] __io_queue_sqe+0x2d/0x780 [ 521.036705][T21200] ? trace_io_uring_submit_sqe+0xcd/0x270 [ 521.042418][T21200] io_submit_sqes+0xffc/0xa7c0 [ 521.047174][T21200] ? atomic_dec_and_mutex_lock+0xb0/0xb0 [ 521.052829][T21200] ? io_uring_add_tctx_node+0x5c0/0x5c0 [ 521.058369][T21200] ? percpu_ref_tryget+0x200/0x200 [ 521.063482][T21200] __se_sys_io_uring_enter+0x21f/0x1cb0 [ 521.069038][T21200] ? __x64_sys_io_uring_enter+0xf0/0xf0 [ 521.074586][T21200] ? lockdep_hardirqs_on_prepare+0x412/0x780 [ 521.080570][T21200] ? __bpf_trace_rcu_stall_warning+0x10/0x10 [ 521.086544][T21200] ? print_irqtrace_events+0x220/0x220 [ 521.091993][T21200] ? vtime_user_exit+0x2b2/0x3e0 [ 521.096930][T21200] ? syscall_enter_from_user_mode+0x2e/0x1b0 [ 521.102900][T21200] ? lockdep_hardirqs_on+0x95/0x140 [ 521.108088][T21200] ? __x64_sys_io_uring_enter+0x1d/0xf0 [ 521.113627][T21200] do_syscall_64+0x44/0xd0 [ 521.118217][T21200] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 521.124103][T21200] RIP: 0033:0x7f35cea03e99 [ 521.128515][T21200] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 521.148198][T21200] RSP: 002b:00007f35cd379168 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa [ 521.156603][T21200] RAX: ffffffffffffffda RBX: 00007f35ceb16f60 RCX: 00007f35cea03e99 [ 521.164567][T21200] RDX: 0000000000000000 RSI: 0000000000000026 RDI: 0000000000000003 [ 521.172532][T21200] RBP: 00007f35cd3791d0 R08: 0000000000000000 R09: 0000000000000000 [ 521.180515][T21200] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 521.188479][T21200] R13: 00007ffe041c3bcf R14: 00007f35cd379300 R15: 0000000000022000 [ 521.196460][T21200] 18:12:12 executing program 2: syz_mount_image$ntfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f00000013c0)={[{@fmask}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'syzkaller1\x00'}}]}) (fail_nth: 4) 18:12:12 executing program 3: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$FS_IOC_RESVSP(r0, 0x402c5828, &(0x7f00000000c0)={0x0, 0x1, 0xa8f, 0x3078}) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x200000000}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x9) preadv(r1, &(0x7f0000000240)=[{&(0x7f0000000040)=""/94, 0x5e}, {&(0x7f00000000c0)=""/93, 0x5d}, {&(0x7f0000000140)=""/58, 0x3a}], 0x3, 0xd9f, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000002340)='./file0\x00', 0x0, 0x108) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000180)={'team0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @local}, 0x14) writev(r2, &(0x7f0000000280)=[{&(0x7f00000008c0)="110eaa1a9896d57019effc8c79961d0f73ccf3afca3754e2e7a31f536bcb7204bed59311e29c96e1c2b663d61e5b0c0a76ea50cbddaa69f578b8600f77cf1a538ac900673696245b6de4283c979a2eccd71f9583dacf650575d1398678895da32663735b4d0cabfe7e972e59c2b4b4c9c89d0b82ca2267ad5062303e8abcb79600010506702eb912e3957e507aec4e2180699a738f6753509a12282a1d7181887f6c2e03de1da0dfe3b4efbb10e9b59301b4ef8a1d", 0xb5}, {&(0x7f0000000980)="34c30d95766fefbb7bdc40a3242505587bbc8584c2bc2003185f5ce116eea020efa91e2aae1eae2b8e848ac13c3dcedbbbc82adb1e70be8eecedba37be82545f2abda4f0a0e0fd0edd6bd03bb8e9bb91c39a2c828511aef3e684ad4c21ec0c146b9570139e31cd", 0x67}], 0x2) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'macvtap0\x00'}) ioctl$PPPIOCSFLAGS1(0xffffffffffffffff, 0x40047459, &(0x7f00000001c0)) recvmmsg(0xffffffffffffffff, &(0x7f0000002200)=[{{&(0x7f0000000340)=@in={0x2, 0x0, @multicast1}, 0x80, &(0x7f0000000440)=[{&(0x7f00000004c0)=""/88, 0x58}, {&(0x7f0000000b40)=""/4096, 0x1000}], 0x2, &(0x7f0000000740)=""/192, 0xc0}, 0x3}, {{&(0x7f0000000800)=@sco={0x1f, @none}, 0x80, &(0x7f0000000480)=[{&(0x7f0000001b40)=""/82, 0x52}], 0x1, &(0x7f0000001bc0)=""/206, 0xce}, 0x7}, {{&(0x7f0000001cc0)=@in={0x2, 0x0, @broadcast}, 0x80, &(0x7f0000000880)=[{&(0x7f0000001d40)=""/146, 0x92}, {&(0x7f0000001e00)=""/231, 0xe7}], 0x2, &(0x7f0000001f00)=""/239, 0xef}, 0x3}, {{&(0x7f0000002000)=@xdp, 0x80, &(0x7f00000020c0)=[{&(0x7f0000002080)=""/58, 0x3a}], 0x1, &(0x7f0000002100)=""/251, 0xfb}, 0x9}], 0x4, 0x40, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000002380)=ANY=[@ANYBLOB="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", @ANYRESDEC=r0, @ANYBLOB="b21b22b0b59f1a76abb6323c16886f3d2569d595dca4af1ac9160b24b62e47302e148fa17433c275945e36a713e5fad2e8abc9651d17b22d7d092020f73d100115fed606c66c84318df7895b1e5780f3c785bfb92571cf1bc9", @ANYRES32=0x0, @ANYRES32, @ANYRES32=0x0], &(0x7f0000000300)=0x18) socket(0x1, 0x803, 0x0) 18:12:12 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="b4050000000000006110580000000000c60000000000000095000002000000002ac73fe427abdf478e0357f2d32986f50b892b5007921cd48fe43b23be60a2dbc9778bb665510e3e22fcb26adfdc05e55a4933e62a23abb4baca4ec89323257db59db5eeda384459dd00d41b6aab85df5cab39e726769e2291b626d120a9247579f0b8edd8f16683e0623366ac632c24921d21534237743354f09cc29be2f72dfa8b05320110bcea53bb"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x5, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) [ 521.291894][T21214] FAULT_INJECTION: forcing a failure. [ 521.291894][T21214] name failslab, interval 1, probability 0, space 0, times 0 [ 521.298548][T21206] CPU: 0 PID: 21206 Comm: syz-executor.1 Not tainted 5.16.0-rc5-syzkaller #0 [ 521.313288][T21206] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 521.323363][T21206] Call Trace: [ 521.326656][T21206] [ 521.329594][T21206] dump_stack_lvl+0x201/0x2d8 [ 521.334286][T21206] ? show_regs_print_info+0x12/0x12 18:12:12 executing program 5: r0 = syz_io_uring_setup(0x3ede, &(0x7f0000000240), &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) socket$l2tp6(0xa, 0x2, 0x73) openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/locks\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READ=@pass_buffer={0x16, 0x0, 0x0, @fd_index=0x5, 0xffffffffffffffff, &(0x7f0000000040)=""/17, 0x11}, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000002040)=[{{&(0x7f0000001380)=@in6={0xa, 0x0, 0x0, @private0}, 0x80, 0x0}}], 0x1, 0x0) io_uring_enter(r0, 0x26, 0x0, 0x0, 0x0, 0x0) (fail_nth: 3) [ 521.339505][T21206] ? log_buf_vmcoreinfo_setup+0x498/0x498 [ 521.345267][T21206] should_fail+0x384/0x4b0 [ 521.349711][T21206] ? security_inode_alloc+0x32/0x1d0 [ 521.355018][T21206] should_failslab+0x5/0x20 [ 521.359538][T21206] kmem_cache_alloc+0x72/0x310 [ 521.364315][T21206] ? from_kuid_munged+0x3b0/0x3b0 [ 521.369593][T21206] security_inode_alloc+0x32/0x1d0 [ 521.374729][T21206] inode_init_always+0x3e2/0xa60 [ 521.379687][T21206] ? shmem_match+0x150/0x150 [ 521.384298][T21206] new_inode_pseudo+0x90/0x220 18:12:12 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="b4050000000000006110580000000000c60000000000000095000002000000002ac73fe427abdf478e0357f2d32986f50b892b5007921cd48fe43b23be60a2dbc9778bb665510e3e22fcb26adfdc05e55a4933e62a23abb4baca4ec89323257db59db5eeda384459dd00d41b6aab85df5cab39e726769e2291b626d120a9247579f0b8edd8f16683e0623366ac632c24921d21534237743354f09cc29be2f72dfa8b05320110bcea53bb03"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x5, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) [ 521.389086][T21206] new_inode+0x25/0x1d0 [ 521.393349][T21206] ? __lock_acquire+0x2b00/0x2b00 [ 521.398412][T21206] shmem_get_inode+0x116/0x7d0 [ 521.403201][T21206] ? shmem_fill_super+0xb50/0xb50 [ 521.408249][T21206] ? _raw_spin_unlock+0x24/0x40 [ 521.413116][T21206] ? alloc_fd+0x5e1/0x680 [ 521.417470][T21206] __shmem_file_setup+0x11e/0x270 [ 521.422531][T21206] __se_sys_memfd_create+0x1d5/0x460 [ 521.427849][T21206] do_syscall_64+0x44/0xd0 [ 521.432301][T21206] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 521.438213][T21206] RIP: 0033:0x7fd8f7409e99 [ 521.442644][T21206] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 521.462246][T21206] RSP: 002b:00007fd8f5d7ef28 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 521.470666][T21206] RAX: ffffffffffffffda RBX: 00000000200000c0 RCX: 00007fd8f7409e99 [ 521.478630][T21206] RDX: 00007fd8f5d7efe0 RSI: 0000000000000000 RDI: 00007fd8f7463168 [ 521.486594][T21206] RBP: 0000000000000000 R08: 00007fd8f5d7efd8 R09: 00007fd8f5d7f1d0 [ 521.494567][T21206] R10: 00007fd8f5d7efdc R11: 0000000000000246 R12: 0000000020000040 [ 521.502680][T21206] R13: 0000000020000080 R14: 0000000000000000 R15: 00000000200013c0 [ 521.510763][T21206] [ 521.523570][T21214] CPU: 0 PID: 21214 Comm: syz-executor.2 Not tainted 5.16.0-rc5-syzkaller #0 [ 521.532379][T21214] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 521.542454][T21214] Call Trace: [ 521.545740][T21214] [ 521.548669][T21214] dump_stack_lvl+0x201/0x2d8 [ 521.553352][T21214] ? show_regs_print_info+0x12/0x12 [ 521.558563][T21214] ? log_buf_vmcoreinfo_setup+0x498/0x498 [ 521.564292][T21214] should_fail+0x384/0x4b0 [ 521.568706][T21214] ? security_inode_alloc+0x32/0x1d0 [ 521.573982][T21214] should_failslab+0x5/0x20 [ 521.578478][T21214] kmem_cache_alloc+0x72/0x310 [ 521.583233][T21214] ? from_kuid_munged+0x3b0/0x3b0 [ 521.588255][T21214] security_inode_alloc+0x32/0x1d0 [ 521.593459][T21214] inode_init_always+0x3e2/0xa60 [ 521.598394][T21214] ? shmem_match+0x150/0x150 [ 521.602982][T21214] new_inode_pseudo+0x90/0x220 [ 521.607754][T21214] new_inode+0x25/0x1d0 [ 521.611902][T21214] ? __lock_acquire+0x2b00/0x2b00 [ 521.616924][T21214] shmem_get_inode+0x116/0x7d0 [ 521.621686][T21214] ? shmem_fill_super+0xb50/0xb50 [ 521.626706][T21214] ? _raw_spin_unlock+0x24/0x40 [ 521.631546][T21214] ? alloc_fd+0x5e1/0x680 [ 521.635869][T21214] __shmem_file_setup+0x11e/0x270 [ 521.640892][T21214] __se_sys_memfd_create+0x1d5/0x460 [ 521.646175][T21214] do_syscall_64+0x44/0xd0 [ 521.650591][T21214] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 521.656481][T21214] RIP: 0033:0x7f3831feee99 [ 521.660896][T21214] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 521.680493][T21214] RSP: 002b:00007f3830963f28 EFLAGS: 00000246 ORIG_RAX: 000000000000013f 18:12:13 executing program 0: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$FS_IOC_RESVSP(r0, 0x402c5828, &(0x7f00000000c0)={0x0, 0x1, 0xa8f, 0x3078}) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x200000000}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x9) preadv(r1, &(0x7f0000000240)=[{&(0x7f0000000040)=""/94, 0x5e}, {&(0x7f00000000c0)=""/93, 0x5d}, {&(0x7f0000000140)=""/58, 0x3a}], 0x3, 0xd9f, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000002340)='./file0\x00', 0x0, 0x108) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000180)={'team0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @local}, 0x14) writev(r2, &(0x7f0000000280)=[{&(0x7f00000008c0)="110eaa1a9896d57019effc8c79961d0f73ccf3afca3754e2e7a31f536bcb7204bed59311e29c96e1c2b663d61e5b0c0a76ea50cbddaa69f578b8600f77cf1a538ac900673696245b6de4283c979a2eccd71f9583dacf650575d1398678895da32663735b4d0cabfe7e972e59c2b4b4c9c89d0b82ca2267ad5062303e8abcb79600010506702eb912e3957e507aec4e2180699a738f6753509a12282a1d7181887f6c2e03de1da0dfe3b4efbb10e9b59301b4ef8a1d", 0xb5}, {&(0x7f0000000980)="34c30d95766fefbb7bdc40a3242505587bbc8584c2bc2003185f5ce116eea020efa91e2aae1eae2b8e848ac13c3dcedbbbc82adb1e70be8eecedba37be82545f2abda4f0a0e0fd0edd6bd03bb8e9bb91c39a2c828511aef3e684ad4c21ec0c146b9570139e31cd", 0x67}], 0x2) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'macvtap0\x00'}) ioctl$PPPIOCSFLAGS1(0xffffffffffffffff, 0x40047459, &(0x7f00000001c0)) recvmmsg(0xffffffffffffffff, &(0x7f0000002200)=[{{&(0x7f0000000340)=@in={0x2, 0x0, @multicast1}, 0x80, &(0x7f0000000440)=[{&(0x7f00000004c0)=""/88, 0x58}, {&(0x7f0000000b40)=""/4096, 0x1000}], 0x2, &(0x7f0000000740)=""/192, 0xc0}, 0x3}, {{&(0x7f0000000800)=@sco={0x1f, @none}, 0x80, &(0x7f0000000480)=[{&(0x7f0000001b40)=""/82, 0x52}], 0x1, &(0x7f0000001bc0)=""/206, 0xce}, 0x7}, {{&(0x7f0000001cc0)=@in={0x2, 0x0, @broadcast}, 0x80, &(0x7f0000000880)=[{&(0x7f0000001d40)=""/146, 0x92}, {&(0x7f0000001e00)=""/231, 0xe7}], 0x2, &(0x7f0000001f00)=""/239, 0xef}, 0x3}, {{&(0x7f0000002000)=@xdp, 0x80, &(0x7f00000020c0)=[{&(0x7f0000002080)=""/58, 0x3a}], 0x1, &(0x7f0000002100)=""/251, 0xfb}, 0x9}], 0x4, 0x40, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000002380)=ANY=[@ANYBLOB="050000004f2fe4e7fe91d1f169b7f431831544d94b6dbcca36d501829c64f0c28565fbc3e562e329d779aef804590001804797c4378192536ca659efcf0a6cb16b0ba5b79cfefdc8e93c46dfa0c119d12be6495820cc0b34645475d4da28535803ddcfd16f5df589e2f1ac230118eafd75a63c016b3a1663bc141e5ed84016b6b02854a48c0ec71a36a1ad145c5d2216e964a34cdf686b0a089443bd0f8c210860754d133e2c97ce8a25ee4d4eb5abb779387ca2cd9e870d5cb5854616c65c24f259eeaa625432fa25dd2832dc14f9a78ebf3a24277da2b55d09ed6a1dca07d4fb9ed592a64782b6939500505805d12b2776980c4b250f17b0b9a8fda266d7f084a9cd1022d2d670f793298bcf83b9a25e4ae25ac23ce06ef88068108ec131b23695772064709b1dbee85e5c2a0c4cf809dbd8b5617f8c6f6fba013f019829c83bd4cf10be5c6da663ce7cbf9b19ebd88bedb114ec207599273b55ec5f4cd35914f897ee8afc7663255678f6853e5cfa0dfa079ba560c7ddbc56e6352397b7266ac906a0ce0fb810eb00000000000000000000000000000000000000000000000000c54baf95f669d6810040c457be8ca739b4ec785f005bb4faa01270b999b6c9899cd9e8997d359b77c00a68341ca40b4c0e06884b6384ef6e", @ANYRESDEC=r0, @ANYBLOB="b21b22b0b59f1a76abb6323c16886f3d2569d595dca4af1ac9160b24b62e47302e148fa17433c275945e36a713e5fad2e8abc9651d17b22d7d092020f73d100115fed606c66c84318df7895b1e5780f3c785bfb92571cf1bc9", @ANYRES32=0x0, @ANYRES32, @ANYRES32=0x0], &(0x7f0000000300)=0x18) r5 = socket(0x1, 0x803, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8936, &(0x7f0000000080)={@rand_addr=' \x01\x00', 0x44, r4}) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) r6 = socket(0x10, 0x8000000803, 0x0) sendmsg$nl_route(r6, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) [ 521.688903][T21214] RAX: ffffffffffffffda RBX: 00000000200000c0 RCX: 00007f3831feee99 [ 521.696865][T21214] RDX: 00007f3830963fe0 RSI: 0000000000000000 RDI: 00007f3832048168 [ 521.704999][T21214] RBP: 0000000000000000 R08: 00007f3830963fd8 R09: 00007f38309641d0 [ 521.712969][T21214] R10: 00007f3830963fdc R11: 0000000000000246 R12: 0000000020000040 [ 521.721109][T21214] R13: 0000000020000080 R14: 0000000000000000 R15: 00000000200013c0 [ 521.729088][T21214] [ 521.771534][T21222] FAULT_INJECTION: forcing a failure. [ 521.771534][T21222] name fail_usercopy, interval 1, probability 0, space 0, times 0 18:12:13 executing program 2: syz_mount_image$ntfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f00000013c0)={[{@fmask}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'syzkaller1\x00'}}]}) (fail_nth: 5) [ 521.843188][T21222] CPU: 1 PID: 21222 Comm: syz-executor.5 Not tainted 5.16.0-rc5-syzkaller #0 [ 521.851995][T21222] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 521.862100][T21222] Call Trace: [ 521.865397][T21222] [ 521.868340][T21222] dump_stack_lvl+0x201/0x2d8 [ 521.873048][T21222] ? show_regs_print_info+0x12/0x12 [ 521.878274][T21222] ? log_buf_vmcoreinfo_setup+0x498/0x498 [ 521.884025][T21222] ? __might_fault+0xb6/0x110 [ 521.888716][T21222] ? __lock_acquire+0x2b00/0x2b00 [ 521.893746][T21222] ? rcu_read_lock_sched_held+0x89/0x130 [ 521.899382][T21222] should_fail+0x384/0x4b0 [ 521.903798][T21222] _copy_to_iter+0x26c/0x1430 [ 521.908495][T21222] ? iov_iter_init+0x220/0x220 [ 521.913257][T21222] ? lockdep_hardirqs_on_prepare+0x412/0x780 [ 521.919261][T21222] ? print_irqtrace_events+0x220/0x220 [ 521.924711][T21222] ? __virt_addr_valid+0x21b/0x2d0 [ 521.929816][T21222] ? __phys_addr_symbol+0x2b/0x70 [ 521.934829][T21222] ? __check_object_size+0x2f3/0x3f0 [ 521.940108][T21222] seq_read_iter+0xc39/0xdc0 [ 521.944712][T21222] proc_reg_read_iter+0x19c/0x260 [ 521.949726][T21222] ? proc_reg_write+0x2c0/0x2c0 [ 521.954571][T21222] io_issue_sqe+0x144c/0x9590 [ 521.959257][T21222] ? rcu_read_lock_sched_held+0x89/0x130 [ 521.964887][T21222] ? __bpf_trace_rcu_stall_warning+0x10/0x10 [ 521.970867][T21222] ? __io_queue_sqe+0x780/0x780 [ 521.975728][T21222] ? reacquire_held_locks+0x620/0x620 [ 521.981096][T21222] ? mark_lock+0x191/0x1e00 [ 521.985594][T21222] ? reacquire_held_locks+0x620/0x620 [ 521.990960][T21222] ? mark_lock+0x191/0x1e00 [ 521.995462][T21222] ? reacquire_held_locks+0x620/0x620 [ 522.000832][T21222] ? stack_trace_save+0x1e0/0x1e0 [ 522.005854][T21222] ? reacquire_held_locks+0x620/0x620 [ 522.011564][T21222] ? mark_lock+0x191/0x1e00 [ 522.016148][T21222] ? kernel_text_address+0x9e/0xd0 [ 522.021255][T21222] ? __kernel_text_address+0x9/0x40 [ 522.026538][T21222] ? unwind_get_return_address+0x48/0x80 [ 522.032163][T21222] ? __print_lock_name+0x1d0/0x1d0 [ 522.037271][T21222] ? arch_stack_walk+0xf8/0x140 [ 522.042121][T21222] ? __lock_acquire+0x1382/0x2b00 [ 522.047228][T21222] ? __lock_acquire+0x1382/0x2b00 [ 522.052253][T21222] ? __lock_acquire+0x1382/0x2b00 [ 522.057280][T21222] ? __lock_acquire+0x1382/0x2b00 [ 522.062316][T21222] ? rcu_read_lock_sched_held+0x89/0x130 [ 522.067939][T21222] ? __bpf_trace_rcu_stall_warning+0x10/0x10 [ 522.073948][T21222] ? rcu_read_lock_sched_held+0x89/0x130 [ 522.079577][T21222] ? __bpf_trace_rcu_stall_warning+0x10/0x10 [ 522.085557][T21222] ? io_file_get_flags+0x2cd/0x350 [ 522.090669][T21222] __io_queue_sqe+0x2d/0x780 [ 522.095252][T21222] ? trace_io_uring_submit_sqe+0xcd/0x270 [ 522.100974][T21222] io_submit_sqes+0xffc/0xa7c0 [ 522.105736][T21222] ? atomic_dec_and_mutex_lock+0xb0/0xb0 [ 522.111394][T21222] ? io_uring_add_tctx_node+0x5c0/0x5c0 [ 522.116933][T21222] ? percpu_ref_tryget+0x200/0x200 [ 522.122134][T21222] __se_sys_io_uring_enter+0x21f/0x1cb0 [ 522.127686][T21222] ? __x64_sys_io_uring_enter+0xf0/0xf0 [ 522.133235][T21222] ? lockdep_hardirqs_on_prepare+0x412/0x780 [ 522.139205][T21222] ? __bpf_trace_rcu_stall_warning+0x10/0x10 [ 522.145178][T21222] ? print_irqtrace_events+0x220/0x220 [ 522.150626][T21222] ? vtime_user_exit+0x2b2/0x3e0 [ 522.155668][T21222] ? syscall_enter_from_user_mode+0x2e/0x1b0 [ 522.161642][T21222] ? lockdep_hardirqs_on+0x95/0x140 [ 522.166853][T21222] ? __x64_sys_io_uring_enter+0x1d/0xf0 [ 522.172394][T21222] do_syscall_64+0x44/0xd0 [ 522.176811][T21222] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 522.182696][T21222] RIP: 0033:0x7f35cea03e99 [ 522.187106][T21222] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 522.206704][T21222] RSP: 002b:00007f35cd379168 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa [ 522.215113][T21222] RAX: ffffffffffffffda RBX: 00007f35ceb16f60 RCX: 00007f35cea03e99 [ 522.223079][T21222] RDX: 0000000000000000 RSI: 0000000000000026 RDI: 0000000000000003 [ 522.231220][T21222] RBP: 00007f35cd3791d0 R08: 0000000000000000 R09: 0000000000000000 18:12:13 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="b4050000000000006110580000000000c60000000000000095000002000000002ac73fe427abdf478e0357f2d32986f50b892b5007921cd48fe43b23be60a2dbc9778bb665510e3e22fcb26adfdc05e55a4933e62a23abb4baca4ec89323257db59db5eeda384459dd00d41b6aab85df5cab39e726769e2291b626d120a9247579f0b8edd8f16683e0623366ac632c24921d21534237743354f09cc29be2f72dfa8b05320110bcea53bb03"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x5, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) 18:12:13 executing program 1: syz_mount_image$ntfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x218400, &(0x7f00000013c0)) [ 522.239179][T21222] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 522.247140][T21222] R13: 00007ffe041c3bcf R14: 00007f35cd379300 R15: 0000000000022000 [ 522.255119][T21222] [ 522.304771][T21230] FAULT_INJECTION: forcing a failure. [ 522.304771][T21230] name failslab, interval 1, probability 0, space 0, times 0 [ 522.335088][T21230] CPU: 1 PID: 21230 Comm: syz-executor.2 Not tainted 5.16.0-rc5-syzkaller #0 [ 522.344016][T21230] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 522.354092][T21230] Call Trace: [ 522.357384][T21230] [ 522.360331][T21230] dump_stack_lvl+0x201/0x2d8 [ 522.365038][T21230] ? show_regs_print_info+0x12/0x12 [ 522.370274][T21230] ? log_buf_vmcoreinfo_setup+0x498/0x498 [ 522.376018][T21230] ? __might_sleep+0xe0/0xe0 [ 522.380640][T21230] should_fail+0x384/0x4b0 [ 522.385082][T21230] ? __d_alloc+0x2a/0x700 [ 522.389441][T21230] should_failslab+0x5/0x20 [ 522.393955][T21230] kmem_cache_alloc+0x72/0x310 [ 522.398737][T21230] __d_alloc+0x2a/0x700 [ 522.402895][T21230] ? prandom_u32+0x220/0x260 [ 522.407478][T21230] d_alloc_pseudo+0x19/0x70 [ 522.411982][T21230] alloc_file_pseudo+0x13f/0x300 [ 522.416914][T21230] ? shmem_get_inode+0x736/0x7d0 [ 522.421938][T21230] ? alloc_empty_file_noaccount+0x80/0x80 [ 522.427655][T21230] ? shmem_fill_super+0xb50/0xb50 [ 522.432685][T21230] __shmem_file_setup+0x194/0x270 [ 522.437706][T21230] __se_sys_memfd_create+0x1d5/0x460 [ 522.442991][T21230] do_syscall_64+0x44/0xd0 [ 522.447412][T21230] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 522.453394][T21230] RIP: 0033:0x7f3831feee99 [ 522.457810][T21230] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 522.477429][T21230] RSP: 002b:00007f3830963f28 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 522.485849][T21230] RAX: ffffffffffffffda RBX: 00000000200000c0 RCX: 00007f3831feee99 [ 522.493815][T21230] RDX: 00007f3830963fe0 RSI: 0000000000000000 RDI: 00007f3832048168 18:12:14 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="b4050000000000006110580000000000c60000000000000095000002000000002ac73fe427abdf478e0357f2d32986f50b892b5007921cd48fe43b23be60a2dbc9778bb665510e3e22fcb26adfdc05e55a4933e62a23abb4baca4ec89323257db59db5eeda384459dd00d41b6aab85df5cab39e726769e2291b626d120a9247579f0b8edd8f16683e0623366ac632c24921d21534237743354f09cc29be2f72dfa8b05320110bcea53bb03"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x5, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) [ 522.501778][T21230] RBP: 0000000000000000 R08: 00007f3830963fd8 R09: 00007f38309641d0 [ 522.510002][T21230] R10: 00007f3830963fdc R11: 0000000000000246 R12: 0000000020000040 [ 522.517968][T21230] R13: 0000000020000080 R14: 0000000000000000 R15: 00000000200013c0 [ 522.526066][T21230] 18:12:14 executing program 2: syz_mount_image$ntfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f00000013c0)={[{@fmask}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'syzkaller1\x00'}}]}) (fail_nth: 6) 18:12:14 executing program 0: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$FS_IOC_RESVSP(r0, 0x402c5828, &(0x7f00000000c0)={0x0, 0x1, 0xa8f, 0x3078}) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x200000000}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x9) preadv(r1, &(0x7f0000000240)=[{&(0x7f0000000040)=""/94, 0x5e}, {&(0x7f00000000c0)=""/93, 0x5d}, {&(0x7f0000000140)=""/58, 0x3a}], 0x3, 0xd9f, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000002340)='./file0\x00', 0x0, 0x108) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000180)={'team0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @local}, 0x14) writev(r2, &(0x7f0000000280)=[{&(0x7f00000008c0)="110eaa1a9896d57019effc8c79961d0f73ccf3afca3754e2e7a31f536bcb7204bed59311e29c96e1c2b663d61e5b0c0a76ea50cbddaa69f578b8600f77cf1a538ac900673696245b6de4283c979a2eccd71f9583dacf650575d1398678895da32663735b4d0cabfe7e972e59c2b4b4c9c89d0b82ca2267ad5062303e8abcb79600010506702eb912e3957e507aec4e2180699a738f6753509a12282a1d7181887f6c2e03de1da0dfe3b4efbb10e9b59301b4ef8a1d", 0xb5}, {&(0x7f0000000980)="34c30d95766fefbb7bdc40a3242505587bbc8584c2bc2003185f5ce116eea020efa91e2aae1eae2b8e848ac13c3dcedbbbc82adb1e70be8eecedba37be82545f2abda4f0a0e0fd0edd6bd03bb8e9bb91c39a2c828511aef3e684ad4c21ec0c146b9570139e31cd", 0x67}], 0x2) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'macvtap0\x00'}) ioctl$PPPIOCSFLAGS1(0xffffffffffffffff, 0x40047459, &(0x7f00000001c0)) recvmmsg(0xffffffffffffffff, &(0x7f0000002200)=[{{&(0x7f0000000340)=@in={0x2, 0x0, @multicast1}, 0x80, &(0x7f0000000440)=[{&(0x7f00000004c0)=""/88, 0x58}, {&(0x7f0000000b40)=""/4096, 0x1000}], 0x2, &(0x7f0000000740)=""/192, 0xc0}, 0x3}, {{&(0x7f0000000800)=@sco={0x1f, @none}, 0x80, &(0x7f0000000480)=[{&(0x7f0000001b40)=""/82, 0x52}], 0x1, &(0x7f0000001bc0)=""/206, 0xce}, 0x7}, {{&(0x7f0000001cc0)=@in={0x2, 0x0, @broadcast}, 0x80, &(0x7f0000000880)=[{&(0x7f0000001d40)=""/146, 0x92}, {&(0x7f0000001e00)=""/231, 0xe7}], 0x2, &(0x7f0000001f00)=""/239, 0xef}, 0x3}, {{&(0x7f0000002000)=@xdp, 0x80, &(0x7f00000020c0)=[{&(0x7f0000002080)=""/58, 0x3a}], 0x1, &(0x7f0000002100)=""/251, 0xfb}, 0x9}], 0x4, 0x40, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000002380)=ANY=[@ANYBLOB="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", @ANYRESDEC=r0, @ANYBLOB="b21b22b0b59f1a76abb6323c16886f3d2569d595dca4af1ac9160b24b62e47302e148fa17433c275945e36a713e5fad2e8abc9651d17b22d7d092020f73d100115fed606c66c84318df7895b1e5780f3c785bfb92571cf1bc9", @ANYRES32=0x0, @ANYRES32, @ANYRES32=0x0], &(0x7f0000000300)=0x18) r5 = socket(0x1, 0x803, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8936, &(0x7f0000000080)={@rand_addr=' \x01\x00', 0x44, r4}) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) r6 = socket(0x10, 0x8000000803, 0x0) sendmsg$nl_route(r6, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) 18:12:14 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="b4050000000000006110580000000000c60000000000000095000002000000002ac73fe427abdf478e0357f2d32986f50b892b5007921cd48fe43b23be60a2dbc9778bb665510e3e22fcb26adfdc05e55a4933e62a23abb4baca4ec89323257db59db5eeda384459dd00d41b6aab85df5cab39e726769e2291b626d120a9247579f0b8edd8f16683e0623366ac632c24921d21534237743354f09cc29be2f72dfa8b05320110bcea53bb038c"], 0x0, 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x5, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) 18:12:14 executing program 3: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$FS_IOC_RESVSP(r0, 0x402c5828, &(0x7f00000000c0)={0x0, 0x1, 0xa8f, 0x3078}) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x200000000}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x9) preadv(r1, &(0x7f0000000240)=[{&(0x7f0000000040)=""/94, 0x5e}, {&(0x7f00000000c0)=""/93, 0x5d}, {&(0x7f0000000140)=""/58, 0x3a}], 0x3, 0xd9f, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000002340)='./file0\x00', 0x0, 0x108) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000180)={'team0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @local}, 0x14) writev(r2, &(0x7f0000000280)=[{&(0x7f00000008c0)="110eaa1a9896d57019effc8c79961d0f73ccf3afca3754e2e7a31f536bcb7204bed59311e29c96e1c2b663d61e5b0c0a76ea50cbddaa69f578b8600f77cf1a538ac900673696245b6de4283c979a2eccd71f9583dacf650575d1398678895da32663735b4d0cabfe7e972e59c2b4b4c9c89d0b82ca2267ad5062303e8abcb79600010506702eb912e3957e507aec4e2180699a738f6753509a12282a1d7181887f6c2e03de1da0dfe3b4efbb10e9b59301b4ef8a1d", 0xb5}, {&(0x7f0000000980)="34c30d95766fefbb7bdc40a3242505587bbc8584c2bc2003185f5ce116eea020efa91e2aae1eae2b8e848ac13c3dcedbbbc82adb1e70be8eecedba37be82545f2abda4f0a0e0fd0edd6bd03bb8e9bb91c39a2c828511aef3e684ad4c21ec0c146b9570139e31cd", 0x67}], 0x2) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'macvtap0\x00'}) ioctl$PPPIOCSFLAGS1(0xffffffffffffffff, 0x40047459, &(0x7f00000001c0)) recvmmsg(0xffffffffffffffff, &(0x7f0000002200)=[{{&(0x7f0000000340)=@in={0x2, 0x0, @multicast1}, 0x80, &(0x7f0000000440)=[{&(0x7f00000004c0)=""/88, 0x58}, {&(0x7f0000000b40)=""/4096, 0x1000}], 0x2, &(0x7f0000000740)=""/192, 0xc0}, 0x3}, {{&(0x7f0000000800)=@sco={0x1f, @none}, 0x80, &(0x7f0000000480)=[{&(0x7f0000001b40)=""/82, 0x52}], 0x1, &(0x7f0000001bc0)=""/206, 0xce}, 0x7}, {{&(0x7f0000001cc0)=@in={0x2, 0x0, @broadcast}, 0x80, &(0x7f0000000880)=[{&(0x7f0000001d40)=""/146, 0x92}, {&(0x7f0000001e00)=""/231, 0xe7}], 0x2, &(0x7f0000001f00)=""/239, 0xef}, 0x3}, {{&(0x7f0000002000)=@xdp, 0x80, &(0x7f00000020c0)=[{&(0x7f0000002080)=""/58, 0x3a}], 0x1, &(0x7f0000002100)=""/251, 0xfb}, 0x9}], 0x4, 0x40, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000002380)=ANY=[@ANYBLOB="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", @ANYRESDEC=r0, @ANYBLOB="b21b22b0b59f1a76abb6323c16886f3d2569d595dca4af1ac9160b24b62e47302e148fa17433c275945e36a713e5fad2e8abc9651d17b22d7d092020f73d100115fed606c66c84318df7895b1e5780f3c785bfb92571cf1bc9", @ANYRES32=0x0, @ANYRES32, @ANYRES32=0x0], &(0x7f0000000300)=0x18) socket(0x1, 0x803, 0x0) 18:12:14 executing program 5: r0 = syz_io_uring_setup(0x3ede, &(0x7f0000000240), &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) socket$l2tp6(0xa, 0x2, 0x73) openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/locks\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READ=@pass_buffer={0x16, 0x0, 0x0, @fd_index=0x5, 0xffffffffffffffff, &(0x7f0000000040)=""/17, 0x11}, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000002040)=[{{&(0x7f0000001380)=@in6={0xa, 0x0, 0x0, @private0}, 0x80, 0x0}}], 0x1, 0x0) io_uring_enter(r0, 0x26, 0x0, 0x0, 0x0, 0x0) 18:12:14 executing program 1: syz_mount_image$ntfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x2, 0x0, &(0x7f00000000c0), 0x218400, &(0x7f00000013c0)) [ 522.681323][T21238] FAULT_INJECTION: forcing a failure. [ 522.681323][T21238] name failslab, interval 1, probability 0, space 0, times 0 [ 522.761398][T21238] CPU: 1 PID: 21238 Comm: syz-executor.2 Not tainted 5.16.0-rc5-syzkaller #0 [ 522.770244][T21238] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 522.780322][T21238] Call Trace: [ 522.783623][T21238] [ 522.786577][T21238] dump_stack_lvl+0x201/0x2d8 [ 522.791289][T21238] ? show_regs_print_info+0x12/0x12 [ 522.796519][T21238] ? log_buf_vmcoreinfo_setup+0x498/0x498 [ 522.802280][T21238] ? __might_sleep+0xe0/0xe0 [ 522.806994][T21238] should_fail+0x384/0x4b0 [ 522.811442][T21238] ? __alloc_file+0x26/0x2f0 [ 522.816056][T21238] should_failslab+0x5/0x20 [ 522.820725][T21238] kmem_cache_alloc+0x72/0x310 [ 522.825520][T21238] __alloc_file+0x26/0x2f0 [ 522.830916][T21238] ? alloc_empty_file+0x49/0x1b0 [ 522.835853][T21238] alloc_empty_file+0xa9/0x1b0 [ 522.840638][T21238] alloc_file+0x58/0x4f0 [ 522.844903][T21238] alloc_file_pseudo+0x272/0x300 [ 522.849947][T21238] ? alloc_empty_file_noaccount+0x80/0x80 [ 522.855711][T21238] ? shmem_fill_super+0xb50/0xb50 [ 522.860747][T21238] __shmem_file_setup+0x194/0x270 [ 522.865788][T21238] __se_sys_memfd_create+0x1d5/0x460 [ 522.871073][T21238] do_syscall_64+0x44/0xd0 [ 522.875506][T21238] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 522.881415][T21238] RIP: 0033:0x7f3831feee99 [ 522.885826][T21238] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 18:12:14 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="b4050000000000006110580000000000c60000000000000095000002000000002ac73fe427abdf478e0357f2d32986f50b892b5007921cd48fe43b23be60a2dbc9778bb665510e3e22fcb26adfdc05e55a4933e62a23abb4baca4ec89323257db59db5eeda384459dd00d41b6aab85df5cab39e726769e2291b626d120a9247579f0b8edd8f16683e0623366ac632c24921d21534237743354f09cc29be2f72dfa8b05320110bcea53bb038c"], 0x0, 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x5, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) [ 522.905424][T21238] RSP: 002b:00007f3830963f28 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 522.913837][T21238] RAX: ffffffffffffffda RBX: 00000000200000c0 RCX: 00007f3831feee99 [ 522.921827][T21238] RDX: 00007f3830963fe0 RSI: 0000000000000000 RDI: 00007f3832048168 [ 522.929815][T21238] RBP: 0000000000000000 R08: 00007f3830963fd8 R09: 00007f38309641d0 [ 522.937798][T21238] R10: 00007f3830963fdc R11: 0000000000000246 R12: 0000000020000040 [ 522.945771][T21238] R13: 0000000020000080 R14: 0000000000000000 R15: 00000000200013c0 [ 522.953887][T21238] 18:12:14 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="b4050000000000006110580000000000c60000000000000095000002000000002ac73fe427abdf478e0357f2d32986f50b892b5007921cd48fe43b23be60a2dbc9778bb665510e3e22fcb26adfdc05e55a4933e62a23abb4baca4ec89323257db59db5eeda384459dd00d41b6aab85df5cab39e726769e2291b626d120a9247579f0b8edd8f16683e0623366ac632c24921d21534237743354f09cc29be2f72dfa8b05320110bcea53bb038c"], 0x0, 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x5, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) 18:12:14 executing program 0: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$FS_IOC_RESVSP(r0, 0x402c5828, &(0x7f00000000c0)={0x0, 0x1, 0xa8f, 0x3078}) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x200000000}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x9) preadv(r1, &(0x7f0000000240)=[{&(0x7f0000000040)=""/94, 0x5e}, {&(0x7f00000000c0)=""/93, 0x5d}, {&(0x7f0000000140)=""/58, 0x3a}], 0x3, 0xd9f, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000002340)='./file0\x00', 0x0, 0x108) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000180)={'team0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @local}, 0x14) writev(r2, &(0x7f0000000280)=[{&(0x7f00000008c0)="110eaa1a9896d57019effc8c79961d0f73ccf3afca3754e2e7a31f536bcb7204bed59311e29c96e1c2b663d61e5b0c0a76ea50cbddaa69f578b8600f77cf1a538ac900673696245b6de4283c979a2eccd71f9583dacf650575d1398678895da32663735b4d0cabfe7e972e59c2b4b4c9c89d0b82ca2267ad5062303e8abcb79600010506702eb912e3957e507aec4e2180699a738f6753509a12282a1d7181887f6c2e03de1da0dfe3b4efbb10e9b59301b4ef8a1d", 0xb5}, {&(0x7f0000000980)="34c30d95766fefbb7bdc40a3242505587bbc8584c2bc2003185f5ce116eea020efa91e2aae1eae2b8e848ac13c3dcedbbbc82adb1e70be8eecedba37be82545f2abda4f0a0e0fd0edd6bd03bb8e9bb91c39a2c828511aef3e684ad4c21ec0c146b9570139e31cd", 0x67}], 0x2) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'macvtap0\x00'}) ioctl$PPPIOCSFLAGS1(0xffffffffffffffff, 0x40047459, &(0x7f00000001c0)) recvmmsg(0xffffffffffffffff, &(0x7f0000002200)=[{{&(0x7f0000000340)=@in={0x2, 0x0, @multicast1}, 0x80, &(0x7f0000000440)=[{&(0x7f00000004c0)=""/88, 0x58}, {&(0x7f0000000b40)=""/4096, 0x1000}], 0x2, &(0x7f0000000740)=""/192, 0xc0}, 0x3}, {{&(0x7f0000000800)=@sco={0x1f, @none}, 0x80, &(0x7f0000000480)=[{&(0x7f0000001b40)=""/82, 0x52}], 0x1, &(0x7f0000001bc0)=""/206, 0xce}, 0x7}, {{&(0x7f0000001cc0)=@in={0x2, 0x0, @broadcast}, 0x80, &(0x7f0000000880)=[{&(0x7f0000001d40)=""/146, 0x92}, {&(0x7f0000001e00)=""/231, 0xe7}], 0x2, &(0x7f0000001f00)=""/239, 0xef}, 0x3}, {{&(0x7f0000002000)=@xdp, 0x80, &(0x7f00000020c0)=[{&(0x7f0000002080)=""/58, 0x3a}], 0x1, &(0x7f0000002100)=""/251, 0xfb}, 0x9}], 0x4, 0x40, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000002380)=ANY=[@ANYBLOB="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", @ANYRESDEC=r0, @ANYBLOB="b21b22b0b59f1a76abb6323c16886f3d2569d595dca4af1ac9160b24b62e47302e148fa17433c275945e36a713e5fad2e8abc9651d17b22d7d092020f73d100115fed606c66c84318df7895b1e5780f3c785bfb92571cf1bc9", @ANYRES32=0x0, @ANYRES32, @ANYRES32=0x0], &(0x7f0000000300)=0x18) r5 = socket(0x1, 0x803, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8936, &(0x7f0000000080)={@rand_addr=' \x01\x00', 0x44, r4}) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) r6 = socket(0x10, 0x8000000803, 0x0) sendmsg$nl_route(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000000)={0x0}}, 0x0) 18:12:14 executing program 1: syz_mount_image$ntfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x3, 0x0, &(0x7f00000000c0), 0x218400, &(0x7f00000013c0)) 18:12:14 executing program 2: syz_mount_image$ntfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f00000013c0)={[{@fmask}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'syzkaller1\x00'}}]}) (fail_nth: 7) 18:12:14 executing program 5: r0 = syz_io_uring_setup(0x3ede, &(0x7f0000000240), &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) socket$l2tp6(0xa, 0x2, 0x73) openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/locks\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READ=@pass_buffer={0x16, 0x0, 0x0, @fd_index=0x5, 0xffffffffffffffff, &(0x7f0000000040)=""/17, 0x11}, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000002040)=[{{&(0x7f0000001380)=@in6={0xa, 0x0, 0x0, @private0}, 0x80, 0x0}}], 0x1, 0x0) io_uring_enter(r0, 0x2, 0x0, 0x0, 0x0, 0x0) 18:12:14 executing program 3: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$FS_IOC_RESVSP(r0, 0x402c5828, &(0x7f00000000c0)={0x0, 0x1, 0xa8f, 0x3078}) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x200000000}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x9) preadv(r1, &(0x7f0000000240)=[{&(0x7f0000000040)=""/94, 0x5e}, {&(0x7f00000000c0)=""/93, 0x5d}, {&(0x7f0000000140)=""/58, 0x3a}], 0x3, 0xd9f, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000002340)='./file0\x00', 0x0, 0x108) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000180)={'team0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @local}, 0x14) writev(r2, &(0x7f0000000280)=[{&(0x7f00000008c0)="110eaa1a9896d57019effc8c79961d0f73ccf3afca3754e2e7a31f536bcb7204bed59311e29c96e1c2b663d61e5b0c0a76ea50cbddaa69f578b8600f77cf1a538ac900673696245b6de4283c979a2eccd71f9583dacf650575d1398678895da32663735b4d0cabfe7e972e59c2b4b4c9c89d0b82ca2267ad5062303e8abcb79600010506702eb912e3957e507aec4e2180699a738f6753509a12282a1d7181887f6c2e03de1da0dfe3b4efbb10e9b59301b4ef8a1d", 0xb5}, {&(0x7f0000000980)="34c30d95766fefbb7bdc40a3242505587bbc8584c2bc2003185f5ce116eea020efa91e2aae1eae2b8e848ac13c3dcedbbbc82adb1e70be8eecedba37be82545f2abda4f0a0e0fd0edd6bd03bb8e9bb91c39a2c828511aef3e684ad4c21ec0c146b9570139e31cd", 0x67}], 0x2) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'macvtap0\x00'}) ioctl$PPPIOCSFLAGS1(0xffffffffffffffff, 0x40047459, &(0x7f00000001c0)) recvmmsg(0xffffffffffffffff, &(0x7f0000002200)=[{{&(0x7f0000000340)=@in={0x2, 0x0, @multicast1}, 0x80, &(0x7f0000000440)=[{&(0x7f00000004c0)=""/88, 0x58}, {&(0x7f0000000b40)=""/4096, 0x1000}], 0x2, &(0x7f0000000740)=""/192, 0xc0}, 0x3}, {{&(0x7f0000000800)=@sco={0x1f, @none}, 0x80, &(0x7f0000000480)=[{&(0x7f0000001b40)=""/82, 0x52}], 0x1, &(0x7f0000001bc0)=""/206, 0xce}, 0x7}, {{&(0x7f0000001cc0)=@in={0x2, 0x0, @broadcast}, 0x80, &(0x7f0000000880)=[{&(0x7f0000001d40)=""/146, 0x92}, {&(0x7f0000001e00)=""/231, 0xe7}], 0x2, &(0x7f0000001f00)=""/239, 0xef}, 0x3}, {{&(0x7f0000002000)=@xdp, 0x80, &(0x7f00000020c0)=[{&(0x7f0000002080)=""/58, 0x3a}], 0x1, &(0x7f0000002100)=""/251, 0xfb}, 0x9}], 0x4, 0x40, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000002380)=ANY=[@ANYBLOB="050000004f2fe4e7fe91d1f169b7f431831544d94b6dbcca36d501829c64f0c28565fbc3e562e329d779aef804590001804797c4378192536ca659efcf0a6cb16b0ba5b79cfefdc8e93c46dfa0c119d12be6495820cc0b34645475d4da28535803ddcfd16f5df589e2f1ac230118eafd75a63c016b3a1663bc141e5ed84016b6b02854a48c0ec71a36a1ad145c5d2216e964a34cdf686b0a089443bd0f8c210860754d133e2c97ce8a25ee4d4eb5abb779387ca2cd9e870d5cb5854616c65c24f259eeaa625432fa25dd2832dc14f9a78ebf3a24277da2b55d09ed6a1dca07d4fb9ed592a64782b6939500505805d12b2776980c4b250f17b0b9a8fda266d7f084a9cd1022d2d670f793298bcf83b9a25e4ae25ac23ce06ef88068108ec131b23695772064709b1dbee85e5c2a0c4cf809dbd8b5617f8c6f6fba013f019829c83bd4cf10be5c6da663ce7cbf9b19ebd88bedb114ec207599273b55ec5f4cd35914f897ee8afc7663255678f6853e5cfa0dfa079ba560c7ddbc56e6352397b7266ac906a0ce0fb810eb00000000000000000000000000000000000000000000000000c54baf95f669d6810040c457be8ca739b4ec785f005bb4faa01270b999b6c9899cd9e8997d359b77c00a68341ca40b4c0e06884b6384ef6e", @ANYRESDEC=r0, @ANYBLOB="b21b22b0b59f1a76abb6323c16886f3d2569d595dca4af1ac9160b24b62e47302e148fa17433c275945e36a713e5fad2e8abc9651d17b22d7d092020f73d100115fed606c66c84318df7895b1e5780f3c785bfb92571cf1bc9", @ANYRES32=0x0, @ANYRES32, @ANYRES32=0x0], &(0x7f0000000300)=0x18) socket(0x1, 0x803, 0x0) 18:12:14 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="b4050000000000006110580000000000c60000000000000095000002000000002ac73fe427abdf478e0357f2d32986f50b892b5007921cd48fe43b23be60a2dbc9778bb665510e3e22fcb26adfdc05e55a4933e62a23abb4baca4ec89323257db59db5eeda384459dd00d41b6aab85df5cab39e726769e2291b626d120a9247579f0b8edd8f16683e0623366ac632c24921d21534237743354f09cc29be2f72dfa8b05320110bcea53bb038c"], &(0x7f0000003ff6)='GPL\x00', 0x0, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x5, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) [ 523.142624][T21260] FAULT_INJECTION: forcing a failure. [ 523.142624][T21260] name failslab, interval 1, probability 0, space 0, times 0 [ 523.182411][T21260] CPU: 1 PID: 21260 Comm: syz-executor.2 Not tainted 5.16.0-rc5-syzkaller #0 [ 523.191218][T21260] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 523.201291][T21260] Call Trace: [ 523.204593][T21260] [ 523.207541][T21260] dump_stack_lvl+0x201/0x2d8 [ 523.212250][T21260] ? show_regs_print_info+0x12/0x12 [ 523.217476][T21260] ? log_buf_vmcoreinfo_setup+0x498/0x498 [ 523.223221][T21260] ? __might_sleep+0xe0/0xe0 [ 523.227852][T21260] should_fail+0x384/0x4b0 [ 523.232293][T21260] ? security_file_alloc+0x32/0x1f0 [ 523.237516][T21260] should_failslab+0x5/0x20 [ 523.242040][T21260] kmem_cache_alloc+0x72/0x310 [ 523.246826][T21260] security_file_alloc+0x32/0x1f0 [ 523.251873][T21260] __alloc_file+0xca/0x2f0 [ 523.256312][T21260] alloc_empty_file+0xa9/0x1b0 [ 523.261200][T21260] alloc_file+0x58/0x4f0 [ 523.265468][T21260] alloc_file_pseudo+0x272/0x300 [ 523.270519][T21260] ? alloc_empty_file_noaccount+0x80/0x80 [ 523.276434][T21260] ? shmem_fill_super+0xb50/0xb50 [ 523.281492][T21260] __shmem_file_setup+0x194/0x270 [ 523.286639][T21260] __se_sys_memfd_create+0x1d5/0x460 [ 523.291949][T21260] do_syscall_64+0x44/0xd0 [ 523.296648][T21260] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 523.302555][T21260] RIP: 0033:0x7f3831feee99 [ 523.306992][T21260] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 523.326613][T21260] RSP: 002b:00007f3830963f28 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 523.335046][T21260] RAX: ffffffffffffffda RBX: 00000000200000c0 RCX: 00007f3831feee99 18:12:14 executing program 0: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$FS_IOC_RESVSP(r0, 0x402c5828, &(0x7f00000000c0)={0x0, 0x1, 0xa8f, 0x3078}) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x200000000}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x9) preadv(r1, &(0x7f0000000240)=[{&(0x7f0000000040)=""/94, 0x5e}, {&(0x7f00000000c0)=""/93, 0x5d}, {&(0x7f0000000140)=""/58, 0x3a}], 0x3, 0xd9f, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000002340)='./file0\x00', 0x0, 0x108) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000180)={'team0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @local}, 0x14) writev(r2, &(0x7f0000000280)=[{&(0x7f00000008c0)="110eaa1a9896d57019effc8c79961d0f73ccf3afca3754e2e7a31f536bcb7204bed59311e29c96e1c2b663d61e5b0c0a76ea50cbddaa69f578b8600f77cf1a538ac900673696245b6de4283c979a2eccd71f9583dacf650575d1398678895da32663735b4d0cabfe7e972e59c2b4b4c9c89d0b82ca2267ad5062303e8abcb79600010506702eb912e3957e507aec4e2180699a738f6753509a12282a1d7181887f6c2e03de1da0dfe3b4efbb10e9b59301b4ef8a1d", 0xb5}, {&(0x7f0000000980)="34c30d95766fefbb7bdc40a3242505587bbc8584c2bc2003185f5ce116eea020efa91e2aae1eae2b8e848ac13c3dcedbbbc82adb1e70be8eecedba37be82545f2abda4f0a0e0fd0edd6bd03bb8e9bb91c39a2c828511aef3e684ad4c21ec0c146b9570139e31cd", 0x67}], 0x2) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'macvtap0\x00'}) ioctl$PPPIOCSFLAGS1(0xffffffffffffffff, 0x40047459, &(0x7f00000001c0)) recvmmsg(0xffffffffffffffff, &(0x7f0000002200)=[{{&(0x7f0000000340)=@in={0x2, 0x0, @multicast1}, 0x80, &(0x7f0000000440)=[{&(0x7f00000004c0)=""/88, 0x58}, {&(0x7f0000000b40)=""/4096, 0x1000}], 0x2, &(0x7f0000000740)=""/192, 0xc0}, 0x3}, {{&(0x7f0000000800)=@sco={0x1f, @none}, 0x80, &(0x7f0000000480)=[{&(0x7f0000001b40)=""/82, 0x52}], 0x1, &(0x7f0000001bc0)=""/206, 0xce}, 0x7}, {{&(0x7f0000001cc0)=@in={0x2, 0x0, @broadcast}, 0x80, &(0x7f0000000880)=[{&(0x7f0000001d40)=""/146, 0x92}, {&(0x7f0000001e00)=""/231, 0xe7}], 0x2, &(0x7f0000001f00)=""/239, 0xef}, 0x3}, {{&(0x7f0000002000)=@xdp, 0x80, &(0x7f00000020c0)=[{&(0x7f0000002080)=""/58, 0x3a}], 0x1, &(0x7f0000002100)=""/251, 0xfb}, 0x9}], 0x4, 0x40, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000002380)=ANY=[@ANYBLOB="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", @ANYRESDEC=r0, @ANYBLOB="b21b22b0b59f1a76abb6323c16886f3d2569d595dca4af1ac9160b24b62e47302e148fa17433c275945e36a713e5fad2e8abc9651d17b22d7d092020f73d100115fed606c66c84318df7895b1e5780f3c785bfb92571cf1bc9", @ANYRES32=0x0, @ANYRES32, @ANYRES32=0x0], &(0x7f0000000300)=0x18) r5 = socket(0x1, 0x803, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8936, &(0x7f0000000080)={@rand_addr=' \x01\x00', 0x44, r4}) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) r6 = socket(0x10, 0x8000000803, 0x0) sendmsg$nl_route(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000000)={0x0}}, 0x0) 18:12:14 executing program 5: r0 = syz_io_uring_setup(0x3ede, &(0x7f0000000240), &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) socket$l2tp6(0xa, 0x2, 0x73) openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/locks\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READ=@pass_buffer={0x16, 0x0, 0x0, @fd_index=0x5, 0xffffffffffffffff, &(0x7f0000000040)=""/17, 0x11}, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000002040)=[{{&(0x7f0000001380)=@in6={0xa, 0x0, 0x0, @private0}, 0x80, 0x0}}], 0x1, 0x0) io_uring_enter(r0, 0x3, 0x0, 0x0, 0x0, 0x0) 18:12:14 executing program 5: r0 = syz_io_uring_setup(0x3ede, &(0x7f0000000240), &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) socket$l2tp6(0xa, 0x2, 0x73) openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/locks\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READ=@pass_buffer={0x16, 0x0, 0x0, @fd_index=0x5, 0xffffffffffffffff, &(0x7f0000000040)=""/17, 0x11}, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000002040)=[{{&(0x7f0000001380)=@in6={0xa, 0x0, 0x0, @private0}, 0x80, 0x0}}], 0x1, 0x0) io_uring_enter(r0, 0x4, 0x0, 0x0, 0x0, 0x0) 18:12:14 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="b4050000000000006110580000000000c60000000000000095000002000000002ac73fe427abdf478e0357f2d32986f50b892b5007921cd48fe43b23be60a2dbc9778bb665510e3e22fcb26adfdc05e55a4933e62a23abb4baca4ec89323257db59db5eeda384459dd00d41b6aab85df5cab39e726769e2291b626d120a9247579f0b8edd8f16683e0623366ac632c24921d21534237743354f09cc29be2f72dfa8b05320110bcea53bb038c"], &(0x7f0000003ff6)='GPL\x00', 0x0, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x5, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) [ 523.343036][T21260] RDX: 00007f3830963fe0 RSI: 0000000000000000 RDI: 00007f3832048168 [ 523.351033][T21260] RBP: 0000000000000000 R08: 00007f3830963fd8 R09: 00007f38309641d0 [ 523.359030][T21260] R10: 00007f3830963fdc R11: 0000000000000246 R12: 0000000020000040 [ 523.367024][T21260] R13: 0000000020000080 R14: 0000000000000000 R15: 00000000200013c0 [ 523.375037][T21260] 18:12:14 executing program 3: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$FS_IOC_RESVSP(r0, 0x402c5828, &(0x7f00000000c0)={0x0, 0x1, 0xa8f, 0x3078}) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x200000000}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x9) preadv(r1, &(0x7f0000000240)=[{&(0x7f0000000040)=""/94, 0x5e}, {&(0x7f00000000c0)=""/93, 0x5d}, {&(0x7f0000000140)=""/58, 0x3a}], 0x3, 0xd9f, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000002340)='./file0\x00', 0x0, 0x108) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000180)={'team0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @local}, 0x14) writev(r2, &(0x7f0000000280)=[{&(0x7f00000008c0)="110eaa1a9896d57019effc8c79961d0f73ccf3afca3754e2e7a31f536bcb7204bed59311e29c96e1c2b663d61e5b0c0a76ea50cbddaa69f578b8600f77cf1a538ac900673696245b6de4283c979a2eccd71f9583dacf650575d1398678895da32663735b4d0cabfe7e972e59c2b4b4c9c89d0b82ca2267ad5062303e8abcb79600010506702eb912e3957e507aec4e2180699a738f6753509a12282a1d7181887f6c2e03de1da0dfe3b4efbb10e9b59301b4ef8a1d", 0xb5}, {&(0x7f0000000980)="34c30d95766fefbb7bdc40a3242505587bbc8584c2bc2003185f5ce116eea020efa91e2aae1eae2b8e848ac13c3dcedbbbc82adb1e70be8eecedba37be82545f2abda4f0a0e0fd0edd6bd03bb8e9bb91c39a2c828511aef3e684ad4c21ec0c146b9570139e31cd", 0x67}], 0x2) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'macvtap0\x00'}) ioctl$PPPIOCSFLAGS1(0xffffffffffffffff, 0x40047459, &(0x7f00000001c0)) recvmmsg(0xffffffffffffffff, &(0x7f0000002200)=[{{&(0x7f0000000340)=@in={0x2, 0x0, @multicast1}, 0x80, &(0x7f0000000440)=[{&(0x7f00000004c0)=""/88, 0x58}, {&(0x7f0000000b40)=""/4096, 0x1000}], 0x2, &(0x7f0000000740)=""/192, 0xc0}, 0x3}, {{&(0x7f0000000800)=@sco={0x1f, @none}, 0x80, &(0x7f0000000480)=[{&(0x7f0000001b40)=""/82, 0x52}], 0x1, &(0x7f0000001bc0)=""/206, 0xce}, 0x7}, {{&(0x7f0000001cc0)=@in={0x2, 0x0, @broadcast}, 0x80, &(0x7f0000000880)=[{&(0x7f0000001d40)=""/146, 0x92}, {&(0x7f0000001e00)=""/231, 0xe7}], 0x2, &(0x7f0000001f00)=""/239, 0xef}, 0x3}, {{&(0x7f0000002000)=@xdp, 0x80, &(0x7f00000020c0)=[{&(0x7f0000002080)=""/58, 0x3a}], 0x1, &(0x7f0000002100)=""/251, 0xfb}, 0x9}], 0x4, 0x40, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000002380)=ANY=[@ANYBLOB="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", @ANYRESDEC=r0, @ANYBLOB="b21b22b0b59f1a76abb6323c16886f3d2569d595dca4af1ac9160b24b62e47302e148fa17433c275945e36a713e5fad2e8abc9651d17b22d7d092020f73d100115fed606c66c84318df7895b1e5780f3c785bfb92571cf1bc9", @ANYRES32=0x0, @ANYRES32, @ANYRES32=0x0], &(0x7f0000000300)=0x18) 18:12:14 executing program 1: syz_mount_image$ntfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x4, 0x0, &(0x7f00000000c0), 0x218400, &(0x7f00000013c0)) 18:12:14 executing program 0: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$FS_IOC_RESVSP(r0, 0x402c5828, &(0x7f00000000c0)={0x0, 0x1, 0xa8f, 0x3078}) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x200000000}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x9) preadv(r1, &(0x7f0000000240)=[{&(0x7f0000000040)=""/94, 0x5e}, {&(0x7f00000000c0)=""/93, 0x5d}, {&(0x7f0000000140)=""/58, 0x3a}], 0x3, 0xd9f, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000002340)='./file0\x00', 0x0, 0x108) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000180)={'team0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @local}, 0x14) writev(r2, &(0x7f0000000280)=[{&(0x7f00000008c0)="110eaa1a9896d57019effc8c79961d0f73ccf3afca3754e2e7a31f536bcb7204bed59311e29c96e1c2b663d61e5b0c0a76ea50cbddaa69f578b8600f77cf1a538ac900673696245b6de4283c979a2eccd71f9583dacf650575d1398678895da32663735b4d0cabfe7e972e59c2b4b4c9c89d0b82ca2267ad5062303e8abcb79600010506702eb912e3957e507aec4e2180699a738f6753509a12282a1d7181887f6c2e03de1da0dfe3b4efbb10e9b59301b4ef8a1d", 0xb5}, {&(0x7f0000000980)="34c30d95766fefbb7bdc40a3242505587bbc8584c2bc2003185f5ce116eea020efa91e2aae1eae2b8e848ac13c3dcedbbbc82adb1e70be8eecedba37be82545f2abda4f0a0e0fd0edd6bd03bb8e9bb91c39a2c828511aef3e684ad4c21ec0c146b9570139e31cd", 0x67}], 0x2) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'macvtap0\x00'}) ioctl$PPPIOCSFLAGS1(0xffffffffffffffff, 0x40047459, &(0x7f00000001c0)) recvmmsg(0xffffffffffffffff, &(0x7f0000002200)=[{{&(0x7f0000000340)=@in={0x2, 0x0, @multicast1}, 0x80, &(0x7f0000000440)=[{&(0x7f00000004c0)=""/88, 0x58}, {&(0x7f0000000b40)=""/4096, 0x1000}], 0x2, &(0x7f0000000740)=""/192, 0xc0}, 0x3}, {{&(0x7f0000000800)=@sco={0x1f, @none}, 0x80, &(0x7f0000000480)=[{&(0x7f0000001b40)=""/82, 0x52}], 0x1, &(0x7f0000001bc0)=""/206, 0xce}, 0x7}, {{&(0x7f0000001cc0)=@in={0x2, 0x0, @broadcast}, 0x80, &(0x7f0000000880)=[{&(0x7f0000001d40)=""/146, 0x92}, {&(0x7f0000001e00)=""/231, 0xe7}], 0x2, &(0x7f0000001f00)=""/239, 0xef}, 0x3}, {{&(0x7f0000002000)=@xdp, 0x80, &(0x7f00000020c0)=[{&(0x7f0000002080)=""/58, 0x3a}], 0x1, &(0x7f0000002100)=""/251, 0xfb}, 0x9}], 0x4, 0x40, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000002380)=ANY=[@ANYBLOB="050000004f2fe4e7fe91d1f169b7f431831544d94b6dbcca36d501829c64f0c28565fbc3e562e329d779aef804590001804797c4378192536ca659efcf0a6cb16b0ba5b79cfefdc8e93c46dfa0c119d12be6495820cc0b34645475d4da28535803ddcfd16f5df589e2f1ac230118eafd75a63c016b3a1663bc141e5ed84016b6b02854a48c0ec71a36a1ad145c5d2216e964a34cdf686b0a089443bd0f8c210860754d133e2c97ce8a25ee4d4eb5abb779387ca2cd9e870d5cb5854616c65c24f259eeaa625432fa25dd2832dc14f9a78ebf3a24277da2b55d09ed6a1dca07d4fb9ed592a64782b6939500505805d12b2776980c4b250f17b0b9a8fda266d7f084a9cd1022d2d670f793298bcf83b9a25e4ae25ac23ce06ef88068108ec131b23695772064709b1dbee85e5c2a0c4cf809dbd8b5617f8c6f6fba013f019829c83bd4cf10be5c6da663ce7cbf9b19ebd88bedb114ec207599273b55ec5f4cd35914f897ee8afc7663255678f6853e5cfa0dfa079ba560c7ddbc56e6352397b7266ac906a0ce0fb810eb00000000000000000000000000000000000000000000000000c54baf95f669d6810040c457be8ca739b4ec785f005bb4faa01270b999b6c9899cd9e8997d359b77c00a68341ca40b4c0e06884b6384ef6e", @ANYRESDEC=r0, @ANYBLOB="b21b22b0b59f1a76abb6323c16886f3d2569d595dca4af1ac9160b24b62e47302e148fa17433c275945e36a713e5fad2e8abc9651d17b22d7d092020f73d100115fed606c66c84318df7895b1e5780f3c785bfb92571cf1bc9", @ANYRES32=0x0, @ANYRES32, @ANYRES32=0x0], &(0x7f0000000300)=0x18) r5 = socket(0x1, 0x803, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8936, &(0x7f0000000080)={@rand_addr=' \x01\x00', 0x44, r4}) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) r6 = socket(0x10, 0x8000000803, 0x0) sendmsg$nl_route(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000000)={0x0}}, 0x0) 18:12:15 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="b4050000000000006110580000000000c60000000000000095000002000000002ac73fe427abdf478e0357f2d32986f50b892b5007921cd48fe43b23be60a2dbc9778bb665510e3e22fcb26adfdc05e55a4933e62a23abb4baca4ec89323257db59db5eeda384459dd00d41b6aab85df5cab39e726769e2291b626d120a9247579f0b8edd8f16683e0623366ac632c24921d21534237743354f09cc29be2f72dfa8b05320110bcea53bb038c"], &(0x7f0000003ff6)='GPL\x00', 0x0, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x5, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) 18:12:15 executing program 2: syz_mount_image$ntfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f00000013c0)={[{@fmask}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'syzkaller1\x00'}}]}) (fail_nth: 8) 18:12:15 executing program 5: r0 = syz_io_uring_setup(0x3ede, &(0x7f0000000240), &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) socket$l2tp6(0xa, 0x2, 0x73) openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/locks\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READ=@pass_buffer={0x16, 0x0, 0x0, @fd_index=0x5, 0xffffffffffffffff, &(0x7f0000000040)=""/17, 0x11}, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000002040)=[{{&(0x7f0000001380)=@in6={0xa, 0x0, 0x0, @private0}, 0x80, 0x0}}], 0x1, 0x0) io_uring_enter(r0, 0x5, 0x0, 0x0, 0x0, 0x0) 18:12:15 executing program 1: syz_mount_image$ntfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x5, 0x0, &(0x7f00000000c0), 0x218400, &(0x7f00000013c0)) 18:12:15 executing program 0: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$FS_IOC_RESVSP(r0, 0x402c5828, &(0x7f00000000c0)={0x0, 0x1, 0xa8f, 0x3078}) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x200000000}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x9) preadv(r1, &(0x7f0000000240)=[{&(0x7f0000000040)=""/94, 0x5e}, {&(0x7f00000000c0)=""/93, 0x5d}, {&(0x7f0000000140)=""/58, 0x3a}], 0x3, 0xd9f, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000002340)='./file0\x00', 0x0, 0x108) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000180)={'team0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @local}, 0x14) writev(r2, &(0x7f0000000280)=[{&(0x7f00000008c0)="110eaa1a9896d57019effc8c79961d0f73ccf3afca3754e2e7a31f536bcb7204bed59311e29c96e1c2b663d61e5b0c0a76ea50cbddaa69f578b8600f77cf1a538ac900673696245b6de4283c979a2eccd71f9583dacf650575d1398678895da32663735b4d0cabfe7e972e59c2b4b4c9c89d0b82ca2267ad5062303e8abcb79600010506702eb912e3957e507aec4e2180699a738f6753509a12282a1d7181887f6c2e03de1da0dfe3b4efbb10e9b59301b4ef8a1d", 0xb5}, {&(0x7f0000000980)="34c30d95766fefbb7bdc40a3242505587bbc8584c2bc2003185f5ce116eea020efa91e2aae1eae2b8e848ac13c3dcedbbbc82adb1e70be8eecedba37be82545f2abda4f0a0e0fd0edd6bd03bb8e9bb91c39a2c828511aef3e684ad4c21ec0c146b9570139e31cd", 0x67}], 0x2) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'macvtap0\x00'}) ioctl$PPPIOCSFLAGS1(0xffffffffffffffff, 0x40047459, &(0x7f00000001c0)) recvmmsg(0xffffffffffffffff, &(0x7f0000002200)=[{{&(0x7f0000000340)=@in={0x2, 0x0, @multicast1}, 0x80, &(0x7f0000000440)=[{&(0x7f00000004c0)=""/88, 0x58}, {&(0x7f0000000b40)=""/4096, 0x1000}], 0x2, &(0x7f0000000740)=""/192, 0xc0}, 0x3}, {{&(0x7f0000000800)=@sco={0x1f, @none}, 0x80, &(0x7f0000000480)=[{&(0x7f0000001b40)=""/82, 0x52}], 0x1, &(0x7f0000001bc0)=""/206, 0xce}, 0x7}, {{&(0x7f0000001cc0)=@in={0x2, 0x0, @broadcast}, 0x80, &(0x7f0000000880)=[{&(0x7f0000001d40)=""/146, 0x92}, {&(0x7f0000001e00)=""/231, 0xe7}], 0x2, &(0x7f0000001f00)=""/239, 0xef}, 0x3}, {{&(0x7f0000002000)=@xdp, 0x80, &(0x7f00000020c0)=[{&(0x7f0000002080)=""/58, 0x3a}], 0x1, &(0x7f0000002100)=""/251, 0xfb}, 0x9}], 0x4, 0x40, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000002380)=ANY=[@ANYBLOB="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", @ANYRESDEC=r0, @ANYBLOB="b21b22b0b59f1a76abb6323c16886f3d2569d595dca4af1ac9160b24b62e47302e148fa17433c275945e36a713e5fad2e8abc9651d17b22d7d092020f73d100115fed606c66c84318df7895b1e5780f3c785bfb92571cf1bc9", @ANYRES32=0x0, @ANYRES32, @ANYRES32=0x0], &(0x7f0000000300)=0x18) r5 = socket(0x1, 0x803, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8936, &(0x7f0000000080)={@rand_addr=' \x01\x00', 0x44, r4}) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) r7 = socket(0x10, 0x8000000803, 0x0) sendmsg$nl_route(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000a00)=@newlink={0x7c, 0x10, 0x0, 0x3001, 0x25dfdbfc, {0x0, 0x0, 0x0, 0x0, 0x534ad, 0x42a03}, [@IFLA_LINKINFO={0x4c, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x3c, 0x2, 0x0, 0x1, [@IFLA_IPVLAN_MODE={0x6, 0x1, 0x2}, @IFLA_IPVLAN_FLAGS={0x6, 0x2, 0x2}, @IFLA_IPVLAN_FLAGS={0x6, 0x2, 0x1}, @IFLA_IPVLAN_FLAGS={0x6, 0x2, 0x2}, @IFLA_IPVLAN_FLAGS={0x6, 0x2, 0x3}, @IFLA_IPVLAN_MODE={0x6}, @IFLA_IPVLAN_FLAGS={0x6, 0x2, 0x2}]}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x7c}}, 0x0) 18:12:15 executing program 3: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$FS_IOC_RESVSP(r0, 0x402c5828, &(0x7f00000000c0)={0x0, 0x1, 0xa8f, 0x3078}) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x200000000}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x9) preadv(r1, &(0x7f0000000240)=[{&(0x7f0000000040)=""/94, 0x5e}, {&(0x7f00000000c0)=""/93, 0x5d}, {&(0x7f0000000140)=""/58, 0x3a}], 0x3, 0xd9f, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000002340)='./file0\x00', 0x0, 0x108) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000180)={'team0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @local}, 0x14) writev(r2, &(0x7f0000000280)=[{&(0x7f00000008c0)="110eaa1a9896d57019effc8c79961d0f73ccf3afca3754e2e7a31f536bcb7204bed59311e29c96e1c2b663d61e5b0c0a76ea50cbddaa69f578b8600f77cf1a538ac900673696245b6de4283c979a2eccd71f9583dacf650575d1398678895da32663735b4d0cabfe7e972e59c2b4b4c9c89d0b82ca2267ad5062303e8abcb79600010506702eb912e3957e507aec4e2180699a738f6753509a12282a1d7181887f6c2e03de1da0dfe3b4efbb10e9b59301b4ef8a1d", 0xb5}, {&(0x7f0000000980)="34c30d95766fefbb7bdc40a3242505587bbc8584c2bc2003185f5ce116eea020efa91e2aae1eae2b8e848ac13c3dcedbbbc82adb1e70be8eecedba37be82545f2abda4f0a0e0fd0edd6bd03bb8e9bb91c39a2c828511aef3e684ad4c21ec0c146b9570139e31cd", 0x67}], 0x2) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'macvtap0\x00'}) ioctl$PPPIOCSFLAGS1(0xffffffffffffffff, 0x40047459, &(0x7f00000001c0)) recvmmsg(0xffffffffffffffff, &(0x7f0000002200)=[{{&(0x7f0000000340)=@in={0x2, 0x0, @multicast1}, 0x80, &(0x7f0000000440)=[{&(0x7f00000004c0)=""/88, 0x58}, {&(0x7f0000000b40)=""/4096, 0x1000}], 0x2, &(0x7f0000000740)=""/192, 0xc0}, 0x3}, {{&(0x7f0000000800)=@sco={0x1f, @none}, 0x80, &(0x7f0000000480)=[{&(0x7f0000001b40)=""/82, 0x52}], 0x1, &(0x7f0000001bc0)=""/206, 0xce}, 0x7}, {{&(0x7f0000001cc0)=@in={0x2, 0x0, @broadcast}, 0x80, &(0x7f0000000880)=[{&(0x7f0000001d40)=""/146, 0x92}, {&(0x7f0000001e00)=""/231, 0xe7}], 0x2, &(0x7f0000001f00)=""/239, 0xef}, 0x3}, {{&(0x7f0000002000)=@xdp, 0x80, &(0x7f00000020c0)=[{&(0x7f0000002080)=""/58, 0x3a}], 0x1, &(0x7f0000002100)=""/251, 0xfb}, 0x9}], 0x4, 0x40, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000002380)=ANY=[@ANYBLOB="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", @ANYRESDEC=r0, @ANYBLOB="b21b22b0b59f1a76abb6323c16886f3d2569d595dca4af1ac9160b24b62e47302e148fa17433c275945e36a713e5fad2e8abc9651d17b22d7d092020f73d100115fed606c66c84318df7895b1e5780f3c785bfb92571cf1bc9", @ANYRES32=0x0, @ANYRES32, @ANYRES32=0x0], &(0x7f0000000300)=0x18) 18:12:15 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="b4050000000000006110580000000000c60000000000000095000002000000002ac73fe427abdf478e0357f2d32986f50b892b5007921cd48fe43b23be60a2dbc9778bb665510e3e22fcb26adfdc05e55a4933e62a23abb4baca4ec89323257db59db5eeda384459dd00d41b6aab85df5cab39e726769e2291b626d120a9247579f0b8edd8f16683e0623366ac632c24921d21534237743354f09cc29be2f72dfa8b05320110bcea53bb038c"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x5, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) [ 523.647004][T21286] FAULT_INJECTION: forcing a failure. [ 523.647004][T21286] name failslab, interval 1, probability 0, space 0, times 0 [ 523.731497][T21286] CPU: 0 PID: 21286 Comm: syz-executor.2 Not tainted 5.16.0-rc5-syzkaller #0 [ 523.740310][T21286] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 523.750367][T21286] Call Trace: [ 523.753638][T21286] [ 523.756563][T21286] dump_stack_lvl+0x201/0x2d8 [ 523.761245][T21286] ? show_regs_print_info+0x12/0x12 [ 523.766439][T21286] ? log_buf_vmcoreinfo_setup+0x498/0x498 [ 523.772154][T21286] ? __might_sleep+0xe0/0xe0 [ 523.776827][T21286] ? rcu_read_lock_sched_held+0x89/0x130 [ 523.782461][T21286] should_fail+0x384/0x4b0 [ 523.786875][T21286] ? tomoyo_realpath_from_path+0xd8/0x610 [ 523.792584][T21286] should_failslab+0x5/0x20 [ 523.797077][T21286] __kmalloc+0x94/0x380 [ 523.801226][T21286] ? kfree+0x2f/0x330 [ 523.805208][T21286] tomoyo_realpath_from_path+0xd8/0x610 [ 523.810755][T21286] tomoyo_path_perm+0x238/0x660 [ 523.815610][T21286] ? tomoyo_path_permission+0x370/0x370 [ 523.821186][T21286] ? rcu_read_lock_any_held+0xb3/0x150 [ 523.826636][T21286] ? rcu_read_lock_bh_held+0x110/0x110 [ 523.832091][T21286] security_path_truncate+0xc0/0x140 [ 523.837371][T21286] do_sys_ftruncate+0x301/0x590 [ 523.842220][T21286] ? __x64_compat_sys_truncate+0x1c0/0x1c0 [ 523.848029][T21286] ? print_irqtrace_events+0x220/0x220 [ 523.853480][T21286] ? vtime_user_exit+0x2b2/0x3e0 [ 523.858413][T21286] ? syscall_enter_from_user_mode+0x2e/0x1b0 [ 523.864385][T21286] ? lockdep_hardirqs_on+0x95/0x140 [ 523.869574][T21286] ? syscall_enter_from_user_mode+0x2e/0x1b0 [ 523.875544][T21286] do_syscall_64+0x44/0xd0 [ 523.879956][T21286] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 523.885844][T21286] RIP: 0033:0x7f3831feee57 [ 523.890251][T21286] Code: 48 89 e7 e8 cb e5 ff ff 48 8b 4c 24 18 64 48 2b 0c 25 28 00 00 00 75 05 48 83 c4 28 c3 e8 21 1a 00 00 90 b8 4d 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 01 c3 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 [ 523.909856][T21286] RSP: 002b:00007f3830963f28 EFLAGS: 00000217 ORIG_RAX: 000000000000004d [ 523.918295][T21286] RAX: ffffffffffffffda RBX: 00000000200000c0 RCX: 00007f3831feee57 18:12:15 executing program 5: r0 = syz_io_uring_setup(0x3ede, &(0x7f0000000240), &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) socket$l2tp6(0xa, 0x2, 0x73) openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/locks\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READ=@pass_buffer={0x16, 0x0, 0x0, @fd_index=0x5, 0xffffffffffffffff, &(0x7f0000000040)=""/17, 0x11}, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000002040)=[{{&(0x7f0000001380)=@in6={0xa, 0x0, 0x0, @private0}, 0x80, 0x0}}], 0x1, 0x0) io_uring_enter(r0, 0x6, 0x0, 0x0, 0x0, 0x0) [ 523.926273][T21286] RDX: 00007f3830963fe0 RSI: 0000000000000000 RDI: 0000000000000004 [ 523.934255][T21286] RBP: 0000000000000000 R08: 00007f3830963fd8 R09: 00007f38309641d0 [ 523.942277][T21286] R10: 00007f3830963fdc R11: 0000000000000217 R12: 0000000000000004 [ 523.950271][T21286] R13: 0000000000000004 R14: 0000000000000000 R15: 00000000200013c0 [ 523.958268][T21286] 18:12:15 executing program 3: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$FS_IOC_RESVSP(r0, 0x402c5828, &(0x7f00000000c0)={0x0, 0x1, 0xa8f, 0x3078}) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x200000000}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x9) preadv(r1, &(0x7f0000000240)=[{&(0x7f0000000040)=""/94, 0x5e}, {&(0x7f00000000c0)=""/93, 0x5d}, {&(0x7f0000000140)=""/58, 0x3a}], 0x3, 0xd9f, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000002340)='./file0\x00', 0x0, 0x108) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000180)={'team0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @local}, 0x14) writev(r2, &(0x7f0000000280)=[{&(0x7f00000008c0)="110eaa1a9896d57019effc8c79961d0f73ccf3afca3754e2e7a31f536bcb7204bed59311e29c96e1c2b663d61e5b0c0a76ea50cbddaa69f578b8600f77cf1a538ac900673696245b6de4283c979a2eccd71f9583dacf650575d1398678895da32663735b4d0cabfe7e972e59c2b4b4c9c89d0b82ca2267ad5062303e8abcb79600010506702eb912e3957e507aec4e2180699a738f6753509a12282a1d7181887f6c2e03de1da0dfe3b4efbb10e9b59301b4ef8a1d", 0xb5}, {&(0x7f0000000980)="34c30d95766fefbb7bdc40a3242505587bbc8584c2bc2003185f5ce116eea020efa91e2aae1eae2b8e848ac13c3dcedbbbc82adb1e70be8eecedba37be82545f2abda4f0a0e0fd0edd6bd03bb8e9bb91c39a2c828511aef3e684ad4c21ec0c146b9570139e31cd", 0x67}], 0x2) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'macvtap0\x00'}) ioctl$PPPIOCSFLAGS1(0xffffffffffffffff, 0x40047459, &(0x7f00000001c0)) recvmmsg(0xffffffffffffffff, &(0x7f0000002200)=[{{&(0x7f0000000340)=@in={0x2, 0x0, @multicast1}, 0x80, &(0x7f0000000440)=[{&(0x7f00000004c0)=""/88, 0x58}, {&(0x7f0000000b40)=""/4096, 0x1000}], 0x2, &(0x7f0000000740)=""/192, 0xc0}, 0x3}, {{&(0x7f0000000800)=@sco={0x1f, @none}, 0x80, &(0x7f0000000480)=[{&(0x7f0000001b40)=""/82, 0x52}], 0x1, &(0x7f0000001bc0)=""/206, 0xce}, 0x7}, {{&(0x7f0000001cc0)=@in={0x2, 0x0, @broadcast}, 0x80, &(0x7f0000000880)=[{&(0x7f0000001d40)=""/146, 0x92}, {&(0x7f0000001e00)=""/231, 0xe7}], 0x2, &(0x7f0000001f00)=""/239, 0xef}, 0x3}, {{&(0x7f0000002000)=@xdp, 0x80, &(0x7f00000020c0)=[{&(0x7f0000002080)=""/58, 0x3a}], 0x1, &(0x7f0000002100)=""/251, 0xfb}, 0x9}], 0x4, 0x40, 0x0) 18:12:15 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="b4050000000000006110580000000000c60000000000000095000002000000002ac73fe427abdf478e0357f2d32986f50b892b5007921cd48fe43b23be60a2dbc9778bb665510e3e22fcb26adfdc05e55a4933e62a23abb4baca4ec89323257db59db5eeda384459dd00d41b6aab85df5cab39e726769e2291b626d120a9247579f0b8edd8f16683e0623366ac632c24921d21534237743354f09cc29be2f72dfa8b05320110bcea53bb038c"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x5, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) 18:12:15 executing program 1: syz_mount_image$ntfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x6, 0x0, &(0x7f00000000c0), 0x218400, &(0x7f00000013c0)) 18:12:15 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="b4050000000000006110580000000000c60000000000000095000002000000002ac73fe427abdf478e0357f2d32986f50b892b5007921cd48fe43b23be60a2dbc9778bb665510e3e22fcb26adfdc05e55a4933e62a23abb4baca4ec89323257db59db5eeda384459dd00d41b6aab85df5cab39e726769e2291b626d120a9247579f0b8edd8f16683e0623366ac632c24921d21534237743354f09cc29be2f72dfa8b05320110bcea53bb038c"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x5, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) 18:12:15 executing program 5: r0 = syz_io_uring_setup(0x3ede, &(0x7f0000000240), &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) socket$l2tp6(0xa, 0x2, 0x73) openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/locks\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READ=@pass_buffer={0x16, 0x0, 0x0, @fd_index=0x5, 0xffffffffffffffff, &(0x7f0000000040)=""/17, 0x11}, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000002040)=[{{&(0x7f0000001380)=@in6={0xa, 0x0, 0x0, @private0}, 0x80, 0x0}}], 0x1, 0x0) io_uring_enter(r0, 0x7, 0x0, 0x0, 0x0, 0x0) [ 524.242703][T21286] ERROR: Out of memory at tomoyo_realpath_from_path. [ 524.324012][T21286] __ntfs_error: 5 callbacks suppressed [ 524.324029][T21286] ntfs: (device loop2): ntfs_fill_super(): Unable to determine device size. 18:12:15 executing program 2: syz_mount_image$ntfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f00000013c0)={[{@fmask}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'syzkaller1\x00'}}]}) (fail_nth: 9) 18:12:15 executing program 1: syz_mount_image$ntfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x7, 0x0, &(0x7f00000000c0), 0x218400, &(0x7f00000013c0)) 18:12:15 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="b4050000000000006110580000000000c60000000000000095000002000000002ac73fe427abdf478e0357f2d32986f50b892b5007921cd48fe43b23be60a2dbc9778bb665510e3e22fcb26adfdc05e55a4933e62a23abb4baca4ec89323257db59db5eeda384459dd00d41b6aab85df5cab39e726769e2291b626d120a9247579f0b8edd8f16683e0623366ac632c24921d21534237743354f09cc29be2f72dfa8b05320110bcea53bb038c"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x5, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) 18:12:15 executing program 0: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$FS_IOC_RESVSP(r0, 0x402c5828, &(0x7f00000000c0)={0x0, 0x1, 0xa8f, 0x3078}) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x200000000}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x9) preadv(r1, &(0x7f0000000240)=[{&(0x7f0000000040)=""/94, 0x5e}, {&(0x7f00000000c0)=""/93, 0x5d}, {&(0x7f0000000140)=""/58, 0x3a}], 0x3, 0xd9f, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000002340)='./file0\x00', 0x0, 0x108) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000180)={'team0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @local}, 0x14) writev(r2, &(0x7f0000000280)=[{&(0x7f00000008c0)="110eaa1a9896d57019effc8c79961d0f73ccf3afca3754e2e7a31f536bcb7204bed59311e29c96e1c2b663d61e5b0c0a76ea50cbddaa69f578b8600f77cf1a538ac900673696245b6de4283c979a2eccd71f9583dacf650575d1398678895da32663735b4d0cabfe7e972e59c2b4b4c9c89d0b82ca2267ad5062303e8abcb79600010506702eb912e3957e507aec4e2180699a738f6753509a12282a1d7181887f6c2e03de1da0dfe3b4efbb10e9b59301b4ef8a1d", 0xb5}, {&(0x7f0000000980)="34c30d95766fefbb7bdc40a3242505587bbc8584c2bc2003185f5ce116eea020efa91e2aae1eae2b8e848ac13c3dcedbbbc82adb1e70be8eecedba37be82545f2abda4f0a0e0fd0edd6bd03bb8e9bb91c39a2c828511aef3e684ad4c21ec0c146b9570139e31cd", 0x67}], 0x2) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'macvtap0\x00'}) ioctl$PPPIOCSFLAGS1(0xffffffffffffffff, 0x40047459, &(0x7f00000001c0)) recvmmsg(0xffffffffffffffff, &(0x7f0000002200)=[{{&(0x7f0000000340)=@in={0x2, 0x0, @multicast1}, 0x80, &(0x7f0000000440)=[{&(0x7f00000004c0)=""/88, 0x58}, {&(0x7f0000000b40)=""/4096, 0x1000}], 0x2, &(0x7f0000000740)=""/192, 0xc0}, 0x3}, {{&(0x7f0000000800)=@sco={0x1f, @none}, 0x80, &(0x7f0000000480)=[{&(0x7f0000001b40)=""/82, 0x52}], 0x1, &(0x7f0000001bc0)=""/206, 0xce}, 0x7}, {{&(0x7f0000001cc0)=@in={0x2, 0x0, @broadcast}, 0x80, &(0x7f0000000880)=[{&(0x7f0000001d40)=""/146, 0x92}, {&(0x7f0000001e00)=""/231, 0xe7}], 0x2, &(0x7f0000001f00)=""/239, 0xef}, 0x3}, {{&(0x7f0000002000)=@xdp, 0x80, &(0x7f00000020c0)=[{&(0x7f0000002080)=""/58, 0x3a}], 0x1, &(0x7f0000002100)=""/251, 0xfb}, 0x9}], 0x4, 0x40, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000002380)=ANY=[@ANYBLOB="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", @ANYRESDEC=r0, @ANYBLOB="b21b22b0b59f1a76abb6323c16886f3d2569d595dca4af1ac9160b24b62e47302e148fa17433c275945e36a713e5fad2e8abc9651d17b22d7d092020f73d100115fed606c66c84318df7895b1e5780f3c785bfb92571cf1bc9", @ANYRES32=0x0, @ANYRES32, @ANYRES32=0x0], &(0x7f0000000300)=0x18) r5 = socket(0x1, 0x803, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8936, &(0x7f0000000080)={@rand_addr=' \x01\x00', 0x44, r4}) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) r7 = socket(0x10, 0x8000000803, 0x0) sendmsg$nl_route(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000a00)=@newlink={0x7c, 0x10, 0x0, 0x3001, 0x25dfdbfc, {0x0, 0x0, 0x0, 0x0, 0x534ad, 0x42a03}, [@IFLA_LINKINFO={0x4c, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x3c, 0x2, 0x0, 0x1, [@IFLA_IPVLAN_MODE={0x6, 0x1, 0x2}, @IFLA_IPVLAN_FLAGS={0x6, 0x2, 0x2}, @IFLA_IPVLAN_FLAGS={0x6, 0x2, 0x1}, @IFLA_IPVLAN_FLAGS={0x6, 0x2, 0x2}, @IFLA_IPVLAN_FLAGS={0x6, 0x2, 0x3}, @IFLA_IPVLAN_MODE={0x6}, @IFLA_IPVLAN_FLAGS={0x6, 0x2, 0x2}]}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x7c}}, 0x0) 18:12:15 executing program 3: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$FS_IOC_RESVSP(r0, 0x402c5828, &(0x7f00000000c0)={0x0, 0x1, 0xa8f, 0x3078}) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x200000000}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x9) preadv(r1, &(0x7f0000000240)=[{&(0x7f0000000040)=""/94, 0x5e}, {&(0x7f00000000c0)=""/93, 0x5d}, {&(0x7f0000000140)=""/58, 0x3a}], 0x3, 0xd9f, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000002340)='./file0\x00', 0x0, 0x108) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000180)={'team0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @local}, 0x14) writev(r2, &(0x7f0000000280)=[{&(0x7f00000008c0)="110eaa1a9896d57019effc8c79961d0f73ccf3afca3754e2e7a31f536bcb7204bed59311e29c96e1c2b663d61e5b0c0a76ea50cbddaa69f578b8600f77cf1a538ac900673696245b6de4283c979a2eccd71f9583dacf650575d1398678895da32663735b4d0cabfe7e972e59c2b4b4c9c89d0b82ca2267ad5062303e8abcb79600010506702eb912e3957e507aec4e2180699a738f6753509a12282a1d7181887f6c2e03de1da0dfe3b4efbb10e9b59301b4ef8a1d", 0xb5}, {&(0x7f0000000980)="34c30d95766fefbb7bdc40a3242505587bbc8584c2bc2003185f5ce116eea020efa91e2aae1eae2b8e848ac13c3dcedbbbc82adb1e70be8eecedba37be82545f2abda4f0a0e0fd0edd6bd03bb8e9bb91c39a2c828511aef3e684ad4c21ec0c146b9570139e31cd", 0x67}], 0x2) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'macvtap0\x00'}) ioctl$PPPIOCSFLAGS1(0xffffffffffffffff, 0x40047459, &(0x7f00000001c0)) recvmmsg(0xffffffffffffffff, &(0x7f0000002200)=[{{&(0x7f0000000340)=@in={0x2, 0x0, @multicast1}, 0x80, &(0x7f0000000440)=[{&(0x7f00000004c0)=""/88, 0x58}, {&(0x7f0000000b40)=""/4096, 0x1000}], 0x2, &(0x7f0000000740)=""/192, 0xc0}, 0x3}, {{&(0x7f0000000800)=@sco={0x1f, @none}, 0x80, &(0x7f0000000480)=[{&(0x7f0000001b40)=""/82, 0x52}], 0x1, &(0x7f0000001bc0)=""/206, 0xce}, 0x7}, {{&(0x7f0000001cc0)=@in={0x2, 0x0, @broadcast}, 0x80, &(0x7f0000000880)=[{&(0x7f0000001d40)=""/146, 0x92}, {&(0x7f0000001e00)=""/231, 0xe7}], 0x2, &(0x7f0000001f00)=""/239, 0xef}, 0x3}, {{&(0x7f0000002000)=@xdp, 0x80, &(0x7f00000020c0)=[{&(0x7f0000002080)=""/58, 0x3a}], 0x1, &(0x7f0000002100)=""/251, 0xfb}, 0x9}], 0x4, 0x40, 0x0) 18:12:15 executing program 5: r0 = syz_io_uring_setup(0x3ede, &(0x7f0000000240), &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) socket$l2tp6(0xa, 0x2, 0x73) openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/locks\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READ=@pass_buffer={0x16, 0x0, 0x0, @fd_index=0x5, 0xffffffffffffffff, &(0x7f0000000040)=""/17, 0x11}, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000002040)=[{{&(0x7f0000001380)=@in6={0xa, 0x0, 0x0, @private0}, 0x80, 0x0}}], 0x1, 0x0) io_uring_enter(r0, 0x8, 0x0, 0x0, 0x0, 0x0) 18:12:16 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="b4050000000000006110580000000000c60000000000000095000002000000002ac73fe427abdf478e0357f2d32986f50b892b5007921cd48fe43b23be60a2dbc9778bb665510e3e22fcb26adfdc05e55a4933e62a23abb4baca4ec89323257db59db5eeda384459dd00d41b6aab85df5cab39e726769e2291b626d120a9247579f0b8edd8f16683e0623366ac632c24921d21534237743354f09cc29be2f72dfa8b05320110bcea53bb038c"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x5, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) 18:12:16 executing program 1: syz_mount_image$ntfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x8, 0x0, &(0x7f00000000c0), 0x218400, &(0x7f00000013c0)) 18:12:16 executing program 5: r0 = syz_io_uring_setup(0x3ede, &(0x7f0000000240), &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) socket$l2tp6(0xa, 0x2, 0x73) openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/locks\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READ=@pass_buffer={0x16, 0x0, 0x0, @fd_index=0x5, 0xffffffffffffffff, &(0x7f0000000040)=""/17, 0x11}, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000002040)=[{{&(0x7f0000001380)=@in6={0xa, 0x0, 0x0, @private0}, 0x80, 0x0}}], 0x1, 0x0) io_uring_enter(r0, 0x9, 0x0, 0x0, 0x0, 0x0) 18:12:16 executing program 3: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$FS_IOC_RESVSP(r0, 0x402c5828, &(0x7f00000000c0)={0x0, 0x1, 0xa8f, 0x3078}) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x200000000}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x9) preadv(r1, &(0x7f0000000240)=[{&(0x7f0000000040)=""/94, 0x5e}, {&(0x7f00000000c0)=""/93, 0x5d}, {&(0x7f0000000140)=""/58, 0x3a}], 0x3, 0xd9f, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000002340)='./file0\x00', 0x0, 0x108) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000180)={'team0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @local}, 0x14) writev(r2, &(0x7f0000000280)=[{&(0x7f00000008c0)="110eaa1a9896d57019effc8c79961d0f73ccf3afca3754e2e7a31f536bcb7204bed59311e29c96e1c2b663d61e5b0c0a76ea50cbddaa69f578b8600f77cf1a538ac900673696245b6de4283c979a2eccd71f9583dacf650575d1398678895da32663735b4d0cabfe7e972e59c2b4b4c9c89d0b82ca2267ad5062303e8abcb79600010506702eb912e3957e507aec4e2180699a738f6753509a12282a1d7181887f6c2e03de1da0dfe3b4efbb10e9b59301b4ef8a1d", 0xb5}, {&(0x7f0000000980)="34c30d95766fefbb7bdc40a3242505587bbc8584c2bc2003185f5ce116eea020efa91e2aae1eae2b8e848ac13c3dcedbbbc82adb1e70be8eecedba37be82545f2abda4f0a0e0fd0edd6bd03bb8e9bb91c39a2c828511aef3e684ad4c21ec0c146b9570139e31cd", 0x67}], 0x2) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'macvtap0\x00'}) ioctl$PPPIOCSFLAGS1(0xffffffffffffffff, 0x40047459, &(0x7f00000001c0)) 18:12:16 executing program 0: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$FS_IOC_RESVSP(r0, 0x402c5828, &(0x7f00000000c0)={0x0, 0x1, 0xa8f, 0x3078}) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x200000000}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x9) preadv(r1, &(0x7f0000000240)=[{&(0x7f0000000040)=""/94, 0x5e}, {&(0x7f00000000c0)=""/93, 0x5d}, {&(0x7f0000000140)=""/58, 0x3a}], 0x3, 0xd9f, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000002340)='./file0\x00', 0x0, 0x108) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000180)={'team0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @local}, 0x14) writev(r2, &(0x7f0000000280)=[{&(0x7f00000008c0)="110eaa1a9896d57019effc8c79961d0f73ccf3afca3754e2e7a31f536bcb7204bed59311e29c96e1c2b663d61e5b0c0a76ea50cbddaa69f578b8600f77cf1a538ac900673696245b6de4283c979a2eccd71f9583dacf650575d1398678895da32663735b4d0cabfe7e972e59c2b4b4c9c89d0b82ca2267ad5062303e8abcb79600010506702eb912e3957e507aec4e2180699a738f6753509a12282a1d7181887f6c2e03de1da0dfe3b4efbb10e9b59301b4ef8a1d", 0xb5}, {&(0x7f0000000980)="34c30d95766fefbb7bdc40a3242505587bbc8584c2bc2003185f5ce116eea020efa91e2aae1eae2b8e848ac13c3dcedbbbc82adb1e70be8eecedba37be82545f2abda4f0a0e0fd0edd6bd03bb8e9bb91c39a2c828511aef3e684ad4c21ec0c146b9570139e31cd", 0x67}], 0x2) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'macvtap0\x00'}) ioctl$PPPIOCSFLAGS1(0xffffffffffffffff, 0x40047459, &(0x7f00000001c0)) recvmmsg(0xffffffffffffffff, &(0x7f0000002200)=[{{&(0x7f0000000340)=@in={0x2, 0x0, @multicast1}, 0x80, &(0x7f0000000440)=[{&(0x7f00000004c0)=""/88, 0x58}, {&(0x7f0000000b40)=""/4096, 0x1000}], 0x2, &(0x7f0000000740)=""/192, 0xc0}, 0x3}, {{&(0x7f0000000800)=@sco={0x1f, @none}, 0x80, &(0x7f0000000480)=[{&(0x7f0000001b40)=""/82, 0x52}], 0x1, &(0x7f0000001bc0)=""/206, 0xce}, 0x7}, {{&(0x7f0000001cc0)=@in={0x2, 0x0, @broadcast}, 0x80, &(0x7f0000000880)=[{&(0x7f0000001d40)=""/146, 0x92}, {&(0x7f0000001e00)=""/231, 0xe7}], 0x2, &(0x7f0000001f00)=""/239, 0xef}, 0x3}, {{&(0x7f0000002000)=@xdp, 0x80, &(0x7f00000020c0)=[{&(0x7f0000002080)=""/58, 0x3a}], 0x1, &(0x7f0000002100)=""/251, 0xfb}, 0x9}], 0x4, 0x40, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000002380)=ANY=[@ANYBLOB="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", @ANYRESDEC=r0, @ANYBLOB="b21b22b0b59f1a76abb6323c16886f3d2569d595dca4af1ac9160b24b62e47302e148fa17433c275945e36a713e5fad2e8abc9651d17b22d7d092020f73d100115fed606c66c84318df7895b1e5780f3c785bfb92571cf1bc9", @ANYRES32=0x0, @ANYRES32, @ANYRES32=0x0], &(0x7f0000000300)=0x18) r5 = socket(0x1, 0x803, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8936, &(0x7f0000000080)={@rand_addr=' \x01\x00', 0x44, r4}) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) r7 = socket(0x10, 0x8000000803, 0x0) sendmsg$nl_route(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000a00)=@newlink={0x7c, 0x10, 0x0, 0x3001, 0x25dfdbfc, {0x0, 0x0, 0x0, 0x0, 0x534ad, 0x42a03}, [@IFLA_LINKINFO={0x4c, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x3c, 0x2, 0x0, 0x1, [@IFLA_IPVLAN_MODE={0x6, 0x1, 0x2}, @IFLA_IPVLAN_FLAGS={0x6, 0x2, 0x2}, @IFLA_IPVLAN_FLAGS={0x6, 0x2, 0x1}, @IFLA_IPVLAN_FLAGS={0x6, 0x2, 0x2}, @IFLA_IPVLAN_FLAGS={0x6, 0x2, 0x3}, @IFLA_IPVLAN_MODE={0x6}, @IFLA_IPVLAN_FLAGS={0x6, 0x2, 0x2}]}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x7c}}, 0x0) 18:12:16 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="b4050000000000006110580000000000c60000000000000095000002000000002ac73fe427abdf478e0357f2d32986f50b892b5007921cd48fe43b23be60a2dbc9778bb665510e3e22fcb26adfdc05e55a4933e62a23abb4baca4ec89323257db59db5eeda384459dd00d41b6aab85df5cab39e726769e2291b626d120a9247579f0b8edd8f16683e0623366ac632c24921d21534237743354f09cc29be2f72dfa8b05320110bcea53bb038c"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x5, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) [ 524.669133][T21325] FAULT_INJECTION: forcing a failure. [ 524.669133][T21325] name failslab, interval 1, probability 0, space 0, times 0 [ 524.728318][T21325] CPU: 1 PID: 21325 Comm: syz-executor.2 Not tainted 5.16.0-rc5-syzkaller #0 [ 524.737129][T21325] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 524.747205][T21325] Call Trace: [ 524.750570][T21325] [ 524.753493][T21325] dump_stack_lvl+0x201/0x2d8 [ 524.758175][T21325] ? show_regs_print_info+0x12/0x12 [ 524.763370][T21325] ? log_buf_vmcoreinfo_setup+0x498/0x498 [ 524.769086][T21325] ? __might_sleep+0xe0/0xe0 [ 524.773684][T21325] should_fail+0x384/0x4b0 [ 524.778180][T21325] ? tomoyo_encode2+0x25a/0x560 [ 524.783022][T21325] should_failslab+0x5/0x20 [ 524.787516][T21325] __kmalloc+0x94/0x380 [ 524.791675][T21325] tomoyo_encode2+0x25a/0x560 [ 524.796345][T21325] ? dynamic_dname+0x1a0/0x1a0 [ 524.801104][T21325] tomoyo_realpath_from_path+0x5c3/0x610 [ 524.806744][T21325] tomoyo_path_perm+0x238/0x660 [ 524.811593][T21325] ? tomoyo_path_permission+0x370/0x370 [ 524.817249][T21325] ? rcu_read_lock_any_held+0xb3/0x150 [ 524.822743][T21325] ? rcu_read_lock_bh_held+0x110/0x110 [ 524.828215][T21325] security_path_truncate+0xc0/0x140 [ 524.833494][T21325] do_sys_ftruncate+0x301/0x590 [ 524.838350][T21325] ? __x64_compat_sys_truncate+0x1c0/0x1c0 [ 524.844153][T21325] ? print_irqtrace_events+0x220/0x220 [ 524.849691][T21325] ? vtime_user_exit+0x2b2/0x3e0 [ 524.854715][T21325] ? syscall_enter_from_user_mode+0x2e/0x1b0 [ 524.860861][T21325] ? lockdep_hardirqs_on+0x95/0x140 [ 524.866053][T21325] ? syscall_enter_from_user_mode+0x2e/0x1b0 [ 524.872026][T21325] do_syscall_64+0x44/0xd0 [ 524.876440][T21325] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 524.882328][T21325] RIP: 0033:0x7f3831feee57 [ 524.886737][T21325] Code: 48 89 e7 e8 cb e5 ff ff 48 8b 4c 24 18 64 48 2b 0c 25 28 00 00 00 75 05 48 83 c4 28 c3 e8 21 1a 00 00 90 b8 4d 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 01 c3 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 [ 524.906462][T21325] RSP: 002b:00007f3830963f28 EFLAGS: 00000217 ORIG_RAX: 000000000000004d [ 524.914908][T21325] RAX: ffffffffffffffda RBX: 00000000200000c0 RCX: 00007f3831feee57 [ 524.922882][T21325] RDX: 00007f3830963fe0 RSI: 0000000000000000 RDI: 0000000000000004 [ 524.930847][T21325] RBP: 0000000000000000 R08: 00007f3830963fd8 R09: 00007f38309641d0 [ 524.938810][T21325] R10: 00007f3830963fdc R11: 0000000000000217 R12: 0000000000000004 [ 524.946772][T21325] R13: 0000000000000004 R14: 0000000000000000 R15: 00000000200013c0 [ 524.954757][T21325] [ 524.985921][T21325] ERROR: Out of memory at tomoyo_realpath_from_path. [ 525.001665][T21325] ntfs: (device loop2): ntfs_fill_super(): Unable to determine device size. 18:12:16 executing program 2: syz_mount_image$ntfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f00000013c0)={[{@fmask}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'syzkaller1\x00'}}]}) (fail_nth: 10) 18:12:16 executing program 1: syz_mount_image$ntfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x9, 0x0, &(0x7f00000000c0), 0x218400, &(0x7f00000013c0)) 18:12:16 executing program 3: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$FS_IOC_RESVSP(r0, 0x402c5828, &(0x7f00000000c0)={0x0, 0x1, 0xa8f, 0x3078}) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x200000000}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x9) preadv(r1, &(0x7f0000000240)=[{&(0x7f0000000040)=""/94, 0x5e}, {&(0x7f00000000c0)=""/93, 0x5d}, {&(0x7f0000000140)=""/58, 0x3a}], 0x3, 0xd9f, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000002340)='./file0\x00', 0x0, 0x108) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000180)={'team0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @local}, 0x14) writev(r2, &(0x7f0000000280)=[{&(0x7f00000008c0)="110eaa1a9896d57019effc8c79961d0f73ccf3afca3754e2e7a31f536bcb7204bed59311e29c96e1c2b663d61e5b0c0a76ea50cbddaa69f578b8600f77cf1a538ac900673696245b6de4283c979a2eccd71f9583dacf650575d1398678895da32663735b4d0cabfe7e972e59c2b4b4c9c89d0b82ca2267ad5062303e8abcb79600010506702eb912e3957e507aec4e2180699a738f6753509a12282a1d7181887f6c2e03de1da0dfe3b4efbb10e9b59301b4ef8a1d", 0xb5}, {&(0x7f0000000980)="34c30d95766fefbb7bdc40a3242505587bbc8584c2bc2003185f5ce116eea020efa91e2aae1eae2b8e848ac13c3dcedbbbc82adb1e70be8eecedba37be82545f2abda4f0a0e0fd0edd6bd03bb8e9bb91c39a2c828511aef3e684ad4c21ec0c146b9570139e31cd", 0x67}], 0x2) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'macvtap0\x00'}) ioctl$PPPIOCSFLAGS1(0xffffffffffffffff, 0x40047459, &(0x7f00000001c0)) 18:12:16 executing program 0: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$FS_IOC_RESVSP(r0, 0x402c5828, &(0x7f00000000c0)={0x0, 0x1, 0xa8f, 0x3078}) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x200000000}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x9) preadv(r1, &(0x7f0000000240)=[{&(0x7f0000000040)=""/94, 0x5e}, {&(0x7f00000000c0)=""/93, 0x5d}, {&(0x7f0000000140)=""/58, 0x3a}], 0x3, 0xd9f, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000002340)='./file0\x00', 0x0, 0x108) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000180)={'team0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @local}, 0x14) writev(r2, &(0x7f0000000280)=[{&(0x7f00000008c0)="110eaa1a9896d57019effc8c79961d0f73ccf3afca3754e2e7a31f536bcb7204bed59311e29c96e1c2b663d61e5b0c0a76ea50cbddaa69f578b8600f77cf1a538ac900673696245b6de4283c979a2eccd71f9583dacf650575d1398678895da32663735b4d0cabfe7e972e59c2b4b4c9c89d0b82ca2267ad5062303e8abcb79600010506702eb912e3957e507aec4e2180699a738f6753509a12282a1d7181887f6c2e03de1da0dfe3b4efbb10e9b59301b4ef8a1d", 0xb5}, {&(0x7f0000000980)="34c30d95766fefbb7bdc40a3242505587bbc8584c2bc2003185f5ce116eea020efa91e2aae1eae2b8e848ac13c3dcedbbbc82adb1e70be8eecedba37be82545f2abda4f0a0e0fd0edd6bd03bb8e9bb91c39a2c828511aef3e684ad4c21ec0c146b9570139e31cd", 0x67}], 0x2) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'macvtap0\x00'}) ioctl$PPPIOCSFLAGS1(0xffffffffffffffff, 0x40047459, &(0x7f00000001c0)) recvmmsg(0xffffffffffffffff, &(0x7f0000002200)=[{{&(0x7f0000000340)=@in={0x2, 0x0, @multicast1}, 0x80, &(0x7f0000000440)=[{&(0x7f00000004c0)=""/88, 0x58}, {&(0x7f0000000b40)=""/4096, 0x1000}], 0x2, &(0x7f0000000740)=""/192, 0xc0}, 0x3}, {{&(0x7f0000000800)=@sco={0x1f, @none}, 0x80, &(0x7f0000000480)=[{&(0x7f0000001b40)=""/82, 0x52}], 0x1, &(0x7f0000001bc0)=""/206, 0xce}, 0x7}, {{&(0x7f0000001cc0)=@in={0x2, 0x0, @broadcast}, 0x80, &(0x7f0000000880)=[{&(0x7f0000001d40)=""/146, 0x92}, {&(0x7f0000001e00)=""/231, 0xe7}], 0x2, &(0x7f0000001f00)=""/239, 0xef}, 0x3}, {{&(0x7f0000002000)=@xdp, 0x80, &(0x7f00000020c0)=[{&(0x7f0000002080)=""/58, 0x3a}], 0x1, &(0x7f0000002100)=""/251, 0xfb}, 0x9}], 0x4, 0x40, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000002380)=ANY=[@ANYBLOB="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", @ANYRESDEC=r0, @ANYBLOB="b21b22b0b59f1a76abb6323c16886f3d2569d595dca4af1ac9160b24b62e47302e148fa17433c275945e36a713e5fad2e8abc9651d17b22d7d092020f73d100115fed606c66c84318df7895b1e5780f3c785bfb92571cf1bc9", @ANYRES32=0x0, @ANYRES32, @ANYRES32=0x0], &(0x7f0000000300)=0x18) r5 = socket(0x1, 0x803, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8936, &(0x7f0000000080)={@rand_addr=' \x01\x00', 0x44, r4}) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) r7 = socket(0x10, 0x8000000803, 0x0) sendmsg$nl_route(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000a00)=@newlink={0x7c, 0x10, 0x401, 0x0, 0x25dfdbfc, {0x0, 0x0, 0x0, 0x0, 0x534ad, 0x42a03}, [@IFLA_LINKINFO={0x4c, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x3c, 0x2, 0x0, 0x1, [@IFLA_IPVLAN_MODE={0x6, 0x1, 0x2}, @IFLA_IPVLAN_FLAGS={0x6, 0x2, 0x2}, @IFLA_IPVLAN_FLAGS={0x6, 0x2, 0x1}, @IFLA_IPVLAN_FLAGS={0x6, 0x2, 0x2}, @IFLA_IPVLAN_FLAGS={0x6, 0x2, 0x3}, @IFLA_IPVLAN_MODE={0x6}, @IFLA_IPVLAN_FLAGS={0x6, 0x2, 0x2}]}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x7c}}, 0x0) 18:12:16 executing program 5: r0 = syz_io_uring_setup(0x3ede, &(0x7f0000000240), &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) socket$l2tp6(0xa, 0x2, 0x73) openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/locks\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READ=@pass_buffer={0x16, 0x0, 0x0, @fd_index=0x5, 0xffffffffffffffff, &(0x7f0000000040)=""/17, 0x11}, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000002040)=[{{&(0x7f0000001380)=@in6={0xa, 0x0, 0x0, @private0}, 0x80, 0x0}}], 0x1, 0x0) io_uring_enter(r0, 0xa, 0x0, 0x0, 0x0, 0x0) 18:12:16 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="b4050000000000006110580000000000c60000000000000095000002000000002ac73fe427abdf478e0357f2d32986f50b892b5007921cd48fe43b23be60a2dbc9778bb665510e3e22fcb26adfdc05e55a4933e62a23abb4baca4ec89323257db59db5eeda384459dd00d41b6aab85df5cab39e726769e2291b626d120a9247579f0b8edd8f16683e0623366ac632c24921d21534237743354f09cc29be2f72dfa8b05320110bcea53bb038c"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x78) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x5, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) 18:12:16 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="b4050000000000006110580000000000c60000000000000095000002000000002ac73fe427abdf478e0357f2d32986f50b892b5007921cd48fe43b23be60a2dbc9778bb665510e3e22fcb26adfdc05e55a4933e62a23abb4baca4ec89323257db59db5eeda384459dd00d41b6aab85df5cab39e726769e2291b626d120a9247579f0b8edd8f16683e0623366ac632c24921d21534237743354f09cc29be2f72dfa8b05320110bcea53bb038c"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x78) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x5, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) 18:12:16 executing program 3: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$FS_IOC_RESVSP(r0, 0x402c5828, &(0x7f00000000c0)={0x0, 0x1, 0xa8f, 0x3078}) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x200000000}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x9) preadv(r1, &(0x7f0000000240)=[{&(0x7f0000000040)=""/94, 0x5e}, {&(0x7f00000000c0)=""/93, 0x5d}, {&(0x7f0000000140)=""/58, 0x3a}], 0x3, 0xd9f, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000002340)='./file0\x00', 0x0, 0x108) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000180)={'team0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @local}, 0x14) writev(r2, &(0x7f0000000280)=[{&(0x7f00000008c0)="110eaa1a9896d57019effc8c79961d0f73ccf3afca3754e2e7a31f536bcb7204bed59311e29c96e1c2b663d61e5b0c0a76ea50cbddaa69f578b8600f77cf1a538ac900673696245b6de4283c979a2eccd71f9583dacf650575d1398678895da32663735b4d0cabfe7e972e59c2b4b4c9c89d0b82ca2267ad5062303e8abcb79600010506702eb912e3957e507aec4e2180699a738f6753509a12282a1d7181887f6c2e03de1da0dfe3b4efbb10e9b59301b4ef8a1d", 0xb5}, {&(0x7f0000000980)="34c30d95766fefbb7bdc40a3242505587bbc8584c2bc2003185f5ce116eea020efa91e2aae1eae2b8e848ac13c3dcedbbbc82adb1e70be8eecedba37be82545f2abda4f0a0e0fd0edd6bd03bb8e9bb91c39a2c828511aef3e684ad4c21ec0c146b9570139e31cd", 0x67}], 0x2) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'macvtap0\x00'}) [ 525.232894][T21345] FAULT_INJECTION: forcing a failure. [ 525.232894][T21345] name failslab, interval 1, probability 0, space 0, times 0 [ 525.260466][T21337] 8021q: adding VLAN 0 to HW filter on device ipvlan26 [ 525.286677][T21337] team0: Device ipvlan26 is already an upper device of the team interface [ 525.311053][T21345] CPU: 0 PID: 21345 Comm: syz-executor.2 Not tainted 5.16.0-rc5-syzkaller #0 [ 525.319965][T21345] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 525.330039][T21345] Call Trace: [ 525.333335][T21345] [ 525.336289][T21345] dump_stack_lvl+0x201/0x2d8 [ 525.340996][T21345] ? show_regs_print_info+0x12/0x12 [ 525.346218][T21345] ? log_buf_vmcoreinfo_setup+0x498/0x498 [ 525.351986][T21345] ? __might_sleep+0xe0/0xe0 [ 525.356610][T21345] should_fail+0x384/0x4b0 [ 525.361058][T21345] ? getname_flags+0xba/0x650 [ 525.365759][T21345] should_failslab+0x5/0x20 [ 525.370288][T21345] kmem_cache_alloc+0x72/0x310 [ 525.375076][T21345] getname_flags+0xba/0x650 [ 525.379603][T21345] do_sys_openat2+0xd2/0x500 18:12:16 executing program 5: r0 = syz_io_uring_setup(0x3ede, &(0x7f0000000240), &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) socket$l2tp6(0xa, 0x2, 0x73) openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/locks\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READ=@pass_buffer={0x16, 0x0, 0x0, @fd_index=0x5, 0xffffffffffffffff, &(0x7f0000000040)=""/17, 0x11}, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000002040)=[{{&(0x7f0000001380)=@in6={0xa, 0x0, 0x0, @private0}, 0x80, 0x0}}], 0x1, 0x0) io_uring_enter(r0, 0xb, 0x0, 0x0, 0x0, 0x0) 18:12:16 executing program 1: syz_mount_image$ntfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0xa, 0x0, &(0x7f00000000c0), 0x218400, &(0x7f00000013c0)) [ 525.384221][T21345] ? do_sys_open+0x220/0x220 [ 525.388841][T21345] __x64_sys_openat+0x243/0x290 [ 525.393725][T21345] ? __ia32_sys_open+0x270/0x270 [ 525.398682][T21345] ? syscall_enter_from_user_mode+0x2e/0x1b0 [ 525.404681][T21345] ? lockdep_hardirqs_on+0x95/0x140 [ 525.409903][T21345] ? syscall_enter_from_user_mode+0x2e/0x1b0 [ 525.415908][T21345] do_syscall_64+0x44/0xd0 [ 525.420355][T21345] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 525.426277][T21345] RIP: 0033:0x7f3831fa1db4 18:12:16 executing program 1: syz_mount_image$ntfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0xb, 0x0, &(0x7f00000000c0), 0x218400, &(0x7f00000013c0)) [ 525.431106][T21345] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 525.450740][T21345] RSP: 002b:00007f3830963eb0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 525.459180][T21345] RAX: ffffffffffffffda RBX: 00007f38320389c8 RCX: 00007f3831fa1db4 [ 525.467174][T21345] RDX: 0000000000000002 RSI: 00007f3830963fe0 RDI: 00000000ffffff9c [ 525.475186][T21345] RBP: 00007f3830963fe0 R08: 0000000000000000 R09: 00007f38309641d0 18:12:16 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="b4050000000000006110580000000000c60000000000000095000002000000002ac73fe427abdf478e0357f2d32986f50b892b5007921cd48fe43b23be60a2dbc9778bb665510e3e22fcb26adfdc05e55a4933e62a23abb4baca4ec89323257db59db5eeda384459dd00d41b6aab85df5cab39e726769e2291b626d120a9247579f0b8edd8f16683e0623366ac632c24921d21534237743354f09cc29be2f72dfa8b05320110bcea53bb038c"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x78) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x5, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) [ 525.483249][T21345] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 525.491308][T21345] R13: 0000000000000004 R14: 00000000200000c0 R15: 0000000000000000 [ 525.499395][T21345] 18:12:17 executing program 2: syz_mount_image$ntfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f00000013c0)={[{@fmask}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'syzkaller1\x00'}}]}) (fail_nth: 11) 18:12:17 executing program 3: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$FS_IOC_RESVSP(r0, 0x402c5828, &(0x7f00000000c0)={0x0, 0x1, 0xa8f, 0x3078}) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x200000000}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x9) preadv(r1, &(0x7f0000000240)=[{&(0x7f0000000040)=""/94, 0x5e}, {&(0x7f00000000c0)=""/93, 0x5d}, {&(0x7f0000000140)=""/58, 0x3a}], 0x3, 0xd9f, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000002340)='./file0\x00', 0x0, 0x108) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000180)={'team0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @local}, 0x14) writev(r2, &(0x7f0000000280)=[{&(0x7f00000008c0)="110eaa1a9896d57019effc8c79961d0f73ccf3afca3754e2e7a31f536bcb7204bed59311e29c96e1c2b663d61e5b0c0a76ea50cbddaa69f578b8600f77cf1a538ac900673696245b6de4283c979a2eccd71f9583dacf650575d1398678895da32663735b4d0cabfe7e972e59c2b4b4c9c89d0b82ca2267ad5062303e8abcb79600010506702eb912e3957e507aec4e2180699a738f6753509a12282a1d7181887f6c2e03de1da0dfe3b4efbb10e9b59301b4ef8a1d", 0xb5}, {&(0x7f0000000980)="34c30d95766fefbb7bdc40a3242505587bbc8584c2bc2003185f5ce116eea020efa91e2aae1eae2b8e848ac13c3dcedbbbc82adb1e70be8eecedba37be82545f2abda4f0a0e0fd0edd6bd03bb8e9bb91c39a2c828511aef3e684ad4c21ec0c146b9570139e31cd", 0x67}], 0x2) 18:12:17 executing program 5: r0 = syz_io_uring_setup(0x3ede, &(0x7f0000000240), &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) socket$l2tp6(0xa, 0x2, 0x73) openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/locks\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READ=@pass_buffer={0x16, 0x0, 0x0, @fd_index=0x5, 0xffffffffffffffff, &(0x7f0000000040)=""/17, 0x11}, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000002040)=[{{&(0x7f0000001380)=@in6={0xa, 0x0, 0x0, @private0}, 0x80, 0x0}}], 0x1, 0x0) io_uring_enter(r0, 0xc, 0x0, 0x0, 0x0, 0x0) 18:12:17 executing program 0: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$FS_IOC_RESVSP(r0, 0x402c5828, &(0x7f00000000c0)={0x0, 0x1, 0xa8f, 0x3078}) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x200000000}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x9) preadv(r1, &(0x7f0000000240)=[{&(0x7f0000000040)=""/94, 0x5e}, {&(0x7f00000000c0)=""/93, 0x5d}, {&(0x7f0000000140)=""/58, 0x3a}], 0x3, 0xd9f, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000002340)='./file0\x00', 0x0, 0x108) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000180)={'team0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @local}, 0x14) writev(r2, &(0x7f0000000280)=[{&(0x7f00000008c0)="110eaa1a9896d57019effc8c79961d0f73ccf3afca3754e2e7a31f536bcb7204bed59311e29c96e1c2b663d61e5b0c0a76ea50cbddaa69f578b8600f77cf1a538ac900673696245b6de4283c979a2eccd71f9583dacf650575d1398678895da32663735b4d0cabfe7e972e59c2b4b4c9c89d0b82ca2267ad5062303e8abcb79600010506702eb912e3957e507aec4e2180699a738f6753509a12282a1d7181887f6c2e03de1da0dfe3b4efbb10e9b59301b4ef8a1d", 0xb5}, {&(0x7f0000000980)="34c30d95766fefbb7bdc40a3242505587bbc8584c2bc2003185f5ce116eea020efa91e2aae1eae2b8e848ac13c3dcedbbbc82adb1e70be8eecedba37be82545f2abda4f0a0e0fd0edd6bd03bb8e9bb91c39a2c828511aef3e684ad4c21ec0c146b9570139e31cd", 0x67}], 0x2) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'macvtap0\x00'}) ioctl$PPPIOCSFLAGS1(0xffffffffffffffff, 0x40047459, &(0x7f00000001c0)) recvmmsg(0xffffffffffffffff, &(0x7f0000002200)=[{{&(0x7f0000000340)=@in={0x2, 0x0, @multicast1}, 0x80, &(0x7f0000000440)=[{&(0x7f00000004c0)=""/88, 0x58}, {&(0x7f0000000b40)=""/4096, 0x1000}], 0x2, &(0x7f0000000740)=""/192, 0xc0}, 0x3}, {{&(0x7f0000000800)=@sco={0x1f, @none}, 0x80, &(0x7f0000000480)=[{&(0x7f0000001b40)=""/82, 0x52}], 0x1, &(0x7f0000001bc0)=""/206, 0xce}, 0x7}, {{&(0x7f0000001cc0)=@in={0x2, 0x0, @broadcast}, 0x80, &(0x7f0000000880)=[{&(0x7f0000001d40)=""/146, 0x92}, {&(0x7f0000001e00)=""/231, 0xe7}], 0x2, &(0x7f0000001f00)=""/239, 0xef}, 0x3}, {{&(0x7f0000002000)=@xdp, 0x80, &(0x7f00000020c0)=[{&(0x7f0000002080)=""/58, 0x3a}], 0x1, &(0x7f0000002100)=""/251, 0xfb}, 0x9}], 0x4, 0x40, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000002380)=ANY=[@ANYBLOB="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", @ANYRESDEC=r0, @ANYBLOB="b21b22b0b59f1a76abb6323c16886f3d2569d595dca4af1ac9160b24b62e47302e148fa17433c275945e36a713e5fad2e8abc9651d17b22d7d092020f73d100115fed606c66c84318df7895b1e5780f3c785bfb92571cf1bc9", @ANYRES32=0x0, @ANYRES32, @ANYRES32=0x0], &(0x7f0000000300)=0x18) r5 = socket(0x1, 0x803, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8936, &(0x7f0000000080)={@rand_addr=' \x01\x00', 0x44, r4}) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) r7 = socket(0x10, 0x8000000803, 0x0) sendmsg$nl_route(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000a00)=@newlink={0x7c, 0x10, 0x401, 0x0, 0x25dfdbfc, {0x0, 0x0, 0x0, 0x0, 0x534ad, 0x42a03}, [@IFLA_LINKINFO={0x4c, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x3c, 0x2, 0x0, 0x1, [@IFLA_IPVLAN_MODE={0x6, 0x1, 0x2}, @IFLA_IPVLAN_FLAGS={0x6, 0x2, 0x2}, @IFLA_IPVLAN_FLAGS={0x6, 0x2, 0x1}, @IFLA_IPVLAN_FLAGS={0x6, 0x2, 0x2}, @IFLA_IPVLAN_FLAGS={0x6, 0x2, 0x3}, @IFLA_IPVLAN_MODE={0x6}, @IFLA_IPVLAN_FLAGS={0x6, 0x2, 0x2}]}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x7c}}, 0x0) 18:12:17 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="b4050000000000006110580000000000c60000000000000095000002000000002ac73fe427abdf478e0357f2d32986f50b892b5007921cd48fe43b23be60a2dbc9778bb665510e3e22fcb26adfdc05e55a4933e62a23abb4baca4ec89323257db59db5eeda384459dd00d41b6aab85df5cab39e726769e2291b626d120a9247579f0b8edd8f16683e0623366ac632c24921d21534237743354f09cc29be2f72dfa8b05320110bcea53bb038c"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, 0x0, 0x0) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x5, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) 18:12:17 executing program 1: syz_mount_image$ntfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0xc, 0x0, &(0x7f00000000c0), 0x218400, &(0x7f00000013c0)) 18:12:17 executing program 5: r0 = syz_io_uring_setup(0x3ede, &(0x7f0000000240), &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) socket$l2tp6(0xa, 0x2, 0x73) openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/locks\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READ=@pass_buffer={0x16, 0x0, 0x0, @fd_index=0x5, 0xffffffffffffffff, &(0x7f0000000040)=""/17, 0x11}, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000002040)=[{{&(0x7f0000001380)=@in6={0xa, 0x0, 0x0, @private0}, 0x80, 0x0}}], 0x1, 0x0) io_uring_enter(r0, 0xd, 0x0, 0x0, 0x0, 0x0) 18:12:17 executing program 1: syz_mount_image$ntfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0xd, 0x0, &(0x7f00000000c0), 0x218400, &(0x7f00000013c0)) 18:12:17 executing program 3: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$FS_IOC_RESVSP(r0, 0x402c5828, &(0x7f00000000c0)={0x0, 0x1, 0xa8f, 0x3078}) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x200000000}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x9) preadv(r1, &(0x7f0000000240)=[{&(0x7f0000000040)=""/94, 0x5e}, {&(0x7f00000000c0)=""/93, 0x5d}, {&(0x7f0000000140)=""/58, 0x3a}], 0x3, 0xd9f, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000002340)='./file0\x00', 0x0, 0x108) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000180)={'team0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @local}, 0x14) writev(r2, &(0x7f0000000280)=[{&(0x7f00000008c0)="110eaa1a9896d57019effc8c79961d0f73ccf3afca3754e2e7a31f536bcb7204bed59311e29c96e1c2b663d61e5b0c0a76ea50cbddaa69f578b8600f77cf1a538ac900673696245b6de4283c979a2eccd71f9583dacf650575d1398678895da32663735b4d0cabfe7e972e59c2b4b4c9c89d0b82ca2267ad5062303e8abcb79600010506702eb912e3957e507aec4e2180699a738f6753509a12282a1d7181887f6c2e03de1da0dfe3b4efbb10e9b59301b4ef8a1d", 0xb5}, {&(0x7f0000000980)="34c30d95766fefbb7bdc40a3242505587bbc8584c2bc2003185f5ce116eea020efa91e2aae1eae2b8e848ac13c3dcedbbbc82adb1e70be8eecedba37be82545f2abda4f0a0e0fd0edd6bd03bb8e9bb91c39a2c828511aef3e684ad4c21ec0c146b9570139e31cd", 0x67}], 0x2) [ 525.792342][T21366] 8021q: adding VLAN 0 to HW filter on device ipvlan26 [ 525.816442][T21366] team0: Device ipvlan26 is already an upper device of the team interface 18:12:17 executing program 3: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$FS_IOC_RESVSP(r0, 0x402c5828, &(0x7f00000000c0)={0x0, 0x1, 0xa8f, 0x3078}) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x200000000}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x9) preadv(r1, &(0x7f0000000240)=[{&(0x7f0000000040)=""/94, 0x5e}, {&(0x7f00000000c0)=""/93, 0x5d}, {&(0x7f0000000140)=""/58, 0x3a}], 0x3, 0xd9f, 0x0) openat(0xffffffffffffffff, &(0x7f0000002340)='./file0\x00', 0x0, 0x108) r2 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000180)={'team0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @local}, 0x14) 18:12:17 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="b4050000000000006110580000000000c60000000000000095000002000000002ac73fe427abdf478e0357f2d32986f50b892b5007921cd48fe43b23be60a2dbc9778bb665510e3e22fcb26adfdc05e55a4933e62a23abb4baca4ec89323257db59db5eeda384459dd00d41b6aab85df5cab39e726769e2291b626d120a9247579f0b8edd8f16683e0623366ac632c24921d21534237743354f09cc29be2f72dfa8b05320110bcea53bb038c"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, 0x0, 0x0) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x5, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) 18:12:17 executing program 1: syz_mount_image$ntfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0xe, 0x0, &(0x7f00000000c0), 0x218400, &(0x7f00000013c0)) 18:12:17 executing program 5: r0 = syz_io_uring_setup(0x3ede, &(0x7f0000000240), &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) socket$l2tp6(0xa, 0x2, 0x73) openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/locks\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READ=@pass_buffer={0x16, 0x0, 0x0, @fd_index=0x5, 0xffffffffffffffff, &(0x7f0000000040)=""/17, 0x11}, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000002040)=[{{&(0x7f0000001380)=@in6={0xa, 0x0, 0x0, @private0}, 0x80, 0x0}}], 0x1, 0x0) io_uring_enter(r0, 0xe, 0x0, 0x0, 0x0, 0x0) [ 526.054679][T21384] FAULT_INJECTION: forcing a failure. [ 526.054679][T21384] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 526.073412][T21384] CPU: 1 PID: 21384 Comm: syz-executor.2 Not tainted 5.16.0-rc5-syzkaller #0 [ 526.082232][T21384] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 526.092299][T21384] Call Trace: [ 526.095589][T21384] [ 526.098535][T21384] dump_stack_lvl+0x201/0x2d8 [ 526.103334][T21384] ? show_regs_print_info+0x12/0x12 [ 526.108558][T21384] ? log_buf_vmcoreinfo_setup+0x498/0x498 [ 526.114303][T21384] ? __might_fault+0xb6/0x110 [ 526.119005][T21384] ? rcu_read_lock_sched_held+0x89/0x130 [ 526.124664][T21384] should_fail+0x384/0x4b0 [ 526.129140][T21384] strncpy_from_user+0x32/0x350 [ 526.134107][T21384] getname_flags+0xf0/0x650 [ 526.138642][T21384] do_sys_openat2+0xd2/0x500 [ 526.143255][T21384] ? do_sys_open+0x220/0x220 [ 526.147876][T21384] __x64_sys_openat+0x243/0x290 [ 526.152745][T21384] ? __ia32_sys_open+0x270/0x270 [ 526.157701][T21384] ? syscall_enter_from_user_mode+0x2e/0x1b0 [ 526.163701][T21384] ? lockdep_hardirqs_on+0x95/0x140 [ 526.168924][T21384] ? syscall_enter_from_user_mode+0x2e/0x1b0 [ 526.174925][T21384] do_syscall_64+0x44/0xd0 [ 526.179366][T21384] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 526.185279][T21384] RIP: 0033:0x7f3831fa1db4 [ 526.189711][T21384] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 526.209342][T21384] RSP: 002b:00007f3830963eb0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 526.217779][T21384] RAX: ffffffffffffffda RBX: 00007f38320389c8 RCX: 00007f3831fa1db4 [ 526.225771][T21384] RDX: 0000000000000002 RSI: 00007f3830963fe0 RDI: 00000000ffffff9c [ 526.233760][T21384] RBP: 00007f3830963fe0 R08: 0000000000000000 R09: 00007f38309641d0 [ 526.241750][T21384] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 526.249741][T21384] R13: 0000000000000004 R14: 00000000200000c0 R15: 0000000000000000 [ 526.257750][T21384] 18:12:17 executing program 2: syz_mount_image$ntfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f00000013c0)={[{@fmask}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'syzkaller1\x00'}}]}) (fail_nth: 12) 18:12:17 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="b4050000000000006110580000000000c60000000000000095000002000000002ac73fe427abdf478e0357f2d32986f50b892b5007921cd48fe43b23be60a2dbc9778bb665510e3e22fcb26adfdc05e55a4933e62a23abb4baca4ec89323257db59db5eeda384459dd00d41b6aab85df5cab39e726769e2291b626d120a9247579f0b8edd8f16683e0623366ac632c24921d21534237743354f09cc29be2f72dfa8b05320110bcea53bb038c"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, 0x0, 0x0) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x5, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) 18:12:17 executing program 1: syz_mount_image$ntfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x10, 0x0, &(0x7f00000000c0), 0x218400, &(0x7f00000013c0)) 18:12:17 executing program 3: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$FS_IOC_RESVSP(r0, 0x402c5828, &(0x7f00000000c0)={0x0, 0x1, 0xa8f, 0x3078}) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x200000000}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x9) preadv(r1, &(0x7f0000000240)=[{&(0x7f0000000040)=""/94, 0x5e}, {&(0x7f00000000c0)=""/93, 0x5d}, {&(0x7f0000000140)=""/58, 0x3a}], 0x3, 0xd9f, 0x0) openat(0xffffffffffffffff, &(0x7f0000002340)='./file0\x00', 0x0, 0x108) r2 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000180)={'team0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @local}, 0x14) 18:12:17 executing program 0: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$FS_IOC_RESVSP(r0, 0x402c5828, &(0x7f00000000c0)={0x0, 0x1, 0xa8f, 0x3078}) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x200000000}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x9) preadv(r1, &(0x7f0000000240)=[{&(0x7f0000000040)=""/94, 0x5e}, {&(0x7f00000000c0)=""/93, 0x5d}, {&(0x7f0000000140)=""/58, 0x3a}], 0x3, 0xd9f, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000002340)='./file0\x00', 0x0, 0x108) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000180)={'team0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @local}, 0x14) writev(r2, &(0x7f0000000280)=[{&(0x7f00000008c0)="110eaa1a9896d57019effc8c79961d0f73ccf3afca3754e2e7a31f536bcb7204bed59311e29c96e1c2b663d61e5b0c0a76ea50cbddaa69f578b8600f77cf1a538ac900673696245b6de4283c979a2eccd71f9583dacf650575d1398678895da32663735b4d0cabfe7e972e59c2b4b4c9c89d0b82ca2267ad5062303e8abcb79600010506702eb912e3957e507aec4e2180699a738f6753509a12282a1d7181887f6c2e03de1da0dfe3b4efbb10e9b59301b4ef8a1d", 0xb5}, {&(0x7f0000000980)="34c30d95766fefbb7bdc40a3242505587bbc8584c2bc2003185f5ce116eea020efa91e2aae1eae2b8e848ac13c3dcedbbbc82adb1e70be8eecedba37be82545f2abda4f0a0e0fd0edd6bd03bb8e9bb91c39a2c828511aef3e684ad4c21ec0c146b9570139e31cd", 0x67}], 0x2) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'macvtap0\x00'}) ioctl$PPPIOCSFLAGS1(0xffffffffffffffff, 0x40047459, &(0x7f00000001c0)) recvmmsg(0xffffffffffffffff, &(0x7f0000002200)=[{{&(0x7f0000000340)=@in={0x2, 0x0, @multicast1}, 0x80, &(0x7f0000000440)=[{&(0x7f00000004c0)=""/88, 0x58}, {&(0x7f0000000b40)=""/4096, 0x1000}], 0x2, &(0x7f0000000740)=""/192, 0xc0}, 0x3}, {{&(0x7f0000000800)=@sco={0x1f, @none}, 0x80, &(0x7f0000000480)=[{&(0x7f0000001b40)=""/82, 0x52}], 0x1, &(0x7f0000001bc0)=""/206, 0xce}, 0x7}, {{&(0x7f0000001cc0)=@in={0x2, 0x0, @broadcast}, 0x80, &(0x7f0000000880)=[{&(0x7f0000001d40)=""/146, 0x92}, {&(0x7f0000001e00)=""/231, 0xe7}], 0x2, &(0x7f0000001f00)=""/239, 0xef}, 0x3}, {{&(0x7f0000002000)=@xdp, 0x80, &(0x7f00000020c0)=[{&(0x7f0000002080)=""/58, 0x3a}], 0x1, &(0x7f0000002100)=""/251, 0xfb}, 0x9}], 0x4, 0x40, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000002380)=ANY=[@ANYBLOB="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", @ANYRESDEC=r0, @ANYBLOB="b21b22b0b59f1a76abb6323c16886f3d2569d595dca4af1ac9160b24b62e47302e148fa17433c275945e36a713e5fad2e8abc9651d17b22d7d092020f73d100115fed606c66c84318df7895b1e5780f3c785bfb92571cf1bc9", @ANYRES32=0x0, @ANYRES32, @ANYRES32=0x0], &(0x7f0000000300)=0x18) r5 = socket(0x1, 0x803, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8936, &(0x7f0000000080)={@rand_addr=' \x01\x00', 0x44, r4}) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) r7 = socket(0x10, 0x8000000803, 0x0) sendmsg$nl_route(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000a00)=@newlink={0x7c, 0x10, 0x401, 0x0, 0x25dfdbfc, {0x0, 0x0, 0x0, 0x0, 0x534ad, 0x42a03}, [@IFLA_LINKINFO={0x4c, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x3c, 0x2, 0x0, 0x1, [@IFLA_IPVLAN_MODE={0x6, 0x1, 0x2}, @IFLA_IPVLAN_FLAGS={0x6, 0x2, 0x2}, @IFLA_IPVLAN_FLAGS={0x6, 0x2, 0x1}, @IFLA_IPVLAN_FLAGS={0x6, 0x2, 0x2}, @IFLA_IPVLAN_FLAGS={0x6, 0x2, 0x3}, @IFLA_IPVLAN_MODE={0x6}, @IFLA_IPVLAN_FLAGS={0x6, 0x2, 0x2}]}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x7c}}, 0x0) 18:12:17 executing program 5: r0 = syz_io_uring_setup(0x3ede, &(0x7f0000000240), &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) socket$l2tp6(0xa, 0x2, 0x73) openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/locks\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READ=@pass_buffer={0x16, 0x0, 0x0, @fd_index=0x5, 0xffffffffffffffff, &(0x7f0000000040)=""/17, 0x11}, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000002040)=[{{&(0x7f0000001380)=@in6={0xa, 0x0, 0x0, @private0}, 0x80, 0x0}}], 0x1, 0x0) io_uring_enter(r0, 0xf, 0x0, 0x0, 0x0, 0x0) 18:12:17 executing program 3: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$FS_IOC_RESVSP(r0, 0x402c5828, &(0x7f00000000c0)={0x0, 0x1, 0xa8f, 0x3078}) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x200000000}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x9) preadv(r1, &(0x7f0000000240)=[{&(0x7f0000000040)=""/94, 0x5e}, {&(0x7f00000000c0)=""/93, 0x5d}, {&(0x7f0000000140)=""/58, 0x3a}], 0x3, 0xd9f, 0x0) openat(0xffffffffffffffff, &(0x7f0000002340)='./file0\x00', 0x0, 0x108) r2 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000180)={'team0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @local}, 0x14) 18:12:17 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="b4050000000000006110580000000000c60000000000000095000002000000002ac73fe427abdf478e0357f2d32986f50b892b5007921cd48fe43b23be60a2dbc9778bb665510e3e22fcb26adfdc05e55a4933e62a23abb4baca4ec89323257db59db5eeda384459dd00d41b6aab85df5cab39e726769e2291b626d120a9247579f0b8edd8f16683e0623366ac632c24921d21534237743354f09cc29be2f72dfa8b05320110bcea53bb038c"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x0, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x5, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) 18:12:17 executing program 5: r0 = syz_io_uring_setup(0x3ede, &(0x7f0000000240), &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) socket$l2tp6(0xa, 0x2, 0x73) openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/locks\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READ=@pass_buffer={0x16, 0x0, 0x0, @fd_index=0x5, 0xffffffffffffffff, &(0x7f0000000040)=""/17, 0x11}, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000002040)=[{{&(0x7f0000001380)=@in6={0xa, 0x0, 0x0, @private0}, 0x80, 0x0}}], 0x1, 0x0) io_uring_enter(r0, 0x10, 0x0, 0x0, 0x0, 0x0) [ 526.427692][T21396] FAULT_INJECTION: forcing a failure. [ 526.427692][T21396] name failslab, interval 1, probability 0, space 0, times 0 [ 526.469982][T21392] 8021q: adding VLAN 0 to HW filter on device ipvlan26 [ 526.482040][T21396] CPU: 0 PID: 21396 Comm: syz-executor.2 Not tainted 5.16.0-rc5-syzkaller #0 [ 526.490853][T21396] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 526.501102][T21396] Call Trace: [ 526.504404][T21396] [ 526.507433][T21396] dump_stack_lvl+0x201/0x2d8 [ 526.512145][T21396] ? show_regs_print_info+0x12/0x12 18:12:17 executing program 1: syz_mount_image$ntfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x11, 0x0, &(0x7f00000000c0), 0x218400, &(0x7f00000013c0)) [ 526.517370][T21396] ? log_buf_vmcoreinfo_setup+0x498/0x498 [ 526.523115][T21396] ? __might_sleep+0xe0/0xe0 [ 526.527742][T21396] should_fail+0x384/0x4b0 [ 526.532192][T21396] ? __alloc_file+0x26/0x2f0 [ 526.536794][T21396] should_failslab+0x5/0x20 [ 526.541314][T21396] kmem_cache_alloc+0x72/0x310 [ 526.546104][T21396] ? stack_trace_save+0x1e0/0x1e0 [ 526.551152][T21396] __alloc_file+0x26/0x2f0 [ 526.555586][T21396] ? alloc_empty_file+0x49/0x1b0 [ 526.560544][T21396] alloc_empty_file+0xa9/0x1b0 [ 526.565595][T21396] path_openat+0x111/0x3660 [ 526.570123][T21396] ? arch_stack_walk+0xf8/0x140 [ 526.575037][T21396] ? do_filp_open+0x4f0/0x4f0 [ 526.579751][T21396] ? rcu_read_lock_sched_held+0x89/0x130 [ 526.585409][T21396] ? __bpf_trace_rcu_stall_warning+0x10/0x10 [ 526.591429][T21396] do_filp_open+0x277/0x4f0 [ 526.595962][T21396] ? vfs_tmpfile+0x230/0x230 [ 526.600571][T21396] ? alloc_fd+0x5e1/0x680 [ 526.604933][T21396] ? _raw_spin_unlock+0x24/0x40 [ 526.605401][T21392] team0: Device ipvlan26 is already an upper device of the team interface [ 526.609796][T21396] ? alloc_fd+0x5e1/0x680 [ 526.609833][T21396] do_sys_openat2+0x13b/0x500 [ 526.609861][T21396] ? do_sys_open+0x220/0x220 [ 526.609896][T21396] __x64_sys_openat+0x243/0x290 [ 526.609919][T21396] ? __ia32_sys_open+0x270/0x270 [ 526.609939][T21396] ? syscall_enter_from_user_mode+0x2e/0x1b0 [ 526.609960][T21396] ? lockdep_hardirqs_on+0x95/0x140 [ 526.609981][T21396] ? syscall_enter_from_user_mode+0x2e/0x1b0 [ 526.610013][T21396] do_syscall_64+0x44/0xd0 [ 526.663456][T21396] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 526.669369][T21396] RIP: 0033:0x7f3831fa1db4 [ 526.673837][T21396] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 526.693444][T21396] RSP: 002b:00007f3830963eb0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 526.701860][T21396] RAX: ffffffffffffffda RBX: 00007f38320389c8 RCX: 00007f3831fa1db4 [ 526.709825][T21396] RDX: 0000000000000002 RSI: 00007f3830963fe0 RDI: 00000000ffffff9c 18:12:18 executing program 3: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$FS_IOC_RESVSP(r0, 0x402c5828, &(0x7f00000000c0)={0x0, 0x1, 0xa8f, 0x3078}) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x200000000}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x9) preadv(r1, &(0x7f0000000240)=[{&(0x7f0000000040)=""/94, 0x5e}, {&(0x7f00000000c0)=""/93, 0x5d}, {&(0x7f0000000140)=""/58, 0x3a}], 0x3, 0xd9f, 0x0) openat(0xffffffffffffffff, &(0x7f0000002340)='./file0\x00', 0x0, 0x108) r2 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000180)={'team0\x00'}) [ 526.717796][T21396] RBP: 00007f3830963fe0 R08: 0000000000000000 R09: 00007f38309641d0 [ 526.725757][T21396] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 526.733716][T21396] R13: 0000000000000004 R14: 00000000200000c0 R15: 0000000000000000 [ 526.741691][T21396] 18:12:18 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="b4050000000000006110580000000000c60000000000000095000002000000002ac73fe427abdf478e0357f2d32986f50b892b5007921cd48fe43b23be60a2dbc9778bb665510e3e22fcb26adfdc05e55a4933e62a23abb4baca4ec89323257db59db5eeda384459dd00d41b6aab85df5cab39e726769e2291b626d120a9247579f0b8edd8f16683e0623366ac632c24921d21534237743354f09cc29be2f72dfa8b05320110bcea53bb038c"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x0, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x5, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) 18:12:18 executing program 1: syz_mount_image$ntfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x12, 0x0, &(0x7f00000000c0), 0x218400, &(0x7f00000013c0)) 18:12:18 executing program 2: syz_mount_image$ntfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f00000013c0)={[{@fmask}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'syzkaller1\x00'}}]}) (fail_nth: 13) 18:12:18 executing program 5: r0 = syz_io_uring_setup(0x3ede, &(0x7f0000000240), &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) socket$l2tp6(0xa, 0x2, 0x73) openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/locks\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READ=@pass_buffer={0x16, 0x0, 0x0, @fd_index=0x5, 0xffffffffffffffff, &(0x7f0000000040)=""/17, 0x11}, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000002040)=[{{&(0x7f0000001380)=@in6={0xa, 0x0, 0x0, @private0}, 0x80, 0x0}}], 0x1, 0x0) io_uring_enter(r0, 0x11, 0x0, 0x0, 0x0, 0x0) 18:12:18 executing program 0: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$FS_IOC_RESVSP(r0, 0x402c5828, &(0x7f00000000c0)={0x0, 0x1, 0xa8f, 0x3078}) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x200000000}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x9) preadv(r1, &(0x7f0000000240)=[{&(0x7f0000000040)=""/94, 0x5e}, {&(0x7f00000000c0)=""/93, 0x5d}, {&(0x7f0000000140)=""/58, 0x3a}], 0x3, 0xd9f, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000002340)='./file0\x00', 0x0, 0x108) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000180)={'team0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @local}, 0x14) writev(r2, &(0x7f0000000280)=[{&(0x7f00000008c0)="110eaa1a9896d57019effc8c79961d0f73ccf3afca3754e2e7a31f536bcb7204bed59311e29c96e1c2b663d61e5b0c0a76ea50cbddaa69f578b8600f77cf1a538ac900673696245b6de4283c979a2eccd71f9583dacf650575d1398678895da32663735b4d0cabfe7e972e59c2b4b4c9c89d0b82ca2267ad5062303e8abcb79600010506702eb912e3957e507aec4e2180699a738f6753509a12282a1d7181887f6c2e03de1da0dfe3b4efbb10e9b59301b4ef8a1d", 0xb5}, {&(0x7f0000000980)="34c30d95766fefbb7bdc40a3242505587bbc8584c2bc2003185f5ce116eea020efa91e2aae1eae2b8e848ac13c3dcedbbbc82adb1e70be8eecedba37be82545f2abda4f0a0e0fd0edd6bd03bb8e9bb91c39a2c828511aef3e684ad4c21ec0c146b9570139e31cd", 0x67}], 0x2) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'macvtap0\x00'}) ioctl$PPPIOCSFLAGS1(0xffffffffffffffff, 0x40047459, &(0x7f00000001c0)) recvmmsg(0xffffffffffffffff, &(0x7f0000002200)=[{{&(0x7f0000000340)=@in={0x2, 0x0, @multicast1}, 0x80, &(0x7f0000000440)=[{&(0x7f00000004c0)=""/88, 0x58}, {&(0x7f0000000b40)=""/4096, 0x1000}], 0x2, &(0x7f0000000740)=""/192, 0xc0}, 0x3}, {{&(0x7f0000000800)=@sco={0x1f, @none}, 0x80, &(0x7f0000000480)=[{&(0x7f0000001b40)=""/82, 0x52}], 0x1, &(0x7f0000001bc0)=""/206, 0xce}, 0x7}, {{&(0x7f0000001cc0)=@in={0x2, 0x0, @broadcast}, 0x80, &(0x7f0000000880)=[{&(0x7f0000001d40)=""/146, 0x92}, {&(0x7f0000001e00)=""/231, 0xe7}], 0x2, &(0x7f0000001f00)=""/239, 0xef}, 0x3}, {{&(0x7f0000002000)=@xdp, 0x80, &(0x7f00000020c0)=[{&(0x7f0000002080)=""/58, 0x3a}], 0x1, &(0x7f0000002100)=""/251, 0xfb}, 0x9}], 0x4, 0x40, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000002380)=ANY=[@ANYBLOB="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", @ANYRESDEC=r0, @ANYBLOB="b21b22b0b59f1a76abb6323c16886f3d2569d595dca4af1ac9160b24b62e47302e148fa17433c275945e36a713e5fad2e8abc9651d17b22d7d092020f73d100115fed606c66c84318df7895b1e5780f3c785bfb92571cf1bc9", @ANYRES32=0x0, @ANYRES32, @ANYRES32=0x0], &(0x7f0000000300)=0x18) r5 = socket(0x1, 0x803, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8936, &(0x7f0000000080)={@rand_addr=' \x01\x00', 0x44, r4}) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) r7 = socket(0x10, 0x8000000803, 0x0) sendmsg$nl_route(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000a00)=@newlink={0x7c, 0x10, 0x401, 0x3001, 0x0, {0x0, 0x0, 0x0, 0x0, 0x534ad, 0x42a03}, [@IFLA_LINKINFO={0x4c, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x3c, 0x2, 0x0, 0x1, [@IFLA_IPVLAN_MODE={0x6, 0x1, 0x2}, @IFLA_IPVLAN_FLAGS={0x6, 0x2, 0x2}, @IFLA_IPVLAN_FLAGS={0x6, 0x2, 0x1}, @IFLA_IPVLAN_FLAGS={0x6, 0x2, 0x2}, @IFLA_IPVLAN_FLAGS={0x6, 0x2, 0x3}, @IFLA_IPVLAN_MODE={0x6}, @IFLA_IPVLAN_FLAGS={0x6, 0x2, 0x2}]}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x7c}}, 0x0) 18:12:18 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="b4050000000000006110580000000000c60000000000000095000002000000002ac73fe427abdf478e0357f2d32986f50b892b5007921cd48fe43b23be60a2dbc9778bb665510e3e22fcb26adfdc05e55a4933e62a23abb4baca4ec89323257db59db5eeda384459dd00d41b6aab85df5cab39e726769e2291b626d120a9247579f0b8edd8f16683e0623366ac632c24921d21534237743354f09cc29be2f72dfa8b05320110bcea53bb038c"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x0, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x5, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) 18:12:18 executing program 3: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$FS_IOC_RESVSP(r0, 0x402c5828, &(0x7f00000000c0)={0x0, 0x1, 0xa8f, 0x3078}) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x200000000}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x9) preadv(r1, &(0x7f0000000240)=[{&(0x7f0000000040)=""/94, 0x5e}, {&(0x7f00000000c0)=""/93, 0x5d}, {&(0x7f0000000140)=""/58, 0x3a}], 0x3, 0xd9f, 0x0) openat(0xffffffffffffffff, &(0x7f0000002340)='./file0\x00', 0x0, 0x108) r2 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000180)={'team0\x00'}) 18:12:18 executing program 5: r0 = syz_io_uring_setup(0x3ede, &(0x7f0000000240), &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) socket$l2tp6(0xa, 0x2, 0x73) openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/locks\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READ=@pass_buffer={0x16, 0x0, 0x0, @fd_index=0x5, 0xffffffffffffffff, &(0x7f0000000040)=""/17, 0x11}, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000002040)=[{{&(0x7f0000001380)=@in6={0xa, 0x0, 0x0, @private0}, 0x80, 0x0}}], 0x1, 0x0) io_uring_enter(r0, 0x12, 0x0, 0x0, 0x0, 0x0) [ 527.021218][T21413] 8021q: adding VLAN 0 to HW filter on device ipvlan26 [ 527.036009][T21417] FAULT_INJECTION: forcing a failure. [ 527.036009][T21417] name failslab, interval 1, probability 0, space 0, times 0 [ 527.071288][T21413] team0: Device ipvlan26 is already an upper device of the team interface [ 527.100075][T21417] CPU: 0 PID: 21417 Comm: syz-executor.2 Not tainted 5.16.0-rc5-syzkaller #0 [ 527.108877][T21417] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 527.118937][T21417] Call Trace: [ 527.122251][T21417] [ 527.125200][T21417] dump_stack_lvl+0x201/0x2d8 [ 527.129902][T21417] ? show_regs_print_info+0x12/0x12 [ 527.135116][T21417] ? log_buf_vmcoreinfo_setup+0x498/0x498 [ 527.140847][T21417] ? __might_sleep+0xe0/0xe0 [ 527.145456][T21417] should_fail+0x384/0x4b0 [ 527.149879][T21417] ? security_file_alloc+0x32/0x1f0 [ 527.155073][T21417] should_failslab+0x5/0x20 [ 527.159576][T21417] kmem_cache_alloc+0x72/0x310 [ 527.164341][T21417] security_file_alloc+0x32/0x1f0 [ 527.169362][T21417] __alloc_file+0xca/0x2f0 [ 527.173788][T21417] alloc_empty_file+0xa9/0x1b0 [ 527.178546][T21417] path_openat+0x111/0x3660 [ 527.183050][T21417] ? arch_stack_walk+0xf8/0x140 [ 527.187930][T21417] ? do_filp_open+0x4f0/0x4f0 [ 527.192618][T21417] ? rcu_read_lock_sched_held+0x89/0x130 [ 527.198249][T21417] ? __bpf_trace_rcu_stall_warning+0x10/0x10 [ 527.204250][T21417] do_filp_open+0x277/0x4f0 [ 527.208870][T21417] ? vfs_tmpfile+0x230/0x230 [ 527.213507][T21417] ? alloc_fd+0x5e1/0x680 [ 527.217890][T21417] ? _raw_spin_unlock+0x24/0x40 [ 527.222777][T21417] ? alloc_fd+0x5e1/0x680 [ 527.227129][T21417] do_sys_openat2+0x13b/0x500 [ 527.231809][T21417] ? do_sys_open+0x220/0x220 [ 527.236407][T21417] __x64_sys_openat+0x243/0x290 [ 527.241260][T21417] ? __ia32_sys_open+0x270/0x270 [ 527.246193][T21417] ? syscall_enter_from_user_mode+0x2e/0x1b0 [ 527.252169][T21417] ? lockdep_hardirqs_on+0x95/0x140 [ 527.257361][T21417] ? syscall_enter_from_user_mode+0x2e/0x1b0 [ 527.263338][T21417] do_syscall_64+0x44/0xd0 [ 527.267754][T21417] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 527.273638][T21417] RIP: 0033:0x7f3831fa1db4 [ 527.278049][T21417] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 527.297764][T21417] RSP: 002b:00007f3830963eb0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 527.306351][T21417] RAX: ffffffffffffffda RBX: 00007f38320389c8 RCX: 00007f3831fa1db4 [ 527.314402][T21417] RDX: 0000000000000002 RSI: 00007f3830963fe0 RDI: 00000000ffffff9c 18:12:18 executing program 1: syz_mount_image$ntfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x18, 0x0, &(0x7f00000000c0), 0x218400, &(0x7f00000013c0)) [ 527.322401][T21417] RBP: 00007f3830963fe0 R08: 0000000000000000 R09: 00007f38309641d0 [ 527.330382][T21417] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 527.338374][T21417] R13: 0000000000000004 R14: 00000000200000c0 R15: 0000000000000000 [ 527.346358][T21417] 18:12:18 executing program 3: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$FS_IOC_RESVSP(r0, 0x402c5828, &(0x7f00000000c0)={0x0, 0x1, 0xa8f, 0x3078}) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x200000000}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x9) preadv(r1, &(0x7f0000000240)=[{&(0x7f0000000040)=""/94, 0x5e}, {&(0x7f00000000c0)=""/93, 0x5d}, {&(0x7f0000000140)=""/58, 0x3a}], 0x3, 0xd9f, 0x0) openat(0xffffffffffffffff, &(0x7f0000002340)='./file0\x00', 0x0, 0x108) socket$packet(0x11, 0x3, 0x300) 18:12:18 executing program 1: syz_mount_image$ntfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x25, 0x0, &(0x7f00000000c0), 0x218400, &(0x7f00000013c0)) 18:12:18 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="b4050000000000006110580000000000c60000000000000095000002000000002ac73fe427abdf478e0357f2d32986f50b892b5007921cd48fe43b23be60a2dbc9778bb665510e3e22fcb26adfdc05e55a4933e62a23abb4baca4ec89323257db59db5eeda384459dd00d41b6aab85df5cab39e726769e2291b626d120a9247579f0b8edd8f16683e0623366ac632c24921d21534237743354f09cc29be2f72dfa8b05320110bcea53bb038c"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x0, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x5, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) 18:12:18 executing program 5: r0 = syz_io_uring_setup(0x3ede, &(0x7f0000000240), &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) socket$l2tp6(0xa, 0x2, 0x73) openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/locks\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READ=@pass_buffer={0x16, 0x0, 0x0, @fd_index=0x5, 0xffffffffffffffff, &(0x7f0000000040)=""/17, 0x11}, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000002040)=[{{&(0x7f0000001380)=@in6={0xa, 0x0, 0x0, @private0}, 0x80, 0x0}}], 0x1, 0x0) io_uring_enter(r0, 0x13, 0x0, 0x0, 0x0, 0x0) 18:12:19 executing program 2: syz_mount_image$ntfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f00000013c0)={[{@fmask}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'syzkaller1\x00'}}]}) (fail_nth: 14) 18:12:19 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="b4050000000000006110580000000000c60000000000000095000002000000002ac73fe427abdf478e0357f2d32986f50b892b5007921cd48fe43b23be60a2dbc9778bb665510e3e22fcb26adfdc05e55a4933e62a23abb4baca4ec89323257db59db5eeda384459dd00d41b6aab85df5cab39e726769e2291b626d120a9247579f0b8edd8f16683e0623366ac632c24921d21534237743354f09cc29be2f72dfa8b05320110bcea53bb038c"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x0, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x5, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) 18:12:19 executing program 0: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$FS_IOC_RESVSP(r0, 0x402c5828, &(0x7f00000000c0)={0x0, 0x1, 0xa8f, 0x3078}) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x200000000}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x9) preadv(r1, &(0x7f0000000240)=[{&(0x7f0000000040)=""/94, 0x5e}, {&(0x7f00000000c0)=""/93, 0x5d}, {&(0x7f0000000140)=""/58, 0x3a}], 0x3, 0xd9f, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000002340)='./file0\x00', 0x0, 0x108) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000180)={'team0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @local}, 0x14) writev(r2, &(0x7f0000000280)=[{&(0x7f00000008c0)="110eaa1a9896d57019effc8c79961d0f73ccf3afca3754e2e7a31f536bcb7204bed59311e29c96e1c2b663d61e5b0c0a76ea50cbddaa69f578b8600f77cf1a538ac900673696245b6de4283c979a2eccd71f9583dacf650575d1398678895da32663735b4d0cabfe7e972e59c2b4b4c9c89d0b82ca2267ad5062303e8abcb79600010506702eb912e3957e507aec4e2180699a738f6753509a12282a1d7181887f6c2e03de1da0dfe3b4efbb10e9b59301b4ef8a1d", 0xb5}, {&(0x7f0000000980)="34c30d95766fefbb7bdc40a3242505587bbc8584c2bc2003185f5ce116eea020efa91e2aae1eae2b8e848ac13c3dcedbbbc82adb1e70be8eecedba37be82545f2abda4f0a0e0fd0edd6bd03bb8e9bb91c39a2c828511aef3e684ad4c21ec0c146b9570139e31cd", 0x67}], 0x2) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'macvtap0\x00'}) ioctl$PPPIOCSFLAGS1(0xffffffffffffffff, 0x40047459, &(0x7f00000001c0)) recvmmsg(0xffffffffffffffff, &(0x7f0000002200)=[{{&(0x7f0000000340)=@in={0x2, 0x0, @multicast1}, 0x80, &(0x7f0000000440)=[{&(0x7f00000004c0)=""/88, 0x58}, {&(0x7f0000000b40)=""/4096, 0x1000}], 0x2, &(0x7f0000000740)=""/192, 0xc0}, 0x3}, {{&(0x7f0000000800)=@sco={0x1f, @none}, 0x80, &(0x7f0000000480)=[{&(0x7f0000001b40)=""/82, 0x52}], 0x1, &(0x7f0000001bc0)=""/206, 0xce}, 0x7}, {{&(0x7f0000001cc0)=@in={0x2, 0x0, @broadcast}, 0x80, &(0x7f0000000880)=[{&(0x7f0000001d40)=""/146, 0x92}, {&(0x7f0000001e00)=""/231, 0xe7}], 0x2, &(0x7f0000001f00)=""/239, 0xef}, 0x3}, {{&(0x7f0000002000)=@xdp, 0x80, &(0x7f00000020c0)=[{&(0x7f0000002080)=""/58, 0x3a}], 0x1, &(0x7f0000002100)=""/251, 0xfb}, 0x9}], 0x4, 0x40, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000002380)=ANY=[@ANYBLOB="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", @ANYRESDEC=r0, @ANYBLOB="b21b22b0b59f1a76abb6323c16886f3d2569d595dca4af1ac9160b24b62e47302e148fa17433c275945e36a713e5fad2e8abc9651d17b22d7d092020f73d100115fed606c66c84318df7895b1e5780f3c785bfb92571cf1bc9", @ANYRES32=0x0, @ANYRES32, @ANYRES32=0x0], &(0x7f0000000300)=0x18) r5 = socket(0x1, 0x803, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8936, &(0x7f0000000080)={@rand_addr=' \x01\x00', 0x44, r4}) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) r7 = socket(0x10, 0x8000000803, 0x0) sendmsg$nl_route(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000a00)=@newlink={0x7c, 0x10, 0x401, 0x3001, 0x0, {0x0, 0x0, 0x0, 0x0, 0x534ad, 0x42a03}, [@IFLA_LINKINFO={0x4c, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x3c, 0x2, 0x0, 0x1, [@IFLA_IPVLAN_MODE={0x6, 0x1, 0x2}, @IFLA_IPVLAN_FLAGS={0x6, 0x2, 0x2}, @IFLA_IPVLAN_FLAGS={0x6, 0x2, 0x1}, @IFLA_IPVLAN_FLAGS={0x6, 0x2, 0x2}, @IFLA_IPVLAN_FLAGS={0x6, 0x2, 0x3}, @IFLA_IPVLAN_MODE={0x6}, @IFLA_IPVLAN_FLAGS={0x6, 0x2, 0x2}]}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x7c}}, 0x0) [ 527.636334][T21436] FAULT_INJECTION: forcing a failure. [ 527.636334][T21436] name failslab, interval 1, probability 0, space 0, times 0 18:12:19 executing program 3: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$FS_IOC_RESVSP(r0, 0x402c5828, &(0x7f00000000c0)={0x0, 0x1, 0xa8f, 0x3078}) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x200000000}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x9) preadv(r1, &(0x7f0000000240)=[{&(0x7f0000000040)=""/94, 0x5e}, {&(0x7f00000000c0)=""/93, 0x5d}, {&(0x7f0000000140)=""/58, 0x3a}], 0x3, 0xd9f, 0x0) openat(0xffffffffffffffff, &(0x7f0000002340)='./file0\x00', 0x0, 0x108) socket$packet(0x11, 0x3, 0x300) [ 527.689378][T21436] CPU: 0 PID: 21436 Comm: syz-executor.2 Not tainted 5.16.0-rc5-syzkaller #0 [ 527.698270][T21436] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 527.708352][T21436] Call Trace: [ 527.711686][T21436] [ 527.714629][T21436] dump_stack_lvl+0x201/0x2d8 [ 527.719332][T21436] ? show_regs_print_info+0x12/0x12 [ 527.724561][T21436] ? log_buf_vmcoreinfo_setup+0x498/0x498 [ 527.730570][T21436] ? __might_sleep+0xe0/0xe0 18:12:19 executing program 1: syz_mount_image$ntfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x48, 0x0, &(0x7f00000000c0), 0x218400, &(0x7f00000013c0)) [ 527.735180][T21436] ? rcu_read_lock_sched_held+0x89/0x130 [ 527.740838][T21436] should_fail+0x384/0x4b0 [ 527.745283][T21436] ? tomoyo_realpath_from_path+0xd8/0x610 [ 527.751020][T21436] should_failslab+0x5/0x20 [ 527.755543][T21436] __kmalloc+0x94/0x380 [ 527.759715][T21436] ? kfree+0x2f/0x330 [ 527.763726][T21436] tomoyo_realpath_from_path+0xd8/0x610 [ 527.769296][T21436] ? memset+0x1f/0x40 [ 527.773308][T21436] tomoyo_check_open_permission+0x22f/0x490 [ 527.779322][T21436] ? tomoyo_check_path_number_acl+0x270/0x270 [ 527.785426][T21436] ? rcu_read_lock_sched_held+0x89/0x130 [ 527.791122][T21436] ? __lock_acquire+0x2b00/0x2b00 [ 527.796273][T21436] ? hook_file_open+0xed/0x220 [ 527.801152][T21436] ? tomoyo_file_open+0xe6/0x170 [ 527.806118][T21436] security_file_open+0x50/0x570 [ 527.811172][T21436] do_dentry_open+0x350/0x1020 [ 527.815988][T21436] path_openat+0x2896/0x3660 [ 527.820642][T21436] ? do_filp_open+0x4f0/0x4f0 [ 527.825358][T21436] ? rcu_read_lock_sched_held+0x89/0x130 [ 527.831026][T21436] ? __bpf_trace_rcu_stall_warning+0x10/0x10 [ 527.837052][T21436] do_filp_open+0x277/0x4f0 [ 527.841591][T21436] ? vfs_tmpfile+0x230/0x230 [ 527.846202][T21436] ? alloc_fd+0x5e1/0x680 [ 527.850582][T21436] ? _raw_spin_unlock+0x24/0x40 [ 527.855457][T21436] ? alloc_fd+0x5e1/0x680 [ 527.859829][T21436] do_sys_openat2+0x13b/0x500 [ 527.864539][T21436] ? do_sys_open+0x220/0x220 [ 527.869173][T21436] __x64_sys_openat+0x243/0x290 [ 527.874063][T21436] ? __ia32_sys_open+0x270/0x270 [ 527.879038][T21436] ? syscall_enter_from_user_mode+0x2e/0x1b0 [ 527.885043][T21436] ? lockdep_hardirqs_on+0x95/0x140 [ 527.890269][T21436] ? syscall_enter_from_user_mode+0x2e/0x1b0 [ 527.896275][T21436] do_syscall_64+0x44/0xd0 [ 527.900720][T21436] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 527.901360][T21439] 8021q: adding VLAN 0 to HW filter on device ipvlan26 [ 527.906635][T21436] RIP: 0033:0x7f3831fa1db4 [ 527.906673][T21436] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 18:12:19 executing program 5: r0 = syz_io_uring_setup(0x3ede, &(0x7f0000000240), &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) socket$l2tp6(0xa, 0x2, 0x73) openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/locks\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READ=@pass_buffer={0x16, 0x0, 0x0, @fd_index=0x5, 0xffffffffffffffff, &(0x7f0000000040)=""/17, 0x11}, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000002040)=[{{&(0x7f0000001380)=@in6={0xa, 0x0, 0x0, @private0}, 0x80, 0x0}}], 0x1, 0x0) io_uring_enter(r0, 0x14, 0x0, 0x0, 0x0, 0x0) 18:12:19 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="b4050000000000006110580000000000c60000000000000095000002000000002ac73fe427abdf478e0357f2d32986f50b892b5007921cd48fe43b23be60a2dbc9778bb665510e3e22fcb26adfdc05e55a4933e62a23abb4baca4ec89323257db59db5eeda384459dd00d41b6aab85df5cab39e726769e2291b626d120a9247579f0b8edd8f16683e0623366ac632c24921d21534237743354f09cc29be2f72dfa8b05320110bcea53bb038c"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x0, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x5, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) [ 527.906691][T21436] RSP: 002b:00007f3830963eb0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 527.906716][T21436] RAX: ffffffffffffffda RBX: 00007f38320389c8 RCX: 00007f3831fa1db4 [ 527.906731][T21436] RDX: 0000000000000002 RSI: 00007f3830963fe0 RDI: 00000000ffffff9c [ 527.906744][T21436] RBP: 00007f3830963fe0 R08: 0000000000000000 R09: 00007f38309641d0 [ 527.906758][T21436] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 527.906771][T21436] R13: 0000000000000004 R14: 00000000200000c0 R15: 0000000000000000 [ 527.906801][T21436] 18:12:19 executing program 3: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$FS_IOC_RESVSP(r0, 0x402c5828, &(0x7f00000000c0)={0x0, 0x1, 0xa8f, 0x3078}) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x200000000}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x9) preadv(r1, &(0x7f0000000240)=[{&(0x7f0000000040)=""/94, 0x5e}, {&(0x7f00000000c0)=""/93, 0x5d}, {&(0x7f0000000140)=""/58, 0x3a}], 0x3, 0xd9f, 0x0) openat(0xffffffffffffffff, &(0x7f0000002340)='./file0\x00', 0x0, 0x108) 18:12:19 executing program 1: syz_mount_image$ntfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x4c, 0x0, &(0x7f00000000c0), 0x218400, &(0x7f00000013c0)) 18:12:19 executing program 5: r0 = syz_io_uring_setup(0x3ede, &(0x7f0000000240), &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) socket$l2tp6(0xa, 0x2, 0x73) openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/locks\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READ=@pass_buffer={0x16, 0x0, 0x0, @fd_index=0x5, 0xffffffffffffffff, &(0x7f0000000040)=""/17, 0x11}, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000002040)=[{{&(0x7f0000001380)=@in6={0xa, 0x0, 0x0, @private0}, 0x80, 0x0}}], 0x1, 0x0) io_uring_enter(r0, 0x15, 0x0, 0x0, 0x0, 0x0) [ 528.116137][T21436] ERROR: Out of memory at tomoyo_realpath_from_path. 18:12:19 executing program 3: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$FS_IOC_RESVSP(r0, 0x402c5828, &(0x7f00000000c0)={0x0, 0x1, 0xa8f, 0x3078}) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x200000000}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x9) preadv(r1, &(0x7f0000000240)=[{&(0x7f0000000040)=""/94, 0x5e}, {&(0x7f00000000c0)=""/93, 0x5d}, {&(0x7f0000000140)=""/58, 0x3a}], 0x3, 0xd9f, 0x0) [ 528.164973][T21436] ntfs: (device loop2): ntfs_fill_super(): Unable to determine device size. [ 528.193168][T21439] team0: Device ipvlan26 is already an upper device of the team interface 18:12:19 executing program 2: syz_mount_image$ntfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f00000013c0)={[{@fmask}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'syzkaller1\x00'}}]}) (fail_nth: 15) 18:12:19 executing program 1: syz_mount_image$ntfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x5c, 0x0, &(0x7f00000000c0), 0x218400, &(0x7f00000013c0)) 18:12:19 executing program 5: r0 = syz_io_uring_setup(0x3ede, &(0x7f0000000240), &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) socket$l2tp6(0xa, 0x2, 0x73) openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/locks\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READ=@pass_buffer={0x16, 0x0, 0x0, @fd_index=0x5, 0xffffffffffffffff, &(0x7f0000000040)=""/17, 0x11}, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000002040)=[{{&(0x7f0000001380)=@in6={0xa, 0x0, 0x0, @private0}, 0x80, 0x0}}], 0x1, 0x0) io_uring_enter(r0, 0x16, 0x0, 0x0, 0x0, 0x0) 18:12:19 executing program 0: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$FS_IOC_RESVSP(r0, 0x402c5828, &(0x7f00000000c0)={0x0, 0x1, 0xa8f, 0x3078}) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x200000000}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x9) preadv(r1, &(0x7f0000000240)=[{&(0x7f0000000040)=""/94, 0x5e}, {&(0x7f00000000c0)=""/93, 0x5d}, {&(0x7f0000000140)=""/58, 0x3a}], 0x3, 0xd9f, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000002340)='./file0\x00', 0x0, 0x108) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000180)={'team0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @local}, 0x14) writev(r2, &(0x7f0000000280)=[{&(0x7f00000008c0)="110eaa1a9896d57019effc8c79961d0f73ccf3afca3754e2e7a31f536bcb7204bed59311e29c96e1c2b663d61e5b0c0a76ea50cbddaa69f578b8600f77cf1a538ac900673696245b6de4283c979a2eccd71f9583dacf650575d1398678895da32663735b4d0cabfe7e972e59c2b4b4c9c89d0b82ca2267ad5062303e8abcb79600010506702eb912e3957e507aec4e2180699a738f6753509a12282a1d7181887f6c2e03de1da0dfe3b4efbb10e9b59301b4ef8a1d", 0xb5}, {&(0x7f0000000980)="34c30d95766fefbb7bdc40a3242505587bbc8584c2bc2003185f5ce116eea020efa91e2aae1eae2b8e848ac13c3dcedbbbc82adb1e70be8eecedba37be82545f2abda4f0a0e0fd0edd6bd03bb8e9bb91c39a2c828511aef3e684ad4c21ec0c146b9570139e31cd", 0x67}], 0x2) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'macvtap0\x00'}) ioctl$PPPIOCSFLAGS1(0xffffffffffffffff, 0x40047459, &(0x7f00000001c0)) recvmmsg(0xffffffffffffffff, &(0x7f0000002200)=[{{&(0x7f0000000340)=@in={0x2, 0x0, @multicast1}, 0x80, &(0x7f0000000440)=[{&(0x7f00000004c0)=""/88, 0x58}, {&(0x7f0000000b40)=""/4096, 0x1000}], 0x2, &(0x7f0000000740)=""/192, 0xc0}, 0x3}, {{&(0x7f0000000800)=@sco={0x1f, @none}, 0x80, &(0x7f0000000480)=[{&(0x7f0000001b40)=""/82, 0x52}], 0x1, &(0x7f0000001bc0)=""/206, 0xce}, 0x7}, {{&(0x7f0000001cc0)=@in={0x2, 0x0, @broadcast}, 0x80, &(0x7f0000000880)=[{&(0x7f0000001d40)=""/146, 0x92}, {&(0x7f0000001e00)=""/231, 0xe7}], 0x2, &(0x7f0000001f00)=""/239, 0xef}, 0x3}, {{&(0x7f0000002000)=@xdp, 0x80, &(0x7f00000020c0)=[{&(0x7f0000002080)=""/58, 0x3a}], 0x1, &(0x7f0000002100)=""/251, 0xfb}, 0x9}], 0x4, 0x40, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000002380)=ANY=[@ANYBLOB="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", @ANYRESDEC=r0, @ANYBLOB="b21b22b0b59f1a76abb6323c16886f3d2569d595dca4af1ac9160b24b62e47302e148fa17433c275945e36a713e5fad2e8abc9651d17b22d7d092020f73d100115fed606c66c84318df7895b1e5780f3c785bfb92571cf1bc9", @ANYRES32=0x0, @ANYRES32, @ANYRES32=0x0], &(0x7f0000000300)=0x18) r5 = socket(0x1, 0x803, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8936, &(0x7f0000000080)={@rand_addr=' \x01\x00', 0x44, r4}) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) r7 = socket(0x10, 0x8000000803, 0x0) sendmsg$nl_route(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000a00)=@newlink={0x7c, 0x10, 0x401, 0x3001, 0x0, {0x0, 0x0, 0x0, 0x0, 0x534ad, 0x42a03}, [@IFLA_LINKINFO={0x4c, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x3c, 0x2, 0x0, 0x1, [@IFLA_IPVLAN_MODE={0x6, 0x1, 0x2}, @IFLA_IPVLAN_FLAGS={0x6, 0x2, 0x2}, @IFLA_IPVLAN_FLAGS={0x6, 0x2, 0x1}, @IFLA_IPVLAN_FLAGS={0x6, 0x2, 0x2}, @IFLA_IPVLAN_FLAGS={0x6, 0x2, 0x3}, @IFLA_IPVLAN_MODE={0x6}, @IFLA_IPVLAN_FLAGS={0x6, 0x2, 0x2}]}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x7c}}, 0x0) 18:12:19 executing program 3: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$FS_IOC_RESVSP(r0, 0x402c5828, &(0x7f00000000c0)={0x0, 0x1, 0xa8f, 0x3078}) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x200000000}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x9) 18:12:19 executing program 1: syz_mount_image$ntfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x68, 0x0, &(0x7f00000000c0), 0x218400, &(0x7f00000013c0)) [ 528.420064][T21463] FAULT_INJECTION: forcing a failure. [ 528.420064][T21463] name failslab, interval 1, probability 0, space 0, times 0 18:12:19 executing program 5: r0 = syz_io_uring_setup(0x3ede, &(0x7f0000000240), &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) socket$l2tp6(0xa, 0x2, 0x73) openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/locks\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READ=@pass_buffer={0x16, 0x0, 0x0, @fd_index=0x5, 0xffffffffffffffff, &(0x7f0000000040)=""/17, 0x11}, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000002040)=[{{&(0x7f0000001380)=@in6={0xa, 0x0, 0x0, @private0}, 0x80, 0x0}}], 0x1, 0x0) io_uring_enter(r0, 0x17, 0x0, 0x0, 0x0, 0x0) [ 528.512274][T21463] CPU: 0 PID: 21463 Comm: syz-executor.2 Not tainted 5.16.0-rc5-syzkaller #0 [ 528.521186][T21463] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 528.531265][T21463] Call Trace: [ 528.534565][T21463] [ 528.537514][T21463] dump_stack_lvl+0x201/0x2d8 [ 528.542226][T21463] ? show_regs_print_info+0x12/0x12 [ 528.547455][T21463] ? log_buf_vmcoreinfo_setup+0x498/0x498 [ 528.553211][T21463] ? __might_sleep+0xe0/0xe0 [ 528.557843][T21463] should_fail+0x384/0x4b0 [ 528.562292][T21463] ? tomoyo_encode2+0x25a/0x560 [ 528.567169][T21463] should_failslab+0x5/0x20 [ 528.571692][T21463] __kmalloc+0x94/0x380 [ 528.575872][T21463] ? prepend_path+0xb70/0xb70 [ 528.580582][T21463] tomoyo_encode2+0x25a/0x560 [ 528.585292][T21463] tomoyo_realpath_from_path+0x5c3/0x610 [ 528.590946][T21463] ? memset+0x1f/0x40 [ 528.594940][T21463] tomoyo_check_open_permission+0x22f/0x490 [ 528.600839][T21463] ? tomoyo_check_path_number_acl+0x270/0x270 [ 528.606910][T21463] ? rcu_read_lock_sched_held+0x89/0x130 [ 528.612561][T21463] ? __lock_acquire+0x2b00/0x2b00 [ 528.617583][T21463] ? hook_file_open+0xed/0x220 [ 528.622344][T21463] ? tomoyo_file_open+0xe6/0x170 [ 528.627286][T21463] security_file_open+0x50/0x570 [ 528.632225][T21463] do_dentry_open+0x350/0x1020 [ 528.636992][T21463] path_openat+0x2896/0x3660 [ 528.641611][T21463] ? do_filp_open+0x4f0/0x4f0 [ 528.646299][T21463] ? rcu_read_lock_sched_held+0x89/0x130 [ 528.651928][T21463] ? __bpf_trace_rcu_stall_warning+0x10/0x10 [ 528.657914][T21463] do_filp_open+0x277/0x4f0 [ 528.662421][T21463] ? vfs_tmpfile+0x230/0x230 [ 528.667005][T21463] ? alloc_fd+0x5e1/0x680 [ 528.671345][T21463] ? _raw_spin_unlock+0x24/0x40 [ 528.676276][T21463] ? alloc_fd+0x5e1/0x680 [ 528.680623][T21463] do_sys_openat2+0x13b/0x500 [ 528.685337][T21463] ? do_sys_open+0x220/0x220 [ 528.690137][T21463] __x64_sys_openat+0x243/0x290 [ 528.695099][T21463] ? __ia32_sys_open+0x270/0x270 [ 528.700049][T21463] ? syscall_enter_from_user_mode+0x2e/0x1b0 [ 528.706034][T21463] ? lockdep_hardirqs_on+0x95/0x140 [ 528.711231][T21463] ? syscall_enter_from_user_mode+0x2e/0x1b0 [ 528.717216][T21463] do_syscall_64+0x44/0xd0 [ 528.721629][T21463] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 528.727531][T21463] RIP: 0033:0x7f3831fa1db4 [ 528.732203][T21463] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 528.751796][T21463] RSP: 002b:00007f3830963eb0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 528.760200][T21463] RAX: ffffffffffffffda RBX: 00007f38320389c8 RCX: 00007f3831fa1db4 [ 528.768185][T21463] RDX: 0000000000000002 RSI: 00007f3830963fe0 RDI: 00000000ffffff9c [ 528.776181][T21463] RBP: 00007f3830963fe0 R08: 0000000000000000 R09: 00007f38309641d0 [ 528.784141][T21463] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 528.792098][T21463] R13: 0000000000000004 R14: 00000000200000c0 R15: 0000000000000000 [ 528.800072][T21463] [ 528.872275][T21469] 8021q: adding VLAN 0 to HW filter on device ipvlan26 [ 528.893210][T21463] ERROR: Out of memory at tomoyo_realpath_from_path. 18:12:20 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="b4050000000000006110580000000000c60000000000000095000002000000002ac73fe427abdf478e0357f2d32986f50b892b5007921cd48fe43b23be60a2dbc9778bb665510e3e22fcb26adfdc05e55a4933e62a23abb4baca4ec89323257db59db5eeda384459dd00d41b6aab85df5cab39e726769e2291b626d120a9247579f0b8edd8f16683e0623366ac632c24921d21534237743354f09cc29be2f72dfa8b05320110bcea53bb038c"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x0, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x5, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) 18:12:20 executing program 3: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$FS_IOC_RESVSP(r0, 0x402c5828, &(0x7f00000000c0)={0x0, 0x1, 0xa8f, 0x3078}) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x200000000}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x9) 18:12:20 executing program 1: syz_mount_image$ntfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x6c, 0x0, &(0x7f00000000c0), 0x218400, &(0x7f00000013c0)) 18:12:20 executing program 5: r0 = syz_io_uring_setup(0x3ede, &(0x7f0000000240), &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) socket$l2tp6(0xa, 0x2, 0x73) openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/locks\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READ=@pass_buffer={0x16, 0x0, 0x0, @fd_index=0x5, 0xffffffffffffffff, &(0x7f0000000040)=""/17, 0x11}, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000002040)=[{{&(0x7f0000001380)=@in6={0xa, 0x0, 0x0, @private0}, 0x80, 0x0}}], 0x1, 0x0) io_uring_enter(r0, 0x18, 0x0, 0x0, 0x0, 0x0) [ 528.935076][T21469] team0: Device ipvlan26 is already an upper device of the team interface [ 528.957173][T21463] ntfs: (device loop2): ntfs_fill_super(): Unable to determine device size. 18:12:20 executing program 3: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$FS_IOC_RESVSP(r0, 0x402c5828, &(0x7f00000000c0)={0x0, 0x1, 0xa8f, 0x3078}) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x200000000}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) 18:12:20 executing program 2: syz_mount_image$ntfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f00000013c0)={[{@fmask}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'syzkaller1\x00'}}]}) (fail_nth: 16) 18:12:20 executing program 1: syz_mount_image$ntfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x74, 0x0, &(0x7f00000000c0), 0x218400, &(0x7f00000013c0)) 18:12:20 executing program 5: r0 = syz_io_uring_setup(0x3ede, &(0x7f0000000240), &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) socket$l2tp6(0xa, 0x2, 0x73) openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/locks\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READ=@pass_buffer={0x16, 0x0, 0x0, @fd_index=0x5, 0xffffffffffffffff, &(0x7f0000000040)=""/17, 0x11}, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000002040)=[{{&(0x7f0000001380)=@in6={0xa, 0x0, 0x0, @private0}, 0x80, 0x0}}], 0x1, 0x0) io_uring_enter(r0, 0x19, 0x0, 0x0, 0x0, 0x0) 18:12:20 executing program 0: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$FS_IOC_RESVSP(r0, 0x402c5828, &(0x7f00000000c0)={0x0, 0x1, 0xa8f, 0x3078}) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x200000000}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x9) preadv(r1, &(0x7f0000000240)=[{&(0x7f0000000040)=""/94, 0x5e}, {&(0x7f00000000c0)=""/93, 0x5d}, {&(0x7f0000000140)=""/58, 0x3a}], 0x3, 0xd9f, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000002340)='./file0\x00', 0x0, 0x108) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000180)={'team0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @local}, 0x14) writev(r2, &(0x7f0000000280)=[{&(0x7f00000008c0)="110eaa1a9896d57019effc8c79961d0f73ccf3afca3754e2e7a31f536bcb7204bed59311e29c96e1c2b663d61e5b0c0a76ea50cbddaa69f578b8600f77cf1a538ac900673696245b6de4283c979a2eccd71f9583dacf650575d1398678895da32663735b4d0cabfe7e972e59c2b4b4c9c89d0b82ca2267ad5062303e8abcb79600010506702eb912e3957e507aec4e2180699a738f6753509a12282a1d7181887f6c2e03de1da0dfe3b4efbb10e9b59301b4ef8a1d", 0xb5}, {&(0x7f0000000980)="34c30d95766fefbb7bdc40a3242505587bbc8584c2bc2003185f5ce116eea020efa91e2aae1eae2b8e848ac13c3dcedbbbc82adb1e70be8eecedba37be82545f2abda4f0a0e0fd0edd6bd03bb8e9bb91c39a2c828511aef3e684ad4c21ec0c146b9570139e31cd", 0x67}], 0x2) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'macvtap0\x00'}) ioctl$PPPIOCSFLAGS1(0xffffffffffffffff, 0x40047459, &(0x7f00000001c0)) recvmmsg(0xffffffffffffffff, &(0x7f0000002200)=[{{&(0x7f0000000340)=@in={0x2, 0x0, @multicast1}, 0x80, &(0x7f0000000440)=[{&(0x7f00000004c0)=""/88, 0x58}, {&(0x7f0000000b40)=""/4096, 0x1000}], 0x2, &(0x7f0000000740)=""/192, 0xc0}, 0x3}, {{&(0x7f0000000800)=@sco={0x1f, @none}, 0x80, &(0x7f0000000480)=[{&(0x7f0000001b40)=""/82, 0x52}], 0x1, &(0x7f0000001bc0)=""/206, 0xce}, 0x7}, {{&(0x7f0000001cc0)=@in={0x2, 0x0, @broadcast}, 0x80, &(0x7f0000000880)=[{&(0x7f0000001d40)=""/146, 0x92}, {&(0x7f0000001e00)=""/231, 0xe7}], 0x2, &(0x7f0000001f00)=""/239, 0xef}, 0x3}, {{&(0x7f0000002000)=@xdp, 0x80, &(0x7f00000020c0)=[{&(0x7f0000002080)=""/58, 0x3a}], 0x1, &(0x7f0000002100)=""/251, 0xfb}, 0x9}], 0x4, 0x40, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000002380)=ANY=[@ANYBLOB="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", @ANYRESDEC=r0, @ANYBLOB="b21b22b0b59f1a76abb6323c16886f3d2569d595dca4af1ac9160b24b62e47302e148fa17433c275945e36a713e5fad2e8abc9651d17b22d7d092020f73d100115fed606c66c84318df7895b1e5780f3c785bfb92571cf1bc9", @ANYRES32=0x0, @ANYRES32, @ANYRES32=0x0], &(0x7f0000000300)=0x18) r5 = socket(0x1, 0x803, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8936, &(0x7f0000000080)={@rand_addr=' \x01\x00', 0x44, r4}) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) r7 = socket(0x10, 0x8000000803, 0x0) sendmsg$nl_route(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000a00)=@newlink={0x7c, 0x10, 0x401, 0x3001, 0x25dfdbfc, {0x0, 0x0, 0x0, 0x0, 0x0, 0x42a03}, [@IFLA_LINKINFO={0x4c, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x3c, 0x2, 0x0, 0x1, [@IFLA_IPVLAN_MODE={0x6, 0x1, 0x2}, @IFLA_IPVLAN_FLAGS={0x6, 0x2, 0x2}, @IFLA_IPVLAN_FLAGS={0x6, 0x2, 0x1}, @IFLA_IPVLAN_FLAGS={0x6, 0x2, 0x2}, @IFLA_IPVLAN_FLAGS={0x6, 0x2, 0x3}, @IFLA_IPVLAN_MODE={0x6}, @IFLA_IPVLAN_FLAGS={0x6, 0x2, 0x2}]}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x7c}}, 0x0) [ 529.186380][T21487] FAULT_INJECTION: forcing a failure. [ 529.186380][T21487] name failslab, interval 1, probability 0, space 0, times 0 [ 529.227986][T21487] CPU: 0 PID: 21487 Comm: syz-executor.2 Not tainted 5.16.0-rc5-syzkaller #0 [ 529.236792][T21487] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 529.246867][T21487] Call Trace: [ 529.250158][T21487] [ 529.253104][T21487] dump_stack_lvl+0x201/0x2d8 [ 529.257811][T21487] ? show_regs_print_info+0x12/0x12 [ 529.263016][T21487] ? log_buf_vmcoreinfo_setup+0x498/0x498 [ 529.268738][T21487] ? __might_sleep+0xe0/0xe0 [ 529.273322][T21487] ? rcu_read_lock_sched_held+0x89/0x130 [ 529.278963][T21487] should_fail+0x384/0x4b0 [ 529.283381][T21487] ? tomoyo_realpath_from_path+0xd8/0x610 [ 529.289121][T21487] should_failslab+0x5/0x20 [ 529.293615][T21487] __kmalloc+0x94/0x380 [ 529.297795][T21487] ? kfree+0x2f/0x330 [ 529.301798][T21487] tomoyo_realpath_from_path+0xd8/0x610 [ 529.307347][T21487] tomoyo_path_number_perm+0x219/0x7c0 [ 529.312897][T21487] ? tomoyo_check_path_acl+0x1c0/0x1c0 [ 529.318392][T21487] security_file_ioctl+0x55/0xb0 [ 529.323326][T21487] __se_sys_ioctl+0x48/0x170 [ 529.327909][T21487] do_syscall_64+0x44/0xd0 [ 529.332322][T21487] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 529.338467][T21487] RIP: 0033:0x7f3831feec57 [ 529.342876][T21487] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 04 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 529.362479][T21487] RSP: 002b:00007f3830963f28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 529.370921][T21487] RAX: ffffffffffffffda RBX: 00007f38320389c8 RCX: 00007f3831feec57 18:12:20 executing program 5: r0 = syz_io_uring_setup(0x3ede, &(0x7f0000000240), &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) socket$l2tp6(0xa, 0x2, 0x73) openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/locks\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READ=@pass_buffer={0x16, 0x0, 0x0, @fd_index=0x5, 0xffffffffffffffff, &(0x7f0000000040)=""/17, 0x11}, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000002040)=[{{&(0x7f0000001380)=@in6={0xa, 0x0, 0x0, @private0}, 0x80, 0x0}}], 0x1, 0x0) io_uring_enter(r0, 0x1a, 0x0, 0x0, 0x0, 0x0) [ 529.378905][T21487] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 529.386874][T21487] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007f38309641d0 [ 529.394847][T21487] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 529.402828][T21487] R13: 0000000000000004 R14: 00000000200000c0 R15: 0000000000000000 [ 529.410809][T21487] 18:12:20 executing program 1: syz_mount_image$ntfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x7a, 0x0, &(0x7f00000000c0), 0x218400, &(0x7f00000013c0)) [ 529.443716][T21487] ERROR: Out of memory at tomoyo_realpath_from_path. [ 529.466425][T21492] team0: Device ipvlan26 is already an upper device of the team interface 18:12:20 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="b4050000000000006110580000000000c60000000000000095000002000000002ac73fe427abdf478e0357f2d32986f50b892b5007921cd48fe43b23be60a2dbc9778bb665510e3e22fcb26adfdc05e55a4933e62a23abb4baca4ec89323257db59db5eeda384459dd00d41b6aab85df5cab39e726769e2291b626d120a9247579f0b8edd8f16683e0623366ac632c24921d21534237743354f09cc29be2f72dfa8b05320110bcea53bb038c"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x0, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x5, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) [ 529.488587][T21487] ntfs: (device loop2): ntfs_fill_super(): Unable to determine device size. 18:12:21 executing program 3: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$FS_IOC_RESVSP(r0, 0x402c5828, &(0x7f00000000c0)={0x0, 0x1, 0xa8f, 0x3078}) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x200000000}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) 18:12:21 executing program 5: r0 = syz_io_uring_setup(0x3ede, &(0x7f0000000240), &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) socket$l2tp6(0xa, 0x2, 0x73) openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/locks\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READ=@pass_buffer={0x16, 0x0, 0x0, @fd_index=0x5, 0xffffffffffffffff, &(0x7f0000000040)=""/17, 0x11}, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000002040)=[{{&(0x7f0000001380)=@in6={0xa, 0x0, 0x0, @private0}, 0x80, 0x0}}], 0x1, 0x0) io_uring_enter(r0, 0x1b, 0x0, 0x0, 0x0, 0x0) 18:12:21 executing program 2: syz_mount_image$ntfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f00000013c0)={[{@fmask}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'syzkaller1\x00'}}]}) (fail_nth: 17) 18:12:21 executing program 1: syz_mount_image$ntfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0xdb, 0x0, &(0x7f00000000c0), 0x218400, &(0x7f00000013c0)) 18:12:21 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="b4050000000000006110580000000000c60000000000000095000002000000002ac73fe427abdf478e0357f2d32986f50b892b5007921cd48fe43b23be60a2dbc9778bb665510e3e22fcb26adfdc05e55a4933e62a23abb4baca4ec89323257db59db5eeda384459dd00d41b6aab85df5cab39e726769e2291b626d120a9247579f0b8edd8f16683e0623366ac632c24921d21534237743354f09cc29be2f72dfa8b05320110bcea53bb038c"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x0, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x5, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) 18:12:21 executing program 5: r0 = syz_io_uring_setup(0x3ede, &(0x7f0000000240), &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) socket$l2tp6(0xa, 0x2, 0x73) openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/locks\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READ=@pass_buffer={0x16, 0x0, 0x0, @fd_index=0x5, 0xffffffffffffffff, &(0x7f0000000040)=""/17, 0x11}, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000002040)=[{{&(0x7f0000001380)=@in6={0xa, 0x0, 0x0, @private0}, 0x80, 0x0}}], 0x1, 0x0) io_uring_enter(r0, 0x1c, 0x0, 0x0, 0x0, 0x0) [ 529.676500][T21504] FAULT_INJECTION: forcing a failure. [ 529.676500][T21504] name failslab, interval 1, probability 0, space 0, times 0 [ 529.773288][T21504] CPU: 0 PID: 21504 Comm: syz-executor.2 Not tainted 5.16.0-rc5-syzkaller #0 [ 529.782104][T21504] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 529.792188][T21504] Call Trace: [ 529.795489][T21504] [ 529.798438][T21504] dump_stack_lvl+0x201/0x2d8 [ 529.803143][T21504] ? show_regs_print_info+0x12/0x12 [ 529.808367][T21504] ? log_buf_vmcoreinfo_setup+0x498/0x498 [ 529.814115][T21504] ? __might_sleep+0xe0/0xe0 [ 529.818743][T21504] should_fail+0x384/0x4b0 [ 529.823187][T21504] ? tomoyo_encode2+0x25a/0x560 [ 529.828052][T21504] should_failslab+0x5/0x20 [ 529.832569][T21504] __kmalloc+0x94/0x380 [ 529.836750][T21504] ? prepend_path+0xb70/0xb70 [ 529.841452][T21504] tomoyo_encode2+0x25a/0x560 [ 529.846157][T21504] tomoyo_realpath_from_path+0x5c3/0x610 [ 529.851866][T21504] tomoyo_path_number_perm+0x219/0x7c0 [ 529.857361][T21504] ? tomoyo_check_path_acl+0x1c0/0x1c0 [ 529.862901][T21504] security_file_ioctl+0x55/0xb0 [ 529.867868][T21504] __se_sys_ioctl+0x48/0x170 [ 529.872468][T21504] do_syscall_64+0x44/0xd0 [ 529.876899][T21504] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 529.882790][T21504] RIP: 0033:0x7f3831feec57 [ 529.887204][T21504] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 04 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 529.907152][T21504] RSP: 002b:00007f3830963f28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 529.915589][T21504] RAX: ffffffffffffffda RBX: 00007f38320389c8 RCX: 00007f3831feec57 18:12:21 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="b4050000000000006110580000000000c60000000000000095000002000000002ac73fe427abdf478e0357f2d32986f50b892b5007921cd48fe43b23be60a2dbc9778bb665510e3e22fcb26adfdc05e55a4933e62a23abb4baca4ec89323257db59db5eeda384459dd00d41b6aab85df5cab39e726769e2291b626d120a9247579f0b8edd8f16683e0623366ac632c24921d21534237743354f09cc29be2f72dfa8b05320110bcea53bb038c"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x5, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) 18:12:21 executing program 1: syz_mount_image$ntfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0xe2, 0x0, &(0x7f00000000c0), 0x218400, &(0x7f00000013c0)) [ 529.923555][T21504] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 529.931520][T21504] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007f38309641d0 [ 529.939484][T21504] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 529.947448][T21504] R13: 0000000000000004 R14: 00000000200000c0 R15: 0000000000000000 [ 529.955473][T21504] 18:12:21 executing program 0: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$FS_IOC_RESVSP(r0, 0x402c5828, &(0x7f00000000c0)={0x0, 0x1, 0xa8f, 0x3078}) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x200000000}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x9) preadv(r1, &(0x7f0000000240)=[{&(0x7f0000000040)=""/94, 0x5e}, {&(0x7f00000000c0)=""/93, 0x5d}, {&(0x7f0000000140)=""/58, 0x3a}], 0x3, 0xd9f, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000002340)='./file0\x00', 0x0, 0x108) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000180)={'team0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @local}, 0x14) writev(r2, &(0x7f0000000280)=[{&(0x7f00000008c0)="110eaa1a9896d57019effc8c79961d0f73ccf3afca3754e2e7a31f536bcb7204bed59311e29c96e1c2b663d61e5b0c0a76ea50cbddaa69f578b8600f77cf1a538ac900673696245b6de4283c979a2eccd71f9583dacf650575d1398678895da32663735b4d0cabfe7e972e59c2b4b4c9c89d0b82ca2267ad5062303e8abcb79600010506702eb912e3957e507aec4e2180699a738f6753509a12282a1d7181887f6c2e03de1da0dfe3b4efbb10e9b59301b4ef8a1d", 0xb5}, {&(0x7f0000000980)="34c30d95766fefbb7bdc40a3242505587bbc8584c2bc2003185f5ce116eea020efa91e2aae1eae2b8e848ac13c3dcedbbbc82adb1e70be8eecedba37be82545f2abda4f0a0e0fd0edd6bd03bb8e9bb91c39a2c828511aef3e684ad4c21ec0c146b9570139e31cd", 0x67}], 0x2) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'macvtap0\x00'}) ioctl$PPPIOCSFLAGS1(0xffffffffffffffff, 0x40047459, &(0x7f00000001c0)) recvmmsg(0xffffffffffffffff, &(0x7f0000002200)=[{{&(0x7f0000000340)=@in={0x2, 0x0, @multicast1}, 0x80, &(0x7f0000000440)=[{&(0x7f00000004c0)=""/88, 0x58}, {&(0x7f0000000b40)=""/4096, 0x1000}], 0x2, &(0x7f0000000740)=""/192, 0xc0}, 0x3}, {{&(0x7f0000000800)=@sco={0x1f, @none}, 0x80, &(0x7f0000000480)=[{&(0x7f0000001b40)=""/82, 0x52}], 0x1, &(0x7f0000001bc0)=""/206, 0xce}, 0x7}, {{&(0x7f0000001cc0)=@in={0x2, 0x0, @broadcast}, 0x80, &(0x7f0000000880)=[{&(0x7f0000001d40)=""/146, 0x92}, {&(0x7f0000001e00)=""/231, 0xe7}], 0x2, &(0x7f0000001f00)=""/239, 0xef}, 0x3}, {{&(0x7f0000002000)=@xdp, 0x80, &(0x7f00000020c0)=[{&(0x7f0000002080)=""/58, 0x3a}], 0x1, &(0x7f0000002100)=""/251, 0xfb}, 0x9}], 0x4, 0x40, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000002380)=ANY=[@ANYBLOB="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", @ANYRESDEC=r0, @ANYBLOB="b21b22b0b59f1a76abb6323c16886f3d2569d595dca4af1ac9160b24b62e47302e148fa17433c275945e36a713e5fad2e8abc9651d17b22d7d092020f73d100115fed606c66c84318df7895b1e5780f3c785bfb92571cf1bc9", @ANYRES32=0x0, @ANYRES32, @ANYRES32=0x0], &(0x7f0000000300)=0x18) r5 = socket(0x1, 0x803, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8936, &(0x7f0000000080)={@rand_addr=' \x01\x00', 0x44, r4}) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) r7 = socket(0x10, 0x8000000803, 0x0) sendmsg$nl_route(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000a00)=@newlink={0x7c, 0x10, 0x401, 0x3001, 0x25dfdbfc, {0x0, 0x0, 0x0, 0x0, 0x0, 0x42a03}, [@IFLA_LINKINFO={0x4c, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x3c, 0x2, 0x0, 0x1, [@IFLA_IPVLAN_MODE={0x6, 0x1, 0x2}, @IFLA_IPVLAN_FLAGS={0x6, 0x2, 0x2}, @IFLA_IPVLAN_FLAGS={0x6, 0x2, 0x1}, @IFLA_IPVLAN_FLAGS={0x6, 0x2, 0x2}, @IFLA_IPVLAN_FLAGS={0x6, 0x2, 0x3}, @IFLA_IPVLAN_MODE={0x6}, @IFLA_IPVLAN_FLAGS={0x6, 0x2, 0x2}]}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x7c}}, 0x0) 18:12:21 executing program 3: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$FS_IOC_RESVSP(r0, 0x402c5828, &(0x7f00000000c0)={0x0, 0x1, 0xa8f, 0x3078}) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x200000000}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) 18:12:21 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="b4050000000000006110580000000000c60000000000000095000002000000002ac73fe427abdf478e0357f2d32986f50b892b5007921cd48fe43b23be60a2dbc9778bb665510e3e22fcb26adfdc05e55a4933e62a23abb4baca4ec89323257db59db5eeda384459dd00d41b6aab85df5cab39e726769e2291b626d120a9247579f0b8edd8f16683e0623366ac632c24921d21534237743354f09cc29be2f72dfa8b05320110bcea53bb038c"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x5, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) 18:12:21 executing program 5: r0 = syz_io_uring_setup(0x3ede, &(0x7f0000000240), &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) socket$l2tp6(0xa, 0x2, 0x73) openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/locks\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READ=@pass_buffer={0x16, 0x0, 0x0, @fd_index=0x5, 0xffffffffffffffff, &(0x7f0000000040)=""/17, 0x11}, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000002040)=[{{&(0x7f0000001380)=@in6={0xa, 0x0, 0x0, @private0}, 0x80, 0x0}}], 0x1, 0x0) io_uring_enter(r0, 0x1d, 0x0, 0x0, 0x0, 0x0) 18:12:21 executing program 1: syz_mount_image$ntfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0xea, 0x0, &(0x7f00000000c0), 0x218400, &(0x7f00000013c0)) [ 530.095824][T21504] ERROR: Out of memory at tomoyo_realpath_from_path. [ 530.120526][T21504] ntfs: (device loop2): ntfs_fill_super(): Unable to determine device size. 18:12:21 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="b4050000000000006110580000000000c60000000000000095000002000000002ac73fe427abdf478e0357f2d32986f50b892b5007921cd48fe43b23be60a2dbc9778bb665510e3e22fcb26adfdc05e55a4933e62a23abb4baca4ec89323257db59db5eeda384459dd00d41b6aab85df5cab39e726769e2291b626d120a9247579f0b8edd8f16683e0623366ac632c24921d21534237743354f09cc29be2f72dfa8b05320110bcea53bb038c"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x5, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) 18:12:21 executing program 2: syz_mount_image$ntfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f00000013c0)={[{@fmask}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'syzkaller1\x00'}}]}) (fail_nth: 18) 18:12:21 executing program 3: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$FS_IOC_RESVSP(r0, 0x402c5828, &(0x7f00000000c0)={0x0, 0x1, 0xa8f, 0x3078}) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x9) 18:12:21 executing program 5: r0 = syz_io_uring_setup(0x3ede, &(0x7f0000000240), &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) socket$l2tp6(0xa, 0x2, 0x73) openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/locks\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READ=@pass_buffer={0x16, 0x0, 0x0, @fd_index=0x5, 0xffffffffffffffff, &(0x7f0000000040)=""/17, 0x11}, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000002040)=[{{&(0x7f0000001380)=@in6={0xa, 0x0, 0x0, @private0}, 0x80, 0x0}}], 0x1, 0x0) io_uring_enter(r0, 0x1e, 0x0, 0x0, 0x0, 0x0) [ 530.249544][T21524] team0: Device ipvlan26 is already an upper device of the team interface 18:12:21 executing program 1: syz_mount_image$ntfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0xfe, 0x0, &(0x7f00000000c0), 0x218400, &(0x7f00000013c0)) 18:12:21 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="b4050000000000006110580000000000c60000000000000095000002000000002ac73fe427abdf478e0357f2d32986f50b892b5007921cd48fe43b23be60a2dbc9778bb665510e3e22fcb26adfdc05e55a4933e62a23abb4baca4ec89323257db59db5eeda384459dd00d41b6aab85df5cab39e726769e2291b626d120a9247579f0b8edd8f16683e0623366ac632c24921d21534237743354f09cc29be2f72dfa8b05320110bcea53bb038c"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, 0x0, 0x0) r1 = socket(0x1, 0x5, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r1}, 0x20) 18:12:21 executing program 3: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$FS_IOC_RESVSP(r0, 0x402c5828, &(0x7f00000000c0)={0x0, 0x1, 0xa8f, 0x3078}) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x9) 18:12:21 executing program 0: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$FS_IOC_RESVSP(r0, 0x402c5828, &(0x7f00000000c0)={0x0, 0x1, 0xa8f, 0x3078}) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x200000000}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x9) preadv(r1, &(0x7f0000000240)=[{&(0x7f0000000040)=""/94, 0x5e}, {&(0x7f00000000c0)=""/93, 0x5d}, {&(0x7f0000000140)=""/58, 0x3a}], 0x3, 0xd9f, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000002340)='./file0\x00', 0x0, 0x108) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000180)={'team0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @local}, 0x14) writev(r2, &(0x7f0000000280)=[{&(0x7f00000008c0)="110eaa1a9896d57019effc8c79961d0f73ccf3afca3754e2e7a31f536bcb7204bed59311e29c96e1c2b663d61e5b0c0a76ea50cbddaa69f578b8600f77cf1a538ac900673696245b6de4283c979a2eccd71f9583dacf650575d1398678895da32663735b4d0cabfe7e972e59c2b4b4c9c89d0b82ca2267ad5062303e8abcb79600010506702eb912e3957e507aec4e2180699a738f6753509a12282a1d7181887f6c2e03de1da0dfe3b4efbb10e9b59301b4ef8a1d", 0xb5}, {&(0x7f0000000980)="34c30d95766fefbb7bdc40a3242505587bbc8584c2bc2003185f5ce116eea020efa91e2aae1eae2b8e848ac13c3dcedbbbc82adb1e70be8eecedba37be82545f2abda4f0a0e0fd0edd6bd03bb8e9bb91c39a2c828511aef3e684ad4c21ec0c146b9570139e31cd", 0x67}], 0x2) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'macvtap0\x00'}) ioctl$PPPIOCSFLAGS1(0xffffffffffffffff, 0x40047459, &(0x7f00000001c0)) recvmmsg(0xffffffffffffffff, &(0x7f0000002200)=[{{&(0x7f0000000340)=@in={0x2, 0x0, @multicast1}, 0x80, &(0x7f0000000440)=[{&(0x7f00000004c0)=""/88, 0x58}, {&(0x7f0000000b40)=""/4096, 0x1000}], 0x2, &(0x7f0000000740)=""/192, 0xc0}, 0x3}, {{&(0x7f0000000800)=@sco={0x1f, @none}, 0x80, &(0x7f0000000480)=[{&(0x7f0000001b40)=""/82, 0x52}], 0x1, &(0x7f0000001bc0)=""/206, 0xce}, 0x7}, {{&(0x7f0000001cc0)=@in={0x2, 0x0, @broadcast}, 0x80, &(0x7f0000000880)=[{&(0x7f0000001d40)=""/146, 0x92}, {&(0x7f0000001e00)=""/231, 0xe7}], 0x2, &(0x7f0000001f00)=""/239, 0xef}, 0x3}, {{&(0x7f0000002000)=@xdp, 0x80, &(0x7f00000020c0)=[{&(0x7f0000002080)=""/58, 0x3a}], 0x1, &(0x7f0000002100)=""/251, 0xfb}, 0x9}], 0x4, 0x40, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000002380)=ANY=[@ANYBLOB="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", @ANYRESDEC=r0, @ANYBLOB="b21b22b0b59f1a76abb6323c16886f3d2569d595dca4af1ac9160b24b62e47302e148fa17433c275945e36a713e5fad2e8abc9651d17b22d7d092020f73d100115fed606c66c84318df7895b1e5780f3c785bfb92571cf1bc9", @ANYRES32=0x0, @ANYRES32, @ANYRES32=0x0], &(0x7f0000000300)=0x18) r5 = socket(0x1, 0x803, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8936, &(0x7f0000000080)={@rand_addr=' \x01\x00', 0x44, r4}) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) r7 = socket(0x10, 0x8000000803, 0x0) sendmsg$nl_route(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000a00)=@newlink={0x7c, 0x10, 0x401, 0x3001, 0x25dfdbfc, {0x0, 0x0, 0x0, 0x0, 0x0, 0x42a03}, [@IFLA_LINKINFO={0x4c, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x3c, 0x2, 0x0, 0x1, [@IFLA_IPVLAN_MODE={0x6, 0x1, 0x2}, @IFLA_IPVLAN_FLAGS={0x6, 0x2, 0x2}, @IFLA_IPVLAN_FLAGS={0x6, 0x2, 0x1}, @IFLA_IPVLAN_FLAGS={0x6, 0x2, 0x2}, @IFLA_IPVLAN_FLAGS={0x6, 0x2, 0x3}, @IFLA_IPVLAN_MODE={0x6}, @IFLA_IPVLAN_FLAGS={0x6, 0x2, 0x2}]}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x7c}}, 0x0) [ 530.403594][T21533] FAULT_INJECTION: forcing a failure. [ 530.403594][T21533] name failslab, interval 1, probability 0, space 0, times 0 [ 530.457177][T21533] CPU: 1 PID: 21533 Comm: syz-executor.2 Not tainted 5.16.0-rc5-syzkaller #0 [ 530.465972][T21533] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 530.476039][T21533] Call Trace: [ 530.479334][T21533] [ 530.482284][T21533] dump_stack_lvl+0x201/0x2d8 [ 530.487001][T21533] ? show_regs_print_info+0x12/0x12 [ 530.492237][T21533] ? log_buf_vmcoreinfo_setup+0x498/0x498 [ 530.497986][T21533] ? __might_sleep+0xe0/0xe0 [ 530.502613][T21533] should_fail+0x384/0x4b0 [ 530.507060][T21533] ? alloc_workqueue+0x18d/0x1470 [ 530.512194][T21533] should_failslab+0x5/0x20 [ 530.516715][T21533] __kmalloc+0x94/0x380 [ 530.520894][T21533] alloc_workqueue+0x18d/0x1470 [ 530.525762][T21533] ? _raw_spin_unlock+0x24/0x40 [ 530.530619][T21533] ? bd_prepare_to_claim+0x388/0x420 [ 530.536519][T21533] ? loop_attr_do_show_dio+0xc0/0xc0 [ 530.541862][T21533] ? loop_configure+0x220/0x1740 [ 530.546813][T21533] ? mutex_lock_io_nested+0x60/0x60 [ 530.552027][T21533] ? loop_configure+0x679/0x1740 [ 530.556972][T21533] ? apply_workqueue_attrs+0x170/0x170 [ 530.562430][T21533] ? __fget_files+0x3d0/0x440 [ 530.567112][T21533] loop_configure+0x721/0x1740 [ 530.571903][T21533] lo_ioctl+0x7d4/0x1f40 [ 530.576161][T21533] ? lo_release+0x1f0/0x1f0 [ 530.580665][T21533] ? rcu_read_lock_sched_held+0x89/0x130 [ 530.586293][T21533] ? __bpf_trace_rcu_stall_warning+0x10/0x10 [ 530.592289][T21533] ? rcu_lock_release+0x5/0x20 [ 530.597142][T21533] ? __lock_acquire+0x2b00/0x2b00 [ 530.602178][T21533] ? stack_trace_save+0x1e0/0x1e0 [ 530.607194][T21533] ? stack_trace_save+0x1e0/0x1e0 [ 530.612210][T21533] ? is_bpf_text_address+0x253/0x270 [ 530.617492][T21533] ? stack_trace_save+0x1e0/0x1e0 [ 530.622507][T21533] ? kernel_text_address+0x9e/0xd0 [ 530.627632][T21533] ? __kernel_text_address+0x9/0x40 [ 530.632825][T21533] ? unwind_get_return_address+0x48/0x80 [ 530.638449][T21533] ? arch_stack_walk+0xf8/0x140 [ 530.643306][T21533] ? stack_trace_save+0x11b/0x1e0 [ 530.648321][T21533] ? stack_trace_snprint+0xe0/0xe0 [ 530.653424][T21533] ? rcu_read_lock_sched_held+0x89/0x130 [ 530.659060][T21533] ? kfree+0xe1/0x330 [ 530.663034][T21533] ? kasan_set_track+0x68/0x80 [ 530.667793][T21533] ? kasan_set_track+0x4c/0x80 [ 530.672546][T21533] ? kasan_set_free_info+0x1f/0x40 [ 530.677648][T21533] ? ____kasan_slab_free+0x10d/0x150 [ 530.682930][T21533] ? slab_free_freelist_hook+0x12e/0x1a0 [ 530.688554][T21533] ? kfree+0xe1/0x330 [ 530.692525][T21533] ? tomoyo_path_number_perm+0x5f1/0x7c0 [ 530.698151][T21533] ? security_file_ioctl+0x55/0xb0 [ 530.703254][T21533] ? __se_sys_ioctl+0x48/0x170 [ 530.708008][T21533] ? do_syscall_64+0x44/0xd0 [ 530.712595][T21533] ? entry_SYSCALL_64_after_hwframe+0x44/0xae [ 530.718680][T21533] ? rcu_read_lock_sched_held+0x89/0x130 [ 530.724307][T21533] ? __bpf_trace_rcu_stall_warning+0x10/0x10 [ 530.730278][T21533] ? lockdep_hardirqs_on_prepare+0x412/0x780 [ 530.736259][T21533] ? do_vfs_ioctl+0xcb2/0x2b90 [ 530.741048][T21533] ? blkdev_common_ioctl+0x702/0x2000 [ 530.746496][T21533] ? tomoyo_check_path_acl+0x1c0/0x1c0 [ 530.751947][T21533] ? blkdev_bszset+0x260/0x260 [ 530.756721][T21533] ? memset+0x1f/0x40 [ 530.760693][T21533] ? smack_file_ioctl+0x298/0x3a0 [ 530.765714][T21533] ? smack_file_alloc_security+0xd0/0xd0 [ 530.771349][T21533] ? lo_release+0x1f0/0x1f0 [ 530.775849][T21533] blkdev_ioctl+0x3ac/0x790 [ 530.780351][T21533] ? blkdev_compat_ptr_ioctl+0xd0/0xd0 [ 530.785811][T21533] ? bpf_lsm_file_ioctl+0x5/0x10 [ 530.790742][T21533] ? security_file_ioctl+0x9d/0xb0 [ 530.795872][T21533] ? blkdev_compat_ptr_ioctl+0xd0/0xd0 [ 530.802368][T21533] __se_sys_ioctl+0xfb/0x170 [ 530.807217][T21533] do_syscall_64+0x44/0xd0 [ 530.811635][T21533] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 530.817521][T21533] RIP: 0033:0x7f3831feec57 [ 530.821932][T21533] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 04 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 530.841529][T21533] RSP: 002b:00007f3830963f28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 530.849956][T21533] RAX: ffffffffffffffda RBX: 00007f38320389c8 RCX: 00007f3831feec57 18:12:22 executing program 5: r0 = syz_io_uring_setup(0x3ede, &(0x7f0000000240), &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) socket$l2tp6(0xa, 0x2, 0x73) openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/locks\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READ=@pass_buffer={0x16, 0x0, 0x0, @fd_index=0x5, 0xffffffffffffffff, &(0x7f0000000040)=""/17, 0x11}, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000002040)=[{{&(0x7f0000001380)=@in6={0xa, 0x0, 0x0, @private0}, 0x80, 0x0}}], 0x1, 0x0) io_uring_enter(r0, 0x21, 0x0, 0x0, 0x0, 0x0) [ 530.858269][T21533] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 530.866234][T21533] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007f38309641d0 [ 530.874198][T21533] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 530.882165][T21533] R13: 0000000000000004 R14: 00000000200000c0 R15: 0000000000000000 [ 530.890141][T21533] 18:12:22 executing program 3: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$FS_IOC_RESVSP(r0, 0x402c5828, &(0x7f00000000c0)={0x0, 0x1, 0xa8f, 0x3078}) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x9) 18:12:22 executing program 1: syz_mount_image$ntfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x108, 0x0, &(0x7f00000000c0), 0x218400, &(0x7f00000013c0)) [ 530.940515][T21541] team0: Device ipvlan26 is already an upper device of the team interface 18:12:22 executing program 5: r0 = syz_io_uring_setup(0x3ede, &(0x7f0000000240), &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) socket$l2tp6(0xa, 0x2, 0x73) openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/locks\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READ=@pass_buffer={0x16, 0x0, 0x0, @fd_index=0x5, 0xffffffffffffffff, &(0x7f0000000040)=""/17, 0x11}, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000002040)=[{{&(0x7f0000001380)=@in6={0xa, 0x0, 0x0, @private0}, 0x80, 0x0}}], 0x1, 0x0) io_uring_enter(r0, 0x22, 0x0, 0x0, 0x0, 0x0) 18:12:22 executing program 2: syz_mount_image$ntfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f00000013c0)={[{@fmask}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'syzkaller1\x00'}}]}) (fail_nth: 19) 18:12:22 executing program 3: dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x200000000}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x9) 18:12:22 executing program 0: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$FS_IOC_RESVSP(r0, 0x402c5828, &(0x7f00000000c0)={0x0, 0x1, 0xa8f, 0x3078}) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x200000000}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x9) preadv(r1, &(0x7f0000000240)=[{&(0x7f0000000040)=""/94, 0x5e}, {&(0x7f00000000c0)=""/93, 0x5d}, {&(0x7f0000000140)=""/58, 0x3a}], 0x3, 0xd9f, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000002340)='./file0\x00', 0x0, 0x108) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000180)={'team0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @local}, 0x14) writev(r2, &(0x7f0000000280)=[{&(0x7f00000008c0)="110eaa1a9896d57019effc8c79961d0f73ccf3afca3754e2e7a31f536bcb7204bed59311e29c96e1c2b663d61e5b0c0a76ea50cbddaa69f578b8600f77cf1a538ac900673696245b6de4283c979a2eccd71f9583dacf650575d1398678895da32663735b4d0cabfe7e972e59c2b4b4c9c89d0b82ca2267ad5062303e8abcb79600010506702eb912e3957e507aec4e2180699a738f6753509a12282a1d7181887f6c2e03de1da0dfe3b4efbb10e9b59301b4ef8a1d", 0xb5}, {&(0x7f0000000980)="34c30d95766fefbb7bdc40a3242505587bbc8584c2bc2003185f5ce116eea020efa91e2aae1eae2b8e848ac13c3dcedbbbc82adb1e70be8eecedba37be82545f2abda4f0a0e0fd0edd6bd03bb8e9bb91c39a2c828511aef3e684ad4c21ec0c146b9570139e31cd", 0x67}], 0x2) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'macvtap0\x00'}) ioctl$PPPIOCSFLAGS1(0xffffffffffffffff, 0x40047459, &(0x7f00000001c0)) recvmmsg(0xffffffffffffffff, &(0x7f0000002200)=[{{&(0x7f0000000340)=@in={0x2, 0x0, @multicast1}, 0x80, &(0x7f0000000440)=[{&(0x7f00000004c0)=""/88, 0x58}, {&(0x7f0000000b40)=""/4096, 0x1000}], 0x2, &(0x7f0000000740)=""/192, 0xc0}, 0x3}, {{&(0x7f0000000800)=@sco={0x1f, @none}, 0x80, &(0x7f0000000480)=[{&(0x7f0000001b40)=""/82, 0x52}], 0x1, &(0x7f0000001bc0)=""/206, 0xce}, 0x7}, {{&(0x7f0000001cc0)=@in={0x2, 0x0, @broadcast}, 0x80, &(0x7f0000000880)=[{&(0x7f0000001d40)=""/146, 0x92}, {&(0x7f0000001e00)=""/231, 0xe7}], 0x2, &(0x7f0000001f00)=""/239, 0xef}, 0x3}, {{&(0x7f0000002000)=@xdp, 0x80, &(0x7f00000020c0)=[{&(0x7f0000002080)=""/58, 0x3a}], 0x1, &(0x7f0000002100)=""/251, 0xfb}, 0x9}], 0x4, 0x40, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000002380)=ANY=[@ANYBLOB="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", @ANYRESDEC=r0, @ANYBLOB="b21b22b0b59f1a76abb6323c16886f3d2569d595dca4af1ac9160b24b62e47302e148fa17433c275945e36a713e5fad2e8abc9651d17b22d7d092020f73d100115fed606c66c84318df7895b1e5780f3c785bfb92571cf1bc9", @ANYRES32=0x0, @ANYRES32, @ANYRES32=0x0], &(0x7f0000000300)=0x18) r5 = socket(0x1, 0x803, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8936, &(0x7f0000000080)={@rand_addr=' \x01\x00', 0x44, r4}) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) r7 = socket(0x10, 0x8000000803, 0x0) sendmsg$nl_route(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000a00)=@newlink={0x7c, 0x10, 0x401, 0x3001, 0x25dfdbfc, {0x0, 0x0, 0x0, 0x0, 0x534ad}, [@IFLA_LINKINFO={0x4c, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x3c, 0x2, 0x0, 0x1, [@IFLA_IPVLAN_MODE={0x6, 0x1, 0x2}, @IFLA_IPVLAN_FLAGS={0x6, 0x2, 0x2}, @IFLA_IPVLAN_FLAGS={0x6, 0x2, 0x1}, @IFLA_IPVLAN_FLAGS={0x6, 0x2, 0x2}, @IFLA_IPVLAN_FLAGS={0x6, 0x2, 0x3}, @IFLA_IPVLAN_MODE={0x6}, @IFLA_IPVLAN_FLAGS={0x6, 0x2, 0x2}]}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x7c}}, 0x0) 18:12:22 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="b4050000000000006110580000000000c60000000000000095000002000000002ac73fe427abdf478e0357f2d32986f50b892b5007921cd48fe43b23be60a2dbc9778bb665510e3e22fcb26adfdc05e55a4933e62a23abb4baca4ec89323257db59db5eeda384459dd00d41b6aab85df5cab39e726769e2291b626d120a9247579f0b8edd8f16683e0623366ac632c24921d21534237743354f09cc29be2f72dfa8b05320110bcea53bb038c"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, 0x0, 0x0) r1 = socket(0x1, 0x5, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r1}, 0x20) 18:12:22 executing program 1: syz_mount_image$ntfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x204, 0x0, &(0x7f00000000c0), 0x218400, &(0x7f00000013c0)) [ 531.130543][T21556] FAULT_INJECTION: forcing a failure. [ 531.130543][T21556] name failslab, interval 1, probability 0, space 0, times 0 [ 531.179602][T21556] CPU: 1 PID: 21556 Comm: syz-executor.2 Not tainted 5.16.0-rc5-syzkaller #0 [ 531.186050][T21558] 8021q: adding VLAN 0 to HW filter on device ipvlan26 [ 531.188508][T21556] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 531.188527][T21556] Call Trace: [ 531.188535][T21556] [ 531.188546][T21556] dump_stack_lvl+0x201/0x2d8 [ 531.188583][T21556] ? show_regs_print_info+0x12/0x12 [ 531.188609][T21556] ? log_buf_vmcoreinfo_setup+0x498/0x498 [ 531.202094][T21558] team0: Device ipvlan26 is already an upper device of the team interface [ 531.205523][T21556] ? __might_sleep+0xe0/0xe0 [ 531.205563][T21556] should_fail+0x384/0x4b0 [ 531.205588][T21556] ? alloc_workqueue+0x207/0x1470 [ 531.205610][T21556] should_failslab+0x5/0x20 [ 531.223277][T21560] loop1: detected capacity change from 0 to 1 [ 531.227388][T21556] kmem_cache_alloc_trace+0x71/0x330 [ 531.227430][T21556] alloc_workqueue+0x207/0x1470 [ 531.227460][T21556] ? _raw_spin_unlock+0x24/0x40 [ 531.227481][T21556] ? bd_prepare_to_claim+0x388/0x420 [ 531.280956][T21556] ? loop_attr_do_show_dio+0xc0/0xc0 [ 531.286280][T21556] ? loop_configure+0x220/0x1740 [ 531.291233][T21556] ? mutex_lock_io_nested+0x60/0x60 [ 531.296449][T21556] ? loop_configure+0x679/0x1740 [ 531.301390][T21556] ? apply_workqueue_attrs+0x170/0x170 [ 531.306840][T21556] ? __fget_files+0x3d0/0x440 [ 531.311533][T21556] loop_configure+0x721/0x1740 [ 531.316339][T21556] lo_ioctl+0x7d4/0x1f40 [ 531.320603][T21556] ? lo_release+0x1f0/0x1f0 [ 531.325211][T21556] ? rcu_read_lock_sched_held+0x89/0x130 [ 531.330859][T21556] ? __bpf_trace_rcu_stall_warning+0x10/0x10 [ 531.336883][T21556] ? rcu_lock_release+0x5/0x20 [ 531.341653][T21556] ? __lock_acquire+0x2b00/0x2b00 [ 531.346686][T21556] ? stack_trace_save+0x1e0/0x1e0 [ 531.351720][T21556] ? stack_trace_save+0x1e0/0x1e0 [ 531.356765][T21556] ? is_bpf_text_address+0x253/0x270 [ 531.362160][T21556] ? stack_trace_save+0x1e0/0x1e0 [ 531.367183][T21556] ? kernel_text_address+0x9e/0xd0 [ 531.372305][T21556] ? __kernel_text_address+0x9/0x40 [ 531.377509][T21556] ? unwind_get_return_address+0x48/0x80 [ 531.383141][T21556] ? arch_stack_walk+0xf8/0x140 [ 531.388003][T21556] ? stack_trace_save+0x11b/0x1e0 [ 531.393028][T21556] ? stack_trace_snprint+0xe0/0xe0 [ 531.398132][T21556] ? rcu_read_lock_sched_held+0x89/0x130 [ 531.403768][T21556] ? kfree+0xe1/0x330 [ 531.407744][T21556] ? kasan_set_track+0x68/0x80 [ 531.412499][T21556] ? kasan_set_track+0x4c/0x80 [ 531.417440][T21556] ? kasan_set_free_info+0x1f/0x40 [ 531.422550][T21556] ? ____kasan_slab_free+0x10d/0x150 [ 531.427823][T21556] ? slab_free_freelist_hook+0x12e/0x1a0 [ 531.433444][T21556] ? kfree+0xe1/0x330 [ 531.437414][T21556] ? tomoyo_path_number_perm+0x5f1/0x7c0 [ 531.443037][T21556] ? security_file_ioctl+0x55/0xb0 [ 531.448140][T21556] ? __se_sys_ioctl+0x48/0x170 [ 531.452893][T21556] ? do_syscall_64+0x44/0xd0 [ 531.457474][T21556] ? entry_SYSCALL_64_after_hwframe+0x44/0xae [ 531.463554][T21556] ? rcu_read_lock_sched_held+0x89/0x130 [ 531.469177][T21556] ? __bpf_trace_rcu_stall_warning+0x10/0x10 [ 531.475148][T21556] ? lockdep_hardirqs_on_prepare+0x412/0x780 [ 531.481148][T21556] ? do_vfs_ioctl+0xcb2/0x2b90 [ 531.485958][T21556] ? blkdev_common_ioctl+0x702/0x2000 [ 531.491338][T21556] ? tomoyo_check_path_acl+0x1c0/0x1c0 [ 531.496882][T21556] ? blkdev_bszset+0x260/0x260 [ 531.501677][T21556] ? memset+0x1f/0x40 [ 531.505657][T21556] ? smack_file_ioctl+0x298/0x3a0 [ 531.510677][T21556] ? smack_file_alloc_security+0xd0/0xd0 [ 531.516307][T21556] ? lo_release+0x1f0/0x1f0 [ 531.520816][T21556] blkdev_ioctl+0x3ac/0x790 [ 531.525319][T21556] ? blkdev_compat_ptr_ioctl+0xd0/0xd0 [ 531.530776][T21556] ? bpf_lsm_file_ioctl+0x5/0x10 [ 531.535709][T21556] ? security_file_ioctl+0x9d/0xb0 [ 531.540828][T21556] ? blkdev_compat_ptr_ioctl+0xd0/0xd0 [ 531.546276][T21556] __se_sys_ioctl+0xfb/0x170 [ 531.550859][T21556] do_syscall_64+0x44/0xd0 [ 531.555271][T21556] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 531.561155][T21556] RIP: 0033:0x7f3831feec57 [ 531.565568][T21556] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 04 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 531.585160][T21556] RSP: 002b:00007f3830963f28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 531.593569][T21556] RAX: ffffffffffffffda RBX: 00007f38320389c8 RCX: 00007f3831feec57 [ 531.601532][T21556] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 531.609495][T21556] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007f38309641d0 [ 531.617453][T21556] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 18:12:23 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="b4050000000000006110580000000000c60000000000000095000002000000002ac73fe427abdf478e0357f2d32986f50b892b5007921cd48fe43b23be60a2dbc9778bb665510e3e22fcb26adfdc05e55a4933e62a23abb4baca4ec89323257db59db5eeda384459dd00d41b6aab85df5cab39e726769e2291b626d120a9247579f0b8edd8f16683e0623366ac632c24921d21534237743354f09cc29be2f72dfa8b05320110bcea53bb038c"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, 0x0, 0x0) r1 = socket(0x1, 0x5, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r1}, 0x20) [ 531.625411][T21556] R13: 0000000000000004 R14: 00000000200000c0 R15: 0000000000000000 [ 531.633387][T21556] 18:12:23 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="b4050000000000006110580000000000c60000000000000095000002000000002ac73fe427abdf478e0357f2d32986f50b892b5007921cd48fe43b23be60a2dbc9778bb665510e3e22fcb26adfdc05e55a4933e62a23abb4baca4ec89323257db59db5eeda384459dd00d41b6aab85df5cab39e726769e2291b626d120a9247579f0b8edd8f16683e0623366ac632c24921d21534237743354f09cc29be2f72dfa8b05320110bcea53bb038c"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map, r0, 0x5}, 0x10) r2 = socket(0x1, 0x5, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) 18:12:23 executing program 3: dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x200000000}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x9) 18:12:23 executing program 1: syz_mount_image$ntfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x300, 0x0, &(0x7f00000000c0), 0x218400, &(0x7f00000013c0)) 18:12:23 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="b4050000000000006110580000000000c60000000000000095000002000000002ac73fe427abdf478e0357f2d32986f50b892b5007921cd48fe43b23be60a2dbc9778bb665510e3e22fcb26adfdc05e55a4933e62a23abb4baca4ec89323257db59db5eeda384459dd00d41b6aab85df5cab39e726769e2291b626d120a9247579f0b8edd8f16683e0623366ac632c24921d21534237743354f09cc29be2f72dfa8b05320110bcea53bb038c"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map, r0, 0x5}, 0x10) r2 = socket(0x1, 0x5, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) 18:12:23 executing program 5: r0 = syz_io_uring_setup(0x3ede, &(0x7f0000000240), &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) socket$l2tp6(0xa, 0x2, 0x73) openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/locks\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READ=@pass_buffer={0x16, 0x0, 0x0, @fd_index=0x5, 0xffffffffffffffff, &(0x7f0000000040)=""/17, 0x11}, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000002040)=[{{&(0x7f0000001380)=@in6={0xa, 0x0, 0x0, @private0}, 0x80, 0x0}}], 0x1, 0x0) io_uring_enter(r0, 0x23, 0x0, 0x0, 0x0, 0x0) 18:12:23 executing program 2: syz_mount_image$ntfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f00000013c0)={[{@fmask}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'syzkaller1\x00'}}]}) (fail_nth: 20) 18:12:23 executing program 0: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$FS_IOC_RESVSP(r0, 0x402c5828, &(0x7f00000000c0)={0x0, 0x1, 0xa8f, 0x3078}) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x200000000}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x9) preadv(r1, &(0x7f0000000240)=[{&(0x7f0000000040)=""/94, 0x5e}, {&(0x7f00000000c0)=""/93, 0x5d}, {&(0x7f0000000140)=""/58, 0x3a}], 0x3, 0xd9f, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000002340)='./file0\x00', 0x0, 0x108) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000180)={'team0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @local}, 0x14) writev(r2, &(0x7f0000000280)=[{&(0x7f00000008c0)="110eaa1a9896d57019effc8c79961d0f73ccf3afca3754e2e7a31f536bcb7204bed59311e29c96e1c2b663d61e5b0c0a76ea50cbddaa69f578b8600f77cf1a538ac900673696245b6de4283c979a2eccd71f9583dacf650575d1398678895da32663735b4d0cabfe7e972e59c2b4b4c9c89d0b82ca2267ad5062303e8abcb79600010506702eb912e3957e507aec4e2180699a738f6753509a12282a1d7181887f6c2e03de1da0dfe3b4efbb10e9b59301b4ef8a1d", 0xb5}, {&(0x7f0000000980)="34c30d95766fefbb7bdc40a3242505587bbc8584c2bc2003185f5ce116eea020efa91e2aae1eae2b8e848ac13c3dcedbbbc82adb1e70be8eecedba37be82545f2abda4f0a0e0fd0edd6bd03bb8e9bb91c39a2c828511aef3e684ad4c21ec0c146b9570139e31cd", 0x67}], 0x2) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'macvtap0\x00'}) ioctl$PPPIOCSFLAGS1(0xffffffffffffffff, 0x40047459, &(0x7f00000001c0)) recvmmsg(0xffffffffffffffff, &(0x7f0000002200)=[{{&(0x7f0000000340)=@in={0x2, 0x0, @multicast1}, 0x80, &(0x7f0000000440)=[{&(0x7f00000004c0)=""/88, 0x58}, {&(0x7f0000000b40)=""/4096, 0x1000}], 0x2, &(0x7f0000000740)=""/192, 0xc0}, 0x3}, {{&(0x7f0000000800)=@sco={0x1f, @none}, 0x80, &(0x7f0000000480)=[{&(0x7f0000001b40)=""/82, 0x52}], 0x1, &(0x7f0000001bc0)=""/206, 0xce}, 0x7}, {{&(0x7f0000001cc0)=@in={0x2, 0x0, @broadcast}, 0x80, &(0x7f0000000880)=[{&(0x7f0000001d40)=""/146, 0x92}, {&(0x7f0000001e00)=""/231, 0xe7}], 0x2, &(0x7f0000001f00)=""/239, 0xef}, 0x3}, {{&(0x7f0000002000)=@xdp, 0x80, &(0x7f00000020c0)=[{&(0x7f0000002080)=""/58, 0x3a}], 0x1, &(0x7f0000002100)=""/251, 0xfb}, 0x9}], 0x4, 0x40, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000002380)=ANY=[@ANYBLOB="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", @ANYRESDEC=r0, @ANYBLOB="b21b22b0b59f1a76abb6323c16886f3d2569d595dca4af1ac9160b24b62e47302e148fa17433c275945e36a713e5fad2e8abc9651d17b22d7d092020f73d100115fed606c66c84318df7895b1e5780f3c785bfb92571cf1bc9", @ANYRES32=0x0, @ANYRES32, @ANYRES32=0x0], &(0x7f0000000300)=0x18) r5 = socket(0x1, 0x803, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8936, &(0x7f0000000080)={@rand_addr=' \x01\x00', 0x44, r4}) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) r7 = socket(0x10, 0x8000000803, 0x0) sendmsg$nl_route(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000a00)=@newlink={0x7c, 0x10, 0x401, 0x3001, 0x25dfdbfc, {0x0, 0x0, 0x0, 0x0, 0x534ad}, [@IFLA_LINKINFO={0x4c, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x3c, 0x2, 0x0, 0x1, [@IFLA_IPVLAN_MODE={0x6, 0x1, 0x2}, @IFLA_IPVLAN_FLAGS={0x6, 0x2, 0x2}, @IFLA_IPVLAN_FLAGS={0x6, 0x2, 0x1}, @IFLA_IPVLAN_FLAGS={0x6, 0x2, 0x2}, @IFLA_IPVLAN_FLAGS={0x6, 0x2, 0x3}, @IFLA_IPVLAN_MODE={0x6}, @IFLA_IPVLAN_FLAGS={0x6, 0x2, 0x2}]}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x7c}}, 0x0) 18:12:23 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="b4050000000000006110580000000000c60000000000000095000002000000002ac73fe427abdf478e0357f2d32986f50b892b5007921cd48fe43b23be60a2dbc9778bb665510e3e22fcb26adfdc05e55a4933e62a23abb4baca4ec89323257db59db5eeda384459dd00d41b6aab85df5cab39e726769e2291b626d120a9247579f0b8edd8f16683e0623366ac632c24921d21534237743354f09cc29be2f72dfa8b05320110bcea53bb038c"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map, r0, 0x5}, 0x10) r2 = socket(0x1, 0x5, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) 18:12:23 executing program 3: dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x200000000}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x9) 18:12:23 executing program 5: r0 = syz_io_uring_setup(0x3ede, &(0x7f0000000240), &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) socket$l2tp6(0xa, 0x2, 0x73) openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/locks\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READ=@pass_buffer={0x16, 0x0, 0x0, @fd_index=0x5, 0xffffffffffffffff, &(0x7f0000000040)=""/17, 0x11}, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000002040)=[{{&(0x7f0000001380)=@in6={0xa, 0x0, 0x0, @private0}, 0x80, 0x0}}], 0x1, 0x0) io_uring_enter(r0, 0x24, 0x0, 0x0, 0x0, 0x0) [ 531.849655][T21573] loop1: detected capacity change from 0 to 1 [ 531.876398][T21575] FAULT_INJECTION: forcing a failure. [ 531.876398][T21575] name failslab, interval 1, probability 0, space 0, times 0 18:12:23 executing program 1: syz_mount_image$ntfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x315, 0x0, &(0x7f00000000c0), 0x218400, &(0x7f00000013c0)) 18:12:23 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="b4050000000000006110580000000000c60000000000000095000002000000002ac73fe427abdf478e0357f2d32986f50b892b5007921cd48fe43b23be60a2dbc9778bb665510e3e22fcb26adfdc05e55a4933e62a23abb4baca4ec89323257db59db5eeda384459dd00d41b6aab85df5cab39e726769e2291b626d120a9247579f0b8edd8f16683e0623366ac632c24921d21534237743354f09cc29be2f72dfa8b05320110bcea53bb038c"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r0, 0xffffffffffffffff, 0x5}, 0x10) r1 = socket(0x1, 0x5, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r1}, 0x20) [ 532.015934][T21578] 8021q: adding VLAN 0 to HW filter on device ipvlan26 [ 532.031118][T21575] CPU: 0 PID: 21575 Comm: syz-executor.2 Not tainted 5.16.0-rc5-syzkaller #0 [ 532.039924][T21575] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 532.050000][T21575] Call Trace: [ 532.051501][T21578] team0: Device ipvlan26 is already an upper device of the team interface [ 532.053371][T21575] [ 532.053383][T21575] dump_stack_lvl+0x201/0x2d8 [ 532.053419][T21575] ? show_regs_print_info+0x12/0x12 [ 532.053444][T21575] ? log_buf_vmcoreinfo_setup+0x498/0x498 [ 532.080494][T21575] ? __might_sleep+0xe0/0xe0 [ 532.085089][T21575] ? vsnprintf+0x1cd8/0x1d60 [ 532.089676][T21575] should_fail+0x384/0x4b0 [ 532.094093][T21575] ? kasprintf+0xd1/0x120 [ 532.098422][T21575] should_failslab+0x5/0x20 [ 532.102916][T21575] __kmalloc_track_caller+0x92/0x370 [ 532.108195][T21575] ? number+0xdc9/0x1040 [ 532.112439][T21575] kvasprintf+0xd6/0x180 [ 532.116679][T21575] ? asan.module_ctor+0x10/0x10 [ 532.121526][T21575] ? lockdep_unlock+0x164/0x300 [ 532.128365][T21575] ? lockdep_lock+0x2e0/0x2e0 [ 532.133037][T21575] ? __is_module_percpu_address+0x29e/0x3d0 [ 532.138993][T21575] kasprintf+0xd1/0x120 [ 532.143155][T21575] ? kvasprintf_const+0x170/0x170 [ 532.148179][T21575] ? __raw_spin_lock_init+0x44/0x100 [ 532.153488][T21575] alloc_workqueue+0x5ed/0x1470 [ 532.158337][T21575] ? bd_prepare_to_claim+0x388/0x420 [ 532.163625][T21575] ? loop_configure+0x220/0x1740 [ 532.168567][T21575] ? mutex_lock_io_nested+0x60/0x60 [ 532.173760][T21575] ? loop_configure+0x679/0x1740 [ 532.178699][T21575] ? apply_workqueue_attrs+0x170/0x170 [ 532.184157][T21575] ? __fget_files+0x3d0/0x440 [ 532.188831][T21575] loop_configure+0x721/0x1740 [ 532.193609][T21575] lo_ioctl+0x7d4/0x1f40 [ 532.197857][T21575] ? lo_release+0x1f0/0x1f0 [ 532.202358][T21575] ? rcu_read_lock_sched_held+0x89/0x130 [ 532.207980][T21575] ? __bpf_trace_rcu_stall_warning+0x10/0x10 [ 532.213975][T21575] ? rcu_lock_release+0x5/0x20 [ 532.218730][T21575] ? __lock_acquire+0x2b00/0x2b00 [ 532.223764][T21575] ? stack_trace_save+0x1e0/0x1e0 [ 532.228778][T21575] ? stack_trace_save+0x1e0/0x1e0 [ 532.233790][T21575] ? is_bpf_text_address+0x253/0x270 [ 532.239155][T21575] ? stack_trace_save+0x1e0/0x1e0 [ 532.244169][T21575] ? kernel_text_address+0x9e/0xd0 [ 532.249275][T21575] ? __kernel_text_address+0x9/0x40 [ 532.254497][T21575] ? unwind_get_return_address+0x48/0x80 [ 532.260214][T21575] ? arch_stack_walk+0xf8/0x140 [ 532.265072][T21575] ? stack_trace_save+0x11b/0x1e0 [ 532.270086][T21575] ? stack_trace_snprint+0xe0/0xe0 [ 532.275183][T21575] ? rcu_read_lock_sched_held+0x89/0x130 [ 532.280820][T21575] ? kfree+0xe1/0x330 [ 532.284800][T21575] ? kasan_set_track+0x68/0x80 [ 532.289566][T21575] ? kasan_set_track+0x4c/0x80 [ 532.294320][T21575] ? kasan_set_free_info+0x1f/0x40 [ 532.299463][T21575] ? ____kasan_slab_free+0x10d/0x150 [ 532.304739][T21575] ? slab_free_freelist_hook+0x12e/0x1a0 [ 532.310474][T21575] ? kfree+0xe1/0x330 [ 532.314474][T21575] ? tomoyo_path_number_perm+0x5f1/0x7c0 [ 532.320114][T21575] ? security_file_ioctl+0x55/0xb0 [ 532.325226][T21575] ? __se_sys_ioctl+0x48/0x170 [ 532.330045][T21575] ? do_syscall_64+0x44/0xd0 [ 532.334755][T21575] ? entry_SYSCALL_64_after_hwframe+0x44/0xae [ 532.340859][T21575] ? rcu_read_lock_sched_held+0x89/0x130 [ 532.346494][T21575] ? __bpf_trace_rcu_stall_warning+0x10/0x10 [ 532.352472][T21575] ? lockdep_hardirqs_on_prepare+0x412/0x780 [ 532.358456][T21575] ? do_vfs_ioctl+0xcb2/0x2b90 [ 532.363250][T21575] ? blkdev_common_ioctl+0x702/0x2000 [ 532.368616][T21575] ? tomoyo_check_path_acl+0x1c0/0x1c0 [ 532.374072][T21575] ? blkdev_bszset+0x260/0x260 [ 532.378848][T21575] ? memset+0x1f/0x40 [ 532.382825][T21575] ? smack_file_ioctl+0x298/0x3a0 [ 532.387846][T21575] ? smack_file_alloc_security+0xd0/0xd0 [ 532.393474][T21575] ? lo_release+0x1f0/0x1f0 [ 532.397983][T21575] blkdev_ioctl+0x3ac/0x790 [ 532.402484][T21575] ? blkdev_compat_ptr_ioctl+0xd0/0xd0 [ 532.407942][T21575] ? bpf_lsm_file_ioctl+0x5/0x10 [ 532.412873][T21575] ? security_file_ioctl+0x9d/0xb0 [ 532.417979][T21575] ? blkdev_compat_ptr_ioctl+0xd0/0xd0 [ 532.423692][T21575] __se_sys_ioctl+0xfb/0x170 [ 532.428277][T21575] do_syscall_64+0x44/0xd0 [ 532.432693][T21575] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 532.438594][T21575] RIP: 0033:0x7f3831feec57 [ 532.443118][T21575] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 04 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 18:12:24 executing program 5: r0 = syz_io_uring_setup(0x3ede, &(0x7f0000000240), &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) socket$l2tp6(0xa, 0x2, 0x73) openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/locks\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READ=@pass_buffer={0x16, 0x0, 0x0, @fd_index=0x5, 0xffffffffffffffff, &(0x7f0000000040)=""/17, 0x11}, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000002040)=[{{&(0x7f0000001380)=@in6={0xa, 0x0, 0x0, @private0}, 0x80, 0x0}}], 0x1, 0x0) io_uring_enter(r0, 0x25, 0x0, 0x0, 0x0, 0x0) 18:12:24 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x200000000}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x9) [ 532.462728][T21575] RSP: 002b:00007f3830963f28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 532.471143][T21575] RAX: ffffffffffffffda RBX: 00007f38320389c8 RCX: 00007f3831feec57 [ 532.479106][T21575] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 532.487069][T21575] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007f38309641d0 [ 532.495217][T21575] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 532.503207][T21575] R13: 0000000000000004 R14: 00000000200000c0 R15: 0000000000000000 [ 532.511201][T21575] 18:12:24 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="b4050000000000006110580000000000c60000000000000095000002000000002ac73fe427abdf478e0357f2d32986f50b892b5007921cd48fe43b23be60a2dbc9778bb665510e3e22fcb26adfdc05e55a4933e62a23abb4baca4ec89323257db59db5eeda384459dd00d41b6aab85df5cab39e726769e2291b626d120a9247579f0b8edd8f16683e0623366ac632c24921d21534237743354f09cc29be2f72dfa8b05320110bcea53bb038c"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r0, 0xffffffffffffffff, 0x5}, 0x10) r1 = socket(0x1, 0x5, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r1}, 0x20) [ 532.548340][T21575] ntfs: (device loop2): ntfs_fill_super(): Unable to determine device size. [ 532.558823][T21588] loop1: detected capacity change from 0 to 1 18:12:24 executing program 0: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$FS_IOC_RESVSP(r0, 0x402c5828, &(0x7f00000000c0)={0x0, 0x1, 0xa8f, 0x3078}) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x200000000}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x9) preadv(r1, &(0x7f0000000240)=[{&(0x7f0000000040)=""/94, 0x5e}, {&(0x7f00000000c0)=""/93, 0x5d}, {&(0x7f0000000140)=""/58, 0x3a}], 0x3, 0xd9f, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000002340)='./file0\x00', 0x0, 0x108) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000180)={'team0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @local}, 0x14) writev(r2, &(0x7f0000000280)=[{&(0x7f00000008c0)="110eaa1a9896d57019effc8c79961d0f73ccf3afca3754e2e7a31f536bcb7204bed59311e29c96e1c2b663d61e5b0c0a76ea50cbddaa69f578b8600f77cf1a538ac900673696245b6de4283c979a2eccd71f9583dacf650575d1398678895da32663735b4d0cabfe7e972e59c2b4b4c9c89d0b82ca2267ad5062303e8abcb79600010506702eb912e3957e507aec4e2180699a738f6753509a12282a1d7181887f6c2e03de1da0dfe3b4efbb10e9b59301b4ef8a1d", 0xb5}, {&(0x7f0000000980)="34c30d95766fefbb7bdc40a3242505587bbc8584c2bc2003185f5ce116eea020efa91e2aae1eae2b8e848ac13c3dcedbbbc82adb1e70be8eecedba37be82545f2abda4f0a0e0fd0edd6bd03bb8e9bb91c39a2c828511aef3e684ad4c21ec0c146b9570139e31cd", 0x67}], 0x2) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'macvtap0\x00'}) ioctl$PPPIOCSFLAGS1(0xffffffffffffffff, 0x40047459, &(0x7f00000001c0)) recvmmsg(0xffffffffffffffff, &(0x7f0000002200)=[{{&(0x7f0000000340)=@in={0x2, 0x0, @multicast1}, 0x80, &(0x7f0000000440)=[{&(0x7f00000004c0)=""/88, 0x58}, {&(0x7f0000000b40)=""/4096, 0x1000}], 0x2, &(0x7f0000000740)=""/192, 0xc0}, 0x3}, {{&(0x7f0000000800)=@sco={0x1f, @none}, 0x80, &(0x7f0000000480)=[{&(0x7f0000001b40)=""/82, 0x52}], 0x1, &(0x7f0000001bc0)=""/206, 0xce}, 0x7}, {{&(0x7f0000001cc0)=@in={0x2, 0x0, @broadcast}, 0x80, &(0x7f0000000880)=[{&(0x7f0000001d40)=""/146, 0x92}, {&(0x7f0000001e00)=""/231, 0xe7}], 0x2, &(0x7f0000001f00)=""/239, 0xef}, 0x3}, {{&(0x7f0000002000)=@xdp, 0x80, &(0x7f00000020c0)=[{&(0x7f0000002080)=""/58, 0x3a}], 0x1, &(0x7f0000002100)=""/251, 0xfb}, 0x9}], 0x4, 0x40, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000002380)=ANY=[@ANYBLOB="050000004f2fe4e7fe91d1f169b7f431831544d94b6dbcca36d501829c64f0c28565fbc3e562e329d779aef804590001804797c4378192536ca659efcf0a6cb16b0ba5b79cfefdc8e93c46dfa0c119d12be6495820cc0b34645475d4da28535803ddcfd16f5df589e2f1ac230118eafd75a63c016b3a1663bc141e5ed84016b6b02854a48c0ec71a36a1ad145c5d2216e964a34cdf686b0a089443bd0f8c210860754d133e2c97ce8a25ee4d4eb5abb779387ca2cd9e870d5cb5854616c65c24f259eeaa625432fa25dd2832dc14f9a78ebf3a24277da2b55d09ed6a1dca07d4fb9ed592a64782b6939500505805d12b2776980c4b250f17b0b9a8fda266d7f084a9cd1022d2d670f793298bcf83b9a25e4ae25ac23ce06ef88068108ec131b23695772064709b1dbee85e5c2a0c4cf809dbd8b5617f8c6f6fba013f019829c83bd4cf10be5c6da663ce7cbf9b19ebd88bedb114ec207599273b55ec5f4cd35914f897ee8afc7663255678f6853e5cfa0dfa079ba560c7ddbc56e6352397b7266ac906a0ce0fb810eb00000000000000000000000000000000000000000000000000c54baf95f669d6810040c457be8ca739b4ec785f005bb4faa01270b999b6c9899cd9e8997d359b77c00a68341ca40b4c0e06884b6384ef6e", @ANYRESDEC=r0, @ANYBLOB="b21b22b0b59f1a76abb6323c16886f3d2569d595dca4af1ac9160b24b62e47302e148fa17433c275945e36a713e5fad2e8abc9651d17b22d7d092020f73d100115fed606c66c84318df7895b1e5780f3c785bfb92571cf1bc9", @ANYRES32=0x0, @ANYRES32, @ANYRES32=0x0], &(0x7f0000000300)=0x18) r5 = socket(0x1, 0x803, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8936, &(0x7f0000000080)={@rand_addr=' \x01\x00', 0x44, r4}) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) r7 = socket(0x10, 0x8000000803, 0x0) sendmsg$nl_route(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000a00)=@newlink={0x7c, 0x10, 0x401, 0x3001, 0x25dfdbfc, {0x0, 0x0, 0x0, 0x0, 0x534ad}, [@IFLA_LINKINFO={0x4c, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x3c, 0x2, 0x0, 0x1, [@IFLA_IPVLAN_MODE={0x6, 0x1, 0x2}, @IFLA_IPVLAN_FLAGS={0x6, 0x2, 0x2}, @IFLA_IPVLAN_FLAGS={0x6, 0x2, 0x1}, @IFLA_IPVLAN_FLAGS={0x6, 0x2, 0x2}, @IFLA_IPVLAN_FLAGS={0x6, 0x2, 0x3}, @IFLA_IPVLAN_MODE={0x6}, @IFLA_IPVLAN_FLAGS={0x6, 0x2, 0x2}]}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x7c}}, 0x0) 18:12:24 executing program 5: r0 = syz_io_uring_setup(0x3ede, &(0x7f0000000240), &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) socket$l2tp6(0xa, 0x2, 0x73) openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/locks\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READ=@pass_buffer={0x16, 0x0, 0x0, @fd_index=0x5, 0xffffffffffffffff, &(0x7f0000000040)=""/17, 0x11}, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000002040)=[{{&(0x7f0000001380)=@in6={0xa, 0x0, 0x0, @private0}, 0x80, 0x0}}], 0x1, 0x0) io_uring_enter(r0, 0x4000, 0x0, 0x0, 0x0, 0x0) 18:12:24 executing program 2: syz_mount_image$ntfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f00000013c0)={[{@fmask}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'syzkaller1\x00'}}]}) (fail_nth: 21) 18:12:24 executing program 1: syz_mount_image$ntfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x31d, 0x0, &(0x7f00000000c0), 0x218400, &(0x7f00000013c0)) 18:12:24 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="b4050000000000006110580000000000c60000000000000095000002000000002ac73fe427abdf478e0357f2d32986f50b892b5007921cd48fe43b23be60a2dbc9778bb665510e3e22fcb26adfdc05e55a4933e62a23abb4baca4ec89323257db59db5eeda384459dd00d41b6aab85df5cab39e726769e2291b626d120a9247579f0b8edd8f16683e0623366ac632c24921d21534237743354f09cc29be2f72dfa8b05320110bcea53bb038c"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r0, 0xffffffffffffffff, 0x5}, 0x10) r1 = socket(0x1, 0x5, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r1}, 0x20) 18:12:24 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x200000000}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x9) [ 532.778094][T21601] loop1: detected capacity change from 0 to 1 [ 532.786578][T21597] 8021q: adding VLAN 0 to HW filter on device ipvlan26 [ 532.810459][T21597] team0: Device ipvlan26 is already an upper device of the team interface 18:12:24 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="b4050000000000006110580000000000c60000000000000095000002000000002ac73fe427abdf478e0357f2d32986f50b892b5007921cd48fe43b23be60a2dbc9778bb665510e3e22fcb26adfdc05e55a4933e62a23abb4baca4ec89323257db59db5eeda384459dd00d41b6aab85df5cab39e726769e2291b626d120a9247579f0b8edd8f16683e0623366ac632c24921d21534237743354f09cc29be2f72dfa8b05320110bcea53bb038c"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0}, 0x10) r2 = socket(0x1, 0x5, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) 18:12:24 executing program 3: perf_event_open(0x0, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x9) [ 532.841659][T21606] FAULT_INJECTION: forcing a failure. [ 532.841659][T21606] name failslab, interval 1, probability 0, space 0, times 0 18:12:24 executing program 1: syz_mount_image$ntfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x324, 0x0, &(0x7f00000000c0), 0x218400, &(0x7f00000013c0)) [ 532.928081][T21606] CPU: 1 PID: 21606 Comm: syz-executor.2 Not tainted 5.16.0-rc5-syzkaller #0 [ 532.936894][T21606] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 532.946970][T21606] Call Trace: [ 532.950263][T21606] [ 532.953204][T21606] dump_stack_lvl+0x201/0x2d8 [ 532.957909][T21606] ? show_regs_print_info+0x12/0x12 [ 532.963134][T21606] ? log_buf_vmcoreinfo_setup+0x498/0x498 [ 532.968876][T21606] ? __might_sleep+0xe0/0xe0 [ 532.973493][T21606] should_fail+0x384/0x4b0 [ 532.977935][T21606] ? alloc_workqueue+0x207/0x1470 [ 532.982983][T21606] should_failslab+0x5/0x20 [ 532.987497][T21606] kmem_cache_alloc_trace+0x71/0x330 [ 532.992810][T21606] alloc_workqueue+0x207/0x1470 [ 532.997743][T21606] ? _raw_spin_unlock+0x24/0x40 [ 533.002614][T21606] ? bd_prepare_to_claim+0x388/0x420 [ 533.007919][T21606] ? loop_attr_do_show_dio+0xc0/0xc0 [ 533.013225][T21606] ? loop_configure+0x220/0x1740 [ 533.018179][T21606] ? mutex_lock_io_nested+0x60/0x60 [ 533.023401][T21606] ? loop_configure+0x679/0x1740 [ 533.028361][T21606] ? apply_workqueue_attrs+0x170/0x170 [ 533.033844][T21606] ? __fget_files+0x3d0/0x440 [ 533.038550][T21606] loop_configure+0x721/0x1740 [ 533.043363][T21606] lo_ioctl+0x7d4/0x1f40 [ 533.047640][T21606] ? lo_release+0x1f0/0x1f0 [ 533.052170][T21606] ? rcu_read_lock_sched_held+0x89/0x130 [ 533.057993][T21606] ? __bpf_trace_rcu_stall_warning+0x10/0x10 [ 533.064015][T21606] ? rcu_lock_release+0x5/0x20 [ 533.068805][T21606] ? __lock_acquire+0x2b00/0x2b00 [ 533.073864][T21606] ? stack_trace_save+0x1e0/0x1e0 [ 533.078898][T21606] ? stack_trace_save+0x1e0/0x1e0 [ 533.083938][T21606] ? is_bpf_text_address+0x253/0x270 [ 533.089243][T21606] ? stack_trace_save+0x1e0/0x1e0 [ 533.094281][T21606] ? kernel_text_address+0x9e/0xd0 [ 533.099418][T21606] ? __kernel_text_address+0x9/0x40 [ 533.104634][T21606] ? unwind_get_return_address+0x48/0x80 [ 533.110284][T21606] ? arch_stack_walk+0xf8/0x140 [ 533.115167][T21606] ? stack_trace_save+0x11b/0x1e0 [ 533.120211][T21606] ? stack_trace_snprint+0xe0/0xe0 [ 533.125334][T21606] ? rcu_read_lock_sched_held+0x89/0x130 [ 533.130997][T21606] ? kfree+0xe1/0x330 [ 533.134993][T21606] ? kasan_set_track+0x68/0x80 [ 533.139766][T21606] ? kasan_set_track+0x4c/0x80 [ 533.144545][T21606] ? kasan_set_free_info+0x1f/0x40 [ 533.149684][T21606] ? ____kasan_slab_free+0x10d/0x150 [ 533.154994][T21606] ? slab_free_freelist_hook+0x12e/0x1a0 [ 533.160726][T21606] ? kfree+0xe1/0x330 [ 533.164721][T21606] ? tomoyo_path_number_perm+0x5f1/0x7c0 [ 533.170370][T21606] ? security_file_ioctl+0x55/0xb0 [ 533.175497][T21606] ? __se_sys_ioctl+0x48/0x170 [ 533.180269][T21606] ? do_syscall_64+0x44/0xd0 [ 533.184880][T21606] ? entry_SYSCALL_64_after_hwframe+0x44/0xae [ 533.190985][T21606] ? rcu_read_lock_sched_held+0x89/0x130 [ 533.196633][T21606] ? __bpf_trace_rcu_stall_warning+0x10/0x10 [ 533.202636][T21606] ? lockdep_hardirqs_on_prepare+0x412/0x780 [ 533.208645][T21606] ? do_vfs_ioctl+0xcb2/0x2b90 [ 533.213466][T21606] ? blkdev_common_ioctl+0x702/0x2000 [ 533.218858][T21606] ? tomoyo_check_path_acl+0x1c0/0x1c0 [ 533.224330][T21606] ? blkdev_bszset+0x260/0x260 [ 533.229132][T21606] ? memset+0x1f/0x40 [ 533.233126][T21606] ? smack_file_ioctl+0x298/0x3a0 [ 533.238165][T21606] ? smack_file_alloc_security+0xd0/0xd0 [ 533.243823][T21606] ? lo_release+0x1f0/0x1f0 [ 533.248347][T21606] blkdev_ioctl+0x3ac/0x790 [ 533.252871][T21606] ? blkdev_compat_ptr_ioctl+0xd0/0xd0 [ 533.258363][T21606] ? bpf_lsm_file_ioctl+0x5/0x10 [ 533.263328][T21606] ? security_file_ioctl+0x9d/0xb0 [ 533.268454][T21606] ? blkdev_compat_ptr_ioctl+0xd0/0xd0 [ 533.273937][T21606] __se_sys_ioctl+0xfb/0x170 [ 533.278551][T21606] do_syscall_64+0x44/0xd0 [ 533.282989][T21606] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 533.289070][T21606] RIP: 0033:0x7f3831feec57 [ 533.293495][T21606] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 04 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 533.313108][T21606] RSP: 002b:00007f3830963f28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 533.321538][T21606] RAX: ffffffffffffffda RBX: 00007f38320389c8 RCX: 00007f3831feec57 [ 533.329529][T21606] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 533.337519][T21606] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007f38309641d0 [ 533.345501][T21606] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 533.353482][T21606] R13: 0000000000000004 R14: 00000000200000c0 R15: 0000000000000000 [ 533.361481][T21606] 18:12:24 executing program 0: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$FS_IOC_RESVSP(r0, 0x402c5828, &(0x7f00000000c0)={0x0, 0x1, 0xa8f, 0x3078}) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x200000000}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x9) preadv(r1, &(0x7f0000000240)=[{&(0x7f0000000040)=""/94, 0x5e}, {&(0x7f00000000c0)=""/93, 0x5d}, {&(0x7f0000000140)=""/58, 0x3a}], 0x3, 0xd9f, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000002340)='./file0\x00', 0x0, 0x108) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000180)={'team0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @local}, 0x14) writev(r2, &(0x7f0000000280)=[{&(0x7f00000008c0)="110eaa1a9896d57019effc8c79961d0f73ccf3afca3754e2e7a31f536bcb7204bed59311e29c96e1c2b663d61e5b0c0a76ea50cbddaa69f578b8600f77cf1a538ac900673696245b6de4283c979a2eccd71f9583dacf650575d1398678895da32663735b4d0cabfe7e972e59c2b4b4c9c89d0b82ca2267ad5062303e8abcb79600010506702eb912e3957e507aec4e2180699a738f6753509a12282a1d7181887f6c2e03de1da0dfe3b4efbb10e9b59301b4ef8a1d", 0xb5}, {&(0x7f0000000980)="34c30d95766fefbb7bdc40a3242505587bbc8584c2bc2003185f5ce116eea020efa91e2aae1eae2b8e848ac13c3dcedbbbc82adb1e70be8eecedba37be82545f2abda4f0a0e0fd0edd6bd03bb8e9bb91c39a2c828511aef3e684ad4c21ec0c146b9570139e31cd", 0x67}], 0x2) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'macvtap0\x00'}) ioctl$PPPIOCSFLAGS1(0xffffffffffffffff, 0x40047459, &(0x7f00000001c0)) recvmmsg(0xffffffffffffffff, &(0x7f0000002200)=[{{&(0x7f0000000340)=@in={0x2, 0x0, @multicast1}, 0x80, &(0x7f0000000440)=[{&(0x7f00000004c0)=""/88, 0x58}, {&(0x7f0000000b40)=""/4096, 0x1000}], 0x2, &(0x7f0000000740)=""/192, 0xc0}, 0x3}, {{&(0x7f0000000800)=@sco={0x1f, @none}, 0x80, &(0x7f0000000480)=[{&(0x7f0000001b40)=""/82, 0x52}], 0x1, &(0x7f0000001bc0)=""/206, 0xce}, 0x7}, {{&(0x7f0000001cc0)=@in={0x2, 0x0, @broadcast}, 0x80, &(0x7f0000000880)=[{&(0x7f0000001d40)=""/146, 0x92}, {&(0x7f0000001e00)=""/231, 0xe7}], 0x2, &(0x7f0000001f00)=""/239, 0xef}, 0x3}, {{&(0x7f0000002000)=@xdp, 0x80, &(0x7f00000020c0)=[{&(0x7f0000002080)=""/58, 0x3a}], 0x1, &(0x7f0000002100)=""/251, 0xfb}, 0x9}], 0x4, 0x40, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000002380)=ANY=[@ANYBLOB="050000004f2fe4e7fe91d1f169b7f431831544d94b6dbcca36d501829c64f0c28565fbc3e562e329d779aef804590001804797c4378192536ca659efcf0a6cb16b0ba5b79cfefdc8e93c46dfa0c119d12be6495820cc0b34645475d4da28535803ddcfd16f5df589e2f1ac230118eafd75a63c016b3a1663bc141e5ed84016b6b02854a48c0ec71a36a1ad145c5d2216e964a34cdf686b0a089443bd0f8c210860754d133e2c97ce8a25ee4d4eb5abb779387ca2cd9e870d5cb5854616c65c24f259eeaa625432fa25dd2832dc14f9a78ebf3a24277da2b55d09ed6a1dca07d4fb9ed592a64782b6939500505805d12b2776980c4b250f17b0b9a8fda266d7f084a9cd1022d2d670f793298bcf83b9a25e4ae25ac23ce06ef88068108ec131b23695772064709b1dbee85e5c2a0c4cf809dbd8b5617f8c6f6fba013f019829c83bd4cf10be5c6da663ce7cbf9b19ebd88bedb114ec207599273b55ec5f4cd35914f897ee8afc7663255678f6853e5cfa0dfa079ba560c7ddbc56e6352397b7266ac906a0ce0fb810eb00000000000000000000000000000000000000000000000000c54baf95f669d6810040c457be8ca739b4ec785f005bb4faa01270b999b6c9899cd9e8997d359b77c00a68341ca40b4c0e06884b6384ef6e", @ANYRESDEC=r0, @ANYBLOB="b21b22b0b59f1a76abb6323c16886f3d2569d595dca4af1ac9160b24b62e47302e148fa17433c275945e36a713e5fad2e8abc9651d17b22d7d092020f73d100115fed606c66c84318df7895b1e5780f3c785bfb92571cf1bc9", @ANYRES32=0x0, @ANYRES32, @ANYRES32=0x0], &(0x7f0000000300)=0x18) r5 = socket(0x1, 0x803, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8936, &(0x7f0000000080)={@rand_addr=' \x01\x00', 0x44, r4}) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) r6 = socket(0x10, 0x8000000803, 0x0) sendmsg$nl_route(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000a00)=@newlink={0x74, 0x10, 0x401, 0x3001, 0x25dfdbfc, {0x0, 0x0, 0x0, 0x0, 0x534ad, 0x42a03}, [@IFLA_LINKINFO={0x4c, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x3c, 0x2, 0x0, 0x1, [@IFLA_IPVLAN_MODE={0x6, 0x1, 0x2}, @IFLA_IPVLAN_FLAGS={0x6, 0x2, 0x2}, @IFLA_IPVLAN_FLAGS={0x6, 0x2, 0x1}, @IFLA_IPVLAN_FLAGS={0x6, 0x2, 0x2}, @IFLA_IPVLAN_FLAGS={0x6, 0x2, 0x3}, @IFLA_IPVLAN_MODE={0x6}, @IFLA_IPVLAN_FLAGS={0x6, 0x2, 0x2}]}}}, @IFLA_LINK={0x8, 0x5, r4}]}, 0x74}}, 0x0) 18:12:24 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="b4050000000000006110580000000000c60000000000000095000002000000002ac73fe427abdf478e0357f2d32986f50b892b5007921cd48fe43b23be60a2dbc9778bb665510e3e22fcb26adfdc05e55a4933e62a23abb4baca4ec89323257db59db5eeda384459dd00d41b6aab85df5cab39e726769e2291b626d120a9247579f0b8edd8f16683e0623366ac632c24921d21534237743354f09cc29be2f72dfa8b05320110bcea53bb038c"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0}, 0x10) r2 = socket(0x1, 0x5, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) 18:12:24 executing program 3: perf_event_open(0x0, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x9) [ 533.420129][T21612] loop1: detected capacity change from 0 to 1 18:12:24 executing program 1: syz_mount_image$ntfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x402, 0x0, &(0x7f00000000c0), 0x218400, &(0x7f00000013c0)) [ 533.541404][T21614] 8021q: adding VLAN 0 to HW filter on device ipvlan26 [ 533.593532][T21620] loop1: detected capacity change from 0 to 2 18:12:25 executing program 5: r0 = syz_io_uring_setup(0x3ede, &(0x7f0000000240), &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) socket$l2tp6(0xa, 0x2, 0x73) openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/locks\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READ=@pass_buffer={0x16, 0x0, 0x0, @fd_index=0x5, 0xffffffffffffffff, &(0x7f0000000040)=""/17, 0x11}, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000002040)=[{{&(0x7f0000001380)=@in6={0xa, 0x0, 0x0, @private0}, 0x80, 0x0}}], 0x1, 0x0) io_uring_enter(r0, 0x20001380, 0x0, 0x0, 0x0, 0x0) 18:12:25 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="b4050000000000006110580000000000c60000000000000095000002000000002ac73fe427abdf478e0357f2d32986f50b892b5007921cd48fe43b23be60a2dbc9778bb665510e3e22fcb26adfdc05e55a4933e62a23abb4baca4ec89323257db59db5eeda384459dd00d41b6aab85df5cab39e726769e2291b626d120a9247579f0b8edd8f16683e0623366ac632c24921d21534237743354f09cc29be2f72dfa8b05320110bcea53bb038c"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0}, 0x10) r2 = socket(0x1, 0x5, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) 18:12:25 executing program 3: perf_event_open(0x0, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x9) 18:12:25 executing program 0: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$FS_IOC_RESVSP(r0, 0x402c5828, &(0x7f00000000c0)={0x0, 0x1, 0xa8f, 0x3078}) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x200000000}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x9) preadv(r1, &(0x7f0000000240)=[{&(0x7f0000000040)=""/94, 0x5e}, {&(0x7f00000000c0)=""/93, 0x5d}, {&(0x7f0000000140)=""/58, 0x3a}], 0x3, 0xd9f, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000002340)='./file0\x00', 0x0, 0x108) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000180)={'team0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @local}, 0x14) writev(r2, &(0x7f0000000280)=[{&(0x7f00000008c0)="110eaa1a9896d57019effc8c79961d0f73ccf3afca3754e2e7a31f536bcb7204bed59311e29c96e1c2b663d61e5b0c0a76ea50cbddaa69f578b8600f77cf1a538ac900673696245b6de4283c979a2eccd71f9583dacf650575d1398678895da32663735b4d0cabfe7e972e59c2b4b4c9c89d0b82ca2267ad5062303e8abcb79600010506702eb912e3957e507aec4e2180699a738f6753509a12282a1d7181887f6c2e03de1da0dfe3b4efbb10e9b59301b4ef8a1d", 0xb5}, {&(0x7f0000000980)="34c30d95766fefbb7bdc40a3242505587bbc8584c2bc2003185f5ce116eea020efa91e2aae1eae2b8e848ac13c3dcedbbbc82adb1e70be8eecedba37be82545f2abda4f0a0e0fd0edd6bd03bb8e9bb91c39a2c828511aef3e684ad4c21ec0c146b9570139e31cd", 0x67}], 0x2) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'macvtap0\x00'}) ioctl$PPPIOCSFLAGS1(0xffffffffffffffff, 0x40047459, &(0x7f00000001c0)) recvmmsg(0xffffffffffffffff, &(0x7f0000002200)=[{{&(0x7f0000000340)=@in={0x2, 0x0, @multicast1}, 0x80, &(0x7f0000000440)=[{&(0x7f00000004c0)=""/88, 0x58}, {&(0x7f0000000b40)=""/4096, 0x1000}], 0x2, &(0x7f0000000740)=""/192, 0xc0}, 0x3}, {{&(0x7f0000000800)=@sco={0x1f, @none}, 0x80, &(0x7f0000000480)=[{&(0x7f0000001b40)=""/82, 0x52}], 0x1, &(0x7f0000001bc0)=""/206, 0xce}, 0x7}, {{&(0x7f0000001cc0)=@in={0x2, 0x0, @broadcast}, 0x80, &(0x7f0000000880)=[{&(0x7f0000001d40)=""/146, 0x92}, {&(0x7f0000001e00)=""/231, 0xe7}], 0x2, &(0x7f0000001f00)=""/239, 0xef}, 0x3}, {{&(0x7f0000002000)=@xdp, 0x80, &(0x7f00000020c0)=[{&(0x7f0000002080)=""/58, 0x3a}], 0x1, &(0x7f0000002100)=""/251, 0xfb}, 0x9}], 0x4, 0x40, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000002380)=ANY=[@ANYBLOB="050000004f2fe4e7fe91d1f169b7f431831544d94b6dbcca36d501829c64f0c28565fbc3e562e329d779aef804590001804797c4378192536ca659efcf0a6cb16b0ba5b79cfefdc8e93c46dfa0c119d12be6495820cc0b34645475d4da28535803ddcfd16f5df589e2f1ac230118eafd75a63c016b3a1663bc141e5ed84016b6b02854a48c0ec71a36a1ad145c5d2216e964a34cdf686b0a089443bd0f8c210860754d133e2c97ce8a25ee4d4eb5abb779387ca2cd9e870d5cb5854616c65c24f259eeaa625432fa25dd2832dc14f9a78ebf3a24277da2b55d09ed6a1dca07d4fb9ed592a64782b6939500505805d12b2776980c4b250f17b0b9a8fda266d7f084a9cd1022d2d670f793298bcf83b9a25e4ae25ac23ce06ef88068108ec131b23695772064709b1dbee85e5c2a0c4cf809dbd8b5617f8c6f6fba013f019829c83bd4cf10be5c6da663ce7cbf9b19ebd88bedb114ec207599273b55ec5f4cd35914f897ee8afc7663255678f6853e5cfa0dfa079ba560c7ddbc56e6352397b7266ac906a0ce0fb810eb00000000000000000000000000000000000000000000000000c54baf95f669d6810040c457be8ca739b4ec785f005bb4faa01270b999b6c9899cd9e8997d359b77c00a68341ca40b4c0e06884b6384ef6e", @ANYRESDEC=r0, @ANYBLOB="b21b22b0b59f1a76abb6323c16886f3d2569d595dca4af1ac9160b24b62e47302e148fa17433c275945e36a713e5fad2e8abc9651d17b22d7d092020f73d100115fed606c66c84318df7895b1e5780f3c785bfb92571cf1bc9", @ANYRES32=0x0, @ANYRES32, @ANYRES32=0x0], &(0x7f0000000300)=0x18) r5 = socket(0x1, 0x803, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8936, &(0x7f0000000080)={@rand_addr=' \x01\x00', 0x44, r4}) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) r6 = socket(0x10, 0x8000000803, 0x0) sendmsg$nl_route(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000a00)=@newlink={0x74, 0x10, 0x401, 0x3001, 0x25dfdbfc, {0x0, 0x0, 0x0, 0x0, 0x534ad, 0x42a03}, [@IFLA_LINKINFO={0x4c, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x3c, 0x2, 0x0, 0x1, [@IFLA_IPVLAN_MODE={0x6, 0x1, 0x2}, @IFLA_IPVLAN_FLAGS={0x6, 0x2, 0x2}, @IFLA_IPVLAN_FLAGS={0x6, 0x2, 0x1}, @IFLA_IPVLAN_FLAGS={0x6, 0x2, 0x2}, @IFLA_IPVLAN_FLAGS={0x6, 0x2, 0x3}, @IFLA_IPVLAN_MODE={0x6}, @IFLA_IPVLAN_FLAGS={0x6, 0x2, 0x2}]}}}, @IFLA_LINK={0x8, 0x5, r4}]}, 0x74}}, 0x0) 18:12:25 executing program 2: syz_mount_image$ntfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f00000013c0)={[{@fmask}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'syzkaller1\x00'}}]}) (fail_nth: 22) 18:12:25 executing program 1: syz_mount_image$ntfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x406, 0x0, &(0x7f00000000c0), 0x218400, &(0x7f00000013c0)) 18:12:25 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="b4050000000000006110580000000000c60000000000000095000002000000002ac73fe427abdf478e0357f2d32986f50b892b5007921cd48fe43b23be60a2dbc9778bb665510e3e22fcb26adfdc05e55a4933e62a23abb4baca4ec89323257db59db5eeda384459dd00d41b6aab85df5cab39e726769e2291b626d120a9247579f0b8edd8f16683e0623366ac632c24921d21534237743354f09cc29be2f72dfa8b05320110bcea53bb038c"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x0, 0x5, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) 18:12:25 executing program 3: perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x200000000}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x9) [ 534.406990][T21628] loop1: detected capacity change from 0 to 2 18:12:26 executing program 1: syz_mount_image$ntfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x500, 0x0, &(0x7f00000000c0), 0x218400, &(0x7f00000013c0)) [ 534.481661][T21630] FAULT_INJECTION: forcing a failure. [ 534.481661][T21630] name failslab, interval 1, probability 0, space 0, times 0 [ 534.510624][T21629] 8021q: adding VLAN 0 to HW filter on device ipvlan27 [ 534.569948][T21630] CPU: 0 PID: 21630 Comm: syz-executor.2 Not tainted 5.16.0-rc5-syzkaller #0 [ 534.578754][T21630] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 534.588827][T21630] Call Trace: [ 534.592129][T21630] [ 534.595076][T21630] dump_stack_lvl+0x201/0x2d8 [ 534.599886][T21630] ? show_regs_print_info+0x12/0x12 [ 534.605106][T21630] ? log_buf_vmcoreinfo_setup+0x498/0x498 [ 534.610863][T21630] ? __might_sleep+0xe0/0xe0 [ 534.615469][T21630] should_fail+0x384/0x4b0 [ 534.619886][T21630] ? apply_wqattrs_prepare+0xea/0xb20 [ 534.625256][T21630] should_failslab+0x5/0x20 [ 534.629755][T21630] kmem_cache_alloc_trace+0x71/0x330 [ 534.635043][T21630] apply_wqattrs_prepare+0xea/0xb20 [ 534.640258][T21630] apply_workqueue_attrs+0xc9/0x170 [ 534.645721][T21630] alloc_workqueue+0xec8/0x1470 [ 534.650587][T21630] ? mutex_lock_io_nested+0x60/0x60 [ 534.655787][T21630] ? loop_configure+0x679/0x1740 [ 534.660734][T21630] ? apply_workqueue_attrs+0x170/0x170 [ 534.666454][T21630] ? __fget_files+0x3d0/0x440 [ 534.671152][T21630] loop_configure+0x721/0x1740 [ 534.676005][T21630] ? reacquire_held_locks+0x620/0x620 [ 534.681379][T21630] lo_ioctl+0x7d4/0x1f40 [ 534.685625][T21630] ? lo_release+0x1f0/0x1f0 [ 534.690128][T21630] ? rcu_read_lock_sched_held+0x89/0x130 [ 534.695751][T21630] ? __bpf_trace_rcu_stall_warning+0x10/0x10 [ 534.701766][T21630] ? rcu_lock_release+0x5/0x20 [ 534.706524][T21630] ? __lock_acquire+0x2b00/0x2b00 [ 534.711553][T21630] ? stack_trace_save+0x1e0/0x1e0 [ 534.716568][T21630] ? stack_trace_save+0x1e0/0x1e0 [ 534.721582][T21630] ? is_bpf_text_address+0x253/0x270 [ 534.726859][T21630] ? stack_trace_save+0x1e0/0x1e0 [ 534.731876][T21630] ? kernel_text_address+0x9e/0xd0 [ 534.736981][T21630] ? __kernel_text_address+0x9/0x40 [ 534.742173][T21630] ? unwind_get_return_address+0x48/0x80 [ 534.747802][T21630] ? arch_stack_walk+0xf8/0x140 [ 534.752664][T21630] ? stack_trace_save+0x11b/0x1e0 [ 534.757684][T21630] ? stack_trace_snprint+0xe0/0xe0 [ 534.762788][T21630] ? rcu_read_lock_sched_held+0x89/0x130 [ 534.768427][T21630] ? kfree+0xe1/0x330 [ 534.772406][T21630] ? kasan_set_track+0x68/0x80 [ 534.777165][T21630] ? kasan_set_track+0x4c/0x80 [ 534.781917][T21630] ? kasan_set_free_info+0x1f/0x40 [ 534.787019][T21630] ? ____kasan_slab_free+0x10d/0x150 [ 534.792294][T21630] ? slab_free_freelist_hook+0x12e/0x1a0 [ 534.797922][T21630] ? kfree+0xe1/0x330 [ 534.801894][T21630] ? tomoyo_path_number_perm+0x5f1/0x7c0 [ 534.807514][T21630] ? security_file_ioctl+0x55/0xb0 [ 534.812618][T21630] ? __se_sys_ioctl+0x48/0x170 [ 534.817471][T21630] ? do_syscall_64+0x44/0xd0 [ 534.823268][T21630] ? entry_SYSCALL_64_after_hwframe+0x44/0xae [ 534.829351][T21630] ? rcu_read_lock_sched_held+0x89/0x130 [ 534.834978][T21630] ? __bpf_trace_rcu_stall_warning+0x10/0x10 [ 534.840953][T21630] ? lockdep_hardirqs_on_prepare+0x412/0x780 [ 534.846936][T21630] ? do_vfs_ioctl+0xcb2/0x2b90 [ 534.851724][T21630] ? blkdev_common_ioctl+0x702/0x2000 [ 534.857096][T21630] ? tomoyo_check_path_acl+0x1c0/0x1c0 [ 534.862546][T21630] ? blkdev_bszset+0x260/0x260 [ 534.867323][T21630] ? memset+0x1f/0x40 [ 534.871296][T21630] ? smack_file_ioctl+0x298/0x3a0 [ 534.876314][T21630] ? smack_file_alloc_security+0xd0/0xd0 [ 534.881941][T21630] ? lo_release+0x1f0/0x1f0 [ 534.886439][T21630] blkdev_ioctl+0x3ac/0x790 [ 534.890945][T21630] ? blkdev_compat_ptr_ioctl+0xd0/0xd0 [ 534.896403][T21630] ? bpf_lsm_file_ioctl+0x5/0x10 [ 534.901331][T21630] ? security_file_ioctl+0x9d/0xb0 [ 534.906434][T21630] ? blkdev_compat_ptr_ioctl+0xd0/0xd0 [ 534.911886][T21630] __se_sys_ioctl+0xfb/0x170 [ 534.916471][T21630] do_syscall_64+0x44/0xd0 [ 534.920881][T21630] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 534.926763][T21630] RIP: 0033:0x7f3831feec57 [ 534.931169][T21630] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 04 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 534.950768][T21630] RSP: 002b:00007f3830963f28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 534.959194][T21630] RAX: ffffffffffffffda RBX: 00007f38320389c8 RCX: 00007f3831feec57 18:12:26 executing program 3: perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x200000000}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x9) [ 534.967156][T21630] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 534.975117][T21630] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007f38309641d0 [ 534.983076][T21630] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 534.991032][T21630] R13: 0000000000000004 R14: 00000000200000c0 R15: 0000000000000000 [ 534.999009][T21630] 18:12:26 executing program 0: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$FS_IOC_RESVSP(r0, 0x402c5828, &(0x7f00000000c0)={0x0, 0x1, 0xa8f, 0x3078}) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x200000000}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x9) preadv(r1, &(0x7f0000000240)=[{&(0x7f0000000040)=""/94, 0x5e}, {&(0x7f00000000c0)=""/93, 0x5d}, {&(0x7f0000000140)=""/58, 0x3a}], 0x3, 0xd9f, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000002340)='./file0\x00', 0x0, 0x108) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000180)={'team0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @local}, 0x14) writev(r2, &(0x7f0000000280)=[{&(0x7f00000008c0)="110eaa1a9896d57019effc8c79961d0f73ccf3afca3754e2e7a31f536bcb7204bed59311e29c96e1c2b663d61e5b0c0a76ea50cbddaa69f578b8600f77cf1a538ac900673696245b6de4283c979a2eccd71f9583dacf650575d1398678895da32663735b4d0cabfe7e972e59c2b4b4c9c89d0b82ca2267ad5062303e8abcb79600010506702eb912e3957e507aec4e2180699a738f6753509a12282a1d7181887f6c2e03de1da0dfe3b4efbb10e9b59301b4ef8a1d", 0xb5}, {&(0x7f0000000980)="34c30d95766fefbb7bdc40a3242505587bbc8584c2bc2003185f5ce116eea020efa91e2aae1eae2b8e848ac13c3dcedbbbc82adb1e70be8eecedba37be82545f2abda4f0a0e0fd0edd6bd03bb8e9bb91c39a2c828511aef3e684ad4c21ec0c146b9570139e31cd", 0x67}], 0x2) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'macvtap0\x00'}) ioctl$PPPIOCSFLAGS1(0xffffffffffffffff, 0x40047459, &(0x7f00000001c0)) recvmmsg(0xffffffffffffffff, &(0x7f0000002200)=[{{&(0x7f0000000340)=@in={0x2, 0x0, @multicast1}, 0x80, &(0x7f0000000440)=[{&(0x7f00000004c0)=""/88, 0x58}, {&(0x7f0000000b40)=""/4096, 0x1000}], 0x2, &(0x7f0000000740)=""/192, 0xc0}, 0x3}, {{&(0x7f0000000800)=@sco={0x1f, @none}, 0x80, &(0x7f0000000480)=[{&(0x7f0000001b40)=""/82, 0x52}], 0x1, &(0x7f0000001bc0)=""/206, 0xce}, 0x7}, {{&(0x7f0000001cc0)=@in={0x2, 0x0, @broadcast}, 0x80, &(0x7f0000000880)=[{&(0x7f0000001d40)=""/146, 0x92}, {&(0x7f0000001e00)=""/231, 0xe7}], 0x2, &(0x7f0000001f00)=""/239, 0xef}, 0x3}, {{&(0x7f0000002000)=@xdp, 0x80, &(0x7f00000020c0)=[{&(0x7f0000002080)=""/58, 0x3a}], 0x1, &(0x7f0000002100)=""/251, 0xfb}, 0x9}], 0x4, 0x40, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000002380)=ANY=[@ANYBLOB="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", @ANYRESDEC=r0, @ANYBLOB="b21b22b0b59f1a76abb6323c16886f3d2569d595dca4af1ac9160b24b62e47302e148fa17433c275945e36a713e5fad2e8abc9651d17b22d7d092020f73d100115fed606c66c84318df7895b1e5780f3c785bfb92571cf1bc9", @ANYRES32=0x0, @ANYRES32, @ANYRES32=0x0], &(0x7f0000000300)=0x18) r5 = socket(0x1, 0x803, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8936, &(0x7f0000000080)={@rand_addr=' \x01\x00', 0x44, r4}) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) r6 = socket(0x10, 0x8000000803, 0x0) sendmsg$nl_route(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000a00)=@newlink={0x74, 0x10, 0x401, 0x3001, 0x25dfdbfc, {0x0, 0x0, 0x0, 0x0, 0x534ad, 0x42a03}, [@IFLA_LINKINFO={0x4c, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x3c, 0x2, 0x0, 0x1, [@IFLA_IPVLAN_MODE={0x6, 0x1, 0x2}, @IFLA_IPVLAN_FLAGS={0x6, 0x2, 0x2}, @IFLA_IPVLAN_FLAGS={0x6, 0x2, 0x1}, @IFLA_IPVLAN_FLAGS={0x6, 0x2, 0x2}, @IFLA_IPVLAN_FLAGS={0x6, 0x2, 0x3}, @IFLA_IPVLAN_MODE={0x6}, @IFLA_IPVLAN_FLAGS={0x6, 0x2, 0x2}]}}}, @IFLA_LINK={0x8, 0x5, r4}]}, 0x74}}, 0x0) 18:12:26 executing program 3: perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x200000000}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x9) [ 535.158072][T21642] 8021q: adding VLAN 0 to HW filter on device ipvlan28 [ 535.236200][T21646] loop1: detected capacity change from 0 to 2 18:12:26 executing program 5: r0 = syz_io_uring_setup(0x3ede, &(0x7f0000000240), &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) socket$l2tp6(0xa, 0x2, 0x73) openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/locks\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READ=@pass_buffer={0x16, 0x0, 0x0, @fd_index=0x5, 0xffffffffffffffff, &(0x7f0000000040)=""/17, 0x11}, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000002040)=[{{&(0x7f0000001380)=@in6={0xa, 0x0, 0x0, @private0}, 0x80, 0x0}}], 0x1, 0x0) io_uring_enter(r0, 0x26, 0x0, 0x0, 0x0, 0x0) 18:12:26 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="b4050000000000006110580000000000c60000000000000095000002000000002ac73fe427abdf478e0357f2d32986f50b892b5007921cd48fe43b23be60a2dbc9778bb665510e3e22fcb26adfdc05e55a4933e62a23abb4baca4ec89323257db59db5eeda384459dd00d41b6aab85df5cab39e726769e2291b626d120a9247579f0b8edd8f16683e0623366ac632c24921d21534237743354f09cc29be2f72dfa8b05320110bcea53bb038c"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x0, 0x5, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) 18:12:26 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x200000000}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x9) 18:12:26 executing program 1: syz_mount_image$ntfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x600, 0x0, &(0x7f00000000c0), 0x218400, &(0x7f00000013c0)) 18:12:26 executing program 0: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$FS_IOC_RESVSP(r0, 0x402c5828, &(0x7f00000000c0)={0x0, 0x1, 0xa8f, 0x3078}) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x200000000}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x9) preadv(r1, &(0x7f0000000240)=[{&(0x7f0000000040)=""/94, 0x5e}, {&(0x7f00000000c0)=""/93, 0x5d}, {&(0x7f0000000140)=""/58, 0x3a}], 0x3, 0xd9f, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000002340)='./file0\x00', 0x0, 0x108) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000180)={'team0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @local}, 0x14) writev(r2, &(0x7f0000000280)=[{&(0x7f00000008c0)="110eaa1a9896d57019effc8c79961d0f73ccf3afca3754e2e7a31f536bcb7204bed59311e29c96e1c2b663d61e5b0c0a76ea50cbddaa69f578b8600f77cf1a538ac900673696245b6de4283c979a2eccd71f9583dacf650575d1398678895da32663735b4d0cabfe7e972e59c2b4b4c9c89d0b82ca2267ad5062303e8abcb79600010506702eb912e3957e507aec4e2180699a738f6753509a12282a1d7181887f6c2e03de1da0dfe3b4efbb10e9b59301b4ef8a1d", 0xb5}, {&(0x7f0000000980)="34c30d95766fefbb7bdc40a3242505587bbc8584c2bc2003185f5ce116eea020efa91e2aae1eae2b8e848ac13c3dcedbbbc82adb1e70be8eecedba37be82545f2abda4f0a0e0fd0edd6bd03bb8e9bb91c39a2c828511aef3e684ad4c21ec0c146b9570139e31cd", 0x67}], 0x2) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'macvtap0\x00'}) ioctl$PPPIOCSFLAGS1(0xffffffffffffffff, 0x40047459, &(0x7f00000001c0)) recvmmsg(0xffffffffffffffff, &(0x7f0000002200)=[{{&(0x7f0000000340)=@in={0x2, 0x0, @multicast1}, 0x80, &(0x7f0000000440)=[{&(0x7f00000004c0)=""/88, 0x58}, {&(0x7f0000000b40)=""/4096, 0x1000}], 0x2, &(0x7f0000000740)=""/192, 0xc0}, 0x3}, {{&(0x7f0000000800)=@sco={0x1f, @none}, 0x80, &(0x7f0000000480)=[{&(0x7f0000001b40)=""/82, 0x52}], 0x1, &(0x7f0000001bc0)=""/206, 0xce}, 0x7}, {{&(0x7f0000001cc0)=@in={0x2, 0x0, @broadcast}, 0x80, &(0x7f0000000880)=[{&(0x7f0000001d40)=""/146, 0x92}, {&(0x7f0000001e00)=""/231, 0xe7}], 0x2, &(0x7f0000001f00)=""/239, 0xef}, 0x3}, {{&(0x7f0000002000)=@xdp, 0x80, &(0x7f00000020c0)=[{&(0x7f0000002080)=""/58, 0x3a}], 0x1, &(0x7f0000002100)=""/251, 0xfb}, 0x9}], 0x4, 0x40, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000002380)=ANY=[@ANYBLOB="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", @ANYRESDEC=r0, @ANYBLOB="b21b22b0b59f1a76abb6323c16886f3d2569d595dca4af1ac9160b24b62e47302e148fa17433c275945e36a713e5fad2e8abc9651d17b22d7d092020f73d100115fed606c66c84318df7895b1e5780f3c785bfb92571cf1bc9", @ANYRES32=0x0, @ANYRES32, @ANYRES32=0x0], &(0x7f0000000300)=0x18) r5 = socket(0x1, 0x803, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8936, &(0x7f0000000080)={@rand_addr=' \x01\x00', 0x44, r4}) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) r6 = socket(0x10, 0x8000000803, 0x0) sendmsg$nl_route(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000a00)=@newlink={0x7c, 0x10, 0x401, 0x3001, 0x25dfdbfc, {0x0, 0x0, 0x0, 0x0, 0x534ad, 0x42a03}, [@IFLA_LINKINFO={0x4c, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x3c, 0x2, 0x0, 0x1, [@IFLA_IPVLAN_MODE={0x6, 0x1, 0x2}, @IFLA_IPVLAN_FLAGS={0x6, 0x2, 0x2}, @IFLA_IPVLAN_FLAGS={0x6, 0x2, 0x1}, @IFLA_IPVLAN_FLAGS={0x6, 0x2, 0x2}, @IFLA_IPVLAN_FLAGS={0x6, 0x2, 0x3}, @IFLA_IPVLAN_MODE={0x6}, @IFLA_IPVLAN_FLAGS={0x6, 0x2, 0x2}]}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8}]}, 0x7c}}, 0x0) 18:12:26 executing program 2: syz_mount_image$ntfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f00000013c0)={[{@fmask}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'syzkaller1\x00'}}]}) (fail_nth: 23) [ 535.530554][T21653] loop1: detected capacity change from 0 to 3 [ 535.557540][T21654] FAULT_INJECTION: forcing a failure. [ 535.557540][T21654] name failslab, interval 1, probability 0, space 0, times 0 18:12:27 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x200000000}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x9) 18:12:27 executing program 1: syz_mount_image$ntfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x604, 0x0, &(0x7f00000000c0), 0x218400, &(0x7f00000013c0)) [ 535.615599][T21654] CPU: 0 PID: 21654 Comm: syz-executor.2 Not tainted 5.16.0-rc5-syzkaller #0 [ 535.624417][T21654] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 535.634497][T21654] Call Trace: [ 535.637792][T21654] [ 535.640736][T21654] dump_stack_lvl+0x201/0x2d8 [ 535.645444][T21654] ? show_regs_print_info+0x12/0x12 [ 535.650844][T21654] ? log_buf_vmcoreinfo_setup+0x498/0x498 [ 535.656593][T21654] ? __might_sleep+0xe0/0xe0 [ 535.661225][T21654] should_fail+0x384/0x4b0 [ 535.665669][T21654] ? apply_wqattrs_prepare+0x17a/0xb20 [ 535.671152][T21654] should_failslab+0x5/0x20 [ 535.675673][T21654] kmem_cache_alloc_trace+0x71/0x330 [ 535.680975][T21654] ? apply_wqattrs_prepare+0xea/0xb20 [ 535.683063][T21652] 8021q: adding VLAN 0 to HW filter on device ipvlan29 [ 535.686370][T21654] apply_wqattrs_prepare+0x17a/0xb20 [ 535.686496][T21654] apply_workqueue_attrs+0xc9/0x170 [ 535.686522][T21654] alloc_workqueue+0xec8/0x1470 [ 535.686561][T21654] ? mutex_lock_io_nested+0x60/0x60 [ 535.686589][T21654] ? loop_configure+0x679/0x1740 [ 535.686613][T21654] ? apply_workqueue_attrs+0x170/0x170 [ 535.686644][T21654] ? __fget_files+0x3d0/0x440 [ 535.686680][T21654] loop_configure+0x721/0x1740 [ 535.733923][T21654] lo_ioctl+0x7d4/0x1f40 [ 535.738201][T21654] ? lo_release+0x1f0/0x1f0 [ 535.742724][T21654] ? rcu_read_lock_sched_held+0x89/0x130 [ 535.748376][T21654] ? __bpf_trace_rcu_stall_warning+0x10/0x10 [ 535.754395][T21654] ? rcu_lock_release+0x5/0x20 [ 535.759168][T21654] ? __lock_acquire+0x2b00/0x2b00 [ 535.764492][T21654] ? is_bpf_text_address+0x253/0x270 [ 535.769773][T21654] ? stack_trace_save+0x1e0/0x1e0 [ 535.774792][T21654] ? kernel_text_address+0x9e/0xd0 [ 535.779902][T21654] ? __kernel_text_address+0x9/0x40 [ 535.785097][T21654] ? unwind_get_return_address+0x48/0x80 [ 535.790725][T21654] ? arch_stack_walk+0xf8/0x140 [ 535.795589][T21654] ? stack_trace_save+0x11b/0x1e0 [ 535.800623][T21654] ? stack_trace_snprint+0xe0/0xe0 [ 535.805735][T21654] ? rcu_read_lock_sched_held+0x89/0x130 [ 535.811376][T21654] ? kfree+0xe1/0x330 [ 535.815349][T21654] ? kasan_set_track+0x68/0x80 [ 535.820112][T21654] ? kasan_set_track+0x4c/0x80 [ 535.824868][T21654] ? kasan_set_free_info+0x1f/0x40 [ 535.829971][T21654] ? ____kasan_slab_free+0x10d/0x150 [ 535.835251][T21654] ? slab_free_freelist_hook+0x12e/0x1a0 [ 535.840875][T21654] ? kfree+0xe1/0x330 [ 535.844846][T21654] ? tomoyo_path_number_perm+0x5f1/0x7c0 [ 535.850469][T21654] ? security_file_ioctl+0x55/0xb0 [ 535.855571][T21654] ? __se_sys_ioctl+0x48/0x170 [ 535.860324][T21654] ? do_syscall_64+0x44/0xd0 [ 535.864907][T21654] ? entry_SYSCALL_64_after_hwframe+0x44/0xae [ 535.870993][T21654] ? rcu_read_lock_sched_held+0x89/0x130 [ 535.876620][T21654] ? __bpf_trace_rcu_stall_warning+0x10/0x10 [ 535.882600][T21654] ? lockdep_hardirqs_on_prepare+0x412/0x780 [ 535.888589][T21654] ? do_vfs_ioctl+0xcb2/0x2b90 [ 535.893396][T21654] ? blkdev_common_ioctl+0x702/0x2000 [ 535.898770][T21654] ? tomoyo_check_path_acl+0x1c0/0x1c0 [ 535.904233][T21654] ? blkdev_bszset+0x260/0x260 [ 535.909020][T21654] ? memset+0x1f/0x40 [ 535.912998][T21654] ? smack_file_ioctl+0x298/0x3a0 [ 535.918019][T21654] ? smack_file_alloc_security+0xd0/0xd0 [ 535.923653][T21654] ? lo_release+0x1f0/0x1f0 [ 535.928154][T21654] blkdev_ioctl+0x3ac/0x790 [ 535.932701][T21654] ? blkdev_compat_ptr_ioctl+0xd0/0xd0 [ 535.938189][T21654] ? bpf_lsm_file_ioctl+0x5/0x10 [ 535.943144][T21654] ? security_file_ioctl+0x9d/0xb0 [ 535.948270][T21654] ? blkdev_compat_ptr_ioctl+0xd0/0xd0 [ 535.953731][T21654] __se_sys_ioctl+0xfb/0x170 [ 535.958327][T21654] do_syscall_64+0x44/0xd0 [ 535.962748][T21654] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 535.968635][T21654] RIP: 0033:0x7f3831feec57 [ 535.973069][T21654] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 04 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 535.992679][T21654] RSP: 002b:00007f3830963f28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 536.001095][T21654] RAX: ffffffffffffffda RBX: 00007f38320389c8 RCX: 00007f3831feec57 [ 536.009062][T21654] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 18:12:27 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="b4050000000000006110580000000000c60000000000000095000002000000002ac73fe427abdf478e0357f2d32986f50b892b5007921cd48fe43b23be60a2dbc9778bb665510e3e22fcb26adfdc05e55a4933e62a23abb4baca4ec89323257db59db5eeda384459dd00d41b6aab85df5cab39e726769e2291b626d120a9247579f0b8edd8f16683e0623366ac632c24921d21534237743354f09cc29be2f72dfa8b05320110bcea53bb038c"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x0, 0x5, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) 18:12:27 executing program 5: r0 = syz_io_uring_setup(0x3ede, &(0x7f0000000240), &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) socket$l2tp6(0xa, 0x2, 0x73) openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/locks\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READ=@pass_buffer={0x16, 0x0, 0x0, @fd_index=0x5, 0xffffffffffffffff, &(0x7f0000000040)=""/17, 0x11}, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000002040)=[{{&(0x7f0000001380)=@in6={0xa, 0x0, 0x0, @private0}, 0x80, 0x0}}], 0x1, 0x0) io_uring_enter(r0, 0x26, 0x2, 0x0, 0x0, 0x0) [ 536.017025][T21654] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007f38309641d0 [ 536.024989][T21654] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 536.032961][T21654] R13: 0000000000000004 R14: 00000000200000c0 R15: 0000000000000000 [ 536.040968][T21654] 18:12:27 executing program 0: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$FS_IOC_RESVSP(r0, 0x402c5828, &(0x7f00000000c0)={0x0, 0x1, 0xa8f, 0x3078}) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x200000000}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x9) preadv(r1, &(0x7f0000000240)=[{&(0x7f0000000040)=""/94, 0x5e}, {&(0x7f00000000c0)=""/93, 0x5d}, {&(0x7f0000000140)=""/58, 0x3a}], 0x3, 0xd9f, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000002340)='./file0\x00', 0x0, 0x108) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000180)={'team0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @local}, 0x14) writev(r2, &(0x7f0000000280)=[{&(0x7f00000008c0)="110eaa1a9896d57019effc8c79961d0f73ccf3afca3754e2e7a31f536bcb7204bed59311e29c96e1c2b663d61e5b0c0a76ea50cbddaa69f578b8600f77cf1a538ac900673696245b6de4283c979a2eccd71f9583dacf650575d1398678895da32663735b4d0cabfe7e972e59c2b4b4c9c89d0b82ca2267ad5062303e8abcb79600010506702eb912e3957e507aec4e2180699a738f6753509a12282a1d7181887f6c2e03de1da0dfe3b4efbb10e9b59301b4ef8a1d", 0xb5}, {&(0x7f0000000980)="34c30d95766fefbb7bdc40a3242505587bbc8584c2bc2003185f5ce116eea020efa91e2aae1eae2b8e848ac13c3dcedbbbc82adb1e70be8eecedba37be82545f2abda4f0a0e0fd0edd6bd03bb8e9bb91c39a2c828511aef3e684ad4c21ec0c146b9570139e31cd", 0x67}], 0x2) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'macvtap0\x00'}) ioctl$PPPIOCSFLAGS1(0xffffffffffffffff, 0x40047459, &(0x7f00000001c0)) recvmmsg(0xffffffffffffffff, &(0x7f0000002200)=[{{&(0x7f0000000340)=@in={0x2, 0x0, @multicast1}, 0x80, &(0x7f0000000440)=[{&(0x7f00000004c0)=""/88, 0x58}, {&(0x7f0000000b40)=""/4096, 0x1000}], 0x2, &(0x7f0000000740)=""/192, 0xc0}, 0x3}, {{&(0x7f0000000800)=@sco={0x1f, @none}, 0x80, &(0x7f0000000480)=[{&(0x7f0000001b40)=""/82, 0x52}], 0x1, &(0x7f0000001bc0)=""/206, 0xce}, 0x7}, {{&(0x7f0000001cc0)=@in={0x2, 0x0, @broadcast}, 0x80, &(0x7f0000000880)=[{&(0x7f0000001d40)=""/146, 0x92}, {&(0x7f0000001e00)=""/231, 0xe7}], 0x2, &(0x7f0000001f00)=""/239, 0xef}, 0x3}, {{&(0x7f0000002000)=@xdp, 0x80, &(0x7f00000020c0)=[{&(0x7f0000002080)=""/58, 0x3a}], 0x1, &(0x7f0000002100)=""/251, 0xfb}, 0x9}], 0x4, 0x40, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000002380)=ANY=[@ANYBLOB="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", @ANYRESDEC=r0, @ANYBLOB="b21b22b0b59f1a76abb6323c16886f3d2569d595dca4af1ac9160b24b62e47302e148fa17433c275945e36a713e5fad2e8abc9651d17b22d7d092020f73d100115fed606c66c84318df7895b1e5780f3c785bfb92571cf1bc9", @ANYRES32=0x0, @ANYRES32, @ANYRES32=0x0], &(0x7f0000000300)=0x18) r5 = socket(0x1, 0x803, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8936, &(0x7f0000000080)={@rand_addr=' \x01\x00', 0x44, r4}) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) r6 = socket(0x10, 0x8000000803, 0x0) sendmsg$nl_route(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000a00)=@newlink={0x7c, 0x10, 0x401, 0x3001, 0x25dfdbfc, {0x0, 0x0, 0x0, 0x0, 0x534ad, 0x42a03}, [@IFLA_LINKINFO={0x4c, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x3c, 0x2, 0x0, 0x1, [@IFLA_IPVLAN_MODE={0x6, 0x1, 0x2}, @IFLA_IPVLAN_FLAGS={0x6, 0x2, 0x2}, @IFLA_IPVLAN_FLAGS={0x6, 0x2, 0x1}, @IFLA_IPVLAN_FLAGS={0x6, 0x2, 0x2}, @IFLA_IPVLAN_FLAGS={0x6, 0x2, 0x3}, @IFLA_IPVLAN_MODE={0x6}, @IFLA_IPVLAN_FLAGS={0x6, 0x2, 0x2}]}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8}]}, 0x7c}}, 0x0) 18:12:27 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x200000000}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x9) 18:12:27 executing program 5: r0 = syz_io_uring_setup(0x3ede, &(0x7f0000000240), &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) socket$l2tp6(0xa, 0x2, 0x73) openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/locks\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READ=@pass_buffer={0x16, 0x0, 0x0, @fd_index=0x5, 0xffffffffffffffff, &(0x7f0000000040)=""/17, 0x11}, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000002040)=[{{&(0x7f0000001380)=@in6={0xa, 0x0, 0x0, @private0}, 0x80, 0x0}}], 0x1, 0x0) io_uring_enter(r0, 0x26, 0x3, 0x0, 0x0, 0x0) 18:12:27 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="b4050000000000006110580000000000c60000000000000095000002000000002ac73fe427abdf478e0357f2d32986f50b892b5007921cd48fe43b23be60a2dbc9778bb665510e3e22fcb26adfdc05e55a4933e62a23abb4baca4ec89323257db59db5eeda384459dd00d41b6aab85df5cab39e726769e2291b626d120a9247579f0b8edd8f16683e0623366ac632c24921d21534237743354f09cc29be2f72dfa8b05320110bcea53bb038c"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) 18:12:27 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x200000000}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x9) 18:12:27 executing program 2: syz_mount_image$ntfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f00000013c0)={[{@fmask}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'syzkaller1\x00'}}]}) (fail_nth: 24) [ 536.276144][T21670] 8021q: adding VLAN 0 to HW filter on device ipvlan30 [ 536.294455][T21674] loop1: detected capacity change from 0 to 3 18:12:27 executing program 0: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$FS_IOC_RESVSP(r0, 0x402c5828, &(0x7f00000000c0)={0x0, 0x1, 0xa8f, 0x3078}) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x200000000}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x9) preadv(r1, &(0x7f0000000240)=[{&(0x7f0000000040)=""/94, 0x5e}, {&(0x7f00000000c0)=""/93, 0x5d}, {&(0x7f0000000140)=""/58, 0x3a}], 0x3, 0xd9f, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000002340)='./file0\x00', 0x0, 0x108) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000180)={'team0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @local}, 0x14) writev(r2, &(0x7f0000000280)=[{&(0x7f00000008c0)="110eaa1a9896d57019effc8c79961d0f73ccf3afca3754e2e7a31f536bcb7204bed59311e29c96e1c2b663d61e5b0c0a76ea50cbddaa69f578b8600f77cf1a538ac900673696245b6de4283c979a2eccd71f9583dacf650575d1398678895da32663735b4d0cabfe7e972e59c2b4b4c9c89d0b82ca2267ad5062303e8abcb79600010506702eb912e3957e507aec4e2180699a738f6753509a12282a1d7181887f6c2e03de1da0dfe3b4efbb10e9b59301b4ef8a1d", 0xb5}, {&(0x7f0000000980)="34c30d95766fefbb7bdc40a3242505587bbc8584c2bc2003185f5ce116eea020efa91e2aae1eae2b8e848ac13c3dcedbbbc82adb1e70be8eecedba37be82545f2abda4f0a0e0fd0edd6bd03bb8e9bb91c39a2c828511aef3e684ad4c21ec0c146b9570139e31cd", 0x67}], 0x2) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'macvtap0\x00'}) ioctl$PPPIOCSFLAGS1(0xffffffffffffffff, 0x40047459, &(0x7f00000001c0)) recvmmsg(0xffffffffffffffff, &(0x7f0000002200)=[{{&(0x7f0000000340)=@in={0x2, 0x0, @multicast1}, 0x80, &(0x7f0000000440)=[{&(0x7f00000004c0)=""/88, 0x58}, {&(0x7f0000000b40)=""/4096, 0x1000}], 0x2, &(0x7f0000000740)=""/192, 0xc0}, 0x3}, {{&(0x7f0000000800)=@sco={0x1f, @none}, 0x80, &(0x7f0000000480)=[{&(0x7f0000001b40)=""/82, 0x52}], 0x1, &(0x7f0000001bc0)=""/206, 0xce}, 0x7}, {{&(0x7f0000001cc0)=@in={0x2, 0x0, @broadcast}, 0x80, &(0x7f0000000880)=[{&(0x7f0000001d40)=""/146, 0x92}, {&(0x7f0000001e00)=""/231, 0xe7}], 0x2, &(0x7f0000001f00)=""/239, 0xef}, 0x3}, {{&(0x7f0000002000)=@xdp, 0x80, &(0x7f00000020c0)=[{&(0x7f0000002080)=""/58, 0x3a}], 0x1, &(0x7f0000002100)=""/251, 0xfb}, 0x9}], 0x4, 0x40, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000002380)=ANY=[@ANYBLOB="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", @ANYRESDEC=r0, @ANYBLOB="b21b22b0b59f1a76abb6323c16886f3d2569d595dca4af1ac9160b24b62e47302e148fa17433c275945e36a713e5fad2e8abc9651d17b22d7d092020f73d100115fed606c66c84318df7895b1e5780f3c785bfb92571cf1bc9", @ANYRES32=0x0, @ANYRES32, @ANYRES32=0x0], &(0x7f0000000300)=0x18) r5 = socket(0x1, 0x803, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8936, &(0x7f0000000080)={@rand_addr=' \x01\x00', 0x44, r4}) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) r6 = socket(0x10, 0x8000000803, 0x0) sendmsg$nl_route(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000a00)=@newlink={0x7c, 0x10, 0x401, 0x3001, 0x25dfdbfc, {0x0, 0x0, 0x0, 0x0, 0x534ad, 0x42a03}, [@IFLA_LINKINFO={0x4c, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x3c, 0x2, 0x0, 0x1, [@IFLA_IPVLAN_MODE={0x6, 0x1, 0x2}, @IFLA_IPVLAN_FLAGS={0x6, 0x2, 0x2}, @IFLA_IPVLAN_FLAGS={0x6, 0x2, 0x1}, @IFLA_IPVLAN_FLAGS={0x6, 0x2, 0x2}, @IFLA_IPVLAN_FLAGS={0x6, 0x2, 0x3}, @IFLA_IPVLAN_MODE={0x6}, @IFLA_IPVLAN_FLAGS={0x6, 0x2, 0x2}]}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8}]}, 0x7c}}, 0x0) 18:12:27 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="b4050000000000006110580000000000c60000000000000095000002000000002ac73fe427abdf478e0357f2d32986f50b892b5007921cd48fe43b23be60a2dbc9778bb665510e3e22fcb26adfdc05e55a4933e62a23abb4baca4ec89323257db59db5eeda384459dd00d41b6aab85df5cab39e726769e2291b626d120a9247579f0b8edd8f16683e0623366ac632c24921d21534237743354f09cc29be2f72dfa8b05320110bcea53bb038c"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) 18:12:27 executing program 5: r0 = syz_io_uring_setup(0x3ede, &(0x7f0000000240), &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) socket$l2tp6(0xa, 0x2, 0x73) openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/locks\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READ=@pass_buffer={0x16, 0x0, 0x0, @fd_index=0x5, 0xffffffffffffffff, &(0x7f0000000040)=""/17, 0x11}, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000002040)=[{{&(0x7f0000001380)=@in6={0xa, 0x0, 0x0, @private0}, 0x80, 0x0}}], 0x1, 0x0) io_uring_enter(r0, 0x26, 0x4, 0x0, 0x0, 0x0) 18:12:27 executing program 1: syz_mount_image$ntfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x700, 0x0, &(0x7f00000000c0), 0x218400, &(0x7f00000013c0)) [ 536.434310][T21682] FAULT_INJECTION: forcing a failure. [ 536.434310][T21682] name failslab, interval 1, probability 0, space 0, times 0 18:12:27 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x200000000}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x9) 18:12:28 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="b4050000000000006110580000000000c60000000000000095000002000000002ac73fe427abdf478e0357f2d32986f50b892b5007921cd48fe43b23be60a2dbc9778bb665510e3e22fcb26adfdc05e55a4933e62a23abb4baca4ec89323257db59db5eeda384459dd00d41b6aab85df5cab39e726769e2291b626d120a9247579f0b8edd8f16683e0623366ac632c24921d21534237743354f09cc29be2f72dfa8b05320110bcea53bb038c"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) [ 536.527112][T21685] 8021q: adding VLAN 0 to HW filter on device ipvlan31 [ 536.555932][T21682] CPU: 0 PID: 21682 Comm: syz-executor.2 Not tainted 5.16.0-rc5-syzkaller #0 [ 536.565182][T21682] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 536.575244][T21682] Call Trace: [ 536.578526][T21682] [ 536.581454][T21682] dump_stack_lvl+0x201/0x2d8 [ 536.586139][T21682] ? show_regs_print_info+0x12/0x12 [ 536.591340][T21682] ? log_buf_vmcoreinfo_setup+0x498/0x498 [ 536.597062][T21682] ? __might_sleep+0xe0/0xe0 [ 536.601708][T21682] should_fail+0x384/0x4b0 [ 536.606130][T21682] ? alloc_unbound_pwq+0x5e4/0xf90 [ 536.611251][T21682] should_failslab+0x5/0x20 [ 536.615781][T21682] kmem_cache_alloc_node+0x75/0x370 [ 536.620988][T21682] alloc_unbound_pwq+0x5e4/0xf90 [ 536.625938][T21682] apply_wqattrs_prepare+0x387/0xb20 [ 536.631247][T21682] apply_workqueue_attrs+0xc9/0x170 [ 536.636447][T21682] alloc_workqueue+0xec8/0x1470 [ 536.641316][T21682] ? mutex_lock_io_nested+0x60/0x60 [ 536.646600][T21682] ? loop_configure+0x679/0x1740 [ 536.651534][T21682] ? apply_workqueue_attrs+0x170/0x170 [ 536.657079][T21682] ? __fget_files+0x3d0/0x440 [ 536.661765][T21682] loop_configure+0x721/0x1740 [ 536.666558][T21682] lo_ioctl+0x7d4/0x1f40 [ 536.670813][T21682] ? lo_release+0x1f0/0x1f0 [ 536.675317][T21682] ? rcu_read_lock_sched_held+0x89/0x130 [ 536.680946][T21682] ? __bpf_trace_rcu_stall_warning+0x10/0x10 [ 536.686967][T21682] ? rcu_lock_release+0x5/0x20 [ 536.691728][T21682] ? __lock_acquire+0x2b00/0x2b00 [ 536.696763][T21682] ? stack_trace_save+0x1e0/0x1e0 [ 536.701779][T21682] ? stack_trace_save+0x1e0/0x1e0 [ 536.706796][T21682] ? is_bpf_text_address+0x253/0x270 [ 536.712081][T21682] ? stack_trace_save+0x1e0/0x1e0 [ 536.717102][T21682] ? kernel_text_address+0x9e/0xd0 [ 536.722216][T21682] ? __kernel_text_address+0x9/0x40 [ 536.727409][T21682] ? unwind_get_return_address+0x48/0x80 [ 536.733059][T21682] ? arch_stack_walk+0xf8/0x140 [ 536.737928][T21682] ? stack_trace_save+0x11b/0x1e0 [ 536.742958][T21682] ? stack_trace_snprint+0xe0/0xe0 [ 536.748149][T21682] ? rcu_read_lock_sched_held+0x89/0x130 [ 536.753805][T21682] ? kfree+0xe1/0x330 [ 536.757782][T21682] ? kasan_set_track+0x68/0x80 [ 536.762537][T21682] ? kasan_set_track+0x4c/0x80 [ 536.767300][T21682] ? kasan_set_free_info+0x1f/0x40 [ 536.772406][T21682] ? ____kasan_slab_free+0x10d/0x150 [ 536.777783][T21682] ? slab_free_freelist_hook+0x12e/0x1a0 [ 536.783406][T21682] ? kfree+0xe1/0x330 [ 536.787379][T21682] ? tomoyo_path_number_perm+0x5f1/0x7c0 [ 536.793003][T21682] ? security_file_ioctl+0x55/0xb0 [ 536.798119][T21682] ? __se_sys_ioctl+0x48/0x170 [ 536.802896][T21682] ? do_syscall_64+0x44/0xd0 [ 536.807481][T21682] ? entry_SYSCALL_64_after_hwframe+0x44/0xae [ 536.813568][T21682] ? rcu_read_lock_sched_held+0x89/0x130 [ 536.819200][T21682] ? __bpf_trace_rcu_stall_warning+0x10/0x10 [ 536.825176][T21682] ? lockdep_hardirqs_on_prepare+0x412/0x780 [ 536.831173][T21682] ? do_vfs_ioctl+0xcb2/0x2b90 [ 536.835978][T21682] ? blkdev_common_ioctl+0x702/0x2000 [ 536.841353][T21682] ? tomoyo_check_path_acl+0x1c0/0x1c0 [ 536.846806][T21682] ? blkdev_bszset+0x260/0x260 [ 536.851590][T21682] ? memset+0x1f/0x40 [ 536.855564][T21682] ? smack_file_ioctl+0x298/0x3a0 [ 536.860587][T21682] ? smack_file_alloc_security+0xd0/0xd0 [ 536.866219][T21682] ? lo_release+0x1f0/0x1f0 [ 536.870736][T21682] blkdev_ioctl+0x3ac/0x790 [ 536.875239][T21682] ? blkdev_compat_ptr_ioctl+0xd0/0xd0 [ 536.880699][T21682] ? bpf_lsm_file_ioctl+0x5/0x10 [ 536.885657][T21682] ? security_file_ioctl+0x9d/0xb0 [ 536.890773][T21682] ? blkdev_compat_ptr_ioctl+0xd0/0xd0 [ 536.896228][T21682] __se_sys_ioctl+0xfb/0x170 [ 536.900816][T21682] do_syscall_64+0x44/0xd0 [ 536.905234][T21682] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 536.911124][T21682] RIP: 0033:0x7f3831feec57 [ 536.915548][T21682] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 04 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 536.935152][T21682] RSP: 002b:00007f3830963f28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 536.943561][T21682] RAX: ffffffffffffffda RBX: 00007f38320389c8 RCX: 00007f3831feec57 [ 536.951523][T21682] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 536.959487][T21682] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007f38309641d0 [ 536.967448][T21682] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 18:12:28 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x200000000}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x9) 18:12:28 executing program 5: r0 = syz_io_uring_setup(0x3ede, &(0x7f0000000240), &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) socket$l2tp6(0xa, 0x2, 0x73) openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/locks\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READ=@pass_buffer={0x16, 0x0, 0x0, @fd_index=0x5, 0xffffffffffffffff, &(0x7f0000000040)=""/17, 0x11}, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000002040)=[{{&(0x7f0000001380)=@in6={0xa, 0x0, 0x0, @private0}, 0x80, 0x0}}], 0x1, 0x0) io_uring_enter(r0, 0x26, 0x5, 0x0, 0x0, 0x0) [ 536.975412][T21682] R13: 0000000000000004 R14: 00000000200000c0 R15: 0000000000000000 [ 536.983400][T21682] [ 537.014332][T21692] loop1: detected capacity change from 0 to 3 18:12:28 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="b4050000000000006110580000000000c60000000000000095000002000000002ac73fe427abdf478e0357f2d32986f50b892b5007921cd48fe43b23be60a2dbc9778bb665510e3e22fcb26adfdc05e55a4933e62a23abb4baca4ec89323257db59db5eeda384459dd00d41b6aab85df5cab39e726769e2291b626d120a9247579f0b8edd8f16683e0623366ac632c24921d21534237743354f09cc29be2f72dfa8b05320110bcea53bb038c"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) socket(0x1, 0x5, 0x0) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) 18:12:28 executing program 2: syz_mount_image$ntfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f00000013c0)={[{@fmask}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'syzkaller1\x00'}}]}) (fail_nth: 25) 18:12:28 executing program 1: syz_mount_image$ntfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x801, 0x0, &(0x7f00000000c0), 0x218400, &(0x7f00000013c0)) 18:12:28 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x200000000}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x9) 18:12:28 executing program 0: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$FS_IOC_RESVSP(r0, 0x402c5828, &(0x7f00000000c0)={0x0, 0x1, 0xa8f, 0x3078}) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x200000000}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x9) preadv(r1, &(0x7f0000000240)=[{&(0x7f0000000040)=""/94, 0x5e}, {&(0x7f00000000c0)=""/93, 0x5d}, {&(0x7f0000000140)=""/58, 0x3a}], 0x3, 0xd9f, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000002340)='./file0\x00', 0x0, 0x108) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000180)={'team0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @local}, 0x14) writev(r2, &(0x7f0000000280)=[{&(0x7f00000008c0)="110eaa1a9896d57019effc8c79961d0f73ccf3afca3754e2e7a31f536bcb7204bed59311e29c96e1c2b663d61e5b0c0a76ea50cbddaa69f578b8600f77cf1a538ac900673696245b6de4283c979a2eccd71f9583dacf650575d1398678895da32663735b4d0cabfe7e972e59c2b4b4c9c89d0b82ca2267ad5062303e8abcb79600010506702eb912e3957e507aec4e2180699a738f6753509a12282a1d7181887f6c2e03de1da0dfe3b4efbb10e9b59301b4ef8a1d", 0xb5}, {&(0x7f0000000980)="34c30d95766fefbb7bdc40a3242505587bbc8584c2bc2003185f5ce116eea020efa91e2aae1eae2b8e848ac13c3dcedbbbc82adb1e70be8eecedba37be82545f2abda4f0a0e0fd0edd6bd03bb8e9bb91c39a2c828511aef3e684ad4c21ec0c146b9570139e31cd", 0x67}], 0x2) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'macvtap0\x00'}) ioctl$PPPIOCSFLAGS1(0xffffffffffffffff, 0x40047459, &(0x7f00000001c0)) recvmmsg(0xffffffffffffffff, &(0x7f0000002200)=[{{&(0x7f0000000340)=@in={0x2, 0x0, @multicast1}, 0x80, &(0x7f0000000440)=[{&(0x7f00000004c0)=""/88, 0x58}, {&(0x7f0000000b40)=""/4096, 0x1000}], 0x2, &(0x7f0000000740)=""/192, 0xc0}, 0x3}, {{&(0x7f0000000800)=@sco={0x1f, @none}, 0x80, &(0x7f0000000480)=[{&(0x7f0000001b40)=""/82, 0x52}], 0x1, &(0x7f0000001bc0)=""/206, 0xce}, 0x7}, {{&(0x7f0000001cc0)=@in={0x2, 0x0, @broadcast}, 0x80, &(0x7f0000000880)=[{&(0x7f0000001d40)=""/146, 0x92}, {&(0x7f0000001e00)=""/231, 0xe7}], 0x2, &(0x7f0000001f00)=""/239, 0xef}, 0x3}, {{&(0x7f0000002000)=@xdp, 0x80, &(0x7f00000020c0)=[{&(0x7f0000002080)=""/58, 0x3a}], 0x1, &(0x7f0000002100)=""/251, 0xfb}, 0x9}], 0x4, 0x40, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000002380)=ANY=[@ANYBLOB="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", @ANYRESDEC=r0, @ANYBLOB="b21b22b0b59f1a76abb6323c16886f3d2569d595dca4af1ac9160b24b62e47302e148fa17433c275945e36a713e5fad2e8abc9651d17b22d7d092020f73d100115fed606c66c84318df7895b1e5780f3c785bfb92571cf1bc9", @ANYRES32=0x0, @ANYRES32, @ANYRES32=0x0], &(0x7f0000000300)=0x18) r5 = socket(0x1, 0x803, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8936, &(0x7f0000000080)={@rand_addr=' \x01\x00', 0x44, r4}) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) r7 = socket(0x10, 0x8000000803, 0x0) sendmsg$nl_route(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000a00)=@newlink={0x74, 0x10, 0x401, 0x3001, 0x25dfdbfc, {0x0, 0x0, 0x0, 0x0, 0x534ad, 0x42a03}, [@IFLA_LINKINFO={0x4c, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x3c, 0x2, 0x0, 0x1, [@IFLA_IPVLAN_MODE={0x6, 0x1, 0x2}, @IFLA_IPVLAN_FLAGS={0x6, 0x2, 0x2}, @IFLA_IPVLAN_FLAGS={0x6, 0x2, 0x1}, @IFLA_IPVLAN_FLAGS={0x6, 0x2, 0x2}, @IFLA_IPVLAN_FLAGS={0x6, 0x2, 0x3}, @IFLA_IPVLAN_MODE={0x6}, @IFLA_IPVLAN_FLAGS={0x6, 0x2, 0x2}]}}}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x74}}, 0x0) 18:12:28 executing program 5: r0 = syz_io_uring_setup(0x3ede, &(0x7f0000000240), &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) socket$l2tp6(0xa, 0x2, 0x73) openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/locks\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READ=@pass_buffer={0x16, 0x0, 0x0, @fd_index=0x5, 0xffffffffffffffff, &(0x7f0000000040)=""/17, 0x11}, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000002040)=[{{&(0x7f0000001380)=@in6={0xa, 0x0, 0x0, @private0}, 0x80, 0x0}}], 0x1, 0x0) io_uring_enter(r0, 0x26, 0x6, 0x0, 0x0, 0x0) [ 537.154097][T21703] loop1: detected capacity change from 0 to 4 [ 537.162676][T21704] FAULT_INJECTION: forcing a failure. [ 537.162676][T21704] name failslab, interval 1, probability 0, space 0, times 0 [ 537.220120][T21704] CPU: 1 PID: 21704 Comm: syz-executor.2 Not tainted 5.16.0-rc5-syzkaller #0 [ 537.228928][T21704] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 537.238988][T21704] Call Trace: [ 537.242275][T21704] [ 537.245200][T21704] dump_stack_lvl+0x201/0x2d8 [ 537.249902][T21704] ? show_regs_print_info+0x12/0x12 [ 537.255132][T21704] ? log_buf_vmcoreinfo_setup+0x498/0x498 [ 537.260851][T21704] ? __might_sleep+0xe0/0xe0 [ 537.265440][T21704] should_fail+0x384/0x4b0 [ 537.269850][T21704] ? kobject_uevent_env+0x27e/0x1700 [ 537.275128][T21704] should_failslab+0x5/0x20 [ 537.279629][T21704] kmem_cache_alloc_trace+0x71/0x330 [ 537.284920][T21704] kobject_uevent_env+0x27e/0x1700 [ 537.290067][T21704] disk_force_media_change+0x19c/0x2a0 [ 537.295533][T21704] ? bdev_check_media_change+0x540/0x540 [ 537.301183][T21704] ? __fget_files+0x3d0/0x440 [ 537.306024][T21704] loop_configure+0x778/0x1740 [ 537.310824][T21704] lo_ioctl+0x7d4/0x1f40 [ 537.315101][T21704] ? lo_release+0x1f0/0x1f0 [ 537.319634][T21704] ? rcu_read_lock_sched_held+0x89/0x130 [ 537.325284][T21704] ? __bpf_trace_rcu_stall_warning+0x10/0x10 [ 537.331283][T21704] ? rcu_lock_release+0x5/0x20 [ 537.336044][T21704] ? __lock_acquire+0x2b00/0x2b00 [ 537.341082][T21704] ? stack_trace_save+0x1e0/0x1e0 [ 537.346198][T21704] ? stack_trace_save+0x1e0/0x1e0 [ 537.351216][T21704] ? is_bpf_text_address+0x253/0x270 [ 537.356498][T21704] ? stack_trace_save+0x1e0/0x1e0 [ 537.361516][T21704] ? kernel_text_address+0x9e/0xd0 [ 537.366627][T21704] ? __kernel_text_address+0x9/0x40 [ 537.371831][T21704] ? unwind_get_return_address+0x48/0x80 [ 537.377464][T21704] ? arch_stack_walk+0xf8/0x140 [ 537.382411][T21704] ? stack_trace_save+0x11b/0x1e0 [ 537.387525][T21704] ? stack_trace_snprint+0xe0/0xe0 [ 537.392629][T21704] ? rcu_read_lock_sched_held+0x89/0x130 [ 537.398273][T21704] ? kfree+0xe1/0x330 [ 537.402250][T21704] ? kasan_set_track+0x68/0x80 [ 537.407007][T21704] ? kasan_set_track+0x4c/0x80 [ 537.411762][T21704] ? kasan_set_free_info+0x1f/0x40 [ 537.416954][T21704] ? ____kasan_slab_free+0x10d/0x150 [ 537.422234][T21704] ? slab_free_freelist_hook+0x12e/0x1a0 [ 537.427863][T21704] ? kfree+0xe1/0x330 [ 537.431837][T21704] ? tomoyo_path_number_perm+0x5f1/0x7c0 [ 537.437636][T21704] ? security_file_ioctl+0x55/0xb0 [ 537.442743][T21704] ? __se_sys_ioctl+0x48/0x170 [ 537.447583][T21704] ? do_syscall_64+0x44/0xd0 [ 537.452166][T21704] ? entry_SYSCALL_64_after_hwframe+0x44/0xae [ 537.458245][T21704] ? rcu_read_lock_sched_held+0x89/0x130 [ 537.463878][T21704] ? __bpf_trace_rcu_stall_warning+0x10/0x10 [ 537.470043][T21704] ? lockdep_hardirqs_on_prepare+0x412/0x780 [ 537.476028][T21704] ? do_vfs_ioctl+0xcb2/0x2b90 [ 537.480818][T21704] ? blkdev_common_ioctl+0x702/0x2000 [ 537.486304][T21704] ? tomoyo_check_path_acl+0x1c0/0x1c0 [ 537.491756][T21704] ? blkdev_bszset+0x260/0x260 [ 537.496687][T21704] ? memset+0x1f/0x40 [ 537.500953][T21704] ? smack_file_ioctl+0x298/0x3a0 [ 537.506015][T21704] ? smack_file_alloc_security+0xd0/0xd0 [ 537.511652][T21704] ? lo_release+0x1f0/0x1f0 [ 537.516153][T21704] blkdev_ioctl+0x3ac/0x790 [ 537.520747][T21704] ? blkdev_compat_ptr_ioctl+0xd0/0xd0 [ 537.526238][T21704] ? bpf_lsm_file_ioctl+0x5/0x10 [ 537.531356][T21704] ? security_file_ioctl+0x9d/0xb0 [ 537.536474][T21704] ? blkdev_compat_ptr_ioctl+0xd0/0xd0 [ 537.542034][T21704] __se_sys_ioctl+0xfb/0x170 [ 537.546627][T21704] do_syscall_64+0x44/0xd0 [ 537.551063][T21704] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 537.556952][T21704] RIP: 0033:0x7f3831feec57 [ 537.561367][T21704] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 04 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 537.580989][T21704] RSP: 002b:00007f3830963f28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 537.589398][T21704] RAX: ffffffffffffffda RBX: 00007f38320389c8 RCX: 00007f3831feec57 [ 537.597360][T21704] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 537.605337][T21704] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007f38309641d0 [ 537.613302][T21704] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 18:12:29 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="b4050000000000006110580000000000c60000000000000095000002000000002ac73fe427abdf478e0357f2d32986f50b892b5007921cd48fe43b23be60a2dbc9778bb665510e3e22fcb26adfdc05e55a4933e62a23abb4baca4ec89323257db59db5eeda384459dd00d41b6aab85df5cab39e726769e2291b626d120a9247579f0b8edd8f16683e0623366ac632c24921d21534237743354f09cc29be2f72dfa8b05320110bcea53bb038c"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) socket(0x1, 0x5, 0x0) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) 18:12:29 executing program 1: syz_mount_image$ntfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x900, 0x0, &(0x7f00000000c0), 0x218400, &(0x7f00000013c0)) [ 537.621523][T21704] R13: 0000000000000004 R14: 00000000200000c0 R15: 0000000000000000 [ 537.629539][T21704] 18:12:29 executing program 5: r0 = syz_io_uring_setup(0x3ede, &(0x7f0000000240), &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) socket$l2tp6(0xa, 0x2, 0x73) openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/locks\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READ=@pass_buffer={0x16, 0x0, 0x0, @fd_index=0x5, 0xffffffffffffffff, &(0x7f0000000040)=""/17, 0x11}, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000002040)=[{{&(0x7f0000001380)=@in6={0xa, 0x0, 0x0, @private0}, 0x80, 0x0}}], 0x1, 0x0) io_uring_enter(r0, 0x26, 0x7, 0x0, 0x0, 0x0) [ 537.734618][T21704] ntfs: (device loop2): ntfs_fill_super(): Unable to determine device size. [ 537.740796][T21716] loop1: detected capacity change from 0 to 4 18:12:29 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="b4050000000000006110580000000000c60000000000000095000002000000002ac73fe427abdf478e0357f2d32986f50b892b5007921cd48fe43b23be60a2dbc9778bb665510e3e22fcb26adfdc05e55a4933e62a23abb4baca4ec89323257db59db5eeda384459dd00d41b6aab85df5cab39e726769e2291b626d120a9247579f0b8edd8f16683e0623366ac632c24921d21534237743354f09cc29be2f72dfa8b05320110bcea53bb038c"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) socket(0x1, 0x5, 0x0) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) 18:12:29 executing program 0: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$FS_IOC_RESVSP(r0, 0x402c5828, &(0x7f00000000c0)={0x0, 0x1, 0xa8f, 0x3078}) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x200000000}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x9) preadv(r1, &(0x7f0000000240)=[{&(0x7f0000000040)=""/94, 0x5e}, {&(0x7f00000000c0)=""/93, 0x5d}, {&(0x7f0000000140)=""/58, 0x3a}], 0x3, 0xd9f, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000002340)='./file0\x00', 0x0, 0x108) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000180)={'team0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @local}, 0x14) writev(r2, &(0x7f0000000280)=[{&(0x7f00000008c0)="110eaa1a9896d57019effc8c79961d0f73ccf3afca3754e2e7a31f536bcb7204bed59311e29c96e1c2b663d61e5b0c0a76ea50cbddaa69f578b8600f77cf1a538ac900673696245b6de4283c979a2eccd71f9583dacf650575d1398678895da32663735b4d0cabfe7e972e59c2b4b4c9c89d0b82ca2267ad5062303e8abcb79600010506702eb912e3957e507aec4e2180699a738f6753509a12282a1d7181887f6c2e03de1da0dfe3b4efbb10e9b59301b4ef8a1d", 0xb5}, {&(0x7f0000000980)="34c30d95766fefbb7bdc40a3242505587bbc8584c2bc2003185f5ce116eea020efa91e2aae1eae2b8e848ac13c3dcedbbbc82adb1e70be8eecedba37be82545f2abda4f0a0e0fd0edd6bd03bb8e9bb91c39a2c828511aef3e684ad4c21ec0c146b9570139e31cd", 0x67}], 0x2) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'macvtap0\x00'}) ioctl$PPPIOCSFLAGS1(0xffffffffffffffff, 0x40047459, &(0x7f00000001c0)) recvmmsg(0xffffffffffffffff, &(0x7f0000002200)=[{{&(0x7f0000000340)=@in={0x2, 0x0, @multicast1}, 0x80, &(0x7f0000000440)=[{&(0x7f00000004c0)=""/88, 0x58}, {&(0x7f0000000b40)=""/4096, 0x1000}], 0x2, &(0x7f0000000740)=""/192, 0xc0}, 0x3}, {{&(0x7f0000000800)=@sco={0x1f, @none}, 0x80, &(0x7f0000000480)=[{&(0x7f0000001b40)=""/82, 0x52}], 0x1, &(0x7f0000001bc0)=""/206, 0xce}, 0x7}, {{&(0x7f0000001cc0)=@in={0x2, 0x0, @broadcast}, 0x80, &(0x7f0000000880)=[{&(0x7f0000001d40)=""/146, 0x92}, {&(0x7f0000001e00)=""/231, 0xe7}], 0x2, &(0x7f0000001f00)=""/239, 0xef}, 0x3}, {{&(0x7f0000002000)=@xdp, 0x80, &(0x7f00000020c0)=[{&(0x7f0000002080)=""/58, 0x3a}], 0x1, &(0x7f0000002100)=""/251, 0xfb}, 0x9}], 0x4, 0x40, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000002380)=ANY=[@ANYBLOB="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", @ANYRESDEC=r0, @ANYBLOB="b21b22b0b59f1a76abb6323c16886f3d2569d595dca4af1ac9160b24b62e47302e148fa17433c275945e36a713e5fad2e8abc9651d17b22d7d092020f73d100115fed606c66c84318df7895b1e5780f3c785bfb92571cf1bc9", @ANYRES32=0x0, @ANYRES32, @ANYRES32=0x0], &(0x7f0000000300)=0x18) r5 = socket(0x1, 0x803, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8936, &(0x7f0000000080)={@rand_addr=' \x01\x00', 0x44, r4}) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) r7 = socket(0x10, 0x8000000803, 0x0) sendmsg$nl_route(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000a00)=@newlink={0x74, 0x10, 0x401, 0x3001, 0x25dfdbfc, {0x0, 0x0, 0x0, 0x0, 0x534ad, 0x42a03}, [@IFLA_LINKINFO={0x4c, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x3c, 0x2, 0x0, 0x1, [@IFLA_IPVLAN_MODE={0x6, 0x1, 0x2}, @IFLA_IPVLAN_FLAGS={0x6, 0x2, 0x2}, @IFLA_IPVLAN_FLAGS={0x6, 0x2, 0x1}, @IFLA_IPVLAN_FLAGS={0x6, 0x2, 0x2}, @IFLA_IPVLAN_FLAGS={0x6, 0x2, 0x3}, @IFLA_IPVLAN_MODE={0x6}, @IFLA_IPVLAN_FLAGS={0x6, 0x2, 0x2}]}}}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x74}}, 0x0) 18:12:29 executing program 1: syz_mount_image$ntfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0xa00, 0x0, &(0x7f00000000c0), 0x218400, &(0x7f00000013c0)) 18:12:29 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x200000000}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x9) 18:12:29 executing program 2: syz_mount_image$ntfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f00000013c0)={[{@fmask}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'syzkaller1\x00'}}]}) (fail_nth: 26) 18:12:29 executing program 5: r0 = syz_io_uring_setup(0x3ede, &(0x7f0000000240), &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) socket$l2tp6(0xa, 0x2, 0x73) openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/locks\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READ=@pass_buffer={0x16, 0x0, 0x0, @fd_index=0x5, 0xffffffffffffffff, &(0x7f0000000040)=""/17, 0x11}, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000002040)=[{{&(0x7f0000001380)=@in6={0xa, 0x0, 0x0, @private0}, 0x80, 0x0}}], 0x1, 0x0) io_uring_enter(r0, 0x26, 0x8, 0x0, 0x0, 0x0) 18:12:29 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="b4050000000000006110580000000000c60000000000000095000002000000002ac73fe427abdf478e0357f2d32986f50b892b5007921cd48fe43b23be60a2dbc9778bb665510e3e22fcb26adfdc05e55a4933e62a23abb4baca4ec89323257db59db5eeda384459dd00d41b6aab85df5cab39e726769e2291b626d120a9247579f0b8edd8f16683e0623366ac632c24921d21534237743354f09cc29be2f72dfa8b05320110bcea53bb038c"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x5, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={0xffffffffffffffff, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) 18:12:29 executing program 0: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$FS_IOC_RESVSP(r0, 0x402c5828, &(0x7f00000000c0)={0x0, 0x1, 0xa8f, 0x3078}) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x200000000}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x9) preadv(r1, &(0x7f0000000240)=[{&(0x7f0000000040)=""/94, 0x5e}, {&(0x7f00000000c0)=""/93, 0x5d}, {&(0x7f0000000140)=""/58, 0x3a}], 0x3, 0xd9f, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000002340)='./file0\x00', 0x0, 0x108) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000180)={'team0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @local}, 0x14) writev(r2, &(0x7f0000000280)=[{&(0x7f00000008c0)="110eaa1a9896d57019effc8c79961d0f73ccf3afca3754e2e7a31f536bcb7204bed59311e29c96e1c2b663d61e5b0c0a76ea50cbddaa69f578b8600f77cf1a538ac900673696245b6de4283c979a2eccd71f9583dacf650575d1398678895da32663735b4d0cabfe7e972e59c2b4b4c9c89d0b82ca2267ad5062303e8abcb79600010506702eb912e3957e507aec4e2180699a738f6753509a12282a1d7181887f6c2e03de1da0dfe3b4efbb10e9b59301b4ef8a1d", 0xb5}, {&(0x7f0000000980)="34c30d95766fefbb7bdc40a3242505587bbc8584c2bc2003185f5ce116eea020efa91e2aae1eae2b8e848ac13c3dcedbbbc82adb1e70be8eecedba37be82545f2abda4f0a0e0fd0edd6bd03bb8e9bb91c39a2c828511aef3e684ad4c21ec0c146b9570139e31cd", 0x67}], 0x2) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'macvtap0\x00'}) ioctl$PPPIOCSFLAGS1(0xffffffffffffffff, 0x40047459, &(0x7f00000001c0)) recvmmsg(0xffffffffffffffff, &(0x7f0000002200)=[{{&(0x7f0000000340)=@in={0x2, 0x0, @multicast1}, 0x80, &(0x7f0000000440)=[{&(0x7f00000004c0)=""/88, 0x58}, {&(0x7f0000000b40)=""/4096, 0x1000}], 0x2, &(0x7f0000000740)=""/192, 0xc0}, 0x3}, {{&(0x7f0000000800)=@sco={0x1f, @none}, 0x80, &(0x7f0000000480)=[{&(0x7f0000001b40)=""/82, 0x52}], 0x1, &(0x7f0000001bc0)=""/206, 0xce}, 0x7}, {{&(0x7f0000001cc0)=@in={0x2, 0x0, @broadcast}, 0x80, &(0x7f0000000880)=[{&(0x7f0000001d40)=""/146, 0x92}, {&(0x7f0000001e00)=""/231, 0xe7}], 0x2, &(0x7f0000001f00)=""/239, 0xef}, 0x3}, {{&(0x7f0000002000)=@xdp, 0x80, &(0x7f00000020c0)=[{&(0x7f0000002080)=""/58, 0x3a}], 0x1, &(0x7f0000002100)=""/251, 0xfb}, 0x9}], 0x4, 0x40, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000002380)=ANY=[@ANYBLOB="050000004f2fe4e7fe91d1f169b7f431831544d94b6dbcca36d501829c64f0c28565fbc3e562e329d779aef804590001804797c4378192536ca659efcf0a6cb16b0ba5b79cfefdc8e93c46dfa0c119d12be6495820cc0b34645475d4da28535803ddcfd16f5df589e2f1ac230118eafd75a63c016b3a1663bc141e5ed84016b6b02854a48c0ec71a36a1ad145c5d2216e964a34cdf686b0a089443bd0f8c210860754d133e2c97ce8a25ee4d4eb5abb779387ca2cd9e870d5cb5854616c65c24f259eeaa625432fa25dd2832dc14f9a78ebf3a24277da2b55d09ed6a1dca07d4fb9ed592a64782b6939500505805d12b2776980c4b250f17b0b9a8fda266d7f084a9cd1022d2d670f793298bcf83b9a25e4ae25ac23ce06ef88068108ec131b23695772064709b1dbee85e5c2a0c4cf809dbd8b5617f8c6f6fba013f019829c83bd4cf10be5c6da663ce7cbf9b19ebd88bedb114ec207599273b55ec5f4cd35914f897ee8afc7663255678f6853e5cfa0dfa079ba560c7ddbc56e6352397b7266ac906a0ce0fb810eb00000000000000000000000000000000000000000000000000c54baf95f669d6810040c457be8ca739b4ec785f005bb4faa01270b999b6c9899cd9e8997d359b77c00a68341ca40b4c0e06884b6384ef6e", @ANYRESDEC=r0, @ANYBLOB="b21b22b0b59f1a76abb6323c16886f3d2569d595dca4af1ac9160b24b62e47302e148fa17433c275945e36a713e5fad2e8abc9651d17b22d7d092020f73d100115fed606c66c84318df7895b1e5780f3c785bfb92571cf1bc9", @ANYRES32=0x0, @ANYRES32, @ANYRES32=0x0], &(0x7f0000000300)=0x18) r5 = socket(0x1, 0x803, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8936, &(0x7f0000000080)={@rand_addr=' \x01\x00', 0x44, r4}) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) r7 = socket(0x10, 0x8000000803, 0x0) sendmsg$nl_route(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000a00)=@newlink={0x74, 0x10, 0x401, 0x3001, 0x25dfdbfc, {0x0, 0x0, 0x0, 0x0, 0x534ad, 0x42a03}, [@IFLA_LINKINFO={0x4c, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x3c, 0x2, 0x0, 0x1, [@IFLA_IPVLAN_MODE={0x6, 0x1, 0x2}, @IFLA_IPVLAN_FLAGS={0x6, 0x2, 0x2}, @IFLA_IPVLAN_FLAGS={0x6, 0x2, 0x1}, @IFLA_IPVLAN_FLAGS={0x6, 0x2, 0x2}, @IFLA_IPVLAN_FLAGS={0x6, 0x2, 0x3}, @IFLA_IPVLAN_MODE={0x6}, @IFLA_IPVLAN_FLAGS={0x6, 0x2, 0x2}]}}}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x74}}, 0x0) [ 537.942019][T21727] loop1: detected capacity change from 0 to 5 18:12:29 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x9) [ 537.985307][T21730] FAULT_INJECTION: forcing a failure. [ 537.985307][T21730] name failslab, interval 1, probability 0, space 0, times 0 [ 538.060435][T21730] CPU: 1 PID: 21730 Comm: syz-executor.2 Not tainted 5.16.0-rc5-syzkaller #0 [ 538.069236][T21730] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 538.079297][T21730] Call Trace: [ 538.082661][T21730] [ 538.085583][T21730] dump_stack_lvl+0x201/0x2d8 [ 538.090269][T21730] ? show_regs_print_info+0x12/0x12 [ 538.095469][T21730] ? log_buf_vmcoreinfo_setup+0x498/0x498 [ 538.101190][T21730] ? __might_sleep+0xe0/0xe0 [ 538.105784][T21730] should_fail+0x384/0x4b0 [ 538.110202][T21730] ? kzalloc+0x1d/0x30 [ 538.114259][T21730] should_failslab+0x5/0x20 [ 538.118755][T21730] __kmalloc+0x94/0x380 [ 538.122909][T21730] kzalloc+0x1d/0x30 [ 538.126797][T21730] kobject_get_path+0xb1/0x1e0 [ 538.131554][T21730] kobject_uevent_env+0x298/0x1700 [ 538.136671][T21730] disk_force_media_change+0x19c/0x2a0 [ 538.142127][T21730] ? bdev_check_media_change+0x540/0x540 [ 538.147758][T21730] ? __fget_files+0x3d0/0x440 [ 538.152447][T21730] loop_configure+0x778/0x1740 [ 538.157234][T21730] lo_ioctl+0x7d4/0x1f40 [ 538.161483][T21730] ? lo_release+0x1f0/0x1f0 [ 538.165984][T21730] ? rcu_read_lock_sched_held+0x89/0x130 [ 538.171614][T21730] ? __bpf_trace_rcu_stall_warning+0x10/0x10 [ 538.177612][T21730] ? rcu_lock_release+0x5/0x20 [ 538.182377][T21730] ? __lock_acquire+0x2b00/0x2b00 [ 538.187416][T21730] ? stack_trace_save+0x1e0/0x1e0 [ 538.192468][T21730] ? stack_trace_save+0x1e0/0x1e0 [ 538.197571][T21730] ? is_bpf_text_address+0x253/0x270 [ 538.202855][T21730] ? stack_trace_save+0x1e0/0x1e0 [ 538.208048][T21730] ? kernel_text_address+0x9e/0xd0 [ 538.213152][T21730] ? __kernel_text_address+0x9/0x40 [ 538.218343][T21730] ? unwind_get_return_address+0x48/0x80 [ 538.223976][T21730] ? arch_stack_walk+0xf8/0x140 [ 538.228837][T21730] ? stack_trace_save+0x11b/0x1e0 [ 538.233861][T21730] ? stack_trace_snprint+0xe0/0xe0 [ 538.238964][T21730] ? rcu_read_lock_sched_held+0x89/0x130 [ 538.244603][T21730] ? kfree+0xe1/0x330 [ 538.248580][T21730] ? kasan_set_track+0x68/0x80 [ 538.253338][T21730] ? kasan_set_track+0x4c/0x80 [ 538.258100][T21730] ? kasan_set_free_info+0x1f/0x40 [ 538.263291][T21730] ? ____kasan_slab_free+0x10d/0x150 [ 538.268832][T21730] ? slab_free_freelist_hook+0x12e/0x1a0 [ 538.274458][T21730] ? kfree+0xe1/0x330 [ 538.278693][T21730] ? tomoyo_path_number_perm+0x5f1/0x7c0 [ 538.284318][T21730] ? security_file_ioctl+0x55/0xb0 [ 538.289419][T21730] ? __se_sys_ioctl+0x48/0x170 [ 538.294175][T21730] ? do_syscall_64+0x44/0xd0 [ 538.298761][T21730] ? entry_SYSCALL_64_after_hwframe+0x44/0xae [ 538.304843][T21730] ? rcu_read_lock_sched_held+0x89/0x130 [ 538.310468][T21730] ? __bpf_trace_rcu_stall_warning+0x10/0x10 [ 538.316442][T21730] ? lockdep_hardirqs_on_prepare+0x412/0x780 [ 538.322427][T21730] ? do_vfs_ioctl+0xcb2/0x2b90 [ 538.328216][T21730] ? blkdev_common_ioctl+0x702/0x2000 [ 538.333615][T21730] ? tomoyo_check_path_acl+0x1c0/0x1c0 [ 538.339098][T21730] ? blkdev_bszset+0x260/0x260 [ 538.343899][T21730] ? memset+0x1f/0x40 [ 538.347883][T21730] ? smack_file_ioctl+0x298/0x3a0 [ 538.352920][T21730] ? smack_file_alloc_security+0xd0/0xd0 [ 538.358554][T21730] ? lo_release+0x1f0/0x1f0 [ 538.363052][T21730] blkdev_ioctl+0x3ac/0x790 [ 538.367551][T21730] ? blkdev_compat_ptr_ioctl+0xd0/0xd0 [ 538.373003][T21730] ? bpf_lsm_file_ioctl+0x5/0x10 [ 538.377945][T21730] ? security_file_ioctl+0x9d/0xb0 [ 538.383231][T21730] ? blkdev_compat_ptr_ioctl+0xd0/0xd0 [ 538.388678][T21730] __se_sys_ioctl+0xfb/0x170 [ 538.393261][T21730] do_syscall_64+0x44/0xd0 [ 538.397681][T21730] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 538.403567][T21730] RIP: 0033:0x7f3831feec57 [ 538.407990][T21730] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 04 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 538.427582][T21730] RSP: 002b:00007f3830963f28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 538.436352][T21730] RAX: ffffffffffffffda RBX: 00007f38320389c8 RCX: 00007f3831feec57 [ 538.444316][T21730] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 538.452277][T21730] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007f38309641d0 18:12:29 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="b4050000000000006110580000000000c60000000000000095000002000000002ac73fe427abdf478e0357f2d32986f50b892b5007921cd48fe43b23be60a2dbc9778bb665510e3e22fcb26adfdc05e55a4933e62a23abb4baca4ec89323257db59db5eeda384459dd00d41b6aab85df5cab39e726769e2291b626d120a9247579f0b8edd8f16683e0623366ac632c24921d21534237743354f09cc29be2f72dfa8b05320110bcea53bb038c"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x5, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={0xffffffffffffffff, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) [ 538.460238][T21730] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 538.468199][T21730] R13: 0000000000000004 R14: 00000000200000c0 R15: 0000000000000000 [ 538.476179][T21730] 18:12:30 executing program 5: r0 = syz_io_uring_setup(0x3ede, &(0x7f0000000240), &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) socket$l2tp6(0xa, 0x2, 0x73) openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/locks\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READ=@pass_buffer={0x16, 0x0, 0x0, @fd_index=0x5, 0xffffffffffffffff, &(0x7f0000000040)=""/17, 0x11}, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000002040)=[{{&(0x7f0000001380)=@in6={0xa, 0x0, 0x0, @private0}, 0x80, 0x0}}], 0x1, 0x0) io_uring_enter(r0, 0x26, 0x9, 0x0, 0x0, 0x0) 18:12:30 executing program 0: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$FS_IOC_RESVSP(r0, 0x402c5828, &(0x7f00000000c0)={0x0, 0x1, 0xa8f, 0x3078}) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x200000000}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x9) preadv(r1, &(0x7f0000000240)=[{&(0x7f0000000040)=""/94, 0x5e}, {&(0x7f00000000c0)=""/93, 0x5d}, {&(0x7f0000000140)=""/58, 0x3a}], 0x3, 0xd9f, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000002340)='./file0\x00', 0x0, 0x108) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000180)={'team0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @local}, 0x14) writev(r2, &(0x7f0000000280)=[{&(0x7f00000008c0)="110eaa1a9896d57019effc8c79961d0f73ccf3afca3754e2e7a31f536bcb7204bed59311e29c96e1c2b663d61e5b0c0a76ea50cbddaa69f578b8600f77cf1a538ac900673696245b6de4283c979a2eccd71f9583dacf650575d1398678895da32663735b4d0cabfe7e972e59c2b4b4c9c89d0b82ca2267ad5062303e8abcb79600010506702eb912e3957e507aec4e2180699a738f6753509a12282a1d7181887f6c2e03de1da0dfe3b4efbb10e9b59301b4ef8a1d", 0xb5}, {&(0x7f0000000980)="34c30d95766fefbb7bdc40a3242505587bbc8584c2bc2003185f5ce116eea020efa91e2aae1eae2b8e848ac13c3dcedbbbc82adb1e70be8eecedba37be82545f2abda4f0a0e0fd0edd6bd03bb8e9bb91c39a2c828511aef3e684ad4c21ec0c146b9570139e31cd", 0x67}], 0x2) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'macvtap0\x00'}) ioctl$PPPIOCSFLAGS1(0xffffffffffffffff, 0x40047459, &(0x7f00000001c0)) recvmmsg(0xffffffffffffffff, &(0x7f0000002200)=[{{&(0x7f0000000340)=@in={0x2, 0x0, @multicast1}, 0x80, &(0x7f0000000440)=[{&(0x7f00000004c0)=""/88, 0x58}, {&(0x7f0000000b40)=""/4096, 0x1000}], 0x2, &(0x7f0000000740)=""/192, 0xc0}, 0x3}, {{&(0x7f0000000800)=@sco={0x1f, @none}, 0x80, &(0x7f0000000480)=[{&(0x7f0000001b40)=""/82, 0x52}], 0x1, &(0x7f0000001bc0)=""/206, 0xce}, 0x7}, {{&(0x7f0000001cc0)=@in={0x2, 0x0, @broadcast}, 0x80, &(0x7f0000000880)=[{&(0x7f0000001d40)=""/146, 0x92}, {&(0x7f0000001e00)=""/231, 0xe7}], 0x2, &(0x7f0000001f00)=""/239, 0xef}, 0x3}, {{&(0x7f0000002000)=@xdp, 0x80, &(0x7f00000020c0)=[{&(0x7f0000002080)=""/58, 0x3a}], 0x1, &(0x7f0000002100)=""/251, 0xfb}, 0x9}], 0x4, 0x40, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000002380)=ANY=[@ANYBLOB="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", @ANYRESDEC=r0, @ANYBLOB="b21b22b0b59f1a76abb6323c16886f3d2569d595dca4af1ac9160b24b62e47302e148fa17433c275945e36a713e5fad2e8abc9651d17b22d7d092020f73d100115fed606c66c84318df7895b1e5780f3c785bfb92571cf1bc9", @ANYRES32=0x0, @ANYRES32, @ANYRES32=0x0], &(0x7f0000000300)=0x18) r5 = socket(0x1, 0x803, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8936, &(0x7f0000000080)={@rand_addr=' \x01\x00', 0x44, r4}) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) r7 = socket(0x10, 0x8000000803, 0x0) sendmsg$nl_route(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000a00)=@newlink={0x7c, 0x10, 0x401, 0x3001, 0x25dfdbfc, {0x0, 0x0, 0x0, 0x0, 0x534ad, 0x42a03}, [@IFLA_LINKINFO={0x4c, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x3c, 0x2, 0x0, 0x1, [@IFLA_IPVLAN_MODE={0x6, 0x1, 0x2}, @IFLA_IPVLAN_FLAGS={0x6, 0x2, 0x2}, @IFLA_IPVLAN_FLAGS={0x6, 0x2, 0x1}, @IFLA_IPVLAN_FLAGS={0x6, 0x2, 0x2}, @IFLA_IPVLAN_FLAGS={0x6, 0x2, 0x3}, @IFLA_IPVLAN_MODE={0x6}, @IFLA_IPVLAN_FLAGS={0x6, 0x2, 0x2}]}}}, @IFLA_LINK={0x8}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x7c}}, 0x0) 18:12:30 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="b4050000000000006110580000000000c60000000000000095000002000000002ac73fe427abdf478e0357f2d32986f50b892b5007921cd48fe43b23be60a2dbc9778bb665510e3e22fcb26adfdc05e55a4933e62a23abb4baca4ec89323257db59db5eeda384459dd00d41b6aab85df5cab39e726769e2291b626d120a9247579f0b8edd8f16683e0623366ac632c24921d21534237743354f09cc29be2f72dfa8b05320110bcea53bb038c"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x5, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={0xffffffffffffffff, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) 18:12:30 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x9) 18:12:30 executing program 1: syz_mount_image$ntfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0xb00, 0x0, &(0x7f00000000c0), 0x218400, &(0x7f00000013c0)) 18:12:30 executing program 5: r0 = syz_io_uring_setup(0x3ede, &(0x7f0000000240), &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) socket$l2tp6(0xa, 0x2, 0x73) openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/locks\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READ=@pass_buffer={0x16, 0x0, 0x0, @fd_index=0x5, 0xffffffffffffffff, &(0x7f0000000040)=""/17, 0x11}, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000002040)=[{{&(0x7f0000001380)=@in6={0xa, 0x0, 0x0, @private0}, 0x80, 0x0}}], 0x1, 0x0) io_uring_enter(r0, 0x26, 0xa, 0x0, 0x0, 0x0) [ 538.712851][T21730] ntfs: (device loop2): ntfs_fill_super(): Unable to determine device size. 18:12:30 executing program 2: syz_mount_image$ntfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f00000013c0)={[{@fmask}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'syzkaller1\x00'}}]}) (fail_nth: 27) 18:12:30 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="b4050000000000006110580000000000c60000000000000095000002000000002ac73fe427abdf478e0357f2d32986f50b892b5007921cd48fe43b23be60a2dbc9778bb665510e3e22fcb26adfdc05e55a4933e62a23abb4baca4ec89323257db59db5eeda384459dd00d41b6aab85df5cab39e726769e2291b626d120a9247579f0b8edd8f16683e0623366ac632c24921d21534237743354f09cc29be2f72dfa8b05320110bcea53bb038c"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x5, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, 0x0, &(0x7f00000000c0)=@udp=r2}, 0x20) 18:12:30 executing program 5: r0 = syz_io_uring_setup(0x3ede, &(0x7f0000000240), &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) socket$l2tp6(0xa, 0x2, 0x73) openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/locks\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READ=@pass_buffer={0x16, 0x0, 0x0, @fd_index=0x5, 0xffffffffffffffff, &(0x7f0000000040)=""/17, 0x11}, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000002040)=[{{&(0x7f0000001380)=@in6={0xa, 0x0, 0x0, @private0}, 0x80, 0x0}}], 0x1, 0x0) io_uring_enter(r0, 0x26, 0xb, 0x0, 0x0, 0x0) 18:12:30 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x9) 18:12:30 executing program 0: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$FS_IOC_RESVSP(r0, 0x402c5828, &(0x7f00000000c0)={0x0, 0x1, 0xa8f, 0x3078}) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x200000000}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x9) preadv(r1, &(0x7f0000000240)=[{&(0x7f0000000040)=""/94, 0x5e}, {&(0x7f00000000c0)=""/93, 0x5d}, {&(0x7f0000000140)=""/58, 0x3a}], 0x3, 0xd9f, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000002340)='./file0\x00', 0x0, 0x108) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000180)={'team0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @local}, 0x14) writev(r2, &(0x7f0000000280)=[{&(0x7f00000008c0)="110eaa1a9896d57019effc8c79961d0f73ccf3afca3754e2e7a31f536bcb7204bed59311e29c96e1c2b663d61e5b0c0a76ea50cbddaa69f578b8600f77cf1a538ac900673696245b6de4283c979a2eccd71f9583dacf650575d1398678895da32663735b4d0cabfe7e972e59c2b4b4c9c89d0b82ca2267ad5062303e8abcb79600010506702eb912e3957e507aec4e2180699a738f6753509a12282a1d7181887f6c2e03de1da0dfe3b4efbb10e9b59301b4ef8a1d", 0xb5}, {&(0x7f0000000980)="34c30d95766fefbb7bdc40a3242505587bbc8584c2bc2003185f5ce116eea020efa91e2aae1eae2b8e848ac13c3dcedbbbc82adb1e70be8eecedba37be82545f2abda4f0a0e0fd0edd6bd03bb8e9bb91c39a2c828511aef3e684ad4c21ec0c146b9570139e31cd", 0x67}], 0x2) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'macvtap0\x00'}) ioctl$PPPIOCSFLAGS1(0xffffffffffffffff, 0x40047459, &(0x7f00000001c0)) recvmmsg(0xffffffffffffffff, &(0x7f0000002200)=[{{&(0x7f0000000340)=@in={0x2, 0x0, @multicast1}, 0x80, &(0x7f0000000440)=[{&(0x7f00000004c0)=""/88, 0x58}, {&(0x7f0000000b40)=""/4096, 0x1000}], 0x2, &(0x7f0000000740)=""/192, 0xc0}, 0x3}, {{&(0x7f0000000800)=@sco={0x1f, @none}, 0x80, &(0x7f0000000480)=[{&(0x7f0000001b40)=""/82, 0x52}], 0x1, &(0x7f0000001bc0)=""/206, 0xce}, 0x7}, {{&(0x7f0000001cc0)=@in={0x2, 0x0, @broadcast}, 0x80, &(0x7f0000000880)=[{&(0x7f0000001d40)=""/146, 0x92}, {&(0x7f0000001e00)=""/231, 0xe7}], 0x2, &(0x7f0000001f00)=""/239, 0xef}, 0x3}, {{&(0x7f0000002000)=@xdp, 0x80, &(0x7f00000020c0)=[{&(0x7f0000002080)=""/58, 0x3a}], 0x1, &(0x7f0000002100)=""/251, 0xfb}, 0x9}], 0x4, 0x40, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000002380)=ANY=[@ANYBLOB="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", @ANYRESDEC=r0, @ANYBLOB="b21b22b0b59f1a76abb6323c16886f3d2569d595dca4af1ac9160b24b62e47302e148fa17433c275945e36a713e5fad2e8abc9651d17b22d7d092020f73d100115fed606c66c84318df7895b1e5780f3c785bfb92571cf1bc9", @ANYRES32=0x0, @ANYRES32, @ANYRES32=0x0], &(0x7f0000000300)=0x18) r5 = socket(0x1, 0x803, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8936, &(0x7f0000000080)={@rand_addr=' \x01\x00', 0x44, r4}) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) r7 = socket(0x10, 0x8000000803, 0x0) sendmsg$nl_route(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000a00)=@newlink={0x7c, 0x10, 0x401, 0x3001, 0x25dfdbfc, {0x0, 0x0, 0x0, 0x0, 0x534ad, 0x42a03}, [@IFLA_LINKINFO={0x4c, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x3c, 0x2, 0x0, 0x1, [@IFLA_IPVLAN_MODE={0x6, 0x1, 0x2}, @IFLA_IPVLAN_FLAGS={0x6, 0x2, 0x2}, @IFLA_IPVLAN_FLAGS={0x6, 0x2, 0x1}, @IFLA_IPVLAN_FLAGS={0x6, 0x2, 0x2}, @IFLA_IPVLAN_FLAGS={0x6, 0x2, 0x3}, @IFLA_IPVLAN_MODE={0x6}, @IFLA_IPVLAN_FLAGS={0x6, 0x2, 0x2}]}}}, @IFLA_LINK={0x8}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x7c}}, 0x0) [ 538.815481][T21751] loop1: detected capacity change from 0 to 5 18:12:30 executing program 1: syz_mount_image$ntfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0xb9d, 0x0, &(0x7f00000000c0), 0x218400, &(0x7f00000013c0)) 18:12:30 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="b4050000000000006110580000000000c60000000000000095000002000000002ac73fe427abdf478e0357f2d32986f50b892b5007921cd48fe43b23be60a2dbc9778bb665510e3e22fcb26adfdc05e55a4933e62a23abb4baca4ec89323257db59db5eeda384459dd00d41b6aab85df5cab39e726769e2291b626d120a9247579f0b8edd8f16683e0623366ac632c24921d21534237743354f09cc29be2f72dfa8b05320110bcea53bb038c"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x5, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, 0x0, &(0x7f00000000c0)=@udp=r2}, 0x20) 18:12:30 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x200000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x9) [ 538.919098][T21759] FAULT_INJECTION: forcing a failure. [ 538.919098][T21759] name failslab, interval 1, probability 0, space 0, times 0 [ 538.959032][T21759] CPU: 0 PID: 21759 Comm: syz-executor.2 Not tainted 5.16.0-rc5-syzkaller #0 [ 538.967848][T21759] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 538.977922][T21759] Call Trace: [ 538.981213][T21759] [ 538.983558][T21764] loop1: detected capacity change from 0 to 5 [ 538.984151][T21759] dump_stack_lvl+0x201/0x2d8 [ 538.984187][T21759] ? show_regs_print_info+0x12/0x12 [ 538.984212][T21759] ? log_buf_vmcoreinfo_setup+0x498/0x498 [ 539.005846][T21759] ? __might_sleep+0xe0/0xe0 [ 539.010461][T21759] should_fail+0x384/0x4b0 [ 539.014915][T21759] ? kzalloc+0x1d/0x30 [ 539.019010][T21759] should_failslab+0x5/0x20 [ 539.023533][T21759] __kmalloc+0x94/0x380 [ 539.027723][T21759] kzalloc+0x1d/0x30 [ 539.031721][T21759] kobject_get_path+0xb1/0x1e0 [ 539.036633][T21759] kobject_uevent_env+0x298/0x1700 [ 539.041779][T21759] disk_force_media_change+0x19c/0x2a0 [ 539.047260][T21759] ? bdev_check_media_change+0x540/0x540 [ 539.052921][T21759] ? __fget_files+0x3d0/0x440 [ 539.057619][T21759] loop_configure+0x778/0x1740 [ 539.062776][T21759] lo_ioctl+0x7d4/0x1f40 [ 539.067054][T21759] ? lo_release+0x1f0/0x1f0 [ 539.071579][T21759] ? rcu_read_lock_sched_held+0x89/0x130 [ 539.077228][T21759] ? __bpf_trace_rcu_stall_warning+0x10/0x10 [ 539.083230][T21759] ? rcu_lock_release+0x5/0x20 [ 539.088002][T21759] ? __lock_acquire+0x2b00/0x2b00 [ 539.093027][T21759] ? stack_trace_save+0x1e0/0x1e0 [ 539.098045][T21759] ? stack_trace_save+0x1e0/0x1e0 [ 539.103061][T21759] ? is_bpf_text_address+0x253/0x270 [ 539.108352][T21759] ? stack_trace_save+0x1e0/0x1e0 [ 539.113368][T21759] ? kernel_text_address+0x9e/0xd0 [ 539.118558][T21759] ? __kernel_text_address+0x9/0x40 [ 539.123749][T21759] ? unwind_get_return_address+0x48/0x80 [ 539.129377][T21759] ? arch_stack_walk+0xf8/0x140 [ 539.134229][T21759] ? stack_trace_save+0x11b/0x1e0 [ 539.139245][T21759] ? stack_trace_snprint+0xe0/0xe0 [ 539.144340][T21759] ? rcu_read_lock_sched_held+0x89/0x130 [ 539.149986][T21759] ? kfree+0xe1/0x330 [ 539.153970][T21759] ? kasan_set_track+0x68/0x80 [ 539.158764][T21759] ? kasan_set_track+0x4c/0x80 [ 539.163531][T21759] ? kasan_set_free_info+0x1f/0x40 [ 539.168670][T21759] ? ____kasan_slab_free+0x10d/0x150 [ 539.173989][T21759] ? slab_free_freelist_hook+0x12e/0x1a0 [ 539.179791][T21759] ? kfree+0xe1/0x330 [ 539.183765][T21759] ? tomoyo_path_number_perm+0x5f1/0x7c0 [ 539.189744][T21759] ? security_file_ioctl+0x55/0xb0 [ 539.194843][T21759] ? __se_sys_ioctl+0x48/0x170 [ 539.199594][T21759] ? do_syscall_64+0x44/0xd0 [ 539.204181][T21759] ? entry_SYSCALL_64_after_hwframe+0x44/0xae [ 539.210253][T21759] ? rcu_read_lock_sched_held+0x89/0x130 [ 539.215884][T21759] ? __bpf_trace_rcu_stall_warning+0x10/0x10 [ 539.222210][T21759] ? lockdep_hardirqs_on_prepare+0x412/0x780 [ 539.228213][T21759] ? do_vfs_ioctl+0xcb2/0x2b90 [ 539.232999][T21759] ? blkdev_common_ioctl+0x702/0x2000 [ 539.238367][T21759] ? tomoyo_check_path_acl+0x1c0/0x1c0 [ 539.243815][T21759] ? blkdev_bszset+0x260/0x260 [ 539.248595][T21759] ? memset+0x1f/0x40 [ 539.252567][T21759] ? smack_file_ioctl+0x298/0x3a0 [ 539.257584][T21759] ? smack_file_alloc_security+0xd0/0xd0 [ 539.263207][T21759] ? lo_release+0x1f0/0x1f0 [ 539.267702][T21759] blkdev_ioctl+0x3ac/0x790 [ 539.272217][T21759] ? blkdev_compat_ptr_ioctl+0xd0/0xd0 [ 539.277673][T21759] ? bpf_lsm_file_ioctl+0x5/0x10 [ 539.282689][T21759] ? security_file_ioctl+0x9d/0xb0 [ 539.287838][T21759] ? blkdev_compat_ptr_ioctl+0xd0/0xd0 [ 539.293286][T21759] __se_sys_ioctl+0xfb/0x170 [ 539.297871][T21759] do_syscall_64+0x44/0xd0 [ 539.302282][T21759] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 539.308164][T21759] RIP: 0033:0x7f3831feec57 [ 539.312571][T21759] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 04 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 539.332251][T21759] RSP: 002b:00007f3830963f28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 539.340669][T21759] RAX: ffffffffffffffda RBX: 00007f38320389c8 RCX: 00007f3831feec57 [ 539.348650][T21759] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 539.356608][T21759] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007f38309641d0 18:12:30 executing program 1: syz_mount_image$ntfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0xc00, 0x0, &(0x7f00000000c0), 0x218400, &(0x7f00000013c0)) 18:12:30 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="b4050000000000006110580000000000c60000000000000095000002000000002ac73fe427abdf478e0357f2d32986f50b892b5007921cd48fe43b23be60a2dbc9778bb665510e3e22fcb26adfdc05e55a4933e62a23abb4baca4ec89323257db59db5eeda384459dd00d41b6aab85df5cab39e726769e2291b626d120a9247579f0b8edd8f16683e0623366ac632c24921d21534237743354f09cc29be2f72dfa8b05320110bcea53bb038c"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x5, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, 0x0, &(0x7f00000000c0)=@udp=r2}, 0x20) [ 539.364760][T21759] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 539.372717][T21759] R13: 0000000000000004 R14: 00000000200000c0 R15: 0000000000000000 [ 539.380693][T21759] 18:12:30 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x200000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x9) 18:12:30 executing program 0: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$FS_IOC_RESVSP(r0, 0x402c5828, &(0x7f00000000c0)={0x0, 0x1, 0xa8f, 0x3078}) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x200000000}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x9) preadv(r1, &(0x7f0000000240)=[{&(0x7f0000000040)=""/94, 0x5e}, {&(0x7f00000000c0)=""/93, 0x5d}, {&(0x7f0000000140)=""/58, 0x3a}], 0x3, 0xd9f, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000002340)='./file0\x00', 0x0, 0x108) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000180)={'team0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @local}, 0x14) writev(r2, &(0x7f0000000280)=[{&(0x7f00000008c0)="110eaa1a9896d57019effc8c79961d0f73ccf3afca3754e2e7a31f536bcb7204bed59311e29c96e1c2b663d61e5b0c0a76ea50cbddaa69f578b8600f77cf1a538ac900673696245b6de4283c979a2eccd71f9583dacf650575d1398678895da32663735b4d0cabfe7e972e59c2b4b4c9c89d0b82ca2267ad5062303e8abcb79600010506702eb912e3957e507aec4e2180699a738f6753509a12282a1d7181887f6c2e03de1da0dfe3b4efbb10e9b59301b4ef8a1d", 0xb5}, {&(0x7f0000000980)="34c30d95766fefbb7bdc40a3242505587bbc8584c2bc2003185f5ce116eea020efa91e2aae1eae2b8e848ac13c3dcedbbbc82adb1e70be8eecedba37be82545f2abda4f0a0e0fd0edd6bd03bb8e9bb91c39a2c828511aef3e684ad4c21ec0c146b9570139e31cd", 0x67}], 0x2) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'macvtap0\x00'}) ioctl$PPPIOCSFLAGS1(0xffffffffffffffff, 0x40047459, &(0x7f00000001c0)) recvmmsg(0xffffffffffffffff, &(0x7f0000002200)=[{{&(0x7f0000000340)=@in={0x2, 0x0, @multicast1}, 0x80, &(0x7f0000000440)=[{&(0x7f00000004c0)=""/88, 0x58}, {&(0x7f0000000b40)=""/4096, 0x1000}], 0x2, &(0x7f0000000740)=""/192, 0xc0}, 0x3}, {{&(0x7f0000000800)=@sco={0x1f, @none}, 0x80, &(0x7f0000000480)=[{&(0x7f0000001b40)=""/82, 0x52}], 0x1, &(0x7f0000001bc0)=""/206, 0xce}, 0x7}, {{&(0x7f0000001cc0)=@in={0x2, 0x0, @broadcast}, 0x80, &(0x7f0000000880)=[{&(0x7f0000001d40)=""/146, 0x92}, {&(0x7f0000001e00)=""/231, 0xe7}], 0x2, &(0x7f0000001f00)=""/239, 0xef}, 0x3}, {{&(0x7f0000002000)=@xdp, 0x80, &(0x7f00000020c0)=[{&(0x7f0000002080)=""/58, 0x3a}], 0x1, &(0x7f0000002100)=""/251, 0xfb}, 0x9}], 0x4, 0x40, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000002380)=ANY=[@ANYBLOB="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", @ANYRESDEC=r0, @ANYBLOB="b21b22b0b59f1a76abb6323c16886f3d2569d595dca4af1ac9160b24b62e47302e148fa17433c275945e36a713e5fad2e8abc9651d17b22d7d092020f73d100115fed606c66c84318df7895b1e5780f3c785bfb92571cf1bc9", @ANYRES32=0x0, @ANYRES32, @ANYRES32=0x0], &(0x7f0000000300)=0x18) r5 = socket(0x1, 0x803, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8936, &(0x7f0000000080)={@rand_addr=' \x01\x00', 0x44, r4}) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) r7 = socket(0x10, 0x8000000803, 0x0) sendmsg$nl_route(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000a00)=@newlink={0x7c, 0x10, 0x401, 0x3001, 0x25dfdbfc, {0x0, 0x0, 0x0, 0x0, 0x534ad, 0x42a03}, [@IFLA_LINKINFO={0x4c, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x3c, 0x2, 0x0, 0x1, [@IFLA_IPVLAN_MODE={0x6, 0x1, 0x2}, @IFLA_IPVLAN_FLAGS={0x6, 0x2, 0x2}, @IFLA_IPVLAN_FLAGS={0x6, 0x2, 0x1}, @IFLA_IPVLAN_FLAGS={0x6, 0x2, 0x2}, @IFLA_IPVLAN_FLAGS={0x6, 0x2, 0x3}, @IFLA_IPVLAN_MODE={0x6}, @IFLA_IPVLAN_FLAGS={0x6, 0x2, 0x2}]}}}, @IFLA_LINK={0x8}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x7c}}, 0x0) [ 539.495298][T21776] loop1: detected capacity change from 0 to 6 [ 539.514489][T21759] ntfs: (device loop2): ntfs_fill_super(): Unable to determine device size. 18:12:31 executing program 2: syz_mount_image$ntfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f00000013c0)={[{@fmask}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'syzkaller1\x00'}}]}) (fail_nth: 28) 18:12:31 executing program 5: r0 = syz_io_uring_setup(0x3ede, &(0x7f0000000240), &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) socket$l2tp6(0xa, 0x2, 0x73) openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/locks\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READ=@pass_buffer={0x16, 0x0, 0x0, @fd_index=0x5, 0xffffffffffffffff, &(0x7f0000000040)=""/17, 0x11}, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000002040)=[{{&(0x7f0000001380)=@in6={0xa, 0x0, 0x0, @private0}, 0x80, 0x0}}], 0x1, 0x0) io_uring_enter(r0, 0x26, 0xc, 0x0, 0x0, 0x0) 18:12:31 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="b4050000000000006110580000000000c60000000000000095000002000000002ac73fe427abdf478e0357f2d32986f50b892b5007921cd48fe43b23be60a2dbc9778bb665510e3e22fcb26adfdc05e55a4933e62a23abb4baca4ec89323257db59db5eeda384459dd00d41b6aab85df5cab39e726769e2291b626d120a9247579f0b8edd8f16683e0623366ac632c24921d21534237743354f09cc29be2f72dfa8b05320110bcea53bb038c"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) socket(0x1, 0x5, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), 0x0}, 0x20) 18:12:31 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x200000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x9) 18:12:31 executing program 0: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$FS_IOC_RESVSP(r0, 0x402c5828, &(0x7f00000000c0)={0x0, 0x1, 0xa8f, 0x3078}) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x200000000}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x9) preadv(r1, &(0x7f0000000240)=[{&(0x7f0000000040)=""/94, 0x5e}, {&(0x7f00000000c0)=""/93, 0x5d}, {&(0x7f0000000140)=""/58, 0x3a}], 0x3, 0xd9f, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000002340)='./file0\x00', 0x0, 0x108) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000180)={'team0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @local}, 0x14) writev(r2, &(0x7f0000000280)=[{&(0x7f00000008c0)="110eaa1a9896d57019effc8c79961d0f73ccf3afca3754e2e7a31f536bcb7204bed59311e29c96e1c2b663d61e5b0c0a76ea50cbddaa69f578b8600f77cf1a538ac900673696245b6de4283c979a2eccd71f9583dacf650575d1398678895da32663735b4d0cabfe7e972e59c2b4b4c9c89d0b82ca2267ad5062303e8abcb79600010506702eb912e3957e507aec4e2180699a738f6753509a12282a1d7181887f6c2e03de1da0dfe3b4efbb10e9b59301b4ef8a1d", 0xb5}, {&(0x7f0000000980)="34c30d95766fefbb7bdc40a3242505587bbc8584c2bc2003185f5ce116eea020efa91e2aae1eae2b8e848ac13c3dcedbbbc82adb1e70be8eecedba37be82545f2abda4f0a0e0fd0edd6bd03bb8e9bb91c39a2c828511aef3e684ad4c21ec0c146b9570139e31cd", 0x67}], 0x2) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'macvtap0\x00'}) ioctl$PPPIOCSFLAGS1(0xffffffffffffffff, 0x40047459, &(0x7f00000001c0)) recvmmsg(0xffffffffffffffff, &(0x7f0000002200)=[{{&(0x7f0000000340)=@in={0x2, 0x0, @multicast1}, 0x80, &(0x7f0000000440)=[{&(0x7f00000004c0)=""/88, 0x58}, {&(0x7f0000000b40)=""/4096, 0x1000}], 0x2, &(0x7f0000000740)=""/192, 0xc0}, 0x3}, {{&(0x7f0000000800)=@sco={0x1f, @none}, 0x80, &(0x7f0000000480)=[{&(0x7f0000001b40)=""/82, 0x52}], 0x1, &(0x7f0000001bc0)=""/206, 0xce}, 0x7}, {{&(0x7f0000001cc0)=@in={0x2, 0x0, @broadcast}, 0x80, &(0x7f0000000880)=[{&(0x7f0000001d40)=""/146, 0x92}, {&(0x7f0000001e00)=""/231, 0xe7}], 0x2, &(0x7f0000001f00)=""/239, 0xef}, 0x3}, {{&(0x7f0000002000)=@xdp, 0x80, &(0x7f00000020c0)=[{&(0x7f0000002080)=""/58, 0x3a}], 0x1, &(0x7f0000002100)=""/251, 0xfb}, 0x9}], 0x4, 0x40, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000002380)=ANY=[@ANYBLOB="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", @ANYRESDEC=r0, @ANYBLOB="b21b22b0b59f1a76abb6323c16886f3d2569d595dca4af1ac9160b24b62e47302e148fa17433c275945e36a713e5fad2e8abc9651d17b22d7d092020f73d100115fed606c66c84318df7895b1e5780f3c785bfb92571cf1bc9", @ANYRES32=0x0, @ANYRES32, @ANYRES32=0x0], &(0x7f0000000300)=0x18) r5 = socket(0x1, 0x803, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8936, &(0x7f0000000080)={@rand_addr=' \x01\x00', 0x44, r4}) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) r7 = socket(0x10, 0x8000000803, 0x0) sendmsg$nl_route(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000a00)=@newlink={0x30, 0x10, 0x401, 0x3001, 0x25dfdbfc, {0x0, 0x0, 0x0, 0x0, 0x534ad, 0x42a03}, [@IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x30}}, 0x0) 18:12:31 executing program 1: syz_mount_image$ntfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0xc71, 0x0, &(0x7f00000000c0), 0x218400, &(0x7f00000013c0)) 18:12:31 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x200000000}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x9) 18:12:31 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="b4050000000000006110580000000000c60000000000000095000002000000002ac73fe427abdf478e0357f2d32986f50b892b5007921cd48fe43b23be60a2dbc9778bb665510e3e22fcb26adfdc05e55a4933e62a23abb4baca4ec89323257db59db5eeda384459dd00d41b6aab85df5cab39e726769e2291b626d120a9247579f0b8edd8f16683e0623366ac632c24921d21534237743354f09cc29be2f72dfa8b05320110bcea53bb038c"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) socket(0x1, 0x5, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), 0x0}, 0x20) 18:12:31 executing program 5: r0 = syz_io_uring_setup(0x3ede, &(0x7f0000000240), &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) socket$l2tp6(0xa, 0x2, 0x73) openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/locks\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READ=@pass_buffer={0x16, 0x0, 0x0, @fd_index=0x5, 0xffffffffffffffff, &(0x7f0000000040)=""/17, 0x11}, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000002040)=[{{&(0x7f0000001380)=@in6={0xa, 0x0, 0x0, @private0}, 0x80, 0x0}}], 0x1, 0x0) io_uring_enter(r0, 0x26, 0xd, 0x0, 0x0, 0x0) [ 539.721628][T21787] FAULT_INJECTION: forcing a failure. [ 539.721628][T21787] name failslab, interval 1, probability 0, space 0, times 0 18:12:31 executing program 0: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$FS_IOC_RESVSP(r0, 0x402c5828, &(0x7f00000000c0)={0x0, 0x1, 0xa8f, 0x3078}) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x200000000}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x9) preadv(r1, &(0x7f0000000240)=[{&(0x7f0000000040)=""/94, 0x5e}, {&(0x7f00000000c0)=""/93, 0x5d}, {&(0x7f0000000140)=""/58, 0x3a}], 0x3, 0xd9f, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000002340)='./file0\x00', 0x0, 0x108) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000180)={'team0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @local}, 0x14) writev(r2, &(0x7f0000000280)=[{&(0x7f00000008c0)="110eaa1a9896d57019effc8c79961d0f73ccf3afca3754e2e7a31f536bcb7204bed59311e29c96e1c2b663d61e5b0c0a76ea50cbddaa69f578b8600f77cf1a538ac900673696245b6de4283c979a2eccd71f9583dacf650575d1398678895da32663735b4d0cabfe7e972e59c2b4b4c9c89d0b82ca2267ad5062303e8abcb79600010506702eb912e3957e507aec4e2180699a738f6753509a12282a1d7181887f6c2e03de1da0dfe3b4efbb10e9b59301b4ef8a1d", 0xb5}, {&(0x7f0000000980)="34c30d95766fefbb7bdc40a3242505587bbc8584c2bc2003185f5ce116eea020efa91e2aae1eae2b8e848ac13c3dcedbbbc82adb1e70be8eecedba37be82545f2abda4f0a0e0fd0edd6bd03bb8e9bb91c39a2c828511aef3e684ad4c21ec0c146b9570139e31cd", 0x67}], 0x2) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'macvtap0\x00'}) ioctl$PPPIOCSFLAGS1(0xffffffffffffffff, 0x40047459, &(0x7f00000001c0)) recvmmsg(0xffffffffffffffff, &(0x7f0000002200)=[{{&(0x7f0000000340)=@in={0x2, 0x0, @multicast1}, 0x80, &(0x7f0000000440)=[{&(0x7f00000004c0)=""/88, 0x58}, {&(0x7f0000000b40)=""/4096, 0x1000}], 0x2, &(0x7f0000000740)=""/192, 0xc0}, 0x3}, {{&(0x7f0000000800)=@sco={0x1f, @none}, 0x80, &(0x7f0000000480)=[{&(0x7f0000001b40)=""/82, 0x52}], 0x1, &(0x7f0000001bc0)=""/206, 0xce}, 0x7}, {{&(0x7f0000001cc0)=@in={0x2, 0x0, @broadcast}, 0x80, &(0x7f0000000880)=[{&(0x7f0000001d40)=""/146, 0x92}, {&(0x7f0000001e00)=""/231, 0xe7}], 0x2, &(0x7f0000001f00)=""/239, 0xef}, 0x3}, {{&(0x7f0000002000)=@xdp, 0x80, &(0x7f00000020c0)=[{&(0x7f0000002080)=""/58, 0x3a}], 0x1, &(0x7f0000002100)=""/251, 0xfb}, 0x9}], 0x4, 0x40, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000002380)=ANY=[@ANYBLOB="050000004f2fe4e7fe91d1f169b7f431831544d94b6dbcca36d501829c64f0c28565fbc3e562e329d779aef804590001804797c4378192536ca659efcf0a6cb16b0ba5b79cfefdc8e93c46dfa0c119d12be6495820cc0b34645475d4da28535803ddcfd16f5df589e2f1ac230118eafd75a63c016b3a1663bc141e5ed84016b6b02854a48c0ec71a36a1ad145c5d2216e964a34cdf686b0a089443bd0f8c210860754d133e2c97ce8a25ee4d4eb5abb779387ca2cd9e870d5cb5854616c65c24f259eeaa625432fa25dd2832dc14f9a78ebf3a24277da2b55d09ed6a1dca07d4fb9ed592a64782b6939500505805d12b2776980c4b250f17b0b9a8fda266d7f084a9cd1022d2d670f793298bcf83b9a25e4ae25ac23ce06ef88068108ec131b23695772064709b1dbee85e5c2a0c4cf809dbd8b5617f8c6f6fba013f019829c83bd4cf10be5c6da663ce7cbf9b19ebd88bedb114ec207599273b55ec5f4cd35914f897ee8afc7663255678f6853e5cfa0dfa079ba560c7ddbc56e6352397b7266ac906a0ce0fb810eb00000000000000000000000000000000000000000000000000c54baf95f669d6810040c457be8ca739b4ec785f005bb4faa01270b999b6c9899cd9e8997d359b77c00a68341ca40b4c0e06884b6384ef6e", @ANYRESDEC=r0, @ANYBLOB="b21b22b0b59f1a76abb6323c16886f3d2569d595dca4af1ac9160b24b62e47302e148fa17433c275945e36a713e5fad2e8abc9651d17b22d7d092020f73d100115fed606c66c84318df7895b1e5780f3c785bfb92571cf1bc9", @ANYRES32=0x0, @ANYRES32, @ANYRES32=0x0], &(0x7f0000000300)=0x18) r5 = socket(0x1, 0x803, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8936, &(0x7f0000000080)={@rand_addr=' \x01\x00', 0x44, r4}) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) r7 = socket(0x10, 0x8000000803, 0x0) sendmsg$nl_route(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000a00)=@newlink={0x30, 0x10, 0x401, 0x3001, 0x25dfdbfc, {0x0, 0x0, 0x0, 0x0, 0x534ad, 0x42a03}, [@IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x30}}, 0x0) [ 539.766112][T21787] CPU: 0 PID: 21787 Comm: syz-executor.2 Not tainted 5.16.0-rc5-syzkaller #0 [ 539.774927][T21787] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 539.785000][T21787] Call Trace: [ 539.788295][T21787] [ 539.791247][T21787] dump_stack_lvl+0x201/0x2d8 [ 539.795959][T21787] ? show_regs_print_info+0x12/0x12 [ 539.801184][T21787] ? log_buf_vmcoreinfo_setup+0x498/0x498 [ 539.806947][T21787] ? __might_sleep+0xe0/0xe0 [ 539.811593][T21787] ? rcu_read_lock_sched_held+0x89/0x130 [ 539.817249][T21787] should_fail+0x384/0x4b0 [ 539.821680][T21787] ? alloc_uevent_skb+0x73/0x220 [ 539.826626][T21787] should_failslab+0x5/0x20 [ 539.831212][T21787] __kmalloc_node_track_caller+0x95/0x400 [ 539.837121][T21787] ? kmem_cache_alloc_node+0x25e/0x370 [ 539.842572][T21787] ? __alloc_skb+0xd8/0x5a0 [ 539.847076][T21787] ? alloc_uevent_skb+0x73/0x220 [ 539.852002][T21787] __alloc_skb+0x127/0x5a0 [ 539.856424][T21787] alloc_uevent_skb+0x73/0x220 [ 539.861182][T21787] kobject_uevent_env+0xf19/0x1700 [ 539.866297][T21787] disk_force_media_change+0x19c/0x2a0 [ 539.871751][T21787] ? bdev_check_media_change+0x540/0x540 [ 539.877375][T21787] ? __fget_files+0x3d0/0x440 [ 539.882054][T21787] loop_configure+0x778/0x1740 [ 539.886858][T21787] lo_ioctl+0x7d4/0x1f40 [ 539.891110][T21787] ? lo_release+0x1f0/0x1f0 [ 539.895617][T21787] ? rcu_read_lock_sched_held+0x89/0x130 [ 539.901245][T21787] ? __bpf_trace_rcu_stall_warning+0x10/0x10 [ 539.907265][T21787] ? rcu_lock_release+0x5/0x20 [ 539.912195][T21787] ? __lock_acquire+0x2b00/0x2b00 [ 539.917223][T21787] ? stack_trace_save+0x1e0/0x1e0 [ 539.922254][T21787] ? stack_trace_save+0x1e0/0x1e0 [ 539.927528][T21787] ? is_bpf_text_address+0x253/0x270 [ 539.932821][T21787] ? stack_trace_save+0x1e0/0x1e0 [ 539.937836][T21787] ? kernel_text_address+0x9e/0xd0 [ 539.943127][T21787] ? __kernel_text_address+0x9/0x40 [ 539.948669][T21787] ? unwind_get_return_address+0x48/0x80 [ 539.954294][T21787] ? arch_stack_walk+0xf8/0x140 [ 539.959147][T21787] ? stack_trace_save+0x11b/0x1e0 [ 539.964164][T21787] ? stack_trace_snprint+0xe0/0xe0 [ 539.969263][T21787] ? rcu_read_lock_sched_held+0x89/0x130 [ 539.974913][T21787] ? kfree+0xe1/0x330 [ 539.978886][T21787] ? kasan_set_track+0x68/0x80 [ 539.983657][T21787] ? kasan_set_track+0x4c/0x80 [ 539.988409][T21787] ? kasan_set_free_info+0x1f/0x40 [ 539.993512][T21787] ? ____kasan_slab_free+0x10d/0x150 [ 539.998790][T21787] ? slab_free_freelist_hook+0x12e/0x1a0 [ 540.004411][T21787] ? kfree+0xe1/0x330 [ 540.008381][T21787] ? tomoyo_path_number_perm+0x5f1/0x7c0 [ 540.014004][T21787] ? security_file_ioctl+0x55/0xb0 [ 540.019105][T21787] ? __se_sys_ioctl+0x48/0x170 [ 540.023857][T21787] ? do_syscall_64+0x44/0xd0 [ 540.028442][T21787] ? entry_SYSCALL_64_after_hwframe+0x44/0xae [ 540.034518][T21787] ? rcu_read_lock_sched_held+0x89/0x130 [ 540.040140][T21787] ? __bpf_trace_rcu_stall_warning+0x10/0x10 [ 540.046115][T21787] ? lockdep_hardirqs_on_prepare+0x412/0x780 [ 540.052095][T21787] ? do_vfs_ioctl+0xcb2/0x2b90 [ 540.056889][T21787] ? blkdev_common_ioctl+0x702/0x2000 [ 540.062258][T21787] ? tomoyo_check_path_acl+0x1c0/0x1c0 [ 540.067707][T21787] ? blkdev_bszset+0x260/0x260 [ 540.072482][T21787] ? memset+0x1f/0x40 [ 540.076452][T21787] ? smack_file_ioctl+0x298/0x3a0 [ 540.081471][T21787] ? smack_file_alloc_security+0xd0/0xd0 [ 540.087096][T21787] ? lo_release+0x1f0/0x1f0 [ 540.091595][T21787] blkdev_ioctl+0x3ac/0x790 [ 540.096097][T21787] ? blkdev_compat_ptr_ioctl+0xd0/0xd0 [ 540.101566][T21787] ? bpf_lsm_file_ioctl+0x5/0x10 [ 540.106505][T21787] ? security_file_ioctl+0x9d/0xb0 [ 540.111609][T21787] ? blkdev_compat_ptr_ioctl+0xd0/0xd0 [ 540.117062][T21787] __se_sys_ioctl+0xfb/0x170 [ 540.121649][T21787] do_syscall_64+0x44/0xd0 [ 540.126067][T21787] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 540.131955][T21787] RIP: 0033:0x7f3831feec57 [ 540.136367][T21787] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 04 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 540.156053][T21787] RSP: 002b:00007f3830963f28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 540.164458][T21787] RAX: ffffffffffffffda RBX: 00007f38320389c8 RCX: 00007f3831feec57 [ 540.172431][T21787] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 540.180417][T21787] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007f38309641d0 [ 540.188378][T21787] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 540.196340][T21787] R13: 0000000000000004 R14: 00000000200000c0 R15: 0000000000000000 [ 540.204320][T21787] 18:12:31 executing program 5: r0 = syz_io_uring_setup(0x3ede, &(0x7f0000000240), &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) socket$l2tp6(0xa, 0x2, 0x73) openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/locks\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READ=@pass_buffer={0x16, 0x0, 0x0, @fd_index=0x5, 0xffffffffffffffff, &(0x7f0000000040)=""/17, 0x11}, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000002040)=[{{&(0x7f0000001380)=@in6={0xa, 0x0, 0x0, @private0}, 0x80, 0x0}}], 0x1, 0x0) io_uring_enter(r0, 0x26, 0xe, 0x0, 0x0, 0x0) 18:12:31 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="b4050000000000006110580000000000c60000000000000095000002000000002ac73fe427abdf478e0357f2d32986f50b892b5007921cd48fe43b23be60a2dbc9778bb665510e3e22fcb26adfdc05e55a4933e62a23abb4baca4ec89323257db59db5eeda384459dd00d41b6aab85df5cab39e726769e2291b626d120a9247579f0b8edd8f16683e0623366ac632c24921d21534237743354f09cc29be2f72dfa8b05320110bcea53bb038c"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) socket(0x1, 0x5, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), 0x0}, 0x20) [ 540.248628][T21787] ntfs: (device loop2): ntfs_fill_super(): Unable to determine device size. [ 540.256110][T21790] loop1: detected capacity change from 0 to 6 18:12:31 executing program 2: syz_mount_image$ntfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f00000013c0)={[{@fmask}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'syzkaller1\x00'}}]}) (fail_nth: 29) 18:12:31 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x200000000}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x9) 18:12:31 executing program 0: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$FS_IOC_RESVSP(r0, 0x402c5828, &(0x7f00000000c0)={0x0, 0x1, 0xa8f, 0x3078}) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x200000000}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x9) preadv(r1, &(0x7f0000000240)=[{&(0x7f0000000040)=""/94, 0x5e}, {&(0x7f00000000c0)=""/93, 0x5d}, {&(0x7f0000000140)=""/58, 0x3a}], 0x3, 0xd9f, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000002340)='./file0\x00', 0x0, 0x108) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000180)={'team0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @local}, 0x14) writev(r2, &(0x7f0000000280)=[{&(0x7f00000008c0)="110eaa1a9896d57019effc8c79961d0f73ccf3afca3754e2e7a31f536bcb7204bed59311e29c96e1c2b663d61e5b0c0a76ea50cbddaa69f578b8600f77cf1a538ac900673696245b6de4283c979a2eccd71f9583dacf650575d1398678895da32663735b4d0cabfe7e972e59c2b4b4c9c89d0b82ca2267ad5062303e8abcb79600010506702eb912e3957e507aec4e2180699a738f6753509a12282a1d7181887f6c2e03de1da0dfe3b4efbb10e9b59301b4ef8a1d", 0xb5}, {&(0x7f0000000980)="34c30d95766fefbb7bdc40a3242505587bbc8584c2bc2003185f5ce116eea020efa91e2aae1eae2b8e848ac13c3dcedbbbc82adb1e70be8eecedba37be82545f2abda4f0a0e0fd0edd6bd03bb8e9bb91c39a2c828511aef3e684ad4c21ec0c146b9570139e31cd", 0x67}], 0x2) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'macvtap0\x00'}) ioctl$PPPIOCSFLAGS1(0xffffffffffffffff, 0x40047459, &(0x7f00000001c0)) recvmmsg(0xffffffffffffffff, &(0x7f0000002200)=[{{&(0x7f0000000340)=@in={0x2, 0x0, @multicast1}, 0x80, &(0x7f0000000440)=[{&(0x7f00000004c0)=""/88, 0x58}, {&(0x7f0000000b40)=""/4096, 0x1000}], 0x2, &(0x7f0000000740)=""/192, 0xc0}, 0x3}, {{&(0x7f0000000800)=@sco={0x1f, @none}, 0x80, &(0x7f0000000480)=[{&(0x7f0000001b40)=""/82, 0x52}], 0x1, &(0x7f0000001bc0)=""/206, 0xce}, 0x7}, {{&(0x7f0000001cc0)=@in={0x2, 0x0, @broadcast}, 0x80, &(0x7f0000000880)=[{&(0x7f0000001d40)=""/146, 0x92}, {&(0x7f0000001e00)=""/231, 0xe7}], 0x2, &(0x7f0000001f00)=""/239, 0xef}, 0x3}, {{&(0x7f0000002000)=@xdp, 0x80, &(0x7f00000020c0)=[{&(0x7f0000002080)=""/58, 0x3a}], 0x1, &(0x7f0000002100)=""/251, 0xfb}, 0x9}], 0x4, 0x40, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000002380)=ANY=[@ANYBLOB="050000004f2fe4e7fe91d1f169b7f431831544d94b6dbcca36d501829c64f0c28565fbc3e562e329d779aef804590001804797c4378192536ca659efcf0a6cb16b0ba5b79cfefdc8e93c46dfa0c119d12be6495820cc0b34645475d4da28535803ddcfd16f5df589e2f1ac230118eafd75a63c016b3a1663bc141e5ed84016b6b02854a48c0ec71a36a1ad145c5d2216e964a34cdf686b0a089443bd0f8c210860754d133e2c97ce8a25ee4d4eb5abb779387ca2cd9e870d5cb5854616c65c24f259eeaa625432fa25dd2832dc14f9a78ebf3a24277da2b55d09ed6a1dca07d4fb9ed592a64782b6939500505805d12b2776980c4b250f17b0b9a8fda266d7f084a9cd1022d2d670f793298bcf83b9a25e4ae25ac23ce06ef88068108ec131b23695772064709b1dbee85e5c2a0c4cf809dbd8b5617f8c6f6fba013f019829c83bd4cf10be5c6da663ce7cbf9b19ebd88bedb114ec207599273b55ec5f4cd35914f897ee8afc7663255678f6853e5cfa0dfa079ba560c7ddbc56e6352397b7266ac906a0ce0fb810eb00000000000000000000000000000000000000000000000000c54baf95f669d6810040c457be8ca739b4ec785f005bb4faa01270b999b6c9899cd9e8997d359b77c00a68341ca40b4c0e06884b6384ef6e", @ANYRESDEC=r0, @ANYBLOB="b21b22b0b59f1a76abb6323c16886f3d2569d595dca4af1ac9160b24b62e47302e148fa17433c275945e36a713e5fad2e8abc9651d17b22d7d092020f73d100115fed606c66c84318df7895b1e5780f3c785bfb92571cf1bc9", @ANYRES32=0x0, @ANYRES32, @ANYRES32=0x0], &(0x7f0000000300)=0x18) r5 = socket(0x1, 0x803, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8936, &(0x7f0000000080)={@rand_addr=' \x01\x00', 0x44, r4}) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) r7 = socket(0x10, 0x8000000803, 0x0) sendmsg$nl_route(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000a00)=@newlink={0x30, 0x10, 0x401, 0x3001, 0x25dfdbfc, {0x0, 0x0, 0x0, 0x0, 0x534ad, 0x42a03}, [@IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x30}}, 0x0) 18:12:31 executing program 1: syz_mount_image$ntfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0xd00, 0x0, &(0x7f00000000c0), 0x218400, &(0x7f00000013c0)) 18:12:31 executing program 5: r0 = syz_io_uring_setup(0x3ede, &(0x7f0000000240), &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) socket$l2tp6(0xa, 0x2, 0x73) openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/locks\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READ=@pass_buffer={0x16, 0x0, 0x0, @fd_index=0x5, 0xffffffffffffffff, &(0x7f0000000040)=""/17, 0x11}, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000002040)=[{{&(0x7f0000001380)=@in6={0xa, 0x0, 0x0, @private0}, 0x80, 0x0}}], 0x1, 0x0) io_uring_enter(r0, 0x26, 0xf, 0x0, 0x0, 0x0) 18:12:31 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x200000000}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x9) 18:12:31 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="b4050000000000006110580000000000c60000000000000095000002000000002ac73fe427abdf478e0357f2d32986f50b892b5007921cd48fe43b23be60a2dbc9778bb665510e3e22fcb26adfdc05e55a4933e62a23abb4baca4ec89323257db59db5eeda384459dd00d41b6aab85df5cab39e726769e2291b626d120a9247579f0b8edd8f16683e0623366ac632c24921d21534237743354f09cc29be2f72dfa8b05320110bcea53bb038c"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) socket(0x1, 0x5, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp}, 0x20) [ 540.435479][T21811] FAULT_INJECTION: forcing a failure. [ 540.435479][T21811] name failslab, interval 1, probability 0, space 0, times 0 [ 540.477818][T21811] CPU: 1 PID: 21811 Comm: syz-executor.2 Not tainted 5.16.0-rc5-syzkaller #0 [ 540.486628][T21811] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 540.496736][T21811] Call Trace: [ 540.500035][T21811] [ 540.503070][T21811] dump_stack_lvl+0x201/0x2d8 [ 540.507762][T21811] ? show_regs_print_info+0x12/0x12 [ 540.512965][T21811] ? log_buf_vmcoreinfo_setup+0x498/0x498 [ 540.518688][T21811] should_fail+0x384/0x4b0 [ 540.523136][T21811] ? skb_clone+0x1b4/0x360 [ 540.527905][T21811] should_failslab+0x5/0x20 [ 540.532420][T21811] kmem_cache_alloc+0x72/0x310 [ 540.537193][T21811] ? _raw_read_unlock+0x40/0x40 [ 540.542046][T21811] skb_clone+0x1b4/0x360 [ 540.546288][T21811] ? netlink_broadcast+0x65b/0x1170 [ 540.551690][T21811] netlink_broadcast+0x669/0x1170 [ 540.556883][T21811] ? alloc_uevent_skb+0xdd/0x220 [ 540.561831][T21811] kobject_uevent_env+0xfa2/0x1700 [ 540.566966][T21811] disk_force_media_change+0x19c/0x2a0 [ 540.572505][T21811] ? bdev_check_media_change+0x540/0x540 [ 540.578221][T21811] ? __fget_files+0x3d0/0x440 [ 540.582913][T21811] loop_configure+0x778/0x1740 [ 540.587712][T21811] lo_ioctl+0x7d4/0x1f40 [ 540.591984][T21811] ? lo_release+0x1f0/0x1f0 [ 540.596502][T21811] ? rcu_read_lock_sched_held+0x89/0x130 [ 540.602148][T21811] ? __bpf_trace_rcu_stall_warning+0x10/0x10 [ 540.608266][T21811] ? rcu_lock_release+0x5/0x20 [ 540.613025][T21811] ? __lock_acquire+0x2b00/0x2b00 [ 540.618073][T21811] ? stack_trace_save+0x1e0/0x1e0 [ 540.623109][T21811] ? stack_trace_save+0x1e0/0x1e0 [ 540.628138][T21811] ? is_bpf_text_address+0x253/0x270 [ 540.633441][T21811] ? stack_trace_save+0x1e0/0x1e0 [ 540.638463][T21811] ? kernel_text_address+0x9e/0xd0 [ 540.643743][T21811] ? __kernel_text_address+0x9/0x40 [ 540.648958][T21811] ? unwind_get_return_address+0x48/0x80 [ 540.654598][T21811] ? arch_stack_walk+0xf8/0x140 [ 540.659468][T21811] ? stack_trace_save+0x11b/0x1e0 [ 540.664487][T21811] ? stack_trace_snprint+0xe0/0xe0 [ 540.669590][T21811] ? rcu_read_lock_sched_held+0x89/0x130 [ 540.675236][T21811] ? kfree+0xe1/0x330 [ 540.679240][T21811] ? kasan_set_track+0x68/0x80 [ 540.684000][T21811] ? kasan_set_track+0x4c/0x80 [ 540.688761][T21811] ? kasan_set_free_info+0x1f/0x40 [ 540.693887][T21811] ? ____kasan_slab_free+0x10d/0x150 [ 540.699175][T21811] ? slab_free_freelist_hook+0x12e/0x1a0 [ 540.704820][T21811] ? kfree+0xe1/0x330 [ 540.708797][T21811] ? tomoyo_path_number_perm+0x5f1/0x7c0 [ 540.714446][T21811] ? security_file_ioctl+0x55/0xb0 [ 540.719569][T21811] ? __se_sys_ioctl+0x48/0x170 [ 540.724323][T21811] ? do_syscall_64+0x44/0xd0 [ 540.728911][T21811] ? entry_SYSCALL_64_after_hwframe+0x44/0xae [ 540.735020][T21811] ? rcu_read_lock_sched_held+0x89/0x130 [ 540.740677][T21811] ? __bpf_trace_rcu_stall_warning+0x10/0x10 [ 540.746675][T21811] ? lockdep_hardirqs_on_prepare+0x412/0x780 [ 540.753099][T21811] ? do_vfs_ioctl+0xcb2/0x2b90 [ 540.757900][T21811] ? blkdev_common_ioctl+0x702/0x2000 [ 540.763277][T21811] ? tomoyo_check_path_acl+0x1c0/0x1c0 [ 540.768768][T21811] ? blkdev_bszset+0x260/0x260 [ 540.773562][T21811] ? memset+0x1f/0x40 [ 540.777531][T21811] ? smack_file_ioctl+0x298/0x3a0 [ 540.782552][T21811] ? smack_file_alloc_security+0xd0/0xd0 [ 540.788205][T21811] ? lo_release+0x1f0/0x1f0 [ 540.792724][T21811] blkdev_ioctl+0x3ac/0x790 [ 540.797250][T21811] ? blkdev_compat_ptr_ioctl+0xd0/0xd0 [ 540.802733][T21811] ? bpf_lsm_file_ioctl+0x5/0x10 [ 540.807695][T21811] ? security_file_ioctl+0x9d/0xb0 [ 540.812908][T21811] ? blkdev_compat_ptr_ioctl+0xd0/0xd0 [ 540.818363][T21811] __se_sys_ioctl+0xfb/0x170 [ 540.822960][T21811] do_syscall_64+0x44/0xd0 [ 540.827382][T21811] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 540.833284][T21811] RIP: 0033:0x7f3831feec57 [ 540.837688][T21811] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 04 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 540.857285][T21811] RSP: 002b:00007f3830963f28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 540.865720][T21811] RAX: ffffffffffffffda RBX: 00007f38320389c8 RCX: 00007f3831feec57 [ 540.873711][T21811] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 540.881695][T21811] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007f38309641d0 [ 540.889675][T21811] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 540.897737][T21811] R13: 0000000000000004 R14: 00000000200000c0 R15: 0000000000000000 [ 540.906164][T21811] 18:12:32 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="b4050000000000006110580000000000c60000000000000095000002000000002ac73fe427abdf478e0357f2d32986f50b892b5007921cd48fe43b23be60a2dbc9778bb665510e3e22fcb26adfdc05e55a4933e62a23abb4baca4ec89323257db59db5eeda384459dd00d41b6aab85df5cab39e726769e2291b626d120a9247579f0b8edd8f16683e0623366ac632c24921d21534237743354f09cc29be2f72dfa8b05320110bcea53bb038c"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) socket(0x1, 0x5, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp}, 0x20) 18:12:32 executing program 5: r0 = syz_io_uring_setup(0x3ede, &(0x7f0000000240), &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) socket$l2tp6(0xa, 0x2, 0x73) openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/locks\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READ=@pass_buffer={0x16, 0x0, 0x0, @fd_index=0x5, 0xffffffffffffffff, &(0x7f0000000040)=""/17, 0x11}, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000002040)=[{{&(0x7f0000001380)=@in6={0xa, 0x0, 0x0, @private0}, 0x80, 0x0}}], 0x1, 0x0) io_uring_enter(r0, 0x26, 0x10, 0x0, 0x0, 0x0) 18:12:32 executing program 0: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$FS_IOC_RESVSP(r0, 0x402c5828, &(0x7f00000000c0)={0x0, 0x1, 0xa8f, 0x3078}) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x200000000}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x9) preadv(r1, &(0x7f0000000240)=[{&(0x7f0000000040)=""/94, 0x5e}, {&(0x7f00000000c0)=""/93, 0x5d}, {&(0x7f0000000140)=""/58, 0x3a}], 0x3, 0xd9f, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000002340)='./file0\x00', 0x0, 0x108) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000180)={'team0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @local}, 0x14) writev(r2, &(0x7f0000000280)=[{&(0x7f00000008c0)="110eaa1a9896d57019effc8c79961d0f73ccf3afca3754e2e7a31f536bcb7204bed59311e29c96e1c2b663d61e5b0c0a76ea50cbddaa69f578b8600f77cf1a538ac900673696245b6de4283c979a2eccd71f9583dacf650575d1398678895da32663735b4d0cabfe7e972e59c2b4b4c9c89d0b82ca2267ad5062303e8abcb79600010506702eb912e3957e507aec4e2180699a738f6753509a12282a1d7181887f6c2e03de1da0dfe3b4efbb10e9b59301b4ef8a1d", 0xb5}, {&(0x7f0000000980)="34c30d95766fefbb7bdc40a3242505587bbc8584c2bc2003185f5ce116eea020efa91e2aae1eae2b8e848ac13c3dcedbbbc82adb1e70be8eecedba37be82545f2abda4f0a0e0fd0edd6bd03bb8e9bb91c39a2c828511aef3e684ad4c21ec0c146b9570139e31cd", 0x67}], 0x2) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'macvtap0\x00'}) ioctl$PPPIOCSFLAGS1(0xffffffffffffffff, 0x40047459, &(0x7f00000001c0)) recvmmsg(0xffffffffffffffff, &(0x7f0000002200)=[{{&(0x7f0000000340)=@in={0x2, 0x0, @multicast1}, 0x80, &(0x7f0000000440)=[{&(0x7f00000004c0)=""/88, 0x58}, {&(0x7f0000000b40)=""/4096, 0x1000}], 0x2, &(0x7f0000000740)=""/192, 0xc0}, 0x3}, {{&(0x7f0000000800)=@sco={0x1f, @none}, 0x80, &(0x7f0000000480)=[{&(0x7f0000001b40)=""/82, 0x52}], 0x1, &(0x7f0000001bc0)=""/206, 0xce}, 0x7}, {{&(0x7f0000001cc0)=@in={0x2, 0x0, @broadcast}, 0x80, &(0x7f0000000880)=[{&(0x7f0000001d40)=""/146, 0x92}, {&(0x7f0000001e00)=""/231, 0xe7}], 0x2, &(0x7f0000001f00)=""/239, 0xef}, 0x3}, {{&(0x7f0000002000)=@xdp, 0x80, &(0x7f00000020c0)=[{&(0x7f0000002080)=""/58, 0x3a}], 0x1, &(0x7f0000002100)=""/251, 0xfb}, 0x9}], 0x4, 0x40, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000002380)=ANY=[@ANYBLOB="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", @ANYRESDEC=r0, @ANYBLOB="b21b22b0b59f1a76abb6323c16886f3d2569d595dca4af1ac9160b24b62e47302e148fa17433c275945e36a713e5fad2e8abc9651d17b22d7d092020f73d100115fed606c66c84318df7895b1e5780f3c785bfb92571cf1bc9", @ANYRES32=0x0, @ANYRES32, @ANYRES32=0x0], &(0x7f0000000300)=0x18) r5 = socket(0x1, 0x803, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8936, &(0x7f0000000080)={@rand_addr=' \x01\x00', 0x44, r4}) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) r7 = socket(0x10, 0x8000000803, 0x0) sendmsg$nl_route(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000a00)=@newlink={0x74, 0x10, 0x401, 0x3001, 0x25dfdbfc, {0x0, 0x0, 0x0, 0x0, 0x534ad, 0x42a03}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x34, 0x2, 0x0, 0x1, [@IFLA_IPVLAN_MODE={0x6, 0x1, 0x2}, @IFLA_IPVLAN_FLAGS={0x6, 0x2, 0x2}, @IFLA_IPVLAN_FLAGS={0x6, 0x2, 0x1}, @IFLA_IPVLAN_FLAGS={0x6, 0x2, 0x2}, @IFLA_IPVLAN_FLAGS={0x6, 0x2, 0x3}, @IFLA_IPVLAN_MODE={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x74}}, 0x0) [ 540.932180][T21812] loop1: detected capacity change from 0 to 6 [ 540.947646][T21811] ntfs: (device loop2): ntfs_fill_super(): Unable to determine device size. 18:12:32 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x200000000}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x9) 18:12:32 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="b4050000000000006110580000000000c60000000000000095000002000000002ac73fe427abdf478e0357f2d32986f50b892b5007921cd48fe43b23be60a2dbc9778bb665510e3e22fcb26adfdc05e55a4933e62a23abb4baca4ec89323257db59db5eeda384459dd00d41b6aab85df5cab39e726769e2291b626d120a9247579f0b8edd8f16683e0623366ac632c24921d21534237743354f09cc29be2f72dfa8b05320110bcea53bb038c"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) socket(0x1, 0x5, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp}, 0x20) 18:12:32 executing program 2: syz_mount_image$ntfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f00000013c0)={[{@fmask}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'syzkaller1\x00'}}]}) (fail_nth: 30) 18:12:32 executing program 1: syz_mount_image$ntfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0xe00, 0x0, &(0x7f00000000c0), 0x218400, &(0x7f00000013c0)) [ 541.158500][T21832] loop1: detected capacity change from 0 to 7 [ 541.198230][T21833] FAULT_INJECTION: forcing a failure. 18:12:32 executing program 5: r0 = syz_io_uring_setup(0x3ede, &(0x7f0000000240), &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) socket$l2tp6(0xa, 0x2, 0x73) openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/locks\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READ=@pass_buffer={0x16, 0x0, 0x0, @fd_index=0x5, 0xffffffffffffffff, &(0x7f0000000040)=""/17, 0x11}, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000002040)=[{{&(0x7f0000001380)=@in6={0xa, 0x0, 0x0, @private0}, 0x80, 0x0}}], 0x1, 0x0) io_uring_enter(r0, 0x26, 0x11, 0x0, 0x0, 0x0) 18:12:32 executing program 4: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$FS_IOC_RESVSP(r0, 0x402c5828, &(0x7f00000000c0)={0x0, 0x1, 0xa8f, 0x3078}) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x200000000}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x9) preadv(r1, &(0x7f0000000240)=[{&(0x7f0000000040)=""/94, 0x5e}, {&(0x7f00000000c0)=""/93, 0x5d}, {&(0x7f0000000140)=""/58, 0x3a}], 0x3, 0xd9f, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000002340)='./file0\x00', 0x0, 0x108) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000180)={'team0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @local}, 0x14) writev(r2, &(0x7f0000000280)=[{&(0x7f00000008c0)="110eaa1a9896d57019effc8c79961d0f73ccf3afca3754e2e7a31f536bcb7204bed59311e29c96e1c2b663d61e5b0c0a76ea50cbddaa69f578b8600f77cf1a538ac900673696245b6de4283c979a2eccd71f9583dacf650575d1398678895da32663735b4d0cabfe7e972e59c2b4b4c9c89d0b82ca2267ad5062303e8abcb79600010506702eb912e3957e507aec4e2180699a738f6753509a12282a1d7181887f6c2e03de1da0dfe3b4efbb10e9b59301b4ef8a1d", 0xb5}, {&(0x7f0000000980)="34c30d95766fefbb7bdc40a3242505587bbc8584c2bc2003185f5ce116eea020efa91e2aae1eae2b8e848ac13c3dcedbbbc82adb1e70be8eecedba37be82545f2abda4f0a0e0fd0edd6bd03bb8e9bb91c39a2c828511aef3e684ad4c21ec0c146b9570139e31cd", 0x67}], 0x2) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'macvtap0\x00'}) ioctl$PPPIOCSFLAGS1(0xffffffffffffffff, 0x40047459, &(0x7f00000001c0)) recvmmsg(0xffffffffffffffff, &(0x7f0000002200)=[{{&(0x7f0000000340)=@in={0x2, 0x0, @multicast1}, 0x80, &(0x7f0000000440)=[{&(0x7f00000004c0)=""/88, 0x58}, {&(0x7f0000000b40)=""/4096, 0x1000}], 0x2, &(0x7f0000000740)=""/192, 0xc0}, 0x3}, {{&(0x7f0000000800)=@sco={0x1f, @none}, 0x80, &(0x7f0000000480)=[{&(0x7f0000001b40)=""/82, 0x52}], 0x1, &(0x7f0000001bc0)=""/206, 0xce}, 0x7}, {{&(0x7f0000001cc0)=@in={0x2, 0x0, @broadcast}, 0x80, &(0x7f0000000880)=[{&(0x7f0000001d40)=""/146, 0x92}, {&(0x7f0000001e00)=""/231, 0xe7}], 0x2, &(0x7f0000001f00)=""/239, 0xef}, 0x3}, {{&(0x7f0000002000)=@xdp, 0x80, &(0x7f00000020c0)=[{&(0x7f0000002080)=""/58, 0x3a}], 0x1, &(0x7f0000002100)=""/251, 0xfb}, 0x9}], 0x4, 0x40, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000002380)=ANY=[@ANYBLOB="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", @ANYRESDEC=r0, @ANYBLOB="b21b22b0b59f1a76abb6323c16886f3d2569d595dca4af1ac9160b24b62e47302e148fa17433c275945e36a713e5fad2e8abc9651d17b22d7d092020f73d100115fed606c66c84318df7895b1e5780f3c785bfb92571cf1bc9", @ANYRES32=0x0, @ANYRES32, @ANYRES32=0x0], &(0x7f0000000300)=0x18) r5 = socket(0x1, 0x803, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8936, &(0x7f0000000080)={@rand_addr=' \x01\x00', 0x44, r4}) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) r6 = socket(0x10, 0x8000000803, 0x0) sendmsg$nl_route(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000a00)=@newlink={0x7c, 0x10, 0x401, 0x3001, 0x25dfdbfc, {0x0, 0x0, 0x0, 0x0, 0x534ad, 0x42a03}, [@IFLA_LINKINFO={0x4c, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x3c, 0x2, 0x0, 0x1, [@IFLA_IPVLAN_MODE={0x6, 0x1, 0x2}, @IFLA_IPVLAN_FLAGS={0x6, 0x2, 0x2}, @IFLA_IPVLAN_FLAGS={0x6, 0x2, 0x1}, @IFLA_IPVLAN_FLAGS={0x6, 0x2, 0x2}, @IFLA_IPVLAN_FLAGS={0x6, 0x2, 0x3}, @IFLA_IPVLAN_MODE={0x6}, @IFLA_IPVLAN_FLAGS={0x6, 0x2, 0x2}]}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8}]}, 0x7c}}, 0x0) 18:12:32 executing program 0: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$FS_IOC_RESVSP(r0, 0x402c5828, &(0x7f00000000c0)={0x0, 0x1, 0xa8f, 0x3078}) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x200000000}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x9) preadv(r1, &(0x7f0000000240)=[{&(0x7f0000000040)=""/94, 0x5e}, {&(0x7f00000000c0)=""/93, 0x5d}, {&(0x7f0000000140)=""/58, 0x3a}], 0x3, 0xd9f, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000002340)='./file0\x00', 0x0, 0x108) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000180)={'team0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @local}, 0x14) writev(r2, &(0x7f0000000280)=[{&(0x7f00000008c0)="110eaa1a9896d57019effc8c79961d0f73ccf3afca3754e2e7a31f536bcb7204bed59311e29c96e1c2b663d61e5b0c0a76ea50cbddaa69f578b8600f77cf1a538ac900673696245b6de4283c979a2eccd71f9583dacf650575d1398678895da32663735b4d0cabfe7e972e59c2b4b4c9c89d0b82ca2267ad5062303e8abcb79600010506702eb912e3957e507aec4e2180699a738f6753509a12282a1d7181887f6c2e03de1da0dfe3b4efbb10e9b59301b4ef8a1d", 0xb5}, {&(0x7f0000000980)="34c30d95766fefbb7bdc40a3242505587bbc8584c2bc2003185f5ce116eea020efa91e2aae1eae2b8e848ac13c3dcedbbbc82adb1e70be8eecedba37be82545f2abda4f0a0e0fd0edd6bd03bb8e9bb91c39a2c828511aef3e684ad4c21ec0c146b9570139e31cd", 0x67}], 0x2) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'macvtap0\x00'}) ioctl$PPPIOCSFLAGS1(0xffffffffffffffff, 0x40047459, &(0x7f00000001c0)) recvmmsg(0xffffffffffffffff, &(0x7f0000002200)=[{{&(0x7f0000000340)=@in={0x2, 0x0, @multicast1}, 0x80, &(0x7f0000000440)=[{&(0x7f00000004c0)=""/88, 0x58}, {&(0x7f0000000b40)=""/4096, 0x1000}], 0x2, &(0x7f0000000740)=""/192, 0xc0}, 0x3}, {{&(0x7f0000000800)=@sco={0x1f, @none}, 0x80, &(0x7f0000000480)=[{&(0x7f0000001b40)=""/82, 0x52}], 0x1, &(0x7f0000001bc0)=""/206, 0xce}, 0x7}, {{&(0x7f0000001cc0)=@in={0x2, 0x0, @broadcast}, 0x80, &(0x7f0000000880)=[{&(0x7f0000001d40)=""/146, 0x92}, {&(0x7f0000001e00)=""/231, 0xe7}], 0x2, &(0x7f0000001f00)=""/239, 0xef}, 0x3}, {{&(0x7f0000002000)=@xdp, 0x80, &(0x7f00000020c0)=[{&(0x7f0000002080)=""/58, 0x3a}], 0x1, &(0x7f0000002100)=""/251, 0xfb}, 0x9}], 0x4, 0x40, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000002380)=ANY=[@ANYBLOB="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", @ANYRESDEC=r0, @ANYBLOB="b21b22b0b59f1a76abb6323c16886f3d2569d595dca4af1ac9160b24b62e47302e148fa17433c275945e36a713e5fad2e8abc9651d17b22d7d092020f73d100115fed606c66c84318df7895b1e5780f3c785bfb92571cf1bc9", @ANYRES32=0x0, @ANYRES32, @ANYRES32=0x0], &(0x7f0000000300)=0x18) r5 = socket(0x1, 0x803, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8936, &(0x7f0000000080)={@rand_addr=' \x01\x00', 0x44, r4}) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) r7 = socket(0x10, 0x8000000803, 0x0) sendmsg$nl_route(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000a00)=@newlink={0x74, 0x10, 0x401, 0x3001, 0x25dfdbfc, {0x0, 0x0, 0x0, 0x0, 0x534ad, 0x42a03}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x34, 0x2, 0x0, 0x1, [@IFLA_IPVLAN_MODE={0x6, 0x1, 0x2}, @IFLA_IPVLAN_FLAGS={0x6, 0x2, 0x2}, @IFLA_IPVLAN_FLAGS={0x6, 0x2, 0x1}, @IFLA_IPVLAN_FLAGS={0x6, 0x2, 0x2}, @IFLA_IPVLAN_FLAGS={0x6, 0x2, 0x3}, @IFLA_IPVLAN_MODE={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x74}}, 0x0) [ 541.198230][T21833] name failslab, interval 1, probability 0, space 0, times 0 18:12:32 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x200000000}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x9) 18:12:32 executing program 1: syz_mount_image$ntfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x1020, 0x0, &(0x7f00000000c0), 0x218400, &(0x7f00000013c0)) [ 541.331560][T21833] CPU: 1 PID: 21833 Comm: syz-executor.2 Not tainted 5.16.0-rc5-syzkaller #0 [ 541.340378][T21833] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 541.350453][T21833] Call Trace: [ 541.353749][T21833] [ 541.356694][T21833] dump_stack_lvl+0x201/0x2d8 [ 541.361397][T21833] ? show_regs_print_info+0x12/0x12 [ 541.366622][T21833] ? log_buf_vmcoreinfo_setup+0x498/0x498 [ 541.372373][T21833] ? __might_sleep+0xe0/0xe0 [ 541.376994][T21833] should_fail+0x384/0x4b0 [ 541.381430][T21833] ? __kernfs_new_node+0xdb/0x720 [ 541.386551][T21833] should_failslab+0x5/0x20 [ 541.391086][T21833] kmem_cache_alloc+0x72/0x310 [ 541.395925][T21833] __kernfs_new_node+0xdb/0x720 [ 541.400802][T21833] ? _raw_spin_unlock+0x40/0x40 [ 541.405683][T21833] ? _raw_spin_unlock+0x40/0x40 [ 541.410554][T21833] ? kernfs_new_node+0x160/0x160 [ 541.415514][T21833] ? __debug_object_init+0x830/0x1860 [ 541.420975][T21833] ? kobject_uevent_env+0x335/0x1700 [ 541.426259][T21833] ? do_raw_spin_unlock+0x134/0x8a0 [ 541.431473][T21833] kernfs_create_dir_ns+0x90/0x220 [ 541.436703][T21833] internal_create_group+0x290/0xed0 [ 541.442047][T21833] ? blk_cleanup_disk+0x80/0x80 [ 541.447154][T21833] ? sysfs_create_group+0x20/0x20 [ 541.452176][T21833] loop_configure+0xfd6/0x1740 [ 541.456976][T21833] lo_ioctl+0x7d4/0x1f40 [ 541.461241][T21833] ? lo_release+0x1f0/0x1f0 [ 541.465741][T21833] ? rcu_read_lock_sched_held+0x89/0x130 [ 541.471374][T21833] ? __bpf_trace_rcu_stall_warning+0x10/0x10 [ 541.477386][T21833] ? rcu_lock_release+0x5/0x20 [ 541.482155][T21833] ? __lock_acquire+0x2b00/0x2b00 [ 541.487204][T21833] ? stack_trace_save+0x1e0/0x1e0 [ 541.492226][T21833] ? stack_trace_save+0x1e0/0x1e0 [ 541.497287][T21833] ? is_bpf_text_address+0x253/0x270 [ 541.502688][T21833] ? stack_trace_save+0x1e0/0x1e0 [ 541.507709][T21833] ? kernel_text_address+0x9e/0xd0 [ 541.512819][T21833] ? __kernel_text_address+0x9/0x40 [ 541.518012][T21833] ? unwind_get_return_address+0x48/0x80 [ 541.523692][T21833] ? arch_stack_walk+0xf8/0x140 [ 541.528644][T21833] ? stack_trace_save+0x11b/0x1e0 [ 541.533674][T21833] ? stack_trace_snprint+0xe0/0xe0 [ 541.538798][T21833] ? rcu_read_lock_sched_held+0x89/0x130 [ 541.544456][T21833] ? kfree+0xe1/0x330 [ 541.548447][T21833] ? kasan_set_track+0x68/0x80 [ 541.553211][T21833] ? kasan_set_track+0x4c/0x80 [ 541.557972][T21833] ? kasan_set_free_info+0x1f/0x40 [ 541.563092][T21833] ? ____kasan_slab_free+0x10d/0x150 [ 541.568365][T21833] ? slab_free_freelist_hook+0x12e/0x1a0 [ 541.573985][T21833] ? kfree+0xe1/0x330 [ 541.577960][T21833] ? tomoyo_path_number_perm+0x5f1/0x7c0 [ 541.583686][T21833] ? security_file_ioctl+0x55/0xb0 [ 541.588792][T21833] ? __se_sys_ioctl+0x48/0x170 [ 541.593538][T21833] ? do_syscall_64+0x44/0xd0 [ 541.598128][T21833] ? entry_SYSCALL_64_after_hwframe+0x44/0xae [ 541.604219][T21833] ? rcu_read_lock_sched_held+0x89/0x130 [ 541.609853][T21833] ? __bpf_trace_rcu_stall_warning+0x10/0x10 [ 541.615893][T21833] ? lockdep_hardirqs_on_prepare+0x412/0x780 [ 541.621870][T21833] ? do_vfs_ioctl+0xcb2/0x2b90 [ 541.626747][T21833] ? blkdev_common_ioctl+0x702/0x2000 [ 541.632118][T21833] ? tomoyo_check_path_acl+0x1c0/0x1c0 [ 541.637570][T21833] ? blkdev_bszset+0x260/0x260 [ 541.642337][T21833] ? memset+0x1f/0x40 [ 541.646315][T21833] ? smack_file_ioctl+0x298/0x3a0 [ 541.651330][T21833] ? smack_file_alloc_security+0xd0/0xd0 [ 541.656953][T21833] ? lo_release+0x1f0/0x1f0 [ 541.661448][T21833] blkdev_ioctl+0x3ac/0x790 [ 541.666040][T21833] ? blkdev_compat_ptr_ioctl+0xd0/0xd0 [ 541.671487][T21833] ? bpf_lsm_file_ioctl+0x5/0x10 [ 541.676410][T21833] ? security_file_ioctl+0x9d/0xb0 [ 541.681510][T21833] ? blkdev_compat_ptr_ioctl+0xd0/0xd0 [ 541.686974][T21833] __se_sys_ioctl+0xfb/0x170 [ 541.691572][T21833] do_syscall_64+0x44/0xd0 [ 541.695987][T21833] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 541.701893][T21833] RIP: 0033:0x7f3831feec57 [ 541.706302][T21833] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 04 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 18:12:32 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x200000000}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 541.725919][T21833] RSP: 002b:00007f3830963f28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 541.734336][T21833] RAX: ffffffffffffffda RBX: 00007f38320389c8 RCX: 00007f3831feec57 [ 541.744307][T21833] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 541.752277][T21833] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007f38309641d0 [ 541.760239][T21833] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 541.768198][T21833] R13: 0000000000000004 R14: 00000000200000c0 R15: 0000000000000000 [ 541.776186][T21833] 18:12:33 executing program 5: r0 = syz_io_uring_setup(0x3ede, &(0x7f0000000240), &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) socket$l2tp6(0xa, 0x2, 0x73) openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/locks\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READ=@pass_buffer={0x16, 0x0, 0x0, @fd_index=0x5, 0xffffffffffffffff, &(0x7f0000000040)=""/17, 0x11}, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000002040)=[{{&(0x7f0000001380)=@in6={0xa, 0x0, 0x0, @private0}, 0x80, 0x0}}], 0x1, 0x0) io_uring_enter(r0, 0x26, 0x12, 0x0, 0x0, 0x0) 18:12:33 executing program 0: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$FS_IOC_RESVSP(r0, 0x402c5828, &(0x7f00000000c0)={0x0, 0x1, 0xa8f, 0x3078}) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x200000000}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x9) preadv(r1, &(0x7f0000000240)=[{&(0x7f0000000040)=""/94, 0x5e}, {&(0x7f00000000c0)=""/93, 0x5d}, {&(0x7f0000000140)=""/58, 0x3a}], 0x3, 0xd9f, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000002340)='./file0\x00', 0x0, 0x108) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000180)={'team0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @local}, 0x14) writev(r2, &(0x7f0000000280)=[{&(0x7f00000008c0)="110eaa1a9896d57019effc8c79961d0f73ccf3afca3754e2e7a31f536bcb7204bed59311e29c96e1c2b663d61e5b0c0a76ea50cbddaa69f578b8600f77cf1a538ac900673696245b6de4283c979a2eccd71f9583dacf650575d1398678895da32663735b4d0cabfe7e972e59c2b4b4c9c89d0b82ca2267ad5062303e8abcb79600010506702eb912e3957e507aec4e2180699a738f6753509a12282a1d7181887f6c2e03de1da0dfe3b4efbb10e9b59301b4ef8a1d", 0xb5}, {&(0x7f0000000980)="34c30d95766fefbb7bdc40a3242505587bbc8584c2bc2003185f5ce116eea020efa91e2aae1eae2b8e848ac13c3dcedbbbc82adb1e70be8eecedba37be82545f2abda4f0a0e0fd0edd6bd03bb8e9bb91c39a2c828511aef3e684ad4c21ec0c146b9570139e31cd", 0x67}], 0x2) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'macvtap0\x00'}) ioctl$PPPIOCSFLAGS1(0xffffffffffffffff, 0x40047459, &(0x7f00000001c0)) recvmmsg(0xffffffffffffffff, &(0x7f0000002200)=[{{&(0x7f0000000340)=@in={0x2, 0x0, @multicast1}, 0x80, &(0x7f0000000440)=[{&(0x7f00000004c0)=""/88, 0x58}, {&(0x7f0000000b40)=""/4096, 0x1000}], 0x2, &(0x7f0000000740)=""/192, 0xc0}, 0x3}, {{&(0x7f0000000800)=@sco={0x1f, @none}, 0x80, &(0x7f0000000480)=[{&(0x7f0000001b40)=""/82, 0x52}], 0x1, &(0x7f0000001bc0)=""/206, 0xce}, 0x7}, {{&(0x7f0000001cc0)=@in={0x2, 0x0, @broadcast}, 0x80, &(0x7f0000000880)=[{&(0x7f0000001d40)=""/146, 0x92}, {&(0x7f0000001e00)=""/231, 0xe7}], 0x2, &(0x7f0000001f00)=""/239, 0xef}, 0x3}, {{&(0x7f0000002000)=@xdp, 0x80, &(0x7f00000020c0)=[{&(0x7f0000002080)=""/58, 0x3a}], 0x1, &(0x7f0000002100)=""/251, 0xfb}, 0x9}], 0x4, 0x40, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000002380)=ANY=[@ANYBLOB="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", @ANYRESDEC=r0, @ANYBLOB="b21b22b0b59f1a76abb6323c16886f3d2569d595dca4af1ac9160b24b62e47302e148fa17433c275945e36a713e5fad2e8abc9651d17b22d7d092020f73d100115fed606c66c84318df7895b1e5780f3c785bfb92571cf1bc9", @ANYRES32=0x0, @ANYRES32, @ANYRES32=0x0], &(0x7f0000000300)=0x18) r5 = socket(0x1, 0x803, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8936, &(0x7f0000000080)={@rand_addr=' \x01\x00', 0x44, r4}) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) r7 = socket(0x10, 0x8000000803, 0x0) sendmsg$nl_route(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000a00)=@newlink={0x74, 0x10, 0x401, 0x3001, 0x25dfdbfc, {0x0, 0x0, 0x0, 0x0, 0x534ad, 0x42a03}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x34, 0x2, 0x0, 0x1, [@IFLA_IPVLAN_MODE={0x6, 0x1, 0x2}, @IFLA_IPVLAN_FLAGS={0x6, 0x2, 0x2}, @IFLA_IPVLAN_FLAGS={0x6, 0x2, 0x1}, @IFLA_IPVLAN_FLAGS={0x6, 0x2, 0x2}, @IFLA_IPVLAN_FLAGS={0x6, 0x2, 0x3}, @IFLA_IPVLAN_MODE={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x74}}, 0x0) 18:12:33 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x200000000}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) (fail_nth: 1) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 541.790174][T21839] 8021q: adding VLAN 0 to HW filter on device ipvlan2 [ 541.821510][T21848] loop1: detected capacity change from 0 to 8 [ 541.830972][T21833] ntfs: (device loop2): ntfs_fill_super(): Unable to determine device size. 18:12:33 executing program 5: r0 = syz_io_uring_setup(0x3ede, &(0x7f0000000240), &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) socket$l2tp6(0xa, 0x2, 0x73) openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/locks\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READ=@pass_buffer={0x16, 0x0, 0x0, @fd_index=0x5, 0xffffffffffffffff, &(0x7f0000000040)=""/17, 0x11}, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000002040)=[{{&(0x7f0000001380)=@in6={0xa, 0x0, 0x0, @private0}, 0x80, 0x0}}], 0x1, 0x0) io_uring_enter(r0, 0x26, 0x18, 0x0, 0x0, 0x0) [ 541.884670][T21851] FAULT_INJECTION: forcing a failure. [ 541.884670][T21851] name failslab, interval 1, probability 0, space 0, times 0 [ 541.914926][T21851] CPU: 1 PID: 21851 Comm: syz-executor.3 Not tainted 5.16.0-rc5-syzkaller #0 [ 541.923750][T21851] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 541.933832][T21851] Call Trace: [ 541.937136][T21851] [ 541.940084][T21851] dump_stack_lvl+0x201/0x2d8 [ 541.944805][T21851] ? show_regs_print_info+0x12/0x12 [ 541.950032][T21851] ? log_buf_vmcoreinfo_setup+0x498/0x498 [ 541.955789][T21851] ? __might_sleep+0xe0/0xe0 [ 541.960383][T21851] should_fail+0x384/0x4b0 [ 541.964794][T21851] ? getname_flags+0xba/0x650 [ 541.969462][T21851] should_failslab+0x5/0x20 [ 541.973960][T21851] kmem_cache_alloc+0x72/0x310 [ 541.978724][T21851] getname_flags+0xba/0x650 [ 541.983225][T21851] do_sys_openat2+0xd2/0x500 [ 541.987812][T21851] ? do_sys_open+0x220/0x220 [ 541.992426][T21851] __x64_sys_openat+0x243/0x290 [ 541.997280][T21851] ? __ia32_sys_open+0x270/0x270 [ 542.002206][T21851] ? syscall_enter_from_user_mode+0x2e/0x1b0 [ 542.008186][T21851] ? lockdep_hardirqs_on+0x95/0x140 [ 542.013377][T21851] ? syscall_enter_from_user_mode+0x2e/0x1b0 [ 542.019355][T21851] do_syscall_64+0x44/0xd0 [ 542.023800][T21851] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 542.029708][T21851] RIP: 0033:0x7fe9048fee99 [ 542.034120][T21851] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 542.053739][T21851] RSP: 002b:00007fe903274168 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 542.062149][T21851] RAX: ffffffffffffffda RBX: 00007fe904a11f60 RCX: 00007fe9048fee99 [ 542.070136][T21851] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 542.078126][T21851] RBP: 00007fe9032741d0 R08: 0000000000000000 R09: 0000000000000000 [ 542.086092][T21851] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 542.094150][T21851] R13: 00007fff8414a6af R14: 00007fe903274300 R15: 0000000000022000 [ 542.102133][T21851] 18:12:33 executing program 2: syz_mount_image$ntfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f00000013c0)={[{@fmask}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'syzkaller1\x00'}}]}) 18:12:33 executing program 0: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$FS_IOC_RESVSP(r0, 0x402c5828, &(0x7f00000000c0)={0x0, 0x1, 0xa8f, 0x3078}) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x200000000}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x9) preadv(r1, &(0x7f0000000240)=[{&(0x7f0000000040)=""/94, 0x5e}, {&(0x7f00000000c0)=""/93, 0x5d}, {&(0x7f0000000140)=""/58, 0x3a}], 0x3, 0xd9f, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000002340)='./file0\x00', 0x0, 0x108) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000180)={'team0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @local}, 0x14) writev(r2, &(0x7f0000000280)=[{&(0x7f00000008c0)="110eaa1a9896d57019effc8c79961d0f73ccf3afca3754e2e7a31f536bcb7204bed59311e29c96e1c2b663d61e5b0c0a76ea50cbddaa69f578b8600f77cf1a538ac900673696245b6de4283c979a2eccd71f9583dacf650575d1398678895da32663735b4d0cabfe7e972e59c2b4b4c9c89d0b82ca2267ad5062303e8abcb79600010506702eb912e3957e507aec4e2180699a738f6753509a12282a1d7181887f6c2e03de1da0dfe3b4efbb10e9b59301b4ef8a1d", 0xb5}, {&(0x7f0000000980)="34c30d95766fefbb7bdc40a3242505587bbc8584c2bc2003185f5ce116eea020efa91e2aae1eae2b8e848ac13c3dcedbbbc82adb1e70be8eecedba37be82545f2abda4f0a0e0fd0edd6bd03bb8e9bb91c39a2c828511aef3e684ad4c21ec0c146b9570139e31cd", 0x67}], 0x2) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'macvtap0\x00'}) ioctl$PPPIOCSFLAGS1(0xffffffffffffffff, 0x40047459, &(0x7f00000001c0)) recvmmsg(0xffffffffffffffff, &(0x7f0000002200)=[{{&(0x7f0000000340)=@in={0x2, 0x0, @multicast1}, 0x80, &(0x7f0000000440)=[{&(0x7f00000004c0)=""/88, 0x58}, {&(0x7f0000000b40)=""/4096, 0x1000}], 0x2, &(0x7f0000000740)=""/192, 0xc0}, 0x3}, {{&(0x7f0000000800)=@sco={0x1f, @none}, 0x80, &(0x7f0000000480)=[{&(0x7f0000001b40)=""/82, 0x52}], 0x1, &(0x7f0000001bc0)=""/206, 0xce}, 0x7}, {{&(0x7f0000001cc0)=@in={0x2, 0x0, @broadcast}, 0x80, &(0x7f0000000880)=[{&(0x7f0000001d40)=""/146, 0x92}, {&(0x7f0000001e00)=""/231, 0xe7}], 0x2, &(0x7f0000001f00)=""/239, 0xef}, 0x3}, {{&(0x7f0000002000)=@xdp, 0x80, &(0x7f00000020c0)=[{&(0x7f0000002080)=""/58, 0x3a}], 0x1, &(0x7f0000002100)=""/251, 0xfb}, 0x9}], 0x4, 0x40, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000002380)=ANY=[@ANYBLOB="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", @ANYRESDEC=r0, @ANYBLOB="b21b22b0b59f1a76abb6323c16886f3d2569d595dca4af1ac9160b24b62e47302e148fa17433c275945e36a713e5fad2e8abc9651d17b22d7d092020f73d100115fed606c66c84318df7895b1e5780f3c785bfb92571cf1bc9", @ANYRES32=0x0, @ANYRES32, @ANYRES32=0x0], &(0x7f0000000300)=0x18) r5 = socket(0x1, 0x803, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8936, &(0x7f0000000080)={@rand_addr=' \x01\x00', 0x44, r4}) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) r7 = socket(0x10, 0x8000000803, 0x0) sendmsg$nl_route(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000a00)=@newlink={0x7c, 0x10, 0x401, 0x3001, 0x25dfdbfc, {0x0, 0x0, 0x0, 0x0, 0x534ad, 0x42a03}, [@IFLA_LINKINFO={0x4c, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x3c, 0x2, 0x0, 0x1, [@IFLA_IPVLAN_MODE={0x6, 0x1, 0x2}, @IFLA_IPVLAN_FLAGS={0x6, 0x2, 0x2}, @IFLA_IPVLAN_FLAGS={0x6, 0x2, 0x1}, @IFLA_IPVLAN_FLAGS={0x6, 0x2, 0x2}, @IFLA_IPVLAN_FLAGS={0x6, 0x2, 0x3}, @IFLA_IPVLAN_MODE={0x6}, @IFLA_IPVLAN_FLAGS={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x7c}}, 0x0) 18:12:33 executing program 5: r0 = syz_io_uring_setup(0x3ede, &(0x7f0000000240), &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) socket$l2tp6(0xa, 0x2, 0x73) openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/locks\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READ=@pass_buffer={0x16, 0x0, 0x0, @fd_index=0x5, 0xffffffffffffffff, &(0x7f0000000040)=""/17, 0x11}, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000002040)=[{{&(0x7f0000001380)=@in6={0xa, 0x0, 0x0, @private0}, 0x80, 0x0}}], 0x1, 0x0) io_uring_enter(r0, 0x26, 0x25, 0x0, 0x0, 0x0) 18:12:33 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="b4050000000000006110580000000000c60000000000000095000002000000002ac73fe427abdf478e0357f2d32986f50b892b5007921cd48fe43b23be60a2dbc9778bb665510e3e22fcb26adfdc05e55a4933e62a23abb4baca4ec89323257db59db5eeda384459dd00d41b6aab85df5cab39e726769e2291b626d120a9247579f0b8edd8f16683e0623366ac632c24921d21534237743354f09cc29be2f72dfa8b05320110bcea53bb038c"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x5, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) (fail_nth: 1) 18:12:33 executing program 1: syz_mount_image$ntfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x1100, 0x0, &(0x7f00000000c0), 0x218400, &(0x7f00000013c0)) 18:12:33 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x200000000}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) (fail_nth: 2) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) 18:12:33 executing program 5: r0 = syz_io_uring_setup(0x3ede, &(0x7f0000000240), &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) socket$l2tp6(0xa, 0x2, 0x73) openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/locks\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READ=@pass_buffer={0x16, 0x0, 0x0, @fd_index=0x5, 0xffffffffffffffff, &(0x7f0000000040)=""/17, 0x11}, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000002040)=[{{&(0x7f0000001380)=@in6={0xa, 0x0, 0x0, @private0}, 0x80, 0x0}}], 0x1, 0x0) io_uring_enter(r0, 0x26, 0x41, 0x0, 0x0, 0x0) [ 542.239649][T21860] FAULT_INJECTION: forcing a failure. [ 542.239649][T21860] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 542.266521][T21862] ntfs: (device loop2): ntfs_fill_super(): Unable to determine device size. [ 542.267328][T21861] 8021q: adding VLAN 0 to HW filter on device ipvlan32 [ 542.299459][T21865] loop1: detected capacity change from 0 to 8 [ 542.315846][T21866] FAULT_INJECTION: forcing a failure. [ 542.315846][T21866] name fail_usercopy, interval 1, probability 0, space 0, times 0 18:12:33 executing program 2: syz_mount_image$ntfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x2, 0x0, &(0x7f00000000c0), 0x0, &(0x7f00000013c0)={[{@fmask}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'syzkaller1\x00'}}]}) [ 542.346592][T21861] team0: Device ipvlan32 is already an upper device of the team interface [ 542.388734][T21860] CPU: 1 PID: 21860 Comm: syz-executor.4 Not tainted 5.16.0-rc5-syzkaller #0 [ 542.397560][T21860] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 542.407638][T21860] Call Trace: [ 542.410926][T21860] [ 542.413868][T21860] dump_stack_lvl+0x201/0x2d8 [ 542.418579][T21860] ? show_regs_print_info+0x12/0x12 [ 542.423807][T21860] ? log_buf_vmcoreinfo_setup+0x498/0x498 [ 542.429635][T21860] ? __might_fault+0xb6/0x110 [ 542.434339][T21860] ? __lock_acquire+0x1382/0x2b00 [ 542.439426][T21860] should_fail+0x384/0x4b0 [ 542.443865][T21860] _copy_from_user+0x2d/0x170 [ 542.448564][T21860] __sys_bpf+0x2b0/0x12d90 [ 542.453031][T21860] ? reacquire_held_locks+0x620/0x620 [ 542.458421][T21860] ? mark_lock+0x191/0x1e00 [ 542.462946][T21860] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 542.468770][T21860] ? __bpf_trace_rcu_stall_warning+0x10/0x10 [ 542.474772][T21860] ? __print_lock_name+0x1d0/0x1d0 [ 542.479906][T21860] ? __print_lock_name+0x1d0/0x1d0 [ 542.485047][T21860] ? rcu_read_lock_sched_held+0x89/0x130 [ 542.490960][T21860] ? __bpf_trace_rcu_stall_warning+0x10/0x10 [ 542.496973][T21860] ? rcu_read_lock_sched_held+0x89/0x130 [ 542.502621][T21860] ? __bpf_trace_rcu_stall_warning+0x10/0x10 [ 542.508622][T21860] ? __lock_acquire+0x1382/0x2b00 [ 542.513693][T21860] ? rcu_read_lock_sched_held+0x89/0x130 [ 542.519342][T21860] ? __bpf_trace_rcu_stall_warning+0x10/0x10 [ 542.525359][T21860] ? __context_tracking_exit+0x7a/0xd0 [ 542.530831][T21860] ? __lock_acquire+0x2b00/0x2b00 [ 542.535898][T21860] ? lockdep_hardirqs_on+0x95/0x140 [ 542.541207][T21860] __x64_sys_bpf+0x78/0x90 [ 542.545632][T21860] do_syscall_64+0x44/0xd0 [ 542.550066][T21860] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 542.556062][T21860] RIP: 0033:0x7f9aa6167e99 [ 542.560490][T21860] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 542.580108][T21860] RSP: 002b:00007f9aa4add168 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 542.588536][T21860] RAX: ffffffffffffffda RBX: 00007f9aa627af60 RCX: 00007f9aa6167e99 [ 542.596513][T21860] RDX: 0000000000000020 RSI: 0000000020000200 RDI: 0000000000000002 [ 542.604584][T21860] RBP: 00007f9aa4add1d0 R08: 0000000000000000 R09: 0000000000000000 [ 542.612556][T21860] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 542.620531][T21860] R13: 00007ffe4eb4321f R14: 00007f9aa4add300 R15: 0000000000022000 [ 542.628530][T21860] [ 542.631554][T21866] CPU: 0 PID: 21866 Comm: syz-executor.3 Not tainted 5.16.0-rc5-syzkaller #0 [ 542.640335][T21866] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 542.650390][T21866] Call Trace: [ 542.653669][T21866] [ 542.656595][T21866] dump_stack_lvl+0x201/0x2d8 [ 542.661279][T21866] ? show_regs_print_info+0x12/0x12 [ 542.666480][T21866] ? log_buf_vmcoreinfo_setup+0x498/0x498 [ 542.672196][T21866] ? __might_fault+0xb6/0x110 [ 542.676874][T21866] ? rcu_read_lock_sched_held+0x89/0x130 [ 542.682536][T21866] should_fail+0x384/0x4b0 [ 542.686955][T21866] strncpy_from_user+0x32/0x350 [ 542.691805][T21866] getname_flags+0xf0/0x650 [ 542.696315][T21866] do_sys_openat2+0xd2/0x500 [ 542.700908][T21866] ? do_sys_open+0x220/0x220 [ 542.705512][T21866] __x64_sys_openat+0x243/0x290 [ 542.710363][T21866] ? __ia32_sys_open+0x270/0x270 [ 542.715302][T21866] ? syscall_enter_from_user_mode+0x2e/0x1b0 [ 542.721278][T21866] ? lockdep_hardirqs_on+0x95/0x140 [ 542.726473][T21866] ? syscall_enter_from_user_mode+0x2e/0x1b0 [ 542.732461][T21866] do_syscall_64+0x44/0xd0 [ 542.736880][T21866] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 542.742766][T21866] RIP: 0033:0x7fe9048fee99 [ 542.747180][T21866] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 542.766867][T21866] RSP: 002b:00007fe903274168 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 542.775278][T21866] RAX: ffffffffffffffda RBX: 00007fe904a11f60 RCX: 00007fe9048fee99 [ 542.783245][T21866] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 542.791206][T21866] RBP: 00007fe9032741d0 R08: 0000000000000000 R09: 0000000000000000 [ 542.799175][T21866] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 542.807138][T21866] R13: 00007fff8414a6af R14: 00007fe903274300 R15: 0000000000022000 [ 542.815129][T21866] 18:12:34 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="b4050000000000006110580000000000c60000000000000095000002000000002ac73fe427abdf478e0357f2d32986f50b892b5007921cd48fe43b23be60a2dbc9778bb665510e3e22fcb26adfdc05e55a4933e62a23abb4baca4ec89323257db59db5eeda384459dd00d41b6aab85df5cab39e726769e2291b626d120a9247579f0b8edd8f16683e0623366ac632c24921d21534237743354f09cc29be2f72dfa8b05320110bcea53bb038c"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x5, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) (fail_nth: 2) 18:12:34 executing program 5: r0 = syz_io_uring_setup(0x3ede, &(0x7f0000000240), &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) socket$l2tp6(0xa, 0x2, 0x73) openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/locks\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READ=@pass_buffer={0x16, 0x0, 0x0, @fd_index=0x5, 0xffffffffffffffff, &(0x7f0000000040)=""/17, 0x11}, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000002040)=[{{&(0x7f0000001380)=@in6={0xa, 0x0, 0x0, @private0}, 0x80, 0x0}}], 0x1, 0x0) io_uring_enter(r0, 0x26, 0x42, 0x0, 0x0, 0x0) [ 542.881803][T21871] ntfs: (device loop2): ntfs_fill_super(): Unable to determine device size. 18:12:34 executing program 0: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$FS_IOC_RESVSP(r0, 0x402c5828, &(0x7f00000000c0)={0x0, 0x1, 0xa8f, 0x3078}) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x200000000}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x9) preadv(r1, &(0x7f0000000240)=[{&(0x7f0000000040)=""/94, 0x5e}, {&(0x7f00000000c0)=""/93, 0x5d}, {&(0x7f0000000140)=""/58, 0x3a}], 0x3, 0xd9f, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000002340)='./file0\x00', 0x0, 0x108) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000180)={'team0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @local}, 0x14) writev(r2, &(0x7f0000000280)=[{&(0x7f00000008c0)="110eaa1a9896d57019effc8c79961d0f73ccf3afca3754e2e7a31f536bcb7204bed59311e29c96e1c2b663d61e5b0c0a76ea50cbddaa69f578b8600f77cf1a538ac900673696245b6de4283c979a2eccd71f9583dacf650575d1398678895da32663735b4d0cabfe7e972e59c2b4b4c9c89d0b82ca2267ad5062303e8abcb79600010506702eb912e3957e507aec4e2180699a738f6753509a12282a1d7181887f6c2e03de1da0dfe3b4efbb10e9b59301b4ef8a1d", 0xb5}, {&(0x7f0000000980)="34c30d95766fefbb7bdc40a3242505587bbc8584c2bc2003185f5ce116eea020efa91e2aae1eae2b8e848ac13c3dcedbbbc82adb1e70be8eecedba37be82545f2abda4f0a0e0fd0edd6bd03bb8e9bb91c39a2c828511aef3e684ad4c21ec0c146b9570139e31cd", 0x67}], 0x2) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'macvtap0\x00'}) ioctl$PPPIOCSFLAGS1(0xffffffffffffffff, 0x40047459, &(0x7f00000001c0)) recvmmsg(0xffffffffffffffff, &(0x7f0000002200)=[{{&(0x7f0000000340)=@in={0x2, 0x0, @multicast1}, 0x80, &(0x7f0000000440)=[{&(0x7f00000004c0)=""/88, 0x58}, {&(0x7f0000000b40)=""/4096, 0x1000}], 0x2, &(0x7f0000000740)=""/192, 0xc0}, 0x3}, {{&(0x7f0000000800)=@sco={0x1f, @none}, 0x80, &(0x7f0000000480)=[{&(0x7f0000001b40)=""/82, 0x52}], 0x1, &(0x7f0000001bc0)=""/206, 0xce}, 0x7}, {{&(0x7f0000001cc0)=@in={0x2, 0x0, @broadcast}, 0x80, &(0x7f0000000880)=[{&(0x7f0000001d40)=""/146, 0x92}, {&(0x7f0000001e00)=""/231, 0xe7}], 0x2, &(0x7f0000001f00)=""/239, 0xef}, 0x3}, {{&(0x7f0000002000)=@xdp, 0x80, &(0x7f00000020c0)=[{&(0x7f0000002080)=""/58, 0x3a}], 0x1, &(0x7f0000002100)=""/251, 0xfb}, 0x9}], 0x4, 0x40, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000002380)=ANY=[@ANYBLOB="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", @ANYRESDEC=r0, @ANYBLOB="b21b22b0b59f1a76abb6323c16886f3d2569d595dca4af1ac9160b24b62e47302e148fa17433c275945e36a713e5fad2e8abc9651d17b22d7d092020f73d100115fed606c66c84318df7895b1e5780f3c785bfb92571cf1bc9", @ANYRES32=0x0, @ANYRES32, @ANYRES32=0x0], &(0x7f0000000300)=0x18) r5 = socket(0x1, 0x803, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8936, &(0x7f0000000080)={@rand_addr=' \x01\x00', 0x44, r4}) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) r7 = socket(0x10, 0x8000000803, 0x0) sendmsg$nl_route(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000a00)=@newlink={0x7c, 0x10, 0x401, 0x3001, 0x25dfdbfc, {0x0, 0x0, 0x0, 0x0, 0x534ad, 0x42a03}, [@IFLA_LINKINFO={0x4c, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x3c, 0x2, 0x0, 0x1, [@IFLA_IPVLAN_MODE={0x6, 0x1, 0x2}, @IFLA_IPVLAN_FLAGS={0x6, 0x2, 0x2}, @IFLA_IPVLAN_FLAGS={0x6, 0x2, 0x1}, @IFLA_IPVLAN_FLAGS={0x6, 0x2, 0x2}, @IFLA_IPVLAN_FLAGS={0x6, 0x2, 0x3}, @IFLA_IPVLAN_MODE={0x6}, @IFLA_IPVLAN_FLAGS={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x7c}}, 0x0) 18:12:34 executing program 2: syz_mount_image$ntfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x3, 0x0, &(0x7f00000000c0), 0x0, &(0x7f00000013c0)={[{@fmask}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'syzkaller1\x00'}}]}) 18:12:34 executing program 1: syz_mount_image$ntfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x1200, 0x0, &(0x7f00000000c0), 0x218400, &(0x7f00000013c0)) [ 542.994385][T21878] FAULT_INJECTION: forcing a failure. [ 542.994385][T21878] name failslab, interval 1, probability 0, space 0, times 0 [ 543.060128][T21877] 8021q: adding VLAN 0 to HW filter on device ipvlan32 [ 543.080182][T21878] CPU: 0 PID: 21878 Comm: syz-executor.4 Not tainted 5.16.0-rc5-syzkaller #0 [ 543.088204][T21881] loop1: detected capacity change from 0 to 9 [ 543.088991][T21878] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 543.089007][T21878] Call Trace: [ 543.089016][T21878] [ 543.089025][T21878] dump_stack_lvl+0x201/0x2d8 [ 543.089058][T21878] ? show_regs_print_info+0x12/0x12 [ 543.121207][T21878] ? log_buf_vmcoreinfo_setup+0x498/0x498 [ 543.126938][T21878] ? __might_sleep+0xe0/0xe0 [ 543.131705][T21878] should_fail+0x384/0x4b0 [ 543.136125][T21878] ? kvmalloc_node+0x81/0x110 [ 543.140809][T21878] should_failslab+0x5/0x20 [ 543.145319][T21878] __kmalloc_node+0x97/0x420 [ 543.149927][T21878] kvmalloc_node+0x81/0x110 [ 543.154439][T21878] __sys_bpf+0x481b/0x12d90 [ 543.158955][T21878] ? reacquire_held_locks+0x620/0x620 [ 543.164321][T21878] ? mark_lock+0x191/0x1e00 [ 543.168821][T21878] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 543.174219][T21878] ? __bpf_trace_rcu_stall_warning+0x10/0x10 [ 543.180193][T21878] ? __print_lock_name+0x1d0/0x1d0 [ 543.185296][T21878] ? __print_lock_name+0x1d0/0x1d0 [ 543.190404][T21878] ? rcu_read_lock_sched_held+0x89/0x130 [ 543.196045][T21878] ? __bpf_trace_rcu_stall_warning+0x10/0x10 [ 543.202031][T21878] ? rcu_read_lock_sched_held+0x89/0x130 [ 543.207659][T21878] ? __bpf_trace_rcu_stall_warning+0x10/0x10 [ 543.213724][T21878] ? __lock_acquire+0x1382/0x2b00 [ 543.218776][T21878] ? rcu_read_lock_sched_held+0x89/0x130 [ 543.224401][T21878] ? __bpf_trace_rcu_stall_warning+0x10/0x10 [ 543.230401][T21878] ? __context_tracking_exit+0x7a/0xd0 [ 543.235856][T21878] ? __lock_acquire+0x2b00/0x2b00 [ 543.240917][T21878] ? lockdep_hardirqs_on+0x95/0x140 [ 543.246125][T21878] __x64_sys_bpf+0x78/0x90 [ 543.250547][T21878] do_syscall_64+0x44/0xd0 [ 543.254982][T21878] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 543.260874][T21878] RIP: 0033:0x7f9aa6167e99 [ 543.265282][T21878] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 543.284880][T21878] RSP: 002b:00007f9aa4abc168 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 543.293284][T21878] RAX: ffffffffffffffda RBX: 00007f9aa627b030 RCX: 00007f9aa6167e99 [ 543.301250][T21878] RDX: 0000000000000020 RSI: 0000000020000200 RDI: 0000000000000002 [ 543.309210][T21878] RBP: 00007f9aa4abc1d0 R08: 0000000000000000 R09: 0000000000000000 [ 543.317184][T21878] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 543.325180][T21878] R13: 00007ffe4eb4321f R14: 00007f9aa4abc300 R15: 0000000000022000 [ 543.333174][T21878] 18:12:34 executing program 5: r0 = syz_io_uring_setup(0x3ede, &(0x7f0000000240), &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) socket$l2tp6(0xa, 0x2, 0x73) openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/locks\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READ=@pass_buffer={0x16, 0x0, 0x0, @fd_index=0x5, 0xffffffffffffffff, &(0x7f0000000040)=""/17, 0x11}, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000002040)=[{{&(0x7f0000001380)=@in6={0xa, 0x0, 0x0, @private0}, 0x80, 0x0}}], 0x1, 0x0) io_uring_enter(r0, 0x26, 0x48, 0x0, 0x0, 0x0) 18:12:34 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x200000000}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) (fail_nth: 3) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 543.356464][T21877] team0: Device ipvlan32 is already an upper device of the team interface 18:12:34 executing program 1: syz_mount_image$ntfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x1503, 0x0, &(0x7f00000000c0), 0x218400, &(0x7f00000013c0)) [ 543.419238][T21882] ntfs: (device loop2): ntfs_fill_super(): Unable to determine device size. [ 543.467050][T21886] FAULT_INJECTION: forcing a failure. [ 543.467050][T21886] name failslab, interval 1, probability 0, space 0, times 0 [ 543.523365][T21888] loop1: detected capacity change from 0 to 10 [ 543.523468][T21886] CPU: 0 PID: 21886 Comm: syz-executor.3 Not tainted 5.16.0-rc5-syzkaller #0 [ 543.538334][T21886] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 543.548427][T21886] Call Trace: [ 543.551726][T21886] [ 543.554675][T21886] dump_stack_lvl+0x201/0x2d8 [ 543.559393][T21886] ? show_regs_print_info+0x12/0x12 [ 543.564663][T21886] ? log_buf_vmcoreinfo_setup+0x498/0x498 18:12:35 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="b4050000000000006110580000000000c60000000000000095000002000000002ac73fe427abdf478e0357f2d32986f50b892b5007921cd48fe43b23be60a2dbc9778bb665510e3e22fcb26adfdc05e55a4933e62a23abb4baca4ec89323257db59db5eeda384459dd00d41b6aab85df5cab39e726769e2291b626d120a9247579f0b8edd8f16683e0623366ac632c24921d21534237743354f09cc29be2f72dfa8b05320110bcea53bb038c"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x5, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) (fail_nth: 3) 18:12:35 executing program 2: syz_mount_image$ntfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x4, 0x0, &(0x7f00000000c0), 0x0, &(0x7f00000013c0)={[{@fmask}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'syzkaller1\x00'}}]}) [ 543.570460][T21886] ? __might_sleep+0xe0/0xe0 [ 543.575182][T21886] should_fail+0x384/0x4b0 [ 543.579628][T21886] ? __alloc_file+0x26/0x2f0 [ 543.584242][T21886] should_failslab+0x5/0x20 [ 543.588763][T21886] kmem_cache_alloc+0x72/0x310 [ 543.593573][T21886] __alloc_file+0x26/0x2f0 [ 543.598008][T21886] ? alloc_empty_file+0x49/0x1b0 [ 543.603009][T21886] alloc_empty_file+0xa9/0x1b0 [ 543.607808][T21886] path_openat+0x111/0x3660 [ 543.612454][T21886] ? perf_trace_run_bpf_submit+0xf6/0x1d0 [ 543.618305][T21886] ? do_filp_open+0x4f0/0x4f0 [ 543.623201][T21886] ? rcu_read_lock_sched_held+0x89/0x130 [ 543.628860][T21886] ? __bpf_trace_rcu_stall_warning+0x10/0x10 [ 543.634870][T21886] do_filp_open+0x277/0x4f0 [ 543.639395][T21886] ? vfs_tmpfile+0x230/0x230 [ 543.643989][T21886] ? alloc_fd+0x5e1/0x680 [ 543.648348][T21886] ? _raw_spin_unlock+0x24/0x40 [ 543.653201][T21886] ? alloc_fd+0x5e1/0x680 [ 543.657546][T21886] do_sys_openat2+0x13b/0x500 [ 543.662230][T21886] ? do_sys_open+0x220/0x220 [ 543.666836][T21886] __x64_sys_openat+0x243/0x290 [ 543.671686][T21886] ? __ia32_sys_open+0x270/0x270 [ 543.676628][T21886] ? syscall_enter_from_user_mode+0x2e/0x1b0 [ 543.682614][T21886] ? lockdep_hardirqs_on+0x95/0x140 [ 543.687812][T21886] ? syscall_enter_from_user_mode+0x2e/0x1b0 [ 543.693810][T21886] do_syscall_64+0x44/0xd0 [ 543.698236][T21886] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 543.704146][T21886] RIP: 0033:0x7fe9048fee99 [ 543.708577][T21886] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 543.728181][T21886] RSP: 002b:00007fe903274168 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 543.736682][T21886] RAX: ffffffffffffffda RBX: 00007fe904a11f60 RCX: 00007fe9048fee99 [ 543.744651][T21886] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 543.752636][T21886] RBP: 00007fe9032741d0 R08: 0000000000000000 R09: 0000000000000000 [ 543.760607][T21886] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 18:12:35 executing program 5: r0 = syz_io_uring_setup(0x3ede, &(0x7f0000000240), &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) socket$l2tp6(0xa, 0x2, 0x73) openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/locks\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READ=@pass_buffer={0x16, 0x0, 0x0, @fd_index=0x5, 0xffffffffffffffff, &(0x7f0000000040)=""/17, 0x11}, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000002040)=[{{&(0x7f0000001380)=@in6={0xa, 0x0, 0x0, @private0}, 0x80, 0x0}}], 0x1, 0x0) io_uring_enter(r0, 0x26, 0x4c, 0x0, 0x0, 0x0) [ 543.768577][T21886] R13: 00007fff8414a6af R14: 00007fe903274300 R15: 0000000000022000 [ 543.776593][T21886] 18:12:35 executing program 0: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$FS_IOC_RESVSP(r0, 0x402c5828, &(0x7f00000000c0)={0x0, 0x1, 0xa8f, 0x3078}) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x200000000}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x9) preadv(r1, &(0x7f0000000240)=[{&(0x7f0000000040)=""/94, 0x5e}, {&(0x7f00000000c0)=""/93, 0x5d}, {&(0x7f0000000140)=""/58, 0x3a}], 0x3, 0xd9f, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000002340)='./file0\x00', 0x0, 0x108) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000180)={'team0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @local}, 0x14) writev(r2, &(0x7f0000000280)=[{&(0x7f00000008c0)="110eaa1a9896d57019effc8c79961d0f73ccf3afca3754e2e7a31f536bcb7204bed59311e29c96e1c2b663d61e5b0c0a76ea50cbddaa69f578b8600f77cf1a538ac900673696245b6de4283c979a2eccd71f9583dacf650575d1398678895da32663735b4d0cabfe7e972e59c2b4b4c9c89d0b82ca2267ad5062303e8abcb79600010506702eb912e3957e507aec4e2180699a738f6753509a12282a1d7181887f6c2e03de1da0dfe3b4efbb10e9b59301b4ef8a1d", 0xb5}, {&(0x7f0000000980)="34c30d95766fefbb7bdc40a3242505587bbc8584c2bc2003185f5ce116eea020efa91e2aae1eae2b8e848ac13c3dcedbbbc82adb1e70be8eecedba37be82545f2abda4f0a0e0fd0edd6bd03bb8e9bb91c39a2c828511aef3e684ad4c21ec0c146b9570139e31cd", 0x67}], 0x2) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'macvtap0\x00'}) ioctl$PPPIOCSFLAGS1(0xffffffffffffffff, 0x40047459, &(0x7f00000001c0)) recvmmsg(0xffffffffffffffff, &(0x7f0000002200)=[{{&(0x7f0000000340)=@in={0x2, 0x0, @multicast1}, 0x80, &(0x7f0000000440)=[{&(0x7f00000004c0)=""/88, 0x58}, {&(0x7f0000000b40)=""/4096, 0x1000}], 0x2, &(0x7f0000000740)=""/192, 0xc0}, 0x3}, {{&(0x7f0000000800)=@sco={0x1f, @none}, 0x80, &(0x7f0000000480)=[{&(0x7f0000001b40)=""/82, 0x52}], 0x1, &(0x7f0000001bc0)=""/206, 0xce}, 0x7}, {{&(0x7f0000001cc0)=@in={0x2, 0x0, @broadcast}, 0x80, &(0x7f0000000880)=[{&(0x7f0000001d40)=""/146, 0x92}, {&(0x7f0000001e00)=""/231, 0xe7}], 0x2, &(0x7f0000001f00)=""/239, 0xef}, 0x3}, {{&(0x7f0000002000)=@xdp, 0x80, &(0x7f00000020c0)=[{&(0x7f0000002080)=""/58, 0x3a}], 0x1, &(0x7f0000002100)=""/251, 0xfb}, 0x9}], 0x4, 0x40, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000002380)=ANY=[@ANYBLOB="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", @ANYRESDEC=r0, @ANYBLOB="b21b22b0b59f1a76abb6323c16886f3d2569d595dca4af1ac9160b24b62e47302e148fa17433c275945e36a713e5fad2e8abc9651d17b22d7d092020f73d100115fed606c66c84318df7895b1e5780f3c785bfb92571cf1bc9", @ANYRES32=0x0, @ANYRES32, @ANYRES32=0x0], &(0x7f0000000300)=0x18) r5 = socket(0x1, 0x803, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8936, &(0x7f0000000080)={@rand_addr=' \x01\x00', 0x44, r4}) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) r7 = socket(0x10, 0x8000000803, 0x0) sendmsg$nl_route(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000a00)=@newlink={0x7c, 0x10, 0x401, 0x3001, 0x25dfdbfc, {0x0, 0x0, 0x0, 0x0, 0x534ad, 0x42a03}, [@IFLA_LINKINFO={0x4c, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x3c, 0x2, 0x0, 0x1, [@IFLA_IPVLAN_MODE={0x6, 0x1, 0x2}, @IFLA_IPVLAN_FLAGS={0x6, 0x2, 0x2}, @IFLA_IPVLAN_FLAGS={0x6, 0x2, 0x1}, @IFLA_IPVLAN_FLAGS={0x6, 0x2, 0x2}, @IFLA_IPVLAN_FLAGS={0x6, 0x2, 0x3}, @IFLA_IPVLAN_MODE={0x6}, @IFLA_IPVLAN_FLAGS={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x7c}}, 0x0) [ 543.802737][T21893] ntfs: (device loop2): ntfs_fill_super(): Unable to determine device size. [ 543.824462][T21891] FAULT_INJECTION: forcing a failure. [ 543.824462][T21891] name fail_usercopy, interval 1, probability 0, space 0, times 0 18:12:35 executing program 1: syz_mount_image$ntfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x1800, 0x0, &(0x7f00000000c0), 0x218400, &(0x7f00000013c0)) 18:12:35 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x200000000}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) (fail_nth: 4) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) 18:12:35 executing program 5: r0 = syz_io_uring_setup(0x3ede, &(0x7f0000000240), &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) socket$l2tp6(0xa, 0x2, 0x73) openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/locks\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READ=@pass_buffer={0x16, 0x0, 0x0, @fd_index=0x5, 0xffffffffffffffff, &(0x7f0000000040)=""/17, 0x11}, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000002040)=[{{&(0x7f0000001380)=@in6={0xa, 0x0, 0x0, @private0}, 0x80, 0x0}}], 0x1, 0x0) io_uring_enter(r0, 0x26, 0x68, 0x0, 0x0, 0x0) 18:12:35 executing program 2: syz_mount_image$ntfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x5, 0x0, &(0x7f00000000c0), 0x0, &(0x7f00000013c0)={[{@fmask}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'syzkaller1\x00'}}]}) [ 543.978203][T21897] 8021q: adding VLAN 0 to HW filter on device ipvlan32 [ 543.980034][T21902] FAULT_INJECTION: forcing a failure. [ 543.980034][T21902] name failslab, interval 1, probability 0, space 0, times 0 [ 543.994350][T21897] team0: Device ipvlan32 is already an upper device of the team interface [ 544.002521][T21901] ntfs: (device loop2): ntfs_fill_super(): Unable to determine device size. [ 544.015565][T21904] loop1: detected capacity change from 0 to 12 [ 544.042301][T21902] CPU: 1 PID: 21902 Comm: syz-executor.3 Not tainted 5.16.0-rc5-syzkaller #0 [ 544.051135][T21902] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 544.061226][T21902] Call Trace: [ 544.064564][T21902] [ 544.067518][T21902] dump_stack_lvl+0x201/0x2d8 [ 544.072233][T21902] ? show_regs_print_info+0x12/0x12 [ 544.077459][T21902] ? log_buf_vmcoreinfo_setup+0x498/0x498 [ 544.083203][T21902] ? __might_sleep+0xe0/0xe0 [ 544.087827][T21902] should_fail+0x384/0x4b0 [ 544.092369][T21902] ? security_file_alloc+0x32/0x1f0 [ 544.097583][T21902] should_failslab+0x5/0x20 [ 544.102097][T21902] kmem_cache_alloc+0x72/0x310 [ 544.106888][T21902] security_file_alloc+0x32/0x1f0 [ 544.111934][T21902] __alloc_file+0xca/0x2f0 [ 544.116378][T21902] alloc_empty_file+0xa9/0x1b0 [ 544.121250][T21902] path_openat+0x111/0x3660 [ 544.125784][T21902] ? perf_trace_run_bpf_submit+0xf6/0x1d0 [ 544.131540][T21902] ? do_filp_open+0x4f0/0x4f0 [ 544.136248][T21902] ? rcu_read_lock_sched_held+0x89/0x130 [ 544.141904][T21902] ? __bpf_trace_rcu_stall_warning+0x10/0x10 [ 544.147932][T21902] do_filp_open+0x277/0x4f0 [ 544.152465][T21902] ? vfs_tmpfile+0x230/0x230 [ 544.157060][T21902] ? alloc_fd+0x5e1/0x680 [ 544.161443][T21902] ? _raw_spin_unlock+0x24/0x40 [ 544.166298][T21902] ? alloc_fd+0x5e1/0x680 [ 544.170656][T21902] do_sys_openat2+0x13b/0x500 [ 544.175352][T21902] ? do_sys_open+0x220/0x220 [ 544.179983][T21902] __x64_sys_openat+0x243/0x290 [ 544.184855][T21902] ? __ia32_sys_open+0x270/0x270 [ 544.189808][T21902] ? syscall_enter_from_user_mode+0x2e/0x1b0 [ 544.195884][T21902] ? lockdep_hardirqs_on+0x95/0x140 [ 544.201090][T21902] ? syscall_enter_from_user_mode+0x2e/0x1b0 [ 544.207079][T21902] do_syscall_64+0x44/0xd0 [ 544.211519][T21902] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 544.217418][T21902] RIP: 0033:0x7fe9048fee99 [ 544.221857][T21902] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 18:12:35 executing program 5: r0 = syz_io_uring_setup(0x3ede, &(0x7f0000000240), &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) socket$l2tp6(0xa, 0x2, 0x73) openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/locks\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READ=@pass_buffer={0x16, 0x0, 0x0, @fd_index=0x5, 0xffffffffffffffff, &(0x7f0000000040)=""/17, 0x11}, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000002040)=[{{&(0x7f0000001380)=@in6={0xa, 0x0, 0x0, @private0}, 0x80, 0x0}}], 0x1, 0x0) io_uring_enter(r0, 0x26, 0x6c, 0x0, 0x0, 0x0) [ 544.241475][T21902] RSP: 002b:00007fe903274168 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 544.249912][T21902] RAX: ffffffffffffffda RBX: 00007fe904a11f60 RCX: 00007fe9048fee99 [ 544.257893][T21902] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 544.265866][T21902] RBP: 00007fe9032741d0 R08: 0000000000000000 R09: 0000000000000000 [ 544.273840][T21902] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 544.281819][T21902] R13: 00007fff8414a6af R14: 00007fe903274300 R15: 0000000000022000 [ 544.289829][T21902] [ 544.292855][T21891] CPU: 0 PID: 21891 Comm: syz-executor.4 Not tainted 5.16.0-rc5-syzkaller #0 [ 544.301648][T21891] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 544.311944][T21891] Call Trace: [ 544.315220][T21891] [ 544.318141][T21891] dump_stack_lvl+0x201/0x2d8 [ 544.322825][T21891] ? show_regs_print_info+0x12/0x12 [ 544.328020][T21891] ? log_buf_vmcoreinfo_setup+0x498/0x498 [ 544.333731][T21891] ? __might_fault+0xb6/0x110 [ 544.338413][T21891] should_fail+0x384/0x4b0 [ 544.342841][T21891] _copy_from_user+0x2d/0x170 [ 544.347687][T21891] __sys_bpf+0x486d/0x12d90 [ 544.352220][T21891] ? reacquire_held_locks+0x620/0x620 [ 544.357590][T21891] ? mark_lock+0x191/0x1e00 [ 544.362104][T21891] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 544.367478][T21891] ? __bpf_trace_rcu_stall_warning+0x10/0x10 [ 544.373457][T21891] ? __print_lock_name+0x1d0/0x1d0 [ 544.378562][T21891] ? __print_lock_name+0x1d0/0x1d0 [ 544.383673][T21891] ? rcu_read_lock_sched_held+0x89/0x130 [ 544.389299][T21891] ? __bpf_trace_rcu_stall_warning+0x10/0x10 [ 544.395292][T21891] ? rcu_read_lock_sched_held+0x89/0x130 [ 544.400919][T21891] ? __bpf_trace_rcu_stall_warning+0x10/0x10 [ 544.407080][T21891] ? __lock_acquire+0x1382/0x2b00 [ 544.412118][T21891] ? rcu_read_lock_sched_held+0x89/0x130 [ 544.417747][T21891] ? __bpf_trace_rcu_stall_warning+0x10/0x10 [ 544.423720][T21891] ? rcu_read_lock_sched_held+0x89/0x130 [ 544.429377][T21891] ? __context_tracking_exit+0x7a/0xd0 [ 544.434830][T21891] ? __lock_acquire+0x2b00/0x2b00 [ 544.439873][T21891] ? lockdep_hardirqs_on+0x95/0x140 [ 544.445065][T21891] __x64_sys_bpf+0x78/0x90 [ 544.449479][T21891] do_syscall_64+0x44/0xd0 [ 544.454177][T21891] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 544.460064][T21891] RIP: 0033:0x7f9aa6167e99 [ 544.464474][T21891] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 544.484083][T21891] RSP: 002b:00007f9aa4add168 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 544.492507][T21891] RAX: ffffffffffffffda RBX: 00007f9aa627af60 RCX: 00007f9aa6167e99 [ 544.500477][T21891] RDX: 0000000000000020 RSI: 0000000020000200 RDI: 0000000000000002 [ 544.508443][T21891] RBP: 00007f9aa4add1d0 R08: 0000000000000000 R09: 0000000000000000 [ 544.516408][T21891] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 544.524376][T21891] R13: 00007ffe4eb4321f R14: 00007f9aa4add300 R15: 0000000000022000 [ 544.532452][T21891] 18:12:36 executing program 1: syz_mount_image$ntfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x1d03, 0x0, &(0x7f00000000c0), 0x218400, &(0x7f00000013c0)) 18:12:36 executing program 2: syz_mount_image$ntfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x6, 0x0, &(0x7f00000000c0), 0x0, &(0x7f00000013c0)={[{@fmask}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'syzkaller1\x00'}}]}) 18:12:36 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x200000000}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) (fail_nth: 5) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) 18:12:36 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="b4050000000000006110580000000000c60000000000000095000002000000002ac73fe427abdf478e0357f2d32986f50b892b5007921cd48fe43b23be60a2dbc9778bb665510e3e22fcb26adfdc05e55a4933e62a23abb4baca4ec89323257db59db5eeda384459dd00d41b6aab85df5cab39e726769e2291b626d120a9247579f0b8edd8f16683e0623366ac632c24921d21534237743354f09cc29be2f72dfa8b05320110bcea53bb038c"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x5, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) 18:12:36 executing program 5: r0 = syz_io_uring_setup(0x3ede, &(0x7f0000000240), &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) socket$l2tp6(0xa, 0x2, 0x73) openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/locks\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READ=@pass_buffer={0x16, 0x0, 0x0, @fd_index=0x5, 0xffffffffffffffff, &(0x7f0000000040)=""/17, 0x11}, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000002040)=[{{&(0x7f0000001380)=@in6={0xa, 0x0, 0x0, @private0}, 0x80, 0x0}}], 0x1, 0x0) io_uring_enter(r0, 0x26, 0x74, 0x0, 0x0, 0x0) [ 544.660741][T21911] loop1: detected capacity change from 0 to 14 18:12:36 executing program 0: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$FS_IOC_RESVSP(r0, 0x402c5828, &(0x7f00000000c0)={0x0, 0x1, 0xa8f, 0x3078}) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x200000000}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x9) preadv(r1, &(0x7f0000000240)=[{&(0x7f0000000040)=""/94, 0x5e}, {&(0x7f00000000c0)=""/93, 0x5d}, {&(0x7f0000000140)=""/58, 0x3a}], 0x3, 0xd9f, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000002340)='./file0\x00', 0x0, 0x108) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000180)={'team0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @local}, 0x14) writev(r2, &(0x7f0000000280)=[{&(0x7f00000008c0)="110eaa1a9896d57019effc8c79961d0f73ccf3afca3754e2e7a31f536bcb7204bed59311e29c96e1c2b663d61e5b0c0a76ea50cbddaa69f578b8600f77cf1a538ac900673696245b6de4283c979a2eccd71f9583dacf650575d1398678895da32663735b4d0cabfe7e972e59c2b4b4c9c89d0b82ca2267ad5062303e8abcb79600010506702eb912e3957e507aec4e2180699a738f6753509a12282a1d7181887f6c2e03de1da0dfe3b4efbb10e9b59301b4ef8a1d", 0xb5}, {&(0x7f0000000980)="34c30d95766fefbb7bdc40a3242505587bbc8584c2bc2003185f5ce116eea020efa91e2aae1eae2b8e848ac13c3dcedbbbc82adb1e70be8eecedba37be82545f2abda4f0a0e0fd0edd6bd03bb8e9bb91c39a2c828511aef3e684ad4c21ec0c146b9570139e31cd", 0x67}], 0x2) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'macvtap0\x00'}) ioctl$PPPIOCSFLAGS1(0xffffffffffffffff, 0x40047459, &(0x7f00000001c0)) recvmmsg(0xffffffffffffffff, &(0x7f0000002200)=[{{&(0x7f0000000340)=@in={0x2, 0x0, @multicast1}, 0x80, &(0x7f0000000440)=[{&(0x7f00000004c0)=""/88, 0x58}, {&(0x7f0000000b40)=""/4096, 0x1000}], 0x2, &(0x7f0000000740)=""/192, 0xc0}, 0x3}, {{&(0x7f0000000800)=@sco={0x1f, @none}, 0x80, &(0x7f0000000480)=[{&(0x7f0000001b40)=""/82, 0x52}], 0x1, &(0x7f0000001bc0)=""/206, 0xce}, 0x7}, {{&(0x7f0000001cc0)=@in={0x2, 0x0, @broadcast}, 0x80, &(0x7f0000000880)=[{&(0x7f0000001d40)=""/146, 0x92}, {&(0x7f0000001e00)=""/231, 0xe7}], 0x2, &(0x7f0000001f00)=""/239, 0xef}, 0x3}, {{&(0x7f0000002000)=@xdp, 0x80, &(0x7f00000020c0)=[{&(0x7f0000002080)=""/58, 0x3a}], 0x1, &(0x7f0000002100)=""/251, 0xfb}, 0x9}], 0x4, 0x40, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000002380)=ANY=[@ANYBLOB="050000004f2fe4e7fe91d1f169b7f431831544d94b6dbcca36d501829c64f0c28565fbc3e562e329d779aef804590001804797c4378192536ca659efcf0a6cb16b0ba5b79cfefdc8e93c46dfa0c119d12be6495820cc0b34645475d4da28535803ddcfd16f5df589e2f1ac230118eafd75a63c016b3a1663bc141e5ed84016b6b02854a48c0ec71a36a1ad145c5d2216e964a34cdf686b0a089443bd0f8c210860754d133e2c97ce8a25ee4d4eb5abb779387ca2cd9e870d5cb5854616c65c24f259eeaa625432fa25dd2832dc14f9a78ebf3a24277da2b55d09ed6a1dca07d4fb9ed592a64782b6939500505805d12b2776980c4b250f17b0b9a8fda266d7f084a9cd1022d2d670f793298bcf83b9a25e4ae25ac23ce06ef88068108ec131b23695772064709b1dbee85e5c2a0c4cf809dbd8b5617f8c6f6fba013f019829c83bd4cf10be5c6da663ce7cbf9b19ebd88bedb114ec207599273b55ec5f4cd35914f897ee8afc7663255678f6853e5cfa0dfa079ba560c7ddbc56e6352397b7266ac906a0ce0fb810eb00000000000000000000000000000000000000000000000000c54baf95f669d6810040c457be8ca739b4ec785f005bb4faa01270b999b6c9899cd9e8997d359b77c00a68341ca40b4c0e06884b6384ef6e", @ANYRESDEC=r0, @ANYBLOB="b21b22b0b59f1a76abb6323c16886f3d2569d595dca4af1ac9160b24b62e47302e148fa17433c275945e36a713e5fad2e8abc9651d17b22d7d092020f73d100115fed606c66c84318df7895b1e5780f3c785bfb92571cf1bc9", @ANYRES32=0x0, @ANYRES32, @ANYRES32=0x0], &(0x7f0000000300)=0x18) r5 = socket(0x1, 0x803, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8936, &(0x7f0000000080)={@rand_addr=' \x01\x00', 0x44, r4}) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) r7 = socket(0x10, 0x8000000803, 0x0) sendmsg$nl_route(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000a00)=@newlink={0x74, 0x10, 0x401, 0x3001, 0x25dfdbfc, {0x0, 0x0, 0x0, 0x0, 0x534ad, 0x42a03}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x34, 0x2, 0x0, 0x1, [@IFLA_IPVLAN_MODE={0x6, 0x1, 0x2}, @IFLA_IPVLAN_FLAGS={0x6, 0x2, 0x2}, @IFLA_IPVLAN_FLAGS={0x6, 0x2, 0x1}, @IFLA_IPVLAN_FLAGS={0x6, 0x2, 0x2}, @IFLA_IPVLAN_FLAGS={0x6, 0x2, 0x3}, @IFLA_IPVLAN_FLAGS={0x6, 0x2, 0x2}]}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x74}}, 0x0) 18:12:36 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="b4050000000000006110580000000000c60000000000000095000002000000002ac73fe427abdf478e0357f2d32986f50b892b5007921cd48fe43b23be60a2dbc9778bb665510e3e22fcb26adfdc05e55a4933e62a23abb4baca4ec89323257db59db5eeda384459dd00d41b6aab85df5cab39e726769e2291b626d120a9247579f0b8edd8f16683e0623366ac632c24921d21534237743354f09cc29be2f72dfa8b05320110bcea53bb038c"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x5, 0x0) bpf$MAP_UPDATE_ELEM(0x3, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) 18:12:36 executing program 1: syz_mount_image$ntfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x2000, 0x0, &(0x7f00000000c0), 0x218400, &(0x7f00000013c0)) [ 544.732091][T21916] ntfs: (device loop2): ntfs_fill_super(): Unable to determine device size. 18:12:36 executing program 5: r0 = syz_io_uring_setup(0x3ede, &(0x7f0000000240), &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) socket$l2tp6(0xa, 0x2, 0x73) openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/locks\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READ=@pass_buffer={0x16, 0x0, 0x0, @fd_index=0x5, 0xffffffffffffffff, &(0x7f0000000040)=""/17, 0x11}, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000002040)=[{{&(0x7f0000001380)=@in6={0xa, 0x0, 0x0, @private0}, 0x80, 0x0}}], 0x1, 0x0) io_uring_enter(r0, 0x26, 0x7a, 0x0, 0x0, 0x0) [ 544.799852][T21919] FAULT_INJECTION: forcing a failure. [ 544.799852][T21919] name failslab, interval 1, probability 0, space 0, times 0 [ 544.829549][T21924] loop1: detected capacity change from 0 to 16 [ 544.863421][T21919] CPU: 1 PID: 21919 Comm: syz-executor.3 Not tainted 5.16.0-rc5-syzkaller #0 [ 544.872603][T21919] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 544.882688][T21919] Call Trace: [ 544.885987][T21919] [ 544.888942][T21919] dump_stack_lvl+0x201/0x2d8 [ 544.893656][T21919] ? show_regs_print_info+0x12/0x12 [ 544.898890][T21919] ? log_buf_vmcoreinfo_setup+0x498/0x498 [ 544.904660][T21919] ? __might_sleep+0xe0/0xe0 [ 544.909287][T21919] ? rcu_read_lock_sched_held+0x89/0x130 [ 544.909328][T21921] 8021q: adding VLAN 0 to HW filter on device ipvlan32 [ 544.914954][T21919] should_fail+0x384/0x4b0 [ 544.914991][T21919] ? tomoyo_realpath_from_path+0xd8/0x610 [ 544.915016][T21919] should_failslab+0x5/0x20 [ 544.915035][T21919] __kmalloc+0x94/0x380 [ 544.915055][T21919] ? kfree+0x2f/0x330 [ 544.943427][T21921] team0: Device ipvlan32 is already an upper device of the team interface [ 544.944673][T21919] ? perf_trace_run_bpf_submit+0xf6/0x1d0 [ 544.944724][T21919] tomoyo_realpath_from_path+0xd8/0x610 [ 544.944758][T21919] ? memset+0x1f/0x40 [ 544.968523][T21919] tomoyo_check_open_permission+0x22f/0x490 [ 544.974466][T21919] ? tomoyo_check_path_number_acl+0x270/0x270 [ 544.980571][T21919] ? rcu_read_lock_sched_held+0x89/0x130 [ 544.986303][T21919] ? __lock_acquire+0x2b00/0x2b00 [ 544.991373][T21919] ? hook_file_open+0xed/0x220 [ 544.996174][T21919] ? tomoyo_file_open+0xe6/0x170 [ 545.001157][T21919] security_file_open+0x50/0x570 [ 545.006141][T21919] do_dentry_open+0x350/0x1020 [ 545.010965][T21919] path_openat+0x2896/0x3660 [ 545.015617][T21919] ? perf_trace_run_bpf_submit+0xf6/0x1d0 [ 545.021402][T21919] ? do_filp_open+0x4f0/0x4f0 [ 545.026132][T21919] ? rcu_read_lock_sched_held+0x89/0x130 [ 545.031802][T21919] ? __bpf_trace_rcu_stall_warning+0x10/0x10 [ 545.037931][T21919] do_filp_open+0x277/0x4f0 [ 545.042490][T21919] ? vfs_tmpfile+0x230/0x230 [ 545.047106][T21919] ? alloc_fd+0x5e1/0x680 [ 545.051524][T21919] ? _raw_spin_unlock+0x24/0x40 [ 545.056402][T21919] ? alloc_fd+0x5e1/0x680 [ 545.060782][T21919] do_sys_openat2+0x13b/0x500 [ 545.065497][T21919] ? do_sys_open+0x220/0x220 [ 545.070143][T21919] __x64_sys_openat+0x243/0x290 [ 545.075026][T21919] ? __ia32_sys_open+0x270/0x270 [ 545.079995][T21919] ? syscall_enter_from_user_mode+0x2e/0x1b0 [ 545.086004][T21919] ? lockdep_hardirqs_on+0x95/0x140 [ 545.091231][T21919] ? syscall_enter_from_user_mode+0x2e/0x1b0 [ 545.097251][T21919] do_syscall_64+0x44/0xd0 [ 545.101712][T21919] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 545.107632][T21919] RIP: 0033:0x7fe9048fee99 [ 545.112081][T21919] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 545.131980][T21919] RSP: 002b:00007fe903274168 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 545.140428][T21919] RAX: ffffffffffffffda RBX: 00007fe904a11f60 RCX: 00007fe9048fee99 [ 545.148424][T21919] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 545.156425][T21919] RBP: 00007fe9032741d0 R08: 0000000000000000 R09: 0000000000000000 18:12:36 executing program 2: syz_mount_image$ntfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x7, 0x0, &(0x7f00000000c0), 0x0, &(0x7f00000013c0)={[{@fmask}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'syzkaller1\x00'}}]}) [ 545.164425][T21919] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 545.172428][T21919] R13: 00007fff8414a6af R14: 00007fe903274300 R15: 0000000000022000 [ 545.180471][T21919] 18:12:36 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="b4050000000000006110580000000000c60000000000000095000002000000002ac73fe427abdf478e0357f2d32986f50b892b5007921cd48fe43b23be60a2dbc9778bb665510e3e22fcb26adfdc05e55a4933e62a23abb4baca4ec89323257db59db5eeda384459dd00d41b6aab85df5cab39e726769e2291b626d120a9247579f0b8edd8f16683e0623366ac632c24921d21534237743354f09cc29be2f72dfa8b05320110bcea53bb038c"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x5, 0x0) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) 18:12:36 executing program 1: syz_mount_image$ntfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x2010, 0x0, &(0x7f00000000c0), 0x218400, &(0x7f00000013c0)) [ 545.219373][T21929] ntfs: (device loop2): ntfs_fill_super(): Unable to determine device size. 18:12:36 executing program 2: syz_mount_image$ntfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x8, 0x0, &(0x7f00000000c0), 0x0, &(0x7f00000013c0)={[{@fmask}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'syzkaller1\x00'}}]}) 18:12:36 executing program 5: r0 = syz_io_uring_setup(0x3ede, &(0x7f0000000240), &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) socket$l2tp6(0xa, 0x2, 0x73) openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/locks\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READ=@pass_buffer={0x16, 0x0, 0x0, @fd_index=0x5, 0xffffffffffffffff, &(0x7f0000000040)=""/17, 0x11}, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000002040)=[{{&(0x7f0000001380)=@in6={0xa, 0x0, 0x0, @private0}, 0x80, 0x0}}], 0x1, 0x0) io_uring_enter(r0, 0x26, 0xea, 0x0, 0x0, 0x0) [ 545.402187][T21934] loop1: detected capacity change from 0 to 16 [ 545.439635][T21937] ntfs: (device loop2): ntfs_fill_super(): Unable to determine device size. [ 545.591203][T21919] ERROR: Out of memory at tomoyo_realpath_from_path. [ 545.630464][T21919] syz-executor.3: vmalloc error: size 4096, page order 0, failed to allocate pages, mode:0xdc0(GFP_KERNEL|__GFP_ZERO), nodemask=(null),cpuset=syz3,mems_allowed=0-1 [ 545.651041][T21919] CPU: 0 PID: 21919 Comm: syz-executor.3 Not tainted 5.16.0-rc5-syzkaller #0 [ 545.659847][T21919] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 545.669919][T21919] Call Trace: [ 545.673207][T21919] [ 545.676149][T21919] dump_stack_lvl+0x201/0x2d8 [ 545.680860][T21919] ? show_regs_print_info+0x12/0x12 [ 545.686086][T21919] ? log_buf_vmcoreinfo_setup+0x498/0x498 [ 545.691856][T21919] warn_alloc+0x221/0x370 [ 545.696223][T21919] ? zone_watermark_ok_safe+0x280/0x280 [ 545.701809][T21919] ? alloc_pages_bulk_array_mempolicy+0x5be/0x690 [ 545.708266][T21919] __vmalloc_node_range+0x7c5/0x960 [ 545.713861][T21919] ? n_tty_open+0x19/0x150 [ 545.718393][T21919] vzalloc+0x75/0x80 [ 545.722307][T21919] ? n_tty_open+0x19/0x150 [ 545.726739][T21919] n_tty_open+0x19/0x150 [ 545.731006][T21919] tty_ldisc_setup+0xcf/0x3c0 [ 545.735727][T21919] tty_init_dev+0x271/0x4c0 [ 545.740271][T21919] tty_open+0x89a/0xdd0 [ 545.744447][T21919] ? chrdev_open+0x1f4/0x680 [ 545.749068][T21919] ? tty_compat_ioctl+0xcc0/0xcc0 [ 545.754105][T21919] ? do_raw_spin_unlock+0x134/0x8a0 [ 545.759318][T21919] ? memset+0x1f/0x40 [ 545.763412][T21919] chrdev_open+0x5fb/0x680 [ 545.767942][T21919] ? __fsnotify_update_child_dentry_flags+0x2d0/0x2d0 [ 545.774806][T21919] ? cd_forget+0x160/0x160 [ 545.779245][T21919] ? hook_file_open+0xed/0x220 [ 545.784026][T21919] ? tomoyo_file_open+0xe6/0x170 [ 545.788991][T21919] ? security_file_open+0x458/0x570 [ 545.794302][T21919] ? cd_forget+0x160/0x160 [ 545.798746][T21919] do_dentry_open+0x78b/0x1020 [ 545.803544][T21919] path_openat+0x2896/0x3660 [ 545.808161][T21919] ? perf_trace_run_bpf_submit+0xf6/0x1d0 [ 545.814003][T21919] ? do_filp_open+0x4f0/0x4f0 [ 545.818716][T21919] ? rcu_read_lock_sched_held+0x89/0x130 [ 545.824379][T21919] ? __bpf_trace_rcu_stall_warning+0x10/0x10 [ 545.830397][T21919] do_filp_open+0x277/0x4f0 [ 545.834932][T21919] ? vfs_tmpfile+0x230/0x230 [ 545.839559][T21919] ? alloc_fd+0x5e1/0x680 [ 545.843940][T21919] ? _raw_spin_unlock+0x24/0x40 [ 545.848891][T21919] ? alloc_fd+0x5e1/0x680 [ 545.853251][T21919] do_sys_openat2+0x13b/0x500 [ 545.857959][T21919] ? do_sys_open+0x220/0x220 [ 545.862582][T21919] __x64_sys_openat+0x243/0x290 [ 545.867476][T21919] ? __ia32_sys_open+0x270/0x270 [ 545.872429][T21919] ? syscall_enter_from_user_mode+0x2e/0x1b0 [ 545.878422][T21919] ? lockdep_hardirqs_on+0x95/0x140 [ 545.883636][T21919] ? syscall_enter_from_user_mode+0x2e/0x1b0 [ 545.889637][T21919] do_syscall_64+0x44/0xd0 [ 545.894072][T21919] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 545.899982][T21919] RIP: 0033:0x7fe9048fee99 [ 545.904410][T21919] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 545.924026][T21919] RSP: 002b:00007fe903274168 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 545.932814][T21919] RAX: ffffffffffffffda RBX: 00007fe904a11f60 RCX: 00007fe9048fee99 [ 545.940821][T21919] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 545.948811][T21919] RBP: 00007fe9032741d0 R08: 0000000000000000 R09: 0000000000000000 [ 545.956803][T21919] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 545.964786][T21919] R13: 00007fff8414a6af R14: 00007fe903274300 R15: 0000000000022000 [ 545.972807][T21919] [ 545.991213][T21919] Mem-Info: [ 545.994486][T21919] active_anon:696 inactive_anon:180796 isolated_anon:0 [ 545.994486][T21919] active_file:4070 inactive_file:71079 isolated_file:0 [ 545.994486][T21919] unevictable:768 dirty:0 writeback:0 [ 545.994486][T21919] slab_reclaimable:19964 slab_unreclaimable:101573 [ 545.994486][T21919] mapped:27938 shmem:2220 pagetables:1341 bounce:0 [ 545.994486][T21919] kernel_misc_reclaimable:0 [ 545.994486][T21919] free:1217234 free_pcp:10197 free_cma:0 [ 546.038373][T21919] Node 0 active_anon:2780kB inactive_anon:722460kB active_file:16204kB inactive_file:284316kB unevictable:1536kB isolated(anon):0kB isolated(file):0kB mapped:111752kB dirty:0kB writeback:0kB shmem:6616kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 325632kB writeback_tmp:0kB kernel_stack:14288kB pagetables:5360kB all_unreclaimable? no [ 546.070377][T21919] Node 1 active_anon:4kB inactive_anon:724kB active_file:76kB inactive_file:0kB unevictable:1536kB isolated(anon):0kB isolated(file):0kB mapped:0kB dirty:0kB writeback:0kB shmem:2264kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 0kB writeback_tmp:0kB kernel_stack:16kB pagetables:4kB all_unreclaimable? no [ 546.101258][T21919] Node 0 DMA free:15360kB boost:0kB min:200kB low:248kB high:296kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15360kB mlocked:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 546.128985][T21919] lowmem_reserve[]: 0 2635 2636 2636 2636 [ 546.135519][T21919] Node 0 DMA32 free:905712kB boost:0kB min:35588kB low:44484kB high:53380kB reserved_highatomic:0KB active_anon:2780kB inactive_anon:722460kB active_file:16204kB inactive_file:284316kB unevictable:1536kB writepending:0kB present:3129332kB managed:2705616kB mlocked:0kB bounce:0kB free_pcp:40208kB local_pcp:18584kB free_cma:0kB [ 546.168414][T21919] lowmem_reserve[]: 0 0 1 1 1 [ 546.173278][T21919] Node 0 Normal free:0kB boost:0kB min:16kB low:20kB high:24kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:1048576kB managed:1424kB mlocked:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 546.200830][T21919] lowmem_reserve[]: 0 0 0 0 0 [ 546.206218][T21919] Node 1 Normal free:3948760kB boost:0kB min:54300kB low:67872kB high:81444kB reserved_highatomic:0KB active_anon:4kB inactive_anon:724kB active_file:76kB inactive_file:0kB unevictable:1536kB writepending:0kB present:4194304kB managed:4117620kB mlocked:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 546.238656][T21919] lowmem_reserve[]: 0 0 0 0 0 [ 546.243568][T21919] Node 0 DMA: 0*4kB 0*8kB 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15360kB [ 546.275913][T21919] Node 0 DMA32: 184*4kB (UME) 66*8kB (UME) 70*16kB (UE) 237*32kB (UE) 51*64kB (UE) 5*128kB (UE) 50*256kB (UE) 8*512kB (UM) 2*1024kB (ME) 6*2048kB (UME) 210*4096kB (UM) = 905264kB [ 546.294645][T21919] Node 0 Normal: 0*4kB 0*8kB 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 0kB [ 546.315151][T21919] Node 1 Normal: 144*4kB (UME) 31*8kB (UE) 30*16kB (UME) 116*32kB (UE) 65*64kB (UE) 26*128kB (UME) 4*256kB (UM) 4*512kB (U) 1*1024kB (E) 2*2048kB (UE) 959*4096kB (M) = 3948760kB [ 546.333709][T21919] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 546.344350][T21919] Node 0 hugepages_total=2 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 546.355462][T21919] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 546.365490][T21919] Node 1 hugepages_total=2 hugepages_free=1 hugepages_surp=0 hugepages_size=2048kB [ 546.375314][T21919] 13858 total pagecache pages [ 546.380425][T21919] 0 pages in swap cache [ 546.384674][T21919] Swap cache stats: add 0, delete 0, find 0/0 [ 546.391263][T21919] Free swap = 0kB 18:12:37 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x200000000}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) 18:12:37 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="b4050000000000006110580000000000c60000000000000095000002000000002ac73fe427abdf478e0357f2d32986f50b892b5007921cd48fe43b23be60a2dbc9778bb665510e3e22fcb26adfdc05e55a4933e62a23abb4baca4ec89323257db59db5eeda384459dd00d41b6aab85df5cab39e726769e2291b626d120a9247579f0b8edd8f16683e0623366ac632c24921d21534237743354f09cc29be2f72dfa8b05320110bcea53bb038c"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x5, 0x0) bpf$MAP_UPDATE_ELEM(0x5, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) 18:12:37 executing program 2: syz_mount_image$ntfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x9, 0x0, &(0x7f00000000c0), 0x0, &(0x7f00000013c0)={[{@fmask}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'syzkaller1\x00'}}]}) 18:12:37 executing program 1: syz_mount_image$ntfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x2403, 0x0, &(0x7f00000000c0), 0x218400, &(0x7f00000013c0)) 18:12:37 executing program 0: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$FS_IOC_RESVSP(r0, 0x402c5828, &(0x7f00000000c0)={0x0, 0x1, 0xa8f, 0x3078}) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x200000000}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x9) preadv(r1, &(0x7f0000000240)=[{&(0x7f0000000040)=""/94, 0x5e}, {&(0x7f00000000c0)=""/93, 0x5d}, {&(0x7f0000000140)=""/58, 0x3a}], 0x3, 0xd9f, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000002340)='./file0\x00', 0x0, 0x108) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000180)={'team0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @local}, 0x14) writev(r2, &(0x7f0000000280)=[{&(0x7f00000008c0)="110eaa1a9896d57019effc8c79961d0f73ccf3afca3754e2e7a31f536bcb7204bed59311e29c96e1c2b663d61e5b0c0a76ea50cbddaa69f578b8600f77cf1a538ac900673696245b6de4283c979a2eccd71f9583dacf650575d1398678895da32663735b4d0cabfe7e972e59c2b4b4c9c89d0b82ca2267ad5062303e8abcb79600010506702eb912e3957e507aec4e2180699a738f6753509a12282a1d7181887f6c2e03de1da0dfe3b4efbb10e9b59301b4ef8a1d", 0xb5}, {&(0x7f0000000980)="34c30d95766fefbb7bdc40a3242505587bbc8584c2bc2003185f5ce116eea020efa91e2aae1eae2b8e848ac13c3dcedbbbc82adb1e70be8eecedba37be82545f2abda4f0a0e0fd0edd6bd03bb8e9bb91c39a2c828511aef3e684ad4c21ec0c146b9570139e31cd", 0x67}], 0x2) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'macvtap0\x00'}) ioctl$PPPIOCSFLAGS1(0xffffffffffffffff, 0x40047459, &(0x7f00000001c0)) recvmmsg(0xffffffffffffffff, &(0x7f0000002200)=[{{&(0x7f0000000340)=@in={0x2, 0x0, @multicast1}, 0x80, &(0x7f0000000440)=[{&(0x7f00000004c0)=""/88, 0x58}, {&(0x7f0000000b40)=""/4096, 0x1000}], 0x2, &(0x7f0000000740)=""/192, 0xc0}, 0x3}, {{&(0x7f0000000800)=@sco={0x1f, @none}, 0x80, &(0x7f0000000480)=[{&(0x7f0000001b40)=""/82, 0x52}], 0x1, &(0x7f0000001bc0)=""/206, 0xce}, 0x7}, {{&(0x7f0000001cc0)=@in={0x2, 0x0, @broadcast}, 0x80, &(0x7f0000000880)=[{&(0x7f0000001d40)=""/146, 0x92}, {&(0x7f0000001e00)=""/231, 0xe7}], 0x2, &(0x7f0000001f00)=""/239, 0xef}, 0x3}, {{&(0x7f0000002000)=@xdp, 0x80, &(0x7f00000020c0)=[{&(0x7f0000002080)=""/58, 0x3a}], 0x1, &(0x7f0000002100)=""/251, 0xfb}, 0x9}], 0x4, 0x40, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000002380)=ANY=[@ANYBLOB="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", @ANYRESDEC=r0, @ANYBLOB="b21b22b0b59f1a76abb6323c16886f3d2569d595dca4af1ac9160b24b62e47302e148fa17433c275945e36a713e5fad2e8abc9651d17b22d7d092020f73d100115fed606c66c84318df7895b1e5780f3c785bfb92571cf1bc9", @ANYRES32=0x0, @ANYRES32, @ANYRES32=0x0], &(0x7f0000000300)=0x18) r5 = socket(0x1, 0x803, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8936, &(0x7f0000000080)={@rand_addr=' \x01\x00', 0x44, r4}) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) r7 = socket(0x10, 0x8000000803, 0x0) sendmsg$nl_route(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000a00)=@newlink={0x74, 0x10, 0x401, 0x3001, 0x25dfdbfc, {0x0, 0x0, 0x0, 0x0, 0x534ad, 0x42a03}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x34, 0x2, 0x0, 0x1, [@IFLA_IPVLAN_MODE={0x6, 0x1, 0x2}, @IFLA_IPVLAN_FLAGS={0x6, 0x2, 0x2}, @IFLA_IPVLAN_FLAGS={0x6, 0x2, 0x1}, @IFLA_IPVLAN_FLAGS={0x6, 0x2, 0x2}, @IFLA_IPVLAN_FLAGS={0x6, 0x2, 0x3}, @IFLA_IPVLAN_FLAGS={0x6, 0x2, 0x2}]}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x74}}, 0x0) 18:12:37 executing program 5: r0 = syz_io_uring_setup(0x3ede, &(0x7f0000000240), &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) socket$l2tp6(0xa, 0x2, 0x73) openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/locks\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READ=@pass_buffer={0x16, 0x0, 0x0, @fd_index=0x5, 0xffffffffffffffff, &(0x7f0000000040)=""/17, 0x11}, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000002040)=[{{&(0x7f0000001380)=@in6={0xa, 0x0, 0x0, @private0}, 0x80, 0x0}}], 0x1, 0x0) io_uring_enter(r0, 0x26, 0x204, 0x0, 0x0, 0x0) [ 546.395109][T21919] Total swap = 0kB [ 546.399408][T21919] 2097051 pages RAM [ 546.403355][T21919] 0 pages HighMem/MovableOnly [ 546.408689][T21919] 387046 pages reserved [ 546.412953][T21919] 0 pages cma reserved [ 546.417917][T21919] ttyS ttyS3: ldisc open failed (-12), clearing slot 3 [ 546.469302][T21944] loop1: detected capacity change from 0 to 18 [ 546.507721][T21949] ntfs: (device loop2): ntfs_fill_super(): Unable to determine device size. 18:12:38 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="b4050000000000006110580000000000c60000000000000095000002000000002ac73fe427abdf478e0357f2d32986f50b892b5007921cd48fe43b23be60a2dbc9778bb665510e3e22fcb26adfdc05e55a4933e62a23abb4baca4ec89323257db59db5eeda384459dd00d41b6aab85df5cab39e726769e2291b626d120a9247579f0b8edd8f16683e0623366ac632c24921d21534237743354f09cc29be2f72dfa8b05320110bcea53bb038c"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x5, 0x0) bpf$MAP_UPDATE_ELEM(0x6, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) 18:12:38 executing program 5: r0 = syz_io_uring_setup(0x3ede, &(0x7f0000000240), &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) socket$l2tp6(0xa, 0x2, 0x73) openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/locks\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READ=@pass_buffer={0x16, 0x0, 0x0, @fd_index=0x5, 0xffffffffffffffff, &(0x7f0000000040)=""/17, 0x11}, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000002040)=[{{&(0x7f0000001380)=@in6={0xa, 0x0, 0x0, @private0}, 0x80, 0x0}}], 0x1, 0x0) io_uring_enter(r0, 0x26, 0x300, 0x0, 0x0, 0x0) 18:12:38 executing program 1: syz_mount_image$ntfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x2500, 0x0, &(0x7f00000000c0), 0x218400, &(0x7f00000013c0)) [ 546.609577][T21948] 8021q: adding VLAN 0 to HW filter on device ipvlan32 18:12:38 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x200000000}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) 18:12:38 executing program 2: syz_mount_image$ntfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0xa, 0x0, &(0x7f00000000c0), 0x0, &(0x7f00000013c0)={[{@fmask}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'syzkaller1\x00'}}]}) [ 546.652212][T21948] team0: Device ipvlan32 is already an upper device of the team interface 18:12:38 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="b4050000000000006110580000000000c60000000000000095000002000000002ac73fe427abdf478e0357f2d32986f50b892b5007921cd48fe43b23be60a2dbc9778bb665510e3e22fcb26adfdc05e55a4933e62a23abb4baca4ec89323257db59db5eeda384459dd00d41b6aab85df5cab39e726769e2291b626d120a9247579f0b8edd8f16683e0623366ac632c24921d21534237743354f09cc29be2f72dfa8b05320110bcea53bb038c"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x5, 0x0) bpf$MAP_UPDATE_ELEM(0x7, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) [ 546.733987][T21960] loop1: detected capacity change from 0 to 18 [ 546.747900][T21958] ntfs: (device loop2): ntfs_fill_super(): Unable to determine device size. 18:12:38 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x200000000}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x3, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) 18:12:38 executing program 5: r0 = syz_io_uring_setup(0x3ede, &(0x7f0000000240), &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) socket$l2tp6(0xa, 0x2, 0x73) openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/locks\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READ=@pass_buffer={0x16, 0x0, 0x0, @fd_index=0x5, 0xffffffffffffffff, &(0x7f0000000040)=""/17, 0x11}, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000002040)=[{{&(0x7f0000001380)=@in6={0xa, 0x0, 0x0, @private0}, 0x80, 0x0}}], 0x1, 0x0) io_uring_enter(r0, 0x26, 0x315, 0x0, 0x0, 0x0) 18:12:38 executing program 0: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$FS_IOC_RESVSP(r0, 0x402c5828, &(0x7f00000000c0)={0x0, 0x1, 0xa8f, 0x3078}) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x200000000}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x9) preadv(r1, &(0x7f0000000240)=[{&(0x7f0000000040)=""/94, 0x5e}, {&(0x7f00000000c0)=""/93, 0x5d}, {&(0x7f0000000140)=""/58, 0x3a}], 0x3, 0xd9f, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000002340)='./file0\x00', 0x0, 0x108) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000180)={'team0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @local}, 0x14) writev(r2, &(0x7f0000000280)=[{&(0x7f00000008c0)="110eaa1a9896d57019effc8c79961d0f73ccf3afca3754e2e7a31f536bcb7204bed59311e29c96e1c2b663d61e5b0c0a76ea50cbddaa69f578b8600f77cf1a538ac900673696245b6de4283c979a2eccd71f9583dacf650575d1398678895da32663735b4d0cabfe7e972e59c2b4b4c9c89d0b82ca2267ad5062303e8abcb79600010506702eb912e3957e507aec4e2180699a738f6753509a12282a1d7181887f6c2e03de1da0dfe3b4efbb10e9b59301b4ef8a1d", 0xb5}, {&(0x7f0000000980)="34c30d95766fefbb7bdc40a3242505587bbc8584c2bc2003185f5ce116eea020efa91e2aae1eae2b8e848ac13c3dcedbbbc82adb1e70be8eecedba37be82545f2abda4f0a0e0fd0edd6bd03bb8e9bb91c39a2c828511aef3e684ad4c21ec0c146b9570139e31cd", 0x67}], 0x2) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'macvtap0\x00'}) ioctl$PPPIOCSFLAGS1(0xffffffffffffffff, 0x40047459, &(0x7f00000001c0)) recvmmsg(0xffffffffffffffff, &(0x7f0000002200)=[{{&(0x7f0000000340)=@in={0x2, 0x0, @multicast1}, 0x80, &(0x7f0000000440)=[{&(0x7f00000004c0)=""/88, 0x58}, {&(0x7f0000000b40)=""/4096, 0x1000}], 0x2, &(0x7f0000000740)=""/192, 0xc0}, 0x3}, {{&(0x7f0000000800)=@sco={0x1f, @none}, 0x80, &(0x7f0000000480)=[{&(0x7f0000001b40)=""/82, 0x52}], 0x1, &(0x7f0000001bc0)=""/206, 0xce}, 0x7}, {{&(0x7f0000001cc0)=@in={0x2, 0x0, @broadcast}, 0x80, &(0x7f0000000880)=[{&(0x7f0000001d40)=""/146, 0x92}, {&(0x7f0000001e00)=""/231, 0xe7}], 0x2, &(0x7f0000001f00)=""/239, 0xef}, 0x3}, {{&(0x7f0000002000)=@xdp, 0x80, &(0x7f00000020c0)=[{&(0x7f0000002080)=""/58, 0x3a}], 0x1, &(0x7f0000002100)=""/251, 0xfb}, 0x9}], 0x4, 0x40, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000002380)=ANY=[@ANYBLOB="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", @ANYRESDEC=r0, @ANYBLOB="b21b22b0b59f1a76abb6323c16886f3d2569d595dca4af1ac9160b24b62e47302e148fa17433c275945e36a713e5fad2e8abc9651d17b22d7d092020f73d100115fed606c66c84318df7895b1e5780f3c785bfb92571cf1bc9", @ANYRES32=0x0, @ANYRES32, @ANYRES32=0x0], &(0x7f0000000300)=0x18) r5 = socket(0x1, 0x803, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8936, &(0x7f0000000080)={@rand_addr=' \x01\x00', 0x44, r4}) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) r7 = socket(0x10, 0x8000000803, 0x0) sendmsg$nl_route(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000a00)=@newlink={0x74, 0x10, 0x401, 0x3001, 0x25dfdbfc, {0x0, 0x0, 0x0, 0x0, 0x534ad, 0x42a03}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x34, 0x2, 0x0, 0x1, [@IFLA_IPVLAN_MODE={0x6, 0x1, 0x2}, @IFLA_IPVLAN_FLAGS={0x6, 0x2, 0x2}, @IFLA_IPVLAN_FLAGS={0x6, 0x2, 0x1}, @IFLA_IPVLAN_FLAGS={0x6, 0x2, 0x2}, @IFLA_IPVLAN_FLAGS={0x6, 0x2, 0x3}, @IFLA_IPVLAN_FLAGS={0x6, 0x2, 0x2}]}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x74}}, 0x0) 18:12:38 executing program 1: syz_mount_image$ntfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x3f00, 0x0, &(0x7f00000000c0), 0x218400, &(0x7f00000013c0)) 18:12:38 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="b4050000000000006110580000000000c60000000000000095000002000000002ac73fe427abdf478e0357f2d32986f50b892b5007921cd48fe43b23be60a2dbc9778bb665510e3e22fcb26adfdc05e55a4933e62a23abb4baca4ec89323257db59db5eeda384459dd00d41b6aab85df5cab39e726769e2291b626d120a9247579f0b8edd8f16683e0623366ac632c24921d21534237743354f09cc29be2f72dfa8b05320110bcea53bb038c"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x5, 0x0) bpf$MAP_UPDATE_ELEM(0x8, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) 18:12:38 executing program 2: syz_mount_image$ntfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0xb, 0x0, &(0x7f00000000c0), 0x0, &(0x7f00000013c0)={[{@fmask}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'syzkaller1\x00'}}]}) 18:12:38 executing program 5: r0 = syz_io_uring_setup(0x3ede, &(0x7f0000000240), &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) socket$l2tp6(0xa, 0x2, 0x73) openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/locks\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READ=@pass_buffer={0x16, 0x0, 0x0, @fd_index=0x5, 0xffffffffffffffff, &(0x7f0000000040)=""/17, 0x11}, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000002040)=[{{&(0x7f0000001380)=@in6={0xa, 0x0, 0x0, @private0}, 0x80, 0x0}}], 0x1, 0x0) io_uring_enter(r0, 0x26, 0x402, 0x0, 0x0, 0x0) [ 546.951992][T21970] loop1: detected capacity change from 0 to 31 18:12:38 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x200000000}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x4, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) 18:12:38 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="b4050000000000006110580000000000c60000000000000095000002000000002ac73fe427abdf478e0357f2d32986f50b892b5007921cd48fe43b23be60a2dbc9778bb665510e3e22fcb26adfdc05e55a4933e62a23abb4baca4ec89323257db59db5eeda384459dd00d41b6aab85df5cab39e726769e2291b626d120a9247579f0b8edd8f16683e0623366ac632c24921d21534237743354f09cc29be2f72dfa8b05320110bcea53bb038c"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x5, 0x0) bpf$MAP_UPDATE_ELEM(0x9, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) [ 546.995594][T21973] ntfs: (device loop2): ntfs_fill_super(): Unable to determine device size. 18:12:38 executing program 1: syz_mount_image$ntfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x4000, 0x0, &(0x7f00000000c0), 0x218400, &(0x7f00000013c0)) [ 547.075011][T21975] 8021q: adding VLAN 0 to HW filter on device ipvlan32 18:12:38 executing program 2: syz_mount_image$ntfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0xc, 0x0, &(0x7f00000000c0), 0x0, &(0x7f00000013c0)={[{@fmask}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'syzkaller1\x00'}}]}) 18:12:38 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="b4050000000000006110580000000000c60000000000000095000002000000002ac73fe427abdf478e0357f2d32986f50b892b5007921cd48fe43b23be60a2dbc9778bb665510e3e22fcb26adfdc05e55a4933e62a23abb4baca4ec89323257db59db5eeda384459dd00d41b6aab85df5cab39e726769e2291b626d120a9247579f0b8edd8f16683e0623366ac632c24921d21534237743354f09cc29be2f72dfa8b05320110bcea53bb038c"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x5, 0x0) bpf$MAP_UPDATE_ELEM(0xa, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) [ 547.129027][T21975] team0: Device ipvlan32 is already an upper device of the team interface 18:12:38 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x200000000}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x5, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) 18:12:38 executing program 5: r0 = syz_io_uring_setup(0x3ede, &(0x7f0000000240), &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) socket$l2tp6(0xa, 0x2, 0x73) openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/locks\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READ=@pass_buffer={0x16, 0x0, 0x0, @fd_index=0x5, 0xffffffffffffffff, &(0x7f0000000040)=""/17, 0x11}, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000002040)=[{{&(0x7f0000001380)=@in6={0xa, 0x0, 0x0, @private0}, 0x80, 0x0}}], 0x1, 0x0) io_uring_enter(r0, 0x26, 0x406, 0x0, 0x0, 0x0) [ 547.173024][T21983] loop1: detected capacity change from 0 to 32 18:12:38 executing program 0: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$FS_IOC_RESVSP(r0, 0x402c5828, &(0x7f00000000c0)={0x0, 0x1, 0xa8f, 0x3078}) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x200000000}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x9) preadv(r1, &(0x7f0000000240)=[{&(0x7f0000000040)=""/94, 0x5e}, {&(0x7f00000000c0)=""/93, 0x5d}, {&(0x7f0000000140)=""/58, 0x3a}], 0x3, 0xd9f, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000002340)='./file0\x00', 0x0, 0x108) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000180)={'team0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @local}, 0x14) writev(r2, &(0x7f0000000280)=[{&(0x7f00000008c0)="110eaa1a9896d57019effc8c79961d0f73ccf3afca3754e2e7a31f536bcb7204bed59311e29c96e1c2b663d61e5b0c0a76ea50cbddaa69f578b8600f77cf1a538ac900673696245b6de4283c979a2eccd71f9583dacf650575d1398678895da32663735b4d0cabfe7e972e59c2b4b4c9c89d0b82ca2267ad5062303e8abcb79600010506702eb912e3957e507aec4e2180699a738f6753509a12282a1d7181887f6c2e03de1da0dfe3b4efbb10e9b59301b4ef8a1d", 0xb5}, {&(0x7f0000000980)="34c30d95766fefbb7bdc40a3242505587bbc8584c2bc2003185f5ce116eea020efa91e2aae1eae2b8e848ac13c3dcedbbbc82adb1e70be8eecedba37be82545f2abda4f0a0e0fd0edd6bd03bb8e9bb91c39a2c828511aef3e684ad4c21ec0c146b9570139e31cd", 0x67}], 0x2) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'macvtap0\x00'}) ioctl$PPPIOCSFLAGS1(0xffffffffffffffff, 0x40047459, &(0x7f00000001c0)) recvmmsg(0xffffffffffffffff, &(0x7f0000002200)=[{{&(0x7f0000000340)=@in={0x2, 0x0, @multicast1}, 0x80, &(0x7f0000000440)=[{&(0x7f00000004c0)=""/88, 0x58}, {&(0x7f0000000b40)=""/4096, 0x1000}], 0x2, &(0x7f0000000740)=""/192, 0xc0}, 0x3}, {{&(0x7f0000000800)=@sco={0x1f, @none}, 0x80, &(0x7f0000000480)=[{&(0x7f0000001b40)=""/82, 0x52}], 0x1, &(0x7f0000001bc0)=""/206, 0xce}, 0x7}, {{&(0x7f0000001cc0)=@in={0x2, 0x0, @broadcast}, 0x80, &(0x7f0000000880)=[{&(0x7f0000001d40)=""/146, 0x92}, {&(0x7f0000001e00)=""/231, 0xe7}], 0x2, &(0x7f0000001f00)=""/239, 0xef}, 0x3}, {{&(0x7f0000002000)=@xdp, 0x80, &(0x7f00000020c0)=[{&(0x7f0000002080)=""/58, 0x3a}], 0x1, &(0x7f0000002100)=""/251, 0xfb}, 0x9}], 0x4, 0x40, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000002380)=ANY=[@ANYBLOB="050000004f2fe4e7fe91d1f169b7f431831544d94b6dbcca36d501829c64f0c28565fbc3e562e329d779aef804590001804797c4378192536ca659efcf0a6cb16b0ba5b79cfefdc8e93c46dfa0c119d12be6495820cc0b34645475d4da28535803ddcfd16f5df589e2f1ac230118eafd75a63c016b3a1663bc141e5ed84016b6b02854a48c0ec71a36a1ad145c5d2216e964a34cdf686b0a089443bd0f8c210860754d133e2c97ce8a25ee4d4eb5abb779387ca2cd9e870d5cb5854616c65c24f259eeaa625432fa25dd2832dc14f9a78ebf3a24277da2b55d09ed6a1dca07d4fb9ed592a64782b6939500505805d12b2776980c4b250f17b0b9a8fda266d7f084a9cd1022d2d670f793298bcf83b9a25e4ae25ac23ce06ef88068108ec131b23695772064709b1dbee85e5c2a0c4cf809dbd8b5617f8c6f6fba013f019829c83bd4cf10be5c6da663ce7cbf9b19ebd88bedb114ec207599273b55ec5f4cd35914f897ee8afc7663255678f6853e5cfa0dfa079ba560c7ddbc56e6352397b7266ac906a0ce0fb810eb00000000000000000000000000000000000000000000000000c54baf95f669d6810040c457be8ca739b4ec785f005bb4faa01270b999b6c9899cd9e8997d359b77c00a68341ca40b4c0e06884b6384ef6e", @ANYRESDEC=r0, @ANYBLOB="b21b22b0b59f1a76abb6323c16886f3d2569d595dca4af1ac9160b24b62e47302e148fa17433c275945e36a713e5fad2e8abc9651d17b22d7d092020f73d100115fed606c66c84318df7895b1e5780f3c785bfb92571cf1bc9", @ANYRES32=0x0, @ANYRES32, @ANYRES32=0x0], &(0x7f0000000300)=0x18) r5 = socket(0x1, 0x803, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8936, &(0x7f0000000080)={@rand_addr=' \x01\x00', 0x44, r4}) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) r7 = socket(0x10, 0x8000000803, 0x0) sendmsg$nl_route(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000a00)=@newlink={0x74, 0x10, 0x401, 0x3001, 0x25dfdbfc, {0x0, 0x0, 0x0, 0x0, 0x534ad, 0x42a03}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x34, 0x2, 0x0, 0x1, [@IFLA_IPVLAN_MODE={0x6, 0x1, 0x2}, @IFLA_IPVLAN_FLAGS={0x6, 0x2, 0x2}, @IFLA_IPVLAN_FLAGS={0x6, 0x2, 0x1}, @IFLA_IPVLAN_FLAGS={0x6, 0x2, 0x2}, @IFLA_IPVLAN_MODE={0x6}, @IFLA_IPVLAN_FLAGS={0x6, 0x2, 0x2}]}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x74}}, 0x0) 18:12:38 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x200000000}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x6, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) 18:12:38 executing program 2: syz_mount_image$ntfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0xd, 0x0, &(0x7f00000000c0), 0x0, &(0x7f00000013c0)={[{@fmask}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'syzkaller1\x00'}}]}) 18:12:38 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="b4050000000000006110580000000000c60000000000000095000002000000002ac73fe427abdf478e0357f2d32986f50b892b5007921cd48fe43b23be60a2dbc9778bb665510e3e22fcb26adfdc05e55a4933e62a23abb4baca4ec89323257db59db5eeda384459dd00d41b6aab85df5cab39e726769e2291b626d120a9247579f0b8edd8f16683e0623366ac632c24921d21534237743354f09cc29be2f72dfa8b05320110bcea53bb038c"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x5, 0x0) bpf$MAP_UPDATE_ELEM(0xb, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) 18:12:38 executing program 5: r0 = syz_io_uring_setup(0x3ede, &(0x7f0000000240), &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) socket$l2tp6(0xa, 0x2, 0x73) openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/locks\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READ=@pass_buffer={0x16, 0x0, 0x0, @fd_index=0x5, 0xffffffffffffffff, &(0x7f0000000040)=""/17, 0x11}, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000002040)=[{{&(0x7f0000001380)=@in6={0xa, 0x0, 0x0, @private0}, 0x80, 0x0}}], 0x1, 0x0) io_uring_enter(r0, 0x26, 0x500, 0x0, 0x0, 0x0) 18:12:38 executing program 1: syz_mount_image$ntfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x4800, 0x0, &(0x7f00000000c0), 0x218400, &(0x7f00000013c0)) 18:12:38 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="b4050000000000006110580000000000c60000000000000095000002000000002ac73fe427abdf478e0357f2d32986f50b892b5007921cd48fe43b23be60a2dbc9778bb665510e3e22fcb26adfdc05e55a4933e62a23abb4baca4ec89323257db59db5eeda384459dd00d41b6aab85df5cab39e726769e2291b626d120a9247579f0b8edd8f16683e0623366ac632c24921d21534237743354f09cc29be2f72dfa8b05320110bcea53bb038c"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x5, 0x0) bpf$MAP_UPDATE_ELEM(0xc, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) 18:12:38 executing program 2: syz_mount_image$ntfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0xe, 0x0, &(0x7f00000000c0), 0x0, &(0x7f00000013c0)={[{@fmask}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'syzkaller1\x00'}}]}) 18:12:38 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x200000000}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x7, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 547.461548][T22000] loop1: detected capacity change from 0 to 36 18:12:39 executing program 1: syz_mount_image$ntfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x4c00, 0x0, &(0x7f00000000c0), 0x218400, &(0x7f00000013c0)) 18:12:39 executing program 5: r0 = syz_io_uring_setup(0x3ede, &(0x7f0000000240), &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) socket$l2tp6(0xa, 0x2, 0x73) openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/locks\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READ=@pass_buffer={0x16, 0x0, 0x0, @fd_index=0x5, 0xffffffffffffffff, &(0x7f0000000040)=""/17, 0x11}, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000002040)=[{{&(0x7f0000001380)=@in6={0xa, 0x0, 0x0, @private0}, 0x80, 0x0}}], 0x1, 0x0) io_uring_enter(r0, 0x26, 0x600, 0x0, 0x0, 0x0) 18:12:39 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="b4050000000000006110580000000000c60000000000000095000002000000002ac73fe427abdf478e0357f2d32986f50b892b5007921cd48fe43b23be60a2dbc9778bb665510e3e22fcb26adfdc05e55a4933e62a23abb4baca4ec89323257db59db5eeda384459dd00d41b6aab85df5cab39e726769e2291b626d120a9247579f0b8edd8f16683e0623366ac632c24921d21534237743354f09cc29be2f72dfa8b05320110bcea53bb038c"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x5, 0x0) bpf$MAP_UPDATE_ELEM(0xd, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) [ 547.636941][T22002] 8021q: adding VLAN 0 to HW filter on device ipvlan32 [ 547.647512][T22011] loop1: detected capacity change from 0 to 38 [ 547.668231][T22002] team0: Device ipvlan32 is already an upper device of the team interface 18:12:39 executing program 0: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$FS_IOC_RESVSP(r0, 0x402c5828, &(0x7f00000000c0)={0x0, 0x1, 0xa8f, 0x3078}) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x200000000}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x9) preadv(r1, &(0x7f0000000240)=[{&(0x7f0000000040)=""/94, 0x5e}, {&(0x7f00000000c0)=""/93, 0x5d}, {&(0x7f0000000140)=""/58, 0x3a}], 0x3, 0xd9f, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000002340)='./file0\x00', 0x0, 0x108) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000180)={'team0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @local}, 0x14) writev(r2, &(0x7f0000000280)=[{&(0x7f00000008c0)="110eaa1a9896d57019effc8c79961d0f73ccf3afca3754e2e7a31f536bcb7204bed59311e29c96e1c2b663d61e5b0c0a76ea50cbddaa69f578b8600f77cf1a538ac900673696245b6de4283c979a2eccd71f9583dacf650575d1398678895da32663735b4d0cabfe7e972e59c2b4b4c9c89d0b82ca2267ad5062303e8abcb79600010506702eb912e3957e507aec4e2180699a738f6753509a12282a1d7181887f6c2e03de1da0dfe3b4efbb10e9b59301b4ef8a1d", 0xb5}, {&(0x7f0000000980)="34c30d95766fefbb7bdc40a3242505587bbc8584c2bc2003185f5ce116eea020efa91e2aae1eae2b8e848ac13c3dcedbbbc82adb1e70be8eecedba37be82545f2abda4f0a0e0fd0edd6bd03bb8e9bb91c39a2c828511aef3e684ad4c21ec0c146b9570139e31cd", 0x67}], 0x2) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'macvtap0\x00'}) ioctl$PPPIOCSFLAGS1(0xffffffffffffffff, 0x40047459, &(0x7f00000001c0)) recvmmsg(0xffffffffffffffff, &(0x7f0000002200)=[{{&(0x7f0000000340)=@in={0x2, 0x0, @multicast1}, 0x80, &(0x7f0000000440)=[{&(0x7f00000004c0)=""/88, 0x58}, {&(0x7f0000000b40)=""/4096, 0x1000}], 0x2, &(0x7f0000000740)=""/192, 0xc0}, 0x3}, {{&(0x7f0000000800)=@sco={0x1f, @none}, 0x80, &(0x7f0000000480)=[{&(0x7f0000001b40)=""/82, 0x52}], 0x1, &(0x7f0000001bc0)=""/206, 0xce}, 0x7}, {{&(0x7f0000001cc0)=@in={0x2, 0x0, @broadcast}, 0x80, &(0x7f0000000880)=[{&(0x7f0000001d40)=""/146, 0x92}, {&(0x7f0000001e00)=""/231, 0xe7}], 0x2, &(0x7f0000001f00)=""/239, 0xef}, 0x3}, {{&(0x7f0000002000)=@xdp, 0x80, &(0x7f00000020c0)=[{&(0x7f0000002080)=""/58, 0x3a}], 0x1, &(0x7f0000002100)=""/251, 0xfb}, 0x9}], 0x4, 0x40, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000002380)=ANY=[@ANYBLOB="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", @ANYRESDEC=r0, @ANYBLOB="b21b22b0b59f1a76abb6323c16886f3d2569d595dca4af1ac9160b24b62e47302e148fa17433c275945e36a713e5fad2e8abc9651d17b22d7d092020f73d100115fed606c66c84318df7895b1e5780f3c785bfb92571cf1bc9", @ANYRES32=0x0, @ANYRES32, @ANYRES32=0x0], &(0x7f0000000300)=0x18) r5 = socket(0x1, 0x803, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8936, &(0x7f0000000080)={@rand_addr=' \x01\x00', 0x44, r4}) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) r7 = socket(0x10, 0x8000000803, 0x0) sendmsg$nl_route(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000a00)=@newlink={0x74, 0x10, 0x401, 0x3001, 0x25dfdbfc, {0x0, 0x0, 0x0, 0x0, 0x534ad, 0x42a03}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x34, 0x2, 0x0, 0x1, [@IFLA_IPVLAN_MODE={0x6, 0x1, 0x2}, @IFLA_IPVLAN_FLAGS={0x6, 0x2, 0x2}, @IFLA_IPVLAN_FLAGS={0x6, 0x2, 0x1}, @IFLA_IPVLAN_FLAGS={0x6, 0x2, 0x2}, @IFLA_IPVLAN_MODE={0x6}, @IFLA_IPVLAN_FLAGS={0x6, 0x2, 0x2}]}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x74}}, 0x0) 18:12:39 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x200000000}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x8, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) 18:12:39 executing program 2: syz_mount_image$ntfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x10, 0x0, &(0x7f00000000c0), 0x0, &(0x7f00000013c0)={[{@fmask}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'syzkaller1\x00'}}]}) 18:12:39 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="b4050000000000006110580000000000c60000000000000095000002000000002ac73fe427abdf478e0357f2d32986f50b892b5007921cd48fe43b23be60a2dbc9778bb665510e3e22fcb26adfdc05e55a4933e62a23abb4baca4ec89323257db59db5eeda384459dd00d41b6aab85df5cab39e726769e2291b626d120a9247579f0b8edd8f16683e0623366ac632c24921d21534237743354f09cc29be2f72dfa8b05320110bcea53bb038c"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x5, 0x0) bpf$MAP_UPDATE_ELEM(0xe, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) 18:12:39 executing program 5: r0 = syz_io_uring_setup(0x3ede, &(0x7f0000000240), &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) socket$l2tp6(0xa, 0x2, 0x73) openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/locks\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READ=@pass_buffer={0x16, 0x0, 0x0, @fd_index=0x5, 0xffffffffffffffff, &(0x7f0000000040)=""/17, 0x11}, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000002040)=[{{&(0x7f0000001380)=@in6={0xa, 0x0, 0x0, @private0}, 0x80, 0x0}}], 0x1, 0x0) io_uring_enter(r0, 0x26, 0x604, 0x0, 0x0, 0x0) 18:12:39 executing program 1: syz_mount_image$ntfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x5c00, 0x0, &(0x7f00000000c0), 0x218400, &(0x7f00000013c0)) 18:12:39 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="b4050000000000006110580000000000c60000000000000095000002000000002ac73fe427abdf478e0357f2d32986f50b892b5007921cd48fe43b23be60a2dbc9778bb665510e3e22fcb26adfdc05e55a4933e62a23abb4baca4ec89323257db59db5eeda384459dd00d41b6aab85df5cab39e726769e2291b626d120a9247579f0b8edd8f16683e0623366ac632c24921d21534237743354f09cc29be2f72dfa8b05320110bcea53bb038c"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x5, 0x0) bpf$MAP_UPDATE_ELEM(0xf, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) [ 547.884128][T22022] loop1: detected capacity change from 0 to 46 [ 547.909997][T22026] __ntfs_error: 3 callbacks suppressed [ 547.910014][T22026] ntfs: (device loop2): ntfs_fill_super(): Unable to determine device size. 18:12:39 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x200000000}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x9, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) 18:12:39 executing program 5: r0 = syz_io_uring_setup(0x3ede, &(0x7f0000000240), &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) socket$l2tp6(0xa, 0x2, 0x73) openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/locks\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READ=@pass_buffer={0x16, 0x0, 0x0, @fd_index=0x5, 0xffffffffffffffff, &(0x7f0000000040)=""/17, 0x11}, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000002040)=[{{&(0x7f0000001380)=@in6={0xa, 0x0, 0x0, @private0}, 0x80, 0x0}}], 0x1, 0x0) io_uring_enter(r0, 0x26, 0x700, 0x0, 0x0, 0x0) 18:12:39 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="b4050000000000006110580000000000c60000000000000095000002000000002ac73fe427abdf478e0357f2d32986f50b892b5007921cd48fe43b23be60a2dbc9778bb665510e3e22fcb26adfdc05e55a4933e62a23abb4baca4ec89323257db59db5eeda384459dd00d41b6aab85df5cab39e726769e2291b626d120a9247579f0b8edd8f16683e0623366ac632c24921d21534237743354f09cc29be2f72dfa8b05320110bcea53bb038c"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x5, 0x0) bpf$MAP_UPDATE_ELEM(0x10, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) 18:12:39 executing program 1: syz_mount_image$ntfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x6800, 0x0, &(0x7f00000000c0), 0x218400, &(0x7f00000013c0)) 18:12:39 executing program 2: syz_mount_image$ntfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x11, 0x0, &(0x7f00000000c0), 0x0, &(0x7f00000013c0)={[{@fmask}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'syzkaller1\x00'}}]}) [ 548.059182][T22027] 8021q: adding VLAN 0 to HW filter on device ipvlan32 [ 548.092683][T22027] team0: Device ipvlan32 is already an upper device of the team interface [ 548.124074][T22039] loop1: detected capacity change from 0 to 52 [ 548.130140][T22038] ntfs: (device loop2): ntfs_fill_super(): Unable to determine device size. 18:12:39 executing program 0: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$FS_IOC_RESVSP(r0, 0x402c5828, &(0x7f00000000c0)={0x0, 0x1, 0xa8f, 0x3078}) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x200000000}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x9) preadv(r1, &(0x7f0000000240)=[{&(0x7f0000000040)=""/94, 0x5e}, {&(0x7f00000000c0)=""/93, 0x5d}, {&(0x7f0000000140)=""/58, 0x3a}], 0x3, 0xd9f, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000002340)='./file0\x00', 0x0, 0x108) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000180)={'team0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @local}, 0x14) writev(r2, &(0x7f0000000280)=[{&(0x7f00000008c0)="110eaa1a9896d57019effc8c79961d0f73ccf3afca3754e2e7a31f536bcb7204bed59311e29c96e1c2b663d61e5b0c0a76ea50cbddaa69f578b8600f77cf1a538ac900673696245b6de4283c979a2eccd71f9583dacf650575d1398678895da32663735b4d0cabfe7e972e59c2b4b4c9c89d0b82ca2267ad5062303e8abcb79600010506702eb912e3957e507aec4e2180699a738f6753509a12282a1d7181887f6c2e03de1da0dfe3b4efbb10e9b59301b4ef8a1d", 0xb5}, {&(0x7f0000000980)="34c30d95766fefbb7bdc40a3242505587bbc8584c2bc2003185f5ce116eea020efa91e2aae1eae2b8e848ac13c3dcedbbbc82adb1e70be8eecedba37be82545f2abda4f0a0e0fd0edd6bd03bb8e9bb91c39a2c828511aef3e684ad4c21ec0c146b9570139e31cd", 0x67}], 0x2) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'macvtap0\x00'}) ioctl$PPPIOCSFLAGS1(0xffffffffffffffff, 0x40047459, &(0x7f00000001c0)) recvmmsg(0xffffffffffffffff, &(0x7f0000002200)=[{{&(0x7f0000000340)=@in={0x2, 0x0, @multicast1}, 0x80, &(0x7f0000000440)=[{&(0x7f00000004c0)=""/88, 0x58}, {&(0x7f0000000b40)=""/4096, 0x1000}], 0x2, &(0x7f0000000740)=""/192, 0xc0}, 0x3}, {{&(0x7f0000000800)=@sco={0x1f, @none}, 0x80, &(0x7f0000000480)=[{&(0x7f0000001b40)=""/82, 0x52}], 0x1, &(0x7f0000001bc0)=""/206, 0xce}, 0x7}, {{&(0x7f0000001cc0)=@in={0x2, 0x0, @broadcast}, 0x80, &(0x7f0000000880)=[{&(0x7f0000001d40)=""/146, 0x92}, {&(0x7f0000001e00)=""/231, 0xe7}], 0x2, &(0x7f0000001f00)=""/239, 0xef}, 0x3}, {{&(0x7f0000002000)=@xdp, 0x80, &(0x7f00000020c0)=[{&(0x7f0000002080)=""/58, 0x3a}], 0x1, &(0x7f0000002100)=""/251, 0xfb}, 0x9}], 0x4, 0x40, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000002380)=ANY=[@ANYBLOB="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", @ANYRESDEC=r0, @ANYBLOB="b21b22b0b59f1a76abb6323c16886f3d2569d595dca4af1ac9160b24b62e47302e148fa17433c275945e36a713e5fad2e8abc9651d17b22d7d092020f73d100115fed606c66c84318df7895b1e5780f3c785bfb92571cf1bc9", @ANYRES32=0x0, @ANYRES32, @ANYRES32=0x0], &(0x7f0000000300)=0x18) r5 = socket(0x1, 0x803, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8936, &(0x7f0000000080)={@rand_addr=' \x01\x00', 0x44, r4}) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) r7 = socket(0x10, 0x8000000803, 0x0) sendmsg$nl_route(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000a00)=@newlink={0x74, 0x10, 0x401, 0x3001, 0x25dfdbfc, {0x0, 0x0, 0x0, 0x0, 0x534ad, 0x42a03}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x34, 0x2, 0x0, 0x1, [@IFLA_IPVLAN_MODE={0x6, 0x1, 0x2}, @IFLA_IPVLAN_FLAGS={0x6, 0x2, 0x2}, @IFLA_IPVLAN_FLAGS={0x6, 0x2, 0x1}, @IFLA_IPVLAN_FLAGS={0x6, 0x2, 0x2}, @IFLA_IPVLAN_MODE={0x6}, @IFLA_IPVLAN_FLAGS={0x6, 0x2, 0x2}]}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x74}}, 0x0) 18:12:39 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x200000000}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0xa, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) 18:12:39 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="b4050000000000006110580000000000c60000000000000095000002000000002ac73fe427abdf478e0357f2d32986f50b892b5007921cd48fe43b23be60a2dbc9778bb665510e3e22fcb26adfdc05e55a4933e62a23abb4baca4ec89323257db59db5eeda384459dd00d41b6aab85df5cab39e726769e2291b626d120a9247579f0b8edd8f16683e0623366ac632c24921d21534237743354f09cc29be2f72dfa8b05320110bcea53bb038c"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x5, 0x0) bpf$MAP_UPDATE_ELEM(0x11, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) 18:12:39 executing program 5: r0 = syz_io_uring_setup(0x3ede, &(0x7f0000000240), &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) socket$l2tp6(0xa, 0x2, 0x73) openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/locks\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READ=@pass_buffer={0x16, 0x0, 0x0, @fd_index=0x5, 0xffffffffffffffff, &(0x7f0000000040)=""/17, 0x11}, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000002040)=[{{&(0x7f0000001380)=@in6={0xa, 0x0, 0x0, @private0}, 0x80, 0x0}}], 0x1, 0x0) io_uring_enter(r0, 0x26, 0x900, 0x0, 0x0, 0x0) 18:12:39 executing program 2: syz_mount_image$ntfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x12, 0x0, &(0x7f00000000c0), 0x0, &(0x7f00000013c0)={[{@fmask}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'syzkaller1\x00'}}]}) 18:12:39 executing program 1: syz_mount_image$ntfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x6c00, 0x0, &(0x7f00000000c0), 0x218400, &(0x7f00000013c0)) [ 548.352731][T22047] ntfs: (device loop2): ntfs_fill_super(): Unable to determine device size. [ 548.360153][T22046] loop1: detected capacity change from 0 to 54 18:12:39 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="b4050000000000006110580000000000c60000000000000095000002000000002ac73fe427abdf478e0357f2d32986f50b892b5007921cd48fe43b23be60a2dbc9778bb665510e3e22fcb26adfdc05e55a4933e62a23abb4baca4ec89323257db59db5eeda384459dd00d41b6aab85df5cab39e726769e2291b626d120a9247579f0b8edd8f16683e0623366ac632c24921d21534237743354f09cc29be2f72dfa8b05320110bcea53bb038c"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x5, 0x0) bpf$MAP_UPDATE_ELEM(0x12, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) 18:12:39 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x200000000}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0xb, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) 18:12:39 executing program 5: r0 = syz_io_uring_setup(0x3ede, &(0x7f0000000240), &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) socket$l2tp6(0xa, 0x2, 0x73) openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/locks\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READ=@pass_buffer={0x16, 0x0, 0x0, @fd_index=0x5, 0xffffffffffffffff, &(0x7f0000000040)=""/17, 0x11}, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000002040)=[{{&(0x7f0000001380)=@in6={0xa, 0x0, 0x0, @private0}, 0x80, 0x0}}], 0x1, 0x0) io_uring_enter(r0, 0x26, 0xa00, 0x0, 0x0, 0x0) 18:12:40 executing program 1: syz_mount_image$ntfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x710c, 0x0, &(0x7f00000000c0), 0x218400, &(0x7f00000013c0)) 18:12:40 executing program 2: syz_mount_image$ntfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x18, 0x0, &(0x7f00000000c0), 0x0, &(0x7f00000013c0)={[{@fmask}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'syzkaller1\x00'}}]}) 18:12:40 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="b4050000000000006110580000000000c60000000000000095000002000000002ac73fe427abdf478e0357f2d32986f50b892b5007921cd48fe43b23be60a2dbc9778bb665510e3e22fcb26adfdc05e55a4933e62a23abb4baca4ec89323257db59db5eeda384459dd00d41b6aab85df5cab39e726769e2291b626d120a9247579f0b8edd8f16683e0623366ac632c24921d21534237743354f09cc29be2f72dfa8b05320110bcea53bb038c"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x5, 0x0) bpf$MAP_UPDATE_ELEM(0x13, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) [ 548.520086][T22051] 8021q: adding VLAN 0 to HW filter on device ipvlan32 [ 548.579700][T22051] team0: Device ipvlan32 is already an upper device of the team interface [ 548.649636][T22062] loop1: detected capacity change from 0 to 56 [ 548.659874][T22061] ntfs: (device loop2): ntfs_fill_super(): Unable to determine device size. 18:12:40 executing program 1: syz_mount_image$ntfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x7400, 0x0, &(0x7f00000000c0), 0x218400, &(0x7f00000013c0)) 18:12:40 executing program 5: r0 = syz_io_uring_setup(0x3ede, &(0x7f0000000240), &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) socket$l2tp6(0xa, 0x2, 0x73) openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/locks\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READ=@pass_buffer={0x16, 0x0, 0x0, @fd_index=0x5, 0xffffffffffffffff, &(0x7f0000000040)=""/17, 0x11}, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000002040)=[{{&(0x7f0000001380)=@in6={0xa, 0x0, 0x0, @private0}, 0x80, 0x0}}], 0x1, 0x0) io_uring_enter(r0, 0x26, 0xb00, 0x0, 0x0, 0x0) 18:12:40 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x200000000}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0xc, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) 18:12:40 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="b4050000000000006110580000000000c60000000000000095000002000000002ac73fe427abdf478e0357f2d32986f50b892b5007921cd48fe43b23be60a2dbc9778bb665510e3e22fcb26adfdc05e55a4933e62a23abb4baca4ec89323257db59db5eeda384459dd00d41b6aab85df5cab39e726769e2291b626d120a9247579f0b8edd8f16683e0623366ac632c24921d21534237743354f09cc29be2f72dfa8b05320110bcea53bb038c"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x5, 0x0) bpf$MAP_UPDATE_ELEM(0x14, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) 18:12:40 executing program 0: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$FS_IOC_RESVSP(r0, 0x402c5828, &(0x7f00000000c0)={0x0, 0x1, 0xa8f, 0x3078}) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x200000000}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x9) preadv(r1, &(0x7f0000000240)=[{&(0x7f0000000040)=""/94, 0x5e}, {&(0x7f00000000c0)=""/93, 0x5d}, {&(0x7f0000000140)=""/58, 0x3a}], 0x3, 0xd9f, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000002340)='./file0\x00', 0x0, 0x108) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000180)={'team0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @local}, 0x14) writev(r2, &(0x7f0000000280)=[{&(0x7f00000008c0)="110eaa1a9896d57019effc8c79961d0f73ccf3afca3754e2e7a31f536bcb7204bed59311e29c96e1c2b663d61e5b0c0a76ea50cbddaa69f578b8600f77cf1a538ac900673696245b6de4283c979a2eccd71f9583dacf650575d1398678895da32663735b4d0cabfe7e972e59c2b4b4c9c89d0b82ca2267ad5062303e8abcb79600010506702eb912e3957e507aec4e2180699a738f6753509a12282a1d7181887f6c2e03de1da0dfe3b4efbb10e9b59301b4ef8a1d", 0xb5}, {&(0x7f0000000980)="34c30d95766fefbb7bdc40a3242505587bbc8584c2bc2003185f5ce116eea020efa91e2aae1eae2b8e848ac13c3dcedbbbc82adb1e70be8eecedba37be82545f2abda4f0a0e0fd0edd6bd03bb8e9bb91c39a2c828511aef3e684ad4c21ec0c146b9570139e31cd", 0x67}], 0x2) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'macvtap0\x00'}) ioctl$PPPIOCSFLAGS1(0xffffffffffffffff, 0x40047459, &(0x7f00000001c0)) recvmmsg(0xffffffffffffffff, &(0x7f0000002200)=[{{&(0x7f0000000340)=@in={0x2, 0x0, @multicast1}, 0x80, &(0x7f0000000440)=[{&(0x7f00000004c0)=""/88, 0x58}, {&(0x7f0000000b40)=""/4096, 0x1000}], 0x2, &(0x7f0000000740)=""/192, 0xc0}, 0x3}, {{&(0x7f0000000800)=@sco={0x1f, @none}, 0x80, &(0x7f0000000480)=[{&(0x7f0000001b40)=""/82, 0x52}], 0x1, &(0x7f0000001bc0)=""/206, 0xce}, 0x7}, {{&(0x7f0000001cc0)=@in={0x2, 0x0, @broadcast}, 0x80, &(0x7f0000000880)=[{&(0x7f0000001d40)=""/146, 0x92}, {&(0x7f0000001e00)=""/231, 0xe7}], 0x2, &(0x7f0000001f00)=""/239, 0xef}, 0x3}, {{&(0x7f0000002000)=@xdp, 0x80, &(0x7f00000020c0)=[{&(0x7f0000002080)=""/58, 0x3a}], 0x1, &(0x7f0000002100)=""/251, 0xfb}, 0x9}], 0x4, 0x40, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000002380)=ANY=[@ANYBLOB="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", @ANYRESDEC=r0, @ANYBLOB="b21b22b0b59f1a76abb6323c16886f3d2569d595dca4af1ac9160b24b62e47302e148fa17433c275945e36a713e5fad2e8abc9651d17b22d7d092020f73d100115fed606c66c84318df7895b1e5780f3c785bfb92571cf1bc9", @ANYRES32=0x0, @ANYRES32, @ANYRES32=0x0], &(0x7f0000000300)=0x18) r5 = socket(0x1, 0x803, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8936, &(0x7f0000000080)={@rand_addr=' \x01\x00', 0x44, r4}) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) r7 = socket(0x10, 0x8000000803, 0x0) sendmsg$nl_route(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000a00)=@newlink={0x7c, 0x10, 0x401, 0x3001, 0x25dfdbfc, {0x0, 0x0, 0x0, 0x0, 0x534ad, 0x42a03}, [@IFLA_LINKINFO={0x4c, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x3c, 0x2, 0x0, 0x1, [@IFLA_IPVLAN_MODE={0x6, 0x1, 0x2}, @IFLA_IPVLAN_FLAGS={0x6, 0x2, 0x2}, @IFLA_IPVLAN_FLAGS={0x6, 0x2, 0x1}, @IFLA_IPVLAN_FLAGS={0x6, 0x2, 0x2}, @IFLA_IPVLAN_FLAGS={0x6}, @IFLA_IPVLAN_MODE={0x6}, @IFLA_IPVLAN_FLAGS={0x6, 0x2, 0x2}]}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x7c}}, 0x0) 18:12:40 executing program 2: syz_mount_image$ntfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x21, 0x0, &(0x7f00000000c0), 0x0, &(0x7f00000013c0)={[{@fmask}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'syzkaller1\x00'}}]}) 18:12:40 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="b4050000000000006110580000000000c60000000000000095000002000000002ac73fe427abdf478e0357f2d32986f50b892b5007921cd48fe43b23be60a2dbc9778bb665510e3e22fcb26adfdc05e55a4933e62a23abb4baca4ec89323257db59db5eeda384459dd00d41b6aab85df5cab39e726769e2291b626d120a9247579f0b8edd8f16683e0623366ac632c24921d21534237743354f09cc29be2f72dfa8b05320110bcea53bb038c"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x5, 0x0) bpf$MAP_UPDATE_ELEM(0x15, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) [ 548.862806][T22069] ntfs: (device loop2): ntfs_fill_super(): Unable to determine device size. 18:12:40 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x200000000}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0xd, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) 18:12:40 executing program 5: r0 = syz_io_uring_setup(0x3ede, &(0x7f0000000240), &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) socket$l2tp6(0xa, 0x2, 0x73) openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/locks\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READ=@pass_buffer={0x16, 0x0, 0x0, @fd_index=0x5, 0xffffffffffffffff, &(0x7f0000000040)=""/17, 0x11}, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000002040)=[{{&(0x7f0000001380)=@in6={0xa, 0x0, 0x0, @private0}, 0x80, 0x0}}], 0x1, 0x0) io_uring_enter(r0, 0x26, 0xc00, 0x0, 0x0, 0x0) [ 548.961320][T22075] loop1: detected capacity change from 0 to 58 [ 549.047700][T22073] 8021q: adding VLAN 0 to HW filter on device ipvlan32 18:12:40 executing program 2: syz_mount_image$ntfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x25, 0x0, &(0x7f00000000c0), 0x0, &(0x7f00000013c0)={[{@fmask}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'syzkaller1\x00'}}]}) 18:12:40 executing program 1: syz_mount_image$ntfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x7a00, 0x0, &(0x7f00000000c0), 0x218400, &(0x7f00000013c0)) [ 549.099201][T22073] team0: Device ipvlan32 is already an upper device of the team interface 18:12:40 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="b4050000000000006110580000000000c60000000000000095000002000000002ac73fe427abdf478e0357f2d32986f50b892b5007921cd48fe43b23be60a2dbc9778bb665510e3e22fcb26adfdc05e55a4933e62a23abb4baca4ec89323257db59db5eeda384459dd00d41b6aab85df5cab39e726769e2291b626d120a9247579f0b8edd8f16683e0623366ac632c24921d21534237743354f09cc29be2f72dfa8b05320110bcea53bb038c"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x5, 0x0) bpf$MAP_UPDATE_ELEM(0x16, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) 18:12:40 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x200000000}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0xe, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) 18:12:40 executing program 5: r0 = syz_io_uring_setup(0x3ede, &(0x7f0000000240), &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) socket$l2tp6(0xa, 0x2, 0x73) openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/locks\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READ=@pass_buffer={0x16, 0x0, 0x0, @fd_index=0x5, 0xffffffffffffffff, &(0x7f0000000040)=""/17, 0x11}, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000002040)=[{{&(0x7f0000001380)=@in6={0xa, 0x0, 0x0, @private0}, 0x80, 0x0}}], 0x1, 0x0) io_uring_enter(r0, 0x26, 0xd00, 0x0, 0x0, 0x0) [ 549.226221][T22085] ntfs: (device loop2): ntfs_fill_super(): Unable to determine device size. [ 549.227281][T22086] loop1: detected capacity change from 0 to 61 18:12:40 executing program 0: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$FS_IOC_RESVSP(r0, 0x402c5828, &(0x7f00000000c0)={0x0, 0x1, 0xa8f, 0x3078}) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x200000000}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x9) preadv(r1, &(0x7f0000000240)=[{&(0x7f0000000040)=""/94, 0x5e}, {&(0x7f00000000c0)=""/93, 0x5d}, {&(0x7f0000000140)=""/58, 0x3a}], 0x3, 0xd9f, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000002340)='./file0\x00', 0x0, 0x108) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000180)={'team0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @local}, 0x14) writev(r2, &(0x7f0000000280)=[{&(0x7f00000008c0)="110eaa1a9896d57019effc8c79961d0f73ccf3afca3754e2e7a31f536bcb7204bed59311e29c96e1c2b663d61e5b0c0a76ea50cbddaa69f578b8600f77cf1a538ac900673696245b6de4283c979a2eccd71f9583dacf650575d1398678895da32663735b4d0cabfe7e972e59c2b4b4c9c89d0b82ca2267ad5062303e8abcb79600010506702eb912e3957e507aec4e2180699a738f6753509a12282a1d7181887f6c2e03de1da0dfe3b4efbb10e9b59301b4ef8a1d", 0xb5}, {&(0x7f0000000980)="34c30d95766fefbb7bdc40a3242505587bbc8584c2bc2003185f5ce116eea020efa91e2aae1eae2b8e848ac13c3dcedbbbc82adb1e70be8eecedba37be82545f2abda4f0a0e0fd0edd6bd03bb8e9bb91c39a2c828511aef3e684ad4c21ec0c146b9570139e31cd", 0x67}], 0x2) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'macvtap0\x00'}) ioctl$PPPIOCSFLAGS1(0xffffffffffffffff, 0x40047459, &(0x7f00000001c0)) recvmmsg(0xffffffffffffffff, &(0x7f0000002200)=[{{&(0x7f0000000340)=@in={0x2, 0x0, @multicast1}, 0x80, &(0x7f0000000440)=[{&(0x7f00000004c0)=""/88, 0x58}, {&(0x7f0000000b40)=""/4096, 0x1000}], 0x2, &(0x7f0000000740)=""/192, 0xc0}, 0x3}, {{&(0x7f0000000800)=@sco={0x1f, @none}, 0x80, &(0x7f0000000480)=[{&(0x7f0000001b40)=""/82, 0x52}], 0x1, &(0x7f0000001bc0)=""/206, 0xce}, 0x7}, {{&(0x7f0000001cc0)=@in={0x2, 0x0, @broadcast}, 0x80, &(0x7f0000000880)=[{&(0x7f0000001d40)=""/146, 0x92}, {&(0x7f0000001e00)=""/231, 0xe7}], 0x2, &(0x7f0000001f00)=""/239, 0xef}, 0x3}, {{&(0x7f0000002000)=@xdp, 0x80, &(0x7f00000020c0)=[{&(0x7f0000002080)=""/58, 0x3a}], 0x1, &(0x7f0000002100)=""/251, 0xfb}, 0x9}], 0x4, 0x40, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000002380)=ANY=[@ANYBLOB="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", @ANYRESDEC=r0, @ANYBLOB="b21b22b0b59f1a76abb6323c16886f3d2569d595dca4af1ac9160b24b62e47302e148fa17433c275945e36a713e5fad2e8abc9651d17b22d7d092020f73d100115fed606c66c84318df7895b1e5780f3c785bfb92571cf1bc9", @ANYRES32=0x0, @ANYRES32, @ANYRES32=0x0], &(0x7f0000000300)=0x18) r5 = socket(0x1, 0x803, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8936, &(0x7f0000000080)={@rand_addr=' \x01\x00', 0x44, r4}) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) r7 = socket(0x10, 0x8000000803, 0x0) sendmsg$nl_route(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000a00)=@newlink={0x7c, 0x10, 0x401, 0x3001, 0x25dfdbfc, {0x0, 0x0, 0x0, 0x0, 0x534ad, 0x42a03}, [@IFLA_LINKINFO={0x4c, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x3c, 0x2, 0x0, 0x1, [@IFLA_IPVLAN_MODE={0x6, 0x1, 0x2}, @IFLA_IPVLAN_FLAGS={0x6, 0x2, 0x2}, @IFLA_IPVLAN_FLAGS={0x6, 0x2, 0x1}, @IFLA_IPVLAN_FLAGS={0x6, 0x2, 0x2}, @IFLA_IPVLAN_FLAGS={0x6}, @IFLA_IPVLAN_MODE={0x6}, @IFLA_IPVLAN_FLAGS={0x6, 0x2, 0x2}]}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x7c}}, 0x0) 18:12:40 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="b4050000000000006110580000000000c60000000000000095000002000000002ac73fe427abdf478e0357f2d32986f50b892b5007921cd48fe43b23be60a2dbc9778bb665510e3e22fcb26adfdc05e55a4933e62a23abb4baca4ec89323257db59db5eeda384459dd00d41b6aab85df5cab39e726769e2291b626d120a9247579f0b8edd8f16683e0623366ac632c24921d21534237743354f09cc29be2f72dfa8b05320110bcea53bb038c"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x5, 0x0) bpf$MAP_UPDATE_ELEM(0x17, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) 18:12:40 executing program 2: syz_mount_image$ntfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x48, 0x0, &(0x7f00000000c0), 0x0, &(0x7f00000013c0)={[{@fmask}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'syzkaller1\x00'}}]}) 18:12:40 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x200000000}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0xf, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 549.459719][T22094] 8021q: adding VLAN 0 to HW filter on device ipvlan32 18:12:41 executing program 5: r0 = syz_io_uring_setup(0x3ede, &(0x7f0000000240), &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) socket$l2tp6(0xa, 0x2, 0x73) openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/locks\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READ=@pass_buffer={0x16, 0x0, 0x0, @fd_index=0x5, 0xffffffffffffffff, &(0x7f0000000040)=""/17, 0x11}, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000002040)=[{{&(0x7f0000001380)=@in6={0xa, 0x0, 0x0, @private0}, 0x80, 0x0}}], 0x1, 0x0) io_uring_enter(r0, 0x26, 0xe00, 0x0, 0x0, 0x0) 18:12:41 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="b4050000000000006110580000000000c60000000000000095000002000000002ac73fe427abdf478e0357f2d32986f50b892b5007921cd48fe43b23be60a2dbc9778bb665510e3e22fcb26adfdc05e55a4933e62a23abb4baca4ec89323257db59db5eeda384459dd00d41b6aab85df5cab39e726769e2291b626d120a9247579f0b8edd8f16683e0623366ac632c24921d21534237743354f09cc29be2f72dfa8b05320110bcea53bb038c"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x5, 0x0) bpf$MAP_UPDATE_ELEM(0x18, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) [ 549.514804][T22097] ntfs: (device loop2): ntfs_fill_super(): Unable to determine device size. [ 549.538656][T22094] team0: Device ipvlan32 is already an upper device of the team interface 18:12:41 executing program 1: syz_mount_image$ntfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x9d0b, 0x0, &(0x7f00000000c0), 0x218400, &(0x7f00000013c0)) 18:12:41 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x200000000}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x10, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) 18:12:41 executing program 2: syz_mount_image$ntfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x4c, 0x0, &(0x7f00000000c0), 0x0, &(0x7f00000013c0)={[{@fmask}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'syzkaller1\x00'}}]}) 18:12:41 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="b4050000000000006110580000000000c60000000000000095000002000000002ac73fe427abdf478e0357f2d32986f50b892b5007921cd48fe43b23be60a2dbc9778bb665510e3e22fcb26adfdc05e55a4933e62a23abb4baca4ec89323257db59db5eeda384459dd00d41b6aab85df5cab39e726769e2291b626d120a9247579f0b8edd8f16683e0623366ac632c24921d21534237743354f09cc29be2f72dfa8b05320110bcea53bb038c"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x5, 0x0) bpf$MAP_UPDATE_ELEM(0x19, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) [ 549.714192][T22106] loop1: detected capacity change from 0 to 78 18:12:41 executing program 0: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$FS_IOC_RESVSP(r0, 0x402c5828, &(0x7f00000000c0)={0x0, 0x1, 0xa8f, 0x3078}) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x200000000}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x9) preadv(r1, &(0x7f0000000240)=[{&(0x7f0000000040)=""/94, 0x5e}, {&(0x7f00000000c0)=""/93, 0x5d}, {&(0x7f0000000140)=""/58, 0x3a}], 0x3, 0xd9f, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000002340)='./file0\x00', 0x0, 0x108) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000180)={'team0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @local}, 0x14) writev(r2, &(0x7f0000000280)=[{&(0x7f00000008c0)="110eaa1a9896d57019effc8c79961d0f73ccf3afca3754e2e7a31f536bcb7204bed59311e29c96e1c2b663d61e5b0c0a76ea50cbddaa69f578b8600f77cf1a538ac900673696245b6de4283c979a2eccd71f9583dacf650575d1398678895da32663735b4d0cabfe7e972e59c2b4b4c9c89d0b82ca2267ad5062303e8abcb79600010506702eb912e3957e507aec4e2180699a738f6753509a12282a1d7181887f6c2e03de1da0dfe3b4efbb10e9b59301b4ef8a1d", 0xb5}, {&(0x7f0000000980)="34c30d95766fefbb7bdc40a3242505587bbc8584c2bc2003185f5ce116eea020efa91e2aae1eae2b8e848ac13c3dcedbbbc82adb1e70be8eecedba37be82545f2abda4f0a0e0fd0edd6bd03bb8e9bb91c39a2c828511aef3e684ad4c21ec0c146b9570139e31cd", 0x67}], 0x2) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'macvtap0\x00'}) ioctl$PPPIOCSFLAGS1(0xffffffffffffffff, 0x40047459, &(0x7f00000001c0)) recvmmsg(0xffffffffffffffff, &(0x7f0000002200)=[{{&(0x7f0000000340)=@in={0x2, 0x0, @multicast1}, 0x80, &(0x7f0000000440)=[{&(0x7f00000004c0)=""/88, 0x58}, {&(0x7f0000000b40)=""/4096, 0x1000}], 0x2, &(0x7f0000000740)=""/192, 0xc0}, 0x3}, {{&(0x7f0000000800)=@sco={0x1f, @none}, 0x80, &(0x7f0000000480)=[{&(0x7f0000001b40)=""/82, 0x52}], 0x1, &(0x7f0000001bc0)=""/206, 0xce}, 0x7}, {{&(0x7f0000001cc0)=@in={0x2, 0x0, @broadcast}, 0x80, &(0x7f0000000880)=[{&(0x7f0000001d40)=""/146, 0x92}, {&(0x7f0000001e00)=""/231, 0xe7}], 0x2, &(0x7f0000001f00)=""/239, 0xef}, 0x3}, {{&(0x7f0000002000)=@xdp, 0x80, &(0x7f00000020c0)=[{&(0x7f0000002080)=""/58, 0x3a}], 0x1, &(0x7f0000002100)=""/251, 0xfb}, 0x9}], 0x4, 0x40, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000002380)=ANY=[@ANYBLOB="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", @ANYRESDEC=r0, @ANYBLOB="b21b22b0b59f1a76abb6323c16886f3d2569d595dca4af1ac9160b24b62e47302e148fa17433c275945e36a713e5fad2e8abc9651d17b22d7d092020f73d100115fed606c66c84318df7895b1e5780f3c785bfb92571cf1bc9", @ANYRES32=0x0, @ANYRES32, @ANYRES32=0x0], &(0x7f0000000300)=0x18) r5 = socket(0x1, 0x803, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8936, &(0x7f0000000080)={@rand_addr=' \x01\x00', 0x44, r4}) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) r7 = socket(0x10, 0x8000000803, 0x0) sendmsg$nl_route(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000a00)=@newlink={0x7c, 0x10, 0x401, 0x3001, 0x25dfdbfc, {0x0, 0x0, 0x0, 0x0, 0x534ad, 0x42a03}, [@IFLA_LINKINFO={0x4c, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x3c, 0x2, 0x0, 0x1, [@IFLA_IPVLAN_MODE={0x6, 0x1, 0x2}, @IFLA_IPVLAN_FLAGS={0x6, 0x2, 0x2}, @IFLA_IPVLAN_FLAGS={0x6, 0x2, 0x1}, @IFLA_IPVLAN_FLAGS={0x6, 0x2, 0x2}, @IFLA_IPVLAN_FLAGS={0x6}, @IFLA_IPVLAN_MODE={0x6}, @IFLA_IPVLAN_FLAGS={0x6, 0x2, 0x2}]}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x7c}}, 0x0) 18:12:41 executing program 5: r0 = syz_io_uring_setup(0x3ede, &(0x7f0000000240), &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) socket$l2tp6(0xa, 0x2, 0x73) openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/locks\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READ=@pass_buffer={0x16, 0x0, 0x0, @fd_index=0x5, 0xffffffffffffffff, &(0x7f0000000040)=""/17, 0x11}, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000002040)=[{{&(0x7f0000001380)=@in6={0xa, 0x0, 0x0, @private0}, 0x80, 0x0}}], 0x1, 0x0) io_uring_enter(r0, 0x26, 0xf00, 0x0, 0x0, 0x0) 18:12:41 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x200000000}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x11, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 549.788737][T22111] ntfs: (device loop2): ntfs_fill_super(): Unable to determine device size. 18:12:41 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="b4050000000000006110580000000000c60000000000000095000002000000002ac73fe427abdf478e0357f2d32986f50b892b5007921cd48fe43b23be60a2dbc9778bb665510e3e22fcb26adfdc05e55a4933e62a23abb4baca4ec89323257db59db5eeda384459dd00d41b6aab85df5cab39e726769e2291b626d120a9247579f0b8edd8f16683e0623366ac632c24921d21534237743354f09cc29be2f72dfa8b05320110bcea53bb038c"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x5, 0x0) bpf$MAP_UPDATE_ELEM(0x1a, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) 18:12:41 executing program 1: syz_mount_image$ntfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0xdb00, 0x0, &(0x7f00000000c0), 0x218400, &(0x7f00000013c0)) 18:12:41 executing program 2: syz_mount_image$ntfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x5c, 0x0, &(0x7f00000000c0), 0x0, &(0x7f00000013c0)={[{@fmask}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'syzkaller1\x00'}}]}) 18:12:41 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x200000000}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x12, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 549.922391][T22114] 8021q: adding VLAN 0 to HW filter on device ipvlan32 [ 549.954742][T22114] team0: Device ipvlan32 is already an upper device of the team interface 18:12:41 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="b4050000000000006110580000000000c60000000000000095000002000000002ac73fe427abdf478e0357f2d32986f50b892b5007921cd48fe43b23be60a2dbc9778bb665510e3e22fcb26adfdc05e55a4933e62a23abb4baca4ec89323257db59db5eeda384459dd00d41b6aab85df5cab39e726769e2291b626d120a9247579f0b8edd8f16683e0623366ac632c24921d21534237743354f09cc29be2f72dfa8b05320110bcea53bb038c"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x5, 0x0) bpf$MAP_UPDATE_ELEM(0x1b, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) 18:12:41 executing program 5: r0 = syz_io_uring_setup(0x3ede, &(0x7f0000000240), &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) socket$l2tp6(0xa, 0x2, 0x73) openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/locks\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READ=@pass_buffer={0x16, 0x0, 0x0, @fd_index=0x5, 0xffffffffffffffff, &(0x7f0000000040)=""/17, 0x11}, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000002040)=[{{&(0x7f0000001380)=@in6={0xa, 0x0, 0x0, @private0}, 0x80, 0x0}}], 0x1, 0x0) io_uring_enter(r0, 0x26, 0x1100, 0x0, 0x0, 0x0) [ 550.013824][T22126] loop1: detected capacity change from 0 to 109 [ 550.032090][T22125] ntfs: (device loop2): ntfs_fill_super(): Unable to determine device size. 18:12:41 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x200000000}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x18, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) 18:12:41 executing program 0: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$FS_IOC_RESVSP(r0, 0x402c5828, &(0x7f00000000c0)={0x0, 0x1, 0xa8f, 0x3078}) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x200000000}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x9) preadv(r1, &(0x7f0000000240)=[{&(0x7f0000000040)=""/94, 0x5e}, {&(0x7f00000000c0)=""/93, 0x5d}, {&(0x7f0000000140)=""/58, 0x3a}], 0x3, 0xd9f, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000002340)='./file0\x00', 0x0, 0x108) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000180)={'team0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @local}, 0x14) writev(r2, &(0x7f0000000280)=[{&(0x7f00000008c0)="110eaa1a9896d57019effc8c79961d0f73ccf3afca3754e2e7a31f536bcb7204bed59311e29c96e1c2b663d61e5b0c0a76ea50cbddaa69f578b8600f77cf1a538ac900673696245b6de4283c979a2eccd71f9583dacf650575d1398678895da32663735b4d0cabfe7e972e59c2b4b4c9c89d0b82ca2267ad5062303e8abcb79600010506702eb912e3957e507aec4e2180699a738f6753509a12282a1d7181887f6c2e03de1da0dfe3b4efbb10e9b59301b4ef8a1d", 0xb5}, {&(0x7f0000000980)="34c30d95766fefbb7bdc40a3242505587bbc8584c2bc2003185f5ce116eea020efa91e2aae1eae2b8e848ac13c3dcedbbbc82adb1e70be8eecedba37be82545f2abda4f0a0e0fd0edd6bd03bb8e9bb91c39a2c828511aef3e684ad4c21ec0c146b9570139e31cd", 0x67}], 0x2) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'macvtap0\x00'}) ioctl$PPPIOCSFLAGS1(0xffffffffffffffff, 0x40047459, &(0x7f00000001c0)) recvmmsg(0xffffffffffffffff, &(0x7f0000002200)=[{{&(0x7f0000000340)=@in={0x2, 0x0, @multicast1}, 0x80, &(0x7f0000000440)=[{&(0x7f00000004c0)=""/88, 0x58}, {&(0x7f0000000b40)=""/4096, 0x1000}], 0x2, &(0x7f0000000740)=""/192, 0xc0}, 0x3}, {{&(0x7f0000000800)=@sco={0x1f, @none}, 0x80, &(0x7f0000000480)=[{&(0x7f0000001b40)=""/82, 0x52}], 0x1, &(0x7f0000001bc0)=""/206, 0xce}, 0x7}, {{&(0x7f0000001cc0)=@in={0x2, 0x0, @broadcast}, 0x80, &(0x7f0000000880)=[{&(0x7f0000001d40)=""/146, 0x92}, {&(0x7f0000001e00)=""/231, 0xe7}], 0x2, &(0x7f0000001f00)=""/239, 0xef}, 0x3}, {{&(0x7f0000002000)=@xdp, 0x80, &(0x7f00000020c0)=[{&(0x7f0000002080)=""/58, 0x3a}], 0x1, &(0x7f0000002100)=""/251, 0xfb}, 0x9}], 0x4, 0x40, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000002380)=ANY=[@ANYBLOB="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", @ANYRESDEC=r0, @ANYBLOB="b21b22b0b59f1a76abb6323c16886f3d2569d595dca4af1ac9160b24b62e47302e148fa17433c275945e36a713e5fad2e8abc9651d17b22d7d092020f73d100115fed606c66c84318df7895b1e5780f3c785bfb92571cf1bc9", @ANYRES32=0x0, @ANYRES32, @ANYRES32=0x0], &(0x7f0000000300)=0x18) r5 = socket(0x1, 0x803, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8936, &(0x7f0000000080)={@rand_addr=' \x01\x00', 0x44, r4}) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) r7 = socket(0x10, 0x8000000803, 0x0) sendmsg$nl_route(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000a00)=@newlink={0x74, 0x10, 0x401, 0x3001, 0x25dfdbfc, {0x0, 0x0, 0x0, 0x0, 0x534ad, 0x42a03}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x34, 0x2, 0x0, 0x1, [@IFLA_IPVLAN_MODE={0x6, 0x1, 0x2}, @IFLA_IPVLAN_FLAGS={0x6, 0x2, 0x2}, @IFLA_IPVLAN_FLAGS={0x6, 0x2, 0x1}, @IFLA_IPVLAN_FLAGS={0x6, 0x2, 0x3}, @IFLA_IPVLAN_MODE={0x6}, @IFLA_IPVLAN_FLAGS={0x6, 0x2, 0x2}]}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x74}}, 0x0) 18:12:41 executing program 2: syz_mount_image$ntfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x60, 0x0, &(0x7f00000000c0), 0x0, &(0x7f00000013c0)={[{@fmask}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'syzkaller1\x00'}}]}) 18:12:41 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="b4050000000000006110580000000000c60000000000000095000002000000002ac73fe427abdf478e0357f2d32986f50b892b5007921cd48fe43b23be60a2dbc9778bb665510e3e22fcb26adfdc05e55a4933e62a23abb4baca4ec89323257db59db5eeda384459dd00d41b6aab85df5cab39e726769e2291b626d120a9247579f0b8edd8f16683e0623366ac632c24921d21534237743354f09cc29be2f72dfa8b05320110bcea53bb038c"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x5, 0x0) bpf$MAP_UPDATE_ELEM(0x1c, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) 18:12:41 executing program 1: syz_mount_image$ntfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0xe200, 0x0, &(0x7f00000000c0), 0x218400, &(0x7f00000013c0)) 18:12:41 executing program 5: r0 = syz_io_uring_setup(0x3ede, &(0x7f0000000240), &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) socket$l2tp6(0xa, 0x2, 0x73) openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/locks\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READ=@pass_buffer={0x16, 0x0, 0x0, @fd_index=0x5, 0xffffffffffffffff, &(0x7f0000000040)=""/17, 0x11}, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000002040)=[{{&(0x7f0000001380)=@in6={0xa, 0x0, 0x0, @private0}, 0x80, 0x0}}], 0x1, 0x0) io_uring_enter(r0, 0x26, 0x1200, 0x0, 0x0, 0x0) [ 550.232296][T22139] ntfs: (device loop2): ntfs_fill_super(): Unable to determine device size. 18:12:41 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x200000000}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x25, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) 18:12:41 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="b4050000000000006110580000000000c60000000000000095000002000000002ac73fe427abdf478e0357f2d32986f50b892b5007921cd48fe43b23be60a2dbc9778bb665510e3e22fcb26adfdc05e55a4933e62a23abb4baca4ec89323257db59db5eeda384459dd00d41b6aab85df5cab39e726769e2291b626d120a9247579f0b8edd8f16683e0623366ac632c24921d21534237743354f09cc29be2f72dfa8b05320110bcea53bb038c"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x5, 0x0) bpf$MAP_UPDATE_ELEM(0x1d, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) [ 550.280709][T22135] 8021q: adding VLAN 0 to HW filter on device ipvlan32 [ 550.291493][T22142] loop1: detected capacity change from 0 to 113 18:12:41 executing program 2: syz_mount_image$ntfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x68, 0x0, &(0x7f00000000c0), 0x0, &(0x7f00000013c0)={[{@fmask}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'syzkaller1\x00'}}]}) [ 550.327503][T22135] team0: Device ipvlan32 is already an upper device of the team interface 18:12:41 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x200000000}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x5c, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) 18:12:41 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="b4050000000000006110580000000000c60000000000000095000002000000002ac73fe427abdf478e0357f2d32986f50b892b5007921cd48fe43b23be60a2dbc9778bb665510e3e22fcb26adfdc05e55a4933e62a23abb4baca4ec89323257db59db5eeda384459dd00d41b6aab85df5cab39e726769e2291b626d120a9247579f0b8edd8f16683e0623366ac632c24921d21534237743354f09cc29be2f72dfa8b05320110bcea53bb038c"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x5, 0x0) bpf$MAP_UPDATE_ELEM(0x1e, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) 18:12:41 executing program 1: syz_mount_image$ntfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0xea00, 0x0, &(0x7f00000000c0), 0x218400, &(0x7f00000013c0)) 18:12:41 executing program 5: r0 = syz_io_uring_setup(0x3ede, &(0x7f0000000240), &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) socket$l2tp6(0xa, 0x2, 0x73) openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/locks\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READ=@pass_buffer={0x16, 0x0, 0x0, @fd_index=0x5, 0xffffffffffffffff, &(0x7f0000000040)=""/17, 0x11}, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000002040)=[{{&(0x7f0000001380)=@in6={0xa, 0x0, 0x0, @private0}, 0x80, 0x0}}], 0x1, 0x0) io_uring_enter(r0, 0x26, 0x1503, 0x0, 0x0, 0x0) 18:12:42 executing program 0: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$FS_IOC_RESVSP(r0, 0x402c5828, &(0x7f00000000c0)={0x0, 0x1, 0xa8f, 0x3078}) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x200000000}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x9) preadv(r1, &(0x7f0000000240)=[{&(0x7f0000000040)=""/94, 0x5e}, {&(0x7f00000000c0)=""/93, 0x5d}, {&(0x7f0000000140)=""/58, 0x3a}], 0x3, 0xd9f, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000002340)='./file0\x00', 0x0, 0x108) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000180)={'team0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @local}, 0x14) writev(r2, &(0x7f0000000280)=[{&(0x7f00000008c0)="110eaa1a9896d57019effc8c79961d0f73ccf3afca3754e2e7a31f536bcb7204bed59311e29c96e1c2b663d61e5b0c0a76ea50cbddaa69f578b8600f77cf1a538ac900673696245b6de4283c979a2eccd71f9583dacf650575d1398678895da32663735b4d0cabfe7e972e59c2b4b4c9c89d0b82ca2267ad5062303e8abcb79600010506702eb912e3957e507aec4e2180699a738f6753509a12282a1d7181887f6c2e03de1da0dfe3b4efbb10e9b59301b4ef8a1d", 0xb5}, {&(0x7f0000000980)="34c30d95766fefbb7bdc40a3242505587bbc8584c2bc2003185f5ce116eea020efa91e2aae1eae2b8e848ac13c3dcedbbbc82adb1e70be8eecedba37be82545f2abda4f0a0e0fd0edd6bd03bb8e9bb91c39a2c828511aef3e684ad4c21ec0c146b9570139e31cd", 0x67}], 0x2) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'macvtap0\x00'}) ioctl$PPPIOCSFLAGS1(0xffffffffffffffff, 0x40047459, &(0x7f00000001c0)) recvmmsg(0xffffffffffffffff, &(0x7f0000002200)=[{{&(0x7f0000000340)=@in={0x2, 0x0, @multicast1}, 0x80, &(0x7f0000000440)=[{&(0x7f00000004c0)=""/88, 0x58}, {&(0x7f0000000b40)=""/4096, 0x1000}], 0x2, &(0x7f0000000740)=""/192, 0xc0}, 0x3}, {{&(0x7f0000000800)=@sco={0x1f, @none}, 0x80, &(0x7f0000000480)=[{&(0x7f0000001b40)=""/82, 0x52}], 0x1, &(0x7f0000001bc0)=""/206, 0xce}, 0x7}, {{&(0x7f0000001cc0)=@in={0x2, 0x0, @broadcast}, 0x80, &(0x7f0000000880)=[{&(0x7f0000001d40)=""/146, 0x92}, {&(0x7f0000001e00)=""/231, 0xe7}], 0x2, &(0x7f0000001f00)=""/239, 0xef}, 0x3}, {{&(0x7f0000002000)=@xdp, 0x80, &(0x7f00000020c0)=[{&(0x7f0000002080)=""/58, 0x3a}], 0x1, &(0x7f0000002100)=""/251, 0xfb}, 0x9}], 0x4, 0x40, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000002380)=ANY=[@ANYBLOB="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", @ANYRESDEC=r0, @ANYBLOB="b21b22b0b59f1a76abb6323c16886f3d2569d595dca4af1ac9160b24b62e47302e148fa17433c275945e36a713e5fad2e8abc9651d17b22d7d092020f73d100115fed606c66c84318df7895b1e5780f3c785bfb92571cf1bc9", @ANYRES32=0x0, @ANYRES32, @ANYRES32=0x0], &(0x7f0000000300)=0x18) r5 = socket(0x1, 0x803, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8936, &(0x7f0000000080)={@rand_addr=' \x01\x00', 0x44, r4}) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) r7 = socket(0x10, 0x8000000803, 0x0) sendmsg$nl_route(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000a00)=@newlink={0x74, 0x10, 0x401, 0x3001, 0x25dfdbfc, {0x0, 0x0, 0x0, 0x0, 0x534ad, 0x42a03}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x34, 0x2, 0x0, 0x1, [@IFLA_IPVLAN_MODE={0x6, 0x1, 0x2}, @IFLA_IPVLAN_FLAGS={0x6, 0x2, 0x2}, @IFLA_IPVLAN_FLAGS={0x6, 0x2, 0x1}, @IFLA_IPVLAN_FLAGS={0x6, 0x2, 0x3}, @IFLA_IPVLAN_MODE={0x6}, @IFLA_IPVLAN_FLAGS={0x6, 0x2, 0x2}]}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x74}}, 0x0) 18:12:42 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="b4050000000000006110580000000000c60000000000000095000002000000002ac73fe427abdf478e0357f2d32986f50b892b5007921cd48fe43b23be60a2dbc9778bb665510e3e22fcb26adfdc05e55a4933e62a23abb4baca4ec89323257db59db5eeda384459dd00d41b6aab85df5cab39e726769e2291b626d120a9247579f0b8edd8f16683e0623366ac632c24921d21534237743354f09cc29be2f72dfa8b05320110bcea53bb038c"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x5, 0x0) bpf$MAP_UPDATE_ELEM(0x21, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) 18:12:42 executing program 2: syz_mount_image$ntfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x6c, 0x0, &(0x7f00000000c0), 0x0, &(0x7f00000013c0)={[{@fmask}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'syzkaller1\x00'}}]}) [ 550.516229][T22157] loop1: detected capacity change from 0 to 117 18:12:42 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x200000000}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x300, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) 18:12:42 executing program 5: r0 = syz_io_uring_setup(0x3ede, &(0x7f0000000240), &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) socket$l2tp6(0xa, 0x2, 0x73) openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/locks\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READ=@pass_buffer={0x16, 0x0, 0x0, @fd_index=0x5, 0xffffffffffffffff, &(0x7f0000000040)=""/17, 0x11}, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000002040)=[{{&(0x7f0000001380)=@in6={0xa, 0x0, 0x0, @private0}, 0x80, 0x0}}], 0x1, 0x0) io_uring_enter(r0, 0x26, 0x1800, 0x0, 0x0, 0x0) 18:12:42 executing program 1: syz_mount_image$ntfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0xfeff, 0x0, &(0x7f00000000c0), 0x218400, &(0x7f00000013c0)) 18:12:42 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="b4050000000000006110580000000000c60000000000000095000002000000002ac73fe427abdf478e0357f2d32986f50b892b5007921cd48fe43b23be60a2dbc9778bb665510e3e22fcb26adfdc05e55a4933e62a23abb4baca4ec89323257db59db5eeda384459dd00d41b6aab85df5cab39e726769e2291b626d120a9247579f0b8edd8f16683e0623366ac632c24921d21534237743354f09cc29be2f72dfa8b05320110bcea53bb038c"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x5, 0x0) bpf$MAP_UPDATE_ELEM(0x22, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) [ 550.682761][T22162] 8021q: adding VLAN 0 to HW filter on device ipvlan32 18:12:42 executing program 2: syz_mount_image$ntfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x74, 0x0, &(0x7f00000000c0), 0x0, &(0x7f00000013c0)={[{@fmask}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'syzkaller1\x00'}}]}) 18:12:42 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x200000000}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x500, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 550.727439][T22162] team0: Device ipvlan32 is already an upper device of the team interface [ 550.750736][T22171] loop1: detected capacity change from 0 to 127 18:12:42 executing program 5: r0 = syz_io_uring_setup(0x3ede, &(0x7f0000000240), &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) socket$l2tp6(0xa, 0x2, 0x73) openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/locks\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READ=@pass_buffer={0x16, 0x0, 0x0, @fd_index=0x5, 0xffffffffffffffff, &(0x7f0000000040)=""/17, 0x11}, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000002040)=[{{&(0x7f0000001380)=@in6={0xa, 0x0, 0x0, @private0}, 0x80, 0x0}}], 0x1, 0x0) io_uring_enter(r0, 0x26, 0x2000, 0x0, 0x0, 0x0) 18:12:42 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="b4050000000000006110580000000000c60000000000000095000002000000002ac73fe427abdf478e0357f2d32986f50b892b5007921cd48fe43b23be60a2dbc9778bb665510e3e22fcb26adfdc05e55a4933e62a23abb4baca4ec89323257db59db5eeda384459dd00d41b6aab85df5cab39e726769e2291b626d120a9247579f0b8edd8f16683e0623366ac632c24921d21534237743354f09cc29be2f72dfa8b05320110bcea53bb038c"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x5, 0x0) bpf$MAP_UPDATE_ELEM(0x23, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) 18:12:42 executing program 1: syz_mount_image$ntfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0xff00, 0x0, &(0x7f00000000c0), 0x218400, &(0x7f00000013c0)) 18:12:42 executing program 0: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$FS_IOC_RESVSP(r0, 0x402c5828, &(0x7f00000000c0)={0x0, 0x1, 0xa8f, 0x3078}) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x200000000}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x9) preadv(r1, &(0x7f0000000240)=[{&(0x7f0000000040)=""/94, 0x5e}, {&(0x7f00000000c0)=""/93, 0x5d}, {&(0x7f0000000140)=""/58, 0x3a}], 0x3, 0xd9f, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000002340)='./file0\x00', 0x0, 0x108) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000180)={'team0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @local}, 0x14) writev(r2, &(0x7f0000000280)=[{&(0x7f00000008c0)="110eaa1a9896d57019effc8c79961d0f73ccf3afca3754e2e7a31f536bcb7204bed59311e29c96e1c2b663d61e5b0c0a76ea50cbddaa69f578b8600f77cf1a538ac900673696245b6de4283c979a2eccd71f9583dacf650575d1398678895da32663735b4d0cabfe7e972e59c2b4b4c9c89d0b82ca2267ad5062303e8abcb79600010506702eb912e3957e507aec4e2180699a738f6753509a12282a1d7181887f6c2e03de1da0dfe3b4efbb10e9b59301b4ef8a1d", 0xb5}, {&(0x7f0000000980)="34c30d95766fefbb7bdc40a3242505587bbc8584c2bc2003185f5ce116eea020efa91e2aae1eae2b8e848ac13c3dcedbbbc82adb1e70be8eecedba37be82545f2abda4f0a0e0fd0edd6bd03bb8e9bb91c39a2c828511aef3e684ad4c21ec0c146b9570139e31cd", 0x67}], 0x2) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'macvtap0\x00'}) ioctl$PPPIOCSFLAGS1(0xffffffffffffffff, 0x40047459, &(0x7f00000001c0)) recvmmsg(0xffffffffffffffff, &(0x7f0000002200)=[{{&(0x7f0000000340)=@in={0x2, 0x0, @multicast1}, 0x80, &(0x7f0000000440)=[{&(0x7f00000004c0)=""/88, 0x58}, {&(0x7f0000000b40)=""/4096, 0x1000}], 0x2, &(0x7f0000000740)=""/192, 0xc0}, 0x3}, {{&(0x7f0000000800)=@sco={0x1f, @none}, 0x80, &(0x7f0000000480)=[{&(0x7f0000001b40)=""/82, 0x52}], 0x1, &(0x7f0000001bc0)=""/206, 0xce}, 0x7}, {{&(0x7f0000001cc0)=@in={0x2, 0x0, @broadcast}, 0x80, &(0x7f0000000880)=[{&(0x7f0000001d40)=""/146, 0x92}, {&(0x7f0000001e00)=""/231, 0xe7}], 0x2, &(0x7f0000001f00)=""/239, 0xef}, 0x3}, {{&(0x7f0000002000)=@xdp, 0x80, &(0x7f00000020c0)=[{&(0x7f0000002080)=""/58, 0x3a}], 0x1, &(0x7f0000002100)=""/251, 0xfb}, 0x9}], 0x4, 0x40, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000002380)=ANY=[@ANYBLOB="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", @ANYRESDEC=r0, @ANYBLOB="b21b22b0b59f1a76abb6323c16886f3d2569d595dca4af1ac9160b24b62e47302e148fa17433c275945e36a713e5fad2e8abc9651d17b22d7d092020f73d100115fed606c66c84318df7895b1e5780f3c785bfb92571cf1bc9", @ANYRES32=0x0, @ANYRES32, @ANYRES32=0x0], &(0x7f0000000300)=0x18) r5 = socket(0x1, 0x803, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8936, &(0x7f0000000080)={@rand_addr=' \x01\x00', 0x44, r4}) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) r7 = socket(0x10, 0x8000000803, 0x0) sendmsg$nl_route(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000a00)=@newlink={0x74, 0x10, 0x401, 0x3001, 0x25dfdbfc, {0x0, 0x0, 0x0, 0x0, 0x534ad, 0x42a03}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x34, 0x2, 0x0, 0x1, [@IFLA_IPVLAN_MODE={0x6, 0x1, 0x2}, @IFLA_IPVLAN_FLAGS={0x6, 0x2, 0x2}, @IFLA_IPVLAN_FLAGS={0x6, 0x2, 0x1}, @IFLA_IPVLAN_FLAGS={0x6, 0x2, 0x3}, @IFLA_IPVLAN_MODE={0x6}, @IFLA_IPVLAN_FLAGS={0x6, 0x2, 0x2}]}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x74}}, 0x0) 18:12:42 executing program 2: syz_mount_image$ntfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x7a, 0x0, &(0x7f00000000c0), 0x0, &(0x7f00000013c0)={[{@fmask}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'syzkaller1\x00'}}]}) 18:12:42 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="b4050000000000006110580000000000c60000000000000095000002000000002ac73fe427abdf478e0357f2d32986f50b892b5007921cd48fe43b23be60a2dbc9778bb665510e3e22fcb26adfdc05e55a4933e62a23abb4baca4ec89323257db59db5eeda384459dd00d41b6aab85df5cab39e726769e2291b626d120a9247579f0b8edd8f16683e0623366ac632c24921d21534237743354f09cc29be2f72dfa8b05320110bcea53bb038c"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x5, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2, 0x2}, 0x20) 18:12:42 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x200000000}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x600, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 550.976808][T22183] loop1: detected capacity change from 0 to 127 18:12:42 executing program 5: r0 = syz_io_uring_setup(0x3ede, &(0x7f0000000240), &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) socket$l2tp6(0xa, 0x2, 0x73) openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/locks\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READ=@pass_buffer={0x16, 0x0, 0x0, @fd_index=0x5, 0xffffffffffffffff, &(0x7f0000000040)=""/17, 0x11}, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000002040)=[{{&(0x7f0000001380)=@in6={0xa, 0x0, 0x0, @private0}, 0x80, 0x0}}], 0x1, 0x0) io_uring_enter(r0, 0x26, 0x2500, 0x0, 0x0, 0x0) [ 551.058384][T22186] 8021q: adding VLAN 0 to HW filter on device ipvlan32 18:12:42 executing program 2: syz_mount_image$ntfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0xdb, 0x0, &(0x7f00000000c0), 0x0, &(0x7f00000013c0)={[{@fmask}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'syzkaller1\x00'}}]}) 18:12:42 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x200000000}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x700, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) 18:12:42 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="b4050000000000006110580000000000c60000000000000095000002000000002ac73fe427abdf478e0357f2d32986f50b892b5007921cd48fe43b23be60a2dbc9778bb665510e3e22fcb26adfdc05e55a4933e62a23abb4baca4ec89323257db59db5eeda384459dd00d41b6aab85df5cab39e726769e2291b626d120a9247579f0b8edd8f16683e0623366ac632c24921d21534237743354f09cc29be2f72dfa8b05320110bcea53bb038c"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x5, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2, 0x1000000}, 0x20) [ 551.100403][T22186] team0: Device ipvlan32 is already an upper device of the team interface 18:12:42 executing program 1: syz_mount_image$ntfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0xfffe, 0x0, &(0x7f00000000c0), 0x218400, &(0x7f00000013c0)) 18:12:42 executing program 5: r0 = syz_io_uring_setup(0x3ede, &(0x7f0000000240), &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) socket$l2tp6(0xa, 0x2, 0x73) openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/locks\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READ=@pass_buffer={0x16, 0x0, 0x0, @fd_index=0x5, 0xffffffffffffffff, &(0x7f0000000040)=""/17, 0x11}, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000002040)=[{{&(0x7f0000001380)=@in6={0xa, 0x0, 0x0, @private0}, 0x80, 0x0}}], 0x1, 0x0) io_uring_enter(r0, 0x26, 0x4000, 0x0, 0x0, 0x0) 18:12:42 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x200000000}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x900, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) 18:12:42 executing program 2: syz_mount_image$ntfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0xe2, 0x0, &(0x7f00000000c0), 0x0, &(0x7f00000013c0)={[{@fmask}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'syzkaller1\x00'}}]}) 18:12:42 executing program 0: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$FS_IOC_RESVSP(r0, 0x402c5828, &(0x7f00000000c0)={0x0, 0x1, 0xa8f, 0x3078}) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x200000000}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x9) preadv(r1, &(0x7f0000000240)=[{&(0x7f0000000040)=""/94, 0x5e}, {&(0x7f00000000c0)=""/93, 0x5d}, {&(0x7f0000000140)=""/58, 0x3a}], 0x3, 0xd9f, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000002340)='./file0\x00', 0x0, 0x108) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000180)={'team0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @local}, 0x14) writev(r2, &(0x7f0000000280)=[{&(0x7f00000008c0)="110eaa1a9896d57019effc8c79961d0f73ccf3afca3754e2e7a31f536bcb7204bed59311e29c96e1c2b663d61e5b0c0a76ea50cbddaa69f578b8600f77cf1a538ac900673696245b6de4283c979a2eccd71f9583dacf650575d1398678895da32663735b4d0cabfe7e972e59c2b4b4c9c89d0b82ca2267ad5062303e8abcb79600010506702eb912e3957e507aec4e2180699a738f6753509a12282a1d7181887f6c2e03de1da0dfe3b4efbb10e9b59301b4ef8a1d", 0xb5}, {&(0x7f0000000980)="34c30d95766fefbb7bdc40a3242505587bbc8584c2bc2003185f5ce116eea020efa91e2aae1eae2b8e848ac13c3dcedbbbc82adb1e70be8eecedba37be82545f2abda4f0a0e0fd0edd6bd03bb8e9bb91c39a2c828511aef3e684ad4c21ec0c146b9570139e31cd", 0x67}], 0x2) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'macvtap0\x00'}) ioctl$PPPIOCSFLAGS1(0xffffffffffffffff, 0x40047459, &(0x7f00000001c0)) recvmmsg(0xffffffffffffffff, &(0x7f0000002200)=[{{&(0x7f0000000340)=@in={0x2, 0x0, @multicast1}, 0x80, &(0x7f0000000440)=[{&(0x7f00000004c0)=""/88, 0x58}, {&(0x7f0000000b40)=""/4096, 0x1000}], 0x2, &(0x7f0000000740)=""/192, 0xc0}, 0x3}, {{&(0x7f0000000800)=@sco={0x1f, @none}, 0x80, &(0x7f0000000480)=[{&(0x7f0000001b40)=""/82, 0x52}], 0x1, &(0x7f0000001bc0)=""/206, 0xce}, 0x7}, {{&(0x7f0000001cc0)=@in={0x2, 0x0, @broadcast}, 0x80, &(0x7f0000000880)=[{&(0x7f0000001d40)=""/146, 0x92}, {&(0x7f0000001e00)=""/231, 0xe7}], 0x2, &(0x7f0000001f00)=""/239, 0xef}, 0x3}, {{&(0x7f0000002000)=@xdp, 0x80, &(0x7f00000020c0)=[{&(0x7f0000002080)=""/58, 0x3a}], 0x1, &(0x7f0000002100)=""/251, 0xfb}, 0x9}], 0x4, 0x40, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000002380)=ANY=[@ANYBLOB="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", @ANYRESDEC=r0, @ANYBLOB="b21b22b0b59f1a76abb6323c16886f3d2569d595dca4af1ac9160b24b62e47302e148fa17433c275945e36a713e5fad2e8abc9651d17b22d7d092020f73d100115fed606c66c84318df7895b1e5780f3c785bfb92571cf1bc9", @ANYRES32=0x0, @ANYRES32, @ANYRES32=0x0], &(0x7f0000000300)=0x18) r5 = socket(0x1, 0x803, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8936, &(0x7f0000000080)={@rand_addr=' \x01\x00', 0x44, r4}) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) r7 = socket(0x10, 0x8000000803, 0x0) sendmsg$nl_route(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000a00)=@newlink={0x7c, 0x10, 0x401, 0x3001, 0x25dfdbfc, {0x0, 0x0, 0x0, 0x0, 0x534ad, 0x42a03}, [@IFLA_LINKINFO={0x4c, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x3c, 0x2, 0x0, 0x1, [@IFLA_IPVLAN_MODE={0x6, 0x1, 0x2}, @IFLA_IPVLAN_FLAGS={0x6, 0x2, 0x2}, @IFLA_IPVLAN_FLAGS={0x6, 0x2, 0x1}, @IFLA_IPVLAN_FLAGS={0x6}, @IFLA_IPVLAN_FLAGS={0x6, 0x2, 0x3}, @IFLA_IPVLAN_MODE={0x6}, @IFLA_IPVLAN_FLAGS={0x6, 0x2, 0x2}]}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x7c}}, 0x0) 18:12:42 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="b4050000000000006110580000000000c60000000000000095000002000000002ac73fe427abdf478e0357f2d32986f50b892b5007921cd48fe43b23be60a2dbc9778bb665510e3e22fcb26adfdc05e55a4933e62a23abb4baca4ec89323257db59db5eeda384459dd00d41b6aab85df5cab39e726769e2291b626d120a9247579f0b8edd8f16683e0623366ac632c24921d21534237743354f09cc29be2f72dfa8b05320110bcea53bb038c"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x5, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2, 0x2000000}, 0x20) [ 551.275062][T22203] loop1: detected capacity change from 0 to 127 18:12:42 executing program 5: r0 = syz_io_uring_setup(0x3ede, &(0x7f0000000240), &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) socket$l2tp6(0xa, 0x2, 0x73) openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/locks\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READ=@pass_buffer={0x16, 0x0, 0x0, @fd_index=0x5, 0xffffffffffffffff, &(0x7f0000000040)=""/17, 0x11}, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000002040)=[{{&(0x7f0000001380)=@in6={0xa, 0x0, 0x0, @private0}, 0x80, 0x0}}], 0x1, 0x0) io_uring_enter(r0, 0x26, 0x4100, 0x0, 0x0, 0x0) 18:12:42 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x200000000}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0xa00, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) 18:12:42 executing program 1: syz_mount_image$ntfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x80000, 0x0, &(0x7f00000000c0), 0x218400, &(0x7f00000013c0)) 18:12:42 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="b4050000000000006110580000000000c60000000000000095000002000000002ac73fe427abdf478e0357f2d32986f50b892b5007921cd48fe43b23be60a2dbc9778bb665510e3e22fcb26adfdc05e55a4933e62a23abb4baca4ec89323257db59db5eeda384459dd00d41b6aab85df5cab39e726769e2291b626d120a9247579f0b8edd8f16683e0623366ac632c24921d21534237743354f09cc29be2f72dfa8b05320110bcea53bb038c"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x5, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2, 0x100000000000000}, 0x20) 18:12:42 executing program 2: syz_mount_image$ntfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0xea, 0x0, &(0x7f00000000c0), 0x0, &(0x7f00000013c0)={[{@fmask}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'syzkaller1\x00'}}]}) 18:12:43 executing program 5: r0 = syz_io_uring_setup(0x3ede, &(0x7f0000000240), &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) socket$l2tp6(0xa, 0x2, 0x73) openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/locks\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READ=@pass_buffer={0x16, 0x0, 0x0, @fd_index=0x5, 0xffffffffffffffff, &(0x7f0000000040)=""/17, 0x11}, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000002040)=[{{&(0x7f0000001380)=@in6={0xa, 0x0, 0x0, @private0}, 0x80, 0x0}}], 0x1, 0x0) io_uring_enter(r0, 0x26, 0x4200, 0x0, 0x0, 0x0) 18:12:43 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x200000000}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0xb00, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 551.497478][T22209] 8021q: adding VLAN 0 to HW filter on device ipvlan32 [ 551.522189][T22218] loop1: detected capacity change from 0 to 1024 [ 551.526523][T22209] team0: Device ipvlan32 is already an upper device of the team interface 18:12:43 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="b4050000000000006110580000000000c60000000000000095000002000000002ac73fe427abdf478e0357f2d32986f50b892b5007921cd48fe43b23be60a2dbc9778bb665510e3e22fcb26adfdc05e55a4933e62a23abb4baca4ec89323257db59db5eeda384459dd00d41b6aab85df5cab39e726769e2291b626d120a9247579f0b8edd8f16683e0623366ac632c24921d21534237743354f09cc29be2f72dfa8b05320110bcea53bb038c"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x5, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2, 0x200000000000000}, 0x20) 18:12:43 executing program 2: syz_mount_image$ntfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0xfe, 0x0, &(0x7f00000000c0), 0x0, &(0x7f00000013c0)={[{@fmask}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'syzkaller1\x00'}}]}) 18:12:43 executing program 1: syz_mount_image$ntfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x218400, 0x0, &(0x7f00000000c0), 0x218400, &(0x7f00000013c0)) 18:12:43 executing program 0: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$FS_IOC_RESVSP(r0, 0x402c5828, &(0x7f00000000c0)={0x0, 0x1, 0xa8f, 0x3078}) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x200000000}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x9) preadv(r1, &(0x7f0000000240)=[{&(0x7f0000000040)=""/94, 0x5e}, {&(0x7f00000000c0)=""/93, 0x5d}, {&(0x7f0000000140)=""/58, 0x3a}], 0x3, 0xd9f, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000002340)='./file0\x00', 0x0, 0x108) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000180)={'team0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @local}, 0x14) writev(r2, &(0x7f0000000280)=[{&(0x7f00000008c0)="110eaa1a9896d57019effc8c79961d0f73ccf3afca3754e2e7a31f536bcb7204bed59311e29c96e1c2b663d61e5b0c0a76ea50cbddaa69f578b8600f77cf1a538ac900673696245b6de4283c979a2eccd71f9583dacf650575d1398678895da32663735b4d0cabfe7e972e59c2b4b4c9c89d0b82ca2267ad5062303e8abcb79600010506702eb912e3957e507aec4e2180699a738f6753509a12282a1d7181887f6c2e03de1da0dfe3b4efbb10e9b59301b4ef8a1d", 0xb5}, {&(0x7f0000000980)="34c30d95766fefbb7bdc40a3242505587bbc8584c2bc2003185f5ce116eea020efa91e2aae1eae2b8e848ac13c3dcedbbbc82adb1e70be8eecedba37be82545f2abda4f0a0e0fd0edd6bd03bb8e9bb91c39a2c828511aef3e684ad4c21ec0c146b9570139e31cd", 0x67}], 0x2) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'macvtap0\x00'}) ioctl$PPPIOCSFLAGS1(0xffffffffffffffff, 0x40047459, &(0x7f00000001c0)) recvmmsg(0xffffffffffffffff, &(0x7f0000002200)=[{{&(0x7f0000000340)=@in={0x2, 0x0, @multicast1}, 0x80, &(0x7f0000000440)=[{&(0x7f00000004c0)=""/88, 0x58}, {&(0x7f0000000b40)=""/4096, 0x1000}], 0x2, &(0x7f0000000740)=""/192, 0xc0}, 0x3}, {{&(0x7f0000000800)=@sco={0x1f, @none}, 0x80, &(0x7f0000000480)=[{&(0x7f0000001b40)=""/82, 0x52}], 0x1, &(0x7f0000001bc0)=""/206, 0xce}, 0x7}, {{&(0x7f0000001cc0)=@in={0x2, 0x0, @broadcast}, 0x80, &(0x7f0000000880)=[{&(0x7f0000001d40)=""/146, 0x92}, {&(0x7f0000001e00)=""/231, 0xe7}], 0x2, &(0x7f0000001f00)=""/239, 0xef}, 0x3}, {{&(0x7f0000002000)=@xdp, 0x80, &(0x7f00000020c0)=[{&(0x7f0000002080)=""/58, 0x3a}], 0x1, &(0x7f0000002100)=""/251, 0xfb}, 0x9}], 0x4, 0x40, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000002380)=ANY=[@ANYBLOB="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", @ANYRESDEC=r0, @ANYBLOB="b21b22b0b59f1a76abb6323c16886f3d2569d595dca4af1ac9160b24b62e47302e148fa17433c275945e36a713e5fad2e8abc9651d17b22d7d092020f73d100115fed606c66c84318df7895b1e5780f3c785bfb92571cf1bc9", @ANYRES32=0x0, @ANYRES32, @ANYRES32=0x0], &(0x7f0000000300)=0x18) r5 = socket(0x1, 0x803, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8936, &(0x7f0000000080)={@rand_addr=' \x01\x00', 0x44, r4}) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) r7 = socket(0x10, 0x8000000803, 0x0) sendmsg$nl_route(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000a00)=@newlink={0x7c, 0x10, 0x401, 0x3001, 0x25dfdbfc, {0x0, 0x0, 0x0, 0x0, 0x534ad, 0x42a03}, [@IFLA_LINKINFO={0x4c, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x3c, 0x2, 0x0, 0x1, [@IFLA_IPVLAN_MODE={0x6, 0x1, 0x2}, @IFLA_IPVLAN_FLAGS={0x6, 0x2, 0x2}, @IFLA_IPVLAN_FLAGS={0x6, 0x2, 0x1}, @IFLA_IPVLAN_FLAGS={0x6}, @IFLA_IPVLAN_FLAGS={0x6, 0x2, 0x3}, @IFLA_IPVLAN_MODE={0x6}, @IFLA_IPVLAN_FLAGS={0x6, 0x2, 0x2}]}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x7c}}, 0x0) 18:12:43 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x200000000}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0xc00, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 551.743444][T22231] loop1: detected capacity change from 0 to 4290 18:12:43 executing program 5: r0 = syz_io_uring_setup(0x3ede, &(0x7f0000000240), &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) socket$l2tp6(0xa, 0x2, 0x73) openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/locks\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READ=@pass_buffer={0x16, 0x0, 0x0, @fd_index=0x5, 0xffffffffffffffff, &(0x7f0000000040)=""/17, 0x11}, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000002040)=[{{&(0x7f0000001380)=@in6={0xa, 0x0, 0x0, @private0}, 0x80, 0x0}}], 0x1, 0x0) io_uring_enter(r0, 0x26, 0x4800, 0x0, 0x0, 0x0) 18:12:43 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="b4050000000000006110580000000000c60000000000000095000002000000002ac73fe427abdf478e0357f2d32986f50b892b5007921cd48fe43b23be60a2dbc9778bb665510e3e22fcb26adfdc05e55a4933e62a23abb4baca4ec89323257db59db5eeda384459dd00d41b6aab85df5cab39e726769e2291b626d120a9247579f0b8edd8f16683e0623366ac632c24921d21534237743354f09cc29be2f72dfa8b05320110bcea53bb038c"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x5, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20000220) 18:12:43 executing program 1: syz_mount_image$ntfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x400000, 0x0, &(0x7f00000000c0), 0x218400, &(0x7f00000013c0)) 18:12:43 executing program 2: syz_mount_image$ntfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x108, 0x0, &(0x7f00000000c0), 0x0, &(0x7f00000013c0)={[{@fmask}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'syzkaller1\x00'}}]}) 18:12:43 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x200000000}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0xd00, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) 18:12:43 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="b4050000000000006110580000000000c60000000000000095000002000000002ac73fe427abdf478e0357f2d32986f50b892b5007921cd48fe43b23be60a2dbc9778bb665510e3e22fcb26adfdc05e55a4933e62a23abb4baca4ec89323257db59db5eeda384459dd00d41b6aab85df5cab39e726769e2291b626d120a9247579f0b8edd8f16683e0623366ac632c24921d21534237743354f09cc29be2f72dfa8b05320110bcea53bb038c"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x5, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) 18:12:43 executing program 5: r0 = syz_io_uring_setup(0x3ede, &(0x7f0000000240), &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) socket$l2tp6(0xa, 0x2, 0x73) openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/locks\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READ=@pass_buffer={0x16, 0x0, 0x0, @fd_index=0x5, 0xffffffffffffffff, &(0x7f0000000040)=""/17, 0x11}, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000002040)=[{{&(0x7f0000001380)=@in6={0xa, 0x0, 0x0, @private0}, 0x80, 0x0}}], 0x1, 0x0) io_uring_enter(r0, 0x26, 0x4c00, 0x0, 0x0, 0x0) 18:12:43 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="b4050000000000006110580000000000c60000000000000095000002000000002ac73fe427abdf478e0357f2d32986f50b892b5007921cd48fe43b23be60a2dbc9778bb665510e3e22fcb26adfdc05e55a4933e62a23abb4baca4ec89323257db59db5eeda384459dd00d41b6aab85df5cab39e726769e2291b626d120a9247579f0b8edd8f16683e0623366ac632c24921d21534237743354f09cc29be2f72dfa8b05320110bcea53bb038c"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) (async) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x5, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) [ 551.957532][T22242] loop1: detected capacity change from 0 to 8192 [ 551.969644][T22239] 8021q: adding VLAN 0 to HW filter on device ipvlan32 [ 551.990239][T22239] team0: Device ipvlan32 is already an upper device of the team interface 18:12:43 executing program 2: syz_mount_image$ntfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x204, 0x0, &(0x7f00000000c0), 0x0, &(0x7f00000013c0)={[{@fmask}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'syzkaller1\x00'}}]}) 18:12:43 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x200000000}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0xe00, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) 18:12:43 executing program 0: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$FS_IOC_RESVSP(r0, 0x402c5828, &(0x7f00000000c0)={0x0, 0x1, 0xa8f, 0x3078}) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x200000000}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x9) preadv(r1, &(0x7f0000000240)=[{&(0x7f0000000040)=""/94, 0x5e}, {&(0x7f00000000c0)=""/93, 0x5d}, {&(0x7f0000000140)=""/58, 0x3a}], 0x3, 0xd9f, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000002340)='./file0\x00', 0x0, 0x108) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000180)={'team0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @local}, 0x14) writev(r2, &(0x7f0000000280)=[{&(0x7f00000008c0)="110eaa1a9896d57019effc8c79961d0f73ccf3afca3754e2e7a31f536bcb7204bed59311e29c96e1c2b663d61e5b0c0a76ea50cbddaa69f578b8600f77cf1a538ac900673696245b6de4283c979a2eccd71f9583dacf650575d1398678895da32663735b4d0cabfe7e972e59c2b4b4c9c89d0b82ca2267ad5062303e8abcb79600010506702eb912e3957e507aec4e2180699a738f6753509a12282a1d7181887f6c2e03de1da0dfe3b4efbb10e9b59301b4ef8a1d", 0xb5}, {&(0x7f0000000980)="34c30d95766fefbb7bdc40a3242505587bbc8584c2bc2003185f5ce116eea020efa91e2aae1eae2b8e848ac13c3dcedbbbc82adb1e70be8eecedba37be82545f2abda4f0a0e0fd0edd6bd03bb8e9bb91c39a2c828511aef3e684ad4c21ec0c146b9570139e31cd", 0x67}], 0x2) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'macvtap0\x00'}) ioctl$PPPIOCSFLAGS1(0xffffffffffffffff, 0x40047459, &(0x7f00000001c0)) recvmmsg(0xffffffffffffffff, &(0x7f0000002200)=[{{&(0x7f0000000340)=@in={0x2, 0x0, @multicast1}, 0x80, &(0x7f0000000440)=[{&(0x7f00000004c0)=""/88, 0x58}, {&(0x7f0000000b40)=""/4096, 0x1000}], 0x2, &(0x7f0000000740)=""/192, 0xc0}, 0x3}, {{&(0x7f0000000800)=@sco={0x1f, @none}, 0x80, &(0x7f0000000480)=[{&(0x7f0000001b40)=""/82, 0x52}], 0x1, &(0x7f0000001bc0)=""/206, 0xce}, 0x7}, {{&(0x7f0000001cc0)=@in={0x2, 0x0, @broadcast}, 0x80, &(0x7f0000000880)=[{&(0x7f0000001d40)=""/146, 0x92}, {&(0x7f0000001e00)=""/231, 0xe7}], 0x2, &(0x7f0000001f00)=""/239, 0xef}, 0x3}, {{&(0x7f0000002000)=@xdp, 0x80, &(0x7f00000020c0)=[{&(0x7f0000002080)=""/58, 0x3a}], 0x1, &(0x7f0000002100)=""/251, 0xfb}, 0x9}], 0x4, 0x40, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000002380)=ANY=[@ANYBLOB="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", @ANYRESDEC=r0, @ANYBLOB="b21b22b0b59f1a76abb6323c16886f3d2569d595dca4af1ac9160b24b62e47302e148fa17433c275945e36a713e5fad2e8abc9651d17b22d7d092020f73d100115fed606c66c84318df7895b1e5780f3c785bfb92571cf1bc9", @ANYRES32=0x0, @ANYRES32, @ANYRES32=0x0], &(0x7f0000000300)=0x18) r5 = socket(0x1, 0x803, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8936, &(0x7f0000000080)={@rand_addr=' \x01\x00', 0x44, r4}) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) r7 = socket(0x10, 0x8000000803, 0x0) sendmsg$nl_route(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000a00)=@newlink={0x7c, 0x10, 0x401, 0x3001, 0x25dfdbfc, {0x0, 0x0, 0x0, 0x0, 0x534ad, 0x42a03}, [@IFLA_LINKINFO={0x4c, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x3c, 0x2, 0x0, 0x1, [@IFLA_IPVLAN_MODE={0x6, 0x1, 0x2}, @IFLA_IPVLAN_FLAGS={0x6, 0x2, 0x2}, @IFLA_IPVLAN_FLAGS={0x6, 0x2, 0x1}, @IFLA_IPVLAN_FLAGS={0x6}, @IFLA_IPVLAN_FLAGS={0x6, 0x2, 0x3}, @IFLA_IPVLAN_MODE={0x6}, @IFLA_IPVLAN_FLAGS={0x6, 0x2, 0x2}]}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x7c}}, 0x0) 18:12:43 executing program 1: syz_mount_image$ntfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x842100, 0x0, &(0x7f00000000c0), 0x218400, &(0x7f00000013c0)) 18:12:43 executing program 5: r0 = syz_io_uring_setup(0x3ede, &(0x7f0000000240), &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) socket$l2tp6(0xa, 0x2, 0x73) openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/locks\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READ=@pass_buffer={0x16, 0x0, 0x0, @fd_index=0x5, 0xffffffffffffffff, &(0x7f0000000040)=""/17, 0x11}, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000002040)=[{{&(0x7f0000001380)=@in6={0xa, 0x0, 0x0, @private0}, 0x80, 0x0}}], 0x1, 0x0) io_uring_enter(r0, 0x26, 0x6800, 0x0, 0x0, 0x0) 18:12:43 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="b4050000000000006110580000000000c60000000000000095000002000000002ac73fe427abdf478e0357f2d32986f50b892b5007921cd48fe43b23be60a2dbc9778bb665510e3e22fcb26adfdc05e55a4933e62a23abb4baca4ec89323257db59db5eeda384459dd00d41b6aab85df5cab39e726769e2291b626d120a9247579f0b8edd8f16683e0623366ac632c24921d21534237743354f09cc29be2f72dfa8b05320110bcea53bb038c"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) (async) r2 = socket(0x1, 0x5, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) [ 552.175148][T22255] loop2: detected capacity change from 0 to 1 [ 552.192203][T22258] loop1: detected capacity change from 0 to 16912 18:12:43 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x200000000}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0xf00, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) 18:12:43 executing program 2: syz_mount_image$ntfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x300, 0x0, &(0x7f00000000c0), 0x0, &(0x7f00000013c0)={[{@fmask}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'syzkaller1\x00'}}]}) 18:12:43 executing program 1: syz_mount_image$ntfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x1000000, 0x0, &(0x7f00000000c0), 0x218400, &(0x7f00000013c0)) 18:12:43 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="b4050000000000006110580000000000c60000000000000095000002000000002ac73fe427abdf478e0357f2d32986f50b892b5007921cd48fe43b23be60a2dbc9778bb665510e3e22fcb26adfdc05e55a4933e62a23abb4baca4ec89323257db59db5eeda384459dd00d41b6aab85df5cab39e726769e2291b626d120c0247579f0b8edd8f16683e0623366ac632c24921d21534237743354f09cc29be2f72dfa8b05320110bcea53bb038c"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x5, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) 18:12:43 executing program 5: r0 = syz_io_uring_setup(0x3ede, &(0x7f0000000240), &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) socket$l2tp6(0xa, 0x2, 0x73) openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/locks\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READ=@pass_buffer={0x16, 0x0, 0x0, @fd_index=0x5, 0xffffffffffffffff, &(0x7f0000000040)=""/17, 0x11}, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000002040)=[{{&(0x7f0000001380)=@in6={0xa, 0x0, 0x0, @private0}, 0x80, 0x0}}], 0x1, 0x0) io_uring_enter(r0, 0x26, 0x6c00, 0x0, 0x0, 0x0) [ 552.348432][T22262] 8021q: adding VLAN 0 to HW filter on device ipvlan32 [ 552.374148][T22262] team0: Device ipvlan32 is already an upper device of the team interface [ 552.378489][T22269] loop2: detected capacity change from 0 to 1 18:12:43 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x200000000}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x1100, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) 18:12:43 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="b4050000000000006110580000000000c60000000000000095000002000000002ac73fe427abdf478e0357f2d32986f50b892b5007921cd48fe43b23be60a2dbc9778bb665510e3e22fcb26adfdc05e55a4933e62a23abb4baca4ec89323257db59db5eeda384459dd00d41b6aab85df5cab39e726769e2291b626d120c0247579f0b8edd8f16683e0623366ac632c24921d21534237743354f09cc29be2f72dfa8b05320110bcea53bb038c"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x5, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="b4050000000000006110580000000000c60000000000000095000002000000002ac73fe427abdf478e0357f2d32986f50b892b5007921cd48fe43b23be60a2dbc9778bb665510e3e22fcb26adfdc05e55a4933e62a23abb4baca4ec89323257db59db5eeda384459dd00d41b6aab85df5cab39e726769e2291b626d120c0247579f0b8edd8f16683e0623366ac632c24921d21534237743354f09cc29be2f72dfa8b05320110bcea53bb038c"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) (async) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) (async) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) (async) socket(0x1, 0x5, 0x0) (async) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) (async) 18:12:43 executing program 5: r0 = syz_io_uring_setup(0x3ede, &(0x7f0000000240), &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) socket$l2tp6(0xa, 0x2, 0x73) openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/locks\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READ=@pass_buffer={0x16, 0x0, 0x0, @fd_index=0x5, 0xffffffffffffffff, &(0x7f0000000040)=""/17, 0x11}, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000002040)=[{{&(0x7f0000001380)=@in6={0xa, 0x0, 0x0, @private0}, 0x80, 0x0}}], 0x1, 0x0) io_uring_enter(r0, 0x26, 0x7400, 0x0, 0x0, 0x0) [ 552.467251][T22275] loop1: detected capacity change from 0 to 32768 18:12:44 executing program 0: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$FS_IOC_RESVSP(r0, 0x402c5828, &(0x7f00000000c0)={0x0, 0x1, 0xa8f, 0x3078}) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x200000000}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x9) preadv(r1, &(0x7f0000000240)=[{&(0x7f0000000040)=""/94, 0x5e}, {&(0x7f00000000c0)=""/93, 0x5d}, {&(0x7f0000000140)=""/58, 0x3a}], 0x3, 0xd9f, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000002340)='./file0\x00', 0x0, 0x108) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000180)={'team0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @local}, 0x14) writev(r2, &(0x7f0000000280)=[{&(0x7f00000008c0)="110eaa1a9896d57019effc8c79961d0f73ccf3afca3754e2e7a31f536bcb7204bed59311e29c96e1c2b663d61e5b0c0a76ea50cbddaa69f578b8600f77cf1a538ac900673696245b6de4283c979a2eccd71f9583dacf650575d1398678895da32663735b4d0cabfe7e972e59c2b4b4c9c89d0b82ca2267ad5062303e8abcb79600010506702eb912e3957e507aec4e2180699a738f6753509a12282a1d7181887f6c2e03de1da0dfe3b4efbb10e9b59301b4ef8a1d", 0xb5}, {&(0x7f0000000980)="34c30d95766fefbb7bdc40a3242505587bbc8584c2bc2003185f5ce116eea020efa91e2aae1eae2b8e848ac13c3dcedbbbc82adb1e70be8eecedba37be82545f2abda4f0a0e0fd0edd6bd03bb8e9bb91c39a2c828511aef3e684ad4c21ec0c146b9570139e31cd", 0x67}], 0x2) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'macvtap0\x00'}) ioctl$PPPIOCSFLAGS1(0xffffffffffffffff, 0x40047459, &(0x7f00000001c0)) recvmmsg(0xffffffffffffffff, &(0x7f0000002200)=[{{&(0x7f0000000340)=@in={0x2, 0x0, @multicast1}, 0x80, &(0x7f0000000440)=[{&(0x7f00000004c0)=""/88, 0x58}, {&(0x7f0000000b40)=""/4096, 0x1000}], 0x2, &(0x7f0000000740)=""/192, 0xc0}, 0x3}, {{&(0x7f0000000800)=@sco={0x1f, @none}, 0x80, &(0x7f0000000480)=[{&(0x7f0000001b40)=""/82, 0x52}], 0x1, &(0x7f0000001bc0)=""/206, 0xce}, 0x7}, {{&(0x7f0000001cc0)=@in={0x2, 0x0, @broadcast}, 0x80, &(0x7f0000000880)=[{&(0x7f0000001d40)=""/146, 0x92}, {&(0x7f0000001e00)=""/231, 0xe7}], 0x2, &(0x7f0000001f00)=""/239, 0xef}, 0x3}, {{&(0x7f0000002000)=@xdp, 0x80, &(0x7f00000020c0)=[{&(0x7f0000002080)=""/58, 0x3a}], 0x1, &(0x7f0000002100)=""/251, 0xfb}, 0x9}], 0x4, 0x40, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000002380)=ANY=[@ANYBLOB="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", @ANYRESDEC=r0, @ANYBLOB="b21b22b0b59f1a76abb6323c16886f3d2569d595dca4af1ac9160b24b62e47302e148fa17433c275945e36a713e5fad2e8abc9651d17b22d7d092020f73d100115fed606c66c84318df7895b1e5780f3c785bfb92571cf1bc9", @ANYRES32=0x0, @ANYRES32, @ANYRES32=0x0], &(0x7f0000000300)=0x18) r5 = socket(0x1, 0x803, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8936, &(0x7f0000000080)={@rand_addr=' \x01\x00', 0x44, r4}) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) r7 = socket(0x10, 0x8000000803, 0x0) sendmsg$nl_route(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000a00)=@newlink={0x74, 0x10, 0x401, 0x3001, 0x25dfdbfc, {0x0, 0x0, 0x0, 0x0, 0x534ad, 0x42a03}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x34, 0x2, 0x0, 0x1, [@IFLA_IPVLAN_MODE={0x6, 0x1, 0x2}, @IFLA_IPVLAN_FLAGS={0x6, 0x2, 0x2}, @IFLA_IPVLAN_FLAGS={0x6, 0x2, 0x2}, @IFLA_IPVLAN_FLAGS={0x6, 0x2, 0x3}, @IFLA_IPVLAN_MODE={0x6}, @IFLA_IPVLAN_FLAGS={0x6, 0x2, 0x2}]}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x74}}, 0x0) 18:12:44 executing program 2: syz_mount_image$ntfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x315, 0x0, &(0x7f00000000c0), 0x0, &(0x7f00000013c0)={[{@fmask}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'syzkaller1\x00'}}]}) 18:12:44 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x200000000}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x1200, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) 18:12:44 executing program 1: syz_mount_image$ntfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x1080000, 0x0, &(0x7f00000000c0), 0x218400, &(0x7f00000013c0)) 18:12:44 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="b4050000000000006110580000000000c60000000000000095000002000000002ac73fe427abdf478e0357f2d32986f50b892b5007921cd48fe43b23be60a2dbc9778bb665510e3e22fcb26adfdc05e55a4933e62a23abb4baca4ec89323257db59db5eeda384459dd00d41b6aab85df5cab39e726769e2291b626d120c0247579f0b8edd8f16683e0623366ac632c24921d21534237743354f09cc29be2f72dfa8b05320110bcea53bb038c"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) (async) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) (async) r2 = socket(0x1, 0x5, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) 18:12:44 executing program 5: r0 = syz_io_uring_setup(0x3ede, &(0x7f0000000240), &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) socket$l2tp6(0xa, 0x2, 0x73) openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/locks\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READ=@pass_buffer={0x16, 0x0, 0x0, @fd_index=0x5, 0xffffffffffffffff, &(0x7f0000000040)=""/17, 0x11}, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000002040)=[{{&(0x7f0000001380)=@in6={0xa, 0x0, 0x0, @private0}, 0x80, 0x0}}], 0x1, 0x0) io_uring_enter(r0, 0x26, 0x7a00, 0x0, 0x0, 0x0) 18:12:44 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x200000000}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x1800, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 552.669241][T22292] loop2: detected capacity change from 0 to 1 [ 552.701674][T22293] loop1: detected capacity change from 0 to 33792 18:12:44 executing program 2: syz_mount_image$ntfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x31d, 0x0, &(0x7f00000000c0), 0x0, &(0x7f00000013c0)={[{@fmask}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'syzkaller1\x00'}}]}) [ 552.759857][T22290] 8021q: adding VLAN 0 to HW filter on device ipvlan32 [ 552.800226][T22290] team0: Device ipvlan32 is already an upper device of the team interface 18:12:44 executing program 4: r0 = openat$mice(0xffffffffffffff9c, &(0x7f0000000140), 0x40001) r1 = dup3(r0, 0xffffffffffffffff, 0x80000) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xe, 0x4, &(0x7f00000002c0)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x4, 0xc3, &(0x7f0000000380)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f0000000000)={0x8}, 0x8, 0x10, &(0x7f0000000000), 0x10, 0x0, r1}, 0x78) r3 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r3, r2, 0x5}, 0x10) r4 = socket(0x1, 0x5, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r3, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r4}, 0x20) [ 552.845507][T22303] loop2: detected capacity change from 0 to 1 18:12:44 executing program 5: r0 = syz_io_uring_setup(0x3ede, &(0x7f0000000240), &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) socket$l2tp6(0xa, 0x2, 0x73) openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/locks\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READ=@pass_buffer={0x16, 0x0, 0x0, @fd_index=0x5, 0xffffffffffffffff, &(0x7f0000000040)=""/17, 0x11}, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000002040)=[{{&(0x7f0000001380)=@in6={0xa, 0x0, 0x0, @private0}, 0x80, 0x0}}], 0x1, 0x0) io_uring_enter(r0, 0x26, 0xea00, 0x0, 0x0, 0x0) 18:12:44 executing program 1: syz_mount_image$ntfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x2000000, 0x0, &(0x7f00000000c0), 0x218400, &(0x7f00000013c0)) 18:12:44 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x200000000}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x2500, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) 18:12:44 executing program 0: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$FS_IOC_RESVSP(r0, 0x402c5828, &(0x7f00000000c0)={0x0, 0x1, 0xa8f, 0x3078}) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x200000000}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x9) preadv(r1, &(0x7f0000000240)=[{&(0x7f0000000040)=""/94, 0x5e}, {&(0x7f00000000c0)=""/93, 0x5d}, {&(0x7f0000000140)=""/58, 0x3a}], 0x3, 0xd9f, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000002340)='./file0\x00', 0x0, 0x108) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000180)={'team0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @local}, 0x14) writev(r2, &(0x7f0000000280)=[{&(0x7f00000008c0)="110eaa1a9896d57019effc8c79961d0f73ccf3afca3754e2e7a31f536bcb7204bed59311e29c96e1c2b663d61e5b0c0a76ea50cbddaa69f578b8600f77cf1a538ac900673696245b6de4283c979a2eccd71f9583dacf650575d1398678895da32663735b4d0cabfe7e972e59c2b4b4c9c89d0b82ca2267ad5062303e8abcb79600010506702eb912e3957e507aec4e2180699a738f6753509a12282a1d7181887f6c2e03de1da0dfe3b4efbb10e9b59301b4ef8a1d", 0xb5}, {&(0x7f0000000980)="34c30d95766fefbb7bdc40a3242505587bbc8584c2bc2003185f5ce116eea020efa91e2aae1eae2b8e848ac13c3dcedbbbc82adb1e70be8eecedba37be82545f2abda4f0a0e0fd0edd6bd03bb8e9bb91c39a2c828511aef3e684ad4c21ec0c146b9570139e31cd", 0x67}], 0x2) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'macvtap0\x00'}) ioctl$PPPIOCSFLAGS1(0xffffffffffffffff, 0x40047459, &(0x7f00000001c0)) recvmmsg(0xffffffffffffffff, &(0x7f0000002200)=[{{&(0x7f0000000340)=@in={0x2, 0x0, @multicast1}, 0x80, &(0x7f0000000440)=[{&(0x7f00000004c0)=""/88, 0x58}, {&(0x7f0000000b40)=""/4096, 0x1000}], 0x2, &(0x7f0000000740)=""/192, 0xc0}, 0x3}, {{&(0x7f0000000800)=@sco={0x1f, @none}, 0x80, &(0x7f0000000480)=[{&(0x7f0000001b40)=""/82, 0x52}], 0x1, &(0x7f0000001bc0)=""/206, 0xce}, 0x7}, {{&(0x7f0000001cc0)=@in={0x2, 0x0, @broadcast}, 0x80, &(0x7f0000000880)=[{&(0x7f0000001d40)=""/146, 0x92}, {&(0x7f0000001e00)=""/231, 0xe7}], 0x2, &(0x7f0000001f00)=""/239, 0xef}, 0x3}, {{&(0x7f0000002000)=@xdp, 0x80, &(0x7f00000020c0)=[{&(0x7f0000002080)=""/58, 0x3a}], 0x1, &(0x7f0000002100)=""/251, 0xfb}, 0x9}], 0x4, 0x40, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000002380)=ANY=[@ANYBLOB="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", @ANYRESDEC=r0, @ANYBLOB="b21b22b0b59f1a76abb6323c16886f3d2569d595dca4af1ac9160b24b62e47302e148fa17433c275945e36a713e5fad2e8abc9651d17b22d7d092020f73d100115fed606c66c84318df7895b1e5780f3c785bfb92571cf1bc9", @ANYRES32=0x0, @ANYRES32, @ANYRES32=0x0], &(0x7f0000000300)=0x18) r5 = socket(0x1, 0x803, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8936, &(0x7f0000000080)={@rand_addr=' \x01\x00', 0x44, r4}) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) r7 = socket(0x10, 0x8000000803, 0x0) sendmsg$nl_route(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000a00)=@newlink={0x74, 0x10, 0x401, 0x3001, 0x25dfdbfc, {0x0, 0x0, 0x0, 0x0, 0x534ad, 0x42a03}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x34, 0x2, 0x0, 0x1, [@IFLA_IPVLAN_MODE={0x6, 0x1, 0x2}, @IFLA_IPVLAN_FLAGS={0x6, 0x2, 0x2}, @IFLA_IPVLAN_FLAGS={0x6, 0x2, 0x2}, @IFLA_IPVLAN_FLAGS={0x6, 0x2, 0x3}, @IFLA_IPVLAN_MODE={0x6}, @IFLA_IPVLAN_FLAGS={0x6, 0x2, 0x2}]}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x74}}, 0x0) 18:12:44 executing program 2: syz_mount_image$ntfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x324, 0x0, &(0x7f00000000c0), 0x0, &(0x7f00000013c0)={[{@fmask}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'syzkaller1\x00'}}]}) [ 553.008646][T22309] loop1: detected capacity change from 0 to 65536 18:12:44 executing program 4: r0 = openat$mice(0xffffffffffffff9c, &(0x7f0000000140), 0x40001) r1 = dup3(r0, 0xffffffffffffffff, 0x80000) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xe, 0x4, &(0x7f00000002c0)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x4, 0xc3, &(0x7f0000000380)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f0000000000)={0x8}, 0x8, 0x10, &(0x7f0000000000), 0x10, 0x0, r1}, 0x78) (async) r3 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r3, r2, 0x5}, 0x10) r4 = socket(0x1, 0x5, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r3, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r4}, 0x20) 18:12:44 executing program 5: r0 = syz_io_uring_setup(0x3ede, &(0x7f0000000240), &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) socket$l2tp6(0xa, 0x2, 0x73) openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/locks\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READ=@pass_buffer={0x16, 0x0, 0x0, @fd_index=0x5, 0xffffffffffffffff, &(0x7f0000000040)=""/17, 0x11}, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000002040)=[{{&(0x7f0000001380)=@in6={0xa, 0x0, 0x0, @private0}, 0x80, 0x0}}], 0x1, 0x0) io_uring_enter(r0, 0x26, 0x100000, 0x0, 0x0, 0x0) 18:12:44 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x200000000}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x3f00, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 553.152721][T22316] loop2: detected capacity change from 0 to 1 18:12:44 executing program 1: syz_mount_image$ntfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x2040000, 0x0, &(0x7f00000000c0), 0x218400, &(0x7f00000013c0)) [ 553.193108][T22313] 8021q: adding VLAN 0 to HW filter on device ipvlan32 [ 553.223785][T22316] __ntfs_error: 21 callbacks suppressed [ 553.223805][T22316] ntfs: (device loop2): read_ntfs_boot_sector(): Primary boot sector is invalid. [ 553.240703][T22313] team0: Device ipvlan32 is already an upper device of the team interface [ 553.242493][T22322] loop1: detected capacity change from 0 to 66048 [ 553.264597][T22316] ntfs: (device loop2): read_ntfs_boot_sector(): Mount option errors=recover not used. Aborting without trying to recover. 18:12:44 executing program 4: r0 = openat$mice(0xffffffffffffff9c, &(0x7f0000000140), 0x40001) r1 = dup3(r0, 0xffffffffffffffff, 0x80000) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xe, 0x4, &(0x7f00000002c0)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x4, 0xc3, &(0x7f0000000380)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f0000000000)={0x8}, 0x8, 0x10, &(0x7f0000000000), 0x10, 0x0, r1}, 0x78) r3 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r3, r2, 0x5}, 0x10) r4 = socket(0x1, 0x5, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r3, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r4}, 0x20) openat$mice(0xffffffffffffff9c, &(0x7f0000000140), 0x40001) (async) dup3(r0, 0xffffffffffffffff, 0x80000) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xe, 0x4, &(0x7f00000002c0)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x4, 0xc3, &(0x7f0000000380)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f0000000000)={0x8}, 0x8, 0x10, &(0x7f0000000000), 0x10, 0x0, r1}, 0x78) (async) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) (async) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r3, r2, 0x5}, 0x10) (async) socket(0x1, 0x5, 0x0) (async) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r3, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r4}, 0x20) (async) [ 553.351138][T22316] ntfs: (device loop2): ntfs_fill_super(): Not an NTFS volume. 18:12:44 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x200000000}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x5c00, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) 18:12:44 executing program 5: r0 = syz_io_uring_setup(0x3ede, &(0x7f0000000240), &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) socket$l2tp6(0xa, 0x2, 0x73) openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/locks\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READ=@pass_buffer={0x16, 0x0, 0x0, @fd_index=0x5, 0xffffffffffffffff, &(0x7f0000000040)=""/17, 0x11}, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000002040)=[{{&(0x7f0000001380)=@in6={0xa, 0x0, 0x0, @private0}, 0x80, 0x0}}], 0x1, 0x0) io_uring_enter(r0, 0x26, 0x400000, 0x0, 0x0, 0x0) 18:12:44 executing program 1: syz_mount_image$ntfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x3000000, 0x0, &(0x7f00000000c0), 0x218400, &(0x7f00000013c0)) 18:12:44 executing program 2: syz_mount_image$ntfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x402, 0x0, &(0x7f00000000c0), 0x0, &(0x7f00000013c0)={[{@fmask}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'syzkaller1\x00'}}]}) 18:12:44 executing program 0: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$FS_IOC_RESVSP(r0, 0x402c5828, &(0x7f00000000c0)={0x0, 0x1, 0xa8f, 0x3078}) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x200000000}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x9) preadv(r1, &(0x7f0000000240)=[{&(0x7f0000000040)=""/94, 0x5e}, {&(0x7f00000000c0)=""/93, 0x5d}, {&(0x7f0000000140)=""/58, 0x3a}], 0x3, 0xd9f, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000002340)='./file0\x00', 0x0, 0x108) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000180)={'team0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @local}, 0x14) writev(r2, &(0x7f0000000280)=[{&(0x7f00000008c0)="110eaa1a9896d57019effc8c79961d0f73ccf3afca3754e2e7a31f536bcb7204bed59311e29c96e1c2b663d61e5b0c0a76ea50cbddaa69f578b8600f77cf1a538ac900673696245b6de4283c979a2eccd71f9583dacf650575d1398678895da32663735b4d0cabfe7e972e59c2b4b4c9c89d0b82ca2267ad5062303e8abcb79600010506702eb912e3957e507aec4e2180699a738f6753509a12282a1d7181887f6c2e03de1da0dfe3b4efbb10e9b59301b4ef8a1d", 0xb5}, {&(0x7f0000000980)="34c30d95766fefbb7bdc40a3242505587bbc8584c2bc2003185f5ce116eea020efa91e2aae1eae2b8e848ac13c3dcedbbbc82adb1e70be8eecedba37be82545f2abda4f0a0e0fd0edd6bd03bb8e9bb91c39a2c828511aef3e684ad4c21ec0c146b9570139e31cd", 0x67}], 0x2) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'macvtap0\x00'}) ioctl$PPPIOCSFLAGS1(0xffffffffffffffff, 0x40047459, &(0x7f00000001c0)) recvmmsg(0xffffffffffffffff, &(0x7f0000002200)=[{{&(0x7f0000000340)=@in={0x2, 0x0, @multicast1}, 0x80, &(0x7f0000000440)=[{&(0x7f00000004c0)=""/88, 0x58}, {&(0x7f0000000b40)=""/4096, 0x1000}], 0x2, &(0x7f0000000740)=""/192, 0xc0}, 0x3}, {{&(0x7f0000000800)=@sco={0x1f, @none}, 0x80, &(0x7f0000000480)=[{&(0x7f0000001b40)=""/82, 0x52}], 0x1, &(0x7f0000001bc0)=""/206, 0xce}, 0x7}, {{&(0x7f0000001cc0)=@in={0x2, 0x0, @broadcast}, 0x80, &(0x7f0000000880)=[{&(0x7f0000001d40)=""/146, 0x92}, {&(0x7f0000001e00)=""/231, 0xe7}], 0x2, &(0x7f0000001f00)=""/239, 0xef}, 0x3}, {{&(0x7f0000002000)=@xdp, 0x80, &(0x7f00000020c0)=[{&(0x7f0000002080)=""/58, 0x3a}], 0x1, &(0x7f0000002100)=""/251, 0xfb}, 0x9}], 0x4, 0x40, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000002380)=ANY=[@ANYBLOB="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", @ANYRESDEC=r0, @ANYBLOB="b21b22b0b59f1a76abb6323c16886f3d2569d595dca4af1ac9160b24b62e47302e148fa17433c275945e36a713e5fad2e8abc9651d17b22d7d092020f73d100115fed606c66c84318df7895b1e5780f3c785bfb92571cf1bc9", @ANYRES32=0x0, @ANYRES32, @ANYRES32=0x0], &(0x7f0000000300)=0x18) r5 = socket(0x1, 0x803, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8936, &(0x7f0000000080)={@rand_addr=' \x01\x00', 0x44, r4}) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) r7 = socket(0x10, 0x8000000803, 0x0) sendmsg$nl_route(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000a00)=@newlink={0x74, 0x10, 0x401, 0x3001, 0x25dfdbfc, {0x0, 0x0, 0x0, 0x0, 0x534ad, 0x42a03}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x34, 0x2, 0x0, 0x1, [@IFLA_IPVLAN_MODE={0x6, 0x1, 0x2}, @IFLA_IPVLAN_FLAGS={0x6, 0x2, 0x2}, @IFLA_IPVLAN_FLAGS={0x6, 0x2, 0x2}, @IFLA_IPVLAN_FLAGS={0x6, 0x2, 0x3}, @IFLA_IPVLAN_MODE={0x6}, @IFLA_IPVLAN_FLAGS={0x6, 0x2, 0x2}]}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x74}}, 0x0) 18:12:45 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000600)=ANY=[@ANYBLOB="b4050000000000006110580000000000c60000000000000095000002000000002ac73fe427abdf478e0357f2d21cd48fe43b23be60a2dbc9778bb665510e3e22fcb26adfdc05e55a257db59db5eeda384459dd00d41b6aab85df5cab39e726769e2291b626d120a9247579f0b8edd8f16683e0623366ac632c24921d21534237743354f09cc29be2f72dfa8b05320110bcea53bb038c00000000000000000000000000380fd2c4df1c9b91a60d494f9c6d093fd803d4349344df6ed0107556b5a43ea3ebaac29d5f62d5836bb2e8e2941b449955fc808c1fdbf7295bdfaa179ba8b4009c442306615c7db5b620846cb02e849c53d78786a54050dc912b323908e9b98339fbc6d7c1c5f40fb6e90b2b6ac52597cbb0ee7461f29209b27ef9253d5d6d34f2b5353a7b8ae45d29f9d36fb53cda6ae7e4644d4394900b8ae80a8670c3f9e6cb417a6ce5fe54529bddd298f1b1d67ff59d21f237515fe59c046cd41d50936b1c648caf1f45ad0b806d693c863ac9aac82a887b4dc671e4bb32a34b3677bc6bcd858831eeaa9882900f353ffdd5a6e15f6a2a0cd9f605f5485b7aed7b0120d90c3431eb313fa45f4b726b2479d04d82d2e37548e2c266d70a28ff28c504db88071728a5be89e765bff96619910f87f3b82f9d446cd5f69a917c5710ed5b6c062e89c900fce1af7dc44eb98775b71e34eddbf99ac09c7228457b7c05c7cf460529f29f34d902f5f542e925741b3c81a5f3f9a008efed747510725c5975b116422e2608651f71f5f19337e4557943e6fa59b3653be2024e0083b9951a8966521318e78f50d4d85af6ab91000000000000000000000000000000000000001a9b6f03cc40790c1da7f18f981e964e7856ad9da081a892b151433fc6db29dca42e0664bb8e8411e632b49722201ca774a61a5cf297212de6393ccd2118407faebbc1e0465140634d4ac71839b66ab93d022bed3846f0171e9a14f23b983c9b6b83b649d5ed3dcb95cf5cb4172b0ea0c21bfb0d048c414acea0ad255f0cabeb3190f8fcd78126a282c1d9d2c1c0cc1955f5c6d1c4548c3d2cb31b34028da9a03d9f4c5a4f4f65da1614ef3e1a642aa5ca71dbda82c8f5478e4a3f69b194f734aa00d2a4b8a498a27512549662bbd12eccff4eab74164ef591446abf6bfaba94"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040), 0x101000, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000340)={'bridge_slave_0\x00', 0x0}) r5 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000400)=@bridge_setlink={0x28, 0x13, 0xa29, 0x0, 0x0, {0x7, 0x0, 0x0, r4}, [@IFLA_LINK={0x8}]}, 0x28}}, 0x0) r6 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r7 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r7, r6, 0x5}, 0x10) r8 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r7, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r8}, 0x20) bind$unix(r8, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) bind$xdp(r2, &(0x7f0000000140)={0x2c, 0xa, r4, 0x3, r8}, 0x10) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r9 = socket(0x1, 0x5, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r9}, 0x20) [ 553.597148][T22339] loop1: detected capacity change from 0 to 98304 [ 553.609492][T22336] loop2: detected capacity change from 0 to 2 18:12:45 executing program 5: r0 = syz_io_uring_setup(0x3ede, &(0x7f0000000240), &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) socket$l2tp6(0xa, 0x2, 0x73) openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/locks\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READ=@pass_buffer={0x16, 0x0, 0x0, @fd_index=0x5, 0xffffffffffffffff, &(0x7f0000000040)=""/17, 0x11}, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000002040)=[{{&(0x7f0000001380)=@in6={0xa, 0x0, 0x0, @private0}, 0x80, 0x0}}], 0x1, 0x0) io_uring_enter(r0, 0x26, 0x800000, 0x0, 0x0, 0x0) 18:12:45 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x200000000}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0xff00, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 553.695496][T22336] ntfs: (device loop2): read_ntfs_boot_sector(): Primary boot sector is invalid. [ 553.720098][T22338] 8021q: adding VLAN 0 to HW filter on device ipvlan32 18:12:45 executing program 1: syz_mount_image$ntfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x4000000, 0x0, &(0x7f00000000c0), 0x218400, &(0x7f00000013c0)) [ 553.752505][T22338] team0: Device ipvlan32 is already an upper device of the team interface [ 553.785725][T22336] ntfs: (device loop2): read_ntfs_boot_sector(): Mount option errors=recover not used. Aborting without trying to recover. [ 553.840281][T22348] loop1: detected capacity change from 0 to 131072 [ 553.854159][T22336] ntfs: (device loop2): ntfs_fill_super(): Not an NTFS volume. 18:12:45 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x200000000}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x1000000, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) 18:12:45 executing program 5: r0 = syz_io_uring_setup(0x3ede, &(0x7f0000000240), &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) socket$l2tp6(0xa, 0x2, 0x73) openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/locks\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READ=@pass_buffer={0x16, 0x0, 0x0, @fd_index=0x5, 0xffffffffffffffff, &(0x7f0000000040)=""/17, 0x11}, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000002040)=[{{&(0x7f0000001380)=@in6={0xa, 0x0, 0x0, @private0}, 0x80, 0x0}}], 0x1, 0x0) io_uring_enter(r0, 0x26, 0x1000000, 0x0, 0x0, 0x0) 18:12:45 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000600)=ANY=[@ANYBLOB="b4050000000000006110580000000000c60000000000000095000002000000002ac73fe427abdf478e0357f2d21cd48fe43b23be60a2dbc9778bb665510e3e22fcb26adfdc05e55a257db59db5eeda384459dd00d41b6aab85df5cab39e726769e2291b626d120a9247579f0b8edd8f16683e0623366ac632c24921d21534237743354f09cc29be2f72dfa8b05320110bcea53bb038c00000000000000000000000000380fd2c4df1c9b91a60d494f9c6d093fd803d4349344df6ed0107556b5a43ea3ebaac29d5f62d5836bb2e8e2941b449955fc808c1fdbf7295bdfaa179ba8b4009c442306615c7db5b620846cb02e849c53d78786a54050dc912b323908e9b98339fbc6d7c1c5f40fb6e90b2b6ac52597cbb0ee7461f29209b27ef9253d5d6d34f2b5353a7b8ae45d29f9d36fb53cda6ae7e4644d4394900b8ae80a8670c3f9e6cb417a6ce5fe54529bddd298f1b1d67ff59d21f237515fe59c046cd41d50936b1c648caf1f45ad0b806d693c863ac9aac82a887b4dc671e4bb32a34b3677bc6bcd858831eeaa9882900f353ffdd5a6e15f6a2a0cd9f605f5485b7aed7b0120d90c3431eb313fa45f4b726b2479d04d82d2e37548e2c266d70a28ff28c504db88071728a5be89e765bff96619910f87f3b82f9d446cd5f69a917c5710ed5b6c062e89c900fce1af7dc44eb98775b71e34eddbf99ac09c7228457b7c05c7cf460529f29f34d902f5f542e925741b3c81a5f3f9a008efed747510725c5975b116422e2608651f71f5f19337e4557943e6fa59b3653be2024e0083b9951a8966521318e78f50d4d85af6ab91000000000000000000000000000000000000001a9b6f03cc40790c1da7f18f981e964e7856ad9da081a892b151433fc6db29dca42e0664bb8e8411e632b49722201ca774a61a5cf297212de6393ccd2118407faebbc1e0465140634d4ac71839b66ab93d022bed3846f0171e9a14f23b983c9b6b83b649d5ed3dcb95cf5cb4172b0ea0c21bfb0d048c414acea0ad255f0cabeb3190f8fcd78126a282c1d9d2c1c0cc1955f5c6d1c4548c3d2cb31b34028da9a03d9f4c5a4f4f65da1614ef3e1a642aa5ca71dbda82c8f5478e4a3f69b194f734aa00d2a4b8a498a27512549662bbd12eccff4eab74164ef591446abf6bfaba94"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040), 0x101000, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000340)={'bridge_slave_0\x00', 0x0}) r5 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000400)=@bridge_setlink={0x28, 0x13, 0xa29, 0x0, 0x0, {0x7, 0x0, 0x0, r4}, [@IFLA_LINK={0x8}]}, 0x28}}, 0x0) r6 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r7 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r7, r6, 0x5}, 0x10) r8 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r7, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r8}, 0x20) bind$unix(r8, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) bind$xdp(r2, &(0x7f0000000140)={0x2c, 0xa, r4, 0x3, r8}, 0x10) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r9 = socket(0x1, 0x5, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r9}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) (async) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) (async) openat$vcs(0xffffffffffffff9c, &(0x7f0000000040), 0x101000, 0x0) (async) socket$inet_udplite(0x2, 0x2, 0x88) (async) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000340)={'bridge_slave_0\x00'}) (async) socket(0x10, 0x80002, 0x0) (async) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000400)=@bridge_setlink={0x28, 0x13, 0xa29, 0x0, 0x0, {0x7, 0x0, 0x0, r4}, [@IFLA_LINK={0x8}]}, 0x28}}, 0x0) (async) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) (async) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) (async) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r7, r6, 0x5}, 0x10) (async) socket(0x1, 0x803, 0x0) (async) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r7, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r8}, 0x20) (async) bind$unix(r8, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) (async) bind$xdp(r2, &(0x7f0000000140)={0x2c, 0xa, r4, 0x3, r8}, 0x10) (async) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) (async) socket(0x1, 0x5, 0x0) (async) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r9}, 0x20) (async) 18:12:45 executing program 1: syz_mount_image$ntfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x5000000, 0x0, &(0x7f00000000c0), 0x218400, &(0x7f00000013c0)) 18:12:45 executing program 2: syz_mount_image$ntfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x406, 0x0, &(0x7f00000000c0), 0x0, &(0x7f00000013c0)={[{@fmask}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'syzkaller1\x00'}}]}) 18:12:45 executing program 0: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$FS_IOC_RESVSP(r0, 0x402c5828, &(0x7f00000000c0)={0x0, 0x1, 0xa8f, 0x3078}) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x200000000}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x9) preadv(r1, &(0x7f0000000240)=[{&(0x7f0000000040)=""/94, 0x5e}, {&(0x7f00000000c0)=""/93, 0x5d}, {&(0x7f0000000140)=""/58, 0x3a}], 0x3, 0xd9f, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000002340)='./file0\x00', 0x0, 0x108) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000180)={'team0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @local}, 0x14) writev(r2, &(0x7f0000000280)=[{&(0x7f00000008c0)="110eaa1a9896d57019effc8c79961d0f73ccf3afca3754e2e7a31f536bcb7204bed59311e29c96e1c2b663d61e5b0c0a76ea50cbddaa69f578b8600f77cf1a538ac900673696245b6de4283c979a2eccd71f9583dacf650575d1398678895da32663735b4d0cabfe7e972e59c2b4b4c9c89d0b82ca2267ad5062303e8abcb79600010506702eb912e3957e507aec4e2180699a738f6753509a12282a1d7181887f6c2e03de1da0dfe3b4efbb10e9b59301b4ef8a1d", 0xb5}, {&(0x7f0000000980)="34c30d95766fefbb7bdc40a3242505587bbc8584c2bc2003185f5ce116eea020efa91e2aae1eae2b8e848ac13c3dcedbbbc82adb1e70be8eecedba37be82545f2abda4f0a0e0fd0edd6bd03bb8e9bb91c39a2c828511aef3e684ad4c21ec0c146b9570139e31cd", 0x67}], 0x2) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'macvtap0\x00'}) ioctl$PPPIOCSFLAGS1(0xffffffffffffffff, 0x40047459, &(0x7f00000001c0)) recvmmsg(0xffffffffffffffff, &(0x7f0000002200)=[{{&(0x7f0000000340)=@in={0x2, 0x0, @multicast1}, 0x80, &(0x7f0000000440)=[{&(0x7f00000004c0)=""/88, 0x58}, {&(0x7f0000000b40)=""/4096, 0x1000}], 0x2, &(0x7f0000000740)=""/192, 0xc0}, 0x3}, {{&(0x7f0000000800)=@sco={0x1f, @none}, 0x80, &(0x7f0000000480)=[{&(0x7f0000001b40)=""/82, 0x52}], 0x1, &(0x7f0000001bc0)=""/206, 0xce}, 0x7}, {{&(0x7f0000001cc0)=@in={0x2, 0x0, @broadcast}, 0x80, &(0x7f0000000880)=[{&(0x7f0000001d40)=""/146, 0x92}, {&(0x7f0000001e00)=""/231, 0xe7}], 0x2, &(0x7f0000001f00)=""/239, 0xef}, 0x3}, {{&(0x7f0000002000)=@xdp, 0x80, &(0x7f00000020c0)=[{&(0x7f0000002080)=""/58, 0x3a}], 0x1, &(0x7f0000002100)=""/251, 0xfb}, 0x9}], 0x4, 0x40, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000002380)=ANY=[@ANYBLOB="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", @ANYRESDEC=r0, @ANYBLOB="b21b22b0b59f1a76abb6323c16886f3d2569d595dca4af1ac9160b24b62e47302e148fa17433c275945e36a713e5fad2e8abc9651d17b22d7d092020f73d100115fed606c66c84318df7895b1e5780f3c785bfb92571cf1bc9", @ANYRES32=0x0, @ANYRES32, @ANYRES32=0x0], &(0x7f0000000300)=0x18) r5 = socket(0x1, 0x803, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8936, &(0x7f0000000080)={@rand_addr=' \x01\x00', 0x44, r4}) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) r7 = socket(0x10, 0x8000000803, 0x0) sendmsg$nl_route(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000a00)=@newlink={0x7c, 0x10, 0x401, 0x3001, 0x25dfdbfc, {0x0, 0x0, 0x0, 0x0, 0x534ad, 0x42a03}, [@IFLA_LINKINFO={0x4c, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x3c, 0x2, 0x0, 0x1, [@IFLA_IPVLAN_MODE={0x6, 0x1, 0x2}, @IFLA_IPVLAN_FLAGS={0x6, 0x2, 0x2}, @IFLA_IPVLAN_FLAGS={0x6}, @IFLA_IPVLAN_FLAGS={0x6, 0x2, 0x2}, @IFLA_IPVLAN_FLAGS={0x6, 0x2, 0x3}, @IFLA_IPVLAN_MODE={0x6}, @IFLA_IPVLAN_FLAGS={0x6, 0x2, 0x2}]}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x7c}}, 0x0) 18:12:45 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x200000000}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x2000000, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 554.115250][T22366] loop2: detected capacity change from 0 to 2 [ 554.122888][T22368] loop1: detected capacity change from 0 to 163840 18:12:45 executing program 5: r0 = syz_io_uring_setup(0x3ede, &(0x7f0000000240), &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) socket$l2tp6(0xa, 0x2, 0x73) openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/locks\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READ=@pass_buffer={0x16, 0x0, 0x0, @fd_index=0x5, 0xffffffffffffffff, &(0x7f0000000040)=""/17, 0x11}, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000002040)=[{{&(0x7f0000001380)=@in6={0xa, 0x0, 0x0, @private0}, 0x80, 0x0}}], 0x1, 0x0) io_uring_enter(r0, 0x26, 0x2000000, 0x0, 0x0, 0x0) [ 554.166590][T22366] ntfs: (device loop2): read_ntfs_boot_sector(): Primary boot sector is invalid. 18:12:45 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000600)=ANY=[@ANYBLOB="b4050000000000006110580000000000c60000000000000095000002000000002ac73fe427abdf478e0357f2d21cd48fe43b23be60a2dbc9778bb665510e3e22fcb26adfdc05e55a257db59db5eeda384459dd00d41b6aab85df5cab39e726769e2291b626d120a9247579f0b8edd8f16683e0623366ac632c24921d21534237743354f09cc29be2f72dfa8b05320110bcea53bb038c00000000000000000000000000380fd2c4df1c9b91a60d494f9c6d093fd803d4349344df6ed0107556b5a43ea3ebaac29d5f62d5836bb2e8e2941b449955fc808c1fdbf7295bdfaa179ba8b4009c442306615c7db5b620846cb02e849c53d78786a54050dc912b323908e9b98339fbc6d7c1c5f40fb6e90b2b6ac52597cbb0ee7461f29209b27ef9253d5d6d34f2b5353a7b8ae45d29f9d36fb53cda6ae7e4644d4394900b8ae80a8670c3f9e6cb417a6ce5fe54529bddd298f1b1d67ff59d21f237515fe59c046cd41d50936b1c648caf1f45ad0b806d693c863ac9aac82a887b4dc671e4bb32a34b3677bc6bcd858831eeaa9882900f353ffdd5a6e15f6a2a0cd9f605f5485b7aed7b0120d90c3431eb313fa45f4b726b2479d04d82d2e37548e2c266d70a28ff28c504db88071728a5be89e765bff96619910f87f3b82f9d446cd5f69a917c5710ed5b6c062e89c900fce1af7dc44eb98775b71e34eddbf99ac09c7228457b7c05c7cf460529f29f34d902f5f542e925741b3c81a5f3f9a008efed747510725c5975b116422e2608651f71f5f19337e4557943e6fa59b3653be2024e0083b9951a8966521318e78f50d4d85af6ab91000000000000000000000000000000000000001a9b6f03cc40790c1da7f18f981e964e7856ad9da081a892b151433fc6db29dca42e0664bb8e8411e632b49722201ca774a61a5cf297212de6393ccd2118407faebbc1e0465140634d4ac71839b66ab93d022bed3846f0171e9a14f23b983c9b6b83b649d5ed3dcb95cf5cb4172b0ea0c21bfb0d048c414acea0ad255f0cabeb3190f8fcd78126a282c1d9d2c1c0cc1955f5c6d1c4548c3d2cb31b34028da9a03d9f4c5a4f4f65da1614ef3e1a642aa5ca71dbda82c8f5478e4a3f69b194f734aa00d2a4b8a498a27512549662bbd12eccff4eab74164ef591446abf6bfaba94"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) (async) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) (async) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040), 0x101000, 0x0) (async, rerun: 32) r3 = socket$inet_udplite(0x2, 0x2, 0x88) (rerun: 32) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000340)={'bridge_slave_0\x00', 0x0}) (async) r5 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000400)=@bridge_setlink={0x28, 0x13, 0xa29, 0x0, 0x0, {0x7, 0x0, 0x0, r4}, [@IFLA_LINK={0x8}]}, 0x28}}, 0x0) (async) r6 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) (async) r7 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r7, r6, 0x5}, 0x10) (async) r8 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r7, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r8}, 0x20) (async) bind$unix(r8, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) bind$xdp(r2, &(0x7f0000000140)={0x2c, 0xa, r4, 0x3, r8}, 0x10) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) (async) r9 = socket(0x1, 0x5, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r9}, 0x20) 18:12:45 executing program 1: syz_mount_image$ntfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x6000000, 0x0, &(0x7f00000000c0), 0x218400, &(0x7f00000013c0)) [ 554.219166][T22366] ntfs: (device loop2): read_ntfs_boot_sector(): Mount option errors=recover not used. Aborting without trying to recover. [ 554.234084][T22369] 8021q: adding VLAN 0 to HW filter on device ipvlan32 [ 554.259199][T22369] team0: Device ipvlan32 is already an upper device of the team interface [ 554.278355][T22366] ntfs: (device loop2): ntfs_fill_super(): Not an NTFS volume. 18:12:45 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x200000000}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x3000000, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) 18:12:45 executing program 2: syz_mount_image$ntfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x500, 0x0, &(0x7f00000000c0), 0x0, &(0x7f00000013c0)={[{@fmask}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'syzkaller1\x00'}}]}) 18:12:45 executing program 5: r0 = syz_io_uring_setup(0x3ede, &(0x7f0000000240), &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) socket$l2tp6(0xa, 0x2, 0x73) openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/locks\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READ=@pass_buffer={0x16, 0x0, 0x0, @fd_index=0x5, 0xffffffffffffffff, &(0x7f0000000040)=""/17, 0x11}, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000002040)=[{{&(0x7f0000001380)=@in6={0xa, 0x0, 0x0, @private0}, 0x80, 0x0}}], 0x1, 0x0) io_uring_enter(r0, 0x26, 0x2040000, 0x0, 0x0, 0x0) [ 554.438404][T22385] loop1: detected capacity change from 0 to 196608 18:12:45 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x200000000}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x4000000, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) 18:12:46 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="b4050000000000006110580000000000c60000000000000095000002000000002ac73fe427abdf478e0357f2d32986f50b892b5007921cd48fe43b23be60a2dbc9778bb665510e3e22fcb26adfdc05e55a4933e62a23abb4baca4ec89323257db59db5eeda384459dd00d41b6aab85df5cab39e726769e2291b626d120a9247579f0b8edd8f16683e0623366ac632c24921d21534237743354f09cc29be2f72dfa8b05320110bcea53bb038c"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000340)={'bridge_slave_0\x00', 0x0}) r4 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000400)=@bridge_setlink={0x28, 0x13, 0xa29, 0x0, 0x0, {0x7, 0x0, 0x0, r3}, [@IFLA_LINK={0x8}]}, 0x28}}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x2, 0x6, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x2}, [@map={0x18, 0xa, 0x1, 0x0, r1}, @ldst={0x2, 0x1, 0x0, 0x0, 0x7, 0xc, 0xfffffffffffffffc}]}, &(0x7f0000000140)='GPL\x00', 0x5, 0xed, &(0x7f0000000380)=""/237, 0x41100, 0x2, '\x00', r3, 0x10, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x2, 0x5}, 0x8, 0x10, &(0x7f00000001c0)={0x5, 0x9, 0x7753000, 0x20}, 0x10}, 0x78) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r5 = socket(0x1, 0x5, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r5}, 0x20) 18:12:46 executing program 1: syz_mount_image$ntfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x6040000, 0x0, &(0x7f00000000c0), 0x218400, &(0x7f00000013c0)) 18:12:46 executing program 0: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$FS_IOC_RESVSP(r0, 0x402c5828, &(0x7f00000000c0)={0x0, 0x1, 0xa8f, 0x3078}) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x200000000}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x9) preadv(r1, &(0x7f0000000240)=[{&(0x7f0000000040)=""/94, 0x5e}, {&(0x7f00000000c0)=""/93, 0x5d}, {&(0x7f0000000140)=""/58, 0x3a}], 0x3, 0xd9f, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000002340)='./file0\x00', 0x0, 0x108) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000180)={'team0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @local}, 0x14) writev(r2, &(0x7f0000000280)=[{&(0x7f00000008c0)="110eaa1a9896d57019effc8c79961d0f73ccf3afca3754e2e7a31f536bcb7204bed59311e29c96e1c2b663d61e5b0c0a76ea50cbddaa69f578b8600f77cf1a538ac900673696245b6de4283c979a2eccd71f9583dacf650575d1398678895da32663735b4d0cabfe7e972e59c2b4b4c9c89d0b82ca2267ad5062303e8abcb79600010506702eb912e3957e507aec4e2180699a738f6753509a12282a1d7181887f6c2e03de1da0dfe3b4efbb10e9b59301b4ef8a1d", 0xb5}, {&(0x7f0000000980)="34c30d95766fefbb7bdc40a3242505587bbc8584c2bc2003185f5ce116eea020efa91e2aae1eae2b8e848ac13c3dcedbbbc82adb1e70be8eecedba37be82545f2abda4f0a0e0fd0edd6bd03bb8e9bb91c39a2c828511aef3e684ad4c21ec0c146b9570139e31cd", 0x67}], 0x2) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'macvtap0\x00'}) ioctl$PPPIOCSFLAGS1(0xffffffffffffffff, 0x40047459, &(0x7f00000001c0)) recvmmsg(0xffffffffffffffff, &(0x7f0000002200)=[{{&(0x7f0000000340)=@in={0x2, 0x0, @multicast1}, 0x80, &(0x7f0000000440)=[{&(0x7f00000004c0)=""/88, 0x58}, {&(0x7f0000000b40)=""/4096, 0x1000}], 0x2, &(0x7f0000000740)=""/192, 0xc0}, 0x3}, {{&(0x7f0000000800)=@sco={0x1f, @none}, 0x80, &(0x7f0000000480)=[{&(0x7f0000001b40)=""/82, 0x52}], 0x1, &(0x7f0000001bc0)=""/206, 0xce}, 0x7}, {{&(0x7f0000001cc0)=@in={0x2, 0x0, @broadcast}, 0x80, &(0x7f0000000880)=[{&(0x7f0000001d40)=""/146, 0x92}, {&(0x7f0000001e00)=""/231, 0xe7}], 0x2, &(0x7f0000001f00)=""/239, 0xef}, 0x3}, {{&(0x7f0000002000)=@xdp, 0x80, &(0x7f00000020c0)=[{&(0x7f0000002080)=""/58, 0x3a}], 0x1, &(0x7f0000002100)=""/251, 0xfb}, 0x9}], 0x4, 0x40, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000002380)=ANY=[@ANYBLOB="050000004f2fe4e7fe91d1f169b7f431831544d94b6dbcca36d501829c64f0c28565fbc3e562e329d779aef804590001804797c4378192536ca659efcf0a6cb16b0ba5b79cfefdc8e93c46dfa0c119d12be6495820cc0b34645475d4da28535803ddcfd16f5df589e2f1ac230118eafd75a63c016b3a1663bc141e5ed84016b6b02854a48c0ec71a36a1ad145c5d2216e964a34cdf686b0a089443bd0f8c210860754d133e2c97ce8a25ee4d4eb5abb779387ca2cd9e870d5cb5854616c65c24f259eeaa625432fa25dd2832dc14f9a78ebf3a24277da2b55d09ed6a1dca07d4fb9ed592a64782b6939500505805d12b2776980c4b250f17b0b9a8fda266d7f084a9cd1022d2d670f793298bcf83b9a25e4ae25ac23ce06ef88068108ec131b23695772064709b1dbee85e5c2a0c4cf809dbd8b5617f8c6f6fba013f019829c83bd4cf10be5c6da663ce7cbf9b19ebd88bedb114ec207599273b55ec5f4cd35914f897ee8afc7663255678f6853e5cfa0dfa079ba560c7ddbc56e6352397b7266ac906a0ce0fb810eb00000000000000000000000000000000000000000000000000c54baf95f669d6810040c457be8ca739b4ec785f005bb4faa01270b999b6c9899cd9e8997d359b77c00a68341ca40b4c0e06884b6384ef6e", @ANYRESDEC=r0, @ANYBLOB="b21b22b0b59f1a76abb6323c16886f3d2569d595dca4af1ac9160b24b62e47302e148fa17433c275945e36a713e5fad2e8abc9651d17b22d7d092020f73d100115fed606c66c84318df7895b1e5780f3c785bfb92571cf1bc9", @ANYRES32=0x0, @ANYRES32, @ANYRES32=0x0], &(0x7f0000000300)=0x18) r5 = socket(0x1, 0x803, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8936, &(0x7f0000000080)={@rand_addr=' \x01\x00', 0x44, r4}) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) r7 = socket(0x10, 0x8000000803, 0x0) sendmsg$nl_route(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000a00)=@newlink={0x7c, 0x10, 0x401, 0x3001, 0x25dfdbfc, {0x0, 0x0, 0x0, 0x0, 0x534ad, 0x42a03}, [@IFLA_LINKINFO={0x4c, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x3c, 0x2, 0x0, 0x1, [@IFLA_IPVLAN_MODE={0x6, 0x1, 0x2}, @IFLA_IPVLAN_FLAGS={0x6, 0x2, 0x2}, @IFLA_IPVLAN_FLAGS={0x6}, @IFLA_IPVLAN_FLAGS={0x6, 0x2, 0x2}, @IFLA_IPVLAN_FLAGS={0x6, 0x2, 0x3}, @IFLA_IPVLAN_MODE={0x6}, @IFLA_IPVLAN_FLAGS={0x6, 0x2, 0x2}]}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x7c}}, 0x0) [ 554.577162][T22389] loop2: detected capacity change from 0 to 2 18:12:46 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x200000000}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x5000000, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) 18:12:46 executing program 5: r0 = syz_io_uring_setup(0x3ede, &(0x7f0000000240), &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) socket$l2tp6(0xa, 0x2, 0x73) openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/locks\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READ=@pass_buffer={0x16, 0x0, 0x0, @fd_index=0x5, 0xffffffffffffffff, &(0x7f0000000040)=""/17, 0x11}, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000002040)=[{{&(0x7f0000001380)=@in6={0xa, 0x0, 0x0, @private0}, 0x80, 0x0}}], 0x1, 0x0) io_uring_enter(r0, 0x26, 0x3000000, 0x0, 0x0, 0x0) [ 554.638404][T22389] ntfs: (device loop2): read_ntfs_boot_sector(): Primary boot sector is invalid. [ 554.677579][T22398] loop1: detected capacity change from 0 to 197120 18:12:46 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="b4050000000000006110580000000000c60000000000000095000002000000002ac73fe427abdf478e0357f2d32986f50b892b5007921cd48fe43b23be60a2dbc9778bb665510e3e22fcb26adfdc05e55a4933e62a23abb4baca4ec89323257db59db5eeda384459dd00d41b6aab85df5cab39e726769e2291b626d120a9247579f0b8edd8f16683e0623366ac632c24921d21534237743354f09cc29be2f72dfa8b05320110bcea53bb038c"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) (async) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) (async) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000340)={'bridge_slave_0\x00', 0x0}) r4 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000400)=@bridge_setlink={0x28, 0x13, 0xa29, 0x0, 0x0, {0x7, 0x0, 0x0, r3}, [@IFLA_LINK={0x8}]}, 0x28}}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x2, 0x6, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x2}, [@map={0x18, 0xa, 0x1, 0x0, r1}, @ldst={0x2, 0x1, 0x0, 0x0, 0x7, 0xc, 0xfffffffffffffffc}]}, &(0x7f0000000140)='GPL\x00', 0x5, 0xed, &(0x7f0000000380)=""/237, 0x41100, 0x2, '\x00', r3, 0x10, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x2, 0x5}, 0x8, 0x10, &(0x7f00000001c0)={0x5, 0x9, 0x7753000, 0x20}, 0x10}, 0x78) (async, rerun: 32) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) (async, rerun: 32) r5 = socket(0x1, 0x5, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r5}, 0x20) 18:12:46 executing program 2: syz_mount_image$ntfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x600, 0x0, &(0x7f00000000c0), 0x0, &(0x7f00000013c0)={[{@fmask}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'syzkaller1\x00'}}]}) [ 554.779958][T22399] 8021q: adding VLAN 0 to HW filter on device ipvlan32 [ 554.818762][T22399] team0: Device ipvlan32 is already an upper device of the team interface 18:12:46 executing program 1: syz_mount_image$ntfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x7000000, 0x0, &(0x7f00000000c0), 0x218400, &(0x7f00000013c0)) 18:12:46 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x200000000}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x6000000, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) 18:12:46 executing program 5: r0 = syz_io_uring_setup(0x3ede, &(0x7f0000000240), &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) socket$l2tp6(0xa, 0x2, 0x73) openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/locks\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READ=@pass_buffer={0x16, 0x0, 0x0, @fd_index=0x5, 0xffffffffffffffff, &(0x7f0000000040)=""/17, 0x11}, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000002040)=[{{&(0x7f0000001380)=@in6={0xa, 0x0, 0x0, @private0}, 0x80, 0x0}}], 0x1, 0x0) io_uring_enter(r0, 0x26, 0x4000000, 0x0, 0x0, 0x0) [ 554.921411][T22410] loop2: detected capacity change from 0 to 3 18:12:46 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="b4050000000000006110580000000000c60000000000000095000002000000002ac73fe427abdf478e0357f2d32986f50b892b5007921cd48fe43b23be60a2dbc9778bb665510e3e22fcb26adfdc05e55a4933e62a23abb4baca4ec89323257db59db5eeda384459dd00d41b6aab85df5cab39e726769e2291b626d120a9247579f0b8edd8f16683e0623366ac632c24921d21534237743354f09cc29be2f72dfa8b05320110bcea53bb038c"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) (async) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) (async) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000340)={'bridge_slave_0\x00', 0x0}) r4 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000400)=@bridge_setlink={0x28, 0x13, 0xa29, 0x0, 0x0, {0x7, 0x0, 0x0, r3}, [@IFLA_LINK={0x8}]}, 0x28}}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x2, 0x6, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x2}, [@map={0x18, 0xa, 0x1, 0x0, r1}, @ldst={0x2, 0x1, 0x0, 0x0, 0x7, 0xc, 0xfffffffffffffffc}]}, &(0x7f0000000140)='GPL\x00', 0x5, 0xed, &(0x7f0000000380)=""/237, 0x41100, 0x2, '\x00', r3, 0x10, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x2, 0x5}, 0x8, 0x10, &(0x7f00000001c0)={0x5, 0x9, 0x7753000, 0x20}, 0x10}, 0x78) (async) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) (async) r5 = socket(0x1, 0x5, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r5}, 0x20) 18:12:46 executing program 0: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$FS_IOC_RESVSP(r0, 0x402c5828, &(0x7f00000000c0)={0x0, 0x1, 0xa8f, 0x3078}) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x200000000}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x9) preadv(r1, &(0x7f0000000240)=[{&(0x7f0000000040)=""/94, 0x5e}, {&(0x7f00000000c0)=""/93, 0x5d}, {&(0x7f0000000140)=""/58, 0x3a}], 0x3, 0xd9f, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000002340)='./file0\x00', 0x0, 0x108) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000180)={'team0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @local}, 0x14) writev(r2, &(0x7f0000000280)=[{&(0x7f00000008c0)="110eaa1a9896d57019effc8c79961d0f73ccf3afca3754e2e7a31f536bcb7204bed59311e29c96e1c2b663d61e5b0c0a76ea50cbddaa69f578b8600f77cf1a538ac900673696245b6de4283c979a2eccd71f9583dacf650575d1398678895da32663735b4d0cabfe7e972e59c2b4b4c9c89d0b82ca2267ad5062303e8abcb79600010506702eb912e3957e507aec4e2180699a738f6753509a12282a1d7181887f6c2e03de1da0dfe3b4efbb10e9b59301b4ef8a1d", 0xb5}, {&(0x7f0000000980)="34c30d95766fefbb7bdc40a3242505587bbc8584c2bc2003185f5ce116eea020efa91e2aae1eae2b8e848ac13c3dcedbbbc82adb1e70be8eecedba37be82545f2abda4f0a0e0fd0edd6bd03bb8e9bb91c39a2c828511aef3e684ad4c21ec0c146b9570139e31cd", 0x67}], 0x2) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'macvtap0\x00'}) ioctl$PPPIOCSFLAGS1(0xffffffffffffffff, 0x40047459, &(0x7f00000001c0)) recvmmsg(0xffffffffffffffff, &(0x7f0000002200)=[{{&(0x7f0000000340)=@in={0x2, 0x0, @multicast1}, 0x80, &(0x7f0000000440)=[{&(0x7f00000004c0)=""/88, 0x58}, {&(0x7f0000000b40)=""/4096, 0x1000}], 0x2, &(0x7f0000000740)=""/192, 0xc0}, 0x3}, {{&(0x7f0000000800)=@sco={0x1f, @none}, 0x80, &(0x7f0000000480)=[{&(0x7f0000001b40)=""/82, 0x52}], 0x1, &(0x7f0000001bc0)=""/206, 0xce}, 0x7}, {{&(0x7f0000001cc0)=@in={0x2, 0x0, @broadcast}, 0x80, &(0x7f0000000880)=[{&(0x7f0000001d40)=""/146, 0x92}, {&(0x7f0000001e00)=""/231, 0xe7}], 0x2, &(0x7f0000001f00)=""/239, 0xef}, 0x3}, {{&(0x7f0000002000)=@xdp, 0x80, &(0x7f00000020c0)=[{&(0x7f0000002080)=""/58, 0x3a}], 0x1, &(0x7f0000002100)=""/251, 0xfb}, 0x9}], 0x4, 0x40, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000002380)=ANY=[@ANYBLOB="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", @ANYRESDEC=r0, @ANYBLOB="b21b22b0b59f1a76abb6323c16886f3d2569d595dca4af1ac9160b24b62e47302e148fa17433c275945e36a713e5fad2e8abc9651d17b22d7d092020f73d100115fed606c66c84318df7895b1e5780f3c785bfb92571cf1bc9", @ANYRES32=0x0, @ANYRES32, @ANYRES32=0x0], &(0x7f0000000300)=0x18) r5 = socket(0x1, 0x803, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8936, &(0x7f0000000080)={@rand_addr=' \x01\x00', 0x44, r4}) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) r7 = socket(0x10, 0x8000000803, 0x0) sendmsg$nl_route(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000a00)=@newlink={0x7c, 0x10, 0x401, 0x3001, 0x25dfdbfc, {0x0, 0x0, 0x0, 0x0, 0x534ad, 0x42a03}, [@IFLA_LINKINFO={0x4c, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x3c, 0x2, 0x0, 0x1, [@IFLA_IPVLAN_MODE={0x6, 0x1, 0x2}, @IFLA_IPVLAN_FLAGS={0x6, 0x2, 0x2}, @IFLA_IPVLAN_FLAGS={0x6}, @IFLA_IPVLAN_FLAGS={0x6, 0x2, 0x2}, @IFLA_IPVLAN_FLAGS={0x6, 0x2, 0x3}, @IFLA_IPVLAN_MODE={0x6}, @IFLA_IPVLAN_FLAGS={0x6, 0x2, 0x2}]}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x7c}}, 0x0) [ 554.990476][T22414] loop1: detected capacity change from 0 to 229376 18:12:46 executing program 1: syz_mount_image$ntfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x8000000, 0x0, &(0x7f00000000c0), 0x218400, &(0x7f00000013c0)) 18:12:46 executing program 2: syz_mount_image$ntfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x604, 0x0, &(0x7f00000000c0), 0x0, &(0x7f00000013c0)={[{@fmask}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'syzkaller1\x00'}}]}) 18:12:46 executing program 4: add_key$user(&(0x7f0000000040), &(0x7f0000000140)={'syz', 0x3}, &(0x7f0000000380)="5ca73763c1c15426bc4e1e7e0a3aa3f631aada042257b19ecbfd02178f7d7da10e1ba609f9ef907c63c46fc8a6bda0757af0bfb7f1ea550710b1b0d8ebf78bab7d1bafe1f3678b87224031a6570bda4e6b27a27ea56279fc03e818735f1e10b230328b8ba3a6caca2c76ee7df8dc9e3fa6246296eadde8ae1d2671d9b31c9ad8b8a757a53b789a6aadf89fd9f6f96efa2df8cdd916d7efda75214a478bc3f6dd7d578369722b5a837243e6823f510c4d9fda088ae5fc75a99a611bf449", 0xbd, 0xfffffffffffffffb) r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="b4050000000000006110580000000000c60000000000000095000002000000002ac73fe427abdf478e0357f2d32986f50b892b5007921cd48fe43b23be60a2dbc9778bb665510e3e22fcb26adfdc05e55a4933e62a23abb4baca4ec89323257db59db5eeda384459dd00d41b6aab85df5cab39e726769e2291b626d120a9247579f0b8edd8f16683e0623366ac632c24921d21534237743354f09cc29be2f72dfa8b05320110bcea53bb038c"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x5, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) 18:12:46 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x200000000}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x7000000, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) 18:12:46 executing program 5: r0 = syz_io_uring_setup(0x3ede, &(0x7f0000000240), &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) socket$l2tp6(0xa, 0x2, 0x73) openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/locks\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READ=@pass_buffer={0x16, 0x0, 0x0, @fd_index=0x5, 0xffffffffffffffff, &(0x7f0000000040)=""/17, 0x11}, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000002040)=[{{&(0x7f0000001380)=@in6={0xa, 0x0, 0x0, @private0}, 0x80, 0x0}}], 0x1, 0x0) io_uring_enter(r0, 0x26, 0x5000000, 0x0, 0x0, 0x0) [ 555.236553][T22429] loop2: detected capacity change from 0 to 3 [ 555.237849][T22423] 8021q: adding VLAN 0 to HW filter on device ipvlan32 [ 555.264520][T22430] loop1: detected capacity change from 0 to 262144 18:12:46 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x200000000}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x8000000, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) 18:12:46 executing program 4: add_key$user(&(0x7f0000000040), &(0x7f0000000140)={'syz', 0x3}, &(0x7f0000000380)="5ca73763c1c15426bc4e1e7e0a3aa3f631aada042257b19ecbfd02178f7d7da10e1ba609f9ef907c63c46fc8a6bda0757af0bfb7f1ea550710b1b0d8ebf78bab7d1bafe1f3678b87224031a6570bda4e6b27a27ea56279fc03e818735f1e10b230328b8ba3a6caca2c76ee7df8dc9e3fa6246296eadde8ae1d2671d9b31c9ad8b8a757a53b789a6aadf89fd9f6f96efa2df8cdd916d7efda75214a478bc3f6dd7d578369722b5a837243e6823f510c4d9fda088ae5fc75a99a611bf449", 0xbd, 0xfffffffffffffffb) r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="b4050000000000006110580000000000c60000000000000095000002000000002ac73fe427abdf478e0357f2d32986f50b892b5007921cd48fe43b23be60a2dbc9778bb665510e3e22fcb26adfdc05e55a4933e62a23abb4baca4ec89323257db59db5eeda384459dd00d41b6aab85df5cab39e726769e2291b626d120a9247579f0b8edd8f16683e0623366ac632c24921d21534237743354f09cc29be2f72dfa8b05320110bcea53bb038c"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x5, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) add_key$user(&(0x7f0000000040), &(0x7f0000000140)={'syz', 0x3}, &(0x7f0000000380)="5ca73763c1c15426bc4e1e7e0a3aa3f631aada042257b19ecbfd02178f7d7da10e1ba609f9ef907c63c46fc8a6bda0757af0bfb7f1ea550710b1b0d8ebf78bab7d1bafe1f3678b87224031a6570bda4e6b27a27ea56279fc03e818735f1e10b230328b8ba3a6caca2c76ee7df8dc9e3fa6246296eadde8ae1d2671d9b31c9ad8b8a757a53b789a6aadf89fd9f6f96efa2df8cdd916d7efda75214a478bc3f6dd7d578369722b5a837243e6823f510c4d9fda088ae5fc75a99a611bf449", 0xbd, 0xfffffffffffffffb) (async) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="b4050000000000006110580000000000c60000000000000095000002000000002ac73fe427abdf478e0357f2d32986f50b892b5007921cd48fe43b23be60a2dbc9778bb665510e3e22fcb26adfdc05e55a4933e62a23abb4baca4ec89323257db59db5eeda384459dd00d41b6aab85df5cab39e726769e2291b626d120a9247579f0b8edd8f16683e0623366ac632c24921d21534237743354f09cc29be2f72dfa8b05320110bcea53bb038c"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) (async) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) (async) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) (async) socket(0x1, 0x5, 0x0) (async) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) (async) [ 555.300606][T22423] team0: Device ipvlan32 is already an upper device of the team interface 18:12:46 executing program 2: syz_mount_image$ntfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x700, 0x0, &(0x7f00000000c0), 0x0, &(0x7f00000013c0)={[{@fmask}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'syzkaller1\x00'}}]}) 18:12:46 executing program 1: syz_mount_image$ntfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x9000000, 0x0, &(0x7f00000000c0), 0x218400, &(0x7f00000013c0)) 18:12:46 executing program 5: r0 = syz_io_uring_setup(0x3ede, &(0x7f0000000240), &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) socket$l2tp6(0xa, 0x2, 0x73) openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/locks\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READ=@pass_buffer={0x16, 0x0, 0x0, @fd_index=0x5, 0xffffffffffffffff, &(0x7f0000000040)=""/17, 0x11}, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000002040)=[{{&(0x7f0000001380)=@in6={0xa, 0x0, 0x0, @private0}, 0x80, 0x0}}], 0x1, 0x0) io_uring_enter(r0, 0x26, 0x6000000, 0x0, 0x0, 0x0) 18:12:46 executing program 0: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$FS_IOC_RESVSP(r0, 0x402c5828, &(0x7f00000000c0)={0x0, 0x1, 0xa8f, 0x3078}) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x200000000}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x9) preadv(r1, &(0x7f0000000240)=[{&(0x7f0000000040)=""/94, 0x5e}, {&(0x7f00000000c0)=""/93, 0x5d}, {&(0x7f0000000140)=""/58, 0x3a}], 0x3, 0xd9f, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000002340)='./file0\x00', 0x0, 0x108) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000180)={'team0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @local}, 0x14) writev(r2, &(0x7f0000000280)=[{&(0x7f00000008c0)="110eaa1a9896d57019effc8c79961d0f73ccf3afca3754e2e7a31f536bcb7204bed59311e29c96e1c2b663d61e5b0c0a76ea50cbddaa69f578b8600f77cf1a538ac900673696245b6de4283c979a2eccd71f9583dacf650575d1398678895da32663735b4d0cabfe7e972e59c2b4b4c9c89d0b82ca2267ad5062303e8abcb79600010506702eb912e3957e507aec4e2180699a738f6753509a12282a1d7181887f6c2e03de1da0dfe3b4efbb10e9b59301b4ef8a1d", 0xb5}, {&(0x7f0000000980)="34c30d95766fefbb7bdc40a3242505587bbc8584c2bc2003185f5ce116eea020efa91e2aae1eae2b8e848ac13c3dcedbbbc82adb1e70be8eecedba37be82545f2abda4f0a0e0fd0edd6bd03bb8e9bb91c39a2c828511aef3e684ad4c21ec0c146b9570139e31cd", 0x67}], 0x2) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'macvtap0\x00'}) ioctl$PPPIOCSFLAGS1(0xffffffffffffffff, 0x40047459, &(0x7f00000001c0)) recvmmsg(0xffffffffffffffff, &(0x7f0000002200)=[{{&(0x7f0000000340)=@in={0x2, 0x0, @multicast1}, 0x80, &(0x7f0000000440)=[{&(0x7f00000004c0)=""/88, 0x58}, {&(0x7f0000000b40)=""/4096, 0x1000}], 0x2, &(0x7f0000000740)=""/192, 0xc0}, 0x3}, {{&(0x7f0000000800)=@sco={0x1f, @none}, 0x80, &(0x7f0000000480)=[{&(0x7f0000001b40)=""/82, 0x52}], 0x1, &(0x7f0000001bc0)=""/206, 0xce}, 0x7}, {{&(0x7f0000001cc0)=@in={0x2, 0x0, @broadcast}, 0x80, &(0x7f0000000880)=[{&(0x7f0000001d40)=""/146, 0x92}, {&(0x7f0000001e00)=""/231, 0xe7}], 0x2, &(0x7f0000001f00)=""/239, 0xef}, 0x3}, {{&(0x7f0000002000)=@xdp, 0x80, &(0x7f00000020c0)=[{&(0x7f0000002080)=""/58, 0x3a}], 0x1, &(0x7f0000002100)=""/251, 0xfb}, 0x9}], 0x4, 0x40, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000002380)=ANY=[@ANYBLOB="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", @ANYRESDEC=r0, @ANYBLOB="b21b22b0b59f1a76abb6323c16886f3d2569d595dca4af1ac9160b24b62e47302e148fa17433c275945e36a713e5fad2e8abc9651d17b22d7d092020f73d100115fed606c66c84318df7895b1e5780f3c785bfb92571cf1bc9", @ANYRES32=0x0, @ANYRES32, @ANYRES32=0x0], &(0x7f0000000300)=0x18) r5 = socket(0x1, 0x803, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8936, &(0x7f0000000080)={@rand_addr=' \x01\x00', 0x44, r4}) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) r7 = socket(0x10, 0x8000000803, 0x0) sendmsg$nl_route(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000a00)=@newlink={0x74, 0x10, 0x401, 0x3001, 0x25dfdbfc, {0x0, 0x0, 0x0, 0x0, 0x534ad, 0x42a03}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x34, 0x2, 0x0, 0x1, [@IFLA_IPVLAN_MODE={0x6, 0x1, 0x2}, @IFLA_IPVLAN_FLAGS={0x6, 0x2, 0x1}, @IFLA_IPVLAN_FLAGS={0x6, 0x2, 0x2}, @IFLA_IPVLAN_FLAGS={0x6, 0x2, 0x3}, @IFLA_IPVLAN_MODE={0x6}, @IFLA_IPVLAN_FLAGS={0x6, 0x2, 0x2}]}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x74}}, 0x0) 18:12:46 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x200000000}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x9000000, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) 18:12:47 executing program 4: add_key$user(&(0x7f0000000040), &(0x7f0000000140)={'syz', 0x3}, &(0x7f0000000380)="5ca73763c1c15426bc4e1e7e0a3aa3f631aada042257b19ecbfd02178f7d7da10e1ba609f9ef907c63c46fc8a6bda0757af0bfb7f1ea550710b1b0d8ebf78bab7d1bafe1f3678b87224031a6570bda4e6b27a27ea56279fc03e818735f1e10b230328b8ba3a6caca2c76ee7df8dc9e3fa6246296eadde8ae1d2671d9b31c9ad8b8a757a53b789a6aadf89fd9f6f96efa2df8cdd916d7efda75214a478bc3f6dd7d578369722b5a837243e6823f510c4d9fda088ae5fc75a99a611bf449", 0xbd, 0xfffffffffffffffb) r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="b4050000000000006110580000000000c60000000000000095000002000000002ac73fe427abdf478e0357f2d32986f50b892b5007921cd48fe43b23be60a2dbc9778bb665510e3e22fcb26adfdc05e55a4933e62a23abb4baca4ec89323257db59db5eeda384459dd00d41b6aab85df5cab39e726769e2291b626d120a9247579f0b8edd8f16683e0623366ac632c24921d21534237743354f09cc29be2f72dfa8b05320110bcea53bb038c"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x5, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) add_key$user(&(0x7f0000000040), &(0x7f0000000140)={'syz', 0x3}, &(0x7f0000000380)="5ca73763c1c15426bc4e1e7e0a3aa3f631aada042257b19ecbfd02178f7d7da10e1ba609f9ef907c63c46fc8a6bda0757af0bfb7f1ea550710b1b0d8ebf78bab7d1bafe1f3678b87224031a6570bda4e6b27a27ea56279fc03e818735f1e10b230328b8ba3a6caca2c76ee7df8dc9e3fa6246296eadde8ae1d2671d9b31c9ad8b8a757a53b789a6aadf89fd9f6f96efa2df8cdd916d7efda75214a478bc3f6dd7d578369722b5a837243e6823f510c4d9fda088ae5fc75a99a611bf449", 0xbd, 0xfffffffffffffffb) (async) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="b4050000000000006110580000000000c60000000000000095000002000000002ac73fe427abdf478e0357f2d32986f50b892b5007921cd48fe43b23be60a2dbc9778bb665510e3e22fcb26adfdc05e55a4933e62a23abb4baca4ec89323257db59db5eeda384459dd00d41b6aab85df5cab39e726769e2291b626d120a9247579f0b8edd8f16683e0623366ac632c24921d21534237743354f09cc29be2f72dfa8b05320110bcea53bb038c"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) (async) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) (async) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) (async) socket(0x1, 0x5, 0x0) (async) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) (async) [ 555.477077][T22447] loop2: detected capacity change from 0 to 3 [ 555.489227][T22449] loop1: detected capacity change from 0 to 264192 18:12:47 executing program 2: syz_mount_image$ntfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x801, 0x0, &(0x7f00000000c0), 0x0, &(0x7f00000013c0)={[{@fmask}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'syzkaller1\x00'}}]}) 18:12:47 executing program 5: r0 = syz_io_uring_setup(0x3ede, &(0x7f0000000240), &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) socket$l2tp6(0xa, 0x2, 0x73) openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/locks\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READ=@pass_buffer={0x16, 0x0, 0x0, @fd_index=0x5, 0xffffffffffffffff, &(0x7f0000000040)=""/17, 0x11}, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000002040)=[{{&(0x7f0000001380)=@in6={0xa, 0x0, 0x0, @private0}, 0x80, 0x0}}], 0x1, 0x0) io_uring_enter(r0, 0x26, 0x6040000, 0x0, 0x0, 0x0) 18:12:47 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x200000000}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0xa000000, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) 18:12:47 executing program 1: syz_mount_image$ntfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0xa000000, 0x0, &(0x7f00000000c0), 0x218400, &(0x7f00000013c0)) [ 555.626961][T22452] 8021q: adding VLAN 0 to HW filter on device ipvlan32 [ 555.662611][T22452] team0: Device ipvlan32 is already an upper device of the team interface 18:12:47 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xe, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="b4050000000000006110580000000000c60000000000000095000002000000002ac73fe427abdf478e0357f2d32986f50b892b5007921cd48fe43b23be60a2dbc9778bb665510e3e22fcb26adfdc05e55a4933e62a23abb4baca4ec89323257db59db5eeda384459dd00d41b6aab85df5cab39e726769e2291b626d120a9247579f0b8edd8f16683e0623366ac632c24921d21534237743354f09cc29be2f72dfa8b05320110bcea53bb038c"], &(0x7f0000000140)='GPL\x00', 0x3, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x7f}, 0x10}, 0x78) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000040)={0xffffffffffffffff, 0x1}, 0xc) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x5, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) [ 555.689485][T22462] loop2: detected capacity change from 0 to 4 18:12:47 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x200000000}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0xb000000, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) 18:12:47 executing program 5: r0 = syz_io_uring_setup(0x3ede, &(0x7f0000000240), &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) socket$l2tp6(0xa, 0x2, 0x73) openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/locks\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READ=@pass_buffer={0x16, 0x0, 0x0, @fd_index=0x5, 0xffffffffffffffff, &(0x7f0000000040)=""/17, 0x11}, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000002040)=[{{&(0x7f0000001380)=@in6={0xa, 0x0, 0x0, @private0}, 0x80, 0x0}}], 0x1, 0x0) io_uring_enter(r0, 0x26, 0x7000000, 0x0, 0x0, 0x0) [ 555.759787][T22467] loop1: detected capacity change from 0 to 264192 18:12:47 executing program 2: syz_mount_image$ntfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x900, 0x0, &(0x7f00000000c0), 0x0, &(0x7f00000013c0)={[{@fmask}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'syzkaller1\x00'}}]}) 18:12:47 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xe, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="b4050000000000006110580000000000c60000000000000095000002000000002ac73fe427abdf478e0357f2d32986f50b892b5007921cd48fe43b23be60a2dbc9778bb665510e3e22fcb26adfdc05e55a4933e62a23abb4baca4ec89323257db59db5eeda384459dd00d41b6aab85df5cab39e726769e2291b626d120a9247579f0b8edd8f16683e0623366ac632c24921d21534237743354f09cc29be2f72dfa8b05320110bcea53bb038c"], &(0x7f0000000140)='GPL\x00', 0x3, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x7f}, 0x10}, 0x78) (async, rerun: 32) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000040)={0xffffffffffffffff, 0x1}, 0xc) (rerun: 32) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) (async) r2 = socket(0x1, 0x5, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) 18:12:47 executing program 0: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$FS_IOC_RESVSP(r0, 0x402c5828, &(0x7f00000000c0)={0x0, 0x1, 0xa8f, 0x3078}) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x200000000}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x9) preadv(r1, &(0x7f0000000240)=[{&(0x7f0000000040)=""/94, 0x5e}, {&(0x7f00000000c0)=""/93, 0x5d}, {&(0x7f0000000140)=""/58, 0x3a}], 0x3, 0xd9f, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000002340)='./file0\x00', 0x0, 0x108) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000180)={'team0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @local}, 0x14) writev(r2, &(0x7f0000000280)=[{&(0x7f00000008c0)="110eaa1a9896d57019effc8c79961d0f73ccf3afca3754e2e7a31f536bcb7204bed59311e29c96e1c2b663d61e5b0c0a76ea50cbddaa69f578b8600f77cf1a538ac900673696245b6de4283c979a2eccd71f9583dacf650575d1398678895da32663735b4d0cabfe7e972e59c2b4b4c9c89d0b82ca2267ad5062303e8abcb79600010506702eb912e3957e507aec4e2180699a738f6753509a12282a1d7181887f6c2e03de1da0dfe3b4efbb10e9b59301b4ef8a1d", 0xb5}, {&(0x7f0000000980)="34c30d95766fefbb7bdc40a3242505587bbc8584c2bc2003185f5ce116eea020efa91e2aae1eae2b8e848ac13c3dcedbbbc82adb1e70be8eecedba37be82545f2abda4f0a0e0fd0edd6bd03bb8e9bb91c39a2c828511aef3e684ad4c21ec0c146b9570139e31cd", 0x67}], 0x2) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'macvtap0\x00'}) ioctl$PPPIOCSFLAGS1(0xffffffffffffffff, 0x40047459, &(0x7f00000001c0)) recvmmsg(0xffffffffffffffff, &(0x7f0000002200)=[{{&(0x7f0000000340)=@in={0x2, 0x0, @multicast1}, 0x80, &(0x7f0000000440)=[{&(0x7f00000004c0)=""/88, 0x58}, {&(0x7f0000000b40)=""/4096, 0x1000}], 0x2, &(0x7f0000000740)=""/192, 0xc0}, 0x3}, {{&(0x7f0000000800)=@sco={0x1f, @none}, 0x80, &(0x7f0000000480)=[{&(0x7f0000001b40)=""/82, 0x52}], 0x1, &(0x7f0000001bc0)=""/206, 0xce}, 0x7}, {{&(0x7f0000001cc0)=@in={0x2, 0x0, @broadcast}, 0x80, &(0x7f0000000880)=[{&(0x7f0000001d40)=""/146, 0x92}, {&(0x7f0000001e00)=""/231, 0xe7}], 0x2, &(0x7f0000001f00)=""/239, 0xef}, 0x3}, {{&(0x7f0000002000)=@xdp, 0x80, &(0x7f00000020c0)=[{&(0x7f0000002080)=""/58, 0x3a}], 0x1, &(0x7f0000002100)=""/251, 0xfb}, 0x9}], 0x4, 0x40, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000002380)=ANY=[@ANYBLOB="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", @ANYRESDEC=r0, @ANYBLOB="b21b22b0b59f1a76abb6323c16886f3d2569d595dca4af1ac9160b24b62e47302e148fa17433c275945e36a713e5fad2e8abc9651d17b22d7d092020f73d100115fed606c66c84318df7895b1e5780f3c785bfb92571cf1bc9", @ANYRES32=0x0, @ANYRES32, @ANYRES32=0x0], &(0x7f0000000300)=0x18) r5 = socket(0x1, 0x803, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8936, &(0x7f0000000080)={@rand_addr=' \x01\x00', 0x44, r4}) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) r7 = socket(0x10, 0x8000000803, 0x0) sendmsg$nl_route(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000a00)=@newlink={0x74, 0x10, 0x401, 0x3001, 0x25dfdbfc, {0x0, 0x0, 0x0, 0x0, 0x534ad, 0x42a03}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x34, 0x2, 0x0, 0x1, [@IFLA_IPVLAN_MODE={0x6, 0x1, 0x2}, @IFLA_IPVLAN_FLAGS={0x6, 0x2, 0x1}, @IFLA_IPVLAN_FLAGS={0x6, 0x2, 0x2}, @IFLA_IPVLAN_FLAGS={0x6, 0x2, 0x3}, @IFLA_IPVLAN_MODE={0x6}, @IFLA_IPVLAN_FLAGS={0x6, 0x2, 0x2}]}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x74}}, 0x0) 18:12:47 executing program 1: syz_mount_image$ntfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0xb000000, 0x0, &(0x7f00000000c0), 0x218400, &(0x7f00000013c0)) 18:12:47 executing program 5: r0 = syz_io_uring_setup(0x3ede, &(0x7f0000000240), &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) socket$l2tp6(0xa, 0x2, 0x73) openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/locks\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READ=@pass_buffer={0x16, 0x0, 0x0, @fd_index=0x5, 0xffffffffffffffff, &(0x7f0000000040)=""/17, 0x11}, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000002040)=[{{&(0x7f0000001380)=@in6={0xa, 0x0, 0x0, @private0}, 0x80, 0x0}}], 0x1, 0x0) io_uring_enter(r0, 0x26, 0x8000000, 0x0, 0x0, 0x0) 18:12:47 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x200000000}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0xc000000, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 555.946399][T22476] loop2: detected capacity change from 0 to 4 18:12:47 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xe, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="b4050000000000006110580000000000c60000000000000095000002000000002ac73fe427abdf478e0357f2d32986f50b892b5007921cd48fe43b23be60a2dbc9778bb665510e3e22fcb26adfdc05e55a4933e62a23abb4baca4ec89323257db59db5eeda384459dd00d41b6aab85df5cab39e726769e2291b626d120a9247579f0b8edd8f16683e0623366ac632c24921d21534237743354f09cc29be2f72dfa8b05320110bcea53bb038c"], &(0x7f0000000140)='GPL\x00', 0x3, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x7f}, 0x10}, 0x78) (async) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000040)={0xffffffffffffffff, 0x1}, 0xc) (async) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) (async) r2 = socket(0x1, 0x5, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) [ 555.988216][T22482] loop1: detected capacity change from 0 to 264192 [ 556.008375][T22481] 8021q: adding VLAN 0 to HW filter on device ipvlan32 18:12:47 executing program 2: syz_mount_image$ntfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0xa00, 0x0, &(0x7f00000000c0), 0x0, &(0x7f00000013c0)={[{@fmask}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'syzkaller1\x00'}}]}) [ 556.032144][T22481] team0: Device ipvlan32 is already an upper device of the team interface 18:12:47 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x200000000}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0xd000000, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) 18:12:47 executing program 1: syz_mount_image$ntfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0xc000000, 0x0, &(0x7f00000000c0), 0x218400, &(0x7f00000013c0)) 18:12:47 executing program 5: r0 = syz_io_uring_setup(0x3ede, &(0x7f0000000240), &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) socket$l2tp6(0xa, 0x2, 0x73) openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/locks\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READ=@pass_buffer={0x16, 0x0, 0x0, @fd_index=0x5, 0xffffffffffffffff, &(0x7f0000000040)=""/17, 0x11}, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000002040)=[{{&(0x7f0000001380)=@in6={0xa, 0x0, 0x0, @private0}, 0x80, 0x0}}], 0x1, 0x0) io_uring_enter(r0, 0x26, 0x9000000, 0x0, 0x0, 0x0) [ 556.160922][T22492] loop2: detected capacity change from 0 to 5 18:12:47 executing program 0: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$FS_IOC_RESVSP(r0, 0x402c5828, &(0x7f00000000c0)={0x0, 0x1, 0xa8f, 0x3078}) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x200000000}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x9) preadv(r1, &(0x7f0000000240)=[{&(0x7f0000000040)=""/94, 0x5e}, {&(0x7f00000000c0)=""/93, 0x5d}, {&(0x7f0000000140)=""/58, 0x3a}], 0x3, 0xd9f, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000002340)='./file0\x00', 0x0, 0x108) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000180)={'team0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @local}, 0x14) writev(r2, &(0x7f0000000280)=[{&(0x7f00000008c0)="110eaa1a9896d57019effc8c79961d0f73ccf3afca3754e2e7a31f536bcb7204bed59311e29c96e1c2b663d61e5b0c0a76ea50cbddaa69f578b8600f77cf1a538ac900673696245b6de4283c979a2eccd71f9583dacf650575d1398678895da32663735b4d0cabfe7e972e59c2b4b4c9c89d0b82ca2267ad5062303e8abcb79600010506702eb912e3957e507aec4e2180699a738f6753509a12282a1d7181887f6c2e03de1da0dfe3b4efbb10e9b59301b4ef8a1d", 0xb5}, {&(0x7f0000000980)="34c30d95766fefbb7bdc40a3242505587bbc8584c2bc2003185f5ce116eea020efa91e2aae1eae2b8e848ac13c3dcedbbbc82adb1e70be8eecedba37be82545f2abda4f0a0e0fd0edd6bd03bb8e9bb91c39a2c828511aef3e684ad4c21ec0c146b9570139e31cd", 0x67}], 0x2) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'macvtap0\x00'}) ioctl$PPPIOCSFLAGS1(0xffffffffffffffff, 0x40047459, &(0x7f00000001c0)) recvmmsg(0xffffffffffffffff, &(0x7f0000002200)=[{{&(0x7f0000000340)=@in={0x2, 0x0, @multicast1}, 0x80, &(0x7f0000000440)=[{&(0x7f00000004c0)=""/88, 0x58}, {&(0x7f0000000b40)=""/4096, 0x1000}], 0x2, &(0x7f0000000740)=""/192, 0xc0}, 0x3}, {{&(0x7f0000000800)=@sco={0x1f, @none}, 0x80, &(0x7f0000000480)=[{&(0x7f0000001b40)=""/82, 0x52}], 0x1, &(0x7f0000001bc0)=""/206, 0xce}, 0x7}, {{&(0x7f0000001cc0)=@in={0x2, 0x0, @broadcast}, 0x80, &(0x7f0000000880)=[{&(0x7f0000001d40)=""/146, 0x92}, {&(0x7f0000001e00)=""/231, 0xe7}], 0x2, &(0x7f0000001f00)=""/239, 0xef}, 0x3}, {{&(0x7f0000002000)=@xdp, 0x80, &(0x7f00000020c0)=[{&(0x7f0000002080)=""/58, 0x3a}], 0x1, &(0x7f0000002100)=""/251, 0xfb}, 0x9}], 0x4, 0x40, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000002380)=ANY=[@ANYBLOB="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", @ANYRESDEC=r0, @ANYBLOB="b21b22b0b59f1a76abb6323c16886f3d2569d595dca4af1ac9160b24b62e47302e148fa17433c275945e36a713e5fad2e8abc9651d17b22d7d092020f73d100115fed606c66c84318df7895b1e5780f3c785bfb92571cf1bc9", @ANYRES32=0x0, @ANYRES32, @ANYRES32=0x0], &(0x7f0000000300)=0x18) r5 = socket(0x1, 0x803, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8936, &(0x7f0000000080)={@rand_addr=' \x01\x00', 0x44, r4}) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) r7 = socket(0x10, 0x8000000803, 0x0) sendmsg$nl_route(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000a00)=@newlink={0x74, 0x10, 0x401, 0x3001, 0x25dfdbfc, {0x0, 0x0, 0x0, 0x0, 0x534ad, 0x42a03}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x34, 0x2, 0x0, 0x1, [@IFLA_IPVLAN_MODE={0x6, 0x1, 0x2}, @IFLA_IPVLAN_FLAGS={0x6, 0x2, 0x1}, @IFLA_IPVLAN_FLAGS={0x6, 0x2, 0x2}, @IFLA_IPVLAN_FLAGS={0x6, 0x2, 0x3}, @IFLA_IPVLAN_MODE={0x6}, @IFLA_IPVLAN_FLAGS={0x6, 0x2, 0x2}]}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x74}}, 0x0) 18:12:47 executing program 5: r0 = syz_io_uring_setup(0x3ede, &(0x7f0000000240), &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) socket$l2tp6(0xa, 0x2, 0x73) openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/locks\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READ=@pass_buffer={0x16, 0x0, 0x0, @fd_index=0x5, 0xffffffffffffffff, &(0x7f0000000040)=""/17, 0x11}, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000002040)=[{{&(0x7f0000001380)=@in6={0xa, 0x0, 0x0, @private0}, 0x80, 0x0}}], 0x1, 0x0) io_uring_enter(r0, 0x26, 0xa000000, 0x0, 0x0, 0x0) [ 556.238957][T22497] loop1: detected capacity change from 0 to 264192 18:12:47 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="b4050000000000006110580000000000c60000000000000095000002000000002ac73fe427abdf478e0357f2d32986f50b892b5007921cd48fe43b23be60a2dbc9778bb665510e3e22fcb26adfdc05e55a4933e62a23abb4baca4ec89323257db59db5eeda384459dd00d41b6aab85df5cab39e726769e2291b626d120a9247579f0b8edd8f16683e0623366ac632c24921d21534237743354f09cc29be2f72dfa8b05320110bcea53bb038c"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) r2 = openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000040), 0x440000, 0x0) r3 = syz_open_dev$mouse(&(0x7f0000000140), 0x2, 0x64c540) r4 = openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000280), 0x8002, 0x0) r5 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000700)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c00000002000000000000000000000604"], &(0x7f00000004c0)=""/152, 0x26, 0x98, 0x1}, 0x20) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000400)={r5, 0x10, &(0x7f0000000380)={0x0, 0x0, 0x0}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000002c0)=r6, 0x4) r7 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r8 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r8, r7, 0x5}, 0x10) r9 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r8, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r9}, 0x20) r10 = socket$inet_icmp(0x2, 0x2, 0x1) sendmmsg(r10, &(0x7f0000003440)=[{{&(0x7f0000000180)=@ax25={{0x3, @null, 0x3}, [@bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @null, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast]}, 0x80, &(0x7f0000001940)=[{&(0x7f0000000740)="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", 0x1000}, {&(0x7f00000003c0)="30be807c7d236de367c64ca44a2a9823aa657c12e2b38f20e3f96d5eab1af5", 0x1f}, {&(0x7f0000001740)="47ad1ff5a80721f1fa55aa1606a7447d721426bde887399735ddf5e3a90ab35dc9442f77f83138ceb2acba78e24d4a87d15f006bfc9b66acad6d0caf7f495948af83de4c3e", 0x45}, {&(0x7f00000017c0)="4cdca1325bdc9fbc0814d1a55d94c294b778c9c2ee57a83f7d66991585a975ca38c7f93f26e43afd41a2ee8348dcf3ac184f87f28cdde27cf6b3ba79ab3e8c28e721e6c19927a4982365231f19ce1c4bc6870ee313d66b05df77705352b6dd2c1730e17cfe934193a8474efd7f3aacbe0ecc2108f160b2ed1d665b07bc957d86bcb80c67c6abf8c39619537120eff7781a25b43d24dcaa9bd06301f2e152a52c51e1bbc553fb98632113d361248cb034f9bf3511444e509b5bcc5f85a93e1d7ae77bffd0829844d47fd7d5ee134def0c07077b690ee01d62c8c9e33c14fdb398648e985f028576fa839028b4402e1d102ec74a6336489e87", 0xf8}, {&(0x7f00000006c0)}, {&(0x7f00000018c0)="c6fc3a8f9c957bbcd88d34cdb48acdfe73e163721173adbbe073b39d266360314a", 0x21}, {&(0x7f0000001900)="87de740a8213bf98d4a30249e49edd95", 0x10}], 0x7, &(0x7f00000019c0)=[{0xe0, 0x88, 0x6, "ba1109063dc80fc167eee0cf0304396550c7aac9b8d4540a928dffaa4e854ffddfb309b187415616020b6ef65faba1c4926131867ad039a2b54a6cacb311f97e96dfab023caef2c187efd59eee75bdd5efcb79fa1af7987dac5e196fc269286862aacad86613f28652ec08279298b886dc966678bedfcadcf272ff28918833a5c096b39717c2ee7720059e28c5f0e9c1f3cb506185e52035d1ff0e8b1815567723a3d536c0e4fdaf27d1161ec35895167596a23cfd7e3244f67600b49698a7f469b478f1e286e0ad1a9a1c"}, {0x68, 0x11, 0x0, "c25d92efef6e360e88181af1395387da5b0fea99c8802bebf331e928684b58ee0fcdd53a18974b970dc3d7ff9a141e5b5e117b734f78271db88587215770eacd2c0dc2a831b12c69dd2595731112a65ea408e247"}, {0xa8, 0xaca281b5055b4c8a, 0x1, "9368a4837c09216bfd595b71ac5e0a36e45839eff58f04a696e6669d8e19916eb83aaa4e4a2c02e6bc11b23b94419c31a1128238899086732eeab9adec3c7ef765c95c5b794975e59e0c77e37752205d843ac0fda8cc34f1b38cb8bb897874db958660a5e55a6e707eabd8b82730dee3cceb537fab080cce914957135b9c8f99808bd3080015fec2675752678ff8169566094a62d8"}, {0x48, 0x0, 0x5, "31d77c09e7f9a22bd8d07b02af5ab72c2a8c6080f71042d5ab82fbf776b17797f83853011c6b176f0d9d322d0fc44af5b75f22ebdc"}, {0x110, 0x10d, 0x1, "430b7587d4e22aed7b32416f8907c4b333415fae8c3d9f57fa0b368995243ddd8ae175e6c5b0ccc1053a2d96dac5e05b40aa60fd542c3d4886c6edc048923ae426bfa1c991d66c18fc975bbfb79feda3669edbf95d990aad53849152ae67da6b10e94c2ebea0bcd0bdd88e6626389b40ee42538003d3c0bc071a0e0747cf92f2b3b0f5d6a8f1e7740fa14acbd05f8ef56a7c39fccb6a254e1ba32f5d3bf8a6f2b0c0ae8a42e55a15e9d4706f785c21be264e23e18588b265a0b89cda58cdd010475ad408086532dceb0bc80972a1c0014d24a9f881a70fbf93149ac3475311df9c4d605e5f8f8228582b22a69fccad715b94a85f25173b2e700523"}], 0x348}}, {{&(0x7f0000001d40)=@un=@abs={0x1, 0x0, 0x4e22}, 0x80, &(0x7f0000003280)=[{&(0x7f0000001dc0)="4f788224b88f21f163c5a07b4d75ca70b256fbc04380e9e000fdeaeafba4bfa3ac55f87b1ac86e9f0bdbab9e02adc2c6b911446812ac55433b0b1ec1de850be09ffdbb255ab6e8ec357d946fe7d3e7d558722a87f64ce42ac61770fbb6437e1844000084fa5ed51c45c4b305bc43bea3043b1ed8d8e6e9a7573dc529860b61a2413f51bee7d92ee1e0dc041347e0b237fd1d0efcebf23775b96f7a1d8aec6fee343a344cf14f9cc41de4a56f479e5a31090dfba54588abe2e42caf169e3ae7", 0xbf}, {&(0x7f0000001e80)="6367b75942c863daa820fd7c962b5c497ac1003f7ee14df5190185196e1f0b39107a302c49b30e2e3065fab4eff7df080eea2d28eaf8203b436ec78a6a1b37dbbae0be6160e34e", 0x47}, {&(0x7f0000001f00)="d3de85ea4a85a95aa0c2761a948f9e70f750252527df818821c477f923d5a86de5f21b711a434e30cf1be5d9b77be949d130bd8611aec9a48bfe88d6e68c06110c25e3a0dbe30830ac2f9813d9b0b0d5df70dbab888cb48a36828a8482c022a6854b67bcf5cee1766bbf0fa1dd4afee09b97089eff45e67fd62d1227f0de03b3e9ce9d", 0x83}, {&(0x7f0000001fc0)="fff38878b09bfadd745fd2ff809fda63bbeaf5488b41230df40c6f3853495a4424807bafef5894dabd34d66ed6f572f8504e26485c6b9eec46bd1ee50a7ac364f8583e604b293d727bf3ebcedb2420c7c5b3bdcba9a3306899495fc1121512bcfabe047211a4c8", 0x67}, {&(0x7f0000002040)="d5731011b6065631ccb3b19d5ec0f4e04920583a2c7e358fe8c6c792bf3a74038d457f45ec97aa5252226a86da27a338343ea33705c32ce2e68153fa227b01ca1385bec8e376d8f68ff433200827800c5c9a000848dad7c5fa24ea18ee2183f76d0ce533185d07c1c0ce21fbd87a2cfe4baae18d02844cf80a1f628a816dab1d4b45ef1411ee4afc3fda5f1b7d89e9018e5d5dc1b044adf92b2b714e320e9fe238", 0xa1}, {&(0x7f0000002100)="99428d59a97065e5198f4d5b33bad4d91105ebb237da7351589309aa50ee50974a5ac91edf50cc351d48df7a779412db3190d128350ff0b4a96315ccc87f874bba1423df316d422b064285c3d39d05d8422fc3b0a6f5406313aa852336ceaf46504609ec0ea0362e886e674a402fa5191eb2ab9cba789596c90dd7931a30f009828fe6ede92b8f2a6c685a72802371dc8e6658aa91d003b77cf4292852a25daf71153e5c0e2f34612853e1fb7f037c9ed0f161061e7aec535c4c954896c7b638e402ba95275a07398129a556d5f2f62fb8c2b7a88437e8b58a76ea234e71cf086c830c6ebc8219866029da900f66b609585f1e191824b4169666d2ba324be36e7079e838f7b30257da391fab071b958a20a2733a8941833e96ca652ccc0e655d65c6902134c15ef6127b3a8ef6b7aa46662cd134deeef2a97f1c297b117f331120180fa7564837e092ad17ff9b661b0eb3b908ab58e2083d087ba158c2543de03bfe1ab9f93136647007b7f55b8918098b74c6849cfdf9cb0945a23eb9172517116e00d1e517e434820fcbf57825aab36e7ae8254d3455cc9ce85b46405b4891a4541a16753b74331f153d88e964b8706b6bd442cf20d3fc592bf4b66e8f1432a427232eb9d0174a14512cdf68ee02e3b61a92a35beeedc773f62d329c5537e2c6631509caeebec3dd2eaf1e62f2a8d5cc9865f3ef0f7c3b0261f4ed16ce2f9a803056ae0e4b45bc3d17722f5532542b48473ee35ce1ccf1785e318cb7ec4eaee828633408aa3d5cb8c3c8b0d7ae9c67e2b2be9a41974cdf63bd9985d4e5ccbc34b028100e3d097032681eb7d86e41e355ce113ad2c7966aef318f4ff44aa3b5514013b11cbdc822cc56d7d412972d4ee526b051936c838ff77ab207e3ac2162645493a5d568331614e9bf1ad2cbf256a8e29736e1d5cb8d9898dc9375007164c8915a199290605c0e22ab2fe445348ac06704c00cb69f87dea438735699ab08b67457e2e3064f5c6bc17535e614a933e44fc3dea64f66e058ebe4470f59f884739d077ccfea19592fcd69ad550e32c6481f0da7dacea53ab7065701c1c0a119eb0af574232371a58ee35d73f1926d008ce1377529fa9fa208d35f09f60c6a392e03dc663e641b4e1a1eb5067fae1c0770a0d0e76bf15fc8d2a3e71721a7b609ebef207a1c5b1dac093e4ea9ec8bef241c53ca4035c254a0d705235003bcddb25d3e0609eed51e71a40edd976b8ad5c357c47b9df3a0fc5eec3183a4e378f492157548e512f263950a3108a8bf8ef3878e36897194c712b2333d64d19a06dc136fb78aed7e18b65e3aaf9777fa910f251ed03cb2fc9acd69d7b07b6e8421257088da20fdf2421a108f969994fd6fa3367c7df9f3e0dcd158a10eff2e4c0b2bbaa1e521a8f58a84e9f023e15d6cba0d66ff5bc255b125b7b6418b13a9089e9fd61a633682e34e02c450f48e416679300d84bf4cc494f720cad0839acc0305c51127af0ff1454045b4f334b2c8f8f8f02153c1a738542b2b8e454850525cb790e36a86aa9bd629b43cf781c24909ca7c83a251e20f8a99961f0efe2b64771b256f557302d88c7b7e91b74a35798258e826f99c2163eabac697cfd59b9584ba38beebbaf8834730fcb522b5e25a5280e0d645d4108a7c5fd2c653a3b7dd8d8b4b2838b64698ae9e37441a51f53c3fdbe932e180f25db41583a590caff8cc29d46606532825970c4bc9abfaf858e05b1700b97392cb46a75d2128a419d7d411fd1088b0f23ce5b13f3e5426128d2fa3f62d39d391c027ec1171c81ccb7565ede1fd5f75a7554e51281c6d9edbbf7ee3d28603d1e23423983d6e1698968e5db1181e782dca230cae4538b8c46b880e0ac38aa61eb8eb540ac219d9fd87bc221f07d63be5b3d76236e845b5baef5a6608f7dd902782d856a7b646b434f838309abe4688d97c50533fb3e25036b721df7e41cb1508ce82bd32b1d876517532b85ed911629d6025fc70608e1b684dc1b43a0c2a95fbca26474a6f9ce5809cc04020989cbc5664e2de59a0bdc05a14ca4687cb0687b02f77c5b033e0e4a3ea1f8f91c8d4770e889e132d38627b46e616a1698619d25e1cf75f96c23a9cb42536907f9448581df1e3fa7cd0bdc4493ea5c0c34a7603e1580b7966dc62723a632c2d8d752d18b27269a1b342052cc1944b1e76d033ea6340c72efb37b5976545b3f1814adb13b5e1c158554936677031d66547e48fe647ccf820d9c3df5998c75058c0b67da9082938340c59512c18036e87c2f567dbf81b0ef9cda24c6e66e57fe450065973c39fb11d46c40b460d190eafd3ab96927da5c5afd53c60ea99d377522bcf64361607d2d6c18df11bb18e04b24750ee5d8d00e568bf3944d2906d638d2d4832d300a57788e29e3f0501a53d6ce7f8c2b1da875d8c67cba19da3006c4c08dec06db7edb83f7d994f6587fb72451e14287e3924b749bf96b55fc5003e5244f564c581e6416a6f521455eae9da6e9e7d08959916a9b9e79945f80fc7078e8575cdf1785ad2f55ceb2e07818e3729ec20933527e85dbb09ed9b01ccba5074f2dce6970288d7d36ac4d3b09fce361f0881f44eb6713878b57661ea714805f852687d40d874a2b9600827f57c25f6f44eedf0513ac85114557e116df78d794c69c054ed735d696011da1fdb4a266463b6d60a3b6607c3494aa4ea93dc9b76bfb7f213c45c90a263e50df5255621e17225b67572eef16beda8eb67fe937da023ba2d9cd40154732c5104eeffb1fad36c84fae86a55e8fc2f4f294273fd49e5c82b3e719c3e3aea9d405a2bd854c4efda9dc3e3d93c3a9aeae1461fa0dacab3d11e3f86c5de5f2137aa4da21dad86b4786e7f9b509fa82d8bd9fc4794e2bb29faf72b396efa8bf4f36aa559900cda0d9f599c0d8e20e01083294ddfd1f1a10dc8f2b097a1bdb5fb7ae36c58e1e7d36bc9fb0cbf44a409e87e95955197e5c65ea5a350ea1240aa6ba559734aab292718d932c86c5e98e3ee1995c27a5258984384796bf6a2d3a47a04665a9ae2f232abe02cadaab83e4a7c54a7c77185210e17f5ae91f9c02d37601882711c5ac5b300bea447e85b8154c17c37c4679dfca67aa228936f7dac27356836fa07700201f5731921f994ef004e30de9d7355e531df2362de7ebbfa06f632f34a7f5f8d0be9c973b1c0ef41f3eabfc9a144b5bbcc271ba9f1f9f9d11f116c68e251c12edf8d0b21fc8d03d6c3c7d060ef10428b0113d1c09142ac060731102a1901594a102811e3b9ed03e658186ccf0c42fca07926166e1a09b56bd91f8e2c78a357cd63e62bed2b3ed0d6750fbb0198cc1de22635b0cf6fd2312ae56447c0b9eb4c71b034fd12bbe67338ea54534eaf6b4a7230a5ae4ef0c9d4b97be94af4c3da0bd08fc22fa51c912e9b215f73e2015c679d52b79ecd0334ad41161dd7197b880143571d2077a2e0a03165a0158ef46b9da2dbab53172198b0d0240e31845fb9d3b3e3aab98028e4aa35fd4b8ae65867ff0d7b4e6f336e1f6ce24870501aee78bd7c599596097d19e4b3bd5030e7ddde4beb03cba1cb87761d8ff467dfcdcec69ad79d3e4cd21f74e8fb3cfcba47d0d0f54edef34728ced09e6849e018d54feed23d6e7d98dcb8fb9884f23670496c8d0ea33fe8434055561b4ec0f558b6eae497c19053b3da51e345f006b3f0c43c298e228134f46b63e10d2ff7aca9f8b3b6699496ae94205ac061e958714e44185ede079bbb2c285c1ae10f2dedcef8984f78247fcfff4a5c7eeab4ca0f0288c495cbacee58b4e04cbe5ed4969c42e03ae3443b091ca2ab7c47d8a72984b37c7b036dd7a20cc07161c5215aad0af988d99f84b4cba4de2b837021a4be3da3f40eb2026c0768141586dbb84ebff1a1e5713b6a31b95b6b1cde164db76ead18279c6399cb844f4428033d472c13d5d2b1f428a40eebb27ff9a3e2f76251609f94255cc341423f66d0318d211020a533b44f50e2f744521c692263cfaeb68abeb64895d4041c81e0675b64f5af7b3529cab8cc1a0a9cf96c050144981f2980bef9fb909053f8abfdb5d44bb45511632ce3260d486daf8c66f0f867b7d0f7c81d991906317aa8786f256306c6692a689b67456198fe2fbdaed605500149178aaccb3b94efe14a862e195411eac3d4482b8b3c2c633f831a35d01f1d94c3e441adebac48c57a60b9dc027dbd72ce1b61456d67b7852e0c9f2f7c57d4fe1baef059a8e42401c55a79f3def56839ad8e093267de1a82922e271d20b6a566d99e33e3a341d8d8bce958287e418b5753c545b693bfadb6f0d8a4b6f708b37eaccc3954c71d81db8faa4ed9918254b32b7082f4ff4df910a6ec0bcf8fc4dbc31e5bab8b9c1c3e6e5e45a3857a789f46081f16a59d2f06122da9a29b6d814028a2ffac1cf7a904b71dd63eb4e38b2ed48c76f94e8dc096783d92357e1d2acd36f151cbab0dc42b4c2760e6b535c186c001b100ad5d87fb439ff8315528210b8bb8afaab207f45404c8e662fdf43c209ec23e604187bfc36670350e608ffc9a01e177c51c67a4ba4ee464877599c12c4d8c709e4a619215ed6c18f4da36c2dfa6cb4f69b55dbc45bf20e938b77b9748d41bf97df8e1e85c48818559b4405de01cf3ac9081f6fda9b770fae31769ef058a0d75d1141e968613d1d98bf3a4b62a3280d878b231a72d75590da91618bc3a0e1bb7c5b23e66a2469734887a6d11b4097169148703a15065181f0011465b7d1a83100d910cd7867017b9a0b06390c646b4b5374e3200c8c1966cedca9e9ac86c4c78d25e11204d03a2d0463858c6728125fd168d63da83d7ca6cf915af9a4bdd67a6858ffa5ea72280797d5fd7998125869c7fc6e5f35bff5021e8a8a08d16aaf6edc9656ac40e6ea1c242680f48d43fc842fd6a4d2850275f2c32b444dbb0ef1344a4b84274fd27fe60db786e0188fd35548e276377c38085d4882a4d4d9948c133ead10acf4533eede880eccdb9891fba6a6392486d84d9317b363185238a3e14bd82bbe1350d94a8b20c3268773d96e4f23bcb0675bf0849bb59e615228f85df22dd619e92c4b81f82d157dfdaa45bd1c016ea6527867a10138677fc54b51877a9b7c651e33e2933f3c30c7fbc256b8b6f3b0d2e5a033596fd21f01fef81a0bfa6bcafddfb7c9aa4b23e4d34209752875dd997ba2fbdcbde1b9d7babd89ae01b8f215cb5cfb3ac3c63c88da8b6d6a29133221ac38bcf568340ef7c866ef99449d321ce5ec1579a902bd4639e0b5c9aaa30ab10e7f7b2c34e08735e32e1d50b6b1817b2ae3908db9849a4fdf0202b240eeffa27c7db12488d5260149e4d19abe35f1ebbf5ebb6388c729a04b58c941e86be5e2c55ed41e2a41dc8c4aed6a6ac06bf83df8f7fd58729188336fa2642a2bb6683fc07862454dc1f0ca8442c50049fc99955ec644b8197975fc6140f8f437c7a77b826fa84d24babf98bcc6d1c64f2b04f357029b09fd0ac588b55fe23f0e27fc927a0ed5a4dd7656a62fdd75cfdc99cb12476909821ce56376d53c3178f284bc9d621b5510c743514ca10d40252cfe380c001de99311466c26f96eb6fb17163005c71bb20359d3d782e457a5f08a26a43ef922a8d4af18f472888ebd944e7bdb641dbebdabd696cd5bd1025cf2327d011bd15b731e0c8b18d00c65bf435ddd4ef555becb5afaa2aa49ea2aef7a58d66ee9f1139041ae06250d9adb1a58272e0cd7ef0b5e1b85617fda3d51f3c03fa1c140b6d3bd75e06cb9dbc51f2d22adcdc64556491f4c74b545cd0f10918", 0x1000}, {&(0x7f0000003100)="eaaa4cd9050b", 0x6}, {&(0x7f0000003140)="ecc0d4ffa54d823fd0d2256da9c9193c33a0a89ba281298a24ad793872bbcc98c644558dd7cf564297a2f402e11a06dedeafdf3d38ad643baa5dad820200e397d2da3a6e41ef0468b79a3598e2dc283d4d90e249f6b105ad6869e66e718f458df3a5b530d312e6cee6e78859aa449addbec34c04e65b292a523fb0e45429604af7ea6be5ea78dd777249965f2448137f67180a8b99eba46c943d57857e6fa7ba0adea77857", 0xa5}, {&(0x7f0000003200)="ccedd28310fc662c38d8613b0fc5fe30a4250e98f21273b74c54795088d8af81b12be090885acfdfd647a745ef5594ae2c3f474f71e42a7a9cae32bae634a62cfc0320ff25667a2acf9e27fe3e43f48e128f6c6c8d10ef524df11d2d2666e72eb1865e22935dc2", 0x67}, {&(0x7f0000004000)="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", 0x1000}], 0xa, &(0x7f0000003340)=[{0xe8, 0x11, 0x4574, "ae6f403c3447fc3eb7e91c13a502ee2a2d96ff86c0295c6be9c8b63470bd48badf5aacb36bfef145eed8c6b66459b11ae28ef64ebe670f3b28ec274a360de76c1b5df678bf920760bdb4ec682584bc85b451b6baf716409d5da7aa4ecd7f38ca0038627c28a2435f34334a93e62e3902fcc4b7990da97d818e8b05c3ce7c2b50f245a0d8ec600d9a6789a4a70738fb768a02a687ab9dab89202b56de356807b5c585aa67a0cbc36d7ad4757a295ad3676735ea08e2cfb3217aa36ad53c4261ad1e896ab36b7705b6e86adc8c724068b409b47991"}], 0xe8}}], 0x2, 0x40000d5) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000004c0)=@bpf_lsm={0x1d, 0xc, &(0x7f0000000580)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x866}, [@map={0x18, 0x1, 0x1, 0x0, r1}, @map_val={0x18, 0x8, 0x2, 0x0, r8, 0x0, 0x0, 0x0, 0xb}, @ldst={0x1, 0x1, 0x5, 0x4, 0x0, 0xfffffffffffffff8, 0xfffffffffffffff0}, @map={0x18, 0x1, 0x1, 0x0, r2}, @map={0x18, 0xa, 0x1, 0x0, r3}]}, &(0x7f0000000240)='GPL\x00', 0x4e, 0x99, &(0x7f0000000600)=""/153, 0x40f00, 0x1, '\x00', 0x0, 0x1b, r4, 0x8, &(0x7f0000000440)={0x0, 0x4}, 0x8, 0x10, &(0x7f0000000480)={0x0, 0x7, 0x3, 0xffffffff}, 0x10, r6}, 0x78) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r11 = socket(0x1, 0x5, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r11}, 0x20) 18:12:47 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x200000000}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0xe000000, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) 18:12:47 executing program 2: syz_mount_image$ntfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0xb00, 0x0, &(0x7f00000000c0), 0x0, &(0x7f00000013c0)={[{@fmask}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'syzkaller1\x00'}}]}) 18:12:47 executing program 1: syz_mount_image$ntfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0xd000000, 0x0, &(0x7f00000000c0), 0x218400, &(0x7f00000013c0)) 18:12:47 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="b4050000000000006110580000000000c60000000000000095000002000000002ac73fe427abdf478e0357f2d32986f50b892b5007921cd48fe43b23be60a2dbc9778bb665510e3e22fcb26adfdc05e55a4933e62a23abb4baca4ec89323257db59db5eeda384459dd00d41b6aab85df5cab39e726769e2291b626d120a9247579f0b8edd8f16683e0623366ac632c24921d21534237743354f09cc29be2f72dfa8b05320110bcea53bb038c"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) (async) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) (async) r2 = openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000040), 0x440000, 0x0) r3 = syz_open_dev$mouse(&(0x7f0000000140), 0x2, 0x64c540) (async) r4 = openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000280), 0x8002, 0x0) r5 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000700)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c00000002000000000000000000000604"], &(0x7f00000004c0)=""/152, 0x26, 0x98, 0x1}, 0x20) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000400)={r5, 0x10, &(0x7f0000000380)={0x0, 0x0, 0x0}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000002c0)=r6, 0x4) r7 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) (async) r8 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r8, r7, 0x5}, 0x10) (async) r9 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r8, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r9}, 0x20) r10 = socket$inet_icmp(0x2, 0x2, 0x1) sendmmsg(r10, &(0x7f0000003440)=[{{&(0x7f0000000180)=@ax25={{0x3, @null, 0x3}, [@bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @null, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast]}, 0x80, &(0x7f0000001940)=[{&(0x7f0000000740)="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", 0x1000}, {&(0x7f00000003c0)="30be807c7d236de367c64ca44a2a9823aa657c12e2b38f20e3f96d5eab1af5", 0x1f}, {&(0x7f0000001740)="47ad1ff5a80721f1fa55aa1606a7447d721426bde887399735ddf5e3a90ab35dc9442f77f83138ceb2acba78e24d4a87d15f006bfc9b66acad6d0caf7f495948af83de4c3e", 0x45}, {&(0x7f00000017c0)="4cdca1325bdc9fbc0814d1a55d94c294b778c9c2ee57a83f7d66991585a975ca38c7f93f26e43afd41a2ee8348dcf3ac184f87f28cdde27cf6b3ba79ab3e8c28e721e6c19927a4982365231f19ce1c4bc6870ee313d66b05df77705352b6dd2c1730e17cfe934193a8474efd7f3aacbe0ecc2108f160b2ed1d665b07bc957d86bcb80c67c6abf8c39619537120eff7781a25b43d24dcaa9bd06301f2e152a52c51e1bbc553fb98632113d361248cb034f9bf3511444e509b5bcc5f85a93e1d7ae77bffd0829844d47fd7d5ee134def0c07077b690ee01d62c8c9e33c14fdb398648e985f028576fa839028b4402e1d102ec74a6336489e87", 0xf8}, {&(0x7f00000006c0)}, {&(0x7f00000018c0)="c6fc3a8f9c957bbcd88d34cdb48acdfe73e163721173adbbe073b39d266360314a", 0x21}, {&(0x7f0000001900)="87de740a8213bf98d4a30249e49edd95", 0x10}], 0x7, &(0x7f00000019c0)=[{0xe0, 0x88, 0x6, "ba1109063dc80fc167eee0cf0304396550c7aac9b8d4540a928dffaa4e854ffddfb309b187415616020b6ef65faba1c4926131867ad039a2b54a6cacb311f97e96dfab023caef2c187efd59eee75bdd5efcb79fa1af7987dac5e196fc269286862aacad86613f28652ec08279298b886dc966678bedfcadcf272ff28918833a5c096b39717c2ee7720059e28c5f0e9c1f3cb506185e52035d1ff0e8b1815567723a3d536c0e4fdaf27d1161ec35895167596a23cfd7e3244f67600b49698a7f469b478f1e286e0ad1a9a1c"}, {0x68, 0x11, 0x0, "c25d92efef6e360e88181af1395387da5b0fea99c8802bebf331e928684b58ee0fcdd53a18974b970dc3d7ff9a141e5b5e117b734f78271db88587215770eacd2c0dc2a831b12c69dd2595731112a65ea408e247"}, {0xa8, 0xaca281b5055b4c8a, 0x1, "9368a4837c09216bfd595b71ac5e0a36e45839eff58f04a696e6669d8e19916eb83aaa4e4a2c02e6bc11b23b94419c31a1128238899086732eeab9adec3c7ef765c95c5b794975e59e0c77e37752205d843ac0fda8cc34f1b38cb8bb897874db958660a5e55a6e707eabd8b82730dee3cceb537fab080cce914957135b9c8f99808bd3080015fec2675752678ff8169566094a62d8"}, {0x48, 0x0, 0x5, "31d77c09e7f9a22bd8d07b02af5ab72c2a8c6080f71042d5ab82fbf776b17797f83853011c6b176f0d9d322d0fc44af5b75f22ebdc"}, {0x110, 0x10d, 0x1, "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"}], 0x348}}, {{&(0x7f0000001d40)=@un=@abs={0x1, 0x0, 0x4e22}, 0x80, &(0x7f0000003280)=[{&(0x7f0000001dc0)="4f788224b88f21f163c5a07b4d75ca70b256fbc04380e9e000fdeaeafba4bfa3ac55f87b1ac86e9f0bdbab9e02adc2c6b911446812ac55433b0b1ec1de850be09ffdbb255ab6e8ec357d946fe7d3e7d558722a87f64ce42ac61770fbb6437e1844000084fa5ed51c45c4b305bc43bea3043b1ed8d8e6e9a7573dc529860b61a2413f51bee7d92ee1e0dc041347e0b237fd1d0efcebf23775b96f7a1d8aec6fee343a344cf14f9cc41de4a56f479e5a31090dfba54588abe2e42caf169e3ae7", 0xbf}, {&(0x7f0000001e80)="6367b75942c863daa820fd7c962b5c497ac1003f7ee14df5190185196e1f0b39107a302c49b30e2e3065fab4eff7df080eea2d28eaf8203b436ec78a6a1b37dbbae0be6160e34e", 0x47}, {&(0x7f0000001f00)="d3de85ea4a85a95aa0c2761a948f9e70f750252527df818821c477f923d5a86de5f21b711a434e30cf1be5d9b77be949d130bd8611aec9a48bfe88d6e68c06110c25e3a0dbe30830ac2f9813d9b0b0d5df70dbab888cb48a36828a8482c022a6854b67bcf5cee1766bbf0fa1dd4afee09b97089eff45e67fd62d1227f0de03b3e9ce9d", 0x83}, {&(0x7f0000001fc0)="fff38878b09bfadd745fd2ff809fda63bbeaf5488b41230df40c6f3853495a4424807bafef5894dabd34d66ed6f572f8504e26485c6b9eec46bd1ee50a7ac364f8583e604b293d727bf3ebcedb2420c7c5b3bdcba9a3306899495fc1121512bcfabe047211a4c8", 0x67}, {&(0x7f0000002040)="d5731011b6065631ccb3b19d5ec0f4e04920583a2c7e358fe8c6c792bf3a74038d457f45ec97aa5252226a86da27a338343ea33705c32ce2e68153fa227b01ca1385bec8e376d8f68ff433200827800c5c9a000848dad7c5fa24ea18ee2183f76d0ce533185d07c1c0ce21fbd87a2cfe4baae18d02844cf80a1f628a816dab1d4b45ef1411ee4afc3fda5f1b7d89e9018e5d5dc1b044adf92b2b714e320e9fe238", 0xa1}, {&(0x7f0000002100)="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", 0x1000}, {&(0x7f0000003100)="eaaa4cd9050b", 0x6}, {&(0x7f0000003140)="ecc0d4ffa54d823fd0d2256da9c9193c33a0a89ba281298a24ad793872bbcc98c644558dd7cf564297a2f402e11a06dedeafdf3d38ad643baa5dad820200e397d2da3a6e41ef0468b79a3598e2dc283d4d90e249f6b105ad6869e66e718f458df3a5b530d312e6cee6e78859aa449addbec34c04e65b292a523fb0e45429604af7ea6be5ea78dd777249965f2448137f67180a8b99eba46c943d57857e6fa7ba0adea77857", 0xa5}, {&(0x7f0000003200)="ccedd28310fc662c38d8613b0fc5fe30a4250e98f21273b74c54795088d8af81b12be090885acfdfd647a745ef5594ae2c3f474f71e42a7a9cae32bae634a62cfc0320ff25667a2acf9e27fe3e43f48e128f6c6c8d10ef524df11d2d2666e72eb1865e22935dc2", 0x67}, {&(0x7f0000004000)="da7fe3046b3d34bb885df91b641ef1bf34c62261e056e011ef5cdd8f8391479dea0293975235d216777c2bfa9e3cd804f282f99e3161423081025e220d8cdcfe2a3f0e0b885a541ce6b730793bee515d1f26c57129bed363eeb9b91d89d15961c1192283621b3e0f982729569c2632bde73ce6662451ca3f9afebcb993c247cf4768ae872a02ed02e2b72e7a8081d22a2f99b3e4b57b8e498f64f9b48371cadfe1f9473a02c169aa86039877bed5c3244712ad73c55aa2604544352f8aa1fcc6b482f3f21c9e13dcb82b8217a2f868c221eb2cac0cd68a171a04b8deb9e88ac17e56e1b6456441b43500c7d7f37af02b925cdb123249e9fe451b17b7b58df5fbe8c2ba8d54873feb8b7802f5ad9b57f5e05cf1c3d2ea2dea9d41b4111907f411fb38c13e76ebc31ce94d63a82c40e2397015de6ffba799630b3ec780566f2ee21d696f0089dcae1c368c63f3c7fa4db0fdd08c904a592c7a898f8049b56f8ef9f9c2a7effc4d6c4c9c607486b54f15afee99e878c6f9bd33127a422f357ad612fa1fea4ba1ceae78c19dffa051659c823e8958b3efe19c239ac49356b7ce11b573264ab9911ee474b700f33f427716800fb40c2e08e8a9f104314833557d990f282e6ed79d179a53449a6d967a828c68ab9efad16a8ee8a93bdd7495970910734ebad7d019a013e19d99746098c3c73239d5d7e31e1251143746fc2d032c535266a121d943d76ef897372e8a6f01e26e4c719b6a0e06b3207c14d3d1d584e3fe3acfb28672ff2975390e25de8bb5b626cbe26c676b72efe31b0fb4ddd2fcde0937af59d2fd0d3706d0984fb6d3a4604b1044cf572e3b630d3ec9e9259d0c34272fe1d4f8ce7f15b4d883abe468a72ec3c01b238845dc5f5ba979f0f817fced00b181303bad991035b03e74e06c0e7fc895f3bd1bade4ff2f7a20bf0c2c2d63c7c24c94e10d44fd82daca3ecf45082b31db399873776481d32d711d7c109cd8d89931386e4a47f841192d87e459883a804c0f9492286857355101530059c251d4d05a2524d45791cb606a57f5176a34400c019e8c4ba7eaa346964df7d263a2a82c810fdaa487bdd818d0bdbb03c7519a651415e734e637b43ccc67b82c6cc796f14063b80822e26c4cfe2b76c93e4605ea677cbf5cfc17437af2ecdfc61676347cad98b2ccac2624e4e2e6a757c327716613c18c1ce70c7c22e8500444c89f490ecad224df6d26ef8640bf97c1f401148421a4a7e2fc69b2f58c94c4ec5cb82afc815a997408f848a90c221d38fa355e1590f02be346fc1c7478beca4f9bf09c3105f346f75b0035bcde14870679dd61974fdddf3a3abe87125b14f43ed40224f3832894c1e3b11d33a1f8d2cc264bc77182a9ff68077a0abb5b5dbd5f309a34a0365b3561d6e019d250a1a465f6458f5d280d1506707b2c90f4c00fc3281fa86657bb2faa301ca2a33ad68f6ee8e3b25d38af18c24e78c109600312389cd77ac8d3ebb2fecf397c4ea963e13bb8d47334eb11ce47f1cb1e49c093c37fd9b194bfc13795606fddb4dcee5285a38d48b0095490b6c41dc05d6ae010ead4aa158e1288ed04638bdfa3b35073c0062637ecbaaa34e02a928ea2035911941ba5f23be336a716a60c71a3c01b6a1f79a283830c68e9c50b63ec13575de9f51a17036d0d6f62ee391a4dcdb5c32e926fb0e700e0005c22815b683ffea504b2943aa10c426c47ab5f4fee970abe407d9b6d98c23f160b6d70203f5a9723990fcfba26fc48a2be5698793d2a48303cc9cbdff830285d52081a60065a39925dcdd1c9bd07dcf2091b5904f355f6cec40518ee5afbe1fecb33942c034913c1b6e72b47c17de396a7f95fbb9092ee91455c9a721c238a5d65141a55048b7da2aabca38c8ca4cd5a10e525d8bc2c88a0b6ab2eb419be965e4d833d4a12244b2ae624e845367431192e353e81f6d82d289b14b126457aa2276f21eb9a3f1c6f1a099f2ccebc282c1e633d030dfedaa02fd0dbd362aadda360f60313bd4feb95adfa3136f0d6ff30a51bb5723188d0f63e0541b842886a80cefb7ed645966fb605c8735a0ffaf5cbb2253b90a84aef7fbd3dc5a6954f252ee7132aa7c901e4239e822cd95498944499b07f766869e866ba41d20a04183c8c39cda19d9595b1a207fb8b65bb7c2a351ca44a641a96c2394e1a6347af2b5556b9d14455188b06b10bc302d91a134d7e0a938c17454937eb0b94830d770e33008c961001dac54ced4b4ea58c35a7bc5ae592c6ebfa6fd7dc1f4610b2e81ceacddb701756a0054c2049b07ad34d5c8015528ef8b459ecb65e21ba550dccf893ade132f183b6420039303ad4b088a00e4e8eda6ef025178dc6d3fb44570041f1143decaa2ece2c479b34f24fb584f76a9edbf55673f1712cd9e7329dbf7fa0e053c15cdfd3328ff2b10728d9ebced09bf26dd35e09b6e84abf29c5ce9991fbb5a000934fcd1e4b4d489152596b99d1325cd5feb936186cc2008ebefcce5dd7a5fd2d5fbbe3627cc1454faf5be90d7226acef2806bbea634a75d19a6a3c4cbc5c2b913f26a5cd5994683d00ae9de8bc6dc19e64309344af95c4f1885f7071dd53648a7703ad56a0e15b851b633e347457d5bee32e8a3f050e7c29151a848566d01aadeead27f155a86939ed18d96feff8dcd7f7c91b4af6fb1ae44ec8692e493e7fe0852224b7a300781509e69cce49db2a55db92ac144930927e8dd546cdac2a6bb3a2f5c4f5b09530708f9fd1e4a50f4c24231283eafbb5e851e02004cf428dc8ec5e33a18615bd56bf0b1ae3f6f3d2fa82f69a61ca0bbd1b4d1bd900314973c3618fbff949d25865c8c8f29c55ba27d3033e975dccf8ec7c196d25bb1576749252d811778604026ffbbff4eca55c084b18e3d1ec6b3272ff4b90689d7278f3f5a76efe4b525919503d44f4793642880f50cdcfcff0bcd952a502a744ec0dea55d5c90cf99529d333471d62b3090621ed1409ed6c163f069b9c57256856710191a26081c420f0a81677b57ad500af9bedbff752c7bdb48ff7849c34c804c546b2ad1b4ce2a750a707dee728e37c7bc748126c9c686eef8e0b0c99165dab014a68c066dc6c7160367ce1241a0bee8a070ffe7a8df033cc8db477804187eece73ebbc3c7ab388361bfe99cbb46e614f58df56e4138d8e3c73df111418e7db89a1b32c737951a3ca45ee5621cc62a04097019dcf80e410d7982b610d20f3de46ce65c0ae6c668a1494216f6822aab280154f88a94c02e8b3dde9a1987f738d85b0caa7f8b6047c5ee47a27257c376d0d6a61c90678b5349d1942160cde8674ebe289a3a09bed1a3d056ba5ff6e41151f69bf538e002466582961f243ecbf8baf034f4cd0ed50e8d884564bf74133db7c1df0baa91b6c276a6579b0e2f1c7925dda2d2ce69c1f21521dccf7333a1c847286e516deaf91913d15988f3d589ac0cfe051c0161af208504a13276fd74bd103d6094ceff01b7280dd6091fba8a071bea5b4fdaba17e45db36c6a1905ab177e7aa4ae28558c4aa8451ff4d6135e2b79fcf38657808cb318eb489e8f7b1e730b7b3f78ebe1f8e9ad45dc47b2b68990fcbab4ba392937594a50709ba00de0599ee93f388d332576140fde601906df1ed404801aebc4ad217a50a9df5bc7c75675f7f32c041598110397931950025ae80e1d0cbf188ffc1878c02e20b08a933409cbfe6c73afd67e606ba1ed8cbba83b78ab2bc986405862868c72421e630911c94fa1c321dbd59835bd7cfe7b394b3abce71c55fb9f56ec641bba3bea55b27091a6d2bfafbb58cdbfba4c2cf9f77272a6ec75bae22d844ba65715cb6f2f161a0e1bcf45bad8230310eebe66b4dd82dbdd2957969ceb3100c1a9755150cd1a9500cab64ab50735e33d4d3ba63d5585e76be9958662f68ff15518b30e77544b15d7fe8e2a501e177babf9ac122ff545de97b1f735d6b2b91eed1513ee89636562316daaac53083c641225a7e89fc88ccd30cd94f2f0386bb8e7c3e96b2b5fece4145209ee5c14ad80f8b841bb20ea358ff0813aca53a93fd4c5527cf536163c5ee18e26e9b716c109820b764ef2cfb887a0f01809434a0887b7a272987fa756d03ccd93b65e467ee39065269bda05abe16cc5ea114e92239b767d5fef464eb02c115303acbd76e290be084d1b09c2bd013eba411cb95e8d0cae0664ac23de08d47942d1beaae473e9de3c663a0a2b27c11a33108c448fd6a09b66537deac80b3aadac34f22843adb7b7294473706d363072a39d74b486f95b050a1cbed9ef2dcd1fda3b03615c0fa3d2aea1b6e3f0f04803ed0a8f8bff4e9c704d3c131f94a2661bf846c634e879d11cc31e2399036a715c8cbd85667afc8a277e9fb0ee3adffb47e57bcd588c7303fe07c8cf8e797b66e117d8517ee8c7b67c3146d1264f6d40fb300a16bc5c82dd2a919a3fbbbfb72909a6486012fe601b6a0297265ce3195760d028a53c78b01c8796028baf4ec62ae4cce88f8b0b67f9443a448263a16c11e96ff1ee36e6a327231996bff1a126be492e121c3cb98f6b50ec28fd95ad06c6cd2d26b4cc9fcced685fe3e157cc19717fa50c680f03570a76408e749d033ce110bc0632681a180c6e0864ceb735f2c821ca0220818f3011d361552ed922edc7e745534d300d54a905513706a65c61d4a995852d30e5a7a5fae86a00e5fa1b0e63d322c567bf026f8b3eb3e0e092608f9f639ed3a165f93b8a92146ee0a3a86b4c02d7728c9c6e29d76324cd1674223be4dd6bdeb3d88dc82cb1063013d98f53557f32387f865463b0185366c67c1df502f275d0d9656b6fe23e7013a32121f896b4429b684f62823101eb26eed9b05a1505d328dda821a7e070f12ddb9c32da7ceebb4494288c50a195f5656ca9215ca3142a558776bb6879a01eccd63df0084c6007d932fdb31166d72b2bbd5e24b7b6e53679fed517848feaf85398beac564f135b5aae7df6f76facec688a48f4a9b6fadd44d48bb59e89bdf7bb0d6762142b2576bf97741fee2a108c6ef186342c8228521c9bbd1a02af79fd5ad4af30db178b443011a4df75e25112643c0dcb2541746f77454e6f9dd5deac9eb8fbcd1e2bc465c7275f2da064cf0584dc26e41b1ee9879bf985f76333f4120ebc343132061fd0cd3ab37c5066de77ea3114219330600ece27be22d4b0ec3b62fb78e239fd49b8aac943468833005209271d927e754449a91664d99a00c0b2d961ced4f84f80c32ba550bc2fafa9308f9746f313f255302a2d6bef0891e8672bb4c9fa2c9cad3ae6a20a43d5fa13efca8c8d5709be84c02ac7a3191d23fe0d780ed6a58597df9a62e2bef1af1a927697925ed9811337a2e66616673b31a42f4009f65ade09a8e9142b87b2e8a8107df95c2425ab324d31a36926df70da430e220c084d0149a8ed2eac68aa7252936b5516ee20b08013e3433368bf45c670d5bf7768eedbe147b6d7916d4acda64a9d53d4abc3eee83de4f7465770f111b9edeeb7c9eedb507226b7995e2efcc46afab85b1e18eac79b3d11b2d2696738d0ef6de44c1285765325668d3a1dae0364dd2bf56bf8719d8c1d5a10b28ed11a476f42bccf88ee815cb6d645749eb0fd259dc94d83fab9d5ab6f86f42318e8e0b5e95459169a5893348dafb081df9f10e55f2d97d2befd2f028e045c1d7a36147a3792ebbe75fdcdf120387a3a255a1f1f24ec51cf30ca9b6b08681b0456d2101bb04223d539566fce7c370ee27718c127198bf93b530de233fe608ae6f02c98b6ed54275c3c620b4a1", 0x1000}], 0xa, &(0x7f0000003340)=[{0xe8, 0x11, 0x4574, "ae6f403c3447fc3eb7e91c13a502ee2a2d96ff86c0295c6be9c8b63470bd48badf5aacb36bfef145eed8c6b66459b11ae28ef64ebe670f3b28ec274a360de76c1b5df678bf920760bdb4ec682584bc85b451b6baf716409d5da7aa4ecd7f38ca0038627c28a2435f34334a93e62e3902fcc4b7990da97d818e8b05c3ce7c2b50f245a0d8ec600d9a6789a4a70738fb768a02a687ab9dab89202b56de356807b5c585aa67a0cbc36d7ad4757a295ad3676735ea08e2cfb3217aa36ad53c4261ad1e896ab36b7705b6e86adc8c724068b409b47991"}], 0xe8}}], 0x2, 0x40000d5) (async) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000004c0)=@bpf_lsm={0x1d, 0xc, &(0x7f0000000580)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x866}, [@map={0x18, 0x1, 0x1, 0x0, r1}, @map_val={0x18, 0x8, 0x2, 0x0, r8, 0x0, 0x0, 0x0, 0xb}, @ldst={0x1, 0x1, 0x5, 0x4, 0x0, 0xfffffffffffffff8, 0xfffffffffffffff0}, @map={0x18, 0x1, 0x1, 0x0, r2}, @map={0x18, 0xa, 0x1, 0x0, r3}]}, &(0x7f0000000240)='GPL\x00', 0x4e, 0x99, &(0x7f0000000600)=""/153, 0x40f00, 0x1, '\x00', 0x0, 0x1b, r4, 0x8, &(0x7f0000000440)={0x0, 0x4}, 0x8, 0x10, &(0x7f0000000480)={0x0, 0x7, 0x3, 0xffffffff}, 0x10, r6}, 0x78) (async) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r11 = socket(0x1, 0x5, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r11}, 0x20) [ 556.401914][T22508] loop2: detected capacity change from 0 to 5 18:12:47 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x200000000}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0xf000000, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 556.442593][T22501] 8021q: adding VLAN 0 to HW filter on device ipvlan32 [ 556.457478][T22510] loop1: detected capacity change from 0 to 264192 18:12:47 executing program 5: r0 = syz_io_uring_setup(0x3ede, &(0x7f0000000240), &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) socket$l2tp6(0xa, 0x2, 0x73) openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/locks\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READ=@pass_buffer={0x16, 0x0, 0x0, @fd_index=0x5, 0xffffffffffffffff, &(0x7f0000000040)=""/17, 0x11}, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000002040)=[{{&(0x7f0000001380)=@in6={0xa, 0x0, 0x0, @private0}, 0x80, 0x0}}], 0x1, 0x0) io_uring_enter(r0, 0x26, 0xb000000, 0x0, 0x0, 0x0) [ 556.487514][T22501] team0: Device ipvlan32 is already an upper device of the team interface 18:12:48 executing program 2: syz_mount_image$ntfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0xb9d, 0x0, &(0x7f00000000c0), 0x0, &(0x7f00000013c0)={[{@fmask}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'syzkaller1\x00'}}]}) 18:12:48 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x200000000}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x10000000, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) 18:12:48 executing program 1: syz_mount_image$ntfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0xe000000, 0x0, &(0x7f00000000c0), 0x218400, &(0x7f00000013c0)) 18:12:48 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="b4050000000000006110580000000000c60000000000000095000002000000002ac73fe427abdf478e0357f2d32986f50b892b5007921cd48fe43b23be60a2dbc9778bb665510e3e22fcb26adfdc05e55a4933e62a23abb4baca4ec89323257db59db5eeda384459dd00d41b6aab85df5cab39e726769e2291b626d120a9247579f0b8edd8f16683e0623366ac632c24921d21534237743354f09cc29be2f72dfa8b05320110bcea53bb038c"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) (async) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) (async, rerun: 64) r2 = openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000040), 0x440000, 0x0) (async, rerun: 64) r3 = syz_open_dev$mouse(&(0x7f0000000140), 0x2, 0x64c540) (async) r4 = openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000280), 0x8002, 0x0) (async, rerun: 64) r5 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000700)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c00000002000000000000000000000604"], &(0x7f00000004c0)=""/152, 0x26, 0x98, 0x1}, 0x20) (rerun: 64) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000400)={r5, 0x10, &(0x7f0000000380)={0x0, 0x0, 0x0}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000002c0)=r6, 0x4) (async) r7 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) (async, rerun: 64) r8 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) (rerun: 64) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r8, r7, 0x5}, 0x10) r9 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r8, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r9}, 0x20) (async) r10 = socket$inet_icmp(0x2, 0x2, 0x1) sendmmsg(r10, &(0x7f0000003440)=[{{&(0x7f0000000180)=@ax25={{0x3, @null, 0x3}, [@bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @null, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast]}, 0x80, &(0x7f0000001940)=[{&(0x7f0000000740)="fbcbd65570eebfc9fcdb3a3c61598bdbe44c8cd398ad0d4c768d3c7a634d8e73c022b9d0539184a84b29c49d52f094e79daec98b16fddc6a721b6cc58753901e89d972ffd6aff18b692a22b0d4020b6de54e7567607d30189aa5490fdfd09acbdd91f8f7bb0e888102adad4fc0e25a97e3004cbd7d073c6a8882a6b3adbb868890315a8f56ae4c5ce7bd13e5e84ac0424bcc48ed0f737a7bcdd16712e7c2eac29a22e48d332f100edfc576ffe4d04c7780e4791d79819a5d9c264f87130243f7436bbbcad03f3ec2ef0ea71ba22818cb4578327cdeb3088280ca7f24aeaec08be32fdb70b2c6c2aa0dec51587d5919929863bc64179e0f22a7293da4dd008e4d0b724a4ba8a5c12f406344d47714faf6d2026ccf2b35ad4cd116748f769ef0fd53781476fb83639478c631e2af3187fe94c5ba2660ac58271c32255648ad8464eb464a8794e15089aac82942c1e1c108c8872ff86a430098d66c31b9e0e61f8810102d3449e77822ee4f49ec2ecdcae69b9a0e2f4c8740f64d35d73c1fe73f0e81d563dec74e0bbce65242ef796956b44d9ee52fc84dd08f4d4335fd817da6417d67684ac1164c2f3d5d98b6e66c7ed5397ee9d7fd5b1ed8c719b44b31f973d16bdce9bdcc2190c9e8441c21985984035ea6bde7ef1ecda628cd58bd4c3b82071b64d01c9bd96628b596da04c84853b2d21fdee2fca3423e004362ad6cac60512811e90cca9dc998294c809bd5f68be84c55db8163aee853b449bf42d893746179668d22950ad4e7938ed5d74182e4858da1c9e79aa0d3081886c851b3e71f0259723ee95a9bf7a140e7ec409bdd0cac645373c6d8112aa172df54d9949731bcd39fdca0e6290dfc7411a893136cc103d49de4c5e25734eeb02acaac39bd418b09556b62c0d12f8b2011d22a2db4ceddbd4b6179dca3b97ed85217c9420988df8ebf9ebcdfb9d839b970f309008cea8b8ff2cfc8c8f22fe6d5866c778781385c673176a5e685dc21857469742e8b9057d2b79966c5088b184b8ff8c9dd1ee21535b83513953c7bb5643cb241080c7dcdd46351df8f165434fa1ca8c1c6b20aedd4b6ad11110db122037643477eb923e136a12f638d65fb66be79d3949d18eecf530720abc0a170d7615c64616bf05eb9d9abe36cd69e8c55b213b38486020dc7b469127cae5d4ae1f569de46abcc7ab76516d6568769bd9fca7e8bc9402a2b181fae9e1b6c99406b04b6b4ccee8e8e04bf3f6f08d59376df13e9a01e32046a157ce913df4845ecacb5e10d7adec1bcd650c47bcc0f19f84bbe45681bd8b119ba2307d2f55b2d2c64460295d9ab04125167beb70800df52afa5eb2ad4ef2014fb9cbc2719b040141d361e739b455167d4f67660c22c267c2a565db0895b6e9a122c359661b5d1c5726a8e7f713334d32fb31ae7fd6165cbc9f8993a34beae4dfb353cad12f6db46919192d38f2e4488436cbe8eaa6d30e5783bb7c27440f28b8fbd1f5ffb851e2ee4aadb9b6ced211b4d7511ee10ca8e4899a5ba1ab09dedf8791daac77f463cc642eb8c177bccd9b5e0e7924c0f1ff19b4a2558174bf20b1ea2c94f23a0f35102e7eb4a1961c0cc13776dfa2f02ca55edf5b4c3f88c5f62ef076b4d620512aa7b096ee8c1e2a01789f8b746d1ae801c4e04327e33c061fdc316488fadd66706ba3832aa8504f8e45e7d0d97ceab0685ce9f439bdc2971dcc0e5f0445e9e320edcc6c14e7f3e40b124e99880820a70e52fc44800cbac5886dc712962d821935bb29c3b2988de3d2a4b585d8daf73056f4f9dc58258c17bbb1461ef52d7c6b63a9f8539eca23bc0a93adcee0405760425c21b18fe0a5a1067a0ef75e263743049516beca52cf100d1495d475786240411367a73a2a4798ad0375005ab25834d4543acd558fc22bd1bbaccdc6e8a57959a71c15e944ede2ed7c7899794a35d1cd1139ec1689f950416ed5443f8b3b105efb7c161bfdfb679af9c677e8ea6f0a43b2d4f511825637dbd1bc9b34eba38a39fff2d1d216c47e5aede3e61cac27f0bcbfe446e11c4de8ddbb5292c1ee5353f25a584b7be74c62e23fd7e2cacb23b4547f0d356f867cab7ffe080255f4c3431a8edefaf626db142abc7a0d2ac60cb505d91e5a6557aa96e145d2d35a52ee83a8ca670e1a344609056e56f6030830aa132d396a05a5c03c68d0d7c1fa75ad7a609e9457064c0925bd5a4d699151db6b71843f83a8b994fac783b9766d5a58f9bac74a8c89d2e885f9be37693deb83cf6c983a109f213d8ad5d00ea6beda986e9180e3b450f8cbad00a16ef098a818033dc2b035432237c22b71b3347253f118e02494f5683dcdf888fa5aa74a3f338cf34d3619cfc2bccd895fc11786c9f707eecd4d20a6cc9c251763639737acd00756ae1eaba359d39219a8fc6d0add9e271a615239c865cb7eaac7e7e7950bfd986420c90cfd01f3493429b6a795cae7d90333da5974f85c62ca7074ccd87655edeacb25cd771450ec8cba37ee6a35ae0e89f62c463d916dca7312aa5bce27b95eef5c4d91a66a73c45eed4f2062fdc8a906fd117327c83cddf8772fdc07e458de582cfab93f0a2014380be3d571c1f8e9be7dd8bf90538f1d689e965f93ef739ea4d48afd1507b6cb2abf341044352bdab4667482461b48e93c2beef3d42b45fc0889e4827e84b4d640be704f40e0085a6f5f844015e8c34e3c3a69015aa9a705be06d36f48275dcb0d1eded02fac8f74a06af47044075b59d0fe602bd9df0ecb6c299a92b068e86dd0b4312a8fdd2639ae62b407f0813cb11e824265b740bf6b48445d78b3b1c60cdd700c1772c01c4c83e036d50ae8799e42fa919f91f4d53b8bd828fbdbcb302844770ba9a87bf08fddddacf7d44b82bbda7090548a92365abe6e3d0d528b7a4b85c5b57c4a217bbba947a7c978f2cd660426d009fb96a21d28043270f99463bcdc007975d0cb27635d3717f0d01a2e4ac0a2091e9b7e770eb2dcc83e174afa60633b61f0b282731c590be2a5316b00bc2981a5471874df3ef7fdc07a381647b1ca03ede9698195a69aace0fade87aa62209e2811a12c4b89ee9ee32cf9aae38ac1f5a0d65bb3a351ccf8835d3230ad477944881cbbb37bec1cda8b83a171823139dfa51f06624da05c4fddfb9b8c15f91f4fb4c9d297d053fc6e98072a28535832c1b6c4b9a859af8fdd39b5b671aa4f0738274656a65d0f99c9f9f697b7b602ee14121869890cc3f8c908cfb877f0478ba81e43467873572dfc895051b7edac54c6ddab3228c950cc1097f5632dfa15036dbd4a7837b9efdc725494cb7c4bf18fbade65c4e36fb540f26da76946072e3d40cd41fc26b9023e82f49f0520f6bb0508907354398cf0f4df1305cf85056d831d9730286be15278a69d990fb53f6fa978b21834e12de63c1960f83274f44028e9eff5cdb25ffdd385562ff4feabd26e146399d3aa060a07b74e838088c84c19685544b5df42483657f5a864e90bd7f6bd54cc41e78e3042916cc1aefa6ace6d28c3793a5c6e463a30d25c70405256a78f9f05b9eaf24fb370beadeffd769f829bc3116e60ae07a6533c81ed044cb76dd60846f2d62afd7a8e3a4e0df31186f14e4febf7785468ed936bb93890d5d10bbcd29e107ca221b9e1f479e18e68fc2ea72c94fbf194019519994bb7293ad7950f85201a94843dc013575f8d450a8efc115a605aaa1eeb8d79ee3972997e5ba548ea75cdeca696efeb8ad8ea97dcd12b955d2b159a944b5f21ec759149c08b233899d16194279aaa1060168bdd1b33867972adaee6fe45fa6e9a6a8c9631c050926fb0c0f525bd34fb86363a13497c847722ff184aa8c8d6cff565ce7ae92b878b5907d738eb9b5418fd270375a53559abf47d412116862e130b94e7f6ac24d25b023cfadff2f8f31b3ba0e42ab282e4cf9140220564d0dea6ada858c378389533622ec501c27b0039b07ec29a5bc60be5f2c3fa7eb247d7f611dbcf90344b56a66d464e3518a0b8cb8f07354e89e520c086b535f0c0ae9051e92ea234e69bbde56be63d559113eededf4fcd5168320fbc55dbd667a41e07ca09ef074347f8930e39b3f9676e17b4963996b172d10a03b38c30ee4133d483693bdc80c83431a809408f43eeeb506bf7175fa38b6ec3f8d08312191b84040cfea53b92c7deaafe54ef47811e9c4f385805f3a093c46f112dd45be77a076430298a9b5730ce4e7514fa8738a54b9da7f9d5c4ead3e87c492ecb7173b88b5441f1a20cdc32d55eae0bc4395e6f0742af9f0b4e09dc46c51ec240dfff4addd68e594b30af8ffd2097586964ea380f6c982d2a3e31111f91a0ea8827fe0759f8d2f5e22567ce62427350a234ab88af04d934c7c0c62a5e91642a1fa792bc8b52e19b180f5797953174bfc630903840842f4f0fd91c18d4793780f6da56eb6d47771b60cc441a18c61817f358a201651eac320817e228ca4946e2fa312c5dd04bab104f72379743ecc6d651acad9062fdc687d31d6af9b462d8c49e3c70d7e08079f542ce78de62f3d37e009da69d595417544e3280ad56dacc48c549e1900a29b92691789d2eef69a7fb93a2489e00e74fbb0275333411f9d3d2301011ccf0aacf946f670eab5f0ba4d2f02d159b432574b2083de9f7765bd810b963105ca4f1a139f997e43b9ca7578e7301d5150802c2148f7543e8fc81a7ca5781bf92f0d63c8d82f8b92a4ca72d09e25f50e9a2ae11c01cf59b0cf3cbfe77dde355c21ecd27d4d9afb7725f30ec66571a8795a57e7e2d3bfc2a0a1a8a0105ffe84605091f2accf758ac945169bca9bfcbec19666d81378a33569fe014bc0aebfdc764493d04be1dc7a8166420efa4294866450e89073a1784b0c18c74ad4d9b97ad7e3ef35fafa675524195725844badb8211fbdf6f5945102fe11072a03959e7054abb511e21435575c895e9e9060ccea15fb7becff2cd42eb7e28e32d343c81e38c6294508b87933d7775ba03145183fefd2d5c91d6e412f27d7f47ec37e5194899af502429ed9af5b89264b0b7683a81bc9bed49b72daa3ba8aaadc53bda6a8bdc89383c5cafe6b612277196a2418026fb30a8c012427dcc919685c5e87b5607ec4df4afc3dcf938606b91d7b2a13c525d14be6c3322e37bfe377df33d464665556c33c7b95ddb8c273ab1e27a7aea104571a14c550b2879cc35f24434d1bdd336123953635cf1f1c8e263755e4f977676791261cc7ed3f206a7c84aff5bcbf4e197e0142f497f1c5602f124638e2bcfee025e425f88c29e26cadd035f1f11c6ff5962fad015992a48b7288aa3820be87a5957832639357e4001ecdcd337391c719b52df1f64f4da3f5affc97ee0ea12468a291c2398f28cf1da5e8ea150d25bef8d9751e4a56ce1556142c5fcd59ba691fdc6b4625c7e484c936ebd85f159da8be65503db3fcac91b1252a968de22f89cc3d8e33ec1e31ac81bfb43c6b2634d17a5f04d3f7951192bad3b68c61590f15b11b2a6a7f1b6e0aecc33b28125c188f75ec5e855db072f18959efc764f1b6b6d583e48472ea1b488a8e27c39fc2a8d112bbe3edf4db442b66352fc268432a785e424097068e7fef584e0db434195598533a0f74b7c36565137943ea209d351aa60061d502b738926e01407245bd420d90d2d2b39b82566ef807786b31afb2b2d5ceaaa85037c390a6d73337691597021a76e1590fdd14be270e190f62b9d7e1b0aa29cf69425c656a4083d55069e585149d9d8c2a8fb4422643293497ce2e457beecf0a6f4d55df1c8118c1fd3e", 0x1000}, {&(0x7f00000003c0)="30be807c7d236de367c64ca44a2a9823aa657c12e2b38f20e3f96d5eab1af5", 0x1f}, {&(0x7f0000001740)="47ad1ff5a80721f1fa55aa1606a7447d721426bde887399735ddf5e3a90ab35dc9442f77f83138ceb2acba78e24d4a87d15f006bfc9b66acad6d0caf7f495948af83de4c3e", 0x45}, {&(0x7f00000017c0)="4cdca1325bdc9fbc0814d1a55d94c294b778c9c2ee57a83f7d66991585a975ca38c7f93f26e43afd41a2ee8348dcf3ac184f87f28cdde27cf6b3ba79ab3e8c28e721e6c19927a4982365231f19ce1c4bc6870ee313d66b05df77705352b6dd2c1730e17cfe934193a8474efd7f3aacbe0ecc2108f160b2ed1d665b07bc957d86bcb80c67c6abf8c39619537120eff7781a25b43d24dcaa9bd06301f2e152a52c51e1bbc553fb98632113d361248cb034f9bf3511444e509b5bcc5f85a93e1d7ae77bffd0829844d47fd7d5ee134def0c07077b690ee01d62c8c9e33c14fdb398648e985f028576fa839028b4402e1d102ec74a6336489e87", 0xf8}, {&(0x7f00000006c0)}, {&(0x7f00000018c0)="c6fc3a8f9c957bbcd88d34cdb48acdfe73e163721173adbbe073b39d266360314a", 0x21}, {&(0x7f0000001900)="87de740a8213bf98d4a30249e49edd95", 0x10}], 0x7, &(0x7f00000019c0)=[{0xe0, 0x88, 0x6, "ba1109063dc80fc167eee0cf0304396550c7aac9b8d4540a928dffaa4e854ffddfb309b187415616020b6ef65faba1c4926131867ad039a2b54a6cacb311f97e96dfab023caef2c187efd59eee75bdd5efcb79fa1af7987dac5e196fc269286862aacad86613f28652ec08279298b886dc966678bedfcadcf272ff28918833a5c096b39717c2ee7720059e28c5f0e9c1f3cb506185e52035d1ff0e8b1815567723a3d536c0e4fdaf27d1161ec35895167596a23cfd7e3244f67600b49698a7f469b478f1e286e0ad1a9a1c"}, {0x68, 0x11, 0x0, "c25d92efef6e360e88181af1395387da5b0fea99c8802bebf331e928684b58ee0fcdd53a18974b970dc3d7ff9a141e5b5e117b734f78271db88587215770eacd2c0dc2a831b12c69dd2595731112a65ea408e247"}, {0xa8, 0xaca281b5055b4c8a, 0x1, "9368a4837c09216bfd595b71ac5e0a36e45839eff58f04a696e6669d8e19916eb83aaa4e4a2c02e6bc11b23b94419c31a1128238899086732eeab9adec3c7ef765c95c5b794975e59e0c77e37752205d843ac0fda8cc34f1b38cb8bb897874db958660a5e55a6e707eabd8b82730dee3cceb537fab080cce914957135b9c8f99808bd3080015fec2675752678ff8169566094a62d8"}, {0x48, 0x0, 0x5, "31d77c09e7f9a22bd8d07b02af5ab72c2a8c6080f71042d5ab82fbf776b17797f83853011c6b176f0d9d322d0fc44af5b75f22ebdc"}, {0x110, 0x10d, 0x1, "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"}], 0x348}}, {{&(0x7f0000001d40)=@un=@abs={0x1, 0x0, 0x4e22}, 0x80, &(0x7f0000003280)=[{&(0x7f0000001dc0)="4f788224b88f21f163c5a07b4d75ca70b256fbc04380e9e000fdeaeafba4bfa3ac55f87b1ac86e9f0bdbab9e02adc2c6b911446812ac55433b0b1ec1de850be09ffdbb255ab6e8ec357d946fe7d3e7d558722a87f64ce42ac61770fbb6437e1844000084fa5ed51c45c4b305bc43bea3043b1ed8d8e6e9a7573dc529860b61a2413f51bee7d92ee1e0dc041347e0b237fd1d0efcebf23775b96f7a1d8aec6fee343a344cf14f9cc41de4a56f479e5a31090dfba54588abe2e42caf169e3ae7", 0xbf}, {&(0x7f0000001e80)="6367b75942c863daa820fd7c962b5c497ac1003f7ee14df5190185196e1f0b39107a302c49b30e2e3065fab4eff7df080eea2d28eaf8203b436ec78a6a1b37dbbae0be6160e34e", 0x47}, {&(0x7f0000001f00)="d3de85ea4a85a95aa0c2761a948f9e70f750252527df818821c477f923d5a86de5f21b711a434e30cf1be5d9b77be949d130bd8611aec9a48bfe88d6e68c06110c25e3a0dbe30830ac2f9813d9b0b0d5df70dbab888cb48a36828a8482c022a6854b67bcf5cee1766bbf0fa1dd4afee09b97089eff45e67fd62d1227f0de03b3e9ce9d", 0x83}, {&(0x7f0000001fc0)="fff38878b09bfadd745fd2ff809fda63bbeaf5488b41230df40c6f3853495a4424807bafef5894dabd34d66ed6f572f8504e26485c6b9eec46bd1ee50a7ac364f8583e604b293d727bf3ebcedb2420c7c5b3bdcba9a3306899495fc1121512bcfabe047211a4c8", 0x67}, {&(0x7f0000002040)="d5731011b6065631ccb3b19d5ec0f4e04920583a2c7e358fe8c6c792bf3a74038d457f45ec97aa5252226a86da27a338343ea33705c32ce2e68153fa227b01ca1385bec8e376d8f68ff433200827800c5c9a000848dad7c5fa24ea18ee2183f76d0ce533185d07c1c0ce21fbd87a2cfe4baae18d02844cf80a1f628a816dab1d4b45ef1411ee4afc3fda5f1b7d89e9018e5d5dc1b044adf92b2b714e320e9fe238", 0xa1}, {&(0x7f0000002100)="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", 0x1000}, {&(0x7f0000003100)="eaaa4cd9050b", 0x6}, {&(0x7f0000003140)="ecc0d4ffa54d823fd0d2256da9c9193c33a0a89ba281298a24ad793872bbcc98c644558dd7cf564297a2f402e11a06dedeafdf3d38ad643baa5dad820200e397d2da3a6e41ef0468b79a3598e2dc283d4d90e249f6b105ad6869e66e718f458df3a5b530d312e6cee6e78859aa449addbec34c04e65b292a523fb0e45429604af7ea6be5ea78dd777249965f2448137f67180a8b99eba46c943d57857e6fa7ba0adea77857", 0xa5}, {&(0x7f0000003200)="ccedd28310fc662c38d8613b0fc5fe30a4250e98f21273b74c54795088d8af81b12be090885acfdfd647a745ef5594ae2c3f474f71e42a7a9cae32bae634a62cfc0320ff25667a2acf9e27fe3e43f48e128f6c6c8d10ef524df11d2d2666e72eb1865e22935dc2", 0x67}, {&(0x7f0000004000)="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", 0x1000}], 0xa, &(0x7f0000003340)=[{0xe8, 0x11, 0x4574, "ae6f403c3447fc3eb7e91c13a502ee2a2d96ff86c0295c6be9c8b63470bd48badf5aacb36bfef145eed8c6b66459b11ae28ef64ebe670f3b28ec274a360de76c1b5df678bf920760bdb4ec682584bc85b451b6baf716409d5da7aa4ecd7f38ca0038627c28a2435f34334a93e62e3902fcc4b7990da97d818e8b05c3ce7c2b50f245a0d8ec600d9a6789a4a70738fb768a02a687ab9dab89202b56de356807b5c585aa67a0cbc36d7ad4757a295ad3676735ea08e2cfb3217aa36ad53c4261ad1e896ab36b7705b6e86adc8c724068b409b47991"}], 0xe8}}], 0x2, 0x40000d5) (async) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000004c0)=@bpf_lsm={0x1d, 0xc, &(0x7f0000000580)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x866}, [@map={0x18, 0x1, 0x1, 0x0, r1}, @map_val={0x18, 0x8, 0x2, 0x0, r8, 0x0, 0x0, 0x0, 0xb}, @ldst={0x1, 0x1, 0x5, 0x4, 0x0, 0xfffffffffffffff8, 0xfffffffffffffff0}, @map={0x18, 0x1, 0x1, 0x0, r2}, @map={0x18, 0xa, 0x1, 0x0, r3}]}, &(0x7f0000000240)='GPL\x00', 0x4e, 0x99, &(0x7f0000000600)=""/153, 0x40f00, 0x1, '\x00', 0x0, 0x1b, r4, 0x8, &(0x7f0000000440)={0x0, 0x4}, 0x8, 0x10, &(0x7f0000000480)={0x0, 0x7, 0x3, 0xffffffff}, 0x10, r6}, 0x78) (async, rerun: 64) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) (rerun: 64) r11 = socket(0x1, 0x5, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r11}, 0x20) 18:12:48 executing program 0: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$FS_IOC_RESVSP(r0, 0x402c5828, &(0x7f00000000c0)={0x0, 0x1, 0xa8f, 0x3078}) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x200000000}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x9) preadv(r1, &(0x7f0000000240)=[{&(0x7f0000000040)=""/94, 0x5e}, {&(0x7f00000000c0)=""/93, 0x5d}, {&(0x7f0000000140)=""/58, 0x3a}], 0x3, 0xd9f, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000002340)='./file0\x00', 0x0, 0x108) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000180)={'team0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @local}, 0x14) writev(r2, &(0x7f0000000280)=[{&(0x7f00000008c0)="110eaa1a9896d57019effc8c79961d0f73ccf3afca3754e2e7a31f536bcb7204bed59311e29c96e1c2b663d61e5b0c0a76ea50cbddaa69f578b8600f77cf1a538ac900673696245b6de4283c979a2eccd71f9583dacf650575d1398678895da32663735b4d0cabfe7e972e59c2b4b4c9c89d0b82ca2267ad5062303e8abcb79600010506702eb912e3957e507aec4e2180699a738f6753509a12282a1d7181887f6c2e03de1da0dfe3b4efbb10e9b59301b4ef8a1d", 0xb5}, {&(0x7f0000000980)="34c30d95766fefbb7bdc40a3242505587bbc8584c2bc2003185f5ce116eea020efa91e2aae1eae2b8e848ac13c3dcedbbbc82adb1e70be8eecedba37be82545f2abda4f0a0e0fd0edd6bd03bb8e9bb91c39a2c828511aef3e684ad4c21ec0c146b9570139e31cd", 0x67}], 0x2) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'macvtap0\x00'}) ioctl$PPPIOCSFLAGS1(0xffffffffffffffff, 0x40047459, &(0x7f00000001c0)) recvmmsg(0xffffffffffffffff, &(0x7f0000002200)=[{{&(0x7f0000000340)=@in={0x2, 0x0, @multicast1}, 0x80, &(0x7f0000000440)=[{&(0x7f00000004c0)=""/88, 0x58}, {&(0x7f0000000b40)=""/4096, 0x1000}], 0x2, &(0x7f0000000740)=""/192, 0xc0}, 0x3}, {{&(0x7f0000000800)=@sco={0x1f, @none}, 0x80, &(0x7f0000000480)=[{&(0x7f0000001b40)=""/82, 0x52}], 0x1, &(0x7f0000001bc0)=""/206, 0xce}, 0x7}, {{&(0x7f0000001cc0)=@in={0x2, 0x0, @broadcast}, 0x80, &(0x7f0000000880)=[{&(0x7f0000001d40)=""/146, 0x92}, {&(0x7f0000001e00)=""/231, 0xe7}], 0x2, &(0x7f0000001f00)=""/239, 0xef}, 0x3}, {{&(0x7f0000002000)=@xdp, 0x80, &(0x7f00000020c0)=[{&(0x7f0000002080)=""/58, 0x3a}], 0x1, &(0x7f0000002100)=""/251, 0xfb}, 0x9}], 0x4, 0x40, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000002380)=ANY=[@ANYBLOB="050000004f2fe4e7fe91d1f169b7f431831544d94b6dbcca36d501829c64f0c28565fbc3e562e329d779aef804590001804797c4378192536ca659efcf0a6cb16b0ba5b79cfefdc8e93c46dfa0c119d12be6495820cc0b34645475d4da28535803ddcfd16f5df589e2f1ac230118eafd75a63c016b3a1663bc141e5ed84016b6b02854a48c0ec71a36a1ad145c5d2216e964a34cdf686b0a089443bd0f8c210860754d133e2c97ce8a25ee4d4eb5abb779387ca2cd9e870d5cb5854616c65c24f259eeaa625432fa25dd2832dc14f9a78ebf3a24277da2b55d09ed6a1dca07d4fb9ed592a64782b6939500505805d12b2776980c4b250f17b0b9a8fda266d7f084a9cd1022d2d670f793298bcf83b9a25e4ae25ac23ce06ef88068108ec131b23695772064709b1dbee85e5c2a0c4cf809dbd8b5617f8c6f6fba013f019829c83bd4cf10be5c6da663ce7cbf9b19ebd88bedb114ec207599273b55ec5f4cd35914f897ee8afc7663255678f6853e5cfa0dfa079ba560c7ddbc56e6352397b7266ac906a0ce0fb810eb00000000000000000000000000000000000000000000000000c54baf95f669d6810040c457be8ca739b4ec785f005bb4faa01270b999b6c9899cd9e8997d359b77c00a68341ca40b4c0e06884b6384ef6e", @ANYRESDEC=r0, @ANYBLOB="b21b22b0b59f1a76abb6323c16886f3d2569d595dca4af1ac9160b24b62e47302e148fa17433c275945e36a713e5fad2e8abc9651d17b22d7d092020f73d100115fed606c66c84318df7895b1e5780f3c785bfb92571cf1bc9", @ANYRES32=0x0, @ANYRES32, @ANYRES32=0x0], &(0x7f0000000300)=0x18) r5 = socket(0x1, 0x803, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8936, &(0x7f0000000080)={@rand_addr=' \x01\x00', 0x44, r4}) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) r7 = socket(0x10, 0x8000000803, 0x0) sendmsg$nl_route(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000a00)=@newlink={0x7c, 0x10, 0x401, 0x3001, 0x25dfdbfc, {0x0, 0x0, 0x0, 0x0, 0x534ad, 0x42a03}, [@IFLA_LINKINFO={0x4c, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x3c, 0x2, 0x0, 0x1, [@IFLA_IPVLAN_MODE={0x6, 0x1, 0x2}, @IFLA_IPVLAN_FLAGS={0x6}, @IFLA_IPVLAN_FLAGS={0x6, 0x2, 0x1}, @IFLA_IPVLAN_FLAGS={0x6, 0x2, 0x2}, @IFLA_IPVLAN_FLAGS={0x6, 0x2, 0x3}, @IFLA_IPVLAN_MODE={0x6}, @IFLA_IPVLAN_FLAGS={0x6, 0x2, 0x2}]}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x7c}}, 0x0) 18:12:48 executing program 5: r0 = syz_io_uring_setup(0x3ede, &(0x7f0000000240), &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) socket$l2tp6(0xa, 0x2, 0x73) openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/locks\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READ=@pass_buffer={0x16, 0x0, 0x0, @fd_index=0x5, 0xffffffffffffffff, &(0x7f0000000040)=""/17, 0x11}, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000002040)=[{{&(0x7f0000001380)=@in6={0xa, 0x0, 0x0, @private0}, 0x80, 0x0}}], 0x1, 0x0) io_uring_enter(r0, 0x26, 0xc000000, 0x0, 0x0, 0x0) [ 556.669207][T22524] loop2: detected capacity change from 0 to 5 [ 556.693242][T22528] loop1: detected capacity change from 0 to 264192 18:12:48 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x200000000}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x11000000, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) 18:12:48 executing program 1: syz_mount_image$ntfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x10000000, 0x0, &(0x7f00000000c0), 0x218400, &(0x7f00000013c0)) [ 556.849863][T22536] 8021q: adding VLAN 0 to HW filter on device ipvlan32 18:12:48 executing program 2: syz_mount_image$ntfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0xc00, 0x0, &(0x7f00000000c0), 0x0, &(0x7f00000013c0)={[{@fmask}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'syzkaller1\x00'}}]}) 18:12:48 executing program 5: r0 = syz_io_uring_setup(0x3ede, &(0x7f0000000240), &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) socket$l2tp6(0xa, 0x2, 0x73) openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/locks\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READ=@pass_buffer={0x16, 0x0, 0x0, @fd_index=0x5, 0xffffffffffffffff, &(0x7f0000000040)=""/17, 0x11}, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000002040)=[{{&(0x7f0000001380)=@in6={0xa, 0x0, 0x0, @private0}, 0x80, 0x0}}], 0x1, 0x0) io_uring_enter(r0, 0x26, 0xd000000, 0x0, 0x0, 0x0) [ 556.890731][T22536] team0: Device ipvlan32 is already an upper device of the team interface 18:12:48 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x200000000}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x12000000, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 556.954435][T22540] loop2: detected capacity change from 0 to 6 [ 557.029831][T22545] loop1: detected capacity change from 0 to 264192 18:12:48 executing program 2: syz_mount_image$ntfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0xc71, 0x0, &(0x7f00000000c0), 0x0, &(0x7f00000013c0)={[{@fmask}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'syzkaller1\x00'}}]}) 18:12:48 executing program 5: r0 = syz_io_uring_setup(0x3ede, &(0x7f0000000240), &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) socket$l2tp6(0xa, 0x2, 0x73) openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/locks\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READ=@pass_buffer={0x16, 0x0, 0x0, @fd_index=0x5, 0xffffffffffffffff, &(0x7f0000000040)=""/17, 0x11}, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000002040)=[{{&(0x7f0000001380)=@in6={0xa, 0x0, 0x0, @private0}, 0x80, 0x0}}], 0x1, 0x0) io_uring_enter(r0, 0x26, 0xe000000, 0x0, 0x0, 0x0) 18:12:48 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x200000000}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x18000000, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) 18:12:48 executing program 0: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$FS_IOC_RESVSP(r0, 0x402c5828, &(0x7f00000000c0)={0x0, 0x1, 0xa8f, 0x3078}) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x200000000}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x9) preadv(r1, &(0x7f0000000240)=[{&(0x7f0000000040)=""/94, 0x5e}, {&(0x7f00000000c0)=""/93, 0x5d}, {&(0x7f0000000140)=""/58, 0x3a}], 0x3, 0xd9f, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000002340)='./file0\x00', 0x0, 0x108) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000180)={'team0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @local}, 0x14) writev(r2, &(0x7f0000000280)=[{&(0x7f00000008c0)="110eaa1a9896d57019effc8c79961d0f73ccf3afca3754e2e7a31f536bcb7204bed59311e29c96e1c2b663d61e5b0c0a76ea50cbddaa69f578b8600f77cf1a538ac900673696245b6de4283c979a2eccd71f9583dacf650575d1398678895da32663735b4d0cabfe7e972e59c2b4b4c9c89d0b82ca2267ad5062303e8abcb79600010506702eb912e3957e507aec4e2180699a738f6753509a12282a1d7181887f6c2e03de1da0dfe3b4efbb10e9b59301b4ef8a1d", 0xb5}, {&(0x7f0000000980)="34c30d95766fefbb7bdc40a3242505587bbc8584c2bc2003185f5ce116eea020efa91e2aae1eae2b8e848ac13c3dcedbbbc82adb1e70be8eecedba37be82545f2abda4f0a0e0fd0edd6bd03bb8e9bb91c39a2c828511aef3e684ad4c21ec0c146b9570139e31cd", 0x67}], 0x2) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'macvtap0\x00'}) ioctl$PPPIOCSFLAGS1(0xffffffffffffffff, 0x40047459, &(0x7f00000001c0)) recvmmsg(0xffffffffffffffff, &(0x7f0000002200)=[{{&(0x7f0000000340)=@in={0x2, 0x0, @multicast1}, 0x80, &(0x7f0000000440)=[{&(0x7f00000004c0)=""/88, 0x58}, {&(0x7f0000000b40)=""/4096, 0x1000}], 0x2, &(0x7f0000000740)=""/192, 0xc0}, 0x3}, {{&(0x7f0000000800)=@sco={0x1f, @none}, 0x80, &(0x7f0000000480)=[{&(0x7f0000001b40)=""/82, 0x52}], 0x1, &(0x7f0000001bc0)=""/206, 0xce}, 0x7}, {{&(0x7f0000001cc0)=@in={0x2, 0x0, @broadcast}, 0x80, &(0x7f0000000880)=[{&(0x7f0000001d40)=""/146, 0x92}, {&(0x7f0000001e00)=""/231, 0xe7}], 0x2, &(0x7f0000001f00)=""/239, 0xef}, 0x3}, {{&(0x7f0000002000)=@xdp, 0x80, &(0x7f00000020c0)=[{&(0x7f0000002080)=""/58, 0x3a}], 0x1, &(0x7f0000002100)=""/251, 0xfb}, 0x9}], 0x4, 0x40, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000002380)=ANY=[@ANYBLOB="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", @ANYRESDEC=r0, @ANYBLOB="b21b22b0b59f1a76abb6323c16886f3d2569d595dca4af1ac9160b24b62e47302e148fa17433c275945e36a713e5fad2e8abc9651d17b22d7d092020f73d100115fed606c66c84318df7895b1e5780f3c785bfb92571cf1bc9", @ANYRES32=0x0, @ANYRES32, @ANYRES32=0x0], &(0x7f0000000300)=0x18) r5 = socket(0x1, 0x803, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8936, &(0x7f0000000080)={@rand_addr=' \x01\x00', 0x44, r4}) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) r7 = socket(0x10, 0x8000000803, 0x0) sendmsg$nl_route(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000a00)=@newlink={0x7c, 0x10, 0x401, 0x3001, 0x25dfdbfc, {0x0, 0x0, 0x0, 0x0, 0x534ad, 0x42a03}, [@IFLA_LINKINFO={0x4c, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x3c, 0x2, 0x0, 0x1, [@IFLA_IPVLAN_MODE={0x6, 0x1, 0x2}, @IFLA_IPVLAN_FLAGS={0x6}, @IFLA_IPVLAN_FLAGS={0x6, 0x2, 0x1}, @IFLA_IPVLAN_FLAGS={0x6, 0x2, 0x2}, @IFLA_IPVLAN_FLAGS={0x6, 0x2, 0x3}, @IFLA_IPVLAN_MODE={0x6}, @IFLA_IPVLAN_FLAGS={0x6, 0x2, 0x2}]}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x7c}}, 0x0) [ 557.227002][T22551] loop2: detected capacity change from 0 to 6 [ 557.356490][T22554] 8021q: adding VLAN 0 to HW filter on device ipvlan32 [ 557.403077][T22554] team0: Device ipvlan32 is already an upper device of the team interface [ 557.441487][T22523] ================================================================== [ 557.449888][T22523] BUG: KASAN: vmalloc-out-of-bounds in bpf_prog_put+0x8c/0x4f0 [ 557.457437][T22523] Read of size 8 at addr ffffc90002016038 by task syz-executor.4/22523 [ 557.465846][T22523] [ 557.468172][T22523] CPU: 0 PID: 22523 Comm: syz-executor.4 Not tainted 5.16.0-rc5-syzkaller #0 [ 557.477092][T22523] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 557.487131][T22523] Call Trace: [ 557.490401][T22523] [ 557.493321][T22523] dump_stack_lvl+0x1dc/0x2d8 [ 557.497995][T22523] ? show_regs_print_info+0x12/0x12 [ 557.503180][T22523] ? _printk+0xcf/0x118 [ 557.507333][T22523] ? wake_up_klogd+0xb2/0xf0 [ 557.511911][T22523] ? log_buf_vmcoreinfo_setup+0x498/0x498 [ 557.517627][T22523] ? _raw_spin_lock_irqsave+0xdd/0x120 [ 557.523103][T22523] print_address_description+0x65/0x380 [ 557.528670][T22523] ? bpf_prog_put+0x8c/0x4f0 [ 557.533273][T22523] kasan_report+0x19a/0x1f0 [ 557.537776][T22523] ? bpf_prog_put+0x8c/0x4f0 [ 557.542389][T22523] bpf_prog_put+0x8c/0x4f0 [ 557.546910][T22523] ? bpf_prog_free_id+0x190/0x190 [ 557.551928][T22523] ? __might_sleep+0xe0/0xe0 [ 557.556592][T22523] ? ima_file_free+0xe8/0x3b0 [ 557.561263][T22523] ? bpf_prog_put+0x4f0/0x4f0 [ 557.565944][T22523] bpf_prog_release+0x37/0x40 [ 557.570614][T22523] __fput+0x3fc/0x870 [ 557.574597][T22523] task_work_run+0x146/0x1c0 [ 557.579181][T22523] do_exit+0x705/0x24f0 [ 557.583421][T22523] ? preempt_schedule+0x16b/0x190 [ 557.588438][T22523] ? lockdep_hardirqs_on_prepare+0x412/0x780 [ 557.594604][T22523] ? mm_update_next_owner+0x6d0/0x6d0 [ 557.599969][T22523] ? _raw_spin_lock_irq+0xdb/0x110 [ 557.605081][T22523] ? trace_hardirqs_on+0x30/0x80 [ 557.610079][T22523] do_group_exit+0x168/0x2d0 [ 557.614667][T22523] __do_sys_exit_group+0x13/0x20 [ 557.619598][T22523] __se_sys_exit_group+0x10/0x10 [ 557.624537][T22523] __x64_sys_exit_group+0x37/0x40 [ 557.629554][T22523] do_syscall_64+0x44/0xd0 [ 557.633975][T22523] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 557.639859][T22523] RIP: 0033:0x7f9aa6167e99 [ 557.644265][T22523] Code: Unable to access opcode bytes at RIP 0x7f9aa6167e6f. [ 557.651615][T22523] RSP: 002b:00007ffe4eb43458 EFLAGS: 00000246 ORIG_RAX: 00000000000000e7 [ 557.660123][T22523] RAX: ffffffffffffffda RBX: 000000000000001e RCX: 00007f9aa6167e99 [ 557.668085][T22523] RDX: 00007f9aa611aadb RSI: ffffffffffffffbc RDI: 0000000000000000 [ 557.676057][T22523] RBP: 0000000000000000 R08: 00007f9aa6280380 R09: 0000000000000000 [ 557.684111][T22523] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 557.692068][T22523] R13: 0000000000000000 R14: 0000000000000001 R15: 00007ffe4eb43540 [ 557.700067][T22523] [ 557.703090][T22523] [ 557.705396][T22523] [ 557.707703][T22523] Memory state around the buggy address: [ 557.713320][T22523] ffffc90002015f00: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 557.721370][T22523] ffffc90002015f80: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 557.729505][T22523] >ffffc90002016000: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 557.737551][T22523] ^ [ 557.743426][T22523] ffffc90002016080: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 557.751471][T22523] ffffc90002016100: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 557.759511][T22523] ================================================================== [ 557.767555][T22523] Disabling lock debugging due to kernel taint [ 557.865127][T22523] Kernel panic - not syncing: panic_on_warn set ... [ 557.871752][T22523] CPU: 1 PID: 22523 Comm: syz-executor.4 Tainted: G B 5.16.0-rc5-syzkaller #0 [ 557.881907][T22523] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 557.891969][T22523] Call Trace: [ 557.895258][T22523] [ 557.898197][T22523] dump_stack_lvl+0x1dc/0x2d8 [ 557.902897][T22523] ? show_regs_print_info+0x12/0x12 [ 557.908108][T22523] ? log_buf_vmcoreinfo_setup+0x498/0x498 [ 557.913844][T22523] ? preempt_schedule+0x16b/0x190 [ 557.918885][T22523] ? schedule_preempt_disabled+0x20/0x20 [ 557.924531][T22523] panic+0x2d6/0x810 [ 557.928440][T22523] ? trace_hardirqs_on+0x30/0x80 [ 557.933391][T22523] ? nmi_panic+0x90/0x90 [ 557.937651][T22523] ? _raw_spin_unlock_irqrestore+0x128/0x130 [ 557.943642][T22523] ? print_memory_metadata+0xe0/0x140 [ 557.949028][T22523] ? bpf_prog_put+0x8c/0x4f0 [ 557.953628][T22523] end_report+0x83/0x90 [ 557.957795][T22523] kasan_report+0x1bf/0x1f0 [ 557.962311][T22523] ? bpf_prog_put+0x8c/0x4f0 [ 557.966912][T22523] bpf_prog_put+0x8c/0x4f0 [ 557.971338][T22523] ? bpf_prog_free_id+0x190/0x190 [ 557.976381][T22523] ? __might_sleep+0xe0/0xe0 [ 557.980973][T22523] ? ima_file_free+0xe8/0x3b0 [ 557.985664][T22523] ? bpf_prog_put+0x4f0/0x4f0 [ 557.990345][T22523] bpf_prog_release+0x37/0x40 [ 557.995029][T22523] __fput+0x3fc/0x870 [ 557.999027][T22523] task_work_run+0x146/0x1c0 [ 558.003630][T22523] do_exit+0x705/0x24f0 [ 558.007795][T22523] ? preempt_schedule+0x16b/0x190 [ 558.012829][T22523] ? lockdep_hardirqs_on_prepare+0x412/0x780 [ 558.018822][T22523] ? mm_update_next_owner+0x6d0/0x6d0 [ 558.024214][T22523] ? _raw_spin_lock_irq+0xdb/0x110 [ 558.029340][T22523] ? trace_hardirqs_on+0x30/0x80 [ 558.034292][T22523] do_group_exit+0x168/0x2d0 [ 558.038895][T22523] __do_sys_exit_group+0x13/0x20 [ 558.043844][T22523] __se_sys_exit_group+0x10/0x10 [ 558.048790][T22523] __x64_sys_exit_group+0x37/0x40 [ 558.053826][T22523] do_syscall_64+0x44/0xd0 [ 558.058251][T22523] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 558.064154][T22523] RIP: 0033:0x7f9aa6167e99 [ 558.068575][T22523] Code: Unable to access opcode bytes at RIP 0x7f9aa6167e6f. [ 558.075926][T22523] RSP: 002b:00007ffe4eb43458 EFLAGS: 00000246 ORIG_RAX: 00000000000000e7 [ 558.084324][T22523] RAX: ffffffffffffffda RBX: 000000000000001e RCX: 00007f9aa6167e99 [ 558.092292][T22523] RDX: 00007f9aa611aadb RSI: ffffffffffffffbc RDI: 0000000000000000 [ 558.100247][T22523] RBP: 0000000000000000 R08: 00007f9aa6280380 R09: 0000000000000000 [ 558.108204][T22523] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 558.116158][T22523] R13: 0000000000000000 R14: 0000000000000001 R15: 00007ffe4eb43540 [ 558.124128][T22523] [ 558.127358][T22523] Kernel Offset: disabled [ 558.131672][T22523] Rebooting in 86400 seconds..