}, {0x20, 0x9, 0x8}, {0xe6, 0xc38, 0x2}, {0x4, 0xa0, 0xff}, {0x0, 0x9}, {0x401, 0xfffff800, 0x3ff}, {0xa870, 0x101, 0x7}, {0x9, 0x8, 0x7ff}, {0x1, 0x0, 0x9}, {0x3f, 0x1000, 0x3}, {0x43cf, 0x0, 0x9}, {0x0, 0x80000001, 0x4}, {0x7, 0x1, 0x3}, {0xfff, 0x9, 0x5}, {0x6, 0x0, 0xfff}, {0x6, 0x2, 0x200}, {0x1, 0x5, 0x1}, {0xc1, 0x9, 0x7}, {0xc58e, 0x4, 0x4}, {0x8, 0x9, 0x1}, {0x80000001, 0x7, 0x1}, {0x7f, 0x0, 0x5}, {0x4, 0x80}, {0x6, 0xff, 0x800}, {0x44, 0xd0, 0x80000001}, {0x5, 0x2, 0x7}, {0x4, 0x6d3, 0x80000000}, {0x3, 0x8, 0x3}, {0x7fff, 0x5, 0x1f}, {0x2e5, 0xfff, 0x20}]}) 06:55:22 executing program 1: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x802c550a, &(0x7f0000000200)=@urb_type_bulk={0x3, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) socket$inet(0x2, 0x800, 0x4) r1 = socket$inet(0x2, 0xa, 0x0) ioctl$IOC_PR_RESERVE(0xffffffffffffffff, 0x401070c9, &(0x7f0000000080)={0x3f, 0x401}) accept$inet(r1, 0x0, 0x0) setsockopt$inet_opts(r1, 0x0, 0x4, &(0x7f0000000240)="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", 0x105) syz_open_dev$usbfs(&(0x7f0000000040), 0x9, 0x80) 06:55:22 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x40000, 0x0) r1 = ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0xa) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, r1) 06:55:22 executing program 1: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x802c550a, &(0x7f0000000200)=@urb_type_bulk={0x3, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) (async) socket$inet(0x2, 0x800, 0x4) (async) r1 = socket$inet(0x2, 0xa, 0x0) ioctl$IOC_PR_RESERVE(0xffffffffffffffff, 0x401070c9, &(0x7f0000000080)={0x3f, 0x401}) (async) accept$inet(r1, 0x0, 0x0) (async) setsockopt$inet_opts(r1, 0x0, 0x4, &(0x7f0000000240)="fa7da70300000000000000c4ef8a311d357b9a72a116c9170a912693491150aedd9e459a69af7b54c1e68783f76cdc995d16d45a4e1202bd4bddc9c0cf04cc89828b23cd7d15dda63cb17f2f1870c4d34038c2f248625b81c9c179a422dd7477e0789ac3cd20e3fe095cf1af329dd6fcb3575218c5cb2d60bb241c6938360b772d53180eb3b1696f06faf36609308424ce412c2200a63d617439317ceda7388aa24c7f820359577f0eb59520c574bf9b2cd97988074716ab3a8b7f52e26d334f57f9395be191562c5972210d570a47f42a6b249ee3b176a7dd4f7ad65a4f801aec213d4529bb02d047e9203ad2b96d159439954c9bb2fbbf1f4f3673a1a3fdeb674cf036cba2ae528bd3d79f6bc3242739042bc4e7d106e21dc278a666ab49c6f4576a52dab4b222e35bf9191047aff3fe671ed3157778ca9c7cdf3ad6deb64115341055017e62dcc2c7fdf88872298b5fb67db158dfa4f945cca91019eb3f411911b9e9edfa55e2e147be2b1276d72251ceccd90544e294c806b6200465bc87fe0b4c81d7f05d4fa92b52669c201ad2866c5f8351bbae953d66a3d9168f56964ee00aef0ed5d4d2a9f1254be1c247d7166edc34dbf864f21925a7702eadb2f4aef19241d01223e51361a7764adcd8dced73160489ef28ff3fd96d4cb559e7067460bc1386294fe8366d0149558582c2e589c2a5c083203051a82f714cdfcfdfd111e7b30f386e7c91ecb2d40d9ac8252cef8376d8b0008a9d33d4631fff6658a4f8e2fae11cede32a814441bfe74e3dfa7cb8fe65b42f5bc9fa71ed1a6380d4402df9530f946e43fad323cfe0374b922d9f51edb3cc947302271e2470a24fc6caffd6a1b28deedc61557e591214fac6e324701132624dd37019d3af785e006a09781db7fe026d99e4c22673c548db0300f453ab41d113983519428a83782191461750a9c4d4433d4e24ea6dd28745ad5204fa4c77a016e01bdafbd9d341ca8a334f1be7760f367ef484b26aea9e6fdae6a3e872185aa957609fad1ade29c5c650f44d115400ac2073b0af3f163cd5465907c864f5b7dc837a9b0d9420324fa6", 0x105) (async, rerun: 32) syz_open_dev$usbfs(&(0x7f0000000040), 0x9, 0x80) (rerun: 32) 06:55:22 executing program 0: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000380), 0x6e665f53, 0x0) ioctl$USBDEVFS_CLEAR_HALT(r1, 0x80045515, 0x0) ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000740)=@usbdevfs_driver={0x1, 0x1ff, &(0x7f0000000100)="ac58ca9a0c3558aebad3d4e5084a9b3cf45de85d5c85864e9a88b0b4761fc37dc8dba19ae88e5d4ae34cbe01a17c3d9f91528427f36b96b4b6754421ec60a120"}) r2 = syz_open_dev$usbfs(&(0x7f0000000040), 0x40, 0x0) ioctl$USBDEVFS_CONTROL(r2, 0xc0185500, &(0x7f00000000c0)={0x1f, 0x29, 0x0, 0x2c, 0x0, 0x1bf381ab, &(0x7f0000000080)}) r3 = syz_open_dev$usbfs(&(0x7f0000000080), 0x7, 0x20080) ioctl$USBDEVFS_SUBMITURB(r3, 0x8038550a, &(0x7f0000000240)=@urb_type_iso={0x0, {0x1}, 0x7f, 0x84, &(0x7f0000000100), 0x0, 0x40, 0x8, 0x63, 0x6, 0x4, &(0x7f0000000140)="4a3a294d1974bb25f3f415d7e94d94d1d9ade137e77b78cb5b7c7b1f004b52162b8a24e17c58378ffebd0c6bbc691af494ad4dfe8aa6449cd089ba3cf8ba200df7193a602cea67d0d44a1592c165f8aa84f0bc8f2f04d1ef8ed02106d652dd22943e804ce0f6b021680e58337a0c81d30cc6751fab9a707c3d559e05860192a2004aa570bcae991ad8fbf62f0c28cfdb7541", [{0x400, 0x8001, 0x14d}, {0x4, 0xffffffff, 0x1d20}, {0x80, 0x5, 0x4}, {0x0, 0x101, 0x10001}, {0x80000000, 0xff, 0x7}, {0x1, 0xb5d7}, {0x1, 0x40, 0x3}, {0x6, 0xa, 0x6b21}, {0x9, 0x9, 0x5}, {0x5, 0x80000000, 0x1}, {0x8, 0x3, 0xfffffe00}, {0x3, 0x7}, {0x5, 0x3f, 0x9}, {0x1, 0x9195, 0xfffff032}, {0x8, 0x10000, 0x1}, {0xed, 0xfff, 0x5}, {0x1, 0x2, 0x200}, {0xc6ba, 0xdf, 0x5}, {0x40, 0x9, 0x7}, {0x1, 0x8e, 0x5437}, {0xffff, 0x1000, 0x8}, {0x5, 0xff, 0x5}, {0x6, 0x10001, 0xf}, {0x1, 0x7, 0x4}, {0x6, 0x2, 0x1}, {0x8, 0x9, 0x4000000}, {0x80, 0x5, 0x7}, {0x6, 0x1, 0x2}, {0x6, 0x101, 0x2}, {0x1, 0x7fffffff, 0x8}, {0xe300, 0x9af}, {0x1, 0x8, 0xf8e}, {0x1, 0x7ff, 0x5}, {0xe1, 0xe15d, 0x253}, {0x6, 0x1196}, {0x8, 0x1, 0x2}, {0x7, 0x1ff, 0x10001}, {0x5, 0xfff, 0x4}, {0x80000001, 0x5, 0x4}, {0x5, 0x200, 0x9}, {0xfffffff8, 0x4f5d, 0x3}, {0x1, 0xb8d, 0xaa000000}, {0x1, 0x91e5d271, 0x8}, {0x2, 0x8, 0x9}, {0x0, 0x30e, 0x6}, {0xffff, 0x6, 0x401}, {0x2, 0x1, 0xf0b}, {0xfff, 0x8, 0x8}, {0x1f, 0xfffffffd, 0x1}, {0x1000, 0x4, 0x3}, {0x800, 0x30000, 0x8001}, {0x3, 0xfffffff7, 0x46da054f}, {0x3, 0x5, 0x1}, {0x8001, 0x101, 0x2}, {0x20000000, 0x7f, 0xffffff01}, {0x6, 0xd0, 0x4}, {0x6, 0x200, 0x9}, {0x5, 0x9, 0x8}, {0x4, 0x7fff, 0x1ff}, {0x8, 0x1, 0x8}, {0x7, 0xffffffff, 0x2}, {0x74, 0x4, 0xfffffc00}, {0x9, 0x0, 0x101}, {0x8001, 0x2, 0x401}, {0x0, 0x4, 0x80}, {0xfff, 0x7, 0xffffffff}, {0x2, 0x1ad, 0x7}, {0x9, 0x401, 0x400}, {0xff, 0x79, 0x8}, {0x5, 0x101, 0x9}, {0xb2a0, 0x10000, 0x100}, {0x80, 0x0, 0x40}, {0x92d, 0x7f, 0x3ff}, {0x5, 0xfffffffe, 0x101}, {0x4, 0xef, 0x6}, {0x1000, 0x1, 0x4}, {0xffff, 0xfffffffc, 0xffffff4d}, {0xffffffff, 0x6, 0x6}, {0x2, 0x7, 0x7}, {0x400, 0x8, 0x3}, {0x40, 0x4, 0x20}, {0x8, 0xff, 0x3ff}, {0x9879, 0x401, 0x9}, {0x4, 0xb6f5, 0x9}, {0x6, 0x1, 0x3}, {0x6, 0x2, 0x40}, {0x20000, 0x7ff, 0x6}, {0x7fff, 0x0, 0xf6}, {0x3ff, 0x9, 0xfffffe6a}, {0x3, 0x101, 0x101}, {0x81, 0x5, 0x3}, {0x0, 0x7, 0x2e}, {0xac0, 0x10001, 0x3}, {0x2, 0x91b, 0x9}, {0x0, 0x2, 0x4261}, {0x8, 0x8001, 0x10}, {0xfffffff7, 0x400, 0x1}, {0xf3e, 0x1f0e, 0x8}, {0x2, 0x3ff, 0xfff}]}) r4 = syz_open_dev$usbfs(&(0x7f0000000380), 0x6e665f53, 0x0) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, &(0x7f0000000940)={0x7fff, 0x2, 0x1}) r5 = socket$inet(0x2, 0x2, 0x3) setsockopt$inet_group_source_req(r5, 0x0, 0x2b, &(0x7f0000000980)={0x1, {{0x2, 0x4e21, @initdev={0xac, 0x1e, 0x0, 0x0}}}, {{0x2, 0x4e22, @empty}}}, 0x108) ioctl$USBDEVFS_ALLOC_STREAMS(0xffffffffffffffff, 0x8008551c, &(0x7f0000000b00)={0x6814, 0x9, [{0x2, 0x1}, {0x1}, {0xf, 0x1}, {0x1, 0x1}, {0xe, 0x1}, {0x4}, {0x5}, {0x3, 0x1}, {0x7, 0x1}]}) r6 = syz_open_dev$usbfs(&(0x7f0000000880), 0x9, 0x4000) ioctl$USBDEVFS_SETCONFIGURATION(r6, 0x80045505, &(0x7f00000008c0)=0xfffffff9) ioctl$USBDEVFS_DISCARDURB(0xffffffffffffffff, 0x550b, &(0x7f0000000ac0)=0x3) ioctl$USBDEVFS_CLEAR_HALT(r4, 0x80045515, 0x0) read$usbfs(r4, &(0x7f0000000780)=""/197, 0xc5) ioctl$USBDEVFS_SUBMITURB(r0, 0x5452, &(0x7f0000000200)=@urb_type_bulk={0x3, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x0) (async) syz_open_dev$usbfs(&(0x7f0000000380), 0x6e665f53, 0x0) (async) ioctl$USBDEVFS_CLEAR_HALT(r1, 0x80045515, 0x0) (async) ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000740)=@usbdevfs_driver={0x1, 0x1ff, &(0x7f0000000100)="ac58ca9a0c3558aebad3d4e5084a9b3cf45de85d5c85864e9a88b0b4761fc37dc8dba19ae88e5d4ae34cbe01a17c3d9f91528427f36b96b4b6754421ec60a120"}) (async) syz_open_dev$usbfs(&(0x7f0000000040), 0x40, 0x0) (async) ioctl$USBDEVFS_CONTROL(r2, 0xc0185500, &(0x7f00000000c0)={0x1f, 0x29, 0x0, 0x2c, 0x0, 0x1bf381ab, &(0x7f0000000080)}) (async) syz_open_dev$usbfs(&(0x7f0000000080), 0x7, 0x20080) (async) ioctl$USBDEVFS_SUBMITURB(r3, 0x8038550a, &(0x7f0000000240)=@urb_type_iso={0x0, {0x1}, 0x7f, 0x84, &(0x7f0000000100), 0x0, 0x40, 0x8, 0x63, 0x6, 0x4, &(0x7f0000000140)="4a3a294d1974bb25f3f415d7e94d94d1d9ade137e77b78cb5b7c7b1f004b52162b8a24e17c58378ffebd0c6bbc691af494ad4dfe8aa6449cd089ba3cf8ba200df7193a602cea67d0d44a1592c165f8aa84f0bc8f2f04d1ef8ed02106d652dd22943e804ce0f6b021680e58337a0c81d30cc6751fab9a707c3d559e05860192a2004aa570bcae991ad8fbf62f0c28cfdb7541", [{0x400, 0x8001, 0x14d}, {0x4, 0xffffffff, 0x1d20}, {0x80, 0x5, 0x4}, {0x0, 0x101, 0x10001}, {0x80000000, 0xff, 0x7}, {0x1, 0xb5d7}, {0x1, 0x40, 0x3}, {0x6, 0xa, 0x6b21}, {0x9, 0x9, 0x5}, {0x5, 0x80000000, 0x1}, {0x8, 0x3, 0xfffffe00}, {0x3, 0x7}, {0x5, 0x3f, 0x9}, {0x1, 0x9195, 0xfffff032}, {0x8, 0x10000, 0x1}, {0xed, 0xfff, 0x5}, {0x1, 0x2, 0x200}, {0xc6ba, 0xdf, 0x5}, {0x40, 0x9, 0x7}, {0x1, 0x8e, 0x5437}, {0xffff, 0x1000, 0x8}, {0x5, 0xff, 0x5}, {0x6, 0x10001, 0xf}, {0x1, 0x7, 0x4}, {0x6, 0x2, 0x1}, {0x8, 0x9, 0x4000000}, {0x80, 0x5, 0x7}, {0x6, 0x1, 0x2}, {0x6, 0x101, 0x2}, {0x1, 0x7fffffff, 0x8}, {0xe300, 0x9af}, {0x1, 0x8, 0xf8e}, {0x1, 0x7ff, 0x5}, {0xe1, 0xe15d, 0x253}, {0x6, 0x1196}, {0x8, 0x1, 0x2}, {0x7, 0x1ff, 0x10001}, {0x5, 0xfff, 0x4}, {0x80000001, 0x5, 0x4}, {0x5, 0x200, 0x9}, {0xfffffff8, 0x4f5d, 0x3}, {0x1, 0xb8d, 0xaa000000}, {0x1, 0x91e5d271, 0x8}, {0x2, 0x8, 0x9}, {0x0, 0x30e, 0x6}, {0xffff, 0x6, 0x401}, {0x2, 0x1, 0xf0b}, {0xfff, 0x8, 0x8}, {0x1f, 0xfffffffd, 0x1}, {0x1000, 0x4, 0x3}, {0x800, 0x30000, 0x8001}, {0x3, 0xfffffff7, 0x46da054f}, {0x3, 0x5, 0x1}, {0x8001, 0x101, 0x2}, {0x20000000, 0x7f, 0xffffff01}, {0x6, 0xd0, 0x4}, {0x6, 0x200, 0x9}, {0x5, 0x9, 0x8}, {0x4, 0x7fff, 0x1ff}, {0x8, 0x1, 0x8}, {0x7, 0xffffffff, 0x2}, {0x74, 0x4, 0xfffffc00}, {0x9, 0x0, 0x101}, {0x8001, 0x2, 0x401}, {0x0, 0x4, 0x80}, {0xfff, 0x7, 0xffffffff}, {0x2, 0x1ad, 0x7}, {0x9, 0x401, 0x400}, {0xff, 0x79, 0x8}, {0x5, 0x101, 0x9}, {0xb2a0, 0x10000, 0x100}, {0x80, 0x0, 0x40}, {0x92d, 0x7f, 0x3ff}, {0x5, 0xfffffffe, 0x101}, {0x4, 0xef, 0x6}, {0x1000, 0x1, 0x4}, {0xffff, 0xfffffffc, 0xffffff4d}, {0xffffffff, 0x6, 0x6}, {0x2, 0x7, 0x7}, {0x400, 0x8, 0x3}, {0x40, 0x4, 0x20}, {0x8, 0xff, 0x3ff}, {0x9879, 0x401, 0x9}, {0x4, 0xb6f5, 0x9}, {0x6, 0x1, 0x3}, {0x6, 0x2, 0x40}, {0x20000, 0x7ff, 0x6}, {0x7fff, 0x0, 0xf6}, {0x3ff, 0x9, 0xfffffe6a}, {0x3, 0x101, 0x101}, {0x81, 0x5, 0x3}, {0x0, 0x7, 0x2e}, {0xac0, 0x10001, 0x3}, {0x2, 0x91b, 0x9}, {0x0, 0x2, 0x4261}, {0x8, 0x8001, 0x10}, {0xfffffff7, 0x400, 0x1}, {0xf3e, 0x1f0e, 0x8}, {0x2, 0x3ff, 0xfff}]}) (async) syz_open_dev$usbfs(&(0x7f0000000380), 0x6e665f53, 0x0) (async) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, &(0x7f0000000940)={0x7fff, 0x2, 0x1}) (async) socket$inet(0x2, 0x2, 0x3) (async) setsockopt$inet_group_source_req(r5, 0x0, 0x2b, &(0x7f0000000980)={0x1, {{0x2, 0x4e21, @initdev={0xac, 0x1e, 0x0, 0x0}}}, {{0x2, 0x4e22, @empty}}}, 0x108) (async) ioctl$USBDEVFS_ALLOC_STREAMS(0xffffffffffffffff, 0x8008551c, &(0x7f0000000b00)={0x6814, 0x9, [{0x2, 0x1}, {0x1}, {0xf, 0x1}, {0x1, 0x1}, {0xe, 0x1}, {0x4}, {0x5}, {0x3, 0x1}, {0x7, 0x1}]}) (async) syz_open_dev$usbfs(&(0x7f0000000880), 0x9, 0x4000) (async) ioctl$USBDEVFS_SETCONFIGURATION(r6, 0x80045505, &(0x7f00000008c0)=0xfffffff9) (async) ioctl$USBDEVFS_DISCARDURB(0xffffffffffffffff, 0x550b, &(0x7f0000000ac0)=0x3) (async) ioctl$USBDEVFS_CLEAR_HALT(r4, 0x80045515, 0x0) (async) read$usbfs(r4, &(0x7f0000000780)=""/197, 0xc5) (async) ioctl$USBDEVFS_SUBMITURB(r0, 0x5452, &(0x7f0000000200)=@urb_type_bulk={0x3, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) (async) 06:55:22 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000a80), 0x0, 0x200000) ioctl$BLKGETSIZE(r0, 0x1260, 0x0) r1 = socket$netlink(0x10, 0x3, 0x4) syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), r1) (async, rerun: 32) sendmsg$WG_CMD_SET_DEVICE(r1, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000280)=ANY=[@ANYBLOB="3400e400590379d6e06935f625099fe82d1df7feabe4a70e7c2a51c430b52822f6aaa04a0cda01aa7beda002bf2e5cbdb4fdfbe0acb8b2c5d8aab7ef8a2ad0c2ade88bd838b12c195ffb0ee4f797b44193740ccc6c8f4a0b2e986f3f880dc21db15e8ec32608c7a3b086086b6703eaace618588e2674f5e2b7654fedae8b75b6eee1b0930c4c1b31c61fca456b63a9785dd6e9860dfef6b832f8cff0af14cfaa6dee2ea02ea3567623a3db0589f8d7bdb9549e5aa2a3a2ced036aacdd61573d069383307c0e06a3a5a6f93da52bcf5ea4436b0fc7db23ee03859654845f40b71834bf542c6dbec2371fc052b36079e62d27b", @ANYRES16=0x0, @ANYBLOB="00042dbd7000fedbdf2501000000080007000080ffff100008800c00008006010000090000000800050000000000"], 0x34}, 0x1, 0x0, 0x0, 0x8000}, 0x8c0) (async, rerun: 32) ioctl$HDIO_GETGEO(r0, 0x301, &(0x7f0000000040)) r2 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r2, 0x8008551c, &(0x7f0000000200)=@urb_type_bulk={0x3, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 06:55:22 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x40000, 0x0) r1 = ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0xa) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, r1) 06:55:22 executing program 1: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x802c550a, &(0x7f0000000200)=@urb_type_bulk={0x3, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) socket$inet(0x2, 0x800, 0x4) r1 = socket$inet(0x2, 0xa, 0x0) ioctl$IOC_PR_RESERVE(0xffffffffffffffff, 0x401070c9, &(0x7f0000000080)={0x3f, 0x401}) accept$inet(r1, 0x0, 0x0) (async) accept$inet(r1, 0x0, 0x0) setsockopt$inet_opts(r1, 0x0, 0x4, &(0x7f0000000240)="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", 0x105) syz_open_dev$usbfs(&(0x7f0000000040), 0x9, 0x80) (async) syz_open_dev$usbfs(&(0x7f0000000040), 0x9, 0x80) 06:55:22 executing program 0: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000380), 0x6e665f53, 0x0) ioctl$USBDEVFS_CLEAR_HALT(r1, 0x80045515, 0x0) r2 = syz_open_dev$usbfs(&(0x7f00000000c0), 0x4, 0x121580) ioctl$USBDEVFS_RESET(r2, 0x5514) ioctl$USBDEVFS_CONNECTINFO(r2, 0x40085511, &(0x7f0000000100)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000012c0)={0x9, 0x4, &(0x7f0000000680)=@framed={{}, [@ldst={0x3, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffc}]}, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) ioctl$USBDEVFS_RELEASEINTERFACE(r1, 0x80045510, &(0x7f0000000080)=0x6) ioctl$USBDEVFS_SUBMITURB(r0, 0x5452, &(0x7f0000000200)=@urb_type_bulk={0x3, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r3 = socket$igmp6(0xa, 0x3, 0x2) setsockopt$MRT6_DONE(r3, 0x29, 0xc9, 0x0, 0x0) setsockopt$MRT6_INIT(r3, 0x29, 0xc8, &(0x7f0000000040), 0x4) 06:55:22 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x40000, 0x0) r1 = ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0xa) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r1) 06:55:22 executing program 1: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x200) ioctl$USBDEVFS_SUBMITURB(r0, 0x802c550a, &(0x7f0000000200)=@urb_type_bulk={0x3, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 06:55:22 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x40000, 0x0) r1 = ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0xa) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, r1) 06:55:22 executing program 0: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000380), 0x6e665f53, 0x0) ioctl$USBDEVFS_CLEAR_HALT(r1, 0x80045515, 0x0) (async) ioctl$USBDEVFS_CLEAR_HALT(r1, 0x80045515, 0x0) syz_open_dev$usbfs(&(0x7f00000000c0), 0x4, 0x121580) (async) r2 = syz_open_dev$usbfs(&(0x7f00000000c0), 0x4, 0x121580) ioctl$USBDEVFS_RESET(r2, 0x5514) ioctl$USBDEVFS_CONNECTINFO(r2, 0x40085511, &(0x7f0000000100)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000012c0)={0x9, 0x4, &(0x7f0000000680)=@framed={{}, [@ldst={0x3, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffc}]}, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) ioctl$USBDEVFS_RELEASEINTERFACE(r1, 0x80045510, &(0x7f0000000080)=0x6) ioctl$USBDEVFS_SUBMITURB(r0, 0x5452, &(0x7f0000000200)=@urb_type_bulk={0x3, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r3 = socket$igmp6(0xa, 0x3, 0x2) setsockopt$MRT6_DONE(r3, 0x29, 0xc9, 0x0, 0x0) (async) setsockopt$MRT6_DONE(r3, 0x29, 0xc9, 0x0, 0x0) setsockopt$MRT6_INIT(r3, 0x29, 0xc8, &(0x7f0000000040), 0x4) (async) setsockopt$MRT6_INIT(r3, 0x29, 0xc8, &(0x7f0000000040), 0x4) 06:55:22 executing program 1: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x200) ioctl$USBDEVFS_SUBMITURB(r0, 0x802c550a, &(0x7f0000000200)=@urb_type_bulk={0x3, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 06:55:22 executing program 1: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x200) ioctl$USBDEVFS_SUBMITURB(r0, 0x802c550a, &(0x7f0000000200)=@urb_type_bulk={0x3, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x200) (async) ioctl$USBDEVFS_SUBMITURB(r0, 0x802c550a, &(0x7f0000000200)=@urb_type_bulk={0x3, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) (async) 06:55:22 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x40000, 0x0) r1 = ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0xa) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x2) ioctl$LOOP_CTL_ADD(r2, 0x4c80, r1) r3 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040), 0x32140, 0x0) ioctl$ASHMEM_SET_SIZE(r3, 0x40087703, 0x3) 06:55:22 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x40000, 0x0) r1 = ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0xa) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, r1) 06:55:22 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000a80), 0x0, 0x200000) ioctl$BLKGETSIZE(r0, 0x1260, 0x0) r1 = socket$netlink(0x10, 0x3, 0x4) syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), r1) sendmsg$WG_CMD_SET_DEVICE(r1, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000280)=ANY=[@ANYBLOB="3400e400590379d6e06935f625099fe82d1df7feabe4a70e7c2a51c430b52822f6aaa04a0cda01aa7beda002bf2e5cbdb4fdfbe0acb8b2c5d8aab7ef8a2ad0c2ade88bd838b12c195ffb0ee4f797b44193740ccc6c8f4a0b2e986f3f880dc21db15e8ec32608c7a3b086086b6703eaace618588e2674f5e2b7654fedae8b75b6eee1b0930c4c1b31c61fca456b63a9785dd6e9860dfef6b832f8cff0af14cfaa6dee2ea02ea3567623a3db0589f8d7bdb9549e5aa2a3a2ced036aacdd61573d069383307c0e06a3a5a6f93da52bcf5ea4436b0fc7db23ee03859654845f40b71834bf542c6dbec2371fc052b36079e62d27b", @ANYRES16=0x0, @ANYBLOB="00042dbd7000fedbdf2501000000080007000080ffff100008800c00008006010000090000000800050000000000"], 0x34}, 0x1, 0x0, 0x0, 0x8000}, 0x8c0) (async) ioctl$HDIO_GETGEO(r0, 0x301, &(0x7f0000000040)) (async) r2 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r2, 0x8008551c, &(0x7f0000000200)=@urb_type_bulk={0x3, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 06:55:22 executing program 0: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000380), 0x6e665f53, 0x0) ioctl$USBDEVFS_CLEAR_HALT(r1, 0x80045515, 0x0) (async) r2 = syz_open_dev$usbfs(&(0x7f00000000c0), 0x4, 0x121580) ioctl$USBDEVFS_RESET(r2, 0x5514) ioctl$USBDEVFS_CONNECTINFO(r2, 0x40085511, &(0x7f0000000100)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000012c0)={0x9, 0x4, &(0x7f0000000680)=@framed={{}, [@ldst={0x3, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffc}]}, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) ioctl$USBDEVFS_RELEASEINTERFACE(r1, 0x80045510, &(0x7f0000000080)=0x6) (async) ioctl$USBDEVFS_SUBMITURB(r0, 0x5452, &(0x7f0000000200)=@urb_type_bulk={0x3, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r3 = socket$igmp6(0xa, 0x3, 0x2) setsockopt$MRT6_DONE(r3, 0x29, 0xc9, 0x0, 0x0) (async) setsockopt$MRT6_INIT(r3, 0x29, 0xc8, &(0x7f0000000040), 0x4) 06:55:22 executing program 0: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x2, 0x0) r1 = socket$inet(0x2, 0xa, 0x0) accept$inet(r1, 0x0, 0x0) setsockopt$inet_msfilter(r1, 0x0, 0x29, &(0x7f0000000080)=ANY=[@ANYBLOB="ac1e0101ac1e0101018c000005000000ffffffffe0000002e0000001ac1e0101ffffffff"], 0x24) r2 = syz_open_dev$usbfs(&(0x7f00000000c0), 0x7fff, 0x40) ioctl$USBDEVFS_CLEAR_HALT(r2, 0x80045515, &(0x7f0000000100)={0x3}) ioctl$USBDEVFS_SUBMITURB(r0, 0x5452, &(0x7f0000000200)=@urb_type_bulk={0x3, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r3 = syz_open_dev$usbfs(&(0x7f0000000380), 0x6e665f53, 0x0) ioctl$USBDEVFS_CLEAR_HALT(r3, 0x80045515, 0x0) ioctl$USBDEVFS_RELEASE_PORT(r3, 0x80045519, &(0x7f0000000040)=0x200) 06:55:22 executing program 0: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x2, 0x0) r1 = socket$inet(0x2, 0xa, 0x0) accept$inet(r1, 0x0, 0x0) setsockopt$inet_msfilter(r1, 0x0, 0x29, &(0x7f0000000080)=ANY=[@ANYBLOB="ac1e0101ac1e0101018c000005000000ffffffffe0000002e0000001ac1e0101ffffffff"], 0x24) r2 = syz_open_dev$usbfs(&(0x7f00000000c0), 0x7fff, 0x40) ioctl$USBDEVFS_CLEAR_HALT(r2, 0x80045515, &(0x7f0000000100)={0x3}) ioctl$USBDEVFS_SUBMITURB(r0, 0x5452, &(0x7f0000000200)=@urb_type_bulk={0x3, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r3 = syz_open_dev$usbfs(&(0x7f0000000380), 0x6e665f53, 0x0) ioctl$USBDEVFS_CLEAR_HALT(r3, 0x80045515, 0x0) ioctl$USBDEVFS_RELEASE_PORT(r3, 0x80045519, &(0x7f0000000040)=0x200) syz_open_dev$usbfs(&(0x7f0000000000), 0x2, 0x0) (async) socket$inet(0x2, 0xa, 0x0) (async) accept$inet(r1, 0x0, 0x0) (async) setsockopt$inet_msfilter(r1, 0x0, 0x29, &(0x7f0000000080)=ANY=[@ANYBLOB="ac1e0101ac1e0101018c000005000000ffffffffe0000002e0000001ac1e0101ffffffff"], 0x24) (async) syz_open_dev$usbfs(&(0x7f00000000c0), 0x7fff, 0x40) (async) ioctl$USBDEVFS_CLEAR_HALT(r2, 0x80045515, &(0x7f0000000100)={0x3}) (async) ioctl$USBDEVFS_SUBMITURB(r0, 0x5452, &(0x7f0000000200)=@urb_type_bulk={0x3, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) (async) syz_open_dev$usbfs(&(0x7f0000000380), 0x6e665f53, 0x0) (async) ioctl$USBDEVFS_CLEAR_HALT(r3, 0x80045515, 0x0) (async) ioctl$USBDEVFS_RELEASE_PORT(r3, 0x80045519, &(0x7f0000000040)=0x200) (async) 06:55:22 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x40000, 0x0) r1 = ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0xa) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r1) 06:55:22 executing program 1: ioctl$USBDEVFS_SUBMITURB(0xffffffffffffffff, 0x802c550a, &(0x7f0000000000)=@urb_type_bulk={0x3, {}, 0x0, 0x20, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}) 06:55:22 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x40000, 0x0) r1 = ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0xa) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x2) ioctl$LOOP_CTL_ADD(r2, 0x4c80, r1) r3 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040), 0x32140, 0x0) ioctl$ASHMEM_SET_SIZE(r3, 0x40087703, 0x3) 06:55:22 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x40000, 0x0) r1 = ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0xa) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r1) 06:55:22 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x8008551c, &(0x7f0000000340)=@urb_type_iso={0x0, {0xc, 0x1}, 0x200, 0x140, &(0x7f0000000040)="9f30a05fc0552a3e1303544f86c2f9d0cc5defe0a9334288cafad4b66ff2d7336efa2d3ee7fa4ca204d64e4c1d473384bd37021a6851ce9d45eebdf6a82ea7edd2607879acdd75afc1aca152e3e0a6b970d0991b2c7c5e5f8cab581f07685b7ad25b275103bf7d993a01a62fe851321e200e4277b51a75cf3d8f2a2bb04c7773f26553188236ab5a3a9aa50605ac092aedda97ac6f0553dab463c3cee53e4c7bfaf709fede58b914aad9a4bbf1ddca09f7e65b1d079961411f96a04ff9fdb49668e5f3c950e6990b9776a6563a10d8cd356a7a7c8c403fe43ce0d4b98667d97de89a293995c3723117a644c1", 0xec, 0x5, 0x0, 0x73, 0x6, 0x2, &(0x7f0000000240)="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", [{0xffffffff, 0x0, 0xffff0001}, {0xf32, 0x1, 0x2}, {0x5, 0x7, 0x1ff}, {0x7fff, 0xff, 0xffffff81}, {0x6, 0x5, 0x7}, {0x7, 0x6c, 0x1}, {0x7d, 0x7ff, 0x5}, {0x97, 0x6, 0x200}, {0x8, 0xffffffff, 0x100000}, {0x0, 0x7, 0x7fffffff}, {0x6d586f1a, 0x10000, 0x3}, {0x4, 0x1000, 0x4}, {0x4, 0x2, 0x1}, {0x0, 0x0, 0xfffff801}, {0x78000000, 0xfffff2a5, 0x2}, {0x7f, 0x5}, {0xfffffffc, 0x80000000, 0x2}, {0x7, 0xb, 0x5}, {0x7, 0x7fff, 0x2}, {0x2, 0x4, 0x7ff}, {0x7727, 0x6, 0xda}, {0x41, 0x7, 0x8}, {0xfffffff9, 0x5, 0xafb4}, {0x0, 0x1000, 0x4}, {0x2, 0x3, 0x1}, {0x8, 0x7ff, 0x304}, {0x2, 0xce, 0x1}, {0x2, 0x2e22878d, 0x7}, {0x2, 0x1, 0x4}, {0x6, 0x2800, 0x3f}, {0xff, 0x0, 0x1}, {0x800, 0x0, 0xeaa}, {0x5, 0x7, 0x10001}, {0x81, 0x7, 0x40}, {0xe5b, 0x1, 0x9d}, {0x6, 0x8, 0x5}, {0xd05, 0x9}, {0x9, 0x8, 0x800}, {0x100, 0x8, 0xffffffc1}, {0x3, 0x2, 0x9}, {0x7, 0x8, 0x4}, {0x80, 0x200, 0x80000001}, {0x4, 0x200, 0x4}, {0x2, 0x1ff}, {0x3, 0x8, 0x7}, {0xb25, 0x3, 0x1}, {0x7, 0xe081747, 0xfffffffc}, {0xfff, 0x6, 0x8}, {0x81, 0x4, 0x10001}, {0x0, 0x7ff, 0xff}, {0x1, 0xd6, 0x4}, {0x401, 0x9, 0x3f}, {0x7, 0xff, 0x5}, {0xffff, 0x3, 0xd339}, {0xaf, 0x3, 0x7fffffff}, {0x7ce973f3, 0x3678, 0x7f}, {0x20, 0x800, 0x3}, {0x5, 0x80, 0x5}, {0x7, 0x7, 0x7}, {0x7, 0x0, 0x440000}, {0xc, 0x5, 0xd08}, {0xfffffffb, 0x7ff, 0x1}, {0xeb, 0x9, 0x6}, {0x80000001, 0x1, 0xfff}, {0x2, 0xfffffffb, 0x8}, {0xa22, 0x10000, 0x3ff}, {0x1, 0x6, 0x7ff}, {0x0, 0x4, 0x4}, {0x5, 0x20, 0x7fffffff}, {0x10001, 0x3, 0x7}, {0xa57e, 0x4, 0x1}, {0x5, 0x10000, 0x2}, {0x80000000, 0x8000, 0xffffffff}, {0x9, 0xffffeb18, 0x9}, {0x9, 0xffffffe0, 0x7}, {0x6, 0x3f, 0x8000}, {0xc, 0x8001, 0x9}, {0x0, 0x221e, 0xaee}, {0x9, 0x2, 0x5}, {0x6, 0x4, 0x74}, {0x0, 0x0, 0xfff}, {0x5, 0x8000, 0x6}, {0x2, 0xfc1a, 0x1}, {0x80, 0xfffffffd, 0x496b}, {0x4, 0x4, 0x7}, {0x1, 0x7fff}, {0x7fff, 0x8, 0x1ea}, {0x3ff, 0x0, 0x1}, {0x5, 0x9, 0xfffffffd}, {0x3, 0x1, 0x7fff}, {0x7, 0x40, 0x7d0}, {0x2e4, 0x4, 0x2}, {0x10001, 0x11, 0x9}, {0x8, 0xec6, 0x7}, {0x0, 0x0, 0x8}, {0x800, 0x9, 0x1}, {0x8001, 0xfffffffe, 0x9}, {0x0, 0x4, 0x80000001}, {0x0, 0xa96, 0x1}, {0x3e, 0x5, 0x4}, {0x4, 0xffffff00, 0x9}, {0x101, 0x7fffffff, 0x1ff}, {0x5, 0x2, 0x3}, {0xbae8, 0x808f, 0xffffffff}, {0xb3, 0x1, 0x9}, {0x1, 0x7, 0x1d53800}, {0x0, 0xffffffff, 0x74}, {0xfc9a, 0x3f, 0x80}, {0x401, 0x7, 0x8000}, {0x1, 0x3, 0x4}, {0x800, 0x10001, 0x3}, {0x8, 0x9}, {0x101, 0x0, 0xfffffffe}, {0x8}, {0x1, 0x7fff, 0x2}]}) r1 = syz_open_dev$usbfs(&(0x7f0000000140), 0x9, 0x800) ioctl$USBDEVFS_GET_SPEED(r1, 0x551f) ioctl$USBDEVFS_CLEAR_HALT(r1, 0x80045515, &(0x7f0000000180)={0x0, 0x1}) 06:55:22 executing program 0: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x2, 0x0) (async, rerun: 32) r1 = socket$inet(0x2, 0xa, 0x0) (rerun: 32) accept$inet(r1, 0x0, 0x0) setsockopt$inet_msfilter(r1, 0x0, 0x29, &(0x7f0000000080)=ANY=[@ANYBLOB="ac1e0101ac1e0101018c000005000000ffffffffe0000002e0000001ac1e0101ffffffff"], 0x24) r2 = syz_open_dev$usbfs(&(0x7f00000000c0), 0x7fff, 0x40) ioctl$USBDEVFS_CLEAR_HALT(r2, 0x80045515, &(0x7f0000000100)={0x3}) ioctl$USBDEVFS_SUBMITURB(r0, 0x5452, &(0x7f0000000200)=@urb_type_bulk={0x3, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) (async, rerun: 32) r3 = syz_open_dev$usbfs(&(0x7f0000000380), 0x6e665f53, 0x0) (rerun: 32) ioctl$USBDEVFS_CLEAR_HALT(r3, 0x80045515, 0x0) (async, rerun: 32) ioctl$USBDEVFS_RELEASE_PORT(r3, 0x80045519, &(0x7f0000000040)=0x200) (rerun: 32) 06:55:22 executing program 1: ioctl$USBDEVFS_SUBMITURB(0xffffffffffffffff, 0x802c550a, &(0x7f0000000000)=@urb_type_bulk={0x3, {}, 0x0, 0x20, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}) 06:55:22 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x8008551c, &(0x7f0000000340)=@urb_type_iso={0x0, {0xc, 0x1}, 0x200, 0x140, &(0x7f0000000040)="9f30a05fc0552a3e1303544f86c2f9d0cc5defe0a9334288cafad4b66ff2d7336efa2d3ee7fa4ca204d64e4c1d473384bd37021a6851ce9d45eebdf6a82ea7edd2607879acdd75afc1aca152e3e0a6b970d0991b2c7c5e5f8cab581f07685b7ad25b275103bf7d993a01a62fe851321e200e4277b51a75cf3d8f2a2bb04c7773f26553188236ab5a3a9aa50605ac092aedda97ac6f0553dab463c3cee53e4c7bfaf709fede58b914aad9a4bbf1ddca09f7e65b1d079961411f96a04ff9fdb49668e5f3c950e6990b9776a6563a10d8cd356a7a7c8c403fe43ce0d4b98667d97de89a293995c3723117a644c1", 0xec, 0x5, 0x0, 0x73, 0x6, 0x2, &(0x7f0000000240)="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", [{0xffffffff, 0x0, 0xffff0001}, {0xf32, 0x1, 0x2}, {0x5, 0x7, 0x1ff}, {0x7fff, 0xff, 0xffffff81}, {0x6, 0x5, 0x7}, {0x7, 0x6c, 0x1}, {0x7d, 0x7ff, 0x5}, {0x97, 0x6, 0x200}, {0x8, 0xffffffff, 0x100000}, {0x0, 0x7, 0x7fffffff}, {0x6d586f1a, 0x10000, 0x3}, {0x4, 0x1000, 0x4}, {0x4, 0x2, 0x1}, {0x0, 0x0, 0xfffff801}, {0x78000000, 0xfffff2a5, 0x2}, {0x7f, 0x5}, {0xfffffffc, 0x80000000, 0x2}, {0x7, 0xb, 0x5}, {0x7, 0x7fff, 0x2}, {0x2, 0x4, 0x7ff}, {0x7727, 0x6, 0xda}, {0x41, 0x7, 0x8}, {0xfffffff9, 0x5, 0xafb4}, {0x0, 0x1000, 0x4}, {0x2, 0x3, 0x1}, {0x8, 0x7ff, 0x304}, {0x2, 0xce, 0x1}, {0x2, 0x2e22878d, 0x7}, {0x2, 0x1, 0x4}, {0x6, 0x2800, 0x3f}, {0xff, 0x0, 0x1}, {0x800, 0x0, 0xeaa}, {0x5, 0x7, 0x10001}, {0x81, 0x7, 0x40}, {0xe5b, 0x1, 0x9d}, {0x6, 0x8, 0x5}, {0xd05, 0x9}, {0x9, 0x8, 0x800}, {0x100, 0x8, 0xffffffc1}, {0x3, 0x2, 0x9}, {0x7, 0x8, 0x4}, {0x80, 0x200, 0x80000001}, {0x4, 0x200, 0x4}, {0x2, 0x1ff}, {0x3, 0x8, 0x7}, {0xb25, 0x3, 0x1}, {0x7, 0xe081747, 0xfffffffc}, {0xfff, 0x6, 0x8}, {0x81, 0x4, 0x10001}, {0x0, 0x7ff, 0xff}, {0x1, 0xd6, 0x4}, {0x401, 0x9, 0x3f}, {0x7, 0xff, 0x5}, {0xffff, 0x3, 0xd339}, {0xaf, 0x3, 0x7fffffff}, {0x7ce973f3, 0x3678, 0x7f}, {0x20, 0x800, 0x3}, {0x5, 0x80, 0x5}, {0x7, 0x7, 0x7}, {0x7, 0x0, 0x440000}, {0xc, 0x5, 0xd08}, {0xfffffffb, 0x7ff, 0x1}, {0xeb, 0x9, 0x6}, {0x80000001, 0x1, 0xfff}, {0x2, 0xfffffffb, 0x8}, {0xa22, 0x10000, 0x3ff}, {0x1, 0x6, 0x7ff}, {0x0, 0x4, 0x4}, {0x5, 0x20, 0x7fffffff}, {0x10001, 0x3, 0x7}, {0xa57e, 0x4, 0x1}, {0x5, 0x10000, 0x2}, {0x80000000, 0x8000, 0xffffffff}, {0x9, 0xffffeb18, 0x9}, {0x9, 0xffffffe0, 0x7}, {0x6, 0x3f, 0x8000}, {0xc, 0x8001, 0x9}, {0x0, 0x221e, 0xaee}, {0x9, 0x2, 0x5}, {0x6, 0x4, 0x74}, {0x0, 0x0, 0xfff}, {0x5, 0x8000, 0x6}, {0x2, 0xfc1a, 0x1}, {0x80, 0xfffffffd, 0x496b}, {0x4, 0x4, 0x7}, {0x1, 0x7fff}, {0x7fff, 0x8, 0x1ea}, {0x3ff, 0x0, 0x1}, {0x5, 0x9, 0xfffffffd}, {0x3, 0x1, 0x7fff}, {0x7, 0x40, 0x7d0}, {0x2e4, 0x4, 0x2}, {0x10001, 0x11, 0x9}, {0x8, 0xec6, 0x7}, {0x0, 0x0, 0x8}, {0x800, 0x9, 0x1}, {0x8001, 0xfffffffe, 0x9}, {0x0, 0x4, 0x80000001}, {0x0, 0xa96, 0x1}, {0x3e, 0x5, 0x4}, {0x4, 0xffffff00, 0x9}, {0x101, 0x7fffffff, 0x1ff}, {0x5, 0x2, 0x3}, {0xbae8, 0x808f, 0xffffffff}, {0xb3, 0x1, 0x9}, {0x1, 0x7, 0x1d53800}, {0x0, 0xffffffff, 0x74}, {0xfc9a, 0x3f, 0x80}, {0x401, 0x7, 0x8000}, {0x1, 0x3, 0x4}, {0x800, 0x10001, 0x3}, {0x8, 0x9}, {0x101, 0x0, 0xfffffffe}, {0x8}, {0x1, 0x7fff, 0x2}]}) (async) r1 = syz_open_dev$usbfs(&(0x7f0000000140), 0x9, 0x800) ioctl$USBDEVFS_GET_SPEED(r1, 0x551f) ioctl$USBDEVFS_CLEAR_HALT(r1, 0x80045515, &(0x7f0000000180)={0x0, 0x1}) 06:55:22 executing program 1: ioctl$USBDEVFS_SUBMITURB(0xffffffffffffffff, 0x802c550a, &(0x7f0000000000)=@urb_type_bulk={0x3, {}, 0x0, 0x20, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}) 06:55:22 executing program 0: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x0) ioctl$USBDEVFS_SUBMITURB(r0, 0x5452, &(0x7f0000000200)=@urb_type_bulk={0x3, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x800, 0x501880) ioctl$USBDEVFS_CLAIMINTERFACE(r1, 0x8004550f, &(0x7f0000000080)=0x5d15) 06:55:22 executing program 0: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x0) ioctl$USBDEVFS_SUBMITURB(r0, 0x5452, &(0x7f0000000200)=@urb_type_bulk={0x3, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) (async) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x800, 0x501880) ioctl$USBDEVFS_CLAIMINTERFACE(r1, 0x8004550f, &(0x7f0000000080)=0x5d15) 06:55:22 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x40000, 0x0) r1 = ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0xa) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r1) 06:55:22 executing program 4: openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x40000, 0x0) r0 = ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0xa) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) 06:55:22 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x8008551c, &(0x7f0000000340)=@urb_type_iso={0x0, {0xc, 0x1}, 0x200, 0x140, &(0x7f0000000040)="9f30a05fc0552a3e1303544f86c2f9d0cc5defe0a9334288cafad4b66ff2d7336efa2d3ee7fa4ca204d64e4c1d473384bd37021a6851ce9d45eebdf6a82ea7edd2607879acdd75afc1aca152e3e0a6b970d0991b2c7c5e5f8cab581f07685b7ad25b275103bf7d993a01a62fe851321e200e4277b51a75cf3d8f2a2bb04c7773f26553188236ab5a3a9aa50605ac092aedda97ac6f0553dab463c3cee53e4c7bfaf709fede58b914aad9a4bbf1ddca09f7e65b1d079961411f96a04ff9fdb49668e5f3c950e6990b9776a6563a10d8cd356a7a7c8c403fe43ce0d4b98667d97de89a293995c3723117a644c1", 0xec, 0x5, 0x0, 0x73, 0x6, 0x2, &(0x7f0000000240)="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", [{0xffffffff, 0x0, 0xffff0001}, {0xf32, 0x1, 0x2}, {0x5, 0x7, 0x1ff}, {0x7fff, 0xff, 0xffffff81}, {0x6, 0x5, 0x7}, {0x7, 0x6c, 0x1}, {0x7d, 0x7ff, 0x5}, {0x97, 0x6, 0x200}, {0x8, 0xffffffff, 0x100000}, {0x0, 0x7, 0x7fffffff}, {0x6d586f1a, 0x10000, 0x3}, {0x4, 0x1000, 0x4}, {0x4, 0x2, 0x1}, {0x0, 0x0, 0xfffff801}, {0x78000000, 0xfffff2a5, 0x2}, {0x7f, 0x5}, {0xfffffffc, 0x80000000, 0x2}, {0x7, 0xb, 0x5}, {0x7, 0x7fff, 0x2}, {0x2, 0x4, 0x7ff}, {0x7727, 0x6, 0xda}, {0x41, 0x7, 0x8}, {0xfffffff9, 0x5, 0xafb4}, {0x0, 0x1000, 0x4}, {0x2, 0x3, 0x1}, {0x8, 0x7ff, 0x304}, {0x2, 0xce, 0x1}, {0x2, 0x2e22878d, 0x7}, {0x2, 0x1, 0x4}, {0x6, 0x2800, 0x3f}, {0xff, 0x0, 0x1}, {0x800, 0x0, 0xeaa}, {0x5, 0x7, 0x10001}, {0x81, 0x7, 0x40}, {0xe5b, 0x1, 0x9d}, {0x6, 0x8, 0x5}, {0xd05, 0x9}, {0x9, 0x8, 0x800}, {0x100, 0x8, 0xffffffc1}, {0x3, 0x2, 0x9}, {0x7, 0x8, 0x4}, {0x80, 0x200, 0x80000001}, {0x4, 0x200, 0x4}, {0x2, 0x1ff}, {0x3, 0x8, 0x7}, {0xb25, 0x3, 0x1}, {0x7, 0xe081747, 0xfffffffc}, {0xfff, 0x6, 0x8}, {0x81, 0x4, 0x10001}, {0x0, 0x7ff, 0xff}, {0x1, 0xd6, 0x4}, {0x401, 0x9, 0x3f}, {0x7, 0xff, 0x5}, {0xffff, 0x3, 0xd339}, {0xaf, 0x3, 0x7fffffff}, {0x7ce973f3, 0x3678, 0x7f}, {0x20, 0x800, 0x3}, {0x5, 0x80, 0x5}, {0x7, 0x7, 0x7}, {0x7, 0x0, 0x440000}, {0xc, 0x5, 0xd08}, {0xfffffffb, 0x7ff, 0x1}, {0xeb, 0x9, 0x6}, {0x80000001, 0x1, 0xfff}, {0x2, 0xfffffffb, 0x8}, {0xa22, 0x10000, 0x3ff}, {0x1, 0x6, 0x7ff}, {0x0, 0x4, 0x4}, {0x5, 0x20, 0x7fffffff}, {0x10001, 0x3, 0x7}, {0xa57e, 0x4, 0x1}, {0x5, 0x10000, 0x2}, {0x80000000, 0x8000, 0xffffffff}, {0x9, 0xffffeb18, 0x9}, {0x9, 0xffffffe0, 0x7}, {0x6, 0x3f, 0x8000}, {0xc, 0x8001, 0x9}, {0x0, 0x221e, 0xaee}, {0x9, 0x2, 0x5}, {0x6, 0x4, 0x74}, {0x0, 0x0, 0xfff}, {0x5, 0x8000, 0x6}, {0x2, 0xfc1a, 0x1}, {0x80, 0xfffffffd, 0x496b}, {0x4, 0x4, 0x7}, {0x1, 0x7fff}, {0x7fff, 0x8, 0x1ea}, {0x3ff, 0x0, 0x1}, {0x5, 0x9, 0xfffffffd}, {0x3, 0x1, 0x7fff}, {0x7, 0x40, 0x7d0}, {0x2e4, 0x4, 0x2}, {0x10001, 0x11, 0x9}, {0x8, 0xec6, 0x7}, {0x0, 0x0, 0x8}, {0x800, 0x9, 0x1}, {0x8001, 0xfffffffe, 0x9}, {0x0, 0x4, 0x80000001}, {0x0, 0xa96, 0x1}, {0x3e, 0x5, 0x4}, {0x4, 0xffffff00, 0x9}, {0x101, 0x7fffffff, 0x1ff}, {0x5, 0x2, 0x3}, {0xbae8, 0x808f, 0xffffffff}, {0xb3, 0x1, 0x9}, {0x1, 0x7, 0x1d53800}, {0x0, 0xffffffff, 0x74}, {0xfc9a, 0x3f, 0x80}, {0x401, 0x7, 0x8000}, {0x1, 0x3, 0x4}, {0x800, 0x10001, 0x3}, {0x8, 0x9}, {0x101, 0x0, 0xfffffffe}, {0x8}, {0x1, 0x7fff, 0x2}]}) (async) r1 = syz_open_dev$usbfs(&(0x7f0000000140), 0x9, 0x800) ioctl$USBDEVFS_GET_SPEED(r1, 0x551f) ioctl$USBDEVFS_CLEAR_HALT(r1, 0x80045515, &(0x7f0000000180)={0x0, 0x1}) 06:55:23 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x40000, 0x0) r1 = ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0xa) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x2) ioctl$LOOP_CTL_ADD(r2, 0x4c80, r1) r3 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040), 0x32140, 0x0) ioctl$ASHMEM_SET_SIZE(r3, 0x40087703, 0x3) 06:55:23 executing program 0: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x0) ioctl$USBDEVFS_SUBMITURB(r0, 0x5452, &(0x7f0000000200)=@urb_type_bulk={0x3, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x800, 0x501880) ioctl$USBDEVFS_CLAIMINTERFACE(r1, 0x8004550f, &(0x7f0000000080)=0x5d15) syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x0) (async) ioctl$USBDEVFS_SUBMITURB(r0, 0x5452, &(0x7f0000000200)=@urb_type_bulk={0x3, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) (async) syz_open_dev$usbfs(&(0x7f0000000040), 0x800, 0x501880) (async) ioctl$USBDEVFS_CLAIMINTERFACE(r1, 0x8004550f, &(0x7f0000000080)=0x5d15) (async) 06:55:23 executing program 4: openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x40000, 0x0) r0 = ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0xa) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) 06:55:23 executing program 1: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_RELEASEINTERFACE(r0, 0x80045510, &(0x7f0000000040)) ioctl$USBDEVFS_SUBMITURB(r0, 0x802c550a, &(0x7f0000000200)=@urb_type_bulk={0x3, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 06:55:23 executing program 4: openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x40000, 0x0) r0 = ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0xa) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) 06:55:23 executing program 1: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_RELEASEINTERFACE(r0, 0x80045510, &(0x7f0000000040)) (async) ioctl$USBDEVFS_RELEASEINTERFACE(r0, 0x80045510, &(0x7f0000000040)) ioctl$USBDEVFS_SUBMITURB(r0, 0x802c550a, &(0x7f0000000200)=@urb_type_bulk={0x3, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 06:55:23 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) r1 = socket$netlink(0x10, 0x3, 0x4) sendmsg$TCPDIAG_GETSOCK(r1, &(0x7f0000002840)={0x0, 0x0, &(0x7f0000002800)={&(0x7f00000003c0)={0x1e70, 0x12, 0x803, 0x0, 0x0, {}, [@INET_DIAG_REQ_BYTECODE={0xd, 0x1, "9c1b9c02c979f96371"}, @INET_DIAG_REQ_BYTECODE={0x1001, 0x1, "85ec4d54ee6d363bfbee85a21c660f46b45e8a9e2bbb3f9bbdb0163113e72640575c4d82917ed1f5082d598337562b98943167d99e8a5069c061cd8e803f3a99a8e220be633353bc6ceebe72f86071f0e2e0707bb9ea37da2870969f9bce6fe33118dcdea53a985bf57ceb481927319821dab6142e3d88c03eeb72dac7ce8ff9572492964d947829f94229c8ea7e0dc7bc906449bf9929deacb9f5d1c5f0414ad3961de7fee9355cce985ff0fc8d723de5a532cc4232c65f067266061b8105d582b1f222d832c41ccfa608424e676255b72ba041e77e656d4b87d140351c8eeb138faa136f898251f196db8c568d50820cb3844045fe51bba9156a147f8502ca9c5046701ef46a9cfb0d0e0aa324a210287a9f7c9f3bee21ae3dc628078326cef59b6babe91d5933c1f3317eed135b410d7da22bc2ec399e4d15a3a1e82ca2abff7dfce6d961be8836921fd952a2f5f0d5f74f39e51f527256c643608fccb66075d6d93c9e6661fbf1c7f6145bb7f2ca573b4e126fde7739dd97788fd9ac2b399f96c730e0a28e1f9e9859b85bdd2277bf93b92dae0d21861264e8c8b45e1e34837d7748f9f39ae56dc291f298cd300f710eda1e347832b4753edcac158f0dc2d906cc0af8d51766da5a45bbb594d6a05148b3f0fd2df43c6f5552d09ff2596500eb4031fcdfc0e8d9ec77993228c5c5029a53ed1ed5b6741a04f0c3258946abca964c393809e747bb405e767ef30b133d7b2e149232bbaedfac4f591b15ae2f928da582cb01a276cdb5c95444bf9d87967abe7519e91cff12043be1d779c6a464d2751e7a44412949ef4d60d9f1baab471a1afeb0525a22fa6b7baecac8837adc224c3da71b5b4d61dc6960c69f136bbfff7505f7de021eac08f909fb82f84927a5bedf9141d47f67371bb0e60544bf6a076f66bb300b4f806b27daf89576cb5adf521c6002c98d74d0d7e128264e0015f3f9303331cec35503622dc007b161274ded7f58ccd427306086f5d346282e9c8f1afb48819555514c350c8a448e2dc4e3df01847556ed7f991e3c4fadba16f6643500cb26be6ca1cfbd3d8a7372985c1f8152d75331840d79f5ec5097c72b50fd628e6bfe69eeb9224679f884c98ec5309e0647574f8b54e7ef9ec07d6b655b32ce8d01316fedfd9ef6ff71d2aab116418e2efe9b3b0d96ed91916f27fcd258e812bb1dccffea3eb303cde6dcbb56fb8e8b39f31aef552f09761ed36dd9abf57b9feb79953d098b270470e3ec6d08062bab5e225012c411de86e61c56c405c7c9d081cccbdf22950bd904dc88b0443d66ee49c879b942e19f447a7cee864bc2a919373bb3742054b83067addf86c3d7ee2f9797942dc08a4b17bde5b2d2099d76605c5ecf06b1bfa9f060a2fe7fc8c464c0fa9dd6a033eeab0591e9acbc4dc17d108e0fa5fb69516761d39b6de23d946dad2ff4650b2b2f33c2550aba83e4a7363eb6cb0908a6c2e9250a7c5d59a0311d075a6483654349ffddfc0ecf241ad679209c333b93bfe1a7b88f901ae36c509c63cb6cc11949d9753828283798ad4b6a2fac03b410551286b1b71bb5d2c768a4214bc40413bb2b9d2a82c0f1f0f9d229a31d6baec9ce027f629134819d6b389bfe6aed1b0b0abe557b482f81730483c5a0c4483f5024c84cbf5d60e2fb28d83ce84bc50df42911e26bb3f59634f85f58659e9b229bb4ad5c4e0f42ff68626e0fe7c0539601d5fcbd18f606c14a46c34cf3277699b2d9c88355133fdefcfaae5b56f19e324f6ee9da59d665e7bee9d034cb7b2ba925209f1685fe276078172d139a7190d8337039294889f9e96ef7318d9ee160c228612e9161835dbc1cab3194b596839f31390749dff851a58bf6304c1950dbfad8b6907e0b68419cfde8fdb67aa5118a281258ffe4073c4a30dad1869c2ef12b2ebb1896b2c39b9acff4ccccbd060034391dcf0873024ee2e123c4cb338d492df2cddd72162306897fb529702fea74ba3a1eb6f11d230fa0e7f89d0728ff9b5c0908a9b454ed1bda328a4511f49f60844de6125ade2f855db55410ebf70517c5f832dd15af528fb1ed2f86ea9158b98b77cbbd247b227d1baa5dde0dfa605590a08cfd002efce373ca51726eab1677885ec4b74f6a716a03e3c3c37fdd23bc7d54e579c2de365f162bfc50be7d93f4e4eb07c0e49002ecadac3ac0464bd62505f887286a90f66880ad46e6612535768d82b3ad464f463630c5ba2292f113668951f0e2f7a981f7d06d505bf047b6267c2ec762950ff515feeabe660e44894b0df37a7ab9d27f751f88c5487eb59094fd565defdbecbd7d1f7e772a0b83881008dbfc07f412f05fa8821341cc269810af713bccbb6e24f22aa4562f4a0c6326087a1bc56e80ae3ef30c389401d295c1b5a5e27de2dc7d24b3877ef575bdf75370da606dc311f9e558241ef83236bb092a8123d00797704380abbf592a07fd07825a794a1fb6afa41a87e3f8dc78e77c619b5fe179495e7d57784d161233f456c7ac261077adcb54652bbc00accaa230b0a766c8e575d4cd930e8a55b65d19b68f9899630ef3d302550f1b4aa7069e6d26dbf545416196b8b2c77193d9889bcf28674b3702598f24322a741678848f46b5f73aca3cce0e68b6ba3d84276b73604b9ccddde79337558d1517d20180d4627f7d2da4c242cc69e316ba52e65f1653bd5e85ef505e4a799acbb00bdfa106274142e245e6ed6495eb9fb3605a1c0292e96501bad824afc1ef13a10ca9f01eed4f1ad21baa75bdf96fcdddbe3130c4c0ef70be7930a57817f4a7544bb27bbe2c8d8ea968e0c55fdbc67ce8ea2bbf80e9fcf85f96e62a9dfac336d43089157cb841a1106b6743c54f8b1324ea21dc14448569451336666439afe2be5e0ab19378a3aebe80eea632290ab93ca7f7b2e26829e3847b77370586bac29575e60e17a42d5a56bedf3170eeacb2ed2844085c2f0db2d8f6733e450a820439e03ef000232dec1f9aa274c39208f6eef3f39b410d9a9a71fda9722d2493b20bfc01bb60574c525db16dea80e401c8d55d1dd8a5d95b07a69734b9aa4c1729fc1c781cd5a4d6700ccc3f97947a3e54ed43fdf2078f793124daef68e435023cfba3a811427ec1b0c896c9cd39adabae79b050333b2be0ca948bed29ebdc8234165c74c2c4c1174d609966ed2398966bd160ce3a8cc60889959d7bd125085edabeb410c3cf2f5a37c41b040b1cc79e19651f3cec3b84325d677eec1681b95cc4a825bdb69dc9e968e727f0b38a17c12ed7331c02050352031b8292e88b8a4d29b26eddb3bc0ce94db38b12e87a8631791cbf7de41699ffa7a476748ed58b7590abcaa12c84bdcb6c94513fd2bb9c83cf1a4b133246c8d054fd96476dc929bec4f69abe95ccf2b4006256727e40c0331e07c1591a71eff0e5b66ba540ecd5f31c127d64bc45ccb5504ce8f8cb715d1388bcd6a414ecfe0b21a80e25cebbc6a4b36a66c88d39bd87b3fc60a8fed09aef40c0230f1b718e1b8f8daf2a0122c7c3c2807b312596baa90d6e57ceb993cef33c87fcbc8a1581209d3cb0f7b067be634777b101d462cd08eace7c8adf6611a8113a18d11356b8955cf19c3fb4cc0cda40250e0f5bd98b9f047811f4aa0ff0863983d95681778c3aa8e217cc69cb7ebe167989afda2f9292fb6cfc48f2c352063613de2d5e9cb80549e39ab6b0e23ebc06aaa5d4f99c573b0f130cb93ade609e9a7bcda7b6700a271080cbb8a40b6b7e412e25fda6abea768fd5ec3d7997d3e3fa6bee4ca0fef6d6397cda8d7804fa83c894eed070bf9f4a46a3959d162f9888e1455786c1ec537f8d46c0263dd6f4624c68fbc7a5381aeb2bbb4a83e961c4bd92a75d01099ad357f8b1a6d3d522644dfb3cc2de6f72bde07841fb99aae5249099209e53d6fff1c14fa5a2117906aaf8f058ff19922febf22c697b478b2aa512508b74a30964dbff2dc4bee46f14694da3b5e32a139218695df2bb6a796278ba54f076424a86ba553490653adf8792259c96f79c1a438fda9a414805f00162e9907647c33ba1371c2898e7ce6dfa222cc4eb24a1fd8df7f0ca64e8a5d37780582125e691107eceb5a28eff233af33a2546c0388445805a730f37717e42bbcc9955744b2803aafdee921167d4c804e5fc956949a108ade8448ac58fc308fe35749f8811d2e70abf47efbc182472a1a52934ace7830b7fb7c013df8692e1da59c47c987b2e0d6d086ee9c102b84c121f88b32d65f3cefc4fd4ba4f23241396568354bd96dd505f62a397e4e63b8580d841a217855b99a2b4420e389d6e83d71932b5c7fd1306903a0c9b3b8e4a0352cf597db65301ddc6eb8ffc8e6dbcb50904aa0ec7c4fe9ca1ada7f60d1dbc8d41253b3ad0229bd80530c7c38c5e1fcdae7acfac995282b19c632c164b39f96cae64aa6041771b2609aa21eba423c7347fa33367ddbc37f8b62353e267a49c72df52c07e3034426b9b1ed32db382a9332b7a74a82016bafbd2ba02552704da4ac17ae212de242557963cf85a8f5a59981a0b1c107396a73ec1b23128247b3fa546ba3b1e455c0a6f3f45ce5afc755203d3403fa401539df415a7c841de972a9e4d599af2a29622d9f7e49844d5fe7c4f20f61af4a17a06f2c5d2885195dc9c280e191e17438e069df0a9a9472d81fd6a1e08ba87fa9d4647ec224189ce5edb447739669bb08ea24b207c65c8e5be78abc7106200dbb85d9cb01ee440a26143df195600e6d1a634715a8226e8f1a6c8a2b1d1be5bd923f89acac7806c669ed72578a66b27abb3e4b19d8f90959293c52412c1b536d5e5807f0208d8e6a98992db9ecc47e94a08d0c9101f80469ed11dffea99a7b1f4737fc825f0526492ee6231c550170aa0bc31fd8aac55449e2cf4dcacab0b595aa260c78eb26491425dc754ba47cf073415943535b17d9510ca4eb7259edc6005d76d893ef4e85d5a1fb0453df88700dc85991d4e88b6ffb25ddae66ae6ae0f3dca9accd7e676aaabaac780341c8c833e4382b3da095d4de058e49a5e82b9a7281575115c3798655f51f49f10473c676e7ea8c6ffac3521106140b69d3cb6fe17df9c10548e6527ca9d0a8bcb50c38f65cf8759eb85d83364c775d9359cabbd7caef693d4fd190bcf2d2c487bf374d5e134bc9b4f0dd5b80ad421ae3fab5b3225beb975ecaa2acb24dd9618f36b3f6c89d7c2476b91056654653e9ce048db0eae48a47177b8168e635a5e5e2426d477d3904b84f9edb4dfc2b2bc10ab94fcb15d226ecd61b6c3a17d9799a341570c4cd176c96972b09d09b5099246f7eeafadc46b0e4a598993e439ad3d2d09e61c0c95474208a711219be00453dcc0b2a0a71696816bd851dedd048da79b614df98d3463223009cf4006040542e28b502c001ae58144660b3181c81ffd2b559aa1fe043284b4562b9294dbb155c7df4feb3dba0b72be6dc7ed14b83aff8d0f382e589439b894f4ecd33b2647ed2a81e54565096cc14c2c73d76e1000ef83f354b3ee4c834be73c7d44478dcc984b50357a6e72287ca9bd9196a417e61899e7a5460cc1c80ad9f2527310899c885e28566c1a25e773736550d2a7c8974457f3e02eacb4e2bafef49ea007352cfd1030e282ad9acc2a154b79591a7d9ad834b717bca86442d40c5df14c553443bcac64f68de13151f5cb724a96479347e530133ed7f9b595351f6ad9cf31b557ac27c7b0971180141068f9fa76b4894235182cd7bd406347940b172e957c0af86a54466ca75330942bb0e36e618264cb59fd2a5b"}, @INET_DIAG_REQ_BYTECODE={0xa5, 0x1, "424c17d623ca31faa7d571bcc3a93f88edb48bf792bf664fc8c35328c04723c7a07192206974be476c232e068f7a6b967ee6edc722470d6983a88c1f9b5689c1b7c6f59b4e06acfbdc04c194a81ed5e2a499816ba8938d9ce8ec1bee7c55f3b2a605579db6d59da35eeb5dd85e68577a3dad932753afece6d2eaac415ef93e84366e3d7179f49e9eab5bab768efb0ea96f3561747803a4b863e257687922213164"}, @INET_DIAG_REQ_BYTECODE={0x15, 0x1, "4ae2671db7c0b687bd7032cb5bb018a363"}, @INET_DIAG_REQ_BYTECODE={0xb1, 0x1, "ebacd1e4c578ee4d85425a06add78068338c13b6d04d9b286ba1cb990955add939664553e1ad29881a63d115f6c2dacf1314a49babab53b878c9f9fe9d608177178cf61251ebd9091dcc24fa744089c7dbef8944e009e73e90ee187a63d5cada68f10767b745600e665f44bf01112501cb2d192e81b76d4b7ccf455f105fba719a8429d05273740d84692ad186a7870b8ad7c420f0e8a7abff0f8976ebd3b169bd55ee484bf87ecb57f35eda5c"}, @INET_DIAG_REQ_BYTECODE={0xc99, 0x1, "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"}]}, 0x1e70}}, 0x0) r2 = syz_open_dev$usbfs(&(0x7f0000000380), 0x6e665f53, 0x0) ioctl$USBDEVFS_CLEAR_HALT(r2, 0x80045515, 0x0) r3 = syz_open_dev$usbfs(&(0x7f0000000100), 0x6, 0x40000) ioctl$USBDEVFS_GET_CAPABILITIES(r3, 0x8004551a, &(0x7f0000000140)) ioctl$USBDEVFS_BULK(r2, 0xc0185502, &(0x7f00000000c0)={{{0x6}}, 0x46, 0x0, &(0x7f0000000040)="9a785a87411283c3296e05404e09f58bf7a7b6724a7970a0d857a4628d2cf5fc8b48fc48f7fe3d136dfda80f0357ed33bd8b16a3c10c79c4813224be4e3b3adc5da9a5ef4e15"}) ioctl$USBDEVFS_SUBMITURB(r0, 0x8008551c, &(0x7f0000000200)=@urb_type_bulk={0x3, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 06:55:23 executing program 0: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x0) r1 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040), 0x26240, 0x0) socketpair(0x21, 0x6, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f00000000c0)={{{@in=@private, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@private0}}}, &(0x7f0000000240)=0xe8) r5 = socket(0x0, 0x2, 0x380) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r2, 0x89f0, &(0x7f00000001c0)={'syztnl1\x00', &(0x7f0000000280)={'ip6_vti0\x00', r4, 0x29, 0xbb, 0x8, 0x1ff, 0x4, @remote, @private2={0xfc, 0x2, '\x00', 0x1}, 0x80, 0x10, 0x3, 0x8}}) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r5, 0x89f0, &(0x7f0000000380)={'ip6tnl0\x00', &(0x7f0000000300)={'ip6_vti0\x00', r6, 0x2f, 0x2, 0x9, 0x9, 0x8, @remote, @dev={0xfe, 0x80, '\x00', 0xb}, 0x20, 0x700, 0x3f, 0x3}}) ioctl$ASHMEM_GET_PIN_STATUS(r1, 0x7709, 0x0) ioctl$USBDEVFS_SUBMITURB(r0, 0x5452, &(0x7f0000000200)=@urb_type_bulk={0x3, {}, 0x0, 0x0, 0x0, 0x0, 0x628, 0x0, 0x0, 0x0, 0x0, 0x0}) 06:55:23 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x40000, 0x0) r1 = ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0xa) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r1) 06:55:23 executing program 1: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_RELEASEINTERFACE(r0, 0x80045510, &(0x7f0000000040)) (async) ioctl$USBDEVFS_RELEASEINTERFACE(r0, 0x80045510, &(0x7f0000000040)) ioctl$USBDEVFS_SUBMITURB(r0, 0x802c550a, &(0x7f0000000200)=@urb_type_bulk={0x3, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 06:55:23 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x802c550a, &(0x7f0000000140)=@urb_type_iso={0x0, {0x6}, 0x101, 0x1, &(0x7f0000000080)="1cb2bd03b5706bb872944e8c91006b5f437f21f0df51edb451ce867e7cc07482da352683b3fb8af7554195f3983bb3ddf94414e477191fd500fddd674deada6d3dc55638beb49ed739d1", 0x4a, 0x6, 0x20000000, 0x4b, 0x2, 0x1, &(0x7f0000000100)="5cf209fef7de04f14a1dc41da8d1a9b349f810a49f5cc02f98abccd91ac755550e7c0478127d611c90fabf4ffbb4c7afb16bbb4bc05e7fc7d9a6798c4930ca", [{0x8, 0x5, 0x100}, {0x40, 0x5, 0x3}, {0x8000, 0x5, 0x1}, {0x8, 0x2, 0x7f}, {0x9, 0x0, 0x4d}, {0x9, 0x8b88, 0x1}, {0x81, 0x5, 0x3ff}, {0xffffffff, 0xfffffff7, 0x5}, {0x7fffffff, 0x417, 0x40}, {0x401, 0x1, 0x950}, {0x6, 0xfff, 0x4}, {0x0, 0x8, 0x8}, {0xcd6fcee5, 0x4, 0xffffffff}, {0x7, 0x9, 0x9}, {0x3230fea4, 0x1ff, 0x401}, {0xf3d, 0xad, 0x2}, {0x7, 0x5, 0x8}, {0x800, 0xfffffffd, 0xff}, {0x5, 0x3, 0x7}, {0x7fffffff, 0x101, 0x1ff}, {0x11bb7e2, 0xe52}, {0x1, 0xffffffff, 0x7}, {0x3, 0x0, 0x4}, {0x1f, 0x80, 0x6}, {0x80, 0x9a, 0x1}, {0x3, 0xffff, 0xffff}, {0x81, 0x3, 0x8}, {0x0, 0x8, 0x400}, {0xfffffe01, 0x100, 0xf55}, {0x10001, 0xff, 0x7}, {0x2, 0x80000001, 0x7}, {0x4, 0xc708, 0x3ff}, {0x1, 0x7, 0x3}, {0x339, 0x8, 0x2}, {0x101, 0xffffffff, 0x10001}, {0x3, 0xff, 0x3}, {0x6b, 0xb0f, 0x5}, {0x7ff, 0x9, 0x7de5}, {0x80000001, 0x7f, 0x2}, {0x8, 0x6}, {0x3, 0x8001, 0x3ff}, {0x4, 0x5, 0x5d}, {0x75d23712, 0x8, 0x6}, {0x8, 0xde, 0x42e}, {0xea09, 0x81}, {0x9, 0x2, 0x3}, {0x2e47, 0x8, 0x81}, {0x3, 0x6, 0x7ff}, {0x7, 0x8, 0xfffff979}, {0x1f, 0x8, 0x1f}, {0x200, 0x7, 0x3}, {0x6897bc41, 0x7, 0x3}, {0x9, 0x80000000, 0x9}, {0x1ff, 0x1f, 0xffff}, {0x54, 0x9, 0x81}, {0xffffffff, 0x9cea, 0x3}, {0x7f, 0x7f, 0x3}, {0x800, 0x9, 0x6}, {0x5, 0xc46, 0x8000}, {0x0, 0x3, 0x8}, {0x2, 0x3}, {0x430, 0x2, 0x1ff}, {0x7ff, 0x20, 0x3}, {0x3, 0x7, 0xb06}, {0x6, 0x4, 0x2}, {0x401, 0x4, 0x9}, {0x5, 0x7, 0x3}, {0x5, 0x5, 0x1ff}, {0x10000, 0x4, 0x9}, {0x3f, 0xed71, 0xf549}, {0x20, 0x101, 0x4}, {0xfffffffe, 0xbe6a, 0x8000}, {0x9, 0x9, 0x3}, {0x2, 0x5, 0x2}, {0x3, 0x5, 0x4}]}) syz_open_dev$usbfs(&(0x7f0000000040), 0x80000001, 0x940) 06:55:23 executing program 0: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x0) r1 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040), 0x26240, 0x0) socketpair(0x21, 0x6, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f00000000c0)={{{@in=@private, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@private0}}}, &(0x7f0000000240)=0xe8) r5 = socket(0x0, 0x2, 0x380) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r2, 0x89f0, &(0x7f00000001c0)={'syztnl1\x00', &(0x7f0000000280)={'ip6_vti0\x00', r4, 0x29, 0xbb, 0x8, 0x1ff, 0x4, @remote, @private2={0xfc, 0x2, '\x00', 0x1}, 0x80, 0x10, 0x3, 0x8}}) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r5, 0x89f0, &(0x7f0000000380)={'ip6tnl0\x00', &(0x7f0000000300)={'ip6_vti0\x00', r6, 0x2f, 0x2, 0x9, 0x9, 0x8, @remote, @dev={0xfe, 0x80, '\x00', 0xb}, 0x20, 0x700, 0x3f, 0x3}}) ioctl$ASHMEM_GET_PIN_STATUS(r1, 0x7709, 0x0) ioctl$USBDEVFS_SUBMITURB(r0, 0x5452, &(0x7f0000000200)=@urb_type_bulk={0x3, {}, 0x0, 0x0, 0x0, 0x0, 0x628, 0x0, 0x0, 0x0, 0x0, 0x0}) syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x0) (async) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040), 0x26240, 0x0) (async) socketpair(0x21, 0x6, 0x0, &(0x7f0000000080)) (async) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f00000000c0)={{{@in=@private, @in=@broadcast}}, {{@in6=@private0}}}, &(0x7f0000000240)=0xe8) (async) socket(0x0, 0x2, 0x380) (async) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r2, 0x89f0, &(0x7f00000001c0)={'syztnl1\x00', &(0x7f0000000280)={'ip6_vti0\x00', r4, 0x29, 0xbb, 0x8, 0x1ff, 0x4, @remote, @private2={0xfc, 0x2, '\x00', 0x1}, 0x80, 0x10, 0x3, 0x8}}) (async) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r5, 0x89f0, &(0x7f0000000380)={'ip6tnl0\x00', &(0x7f0000000300)={'ip6_vti0\x00', r6, 0x2f, 0x2, 0x9, 0x9, 0x8, @remote, @dev={0xfe, 0x80, '\x00', 0xb}, 0x20, 0x700, 0x3f, 0x3}}) (async) ioctl$ASHMEM_GET_PIN_STATUS(r1, 0x7709, 0x0) (async) ioctl$USBDEVFS_SUBMITURB(r0, 0x5452, &(0x7f0000000200)=@urb_type_bulk={0x3, {}, 0x0, 0x0, 0x0, 0x0, 0x628, 0x0, 0x0, 0x0, 0x0, 0x0}) (async) 06:55:23 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) r1 = socket$netlink(0x10, 0x3, 0x4) sendmsg$TCPDIAG_GETSOCK(r1, &(0x7f0000002840)={0x0, 0x0, &(0x7f0000002800)={&(0x7f00000003c0)={0x1e70, 0x12, 0x803, 0x0, 0x0, {}, [@INET_DIAG_REQ_BYTECODE={0xd, 0x1, "9c1b9c02c979f96371"}, @INET_DIAG_REQ_BYTECODE={0x1001, 0x1, "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"}, @INET_DIAG_REQ_BYTECODE={0xa5, 0x1, "424c17d623ca31faa7d571bcc3a93f88edb48bf792bf664fc8c35328c04723c7a07192206974be476c232e068f7a6b967ee6edc722470d6983a88c1f9b5689c1b7c6f59b4e06acfbdc04c194a81ed5e2a499816ba8938d9ce8ec1bee7c55f3b2a605579db6d59da35eeb5dd85e68577a3dad932753afece6d2eaac415ef93e84366e3d7179f49e9eab5bab768efb0ea96f3561747803a4b863e257687922213164"}, @INET_DIAG_REQ_BYTECODE={0x15, 0x1, "4ae2671db7c0b687bd7032cb5bb018a363"}, @INET_DIAG_REQ_BYTECODE={0xb1, 0x1, "ebacd1e4c578ee4d85425a06add78068338c13b6d04d9b286ba1cb990955add939664553e1ad29881a63d115f6c2dacf1314a49babab53b878c9f9fe9d608177178cf61251ebd9091dcc24fa744089c7dbef8944e009e73e90ee187a63d5cada68f10767b745600e665f44bf01112501cb2d192e81b76d4b7ccf455f105fba719a8429d05273740d84692ad186a7870b8ad7c420f0e8a7abff0f8976ebd3b169bd55ee484bf87ecb57f35eda5c"}, @INET_DIAG_REQ_BYTECODE={0xc99, 0x1, "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"}]}, 0x1e70}}, 0x0) r2 = syz_open_dev$usbfs(&(0x7f0000000380), 0x6e665f53, 0x0) ioctl$USBDEVFS_CLEAR_HALT(r2, 0x80045515, 0x0) r3 = syz_open_dev$usbfs(&(0x7f0000000100), 0x6, 0x40000) ioctl$USBDEVFS_GET_CAPABILITIES(r3, 0x8004551a, &(0x7f0000000140)) ioctl$USBDEVFS_BULK(r2, 0xc0185502, &(0x7f00000000c0)={{{0x6}}, 0x46, 0x0, &(0x7f0000000040)="9a785a87411283c3296e05404e09f58bf7a7b6724a7970a0d857a4628d2cf5fc8b48fc48f7fe3d136dfda80f0357ed33bd8b16a3c10c79c4813224be4e3b3adc5da9a5ef4e15"}) (async) ioctl$USBDEVFS_SUBMITURB(r0, 0x8008551c, &(0x7f0000000200)=@urb_type_bulk={0x3, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 06:55:23 executing program 1: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x802c550a, &(0x7f0000000200)=@urb_type_bulk={0x3, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0}) 06:55:23 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x802c550a, &(0x7f0000000140)=@urb_type_iso={0x0, {0x6}, 0x101, 0x1, &(0x7f0000000080)="1cb2bd03b5706bb872944e8c91006b5f437f21f0df51edb451ce867e7cc07482da352683b3fb8af7554195f3983bb3ddf94414e477191fd500fddd674deada6d3dc55638beb49ed739d1", 0x4a, 0x6, 0x20000000, 0x4b, 0x2, 0x1, &(0x7f0000000100)="5cf209fef7de04f14a1dc41da8d1a9b349f810a49f5cc02f98abccd91ac755550e7c0478127d611c90fabf4ffbb4c7afb16bbb4bc05e7fc7d9a6798c4930ca", [{0x8, 0x5, 0x100}, {0x40, 0x5, 0x3}, {0x8000, 0x5, 0x1}, {0x8, 0x2, 0x7f}, {0x9, 0x0, 0x4d}, {0x9, 0x8b88, 0x1}, {0x81, 0x5, 0x3ff}, {0xffffffff, 0xfffffff7, 0x5}, {0x7fffffff, 0x417, 0x40}, {0x401, 0x1, 0x950}, {0x6, 0xfff, 0x4}, {0x0, 0x8, 0x8}, {0xcd6fcee5, 0x4, 0xffffffff}, {0x7, 0x9, 0x9}, {0x3230fea4, 0x1ff, 0x401}, {0xf3d, 0xad, 0x2}, {0x7, 0x5, 0x8}, {0x800, 0xfffffffd, 0xff}, {0x5, 0x3, 0x7}, {0x7fffffff, 0x101, 0x1ff}, {0x11bb7e2, 0xe52}, {0x1, 0xffffffff, 0x7}, {0x3, 0x0, 0x4}, {0x1f, 0x80, 0x6}, {0x80, 0x9a, 0x1}, {0x3, 0xffff, 0xffff}, {0x81, 0x3, 0x8}, {0x0, 0x8, 0x400}, {0xfffffe01, 0x100, 0xf55}, {0x10001, 0xff, 0x7}, {0x2, 0x80000001, 0x7}, {0x4, 0xc708, 0x3ff}, {0x1, 0x7, 0x3}, {0x339, 0x8, 0x2}, {0x101, 0xffffffff, 0x10001}, {0x3, 0xff, 0x3}, {0x6b, 0xb0f, 0x5}, {0x7ff, 0x9, 0x7de5}, {0x80000001, 0x7f, 0x2}, {0x8, 0x6}, {0x3, 0x8001, 0x3ff}, {0x4, 0x5, 0x5d}, {0x75d23712, 0x8, 0x6}, {0x8, 0xde, 0x42e}, {0xea09, 0x81}, {0x9, 0x2, 0x3}, {0x2e47, 0x8, 0x81}, {0x3, 0x6, 0x7ff}, {0x7, 0x8, 0xfffff979}, {0x1f, 0x8, 0x1f}, {0x200, 0x7, 0x3}, {0x6897bc41, 0x7, 0x3}, {0x9, 0x80000000, 0x9}, {0x1ff, 0x1f, 0xffff}, {0x54, 0x9, 0x81}, {0xffffffff, 0x9cea, 0x3}, {0x7f, 0x7f, 0x3}, {0x800, 0x9, 0x6}, {0x5, 0xc46, 0x8000}, {0x0, 0x3, 0x8}, {0x2, 0x3}, {0x430, 0x2, 0x1ff}, {0x7ff, 0x20, 0x3}, {0x3, 0x7, 0xb06}, {0x6, 0x4, 0x2}, {0x401, 0x4, 0x9}, {0x5, 0x7, 0x3}, {0x5, 0x5, 0x1ff}, {0x10000, 0x4, 0x9}, {0x3f, 0xed71, 0xf549}, {0x20, 0x101, 0x4}, {0xfffffffe, 0xbe6a, 0x8000}, {0x9, 0x9, 0x3}, {0x2, 0x5, 0x2}, {0x3, 0x5, 0x4}]}) syz_open_dev$usbfs(&(0x7f0000000040), 0x80000001, 0x940) 06:55:23 executing program 0: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x0) r1 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040), 0x26240, 0x0) socketpair(0x21, 0x6, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f00000000c0)={{{@in=@private, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@private0}}}, &(0x7f0000000240)=0xe8) r5 = socket(0x0, 0x2, 0x380) (async) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r2, 0x89f0, &(0x7f00000001c0)={'syztnl1\x00', &(0x7f0000000280)={'ip6_vti0\x00', r4, 0x29, 0xbb, 0x8, 0x1ff, 0x4, @remote, @private2={0xfc, 0x2, '\x00', 0x1}, 0x80, 0x10, 0x3, 0x8}}) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r5, 0x89f0, &(0x7f0000000380)={'ip6tnl0\x00', &(0x7f0000000300)={'ip6_vti0\x00', r6, 0x2f, 0x2, 0x9, 0x9, 0x8, @remote, @dev={0xfe, 0x80, '\x00', 0xb}, 0x20, 0x700, 0x3f, 0x3}}) ioctl$ASHMEM_GET_PIN_STATUS(r1, 0x7709, 0x0) ioctl$USBDEVFS_SUBMITURB(r0, 0x5452, &(0x7f0000000200)=@urb_type_bulk={0x3, {}, 0x0, 0x0, 0x0, 0x0, 0x628, 0x0, 0x0, 0x0, 0x0, 0x0}) 06:55:23 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x40000, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) 06:55:23 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x802c550a, &(0x7f0000000140)=@urb_type_iso={0x0, {0x6}, 0x101, 0x1, &(0x7f0000000080)="1cb2bd03b5706bb872944e8c91006b5f437f21f0df51edb451ce867e7cc07482da352683b3fb8af7554195f3983bb3ddf94414e477191fd500fddd674deada6d3dc55638beb49ed739d1", 0x4a, 0x6, 0x20000000, 0x4b, 0x2, 0x1, &(0x7f0000000100)="5cf209fef7de04f14a1dc41da8d1a9b349f810a49f5cc02f98abccd91ac755550e7c0478127d611c90fabf4ffbb4c7afb16bbb4bc05e7fc7d9a6798c4930ca", [{0x8, 0x5, 0x100}, {0x40, 0x5, 0x3}, {0x8000, 0x5, 0x1}, {0x8, 0x2, 0x7f}, {0x9, 0x0, 0x4d}, {0x9, 0x8b88, 0x1}, {0x81, 0x5, 0x3ff}, {0xffffffff, 0xfffffff7, 0x5}, {0x7fffffff, 0x417, 0x40}, {0x401, 0x1, 0x950}, {0x6, 0xfff, 0x4}, {0x0, 0x8, 0x8}, {0xcd6fcee5, 0x4, 0xffffffff}, {0x7, 0x9, 0x9}, {0x3230fea4, 0x1ff, 0x401}, {0xf3d, 0xad, 0x2}, {0x7, 0x5, 0x8}, {0x800, 0xfffffffd, 0xff}, {0x5, 0x3, 0x7}, {0x7fffffff, 0x101, 0x1ff}, {0x11bb7e2, 0xe52}, {0x1, 0xffffffff, 0x7}, {0x3, 0x0, 0x4}, {0x1f, 0x80, 0x6}, {0x80, 0x9a, 0x1}, {0x3, 0xffff, 0xffff}, {0x81, 0x3, 0x8}, {0x0, 0x8, 0x400}, {0xfffffe01, 0x100, 0xf55}, {0x10001, 0xff, 0x7}, {0x2, 0x80000001, 0x7}, {0x4, 0xc708, 0x3ff}, {0x1, 0x7, 0x3}, {0x339, 0x8, 0x2}, {0x101, 0xffffffff, 0x10001}, {0x3, 0xff, 0x3}, {0x6b, 0xb0f, 0x5}, {0x7ff, 0x9, 0x7de5}, {0x80000001, 0x7f, 0x2}, {0x8, 0x6}, {0x3, 0x8001, 0x3ff}, {0x4, 0x5, 0x5d}, {0x75d23712, 0x8, 0x6}, {0x8, 0xde, 0x42e}, {0xea09, 0x81}, {0x9, 0x2, 0x3}, {0x2e47, 0x8, 0x81}, {0x3, 0x6, 0x7ff}, {0x7, 0x8, 0xfffff979}, {0x1f, 0x8, 0x1f}, {0x200, 0x7, 0x3}, {0x6897bc41, 0x7, 0x3}, {0x9, 0x80000000, 0x9}, {0x1ff, 0x1f, 0xffff}, {0x54, 0x9, 0x81}, {0xffffffff, 0x9cea, 0x3}, {0x7f, 0x7f, 0x3}, {0x800, 0x9, 0x6}, {0x5, 0xc46, 0x8000}, {0x0, 0x3, 0x8}, {0x2, 0x3}, {0x430, 0x2, 0x1ff}, {0x7ff, 0x20, 0x3}, {0x3, 0x7, 0xb06}, {0x6, 0x4, 0x2}, {0x401, 0x4, 0x9}, {0x5, 0x7, 0x3}, {0x5, 0x5, 0x1ff}, {0x10000, 0x4, 0x9}, {0x3f, 0xed71, 0xf549}, {0x20, 0x101, 0x4}, {0xfffffffe, 0xbe6a, 0x8000}, {0x9, 0x9, 0x3}, {0x2, 0x5, 0x2}, {0x3, 0x5, 0x4}]}) syz_open_dev$usbfs(&(0x7f0000000040), 0x80000001, 0x940) 06:55:23 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) r1 = socket$netlink(0x10, 0x3, 0x4) sendmsg$TCPDIAG_GETSOCK(r1, &(0x7f0000002840)={0x0, 0x0, &(0x7f0000002800)={&(0x7f00000003c0)={0x1e70, 0x12, 0x803, 0x0, 0x0, {}, [@INET_DIAG_REQ_BYTECODE={0xd, 0x1, "9c1b9c02c979f96371"}, @INET_DIAG_REQ_BYTECODE={0x1001, 0x1, "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"}, @INET_DIAG_REQ_BYTECODE={0xa5, 0x1, "424c17d623ca31faa7d571bcc3a93f88edb48bf792bf664fc8c35328c04723c7a07192206974be476c232e068f7a6b967ee6edc722470d6983a88c1f9b5689c1b7c6f59b4e06acfbdc04c194a81ed5e2a499816ba8938d9ce8ec1bee7c55f3b2a605579db6d59da35eeb5dd85e68577a3dad932753afece6d2eaac415ef93e84366e3d7179f49e9eab5bab768efb0ea96f3561747803a4b863e257687922213164"}, @INET_DIAG_REQ_BYTECODE={0x15, 0x1, "4ae2671db7c0b687bd7032cb5bb018a363"}, @INET_DIAG_REQ_BYTECODE={0xb1, 0x1, "ebacd1e4c578ee4d85425a06add78068338c13b6d04d9b286ba1cb990955add939664553e1ad29881a63d115f6c2dacf1314a49babab53b878c9f9fe9d608177178cf61251ebd9091dcc24fa744089c7dbef8944e009e73e90ee187a63d5cada68f10767b745600e665f44bf01112501cb2d192e81b76d4b7ccf455f105fba719a8429d05273740d84692ad186a7870b8ad7c420f0e8a7abff0f8976ebd3b169bd55ee484bf87ecb57f35eda5c"}, @INET_DIAG_REQ_BYTECODE={0xc99, 0x1, "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"}]}, 0x1e70}}, 0x0) r2 = syz_open_dev$usbfs(&(0x7f0000000380), 0x6e665f53, 0x0) ioctl$USBDEVFS_CLEAR_HALT(r2, 0x80045515, 0x0) (async) r3 = syz_open_dev$usbfs(&(0x7f0000000100), 0x6, 0x40000) ioctl$USBDEVFS_GET_CAPABILITIES(r3, 0x8004551a, &(0x7f0000000140)) ioctl$USBDEVFS_BULK(r2, 0xc0185502, &(0x7f00000000c0)={{{0x6}}, 0x46, 0x0, &(0x7f0000000040)="9a785a87411283c3296e05404e09f58bf7a7b6724a7970a0d857a4628d2cf5fc8b48fc48f7fe3d136dfda80f0357ed33bd8b16a3c10c79c4813224be4e3b3adc5da9a5ef4e15"}) ioctl$USBDEVFS_SUBMITURB(r0, 0x8008551c, &(0x7f0000000200)=@urb_type_bulk={0x3, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 06:55:23 executing program 1: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x802c550a, &(0x7f0000000200)=@urb_type_bulk={0x3, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0}) (async) ioctl$USBDEVFS_SUBMITURB(r0, 0x802c550a, &(0x7f0000000200)=@urb_type_bulk={0x3, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0}) 06:55:23 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x0) r1 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040), 0x26240, 0x0) socketpair(0x21, 0x6, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f00000000c0)={{{@in=@private, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@private0}}}, &(0x7f0000000240)=0xe8) r5 = socket(0x0, 0x2, 0x380) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r2, 0x89f0, &(0x7f00000001c0)={'syztnl1\x00', &(0x7f0000000280)={'ip6_vti0\x00', r4, 0x29, 0xbb, 0x8, 0x1ff, 0x4, @remote, @private2={0xfc, 0x2, '\x00', 0x1}, 0x80, 0x10, 0x3, 0x8}}) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r5, 0x89f0, &(0x7f0000000380)={'ip6tnl0\x00', &(0x7f0000000300)={'ip6_vti0\x00', r6, 0x2f, 0x2, 0x9, 0x9, 0x8, @remote, @dev={0xfe, 0x80, '\x00', 0xb}, 0x20, 0x700, 0x3f, 0x3}}) ioctl$ASHMEM_GET_PIN_STATUS(r1, 0x7709, 0x0) ioctl$USBDEVFS_SUBMITURB(r0, 0x5452, &(0x7f0000000200)=@urb_type_bulk={0x3, {}, 0x0, 0x0, 0x0, 0x0, 0x628, 0x0, 0x0, 0x0, 0x0, 0x0}) 06:55:23 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x802c550a, &(0x7f0000000140)=@urb_type_iso={0x0, {0x6}, 0x101, 0x1, &(0x7f0000000080)="1cb2bd03b5706bb872944e8c91006b5f437f21f0df51edb451ce867e7cc07482da352683b3fb8af7554195f3983bb3ddf94414e477191fd500fddd674deada6d3dc55638beb49ed739d1", 0x4a, 0x6, 0x20000000, 0x4b, 0x2, 0x1, &(0x7f0000000100)="5cf209fef7de04f14a1dc41da8d1a9b349f810a49f5cc02f98abccd91ac755550e7c0478127d611c90fabf4ffbb4c7afb16bbb4bc05e7fc7d9a6798c4930ca", [{0x8, 0x5, 0x100}, {0x40, 0x5, 0x3}, {0x8000, 0x5, 0x1}, {0x8, 0x2, 0x7f}, {0x9, 0x0, 0x4d}, {0x9, 0x8b88, 0x1}, {0x81, 0x5, 0x3ff}, {0xffffffff, 0xfffffff7, 0x5}, {0x7fffffff, 0x417, 0x40}, {0x401, 0x1, 0x950}, {0x6, 0xfff, 0x4}, {0x0, 0x8, 0x8}, {0xcd6fcee5, 0x4, 0xffffffff}, {0x7, 0x9, 0x9}, {0x3230fea4, 0x1ff, 0x401}, {0xf3d, 0xad, 0x2}, {0x7, 0x5, 0x8}, {0x800, 0xfffffffd, 0xff}, {0x5, 0x3, 0x7}, {0x7fffffff, 0x101, 0x1ff}, {0x11bb7e2, 0xe52}, {0x1, 0xffffffff, 0x7}, {0x3, 0x0, 0x4}, {0x1f, 0x80, 0x6}, {0x80, 0x9a, 0x1}, {0x3, 0xffff, 0xffff}, {0x81, 0x3, 0x8}, {0x0, 0x8, 0x400}, {0xfffffe01, 0x100, 0xf55}, {0x10001, 0xff, 0x7}, {0x2, 0x80000001, 0x7}, {0x4, 0xc708, 0x3ff}, {0x1, 0x7, 0x3}, {0x339, 0x8, 0x2}, {0x101, 0xffffffff, 0x10001}, {0x3, 0xff, 0x3}, {0x6b, 0xb0f, 0x5}, {0x7ff, 0x9, 0x7de5}, {0x80000001, 0x7f, 0x2}, {0x8, 0x6}, {0x3, 0x8001, 0x3ff}, {0x4, 0x5, 0x5d}, {0x75d23712, 0x8, 0x6}, {0x8, 0xde, 0x42e}, {0xea09, 0x81}, {0x9, 0x2, 0x3}, {0x2e47, 0x8, 0x81}, {0x3, 0x6, 0x7ff}, {0x7, 0x8, 0xfffff979}, {0x1f, 0x8, 0x1f}, {0x200, 0x7, 0x3}, {0x6897bc41, 0x7, 0x3}, {0x9, 0x80000000, 0x9}, {0x1ff, 0x1f, 0xffff}, {0x54, 0x9, 0x81}, {0xffffffff, 0x9cea, 0x3}, {0x7f, 0x7f, 0x3}, {0x800, 0x9, 0x6}, {0x5, 0xc46, 0x8000}, {0x0, 0x3, 0x8}, {0x2, 0x3}, {0x430, 0x2, 0x1ff}, {0x7ff, 0x20, 0x3}, {0x3, 0x7, 0xb06}, {0x6, 0x4, 0x2}, {0x401, 0x4, 0x9}, {0x5, 0x7, 0x3}, {0x5, 0x5, 0x1ff}, {0x10000, 0x4, 0x9}, {0x3f, 0xed71, 0xf549}, {0x20, 0x101, 0x4}, {0xfffffffe, 0xbe6a, 0x8000}, {0x9, 0x9, 0x3}, {0x2, 0x5, 0x2}, {0x3, 0x5, 0x4}]}) 06:55:23 executing program 0: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x0) socket$pptp(0x18, 0x1, 0x2) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000000c0)={{{@in6=@dev={0xfe, 0x80, '\x00', 0x1d}, @in=@multicast2, 0x4e21, 0x9, 0x4e21, 0x8, 0xa, 0x0, 0x20, 0x3a, 0x0, 0xee01}, {0x8, 0x7, 0x4, 0x3, 0x1, 0x9, 0x2, 0x8bb}, {0x3, 0x81, 0x100, 0x4}, 0xeb64, 0x6e6bb5, 0x0, 0x0, 0x7}, {{@in=@local, 0x4d4, 0x2b}, 0x2, @in=@private=0xa010100, 0x3503, 0x4, 0x1, 0x2, 0x0, 0x2, 0x800}}, 0xe8) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, &(0x7f00000001c0)={@multicast2, @broadcast, 0x0, 0x2, [@loopback, @remote]}, 0x18) r1 = syz_open_dev$usbfs(&(0x7f0000000200), 0x1, 0xa0000) ioctl$USBDEVFS_GET_SPEED(r1, 0x551f) r2 = socket$igmp6(0xa, 0x3, 0x2) ioctl$ifreq_SIOCGIFINDEX_wireguard(r2, 0x8933, &(0x7f0000000080)={'wg1\x00'}) setsockopt$MRT6_FLUSH(r2, 0x29, 0xd4, &(0x7f0000000280)=0x8, 0x4) ioctl$USBDEVFS_SUBMITURB(r0, 0x5452, &(0x7f0000000080)=@urb_type_bulk={0x3, {}, 0x1001000, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$USBDEVFS_FREE_STREAMS(0xffffffffffffffff, 0x8008551d, &(0x7f0000000240)=ANY=[@ANYBLOB="fa7f00001d001400010b8f8d89860084088b8d018c8189830d8800010a878a8305808803"]) syz_genetlink_get_family_id$wireguard(&(0x7f0000000040), 0xffffffffffffffff) 06:55:23 executing program 5: syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) 06:55:23 executing program 1: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x802c550a, &(0x7f0000000200)=@urb_type_bulk={0x3, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0}) 06:55:23 executing program 3: ioctl$USBDEVFS_SUBMITURB(0xffffffffffffffff, 0x802c550a, &(0x7f0000000140)=@urb_type_iso={0x0, {0x6}, 0x101, 0x1, &(0x7f0000000080)="1cb2bd03b5706bb872944e8c91006b5f437f21f0df51edb451ce867e7cc07482da352683b3fb8af7554195f3983bb3ddf94414e477191fd500fddd674deada6d3dc55638beb49ed739d1", 0x4a, 0x6, 0x20000000, 0x4b, 0x2, 0x1, &(0x7f0000000100)="5cf209fef7de04f14a1dc41da8d1a9b349f810a49f5cc02f98abccd91ac755550e7c0478127d611c90fabf4ffbb4c7afb16bbb4bc05e7fc7d9a6798c4930ca", [{0x8, 0x5, 0x100}, {0x40, 0x5, 0x3}, {0x8000, 0x5, 0x1}, {0x8, 0x2, 0x7f}, {0x9, 0x0, 0x4d}, {0x9, 0x8b88, 0x1}, {0x81, 0x5, 0x3ff}, {0xffffffff, 0xfffffff7, 0x5}, {0x7fffffff, 0x417, 0x40}, {0x401, 0x1, 0x950}, {0x6, 0xfff, 0x4}, {0x0, 0x8, 0x8}, {0xcd6fcee5, 0x4, 0xffffffff}, {0x7, 0x9, 0x9}, {0x3230fea4, 0x1ff, 0x401}, {0xf3d, 0xad, 0x2}, {0x7, 0x5, 0x8}, {0x800, 0xfffffffd, 0xff}, {0x5, 0x3, 0x7}, {0x7fffffff, 0x101, 0x1ff}, {0x11bb7e2, 0xe52}, {0x1, 0xffffffff, 0x7}, {0x3, 0x0, 0x4}, {0x1f, 0x80, 0x6}, {0x80, 0x9a, 0x1}, {0x3, 0xffff, 0xffff}, {0x81, 0x3, 0x8}, {0x0, 0x8, 0x400}, {0xfffffe01, 0x100, 0xf55}, {0x10001, 0xff, 0x7}, {0x2, 0x80000001, 0x7}, {0x4, 0xc708, 0x3ff}, {0x1, 0x7, 0x3}, {0x339, 0x8, 0x2}, {0x101, 0xffffffff, 0x10001}, {0x3, 0xff, 0x3}, {0x6b, 0xb0f, 0x5}, {0x7ff, 0x9, 0x7de5}, {0x80000001, 0x7f, 0x2}, {0x8, 0x6}, {0x3, 0x8001, 0x3ff}, {0x4, 0x5, 0x5d}, {0x75d23712, 0x8, 0x6}, {0x8, 0xde, 0x42e}, {0xea09, 0x81}, {0x9, 0x2, 0x3}, {0x2e47, 0x8, 0x81}, {0x3, 0x6, 0x7ff}, {0x7, 0x8, 0xfffff979}, {0x1f, 0x8, 0x1f}, {0x200, 0x7, 0x3}, {0x6897bc41, 0x7, 0x3}, {0x9, 0x80000000, 0x9}, {0x1ff, 0x1f, 0xffff}, {0x54, 0x9, 0x81}, {0xffffffff, 0x9cea, 0x3}, {0x7f, 0x7f, 0x3}, {0x800, 0x9, 0x6}, {0x5, 0xc46, 0x8000}, {0x0, 0x3, 0x8}, {0x2, 0x3}, {0x430, 0x2, 0x1ff}, {0x7ff, 0x20, 0x3}, {0x3, 0x7, 0xb06}, {0x6, 0x4, 0x2}, {0x401, 0x4, 0x9}, {0x5, 0x7, 0x3}, {0x5, 0x5, 0x1ff}, {0x10000, 0x4, 0x9}, {0x3f, 0xed71, 0xf549}, {0x20, 0x101, 0x4}, {0xfffffffe, 0xbe6a, 0x8000}, {0x9, 0x9, 0x3}, {0x2, 0x5, 0x2}, {0x3, 0x5, 0x4}]}) 06:55:23 executing program 5: syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) (async) 06:55:23 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x802c550a, &(0x7f0000000200)=@urb_type_bulk={0x2, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 06:55:23 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x40000, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) 06:55:23 executing program 0: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x0) socket$pptp(0x18, 0x1, 0x2) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000000c0)={{{@in6=@dev={0xfe, 0x80, '\x00', 0x1d}, @in=@multicast2, 0x4e21, 0x9, 0x4e21, 0x8, 0xa, 0x0, 0x20, 0x3a, 0x0, 0xee01}, {0x8, 0x7, 0x4, 0x3, 0x1, 0x9, 0x2, 0x8bb}, {0x3, 0x81, 0x100, 0x4}, 0xeb64, 0x6e6bb5, 0x0, 0x0, 0x7}, {{@in=@local, 0x4d4, 0x2b}, 0x2, @in=@private=0xa010100, 0x3503, 0x4, 0x1, 0x2, 0x0, 0x2, 0x800}}, 0xe8) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, &(0x7f00000001c0)={@multicast2, @broadcast, 0x0, 0x2, [@loopback, @remote]}, 0x18) (async, rerun: 64) r1 = syz_open_dev$usbfs(&(0x7f0000000200), 0x1, 0xa0000) (rerun: 64) ioctl$USBDEVFS_GET_SPEED(r1, 0x551f) (async) r2 = socket$igmp6(0xa, 0x3, 0x2) ioctl$ifreq_SIOCGIFINDEX_wireguard(r2, 0x8933, &(0x7f0000000080)={'wg1\x00'}) (async) setsockopt$MRT6_FLUSH(r2, 0x29, 0xd4, &(0x7f0000000280)=0x8, 0x4) (async) ioctl$USBDEVFS_SUBMITURB(r0, 0x5452, &(0x7f0000000080)=@urb_type_bulk={0x3, {}, 0x1001000, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$USBDEVFS_FREE_STREAMS(0xffffffffffffffff, 0x8008551d, &(0x7f0000000240)=ANY=[@ANYBLOB="fa7f00001d001400010b8f8d89860084088b8d018c8189830d8800010a878a8305808803"]) (async) syz_genetlink_get_family_id$wireguard(&(0x7f0000000040), 0xffffffffffffffff) 06:55:23 executing program 3: ioctl$USBDEVFS_SUBMITURB(0xffffffffffffffff, 0x802c550a, &(0x7f0000000140)=@urb_type_iso={0x0, {0x6}, 0x101, 0x1, &(0x7f0000000080)="1cb2bd03b5706bb872944e8c91006b5f437f21f0df51edb451ce867e7cc07482da352683b3fb8af7554195f3983bb3ddf94414e477191fd500fddd674deada6d3dc55638beb49ed739d1", 0x4a, 0x6, 0x20000000, 0x4b, 0x2, 0x1, &(0x7f0000000100)="5cf209fef7de04f14a1dc41da8d1a9b349f810a49f5cc02f98abccd91ac755550e7c0478127d611c90fabf4ffbb4c7afb16bbb4bc05e7fc7d9a6798c4930ca", [{0x8, 0x5, 0x100}, {0x40, 0x5, 0x3}, {0x8000, 0x5, 0x1}, {0x8, 0x2, 0x7f}, {0x9, 0x0, 0x4d}, {0x9, 0x8b88, 0x1}, {0x81, 0x5, 0x3ff}, {0xffffffff, 0xfffffff7, 0x5}, {0x7fffffff, 0x417, 0x40}, {0x401, 0x1, 0x950}, {0x6, 0xfff, 0x4}, {0x0, 0x8, 0x8}, {0xcd6fcee5, 0x4, 0xffffffff}, {0x7, 0x9, 0x9}, {0x3230fea4, 0x1ff, 0x401}, {0xf3d, 0xad, 0x2}, {0x7, 0x5, 0x8}, {0x800, 0xfffffffd, 0xff}, {0x5, 0x3, 0x7}, {0x7fffffff, 0x101, 0x1ff}, {0x11bb7e2, 0xe52}, {0x1, 0xffffffff, 0x7}, {0x3, 0x0, 0x4}, {0x1f, 0x80, 0x6}, {0x80, 0x9a, 0x1}, {0x3, 0xffff, 0xffff}, {0x81, 0x3, 0x8}, {0x0, 0x8, 0x400}, {0xfffffe01, 0x100, 0xf55}, {0x10001, 0xff, 0x7}, {0x2, 0x80000001, 0x7}, {0x4, 0xc708, 0x3ff}, {0x1, 0x7, 0x3}, {0x339, 0x8, 0x2}, {0x101, 0xffffffff, 0x10001}, {0x3, 0xff, 0x3}, {0x6b, 0xb0f, 0x5}, {0x7ff, 0x9, 0x7de5}, {0x80000001, 0x7f, 0x2}, {0x8, 0x6}, {0x3, 0x8001, 0x3ff}, {0x4, 0x5, 0x5d}, {0x75d23712, 0x8, 0x6}, {0x8, 0xde, 0x42e}, {0xea09, 0x81}, {0x9, 0x2, 0x3}, {0x2e47, 0x8, 0x81}, {0x3, 0x6, 0x7ff}, {0x7, 0x8, 0xfffff979}, {0x1f, 0x8, 0x1f}, {0x200, 0x7, 0x3}, {0x6897bc41, 0x7, 0x3}, {0x9, 0x80000000, 0x9}, {0x1ff, 0x1f, 0xffff}, {0x54, 0x9, 0x81}, {0xffffffff, 0x9cea, 0x3}, {0x7f, 0x7f, 0x3}, {0x800, 0x9, 0x6}, {0x5, 0xc46, 0x8000}, {0x0, 0x3, 0x8}, {0x2, 0x3}, {0x430, 0x2, 0x1ff}, {0x7ff, 0x20, 0x3}, {0x3, 0x7, 0xb06}, {0x6, 0x4, 0x2}, {0x401, 0x4, 0x9}, {0x5, 0x7, 0x3}, {0x5, 0x5, 0x1ff}, {0x10000, 0x4, 0x9}, {0x3f, 0xed71, 0xf549}, {0x20, 0x101, 0x4}, {0xfffffffe, 0xbe6a, 0x8000}, {0x9, 0x9, 0x3}, {0x2, 0x5, 0x2}, {0x3, 0x5, 0x4}]}) 06:55:23 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x802c550a, &(0x7f0000000200)=@urb_type_bulk={0x2, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 06:55:23 executing program 3: ioctl$USBDEVFS_SUBMITURB(0xffffffffffffffff, 0x802c550a, &(0x7f0000000140)=@urb_type_iso={0x0, {0x6}, 0x101, 0x1, &(0x7f0000000080)="1cb2bd03b5706bb872944e8c91006b5f437f21f0df51edb451ce867e7cc07482da352683b3fb8af7554195f3983bb3ddf94414e477191fd500fddd674deada6d3dc55638beb49ed739d1", 0x4a, 0x6, 0x20000000, 0x4b, 0x2, 0x1, &(0x7f0000000100)="5cf209fef7de04f14a1dc41da8d1a9b349f810a49f5cc02f98abccd91ac755550e7c0478127d611c90fabf4ffbb4c7afb16bbb4bc05e7fc7d9a6798c4930ca", [{0x8, 0x5, 0x100}, {0x40, 0x5, 0x3}, {0x8000, 0x5, 0x1}, {0x8, 0x2, 0x7f}, {0x9, 0x0, 0x4d}, {0x9, 0x8b88, 0x1}, {0x81, 0x5, 0x3ff}, {0xffffffff, 0xfffffff7, 0x5}, {0x7fffffff, 0x417, 0x40}, {0x401, 0x1, 0x950}, {0x6, 0xfff, 0x4}, {0x0, 0x8, 0x8}, {0xcd6fcee5, 0x4, 0xffffffff}, {0x7, 0x9, 0x9}, {0x3230fea4, 0x1ff, 0x401}, {0xf3d, 0xad, 0x2}, {0x7, 0x5, 0x8}, {0x800, 0xfffffffd, 0xff}, {0x5, 0x3, 0x7}, {0x7fffffff, 0x101, 0x1ff}, {0x11bb7e2, 0xe52}, {0x1, 0xffffffff, 0x7}, {0x3, 0x0, 0x4}, {0x1f, 0x80, 0x6}, {0x80, 0x9a, 0x1}, {0x3, 0xffff, 0xffff}, {0x81, 0x3, 0x8}, {0x0, 0x8, 0x400}, {0xfffffe01, 0x100, 0xf55}, {0x10001, 0xff, 0x7}, {0x2, 0x80000001, 0x7}, {0x4, 0xc708, 0x3ff}, {0x1, 0x7, 0x3}, {0x339, 0x8, 0x2}, {0x101, 0xffffffff, 0x10001}, {0x3, 0xff, 0x3}, {0x6b, 0xb0f, 0x5}, {0x7ff, 0x9, 0x7de5}, {0x80000001, 0x7f, 0x2}, {0x8, 0x6}, {0x3, 0x8001, 0x3ff}, {0x4, 0x5, 0x5d}, {0x75d23712, 0x8, 0x6}, {0x8, 0xde, 0x42e}, {0xea09, 0x81}, {0x9, 0x2, 0x3}, {0x2e47, 0x8, 0x81}, {0x3, 0x6, 0x7ff}, {0x7, 0x8, 0xfffff979}, {0x1f, 0x8, 0x1f}, {0x200, 0x7, 0x3}, {0x6897bc41, 0x7, 0x3}, {0x9, 0x80000000, 0x9}, {0x1ff, 0x1f, 0xffff}, {0x54, 0x9, 0x81}, {0xffffffff, 0x9cea, 0x3}, {0x7f, 0x7f, 0x3}, {0x800, 0x9, 0x6}, {0x5, 0xc46, 0x8000}, {0x0, 0x3, 0x8}, {0x2, 0x3}, {0x430, 0x2, 0x1ff}, {0x7ff, 0x20, 0x3}, {0x3, 0x7, 0xb06}, {0x6, 0x4, 0x2}, {0x401, 0x4, 0x9}, {0x5, 0x7, 0x3}, {0x5, 0x5, 0x1ff}, {0x10000, 0x4, 0x9}, {0x3f, 0xed71, 0xf549}, {0x20, 0x101, 0x4}, {0xfffffffe, 0xbe6a, 0x8000}, {0x9, 0x9, 0x3}, {0x2, 0x5, 0x2}, {0x3, 0x5, 0x4}]}) 06:55:23 executing program 5: syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) 06:55:23 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x802c550a, &(0x7f0000000200)=@urb_type_bulk={0x2, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 06:55:23 executing program 1: syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) r0 = syz_open_dev$usbfs(&(0x7f0000000380), 0x6e665f53, 0x0) ioctl$USBDEVFS_CLEAR_HALT(r0, 0x80045515, 0x0) ioctl$USBDEVFS_SUBMITURB(r0, 0x802c550a, &(0x7f0000000200)=@urb_type_interrupt={0x1, {0x7, 0x1}, 0x3, 0x47, &(0x7f0000000240)="26da419f29631b6654a3537ff7e803e5ed53fc86d08e7ec3bcbf8b4987503b5c745d868a3677e82519719c65e173e8d829c8ba6b3d043ce339ffff5790e524d1f10b82f968622c9971ec70c353b61eb4e64ede37ed592e843cbe0d91c8ac270f233e99673fe0f22caf231988b67f46bf0d8ae08c9358ca1410078c57ebe630483438dcef599600000000", 0xfffffffffffffdf4, 0x0, 0x1000, 0x0, 0x6455, 0x8001, &(0x7f00000000c0)="5b511339396b3595ec1e2f9068571e493d3c2aedc8dd41327f1de49ec879124ee7b1586e236779c7f21838850ec1c100b7c602aa019da092baebd02b25e2fed9c4d8bad59c0151b94229cab18206edcd191ef1bc1f978076f84b830895910e604157c0a364ec8a9d5b8199b23d6195ead6a64cbfcd5670ea1719fbcfc8e2d9b11e79cdc72b01000ba4d4c1"}) r1 = syz_open_dev$usbfs(&(0x7f0000000380), 0x6e665f53, 0x0) ioctl$USBDEVFS_CLEAR_HALT(r1, 0x80045515, 0x0) ioctl$USBDEVFS_CLAIM_PORT(r1, 0x80045518, &(0x7f0000000080)=0x5) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000001c0)={&(0x7f0000000300)={0x6c, 0x0, 0x20, 0x70bd29, 0x25dfdbfd, {}, [@NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_BACKEND_IDENTIFIER={0x4}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x8a}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x24}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x3}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x3}, @NBD_ATTR_BACKEND_IDENTIFIER={0x19, 0xa, '/dev/bus/usb/00#/00#\x00'}]}, 0x6c}, 0x1, 0x0, 0x0, 0x8000000}, 0x8000) mmap$usbfs(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000000, 0x2010, 0xffffffffffffffff, 0x4) ioctl$USBDEVFS_CLAIMINTERFACE(r0, 0x8004550f, &(0x7f0000000040)=0x17d2) 06:55:23 executing program 2: ioctl$USBDEVFS_SUBMITURB(0xffffffffffffffff, 0x802c550a, &(0x7f0000000200)=@urb_type_bulk={0x2, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 06:55:23 executing program 0: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x0) socket$pptp(0x18, 0x1, 0x2) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000000c0)={{{@in6=@dev={0xfe, 0x80, '\x00', 0x1d}, @in=@multicast2, 0x4e21, 0x9, 0x4e21, 0x8, 0xa, 0x0, 0x20, 0x3a, 0x0, 0xee01}, {0x8, 0x7, 0x4, 0x3, 0x1, 0x9, 0x2, 0x8bb}, {0x3, 0x81, 0x100, 0x4}, 0xeb64, 0x6e6bb5, 0x0, 0x0, 0x7}, {{@in=@local, 0x4d4, 0x2b}, 0x2, @in=@private=0xa010100, 0x3503, 0x4, 0x1, 0x2, 0x0, 0x2, 0x800}}, 0xe8) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, &(0x7f00000001c0)={@multicast2, @broadcast, 0x0, 0x2, [@loopback, @remote]}, 0x18) r1 = syz_open_dev$usbfs(&(0x7f0000000200), 0x1, 0xa0000) ioctl$USBDEVFS_GET_SPEED(r1, 0x551f) r2 = socket$igmp6(0xa, 0x3, 0x2) ioctl$ifreq_SIOCGIFINDEX_wireguard(r2, 0x8933, &(0x7f0000000080)={'wg1\x00'}) setsockopt$MRT6_FLUSH(r2, 0x29, 0xd4, &(0x7f0000000280)=0x8, 0x4) ioctl$USBDEVFS_SUBMITURB(r0, 0x5452, &(0x7f0000000080)=@urb_type_bulk={0x3, {}, 0x1001000, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$USBDEVFS_FREE_STREAMS(0xffffffffffffffff, 0x8008551d, &(0x7f0000000240)=ANY=[@ANYBLOB="fa7f00001d001400010b8f8d89860084088b8d018c8189830d8800010a878a8305808803"]) syz_genetlink_get_family_id$wireguard(&(0x7f0000000040), 0xffffffffffffffff) syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x0) (async) socket$pptp(0x18, 0x1, 0x2) (async) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000000c0)={{{@in6=@dev={0xfe, 0x80, '\x00', 0x1d}, @in=@multicast2, 0x4e21, 0x9, 0x4e21, 0x8, 0xa, 0x0, 0x20, 0x3a, 0x0, 0xee01}, {0x8, 0x7, 0x4, 0x3, 0x1, 0x9, 0x2, 0x8bb}, {0x3, 0x81, 0x100, 0x4}, 0xeb64, 0x6e6bb5, 0x0, 0x0, 0x7}, {{@in=@local, 0x4d4, 0x2b}, 0x2, @in=@private=0xa010100, 0x3503, 0x4, 0x1, 0x2, 0x0, 0x2, 0x800}}, 0xe8) (async) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, &(0x7f00000001c0)={@multicast2, @broadcast, 0x0, 0x2, [@loopback, @remote]}, 0x18) (async) syz_open_dev$usbfs(&(0x7f0000000200), 0x1, 0xa0000) (async) ioctl$USBDEVFS_GET_SPEED(r1, 0x551f) (async) socket$igmp6(0xa, 0x3, 0x2) (async) ioctl$ifreq_SIOCGIFINDEX_wireguard(r2, 0x8933, &(0x7f0000000080)={'wg1\x00'}) (async) setsockopt$MRT6_FLUSH(r2, 0x29, 0xd4, &(0x7f0000000280)=0x8, 0x4) (async) ioctl$USBDEVFS_SUBMITURB(r0, 0x5452, &(0x7f0000000080)=@urb_type_bulk={0x3, {}, 0x1001000, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) (async) ioctl$USBDEVFS_FREE_STREAMS(0xffffffffffffffff, 0x8008551d, &(0x7f0000000240)=ANY=[@ANYBLOB="fa7f00001d001400010b8f8d89860084088b8d018c8189830d8800010a878a8305808803"]) (async) syz_genetlink_get_family_id$wireguard(&(0x7f0000000040), 0xffffffffffffffff) (async) 06:55:23 executing program 1: syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) (async) r0 = syz_open_dev$usbfs(&(0x7f0000000380), 0x6e665f53, 0x0) ioctl$USBDEVFS_CLEAR_HALT(r0, 0x80045515, 0x0) (async) ioctl$USBDEVFS_SUBMITURB(r0, 0x802c550a, &(0x7f0000000200)=@urb_type_interrupt={0x1, {0x7, 0x1}, 0x3, 0x47, &(0x7f0000000240)="26da419f29631b6654a3537ff7e803e5ed53fc86d08e7ec3bcbf8b4987503b5c745d868a3677e82519719c65e173e8d829c8ba6b3d043ce339ffff5790e524d1f10b82f968622c9971ec70c353b61eb4e64ede37ed592e843cbe0d91c8ac270f233e99673fe0f22caf231988b67f46bf0d8ae08c9358ca1410078c57ebe630483438dcef599600000000", 0xfffffffffffffdf4, 0x0, 0x1000, 0x0, 0x6455, 0x8001, &(0x7f00000000c0)="5b511339396b3595ec1e2f9068571e493d3c2aedc8dd41327f1de49ec879124ee7b1586e236779c7f21838850ec1c100b7c602aa019da092baebd02b25e2fed9c4d8bad59c0151b94229cab18206edcd191ef1bc1f978076f84b830895910e604157c0a364ec8a9d5b8199b23d6195ead6a64cbfcd5670ea1719fbcfc8e2d9b11e79cdc72b01000ba4d4c1"}) (async) r1 = syz_open_dev$usbfs(&(0x7f0000000380), 0x6e665f53, 0x0) ioctl$USBDEVFS_CLEAR_HALT(r1, 0x80045515, 0x0) (async) ioctl$USBDEVFS_CLAIM_PORT(r1, 0x80045518, &(0x7f0000000080)=0x5) (async, rerun: 64) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000001c0)={&(0x7f0000000300)={0x6c, 0x0, 0x20, 0x70bd29, 0x25dfdbfd, {}, [@NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_BACKEND_IDENTIFIER={0x4}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x8a}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x24}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x3}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x3}, @NBD_ATTR_BACKEND_IDENTIFIER={0x19, 0xa, '/dev/bus/usb/00#/00#\x00'}]}, 0x6c}, 0x1, 0x0, 0x0, 0x8000000}, 0x8000) (rerun: 64) mmap$usbfs(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000000, 0x2010, 0xffffffffffffffff, 0x4) ioctl$USBDEVFS_CLAIMINTERFACE(r0, 0x8004550f, &(0x7f0000000040)=0x17d2) 06:55:23 executing program 3: r0 = syz_open_dev$usbfs(0x0, 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x802c550a, &(0x7f0000000140)=@urb_type_iso={0x0, {0x6}, 0x101, 0x1, &(0x7f0000000080)="1cb2bd03b5706bb872944e8c91006b5f437f21f0df51edb451ce867e7cc07482da352683b3fb8af7554195f3983bb3ddf94414e477191fd500fddd674deada6d3dc55638beb49ed739d1", 0x4a, 0x6, 0x20000000, 0x4b, 0x2, 0x1, &(0x7f0000000100)="5cf209fef7de04f14a1dc41da8d1a9b349f810a49f5cc02f98abccd91ac755550e7c0478127d611c90fabf4ffbb4c7afb16bbb4bc05e7fc7d9a6798c4930ca", [{0x8, 0x5, 0x100}, {0x40, 0x5, 0x3}, {0x8000, 0x5, 0x1}, {0x8, 0x2, 0x7f}, {0x9, 0x0, 0x4d}, {0x9, 0x8b88, 0x1}, {0x81, 0x5, 0x3ff}, {0xffffffff, 0xfffffff7, 0x5}, {0x7fffffff, 0x417, 0x40}, {0x401, 0x1, 0x950}, {0x6, 0xfff, 0x4}, {0x0, 0x8, 0x8}, {0xcd6fcee5, 0x4, 0xffffffff}, {0x7, 0x9, 0x9}, {0x3230fea4, 0x1ff, 0x401}, {0xf3d, 0xad, 0x2}, {0x7, 0x5, 0x8}, {0x800, 0xfffffffd, 0xff}, {0x5, 0x3, 0x7}, {0x7fffffff, 0x101, 0x1ff}, {0x11bb7e2, 0xe52}, {0x1, 0xffffffff, 0x7}, {0x3, 0x0, 0x4}, {0x1f, 0x80, 0x6}, {0x80, 0x9a, 0x1}, {0x3, 0xffff, 0xffff}, {0x81, 0x3, 0x8}, {0x0, 0x8, 0x400}, {0xfffffe01, 0x100, 0xf55}, {0x10001, 0xff, 0x7}, {0x2, 0x80000001, 0x7}, {0x4, 0xc708, 0x3ff}, {0x1, 0x7, 0x3}, {0x339, 0x8, 0x2}, {0x101, 0xffffffff, 0x10001}, {0x3, 0xff, 0x3}, {0x6b, 0xb0f, 0x5}, {0x7ff, 0x9, 0x7de5}, {0x80000001, 0x7f, 0x2}, {0x8, 0x6}, {0x3, 0x8001, 0x3ff}, {0x4, 0x5, 0x5d}, {0x75d23712, 0x8, 0x6}, {0x8, 0xde, 0x42e}, {0xea09, 0x81}, {0x9, 0x2, 0x3}, {0x2e47, 0x8, 0x81}, {0x3, 0x6, 0x7ff}, {0x7, 0x8, 0xfffff979}, {0x1f, 0x8, 0x1f}, {0x200, 0x7, 0x3}, {0x6897bc41, 0x7, 0x3}, {0x9, 0x80000000, 0x9}, {0x1ff, 0x1f, 0xffff}, {0x54, 0x9, 0x81}, {0xffffffff, 0x9cea, 0x3}, {0x7f, 0x7f, 0x3}, {0x800, 0x9, 0x6}, {0x5, 0xc46, 0x8000}, {0x0, 0x3, 0x8}, {0x2, 0x3}, {0x430, 0x2, 0x1ff}, {0x7ff, 0x20, 0x3}, {0x3, 0x7, 0xb06}, {0x6, 0x4, 0x2}, {0x401, 0x4, 0x9}, {0x5, 0x7, 0x3}, {0x5, 0x5, 0x1ff}, {0x10000, 0x4, 0x9}, {0x3f, 0xed71, 0xf549}, {0x20, 0x101, 0x4}, {0xfffffffe, 0xbe6a, 0x8000}, {0x9, 0x9, 0x3}, {0x2, 0x5, 0x2}, {0x3, 0x5, 0x4}]}) 06:55:23 executing program 4: ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) 06:55:23 executing program 2: ioctl$USBDEVFS_SUBMITURB(0xffffffffffffffff, 0x802c550a, &(0x7f0000000200)=@urb_type_bulk={0x2, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 06:55:23 executing program 0: ioctl$USBDEVFS_RELEASE_PORT(0xffffffffffffffff, 0x80045519, &(0x7f00000001c0)=0x8000) r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x4, 0x4241) ioctl$USBDEVFS_SETCONFIGURATION(r1, 0x80045505, &(0x7f0000000080)=0xffff) r2 = syz_open_dev$usbfs(&(0x7f00000000c0), 0xfffffffffffffeff, 0x48000) ioctl$USBDEVFS_DISCARDURB(r2, 0x550b, &(0x7f0000000100)=0x4) r3 = syz_open_dev$usbfs(&(0x7f00000002c0), 0x7fff, 0x111400) mmap$usbfs(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x2, 0x1010, r3, 0x3) r4 = syz_open_dev$usbfs(&(0x7f0000000140), 0x47bd, 0x404400) ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f0000000240)) ioctl$USBDEVFS_CONNECTINFO(0xffffffffffffffff, 0x40085511, &(0x7f0000000300)) ioctl$USBDEVFS_RESETEP(r4, 0x80045503, &(0x7f0000000180)={0xf}) ioctl$USBDEVFS_SUBMITURB(r0, 0x5452, &(0x7f0000000200)=@urb_type_bulk={0x3, {}, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0xffffffff, 0x0, 0x7ff, 0x4, 0x0}) r5 = syz_open_dev$usbfs(&(0x7f0000000380), 0x6e665f53, 0x100) ioctl$USBDEVFS_CLEAR_HALT(r5, 0x80045515, 0x0) ioctl$USBDEVFS_FREE_STREAMS(r5, 0x8008551d, &(0x7f00000003c0)=ANY=[@ANYBLOB="91d40000155d00008f8b808d04040d000305890f0483060a8180870c045468bf4fa0f856cc964b17614cf4d231515f51b71e85241bef9d29d062a10e480da6f46c9f9b770fe198934e267f97e6c52c47dfd4f8f9fa71bbae501f376b0a921d18d2f1eb282bf575cac2cafed9e47ce4e11cdffd5b07993091d140afe361a9c782b8cc86e66e8dd25d29cc4a5fe7ea7b63f7bc3f8fbde84b2da6b3253a70bb755a5797b4"]) 06:55:23 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) r1 = syz_open_dev$usbfs(&(0x7f0000000380), 0x6e665f53, 0x0) ioctl$USBDEVFS_CLEAR_HALT(r1, 0x80045515, 0x0) ioctl$USBDEVFS_RELEASE_PORT(r1, 0x80045519, &(0x7f0000000040)=0x2) ioctl$USBDEVFS_GET_SPEED(r1, 0x551f) ioctl$USBDEVFS_SUBMITURB(r0, 0x8008551c, &(0x7f0000000200)=@urb_type_bulk={0x3, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 06:55:23 executing program 4: ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) 06:55:23 executing program 2: ioctl$USBDEVFS_SUBMITURB(0xffffffffffffffff, 0x802c550a, &(0x7f0000000200)=@urb_type_bulk={0x2, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 06:55:23 executing program 3: r0 = syz_open_dev$usbfs(0x0, 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x802c550a, &(0x7f0000000140)=@urb_type_iso={0x0, {0x6}, 0x101, 0x1, &(0x7f0000000080)="1cb2bd03b5706bb872944e8c91006b5f437f21f0df51edb451ce867e7cc07482da352683b3fb8af7554195f3983bb3ddf94414e477191fd500fddd674deada6d3dc55638beb49ed739d1", 0x4a, 0x6, 0x20000000, 0x4b, 0x2, 0x1, &(0x7f0000000100)="5cf209fef7de04f14a1dc41da8d1a9b349f810a49f5cc02f98abccd91ac755550e7c0478127d611c90fabf4ffbb4c7afb16bbb4bc05e7fc7d9a6798c4930ca", [{0x8, 0x5, 0x100}, {0x40, 0x5, 0x3}, {0x8000, 0x5, 0x1}, {0x8, 0x2, 0x7f}, {0x9, 0x0, 0x4d}, {0x9, 0x8b88, 0x1}, {0x81, 0x5, 0x3ff}, {0xffffffff, 0xfffffff7, 0x5}, {0x7fffffff, 0x417, 0x40}, {0x401, 0x1, 0x950}, {0x6, 0xfff, 0x4}, {0x0, 0x8, 0x8}, {0xcd6fcee5, 0x4, 0xffffffff}, {0x7, 0x9, 0x9}, {0x3230fea4, 0x1ff, 0x401}, {0xf3d, 0xad, 0x2}, {0x7, 0x5, 0x8}, {0x800, 0xfffffffd, 0xff}, {0x5, 0x3, 0x7}, {0x7fffffff, 0x101, 0x1ff}, {0x11bb7e2, 0xe52}, {0x1, 0xffffffff, 0x7}, {0x3, 0x0, 0x4}, {0x1f, 0x80, 0x6}, {0x80, 0x9a, 0x1}, {0x3, 0xffff, 0xffff}, {0x81, 0x3, 0x8}, {0x0, 0x8, 0x400}, {0xfffffe01, 0x100, 0xf55}, {0x10001, 0xff, 0x7}, {0x2, 0x80000001, 0x7}, {0x4, 0xc708, 0x3ff}, {0x1, 0x7, 0x3}, {0x339, 0x8, 0x2}, {0x101, 0xffffffff, 0x10001}, {0x3, 0xff, 0x3}, {0x6b, 0xb0f, 0x5}, {0x7ff, 0x9, 0x7de5}, {0x80000001, 0x7f, 0x2}, {0x8, 0x6}, {0x3, 0x8001, 0x3ff}, {0x4, 0x5, 0x5d}, {0x75d23712, 0x8, 0x6}, {0x8, 0xde, 0x42e}, {0xea09, 0x81}, {0x9, 0x2, 0x3}, {0x2e47, 0x8, 0x81}, {0x3, 0x6, 0x7ff}, {0x7, 0x8, 0xfffff979}, {0x1f, 0x8, 0x1f}, {0x200, 0x7, 0x3}, {0x6897bc41, 0x7, 0x3}, {0x9, 0x80000000, 0x9}, {0x1ff, 0x1f, 0xffff}, {0x54, 0x9, 0x81}, {0xffffffff, 0x9cea, 0x3}, {0x7f, 0x7f, 0x3}, {0x800, 0x9, 0x6}, {0x5, 0xc46, 0x8000}, {0x0, 0x3, 0x8}, {0x2, 0x3}, {0x430, 0x2, 0x1ff}, {0x7ff, 0x20, 0x3}, {0x3, 0x7, 0xb06}, {0x6, 0x4, 0x2}, {0x401, 0x4, 0x9}, {0x5, 0x7, 0x3}, {0x5, 0x5, 0x1ff}, {0x10000, 0x4, 0x9}, {0x3f, 0xed71, 0xf549}, {0x20, 0x101, 0x4}, {0xfffffffe, 0xbe6a, 0x8000}, {0x9, 0x9, 0x3}, {0x2, 0x5, 0x2}, {0x3, 0x5, 0x4}]}) 06:55:23 executing program 1: syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) r0 = syz_open_dev$usbfs(&(0x7f0000000380), 0x6e665f53, 0x0) ioctl$USBDEVFS_CLEAR_HALT(r0, 0x80045515, 0x0) ioctl$USBDEVFS_SUBMITURB(r0, 0x802c550a, &(0x7f0000000200)=@urb_type_interrupt={0x1, {0x7, 0x1}, 0x3, 0x47, &(0x7f0000000240)="26da419f29631b6654a3537ff7e803e5ed53fc86d08e7ec3bcbf8b4987503b5c745d868a3677e82519719c65e173e8d829c8ba6b3d043ce339ffff5790e524d1f10b82f968622c9971ec70c353b61eb4e64ede37ed592e843cbe0d91c8ac270f233e99673fe0f22caf231988b67f46bf0d8ae08c9358ca1410078c57ebe630483438dcef599600000000", 0xfffffffffffffdf4, 0x0, 0x1000, 0x0, 0x6455, 0x8001, &(0x7f00000000c0)="5b511339396b3595ec1e2f9068571e493d3c2aedc8dd41327f1de49ec879124ee7b1586e236779c7f21838850ec1c100b7c602aa019da092baebd02b25e2fed9c4d8bad59c0151b94229cab18206edcd191ef1bc1f978076f84b830895910e604157c0a364ec8a9d5b8199b23d6195ead6a64cbfcd5670ea1719fbcfc8e2d9b11e79cdc72b01000ba4d4c1"}) (async) r1 = syz_open_dev$usbfs(&(0x7f0000000380), 0x6e665f53, 0x0) ioctl$USBDEVFS_CLEAR_HALT(r1, 0x80045515, 0x0) (async) ioctl$USBDEVFS_CLAIM_PORT(r1, 0x80045518, &(0x7f0000000080)=0x5) (async) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000001c0)={&(0x7f0000000300)={0x6c, 0x0, 0x20, 0x70bd29, 0x25dfdbfd, {}, [@NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_BACKEND_IDENTIFIER={0x4}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x8a}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x24}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x3}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x3}, @NBD_ATTR_BACKEND_IDENTIFIER={0x19, 0xa, '/dev/bus/usb/00#/00#\x00'}]}, 0x6c}, 0x1, 0x0, 0x0, 0x8000000}, 0x8000) (async) mmap$usbfs(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000000, 0x2010, 0xffffffffffffffff, 0x4) (async) ioctl$USBDEVFS_CLAIMINTERFACE(r0, 0x8004550f, &(0x7f0000000040)=0x17d2) 06:55:23 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) r1 = syz_open_dev$usbfs(&(0x7f0000000380), 0x6e665f53, 0x0) ioctl$USBDEVFS_CLEAR_HALT(r1, 0x80045515, 0x0) (async) ioctl$USBDEVFS_RELEASE_PORT(r1, 0x80045519, &(0x7f0000000040)=0x2) ioctl$USBDEVFS_GET_SPEED(r1, 0x551f) ioctl$USBDEVFS_SUBMITURB(r0, 0x8008551c, &(0x7f0000000200)=@urb_type_bulk={0x3, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 06:55:23 executing program 0: ioctl$USBDEVFS_RELEASE_PORT(0xffffffffffffffff, 0x80045519, &(0x7f00000001c0)=0x8000) r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x0) (async) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x4, 0x4241) ioctl$USBDEVFS_SETCONFIGURATION(r1, 0x80045505, &(0x7f0000000080)=0xffff) (async) r2 = syz_open_dev$usbfs(&(0x7f00000000c0), 0xfffffffffffffeff, 0x48000) ioctl$USBDEVFS_DISCARDURB(r2, 0x550b, &(0x7f0000000100)=0x4) r3 = syz_open_dev$usbfs(&(0x7f00000002c0), 0x7fff, 0x111400) mmap$usbfs(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x2, 0x1010, r3, 0x3) r4 = syz_open_dev$usbfs(&(0x7f0000000140), 0x47bd, 0x404400) (async) ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f0000000240)) ioctl$USBDEVFS_CONNECTINFO(0xffffffffffffffff, 0x40085511, &(0x7f0000000300)) ioctl$USBDEVFS_RESETEP(r4, 0x80045503, &(0x7f0000000180)={0xf}) (async) ioctl$USBDEVFS_SUBMITURB(r0, 0x5452, &(0x7f0000000200)=@urb_type_bulk={0x3, {}, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0xffffffff, 0x0, 0x7ff, 0x4, 0x0}) r5 = syz_open_dev$usbfs(&(0x7f0000000380), 0x6e665f53, 0x100) ioctl$USBDEVFS_CLEAR_HALT(r5, 0x80045515, 0x0) (async) ioctl$USBDEVFS_FREE_STREAMS(r5, 0x8008551d, &(0x7f00000003c0)=ANY=[@ANYBLOB="91d40000155d00008f8b808d04040d000305890f0483060a8180870c045468bf4fa0f856cc964b17614cf4d231515f51b71e85241bef9d29d062a10e480da6f46c9f9b770fe198934e267f97e6c52c47dfd4f8f9fa71bbae501f376b0a921d18d2f1eb282bf575cac2cafed9e47ce4e11cdffd5b07993091d140afe361a9c782b8cc86e66e8dd25d29cc4a5fe7ea7b63f7bc3f8fbde84b2da6b3253a70bb755a5797b4"]) 06:55:23 executing program 2: r0 = syz_open_dev$usbfs(0x0, 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x802c550a, &(0x7f0000000200)=@urb_type_bulk={0x2, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 06:55:23 executing program 4: ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) 06:55:23 executing program 3: r0 = syz_open_dev$usbfs(0x0, 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x802c550a, &(0x7f0000000140)=@urb_type_iso={0x0, {0x6}, 0x101, 0x1, &(0x7f0000000080)="1cb2bd03b5706bb872944e8c91006b5f437f21f0df51edb451ce867e7cc07482da352683b3fb8af7554195f3983bb3ddf94414e477191fd500fddd674deada6d3dc55638beb49ed739d1", 0x4a, 0x6, 0x20000000, 0x4b, 0x2, 0x1, &(0x7f0000000100)="5cf209fef7de04f14a1dc41da8d1a9b349f810a49f5cc02f98abccd91ac755550e7c0478127d611c90fabf4ffbb4c7afb16bbb4bc05e7fc7d9a6798c4930ca", [{0x8, 0x5, 0x100}, {0x40, 0x5, 0x3}, {0x8000, 0x5, 0x1}, {0x8, 0x2, 0x7f}, {0x9, 0x0, 0x4d}, {0x9, 0x8b88, 0x1}, {0x81, 0x5, 0x3ff}, {0xffffffff, 0xfffffff7, 0x5}, {0x7fffffff, 0x417, 0x40}, {0x401, 0x1, 0x950}, {0x6, 0xfff, 0x4}, {0x0, 0x8, 0x8}, {0xcd6fcee5, 0x4, 0xffffffff}, {0x7, 0x9, 0x9}, {0x3230fea4, 0x1ff, 0x401}, {0xf3d, 0xad, 0x2}, {0x7, 0x5, 0x8}, {0x800, 0xfffffffd, 0xff}, {0x5, 0x3, 0x7}, {0x7fffffff, 0x101, 0x1ff}, {0x11bb7e2, 0xe52}, {0x1, 0xffffffff, 0x7}, {0x3, 0x0, 0x4}, {0x1f, 0x80, 0x6}, {0x80, 0x9a, 0x1}, {0x3, 0xffff, 0xffff}, {0x81, 0x3, 0x8}, {0x0, 0x8, 0x400}, {0xfffffe01, 0x100, 0xf55}, {0x10001, 0xff, 0x7}, {0x2, 0x80000001, 0x7}, {0x4, 0xc708, 0x3ff}, {0x1, 0x7, 0x3}, {0x339, 0x8, 0x2}, {0x101, 0xffffffff, 0x10001}, {0x3, 0xff, 0x3}, {0x6b, 0xb0f, 0x5}, {0x7ff, 0x9, 0x7de5}, {0x80000001, 0x7f, 0x2}, {0x8, 0x6}, {0x3, 0x8001, 0x3ff}, {0x4, 0x5, 0x5d}, {0x75d23712, 0x8, 0x6}, {0x8, 0xde, 0x42e}, {0xea09, 0x81}, {0x9, 0x2, 0x3}, {0x2e47, 0x8, 0x81}, {0x3, 0x6, 0x7ff}, {0x7, 0x8, 0xfffff979}, {0x1f, 0x8, 0x1f}, {0x200, 0x7, 0x3}, {0x6897bc41, 0x7, 0x3}, {0x9, 0x80000000, 0x9}, {0x1ff, 0x1f, 0xffff}, {0x54, 0x9, 0x81}, {0xffffffff, 0x9cea, 0x3}, {0x7f, 0x7f, 0x3}, {0x800, 0x9, 0x6}, {0x5, 0xc46, 0x8000}, {0x0, 0x3, 0x8}, {0x2, 0x3}, {0x430, 0x2, 0x1ff}, {0x7ff, 0x20, 0x3}, {0x3, 0x7, 0xb06}, {0x6, 0x4, 0x2}, {0x401, 0x4, 0x9}, {0x5, 0x7, 0x3}, {0x5, 0x5, 0x1ff}, {0x10000, 0x4, 0x9}, {0x3f, 0xed71, 0xf549}, {0x20, 0x101, 0x4}, {0xfffffffe, 0xbe6a, 0x8000}, {0x9, 0x9, 0x3}, {0x2, 0x5, 0x2}, {0x3, 0x5, 0x4}]}) 06:55:23 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) (async) r1 = syz_open_dev$usbfs(&(0x7f0000000380), 0x6e665f53, 0x0) ioctl$USBDEVFS_CLEAR_HALT(r1, 0x80045515, 0x0) (async) ioctl$USBDEVFS_RELEASE_PORT(r1, 0x80045519, &(0x7f0000000040)=0x2) (async) ioctl$USBDEVFS_GET_SPEED(r1, 0x551f) (async) ioctl$USBDEVFS_SUBMITURB(r0, 0x8008551c, &(0x7f0000000200)=@urb_type_bulk={0x3, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 06:55:23 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000100)={'syztnl2\x00', &(0x7f0000000080)={'ip6tnl0\x00', 0x0, 0x29, 0x7, 0xa8, 0xffffffff, 0x21, @loopback, @mcast1, 0x1, 0x40, 0xffffffff, 0xff}}) r1 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_RELEASEINTERFACE(r1, 0x80045510, &(0x7f0000000140)=0x2) ioctl$USBDEVFS_SUBMITURB(r1, 0x802c550a, &(0x7f0000000040)=@urb_type_bulk={0x3, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x1f, 0x0, 0x0}) 06:55:23 executing program 0: ioctl$USBDEVFS_RELEASE_PORT(0xffffffffffffffff, 0x80045519, &(0x7f00000001c0)=0x8000) (async) r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x4, 0x4241) ioctl$USBDEVFS_SETCONFIGURATION(r1, 0x80045505, &(0x7f0000000080)=0xffff) r2 = syz_open_dev$usbfs(&(0x7f00000000c0), 0xfffffffffffffeff, 0x48000) ioctl$USBDEVFS_DISCARDURB(r2, 0x550b, &(0x7f0000000100)=0x4) (async) r3 = syz_open_dev$usbfs(&(0x7f00000002c0), 0x7fff, 0x111400) mmap$usbfs(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x2, 0x1010, r3, 0x3) (async) r4 = syz_open_dev$usbfs(&(0x7f0000000140), 0x47bd, 0x404400) (async, rerun: 64) ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f0000000240)) (rerun: 64) ioctl$USBDEVFS_CONNECTINFO(0xffffffffffffffff, 0x40085511, &(0x7f0000000300)) (async) ioctl$USBDEVFS_RESETEP(r4, 0x80045503, &(0x7f0000000180)={0xf}) (async) ioctl$USBDEVFS_SUBMITURB(r0, 0x5452, &(0x7f0000000200)=@urb_type_bulk={0x3, {}, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0xffffffff, 0x0, 0x7ff, 0x4, 0x0}) (async) r5 = syz_open_dev$usbfs(&(0x7f0000000380), 0x6e665f53, 0x100) ioctl$USBDEVFS_CLEAR_HALT(r5, 0x80045515, 0x0) (async) ioctl$USBDEVFS_FREE_STREAMS(r5, 0x8008551d, &(0x7f00000003c0)=ANY=[@ANYBLOB="91d40000155d00008f8b808d04040d000305890f0483060a8180870c045468bf4fa0f856cc964b17614cf4d231515f51b71e85241bef9d29d062a10e480da6f46c9f9b770fe198934e267f97e6c52c47dfd4f8f9fa71bbae501f376b0a921d18d2f1eb282bf575cac2cafed9e47ce4e11cdffd5b07993091d140afe361a9c782b8cc86e66e8dd25d29cc4a5fe7ea7b63f7bc3f8fbde84b2da6b3253a70bb755a5797b4"]) 06:55:23 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x40000, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) 06:55:23 executing program 2: r0 = syz_open_dev$usbfs(0x0, 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x802c550a, &(0x7f0000000200)=@urb_type_bulk={0x2, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 06:55:23 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x0, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x802c550a, &(0x7f0000000140)=@urb_type_iso={0x0, {0x6}, 0x101, 0x1, &(0x7f0000000080)="1cb2bd03b5706bb872944e8c91006b5f437f21f0df51edb451ce867e7cc07482da352683b3fb8af7554195f3983bb3ddf94414e477191fd500fddd674deada6d3dc55638beb49ed739d1", 0x4a, 0x6, 0x20000000, 0x4b, 0x2, 0x1, &(0x7f0000000100)="5cf209fef7de04f14a1dc41da8d1a9b349f810a49f5cc02f98abccd91ac755550e7c0478127d611c90fabf4ffbb4c7afb16bbb4bc05e7fc7d9a6798c4930ca", [{0x8, 0x5, 0x100}, {0x40, 0x5, 0x3}, {0x8000, 0x5, 0x1}, {0x8, 0x2, 0x7f}, {0x9, 0x0, 0x4d}, {0x9, 0x8b88, 0x1}, {0x81, 0x5, 0x3ff}, {0xffffffff, 0xfffffff7, 0x5}, {0x7fffffff, 0x417, 0x40}, {0x401, 0x1, 0x950}, {0x6, 0xfff, 0x4}, {0x0, 0x8, 0x8}, {0xcd6fcee5, 0x4, 0xffffffff}, {0x7, 0x9, 0x9}, {0x3230fea4, 0x1ff, 0x401}, {0xf3d, 0xad, 0x2}, {0x7, 0x5, 0x8}, {0x800, 0xfffffffd, 0xff}, {0x5, 0x3, 0x7}, {0x7fffffff, 0x101, 0x1ff}, {0x11bb7e2, 0xe52}, {0x1, 0xffffffff, 0x7}, {0x3, 0x0, 0x4}, {0x1f, 0x80, 0x6}, {0x80, 0x9a, 0x1}, {0x3, 0xffff, 0xffff}, {0x81, 0x3, 0x8}, {0x0, 0x8, 0x400}, {0xfffffe01, 0x100, 0xf55}, {0x10001, 0xff, 0x7}, {0x2, 0x80000001, 0x7}, {0x4, 0xc708, 0x3ff}, {0x1, 0x7, 0x3}, {0x339, 0x8, 0x2}, {0x101, 0xffffffff, 0x10001}, {0x3, 0xff, 0x3}, {0x6b, 0xb0f, 0x5}, {0x7ff, 0x9, 0x7de5}, {0x80000001, 0x7f, 0x2}, {0x8, 0x6}, {0x3, 0x8001, 0x3ff}, {0x4, 0x5, 0x5d}, {0x75d23712, 0x8, 0x6}, {0x8, 0xde, 0x42e}, {0xea09, 0x81}, {0x9, 0x2, 0x3}, {0x2e47, 0x8, 0x81}, {0x3, 0x6, 0x7ff}, {0x7, 0x8, 0xfffff979}, {0x1f, 0x8, 0x1f}, {0x200, 0x7, 0x3}, {0x6897bc41, 0x7, 0x3}, {0x9, 0x80000000, 0x9}, {0x1ff, 0x1f, 0xffff}, {0x54, 0x9, 0x81}, {0xffffffff, 0x9cea, 0x3}, {0x7f, 0x7f, 0x3}, {0x800, 0x9, 0x6}, {0x5, 0xc46, 0x8000}, {0x0, 0x3, 0x8}, {0x2, 0x3}, {0x430, 0x2, 0x1ff}, {0x7ff, 0x20, 0x3}, {0x3, 0x7, 0xb06}, {0x6, 0x4, 0x2}, {0x401, 0x4, 0x9}, {0x5, 0x7, 0x3}, {0x5, 0x5, 0x1ff}, {0x10000, 0x4, 0x9}, {0x3f, 0xed71, 0xf549}, {0x20, 0x101, 0x4}, {0xfffffffe, 0xbe6a, 0x8000}, {0x9, 0x9, 0x3}, {0x2, 0x5, 0x2}, {0x3, 0x5, 0x4}]}) 06:55:23 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x40000, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) 06:55:23 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000100)={'syztnl2\x00', &(0x7f0000000080)={'ip6tnl0\x00', 0x0, 0x29, 0x7, 0xa8, 0xffffffff, 0x21, @loopback, @mcast1, 0x1, 0x40, 0xffffffff, 0xff}}) (async, rerun: 32) r1 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) (rerun: 32) ioctl$USBDEVFS_RELEASEINTERFACE(r1, 0x80045510, &(0x7f0000000140)=0x2) ioctl$USBDEVFS_SUBMITURB(r1, 0x802c550a, &(0x7f0000000040)=@urb_type_bulk={0x3, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x1f, 0x0, 0x0}) 06:55:23 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x480) ioctl$USBDEVFS_SUBMITURB(r0, 0x8008551c, &(0x7f0000000200)=@urb_type_bulk={0x3, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$USBDEVFS_IOCTL(r0, 0xc0105512, &(0x7f0000000040)=@usbdevfs_connect={0x100}) 06:55:23 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x40000, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) 06:55:23 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x0, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x802c550a, &(0x7f0000000140)=@urb_type_iso={0x0, {0x6}, 0x101, 0x1, &(0x7f0000000080)="1cb2bd03b5706bb872944e8c91006b5f437f21f0df51edb451ce867e7cc07482da352683b3fb8af7554195f3983bb3ddf94414e477191fd500fddd674deada6d3dc55638beb49ed739d1", 0x4a, 0x6, 0x20000000, 0x4b, 0x2, 0x1, &(0x7f0000000100)="5cf209fef7de04f14a1dc41da8d1a9b349f810a49f5cc02f98abccd91ac755550e7c0478127d611c90fabf4ffbb4c7afb16bbb4bc05e7fc7d9a6798c4930ca", [{0x8, 0x5, 0x100}, {0x40, 0x5, 0x3}, {0x8000, 0x5, 0x1}, {0x8, 0x2, 0x7f}, {0x9, 0x0, 0x4d}, {0x9, 0x8b88, 0x1}, {0x81, 0x5, 0x3ff}, {0xffffffff, 0xfffffff7, 0x5}, {0x7fffffff, 0x417, 0x40}, {0x401, 0x1, 0x950}, {0x6, 0xfff, 0x4}, {0x0, 0x8, 0x8}, {0xcd6fcee5, 0x4, 0xffffffff}, {0x7, 0x9, 0x9}, {0x3230fea4, 0x1ff, 0x401}, {0xf3d, 0xad, 0x2}, {0x7, 0x5, 0x8}, {0x800, 0xfffffffd, 0xff}, {0x5, 0x3, 0x7}, {0x7fffffff, 0x101, 0x1ff}, {0x11bb7e2, 0xe52}, {0x1, 0xffffffff, 0x7}, {0x3, 0x0, 0x4}, {0x1f, 0x80, 0x6}, {0x80, 0x9a, 0x1}, {0x3, 0xffff, 0xffff}, {0x81, 0x3, 0x8}, {0x0, 0x8, 0x400}, {0xfffffe01, 0x100, 0xf55}, {0x10001, 0xff, 0x7}, {0x2, 0x80000001, 0x7}, {0x4, 0xc708, 0x3ff}, {0x1, 0x7, 0x3}, {0x339, 0x8, 0x2}, {0x101, 0xffffffff, 0x10001}, {0x3, 0xff, 0x3}, {0x6b, 0xb0f, 0x5}, {0x7ff, 0x9, 0x7de5}, {0x80000001, 0x7f, 0x2}, {0x8, 0x6}, {0x3, 0x8001, 0x3ff}, {0x4, 0x5, 0x5d}, {0x75d23712, 0x8, 0x6}, {0x8, 0xde, 0x42e}, {0xea09, 0x81}, {0x9, 0x2, 0x3}, {0x2e47, 0x8, 0x81}, {0x3, 0x6, 0x7ff}, {0x7, 0x8, 0xfffff979}, {0x1f, 0x8, 0x1f}, {0x200, 0x7, 0x3}, {0x6897bc41, 0x7, 0x3}, {0x9, 0x80000000, 0x9}, {0x1ff, 0x1f, 0xffff}, {0x54, 0x9, 0x81}, {0xffffffff, 0x9cea, 0x3}, {0x7f, 0x7f, 0x3}, {0x800, 0x9, 0x6}, {0x5, 0xc46, 0x8000}, {0x0, 0x3, 0x8}, {0x2, 0x3}, {0x430, 0x2, 0x1ff}, {0x7ff, 0x20, 0x3}, {0x3, 0x7, 0xb06}, {0x6, 0x4, 0x2}, {0x401, 0x4, 0x9}, {0x5, 0x7, 0x3}, {0x5, 0x5, 0x1ff}, {0x10000, 0x4, 0x9}, {0x3f, 0xed71, 0xf549}, {0x20, 0x101, 0x4}, {0xfffffffe, 0xbe6a, 0x8000}, {0x9, 0x9, 0x3}, {0x2, 0x5, 0x2}, {0x3, 0x5, 0x4}]}) 06:55:23 executing program 2: r0 = syz_open_dev$usbfs(0x0, 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x802c550a, &(0x7f0000000200)=@urb_type_bulk={0x2, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 06:55:23 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x480) ioctl$USBDEVFS_SUBMITURB(r0, 0x8008551c, &(0x7f0000000200)=@urb_type_bulk={0x3, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) (async) ioctl$USBDEVFS_IOCTL(r0, 0xc0105512, &(0x7f0000000040)=@usbdevfs_connect={0x100}) 06:55:23 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x0, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x802c550a, &(0x7f0000000200)=@urb_type_bulk={0x2, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 06:55:23 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000100)={'syztnl2\x00', &(0x7f0000000080)={'ip6tnl0\x00', 0x0, 0x29, 0x7, 0xa8, 0xffffffff, 0x21, @loopback, @mcast1, 0x1, 0x40, 0xffffffff, 0xff}}) r1 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_RELEASEINTERFACE(r1, 0x80045510, &(0x7f0000000140)=0x2) ioctl$USBDEVFS_SUBMITURB(r1, 0x802c550a, &(0x7f0000000040)=@urb_type_bulk={0x3, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x1f, 0x0, 0x0}) 06:55:23 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x40000, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) 06:55:23 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x0, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x802c550a, &(0x7f0000000140)=@urb_type_iso={0x0, {0x6}, 0x101, 0x1, &(0x7f0000000080)="1cb2bd03b5706bb872944e8c91006b5f437f21f0df51edb451ce867e7cc07482da352683b3fb8af7554195f3983bb3ddf94414e477191fd500fddd674deada6d3dc55638beb49ed739d1", 0x4a, 0x6, 0x20000000, 0x4b, 0x2, 0x1, &(0x7f0000000100)="5cf209fef7de04f14a1dc41da8d1a9b349f810a49f5cc02f98abccd91ac755550e7c0478127d611c90fabf4ffbb4c7afb16bbb4bc05e7fc7d9a6798c4930ca", [{0x8, 0x5, 0x100}, {0x40, 0x5, 0x3}, {0x8000, 0x5, 0x1}, {0x8, 0x2, 0x7f}, {0x9, 0x0, 0x4d}, {0x9, 0x8b88, 0x1}, {0x81, 0x5, 0x3ff}, {0xffffffff, 0xfffffff7, 0x5}, {0x7fffffff, 0x417, 0x40}, {0x401, 0x1, 0x950}, {0x6, 0xfff, 0x4}, {0x0, 0x8, 0x8}, {0xcd6fcee5, 0x4, 0xffffffff}, {0x7, 0x9, 0x9}, {0x3230fea4, 0x1ff, 0x401}, {0xf3d, 0xad, 0x2}, {0x7, 0x5, 0x8}, {0x800, 0xfffffffd, 0xff}, {0x5, 0x3, 0x7}, {0x7fffffff, 0x101, 0x1ff}, {0x11bb7e2, 0xe52}, {0x1, 0xffffffff, 0x7}, {0x3, 0x0, 0x4}, {0x1f, 0x80, 0x6}, {0x80, 0x9a, 0x1}, {0x3, 0xffff, 0xffff}, {0x81, 0x3, 0x8}, {0x0, 0x8, 0x400}, {0xfffffe01, 0x100, 0xf55}, {0x10001, 0xff, 0x7}, {0x2, 0x80000001, 0x7}, {0x4, 0xc708, 0x3ff}, {0x1, 0x7, 0x3}, {0x339, 0x8, 0x2}, {0x101, 0xffffffff, 0x10001}, {0x3, 0xff, 0x3}, {0x6b, 0xb0f, 0x5}, {0x7ff, 0x9, 0x7de5}, {0x80000001, 0x7f, 0x2}, {0x8, 0x6}, {0x3, 0x8001, 0x3ff}, {0x4, 0x5, 0x5d}, {0x75d23712, 0x8, 0x6}, {0x8, 0xde, 0x42e}, {0xea09, 0x81}, {0x9, 0x2, 0x3}, {0x2e47, 0x8, 0x81}, {0x3, 0x6, 0x7ff}, {0x7, 0x8, 0xfffff979}, {0x1f, 0x8, 0x1f}, {0x200, 0x7, 0x3}, {0x6897bc41, 0x7, 0x3}, {0x9, 0x80000000, 0x9}, {0x1ff, 0x1f, 0xffff}, {0x54, 0x9, 0x81}, {0xffffffff, 0x9cea, 0x3}, {0x7f, 0x7f, 0x3}, {0x800, 0x9, 0x6}, {0x5, 0xc46, 0x8000}, {0x0, 0x3, 0x8}, {0x2, 0x3}, {0x430, 0x2, 0x1ff}, {0x7ff, 0x20, 0x3}, {0x3, 0x7, 0xb06}, {0x6, 0x4, 0x2}, {0x401, 0x4, 0x9}, {0x5, 0x7, 0x3}, {0x5, 0x5, 0x1ff}, {0x10000, 0x4, 0x9}, {0x3f, 0xed71, 0xf549}, {0x20, 0x101, 0x4}, {0xfffffffe, 0xbe6a, 0x8000}, {0x9, 0x9, 0x3}, {0x2, 0x5, 0x2}, {0x3, 0x5, 0x4}]}) 06:55:23 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x40000, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) 06:55:23 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x480) ioctl$USBDEVFS_SUBMITURB(r0, 0x8008551c, &(0x7f0000000200)=@urb_type_bulk={0x3, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) (async) ioctl$USBDEVFS_IOCTL(r0, 0xc0105512, &(0x7f0000000040)=@usbdevfs_connect={0x100}) 06:55:23 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x0, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x802c550a, &(0x7f0000000200)=@urb_type_bulk={0x2, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 06:55:23 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x0) ioctl$USBDEVFS_SUBMITURB(r0, 0x802c550a, &(0x7f0000000140)=@urb_type_iso={0x0, {0x6}, 0x101, 0x1, &(0x7f0000000080)="1cb2bd03b5706bb872944e8c91006b5f437f21f0df51edb451ce867e7cc07482da352683b3fb8af7554195f3983bb3ddf94414e477191fd500fddd674deada6d3dc55638beb49ed739d1", 0x4a, 0x6, 0x20000000, 0x4b, 0x2, 0x1, &(0x7f0000000100)="5cf209fef7de04f14a1dc41da8d1a9b349f810a49f5cc02f98abccd91ac755550e7c0478127d611c90fabf4ffbb4c7afb16bbb4bc05e7fc7d9a6798c4930ca", [{0x8, 0x5, 0x100}, {0x40, 0x5, 0x3}, {0x8000, 0x5, 0x1}, {0x8, 0x2, 0x7f}, {0x9, 0x0, 0x4d}, {0x9, 0x8b88, 0x1}, {0x81, 0x5, 0x3ff}, {0xffffffff, 0xfffffff7, 0x5}, {0x7fffffff, 0x417, 0x40}, {0x401, 0x1, 0x950}, {0x6, 0xfff, 0x4}, {0x0, 0x8, 0x8}, {0xcd6fcee5, 0x4, 0xffffffff}, {0x7, 0x9, 0x9}, {0x3230fea4, 0x1ff, 0x401}, {0xf3d, 0xad, 0x2}, {0x7, 0x5, 0x8}, {0x800, 0xfffffffd, 0xff}, {0x5, 0x3, 0x7}, {0x7fffffff, 0x101, 0x1ff}, {0x11bb7e2, 0xe52}, {0x1, 0xffffffff, 0x7}, {0x3, 0x0, 0x4}, {0x1f, 0x80, 0x6}, {0x80, 0x9a, 0x1}, {0x3, 0xffff, 0xffff}, {0x81, 0x3, 0x8}, {0x0, 0x8, 0x400}, {0xfffffe01, 0x100, 0xf55}, {0x10001, 0xff, 0x7}, {0x2, 0x80000001, 0x7}, {0x4, 0xc708, 0x3ff}, {0x1, 0x7, 0x3}, {0x339, 0x8, 0x2}, {0x101, 0xffffffff, 0x10001}, {0x3, 0xff, 0x3}, {0x6b, 0xb0f, 0x5}, {0x7ff, 0x9, 0x7de5}, {0x80000001, 0x7f, 0x2}, {0x8, 0x6}, {0x3, 0x8001, 0x3ff}, {0x4, 0x5, 0x5d}, {0x75d23712, 0x8, 0x6}, {0x8, 0xde, 0x42e}, {0xea09, 0x81}, {0x9, 0x2, 0x3}, {0x2e47, 0x8, 0x81}, {0x3, 0x6, 0x7ff}, {0x7, 0x8, 0xfffff979}, {0x1f, 0x8, 0x1f}, {0x200, 0x7, 0x3}, {0x6897bc41, 0x7, 0x3}, {0x9, 0x80000000, 0x9}, {0x1ff, 0x1f, 0xffff}, {0x54, 0x9, 0x81}, {0xffffffff, 0x9cea, 0x3}, {0x7f, 0x7f, 0x3}, {0x800, 0x9, 0x6}, {0x5, 0xc46, 0x8000}, {0x0, 0x3, 0x8}, {0x2, 0x3}, {0x430, 0x2, 0x1ff}, {0x7ff, 0x20, 0x3}, {0x3, 0x7, 0xb06}, {0x6, 0x4, 0x2}, {0x401, 0x4, 0x9}, {0x5, 0x7, 0x3}, {0x5, 0x5, 0x1ff}, {0x10000, 0x4, 0x9}, {0x3f, 0xed71, 0xf549}, {0x20, 0x101, 0x4}, {0xfffffffe, 0xbe6a, 0x8000}, {0x9, 0x9, 0x3}, {0x2, 0x5, 0x2}, {0x3, 0x5, 0x4}]}) 06:55:23 executing program 1: syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) r0 = syz_open_dev$usbfs(&(0x7f0000000380), 0x6e665f53, 0x0) ioctl$USBDEVFS_CLEAR_HALT(r0, 0x80045515, 0x0) ioctl$USBDEVFS_SUBMITURB(r0, 0x802c550a, &(0x7f0000000200)=@urb_type_control={0x2, {0x3, 0x1}, 0xfc48, 0x81, &(0x7f0000000040)={0x2, 0x15, 0x8, 0x1000, 0x3}, 0x8, 0x3, 0x949, 0x0, 0x8, 0x8008, &(0x7f0000000080)="8e67ede68b7abf5fd002f8aabee29d2fa5887dae93146dc8ba92cd02e405e18307b4872cf4bea8ed780e90b22910cc0ff3ef92d6bbd86723ab2bfd190bf65588ad13840131730d6c271c2a0ff0873bf730c93e40c00c176f7b6288f295bc14b09bf84f3ea0b0cc54e0b1b9723e9632d13c459d99bb75b0006e8eb120e62af02856b23a587ed18a07f10980cb371bb2b17e759ebe86ed5deec7f27395eadc52fafb595c778938b15c9285cc1ab6d75752d4e5b09e7a2396f9af186cfc4faa63a6c568b984d34c2ceceb2114407aae71e98168a45242726c9326f448"}) 06:55:23 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) 06:55:23 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x0, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x802c550a, &(0x7f0000000200)=@urb_type_bulk={0x2, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 06:55:23 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x0) ioctl$USBDEVFS_SUBMITURB(r0, 0x802c550a, &(0x7f0000000140)=@urb_type_iso={0x0, {0x6}, 0x101, 0x1, &(0x7f0000000080)="1cb2bd03b5706bb872944e8c91006b5f437f21f0df51edb451ce867e7cc07482da352683b3fb8af7554195f3983bb3ddf94414e477191fd500fddd674deada6d3dc55638beb49ed739d1", 0x4a, 0x6, 0x20000000, 0x4b, 0x2, 0x1, &(0x7f0000000100)="5cf209fef7de04f14a1dc41da8d1a9b349f810a49f5cc02f98abccd91ac755550e7c0478127d611c90fabf4ffbb4c7afb16bbb4bc05e7fc7d9a6798c4930ca", [{0x8, 0x5, 0x100}, {0x40, 0x5, 0x3}, {0x8000, 0x5, 0x1}, {0x8, 0x2, 0x7f}, {0x9, 0x0, 0x4d}, {0x9, 0x8b88, 0x1}, {0x81, 0x5, 0x3ff}, {0xffffffff, 0xfffffff7, 0x5}, {0x7fffffff, 0x417, 0x40}, {0x401, 0x1, 0x950}, {0x6, 0xfff, 0x4}, {0x0, 0x8, 0x8}, {0xcd6fcee5, 0x4, 0xffffffff}, {0x7, 0x9, 0x9}, {0x3230fea4, 0x1ff, 0x401}, {0xf3d, 0xad, 0x2}, {0x7, 0x5, 0x8}, {0x800, 0xfffffffd, 0xff}, {0x5, 0x3, 0x7}, {0x7fffffff, 0x101, 0x1ff}, {0x11bb7e2, 0xe52}, {0x1, 0xffffffff, 0x7}, {0x3, 0x0, 0x4}, {0x1f, 0x80, 0x6}, {0x80, 0x9a, 0x1}, {0x3, 0xffff, 0xffff}, {0x81, 0x3, 0x8}, {0x0, 0x8, 0x400}, {0xfffffe01, 0x100, 0xf55}, {0x10001, 0xff, 0x7}, {0x2, 0x80000001, 0x7}, {0x4, 0xc708, 0x3ff}, {0x1, 0x7, 0x3}, {0x339, 0x8, 0x2}, {0x101, 0xffffffff, 0x10001}, {0x3, 0xff, 0x3}, {0x6b, 0xb0f, 0x5}, {0x7ff, 0x9, 0x7de5}, {0x80000001, 0x7f, 0x2}, {0x8, 0x6}, {0x3, 0x8001, 0x3ff}, {0x4, 0x5, 0x5d}, {0x75d23712, 0x8, 0x6}, {0x8, 0xde, 0x42e}, {0xea09, 0x81}, {0x9, 0x2, 0x3}, {0x2e47, 0x8, 0x81}, {0x3, 0x6, 0x7ff}, {0x7, 0x8, 0xfffff979}, {0x1f, 0x8, 0x1f}, {0x200, 0x7, 0x3}, {0x6897bc41, 0x7, 0x3}, {0x9, 0x80000000, 0x9}, {0x1ff, 0x1f, 0xffff}, {0x54, 0x9, 0x81}, {0xffffffff, 0x9cea, 0x3}, {0x7f, 0x7f, 0x3}, {0x800, 0x9, 0x6}, {0x5, 0xc46, 0x8000}, {0x0, 0x3, 0x8}, {0x2, 0x3}, {0x430, 0x2, 0x1ff}, {0x7ff, 0x20, 0x3}, {0x3, 0x7, 0xb06}, {0x6, 0x4, 0x2}, {0x401, 0x4, 0x9}, {0x5, 0x7, 0x3}, {0x5, 0x5, 0x1ff}, {0x10000, 0x4, 0x9}, {0x3f, 0xed71, 0xf549}, {0x20, 0x101, 0x4}, {0xfffffffe, 0xbe6a, 0x8000}, {0x9, 0x9, 0x3}, {0x2, 0x5, 0x2}, {0x3, 0x5, 0x4}]}) 06:55:23 executing program 1: syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) (async) r0 = syz_open_dev$usbfs(&(0x7f0000000380), 0x6e665f53, 0x0) ioctl$USBDEVFS_CLEAR_HALT(r0, 0x80045515, 0x0) (async) ioctl$USBDEVFS_SUBMITURB(r0, 0x802c550a, &(0x7f0000000200)=@urb_type_control={0x2, {0x3, 0x1}, 0xfc48, 0x81, &(0x7f0000000040)={0x2, 0x15, 0x8, 0x1000, 0x3}, 0x8, 0x3, 0x949, 0x0, 0x8, 0x8008, &(0x7f0000000080)="8e67ede68b7abf5fd002f8aabee29d2fa5887dae93146dc8ba92cd02e405e18307b4872cf4bea8ed780e90b22910cc0ff3ef92d6bbd86723ab2bfd190bf65588ad13840131730d6c271c2a0ff0873bf730c93e40c00c176f7b6288f295bc14b09bf84f3ea0b0cc54e0b1b9723e9632d13c459d99bb75b0006e8eb120e62af02856b23a587ed18a07f10980cb371bb2b17e759ebe86ed5deec7f27395eadc52fafb595c778938b15c9285cc1ab6d75752d4e5b09e7a2396f9af186cfc4faa63a6c568b984d34c2ceceb2114407aae71e98168a45242726c9326f448"}) 06:55:23 executing program 0: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x8008551c, &(0x7f0000000200)=@urb_type_bulk={0x3, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0}) 06:55:23 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x2429c0) ioctl$USBDEVFS_SUBMITURB(r0, 0x8008551c, &(0x7f0000000200)=@urb_type_bulk={0x3, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x1, 0x186802) ioctl$USBDEVFS_RELEASEINTERFACE(r1, 0x80045510, &(0x7f0000000080)=0x7fffffff) 06:55:23 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x0) ioctl$USBDEVFS_SUBMITURB(r0, 0x802c550a, &(0x7f0000000200)=@urb_type_bulk={0x2, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 06:55:23 executing program 1: syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) r0 = syz_open_dev$usbfs(&(0x7f0000000380), 0x6e665f53, 0x0) ioctl$USBDEVFS_CLEAR_HALT(r0, 0x80045515, 0x0) (async) ioctl$USBDEVFS_CLEAR_HALT(r0, 0x80045515, 0x0) ioctl$USBDEVFS_SUBMITURB(r0, 0x802c550a, &(0x7f0000000200)=@urb_type_control={0x2, {0x3, 0x1}, 0xfc48, 0x81, &(0x7f0000000040)={0x2, 0x15, 0x8, 0x1000, 0x3}, 0x8, 0x3, 0x949, 0x0, 0x8, 0x8008, &(0x7f0000000080)="8e67ede68b7abf5fd002f8aabee29d2fa5887dae93146dc8ba92cd02e405e18307b4872cf4bea8ed780e90b22910cc0ff3ef92d6bbd86723ab2bfd190bf65588ad13840131730d6c271c2a0ff0873bf730c93e40c00c176f7b6288f295bc14b09bf84f3ea0b0cc54e0b1b9723e9632d13c459d99bb75b0006e8eb120e62af02856b23a587ed18a07f10980cb371bb2b17e759ebe86ed5deec7f27395eadc52fafb595c778938b15c9285cc1ab6d75752d4e5b09e7a2396f9af186cfc4faa63a6c568b984d34c2ceceb2114407aae71e98168a45242726c9326f448"}) 06:55:23 executing program 0: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x550b, &(0x7f0000000200)=@urb_type_bulk={0x3, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 06:55:23 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x0) ioctl$USBDEVFS_SUBMITURB(r0, 0x802c550a, &(0x7f0000000140)=@urb_type_iso={0x0, {0x6}, 0x101, 0x1, &(0x7f0000000080)="1cb2bd03b5706bb872944e8c91006b5f437f21f0df51edb451ce867e7cc07482da352683b3fb8af7554195f3983bb3ddf94414e477191fd500fddd674deada6d3dc55638beb49ed739d1", 0x4a, 0x6, 0x20000000, 0x4b, 0x2, 0x1, &(0x7f0000000100)="5cf209fef7de04f14a1dc41da8d1a9b349f810a49f5cc02f98abccd91ac755550e7c0478127d611c90fabf4ffbb4c7afb16bbb4bc05e7fc7d9a6798c4930ca", [{0x8, 0x5, 0x100}, {0x40, 0x5, 0x3}, {0x8000, 0x5, 0x1}, {0x8, 0x2, 0x7f}, {0x9, 0x0, 0x4d}, {0x9, 0x8b88, 0x1}, {0x81, 0x5, 0x3ff}, {0xffffffff, 0xfffffff7, 0x5}, {0x7fffffff, 0x417, 0x40}, {0x401, 0x1, 0x950}, {0x6, 0xfff, 0x4}, {0x0, 0x8, 0x8}, {0xcd6fcee5, 0x4, 0xffffffff}, {0x7, 0x9, 0x9}, {0x3230fea4, 0x1ff, 0x401}, {0xf3d, 0xad, 0x2}, {0x7, 0x5, 0x8}, {0x800, 0xfffffffd, 0xff}, {0x5, 0x3, 0x7}, {0x7fffffff, 0x101, 0x1ff}, {0x11bb7e2, 0xe52}, {0x1, 0xffffffff, 0x7}, {0x3, 0x0, 0x4}, {0x1f, 0x80, 0x6}, {0x80, 0x9a, 0x1}, {0x3, 0xffff, 0xffff}, {0x81, 0x3, 0x8}, {0x0, 0x8, 0x400}, {0xfffffe01, 0x100, 0xf55}, {0x10001, 0xff, 0x7}, {0x2, 0x80000001, 0x7}, {0x4, 0xc708, 0x3ff}, {0x1, 0x7, 0x3}, {0x339, 0x8, 0x2}, {0x101, 0xffffffff, 0x10001}, {0x3, 0xff, 0x3}, {0x6b, 0xb0f, 0x5}, {0x7ff, 0x9, 0x7de5}, {0x80000001, 0x7f, 0x2}, {0x8, 0x6}, {0x3, 0x8001, 0x3ff}, {0x4, 0x5, 0x5d}, {0x75d23712, 0x8, 0x6}, {0x8, 0xde, 0x42e}, {0xea09, 0x81}, {0x9, 0x2, 0x3}, {0x2e47, 0x8, 0x81}, {0x3, 0x6, 0x7ff}, {0x7, 0x8, 0xfffff979}, {0x1f, 0x8, 0x1f}, {0x200, 0x7, 0x3}, {0x6897bc41, 0x7, 0x3}, {0x9, 0x80000000, 0x9}, {0x1ff, 0x1f, 0xffff}, {0x54, 0x9, 0x81}, {0xffffffff, 0x9cea, 0x3}, {0x7f, 0x7f, 0x3}, {0x800, 0x9, 0x6}, {0x5, 0xc46, 0x8000}, {0x0, 0x3, 0x8}, {0x2, 0x3}, {0x430, 0x2, 0x1ff}, {0x7ff, 0x20, 0x3}, {0x3, 0x7, 0xb06}, {0x6, 0x4, 0x2}, {0x401, 0x4, 0x9}, {0x5, 0x7, 0x3}, {0x5, 0x5, 0x1ff}, {0x10000, 0x4, 0x9}, {0x3f, 0xed71, 0xf549}, {0x20, 0x101, 0x4}, {0xfffffffe, 0xbe6a, 0x8000}, {0x9, 0x9, 0x3}, {0x2, 0x5, 0x2}, {0x3, 0x5, 0x4}]}) 06:55:23 executing program 0: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x5460, &(0x7f0000000200)=@urb_type_bulk={0x3, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 06:55:23 executing program 4: openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) 06:55:23 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x0) ioctl$USBDEVFS_SUBMITURB(r0, 0x802c550a, &(0x7f0000000200)=@urb_type_bulk={0x2, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 06:55:23 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x2429c0) ioctl$USBDEVFS_SUBMITURB(r0, 0x8008551c, &(0x7f0000000200)=@urb_type_bulk={0x3, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x1, 0x186802) ioctl$USBDEVFS_RELEASEINTERFACE(r1, 0x80045510, &(0x7f0000000080)=0x7fffffff) syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x2429c0) (async) ioctl$USBDEVFS_SUBMITURB(r0, 0x8008551c, &(0x7f0000000200)=@urb_type_bulk={0x3, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) (async) syz_open_dev$usbfs(&(0x7f0000000040), 0x1, 0x186802) (async) ioctl$USBDEVFS_RELEASEINTERFACE(r1, 0x80045510, &(0x7f0000000080)=0x7fffffff) (async) 06:55:23 executing program 1: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) syz_genetlink_get_family_id$fou(&(0x7f0000000040), 0xffffffffffffffff) ioctl$USBDEVFS_RELEASE_PORT(r0, 0x80045519, &(0x7f0000000080)=0x1000) ioctl$USBDEVFS_SUBMITURB(r0, 0x802c550a, &(0x7f0000000200)=@urb_type_bulk={0x3, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x2, 0x0}) 06:55:23 executing program 3: syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(0xffffffffffffffff, 0x802c550a, &(0x7f0000000140)=@urb_type_iso={0x0, {0x6}, 0x101, 0x1, &(0x7f0000000080)="1cb2bd03b5706bb872944e8c91006b5f437f21f0df51edb451ce867e7cc07482da352683b3fb8af7554195f3983bb3ddf94414e477191fd500fddd674deada6d3dc55638beb49ed739d1", 0x4a, 0x6, 0x20000000, 0x4b, 0x2, 0x1, &(0x7f0000000100)="5cf209fef7de04f14a1dc41da8d1a9b349f810a49f5cc02f98abccd91ac755550e7c0478127d611c90fabf4ffbb4c7afb16bbb4bc05e7fc7d9a6798c4930ca", [{0x8, 0x5, 0x100}, {0x40, 0x5, 0x3}, {0x8000, 0x5, 0x1}, {0x8, 0x2, 0x7f}, {0x9, 0x0, 0x4d}, {0x9, 0x8b88, 0x1}, {0x81, 0x5, 0x3ff}, {0xffffffff, 0xfffffff7, 0x5}, {0x7fffffff, 0x417, 0x40}, {0x401, 0x1, 0x950}, {0x6, 0xfff, 0x4}, {0x0, 0x8, 0x8}, {0xcd6fcee5, 0x4, 0xffffffff}, {0x7, 0x9, 0x9}, {0x3230fea4, 0x1ff, 0x401}, {0xf3d, 0xad, 0x2}, {0x7, 0x5, 0x8}, {0x800, 0xfffffffd, 0xff}, {0x5, 0x3, 0x7}, {0x7fffffff, 0x101, 0x1ff}, {0x11bb7e2, 0xe52}, {0x1, 0xffffffff, 0x7}, {0x3, 0x0, 0x4}, {0x1f, 0x80, 0x6}, {0x80, 0x9a, 0x1}, {0x3, 0xffff, 0xffff}, {0x81, 0x3, 0x8}, {0x0, 0x8, 0x400}, {0xfffffe01, 0x100, 0xf55}, {0x10001, 0xff, 0x7}, {0x2, 0x80000001, 0x7}, {0x4, 0xc708, 0x3ff}, {0x1, 0x7, 0x3}, {0x339, 0x8, 0x2}, {0x101, 0xffffffff, 0x10001}, {0x3, 0xff, 0x3}, {0x6b, 0xb0f, 0x5}, {0x7ff, 0x9, 0x7de5}, {0x80000001, 0x7f, 0x2}, {0x8, 0x6}, {0x3, 0x8001, 0x3ff}, {0x4, 0x5, 0x5d}, {0x75d23712, 0x8, 0x6}, {0x8, 0xde, 0x42e}, {0xea09, 0x81}, {0x9, 0x2, 0x3}, {0x2e47, 0x8, 0x81}, {0x3, 0x6, 0x7ff}, {0x7, 0x8, 0xfffff979}, {0x1f, 0x8, 0x1f}, {0x200, 0x7, 0x3}, {0x6897bc41, 0x7, 0x3}, {0x9, 0x80000000, 0x9}, {0x1ff, 0x1f, 0xffff}, {0x54, 0x9, 0x81}, {0xffffffff, 0x9cea, 0x3}, {0x7f, 0x7f, 0x3}, {0x800, 0x9, 0x6}, {0x5, 0xc46, 0x8000}, {0x0, 0x3, 0x8}, {0x2, 0x3}, {0x430, 0x2, 0x1ff}, {0x7ff, 0x20, 0x3}, {0x3, 0x7, 0xb06}, {0x6, 0x4, 0x2}, {0x401, 0x4, 0x9}, {0x5, 0x7, 0x3}, {0x5, 0x5, 0x1ff}, {0x10000, 0x4, 0x9}, {0x3f, 0xed71, 0xf549}, {0x20, 0x101, 0x4}, {0xfffffffe, 0xbe6a, 0x8000}, {0x9, 0x9, 0x3}, {0x2, 0x5, 0x2}, {0x3, 0x5, 0x4}]}) 06:55:23 executing program 1: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) syz_genetlink_get_family_id$fou(&(0x7f0000000040), 0xffffffffffffffff) ioctl$USBDEVFS_RELEASE_PORT(r0, 0x80045519, &(0x7f0000000080)=0x1000) ioctl$USBDEVFS_SUBMITURB(r0, 0x802c550a, &(0x7f0000000200)=@urb_type_bulk={0x3, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x2, 0x0}) syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) (async) syz_genetlink_get_family_id$fou(&(0x7f0000000040), 0xffffffffffffffff) (async) ioctl$USBDEVFS_RELEASE_PORT(r0, 0x80045519, &(0x7f0000000080)=0x1000) (async) ioctl$USBDEVFS_SUBMITURB(r0, 0x802c550a, &(0x7f0000000200)=@urb_type_bulk={0x3, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x2, 0x0}) (async) 06:55:23 executing program 4: openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) 06:55:23 executing program 0: bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0xe0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2c, &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000240)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f0000000280), &(0x7f00000002c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000300)}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000500)={0x9, 0x6, &(0x7f0000000000)=@raw=[@jmp={0x5, 0x1, 0x9, 0x8, 0x4, 0xffffffffffffffe0, 0xfffffffffffffffc}, @alu={0x3, 0x1, 0x7, 0xa867116f2783c5dd, 0x0, 0x8, 0x4}, @generic={0x3, 0x2, 0xb, 0x9, 0x3ff}, @map_idx={0x18, 0x6, 0x5, 0x0, 0x8}, @alu={0x7, 0x0, 0x1, 0x0, 0x6, 0xfffffffffffffff4, 0x8}], &(0x7f0000000040)='syzkaller\x00', 0x800, 0xe4, &(0x7f0000000080)=""/228, 0x41000, 0x1, '\x00', r0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000480), 0x8, 0x10, 0x0}, 0x80) sendmsg$TCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f0000000dc0)={&(0x7f0000000b40)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000d80)={&(0x7f0000000b80)={0x1f8, 0x12, 0x20, 0x70bd2a, 0x25dfdbfb, {0x11, 0x0, 0x20, 0x9, {0x4e20, 0x4e20, [0x7, 0x7, 0x6, 0x2], [0x7bdc, 0x1ff, 0x7b], r0, [0x8, 0x5aaf4957]}, 0x2, 0x3}, [@INET_DIAG_REQ_BYTECODE={0x97, 0x1, "1e577e02ddfb1c872df87dee181728a6877a0912e744da1ea8293edfdf76614b5fb9ab83813da6fec234c65a104ba689c191c808aa84db70f28525e7273cd01e27984e8a3edc4c9ac0d697fc768f1f57577c9e4ce9a9cc4ed2055c0112d38e7c0c2877a14fd69fd456754466b050dd7ba375e7aa16b140d0775fe99feb31d86defbf32fba5a8d4fd5b2820dad7d1c087c864b2"}, @INET_DIAG_REQ_BYTECODE={0x36, 0x1, "844a680c14e94870c4c0e70ca3d5c519d24a08f30a723173986805554d74eb15ba5bc6fbe51757e95dfc10b778e19f8fdbf7"}, @INET_DIAG_REQ_BYTECODE={0xdc, 0x1, "a456ac902a8fbfc17944772974043b4d8330dbbc57989948ffe7f0b93cd6fb839110e57879e6466562d238d4ce72c700106b5dd4d51510538c93d384609cd1d982d191f35e282df93d6e5f7f5988342a609c23bc0fabcc6d4d180b662ee1db665b28a5800d74f7ad6a647b60caff708eec67d887689cd16abf0c1a859913d5d97ce30acec22b059ffdf0b2b9cae055a2c03b8c490b51e5faffc0fbbbe8cec87d1522577760937e7375b03a493c9d30443da7af504932de189d2bef6c2055fc515bf11175c65bba681b6ba56a1da42aa0db1a882908f3eaed"}]}, 0x1f8}, 0x1, 0x0, 0x0, 0x810}, 0x8000) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f00000009c0)=@broute={'broute\x00', 0x20, 0x4, 0x730, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000280], 0x0, &(0x7f0000000240), &(0x7f0000000280)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffc, 0x2, [{0x11, 0x0, 0xa00, 'pim6reg0\x00', 'pim6reg0\x00', 'batadv_slave_1\x00', 'wg1\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}, [0x0, 0x0, 0x0, 0xff, 0xff, 0xff], @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, [0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0xbe, 0x186, 0x1b6, [@ipvs={{'ipvs\x00', 0x0, 0x28}, {{@ipv6=@private0, [0x0, 0xffffffff, 0xff, 0xff], 0x4e21, 0x2c, 0x2, 0x4e22, 0x2, 0x24}}}], [@common=@log={'log\x00', 0x28, {{0x0, "5f119e762c1db8de448ce4c4951f940dbda1c0713447e2253d711c9f5fb8"}}}, @common=@nflog={'nflog\x00', 0x50, {{0x4000000, 0xda4c, 0x0, 0x0, 0x0, "220a217b6622766d6beabf834dc7752e9751a2af1afcb8f21e740e1c88edbad8c288914392d3106e43c700647cb44cbd16cf3b49a85af1a029ec728ab6da7e6a"}}}], @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {0x9, 0x7b, 0x892f, 'macsec0\x00', 'bridge_slave_0\x00', 'syz_tun\x00', '\x00', @empty, [0x0, 0x101], @local, [0xff], 0xbe, 0x10e, 0x23e, [@helper={{'helper\x00', 0x0, 0x28}, {{0x0, 'Q.931\x00'}}}], [@common=@log={'log\x00', 0x28, {{0x5, "189d851d5ecbbfdaed3d24ffc0d5e2d55f76f91940db106f1f47620a5c01"}}}], @common=@SECMARK={'SECMARK\x00', 0x108, {{0x1, 0x2, 'system_u:object_r:mount_tmp_t:s0\x00'}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x1, [{0x5, 0x40, 0x8808, 'veth1_virt_wifi\x00', 'dvmrp0\x00', 'veth1_to_team\x00', 'pim6reg\x00', @broadcast, [0x0, 0xff, 0xff, 0x0, 0xff], @multicast, [0x0, 0x0, 0xff, 0x0, 0xff, 0xff], 0xee, 0x11e, 0x166, [@quota={{'quota\x00', 0x0, 0x18}, {{0x0, 0x0, 0x9, {0xffffffffffffff04}}}}, @connbytes={{'connbytes\x00', 0x0, 0x18}, {{[{0x80000001}, {0x1}], 0x0, 0x2}}}], [@common=@redirect={'redirect\x00', 0x8, {{0xfffffffffffffffe}}}], @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00', 0x2, 0xd0, {0x9}}}}}]}, {0x0, '\x00', 0x3, 0xfffffffffffffffc, 0x1, [{0x9, 0x14, 0x88ca, 'team_slave_1\x00', 'macsec0\x00', 'vlan0\x00', 'bond_slave_0\x00', @random="86be302db618", [0x0, 0x0, 0x0, 0xff, 0xff], @dev={'\xaa\xaa\xaa\xaa\xaa', 0x8}, [0xff, 0xff, 0x80, 0xff, 0x0, 0xff], 0x9e, 0xe6, 0x116, [@cpu={{'cpu\x00', 0x0, 0x8}, {{0x6}}}], [@common=@ERROR={'ERROR\x00', 0x20, {"be6cc5036378604a89760d44c5bed06b1ae293c34e0ae2528bea3becc196"}}], @common=@NFQUEUE0={'NFQUEUE\x00', 0x8, {{0x4092}}}}]}]}, 0x7a8) r1 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) r2 = syz_open_dev$usbfs(&(0x7f0000000080), 0x5, 0x109003) ioctl$USBDEVFS_GETDRIVER(r2, 0x41045508, &(0x7f00000000c0)={0x80000000, "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"}) ioctl$USBDEVFS_SUBMITURB(r1, 0x8038550a, &(0x7f0000000200)=@urb_type_control={0x2, {0x2}, 0xfffffffb, 0x4, &(0x7f0000000a40)={0x80, 0x16, 0x2005, 0x7, 0x8}, 0x8, 0xf8, 0x7, 0x0, 0x0, 0x5, &(0x7f0000000a80)="cfc206af3b20cc76f92c2426377a243c9d8d6008fafd2fd67138c6b064102eec84099eccfeb5a4b8a5f3f11f2b3a7efc7bb159fd9e2cfe9dfc7021a27eef2f1b8a14ae37ef3f5850a71385fa82e17ca63c6617a30e1bc3576e8ee08aac39ab0a21c7d06379bcc8bd197b3c4706285c7606cc6c43a9f9a4485fa40997c39a4da54d472ef5eb63dbcb91c23e669d6e8836e2269a1d466533236ed3bd"}) ioctl$USBDEVFS_REAPURB(r1, 0x4008550c, &(0x7f0000000040)) 06:55:23 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x0) ioctl$USBDEVFS_SUBMITURB(r0, 0x802c550a, &(0x7f0000000200)=@urb_type_bulk={0x2, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 06:55:23 executing program 3: syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(0xffffffffffffffff, 0x802c550a, &(0x7f0000000140)=@urb_type_iso={0x0, {0x6}, 0x101, 0x1, &(0x7f0000000080)="1cb2bd03b5706bb872944e8c91006b5f437f21f0df51edb451ce867e7cc07482da352683b3fb8af7554195f3983bb3ddf94414e477191fd500fddd674deada6d3dc55638beb49ed739d1", 0x4a, 0x6, 0x20000000, 0x4b, 0x2, 0x1, &(0x7f0000000100)="5cf209fef7de04f14a1dc41da8d1a9b349f810a49f5cc02f98abccd91ac755550e7c0478127d611c90fabf4ffbb4c7afb16bbb4bc05e7fc7d9a6798c4930ca", [{0x8, 0x5, 0x100}, {0x40, 0x5, 0x3}, {0x8000, 0x5, 0x1}, {0x8, 0x2, 0x7f}, {0x9, 0x0, 0x4d}, {0x9, 0x8b88, 0x1}, {0x81, 0x5, 0x3ff}, {0xffffffff, 0xfffffff7, 0x5}, {0x7fffffff, 0x417, 0x40}, {0x401, 0x1, 0x950}, {0x6, 0xfff, 0x4}, {0x0, 0x8, 0x8}, {0xcd6fcee5, 0x4, 0xffffffff}, {0x7, 0x9, 0x9}, {0x3230fea4, 0x1ff, 0x401}, {0xf3d, 0xad, 0x2}, {0x7, 0x5, 0x8}, {0x800, 0xfffffffd, 0xff}, {0x5, 0x3, 0x7}, {0x7fffffff, 0x101, 0x1ff}, {0x11bb7e2, 0xe52}, {0x1, 0xffffffff, 0x7}, {0x3, 0x0, 0x4}, {0x1f, 0x80, 0x6}, {0x80, 0x9a, 0x1}, {0x3, 0xffff, 0xffff}, {0x81, 0x3, 0x8}, {0x0, 0x8, 0x400}, {0xfffffe01, 0x100, 0xf55}, {0x10001, 0xff, 0x7}, {0x2, 0x80000001, 0x7}, {0x4, 0xc708, 0x3ff}, {0x1, 0x7, 0x3}, {0x339, 0x8, 0x2}, {0x101, 0xffffffff, 0x10001}, {0x3, 0xff, 0x3}, {0x6b, 0xb0f, 0x5}, {0x7ff, 0x9, 0x7de5}, {0x80000001, 0x7f, 0x2}, {0x8, 0x6}, {0x3, 0x8001, 0x3ff}, {0x4, 0x5, 0x5d}, {0x75d23712, 0x8, 0x6}, {0x8, 0xde, 0x42e}, {0xea09, 0x81}, {0x9, 0x2, 0x3}, {0x2e47, 0x8, 0x81}, {0x3, 0x6, 0x7ff}, {0x7, 0x8, 0xfffff979}, {0x1f, 0x8, 0x1f}, {0x200, 0x7, 0x3}, {0x6897bc41, 0x7, 0x3}, {0x9, 0x80000000, 0x9}, {0x1ff, 0x1f, 0xffff}, {0x54, 0x9, 0x81}, {0xffffffff, 0x9cea, 0x3}, {0x7f, 0x7f, 0x3}, {0x800, 0x9, 0x6}, {0x5, 0xc46, 0x8000}, {0x0, 0x3, 0x8}, {0x2, 0x3}, {0x430, 0x2, 0x1ff}, {0x7ff, 0x20, 0x3}, {0x3, 0x7, 0xb06}, {0x6, 0x4, 0x2}, {0x401, 0x4, 0x9}, {0x5, 0x7, 0x3}, {0x5, 0x5, 0x1ff}, {0x10000, 0x4, 0x9}, {0x3f, 0xed71, 0xf549}, {0x20, 0x101, 0x4}, {0xfffffffe, 0xbe6a, 0x8000}, {0x9, 0x9, 0x3}, {0x2, 0x5, 0x2}, {0x3, 0x5, 0x4}]}) 06:55:23 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x2429c0) ioctl$USBDEVFS_SUBMITURB(r0, 0x8008551c, &(0x7f0000000200)=@urb_type_bulk={0x3, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x1, 0x186802) ioctl$USBDEVFS_RELEASEINTERFACE(r1, 0x80045510, &(0x7f0000000080)=0x7fffffff) syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x2429c0) (async) ioctl$USBDEVFS_SUBMITURB(r0, 0x8008551c, &(0x7f0000000200)=@urb_type_bulk={0x3, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) (async) syz_open_dev$usbfs(&(0x7f0000000040), 0x1, 0x186802) (async) ioctl$USBDEVFS_RELEASEINTERFACE(r1, 0x80045510, &(0x7f0000000080)=0x7fffffff) (async) 06:55:23 executing program 4: openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) 06:55:23 executing program 3: syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(0xffffffffffffffff, 0x802c550a, &(0x7f0000000140)=@urb_type_iso={0x0, {0x6}, 0x101, 0x1, &(0x7f0000000080)="1cb2bd03b5706bb872944e8c91006b5f437f21f0df51edb451ce867e7cc07482da352683b3fb8af7554195f3983bb3ddf94414e477191fd500fddd674deada6d3dc55638beb49ed739d1", 0x4a, 0x6, 0x20000000, 0x4b, 0x2, 0x1, &(0x7f0000000100)="5cf209fef7de04f14a1dc41da8d1a9b349f810a49f5cc02f98abccd91ac755550e7c0478127d611c90fabf4ffbb4c7afb16bbb4bc05e7fc7d9a6798c4930ca", [{0x8, 0x5, 0x100}, {0x40, 0x5, 0x3}, {0x8000, 0x5, 0x1}, {0x8, 0x2, 0x7f}, {0x9, 0x0, 0x4d}, {0x9, 0x8b88, 0x1}, {0x81, 0x5, 0x3ff}, {0xffffffff, 0xfffffff7, 0x5}, {0x7fffffff, 0x417, 0x40}, {0x401, 0x1, 0x950}, {0x6, 0xfff, 0x4}, {0x0, 0x8, 0x8}, {0xcd6fcee5, 0x4, 0xffffffff}, {0x7, 0x9, 0x9}, {0x3230fea4, 0x1ff, 0x401}, {0xf3d, 0xad, 0x2}, {0x7, 0x5, 0x8}, {0x800, 0xfffffffd, 0xff}, {0x5, 0x3, 0x7}, {0x7fffffff, 0x101, 0x1ff}, {0x11bb7e2, 0xe52}, {0x1, 0xffffffff, 0x7}, {0x3, 0x0, 0x4}, {0x1f, 0x80, 0x6}, {0x80, 0x9a, 0x1}, {0x3, 0xffff, 0xffff}, {0x81, 0x3, 0x8}, {0x0, 0x8, 0x400}, {0xfffffe01, 0x100, 0xf55}, {0x10001, 0xff, 0x7}, {0x2, 0x80000001, 0x7}, {0x4, 0xc708, 0x3ff}, {0x1, 0x7, 0x3}, {0x339, 0x8, 0x2}, {0x101, 0xffffffff, 0x10001}, {0x3, 0xff, 0x3}, {0x6b, 0xb0f, 0x5}, {0x7ff, 0x9, 0x7de5}, {0x80000001, 0x7f, 0x2}, {0x8, 0x6}, {0x3, 0x8001, 0x3ff}, {0x4, 0x5, 0x5d}, {0x75d23712, 0x8, 0x6}, {0x8, 0xde, 0x42e}, {0xea09, 0x81}, {0x9, 0x2, 0x3}, {0x2e47, 0x8, 0x81}, {0x3, 0x6, 0x7ff}, {0x7, 0x8, 0xfffff979}, {0x1f, 0x8, 0x1f}, {0x200, 0x7, 0x3}, {0x6897bc41, 0x7, 0x3}, {0x9, 0x80000000, 0x9}, {0x1ff, 0x1f, 0xffff}, {0x54, 0x9, 0x81}, {0xffffffff, 0x9cea, 0x3}, {0x7f, 0x7f, 0x3}, {0x800, 0x9, 0x6}, {0x5, 0xc46, 0x8000}, {0x0, 0x3, 0x8}, {0x2, 0x3}, {0x430, 0x2, 0x1ff}, {0x7ff, 0x20, 0x3}, {0x3, 0x7, 0xb06}, {0x6, 0x4, 0x2}, {0x401, 0x4, 0x9}, {0x5, 0x7, 0x3}, {0x5, 0x5, 0x1ff}, {0x10000, 0x4, 0x9}, {0x3f, 0xed71, 0xf549}, {0x20, 0x101, 0x4}, {0xfffffffe, 0xbe6a, 0x8000}, {0x9, 0x9, 0x3}, {0x2, 0x5, 0x2}, {0x3, 0x5, 0x4}]}) 06:55:23 executing program 2: syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(0xffffffffffffffff, 0x802c550a, &(0x7f0000000200)=@urb_type_bulk={0x2, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 06:55:23 executing program 1: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) syz_genetlink_get_family_id$fou(&(0x7f0000000040), 0xffffffffffffffff) ioctl$USBDEVFS_RELEASE_PORT(r0, 0x80045519, &(0x7f0000000080)=0x1000) ioctl$USBDEVFS_SUBMITURB(r0, 0x802c550a, &(0x7f0000000200)=@urb_type_bulk={0x3, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x2, 0x0}) 06:55:23 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) 06:55:23 executing program 1: r0 = accept4$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @dev}, &(0x7f00000000c0)=0x10, 0x80800) setsockopt$IP_VS_SO_SET_EDIT(r0, 0x0, 0x483, &(0x7f0000000100)={0x29, @loopback, 0x4e23, 0x3, 'wrr\x00', 0x0, 0x0, 0x64}, 0x2c) r1 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r1, 0x802c550a, &(0x7f0000000200)=@urb_type_bulk={0x3, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r2 = syz_open_dev$usbfs(&(0x7f0000000380), 0x6e665f53, 0x0) ioctl$USBDEVFS_CLEAR_HALT(r2, 0x80045515, 0x0) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000000140)={0x0, @multicast2, @local}, &(0x7f0000000180)=0xc) ioctl$USBDEVFS_FREE_STREAMS(r2, 0x8008551d, &(0x7f0000000040)=ANY=[@ANYBLOB="ece900001a0000000b848584860d42c4b9088b0a8c8808870c868d8605d02d271f"]) 06:55:23 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x8008551c, &(0x7f0000000200)=@urb_type_bulk={0x3, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x3ff, 0x0) ioctl$USBDEVFS_RESET(r1, 0x5514) 06:55:23 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x802c550a, 0x0) 06:55:24 executing program 0: bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0xe0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2c, &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000240)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f0000000280), &(0x7f00000002c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000300)}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000500)={0x9, 0x6, &(0x7f0000000000)=@raw=[@jmp={0x5, 0x1, 0x9, 0x8, 0x4, 0xffffffffffffffe0, 0xfffffffffffffffc}, @alu={0x3, 0x1, 0x7, 0xa867116f2783c5dd, 0x0, 0x8, 0x4}, @generic={0x3, 0x2, 0xb, 0x9, 0x3ff}, @map_idx={0x18, 0x6, 0x5, 0x0, 0x8}, @alu={0x7, 0x0, 0x1, 0x0, 0x6, 0xfffffffffffffff4, 0x8}], &(0x7f0000000040)='syzkaller\x00', 0x800, 0xe4, &(0x7f0000000080)=""/228, 0x41000, 0x1, '\x00', r0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000480), 0x8, 0x10, 0x0}, 0x80) sendmsg$TCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f0000000dc0)={&(0x7f0000000b40)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000d80)={&(0x7f0000000b80)={0x1f8, 0x12, 0x20, 0x70bd2a, 0x25dfdbfb, {0x11, 0x0, 0x20, 0x9, {0x4e20, 0x4e20, [0x7, 0x7, 0x6, 0x2], [0x7bdc, 0x1ff, 0x7b], r0, [0x8, 0x5aaf4957]}, 0x2, 0x3}, [@INET_DIAG_REQ_BYTECODE={0x97, 0x1, "1e577e02ddfb1c872df87dee181728a6877a0912e744da1ea8293edfdf76614b5fb9ab83813da6fec234c65a104ba689c191c808aa84db70f28525e7273cd01e27984e8a3edc4c9ac0d697fc768f1f57577c9e4ce9a9cc4ed2055c0112d38e7c0c2877a14fd69fd456754466b050dd7ba375e7aa16b140d0775fe99feb31d86defbf32fba5a8d4fd5b2820dad7d1c087c864b2"}, @INET_DIAG_REQ_BYTECODE={0x36, 0x1, "844a680c14e94870c4c0e70ca3d5c519d24a08f30a723173986805554d74eb15ba5bc6fbe51757e95dfc10b778e19f8fdbf7"}, @INET_DIAG_REQ_BYTECODE={0xdc, 0x1, "a456ac902a8fbfc17944772974043b4d8330dbbc57989948ffe7f0b93cd6fb839110e57879e6466562d238d4ce72c700106b5dd4d51510538c93d384609cd1d982d191f35e282df93d6e5f7f5988342a609c23bc0fabcc6d4d180b662ee1db665b28a5800d74f7ad6a647b60caff708eec67d887689cd16abf0c1a859913d5d97ce30acec22b059ffdf0b2b9cae055a2c03b8c490b51e5faffc0fbbbe8cec87d1522577760937e7375b03a493c9d30443da7af504932de189d2bef6c2055fc515bf11175c65bba681b6ba56a1da42aa0db1a882908f3eaed"}]}, 0x1f8}, 0x1, 0x0, 0x0, 0x810}, 0x8000) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f00000009c0)=@broute={'broute\x00', 0x20, 0x4, 0x730, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000280], 0x0, &(0x7f0000000240), &(0x7f0000000280)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffc, 0x2, [{0x11, 0x0, 0xa00, 'pim6reg0\x00', 'pim6reg0\x00', 'batadv_slave_1\x00', 'wg1\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}, [0x0, 0x0, 0x0, 0xff, 0xff, 0xff], @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, [0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0xbe, 0x186, 0x1b6, [@ipvs={{'ipvs\x00', 0x0, 0x28}, {{@ipv6=@private0, [0x0, 0xffffffff, 0xff, 0xff], 0x4e21, 0x2c, 0x2, 0x4e22, 0x2, 0x24}}}], [@common=@log={'log\x00', 0x28, {{0x0, "5f119e762c1db8de448ce4c4951f940dbda1c0713447e2253d711c9f5fb8"}}}, @common=@nflog={'nflog\x00', 0x50, {{0x4000000, 0xda4c, 0x0, 0x0, 0x0, "220a217b6622766d6beabf834dc7752e9751a2af1afcb8f21e740e1c88edbad8c288914392d3106e43c700647cb44cbd16cf3b49a85af1a029ec728ab6da7e6a"}}}], @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {0x9, 0x7b, 0x892f, 'macsec0\x00', 'bridge_slave_0\x00', 'syz_tun\x00', '\x00', @empty, [0x0, 0x101], @local, [0xff], 0xbe, 0x10e, 0x23e, [@helper={{'helper\x00', 0x0, 0x28}, {{0x0, 'Q.931\x00'}}}], [@common=@log={'log\x00', 0x28, {{0x5, "189d851d5ecbbfdaed3d24ffc0d5e2d55f76f91940db106f1f47620a5c01"}}}], @common=@SECMARK={'SECMARK\x00', 0x108, {{0x1, 0x2, 'system_u:object_r:mount_tmp_t:s0\x00'}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x1, [{0x5, 0x40, 0x8808, 'veth1_virt_wifi\x00', 'dvmrp0\x00', 'veth1_to_team\x00', 'pim6reg\x00', @broadcast, [0x0, 0xff, 0xff, 0x0, 0xff], @multicast, [0x0, 0x0, 0xff, 0x0, 0xff, 0xff], 0xee, 0x11e, 0x166, [@quota={{'quota\x00', 0x0, 0x18}, {{0x0, 0x0, 0x9, {0xffffffffffffff04}}}}, @connbytes={{'connbytes\x00', 0x0, 0x18}, {{[{0x80000001}, {0x1}], 0x0, 0x2}}}], [@common=@redirect={'redirect\x00', 0x8, {{0xfffffffffffffffe}}}], @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00', 0x2, 0xd0, {0x9}}}}}]}, {0x0, '\x00', 0x3, 0xfffffffffffffffc, 0x1, [{0x9, 0x14, 0x88ca, 'team_slave_1\x00', 'macsec0\x00', 'vlan0\x00', 'bond_slave_0\x00', @random="86be302db618", [0x0, 0x0, 0x0, 0xff, 0xff], @dev={'\xaa\xaa\xaa\xaa\xaa', 0x8}, [0xff, 0xff, 0x80, 0xff, 0x0, 0xff], 0x9e, 0xe6, 0x116, [@cpu={{'cpu\x00', 0x0, 0x8}, {{0x6}}}], [@common=@ERROR={'ERROR\x00', 0x20, {"be6cc5036378604a89760d44c5bed06b1ae293c34e0ae2528bea3becc196"}}], @common=@NFQUEUE0={'NFQUEUE\x00', 0x8, {{0x4092}}}}]}]}, 0x7a8) r1 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) r2 = syz_open_dev$usbfs(&(0x7f0000000080), 0x5, 0x109003) ioctl$USBDEVFS_GETDRIVER(r2, 0x41045508, &(0x7f00000000c0)={0x80000000, "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"}) ioctl$USBDEVFS_SUBMITURB(r1, 0x8038550a, &(0x7f0000000200)=@urb_type_control={0x2, {0x2}, 0xfffffffb, 0x4, &(0x7f0000000a40)={0x80, 0x16, 0x2005, 0x7, 0x8}, 0x8, 0xf8, 0x7, 0x0, 0x0, 0x5, &(0x7f0000000a80)="cfc206af3b20cc76f92c2426377a243c9d8d6008fafd2fd67138c6b064102eec84099eccfeb5a4b8a5f3f11f2b3a7efc7bb159fd9e2cfe9dfc7021a27eef2f1b8a14ae37ef3f5850a71385fa82e17ca63c6617a30e1bc3576e8ee08aac39ab0a21c7d06379bcc8bd197b3c4706285c7606cc6c43a9f9a4485fa40997c39a4da54d472ef5eb63dbcb91c23e669d6e8836e2269a1d466533236ed3bd"}) ioctl$USBDEVFS_REAPURB(r1, 0x4008550c, &(0x7f0000000040)) 06:55:24 executing program 2: syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(0xffffffffffffffff, 0x802c550a, &(0x7f0000000200)=@urb_type_bulk={0x2, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 06:55:24 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x802c550a, 0x0) 06:55:24 executing program 1: r0 = accept4$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @dev}, &(0x7f00000000c0)=0x10, 0x80800) setsockopt$IP_VS_SO_SET_EDIT(r0, 0x0, 0x483, &(0x7f0000000100)={0x29, @loopback, 0x4e23, 0x3, 'wrr\x00', 0x0, 0x0, 0x64}, 0x2c) r1 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r1, 0x802c550a, &(0x7f0000000200)=@urb_type_bulk={0x3, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r2 = syz_open_dev$usbfs(&(0x7f0000000380), 0x6e665f53, 0x0) ioctl$USBDEVFS_CLEAR_HALT(r2, 0x80045515, 0x0) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000000140)={0x0, @multicast2, @local}, &(0x7f0000000180)=0xc) ioctl$USBDEVFS_FREE_STREAMS(r2, 0x8008551d, &(0x7f0000000040)=ANY=[@ANYBLOB="ece900001a0000000b848584860d42c4b9088b0a8c8808870c868d8605d02d271f"]) accept4$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @dev}, &(0x7f00000000c0)=0x10, 0x80800) (async) setsockopt$IP_VS_SO_SET_EDIT(r0, 0x0, 0x483, &(0x7f0000000100)={0x29, @loopback, 0x4e23, 0x3, 'wrr\x00', 0x0, 0x0, 0x64}, 0x2c) (async) syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) (async) ioctl$USBDEVFS_SUBMITURB(r1, 0x802c550a, &(0x7f0000000200)=@urb_type_bulk={0x3, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) (async) syz_open_dev$usbfs(&(0x7f0000000380), 0x6e665f53, 0x0) (async) ioctl$USBDEVFS_CLEAR_HALT(r2, 0x80045515, 0x0) (async) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000000140)={0x0, @multicast2, @local}, &(0x7f0000000180)=0xc) (async) ioctl$USBDEVFS_FREE_STREAMS(r2, 0x8008551d, &(0x7f0000000040)=ANY=[@ANYBLOB="ece900001a0000000b848584860d42c4b9088b0a8c8808870c868d8605d02d271f"]) (async) 06:55:24 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) 06:55:24 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x8008551c, &(0x7f0000000200)=@urb_type_bulk={0x3, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x3ff, 0x0) ioctl$USBDEVFS_RESET(r1, 0x5514) 06:55:24 executing program 2: syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(0xffffffffffffffff, 0x802c550a, &(0x7f0000000200)=@urb_type_bulk={0x2, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 06:55:24 executing program 1: r0 = accept4$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @dev}, &(0x7f00000000c0)=0x10, 0x80800) setsockopt$IP_VS_SO_SET_EDIT(r0, 0x0, 0x483, &(0x7f0000000100)={0x29, @loopback, 0x4e23, 0x3, 'wrr\x00', 0x0, 0x0, 0x64}, 0x2c) (async) setsockopt$IP_VS_SO_SET_EDIT(r0, 0x0, 0x483, &(0x7f0000000100)={0x29, @loopback, 0x4e23, 0x3, 'wrr\x00', 0x0, 0x0, 0x64}, 0x2c) syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) (async) r1 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r1, 0x802c550a, &(0x7f0000000200)=@urb_type_bulk={0x3, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r2 = syz_open_dev$usbfs(&(0x7f0000000380), 0x6e665f53, 0x0) ioctl$USBDEVFS_CLEAR_HALT(r2, 0x80045515, 0x0) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000000140)={0x0, @multicast2, @local}, &(0x7f0000000180)=0xc) ioctl$USBDEVFS_FREE_STREAMS(r2, 0x8008551d, &(0x7f0000000040)=ANY=[@ANYBLOB="ece900001a0000000b848584860d42c4b9088b0a8c8808870c868d8605d02d271f"]) 06:55:24 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) 06:55:24 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x8008551c, &(0x7f0000000200)=@urb_type_bulk={0x3, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) (async) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x3ff, 0x0) ioctl$USBDEVFS_RESET(r1, 0x5514) 06:55:24 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x802c550a, 0x0) 06:55:24 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x802c550a, 0x0) 06:55:25 executing program 0: bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0xe0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2c, &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000240)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f0000000280), &(0x7f00000002c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000300)}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000500)={0x9, 0x6, &(0x7f0000000000)=@raw=[@jmp={0x5, 0x1, 0x9, 0x8, 0x4, 0xffffffffffffffe0, 0xfffffffffffffffc}, @alu={0x3, 0x1, 0x7, 0xa867116f2783c5dd, 0x0, 0x8, 0x4}, @generic={0x3, 0x2, 0xb, 0x9, 0x3ff}, @map_idx={0x18, 0x6, 0x5, 0x0, 0x8}, @alu={0x7, 0x0, 0x1, 0x0, 0x6, 0xfffffffffffffff4, 0x8}], &(0x7f0000000040)='syzkaller\x00', 0x800, 0xe4, &(0x7f0000000080)=""/228, 0x41000, 0x1, '\x00', r0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000480), 0x8, 0x10, 0x0}, 0x80) sendmsg$TCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f0000000dc0)={&(0x7f0000000b40)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000d80)={&(0x7f0000000b80)={0x1f8, 0x12, 0x20, 0x70bd2a, 0x25dfdbfb, {0x11, 0x0, 0x20, 0x9, {0x4e20, 0x4e20, [0x7, 0x7, 0x6, 0x2], [0x7bdc, 0x1ff, 0x7b], r0, [0x8, 0x5aaf4957]}, 0x2, 0x3}, [@INET_DIAG_REQ_BYTECODE={0x97, 0x1, "1e577e02ddfb1c872df87dee181728a6877a0912e744da1ea8293edfdf76614b5fb9ab83813da6fec234c65a104ba689c191c808aa84db70f28525e7273cd01e27984e8a3edc4c9ac0d697fc768f1f57577c9e4ce9a9cc4ed2055c0112d38e7c0c2877a14fd69fd456754466b050dd7ba375e7aa16b140d0775fe99feb31d86defbf32fba5a8d4fd5b2820dad7d1c087c864b2"}, @INET_DIAG_REQ_BYTECODE={0x36, 0x1, "844a680c14e94870c4c0e70ca3d5c519d24a08f30a723173986805554d74eb15ba5bc6fbe51757e95dfc10b778e19f8fdbf7"}, @INET_DIAG_REQ_BYTECODE={0xdc, 0x1, "a456ac902a8fbfc17944772974043b4d8330dbbc57989948ffe7f0b93cd6fb839110e57879e6466562d238d4ce72c700106b5dd4d51510538c93d384609cd1d982d191f35e282df93d6e5f7f5988342a609c23bc0fabcc6d4d180b662ee1db665b28a5800d74f7ad6a647b60caff708eec67d887689cd16abf0c1a859913d5d97ce30acec22b059ffdf0b2b9cae055a2c03b8c490b51e5faffc0fbbbe8cec87d1522577760937e7375b03a493c9d30443da7af504932de189d2bef6c2055fc515bf11175c65bba681b6ba56a1da42aa0db1a882908f3eaed"}]}, 0x1f8}, 0x1, 0x0, 0x0, 0x810}, 0x8000) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f00000009c0)=@broute={'broute\x00', 0x20, 0x4, 0x730, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000280], 0x0, &(0x7f0000000240), &(0x7f0000000280)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffc, 0x2, [{0x11, 0x0, 0xa00, 'pim6reg0\x00', 'pim6reg0\x00', 'batadv_slave_1\x00', 'wg1\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}, [0x0, 0x0, 0x0, 0xff, 0xff, 0xff], @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, [0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0xbe, 0x186, 0x1b6, [@ipvs={{'ipvs\x00', 0x0, 0x28}, {{@ipv6=@private0, [0x0, 0xffffffff, 0xff, 0xff], 0x4e21, 0x2c, 0x2, 0x4e22, 0x2, 0x24}}}], [@common=@log={'log\x00', 0x28, {{0x0, "5f119e762c1db8de448ce4c4951f940dbda1c0713447e2253d711c9f5fb8"}}}, @common=@nflog={'nflog\x00', 0x50, {{0x4000000, 0xda4c, 0x0, 0x0, 0x0, "220a217b6622766d6beabf834dc7752e9751a2af1afcb8f21e740e1c88edbad8c288914392d3106e43c700647cb44cbd16cf3b49a85af1a029ec728ab6da7e6a"}}}], @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {0x9, 0x7b, 0x892f, 'macsec0\x00', 'bridge_slave_0\x00', 'syz_tun\x00', '\x00', @empty, [0x0, 0x101], @local, [0xff], 0xbe, 0x10e, 0x23e, [@helper={{'helper\x00', 0x0, 0x28}, {{0x0, 'Q.931\x00'}}}], [@common=@log={'log\x00', 0x28, {{0x5, "189d851d5ecbbfdaed3d24ffc0d5e2d55f76f91940db106f1f47620a5c01"}}}], @common=@SECMARK={'SECMARK\x00', 0x108, {{0x1, 0x2, 'system_u:object_r:mount_tmp_t:s0\x00'}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x1, [{0x5, 0x40, 0x8808, 'veth1_virt_wifi\x00', 'dvmrp0\x00', 'veth1_to_team\x00', 'pim6reg\x00', @broadcast, [0x0, 0xff, 0xff, 0x0, 0xff], @multicast, [0x0, 0x0, 0xff, 0x0, 0xff, 0xff], 0xee, 0x11e, 0x166, [@quota={{'quota\x00', 0x0, 0x18}, {{0x0, 0x0, 0x9, {0xffffffffffffff04}}}}, @connbytes={{'connbytes\x00', 0x0, 0x18}, {{[{0x80000001}, {0x1}], 0x0, 0x2}}}], [@common=@redirect={'redirect\x00', 0x8, {{0xfffffffffffffffe}}}], @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00', 0x2, 0xd0, {0x9}}}}}]}, {0x0, '\x00', 0x3, 0xfffffffffffffffc, 0x1, [{0x9, 0x14, 0x88ca, 'team_slave_1\x00', 'macsec0\x00', 'vlan0\x00', 'bond_slave_0\x00', @random="86be302db618", [0x0, 0x0, 0x0, 0xff, 0xff], @dev={'\xaa\xaa\xaa\xaa\xaa', 0x8}, [0xff, 0xff, 0x80, 0xff, 0x0, 0xff], 0x9e, 0xe6, 0x116, [@cpu={{'cpu\x00', 0x0, 0x8}, {{0x6}}}], [@common=@ERROR={'ERROR\x00', 0x20, {"be6cc5036378604a89760d44c5bed06b1ae293c34e0ae2528bea3becc196"}}], @common=@NFQUEUE0={'NFQUEUE\x00', 0x8, {{0x4092}}}}]}]}, 0x7a8) r1 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) r2 = syz_open_dev$usbfs(&(0x7f0000000080), 0x5, 0x109003) ioctl$USBDEVFS_GETDRIVER(r2, 0x41045508, &(0x7f00000000c0)={0x80000000, "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"}) ioctl$USBDEVFS_SUBMITURB(r1, 0x8038550a, &(0x7f0000000200)=@urb_type_control={0x2, {0x2}, 0xfffffffb, 0x4, &(0x7f0000000a40)={0x80, 0x16, 0x2005, 0x7, 0x8}, 0x8, 0xf8, 0x7, 0x0, 0x0, 0x5, &(0x7f0000000a80)="cfc206af3b20cc76f92c2426377a243c9d8d6008fafd2fd67138c6b064102eec84099eccfeb5a4b8a5f3f11f2b3a7efc7bb159fd9e2cfe9dfc7021a27eef2f1b8a14ae37ef3f5850a71385fa82e17ca63c6617a30e1bc3576e8ee08aac39ab0a21c7d06379bcc8bd197b3c4706285c7606cc6c43a9f9a4485fa40997c39a4da54d472ef5eb63dbcb91c23e669d6e8836e2269a1d466533236ed3bd"}) ioctl$USBDEVFS_REAPURB(r1, 0x4008550c, &(0x7f0000000040)) 06:55:25 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) 06:55:25 executing program 1: r0 = socket$igmp6(0xa, 0x3, 0x2) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8933, &(0x7f0000000080)={'wg1\x00'}) setsockopt$MRT6_ASSERT(r0, 0x29, 0xcf, &(0x7f0000000040), 0x4) r1 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r1, 0x802c550a, &(0x7f0000000200)=@urb_type_bulk={0x3, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 06:55:25 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x802c550a, 0x0) 06:55:25 executing program 5: r0 = socket$inet(0x2, 0xa, 0x0) setsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f0000000240), 0x4) accept$inet(r0, 0x0, 0x0) getsockopt$EBT_SO_GET_ENTRIES(r0, 0x0, 0x81, &(0x7f0000000140)={'filter\x00', 0x0, 0x3, 0x52, [0x3, 0x44, 0x5c18, 0x7, 0x4, 0x4], 0x5, &(0x7f0000000040)=[{}, {}, {}, {}, {}], &(0x7f00000000c0)=""/82}, &(0x7f00000001c0)=0x78) r1 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r1, 0x8008551c, &(0x7f0000000200)=@urb_type_bulk={0x3, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 06:55:25 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x802c550a, &(0x7f0000000140)=@urb_type_iso={0x0, {}, 0x101, 0x1, &(0x7f0000000080)="1cb2bd03b5706bb872944e8c91006b5f437f21f0df51edb451ce867e7cc07482da352683b3fb8af7554195f3983bb3ddf94414e477191fd500fddd674deada6d3dc55638beb49ed739d1", 0x4a, 0x6, 0x20000000, 0x4b, 0x2, 0x1, &(0x7f0000000100)="5cf209fef7de04f14a1dc41da8d1a9b349f810a49f5cc02f98abccd91ac755550e7c0478127d611c90fabf4ffbb4c7afb16bbb4bc05e7fc7d9a6798c4930ca", [{0x8, 0x5, 0x100}, {0x40, 0x5, 0x3}, {0x8000, 0x5, 0x1}, {0x8, 0x2, 0x7f}, {0x9, 0x0, 0x4d}, {0x9, 0x8b88, 0x1}, {0x81, 0x5, 0x3ff}, {0xffffffff, 0xfffffff7, 0x5}, {0x7fffffff, 0x417, 0x40}, {0x401, 0x1, 0x950}, {0x6, 0xfff, 0x4}, {0x0, 0x8, 0x8}, {0xcd6fcee5, 0x4, 0xffffffff}, {0x7, 0x9, 0x9}, {0x3230fea4, 0x1ff, 0x401}, {0xf3d, 0xad, 0x2}, {0x7, 0x5, 0x8}, {0x800, 0xfffffffd, 0xff}, {0x5, 0x3, 0x7}, {0x7fffffff, 0x101, 0x1ff}, {0x11bb7e2, 0xe52}, {0x1, 0xffffffff, 0x7}, {0x3, 0x0, 0x4}, {0x1f, 0x80, 0x6}, {0x80, 0x9a, 0x1}, {0x3, 0xffff, 0xffff}, {0x81, 0x3, 0x8}, {0x0, 0x8, 0x400}, {0xfffffe01, 0x100, 0xf55}, {0x10001, 0xff, 0x7}, {0x2, 0x80000001, 0x7}, {0x4, 0xc708, 0x3ff}, {0x1, 0x7, 0x3}, {0x339, 0x8, 0x2}, {0x101, 0xffffffff, 0x10001}, {0x3, 0xff, 0x3}, {0x6b, 0xb0f, 0x5}, {0x7ff, 0x9, 0x7de5}, {0x80000001, 0x7f, 0x2}, {0x8, 0x6}, {0x3, 0x8001, 0x3ff}, {0x4, 0x5, 0x5d}, {0x75d23712, 0x8, 0x6}, {0x8, 0xde, 0x42e}, {0xea09, 0x81}, {0x9, 0x2, 0x3}, {0x2e47, 0x8, 0x81}, {0x3, 0x6, 0x7ff}, {0x7, 0x8, 0xfffff979}, {0x1f, 0x8, 0x1f}, {0x200, 0x7, 0x3}, {0x6897bc41, 0x7, 0x3}, {0x9, 0x80000000, 0x9}, {0x1ff, 0x1f, 0xffff}, {0x54, 0x9, 0x81}, {0xffffffff, 0x9cea, 0x3}, {0x7f, 0x7f, 0x3}, {0x800, 0x9, 0x6}, {0x5, 0xc46, 0x8000}, {0x0, 0x3, 0x8}, {0x2, 0x3}, {0x430, 0x2, 0x1ff}, {0x7ff, 0x20, 0x3}, {0x3, 0x7, 0xb06}, {0x6, 0x4, 0x2}, {0x401, 0x4, 0x9}, {0x5, 0x7, 0x3}, {0x5, 0x5, 0x1ff}, {0x10000, 0x4, 0x9}, {0x3f, 0xed71, 0xf549}, {0x20, 0x101, 0x4}, {0xfffffffe, 0xbe6a, 0x8000}, {0x9, 0x9, 0x3}, {0x2, 0x5, 0x2}, {0x3, 0x5, 0x4}]}) 06:55:25 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) 06:55:25 executing program 5: r0 = socket$inet(0x2, 0xa, 0x0) setsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f0000000240), 0x4) (async) accept$inet(r0, 0x0, 0x0) (async) getsockopt$EBT_SO_GET_ENTRIES(r0, 0x0, 0x81, &(0x7f0000000140)={'filter\x00', 0x0, 0x3, 0x52, [0x3, 0x44, 0x5c18, 0x7, 0x4, 0x4], 0x5, &(0x7f0000000040)=[{}, {}, {}, {}, {}], &(0x7f00000000c0)=""/82}, &(0x7f00000001c0)=0x78) (async) r1 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r1, 0x8008551c, &(0x7f0000000200)=@urb_type_bulk={0x3, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 06:55:25 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x802c550a, &(0x7f0000000140)=@urb_type_iso={0x0, {}, 0x0, 0x1, &(0x7f0000000080)="1cb2bd03b5706bb872944e8c91006b5f437f21f0df51edb451ce867e7cc07482da352683b3fb8af7554195f3983bb3ddf94414e477191fd500fddd674deada6d3dc55638beb49ed739d1", 0x4a, 0x6, 0x20000000, 0x4b, 0x2, 0x1, &(0x7f0000000100)="5cf209fef7de04f14a1dc41da8d1a9b349f810a49f5cc02f98abccd91ac755550e7c0478127d611c90fabf4ffbb4c7afb16bbb4bc05e7fc7d9a6798c4930ca", [{0x8, 0x5, 0x100}, {0x40, 0x5, 0x3}, {0x8000, 0x5, 0x1}, {0x8, 0x2, 0x7f}, {0x9, 0x0, 0x4d}, {0x9, 0x8b88, 0x1}, {0x81, 0x5, 0x3ff}, {0xffffffff, 0xfffffff7, 0x5}, {0x7fffffff, 0x417, 0x40}, {0x401, 0x1, 0x950}, {0x6, 0xfff, 0x4}, {0x0, 0x8, 0x8}, {0xcd6fcee5, 0x4, 0xffffffff}, {0x7, 0x9, 0x9}, {0x3230fea4, 0x1ff, 0x401}, {0xf3d, 0xad, 0x2}, {0x7, 0x5, 0x8}, {0x800, 0xfffffffd, 0xff}, {0x5, 0x3, 0x7}, {0x7fffffff, 0x101, 0x1ff}, {0x11bb7e2, 0xe52}, {0x1, 0xffffffff, 0x7}, {0x3, 0x0, 0x4}, {0x1f, 0x80, 0x6}, {0x80, 0x9a, 0x1}, {0x3, 0xffff, 0xffff}, {0x81, 0x3, 0x8}, {0x0, 0x8, 0x400}, {0xfffffe01, 0x100, 0xf55}, {0x10001, 0xff, 0x7}, {0x2, 0x80000001, 0x7}, {0x4, 0xc708, 0x3ff}, {0x1, 0x7, 0x3}, {0x339, 0x8, 0x2}, {0x101, 0xffffffff, 0x10001}, {0x3, 0xff, 0x3}, {0x6b, 0xb0f, 0x5}, {0x7ff, 0x9, 0x7de5}, {0x80000001, 0x7f, 0x2}, {0x8, 0x6}, {0x3, 0x8001, 0x3ff}, {0x4, 0x5, 0x5d}, {0x75d23712, 0x8, 0x6}, {0x8, 0xde, 0x42e}, {0xea09, 0x81}, {0x9, 0x2, 0x3}, {0x2e47, 0x8, 0x81}, {0x3, 0x6, 0x7ff}, {0x7, 0x8, 0xfffff979}, {0x1f, 0x8, 0x1f}, {0x200, 0x7, 0x3}, {0x6897bc41, 0x7, 0x3}, {0x9, 0x80000000, 0x9}, {0x1ff, 0x1f, 0xffff}, {0x54, 0x9, 0x81}, {0xffffffff, 0x9cea, 0x3}, {0x7f, 0x7f, 0x3}, {0x800, 0x9, 0x6}, {0x5, 0xc46, 0x8000}, {0x0, 0x3, 0x8}, {0x2, 0x3}, {0x430, 0x2, 0x1ff}, {0x7ff, 0x20, 0x3}, {0x3, 0x7, 0xb06}, {0x6, 0x4, 0x2}, {0x401, 0x4, 0x9}, {0x5, 0x7, 0x3}, {0x5, 0x5, 0x1ff}, {0x10000, 0x4, 0x9}, {0x3f, 0xed71, 0xf549}, {0x20, 0x101, 0x4}, {0xfffffffe, 0xbe6a, 0x8000}, {0x9, 0x9, 0x3}, {0x2, 0x5, 0x2}, {0x3, 0x5, 0x4}]}) 06:55:25 executing program 1: r0 = socket$igmp6(0xa, 0x3, 0x2) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8933, &(0x7f0000000080)={'wg1\x00'}) (async) setsockopt$MRT6_ASSERT(r0, 0x29, 0xcf, &(0x7f0000000040), 0x4) r1 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r1, 0x802c550a, &(0x7f0000000200)=@urb_type_bulk={0x3, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 06:55:25 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x802c550a, 0x0) 06:55:25 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) 06:55:26 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x802c550a, &(0x7f0000000140)=@urb_type_iso={0x0, {}, 0x0, 0x0, &(0x7f0000000080)="1cb2bd03b5706bb872944e8c91006b5f437f21f0df51edb451ce867e7cc07482da352683b3fb8af7554195f3983bb3ddf94414e477191fd500fddd674deada6d3dc55638beb49ed739d1", 0x4a, 0x6, 0x20000000, 0x4b, 0x2, 0x1, &(0x7f0000000100)="5cf209fef7de04f14a1dc41da8d1a9b349f810a49f5cc02f98abccd91ac755550e7c0478127d611c90fabf4ffbb4c7afb16bbb4bc05e7fc7d9a6798c4930ca", [{0x8, 0x5, 0x100}, {0x40, 0x5, 0x3}, {0x8000, 0x5, 0x1}, {0x8, 0x2, 0x7f}, {0x9, 0x0, 0x4d}, {0x9, 0x8b88, 0x1}, {0x81, 0x5, 0x3ff}, {0xffffffff, 0xfffffff7, 0x5}, {0x7fffffff, 0x417, 0x40}, {0x401, 0x1, 0x950}, {0x6, 0xfff, 0x4}, {0x0, 0x8, 0x8}, {0xcd6fcee5, 0x4, 0xffffffff}, {0x7, 0x9, 0x9}, {0x3230fea4, 0x1ff, 0x401}, {0xf3d, 0xad, 0x2}, {0x7, 0x5, 0x8}, {0x800, 0xfffffffd, 0xff}, {0x5, 0x3, 0x7}, {0x7fffffff, 0x101, 0x1ff}, {0x11bb7e2, 0xe52}, {0x1, 0xffffffff, 0x7}, {0x3, 0x0, 0x4}, {0x1f, 0x80, 0x6}, {0x80, 0x9a, 0x1}, {0x3, 0xffff, 0xffff}, {0x81, 0x3, 0x8}, {0x0, 0x8, 0x400}, {0xfffffe01, 0x100, 0xf55}, {0x10001, 0xff, 0x7}, {0x2, 0x80000001, 0x7}, {0x4, 0xc708, 0x3ff}, {0x1, 0x7, 0x3}, {0x339, 0x8, 0x2}, {0x101, 0xffffffff, 0x10001}, {0x3, 0xff, 0x3}, {0x6b, 0xb0f, 0x5}, {0x7ff, 0x9, 0x7de5}, {0x80000001, 0x7f, 0x2}, {0x8, 0x6}, {0x3, 0x8001, 0x3ff}, {0x4, 0x5, 0x5d}, {0x75d23712, 0x8, 0x6}, {0x8, 0xde, 0x42e}, {0xea09, 0x81}, {0x9, 0x2, 0x3}, {0x2e47, 0x8, 0x81}, {0x3, 0x6, 0x7ff}, {0x7, 0x8, 0xfffff979}, {0x1f, 0x8, 0x1f}, {0x200, 0x7, 0x3}, {0x6897bc41, 0x7, 0x3}, {0x9, 0x80000000, 0x9}, {0x1ff, 0x1f, 0xffff}, {0x54, 0x9, 0x81}, {0xffffffff, 0x9cea, 0x3}, {0x7f, 0x7f, 0x3}, {0x800, 0x9, 0x6}, {0x5, 0xc46, 0x8000}, {0x0, 0x3, 0x8}, {0x2, 0x3}, {0x430, 0x2, 0x1ff}, {0x7ff, 0x20, 0x3}, {0x3, 0x7, 0xb06}, {0x6, 0x4, 0x2}, {0x401, 0x4, 0x9}, {0x5, 0x7, 0x3}, {0x5, 0x5, 0x1ff}, {0x10000, 0x4, 0x9}, {0x3f, 0xed71, 0xf549}, {0x20, 0x101, 0x4}, {0xfffffffe, 0xbe6a, 0x8000}, {0x9, 0x9, 0x3}, {0x2, 0x5, 0x2}, {0x3, 0x5, 0x4}]}) 06:55:26 executing program 5: r0 = socket$inet(0x2, 0xa, 0x0) setsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f0000000240), 0x4) accept$inet(r0, 0x0, 0x0) (async) getsockopt$EBT_SO_GET_ENTRIES(r0, 0x0, 0x81, &(0x7f0000000140)={'filter\x00', 0x0, 0x3, 0x52, [0x3, 0x44, 0x5c18, 0x7, 0x4, 0x4], 0x5, &(0x7f0000000040)=[{}, {}, {}, {}, {}], &(0x7f00000000c0)=""/82}, &(0x7f00000001c0)=0x78) (async) r1 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r1, 0x8008551c, &(0x7f0000000200)=@urb_type_bulk={0x3, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 06:55:26 executing program 1: r0 = socket$igmp6(0xa, 0x3, 0x2) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8933, &(0x7f0000000080)={'wg1\x00'}) setsockopt$MRT6_ASSERT(r0, 0x29, 0xcf, &(0x7f0000000040), 0x4) (async) setsockopt$MRT6_ASSERT(r0, 0x29, 0xcf, &(0x7f0000000040), 0x4) r1 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r1, 0x802c550a, &(0x7f0000000200)=@urb_type_bulk={0x3, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 06:55:26 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) 06:55:26 executing program 0: bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0xe0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2c, &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000240)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f0000000280), &(0x7f00000002c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000300)}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000500)={0x9, 0x6, &(0x7f0000000000)=@raw=[@jmp={0x5, 0x1, 0x9, 0x8, 0x4, 0xffffffffffffffe0, 0xfffffffffffffffc}, @alu={0x3, 0x1, 0x7, 0xa867116f2783c5dd, 0x0, 0x8, 0x4}, @generic={0x3, 0x2, 0xb, 0x9, 0x3ff}, @map_idx={0x18, 0x6, 0x5, 0x0, 0x8}, @alu={0x7, 0x0, 0x1, 0x0, 0x6, 0xfffffffffffffff4, 0x8}], &(0x7f0000000040)='syzkaller\x00', 0x800, 0xe4, &(0x7f0000000080)=""/228, 0x41000, 0x1, '\x00', r0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000480), 0x8, 0x10, 0x0}, 0x80) sendmsg$TCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f0000000dc0)={&(0x7f0000000b40)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000d80)={&(0x7f0000000b80)={0x1f8, 0x12, 0x20, 0x70bd2a, 0x25dfdbfb, {0x11, 0x0, 0x20, 0x9, {0x4e20, 0x4e20, [0x7, 0x7, 0x6, 0x2], [0x7bdc, 0x1ff, 0x7b], r0, [0x8, 0x5aaf4957]}, 0x2, 0x3}, [@INET_DIAG_REQ_BYTECODE={0x97, 0x1, "1e577e02ddfb1c872df87dee181728a6877a0912e744da1ea8293edfdf76614b5fb9ab83813da6fec234c65a104ba689c191c808aa84db70f28525e7273cd01e27984e8a3edc4c9ac0d697fc768f1f57577c9e4ce9a9cc4ed2055c0112d38e7c0c2877a14fd69fd456754466b050dd7ba375e7aa16b140d0775fe99feb31d86defbf32fba5a8d4fd5b2820dad7d1c087c864b2"}, @INET_DIAG_REQ_BYTECODE={0x36, 0x1, "844a680c14e94870c4c0e70ca3d5c519d24a08f30a723173986805554d74eb15ba5bc6fbe51757e95dfc10b778e19f8fdbf7"}, @INET_DIAG_REQ_BYTECODE={0xdc, 0x1, "a456ac902a8fbfc17944772974043b4d8330dbbc57989948ffe7f0b93cd6fb839110e57879e6466562d238d4ce72c700106b5dd4d51510538c93d384609cd1d982d191f35e282df93d6e5f7f5988342a609c23bc0fabcc6d4d180b662ee1db665b28a5800d74f7ad6a647b60caff708eec67d887689cd16abf0c1a859913d5d97ce30acec22b059ffdf0b2b9cae055a2c03b8c490b51e5faffc0fbbbe8cec87d1522577760937e7375b03a493c9d30443da7af504932de189d2bef6c2055fc515bf11175c65bba681b6ba56a1da42aa0db1a882908f3eaed"}]}, 0x1f8}, 0x1, 0x0, 0x0, 0x810}, 0x8000) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f00000009c0)=@broute={'broute\x00', 0x20, 0x4, 0x730, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000280], 0x0, &(0x7f0000000240), &(0x7f0000000280)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffc, 0x2, [{0x11, 0x0, 0xa00, 'pim6reg0\x00', 'pim6reg0\x00', 'batadv_slave_1\x00', 'wg1\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}, [0x0, 0x0, 0x0, 0xff, 0xff, 0xff], @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, [0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0xbe, 0x186, 0x1b6, [@ipvs={{'ipvs\x00', 0x0, 0x28}, {{@ipv6=@private0, [0x0, 0xffffffff, 0xff, 0xff], 0x4e21, 0x2c, 0x2, 0x4e22, 0x2, 0x24}}}], [@common=@log={'log\x00', 0x28, {{0x0, "5f119e762c1db8de448ce4c4951f940dbda1c0713447e2253d711c9f5fb8"}}}, @common=@nflog={'nflog\x00', 0x50, {{0x4000000, 0xda4c, 0x0, 0x0, 0x0, "220a217b6622766d6beabf834dc7752e9751a2af1afcb8f21e740e1c88edbad8c288914392d3106e43c700647cb44cbd16cf3b49a85af1a029ec728ab6da7e6a"}}}], @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {0x9, 0x7b, 0x892f, 'macsec0\x00', 'bridge_slave_0\x00', 'syz_tun\x00', '\x00', @empty, [0x0, 0x101], @local, [0xff], 0xbe, 0x10e, 0x23e, [@helper={{'helper\x00', 0x0, 0x28}, {{0x0, 'Q.931\x00'}}}], [@common=@log={'log\x00', 0x28, {{0x5, "189d851d5ecbbfdaed3d24ffc0d5e2d55f76f91940db106f1f47620a5c01"}}}], @common=@SECMARK={'SECMARK\x00', 0x108, {{0x1, 0x2, 'system_u:object_r:mount_tmp_t:s0\x00'}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x1, [{0x5, 0x40, 0x8808, 'veth1_virt_wifi\x00', 'dvmrp0\x00', 'veth1_to_team\x00', 'pim6reg\x00', @broadcast, [0x0, 0xff, 0xff, 0x0, 0xff], @multicast, [0x0, 0x0, 0xff, 0x0, 0xff, 0xff], 0xee, 0x11e, 0x166, [@quota={{'quota\x00', 0x0, 0x18}, {{0x0, 0x0, 0x9, {0xffffffffffffff04}}}}, @connbytes={{'connbytes\x00', 0x0, 0x18}, {{[{0x80000001}, {0x1}], 0x0, 0x2}}}], [@common=@redirect={'redirect\x00', 0x8, {{0xfffffffffffffffe}}}], @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00', 0x2, 0xd0, {0x9}}}}}]}, {0x0, '\x00', 0x3, 0xfffffffffffffffc, 0x1, [{0x9, 0x14, 0x88ca, 'team_slave_1\x00', 'macsec0\x00', 'vlan0\x00', 'bond_slave_0\x00', @random="86be302db618", [0x0, 0x0, 0x0, 0xff, 0xff], @dev={'\xaa\xaa\xaa\xaa\xaa', 0x8}, [0xff, 0xff, 0x80, 0xff, 0x0, 0xff], 0x9e, 0xe6, 0x116, [@cpu={{'cpu\x00', 0x0, 0x8}, {{0x6}}}], [@common=@ERROR={'ERROR\x00', 0x20, {"be6cc5036378604a89760d44c5bed06b1ae293c34e0ae2528bea3becc196"}}], @common=@NFQUEUE0={'NFQUEUE\x00', 0x8, {{0x4092}}}}]}]}, 0x7a8) r1 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) r2 = syz_open_dev$usbfs(&(0x7f0000000080), 0x5, 0x109003) ioctl$USBDEVFS_GETDRIVER(r2, 0x41045508, &(0x7f00000000c0)={0x80000000, "f45b3c78a5bd639e660d7b1373f715941ff305ef2ca018f46ed975fe066e9cfe6e3e26800b719e4c8d09da41f42c6472587c74a85bd2deeaa90bdfa7ece385a3ff1a96948f01f52d789929dba5cd309461f6a6230fecaab7abd435127ab24c1d264a0a403fd9cce7431998505ce88a812731fb6315c6f20c652e86b4dadce6b9a9204114f0f056d188740c8422b37ab28567b17dabd094e6faa305dbaabdb1f2a141a384b2b5ae2bc2e3f3a83958f9399935a046e080823f4ea09af2393987fda17c5747b7bf25d7705702f72ceb761ace89eae3d9675cd474a1e49892ed8111c974e8a66d89a62e557bbc89637998932cbb87ac1012ba88d37c0a0c446a7283"}) ioctl$USBDEVFS_SUBMITURB(r1, 0x8038550a, &(0x7f0000000200)=@urb_type_control={0x2, {0x2}, 0xfffffffb, 0x4, &(0x7f0000000a40)={0x80, 0x16, 0x2005, 0x7, 0x8}, 0x8, 0xf8, 0x7, 0x0, 0x0, 0x5, &(0x7f0000000a80)="cfc206af3b20cc76f92c2426377a243c9d8d6008fafd2fd67138c6b064102eec84099eccfeb5a4b8a5f3f11f2b3a7efc7bb159fd9e2cfe9dfc7021a27eef2f1b8a14ae37ef3f5850a71385fa82e17ca63c6617a30e1bc3576e8ee08aac39ab0a21c7d06379bcc8bd197b3c4706285c7606cc6c43a9f9a4485fa40997c39a4da54d472ef5eb63dbcb91c23e669d6e8836e2269a1d466533236ed3bd"}) 06:55:26 executing program 4: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x41045508, &(0x7f0000000200)=@urb_type_bulk={0x3, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 06:55:26 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) (fail_nth: 1) 06:55:26 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) 06:55:26 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x802c550a, &(0x7f0000000140)=@urb_type_iso={0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x6, 0x20000000, 0x4b, 0x2, 0x1, &(0x7f0000000100)="5cf209fef7de04f14a1dc41da8d1a9b349f810a49f5cc02f98abccd91ac755550e7c0478127d611c90fabf4ffbb4c7afb16bbb4bc05e7fc7d9a6798c4930ca", [{0x8, 0x5, 0x100}, {0x40, 0x5, 0x3}, {0x8000, 0x5, 0x1}, {0x8, 0x2, 0x7f}, {0x9, 0x0, 0x4d}, {0x9, 0x8b88, 0x1}, {0x81, 0x5, 0x3ff}, {0xffffffff, 0xfffffff7, 0x5}, {0x7fffffff, 0x417, 0x40}, {0x401, 0x1, 0x950}, {0x6, 0xfff, 0x4}, {0x0, 0x8, 0x8}, {0xcd6fcee5, 0x4, 0xffffffff}, {0x7, 0x9, 0x9}, {0x3230fea4, 0x1ff, 0x401}, {0xf3d, 0xad, 0x2}, {0x7, 0x5, 0x8}, {0x800, 0xfffffffd, 0xff}, {0x5, 0x3, 0x7}, {0x7fffffff, 0x101, 0x1ff}, {0x11bb7e2, 0xe52}, {0x1, 0xffffffff, 0x7}, {0x3, 0x0, 0x4}, {0x1f, 0x80, 0x6}, {0x80, 0x9a, 0x1}, {0x3, 0xffff, 0xffff}, {0x81, 0x3, 0x8}, {0x0, 0x8, 0x400}, {0xfffffe01, 0x100, 0xf55}, {0x10001, 0xff, 0x7}, {0x2, 0x80000001, 0x7}, {0x4, 0xc708, 0x3ff}, {0x1, 0x7, 0x3}, {0x339, 0x8, 0x2}, {0x101, 0xffffffff, 0x10001}, {0x3, 0xff, 0x3}, {0x6b, 0xb0f, 0x5}, {0x7ff, 0x9, 0x7de5}, {0x80000001, 0x7f, 0x2}, {0x8, 0x6}, {0x3, 0x8001, 0x3ff}, {0x4, 0x5, 0x5d}, {0x75d23712, 0x8, 0x6}, {0x8, 0xde, 0x42e}, {0xea09, 0x81}, {0x9, 0x2, 0x3}, {0x2e47, 0x8, 0x81}, {0x3, 0x6, 0x7ff}, {0x7, 0x8, 0xfffff979}, {0x1f, 0x8, 0x1f}, {0x200, 0x7, 0x3}, {0x6897bc41, 0x7, 0x3}, {0x9, 0x80000000, 0x9}, {0x1ff, 0x1f, 0xffff}, {0x54, 0x9, 0x81}, {0xffffffff, 0x9cea, 0x3}, {0x7f, 0x7f, 0x3}, {0x800, 0x9, 0x6}, {0x5, 0xc46, 0x8000}, {0x0, 0x3, 0x8}, {0x2, 0x3}, {0x430, 0x2, 0x1ff}, {0x7ff, 0x20, 0x3}, {0x3, 0x7, 0xb06}, {0x6, 0x4, 0x2}, {0x401, 0x4, 0x9}, {0x5, 0x7, 0x3}, {0x5, 0x5, 0x1ff}, {0x10000, 0x4, 0x9}, {0x3f, 0xed71, 0xf549}, {0x20, 0x101, 0x4}, {0xfffffffe, 0xbe6a, 0x8000}, {0x9, 0x9, 0x3}, {0x2, 0x5, 0x2}, {0x3, 0x5, 0x4}]}) 06:55:26 executing program 1: bind$inet(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x4e20, @private=0xa010102}, 0x10) r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_GET_SPEED(r0, 0x551f) ioctl$USBDEVFS_SUBMITURB(r0, 0x802c550a, &(0x7f0000000200)=@urb_type_bulk={0x3, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r1 = syz_open_dev$usbfs(&(0x7f0000000080), 0x7ff, 0x1c1000) mmap$usbfs(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x100010, r1, 0x7) 06:55:26 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x8008551c, &(0x7f0000000200)=@urb_type_bulk={0x3, {}, 0x0, 0x0, 0x0, 0x59, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0}) 06:55:26 executing program 0: bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0xe0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2c, &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000240)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f0000000280), &(0x7f00000002c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000300)}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000500)={0x9, 0x6, &(0x7f0000000000)=@raw=[@jmp={0x5, 0x1, 0x9, 0x8, 0x4, 0xffffffffffffffe0, 0xfffffffffffffffc}, @alu={0x3, 0x1, 0x7, 0xa867116f2783c5dd, 0x0, 0x8, 0x4}, @generic={0x3, 0x2, 0xb, 0x9, 0x3ff}, @map_idx={0x18, 0x6, 0x5, 0x0, 0x8}, @alu={0x7, 0x0, 0x1, 0x0, 0x6, 0xfffffffffffffff4, 0x8}], &(0x7f0000000040)='syzkaller\x00', 0x800, 0xe4, &(0x7f0000000080)=""/228, 0x41000, 0x1, '\x00', r0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000480), 0x8, 0x10, 0x0}, 0x80) sendmsg$TCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f0000000dc0)={&(0x7f0000000b40)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000d80)={&(0x7f0000000b80)={0x1f8, 0x12, 0x20, 0x70bd2a, 0x25dfdbfb, {0x11, 0x0, 0x20, 0x9, {0x4e20, 0x4e20, [0x7, 0x7, 0x6, 0x2], [0x7bdc, 0x1ff, 0x7b], r0, [0x8, 0x5aaf4957]}, 0x2, 0x3}, [@INET_DIAG_REQ_BYTECODE={0x97, 0x1, "1e577e02ddfb1c872df87dee181728a6877a0912e744da1ea8293edfdf76614b5fb9ab83813da6fec234c65a104ba689c191c808aa84db70f28525e7273cd01e27984e8a3edc4c9ac0d697fc768f1f57577c9e4ce9a9cc4ed2055c0112d38e7c0c2877a14fd69fd456754466b050dd7ba375e7aa16b140d0775fe99feb31d86defbf32fba5a8d4fd5b2820dad7d1c087c864b2"}, @INET_DIAG_REQ_BYTECODE={0x36, 0x1, "844a680c14e94870c4c0e70ca3d5c519d24a08f30a723173986805554d74eb15ba5bc6fbe51757e95dfc10b778e19f8fdbf7"}, @INET_DIAG_REQ_BYTECODE={0xdc, 0x1, "a456ac902a8fbfc17944772974043b4d8330dbbc57989948ffe7f0b93cd6fb839110e57879e6466562d238d4ce72c700106b5dd4d51510538c93d384609cd1d982d191f35e282df93d6e5f7f5988342a609c23bc0fabcc6d4d180b662ee1db665b28a5800d74f7ad6a647b60caff708eec67d887689cd16abf0c1a859913d5d97ce30acec22b059ffdf0b2b9cae055a2c03b8c490b51e5faffc0fbbbe8cec87d1522577760937e7375b03a493c9d30443da7af504932de189d2bef6c2055fc515bf11175c65bba681b6ba56a1da42aa0db1a882908f3eaed"}]}, 0x1f8}, 0x1, 0x0, 0x0, 0x810}, 0x8000) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f00000009c0)=@broute={'broute\x00', 0x20, 0x4, 0x730, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000280], 0x0, &(0x7f0000000240), &(0x7f0000000280)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffc, 0x2, [{0x11, 0x0, 0xa00, 'pim6reg0\x00', 'pim6reg0\x00', 'batadv_slave_1\x00', 'wg1\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}, [0x0, 0x0, 0x0, 0xff, 0xff, 0xff], @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, [0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0xbe, 0x186, 0x1b6, [@ipvs={{'ipvs\x00', 0x0, 0x28}, {{@ipv6=@private0, [0x0, 0xffffffff, 0xff, 0xff], 0x4e21, 0x2c, 0x2, 0x4e22, 0x2, 0x24}}}], [@common=@log={'log\x00', 0x28, {{0x0, "5f119e762c1db8de448ce4c4951f940dbda1c0713447e2253d711c9f5fb8"}}}, @common=@nflog={'nflog\x00', 0x50, {{0x4000000, 0xda4c, 0x0, 0x0, 0x0, "220a217b6622766d6beabf834dc7752e9751a2af1afcb8f21e740e1c88edbad8c288914392d3106e43c700647cb44cbd16cf3b49a85af1a029ec728ab6da7e6a"}}}], @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {0x9, 0x7b, 0x892f, 'macsec0\x00', 'bridge_slave_0\x00', 'syz_tun\x00', '\x00', @empty, [0x0, 0x101], @local, [0xff], 0xbe, 0x10e, 0x23e, [@helper={{'helper\x00', 0x0, 0x28}, {{0x0, 'Q.931\x00'}}}], [@common=@log={'log\x00', 0x28, {{0x5, "189d851d5ecbbfdaed3d24ffc0d5e2d55f76f91940db106f1f47620a5c01"}}}], @common=@SECMARK={'SECMARK\x00', 0x108, {{0x1, 0x2, 'system_u:object_r:mount_tmp_t:s0\x00'}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x1, [{0x5, 0x40, 0x8808, 'veth1_virt_wifi\x00', 'dvmrp0\x00', 'veth1_to_team\x00', 'pim6reg\x00', @broadcast, [0x0, 0xff, 0xff, 0x0, 0xff], @multicast, [0x0, 0x0, 0xff, 0x0, 0xff, 0xff], 0xee, 0x11e, 0x166, [@quota={{'quota\x00', 0x0, 0x18}, {{0x0, 0x0, 0x9, {0xffffffffffffff04}}}}, @connbytes={{'connbytes\x00', 0x0, 0x18}, {{[{0x80000001}, {0x1}], 0x0, 0x2}}}], [@common=@redirect={'redirect\x00', 0x8, {{0xfffffffffffffffe}}}], @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00', 0x2, 0xd0, {0x9}}}}}]}, {0x0, '\x00', 0x3, 0xfffffffffffffffc, 0x1, [{0x9, 0x14, 0x88ca, 'team_slave_1\x00', 'macsec0\x00', 'vlan0\x00', 'bond_slave_0\x00', @random="86be302db618", [0x0, 0x0, 0x0, 0xff, 0xff], @dev={'\xaa\xaa\xaa\xaa\xaa', 0x8}, [0xff, 0xff, 0x80, 0xff, 0x0, 0xff], 0x9e, 0xe6, 0x116, [@cpu={{'cpu\x00', 0x0, 0x8}, {{0x6}}}], [@common=@ERROR={'ERROR\x00', 0x20, {"be6cc5036378604a89760d44c5bed06b1ae293c34e0ae2528bea3becc196"}}], @common=@NFQUEUE0={'NFQUEUE\x00', 0x8, {{0x4092}}}}]}]}, 0x7a8) r1 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) syz_open_dev$usbfs(&(0x7f0000000080), 0x5, 0x109003) ioctl$USBDEVFS_SUBMITURB(r1, 0x8038550a, &(0x7f0000000200)=@urb_type_control={0x2, {0x2}, 0xfffffffb, 0x4, &(0x7f0000000a40)={0x80, 0x16, 0x2005, 0x7, 0x8}, 0x8, 0xf8, 0x7, 0x0, 0x0, 0x5, &(0x7f0000000a80)="cfc206af3b20cc76f92c2426377a243c9d8d6008fafd2fd67138c6b064102eec84099eccfeb5a4b8a5f3f11f2b3a7efc7bb159fd9e2cfe9dfc7021a27eef2f1b8a14ae37ef3f5850a71385fa82e17ca63c6617a30e1bc3576e8ee08aac39ab0a21c7d06379bcc8bd197b3c4706285c7606cc6c43a9f9a4485fa40997c39a4da54d472ef5eb63dbcb91c23e669d6e8836e2269a1d466533236ed3bd"}) 06:55:26 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x802c550a, &(0x7f0000000140)=@urb_type_iso={0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x6, 0x20000000, 0x4b, 0x2, 0x1, &(0x7f0000000100)="5cf209fef7de04f14a1dc41da8d1a9b349f810a49f5cc02f98abccd91ac755550e7c0478127d611c90fabf4ffbb4c7afb16bbb4bc05e7fc7d9a6798c4930ca", [{0x8, 0x5, 0x100}, {0x40, 0x5, 0x3}, {0x8000, 0x5, 0x1}, {0x8, 0x2, 0x7f}, {0x9, 0x0, 0x4d}, {0x9, 0x8b88, 0x1}, {0x81, 0x5, 0x3ff}, {0xffffffff, 0xfffffff7, 0x5}, {0x7fffffff, 0x417, 0x40}, {0x401, 0x1, 0x950}, {0x6, 0xfff, 0x4}, {0x0, 0x8, 0x8}, {0xcd6fcee5, 0x4, 0xffffffff}, {0x7, 0x9, 0x9}, {0x3230fea4, 0x1ff, 0x401}, {0xf3d, 0xad, 0x2}, {0x7, 0x5, 0x8}, {0x800, 0xfffffffd, 0xff}, {0x5, 0x3, 0x7}, {0x7fffffff, 0x101, 0x1ff}, {0x11bb7e2, 0xe52}, {0x1, 0xffffffff, 0x7}, {0x3, 0x0, 0x4}, {0x1f, 0x80, 0x6}, {0x80, 0x9a, 0x1}, {0x3, 0xffff, 0xffff}, {0x81, 0x3, 0x8}, {0x0, 0x8, 0x400}, {0xfffffe01, 0x100, 0xf55}, {0x10001, 0xff, 0x7}, {0x2, 0x80000001, 0x7}, {0x4, 0xc708, 0x3ff}, {0x1, 0x7, 0x3}, {0x339, 0x8, 0x2}, {0x101, 0xffffffff, 0x10001}, {0x3, 0xff, 0x3}, {0x6b, 0xb0f, 0x5}, {0x7ff, 0x9, 0x7de5}, {0x80000001, 0x7f, 0x2}, {0x8, 0x6}, {0x3, 0x8001, 0x3ff}, {0x4, 0x5, 0x5d}, {0x75d23712, 0x8, 0x6}, {0x8, 0xde, 0x42e}, {0xea09, 0x81}, {0x9, 0x2, 0x3}, {0x2e47, 0x8, 0x81}, {0x3, 0x6, 0x7ff}, {0x7, 0x8, 0xfffff979}, {0x1f, 0x8, 0x1f}, {0x200, 0x7, 0x3}, {0x6897bc41, 0x7, 0x3}, {0x9, 0x80000000, 0x9}, {0x1ff, 0x1f, 0xffff}, {0x54, 0x9, 0x81}, {0xffffffff, 0x9cea, 0x3}, {0x7f, 0x7f, 0x3}, {0x800, 0x9, 0x6}, {0x5, 0xc46, 0x8000}, {0x0, 0x3, 0x8}, {0x2, 0x3}, {0x430, 0x2, 0x1ff}, {0x7ff, 0x20, 0x3}, {0x3, 0x7, 0xb06}, {0x6, 0x4, 0x2}, {0x401, 0x4, 0x9}, {0x5, 0x7, 0x3}, {0x5, 0x5, 0x1ff}, {0x10000, 0x4, 0x9}, {0x3f, 0xed71, 0xf549}, {0x20, 0x101, 0x4}, {0xfffffffe, 0xbe6a, 0x8000}, {0x9, 0x9, 0x3}, {0x2, 0x5, 0x2}, {0x3, 0x5, 0x4}]}) 06:55:26 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x802c550a, &(0x7f0000000140)=@urb_type_iso={0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x6, 0x20000000, 0x4b, 0x2, 0x1, &(0x7f0000000100)="5cf209fef7de04f14a1dc41da8d1a9b349f810a49f5cc02f98abccd91ac755550e7c0478127d611c90fabf4ffbb4c7afb16bbb4bc05e7fc7d9a6798c4930ca", [{0x8, 0x5, 0x100}, {0x40, 0x5, 0x3}, {0x8000, 0x5, 0x1}, {0x8, 0x2, 0x7f}, {0x9, 0x0, 0x4d}, {0x9, 0x8b88, 0x1}, {0x81, 0x5, 0x3ff}, {0xffffffff, 0xfffffff7, 0x5}, {0x7fffffff, 0x417, 0x40}, {0x401, 0x1, 0x950}, {0x6, 0xfff, 0x4}, {0x0, 0x8, 0x8}, {0xcd6fcee5, 0x4, 0xffffffff}, {0x7, 0x9, 0x9}, {0x3230fea4, 0x1ff, 0x401}, {0xf3d, 0xad, 0x2}, {0x7, 0x5, 0x8}, {0x800, 0xfffffffd, 0xff}, {0x5, 0x3, 0x7}, {0x7fffffff, 0x101, 0x1ff}, {0x11bb7e2, 0xe52}, {0x1, 0xffffffff, 0x7}, {0x3, 0x0, 0x4}, {0x1f, 0x80, 0x6}, {0x80, 0x9a, 0x1}, {0x3, 0xffff, 0xffff}, {0x81, 0x3, 0x8}, {0x0, 0x8, 0x400}, {0xfffffe01, 0x100, 0xf55}, {0x10001, 0xff, 0x7}, {0x2, 0x80000001, 0x7}, {0x4, 0xc708, 0x3ff}, {0x1, 0x7, 0x3}, {0x339, 0x8, 0x2}, {0x101, 0xffffffff, 0x10001}, {0x3, 0xff, 0x3}, {0x6b, 0xb0f, 0x5}, {0x7ff, 0x9, 0x7de5}, {0x80000001, 0x7f, 0x2}, {0x8, 0x6}, {0x3, 0x8001, 0x3ff}, {0x4, 0x5, 0x5d}, {0x75d23712, 0x8, 0x6}, {0x8, 0xde, 0x42e}, {0xea09, 0x81}, {0x9, 0x2, 0x3}, {0x2e47, 0x8, 0x81}, {0x3, 0x6, 0x7ff}, {0x7, 0x8, 0xfffff979}, {0x1f, 0x8, 0x1f}, {0x200, 0x7, 0x3}, {0x6897bc41, 0x7, 0x3}, {0x9, 0x80000000, 0x9}, {0x1ff, 0x1f, 0xffff}, {0x54, 0x9, 0x81}, {0xffffffff, 0x9cea, 0x3}, {0x7f, 0x7f, 0x3}, {0x800, 0x9, 0x6}, {0x5, 0xc46, 0x8000}, {0x0, 0x3, 0x8}, {0x2, 0x3}, {0x430, 0x2, 0x1ff}, {0x7ff, 0x20, 0x3}, {0x3, 0x7, 0xb06}, {0x6, 0x4, 0x2}, {0x401, 0x4, 0x9}, {0x5, 0x7, 0x3}, {0x5, 0x5, 0x1ff}, {0x10000, 0x4, 0x9}, {0x3f, 0xed71, 0xf549}, {0x20, 0x101, 0x4}, {0xfffffffe, 0xbe6a, 0x8000}, {0x9, 0x9, 0x3}, {0x2, 0x5, 0x2}, {0x3, 0x5, 0x4}]}) [ 2893.395016][T12019] FAULT_INJECTION: forcing a failure. [ 2893.395016][T12019] name failslab, interval 1, probability 0, space 0, times 0 [ 2893.417316][T12019] CPU: 1 PID: 12019 Comm: syz-executor.4 Not tainted 5.4.233-syzkaller-00019-gd5ed2ca98e48 #0 [ 2893.427563][T12019] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/14/2023 [ 2893.437607][T12019] Call Trace: [ 2893.440900][T12019] dump_stack+0x1d8/0x241 [ 2893.445220][T12019] ? panic+0x768/0x768 [ 2893.449281][T12019] ? nf_ct_l4proto_log_invalid+0x258/0x258 [ 2893.455082][T12019] should_fail+0x71f/0x880 [ 2893.459497][T12019] ? setup_fault_attr+0x3d0/0x3d0 [ 2893.464519][T12019] ? avc_flush+0x1f0/0x1f0 [ 2893.468932][T12019] ? loop_add+0x56/0x740 [ 2893.473165][T12019] should_failslab+0x5/0x20 [ 2893.477666][T12019] kmem_cache_alloc_trace+0x28/0x240 [ 2893.482949][T12019] loop_add+0x56/0x740 [ 2893.487015][T12019] ? get_pid_task+0xc3/0xf0 [ 2893.491509][T12019] ? radix_tree_lookup+0x16f/0x1c0 [ 2893.496611][T12019] loop_control_ioctl+0x448/0x620 [ 2893.501613][T12019] ? loop_remove+0xa0/0xa0 [ 2893.506008][T12019] ? memset+0x1f/0x40 [ 2893.509972][T12019] ? fsnotify+0x1280/0x1340 [ 2893.514460][T12019] ? loop_remove+0xa0/0xa0 [ 2893.518858][T12019] do_vfs_ioctl+0x742/0x1720 [ 2893.523421][T12019] ? ioctl_preallocate+0x250/0x250 [ 2893.528510][T12019] ? __fget+0x407/0x490 [ 2893.532658][T12019] ? fget_many+0x20/0x20 [ 2893.536888][T12019] ? debug_smp_processor_id+0x20/0x20 06:55:26 executing program 0: bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0xe0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2c, &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000240)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f0000000280), &(0x7f00000002c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000300)}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000500)={0x9, 0x6, &(0x7f0000000000)=@raw=[@jmp={0x5, 0x1, 0x9, 0x8, 0x4, 0xffffffffffffffe0, 0xfffffffffffffffc}, @alu={0x3, 0x1, 0x7, 0xa867116f2783c5dd, 0x0, 0x8, 0x4}, @generic={0x3, 0x2, 0xb, 0x9, 0x3ff}, @map_idx={0x18, 0x6, 0x5, 0x0, 0x8}, @alu={0x7, 0x0, 0x1, 0x0, 0x6, 0xfffffffffffffff4, 0x8}], &(0x7f0000000040)='syzkaller\x00', 0x800, 0xe4, &(0x7f0000000080)=""/228, 0x41000, 0x1, '\x00', r0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000480), 0x8, 0x10, 0x0}, 0x80) sendmsg$TCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f0000000dc0)={&(0x7f0000000b40)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000d80)={&(0x7f0000000b80)={0x1f8, 0x12, 0x20, 0x70bd2a, 0x25dfdbfb, {0x11, 0x0, 0x20, 0x9, {0x4e20, 0x4e20, [0x7, 0x7, 0x6, 0x2], [0x7bdc, 0x1ff, 0x7b], r0, [0x8, 0x5aaf4957]}, 0x2, 0x3}, [@INET_DIAG_REQ_BYTECODE={0x97, 0x1, "1e577e02ddfb1c872df87dee181728a6877a0912e744da1ea8293edfdf76614b5fb9ab83813da6fec234c65a104ba689c191c808aa84db70f28525e7273cd01e27984e8a3edc4c9ac0d697fc768f1f57577c9e4ce9a9cc4ed2055c0112d38e7c0c2877a14fd69fd456754466b050dd7ba375e7aa16b140d0775fe99feb31d86defbf32fba5a8d4fd5b2820dad7d1c087c864b2"}, @INET_DIAG_REQ_BYTECODE={0x36, 0x1, "844a680c14e94870c4c0e70ca3d5c519d24a08f30a723173986805554d74eb15ba5bc6fbe51757e95dfc10b778e19f8fdbf7"}, @INET_DIAG_REQ_BYTECODE={0xdc, 0x1, "a456ac902a8fbfc17944772974043b4d8330dbbc57989948ffe7f0b93cd6fb839110e57879e6466562d238d4ce72c700106b5dd4d51510538c93d384609cd1d982d191f35e282df93d6e5f7f5988342a609c23bc0fabcc6d4d180b662ee1db665b28a5800d74f7ad6a647b60caff708eec67d887689cd16abf0c1a859913d5d97ce30acec22b059ffdf0b2b9cae055a2c03b8c490b51e5faffc0fbbbe8cec87d1522577760937e7375b03a493c9d30443da7af504932de189d2bef6c2055fc515bf11175c65bba681b6ba56a1da42aa0db1a882908f3eaed"}]}, 0x1f8}, 0x1, 0x0, 0x0, 0x810}, 0x8000) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f00000009c0)=@broute={'broute\x00', 0x20, 0x4, 0x730, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000280], 0x0, &(0x7f0000000240), &(0x7f0000000280)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffc, 0x2, [{0x11, 0x0, 0xa00, 'pim6reg0\x00', 'pim6reg0\x00', 'batadv_slave_1\x00', 'wg1\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}, [0x0, 0x0, 0x0, 0xff, 0xff, 0xff], @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, [0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0xbe, 0x186, 0x1b6, [@ipvs={{'ipvs\x00', 0x0, 0x28}, {{@ipv6=@private0, [0x0, 0xffffffff, 0xff, 0xff], 0x4e21, 0x2c, 0x2, 0x4e22, 0x2, 0x24}}}], [@common=@log={'log\x00', 0x28, {{0x0, "5f119e762c1db8de448ce4c4951f940dbda1c0713447e2253d711c9f5fb8"}}}, @common=@nflog={'nflog\x00', 0x50, {{0x4000000, 0xda4c, 0x0, 0x0, 0x0, "220a217b6622766d6beabf834dc7752e9751a2af1afcb8f21e740e1c88edbad8c288914392d3106e43c700647cb44cbd16cf3b49a85af1a029ec728ab6da7e6a"}}}], @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {0x9, 0x7b, 0x892f, 'macsec0\x00', 'bridge_slave_0\x00', 'syz_tun\x00', '\x00', @empty, [0x0, 0x101], @local, [0xff], 0xbe, 0x10e, 0x23e, [@helper={{'helper\x00', 0x0, 0x28}, {{0x0, 'Q.931\x00'}}}], [@common=@log={'log\x00', 0x28, {{0x5, "189d851d5ecbbfdaed3d24ffc0d5e2d55f76f91940db106f1f47620a5c01"}}}], @common=@SECMARK={'SECMARK\x00', 0x108, {{0x1, 0x2, 'system_u:object_r:mount_tmp_t:s0\x00'}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x1, [{0x5, 0x40, 0x8808, 'veth1_virt_wifi\x00', 'dvmrp0\x00', 'veth1_to_team\x00', 'pim6reg\x00', @broadcast, [0x0, 0xff, 0xff, 0x0, 0xff], @multicast, [0x0, 0x0, 0xff, 0x0, 0xff, 0xff], 0xee, 0x11e, 0x166, [@quota={{'quota\x00', 0x0, 0x18}, {{0x0, 0x0, 0x9, {0xffffffffffffff04}}}}, @connbytes={{'connbytes\x00', 0x0, 0x18}, {{[{0x80000001}, {0x1}], 0x0, 0x2}}}], [@common=@redirect={'redirect\x00', 0x8, {{0xfffffffffffffffe}}}], @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00', 0x2, 0xd0, {0x9}}}}}]}, {0x0, '\x00', 0x3, 0xfffffffffffffffc, 0x1, [{0x9, 0x14, 0x88ca, 'team_slave_1\x00', 'macsec0\x00', 'vlan0\x00', 'bond_slave_0\x00', @random="86be302db618", [0x0, 0x0, 0x0, 0xff, 0xff], @dev={'\xaa\xaa\xaa\xaa\xaa', 0x8}, [0xff, 0xff, 0x80, 0xff, 0x0, 0xff], 0x9e, 0xe6, 0x116, [@cpu={{'cpu\x00', 0x0, 0x8}, {{0x6}}}], [@common=@ERROR={'ERROR\x00', 0x20, {"be6cc5036378604a89760d44c5bed06b1ae293c34e0ae2528bea3becc196"}}], @common=@NFQUEUE0={'NFQUEUE\x00', 0x8, {{0x4092}}}}]}]}, 0x7a8) r1 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r1, 0x8038550a, &(0x7f0000000200)=@urb_type_control={0x2, {0x2}, 0xfffffffb, 0x4, &(0x7f0000000a40)={0x80, 0x16, 0x2005, 0x7, 0x8}, 0x8, 0xf8, 0x7, 0x0, 0x0, 0x5, &(0x7f0000000a80)="cfc206af3b20cc76f92c2426377a243c9d8d6008fafd2fd67138c6b064102eec84099eccfeb5a4b8a5f3f11f2b3a7efc7bb159fd9e2cfe9dfc7021a27eef2f1b8a14ae37ef3f5850a71385fa82e17ca63c6617a30e1bc3576e8ee08aac39ab0a21c7d06379bcc8bd197b3c4706285c7606cc6c43a9f9a4485fa40997c39a4da54d472ef5eb63dbcb91c23e669d6e8836e2269a1d466533236ed3bd"}) 06:55:26 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x802c550a, &(0x7f0000000140)=@urb_type_iso={0x0, {}, 0x0, 0x0, &(0x7f0000000080), 0x0, 0x6, 0x20000000, 0x4b, 0x2, 0x1, &(0x7f0000000100)="5cf209fef7de04f14a1dc41da8d1a9b349f810a49f5cc02f98abccd91ac755550e7c0478127d611c90fabf4ffbb4c7afb16bbb4bc05e7fc7d9a6798c4930ca", [{0x8, 0x5, 0x100}, {0x40, 0x5, 0x3}, {0x8000, 0x5, 0x1}, {0x8, 0x2, 0x7f}, {0x9, 0x0, 0x4d}, {0x9, 0x8b88, 0x1}, {0x81, 0x5, 0x3ff}, {0xffffffff, 0xfffffff7, 0x5}, {0x7fffffff, 0x417, 0x40}, {0x401, 0x1, 0x950}, {0x6, 0xfff, 0x4}, {0x0, 0x8, 0x8}, {0xcd6fcee5, 0x4, 0xffffffff}, {0x7, 0x9, 0x9}, {0x3230fea4, 0x1ff, 0x401}, {0xf3d, 0xad, 0x2}, {0x7, 0x5, 0x8}, {0x800, 0xfffffffd, 0xff}, {0x5, 0x3, 0x7}, {0x7fffffff, 0x101, 0x1ff}, {0x11bb7e2, 0xe52}, {0x1, 0xffffffff, 0x7}, {0x3, 0x0, 0x4}, {0x1f, 0x80, 0x6}, {0x80, 0x9a, 0x1}, {0x3, 0xffff, 0xffff}, {0x81, 0x3, 0x8}, {0x0, 0x8, 0x400}, {0xfffffe01, 0x100, 0xf55}, {0x10001, 0xff, 0x7}, {0x2, 0x80000001, 0x7}, {0x4, 0xc708, 0x3ff}, {0x1, 0x7, 0x3}, {0x339, 0x8, 0x2}, {0x101, 0xffffffff, 0x10001}, {0x3, 0xff, 0x3}, {0x6b, 0xb0f, 0x5}, {0x7ff, 0x9, 0x7de5}, {0x80000001, 0x7f, 0x2}, {0x8, 0x6}, {0x3, 0x8001, 0x3ff}, {0x4, 0x5, 0x5d}, {0x75d23712, 0x8, 0x6}, {0x8, 0xde, 0x42e}, {0xea09, 0x81}, {0x9, 0x2, 0x3}, {0x2e47, 0x8, 0x81}, {0x3, 0x6, 0x7ff}, {0x7, 0x8, 0xfffff979}, {0x1f, 0x8, 0x1f}, {0x200, 0x7, 0x3}, {0x6897bc41, 0x7, 0x3}, {0x9, 0x80000000, 0x9}, {0x1ff, 0x1f, 0xffff}, {0x54, 0x9, 0x81}, {0xffffffff, 0x9cea, 0x3}, {0x7f, 0x7f, 0x3}, {0x800, 0x9, 0x6}, {0x5, 0xc46, 0x8000}, {0x0, 0x3, 0x8}, {0x2, 0x3}, {0x430, 0x2, 0x1ff}, {0x7ff, 0x20, 0x3}, {0x3, 0x7, 0xb06}, {0x6, 0x4, 0x2}, {0x401, 0x4, 0x9}, {0x5, 0x7, 0x3}, {0x5, 0x5, 0x1ff}, {0x10000, 0x4, 0x9}, {0x3f, 0xed71, 0xf549}, {0x20, 0x101, 0x4}, {0xfffffffe, 0xbe6a, 0x8000}, {0x9, 0x9, 0x3}, {0x2, 0x5, 0x2}, {0x3, 0x5, 0x4}]}) 06:55:26 executing program 0: bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0xe0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2c, &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000240)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f0000000280), &(0x7f00000002c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000300)}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000500)={0x9, 0x6, &(0x7f0000000000)=@raw=[@jmp={0x5, 0x1, 0x9, 0x8, 0x4, 0xffffffffffffffe0, 0xfffffffffffffffc}, @alu={0x3, 0x1, 0x7, 0xa867116f2783c5dd, 0x0, 0x8, 0x4}, @generic={0x3, 0x2, 0xb, 0x9, 0x3ff}, @map_idx={0x18, 0x6, 0x5, 0x0, 0x8}, @alu={0x7, 0x0, 0x1, 0x0, 0x6, 0xfffffffffffffff4, 0x8}], &(0x7f0000000040)='syzkaller\x00', 0x800, 0xe4, &(0x7f0000000080)=""/228, 0x41000, 0x1, '\x00', r0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000480), 0x8, 0x10, 0x0}, 0x80) sendmsg$TCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f0000000dc0)={&(0x7f0000000b40)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000d80)={&(0x7f0000000b80)={0x1f8, 0x12, 0x20, 0x70bd2a, 0x25dfdbfb, {0x11, 0x0, 0x20, 0x9, {0x4e20, 0x4e20, [0x7, 0x7, 0x6, 0x2], [0x7bdc, 0x1ff, 0x7b], r0, [0x8, 0x5aaf4957]}, 0x2, 0x3}, [@INET_DIAG_REQ_BYTECODE={0x97, 0x1, "1e577e02ddfb1c872df87dee181728a6877a0912e744da1ea8293edfdf76614b5fb9ab83813da6fec234c65a104ba689c191c808aa84db70f28525e7273cd01e27984e8a3edc4c9ac0d697fc768f1f57577c9e4ce9a9cc4ed2055c0112d38e7c0c2877a14fd69fd456754466b050dd7ba375e7aa16b140d0775fe99feb31d86defbf32fba5a8d4fd5b2820dad7d1c087c864b2"}, @INET_DIAG_REQ_BYTECODE={0x36, 0x1, "844a680c14e94870c4c0e70ca3d5c519d24a08f30a723173986805554d74eb15ba5bc6fbe51757e95dfc10b778e19f8fdbf7"}, @INET_DIAG_REQ_BYTECODE={0xdc, 0x1, "a456ac902a8fbfc17944772974043b4d8330dbbc57989948ffe7f0b93cd6fb839110e57879e6466562d238d4ce72c700106b5dd4d51510538c93d384609cd1d982d191f35e282df93d6e5f7f5988342a609c23bc0fabcc6d4d180b662ee1db665b28a5800d74f7ad6a647b60caff708eec67d887689cd16abf0c1a859913d5d97ce30acec22b059ffdf0b2b9cae055a2c03b8c490b51e5faffc0fbbbe8cec87d1522577760937e7375b03a493c9d30443da7af504932de189d2bef6c2055fc515bf11175c65bba681b6ba56a1da42aa0db1a882908f3eaed"}]}, 0x1f8}, 0x1, 0x0, 0x0, 0x810}, 0x8000) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f00000009c0)=@broute={'broute\x00', 0x20, 0x4, 0x730, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000280], 0x0, &(0x7f0000000240), &(0x7f0000000280)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffc, 0x2, [{0x11, 0x0, 0xa00, 'pim6reg0\x00', 'pim6reg0\x00', 'batadv_slave_1\x00', 'wg1\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}, [0x0, 0x0, 0x0, 0xff, 0xff, 0xff], @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, [0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0xbe, 0x186, 0x1b6, [@ipvs={{'ipvs\x00', 0x0, 0x28}, {{@ipv6=@private0, [0x0, 0xffffffff, 0xff, 0xff], 0x4e21, 0x2c, 0x2, 0x4e22, 0x2, 0x24}}}], [@common=@log={'log\x00', 0x28, {{0x0, "5f119e762c1db8de448ce4c4951f940dbda1c0713447e2253d711c9f5fb8"}}}, @common=@nflog={'nflog\x00', 0x50, {{0x4000000, 0xda4c, 0x0, 0x0, 0x0, "220a217b6622766d6beabf834dc7752e9751a2af1afcb8f21e740e1c88edbad8c288914392d3106e43c700647cb44cbd16cf3b49a85af1a029ec728ab6da7e6a"}}}], @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {0x9, 0x7b, 0x892f, 'macsec0\x00', 'bridge_slave_0\x00', 'syz_tun\x00', '\x00', @empty, [0x0, 0x101], @local, [0xff], 0xbe, 0x10e, 0x23e, [@helper={{'helper\x00', 0x0, 0x28}, {{0x0, 'Q.931\x00'}}}], [@common=@log={'log\x00', 0x28, {{0x5, "189d851d5ecbbfdaed3d24ffc0d5e2d55f76f91940db106f1f47620a5c01"}}}], @common=@SECMARK={'SECMARK\x00', 0x108, {{0x1, 0x2, 'system_u:object_r:mount_tmp_t:s0\x00'}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x1, [{0x5, 0x40, 0x8808, 'veth1_virt_wifi\x00', 'dvmrp0\x00', 'veth1_to_team\x00', 'pim6reg\x00', @broadcast, [0x0, 0xff, 0xff, 0x0, 0xff], @multicast, [0x0, 0x0, 0xff, 0x0, 0xff, 0xff], 0xee, 0x11e, 0x166, [@quota={{'quota\x00', 0x0, 0x18}, {{0x0, 0x0, 0x9, {0xffffffffffffff04}}}}, @connbytes={{'connbytes\x00', 0x0, 0x18}, {{[{0x80000001}, {0x1}], 0x0, 0x2}}}], [@common=@redirect={'redirect\x00', 0x8, {{0xfffffffffffffffe}}}], @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00', 0x2, 0xd0, {0x9}}}}}]}, {0x0, '\x00', 0x3, 0xfffffffffffffffc, 0x1, [{0x9, 0x14, 0x88ca, 'team_slave_1\x00', 'macsec0\x00', 'vlan0\x00', 'bond_slave_0\x00', @random="86be302db618", [0x0, 0x0, 0x0, 0xff, 0xff], @dev={'\xaa\xaa\xaa\xaa\xaa', 0x8}, [0xff, 0xff, 0x80, 0xff, 0x0, 0xff], 0x9e, 0xe6, 0x116, [@cpu={{'cpu\x00', 0x0, 0x8}, {{0x6}}}], [@common=@ERROR={'ERROR\x00', 0x20, {"be6cc5036378604a89760d44c5bed06b1ae293c34e0ae2528bea3becc196"}}], @common=@NFQUEUE0={'NFQUEUE\x00', 0x8, {{0x4092}}}}]}]}, 0x7a8) ioctl$USBDEVFS_SUBMITURB(0xffffffffffffffff, 0x8038550a, &(0x7f0000000200)=@urb_type_control={0x2, {0x2}, 0xfffffffb, 0x4, &(0x7f0000000a40)={0x80, 0x16, 0x2005, 0x7, 0x8}, 0x8, 0xf8, 0x7, 0x0, 0x0, 0x5, &(0x7f0000000a80)="cfc206af3b20cc76f92c2426377a243c9d8d6008fafd2fd67138c6b064102eec84099eccfeb5a4b8a5f3f11f2b3a7efc7bb159fd9e2cfe9dfc7021a27eef2f1b8a14ae37ef3f5850a71385fa82e17ca63c6617a30e1bc3576e8ee08aac39ab0a21c7d06379bcc8bd197b3c4706285c7606cc6c43a9f9a4485fa40997c39a4da54d472ef5eb63dbcb91c23e669d6e8836e2269a1d466533236ed3bd"}) 06:55:26 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x802c550a, &(0x7f0000000140)=@urb_type_iso={0x0, {}, 0x0, 0x0, &(0x7f0000000080), 0x0, 0x0, 0x20000000, 0x4b, 0x2, 0x1, &(0x7f0000000100)="5cf209fef7de04f14a1dc41da8d1a9b349f810a49f5cc02f98abccd91ac755550e7c0478127d611c90fabf4ffbb4c7afb16bbb4bc05e7fc7d9a6798c4930ca", [{0x8, 0x5, 0x100}, {0x40, 0x5, 0x3}, {0x8000, 0x5, 0x1}, {0x8, 0x2, 0x7f}, {0x9, 0x0, 0x4d}, {0x9, 0x8b88, 0x1}, {0x81, 0x5, 0x3ff}, {0xffffffff, 0xfffffff7, 0x5}, {0x7fffffff, 0x417, 0x40}, {0x401, 0x1, 0x950}, {0x6, 0xfff, 0x4}, {0x0, 0x8, 0x8}, {0xcd6fcee5, 0x4, 0xffffffff}, {0x7, 0x9, 0x9}, {0x3230fea4, 0x1ff, 0x401}, {0xf3d, 0xad, 0x2}, {0x7, 0x5, 0x8}, {0x800, 0xfffffffd, 0xff}, {0x5, 0x3, 0x7}, {0x7fffffff, 0x101, 0x1ff}, {0x11bb7e2, 0xe52}, {0x1, 0xffffffff, 0x7}, {0x3, 0x0, 0x4}, {0x1f, 0x80, 0x6}, {0x80, 0x9a, 0x1}, {0x3, 0xffff, 0xffff}, {0x81, 0x3, 0x8}, {0x0, 0x8, 0x400}, {0xfffffe01, 0x100, 0xf55}, {0x10001, 0xff, 0x7}, {0x2, 0x80000001, 0x7}, {0x4, 0xc708, 0x3ff}, {0x1, 0x7, 0x3}, {0x339, 0x8, 0x2}, {0x101, 0xffffffff, 0x10001}, {0x3, 0xff, 0x3}, {0x6b, 0xb0f, 0x5}, {0x7ff, 0x9, 0x7de5}, {0x80000001, 0x7f, 0x2}, {0x8, 0x6}, {0x3, 0x8001, 0x3ff}, {0x4, 0x5, 0x5d}, {0x75d23712, 0x8, 0x6}, {0x8, 0xde, 0x42e}, {0xea09, 0x81}, {0x9, 0x2, 0x3}, {0x2e47, 0x8, 0x81}, {0x3, 0x6, 0x7ff}, {0x7, 0x8, 0xfffff979}, {0x1f, 0x8, 0x1f}, {0x200, 0x7, 0x3}, {0x6897bc41, 0x7, 0x3}, {0x9, 0x80000000, 0x9}, {0x1ff, 0x1f, 0xffff}, {0x54, 0x9, 0x81}, {0xffffffff, 0x9cea, 0x3}, {0x7f, 0x7f, 0x3}, {0x800, 0x9, 0x6}, {0x5, 0xc46, 0x8000}, {0x0, 0x3, 0x8}, {0x2, 0x3}, {0x430, 0x2, 0x1ff}, {0x7ff, 0x20, 0x3}, {0x3, 0x7, 0xb06}, {0x6, 0x4, 0x2}, {0x401, 0x4, 0x9}, {0x5, 0x7, 0x3}, {0x5, 0x5, 0x1ff}, {0x10000, 0x4, 0x9}, {0x3f, 0xed71, 0xf549}, {0x20, 0x101, 0x4}, {0xfffffffe, 0xbe6a, 0x8000}, {0x9, 0x9, 0x3}, {0x2, 0x5, 0x2}, {0x3, 0x5, 0x4}]}) 06:55:26 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) (fail_nth: 2) 06:55:26 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) 06:55:26 executing program 0: bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0xe0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2c, &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000240)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f0000000280), &(0x7f00000002c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000300)}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000500)={0x9, 0x6, &(0x7f0000000000)=@raw=[@jmp={0x5, 0x1, 0x9, 0x8, 0x4, 0xffffffffffffffe0, 0xfffffffffffffffc}, @alu={0x3, 0x1, 0x7, 0xa867116f2783c5dd, 0x0, 0x8, 0x4}, @generic={0x3, 0x2, 0xb, 0x9, 0x3ff}, @map_idx={0x18, 0x6, 0x5, 0x0, 0x8}, @alu={0x7, 0x0, 0x1, 0x0, 0x6, 0xfffffffffffffff4, 0x8}], &(0x7f0000000040)='syzkaller\x00', 0x800, 0xe4, &(0x7f0000000080)=""/228, 0x41000, 0x1, '\x00', r0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000480), 0x8, 0x10, 0x0}, 0x80) sendmsg$TCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f0000000dc0)={&(0x7f0000000b40)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000d80)={&(0x7f0000000b80)={0x1f8, 0x12, 0x20, 0x70bd2a, 0x25dfdbfb, {0x11, 0x0, 0x20, 0x9, {0x4e20, 0x4e20, [0x7, 0x7, 0x6, 0x2], [0x7bdc, 0x1ff, 0x7b], r0, [0x8, 0x5aaf4957]}, 0x2, 0x3}, [@INET_DIAG_REQ_BYTECODE={0x97, 0x1, "1e577e02ddfb1c872df87dee181728a6877a0912e744da1ea8293edfdf76614b5fb9ab83813da6fec234c65a104ba689c191c808aa84db70f28525e7273cd01e27984e8a3edc4c9ac0d697fc768f1f57577c9e4ce9a9cc4ed2055c0112d38e7c0c2877a14fd69fd456754466b050dd7ba375e7aa16b140d0775fe99feb31d86defbf32fba5a8d4fd5b2820dad7d1c087c864b2"}, @INET_DIAG_REQ_BYTECODE={0x36, 0x1, "844a680c14e94870c4c0e70ca3d5c519d24a08f30a723173986805554d74eb15ba5bc6fbe51757e95dfc10b778e19f8fdbf7"}, @INET_DIAG_REQ_BYTECODE={0xdc, 0x1, "a456ac902a8fbfc17944772974043b4d8330dbbc57989948ffe7f0b93cd6fb839110e57879e6466562d238d4ce72c700106b5dd4d51510538c93d384609cd1d982d191f35e282df93d6e5f7f5988342a609c23bc0fabcc6d4d180b662ee1db665b28a5800d74f7ad6a647b60caff708eec67d887689cd16abf0c1a859913d5d97ce30acec22b059ffdf0b2b9cae055a2c03b8c490b51e5faffc0fbbbe8cec87d1522577760937e7375b03a493c9d30443da7af504932de189d2bef6c2055fc515bf11175c65bba681b6ba56a1da42aa0db1a882908f3eaed"}]}, 0x1f8}, 0x1, 0x0, 0x0, 0x810}, 0x8000) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f00000009c0)=@broute={'broute\x00', 0x20, 0x4, 0x730, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000280], 0x0, &(0x7f0000000240), &(0x7f0000000280)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffc, 0x2, [{0x11, 0x0, 0xa00, 'pim6reg0\x00', 'pim6reg0\x00', 'batadv_slave_1\x00', 'wg1\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}, [0x0, 0x0, 0x0, 0xff, 0xff, 0xff], @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, [0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0xbe, 0x186, 0x1b6, [@ipvs={{'ipvs\x00', 0x0, 0x28}, {{@ipv6=@private0, [0x0, 0xffffffff, 0xff, 0xff], 0x4e21, 0x2c, 0x2, 0x4e22, 0x2, 0x24}}}], [@common=@log={'log\x00', 0x28, {{0x0, "5f119e762c1db8de448ce4c4951f940dbda1c0713447e2253d711c9f5fb8"}}}, @common=@nflog={'nflog\x00', 0x50, {{0x4000000, 0xda4c, 0x0, 0x0, 0x0, "220a217b6622766d6beabf834dc7752e9751a2af1afcb8f21e740e1c88edbad8c288914392d3106e43c700647cb44cbd16cf3b49a85af1a029ec728ab6da7e6a"}}}], @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {0x9, 0x7b, 0x892f, 'macsec0\x00', 'bridge_slave_0\x00', 'syz_tun\x00', '\x00', @empty, [0x0, 0x101], @local, [0xff], 0xbe, 0x10e, 0x23e, [@helper={{'helper\x00', 0x0, 0x28}, {{0x0, 'Q.931\x00'}}}], [@common=@log={'log\x00', 0x28, {{0x5, "189d851d5ecbbfdaed3d24ffc0d5e2d55f76f91940db106f1f47620a5c01"}}}], @common=@SECMARK={'SECMARK\x00', 0x108, {{0x1, 0x2, 'system_u:object_r:mount_tmp_t:s0\x00'}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x1, [{0x5, 0x40, 0x8808, 'veth1_virt_wifi\x00', 'dvmrp0\x00', 'veth1_to_team\x00', 'pim6reg\x00', @broadcast, [0x0, 0xff, 0xff, 0x0, 0xff], @multicast, [0x0, 0x0, 0xff, 0x0, 0xff, 0xff], 0xee, 0x11e, 0x166, [@quota={{'quota\x00', 0x0, 0x18}, {{0x0, 0x0, 0x9, {0xffffffffffffff04}}}}, @connbytes={{'connbytes\x00', 0x0, 0x18}, {{[{0x80000001}, {0x1}], 0x0, 0x2}}}], [@common=@redirect={'redirect\x00', 0x8, {{0xfffffffffffffffe}}}], @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00', 0x2, 0xd0, {0x9}}}}}]}, {0x0, '\x00', 0x3, 0xfffffffffffffffc, 0x1, [{0x9, 0x14, 0x88ca, 'team_slave_1\x00', 'macsec0\x00', 'vlan0\x00', 'bond_slave_0\x00', @random="86be302db618", [0x0, 0x0, 0x0, 0xff, 0xff], @dev={'\xaa\xaa\xaa\xaa\xaa', 0x8}, [0xff, 0xff, 0x80, 0xff, 0x0, 0xff], 0x9e, 0xe6, 0x116, [@cpu={{'cpu\x00', 0x0, 0x8}, {{0x6}}}], [@common=@ERROR={'ERROR\x00', 0x20, {"be6cc5036378604a89760d44c5bed06b1ae293c34e0ae2528bea3becc196"}}], @common=@NFQUEUE0={'NFQUEUE\x00', 0x8, {{0x4092}}}}]}]}, 0x7a8) ioctl$USBDEVFS_SUBMITURB(0xffffffffffffffff, 0x8038550a, &(0x7f0000000200)=@urb_type_control={0x2, {0x2}, 0xfffffffb, 0x4, &(0x7f0000000a40)={0x80, 0x16, 0x2005, 0x7, 0x8}, 0x8, 0xf8, 0x7, 0x0, 0x0, 0x5, &(0x7f0000000a80)="cfc206af3b20cc76f92c2426377a243c9d8d6008fafd2fd67138c6b064102eec84099eccfeb5a4b8a5f3f11f2b3a7efc7bb159fd9e2cfe9dfc7021a27eef2f1b8a14ae37ef3f5850a71385fa82e17ca63c6617a30e1bc3576e8ee08aac39ab0a21c7d06379bcc8bd197b3c4706285c7606cc6c43a9f9a4485fa40997c39a4da54d472ef5eb63dbcb91c23e669d6e8836e2269a1d466533236ed3bd"}) 06:55:26 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x802c550a, &(0x7f0000000140)=@urb_type_iso={0x0, {}, 0x0, 0x0, &(0x7f0000000080), 0x0, 0x0, 0x0, 0x4b, 0x2, 0x1, &(0x7f0000000100)="5cf209fef7de04f14a1dc41da8d1a9b349f810a49f5cc02f98abccd91ac755550e7c0478127d611c90fabf4ffbb4c7afb16bbb4bc05e7fc7d9a6798c4930ca", [{0x8, 0x5, 0x100}, {0x40, 0x5, 0x3}, {0x8000, 0x5, 0x1}, {0x8, 0x2, 0x7f}, {0x9, 0x0, 0x4d}, {0x9, 0x8b88, 0x1}, {0x81, 0x5, 0x3ff}, {0xffffffff, 0xfffffff7, 0x5}, {0x7fffffff, 0x417, 0x40}, {0x401, 0x1, 0x950}, {0x6, 0xfff, 0x4}, {0x0, 0x8, 0x8}, {0xcd6fcee5, 0x4, 0xffffffff}, {0x7, 0x9, 0x9}, {0x3230fea4, 0x1ff, 0x401}, {0xf3d, 0xad, 0x2}, {0x7, 0x5, 0x8}, {0x800, 0xfffffffd, 0xff}, {0x5, 0x3, 0x7}, {0x7fffffff, 0x101, 0x1ff}, {0x11bb7e2, 0xe52}, {0x1, 0xffffffff, 0x7}, {0x3, 0x0, 0x4}, {0x1f, 0x80, 0x6}, {0x80, 0x9a, 0x1}, {0x3, 0xffff, 0xffff}, {0x81, 0x3, 0x8}, {0x0, 0x8, 0x400}, {0xfffffe01, 0x100, 0xf55}, {0x10001, 0xff, 0x7}, {0x2, 0x80000001, 0x7}, {0x4, 0xc708, 0x3ff}, {0x1, 0x7, 0x3}, {0x339, 0x8, 0x2}, {0x101, 0xffffffff, 0x10001}, {0x3, 0xff, 0x3}, {0x6b, 0xb0f, 0x5}, {0x7ff, 0x9, 0x7de5}, {0x80000001, 0x7f, 0x2}, {0x8, 0x6}, {0x3, 0x8001, 0x3ff}, {0x4, 0x5, 0x5d}, {0x75d23712, 0x8, 0x6}, {0x8, 0xde, 0x42e}, {0xea09, 0x81}, {0x9, 0x2, 0x3}, {0x2e47, 0x8, 0x81}, {0x3, 0x6, 0x7ff}, {0x7, 0x8, 0xfffff979}, {0x1f, 0x8, 0x1f}, {0x200, 0x7, 0x3}, {0x6897bc41, 0x7, 0x3}, {0x9, 0x80000000, 0x9}, {0x1ff, 0x1f, 0xffff}, {0x54, 0x9, 0x81}, {0xffffffff, 0x9cea, 0x3}, {0x7f, 0x7f, 0x3}, {0x800, 0x9, 0x6}, {0x5, 0xc46, 0x8000}, {0x0, 0x3, 0x8}, {0x2, 0x3}, {0x430, 0x2, 0x1ff}, {0x7ff, 0x20, 0x3}, {0x3, 0x7, 0xb06}, {0x6, 0x4, 0x2}, {0x401, 0x4, 0x9}, {0x5, 0x7, 0x3}, {0x5, 0x5, 0x1ff}, {0x10000, 0x4, 0x9}, {0x3f, 0xed71, 0xf549}, {0x20, 0x101, 0x4}, {0xfffffffe, 0xbe6a, 0x8000}, {0x9, 0x9, 0x3}, {0x2, 0x5, 0x2}, {0x3, 0x5, 0x4}]}) 06:55:26 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x8008551c, &(0x7f0000000200)=@urb_type_bulk={0x3, {}, 0x0, 0x0, 0x0, 0x59, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0}) syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) (async) ioctl$USBDEVFS_SUBMITURB(r0, 0x8008551c, &(0x7f0000000200)=@urb_type_bulk={0x3, {}, 0x0, 0x0, 0x0, 0x59, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0}) (async) 06:55:26 executing program 1: bind$inet(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x4e20, @private=0xa010102}, 0x10) r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_GET_SPEED(r0, 0x551f) ioctl$USBDEVFS_SUBMITURB(r0, 0x802c550a, &(0x7f0000000200)=@urb_type_bulk={0x3, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r1 = syz_open_dev$usbfs(&(0x7f0000000080), 0x7ff, 0x1c1000) mmap$usbfs(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x100010, r1, 0x7) bind$inet(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x4e20, @private=0xa010102}, 0x10) (async) syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) (async) ioctl$USBDEVFS_GET_SPEED(r0, 0x551f) (async) ioctl$USBDEVFS_SUBMITURB(r0, 0x802c550a, &(0x7f0000000200)=@urb_type_bulk={0x3, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) (async) syz_open_dev$usbfs(&(0x7f0000000080), 0x7ff, 0x1c1000) (async) mmap$usbfs(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x100010, r1, 0x7) (async) [ 2893.542248][T12019] ? security_file_ioctl+0x7d/0xa0 [ 2893.547328][T12019] __x64_sys_ioctl+0xd4/0x110 [ 2893.551998][T12019] do_syscall_64+0xca/0x1c0 [ 2893.556474][T12019] entry_SYSCALL_64_after_hwframe+0x5c/0xc1 [ 2893.579844][T12045] FAULT_INJECTION: forcing a failure. [ 2893.579844][T12045] name failslab, interval 1, probability 0, space 0, times 0 [ 2893.596818][T12045] CPU: 0 PID: 12045 Comm: syz-executor.4 Not tainted 5.4.233-syzkaller-00019-gd5ed2ca98e48 #0 [ 2893.607053][T12045] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/14/2023 [ 2893.617079][T12045] Call Trace: [ 2893.620348][T12045] dump_stack+0x1d8/0x241 [ 2893.624647][T12045] ? panic+0x768/0x768 [ 2893.628711][T12045] ? nf_ct_l4proto_log_invalid+0x258/0x258 [ 2893.634487][T12045] ? do_vfs_ioctl+0x742/0x1720 [ 2893.639220][T12045] ? do_syscall_64+0xca/0x1c0 [ 2893.643864][T12045] ? entry_SYSCALL_64_after_hwframe+0x5c/0xc1 [ 2893.649905][T12045] should_fail+0x71f/0x880 [ 2893.654293][T12045] ? setup_fault_attr+0x3d0/0x3d0 [ 2893.659373][T12045] ? idr_alloc+0x205/0x2f0 [ 2893.663762][T12045] ? blk_mq_alloc_tag_set+0x311/0x890 [ 2893.669101][T12045] should_failslab+0x5/0x20 [ 2893.673576][T12045] __kmalloc+0x51/0x2b0 [ 2893.677702][T12045] ? idr_alloc_u32+0x320/0x320 [ 2893.682465][T12045] blk_mq_alloc_tag_set+0x311/0x890 [ 2893.687632][T12045] ? loop_add+0x56/0x740 [ 2893.691843][T12045] loop_add+0x231/0x740 [ 2893.695968][T12045] ? get_pid_task+0xc3/0xf0 [ 2893.700447][T12045] ? radix_tree_lookup+0x16f/0x1c0 [ 2893.705529][T12045] loop_control_ioctl+0x448/0x620 [ 2893.710523][T12045] ? loop_remove+0xa0/0xa0 [ 2893.714912][T12045] ? memset+0x1f/0x40 [ 2893.718863][T12045] ? fsnotify+0x1280/0x1340 [ 2893.723334][T12045] ? loop_remove+0xa0/0xa0 [ 2893.727721][T12045] do_vfs_ioctl+0x742/0x1720 [ 2893.732282][T12045] ? ioctl_preallocate+0x250/0x250 [ 2893.737362][T12045] ? __fget+0x407/0x490 [ 2893.741487][T12045] ? fget_many+0x20/0x20 06:55:26 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x802c550a, &(0x7f0000000140)=@urb_type_iso={0x0, {}, 0x0, 0x0, &(0x7f0000000080), 0x0, 0x0, 0x0, 0x4b, 0x0, 0x1, &(0x7f0000000100)="5cf209fef7de04f14a1dc41da8d1a9b349f810a49f5cc02f98abccd91ac755550e7c0478127d611c90fabf4ffbb4c7afb16bbb4bc05e7fc7d9a6798c4930ca", [{0x8, 0x5, 0x100}, {0x40, 0x5, 0x3}, {0x8000, 0x5, 0x1}, {0x8, 0x2, 0x7f}, {0x9, 0x0, 0x4d}, {0x9, 0x8b88, 0x1}, {0x81, 0x5, 0x3ff}, {0xffffffff, 0xfffffff7, 0x5}, {0x7fffffff, 0x417, 0x40}, {0x401, 0x1, 0x950}, {0x6, 0xfff, 0x4}, {0x0, 0x8, 0x8}, {0xcd6fcee5, 0x4, 0xffffffff}, {0x7, 0x9, 0x9}, {0x3230fea4, 0x1ff, 0x401}, {0xf3d, 0xad, 0x2}, {0x7, 0x5, 0x8}, {0x800, 0xfffffffd, 0xff}, {0x5, 0x3, 0x7}, {0x7fffffff, 0x101, 0x1ff}, {0x11bb7e2, 0xe52}, {0x1, 0xffffffff, 0x7}, {0x3, 0x0, 0x4}, {0x1f, 0x80, 0x6}, {0x80, 0x9a, 0x1}, {0x3, 0xffff, 0xffff}, {0x81, 0x3, 0x8}, {0x0, 0x8, 0x400}, {0xfffffe01, 0x100, 0xf55}, {0x10001, 0xff, 0x7}, {0x2, 0x80000001, 0x7}, {0x4, 0xc708, 0x3ff}, {0x1, 0x7, 0x3}, {0x339, 0x8, 0x2}, {0x101, 0xffffffff, 0x10001}, {0x3, 0xff, 0x3}, {0x6b, 0xb0f, 0x5}, {0x7ff, 0x9, 0x7de5}, {0x80000001, 0x7f, 0x2}, {0x8, 0x6}, {0x3, 0x8001, 0x3ff}, {0x4, 0x5, 0x5d}, {0x75d23712, 0x8, 0x6}, {0x8, 0xde, 0x42e}, {0xea09, 0x81}, {0x9, 0x2, 0x3}, {0x2e47, 0x8, 0x81}, {0x3, 0x6, 0x7ff}, {0x7, 0x8, 0xfffff979}, {0x1f, 0x8, 0x1f}, {0x200, 0x7, 0x3}, {0x6897bc41, 0x7, 0x3}, {0x9, 0x80000000, 0x9}, {0x1ff, 0x1f, 0xffff}, {0x54, 0x9, 0x81}, {0xffffffff, 0x9cea, 0x3}, {0x7f, 0x7f, 0x3}, {0x800, 0x9, 0x6}, {0x5, 0xc46, 0x8000}, {0x0, 0x3, 0x8}, {0x2, 0x3}, {0x430, 0x2, 0x1ff}, {0x7ff, 0x20, 0x3}, {0x3, 0x7, 0xb06}, {0x6, 0x4, 0x2}, {0x401, 0x4, 0x9}, {0x5, 0x7, 0x3}, {0x5, 0x5, 0x1ff}, {0x10000, 0x4, 0x9}, {0x3f, 0xed71, 0xf549}, {0x20, 0x101, 0x4}, {0xfffffffe, 0xbe6a, 0x8000}, {0x9, 0x9, 0x3}, {0x2, 0x5, 0x2}, {0x3, 0x5, 0x4}]}) 06:55:26 executing program 0: bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0xe0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2c, &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000240)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f0000000280), &(0x7f00000002c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000300)}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000500)={0x9, 0x6, &(0x7f0000000000)=@raw=[@jmp={0x5, 0x1, 0x9, 0x8, 0x4, 0xffffffffffffffe0, 0xfffffffffffffffc}, @alu={0x3, 0x1, 0x7, 0xa867116f2783c5dd, 0x0, 0x8, 0x4}, @generic={0x3, 0x2, 0xb, 0x9, 0x3ff}, @map_idx={0x18, 0x6, 0x5, 0x0, 0x8}, @alu={0x7, 0x0, 0x1, 0x0, 0x6, 0xfffffffffffffff4, 0x8}], &(0x7f0000000040)='syzkaller\x00', 0x800, 0xe4, &(0x7f0000000080)=""/228, 0x41000, 0x1, '\x00', r0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000480), 0x8, 0x10, 0x0}, 0x80) sendmsg$TCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f0000000dc0)={&(0x7f0000000b40)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000d80)={&(0x7f0000000b80)={0x1f8, 0x12, 0x20, 0x70bd2a, 0x25dfdbfb, {0x11, 0x0, 0x20, 0x9, {0x4e20, 0x4e20, [0x7, 0x7, 0x6, 0x2], [0x7bdc, 0x1ff, 0x7b], r0, [0x8, 0x5aaf4957]}, 0x2, 0x3}, [@INET_DIAG_REQ_BYTECODE={0x97, 0x1, "1e577e02ddfb1c872df87dee181728a6877a0912e744da1ea8293edfdf76614b5fb9ab83813da6fec234c65a104ba689c191c808aa84db70f28525e7273cd01e27984e8a3edc4c9ac0d697fc768f1f57577c9e4ce9a9cc4ed2055c0112d38e7c0c2877a14fd69fd456754466b050dd7ba375e7aa16b140d0775fe99feb31d86defbf32fba5a8d4fd5b2820dad7d1c087c864b2"}, @INET_DIAG_REQ_BYTECODE={0x36, 0x1, "844a680c14e94870c4c0e70ca3d5c519d24a08f30a723173986805554d74eb15ba5bc6fbe51757e95dfc10b778e19f8fdbf7"}, @INET_DIAG_REQ_BYTECODE={0xdc, 0x1, "a456ac902a8fbfc17944772974043b4d8330dbbc57989948ffe7f0b93cd6fb839110e57879e6466562d238d4ce72c700106b5dd4d51510538c93d384609cd1d982d191f35e282df93d6e5f7f5988342a609c23bc0fabcc6d4d180b662ee1db665b28a5800d74f7ad6a647b60caff708eec67d887689cd16abf0c1a859913d5d97ce30acec22b059ffdf0b2b9cae055a2c03b8c490b51e5faffc0fbbbe8cec87d1522577760937e7375b03a493c9d30443da7af504932de189d2bef6c2055fc515bf11175c65bba681b6ba56a1da42aa0db1a882908f3eaed"}]}, 0x1f8}, 0x1, 0x0, 0x0, 0x810}, 0x8000) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f00000009c0)=@broute={'broute\x00', 0x20, 0x4, 0x730, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000280], 0x0, &(0x7f0000000240), &(0x7f0000000280)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffc, 0x2, [{0x11, 0x0, 0xa00, 'pim6reg0\x00', 'pim6reg0\x00', 'batadv_slave_1\x00', 'wg1\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}, [0x0, 0x0, 0x0, 0xff, 0xff, 0xff], @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, [0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0xbe, 0x186, 0x1b6, [@ipvs={{'ipvs\x00', 0x0, 0x28}, {{@ipv6=@private0, [0x0, 0xffffffff, 0xff, 0xff], 0x4e21, 0x2c, 0x2, 0x4e22, 0x2, 0x24}}}], [@common=@log={'log\x00', 0x28, {{0x0, "5f119e762c1db8de448ce4c4951f940dbda1c0713447e2253d711c9f5fb8"}}}, @common=@nflog={'nflog\x00', 0x50, {{0x4000000, 0xda4c, 0x0, 0x0, 0x0, "220a217b6622766d6beabf834dc7752e9751a2af1afcb8f21e740e1c88edbad8c288914392d3106e43c700647cb44cbd16cf3b49a85af1a029ec728ab6da7e6a"}}}], @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {0x9, 0x7b, 0x892f, 'macsec0\x00', 'bridge_slave_0\x00', 'syz_tun\x00', '\x00', @empty, [0x0, 0x101], @local, [0xff], 0xbe, 0x10e, 0x23e, [@helper={{'helper\x00', 0x0, 0x28}, {{0x0, 'Q.931\x00'}}}], [@common=@log={'log\x00', 0x28, {{0x5, "189d851d5ecbbfdaed3d24ffc0d5e2d55f76f91940db106f1f47620a5c01"}}}], @common=@SECMARK={'SECMARK\x00', 0x108, {{0x1, 0x2, 'system_u:object_r:mount_tmp_t:s0\x00'}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x1, [{0x5, 0x40, 0x8808, 'veth1_virt_wifi\x00', 'dvmrp0\x00', 'veth1_to_team\x00', 'pim6reg\x00', @broadcast, [0x0, 0xff, 0xff, 0x0, 0xff], @multicast, [0x0, 0x0, 0xff, 0x0, 0xff, 0xff], 0xee, 0x11e, 0x166, [@quota={{'quota\x00', 0x0, 0x18}, {{0x0, 0x0, 0x9, {0xffffffffffffff04}}}}, @connbytes={{'connbytes\x00', 0x0, 0x18}, {{[{0x80000001}, {0x1}], 0x0, 0x2}}}], [@common=@redirect={'redirect\x00', 0x8, {{0xfffffffffffffffe}}}], @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00', 0x2, 0xd0, {0x9}}}}}]}, {0x0, '\x00', 0x3, 0xfffffffffffffffc, 0x1, [{0x9, 0x14, 0x88ca, 'team_slave_1\x00', 'macsec0\x00', 'vlan0\x00', 'bond_slave_0\x00', @random="86be302db618", [0x0, 0x0, 0x0, 0xff, 0xff], @dev={'\xaa\xaa\xaa\xaa\xaa', 0x8}, [0xff, 0xff, 0x80, 0xff, 0x0, 0xff], 0x9e, 0xe6, 0x116, [@cpu={{'cpu\x00', 0x0, 0x8}, {{0x6}}}], [@common=@ERROR={'ERROR\x00', 0x20, {"be6cc5036378604a89760d44c5bed06b1ae293c34e0ae2528bea3becc196"}}], @common=@NFQUEUE0={'NFQUEUE\x00', 0x8, {{0x4092}}}}]}]}, 0x7a8) ioctl$USBDEVFS_SUBMITURB(0xffffffffffffffff, 0x8038550a, &(0x7f0000000200)=@urb_type_control={0x2, {0x2}, 0xfffffffb, 0x4, &(0x7f0000000a40)={0x80, 0x16, 0x2005, 0x7, 0x8}, 0x8, 0xf8, 0x7, 0x0, 0x0, 0x5, &(0x7f0000000a80)="cfc206af3b20cc76f92c2426377a243c9d8d6008fafd2fd67138c6b064102eec84099eccfeb5a4b8a5f3f11f2b3a7efc7bb159fd9e2cfe9dfc7021a27eef2f1b8a14ae37ef3f5850a71385fa82e17ca63c6617a30e1bc3576e8ee08aac39ab0a21c7d06379bcc8bd197b3c4706285c7606cc6c43a9f9a4485fa40997c39a4da54d472ef5eb63dbcb91c23e669d6e8836e2269a1d466533236ed3bd"}) 06:55:26 executing program 1: bind$inet(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x4e20, @private=0xa010102}, 0x10) r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_GET_SPEED(r0, 0x551f) ioctl$USBDEVFS_SUBMITURB(r0, 0x802c550a, &(0x7f0000000200)=@urb_type_bulk={0x3, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r1 = syz_open_dev$usbfs(&(0x7f0000000080), 0x7ff, 0x1c1000) mmap$usbfs(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x100010, r1, 0x7) bind$inet(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x4e20, @private=0xa010102}, 0x10) (async) syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) (async) ioctl$USBDEVFS_GET_SPEED(r0, 0x551f) (async) ioctl$USBDEVFS_SUBMITURB(r0, 0x802c550a, &(0x7f0000000200)=@urb_type_bulk={0x3, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) (async) syz_open_dev$usbfs(&(0x7f0000000080), 0x7ff, 0x1c1000) (async) mmap$usbfs(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x100010, r1, 0x7) (async) 06:55:26 executing program 0: bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0xe0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2c, &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000240)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f0000000280), &(0x7f00000002c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000300)}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000500)={0x9, 0x6, &(0x7f0000000000)=@raw=[@jmp={0x5, 0x1, 0x9, 0x8, 0x4, 0xffffffffffffffe0, 0xfffffffffffffffc}, @alu={0x3, 0x1, 0x7, 0xa867116f2783c5dd, 0x0, 0x8, 0x4}, @generic={0x3, 0x2, 0xb, 0x9, 0x3ff}, @map_idx={0x18, 0x6, 0x5, 0x0, 0x8}, @alu={0x7, 0x0, 0x1, 0x0, 0x6, 0xfffffffffffffff4, 0x8}], &(0x7f0000000040)='syzkaller\x00', 0x800, 0xe4, &(0x7f0000000080)=""/228, 0x41000, 0x1, '\x00', r0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000480), 0x8, 0x10, 0x0}, 0x80) sendmsg$TCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f0000000dc0)={&(0x7f0000000b40)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000d80)={&(0x7f0000000b80)={0x1f8, 0x12, 0x20, 0x70bd2a, 0x25dfdbfb, {0x11, 0x0, 0x20, 0x9, {0x4e20, 0x4e20, [0x7, 0x7, 0x6, 0x2], [0x7bdc, 0x1ff, 0x7b], r0, [0x8, 0x5aaf4957]}, 0x2, 0x3}, [@INET_DIAG_REQ_BYTECODE={0x97, 0x1, "1e577e02ddfb1c872df87dee181728a6877a0912e744da1ea8293edfdf76614b5fb9ab83813da6fec234c65a104ba689c191c808aa84db70f28525e7273cd01e27984e8a3edc4c9ac0d697fc768f1f57577c9e4ce9a9cc4ed2055c0112d38e7c0c2877a14fd69fd456754466b050dd7ba375e7aa16b140d0775fe99feb31d86defbf32fba5a8d4fd5b2820dad7d1c087c864b2"}, @INET_DIAG_REQ_BYTECODE={0x36, 0x1, "844a680c14e94870c4c0e70ca3d5c519d24a08f30a723173986805554d74eb15ba5bc6fbe51757e95dfc10b778e19f8fdbf7"}, @INET_DIAG_REQ_BYTECODE={0xdc, 0x1, "a456ac902a8fbfc17944772974043b4d8330dbbc57989948ffe7f0b93cd6fb839110e57879e6466562d238d4ce72c700106b5dd4d51510538c93d384609cd1d982d191f35e282df93d6e5f7f5988342a609c23bc0fabcc6d4d180b662ee1db665b28a5800d74f7ad6a647b60caff708eec67d887689cd16abf0c1a859913d5d97ce30acec22b059ffdf0b2b9cae055a2c03b8c490b51e5faffc0fbbbe8cec87d1522577760937e7375b03a493c9d30443da7af504932de189d2bef6c2055fc515bf11175c65bba681b6ba56a1da42aa0db1a882908f3eaed"}]}, 0x1f8}, 0x1, 0x0, 0x0, 0x810}, 0x8000) r1 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r1, 0x8038550a, &(0x7f0000000200)=@urb_type_control={0x2, {0x2}, 0xfffffffb, 0x4, &(0x7f0000000a40)={0x80, 0x16, 0x2005, 0x7, 0x8}, 0x8, 0xf8, 0x7, 0x0, 0x0, 0x5, &(0x7f0000000a80)="cfc206af3b20cc76f92c2426377a243c9d8d6008fafd2fd67138c6b064102eec84099eccfeb5a4b8a5f3f11f2b3a7efc7bb159fd9e2cfe9dfc7021a27eef2f1b8a14ae37ef3f5850a71385fa82e17ca63c6617a30e1bc3576e8ee08aac39ab0a21c7d06379bcc8bd197b3c4706285c7606cc6c43a9f9a4485fa40997c39a4da54d472ef5eb63dbcb91c23e669d6e8836e2269a1d466533236ed3bd"}) 06:55:26 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x802c550a, &(0x7f0000000140)=@urb_type_iso={0x0, {}, 0x0, 0x0, &(0x7f0000000080), 0x0, 0x0, 0x0, 0x4b, 0x0, 0x0, &(0x7f0000000100)="5cf209fef7de04f14a1dc41da8d1a9b349f810a49f5cc02f98abccd91ac755550e7c0478127d611c90fabf4ffbb4c7afb16bbb4bc05e7fc7d9a6798c4930ca", [{0x8, 0x5, 0x100}, {0x40, 0x5, 0x3}, {0x8000, 0x5, 0x1}, {0x8, 0x2, 0x7f}, {0x9, 0x0, 0x4d}, {0x9, 0x8b88, 0x1}, {0x81, 0x5, 0x3ff}, {0xffffffff, 0xfffffff7, 0x5}, {0x7fffffff, 0x417, 0x40}, {0x401, 0x1, 0x950}, {0x6, 0xfff, 0x4}, {0x0, 0x8, 0x8}, {0xcd6fcee5, 0x4, 0xffffffff}, {0x7, 0x9, 0x9}, {0x3230fea4, 0x1ff, 0x401}, {0xf3d, 0xad, 0x2}, {0x7, 0x5, 0x8}, {0x800, 0xfffffffd, 0xff}, {0x5, 0x3, 0x7}, {0x7fffffff, 0x101, 0x1ff}, {0x11bb7e2, 0xe52}, {0x1, 0xffffffff, 0x7}, {0x3, 0x0, 0x4}, {0x1f, 0x80, 0x6}, {0x80, 0x9a, 0x1}, {0x3, 0xffff, 0xffff}, {0x81, 0x3, 0x8}, {0x0, 0x8, 0x400}, {0xfffffe01, 0x100, 0xf55}, {0x10001, 0xff, 0x7}, {0x2, 0x80000001, 0x7}, {0x4, 0xc708, 0x3ff}, {0x1, 0x7, 0x3}, {0x339, 0x8, 0x2}, {0x101, 0xffffffff, 0x10001}, {0x3, 0xff, 0x3}, {0x6b, 0xb0f, 0x5}, {0x7ff, 0x9, 0x7de5}, {0x80000001, 0x7f, 0x2}, {0x8, 0x6}, {0x3, 0x8001, 0x3ff}, {0x4, 0x5, 0x5d}, {0x75d23712, 0x8, 0x6}, {0x8, 0xde, 0x42e}, {0xea09, 0x81}, {0x9, 0x2, 0x3}, {0x2e47, 0x8, 0x81}, {0x3, 0x6, 0x7ff}, {0x7, 0x8, 0xfffff979}, {0x1f, 0x8, 0x1f}, {0x200, 0x7, 0x3}, {0x6897bc41, 0x7, 0x3}, {0x9, 0x80000000, 0x9}, {0x1ff, 0x1f, 0xffff}, {0x54, 0x9, 0x81}, {0xffffffff, 0x9cea, 0x3}, {0x7f, 0x7f, 0x3}, {0x800, 0x9, 0x6}, {0x5, 0xc46, 0x8000}, {0x0, 0x3, 0x8}, {0x2, 0x3}, {0x430, 0x2, 0x1ff}, {0x7ff, 0x20, 0x3}, {0x3, 0x7, 0xb06}, {0x6, 0x4, 0x2}, {0x401, 0x4, 0x9}, {0x5, 0x7, 0x3}, {0x5, 0x5, 0x1ff}, {0x10000, 0x4, 0x9}, {0x3f, 0xed71, 0xf549}, {0x20, 0x101, 0x4}, {0xfffffffe, 0xbe6a, 0x8000}, {0x9, 0x9, 0x3}, {0x2, 0x5, 0x2}, {0x3, 0x5, 0x4}]}) 06:55:26 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x802c550a, &(0x7f0000000200)=@urb_type_bulk={0x2, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) (fail_nth: 1) [ 2893.745707][T12045] ? debug_smp_processor_id+0x20/0x20 [ 2893.751052][T12045] ? security_file_ioctl+0x7d/0xa0 [ 2893.756129][T12045] __x64_sys_ioctl+0xd4/0x110 [ 2893.760776][T12045] do_syscall_64+0xca/0x1c0 [ 2893.765247][T12045] entry_SYSCALL_64_after_hwframe+0x5c/0xc1 06:55:26 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) (fail_nth: 3) 06:55:26 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x8008551c, &(0x7f0000000200)=@urb_type_bulk={0x3, {}, 0x0, 0x0, 0x0, 0x59, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0}) syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) (async) ioctl$USBDEVFS_SUBMITURB(r0, 0x8008551c, &(0x7f0000000200)=@urb_type_bulk={0x3, {}, 0x0, 0x0, 0x0, 0x59, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0}) (async) 06:55:26 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x802c550a, &(0x7f0000000200)=@urb_type_bulk={0x2, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 06:55:26 executing program 1: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x802c550a, &(0x7f0000000200)=@urb_type_bulk={0x3, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r1 = syz_open_dev$usbfs(&(0x7f0000000380), 0x6e665f53, 0x0) ioctl$USBDEVFS_CLEAR_HALT(r1, 0x80045515, 0x0) ioctl$USBDEVFS_BULK(r1, 0xc0185502, &(0x7f0000000140)={{{0x2}}, 0xe1, 0x8, &(0x7f0000000040)="04aad26c1de701ae0136163cc7ab9db4e127c51be18647f8fc62955dd74cd7bc08b7b84e9e199c6ffa925202601971c5c38c2105195e545c83a4efda25a381bf1f448e6d605235dfd2e532b25502547b2a386c2c6ae2b9fdbb7c92d43fda116eec66ad924a280a5bf899f4dbd6e8a5d01c7da56c7087c153dd1f6e9ad928ab632d50bc41219ab16d761dd7bb90276a91c6e3ebe747d885ca2c6a046cb6167bf27c38864f788b9373382f572ee551d46223ec1f233618fe7b981d50882c88e25906e1b26973076d105c9f24e66255fb9c6540c0da5cbac9587fdb117e28ba863838"}) 06:55:26 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x802c550a, &(0x7f0000000140)=@urb_type_iso={0x0, {}, 0x0, 0x0, &(0x7f0000000080), 0x0, 0x0, 0x0, 0x4b, 0x0, 0x0, 0x0, [{0x8, 0x5, 0x100}, {0x40, 0x5, 0x3}, {0x8000, 0x5, 0x1}, {0x8, 0x2, 0x7f}, {0x9, 0x0, 0x4d}, {0x9, 0x8b88, 0x1}, {0x81, 0x5, 0x3ff}, {0xffffffff, 0xfffffff7, 0x5}, {0x7fffffff, 0x417, 0x40}, {0x401, 0x1, 0x950}, {0x6, 0xfff, 0x4}, {0x0, 0x8, 0x8}, {0xcd6fcee5, 0x4, 0xffffffff}, {0x7, 0x9, 0x9}, {0x3230fea4, 0x1ff, 0x401}, {0xf3d, 0xad, 0x2}, {0x7, 0x5, 0x8}, {0x800, 0xfffffffd, 0xff}, {0x5, 0x3, 0x7}, {0x7fffffff, 0x101, 0x1ff}, {0x11bb7e2, 0xe52}, {0x1, 0xffffffff, 0x7}, {0x3, 0x0, 0x4}, {0x1f, 0x80, 0x6}, {0x80, 0x9a, 0x1}, {0x3, 0xffff, 0xffff}, {0x81, 0x3, 0x8}, {0x0, 0x8, 0x400}, {0xfffffe01, 0x100, 0xf55}, {0x10001, 0xff, 0x7}, {0x2, 0x80000001, 0x7}, {0x4, 0xc708, 0x3ff}, {0x1, 0x7, 0x3}, {0x339, 0x8, 0x2}, {0x101, 0xffffffff, 0x10001}, {0x3, 0xff, 0x3}, {0x6b, 0xb0f, 0x5}, {0x7ff, 0x9, 0x7de5}, {0x80000001, 0x7f, 0x2}, {0x8, 0x6}, {0x3, 0x8001, 0x3ff}, {0x4, 0x5, 0x5d}, {0x75d23712, 0x8, 0x6}, {0x8, 0xde, 0x42e}, {0xea09, 0x81}, {0x9, 0x2, 0x3}, {0x2e47, 0x8, 0x81}, {0x3, 0x6, 0x7ff}, {0x7, 0x8, 0xfffff979}, {0x1f, 0x8, 0x1f}, {0x200, 0x7, 0x3}, {0x6897bc41, 0x7, 0x3}, {0x9, 0x80000000, 0x9}, {0x1ff, 0x1f, 0xffff}, {0x54, 0x9, 0x81}, {0xffffffff, 0x9cea, 0x3}, {0x7f, 0x7f, 0x3}, {0x800, 0x9, 0x6}, {0x5, 0xc46, 0x8000}, {0x0, 0x3, 0x8}, {0x2, 0x3}, {0x430, 0x2, 0x1ff}, {0x7ff, 0x20, 0x3}, {0x3, 0x7, 0xb06}, {0x6, 0x4, 0x2}, {0x401, 0x4, 0x9}, {0x5, 0x7, 0x3}, {0x5, 0x5, 0x1ff}, {0x10000, 0x4, 0x9}, {0x3f, 0xed71, 0xf549}, {0x20, 0x101, 0x4}, {0xfffffffe, 0xbe6a, 0x8000}, {0x9, 0x9, 0x3}, {0x2, 0x5, 0x2}, {0x3, 0x5, 0x4}]}) 06:55:26 executing program 0: bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0xe0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2c, &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000240)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f0000000280), &(0x7f00000002c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000300)}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000500)={0x9, 0x6, &(0x7f0000000000)=@raw=[@jmp={0x5, 0x1, 0x9, 0x8, 0x4, 0xffffffffffffffe0, 0xfffffffffffffffc}, @alu={0x3, 0x1, 0x7, 0xa867116f2783c5dd, 0x0, 0x8, 0x4}, @generic={0x3, 0x2, 0xb, 0x9, 0x3ff}, @map_idx={0x18, 0x6, 0x5, 0x0, 0x8}, @alu={0x7, 0x0, 0x1, 0x0, 0x6, 0xfffffffffffffff4, 0x8}], &(0x7f0000000040)='syzkaller\x00', 0x800, 0xe4, &(0x7f0000000080)=""/228, 0x41000, 0x1, '\x00', r0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000480), 0x8, 0x10, 0x0}, 0x80) r1 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r1, 0x8038550a, &(0x7f0000000200)=@urb_type_control={0x2, {0x2}, 0xfffffffb, 0x4, &(0x7f0000000a40)={0x80, 0x16, 0x2005, 0x7, 0x8}, 0x8, 0xf8, 0x7, 0x0, 0x0, 0x5, &(0x7f0000000a80)="cfc206af3b20cc76f92c2426377a243c9d8d6008fafd2fd67138c6b064102eec84099eccfeb5a4b8a5f3f11f2b3a7efc7bb159fd9e2cfe9dfc7021a27eef2f1b8a14ae37ef3f5850a71385fa82e17ca63c6617a30e1bc3576e8ee08aac39ab0a21c7d06379bcc8bd197b3c4706285c7606cc6c43a9f9a4485fa40997c39a4da54d472ef5eb63dbcb91c23e669d6e8836e2269a1d466533236ed3bd"}) 06:55:26 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x2, &(0x7f0000000200)=@urb_type_bulk={0x2, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 06:55:26 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x802c550a, &(0x7f0000000140)=@urb_type_iso={0x0, {}, 0x0, 0x0, &(0x7f0000000080), 0x0, 0x0, 0x0, 0x4a, 0x0, 0x0, 0x0, [{0x8, 0x5, 0x100}, {0x40, 0x5, 0x3}, {0x8000, 0x5, 0x1}, {0x8, 0x2, 0x7f}, {0x9, 0x0, 0x4d}, {0x9, 0x8b88, 0x1}, {0x81, 0x5, 0x3ff}, {0xffffffff, 0xfffffff7, 0x5}, {0x7fffffff, 0x417, 0x40}, {0x401, 0x1, 0x950}, {0x6, 0xfff, 0x4}, {0x0, 0x8, 0x8}, {0xcd6fcee5, 0x4, 0xffffffff}, {0x7, 0x9, 0x9}, {0x3230fea4, 0x1ff, 0x401}, {0xf3d, 0xad, 0x2}, {0x7, 0x5, 0x8}, {0x800, 0xfffffffd, 0xff}, {0x5, 0x3, 0x7}, {0x7fffffff, 0x101, 0x1ff}, {0x11bb7e2, 0xe52}, {0x1, 0xffffffff, 0x7}, {0x3, 0x0, 0x4}, {0x1f, 0x80, 0x6}, {0x80, 0x9a, 0x1}, {0x3, 0xffff, 0xffff}, {0x81, 0x3, 0x8}, {0x0, 0x8, 0x400}, {0xfffffe01, 0x100, 0xf55}, {0x10001, 0xff, 0x7}, {0x2, 0x80000001, 0x7}, {0x4, 0xc708, 0x3ff}, {0x1, 0x7, 0x3}, {0x339, 0x8, 0x2}, {0x101, 0xffffffff, 0x10001}, {0x3, 0xff, 0x3}, {0x6b, 0xb0f, 0x5}, {0x7ff, 0x9, 0x7de5}, {0x80000001, 0x7f, 0x2}, {0x8, 0x6}, {0x3, 0x8001, 0x3ff}, {0x4, 0x5, 0x5d}, {0x75d23712, 0x8, 0x6}, {0x8, 0xde, 0x42e}, {0xea09, 0x81}, {0x9, 0x2, 0x3}, {0x2e47, 0x8, 0x81}, {0x3, 0x6, 0x7ff}, {0x7, 0x8, 0xfffff979}, {0x1f, 0x8, 0x1f}, {0x200, 0x7, 0x3}, {0x6897bc41, 0x7, 0x3}, {0x9, 0x80000000, 0x9}, {0x1ff, 0x1f, 0xffff}, {0x54, 0x9, 0x81}, {0xffffffff, 0x9cea, 0x3}, {0x7f, 0x7f, 0x3}, {0x800, 0x9, 0x6}, {0x5, 0xc46, 0x8000}, {0x0, 0x3, 0x8}, {0x2, 0x3}, {0x430, 0x2, 0x1ff}, {0x7ff, 0x20, 0x3}, {0x3, 0x7, 0xb06}, {0x6, 0x4, 0x2}, {0x401, 0x4, 0x9}, {0x5, 0x7, 0x3}, {0x5, 0x5, 0x1ff}, {0x10000, 0x4, 0x9}, {0x3f, 0xed71, 0xf549}, {0x20, 0x101, 0x4}, {0xfffffffe, 0xbe6a, 0x8000}, {0x9, 0x9, 0x3}, {0x2, 0x5, 0x2}]}) 06:55:26 executing program 1: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x802c550a, &(0x7f0000000200)=@urb_type_bulk={0x3, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) (async) r1 = syz_open_dev$usbfs(&(0x7f0000000380), 0x6e665f53, 0x0) ioctl$USBDEVFS_CLEAR_HALT(r1, 0x80045515, 0x0) (async) ioctl$USBDEVFS_BULK(r1, 0xc0185502, &(0x7f0000000140)={{{0x2}}, 0xe1, 0x8, &(0x7f0000000040)="04aad26c1de701ae0136163cc7ab9db4e127c51be18647f8fc62955dd74cd7bc08b7b84e9e199c6ffa925202601971c5c38c2105195e545c83a4efda25a381bf1f448e6d605235dfd2e532b25502547b2a386c2c6ae2b9fdbb7c92d43fda116eec66ad924a280a5bf899f4dbd6e8a5d01c7da56c7087c153dd1f6e9ad928ab632d50bc41219ab16d761dd7bb90276a91c6e3ebe747d885ca2c6a046cb6167bf27c38864f788b9373382f572ee551d46223ec1f233618fe7b981d50882c88e25906e1b26973076d105c9f24e66255fb9c6540c0da5cbac9587fdb117e28ba863838"}) 06:55:26 executing program 0: bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0xe0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2c, &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000240)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f0000000280), &(0x7f00000002c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000300)}}, 0x10) r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f0000000200)=@urb_type_control={0x2, {0x2}, 0xfffffffb, 0x4, &(0x7f0000000a40)={0x80, 0x16, 0x2005, 0x7, 0x8}, 0x8, 0xf8, 0x7, 0x0, 0x0, 0x5, &(0x7f0000000a80)="cfc206af3b20cc76f92c2426377a243c9d8d6008fafd2fd67138c6b064102eec84099eccfeb5a4b8a5f3f11f2b3a7efc7bb159fd9e2cfe9dfc7021a27eef2f1b8a14ae37ef3f5850a71385fa82e17ca63c6617a30e1bc3576e8ee08aac39ab0a21c7d06379bcc8bd197b3c4706285c7606cc6c43a9f9a4485fa40997c39a4da54d472ef5eb63dbcb91c23e669d6e8836e2269a1d466533236ed3bd"}) [ 2893.828635][T12083] FAULT_INJECTION: forcing a failure. [ 2893.828635][T12083] name failslab, interval 1, probability 0, space 0, times 0 [ 2893.852843][T12083] CPU: 0 PID: 12083 Comm: syz-executor.4 Not tainted 5.4.233-syzkaller-00019-gd5ed2ca98e48 #0 [ 2893.863176][T12083] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/14/2023 [ 2893.873219][T12083] Call Trace: 06:55:26 executing program 1: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x802c550a, &(0x7f0000000200)=@urb_type_bulk={0x3, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r1 = syz_open_dev$usbfs(&(0x7f0000000380), 0x6e665f53, 0x0) ioctl$USBDEVFS_CLEAR_HALT(r1, 0x80045515, 0x0) ioctl$USBDEVFS_BULK(r1, 0xc0185502, &(0x7f0000000140)={{{0x2}}, 0xe1, 0x8, &(0x7f0000000040)="04aad26c1de701ae0136163cc7ab9db4e127c51be18647f8fc62955dd74cd7bc08b7b84e9e199c6ffa925202601971c5c38c2105195e545c83a4efda25a381bf1f448e6d605235dfd2e532b25502547b2a386c2c6ae2b9fdbb7c92d43fda116eec66ad924a280a5bf899f4dbd6e8a5d01c7da56c7087c153dd1f6e9ad928ab632d50bc41219ab16d761dd7bb90276a91c6e3ebe747d885ca2c6a046cb6167bf27c38864f788b9373382f572ee551d46223ec1f233618fe7b981d50882c88e25906e1b26973076d105c9f24e66255fb9c6540c0da5cbac9587fdb117e28ba863838"}) syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) (async) ioctl$USBDEVFS_SUBMITURB(r0, 0x802c550a, &(0x7f0000000200)=@urb_type_bulk={0x3, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) (async) syz_open_dev$usbfs(&(0x7f0000000380), 0x6e665f53, 0x0) (async) ioctl$USBDEVFS_CLEAR_HALT(r1, 0x80045515, 0x0) (async) ioctl$USBDEVFS_BULK(r1, 0xc0185502, &(0x7f0000000140)={{{0x2}}, 0xe1, 0x8, &(0x7f0000000040)="04aad26c1de701ae0136163cc7ab9db4e127c51be18647f8fc62955dd74cd7bc08b7b84e9e199c6ffa925202601971c5c38c2105195e545c83a4efda25a381bf1f448e6d605235dfd2e532b25502547b2a386c2c6ae2b9fdbb7c92d43fda116eec66ad924a280a5bf899f4dbd6e8a5d01c7da56c7087c153dd1f6e9ad928ab632d50bc41219ab16d761dd7bb90276a91c6e3ebe747d885ca2c6a046cb6167bf27c38864f788b9373382f572ee551d46223ec1f233618fe7b981d50882c88e25906e1b26973076d105c9f24e66255fb9c6540c0da5cbac9587fdb117e28ba863838"}) (async) 06:55:26 executing program 0: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f0000000200)=@urb_type_control={0x2, {0x2}, 0xfffffffb, 0x4, &(0x7f0000000a40)={0x80, 0x16, 0x2005, 0x7, 0x8}, 0x8, 0xf8, 0x7, 0x0, 0x0, 0x5, &(0x7f0000000a80)="cfc206af3b20cc76f92c2426377a243c9d8d6008fafd2fd67138c6b064102eec84099eccfeb5a4b8a5f3f11f2b3a7efc7bb159fd9e2cfe9dfc7021a27eef2f1b8a14ae37ef3f5850a71385fa82e17ca63c6617a30e1bc3576e8ee08aac39ab0a21c7d06379bcc8bd197b3c4706285c7606cc6c43a9f9a4485fa40997c39a4da54d472ef5eb63dbcb91c23e669d6e8836e2269a1d466533236ed3bd"}) [ 2893.876502][T12083] dump_stack+0x1d8/0x241 [ 2893.880822][T12083] ? panic+0x768/0x768 [ 2893.884883][T12083] ? nf_ct_l4proto_log_invalid+0x258/0x258 [ 2893.890683][T12083] should_fail+0x71f/0x880 [ 2893.895093][T12083] ? setup_fault_attr+0x3d0/0x3d0 [ 2893.900106][T12083] ? blk_mq_alloc_tag_set+0x3ab/0x890 [ 2893.905473][T12083] should_failslab+0x5/0x20 [ 2893.909972][T12083] __kmalloc+0x51/0x2b0 [ 2893.914125][T12083] blk_mq_alloc_tag_set+0x3ab/0x890 [ 2893.919346][T12083] loop_add+0x231/0x740 [ 2893.923490][T12083] ? get_pid_task+0xc3/0xf0 [ 2893.927991][T12083] ? radix_tree_lookup+0x16f/0x1c0 [ 2893.933078][T12083] loop_control_ioctl+0x448/0x620 [ 2893.938093][T12083] ? loop_remove+0xa0/0xa0 [ 2893.942482][T12083] ? memset+0x1f/0x40 [ 2893.946436][T12083] ? fsnotify+0x1280/0x1340 [ 2893.950925][T12083] ? loop_remove+0xa0/0xa0 [ 2893.955312][T12083] do_vfs_ioctl+0x742/0x1720 [ 2893.959884][T12083] ? ioctl_preallocate+0x250/0x250 [ 2893.964969][T12083] ? __fget+0x407/0x490 [ 2893.969092][T12083] ? fget_many+0x20/0x20 [ 2893.973302][T12083] ? debug_smp_processor_id+0x20/0x20 06:55:26 executing program 0: r0 = syz_open_dev$usbfs(0x0, 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f0000000200)=@urb_type_control={0x2, {0x2}, 0xfffffffb, 0x4, &(0x7f0000000a40)={0x80, 0x16, 0x2005, 0x7, 0x8}, 0x8, 0xf8, 0x7, 0x0, 0x0, 0x5, &(0x7f0000000a80)="cfc206af3b20cc76f92c2426377a243c9d8d6008fafd2fd67138c6b064102eec84099eccfeb5a4b8a5f3f11f2b3a7efc7bb159fd9e2cfe9dfc7021a27eef2f1b8a14ae37ef3f5850a71385fa82e17ca63c6617a30e1bc3576e8ee08aac39ab0a21c7d06379bcc8bd197b3c4706285c7606cc6c43a9f9a4485fa40997c39a4da54d472ef5eb63dbcb91c23e669d6e8836e2269a1d466533236ed3bd"}) 06:55:26 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x802c550a, &(0x7f0000000140)=@urb_type_iso={0x0, {}, 0x0, 0x0, &(0x7f0000000080), 0x0, 0x0, 0x0, 0x49, 0x0, 0x0, 0x0, [{0x8, 0x5, 0x100}, {0x40, 0x5, 0x3}, {0x8000, 0x5, 0x1}, {0x8, 0x2, 0x7f}, {0x9, 0x0, 0x4d}, {0x9, 0x8b88, 0x1}, {0x81, 0x5, 0x3ff}, {0xffffffff, 0xfffffff7, 0x5}, {0x7fffffff, 0x417, 0x40}, {0x401, 0x1, 0x950}, {0x6, 0xfff, 0x4}, {0x0, 0x8, 0x8}, {0xcd6fcee5, 0x4, 0xffffffff}, {0x7, 0x9, 0x9}, {0x3230fea4, 0x1ff, 0x401}, {0xf3d, 0xad, 0x2}, {0x7, 0x5, 0x8}, {0x800, 0xfffffffd, 0xff}, {0x5, 0x3, 0x7}, {0x7fffffff, 0x101, 0x1ff}, {0x11bb7e2, 0xe52}, {0x1, 0xffffffff, 0x7}, {0x3, 0x0, 0x4}, {0x1f, 0x80, 0x6}, {0x80, 0x9a, 0x1}, {0x3, 0xffff, 0xffff}, {0x81, 0x3, 0x8}, {0x0, 0x8, 0x400}, {0xfffffe01, 0x100, 0xf55}, {0x10001, 0xff, 0x7}, {0x2, 0x80000001, 0x7}, {0x4, 0xc708, 0x3ff}, {0x1, 0x7, 0x3}, {0x339, 0x8, 0x2}, {0x101, 0xffffffff, 0x10001}, {0x3, 0xff, 0x3}, {0x6b, 0xb0f, 0x5}, {0x7ff, 0x9, 0x7de5}, {0x80000001, 0x7f, 0x2}, {0x8, 0x6}, {0x3, 0x8001, 0x3ff}, {0x4, 0x5, 0x5d}, {0x75d23712, 0x8, 0x6}, {0x8, 0xde, 0x42e}, {0xea09, 0x81}, {0x9, 0x2, 0x3}, {0x2e47, 0x8, 0x81}, {0x3, 0x6, 0x7ff}, {0x7, 0x8, 0xfffff979}, {0x1f, 0x8, 0x1f}, {0x200, 0x7, 0x3}, {0x6897bc41, 0x7, 0x3}, {0x9, 0x80000000, 0x9}, {0x1ff, 0x1f, 0xffff}, {0x54, 0x9, 0x81}, {0xffffffff, 0x9cea, 0x3}, {0x7f, 0x7f, 0x3}, {0x800, 0x9, 0x6}, {0x5, 0xc46, 0x8000}, {0x0, 0x3, 0x8}, {0x2, 0x3}, {0x430, 0x2, 0x1ff}, {0x7ff, 0x20, 0x3}, {0x3, 0x7, 0xb06}, {0x6, 0x4, 0x2}, {0x401, 0x4, 0x9}, {0x5, 0x7, 0x3}, {0x5, 0x5, 0x1ff}, {0x10000, 0x4, 0x9}, {0x3f, 0xed71, 0xf549}, {0x20, 0x101, 0x4}, {0xfffffffe, 0xbe6a, 0x8000}, {0x9, 0x9, 0x3}]}) 06:55:26 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x4b47, &(0x7f0000000200)=@urb_type_bulk={0x2, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 06:55:26 executing program 1: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) r1 = syz_open_dev$usbfs(&(0x7f0000000180), 0x8, 0x0) ioctl$USBDEVFS_ALLOW_SUSPEND(r1, 0x5522) ioctl$USBDEVFS_SUBMITURB(r0, 0x802c550a, &(0x7f0000000240)=@urb_type_iso={0x0, {0x6, 0x1}, 0x1f, 0xc5, &(0x7f0000000040)="d5713e3939cf82d22a448cbcd527ba60962d4182874beef8290f508e4816578e6d993aaa2f25c727fa081c6c4f7998a200a1474b2d52a51ef14c27fb6facbc1a4628848effe941e825c37107bd5e1204bfc803c6bed88cf5f27e7ff497ed2b64b2b5fc0200268eb43264786482756f6b5095d3adc5932e523c7b167d9357775760b667afaa2f2866c186def88ec23d7403ed5817276b14c4cb988801b57263053d9427d788b14208d2274732922712ea34a2fa", 0xb3, 0x0, 0x1, 0x79, 0x80000001, 0x100, &(0x7f0000000100)="1d4df66dee7bc59b6160e8da4ad05a53c491d35b1315d23622e4906993647e9f9cd5636db1f1e742649a0a9dcacee0480dff8401c2da91b7d5c32f8fc85fb57af629ae032c14bd364a155db80b46672b71979d59e5fc9c0fbd3acd325d0152f0dc5ab9591b9101d30ff6197adeff82ad2141f3f4160e12824cf6ffbec2", [{0x2, 0x8000, 0x2d}, {0x3, 0x3}, {0x4, 0x5, 0x8000}, {0x1ff, 0x0, 0xffffff80}, {0x0, 0x80, 0x3}, {0x3, 0x9}, {0x1ff, 0x8, 0x9}, {0xba, 0x200, 0x10000}, {0x5, 0x80000001, 0x5}, {0xff, 0xffffffff, 0xfffffffd}, {0x6, 0x4e9d4900, 0x2}, {0xffffffff, 0x4, 0x858}, {0xc7, 0xfffff001, 0x9}, {0x1f, 0x3, 0x800}, {0x8, 0x9, 0x7}, {0x0, 0x5, 0x1}, {0x67, 0x400, 0x7fffffff}, {0x723, 0x40, 0xfffffffb}, {0x5, 0x7, 0x4}, {0x7, 0x8001, 0x9}, {0x7fffffff, 0x1800, 0x78f4}, {0x8, 0x9, 0x100}, {0x1, 0x100, 0x4}, {0x8, 0x5, 0x8}, {0x2, 0x6, 0x5}, {0x81, 0x0, 0x4}, {0x200, 0x80000000, 0x6}, {0x6, 0x10000, 0x5}, {0x7850, 0x3, 0x1}, {0x7fe, 0x6, 0x4}, {0x81, 0x40, 0x9}, {0x1, 0x9, 0x1f}, {0x100, 0x2, 0xffff}, {0x185, 0x9, 0xb5}, {0xa9, 0xb7f, 0x7}, {0x7, 0x7ff, 0x8}, {0x1e09, 0x7ff, 0x1}, {0x24af299a, 0x6, 0x4}, {0x8001, 0x8c}, {0x0, 0xffffff5b, 0x800}, {0x4d, 0x2, 0x80000001}, {0x9, 0x9, 0x8}, {0x7f, 0x8, 0x8c18}, {0x3f, 0x1000, 0x401}, {0x1f, 0xfffffffc, 0x101}, {0x800, 0x1f, 0x3fe0000}, {0x7f, 0xea, 0x362c00}, {0x80000000, 0xb21, 0x80000001}, {0x3, 0x2, 0x8}, {0xfe000000, 0x10001}, {0x9, 0xffffffff}, {0x3, 0x8, 0xd78}, {0x5, 0x10001, 0x8}, {0x100, 0x800, 0x80000000}, {0x0, 0xfffffffa, 0x2}, {0x4, 0x0, 0x100}, {0xfffffffd, 0x80000001, 0x7ff}, {0x1, 0x7, 0x6}, {0x7, 0x6, 0x1}, {0xa7e, 0x4, 0x4}, {0x5, 0x1000, 0x5}, {0x7, 0x6, 0x1}, {0xc12, 0x5}, {0x200, 0x4, 0xa07}, {0x6aab1dc9, 0x80000000}, {0x0, 0x7fff, 0x2}, {0x5, 0x0, 0x8}, {0x1, 0x800, 0x400}, {0x5e9, 0x9}, {0x1000, 0x2, 0x10001}, {0x3ff, 0x2, 0xfffffffa}, {0x10001, 0x5fe, 0x80000000}, {0xffff, 0x6, 0xffff}, {0x4, 0xffffff00, 0x101}, {0x8, 0x1, 0x8}, {0x0, 0x6, 0x40}, {0x7, 0x0, 0xe3}, {0xfff, 0x1, 0x400}, {0x40000, 0x9}, {0x0, 0x5, 0x8}, {0xfffffffc, 0x5, 0x30b4}, {0x81, 0x4, 0x400}, {0x3, 0x2, 0x3}, {0x4614, 0x7ec, 0x3}, {0x0, 0x80000000, 0x2}, {0x80, 0x7f, 0x5}, {0x6, 0x53, 0x7}, {0x2, 0x80000001, 0x10001}, {0x2, 0x7fffffff, 0x7}, {0x80, 0x401, 0xffff}, {0x7f, 0x0, 0x8}, {0x10001, 0x4}, {0x3, 0x7, 0xff}, {0x10001, 0x4, 0x3ff}, {0x1000, 0x7, 0x9}, {0x4, 0xf6bf, 0x4}, {0x0, 0x3, 0xffffffff}, {0x40, 0x80000001, 0xfd}, {0x0, 0x5, 0x1}, {0x7f, 0x5, 0x53b}, {0x9, 0x3f, 0x2}, {0x16, 0xffff, 0x5}, {0x2, 0x3, 0x401}, {0x101, 0x400, 0x5}, {0x100, 0xfffff000, 0x63}, {0x100, 0x4, 0x401}, {0x2, 0x9, 0xbf25}, {0xffffffff, 0x1, 0x7}, {0x80, 0x4}, {0x7d9, 0x1, 0x4}, {0x9, 0x4, 0x7}, {0xb2, 0x9, 0x81}, {0x3, 0x6, 0x51}, {0x6b0, 0x2, 0x8}, {0x2, 0x7f018b7d, 0x1000}, {0x80, 0x81, 0x8}, {0x800, 0x4, 0x81}, {0x0, 0x9c, 0x4}, {0x31e, 0x1, 0x6}, {0x5, 0x0, 0x9}, {0x4, 0x3, 0x5}]}) 06:55:26 executing program 5: ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x284000) ioctl$USBDEVFS_SUBMITURB(r0, 0x8008551c, &(0x7f0000000200)=@urb_type_bulk={0x3, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 06:55:26 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) (fail_nth: 4) 06:55:26 executing program 0: r0 = syz_open_dev$usbfs(0x0, 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f0000000200)=@urb_type_control={0x2, {0x2}, 0xfffffffb, 0x4, &(0x7f0000000a40)={0x80, 0x16, 0x2005, 0x7, 0x8}, 0x8, 0xf8, 0x7, 0x0, 0x0, 0x5, &(0x7f0000000a80)="cfc206af3b20cc76f92c2426377a243c9d8d6008fafd2fd67138c6b064102eec84099eccfeb5a4b8a5f3f11f2b3a7efc7bb159fd9e2cfe9dfc7021a27eef2f1b8a14ae37ef3f5850a71385fa82e17ca63c6617a30e1bc3576e8ee08aac39ab0a21c7d06379bcc8bd197b3c4706285c7606cc6c43a9f9a4485fa40997c39a4da54d472ef5eb63dbcb91c23e669d6e8836e2269a1d466533236ed3bd"}) 06:55:26 executing program 1: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) r1 = syz_open_dev$usbfs(&(0x7f0000000180), 0x8, 0x0) ioctl$USBDEVFS_ALLOW_SUSPEND(r1, 0x5522) (async) ioctl$USBDEVFS_SUBMITURB(r0, 0x802c550a, &(0x7f0000000240)=@urb_type_iso={0x0, {0x6, 0x1}, 0x1f, 0xc5, &(0x7f0000000040)="d5713e3939cf82d22a448cbcd527ba60962d4182874beef8290f508e4816578e6d993aaa2f25c727fa081c6c4f7998a200a1474b2d52a51ef14c27fb6facbc1a4628848effe941e825c37107bd5e1204bfc803c6bed88cf5f27e7ff497ed2b64b2b5fc0200268eb43264786482756f6b5095d3adc5932e523c7b167d9357775760b667afaa2f2866c186def88ec23d7403ed5817276b14c4cb988801b57263053d9427d788b14208d2274732922712ea34a2fa", 0xb3, 0x0, 0x1, 0x79, 0x80000001, 0x100, &(0x7f0000000100)="1d4df66dee7bc59b6160e8da4ad05a53c491d35b1315d23622e4906993647e9f9cd5636db1f1e742649a0a9dcacee0480dff8401c2da91b7d5c32f8fc85fb57af629ae032c14bd364a155db80b46672b71979d59e5fc9c0fbd3acd325d0152f0dc5ab9591b9101d30ff6197adeff82ad2141f3f4160e12824cf6ffbec2", [{0x2, 0x8000, 0x2d}, {0x3, 0x3}, {0x4, 0x5, 0x8000}, {0x1ff, 0x0, 0xffffff80}, {0x0, 0x80, 0x3}, {0x3, 0x9}, {0x1ff, 0x8, 0x9}, {0xba, 0x200, 0x10000}, {0x5, 0x80000001, 0x5}, {0xff, 0xffffffff, 0xfffffffd}, {0x6, 0x4e9d4900, 0x2}, {0xffffffff, 0x4, 0x858}, {0xc7, 0xfffff001, 0x9}, {0x1f, 0x3, 0x800}, {0x8, 0x9, 0x7}, {0x0, 0x5, 0x1}, {0x67, 0x400, 0x7fffffff}, {0x723, 0x40, 0xfffffffb}, {0x5, 0x7, 0x4}, {0x7, 0x8001, 0x9}, {0x7fffffff, 0x1800, 0x78f4}, {0x8, 0x9, 0x100}, {0x1, 0x100, 0x4}, {0x8, 0x5, 0x8}, {0x2, 0x6, 0x5}, {0x81, 0x0, 0x4}, {0x200, 0x80000000, 0x6}, {0x6, 0x10000, 0x5}, {0x7850, 0x3, 0x1}, {0x7fe, 0x6, 0x4}, {0x81, 0x40, 0x9}, {0x1, 0x9, 0x1f}, {0x100, 0x2, 0xffff}, {0x185, 0x9, 0xb5}, {0xa9, 0xb7f, 0x7}, {0x7, 0x7ff, 0x8}, {0x1e09, 0x7ff, 0x1}, {0x24af299a, 0x6, 0x4}, {0x8001, 0x8c}, {0x0, 0xffffff5b, 0x800}, {0x4d, 0x2, 0x80000001}, {0x9, 0x9, 0x8}, {0x7f, 0x8, 0x8c18}, {0x3f, 0x1000, 0x401}, {0x1f, 0xfffffffc, 0x101}, {0x800, 0x1f, 0x3fe0000}, {0x7f, 0xea, 0x362c00}, {0x80000000, 0xb21, 0x80000001}, {0x3, 0x2, 0x8}, {0xfe000000, 0x10001}, {0x9, 0xffffffff}, {0x3, 0x8, 0xd78}, {0x5, 0x10001, 0x8}, {0x100, 0x800, 0x80000000}, {0x0, 0xfffffffa, 0x2}, {0x4, 0x0, 0x100}, {0xfffffffd, 0x80000001, 0x7ff}, {0x1, 0x7, 0x6}, {0x7, 0x6, 0x1}, {0xa7e, 0x4, 0x4}, {0x5, 0x1000, 0x5}, {0x7, 0x6, 0x1}, {0xc12, 0x5}, {0x200, 0x4, 0xa07}, {0x6aab1dc9, 0x80000000}, {0x0, 0x7fff, 0x2}, {0x5, 0x0, 0x8}, {0x1, 0x800, 0x400}, {0x5e9, 0x9}, {0x1000, 0x2, 0x10001}, {0x3ff, 0x2, 0xfffffffa}, {0x10001, 0x5fe, 0x80000000}, {0xffff, 0x6, 0xffff}, {0x4, 0xffffff00, 0x101}, {0x8, 0x1, 0x8}, {0x0, 0x6, 0x40}, {0x7, 0x0, 0xe3}, {0xfff, 0x1, 0x400}, {0x40000, 0x9}, {0x0, 0x5, 0x8}, {0xfffffffc, 0x5, 0x30b4}, {0x81, 0x4, 0x400}, {0x3, 0x2, 0x3}, {0x4614, 0x7ec, 0x3}, {0x0, 0x80000000, 0x2}, {0x80, 0x7f, 0x5}, {0x6, 0x53, 0x7}, {0x2, 0x80000001, 0x10001}, {0x2, 0x7fffffff, 0x7}, {0x80, 0x401, 0xffff}, {0x7f, 0x0, 0x8}, {0x10001, 0x4}, {0x3, 0x7, 0xff}, {0x10001, 0x4, 0x3ff}, {0x1000, 0x7, 0x9}, {0x4, 0xf6bf, 0x4}, {0x0, 0x3, 0xffffffff}, {0x40, 0x80000001, 0xfd}, {0x0, 0x5, 0x1}, {0x7f, 0x5, 0x53b}, {0x9, 0x3f, 0x2}, {0x16, 0xffff, 0x5}, {0x2, 0x3, 0x401}, {0x101, 0x400, 0x5}, {0x100, 0xfffff000, 0x63}, {0x100, 0x4, 0x401}, {0x2, 0x9, 0xbf25}, {0xffffffff, 0x1, 0x7}, {0x80, 0x4}, {0x7d9, 0x1, 0x4}, {0x9, 0x4, 0x7}, {0xb2, 0x9, 0x81}, {0x3, 0x6, 0x51}, {0x6b0, 0x2, 0x8}, {0x2, 0x7f018b7d, 0x1000}, {0x80, 0x81, 0x8}, {0x800, 0x4, 0x81}, {0x0, 0x9c, 0x4}, {0x31e, 0x1, 0x6}, {0x5, 0x0, 0x9}, {0x4, 0x3, 0x5}]}) [ 2893.978643][T12083] ? security_file_ioctl+0x7d/0xa0 [ 2893.983726][T12083] __x64_sys_ioctl+0xd4/0x110 [ 2893.988481][T12083] do_syscall_64+0xca/0x1c0 [ 2893.992978][T12083] entry_SYSCALL_64_after_hwframe+0x5c/0xc1 06:55:26 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x802c550a, &(0x7f0000000140)=@urb_type_iso={0x0, {}, 0x0, 0x0, &(0x7f0000000080), 0x0, 0x0, 0x0, 0x48, 0x0, 0x0, 0x0, [{0x8, 0x5, 0x100}, {0x40, 0x5, 0x3}, {0x8000, 0x5, 0x1}, {0x8, 0x2, 0x7f}, {0x9, 0x0, 0x4d}, {0x9, 0x8b88, 0x1}, {0x81, 0x5, 0x3ff}, {0xffffffff, 0xfffffff7, 0x5}, {0x7fffffff, 0x417, 0x40}, {0x401, 0x1, 0x950}, {0x6, 0xfff, 0x4}, {0x0, 0x8, 0x8}, {0xcd6fcee5, 0x4, 0xffffffff}, {0x7, 0x9, 0x9}, {0x3230fea4, 0x1ff, 0x401}, {0xf3d, 0xad, 0x2}, {0x7, 0x5, 0x8}, {0x800, 0xfffffffd, 0xff}, {0x5, 0x3, 0x7}, {0x7fffffff, 0x101, 0x1ff}, {0x11bb7e2, 0xe52}, {0x1, 0xffffffff, 0x7}, {0x3, 0x0, 0x4}, {0x1f, 0x80, 0x6}, {0x80, 0x9a, 0x1}, {0x3, 0xffff, 0xffff}, {0x81, 0x3, 0x8}, {0x0, 0x8, 0x400}, {0xfffffe01, 0x100, 0xf55}, {0x10001, 0xff, 0x7}, {0x2, 0x80000001, 0x7}, {0x4, 0xc708, 0x3ff}, {0x1, 0x7, 0x3}, {0x339, 0x8, 0x2}, {0x101, 0xffffffff, 0x10001}, {0x3, 0xff, 0x3}, {0x6b, 0xb0f, 0x5}, {0x7ff, 0x9, 0x7de5}, {0x80000001, 0x7f, 0x2}, {0x8, 0x6}, {0x3, 0x8001, 0x3ff}, {0x4, 0x5, 0x5d}, {0x75d23712, 0x8, 0x6}, {0x8, 0xde, 0x42e}, {0xea09, 0x81}, {0x9, 0x2, 0x3}, {0x2e47, 0x8, 0x81}, {0x3, 0x6, 0x7ff}, {0x7, 0x8, 0xfffff979}, {0x1f, 0x8, 0x1f}, {0x200, 0x7, 0x3}, {0x6897bc41, 0x7, 0x3}, {0x9, 0x80000000, 0x9}, {0x1ff, 0x1f, 0xffff}, {0x54, 0x9, 0x81}, {0xffffffff, 0x9cea, 0x3}, {0x7f, 0x7f, 0x3}, {0x800, 0x9, 0x6}, {0x5, 0xc46, 0x8000}, {0x0, 0x3, 0x8}, {0x2, 0x3}, {0x430, 0x2, 0x1ff}, {0x7ff, 0x20, 0x3}, {0x3, 0x7, 0xb06}, {0x6, 0x4, 0x2}, {0x401, 0x4, 0x9}, {0x5, 0x7, 0x3}, {0x5, 0x5, 0x1ff}, {0x10000, 0x4, 0x9}, {0x3f, 0xed71, 0xf549}, {0x20, 0x101, 0x4}, {0xfffffffe, 0xbe6a, 0x8000}]}) 06:55:26 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x802c550a, &(0x7f0000000140)=@urb_type_iso={0x0, {}, 0x0, 0x0, &(0x7f0000000080), 0x0, 0x0, 0x0, 0x47, 0x0, 0x0, 0x0, [{0x8, 0x5, 0x100}, {0x40, 0x5, 0x3}, {0x8000, 0x5, 0x1}, {0x8, 0x2, 0x7f}, {0x9, 0x0, 0x4d}, {0x9, 0x8b88, 0x1}, {0x81, 0x5, 0x3ff}, {0xffffffff, 0xfffffff7, 0x5}, {0x7fffffff, 0x417, 0x40}, {0x401, 0x1, 0x950}, {0x6, 0xfff, 0x4}, {0x0, 0x8, 0x8}, {0xcd6fcee5, 0x4, 0xffffffff}, {0x7, 0x9, 0x9}, {0x3230fea4, 0x1ff, 0x401}, {0xf3d, 0xad, 0x2}, {0x7, 0x5, 0x8}, {0x800, 0xfffffffd, 0xff}, {0x5, 0x3, 0x7}, {0x7fffffff, 0x101, 0x1ff}, {0x11bb7e2, 0xe52}, {0x1, 0xffffffff, 0x7}, {0x3, 0x0, 0x4}, {0x1f, 0x80, 0x6}, {0x80, 0x9a, 0x1}, {0x3, 0xffff, 0xffff}, {0x81, 0x3, 0x8}, {0x0, 0x8, 0x400}, {0xfffffe01, 0x100, 0xf55}, {0x10001, 0xff, 0x7}, {0x2, 0x80000001, 0x7}, {0x4, 0xc708, 0x3ff}, {0x1, 0x7, 0x3}, {0x339, 0x8, 0x2}, {0x101, 0xffffffff, 0x10001}, {0x3, 0xff, 0x3}, {0x6b, 0xb0f, 0x5}, {0x7ff, 0x9, 0x7de5}, {0x80000001, 0x7f, 0x2}, {0x8, 0x6}, {0x3, 0x8001, 0x3ff}, {0x4, 0x5, 0x5d}, {0x75d23712, 0x8, 0x6}, {0x8, 0xde, 0x42e}, {0xea09, 0x81}, {0x9, 0x2, 0x3}, {0x2e47, 0x8, 0x81}, {0x3, 0x6, 0x7ff}, {0x7, 0x8, 0xfffff979}, {0x1f, 0x8, 0x1f}, {0x200, 0x7, 0x3}, {0x6897bc41, 0x7, 0x3}, {0x9, 0x80000000, 0x9}, {0x1ff, 0x1f, 0xffff}, {0x54, 0x9, 0x81}, {0xffffffff, 0x9cea, 0x3}, {0x7f, 0x7f, 0x3}, {0x800, 0x9, 0x6}, {0x5, 0xc46, 0x8000}, {0x0, 0x3, 0x8}, {0x2, 0x3}, {0x430, 0x2, 0x1ff}, {0x7ff, 0x20, 0x3}, {0x3, 0x7, 0xb06}, {0x6, 0x4, 0x2}, {0x401, 0x4, 0x9}, {0x5, 0x7, 0x3}, {0x5, 0x5, 0x1ff}, {0x10000, 0x4, 0x9}, {0x3f, 0xed71, 0xf549}, {0x20, 0x101, 0x4}]}) 06:55:26 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x4b49, &(0x7f0000000200)=@urb_type_bulk={0x2, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 06:55:26 executing program 0: r0 = syz_open_dev$usbfs(0x0, 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f0000000200)=@urb_type_control={0x2, {0x2}, 0xfffffffb, 0x4, &(0x7f0000000a40)={0x80, 0x16, 0x2005, 0x7, 0x8}, 0x8, 0xf8, 0x7, 0x0, 0x0, 0x5, &(0x7f0000000a80)="cfc206af3b20cc76f92c2426377a243c9d8d6008fafd2fd67138c6b064102eec84099eccfeb5a4b8a5f3f11f2b3a7efc7bb159fd9e2cfe9dfc7021a27eef2f1b8a14ae37ef3f5850a71385fa82e17ca63c6617a30e1bc3576e8ee08aac39ab0a21c7d06379bcc8bd197b3c4706285c7606cc6c43a9f9a4485fa40997c39a4da54d472ef5eb63dbcb91c23e669d6e8836e2269a1d466533236ed3bd"}) [ 2894.028376][T12121] FAULT_INJECTION: forcing a failure. [ 2894.028376][T12121] name failslab, interval 1, probability 0, space 0, times 0 [ 2894.049794][T12121] CPU: 0 PID: 12121 Comm: syz-executor.4 Not tainted 5.4.233-syzkaller-00019-gd5ed2ca98e48 #0 [ 2894.060032][T12121] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/14/2023 [ 2894.070075][T12121] Call Trace: [ 2894.073360][T12121] dump_stack+0x1d8/0x241 [ 2894.077683][T12121] ? panic+0x768/0x768 [ 2894.081752][T12121] ? nf_ct_l4proto_log_invalid+0x258/0x258 [ 2894.087548][T12121] ? __kasan_kmalloc+0x199/0x1d0 [ 2894.092504][T12121] should_fail+0x71f/0x880 [ 2894.096945][T12121] ? __kasan_kmalloc+0x199/0x1d0 [ 2894.101869][T12121] ? setup_fault_attr+0x3d0/0x3d0 [ 2894.106862][T12121] ? __x64_sys_ioctl+0xd4/0x110 [ 2894.111680][T12121] ? do_syscall_64+0xca/0x1c0 [ 2894.116325][T12121] ? entry_SYSCALL_64_after_hwframe+0x5c/0xc1 [ 2894.122360][T12121] ? blk_mq_init_tags+0x76/0x2d0 [ 2894.127267][T12121] should_failslab+0x5/0x20 [ 2894.131766][T12121] kmem_cache_alloc_trace+0x28/0x240 [ 2894.137022][T12121] blk_mq_init_tags+0x76/0x2d0 [ 2894.141756][T12121] ? blk_mq_hw_queue_to_node+0xe3/0x100 [ 2894.147271][T12121] blk_mq_alloc_rq_map+0x95/0x1a0 [ 2894.152264][T12121] __blk_mq_alloc_rq_map+0x70/0x2a0 [ 2894.157433][T12121] ? find_first_bit+0x5b/0xf0 [ 2894.162081][T12121] blk_mq_alloc_rq_maps+0xac/0x410 [ 2894.167188][T12121] blk_mq_alloc_tag_set+0x50e/0x890 [ 2894.172354][T12121] loop_add+0x231/0x740 [ 2894.176480][T12121] ? get_pid_task+0xc3/0xf0 [ 2894.180953][T12121] ? radix_tree_lookup+0x16f/0x1c0 [ 2894.186033][T12121] loop_control_ioctl+0x448/0x620 [ 2894.191024][T12121] ? loop_remove+0xa0/0xa0 [ 2894.195411][T12121] ? memset+0x1f/0x40 [ 2894.199380][T12121] ? fsnotify+0x1280/0x1340 [ 2894.203855][T12121] ? loop_remove+0xa0/0xa0 [ 2894.208239][T12121] do_vfs_ioctl+0x742/0x1720 [ 2894.212829][T12121] ? ioctl_preallocate+0x250/0x250 [ 2894.217911][T12121] ? __fget+0x407/0x490 [ 2894.222034][T12121] ? fget_many+0x20/0x20 06:55:27 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) (fail_nth: 5) 06:55:27 executing program 5: ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) (async) r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x284000) ioctl$USBDEVFS_SUBMITURB(r0, 0x8008551c, &(0x7f0000000200)=@urb_type_bulk={0x3, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 06:55:27 executing program 1: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) r1 = syz_open_dev$usbfs(&(0x7f0000000180), 0x8, 0x0) ioctl$USBDEVFS_ALLOW_SUSPEND(r1, 0x5522) (async, rerun: 64) ioctl$USBDEVFS_SUBMITURB(r0, 0x802c550a, &(0x7f0000000240)=@urb_type_iso={0x0, {0x6, 0x1}, 0x1f, 0xc5, &(0x7f0000000040)="d5713e3939cf82d22a448cbcd527ba60962d4182874beef8290f508e4816578e6d993aaa2f25c727fa081c6c4f7998a200a1474b2d52a51ef14c27fb6facbc1a4628848effe941e825c37107bd5e1204bfc803c6bed88cf5f27e7ff497ed2b64b2b5fc0200268eb43264786482756f6b5095d3adc5932e523c7b167d9357775760b667afaa2f2866c186def88ec23d7403ed5817276b14c4cb988801b57263053d9427d788b14208d2274732922712ea34a2fa", 0xb3, 0x0, 0x1, 0x79, 0x80000001, 0x100, &(0x7f0000000100)="1d4df66dee7bc59b6160e8da4ad05a53c491d35b1315d23622e4906993647e9f9cd5636db1f1e742649a0a9dcacee0480dff8401c2da91b7d5c32f8fc85fb57af629ae032c14bd364a155db80b46672b71979d59e5fc9c0fbd3acd325d0152f0dc5ab9591b9101d30ff6197adeff82ad2141f3f4160e12824cf6ffbec2", [{0x2, 0x8000, 0x2d}, {0x3, 0x3}, {0x4, 0x5, 0x8000}, {0x1ff, 0x0, 0xffffff80}, {0x0, 0x80, 0x3}, {0x3, 0x9}, {0x1ff, 0x8, 0x9}, {0xba, 0x200, 0x10000}, {0x5, 0x80000001, 0x5}, {0xff, 0xffffffff, 0xfffffffd}, {0x6, 0x4e9d4900, 0x2}, {0xffffffff, 0x4, 0x858}, {0xc7, 0xfffff001, 0x9}, {0x1f, 0x3, 0x800}, {0x8, 0x9, 0x7}, {0x0, 0x5, 0x1}, {0x67, 0x400, 0x7fffffff}, {0x723, 0x40, 0xfffffffb}, {0x5, 0x7, 0x4}, {0x7, 0x8001, 0x9}, {0x7fffffff, 0x1800, 0x78f4}, {0x8, 0x9, 0x100}, {0x1, 0x100, 0x4}, {0x8, 0x5, 0x8}, {0x2, 0x6, 0x5}, {0x81, 0x0, 0x4}, {0x200, 0x80000000, 0x6}, {0x6, 0x10000, 0x5}, {0x7850, 0x3, 0x1}, {0x7fe, 0x6, 0x4}, {0x81, 0x40, 0x9}, {0x1, 0x9, 0x1f}, {0x100, 0x2, 0xffff}, {0x185, 0x9, 0xb5}, {0xa9, 0xb7f, 0x7}, {0x7, 0x7ff, 0x8}, {0x1e09, 0x7ff, 0x1}, {0x24af299a, 0x6, 0x4}, {0x8001, 0x8c}, {0x0, 0xffffff5b, 0x800}, {0x4d, 0x2, 0x80000001}, {0x9, 0x9, 0x8}, {0x7f, 0x8, 0x8c18}, {0x3f, 0x1000, 0x401}, {0x1f, 0xfffffffc, 0x101}, {0x800, 0x1f, 0x3fe0000}, {0x7f, 0xea, 0x362c00}, {0x80000000, 0xb21, 0x80000001}, {0x3, 0x2, 0x8}, {0xfe000000, 0x10001}, {0x9, 0xffffffff}, {0x3, 0x8, 0xd78}, {0x5, 0x10001, 0x8}, {0x100, 0x800, 0x80000000}, {0x0, 0xfffffffa, 0x2}, {0x4, 0x0, 0x100}, {0xfffffffd, 0x80000001, 0x7ff}, {0x1, 0x7, 0x6}, {0x7, 0x6, 0x1}, {0xa7e, 0x4, 0x4}, {0x5, 0x1000, 0x5}, {0x7, 0x6, 0x1}, {0xc12, 0x5}, {0x200, 0x4, 0xa07}, {0x6aab1dc9, 0x80000000}, {0x0, 0x7fff, 0x2}, {0x5, 0x0, 0x8}, {0x1, 0x800, 0x400}, {0x5e9, 0x9}, {0x1000, 0x2, 0x10001}, {0x3ff, 0x2, 0xfffffffa}, {0x10001, 0x5fe, 0x80000000}, {0xffff, 0x6, 0xffff}, {0x4, 0xffffff00, 0x101}, {0x8, 0x1, 0x8}, {0x0, 0x6, 0x40}, {0x7, 0x0, 0xe3}, {0xfff, 0x1, 0x400}, {0x40000, 0x9}, {0x0, 0x5, 0x8}, {0xfffffffc, 0x5, 0x30b4}, {0x81, 0x4, 0x400}, {0x3, 0x2, 0x3}, {0x4614, 0x7ec, 0x3}, {0x0, 0x80000000, 0x2}, {0x80, 0x7f, 0x5}, {0x6, 0x53, 0x7}, {0x2, 0x80000001, 0x10001}, {0x2, 0x7fffffff, 0x7}, {0x80, 0x401, 0xffff}, {0x7f, 0x0, 0x8}, {0x10001, 0x4}, {0x3, 0x7, 0xff}, {0x10001, 0x4, 0x3ff}, {0x1000, 0x7, 0x9}, {0x4, 0xf6bf, 0x4}, {0x0, 0x3, 0xffffffff}, {0x40, 0x80000001, 0xfd}, {0x0, 0x5, 0x1}, {0x7f, 0x5, 0x53b}, {0x9, 0x3f, 0x2}, {0x16, 0xffff, 0x5}, {0x2, 0x3, 0x401}, {0x101, 0x400, 0x5}, {0x100, 0xfffff000, 0x63}, {0x100, 0x4, 0x401}, {0x2, 0x9, 0xbf25}, {0xffffffff, 0x1, 0x7}, {0x80, 0x4}, {0x7d9, 0x1, 0x4}, {0x9, 0x4, 0x7}, {0xb2, 0x9, 0x81}, {0x3, 0x6, 0x51}, {0x6b0, 0x2, 0x8}, {0x2, 0x7f018b7d, 0x1000}, {0x80, 0x81, 0x8}, {0x800, 0x4, 0x81}, {0x0, 0x9c, 0x4}, {0x31e, 0x1, 0x6}, {0x5, 0x0, 0x9}, {0x4, 0x3, 0x5}]}) (rerun: 64) 06:55:27 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x802c550a, &(0x7f0000000140)=@urb_type_iso={0x0, {}, 0x0, 0x0, &(0x7f0000000080), 0x0, 0x0, 0x0, 0x46, 0x0, 0x0, 0x0, [{0x8, 0x5, 0x100}, {0x40, 0x5, 0x3}, {0x8000, 0x5, 0x1}, {0x8, 0x2, 0x7f}, {0x9, 0x0, 0x4d}, {0x9, 0x8b88, 0x1}, {0x81, 0x5, 0x3ff}, {0xffffffff, 0xfffffff7, 0x5}, {0x7fffffff, 0x417, 0x40}, {0x401, 0x1, 0x950}, {0x6, 0xfff, 0x4}, {0x0, 0x8, 0x8}, {0xcd6fcee5, 0x4, 0xffffffff}, {0x7, 0x9, 0x9}, {0x3230fea4, 0x1ff, 0x401}, {0xf3d, 0xad, 0x2}, {0x7, 0x5, 0x8}, {0x800, 0xfffffffd, 0xff}, {0x5, 0x3, 0x7}, {0x7fffffff, 0x101, 0x1ff}, {0x11bb7e2, 0xe52}, {0x1, 0xffffffff, 0x7}, {0x3, 0x0, 0x4}, {0x1f, 0x80, 0x6}, {0x80, 0x9a, 0x1}, {0x3, 0xffff, 0xffff}, {0x81, 0x3, 0x8}, {0x0, 0x8, 0x400}, {0xfffffe01, 0x100, 0xf55}, {0x10001, 0xff, 0x7}, {0x2, 0x80000001, 0x7}, {0x4, 0xc708, 0x3ff}, {0x1, 0x7, 0x3}, {0x339, 0x8, 0x2}, {0x101, 0xffffffff, 0x10001}, {0x3, 0xff, 0x3}, {0x6b, 0xb0f, 0x5}, {0x7ff, 0x9, 0x7de5}, {0x80000001, 0x7f, 0x2}, {0x8, 0x6}, {0x3, 0x8001, 0x3ff}, {0x4, 0x5, 0x5d}, {0x75d23712, 0x8, 0x6}, {0x8, 0xde, 0x42e}, {0xea09, 0x81}, {0x9, 0x2, 0x3}, {0x2e47, 0x8, 0x81}, {0x3, 0x6, 0x7ff}, {0x7, 0x8, 0xfffff979}, {0x1f, 0x8, 0x1f}, {0x200, 0x7, 0x3}, {0x6897bc41, 0x7, 0x3}, {0x9, 0x80000000, 0x9}, {0x1ff, 0x1f, 0xffff}, {0x54, 0x9, 0x81}, {0xffffffff, 0x9cea, 0x3}, {0x7f, 0x7f, 0x3}, {0x800, 0x9, 0x6}, {0x5, 0xc46, 0x8000}, {0x0, 0x3, 0x8}, {0x2, 0x3}, {0x430, 0x2, 0x1ff}, {0x7ff, 0x20, 0x3}, {0x3, 0x7, 0xb06}, {0x6, 0x4, 0x2}, {0x401, 0x4, 0x9}, {0x5, 0x7, 0x3}, {0x5, 0x5, 0x1ff}, {0x10000, 0x4, 0x9}, {0x3f, 0xed71, 0xf549}]}) 06:55:27 executing program 0: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x0, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f0000000200)=@urb_type_control={0x2, {0x2}, 0xfffffffb, 0x4, &(0x7f0000000a40)={0x80, 0x16, 0x2005, 0x7, 0x8}, 0x8, 0xf8, 0x7, 0x0, 0x0, 0x5, &(0x7f0000000a80)="cfc206af3b20cc76f92c2426377a243c9d8d6008fafd2fd67138c6b064102eec84099eccfeb5a4b8a5f3f11f2b3a7efc7bb159fd9e2cfe9dfc7021a27eef2f1b8a14ae37ef3f5850a71385fa82e17ca63c6617a30e1bc3576e8ee08aac39ab0a21c7d06379bcc8bd197b3c4706285c7606cc6c43a9f9a4485fa40997c39a4da54d472ef5eb63dbcb91c23e669d6e8836e2269a1d466533236ed3bd"}) 06:55:27 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x541b, &(0x7f0000000200)=@urb_type_bulk={0x2, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 06:55:27 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x802c550a, &(0x7f0000000140)=@urb_type_iso={0x0, {}, 0x0, 0x0, &(0x7f0000000080), 0x0, 0x0, 0x0, 0x45, 0x0, 0x0, 0x0, [{0x8, 0x5, 0x100}, {0x40, 0x5, 0x3}, {0x8000, 0x5, 0x1}, {0x8, 0x2, 0x7f}, {0x9, 0x0, 0x4d}, {0x9, 0x8b88, 0x1}, {0x81, 0x5, 0x3ff}, {0xffffffff, 0xfffffff7, 0x5}, {0x7fffffff, 0x417, 0x40}, {0x401, 0x1, 0x950}, {0x6, 0xfff, 0x4}, {0x0, 0x8, 0x8}, {0xcd6fcee5, 0x4, 0xffffffff}, {0x7, 0x9, 0x9}, {0x3230fea4, 0x1ff, 0x401}, {0xf3d, 0xad, 0x2}, {0x7, 0x5, 0x8}, {0x800, 0xfffffffd, 0xff}, {0x5, 0x3, 0x7}, {0x7fffffff, 0x101, 0x1ff}, {0x11bb7e2, 0xe52}, {0x1, 0xffffffff, 0x7}, {0x3, 0x0, 0x4}, {0x1f, 0x80, 0x6}, {0x80, 0x9a, 0x1}, {0x3, 0xffff, 0xffff}, {0x81, 0x3, 0x8}, {0x0, 0x8, 0x400}, {0xfffffe01, 0x100, 0xf55}, {0x10001, 0xff, 0x7}, {0x2, 0x80000001, 0x7}, {0x4, 0xc708, 0x3ff}, {0x1, 0x7, 0x3}, {0x339, 0x8, 0x2}, {0x101, 0xffffffff, 0x10001}, {0x3, 0xff, 0x3}, {0x6b, 0xb0f, 0x5}, {0x7ff, 0x9, 0x7de5}, {0x80000001, 0x7f, 0x2}, {0x8, 0x6}, {0x3, 0x8001, 0x3ff}, {0x4, 0x5, 0x5d}, {0x75d23712, 0x8, 0x6}, {0x8, 0xde, 0x42e}, {0xea09, 0x81}, {0x9, 0x2, 0x3}, {0x2e47, 0x8, 0x81}, {0x3, 0x6, 0x7ff}, {0x7, 0x8, 0xfffff979}, {0x1f, 0x8, 0x1f}, {0x200, 0x7, 0x3}, {0x6897bc41, 0x7, 0x3}, {0x9, 0x80000000, 0x9}, {0x1ff, 0x1f, 0xffff}, {0x54, 0x9, 0x81}, {0xffffffff, 0x9cea, 0x3}, {0x7f, 0x7f, 0x3}, {0x800, 0x9, 0x6}, {0x5, 0xc46, 0x8000}, {0x0, 0x3, 0x8}, {0x2, 0x3}, {0x430, 0x2, 0x1ff}, {0x7ff, 0x20, 0x3}, {0x3, 0x7, 0xb06}, {0x6, 0x4, 0x2}, {0x401, 0x4, 0x9}, {0x5, 0x7, 0x3}, {0x5, 0x5, 0x1ff}, {0x10000, 0x4, 0x9}]}) 06:55:27 executing program 0: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x0, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f0000000200)=@urb_type_control={0x2, {0x2}, 0xfffffffb, 0x4, &(0x7f0000000a40)={0x80, 0x16, 0x2005, 0x7, 0x8}, 0x8, 0xf8, 0x7, 0x0, 0x0, 0x5, &(0x7f0000000a80)="cfc206af3b20cc76f92c2426377a243c9d8d6008fafd2fd67138c6b064102eec84099eccfeb5a4b8a5f3f11f2b3a7efc7bb159fd9e2cfe9dfc7021a27eef2f1b8a14ae37ef3f5850a71385fa82e17ca63c6617a30e1bc3576e8ee08aac39ab0a21c7d06379bcc8bd197b3c4706285c7606cc6c43a9f9a4485fa40997c39a4da54d472ef5eb63dbcb91c23e669d6e8836e2269a1d466533236ed3bd"}) 06:55:27 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_CALIPSO_C_LISTALL(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x44, 0x0, 0x2, 0x70bd2c, 0x25dfdbfe, {}, [@NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x7d8d0f1dd264f8ba}, @NLBL_CALIPSO_A_DOI={0x8}, @NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x3}, @NLBL_CALIPSO_A_MTYPE={0x8}]}, 0x44}, 0x1, 0x0, 0x0, 0x24000800}, 0x800) r1 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r1, 0x802c550a, &(0x7f0000000200)=@urb_type_bulk={0x3, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 06:55:27 executing program 5: ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x284000) ioctl$USBDEVFS_SUBMITURB(r0, 0x8008551c, &(0x7f0000000200)=@urb_type_bulk={0x3, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 06:55:27 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_CALIPSO_C_LISTALL(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x44, 0x0, 0x2, 0x70bd2c, 0x25dfdbfe, {}, [@NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x7d8d0f1dd264f8ba}, @NLBL_CALIPSO_A_DOI={0x8}, @NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x3}, @NLBL_CALIPSO_A_MTYPE={0x8}]}, 0x44}, 0x1, 0x0, 0x0, 0x24000800}, 0x800) r1 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r1, 0x802c550a, &(0x7f0000000200)=@urb_type_bulk={0x3, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 06:55:27 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x802c550a, &(0x7f0000000140)=@urb_type_iso={0x0, {}, 0x0, 0x0, &(0x7f0000000080), 0x0, 0x0, 0x0, 0x44, 0x0, 0x0, 0x0, [{0x8, 0x5, 0x100}, {0x40, 0x5, 0x3}, {0x8000, 0x5, 0x1}, {0x8, 0x2, 0x7f}, {0x9, 0x0, 0x4d}, {0x9, 0x8b88, 0x1}, {0x81, 0x5, 0x3ff}, {0xffffffff, 0xfffffff7, 0x5}, {0x7fffffff, 0x417, 0x40}, {0x401, 0x1, 0x950}, {0x6, 0xfff, 0x4}, {0x0, 0x8, 0x8}, {0xcd6fcee5, 0x4, 0xffffffff}, {0x7, 0x9, 0x9}, {0x3230fea4, 0x1ff, 0x401}, {0xf3d, 0xad, 0x2}, {0x7, 0x5, 0x8}, {0x800, 0xfffffffd, 0xff}, {0x5, 0x3, 0x7}, {0x7fffffff, 0x101, 0x1ff}, {0x11bb7e2, 0xe52}, {0x1, 0xffffffff, 0x7}, {0x3, 0x0, 0x4}, {0x1f, 0x80, 0x6}, {0x80, 0x9a, 0x1}, {0x3, 0xffff, 0xffff}, {0x81, 0x3, 0x8}, {0x0, 0x8, 0x400}, {0xfffffe01, 0x100, 0xf55}, {0x10001, 0xff, 0x7}, {0x2, 0x80000001, 0x7}, {0x4, 0xc708, 0x3ff}, {0x1, 0x7, 0x3}, {0x339, 0x8, 0x2}, {0x101, 0xffffffff, 0x10001}, {0x3, 0xff, 0x3}, {0x6b, 0xb0f, 0x5}, {0x7ff, 0x9, 0x7de5}, {0x80000001, 0x7f, 0x2}, {0x8, 0x6}, {0x3, 0x8001, 0x3ff}, {0x4, 0x5, 0x5d}, {0x75d23712, 0x8, 0x6}, {0x8, 0xde, 0x42e}, {0xea09, 0x81}, {0x9, 0x2, 0x3}, {0x2e47, 0x8, 0x81}, {0x3, 0x6, 0x7ff}, {0x7, 0x8, 0xfffff979}, {0x1f, 0x8, 0x1f}, {0x200, 0x7, 0x3}, {0x6897bc41, 0x7, 0x3}, {0x9, 0x80000000, 0x9}, {0x1ff, 0x1f, 0xffff}, {0x54, 0x9, 0x81}, {0xffffffff, 0x9cea, 0x3}, {0x7f, 0x7f, 0x3}, {0x800, 0x9, 0x6}, {0x5, 0xc46, 0x8000}, {0x0, 0x3, 0x8}, {0x2, 0x3}, {0x430, 0x2, 0x1ff}, {0x7ff, 0x20, 0x3}, {0x3, 0x7, 0xb06}, {0x6, 0x4, 0x2}, {0x401, 0x4, 0x9}, {0x5, 0x7, 0x3}, {0x5, 0x5, 0x1ff}]}) [ 2894.226262][T12121] ? debug_smp_processor_id+0x20/0x20 [ 2894.231603][T12121] ? security_file_ioctl+0x7d/0xa0 [ 2894.236701][T12121] __x64_sys_ioctl+0xd4/0x110 [ 2894.241351][T12121] do_syscall_64+0xca/0x1c0 [ 2894.245824][T12121] entry_SYSCALL_64_after_hwframe+0x5c/0xc1 [ 2894.253053][T12121] blk-mq: reduced tag depth (128 -> 64) [ 2894.325808][T12150] FAULT_INJECTION: forcing a failure. [ 2894.325808][T12150] name failslab, interval 1, probability 0, space 0, times 0 [ 2894.338869][T12150] CPU: 0 PID: 12150 Comm: syz-executor.4 Not tainted 5.4.233-syzkaller-00019-gd5ed2ca98e48 #0 [ 2894.349083][T12150] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/14/2023 [ 2894.359111][T12150] Call Trace: [ 2894.362380][T12150] dump_stack+0x1d8/0x241 [ 2894.366772][T12150] ? panic+0x768/0x768 [ 2894.370810][T12150] ? __kasan_kmalloc+0x199/0x1d0 [ 2894.375714][T12150] ? nf_ct_l4proto_log_invalid+0x258/0x258 [ 2894.381498][T12150] ? blk_mq_init_tags+0x76/0x2d0 [ 2894.386406][T12150] ? blk_mq_alloc_rq_map+0x95/0x1a0 [ 2894.391568][T12150] ? __blk_mq_alloc_rq_map+0x70/0x2a0 [ 2894.396908][T12150] ? blk_mq_alloc_tag_set+0x50e/0x890 [ 2894.402247][T12150] ? loop_add+0x231/0x740 [ 2894.406545][T12150] ? loop_control_ioctl+0x448/0x620 [ 2894.411797][T12150] ? do_vfs_ioctl+0x742/0x1720 [ 2894.416529][T12150] should_fail+0x71f/0x880 [ 2894.420914][T12150] ? setup_fault_attr+0x3d0/0x3d0 [ 2894.425907][T12150] ? sbitmap_queue_init_node+0x164/0xf10 [ 2894.431516][T12150] should_failslab+0x5/0x20 [ 2894.436008][T12150] __kmalloc+0x51/0x2b0 [ 2894.440134][T12150] sbitmap_queue_init_node+0x164/0xf10 [ 2894.445563][T12150] ? blk_mq_init_tags+0x76/0x2d0 [ 2894.450468][T12150] blk_mq_init_tags+0x11d/0x2d0 [ 2894.455307][T12150] blk_mq_alloc_rq_map+0x95/0x1a0 [ 2894.460299][T12150] __blk_mq_alloc_rq_map+0x70/0x2a0 [ 2894.465483][T12150] ? find_first_bit+0x5b/0xf0 [ 2894.470131][T12150] blk_mq_alloc_rq_maps+0xac/0x410 [ 2894.475224][T12150] blk_mq_alloc_tag_set+0x50e/0x890 [ 2894.480395][T12150] loop_add+0x231/0x740 [ 2894.484521][T12150] ? get_pid_task+0xc3/0xf0 [ 2894.488992][T12150] ? radix_tree_lookup+0x16f/0x1c0 [ 2894.494087][T12150] loop_control_ioctl+0x448/0x620 [ 2894.499164][T12150] ? loop_remove+0xa0/0xa0 [ 2894.503550][T12150] ? memset+0x1f/0x40 [ 2894.507588][T12150] ? fsnotify+0x1280/0x1340 [ 2894.512057][T12150] ? loop_remove+0xa0/0xa0 [ 2894.516442][T12150] do_vfs_ioctl+0x742/0x1720 [ 2894.521000][T12150] ? ioctl_preallocate+0x250/0x250 06:55:27 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) (fail_nth: 6) 06:55:27 executing program 0: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x0, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f0000000200)=@urb_type_control={0x2, {0x2}, 0xfffffffb, 0x4, &(0x7f0000000a40)={0x80, 0x16, 0x2005, 0x7, 0x8}, 0x8, 0xf8, 0x7, 0x0, 0x0, 0x5, &(0x7f0000000a80)="cfc206af3b20cc76f92c2426377a243c9d8d6008fafd2fd67138c6b064102eec84099eccfeb5a4b8a5f3f11f2b3a7efc7bb159fd9e2cfe9dfc7021a27eef2f1b8a14ae37ef3f5850a71385fa82e17ca63c6617a30e1bc3576e8ee08aac39ab0a21c7d06379bcc8bd197b3c4706285c7606cc6c43a9f9a4485fa40997c39a4da54d472ef5eb63dbcb91c23e669d6e8836e2269a1d466533236ed3bd"}) 06:55:27 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x5421, &(0x7f0000000200)=@urb_type_bulk={0x2, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 06:55:27 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_CALIPSO_C_LISTALL(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x44, 0x0, 0x2, 0x70bd2c, 0x25dfdbfe, {}, [@NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x7d8d0f1dd264f8ba}, @NLBL_CALIPSO_A_DOI={0x8}, @NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x3}, @NLBL_CALIPSO_A_MTYPE={0x8}]}, 0x44}, 0x1, 0x0, 0x0, 0x24000800}, 0x800) r1 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r1, 0x802c550a, &(0x7f0000000200)=@urb_type_bulk={0x3, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) (async) sendmsg$NLBL_CALIPSO_C_LISTALL(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x44, 0x0, 0x2, 0x70bd2c, 0x25dfdbfe, {}, [@NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x7d8d0f1dd264f8ba}, @NLBL_CALIPSO_A_DOI={0x8}, @NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x3}, @NLBL_CALIPSO_A_MTYPE={0x8}]}, 0x44}, 0x1, 0x0, 0x0, 0x24000800}, 0x800) (async) syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) (async) ioctl$USBDEVFS_SUBMITURB(r1, 0x802c550a, &(0x7f0000000200)=@urb_type_bulk={0x3, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) (async) 06:55:27 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x802c550a, &(0x7f0000000140)=@urb_type_iso={0x0, {}, 0x0, 0x0, &(0x7f0000000080), 0x0, 0x0, 0x0, 0x43, 0x0, 0x0, 0x0, [{0x8, 0x5, 0x100}, {0x40, 0x5, 0x3}, {0x8000, 0x5, 0x1}, {0x8, 0x2, 0x7f}, {0x9, 0x0, 0x4d}, {0x9, 0x8b88, 0x1}, {0x81, 0x5, 0x3ff}, {0xffffffff, 0xfffffff7, 0x5}, {0x7fffffff, 0x417, 0x40}, {0x401, 0x1, 0x950}, {0x6, 0xfff, 0x4}, {0x0, 0x8, 0x8}, {0xcd6fcee5, 0x4, 0xffffffff}, {0x7, 0x9, 0x9}, {0x3230fea4, 0x1ff, 0x401}, {0xf3d, 0xad, 0x2}, {0x7, 0x5, 0x8}, {0x800, 0xfffffffd, 0xff}, {0x5, 0x3, 0x7}, {0x7fffffff, 0x101, 0x1ff}, {0x11bb7e2, 0xe52}, {0x1, 0xffffffff, 0x7}, {0x3, 0x0, 0x4}, {0x1f, 0x80, 0x6}, {0x80, 0x9a, 0x1}, {0x3, 0xffff, 0xffff}, {0x81, 0x3, 0x8}, {0x0, 0x8, 0x400}, {0xfffffe01, 0x100, 0xf55}, {0x10001, 0xff, 0x7}, {0x2, 0x80000001, 0x7}, {0x4, 0xc708, 0x3ff}, {0x1, 0x7, 0x3}, {0x339, 0x8, 0x2}, {0x101, 0xffffffff, 0x10001}, {0x3, 0xff, 0x3}, {0x6b, 0xb0f, 0x5}, {0x7ff, 0x9, 0x7de5}, {0x80000001, 0x7f, 0x2}, {0x8, 0x6}, {0x3, 0x8001, 0x3ff}, {0x4, 0x5, 0x5d}, {0x75d23712, 0x8, 0x6}, {0x8, 0xde, 0x42e}, {0xea09, 0x81}, {0x9, 0x2, 0x3}, {0x2e47, 0x8, 0x81}, {0x3, 0x6, 0x7ff}, {0x7, 0x8, 0xfffff979}, {0x1f, 0x8, 0x1f}, {0x200, 0x7, 0x3}, {0x6897bc41, 0x7, 0x3}, {0x9, 0x80000000, 0x9}, {0x1ff, 0x1f, 0xffff}, {0x54, 0x9, 0x81}, {0xffffffff, 0x9cea, 0x3}, {0x7f, 0x7f, 0x3}, {0x800, 0x9, 0x6}, {0x5, 0xc46, 0x8000}, {0x0, 0x3, 0x8}, {0x2, 0x3}, {0x430, 0x2, 0x1ff}, {0x7ff, 0x20, 0x3}, {0x3, 0x7, 0xb06}, {0x6, 0x4, 0x2}, {0x401, 0x4, 0x9}, {0x5, 0x7, 0x3}]}) 06:55:27 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x8008551c, &(0x7f0000000200)=@urb_type_bulk={0x3, {}, 0x8001, 0x2, &(0x7f0000000100)="8b6cf81219b30a18f65d579d257479f70d6fc60845f8fb3c7274e572977d57d6a06e4177ea1c1873fb71df623b5cefb7c4952f3e640b0a3084427b8aece5f9c02f4973cad10227f752b05fe54b22b7d7b46243e2114ebb154e75c16871b5d01eb1055fb8eb72e311fa8c1820bc070da2e2557c9633b557d0d24495ef61f8e816a604f5d237014653294eb886c7b0ecaa1b8d7ef23c027d34bcb88fb6c000a921d479d9e0aee74ee39efc79e2c24a92b0acf36601d9b6ac9fab62eaeb09029aeb542f58f2739e934a074a5e3eef690d72a510", 0xd2, 0x100, 0x6, 0xdb4f, 0x7fffffff, 0xffff, &(0x7f0000000240)="0fbe8c472ce4ca584a2464a51ba5ce86640c69926e"}) 06:55:27 executing program 0: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x0) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f0000000200)=@urb_type_control={0x2, {0x2}, 0xfffffffb, 0x4, &(0x7f0000000a40)={0x80, 0x16, 0x2005, 0x7, 0x8}, 0x8, 0xf8, 0x7, 0x0, 0x0, 0x5, &(0x7f0000000a80)="cfc206af3b20cc76f92c2426377a243c9d8d6008fafd2fd67138c6b064102eec84099eccfeb5a4b8a5f3f11f2b3a7efc7bb159fd9e2cfe9dfc7021a27eef2f1b8a14ae37ef3f5850a71385fa82e17ca63c6617a30e1bc3576e8ee08aac39ab0a21c7d06379bcc8bd197b3c4706285c7606cc6c43a9f9a4485fa40997c39a4da54d472ef5eb63dbcb91c23e669d6e8836e2269a1d466533236ed3bd"}) 06:55:27 executing program 1: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) r1 = socket$inet(0x2, 0x3, 0x6) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x18, &(0x7f0000000040)=@security={'security\x00', 0xe, 0x4, 0x260, 0xffffffff, 0x180, 0xc0, 0xc0, 0xffffffff, 0xffffffff, 0x288, 0x288, 0x288, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x70, 0x98}, @common=@inet=@SET1={0x28}}, {{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@STANDARD={0x28}}, {{@ip={@rand_addr, @broadcast, 0x0, 0x0, 'batadv_slave_0\x00', 'ip_vti0\x00'}, 0x0, 0x70, 0x98}, @common=@unspec=@NFQUEUE0={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x2c0) ioctl$USBDEVFS_SUBMITURB(r0, 0x802c550a, &(0x7f0000000200)=@urb_type_bulk={0x3, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 06:55:27 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x8008551c, &(0x7f0000000200)=@urb_type_bulk={0x3, {}, 0x8001, 0x2, &(0x7f0000000100)="8b6cf81219b30a18f65d579d257479f70d6fc60845f8fb3c7274e572977d57d6a06e4177ea1c1873fb71df623b5cefb7c4952f3e640b0a3084427b8aece5f9c02f4973cad10227f752b05fe54b22b7d7b46243e2114ebb154e75c16871b5d01eb1055fb8eb72e311fa8c1820bc070da2e2557c9633b557d0d24495ef61f8e816a604f5d237014653294eb886c7b0ecaa1b8d7ef23c027d34bcb88fb6c000a921d479d9e0aee74ee39efc79e2c24a92b0acf36601d9b6ac9fab62eaeb09029aeb542f58f2739e934a074a5e3eef690d72a510", 0xd2, 0x100, 0x6, 0xdb4f, 0x7fffffff, 0xffff, &(0x7f0000000240)="0fbe8c472ce4ca584a2464a51ba5ce86640c69926e"}) syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) (async) ioctl$USBDEVFS_SUBMITURB(r0, 0x8008551c, &(0x7f0000000200)=@urb_type_bulk={0x3, {}, 0x8001, 0x2, &(0x7f0000000100)="8b6cf81219b30a18f65d579d257479f70d6fc60845f8fb3c7274e572977d57d6a06e4177ea1c1873fb71df623b5cefb7c4952f3e640b0a3084427b8aece5f9c02f4973cad10227f752b05fe54b22b7d7b46243e2114ebb154e75c16871b5d01eb1055fb8eb72e311fa8c1820bc070da2e2557c9633b557d0d24495ef61f8e816a604f5d237014653294eb886c7b0ecaa1b8d7ef23c027d34bcb88fb6c000a921d479d9e0aee74ee39efc79e2c24a92b0acf36601d9b6ac9fab62eaeb09029aeb542f58f2739e934a074a5e3eef690d72a510", 0xd2, 0x100, 0x6, 0xdb4f, 0x7fffffff, 0xffff, &(0x7f0000000240)="0fbe8c472ce4ca584a2464a51ba5ce86640c69926e"}) (async) [ 2894.526078][T12150] ? __fget+0x407/0x490 [ 2894.530201][T12150] ? fget_many+0x20/0x20 [ 2894.534411][T12150] ? debug_smp_processor_id+0x20/0x20 [ 2894.539750][T12150] ? security_file_ioctl+0x7d/0xa0 [ 2894.544843][T12150] __x64_sys_ioctl+0xd4/0x110 [ 2894.549488][T12150] do_syscall_64+0xca/0x1c0 [ 2894.553960][T12150] entry_SYSCALL_64_after_hwframe+0x5c/0xc1 [ 2894.560877][T12150] blk-mq: reduced tag depth (128 -> 64) 06:55:27 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x802c550a, &(0x7f0000000140)=@urb_type_iso={0x0, {}, 0x0, 0x0, &(0x7f0000000080), 0x0, 0x0, 0x0, 0x42, 0x0, 0x0, 0x0, [{0x8, 0x5, 0x100}, {0x40, 0x5, 0x3}, {0x8000, 0x5, 0x1}, {0x8, 0x2, 0x7f}, {0x9, 0x0, 0x4d}, {0x9, 0x8b88, 0x1}, {0x81, 0x5, 0x3ff}, {0xffffffff, 0xfffffff7, 0x5}, {0x7fffffff, 0x417, 0x40}, {0x401, 0x1, 0x950}, {0x6, 0xfff, 0x4}, {0x0, 0x8, 0x8}, {0xcd6fcee5, 0x4, 0xffffffff}, {0x7, 0x9, 0x9}, {0x3230fea4, 0x1ff, 0x401}, {0xf3d, 0xad, 0x2}, {0x7, 0x5, 0x8}, {0x800, 0xfffffffd, 0xff}, {0x5, 0x3, 0x7}, {0x7fffffff, 0x101, 0x1ff}, {0x11bb7e2, 0xe52}, {0x1, 0xffffffff, 0x7}, {0x3, 0x0, 0x4}, {0x1f, 0x80, 0x6}, {0x80, 0x9a, 0x1}, {0x3, 0xffff, 0xffff}, {0x81, 0x3, 0x8}, {0x0, 0x8, 0x400}, {0xfffffe01, 0x100, 0xf55}, {0x10001, 0xff, 0x7}, {0x2, 0x80000001, 0x7}, {0x4, 0xc708, 0x3ff}, {0x1, 0x7, 0x3}, {0x339, 0x8, 0x2}, {0x101, 0xffffffff, 0x10001}, {0x3, 0xff, 0x3}, {0x6b, 0xb0f, 0x5}, {0x7ff, 0x9, 0x7de5}, {0x80000001, 0x7f, 0x2}, {0x8, 0x6}, {0x3, 0x8001, 0x3ff}, {0x4, 0x5, 0x5d}, {0x75d23712, 0x8, 0x6}, {0x8, 0xde, 0x42e}, {0xea09, 0x81}, {0x9, 0x2, 0x3}, {0x2e47, 0x8, 0x81}, {0x3, 0x6, 0x7ff}, {0x7, 0x8, 0xfffff979}, {0x1f, 0x8, 0x1f}, {0x200, 0x7, 0x3}, {0x6897bc41, 0x7, 0x3}, {0x9, 0x80000000, 0x9}, {0x1ff, 0x1f, 0xffff}, {0x54, 0x9, 0x81}, {0xffffffff, 0x9cea, 0x3}, {0x7f, 0x7f, 0x3}, {0x800, 0x9, 0x6}, {0x5, 0xc46, 0x8000}, {0x0, 0x3, 0x8}, {0x2, 0x3}, {0x430, 0x2, 0x1ff}, {0x7ff, 0x20, 0x3}, {0x3, 0x7, 0xb06}, {0x6, 0x4, 0x2}, {0x401, 0x4, 0x9}]}) 06:55:27 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x5450, &(0x7f0000000200)=@urb_type_bulk={0x2, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 06:55:27 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x802c550a, &(0x7f0000000140)=@urb_type_iso={0x0, {}, 0x0, 0x0, &(0x7f0000000080), 0x0, 0x0, 0x0, 0x41, 0x0, 0x0, 0x0, [{0x8, 0x5, 0x100}, {0x40, 0x5, 0x3}, {0x8000, 0x5, 0x1}, {0x8, 0x2, 0x7f}, {0x9, 0x0, 0x4d}, {0x9, 0x8b88, 0x1}, {0x81, 0x5, 0x3ff}, {0xffffffff, 0xfffffff7, 0x5}, {0x7fffffff, 0x417, 0x40}, {0x401, 0x1, 0x950}, {0x6, 0xfff, 0x4}, {0x0, 0x8, 0x8}, {0xcd6fcee5, 0x4, 0xffffffff}, {0x7, 0x9, 0x9}, {0x3230fea4, 0x1ff, 0x401}, {0xf3d, 0xad, 0x2}, {0x7, 0x5, 0x8}, {0x800, 0xfffffffd, 0xff}, {0x5, 0x3, 0x7}, {0x7fffffff, 0x101, 0x1ff}, {0x11bb7e2, 0xe52}, {0x1, 0xffffffff, 0x7}, {0x3, 0x0, 0x4}, {0x1f, 0x80, 0x6}, {0x80, 0x9a, 0x1}, {0x3, 0xffff, 0xffff}, {0x81, 0x3, 0x8}, {0x0, 0x8, 0x400}, {0xfffffe01, 0x100, 0xf55}, {0x10001, 0xff, 0x7}, {0x2, 0x80000001, 0x7}, {0x4, 0xc708, 0x3ff}, {0x1, 0x7, 0x3}, {0x339, 0x8, 0x2}, {0x101, 0xffffffff, 0x10001}, {0x3, 0xff, 0x3}, {0x6b, 0xb0f, 0x5}, {0x7ff, 0x9, 0x7de5}, {0x80000001, 0x7f, 0x2}, {0x8, 0x6}, {0x3, 0x8001, 0x3ff}, {0x4, 0x5, 0x5d}, {0x75d23712, 0x8, 0x6}, {0x8, 0xde, 0x42e}, {0xea09, 0x81}, {0x9, 0x2, 0x3}, {0x2e47, 0x8, 0x81}, {0x3, 0x6, 0x7ff}, {0x7, 0x8, 0xfffff979}, {0x1f, 0x8, 0x1f}, {0x200, 0x7, 0x3}, {0x6897bc41, 0x7, 0x3}, {0x9, 0x80000000, 0x9}, {0x1ff, 0x1f, 0xffff}, {0x54, 0x9, 0x81}, {0xffffffff, 0x9cea, 0x3}, {0x7f, 0x7f, 0x3}, {0x800, 0x9, 0x6}, {0x5, 0xc46, 0x8000}, {0x0, 0x3, 0x8}, {0x2, 0x3}, {0x430, 0x2, 0x1ff}, {0x7ff, 0x20, 0x3}, {0x3, 0x7, 0xb06}, {0x6, 0x4, 0x2}]}) [ 2894.636898][T12175] FAULT_INJECTION: forcing a failure. [ 2894.636898][T12175] name failslab, interval 1, probability 0, space 0, times 0 [ 2894.649947][T12175] CPU: 1 PID: 12175 Comm: syz-executor.4 Not tainted 5.4.233-syzkaller-00019-gd5ed2ca98e48 #0 [ 2894.660155][T12175] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/14/2023 [ 2894.670208][T12175] Call Trace: [ 2894.673474][T12175] dump_stack+0x1d8/0x241 [ 2894.677774][T12175] ? panic+0x768/0x768 [ 2894.681814][T12175] ? nf_ct_l4proto_log_invalid+0x258/0x258 [ 2894.687587][T12175] should_fail+0x71f/0x880 [ 2894.691973][T12175] ? setup_fault_attr+0x3d0/0x3d0 [ 2894.696964][T12175] ? pcpu_alloc+0xb57/0x1050 [ 2894.701524][T12175] ? sbitmap_queue_init_node+0x64b/0xf10 [ 2894.707125][T12175] should_failslab+0x5/0x20 [ 2894.711604][T12175] kmem_cache_alloc_trace+0x28/0x240 [ 2894.716870][T12175] sbitmap_queue_init_node+0x64b/0xf10 [ 2894.722300][T12175] blk_mq_init_tags+0x11d/0x2d0 [ 2894.727225][T12175] blk_mq_alloc_rq_map+0x95/0x1a0 [ 2894.732220][T12175] __blk_mq_alloc_rq_map+0x70/0x2a0 [ 2894.737406][T12175] ? find_first_bit+0x5b/0xf0 [ 2894.742050][T12175] blk_mq_alloc_rq_maps+0xac/0x410 [ 2894.747141][T12175] blk_mq_alloc_tag_set+0x50e/0x890 [ 2894.752329][T12175] loop_add+0x231/0x740 [ 2894.756456][T12175] ? get_pid_task+0xc3/0xf0 [ 2894.760931][T12175] ? radix_tree_lookup+0x16f/0x1c0 [ 2894.766009][T12175] loop_control_ioctl+0x448/0x620 [ 2894.771002][T12175] ? loop_remove+0xa0/0xa0 [ 2894.775390][T12175] ? memset+0x1f/0x40 [ 2894.779342][T12175] ? fsnotify+0x1280/0x1340 06:55:27 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) (fail_nth: 7) 06:55:27 executing program 0: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x0) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f0000000200)=@urb_type_control={0x2, {0x2}, 0xfffffffb, 0x4, &(0x7f0000000a40)={0x80, 0x16, 0x2005, 0x7, 0x8}, 0x8, 0xf8, 0x7, 0x0, 0x0, 0x5, &(0x7f0000000a80)="cfc206af3b20cc76f92c2426377a243c9d8d6008fafd2fd67138c6b064102eec84099eccfeb5a4b8a5f3f11f2b3a7efc7bb159fd9e2cfe9dfc7021a27eef2f1b8a14ae37ef3f5850a71385fa82e17ca63c6617a30e1bc3576e8ee08aac39ab0a21c7d06379bcc8bd197b3c4706285c7606cc6c43a9f9a4485fa40997c39a4da54d472ef5eb63dbcb91c23e669d6e8836e2269a1d466533236ed3bd"}) 06:55:27 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x5451, &(0x7f0000000200)=@urb_type_bulk={0x2, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 06:55:27 executing program 1: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) r1 = socket$inet(0x2, 0x3, 0x6) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x18, &(0x7f0000000040)=@security={'security\x00', 0xe, 0x4, 0x260, 0xffffffff, 0x180, 0xc0, 0xc0, 0xffffffff, 0xffffffff, 0x288, 0x288, 0x288, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x70, 0x98}, @common=@inet=@SET1={0x28}}, {{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@STANDARD={0x28}}, {{@ip={@rand_addr, @broadcast, 0x0, 0x0, 'batadv_slave_0\x00', 'ip_vti0\x00'}, 0x0, 0x70, 0x98}, @common=@unspec=@NFQUEUE0={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x2c0) (async) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x18, &(0x7f0000000040)=@security={'security\x00', 0xe, 0x4, 0x260, 0xffffffff, 0x180, 0xc0, 0xc0, 0xffffffff, 0xffffffff, 0x288, 0x288, 0x288, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x70, 0x98}, @common=@inet=@SET1={0x28}}, {{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@STANDARD={0x28}}, {{@ip={@rand_addr, @broadcast, 0x0, 0x0, 'batadv_slave_0\x00', 'ip_vti0\x00'}, 0x0, 0x70, 0x98}, @common=@unspec=@NFQUEUE0={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x2c0) ioctl$USBDEVFS_SUBMITURB(r0, 0x802c550a, &(0x7f0000000200)=@urb_type_bulk={0x3, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 06:55:27 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x8008551c, &(0x7f0000000200)=@urb_type_bulk={0x3, {}, 0x8001, 0x2, &(0x7f0000000100)="8b6cf81219b30a18f65d579d257479f70d6fc60845f8fb3c7274e572977d57d6a06e4177ea1c1873fb71df623b5cefb7c4952f3e640b0a3084427b8aece5f9c02f4973cad10227f752b05fe54b22b7d7b46243e2114ebb154e75c16871b5d01eb1055fb8eb72e311fa8c1820bc070da2e2557c9633b557d0d24495ef61f8e816a604f5d237014653294eb886c7b0ecaa1b8d7ef23c027d34bcb88fb6c000a921d479d9e0aee74ee39efc79e2c24a92b0acf36601d9b6ac9fab62eaeb09029aeb542f58f2739e934a074a5e3eef690d72a510", 0xd2, 0x100, 0x6, 0xdb4f, 0x7fffffff, 0xffff, &(0x7f0000000240)="0fbe8c472ce4ca584a2464a51ba5ce86640c69926e"}) syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) (async) ioctl$USBDEVFS_SUBMITURB(r0, 0x8008551c, &(0x7f0000000200)=@urb_type_bulk={0x3, {}, 0x8001, 0x2, &(0x7f0000000100)="8b6cf81219b30a18f65d579d257479f70d6fc60845f8fb3c7274e572977d57d6a06e4177ea1c1873fb71df623b5cefb7c4952f3e640b0a3084427b8aece5f9c02f4973cad10227f752b05fe54b22b7d7b46243e2114ebb154e75c16871b5d01eb1055fb8eb72e311fa8c1820bc070da2e2557c9633b557d0d24495ef61f8e816a604f5d237014653294eb886c7b0ecaa1b8d7ef23c027d34bcb88fb6c000a921d479d9e0aee74ee39efc79e2c24a92b0acf36601d9b6ac9fab62eaeb09029aeb542f58f2739e934a074a5e3eef690d72a510", 0xd2, 0x100, 0x6, 0xdb4f, 0x7fffffff, 0xffff, &(0x7f0000000240)="0fbe8c472ce4ca584a2464a51ba5ce86640c69926e"}) (async) [ 2894.783816][T12175] ? loop_remove+0xa0/0xa0 [ 2894.788198][T12175] do_vfs_ioctl+0x742/0x1720 [ 2894.792762][T12175] ? ioctl_preallocate+0x250/0x250 [ 2894.797841][T12175] ? __fget+0x407/0x490 [ 2894.801967][T12175] ? fget_many+0x20/0x20 [ 2894.806178][T12175] ? debug_smp_processor_id+0x20/0x20 [ 2894.811517][T12175] ? security_file_ioctl+0x7d/0xa0 [ 2894.816627][T12175] __x64_sys_ioctl+0xd4/0x110 [ 2894.821277][T12175] do_syscall_64+0xca/0x1c0 [ 2894.825750][T12175] entry_SYSCALL_64_after_hwframe+0x5c/0xc1 [ 2894.832230][T12175] blk-mq: reduced tag depth (128 -> 64) 06:55:27 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x802c550a, &(0x7f0000000140)=@urb_type_iso={0x0, {}, 0x0, 0x0, &(0x7f0000000080), 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, [{0x8, 0x5, 0x100}, {0x40, 0x5, 0x3}, {0x8000, 0x5, 0x1}, {0x8, 0x2, 0x7f}, {0x9, 0x0, 0x4d}, {0x9, 0x8b88, 0x1}, {0x81, 0x5, 0x3ff}, {0xffffffff, 0xfffffff7, 0x5}, {0x7fffffff, 0x417, 0x40}, {0x401, 0x1, 0x950}, {0x6, 0xfff, 0x4}, {0x0, 0x8, 0x8}, {0xcd6fcee5, 0x4, 0xffffffff}, {0x7, 0x9, 0x9}, {0x3230fea4, 0x1ff, 0x401}, {0xf3d, 0xad, 0x2}, {0x7, 0x5, 0x8}, {0x800, 0xfffffffd, 0xff}, {0x5, 0x3, 0x7}, {0x7fffffff, 0x101, 0x1ff}, {0x11bb7e2, 0xe52}, {0x1, 0xffffffff, 0x7}, {0x3, 0x0, 0x4}, {0x1f, 0x80, 0x6}, {0x80, 0x9a, 0x1}, {0x3, 0xffff, 0xffff}, {0x81, 0x3, 0x8}, {0x0, 0x8, 0x400}, {0xfffffe01, 0x100, 0xf55}, {0x10001, 0xff, 0x7}, {0x2, 0x80000001, 0x7}, {0x4, 0xc708, 0x3ff}, {0x1, 0x7, 0x3}, {0x339, 0x8, 0x2}, {0x101, 0xffffffff, 0x10001}, {0x3, 0xff, 0x3}, {0x6b, 0xb0f, 0x5}, {0x7ff, 0x9, 0x7de5}, {0x80000001, 0x7f, 0x2}, {0x8, 0x6}, {0x3, 0x8001, 0x3ff}, {0x4, 0x5, 0x5d}, {0x75d23712, 0x8, 0x6}, {0x8, 0xde, 0x42e}, {0xea09, 0x81}, {0x9, 0x2, 0x3}, {0x2e47, 0x8, 0x81}, {0x3, 0x6, 0x7ff}, {0x7, 0x8, 0xfffff979}, {0x1f, 0x8, 0x1f}, {0x200, 0x7, 0x3}, {0x6897bc41, 0x7, 0x3}, {0x9, 0x80000000, 0x9}, {0x1ff, 0x1f, 0xffff}, {0x54, 0x9, 0x81}, {0xffffffff, 0x9cea, 0x3}, {0x7f, 0x7f, 0x3}, {0x800, 0x9, 0x6}, {0x5, 0xc46, 0x8000}, {0x0, 0x3, 0x8}, {0x2, 0x3}, {0x430, 0x2, 0x1ff}, {0x7ff, 0x20, 0x3}, {0x3, 0x7, 0xb06}]}) 06:55:27 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x802c550a, &(0x7f0000000140)=@urb_type_iso={0x0, {}, 0x0, 0x0, &(0x7f0000000080), 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, [{0x8, 0x5, 0x100}, {0x40, 0x5, 0x3}, {0x8000, 0x5, 0x1}, {0x8, 0x2, 0x7f}, {0x9, 0x0, 0x4d}, {0x9, 0x8b88, 0x1}, {0x81, 0x5, 0x3ff}, {0xffffffff, 0xfffffff7, 0x5}, {0x7fffffff, 0x417, 0x40}, {0x401, 0x1, 0x950}, {0x6, 0xfff, 0x4}, {0x0, 0x8, 0x8}, {0xcd6fcee5, 0x4, 0xffffffff}, {0x7, 0x9, 0x9}, {0x3230fea4, 0x1ff, 0x401}, {0xf3d, 0xad, 0x2}, {0x7, 0x5, 0x8}, {0x800, 0xfffffffd, 0xff}, {0x5, 0x3, 0x7}, {0x7fffffff, 0x101, 0x1ff}, {0x11bb7e2, 0xe52}, {0x1, 0xffffffff, 0x7}, {0x3, 0x0, 0x4}, {0x1f, 0x80, 0x6}, {0x80, 0x9a, 0x1}, {0x3, 0xffff, 0xffff}, {0x81, 0x3, 0x8}, {0x0, 0x8, 0x400}, {0xfffffe01, 0x100, 0xf55}, {0x10001, 0xff, 0x7}, {0x2, 0x80000001, 0x7}, {0x4, 0xc708, 0x3ff}, {0x1, 0x7, 0x3}, {0x339, 0x8, 0x2}, {0x101, 0xffffffff, 0x10001}, {0x3, 0xff, 0x3}, {0x6b, 0xb0f, 0x5}, {0x7ff, 0x9, 0x7de5}, {0x80000001, 0x7f, 0x2}, {0x8, 0x6}, {0x3, 0x8001, 0x3ff}, {0x4, 0x5, 0x5d}, {0x75d23712, 0x8, 0x6}, {0x8, 0xde, 0x42e}, {0xea09, 0x81}, {0x9, 0x2, 0x3}, {0x2e47, 0x8, 0x81}, {0x3, 0x6, 0x7ff}, {0x7, 0x8, 0xfffff979}, {0x1f, 0x8, 0x1f}, {0x200, 0x7, 0x3}, {0x6897bc41, 0x7, 0x3}, {0x9, 0x80000000, 0x9}, {0x1ff, 0x1f, 0xffff}, {0x54, 0x9, 0x81}, {0xffffffff, 0x9cea, 0x3}, {0x7f, 0x7f, 0x3}, {0x800, 0x9, 0x6}, {0x5, 0xc46, 0x8000}, {0x0, 0x3, 0x8}, {0x2, 0x3}, {0x430, 0x2, 0x1ff}, {0x7ff, 0x20, 0x3}]}) 06:55:27 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) r1 = accept$inet(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000080)=0x10) getsockopt$inet_mreqsrc(r1, 0x0, 0x25, &(0x7f00000000c0)={@broadcast, @multicast1, @multicast2}, &(0x7f0000000100)=0xc) ioctl$USBDEVFS_SUBMITURB(r0, 0x8008551c, &(0x7f0000000200)=@urb_type_bulk={0x3, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f0000000300)=@urb_type_iso={0x0, {0x4, 0x1}, 0x25c5, 0x40, &(0x7f0000000140)="1493504102335fd876b31f6ba206b591e33049f0caad85250d687963451205d1db731a06b2e23cdf859b904cfb1d971530d91fc5d45252aa8595155cc584f4dc71c4b6fad56c0d93aebaf394f52e3180111cd005aa47e6ded4a9b8908fbd48edc4231d58315dcabda5669870a51285b5a4d6f731958a8d75f196a13a90066ccfb57d73941d7ae0c54033e2484c1964def3e19b547d8dc79984ff2ca40cf17e4909f98046eec873", 0xa7, 0x81, 0x40, 0x14, 0x5, 0x79, &(0x7f0000000240)="be7e5d1d8ff5dd95f8022f859ab105d2414d886270532ea9bfd45661838fe6ace0114144c18036eca405ac3d68351eccebdef9524fc3990c93de4e3dd0df03e4d84c7efa76f3d21b6e9e03ed096f71b7a027ad034b1a2abd2f14d894e599142457ec7641ec071ff90b80fff7bb1bb27313525d361f26ddadbee7d7ec3cb2e12c456e3d2ad004d694251082fb5586b43e4f3b95b822ccbfbdf294", [{0x10d8, 0x4, 0x7}, {0x8, 0x468, 0x7}, {0x800, 0x401, 0x1}, {0xffffffff, 0x0, 0x7f}, {0x9, 0x1, 0x401}, {0x6, 0x5, 0x1}, {0x3, 0x0, 0xe0d}, {0x127049c4, 0x9, 0x40}, {0x7, 0x7f, 0x100}, {0x101, 0x6}, {0x3, 0x9da, 0x7fff}, {0x4, 0x80, 0x3f}, {0x4, 0x1000, 0x771}, {0x20, 0x80, 0xff}, {0xffff, 0x80, 0x1f}, {0xf46f, 0x8}, {0x80000000, 0xfdd2, 0xfffffff8}, {0x4, 0xfffffff9, 0x7fff}, {0x0, 0x42910bd1, 0x104}, {0x6, 0xf6, 0xaf28ba5d}]}) 06:55:27 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x5452, &(0x7f0000000200)=@urb_type_bulk={0x2, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 06:55:27 executing program 1: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) (async, rerun: 32) r1 = socket$inet(0x2, 0x3, 0x6) (rerun: 32) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x18, &(0x7f0000000040)=@security={'security\x00', 0xe, 0x4, 0x260, 0xffffffff, 0x180, 0xc0, 0xc0, 0xffffffff, 0xffffffff, 0x288, 0x288, 0x288, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x70, 0x98}, @common=@inet=@SET1={0x28}}, {{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@STANDARD={0x28}}, {{@ip={@rand_addr, @broadcast, 0x0, 0x0, 'batadv_slave_0\x00', 'ip_vti0\x00'}, 0x0, 0x70, 0x98}, @common=@unspec=@NFQUEUE0={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x2c0) (async, rerun: 64) ioctl$USBDEVFS_SUBMITURB(r0, 0x802c550a, &(0x7f0000000200)=@urb_type_bulk={0x3, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) (rerun: 64) 06:55:27 executing program 0: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x0) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f0000000200)=@urb_type_control={0x2, {0x2}, 0xfffffffb, 0x4, &(0x7f0000000a40)={0x80, 0x16, 0x2005, 0x7, 0x8}, 0x8, 0xf8, 0x7, 0x0, 0x0, 0x5, &(0x7f0000000a80)="cfc206af3b20cc76f92c2426377a243c9d8d6008fafd2fd67138c6b064102eec84099eccfeb5a4b8a5f3f11f2b3a7efc7bb159fd9e2cfe9dfc7021a27eef2f1b8a14ae37ef3f5850a71385fa82e17ca63c6617a30e1bc3576e8ee08aac39ab0a21c7d06379bcc8bd197b3c4706285c7606cc6c43a9f9a4485fa40997c39a4da54d472ef5eb63dbcb91c23e669d6e8836e2269a1d466533236ed3bd"}) 06:55:27 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x5460, &(0x7f0000000200)=@urb_type_bulk={0x2, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) [ 2894.904070][T12202] FAULT_INJECTION: forcing a failure. [ 2894.904070][T12202] name failslab, interval 1, probability 0, space 0, times 0 [ 2894.917198][T12202] CPU: 1 PID: 12202 Comm: syz-executor.4 Not tainted 5.4.233-syzkaller-00019-gd5ed2ca98e48 #0 [ 2894.927407][T12202] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/14/2023 [ 2894.937450][T12202] Call Trace: [ 2894.940731][T12202] dump_stack+0x1d8/0x241 [ 2894.945030][T12202] ? panic+0x768/0x768 [ 2894.949066][T12202] ? nf_ct_l4proto_log_invalid+0x258/0x258 [ 2894.954841][T12202] should_fail+0x71f/0x880 [ 2894.959227][T12202] ? setup_fault_attr+0x3d0/0x3d0 [ 2894.964218][T12202] ? pcpu_alloc+0xb57/0x1050 [ 2894.968776][T12202] ? sbitmap_queue_init_node+0x64b/0xf10 [ 2894.974378][T12202] should_failslab+0x5/0x20 [ 2894.978850][T12202] kmem_cache_alloc_trace+0x28/0x240 [ 2894.984102][T12202] sbitmap_queue_init_node+0x64b/0xf10 [ 2894.989527][T12202] blk_mq_init_tags+0x183/0x2d0 [ 2894.994375][T12202] blk_mq_alloc_rq_map+0x95/0x1a0 [ 2894.999370][T12202] __blk_mq_alloc_rq_map+0x70/0x2a0 [ 2895.004533][T12202] ? find_first_bit+0x5b/0xf0 [ 2895.009177][T12202] blk_mq_alloc_rq_maps+0xac/0x410 [ 2895.014254][T12202] blk_mq_alloc_tag_set+0x50e/0x890 [ 2895.019420][T12202] loop_add+0x231/0x740 [ 2895.023545][T12202] ? get_pid_task+0xc3/0xf0 [ 2895.028017][T12202] ? radix_tree_lookup+0x16f/0x1c0 [ 2895.033099][T12202] loop_control_ioctl+0x448/0x620 [ 2895.038091][T12202] ? loop_remove+0xa0/0xa0 [ 2895.042496][T12202] ? memset+0x1f/0x40 [ 2895.046453][T12202] ? fsnotify+0x1280/0x1340 [ 2895.050924][T12202] ? loop_remove+0xa0/0xa0 [ 2895.055309][T12202] do_vfs_ioctl+0x742/0x1720 [ 2895.059865][T12202] ? ioctl_preallocate+0x250/0x250 [ 2895.064964][T12202] ? __fget+0x407/0x490 [ 2895.069089][T12202] ? fget_many+0x20/0x20 [ 2895.073302][T12202] ? debug_smp_processor_id+0x20/0x20 [ 2895.078643][T12202] ? security_file_ioctl+0x7d/0xa0 [ 2895.083720][T12202] __x64_sys_ioctl+0xd4/0x110 [ 2895.088366][T12202] do_syscall_64+0xca/0x1c0 [ 2895.092836][T12202] entry_SYSCALL_64_after_hwframe+0x5c/0xc1 06:55:27 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) (fail_nth: 8) 06:55:27 executing program 0: syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(0xffffffffffffffff, 0x8038550a, &(0x7f0000000200)=@urb_type_control={0x2, {0x2}, 0xfffffffb, 0x4, &(0x7f0000000a40)={0x80, 0x16, 0x2005, 0x7, 0x8}, 0x8, 0xf8, 0x7, 0x0, 0x0, 0x5, &(0x7f0000000a80)="cfc206af3b20cc76f92c2426377a243c9d8d6008fafd2fd67138c6b064102eec84099eccfeb5a4b8a5f3f11f2b3a7efc7bb159fd9e2cfe9dfc7021a27eef2f1b8a14ae37ef3f5850a71385fa82e17ca63c6617a30e1bc3576e8ee08aac39ab0a21c7d06379bcc8bd197b3c4706285c7606cc6c43a9f9a4485fa40997c39a4da54d472ef5eb63dbcb91c23e669d6e8836e2269a1d466533236ed3bd"}) 06:55:27 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x550b, &(0x7f0000000200)=@urb_type_bulk={0x2, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 06:55:27 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x802c550a, &(0x7f0000000140)=@urb_type_iso={0x0, {}, 0x0, 0x0, &(0x7f0000000080), 0x0, 0x0, 0x0, 0x3e, 0x0, 0x0, 0x0, [{0x8, 0x5, 0x100}, {0x40, 0x5, 0x3}, {0x8000, 0x5, 0x1}, {0x8, 0x2, 0x7f}, {0x9, 0x0, 0x4d}, {0x9, 0x8b88, 0x1}, {0x81, 0x5, 0x3ff}, {0xffffffff, 0xfffffff7, 0x5}, {0x7fffffff, 0x417, 0x40}, {0x401, 0x1, 0x950}, {0x6, 0xfff, 0x4}, {0x0, 0x8, 0x8}, {0xcd6fcee5, 0x4, 0xffffffff}, {0x7, 0x9, 0x9}, {0x3230fea4, 0x1ff, 0x401}, {0xf3d, 0xad, 0x2}, {0x7, 0x5, 0x8}, {0x800, 0xfffffffd, 0xff}, {0x5, 0x3, 0x7}, {0x7fffffff, 0x101, 0x1ff}, {0x11bb7e2, 0xe52}, {0x1, 0xffffffff, 0x7}, {0x3, 0x0, 0x4}, {0x1f, 0x80, 0x6}, {0x80, 0x9a, 0x1}, {0x3, 0xffff, 0xffff}, {0x81, 0x3, 0x8}, {0x0, 0x8, 0x400}, {0xfffffe01, 0x100, 0xf55}, {0x10001, 0xff, 0x7}, {0x2, 0x80000001, 0x7}, {0x4, 0xc708, 0x3ff}, {0x1, 0x7, 0x3}, {0x339, 0x8, 0x2}, {0x101, 0xffffffff, 0x10001}, {0x3, 0xff, 0x3}, {0x6b, 0xb0f, 0x5}, {0x7ff, 0x9, 0x7de5}, {0x80000001, 0x7f, 0x2}, {0x8, 0x6}, {0x3, 0x8001, 0x3ff}, {0x4, 0x5, 0x5d}, {0x75d23712, 0x8, 0x6}, {0x8, 0xde, 0x42e}, {0xea09, 0x81}, {0x9, 0x2, 0x3}, {0x2e47, 0x8, 0x81}, {0x3, 0x6, 0x7ff}, {0x7, 0x8, 0xfffff979}, {0x1f, 0x8, 0x1f}, {0x200, 0x7, 0x3}, {0x6897bc41, 0x7, 0x3}, {0x9, 0x80000000, 0x9}, {0x1ff, 0x1f, 0xffff}, {0x54, 0x9, 0x81}, {0xffffffff, 0x9cea, 0x3}, {0x7f, 0x7f, 0x3}, {0x800, 0x9, 0x6}, {0x5, 0xc46, 0x8000}, {0x0, 0x3, 0x8}, {0x2, 0x3}, {0x430, 0x2, 0x1ff}]}) 06:55:27 executing program 1: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x802c550a, &(0x7f0000000200)=@urb_type_bulk={0x3, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r1 = syz_open_dev$usbfs(&(0x7f0000000380), 0x6e665f53, 0x0) ioctl$USBDEVFS_CLEAR_HALT(r1, 0x80045515, 0x0) ioctl$USBDEVFS_FREE_STREAMS(r1, 0x8008551d, &(0x7f0000000180)={0x53ba, 0x1a, [{0x7}, {0x5}, {0xb, 0x1}, {0x5}, {0x8, 0x1}, {0x7}, {0xe, 0x1}, {0xb}, {0x5, 0x1}, {0xf}, {0x3, 0x1}, {0x3}, {0x3}, {0x5}, {0xd, 0x1}, {0xb}, {0xc}, {0xa}, {0x0, 0x1}, {0xb}, {0x9}, {0x5}, {0xb}, {0xa, 0x1}, {0x2}, {0xd}]}) r2 = syz_open_dev$usbfs(&(0x7f0000000380), 0x6e665f53, 0x0) ioctl$USBDEVFS_CLEAR_HALT(r2, 0x80045515, 0x0) r3 = syz_open_dev$usbfs(&(0x7f0000000380), 0x6e665f53, 0x0) ioctl$USBDEVFS_CLEAR_HALT(r3, 0x80045515, 0x0) ioctl$USBDEVFS_CLAIM_PORT(r3, 0x80045518, &(0x7f0000000240)=0x7) r4 = syz_open_dev$usbfs(&(0x7f0000000280), 0x2, 0x400) mmap$usbfs(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x2000002, 0x100010, r4, 0x8) ioctl$USBDEVFS_DISCONNECT_CLAIM(r2, 0x8108551b, &(0x7f0000000040)={0x7, 0x0, "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"}) ioctl$USBDEVFS_ALLOC_STREAMS(r0, 0x8008551c, &(0x7f00000001c0)=ANY=[@ANYBLOB="7734003c997894fcfcec81fcffc53b0015000000038f04"]) 06:55:27 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) r1 = accept$inet(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000080)=0x10) getsockopt$inet_mreqsrc(r1, 0x0, 0x25, &(0x7f00000000c0)={@broadcast, @multicast1, @multicast2}, &(0x7f0000000100)=0xc) ioctl$USBDEVFS_SUBMITURB(r0, 0x8008551c, &(0x7f0000000200)=@urb_type_bulk={0x3, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f0000000300)=@urb_type_iso={0x0, {0x4, 0x1}, 0x25c5, 0x40, &(0x7f0000000140)="1493504102335fd876b31f6ba206b591e33049f0caad85250d687963451205d1db731a06b2e23cdf859b904cfb1d971530d91fc5d45252aa8595155cc584f4dc71c4b6fad56c0d93aebaf394f52e3180111cd005aa47e6ded4a9b8908fbd48edc4231d58315dcabda5669870a51285b5a4d6f731958a8d75f196a13a90066ccfb57d73941d7ae0c54033e2484c1964def3e19b547d8dc79984ff2ca40cf17e4909f98046eec873", 0xa7, 0x81, 0x40, 0x14, 0x5, 0x79, &(0x7f0000000240)="be7e5d1d8ff5dd95f8022f859ab105d2414d886270532ea9bfd45661838fe6ace0114144c18036eca405ac3d68351eccebdef9524fc3990c93de4e3dd0df03e4d84c7efa76f3d21b6e9e03ed096f71b7a027ad034b1a2abd2f14d894e599142457ec7641ec071ff90b80fff7bb1bb27313525d361f26ddadbee7d7ec3cb2e12c456e3d2ad004d694251082fb5586b43e4f3b95b822ccbfbdf294", [{0x10d8, 0x4, 0x7}, {0x8, 0x468, 0x7}, {0x800, 0x401, 0x1}, {0xffffffff, 0x0, 0x7f}, {0x9, 0x1, 0x401}, {0x6, 0x5, 0x1}, {0x3, 0x0, 0xe0d}, {0x127049c4, 0x9, 0x40}, {0x7, 0x7f, 0x100}, {0x101, 0x6}, {0x3, 0x9da, 0x7fff}, {0x4, 0x80, 0x3f}, {0x4, 0x1000, 0x771}, {0x20, 0x80, 0xff}, {0xffff, 0x80, 0x1f}, {0xf46f, 0x8}, {0x80000000, 0xfdd2, 0xfffffff8}, {0x4, 0xfffffff9, 0x7fff}, {0x0, 0x42910bd1, 0x104}, {0x6, 0xf6, 0xaf28ba5d}]}) syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) (async) accept$inet(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000080)=0x10) (async) getsockopt$inet_mreqsrc(r1, 0x0, 0x25, &(0x7f00000000c0)={@broadcast, @multicast1, @multicast2}, &(0x7f0000000100)=0xc) (async) ioctl$USBDEVFS_SUBMITURB(r0, 0x8008551c, &(0x7f0000000200)=@urb_type_bulk={0x3, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) (async) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f0000000300)=@urb_type_iso={0x0, {0x4, 0x1}, 0x25c5, 0x40, &(0x7f0000000140)="1493504102335fd876b31f6ba206b591e33049f0caad85250d687963451205d1db731a06b2e23cdf859b904cfb1d971530d91fc5d45252aa8595155cc584f4dc71c4b6fad56c0d93aebaf394f52e3180111cd005aa47e6ded4a9b8908fbd48edc4231d58315dcabda5669870a51285b5a4d6f731958a8d75f196a13a90066ccfb57d73941d7ae0c54033e2484c1964def3e19b547d8dc79984ff2ca40cf17e4909f98046eec873", 0xa7, 0x81, 0x40, 0x14, 0x5, 0x79, &(0x7f0000000240)="be7e5d1d8ff5dd95f8022f859ab105d2414d886270532ea9bfd45661838fe6ace0114144c18036eca405ac3d68351eccebdef9524fc3990c93de4e3dd0df03e4d84c7efa76f3d21b6e9e03ed096f71b7a027ad034b1a2abd2f14d894e599142457ec7641ec071ff90b80fff7bb1bb27313525d361f26ddadbee7d7ec3cb2e12c456e3d2ad004d694251082fb5586b43e4f3b95b822ccbfbdf294", [{0x10d8, 0x4, 0x7}, {0x8, 0x468, 0x7}, {0x800, 0x401, 0x1}, {0xffffffff, 0x0, 0x7f}, {0x9, 0x1, 0x401}, {0x6, 0x5, 0x1}, {0x3, 0x0, 0xe0d}, {0x127049c4, 0x9, 0x40}, {0x7, 0x7f, 0x100}, {0x101, 0x6}, {0x3, 0x9da, 0x7fff}, {0x4, 0x80, 0x3f}, {0x4, 0x1000, 0x771}, {0x20, 0x80, 0xff}, {0xffff, 0x80, 0x1f}, {0xf46f, 0x8}, {0x80000000, 0xfdd2, 0xfffffff8}, {0x4, 0xfffffff9, 0x7fff}, {0x0, 0x42910bd1, 0x104}, {0x6, 0xf6, 0xaf28ba5d}]}) (async) 06:55:27 executing program 0: syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(0xffffffffffffffff, 0x8038550a, &(0x7f0000000200)=@urb_type_control={0x2, {0x2}, 0xfffffffb, 0x4, &(0x7f0000000a40)={0x80, 0x16, 0x2005, 0x7, 0x8}, 0x8, 0xf8, 0x7, 0x0, 0x0, 0x5, &(0x7f0000000a80)="cfc206af3b20cc76f92c2426377a243c9d8d6008fafd2fd67138c6b064102eec84099eccfeb5a4b8a5f3f11f2b3a7efc7bb159fd9e2cfe9dfc7021a27eef2f1b8a14ae37ef3f5850a71385fa82e17ca63c6617a30e1bc3576e8ee08aac39ab0a21c7d06379bcc8bd197b3c4706285c7606cc6c43a9f9a4485fa40997c39a4da54d472ef5eb63dbcb91c23e669d6e8836e2269a1d466533236ed3bd"}) 06:55:27 executing program 1: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x802c550a, &(0x7f0000000200)=@urb_type_bulk={0x3, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r1 = syz_open_dev$usbfs(&(0x7f0000000380), 0x6e665f53, 0x0) ioctl$USBDEVFS_CLEAR_HALT(r1, 0x80045515, 0x0) ioctl$USBDEVFS_FREE_STREAMS(r1, 0x8008551d, &(0x7f0000000180)={0x53ba, 0x1a, [{0x7}, {0x5}, {0xb, 0x1}, {0x5}, {0x8, 0x1}, {0x7}, {0xe, 0x1}, {0xb}, {0x5, 0x1}, {0xf}, {0x3, 0x1}, {0x3}, {0x3}, {0x5}, {0xd, 0x1}, {0xb}, {0xc}, {0xa}, {0x0, 0x1}, {0xb}, {0x9}, {0x5}, {0xb}, {0xa, 0x1}, {0x2}, {0xd}]}) r2 = syz_open_dev$usbfs(&(0x7f0000000380), 0x6e665f53, 0x0) ioctl$USBDEVFS_CLEAR_HALT(r2, 0x80045515, 0x0) r3 = syz_open_dev$usbfs(&(0x7f0000000380), 0x6e665f53, 0x0) ioctl$USBDEVFS_CLEAR_HALT(r3, 0x80045515, 0x0) ioctl$USBDEVFS_CLAIM_PORT(r3, 0x80045518, &(0x7f0000000240)=0x7) r4 = syz_open_dev$usbfs(&(0x7f0000000280), 0x2, 0x400) mmap$usbfs(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x2000002, 0x100010, r4, 0x8) ioctl$USBDEVFS_DISCONNECT_CLAIM(r2, 0x8108551b, &(0x7f0000000040)={0x7, 0x0, "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"}) ioctl$USBDEVFS_ALLOC_STREAMS(r0, 0x8008551c, &(0x7f00000001c0)=ANY=[@ANYBLOB="7734003c997894fcfcec81fcffc53b0015000000038f04"]) syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) (async) ioctl$USBDEVFS_SUBMITURB(r0, 0x802c550a, &(0x7f0000000200)=@urb_type_bulk={0x3, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) (async) syz_open_dev$usbfs(&(0x7f0000000380), 0x6e665f53, 0x0) (async) ioctl$USBDEVFS_CLEAR_HALT(r1, 0x80045515, 0x0) (async) ioctl$USBDEVFS_FREE_STREAMS(r1, 0x8008551d, &(0x7f0000000180)={0x53ba, 0x1a, [{0x7}, {0x5}, {0xb, 0x1}, {0x5}, {0x8, 0x1}, {0x7}, {0xe, 0x1}, {0xb}, {0x5, 0x1}, {0xf}, {0x3, 0x1}, {0x3}, {0x3}, {0x5}, {0xd, 0x1}, {0xb}, {0xc}, {0xa}, {0x0, 0x1}, {0xb}, {0x9}, {0x5}, {0xb}, {0xa, 0x1}, {0x2}, {0xd}]}) (async) syz_open_dev$usbfs(&(0x7f0000000380), 0x6e665f53, 0x0) (async) ioctl$USBDEVFS_CLEAR_HALT(r2, 0x80045515, 0x0) (async) syz_open_dev$usbfs(&(0x7f0000000380), 0x6e665f53, 0x0) (async) ioctl$USBDEVFS_CLEAR_HALT(r3, 0x80045515, 0x0) (async) ioctl$USBDEVFS_CLAIM_PORT(r3, 0x80045518, &(0x7f0000000240)=0x7) (async) syz_open_dev$usbfs(&(0x7f0000000280), 0x2, 0x400) (async) mmap$usbfs(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x2000002, 0x100010, r4, 0x8) (async) ioctl$USBDEVFS_DISCONNECT_CLAIM(r2, 0x8108551b, &(0x7f0000000040)={0x7, 0x0, "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"}) (async) ioctl$USBDEVFS_ALLOC_STREAMS(r0, 0x8008551c, &(0x7f00000001c0)=ANY=[@ANYBLOB="7734003c997894fcfcec81fcffc53b0015000000038f04"]) (async) 06:55:27 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x5514, &(0x7f0000000200)=@urb_type_bulk={0x2, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) [ 2895.099963][T12202] blk-mq: reduced tag depth (128 -> 64) 06:55:27 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x802c550a, &(0x7f0000000140)=@urb_type_iso={0x0, {}, 0x0, 0x0, &(0x7f0000000080), 0x0, 0x0, 0x0, 0x3d, 0x0, 0x0, 0x0, [{0x8, 0x5, 0x100}, {0x40, 0x5, 0x3}, {0x8000, 0x5, 0x1}, {0x8, 0x2, 0x7f}, {0x9, 0x0, 0x4d}, {0x9, 0x8b88, 0x1}, {0x81, 0x5, 0x3ff}, {0xffffffff, 0xfffffff7, 0x5}, {0x7fffffff, 0x417, 0x40}, {0x401, 0x1, 0x950}, {0x6, 0xfff, 0x4}, {0x0, 0x8, 0x8}, {0xcd6fcee5, 0x4, 0xffffffff}, {0x7, 0x9, 0x9}, {0x3230fea4, 0x1ff, 0x401}, {0xf3d, 0xad, 0x2}, {0x7, 0x5, 0x8}, {0x800, 0xfffffffd, 0xff}, {0x5, 0x3, 0x7}, {0x7fffffff, 0x101, 0x1ff}, {0x11bb7e2, 0xe52}, {0x1, 0xffffffff, 0x7}, {0x3, 0x0, 0x4}, {0x1f, 0x80, 0x6}, {0x80, 0x9a, 0x1}, {0x3, 0xffff, 0xffff}, {0x81, 0x3, 0x8}, {0x0, 0x8, 0x400}, {0xfffffe01, 0x100, 0xf55}, {0x10001, 0xff, 0x7}, {0x2, 0x80000001, 0x7}, {0x4, 0xc708, 0x3ff}, {0x1, 0x7, 0x3}, {0x339, 0x8, 0x2}, {0x101, 0xffffffff, 0x10001}, {0x3, 0xff, 0x3}, {0x6b, 0xb0f, 0x5}, {0x7ff, 0x9, 0x7de5}, {0x80000001, 0x7f, 0x2}, {0x8, 0x6}, {0x3, 0x8001, 0x3ff}, {0x4, 0x5, 0x5d}, {0x75d23712, 0x8, 0x6}, {0x8, 0xde, 0x42e}, {0xea09, 0x81}, {0x9, 0x2, 0x3}, {0x2e47, 0x8, 0x81}, {0x3, 0x6, 0x7ff}, {0x7, 0x8, 0xfffff979}, {0x1f, 0x8, 0x1f}, {0x200, 0x7, 0x3}, {0x6897bc41, 0x7, 0x3}, {0x9, 0x80000000, 0x9}, {0x1ff, 0x1f, 0xffff}, {0x54, 0x9, 0x81}, {0xffffffff, 0x9cea, 0x3}, {0x7f, 0x7f, 0x3}, {0x800, 0x9, 0x6}, {0x5, 0xc46, 0x8000}, {0x0, 0x3, 0x8}, {0x2, 0x3}]}) 06:55:27 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) accept$inet(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000080)=0x10) (async) r1 = accept$inet(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000080)=0x10) getsockopt$inet_mreqsrc(r1, 0x0, 0x25, &(0x7f00000000c0)={@broadcast, @multicast1, @multicast2}, &(0x7f0000000100)=0xc) ioctl$USBDEVFS_SUBMITURB(r0, 0x8008551c, &(0x7f0000000200)=@urb_type_bulk={0x3, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f0000000300)=@urb_type_iso={0x0, {0x4, 0x1}, 0x25c5, 0x40, &(0x7f0000000140)="1493504102335fd876b31f6ba206b591e33049f0caad85250d687963451205d1db731a06b2e23cdf859b904cfb1d971530d91fc5d45252aa8595155cc584f4dc71c4b6fad56c0d93aebaf394f52e3180111cd005aa47e6ded4a9b8908fbd48edc4231d58315dcabda5669870a51285b5a4d6f731958a8d75f196a13a90066ccfb57d73941d7ae0c54033e2484c1964def3e19b547d8dc79984ff2ca40cf17e4909f98046eec873", 0xa7, 0x81, 0x40, 0x14, 0x5, 0x79, &(0x7f0000000240)="be7e5d1d8ff5dd95f8022f859ab105d2414d886270532ea9bfd45661838fe6ace0114144c18036eca405ac3d68351eccebdef9524fc3990c93de4e3dd0df03e4d84c7efa76f3d21b6e9e03ed096f71b7a027ad034b1a2abd2f14d894e599142457ec7641ec071ff90b80fff7bb1bb27313525d361f26ddadbee7d7ec3cb2e12c456e3d2ad004d694251082fb5586b43e4f3b95b822ccbfbdf294", [{0x10d8, 0x4, 0x7}, {0x8, 0x468, 0x7}, {0x800, 0x401, 0x1}, {0xffffffff, 0x0, 0x7f}, {0x9, 0x1, 0x401}, {0x6, 0x5, 0x1}, {0x3, 0x0, 0xe0d}, {0x127049c4, 0x9, 0x40}, {0x7, 0x7f, 0x100}, {0x101, 0x6}, {0x3, 0x9da, 0x7fff}, {0x4, 0x80, 0x3f}, {0x4, 0x1000, 0x771}, {0x20, 0x80, 0xff}, {0xffff, 0x80, 0x1f}, {0xf46f, 0x8}, {0x80000000, 0xfdd2, 0xfffffff8}, {0x4, 0xfffffff9, 0x7fff}, {0x0, 0x42910bd1, 0x104}, {0x6, 0xf6, 0xaf28ba5d}]}) 06:55:27 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x551f, &(0x7f0000000200)=@urb_type_bulk={0x2, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) [ 2895.182688][T12228] FAULT_INJECTION: forcing a failure. [ 2895.182688][T12228] name failslab, interval 1, probability 0, space 0, times 0 [ 2895.196029][T12228] CPU: 1 PID: 12228 Comm: syz-executor.4 Not tainted 5.4.233-syzkaller-00019-gd5ed2ca98e48 #0 [ 2895.206332][T12228] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/14/2023 [ 2895.216363][T12228] Call Trace: [ 2895.219630][T12228] dump_stack+0x1d8/0x241 [ 2895.224039][T12228] ? panic+0x768/0x768 [ 2895.228084][T12228] ? nf_ct_l4proto_log_invalid+0x258/0x258 [ 2895.233867][T12228] should_fail+0x71f/0x880 [ 2895.238269][T12228] ? sbitmap_queue_init_node+0x64b/0xf10 [ 2895.243867][T12228] ? setup_fault_attr+0x3d0/0x3d0 [ 2895.248857][T12228] ? sbitmap_queue_init_node+0xaf6/0xf10 [ 2895.254460][T12228] ? blk_mq_alloc_rq_map+0xb5/0x1a0 [ 2895.259645][T12228] should_failslab+0x5/0x20 [ 2895.264134][T12228] __kmalloc+0x51/0x2b0 [ 2895.268259][T12228] blk_mq_alloc_rq_map+0xb5/0x1a0 [ 2895.273266][T12228] __blk_mq_alloc_rq_map+0x70/0x2a0 [ 2895.278447][T12228] ? find_first_bit+0x5b/0xf0 [ 2895.283101][T12228] blk_mq_alloc_rq_maps+0xac/0x410 [ 2895.288188][T12228] blk_mq_alloc_tag_set+0x50e/0x890 [ 2895.293359][T12228] loop_add+0x231/0x740 [ 2895.297503][T12228] ? get_pid_task+0xc3/0xf0 [ 2895.301975][T12228] ? radix_tree_lookup+0x16f/0x1c0 [ 2895.307055][T12228] loop_control_ioctl+0x448/0x620 [ 2895.312048][T12228] ? loop_remove+0xa0/0xa0 [ 2895.316432][T12228] ? memset+0x1f/0x40 [ 2895.320387][T12228] ? fsnotify+0x1280/0x1340 [ 2895.324857][T12228] ? loop_remove+0xa0/0xa0 06:55:28 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) (fail_nth: 9) 06:55:28 executing program 1: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x802c550a, &(0x7f0000000200)=@urb_type_bulk={0x3, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r1 = syz_open_dev$usbfs(&(0x7f0000000380), 0x6e665f53, 0x0) ioctl$USBDEVFS_CLEAR_HALT(r1, 0x80045515, 0x0) (async) ioctl$USBDEVFS_FREE_STREAMS(r1, 0x8008551d, &(0x7f0000000180)={0x53ba, 0x1a, [{0x7}, {0x5}, {0xb, 0x1}, {0x5}, {0x8, 0x1}, {0x7}, {0xe, 0x1}, {0xb}, {0x5, 0x1}, {0xf}, {0x3, 0x1}, {0x3}, {0x3}, {0x5}, {0xd, 0x1}, {0xb}, {0xc}, {0xa}, {0x0, 0x1}, {0xb}, {0x9}, {0x5}, {0xb}, {0xa, 0x1}, {0x2}, {0xd}]}) (async) r2 = syz_open_dev$usbfs(&(0x7f0000000380), 0x6e665f53, 0x0) ioctl$USBDEVFS_CLEAR_HALT(r2, 0x80045515, 0x0) r3 = syz_open_dev$usbfs(&(0x7f0000000380), 0x6e665f53, 0x0) ioctl$USBDEVFS_CLEAR_HALT(r3, 0x80045515, 0x0) (async) ioctl$USBDEVFS_CLAIM_PORT(r3, 0x80045518, &(0x7f0000000240)=0x7) r4 = syz_open_dev$usbfs(&(0x7f0000000280), 0x2, 0x400) mmap$usbfs(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x2000002, 0x100010, r4, 0x8) (async) ioctl$USBDEVFS_DISCONNECT_CLAIM(r2, 0x8108551b, &(0x7f0000000040)={0x7, 0x0, "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"}) ioctl$USBDEVFS_ALLOC_STREAMS(r0, 0x8008551c, &(0x7f00000001c0)=ANY=[@ANYBLOB="7734003c997894fcfcec81fcffc53b0015000000038f04"]) 06:55:28 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x5521, &(0x7f0000000200)=@urb_type_bulk={0x2, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 06:55:28 executing program 0: syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(0xffffffffffffffff, 0x8038550a, &(0x7f0000000200)=@urb_type_control={0x2, {0x2}, 0xfffffffb, 0x4, &(0x7f0000000a40)={0x80, 0x16, 0x2005, 0x7, 0x8}, 0x8, 0xf8, 0x7, 0x0, 0x0, 0x5, &(0x7f0000000a80)="cfc206af3b20cc76f92c2426377a243c9d8d6008fafd2fd67138c6b064102eec84099eccfeb5a4b8a5f3f11f2b3a7efc7bb159fd9e2cfe9dfc7021a27eef2f1b8a14ae37ef3f5850a71385fa82e17ca63c6617a30e1bc3576e8ee08aac39ab0a21c7d06379bcc8bd197b3c4706285c7606cc6c43a9f9a4485fa40997c39a4da54d472ef5eb63dbcb91c23e669d6e8836e2269a1d466533236ed3bd"}) 06:55:28 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x802c550a, &(0x7f0000000140)=@urb_type_iso={0x0, {}, 0x0, 0x0, &(0x7f0000000080), 0x0, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, [{0x8, 0x5, 0x100}, {0x40, 0x5, 0x3}, {0x8000, 0x5, 0x1}, {0x8, 0x2, 0x7f}, {0x9, 0x0, 0x4d}, {0x9, 0x8b88, 0x1}, {0x81, 0x5, 0x3ff}, {0xffffffff, 0xfffffff7, 0x5}, {0x7fffffff, 0x417, 0x40}, {0x401, 0x1, 0x950}, {0x6, 0xfff, 0x4}, {0x0, 0x8, 0x8}, {0xcd6fcee5, 0x4, 0xffffffff}, {0x7, 0x9, 0x9}, {0x3230fea4, 0x1ff, 0x401}, {0xf3d, 0xad, 0x2}, {0x7, 0x5, 0x8}, {0x800, 0xfffffffd, 0xff}, {0x5, 0x3, 0x7}, {0x7fffffff, 0x101, 0x1ff}, {0x11bb7e2, 0xe52}, {0x1, 0xffffffff, 0x7}, {0x3, 0x0, 0x4}, {0x1f, 0x80, 0x6}, {0x80, 0x9a, 0x1}, {0x3, 0xffff, 0xffff}, {0x81, 0x3, 0x8}, {0x0, 0x8, 0x400}, {0xfffffe01, 0x100, 0xf55}, {0x10001, 0xff, 0x7}, {0x2, 0x80000001, 0x7}, {0x4, 0xc708, 0x3ff}, {0x1, 0x7, 0x3}, {0x339, 0x8, 0x2}, {0x101, 0xffffffff, 0x10001}, {0x3, 0xff, 0x3}, {0x6b, 0xb0f, 0x5}, {0x7ff, 0x9, 0x7de5}, {0x80000001, 0x7f, 0x2}, {0x8, 0x6}, {0x3, 0x8001, 0x3ff}, {0x4, 0x5, 0x5d}, {0x75d23712, 0x8, 0x6}, {0x8, 0xde, 0x42e}, {0xea09, 0x81}, {0x9, 0x2, 0x3}, {0x2e47, 0x8, 0x81}, {0x3, 0x6, 0x7ff}, {0x7, 0x8, 0xfffff979}, {0x1f, 0x8, 0x1f}, {0x200, 0x7, 0x3}, {0x6897bc41, 0x7, 0x3}, {0x9, 0x80000000, 0x9}, {0x1ff, 0x1f, 0xffff}, {0x54, 0x9, 0x81}, {0xffffffff, 0x9cea, 0x3}, {0x7f, 0x7f, 0x3}, {0x800, 0x9, 0x6}, {0x5, 0xc46, 0x8000}, {0x0, 0x3, 0x8}]}) 06:55:28 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040)=@security={'security\x00', 0xe, 0x4, 0x260, 0xffffffff, 0x180, 0xc0, 0xc0, 0xffffffff, 0xffffffff, 0x288, 0x288, 0x288, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x70, 0x98}, @common=@inet=@SET1={0x28}}, {{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@STANDARD={0x28}}, {{@ip={@rand_addr, @broadcast, 0x0, 0x0, 'batadv_slave_0\x00', 'ip_vti0\x00'}, 0x0, 0x70, 0x98}, @common=@unspec=@NFQUEUE0={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x2c0) ioctl$USBDEVFS_RESETEP(r0, 0x80045503, &(0x7f0000000080)) (fail_nth: 1) 06:55:28 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x802c550a, &(0x7f0000000140)=@urb_type_iso={0x0, {}, 0x0, 0x0, &(0x7f0000000080), 0x0, 0x0, 0x0, 0x3b, 0x0, 0x0, 0x0, [{0x8, 0x5, 0x100}, {0x40, 0x5, 0x3}, {0x8000, 0x5, 0x1}, {0x8, 0x2, 0x7f}, {0x9, 0x0, 0x4d}, {0x9, 0x8b88, 0x1}, {0x81, 0x5, 0x3ff}, {0xffffffff, 0xfffffff7, 0x5}, {0x7fffffff, 0x417, 0x40}, {0x401, 0x1, 0x950}, {0x6, 0xfff, 0x4}, {0x0, 0x8, 0x8}, {0xcd6fcee5, 0x4, 0xffffffff}, {0x7, 0x9, 0x9}, {0x3230fea4, 0x1ff, 0x401}, {0xf3d, 0xad, 0x2}, {0x7, 0x5, 0x8}, {0x800, 0xfffffffd, 0xff}, {0x5, 0x3, 0x7}, {0x7fffffff, 0x101, 0x1ff}, {0x11bb7e2, 0xe52}, {0x1, 0xffffffff, 0x7}, {0x3, 0x0, 0x4}, {0x1f, 0x80, 0x6}, {0x80, 0x9a, 0x1}, {0x3, 0xffff, 0xffff}, {0x81, 0x3, 0x8}, {0x0, 0x8, 0x400}, {0xfffffe01, 0x100, 0xf55}, {0x10001, 0xff, 0x7}, {0x2, 0x80000001, 0x7}, {0x4, 0xc708, 0x3ff}, {0x1, 0x7, 0x3}, {0x339, 0x8, 0x2}, {0x101, 0xffffffff, 0x10001}, {0x3, 0xff, 0x3}, {0x6b, 0xb0f, 0x5}, {0x7ff, 0x9, 0x7de5}, {0x80000001, 0x7f, 0x2}, {0x8, 0x6}, {0x3, 0x8001, 0x3ff}, {0x4, 0x5, 0x5d}, {0x75d23712, 0x8, 0x6}, {0x8, 0xde, 0x42e}, {0xea09, 0x81}, {0x9, 0x2, 0x3}, {0x2e47, 0x8, 0x81}, {0x3, 0x6, 0x7ff}, {0x7, 0x8, 0xfffff979}, {0x1f, 0x8, 0x1f}, {0x200, 0x7, 0x3}, {0x6897bc41, 0x7, 0x3}, {0x9, 0x80000000, 0x9}, {0x1ff, 0x1f, 0xffff}, {0x54, 0x9, 0x81}, {0xffffffff, 0x9cea, 0x3}, {0x7f, 0x7f, 0x3}, {0x800, 0x9, 0x6}, {0x5, 0xc46, 0x8000}]}) 06:55:28 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x5522, &(0x7f0000000200)=@urb_type_bulk={0x2, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) [ 2895.329242][T12228] do_vfs_ioctl+0x742/0x1720 [ 2895.333803][T12228] ? ioctl_preallocate+0x250/0x250 [ 2895.338885][T12228] ? __fget+0x407/0x490 [ 2895.343007][T12228] ? fget_many+0x20/0x20 [ 2895.347217][T12228] ? debug_smp_processor_id+0x20/0x20 [ 2895.352559][T12228] ? security_file_ioctl+0x7d/0xa0 [ 2895.357636][T12228] __x64_sys_ioctl+0xd4/0x110 [ 2895.362282][T12228] do_syscall_64+0xca/0x1c0 [ 2895.366757][T12228] entry_SYSCALL_64_after_hwframe+0x5c/0xc1 [ 2895.373020][T12228] blk-mq: reduced tag depth (128 -> 64) 06:55:28 executing program 0: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, 0x0) 06:55:28 executing program 1: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x802c550a, &(0x7f0000000200)=@urb_type_bulk={0x3, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaef, 0x0, 0x0}) ioctl$USBDEVFS_SETCONFIGURATION(r0, 0x80045505, &(0x7f0000000080)=0x1) ioctl$USBDEVFS_CLAIM_PORT(0xffffffffffffffff, 0x80045518, &(0x7f0000000040)) 06:55:28 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040)=@security={'security\x00', 0xe, 0x4, 0x260, 0xffffffff, 0x180, 0xc0, 0xc0, 0xffffffff, 0xffffffff, 0x288, 0x288, 0x288, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x70, 0x98}, @common=@inet=@SET1={0x28}}, {{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@STANDARD={0x28}}, {{@ip={@rand_addr, @broadcast, 0x0, 0x0, 'batadv_slave_0\x00', 'ip_vti0\x00'}, 0x0, 0x70, 0x98}, @common=@unspec=@NFQUEUE0={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x2c0) ioctl$USBDEVFS_RESETEP(r0, 0x80045503, &(0x7f0000000080)) 06:55:28 executing program 0: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, 0x0) [ 2895.427400][T12279] hub 8-0:1.0: USB hub found [ 2895.433864][T12279] hub 8-0:1.0: 1 port detected [ 2895.442054][T12269] FAULT_INJECTION: forcing a failure. [ 2895.442054][T12269] name failslab, interval 1, probability 0, space 0, times 0 [ 2895.458034][T12269] CPU: 1 PID: 12269 Comm: syz-executor.4 Not tainted 5.4.233-syzkaller-00019-gd5ed2ca98e48 #0 [ 2895.468271][T12269] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/14/2023 [ 2895.478313][T12269] Call Trace: [ 2895.481582][T12269] dump_stack+0x1d8/0x241 [ 2895.485882][T12269] ? panic+0x768/0x768 [ 2895.489925][T12269] ? nf_ct_l4proto_log_invalid+0x258/0x258 [ 2895.495706][T12269] should_fail+0x71f/0x880 [ 2895.500096][T12269] ? setup_fault_attr+0x3d0/0x3d0 [ 2895.505093][T12269] ? blk_mq_alloc_rq_map+0xeb/0x1a0 [ 2895.510265][T12269] should_failslab+0x5/0x20 [ 2895.514739][T12269] __kmalloc+0x51/0x2b0 [ 2895.518865][T12269] blk_mq_alloc_rq_map+0xeb/0x1a0 [ 2895.523862][T12269] __blk_mq_alloc_rq_map+0x70/0x2a0 [ 2895.529030][T12269] ? find_first_bit+0x5b/0xf0 [ 2895.533677][T12269] blk_mq_alloc_rq_maps+0xac/0x410 [ 2895.538776][T12269] blk_mq_alloc_tag_set+0x50e/0x890 [ 2895.543945][T12269] loop_add+0x231/0x740 [ 2895.548069][T12269] ? get_pid_task+0xc3/0xf0 [ 2895.552542][T12269] ? radix_tree_lookup+0x16f/0x1c0 [ 2895.557623][T12269] loop_control_ioctl+0x448/0x620 [ 2895.562618][T12269] ? loop_remove+0xa0/0xa0 [ 2895.567005][T12269] ? memset+0x1f/0x40 [ 2895.570963][T12269] ? fsnotify+0x1280/0x1340 [ 2895.575451][T12269] ? loop_remove+0xa0/0xa0 [ 2895.579853][T12269] do_vfs_ioctl+0x742/0x1720 [ 2895.584434][T12269] ? ioctl_preallocate+0x250/0x250 [ 2895.589514][T12269] ? __fget+0x407/0x490 [ 2895.593642][T12269] ? fget_many+0x20/0x20 [ 2895.597855][T12269] ? debug_smp_processor_id+0x20/0x20 [ 2895.603195][T12269] ? security_file_ioctl+0x7d/0xa0 [ 2895.608271][T12269] __x64_sys_ioctl+0xd4/0x110 [ 2895.612918][T12269] do_syscall_64+0xca/0x1c0 [ 2895.617393][T12269] entry_SYSCALL_64_after_hwframe+0x5c/0xc1 06:55:28 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) (fail_nth: 10) 06:55:28 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x5523, &(0x7f0000000200)=@urb_type_bulk={0x2, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 06:55:28 executing program 1: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x802c550a, &(0x7f0000000200)=@urb_type_bulk={0x3, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaef, 0x0, 0x0}) ioctl$USBDEVFS_SETCONFIGURATION(r0, 0x80045505, &(0x7f0000000080)=0x1) (async) ioctl$USBDEVFS_CLAIM_PORT(0xffffffffffffffff, 0x80045518, &(0x7f0000000040)) 06:55:28 executing program 0: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, 0x0) 06:55:28 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x802c550a, &(0x7f0000000140)=@urb_type_iso={0x0, {}, 0x0, 0x0, &(0x7f0000000080), 0x0, 0x0, 0x0, 0x3a, 0x0, 0x0, 0x0, [{0x8, 0x5, 0x100}, {0x40, 0x5, 0x3}, {0x8000, 0x5, 0x1}, {0x8, 0x2, 0x7f}, {0x9, 0x0, 0x4d}, {0x9, 0x8b88, 0x1}, {0x81, 0x5, 0x3ff}, {0xffffffff, 0xfffffff7, 0x5}, {0x7fffffff, 0x417, 0x40}, {0x401, 0x1, 0x950}, {0x6, 0xfff, 0x4}, {0x0, 0x8, 0x8}, {0xcd6fcee5, 0x4, 0xffffffff}, {0x7, 0x9, 0x9}, {0x3230fea4, 0x1ff, 0x401}, {0xf3d, 0xad, 0x2}, {0x7, 0x5, 0x8}, {0x800, 0xfffffffd, 0xff}, {0x5, 0x3, 0x7}, {0x7fffffff, 0x101, 0x1ff}, {0x11bb7e2, 0xe52}, {0x1, 0xffffffff, 0x7}, {0x3, 0x0, 0x4}, {0x1f, 0x80, 0x6}, {0x80, 0x9a, 0x1}, {0x3, 0xffff, 0xffff}, {0x81, 0x3, 0x8}, {0x0, 0x8, 0x400}, {0xfffffe01, 0x100, 0xf55}, {0x10001, 0xff, 0x7}, {0x2, 0x80000001, 0x7}, {0x4, 0xc708, 0x3ff}, {0x1, 0x7, 0x3}, {0x339, 0x8, 0x2}, {0x101, 0xffffffff, 0x10001}, {0x3, 0xff, 0x3}, {0x6b, 0xb0f, 0x5}, {0x7ff, 0x9, 0x7de5}, {0x80000001, 0x7f, 0x2}, {0x8, 0x6}, {0x3, 0x8001, 0x3ff}, {0x4, 0x5, 0x5d}, {0x75d23712, 0x8, 0x6}, {0x8, 0xde, 0x42e}, {0xea09, 0x81}, {0x9, 0x2, 0x3}, {0x2e47, 0x8, 0x81}, {0x3, 0x6, 0x7ff}, {0x7, 0x8, 0xfffff979}, {0x1f, 0x8, 0x1f}, {0x200, 0x7, 0x3}, {0x6897bc41, 0x7, 0x3}, {0x9, 0x80000000, 0x9}, {0x1ff, 0x1f, 0xffff}, {0x54, 0x9, 0x81}, {0xffffffff, 0x9cea, 0x3}, {0x7f, 0x7f, 0x3}, {0x800, 0x9, 0x6}]}) 06:55:28 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040)=@security={'security\x00', 0xe, 0x4, 0x260, 0xffffffff, 0x180, 0xc0, 0xc0, 0xffffffff, 0xffffffff, 0x288, 0x288, 0x288, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x70, 0x98}, @common=@inet=@SET1={0x28}}, {{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@STANDARD={0x28}}, {{@ip={@rand_addr, @broadcast, 0x0, 0x0, 'batadv_slave_0\x00', 'ip_vti0\x00'}, 0x0, 0x70, 0x98}, @common=@unspec=@NFQUEUE0={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x2c0) ioctl$USBDEVFS_RESETEP(r0, 0x2, &(0x7f0000000080)) 06:55:28 executing program 0: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f0000000200)=@urb_type_control={0x2, {}, 0xfffffffb, 0x4, &(0x7f0000000a40)={0x80, 0x16, 0x2005, 0x7, 0x8}, 0x8, 0xf8, 0x7, 0x0, 0x0, 0x5, &(0x7f0000000a80)="cfc206af3b20cc76f92c2426377a243c9d8d6008fafd2fd67138c6b064102eec84099eccfeb5a4b8a5f3f11f2b3a7efc7bb159fd9e2cfe9dfc7021a27eef2f1b8a14ae37ef3f5850a71385fa82e17ca63c6617a30e1bc3576e8ee08aac39ab0a21c7d06379bcc8bd197b3c4706285c7606cc6c43a9f9a4485fa40997c39a4da54d472ef5eb63dbcb91c23e669d6e8836e2269a1d466533236ed3bd"}) 06:55:28 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040)=@security={'security\x00', 0xe, 0x4, 0x260, 0xffffffff, 0x180, 0xc0, 0xc0, 0xffffffff, 0xffffffff, 0x288, 0x288, 0x288, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x70, 0x98}, @common=@inet=@SET1={0x28}}, {{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@STANDARD={0x28}}, {{@ip={@rand_addr, @broadcast, 0x0, 0x0, 'batadv_slave_0\x00', 'ip_vti0\x00'}, 0x0, 0x70, 0x98}, @common=@unspec=@NFQUEUE0={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x2c0) ioctl$USBDEVFS_RESETEP(r0, 0x4b47, &(0x7f0000000080)) 06:55:28 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x802c550a, &(0x7f0000000140)=@urb_type_iso={0x0, {}, 0x0, 0x0, &(0x7f0000000080), 0x0, 0x0, 0x0, 0x39, 0x0, 0x0, 0x0, [{0x8, 0x5, 0x100}, {0x40, 0x5, 0x3}, {0x8000, 0x5, 0x1}, {0x8, 0x2, 0x7f}, {0x9, 0x0, 0x4d}, {0x9, 0x8b88, 0x1}, {0x81, 0x5, 0x3ff}, {0xffffffff, 0xfffffff7, 0x5}, {0x7fffffff, 0x417, 0x40}, {0x401, 0x1, 0x950}, {0x6, 0xfff, 0x4}, {0x0, 0x8, 0x8}, {0xcd6fcee5, 0x4, 0xffffffff}, {0x7, 0x9, 0x9}, {0x3230fea4, 0x1ff, 0x401}, {0xf3d, 0xad, 0x2}, {0x7, 0x5, 0x8}, {0x800, 0xfffffffd, 0xff}, {0x5, 0x3, 0x7}, {0x7fffffff, 0x101, 0x1ff}, {0x11bb7e2, 0xe52}, {0x1, 0xffffffff, 0x7}, {0x3, 0x0, 0x4}, {0x1f, 0x80, 0x6}, {0x80, 0x9a, 0x1}, {0x3, 0xffff, 0xffff}, {0x81, 0x3, 0x8}, {0x0, 0x8, 0x400}, {0xfffffe01, 0x100, 0xf55}, {0x10001, 0xff, 0x7}, {0x2, 0x80000001, 0x7}, {0x4, 0xc708, 0x3ff}, {0x1, 0x7, 0x3}, {0x339, 0x8, 0x2}, {0x101, 0xffffffff, 0x10001}, {0x3, 0xff, 0x3}, {0x6b, 0xb0f, 0x5}, {0x7ff, 0x9, 0x7de5}, {0x80000001, 0x7f, 0x2}, {0x8, 0x6}, {0x3, 0x8001, 0x3ff}, {0x4, 0x5, 0x5d}, {0x75d23712, 0x8, 0x6}, {0x8, 0xde, 0x42e}, {0xea09, 0x81}, {0x9, 0x2, 0x3}, {0x2e47, 0x8, 0x81}, {0x3, 0x6, 0x7ff}, {0x7, 0x8, 0xfffff979}, {0x1f, 0x8, 0x1f}, {0x200, 0x7, 0x3}, {0x6897bc41, 0x7, 0x3}, {0x9, 0x80000000, 0x9}, {0x1ff, 0x1f, 0xffff}, {0x54, 0x9, 0x81}, {0xffffffff, 0x9cea, 0x3}, {0x7f, 0x7f, 0x3}]}) 06:55:28 executing program 1: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x802c550a, &(0x7f0000000200)=@urb_type_bulk={0x3, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaef, 0x0, 0x0}) (async) ioctl$USBDEVFS_SETCONFIGURATION(r0, 0x80045505, &(0x7f0000000080)=0x1) (async) ioctl$USBDEVFS_CLAIM_PORT(0xffffffffffffffff, 0x80045518, &(0x7f0000000040)) 06:55:28 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x4004550c, &(0x7f0000000200)=@urb_type_bulk={0x2, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 06:55:28 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x802c550a, &(0x7f0000000140)=@urb_type_iso={0x0, {}, 0x0, 0x0, &(0x7f0000000080), 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, [{0x8, 0x5, 0x100}, {0x40, 0x5, 0x3}, {0x8000, 0x5, 0x1}, {0x8, 0x2, 0x7f}, {0x9, 0x0, 0x4d}, {0x9, 0x8b88, 0x1}, {0x81, 0x5, 0x3ff}, {0xffffffff, 0xfffffff7, 0x5}, {0x7fffffff, 0x417, 0x40}, {0x401, 0x1, 0x950}, {0x6, 0xfff, 0x4}, {0x0, 0x8, 0x8}, {0xcd6fcee5, 0x4, 0xffffffff}, {0x7, 0x9, 0x9}, {0x3230fea4, 0x1ff, 0x401}, {0xf3d, 0xad, 0x2}, {0x7, 0x5, 0x8}, {0x800, 0xfffffffd, 0xff}, {0x5, 0x3, 0x7}, {0x7fffffff, 0x101, 0x1ff}, {0x11bb7e2, 0xe52}, {0x1, 0xffffffff, 0x7}, {0x3, 0x0, 0x4}, {0x1f, 0x80, 0x6}, {0x80, 0x9a, 0x1}, {0x3, 0xffff, 0xffff}, {0x81, 0x3, 0x8}, {0x0, 0x8, 0x400}, {0xfffffe01, 0x100, 0xf55}, {0x10001, 0xff, 0x7}, {0x2, 0x80000001, 0x7}, {0x4, 0xc708, 0x3ff}, {0x1, 0x7, 0x3}, {0x339, 0x8, 0x2}, {0x101, 0xffffffff, 0x10001}, {0x3, 0xff, 0x3}, {0x6b, 0xb0f, 0x5}, {0x7ff, 0x9, 0x7de5}, {0x80000001, 0x7f, 0x2}, {0x8, 0x6}, {0x3, 0x8001, 0x3ff}, {0x4, 0x5, 0x5d}, {0x75d23712, 0x8, 0x6}, {0x8, 0xde, 0x42e}, {0xea09, 0x81}, {0x9, 0x2, 0x3}, {0x2e47, 0x8, 0x81}, {0x3, 0x6, 0x7ff}, {0x7, 0x8, 0xfffff979}, {0x1f, 0x8, 0x1f}, {0x200, 0x7, 0x3}, {0x6897bc41, 0x7, 0x3}, {0x9, 0x80000000, 0x9}, {0x1ff, 0x1f, 0xffff}, {0x54, 0x9, 0x81}, {0xffffffff, 0x9cea, 0x3}]}) [ 2895.623444][T12269] blk-mq: reduced tag depth (128 -> 64) [ 2895.648170][T12291] usb usb8: usbfs: interface 0 claimed by hub while 'syz-executor.1' sets config #1 [ 2895.688487][T12308] usb usb8: usbfs: interface 0 claimed by hub while 'syz-executor.1' sets config #1 [ 2895.696295][T12289] FAULT_INJECTION: forcing a failure. [ 2895.696295][T12289] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2895.712803][T12289] CPU: 1 PID: 12289 Comm: syz-executor.4 Not tainted 5.4.233-syzkaller-00019-gd5ed2ca98e48 #0 [ 2895.723045][T12289] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/14/2023 [ 2895.733120][T12289] Call Trace: [ 2895.736419][T12289] dump_stack+0x1d8/0x241 [ 2895.740724][T12289] ? panic+0x768/0x768 [ 2895.744779][T12289] ? stack_trace_save+0x118/0x1c0 [ 2895.749775][T12289] ? nf_ct_l4proto_log_invalid+0x258/0x258 [ 2895.755638][T12289] ? stack_trace_snprint+0x170/0x170 [ 2895.760892][T12289] ? sbitmap_queue_init_node+0x64b/0xf10 [ 2895.766494][T12289] should_fail+0x71f/0x880 [ 2895.770902][T12289] ? setup_fault_attr+0x3d0/0x3d0 [ 2895.775896][T12289] ? __kasan_kmalloc+0x130/0x1d0 [ 2895.780803][T12289] ? blk_mq_alloc_rq_map+0xeb/0x1a0 [ 2895.785993][T12289] ? blk_mq_alloc_rq_maps+0xac/0x410 [ 2895.791247][T12289] ? blk_mq_alloc_tag_set+0x50e/0x890 [ 2895.796589][T12289] __alloc_pages_nodemask+0x1b4/0x840 [ 2895.801953][T12289] ? gfp_pfmemalloc_allowed+0x120/0x120 [ 2895.807493][T12289] ? find_next_bit+0x7b/0x100 [ 2895.812140][T12289] ? blk_mq_hw_queue_to_node+0xe3/0x100 [ 2895.817661][T12289] blk_mq_alloc_rqs+0x230/0x660 [ 2895.822490][T12289] __blk_mq_alloc_rq_map+0x11e/0x2a0 [ 2895.827746][T12289] blk_mq_alloc_rq_maps+0xac/0x410 [ 2895.832828][T12289] blk_mq_alloc_tag_set+0x50e/0x890 [ 2895.838015][T12289] loop_add+0x231/0x740 [ 2895.842147][T12289] ? get_pid_task+0xc3/0xf0 [ 2895.846622][T12289] ? radix_tree_lookup+0x16f/0x1c0 [ 2895.851701][T12289] loop_control_ioctl+0x448/0x620 [ 2895.856694][T12289] ? loop_remove+0xa0/0xa0 [ 2895.861100][T12289] ? memset+0x1f/0x40 [ 2895.865077][T12289] ? fsnotify+0x1280/0x1340 [ 2895.869550][T12289] ? loop_remove+0xa0/0xa0 [ 2895.874020][T12289] do_vfs_ioctl+0x742/0x1720 [ 2895.878595][T12289] ? ioctl_preallocate+0x250/0x250 [ 2895.883679][T12289] ? __fget+0x407/0x490 06:55:28 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) (fail_nth: 11) 06:55:28 executing program 0: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f0000000200)=@urb_type_control={0x2, {}, 0xfffffffb, 0x4, &(0x7f0000000a40)={0x80, 0x16, 0x2005, 0x7, 0x8}, 0x8, 0xf8, 0x7, 0x0, 0x0, 0x5, &(0x7f0000000a80)="cfc206af3b20cc76f92c2426377a243c9d8d6008fafd2fd67138c6b064102eec84099eccfeb5a4b8a5f3f11f2b3a7efc7bb159fd9e2cfe9dfc7021a27eef2f1b8a14ae37ef3f5850a71385fa82e17ca63c6617a30e1bc3576e8ee08aac39ab0a21c7d06379bcc8bd197b3c4706285c7606cc6c43a9f9a4485fa40997c39a4da54d472ef5eb63dbcb91c23e669d6e8836e2269a1d466533236ed3bd"}) 06:55:28 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040)=@security={'security\x00', 0xe, 0x4, 0x260, 0xffffffff, 0x180, 0xc0, 0xc0, 0xffffffff, 0xffffffff, 0x288, 0x288, 0x288, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x70, 0x98}, @common=@inet=@SET1={0x28}}, {{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@STANDARD={0x28}}, {{@ip={@rand_addr, @broadcast, 0x0, 0x0, 'batadv_slave_0\x00', 'ip_vti0\x00'}, 0x0, 0x70, 0x98}, @common=@unspec=@NFQUEUE0={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x2c0) ioctl$USBDEVFS_RESETEP(r0, 0x4b49, &(0x7f0000000080)) 06:55:28 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x802c550a, &(0x7f0000000140)=@urb_type_iso={0x0, {}, 0x0, 0x0, &(0x7f0000000080), 0x0, 0x0, 0x0, 0x37, 0x0, 0x0, 0x0, [{0x8, 0x5, 0x100}, {0x40, 0x5, 0x3}, {0x8000, 0x5, 0x1}, {0x8, 0x2, 0x7f}, {0x9, 0x0, 0x4d}, {0x9, 0x8b88, 0x1}, {0x81, 0x5, 0x3ff}, {0xffffffff, 0xfffffff7, 0x5}, {0x7fffffff, 0x417, 0x40}, {0x401, 0x1, 0x950}, {0x6, 0xfff, 0x4}, {0x0, 0x8, 0x8}, {0xcd6fcee5, 0x4, 0xffffffff}, {0x7, 0x9, 0x9}, {0x3230fea4, 0x1ff, 0x401}, {0xf3d, 0xad, 0x2}, {0x7, 0x5, 0x8}, {0x800, 0xfffffffd, 0xff}, {0x5, 0x3, 0x7}, {0x7fffffff, 0x101, 0x1ff}, {0x11bb7e2, 0xe52}, {0x1, 0xffffffff, 0x7}, {0x3, 0x0, 0x4}, {0x1f, 0x80, 0x6}, {0x80, 0x9a, 0x1}, {0x3, 0xffff, 0xffff}, {0x81, 0x3, 0x8}, {0x0, 0x8, 0x400}, {0xfffffe01, 0x100, 0xf55}, {0x10001, 0xff, 0x7}, {0x2, 0x80000001, 0x7}, {0x4, 0xc708, 0x3ff}, {0x1, 0x7, 0x3}, {0x339, 0x8, 0x2}, {0x101, 0xffffffff, 0x10001}, {0x3, 0xff, 0x3}, {0x6b, 0xb0f, 0x5}, {0x7ff, 0x9, 0x7de5}, {0x80000001, 0x7f, 0x2}, {0x8, 0x6}, {0x3, 0x8001, 0x3ff}, {0x4, 0x5, 0x5d}, {0x75d23712, 0x8, 0x6}, {0x8, 0xde, 0x42e}, {0xea09, 0x81}, {0x9, 0x2, 0x3}, {0x2e47, 0x8, 0x81}, {0x3, 0x6, 0x7ff}, {0x7, 0x8, 0xfffff979}, {0x1f, 0x8, 0x1f}, {0x200, 0x7, 0x3}, {0x6897bc41, 0x7, 0x3}, {0x9, 0x80000000, 0x9}, {0x1ff, 0x1f, 0xffff}, {0x54, 0x9, 0x81}]}) 06:55:28 executing program 1: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x5, 0x422) ioctl$USBDEVFS_GET_CAPABILITIES(r1, 0x8004551a, &(0x7f0000000080)) ioctl$USBDEVFS_SUBMITURB(r0, 0x802c550a, &(0x7f0000000200)=@urb_type_bulk={0x3, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 06:55:28 executing program 0: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f0000000200)=@urb_type_control={0x2, {}, 0xfffffffb, 0x4, &(0x7f0000000a40)={0x80, 0x16, 0x2005, 0x7, 0x8}, 0x8, 0xf8, 0x7, 0x0, 0x0, 0x5, &(0x7f0000000a80)="cfc206af3b20cc76f92c2426377a243c9d8d6008fafd2fd67138c6b064102eec84099eccfeb5a4b8a5f3f11f2b3a7efc7bb159fd9e2cfe9dfc7021a27eef2f1b8a14ae37ef3f5850a71385fa82e17ca63c6617a30e1bc3576e8ee08aac39ab0a21c7d06379bcc8bd197b3c4706285c7606cc6c43a9f9a4485fa40997c39a4da54d472ef5eb63dbcb91c23e669d6e8836e2269a1d466533236ed3bd"}) 06:55:28 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x802c550a, &(0x7f0000000140)=@urb_type_iso={0x0, {}, 0x0, 0x0, &(0x7f0000000080), 0x0, 0x0, 0x0, 0x36, 0x0, 0x0, 0x0, [{0x8, 0x5, 0x100}, {0x40, 0x5, 0x3}, {0x8000, 0x5, 0x1}, {0x8, 0x2, 0x7f}, {0x9, 0x0, 0x4d}, {0x9, 0x8b88, 0x1}, {0x81, 0x5, 0x3ff}, {0xffffffff, 0xfffffff7, 0x5}, {0x7fffffff, 0x417, 0x40}, {0x401, 0x1, 0x950}, {0x6, 0xfff, 0x4}, {0x0, 0x8, 0x8}, {0xcd6fcee5, 0x4, 0xffffffff}, {0x7, 0x9, 0x9}, {0x3230fea4, 0x1ff, 0x401}, {0xf3d, 0xad, 0x2}, {0x7, 0x5, 0x8}, {0x800, 0xfffffffd, 0xff}, {0x5, 0x3, 0x7}, {0x7fffffff, 0x101, 0x1ff}, {0x11bb7e2, 0xe52}, {0x1, 0xffffffff, 0x7}, {0x3, 0x0, 0x4}, {0x1f, 0x80, 0x6}, {0x80, 0x9a, 0x1}, {0x3, 0xffff, 0xffff}, {0x81, 0x3, 0x8}, {0x0, 0x8, 0x400}, {0xfffffe01, 0x100, 0xf55}, {0x10001, 0xff, 0x7}, {0x2, 0x80000001, 0x7}, {0x4, 0xc708, 0x3ff}, {0x1, 0x7, 0x3}, {0x339, 0x8, 0x2}, {0x101, 0xffffffff, 0x10001}, {0x3, 0xff, 0x3}, {0x6b, 0xb0f, 0x5}, {0x7ff, 0x9, 0x7de5}, {0x80000001, 0x7f, 0x2}, {0x8, 0x6}, {0x3, 0x8001, 0x3ff}, {0x4, 0x5, 0x5d}, {0x75d23712, 0x8, 0x6}, {0x8, 0xde, 0x42e}, {0xea09, 0x81}, {0x9, 0x2, 0x3}, {0x2e47, 0x8, 0x81}, {0x3, 0x6, 0x7ff}, {0x7, 0x8, 0xfffff979}, {0x1f, 0x8, 0x1f}, {0x200, 0x7, 0x3}, {0x6897bc41, 0x7, 0x3}, {0x9, 0x80000000, 0x9}, {0x1ff, 0x1f, 0xffff}]}) 06:55:28 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040)=@security={'security\x00', 0xe, 0x4, 0x260, 0xffffffff, 0x180, 0xc0, 0xc0, 0xffffffff, 0xffffffff, 0x288, 0x288, 0x288, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x70, 0x98}, @common=@inet=@SET1={0x28}}, {{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@STANDARD={0x28}}, {{@ip={@rand_addr, @broadcast, 0x0, 0x0, 'batadv_slave_0\x00', 'ip_vti0\x00'}, 0x0, 0x70, 0x98}, @common=@unspec=@NFQUEUE0={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x2c0) ioctl$USBDEVFS_RESETEP(r0, 0x541b, &(0x7f0000000080)) 06:55:28 executing program 0: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f0000000200)=@urb_type_control={0x2, {0x2}, 0x0, 0x4, &(0x7f0000000a40)={0x80, 0x16, 0x2005, 0x7, 0x8}, 0x8, 0xf8, 0x7, 0x0, 0x0, 0x5, &(0x7f0000000a80)="cfc206af3b20cc76f92c2426377a243c9d8d6008fafd2fd67138c6b064102eec84099eccfeb5a4b8a5f3f11f2b3a7efc7bb159fd9e2cfe9dfc7021a27eef2f1b8a14ae37ef3f5850a71385fa82e17ca63c6617a30e1bc3576e8ee08aac39ab0a21c7d06379bcc8bd197b3c4706285c7606cc6c43a9f9a4485fa40997c39a4da54d472ef5eb63dbcb91c23e669d6e8836e2269a1d466533236ed3bd"}) 06:55:28 executing program 1: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x5, 0x422) ioctl$USBDEVFS_GET_CAPABILITIES(r1, 0x8004551a, &(0x7f0000000080)) (async, rerun: 64) ioctl$USBDEVFS_SUBMITURB(r0, 0x802c550a, &(0x7f0000000200)=@urb_type_bulk={0x3, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) (rerun: 64) [ 2895.887803][T12289] ? fget_many+0x20/0x20 [ 2895.892013][T12289] ? debug_smp_processor_id+0x20/0x20 [ 2895.897356][T12289] ? security_file_ioctl+0x7d/0xa0 [ 2895.902444][T12289] __x64_sys_ioctl+0xd4/0x110 [ 2895.907121][T12289] do_syscall_64+0xca/0x1c0 [ 2895.911597][T12289] entry_SYSCALL_64_after_hwframe+0x5c/0xc1 [ 2895.980639][T12322] FAULT_INJECTION: forcing a failure. [ 2895.980639][T12322] name failslab, interval 1, probability 0, space 0, times 0 [ 2895.993404][T12322] CPU: 1 PID: 12322 Comm: syz-executor.4 Not tainted 5.4.233-syzkaller-00019-gd5ed2ca98e48 #0 [ 2896.003729][T12322] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/14/2023 [ 2896.013775][T12322] Call Trace: [ 2896.017045][T12322] dump_stack+0x1d8/0x241 [ 2896.021345][T12322] ? panic+0x768/0x768 [ 2896.025402][T12322] ? nf_ct_l4proto_log_invalid+0x258/0x258 [ 2896.031178][T12322] ? lo_complete_rq+0x2b0/0x2b0 [ 2896.036083][T12322] ? loop_init_request+0x31/0xa0 [ 2896.040991][T12322] ? blk_mq_alloc_rqs+0x5f5/0x660 [ 2896.046009][T12322] should_fail+0x71f/0x880 [ 2896.050414][T12322] ? setup_fault_attr+0x3d0/0x3d0 [ 2896.055410][T12322] ? __blk_mq_alloc_rq_map+0x236/0x2a0 [ 2896.060838][T12322] ? blk_alloc_queue_node+0x2c/0x580 [ 2896.066094][T12322] should_failslab+0x5/0x20 [ 2896.070566][T12322] kmem_cache_alloc+0x24/0x220 [ 2896.075318][T12322] blk_alloc_queue_node+0x2c/0x580 [ 2896.080401][T12322] ? blk_mq_alloc_tag_set+0x67d/0x890 [ 2896.085743][T12322] blk_mq_init_queue+0x34/0xa0 [ 2896.090475][T12322] loop_add+0x25c/0x740 [ 2896.094601][T12322] ? get_pid_task+0xc3/0xf0 [ 2896.099076][T12322] ? radix_tree_lookup+0x16f/0x1c0 [ 2896.104157][T12322] loop_control_ioctl+0x448/0x620 [ 2896.109150][T12322] ? loop_remove+0xa0/0xa0 [ 2896.113539][T12322] ? memset+0x1f/0x40 [ 2896.117503][T12322] ? fsnotify+0x1280/0x1340 [ 2896.121971][T12322] ? loop_remove+0xa0/0xa0 [ 2896.126357][T12322] do_vfs_ioctl+0x742/0x1720 [ 2896.130919][T12322] ? ioctl_preallocate+0x250/0x250 [ 2896.136000][T12322] ? __fget+0x407/0x490 [ 2896.140124][T12322] ? fget_many+0x20/0x20 [ 2896.144335][T12322] ? debug_smp_processor_id+0x20/0x20 [ 2896.149687][T12322] ? security_file_ioctl+0x7d/0xa0 [ 2896.154764][T12322] __x64_sys_ioctl+0xd4/0x110 [ 2896.159414][T12322] do_syscall_64+0xca/0x1c0 [ 2896.163886][T12322] entry_SYSCALL_64_after_hwframe+0x5c/0xc1 06:55:29 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x4004550d, &(0x7f0000000200)=@urb_type_bulk={0x2, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 06:55:29 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040)=@security={'security\x00', 0xe, 0x4, 0x260, 0xffffffff, 0x180, 0xc0, 0xc0, 0xffffffff, 0xffffffff, 0x288, 0x288, 0x288, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x70, 0x98}, @common=@inet=@SET1={0x28}}, {{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@STANDARD={0x28}}, {{@ip={@rand_addr, @broadcast, 0x0, 0x0, 'batadv_slave_0\x00', 'ip_vti0\x00'}, 0x0, 0x70, 0x98}, @common=@unspec=@NFQUEUE0={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x2c0) ioctl$USBDEVFS_RESETEP(r0, 0x5421, &(0x7f0000000080)) 06:55:29 executing program 0: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f0000000200)=@urb_type_control={0x2, {0x2}, 0x0, 0x4, &(0x7f0000000a40)={0x80, 0x16, 0x2005, 0x7, 0x8}, 0x8, 0xf8, 0x7, 0x0, 0x0, 0x5, &(0x7f0000000a80)="cfc206af3b20cc76f92c2426377a243c9d8d6008fafd2fd67138c6b064102eec84099eccfeb5a4b8a5f3f11f2b3a7efc7bb159fd9e2cfe9dfc7021a27eef2f1b8a14ae37ef3f5850a71385fa82e17ca63c6617a30e1bc3576e8ee08aac39ab0a21c7d06379bcc8bd197b3c4706285c7606cc6c43a9f9a4485fa40997c39a4da54d472ef5eb63dbcb91c23e669d6e8836e2269a1d466533236ed3bd"}) 06:55:29 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x802c550a, &(0x7f0000000140)=@urb_type_iso={0x0, {}, 0x0, 0x0, &(0x7f0000000080), 0x0, 0x0, 0x0, 0x35, 0x0, 0x0, 0x0, [{0x8, 0x5, 0x100}, {0x40, 0x5, 0x3}, {0x8000, 0x5, 0x1}, {0x8, 0x2, 0x7f}, {0x9, 0x0, 0x4d}, {0x9, 0x8b88, 0x1}, {0x81, 0x5, 0x3ff}, {0xffffffff, 0xfffffff7, 0x5}, {0x7fffffff, 0x417, 0x40}, {0x401, 0x1, 0x950}, {0x6, 0xfff, 0x4}, {0x0, 0x8, 0x8}, {0xcd6fcee5, 0x4, 0xffffffff}, {0x7, 0x9, 0x9}, {0x3230fea4, 0x1ff, 0x401}, {0xf3d, 0xad, 0x2}, {0x7, 0x5, 0x8}, {0x800, 0xfffffffd, 0xff}, {0x5, 0x3, 0x7}, {0x7fffffff, 0x101, 0x1ff}, {0x11bb7e2, 0xe52}, {0x1, 0xffffffff, 0x7}, {0x3, 0x0, 0x4}, {0x1f, 0x80, 0x6}, {0x80, 0x9a, 0x1}, {0x3, 0xffff, 0xffff}, {0x81, 0x3, 0x8}, {0x0, 0x8, 0x400}, {0xfffffe01, 0x100, 0xf55}, {0x10001, 0xff, 0x7}, {0x2, 0x80000001, 0x7}, {0x4, 0xc708, 0x3ff}, {0x1, 0x7, 0x3}, {0x339, 0x8, 0x2}, {0x101, 0xffffffff, 0x10001}, {0x3, 0xff, 0x3}, {0x6b, 0xb0f, 0x5}, {0x7ff, 0x9, 0x7de5}, {0x80000001, 0x7f, 0x2}, {0x8, 0x6}, {0x3, 0x8001, 0x3ff}, {0x4, 0x5, 0x5d}, {0x75d23712, 0x8, 0x6}, {0x8, 0xde, 0x42e}, {0xea09, 0x81}, {0x9, 0x2, 0x3}, {0x2e47, 0x8, 0x81}, {0x3, 0x6, 0x7ff}, {0x7, 0x8, 0xfffff979}, {0x1f, 0x8, 0x1f}, {0x200, 0x7, 0x3}, {0x6897bc41, 0x7, 0x3}, {0x9, 0x80000000, 0x9}]}) 06:55:29 executing program 1: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) (async) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x5, 0x422) ioctl$USBDEVFS_GET_CAPABILITIES(r1, 0x8004551a, &(0x7f0000000080)) ioctl$USBDEVFS_SUBMITURB(r0, 0x802c550a, &(0x7f0000000200)=@urb_type_bulk={0x3, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 06:55:29 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) (fail_nth: 12) [ 2896.536799][T12343] FAULT_INJECTION: forcing a failure. [ 2896.536799][T12343] name failslab, interval 1, probability 0, space 0, times 0 [ 2896.550046][T12343] CPU: 1 PID: 12343 Comm: syz-executor.4 Not tainted 5.4.233-syzkaller-00019-gd5ed2ca98e48 #0 [ 2896.560280][T12343] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/14/2023 [ 2896.570324][T12343] Call Trace: [ 2896.573613][T12343] dump_stack+0x1d8/0x241 [ 2896.577940][T12343] ? panic+0x768/0x768 06:55:29 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x4004551e, &(0x7f0000000200)=@urb_type_bulk={0x2, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 06:55:29 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x802c550a, &(0x7f0000000140)=@urb_type_iso={0x0, {}, 0x0, 0x0, &(0x7f0000000080), 0x0, 0x0, 0x0, 0x34, 0x0, 0x0, 0x0, [{0x8, 0x5, 0x100}, {0x40, 0x5, 0x3}, {0x8000, 0x5, 0x1}, {0x8, 0x2, 0x7f}, {0x9, 0x0, 0x4d}, {0x9, 0x8b88, 0x1}, {0x81, 0x5, 0x3ff}, {0xffffffff, 0xfffffff7, 0x5}, {0x7fffffff, 0x417, 0x40}, {0x401, 0x1, 0x950}, {0x6, 0xfff, 0x4}, {0x0, 0x8, 0x8}, {0xcd6fcee5, 0x4, 0xffffffff}, {0x7, 0x9, 0x9}, {0x3230fea4, 0x1ff, 0x401}, {0xf3d, 0xad, 0x2}, {0x7, 0x5, 0x8}, {0x800, 0xfffffffd, 0xff}, {0x5, 0x3, 0x7}, {0x7fffffff, 0x101, 0x1ff}, {0x11bb7e2, 0xe52}, {0x1, 0xffffffff, 0x7}, {0x3, 0x0, 0x4}, {0x1f, 0x80, 0x6}, {0x80, 0x9a, 0x1}, {0x3, 0xffff, 0xffff}, {0x81, 0x3, 0x8}, {0x0, 0x8, 0x400}, {0xfffffe01, 0x100, 0xf55}, {0x10001, 0xff, 0x7}, {0x2, 0x80000001, 0x7}, {0x4, 0xc708, 0x3ff}, {0x1, 0x7, 0x3}, {0x339, 0x8, 0x2}, {0x101, 0xffffffff, 0x10001}, {0x3, 0xff, 0x3}, {0x6b, 0xb0f, 0x5}, {0x7ff, 0x9, 0x7de5}, {0x80000001, 0x7f, 0x2}, {0x8, 0x6}, {0x3, 0x8001, 0x3ff}, {0x4, 0x5, 0x5d}, {0x75d23712, 0x8, 0x6}, {0x8, 0xde, 0x42e}, {0xea09, 0x81}, {0x9, 0x2, 0x3}, {0x2e47, 0x8, 0x81}, {0x3, 0x6, 0x7ff}, {0x7, 0x8, 0xfffff979}, {0x1f, 0x8, 0x1f}, {0x200, 0x7, 0x3}, {0x6897bc41, 0x7, 0x3}]}) 06:55:29 executing program 1: ioctl$USBDEVFS_ALLOW_SUSPEND(0xffffffffffffffff, 0x5522) r0 = syz_open_dev$usbfs(&(0x7f0000000380), 0x6e665f53, 0x0) ioctl$USBDEVFS_CLEAR_HALT(r0, 0x80045515, 0x0) ioctl$USBDEVFS_FORBID_SUSPEND(r0, 0x5521) mmap$usbfs(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x4, 0x110, 0xffffffffffffffff, 0x2) r1 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r1, 0x802c550a, &(0x7f0000000200)=@urb_type_bulk={0x3, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 06:55:29 executing program 1: ioctl$USBDEVFS_ALLOW_SUSPEND(0xffffffffffffffff, 0x5522) (async) ioctl$USBDEVFS_ALLOW_SUSPEND(0xffffffffffffffff, 0x5522) syz_open_dev$usbfs(&(0x7f0000000380), 0x6e665f53, 0x0) (async) r0 = syz_open_dev$usbfs(&(0x7f0000000380), 0x6e665f53, 0x0) ioctl$USBDEVFS_CLEAR_HALT(r0, 0x80045515, 0x0) ioctl$USBDEVFS_FORBID_SUSPEND(r0, 0x5521) mmap$usbfs(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x4, 0x110, 0xffffffffffffffff, 0x2) r1 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r1, 0x802c550a, &(0x7f0000000200)=@urb_type_bulk={0x3, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 06:55:29 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x802c550a, &(0x7f0000000140)=@urb_type_iso={0x0, {}, 0x0, 0x0, &(0x7f0000000080), 0x0, 0x0, 0x0, 0x33, 0x0, 0x0, 0x0, [{0x8, 0x5, 0x100}, {0x40, 0x5, 0x3}, {0x8000, 0x5, 0x1}, {0x8, 0x2, 0x7f}, {0x9, 0x0, 0x4d}, {0x9, 0x8b88, 0x1}, {0x81, 0x5, 0x3ff}, {0xffffffff, 0xfffffff7, 0x5}, {0x7fffffff, 0x417, 0x40}, {0x401, 0x1, 0x950}, {0x6, 0xfff, 0x4}, {0x0, 0x8, 0x8}, {0xcd6fcee5, 0x4, 0xffffffff}, {0x7, 0x9, 0x9}, {0x3230fea4, 0x1ff, 0x401}, {0xf3d, 0xad, 0x2}, {0x7, 0x5, 0x8}, {0x800, 0xfffffffd, 0xff}, {0x5, 0x3, 0x7}, {0x7fffffff, 0x101, 0x1ff}, {0x11bb7e2, 0xe52}, {0x1, 0xffffffff, 0x7}, {0x3, 0x0, 0x4}, {0x1f, 0x80, 0x6}, {0x80, 0x9a, 0x1}, {0x3, 0xffff, 0xffff}, {0x81, 0x3, 0x8}, {0x0, 0x8, 0x400}, {0xfffffe01, 0x100, 0xf55}, {0x10001, 0xff, 0x7}, {0x2, 0x80000001, 0x7}, {0x4, 0xc708, 0x3ff}, {0x1, 0x7, 0x3}, {0x339, 0x8, 0x2}, {0x101, 0xffffffff, 0x10001}, {0x3, 0xff, 0x3}, {0x6b, 0xb0f, 0x5}, {0x7ff, 0x9, 0x7de5}, {0x80000001, 0x7f, 0x2}, {0x8, 0x6}, {0x3, 0x8001, 0x3ff}, {0x4, 0x5, 0x5d}, {0x75d23712, 0x8, 0x6}, {0x8, 0xde, 0x42e}, {0xea09, 0x81}, {0x9, 0x2, 0x3}, {0x2e47, 0x8, 0x81}, {0x3, 0x6, 0x7ff}, {0x7, 0x8, 0xfffff979}, {0x1f, 0x8, 0x1f}, {0x200, 0x7, 0x3}]}) 06:55:29 executing program 1: ioctl$USBDEVFS_ALLOW_SUSPEND(0xffffffffffffffff, 0x5522) r0 = syz_open_dev$usbfs(&(0x7f0000000380), 0x6e665f53, 0x0) ioctl$USBDEVFS_CLEAR_HALT(r0, 0x80045515, 0x0) (async) ioctl$USBDEVFS_FORBID_SUSPEND(r0, 0x5521) (async) mmap$usbfs(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x4, 0x110, 0xffffffffffffffff, 0x2) r1 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r1, 0x802c550a, &(0x7f0000000200)=@urb_type_bulk={0x3, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 06:55:29 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x802c550a, &(0x7f0000000140)=@urb_type_iso={0x0, {}, 0x0, 0x0, &(0x7f0000000080), 0x0, 0x0, 0x0, 0x32, 0x0, 0x0, 0x0, [{0x8, 0x5, 0x100}, {0x40, 0x5, 0x3}, {0x8000, 0x5, 0x1}, {0x8, 0x2, 0x7f}, {0x9, 0x0, 0x4d}, {0x9, 0x8b88, 0x1}, {0x81, 0x5, 0x3ff}, {0xffffffff, 0xfffffff7, 0x5}, {0x7fffffff, 0x417, 0x40}, {0x401, 0x1, 0x950}, {0x6, 0xfff, 0x4}, {0x0, 0x8, 0x8}, {0xcd6fcee5, 0x4, 0xffffffff}, {0x7, 0x9, 0x9}, {0x3230fea4, 0x1ff, 0x401}, {0xf3d, 0xad, 0x2}, {0x7, 0x5, 0x8}, {0x800, 0xfffffffd, 0xff}, {0x5, 0x3, 0x7}, {0x7fffffff, 0x101, 0x1ff}, {0x11bb7e2, 0xe52}, {0x1, 0xffffffff, 0x7}, {0x3, 0x0, 0x4}, {0x1f, 0x80, 0x6}, {0x80, 0x9a, 0x1}, {0x3, 0xffff, 0xffff}, {0x81, 0x3, 0x8}, {0x0, 0x8, 0x400}, {0xfffffe01, 0x100, 0xf55}, {0x10001, 0xff, 0x7}, {0x2, 0x80000001, 0x7}, {0x4, 0xc708, 0x3ff}, {0x1, 0x7, 0x3}, {0x339, 0x8, 0x2}, {0x101, 0xffffffff, 0x10001}, {0x3, 0xff, 0x3}, {0x6b, 0xb0f, 0x5}, {0x7ff, 0x9, 0x7de5}, {0x80000001, 0x7f, 0x2}, {0x8, 0x6}, {0x3, 0x8001, 0x3ff}, {0x4, 0x5, 0x5d}, {0x75d23712, 0x8, 0x6}, {0x8, 0xde, 0x42e}, {0xea09, 0x81}, {0x9, 0x2, 0x3}, {0x2e47, 0x8, 0x81}, {0x3, 0x6, 0x7ff}, {0x7, 0x8, 0xfffff979}, {0x1f, 0x8, 0x1f}]}) [ 2896.582005][T12343] ? nf_ct_l4proto_log_invalid+0x258/0x258 [ 2896.587809][T12343] ? lo_complete_rq+0x2b0/0x2b0 [ 2896.592655][T12343] ? loop_init_request+0x31/0xa0 [ 2896.597589][T12343] ? blk_mq_alloc_rqs+0x5f5/0x660 [ 2896.602609][T12343] should_fail+0x71f/0x880 [ 2896.607021][T12343] ? setup_fault_attr+0x3d0/0x3d0 [ 2896.612034][T12343] ? __blk_mq_alloc_rq_map+0x236/0x2a0 [ 2896.617488][T12343] ? blk_alloc_queue_node+0x2c/0x580 [ 2896.622766][T12343] should_failslab+0x5/0x20 [ 2896.627262][T12343] kmem_cache_alloc+0x24/0x220 [ 2896.632021][T12343] blk_alloc_queue_node+0x2c/0x580 [ 2896.637126][T12343] ? blk_mq_alloc_tag_set+0x67d/0x890 [ 2896.642492][T12343] blk_mq_init_queue+0x34/0xa0 [ 2896.647246][T12343] loop_add+0x25c/0x740 [ 2896.651384][T12343] ? get_pid_task+0xc3/0xf0 [ 2896.655857][T12343] ? radix_tree_lookup+0x16f/0x1c0 [ 2896.660936][T12343] loop_control_ioctl+0x448/0x620 [ 2896.665926][T12343] ? loop_remove+0xa0/0xa0 [ 2896.670318][T12343] ? memset+0x1f/0x40 [ 2896.674279][T12343] ? fsnotify+0x1280/0x1340 [ 2896.678751][T12343] ? loop_remove+0xa0/0xa0 [ 2896.683137][T12343] do_vfs_ioctl+0x742/0x1720 06:55:29 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040)=@security={'security\x00', 0xe, 0x4, 0x260, 0xffffffff, 0x180, 0xc0, 0xc0, 0xffffffff, 0xffffffff, 0x288, 0x288, 0x288, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x70, 0x98}, @common=@inet=@SET1={0x28}}, {{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@STANDARD={0x28}}, {{@ip={@rand_addr, @broadcast, 0x0, 0x0, 'batadv_slave_0\x00', 'ip_vti0\x00'}, 0x0, 0x70, 0x98}, @common=@unspec=@NFQUEUE0={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x2c0) ioctl$USBDEVFS_RESETEP(r0, 0x5450, &(0x7f0000000080)) 06:55:29 executing program 0: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f0000000200)=@urb_type_control={0x2, {0x2}, 0x0, 0x4, &(0x7f0000000a40)={0x80, 0x16, 0x2005, 0x7, 0x8}, 0x8, 0xf8, 0x7, 0x0, 0x0, 0x5, &(0x7f0000000a80)="cfc206af3b20cc76f92c2426377a243c9d8d6008fafd2fd67138c6b064102eec84099eccfeb5a4b8a5f3f11f2b3a7efc7bb159fd9e2cfe9dfc7021a27eef2f1b8a14ae37ef3f5850a71385fa82e17ca63c6617a30e1bc3576e8ee08aac39ab0a21c7d06379bcc8bd197b3c4706285c7606cc6c43a9f9a4485fa40997c39a4da54d472ef5eb63dbcb91c23e669d6e8836e2269a1d466533236ed3bd"}) 06:55:29 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x802c550a, &(0x7f0000000140)=@urb_type_iso={0x0, {}, 0x0, 0x0, &(0x7f0000000080), 0x0, 0x0, 0x0, 0x31, 0x0, 0x0, 0x0, [{0x8, 0x5, 0x100}, {0x40, 0x5, 0x3}, {0x8000, 0x5, 0x1}, {0x8, 0x2, 0x7f}, {0x9, 0x0, 0x4d}, {0x9, 0x8b88, 0x1}, {0x81, 0x5, 0x3ff}, {0xffffffff, 0xfffffff7, 0x5}, {0x7fffffff, 0x417, 0x40}, {0x401, 0x1, 0x950}, {0x6, 0xfff, 0x4}, {0x0, 0x8, 0x8}, {0xcd6fcee5, 0x4, 0xffffffff}, {0x7, 0x9, 0x9}, {0x3230fea4, 0x1ff, 0x401}, {0xf3d, 0xad, 0x2}, {0x7, 0x5, 0x8}, {0x800, 0xfffffffd, 0xff}, {0x5, 0x3, 0x7}, {0x7fffffff, 0x101, 0x1ff}, {0x11bb7e2, 0xe52}, {0x1, 0xffffffff, 0x7}, {0x3, 0x0, 0x4}, {0x1f, 0x80, 0x6}, {0x80, 0x9a, 0x1}, {0x3, 0xffff, 0xffff}, {0x81, 0x3, 0x8}, {0x0, 0x8, 0x400}, {0xfffffe01, 0x100, 0xf55}, {0x10001, 0xff, 0x7}, {0x2, 0x80000001, 0x7}, {0x4, 0xc708, 0x3ff}, {0x1, 0x7, 0x3}, {0x339, 0x8, 0x2}, {0x101, 0xffffffff, 0x10001}, {0x3, 0xff, 0x3}, {0x6b, 0xb0f, 0x5}, {0x7ff, 0x9, 0x7de5}, {0x80000001, 0x7f, 0x2}, {0x8, 0x6}, {0x3, 0x8001, 0x3ff}, {0x4, 0x5, 0x5d}, {0x75d23712, 0x8, 0x6}, {0x8, 0xde, 0x42e}, {0xea09, 0x81}, {0x9, 0x2, 0x3}, {0x2e47, 0x8, 0x81}, {0x3, 0x6, 0x7ff}, {0x7, 0x8, 0xfffff979}]}) 06:55:29 executing program 1: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_RELEASEINTERFACE(0xffffffffffffffff, 0x80045510, &(0x7f0000000040)=0x7fff) ioctl$USBDEVFS_SUBMITURB(r0, 0x802c550a, &(0x7f0000000200)=@urb_type_bulk={0x3, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0}) 06:55:29 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) (fail_nth: 13) 06:55:29 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x40049409, &(0x7f0000000200)=@urb_type_bulk={0x2, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 06:55:29 executing program 1: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_RELEASEINTERFACE(0xffffffffffffffff, 0x80045510, &(0x7f0000000040)=0x7fff) (async) ioctl$USBDEVFS_SUBMITURB(r0, 0x802c550a, &(0x7f0000000200)=@urb_type_bulk={0x3, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0}) 06:55:29 executing program 0: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f0000000200)=@urb_type_control={0x2, {0x2}, 0xfffffffb, 0x0, &(0x7f0000000a40)={0x80, 0x16, 0x2005, 0x7, 0x8}, 0x8, 0xf8, 0x7, 0x0, 0x0, 0x5, &(0x7f0000000a80)="cfc206af3b20cc76f92c2426377a243c9d8d6008fafd2fd67138c6b064102eec84099eccfeb5a4b8a5f3f11f2b3a7efc7bb159fd9e2cfe9dfc7021a27eef2f1b8a14ae37ef3f5850a71385fa82e17ca63c6617a30e1bc3576e8ee08aac39ab0a21c7d06379bcc8bd197b3c4706285c7606cc6c43a9f9a4485fa40997c39a4da54d472ef5eb63dbcb91c23e669d6e8836e2269a1d466533236ed3bd"}) 06:55:29 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x802c550a, &(0x7f0000000140)=@urb_type_iso={0x0, {}, 0x0, 0x0, &(0x7f0000000080), 0x0, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, [{0x8, 0x5, 0x100}, {0x40, 0x5, 0x3}, {0x8000, 0x5, 0x1}, {0x8, 0x2, 0x7f}, {0x9, 0x0, 0x4d}, {0x9, 0x8b88, 0x1}, {0x81, 0x5, 0x3ff}, {0xffffffff, 0xfffffff7, 0x5}, {0x7fffffff, 0x417, 0x40}, {0x401, 0x1, 0x950}, {0x6, 0xfff, 0x4}, {0x0, 0x8, 0x8}, {0xcd6fcee5, 0x4, 0xffffffff}, {0x7, 0x9, 0x9}, {0x3230fea4, 0x1ff, 0x401}, {0xf3d, 0xad, 0x2}, {0x7, 0x5, 0x8}, {0x800, 0xfffffffd, 0xff}, {0x5, 0x3, 0x7}, {0x7fffffff, 0x101, 0x1ff}, {0x11bb7e2, 0xe52}, {0x1, 0xffffffff, 0x7}, {0x3, 0x0, 0x4}, {0x1f, 0x80, 0x6}, {0x80, 0x9a, 0x1}, {0x3, 0xffff, 0xffff}, {0x81, 0x3, 0x8}, {0x0, 0x8, 0x400}, {0xfffffe01, 0x100, 0xf55}, {0x10001, 0xff, 0x7}, {0x2, 0x80000001, 0x7}, {0x4, 0xc708, 0x3ff}, {0x1, 0x7, 0x3}, {0x339, 0x8, 0x2}, {0x101, 0xffffffff, 0x10001}, {0x3, 0xff, 0x3}, {0x6b, 0xb0f, 0x5}, {0x7ff, 0x9, 0x7de5}, {0x80000001, 0x7f, 0x2}, {0x8, 0x6}, {0x3, 0x8001, 0x3ff}, {0x4, 0x5, 0x5d}, {0x75d23712, 0x8, 0x6}, {0x8, 0xde, 0x42e}, {0xea09, 0x81}, {0x9, 0x2, 0x3}, {0x2e47, 0x8, 0x81}, {0x3, 0x6, 0x7ff}]}) [ 2896.687704][T12343] ? ioctl_preallocate+0x250/0x250 [ 2896.692788][T12343] ? __fget+0x407/0x490 [ 2896.696939][T12343] ? fget_many+0x20/0x20 [ 2896.701149][T12343] ? debug_smp_processor_id+0x20/0x20 [ 2896.706488][T12343] ? security_file_ioctl+0x7d/0xa0 [ 2896.711586][T12343] __x64_sys_ioctl+0xd4/0x110 [ 2896.716236][T12343] do_syscall_64+0xca/0x1c0 [ 2896.720724][T12343] entry_SYSCALL_64_after_hwframe+0x5c/0xc1 06:55:29 executing program 0: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f0000000200)=@urb_type_control={0x2, {0x2}, 0xfffffffb, 0x0, &(0x7f0000000a40)={0x80, 0x16, 0x2005, 0x7, 0x8}, 0x8, 0xf8, 0x7, 0x0, 0x0, 0x5, &(0x7f0000000a80)="cfc206af3b20cc76f92c2426377a243c9d8d6008fafd2fd67138c6b064102eec84099eccfeb5a4b8a5f3f11f2b3a7efc7bb159fd9e2cfe9dfc7021a27eef2f1b8a14ae37ef3f5850a71385fa82e17ca63c6617a30e1bc3576e8ee08aac39ab0a21c7d06379bcc8bd197b3c4706285c7606cc6c43a9f9a4485fa40997c39a4da54d472ef5eb63dbcb91c23e669d6e8836e2269a1d466533236ed3bd"}) 06:55:29 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x4008550c, &(0x7f0000000200)=@urb_type_bulk={0x2, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 06:55:29 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040)=@security={'security\x00', 0xe, 0x4, 0x260, 0xffffffff, 0x180, 0xc0, 0xc0, 0xffffffff, 0xffffffff, 0x288, 0x288, 0x288, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x70, 0x98}, @common=@inet=@SET1={0x28}}, {{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@STANDARD={0x28}}, {{@ip={@rand_addr, @broadcast, 0x0, 0x0, 'batadv_slave_0\x00', 'ip_vti0\x00'}, 0x0, 0x70, 0x98}, @common=@unspec=@NFQUEUE0={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x2c0) ioctl$USBDEVFS_RESETEP(r0, 0x5451, &(0x7f0000000080)) 06:55:29 executing program 0: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f0000000200)=@urb_type_control={0x2, {0x2}, 0xfffffffb, 0x0, &(0x7f0000000a40)={0x80, 0x16, 0x2005, 0x7, 0x8}, 0x8, 0xf8, 0x7, 0x0, 0x0, 0x5, &(0x7f0000000a80)="cfc206af3b20cc76f92c2426377a243c9d8d6008fafd2fd67138c6b064102eec84099eccfeb5a4b8a5f3f11f2b3a7efc7bb159fd9e2cfe9dfc7021a27eef2f1b8a14ae37ef3f5850a71385fa82e17ca63c6617a30e1bc3576e8ee08aac39ab0a21c7d06379bcc8bd197b3c4706285c7606cc6c43a9f9a4485fa40997c39a4da54d472ef5eb63dbcb91c23e669d6e8836e2269a1d466533236ed3bd"}) 06:55:29 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x802c550a, &(0x7f0000000140)=@urb_type_iso={0x0, {}, 0x0, 0x0, &(0x7f0000000080), 0x0, 0x0, 0x0, 0x2f, 0x0, 0x0, 0x0, [{0x8, 0x5, 0x100}, {0x40, 0x5, 0x3}, {0x8000, 0x5, 0x1}, {0x8, 0x2, 0x7f}, {0x9, 0x0, 0x4d}, {0x9, 0x8b88, 0x1}, {0x81, 0x5, 0x3ff}, {0xffffffff, 0xfffffff7, 0x5}, {0x7fffffff, 0x417, 0x40}, {0x401, 0x1, 0x950}, {0x6, 0xfff, 0x4}, {0x0, 0x8, 0x8}, {0xcd6fcee5, 0x4, 0xffffffff}, {0x7, 0x9, 0x9}, {0x3230fea4, 0x1ff, 0x401}, {0xf3d, 0xad, 0x2}, {0x7, 0x5, 0x8}, {0x800, 0xfffffffd, 0xff}, {0x5, 0x3, 0x7}, {0x7fffffff, 0x101, 0x1ff}, {0x11bb7e2, 0xe52}, {0x1, 0xffffffff, 0x7}, {0x3, 0x0, 0x4}, {0x1f, 0x80, 0x6}, {0x80, 0x9a, 0x1}, {0x3, 0xffff, 0xffff}, {0x81, 0x3, 0x8}, {0x0, 0x8, 0x400}, {0xfffffe01, 0x100, 0xf55}, {0x10001, 0xff, 0x7}, {0x2, 0x80000001, 0x7}, {0x4, 0xc708, 0x3ff}, {0x1, 0x7, 0x3}, {0x339, 0x8, 0x2}, {0x101, 0xffffffff, 0x10001}, {0x3, 0xff, 0x3}, {0x6b, 0xb0f, 0x5}, {0x7ff, 0x9, 0x7de5}, {0x80000001, 0x7f, 0x2}, {0x8, 0x6}, {0x3, 0x8001, 0x3ff}, {0x4, 0x5, 0x5d}, {0x75d23712, 0x8, 0x6}, {0x8, 0xde, 0x42e}, {0xea09, 0x81}, {0x9, 0x2, 0x3}, {0x2e47, 0x8, 0x81}]}) 06:55:29 executing program 1: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_RELEASEINTERFACE(0xffffffffffffffff, 0x80045510, &(0x7f0000000040)=0x7fff) (async) ioctl$USBDEVFS_SUBMITURB(r0, 0x802c550a, &(0x7f0000000200)=@urb_type_bulk={0x3, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0}) 06:55:29 executing program 0: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f0000000200)=@urb_type_control={0x2, {0x2}, 0xfffffffb, 0x4, 0x0, 0x0, 0xf8, 0x7, 0x0, 0x0, 0x5, &(0x7f0000000a80)="cfc206af3b20cc76f92c2426377a243c9d8d6008fafd2fd67138c6b064102eec84099eccfeb5a4b8a5f3f11f2b3a7efc7bb159fd9e2cfe9dfc7021a27eef2f1b8a14ae37ef3f5850a71385fa82e17ca63c6617a30e1bc3576e8ee08aac39ab0a21c7d06379bcc8bd197b3c4706285c7606cc6c43a9f9a4485fa40997c39a4da54d472ef5eb63dbcb91c23e669d6e8836e2269a1d466533236ed3bd"}) [ 2896.774565][T12380] FAULT_INJECTION: forcing a failure. [ 2896.774565][T12380] name failslab, interval 1, probability 0, space 0, times 0 [ 2896.790801][T12380] CPU: 0 PID: 12380 Comm: syz-executor.4 Not tainted 5.4.233-syzkaller-00019-gd5ed2ca98e48 #0 [ 2896.801040][T12380] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/14/2023 [ 2896.811083][T12380] Call Trace: [ 2896.814369][T12380] dump_stack+0x1d8/0x241 [ 2896.818691][T12380] ? panic+0x768/0x768 [ 2896.822755][T12380] ? nf_ct_l4proto_log_invalid+0x258/0x258 [ 2896.828555][T12380] should_fail+0x71f/0x880 [ 2896.832957][T12380] ? setup_fault_attr+0x3d0/0x3d0 [ 2896.837959][T12380] ? mempool_init_node+0x1ec/0x4e0 [ 2896.843041][T12380] should_failslab+0x5/0x20 [ 2896.847515][T12380] kmem_cache_alloc+0x24/0x220 [ 2896.852248][T12380] ? mempool_free+0x380/0x380 [ 2896.856898][T12380] mempool_init_node+0x1ec/0x4e0 [ 2896.861806][T12380] ? mempool_free+0x380/0x380 [ 2896.866460][T12380] ? mempool_alloc_slab+0x20/0x20 [ 2896.871453][T12380] mempool_init+0x35/0x50 [ 2896.875758][T12380] bioset_init+0x432/0x600 [ 2896.880149][T12380] blk_alloc_queue_node+0xc5/0x580 [ 2896.885261][T12380] ? blk_mq_alloc_tag_set+0x67d/0x890 [ 2896.890625][T12380] blk_mq_init_queue+0x34/0xa0 [ 2896.895381][T12380] loop_add+0x25c/0x740 [ 2896.899513][T12380] ? get_pid_task+0xc3/0xf0 [ 2896.903990][T12380] ? radix_tree_lookup+0x16f/0x1c0 [ 2896.909070][T12380] loop_control_ioctl+0x448/0x620 [ 2896.914072][T12380] ? loop_remove+0xa0/0xa0 [ 2896.918467][T12380] ? memset+0x1f/0x40 06:55:29 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) (fail_nth: 14) 06:55:29 executing program 0: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f0000000200)=@urb_type_control={0x2, {0x2}, 0xfffffffb, 0x4, 0x0, 0x0, 0xf8, 0x7, 0x0, 0x0, 0x5, &(0x7f0000000a80)="cfc206af3b20cc76f92c2426377a243c9d8d6008fafd2fd67138c6b064102eec84099eccfeb5a4b8a5f3f11f2b3a7efc7bb159fd9e2cfe9dfc7021a27eef2f1b8a14ae37ef3f5850a71385fa82e17ca63c6617a30e1bc3576e8ee08aac39ab0a21c7d06379bcc8bd197b3c4706285c7606cc6c43a9f9a4485fa40997c39a4da54d472ef5eb63dbcb91c23e669d6e8836e2269a1d466533236ed3bd"}) 06:55:29 executing program 1: setsockopt$MRT6_ASSERT(0xffffffffffffffff, 0x29, 0xcf, &(0x7f0000000040)=0x1, 0x4) r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x66, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x802c550a, &(0x7f0000000200)=@urb_type_bulk={0x3, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 06:55:29 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x802c550a, &(0x7f0000000140)=@urb_type_iso={0x0, {}, 0x0, 0x0, &(0x7f0000000080), 0x0, 0x0, 0x0, 0x2e, 0x0, 0x0, 0x0, [{0x8, 0x5, 0x100}, {0x40, 0x5, 0x3}, {0x8000, 0x5, 0x1}, {0x8, 0x2, 0x7f}, {0x9, 0x0, 0x4d}, {0x9, 0x8b88, 0x1}, {0x81, 0x5, 0x3ff}, {0xffffffff, 0xfffffff7, 0x5}, {0x7fffffff, 0x417, 0x40}, {0x401, 0x1, 0x950}, {0x6, 0xfff, 0x4}, {0x0, 0x8, 0x8}, {0xcd6fcee5, 0x4, 0xffffffff}, {0x7, 0x9, 0x9}, {0x3230fea4, 0x1ff, 0x401}, {0xf3d, 0xad, 0x2}, {0x7, 0x5, 0x8}, {0x800, 0xfffffffd, 0xff}, {0x5, 0x3, 0x7}, {0x7fffffff, 0x101, 0x1ff}, {0x11bb7e2, 0xe52}, {0x1, 0xffffffff, 0x7}, {0x3, 0x0, 0x4}, {0x1f, 0x80, 0x6}, {0x80, 0x9a, 0x1}, {0x3, 0xffff, 0xffff}, {0x81, 0x3, 0x8}, {0x0, 0x8, 0x400}, {0xfffffe01, 0x100, 0xf55}, {0x10001, 0xff, 0x7}, {0x2, 0x80000001, 0x7}, {0x4, 0xc708, 0x3ff}, {0x1, 0x7, 0x3}, {0x339, 0x8, 0x2}, {0x101, 0xffffffff, 0x10001}, {0x3, 0xff, 0x3}, {0x6b, 0xb0f, 0x5}, {0x7ff, 0x9, 0x7de5}, {0x80000001, 0x7f, 0x2}, {0x8, 0x6}, {0x3, 0x8001, 0x3ff}, {0x4, 0x5, 0x5d}, {0x75d23712, 0x8, 0x6}, {0x8, 0xde, 0x42e}, {0xea09, 0x81}, {0x9, 0x2, 0x3}]}) 06:55:29 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040)=@security={'security\x00', 0xe, 0x4, 0x260, 0xffffffff, 0x180, 0xc0, 0xc0, 0xffffffff, 0xffffffff, 0x288, 0x288, 0x288, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x70, 0x98}, @common=@inet=@SET1={0x28}}, {{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@STANDARD={0x28}}, {{@ip={@rand_addr, @broadcast, 0x0, 0x0, 'batadv_slave_0\x00', 'ip_vti0\x00'}, 0x0, 0x70, 0x98}, @common=@unspec=@NFQUEUE0={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x2c0) ioctl$USBDEVFS_RESETEP(r0, 0x5452, &(0x7f0000000080)) [ 2896.922417][T12380] ? fsnotify+0x1280/0x1340 [ 2896.926888][T12380] ? loop_remove+0xa0/0xa0 [ 2896.931273][T12380] do_vfs_ioctl+0x742/0x1720 [ 2896.935836][T12380] ? ioctl_preallocate+0x250/0x250 [ 2896.940912][T12380] ? __fget+0x407/0x490 [ 2896.945034][T12380] ? fget_many+0x20/0x20 [ 2896.949244][T12380] ? debug_smp_processor_id+0x20/0x20 [ 2896.954591][T12380] ? security_file_ioctl+0x7d/0xa0 [ 2896.959683][T12380] __x64_sys_ioctl+0xd4/0x110 [ 2896.964336][T12380] do_syscall_64+0xca/0x1c0 [ 2896.968809][T12380] entry_SYSCALL_64_after_hwframe+0x5c/0xc1 06:55:29 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x802c550a, &(0x7f0000000140)=@urb_type_iso={0x0, {}, 0x0, 0x0, &(0x7f0000000080), 0x0, 0x0, 0x0, 0x2d, 0x0, 0x0, 0x0, [{0x8, 0x5, 0x100}, {0x40, 0x5, 0x3}, {0x8000, 0x5, 0x1}, {0x8, 0x2, 0x7f}, {0x9, 0x0, 0x4d}, {0x9, 0x8b88, 0x1}, {0x81, 0x5, 0x3ff}, {0xffffffff, 0xfffffff7, 0x5}, {0x7fffffff, 0x417, 0x40}, {0x401, 0x1, 0x950}, {0x6, 0xfff, 0x4}, {0x0, 0x8, 0x8}, {0xcd6fcee5, 0x4, 0xffffffff}, {0x7, 0x9, 0x9}, {0x3230fea4, 0x1ff, 0x401}, {0xf3d, 0xad, 0x2}, {0x7, 0x5, 0x8}, {0x800, 0xfffffffd, 0xff}, {0x5, 0x3, 0x7}, {0x7fffffff, 0x101, 0x1ff}, {0x11bb7e2, 0xe52}, {0x1, 0xffffffff, 0x7}, {0x3, 0x0, 0x4}, {0x1f, 0x80, 0x6}, {0x80, 0x9a, 0x1}, {0x3, 0xffff, 0xffff}, {0x81, 0x3, 0x8}, {0x0, 0x8, 0x400}, {0xfffffe01, 0x100, 0xf55}, {0x10001, 0xff, 0x7}, {0x2, 0x80000001, 0x7}, {0x4, 0xc708, 0x3ff}, {0x1, 0x7, 0x3}, {0x339, 0x8, 0x2}, {0x101, 0xffffffff, 0x10001}, {0x3, 0xff, 0x3}, {0x6b, 0xb0f, 0x5}, {0x7ff, 0x9, 0x7de5}, {0x80000001, 0x7f, 0x2}, {0x8, 0x6}, {0x3, 0x8001, 0x3ff}, {0x4, 0x5, 0x5d}, {0x75d23712, 0x8, 0x6}, {0x8, 0xde, 0x42e}, {0xea09, 0x81}]}) [ 2896.999708][T12408] FAULT_INJECTION: forcing a failure. [ 2896.999708][T12408] name failslab, interval 1, probability 0, space 0, times 0 [ 2897.015860][T12408] CPU: 0 PID: 12408 Comm: syz-executor.4 Not tainted 5.4.233-syzkaller-00019-gd5ed2ca98e48 #0 [ 2897.026125][T12408] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/14/2023 [ 2897.036157][T12408] Call Trace: [ 2897.039510][T12408] dump_stack+0x1d8/0x241 [ 2897.043827][T12408] ? panic+0x768/0x768 [ 2897.047865][T12408] ? nf_ct_l4proto_log_invalid+0x258/0x258 [ 2897.053663][T12408] should_fail+0x71f/0x880 [ 2897.058050][T12408] ? setup_fault_attr+0x3d0/0x3d0 [ 2897.063045][T12408] ? mempool_init_node+0x1ec/0x4e0 [ 2897.068126][T12408] should_failslab+0x5/0x20 [ 2897.072597][T12408] kmem_cache_alloc+0x24/0x220 [ 2897.077331][T12408] ? mempool_free+0x380/0x380 [ 2897.082002][T12408] mempool_init_node+0x1ec/0x4e0 [ 2897.086915][T12408] ? mempool_free+0x380/0x380 [ 2897.091559][T12408] ? mempool_alloc_slab+0x20/0x20 [ 2897.096551][T12408] mempool_init+0x35/0x50 [ 2897.100852][T12408] bioset_init+0x432/0x600 [ 2897.105239][T12408] blk_alloc_queue_node+0xc5/0x580 [ 2897.110330][T12408] ? blk_mq_alloc_tag_set+0x67d/0x890 [ 2897.115674][T12408] blk_mq_init_queue+0x34/0xa0 [ 2897.120406][T12408] loop_add+0x25c/0x740 [ 2897.124534][T12408] ? get_pid_task+0xc3/0xf0 [ 2897.129008][T12408] ? radix_tree_lookup+0x16f/0x1c0 [ 2897.134087][T12408] loop_control_ioctl+0x448/0x620 [ 2897.139081][T12408] ? loop_remove+0xa0/0xa0 [ 2897.143469][T12408] ? memset+0x1f/0x40 [ 2897.147418][T12408] ? fsnotify+0x1280/0x1340 [ 2897.151887][T12408] ? loop_remove+0xa0/0xa0 [ 2897.156278][T12408] do_vfs_ioctl+0x742/0x1720 [ 2897.160839][T12408] ? ioctl_preallocate+0x250/0x250 [ 2897.165919][T12408] ? __fget+0x407/0x490 [ 2897.170044][T12408] ? fget_many+0x20/0x20 [ 2897.174254][T12408] ? debug_smp_processor_id+0x20/0x20 [ 2897.179597][T12408] ? security_file_ioctl+0x7d/0xa0 [ 2897.184684][T12408] __x64_sys_ioctl+0xd4/0x110 [ 2897.189334][T12408] do_syscall_64+0xca/0x1c0 [ 2897.193950][T12408] entry_SYSCALL_64_after_hwframe+0x5c/0xc1 06:55:30 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x4008550d, &(0x7f0000000200)=@urb_type_bulk={0x2, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 06:55:30 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040)=@security={'security\x00', 0xe, 0x4, 0x260, 0xffffffff, 0x180, 0xc0, 0xc0, 0xffffffff, 0xffffffff, 0x288, 0x288, 0x288, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x70, 0x98}, @common=@inet=@SET1={0x28}}, {{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@STANDARD={0x28}}, {{@ip={@rand_addr, @broadcast, 0x0, 0x0, 'batadv_slave_0\x00', 'ip_vti0\x00'}, 0x0, 0x70, 0x98}, @common=@unspec=@NFQUEUE0={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x2c0) ioctl$USBDEVFS_RESETEP(r0, 0x5460, &(0x7f0000000080)) 06:55:30 executing program 1: setsockopt$MRT6_ASSERT(0xffffffffffffffff, 0x29, 0xcf, &(0x7f0000000040)=0x1, 0x4) (async) setsockopt$MRT6_ASSERT(0xffffffffffffffff, 0x29, 0xcf, &(0x7f0000000040)=0x1, 0x4) r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x66, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x802c550a, &(0x7f0000000200)=@urb_type_bulk={0x3, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 06:55:30 executing program 0: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f0000000200)=@urb_type_control={0x2, {0x2}, 0xfffffffb, 0x4, 0x0, 0x0, 0xf8, 0x7, 0x0, 0x0, 0x5, &(0x7f0000000a80)="cfc206af3b20cc76f92c2426377a243c9d8d6008fafd2fd67138c6b064102eec84099eccfeb5a4b8a5f3f11f2b3a7efc7bb159fd9e2cfe9dfc7021a27eef2f1b8a14ae37ef3f5850a71385fa82e17ca63c6617a30e1bc3576e8ee08aac39ab0a21c7d06379bcc8bd197b3c4706285c7606cc6c43a9f9a4485fa40997c39a4da54d472ef5eb63dbcb91c23e669d6e8836e2269a1d466533236ed3bd"}) 06:55:30 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x802c550a, &(0x7f0000000140)=@urb_type_iso={0x0, {}, 0x0, 0x0, &(0x7f0000000080), 0x0, 0x0, 0x0, 0x2c, 0x0, 0x0, 0x0, [{0x8, 0x5, 0x100}, {0x40, 0x5, 0x3}, {0x8000, 0x5, 0x1}, {0x8, 0x2, 0x7f}, {0x9, 0x0, 0x4d}, {0x9, 0x8b88, 0x1}, {0x81, 0x5, 0x3ff}, {0xffffffff, 0xfffffff7, 0x5}, {0x7fffffff, 0x417, 0x40}, {0x401, 0x1, 0x950}, {0x6, 0xfff, 0x4}, {0x0, 0x8, 0x8}, {0xcd6fcee5, 0x4, 0xffffffff}, {0x7, 0x9, 0x9}, {0x3230fea4, 0x1ff, 0x401}, {0xf3d, 0xad, 0x2}, {0x7, 0x5, 0x8}, {0x800, 0xfffffffd, 0xff}, {0x5, 0x3, 0x7}, {0x7fffffff, 0x101, 0x1ff}, {0x11bb7e2, 0xe52}, {0x1, 0xffffffff, 0x7}, {0x3, 0x0, 0x4}, {0x1f, 0x80, 0x6}, {0x80, 0x9a, 0x1}, {0x3, 0xffff, 0xffff}, {0x81, 0x3, 0x8}, {0x0, 0x8, 0x400}, {0xfffffe01, 0x100, 0xf55}, {0x10001, 0xff, 0x7}, {0x2, 0x80000001, 0x7}, {0x4, 0xc708, 0x3ff}, {0x1, 0x7, 0x3}, {0x339, 0x8, 0x2}, {0x101, 0xffffffff, 0x10001}, {0x3, 0xff, 0x3}, {0x6b, 0xb0f, 0x5}, {0x7ff, 0x9, 0x7de5}, {0x80000001, 0x7f, 0x2}, {0x8, 0x6}, {0x3, 0x8001, 0x3ff}, {0x4, 0x5, 0x5d}, {0x75d23712, 0x8, 0x6}, {0x8, 0xde, 0x42e}]}) 06:55:30 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) (fail_nth: 15) 06:55:30 executing program 0: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f0000000200)=@urb_type_control={0x2, {0x2}, 0xfffffffb, 0x4, &(0x7f0000000a40)={0x0, 0x16, 0x2005, 0x7, 0x8}, 0x8, 0xf8, 0x7, 0x0, 0x0, 0x5, &(0x7f0000000a80)="cfc206af3b20cc76f92c2426377a243c9d8d6008fafd2fd67138c6b064102eec84099eccfeb5a4b8a5f3f11f2b3a7efc7bb159fd9e2cfe9dfc7021a27eef2f1b8a14ae37ef3f5850a71385fa82e17ca63c6617a30e1bc3576e8ee08aac39ab0a21c7d06379bcc8bd197b3c4706285c7606cc6c43a9f9a4485fa40997c39a4da54d472ef5eb63dbcb91c23e669d6e8836e2269a1d466533236ed3bd"}) 06:55:30 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040)=@security={'security\x00', 0xe, 0x4, 0x260, 0xffffffff, 0x180, 0xc0, 0xc0, 0xffffffff, 0xffffffff, 0x288, 0x288, 0x288, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x70, 0x98}, @common=@inet=@SET1={0x28}}, {{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@STANDARD={0x28}}, {{@ip={@rand_addr, @broadcast, 0x0, 0x0, 'batadv_slave_0\x00', 'ip_vti0\x00'}, 0x0, 0x70, 0x98}, @common=@unspec=@NFQUEUE0={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x2c0) ioctl$USBDEVFS_RESETEP(r0, 0x550b, &(0x7f0000000080)) 06:55:30 executing program 1: setsockopt$MRT6_ASSERT(0xffffffffffffffff, 0x29, 0xcf, &(0x7f0000000040)=0x1, 0x4) (async) r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x66, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x802c550a, &(0x7f0000000200)=@urb_type_bulk={0x3, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 06:55:30 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x802c550a, &(0x7f0000000140)=@urb_type_iso={0x0, {}, 0x0, 0x0, &(0x7f0000000080), 0x0, 0x0, 0x0, 0x2b, 0x0, 0x0, 0x0, [{0x8, 0x5, 0x100}, {0x40, 0x5, 0x3}, {0x8000, 0x5, 0x1}, {0x8, 0x2, 0x7f}, {0x9, 0x0, 0x4d}, {0x9, 0x8b88, 0x1}, {0x81, 0x5, 0x3ff}, {0xffffffff, 0xfffffff7, 0x5}, {0x7fffffff, 0x417, 0x40}, {0x401, 0x1, 0x950}, {0x6, 0xfff, 0x4}, {0x0, 0x8, 0x8}, {0xcd6fcee5, 0x4, 0xffffffff}, {0x7, 0x9, 0x9}, {0x3230fea4, 0x1ff, 0x401}, {0xf3d, 0xad, 0x2}, {0x7, 0x5, 0x8}, {0x800, 0xfffffffd, 0xff}, {0x5, 0x3, 0x7}, {0x7fffffff, 0x101, 0x1ff}, {0x11bb7e2, 0xe52}, {0x1, 0xffffffff, 0x7}, {0x3, 0x0, 0x4}, {0x1f, 0x80, 0x6}, {0x80, 0x9a, 0x1}, {0x3, 0xffff, 0xffff}, {0x81, 0x3, 0x8}, {0x0, 0x8, 0x400}, {0xfffffe01, 0x100, 0xf55}, {0x10001, 0xff, 0x7}, {0x2, 0x80000001, 0x7}, {0x4, 0xc708, 0x3ff}, {0x1, 0x7, 0x3}, {0x339, 0x8, 0x2}, {0x101, 0xffffffff, 0x10001}, {0x3, 0xff, 0x3}, {0x6b, 0xb0f, 0x5}, {0x7ff, 0x9, 0x7de5}, {0x80000001, 0x7f, 0x2}, {0x8, 0x6}, {0x3, 0x8001, 0x3ff}, {0x4, 0x5, 0x5d}, {0x75d23712, 0x8, 0x6}]}) 06:55:30 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x40085511, &(0x7f0000000200)=@urb_type_bulk={0x2, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 06:55:30 executing program 0: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f0000000200)=@urb_type_control={0x2, {0x2}, 0xfffffffb, 0x4, &(0x7f0000000a40)={0x0, 0x16, 0x2005, 0x7, 0x8}, 0x8, 0xf8, 0x7, 0x0, 0x0, 0x5, &(0x7f0000000a80)="cfc206af3b20cc76f92c2426377a243c9d8d6008fafd2fd67138c6b064102eec84099eccfeb5a4b8a5f3f11f2b3a7efc7bb159fd9e2cfe9dfc7021a27eef2f1b8a14ae37ef3f5850a71385fa82e17ca63c6617a30e1bc3576e8ee08aac39ab0a21c7d06379bcc8bd197b3c4706285c7606cc6c43a9f9a4485fa40997c39a4da54d472ef5eb63dbcb91c23e669d6e8836e2269a1d466533236ed3bd"}) [ 2897.627171][T12419] FAULT_INJECTION: forcing a failure. [ 2897.627171][T12419] name failslab, interval 1, probability 0, space 0, times 0 [ 2897.654735][T12419] CPU: 0 PID: 12419 Comm: syz-executor.4 Not tainted 5.4.233-syzkaller-00019-gd5ed2ca98e48 #0 [ 2897.664981][T12419] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/14/2023 06:55:30 executing program 0: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f0000000200)=@urb_type_control={0x2, {0x2}, 0xfffffffb, 0x4, &(0x7f0000000a40)={0x0, 0x16, 0x2005, 0x7, 0x8}, 0x8, 0xf8, 0x7, 0x0, 0x0, 0x5, &(0x7f0000000a80)="cfc206af3b20cc76f92c2426377a243c9d8d6008fafd2fd67138c6b064102eec84099eccfeb5a4b8a5f3f11f2b3a7efc7bb159fd9e2cfe9dfc7021a27eef2f1b8a14ae37ef3f5850a71385fa82e17ca63c6617a30e1bc3576e8ee08aac39ab0a21c7d06379bcc8bd197b3c4706285c7606cc6c43a9f9a4485fa40997c39a4da54d472ef5eb63dbcb91c23e669d6e8836e2269a1d466533236ed3bd"}) 06:55:30 executing program 0: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f0000000200)=@urb_type_control={0x2, {0x2}, 0xfffffffb, 0x4, &(0x7f0000000a40)={0x80, 0x0, 0x2005, 0x7, 0x8}, 0x8, 0xf8, 0x7, 0x0, 0x0, 0x5, &(0x7f0000000a80)="cfc206af3b20cc76f92c2426377a243c9d8d6008fafd2fd67138c6b064102eec84099eccfeb5a4b8a5f3f11f2b3a7efc7bb159fd9e2cfe9dfc7021a27eef2f1b8a14ae37ef3f5850a71385fa82e17ca63c6617a30e1bc3576e8ee08aac39ab0a21c7d06379bcc8bd197b3c4706285c7606cc6c43a9f9a4485fa40997c39a4da54d472ef5eb63dbcb91c23e669d6e8836e2269a1d466533236ed3bd"}) 06:55:30 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x40086602, &(0x7f0000000200)=@urb_type_bulk={0x2, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 06:55:30 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x40087602, &(0x7f0000000200)=@urb_type_bulk={0x2, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) [ 2897.675024][T12419] Call Trace: [ 2897.678312][T12419] dump_stack+0x1d8/0x241 [ 2897.682634][T12419] ? panic+0x768/0x768 [ 2897.686701][T12419] ? nf_ct_l4proto_log_invalid+0x258/0x258 [ 2897.692508][T12419] should_fail+0x71f/0x880 [ 2897.696924][T12419] ? setup_fault_attr+0x3d0/0x3d0 [ 2897.701941][T12419] ? mempool_init_node+0x133/0x4e0 [ 2897.707044][T12419] should_failslab+0x5/0x20 [ 2897.711538][T12419] __kmalloc+0x51/0x2b0 [ 2897.715687][T12419] ? kmem_cache_alloc+0xd0/0x220 [ 2897.720617][T12419] mempool_init_node+0x133/0x4e0 06:55:30 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x802c550a, &(0x7f0000000140)=@urb_type_iso={0x0, {}, 0x0, 0x0, &(0x7f0000000080), 0x0, 0x0, 0x0, 0x2a, 0x0, 0x0, 0x0, [{0x8, 0x5, 0x100}, {0x40, 0x5, 0x3}, {0x8000, 0x5, 0x1}, {0x8, 0x2, 0x7f}, {0x9, 0x0, 0x4d}, {0x9, 0x8b88, 0x1}, {0x81, 0x5, 0x3ff}, {0xffffffff, 0xfffffff7, 0x5}, {0x7fffffff, 0x417, 0x40}, {0x401, 0x1, 0x950}, {0x6, 0xfff, 0x4}, {0x0, 0x8, 0x8}, {0xcd6fcee5, 0x4, 0xffffffff}, {0x7, 0x9, 0x9}, {0x3230fea4, 0x1ff, 0x401}, {0xf3d, 0xad, 0x2}, {0x7, 0x5, 0x8}, {0x800, 0xfffffffd, 0xff}, {0x5, 0x3, 0x7}, {0x7fffffff, 0x101, 0x1ff}, {0x11bb7e2, 0xe52}, {0x1, 0xffffffff, 0x7}, {0x3, 0x0, 0x4}, {0x1f, 0x80, 0x6}, {0x80, 0x9a, 0x1}, {0x3, 0xffff, 0xffff}, {0x81, 0x3, 0x8}, {0x0, 0x8, 0x400}, {0xfffffe01, 0x100, 0xf55}, {0x10001, 0xff, 0x7}, {0x2, 0x80000001, 0x7}, {0x4, 0xc708, 0x3ff}, {0x1, 0x7, 0x3}, {0x339, 0x8, 0x2}, {0x101, 0xffffffff, 0x10001}, {0x3, 0xff, 0x3}, {0x6b, 0xb0f, 0x5}, {0x7ff, 0x9, 0x7de5}, {0x80000001, 0x7f, 0x2}, {0x8, 0x6}, {0x3, 0x8001, 0x3ff}, {0x4, 0x5, 0x5d}]}) [ 2897.725554][T12419] ? mempool_free+0x380/0x380 [ 2897.730220][T12419] ? mempool_alloc_slab+0x20/0x20 [ 2897.735239][T12419] mempool_init+0x35/0x50 [ 2897.739592][T12419] bioset_init+0x4d8/0x600 [ 2897.744001][T12419] blk_alloc_queue_node+0xc5/0x580 [ 2897.749103][T12419] ? blk_mq_alloc_tag_set+0x67d/0x890 [ 2897.754463][T12419] blk_mq_init_queue+0x34/0xa0 [ 2897.759212][T12419] loop_add+0x25c/0x740 [ 2897.763337][T12419] ? get_pid_task+0xc3/0xf0 [ 2897.767809][T12419] ? radix_tree_lookup+0x16f/0x1c0 [ 2897.772888][T12419] loop_control_ioctl+0x448/0x620 [ 2897.777882][T12419] ? loop_remove+0xa0/0xa0 [ 2897.782269][T12419] ? memset+0x1f/0x40 [ 2897.786216][T12419] ? fsnotify+0x1280/0x1340 [ 2897.790685][T12419] ? loop_remove+0xa0/0xa0 [ 2897.795070][T12419] do_vfs_ioctl+0x742/0x1720 [ 2897.799631][T12419] ? ioctl_preallocate+0x250/0x250 [ 2897.804713][T12419] ? __fget+0x407/0x490 [ 2897.808834][T12419] ? fget_many+0x20/0x20 [ 2897.813043][T12419] ? debug_smp_processor_id+0x20/0x20 [ 2897.818384][T12419] ? security_file_ioctl+0x7d/0xa0 [ 2897.823482][T12419] __x64_sys_ioctl+0xd4/0x110 06:55:30 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) (fail_nth: 16) 06:55:30 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040)=@security={'security\x00', 0xe, 0x4, 0x260, 0xffffffff, 0x180, 0xc0, 0xc0, 0xffffffff, 0xffffffff, 0x288, 0x288, 0x288, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x70, 0x98}, @common=@inet=@SET1={0x28}}, {{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@STANDARD={0x28}}, {{@ip={@rand_addr, @broadcast, 0x0, 0x0, 'batadv_slave_0\x00', 'ip_vti0\x00'}, 0x0, 0x70, 0x98}, @common=@unspec=@NFQUEUE0={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x2c0) ioctl$USBDEVFS_RESETEP(r0, 0x5514, &(0x7f0000000080)) 06:55:30 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x802c550a, &(0x7f0000000140)=@urb_type_iso={0x0, {}, 0x0, 0x0, &(0x7f0000000080), 0x0, 0x0, 0x0, 0x29, 0x0, 0x0, 0x0, [{0x8, 0x5, 0x100}, {0x40, 0x5, 0x3}, {0x8000, 0x5, 0x1}, {0x8, 0x2, 0x7f}, {0x9, 0x0, 0x4d}, {0x9, 0x8b88, 0x1}, {0x81, 0x5, 0x3ff}, {0xffffffff, 0xfffffff7, 0x5}, {0x7fffffff, 0x417, 0x40}, {0x401, 0x1, 0x950}, {0x6, 0xfff, 0x4}, {0x0, 0x8, 0x8}, {0xcd6fcee5, 0x4, 0xffffffff}, {0x7, 0x9, 0x9}, {0x3230fea4, 0x1ff, 0x401}, {0xf3d, 0xad, 0x2}, {0x7, 0x5, 0x8}, {0x800, 0xfffffffd, 0xff}, {0x5, 0x3, 0x7}, {0x7fffffff, 0x101, 0x1ff}, {0x11bb7e2, 0xe52}, {0x1, 0xffffffff, 0x7}, {0x3, 0x0, 0x4}, {0x1f, 0x80, 0x6}, {0x80, 0x9a, 0x1}, {0x3, 0xffff, 0xffff}, {0x81, 0x3, 0x8}, {0x0, 0x8, 0x400}, {0xfffffe01, 0x100, 0xf55}, {0x10001, 0xff, 0x7}, {0x2, 0x80000001, 0x7}, {0x4, 0xc708, 0x3ff}, {0x1, 0x7, 0x3}, {0x339, 0x8, 0x2}, {0x101, 0xffffffff, 0x10001}, {0x3, 0xff, 0x3}, {0x6b, 0xb0f, 0x5}, {0x7ff, 0x9, 0x7de5}, {0x80000001, 0x7f, 0x2}, {0x8, 0x6}, {0x3, 0x8001, 0x3ff}]}) 06:55:30 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x4020940d, &(0x7f0000000200)=@urb_type_bulk={0x2, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 06:55:30 executing program 0: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f0000000200)=@urb_type_control={0x2, {0x2}, 0xfffffffb, 0x4, &(0x7f0000000a40)={0x80, 0x0, 0x2005, 0x7, 0x8}, 0x8, 0xf8, 0x7, 0x0, 0x0, 0x5, &(0x7f0000000a80)="cfc206af3b20cc76f92c2426377a243c9d8d6008fafd2fd67138c6b064102eec84099eccfeb5a4b8a5f3f11f2b3a7efc7bb159fd9e2cfe9dfc7021a27eef2f1b8a14ae37ef3f5850a71385fa82e17ca63c6617a30e1bc3576e8ee08aac39ab0a21c7d06379bcc8bd197b3c4706285c7606cc6c43a9f9a4485fa40997c39a4da54d472ef5eb63dbcb91c23e669d6e8836e2269a1d466533236ed3bd"}) 06:55:30 executing program 1: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x802c550a, &(0x7f0000000200)=@urb_type_bulk={0x3, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$USBDEVFS_FORBID_SUSPEND(r0, 0x5521) 06:55:30 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040)=@security={'security\x00', 0xe, 0x4, 0x260, 0xffffffff, 0x180, 0xc0, 0xc0, 0xffffffff, 0xffffffff, 0x288, 0x288, 0x288, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x70, 0x98}, @common=@inet=@SET1={0x28}}, {{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@STANDARD={0x28}}, {{@ip={@rand_addr, @broadcast, 0x0, 0x0, 'batadv_slave_0\x00', 'ip_vti0\x00'}, 0x0, 0x70, 0x98}, @common=@unspec=@NFQUEUE0={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x2c0) ioctl$USBDEVFS_RESETEP(r0, 0x551f, &(0x7f0000000080)) 06:55:30 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x41045508, &(0x7f0000000200)=@urb_type_bulk={0x2, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 06:55:30 executing program 1: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x802c550a, &(0x7f0000000200)=@urb_type_bulk={0x3, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$USBDEVFS_FORBID_SUSPEND(r0, 0x5521) [ 2897.828130][T12419] do_syscall_64+0xca/0x1c0 [ 2897.832601][T12419] entry_SYSCALL_64_after_hwframe+0x5c/0xc1 06:55:30 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x802c550a, &(0x7f0000000140)=@urb_type_iso={0x0, {}, 0x0, 0x0, &(0x7f0000000080), 0x0, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, [{0x8, 0x5, 0x100}, {0x40, 0x5, 0x3}, {0x8000, 0x5, 0x1}, {0x8, 0x2, 0x7f}, {0x9, 0x0, 0x4d}, {0x9, 0x8b88, 0x1}, {0x81, 0x5, 0x3ff}, {0xffffffff, 0xfffffff7, 0x5}, {0x7fffffff, 0x417, 0x40}, {0x401, 0x1, 0x950}, {0x6, 0xfff, 0x4}, {0x0, 0x8, 0x8}, {0xcd6fcee5, 0x4, 0xffffffff}, {0x7, 0x9, 0x9}, {0x3230fea4, 0x1ff, 0x401}, {0xf3d, 0xad, 0x2}, {0x7, 0x5, 0x8}, {0x800, 0xfffffffd, 0xff}, {0x5, 0x3, 0x7}, {0x7fffffff, 0x101, 0x1ff}, {0x11bb7e2, 0xe52}, {0x1, 0xffffffff, 0x7}, {0x3, 0x0, 0x4}, {0x1f, 0x80, 0x6}, {0x80, 0x9a, 0x1}, {0x3, 0xffff, 0xffff}, {0x81, 0x3, 0x8}, {0x0, 0x8, 0x400}, {0xfffffe01, 0x100, 0xf55}, {0x10001, 0xff, 0x7}, {0x2, 0x80000001, 0x7}, {0x4, 0xc708, 0x3ff}, {0x1, 0x7, 0x3}, {0x339, 0x8, 0x2}, {0x101, 0xffffffff, 0x10001}, {0x3, 0xff, 0x3}, {0x6b, 0xb0f, 0x5}, {0x7ff, 0x9, 0x7de5}, {0x80000001, 0x7f, 0x2}, {0x8, 0x6}]}) 06:55:30 executing program 0: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f0000000200)=@urb_type_control={0x2, {0x2}, 0xfffffffb, 0x4, &(0x7f0000000a40)={0x80, 0x0, 0x2005, 0x7, 0x8}, 0x8, 0xf8, 0x7, 0x0, 0x0, 0x5, &(0x7f0000000a80)="cfc206af3b20cc76f92c2426377a243c9d8d6008fafd2fd67138c6b064102eec84099eccfeb5a4b8a5f3f11f2b3a7efc7bb159fd9e2cfe9dfc7021a27eef2f1b8a14ae37ef3f5850a71385fa82e17ca63c6617a30e1bc3576e8ee08aac39ab0a21c7d06379bcc8bd197b3c4706285c7606cc6c43a9f9a4485fa40997c39a4da54d472ef5eb63dbcb91c23e669d6e8836e2269a1d466533236ed3bd"}) 06:55:30 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040)=@security={'security\x00', 0xe, 0x4, 0x260, 0xffffffff, 0x180, 0xc0, 0xc0, 0xffffffff, 0xffffffff, 0x288, 0x288, 0x288, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x70, 0x98}, @common=@inet=@SET1={0x28}}, {{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@STANDARD={0x28}}, {{@ip={@rand_addr, @broadcast, 0x0, 0x0, 'batadv_slave_0\x00', 'ip_vti0\x00'}, 0x0, 0x70, 0x98}, @common=@unspec=@NFQUEUE0={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x2c0) ioctl$USBDEVFS_RESETEP(r0, 0x5521, &(0x7f0000000080)) [ 2897.881621][T12459] FAULT_INJECTION: forcing a failure. [ 2897.881621][T12459] name failslab, interval 1, probability 0, space 0, times 0 [ 2897.903887][T12459] CPU: 0 PID: 12459 Comm: syz-executor.4 Not tainted 5.4.233-syzkaller-00019-gd5ed2ca98e48 #0 [ 2897.914133][T12459] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/14/2023 [ 2897.924178][T12459] Call Trace: [ 2897.927457][T12459] dump_stack+0x1d8/0x241 [ 2897.931760][T12459] ? panic+0x768/0x768 [ 2897.935797][T12459] ? nf_ct_l4proto_log_invalid+0x258/0x258 [ 2897.941574][T12459] should_fail+0x71f/0x880 [ 2897.945958][T12459] ? setup_fault_attr+0x3d0/0x3d0 [ 2897.950950][T12459] ? mempool_init_node+0x1ec/0x4e0 [ 2897.956028][T12459] should_failslab+0x5/0x20 [ 2897.960503][T12459] kmem_cache_alloc+0x24/0x220 [ 2897.965239][T12459] ? mempool_free+0x380/0x380 [ 2897.969885][T12459] mempool_init_node+0x1ec/0x4e0 [ 2897.974791][T12459] ? mempool_free+0x380/0x380 [ 2897.979454][T12459] ? mempool_alloc_slab+0x20/0x20 [ 2897.984448][T12459] mempool_init+0x35/0x50 [ 2897.988764][T12459] bioset_init+0x4d8/0x600 [ 2897.993248][T12459] blk_alloc_queue_node+0xc5/0x580 [ 2897.998335][T12459] ? blk_mq_alloc_tag_set+0x67d/0x890 [ 2898.003675][T12459] blk_mq_init_queue+0x34/0xa0 [ 2898.008409][T12459] loop_add+0x25c/0x740 [ 2898.012559][T12459] ? get_pid_task+0xc3/0xf0 [ 2898.017030][T12459] ? radix_tree_lookup+0x16f/0x1c0 [ 2898.022119][T12459] loop_control_ioctl+0x448/0x620 [ 2898.027132][T12459] ? loop_remove+0xa0/0xa0 [ 2898.031517][T12459] ? memset+0x1f/0x40 [ 2898.035467][T12459] ? fsnotify+0x1280/0x1340 [ 2898.039939][T12459] ? loop_remove+0xa0/0xa0 [ 2898.044325][T12459] do_vfs_ioctl+0x742/0x1720 [ 2898.048891][T12459] ? ioctl_preallocate+0x250/0x250 [ 2898.053992][T12459] ? __fget+0x407/0x490 [ 2898.058116][T12459] ? fget_many+0x20/0x20 [ 2898.062326][T12459] ? debug_smp_processor_id+0x20/0x20 [ 2898.067672][T12459] ? security_file_ioctl+0x7d/0xa0 [ 2898.072754][T12459] __x64_sys_ioctl+0xd4/0x110 [ 2898.077404][T12459] do_syscall_64+0xca/0x1c0 06:55:30 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) (fail_nth: 17) 06:55:30 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x80045503, &(0x7f0000000200)=@urb_type_bulk={0x2, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 06:55:30 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x802c550a, &(0x7f0000000140)=@urb_type_iso={0x0, {}, 0x0, 0x0, &(0x7f0000000080), 0x0, 0x0, 0x0, 0x27, 0x0, 0x0, 0x0, [{0x8, 0x5, 0x100}, {0x40, 0x5, 0x3}, {0x8000, 0x5, 0x1}, {0x8, 0x2, 0x7f}, {0x9, 0x0, 0x4d}, {0x9, 0x8b88, 0x1}, {0x81, 0x5, 0x3ff}, {0xffffffff, 0xfffffff7, 0x5}, {0x7fffffff, 0x417, 0x40}, {0x401, 0x1, 0x950}, {0x6, 0xfff, 0x4}, {0x0, 0x8, 0x8}, {0xcd6fcee5, 0x4, 0xffffffff}, {0x7, 0x9, 0x9}, {0x3230fea4, 0x1ff, 0x401}, {0xf3d, 0xad, 0x2}, {0x7, 0x5, 0x8}, {0x800, 0xfffffffd, 0xff}, {0x5, 0x3, 0x7}, {0x7fffffff, 0x101, 0x1ff}, {0x11bb7e2, 0xe52}, {0x1, 0xffffffff, 0x7}, {0x3, 0x0, 0x4}, {0x1f, 0x80, 0x6}, {0x80, 0x9a, 0x1}, {0x3, 0xffff, 0xffff}, {0x81, 0x3, 0x8}, {0x0, 0x8, 0x400}, {0xfffffe01, 0x100, 0xf55}, {0x10001, 0xff, 0x7}, {0x2, 0x80000001, 0x7}, {0x4, 0xc708, 0x3ff}, {0x1, 0x7, 0x3}, {0x339, 0x8, 0x2}, {0x101, 0xffffffff, 0x10001}, {0x3, 0xff, 0x3}, {0x6b, 0xb0f, 0x5}, {0x7ff, 0x9, 0x7de5}, {0x80000001, 0x7f, 0x2}]}) 06:55:30 executing program 0: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f0000000200)=@urb_type_control={0x2, {0x2}, 0xfffffffb, 0x4, &(0x7f0000000a40)={0x80, 0x16, 0x0, 0x7, 0x8}, 0x8, 0xf8, 0x7, 0x0, 0x0, 0x5, &(0x7f0000000a80)="cfc206af3b20cc76f92c2426377a243c9d8d6008fafd2fd67138c6b064102eec84099eccfeb5a4b8a5f3f11f2b3a7efc7bb159fd9e2cfe9dfc7021a27eef2f1b8a14ae37ef3f5850a71385fa82e17ca63c6617a30e1bc3576e8ee08aac39ab0a21c7d06379bcc8bd197b3c4706285c7606cc6c43a9f9a4485fa40997c39a4da54d472ef5eb63dbcb91c23e669d6e8836e2269a1d466533236ed3bd"}) 06:55:30 executing program 1: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x802c550a, &(0x7f0000000200)=@urb_type_bulk={0x3, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) (async) ioctl$USBDEVFS_FORBID_SUSPEND(r0, 0x5521) 06:55:30 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040)=@security={'security\x00', 0xe, 0x4, 0x260, 0xffffffff, 0x180, 0xc0, 0xc0, 0xffffffff, 0xffffffff, 0x288, 0x288, 0x288, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x70, 0x98}, @common=@inet=@SET1={0x28}}, {{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@STANDARD={0x28}}, {{@ip={@rand_addr, @broadcast, 0x0, 0x0, 'batadv_slave_0\x00', 'ip_vti0\x00'}, 0x0, 0x70, 0x98}, @common=@unspec=@NFQUEUE0={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x2c0) ioctl$USBDEVFS_RESETEP(r0, 0x5522, &(0x7f0000000080)) 06:55:30 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040)=@security={'security\x00', 0xe, 0x4, 0x260, 0xffffffff, 0x180, 0xc0, 0xc0, 0xffffffff, 0xffffffff, 0x288, 0x288, 0x288, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x70, 0x98}, @common=@inet=@SET1={0x28}}, {{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@STANDARD={0x28}}, {{@ip={@rand_addr, @broadcast, 0x0, 0x0, 'batadv_slave_0\x00', 'ip_vti0\x00'}, 0x0, 0x70, 0x98}, @common=@unspec=@NFQUEUE0={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x2c0) ioctl$USBDEVFS_RESETEP(r0, 0x5523, &(0x7f0000000080)) 06:55:30 executing program 0: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f0000000200)=@urb_type_control={0x2, {0x2}, 0xfffffffb, 0x4, &(0x7f0000000a40)={0x80, 0x16, 0x0, 0x7, 0x8}, 0x8, 0xf8, 0x7, 0x0, 0x0, 0x5, &(0x7f0000000a80)="cfc206af3b20cc76f92c2426377a243c9d8d6008fafd2fd67138c6b064102eec84099eccfeb5a4b8a5f3f11f2b3a7efc7bb159fd9e2cfe9dfc7021a27eef2f1b8a14ae37ef3f5850a71385fa82e17ca63c6617a30e1bc3576e8ee08aac39ab0a21c7d06379bcc8bd197b3c4706285c7606cc6c43a9f9a4485fa40997c39a4da54d472ef5eb63dbcb91c23e669d6e8836e2269a1d466533236ed3bd"}) 06:55:30 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x80045505, &(0x7f0000000200)=@urb_type_bulk={0x2, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) [ 2898.081876][T12459] entry_SYSCALL_64_after_hwframe+0x5c/0xc1 06:55:30 executing program 1: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x802c550a, &(0x7f0000000240)=@urb_type_iso={0x0, {0xa}, 0x400, 0x3, &(0x7f0000000040)="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", 0xfd, 0x20, 0x9, 0x14, 0x800, 0x8, &(0x7f0000000140), [{0x5, 0x2, 0x7fff}, {0x0, 0x4, 0x4373}, {0x2e7, 0xff, 0x7}, {0x1, 0x8, 0x8001}, {0x20, 0xd7, 0x1f}, {0x8, 0x2, 0xa4}, {0x7, 0x800, 0x5}, {0xe52, 0x1ff, 0xfffffffc}, {0x6, 0x8000, 0xff}, {0x2, 0x9, 0x44}, {0x7, 0x3ff, 0x8}, {0x2, 0xffffffff, 0x3ff}, {0x7, 0xffffffff, 0x3ff}, {0x7, 0x40, 0x7}, {0xff, 0x9, 0x9}, {0x800, 0x6, 0x7fffffff}, {0x6, 0xde, 0x800}, {0xb389, 0xffffffff, 0xfffffffe}, {0x9, 0xe80, 0x3}, {0xfff, 0xffffffff, 0x7}]}) 06:55:30 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040)=@security={'security\x00', 0xe, 0x4, 0x260, 0xffffffff, 0x180, 0xc0, 0xc0, 0xffffffff, 0xffffffff, 0x288, 0x288, 0x288, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x70, 0x98}, @common=@inet=@SET1={0x28}}, {{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@STANDARD={0x28}}, {{@ip={@rand_addr, @broadcast, 0x0, 0x0, 'batadv_slave_0\x00', 'ip_vti0\x00'}, 0x0, 0x70, 0x98}, @common=@unspec=@NFQUEUE0={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x2c0) ioctl$USBDEVFS_RESETEP(r0, 0x4004550c, &(0x7f0000000080)) 06:55:30 executing program 0: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f0000000200)=@urb_type_control={0x2, {0x2}, 0xfffffffb, 0x4, &(0x7f0000000a40)={0x80, 0x16, 0x0, 0x7, 0x8}, 0x8, 0xf8, 0x7, 0x0, 0x0, 0x5, &(0x7f0000000a80)="cfc206af3b20cc76f92c2426377a243c9d8d6008fafd2fd67138c6b064102eec84099eccfeb5a4b8a5f3f11f2b3a7efc7bb159fd9e2cfe9dfc7021a27eef2f1b8a14ae37ef3f5850a71385fa82e17ca63c6617a30e1bc3576e8ee08aac39ab0a21c7d06379bcc8bd197b3c4706285c7606cc6c43a9f9a4485fa40997c39a4da54d472ef5eb63dbcb91c23e669d6e8836e2269a1d466533236ed3bd"}) [ 2898.137901][T12490] usb usb8: usbfs: interface 0 claimed by hub while 'syz-executor.2' sets config #2 [ 2898.147547][T12483] FAULT_INJECTION: forcing a failure. [ 2898.147547][T12483] name failslab, interval 1, probability 0, space 0, times 0 [ 2898.162924][T12483] CPU: 0 PID: 12483 Comm: syz-executor.4 Not tainted 5.4.233-syzkaller-00019-gd5ed2ca98e48 #0 [ 2898.173246][T12483] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/14/2023 [ 2898.183285][T12483] Call Trace: [ 2898.186555][T12483] dump_stack+0x1d8/0x241 [ 2898.190856][T12483] ? panic+0x768/0x768 [ 2898.194897][T12483] ? nf_ct_l4proto_log_invalid+0x258/0x258 [ 2898.200673][T12483] should_fail+0x71f/0x880 [ 2898.205064][T12483] ? setup_fault_attr+0x3d0/0x3d0 [ 2898.210058][T12483] ? mempool_init_node+0x1ec/0x4e0 [ 2898.215137][T12483] should_failslab+0x5/0x20 [ 2898.219623][T12483] kmem_cache_alloc+0x24/0x220 [ 2898.224362][T12483] ? mempool_free+0x380/0x380 [ 2898.229008][T12483] mempool_init_node+0x1ec/0x4e0 [ 2898.233914][T12483] ? mempool_free+0x380/0x380 [ 2898.238558][T12483] ? mempool_alloc_slab+0x20/0x20 [ 2898.243555][T12483] mempool_init+0x35/0x50 [ 2898.247882][T12483] bioset_init+0x4d8/0x600 [ 2898.252272][T12483] blk_alloc_queue_node+0xc5/0x580 [ 2898.257357][T12483] ? blk_mq_alloc_tag_set+0x67d/0x890 [ 2898.262702][T12483] blk_mq_init_queue+0x34/0xa0 [ 2898.267436][T12483] loop_add+0x25c/0x740 [ 2898.271569][T12483] ? get_pid_task+0xc3/0xf0 [ 2898.276050][T12483] ? radix_tree_lookup+0x16f/0x1c0 [ 2898.281142][T12483] loop_control_ioctl+0x448/0x620 [ 2898.286139][T12483] ? loop_remove+0xa0/0xa0 [ 2898.290529][T12483] ? memset+0x1f/0x40 [ 2898.294537][T12483] ? fsnotify+0x1280/0x1340 [ 2898.299042][T12483] ? loop_remove+0xa0/0xa0 [ 2898.303450][T12483] do_vfs_ioctl+0x742/0x1720 [ 2898.308015][T12483] ? ioctl_preallocate+0x250/0x250 [ 2898.313097][T12483] ? __fget+0x407/0x490 [ 2898.317244][T12483] ? fget_many+0x20/0x20 [ 2898.321464][T12483] ? debug_smp_processor_id+0x20/0x20 [ 2898.326808][T12483] ? security_file_ioctl+0x7d/0xa0 [ 2898.331887][T12483] __x64_sys_ioctl+0xd4/0x110 06:55:31 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) (fail_nth: 18) 06:55:31 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x802c550a, &(0x7f0000000140)=@urb_type_iso={0x0, {}, 0x0, 0x0, &(0x7f0000000080), 0x0, 0x0, 0x0, 0x26, 0x0, 0x0, 0x0, [{0x8, 0x5, 0x100}, {0x40, 0x5, 0x3}, {0x8000, 0x5, 0x1}, {0x8, 0x2, 0x7f}, {0x9, 0x0, 0x4d}, {0x9, 0x8b88, 0x1}, {0x81, 0x5, 0x3ff}, {0xffffffff, 0xfffffff7, 0x5}, {0x7fffffff, 0x417, 0x40}, {0x401, 0x1, 0x950}, {0x6, 0xfff, 0x4}, {0x0, 0x8, 0x8}, {0xcd6fcee5, 0x4, 0xffffffff}, {0x7, 0x9, 0x9}, {0x3230fea4, 0x1ff, 0x401}, {0xf3d, 0xad, 0x2}, {0x7, 0x5, 0x8}, {0x800, 0xfffffffd, 0xff}, {0x5, 0x3, 0x7}, {0x7fffffff, 0x101, 0x1ff}, {0x11bb7e2, 0xe52}, {0x1, 0xffffffff, 0x7}, {0x3, 0x0, 0x4}, {0x1f, 0x80, 0x6}, {0x80, 0x9a, 0x1}, {0x3, 0xffff, 0xffff}, {0x81, 0x3, 0x8}, {0x0, 0x8, 0x400}, {0xfffffe01, 0x100, 0xf55}, {0x10001, 0xff, 0x7}, {0x2, 0x80000001, 0x7}, {0x4, 0xc708, 0x3ff}, {0x1, 0x7, 0x3}, {0x339, 0x8, 0x2}, {0x101, 0xffffffff, 0x10001}, {0x3, 0xff, 0x3}, {0x6b, 0xb0f, 0x5}, {0x7ff, 0x9, 0x7de5}]}) 06:55:31 executing program 0: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f0000000200)=@urb_type_control={0x2, {0x2}, 0xfffffffb, 0x4, &(0x7f0000000a40)={0x80, 0x16, 0x2005, 0x0, 0x8}, 0x8, 0xf8, 0x7, 0x0, 0x0, 0x5, &(0x7f0000000a80)="cfc206af3b20cc76f92c2426377a243c9d8d6008fafd2fd67138c6b064102eec84099eccfeb5a4b8a5f3f11f2b3a7efc7bb159fd9e2cfe9dfc7021a27eef2f1b8a14ae37ef3f5850a71385fa82e17ca63c6617a30e1bc3576e8ee08aac39ab0a21c7d06379bcc8bd197b3c4706285c7606cc6c43a9f9a4485fa40997c39a4da54d472ef5eb63dbcb91c23e669d6e8836e2269a1d466533236ed3bd"}) 06:55:31 executing program 1: syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) (async) r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x802c550a, &(0x7f0000000240)=@urb_type_iso={0x0, {0xa}, 0x400, 0x3, &(0x7f0000000040)="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", 0xfd, 0x20, 0x9, 0x14, 0x800, 0x8, &(0x7f0000000140), [{0x5, 0x2, 0x7fff}, {0x0, 0x4, 0x4373}, {0x2e7, 0xff, 0x7}, {0x1, 0x8, 0x8001}, {0x20, 0xd7, 0x1f}, {0x8, 0x2, 0xa4}, {0x7, 0x800, 0x5}, {0xe52, 0x1ff, 0xfffffffc}, {0x6, 0x8000, 0xff}, {0x2, 0x9, 0x44}, {0x7, 0x3ff, 0x8}, {0x2, 0xffffffff, 0x3ff}, {0x7, 0xffffffff, 0x3ff}, {0x7, 0x40, 0x7}, {0xff, 0x9, 0x9}, {0x800, 0x6, 0x7fffffff}, {0x6, 0xde, 0x800}, {0xb389, 0xffffffff, 0xfffffffe}, {0x9, 0xe80, 0x3}, {0xfff, 0xffffffff, 0x7}]}) 06:55:31 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x8004550f, &(0x7f0000000200)=@urb_type_bulk={0x2, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 06:55:31 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x80045510, &(0x7f0000000200)=@urb_type_bulk={0x2, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 06:55:31 executing program 0: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f0000000200)=@urb_type_control={0x2, {0x2}, 0xfffffffb, 0x4, &(0x7f0000000a40)={0x80, 0x16, 0x2005, 0x0, 0x8}, 0x8, 0xf8, 0x7, 0x0, 0x0, 0x5, &(0x7f0000000a80)="cfc206af3b20cc76f92c2426377a243c9d8d6008fafd2fd67138c6b064102eec84099eccfeb5a4b8a5f3f11f2b3a7efc7bb159fd9e2cfe9dfc7021a27eef2f1b8a14ae37ef3f5850a71385fa82e17ca63c6617a30e1bc3576e8ee08aac39ab0a21c7d06379bcc8bd197b3c4706285c7606cc6c43a9f9a4485fa40997c39a4da54d472ef5eb63dbcb91c23e669d6e8836e2269a1d466533236ed3bd"}) 06:55:31 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x802c550a, &(0x7f0000000140)=@urb_type_iso={0x0, {}, 0x0, 0x0, &(0x7f0000000080), 0x0, 0x0, 0x0, 0x25, 0x0, 0x0, 0x0, [{0x8, 0x5, 0x100}, {0x40, 0x5, 0x3}, {0x8000, 0x5, 0x1}, {0x8, 0x2, 0x7f}, {0x9, 0x0, 0x4d}, {0x9, 0x8b88, 0x1}, {0x81, 0x5, 0x3ff}, {0xffffffff, 0xfffffff7, 0x5}, {0x7fffffff, 0x417, 0x40}, {0x401, 0x1, 0x950}, {0x6, 0xfff, 0x4}, {0x0, 0x8, 0x8}, {0xcd6fcee5, 0x4, 0xffffffff}, {0x7, 0x9, 0x9}, {0x3230fea4, 0x1ff, 0x401}, {0xf3d, 0xad, 0x2}, {0x7, 0x5, 0x8}, {0x800, 0xfffffffd, 0xff}, {0x5, 0x3, 0x7}, {0x7fffffff, 0x101, 0x1ff}, {0x11bb7e2, 0xe52}, {0x1, 0xffffffff, 0x7}, {0x3, 0x0, 0x4}, {0x1f, 0x80, 0x6}, {0x80, 0x9a, 0x1}, {0x3, 0xffff, 0xffff}, {0x81, 0x3, 0x8}, {0x0, 0x8, 0x400}, {0xfffffe01, 0x100, 0xf55}, {0x10001, 0xff, 0x7}, {0x2, 0x80000001, 0x7}, {0x4, 0xc708, 0x3ff}, {0x1, 0x7, 0x3}, {0x339, 0x8, 0x2}, {0x101, 0xffffffff, 0x10001}, {0x3, 0xff, 0x3}, {0x6b, 0xb0f, 0x5}]}) 06:55:31 executing program 1: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x802c550a, &(0x7f0000000240)=@urb_type_iso={0x0, {0xa}, 0x400, 0x3, &(0x7f0000000040)="8cfd6d93d369f6856fa755dee26709673f2e73e9f82d64402a289ba514f4fa6a78a12013c7bab15f736db8034820f02a50e3786887530aad4ef809810aa2e4c08a3c8c76937a52af879aea684e014f04c99b66f34d78ed32d05acc4a919af74941655ffafbd2c4aedcc8058bb71ed0f3a7ae1920da2b671c58afbf696a8dfeed46be22e92090ec613da4b6e6adf5e2e05a0aa331ee507ec11d02e194bce50e6cb550fa68fb8669eafa860318418286a0b175027b82d0e0a89449384b292a5e28f68a03246c27f91bb9f54df78ecd62409f9fd5196cf9cc645e7b0342373754557f6f44e45d600593c7c61168f0f05185dd9d510ab6b1d18d62472f7666", 0xfd, 0x20, 0x9, 0x14, 0x800, 0x8, &(0x7f0000000140), [{0x5, 0x2, 0x7fff}, {0x0, 0x4, 0x4373}, {0x2e7, 0xff, 0x7}, {0x1, 0x8, 0x8001}, {0x20, 0xd7, 0x1f}, {0x8, 0x2, 0xa4}, {0x7, 0x800, 0x5}, {0xe52, 0x1ff, 0xfffffffc}, {0x6, 0x8000, 0xff}, {0x2, 0x9, 0x44}, {0x7, 0x3ff, 0x8}, {0x2, 0xffffffff, 0x3ff}, {0x7, 0xffffffff, 0x3ff}, {0x7, 0x40, 0x7}, {0xff, 0x9, 0x9}, {0x800, 0x6, 0x7fffffff}, {0x6, 0xde, 0x800}, {0xb389, 0xffffffff, 0xfffffffe}, {0x9, 0xe80, 0x3}, {0xfff, 0xffffffff, 0x7}]}) [ 2898.336534][T12483] do_syscall_64+0xca/0x1c0 [ 2898.341009][T12483] entry_SYSCALL_64_after_hwframe+0x5c/0xc1 [ 2898.371662][T12507] FAULT_INJECTION: forcing a failure. [ 2898.371662][T12507] name failslab, interval 1, probability 0, space 0, times 0 [ 2898.384755][T12507] CPU: 1 PID: 12507 Comm: syz-executor.4 Not tainted 5.4.233-syzkaller-00019-gd5ed2ca98e48 #0 [ 2898.394994][T12507] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/14/2023 [ 2898.405024][T12507] Call Trace: [ 2898.408307][T12507] dump_stack+0x1d8/0x241 [ 2898.412609][T12507] ? panic+0x768/0x768 [ 2898.416647][T12507] ? nf_ct_l4proto_log_invalid+0x258/0x258 [ 2898.422424][T12507] ? mempool_init_node+0x1ec/0x4e0 [ 2898.427539][T12507] should_fail+0x71f/0x880 [ 2898.431924][T12507] ? mempool_init_node+0x3ee/0x4e0 [ 2898.437004][T12507] ? setup_fault_attr+0x3d0/0x3d0 [ 2898.441997][T12507] ? mempool_free+0x380/0x380 [ 2898.446638][T12507] ? mempool_alloc_slab+0x20/0x20 [ 2898.451630][T12507] ? mempool_init+0x35/0x50 [ 2898.456135][T12507] ? bdi_alloc_node+0x69/0xd0 [ 2898.460877][T12507] should_failslab+0x5/0x20 [ 2898.465362][T12507] kmem_cache_alloc_trace+0x28/0x240 [ 2898.470645][T12507] bdi_alloc_node+0x69/0xd0 [ 2898.475252][T12507] blk_alloc_queue_node+0x10c/0x580 [ 2898.480432][T12507] ? blk_mq_alloc_tag_set+0x67d/0x890 [ 2898.485890][T12507] blk_mq_init_queue+0x34/0xa0 [ 2898.490629][T12507] loop_add+0x25c/0x740 [ 2898.494760][T12507] ? get_pid_task+0xc3/0xf0 [ 2898.499257][T12507] ? radix_tree_lookup+0x16f/0x1c0 [ 2898.504340][T12507] loop_control_ioctl+0x448/0x620 [ 2898.509438][T12507] ? loop_remove+0xa0/0xa0 [ 2898.513832][T12507] ? memset+0x1f/0x40 [ 2898.517786][T12507] ? fsnotify+0x1280/0x1340 [ 2898.522256][T12507] ? loop_remove+0xa0/0xa0 [ 2898.526658][T12507] do_vfs_ioctl+0x742/0x1720 [ 2898.531231][T12507] ? ioctl_preallocate+0x250/0x250 06:55:31 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) (fail_nth: 19) [ 2898.536338][T12507] ? __fget+0x407/0x490 [ 2898.540485][T12507] ? fget_many+0x20/0x20 [ 2898.544700][T12507] ? debug_smp_processor_id+0x20/0x20 [ 2898.550041][T12507] ? security_file_ioctl+0x7d/0xa0 [ 2898.555122][T12507] __x64_sys_ioctl+0xd4/0x110 [ 2898.559769][T12507] do_syscall_64+0xca/0x1c0 [ 2898.564241][T12507] entry_SYSCALL_64_after_hwframe+0x5c/0xc1 [ 2898.606522][T12516] FAULT_INJECTION: forcing a failure. [ 2898.606522][T12516] name failslab, interval 1, probability 0, space 0, times 0 [ 2898.619415][T12516] CPU: 1 PID: 12516 Comm: syz-executor.4 Not tainted 5.4.233-syzkaller-00019-gd5ed2ca98e48 #0 [ 2898.629655][T12516] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/14/2023 [ 2898.639685][T12516] Call Trace: [ 2898.642957][T12516] dump_stack+0x1d8/0x241 [ 2898.647279][T12516] ? panic+0x768/0x768 [ 2898.651319][T12516] ? blk_mq_init_queue+0x34/0xa0 [ 2898.656228][T12516] ? nf_ct_l4proto_log_invalid+0x258/0x258 [ 2898.662001][T12516] ? __x64_sys_ioctl+0xd4/0x110 [ 2898.666823][T12516] ? entry_SYSCALL_64_after_hwframe+0x5c/0xc1 [ 2898.672867][T12516] should_fail+0x71f/0x880 [ 2898.677273][T12516] ? setup_fault_attr+0x3d0/0x3d0 [ 2898.682268][T12516] ? bdi_init+0x19e/0xa90 [ 2898.686587][T12516] should_failslab+0x5/0x20 [ 2898.691082][T12516] kmem_cache_alloc_trace+0x28/0x240 [ 2898.696345][T12516] bdi_init+0x19e/0xa90 [ 2898.700470][T12516] ? bdi_alloc_node+0x69/0xd0 [ 2898.705117][T12516] bdi_alloc_node+0x79/0xd0 [ 2898.709592][T12516] blk_alloc_queue_node+0x10c/0x580 [ 2898.714936][T12516] ? blk_mq_alloc_tag_set+0x67d/0x890 [ 2898.720385][T12516] blk_mq_init_queue+0x34/0xa0 [ 2898.725139][T12516] loop_add+0x25c/0x740 [ 2898.729266][T12516] ? get_pid_task+0xc3/0xf0 [ 2898.733740][T12516] ? radix_tree_lookup+0x16f/0x1c0 [ 2898.738840][T12516] loop_control_ioctl+0x448/0x620 [ 2898.743842][T12516] ? loop_remove+0xa0/0xa0 [ 2898.748240][T12516] ? memset+0x1f/0x40 [ 2898.752193][T12516] ? fsnotify+0x1280/0x1340 [ 2898.756667][T12516] ? loop_remove+0xa0/0xa0 [ 2898.761061][T12516] do_vfs_ioctl+0x742/0x1720 [ 2898.765622][T12516] ? ioctl_preallocate+0x250/0x250 [ 2898.770703][T12516] ? __fget+0x407/0x490 [ 2898.774829][T12516] ? fget_many+0x20/0x20 [ 2898.779042][T12516] ? debug_smp_processor_id+0x20/0x20 [ 2898.784388][T12516] ? security_file_ioctl+0x7d/0xa0 [ 2898.789475][T12516] __x64_sys_ioctl+0xd4/0x110 [ 2898.794123][T12516] do_syscall_64+0xca/0x1c0 [ 2898.798596][T12516] entry_SYSCALL_64_after_hwframe+0x5c/0xc1 06:55:31 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040)=@security={'security\x00', 0xe, 0x4, 0x260, 0xffffffff, 0x180, 0xc0, 0xc0, 0xffffffff, 0xffffffff, 0x288, 0x288, 0x288, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x70, 0x98}, @common=@inet=@SET1={0x28}}, {{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@STANDARD={0x28}}, {{@ip={@rand_addr, @broadcast, 0x0, 0x0, 'batadv_slave_0\x00', 'ip_vti0\x00'}, 0x0, 0x70, 0x98}, @common=@unspec=@NFQUEUE0={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x2c0) ioctl$USBDEVFS_RESETEP(r0, 0x4004550d, &(0x7f0000000080)) 06:55:31 executing program 1: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x80045505, &(0x7f0000000200)=@urb_type_bulk={0x2, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 06:55:31 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x80045515, &(0x7f0000000200)=@urb_type_bulk={0x2, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 06:55:31 executing program 0: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f0000000200)=@urb_type_control={0x2, {0x2}, 0xfffffffb, 0x4, &(0x7f0000000a40)={0x80, 0x16, 0x2005, 0x0, 0x8}, 0x8, 0xf8, 0x7, 0x0, 0x0, 0x5, &(0x7f0000000a80)="cfc206af3b20cc76f92c2426377a243c9d8d6008fafd2fd67138c6b064102eec84099eccfeb5a4b8a5f3f11f2b3a7efc7bb159fd9e2cfe9dfc7021a27eef2f1b8a14ae37ef3f5850a71385fa82e17ca63c6617a30e1bc3576e8ee08aac39ab0a21c7d06379bcc8bd197b3c4706285c7606cc6c43a9f9a4485fa40997c39a4da54d472ef5eb63dbcb91c23e669d6e8836e2269a1d466533236ed3bd"}) 06:55:31 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x802c550a, &(0x7f0000000140)=@urb_type_iso={0x0, {}, 0x0, 0x0, &(0x7f0000000080), 0x0, 0x0, 0x0, 0x24, 0x0, 0x0, 0x0, [{0x8, 0x5, 0x100}, {0x40, 0x5, 0x3}, {0x8000, 0x5, 0x1}, {0x8, 0x2, 0x7f}, {0x9, 0x0, 0x4d}, {0x9, 0x8b88, 0x1}, {0x81, 0x5, 0x3ff}, {0xffffffff, 0xfffffff7, 0x5}, {0x7fffffff, 0x417, 0x40}, {0x401, 0x1, 0x950}, {0x6, 0xfff, 0x4}, {0x0, 0x8, 0x8}, {0xcd6fcee5, 0x4, 0xffffffff}, {0x7, 0x9, 0x9}, {0x3230fea4, 0x1ff, 0x401}, {0xf3d, 0xad, 0x2}, {0x7, 0x5, 0x8}, {0x800, 0xfffffffd, 0xff}, {0x5, 0x3, 0x7}, {0x7fffffff, 0x101, 0x1ff}, {0x11bb7e2, 0xe52}, {0x1, 0xffffffff, 0x7}, {0x3, 0x0, 0x4}, {0x1f, 0x80, 0x6}, {0x80, 0x9a, 0x1}, {0x3, 0xffff, 0xffff}, {0x81, 0x3, 0x8}, {0x0, 0x8, 0x400}, {0xfffffe01, 0x100, 0xf55}, {0x10001, 0xff, 0x7}, {0x2, 0x80000001, 0x7}, {0x4, 0xc708, 0x3ff}, {0x1, 0x7, 0x3}, {0x339, 0x8, 0x2}, {0x101, 0xffffffff, 0x10001}, {0x3, 0xff, 0x3}]}) 06:55:31 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) (fail_nth: 20) 06:55:31 executing program 1: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x80045505, &(0x7f0000000200)=@urb_type_bulk={0x2, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 06:55:31 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x80045518, &(0x7f0000000200)=@urb_type_bulk={0x2, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 06:55:31 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x802c550a, &(0x7f0000000140)=@urb_type_iso={0x0, {}, 0x0, 0x0, &(0x7f0000000080), 0x0, 0x0, 0x0, 0x23, 0x0, 0x0, 0x0, [{0x8, 0x5, 0x100}, {0x40, 0x5, 0x3}, {0x8000, 0x5, 0x1}, {0x8, 0x2, 0x7f}, {0x9, 0x0, 0x4d}, {0x9, 0x8b88, 0x1}, {0x81, 0x5, 0x3ff}, {0xffffffff, 0xfffffff7, 0x5}, {0x7fffffff, 0x417, 0x40}, {0x401, 0x1, 0x950}, {0x6, 0xfff, 0x4}, {0x0, 0x8, 0x8}, {0xcd6fcee5, 0x4, 0xffffffff}, {0x7, 0x9, 0x9}, {0x3230fea4, 0x1ff, 0x401}, {0xf3d, 0xad, 0x2}, {0x7, 0x5, 0x8}, {0x800, 0xfffffffd, 0xff}, {0x5, 0x3, 0x7}, {0x7fffffff, 0x101, 0x1ff}, {0x11bb7e2, 0xe52}, {0x1, 0xffffffff, 0x7}, {0x3, 0x0, 0x4}, {0x1f, 0x80, 0x6}, {0x80, 0x9a, 0x1}, {0x3, 0xffff, 0xffff}, {0x81, 0x3, 0x8}, {0x0, 0x8, 0x400}, {0xfffffe01, 0x100, 0xf55}, {0x10001, 0xff, 0x7}, {0x2, 0x80000001, 0x7}, {0x4, 0xc708, 0x3ff}, {0x1, 0x7, 0x3}, {0x339, 0x8, 0x2}, {0x101, 0xffffffff, 0x10001}]}) 06:55:31 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040)=@security={'security\x00', 0xe, 0x4, 0x260, 0xffffffff, 0x180, 0xc0, 0xc0, 0xffffffff, 0xffffffff, 0x288, 0x288, 0x288, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x70, 0x98}, @common=@inet=@SET1={0x28}}, {{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@STANDARD={0x28}}, {{@ip={@rand_addr, @broadcast, 0x0, 0x0, 'batadv_slave_0\x00', 'ip_vti0\x00'}, 0x0, 0x70, 0x98}, @common=@unspec=@NFQUEUE0={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x2c0) ioctl$USBDEVFS_RESETEP(r0, 0x4004551e, &(0x7f0000000080)) 06:55:31 executing program 0: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f0000000200)=@urb_type_control={0x2, {0x2}, 0xfffffffb, 0x4, &(0x7f0000000a40)={0x80, 0x16, 0x2005, 0x7}, 0x8, 0xf8, 0x7, 0x0, 0x0, 0x5, &(0x7f0000000a80)="cfc206af3b20cc76f92c2426377a243c9d8d6008fafd2fd67138c6b064102eec84099eccfeb5a4b8a5f3f11f2b3a7efc7bb159fd9e2cfe9dfc7021a27eef2f1b8a14ae37ef3f5850a71385fa82e17ca63c6617a30e1bc3576e8ee08aac39ab0a21c7d06379bcc8bd197b3c4706285c7606cc6c43a9f9a4485fa40997c39a4da54d472ef5eb63dbcb91c23e669d6e8836e2269a1d466533236ed3bd"}) [ 2898.982593][T12523] usb usb8: usbfs: interface 0 claimed by hub while 'syz-executor.1' sets config #2 [ 2898.985168][T12525] FAULT_INJECTION: forcing a failure. [ 2898.985168][T12525] name failslab, interval 1, probability 0, space 0, times 0 [ 2899.021948][T12525] CPU: 1 PID: 12525 Comm: syz-executor.4 Not tainted 5.4.233-syzkaller-00019-gd5ed2ca98e48 #0 06:55:31 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x80045519, &(0x7f0000000200)=@urb_type_bulk={0x2, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 06:55:31 executing program 1: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x80045505, &(0x7f0000000200)=@urb_type_bulk={0x2, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 06:55:31 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x8004551a, &(0x7f0000000200)=@urb_type_bulk={0x2, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) [ 2899.024827][T12534] usb usb8: usbfs: interface 0 claimed by hub while 'syz-executor.1' sets config #2 [ 2899.032218][T12525] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/14/2023 [ 2899.032221][T12525] Call Trace: [ 2899.032239][T12525] dump_stack+0x1d8/0x241 [ 2899.032247][T12525] ? panic+0x768/0x768 [ 2899.032257][T12525] ? blk_mq_init_queue+0x34/0xa0 [ 2899.032265][T12525] ? nf_ct_l4proto_log_invalid+0x258/0x258 [ 2899.032272][T12525] ? __x64_sys_ioctl+0xd4/0x110 06:55:31 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x802c550a, &(0x7f0000000140)=@urb_type_iso={0x0, {}, 0x0, 0x0, &(0x7f0000000080), 0x0, 0x0, 0x0, 0x22, 0x0, 0x0, 0x0, [{0x8, 0x5, 0x100}, {0x40, 0x5, 0x3}, {0x8000, 0x5, 0x1}, {0x8, 0x2, 0x7f}, {0x9, 0x0, 0x4d}, {0x9, 0x8b88, 0x1}, {0x81, 0x5, 0x3ff}, {0xffffffff, 0xfffffff7, 0x5}, {0x7fffffff, 0x417, 0x40}, {0x401, 0x1, 0x950}, {0x6, 0xfff, 0x4}, {0x0, 0x8, 0x8}, {0xcd6fcee5, 0x4, 0xffffffff}, {0x7, 0x9, 0x9}, {0x3230fea4, 0x1ff, 0x401}, {0xf3d, 0xad, 0x2}, {0x7, 0x5, 0x8}, {0x800, 0xfffffffd, 0xff}, {0x5, 0x3, 0x7}, {0x7fffffff, 0x101, 0x1ff}, {0x11bb7e2, 0xe52}, {0x1, 0xffffffff, 0x7}, {0x3, 0x0, 0x4}, {0x1f, 0x80, 0x6}, {0x80, 0x9a, 0x1}, {0x3, 0xffff, 0xffff}, {0x81, 0x3, 0x8}, {0x0, 0x8, 0x400}, {0xfffffe01, 0x100, 0xf55}, {0x10001, 0xff, 0x7}, {0x2, 0x80000001, 0x7}, {0x4, 0xc708, 0x3ff}, {0x1, 0x7, 0x3}, {0x339, 0x8, 0x2}]}) 06:55:31 executing program 1: ioctl$USBDEVFS_SUBMITURB(0xffffffffffffffff, 0x80045505, &(0x7f0000000200)=@urb_type_bulk={0x2, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 06:55:31 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x802c550a, &(0x7f0000000140)=@urb_type_iso={0x0, {}, 0x0, 0x0, &(0x7f0000000080), 0x0, 0x0, 0x0, 0x21, 0x0, 0x0, 0x0, [{0x8, 0x5, 0x100}, {0x40, 0x5, 0x3}, {0x8000, 0x5, 0x1}, {0x8, 0x2, 0x7f}, {0x9, 0x0, 0x4d}, {0x9, 0x8b88, 0x1}, {0x81, 0x5, 0x3ff}, {0xffffffff, 0xfffffff7, 0x5}, {0x7fffffff, 0x417, 0x40}, {0x401, 0x1, 0x950}, {0x6, 0xfff, 0x4}, {0x0, 0x8, 0x8}, {0xcd6fcee5, 0x4, 0xffffffff}, {0x7, 0x9, 0x9}, {0x3230fea4, 0x1ff, 0x401}, {0xf3d, 0xad, 0x2}, {0x7, 0x5, 0x8}, {0x800, 0xfffffffd, 0xff}, {0x5, 0x3, 0x7}, {0x7fffffff, 0x101, 0x1ff}, {0x11bb7e2, 0xe52}, {0x1, 0xffffffff, 0x7}, {0x3, 0x0, 0x4}, {0x1f, 0x80, 0x6}, {0x80, 0x9a, 0x1}, {0x3, 0xffff, 0xffff}, {0x81, 0x3, 0x8}, {0x0, 0x8, 0x400}, {0xfffffe01, 0x100, 0xf55}, {0x10001, 0xff, 0x7}, {0x2, 0x80000001, 0x7}, {0x4, 0xc708, 0x3ff}, {0x1, 0x7, 0x3}]}) [ 2899.032280][T12525] ? entry_SYSCALL_64_after_hwframe+0x5c/0xc1 [ 2899.032291][T12525] should_fail+0x71f/0x880 [ 2899.032308][T12525] ? setup_fault_attr+0x3d0/0x3d0 [ 2899.080623][T12540] usb usb8: usbfs: interface 0 claimed by hub while 'syz-executor.1' sets config #2 [ 2899.084866][T12525] ? bdi_init+0x19e/0xa90 [ 2899.084876][T12525] should_failslab+0x5/0x20 [ 2899.084892][T12525] kmem_cache_alloc_trace+0x28/0x240 [ 2899.117823][T12525] bdi_init+0x19e/0xa90 [ 2899.121971][T12525] ? bdi_alloc_node+0x69/0xd0 [ 2899.126638][T12525] bdi_alloc_node+0x79/0xd0 [ 2899.131136][T12525] blk_alloc_queue_node+0x10c/0x580 [ 2899.136327][T12525] ? blk_mq_alloc_tag_set+0x67d/0x890 [ 2899.141694][T12525] blk_mq_init_queue+0x34/0xa0 [ 2899.146455][T12525] loop_add+0x25c/0x740 [ 2899.150607][T12525] ? get_pid_task+0xc3/0xf0 [ 2899.155106][T12525] ? radix_tree_lookup+0x16f/0x1c0 [ 2899.160221][T12525] loop_control_ioctl+0x448/0x620 [ 2899.165242][T12525] ? loop_remove+0xa0/0xa0 [ 2899.169654][T12525] ? memset+0x1f/0x40 [ 2899.173614][T12525] ? fsnotify+0x1280/0x1340 [ 2899.178089][T12525] ? loop_remove+0xa0/0xa0 06:55:31 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) (fail_nth: 21) 06:55:31 executing program 1: ioctl$USBDEVFS_SUBMITURB(0xffffffffffffffff, 0x80045505, &(0x7f0000000200)=@urb_type_bulk={0x2, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 06:55:31 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x802c550a, &(0x7f0000000140)=@urb_type_iso={0x0, {}, 0x0, 0x0, &(0x7f0000000080), 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, [{0x8, 0x5, 0x100}, {0x40, 0x5, 0x3}, {0x8000, 0x5, 0x1}, {0x8, 0x2, 0x7f}, {0x9, 0x0, 0x4d}, {0x9, 0x8b88, 0x1}, {0x81, 0x5, 0x3ff}, {0xffffffff, 0xfffffff7, 0x5}, {0x7fffffff, 0x417, 0x40}, {0x401, 0x1, 0x950}, {0x6, 0xfff, 0x4}, {0x0, 0x8, 0x8}, {0xcd6fcee5, 0x4, 0xffffffff}, {0x7, 0x9, 0x9}, {0x3230fea4, 0x1ff, 0x401}, {0xf3d, 0xad, 0x2}, {0x7, 0x5, 0x8}, {0x800, 0xfffffffd, 0xff}, {0x5, 0x3, 0x7}, {0x7fffffff, 0x101, 0x1ff}, {0x11bb7e2, 0xe52}, {0x1, 0xffffffff, 0x7}, {0x3, 0x0, 0x4}, {0x1f, 0x80, 0x6}, {0x80, 0x9a, 0x1}, {0x3, 0xffff, 0xffff}, {0x81, 0x3, 0x8}, {0x0, 0x8, 0x400}, {0xfffffe01, 0x100, 0xf55}, {0x10001, 0xff, 0x7}, {0x2, 0x80000001, 0x7}, {0x4, 0xc708, 0x3ff}]}) 06:55:31 executing program 0: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f0000000200)=@urb_type_control={0x2, {0x2}, 0xfffffffb, 0x4, &(0x7f0000000a40)={0x80, 0x16, 0x2005, 0x7}, 0x8, 0xf8, 0x7, 0x0, 0x0, 0x5, &(0x7f0000000a80)="cfc206af3b20cc76f92c2426377a243c9d8d6008fafd2fd67138c6b064102eec84099eccfeb5a4b8a5f3f11f2b3a7efc7bb159fd9e2cfe9dfc7021a27eef2f1b8a14ae37ef3f5850a71385fa82e17ca63c6617a30e1bc3576e8ee08aac39ab0a21c7d06379bcc8bd197b3c4706285c7606cc6c43a9f9a4485fa40997c39a4da54d472ef5eb63dbcb91c23e669d6e8836e2269a1d466533236ed3bd"}) [ 2899.182582][T12525] do_vfs_ioctl+0x742/0x1720 [ 2899.187154][T12525] ? ioctl_preallocate+0x250/0x250 [ 2899.192234][T12525] ? __fget+0x407/0x490 [ 2899.196365][T12525] ? fget_many+0x20/0x20 [ 2899.200603][T12525] ? debug_smp_processor_id+0x20/0x20 [ 2899.205947][T12525] ? security_file_ioctl+0x7d/0xa0 [ 2899.211054][T12525] __x64_sys_ioctl+0xd4/0x110 [ 2899.215906][T12525] do_syscall_64+0xca/0x1c0 [ 2899.220381][T12525] entry_SYSCALL_64_after_hwframe+0x5c/0xc1 06:55:32 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040)=@security={'security\x00', 0xe, 0x4, 0x260, 0xffffffff, 0x180, 0xc0, 0xc0, 0xffffffff, 0xffffffff, 0x288, 0x288, 0x288, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x70, 0x98}, @common=@inet=@SET1={0x28}}, {{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@STANDARD={0x28}}, {{@ip={@rand_addr, @broadcast, 0x0, 0x0, 'batadv_slave_0\x00', 'ip_vti0\x00'}, 0x0, 0x70, 0x98}, @common=@unspec=@NFQUEUE0={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x2c0) ioctl$USBDEVFS_RESETEP(r0, 0x40049409, &(0x7f0000000080)) 06:55:32 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x80085504, &(0x7f0000000200)=@urb_type_bulk={0x2, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 06:55:32 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x802c550a, &(0x7f0000000140)=@urb_type_iso={0x0, {}, 0x0, 0x0, &(0x7f0000000080), 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, [{0x8, 0x5, 0x100}, {0x40, 0x5, 0x3}, {0x8000, 0x5, 0x1}, {0x8, 0x2, 0x7f}, {0x9, 0x0, 0x4d}, {0x9, 0x8b88, 0x1}, {0x81, 0x5, 0x3ff}, {0xffffffff, 0xfffffff7, 0x5}, {0x7fffffff, 0x417, 0x40}, {0x401, 0x1, 0x950}, {0x6, 0xfff, 0x4}, {0x0, 0x8, 0x8}, {0xcd6fcee5, 0x4, 0xffffffff}, {0x7, 0x9, 0x9}, {0x3230fea4, 0x1ff, 0x401}, {0xf3d, 0xad, 0x2}, {0x7, 0x5, 0x8}, {0x800, 0xfffffffd, 0xff}, {0x5, 0x3, 0x7}, {0x7fffffff, 0x101, 0x1ff}, {0x11bb7e2, 0xe52}, {0x1, 0xffffffff, 0x7}, {0x3, 0x0, 0x4}, {0x1f, 0x80, 0x6}, {0x80, 0x9a, 0x1}, {0x3, 0xffff, 0xffff}, {0x81, 0x3, 0x8}, {0x0, 0x8, 0x400}, {0xfffffe01, 0x100, 0xf55}, {0x10001, 0xff, 0x7}, {0x2, 0x80000001, 0x7}]}) 06:55:32 executing program 0: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f0000000200)=@urb_type_control={0x2, {0x2}, 0xfffffffb, 0x4, &(0x7f0000000a40)={0x80, 0x16, 0x2005, 0x7}, 0x8, 0xf8, 0x7, 0x0, 0x0, 0x5, &(0x7f0000000a80)="cfc206af3b20cc76f92c2426377a243c9d8d6008fafd2fd67138c6b064102eec84099eccfeb5a4b8a5f3f11f2b3a7efc7bb159fd9e2cfe9dfc7021a27eef2f1b8a14ae37ef3f5850a71385fa82e17ca63c6617a30e1bc3576e8ee08aac39ab0a21c7d06379bcc8bd197b3c4706285c7606cc6c43a9f9a4485fa40997c39a4da54d472ef5eb63dbcb91c23e669d6e8836e2269a1d466533236ed3bd"}) 06:55:32 executing program 1: ioctl$USBDEVFS_SUBMITURB(0xffffffffffffffff, 0x80045505, &(0x7f0000000200)=@urb_type_bulk={0x2, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 06:55:32 executing program 0: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f0000000200)=@urb_type_control={0x2, {0x2}, 0xfffffffb, 0x4, &(0x7f0000000a40)={0x80, 0x16, 0x2005, 0x7, 0x8}, 0x8, 0x0, 0x7, 0x0, 0x0, 0x5, &(0x7f0000000a80)="cfc206af3b20cc76f92c2426377a243c9d8d6008fafd2fd67138c6b064102eec84099eccfeb5a4b8a5f3f11f2b3a7efc7bb159fd9e2cfe9dfc7021a27eef2f1b8a14ae37ef3f5850a71385fa82e17ca63c6617a30e1bc3576e8ee08aac39ab0a21c7d06379bcc8bd197b3c4706285c7606cc6c43a9f9a4485fa40997c39a4da54d472ef5eb63dbcb91c23e669d6e8836e2269a1d466533236ed3bd"}) 06:55:32 executing program 1: r0 = syz_open_dev$usbfs(0x0, 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x80045505, &(0x7f0000000200)=@urb_type_bulk={0x2, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 06:55:32 executing program 0: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f0000000200)=@urb_type_control={0x2, {0x2}, 0xfffffffb, 0x4, &(0x7f0000000a40)={0x80, 0x16, 0x2005, 0x7, 0x8}, 0x8, 0x0, 0x7, 0x0, 0x0, 0x5, &(0x7f0000000a80)="cfc206af3b20cc76f92c2426377a243c9d8d6008fafd2fd67138c6b064102eec84099eccfeb5a4b8a5f3f11f2b3a7efc7bb159fd9e2cfe9dfc7021a27eef2f1b8a14ae37ef3f5850a71385fa82e17ca63c6617a30e1bc3576e8ee08aac39ab0a21c7d06379bcc8bd197b3c4706285c7606cc6c43a9f9a4485fa40997c39a4da54d472ef5eb63dbcb91c23e669d6e8836e2269a1d466533236ed3bd"}) [ 2899.248211][T12558] FAULT_INJECTION: forcing a failure. [ 2899.248211][T12558] name failslab, interval 1, probability 0, space 0, times 0 [ 2899.263901][T12558] CPU: 1 PID: 12558 Comm: syz-executor.4 Not tainted 5.4.233-syzkaller-00019-gd5ed2ca98e48 #0 [ 2899.274136][T12558] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/14/2023 [ 2899.284184][T12558] Call Trace: [ 2899.287481][T12558] dump_stack+0x1d8/0x241 [ 2899.291801][T12558] ? panic+0x768/0x768 [ 2899.295860][T12558] ? pcpu_block_update_hint_alloc+0x8fe/0xc70 [ 2899.301922][T12558] ? nf_ct_l4proto_log_invalid+0x258/0x258 [ 2899.307732][T12558] ? pcpu_chunk_relocate+0xdc/0x3a0 [ 2899.309877][T12563] usb usb8: usbfs: process 12563 (syz-executor.2) did not claim interface 2 before use [ 2899.312923][T12558] should_fail+0x71f/0x880 [ 2899.326939][T12558] ? setup_fault_attr+0x3d0/0x3d0 [ 2899.331955][T12558] ? cpumask_next+0xc/0x20 [ 2899.336368][T12558] ? blk_mq_poll_stats_fn+0x1a0/0x1a0 [ 2899.341726][T12558] ? blk_stat_alloc_callback+0x5c/0x210 [ 2899.347254][T12558] should_failslab+0x5/0x20 [ 2899.351757][T12558] kmem_cache_alloc_trace+0x28/0x240 [ 2899.357018][T12558] ? blk_mq_poll_stats_fn+0x1a0/0x1a0 [ 2899.362360][T12558] ? blk_mq_free_tag_set+0x450/0x450 [ 2899.367612][T12558] blk_stat_alloc_callback+0x5c/0x210 [ 2899.372955][T12558] blk_mq_init_allocated_queue+0x85/0x1470 [ 2899.378755][T12558] ? blk_alloc_queue_node+0x4ec/0x580 [ 2899.384095][T12558] ? blk_mq_alloc_tag_set+0x67d/0x890 [ 2899.389452][T12558] blk_mq_init_queue+0x49/0xa0 [ 2899.394204][T12558] loop_add+0x25c/0x740 [ 2899.398337][T12558] ? get_pid_task+0xc3/0xf0 [ 2899.402808][T12558] ? radix_tree_lookup+0x16f/0x1c0 [ 2899.407888][T12558] loop_control_ioctl+0x448/0x620 [ 2899.412883][T12558] ? loop_remove+0xa0/0xa0 [ 2899.417268][T12558] ? memset+0x1f/0x40 [ 2899.421223][T12558] ? fsnotify+0x1280/0x1340 [ 2899.425698][T12558] ? loop_remove+0xa0/0xa0 [ 2899.430089][T12558] do_vfs_ioctl+0x742/0x1720 [ 2899.434675][T12558] ? ioctl_preallocate+0x250/0x250 [ 2899.439757][T12558] ? __fget+0x407/0x490 [ 2899.443882][T12558] ? fget_many+0x20/0x20 06:55:32 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) (fail_nth: 22) 06:55:32 executing program 0: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f0000000200)=@urb_type_control={0x2, {0x2}, 0xfffffffb, 0x4, &(0x7f0000000a40)={0x80, 0x16, 0x2005, 0x7, 0x8}, 0x8, 0x0, 0x7, 0x0, 0x0, 0x5, &(0x7f0000000a80)="cfc206af3b20cc76f92c2426377a243c9d8d6008fafd2fd67138c6b064102eec84099eccfeb5a4b8a5f3f11f2b3a7efc7bb159fd9e2cfe9dfc7021a27eef2f1b8a14ae37ef3f5850a71385fa82e17ca63c6617a30e1bc3576e8ee08aac39ab0a21c7d06379bcc8bd197b3c4706285c7606cc6c43a9f9a4485fa40997c39a4da54d472ef5eb63dbcb91c23e669d6e8836e2269a1d466533236ed3bd"}) 06:55:32 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x802c550a, &(0x7f0000000140)=@urb_type_iso={0x0, {}, 0x0, 0x0, &(0x7f0000000080), 0x0, 0x0, 0x0, 0x1e, 0x0, 0x0, 0x0, [{0x8, 0x5, 0x100}, {0x40, 0x5, 0x3}, {0x8000, 0x5, 0x1}, {0x8, 0x2, 0x7f}, {0x9, 0x0, 0x4d}, {0x9, 0x8b88, 0x1}, {0x81, 0x5, 0x3ff}, {0xffffffff, 0xfffffff7, 0x5}, {0x7fffffff, 0x417, 0x40}, {0x401, 0x1, 0x950}, {0x6, 0xfff, 0x4}, {0x0, 0x8, 0x8}, {0xcd6fcee5, 0x4, 0xffffffff}, {0x7, 0x9, 0x9}, {0x3230fea4, 0x1ff, 0x401}, {0xf3d, 0xad, 0x2}, {0x7, 0x5, 0x8}, {0x800, 0xfffffffd, 0xff}, {0x5, 0x3, 0x7}, {0x7fffffff, 0x101, 0x1ff}, {0x11bb7e2, 0xe52}, {0x1, 0xffffffff, 0x7}, {0x3, 0x0, 0x4}, {0x1f, 0x80, 0x6}, {0x80, 0x9a, 0x1}, {0x3, 0xffff, 0xffff}, {0x81, 0x3, 0x8}, {0x0, 0x8, 0x400}, {0xfffffe01, 0x100, 0xf55}, {0x10001, 0xff, 0x7}]}) 06:55:32 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x8008550e, &(0x7f0000000200)=@urb_type_bulk={0x2, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 06:55:32 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040)=@security={'security\x00', 0xe, 0x4, 0x260, 0xffffffff, 0x180, 0xc0, 0xc0, 0xffffffff, 0xffffffff, 0x288, 0x288, 0x288, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x70, 0x98}, @common=@inet=@SET1={0x28}}, {{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@STANDARD={0x28}}, {{@ip={@rand_addr, @broadcast, 0x0, 0x0, 'batadv_slave_0\x00', 'ip_vti0\x00'}, 0x0, 0x70, 0x98}, @common=@unspec=@NFQUEUE0={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x2c0) ioctl$USBDEVFS_RESETEP(r0, 0x4008550c, &(0x7f0000000080)) 06:55:32 executing program 1: r0 = syz_open_dev$usbfs(0x0, 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x80045505, &(0x7f0000000200)=@urb_type_bulk={0x2, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 06:55:32 executing program 0: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f0000000200)=@urb_type_control={0x2, {0x2}, 0xfffffffb, 0x4, &(0x7f0000000a40)={0x80, 0x16, 0x2005, 0x7, 0x8}, 0x8, 0xf8, 0x0, 0x0, 0x0, 0x5, &(0x7f0000000a80)="cfc206af3b20cc76f92c2426377a243c9d8d6008fafd2fd67138c6b064102eec84099eccfeb5a4b8a5f3f11f2b3a7efc7bb159fd9e2cfe9dfc7021a27eef2f1b8a14ae37ef3f5850a71385fa82e17ca63c6617a30e1bc3576e8ee08aac39ab0a21c7d06379bcc8bd197b3c4706285c7606cc6c43a9f9a4485fa40997c39a4da54d472ef5eb63dbcb91c23e669d6e8836e2269a1d466533236ed3bd"}) [ 2899.448110][T12558] ? debug_smp_processor_id+0x20/0x20 [ 2899.453450][T12558] ? security_file_ioctl+0x7d/0xa0 [ 2899.458533][T12558] __x64_sys_ioctl+0xd4/0x110 [ 2899.463267][T12558] do_syscall_64+0xca/0x1c0 [ 2899.467739][T12558] entry_SYSCALL_64_after_hwframe+0x5c/0xc1 06:55:32 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x802c550a, &(0x7f0000000140)=@urb_type_iso={0x0, {}, 0x0, 0x0, &(0x7f0000000080), 0x0, 0x0, 0x0, 0x1d, 0x0, 0x0, 0x0, [{0x8, 0x5, 0x100}, {0x40, 0x5, 0x3}, {0x8000, 0x5, 0x1}, {0x8, 0x2, 0x7f}, {0x9, 0x0, 0x4d}, {0x9, 0x8b88, 0x1}, {0x81, 0x5, 0x3ff}, {0xffffffff, 0xfffffff7, 0x5}, {0x7fffffff, 0x417, 0x40}, {0x401, 0x1, 0x950}, {0x6, 0xfff, 0x4}, {0x0, 0x8, 0x8}, {0xcd6fcee5, 0x4, 0xffffffff}, {0x7, 0x9, 0x9}, {0x3230fea4, 0x1ff, 0x401}, {0xf3d, 0xad, 0x2}, {0x7, 0x5, 0x8}, {0x800, 0xfffffffd, 0xff}, {0x5, 0x3, 0x7}, {0x7fffffff, 0x101, 0x1ff}, {0x11bb7e2, 0xe52}, {0x1, 0xffffffff, 0x7}, {0x3, 0x0, 0x4}, {0x1f, 0x80, 0x6}, {0x80, 0x9a, 0x1}, {0x3, 0xffff, 0xffff}, {0x81, 0x3, 0x8}, {0x0, 0x8, 0x400}, {0xfffffe01, 0x100, 0xf55}]}) 06:55:32 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x8008551c, &(0x7f0000000200)=@urb_type_bulk={0x2, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 06:55:32 executing program 0: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f0000000200)=@urb_type_control={0x2, {0x2}, 0xfffffffb, 0x4, &(0x7f0000000a40)={0x80, 0x16, 0x2005, 0x7, 0x8}, 0x8, 0xf8, 0x0, 0x0, 0x0, 0x5, &(0x7f0000000a80)="cfc206af3b20cc76f92c2426377a243c9d8d6008fafd2fd67138c6b064102eec84099eccfeb5a4b8a5f3f11f2b3a7efc7bb159fd9e2cfe9dfc7021a27eef2f1b8a14ae37ef3f5850a71385fa82e17ca63c6617a30e1bc3576e8ee08aac39ab0a21c7d06379bcc8bd197b3c4706285c7606cc6c43a9f9a4485fa40997c39a4da54d472ef5eb63dbcb91c23e669d6e8836e2269a1d466533236ed3bd"}) 06:55:32 executing program 1: r0 = syz_open_dev$usbfs(0x0, 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x80045505, &(0x7f0000000200)=@urb_type_bulk={0x2, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 06:55:32 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x802c550a, &(0x7f0000000140)=@urb_type_iso={0x0, {}, 0x0, 0x0, &(0x7f0000000080), 0x0, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, [{0x8, 0x5, 0x100}, {0x40, 0x5, 0x3}, {0x8000, 0x5, 0x1}, {0x8, 0x2, 0x7f}, {0x9, 0x0, 0x4d}, {0x9, 0x8b88, 0x1}, {0x81, 0x5, 0x3ff}, {0xffffffff, 0xfffffff7, 0x5}, {0x7fffffff, 0x417, 0x40}, {0x401, 0x1, 0x950}, {0x6, 0xfff, 0x4}, {0x0, 0x8, 0x8}, {0xcd6fcee5, 0x4, 0xffffffff}, {0x7, 0x9, 0x9}, {0x3230fea4, 0x1ff, 0x401}, {0xf3d, 0xad, 0x2}, {0x7, 0x5, 0x8}, {0x800, 0xfffffffd, 0xff}, {0x5, 0x3, 0x7}, {0x7fffffff, 0x101, 0x1ff}, {0x11bb7e2, 0xe52}, {0x1, 0xffffffff, 0x7}, {0x3, 0x0, 0x4}, {0x1f, 0x80, 0x6}, {0x80, 0x9a, 0x1}, {0x3, 0xffff, 0xffff}, {0x81, 0x3, 0x8}, {0x0, 0x8, 0x400}]}) [ 2899.502620][T12584] FAULT_INJECTION: forcing a failure. [ 2899.502620][T12584] name failslab, interval 1, probability 0, space 0, times 0 [ 2899.525651][T12584] CPU: 1 PID: 12584 Comm: syz-executor.4 Not tainted 5.4.233-syzkaller-00019-gd5ed2ca98e48 #0 [ 2899.535892][T12584] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/14/2023 [ 2899.545937][T12584] Call Trace: [ 2899.549227][T12584] dump_stack+0x1d8/0x241 [ 2899.553550][T12584] ? panic+0x768/0x768 [ 2899.557614][T12584] ? nf_ct_l4proto_log_invalid+0x258/0x258 [ 2899.563413][T12584] should_fail+0x71f/0x880 [ 2899.567816][T12584] ? setup_fault_attr+0x3d0/0x3d0 [ 2899.572818][T12584] ? blk_mq_poll_stats_fn+0x1a0/0x1a0 [ 2899.578163][T12584] ? blk_stat_alloc_callback+0x95/0x210 [ 2899.583706][T12584] should_failslab+0x5/0x20 [ 2899.588180][T12584] __kmalloc+0x51/0x2b0 [ 2899.592307][T12584] ? kmem_cache_alloc_trace+0xd7/0x240 [ 2899.597733][T12584] ? blk_stat_alloc_callback+0x5c/0x210 [ 2899.603253][T12584] ? blk_mq_poll_stats_fn+0x1a0/0x1a0 [ 2899.608708][T12584] ? blk_mq_free_tag_set+0x450/0x450 [ 2899.613962][T12584] blk_stat_alloc_callback+0x95/0x210 [ 2899.619305][T12584] ? blk_mq_free_tag_set+0x450/0x450 [ 2899.624561][T12584] ? blk_mq_poll_stats_fn+0x1a0/0x1a0 [ 2899.629902][T12584] blk_mq_init_allocated_queue+0x85/0x1470 [ 2899.635764][T12584] ? blk_alloc_queue_node+0x4ec/0x580 [ 2899.641105][T12584] ? blk_mq_alloc_tag_set+0x67d/0x890 [ 2899.646445][T12584] blk_mq_init_queue+0x49/0xa0 [ 2899.651179][T12584] loop_add+0x25c/0x740 [ 2899.655306][T12584] ? get_pid_task+0xc3/0xf0 [ 2899.659780][T12584] ? radix_tree_lookup+0x16f/0x1c0 [ 2899.664948][T12584] loop_control_ioctl+0x448/0x620 [ 2899.669941][T12584] ? loop_remove+0xa0/0xa0 [ 2899.674327][T12584] ? memset+0x1f/0x40 [ 2899.678279][T12584] ? fsnotify+0x1280/0x1340 [ 2899.682752][T12584] ? loop_remove+0xa0/0xa0 [ 2899.687139][T12584] do_vfs_ioctl+0x742/0x1720 [ 2899.691727][T12584] ? ioctl_preallocate+0x250/0x250 [ 2899.696806][T12584] ? __fget+0x407/0x490 06:55:32 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) (fail_nth: 23) 06:55:32 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x802c550a, &(0x7f0000000140)=@urb_type_iso={0x0, {}, 0x0, 0x0, &(0x7f0000000080), 0x0, 0x0, 0x0, 0x1b, 0x0, 0x0, 0x0, [{0x8, 0x5, 0x100}, {0x40, 0x5, 0x3}, {0x8000, 0x5, 0x1}, {0x8, 0x2, 0x7f}, {0x9, 0x0, 0x4d}, {0x9, 0x8b88, 0x1}, {0x81, 0x5, 0x3ff}, {0xffffffff, 0xfffffff7, 0x5}, {0x7fffffff, 0x417, 0x40}, {0x401, 0x1, 0x950}, {0x6, 0xfff, 0x4}, {0x0, 0x8, 0x8}, {0xcd6fcee5, 0x4, 0xffffffff}, {0x7, 0x9, 0x9}, {0x3230fea4, 0x1ff, 0x401}, {0xf3d, 0xad, 0x2}, {0x7, 0x5, 0x8}, {0x800, 0xfffffffd, 0xff}, {0x5, 0x3, 0x7}, {0x7fffffff, 0x101, 0x1ff}, {0x11bb7e2, 0xe52}, {0x1, 0xffffffff, 0x7}, {0x3, 0x0, 0x4}, {0x1f, 0x80, 0x6}, {0x80, 0x9a, 0x1}, {0x3, 0xffff, 0xffff}, {0x81, 0x3, 0x8}]}) 06:55:32 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x8008551d, &(0x7f0000000200)=@urb_type_bulk={0x2, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 06:55:32 executing program 1: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x0, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x80045505, &(0x7f0000000200)=@urb_type_bulk={0x2, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) [ 2899.700930][T12584] ? fget_many+0x20/0x20 [ 2899.705139][T12584] ? debug_smp_processor_id+0x20/0x20 [ 2899.710481][T12584] ? security_file_ioctl+0x7d/0xa0 [ 2899.715563][T12584] __x64_sys_ioctl+0xd4/0x110 [ 2899.720218][T12584] do_syscall_64+0xca/0x1c0 [ 2899.724698][T12584] entry_SYSCALL_64_after_hwframe+0x5c/0xc1 [ 2899.747143][T12606] FAULT_INJECTION: forcing a failure. [ 2899.747143][T12606] name failslab, interval 1, probability 0, space 0, times 0 [ 2899.767362][T12606] CPU: 1 PID: 12606 Comm: syz-executor.4 Not tainted 5.4.233-syzkaller-00019-gd5ed2ca98e48 #0 [ 2899.777692][T12606] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/14/2023 [ 2899.787730][T12606] Call Trace: [ 2899.790999][T12606] dump_stack+0x1d8/0x241 [ 2899.795297][T12606] ? panic+0x768/0x768 [ 2899.799338][T12606] ? nf_ct_l4proto_log_invalid+0x258/0x258 [ 2899.805204][T12606] should_fail+0x71f/0x880 [ 2899.809592][T12606] ? cpumask_next+0xc/0x20 [ 2899.813996][T12606] ? setup_fault_attr+0x3d0/0x3d0 [ 2899.818993][T12606] ? init_timer_key+0x2d/0x1f0 [ 2899.823726][T12606] ? blk_mq_init_allocated_queue+0xf2/0x1470 [ 2899.829671][T12606] should_failslab+0x5/0x20 [ 2899.834146][T12606] kmem_cache_alloc_trace+0x28/0x240 [ 2899.839421][T12606] blk_mq_init_allocated_queue+0xf2/0x1470 [ 2899.845197][T12606] ? blk_alloc_queue_node+0x4ec/0x580 [ 2899.850538][T12606] ? blk_mq_alloc_tag_set+0x67d/0x890 [ 2899.855879][T12606] blk_mq_init_queue+0x49/0xa0 [ 2899.860611][T12606] loop_add+0x25c/0x740 [ 2899.864735][T12606] ? get_pid_task+0xc3/0xf0 [ 2899.869206][T12606] ? radix_tree_lookup+0x16f/0x1c0 [ 2899.874285][T12606] loop_control_ioctl+0x448/0x620 [ 2899.879277][T12606] ? loop_remove+0xa0/0xa0 [ 2899.883671][T12606] ? memset+0x1f/0x40 [ 2899.887621][T12606] ? fsnotify+0x1280/0x1340 [ 2899.892090][T12606] ? loop_remove+0xa0/0xa0 [ 2899.896474][T12606] do_vfs_ioctl+0x742/0x1720 [ 2899.901036][T12606] ? ioctl_preallocate+0x250/0x250 [ 2899.906114][T12606] ? __fget+0x407/0x490 [ 2899.910235][T12606] ? fget_many+0x20/0x20 [ 2899.914464][T12606] ? debug_smp_processor_id+0x20/0x20 [ 2899.919807][T12606] ? security_file_ioctl+0x7d/0xa0 [ 2899.924885][T12606] __x64_sys_ioctl+0xd4/0x110 [ 2899.929530][T12606] do_syscall_64+0xca/0x1c0 [ 2899.934004][T12606] entry_SYSCALL_64_after_hwframe+0x5c/0xc1 06:55:33 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040)=@security={'security\x00', 0xe, 0x4, 0x260, 0xffffffff, 0x180, 0xc0, 0xc0, 0xffffffff, 0xffffffff, 0x288, 0x288, 0x288, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x70, 0x98}, @common=@inet=@SET1={0x28}}, {{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@STANDARD={0x28}}, {{@ip={@rand_addr, @broadcast, 0x0, 0x0, 'batadv_slave_0\x00', 'ip_vti0\x00'}, 0x0, 0x70, 0x98}, @common=@unspec=@NFQUEUE0={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x2c0) ioctl$USBDEVFS_RESETEP(r0, 0x4008550d, &(0x7f0000000080)) 06:55:33 executing program 0: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f0000000200)=@urb_type_control={0x2, {0x2}, 0xfffffffb, 0x4, &(0x7f0000000a40)={0x80, 0x16, 0x2005, 0x7, 0x8}, 0x8, 0xf8, 0x0, 0x0, 0x0, 0x5, &(0x7f0000000a80)="cfc206af3b20cc76f92c2426377a243c9d8d6008fafd2fd67138c6b064102eec84099eccfeb5a4b8a5f3f11f2b3a7efc7bb159fd9e2cfe9dfc7021a27eef2f1b8a14ae37ef3f5850a71385fa82e17ca63c6617a30e1bc3576e8ee08aac39ab0a21c7d06379bcc8bd197b3c4706285c7606cc6c43a9f9a4485fa40997c39a4da54d472ef5eb63dbcb91c23e669d6e8836e2269a1d466533236ed3bd"}) 06:55:33 executing program 1: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x0, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x80045505, &(0x7f0000000200)=@urb_type_bulk={0x2, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 06:55:33 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x802c550a, &(0x7f0000000140)=@urb_type_iso={0x0, {}, 0x0, 0x0, &(0x7f0000000080), 0x0, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, [{0x8, 0x5, 0x100}, {0x40, 0x5, 0x3}, {0x8000, 0x5, 0x1}, {0x8, 0x2, 0x7f}, {0x9, 0x0, 0x4d}, {0x9, 0x8b88, 0x1}, {0x81, 0x5, 0x3ff}, {0xffffffff, 0xfffffff7, 0x5}, {0x7fffffff, 0x417, 0x40}, {0x401, 0x1, 0x950}, {0x6, 0xfff, 0x4}, {0x0, 0x8, 0x8}, {0xcd6fcee5, 0x4, 0xffffffff}, {0x7, 0x9, 0x9}, {0x3230fea4, 0x1ff, 0x401}, {0xf3d, 0xad, 0x2}, {0x7, 0x5, 0x8}, {0x800, 0xfffffffd, 0xff}, {0x5, 0x3, 0x7}, {0x7fffffff, 0x101, 0x1ff}, {0x11bb7e2, 0xe52}, {0x1, 0xffffffff, 0x7}, {0x3, 0x0, 0x4}, {0x1f, 0x80, 0x6}, {0x80, 0x9a, 0x1}, {0x3, 0xffff, 0xffff}]}) 06:55:33 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x80086601, &(0x7f0000000200)=@urb_type_bulk={0x2, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 06:55:33 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) (fail_nth: 24) 06:55:33 executing program 0: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f0000000200)=@urb_type_control={0x2, {0x2}, 0xfffffffb, 0x4, &(0x7f0000000a40)={0x80, 0x16, 0x2005, 0x7, 0x8}, 0x8, 0xf8, 0x7, 0x0, 0x0, 0x0, &(0x7f0000000a80)="cfc206af3b20cc76f92c2426377a243c9d8d6008fafd2fd67138c6b064102eec84099eccfeb5a4b8a5f3f11f2b3a7efc7bb159fd9e2cfe9dfc7021a27eef2f1b8a14ae37ef3f5850a71385fa82e17ca63c6617a30e1bc3576e8ee08aac39ab0a21c7d06379bcc8bd197b3c4706285c7606cc6c43a9f9a4485fa40997c39a4da54d472ef5eb63dbcb91c23e669d6e8836e2269a1d466533236ed3bd"}) 06:55:33 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x80087601, &(0x7f0000000200)=@urb_type_bulk={0x2, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 06:55:33 executing program 1: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x0, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x80045505, &(0x7f0000000200)=@urb_type_bulk={0x2, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) [ 2900.345117][T12614] FAULT_INJECTION: forcing a failure. [ 2900.345117][T12614] name failslab, interval 1, probability 0, space 0, times 0 [ 2900.371282][T12614] CPU: 0 PID: 12614 Comm: syz-executor.4 Not tainted 5.4.233-syzkaller-00019-gd5ed2ca98e48 #0 [ 2900.381529][T12614] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/14/2023 [ 2900.391578][T12614] Call Trace: 06:55:33 executing program 0: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f0000000200)=@urb_type_control={0x2, {0x2}, 0xfffffffb, 0x4, &(0x7f0000000a40)={0x80, 0x16, 0x2005, 0x7, 0x8}, 0x8, 0xf8, 0x7, 0x0, 0x0, 0x0, &(0x7f0000000a80)="cfc206af3b20cc76f92c2426377a243c9d8d6008fafd2fd67138c6b064102eec84099eccfeb5a4b8a5f3f11f2b3a7efc7bb159fd9e2cfe9dfc7021a27eef2f1b8a14ae37ef3f5850a71385fa82e17ca63c6617a30e1bc3576e8ee08aac39ab0a21c7d06379bcc8bd197b3c4706285c7606cc6c43a9f9a4485fa40997c39a4da54d472ef5eb63dbcb91c23e669d6e8836e2269a1d466533236ed3bd"}) 06:55:33 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x8010550e, &(0x7f0000000200)=@urb_type_bulk={0x2, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 06:55:33 executing program 1: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x0) ioctl$USBDEVFS_SUBMITURB(r0, 0x80045505, &(0x7f0000000200)=@urb_type_bulk={0x2, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 06:55:33 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040)=@security={'security\x00', 0xe, 0x4, 0x260, 0xffffffff, 0x180, 0xc0, 0xc0, 0xffffffff, 0xffffffff, 0x288, 0x288, 0x288, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x70, 0x98}, @common=@inet=@SET1={0x28}}, {{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@STANDARD={0x28}}, {{@ip={@rand_addr, @broadcast, 0x0, 0x0, 'batadv_slave_0\x00', 'ip_vti0\x00'}, 0x0, 0x70, 0x98}, @common=@unspec=@NFQUEUE0={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x2c0) ioctl$USBDEVFS_RESETEP(r0, 0x40085511, &(0x7f0000000080)) 06:55:33 executing program 1: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x0) ioctl$USBDEVFS_SUBMITURB(r0, 0x80045505, &(0x7f0000000200)=@urb_type_bulk={0x2, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 06:55:33 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f0000000200)=@urb_type_bulk={0x2, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) [ 2900.394865][T12614] dump_stack+0x1d8/0x241 [ 2900.399187][T12614] ? panic+0x768/0x768 [ 2900.403342][T12614] ? nf_ct_l4proto_log_invalid+0x258/0x258 [ 2900.409137][T12614] ? pcpu_chunk_relocate+0xdc/0x3a0 [ 2900.414411][T12614] ? pcpu_alloc_area+0x658/0x750 [ 2900.419353][T12614] should_fail+0x71f/0x880 [ 2900.423768][T12614] ? setup_fault_attr+0x3d0/0x3d0 [ 2900.428782][T12614] ? cpumask_next+0xc/0x20 [ 2900.433196][T12614] ? kobject_init+0x7f/0x1d0 [ 2900.437777][T12614] ? find_next_bit+0xc3/0x100 [ 2900.442452][T12614] ? blk_mq_init_allocated_queue+0x481/0x1470 [ 2900.448615][T12614] should_failslab+0x5/0x20 [ 2900.453123][T12614] __kmalloc+0x51/0x2b0 [ 2900.457275][T12614] blk_mq_init_allocated_queue+0x481/0x1470 [ 2900.463157][T12614] ? blk_alloc_queue_node+0x4ec/0x580 [ 2900.468528][T12614] ? blk_mq_alloc_tag_set+0x67d/0x890 [ 2900.473873][T12614] blk_mq_init_queue+0x49/0xa0 [ 2900.478615][T12614] loop_add+0x25c/0x740 [ 2900.482744][T12614] ? get_pid_task+0xc3/0xf0 [ 2900.487222][T12614] ? radix_tree_lookup+0x16f/0x1c0 [ 2900.492313][T12614] loop_control_ioctl+0x448/0x620 [ 2900.497309][T12614] ? loop_remove+0xa0/0xa0 [ 2900.501706][T12614] ? memset+0x1f/0x40 [ 2900.505661][T12614] ? fsnotify+0x1280/0x1340 [ 2900.510261][T12614] ? loop_remove+0xa0/0xa0 [ 2900.514654][T12614] do_vfs_ioctl+0x742/0x1720 [ 2900.519221][T12614] ? ioctl_preallocate+0x250/0x250 [ 2900.524302][T12614] ? __fget+0x407/0x490 [ 2900.528426][T12614] ? fget_many+0x20/0x20 [ 2900.532638][T12614] ? debug_smp_processor_id+0x20/0x20 [ 2900.537997][T12614] ? security_file_ioctl+0x7d/0xa0 06:55:33 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x802c550a, &(0x7f0000000140)=@urb_type_iso={0x0, {}, 0x0, 0x0, &(0x7f0000000080), 0x0, 0x0, 0x0, 0x19, 0x0, 0x0, 0x0, [{0x8, 0x5, 0x100}, {0x40, 0x5, 0x3}, {0x8000, 0x5, 0x1}, {0x8, 0x2, 0x7f}, {0x9, 0x0, 0x4d}, {0x9, 0x8b88, 0x1}, {0x81, 0x5, 0x3ff}, {0xffffffff, 0xfffffff7, 0x5}, {0x7fffffff, 0x417, 0x40}, {0x401, 0x1, 0x950}, {0x6, 0xfff, 0x4}, {0x0, 0x8, 0x8}, {0xcd6fcee5, 0x4, 0xffffffff}, {0x7, 0x9, 0x9}, {0x3230fea4, 0x1ff, 0x401}, {0xf3d, 0xad, 0x2}, {0x7, 0x5, 0x8}, {0x800, 0xfffffffd, 0xff}, {0x5, 0x3, 0x7}, {0x7fffffff, 0x101, 0x1ff}, {0x11bb7e2, 0xe52}, {0x1, 0xffffffff, 0x7}, {0x3, 0x0, 0x4}, {0x1f, 0x80, 0x6}, {0x80, 0x9a, 0x1}]}) 06:55:33 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x8108551b, &(0x7f0000000200)=@urb_type_bulk={0x2, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 06:55:33 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) (fail_nth: 25) 06:55:33 executing program 1: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x0) ioctl$USBDEVFS_SUBMITURB(r0, 0x80045505, &(0x7f0000000200)=@urb_type_bulk={0x2, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 06:55:33 executing program 0: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f0000000200)=@urb_type_control={0x2, {0x2}, 0xfffffffb, 0x4, &(0x7f0000000a40)={0x80, 0x16, 0x2005, 0x7, 0x8}, 0x8, 0xf8, 0x7, 0x0, 0x0, 0x0, &(0x7f0000000a80)="cfc206af3b20cc76f92c2426377a243c9d8d6008fafd2fd67138c6b064102eec84099eccfeb5a4b8a5f3f11f2b3a7efc7bb159fd9e2cfe9dfc7021a27eef2f1b8a14ae37ef3f5850a71385fa82e17ca63c6617a30e1bc3576e8ee08aac39ab0a21c7d06379bcc8bd197b3c4706285c7606cc6c43a9f9a4485fa40997c39a4da54d472ef5eb63dbcb91c23e669d6e8836e2269a1d466533236ed3bd"}) 06:55:33 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x802c550a, &(0x7f0000000140)=@urb_type_iso={0x0, {}, 0x0, 0x0, &(0x7f0000000080), 0x0, 0x0, 0x0, 0x18, 0x0, 0x0, 0x0, [{0x8, 0x5, 0x100}, {0x40, 0x5, 0x3}, {0x8000, 0x5, 0x1}, {0x8, 0x2, 0x7f}, {0x9, 0x0, 0x4d}, {0x9, 0x8b88, 0x1}, {0x81, 0x5, 0x3ff}, {0xffffffff, 0xfffffff7, 0x5}, {0x7fffffff, 0x417, 0x40}, {0x401, 0x1, 0x950}, {0x6, 0xfff, 0x4}, {0x0, 0x8, 0x8}, {0xcd6fcee5, 0x4, 0xffffffff}, {0x7, 0x9, 0x9}, {0x3230fea4, 0x1ff, 0x401}, {0xf3d, 0xad, 0x2}, {0x7, 0x5, 0x8}, {0x800, 0xfffffffd, 0xff}, {0x5, 0x3, 0x7}, {0x7fffffff, 0x101, 0x1ff}, {0x11bb7e2, 0xe52}, {0x1, 0xffffffff, 0x7}, {0x3, 0x0, 0x4}, {0x1f, 0x80, 0x6}]}) 06:55:33 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040)=@security={'security\x00', 0xe, 0x4, 0x260, 0xffffffff, 0x180, 0xc0, 0xc0, 0xffffffff, 0xffffffff, 0x288, 0x288, 0x288, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x70, 0x98}, @common=@inet=@SET1={0x28}}, {{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@STANDARD={0x28}}, {{@ip={@rand_addr, @broadcast, 0x0, 0x0, 'batadv_slave_0\x00', 'ip_vti0\x00'}, 0x0, 0x70, 0x98}, @common=@unspec=@NFQUEUE0={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x2c0) ioctl$USBDEVFS_RESETEP(r0, 0x40086602, &(0x7f0000000080)) [ 2900.543081][T12614] __x64_sys_ioctl+0xd4/0x110 [ 2900.547728][T12614] do_syscall_64+0xca/0x1c0 [ 2900.552209][T12614] entry_SYSCALL_64_after_hwframe+0x5c/0xc1 06:55:33 executing program 1: syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(0xffffffffffffffff, 0x80045505, &(0x7f0000000200)=@urb_type_bulk={0x2, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 06:55:33 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0xc0045878, &(0x7f0000000200)=@urb_type_bulk={0x2, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 06:55:33 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040)=@security={'security\x00', 0xe, 0x4, 0x260, 0xffffffff, 0x180, 0xc0, 0xc0, 0xffffffff, 0xffffffff, 0x288, 0x288, 0x288, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x70, 0x98}, @common=@inet=@SET1={0x28}}, {{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@STANDARD={0x28}}, {{@ip={@rand_addr, @broadcast, 0x0, 0x0, 'batadv_slave_0\x00', 'ip_vti0\x00'}, 0x0, 0x70, 0x98}, @common=@unspec=@NFQUEUE0={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x2c0) ioctl$USBDEVFS_RESETEP(r0, 0x40087602, &(0x7f0000000080)) 06:55:33 executing program 0: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f0000000200)=@urb_type_control={0x2, {0x2}, 0xfffffffb, 0x4, &(0x7f0000000a40)={0x80, 0x16, 0x2005, 0x7, 0x8}, 0x8, 0xf8, 0x7, 0x0, 0x0, 0x5, 0x0}) 06:55:33 executing program 1: syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(0xffffffffffffffff, 0x80045505, &(0x7f0000000200)=@urb_type_bulk={0x2, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 06:55:33 executing program 0: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f0000000200)=@urb_type_control={0x2, {0x2}, 0xfffffffb, 0x4, &(0x7f0000000a40)={0x80, 0x16, 0x2005, 0x7, 0x8}, 0x8, 0xf8, 0x7, 0x0, 0x0, 0x5, 0x0}) [ 2900.591621][T12650] FAULT_INJECTION: forcing a failure. [ 2900.591621][T12650] name failslab, interval 1, probability 0, space 0, times 0 [ 2900.605456][T12650] CPU: 0 PID: 12650 Comm: syz-executor.4 Not tainted 5.4.233-syzkaller-00019-gd5ed2ca98e48 #0 [ 2900.615699][T12650] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/14/2023 [ 2900.625745][T12650] Call Trace: [ 2900.629034][T12650] dump_stack+0x1d8/0x241 [ 2900.633360][T12650] ? panic+0x768/0x768 06:55:33 executing program 1: syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(0xffffffffffffffff, 0x80045505, &(0x7f0000000200)=@urb_type_bulk={0x2, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) [ 2900.637423][T12650] ? __kasan_kmalloc+0x199/0x1d0 [ 2900.642354][T12650] ? nf_ct_l4proto_log_invalid+0x258/0x258 [ 2900.648150][T12650] ? __kasan_kmalloc+0x199/0x1d0 [ 2900.653081][T12650] ? do_vfs_ioctl+0x742/0x1720 [ 2900.657927][T12650] should_fail+0x71f/0x880 [ 2900.662334][T12650] ? __x64_sys_ioctl+0xd4/0x110 [ 2900.667174][T12650] ? do_syscall_64+0xca/0x1c0 [ 2900.671843][T12650] ? setup_fault_attr+0x3d0/0x3d0 [ 2900.676859][T12650] ? _raw_spin_lock+0xa4/0x1b0 [ 2900.681654][T12650] ? _raw_spin_trylock_bh+0x190/0x190 [ 2900.687019][T12650] ? blk_mq_realloc_hw_ctxs+0x303/0x13b0 [ 2900.692639][T12650] should_failslab+0x5/0x20 [ 2900.697111][T12650] __kmalloc+0x51/0x2b0 [ 2900.701237][T12650] ? blk_mq_hw_queue_to_node+0xe3/0x100 [ 2900.706761][T12650] blk_mq_realloc_hw_ctxs+0x303/0x13b0 [ 2900.712208][T12650] blk_mq_init_allocated_queue+0x551/0x1470 [ 2900.718076][T12650] ? blk_alloc_queue_node+0x4ec/0x580 [ 2900.723439][T12650] blk_mq_init_queue+0x49/0xa0 [ 2900.728194][T12650] loop_add+0x25c/0x740 [ 2900.732323][T12650] ? get_pid_task+0xc3/0xf0 [ 2900.736794][T12650] ? radix_tree_lookup+0x16f/0x1c0 [ 2900.741893][T12650] loop_control_ioctl+0x448/0x620 [ 2900.746902][T12650] ? loop_remove+0xa0/0xa0 [ 2900.751287][T12650] ? memset+0x1f/0x40 [ 2900.755258][T12650] ? fsnotify+0x1280/0x1340 [ 2900.759734][T12650] ? loop_remove+0xa0/0xa0 [ 2900.764138][T12650] do_vfs_ioctl+0x742/0x1720 [ 2900.768715][T12650] ? ioctl_preallocate+0x250/0x250 [ 2900.773794][T12650] ? __fget+0x407/0x490 [ 2900.777929][T12650] ? fget_many+0x20/0x20 [ 2900.782139][T12650] ? debug_smp_processor_id+0x20/0x20 [ 2900.787480][T12650] ? security_file_ioctl+0x7d/0xa0 06:55:33 executing program 1: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x80045505, 0x0) 06:55:33 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x802c550a, &(0x7f0000000140)=@urb_type_iso={0x0, {}, 0x0, 0x0, &(0x7f0000000080), 0x0, 0x0, 0x0, 0x17, 0x0, 0x0, 0x0, [{0x8, 0x5, 0x100}, {0x40, 0x5, 0x3}, {0x8000, 0x5, 0x1}, {0x8, 0x2, 0x7f}, {0x9, 0x0, 0x4d}, {0x9, 0x8b88, 0x1}, {0x81, 0x5, 0x3ff}, {0xffffffff, 0xfffffff7, 0x5}, {0x7fffffff, 0x417, 0x40}, {0x401, 0x1, 0x950}, {0x6, 0xfff, 0x4}, {0x0, 0x8, 0x8}, {0xcd6fcee5, 0x4, 0xffffffff}, {0x7, 0x9, 0x9}, {0x3230fea4, 0x1ff, 0x401}, {0xf3d, 0xad, 0x2}, {0x7, 0x5, 0x8}, {0x800, 0xfffffffd, 0xff}, {0x5, 0x3, 0x7}, {0x7fffffff, 0x101, 0x1ff}, {0x11bb7e2, 0xe52}, {0x1, 0xffffffff, 0x7}, {0x3, 0x0, 0x4}]}) 06:55:33 executing program 0: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f0000000200)=@urb_type_control={0x2, {0x2}, 0xfffffffb, 0x4, &(0x7f0000000a40)={0x80, 0x16, 0x2005, 0x7, 0x8}, 0x8, 0xf8, 0x7, 0x0, 0x0, 0x5, 0x0}) 06:55:33 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) (fail_nth: 26) 06:55:33 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0xc0045878, &(0x7f0000000200)=@urb_type_bulk={0x2, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 06:55:33 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040)=@security={'security\x00', 0xe, 0x4, 0x260, 0xffffffff, 0x180, 0xc0, 0xc0, 0xffffffff, 0xffffffff, 0x288, 0x288, 0x288, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x70, 0x98}, @common=@inet=@SET1={0x28}}, {{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@STANDARD={0x28}}, {{@ip={@rand_addr, @broadcast, 0x0, 0x0, 'batadv_slave_0\x00', 'ip_vti0\x00'}, 0x0, 0x70, 0x98}, @common=@unspec=@NFQUEUE0={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x2c0) ioctl$USBDEVFS_RESETEP(r0, 0x4020940d, &(0x7f0000000080)) [ 2900.792557][T12650] __x64_sys_ioctl+0xd4/0x110 [ 2900.797203][T12650] do_syscall_64+0xca/0x1c0 [ 2900.801674][T12650] entry_SYSCALL_64_after_hwframe+0x5c/0xc1 06:55:33 executing program 1: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x80045505, 0x0) 06:55:33 executing program 0: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f0000000200)=@urb_type_control={0x2, {0x2}, 0xfffffffb, 0x4, &(0x7f0000000a40)={0x80, 0x16, 0x2005, 0x7, 0x8}, 0x8, 0xf8, 0x7, 0x0, 0x0, 0x5, &(0x7f0000000a80)}) 06:55:33 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x802c550a, &(0x7f0000000140)=@urb_type_iso={0x0, {}, 0x0, 0x0, &(0x7f0000000080), 0x0, 0x0, 0x0, 0x16, 0x0, 0x0, 0x0, [{0x8, 0x5, 0x100}, {0x40, 0x5, 0x3}, {0x8000, 0x5, 0x1}, {0x8, 0x2, 0x7f}, {0x9, 0x0, 0x4d}, {0x9, 0x8b88, 0x1}, {0x81, 0x5, 0x3ff}, {0xffffffff, 0xfffffff7, 0x5}, {0x7fffffff, 0x417, 0x40}, {0x401, 0x1, 0x950}, {0x6, 0xfff, 0x4}, {0x0, 0x8, 0x8}, {0xcd6fcee5, 0x4, 0xffffffff}, {0x7, 0x9, 0x9}, {0x3230fea4, 0x1ff, 0x401}, {0xf3d, 0xad, 0x2}, {0x7, 0x5, 0x8}, {0x800, 0xfffffffd, 0xff}, {0x5, 0x3, 0x7}, {0x7fffffff, 0x101, 0x1ff}, {0x11bb7e2, 0xe52}, {0x1, 0xffffffff, 0x7}]}) 06:55:33 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0xc00c5512, &(0x7f0000000200)=@urb_type_bulk={0x2, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 06:55:33 executing program 1: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x80045505, 0x0) 06:55:33 executing program 0: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f0000000200)=@urb_type_control={0x2, {0x2}, 0xfffffffb, 0x4, &(0x7f0000000a40)={0x80, 0x16, 0x2005, 0x7, 0x8}, 0x8, 0xf8, 0x7, 0x0, 0x0, 0x5, &(0x7f0000000a80)}) [ 2900.835842][T12676] FAULT_INJECTION: forcing a failure. [ 2900.835842][T12676] name failslab, interval 1, probability 0, space 0, times 0 [ 2900.864155][T12676] CPU: 0 PID: 12676 Comm: syz-executor.4 Not tainted 5.4.233-syzkaller-00019-gd5ed2ca98e48 #0 [ 2900.874400][T12676] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/14/2023 [ 2900.884446][T12676] Call Trace: [ 2900.887732][T12676] dump_stack+0x1d8/0x241 [ 2900.892064][T12676] ? panic+0x768/0x768 [ 2900.896133][T12676] ? nf_ct_l4proto_log_invalid+0x258/0x258 [ 2900.901935][T12676] should_fail+0x71f/0x880 [ 2900.906351][T12676] ? setup_fault_attr+0x3d0/0x3d0 [ 2900.911380][T12676] ? blk_mq_realloc_hw_ctxs+0x5aa/0x13b0 [ 2900.917000][T12676] should_failslab+0x5/0x20 [ 2900.921475][T12676] __kmalloc+0x51/0x2b0 [ 2900.925599][T12676] ? init_timer_key+0x2d/0x1f0 [ 2900.930333][T12676] blk_mq_realloc_hw_ctxs+0x5aa/0x13b0 [ 2900.935766][T12676] blk_mq_init_allocated_queue+0x551/0x1470 [ 2900.941629][T12676] ? blk_alloc_queue_node+0x4ec/0x580 [ 2900.946974][T12676] blk_mq_init_queue+0x49/0xa0 [ 2900.951707][T12676] loop_add+0x25c/0x740 [ 2900.955851][T12676] ? get_pid_task+0xc3/0xf0 [ 2900.960322][T12676] ? radix_tree_lookup+0x16f/0x1c0 [ 2900.965403][T12676] loop_control_ioctl+0x448/0x620 [ 2900.970396][T12676] ? loop_remove+0xa0/0xa0 [ 2900.974780][T12676] ? memset+0x1f/0x40 [ 2900.978729][T12676] ? fsnotify+0x1280/0x1340 06:55:33 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) (fail_nth: 27) 06:55:33 executing program 0: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f0000000200)=@urb_type_control={0x2, {0x2}, 0xfffffffb, 0x4, &(0x7f0000000a40)={0x80, 0x16, 0x2005, 0x7, 0x8}, 0x8, 0xf8, 0x7, 0x0, 0x0, 0x5, &(0x7f0000000a80)}) 06:55:33 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0xc0105500, &(0x7f0000000200)=@urb_type_bulk={0x2, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 06:55:33 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x802c550a, &(0x7f0000000140)=@urb_type_iso={0x0, {}, 0x0, 0x0, &(0x7f0000000080), 0x0, 0x0, 0x0, 0x15, 0x0, 0x0, 0x0, [{0x8, 0x5, 0x100}, {0x40, 0x5, 0x3}, {0x8000, 0x5, 0x1}, {0x8, 0x2, 0x7f}, {0x9, 0x0, 0x4d}, {0x9, 0x8b88, 0x1}, {0x81, 0x5, 0x3ff}, {0xffffffff, 0xfffffff7, 0x5}, {0x7fffffff, 0x417, 0x40}, {0x401, 0x1, 0x950}, {0x6, 0xfff, 0x4}, {0x0, 0x8, 0x8}, {0xcd6fcee5, 0x4, 0xffffffff}, {0x7, 0x9, 0x9}, {0x3230fea4, 0x1ff, 0x401}, {0xf3d, 0xad, 0x2}, {0x7, 0x5, 0x8}, {0x800, 0xfffffffd, 0xff}, {0x5, 0x3, 0x7}, {0x7fffffff, 0x101, 0x1ff}, {0x11bb7e2, 0xe52}]}) 06:55:33 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040)=@security={'security\x00', 0xe, 0x4, 0x260, 0xffffffff, 0x180, 0xc0, 0xc0, 0xffffffff, 0xffffffff, 0x288, 0x288, 0x288, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x70, 0x98}, @common=@inet=@SET1={0x28}}, {{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@STANDARD={0x28}}, {{@ip={@rand_addr, @broadcast, 0x0, 0x0, 'batadv_slave_0\x00', 'ip_vti0\x00'}, 0x0, 0x70, 0x98}, @common=@unspec=@NFQUEUE0={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x2c0) ioctl$USBDEVFS_RESETEP(r0, 0x41045508, &(0x7f0000000080)) 06:55:33 executing program 1: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x8108551b, &(0x7f0000000200)=@urb_type_bulk={0x2, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 06:55:33 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x802c550a, &(0x7f0000000140)=@urb_type_iso={0x0, {}, 0x0, 0x0, &(0x7f0000000080), 0x0, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [{0x8, 0x5, 0x100}, {0x40, 0x5, 0x3}, {0x8000, 0x5, 0x1}, {0x8, 0x2, 0x7f}, {0x9, 0x0, 0x4d}, {0x9, 0x8b88, 0x1}, {0x81, 0x5, 0x3ff}, {0xffffffff, 0xfffffff7, 0x5}, {0x7fffffff, 0x417, 0x40}, {0x401, 0x1, 0x950}, {0x6, 0xfff, 0x4}, {0x0, 0x8, 0x8}, {0xcd6fcee5, 0x4, 0xffffffff}, {0x7, 0x9, 0x9}, {0x3230fea4, 0x1ff, 0x401}, {0xf3d, 0xad, 0x2}, {0x7, 0x5, 0x8}, {0x800, 0xfffffffd, 0xff}, {0x5, 0x3, 0x7}, {0x7fffffff, 0x101, 0x1ff}]}) 06:55:33 executing program 1: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x8108551b, &(0x7f0000000200)=@urb_type_bulk={0x2, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) [ 2900.983199][T12676] ? loop_remove+0xa0/0xa0 [ 2900.987583][T12676] do_vfs_ioctl+0x742/0x1720 [ 2900.992141][T12676] ? ioctl_preallocate+0x250/0x250 [ 2900.997222][T12676] ? __fget+0x407/0x490 [ 2901.001367][T12676] ? fget_many+0x20/0x20 [ 2901.005597][T12676] ? debug_smp_processor_id+0x20/0x20 [ 2901.010941][T12676] ? security_file_ioctl+0x7d/0xa0 [ 2901.016024][T12676] __x64_sys_ioctl+0xd4/0x110 [ 2901.020670][T12676] do_syscall_64+0xca/0x1c0 [ 2901.025164][T12676] entry_SYSCALL_64_after_hwframe+0x5c/0xc1 06:55:33 executing program 0: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f0000000200)=@urb_type_control={0x2, {0x2}, 0xfffffffb, 0x4, &(0x7f0000000a40)={0x80, 0x16, 0x2005, 0x7, 0x8}, 0x8, 0xf8, 0x7, 0x0, 0x0, 0x5, &(0x7f0000000a80)="cfc206af3b20cc76f92c2426377a243c9d8d6008fafd2fd67138c6b064102eec84099eccfeb5a4b8a5f3f11f2b3a7efc7bb159fd9e2cfe9dfc7021a27eef2f1b8a14ae37ef3f5850a71385fa82e1"}) 06:55:33 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x802c550a, &(0x7f0000000140)=@urb_type_iso={0x0, {}, 0x0, 0x0, &(0x7f0000000080), 0x0, 0x0, 0x0, 0x13, 0x0, 0x0, 0x0, [{0x8, 0x5, 0x100}, {0x40, 0x5, 0x3}, {0x8000, 0x5, 0x1}, {0x8, 0x2, 0x7f}, {0x9, 0x0, 0x4d}, {0x9, 0x8b88, 0x1}, {0x81, 0x5, 0x3ff}, {0xffffffff, 0xfffffff7, 0x5}, {0x7fffffff, 0x417, 0x40}, {0x401, 0x1, 0x950}, {0x6, 0xfff, 0x4}, {0x0, 0x8, 0x8}, {0xcd6fcee5, 0x4, 0xffffffff}, {0x7, 0x9, 0x9}, {0x3230fea4, 0x1ff, 0x401}, {0xf3d, 0xad, 0x2}, {0x7, 0x5, 0x8}, {0x800, 0xfffffffd, 0xff}, {0x5, 0x3, 0x7}]}) 06:55:33 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040)=@security={'security\x00', 0xe, 0x4, 0x260, 0xffffffff, 0x180, 0xc0, 0xc0, 0xffffffff, 0xffffffff, 0x288, 0x288, 0x288, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x70, 0x98}, @common=@inet=@SET1={0x28}}, {{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@STANDARD={0x28}}, {{@ip={@rand_addr, @broadcast, 0x0, 0x0, 'batadv_slave_0\x00', 'ip_vti0\x00'}, 0x0, 0x70, 0x98}, @common=@unspec=@NFQUEUE0={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x2c0) ioctl$USBDEVFS_RESETEP(r0, 0x80045505, &(0x7f0000000080)) 06:55:33 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0xc0105502, &(0x7f0000000200)=@urb_type_bulk={0x2, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) [ 2901.083723][T12712] usb usb8: usbfs: interface 0 claimed by hub while 'syz-executor.5' sets config #-256 [ 2901.091565][T12703] FAULT_INJECTION: forcing a failure. [ 2901.091565][T12703] name failslab, interval 1, probability 0, space 0, times 0 [ 2901.106671][T12703] CPU: 0 PID: 12703 Comm: syz-executor.4 Not tainted 5.4.233-syzkaller-00019-gd5ed2ca98e48 #0 [ 2901.116925][T12703] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/14/2023 [ 2901.126961][T12703] Call Trace: [ 2901.130248][T12703] dump_stack+0x1d8/0x241 [ 2901.134545][T12703] ? panic+0x768/0x768 [ 2901.138601][T12703] ? blk_mq_init_queue+0x49/0xa0 [ 2901.143509][T12703] ? nf_ct_l4proto_log_invalid+0x258/0x258 [ 2901.149304][T12703] ? __x64_sys_ioctl+0xd4/0x110 [ 2901.154121][T12703] ? entry_SYSCALL_64_after_hwframe+0x5c/0xc1 [ 2901.160157][T12703] should_fail+0x71f/0x880 [ 2901.164542][T12703] ? setup_fault_attr+0x3d0/0x3d0 [ 2901.169555][T12703] ? sbitmap_init_node+0x14a/0x380 [ 2901.174635][T12703] should_failslab+0x5/0x20 [ 2901.179106][T12703] __kmalloc+0x51/0x2b0 [ 2901.183233][T12703] sbitmap_init_node+0x14a/0x380 [ 2901.188148][T12703] blk_mq_realloc_hw_ctxs+0x61c/0x13b0 [ 2901.193594][T12703] blk_mq_init_allocated_queue+0x551/0x1470 [ 2901.199458][T12703] ? blk_alloc_queue_node+0x4ec/0x580 [ 2901.204802][T12703] blk_mq_init_queue+0x49/0xa0 [ 2901.209535][T12703] loop_add+0x25c/0x740 [ 2901.213684][T12703] ? get_pid_task+0xc3/0xf0 [ 2901.218157][T12703] ? radix_tree_lookup+0x16f/0x1c0 [ 2901.223246][T12703] loop_control_ioctl+0x448/0x620 [ 2901.228241][T12703] ? loop_remove+0xa0/0xa0 [ 2901.232646][T12703] ? memset+0x1f/0x40 [ 2901.236598][T12703] ? fsnotify+0x1280/0x1340 [ 2901.241088][T12703] ? loop_remove+0xa0/0xa0 [ 2901.245473][T12703] do_vfs_ioctl+0x742/0x1720 [ 2901.250034][T12703] ? ioctl_preallocate+0x250/0x250 [ 2901.255115][T12703] ? __fget+0x407/0x490 [ 2901.259237][T12703] ? fget_many+0x20/0x20 [ 2901.263448][T12703] ? debug_smp_processor_id+0x20/0x20 [ 2901.268788][T12703] ? security_file_ioctl+0x7d/0xa0 [ 2901.273866][T12703] __x64_sys_ioctl+0xd4/0x110 [ 2901.278512][T12703] do_syscall_64+0xca/0x1c0 06:55:34 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) (fail_nth: 28) 06:55:34 executing program 1: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x8108551b, &(0x7f0000000200)=@urb_type_bulk={0x2, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 06:55:34 executing program 0: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f0000000200)=@urb_type_control={0x2, {0x2}, 0xfffffffb, 0x4, &(0x7f0000000a40)={0x80, 0x16, 0x2005, 0x7, 0x8}, 0x8, 0xf8, 0x7, 0x0, 0x0, 0x5, &(0x7f0000000a80)="cfc206af3b20cc76f92c2426377a243c9d8d6008fafd2fd67138c6b064102eec84099eccfeb5a4b8a5f3f11f2b3a7efc7bb159fd9e2cfe9dfc7021a27eef2f1b8a14ae37ef3f5850a71385fa82e1"}) 06:55:34 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040)=@security={'security\x00', 0xe, 0x4, 0x260, 0xffffffff, 0x180, 0xc0, 0xc0, 0xffffffff, 0xffffffff, 0x288, 0x288, 0x288, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x70, 0x98}, @common=@inet=@SET1={0x28}}, {{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@STANDARD={0x28}}, {{@ip={@rand_addr, @broadcast, 0x0, 0x0, 'batadv_slave_0\x00', 'ip_vti0\x00'}, 0x0, 0x70, 0x98}, @common=@unspec=@NFQUEUE0={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x2c0) ioctl$USBDEVFS_RESETEP(r0, 0x8004550f, &(0x7f0000000080)) 06:55:34 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x802c550a, &(0x7f0000000140)=@urb_type_iso={0x0, {}, 0x0, 0x0, &(0x7f0000000080), 0x0, 0x0, 0x0, 0x12, 0x0, 0x0, 0x0, [{0x8, 0x5, 0x100}, {0x40, 0x5, 0x3}, {0x8000, 0x5, 0x1}, {0x8, 0x2, 0x7f}, {0x9, 0x0, 0x4d}, {0x9, 0x8b88, 0x1}, {0x81, 0x5, 0x3ff}, {0xffffffff, 0xfffffff7, 0x5}, {0x7fffffff, 0x417, 0x40}, {0x401, 0x1, 0x950}, {0x6, 0xfff, 0x4}, {0x0, 0x8, 0x8}, {0xcd6fcee5, 0x4, 0xffffffff}, {0x7, 0x9, 0x9}, {0x3230fea4, 0x1ff, 0x401}, {0xf3d, 0xad, 0x2}, {0x7, 0x5, 0x8}, {0x800, 0xfffffffd, 0xff}]}) 06:55:34 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0xc0105512, &(0x7f0000000200)=@urb_type_bulk={0x2, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) [ 2901.282993][T12703] entry_SYSCALL_64_after_hwframe+0x5c/0xc1 [ 2901.309735][T12717] FAULT_INJECTION: forcing a failure. [ 2901.309735][T12717] name failslab, interval 1, probability 0, space 0, times 0 [ 2901.328990][T12717] CPU: 1 PID: 12717 Comm: syz-executor.4 Not tainted 5.4.233-syzkaller-00019-gd5ed2ca98e48 #0 [ 2901.339231][T12717] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/14/2023 [ 2901.349366][T12717] Call Trace: [ 2901.352648][T12717] dump_stack+0x1d8/0x241 06:55:34 executing program 1: ioctl$USBDEVFS_SUBMITURB(0xffffffffffffffff, 0x8108551b, &(0x7f0000000200)=@urb_type_bulk={0x2, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 06:55:34 executing program 0: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f0000000200)=@urb_type_control={0x2, {0x2}, 0xfffffffb, 0x4, &(0x7f0000000a40)={0x80, 0x16, 0x2005, 0x7, 0x8}, 0x8, 0xf8, 0x7, 0x0, 0x0, 0x5, &(0x7f0000000a80)="cfc206af3b20cc76f92c2426377a243c9d8d6008fafd2fd67138c6b064102eec84099eccfeb5a4b8a5f3f11f2b3a7efc7bb159fd9e2cfe9dfc7021a27eef2f1b8a14ae37ef3f5850a71385fa82e1"}) 06:55:34 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x802c550a, &(0x7f0000000140)=@urb_type_iso={0x0, {}, 0x0, 0x0, &(0x7f0000000080), 0x0, 0x0, 0x0, 0x11, 0x0, 0x0, 0x0, [{0x8, 0x5, 0x100}, {0x40, 0x5, 0x3}, {0x8000, 0x5, 0x1}, {0x8, 0x2, 0x7f}, {0x9, 0x0, 0x4d}, {0x9, 0x8b88, 0x1}, {0x81, 0x5, 0x3ff}, {0xffffffff, 0xfffffff7, 0x5}, {0x7fffffff, 0x417, 0x40}, {0x401, 0x1, 0x950}, {0x6, 0xfff, 0x4}, {0x0, 0x8, 0x8}, {0xcd6fcee5, 0x4, 0xffffffff}, {0x7, 0x9, 0x9}, {0x3230fea4, 0x1ff, 0x401}, {0xf3d, 0xad, 0x2}, {0x7, 0x5, 0x8}]}) 06:55:34 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0xc0185500, &(0x7f0000000200)=@urb_type_bulk={0x2, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 06:55:34 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040)=@security={'security\x00', 0xe, 0x4, 0x260, 0xffffffff, 0x180, 0xc0, 0xc0, 0xffffffff, 0xffffffff, 0x288, 0x288, 0x288, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x70, 0x98}, @common=@inet=@SET1={0x28}}, {{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@STANDARD={0x28}}, {{@ip={@rand_addr, @broadcast, 0x0, 0x0, 'batadv_slave_0\x00', 'ip_vti0\x00'}, 0x0, 0x70, 0x98}, @common=@unspec=@NFQUEUE0={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x2c0) ioctl$USBDEVFS_RESETEP(r0, 0x80045510, &(0x7f0000000080)) 06:55:34 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0xc0185502, &(0x7f0000000200)=@urb_type_bulk={0x2, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) [ 2901.356970][T12717] ? panic+0x768/0x768 [ 2901.361034][T12717] ? nf_ct_l4proto_log_invalid+0x258/0x258 [ 2901.366834][T12717] should_fail+0x71f/0x880 [ 2901.371252][T12717] ? setup_fault_attr+0x3d0/0x3d0 [ 2901.376272][T12717] ? blk_alloc_flush_queue+0x72/0x250 [ 2901.381638][T12717] should_failslab+0x5/0x20 [ 2901.386137][T12717] kmem_cache_alloc_trace+0x28/0x240 [ 2901.391414][T12717] blk_alloc_flush_queue+0x72/0x250 [ 2901.396621][T12717] blk_mq_realloc_hw_ctxs+0x99b/0x13b0 [ 2901.402053][T12717] blk_mq_init_allocated_queue+0x551/0x1470 [ 2901.407936][T12717] ? blk_alloc_queue_node+0x4ec/0x580 [ 2901.413278][T12717] blk_mq_init_queue+0x49/0xa0 [ 2901.418013][T12717] loop_add+0x25c/0x740 [ 2901.422139][T12717] ? get_pid_task+0xc3/0xf0 [ 2901.426609][T12717] ? radix_tree_lookup+0x16f/0x1c0 [ 2901.431705][T12717] loop_control_ioctl+0x448/0x620 [ 2901.436717][T12717] ? loop_remove+0xa0/0xa0 [ 2901.441106][T12717] ? memset+0x1f/0x40 [ 2901.445055][T12717] ? fsnotify+0x1280/0x1340 [ 2901.449526][T12717] ? loop_remove+0xa0/0xa0 [ 2901.453911][T12717] do_vfs_ioctl+0x742/0x1720 06:55:34 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) (fail_nth: 29) 06:55:34 executing program 0: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f0000000200)=@urb_type_control={0x2, {0x2}, 0xfffffffb, 0x4, &(0x7f0000000a40)={0x80, 0x16, 0x2005, 0x7, 0x8}, 0x8, 0xf8, 0x7, 0x0, 0x0, 0x5, &(0x7f0000000a80)="cfc206af3b20cc76f92c2426377a243c9d8d6008fafd2fd67138c6b064102eec84099eccfeb5a4b8a5f3f11f2b3a7efc7bb159fd9e2cfe9dfc7021a27eef2f1b8a14ae37ef3f5850a71385fa82e17ca63c6617a30e1bc3576e8ee08aac39ab0a21c7d06379bcc8bd197b3c4706285c7606cc6c43a9"}) 06:55:34 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0xc0189436, &(0x7f0000000200)=@urb_type_bulk={0x2, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 06:55:34 executing program 1: ioctl$USBDEVFS_SUBMITURB(0xffffffffffffffff, 0x8108551b, &(0x7f0000000200)=@urb_type_bulk={0x2, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 06:55:34 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x802c550a, &(0x7f0000000140)=@urb_type_iso={0x0, {}, 0x0, 0x0, &(0x7f0000000080), 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [{0x8, 0x5, 0x100}, {0x40, 0x5, 0x3}, {0x8000, 0x5, 0x1}, {0x8, 0x2, 0x7f}, {0x9, 0x0, 0x4d}, {0x9, 0x8b88, 0x1}, {0x81, 0x5, 0x3ff}, {0xffffffff, 0xfffffff7, 0x5}, {0x7fffffff, 0x417, 0x40}, {0x401, 0x1, 0x950}, {0x6, 0xfff, 0x4}, {0x0, 0x8, 0x8}, {0xcd6fcee5, 0x4, 0xffffffff}, {0x7, 0x9, 0x9}, {0x3230fea4, 0x1ff, 0x401}, {0xf3d, 0xad, 0x2}]}) [ 2901.458473][T12717] ? ioctl_preallocate+0x250/0x250 [ 2901.463550][T12717] ? __fget+0x407/0x490 [ 2901.467678][T12717] ? fget_many+0x20/0x20 [ 2901.471908][T12717] ? debug_smp_processor_id+0x20/0x20 [ 2901.477246][T12717] ? security_file_ioctl+0x7d/0xa0 [ 2901.482324][T12717] __x64_sys_ioctl+0xd4/0x110 [ 2901.486969][T12717] do_syscall_64+0xca/0x1c0 [ 2901.491445][T12717] entry_SYSCALL_64_after_hwframe+0x5c/0xc1 06:55:34 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040)=@security={'security\x00', 0xe, 0x4, 0x260, 0xffffffff, 0x180, 0xc0, 0xc0, 0xffffffff, 0xffffffff, 0x288, 0x288, 0x288, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x70, 0x98}, @common=@inet=@SET1={0x28}}, {{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@STANDARD={0x28}}, {{@ip={@rand_addr, @broadcast, 0x0, 0x0, 'batadv_slave_0\x00', 'ip_vti0\x00'}, 0x0, 0x70, 0x98}, @common=@unspec=@NFQUEUE0={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x2c0) ioctl$USBDEVFS_RESETEP(r0, 0x80045515, &(0x7f0000000080)) 06:55:34 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x802c550a, &(0x7f0000000140)=@urb_type_iso={0x0, {}, 0x0, 0x0, &(0x7f0000000080), 0x0, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, [{0x8, 0x5, 0x100}, {0x40, 0x5, 0x3}, {0x8000, 0x5, 0x1}, {0x8, 0x2, 0x7f}, {0x9, 0x0, 0x4d}, {0x9, 0x8b88, 0x1}, {0x81, 0x5, 0x3ff}, {0xffffffff, 0xfffffff7, 0x5}, {0x7fffffff, 0x417, 0x40}, {0x401, 0x1, 0x950}, {0x6, 0xfff, 0x4}, {0x0, 0x8, 0x8}, {0xcd6fcee5, 0x4, 0xffffffff}, {0x7, 0x9, 0x9}, {0x3230fea4, 0x1ff, 0x401}]}) 06:55:34 executing program 1: ioctl$USBDEVFS_SUBMITURB(0xffffffffffffffff, 0x8108551b, &(0x7f0000000200)=@urb_type_bulk={0x2, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 06:55:34 executing program 0: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f0000000200)=@urb_type_control={0x2, {0x2}, 0xfffffffb, 0x4, &(0x7f0000000a40)={0x80, 0x16, 0x2005, 0x7, 0x8}, 0x8, 0xf8, 0x7, 0x0, 0x0, 0x5, &(0x7f0000000a80)="cfc206af3b20cc76f92c2426377a243c9d8d6008fafd2fd67138c6b064102eec84099eccfeb5a4b8a5f3f11f2b3a7efc7bb159fd9e2cfe9dfc7021a27eef2f1b8a14ae37ef3f5850a71385fa82e17ca63c6617a30e1bc3576e8ee08aac39ab0a21c7d06379bcc8bd197b3c4706285c7606cc6c43a9"}) 06:55:34 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x802c550a, &(0x7f0000000140)=@urb_type_iso={0x0, {}, 0x0, 0x0, &(0x7f0000000080), 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, [{0x8, 0x5, 0x100}, {0x40, 0x5, 0x3}, {0x8000, 0x5, 0x1}, {0x8, 0x2, 0x7f}, {0x9, 0x0, 0x4d}, {0x9, 0x8b88, 0x1}, {0x81, 0x5, 0x3ff}, {0xffffffff, 0xfffffff7, 0x5}, {0x7fffffff, 0x417, 0x40}, {0x401, 0x1, 0x950}, {0x6, 0xfff, 0x4}, {0x0, 0x8, 0x8}, {0xcd6fcee5, 0x4, 0xffffffff}, {0x7, 0x9, 0x9}]}) 06:55:34 executing program 0: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f0000000200)=@urb_type_control={0x2, {0x2}, 0xfffffffb, 0x4, &(0x7f0000000a40)={0x80, 0x16, 0x2005, 0x7, 0x8}, 0x8, 0xf8, 0x7, 0x0, 0x0, 0x5, &(0x7f0000000a80)="cfc206af3b20cc76f92c2426377a243c9d8d6008fafd2fd67138c6b064102eec84099eccfeb5a4b8a5f3f11f2b3a7efc7bb159fd9e2cfe9dfc7021a27eef2f1b8a14ae37ef3f5850a71385fa82e17ca63c6617a30e1bc3576e8ee08aac39ab0a21c7d06379bcc8bd197b3c4706285c7606cc6c43a9"}) [ 2901.515816][T12744] FAULT_INJECTION: forcing a failure. [ 2901.515816][T12744] name failslab, interval 1, probability 0, space 0, times 0 [ 2901.531691][T12744] CPU: 1 PID: 12744 Comm: syz-executor.4 Not tainted 5.4.233-syzkaller-00019-gd5ed2ca98e48 #0 [ 2901.541930][T12744] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/14/2023 [ 2901.551972][T12744] Call Trace: [ 2901.555259][T12744] dump_stack+0x1d8/0x241 [ 2901.559587][T12744] ? panic+0x768/0x768 06:55:34 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x802c550a, &(0x7f0000000140)=@urb_type_iso={0x0, {}, 0x0, 0x0, &(0x7f0000000080), 0x0, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, [{0x8, 0x5, 0x100}, {0x40, 0x5, 0x3}, {0x8000, 0x5, 0x1}, {0x8, 0x2, 0x7f}, {0x9, 0x0, 0x4d}, {0x9, 0x8b88, 0x1}, {0x81, 0x5, 0x3ff}, {0xffffffff, 0xfffffff7, 0x5}, {0x7fffffff, 0x417, 0x40}, {0x401, 0x1, 0x950}, {0x6, 0xfff, 0x4}, {0x0, 0x8, 0x8}, {0xcd6fcee5, 0x4, 0xffffffff}]}) [ 2901.563652][T12744] ? nf_ct_l4proto_log_invalid+0x258/0x258 [ 2901.569453][T12744] should_fail+0x71f/0x880 [ 2901.573868][T12744] ? setup_fault_attr+0x3d0/0x3d0 [ 2901.578887][T12744] ? blk_alloc_flush_queue+0xd4/0x250 [ 2901.584252][T12744] should_failslab+0x5/0x20 [ 2901.588749][T12744] __kmalloc+0x51/0x2b0 [ 2901.592900][T12744] ? blk_alloc_flush_queue+0x72/0x250 [ 2901.598266][T12744] blk_alloc_flush_queue+0xd4/0x250 [ 2901.603484][T12744] blk_mq_realloc_hw_ctxs+0x99b/0x13b0 [ 2901.608917][T12744] blk_mq_init_allocated_queue+0x551/0x1470 [ 2901.614781][T12744] ? blk_alloc_queue_node+0x4ec/0x580 [ 2901.620123][T12744] blk_mq_init_queue+0x49/0xa0 [ 2901.624857][T12744] loop_add+0x25c/0x740 [ 2901.628986][T12744] ? get_pid_task+0xc3/0xf0 [ 2901.633459][T12744] ? radix_tree_lookup+0x16f/0x1c0 [ 2901.638540][T12744] loop_control_ioctl+0x448/0x620 [ 2901.643552][T12744] ? loop_remove+0xa0/0xa0 [ 2901.647936][T12744] ? memset+0x1f/0x40 [ 2901.651885][T12744] ? fsnotify+0x1280/0x1340 [ 2901.656355][T12744] ? loop_remove+0xa0/0xa0 [ 2901.660737][T12744] do_vfs_ioctl+0x742/0x1720 06:55:34 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) (fail_nth: 30) 06:55:34 executing program 0: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f0000000200)=@urb_type_control={0x2, {0x2}, 0xfffffffb, 0x4, &(0x7f0000000a40)={0x80, 0x16, 0x2005, 0x7, 0x8}, 0x8, 0xf8, 0x7, 0x0, 0x0, 0x5, &(0x7f0000000a80)="cfc206af3b20cc76f92c2426377a243c9d8d6008fafd2fd67138c6b064102eec84099eccfeb5a4b8a5f3f11f2b3a7efc7bb159fd9e2cfe9dfc7021a27eef2f1b8a14ae37ef3f5850a71385fa82e17ca63c6617a30e1bc3576e8ee08aac39ab0a21c7d06379bcc8bd197b3c4706285c7606cc6c43a9f9a4485fa40997c39a4da54d472ef5eb63dbcb"}) 06:55:34 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x802c550a, &(0x7f0000000140)=@urb_type_iso={0x0, {}, 0x0, 0x0, &(0x7f0000000080), 0x0, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, [{0x8, 0x5, 0x100}, {0x40, 0x5, 0x3}, {0x8000, 0x5, 0x1}, {0x8, 0x2, 0x7f}, {0x9, 0x0, 0x4d}, {0x9, 0x8b88, 0x1}, {0x81, 0x5, 0x3ff}, {0xffffffff, 0xfffffff7, 0x5}, {0x7fffffff, 0x417, 0x40}, {0x401, 0x1, 0x950}, {0x6, 0xfff, 0x4}, {0x0, 0x8, 0x8}]}) 06:55:34 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0xc020660b, &(0x7f0000000200)=@urb_type_bulk={0x2, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 06:55:34 executing program 1: r0 = syz_open_dev$usbfs(0x0, 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x8108551b, &(0x7f0000000200)=@urb_type_bulk={0x2, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 06:55:34 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040)=@security={'security\x00', 0xe, 0x4, 0x260, 0xffffffff, 0x180, 0xc0, 0xc0, 0xffffffff, 0xffffffff, 0x288, 0x288, 0x288, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x70, 0x98}, @common=@inet=@SET1={0x28}}, {{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@STANDARD={0x28}}, {{@ip={@rand_addr, @broadcast, 0x0, 0x0, 'batadv_slave_0\x00', 'ip_vti0\x00'}, 0x0, 0x70, 0x98}, @common=@unspec=@NFQUEUE0={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x2c0) ioctl$USBDEVFS_RESETEP(r0, 0x80045518, &(0x7f0000000080)) 06:55:34 executing program 0: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f0000000200)=@urb_type_control={0x2, {0x2}, 0xfffffffb, 0x4, &(0x7f0000000a40)={0x80, 0x16, 0x2005, 0x7, 0x8}, 0x8, 0xf8, 0x7, 0x0, 0x0, 0x5, &(0x7f0000000a80)="cfc206af3b20cc76f92c2426377a243c9d8d6008fafd2fd67138c6b064102eec84099eccfeb5a4b8a5f3f11f2b3a7efc7bb159fd9e2cfe9dfc7021a27eef2f1b8a14ae37ef3f5850a71385fa82e17ca63c6617a30e1bc3576e8ee08aac39ab0a21c7d06379bcc8bd197b3c4706285c7606cc6c43a9f9a4485fa40997c39a4da54d472ef5eb63dbcb"}) [ 2901.665297][T12744] ? ioctl_preallocate+0x250/0x250 [ 2901.670373][T12744] ? __fget+0x407/0x490 [ 2901.674498][T12744] ? fget_many+0x20/0x20 [ 2901.678709][T12744] ? debug_smp_processor_id+0x20/0x20 [ 2901.684048][T12744] ? security_file_ioctl+0x7d/0xa0 [ 2901.689127][T12744] __x64_sys_ioctl+0xd4/0x110 [ 2901.693774][T12744] do_syscall_64+0xca/0x1c0 [ 2901.698243][T12744] entry_SYSCALL_64_after_hwframe+0x5c/0xc1 06:55:34 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x802c550a, &(0x7f0000000200)=@urb_type_bulk={0x3, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 06:55:34 executing program 1: r0 = syz_open_dev$usbfs(0x0, 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x8108551b, &(0x7f0000000200)=@urb_type_bulk={0x2, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 06:55:34 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x802c550a, &(0x7f0000000140)=@urb_type_iso={0x0, {}, 0x0, 0x0, &(0x7f0000000080), 0x0, 0x0, 0x0, 0xb, 0x0, 0x0, 0x0, [{0x8, 0x5, 0x100}, {0x40, 0x5, 0x3}, {0x8000, 0x5, 0x1}, {0x8, 0x2, 0x7f}, {0x9, 0x0, 0x4d}, {0x9, 0x8b88, 0x1}, {0x81, 0x5, 0x3ff}, {0xffffffff, 0xfffffff7, 0x5}, {0x7fffffff, 0x417, 0x40}, {0x401, 0x1, 0x950}, {0x6, 0xfff, 0x4}]}) 06:55:34 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040)=@security={'security\x00', 0xe, 0x4, 0x260, 0xffffffff, 0x180, 0xc0, 0xc0, 0xffffffff, 0xffffffff, 0x288, 0x288, 0x288, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x70, 0x98}, @common=@inet=@SET1={0x28}}, {{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@STANDARD={0x28}}, {{@ip={@rand_addr, @broadcast, 0x0, 0x0, 'batadv_slave_0\x00', 'ip_vti0\x00'}, 0x0, 0x70, 0x98}, @common=@unspec=@NFQUEUE0={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x2c0) ioctl$USBDEVFS_RESETEP(r0, 0x80045519, &(0x7f0000000080)) [ 2901.732477][T12771] FAULT_INJECTION: forcing a failure. [ 2901.732477][T12771] name failslab, interval 1, probability 0, space 0, times 0 [ 2901.745342][T12771] CPU: 1 PID: 12771 Comm: syz-executor.4 Not tainted 5.4.233-syzkaller-00019-gd5ed2ca98e48 #0 [ 2901.755562][T12771] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/14/2023 [ 2901.765605][T12771] Call Trace: [ 2901.768892][T12771] dump_stack+0x1d8/0x241 [ 2901.773216][T12771] ? panic+0x768/0x768 [ 2901.777275][T12771] ? sbitmap_resize+0x399/0x430 06:55:34 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x802c550a, &(0x7f0000000200)=@urb_type_bulk={0x2, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) [ 2901.782115][T12771] ? nf_ct_l4proto_log_invalid+0x258/0x258 [ 2901.787910][T12771] ? find_next_and_bit+0xba/0x190 [ 2901.792929][T12771] should_fail+0x71f/0x880 [ 2901.797346][T12771] ? setup_fault_attr+0x3d0/0x3d0 [ 2901.802360][T12771] ? __alloc_disk_node+0x76/0x5a0 [ 2901.807376][T12771] should_failslab+0x5/0x20 [ 2901.811870][T12771] kmem_cache_alloc_trace+0x28/0x240 [ 2901.817150][T12771] __alloc_disk_node+0x76/0x5a0 [ 2901.821990][T12771] loop_add+0x315/0x740 [ 2901.826127][T12771] loop_control_ioctl+0x448/0x620 [ 2901.831125][T12771] ? loop_remove+0xa0/0xa0 [ 2901.835515][T12771] ? memset+0x1f/0x40 [ 2901.839469][T12771] ? fsnotify+0x1280/0x1340 [ 2901.843945][T12771] ? loop_remove+0xa0/0xa0 [ 2901.848330][T12771] do_vfs_ioctl+0x742/0x1720 [ 2901.852892][T12771] ? ioctl_preallocate+0x250/0x250 [ 2901.857972][T12771] ? __fget+0x407/0x490 [ 2901.862100][T12771] ? fget_many+0x20/0x20 [ 2901.866314][T12771] ? debug_smp_processor_id+0x20/0x20 [ 2901.871653][T12771] ? security_file_ioctl+0x7d/0xa0 [ 2901.876733][T12771] __x64_sys_ioctl+0xd4/0x110 06:55:34 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) (fail_nth: 31) 06:55:34 executing program 1: r0 = syz_open_dev$usbfs(0x0, 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x8108551b, &(0x7f0000000200)=@urb_type_bulk={0x2, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 06:55:34 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x802c550a, &(0x7f0000000200)=@urb_type_bulk={0x2, {0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 06:55:34 executing program 0: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f0000000200)=@urb_type_control={0x2, {0x2}, 0xfffffffb, 0x4, &(0x7f0000000a40)={0x80, 0x16, 0x2005, 0x7, 0x8}, 0x8, 0xf8, 0x7, 0x0, 0x0, 0x5, &(0x7f0000000a80)="cfc206af3b20cc76f92c2426377a243c9d8d6008fafd2fd67138c6b064102eec84099eccfeb5a4b8a5f3f11f2b3a7efc7bb159fd9e2cfe9dfc7021a27eef2f1b8a14ae37ef3f5850a71385fa82e17ca63c6617a30e1bc3576e8ee08aac39ab0a21c7d06379bcc8bd197b3c4706285c7606cc6c43a9f9a4485fa40997c39a4da54d472ef5eb63dbcb"}) 06:55:34 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x802c550a, &(0x7f0000000140)=@urb_type_iso={0x0, {}, 0x0, 0x0, &(0x7f0000000080), 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [{0x8, 0x5, 0x100}, {0x40, 0x5, 0x3}, {0x8000, 0x5, 0x1}, {0x8, 0x2, 0x7f}, {0x9, 0x0, 0x4d}, {0x9, 0x8b88, 0x1}, {0x81, 0x5, 0x3ff}, {0xffffffff, 0xfffffff7, 0x5}, {0x7fffffff, 0x417, 0x40}, {0x401, 0x1, 0x950}]}) 06:55:34 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040)=@security={'security\x00', 0xe, 0x4, 0x260, 0xffffffff, 0x180, 0xc0, 0xc0, 0xffffffff, 0xffffffff, 0x288, 0x288, 0x288, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x70, 0x98}, @common=@inet=@SET1={0x28}}, {{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@STANDARD={0x28}}, {{@ip={@rand_addr, @broadcast, 0x0, 0x0, 'batadv_slave_0\x00', 'ip_vti0\x00'}, 0x0, 0x70, 0x98}, @common=@unspec=@NFQUEUE0={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x2c0) ioctl$USBDEVFS_RESETEP(r0, 0x8004551a, &(0x7f0000000080)) 06:55:34 executing program 0: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f0000000200)=@urb_type_control={0x2, {0x2}, 0xfffffffb, 0x4, &(0x7f0000000a40)={0x80, 0x16, 0x2005, 0x7, 0x8}, 0x8, 0xf8, 0x7, 0x0, 0x0, 0x5, &(0x7f0000000a80)="cfc206af3b20cc76f92c2426377a243c9d8d6008fafd2fd67138c6b064102eec84099eccfeb5a4b8a5f3f11f2b3a7efc7bb159fd9e2cfe9dfc7021a27eef2f1b8a14ae37ef3f5850a71385fa82e17ca63c6617a30e1bc3576e8ee08aac39ab0a21c7d06379bcc8bd197b3c4706285c7606cc6c43a9f9a4485fa40997c39a4da54d472ef5eb63dbcb91c23e669d6e8836e226"}) 06:55:34 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040)=@security={'security\x00', 0xe, 0x4, 0x260, 0xffffffff, 0x180, 0xc0, 0xc0, 0xffffffff, 0xffffffff, 0x288, 0x288, 0x288, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x70, 0x98}, @common=@inet=@SET1={0x28}}, {{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@STANDARD={0x28}}, {{@ip={@rand_addr, @broadcast, 0x0, 0x0, 'batadv_slave_0\x00', 'ip_vti0\x00'}, 0x0, 0x70, 0x98}, @common=@unspec=@NFQUEUE0={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x2c0) ioctl$USBDEVFS_RESETEP(r0, 0x80085504, &(0x7f0000000080)) 06:55:34 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x802c550a, &(0x7f0000000140)=@urb_type_iso={0x0, {}, 0x0, 0x0, &(0x7f0000000080), 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, [{0x8, 0x5, 0x100}, {0x40, 0x5, 0x3}, {0x8000, 0x5, 0x1}, {0x8, 0x2, 0x7f}, {0x9, 0x0, 0x4d}, {0x9, 0x8b88, 0x1}, {0x81, 0x5, 0x3ff}, {0xffffffff, 0xfffffff7, 0x5}, {0x7fffffff, 0x417, 0x40}]}) [ 2901.881378][T12771] do_syscall_64+0xca/0x1c0 [ 2901.885851][T12771] entry_SYSCALL_64_after_hwframe+0x5c/0xc1 [ 2901.907727][T12788] FAULT_INJECTION: forcing a failure. [ 2901.907727][T12788] name failslab, interval 1, probability 0, space 0, times 0 06:55:34 executing program 1: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x0, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x8108551b, &(0x7f0000000200)=@urb_type_bulk={0x2, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 06:55:34 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x802c550a, &(0x7f0000000200)=@urb_type_bulk={0x2, {0x8}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 06:55:34 executing program 0: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f0000000200)=@urb_type_control={0x2, {0x2}, 0xfffffffb, 0x4, &(0x7f0000000a40)={0x80, 0x16, 0x2005, 0x7, 0x8}, 0x8, 0xf8, 0x7, 0x0, 0x0, 0x5, &(0x7f0000000a80)="cfc206af3b20cc76f92c2426377a243c9d8d6008fafd2fd67138c6b064102eec84099eccfeb5a4b8a5f3f11f2b3a7efc7bb159fd9e2cfe9dfc7021a27eef2f1b8a14ae37ef3f5850a71385fa82e17ca63c6617a30e1bc3576e8ee08aac39ab0a21c7d06379bcc8bd197b3c4706285c7606cc6c43a9f9a4485fa40997c39a4da54d472ef5eb63dbcb91c23e669d6e8836e226"}) [ 2901.929302][T12788] CPU: 1 PID: 12788 Comm: syz-executor.4 Not tainted 5.4.233-syzkaller-00019-gd5ed2ca98e48 #0 [ 2901.939580][T12788] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/14/2023 [ 2901.949663][T12788] Call Trace: [ 2901.952945][T12788] dump_stack+0x1d8/0x241 [ 2901.957268][T12788] ? panic+0x768/0x768 [ 2901.961338][T12788] ? nf_ct_l4proto_log_invalid+0x258/0x258 [ 2901.967135][T12788] ? pcpu_alloc_area+0x658/0x750 [ 2901.972070][T12788] should_fail+0x71f/0x880 [ 2901.976479][T12788] ? setup_fault_attr+0x3d0/0x3d0 [ 2901.981496][T12788] ? __alloc_disk_node+0x31e/0x5a0 [ 2901.986596][T12788] should_failslab+0x5/0x20 [ 2901.991095][T12788] kmem_cache_alloc_trace+0x28/0x240 [ 2901.996377][T12788] __alloc_disk_node+0x31e/0x5a0 [ 2902.001302][T12788] loop_add+0x315/0x740 [ 2902.005430][T12788] loop_control_ioctl+0x448/0x620 [ 2902.010427][T12788] ? loop_remove+0xa0/0xa0 [ 2902.014817][T12788] ? memset+0x1f/0x40 [ 2902.018776][T12788] ? fsnotify+0x1280/0x1340 [ 2902.023266][T12788] ? loop_remove+0xa0/0xa0 [ 2902.027660][T12788] do_vfs_ioctl+0x742/0x1720 06:55:34 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) (fail_nth: 32) 06:55:34 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x802c550a, &(0x7f0000000200)=@urb_type_bulk={0x2, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 06:55:34 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x802c550a, &(0x7f0000000140)=@urb_type_iso={0x0, {}, 0x0, 0x0, &(0x7f0000000080), 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, [{0x8, 0x5, 0x100}, {0x40, 0x5, 0x3}, {0x8000, 0x5, 0x1}, {0x8, 0x2, 0x7f}, {0x9, 0x0, 0x4d}, {0x9, 0x8b88, 0x1}, {0x81, 0x5, 0x3ff}, {0xffffffff, 0xfffffff7, 0x5}]}) 06:55:34 executing program 1: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x0, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x8108551b, &(0x7f0000000200)=@urb_type_bulk={0x2, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 06:55:34 executing program 0: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f0000000200)=@urb_type_control={0x2, {0x2}, 0xfffffffb, 0x4, &(0x7f0000000a40)={0x80, 0x16, 0x2005, 0x7, 0x8}, 0x8, 0xf8, 0x7, 0x0, 0x0, 0x5, &(0x7f0000000a80)="cfc206af3b20cc76f92c2426377a243c9d8d6008fafd2fd67138c6b064102eec84099eccfeb5a4b8a5f3f11f2b3a7efc7bb159fd9e2cfe9dfc7021a27eef2f1b8a14ae37ef3f5850a71385fa82e17ca63c6617a30e1bc3576e8ee08aac39ab0a21c7d06379bcc8bd197b3c4706285c7606cc6c43a9f9a4485fa40997c39a4da54d472ef5eb63dbcb91c23e669d6e8836e226"}) 06:55:34 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040)=@security={'security\x00', 0xe, 0x4, 0x260, 0xffffffff, 0x180, 0xc0, 0xc0, 0xffffffff, 0xffffffff, 0x288, 0x288, 0x288, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x70, 0x98}, @common=@inet=@SET1={0x28}}, {{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@STANDARD={0x28}}, {{@ip={@rand_addr, @broadcast, 0x0, 0x0, 'batadv_slave_0\x00', 'ip_vti0\x00'}, 0x0, 0x70, 0x98}, @common=@unspec=@NFQUEUE0={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x2c0) ioctl$USBDEVFS_RESETEP(r0, 0x8008550e, &(0x7f0000000080)) [ 2902.032315][T12788] ? ioctl_preallocate+0x250/0x250 [ 2902.037406][T12788] ? __fget+0x407/0x490 [ 2902.041535][T12788] ? fget_many+0x20/0x20 [ 2902.045836][T12788] ? debug_smp_processor_id+0x20/0x20 [ 2902.051278][T12788] ? security_file_ioctl+0x7d/0xa0 [ 2902.056363][T12788] __x64_sys_ioctl+0xd4/0x110 [ 2902.061029][T12788] do_syscall_64+0xca/0x1c0 [ 2902.065503][T12788] entry_SYSCALL_64_after_hwframe+0x5c/0xc1 06:55:34 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x802c550a, &(0x7f0000000200)=@urb_type_bulk={0x2, {}, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 06:55:34 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040)=@security={'security\x00', 0xe, 0x4, 0x260, 0xffffffff, 0x180, 0xc0, 0xc0, 0xffffffff, 0xffffffff, 0x288, 0x288, 0x288, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x70, 0x98}, @common=@inet=@SET1={0x28}}, {{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@STANDARD={0x28}}, {{@ip={@rand_addr, @broadcast, 0x0, 0x0, 'batadv_slave_0\x00', 'ip_vti0\x00'}, 0x0, 0x70, 0x98}, @common=@unspec=@NFQUEUE0={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x2c0) ioctl$USBDEVFS_RESETEP(r0, 0x8008551c, &(0x7f0000000080)) 06:55:34 executing program 0: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f0000000200)=@urb_type_control={0x2, {0x2}, 0xfffffffb, 0x4, &(0x7f0000000a40)={0x80, 0x16, 0x2005, 0x7, 0x8}, 0x8, 0xf8, 0x7, 0x0, 0x0, 0x5, &(0x7f0000000a80)="cfc206af3b20cc76f92c2426377a243c9d8d6008fafd2fd67138c6b064102eec84099eccfeb5a4b8a5f3f11f2b3a7efc7bb159fd9e2cfe9dfc7021a27eef2f1b8a14ae37ef3f5850a71385fa82e17ca63c6617a30e1bc3576e8ee08aac39ab0a21c7d06379bcc8bd197b3c4706285c7606cc6c43a9f9a4485fa40997c39a4da54d472ef5eb63dbcb91c23e669d6e8836e2269a1d466533"}) 06:55:34 executing program 1: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x0, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x8108551b, &(0x7f0000000200)=@urb_type_bulk={0x2, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) [ 2902.085811][T12812] FAULT_INJECTION: forcing a failure. [ 2902.085811][T12812] name failslab, interval 1, probability 0, space 0, times 0 [ 2902.101404][T12812] CPU: 1 PID: 12812 Comm: syz-executor.4 Not tainted 5.4.233-syzkaller-00019-gd5ed2ca98e48 #0 [ 2902.111675][T12812] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/14/2023 [ 2902.121722][T12812] Call Trace: [ 2902.125005][T12812] dump_stack+0x1d8/0x241 [ 2902.129331][T12812] ? panic+0x768/0x768 06:55:34 executing program 0: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f0000000200)=@urb_type_control={0x2, {0x2}, 0xfffffffb, 0x4, &(0x7f0000000a40)={0x80, 0x16, 0x2005, 0x7, 0x8}, 0x8, 0xf8, 0x7, 0x0, 0x0, 0x5, &(0x7f0000000a80)="cfc206af3b20cc76f92c2426377a243c9d8d6008fafd2fd67138c6b064102eec84099eccfeb5a4b8a5f3f11f2b3a7efc7bb159fd9e2cfe9dfc7021a27eef2f1b8a14ae37ef3f5850a71385fa82e17ca63c6617a30e1bc3576e8ee08aac39ab0a21c7d06379bcc8bd197b3c4706285c7606cc6c43a9f9a4485fa40997c39a4da54d472ef5eb63dbcb91c23e669d6e8836e2269a1d466533"}) 06:55:34 executing program 1: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x0) ioctl$USBDEVFS_SUBMITURB(r0, 0x8108551b, &(0x7f0000000200)=@urb_type_bulk={0x2, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) [ 2902.133392][T12812] ? nf_ct_l4proto_log_invalid+0x258/0x258 [ 2902.139193][T12812] should_fail+0x71f/0x880 [ 2902.143602][T12812] ? find_next_bit+0xc3/0x100 [ 2902.148274][T12812] ? setup_fault_attr+0x3d0/0x3d0 [ 2902.153295][T12812] ? rand_initialize_disk+0x4b/0xa3 [ 2902.158483][T12812] should_failslab+0x5/0x20 [ 2902.162978][T12812] kmem_cache_alloc_trace+0x28/0x240 [ 2902.168255][T12812] rand_initialize_disk+0x4b/0xa3 [ 2902.173270][T12812] __alloc_disk_node+0x3fd/0x5a0 [ 2902.178205][T12812] loop_add+0x315/0x740 [ 2902.182387][T12812] loop_control_ioctl+0x448/0x620 [ 2902.187409][T12812] ? loop_remove+0xa0/0xa0 [ 2902.191813][T12812] ? memset+0x1f/0x40 [ 2902.195766][T12812] ? fsnotify+0x1280/0x1340 [ 2902.200245][T12812] ? loop_remove+0xa0/0xa0 [ 2902.204663][T12812] do_vfs_ioctl+0x742/0x1720 [ 2902.209231][T12812] ? ioctl_preallocate+0x250/0x250 [ 2902.214311][T12812] ? __fget+0x407/0x490 [ 2902.218440][T12812] ? fget_many+0x20/0x20 [ 2902.222652][T12812] ? debug_smp_processor_id+0x20/0x20 [ 2902.227996][T12812] ? security_file_ioctl+0x7d/0xa0 06:55:35 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) (fail_nth: 33) 06:55:35 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x802c550a, &(0x7f0000000200)=@urb_type_bulk={0x2, {}, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 06:55:35 executing program 0: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f0000000200)=@urb_type_control={0x2, {0x2}, 0xfffffffb, 0x4, &(0x7f0000000a40)={0x80, 0x16, 0x2005, 0x7, 0x8}, 0x8, 0xf8, 0x7, 0x0, 0x0, 0x5, &(0x7f0000000a80)="cfc206af3b20cc76f92c2426377a243c9d8d6008fafd2fd67138c6b064102eec84099eccfeb5a4b8a5f3f11f2b3a7efc7bb159fd9e2cfe9dfc7021a27eef2f1b8a14ae37ef3f5850a71385fa82e17ca63c6617a30e1bc3576e8ee08aac39ab0a21c7d06379bcc8bd197b3c4706285c7606cc6c43a9f9a4485fa40997c39a4da54d472ef5eb63dbcb91c23e669d6e8836e2269a1d466533"}) 06:55:35 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x802c550a, &(0x7f0000000140)=@urb_type_iso={0x0, {}, 0x0, 0x0, &(0x7f0000000080), 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, [{0x8, 0x5, 0x100}, {0x40, 0x5, 0x3}, {0x8000, 0x5, 0x1}, {0x8, 0x2, 0x7f}, {0x9, 0x0, 0x4d}, {0x9, 0x8b88, 0x1}, {0x81, 0x5, 0x3ff}]}) 06:55:35 executing program 1: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x0) ioctl$USBDEVFS_SUBMITURB(r0, 0x8108551b, &(0x7f0000000200)=@urb_type_bulk={0x2, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 06:55:35 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040)=@security={'security\x00', 0xe, 0x4, 0x260, 0xffffffff, 0x180, 0xc0, 0xc0, 0xffffffff, 0xffffffff, 0x288, 0x288, 0x288, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x70, 0x98}, @common=@inet=@SET1={0x28}}, {{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@STANDARD={0x28}}, {{@ip={@rand_addr, @broadcast, 0x0, 0x0, 'batadv_slave_0\x00', 'ip_vti0\x00'}, 0x0, 0x70, 0x98}, @common=@unspec=@NFQUEUE0={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x2c0) ioctl$USBDEVFS_RESETEP(r0, 0x8008551d, &(0x7f0000000080)) 06:55:35 executing program 0: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f0000000200)=@urb_type_control={0x2, {0x2}, 0xfffffffb, 0x4, &(0x7f0000000a40)={0x80, 0x16, 0x2005, 0x7, 0x8}, 0x8, 0xf8, 0x7, 0x0, 0x0, 0x5, &(0x7f0000000a80)="cfc206af3b20cc76f92c2426377a243c9d8d6008fafd2fd67138c6b064102eec84099eccfeb5a4b8a5f3f11f2b3a7efc7bb159fd9e2cfe9dfc7021a27eef2f1b8a14ae37ef3f5850a71385fa82e17ca63c6617a30e1bc3576e8ee08aac39ab0a21c7d06379bcc8bd197b3c4706285c7606cc6c43a9f9a4485fa40997c39a4da54d472ef5eb63dbcb91c23e669d6e8836e2269a1d466533236e"}) 06:55:35 executing program 1: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x0) ioctl$USBDEVFS_SUBMITURB(r0, 0x8108551b, &(0x7f0000000200)=@urb_type_bulk={0x2, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 06:55:35 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x802c550a, &(0x7f0000000140)=@urb_type_iso={0x0, {}, 0x0, 0x0, &(0x7f0000000080), 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, [{0x8, 0x5, 0x100}, {0x40, 0x5, 0x3}, {0x8000, 0x5, 0x1}, {0x8, 0x2, 0x7f}, {0x9, 0x0, 0x4d}, {0x9, 0x8b88, 0x1}]}) 06:55:35 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x802c550a, &(0x7f0000000200)=@urb_type_bulk={0x2, {}, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) [ 2902.233074][T12812] __x64_sys_ioctl+0xd4/0x110 [ 2902.237722][T12812] do_syscall_64+0xca/0x1c0 [ 2902.242194][T12812] entry_SYSCALL_64_after_hwframe+0x5c/0xc1 06:55:35 executing program 0: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f0000000200)=@urb_type_control={0x2, {0x2}, 0xfffffffb, 0x4, &(0x7f0000000a40)={0x80, 0x16, 0x2005, 0x7, 0x8}, 0x8, 0xf8, 0x7, 0x0, 0x0, 0x5, &(0x7f0000000a80)="cfc206af3b20cc76f92c2426377a243c9d8d6008fafd2fd67138c6b064102eec84099eccfeb5a4b8a5f3f11f2b3a7efc7bb159fd9e2cfe9dfc7021a27eef2f1b8a14ae37ef3f5850a71385fa82e17ca63c6617a30e1bc3576e8ee08aac39ab0a21c7d06379bcc8bd197b3c4706285c7606cc6c43a9f9a4485fa40997c39a4da54d472ef5eb63dbcb91c23e669d6e8836e2269a1d466533236e"}) 06:55:35 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x802c550a, &(0x7f0000000200)=@urb_type_bulk={0x2, {}, 0x8000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) [ 2902.327560][T12858] FAULT_INJECTION: forcing a failure. [ 2902.327560][T12858] name failslab, interval 1, probability 0, space 0, times 0 [ 2902.340693][T12858] CPU: 1 PID: 12858 Comm: syz-executor.4 Not tainted 5.4.233-syzkaller-00019-gd5ed2ca98e48 #0 [ 2902.350906][T12858] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/14/2023 [ 2902.360940][T12858] Call Trace: [ 2902.364260][T12858] dump_stack+0x1d8/0x241 [ 2902.368563][T12858] ? panic+0x768/0x768 [ 2902.372600][T12858] ? nf_ct_l4proto_log_invalid+0x258/0x258 [ 2902.378376][T12858] ? arch_stack_walk+0x111/0x140 [ 2902.383285][T12858] should_fail+0x71f/0x880 [ 2902.387681][T12858] ? setup_fault_attr+0x3d0/0x3d0 [ 2902.392675][T12858] ? _raw_spin_unlock_irqrestore+0x57/0x80 [ 2902.398450][T12858] ? init_wait_entry+0xd0/0xd0 [ 2902.403180][T12858] ? blk_mq_init_tags+0x76/0x2d0 [ 2902.408084][T12858] should_failslab+0x5/0x20 [ 2902.412554][T12858] kmem_cache_alloc_trace+0x28/0x240 [ 2902.417812][T12858] blk_mq_init_tags+0x76/0x2d0 [ 2902.422546][T12858] ? blk_mq_hw_queue_to_node+0xe3/0x100 [ 2902.428066][T12858] blk_mq_alloc_rq_map+0x95/0x1a0 [ 2902.433061][T12858] blk_mq_init_sched+0x1d6/0xaf0 [ 2902.437968][T12858] elevator_init_mq+0x2cc/0x3e0 [ 2902.442789][T12858] __device_add_disk+0xf2/0x1220 [ 2902.447714][T12858] ? sprintf+0xd6/0x120 [ 2902.451844][T12858] ? hrtimer_init+0xc0/0x340 [ 2902.456412][T12858] ? device_add_disk+0x30/0x30 [ 2902.461170][T12858] ? vsprintf+0x30/0x30 [ 2902.465294][T12858] ? __alloc_disk_node+0x459/0x5a0 [ 2902.470377][T12858] loop_add+0x573/0x740 [ 2902.474509][T12858] loop_control_ioctl+0x448/0x620 [ 2902.479501][T12858] ? loop_remove+0xa0/0xa0 [ 2902.483887][T12858] ? memset+0x1f/0x40 [ 2902.487839][T12858] ? fsnotify+0x1280/0x1340 [ 2902.492334][T12858] ? loop_remove+0xa0/0xa0 [ 2902.496748][T12858] do_vfs_ioctl+0x742/0x1720 [ 2902.501316][T12858] ? ioctl_preallocate+0x250/0x250 [ 2902.506398][T12858] ? __fget+0x407/0x490 [ 2902.510523][T12858] ? fget_many+0x20/0x20 [ 2902.514735][T12858] ? debug_smp_processor_id+0x20/0x20 [ 2902.520082][T12858] ? security_file_ioctl+0x7d/0xa0 06:55:35 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) (fail_nth: 34) 06:55:35 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040)=@security={'security\x00', 0xe, 0x4, 0x260, 0xffffffff, 0x180, 0xc0, 0xc0, 0xffffffff, 0xffffffff, 0x288, 0x288, 0x288, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x70, 0x98}, @common=@inet=@SET1={0x28}}, {{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@STANDARD={0x28}}, {{@ip={@rand_addr, @broadcast, 0x0, 0x0, 'batadv_slave_0\x00', 'ip_vti0\x00'}, 0x0, 0x70, 0x98}, @common=@unspec=@NFQUEUE0={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x2c0) ioctl$USBDEVFS_RESETEP(r0, 0x80086601, &(0x7f0000000080)) 06:55:35 executing program 1: syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(0xffffffffffffffff, 0x8108551b, &(0x7f0000000200)=@urb_type_bulk={0x2, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 06:55:35 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x802c550a, &(0x7f0000000140)=@urb_type_iso={0x0, {}, 0x0, 0x0, &(0x7f0000000080), 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, [{0x8, 0x5, 0x100}, {0x40, 0x5, 0x3}, {0x8000, 0x5, 0x1}, {0x8, 0x2, 0x7f}, {0x9, 0x0, 0x4d}]}) 06:55:35 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x802c550a, &(0x7f0000000200)=@urb_type_bulk={0x2, {}, 0x7ff0bdbe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 06:55:35 executing program 0: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f0000000200)=@urb_type_control={0x2, {0x2}, 0xfffffffb, 0x4, &(0x7f0000000a40)={0x80, 0x16, 0x2005, 0x7, 0x8}, 0x8, 0xf8, 0x7, 0x0, 0x0, 0x5, &(0x7f0000000a80)="cfc206af3b20cc76f92c2426377a243c9d8d6008fafd2fd67138c6b064102eec84099eccfeb5a4b8a5f3f11f2b3a7efc7bb159fd9e2cfe9dfc7021a27eef2f1b8a14ae37ef3f5850a71385fa82e17ca63c6617a30e1bc3576e8ee08aac39ab0a21c7d06379bcc8bd197b3c4706285c7606cc6c43a9f9a4485fa40997c39a4da54d472ef5eb63dbcb91c23e669d6e8836e2269a1d466533236e"}) 06:55:35 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x802c550a, &(0x7f0000000140)=@urb_type_iso={0x0, {}, 0x0, 0x0, &(0x7f0000000080), 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, [{0x8, 0x5, 0x100}, {0x40, 0x5, 0x3}, {0x8000, 0x5, 0x1}, {0x8, 0x2, 0x7f}]}) 06:55:35 executing program 1: syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(0xffffffffffffffff, 0x8108551b, &(0x7f0000000200)=@urb_type_bulk={0x2, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 06:55:35 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040)=@security={'security\x00', 0xe, 0x4, 0x260, 0xffffffff, 0x180, 0xc0, 0xc0, 0xffffffff, 0xffffffff, 0x288, 0x288, 0x288, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x70, 0x98}, @common=@inet=@SET1={0x28}}, {{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@STANDARD={0x28}}, {{@ip={@rand_addr, @broadcast, 0x0, 0x0, 'batadv_slave_0\x00', 'ip_vti0\x00'}, 0x0, 0x70, 0x98}, @common=@unspec=@NFQUEUE0={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x2c0) ioctl$USBDEVFS_RESETEP(r0, 0x80087601, &(0x7f0000000080)) 06:55:35 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x802c550a, &(0x7f0000000200)=@urb_type_bulk={0x2, {}, 0xbebdf07f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) [ 2902.525168][T12858] __x64_sys_ioctl+0xd4/0x110 [ 2902.529817][T12858] do_syscall_64+0xca/0x1c0 [ 2902.534312][T12858] entry_SYSCALL_64_after_hwframe+0x5c/0xc1 [ 2902.540915][T12858] "mq-deadline" elevator initialization failed, falling back to "none" 06:55:35 executing program 1: syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(0xffffffffffffffff, 0x8108551b, &(0x7f0000000200)=@urb_type_bulk={0x2, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 06:55:35 executing program 0: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f0000000200)=@urb_type_control={0x2, {0x2}, 0xfffffffb, 0x4, &(0x7f0000000a40)={0x80, 0x16, 0x2005, 0x7, 0x8}, 0x8, 0xf8, 0x7, 0x0, 0x0, 0x5, &(0x7f0000000a80)="cfc206af3b20cc76f92c2426377a243c9d8d6008fafd2fd67138c6b064102eec84099eccfeb5a4b8a5f3f11f2b3a7efc7bb159fd9e2cfe9dfc7021a27eef2f1b8a14ae37ef3f5850a71385fa82e17ca63c6617a30e1bc3576e8ee08aac39ab0a21c7d06379bcc8bd197b3c4706285c7606cc6c43a9f9a4485fa40997c39a4da54d472ef5eb63dbcb91c23e669d6e8836e2269a1d466533236ed3"}) [ 2902.621340][T12868] FAULT_INJECTION: forcing a failure. [ 2902.621340][T12868] name failslab, interval 1, probability 0, space 0, times 0 [ 2902.634211][T12868] CPU: 1 PID: 12868 Comm: syz-executor.4 Not tainted 5.4.233-syzkaller-00019-gd5ed2ca98e48 #0 [ 2902.644422][T12868] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/14/2023 [ 2902.654519][T12868] Call Trace: [ 2902.657788][T12868] dump_stack+0x1d8/0x241 [ 2902.662093][T12868] ? panic+0x768/0x768 [ 2902.666143][T12868] ? nf_ct_l4proto_log_invalid+0x258/0x258 [ 2902.671930][T12868] ? blk_mq_init_tags+0x76/0x2d0 [ 2902.676837][T12868] ? blk_mq_init_sched+0x1d6/0xaf0 [ 2902.681919][T12868] ? elevator_init_mq+0x2cc/0x3e0 [ 2902.686916][T12868] ? __device_add_disk+0xf2/0x1220 [ 2902.691993][T12868] ? loop_control_ioctl+0x448/0x620 [ 2902.697160][T12868] ? do_vfs_ioctl+0x742/0x1720 [ 2902.701892][T12868] ? __x64_sys_ioctl+0xd4/0x110 [ 2902.706710][T12868] ? do_syscall_64+0xca/0x1c0 [ 2902.711360][T12868] should_fail+0x71f/0x880 [ 2902.715757][T12868] ? setup_fault_attr+0x3d0/0x3d0 [ 2902.720755][T12868] ? sbitmap_queue_init_node+0x164/0xf10 [ 2902.726361][T12868] should_failslab+0x5/0x20 [ 2902.730835][T12868] __kmalloc+0x51/0x2b0 [ 2902.734965][T12868] sbitmap_queue_init_node+0x164/0xf10 [ 2902.740394][T12868] ? blk_mq_init_tags+0x76/0x2d0 [ 2902.745297][T12868] blk_mq_init_tags+0x11d/0x2d0 [ 2902.750120][T12868] blk_mq_alloc_rq_map+0x95/0x1a0 [ 2902.755114][T12868] blk_mq_init_sched+0x1d6/0xaf0 [ 2902.760037][T12868] elevator_init_mq+0x2cc/0x3e0 [ 2902.764876][T12868] __device_add_disk+0xf2/0x1220 [ 2902.769792][T12868] ? sprintf+0xd6/0x120 [ 2902.773920][T12868] ? hrtimer_init+0xc0/0x340 [ 2902.778487][T12868] ? device_add_disk+0x30/0x30 [ 2902.783229][T12868] ? vsprintf+0x30/0x30 [ 2902.787385][T12868] ? __alloc_disk_node+0x459/0x5a0 [ 2902.792468][T12868] loop_add+0x573/0x740 [ 2902.796601][T12868] loop_control_ioctl+0x448/0x620 [ 2902.801614][T12868] ? loop_remove+0xa0/0xa0 [ 2902.806003][T12868] ? memset+0x1f/0x40 [ 2902.809954][T12868] ? fsnotify+0x1280/0x1340 [ 2902.814435][T12868] ? loop_remove+0xa0/0xa0 06:55:35 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) (fail_nth: 35) 06:55:35 executing program 1: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x8108551b, 0x0) 06:55:35 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x802c550a, &(0x7f0000000200)=@urb_type_bulk={0x2, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 06:55:35 executing program 0: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f0000000200)=@urb_type_control={0x2, {0x2}, 0xfffffffb, 0x4, &(0x7f0000000a40)={0x80, 0x16, 0x2005, 0x7, 0x8}, 0x8, 0xf8, 0x7, 0x0, 0x0, 0x5, &(0x7f0000000a80)="cfc206af3b20cc76f92c2426377a243c9d8d6008fafd2fd67138c6b064102eec84099eccfeb5a4b8a5f3f11f2b3a7efc7bb159fd9e2cfe9dfc7021a27eef2f1b8a14ae37ef3f5850a71385fa82e17ca63c6617a30e1bc3576e8ee08aac39ab0a21c7d06379bcc8bd197b3c4706285c7606cc6c43a9f9a4485fa40997c39a4da54d472ef5eb63dbcb91c23e669d6e8836e2269a1d466533236ed3"}) 06:55:35 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x802c550a, &(0x7f0000000140)=@urb_type_iso={0x0, {}, 0x0, 0x0, &(0x7f0000000080), 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, [{0x8, 0x5, 0x100}, {0x40, 0x5, 0x3}, {0x8000, 0x5, 0x1}]}) 06:55:35 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040)=@security={'security\x00', 0xe, 0x4, 0x260, 0xffffffff, 0x180, 0xc0, 0xc0, 0xffffffff, 0xffffffff, 0x288, 0x288, 0x288, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x70, 0x98}, @common=@inet=@SET1={0x28}}, {{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@STANDARD={0x28}}, {{@ip={@rand_addr, @broadcast, 0x0, 0x0, 'batadv_slave_0\x00', 'ip_vti0\x00'}, 0x0, 0x70, 0x98}, @common=@unspec=@NFQUEUE0={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x2c0) ioctl$USBDEVFS_RESETEP(r0, 0x8010550e, &(0x7f0000000080)) 06:55:35 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x802c550a, &(0x7f0000000140)=@urb_type_iso={0x0, {}, 0x0, 0x0, &(0x7f0000000080), 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, [{0x8, 0x5, 0x100}, {0x40, 0x5, 0x3}]}) 06:55:35 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x802c550a, &(0x7f0000000200)=@urb_type_bulk={0x2, {}, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 06:55:35 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040)=@security={'security\x00', 0xe, 0x4, 0x260, 0xffffffff, 0x180, 0xc0, 0xc0, 0xffffffff, 0xffffffff, 0x288, 0x288, 0x288, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x70, 0x98}, @common=@inet=@SET1={0x28}}, {{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@STANDARD={0x28}}, {{@ip={@rand_addr, @broadcast, 0x0, 0x0, 'batadv_slave_0\x00', 'ip_vti0\x00'}, 0x0, 0x70, 0x98}, @common=@unspec=@NFQUEUE0={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x2c0) ioctl$USBDEVFS_RESETEP(r0, 0x802c550a, &(0x7f0000000080)) [ 2902.818831][T12868] do_vfs_ioctl+0x742/0x1720 [ 2902.823401][T12868] ? ioctl_preallocate+0x250/0x250 [ 2902.828485][T12868] ? __fget+0x407/0x490 [ 2902.832616][T12868] ? fget_many+0x20/0x20 [ 2902.836831][T12868] ? debug_smp_processor_id+0x20/0x20 [ 2902.842176][T12868] ? security_file_ioctl+0x7d/0xa0 [ 2902.847293][T12868] __x64_sys_ioctl+0xd4/0x110 [ 2902.851944][T12868] do_syscall_64+0xca/0x1c0 [ 2902.856439][T12868] entry_SYSCALL_64_after_hwframe+0x5c/0xc1 [ 2902.862481][T12868] "mq-deadline" elevator initialization failed, falling back to "none" 06:55:35 executing program 1: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x8108551b, 0x0) 06:55:35 executing program 0: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f0000000200)=@urb_type_control={0x2, {0x2}, 0xfffffffb, 0x4, &(0x7f0000000a40)={0x80, 0x16, 0x2005, 0x7, 0x8}, 0x8, 0xf8, 0x7, 0x0, 0x0, 0x5, &(0x7f0000000a80)="cfc206af3b20cc76f92c2426377a243c9d8d6008fafd2fd67138c6b064102eec84099eccfeb5a4b8a5f3f11f2b3a7efc7bb159fd9e2cfe9dfc7021a27eef2f1b8a14ae37ef3f5850a71385fa82e17ca63c6617a30e1bc3576e8ee08aac39ab0a21c7d06379bcc8bd197b3c4706285c7606cc6c43a9f9a4485fa40997c39a4da54d472ef5eb63dbcb91c23e669d6e8836e2269a1d466533236ed3"}) 06:55:35 executing program 1: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x8108551b, 0x0) [ 2902.933600][T12893] FAULT_INJECTION: forcing a failure. [ 2902.933600][T12893] name failslab, interval 1, probability 0, space 0, times 0 [ 2902.947610][T12893] CPU: 1 PID: 12893 Comm: syz-executor.4 Not tainted 5.4.233-syzkaller-00019-gd5ed2ca98e48 #0 [ 2902.957869][T12893] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/14/2023 [ 2902.967924][T12893] Call Trace: [ 2902.971194][T12893] dump_stack+0x1d8/0x241 [ 2902.975505][T12893] ? panic+0x768/0x768 [ 2902.979550][T12893] ? nf_ct_l4proto_log_invalid+0x258/0x258 [ 2902.985327][T12893] ? pcpu_alloc_area+0x658/0x750 [ 2902.990263][T12893] should_fail+0x71f/0x880 [ 2902.994657][T12893] ? setup_fault_attr+0x3d0/0x3d0 [ 2902.999653][T12893] ? sbitmap_queue_init_node+0x64b/0xf10 [ 2903.005252][T12893] should_failslab+0x5/0x20 [ 2903.009726][T12893] kmem_cache_alloc_trace+0x28/0x240 [ 2903.014979][T12893] sbitmap_queue_init_node+0x64b/0xf10 [ 2903.020412][T12893] blk_mq_init_tags+0x11d/0x2d0 [ 2903.025319][T12893] blk_mq_alloc_rq_map+0x95/0x1a0 [ 2903.030316][T12893] blk_mq_init_sched+0x1d6/0xaf0 [ 2903.035226][T12893] elevator_init_mq+0x2cc/0x3e0 [ 2903.040055][T12893] __device_add_disk+0xf2/0x1220 [ 2903.044977][T12893] ? sprintf+0xd6/0x120 [ 2903.049100][T12893] ? hrtimer_init+0xc0/0x340 [ 2903.053656][T12893] ? device_add_disk+0x30/0x30 [ 2903.058388][T12893] ? vsprintf+0x30/0x30 [ 2903.062511][T12893] ? __alloc_disk_node+0x459/0x5a0 [ 2903.067589][T12893] loop_add+0x573/0x740 [ 2903.071716][T12893] loop_control_ioctl+0x448/0x620 [ 2903.076717][T12893] ? loop_remove+0xa0/0xa0 [ 2903.081101][T12893] ? memset+0x1f/0x40 [ 2903.085053][T12893] ? fsnotify+0x1280/0x1340 [ 2903.089525][T12893] ? loop_remove+0xa0/0xa0 [ 2903.093912][T12893] do_vfs_ioctl+0x742/0x1720 [ 2903.098474][T12893] ? ioctl_preallocate+0x250/0x250 [ 2903.103555][T12893] ? __fget+0x407/0x490 [ 2903.107679][T12893] ? fget_many+0x20/0x20 [ 2903.111894][T12893] ? debug_smp_processor_id+0x20/0x20 [ 2903.117233][T12893] ? security_file_ioctl+0x7d/0xa0 [ 2903.122311][T12893] __x64_sys_ioctl+0xd4/0x110 [ 2903.126955][T12893] do_syscall_64+0xca/0x1c0 06:55:35 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) (fail_nth: 36) 06:55:35 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x802c550a, &(0x7f0000000140)=@urb_type_iso={0x0, {}, 0x0, 0x0, &(0x7f0000000080), 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, [{0x8, 0x5, 0x100}]}) 06:55:35 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x802c550a, &(0x7f0000000200)=@urb_type_bulk={0x2, {}, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 06:55:35 executing program 0: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f0000000200)=@urb_type_control={0x2, {0x2}, 0xfffffffb, 0x4, &(0x7f0000000a40)={0x80, 0x16, 0x2005, 0x7, 0x8}, 0x8, 0xf8, 0x7, 0x0, 0x0, 0x5, &(0x7f0000000a80)="cfc206af3b20cc76f92c2426377a243c9d8d6008fafd2fd67138c6b064102eec84099eccfeb5a4b8a5f3f11f2b3a7efc7bb159fd9e2cfe9dfc7021a27eef2f1b8a14ae37ef3f5850a71385fa82e17ca63c6617a30e1bc3576e8ee08aac39ab0a21c7d06379bcc8bd197b3c4706285c7606cc6c43a9f9a4485fa40997c39a4da54d472ef5eb63dbcb91c23e669d6e8836e2269a1d466533236ed3"}) 06:55:35 executing program 1: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f0000000200)=@urb_type_control={0x2, {0x2}, 0xfffffffb, 0x4, &(0x7f0000000a40)={0x80, 0x16, 0x2005, 0x7, 0x8}, 0x8, 0xf8, 0x7, 0x0, 0x0, 0x5, &(0x7f0000000a80)="cfc206af3b20cc76f92c2426377a243c9d8d6008fafd2fd67138c6b064102eec84099eccfeb5a4b8a5f3f11f2b3a7efc7bb159fd9e2cfe9dfc7021a27eef2f1b8a14ae37ef3f5850a71385fa82e17ca63c6617a30e1bc3576e8ee08aac39ab0a21c7d06379bcc8bd197b3c4706285c7606cc6c43a9f9a4485fa40997c39a4da54d472ef5eb63dbcb91c23e669d6e8836e2269a1d466533"}) 06:55:35 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040)=@security={'security\x00', 0xe, 0x4, 0x260, 0xffffffff, 0x180, 0xc0, 0xc0, 0xffffffff, 0xffffffff, 0x288, 0x288, 0x288, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x70, 0x98}, @common=@inet=@SET1={0x28}}, {{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@STANDARD={0x28}}, {{@ip={@rand_addr, @broadcast, 0x0, 0x0, 'batadv_slave_0\x00', 'ip_vti0\x00'}, 0x0, 0x70, 0x98}, @common=@unspec=@NFQUEUE0={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x2c0) ioctl$USBDEVFS_RESETEP(r0, 0x8038550a, &(0x7f0000000080)) 06:55:35 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x802c550a, &(0x7f0000000200)=@urb_type_bulk={0x2, {}, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 06:55:35 executing program 0: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040)=@security={'security\x00', 0xe, 0x4, 0x260, 0xffffffff, 0x180, 0xc0, 0xc0, 0xffffffff, 0xffffffff, 0x288, 0x288, 0x288, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x70, 0x98}, @common=@inet=@SET1={0x28}}, {{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@STANDARD={0x28}}, {{@ip={@rand_addr, @broadcast, 0x0, 0x0, 'batadv_slave_0\x00', 'ip_vti0\x00'}, 0x0, 0x70, 0x98}, @common=@unspec=@NFQUEUE0={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x2c0) ioctl$USBDEVFS_RESETEP(r0, 0x80085504, &(0x7f0000000080)) 06:55:35 executing program 1: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x802c550a, &(0x7f0000000200)=@urb_type_bulk={0x2, {0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 06:55:35 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x802c550a, &(0x7f0000000140)=@urb_type_iso={0x0, {}, 0x0, 0x0, &(0x7f0000000080), 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, [{0x0, 0x5, 0x100}]}) 06:55:35 executing program 1: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040)=@security={'security\x00', 0xe, 0x4, 0x260, 0xffffffff, 0x180, 0xc0, 0xc0, 0xffffffff, 0xffffffff, 0x288, 0x288, 0x288, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x70, 0x98}, @common=@inet=@SET1={0x28}}, {{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@STANDARD={0x28}}, {{@ip={@rand_addr, @broadcast, 0x0, 0x0, 'batadv_slave_0\x00', 'ip_vti0\x00'}, 0x0, 0x70, 0x98}, @common=@unspec=@NFQUEUE0={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x2c0) ioctl$USBDEVFS_RESETEP(r0, 0x80045515, &(0x7f0000000080)) [ 2903.131427][T12893] entry_SYSCALL_64_after_hwframe+0x5c/0xc1 [ 2903.138054][T12893] "mq-deadline" elevator initialization failed, falling back to "none" 06:55:35 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040)=@security={'security\x00', 0xe, 0x4, 0x260, 0xffffffff, 0x180, 0xc0, 0xc0, 0xffffffff, 0xffffffff, 0x288, 0x288, 0x288, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x70, 0x98}, @common=@inet=@SET1={0x28}}, {{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@STANDARD={0x28}}, {{@ip={@rand_addr, @broadcast, 0x0, 0x0, 'batadv_slave_0\x00', 'ip_vti0\x00'}, 0x0, 0x70, 0x98}, @common=@unspec=@NFQUEUE0={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x2c0) ioctl$USBDEVFS_RESETEP(r0, 0x8108551b, &(0x7f0000000080)) [ 2903.216504][T12917] FAULT_INJECTION: forcing a failure. [ 2903.216504][T12917] name failslab, interval 1, probability 0, space 0, times 0 [ 2903.229617][T12917] CPU: 1 PID: 12917 Comm: syz-executor.4 Not tainted 5.4.233-syzkaller-00019-gd5ed2ca98e48 #0 [ 2903.239961][T12917] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/14/2023 [ 2903.249989][T12917] Call Trace: [ 2903.253256][T12917] dump_stack+0x1d8/0x241 [ 2903.257553][T12917] ? panic+0x768/0x768 [ 2903.261601][T12917] ? nf_ct_l4proto_log_invalid+0x258/0x258 [ 2903.267386][T12917] ? pcpu_alloc_area+0x658/0x750 [ 2903.272302][T12917] should_fail+0x71f/0x880 [ 2903.276698][T12917] ? setup_fault_attr+0x3d0/0x3d0 [ 2903.281695][T12917] ? sbitmap_queue_init_node+0x64b/0xf10 [ 2903.287296][T12917] should_failslab+0x5/0x20 [ 2903.291774][T12917] kmem_cache_alloc_trace+0x28/0x240 [ 2903.297027][T12917] sbitmap_queue_init_node+0x64b/0xf10 [ 2903.302455][T12917] blk_mq_init_tags+0x183/0x2d0 [ 2903.307273][T12917] blk_mq_alloc_rq_map+0x95/0x1a0 [ 2903.312264][T12917] blk_mq_init_sched+0x1d6/0xaf0 [ 2903.317171][T12917] elevator_init_mq+0x2cc/0x3e0 [ 2903.322007][T12917] __device_add_disk+0xf2/0x1220 [ 2903.326917][T12917] ? sprintf+0xd6/0x120 [ 2903.331040][T12917] ? hrtimer_init+0xc0/0x340 [ 2903.335611][T12917] ? device_add_disk+0x30/0x30 [ 2903.340359][T12917] ? vsprintf+0x30/0x30 [ 2903.344499][T12917] ? __alloc_disk_node+0x459/0x5a0 [ 2903.349579][T12917] loop_add+0x573/0x740 [ 2903.353718][T12917] loop_control_ioctl+0x448/0x620 [ 2903.358722][T12917] ? loop_remove+0xa0/0xa0 [ 2903.363117][T12917] ? memset+0x1f/0x40 [ 2903.367075][T12917] ? fsnotify+0x1280/0x1340 [ 2903.371550][T12917] ? loop_remove+0xa0/0xa0 [ 2903.375937][T12917] do_vfs_ioctl+0x742/0x1720 [ 2903.380499][T12917] ? ioctl_preallocate+0x250/0x250 [ 2903.385577][T12917] ? __fget+0x407/0x490 [ 2903.389708][T12917] ? fget_many+0x20/0x20 [ 2903.393918][T12917] ? debug_smp_processor_id+0x20/0x20 [ 2903.399258][T12917] ? security_file_ioctl+0x7d/0xa0 [ 2903.404336][T12917] __x64_sys_ioctl+0xd4/0x110 [ 2903.408982][T12917] do_syscall_64+0xca/0x1c0 06:55:36 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) (fail_nth: 37) 06:55:36 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x802c550a, &(0x7f0000000140)=@urb_type_iso={0x0, {}, 0x0, 0x0, &(0x7f0000000080), 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, [{0x0, 0x0, 0x100}]}) 06:55:36 executing program 0: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040)=@security={'security\x00', 0xe, 0x4, 0x260, 0xffffffff, 0x180, 0xc0, 0xc0, 0xffffffff, 0xffffffff, 0x288, 0x288, 0x288, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x70, 0x98}, @common=@inet=@SET1={0x28}}, {{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@STANDARD={0x28}}, {{@ip={@rand_addr, @broadcast, 0x0, 0x0, 'batadv_slave_0\x00', 'ip_vti0\x00'}, 0x0, 0x70, 0x98}, @common=@unspec=@NFQUEUE0={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x2c0) ioctl$USBDEVFS_RESETEP(r0, 0x80085504, &(0x7f0000000080)) 06:55:36 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x802c550a, &(0x7f0000000200)=@urb_type_bulk={0x2, {}, 0x0, 0x8000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 06:55:36 executing program 1: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040)=@security={'security\x00', 0xe, 0x4, 0x260, 0xffffffff, 0x180, 0xc0, 0xc0, 0xffffffff, 0xffffffff, 0x288, 0x288, 0x288, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x70, 0x98}, @common=@inet=@SET1={0x28}}, {{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@STANDARD={0x28}}, {{@ip={@rand_addr, @broadcast, 0x0, 0x0, 'batadv_slave_0\x00', 'ip_vti0\x00'}, 0x0, 0x70, 0x98}, @common=@unspec=@NFQUEUE0={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x2c0) ioctl$USBDEVFS_RESETEP(r0, 0x80045515, &(0x7f0000000080)) 06:55:36 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040)=@security={'security\x00', 0xe, 0x4, 0x260, 0xffffffff, 0x180, 0xc0, 0xc0, 0xffffffff, 0xffffffff, 0x288, 0x288, 0x288, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x70, 0x98}, @common=@inet=@SET1={0x28}}, {{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@STANDARD={0x28}}, {{@ip={@rand_addr, @broadcast, 0x0, 0x0, 'batadv_slave_0\x00', 'ip_vti0\x00'}, 0x0, 0x70, 0x98}, @common=@unspec=@NFQUEUE0={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x2c0) ioctl$USBDEVFS_RESETEP(r0, 0xc0045878, &(0x7f0000000080)) 06:55:36 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040)=@security={'security\x00', 0xe, 0x4, 0x260, 0xffffffff, 0x180, 0xc0, 0xc0, 0xffffffff, 0xffffffff, 0x288, 0x288, 0x288, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x70, 0x98}, @common=@inet=@SET1={0x28}}, {{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@STANDARD={0x28}}, {{@ip={@rand_addr, @broadcast, 0x0, 0x0, 'batadv_slave_0\x00', 'ip_vti0\x00'}, 0x0, 0x70, 0x98}, @common=@unspec=@NFQUEUE0={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x2c0) ioctl$USBDEVFS_RESETEP(r0, 0xc0045878, &(0x7f0000000080)) 06:55:36 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x802c550a, &(0x7f0000000140)=@urb_type_iso={0x0, {}, 0x0, 0x0, &(0x7f0000000080), 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, [{}]}) 06:55:36 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x802c550a, &(0x7f0000000200)=@urb_type_bulk={0x2, {}, 0x0, 0x7ff0bdbe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 06:55:36 executing program 1: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040)=@security={'security\x00', 0xe, 0x4, 0x260, 0xffffffff, 0x180, 0xc0, 0xc0, 0xffffffff, 0xffffffff, 0x288, 0x288, 0x288, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x70, 0x98}, @common=@inet=@SET1={0x28}}, {{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@STANDARD={0x28}}, {{@ip={@rand_addr, @broadcast, 0x0, 0x0, 'batadv_slave_0\x00', 'ip_vti0\x00'}, 0x0, 0x70, 0x98}, @common=@unspec=@NFQUEUE0={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x2c0) ioctl$USBDEVFS_RESETEP(r0, 0x80045515, &(0x7f0000000080)) 06:55:36 executing program 0: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040)=@security={'security\x00', 0xe, 0x4, 0x260, 0xffffffff, 0x180, 0xc0, 0xc0, 0xffffffff, 0xffffffff, 0x288, 0x288, 0x288, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x70, 0x98}, @common=@inet=@SET1={0x28}}, {{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@STANDARD={0x28}}, {{@ip={@rand_addr, @broadcast, 0x0, 0x0, 'batadv_slave_0\x00', 'ip_vti0\x00'}, 0x0, 0x70, 0x98}, @common=@unspec=@NFQUEUE0={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x2c0) ioctl$USBDEVFS_RESETEP(r0, 0x80085504, &(0x7f0000000080)) [ 2903.413456][T12917] entry_SYSCALL_64_after_hwframe+0x5c/0xc1 [ 2903.421524][T12917] "mq-deadline" elevator initialization failed, falling back to "none" 06:55:36 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040)=@security={'security\x00', 0xe, 0x4, 0x260, 0xffffffff, 0x180, 0xc0, 0xc0, 0xffffffff, 0xffffffff, 0x288, 0x288, 0x288, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x70, 0x98}, @common=@inet=@SET1={0x28}}, {{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@STANDARD={0x28}}, {{@ip={@rand_addr, @broadcast, 0x0, 0x0, 'batadv_slave_0\x00', 'ip_vti0\x00'}, 0x0, 0x70, 0x98}, @common=@unspec=@NFQUEUE0={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x2c0) ioctl$USBDEVFS_RESETEP(r0, 0xc00c5512, &(0x7f0000000080)) [ 2903.498110][T12940] FAULT_INJECTION: forcing a failure. [ 2903.498110][T12940] name failslab, interval 1, probability 0, space 0, times 0 [ 2903.511177][T12940] CPU: 1 PID: 12940 Comm: syz-executor.4 Not tainted 5.4.233-syzkaller-00019-gd5ed2ca98e48 #0 [ 2903.521516][T12940] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/14/2023 [ 2903.531545][T12940] Call Trace: [ 2903.534819][T12940] dump_stack+0x1d8/0x241 [ 2903.539132][T12940] ? panic+0x768/0x768 [ 2903.543198][T12940] ? nf_ct_l4proto_log_invalid+0x258/0x258 [ 2903.548983][T12940] should_fail+0x71f/0x880 [ 2903.553371][T12940] ? kmem_cache_alloc_trace+0xd7/0x240 [ 2903.558800][T12940] ? setup_fault_attr+0x3d0/0x3d0 [ 2903.563805][T12940] ? blk_mq_alloc_rq_map+0xb5/0x1a0 [ 2903.568974][T12940] should_failslab+0x5/0x20 [ 2903.575546][T12940] __kmalloc+0x51/0x2b0 [ 2903.579687][T12940] blk_mq_alloc_rq_map+0xb5/0x1a0 [ 2903.584680][T12940] blk_mq_init_sched+0x1d6/0xaf0 [ 2903.589586][T12940] elevator_init_mq+0x2cc/0x3e0 [ 2903.594407][T12940] __device_add_disk+0xf2/0x1220 [ 2903.599331][T12940] ? sprintf+0xd6/0x120 [ 2903.603461][T12940] ? hrtimer_init+0xc0/0x340 [ 2903.608017][T12940] ? device_add_disk+0x30/0x30 [ 2903.612871][T12940] ? vsprintf+0x30/0x30 [ 2903.616997][T12940] ? __alloc_disk_node+0x459/0x5a0 [ 2903.622078][T12940] loop_add+0x573/0x740 [ 2903.626207][T12940] loop_control_ioctl+0x448/0x620 [ 2903.631199][T12940] ? loop_remove+0xa0/0xa0 [ 2903.635584][T12940] ? memset+0x1f/0x40 [ 2903.639533][T12940] ? fsnotify+0x1280/0x1340 [ 2903.644017][T12940] ? loop_remove+0xa0/0xa0 [ 2903.648405][T12940] do_vfs_ioctl+0x742/0x1720 [ 2903.652963][T12940] ? ioctl_preallocate+0x250/0x250 [ 2903.658040][T12940] ? __fget+0x407/0x490 [ 2903.662184][T12940] ? fget_many+0x20/0x20 [ 2903.666408][T12940] ? debug_smp_processor_id+0x20/0x20 [ 2903.671748][T12940] ? security_file_ioctl+0x7d/0xa0 [ 2903.676833][T12940] __x64_sys_ioctl+0xd4/0x110 [ 2903.681484][T12940] do_syscall_64+0xca/0x1c0 [ 2903.685957][T12940] entry_SYSCALL_64_after_hwframe+0x5c/0xc1 06:55:36 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) (fail_nth: 38) 06:55:36 executing program 1: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_RESETEP(r0, 0x80045515, &(0x7f0000000080)) 06:55:36 executing program 0: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_RESETEP(r0, 0x80085504, &(0x7f0000000080)) 06:55:36 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x802c550a, &(0x7f0000000200)=@urb_type_bulk={0x2, {}, 0x0, 0xbebdf07f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 06:55:36 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0xc0189436, &(0x7f0000000200)=@urb_type_bulk={0x2, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 06:55:36 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040)=@security={'security\x00', 0xe, 0x4, 0x260, 0xffffffff, 0x180, 0xc0, 0xc0, 0xffffffff, 0xffffffff, 0x288, 0x288, 0x288, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x70, 0x98}, @common=@inet=@SET1={0x28}}, {{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@STANDARD={0x28}}, {{@ip={@rand_addr, @broadcast, 0x0, 0x0, 'batadv_slave_0\x00', 'ip_vti0\x00'}, 0x0, 0x70, 0x98}, @common=@unspec=@NFQUEUE0={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x2c0) ioctl$USBDEVFS_RESETEP(r0, 0xc0105500, &(0x7f0000000080)) 06:55:36 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x802c550a, &(0x7f0000000200)=@urb_type_bulk={0x2, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 06:55:36 executing program 1: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_RESETEP(r0, 0x80045515, &(0x7f0000000080)) [ 2903.692619][T12940] "mq-deadline" elevator initialization failed, falling back to "none" 06:55:36 executing program 0: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_RESETEP(r0, 0x80085504, &(0x7f0000000080)) 06:55:36 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0xc0185500, &(0x7f0000000200)=@urb_type_bulk={0x2, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 06:55:36 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x802c550a, &(0x7f0000000200)=@urb_type_bulk={0x2, {}, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 06:55:36 executing program 1: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_RESETEP(r0, 0x80045515, &(0x7f0000000080)) [ 2903.730265][T12964] usb usb8: usbfs: process 12964 (syz-executor.0) did not claim interface 0 before use [ 2903.750131][T12963] FAULT_INJECTION: forcing a failure. [ 2903.750131][T12963] name failslab, interval 1, probability 0, space 0, times 0 [ 2903.756898][T12972] usb usb8: usbfs: process 12972 (syz-executor.0) did not claim interface 0 before use [ 2903.780104][T12963] CPU: 0 PID: 12963 Comm: syz-executor.4 Not tainted 5.4.233-syzkaller-00019-gd5ed2ca98e48 #0 [ 2903.790342][T12963] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/14/2023 [ 2903.800388][T12963] Call Trace: [ 2903.803667][T12963] dump_stack+0x1d8/0x241 [ 2903.808002][T12963] ? panic+0x768/0x768 [ 2903.812043][T12963] ? nf_ct_l4proto_log_invalid+0x258/0x258 [ 2903.817831][T12963] should_fail+0x71f/0x880 [ 2903.822220][T12963] ? setup_fault_attr+0x3d0/0x3d0 [ 2903.827216][T12963] ? blk_mq_alloc_rq_map+0xeb/0x1a0 [ 2903.832380][T12963] should_failslab+0x5/0x20 [ 2903.836871][T12963] __kmalloc+0x51/0x2b0 [ 2903.841014][T12963] blk_mq_alloc_rq_map+0xeb/0x1a0 [ 2903.846006][T12963] blk_mq_init_sched+0x1d6/0xaf0 [ 2903.850920][T12963] elevator_init_mq+0x2cc/0x3e0 [ 2903.855743][T12963] __device_add_disk+0xf2/0x1220 [ 2903.860649][T12963] ? sprintf+0xd6/0x120 [ 2903.864772][T12963] ? hrtimer_init+0xc0/0x340 [ 2903.869341][T12963] ? device_add_disk+0x30/0x30 [ 2903.874072][T12963] ? vsprintf+0x30/0x30 [ 2903.878195][T12963] ? __alloc_disk_node+0x459/0x5a0 [ 2903.883275][T12963] loop_add+0x573/0x740 [ 2903.887401][T12963] loop_control_ioctl+0x448/0x620 [ 2903.892394][T12963] ? loop_remove+0xa0/0xa0 [ 2903.896780][T12963] ? memset+0x1f/0x40 [ 2903.900733][T12963] ? fsnotify+0x1280/0x1340 [ 2903.905204][T12963] ? loop_remove+0xa0/0xa0 [ 2903.909588][T12963] do_vfs_ioctl+0x742/0x1720 [ 2903.914164][T12963] ? ioctl_preallocate+0x250/0x250 [ 2903.919245][T12963] ? __fget+0x407/0x490 [ 2903.923366][T12963] ? fget_many+0x20/0x20 06:55:36 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) (fail_nth: 39) 06:55:36 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040)=@security={'security\x00', 0xe, 0x4, 0x260, 0xffffffff, 0x180, 0xc0, 0xc0, 0xffffffff, 0xffffffff, 0x288, 0x288, 0x288, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x70, 0x98}, @common=@inet=@SET1={0x28}}, {{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@STANDARD={0x28}}, {{@ip={@rand_addr, @broadcast, 0x0, 0x0, 'batadv_slave_0\x00', 'ip_vti0\x00'}, 0x0, 0x70, 0x98}, @common=@unspec=@NFQUEUE0={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x2c0) ioctl$USBDEVFS_RESETEP(r0, 0xc0105502, &(0x7f0000000080)) 06:55:36 executing program 0: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_RESETEP(r0, 0x80085504, &(0x7f0000000080)) 06:55:36 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0xc0185500, &(0x7f0000000200)=@urb_type_bulk={0x2, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 06:55:36 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x802c550a, &(0x7f0000000200)=@urb_type_bulk={0x2, {}, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 06:55:36 executing program 1: setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040)=@security={'security\x00', 0xe, 0x4, 0x260, 0xffffffff, 0x180, 0xc0, 0xc0, 0xffffffff, 0xffffffff, 0x288, 0x288, 0x288, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x70, 0x98}, @common=@inet=@SET1={0x28}}, {{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@STANDARD={0x28}}, {{@ip={@rand_addr, @broadcast, 0x0, 0x0, 'batadv_slave_0\x00', 'ip_vti0\x00'}, 0x0, 0x70, 0x98}, @common=@unspec=@NFQUEUE0={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x2c0) ioctl$USBDEVFS_RESETEP(0xffffffffffffffff, 0x80045515, &(0x7f0000000080)) [ 2903.927575][T12963] ? debug_smp_processor_id+0x20/0x20 [ 2903.932915][T12963] ? security_file_ioctl+0x7d/0xa0 [ 2903.937994][T12963] __x64_sys_ioctl+0xd4/0x110 [ 2903.942644][T12963] do_syscall_64+0xca/0x1c0 [ 2903.947125][T12963] entry_SYSCALL_64_after_hwframe+0x5c/0xc1 [ 2903.954418][T12963] "mq-deadline" elevator initialization failed, falling back to "none" 06:55:36 executing program 1: setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040)=@security={'security\x00', 0xe, 0x4, 0x260, 0xffffffff, 0x180, 0xc0, 0xc0, 0xffffffff, 0xffffffff, 0x288, 0x288, 0x288, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x70, 0x98}, @common=@inet=@SET1={0x28}}, {{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@STANDARD={0x28}}, {{@ip={@rand_addr, @broadcast, 0x0, 0x0, 'batadv_slave_0\x00', 'ip_vti0\x00'}, 0x0, 0x70, 0x98}, @common=@unspec=@NFQUEUE0={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x2c0) ioctl$USBDEVFS_RESETEP(0xffffffffffffffff, 0x80045515, &(0x7f0000000080)) 06:55:36 executing program 0: setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040)=@security={'security\x00', 0xe, 0x4, 0x260, 0xffffffff, 0x180, 0xc0, 0xc0, 0xffffffff, 0xffffffff, 0x288, 0x288, 0x288, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x70, 0x98}, @common=@inet=@SET1={0x28}}, {{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@STANDARD={0x28}}, {{@ip={@rand_addr, @broadcast, 0x0, 0x0, 'batadv_slave_0\x00', 'ip_vti0\x00'}, 0x0, 0x70, 0x98}, @common=@unspec=@NFQUEUE0={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x2c0) ioctl$USBDEVFS_RESETEP(0xffffffffffffffff, 0x80085504, &(0x7f0000000080)) 06:55:36 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0xc0185500, &(0x7f0000000200)=@urb_type_bulk={0x2, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 06:55:36 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040)=@security={'security\x00', 0xe, 0x4, 0x260, 0xffffffff, 0x180, 0xc0, 0xc0, 0xffffffff, 0xffffffff, 0x288, 0x288, 0x288, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x70, 0x98}, @common=@inet=@SET1={0x28}}, {{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@STANDARD={0x28}}, {{@ip={@rand_addr, @broadcast, 0x0, 0x0, 'batadv_slave_0\x00', 'ip_vti0\x00'}, 0x0, 0x70, 0x98}, @common=@unspec=@NFQUEUE0={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x2c0) ioctl$USBDEVFS_RESETEP(r0, 0xc0105512, &(0x7f0000000080)) 06:55:36 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x802c550a, &(0x7f0000000200)=@urb_type_bulk={0x2, {}, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 06:55:36 executing program 0: setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040)=@security={'security\x00', 0xe, 0x4, 0x260, 0xffffffff, 0x180, 0xc0, 0xc0, 0xffffffff, 0xffffffff, 0x288, 0x288, 0x288, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x70, 0x98}, @common=@inet=@SET1={0x28}}, {{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@STANDARD={0x28}}, {{@ip={@rand_addr, @broadcast, 0x0, 0x0, 'batadv_slave_0\x00', 'ip_vti0\x00'}, 0x0, 0x70, 0x98}, @common=@unspec=@NFQUEUE0={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x2c0) ioctl$USBDEVFS_RESETEP(0xffffffffffffffff, 0x80085504, &(0x7f0000000080)) [ 2903.982249][T12985] usb usb8: usbfs: process 12985 (syz-executor.0) did not claim interface 0 before use [ 2904.039626][T13001] FAULT_INJECTION: forcing a failure. [ 2904.039626][T13001] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2904.052907][T13001] CPU: 0 PID: 13001 Comm: syz-executor.4 Not tainted 5.4.233-syzkaller-00019-gd5ed2ca98e48 #0 [ 2904.063119][T13001] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/14/2023 [ 2904.073146][T13001] Call Trace: [ 2904.076410][T13001] dump_stack+0x1d8/0x241 [ 2904.080710][T13001] ? panic+0x768/0x768 [ 2904.084744][T13001] ? nf_ct_l4proto_log_invalid+0x258/0x258 [ 2904.090519][T13001] ? stack_trace_save+0x118/0x1c0 [ 2904.095529][T13001] ? stack_trace_snprint+0x170/0x170 [ 2904.100787][T13001] ? blk_mq_alloc_rq_map+0x95/0x1a0 [ 2904.105954][T13001] should_fail+0x71f/0x880 [ 2904.110339][T13001] ? __kasan_kmalloc+0x199/0x1d0 [ 2904.115249][T13001] ? setup_fault_attr+0x3d0/0x3d0 [ 2904.120238][T13001] ? __kasan_kmalloc+0x199/0x1d0 [ 2904.125141][T13001] ? loop_add+0x573/0x740 [ 2904.129469][T13001] ? blk_mq_alloc_rq_map+0xeb/0x1a0 [ 2904.134639][T13001] ? blk_mq_init_sched+0x1d6/0xaf0 [ 2904.139719][T13001] __alloc_pages_nodemask+0x1b4/0x840 [ 2904.145077][T13001] ? gfp_pfmemalloc_allowed+0x120/0x120 [ 2904.150606][T13001] ? find_next_bit+0x7b/0x100 [ 2904.155252][T13001] ? blk_mq_hw_queue_to_node+0xe3/0x100 [ 2904.160769][T13001] blk_mq_alloc_rqs+0x230/0x660 [ 2904.165785][T13001] blk_mq_init_sched+0x245/0xaf0 [ 2904.170714][T13001] elevator_init_mq+0x2cc/0x3e0 [ 2904.175533][T13001] __device_add_disk+0xf2/0x1220 [ 2904.180527][T13001] ? sprintf+0xd6/0x120 [ 2904.184651][T13001] ? hrtimer_init+0xc0/0x340 [ 2904.189224][T13001] ? device_add_disk+0x30/0x30 [ 2904.193954][T13001] ? vsprintf+0x30/0x30 [ 2904.198086][T13001] ? __alloc_disk_node+0x459/0x5a0 [ 2904.203185][T13001] loop_add+0x573/0x740 [ 2904.207327][T13001] loop_control_ioctl+0x448/0x620 [ 2904.212427][T13001] ? loop_remove+0xa0/0xa0 [ 2904.216813][T13001] ? memset+0x1f/0x40 [ 2904.220768][T13001] ? fsnotify+0x1280/0x1340 [ 2904.225239][T13001] ? loop_remove+0xa0/0xa0 [ 2904.229630][T13001] do_vfs_ioctl+0x742/0x1720 [ 2904.234192][T13001] ? ioctl_preallocate+0x250/0x250 06:55:37 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) (fail_nth: 40) 06:55:37 executing program 1: setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040)=@security={'security\x00', 0xe, 0x4, 0x260, 0xffffffff, 0x180, 0xc0, 0xc0, 0xffffffff, 0xffffffff, 0x288, 0x288, 0x288, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x70, 0x98}, @common=@inet=@SET1={0x28}}, {{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@STANDARD={0x28}}, {{@ip={@rand_addr, @broadcast, 0x0, 0x0, 'batadv_slave_0\x00', 'ip_vti0\x00'}, 0x0, 0x70, 0x98}, @common=@unspec=@NFQUEUE0={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x2c0) ioctl$USBDEVFS_RESETEP(0xffffffffffffffff, 0x80045515, &(0x7f0000000080)) 06:55:37 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x802c550a, &(0x7f0000000200)=@urb_type_bulk={0x2, {}, 0x0, 0x0, 0x0, 0x8000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 06:55:37 executing program 3: ioctl$USBDEVFS_SUBMITURB(0xffffffffffffffff, 0xc0185500, &(0x7f0000000200)=@urb_type_bulk={0x2, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 06:55:37 executing program 0: setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040)=@security={'security\x00', 0xe, 0x4, 0x260, 0xffffffff, 0x180, 0xc0, 0xc0, 0xffffffff, 0xffffffff, 0x288, 0x288, 0x288, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x70, 0x98}, @common=@inet=@SET1={0x28}}, {{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@STANDARD={0x28}}, {{@ip={@rand_addr, @broadcast, 0x0, 0x0, 'batadv_slave_0\x00', 'ip_vti0\x00'}, 0x0, 0x70, 0x98}, @common=@unspec=@NFQUEUE0={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x2c0) ioctl$USBDEVFS_RESETEP(0xffffffffffffffff, 0x80085504, &(0x7f0000000080)) 06:55:37 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040)=@security={'security\x00', 0xe, 0x4, 0x260, 0xffffffff, 0x180, 0xc0, 0xc0, 0xffffffff, 0xffffffff, 0x288, 0x288, 0x288, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x70, 0x98}, @common=@inet=@SET1={0x28}}, {{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@STANDARD={0x28}}, {{@ip={@rand_addr, @broadcast, 0x0, 0x0, 'batadv_slave_0\x00', 'ip_vti0\x00'}, 0x0, 0x70, 0x98}, @common=@unspec=@NFQUEUE0={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x2c0) ioctl$USBDEVFS_RESETEP(r0, 0xc0185500, &(0x7f0000000080)) 06:55:37 executing program 3: ioctl$USBDEVFS_SUBMITURB(0xffffffffffffffff, 0xc0185500, &(0x7f0000000200)=@urb_type_bulk={0x2, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 06:55:37 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x802c550a, &(0x7f0000000200)=@urb_type_bulk={0x2, {}, 0x0, 0x0, 0x0, 0x7ff0bdbe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 06:55:37 executing program 1: r0 = syz_open_dev$usbfs(0x0, 0x76, 0x8101) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040)=@security={'security\x00', 0xe, 0x4, 0x260, 0xffffffff, 0x180, 0xc0, 0xc0, 0xffffffff, 0xffffffff, 0x288, 0x288, 0x288, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x70, 0x98}, @common=@inet=@SET1={0x28}}, {{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@STANDARD={0x28}}, {{@ip={@rand_addr, @broadcast, 0x0, 0x0, 'batadv_slave_0\x00', 'ip_vti0\x00'}, 0x0, 0x70, 0x98}, @common=@unspec=@NFQUEUE0={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x2c0) ioctl$USBDEVFS_RESETEP(r0, 0x80045515, &(0x7f0000000080)) 06:55:37 executing program 3: ioctl$USBDEVFS_SUBMITURB(0xffffffffffffffff, 0xc0185500, &(0x7f0000000200)=@urb_type_bulk={0x2, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 06:55:37 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040)=@security={'security\x00', 0xe, 0x4, 0x260, 0xffffffff, 0x180, 0xc0, 0xc0, 0xffffffff, 0xffffffff, 0x288, 0x288, 0x288, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x70, 0x98}, @common=@inet=@SET1={0x28}}, {{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@STANDARD={0x28}}, {{@ip={@rand_addr, @broadcast, 0x0, 0x0, 'batadv_slave_0\x00', 'ip_vti0\x00'}, 0x0, 0x70, 0x98}, @common=@unspec=@NFQUEUE0={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x2c0) ioctl$USBDEVFS_RESETEP(r0, 0xc0185502, &(0x7f0000000080)) 06:55:37 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x802c550a, &(0x7f0000000200)=@urb_type_bulk={0x2, {}, 0x0, 0x0, 0x0, 0xbebdf07f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) [ 2904.239287][T13001] ? __fget+0x407/0x490 [ 2904.243428][T13001] ? fget_many+0x20/0x20 [ 2904.247642][T13001] ? debug_smp_processor_id+0x20/0x20 [ 2904.252991][T13001] ? security_file_ioctl+0x7d/0xa0 [ 2904.258157][T13001] __x64_sys_ioctl+0xd4/0x110 [ 2904.262802][T13001] do_syscall_64+0xca/0x1c0 [ 2904.267275][T13001] entry_SYSCALL_64_after_hwframe+0x5c/0xc1 [ 2904.344227][T13011] FAULT_INJECTION: forcing a failure. [ 2904.344227][T13011] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2904.358015][T13011] CPU: 0 PID: 13011 Comm: syz-executor.4 Not tainted 5.4.233-syzkaller-00019-gd5ed2ca98e48 #0 [ 2904.368269][T13011] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/14/2023 [ 2904.378351][T13011] Call Trace: [ 2904.381625][T13011] dump_stack+0x1d8/0x241 [ 2904.385924][T13011] ? panic+0x768/0x768 [ 2904.389979][T13011] ? nf_ct_l4proto_log_invalid+0x258/0x258 [ 2904.395755][T13011] should_fail+0x71f/0x880 [ 2904.400141][T13011] ? __kasan_kmalloc+0x199/0x1d0 [ 2904.405063][T13011] ? setup_fault_attr+0x3d0/0x3d0 [ 2904.410055][T13011] ? __kasan_kmalloc+0x199/0x1d0 [ 2904.415064][T13011] ? loop_add+0x573/0x740 [ 2904.419370][T13011] ? blk_mq_alloc_rq_map+0xeb/0x1a0 [ 2904.424540][T13011] ? blk_mq_init_sched+0x1d6/0xaf0 [ 2904.429711][T13011] __alloc_pages_nodemask+0x1b4/0x840 [ 2904.435088][T13011] ? gfp_pfmemalloc_allowed+0x120/0x120 [ 2904.440606][T13011] ? find_next_bit+0x7b/0x100 [ 2904.445254][T13011] ? memset+0x1f/0x40 [ 2904.449205][T13011] blk_mq_alloc_rqs+0x230/0x660 [ 2904.454025][T13011] blk_mq_init_sched+0x245/0xaf0 [ 2904.458935][T13011] elevator_init_mq+0x2cc/0x3e0 [ 2904.463756][T13011] __device_add_disk+0xf2/0x1220 [ 2904.468666][T13011] ? sprintf+0xd6/0x120 [ 2904.472969][T13011] ? hrtimer_init+0xc0/0x340 [ 2904.477537][T13011] ? device_add_disk+0x30/0x30 [ 2904.482283][T13011] ? vsprintf+0x30/0x30 [ 2904.486529][T13011] ? __alloc_disk_node+0x459/0x5a0 [ 2904.491638][T13011] loop_add+0x573/0x740 [ 2904.495771][T13011] loop_control_ioctl+0x448/0x620 [ 2904.500767][T13011] ? loop_remove+0xa0/0xa0 [ 2904.505154][T13011] ? memset+0x1f/0x40 [ 2904.509125][T13011] ? fsnotify+0x1280/0x1340 [ 2904.513595][T13011] ? loop_remove+0xa0/0xa0 [ 2904.517980][T13011] do_vfs_ioctl+0x742/0x1720 [ 2904.522554][T13011] ? ioctl_preallocate+0x250/0x250 [ 2904.527646][T13011] ? __fget+0x407/0x490 [ 2904.531770][T13011] ? fget_many+0x20/0x20 [ 2904.535982][T13011] ? debug_smp_processor_id+0x20/0x20 06:55:37 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) (fail_nth: 41) 06:55:37 executing program 3: r0 = syz_open_dev$usbfs(0x0, 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0xc0185500, &(0x7f0000000200)=@urb_type_bulk={0x2, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 06:55:37 executing program 0: r0 = syz_open_dev$usbfs(0x0, 0x76, 0x8101) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040)=@security={'security\x00', 0xe, 0x4, 0x260, 0xffffffff, 0x180, 0xc0, 0xc0, 0xffffffff, 0xffffffff, 0x288, 0x288, 0x288, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x70, 0x98}, @common=@inet=@SET1={0x28}}, {{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@STANDARD={0x28}}, {{@ip={@rand_addr, @broadcast, 0x0, 0x0, 'batadv_slave_0\x00', 'ip_vti0\x00'}, 0x0, 0x70, 0x98}, @common=@unspec=@NFQUEUE0={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x2c0) ioctl$USBDEVFS_RESETEP(r0, 0x80085504, &(0x7f0000000080)) 06:55:37 executing program 1: r0 = syz_open_dev$usbfs(0x0, 0x76, 0x8101) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040)=@security={'security\x00', 0xe, 0x4, 0x260, 0xffffffff, 0x180, 0xc0, 0xc0, 0xffffffff, 0xffffffff, 0x288, 0x288, 0x288, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x70, 0x98}, @common=@inet=@SET1={0x28}}, {{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@STANDARD={0x28}}, {{@ip={@rand_addr, @broadcast, 0x0, 0x0, 'batadv_slave_0\x00', 'ip_vti0\x00'}, 0x0, 0x70, 0x98}, @common=@unspec=@NFQUEUE0={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x2c0) ioctl$USBDEVFS_RESETEP(r0, 0x80045515, &(0x7f0000000080)) 06:55:37 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x802c550a, &(0x7f0000000200)=@urb_type_bulk={0x2, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 06:55:37 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040)=@security={'security\x00', 0xe, 0x4, 0x260, 0xffffffff, 0x180, 0xc0, 0xc0, 0xffffffff, 0xffffffff, 0x288, 0x288, 0x288, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x70, 0x98}, @common=@inet=@SET1={0x28}}, {{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@STANDARD={0x28}}, {{@ip={@rand_addr, @broadcast, 0x0, 0x0, 'batadv_slave_0\x00', 'ip_vti0\x00'}, 0x0, 0x70, 0x98}, @common=@unspec=@NFQUEUE0={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x2c0) ioctl$USBDEVFS_RESETEP(r0, 0xc0189436, &(0x7f0000000080)) 06:55:37 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040)=@security={'security\x00', 0xe, 0x4, 0x260, 0xffffffff, 0x180, 0xc0, 0xc0, 0xffffffff, 0xffffffff, 0x288, 0x288, 0x288, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x70, 0x98}, @common=@inet=@SET1={0x28}}, {{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@STANDARD={0x28}}, {{@ip={@rand_addr, @broadcast, 0x0, 0x0, 'batadv_slave_0\x00', 'ip_vti0\x00'}, 0x0, 0x70, 0x98}, @common=@unspec=@NFQUEUE0={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x2c0) ioctl$USBDEVFS_RESETEP(r0, 0xc020660b, &(0x7f0000000080)) 06:55:37 executing program 0: r0 = syz_open_dev$usbfs(0x0, 0x76, 0x8101) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040)=@security={'security\x00', 0xe, 0x4, 0x260, 0xffffffff, 0x180, 0xc0, 0xc0, 0xffffffff, 0xffffffff, 0x288, 0x288, 0x288, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x70, 0x98}, @common=@inet=@SET1={0x28}}, {{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@STANDARD={0x28}}, {{@ip={@rand_addr, @broadcast, 0x0, 0x0, 'batadv_slave_0\x00', 'ip_vti0\x00'}, 0x0, 0x70, 0x98}, @common=@unspec=@NFQUEUE0={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x2c0) ioctl$USBDEVFS_RESETEP(r0, 0x80085504, &(0x7f0000000080)) 06:55:37 executing program 3: r0 = syz_open_dev$usbfs(0x0, 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0xc0185500, &(0x7f0000000200)=@urb_type_bulk={0x2, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 06:55:37 executing program 1: r0 = syz_open_dev$usbfs(0x0, 0x76, 0x8101) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040)=@security={'security\x00', 0xe, 0x4, 0x260, 0xffffffff, 0x180, 0xc0, 0xc0, 0xffffffff, 0xffffffff, 0x288, 0x288, 0x288, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x70, 0x98}, @common=@inet=@SET1={0x28}}, {{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@STANDARD={0x28}}, {{@ip={@rand_addr, @broadcast, 0x0, 0x0, 'batadv_slave_0\x00', 'ip_vti0\x00'}, 0x0, 0x70, 0x98}, @common=@unspec=@NFQUEUE0={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x2c0) ioctl$USBDEVFS_RESETEP(r0, 0x80045515, &(0x7f0000000080)) [ 2904.541340][T13011] ? security_file_ioctl+0x7d/0xa0 [ 2904.546420][T13011] __x64_sys_ioctl+0xd4/0x110 [ 2904.551072][T13011] do_syscall_64+0xca/0x1c0 [ 2904.555544][T13011] entry_SYSCALL_64_after_hwframe+0x5c/0xc1 06:55:37 executing program 0: r0 = syz_open_dev$usbfs(0x0, 0x76, 0x8101) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040)=@security={'security\x00', 0xe, 0x4, 0x260, 0xffffffff, 0x180, 0xc0, 0xc0, 0xffffffff, 0xffffffff, 0x288, 0x288, 0x288, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x70, 0x98}, @common=@inet=@SET1={0x28}}, {{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@STANDARD={0x28}}, {{@ip={@rand_addr, @broadcast, 0x0, 0x0, 'batadv_slave_0\x00', 'ip_vti0\x00'}, 0x0, 0x70, 0x98}, @common=@unspec=@NFQUEUE0={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x2c0) ioctl$USBDEVFS_RESETEP(r0, 0x80085504, &(0x7f0000000080)) 06:55:37 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x802c550a, &(0x7f0000000200)=@urb_type_bulk={0x2, {}, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0}) [ 2904.624604][T13032] FAULT_INJECTION: forcing a failure. [ 2904.624604][T13032] name failslab, interval 1, probability 0, space 0, times 0 [ 2904.639077][T13032] CPU: 1 PID: 13032 Comm: syz-executor.4 Not tainted 5.4.233-syzkaller-00019-gd5ed2ca98e48 #0 [ 2904.649295][T13032] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/14/2023 [ 2904.659327][T13032] Call Trace: [ 2904.662592][T13032] dump_stack+0x1d8/0x241 [ 2904.666890][T13032] ? panic+0x768/0x768 [ 2904.670927][T13032] ? __alloc_pages_nodemask+0x393/0x840 [ 2904.676442][T13032] ? nf_ct_l4proto_log_invalid+0x258/0x258 [ 2904.682217][T13032] should_fail+0x71f/0x880 [ 2904.686605][T13032] ? setup_fault_attr+0x3d0/0x3d0 [ 2904.691620][T13032] ? lo_complete_rq+0x2b0/0x2b0 [ 2904.696441][T13032] ? loop_init_request+0x31/0xa0 [ 2904.701350][T13032] ? elevator_alloc+0x4b/0xc0 [ 2904.705997][T13032] should_failslab+0x5/0x20 [ 2904.710468][T13032] kmem_cache_alloc_trace+0x28/0x240 [ 2904.715745][T13032] elevator_alloc+0x4b/0xc0 [ 2904.720219][T13032] dd_init_queue+0x1f/0x330 [ 2904.724690][T13032] blk_mq_init_sched+0x45a/0xaf0 [ 2904.729597][T13032] elevator_init_mq+0x2cc/0x3e0 [ 2904.734434][T13032] __device_add_disk+0xf2/0x1220 [ 2904.739339][T13032] ? sprintf+0xd6/0x120 [ 2904.743481][T13032] ? hrtimer_init+0xc0/0x340 [ 2904.748042][T13032] ? device_add_disk+0x30/0x30 [ 2904.752793][T13032] ? vsprintf+0x30/0x30 [ 2904.756916][T13032] ? __alloc_disk_node+0x459/0x5a0 [ 2904.762022][T13032] loop_add+0x573/0x740 [ 2904.766236][T13032] loop_control_ioctl+0x448/0x620 [ 2904.771227][T13032] ? loop_remove+0xa0/0xa0 [ 2904.775615][T13032] ? memset+0x1f/0x40 [ 2904.779569][T13032] ? fsnotify+0x1280/0x1340 [ 2904.784044][T13032] ? loop_remove+0xa0/0xa0 [ 2904.788427][T13032] do_vfs_ioctl+0x742/0x1720 [ 2904.792986][T13032] ? ioctl_preallocate+0x250/0x250 [ 2904.798062][T13032] ? __fget+0x407/0x490 [ 2904.802185][T13032] ? fget_many+0x20/0x20 [ 2904.806394][T13032] ? debug_smp_processor_id+0x20/0x20 [ 2904.811734][T13032] ? security_file_ioctl+0x7d/0xa0 [ 2904.816811][T13032] __x64_sys_ioctl+0xd4/0x110 06:55:37 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) (fail_nth: 42) 06:55:37 executing program 3: r0 = syz_open_dev$usbfs(0x0, 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0xc0185500, &(0x7f0000000200)=@urb_type_bulk={0x2, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 06:55:37 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x802c550a, &(0x7f0000000200)=@urb_type_bulk={0x2, {}, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0}) 06:55:37 executing program 1: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x0, 0x8101) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040)=@security={'security\x00', 0xe, 0x4, 0x260, 0xffffffff, 0x180, 0xc0, 0xc0, 0xffffffff, 0xffffffff, 0x288, 0x288, 0x288, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x70, 0x98}, @common=@inet=@SET1={0x28}}, {{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@STANDARD={0x28}}, {{@ip={@rand_addr, @broadcast, 0x0, 0x0, 'batadv_slave_0\x00', 'ip_vti0\x00'}, 0x0, 0x70, 0x98}, @common=@unspec=@NFQUEUE0={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x2c0) ioctl$USBDEVFS_RESETEP(r0, 0x80045515, &(0x7f0000000080)) 06:55:37 executing program 0: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x0, 0x8101) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040)=@security={'security\x00', 0xe, 0x4, 0x260, 0xffffffff, 0x180, 0xc0, 0xc0, 0xffffffff, 0xffffffff, 0x288, 0x288, 0x288, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x70, 0x98}, @common=@inet=@SET1={0x28}}, {{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@STANDARD={0x28}}, {{@ip={@rand_addr, @broadcast, 0x0, 0x0, 'batadv_slave_0\x00', 'ip_vti0\x00'}, 0x0, 0x70, 0x98}, @common=@unspec=@NFQUEUE0={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x2c0) ioctl$USBDEVFS_RESETEP(r0, 0x80085504, &(0x7f0000000080)) 06:55:37 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040)=@security={'security\x00', 0xe, 0x4, 0x260, 0xffffffff, 0x180, 0xc0, 0xc0, 0xffffffff, 0xffffffff, 0x288, 0x288, 0x288, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x70, 0x98}, @common=@inet=@SET1={0x28}}, {{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@STANDARD={0x28}}, {{@ip={@rand_addr, @broadcast, 0x0, 0x0, 'batadv_slave_0\x00', 'ip_vti0\x00'}, 0x0, 0x70, 0x98}, @common=@unspec=@NFQUEUE0={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x2c0) ioctl$USBDEVFS_RESETEP(r0, 0x80045503, &(0x7f0000000080)) 06:55:37 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x0, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0xc0185500, &(0x7f0000000200)=@urb_type_bulk={0x2, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 06:55:37 executing program 1: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x0, 0x8101) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040)=@security={'security\x00', 0xe, 0x4, 0x260, 0xffffffff, 0x180, 0xc0, 0xc0, 0xffffffff, 0xffffffff, 0x288, 0x288, 0x288, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x70, 0x98}, @common=@inet=@SET1={0x28}}, {{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@STANDARD={0x28}}, {{@ip={@rand_addr, @broadcast, 0x0, 0x0, 'batadv_slave_0\x00', 'ip_vti0\x00'}, 0x0, 0x70, 0x98}, @common=@unspec=@NFQUEUE0={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x2c0) ioctl$USBDEVFS_RESETEP(r0, 0x80045515, &(0x7f0000000080)) 06:55:37 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040)=@security={'security\x00', 0xe, 0x4, 0x260, 0xffffffff, 0x180, 0xc0, 0xc0, 0xffffffff, 0xffffffff, 0x288, 0x288, 0x288, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x70, 0x98}, @common=@inet=@SET1={0x28}}, {{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@STANDARD={0x28}}, {{@ip={@rand_addr, @broadcast, 0x0, 0x0, 'batadv_slave_0\x00', 'ip_vti0\x00'}, 0x0, 0x70, 0x98}, @common=@unspec=@NFQUEUE0={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x2c0) ioctl$USBDEVFS_RESETEP(r0, 0x80045503, &(0x7f0000000080)={0x2}) 06:55:37 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x0, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0xc0185500, &(0x7f0000000200)=@urb_type_bulk={0x2, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 06:55:37 executing program 1: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x0, 0x8101) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040)=@security={'security\x00', 0xe, 0x4, 0x260, 0xffffffff, 0x180, 0xc0, 0xc0, 0xffffffff, 0xffffffff, 0x288, 0x288, 0x288, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x70, 0x98}, @common=@inet=@SET1={0x28}}, {{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@STANDARD={0x28}}, {{@ip={@rand_addr, @broadcast, 0x0, 0x0, 'batadv_slave_0\x00', 'ip_vti0\x00'}, 0x0, 0x70, 0x98}, @common=@unspec=@NFQUEUE0={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x2c0) ioctl$USBDEVFS_RESETEP(r0, 0x80045515, &(0x7f0000000080)) [ 2904.821454][T13032] do_syscall_64+0xca/0x1c0 [ 2904.825928][T13032] entry_SYSCALL_64_after_hwframe+0x5c/0xc1 [ 2904.832835][T13032] "mq-deadline" elevator initialization failed, falling back to "none" 06:55:37 executing program 0: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x0, 0x8101) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040)=@security={'security\x00', 0xe, 0x4, 0x260, 0xffffffff, 0x180, 0xc0, 0xc0, 0xffffffff, 0xffffffff, 0x288, 0x288, 0x288, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x70, 0x98}, @common=@inet=@SET1={0x28}}, {{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@STANDARD={0x28}}, {{@ip={@rand_addr, @broadcast, 0x0, 0x0, 'batadv_slave_0\x00', 'ip_vti0\x00'}, 0x0, 0x70, 0x98}, @common=@unspec=@NFQUEUE0={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x2c0) ioctl$USBDEVFS_RESETEP(r0, 0x80085504, &(0x7f0000000080)) [ 2904.948648][T13076] FAULT_INJECTION: forcing a failure. [ 2904.948648][T13076] name failslab, interval 1, probability 0, space 0, times 0 [ 2904.962034][T13076] CPU: 0 PID: 13076 Comm: syz-executor.4 Not tainted 5.4.233-syzkaller-00019-gd5ed2ca98e48 #0 [ 2904.972246][T13076] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/14/2023 [ 2904.982278][T13076] Call Trace: [ 2904.985542][T13076] dump_stack+0x1d8/0x241 [ 2904.989841][T13076] ? panic+0x768/0x768 [ 2904.993879][T13076] ? __alloc_pages_nodemask+0x393/0x840 [ 2904.999390][T13076] ? nf_ct_l4proto_log_invalid+0x258/0x258 [ 2905.005174][T13076] should_fail+0x71f/0x880 [ 2905.009560][T13076] ? setup_fault_attr+0x3d0/0x3d0 [ 2905.014567][T13076] ? lo_complete_rq+0x2b0/0x2b0 [ 2905.019385][T13076] ? loop_init_request+0x31/0xa0 [ 2905.024293][T13076] ? elevator_alloc+0x4b/0xc0 [ 2905.028938][T13076] should_failslab+0x5/0x20 [ 2905.033496][T13076] kmem_cache_alloc_trace+0x28/0x240 [ 2905.038750][T13076] elevator_alloc+0x4b/0xc0 [ 2905.043221][T13076] dd_init_queue+0x1f/0x330 [ 2905.047711][T13076] blk_mq_init_sched+0x45a/0xaf0 [ 2905.052648][T13076] elevator_init_mq+0x2cc/0x3e0 [ 2905.057468][T13076] __device_add_disk+0xf2/0x1220 [ 2905.062391][T13076] ? sprintf+0xd6/0x120 [ 2905.066514][T13076] ? hrtimer_init+0xc0/0x340 [ 2905.071072][T13076] ? device_add_disk+0x30/0x30 [ 2905.075802][T13076] ? vsprintf+0x30/0x30 [ 2905.079925][T13076] ? __alloc_disk_node+0x459/0x5a0 [ 2905.085117][T13076] loop_add+0x573/0x740 [ 2905.089243][T13076] loop_control_ioctl+0x448/0x620 [ 2905.094237][T13076] ? loop_remove+0xa0/0xa0 [ 2905.098623][T13076] ? memset+0x1f/0x40 [ 2905.102576][T13076] ? fsnotify+0x1280/0x1340 [ 2905.107046][T13076] ? loop_remove+0xa0/0xa0 [ 2905.111431][T13076] do_vfs_ioctl+0x742/0x1720 [ 2905.115997][T13076] ? ioctl_preallocate+0x250/0x250 [ 2905.121077][T13076] ? __fget+0x407/0x490 [ 2905.125200][T13076] ? fget_many+0x20/0x20 [ 2905.129412][T13076] ? debug_smp_processor_id+0x20/0x20 [ 2905.134754][T13076] ? security_file_ioctl+0x7d/0xa0 [ 2905.139835][T13076] __x64_sys_ioctl+0xd4/0x110 [ 2905.144481][T13076] do_syscall_64+0xca/0x1c0 06:55:37 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) (fail_nth: 43) 06:55:37 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x802c550a, &(0x7f0000000200)=@urb_type_bulk={0x2, {}, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0}) 06:55:37 executing program 1: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040)=@security={'security\x00', 0xe, 0x4, 0x260, 0xffffffff, 0x180, 0xc0, 0xc0, 0xffffffff, 0xffffffff, 0x288, 0x288, 0x288, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x70, 0x98}, @common=@inet=@SET1={0x28}}, {{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@STANDARD={0x28}}, {{@ip={@rand_addr, @broadcast, 0x0, 0x0, 'batadv_slave_0\x00', 'ip_vti0\x00'}, 0x0, 0x70, 0x98}, @common=@unspec=@NFQUEUE0={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x2c0) ioctl$USBDEVFS_RESETEP(r0, 0x80045515, &(0x7f0000000080)) 06:55:37 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040)=@security={'security\x00', 0xe, 0x4, 0x260, 0xffffffff, 0x180, 0xc0, 0xc0, 0xffffffff, 0xffffffff, 0x288, 0x288, 0x288, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x70, 0x98}, @common=@inet=@SET1={0x28}}, {{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@STANDARD={0x28}}, {{@ip={@rand_addr, @broadcast, 0x0, 0x0, 'batadv_slave_0\x00', 'ip_vti0\x00'}, 0x0, 0x70, 0x98}, @common=@unspec=@NFQUEUE0={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x2c0) r1 = syz_open_dev$usbfs(&(0x7f0000000380), 0x6, 0x80000) ioctl$USBDEVFS_GETDRIVER(r1, 0x41045508, &(0x7f00000003c0)={0x9, "8e8759b2cdfb140e1f6dfee4726c3d33023f9c65a47ef743b48f0a864350c75ae8dd6b7a6836e1da43d353587d8e11e82ac383d7f7a81f574bdbf47829ab1f2d8d284cf67b3392cca52405b8a0c1ed91f473a1743bc038ff59040b372e7fe6966fdb387fad73f4fa8d8e5259cef07ea4c8b1163fd54a49a6e5413026b6b33a4ed001eb40ef25c3105c7c32da929d1f9fa4e84f26e0c5c9534fd09f42a393f27ad0e2d57035f3e91b9243d254d25aca34a556a0a6f8e6ef87a8bda5f93b3a3d4bac877c13305c444d2dfc5ae469082bcf7e1c1db666d2f837ea75e154f73b1fda2b5df9448437f30e445a4adf317087da20821ac11e045569b436e7e948311567"}) r2 = syz_open_dev$usbfs(&(0x7f0000000300), 0x9, 0x80000) ioctl$USBDEVFS_RESETEP(r0, 0x80045503, &(0x7f0000000080)) ioctl$USBDEVFS_RESETEP(r2, 0x80045503, &(0x7f0000000340)={0x1}) 06:55:37 executing program 0: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x0, 0x8101) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040)=@security={'security\x00', 0xe, 0x4, 0x260, 0xffffffff, 0x180, 0xc0, 0xc0, 0xffffffff, 0xffffffff, 0x288, 0x288, 0x288, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x70, 0x98}, @common=@inet=@SET1={0x28}}, {{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@STANDARD={0x28}}, {{@ip={@rand_addr, @broadcast, 0x0, 0x0, 'batadv_slave_0\x00', 'ip_vti0\x00'}, 0x0, 0x70, 0x98}, @common=@unspec=@NFQUEUE0={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x2c0) ioctl$USBDEVFS_RESETEP(r0, 0x80085504, &(0x7f0000000080)) 06:55:37 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x0, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0xc0185500, &(0x7f0000000200)=@urb_type_bulk={0x2, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 06:55:37 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x802c550a, &(0x7f0000000200)=@urb_type_bulk={0x2, {}, 0x0, 0x0, 0x0, 0x0, 0x8000000, 0x0, 0x0, 0x0, 0x0, 0x0}) 06:55:37 executing program 5: syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) (async) r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040)=@security={'security\x00', 0xe, 0x4, 0x260, 0xffffffff, 0x180, 0xc0, 0xc0, 0xffffffff, 0xffffffff, 0x288, 0x288, 0x288, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x70, 0x98}, @common=@inet=@SET1={0x28}}, {{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@STANDARD={0x28}}, {{@ip={@rand_addr, @broadcast, 0x0, 0x0, 'batadv_slave_0\x00', 'ip_vti0\x00'}, 0x0, 0x70, 0x98}, @common=@unspec=@NFQUEUE0={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x2c0) (async) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040)=@security={'security\x00', 0xe, 0x4, 0x260, 0xffffffff, 0x180, 0xc0, 0xc0, 0xffffffff, 0xffffffff, 0x288, 0x288, 0x288, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x70, 0x98}, @common=@inet=@SET1={0x28}}, {{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@STANDARD={0x28}}, {{@ip={@rand_addr, @broadcast, 0x0, 0x0, 'batadv_slave_0\x00', 'ip_vti0\x00'}, 0x0, 0x70, 0x98}, @common=@unspec=@NFQUEUE0={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x2c0) r1 = syz_open_dev$usbfs(&(0x7f0000000380), 0x6, 0x80000) ioctl$USBDEVFS_GETDRIVER(r1, 0x41045508, &(0x7f00000003c0)={0x9, "8e8759b2cdfb140e1f6dfee4726c3d33023f9c65a47ef743b48f0a864350c75ae8dd6b7a6836e1da43d353587d8e11e82ac383d7f7a81f574bdbf47829ab1f2d8d284cf67b3392cca52405b8a0c1ed91f473a1743bc038ff59040b372e7fe6966fdb387fad73f4fa8d8e5259cef07ea4c8b1163fd54a49a6e5413026b6b33a4ed001eb40ef25c3105c7c32da929d1f9fa4e84f26e0c5c9534fd09f42a393f27ad0e2d57035f3e91b9243d254d25aca34a556a0a6f8e6ef87a8bda5f93b3a3d4bac877c13305c444d2dfc5ae469082bcf7e1c1db666d2f837ea75e154f73b1fda2b5df9448437f30e445a4adf317087da20821ac11e045569b436e7e948311567"}) r2 = syz_open_dev$usbfs(&(0x7f0000000300), 0x9, 0x80000) ioctl$USBDEVFS_RESETEP(r0, 0x80045503, &(0x7f0000000080)) ioctl$USBDEVFS_RESETEP(r2, 0x80045503, &(0x7f0000000340)={0x1}) 06:55:37 executing program 1: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040)=@security={'security\x00', 0xe, 0x4, 0x260, 0xffffffff, 0x180, 0xc0, 0xc0, 0xffffffff, 0xffffffff, 0x288, 0x288, 0x288, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x70, 0x98}, @common=@inet=@SET1={0x28}}, {{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@STANDARD={0x28}}, {{@ip={@rand_addr, @broadcast, 0x0, 0x0, 'batadv_slave_0\x00', 'ip_vti0\x00'}, 0x0, 0x70, 0x98}, @common=@unspec=@NFQUEUE0={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x2c0) ioctl$USBDEVFS_RESETEP(r0, 0x80045515, &(0x7f0000000080)) 06:55:37 executing program 0: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040)=@security={'security\x00', 0xe, 0x4, 0x260, 0xffffffff, 0x180, 0xc0, 0xc0, 0xffffffff, 0xffffffff, 0x288, 0x288, 0x288, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x70, 0x98}, @common=@inet=@SET1={0x28}}, {{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@STANDARD={0x28}}, {{@ip={@rand_addr, @broadcast, 0x0, 0x0, 'batadv_slave_0\x00', 'ip_vti0\x00'}, 0x0, 0x70, 0x98}, @common=@unspec=@NFQUEUE0={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x2c0) ioctl$USBDEVFS_RESETEP(r0, 0x80085504, &(0x7f0000000080)) 06:55:37 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x0) ioctl$USBDEVFS_SUBMITURB(r0, 0xc0185500, &(0x7f0000000200)=@urb_type_bulk={0x2, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 06:55:37 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x802c550a, &(0x7f0000000200)=@urb_type_bulk={0x2, {}, 0x0, 0x0, 0x0, 0x0, 0x7ff0bdbe, 0x0, 0x0, 0x0, 0x0, 0x0}) [ 2905.148974][T13076] entry_SYSCALL_64_after_hwframe+0x5c/0xc1 [ 2905.154983][T13076] "mq-deadline" elevator initialization failed, falling back to "none" [ 2905.231847][T13082] FAULT_INJECTION: forcing a failure. [ 2905.231847][T13082] name failslab, interval 1, probability 0, space 0, times 0 [ 2905.244947][T13082] CPU: 1 PID: 13082 Comm: syz-executor.4 Not tainted 5.4.233-syzkaller-00019-gd5ed2ca98e48 #0 [ 2905.255155][T13082] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/14/2023 [ 2905.265181][T13082] Call Trace: [ 2905.268445][T13082] dump_stack+0x1d8/0x241 [ 2905.272743][T13082] ? panic+0x768/0x768 [ 2905.276778][T13082] ? nf_ct_l4proto_log_invalid+0x258/0x258 [ 2905.282551][T13082] ? entry_SYSCALL_64_after_hwframe+0x5c/0xc1 [ 2905.288586][T13082] should_fail+0x71f/0x880 [ 2905.292970][T13082] ? setup_fault_attr+0x3d0/0x3d0 [ 2905.297960][T13082] ? number+0xf89/0x1200 [ 2905.302193][T13082] ? device_create_vargs+0x7d/0x210 [ 2905.307380][T13082] should_failslab+0x5/0x20 [ 2905.311856][T13082] kmem_cache_alloc_trace+0x28/0x240 [ 2905.317211][T13082] device_create_vargs+0x7d/0x210 [ 2905.322204][T13082] ? entry_SYSCALL_64_after_hwframe+0x5c/0xc1 [ 2905.328241][T13082] device_create+0xea/0x130 [ 2905.332714][T13082] ? device_create_vargs+0x210/0x210 [ 2905.337970][T13082] ? __percpu_ref_switch_mode+0x36d/0x5b0 [ 2905.343655][T13082] bdi_register_va+0x84/0x600 [ 2905.348298][T13082] bdi_register+0xd1/0x120 [ 2905.352683][T13082] ? __device_add_disk+0x551/0x1220 [ 2905.357847][T13082] ? bdi_register_va+0x600/0x600 [ 2905.362752][T13082] ? percpu_ref_resurrect+0x113/0x190 [ 2905.368090][T13082] bdi_register_owner+0x55/0xf0 [ 2905.372911][T13082] __device_add_disk+0x5d1/0x1220 [ 2905.377993][T13082] ? device_add_disk+0x30/0x30 [ 2905.382726][T13082] ? vsprintf+0x30/0x30 [ 2905.387282][T13082] ? __alloc_disk_node+0x459/0x5a0 [ 2905.392363][T13082] loop_add+0x573/0x740 [ 2905.396496][T13082] loop_control_ioctl+0x448/0x620 [ 2905.401501][T13082] ? loop_remove+0xa0/0xa0 [ 2905.405909][T13082] ? memset+0x1f/0x40 [ 2905.409861][T13082] ? fsnotify+0x1280/0x1340 [ 2905.414332][T13082] ? loop_remove+0xa0/0xa0 [ 2905.418757][T13082] do_vfs_ioctl+0x742/0x1720 [ 2905.423319][T13082] ? ioctl_preallocate+0x250/0x250 [ 2905.428399][T13082] ? __fget+0x407/0x490 [ 2905.432520][T13082] ? fget_many+0x20/0x20 [ 2905.436732][T13082] ? debug_smp_processor_id+0x20/0x20 [ 2905.442073][T13082] ? security_file_ioctl+0x7d/0xa0 [ 2905.447150][T13082] __x64_sys_ioctl+0xd4/0x110 [ 2905.451794][T13082] do_syscall_64+0xca/0x1c0 [ 2905.456279][T13082] entry_SYSCALL_64_after_hwframe+0x5c/0xc1 [ 2905.462305][T13082] ------------[ cut here ]------------ [ 2905.467754][T13082] WARNING: CPU: 1 PID: 13082 at block/genhd.c:742 __device_add_disk+0xea1/0x1220 [ 2905.476823][T13082] Modules linked in: [ 2905.480690][T13082] CPU: 1 PID: 13082 Comm: syz-executor.4 Not tainted 5.4.233-syzkaller-00019-gd5ed2ca98e48 #0 [ 2905.490893][T13082] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/14/2023 [ 2905.500931][T13082] RIP: 0010:__device_add_disk+0xea1/0x1220 [ 2905.506704][T13082] Code: ff ff e8 a2 ae 48 ff 0f 0b e9 52 f3 ff ff e8 96 ae 48 ff 0f 0b 42 80 3c 2b 00 0f 85 ac f8 ff ff e9 af f8 ff ff e8 7f ae 48 ff <0f> 0b e9 41 f7 ff ff e8 73 ae 48 ff e9 18 ff ff ff 44 89 f9 80 e1 [ 2905.526279][T13082] RSP: 0018:ffff8881de59fa20 EFLAGS: 00010246 [ 2905.532313][T13082] RAX: ffffffff821a8fe1 RBX: 00000000fffffff4 RCX: 0000000000040000 [ 2905.540253][T13082] RDX: ffffc9000174f000 RSI: 000000000003ffff RDI: 0000000000040000 [ 2905.548195][T13082] RBP: ffff8881de59fb58 R08: ffffffff821a871c R09: fffffbfff0b6c57f [ 2905.556135][T13082] R10: 0000000000000000 R11: dffffc0000000001 R12: ffff8881cf003000 [ 2905.564075][T13082] R13: dffffc0000000000 R14: ffff8881cf003070 R15: 1ffff11039e0069d [ 2905.572016][T13082] FS: 00007f9c67e08700(0000) GS:ffff8881f6f00000(0000) knlGS:0000000000000000 [ 2905.580919][T13082] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 2905.587472][T13082] CR2: 00007f9c67e07ff8 CR3: 00000001ce0c4000 CR4: 00000000003406e0 [ 2905.595433][T13082] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 2905.603373][T13082] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 2905.611312][T13082] Call Trace: [ 2905.614579][T13082] ? device_add_disk+0x30/0x30 [ 2905.619323][T13082] ? vsprintf+0x30/0x30 [ 2905.623456][T13082] ? __alloc_disk_node+0x459/0x5a0 [ 2905.628537][T13082] loop_add+0x573/0x740 [ 2905.632672][T13082] loop_control_ioctl+0x448/0x620 [ 2905.637673][T13082] ? loop_remove+0xa0/0xa0 [ 2905.642088][T13082] ? memset+0x1f/0x40 [ 2905.646064][T13082] ? fsnotify+0x1280/0x1340 [ 2905.650535][T13082] ? loop_remove+0xa0/0xa0 [ 2905.654919][T13082] do_vfs_ioctl+0x742/0x1720 [ 2905.659479][T13082] ? ioctl_preallocate+0x250/0x250 [ 2905.664557][T13082] ? __fget+0x407/0x490 [ 2905.668697][T13082] ? fget_many+0x20/0x20 [ 2905.672910][T13082] ? debug_smp_processor_id+0x20/0x20 [ 2905.678253][T13082] ? security_file_ioctl+0x7d/0xa0 06:55:38 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) (fail_nth: 44) 06:55:38 executing program 1: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040)=@security={'security\x00', 0xe, 0x4, 0x260, 0xffffffff, 0x180, 0xc0, 0xc0, 0xffffffff, 0xffffffff, 0x288, 0x288, 0x288, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x70, 0x98}, @common=@inet=@SET1={0x28}}, {{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@STANDARD={0x28}}, {{@ip={@rand_addr, @broadcast, 0x0, 0x0, 'batadv_slave_0\x00', 'ip_vti0\x00'}, 0x0, 0x70, 0x98}, @common=@unspec=@NFQUEUE0={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x2c0) ioctl$USBDEVFS_RESETEP(r0, 0x80045515, &(0x7f0000000080)) 06:55:38 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x802c550a, &(0x7f0000000200)=@urb_type_bulk={0x2, {}, 0x0, 0x0, 0x0, 0x0, 0xbebdf07f, 0x0, 0x0, 0x0, 0x0, 0x0}) 06:55:38 executing program 0: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040)=@security={'security\x00', 0xe, 0x4, 0x260, 0xffffffff, 0x180, 0xc0, 0xc0, 0xffffffff, 0xffffffff, 0x288, 0x288, 0x288, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x70, 0x98}, @common=@inet=@SET1={0x28}}, {{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@STANDARD={0x28}}, {{@ip={@rand_addr, @broadcast, 0x0, 0x0, 'batadv_slave_0\x00', 'ip_vti0\x00'}, 0x0, 0x70, 0x98}, @common=@unspec=@NFQUEUE0={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x2c0) ioctl$USBDEVFS_RESETEP(r0, 0x80085504, &(0x7f0000000080)) 06:55:38 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x0) ioctl$USBDEVFS_SUBMITURB(r0, 0xc0185500, &(0x7f0000000200)=@urb_type_bulk={0x2, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 06:55:38 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040)=@security={'security\x00', 0xe, 0x4, 0x260, 0xffffffff, 0x180, 0xc0, 0xc0, 0xffffffff, 0xffffffff, 0x288, 0x288, 0x288, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x70, 0x98}, @common=@inet=@SET1={0x28}}, {{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@STANDARD={0x28}}, {{@ip={@rand_addr, @broadcast, 0x0, 0x0, 'batadv_slave_0\x00', 'ip_vti0\x00'}, 0x0, 0x70, 0x98}, @common=@unspec=@NFQUEUE0={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x2c0) r1 = syz_open_dev$usbfs(&(0x7f0000000380), 0x6, 0x80000) ioctl$USBDEVFS_GETDRIVER(r1, 0x41045508, &(0x7f00000003c0)={0x9, "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"}) r2 = syz_open_dev$usbfs(&(0x7f0000000300), 0x9, 0x80000) ioctl$USBDEVFS_RESETEP(r0, 0x80045503, &(0x7f0000000080)) ioctl$USBDEVFS_RESETEP(r2, 0x80045503, &(0x7f0000000340)={0x1}) syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) (async) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040)=@security={'security\x00', 0xe, 0x4, 0x260, 0xffffffff, 0x180, 0xc0, 0xc0, 0xffffffff, 0xffffffff, 0x288, 0x288, 0x288, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x70, 0x98}, @common=@inet=@SET1={0x28}}, {{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@STANDARD={0x28}}, {{@ip={@rand_addr, @broadcast, 0x0, 0x0, 'batadv_slave_0\x00', 'ip_vti0\x00'}, 0x0, 0x70, 0x98}, @common=@unspec=@NFQUEUE0={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x2c0) (async) syz_open_dev$usbfs(&(0x7f0000000380), 0x6, 0x80000) (async) ioctl$USBDEVFS_GETDRIVER(r1, 0x41045508, &(0x7f00000003c0)={0x9, "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"}) (async) syz_open_dev$usbfs(&(0x7f0000000300), 0x9, 0x80000) (async) ioctl$USBDEVFS_RESETEP(r0, 0x80045503, &(0x7f0000000080)) (async) ioctl$USBDEVFS_RESETEP(r2, 0x80045503, &(0x7f0000000340)={0x1}) (async) 06:55:38 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x802c550a, &(0x7f0000000200)=@urb_type_bulk={0x2, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 06:55:38 executing program 1: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) ioctl$USBDEVFS_RESETEP(r0, 0x80045515, &(0x7f0000000080)) 06:55:38 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000300)=@security={'security\x00', 0xe, 0x4, 0x260, 0xffffffff, 0x130, 0x130, 0x98, 0xffffffff, 0xffffffff, 0x1c8, 0x1c8, 0x1c8, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x70, 0x98}, @common=@inet=@SET1={0x28}}, {{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@STANDARD={0x28, '\x00', 0x0, 0x130}}, {{@ip={@rand_addr, @broadcast, 0x0, 0x0, 'batadv_slave_0\x00', 'ip_vti0\x00', {}, {}, 0x5c}, 0x0, 0x70, 0x98}, @common=@unspec=@NFQUEUE0={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x2c0) ioctl$USBDEVFS_RESETEP(r0, 0x80045503, &(0x7f0000000080)) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000040)={0x8}, 0x8) [ 2905.683346][T13082] __x64_sys_ioctl+0xd4/0x110 [ 2905.687993][T13082] do_syscall_64+0xca/0x1c0 [ 2905.692465][T13082] entry_SYSCALL_64_after_hwframe+0x5c/0xc1 [ 2905.698323][T13082] ---[ end trace a19802151b528beb ]--- 06:55:38 executing program 1: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) ioctl$USBDEVFS_RESETEP(r0, 0x80045515, &(0x7f0000000080)) 06:55:38 executing program 0: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040)=@security={'security\x00', 0xe, 0x4, 0x260, 0xffffffff, 0x180, 0xc0, 0xc0, 0xffffffff, 0xffffffff, 0x288, 0x288, 0x288, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x70, 0x98}, @common=@inet=@SET1={0x28}}, {{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@STANDARD={0x28}}, {{@ip={@rand_addr, @broadcast, 0x0, 0x0, 'batadv_slave_0\x00', 'ip_vti0\x00'}, 0x0, 0x70, 0x98}, @common=@unspec=@NFQUEUE0={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x2c0) ioctl$USBDEVFS_RESETEP(r0, 0x80085504, &(0x7f0000000080)) 06:55:38 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x802c550a, &(0x7f0000000200)=@urb_type_bulk={0x2, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0}) [ 2905.773821][T13114] FAULT_INJECTION: forcing a failure. [ 2905.773821][T13114] name failslab, interval 1, probability 0, space 0, times 0 [ 2905.786978][T13114] CPU: 1 PID: 13114 Comm: syz-executor.4 Tainted: G W 5.4.233-syzkaller-00019-gd5ed2ca98e48 #0 [ 2905.798592][T13114] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/14/2023 [ 2905.808640][T13114] Call Trace: [ 2905.811922][T13114] dump_stack+0x1d8/0x241 [ 2905.816242][T13114] ? panic+0x768/0x768 [ 2905.820299][T13114] ? bdi_register_va+0x84/0x600 [ 2905.825130][T13114] ? nf_ct_l4proto_log_invalid+0x258/0x258 [ 2905.830908][T13114] ? loop_add+0x573/0x740 [ 2905.835215][T13114] ? do_vfs_ioctl+0x742/0x1720 [ 2905.839949][T13114] ? __x64_sys_ioctl+0xd4/0x110 [ 2905.844797][T13114] ? do_syscall_64+0xca/0x1c0 [ 2905.849445][T13114] should_fail+0x71f/0x880 [ 2905.853830][T13114] ? setup_fault_attr+0x3d0/0x3d0 [ 2905.858824][T13114] ? _raw_spin_lock+0x1b0/0x1b0 [ 2905.863643][T13114] ? kobject_set_name_vargs+0x5d/0x110 [ 2905.869068][T13114] should_failslab+0x5/0x20 [ 2905.873541][T13114] __kmalloc_track_caller+0x4f/0x290 [ 2905.878795][T13114] kstrdup_const+0x51/0x90 [ 2905.883179][T13114] kobject_set_name_vargs+0x5d/0x110 [ 2905.888454][T13114] device_create_vargs+0x183/0x210 [ 2905.893552][T13114] device_create+0xea/0x130 [ 2905.898025][T13114] ? device_create_vargs+0x210/0x210 [ 2905.903277][T13114] ? __percpu_ref_switch_mode+0x36d/0x5b0 [ 2905.908965][T13114] bdi_register_va+0x84/0x600 [ 2905.913612][T13114] bdi_register+0xd1/0x120 [ 2905.917996][T13114] ? __device_add_disk+0x551/0x1220 [ 2905.923162][T13114] ? bdi_register_va+0x600/0x600 [ 2905.928070][T13114] ? percpu_ref_resurrect+0x113/0x190 [ 2905.933407][T13114] bdi_register_owner+0x55/0xf0 [ 2905.938225][T13114] __device_add_disk+0x5d1/0x1220 [ 2905.943219][T13114] ? device_add_disk+0x30/0x30 [ 2905.947949][T13114] ? vsprintf+0x30/0x30 [ 2905.952071][T13114] ? __alloc_disk_node+0x459/0x5a0 [ 2905.957149][T13114] loop_add+0x573/0x740 [ 2905.961276][T13114] loop_control_ioctl+0x448/0x620 [ 2905.966265][T13114] ? loop_remove+0xa0/0xa0 [ 2905.970651][T13114] ? memset+0x1f/0x40 [ 2905.974599][T13114] ? fsnotify+0x1280/0x1340 [ 2905.979074][T13114] ? loop_remove+0xa0/0xa0 [ 2905.983457][T13114] do_vfs_ioctl+0x742/0x1720 [ 2905.988018][T13114] ? ioctl_preallocate+0x250/0x250 [ 2905.993102][T13114] ? __fget+0x407/0x490 [ 2905.997232][T13114] ? fget_many+0x20/0x20 [ 2906.001445][T13114] ? debug_smp_processor_id+0x20/0x20 [ 2906.006784][T13114] ? security_file_ioctl+0x7d/0xa0 [ 2906.011898][T13114] __x64_sys_ioctl+0xd4/0x110 [ 2906.016547][T13114] do_syscall_64+0xca/0x1c0 [ 2906.021020][T13114] entry_SYSCALL_64_after_hwframe+0x5c/0xc1 [ 2906.027470][T13114] ------------[ cut here ]------------ [ 2906.032952][T13114] WARNING: CPU: 1 PID: 13114 at block/genhd.c:742 __device_add_disk+0xea1/0x1220 [ 2906.042022][T13114] Modules linked in: [ 2906.045897][T13114] CPU: 1 PID: 13114 Comm: syz-executor.4 Tainted: G W 5.4.233-syzkaller-00019-gd5ed2ca98e48 #0 [ 2906.057488][T13114] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/14/2023 [ 2906.067522][T13114] RIP: 0010:__device_add_disk+0xea1/0x1220 [ 2906.073295][T13114] Code: ff ff e8 a2 ae 48 ff 0f 0b e9 52 f3 ff ff e8 96 ae 48 ff 0f 0b 42 80 3c 2b 00 0f 85 ac f8 ff ff e9 af f8 ff ff e8 7f ae 48 ff <0f> 0b e9 41 f7 ff ff e8 73 ae 48 ff e9 18 ff ff ff 44 89 f9 80 e1 [ 2906.092865][T13114] RSP: 0018:ffff8881e523fa20 EFLAGS: 00010246 [ 2906.098903][T13114] RAX: ffffffff821a8fe1 RBX: 00000000fffffff4 RCX: 0000000000040000 [ 2906.106861][T13114] RDX: ffffc9000174f000 RSI: 000000000003ffff RDI: 0000000000040000 [ 2906.114803][T13114] RBP: ffff8881e523fb58 R08: ffffffff821a871c R09: ffffea0007417800 [ 2906.122743][T13114] R10: ffffffffffffffff R11: dffffc0000000001 R12: ffff8881d15bb000 [ 2906.130701][T13114] R13: dffffc0000000000 R14: ffff8881d15bb070 R15: 1ffff1103a2b769d [ 2906.138659][T13114] FS: 00007f9c67e08700(0000) GS:ffff8881f6f00000(0000) knlGS:0000000000000000 [ 2906.147555][T13114] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 2906.154106][T13114] CR2: 00007f9c67e07ff8 CR3: 00000001f0e2a000 CR4: 00000000003406e0 [ 2906.162047][T13114] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 2906.169990][T13114] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 2906.177950][T13114] Call Trace: [ 2906.181214][T13114] ? device_add_disk+0x30/0x30 [ 2906.185963][T13114] ? vsprintf+0x30/0x30 [ 2906.190086][T13114] ? __alloc_disk_node+0x459/0x5a0 [ 2906.195165][T13114] loop_add+0x573/0x740 [ 2906.199307][T13114] loop_control_ioctl+0x448/0x620 [ 2906.204300][T13114] ? loop_remove+0xa0/0xa0 [ 2906.208705][T13114] ? memset+0x1f/0x40 [ 2906.212659][T13114] ? fsnotify+0x1280/0x1340 [ 2906.217132][T13114] ? loop_remove+0xa0/0xa0 [ 2906.221529][T13114] do_vfs_ioctl+0x742/0x1720 06:55:39 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) (fail_nth: 45) 06:55:39 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x0) ioctl$USBDEVFS_SUBMITURB(r0, 0xc0185500, &(0x7f0000000200)=@urb_type_bulk={0x2, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 06:55:39 executing program 1: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) ioctl$USBDEVFS_RESETEP(r0, 0x80045515, &(0x7f0000000080)) 06:55:39 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x802c550a, &(0x7f0000000200)=@urb_type_bulk={0x2, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0}) 06:55:39 executing program 0: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) ioctl$USBDEVFS_RESETEP(r0, 0x80085504, &(0x7f0000000080)) 06:55:39 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000300)=@security={'security\x00', 0xe, 0x4, 0x260, 0xffffffff, 0x130, 0x130, 0x98, 0xffffffff, 0xffffffff, 0x1c8, 0x1c8, 0x1c8, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x70, 0x98}, @common=@inet=@SET1={0x28}}, {{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@STANDARD={0x28, '\x00', 0x0, 0x130}}, {{@ip={@rand_addr, @broadcast, 0x0, 0x0, 'batadv_slave_0\x00', 'ip_vti0\x00', {}, {}, 0x5c}, 0x0, 0x70, 0x98}, @common=@unspec=@NFQUEUE0={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x2c0) (async) ioctl$USBDEVFS_RESETEP(r0, 0x80045503, &(0x7f0000000080)) (async) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000040)={0x8}, 0x8) 06:55:39 executing program 1: syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040)=@security={'security\x00', 0xe, 0x4, 0x260, 0xffffffff, 0x180, 0xc0, 0xc0, 0xffffffff, 0xffffffff, 0x288, 0x288, 0x288, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x70, 0x98}, @common=@inet=@SET1={0x28}}, {{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@STANDARD={0x28}}, {{@ip={@rand_addr, @broadcast, 0x0, 0x0, 'batadv_slave_0\x00', 'ip_vti0\x00'}, 0x0, 0x70, 0x98}, @common=@unspec=@NFQUEUE0={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x2c0) ioctl$USBDEVFS_RESETEP(0xffffffffffffffff, 0x80045515, &(0x7f0000000080)) [ 2906.226109][T13114] ? ioctl_preallocate+0x250/0x250 [ 2906.231204][T13114] ? __fget+0x407/0x490 [ 2906.235329][T13114] ? fget_many+0x20/0x20 [ 2906.239548][T13114] ? debug_smp_processor_id+0x20/0x20 [ 2906.244894][T13114] ? security_file_ioctl+0x7d/0xa0 [ 2906.249995][T13114] __x64_sys_ioctl+0xd4/0x110 [ 2906.254647][T13114] do_syscall_64+0xca/0x1c0 [ 2906.259122][T13114] entry_SYSCALL_64_after_hwframe+0x5c/0xc1 [ 2906.264981][T13114] ---[ end trace a19802151b528bec ]--- 06:55:39 executing program 1: syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040)=@security={'security\x00', 0xe, 0x4, 0x260, 0xffffffff, 0x180, 0xc0, 0xc0, 0xffffffff, 0xffffffff, 0x288, 0x288, 0x288, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x70, 0x98}, @common=@inet=@SET1={0x28}}, {{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@STANDARD={0x28}}, {{@ip={@rand_addr, @broadcast, 0x0, 0x0, 'batadv_slave_0\x00', 'ip_vti0\x00'}, 0x0, 0x70, 0x98}, @common=@unspec=@NFQUEUE0={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x2c0) ioctl$USBDEVFS_RESETEP(0xffffffffffffffff, 0x80045515, &(0x7f0000000080)) 06:55:39 executing program 0: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) ioctl$USBDEVFS_RESETEP(r0, 0x80085504, &(0x7f0000000080)) 06:55:39 executing program 3: syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(0xffffffffffffffff, 0xc0185500, &(0x7f0000000200)=@urb_type_bulk={0x2, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 06:55:39 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x802c550a, &(0x7f0000000200)=@urb_type_bulk={0x2, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0}) 06:55:39 executing program 1: syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040)=@security={'security\x00', 0xe, 0x4, 0x260, 0xffffffff, 0x180, 0xc0, 0xc0, 0xffffffff, 0xffffffff, 0x288, 0x288, 0x288, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x70, 0x98}, @common=@inet=@SET1={0x28}}, {{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@STANDARD={0x28}}, {{@ip={@rand_addr, @broadcast, 0x0, 0x0, 'batadv_slave_0\x00', 'ip_vti0\x00'}, 0x0, 0x70, 0x98}, @common=@unspec=@NFQUEUE0={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x2c0) ioctl$USBDEVFS_RESETEP(0xffffffffffffffff, 0x80045515, &(0x7f0000000080)) [ 2906.294396][T13142] usb usb8: usbfs: process 13142 (syz-executor.0) did not claim interface 0 before use [ 2906.343543][T13156] usb usb8: usbfs: process 13156 (syz-executor.0) did not claim interface 0 before use [ 2906.353553][T13146] FAULT_INJECTION: forcing a failure. [ 2906.353553][T13146] name failslab, interval 1, probability 0, space 0, times 0 [ 2906.369267][T13146] CPU: 1 PID: 13146 Comm: syz-executor.4 Tainted: G W 5.4.233-syzkaller-00019-gd5ed2ca98e48 #0 [ 2906.380971][T13146] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/14/2023 [ 2906.390998][T13146] Call Trace: [ 2906.394265][T13146] dump_stack+0x1d8/0x241 [ 2906.398652][T13146] ? panic+0x768/0x768 [ 2906.402700][T13146] ? nf_ct_l4proto_log_invalid+0x258/0x258 [ 2906.408507][T13146] should_fail+0x71f/0x880 [ 2906.412913][T13146] ? setup_fault_attr+0x3d0/0x3d0 [ 2906.417907][T13146] ? device_add+0xb6/0xbb0 [ 2906.422290][T13146] should_failslab+0x5/0x20 [ 2906.426849][T13146] kmem_cache_alloc_trace+0x28/0x240 [ 2906.432103][T13146] device_add+0xb6/0xbb0 [ 2906.436316][T13146] device_create_vargs+0x1b9/0x210 [ 2906.441395][T13146] device_create+0xea/0x130 [ 2906.445871][T13146] ? device_create_vargs+0x210/0x210 [ 2906.451125][T13146] ? __percpu_ref_switch_mode+0x36d/0x5b0 [ 2906.456811][T13146] bdi_register_va+0x84/0x600 [ 2906.461460][T13146] bdi_register+0xd1/0x120 [ 2906.465859][T13146] ? __device_add_disk+0x551/0x1220 [ 2906.471039][T13146] ? bdi_register_va+0x600/0x600 [ 2906.475959][T13146] ? percpu_ref_resurrect+0x113/0x190 [ 2906.481302][T13146] bdi_register_owner+0x55/0xf0 [ 2906.486124][T13146] __device_add_disk+0x5d1/0x1220 [ 2906.491130][T13146] ? device_add_disk+0x30/0x30 [ 2906.495867][T13146] ? vsprintf+0x30/0x30 [ 2906.500010][T13146] ? __alloc_disk_node+0x459/0x5a0 [ 2906.505108][T13146] loop_add+0x573/0x740 [ 2906.509235][T13146] loop_control_ioctl+0x448/0x620 [ 2906.514245][T13146] ? loop_remove+0xa0/0xa0 [ 2906.518630][T13146] ? memset+0x1f/0x40 [ 2906.522585][T13146] ? fsnotify+0x1280/0x1340 [ 2906.527083][T13146] ? loop_remove+0xa0/0xa0 [ 2906.531476][T13146] do_vfs_ioctl+0x742/0x1720 [ 2906.536039][T13146] ? ioctl_preallocate+0x250/0x250 [ 2906.541122][T13146] ? __fget+0x407/0x490 [ 2906.545250][T13146] ? fget_many+0x20/0x20 [ 2906.549463][T13146] ? debug_smp_processor_id+0x20/0x20 [ 2906.554806][T13146] ? security_file_ioctl+0x7d/0xa0 [ 2906.559911][T13146] __x64_sys_ioctl+0xd4/0x110 [ 2906.564566][T13146] do_syscall_64+0xca/0x1c0 [ 2906.569041][T13146] entry_SYSCALL_64_after_hwframe+0x5c/0xc1 [ 2906.576657][T13146] ------------[ cut here ]------------ [ 2906.582106][T13146] WARNING: CPU: 1 PID: 13146 at block/genhd.c:742 __device_add_disk+0xea1/0x1220 [ 2906.591175][T13146] Modules linked in: [ 2906.595044][T13146] CPU: 1 PID: 13146 Comm: syz-executor.4 Tainted: G W 5.4.233-syzkaller-00019-gd5ed2ca98e48 #0 [ 2906.606654][T13146] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/14/2023 [ 2906.616718][T13146] RIP: 0010:__device_add_disk+0xea1/0x1220 [ 2906.622496][T13146] Code: ff ff e8 a2 ae 48 ff 0f 0b e9 52 f3 ff ff e8 96 ae 48 ff 0f 0b 42 80 3c 2b 00 0f 85 ac f8 ff ff e9 af f8 ff ff e8 7f ae 48 ff <0f> 0b e9 41 f7 ff ff e8 73 ae 48 ff e9 18 ff ff ff 44 89 f9 80 e1 [ 2906.642073][T13146] RSP: 0018:ffff8881e4fa7a20 EFLAGS: 00010246 [ 2906.648107][T13146] RAX: ffffffff821a8fe1 RBX: 00000000fffffff4 RCX: 0000000000040000 [ 2906.656052][T13146] RDX: ffffc9000174f000 RSI: 000000000003ffff RDI: 0000000000040000 [ 2906.663990][T13146] RBP: ffff8881e4fa7b58 R08: ffffffff821a871c R09: ffffea00079faf80 [ 2906.671930][T13146] R10: ffffffffffffffff R11: dffffc0000000001 R12: ffff8881d0e4d000 [ 2906.679868][T13146] R13: dffffc0000000000 R14: ffff8881d0e4d070 R15: 1ffff1103a1c9a9d [ 2906.687817][T13146] FS: 00007f9c67e08700(0000) GS:ffff8881f6f00000(0000) knlGS:0000000000000000 [ 2906.696726][T13146] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 2906.703295][T13146] CR2: 00005555573da728 CR3: 00000001e87f6000 CR4: 00000000003406e0 [ 2906.711254][T13146] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 2906.719195][T13146] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 2906.727136][T13146] Call Trace: [ 2906.730398][T13146] ? device_add_disk+0x30/0x30 [ 2906.735129][T13146] ? vsprintf+0x30/0x30 [ 2906.739256][T13146] ? __alloc_disk_node+0x459/0x5a0 [ 2906.744341][T13146] loop_add+0x573/0x740 [ 2906.748470][T13146] loop_control_ioctl+0x448/0x620 [ 2906.753460][T13146] ? loop_remove+0xa0/0xa0 [ 2906.757847][T13146] ? memset+0x1f/0x40 [ 2906.761803][T13146] ? fsnotify+0x1280/0x1340 [ 2906.766278][T13146] ? loop_remove+0xa0/0xa0 [ 2906.770696][T13146] do_vfs_ioctl+0x742/0x1720 [ 2906.775256][T13146] ? ioctl_preallocate+0x250/0x250 [ 2906.780336][T13146] ? __fget+0x407/0x490 [ 2906.784460][T13146] ? fget_many+0x20/0x20 [ 2906.788673][T13146] ? debug_smp_processor_id+0x20/0x20 06:55:39 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) (fail_nth: 46) 06:55:39 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x802c550a, &(0x7f0000000200)=@urb_type_bulk={0x2, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000, 0x0, 0x0, 0x0, 0x0}) 06:55:39 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000300)=@security={'security\x00', 0xe, 0x4, 0x260, 0xffffffff, 0x130, 0x130, 0x98, 0xffffffff, 0xffffffff, 0x1c8, 0x1c8, 0x1c8, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x70, 0x98}, @common=@inet=@SET1={0x28}}, {{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@STANDARD={0x28, '\x00', 0x0, 0x130}}, {{@ip={@rand_addr, @broadcast, 0x0, 0x0, 'batadv_slave_0\x00', 'ip_vti0\x00', {}, {}, 0x5c}, 0x0, 0x70, 0x98}, @common=@unspec=@NFQUEUE0={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x2c0) (async) ioctl$USBDEVFS_RESETEP(r0, 0x80045503, &(0x7f0000000080)) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000040)={0x8}, 0x8) 06:55:39 executing program 1: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040)=@security={'security\x00', 0xe, 0x4, 0x260, 0xffffffff, 0x180, 0xc0, 0xc0, 0xffffffff, 0xffffffff, 0x288, 0x288, 0x288, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x70, 0x98}, @common=@inet=@SET1={0x28}}, {{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@STANDARD={0x28}}, {{@ip={@rand_addr, @broadcast, 0x0, 0x0, 'batadv_slave_0\x00', 'ip_vti0\x00'}, 0x0, 0x70, 0x98}, @common=@unspec=@NFQUEUE0={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x2c0) ioctl$USBDEVFS_RESETEP(r0, 0x80045515, 0x0) 06:55:39 executing program 3: syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(0xffffffffffffffff, 0xc0185500, &(0x7f0000000200)=@urb_type_bulk={0x2, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 06:55:39 executing program 0: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) ioctl$USBDEVFS_RESETEP(r0, 0x80085504, &(0x7f0000000080)) [ 2906.794012][T13146] ? security_file_ioctl+0x7d/0xa0 [ 2906.799090][T13146] __x64_sys_ioctl+0xd4/0x110 [ 2906.803736][T13146] do_syscall_64+0xca/0x1c0 [ 2906.808212][T13146] entry_SYSCALL_64_after_hwframe+0x5c/0xc1 [ 2906.814069][T13146] ---[ end trace a19802151b528bed ]--- 06:55:39 executing program 3: syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(0xffffffffffffffff, 0xc0185500, &(0x7f0000000200)=@urb_type_bulk={0x2, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 06:55:39 executing program 1: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040)=@security={'security\x00', 0xe, 0x4, 0x260, 0xffffffff, 0x180, 0xc0, 0xc0, 0xffffffff, 0xffffffff, 0x288, 0x288, 0x288, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x70, 0x98}, @common=@inet=@SET1={0x28}}, {{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@STANDARD={0x28}}, {{@ip={@rand_addr, @broadcast, 0x0, 0x0, 'batadv_slave_0\x00', 'ip_vti0\x00'}, 0x0, 0x70, 0x98}, @common=@unspec=@NFQUEUE0={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x2c0) ioctl$USBDEVFS_RESETEP(r0, 0x80045515, 0x0) 06:55:39 executing program 0: syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040)=@security={'security\x00', 0xe, 0x4, 0x260, 0xffffffff, 0x180, 0xc0, 0xc0, 0xffffffff, 0xffffffff, 0x288, 0x288, 0x288, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x70, 0x98}, @common=@inet=@SET1={0x28}}, {{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@STANDARD={0x28}}, {{@ip={@rand_addr, @broadcast, 0x0, 0x0, 'batadv_slave_0\x00', 'ip_vti0\x00'}, 0x0, 0x70, 0x98}, @common=@unspec=@NFQUEUE0={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x2c0) ioctl$USBDEVFS_RESETEP(0xffffffffffffffff, 0x80085504, &(0x7f0000000080)) 06:55:39 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x802c550a, &(0x7f0000000200)=@urb_type_bulk={0x2, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff0bdbe, 0x0, 0x0, 0x0, 0x0}) 06:55:39 executing program 0: syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040)=@security={'security\x00', 0xe, 0x4, 0x260, 0xffffffff, 0x180, 0xc0, 0xc0, 0xffffffff, 0xffffffff, 0x288, 0x288, 0x288, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x70, 0x98}, @common=@inet=@SET1={0x28}}, {{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@STANDARD={0x28}}, {{@ip={@rand_addr, @broadcast, 0x0, 0x0, 'batadv_slave_0\x00', 'ip_vti0\x00'}, 0x0, 0x70, 0x98}, @common=@unspec=@NFQUEUE0={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x2c0) ioctl$USBDEVFS_RESETEP(0xffffffffffffffff, 0x80085504, &(0x7f0000000080)) 06:55:39 executing program 1: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040)=@security={'security\x00', 0xe, 0x4, 0x260, 0xffffffff, 0x180, 0xc0, 0xc0, 0xffffffff, 0xffffffff, 0x288, 0x288, 0x288, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x70, 0x98}, @common=@inet=@SET1={0x28}}, {{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@STANDARD={0x28}}, {{@ip={@rand_addr, @broadcast, 0x0, 0x0, 'batadv_slave_0\x00', 'ip_vti0\x00'}, 0x0, 0x70, 0x98}, @common=@unspec=@NFQUEUE0={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x2c0) ioctl$USBDEVFS_RESETEP(r0, 0x80045515, 0x0) [ 2906.838975][T13168] usb usb8: usbfs: process 13168 (syz-executor.0) did not claim interface 0 before use [ 2906.908989][T13184] FAULT_INJECTION: forcing a failure. [ 2906.908989][T13184] name failslab, interval 1, probability 0, space 0, times 0 [ 2906.937684][T13184] CPU: 1 PID: 13184 Comm: syz-executor.4 Tainted: G W 5.4.233-syzkaller-00019-gd5ed2ca98e48 #0 [ 2906.949316][T13184] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/14/2023 [ 2906.959362][T13184] Call Trace: [ 2906.962656][T13184] dump_stack+0x1d8/0x241 [ 2906.966982][T13184] ? panic+0x768/0x768 [ 2906.971053][T13184] ? nf_ct_l4proto_log_invalid+0x258/0x258 [ 2906.976850][T13184] ? unwind_next_frame+0x176a/0x1ea0 [ 2906.982129][T13184] should_fail+0x71f/0x880 [ 2906.986542][T13184] ? setup_fault_attr+0x3d0/0x3d0 [ 2906.991557][T13184] ? deref_stack_reg+0x1f0/0x1f0 [ 2906.996484][T13184] ? __unwind_start+0x708/0x890 [ 2907.001328][T13184] ? __kernfs_new_node+0x99/0x6e0 [ 2907.006342][T13184] should_failslab+0x5/0x20 [ 2907.010818][T13184] __kmalloc_track_caller+0x4f/0x290 [ 2907.016076][T13184] ? stack_trace_save+0x1c0/0x1c0 [ 2907.021073][T13184] kstrdup_const+0x51/0x90 [ 2907.025459][T13184] __kernfs_new_node+0x99/0x6e0 [ 2907.030277][T13184] ? entry_SYSCALL_64_after_hwframe+0x5c/0xc1 [ 2907.036311][T13184] ? kernfs_new_node+0x160/0x160 [ 2907.041217][T13184] ? stack_trace_save+0x118/0x1c0 [ 2907.046215][T13184] ? stack_trace_snprint+0x170/0x170 [ 2907.051470][T13184] ? stack_trace_save+0x118/0x1c0 [ 2907.056466][T13184] kernfs_create_dir_ns+0x90/0x220 [ 2907.061548][T13184] sysfs_create_dir_ns+0x185/0x390 [ 2907.066628][T13184] ? sysfs_warn_dup+0xa0/0xa0 [ 2907.071279][T13184] ? entry_SYSCALL_64_after_hwframe+0x5c/0xc1 [ 2907.077315][T13184] kobject_add_internal+0x6b7/0xca0 [ 2907.082482][T13184] kobject_add+0x14e/0x210 [ 2907.086867][T13184] ? _raw_spin_lock+0xa4/0x1b0 [ 2907.091600][T13184] ? kobject_init+0x1d0/0x1d0 [ 2907.096247][T13184] ? mutex_unlock+0x18/0x40 [ 2907.100721][T13184] ? get_device_parent+0x293/0x400 [ 2907.105800][T13184] device_add+0x3eb/0xbb0 [ 2907.110102][T13184] device_create_vargs+0x1b9/0x210 [ 2907.115181][T13184] device_create+0xea/0x130 [ 2907.119672][T13184] ? device_create_vargs+0x210/0x210 [ 2907.124938][T13184] ? __percpu_ref_switch_mode+0x36d/0x5b0 [ 2907.130631][T13184] bdi_register_va+0x84/0x600 [ 2907.135280][T13184] bdi_register+0xd1/0x120 [ 2907.139720][T13184] ? __device_add_disk+0x551/0x1220 [ 2907.144889][T13184] ? bdi_register_va+0x600/0x600 [ 2907.149801][T13184] ? percpu_ref_resurrect+0x113/0x190 [ 2907.155147][T13184] bdi_register_owner+0x55/0xf0 [ 2907.159975][T13184] __device_add_disk+0x5d1/0x1220 [ 2907.164968][T13184] ? device_add_disk+0x30/0x30 [ 2907.169788][T13184] ? vsprintf+0x30/0x30 [ 2907.173915][T13184] ? __alloc_disk_node+0x459/0x5a0 [ 2907.178993][T13184] loop_add+0x573/0x740 [ 2907.183119][T13184] loop_control_ioctl+0x448/0x620 [ 2907.188112][T13184] ? loop_remove+0xa0/0xa0 [ 2907.192499][T13184] ? memset+0x1f/0x40 [ 2907.196454][T13184] ? fsnotify+0x1280/0x1340 [ 2907.200947][T13184] ? loop_remove+0xa0/0xa0 [ 2907.205334][T13184] do_vfs_ioctl+0x742/0x1720 [ 2907.209897][T13184] ? ioctl_preallocate+0x250/0x250 [ 2907.214978][T13184] ? __fget+0x407/0x490 [ 2907.219102][T13184] ? fget_many+0x20/0x20 [ 2907.223314][T13184] ? debug_smp_processor_id+0x20/0x20 [ 2907.228657][T13184] ? security_file_ioctl+0x7d/0xa0 [ 2907.233735][T13184] __x64_sys_ioctl+0xd4/0x110 [ 2907.238401][T13184] do_syscall_64+0xca/0x1c0 [ 2907.242879][T13184] entry_SYSCALL_64_after_hwframe+0x5c/0xc1 [ 2907.249392][T13184] kobject_add_internal failed for 7:0 (error: -12 parent: bdi) [ 2907.257014][T13184] ------------[ cut here ]------------ [ 2907.262448][T13184] WARNING: CPU: 1 PID: 13184 at block/genhd.c:742 __device_add_disk+0xea1/0x1220 [ 2907.271515][T13184] Modules linked in: [ 2907.275382][T13184] CPU: 1 PID: 13184 Comm: syz-executor.4 Tainted: G W 5.4.233-syzkaller-00019-gd5ed2ca98e48 #0 [ 2907.286992][T13184] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/14/2023 [ 2907.297041][T13184] RIP: 0010:__device_add_disk+0xea1/0x1220 [ 2907.302818][T13184] Code: ff ff e8 a2 ae 48 ff 0f 0b e9 52 f3 ff ff e8 96 ae 48 ff 0f 0b 42 80 3c 2b 00 0f 85 ac f8 ff ff e9 af f8 ff ff e8 7f ae 48 ff <0f> 0b e9 41 f7 ff ff e8 73 ae 48 ff e9 18 ff ff ff 44 89 f9 80 e1 [ 2907.322426][T13184] RSP: 0018:ffff8881e8aefa20 EFLAGS: 00010246 [ 2907.328469][T13184] RAX: ffffffff821a8fe1 RBX: 00000000fffffff4 RCX: 0000000000040000 [ 2907.336420][T13184] RDX: ffffc90001950000 RSI: 000000000003ffff RDI: 0000000000040000 [ 2907.344373][T13184] RBP: ffff8881e8aefb58 R08: ffffffff821a871c R09: ffffea0007b8db80 [ 2907.352342][T13184] R10: ffffffff84600000 R11: dffffc0000000000 R12: ffff8881e4c33000 [ 2907.360283][T13184] R13: dffffc0000000000 R14: ffff8881e4c33070 R15: 1ffff1103c98669d [ 2907.368227][T13184] FS: 00007f9c67de7700(0000) GS:ffff8881f6f00000(0000) knlGS:0000000000000000 [ 2907.377232][T13184] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 2907.383788][T13184] CR2: 0000001b2e021000 CR3: 00000001e86a6000 CR4: 00000000003406e0 [ 2907.391733][T13184] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 2907.399674][T13184] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 2907.407613][T13184] Call Trace: [ 2907.410882][T13184] ? device_add_disk+0x30/0x30 [ 2907.415616][T13184] ? vsprintf+0x30/0x30 [ 2907.419812][T13184] ? __alloc_disk_node+0x459/0x5a0 [ 2907.425015][T13184] loop_add+0x573/0x740 [ 2907.429149][T13184] loop_control_ioctl+0x448/0x620 [ 2907.434152][T13184] ? loop_remove+0xa0/0xa0 [ 2907.438553][T13184] ? memset+0x1f/0x40 [ 2907.442505][T13184] ? fsnotify+0x1280/0x1340 [ 2907.446990][T13184] ? loop_remove+0xa0/0xa0 [ 2907.451378][T13184] do_vfs_ioctl+0x742/0x1720 [ 2907.455944][T13184] ? ioctl_preallocate+0x250/0x250 06:55:40 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) (fail_nth: 47) 06:55:40 executing program 1: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) ioctl$USBDEVFS_RESETEP(r0, 0x80045515, &(0x7f0000000080)) 06:55:40 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x802c550a, &(0x7f0000000200)=@urb_type_bulk={0x2, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbebdf07f, 0x0, 0x0, 0x0, 0x0}) 06:55:40 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040)=@security={'security\x00', 0xe, 0x4, 0x260, 0xffffffff, 0x180, 0xc0, 0xc0, 0xffffffff, 0xffffffff, 0x288, 0x288, 0x288, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x70, 0x98}, @common=@inet=@SET1={0x28}}, {{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@STANDARD={0x28}}, {{@ip={@rand_addr, @broadcast, 0x0, 0x0, 'batadv_slave_0\x00', 'ip_vti0\x00'}, 0x0, 0x70, 0x98}, @common=@unspec=@NFQUEUE0={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x2c0) ioctl$USBDEVFS_RESETEP(r0, 0x80045503, &(0x7f0000000080)) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000300)=@bloom_filter={0x1e, 0x8, 0x35, 0x80, 0x104, 0xffffffffffffffff, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x3, 0x5, 0xc}, 0x48) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000380)=@base={0x9, 0x7, 0x2, 0x6, 0x80, 0xffffffffffffffff, 0x80000001, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x0, 0x4}, 0x48) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x1, 0x9, 0x6, 0x8906, 0x0, 0x1}, 0x48) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r3, 0x89f0, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x1, 0x9, 0x6, 0x8906, 0x0, 0x1}, 0x48) socketpair(0x2c, 0xa, 0x46, &(0x7f0000000680)={0xffffffffffffffff}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000006c0)={0xffffffffffffffff}) sendmsg$NBD_CMD_RECONFIGURE(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f0000000640)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000007c0)={&(0x7f0000000700)={0x90, 0x0, 0x300, 0x70bd2a, 0x25dfdbfe, {}, [@NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x8}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x120}, @NBD_ATTR_TIMEOUT={0xc, 0x4, 0x100000000000}, @NBD_ATTR_SOCKETS={0x44, 0x7, 0x0, 0x1, [{0x8}, {0x8, 0x1, r5}, {0x8}, {0x8}, {0x8}, {0x8}, {0x8, 0x1, r6}, {0x8}]}, @NBD_ATTR_BACKEND_IDENTIFIER={0xc, 0xa, 'ip_vti0\x00'}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}]}, 0x90}, 0x1, 0x0, 0x0, 0x44010}, 0x80) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r4, 0x89f0, 0x0) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x1, 0x9, 0x6, 0x8906, 0x0, 0x1}, 0x48) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r7, 0x89f0, 0x0) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000500)=@base={0x6, 0xcc8a, 0x5, 0x3, 0x2, 0xffffffffffffffff, 0x861, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x5, 0x2}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0xf, 0x8, &(0x7f0000000400)=@raw=[@map_fd={0x18, 0x3, 0x1, 0x0, r1}, @ldst={0x2, 0x3, 0x2, 0x2, 0xa, 0xc, 0xffffffffffffffff}, @map_val={0x18, 0x7, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x8}, @btf_id={0x18, 0xa, 0x3, 0x0, 0x1}, @jmp={0x5, 0x1, 0xb, 0x2, 0xa, 0x20, 0x1}], &(0x7f0000000440)='GPL\x00', 0x5, 0x0, 0x0, 0x40f00, 0x14, '\x00', 0x0, 0x1a, 0xffffffffffffffff, 0x8, &(0x7f0000000480)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000004c0)={0x4, 0x5, 0xfffffffa}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000580)=[0xffffffffffffffff, r3, 0x1, r4, 0xffffffffffffffff, r7, r8]}, 0x80) 06:55:40 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0xc0185500, 0x0) 06:55:40 executing program 0: syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040)=@security={'security\x00', 0xe, 0x4, 0x260, 0xffffffff, 0x180, 0xc0, 0xc0, 0xffffffff, 0xffffffff, 0x288, 0x288, 0x288, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x70, 0x98}, @common=@inet=@SET1={0x28}}, {{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@STANDARD={0x28}}, {{@ip={@rand_addr, @broadcast, 0x0, 0x0, 'batadv_slave_0\x00', 'ip_vti0\x00'}, 0x0, 0x70, 0x98}, @common=@unspec=@NFQUEUE0={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x2c0) ioctl$USBDEVFS_RESETEP(0xffffffffffffffff, 0x80085504, &(0x7f0000000080)) 06:55:40 executing program 0: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040)=@security={'security\x00', 0xe, 0x4, 0x260, 0xffffffff, 0x180, 0xc0, 0xc0, 0xffffffff, 0xffffffff, 0x288, 0x288, 0x288, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x70, 0x98}, @common=@inet=@SET1={0x28}}, {{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@STANDARD={0x28}}, {{@ip={@rand_addr, @broadcast, 0x0, 0x0, 'batadv_slave_0\x00', 'ip_vti0\x00'}, 0x0, 0x70, 0x98}, @common=@unspec=@NFQUEUE0={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x2c0) ioctl$USBDEVFS_RESETEP(r0, 0x80085504, 0x0) 06:55:40 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0xc0185500, 0x0) 06:55:40 executing program 1: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040)=@security={'security\x00', 0xe, 0x4, 0x260, 0xffffffff, 0x180, 0xc0, 0xc0, 0xffffffff, 0xffffffff, 0x288, 0x288, 0x288, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x70, 0x98}, @common=@inet=@SET1={0x28}}, {{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@STANDARD={0x28}}, {{@ip={@rand_addr, @broadcast, 0x0, 0x0, 'batadv_slave_0\x00', 'ip_vti0\x00'}, 0x0, 0x70, 0x98}, @common=@unspec=@NFQUEUE0={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x2c0) ioctl$USBDEVFS_RESETEP(r0, 0xc0185502, &(0x7f0000000080)) [ 2907.461037][T13184] ? __fget+0x407/0x490 [ 2907.465195][T13184] ? fget_many+0x20/0x20 [ 2907.469409][T13184] ? debug_smp_processor_id+0x20/0x20 [ 2907.474749][T13184] ? security_file_ioctl+0x7d/0xa0 [ 2907.479834][T13184] __x64_sys_ioctl+0xd4/0x110 [ 2907.484482][T13184] do_syscall_64+0xca/0x1c0 [ 2907.488965][T13184] entry_SYSCALL_64_after_hwframe+0x5c/0xc1 [ 2907.494840][T13184] ---[ end trace a19802151b528bee ]--- 06:55:40 executing program 0: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040)=@security={'security\x00', 0xe, 0x4, 0x260, 0xffffffff, 0x180, 0xc0, 0xc0, 0xffffffff, 0xffffffff, 0x288, 0x288, 0x288, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x70, 0x98}, @common=@inet=@SET1={0x28}}, {{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@STANDARD={0x28}}, {{@ip={@rand_addr, @broadcast, 0x0, 0x0, 'batadv_slave_0\x00', 'ip_vti0\x00'}, 0x0, 0x70, 0x98}, @common=@unspec=@NFQUEUE0={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x2c0) ioctl$USBDEVFS_RESETEP(r0, 0x80085504, 0x0) 06:55:40 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x802c550a, &(0x7f0000000200)=@urb_type_bulk={0x2, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 06:55:40 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0xc0185500, 0x0) 06:55:40 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x802c550a, &(0x7f0000000200)=@urb_type_bulk={0x2, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0}) [ 2907.570948][T13198] FAULT_INJECTION: forcing a failure. [ 2907.570948][T13198] name failslab, interval 1, probability 0, space 0, times 0 [ 2907.584932][T13198] CPU: 1 PID: 13198 Comm: syz-executor.4 Tainted: G W 5.4.233-syzkaller-00019-gd5ed2ca98e48 #0 [ 2907.596555][T13198] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/14/2023 [ 2907.606600][T13198] Call Trace: [ 2907.609890][T13198] dump_stack+0x1d8/0x241 [ 2907.614214][T13198] ? panic+0x768/0x768 [ 2907.618279][T13198] ? nf_ct_l4proto_log_invalid+0x258/0x258 [ 2907.624071][T13198] should_fail+0x71f/0x880 [ 2907.628460][T13198] ? setup_fault_attr+0x3d0/0x3d0 [ 2907.633452][T13198] ? __kernfs_new_node+0xdb/0x6e0 [ 2907.638445][T13198] should_failslab+0x5/0x20 [ 2907.642916][T13198] kmem_cache_alloc+0x24/0x220 [ 2907.647647][T13198] __kernfs_new_node+0xdb/0x6e0 [ 2907.652464][T13198] ? entry_SYSCALL_64_after_hwframe+0x5c/0xc1 [ 2907.658497][T13198] ? kernfs_new_node+0x160/0x160 [ 2907.663402][T13198] ? stack_trace_save+0x118/0x1c0 [ 2907.668392][T13198] ? stack_trace_snprint+0x170/0x170 [ 2907.673642][T13198] ? stack_trace_save+0x118/0x1c0 [ 2907.678635][T13198] kernfs_create_dir_ns+0x90/0x220 [ 2907.683713][T13198] sysfs_create_dir_ns+0x185/0x390 [ 2907.688790][T13198] ? sysfs_warn_dup+0xa0/0xa0 [ 2907.693437][T13198] ? entry_SYSCALL_64_after_hwframe+0x5c/0xc1 [ 2907.699470][T13198] kobject_add_internal+0x6b7/0xca0 [ 2907.704635][T13198] kobject_add+0x14e/0x210 [ 2907.709019][T13198] ? _raw_spin_lock+0xa4/0x1b0 [ 2907.713751][T13198] ? kobject_init+0x1d0/0x1d0 [ 2907.718396][T13198] ? mutex_unlock+0x18/0x40 [ 2907.722868][T13198] ? get_device_parent+0x293/0x400 [ 2907.727943][T13198] device_add+0x3eb/0xbb0 [ 2907.732259][T13198] device_create_vargs+0x1b9/0x210 [ 2907.737339][T13198] device_create+0xea/0x130 [ 2907.741819][T13198] ? device_create_vargs+0x210/0x210 [ 2907.747074][T13198] ? __percpu_ref_switch_mode+0x36d/0x5b0 [ 2907.752759][T13198] bdi_register_va+0x84/0x600 [ 2907.757406][T13198] bdi_register+0xd1/0x120 [ 2907.761792][T13198] ? __device_add_disk+0x551/0x1220 [ 2907.766957][T13198] ? bdi_register_va+0x600/0x600 [ 2907.771864][T13198] ? percpu_ref_resurrect+0x113/0x190 [ 2907.777220][T13198] bdi_register_owner+0x55/0xf0 [ 2907.782049][T13198] __device_add_disk+0x5d1/0x1220 [ 2907.787046][T13198] ? device_add_disk+0x30/0x30 [ 2907.791782][T13198] ? vsprintf+0x30/0x30 [ 2907.795908][T13198] ? __alloc_disk_node+0x459/0x5a0 [ 2907.800993][T13198] loop_add+0x573/0x740 [ 2907.805127][T13198] loop_control_ioctl+0x448/0x620 [ 2907.810124][T13198] ? loop_remove+0xa0/0xa0 [ 2907.814514][T13198] ? memset+0x1f/0x40 [ 2907.818492][T13198] ? fsnotify+0x1280/0x1340 [ 2907.822979][T13198] ? loop_remove+0xa0/0xa0 [ 2907.827363][T13198] do_vfs_ioctl+0x742/0x1720 [ 2907.831924][T13198] ? ioctl_preallocate+0x250/0x250 [ 2907.837001][T13198] ? __fget+0x407/0x490 [ 2907.841125][T13198] ? fget_many+0x20/0x20 [ 2907.845334][T13198] ? debug_smp_processor_id+0x20/0x20 [ 2907.850681][T13198] ? security_file_ioctl+0x7d/0xa0 [ 2907.855773][T13198] __x64_sys_ioctl+0xd4/0x110 [ 2907.860452][T13198] do_syscall_64+0xca/0x1c0 [ 2907.864926][T13198] entry_SYSCALL_64_after_hwframe+0x5c/0xc1 [ 2907.872017][T13198] kobject_add_internal failed for 7:0 (error: -12 parent: bdi) [ 2907.879652][T13198] ------------[ cut here ]------------ [ 2907.885086][T13198] WARNING: CPU: 0 PID: 13198 at block/genhd.c:742 __device_add_disk+0xea1/0x1220 [ 2907.894177][T13198] Modules linked in: [ 2907.898045][T13198] CPU: 0 PID: 13198 Comm: syz-executor.4 Tainted: G W 5.4.233-syzkaller-00019-gd5ed2ca98e48 #0 [ 2907.909634][T13198] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/14/2023 [ 2907.919694][T13198] RIP: 0010:__device_add_disk+0xea1/0x1220 [ 2907.925468][T13198] Code: ff ff e8 a2 ae 48 ff 0f 0b e9 52 f3 ff ff e8 96 ae 48 ff 0f 0b 42 80 3c 2b 00 0f 85 ac f8 ff ff e9 af f8 ff ff e8 7f ae 48 ff <0f> 0b e9 41 f7 ff ff e8 73 ae 48 ff e9 18 ff ff ff 44 89 f9 80 e1 [ 2907.945048][T13198] RSP: 0018:ffff8881cb0b7a20 EFLAGS: 00010246 [ 2907.951081][T13198] RAX: ffffffff821a8fe1 RBX: 00000000fffffff4 RCX: 0000000000040000 [ 2907.959020][T13198] RDX: ffffc9000174f000 RSI: 000000000003ffff RDI: 0000000000040000 [ 2907.966958][T13198] RBP: ffff8881cb0b7b58 R08: ffffffff821a871c R09: ffffea0007b4ae00 [ 2907.974904][T13198] R10: ffffffff84600000 R11: dffffc0000000000 R12: ffff8881cfbc0000 [ 2907.982849][T13198] R13: dffffc0000000000 R14: ffff8881cfbc0070 R15: 1ffff11039f7809d [ 2907.990795][T13198] FS: 00007f9c67e08700(0000) GS:ffff8881f6e00000(0000) knlGS:0000000000000000 [ 2907.999691][T13198] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 2908.006242][T13198] CR2: 00007facd0211058 CR3: 00000001e64f1000 CR4: 00000000003406f0 [ 2908.014184][T13198] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 2908.022144][T13198] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 2908.030103][T13198] Call Trace: [ 2908.033376][T13198] ? device_add_disk+0x30/0x30 [ 2908.038109][T13198] ? vsprintf+0x30/0x30 [ 2908.042234][T13198] ? __alloc_disk_node+0x459/0x5a0 [ 2908.047314][T13198] loop_add+0x573/0x740 [ 2908.051441][T13198] loop_control_ioctl+0x448/0x620 [ 2908.056437][T13198] ? loop_remove+0xa0/0xa0 [ 2908.060839][T13198] ? memset+0x1f/0x40 [ 2908.064790][T13198] ? fsnotify+0x1280/0x1340 06:55:40 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) (fail_nth: 48) 06:55:40 executing program 1: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040)=@security={'security\x00', 0xe, 0x4, 0x260, 0xffffffff, 0x180, 0xc0, 0xc0, 0xffffffff, 0xffffffff, 0x288, 0x288, 0x288, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x70, 0x98}, @common=@inet=@SET1={0x28}}, {{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@STANDARD={0x28}}, {{@ip={@rand_addr, @broadcast, 0x0, 0x0, 'batadv_slave_0\x00', 'ip_vti0\x00'}, 0x0, 0x70, 0x98}, @common=@unspec=@NFQUEUE0={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x2c0) ioctl$USBDEVFS_RESETEP(r0, 0xc0185502, &(0x7f0000000080)) 06:55:40 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040)=@security={'security\x00', 0xe, 0x4, 0x260, 0xffffffff, 0x180, 0xc0, 0xc0, 0xffffffff, 0xffffffff, 0x288, 0x288, 0x288, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x70, 0x98}, @common=@inet=@SET1={0x28}}, {{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@STANDARD={0x28}}, {{@ip={@rand_addr, @broadcast, 0x0, 0x0, 'batadv_slave_0\x00', 'ip_vti0\x00'}, 0x0, 0x70, 0x98}, @common=@unspec=@NFQUEUE0={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x2c0) ioctl$USBDEVFS_RESETEP(r0, 0xc0105500, &(0x7f0000000080)) 06:55:40 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) (async) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040)=@security={'security\x00', 0xe, 0x4, 0x260, 0xffffffff, 0x180, 0xc0, 0xc0, 0xffffffff, 0xffffffff, 0x288, 0x288, 0x288, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x70, 0x98}, @common=@inet=@SET1={0x28}}, {{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@STANDARD={0x28}}, {{@ip={@rand_addr, @broadcast, 0x0, 0x0, 'batadv_slave_0\x00', 'ip_vti0\x00'}, 0x0, 0x70, 0x98}, @common=@unspec=@NFQUEUE0={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x2c0) ioctl$USBDEVFS_RESETEP(r0, 0x80045503, &(0x7f0000000080)) (async) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000300)=@bloom_filter={0x1e, 0x8, 0x35, 0x80, 0x104, 0xffffffffffffffff, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x3, 0x5, 0xc}, 0x48) (async) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000380)=@base={0x9, 0x7, 0x2, 0x6, 0x80, 0xffffffffffffffff, 0x80000001, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x0, 0x4}, 0x48) (async) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x1, 0x9, 0x6, 0x8906, 0x0, 0x1}, 0x48) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r3, 0x89f0, 0x0) (async) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x1, 0x9, 0x6, 0x8906, 0x0, 0x1}, 0x48) (async) socketpair(0x2c, 0xa, 0x46, &(0x7f0000000680)={0xffffffffffffffff}) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000006c0)={0xffffffffffffffff}) sendmsg$NBD_CMD_RECONFIGURE(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f0000000640)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000007c0)={&(0x7f0000000700)={0x90, 0x0, 0x300, 0x70bd2a, 0x25dfdbfe, {}, [@NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x8}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x120}, @NBD_ATTR_TIMEOUT={0xc, 0x4, 0x100000000000}, @NBD_ATTR_SOCKETS={0x44, 0x7, 0x0, 0x1, [{0x8}, {0x8, 0x1, r5}, {0x8}, {0x8}, {0x8}, {0x8}, {0x8, 0x1, r6}, {0x8}]}, @NBD_ATTR_BACKEND_IDENTIFIER={0xc, 0xa, 'ip_vti0\x00'}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}]}, 0x90}, 0x1, 0x0, 0x0, 0x44010}, 0x80) (async) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r4, 0x89f0, 0x0) (async) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x1, 0x9, 0x6, 0x8906, 0x0, 0x1}, 0x48) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r7, 0x89f0, 0x0) (async) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000500)=@base={0x6, 0xcc8a, 0x5, 0x3, 0x2, 0xffffffffffffffff, 0x861, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x5, 0x2}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0xf, 0x8, &(0x7f0000000400)=@raw=[@map_fd={0x18, 0x3, 0x1, 0x0, r1}, @ldst={0x2, 0x3, 0x2, 0x2, 0xa, 0xc, 0xffffffffffffffff}, @map_val={0x18, 0x7, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x8}, @btf_id={0x18, 0xa, 0x3, 0x0, 0x1}, @jmp={0x5, 0x1, 0xb, 0x2, 0xa, 0x20, 0x1}], &(0x7f0000000440)='GPL\x00', 0x5, 0x0, 0x0, 0x40f00, 0x14, '\x00', 0x0, 0x1a, 0xffffffffffffffff, 0x8, &(0x7f0000000480)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000004c0)={0x4, 0x5, 0xfffffffa}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000580)=[0xffffffffffffffff, r3, 0x1, r4, 0xffffffffffffffff, r7, r8]}, 0x80) 06:55:40 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x802c550a, &(0x7f0000000200)=@urb_type_bulk={0x2, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0}) 06:55:40 executing program 0: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040)=@security={'security\x00', 0xe, 0x4, 0x260, 0xffffffff, 0x180, 0xc0, 0xc0, 0xffffffff, 0xffffffff, 0x288, 0x288, 0x288, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x70, 0x98}, @common=@inet=@SET1={0x28}}, {{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@STANDARD={0x28}}, {{@ip={@rand_addr, @broadcast, 0x0, 0x0, 'batadv_slave_0\x00', 'ip_vti0\x00'}, 0x0, 0x70, 0x98}, @common=@unspec=@NFQUEUE0={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x2c0) ioctl$USBDEVFS_RESETEP(r0, 0x80085504, 0x0) 06:55:40 executing program 1: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040)=@security={'security\x00', 0xe, 0x4, 0x260, 0xffffffff, 0x180, 0xc0, 0xc0, 0xffffffff, 0xffffffff, 0x288, 0x288, 0x288, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x70, 0x98}, @common=@inet=@SET1={0x28}}, {{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@STANDARD={0x28}}, {{@ip={@rand_addr, @broadcast, 0x0, 0x0, 'batadv_slave_0\x00', 'ip_vti0\x00'}, 0x0, 0x70, 0x98}, @common=@unspec=@NFQUEUE0={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x2c0) ioctl$USBDEVFS_RESETEP(r0, 0xc0185502, &(0x7f0000000080)) [ 2908.069263][T13198] ? loop_remove+0xa0/0xa0 [ 2908.073648][T13198] do_vfs_ioctl+0x742/0x1720 [ 2908.078220][T13198] ? ioctl_preallocate+0x250/0x250 [ 2908.083305][T13198] ? __fget+0x407/0x490 [ 2908.087430][T13198] ? fget_many+0x20/0x20 [ 2908.091643][T13198] ? debug_smp_processor_id+0x20/0x20 [ 2908.097004][T13198] ? security_file_ioctl+0x7d/0xa0 [ 2908.102087][T13198] __x64_sys_ioctl+0xd4/0x110 [ 2908.106734][T13198] do_syscall_64+0xca/0x1c0 [ 2908.111208][T13198] entry_SYSCALL_64_after_hwframe+0x5c/0xc1 [ 2908.117067][T13198] ---[ end trace a19802151b528bef ]--- 06:55:40 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x802c550a, &(0x7f0000000200)=@urb_type_bulk={0x2, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0}) 06:55:40 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x0) ioctl$USBDEVFS_SUBMITURB(r0, 0x80045505, &(0x7f0000000200)=@urb_type_bulk={0x2, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 06:55:40 executing program 0: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f0000000200)=@urb_type_control={0x2, {0x2}, 0xfffffffb, 0x4, &(0x7f0000000a40)={0x80, 0x16, 0x2005, 0x7, 0x8}, 0x8, 0xf8, 0x7, 0x0, 0x0, 0x0, &(0x7f0000000a80)="cfc206af3b20cc76f92c2426377a243c9d8d6008fafd2fd67138c6b064102eec84099eccfeb5a4b8a5f3f11f2b3a7efc7bb159fd9e2cfe9dfc7021a27eef2f1b8a14ae37ef3f5850a71385fa82e17ca63c6617a30e1bc3576e8ee08aac39ab0a21c7d06379bcc8bd197b3c4706285c7606cc6c43a9f9a4485fa40997c39a4da54d472ef5eb63dbcb91c23e669d6e8836e2269a1d466533236ed3bd"}) 06:55:40 executing program 1: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_RESETEP(r0, 0xc0185502, &(0x7f0000000080)) 06:55:40 executing program 0: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x80085504, &(0x7f0000000200)=@urb_type_bulk={0x2, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 06:55:40 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x80045519, &(0x7f0000000200)=@urb_type_bulk={0x2, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) [ 2908.184202][T13236] usb usb8: usbfs: process 13236 (syz-executor.0) did not claim interface 2 before use [ 2908.215867][T13221] FAULT_INJECTION: forcing a failure. [ 2908.215867][T13221] name failslab, interval 1, probability 0, space 0, times 0 [ 2908.233088][T13221] CPU: 0 PID: 13221 Comm: syz-executor.4 Tainted: G W 5.4.233-syzkaller-00019-gd5ed2ca98e48 #0 [ 2908.244710][T13221] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/14/2023 [ 2908.254744][T13221] Call Trace: [ 2908.258019][T13221] dump_stack+0x1d8/0x241 [ 2908.262322][T13221] ? panic+0x768/0x768 [ 2908.266363][T13221] ? nf_ct_l4proto_log_invalid+0x258/0x258 [ 2908.272145][T13221] should_fail+0x71f/0x880 [ 2908.276535][T13221] ? setup_fault_attr+0x3d0/0x3d0 [ 2908.281534][T13221] ? __kernfs_new_node+0xdb/0x6e0 [ 2908.286527][T13221] should_failslab+0x5/0x20 [ 2908.291005][T13221] kmem_cache_alloc+0x24/0x220 [ 2908.295741][T13221] __kernfs_new_node+0xdb/0x6e0 [ 2908.300565][T13221] ? entry_SYSCALL_64_after_hwframe+0x5c/0xc1 [ 2908.306603][T13221] ? kernfs_new_node+0x160/0x160 [ 2908.311512][T13221] ? stack_trace_save+0x118/0x1c0 [ 2908.316510][T13221] ? stack_trace_snprint+0x170/0x170 [ 2908.321769][T13221] ? stack_trace_save+0x118/0x1c0 [ 2908.326766][T13221] kernfs_create_dir_ns+0x90/0x220 [ 2908.331853][T13221] sysfs_create_dir_ns+0x185/0x390 [ 2908.336938][T13221] ? sysfs_warn_dup+0xa0/0xa0 [ 2908.341587][T13221] ? entry_SYSCALL_64_after_hwframe+0x5c/0xc1 [ 2908.347626][T13221] kobject_add_internal+0x6b7/0xca0 [ 2908.352800][T13221] kobject_add+0x14e/0x210 [ 2908.357212][T13221] ? _raw_spin_lock+0xa4/0x1b0 [ 2908.361967][T13221] ? kobject_init+0x1d0/0x1d0 [ 2908.366615][T13221] ? mutex_unlock+0x18/0x40 [ 2908.371093][T13221] ? get_device_parent+0x293/0x400 [ 2908.376196][T13221] device_add+0x3eb/0xbb0 [ 2908.380508][T13221] device_create_vargs+0x1b9/0x210 [ 2908.385593][T13221] device_create+0xea/0x130 [ 2908.390072][T13221] ? device_create_vargs+0x210/0x210 [ 2908.395336][T13221] ? __percpu_ref_switch_mode+0x36d/0x5b0 [ 2908.401025][T13221] bdi_register_va+0x84/0x600 [ 2908.405673][T13221] bdi_register+0xd1/0x120 [ 2908.410064][T13221] ? __device_add_disk+0x551/0x1220 [ 2908.415232][T13221] ? bdi_register_va+0x600/0x600 [ 2908.420161][T13221] ? percpu_ref_resurrect+0x113/0x190 [ 2908.425508][T13221] bdi_register_owner+0x55/0xf0 [ 2908.430335][T13221] __device_add_disk+0x5d1/0x1220 [ 2908.435333][T13221] ? device_add_disk+0x30/0x30 [ 2908.440071][T13221] ? vsprintf+0x30/0x30 [ 2908.444200][T13221] ? __alloc_disk_node+0x459/0x5a0 [ 2908.449284][T13221] loop_add+0x573/0x740 [ 2908.453414][T13221] loop_control_ioctl+0x448/0x620 [ 2908.458412][T13221] ? loop_remove+0xa0/0xa0 [ 2908.462803][T13221] ? memset+0x1f/0x40 [ 2908.466756][T13221] ? fsnotify+0x1280/0x1340 [ 2908.471230][T13221] ? loop_remove+0xa0/0xa0 [ 2908.475620][T13221] do_vfs_ioctl+0x742/0x1720 [ 2908.480184][T13221] ? ioctl_preallocate+0x250/0x250 [ 2908.485268][T13221] ? __fget+0x407/0x490 [ 2908.489397][T13221] ? fget_many+0x20/0x20 [ 2908.493616][T13221] ? debug_smp_processor_id+0x20/0x20 [ 2908.498963][T13221] ? security_file_ioctl+0x7d/0xa0 [ 2908.504043][T13221] __x64_sys_ioctl+0xd4/0x110 [ 2908.508707][T13221] do_syscall_64+0xca/0x1c0 [ 2908.513191][T13221] entry_SYSCALL_64_after_hwframe+0x5c/0xc1 [ 2908.521737][T13221] kobject_add_internal failed for 7:0 (error: -12 parent: bdi) [ 2908.531378][T13221] ------------[ cut here ]------------ [ 2908.536840][T13221] WARNING: CPU: 0 PID: 13221 at block/genhd.c:742 __device_add_disk+0xea1/0x1220 [ 2908.545911][T13221] Modules linked in: [ 2908.549780][T13221] CPU: 0 PID: 13221 Comm: syz-executor.4 Tainted: G W 5.4.233-syzkaller-00019-gd5ed2ca98e48 #0 [ 2908.561367][T13221] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/14/2023 [ 2908.571404][T13221] RIP: 0010:__device_add_disk+0xea1/0x1220 [ 2908.577177][T13221] Code: ff ff e8 a2 ae 48 ff 0f 0b e9 52 f3 ff ff e8 96 ae 48 ff 0f 0b 42 80 3c 2b 00 0f 85 ac f8 ff ff e9 af f8 ff ff e8 7f ae 48 ff <0f> 0b e9 41 f7 ff ff e8 73 ae 48 ff e9 18 ff ff ff 44 89 f9 80 e1 [ 2908.596750][T13221] RSP: 0018:ffff8881f36c7a20 EFLAGS: 00010246 [ 2908.602783][T13221] RAX: ffffffff821a8fe1 RBX: 00000000fffffff4 RCX: 0000000000040000 [ 2908.610722][T13221] RDX: ffffc9000174f000 RSI: 000000000003ffff RDI: 0000000000040000 [ 2908.618679][T13221] RBP: ffff8881f36c7b58 R08: ffffffff821a871c R09: ffffea0007b71ec0 [ 2908.626640][T13221] R10: ffffffff84600000 R11: dffffc0000000000 R12: ffff8881ca761000 [ 2908.634588][T13221] R13: dffffc0000000000 R14: ffff8881ca761070 R15: 1ffff110394ec29d [ 2908.642529][T13221] FS: 00007f9c67e08700(0000) GS:ffff8881f6e00000(0000) knlGS:0000000000000000 [ 2908.651425][T13221] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 2908.657981][T13221] CR2: 0000555555961728 CR3: 00000001cfa3f000 CR4: 00000000003406f0 [ 2908.665922][T13221] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 2908.673893][T13221] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 2908.681838][T13221] Call Trace: [ 2908.685126][T13221] ? device_add_disk+0x30/0x30 [ 2908.689857][T13221] ? vsprintf+0x30/0x30 [ 2908.693982][T13221] ? __alloc_disk_node+0x459/0x5a0 [ 2908.699071][T13221] loop_add+0x573/0x740 [ 2908.703196][T13221] loop_control_ioctl+0x448/0x620 [ 2908.708188][T13221] ? loop_remove+0xa0/0xa0 [ 2908.712575][T13221] ? memset+0x1f/0x40 [ 2908.716526][T13221] ? fsnotify+0x1280/0x1340 [ 2908.721001][T13221] ? loop_remove+0xa0/0xa0 [ 2908.725386][T13221] do_vfs_ioctl+0x742/0x1720 [ 2908.729947][T13221] ? ioctl_preallocate+0x250/0x250 06:55:41 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) (fail_nth: 49) 06:55:41 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x802c550a, &(0x7f0000000200)=@urb_type_bulk={0x2, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000, 0x0, 0x0, 0x0}) 06:55:41 executing program 1: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_RESETEP(r0, 0xc0185502, &(0x7f0000000080)) 06:55:41 executing program 0: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x80085504, &(0x7f0000000200)=@urb_type_bulk={0x2, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 06:55:41 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040)=@security={'security\x00', 0xe, 0x4, 0x260, 0xffffffff, 0x180, 0xc0, 0xc0, 0xffffffff, 0xffffffff, 0x288, 0x288, 0x288, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x70, 0x98}, @common=@inet=@SET1={0x28}}, {{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@STANDARD={0x28}}, {{@ip={@rand_addr, @broadcast, 0x0, 0x0, 'batadv_slave_0\x00', 'ip_vti0\x00'}, 0x0, 0x70, 0x98}, @common=@unspec=@NFQUEUE0={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x2c0) (async) ioctl$USBDEVFS_RESETEP(r0, 0x80045503, &(0x7f0000000080)) (async) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000300)=@bloom_filter={0x1e, 0x8, 0x35, 0x80, 0x104, 0xffffffffffffffff, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x3, 0x5, 0xc}, 0x48) (async) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000380)=@base={0x9, 0x7, 0x2, 0x6, 0x80, 0xffffffffffffffff, 0x80000001, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x0, 0x4}, 0x48) (async) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x1, 0x9, 0x6, 0x8906, 0x0, 0x1}, 0x48) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r3, 0x89f0, 0x0) (async) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x1, 0x9, 0x6, 0x8906, 0x0, 0x1}, 0x48) (async) socketpair(0x2c, 0xa, 0x46, &(0x7f0000000680)={0xffffffffffffffff}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000006c0)={0xffffffffffffffff}) sendmsg$NBD_CMD_RECONFIGURE(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f0000000640)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000007c0)={&(0x7f0000000700)={0x90, 0x0, 0x300, 0x70bd2a, 0x25dfdbfe, {}, [@NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x8}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x120}, @NBD_ATTR_TIMEOUT={0xc, 0x4, 0x100000000000}, @NBD_ATTR_SOCKETS={0x44, 0x7, 0x0, 0x1, [{0x8}, {0x8, 0x1, r5}, {0x8}, {0x8}, {0x8}, {0x8}, {0x8, 0x1, r6}, {0x8}]}, @NBD_ATTR_BACKEND_IDENTIFIER={0xc, 0xa, 'ip_vti0\x00'}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}]}, 0x90}, 0x1, 0x0, 0x0, 0x44010}, 0x80) (async) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r4, 0x89f0, 0x0) (async) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x1, 0x9, 0x6, 0x8906, 0x0, 0x1}, 0x48) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r7, 0x89f0, 0x0) (async) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000500)=@base={0x6, 0xcc8a, 0x5, 0x3, 0x2, 0xffffffffffffffff, 0x861, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x5, 0x2}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0xf, 0x8, &(0x7f0000000400)=@raw=[@map_fd={0x18, 0x3, 0x1, 0x0, r1}, @ldst={0x2, 0x3, 0x2, 0x2, 0xa, 0xc, 0xffffffffffffffff}, @map_val={0x18, 0x7, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x8}, @btf_id={0x18, 0xa, 0x3, 0x0, 0x1}, @jmp={0x5, 0x1, 0xb, 0x2, 0xa, 0x20, 0x1}], &(0x7f0000000440)='GPL\x00', 0x5, 0x0, 0x0, 0x40f00, 0x14, '\x00', 0x0, 0x1a, 0xffffffffffffffff, 0x8, &(0x7f0000000480)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000004c0)={0x4, 0x5, 0xfffffffa}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000580)=[0xffffffffffffffff, r3, 0x1, r4, 0xffffffffffffffff, r7, r8]}, 0x80) 06:55:41 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x80045519, &(0x7f0000000200)=@urb_type_bulk={0x2, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) [ 2908.735040][T13221] ? __fget+0x407/0x490 [ 2908.739181][T13221] ? fget_many+0x20/0x20 [ 2908.743393][T13221] ? debug_smp_processor_id+0x20/0x20 [ 2908.748733][T13221] ? security_file_ioctl+0x7d/0xa0 [ 2908.753836][T13221] __x64_sys_ioctl+0xd4/0x110 [ 2908.758483][T13221] do_syscall_64+0xca/0x1c0 [ 2908.762959][T13221] entry_SYSCALL_64_after_hwframe+0x5c/0xc1 [ 2908.768819][T13221] ---[ end trace a19802151b528bf0 ]--- 06:55:41 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x80045519, &(0x7f0000000200)=@urb_type_bulk={0x2, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 06:55:41 executing program 1: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_RESETEP(r0, 0xc0185502, &(0x7f0000000080)) 06:55:41 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x802c550a, &(0x7f0000000200)=@urb_type_bulk={0x2, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff0bdbe, 0x0, 0x0, 0x0}) 06:55:41 executing program 0: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x80085504, &(0x7f0000000200)=@urb_type_bulk={0x2, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) [ 2908.793977][T13250] usb usb8: usbfs: process 13250 (syz-executor.0) did not claim interface 2 before use [ 2908.829388][T13246] FAULT_INJECTION: forcing a failure. [ 2908.829388][T13246] name failslab, interval 1, probability 0, space 0, times 0 [ 2908.854229][T13246] CPU: 0 PID: 13246 Comm: syz-executor.4 Tainted: G W 5.4.233-syzkaller-00019-gd5ed2ca98e48 #0 [ 2908.863547][T13263] usb usb8: usbfs: process 13263 (syz-executor.0) did not claim interface 2 before use [ 2908.865864][T13246] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/14/2023 [ 2908.885504][T13246] Call Trace: [ 2908.888786][T13246] dump_stack+0x1d8/0x241 [ 2908.893092][T13246] ? panic+0x768/0x768 [ 2908.897130][T13246] ? nf_ct_l4proto_log_invalid+0x258/0x258 [ 2908.902904][T13246] should_fail+0x71f/0x880 [ 2908.907334][T13246] ? setup_fault_attr+0x3d0/0x3d0 [ 2908.912351][T13246] ? __kernfs_new_node+0xdb/0x6e0 [ 2908.917346][T13246] should_failslab+0x5/0x20 [ 2908.921821][T13246] kmem_cache_alloc+0x24/0x220 [ 2908.926555][T13246] __kernfs_new_node+0xdb/0x6e0 [ 2908.931383][T13246] ? entry_SYSCALL_64_after_hwframe+0x5c/0xc1 [ 2908.937417][T13246] ? kernfs_new_node+0x160/0x160 [ 2908.942343][T13246] ? stack_trace_save+0x118/0x1c0 [ 2908.947339][T13246] ? stack_trace_snprint+0x170/0x170 [ 2908.952589][T13246] ? stack_trace_save+0x118/0x1c0 [ 2908.957581][T13246] kernfs_create_dir_ns+0x90/0x220 [ 2908.962663][T13246] sysfs_create_dir_ns+0x185/0x390 [ 2908.967742][T13246] ? sysfs_warn_dup+0xa0/0xa0 [ 2908.972388][T13246] ? entry_SYSCALL_64_after_hwframe+0x5c/0xc1 [ 2908.978439][T13246] kobject_add_internal+0x6b7/0xca0 [ 2908.983611][T13246] kobject_add+0x14e/0x210 [ 2908.987996][T13246] ? _raw_spin_lock+0xa4/0x1b0 [ 2908.992726][T13246] ? kobject_init+0x1d0/0x1d0 [ 2908.997374][T13246] ? mutex_unlock+0x18/0x40 [ 2909.001843][T13246] ? get_device_parent+0x293/0x400 [ 2909.006923][T13246] device_add+0x3eb/0xbb0 [ 2909.011223][T13246] device_create_vargs+0x1b9/0x210 [ 2909.016321][T13246] device_create+0xea/0x130 [ 2909.020795][T13246] ? device_create_vargs+0x210/0x210 [ 2909.026051][T13246] ? __percpu_ref_switch_mode+0x36d/0x5b0 [ 2909.031737][T13246] bdi_register_va+0x84/0x600 [ 2909.036384][T13246] bdi_register+0xd1/0x120 [ 2909.040770][T13246] ? __device_add_disk+0x551/0x1220 [ 2909.045936][T13246] ? bdi_register_va+0x600/0x600 [ 2909.050844][T13246] ? percpu_ref_resurrect+0x113/0x190 [ 2909.056188][T13246] bdi_register_owner+0x55/0xf0 [ 2909.061017][T13246] __device_add_disk+0x5d1/0x1220 [ 2909.066011][T13246] ? device_add_disk+0x30/0x30 [ 2909.070747][T13246] ? vsprintf+0x30/0x30 [ 2909.074873][T13246] ? __alloc_disk_node+0x459/0x5a0 [ 2909.079986][T13246] loop_add+0x573/0x740 [ 2909.084112][T13246] loop_control_ioctl+0x448/0x620 [ 2909.089105][T13246] ? loop_remove+0xa0/0xa0 [ 2909.093491][T13246] ? memset+0x1f/0x40 [ 2909.097441][T13246] ? fsnotify+0x1280/0x1340 [ 2909.101911][T13246] ? loop_remove+0xa0/0xa0 [ 2909.106294][T13246] do_vfs_ioctl+0x742/0x1720 [ 2909.110854][T13246] ? ioctl_preallocate+0x250/0x250 [ 2909.115933][T13246] ? __fget+0x407/0x490 [ 2909.120057][T13246] ? fget_many+0x20/0x20 [ 2909.124274][T13246] ? debug_smp_processor_id+0x20/0x20 [ 2909.129624][T13246] ? security_file_ioctl+0x7d/0xa0 [ 2909.134701][T13246] __x64_sys_ioctl+0xd4/0x110 [ 2909.139350][T13246] do_syscall_64+0xca/0x1c0 [ 2909.143824][T13246] entry_SYSCALL_64_after_hwframe+0x5c/0xc1 06:55:41 executing program 3: ioctl$USBDEVFS_SUBMITURB(0xffffffffffffffff, 0x80045519, &(0x7f0000000200)=@urb_type_bulk={0x2, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 06:55:41 executing program 1: setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040)=@security={'security\x00', 0xe, 0x4, 0x260, 0xffffffff, 0x180, 0xc0, 0xc0, 0xffffffff, 0xffffffff, 0x288, 0x288, 0x288, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x70, 0x98}, @common=@inet=@SET1={0x28}}, {{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@STANDARD={0x28}}, {{@ip={@rand_addr, @broadcast, 0x0, 0x0, 'batadv_slave_0\x00', 'ip_vti0\x00'}, 0x0, 0x70, 0x98}, @common=@unspec=@NFQUEUE0={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x2c0) ioctl$USBDEVFS_RESETEP(0xffffffffffffffff, 0xc0185502, &(0x7f0000000080)) [ 2909.153068][T13246] kobject_add_internal failed for 7:0 (error: -12 parent: bdi) [ 2909.161282][T13246] ------------[ cut here ]------------ [ 2909.166752][T13246] WARNING: CPU: 1 PID: 13246 at block/genhd.c:742 __device_add_disk+0xea1/0x1220 [ 2909.175832][T13246] Modules linked in: [ 2909.179724][T13246] CPU: 1 PID: 13246 Comm: syz-executor.4 Tainted: G W 5.4.233-syzkaller-00019-gd5ed2ca98e48 #0 [ 2909.191325][T13246] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/14/2023 [ 2909.201388][T13246] RIP: 0010:__device_add_disk+0xea1/0x1220 [ 2909.207175][T13246] Code: ff ff e8 a2 ae 48 ff 0f 0b e9 52 f3 ff ff e8 96 ae 48 ff 0f 0b 42 80 3c 2b 00 0f 85 ac f8 ff ff e9 af f8 ff ff e8 7f ae 48 ff <0f> 0b e9 41 f7 ff ff e8 73 ae 48 ff e9 18 ff ff ff 44 89 f9 80 e1 [ 2909.226835][T13246] RSP: 0018:ffff8881ea50fa20 EFLAGS: 00010246 [ 2909.232873][T13246] RAX: ffffffff821a8fe1 RBX: 00000000fffffff4 RCX: 0000000000040000 [ 2909.240820][T13246] RDX: ffffc9000174f000 RSI: 000000000003ffff RDI: 0000000000040000 [ 2909.248772][T13246] RBP: ffff8881ea50fb58 R08: ffffffff821a871c R09: ffffea0007b4ae00 [ 2909.256715][T13246] R10: ffffffff84600000 R11: dffffc0000000000 R12: ffff8881cfe5e000 [ 2909.264661][T13246] R13: dffffc0000000000 R14: ffff8881cfe5e070 R15: 1ffff11039fcbc9d [ 2909.272619][T13246] FS: 00007f9c67e08700(0000) GS:ffff8881f6f00000(0000) knlGS:0000000000000000 [ 2909.281521][T13246] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 2909.288096][T13246] CR2: 00007f8a04d7459c CR3: 00000001e8a19000 CR4: 00000000003406e0 [ 2909.296049][T13246] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 2909.303995][T13246] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 2909.311936][T13246] Call Trace: [ 2909.315205][T13246] ? device_add_disk+0x30/0x30 [ 2909.319943][T13246] ? vsprintf+0x30/0x30 [ 2909.324077][T13246] ? __alloc_disk_node+0x459/0x5a0 [ 2909.329160][T13246] loop_add+0x573/0x740 [ 2909.333287][T13246] loop_control_ioctl+0x448/0x620 [ 2909.338283][T13246] ? loop_remove+0xa0/0xa0 [ 2909.342671][T13246] ? memset+0x1f/0x40 [ 2909.346621][T13246] ? fsnotify+0x1280/0x1340 [ 2909.351091][T13246] ? loop_remove+0xa0/0xa0 06:55:42 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) (fail_nth: 50) 06:55:42 executing program 0: ioctl$USBDEVFS_SUBMITURB(0xffffffffffffffff, 0x80085504, &(0x7f0000000200)=@urb_type_bulk={0x2, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 06:55:42 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x802c550a, &(0x7f0000000200)=@urb_type_bulk={0x2, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbebdf07f, 0x0, 0x0, 0x0}) 06:55:42 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000300), 0x76, 0x8101) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040)=@security={'security\x00', 0xe, 0x4, 0x260, 0xffffffff, 0x180, 0xc0, 0xc0, 0xffffffff, 0xffffffff, 0x288, 0x288, 0x288, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x70, 0x98}, @common=@inet=@SET1={0x28}}, {{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@STANDARD={0x28}}, {{@ip={@rand_addr, @broadcast, 0x0, 0x0, 'batadv_slave_0\x00', 'ip_vti0\x00'}, 0x0, 0x70, 0x98}, @common=@unspec=@NFQUEUE0={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x2c0) ioctl$USBDEVFS_RESETEP(r0, 0x80045503, &(0x7f0000000080)) 06:55:42 executing program 1: setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040)=@security={'security\x00', 0xe, 0x4, 0x260, 0xffffffff, 0x180, 0xc0, 0xc0, 0xffffffff, 0xffffffff, 0x288, 0x288, 0x288, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x70, 0x98}, @common=@inet=@SET1={0x28}}, {{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@STANDARD={0x28}}, {{@ip={@rand_addr, @broadcast, 0x0, 0x0, 'batadv_slave_0\x00', 'ip_vti0\x00'}, 0x0, 0x70, 0x98}, @common=@unspec=@NFQUEUE0={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x2c0) ioctl$USBDEVFS_RESETEP(0xffffffffffffffff, 0xc0185502, &(0x7f0000000080)) 06:55:42 executing program 3: ioctl$USBDEVFS_SUBMITURB(0xffffffffffffffff, 0x80045519, &(0x7f0000000200)=@urb_type_bulk={0x2, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 06:55:42 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000300), 0x76, 0x8101) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040)=@security={'security\x00', 0xe, 0x4, 0x260, 0xffffffff, 0x180, 0xc0, 0xc0, 0xffffffff, 0xffffffff, 0x288, 0x288, 0x288, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x70, 0x98}, @common=@inet=@SET1={0x28}}, {{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@STANDARD={0x28}}, {{@ip={@rand_addr, @broadcast, 0x0, 0x0, 'batadv_slave_0\x00', 'ip_vti0\x00'}, 0x0, 0x70, 0x98}, @common=@unspec=@NFQUEUE0={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x2c0) (async) ioctl$USBDEVFS_RESETEP(r0, 0x80045503, &(0x7f0000000080)) [ 2909.355480][T13246] do_vfs_ioctl+0x742/0x1720 [ 2909.360080][T13246] ? ioctl_preallocate+0x250/0x250 [ 2909.365175][T13246] ? __fget+0x407/0x490 [ 2909.369331][T13246] ? fget_many+0x20/0x20 [ 2909.373542][T13246] ? debug_smp_processor_id+0x20/0x20 [ 2909.378899][T13246] ? security_file_ioctl+0x7d/0xa0 [ 2909.384002][T13246] __x64_sys_ioctl+0xd4/0x110 [ 2909.388656][T13246] do_syscall_64+0xca/0x1c0 [ 2909.393128][T13246] entry_SYSCALL_64_after_hwframe+0x5c/0xc1 [ 2909.398986][T13246] ---[ end trace a19802151b528bf1 ]--- 06:55:42 executing program 0: ioctl$USBDEVFS_SUBMITURB(0xffffffffffffffff, 0x80085504, &(0x7f0000000200)=@urb_type_bulk={0x2, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 06:55:42 executing program 3: ioctl$USBDEVFS_SUBMITURB(0xffffffffffffffff, 0x80045519, &(0x7f0000000200)=@urb_type_bulk={0x2, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 06:55:42 executing program 1: setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040)=@security={'security\x00', 0xe, 0x4, 0x260, 0xffffffff, 0x180, 0xc0, 0xc0, 0xffffffff, 0xffffffff, 0x288, 0x288, 0x288, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x70, 0x98}, @common=@inet=@SET1={0x28}}, {{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@STANDARD={0x28}}, {{@ip={@rand_addr, @broadcast, 0x0, 0x0, 'batadv_slave_0\x00', 'ip_vti0\x00'}, 0x0, 0x70, 0x98}, @common=@unspec=@NFQUEUE0={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x2c0) ioctl$USBDEVFS_RESETEP(0xffffffffffffffff, 0xc0185502, &(0x7f0000000080)) 06:55:42 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x802c550a, &(0x7f0000000200)=@urb_type_bulk={0x2, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 06:55:42 executing program 3: r0 = syz_open_dev$usbfs(0x0, 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x80045519, &(0x7f0000000200)=@urb_type_bulk={0x2, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) [ 2909.470771][T13279] FAULT_INJECTION: forcing a failure. [ 2909.470771][T13279] name failslab, interval 1, probability 0, space 0, times 0 [ 2909.483863][T13279] CPU: 1 PID: 13279 Comm: syz-executor.4 Tainted: G W 5.4.233-syzkaller-00019-gd5ed2ca98e48 #0 [ 2909.495465][T13279] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/14/2023 [ 2909.505499][T13279] Call Trace: [ 2909.508768][T13279] dump_stack+0x1d8/0x241 [ 2909.513073][T13279] ? panic+0x768/0x768 [ 2909.517127][T13279] ? nf_ct_l4proto_log_invalid+0x258/0x258 [ 2909.522909][T13279] ? _raw_spin_lock+0xa4/0x1b0 [ 2909.527652][T13279] should_fail+0x71f/0x880 [ 2909.532064][T13279] ? security_kernfs_init_security+0x75/0x90 [ 2909.538014][T13279] ? setup_fault_attr+0x3d0/0x3d0 [ 2909.543006][T13279] ? mutex_lock+0xa5/0x110 [ 2909.547390][T13279] ? __kernfs_new_node+0xdb/0x6e0 [ 2909.552381][T13279] should_failslab+0x5/0x20 [ 2909.556853][T13279] kmem_cache_alloc+0x24/0x220 [ 2909.561591][T13279] __kernfs_new_node+0xdb/0x6e0 [ 2909.566412][T13279] ? mutex_unlock+0x18/0x40 [ 2909.570884][T13279] ? kernfs_new_node+0x160/0x160 [ 2909.575795][T13279] ? __kernfs_create_file+0x1f4/0x260 [ 2909.581136][T13279] ? sysfs_add_file_mode_ns+0x292/0x340 [ 2909.586650][T13279] kernfs_new_node+0x95/0x160 [ 2909.591294][T13279] kernfs_create_link+0x9e/0x1f0 [ 2909.596209][T13279] sysfs_do_create_link_sd+0x85/0x100 [ 2909.601549][T13279] device_add_class_symlinks+0xd6/0x2a0 [ 2909.607063][T13279] device_add+0x4d3/0xbb0 [ 2909.611371][T13279] device_create_vargs+0x1b9/0x210 [ 2909.616453][T13279] device_create+0xea/0x130 [ 2909.620925][T13279] ? device_create_vargs+0x210/0x210 [ 2909.626202][T13279] ? __percpu_ref_switch_mode+0x36d/0x5b0 [ 2909.631898][T13279] bdi_register_va+0x84/0x600 [ 2909.636547][T13279] bdi_register+0xd1/0x120 [ 2909.640935][T13279] ? __device_add_disk+0x551/0x1220 [ 2909.646099][T13279] ? bdi_register_va+0x600/0x600 [ 2909.651007][T13279] ? percpu_ref_resurrect+0x113/0x190 [ 2909.656435][T13279] bdi_register_owner+0x55/0xf0 [ 2909.661255][T13279] __device_add_disk+0x5d1/0x1220 [ 2909.666248][T13279] ? device_add_disk+0x30/0x30 [ 2909.670980][T13279] ? vsprintf+0x30/0x30 [ 2909.675106][T13279] ? __alloc_disk_node+0x459/0x5a0 [ 2909.680191][T13279] loop_add+0x573/0x740 [ 2909.684345][T13279] loop_control_ioctl+0x448/0x620 [ 2909.689355][T13279] ? loop_remove+0xa0/0xa0 [ 2909.693740][T13279] ? memset+0x1f/0x40 [ 2909.697692][T13279] ? fsnotify+0x1280/0x1340 [ 2909.702162][T13279] ? loop_remove+0xa0/0xa0 [ 2909.706562][T13279] do_vfs_ioctl+0x742/0x1720 [ 2909.711121][T13279] ? ioctl_preallocate+0x250/0x250 [ 2909.716223][T13279] ? __fget+0x407/0x490 [ 2909.720349][T13279] ? fget_many+0x20/0x20 [ 2909.724560][T13279] ? debug_smp_processor_id+0x20/0x20 [ 2909.729898][T13279] ? security_file_ioctl+0x7d/0xa0 [ 2909.734994][T13279] __x64_sys_ioctl+0xd4/0x110 [ 2909.739641][T13279] do_syscall_64+0xca/0x1c0 [ 2909.744117][T13279] entry_SYSCALL_64_after_hwframe+0x5c/0xc1 [ 2909.751962][T13279] ------------[ cut here ]------------ [ 2909.757439][T13279] WARNING: CPU: 1 PID: 13279 at block/genhd.c:742 __device_add_disk+0xea1/0x1220 [ 2909.766507][T13279] Modules linked in: [ 2909.770397][T13279] CPU: 1 PID: 13279 Comm: syz-executor.4 Tainted: G W 5.4.233-syzkaller-00019-gd5ed2ca98e48 #0 [ 2909.781983][T13279] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/14/2023 [ 2909.792014][T13279] RIP: 0010:__device_add_disk+0xea1/0x1220 [ 2909.797788][T13279] Code: ff ff e8 a2 ae 48 ff 0f 0b e9 52 f3 ff ff e8 96 ae 48 ff 0f 0b 42 80 3c 2b 00 0f 85 ac f8 ff ff e9 af f8 ff ff e8 7f ae 48 ff <0f> 0b e9 41 f7 ff ff e8 73 ae 48 ff e9 18 ff ff ff 44 89 f9 80 e1 [ 2909.817362][T13279] RSP: 0018:ffff8881e585fa20 EFLAGS: 00010246 [ 2909.823417][T13279] RAX: ffffffff821a8fe1 RBX: 00000000fffffff4 RCX: 0000000000040000 [ 2909.831361][T13279] RDX: ffffc9000174f000 RSI: 000000000003ffff RDI: 0000000000040000 [ 2909.839300][T13279] RBP: ffff8881e585fb58 R08: ffffffff821a871c R09: ffffea000729bf80 [ 2909.847258][T13279] R10: ffffffff84600000 R11: dffffc0000000000 R12: ffff8881d2d22000 [ 2909.855205][T13279] R13: dffffc0000000000 R14: ffff8881d2d22070 R15: 1ffff1103a5a449d [ 2909.863151][T13279] FS: 00007f9c67e08700(0000) GS:ffff8881f6f00000(0000) knlGS:0000000000000000 [ 2909.872051][T13279] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 2909.878605][T13279] CR2: 00007f9c67e07ff8 CR3: 00000001ede2c000 CR4: 00000000003406e0 [ 2909.886552][T13279] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 2909.894496][T13279] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 2909.902437][T13279] Call Trace: [ 2909.905703][T13279] ? device_add_disk+0x30/0x30 [ 2909.910439][T13279] ? vsprintf+0x30/0x30 [ 2909.914591][T13279] ? __alloc_disk_node+0x459/0x5a0 [ 2909.919677][T13279] loop_add+0x573/0x740 [ 2909.923805][T13279] loop_control_ioctl+0x448/0x620 [ 2909.928819][T13279] ? loop_remove+0xa0/0xa0 [ 2909.933207][T13279] ? memset+0x1f/0x40 [ 2909.937168][T13279] ? fsnotify+0x1280/0x1340 [ 2909.941660][T13279] ? loop_remove+0xa0/0xa0 [ 2909.946063][T13279] do_vfs_ioctl+0x742/0x1720 [ 2909.950625][T13279] ? ioctl_preallocate+0x250/0x250 [ 2909.955706][T13279] ? __fget+0x407/0x490 [ 2909.959832][T13279] ? fget_many+0x20/0x20 [ 2909.964062][T13279] ? debug_smp_processor_id+0x20/0x20 06:55:42 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) (fail_nth: 51) 06:55:42 executing program 0: ioctl$USBDEVFS_SUBMITURB(0xffffffffffffffff, 0x80085504, &(0x7f0000000200)=@urb_type_bulk={0x2, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 06:55:42 executing program 1: r0 = syz_open_dev$usbfs(0x0, 0x76, 0x8101) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040)=@security={'security\x00', 0xe, 0x4, 0x260, 0xffffffff, 0x180, 0xc0, 0xc0, 0xffffffff, 0xffffffff, 0x288, 0x288, 0x288, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x70, 0x98}, @common=@inet=@SET1={0x28}}, {{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@STANDARD={0x28}}, {{@ip={@rand_addr, @broadcast, 0x0, 0x0, 'batadv_slave_0\x00', 'ip_vti0\x00'}, 0x0, 0x70, 0x98}, @common=@unspec=@NFQUEUE0={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x2c0) ioctl$USBDEVFS_RESETEP(r0, 0xc0185502, &(0x7f0000000080)) 06:55:42 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x802c550a, &(0x7f0000000200)=@urb_type_bulk={0x2, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0}) 06:55:42 executing program 3: r0 = syz_open_dev$usbfs(0x0, 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x80045519, &(0x7f0000000200)=@urb_type_bulk={0x2, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 06:55:42 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000300), 0x76, 0x8101) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040)=@security={'security\x00', 0xe, 0x4, 0x260, 0xffffffff, 0x180, 0xc0, 0xc0, 0xffffffff, 0xffffffff, 0x288, 0x288, 0x288, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x70, 0x98}, @common=@inet=@SET1={0x28}}, {{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@STANDARD={0x28}}, {{@ip={@rand_addr, @broadcast, 0x0, 0x0, 'batadv_slave_0\x00', 'ip_vti0\x00'}, 0x0, 0x70, 0x98}, @common=@unspec=@NFQUEUE0={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x2c0) (async) ioctl$USBDEVFS_RESETEP(r0, 0x80045503, &(0x7f0000000080)) 06:55:42 executing program 1: r0 = syz_open_dev$usbfs(0x0, 0x76, 0x8101) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040)=@security={'security\x00', 0xe, 0x4, 0x260, 0xffffffff, 0x180, 0xc0, 0xc0, 0xffffffff, 0xffffffff, 0x288, 0x288, 0x288, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x70, 0x98}, @common=@inet=@SET1={0x28}}, {{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@STANDARD={0x28}}, {{@ip={@rand_addr, @broadcast, 0x0, 0x0, 'batadv_slave_0\x00', 'ip_vti0\x00'}, 0x0, 0x70, 0x98}, @common=@unspec=@NFQUEUE0={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x2c0) ioctl$USBDEVFS_RESETEP(r0, 0xc0185502, &(0x7f0000000080)) 06:55:42 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x802c550a, &(0x7f0000000200)=@urb_type_bulk={0x2, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0}) [ 2909.969422][T13279] ? security_file_ioctl+0x7d/0xa0 [ 2909.974503][T13279] __x64_sys_ioctl+0xd4/0x110 [ 2909.979149][T13279] do_syscall_64+0xca/0x1c0 [ 2909.983621][T13279] entry_SYSCALL_64_after_hwframe+0x5c/0xc1 [ 2909.989481][T13279] ---[ end trace a19802151b528bf2 ]--- 06:55:42 executing program 3: r0 = syz_open_dev$usbfs(0x0, 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x80045519, &(0x7f0000000200)=@urb_type_bulk={0x2, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 06:55:42 executing program 0: r0 = syz_open_dev$usbfs(0x0, 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x80085504, &(0x7f0000000200)=@urb_type_bulk={0x2, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 06:55:42 executing program 1: r0 = syz_open_dev$usbfs(0x0, 0x76, 0x8101) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040)=@security={'security\x00', 0xe, 0x4, 0x260, 0xffffffff, 0x180, 0xc0, 0xc0, 0xffffffff, 0xffffffff, 0x288, 0x288, 0x288, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x70, 0x98}, @common=@inet=@SET1={0x28}}, {{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@STANDARD={0x28}}, {{@ip={@rand_addr, @broadcast, 0x0, 0x0, 'batadv_slave_0\x00', 'ip_vti0\x00'}, 0x0, 0x70, 0x98}, @common=@unspec=@NFQUEUE0={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x2c0) ioctl$USBDEVFS_RESETEP(r0, 0xc0185502, &(0x7f0000000080)) 06:55:42 executing program 0: r0 = syz_open_dev$usbfs(0x0, 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x80085504, &(0x7f0000000200)=@urb_type_bulk={0x2, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) [ 2910.067266][T13301] FAULT_INJECTION: forcing a failure. [ 2910.067266][T13301] name failslab, interval 1, probability 0, space 0, times 0 [ 2910.080818][T13301] CPU: 0 PID: 13301 Comm: syz-executor.4 Tainted: G W 5.4.233-syzkaller-00019-gd5ed2ca98e48 #0 [ 2910.092542][T13301] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/14/2023 [ 2910.102571][T13301] Call Trace: [ 2910.105835][T13301] dump_stack+0x1d8/0x241 [ 2910.110131][T13301] ? panic+0x768/0x768 [ 2910.114168][T13301] ? nf_ct_l4proto_log_invalid+0x258/0x258 [ 2910.119944][T13301] ? mutex_unlock+0x18/0x40 [ 2910.124416][T13301] ? kernfs_xattr_get+0x81/0x90 [ 2910.129252][T13301] should_fail+0x71f/0x880 [ 2910.133637][T13301] ? setup_fault_attr+0x3d0/0x3d0 [ 2910.138629][T13301] ? idr_alloc+0x2f0/0x2f0 [ 2910.143017][T13301] ? __kernfs_new_node+0x99/0x6e0 [ 2910.148010][T13301] should_failslab+0x5/0x20 [ 2910.152507][T13301] __kmalloc_track_caller+0x4f/0x290 [ 2910.157773][T13301] kstrdup_const+0x51/0x90 [ 2910.162159][T13301] __kernfs_new_node+0x99/0x6e0 [ 2910.166979][T13301] ? kernfs_new_node+0x160/0x160 [ 2910.171883][T13301] ? mutex_lock+0xa5/0x110 [ 2910.176268][T13301] ? mutex_trylock+0xa0/0xa0 [ 2910.180829][T13301] ? kernfs_activate+0x2fe/0x320 [ 2910.185751][T13301] kernfs_new_node+0x95/0x160 [ 2910.190401][T13301] kernfs_create_link+0x9e/0x1f0 [ 2910.195324][T13301] sysfs_do_create_link_sd+0x85/0x100 [ 2910.200673][T13301] device_add_class_symlinks+0x211/0x2a0 [ 2910.206275][T13301] device_add+0x4d3/0xbb0 [ 2910.210595][T13301] device_create_vargs+0x1b9/0x210 [ 2910.215674][T13301] device_create+0xea/0x130 [ 2910.220147][T13301] ? device_create_vargs+0x210/0x210 [ 2910.225422][T13301] ? __percpu_ref_switch_mode+0x36d/0x5b0 [ 2910.231113][T13301] bdi_register_va+0x84/0x600 [ 2910.235758][T13301] bdi_register+0xd1/0x120 [ 2910.240144][T13301] ? __device_add_disk+0x551/0x1220 [ 2910.245309][T13301] ? bdi_register_va+0x600/0x600 [ 2910.250216][T13301] ? percpu_ref_resurrect+0x113/0x190 [ 2910.255559][T13301] bdi_register_owner+0x55/0xf0 [ 2910.260395][T13301] __device_add_disk+0x5d1/0x1220 [ 2910.265391][T13301] ? device_add_disk+0x30/0x30 [ 2910.270122][T13301] ? vsprintf+0x30/0x30 [ 2910.274249][T13301] ? __alloc_disk_node+0x459/0x5a0 [ 2910.279337][T13301] loop_add+0x573/0x740 [ 2910.283460][T13301] loop_control_ioctl+0x448/0x620 [ 2910.288452][T13301] ? loop_remove+0xa0/0xa0 [ 2910.292837][T13301] ? memset+0x1f/0x40 [ 2910.296787][T13301] ? fsnotify+0x1280/0x1340 [ 2910.301263][T13301] ? loop_remove+0xa0/0xa0 [ 2910.305647][T13301] do_vfs_ioctl+0x742/0x1720 [ 2910.310227][T13301] ? ioctl_preallocate+0x250/0x250 [ 2910.315322][T13301] ? __fget+0x407/0x490 [ 2910.319453][T13301] ? fget_many+0x20/0x20 [ 2910.323670][T13301] ? debug_smp_processor_id+0x20/0x20 [ 2910.329015][T13301] ? security_file_ioctl+0x7d/0xa0 [ 2910.334097][T13301] __x64_sys_ioctl+0xd4/0x110 [ 2910.338744][T13301] do_syscall_64+0xca/0x1c0 [ 2910.343219][T13301] entry_SYSCALL_64_after_hwframe+0x5c/0xc1 [ 2910.351296][T13301] ------------[ cut here ]------------ [ 2910.356759][T13301] WARNING: CPU: 0 PID: 13301 at block/genhd.c:742 __device_add_disk+0xea1/0x1220 [ 2910.365829][T13301] Modules linked in: [ 2910.369695][T13301] CPU: 0 PID: 13301 Comm: syz-executor.4 Tainted: G W 5.4.233-syzkaller-00019-gd5ed2ca98e48 #0 [ 2910.381283][T13301] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/14/2023 [ 2910.391314][T13301] RIP: 0010:__device_add_disk+0xea1/0x1220 [ 2910.397090][T13301] Code: ff ff e8 a2 ae 48 ff 0f 0b e9 52 f3 ff ff e8 96 ae 48 ff 0f 0b 42 80 3c 2b 00 0f 85 ac f8 ff ff e9 af f8 ff ff e8 7f ae 48 ff <0f> 0b e9 41 f7 ff ff e8 73 ae 48 ff e9 18 ff ff ff 44 89 f9 80 e1 [ 2910.416659][T13301] RSP: 0018:ffff8881e18c7a20 EFLAGS: 00010246 [ 2910.422690][T13301] RAX: ffffffff821a8fe1 RBX: 00000000fffffff4 RCX: 0000000000040000 [ 2910.430656][T13301] RDX: ffffc9000174f000 RSI: 000000000003ffff RDI: 0000000000040000 [ 2910.438604][T13301] RBP: ffff8881e18c7b58 R08: ffffffff821a871c R09: ffffea0007a2c100 [ 2910.446553][T13301] R10: ffffffff84600000 R11: dffffc0000000000 R12: ffff8881e4228000 [ 2910.454496][T13301] R13: dffffc0000000000 R14: ffff8881e4228070 R15: 1ffff1103c84509d [ 2910.462456][T13301] FS: 00007f9c67e08700(0000) GS:ffff8881f6e00000(0000) knlGS:0000000000000000 [ 2910.471358][T13301] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 2910.477928][T13301] CR2: 00007f78e70c2718 CR3: 00000001e1de4000 CR4: 00000000003406f0 [ 2910.485871][T13301] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 2910.494002][T13301] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 2910.501946][T13301] Call Trace: [ 2910.505214][T13301] ? device_add_disk+0x30/0x30 [ 2910.509962][T13301] ? vsprintf+0x30/0x30 [ 2910.514089][T13301] ? __alloc_disk_node+0x459/0x5a0 [ 2910.519171][T13301] loop_add+0x573/0x740 [ 2910.523299][T13301] loop_control_ioctl+0x448/0x620 [ 2910.528296][T13301] ? loop_remove+0xa0/0xa0 [ 2910.532701][T13301] ? memset+0x1f/0x40 [ 2910.536652][T13301] ? fsnotify+0x1280/0x1340 [ 2910.541122][T13301] ? loop_remove+0xa0/0xa0 [ 2910.545509][T13301] do_vfs_ioctl+0x742/0x1720 [ 2910.550072][T13301] ? ioctl_preallocate+0x250/0x250 [ 2910.555154][T13301] ? __fget+0x407/0x490 [ 2910.559293][T13301] ? fget_many+0x20/0x20 [ 2910.563506][T13301] ? debug_smp_processor_id+0x20/0x20 06:55:43 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) (fail_nth: 52) 06:55:43 executing program 1: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x0, 0x8101) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040)=@security={'security\x00', 0xe, 0x4, 0x260, 0xffffffff, 0x180, 0xc0, 0xc0, 0xffffffff, 0xffffffff, 0x288, 0x288, 0x288, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x70, 0x98}, @common=@inet=@SET1={0x28}}, {{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@STANDARD={0x28}}, {{@ip={@rand_addr, @broadcast, 0x0, 0x0, 'batadv_slave_0\x00', 'ip_vti0\x00'}, 0x0, 0x70, 0x98}, @common=@unspec=@NFQUEUE0={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x2c0) ioctl$USBDEVFS_RESETEP(r0, 0xc0185502, &(0x7f0000000080)) 06:55:43 executing program 0: r0 = syz_open_dev$usbfs(0x0, 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x80085504, &(0x7f0000000200)=@urb_type_bulk={0x2, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 06:55:43 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x802c550a, &(0x7f0000000200)=@urb_type_bulk={0x2, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0}) 06:55:43 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000300), 0x1, 0x88003) ioctl$USBDEVFS_ALLOW_SUSPEND(r0, 0x5522) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040)=@security={'security\x00', 0xe, 0x4, 0x260, 0xffffffff, 0x180, 0xc0, 0xc0, 0xffffffff, 0xffffffff, 0x288, 0x288, 0x288, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x70, 0x98}, @common=@inet=@SET1={0x28}}, {{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@STANDARD={0x28}}, {{@ip={@rand_addr, @broadcast, 0x0, 0x0, 'batadv_slave_0\x00', 'ip_vti0\x00'}, 0x0, 0x70, 0x98}, @common=@unspec=@NFQUEUE0={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x2c0) ioctl$USBDEVFS_RESETEP(r0, 0x80045503, &(0x7f0000000080)) 06:55:43 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x0, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x80045519, &(0x7f0000000200)=@urb_type_bulk={0x2, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 06:55:43 executing program 1: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x0, 0x8101) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040)=@security={'security\x00', 0xe, 0x4, 0x260, 0xffffffff, 0x180, 0xc0, 0xc0, 0xffffffff, 0xffffffff, 0x288, 0x288, 0x288, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x70, 0x98}, @common=@inet=@SET1={0x28}}, {{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@STANDARD={0x28}}, {{@ip={@rand_addr, @broadcast, 0x0, 0x0, 'batadv_slave_0\x00', 'ip_vti0\x00'}, 0x0, 0x70, 0x98}, @common=@unspec=@NFQUEUE0={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x2c0) ioctl$USBDEVFS_RESETEP(r0, 0xc0185502, &(0x7f0000000080)) 06:55:43 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000300), 0x1, 0x88003) ioctl$USBDEVFS_ALLOW_SUSPEND(r0, 0x5522) (async) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040)=@security={'security\x00', 0xe, 0x4, 0x260, 0xffffffff, 0x180, 0xc0, 0xc0, 0xffffffff, 0xffffffff, 0x288, 0x288, 0x288, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x70, 0x98}, @common=@inet=@SET1={0x28}}, {{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@STANDARD={0x28}}, {{@ip={@rand_addr, @broadcast, 0x0, 0x0, 'batadv_slave_0\x00', 'ip_vti0\x00'}, 0x0, 0x70, 0x98}, @common=@unspec=@NFQUEUE0={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x2c0) (async) ioctl$USBDEVFS_RESETEP(r0, 0x80045503, &(0x7f0000000080)) [ 2910.568848][T13301] ? security_file_ioctl+0x7d/0xa0 [ 2910.573928][T13301] __x64_sys_ioctl+0xd4/0x110 [ 2910.578587][T13301] do_syscall_64+0xca/0x1c0 [ 2910.583077][T13301] entry_SYSCALL_64_after_hwframe+0x5c/0xc1 [ 2910.588946][T13301] ---[ end trace a19802151b528bf3 ]--- 06:55:43 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x0, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x80045519, &(0x7f0000000200)=@urb_type_bulk={0x2, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 06:55:43 executing program 0: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x0, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x80085504, &(0x7f0000000200)=@urb_type_bulk={0x2, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 06:55:43 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x802c550a, &(0x7f0000000200)=@urb_type_bulk={0x2, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000, 0x0, 0x0}) 06:55:43 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000300), 0x1, 0x88003) ioctl$USBDEVFS_ALLOW_SUSPEND(r0, 0x5522) (async, rerun: 64) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040)=@security={'security\x00', 0xe, 0x4, 0x260, 0xffffffff, 0x180, 0xc0, 0xc0, 0xffffffff, 0xffffffff, 0x288, 0x288, 0x288, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x70, 0x98}, @common=@inet=@SET1={0x28}}, {{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@STANDARD={0x28}}, {{@ip={@rand_addr, @broadcast, 0x0, 0x0, 'batadv_slave_0\x00', 'ip_vti0\x00'}, 0x0, 0x70, 0x98}, @common=@unspec=@NFQUEUE0={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x2c0) (async, rerun: 64) ioctl$USBDEVFS_RESETEP(r0, 0x80045503, &(0x7f0000000080)) [ 2910.664207][T13332] FAULT_INJECTION: forcing a failure. [ 2910.664207][T13332] name failslab, interval 1, probability 0, space 0, times 0 [ 2910.677297][T13332] CPU: 1 PID: 13332 Comm: syz-executor.4 Tainted: G W 5.4.233-syzkaller-00019-gd5ed2ca98e48 #0 [ 2910.688898][T13332] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/14/2023 [ 2910.698927][T13332] Call Trace: [ 2910.702193][T13332] dump_stack+0x1d8/0x241 [ 2910.706491][T13332] ? panic+0x768/0x768 [ 2910.710532][T13332] ? nf_ct_l4proto_log_invalid+0x258/0x258 [ 2910.716309][T13332] ? mutex_unlock+0x18/0x40 [ 2910.720781][T13332] ? kernfs_xattr_get+0x81/0x90 [ 2910.725604][T13332] should_fail+0x71f/0x880 [ 2910.730010][T13332] ? setup_fault_attr+0x3d0/0x3d0 [ 2910.735008][T13332] ? idr_alloc+0x2f0/0x2f0 [ 2910.739397][T13332] ? __kernfs_new_node+0x99/0x6e0 [ 2910.744391][T13332] should_failslab+0x5/0x20 [ 2910.748862][T13332] __kmalloc_track_caller+0x4f/0x290 [ 2910.754114][T13332] kstrdup_const+0x51/0x90 [ 2910.758500][T13332] __kernfs_new_node+0x99/0x6e0 [ 2910.763320][T13332] ? kernfs_new_node+0x160/0x160 [ 2910.768225][T13332] ? mutex_lock+0xa5/0x110 [ 2910.772609][T13332] ? mutex_trylock+0xa0/0xa0 [ 2910.777170][T13332] ? kernfs_activate+0x2fe/0x320 [ 2910.782078][T13332] kernfs_new_node+0x95/0x160 [ 2910.786732][T13332] kernfs_create_link+0x9e/0x1f0 [ 2910.791638][T13332] sysfs_do_create_link_sd+0x85/0x100 [ 2910.796978][T13332] device_add_class_symlinks+0x211/0x2a0 [ 2910.802577][T13332] device_add+0x4d3/0xbb0 [ 2910.806876][T13332] device_create_vargs+0x1b9/0x210 [ 2910.811957][T13332] device_create+0xea/0x130 [ 2910.816431][T13332] ? device_create_vargs+0x210/0x210 [ 2910.821683][T13332] ? __percpu_ref_switch_mode+0x36d/0x5b0 [ 2910.827371][T13332] bdi_register_va+0x84/0x600 [ 2910.832017][T13332] bdi_register+0xd1/0x120 [ 2910.836402][T13332] ? __device_add_disk+0x551/0x1220 [ 2910.841564][T13332] ? bdi_register_va+0x600/0x600 [ 2910.846470][T13332] ? percpu_ref_resurrect+0x113/0x190 [ 2910.851810][T13332] bdi_register_owner+0x55/0xf0 [ 2910.856648][T13332] __device_add_disk+0x5d1/0x1220 [ 2910.861645][T13332] ? device_add_disk+0x30/0x30 [ 2910.866377][T13332] ? vsprintf+0x30/0x30 [ 2910.870507][T13332] ? __alloc_disk_node+0x459/0x5a0 [ 2910.875605][T13332] loop_add+0x573/0x740 [ 2910.879751][T13332] loop_control_ioctl+0x448/0x620 [ 2910.884743][T13332] ? loop_remove+0xa0/0xa0 [ 2910.889129][T13332] ? memset+0x1f/0x40 [ 2910.893080][T13332] ? fsnotify+0x1280/0x1340 [ 2910.897551][T13332] ? loop_remove+0xa0/0xa0 [ 2910.901937][T13332] do_vfs_ioctl+0x742/0x1720 [ 2910.906513][T13332] ? ioctl_preallocate+0x250/0x250 [ 2910.911598][T13332] ? __fget+0x407/0x490 [ 2910.915725][T13332] ? fget_many+0x20/0x20 [ 2910.919935][T13332] ? debug_smp_processor_id+0x20/0x20 [ 2910.925277][T13332] ? security_file_ioctl+0x7d/0xa0 [ 2910.930372][T13332] __x64_sys_ioctl+0xd4/0x110 [ 2910.935020][T13332] do_syscall_64+0xca/0x1c0 [ 2910.939494][T13332] entry_SYSCALL_64_after_hwframe+0x5c/0xc1 [ 2910.945867][T13332] ------------[ cut here ]------------ [ 2910.951334][T13332] WARNING: CPU: 1 PID: 13332 at block/genhd.c:742 __device_add_disk+0xea1/0x1220 [ 2910.960410][T13332] Modules linked in: [ 2910.964281][T13332] CPU: 1 PID: 13332 Comm: syz-executor.4 Tainted: G W 5.4.233-syzkaller-00019-gd5ed2ca98e48 #0 [ 2910.975868][T13332] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/14/2023 [ 2910.985917][T13332] RIP: 0010:__device_add_disk+0xea1/0x1220 [ 2910.991711][T13332] Code: ff ff e8 a2 ae 48 ff 0f 0b e9 52 f3 ff ff e8 96 ae 48 ff 0f 0b 42 80 3c 2b 00 0f 85 ac f8 ff ff e9 af f8 ff ff e8 7f ae 48 ff <0f> 0b e9 41 f7 ff ff e8 73 ae 48 ff e9 18 ff ff ff 44 89 f9 80 e1 [ 2911.011284][T13332] RSP: 0018:ffff8881ea6a7a20 EFLAGS: 00010246 [ 2911.017319][T13332] RAX: ffffffff821a8fe1 RBX: 00000000fffffff4 RCX: 0000000000040000 [ 2911.025262][T13332] RDX: ffffc9000174f000 RSI: 000000000003ffff RDI: 0000000000040000 [ 2911.033220][T13332] RBP: ffff8881ea6a7b58 R08: ffffffff821a871c R09: ffffea0007392700 [ 2911.041179][T13332] R10: ffffffff84600000 R11: dffffc0000000000 R12: ffff8881d1552000 [ 2911.049122][T13332] R13: dffffc0000000000 R14: ffff8881d1552070 R15: 1ffff1103a2aa49d [ 2911.057092][T13332] FS: 00007f9c67e08700(0000) GS:ffff8881f6f00000(0000) knlGS:0000000000000000 [ 2911.065989][T13332] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 2911.072542][T13332] CR2: 00007f9c67e07ff8 CR3: 00000001ed58f000 CR4: 00000000003406e0 [ 2911.080506][T13332] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 2911.088448][T13332] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 2911.096388][T13332] Call Trace: [ 2911.099673][T13332] ? device_add_disk+0x30/0x30 [ 2911.104405][T13332] ? vsprintf+0x30/0x30 [ 2911.108533][T13332] ? __alloc_disk_node+0x459/0x5a0 [ 2911.113612][T13332] loop_add+0x573/0x740 [ 2911.117738][T13332] loop_control_ioctl+0x448/0x620 [ 2911.122731][T13332] ? loop_remove+0xa0/0xa0 [ 2911.127121][T13332] ? memset+0x1f/0x40 [ 2911.131070][T13332] ? fsnotify+0x1280/0x1340 [ 2911.135539][T13332] ? loop_remove+0xa0/0xa0 [ 2911.139926][T13332] do_vfs_ioctl+0x742/0x1720 [ 2911.144495][T13332] ? ioctl_preallocate+0x250/0x250 [ 2911.149577][T13332] ? __fget+0x407/0x490 [ 2911.153722][T13332] ? fget_many+0x20/0x20 [ 2911.157936][T13332] ? debug_smp_processor_id+0x20/0x20 06:55:43 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) (fail_nth: 53) 06:55:43 executing program 1: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x0, 0x8101) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040)=@security={'security\x00', 0xe, 0x4, 0x260, 0xffffffff, 0x180, 0xc0, 0xc0, 0xffffffff, 0xffffffff, 0x288, 0x288, 0x288, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x70, 0x98}, @common=@inet=@SET1={0x28}}, {{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@STANDARD={0x28}}, {{@ip={@rand_addr, @broadcast, 0x0, 0x0, 'batadv_slave_0\x00', 'ip_vti0\x00'}, 0x0, 0x70, 0x98}, @common=@unspec=@NFQUEUE0={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x2c0) ioctl$USBDEVFS_RESETEP(r0, 0xc0185502, &(0x7f0000000080)) 06:55:43 executing program 0: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x0, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x80085504, &(0x7f0000000200)=@urb_type_bulk={0x2, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 06:55:43 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x802c550a, &(0x7f0000000200)=@urb_type_bulk={0x2, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff0bdbe, 0x0, 0x0}) 06:55:43 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x0, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x80045519, &(0x7f0000000200)=@urb_type_bulk={0x2, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 06:55:43 executing program 5: syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040)=@security={'security\x00', 0xe, 0x4, 0x260, 0xffffffff, 0x180, 0xc0, 0xc0, 0xffffffff, 0xffffffff, 0x288, 0x288, 0x288, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x70, 0x98}, @common=@inet=@SET1={0x28}}, {{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@STANDARD={0x28}}, {{@ip={@rand_addr, @broadcast, 0x0, 0x0, 'batadv_slave_0\x00', 'ip_vti0\x00'}, 0x0, 0x70, 0x98}, @common=@unspec=@NFQUEUE0={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x2c0) 06:55:43 executing program 0: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x0, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x80085504, &(0x7f0000000200)=@urb_type_bulk={0x2, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 06:55:43 executing program 5: syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) (async) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040)=@security={'security\x00', 0xe, 0x4, 0x260, 0xffffffff, 0x180, 0xc0, 0xc0, 0xffffffff, 0xffffffff, 0x288, 0x288, 0x288, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x70, 0x98}, @common=@inet=@SET1={0x28}}, {{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@STANDARD={0x28}}, {{@ip={@rand_addr, @broadcast, 0x0, 0x0, 'batadv_slave_0\x00', 'ip_vti0\x00'}, 0x0, 0x70, 0x98}, @common=@unspec=@NFQUEUE0={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x2c0) 06:55:43 executing program 1: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040)=@security={'security\x00', 0xe, 0x4, 0x260, 0xffffffff, 0x180, 0xc0, 0xc0, 0xffffffff, 0xffffffff, 0x288, 0x288, 0x288, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x70, 0x98}, @common=@inet=@SET1={0x28}}, {{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@STANDARD={0x28}}, {{@ip={@rand_addr, @broadcast, 0x0, 0x0, 'batadv_slave_0\x00', 'ip_vti0\x00'}, 0x0, 0x70, 0x98}, @common=@unspec=@NFQUEUE0={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x2c0) ioctl$USBDEVFS_RESETEP(r0, 0xc0185502, &(0x7f0000000080)) [ 2911.163278][T13332] ? security_file_ioctl+0x7d/0xa0 [ 2911.168360][T13332] __x64_sys_ioctl+0xd4/0x110 [ 2911.173005][T13332] do_syscall_64+0xca/0x1c0 [ 2911.177475][T13332] entry_SYSCALL_64_after_hwframe+0x5c/0xc1 [ 2911.183335][T13332] ---[ end trace a19802151b528bf4 ]--- 06:55:43 executing program 0: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x0) ioctl$USBDEVFS_SUBMITURB(r0, 0x80085504, &(0x7f0000000200)=@urb_type_bulk={0x2, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 06:55:43 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x802c550a, &(0x7f0000000200)=@urb_type_bulk={0x2, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbebdf07f, 0x0, 0x0}) 06:55:43 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x0) ioctl$USBDEVFS_SUBMITURB(r0, 0x80045519, &(0x7f0000000200)=@urb_type_bulk={0x2, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) [ 2911.251955][T13353] FAULT_INJECTION: forcing a failure. [ 2911.251955][T13353] name failslab, interval 1, probability 0, space 0, times 0 [ 2911.265169][T13353] CPU: 0 PID: 13353 Comm: syz-executor.4 Tainted: G W 5.4.233-syzkaller-00019-gd5ed2ca98e48 #0 [ 2911.276765][T13353] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/14/2023 [ 2911.286818][T13353] Call Trace: [ 2911.290085][T13353] dump_stack+0x1d8/0x241 [ 2911.294390][T13353] ? panic+0x768/0x768 [ 2911.298431][T13353] ? nf_ct_l4proto_log_invalid+0x258/0x258 [ 2911.304206][T13353] ? mutex_lock+0xa5/0x110 [ 2911.308594][T13353] should_fail+0x71f/0x880 [ 2911.312980][T13353] ? kstrdup_const+0x51/0x90 [ 2911.317558][T13353] ? setup_fault_attr+0x3d0/0x3d0 [ 2911.322554][T13353] ? mutex_lock+0xa5/0x110 [ 2911.326940][T13353] ? mutex_trylock+0xa0/0xa0 [ 2911.331508][T13353] ? __kernfs_new_node+0xdb/0x6e0 [ 2911.336526][T13353] should_failslab+0x5/0x20 [ 2911.341001][T13353] kmem_cache_alloc+0x24/0x220 [ 2911.345738][T13353] __kernfs_new_node+0xdb/0x6e0 [ 2911.350561][T13353] ? idr_alloc_cyclic+0x369/0x5d0 [ 2911.355554][T13353] ? kernfs_new_node+0x160/0x160 [ 2911.360463][T13353] ? selinux_path_notify+0x6d0/0x6d0 [ 2911.365721][T13353] ? idr_alloc+0x2f0/0x2f0 [ 2911.370111][T13353] ? _raw_spin_lock+0xa4/0x1b0 [ 2911.374882][T13353] kernfs_new_node+0x95/0x160 [ 2911.379548][T13353] __kernfs_create_file+0x45/0x260 [ 2911.384636][T13353] sysfs_add_file_mode_ns+0x292/0x340 [ 2911.389996][T13353] internal_create_group+0x573/0xf00 [ 2911.395250][T13353] ? mutex_unlock+0x18/0x40 [ 2911.399720][T13353] ? sysfs_create_group+0x20/0x20 [ 2911.404714][T13353] sysfs_create_groups+0x52/0x110 [ 2911.409729][T13353] device_add_attrs+0x87/0x370 [ 2911.414459][T13353] device_add+0x4f4/0xbb0 [ 2911.418758][T13353] device_create_vargs+0x1b9/0x210 [ 2911.423839][T13353] device_create+0xea/0x130 [ 2911.428311][T13353] ? device_create_vargs+0x210/0x210 [ 2911.433566][T13353] ? __percpu_ref_switch_mode+0x36d/0x5b0 [ 2911.439253][T13353] bdi_register_va+0x84/0x600 [ 2911.443916][T13353] bdi_register+0xd1/0x120 [ 2911.448306][T13353] ? __device_add_disk+0x551/0x1220 [ 2911.453485][T13353] ? bdi_register_va+0x600/0x600 [ 2911.458391][T13353] ? percpu_ref_resurrect+0x113/0x190 [ 2911.463731][T13353] bdi_register_owner+0x55/0xf0 [ 2911.468554][T13353] __device_add_disk+0x5d1/0x1220 [ 2911.473547][T13353] ? device_add_disk+0x30/0x30 [ 2911.478300][T13353] ? vsprintf+0x30/0x30 [ 2911.482424][T13353] ? __alloc_disk_node+0x459/0x5a0 [ 2911.487509][T13353] loop_add+0x573/0x740 [ 2911.491653][T13353] loop_control_ioctl+0x448/0x620 [ 2911.496649][T13353] ? loop_remove+0xa0/0xa0 [ 2911.501038][T13353] ? memset+0x1f/0x40 [ 2911.504991][T13353] ? fsnotify+0x1280/0x1340 [ 2911.509462][T13353] ? loop_remove+0xa0/0xa0 [ 2911.513849][T13353] do_vfs_ioctl+0x742/0x1720 [ 2911.518418][T13353] ? ioctl_preallocate+0x250/0x250 [ 2911.523503][T13353] ? __fget+0x407/0x490 [ 2911.527635][T13353] ? fget_many+0x20/0x20 [ 2911.531857][T13353] ? debug_smp_processor_id+0x20/0x20 [ 2911.537203][T13353] ? security_file_ioctl+0x7d/0xa0 [ 2911.542288][T13353] __x64_sys_ioctl+0xd4/0x110 [ 2911.546937][T13353] do_syscall_64+0xca/0x1c0 [ 2911.551413][T13353] entry_SYSCALL_64_after_hwframe+0x5c/0xc1 [ 2911.557998][T13353] ------------[ cut here ]------------ [ 2911.563454][T13353] WARNING: CPU: 0 PID: 13353 at block/genhd.c:742 __device_add_disk+0xea1/0x1220 [ 2911.572523][T13353] Modules linked in: [ 2911.576394][T13353] CPU: 0 PID: 13353 Comm: syz-executor.4 Tainted: G W 5.4.233-syzkaller-00019-gd5ed2ca98e48 #0 [ 2911.587986][T13353] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/14/2023 [ 2911.598044][T13353] RIP: 0010:__device_add_disk+0xea1/0x1220 [ 2911.603817][T13353] Code: ff ff e8 a2 ae 48 ff 0f 0b e9 52 f3 ff ff e8 96 ae 48 ff 0f 0b 42 80 3c 2b 00 0f 85 ac f8 ff ff e9 af f8 ff ff e8 7f ae 48 ff <0f> 0b e9 41 f7 ff ff e8 73 ae 48 ff e9 18 ff ff ff 44 89 f9 80 e1 [ 2911.623389][T13353] RSP: 0018:ffff8881f22e7a20 EFLAGS: 00010246 [ 2911.629423][T13353] RAX: ffffffff821a8fe1 RBX: 00000000fffffff4 RCX: 0000000000040000 [ 2911.637365][T13353] RDX: ffffc9000174f000 RSI: 000000000003ffff RDI: 0000000000040000 [ 2911.645331][T13353] RBP: ffff8881f22e7b58 R08: ffffffff821a871c R09: ffffea0007369c40 [ 2911.653283][T13353] R10: ffffffff84600000 R11: dffffc0000000000 R12: ffff8881e81ad000 [ 2911.661222][T13353] R13: dffffc0000000000 R14: ffff8881e81ad070 R15: 1ffff1103d035a9d [ 2911.669164][T13353] FS: 00007f9c67e08700(0000) GS:ffff8881f6e00000(0000) knlGS:0000000000000000 [ 2911.678060][T13353] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 2911.684611][T13353] CR2: 00007f9c67e07ff8 CR3: 00000001ed58f000 CR4: 00000000003406f0 [ 2911.692556][T13353] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 2911.700499][T13353] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 2911.708438][T13353] Call Trace: [ 2911.711706][T13353] ? device_add_disk+0x30/0x30 [ 2911.716437][T13353] ? vsprintf+0x30/0x30 [ 2911.720565][T13353] ? __alloc_disk_node+0x459/0x5a0 [ 2911.725643][T13353] loop_add+0x573/0x740 [ 2911.729771][T13353] loop_control_ioctl+0x448/0x620 [ 2911.734762][T13353] ? loop_remove+0xa0/0xa0 [ 2911.739147][T13353] ? memset+0x1f/0x40 [ 2911.743102][T13353] ? fsnotify+0x1280/0x1340 [ 2911.747579][T13353] ? loop_remove+0xa0/0xa0 06:55:44 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) (fail_nth: 54) 06:55:44 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x802c550a, &(0x7f0000000200)=@urb_type_bulk={0x2, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 06:55:44 executing program 1: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040)=@security={'security\x00', 0xe, 0x4, 0x260, 0xffffffff, 0x180, 0xc0, 0xc0, 0xffffffff, 0xffffffff, 0x288, 0x288, 0x288, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x70, 0x98}, @common=@inet=@SET1={0x28}}, {{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@STANDARD={0x28}}, {{@ip={@rand_addr, @broadcast, 0x0, 0x0, 'batadv_slave_0\x00', 'ip_vti0\x00'}, 0x0, 0x70, 0x98}, @common=@unspec=@NFQUEUE0={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x2c0) ioctl$USBDEVFS_RESETEP(r0, 0xc0185502, &(0x7f0000000080)) 06:55:44 executing program 0: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x0) ioctl$USBDEVFS_SUBMITURB(r0, 0x80085504, &(0x7f0000000200)=@urb_type_bulk={0x2, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 06:55:44 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x0) ioctl$USBDEVFS_SUBMITURB(r0, 0x80045519, &(0x7f0000000200)=@urb_type_bulk={0x2, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 06:55:44 executing program 5: syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040)=@security={'security\x00', 0xe, 0x4, 0x260, 0xffffffff, 0x180, 0xc0, 0xc0, 0xffffffff, 0xffffffff, 0x288, 0x288, 0x288, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x70, 0x98}, @common=@inet=@SET1={0x28}}, {{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@STANDARD={0x28}}, {{@ip={@rand_addr, @broadcast, 0x0, 0x0, 'batadv_slave_0\x00', 'ip_vti0\x00'}, 0x0, 0x70, 0x98}, @common=@unspec=@NFQUEUE0={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x2c0) 06:55:44 executing program 1: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040)=@security={'security\x00', 0xe, 0x4, 0x260, 0xffffffff, 0x180, 0xc0, 0xc0, 0xffffffff, 0xffffffff, 0x288, 0x288, 0x288, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x70, 0x98}, @common=@inet=@SET1={0x28}}, {{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@STANDARD={0x28}}, {{@ip={@rand_addr, @broadcast, 0x0, 0x0, 'batadv_slave_0\x00', 'ip_vti0\x00'}, 0x0, 0x70, 0x98}, @common=@unspec=@NFQUEUE0={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x2c0) ioctl$USBDEVFS_RESETEP(r0, 0xc0185502, &(0x7f0000000080)) 06:55:44 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x0) ioctl$USBDEVFS_SUBMITURB(r0, 0x80045519, &(0x7f0000000200)=@urb_type_bulk={0x2, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 06:55:44 executing program 0: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x0) ioctl$USBDEVFS_SUBMITURB(r0, 0x80085504, &(0x7f0000000200)=@urb_type_bulk={0x2, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 06:55:44 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040)=@security={'security\x00', 0xe, 0x4, 0x260, 0xffffffff, 0x180, 0xc0, 0xc0, 0xffffffff, 0xffffffff, 0x288, 0x288, 0x288, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x70, 0x98}, @common=@inet=@SET1={0x28}}, {{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@STANDARD={0x28}}, {{@ip={@rand_addr, @broadcast, 0x0, 0x0, 'batadv_slave_0\x00', 'ip_vti0\x00'}, 0x0, 0x70, 0x98}, @common=@unspec=@NFQUEUE0={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x2c0) syz_open_dev$usbmon(&(0x7f0000000040), 0x1, 0x0) ioctl$USBDEVFS_RESETEP(r0, 0x80045503, &(0x7f0000000080)) [ 2911.751963][T13353] do_vfs_ioctl+0x742/0x1720 [ 2911.756523][T13353] ? ioctl_preallocate+0x250/0x250 [ 2911.761612][T13353] ? __fget+0x407/0x490 [ 2911.765736][T13353] ? fget_many+0x20/0x20 [ 2911.769964][T13353] ? debug_smp_processor_id+0x20/0x20 [ 2911.775316][T13353] ? security_file_ioctl+0x7d/0xa0 [ 2911.780394][T13353] __x64_sys_ioctl+0xd4/0x110 [ 2911.785064][T13353] do_syscall_64+0xca/0x1c0 [ 2911.789535][T13353] entry_SYSCALL_64_after_hwframe+0x5c/0xc1 [ 2911.795399][T13353] ---[ end trace a19802151b528bf5 ]--- 06:55:44 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x802c550a, &(0x7f0000000200)=@urb_type_bulk={0x2, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0}) 06:55:44 executing program 3: syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(0xffffffffffffffff, 0x80045519, &(0x7f0000000200)=@urb_type_bulk={0x2, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) [ 2911.863786][T13382] FAULT_INJECTION: forcing a failure. [ 2911.863786][T13382] name failslab, interval 1, probability 0, space 0, times 0 [ 2911.877785][T13382] CPU: 1 PID: 13382 Comm: syz-executor.4 Tainted: G W 5.4.233-syzkaller-00019-gd5ed2ca98e48 #0 [ 2911.889404][T13382] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/14/2023 [ 2911.899457][T13382] Call Trace: [ 2911.902725][T13382] dump_stack+0x1d8/0x241 [ 2911.907023][T13382] ? panic+0x768/0x768 [ 2911.911067][T13382] ? mutex_unlock+0x18/0x40 [ 2911.915539][T13382] ? nf_ct_l4proto_log_invalid+0x258/0x258 [ 2911.921334][T13382] ? selinux_kernfs_init_security+0x14e/0x730 [ 2911.927371][T13382] ? idr_alloc_cyclic+0x369/0x5d0 [ 2911.932363][T13382] should_fail+0x71f/0x880 [ 2911.936752][T13382] ? setup_fault_attr+0x3d0/0x3d0 [ 2911.941752][T13382] ? _raw_spin_lock+0xa4/0x1b0 [ 2911.946485][T13382] ? __kernfs_new_node+0xdb/0x6e0 [ 2911.951475][T13382] should_failslab+0x5/0x20 [ 2911.955946][T13382] kmem_cache_alloc+0x24/0x220 [ 2911.960678][T13382] __kernfs_new_node+0xdb/0x6e0 [ 2911.965503][T13382] ? kernfs_new_node+0x160/0x160 [ 2911.970430][T13382] ? mutex_lock+0xa5/0x110 [ 2911.974815][T13382] ? mutex_trylock+0xa0/0xa0 [ 2911.979373][T13382] ? kernfs_activate+0x2fe/0x320 [ 2911.984276][T13382] kernfs_new_node+0x95/0x160 [ 2911.988925][T13382] __kernfs_create_file+0x45/0x260 [ 2911.994004][T13382] sysfs_add_file_mode_ns+0x292/0x340 [ 2911.999349][T13382] internal_create_group+0x573/0xf00 [ 2912.004603][T13382] ? mutex_unlock+0x18/0x40 [ 2912.009074][T13382] ? sysfs_create_group+0x20/0x20 [ 2912.014068][T13382] sysfs_create_groups+0x52/0x110 [ 2912.019077][T13382] device_add_attrs+0x87/0x370 [ 2912.023823][T13382] device_add+0x4f4/0xbb0 [ 2912.028129][T13382] device_create_vargs+0x1b9/0x210 [ 2912.033216][T13382] device_create+0xea/0x130 [ 2912.037695][T13382] ? device_create_vargs+0x210/0x210 [ 2912.042951][T13382] ? __percpu_ref_switch_mode+0x36d/0x5b0 [ 2912.048644][T13382] bdi_register_va+0x84/0x600 [ 2912.053290][T13382] bdi_register+0xd1/0x120 [ 2912.057680][T13382] ? __device_add_disk+0x551/0x1220 [ 2912.062845][T13382] ? bdi_register_va+0x600/0x600 [ 2912.067752][T13382] ? percpu_ref_resurrect+0x113/0x190 [ 2912.073095][T13382] bdi_register_owner+0x55/0xf0 [ 2912.077921][T13382] __device_add_disk+0x5d1/0x1220 [ 2912.082932][T13382] ? device_add_disk+0x30/0x30 [ 2912.087672][T13382] ? vsprintf+0x30/0x30 [ 2912.091796][T13382] ? __alloc_disk_node+0x459/0x5a0 [ 2912.096893][T13382] loop_add+0x573/0x740 [ 2912.101018][T13382] loop_control_ioctl+0x448/0x620 [ 2912.106017][T13382] ? loop_remove+0xa0/0xa0 [ 2912.110405][T13382] ? memset+0x1f/0x40 [ 2912.114355][T13382] ? fsnotify+0x1280/0x1340 [ 2912.118827][T13382] ? loop_remove+0xa0/0xa0 [ 2912.123211][T13382] do_vfs_ioctl+0x742/0x1720 [ 2912.127774][T13382] ? ioctl_preallocate+0x250/0x250 [ 2912.132854][T13382] ? __fget+0x407/0x490 [ 2912.136981][T13382] ? fget_many+0x20/0x20 [ 2912.141196][T13382] ? debug_smp_processor_id+0x20/0x20 [ 2912.146557][T13382] ? security_file_ioctl+0x7d/0xa0 [ 2912.151637][T13382] __x64_sys_ioctl+0xd4/0x110 [ 2912.156285][T13382] do_syscall_64+0xca/0x1c0 [ 2912.160757][T13382] entry_SYSCALL_64_after_hwframe+0x5c/0xc1 [ 2912.167366][T13382] ------------[ cut here ]------------ [ 2912.172823][T13382] WARNING: CPU: 1 PID: 13382 at block/genhd.c:742 __device_add_disk+0xea1/0x1220 [ 2912.181891][T13382] Modules linked in: [ 2912.185758][T13382] CPU: 1 PID: 13382 Comm: syz-executor.4 Tainted: G W 5.4.233-syzkaller-00019-gd5ed2ca98e48 #0 [ 2912.197345][T13382] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/14/2023 [ 2912.207379][T13382] RIP: 0010:__device_add_disk+0xea1/0x1220 [ 2912.213153][T13382] Code: ff ff e8 a2 ae 48 ff 0f 0b e9 52 f3 ff ff e8 96 ae 48 ff 0f 0b 42 80 3c 2b 00 0f 85 ac f8 ff ff e9 af f8 ff ff e8 7f ae 48 ff <0f> 0b e9 41 f7 ff ff e8 73 ae 48 ff e9 18 ff ff ff 44 89 f9 80 e1 [ 2912.232727][T13382] RSP: 0018:ffff8881ec6cfa20 EFLAGS: 00010246 [ 2912.238762][T13382] RAX: ffffffff821a8fe1 RBX: 00000000fffffff4 RCX: 0000000000040000 [ 2912.246703][T13382] RDX: ffffc9000174f000 RSI: 000000000003ffff RDI: 0000000000040000 [ 2912.254642][T13382] RBP: ffff8881ec6cfb58 R08: ffffffff821a871c R09: ffffea0007ad7540 [ 2912.262588][T13382] R10: ffffffff84600000 R11: dffffc0000000000 R12: ffff8881e9dc3000 [ 2912.270530][T13382] R13: dffffc0000000000 R14: ffff8881e9dc3070 R15: 1ffff1103d3b869d [ 2912.278472][T13382] FS: 00007f9c67e08700(0000) GS:ffff8881f6f00000(0000) knlGS:0000000000000000 [ 2912.287386][T13382] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 2912.293940][T13382] CR2: 0000555555961728 CR3: 00000001aa508000 CR4: 00000000003406e0 [ 2912.301890][T13382] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 2912.309834][T13382] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 2912.317774][T13382] Call Trace: [ 2912.321040][T13382] ? device_add_disk+0x30/0x30 [ 2912.325775][T13382] ? vsprintf+0x30/0x30 [ 2912.329903][T13382] ? __alloc_disk_node+0x459/0x5a0 [ 2912.334985][T13382] loop_add+0x573/0x740 [ 2912.339117][T13382] loop_control_ioctl+0x448/0x620 [ 2912.344112][T13382] ? loop_remove+0xa0/0xa0 [ 2912.348496][T13382] ? memset+0x1f/0x40 [ 2912.352456][T13382] ? fsnotify+0x1280/0x1340 [ 2912.356929][T13382] ? loop_remove+0xa0/0xa0 [ 2912.361324][T13382] do_vfs_ioctl+0x742/0x1720 06:55:45 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) (fail_nth: 55) 06:55:45 executing program 1: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) ioctl$USBDEVFS_RESETEP(r0, 0xc0185502, &(0x7f0000000080)) 06:55:45 executing program 0: syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(0xffffffffffffffff, 0x80085504, &(0x7f0000000200)=@urb_type_bulk={0x2, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 06:55:45 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x802c550a, &(0x7f0000000200)=@urb_type_bulk={0x2, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0}) 06:55:45 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) (async) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040)=@security={'security\x00', 0xe, 0x4, 0x260, 0xffffffff, 0x180, 0xc0, 0xc0, 0xffffffff, 0xffffffff, 0x288, 0x288, 0x288, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x70, 0x98}, @common=@inet=@SET1={0x28}}, {{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@STANDARD={0x28}}, {{@ip={@rand_addr, @broadcast, 0x0, 0x0, 'batadv_slave_0\x00', 'ip_vti0\x00'}, 0x0, 0x70, 0x98}, @common=@unspec=@NFQUEUE0={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x2c0) syz_open_dev$usbmon(&(0x7f0000000040), 0x1, 0x0) (async, rerun: 32) ioctl$USBDEVFS_RESETEP(r0, 0x80045503, &(0x7f0000000080)) (rerun: 32) 06:55:45 executing program 3: syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(0xffffffffffffffff, 0x80045519, &(0x7f0000000200)=@urb_type_bulk={0x2, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 06:55:45 executing program 3: syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(0xffffffffffffffff, 0x80045519, &(0x7f0000000200)=@urb_type_bulk={0x2, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 06:55:45 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x802c550a, &(0x7f0000000200)=@urb_type_bulk={0x2, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0}) 06:55:45 executing program 0: syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(0xffffffffffffffff, 0x80085504, &(0x7f0000000200)=@urb_type_bulk={0x2, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) [ 2912.365887][T13382] ? ioctl_preallocate+0x250/0x250 [ 2912.370970][T13382] ? __fget+0x407/0x490 [ 2912.375110][T13382] ? fget_many+0x20/0x20 [ 2912.379329][T13382] ? debug_smp_processor_id+0x20/0x20 [ 2912.384684][T13382] ? security_file_ioctl+0x7d/0xa0 [ 2912.389767][T13382] __x64_sys_ioctl+0xd4/0x110 [ 2912.394417][T13382] do_syscall_64+0xca/0x1c0 [ 2912.398892][T13382] entry_SYSCALL_64_after_hwframe+0x5c/0xc1 [ 2912.404751][T13382] ---[ end trace a19802151b528bf6 ]--- 06:55:45 executing program 1: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) ioctl$USBDEVFS_RESETEP(r0, 0xc0185502, &(0x7f0000000080)) 06:55:45 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x80045519, 0x0) 06:55:45 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x802c550a, &(0x7f0000000200)=@urb_type_bulk={0x2, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000, 0x0}) [ 2912.478060][T13409] FAULT_INJECTION: forcing a failure. [ 2912.478060][T13409] name failslab, interval 1, probability 0, space 0, times 0 [ 2912.498804][T13409] CPU: 0 PID: 13409 Comm: syz-executor.4 Tainted: G W 5.4.233-syzkaller-00019-gd5ed2ca98e48 #0 [ 2912.510433][T13409] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/14/2023 [ 2912.520473][T13409] Call Trace: [ 2912.523766][T13409] dump_stack+0x1d8/0x241 [ 2912.528068][T13409] ? panic+0x768/0x768 [ 2912.532107][T13409] ? mutex_unlock+0x18/0x40 [ 2912.536579][T13409] ? nf_ct_l4proto_log_invalid+0x258/0x258 [ 2912.542376][T13409] ? selinux_kernfs_init_security+0x14e/0x730 [ 2912.548415][T13409] ? idr_alloc_cyclic+0x369/0x5d0 [ 2912.553409][T13409] should_fail+0x71f/0x880 [ 2912.557804][T13409] ? setup_fault_attr+0x3d0/0x3d0 [ 2912.562806][T13409] ? _raw_spin_lock+0xa4/0x1b0 [ 2912.567547][T13409] ? __kernfs_new_node+0xdb/0x6e0 [ 2912.572542][T13409] should_failslab+0x5/0x20 [ 2912.577015][T13409] kmem_cache_alloc+0x24/0x220 [ 2912.581749][T13409] __kernfs_new_node+0xdb/0x6e0 [ 2912.586586][T13409] ? kernfs_new_node+0x160/0x160 [ 2912.591508][T13409] ? mutex_lock+0xa5/0x110 [ 2912.595892][T13409] ? mutex_trylock+0xa0/0xa0 [ 2912.600453][T13409] ? kernfs_activate+0x2fe/0x320 [ 2912.605374][T13409] kernfs_new_node+0x95/0x160 [ 2912.610022][T13409] __kernfs_create_file+0x45/0x260 [ 2912.615103][T13409] sysfs_add_file_mode_ns+0x292/0x340 [ 2912.620443][T13409] internal_create_group+0x573/0xf00 [ 2912.625696][T13409] ? mutex_unlock+0x18/0x40 [ 2912.630168][T13409] ? sysfs_create_group+0x20/0x20 [ 2912.635161][T13409] sysfs_create_groups+0x52/0x110 [ 2912.640157][T13409] device_add_attrs+0x87/0x370 [ 2912.644889][T13409] device_add+0x4f4/0xbb0 [ 2912.649190][T13409] device_create_vargs+0x1b9/0x210 [ 2912.654269][T13409] device_create+0xea/0x130 [ 2912.658743][T13409] ? device_create_vargs+0x210/0x210 [ 2912.664000][T13409] ? __percpu_ref_switch_mode+0x36d/0x5b0 [ 2912.669687][T13409] bdi_register_va+0x84/0x600 [ 2912.674440][T13409] bdi_register+0xd1/0x120 [ 2912.678828][T13409] ? __device_add_disk+0x551/0x1220 [ 2912.683996][T13409] ? bdi_register_va+0x600/0x600 [ 2912.688905][T13409] ? percpu_ref_resurrect+0x113/0x190 [ 2912.694243][T13409] bdi_register_owner+0x55/0xf0 [ 2912.699063][T13409] __device_add_disk+0x5d1/0x1220 [ 2912.704172][T13409] ? device_add_disk+0x30/0x30 [ 2912.708904][T13409] ? vsprintf+0x30/0x30 [ 2912.713028][T13409] ? __alloc_disk_node+0x459/0x5a0 [ 2912.718109][T13409] loop_add+0x573/0x740 [ 2912.722239][T13409] loop_control_ioctl+0x448/0x620 [ 2912.727233][T13409] ? loop_remove+0xa0/0xa0 [ 2912.731618][T13409] ? memset+0x1f/0x40 [ 2912.735567][T13409] ? fsnotify+0x1280/0x1340 [ 2912.740058][T13409] ? loop_remove+0xa0/0xa0 [ 2912.744455][T13409] do_vfs_ioctl+0x742/0x1720 [ 2912.749020][T13409] ? ioctl_preallocate+0x250/0x250 [ 2912.754098][T13409] ? __fget+0x407/0x490 [ 2912.758226][T13409] ? fget_many+0x20/0x20 [ 2912.762456][T13409] ? debug_smp_processor_id+0x20/0x20 [ 2912.767795][T13409] ? security_file_ioctl+0x7d/0xa0 [ 2912.772876][T13409] __x64_sys_ioctl+0xd4/0x110 [ 2912.777533][T13409] do_syscall_64+0xca/0x1c0 [ 2912.782004][T13409] entry_SYSCALL_64_after_hwframe+0x5c/0xc1 [ 2912.789249][T13409] ------------[ cut here ]------------ [ 2912.794707][T13409] WARNING: CPU: 0 PID: 13409 at block/genhd.c:742 __device_add_disk+0xea1/0x1220 [ 2912.803777][T13409] Modules linked in: [ 2912.807649][T13409] CPU: 0 PID: 13409 Comm: syz-executor.4 Tainted: G W 5.4.233-syzkaller-00019-gd5ed2ca98e48 #0 [ 2912.819260][T13409] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/14/2023 [ 2912.829291][T13409] RIP: 0010:__device_add_disk+0xea1/0x1220 [ 2912.835066][T13409] Code: ff ff e8 a2 ae 48 ff 0f 0b e9 52 f3 ff ff e8 96 ae 48 ff 0f 0b 42 80 3c 2b 00 0f 85 ac f8 ff ff e9 af f8 ff ff e8 7f ae 48 ff <0f> 0b e9 41 f7 ff ff e8 73 ae 48 ff e9 18 ff ff ff 44 89 f9 80 e1 [ 2912.854655][T13409] RSP: 0018:ffff8881ed32fa20 EFLAGS: 00010246 [ 2912.860691][T13409] RAX: ffffffff821a8fe1 RBX: 00000000fffffff4 RCX: 0000000000040000 [ 2912.868632][T13409] RDX: ffffc9000174f000 RSI: 000000000003ffff RDI: 0000000000040000 [ 2912.876591][T13409] RBP: ffff8881ed32fb58 R08: ffffffff821a871c R09: ffffea0007ad7540 [ 2912.884540][T13409] R10: ffffffff84600000 R11: dffffc0000000000 R12: ffff8881e6cca000 [ 2912.892479][T13409] R13: dffffc0000000000 R14: ffff8881e6cca070 R15: 1ffff1103cd9949d [ 2912.900421][T13409] FS: 00007f9c67e08700(0000) GS:ffff8881f6e00000(0000) knlGS:0000000000000000 [ 2912.909317][T13409] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 2912.915888][T13409] CR2: 000055555735b728 CR3: 00000001e9ed7000 CR4: 00000000003406f0 [ 2912.923831][T13409] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 2912.931772][T13409] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 2912.939710][T13409] Call Trace: [ 2912.942987][T13409] ? device_add_disk+0x30/0x30 [ 2912.947736][T13409] ? vsprintf+0x30/0x30 [ 2912.951877][T13409] ? __alloc_disk_node+0x459/0x5a0 [ 2912.956959][T13409] loop_add+0x573/0x740 [ 2912.961109][T13409] loop_control_ioctl+0x448/0x620 [ 2912.966106][T13409] ? loop_remove+0xa0/0xa0 [ 2912.970508][T13409] ? memset+0x1f/0x40 [ 2912.974465][T13409] ? fsnotify+0x1280/0x1340 [ 2912.978934][T13409] ? loop_remove+0xa0/0xa0 [ 2912.983426][T13409] do_vfs_ioctl+0x742/0x1720 [ 2912.987992][T13409] ? ioctl_preallocate+0x250/0x250 [ 2912.993079][T13409] ? __fget+0x407/0x490 [ 2912.997209][T13409] ? fget_many+0x20/0x20 [ 2913.001420][T13409] ? debug_smp_processor_id+0x20/0x20 [ 2913.006757][T13409] ? security_file_ioctl+0x7d/0xa0 [ 2913.011836][T13409] __x64_sys_ioctl+0xd4/0x110 [ 2913.016482][T13409] do_syscall_64+0xca/0x1c0 [ 2913.021068][T13409] entry_SYSCALL_64_after_hwframe+0x5c/0xc1 06:55:45 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) (fail_nth: 56) 06:55:45 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x80045519, 0x0) 06:55:45 executing program 0: syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(0xffffffffffffffff, 0x80085504, &(0x7f0000000200)=@urb_type_bulk={0x2, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 06:55:45 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040)=@security={'security\x00', 0xe, 0x4, 0x260, 0xffffffff, 0x180, 0xc0, 0xc0, 0xffffffff, 0xffffffff, 0x288, 0x288, 0x288, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x70, 0x98}, @common=@inet=@SET1={0x28}}, {{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@STANDARD={0x28}}, {{@ip={@rand_addr, @broadcast, 0x0, 0x0, 'batadv_slave_0\x00', 'ip_vti0\x00'}, 0x0, 0x70, 0x98}, @common=@unspec=@NFQUEUE0={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x2c0) (async) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040)=@security={'security\x00', 0xe, 0x4, 0x260, 0xffffffff, 0x180, 0xc0, 0xc0, 0xffffffff, 0xffffffff, 0x288, 0x288, 0x288, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x70, 0x98}, @common=@inet=@SET1={0x28}}, {{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@STANDARD={0x28}}, {{@ip={@rand_addr, @broadcast, 0x0, 0x0, 'batadv_slave_0\x00', 'ip_vti0\x00'}, 0x0, 0x70, 0x98}, @common=@unspec=@NFQUEUE0={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x2c0) syz_open_dev$usbmon(&(0x7f0000000040), 0x1, 0x0) ioctl$USBDEVFS_RESETEP(r0, 0x80045503, &(0x7f0000000080)) 06:55:45 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x802c550a, &(0x7f0000000200)=@urb_type_bulk={0x2, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff0bdbe, 0x0}) 06:55:45 executing program 1: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) ioctl$USBDEVFS_RESETEP(r0, 0xc0185502, &(0x7f0000000080)) 06:55:45 executing program 0: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x80085504, 0x0) 06:55:45 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x802c550a, &(0x7f0000000200)=@urb_type_bulk={0x2, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbebdf07f, 0x0}) 06:55:45 executing program 1: syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040)=@security={'security\x00', 0xe, 0x4, 0x260, 0xffffffff, 0x180, 0xc0, 0xc0, 0xffffffff, 0xffffffff, 0x288, 0x288, 0x288, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x70, 0x98}, @common=@inet=@SET1={0x28}}, {{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@STANDARD={0x28}}, {{@ip={@rand_addr, @broadcast, 0x0, 0x0, 'batadv_slave_0\x00', 'ip_vti0\x00'}, 0x0, 0x70, 0x98}, @common=@unspec=@NFQUEUE0={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x2c0) ioctl$USBDEVFS_RESETEP(0xffffffffffffffff, 0xc0185502, &(0x7f0000000080)) 06:55:45 executing program 0: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x80085504, 0x0) 06:55:45 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x80045519, 0x0) [ 2913.026929][T13409] ---[ end trace a19802151b528bf7 ]--- 06:55:45 executing program 5: syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) r0 = socket$inet(0x2, 0xa, 0x0) r1 = accept$inet(r0, 0x0, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0xa, &(0x7f0000000040)=@security={'security\x00', 0xe, 0x4, 0x260, 0xffffffff, 0x180, 0xc0, 0xc0, 0xffffffff, 0xffffffff, 0x288, 0x288, 0x288, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x70, 0x98}, @common=@inet=@SET1={0x28}}, {{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@STANDARD={0x28}}, {{@ip={@rand_addr, @broadcast, 0x0, 0x0, 'batadv_slave_0\x00', 'ip_vti0\x00'}, 0x0, 0x70, 0x98}, @common=@unspec=@NFQUEUE0={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0xffffffffffffff31) r2 = syz_open_dev$usbfs(&(0x7f0000000380), 0x6e665f53, 0x0) ioctl$USBDEVFS_CLEAR_HALT(r2, 0x80045515, 0x0) ioctl$USBDEVFS_RESETEP(r2, 0x80045503, &(0x7f0000000080)) [ 2913.093673][T13432] FAULT_INJECTION: forcing a failure. [ 2913.093673][T13432] name failslab, interval 1, probability 0, space 0, times 0 [ 2913.107340][T13432] CPU: 0 PID: 13432 Comm: syz-executor.4 Tainted: G W 5.4.233-syzkaller-00019-gd5ed2ca98e48 #0 [ 2913.118964][T13432] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/14/2023 [ 2913.128994][T13432] Call Trace: [ 2913.132259][T13432] dump_stack+0x1d8/0x241 [ 2913.136557][T13432] ? panic+0x768/0x768 [ 2913.140594][T13432] ? mutex_unlock+0x18/0x40 [ 2913.145067][T13432] ? nf_ct_l4proto_log_invalid+0x258/0x258 [ 2913.150843][T13432] ? selinux_kernfs_init_security+0x14e/0x730 [ 2913.156877][T13432] ? idr_alloc_cyclic+0x369/0x5d0 [ 2913.161897][T13432] should_fail+0x71f/0x880 [ 2913.166284][T13432] ? setup_fault_attr+0x3d0/0x3d0 [ 2913.171365][T13432] ? _raw_spin_lock+0xa4/0x1b0 [ 2913.176099][T13432] ? __kernfs_new_node+0xdb/0x6e0 [ 2913.181118][T13432] should_failslab+0x5/0x20 [ 2913.185621][T13432] kmem_cache_alloc+0x24/0x220 [ 2913.190379][T13432] __kernfs_new_node+0xdb/0x6e0 [ 2913.195200][T13432] ? kernfs_new_node+0x160/0x160 [ 2913.200105][T13432] ? mutex_lock+0xa5/0x110 [ 2913.204489][T13432] ? mutex_trylock+0xa0/0xa0 [ 2913.209052][T13432] ? kernfs_activate+0x2fe/0x320 [ 2913.213957][T13432] kernfs_new_node+0x95/0x160 [ 2913.218708][T13432] __kernfs_create_file+0x45/0x260 [ 2913.223787][T13432] sysfs_add_file_mode_ns+0x292/0x340 [ 2913.229128][T13432] internal_create_group+0x573/0xf00 [ 2913.234394][T13432] ? mutex_unlock+0x18/0x40 [ 2913.238873][T13432] ? sysfs_create_group+0x20/0x20 [ 2913.243883][T13432] sysfs_create_groups+0x52/0x110 [ 2913.248880][T13432] device_add_attrs+0x87/0x370 [ 2913.253633][T13432] device_add+0x4f4/0xbb0 [ 2913.257935][T13432] device_create_vargs+0x1b9/0x210 [ 2913.263018][T13432] device_create+0xea/0x130 [ 2913.267492][T13432] ? device_create_vargs+0x210/0x210 [ 2913.272750][T13432] ? __percpu_ref_switch_mode+0x36d/0x5b0 [ 2913.278440][T13432] bdi_register_va+0x84/0x600 [ 2913.283086][T13432] bdi_register+0xd1/0x120 [ 2913.287478][T13432] ? __device_add_disk+0x551/0x1220 [ 2913.292663][T13432] ? bdi_register_va+0x600/0x600 [ 2913.297589][T13432] ? percpu_ref_resurrect+0x113/0x190 [ 2913.302935][T13432] bdi_register_owner+0x55/0xf0 [ 2913.307756][T13432] __device_add_disk+0x5d1/0x1220 [ 2913.312752][T13432] ? device_add_disk+0x30/0x30 [ 2913.317489][T13432] ? vsprintf+0x30/0x30 [ 2913.321620][T13432] ? __alloc_disk_node+0x459/0x5a0 [ 2913.326718][T13432] loop_add+0x573/0x740 [ 2913.330845][T13432] loop_control_ioctl+0x448/0x620 [ 2913.335856][T13432] ? loop_remove+0xa0/0xa0 [ 2913.340249][T13432] ? memset+0x1f/0x40 [ 2913.344220][T13432] ? fsnotify+0x1280/0x1340 [ 2913.348710][T13432] ? loop_remove+0xa0/0xa0 [ 2913.353095][T13432] do_vfs_ioctl+0x742/0x1720 [ 2913.357653][T13432] ? ioctl_preallocate+0x250/0x250 [ 2913.362733][T13432] ? __fget+0x407/0x490 [ 2913.366854][T13432] ? fget_many+0x20/0x20 [ 2913.371088][T13432] ? debug_smp_processor_id+0x20/0x20 [ 2913.376427][T13432] ? security_file_ioctl+0x7d/0xa0 [ 2913.381511][T13432] __x64_sys_ioctl+0xd4/0x110 [ 2913.386157][T13432] do_syscall_64+0xca/0x1c0 [ 2913.390629][T13432] entry_SYSCALL_64_after_hwframe+0x5c/0xc1 [ 2913.397475][T13432] ------------[ cut here ]------------ [ 2913.402944][T13432] WARNING: CPU: 0 PID: 13432 at block/genhd.c:742 __device_add_disk+0xea1/0x1220 [ 2913.412015][T13432] Modules linked in: [ 2913.415882][T13432] CPU: 0 PID: 13432 Comm: syz-executor.4 Tainted: G W 5.4.233-syzkaller-00019-gd5ed2ca98e48 #0 [ 2913.427477][T13432] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/14/2023 [ 2913.437524][T13432] RIP: 0010:__device_add_disk+0xea1/0x1220 [ 2913.443325][T13432] Code: ff ff e8 a2 ae 48 ff 0f 0b e9 52 f3 ff ff e8 96 ae 48 ff 0f 0b 42 80 3c 2b 00 0f 85 ac f8 ff ff e9 af f8 ff ff e8 7f ae 48 ff <0f> 0b e9 41 f7 ff ff e8 73 ae 48 ff e9 18 ff ff ff 44 89 f9 80 e1 [ 2913.462922][T13432] RSP: 0018:ffff8881ec6cfa20 EFLAGS: 00010246 [ 2913.468959][T13432] RAX: ffffffff821a8fe1 RBX: 00000000fffffff4 RCX: 0000000000040000 [ 2913.476921][T13432] RDX: ffffc9000174f000 RSI: 000000000003ffff RDI: 0000000000040000 [ 2913.484881][T13432] RBP: ffff8881ec6cfb58 R08: ffffffff821a871c R09: ffffea0007ad7540 [ 2913.492821][T13432] R10: ffffffff84600000 R11: dffffc0000000000 R12: ffff8881d187d000 [ 2913.500767][T13432] R13: dffffc0000000000 R14: ffff8881d187d070 R15: 1ffff1103a30fa9d [ 2913.508712][T13432] FS: 00007f9c67e08700(0000) GS:ffff8881f6e00000(0000) knlGS:0000000000000000 [ 2913.517611][T13432] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 2913.524167][T13432] CR2: 00007f9c67e07ff8 CR3: 00000001cda51000 CR4: 00000000003406f0 [ 2913.532115][T13432] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 2913.540060][T13432] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 2913.547999][T13432] Call Trace: [ 2913.551266][T13432] ? device_add_disk+0x30/0x30 [ 2913.556003][T13432] ? vsprintf+0x30/0x30 [ 2913.560138][T13432] ? __alloc_disk_node+0x459/0x5a0 [ 2913.565240][T13432] loop_add+0x573/0x740 [ 2913.569368][T13432] loop_control_ioctl+0x448/0x620 [ 2913.574391][T13432] ? loop_remove+0xa0/0xa0 [ 2913.578800][T13432] ? memset+0x1f/0x40 [ 2913.582751][T13432] ? fsnotify+0x1280/0x1340 [ 2913.587224][T13432] ? loop_remove+0xa0/0xa0 06:55:46 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) (fail_nth: 57) 06:55:46 executing program 0: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x80085504, 0x0) 06:55:46 executing program 2: setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000240)=@raw={'raw\x00', 0x9, 0x3, 0x288, 0x0, 0xffffffff, 0xffffffff, 0xd0, 0xffffffff, 0x1f0, 0xffffffff, 0xffffffff, 0x1f0, 0xffffffff, 0x3, &(0x7f0000000040), {[{{@ip={@rand_addr=0x64010102, @loopback, 0xff000000, 0xff, 'veth1_virt_wifi\x00', 'veth1\x00', {}, {0xff}, 0x32, 0x1, 0x2}, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x1, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x3a}, 0x800, 0x5, [0x29, 0x8000, 0x12, 0x20, 0xc, 0x31, 0x3, 0x5, 0x23, 0x30, 0x9, 0x14, 0x16, 0x36, 0x32, 0x1a], 0x0, 0xba5, 0x6}}}, {{@uncond, 0x0, 0xe8, 0x120, 0x0, {}, [@common=@osf={{0x50}, {'syz1\x00', 0x0, 0xc, 0x0, 0x1}}, @inet=@rpfilter={{0x28}, {0x2}}]}, @common=@inet=@SET3={0x38, 'SET\x00', 0x3, {{0x3, 0x3, 0x7}, {0xffffffffffffffff, 0x1, 0x4}, {0x4, 0x3, 0x4}, 0x1ff, 0x5}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x2e8) r0 = socket$inet(0x2, 0xa, 0x0) accept$inet(r0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_EDIT(r0, 0x0, 0x483, &(0x7f0000000080)={0xa, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x4e21, 0x1, 'lblc\x00', 0x10, 0x4, 0x1f}, 0x2c) r1 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r1, 0x802c550a, &(0x7f0000000200)=@urb_type_bulk={0x2, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 06:55:46 executing program 1: syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040)=@security={'security\x00', 0xe, 0x4, 0x260, 0xffffffff, 0x180, 0xc0, 0xc0, 0xffffffff, 0xffffffff, 0x288, 0x288, 0x288, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x70, 0x98}, @common=@inet=@SET1={0x28}}, {{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@STANDARD={0x28}}, {{@ip={@rand_addr, @broadcast, 0x0, 0x0, 'batadv_slave_0\x00', 'ip_vti0\x00'}, 0x0, 0x70, 0x98}, @common=@unspec=@NFQUEUE0={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x2c0) ioctl$USBDEVFS_RESETEP(0xffffffffffffffff, 0xc0185502, &(0x7f0000000080)) 06:55:46 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x802c550a, &(0x7f0000000200)=@urb_type_bulk={0x2, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbebdf07f, 0x0, 0x0, 0x0}) 06:55:46 executing program 5: syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) (async) r0 = socket$inet(0x2, 0xa, 0x0) r1 = accept$inet(r0, 0x0, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0xa, &(0x7f0000000040)=@security={'security\x00', 0xe, 0x4, 0x260, 0xffffffff, 0x180, 0xc0, 0xc0, 0xffffffff, 0xffffffff, 0x288, 0x288, 0x288, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x70, 0x98}, @common=@inet=@SET1={0x28}}, {{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@STANDARD={0x28}}, {{@ip={@rand_addr, @broadcast, 0x0, 0x0, 'batadv_slave_0\x00', 'ip_vti0\x00'}, 0x0, 0x70, 0x98}, @common=@unspec=@NFQUEUE0={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0xffffffffffffff31) (async) r2 = syz_open_dev$usbfs(&(0x7f0000000380), 0x6e665f53, 0x0) ioctl$USBDEVFS_CLEAR_HALT(r2, 0x80045515, 0x0) (async) ioctl$USBDEVFS_RESETEP(r2, 0x80045503, &(0x7f0000000080)) 06:55:46 executing program 0: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x802c550a, &(0x7f0000000200)=@urb_type_bulk={0x2, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0}) 06:55:46 executing program 1: syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040)=@security={'security\x00', 0xe, 0x4, 0x260, 0xffffffff, 0x180, 0xc0, 0xc0, 0xffffffff, 0xffffffff, 0x288, 0x288, 0x288, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x70, 0x98}, @common=@inet=@SET1={0x28}}, {{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@STANDARD={0x28}}, {{@ip={@rand_addr, @broadcast, 0x0, 0x0, 'batadv_slave_0\x00', 'ip_vti0\x00'}, 0x0, 0x70, 0x98}, @common=@unspec=@NFQUEUE0={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x2c0) ioctl$USBDEVFS_RESETEP(0xffffffffffffffff, 0xc0185502, &(0x7f0000000080)) 06:55:46 executing program 5: syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) (async, rerun: 32) r0 = socket$inet(0x2, 0xa, 0x0) (rerun: 32) r1 = accept$inet(r0, 0x0, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0xa, &(0x7f0000000040)=@security={'security\x00', 0xe, 0x4, 0x260, 0xffffffff, 0x180, 0xc0, 0xc0, 0xffffffff, 0xffffffff, 0x288, 0x288, 0x288, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x70, 0x98}, @common=@inet=@SET1={0x28}}, {{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@STANDARD={0x28}}, {{@ip={@rand_addr, @broadcast, 0x0, 0x0, 'batadv_slave_0\x00', 'ip_vti0\x00'}, 0x0, 0x70, 0x98}, @common=@unspec=@NFQUEUE0={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0xffffffffffffff31) (async) r2 = syz_open_dev$usbfs(&(0x7f0000000380), 0x6e665f53, 0x0) ioctl$USBDEVFS_CLEAR_HALT(r2, 0x80045515, 0x0) ioctl$USBDEVFS_RESETEP(r2, 0x80045503, &(0x7f0000000080)) [ 2913.591608][T13432] do_vfs_ioctl+0x742/0x1720 [ 2913.596166][T13432] ? ioctl_preallocate+0x250/0x250 [ 2913.601244][T13432] ? __fget+0x407/0x490 [ 2913.605368][T13432] ? fget_many+0x20/0x20 [ 2913.609580][T13432] ? debug_smp_processor_id+0x20/0x20 [ 2913.614924][T13432] ? security_file_ioctl+0x7d/0xa0 [ 2913.620002][T13432] __x64_sys_ioctl+0xd4/0x110 [ 2913.624649][T13432] do_syscall_64+0xca/0x1c0 [ 2913.629120][T13432] entry_SYSCALL_64_after_hwframe+0x5c/0xc1 [ 2913.634979][T13432] ---[ end trace a19802151b528bf8 ]--- 06:55:46 executing program 0: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f0000000200)=@urb_type_control={0x2, {0x2}, 0xfffffffb, 0x4, 0x0, 0x0, 0xf8, 0x7, 0x0, 0x0, 0x5, &(0x7f0000000a80)="cfc206af3b20cc76f92c2426377a243c9d8d6008fafd2fd67138c6b064102eec84099eccfeb5a4b8a5f3f11f2b3a7efc7bb159fd9e2cfe9dfc7021a27eef2f1b8a14ae37ef3f5850a71385fa82e17ca63c6617a30e1bc3576e8ee08aac39ab0a21c7d06379bcc8bd197b3c4706285c7606cc6c43a9f9a4485fa40997c39a4da54d472ef5eb63dbcb91c23e669d6e8836e2269a1d466533236ed3bd"}) 06:55:46 executing program 1: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040)=@security={'security\x00', 0xe, 0x4, 0x260, 0xffffffff, 0x180, 0xc0, 0xc0, 0xffffffff, 0xffffffff, 0x288, 0x288, 0x288, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x70, 0x98}, @common=@inet=@SET1={0x28}}, {{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@STANDARD={0x28}}, {{@ip={@rand_addr, @broadcast, 0x0, 0x0, 'batadv_slave_0\x00', 'ip_vti0\x00'}, 0x0, 0x70, 0x98}, @common=@unspec=@NFQUEUE0={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x2c0) ioctl$USBDEVFS_RESETEP(r0, 0xc0185502, 0x0) 06:55:46 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f0000000200)=@urb_type_control={0x2, {0x2}, 0x0, 0x4, &(0x7f0000000a40)={0x80, 0x16, 0x2005, 0x7, 0x8}, 0x8, 0xf8, 0x7, 0x0, 0x0, 0x5, &(0x7f0000000a80)="cfc206af3b20cc76f92c2426377a243c9d8d6008fafd2fd67138c6b064102eec84099eccfeb5a4b8a5f3f11f2b3a7efc7bb159fd9e2cfe9dfc7021a27eef2f1b8a14ae37ef3f5850a71385fa82e17ca63c6617a30e1bc3576e8ee08aac39ab0a21c7d06379bcc8bd197b3c4706285c7606cc6c43a9f9a4485fa40997c39a4da54d472ef5eb63dbcb91c23e669d6e8836e2269a1d466533236ed3bd"}) [ 2913.740944][T13461] FAULT_INJECTION: forcing a failure. [ 2913.740944][T13461] name failslab, interval 1, probability 0, space 0, times 0 [ 2913.754207][T13461] CPU: 0 PID: 13461 Comm: syz-executor.4 Tainted: G W 5.4.233-syzkaller-00019-gd5ed2ca98e48 #0 [ 2913.765808][T13461] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/14/2023 [ 2913.775839][T13461] Call Trace: [ 2913.779104][T13461] dump_stack+0x1d8/0x241 [ 2913.783404][T13461] ? panic+0x768/0x768 [ 2913.787441][T13461] ? idr_alloc_cyclic+0x369/0x5d0 [ 2913.792432][T13461] ? nf_ct_l4proto_log_invalid+0x258/0x258 [ 2913.798207][T13461] ? selinux_path_notify+0x6d0/0x6d0 [ 2913.803461][T13461] should_fail+0x71f/0x880 [ 2913.807848][T13461] ? setup_fault_attr+0x3d0/0x3d0 [ 2913.812843][T13461] ? security_kernfs_init_security+0x75/0x90 [ 2913.818810][T13461] ? __kernfs_new_node+0xdb/0x6e0 [ 2913.823803][T13461] should_failslab+0x5/0x20 [ 2913.828277][T13461] kmem_cache_alloc+0x24/0x220 [ 2913.833009][T13461] __kernfs_new_node+0xdb/0x6e0 [ 2913.837830][T13461] ? kernfs_new_node+0x160/0x160 [ 2913.842734][T13461] ? kernfs_activate+0x2fe/0x320 [ 2913.847644][T13461] ? mutex_unlock+0x18/0x40 [ 2913.852121][T13461] ? kernfs_add_one+0x49a/0x5b0 [ 2913.856941][T13461] kernfs_create_dir_ns+0x90/0x220 [ 2913.862022][T13461] internal_create_group+0x2c2/0xf00 [ 2913.867279][T13461] ? sysfs_create_group+0x20/0x20 [ 2913.872273][T13461] ? device_create_file+0xea/0x1b0 [ 2913.877359][T13461] ? bus_add_device+0x92/0x3f0 [ 2913.882096][T13461] dpm_sysfs_add+0x65/0x270 [ 2913.886568][T13461] device_add+0x536/0xbb0 [ 2913.890866][T13461] device_create_vargs+0x1b9/0x210 [ 2913.895965][T13461] device_create+0xea/0x130 [ 2913.900439][T13461] ? device_create_vargs+0x210/0x210 [ 2913.905701][T13461] ? __percpu_ref_switch_mode+0x36d/0x5b0 [ 2913.911386][T13461] bdi_register_va+0x84/0x600 [ 2913.916032][T13461] bdi_register+0xd1/0x120 [ 2913.920419][T13461] ? __device_add_disk+0x551/0x1220 [ 2913.925586][T13461] ? bdi_register_va+0x600/0x600 [ 2913.930492][T13461] ? percpu_ref_resurrect+0x113/0x190 [ 2913.935833][T13461] bdi_register_owner+0x55/0xf0 [ 2913.940653][T13461] __device_add_disk+0x5d1/0x1220 [ 2913.945645][T13461] ? device_add_disk+0x30/0x30 [ 2913.950377][T13461] ? vsprintf+0x30/0x30 [ 2913.954501][T13461] ? __alloc_disk_node+0x459/0x5a0 [ 2913.959578][T13461] loop_add+0x573/0x740 [ 2913.963706][T13461] loop_control_ioctl+0x448/0x620 [ 2913.968699][T13461] ? loop_remove+0xa0/0xa0 [ 2913.973085][T13461] ? memset+0x1f/0x40 [ 2913.977034][T13461] ? fsnotify+0x1280/0x1340 [ 2913.981505][T13461] ? loop_remove+0xa0/0xa0 [ 2913.985889][T13461] do_vfs_ioctl+0x742/0x1720 [ 2913.990452][T13461] ? ioctl_preallocate+0x250/0x250 [ 2913.995534][T13461] ? __fget+0x407/0x490 [ 2913.999656][T13461] ? fget_many+0x20/0x20 [ 2914.003888][T13461] ? debug_smp_processor_id+0x20/0x20 [ 2914.009234][T13461] ? security_file_ioctl+0x7d/0xa0 [ 2914.014331][T13461] __x64_sys_ioctl+0xd4/0x110 [ 2914.018997][T13461] do_syscall_64+0xca/0x1c0 [ 2914.023471][T13461] entry_SYSCALL_64_after_hwframe+0x5c/0xc1 [ 2914.030841][T13461] ------------[ cut here ]------------ [ 2914.036456][T13461] WARNING: CPU: 0 PID: 13461 at block/genhd.c:742 __device_add_disk+0xea1/0x1220 [ 2914.045526][T13461] Modules linked in: [ 2914.049394][T13461] CPU: 0 PID: 13461 Comm: syz-executor.4 Tainted: G W 5.4.233-syzkaller-00019-gd5ed2ca98e48 #0 [ 2914.061011][T13461] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/14/2023 [ 2914.071044][T13461] RIP: 0010:__device_add_disk+0xea1/0x1220 [ 2914.076816][T13461] Code: ff ff e8 a2 ae 48 ff 0f 0b e9 52 f3 ff ff e8 96 ae 48 ff 0f 0b 42 80 3c 2b 00 0f 85 ac f8 ff ff e9 af f8 ff ff e8 7f ae 48 ff <0f> 0b e9 41 f7 ff ff e8 73 ae 48 ff e9 18 ff ff ff 44 89 f9 80 e1 [ 2914.096389][T13461] RSP: 0018:ffff8881e3477a20 EFLAGS: 00010246 [ 2914.102421][T13461] RAX: ffffffff821a8fe1 RBX: 00000000fffffff4 RCX: 0000000000040000 [ 2914.110360][T13461] RDX: ffffc9000174f000 RSI: 000000000003ffff RDI: 0000000000040000 [ 2914.118299][T13461] RBP: ffff8881e3477b58 R08: ffffffff821a871c R09: ffffea00079d1500 [ 2914.126239][T13461] R10: ffffffff84600000 R11: dffffc0000000000 R12: ffff8881d1737000 [ 2914.134181][T13461] R13: dffffc0000000000 R14: ffff8881d1737070 R15: 1ffff1103a2e6e9d [ 2914.142130][T13461] FS: 00007f9c67e08700(0000) GS:ffff8881f6e00000(0000) knlGS:0000000000000000 [ 2914.151028][T13461] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 2914.157579][T13461] CR2: 00007f9c67e07ff8 CR3: 00000001cb103000 CR4: 00000000003406f0 [ 2914.165522][T13461] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 2914.173466][T13461] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 2914.181405][T13461] Call Trace: [ 2914.184691][T13461] ? device_add_disk+0x30/0x30 [ 2914.189424][T13461] ? vsprintf+0x30/0x30 [ 2914.193569][T13461] ? __alloc_disk_node+0x459/0x5a0 [ 2914.198649][T13461] loop_add+0x573/0x740 [ 2914.202778][T13461] loop_control_ioctl+0x448/0x620 [ 2914.207772][T13461] ? loop_remove+0xa0/0xa0 [ 2914.212175][T13461] ? memset+0x1f/0x40 [ 2914.216126][T13461] ? fsnotify+0x1280/0x1340 [ 2914.220597][T13461] ? loop_remove+0xa0/0xa0 [ 2914.224982][T13461] do_vfs_ioctl+0x742/0x1720 [ 2914.229541][T13461] ? ioctl_preallocate+0x250/0x250 [ 2914.234623][T13461] ? __fget+0x407/0x490 [ 2914.238750][T13461] ? fget_many+0x20/0x20 06:55:47 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) (fail_nth: 58) 06:55:47 executing program 2: setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000240)=@raw={'raw\x00', 0x9, 0x3, 0x288, 0x0, 0xffffffff, 0xffffffff, 0xd0, 0xffffffff, 0x1f0, 0xffffffff, 0xffffffff, 0x1f0, 0xffffffff, 0x3, &(0x7f0000000040), {[{{@ip={@rand_addr=0x64010102, @loopback, 0xff000000, 0xff, 'veth1_virt_wifi\x00', 'veth1\x00', {}, {0xff}, 0x32, 0x1, 0x2}, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x1, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x3a}, 0x800, 0x5, [0x29, 0x8000, 0x12, 0x20, 0xc, 0x31, 0x3, 0x5, 0x23, 0x30, 0x9, 0x14, 0x16, 0x36, 0x32, 0x1a], 0x0, 0xba5, 0x6}}}, {{@uncond, 0x0, 0xe8, 0x120, 0x0, {}, [@common=@osf={{0x50}, {'syz1\x00', 0x0, 0xc, 0x0, 0x1}}, @inet=@rpfilter={{0x28}, {0x2}}]}, @common=@inet=@SET3={0x38, 'SET\x00', 0x3, {{0x3, 0x3, 0x7}, {0xffffffffffffffff, 0x1, 0x4}, {0x4, 0x3, 0x4}, 0x1ff, 0x5}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x2e8) (async) r0 = socket$inet(0x2, 0xa, 0x0) accept$inet(r0, 0x0, 0x0) (async, rerun: 32) setsockopt$IP_VS_SO_SET_EDIT(r0, 0x0, 0x483, &(0x7f0000000080)={0xa, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x4e21, 0x1, 'lblc\x00', 0x10, 0x4, 0x1f}, 0x2c) (rerun: 32) r1 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r1, 0x802c550a, &(0x7f0000000200)=@urb_type_bulk={0x2, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 06:55:47 executing program 1: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040)=@security={'security\x00', 0xe, 0x4, 0x260, 0xffffffff, 0x180, 0xc0, 0xc0, 0xffffffff, 0xffffffff, 0x288, 0x288, 0x288, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x70, 0x98}, @common=@inet=@SET1={0x28}}, {{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@STANDARD={0x28}}, {{@ip={@rand_addr, @broadcast, 0x0, 0x0, 'batadv_slave_0\x00', 'ip_vti0\x00'}, 0x0, 0x70, 0x98}, @common=@unspec=@NFQUEUE0={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x2c0) ioctl$USBDEVFS_RESETEP(r0, 0xc0185502, 0x0) 06:55:47 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f0000000200)=@urb_type_control={0x2, {0x2}, 0x0, 0x4, &(0x7f0000000a40)={0x80, 0x16, 0x2005, 0x7, 0x8}, 0x8, 0xf8, 0x7, 0x0, 0x0, 0x5, &(0x7f0000000a80)="cfc206af3b20cc76f92c2426377a243c9d8d6008fafd2fd67138c6b064102eec84099eccfeb5a4b8a5f3f11f2b3a7efc7bb159fd9e2cfe9dfc7021a27eef2f1b8a14ae37ef3f5850a71385fa82e17ca63c6617a30e1bc3576e8ee08aac39ab0a21c7d06379bcc8bd197b3c4706285c7606cc6c43a9f9a4485fa40997c39a4da54d472ef5eb63dbcb91c23e669d6e8836e2269a1d466533236ed3bd"}) 06:55:47 executing program 0: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f0000000200)=@urb_type_control={0x2, {0x2}, 0xfffffffb, 0x4, 0x0, 0x0, 0xf8, 0x7, 0x0, 0x0, 0x5, &(0x7f0000000a80)="cfc206af3b20cc76f92c2426377a243c9d8d6008fafd2fd67138c6b064102eec84099eccfeb5a4b8a5f3f11f2b3a7efc7bb159fd9e2cfe9dfc7021a27eef2f1b8a14ae37ef3f5850a71385fa82e17ca63c6617a30e1bc3576e8ee08aac39ab0a21c7d06379bcc8bd197b3c4706285c7606cc6c43a9f9a4485fa40997c39a4da54d472ef5eb63dbcb91c23e669d6e8836e2269a1d466533236ed3bd"}) 06:55:47 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040)=@security={'security\x00', 0xe, 0x4, 0x260, 0xffffffff, 0x180, 0xc0, 0xc0, 0xffffffff, 0xffffffff, 0x288, 0x288, 0x288, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x70, 0x98}, @common=@inet=@SET1={0x28}}, {{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@STANDARD={0x28}}, {{@ip={@rand_addr, @broadcast, 0x0, 0x0, 'batadv_slave_0\x00', 'ip_vti0\x00'}, 0x0, 0x70, 0x98}, @common=@unspec=@NFQUEUE0={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x2c0) getsockopt$EBT_SO_GET_INIT_INFO(0xffffffffffffffff, 0x0, 0x82, &(0x7f0000000300)={'nat\x00', 0x0, 0x0, 0x0, [0x7fffffffffffffff, 0x0, 0xce0, 0x20, 0x6, 0x20000000fff]}, &(0x7f0000000380)=0x78) ioctl$USBDEVFS_RESETEP(r0, 0x80045503, &(0x7f0000000080)) 06:55:47 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040)=@security={'security\x00', 0xe, 0x4, 0x260, 0xffffffff, 0x180, 0xc0, 0xc0, 0xffffffff, 0xffffffff, 0x288, 0x288, 0x288, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x70, 0x98}, @common=@inet=@SET1={0x28}}, {{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@STANDARD={0x28}}, {{@ip={@rand_addr, @broadcast, 0x0, 0x0, 'batadv_slave_0\x00', 'ip_vti0\x00'}, 0x0, 0x70, 0x98}, @common=@unspec=@NFQUEUE0={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x2c0) (async) getsockopt$EBT_SO_GET_INIT_INFO(0xffffffffffffffff, 0x0, 0x82, &(0x7f0000000300)={'nat\x00', 0x0, 0x0, 0x0, [0x7fffffffffffffff, 0x0, 0xce0, 0x20, 0x6, 0x20000000fff]}, &(0x7f0000000380)=0x78) ioctl$USBDEVFS_RESETEP(r0, 0x80045503, &(0x7f0000000080)) 06:55:47 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040)=@security={'security\x00', 0xe, 0x4, 0x260, 0xffffffff, 0x180, 0xc0, 0xc0, 0xffffffff, 0xffffffff, 0x288, 0x288, 0x288, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x70, 0x98}, @common=@inet=@SET1={0x28}}, {{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@STANDARD={0x28}}, {{@ip={@rand_addr, @broadcast, 0x0, 0x0, 'batadv_slave_0\x00', 'ip_vti0\x00'}, 0x0, 0x70, 0x98}, @common=@unspec=@NFQUEUE0={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x2c0) (async) getsockopt$EBT_SO_GET_INIT_INFO(0xffffffffffffffff, 0x0, 0x82, &(0x7f0000000300)={'nat\x00', 0x0, 0x0, 0x0, [0x7fffffffffffffff, 0x0, 0xce0, 0x20, 0x6, 0x20000000fff]}, &(0x7f0000000380)=0x78) (async) ioctl$USBDEVFS_RESETEP(r0, 0x80045503, &(0x7f0000000080)) 06:55:47 executing program 2: setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000240)=@raw={'raw\x00', 0x9, 0x3, 0x288, 0x0, 0xffffffff, 0xffffffff, 0xd0, 0xffffffff, 0x1f0, 0xffffffff, 0xffffffff, 0x1f0, 0xffffffff, 0x3, &(0x7f0000000040), {[{{@ip={@rand_addr=0x64010102, @loopback, 0xff000000, 0xff, 'veth1_virt_wifi\x00', 'veth1\x00', {}, {0xff}, 0x32, 0x1, 0x2}, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x1, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x3a}, 0x800, 0x5, [0x29, 0x8000, 0x12, 0x20, 0xc, 0x31, 0x3, 0x5, 0x23, 0x30, 0x9, 0x14, 0x16, 0x36, 0x32, 0x1a], 0x0, 0xba5, 0x6}}}, {{@uncond, 0x0, 0xe8, 0x120, 0x0, {}, [@common=@osf={{0x50}, {'syz1\x00', 0x0, 0xc, 0x0, 0x1}}, @inet=@rpfilter={{0x28}, {0x2}}]}, @common=@inet=@SET3={0x38, 'SET\x00', 0x3, {{0x3, 0x3, 0x7}, {0xffffffffffffffff, 0x1, 0x4}, {0x4, 0x3, 0x4}, 0x1ff, 0x5}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x2e8) r0 = socket$inet(0x2, 0xa, 0x0) accept$inet(r0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_EDIT(r0, 0x0, 0x483, &(0x7f0000000080)={0xa, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x4e21, 0x1, 'lblc\x00', 0x10, 0x4, 0x1f}, 0x2c) (async) r1 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r1, 0x802c550a, &(0x7f0000000200)=@urb_type_bulk={0x2, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 06:55:47 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f0000000200)=@urb_type_control={0x2, {0x2}, 0x0, 0x4, &(0x7f0000000a40)={0x80, 0x16, 0x2005, 0x7, 0x8}, 0x8, 0xf8, 0x7, 0x0, 0x0, 0x5, &(0x7f0000000a80)="cfc206af3b20cc76f92c2426377a243c9d8d6008fafd2fd67138c6b064102eec84099eccfeb5a4b8a5f3f11f2b3a7efc7bb159fd9e2cfe9dfc7021a27eef2f1b8a14ae37ef3f5850a71385fa82e17ca63c6617a30e1bc3576e8ee08aac39ab0a21c7d06379bcc8bd197b3c4706285c7606cc6c43a9f9a4485fa40997c39a4da54d472ef5eb63dbcb91c23e669d6e8836e2269a1d466533236ed3bd"}) 06:55:47 executing program 0: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f0000000200)=@urb_type_control={0x2, {0x2}, 0xfffffffb, 0x4, 0x0, 0x0, 0xf8, 0x7, 0x0, 0x0, 0x5, &(0x7f0000000a80)="cfc206af3b20cc76f92c2426377a243c9d8d6008fafd2fd67138c6b064102eec84099eccfeb5a4b8a5f3f11f2b3a7efc7bb159fd9e2cfe9dfc7021a27eef2f1b8a14ae37ef3f5850a71385fa82e17ca63c6617a30e1bc3576e8ee08aac39ab0a21c7d06379bcc8bd197b3c4706285c7606cc6c43a9f9a4485fa40997c39a4da54d472ef5eb63dbcb91c23e669d6e8836e2269a1d466533236ed3bd"}) 06:55:47 executing program 1: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040)=@security={'security\x00', 0xe, 0x4, 0x260, 0xffffffff, 0x180, 0xc0, 0xc0, 0xffffffff, 0xffffffff, 0x288, 0x288, 0x288, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x70, 0x98}, @common=@inet=@SET1={0x28}}, {{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@STANDARD={0x28}}, {{@ip={@rand_addr, @broadcast, 0x0, 0x0, 'batadv_slave_0\x00', 'ip_vti0\x00'}, 0x0, 0x70, 0x98}, @common=@unspec=@NFQUEUE0={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x2c0) ioctl$USBDEVFS_RESETEP(r0, 0xc0185502, 0x0) [ 2914.242966][T13461] ? debug_smp_processor_id+0x20/0x20 [ 2914.248308][T13461] ? security_file_ioctl+0x7d/0xa0 [ 2914.253400][T13461] __x64_sys_ioctl+0xd4/0x110 [ 2914.258045][T13461] do_syscall_64+0xca/0x1c0 [ 2914.262518][T13461] entry_SYSCALL_64_after_hwframe+0x5c/0xc1 [ 2914.268394][T13461] ---[ end trace a19802151b528bf9 ]--- [ 2914.333196][T13485] FAULT_INJECTION: forcing a failure. [ 2914.333196][T13485] name failslab, interval 1, probability 0, space 0, times 0 [ 2914.348160][T13485] CPU: 1 PID: 13485 Comm: syz-executor.4 Tainted: G W 5.4.233-syzkaller-00019-gd5ed2ca98e48 #0 [ 2914.359783][T13485] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/14/2023 [ 2914.369814][T13485] Call Trace: [ 2914.373083][T13485] dump_stack+0x1d8/0x241 [ 2914.377383][T13485] ? panic+0x768/0x768 [ 2914.381429][T13485] ? idr_alloc_cyclic+0x369/0x5d0 [ 2914.386426][T13485] ? nf_ct_l4proto_log_invalid+0x258/0x258 [ 2914.392206][T13485] ? selinux_path_notify+0x6d0/0x6d0 [ 2914.397462][T13485] should_fail+0x71f/0x880 [ 2914.401853][T13485] ? setup_fault_attr+0x3d0/0x3d0 [ 2914.406851][T13485] ? security_kernfs_init_security+0x75/0x90 [ 2914.412824][T13485] ? __kernfs_new_node+0xdb/0x6e0 [ 2914.417825][T13485] should_failslab+0x5/0x20 [ 2914.422298][T13485] kmem_cache_alloc+0x24/0x220 [ 2914.427048][T13485] __kernfs_new_node+0xdb/0x6e0 [ 2914.431876][T13485] ? kernfs_new_node+0x160/0x160 [ 2914.436791][T13485] ? kernfs_activate+0x2fe/0x320 [ 2914.441704][T13485] ? mutex_unlock+0x18/0x40 [ 2914.446176][T13485] ? kernfs_add_one+0x49a/0x5b0 [ 2914.450996][T13485] kernfs_create_dir_ns+0x90/0x220 [ 2914.456079][T13485] internal_create_group+0x2c2/0xf00 [ 2914.461335][T13485] ? sysfs_create_group+0x20/0x20 [ 2914.466349][T13485] ? device_create_file+0xea/0x1b0 [ 2914.471442][T13485] ? bus_add_device+0x92/0x3f0 [ 2914.476181][T13485] dpm_sysfs_add+0x65/0x270 [ 2914.480659][T13485] device_add+0x536/0xbb0 [ 2914.484962][T13485] device_create_vargs+0x1b9/0x210 [ 2914.490052][T13485] device_create+0xea/0x130 [ 2914.494555][T13485] ? device_create_vargs+0x210/0x210 [ 2914.499812][T13485] ? __percpu_ref_switch_mode+0x36d/0x5b0 [ 2914.505517][T13485] bdi_register_va+0x84/0x600 [ 2914.510165][T13485] bdi_register+0xd1/0x120 [ 2914.514553][T13485] ? __device_add_disk+0x551/0x1220 [ 2914.519721][T13485] ? bdi_register_va+0x600/0x600 [ 2914.524636][T13485] ? percpu_ref_resurrect+0x113/0x190 [ 2914.529990][T13485] bdi_register_owner+0x55/0xf0 [ 2914.534814][T13485] __device_add_disk+0x5d1/0x1220 [ 2914.539813][T13485] ? device_add_disk+0x30/0x30 [ 2914.544549][T13485] ? vsprintf+0x30/0x30 [ 2914.548674][T13485] ? __alloc_disk_node+0x459/0x5a0 [ 2914.553760][T13485] loop_add+0x573/0x740 [ 2914.557904][T13485] loop_control_ioctl+0x448/0x620 [ 2914.562900][T13485] ? loop_remove+0xa0/0xa0 [ 2914.567287][T13485] ? memset+0x1f/0x40 [ 2914.571239][T13485] ? fsnotify+0x1280/0x1340 [ 2914.575709][T13485] ? loop_remove+0xa0/0xa0 [ 2914.580091][T13485] do_vfs_ioctl+0x742/0x1720 [ 2914.584653][T13485] ? ioctl_preallocate+0x250/0x250 [ 2914.589732][T13485] ? __fget+0x407/0x490 [ 2914.593875][T13485] ? fget_many+0x20/0x20 [ 2914.598087][T13485] ? debug_smp_processor_id+0x20/0x20 [ 2914.603432][T13485] ? security_file_ioctl+0x7d/0xa0 [ 2914.608518][T13485] __x64_sys_ioctl+0xd4/0x110 [ 2914.613166][T13485] do_syscall_64+0xca/0x1c0 [ 2914.617644][T13485] entry_SYSCALL_64_after_hwframe+0x5c/0xc1 [ 2914.624667][T13485] ------------[ cut here ]------------ [ 2914.630123][T13485] WARNING: CPU: 1 PID: 13485 at block/genhd.c:742 __device_add_disk+0xea1/0x1220 [ 2914.639192][T13485] Modules linked in: [ 2914.643061][T13485] CPU: 1 PID: 13485 Comm: syz-executor.4 Tainted: G W 5.4.233-syzkaller-00019-gd5ed2ca98e48 #0 [ 2914.654671][T13485] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/14/2023 [ 2914.664705][T13485] RIP: 0010:__device_add_disk+0xea1/0x1220 [ 2914.670476][T13485] Code: ff ff e8 a2 ae 48 ff 0f 0b e9 52 f3 ff ff e8 96 ae 48 ff 0f 0b 42 80 3c 2b 00 0f 85 ac f8 ff ff e9 af f8 ff ff e8 7f ae 48 ff <0f> 0b e9 41 f7 ff ff e8 73 ae 48 ff e9 18 ff ff ff 44 89 f9 80 e1 [ 2914.690049][T13485] RSP: 0018:ffff8881e1117a20 EFLAGS: 00010246 [ 2914.696098][T13485] RAX: ffffffff821a8fe1 RBX: 00000000fffffff4 RCX: 0000000000040000 [ 2914.704055][T13485] RDX: ffffc9000174f000 RSI: 000000000003ffff RDI: 0000000000040000 [ 2914.711998][T13485] RBP: ffff8881e1117b58 R08: ffffffff821a871c R09: ffffea0007846240 [ 2914.719939][T13485] R10: ffffffff84600000 R11: dffffc0000000000 R12: ffff8881cf398000 [ 2914.727882][T13485] R13: dffffc0000000000 R14: ffff8881cf398070 R15: 1ffff11039e7309d [ 2914.735825][T13485] FS: 00007f9c67e08700(0000) GS:ffff8881f6f00000(0000) knlGS:0000000000000000 [ 2914.744722][T13485] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 2914.751276][T13485] CR2: 0000555556d5a728 CR3: 00000001ea543000 CR4: 00000000003406e0 [ 2914.759218][T13485] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 2914.767177][T13485] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 2914.775118][T13485] Call Trace: [ 2914.778384][T13485] ? device_add_disk+0x30/0x30 [ 2914.783115][T13485] ? vsprintf+0x30/0x30 [ 2914.787242][T13485] ? __alloc_disk_node+0x459/0x5a0 [ 2914.792328][T13485] loop_add+0x573/0x740 [ 2914.796455][T13485] loop_control_ioctl+0x448/0x620 [ 2914.801451][T13485] ? loop_remove+0xa0/0xa0 [ 2914.805837][T13485] ? memset+0x1f/0x40 [ 2914.809786][T13485] ? fsnotify+0x1280/0x1340 [ 2914.814256][T13485] ? loop_remove+0xa0/0xa0 [ 2914.818644][T13485] do_vfs_ioctl+0x742/0x1720 [ 2914.823213][T13485] ? ioctl_preallocate+0x250/0x250 [ 2914.828300][T13485] ? __fget+0x407/0x490 06:55:47 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) (fail_nth: 59) 06:55:47 executing program 3: ioctl$USBDEVFS_SUBMITURB(0xffffffffffffffff, 0x8038550a, &(0x7f0000000200)=@urb_type_control={0x2, {0x2}, 0x0, 0x4, &(0x7f0000000a40)={0x80, 0x16, 0x2005, 0x7, 0x8}, 0x8, 0xf8, 0x7, 0x0, 0x0, 0x5, &(0x7f0000000a80)="cfc206af3b20cc76f92c2426377a243c9d8d6008fafd2fd67138c6b064102eec84099eccfeb5a4b8a5f3f11f2b3a7efc7bb159fd9e2cfe9dfc7021a27eef2f1b8a14ae37ef3f5850a71385fa82e17ca63c6617a30e1bc3576e8ee08aac39ab0a21c7d06379bcc8bd197b3c4706285c7606cc6c43a9f9a4485fa40997c39a4da54d472ef5eb63dbcb91c23e669d6e8836e2269a1d466533236ed3bd"}) 06:55:47 executing program 0: ioctl$USBDEVFS_SUBMITURB(0xffffffffffffffff, 0x8038550a, &(0x7f0000000200)=@urb_type_control={0x2, {0x2}, 0xfffffffb, 0x4, 0x0, 0x0, 0xf8, 0x7, 0x0, 0x0, 0x5, &(0x7f0000000a80)="cfc206af3b20cc76f92c2426377a243c9d8d6008fafd2fd67138c6b064102eec84099eccfeb5a4b8a5f3f11f2b3a7efc7bb159fd9e2cfe9dfc7021a27eef2f1b8a14ae37ef3f5850a71385fa82e17ca63c6617a30e1bc3576e8ee08aac39ab0a21c7d06379bcc8bd197b3c4706285c7606cc6c43a9f9a4485fa40997c39a4da54d472ef5eb63dbcb91c23e669d6e8836e2269a1d466533236ed3bd"}) 06:55:47 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_CONTROL(r0, 0xc0185500, &(0x7f00000000c0)={0x0, 0x10, 0x0, 0x2, 0x37, 0xc907, &(0x7f0000000080)="0f0babe0178d6a8e9387e593d0e564ca4f01169ff6505823586f961baf41b45a19658d90be81adb036c4925906c4b8f0391ceb3075925e"}) ioctl$USBDEVFS_RELEASE_PORT(r0, 0x80045519, &(0x7f0000000040)=0x7fffffff) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_CALIPSO_C_LISTALL(r1, &(0x7f0000001600)={&(0x7f0000001500)={0x10, 0x0, 0x0, 0x40200000}, 0xc, &(0x7f00000015c0)={&(0x7f0000001540)={0x14}, 0x14}}, 0x0) sendmsg$NBD_CMD_CONNECT(r1, &(0x7f00000001c0)={&(0x7f0000000100), 0xc, &(0x7f0000000180)={&(0x7f0000000140)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="000426bd7000fedbdf25010000000c144b33177dd758577ad9dc7facd15b1800080005000000"], 0x2c}, 0x1, 0x0, 0x0, 0x801}, 0x800) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_CALIPSO_C_LISTALL(r2, &(0x7f0000001600)={&(0x7f0000001500)={0x10, 0x0, 0x0, 0x40200000}, 0xc, &(0x7f00000015c0)={&(0x7f0000001540)={0x14}, 0x14}}, 0x0) sendmsg$NLBL_CALIPSO_C_LISTALL(r2, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x3c, 0x0, 0x400, 0x70bd28, 0x25dfdbfe, {}, [@NLBL_CALIPSO_A_DOI={0x8}, @NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_DOI={0x8}, @NLBL_CALIPSO_A_DOI={0x8}, @NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x2}]}, 0x3c}}, 0x4040800) ioctl$USBDEVFS_SUBMITURB(r0, 0x802c550a, &(0x7f0000000200)=@urb_type_bulk={0x2, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0}) 06:55:47 executing program 1: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x802c550a, &(0x7f0000000200)=@urb_type_bulk={0x3, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaef, 0x0, 0x0}) ioctl$USBDEVFS_SETCONFIGURATION(r0, 0x80045505, &(0x7f0000000080)=0x1) ioctl$USBDEVFS_CLAIM_PORT(0xffffffffffffffff, 0x80045518, &(0x7f0000000040)) 06:55:47 executing program 5: syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040)=@security={'security\x00', 0xe, 0x4, 0x260, 0xffffffff, 0x180, 0xc0, 0xc0, 0xffffffff, 0xffffffff, 0x288, 0x288, 0x288, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x70, 0x98}, @common=@inet=@SET1={0x28}}, {{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@STANDARD={0x28}}, {{@ip={@rand_addr, @broadcast, 0x0, 0x0, 'batadv_slave_0\x00', 'ip_vti0\x00'}, 0x0, 0x70, 0x98}, @common=@unspec=@NFQUEUE0={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x2c0) r0 = syz_open_dev$usbfs(&(0x7f0000000380), 0x6e665f53, 0x0) ioctl$USBDEVFS_CLEAR_HALT(r0, 0x80045515, 0x0) ioctl$USBDEVFS_RESETEP(r0, 0x80045503, &(0x7f0000000300)) 06:55:47 executing program 3: ioctl$USBDEVFS_SUBMITURB(0xffffffffffffffff, 0x8038550a, &(0x7f0000000200)=@urb_type_control={0x2, {0x2}, 0x0, 0x4, &(0x7f0000000a40)={0x80, 0x16, 0x2005, 0x7, 0x8}, 0x8, 0xf8, 0x7, 0x0, 0x0, 0x5, &(0x7f0000000a80)="cfc206af3b20cc76f92c2426377a243c9d8d6008fafd2fd67138c6b064102eec84099eccfeb5a4b8a5f3f11f2b3a7efc7bb159fd9e2cfe9dfc7021a27eef2f1b8a14ae37ef3f5850a71385fa82e17ca63c6617a30e1bc3576e8ee08aac39ab0a21c7d06379bcc8bd197b3c4706285c7606cc6c43a9f9a4485fa40997c39a4da54d472ef5eb63dbcb91c23e669d6e8836e2269a1d466533236ed3bd"}) 06:55:47 executing program 5: syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) (async) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040)=@security={'security\x00', 0xe, 0x4, 0x260, 0xffffffff, 0x180, 0xc0, 0xc0, 0xffffffff, 0xffffffff, 0x288, 0x288, 0x288, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x70, 0x98}, @common=@inet=@SET1={0x28}}, {{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@STANDARD={0x28}}, {{@ip={@rand_addr, @broadcast, 0x0, 0x0, 'batadv_slave_0\x00', 'ip_vti0\x00'}, 0x0, 0x70, 0x98}, @common=@unspec=@NFQUEUE0={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x2c0) (async) r0 = syz_open_dev$usbfs(&(0x7f0000000380), 0x6e665f53, 0x0) ioctl$USBDEVFS_CLEAR_HALT(r0, 0x80045515, 0x0) (async) ioctl$USBDEVFS_RESETEP(r0, 0x80045503, &(0x7f0000000300)) 06:55:47 executing program 0: ioctl$USBDEVFS_SUBMITURB(0xffffffffffffffff, 0x8038550a, &(0x7f0000000200)=@urb_type_control={0x2, {0x2}, 0xfffffffb, 0x4, 0x0, 0x0, 0xf8, 0x7, 0x0, 0x0, 0x5, &(0x7f0000000a80)="cfc206af3b20cc76f92c2426377a243c9d8d6008fafd2fd67138c6b064102eec84099eccfeb5a4b8a5f3f11f2b3a7efc7bb159fd9e2cfe9dfc7021a27eef2f1b8a14ae37ef3f5850a71385fa82e17ca63c6617a30e1bc3576e8ee08aac39ab0a21c7d06379bcc8bd197b3c4706285c7606cc6c43a9f9a4485fa40997c39a4da54d472ef5eb63dbcb91c23e669d6e8836e2269a1d466533236ed3bd"}) 06:55:47 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_CONTROL(r0, 0xc0185500, &(0x7f00000000c0)={0x0, 0x10, 0x0, 0x2, 0x37, 0xc907, &(0x7f0000000080)="0f0babe0178d6a8e9387e593d0e564ca4f01169ff6505823586f961baf41b45a19658d90be81adb036c4925906c4b8f0391ceb3075925e"}) (async) ioctl$USBDEVFS_RELEASE_PORT(r0, 0x80045519, &(0x7f0000000040)=0x7fffffff) (async) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_CALIPSO_C_LISTALL(r1, &(0x7f0000001600)={&(0x7f0000001500)={0x10, 0x0, 0x0, 0x40200000}, 0xc, &(0x7f00000015c0)={&(0x7f0000001540)={0x14}, 0x14}}, 0x0) (async) sendmsg$NBD_CMD_CONNECT(r1, &(0x7f00000001c0)={&(0x7f0000000100), 0xc, &(0x7f0000000180)={&(0x7f0000000140)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="000426bd7000fedbdf25010000000c144b33177dd758577ad9dc7facd15b1800080005000000"], 0x2c}, 0x1, 0x0, 0x0, 0x801}, 0x800) (async) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_CALIPSO_C_LISTALL(r2, &(0x7f0000001600)={&(0x7f0000001500)={0x10, 0x0, 0x0, 0x40200000}, 0xc, &(0x7f00000015c0)={&(0x7f0000001540)={0x14}, 0x14}}, 0x0) (async) sendmsg$NLBL_CALIPSO_C_LISTALL(r2, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x3c, 0x0, 0x400, 0x70bd28, 0x25dfdbfe, {}, [@NLBL_CALIPSO_A_DOI={0x8}, @NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_DOI={0x8}, @NLBL_CALIPSO_A_DOI={0x8}, @NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x2}]}, 0x3c}}, 0x4040800) (async) ioctl$USBDEVFS_SUBMITURB(r0, 0x802c550a, &(0x7f0000000200)=@urb_type_bulk={0x2, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0}) [ 2914.832437][T13485] ? fget_many+0x20/0x20 [ 2914.836650][T13485] ? debug_smp_processor_id+0x20/0x20 [ 2914.842101][T13485] ? security_file_ioctl+0x7d/0xa0 [ 2914.847178][T13485] __x64_sys_ioctl+0xd4/0x110 [ 2914.851824][T13485] do_syscall_64+0xca/0x1c0 [ 2914.856294][T13485] entry_SYSCALL_64_after_hwframe+0x5c/0xc1 [ 2914.862167][T13485] ---[ end trace a19802151b528bfa ]--- 06:55:47 executing program 3: ioctl$USBDEVFS_SUBMITURB(0xffffffffffffffff, 0x8038550a, &(0x7f0000000200)=@urb_type_control={0x2, {0x2}, 0x0, 0x4, &(0x7f0000000a40)={0x80, 0x16, 0x2005, 0x7, 0x8}, 0x8, 0xf8, 0x7, 0x0, 0x0, 0x5, &(0x7f0000000a80)="cfc206af3b20cc76f92c2426377a243c9d8d6008fafd2fd67138c6b064102eec84099eccfeb5a4b8a5f3f11f2b3a7efc7bb159fd9e2cfe9dfc7021a27eef2f1b8a14ae37ef3f5850a71385fa82e17ca63c6617a30e1bc3576e8ee08aac39ab0a21c7d06379bcc8bd197b3c4706285c7606cc6c43a9f9a4485fa40997c39a4da54d472ef5eb63dbcb91c23e669d6e8836e2269a1d466533236ed3bd"}) 06:55:47 executing program 1: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x802c550a, &(0x7f0000000200)=@urb_type_bulk={0x3, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaef, 0x0, 0x0}) ioctl$USBDEVFS_SETCONFIGURATION(r0, 0x80045505, &(0x7f0000000080)=0x1) ioctl$USBDEVFS_CLAIM_PORT(0xffffffffffffffff, 0x80045518, &(0x7f0000000040)) [ 2914.905322][T13513] usb usb8: usbfs: interface 0 claimed by hub while 'syz-executor.1' sets config #1 [ 2914.929174][T13526] usb usb8: usbfs: interface 0 claimed by hub while 'syz-executor.1' sets config #1 [ 2914.938985][T13508] FAULT_INJECTION: forcing a failure. [ 2914.938985][T13508] name failslab, interval 1, probability 0, space 0, times 0 [ 2914.952060][T13508] CPU: 0 PID: 13508 Comm: syz-executor.4 Tainted: G W 5.4.233-syzkaller-00019-gd5ed2ca98e48 #0 [ 2914.963746][T13508] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/14/2023 [ 2914.973774][T13508] Call Trace: [ 2914.977065][T13508] dump_stack+0x1d8/0x241 [ 2914.981367][T13508] ? panic+0x768/0x768 [ 2914.985438][T13508] ? nf_ct_l4proto_log_invalid+0x258/0x258 [ 2914.991235][T13508] ? mutex_unlock+0x18/0x40 [ 2914.995716][T13508] should_fail+0x71f/0x880 [ 2915.000135][T13508] ? setup_fault_attr+0x3d0/0x3d0 [ 2915.005126][T13508] ? idr_alloc+0x2f0/0x2f0 [ 2915.009514][T13508] ? __kernfs_new_node+0xdb/0x6e0 [ 2915.014506][T13508] should_failslab+0x5/0x20 [ 2915.018980][T13508] kmem_cache_alloc+0x24/0x220 [ 2915.023817][T13508] __kernfs_new_node+0xdb/0x6e0 [ 2915.028636][T13508] ? kernfs_new_node+0x160/0x160 [ 2915.033557][T13508] ? mutex_lock+0xa5/0x110 [ 2915.037952][T13508] ? mutex_trylock+0xa0/0xa0 [ 2915.042518][T13508] kernfs_new_node+0x95/0x160 [ 2915.047164][T13508] __kernfs_create_file+0x45/0x260 [ 2915.052246][T13508] sysfs_add_file_mode_ns+0x292/0x340 [ 2915.057594][T13508] sysfs_merge_group+0x1fe/0x450 [ 2915.062519][T13508] ? sysfs_remove_groups+0xa0/0xa0 [ 2915.067598][T13508] ? device_create_file+0xea/0x1b0 [ 2915.072695][T13508] ? bus_add_device+0x92/0x3f0 [ 2915.077429][T13508] dpm_sysfs_add+0xcf/0x270 [ 2915.081903][T13508] device_add+0x536/0xbb0 [ 2915.086210][T13508] device_create_vargs+0x1b9/0x210 [ 2915.091289][T13508] device_create+0xea/0x130 [ 2915.095760][T13508] ? device_create_vargs+0x210/0x210 [ 2915.101030][T13508] ? __percpu_ref_switch_mode+0x36d/0x5b0 [ 2915.106721][T13508] bdi_register_va+0x84/0x600 [ 2915.111368][T13508] bdi_register+0xd1/0x120 [ 2915.115753][T13508] ? __device_add_disk+0x551/0x1220 [ 2915.120930][T13508] ? bdi_register_va+0x600/0x600 [ 2915.125853][T13508] ? percpu_ref_resurrect+0x113/0x190 [ 2915.131192][T13508] bdi_register_owner+0x55/0xf0 [ 2915.136012][T13508] __device_add_disk+0x5d1/0x1220 [ 2915.141020][T13508] ? device_add_disk+0x30/0x30 [ 2915.145751][T13508] ? vsprintf+0x30/0x30 [ 2915.149878][T13508] ? __alloc_disk_node+0x459/0x5a0 [ 2915.154960][T13508] loop_add+0x573/0x740 [ 2915.159090][T13508] loop_control_ioctl+0x448/0x620 [ 2915.164083][T13508] ? loop_remove+0xa0/0xa0 [ 2915.168467][T13508] ? memset+0x1f/0x40 [ 2915.172421][T13508] ? fsnotify+0x1280/0x1340 [ 2915.176892][T13508] ? loop_remove+0xa0/0xa0 [ 2915.181278][T13508] do_vfs_ioctl+0x742/0x1720 [ 2915.185838][T13508] ? ioctl_preallocate+0x250/0x250 [ 2915.190925][T13508] ? __fget+0x407/0x490 [ 2915.195052][T13508] ? fget_many+0x20/0x20 [ 2915.199263][T13508] ? debug_smp_processor_id+0x20/0x20 [ 2915.204622][T13508] ? security_file_ioctl+0x7d/0xa0 [ 2915.209788][T13508] __x64_sys_ioctl+0xd4/0x110 [ 2915.214434][T13508] do_syscall_64+0xca/0x1c0 [ 2915.218907][T13508] entry_SYSCALL_64_after_hwframe+0x5c/0xc1 [ 2915.225972][T13508] ------------[ cut here ]------------ [ 2915.231541][T13508] WARNING: CPU: 0 PID: 13508 at block/genhd.c:742 __device_add_disk+0xea1/0x1220 [ 2915.240611][T13508] Modules linked in: [ 2915.244477][T13508] CPU: 0 PID: 13508 Comm: syz-executor.4 Tainted: G W 5.4.233-syzkaller-00019-gd5ed2ca98e48 #0 [ 2915.256150][T13508] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/14/2023 [ 2915.266182][T13508] RIP: 0010:__device_add_disk+0xea1/0x1220 [ 2915.271975][T13508] Code: ff ff e8 a2 ae 48 ff 0f 0b e9 52 f3 ff ff e8 96 ae 48 ff 0f 0b 42 80 3c 2b 00 0f 85 ac f8 ff ff e9 af f8 ff ff e8 7f ae 48 ff <0f> 0b e9 41 f7 ff ff e8 73 ae 48 ff e9 18 ff ff ff 44 89 f9 80 e1 [ 2915.291551][T13508] RSP: 0018:ffff8881e9b2fa20 EFLAGS: 00010246 [ 2915.297591][T13508] RAX: ffffffff821a8fe1 RBX: 00000000fffffff4 RCX: 0000000000040000 [ 2915.305538][T13508] RDX: ffffc9000174f000 RSI: 000000000003ffff RDI: 0000000000040000 [ 2915.313484][T13508] RBP: ffff8881e9b2fb58 R08: ffffffff821a871c R09: ffffea0006a95680 [ 2915.321448][T13508] R10: ffffffff84600000 R11: dffffc0000000000 R12: ffff8881ef229000 [ 2915.329414][T13508] R13: dffffc0000000000 R14: ffff8881ef229070 R15: 1ffff1103de4529d [ 2915.337358][T13508] FS: 00007f9c67e08700(0000) GS:ffff8881f6e00000(0000) knlGS:0000000000000000 [ 2915.346254][T13508] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 2915.352809][T13508] CR2: 00007f9c67e07ff8 CR3: 00000001e9ed7000 CR4: 00000000003406f0 [ 2915.360750][T13508] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 2915.368703][T13508] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 2915.376645][T13508] Call Trace: [ 2915.379909][T13508] ? device_add_disk+0x30/0x30 [ 2915.384642][T13508] ? vsprintf+0x30/0x30 [ 2915.388768][T13508] ? __alloc_disk_node+0x459/0x5a0 [ 2915.393851][T13508] loop_add+0x573/0x740 [ 2915.397976][T13508] loop_control_ioctl+0x448/0x620 [ 2915.402971][T13508] ? loop_remove+0xa0/0xa0 [ 2915.407357][T13508] ? memset+0x1f/0x40 [ 2915.411313][T13508] ? fsnotify+0x1280/0x1340 [ 2915.415781][T13508] ? loop_remove+0xa0/0xa0 [ 2915.420164][T13508] do_vfs_ioctl+0x742/0x1720 [ 2915.424722][T13508] ? ioctl_preallocate+0x250/0x250 [ 2915.429801][T13508] ? __fget+0x407/0x490 [ 2915.433926][T13508] ? fget_many+0x20/0x20 [ 2915.438135][T13508] ? debug_smp_processor_id+0x20/0x20 [ 2915.443473][T13508] ? security_file_ioctl+0x7d/0xa0 [ 2915.448551][T13508] __x64_sys_ioctl+0xd4/0x110 [ 2915.453196][T13508] do_syscall_64+0xca/0x1c0 06:55:48 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) (fail_nth: 60) 06:55:48 executing program 3: r0 = syz_open_dev$usbfs(0x0, 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f0000000200)=@urb_type_control={0x2, {0x2}, 0x0, 0x4, &(0x7f0000000a40)={0x80, 0x16, 0x2005, 0x7, 0x8}, 0x8, 0xf8, 0x7, 0x0, 0x0, 0x5, &(0x7f0000000a80)="cfc206af3b20cc76f92c2426377a243c9d8d6008fafd2fd67138c6b064102eec84099eccfeb5a4b8a5f3f11f2b3a7efc7bb159fd9e2cfe9dfc7021a27eef2f1b8a14ae37ef3f5850a71385fa82e17ca63c6617a30e1bc3576e8ee08aac39ab0a21c7d06379bcc8bd197b3c4706285c7606cc6c43a9f9a4485fa40997c39a4da54d472ef5eb63dbcb91c23e669d6e8836e2269a1d466533236ed3bd"}) 06:55:48 executing program 0: ioctl$USBDEVFS_SUBMITURB(0xffffffffffffffff, 0x8038550a, &(0x7f0000000200)=@urb_type_control={0x2, {0x2}, 0xfffffffb, 0x4, 0x0, 0x0, 0xf8, 0x7, 0x0, 0x0, 0x5, &(0x7f0000000a80)="cfc206af3b20cc76f92c2426377a243c9d8d6008fafd2fd67138c6b064102eec84099eccfeb5a4b8a5f3f11f2b3a7efc7bb159fd9e2cfe9dfc7021a27eef2f1b8a14ae37ef3f5850a71385fa82e17ca63c6617a30e1bc3576e8ee08aac39ab0a21c7d06379bcc8bd197b3c4706285c7606cc6c43a9f9a4485fa40997c39a4da54d472ef5eb63dbcb91c23e669d6e8836e2269a1d466533236ed3bd"}) 06:55:48 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_CONTROL(r0, 0xc0185500, &(0x7f00000000c0)={0x0, 0x10, 0x0, 0x2, 0x37, 0xc907, &(0x7f0000000080)="0f0babe0178d6a8e9387e593d0e564ca4f01169ff6505823586f961baf41b45a19658d90be81adb036c4925906c4b8f0391ceb3075925e"}) (async) ioctl$USBDEVFS_RELEASE_PORT(r0, 0x80045519, &(0x7f0000000040)=0x7fffffff) (async) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_CALIPSO_C_LISTALL(r1, &(0x7f0000001600)={&(0x7f0000001500)={0x10, 0x0, 0x0, 0x40200000}, 0xc, &(0x7f00000015c0)={&(0x7f0000001540)={0x14}, 0x14}}, 0x0) sendmsg$NBD_CMD_CONNECT(r1, &(0x7f00000001c0)={&(0x7f0000000100), 0xc, &(0x7f0000000180)={&(0x7f0000000140)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="000426bd7000fedbdf25010000000c144b33177dd758577ad9dc7facd15b1800080005000000"], 0x2c}, 0x1, 0x0, 0x0, 0x801}, 0x800) (async) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_CALIPSO_C_LISTALL(r2, &(0x7f0000001600)={&(0x7f0000001500)={0x10, 0x0, 0x0, 0x40200000}, 0xc, &(0x7f00000015c0)={&(0x7f0000001540)={0x14}, 0x14}}, 0x0) (async, rerun: 32) sendmsg$NLBL_CALIPSO_C_LISTALL(r2, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x3c, 0x0, 0x400, 0x70bd28, 0x25dfdbfe, {}, [@NLBL_CALIPSO_A_DOI={0x8}, @NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_DOI={0x8}, @NLBL_CALIPSO_A_DOI={0x8}, @NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x2}]}, 0x3c}}, 0x4040800) (async, rerun: 32) ioctl$USBDEVFS_SUBMITURB(r0, 0x802c550a, &(0x7f0000000200)=@urb_type_bulk={0x2, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0}) 06:55:48 executing program 1: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x802c550a, &(0x7f0000000200)=@urb_type_bulk={0x3, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaef, 0x0, 0x0}) ioctl$USBDEVFS_SETCONFIGURATION(r0, 0x80045505, &(0x7f0000000080)=0x1) ioctl$USBDEVFS_CLAIM_PORT(0xffffffffffffffff, 0x80045518, &(0x7f0000000040)) 06:55:48 executing program 5: syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) (async) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040)=@security={'security\x00', 0xe, 0x4, 0x260, 0xffffffff, 0x180, 0xc0, 0xc0, 0xffffffff, 0xffffffff, 0x288, 0x288, 0x288, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x70, 0x98}, @common=@inet=@SET1={0x28}}, {{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@STANDARD={0x28}}, {{@ip={@rand_addr, @broadcast, 0x0, 0x0, 'batadv_slave_0\x00', 'ip_vti0\x00'}, 0x0, 0x70, 0x98}, @common=@unspec=@NFQUEUE0={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x2c0) (async) r0 = syz_open_dev$usbfs(&(0x7f0000000380), 0x6e665f53, 0x0) ioctl$USBDEVFS_CLEAR_HALT(r0, 0x80045515, 0x0) (async, rerun: 32) ioctl$USBDEVFS_RESETEP(r0, 0x80045503, &(0x7f0000000300)) (rerun: 32) 06:55:48 executing program 3: r0 = syz_open_dev$usbfs(0x0, 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f0000000200)=@urb_type_control={0x2, {0x2}, 0x0, 0x4, &(0x7f0000000a40)={0x80, 0x16, 0x2005, 0x7, 0x8}, 0x8, 0xf8, 0x7, 0x0, 0x0, 0x5, &(0x7f0000000a80)="cfc206af3b20cc76f92c2426377a243c9d8d6008fafd2fd67138c6b064102eec84099eccfeb5a4b8a5f3f11f2b3a7efc7bb159fd9e2cfe9dfc7021a27eef2f1b8a14ae37ef3f5850a71385fa82e17ca63c6617a30e1bc3576e8ee08aac39ab0a21c7d06379bcc8bd197b3c4706285c7606cc6c43a9f9a4485fa40997c39a4da54d472ef5eb63dbcb91c23e669d6e8836e2269a1d466533236ed3bd"}) 06:55:48 executing program 0: r0 = syz_open_dev$usbfs(0x0, 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f0000000200)=@urb_type_control={0x2, {0x2}, 0xfffffffb, 0x4, 0x0, 0x0, 0xf8, 0x7, 0x0, 0x0, 0x5, &(0x7f0000000a80)="cfc206af3b20cc76f92c2426377a243c9d8d6008fafd2fd67138c6b064102eec84099eccfeb5a4b8a5f3f11f2b3a7efc7bb159fd9e2cfe9dfc7021a27eef2f1b8a14ae37ef3f5850a71385fa82e17ca63c6617a30e1bc3576e8ee08aac39ab0a21c7d06379bcc8bd197b3c4706285c7606cc6c43a9f9a4485fa40997c39a4da54d472ef5eb63dbcb91c23e669d6e8836e2269a1d466533236ed3bd"}) 06:55:48 executing program 2: r0 = syz_open_dev$usbmon(&(0x7f0000000040), 0x0, 0x0) ioctl$MON_IOCX_GET(r0, 0x40189206, &(0x7f0000000100)={0x0, 0x0}) r1 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r1, 0x802c550a, &(0x7f0000000200)=@urb_type_bulk={0x2, {}, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x25, 0x31, 0x0, 0x0}) 06:55:48 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x3, 0x5b5880) r1 = syz_open_dev$loop(&(0x7f0000000300), 0x3, 0x412400) r2 = socket$inet(0x2, 0xa, 0x0) accept$inet(r2, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADD(r2, 0x0, 0x482, &(0x7f0000000440)={0x62, @remote, 0x4e20, 0x1, 'rr\x00', 0x2, 0xd4, 0x69}, 0x2c) ioctl$IOC_PR_CLEAR(r1, 0x401070cd, &(0x7f0000000340)={0x4}) r3 = socket$inet(0x2, 0xa, 0x0) accept$inet(r3, 0x0, 0x0) getsockopt$EBT_SO_GET_INFO(r3, 0x0, 0x80, &(0x7f0000000380)={'nat\x00', 0x0, 0x0, 0x0, [0xffff, 0x7, 0x0, 0xff, 0x8, 0x799]}, &(0x7f0000000400)=0x78) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040)=@security={'security\x00', 0xe, 0x4, 0x260, 0xffffffff, 0x180, 0xc0, 0xc0, 0xffffffff, 0xffffffff, 0x288, 0x288, 0x288, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x70, 0x98}, @common=@inet=@SET1={0x28}}, {{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@STANDARD={0x28}}, {{@ip={@rand_addr, @broadcast, 0x0, 0x0, 'batadv_slave_0\x00', 'ip_vti0\x00'}, 0x0, 0x70, 0x98}, @common=@unspec=@NFQUEUE0={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x2c0) ioctl$USBDEVFS_RESETEP(r0, 0x80045503, &(0x7f0000000080)) 06:55:48 executing program 1: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040)=@security={'security\x00', 0xe, 0x4, 0x260, 0xffffffff, 0x180, 0xc0, 0xc0, 0xffffffff, 0xffffffff, 0x288, 0x288, 0x288, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x70, 0x98}, @common=@inet=@SET1={0x28}}, {{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@STANDARD={0x28}}, {{@ip={@rand_addr, @broadcast, 0x0, 0x0, 'batadv_slave_0\x00', 'ip_vti0\x00'}, 0x0, 0x70, 0x98}, @common=@unspec=@NFQUEUE0={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x2c0) ioctl$USBDEVFS_RESETEP(r0, 0xc0185502, &(0x7f0000000080)) (fail_nth: 1) 06:55:48 executing program 0: r0 = syz_open_dev$usbfs(0x0, 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f0000000200)=@urb_type_control={0x2, {0x2}, 0xfffffffb, 0x4, 0x0, 0x0, 0xf8, 0x7, 0x0, 0x0, 0x5, &(0x7f0000000a80)="cfc206af3b20cc76f92c2426377a243c9d8d6008fafd2fd67138c6b064102eec84099eccfeb5a4b8a5f3f11f2b3a7efc7bb159fd9e2cfe9dfc7021a27eef2f1b8a14ae37ef3f5850a71385fa82e17ca63c6617a30e1bc3576e8ee08aac39ab0a21c7d06379bcc8bd197b3c4706285c7606cc6c43a9f9a4485fa40997c39a4da54d472ef5eb63dbcb91c23e669d6e8836e2269a1d466533236ed3bd"}) [ 2915.457673][T13508] entry_SYSCALL_64_after_hwframe+0x5c/0xc1 [ 2915.463554][T13508] ---[ end trace a19802151b528bfb ]--- [ 2915.491404][T13538] usb usb8: usbfs: interface 0 claimed by hub while 'syz-executor.1' sets config #1 [ 2915.551415][T13547] FAULT_INJECTION: forcing a failure. [ 2915.551415][T13547] name failslab, interval 1, probability 0, space 0, times 0 [ 2915.564115][T13547] CPU: 0 PID: 13547 Comm: syz-executor.4 Tainted: G W 5.4.233-syzkaller-00019-gd5ed2ca98e48 #0 [ 2915.575717][T13547] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/14/2023 [ 2915.585764][T13547] Call Trace: [ 2915.589032][T13547] dump_stack+0x1d8/0x241 [ 2915.593334][T13547] ? panic+0x768/0x768 [ 2915.597377][T13547] ? nf_ct_l4proto_log_invalid+0x258/0x258 [ 2915.603149][T13547] ? mutex_unlock+0x18/0x40 [ 2915.607621][T13547] should_fail+0x71f/0x880 [ 2915.612212][T13547] ? setup_fault_attr+0x3d0/0x3d0 [ 2915.617207][T13547] ? idr_alloc+0x2f0/0x2f0 [ 2915.621613][T13547] ? __kernfs_new_node+0xdb/0x6e0 [ 2915.626606][T13547] should_failslab+0x5/0x20 [ 2915.631078][T13547] kmem_cache_alloc+0x24/0x220 [ 2915.635813][T13547] __kernfs_new_node+0xdb/0x6e0 [ 2915.640632][T13547] ? kernfs_new_node+0x160/0x160 [ 2915.645538][T13547] ? mutex_lock+0xa5/0x110 [ 2915.650025][T13547] ? mutex_trylock+0xa0/0xa0 [ 2915.654607][T13547] kernfs_new_node+0x95/0x160 [ 2915.659254][T13547] __kernfs_create_file+0x45/0x260 [ 2915.664336][T13547] sysfs_add_file_mode_ns+0x292/0x340 [ 2915.669678][T13547] sysfs_merge_group+0x1fe/0x450 [ 2915.674584][T13547] ? sysfs_remove_groups+0xa0/0xa0 [ 2915.679666][T13547] ? device_create_file+0xea/0x1b0 [ 2915.684767][T13547] ? bus_add_device+0x92/0x3f0 [ 2915.689506][T13547] dpm_sysfs_add+0xcf/0x270 [ 2915.693986][T13547] device_add+0x536/0xbb0 [ 2915.698289][T13547] device_create_vargs+0x1b9/0x210 [ 2915.703368][T13547] device_create+0xea/0x130 [ 2915.707865][T13547] ? device_create_vargs+0x210/0x210 [ 2915.713145][T13547] ? __percpu_ref_switch_mode+0x36d/0x5b0 [ 2915.718851][T13547] bdi_register_va+0x84/0x600 [ 2915.723507][T13547] bdi_register+0xd1/0x120 [ 2915.727913][T13547] ? __device_add_disk+0x551/0x1220 [ 2915.733082][T13547] ? bdi_register_va+0x600/0x600 [ 2915.737989][T13547] ? percpu_ref_resurrect+0x113/0x190 [ 2915.743327][T13547] bdi_register_owner+0x55/0xf0 [ 2915.748179][T13547] __device_add_disk+0x5d1/0x1220 [ 2915.753172][T13547] ? device_add_disk+0x30/0x30 [ 2915.757911][T13547] ? vsprintf+0x30/0x30 [ 2915.762054][T13547] ? __alloc_disk_node+0x459/0x5a0 [ 2915.767219][T13547] loop_add+0x573/0x740 [ 2915.771344][T13547] loop_control_ioctl+0x448/0x620 [ 2915.776339][T13547] ? loop_remove+0xa0/0xa0 [ 2915.780726][T13547] ? memset+0x1f/0x40 [ 2915.784677][T13547] ? fsnotify+0x1280/0x1340 [ 2915.789151][T13547] ? loop_remove+0xa0/0xa0 [ 2915.793564][T13547] do_vfs_ioctl+0x742/0x1720 [ 2915.798126][T13547] ? ioctl_preallocate+0x250/0x250 [ 2915.803204][T13547] ? __fget+0x407/0x490 [ 2915.807326][T13547] ? fget_many+0x20/0x20 [ 2915.811555][T13547] ? debug_smp_processor_id+0x20/0x20 [ 2915.816897][T13547] ? security_file_ioctl+0x7d/0xa0 [ 2915.821974][T13547] __x64_sys_ioctl+0xd4/0x110 [ 2915.826638][T13547] do_syscall_64+0xca/0x1c0 [ 2915.831111][T13547] entry_SYSCALL_64_after_hwframe+0x5c/0xc1 [ 2915.838424][T13547] ------------[ cut here ]------------ [ 2915.843882][T13547] WARNING: CPU: 0 PID: 13547 at block/genhd.c:742 __device_add_disk+0xea1/0x1220 [ 2915.852951][T13547] Modules linked in: [ 2915.856848][T13547] CPU: 0 PID: 13547 Comm: syz-executor.4 Tainted: G W 5.4.233-syzkaller-00019-gd5ed2ca98e48 #0 [ 2915.868436][T13547] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/14/2023 [ 2915.878469][T13547] RIP: 0010:__device_add_disk+0xea1/0x1220 [ 2915.884244][T13547] Code: ff ff e8 a2 ae 48 ff 0f 0b e9 52 f3 ff ff e8 96 ae 48 ff 0f 0b 42 80 3c 2b 00 0f 85 ac f8 ff ff e9 af f8 ff ff e8 7f ae 48 ff <0f> 0b e9 41 f7 ff ff e8 73 ae 48 ff e9 18 ff ff ff 44 89 f9 80 e1 [ 2915.903816][T13547] RSP: 0018:ffff8881dfe17a20 EFLAGS: 00010246 [ 2915.909938][T13547] RAX: ffffffff821a8fe1 RBX: 00000000fffffff4 RCX: 0000000000040000 [ 2915.917903][T13547] RDX: ffffc9000174f000 RSI: 000000000003ffff RDI: 0000000000040000 [ 2915.925849][T13547] RBP: ffff8881dfe17b58 R08: ffffffff821a871c R09: ffffea0007baa300 [ 2915.933790][T13547] R10: ffffffff84600000 R11: dffffc0000000000 R12: ffff8881cb6c2000 [ 2915.941734][T13547] R13: dffffc0000000000 R14: ffff8881cb6c2070 R15: 1ffff110396d849d [ 2915.949674][T13547] FS: 00007f9c67e08700(0000) GS:ffff8881f6e00000(0000) knlGS:0000000000000000 [ 2915.958579][T13547] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 2915.965132][T13547] CR2: 00007f9c67e07ff8 CR3: 00000001e3d3d000 CR4: 00000000003406f0 [ 2915.973072][T13547] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 2915.981013][T13547] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 2915.988952][T13547] Call Trace: [ 2915.992220][T13547] ? device_add_disk+0x30/0x30 [ 2915.996956][T13547] ? vsprintf+0x30/0x30 [ 2916.001080][T13547] ? __alloc_disk_node+0x459/0x5a0 [ 2916.006188][T13547] loop_add+0x573/0x740 [ 2916.010314][T13547] loop_control_ioctl+0x448/0x620 [ 2916.015324][T13547] ? loop_remove+0xa0/0xa0 [ 2916.019733][T13547] ? memset+0x1f/0x40 [ 2916.023684][T13547] ? fsnotify+0x1280/0x1340 [ 2916.028156][T13547] ? loop_remove+0xa0/0xa0 [ 2916.032538][T13547] do_vfs_ioctl+0x742/0x1720 [ 2916.037103][T13547] ? ioctl_preallocate+0x250/0x250 [ 2916.042237][T13547] ? __fget+0x407/0x490 [ 2916.046371][T13547] ? fget_many+0x20/0x20 06:55:48 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) (fail_nth: 61) 06:55:48 executing program 2: r0 = syz_open_dev$usbmon(&(0x7f0000000040), 0x0, 0x0) ioctl$MON_IOCX_GET(r0, 0x40189206, &(0x7f0000000100)={0x0, 0x0}) r1 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r1, 0x802c550a, &(0x7f0000000200)=@urb_type_bulk={0x2, {}, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x25, 0x31, 0x0, 0x0}) syz_open_dev$usbmon(&(0x7f0000000040), 0x0, 0x0) (async) ioctl$MON_IOCX_GET(r0, 0x40189206, &(0x7f0000000100)={0x0, 0x0}) (async) syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) (async) ioctl$USBDEVFS_SUBMITURB(r1, 0x802c550a, &(0x7f0000000200)=@urb_type_bulk={0x2, {}, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x25, 0x31, 0x0, 0x0}) (async) 06:55:48 executing program 1: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040)=@security={'security\x00', 0xe, 0x4, 0x260, 0xffffffff, 0x180, 0xc0, 0xc0, 0xffffffff, 0xffffffff, 0x288, 0x288, 0x288, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x70, 0x98}, @common=@inet=@SET1={0x28}}, {{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@STANDARD={0x28}}, {{@ip={@rand_addr, @broadcast, 0x0, 0x0, 'batadv_slave_0\x00', 'ip_vti0\x00'}, 0x0, 0x70, 0x98}, @common=@unspec=@NFQUEUE0={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x2c0) ioctl$USBDEVFS_RESETEP(r0, 0xc0185502, &(0x7f0000000080)) 06:55:48 executing program 3: r0 = syz_open_dev$usbfs(0x0, 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f0000000200)=@urb_type_control={0x2, {0x2}, 0x0, 0x4, &(0x7f0000000a40)={0x80, 0x16, 0x2005, 0x7, 0x8}, 0x8, 0xf8, 0x7, 0x0, 0x0, 0x5, &(0x7f0000000a80)="cfc206af3b20cc76f92c2426377a243c9d8d6008fafd2fd67138c6b064102eec84099eccfeb5a4b8a5f3f11f2b3a7efc7bb159fd9e2cfe9dfc7021a27eef2f1b8a14ae37ef3f5850a71385fa82e17ca63c6617a30e1bc3576e8ee08aac39ab0a21c7d06379bcc8bd197b3c4706285c7606cc6c43a9f9a4485fa40997c39a4da54d472ef5eb63dbcb91c23e669d6e8836e2269a1d466533236ed3bd"}) 06:55:48 executing program 0: r0 = syz_open_dev$usbfs(0x0, 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f0000000200)=@urb_type_control={0x2, {0x2}, 0xfffffffb, 0x4, 0x0, 0x0, 0xf8, 0x7, 0x0, 0x0, 0x5, &(0x7f0000000a80)="cfc206af3b20cc76f92c2426377a243c9d8d6008fafd2fd67138c6b064102eec84099eccfeb5a4b8a5f3f11f2b3a7efc7bb159fd9e2cfe9dfc7021a27eef2f1b8a14ae37ef3f5850a71385fa82e17ca63c6617a30e1bc3576e8ee08aac39ab0a21c7d06379bcc8bd197b3c4706285c7606cc6c43a9f9a4485fa40997c39a4da54d472ef5eb63dbcb91c23e669d6e8836e2269a1d466533236ed3bd"}) 06:55:48 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x3, 0x5b5880) (async) r1 = syz_open_dev$loop(&(0x7f0000000300), 0x3, 0x412400) r2 = socket$inet(0x2, 0xa, 0x0) accept$inet(r2, 0x0, 0x0) (async) setsockopt$IP_VS_SO_SET_ADD(r2, 0x0, 0x482, &(0x7f0000000440)={0x62, @remote, 0x4e20, 0x1, 'rr\x00', 0x2, 0xd4, 0x69}, 0x2c) (async) ioctl$IOC_PR_CLEAR(r1, 0x401070cd, &(0x7f0000000340)={0x4}) (async) r3 = socket$inet(0x2, 0xa, 0x0) accept$inet(r3, 0x0, 0x0) (async) getsockopt$EBT_SO_GET_INFO(r3, 0x0, 0x80, &(0x7f0000000380)={'nat\x00', 0x0, 0x0, 0x0, [0xffff, 0x7, 0x0, 0xff, 0x8, 0x799]}, &(0x7f0000000400)=0x78) (async) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040)=@security={'security\x00', 0xe, 0x4, 0x260, 0xffffffff, 0x180, 0xc0, 0xc0, 0xffffffff, 0xffffffff, 0x288, 0x288, 0x288, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x70, 0x98}, @common=@inet=@SET1={0x28}}, {{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@STANDARD={0x28}}, {{@ip={@rand_addr, @broadcast, 0x0, 0x0, 'batadv_slave_0\x00', 'ip_vti0\x00'}, 0x0, 0x70, 0x98}, @common=@unspec=@NFQUEUE0={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x2c0) (async) ioctl$USBDEVFS_RESETEP(r0, 0x80045503, &(0x7f0000000080)) 06:55:48 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x0, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f0000000200)=@urb_type_control={0x2, {0x2}, 0x0, 0x4, &(0x7f0000000a40)={0x80, 0x16, 0x2005, 0x7, 0x8}, 0x8, 0xf8, 0x7, 0x0, 0x0, 0x5, &(0x7f0000000a80)="cfc206af3b20cc76f92c2426377a243c9d8d6008fafd2fd67138c6b064102eec84099eccfeb5a4b8a5f3f11f2b3a7efc7bb159fd9e2cfe9dfc7021a27eef2f1b8a14ae37ef3f5850a71385fa82e17ca63c6617a30e1bc3576e8ee08aac39ab0a21c7d06379bcc8bd197b3c4706285c7606cc6c43a9f9a4485fa40997c39a4da54d472ef5eb63dbcb91c23e669d6e8836e2269a1d466533236ed3bd"}) 06:55:48 executing program 0: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x0, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f0000000200)=@urb_type_control={0x2, {0x2}, 0xfffffffb, 0x4, 0x0, 0x0, 0xf8, 0x7, 0x0, 0x0, 0x5, &(0x7f0000000a80)="cfc206af3b20cc76f92c2426377a243c9d8d6008fafd2fd67138c6b064102eec84099eccfeb5a4b8a5f3f11f2b3a7efc7bb159fd9e2cfe9dfc7021a27eef2f1b8a14ae37ef3f5850a71385fa82e17ca63c6617a30e1bc3576e8ee08aac39ab0a21c7d06379bcc8bd197b3c4706285c7606cc6c43a9f9a4485fa40997c39a4da54d472ef5eb63dbcb91c23e669d6e8836e2269a1d466533236ed3bd"}) 06:55:48 executing program 1: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040)=@security={'security\x00', 0xe, 0x4, 0x260, 0xffffffff, 0x180, 0xc0, 0xc0, 0xffffffff, 0xffffffff, 0x288, 0x288, 0x288, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x70, 0x98}, @common=@inet=@SET1={0x28}}, {{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@STANDARD={0x28}}, {{@ip={@rand_addr, @broadcast, 0x0, 0x0, 'batadv_slave_0\x00', 'ip_vti0\x00'}, 0x0, 0x70, 0x98}, @common=@unspec=@NFQUEUE0={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x2c0) ioctl$USBDEVFS_RESETEP(r0, 0x2, &(0x7f0000000080)) 06:55:48 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x3, 0x5b5880) (async) r1 = syz_open_dev$loop(&(0x7f0000000300), 0x3, 0x412400) (async, rerun: 32) r2 = socket$inet(0x2, 0xa, 0x0) (rerun: 32) accept$inet(r2, 0x0, 0x0) (async, rerun: 32) setsockopt$IP_VS_SO_SET_ADD(r2, 0x0, 0x482, &(0x7f0000000440)={0x62, @remote, 0x4e20, 0x1, 'rr\x00', 0x2, 0xd4, 0x69}, 0x2c) (rerun: 32) ioctl$IOC_PR_CLEAR(r1, 0x401070cd, &(0x7f0000000340)={0x4}) (async) r3 = socket$inet(0x2, 0xa, 0x0) accept$inet(r3, 0x0, 0x0) (async) getsockopt$EBT_SO_GET_INFO(r3, 0x0, 0x80, &(0x7f0000000380)={'nat\x00', 0x0, 0x0, 0x0, [0xffff, 0x7, 0x0, 0xff, 0x8, 0x799]}, &(0x7f0000000400)=0x78) (async) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040)=@security={'security\x00', 0xe, 0x4, 0x260, 0xffffffff, 0x180, 0xc0, 0xc0, 0xffffffff, 0xffffffff, 0x288, 0x288, 0x288, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x70, 0x98}, @common=@inet=@SET1={0x28}}, {{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@STANDARD={0x28}}, {{@ip={@rand_addr, @broadcast, 0x0, 0x0, 'batadv_slave_0\x00', 'ip_vti0\x00'}, 0x0, 0x70, 0x98}, @common=@unspec=@NFQUEUE0={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x2c0) ioctl$USBDEVFS_RESETEP(r0, 0x80045503, &(0x7f0000000080)) 06:55:48 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x0, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f0000000200)=@urb_type_control={0x2, {0x2}, 0x0, 0x4, &(0x7f0000000a40)={0x80, 0x16, 0x2005, 0x7, 0x8}, 0x8, 0xf8, 0x7, 0x0, 0x0, 0x5, &(0x7f0000000a80)="cfc206af3b20cc76f92c2426377a243c9d8d6008fafd2fd67138c6b064102eec84099eccfeb5a4b8a5f3f11f2b3a7efc7bb159fd9e2cfe9dfc7021a27eef2f1b8a14ae37ef3f5850a71385fa82e17ca63c6617a30e1bc3576e8ee08aac39ab0a21c7d06379bcc8bd197b3c4706285c7606cc6c43a9f9a4485fa40997c39a4da54d472ef5eb63dbcb91c23e669d6e8836e2269a1d466533236ed3bd"}) 06:55:48 executing program 0: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x0, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f0000000200)=@urb_type_control={0x2, {0x2}, 0xfffffffb, 0x4, 0x0, 0x0, 0xf8, 0x7, 0x0, 0x0, 0x5, &(0x7f0000000a80)="cfc206af3b20cc76f92c2426377a243c9d8d6008fafd2fd67138c6b064102eec84099eccfeb5a4b8a5f3f11f2b3a7efc7bb159fd9e2cfe9dfc7021a27eef2f1b8a14ae37ef3f5850a71385fa82e17ca63c6617a30e1bc3576e8ee08aac39ab0a21c7d06379bcc8bd197b3c4706285c7606cc6c43a9f9a4485fa40997c39a4da54d472ef5eb63dbcb91c23e669d6e8836e2269a1d466533236ed3bd"}) [ 2916.050583][T13547] ? debug_smp_processor_id+0x20/0x20 [ 2916.055926][T13547] ? security_file_ioctl+0x7d/0xa0 [ 2916.061037][T13547] __x64_sys_ioctl+0xd4/0x110 [ 2916.065687][T13547] do_syscall_64+0xca/0x1c0 [ 2916.070167][T13547] entry_SYSCALL_64_after_hwframe+0x5c/0xc1 [ 2916.076059][T13547] ---[ end trace a19802151b528bfc ]--- [ 2916.142198][T13565] FAULT_INJECTION: forcing a failure. [ 2916.142198][T13565] name failslab, interval 1, probability 0, space 0, times 0 [ 2916.157871][T13565] CPU: 1 PID: 13565 Comm: syz-executor.4 Tainted: G W 5.4.233-syzkaller-00019-gd5ed2ca98e48 #0 [ 2916.169579][T13565] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/14/2023 [ 2916.179642][T13565] Call Trace: [ 2916.182906][T13565] dump_stack+0x1d8/0x241 [ 2916.187290][T13565] ? panic+0x768/0x768 [ 2916.191331][T13565] ? mutex_unlock+0x18/0x40 [ 2916.195825][T13565] ? nf_ct_l4proto_log_invalid+0x258/0x258 [ 2916.201603][T13565] ? selinux_kernfs_init_security+0x14e/0x730 [ 2916.207639][T13565] ? idr_alloc_cyclic+0x369/0x5d0 [ 2916.212636][T13565] should_fail+0x71f/0x880 [ 2916.217035][T13565] ? setup_fault_attr+0x3d0/0x3d0 [ 2916.222035][T13565] ? _raw_spin_lock+0xa4/0x1b0 [ 2916.226773][T13565] ? __kernfs_new_node+0xdb/0x6e0 [ 2916.231797][T13565] should_failslab+0x5/0x20 [ 2916.236293][T13565] kmem_cache_alloc+0x24/0x220 [ 2916.241051][T13565] __kernfs_new_node+0xdb/0x6e0 [ 2916.245871][T13565] ? kernfs_new_node+0x160/0x160 [ 2916.250779][T13565] ? mutex_lock+0xa5/0x110 [ 2916.255162][T13565] ? mutex_trylock+0xa0/0xa0 [ 2916.259721][T13565] ? kernfs_activate+0x2fe/0x320 [ 2916.264627][T13565] kernfs_new_node+0x95/0x160 [ 2916.269274][T13565] __kernfs_create_file+0x45/0x260 [ 2916.274353][T13565] sysfs_add_file_mode_ns+0x292/0x340 [ 2916.279695][T13565] sysfs_merge_group+0x1fe/0x450 [ 2916.284601][T13565] ? sysfs_remove_groups+0xa0/0xa0 [ 2916.289678][T13565] ? device_create_file+0xea/0x1b0 [ 2916.294776][T13565] ? bus_add_device+0x92/0x3f0 [ 2916.299515][T13565] dpm_sysfs_add+0xcf/0x270 [ 2916.303985][T13565] device_add+0x536/0xbb0 [ 2916.308281][T13565] device_create_vargs+0x1b9/0x210 [ 2916.313357][T13565] device_create+0xea/0x130 [ 2916.317830][T13565] ? device_create_vargs+0x210/0x210 [ 2916.323083][T13565] ? __percpu_ref_switch_mode+0x36d/0x5b0 [ 2916.328771][T13565] bdi_register_va+0x84/0x600 [ 2916.333414][T13565] bdi_register+0xd1/0x120 [ 2916.337803][T13565] ? __device_add_disk+0x551/0x1220 [ 2916.342967][T13565] ? bdi_register_va+0x600/0x600 [ 2916.347876][T13565] ? percpu_ref_resurrect+0x113/0x190 [ 2916.353215][T13565] bdi_register_owner+0x55/0xf0 [ 2916.358034][T13565] __device_add_disk+0x5d1/0x1220 [ 2916.363043][T13565] ? device_add_disk+0x30/0x30 [ 2916.367801][T13565] ? vsprintf+0x30/0x30 [ 2916.371929][T13565] ? __alloc_disk_node+0x459/0x5a0 [ 2916.377009][T13565] loop_add+0x573/0x740 [ 2916.381139][T13565] loop_control_ioctl+0x448/0x620 [ 2916.386151][T13565] ? loop_remove+0xa0/0xa0 [ 2916.390537][T13565] ? memset+0x1f/0x40 [ 2916.394492][T13565] ? fsnotify+0x1280/0x1340 [ 2916.398963][T13565] ? loop_remove+0xa0/0xa0 [ 2916.403345][T13565] do_vfs_ioctl+0x742/0x1720 [ 2916.407906][T13565] ? ioctl_preallocate+0x250/0x250 [ 2916.412985][T13565] ? __fget+0x407/0x490 [ 2916.417107][T13565] ? fget_many+0x20/0x20 [ 2916.421321][T13565] ? debug_smp_processor_id+0x20/0x20 [ 2916.426661][T13565] ? security_file_ioctl+0x7d/0xa0 [ 2916.431746][T13565] __x64_sys_ioctl+0xd4/0x110 [ 2916.436393][T13565] do_syscall_64+0xca/0x1c0 [ 2916.440868][T13565] entry_SYSCALL_64_after_hwframe+0x5c/0xc1 [ 2916.450537][T13565] ------------[ cut here ]------------ [ 2916.455996][T13565] WARNING: CPU: 1 PID: 13565 at block/genhd.c:742 __device_add_disk+0xea1/0x1220 [ 2916.465068][T13565] Modules linked in: [ 2916.468940][T13565] CPU: 1 PID: 13565 Comm: syz-executor.4 Tainted: G W 5.4.233-syzkaller-00019-gd5ed2ca98e48 #0 [ 2916.480538][T13565] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/14/2023 [ 2916.490578][T13565] RIP: 0010:__device_add_disk+0xea1/0x1220 [ 2916.496354][T13565] Code: ff ff e8 a2 ae 48 ff 0f 0b e9 52 f3 ff ff e8 96 ae 48 ff 0f 0b 42 80 3c 2b 00 0f 85 ac f8 ff ff e9 af f8 ff ff e8 7f ae 48 ff <0f> 0b e9 41 f7 ff ff e8 73 ae 48 ff e9 18 ff ff ff 44 89 f9 80 e1 [ 2916.515926][T13565] RSP: 0018:ffff8881e983fa20 EFLAGS: 00010246 [ 2916.521961][T13565] RAX: ffffffff821a8fe1 RBX: 00000000fffffff4 RCX: 0000000000040000 [ 2916.529905][T13565] RDX: ffffc9000174f000 RSI: 000000000003ffff RDI: 0000000000040000 [ 2916.537863][T13565] RBP: ffff8881e983fb58 R08: ffffffff821a871c R09: ffffea0007914fc0 [ 2916.545802][T13565] R10: ffffffff84600000 R11: dffffc0000000000 R12: ffff8881f3fdb000 [ 2916.553766][T13565] R13: dffffc0000000000 R14: ffff8881f3fdb070 R15: 1ffff1103e7fb69d [ 2916.561725][T13565] FS: 00007f9c67e08700(0000) GS:ffff8881f6f00000(0000) knlGS:0000000000000000 [ 2916.570723][T13565] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 2916.577275][T13565] CR2: 00007f78e70e2d38 CR3: 00000001e9deb000 CR4: 00000000003406e0 [ 2916.585220][T13565] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 2916.593163][T13565] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 2916.601102][T13565] Call Trace: [ 2916.604374][T13565] ? device_add_disk+0x30/0x30 [ 2916.609123][T13565] ? vsprintf+0x30/0x30 [ 2916.613271][T13565] ? __alloc_disk_node+0x459/0x5a0 [ 2916.618351][T13565] loop_add+0x573/0x740 [ 2916.622484][T13565] loop_control_ioctl+0x448/0x620 [ 2916.627481][T13565] ? loop_remove+0xa0/0xa0 [ 2916.631867][T13565] ? memset+0x1f/0x40 [ 2916.635842][T13565] ? fsnotify+0x1280/0x1340 06:55:49 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) (fail_nth: 62) 06:55:49 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x0, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f0000000200)=@urb_type_control={0x2, {0x2}, 0x0, 0x4, &(0x7f0000000a40)={0x80, 0x16, 0x2005, 0x7, 0x8}, 0x8, 0xf8, 0x7, 0x0, 0x0, 0x5, &(0x7f0000000a80)="cfc206af3b20cc76f92c2426377a243c9d8d6008fafd2fd67138c6b064102eec84099eccfeb5a4b8a5f3f11f2b3a7efc7bb159fd9e2cfe9dfc7021a27eef2f1b8a14ae37ef3f5850a71385fa82e17ca63c6617a30e1bc3576e8ee08aac39ab0a21c7d06379bcc8bd197b3c4706285c7606cc6c43a9f9a4485fa40997c39a4da54d472ef5eb63dbcb91c23e669d6e8836e2269a1d466533236ed3bd"}) 06:55:49 executing program 0: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x0, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f0000000200)=@urb_type_control={0x2, {0x2}, 0xfffffffb, 0x4, 0x0, 0x0, 0xf8, 0x7, 0x0, 0x0, 0x5, &(0x7f0000000a80)="cfc206af3b20cc76f92c2426377a243c9d8d6008fafd2fd67138c6b064102eec84099eccfeb5a4b8a5f3f11f2b3a7efc7bb159fd9e2cfe9dfc7021a27eef2f1b8a14ae37ef3f5850a71385fa82e17ca63c6617a30e1bc3576e8ee08aac39ab0a21c7d06379bcc8bd197b3c4706285c7606cc6c43a9f9a4485fa40997c39a4da54d472ef5eb63dbcb91c23e669d6e8836e2269a1d466533236ed3bd"}) 06:55:49 executing program 2: r0 = syz_open_dev$usbmon(&(0x7f0000000040), 0x0, 0x0) ioctl$MON_IOCX_GET(r0, 0x40189206, &(0x7f0000000100)={0x0, 0x0}) (async) r1 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r1, 0x802c550a, &(0x7f0000000200)=@urb_type_bulk={0x2, {}, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x25, 0x31, 0x0, 0x0}) 06:55:49 executing program 1: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040)=@security={'security\x00', 0xe, 0x4, 0x260, 0xffffffff, 0x180, 0xc0, 0xc0, 0xffffffff, 0xffffffff, 0x288, 0x288, 0x288, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x70, 0x98}, @common=@inet=@SET1={0x28}}, {{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@STANDARD={0x28}}, {{@ip={@rand_addr, @broadcast, 0x0, 0x0, 'batadv_slave_0\x00', 'ip_vti0\x00'}, 0x0, 0x70, 0x98}, @common=@unspec=@NFQUEUE0={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x2c0) ioctl$USBDEVFS_RESETEP(r0, 0x4b47, &(0x7f0000000080)) 06:55:49 executing program 5: r0 = socket$inet(0x2, 0xa, 0x0) accept$inet(r0, 0x0, 0x0) setsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f0000000300)=0x7, 0x4) r1 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_GET_SPEED(r1, 0x551f) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040)=@security={'security\x00', 0xe, 0x4, 0x260, 0xffffffff, 0x180, 0xc0, 0xc0, 0xffffffff, 0xffffffff, 0x288, 0x288, 0x288, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x70, 0x98}, @common=@inet=@SET1={0x28}}, {{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@STANDARD={0x28}}, {{@ip={@rand_addr, @broadcast, 0x0, 0x0, 'batadv_slave_0\x00', 'ip_vti0\x00'}, 0x0, 0x70, 0x98}, @common=@unspec=@NFQUEUE0={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x2c0) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f0000000340)=0x7) ioctl$USBDEVFS_RESETEP(r1, 0x80045503, &(0x7f0000000080)) ioctl$USBDEVFS_CLEAR_HALT(r1, 0x80045515, &(0x7f0000000380)={0x5}) 06:55:49 executing program 0: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x0) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f0000000200)=@urb_type_control={0x2, {0x2}, 0xfffffffb, 0x4, 0x0, 0x0, 0xf8, 0x7, 0x0, 0x0, 0x5, &(0x7f0000000a80)="cfc206af3b20cc76f92c2426377a243c9d8d6008fafd2fd67138c6b064102eec84099eccfeb5a4b8a5f3f11f2b3a7efc7bb159fd9e2cfe9dfc7021a27eef2f1b8a14ae37ef3f5850a71385fa82e17ca63c6617a30e1bc3576e8ee08aac39ab0a21c7d06379bcc8bd197b3c4706285c7606cc6c43a9f9a4485fa40997c39a4da54d472ef5eb63dbcb91c23e669d6e8836e2269a1d466533236ed3bd"}) [ 2916.640314][T13565] ? loop_remove+0xa0/0xa0 [ 2916.644698][T13565] do_vfs_ioctl+0x742/0x1720 [ 2916.649259][T13565] ? ioctl_preallocate+0x250/0x250 [ 2916.654339][T13565] ? __fget+0x407/0x490 [ 2916.658569][T13565] ? fget_many+0x20/0x20 [ 2916.662781][T13565] ? debug_smp_processor_id+0x20/0x20 [ 2916.668120][T13565] ? security_file_ioctl+0x7d/0xa0 [ 2916.673197][T13565] __x64_sys_ioctl+0xd4/0x110 [ 2916.677928][T13565] do_syscall_64+0xca/0x1c0 [ 2916.682400][T13565] entry_SYSCALL_64_after_hwframe+0x5c/0xc1 [ 2916.688261][T13565] ---[ end trace a19802151b528bfd ]--- 06:55:49 executing program 1: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040)=@security={'security\x00', 0xe, 0x4, 0x260, 0xffffffff, 0x180, 0xc0, 0xc0, 0xffffffff, 0xffffffff, 0x288, 0x288, 0x288, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x70, 0x98}, @common=@inet=@SET1={0x28}}, {{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@STANDARD={0x28}}, {{@ip={@rand_addr, @broadcast, 0x0, 0x0, 'batadv_slave_0\x00', 'ip_vti0\x00'}, 0x0, 0x70, 0x98}, @common=@unspec=@NFQUEUE0={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x2c0) ioctl$USBDEVFS_RESETEP(r0, 0x4b49, &(0x7f0000000080)) 06:55:49 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x0) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f0000000200)=@urb_type_control={0x2, {0x2}, 0x0, 0x4, &(0x7f0000000a40)={0x80, 0x16, 0x2005, 0x7, 0x8}, 0x8, 0xf8, 0x7, 0x0, 0x0, 0x5, &(0x7f0000000a80)="cfc206af3b20cc76f92c2426377a243c9d8d6008fafd2fd67138c6b064102eec84099eccfeb5a4b8a5f3f11f2b3a7efc7bb159fd9e2cfe9dfc7021a27eef2f1b8a14ae37ef3f5850a71385fa82e17ca63c6617a30e1bc3576e8ee08aac39ab0a21c7d06379bcc8bd197b3c4706285c7606cc6c43a9f9a4485fa40997c39a4da54d472ef5eb63dbcb91c23e669d6e8836e2269a1d466533236ed3bd"}) 06:55:49 executing program 1: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040)=@security={'security\x00', 0xe, 0x4, 0x260, 0xffffffff, 0x180, 0xc0, 0xc0, 0xffffffff, 0xffffffff, 0x288, 0x288, 0x288, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x70, 0x98}, @common=@inet=@SET1={0x28}}, {{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@STANDARD={0x28}}, {{@ip={@rand_addr, @broadcast, 0x0, 0x0, 'batadv_slave_0\x00', 'ip_vti0\x00'}, 0x0, 0x70, 0x98}, @common=@unspec=@NFQUEUE0={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x2c0) ioctl$USBDEVFS_RESETEP(r0, 0x541b, &(0x7f0000000080)) 06:55:49 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) r1 = syz_open_dev$usbfs(&(0x7f0000000380), 0x6e665f53, 0x0) ioctl$USBDEVFS_CLEAR_HALT(r1, 0x80045515, 0x0) ioctl$USBDEVFS_SETINTERFACE(r1, 0x80085504, &(0x7f0000000040)={0x1}) ioctl$USBDEVFS_CONNECTINFO(0xffffffffffffffff, 0x40085511, &(0x7f0000000080)) ioctl$USBDEVFS_SUBMITURB(r0, 0x802c550a, &(0x7f0000000200)=@urb_type_bulk={0x2, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 06:55:49 executing program 0: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x0) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f0000000200)=@urb_type_control={0x2, {0x2}, 0xfffffffb, 0x4, 0x0, 0x0, 0xf8, 0x7, 0x0, 0x0, 0x5, &(0x7f0000000a80)="cfc206af3b20cc76f92c2426377a243c9d8d6008fafd2fd67138c6b064102eec84099eccfeb5a4b8a5f3f11f2b3a7efc7bb159fd9e2cfe9dfc7021a27eef2f1b8a14ae37ef3f5850a71385fa82e17ca63c6617a30e1bc3576e8ee08aac39ab0a21c7d06379bcc8bd197b3c4706285c7606cc6c43a9f9a4485fa40997c39a4da54d472ef5eb63dbcb91c23e669d6e8836e2269a1d466533236ed3bd"}) [ 2916.773707][T13607] FAULT_INJECTION: forcing a failure. [ 2916.773707][T13607] name failslab, interval 1, probability 0, space 0, times 0 [ 2916.786398][T13607] CPU: 0 PID: 13607 Comm: syz-executor.4 Tainted: G W 5.4.233-syzkaller-00019-gd5ed2ca98e48 #0 [ 2916.798001][T13607] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/14/2023 [ 2916.808028][T13607] Call Trace: [ 2916.811292][T13607] dump_stack+0x1d8/0x241 [ 2916.815606][T13607] ? panic+0x768/0x768 [ 2916.819651][T13607] ? mutex_unlock+0x18/0x40 [ 2916.824129][T13607] ? nf_ct_l4proto_log_invalid+0x258/0x258 [ 2916.829911][T13607] ? selinux_kernfs_init_security+0x14e/0x730 [ 2916.835966][T13607] ? idr_alloc_cyclic+0x369/0x5d0 [ 2916.840972][T13607] should_fail+0x71f/0x880 [ 2916.845358][T13607] ? setup_fault_attr+0x3d0/0x3d0 [ 2916.850352][T13607] ? _raw_spin_lock+0xa4/0x1b0 [ 2916.855117][T13607] ? __kernfs_new_node+0xdb/0x6e0 [ 2916.860126][T13607] should_failslab+0x5/0x20 [ 2916.864613][T13607] kmem_cache_alloc+0x24/0x220 [ 2916.869348][T13607] __kernfs_new_node+0xdb/0x6e0 [ 2916.874165][T13607] ? kernfs_new_node+0x160/0x160 [ 2916.879099][T13607] ? mutex_lock+0xa5/0x110 [ 2916.883485][T13607] ? mutex_trylock+0xa0/0xa0 [ 2916.888043][T13607] ? kernfs_activate+0x2fe/0x320 [ 2916.892948][T13607] kernfs_new_node+0x95/0x160 [ 2916.897594][T13607] __kernfs_create_file+0x45/0x260 [ 2916.902672][T13607] sysfs_add_file_mode_ns+0x292/0x340 [ 2916.908010][T13607] sysfs_merge_group+0x1fe/0x450 [ 2916.912918][T13607] ? sysfs_remove_groups+0xa0/0xa0 [ 2916.918000][T13607] ? device_create_file+0xea/0x1b0 [ 2916.923077][T13607] ? bus_add_device+0x92/0x3f0 [ 2916.927806][T13607] dpm_sysfs_add+0xcf/0x270 [ 2916.932278][T13607] device_add+0x536/0xbb0 [ 2916.936575][T13607] device_create_vargs+0x1b9/0x210 [ 2916.941655][T13607] device_create+0xea/0x130 [ 2916.946144][T13607] ? device_create_vargs+0x210/0x210 [ 2916.951420][T13607] ? __percpu_ref_switch_mode+0x36d/0x5b0 [ 2916.957110][T13607] bdi_register_va+0x84/0x600 [ 2916.961756][T13607] bdi_register+0xd1/0x120 [ 2916.966142][T13607] ? __device_add_disk+0x551/0x1220 [ 2916.971306][T13607] ? bdi_register_va+0x600/0x600 [ 2916.976211][T13607] ? percpu_ref_resurrect+0x113/0x190 [ 2916.981548][T13607] bdi_register_owner+0x55/0xf0 [ 2916.986386][T13607] __device_add_disk+0x5d1/0x1220 [ 2916.991380][T13607] ? device_add_disk+0x30/0x30 [ 2916.996112][T13607] ? vsprintf+0x30/0x30 [ 2917.000246][T13607] ? __alloc_disk_node+0x459/0x5a0 [ 2917.005325][T13607] loop_add+0x573/0x740 [ 2917.009468][T13607] loop_control_ioctl+0x448/0x620 [ 2917.014463][T13607] ? loop_remove+0xa0/0xa0 [ 2917.018850][T13607] ? memset+0x1f/0x40 [ 2917.022818][T13607] ? fsnotify+0x1280/0x1340 [ 2917.027288][T13607] ? loop_remove+0xa0/0xa0 [ 2917.031671][T13607] do_vfs_ioctl+0x742/0x1720 [ 2917.036232][T13607] ? ioctl_preallocate+0x250/0x250 [ 2917.041310][T13607] ? __fget+0x407/0x490 [ 2917.045434][T13607] ? fget_many+0x20/0x20 [ 2917.049646][T13607] ? debug_smp_processor_id+0x20/0x20 [ 2917.054988][T13607] ? security_file_ioctl+0x7d/0xa0 [ 2917.060073][T13607] __x64_sys_ioctl+0xd4/0x110 [ 2917.064727][T13607] do_syscall_64+0xca/0x1c0 [ 2917.069198][T13607] entry_SYSCALL_64_after_hwframe+0x5c/0xc1 [ 2917.075510][T13607] ------------[ cut here ]------------ [ 2917.080963][T13607] WARNING: CPU: 0 PID: 13607 at block/genhd.c:742 __device_add_disk+0xea1/0x1220 [ 2917.090032][T13607] Modules linked in: [ 2917.093900][T13607] CPU: 0 PID: 13607 Comm: syz-executor.4 Tainted: G W 5.4.233-syzkaller-00019-gd5ed2ca98e48 #0 [ 2917.105486][T13607] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/14/2023 [ 2917.115542][T13607] RIP: 0010:__device_add_disk+0xea1/0x1220 [ 2917.121314][T13607] Code: ff ff e8 a2 ae 48 ff 0f 0b e9 52 f3 ff ff e8 96 ae 48 ff 0f 0b 42 80 3c 2b 00 0f 85 ac f8 ff ff e9 af f8 ff ff e8 7f ae 48 ff <0f> 0b e9 41 f7 ff ff e8 73 ae 48 ff e9 18 ff ff ff 44 89 f9 80 e1 [ 2917.140886][T13607] RSP: 0018:ffff8881e6017a20 EFLAGS: 00010246 [ 2917.146919][T13607] RAX: ffffffff821a8fe1 RBX: 00000000fffffff4 RCX: 0000000000040000 [ 2917.154863][T13607] RDX: ffffc9000174f000 RSI: 000000000003ffff RDI: 0000000000040000 [ 2917.162825][T13607] RBP: ffff8881e6017b58 R08: ffffffff821a871c R09: ffffea0007a008c0 [ 2917.170769][T13607] R10: ffffffff84600000 R11: dffffc0000000000 R12: ffff8881d081c000 [ 2917.178722][T13607] R13: dffffc0000000000 R14: ffff8881d081c070 R15: 1ffff1103a10389d [ 2917.186682][T13607] FS: 00007f9c67e08700(0000) GS:ffff8881f6e00000(0000) knlGS:0000000000000000 [ 2917.195584][T13607] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 2917.202146][T13607] CR2: 00007f9c67e07ff8 CR3: 00000001e9deb000 CR4: 00000000003406f0 [ 2917.210123][T13607] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 2917.218083][T13607] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 2917.226025][T13607] Call Trace: [ 2917.229293][T13607] ? device_add_disk+0x30/0x30 [ 2917.234026][T13607] ? vsprintf+0x30/0x30 [ 2917.238151][T13607] ? __alloc_disk_node+0x459/0x5a0 [ 2917.243248][T13607] loop_add+0x573/0x740 [ 2917.247392][T13607] loop_control_ioctl+0x448/0x620 [ 2917.252386][T13607] ? loop_remove+0xa0/0xa0 [ 2917.256774][T13607] ? memset+0x1f/0x40 [ 2917.260729][T13607] ? fsnotify+0x1280/0x1340 [ 2917.265203][T13607] ? loop_remove+0xa0/0xa0 [ 2917.269762][T13607] do_vfs_ioctl+0x742/0x1720 06:55:50 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) (fail_nth: 63) 06:55:50 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x0) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f0000000200)=@urb_type_control={0x2, {0x2}, 0x0, 0x4, &(0x7f0000000a40)={0x80, 0x16, 0x2005, 0x7, 0x8}, 0x8, 0xf8, 0x7, 0x0, 0x0, 0x5, &(0x7f0000000a80)="cfc206af3b20cc76f92c2426377a243c9d8d6008fafd2fd67138c6b064102eec84099eccfeb5a4b8a5f3f11f2b3a7efc7bb159fd9e2cfe9dfc7021a27eef2f1b8a14ae37ef3f5850a71385fa82e17ca63c6617a30e1bc3576e8ee08aac39ab0a21c7d06379bcc8bd197b3c4706285c7606cc6c43a9f9a4485fa40997c39a4da54d472ef5eb63dbcb91c23e669d6e8836e2269a1d466533236ed3bd"}) 06:55:50 executing program 5: socket$inet(0x2, 0xa, 0x0) (async) r0 = socket$inet(0x2, 0xa, 0x0) accept$inet(r0, 0x0, 0x0) (async) accept$inet(r0, 0x0, 0x0) setsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f0000000300)=0x7, 0x4) r1 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_GET_SPEED(r1, 0x551f) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040)=@security={'security\x00', 0xe, 0x4, 0x260, 0xffffffff, 0x180, 0xc0, 0xc0, 0xffffffff, 0xffffffff, 0x288, 0x288, 0x288, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x70, 0x98}, @common=@inet=@SET1={0x28}}, {{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@STANDARD={0x28}}, {{@ip={@rand_addr, @broadcast, 0x0, 0x0, 'batadv_slave_0\x00', 'ip_vti0\x00'}, 0x0, 0x70, 0x98}, @common=@unspec=@NFQUEUE0={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x2c0) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f0000000340)=0x7) ioctl$USBDEVFS_RESETEP(r1, 0x80045503, &(0x7f0000000080)) (async) ioctl$USBDEVFS_RESETEP(r1, 0x80045503, &(0x7f0000000080)) ioctl$USBDEVFS_CLEAR_HALT(r1, 0x80045515, &(0x7f0000000380)={0x5}) 06:55:50 executing program 1: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040)=@security={'security\x00', 0xe, 0x4, 0x260, 0xffffffff, 0x180, 0xc0, 0xc0, 0xffffffff, 0xffffffff, 0x288, 0x288, 0x288, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x70, 0x98}, @common=@inet=@SET1={0x28}}, {{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@STANDARD={0x28}}, {{@ip={@rand_addr, @broadcast, 0x0, 0x0, 'batadv_slave_0\x00', 'ip_vti0\x00'}, 0x0, 0x70, 0x98}, @common=@unspec=@NFQUEUE0={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x2c0) ioctl$USBDEVFS_RESETEP(r0, 0x5421, &(0x7f0000000080)) 06:55:50 executing program 0: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x0) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f0000000200)=@urb_type_control={0x2, {0x2}, 0xfffffffb, 0x4, 0x0, 0x0, 0xf8, 0x7, 0x0, 0x0, 0x5, &(0x7f0000000a80)="cfc206af3b20cc76f92c2426377a243c9d8d6008fafd2fd67138c6b064102eec84099eccfeb5a4b8a5f3f11f2b3a7efc7bb159fd9e2cfe9dfc7021a27eef2f1b8a14ae37ef3f5850a71385fa82e17ca63c6617a30e1bc3576e8ee08aac39ab0a21c7d06379bcc8bd197b3c4706285c7606cc6c43a9f9a4485fa40997c39a4da54d472ef5eb63dbcb91c23e669d6e8836e2269a1d466533236ed3bd"}) 06:55:50 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) (async) r1 = syz_open_dev$usbfs(&(0x7f0000000380), 0x6e665f53, 0x0) ioctl$USBDEVFS_CLEAR_HALT(r1, 0x80045515, 0x0) (async, rerun: 32) ioctl$USBDEVFS_SETINTERFACE(r1, 0x80085504, &(0x7f0000000040)={0x1}) (async, rerun: 32) ioctl$USBDEVFS_CONNECTINFO(0xffffffffffffffff, 0x40085511, &(0x7f0000000080)) (async) ioctl$USBDEVFS_SUBMITURB(r0, 0x802c550a, &(0x7f0000000200)=@urb_type_bulk={0x2, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 06:55:50 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x0) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f0000000200)=@urb_type_control={0x2, {0x2}, 0x0, 0x4, &(0x7f0000000a40)={0x80, 0x16, 0x2005, 0x7, 0x8}, 0x8, 0xf8, 0x7, 0x0, 0x0, 0x5, &(0x7f0000000a80)="cfc206af3b20cc76f92c2426377a243c9d8d6008fafd2fd67138c6b064102eec84099eccfeb5a4b8a5f3f11f2b3a7efc7bb159fd9e2cfe9dfc7021a27eef2f1b8a14ae37ef3f5850a71385fa82e17ca63c6617a30e1bc3576e8ee08aac39ab0a21c7d06379bcc8bd197b3c4706285c7606cc6c43a9f9a4485fa40997c39a4da54d472ef5eb63dbcb91c23e669d6e8836e2269a1d466533236ed3bd"}) 06:55:50 executing program 0: syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(0xffffffffffffffff, 0x8038550a, &(0x7f0000000200)=@urb_type_control={0x2, {0x2}, 0xfffffffb, 0x4, 0x0, 0x0, 0xf8, 0x7, 0x0, 0x0, 0x5, &(0x7f0000000a80)="cfc206af3b20cc76f92c2426377a243c9d8d6008fafd2fd67138c6b064102eec84099eccfeb5a4b8a5f3f11f2b3a7efc7bb159fd9e2cfe9dfc7021a27eef2f1b8a14ae37ef3f5850a71385fa82e17ca63c6617a30e1bc3576e8ee08aac39ab0a21c7d06379bcc8bd197b3c4706285c7606cc6c43a9f9a4485fa40997c39a4da54d472ef5eb63dbcb91c23e669d6e8836e2269a1d466533236ed3bd"}) 06:55:50 executing program 5: r0 = socket$inet(0x2, 0xa, 0x0) accept$inet(r0, 0x0, 0x0) (async) setsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f0000000300)=0x7, 0x4) r1 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_GET_SPEED(r1, 0x551f) (async) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040)=@security={'security\x00', 0xe, 0x4, 0x260, 0xffffffff, 0x180, 0xc0, 0xc0, 0xffffffff, 0xffffffff, 0x288, 0x288, 0x288, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x70, 0x98}, @common=@inet=@SET1={0x28}}, {{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@STANDARD={0x28}}, {{@ip={@rand_addr, @broadcast, 0x0, 0x0, 'batadv_slave_0\x00', 'ip_vti0\x00'}, 0x0, 0x70, 0x98}, @common=@unspec=@NFQUEUE0={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x2c0) (async) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f0000000340)=0x7) ioctl$USBDEVFS_RESETEP(r1, 0x80045503, &(0x7f0000000080)) ioctl$USBDEVFS_CLEAR_HALT(r1, 0x80045515, &(0x7f0000000380)={0x5}) 06:55:50 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) r1 = syz_open_dev$usbfs(&(0x7f0000000380), 0x6e665f53, 0x0) ioctl$USBDEVFS_CLEAR_HALT(r1, 0x80045515, 0x0) ioctl$USBDEVFS_SETINTERFACE(r1, 0x80085504, &(0x7f0000000040)={0x1}) (async) ioctl$USBDEVFS_CONNECTINFO(0xffffffffffffffff, 0x40085511, &(0x7f0000000080)) ioctl$USBDEVFS_SUBMITURB(r0, 0x802c550a, &(0x7f0000000200)=@urb_type_bulk={0x2, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 06:55:50 executing program 1: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040)=@security={'security\x00', 0xe, 0x4, 0x260, 0xffffffff, 0x180, 0xc0, 0xc0, 0xffffffff, 0xffffffff, 0x288, 0x288, 0x288, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x70, 0x98}, @common=@inet=@SET1={0x28}}, {{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@STANDARD={0x28}}, {{@ip={@rand_addr, @broadcast, 0x0, 0x0, 'batadv_slave_0\x00', 'ip_vti0\x00'}, 0x0, 0x70, 0x98}, @common=@unspec=@NFQUEUE0={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x2c0) ioctl$USBDEVFS_RESETEP(r0, 0x5450, &(0x7f0000000080)) [ 2917.274329][T13607] ? ioctl_preallocate+0x250/0x250 [ 2917.279409][T13607] ? __fget+0x407/0x490 [ 2917.283629][T13607] ? fget_many+0x20/0x20 [ 2917.287839][T13607] ? debug_smp_processor_id+0x20/0x20 [ 2917.293183][T13607] ? security_file_ioctl+0x7d/0xa0 [ 2917.298268][T13607] __x64_sys_ioctl+0xd4/0x110 [ 2917.302916][T13607] do_syscall_64+0xca/0x1c0 [ 2917.307392][T13607] entry_SYSCALL_64_after_hwframe+0x5c/0xc1 [ 2917.313260][T13607] ---[ end trace a19802151b528bfe ]--- 06:55:50 executing program 2: syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) syz_open_dev$usbfs(&(0x7f0000000080), 0x0, 0x40) r0 = syz_open_dev$usbfs(&(0x7f0000000380), 0x6e665f53, 0x0) ioctl$USBDEVFS_SUBMITURB(r0, 0x802c550a, &(0x7f0000000200)=@urb_type_control={0x2, {0xf}, 0x9, 0x80, &(0x7f0000000040)={0x20, 0x14, 0x3, 0xfffd, 0x9}, 0x8, 0x0, 0x10001, 0x0, 0x2, 0x2, &(0x7f0000000240)="b8b8d997ba4d38eddfa24669802cc6316bfabc1f93c13648f2a24b066f5e5c854710ebe091d23e4541eec7ad090add7d243b15948dde924ad7114d8dd4774e735632390b5a4f44b67e3d885eba381c6aa308f2dae69b921320176fa0f4e8e8af9df5cf"}) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x1) syz_open_dev$usbfs(&(0x7f0000000100), 0x7fffffff, 0x40000) syz_open_dev$usbfs(&(0x7f0000000140), 0xffffffffffffffff, 0x709802) r1 = syz_open_dev$usbfs(&(0x7f0000000380), 0x6e665f53, 0x0) ioctl$USBDEVFS_CLEAR_HALT(r1, 0x80045515, 0x0) mmap$usbfs(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000005, 0x10010, 0xffffffffffffffff, 0x7) ioctl$USBDEVFS_RELEASEINTERFACE(r1, 0x80045510, &(0x7f00000000c0)=0x5) syz_open_dev$usbfs(&(0x7f0000000180), 0x101, 0x20081) [ 2917.369639][T13631] FAULT_INJECTION: forcing a failure. [ 2917.369639][T13631] name failslab, interval 1, probability 0, space 0, times 0 [ 2917.386289][T13631] CPU: 1 PID: 13631 Comm: syz-executor.4 Tainted: G W 5.4.233-syzkaller-00019-gd5ed2ca98e48 #0 [ 2917.397908][T13631] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/14/2023 [ 2917.407936][T13631] Call Trace: [ 2917.411205][T13631] dump_stack+0x1d8/0x241 [ 2917.415765][T13631] ? panic+0x768/0x768 [ 2917.419804][T13631] ? mutex_unlock+0x18/0x40 [ 2917.424274][T13631] ? nf_ct_l4proto_log_invalid+0x258/0x258 [ 2917.430069][T13631] ? selinux_kernfs_init_security+0x14e/0x730 [ 2917.436123][T13631] ? idr_alloc_cyclic+0x369/0x5d0 [ 2917.441211][T13631] should_fail+0x71f/0x880 [ 2917.445685][T13631] ? setup_fault_attr+0x3d0/0x3d0 [ 2917.450679][T13631] ? _raw_spin_lock+0xa4/0x1b0 [ 2917.455416][T13631] ? __kernfs_new_node+0xdb/0x6e0 [ 2917.460411][T13631] should_failslab+0x5/0x20 [ 2917.464882][T13631] kmem_cache_alloc+0x24/0x220 [ 2917.469656][T13631] __kernfs_new_node+0xdb/0x6e0 [ 2917.474485][T13631] ? kernfs_new_node+0x160/0x160 [ 2917.479425][T13631] ? mutex_lock+0xa5/0x110 [ 2917.483824][T13631] ? mutex_trylock+0xa0/0xa0 [ 2917.488385][T13631] ? kernfs_activate+0x2fe/0x320 [ 2917.493294][T13631] kernfs_new_node+0x95/0x160 [ 2917.497943][T13631] __kernfs_create_file+0x45/0x260 [ 2917.503025][T13631] sysfs_add_file_mode_ns+0x292/0x340 [ 2917.508414][T13631] sysfs_merge_group+0x1fe/0x450 [ 2917.513320][T13631] ? sysfs_remove_groups+0xa0/0xa0 [ 2917.518411][T13631] ? device_create_file+0xea/0x1b0 [ 2917.523493][T13631] ? bus_add_device+0x92/0x3f0 [ 2917.528246][T13631] dpm_sysfs_add+0xcf/0x270 [ 2917.532721][T13631] device_add+0x536/0xbb0 [ 2917.537024][T13631] device_create_vargs+0x1b9/0x210 [ 2917.542103][T13631] device_create+0xea/0x130 [ 2917.546578][T13631] ? device_create_vargs+0x210/0x210 [ 2917.551849][T13631] ? __percpu_ref_switch_mode+0x36d/0x5b0 [ 2917.557565][T13631] bdi_register_va+0x84/0x600 [ 2917.562210][T13631] bdi_register+0xd1/0x120 [ 2917.566600][T13631] ? __device_add_disk+0x551/0x1220 [ 2917.572388][T13631] ? bdi_register_va+0x600/0x600 [ 2917.577297][T13631] ? percpu_ref_resurrect+0x113/0x190 [ 2917.582727][T13631] bdi_register_owner+0x55/0xf0 [ 2917.587550][T13631] __device_add_disk+0x5d1/0x1220 [ 2917.592649][T13631] ? device_add_disk+0x30/0x30 [ 2917.597382][T13631] ? vsprintf+0x30/0x30 [ 2917.601506][T13631] ? __alloc_disk_node+0x459/0x5a0 [ 2917.606585][T13631] loop_add+0x573/0x740 [ 2917.610712][T13631] loop_control_ioctl+0x448/0x620 [ 2917.615708][T13631] ? loop_remove+0xa0/0xa0 [ 2917.620095][T13631] ? memset+0x1f/0x40 [ 2917.624045][T13631] ? fsnotify+0x1280/0x1340 [ 2917.628515][T13631] ? loop_remove+0xa0/0xa0 [ 2917.632899][T13631] do_vfs_ioctl+0x742/0x1720 [ 2917.637477][T13631] ? ioctl_preallocate+0x250/0x250 [ 2917.642557][T13631] ? __fget+0x407/0x490 [ 2917.646678][T13631] ? fget_many+0x20/0x20 [ 2917.650889][T13631] ? debug_smp_processor_id+0x20/0x20 [ 2917.656238][T13631] ? security_file_ioctl+0x7d/0xa0 [ 2917.661321][T13631] __x64_sys_ioctl+0xd4/0x110 [ 2917.665968][T13631] do_syscall_64+0xca/0x1c0 [ 2917.670450][T13631] entry_SYSCALL_64_after_hwframe+0x5c/0xc1 [ 2917.678493][T13631] ------------[ cut here ]------------ [ 2917.683962][T13631] WARNING: CPU: 1 PID: 13631 at block/genhd.c:742 __device_add_disk+0xea1/0x1220 [ 2917.693039][T13631] Modules linked in: [ 2917.696940][T13631] CPU: 1 PID: 13631 Comm: syz-executor.4 Tainted: G W 5.4.233-syzkaller-00019-gd5ed2ca98e48 #0 [ 2917.708524][T13631] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/14/2023 [ 2917.718559][T13631] RIP: 0010:__device_add_disk+0xea1/0x1220 [ 2917.724333][T13631] Code: ff ff e8 a2 ae 48 ff 0f 0b e9 52 f3 ff ff e8 96 ae 48 ff 0f 0b 42 80 3c 2b 00 0f 85 ac f8 ff ff e9 af f8 ff ff e8 7f ae 48 ff <0f> 0b e9 41 f7 ff ff e8 73 ae 48 ff e9 18 ff ff ff 44 89 f9 80 e1 [ 2917.743908][T13631] RSP: 0018:ffff8881cb4dfa20 EFLAGS: 00010246 [ 2917.749962][T13631] RAX: ffffffff821a8fe1 RBX: 00000000fffffff4 RCX: 0000000000040000 [ 2917.757900][T13631] RDX: ffffc9000174f000 RSI: 000000000003ffff RDI: 0000000000040000 [ 2917.765837][T13631] RBP: ffff8881cb4dfb58 R08: ffffffff821a871c R09: ffffea0006a95680 [ 2917.773776][T13631] R10: ffffffff84600000 R11: dffffc0000000000 R12: ffff8881d0022000 [ 2917.781732][T13631] R13: dffffc0000000000 R14: ffff8881d0022070 R15: 1ffff1103a00449d [ 2917.789679][T13631] FS: 00007f9c67e08700(0000) GS:ffff8881f6f00000(0000) knlGS:0000000000000000 [ 2917.798574][T13631] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 2917.805125][T13631] CR2: 00007f9c67e07ff8 CR3: 00000001ca51e000 CR4: 00000000003406e0 [ 2917.813067][T13631] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 2917.821009][T13631] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 2917.828964][T13631] Call Trace: [ 2917.832319][T13631] ? device_add_disk+0x30/0x30 [ 2917.837051][T13631] ? vsprintf+0x30/0x30 [ 2917.841177][T13631] ? __alloc_disk_node+0x459/0x5a0 [ 2917.846255][T13631] loop_add+0x573/0x740 [ 2917.850380][T13631] loop_control_ioctl+0x448/0x620 [ 2917.855381][T13631] ? loop_remove+0xa0/0xa0 [ 2917.859766][T13631] ? memset+0x1f/0x40 [ 2917.863715][T13631] ? fsnotify+0x1280/0x1340 06:55:50 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) (fail_nth: 64) 06:55:50 executing program 3: syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(0xffffffffffffffff, 0x8038550a, &(0x7f0000000200)=@urb_type_control={0x2, {0x2}, 0x0, 0x4, &(0x7f0000000a40)={0x80, 0x16, 0x2005, 0x7, 0x8}, 0x8, 0xf8, 0x7, 0x0, 0x0, 0x5, &(0x7f0000000a80)="cfc206af3b20cc76f92c2426377a243c9d8d6008fafd2fd67138c6b064102eec84099eccfeb5a4b8a5f3f11f2b3a7efc7bb159fd9e2cfe9dfc7021a27eef2f1b8a14ae37ef3f5850a71385fa82e17ca63c6617a30e1bc3576e8ee08aac39ab0a21c7d06379bcc8bd197b3c4706285c7606cc6c43a9f9a4485fa40997c39a4da54d472ef5eb63dbcb91c23e669d6e8836e2269a1d466533236ed3bd"}) 06:55:50 executing program 2: syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) (async) syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) syz_open_dev$usbfs(&(0x7f0000000080), 0x0, 0x40) r0 = syz_open_dev$usbfs(&(0x7f0000000380), 0x6e665f53, 0x0) ioctl$USBDEVFS_SUBMITURB(r0, 0x802c550a, &(0x7f0000000200)=@urb_type_control={0x2, {0xf}, 0x9, 0x80, &(0x7f0000000040)={0x20, 0x14, 0x3, 0xfffd, 0x9}, 0x8, 0x0, 0x10001, 0x0, 0x2, 0x2, &(0x7f0000000240)="b8b8d997ba4d38eddfa24669802cc6316bfabc1f93c13648f2a24b066f5e5c854710ebe091d23e4541eec7ad090add7d243b15948dde924ad7114d8dd4774e735632390b5a4f44b67e3d885eba381c6aa308f2dae69b921320176fa0f4e8e8af9df5cf"}) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x1) syz_open_dev$usbfs(&(0x7f0000000100), 0x7fffffff, 0x40000) (async) syz_open_dev$usbfs(&(0x7f0000000100), 0x7fffffff, 0x40000) syz_open_dev$usbfs(&(0x7f0000000140), 0xffffffffffffffff, 0x709802) r1 = syz_open_dev$usbfs(&(0x7f0000000380), 0x6e665f53, 0x0) ioctl$USBDEVFS_CLEAR_HALT(r1, 0x80045515, 0x0) (async) ioctl$USBDEVFS_CLEAR_HALT(r1, 0x80045515, 0x0) mmap$usbfs(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000005, 0x10010, 0xffffffffffffffff, 0x7) (async) mmap$usbfs(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000005, 0x10010, 0xffffffffffffffff, 0x7) ioctl$USBDEVFS_RELEASEINTERFACE(r1, 0x80045510, &(0x7f00000000c0)=0x5) syz_open_dev$usbfs(&(0x7f0000000180), 0x101, 0x20081) 06:55:50 executing program 1: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040)=@security={'security\x00', 0xe, 0x4, 0x260, 0xffffffff, 0x180, 0xc0, 0xc0, 0xffffffff, 0xffffffff, 0x288, 0x288, 0x288, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x70, 0x98}, @common=@inet=@SET1={0x28}}, {{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@STANDARD={0x28}}, {{@ip={@rand_addr, @broadcast, 0x0, 0x0, 'batadv_slave_0\x00', 'ip_vti0\x00'}, 0x0, 0x70, 0x98}, @common=@unspec=@NFQUEUE0={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x2c0) ioctl$USBDEVFS_RESETEP(r0, 0x5451, &(0x7f0000000080)) 06:55:50 executing program 0: syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(0xffffffffffffffff, 0x8038550a, &(0x7f0000000200)=@urb_type_control={0x2, {0x2}, 0xfffffffb, 0x4, 0x0, 0x0, 0xf8, 0x7, 0x0, 0x0, 0x5, &(0x7f0000000a80)="cfc206af3b20cc76f92c2426377a243c9d8d6008fafd2fd67138c6b064102eec84099eccfeb5a4b8a5f3f11f2b3a7efc7bb159fd9e2cfe9dfc7021a27eef2f1b8a14ae37ef3f5850a71385fa82e17ca63c6617a30e1bc3576e8ee08aac39ab0a21c7d06379bcc8bd197b3c4706285c7606cc6c43a9f9a4485fa40997c39a4da54d472ef5eb63dbcb91c23e669d6e8836e2269a1d466533236ed3bd"}) 06:55:50 executing program 5: setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040)=@security={'security\x00', 0xe, 0x4, 0x260, 0xffffffff, 0x180, 0xc0, 0xc0, 0xffffffff, 0xffffffff, 0x288, 0x288, 0x288, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x70, 0x98}, @common=@inet=@SET1={0x28}}, {{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@STANDARD={0x28}}, {{@ip={@rand_addr, @broadcast, 0x0, 0x0, 'batadv_slave_0\x00', 'ip_vti0\x00'}, 0x0, 0x70, 0x98}, @common=@unspec=@NFQUEUE0={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x2c0) ioctl$USBDEVFS_RESETEP(0xffffffffffffffff, 0x80045503, &(0x7f0000000080)) 06:55:50 executing program 3: syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(0xffffffffffffffff, 0x8038550a, &(0x7f0000000200)=@urb_type_control={0x2, {0x2}, 0x0, 0x4, &(0x7f0000000a40)={0x80, 0x16, 0x2005, 0x7, 0x8}, 0x8, 0xf8, 0x7, 0x0, 0x0, 0x5, &(0x7f0000000a80)="cfc206af3b20cc76f92c2426377a243c9d8d6008fafd2fd67138c6b064102eec84099eccfeb5a4b8a5f3f11f2b3a7efc7bb159fd9e2cfe9dfc7021a27eef2f1b8a14ae37ef3f5850a71385fa82e17ca63c6617a30e1bc3576e8ee08aac39ab0a21c7d06379bcc8bd197b3c4706285c7606cc6c43a9f9a4485fa40997c39a4da54d472ef5eb63dbcb91c23e669d6e8836e2269a1d466533236ed3bd"}) [ 2917.868203][T13631] ? loop_remove+0xa0/0xa0 [ 2917.872586][T13631] do_vfs_ioctl+0x742/0x1720 [ 2917.877146][T13631] ? ioctl_preallocate+0x250/0x250 [ 2917.882225][T13631] ? __fget+0x407/0x490 [ 2917.886350][T13631] ? fget_many+0x20/0x20 [ 2917.890581][T13631] ? debug_smp_processor_id+0x20/0x20 [ 2917.895924][T13631] ? security_file_ioctl+0x7d/0xa0 [ 2917.901000][T13631] __x64_sys_ioctl+0xd4/0x110 [ 2917.905647][T13631] do_syscall_64+0xca/0x1c0 [ 2917.910119][T13631] entry_SYSCALL_64_after_hwframe+0x5c/0xc1 [ 2917.915977][T13631] ---[ end trace a19802151b528bff ]--- 06:55:50 executing program 5: setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040)=@security={'security\x00', 0xe, 0x4, 0x260, 0xffffffff, 0x180, 0xc0, 0xc0, 0xffffffff, 0xffffffff, 0x288, 0x288, 0x288, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x70, 0x98}, @common=@inet=@SET1={0x28}}, {{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@STANDARD={0x28}}, {{@ip={@rand_addr, @broadcast, 0x0, 0x0, 'batadv_slave_0\x00', 'ip_vti0\x00'}, 0x0, 0x70, 0x98}, @common=@unspec=@NFQUEUE0={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x2c0) ioctl$USBDEVFS_RESETEP(0xffffffffffffffff, 0x80045503, &(0x7f0000000080)) (async) ioctl$USBDEVFS_RESETEP(0xffffffffffffffff, 0x80045503, &(0x7f0000000080)) 06:55:50 executing program 2: syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) syz_open_dev$usbfs(&(0x7f0000000080), 0x0, 0x40) r0 = syz_open_dev$usbfs(&(0x7f0000000380), 0x6e665f53, 0x0) ioctl$USBDEVFS_SUBMITURB(r0, 0x802c550a, &(0x7f0000000200)=@urb_type_control={0x2, {0xf}, 0x9, 0x80, &(0x7f0000000040)={0x20, 0x14, 0x3, 0xfffd, 0x9}, 0x8, 0x0, 0x10001, 0x0, 0x2, 0x2, &(0x7f0000000240)="b8b8d997ba4d38eddfa24669802cc6316bfabc1f93c13648f2a24b066f5e5c854710ebe091d23e4541eec7ad090add7d243b15948dde924ad7114d8dd4774e735632390b5a4f44b67e3d885eba381c6aa308f2dae69b921320176fa0f4e8e8af9df5cf"}) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x1) syz_open_dev$usbfs(&(0x7f0000000100), 0x7fffffff, 0x40000) syz_open_dev$usbfs(&(0x7f0000000140), 0xffffffffffffffff, 0x709802) r1 = syz_open_dev$usbfs(&(0x7f0000000380), 0x6e665f53, 0x0) ioctl$USBDEVFS_CLEAR_HALT(r1, 0x80045515, 0x0) mmap$usbfs(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000005, 0x10010, 0xffffffffffffffff, 0x7) ioctl$USBDEVFS_RELEASEINTERFACE(r1, 0x80045510, &(0x7f00000000c0)=0x5) syz_open_dev$usbfs(&(0x7f0000000180), 0x101, 0x20081) syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) (async) syz_open_dev$usbfs(&(0x7f0000000080), 0x0, 0x40) (async) syz_open_dev$usbfs(&(0x7f0000000380), 0x6e665f53, 0x0) (async) ioctl$USBDEVFS_SUBMITURB(r0, 0x802c550a, &(0x7f0000000200)=@urb_type_control={0x2, {0xf}, 0x9, 0x80, &(0x7f0000000040)={0x20, 0x14, 0x3, 0xfffd, 0x9}, 0x8, 0x0, 0x10001, 0x0, 0x2, 0x2, &(0x7f0000000240)="b8b8d997ba4d38eddfa24669802cc6316bfabc1f93c13648f2a24b066f5e5c854710ebe091d23e4541eec7ad090add7d243b15948dde924ad7114d8dd4774e735632390b5a4f44b67e3d885eba381c6aa308f2dae69b921320176fa0f4e8e8af9df5cf"}) (async) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x1) (async) syz_open_dev$usbfs(&(0x7f0000000100), 0x7fffffff, 0x40000) (async) syz_open_dev$usbfs(&(0x7f0000000140), 0xffffffffffffffff, 0x709802) (async) syz_open_dev$usbfs(&(0x7f0000000380), 0x6e665f53, 0x0) (async) ioctl$USBDEVFS_CLEAR_HALT(r1, 0x80045515, 0x0) (async) mmap$usbfs(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000005, 0x10010, 0xffffffffffffffff, 0x7) (async) ioctl$USBDEVFS_RELEASEINTERFACE(r1, 0x80045510, &(0x7f00000000c0)=0x5) (async) syz_open_dev$usbfs(&(0x7f0000000180), 0x101, 0x20081) (async) 06:55:50 executing program 1: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040)=@security={'security\x00', 0xe, 0x4, 0x260, 0xffffffff, 0x180, 0xc0, 0xc0, 0xffffffff, 0xffffffff, 0x288, 0x288, 0x288, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x70, 0x98}, @common=@inet=@SET1={0x28}}, {{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@STANDARD={0x28}}, {{@ip={@rand_addr, @broadcast, 0x0, 0x0, 'batadv_slave_0\x00', 'ip_vti0\x00'}, 0x0, 0x70, 0x98}, @common=@unspec=@NFQUEUE0={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x2c0) ioctl$USBDEVFS_RESETEP(r0, 0x5452, &(0x7f0000000080)) 06:55:50 executing program 0: syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(0xffffffffffffffff, 0x8038550a, &(0x7f0000000200)=@urb_type_control={0x2, {0x2}, 0xfffffffb, 0x4, 0x0, 0x0, 0xf8, 0x7, 0x0, 0x0, 0x5, &(0x7f0000000a80)="cfc206af3b20cc76f92c2426377a243c9d8d6008fafd2fd67138c6b064102eec84099eccfeb5a4b8a5f3f11f2b3a7efc7bb159fd9e2cfe9dfc7021a27eef2f1b8a14ae37ef3f5850a71385fa82e17ca63c6617a30e1bc3576e8ee08aac39ab0a21c7d06379bcc8bd197b3c4706285c7606cc6c43a9f9a4485fa40997c39a4da54d472ef5eb63dbcb91c23e669d6e8836e2269a1d466533236ed3bd"}) 06:55:50 executing program 0: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, 0x0) [ 2917.982746][T13664] FAULT_INJECTION: forcing a failure. [ 2917.982746][T13664] name failslab, interval 1, probability 0, space 0, times 0 [ 2917.995609][T13664] CPU: 1 PID: 13664 Comm: syz-executor.4 Tainted: G W 5.4.233-syzkaller-00019-gd5ed2ca98e48 #0 [ 2918.007220][T13664] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/14/2023 [ 2918.017251][T13664] Call Trace: [ 2918.020518][T13664] dump_stack+0x1d8/0x241 [ 2918.024820][T13664] ? panic+0x768/0x768 [ 2918.028863][T13664] ? nf_ct_l4proto_log_invalid+0x258/0x258 [ 2918.034648][T13664] ? mutex_unlock+0x18/0x40 [ 2918.039121][T13664] ? kernfs_add_one+0x49a/0x5b0 [ 2918.043957][T13664] should_fail+0x71f/0x880 [ 2918.048347][T13664] ? setup_fault_attr+0x3d0/0x3d0 [ 2918.053337][T13664] ? _raw_spin_lock_irqsave+0xf9/0x210 [ 2918.058765][T13664] ? _raw_spin_lock+0x1b0/0x1b0 [ 2918.063584][T13664] ? sysfs_merge_group+0x3a5/0x450 [ 2918.068670][T13664] ? kobject_uevent_env+0x258/0x6e0 [ 2918.073846][T13664] should_failslab+0x5/0x20 [ 2918.078320][T13664] kmem_cache_alloc_trace+0x28/0x240 [ 2918.083575][T13664] ? dev_uevent_filter+0xb0/0xb0 [ 2918.088745][T13664] kobject_uevent_env+0x258/0x6e0 [ 2918.093747][T13664] device_add+0x797/0xbb0 [ 2918.098074][T13664] device_create_vargs+0x1b9/0x210 [ 2918.103153][T13664] device_create+0xea/0x130 [ 2918.107625][T13664] ? device_create_vargs+0x210/0x210 [ 2918.112884][T13664] ? __percpu_ref_switch_mode+0x36d/0x5b0 [ 2918.118583][T13664] bdi_register_va+0x84/0x600 [ 2918.123231][T13664] bdi_register+0xd1/0x120 [ 2918.127618][T13664] ? __device_add_disk+0x551/0x1220 [ 2918.132785][T13664] ? bdi_register_va+0x600/0x600 [ 2918.137689][T13664] ? percpu_ref_resurrect+0x113/0x190 [ 2918.143027][T13664] bdi_register_owner+0x55/0xf0 [ 2918.147849][T13664] __device_add_disk+0x5d1/0x1220 [ 2918.152849][T13664] ? device_add_disk+0x30/0x30 [ 2918.157585][T13664] ? vsprintf+0x30/0x30 [ 2918.161814][T13664] ? __alloc_disk_node+0x459/0x5a0 [ 2918.166894][T13664] loop_add+0x573/0x740 [ 2918.171019][T13664] loop_control_ioctl+0x448/0x620 [ 2918.176009][T13664] ? loop_remove+0xa0/0xa0 [ 2918.180395][T13664] ? memset+0x1f/0x40 [ 2918.184342][T13664] ? fsnotify+0x1280/0x1340 [ 2918.188815][T13664] ? loop_remove+0xa0/0xa0 [ 2918.193199][T13664] do_vfs_ioctl+0x742/0x1720 [ 2918.197770][T13664] ? ioctl_preallocate+0x250/0x250 [ 2918.202866][T13664] ? __fget+0x407/0x490 [ 2918.207006][T13664] ? fget_many+0x20/0x20 [ 2918.211240][T13664] ? debug_smp_processor_id+0x20/0x20 [ 2918.216580][T13664] ? security_file_ioctl+0x7d/0xa0 [ 2918.221663][T13664] __x64_sys_ioctl+0xd4/0x110 [ 2918.226311][T13664] do_syscall_64+0xca/0x1c0 06:55:50 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) (fail_nth: 65) 06:55:51 executing program 3: syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(0xffffffffffffffff, 0x8038550a, &(0x7f0000000200)=@urb_type_control={0x2, {0x2}, 0x0, 0x4, &(0x7f0000000a40)={0x80, 0x16, 0x2005, 0x7, 0x8}, 0x8, 0xf8, 0x7, 0x0, 0x0, 0x5, &(0x7f0000000a80)="cfc206af3b20cc76f92c2426377a243c9d8d6008fafd2fd67138c6b064102eec84099eccfeb5a4b8a5f3f11f2b3a7efc7bb159fd9e2cfe9dfc7021a27eef2f1b8a14ae37ef3f5850a71385fa82e17ca63c6617a30e1bc3576e8ee08aac39ab0a21c7d06379bcc8bd197b3c4706285c7606cc6c43a9f9a4485fa40997c39a4da54d472ef5eb63dbcb91c23e669d6e8836e2269a1d466533236ed3bd"}) 06:55:51 executing program 1: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040)=@security={'security\x00', 0xe, 0x4, 0x260, 0xffffffff, 0x180, 0xc0, 0xc0, 0xffffffff, 0xffffffff, 0x288, 0x288, 0x288, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x70, 0x98}, @common=@inet=@SET1={0x28}}, {{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@STANDARD={0x28}}, {{@ip={@rand_addr, @broadcast, 0x0, 0x0, 'batadv_slave_0\x00', 'ip_vti0\x00'}, 0x0, 0x70, 0x98}, @common=@unspec=@NFQUEUE0={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x2c0) ioctl$USBDEVFS_RESETEP(r0, 0x5460, &(0x7f0000000080)) 06:55:51 executing program 2: r0 = syz_open_dev$usbmon(&(0x7f0000000240), 0x0, 0x0) ioctl$MON_IOCX_MFETCH(r0, 0xc0109207, &(0x7f0000000140)={0x0, 0x0, 0x400000}) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$FUSE_DIRENT(r1, &(0x7f00000000c0)={0x30, 0x2f, 0x0, [{0x2, 0x101, 0x8, 0x5, '^{}/[*:@'}]}, 0x30) ioctl$MON_IOCQ_URB_LEN(r0, 0x9201) r2 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r2, 0x802c550a, &(0x7f0000000200)=@urb_type_bulk={0x2, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$USBDEVFS_CLAIMINTERFACE(r2, 0x8004550f, &(0x7f0000000040)=0x9) 06:55:51 executing program 0: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, 0x0) 06:55:51 executing program 5: setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040)=@security={'security\x00', 0xe, 0x4, 0x260, 0xffffffff, 0x180, 0xc0, 0xc0, 0xffffffff, 0xffffffff, 0x288, 0x288, 0x288, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x70, 0x98}, @common=@inet=@SET1={0x28}}, {{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@STANDARD={0x28}}, {{@ip={@rand_addr, @broadcast, 0x0, 0x0, 'batadv_slave_0\x00', 'ip_vti0\x00'}, 0x0, 0x70, 0x98}, @common=@unspec=@NFQUEUE0={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x2c0) (async) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040)=@security={'security\x00', 0xe, 0x4, 0x260, 0xffffffff, 0x180, 0xc0, 0xc0, 0xffffffff, 0xffffffff, 0x288, 0x288, 0x288, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x70, 0x98}, @common=@inet=@SET1={0x28}}, {{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@STANDARD={0x28}}, {{@ip={@rand_addr, @broadcast, 0x0, 0x0, 'batadv_slave_0\x00', 'ip_vti0\x00'}, 0x0, 0x70, 0x98}, @common=@unspec=@NFQUEUE0={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x2c0) ioctl$USBDEVFS_RESETEP(0xffffffffffffffff, 0x80045503, &(0x7f0000000080)) 06:55:51 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, 0x0) 06:55:51 executing program 1: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040)=@security={'security\x00', 0xe, 0x4, 0x260, 0xffffffff, 0x180, 0xc0, 0xc0, 0xffffffff, 0xffffffff, 0x288, 0x288, 0x288, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x70, 0x98}, @common=@inet=@SET1={0x28}}, {{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@STANDARD={0x28}}, {{@ip={@rand_addr, @broadcast, 0x0, 0x0, 'batadv_slave_0\x00', 'ip_vti0\x00'}, 0x0, 0x70, 0x98}, @common=@unspec=@NFQUEUE0={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x2c0) ioctl$USBDEVFS_RESETEP(r0, 0x550b, &(0x7f0000000080)) [ 2918.230785][T13664] entry_SYSCALL_64_after_hwframe+0x5c/0xc1 06:55:51 executing program 0: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, 0x0) 06:55:51 executing program 2: r0 = syz_open_dev$usbmon(&(0x7f0000000240), 0x0, 0x0) ioctl$MON_IOCX_MFETCH(r0, 0xc0109207, &(0x7f0000000140)={0x0, 0x0, 0x400000}) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$FUSE_DIRENT(r1, &(0x7f00000000c0)={0x30, 0x2f, 0x0, [{0x2, 0x101, 0x8, 0x5, '^{}/[*:@'}]}, 0x30) (async) ioctl$MON_IOCQ_URB_LEN(r0, 0x9201) (async) r2 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r2, 0x802c550a, &(0x7f0000000200)=@urb_type_bulk={0x2, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$USBDEVFS_CLAIMINTERFACE(r2, 0x8004550f, &(0x7f0000000040)=0x9) 06:55:51 executing program 1: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040)=@security={'security\x00', 0xe, 0x4, 0x260, 0xffffffff, 0x180, 0xc0, 0xc0, 0xffffffff, 0xffffffff, 0x288, 0x288, 0x288, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x70, 0x98}, @common=@inet=@SET1={0x28}}, {{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@STANDARD={0x28}}, {{@ip={@rand_addr, @broadcast, 0x0, 0x0, 'batadv_slave_0\x00', 'ip_vti0\x00'}, 0x0, 0x70, 0x98}, @common=@unspec=@NFQUEUE0={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x2c0) ioctl$USBDEVFS_RESETEP(r0, 0x5514, &(0x7f0000000080)) 06:55:51 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, 0x0) [ 2918.307303][T13700] FAULT_INJECTION: forcing a failure. [ 2918.307303][T13700] name failslab, interval 1, probability 0, space 0, times 0 [ 2918.321776][T13700] CPU: 1 PID: 13700 Comm: syz-executor.4 Tainted: G W 5.4.233-syzkaller-00019-gd5ed2ca98e48 #0 [ 2918.333394][T13700] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/14/2023 [ 2918.343423][T13700] Call Trace: [ 2918.346685][T13700] dump_stack+0x1d8/0x241 [ 2918.350988][T13700] ? panic+0x768/0x768 [ 2918.355026][T13700] ? bdi_register_owner+0x55/0xf0 [ 2918.360035][T13700] ? nf_ct_l4proto_log_invalid+0x258/0x258 [ 2918.365807][T13700] ? do_vfs_ioctl+0x742/0x1720 [ 2918.370540][T13700] ? do_syscall_64+0xca/0x1c0 [ 2918.375182][T13700] ? entry_SYSCALL_64_after_hwframe+0x5c/0xc1 [ 2918.381218][T13700] should_fail+0x71f/0x880 [ 2918.385604][T13700] ? setup_fault_attr+0x3d0/0x3d0 [ 2918.390601][T13700] ? kobject_get_path+0xb3/0x190 [ 2918.395503][T13700] should_failslab+0x5/0x20 [ 2918.399981][T13700] __kmalloc+0x51/0x2b0 [ 2918.404108][T13700] kobject_get_path+0xb3/0x190 [ 2918.408838][T13700] kobject_uevent_env+0x26f/0x6e0 [ 2918.413830][T13700] device_add+0x797/0xbb0 [ 2918.418129][T13700] device_create_vargs+0x1b9/0x210 [ 2918.423211][T13700] device_create+0xea/0x130 [ 2918.427709][T13700] ? device_create_vargs+0x210/0x210 [ 2918.432967][T13700] ? __percpu_ref_switch_mode+0x36d/0x5b0 [ 2918.438653][T13700] bdi_register_va+0x84/0x600 [ 2918.443299][T13700] bdi_register+0xd1/0x120 [ 2918.447686][T13700] ? __device_add_disk+0x551/0x1220 [ 2918.452856][T13700] ? bdi_register_va+0x600/0x600 [ 2918.457784][T13700] ? percpu_ref_resurrect+0x113/0x190 [ 2918.463122][T13700] bdi_register_owner+0x55/0xf0 [ 2918.467957][T13700] __device_add_disk+0x5d1/0x1220 [ 2918.472968][T13700] ? device_add_disk+0x30/0x30 [ 2918.477702][T13700] ? vsprintf+0x30/0x30 [ 2918.481828][T13700] ? __alloc_disk_node+0x459/0x5a0 [ 2918.486911][T13700] loop_add+0x573/0x740 [ 2918.491043][T13700] loop_control_ioctl+0x448/0x620 [ 2918.496047][T13700] ? loop_remove+0xa0/0xa0 [ 2918.500443][T13700] ? memset+0x1f/0x40 06:55:51 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) (fail_nth: 66) 06:55:51 executing program 5: socket$igmp6(0xa, 0x3, 0x2) socketpair(0x2, 0x80000, 0x800, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair(0x29, 0x80000, 0xfff, &(0x7f0000000380)) r1 = socket$igmp6(0xa, 0x3, 0x2) ioctl$ifreq_SIOCGIFINDEX_wireguard(r1, 0x8933, &(0x7f0000000080)={'wg1\x00'}) setsockopt$MRT6_ASSERT(r0, 0x29, 0xcf, &(0x7f0000000300)=0xfffffffe, 0xfe19) r2 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040)=@security={'security\x00', 0xe, 0x4, 0x260, 0xffffffff, 0x180, 0xc0, 0xc0, 0xffffffff, 0xffffffff, 0x288, 0x288, 0x288, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x70, 0x98}, @common=@inet=@SET1={0x28}}, {{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@STANDARD={0x28}}, {{@ip={@rand_addr, @broadcast, 0x0, 0x0, 'batadv_slave_0\x00', 'ip_vti0\x00'}, 0x0, 0x70, 0x98}, @common=@unspec=@NFQUEUE0={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x2c0) ioctl$USBDEVFS_RESETEP(r2, 0x80045503, &(0x7f0000000080)) 06:55:51 executing program 0: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f0000000200)=@urb_type_control={0x2, {}, 0xfffffffb, 0x4, 0x0, 0x0, 0xf8, 0x7, 0x0, 0x0, 0x5, &(0x7f0000000a80)="cfc206af3b20cc76f92c2426377a243c9d8d6008fafd2fd67138c6b064102eec84099eccfeb5a4b8a5f3f11f2b3a7efc7bb159fd9e2cfe9dfc7021a27eef2f1b8a14ae37ef3f5850a71385fa82e17ca63c6617a30e1bc3576e8ee08aac39ab0a21c7d06379bcc8bd197b3c4706285c7606cc6c43a9f9a4485fa40997c39a4da54d472ef5eb63dbcb91c23e669d6e8836e2269a1d466533236ed3bd"}) 06:55:51 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, 0x0) 06:55:51 executing program 2: r0 = syz_open_dev$usbmon(&(0x7f0000000240), 0x0, 0x0) ioctl$MON_IOCX_MFETCH(r0, 0xc0109207, &(0x7f0000000140)={0x0, 0x0, 0x400000}) (async) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$FUSE_DIRENT(r1, &(0x7f00000000c0)={0x30, 0x2f, 0x0, [{0x2, 0x101, 0x8, 0x5, '^{}/[*:@'}]}, 0x30) (async) ioctl$MON_IOCQ_URB_LEN(r0, 0x9201) r2 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r2, 0x802c550a, &(0x7f0000000200)=@urb_type_bulk={0x2, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) (async) ioctl$USBDEVFS_CLAIMINTERFACE(r2, 0x8004550f, &(0x7f0000000040)=0x9) 06:55:51 executing program 1: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040)=@security={'security\x00', 0xe, 0x4, 0x260, 0xffffffff, 0x180, 0xc0, 0xc0, 0xffffffff, 0xffffffff, 0x288, 0x288, 0x288, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x70, 0x98}, @common=@inet=@SET1={0x28}}, {{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@STANDARD={0x28}}, {{@ip={@rand_addr, @broadcast, 0x0, 0x0, 'batadv_slave_0\x00', 'ip_vti0\x00'}, 0x0, 0x70, 0x98}, @common=@unspec=@NFQUEUE0={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x2c0) ioctl$USBDEVFS_RESETEP(r0, 0x551f, &(0x7f0000000080)) 06:55:51 executing program 5: socket$igmp6(0xa, 0x3, 0x2) socketpair(0x2, 0x80000, 0x800, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair(0x29, 0x80000, 0xfff, &(0x7f0000000380)) r1 = socket$igmp6(0xa, 0x3, 0x2) ioctl$ifreq_SIOCGIFINDEX_wireguard(r1, 0x8933, &(0x7f0000000080)={'wg1\x00'}) (async) ioctl$ifreq_SIOCGIFINDEX_wireguard(r1, 0x8933, &(0x7f0000000080)={'wg1\x00'}) setsockopt$MRT6_ASSERT(r0, 0x29, 0xcf, &(0x7f0000000300)=0xfffffffe, 0xfe19) (async) setsockopt$MRT6_ASSERT(r0, 0x29, 0xcf, &(0x7f0000000300)=0xfffffffe, 0xfe19) r2 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040)=@security={'security\x00', 0xe, 0x4, 0x260, 0xffffffff, 0x180, 0xc0, 0xc0, 0xffffffff, 0xffffffff, 0x288, 0x288, 0x288, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x70, 0x98}, @common=@inet=@SET1={0x28}}, {{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@STANDARD={0x28}}, {{@ip={@rand_addr, @broadcast, 0x0, 0x0, 'batadv_slave_0\x00', 'ip_vti0\x00'}, 0x0, 0x70, 0x98}, @common=@unspec=@NFQUEUE0={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x2c0) ioctl$USBDEVFS_RESETEP(r2, 0x80045503, &(0x7f0000000080)) (async) ioctl$USBDEVFS_RESETEP(r2, 0x80045503, &(0x7f0000000080)) [ 2918.504400][T13700] ? fsnotify+0x1280/0x1340 [ 2918.508875][T13700] ? loop_remove+0xa0/0xa0 [ 2918.513263][T13700] do_vfs_ioctl+0x742/0x1720 [ 2918.517831][T13700] ? ioctl_preallocate+0x250/0x250 [ 2918.522912][T13700] ? __fget+0x407/0x490 [ 2918.527037][T13700] ? fget_many+0x20/0x20 [ 2918.531264][T13700] ? debug_smp_processor_id+0x20/0x20 [ 2918.536690][T13700] ? security_file_ioctl+0x7d/0xa0 [ 2918.541776][T13700] __x64_sys_ioctl+0xd4/0x110 [ 2918.546430][T13700] do_syscall_64+0xca/0x1c0 [ 2918.550930][T13700] entry_SYSCALL_64_after_hwframe+0x5c/0xc1 06:55:51 executing program 1: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040)=@security={'security\x00', 0xe, 0x4, 0x260, 0xffffffff, 0x180, 0xc0, 0xc0, 0xffffffff, 0xffffffff, 0x288, 0x288, 0x288, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x70, 0x98}, @common=@inet=@SET1={0x28}}, {{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@STANDARD={0x28}}, {{@ip={@rand_addr, @broadcast, 0x0, 0x0, 'batadv_slave_0\x00', 'ip_vti0\x00'}, 0x0, 0x70, 0x98}, @common=@unspec=@NFQUEUE0={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x2c0) ioctl$USBDEVFS_RESETEP(r0, 0x5521, &(0x7f0000000080)) 06:55:51 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f0000000200)=@urb_type_control={0x2, {}, 0x0, 0x4, &(0x7f0000000a40)={0x80, 0x16, 0x2005, 0x7, 0x8}, 0x8, 0xf8, 0x7, 0x0, 0x0, 0x5, &(0x7f0000000a80)="cfc206af3b20cc76f92c2426377a243c9d8d6008fafd2fd67138c6b064102eec84099eccfeb5a4b8a5f3f11f2b3a7efc7bb159fd9e2cfe9dfc7021a27eef2f1b8a14ae37ef3f5850a71385fa82e17ca63c6617a30e1bc3576e8ee08aac39ab0a21c7d06379bcc8bd197b3c4706285c7606cc6c43a9f9a4485fa40997c39a4da54d472ef5eb63dbcb91c23e669d6e8836e2269a1d466533236ed3bd"}) 06:55:51 executing program 0: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f0000000200)=@urb_type_control={0x2, {}, 0xfffffffb, 0x4, 0x0, 0x0, 0xf8, 0x7, 0x0, 0x0, 0x5, &(0x7f0000000a80)="cfc206af3b20cc76f92c2426377a243c9d8d6008fafd2fd67138c6b064102eec84099eccfeb5a4b8a5f3f11f2b3a7efc7bb159fd9e2cfe9dfc7021a27eef2f1b8a14ae37ef3f5850a71385fa82e17ca63c6617a30e1bc3576e8ee08aac39ab0a21c7d06379bcc8bd197b3c4706285c7606cc6c43a9f9a4485fa40997c39a4da54d472ef5eb63dbcb91c23e669d6e8836e2269a1d466533236ed3bd"}) 06:55:51 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x802c550a, &(0x7f0000000200)=@urb_type_bulk={0x2, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r1 = syz_open_dev$usbfs(&(0x7f0000000380), 0x6e665f53, 0x0) ioctl$USBDEVFS_CLEAR_HALT(r1, 0x80045515, 0x0) ioctl$USBDEVFS_CLAIM_PORT(r1, 0x80045518, &(0x7f0000000040)=0x81) 06:55:51 executing program 0: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f0000000200)=@urb_type_control={0x2, {}, 0xfffffffb, 0x4, 0x0, 0x0, 0xf8, 0x7, 0x0, 0x0, 0x5, &(0x7f0000000a80)="cfc206af3b20cc76f92c2426377a243c9d8d6008fafd2fd67138c6b064102eec84099eccfeb5a4b8a5f3f11f2b3a7efc7bb159fd9e2cfe9dfc7021a27eef2f1b8a14ae37ef3f5850a71385fa82e17ca63c6617a30e1bc3576e8ee08aac39ab0a21c7d06379bcc8bd197b3c4706285c7606cc6c43a9f9a4485fa40997c39a4da54d472ef5eb63dbcb91c23e669d6e8836e2269a1d466533236ed3bd"}) [ 2918.610411][T13724] FAULT_INJECTION: forcing a failure. [ 2918.610411][T13724] name failslab, interval 1, probability 0, space 0, times 0 [ 2918.627192][T13724] CPU: 1 PID: 13724 Comm: syz-executor.4 Tainted: G W 5.4.233-syzkaller-00019-gd5ed2ca98e48 #0 [ 2918.638842][T13724] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/14/2023 [ 2918.648873][T13724] Call Trace: [ 2918.652139][T13724] dump_stack+0x1d8/0x241 [ 2918.656438][T13724] ? panic+0x768/0x768 [ 2918.660494][T13724] ? nf_ct_l4proto_log_invalid+0x258/0x258 [ 2918.666270][T13724] ? string+0x26a/0x2b0 [ 2918.670398][T13724] should_fail+0x71f/0x880 [ 2918.674782][T13724] ? setup_fault_attr+0x3d0/0x3d0 [ 2918.679775][T13724] ? of_device_uevent+0xe5/0x2a0 [ 2918.684689][T13724] ? __alloc_skb+0x7a/0x4d0 [ 2918.689161][T13724] should_failslab+0x5/0x20 [ 2918.693637][T13724] kmem_cache_alloc+0x24/0x220 [ 2918.698368][T13724] __alloc_skb+0x7a/0x4d0 [ 2918.702669][T13724] ? mutex_lock+0xa5/0x110 [ 2918.707053][T13724] alloc_uevent_skb+0x74/0x220 [ 2918.711801][T13724] kobject_uevent_net_broadcast+0x2e3/0x560 [ 2918.717663][T13724] ? kobject_get_path+0x168/0x190 [ 2918.722656][T13724] kobject_uevent_env+0x536/0x6e0 [ 2918.727648][T13724] device_add+0x797/0xbb0 [ 2918.731947][T13724] device_create_vargs+0x1b9/0x210 [ 2918.737026][T13724] device_create+0xea/0x130 [ 2918.741500][T13724] ? device_create_vargs+0x210/0x210 [ 2918.746754][T13724] ? __percpu_ref_switch_mode+0x36d/0x5b0 [ 2918.752440][T13724] bdi_register_va+0x84/0x600 [ 2918.757104][T13724] bdi_register+0xd1/0x120 [ 2918.761491][T13724] ? __device_add_disk+0x551/0x1220 [ 2918.766665][T13724] ? bdi_register_va+0x600/0x600 [ 2918.771593][T13724] ? percpu_ref_resurrect+0x113/0x190 [ 2918.776934][T13724] bdi_register_owner+0x55/0xf0 [ 2918.781752][T13724] __device_add_disk+0x5d1/0x1220 [ 2918.786745][T13724] ? device_add_disk+0x30/0x30 [ 2918.791476][T13724] ? vsprintf+0x30/0x30 [ 2918.795601][T13724] ? __alloc_disk_node+0x459/0x5a0 [ 2918.800679][T13724] loop_add+0x573/0x740 [ 2918.804806][T13724] loop_control_ioctl+0x448/0x620 [ 2918.809799][T13724] ? loop_remove+0xa0/0xa0 [ 2918.814184][T13724] ? memset+0x1f/0x40 [ 2918.818132][T13724] ? fsnotify+0x1280/0x1340 [ 2918.822604][T13724] ? loop_remove+0xa0/0xa0 [ 2918.826990][T13724] do_vfs_ioctl+0x742/0x1720 [ 2918.831552][T13724] ? ioctl_preallocate+0x250/0x250 [ 2918.836631][T13724] ? __fget+0x407/0x490 [ 2918.840754][T13724] ? fget_many+0x20/0x20 [ 2918.844986][T13724] ? debug_smp_processor_id+0x20/0x20 [ 2918.850327][T13724] ? security_file_ioctl+0x7d/0xa0 [ 2918.855405][T13724] __x64_sys_ioctl+0xd4/0x110 06:55:51 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) (fail_nth: 67) 06:55:51 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x802c550a, &(0x7f0000000200)=@urb_type_bulk={0x2, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) (async) r1 = syz_open_dev$usbfs(&(0x7f0000000380), 0x6e665f53, 0x0) ioctl$USBDEVFS_CLEAR_HALT(r1, 0x80045515, 0x0) ioctl$USBDEVFS_CLAIM_PORT(r1, 0x80045518, &(0x7f0000000040)=0x81) 06:55:51 executing program 5: socket$igmp6(0xa, 0x3, 0x2) socketpair(0x2, 0x80000, 0x800, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) (async) socketpair(0x29, 0x80000, 0xfff, &(0x7f0000000380)) r1 = socket$igmp6(0xa, 0x3, 0x2) ioctl$ifreq_SIOCGIFINDEX_wireguard(r1, 0x8933, &(0x7f0000000080)={'wg1\x00'}) (async, rerun: 64) setsockopt$MRT6_ASSERT(r0, 0x29, 0xcf, &(0x7f0000000300)=0xfffffffe, 0xfe19) (rerun: 64) r2 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040)=@security={'security\x00', 0xe, 0x4, 0x260, 0xffffffff, 0x180, 0xc0, 0xc0, 0xffffffff, 0xffffffff, 0x288, 0x288, 0x288, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x70, 0x98}, @common=@inet=@SET1={0x28}}, {{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@STANDARD={0x28}}, {{@ip={@rand_addr, @broadcast, 0x0, 0x0, 'batadv_slave_0\x00', 'ip_vti0\x00'}, 0x0, 0x70, 0x98}, @common=@unspec=@NFQUEUE0={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x2c0) (async, rerun: 32) ioctl$USBDEVFS_RESETEP(r2, 0x80045503, &(0x7f0000000080)) (rerun: 32) 06:55:51 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f0000000200)=@urb_type_control={0x2, {}, 0x0, 0x4, &(0x7f0000000a40)={0x80, 0x16, 0x2005, 0x7, 0x8}, 0x8, 0xf8, 0x7, 0x0, 0x0, 0x5, &(0x7f0000000a80)="cfc206af3b20cc76f92c2426377a243c9d8d6008fafd2fd67138c6b064102eec84099eccfeb5a4b8a5f3f11f2b3a7efc7bb159fd9e2cfe9dfc7021a27eef2f1b8a14ae37ef3f5850a71385fa82e17ca63c6617a30e1bc3576e8ee08aac39ab0a21c7d06379bcc8bd197b3c4706285c7606cc6c43a9f9a4485fa40997c39a4da54d472ef5eb63dbcb91c23e669d6e8836e2269a1d466533236ed3bd"}) 06:55:51 executing program 0: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f0000000200)=@urb_type_control={0x2, {0x2}, 0x0, 0x4, 0x0, 0x0, 0xf8, 0x7, 0x0, 0x0, 0x5, &(0x7f0000000a80)="cfc206af3b20cc76f92c2426377a243c9d8d6008fafd2fd67138c6b064102eec84099eccfeb5a4b8a5f3f11f2b3a7efc7bb159fd9e2cfe9dfc7021a27eef2f1b8a14ae37ef3f5850a71385fa82e17ca63c6617a30e1bc3576e8ee08aac39ab0a21c7d06379bcc8bd197b3c4706285c7606cc6c43a9f9a4485fa40997c39a4da54d472ef5eb63dbcb91c23e669d6e8836e2269a1d466533236ed3bd"}) 06:55:51 executing program 1: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040)=@security={'security\x00', 0xe, 0x4, 0x260, 0xffffffff, 0x180, 0xc0, 0xc0, 0xffffffff, 0xffffffff, 0x288, 0x288, 0x288, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x70, 0x98}, @common=@inet=@SET1={0x28}}, {{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@STANDARD={0x28}}, {{@ip={@rand_addr, @broadcast, 0x0, 0x0, 'batadv_slave_0\x00', 'ip_vti0\x00'}, 0x0, 0x70, 0x98}, @common=@unspec=@NFQUEUE0={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x2c0) ioctl$USBDEVFS_RESETEP(r0, 0x5522, &(0x7f0000000080)) [ 2918.860053][T13724] do_syscall_64+0xca/0x1c0 [ 2918.864539][T13724] entry_SYSCALL_64_after_hwframe+0x5c/0xc1 06:55:51 executing program 0: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f0000000200)=@urb_type_control={0x2, {0x2}, 0x0, 0x0, 0x0, 0x0, 0xf8, 0x7, 0x0, 0x0, 0x5, &(0x7f0000000a80)="cfc206af3b20cc76f92c2426377a243c9d8d6008fafd2fd67138c6b064102eec84099eccfeb5a4b8a5f3f11f2b3a7efc7bb159fd9e2cfe9dfc7021a27eef2f1b8a14ae37ef3f5850a71385fa82e17ca63c6617a30e1bc3576e8ee08aac39ab0a21c7d06379bcc8bd197b3c4706285c7606cc6c43a9f9a4485fa40997c39a4da54d472ef5eb63dbcb91c23e669d6e8836e2269a1d466533236ed3bd"}) 06:55:51 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x802c550a, &(0x7f0000000200)=@urb_type_bulk={0x2, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) (async) r1 = syz_open_dev$usbfs(&(0x7f0000000380), 0x6e665f53, 0x0) ioctl$USBDEVFS_CLEAR_HALT(r1, 0x80045515, 0x0) (async) ioctl$USBDEVFS_CLAIM_PORT(r1, 0x80045518, &(0x7f0000000040)=0x81) 06:55:51 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f0000000200)=@urb_type_control={0x2, {}, 0x0, 0x4, &(0x7f0000000a40)={0x80, 0x16, 0x2005, 0x7, 0x8}, 0x8, 0xf8, 0x7, 0x0, 0x0, 0x5, &(0x7f0000000a80)="cfc206af3b20cc76f92c2426377a243c9d8d6008fafd2fd67138c6b064102eec84099eccfeb5a4b8a5f3f11f2b3a7efc7bb159fd9e2cfe9dfc7021a27eef2f1b8a14ae37ef3f5850a71385fa82e17ca63c6617a30e1bc3576e8ee08aac39ab0a21c7d06379bcc8bd197b3c4706285c7606cc6c43a9f9a4485fa40997c39a4da54d472ef5eb63dbcb91c23e669d6e8836e2269a1d466533236ed3bd"}) 06:55:51 executing program 1: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040)=@security={'security\x00', 0xe, 0x4, 0x260, 0xffffffff, 0x180, 0xc0, 0xc0, 0xffffffff, 0xffffffff, 0x288, 0x288, 0x288, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x70, 0x98}, @common=@inet=@SET1={0x28}}, {{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@STANDARD={0x28}}, {{@ip={@rand_addr, @broadcast, 0x0, 0x0, 'batadv_slave_0\x00', 'ip_vti0\x00'}, 0x0, 0x70, 0x98}, @common=@unspec=@NFQUEUE0={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x2c0) ioctl$USBDEVFS_RESETEP(r0, 0x5523, &(0x7f0000000080)) 06:55:51 executing program 0: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f0000000200)=@urb_type_control={0x2, {0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x5, &(0x7f0000000a80)="cfc206af3b20cc76f92c2426377a243c9d8d6008fafd2fd67138c6b064102eec84099eccfeb5a4b8a5f3f11f2b3a7efc7bb159fd9e2cfe9dfc7021a27eef2f1b8a14ae37ef3f5850a71385fa82e17ca63c6617a30e1bc3576e8ee08aac39ab0a21c7d06379bcc8bd197b3c4706285c7606cc6c43a9f9a4485fa40997c39a4da54d472ef5eb63dbcb91c23e669d6e8836e2269a1d466533236ed3bd"}) 06:55:51 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) r1 = accept4$inet(0xffffffffffffffff, &(0x7f0000000300)={0x2, 0x0, @dev}, &(0x7f0000000340)=0x10, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0xa, &(0x7f0000000040)=@security={'security\x00', 0xe, 0x4, 0x260, 0xffffffff, 0x180, 0xc0, 0xc0, 0xffffffff, 0xffffffff, 0x288, 0x288, 0x288, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x70, 0x98}, @common=@inet=@SET1={0x28}}, {{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@STANDARD={0x28}}, {{@ip={@rand_addr, @broadcast, 0x0, 0x0, 'batadv_slave_0\x00', 'ip_vti0\x00'}, 0x0, 0x70, 0x98}, @common=@unspec=@NFQUEUE0={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x2c0) ioctl$USBDEVFS_RESETEP(r0, 0x80045503, &(0x7f0000000080)) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000380), 0x101000, 0x0) ioctl$USBDEVFS_FORBID_SUSPEND(r0, 0x5521) [ 2918.999707][T13768] FAULT_INJECTION: forcing a failure. [ 2918.999707][T13768] name failslab, interval 1, probability 0, space 0, times 0 [ 2919.013154][T13768] CPU: 1 PID: 13768 Comm: syz-executor.4 Tainted: G W 5.4.233-syzkaller-00019-gd5ed2ca98e48 #0 [ 2919.024781][T13768] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/14/2023 [ 2919.034818][T13768] Call Trace: [ 2919.038089][T13768] dump_stack+0x1d8/0x241 [ 2919.042389][T13768] ? panic+0x768/0x768 [ 2919.046432][T13768] ? nf_ct_l4proto_log_invalid+0x258/0x258 [ 2919.052237][T13768] ? string+0x26a/0x2b0 [ 2919.056368][T13768] should_fail+0x71f/0x880 [ 2919.060757][T13768] ? setup_fault_attr+0x3d0/0x3d0 [ 2919.065759][T13768] ? of_device_uevent+0xe5/0x2a0 [ 2919.070669][T13768] ? __alloc_skb+0x7a/0x4d0 [ 2919.075145][T13768] should_failslab+0x5/0x20 [ 2919.079637][T13768] kmem_cache_alloc+0x24/0x220 [ 2919.084372][T13768] __alloc_skb+0x7a/0x4d0 [ 2919.088672][T13768] ? mutex_lock+0xa5/0x110 [ 2919.093060][T13768] alloc_uevent_skb+0x74/0x220 [ 2919.097801][T13768] kobject_uevent_net_broadcast+0x2e3/0x560 [ 2919.103692][T13768] ? kobject_get_path+0x168/0x190 [ 2919.108743][T13768] kobject_uevent_env+0x536/0x6e0 [ 2919.113740][T13768] device_add+0x797/0xbb0 [ 2919.118045][T13768] device_create_vargs+0x1b9/0x210 [ 2919.123126][T13768] device_create+0xea/0x130 [ 2919.127601][T13768] ? device_create_vargs+0x210/0x210 [ 2919.132855][T13768] ? __percpu_ref_switch_mode+0x36d/0x5b0 [ 2919.138545][T13768] bdi_register_va+0x84/0x600 [ 2919.143193][T13768] bdi_register+0xd1/0x120 [ 2919.147583][T13768] ? __device_add_disk+0x551/0x1220 [ 2919.152751][T13768] ? bdi_register_va+0x600/0x600 [ 2919.157664][T13768] ? percpu_ref_resurrect+0x113/0x190 [ 2919.163007][T13768] bdi_register_owner+0x55/0xf0 [ 2919.167848][T13768] __device_add_disk+0x5d1/0x1220 [ 2919.172859][T13768] ? device_add_disk+0x30/0x30 [ 2919.177592][T13768] ? vsprintf+0x30/0x30 [ 2919.181728][T13768] ? __alloc_disk_node+0x459/0x5a0 [ 2919.186816][T13768] loop_add+0x573/0x740 [ 2919.191034][T13768] loop_control_ioctl+0x448/0x620 [ 2919.196071][T13768] ? loop_remove+0xa0/0xa0 [ 2919.200546][T13768] ? memset+0x1f/0x40 [ 2919.204513][T13768] ? fsnotify+0x1280/0x1340 [ 2919.208990][T13768] ? loop_remove+0xa0/0xa0 [ 2919.213391][T13768] do_vfs_ioctl+0x742/0x1720 [ 2919.217961][T13768] ? ioctl_preallocate+0x250/0x250 [ 2919.223201][T13768] ? __fget+0x407/0x490 [ 2919.227351][T13768] ? fget_many+0x20/0x20 [ 2919.231567][T13768] ? debug_smp_processor_id+0x20/0x20 [ 2919.236907][T13768] ? security_file_ioctl+0x7d/0xa0 [ 2919.241987][T13768] __x64_sys_ioctl+0xd4/0x110 [ 2919.246637][T13768] do_syscall_64+0xca/0x1c0 06:55:52 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) (fail_nth: 68) 06:55:52 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) r1 = syz_open_dev$usbfs(&(0x7f00000000c0), 0x7, 0x200) ioctl$USBDEVFS_DISCONNECT_CLAIM(r1, 0x8108551b, &(0x7f0000000380)={0x7, 0x3, "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"}) r2 = syz_open_dev$usbfs(&(0x7f0000000040), 0x101, 0x80000) ioctl$USBDEVFS_CLEAR_HALT(r2, 0x80045515, &(0x7f0000000080)={0x1, 0x1}) ioctl$USBDEVFS_SUBMITURB(r0, 0x802c550a, &(0x7f0000000200)=@urb_type_bulk={0x2, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000140)=ANY=[@ANYBLOB="66696c7465720000000000000000000000000000000000000000000000000000940000003b555525bad3f8e0165e64d965f98b2ccd982599f12828d2a99578b5dda53edcefc36ad857748ff126771e741c377c3ceb4a01c2f41e2fb999680eb8505cef6fdf0f55539479d527d0d6e8fa98421c90f3b39c41c09ec0776d0e82973f9c52bae96db9877a1e3967ea922010fb2c1735b91d0de5240a6c5058771926839bb43dd5fa06633ec5a72825485276a0633a79e64a2eacd447b3e0ee04"], &(0x7f0000000100)=0xb8) 06:55:52 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f0000000200)=@urb_type_control={0x2, {0x2}, 0x0, 0x0, &(0x7f0000000a40)={0x80, 0x16, 0x2005, 0x7, 0x8}, 0x8, 0xf8, 0x7, 0x0, 0x0, 0x5, &(0x7f0000000a80)="cfc206af3b20cc76f92c2426377a243c9d8d6008fafd2fd67138c6b064102eec84099eccfeb5a4b8a5f3f11f2b3a7efc7bb159fd9e2cfe9dfc7021a27eef2f1b8a14ae37ef3f5850a71385fa82e17ca63c6617a30e1bc3576e8ee08aac39ab0a21c7d06379bcc8bd197b3c4706285c7606cc6c43a9f9a4485fa40997c39a4da54d472ef5eb63dbcb91c23e669d6e8836e2269a1d466533236ed3bd"}) 06:55:52 executing program 1: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040)=@security={'security\x00', 0xe, 0x4, 0x260, 0xffffffff, 0x180, 0xc0, 0xc0, 0xffffffff, 0xffffffff, 0x288, 0x288, 0x288, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x70, 0x98}, @common=@inet=@SET1={0x28}}, {{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@STANDARD={0x28}}, {{@ip={@rand_addr, @broadcast, 0x0, 0x0, 'batadv_slave_0\x00', 'ip_vti0\x00'}, 0x0, 0x70, 0x98}, @common=@unspec=@NFQUEUE0={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x2c0) ioctl$USBDEVFS_RESETEP(r0, 0x4004550c, &(0x7f0000000080)) 06:55:52 executing program 0: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f0000000200)=@urb_type_control={0x2, {0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f0000000a80)="cfc206af3b20cc76f92c2426377a243c9d8d6008fafd2fd67138c6b064102eec84099eccfeb5a4b8a5f3f11f2b3a7efc7bb159fd9e2cfe9dfc7021a27eef2f1b8a14ae37ef3f5850a71385fa82e17ca63c6617a30e1bc3576e8ee08aac39ab0a21c7d06379bcc8bd197b3c4706285c7606cc6c43a9f9a4485fa40997c39a4da54d472ef5eb63dbcb91c23e669d6e8836e2269a1d466533236ed3bd"}) 06:55:52 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) r1 = accept4$inet(0xffffffffffffffff, &(0x7f0000000300)={0x2, 0x0, @dev}, &(0x7f0000000340)=0x10, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0xa, &(0x7f0000000040)=@security={'security\x00', 0xe, 0x4, 0x260, 0xffffffff, 0x180, 0xc0, 0xc0, 0xffffffff, 0xffffffff, 0x288, 0x288, 0x288, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x70, 0x98}, @common=@inet=@SET1={0x28}}, {{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@STANDARD={0x28}}, {{@ip={@rand_addr, @broadcast, 0x0, 0x0, 'batadv_slave_0\x00', 'ip_vti0\x00'}, 0x0, 0x70, 0x98}, @common=@unspec=@NFQUEUE0={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x2c0) ioctl$USBDEVFS_RESETEP(r0, 0x80045503, &(0x7f0000000080)) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000380), 0x101000, 0x0) ioctl$USBDEVFS_FORBID_SUSPEND(r0, 0x5521) syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) (async) accept4$inet(0xffffffffffffffff, &(0x7f0000000300)={0x2, 0x0, @dev}, &(0x7f0000000340)=0x10, 0x0) (async) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0xa, &(0x7f0000000040)=@security={'security\x00', 0xe, 0x4, 0x260, 0xffffffff, 0x180, 0xc0, 0xc0, 0xffffffff, 0xffffffff, 0x288, 0x288, 0x288, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x70, 0x98}, @common=@inet=@SET1={0x28}}, {{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@STANDARD={0x28}}, {{@ip={@rand_addr, @broadcast, 0x0, 0x0, 'batadv_slave_0\x00', 'ip_vti0\x00'}, 0x0, 0x70, 0x98}, @common=@unspec=@NFQUEUE0={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x2c0) (async) ioctl$USBDEVFS_RESETEP(r0, 0x80045503, &(0x7f0000000080)) (async) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000380), 0x101000, 0x0) (async) ioctl$USBDEVFS_FORBID_SUSPEND(r0, 0x5521) (async) 06:55:52 executing program 0: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f0000000200)=@urb_type_control={0x2, {0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)="cfc206af3b20cc76f92c2426377a243c9d8d6008fafd2fd67138c6b064102eec84099eccfeb5a4b8a5f3f11f2b3a7efc7bb159fd9e2cfe9dfc7021a27eef2f1b8a14ae37ef3f5850a71385fa82e17ca63c6617a30e1bc3576e8ee08aac39ab0a21c7d06379bcc8bd197b3c4706285c7606cc6c43a9f9a4485fa40997c39a4da54d472ef5eb63dbcb91c23e669d6e8836e2269a1d466533236ed3bd"}) 06:55:52 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) (async) r1 = syz_open_dev$usbfs(&(0x7f00000000c0), 0x7, 0x200) ioctl$USBDEVFS_DISCONNECT_CLAIM(r1, 0x8108551b, &(0x7f0000000380)={0x7, 0x3, "e2b2371a01448d86ef5f6fbf33345e63fcc5164d683e4a4bcde84e842aa1dd03297fa536b82a85e59918f15cc7ded6880400b37bc57048d3e17ae68be55bbea4c9146dc25bfa29328410bc168dba87ac4a290567ff7d0f7dce4f0b9fa4e3ba741310e2b423b0cae2cfcb657b6716e692e8875dadab926cdfcf6c0df815f86c3c90d00b4af7a7da94adbbbbff4a4587597a57494aab8addba4ef94e83fb04673d764edcc035d26fea78028b5dd62b7bb54b080e7ec04c019dca0e746f9aba3aa93e2083b0d222962290138ffc4ce04a6afb8e8be3e77287b5405fe179ce118d5e20bee009032ff753be35966e480ddef733c09f9fd59145b58e90f008c4af9385"}) (async, rerun: 32) r2 = syz_open_dev$usbfs(&(0x7f0000000040), 0x101, 0x80000) (rerun: 32) ioctl$USBDEVFS_CLEAR_HALT(r2, 0x80045515, &(0x7f0000000080)={0x1, 0x1}) (async, rerun: 64) ioctl$USBDEVFS_SUBMITURB(r0, 0x802c550a, &(0x7f0000000200)=@urb_type_bulk={0x2, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) (rerun: 64) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000140)=ANY=[@ANYBLOB="66696c7465720000000000000000000000000000000000000000000000000000940000003b555525bad3f8e0165e64d965f98b2ccd982599f12828d2a99578b5dda53edcefc36ad857748ff126771e741c377c3ceb4a01c2f41e2fb999680eb8505cef6fdf0f55539479d527d0d6e8fa98421c90f3b39c41c09ec0776d0e82973f9c52bae96db9877a1e3967ea922010fb2c1735b91d0de5240a6c5058771926839bb43dd5fa06633ec5a72825485276a0633a79e64a2eacd447b3e0ee04"], &(0x7f0000000100)=0xb8) 06:55:52 executing program 0: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f0000000200)=@urb_type_control={0x2, {0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 06:55:52 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f0000000200)=@urb_type_control={0x2, {0x2}, 0x0, 0x0, 0x0, 0x0, 0xf8, 0x7, 0x0, 0x0, 0x5, &(0x7f0000000a80)="cfc206af3b20cc76f92c2426377a243c9d8d6008fafd2fd67138c6b064102eec84099eccfeb5a4b8a5f3f11f2b3a7efc7bb159fd9e2cfe9dfc7021a27eef2f1b8a14ae37ef3f5850a71385fa82e17ca63c6617a30e1bc3576e8ee08aac39ab0a21c7d06379bcc8bd197b3c4706285c7606cc6c43a9f9a4485fa40997c39a4da54d472ef5eb63dbcb91c23e669d6e8836e2269a1d466533236ed3bd"}) 06:55:52 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) r1 = accept4$inet(0xffffffffffffffff, &(0x7f0000000300)={0x2, 0x0, @dev}, &(0x7f0000000340)=0x10, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0xa, &(0x7f0000000040)=@security={'security\x00', 0xe, 0x4, 0x260, 0xffffffff, 0x180, 0xc0, 0xc0, 0xffffffff, 0xffffffff, 0x288, 0x288, 0x288, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x70, 0x98}, @common=@inet=@SET1={0x28}}, {{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@STANDARD={0x28}}, {{@ip={@rand_addr, @broadcast, 0x0, 0x0, 'batadv_slave_0\x00', 'ip_vti0\x00'}, 0x0, 0x70, 0x98}, @common=@unspec=@NFQUEUE0={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x2c0) ioctl$USBDEVFS_RESETEP(r0, 0x80045503, &(0x7f0000000080)) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000380), 0x101000, 0x0) ioctl$USBDEVFS_FORBID_SUSPEND(r0, 0x5521) syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) (async) accept4$inet(0xffffffffffffffff, &(0x7f0000000300)={0x2, 0x0, @dev}, &(0x7f0000000340)=0x10, 0x0) (async) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0xa, &(0x7f0000000040)=@security={'security\x00', 0xe, 0x4, 0x260, 0xffffffff, 0x180, 0xc0, 0xc0, 0xffffffff, 0xffffffff, 0x288, 0x288, 0x288, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x70, 0x98}, @common=@inet=@SET1={0x28}}, {{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@STANDARD={0x28}}, {{@ip={@rand_addr, @broadcast, 0x0, 0x0, 'batadv_slave_0\x00', 'ip_vti0\x00'}, 0x0, 0x70, 0x98}, @common=@unspec=@NFQUEUE0={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x2c0) (async) ioctl$USBDEVFS_RESETEP(r0, 0x80045503, &(0x7f0000000080)) (async) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000380), 0x101000, 0x0) (async) ioctl$USBDEVFS_FORBID_SUSPEND(r0, 0x5521) (async) [ 2919.251107][T13768] entry_SYSCALL_64_after_hwframe+0x5c/0xc1 06:55:52 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) r1 = syz_open_dev$usbfs(&(0x7f00000000c0), 0x7, 0x200) ioctl$USBDEVFS_DISCONNECT_CLAIM(r1, 0x8108551b, &(0x7f0000000380)={0x7, 0x3, "e2b2371a01448d86ef5f6fbf33345e63fcc5164d683e4a4bcde84e842aa1dd03297fa536b82a85e59918f15cc7ded6880400b37bc57048d3e17ae68be55bbea4c9146dc25bfa29328410bc168dba87ac4a290567ff7d0f7dce4f0b9fa4e3ba741310e2b423b0cae2cfcb657b6716e692e8875dadab926cdfcf6c0df815f86c3c90d00b4af7a7da94adbbbbff4a4587597a57494aab8addba4ef94e83fb04673d764edcc035d26fea78028b5dd62b7bb54b080e7ec04c019dca0e746f9aba3aa93e2083b0d222962290138ffc4ce04a6afb8e8be3e77287b5405fe179ce118d5e20bee009032ff753be35966e480ddef733c09f9fd59145b58e90f008c4af9385"}) r2 = syz_open_dev$usbfs(&(0x7f0000000040), 0x101, 0x80000) ioctl$USBDEVFS_CLEAR_HALT(r2, 0x80045515, &(0x7f0000000080)={0x1, 0x1}) ioctl$USBDEVFS_SUBMITURB(r0, 0x802c550a, &(0x7f0000000200)=@urb_type_bulk={0x2, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000140)=ANY=[@ANYBLOB="66696c7465720000000000000000000000000000000000000000000000000000940000003b555525bad3f8e0165e64d965f98b2ccd982599f12828d2a99578b5dda53edcefc36ad857748ff126771e741c377c3ceb4a01c2f41e2fb999680eb8505cef6fdf0f55539479d527d0d6e8fa98421c90f3b39c41c09ec0776d0e82973f9c52bae96db9877a1e3967ea922010fb2c1735b91d0de5240a6c5058771926839bb43dd5fa06633ec5a72825485276a0633a79e64a2eacd447b3e0ee04"], &(0x7f0000000100)=0xb8) syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) (async) syz_open_dev$usbfs(&(0x7f00000000c0), 0x7, 0x200) (async) ioctl$USBDEVFS_DISCONNECT_CLAIM(r1, 0x8108551b, &(0x7f0000000380)={0x7, 0x3, "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"}) (async) syz_open_dev$usbfs(&(0x7f0000000040), 0x101, 0x80000) (async) ioctl$USBDEVFS_CLEAR_HALT(r2, 0x80045515, &(0x7f0000000080)={0x1, 0x1}) (async) ioctl$USBDEVFS_SUBMITURB(r0, 0x802c550a, &(0x7f0000000200)=@urb_type_bulk={0x2, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) (async) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000140)=ANY=[@ANYBLOB="66696c7465720000000000000000000000000000000000000000000000000000940000003b555525bad3f8e0165e64d965f98b2ccd982599f12828d2a99578b5dda53edcefc36ad857748ff126771e741c377c3ceb4a01c2f41e2fb999680eb8505cef6fdf0f55539479d527d0d6e8fa98421c90f3b39c41c09ec0776d0e82973f9c52bae96db9877a1e3967ea922010fb2c1735b91d0de5240a6c5058771926839bb43dd5fa06633ec5a72825485276a0633a79e64a2eacd447b3e0ee04"], &(0x7f0000000100)=0xb8) (async) [ 2919.315712][T13782] FAULT_INJECTION: forcing a failure. [ 2919.315712][T13782] name failslab, interval 1, probability 0, space 0, times 0 [ 2919.330172][T13782] CPU: 1 PID: 13782 Comm: syz-executor.4 Tainted: G W 5.4.233-syzkaller-00019-gd5ed2ca98e48 #0 [ 2919.341791][T13782] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/14/2023 [ 2919.351818][T13782] Call Trace: [ 2919.355084][T13782] dump_stack+0x1d8/0x241 [ 2919.359394][T13782] ? panic+0x768/0x768 [ 2919.363447][T13782] ? nf_ct_l4proto_log_invalid+0x258/0x258 [ 2919.369219][T13782] ? vsnprintf+0x1c70/0x1c70 [ 2919.373780][T13782] ? do_vfs_ioctl+0x742/0x1720 [ 2919.378539][T13782] should_fail+0x71f/0x880 [ 2919.382925][T13782] ? string+0x26a/0x2b0 [ 2919.387073][T13782] ? setup_fault_attr+0x3d0/0x3d0 [ 2919.392163][T13782] ? skb_clone+0x1c0/0x360 [ 2919.396554][T13782] should_failslab+0x5/0x20 [ 2919.401032][T13782] kmem_cache_alloc+0x24/0x220 [ 2919.405764][T13782] skb_clone+0x1c0/0x360 [ 2919.409977][T13782] ? netlink_broadcast_filtered+0x679/0x1280 [ 2919.415923][T13782] netlink_broadcast_filtered+0x687/0x1280 [ 2919.421697][T13782] netlink_broadcast+0x35/0x50 [ 2919.426432][T13782] kobject_uevent_net_broadcast+0x375/0x560 [ 2919.432295][T13782] kobject_uevent_env+0x536/0x6e0 [ 2919.437288][T13782] device_add+0x797/0xbb0 [ 2919.441590][T13782] device_create_vargs+0x1b9/0x210 [ 2919.446669][T13782] device_create+0xea/0x130 [ 2919.451158][T13782] ? device_create_vargs+0x210/0x210 [ 2919.456424][T13782] ? __percpu_ref_switch_mode+0x36d/0x5b0 [ 2919.462122][T13782] bdi_register_va+0x84/0x600 [ 2919.466770][T13782] bdi_register+0xd1/0x120 [ 2919.471155][T13782] ? __device_add_disk+0x551/0x1220 [ 2919.476322][T13782] ? bdi_register_va+0x600/0x600 [ 2919.481228][T13782] ? percpu_ref_resurrect+0x113/0x190 [ 2919.486573][T13782] bdi_register_owner+0x55/0xf0 [ 2919.491395][T13782] __device_add_disk+0x5d1/0x1220 [ 2919.496390][T13782] ? device_add_disk+0x30/0x30 [ 2919.501146][T13782] ? vsprintf+0x30/0x30 [ 2919.505281][T13782] ? __alloc_disk_node+0x459/0x5a0 [ 2919.510369][T13782] loop_add+0x573/0x740 [ 2919.514505][T13782] loop_control_ioctl+0x448/0x620 [ 2919.519568][T13782] ? loop_remove+0xa0/0xa0 [ 2919.523958][T13782] ? memset+0x1f/0x40 [ 2919.527908][T13782] ? fsnotify+0x1280/0x1340 [ 2919.532383][T13782] ? loop_remove+0xa0/0xa0 [ 2919.536770][T13782] do_vfs_ioctl+0x742/0x1720 [ 2919.541330][T13782] ? ioctl_preallocate+0x250/0x250 [ 2919.546410][T13782] ? __fget+0x407/0x490 [ 2919.550552][T13782] ? fget_many+0x20/0x20 [ 2919.554769][T13782] ? debug_smp_processor_id+0x20/0x20 [ 2919.560113][T13782] ? security_file_ioctl+0x7d/0xa0 06:55:52 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) (fail_nth: 69) 06:55:52 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f0000000200)=@urb_type_control={0x2, {0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x5, &(0x7f0000000a80)="cfc206af3b20cc76f92c2426377a243c9d8d6008fafd2fd67138c6b064102eec84099eccfeb5a4b8a5f3f11f2b3a7efc7bb159fd9e2cfe9dfc7021a27eef2f1b8a14ae37ef3f5850a71385fa82e17ca63c6617a30e1bc3576e8ee08aac39ab0a21c7d06379bcc8bd197b3c4706285c7606cc6c43a9f9a4485fa40997c39a4da54d472ef5eb63dbcb91c23e669d6e8836e2269a1d466533236ed3bd"}) 06:55:52 executing program 0: r0 = syz_open_dev$usbmon(&(0x7f0000000240), 0x0, 0x0) ioctl$MON_IOCX_MFETCH(r0, 0xc0109207, &(0x7f0000000140)={0x0, 0x0, 0x400000}) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$FUSE_DIRENT(r1, &(0x7f00000000c0)={0x30, 0x2f, 0x0, [{0x2, 0x101, 0x8, 0x5, '^{}/[*:@'}]}, 0x30) ioctl$MON_IOCQ_URB_LEN(r0, 0x9201) r2 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r2, 0x802c550a, &(0x7f0000000200)=@urb_type_bulk={0x2, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$USBDEVFS_CLAIMINTERFACE(r2, 0x8004550f, &(0x7f0000000040)=0x9) [ 2919.565193][T13782] __x64_sys_ioctl+0xd4/0x110 [ 2919.569840][T13782] do_syscall_64+0xca/0x1c0 [ 2919.574312][T13782] entry_SYSCALL_64_after_hwframe+0x5c/0xc1 [ 2919.649465][T13817] FAULT_INJECTION: forcing a failure. [ 2919.649465][T13817] name failslab, interval 1, probability 0, space 0, times 0 [ 2919.666333][T13817] CPU: 0 PID: 13817 Comm: syz-executor.4 Tainted: G W 5.4.233-syzkaller-00019-gd5ed2ca98e48 #0 [ 2919.677958][T13817] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/14/2023 [ 2919.688003][T13817] Call Trace: [ 2919.691292][T13817] dump_stack+0x1d8/0x241 [ 2919.695613][T13817] ? panic+0x768/0x768 [ 2919.699669][T13817] ? nf_ct_l4proto_log_invalid+0x258/0x258 [ 2919.705460][T13817] ? check_preemption_disabled+0x153/0x320 [ 2919.711248][T13817] ? debug_smp_processor_id+0x20/0x20 [ 2919.716606][T13817] should_fail+0x71f/0x880 [ 2919.721005][T13817] ? setup_fault_attr+0x3d0/0x3d0 [ 2919.726015][T13817] ? __kasan_slab_free+0x1f6/0x230 [ 2919.731114][T13817] ? __kasan_slab_free+0x178/0x230 [ 2919.736208][T13817] ? kfree+0xeb/0x320 [ 2919.740175][T13817] ? kobject_uevent_env+0x32f/0x6e0 [ 2919.745363][T13817] ? device_add+0x797/0xbb0 [ 2919.749853][T13817] ? __d_alloc+0x2a/0x6a0 [ 2919.754170][T13817] should_failslab+0x5/0x20 [ 2919.758659][T13817] kmem_cache_alloc+0x24/0x220 [ 2919.763411][T13817] __d_alloc+0x2a/0x6a0 [ 2919.767551][T13817] d_alloc_parallel+0xe7/0x1310 [ 2919.772390][T13817] ? avc_has_perm_noaudit+0x2f1/0x3d0 [ 2919.777836][T13817] ? avc_denied+0x1d0/0x1d0 [ 2919.782326][T13817] ? d_hash_and_lookup+0x1e0/0x1e0 [ 2919.787606][T13817] ? _raw_spin_lock+0xa4/0x1b0 [ 2919.792354][T13817] ? _raw_spin_trylock_bh+0x190/0x190 [ 2919.797885][T13817] ? selinux_inode_permission+0x380/0x6a0 [ 2919.803591][T13817] ? selinux_inode_permission+0x454/0x6a0 [ 2919.809294][T13817] __lookup_slow+0x156/0x460 [ 2919.813880][T13817] ? lookup_one_len+0x2c0/0x2c0 [ 2919.818725][T13817] lookup_one_len+0x180/0x2c0 [ 2919.823383][T13817] ? lookup_one_len_common+0x450/0x450 [ 2919.828829][T13817] start_creating+0xec/0x250 [ 2919.833408][T13817] debugfs_create_dir+0x24/0x380 [ 2919.838332][T13817] bdi_register_va+0x22d/0x600 [ 2919.843091][T13817] bdi_register+0xd1/0x120 [ 2919.847495][T13817] ? __device_add_disk+0x551/0x1220 [ 2919.852680][T13817] ? bdi_register_va+0x600/0x600 [ 2919.857601][T13817] ? percpu_ref_resurrect+0x113/0x190 [ 2919.862963][T13817] bdi_register_owner+0x55/0xf0 [ 2919.867796][T13817] __device_add_disk+0x5d1/0x1220 [ 2919.872806][T13817] ? device_add_disk+0x30/0x30 [ 2919.877558][T13817] ? vsprintf+0x30/0x30 [ 2919.881702][T13817] ? __alloc_disk_node+0x459/0x5a0 [ 2919.886799][T13817] loop_add+0x573/0x740 [ 2919.890939][T13817] loop_control_ioctl+0x448/0x620 [ 2919.895948][T13817] ? loop_remove+0xa0/0xa0 [ 2919.900353][T13817] ? memset+0x1f/0x40 [ 2919.904326][T13817] ? fsnotify+0x1280/0x1340 [ 2919.908813][T13817] ? loop_remove+0xa0/0xa0 [ 2919.913215][T13817] do_vfs_ioctl+0x742/0x1720 [ 2919.917796][T13817] ? ioctl_preallocate+0x250/0x250 [ 2919.922895][T13817] ? __fget+0x407/0x490 [ 2919.927036][T13817] ? fget_many+0x20/0x20 [ 2919.931266][T13817] ? debug_smp_processor_id+0x20/0x20 [ 2919.936622][T13817] ? security_file_ioctl+0x7d/0xa0 [ 2919.941720][T13817] __x64_sys_ioctl+0xd4/0x110 [ 2919.946382][T13817] do_syscall_64+0xca/0x1c0 [ 2919.950876][T13817] entry_SYSCALL_64_after_hwframe+0x5c/0xc1 06:55:52 executing program 1: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040)=@security={'security\x00', 0xe, 0x4, 0x260, 0xffffffff, 0x180, 0xc0, 0xc0, 0xffffffff, 0xffffffff, 0x288, 0x288, 0x288, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x70, 0x98}, @common=@inet=@SET1={0x28}}, {{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@STANDARD={0x28}}, {{@ip={@rand_addr, @broadcast, 0x0, 0x0, 'batadv_slave_0\x00', 'ip_vti0\x00'}, 0x0, 0x70, 0x98}, @common=@unspec=@NFQUEUE0={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x2c0) ioctl$USBDEVFS_RESETEP(r0, 0x4004550d, &(0x7f0000000080)) 06:55:52 executing program 2: r0 = socket$inet(0x2, 0xa, 0x0) accept$inet(r0, 0x0, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r0, 0x0, 0x61, &(0x7f0000000080)={'filter\x00', 0x27, "2a6ddf1283964f8e6d5dd7ea06818a1c0c41fe3cb1802a8c1943cc8d9987b38c6f58bb6dfea7a7"}, &(0x7f0000000100)=0x4b) r1 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) r2 = syz_open_dev$usbfs(&(0x7f0000000380), 0x6e665f53, 0x0) ioctl$USBDEVFS_CLEAR_HALT(r2, 0x80045515, 0x0) ioctl$USBDEVFS_DISCARDURB(r1, 0x550b, &(0x7f0000000040)=0x2) ioctl$USBDEVFS_SUBMITURB(r2, 0x802c550a, &(0x7f0000000200)=@urb_type_bulk={0x2, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0}) 06:55:52 executing program 5: syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040)=@security={'security\x00', 0xe, 0x4, 0x260, 0xffffffff, 0x180, 0xc0, 0xc0, 0xffffffff, 0xffffffff, 0x288, 0x288, 0x288, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x70, 0x98}, @common=@inet=@SET1={0x28}}, {{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@STANDARD={0x28}}, {{@ip={@rand_addr, @broadcast, 0x0, 0x0, 'batadv_slave_0\x00', 'ip_vti0\x00'}, 0x0, 0x70, 0x98}, @common=@unspec=@NFQUEUE0={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x2c0) syz_open_dev$usbfs(&(0x7f0000000300), 0x5, 0x9c9841) syz_open_dev$usbfs(&(0x7f0000000380), 0x6, 0x414800) r0 = syz_open_dev$usbfs(&(0x7f0000000380), 0x6e665f53, 0x0) ioctl$USBDEVFS_CLEAR_HALT(r0, 0x80045515, 0x0) ioctl$USBDEVFS_RESETEP(r0, 0x80045503, &(0x7f0000000340)) 06:55:52 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f0000000200)=@urb_type_control={0x2, {0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f0000000a80)="cfc206af3b20cc76f92c2426377a243c9d8d6008fafd2fd67138c6b064102eec84099eccfeb5a4b8a5f3f11f2b3a7efc7bb159fd9e2cfe9dfc7021a27eef2f1b8a14ae37ef3f5850a71385fa82e17ca63c6617a30e1bc3576e8ee08aac39ab0a21c7d06379bcc8bd197b3c4706285c7606cc6c43a9f9a4485fa40997c39a4da54d472ef5eb63dbcb91c23e669d6e8836e2269a1d466533236ed3bd"}) 06:55:52 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) (fail_nth: 70) 06:55:52 executing program 5: syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040)=@security={'security\x00', 0xe, 0x4, 0x260, 0xffffffff, 0x180, 0xc0, 0xc0, 0xffffffff, 0xffffffff, 0x288, 0x288, 0x288, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x70, 0x98}, @common=@inet=@SET1={0x28}}, {{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@STANDARD={0x28}}, {{@ip={@rand_addr, @broadcast, 0x0, 0x0, 'batadv_slave_0\x00', 'ip_vti0\x00'}, 0x0, 0x70, 0x98}, @common=@unspec=@NFQUEUE0={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x2c0) syz_open_dev$usbfs(&(0x7f0000000300), 0x5, 0x9c9841) syz_open_dev$usbfs(&(0x7f0000000380), 0x6, 0x414800) r0 = syz_open_dev$usbfs(&(0x7f0000000380), 0x6e665f53, 0x0) ioctl$USBDEVFS_CLEAR_HALT(r0, 0x80045515, 0x0) ioctl$USBDEVFS_RESETEP(r0, 0x80045503, &(0x7f0000000340)) syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) (async) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040)=@security={'security\x00', 0xe, 0x4, 0x260, 0xffffffff, 0x180, 0xc0, 0xc0, 0xffffffff, 0xffffffff, 0x288, 0x288, 0x288, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x70, 0x98}, @common=@inet=@SET1={0x28}}, {{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@STANDARD={0x28}}, {{@ip={@rand_addr, @broadcast, 0x0, 0x0, 'batadv_slave_0\x00', 'ip_vti0\x00'}, 0x0, 0x70, 0x98}, @common=@unspec=@NFQUEUE0={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x2c0) (async) syz_open_dev$usbfs(&(0x7f0000000300), 0x5, 0x9c9841) (async) syz_open_dev$usbfs(&(0x7f0000000380), 0x6, 0x414800) (async) syz_open_dev$usbfs(&(0x7f0000000380), 0x6e665f53, 0x0) (async) ioctl$USBDEVFS_CLEAR_HALT(r0, 0x80045515, 0x0) (async) ioctl$USBDEVFS_RESETEP(r0, 0x80045503, &(0x7f0000000340)) (async) 06:55:52 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f0000000200)=@urb_type_control={0x2, {0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)="cfc206af3b20cc76f92c2426377a243c9d8d6008fafd2fd67138c6b064102eec84099eccfeb5a4b8a5f3f11f2b3a7efc7bb159fd9e2cfe9dfc7021a27eef2f1b8a14ae37ef3f5850a71385fa82e17ca63c6617a30e1bc3576e8ee08aac39ab0a21c7d06379bcc8bd197b3c4706285c7606cc6c43a9f9a4485fa40997c39a4da54d472ef5eb63dbcb91c23e669d6e8836e2269a1d466533236ed3bd"}) 06:55:52 executing program 1: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040)=@security={'security\x00', 0xe, 0x4, 0x260, 0xffffffff, 0x180, 0xc0, 0xc0, 0xffffffff, 0xffffffff, 0x288, 0x288, 0x288, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x70, 0x98}, @common=@inet=@SET1={0x28}}, {{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@STANDARD={0x28}}, {{@ip={@rand_addr, @broadcast, 0x0, 0x0, 'batadv_slave_0\x00', 'ip_vti0\x00'}, 0x0, 0x70, 0x98}, @common=@unspec=@NFQUEUE0={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x2c0) ioctl$USBDEVFS_RESETEP(r0, 0x4004551e, &(0x7f0000000080)) 06:55:52 executing program 1: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040)=@security={'security\x00', 0xe, 0x4, 0x260, 0xffffffff, 0x180, 0xc0, 0xc0, 0xffffffff, 0xffffffff, 0x288, 0x288, 0x288, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x70, 0x98}, @common=@inet=@SET1={0x28}}, {{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@STANDARD={0x28}}, {{@ip={@rand_addr, @broadcast, 0x0, 0x0, 'batadv_slave_0\x00', 'ip_vti0\x00'}, 0x0, 0x70, 0x98}, @common=@unspec=@NFQUEUE0={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x2c0) ioctl$USBDEVFS_RESETEP(r0, 0x40049409, &(0x7f0000000080)) 06:55:52 executing program 2: r0 = socket$inet(0x2, 0xa, 0x0) accept$inet(r0, 0x0, 0x0) (async) getsockopt$ARPT_SO_GET_ENTRIES(r0, 0x0, 0x61, &(0x7f0000000080)={'filter\x00', 0x27, "2a6ddf1283964f8e6d5dd7ea06818a1c0c41fe3cb1802a8c1943cc8d9987b38c6f58bb6dfea7a7"}, &(0x7f0000000100)=0x4b) (async) r1 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) (async) r2 = syz_open_dev$usbfs(&(0x7f0000000380), 0x6e665f53, 0x0) ioctl$USBDEVFS_CLEAR_HALT(r2, 0x80045515, 0x0) (async) ioctl$USBDEVFS_DISCARDURB(r1, 0x550b, &(0x7f0000000040)=0x2) (async) ioctl$USBDEVFS_SUBMITURB(r2, 0x802c550a, &(0x7f0000000200)=@urb_type_bulk={0x2, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0}) 06:55:52 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f0000000200)=@urb_type_control={0x2, {0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) [ 2920.152284][T13828] FAULT_INJECTION: forcing a failure. [ 2920.152284][T13828] name failslab, interval 1, probability 0, space 0, times 0 [ 2920.184521][T13828] CPU: 0 PID: 13828 Comm: syz-executor.4 Tainted: G W 5.4.233-syzkaller-00019-gd5ed2ca98e48 #0 [ 2920.196174][T13828] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/14/2023 [ 2920.206235][T13828] Call Trace: [ 2920.209525][T13828] dump_stack+0x1d8/0x241 [ 2920.213966][T13828] ? panic+0x768/0x768 [ 2920.218037][T13828] ? nf_ct_l4proto_log_invalid+0x258/0x258 [ 2920.223838][T13828] ? simple_lookup+0xba/0xf0 [ 2920.228418][T13828] ? __lookup_slow+0x350/0x460 [ 2920.233171][T13828] should_fail+0x71f/0x880 [ 2920.237577][T13828] ? setup_fault_attr+0x3d0/0x3d0 [ 2920.243026][T13828] ? lookup_one_len+0x180/0x2c0 [ 2920.247872][T13828] ? new_inode_pseudo+0x78/0x210 [ 2920.252795][T13828] should_failslab+0x5/0x20 [ 2920.257284][T13828] kmem_cache_alloc+0x24/0x220 [ 2920.262033][T13828] new_inode_pseudo+0x78/0x210 [ 2920.266788][T13828] new_inode+0x25/0x1d0 [ 2920.270942][T13828] ? start_creating+0x15d/0x250 [ 2920.275775][T13828] debugfs_create_dir+0x66/0x380 [ 2920.280694][T13828] bdi_register_va+0x22d/0x600 [ 2920.285460][T13828] bdi_register+0xd1/0x120 [ 2920.289871][T13828] ? __device_add_disk+0x551/0x1220 [ 2920.295058][T13828] ? bdi_register_va+0x600/0x600 [ 2920.299985][T13828] ? percpu_ref_resurrect+0x113/0x190 [ 2920.305346][T13828] bdi_register_owner+0x55/0xf0 [ 2920.310185][T13828] __device_add_disk+0x5d1/0x1220 [ 2920.315199][T13828] ? device_add_disk+0x30/0x30 [ 2920.319950][T13828] ? vsprintf+0x30/0x30 [ 2920.324093][T13828] ? __alloc_disk_node+0x459/0x5a0 [ 2920.329186][T13828] loop_add+0x573/0x740 [ 2920.333329][T13828] loop_control_ioctl+0x448/0x620 [ 2920.338337][T13828] ? loop_remove+0xa0/0xa0 [ 2920.342741][T13828] ? memset+0x1f/0x40 [ 2920.346708][T13828] ? fsnotify+0x1280/0x1340 [ 2920.351196][T13828] ? loop_remove+0xa0/0xa0 [ 2920.355601][T13828] do_vfs_ioctl+0x742/0x1720 [ 2920.360181][T13828] ? ioctl_preallocate+0x250/0x250 [ 2920.365276][T13828] ? __fget+0x407/0x490 [ 2920.369419][T13828] ? fget_many+0x20/0x20 [ 2920.373653][T13828] ? debug_smp_processor_id+0x20/0x20 [ 2920.379009][T13828] ? security_file_ioctl+0x7d/0xa0 [ 2920.384104][T13828] __x64_sys_ioctl+0xd4/0x110 [ 2920.388763][T13828] do_syscall_64+0xca/0x1c0 [ 2920.393253][T13828] entry_SYSCALL_64_after_hwframe+0x5c/0xc1 06:55:53 executing program 0: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040)=@security={'security\x00', 0xe, 0x4, 0x260, 0xffffffff, 0x180, 0xc0, 0xc0, 0xffffffff, 0xffffffff, 0x288, 0x288, 0x288, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x70, 0x98}, @common=@inet=@SET1={0x28}}, {{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@STANDARD={0x28}}, {{@ip={@rand_addr, @broadcast, 0x0, 0x0, 'batadv_slave_0\x00', 'ip_vti0\x00'}, 0x0, 0x70, 0x98}, @common=@unspec=@NFQUEUE0={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x2c0) ioctl$USBDEVFS_RESETEP(r0, 0x2, &(0x7f0000000080)) 06:55:53 executing program 1: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040)=@security={'security\x00', 0xe, 0x4, 0x260, 0xffffffff, 0x180, 0xc0, 0xc0, 0xffffffff, 0xffffffff, 0x288, 0x288, 0x288, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x70, 0x98}, @common=@inet=@SET1={0x28}}, {{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@STANDARD={0x28}}, {{@ip={@rand_addr, @broadcast, 0x0, 0x0, 'batadv_slave_0\x00', 'ip_vti0\x00'}, 0x0, 0x70, 0x98}, @common=@unspec=@NFQUEUE0={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x2c0) ioctl$USBDEVFS_RESETEP(r0, 0x4008550c, &(0x7f0000000080)) 06:55:53 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f0000000200)=@urb_type_control={0x2, {0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f0000000a80)="cfc206af3b20cc76f92c2426377a243c9d8d6008fafd2fd67138c6b064102eec84099eccfeb5a4b8a5f3f11f2b3a7efc7bb159fd9e2cfe9dfc7021a27eef2f1b8a14ae37ef3f5850a71385fa82e17ca63c6617a30e1bc3576e8ee08aac39ab0a21c7d06379bcc8bd197b3c4706285c7606cc6c43a9f9a4485fa40997c39a4da54d472ef5eb63dbcb91c23e669d6e8836e2269a1d466533236ed3bd"}) 06:55:53 executing program 5: syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) (async) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040)=@security={'security\x00', 0xe, 0x4, 0x260, 0xffffffff, 0x180, 0xc0, 0xc0, 0xffffffff, 0xffffffff, 0x288, 0x288, 0x288, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x70, 0x98}, @common=@inet=@SET1={0x28}}, {{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@STANDARD={0x28}}, {{@ip={@rand_addr, @broadcast, 0x0, 0x0, 'batadv_slave_0\x00', 'ip_vti0\x00'}, 0x0, 0x70, 0x98}, @common=@unspec=@NFQUEUE0={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x2c0) syz_open_dev$usbfs(&(0x7f0000000300), 0x5, 0x9c9841) (async) syz_open_dev$usbfs(&(0x7f0000000380), 0x6, 0x414800) r0 = syz_open_dev$usbfs(&(0x7f0000000380), 0x6e665f53, 0x0) ioctl$USBDEVFS_CLEAR_HALT(r0, 0x80045515, 0x0) (async) ioctl$USBDEVFS_RESETEP(r0, 0x80045503, &(0x7f0000000340)) 06:55:53 executing program 2: r0 = socket$inet(0x2, 0xa, 0x0) accept$inet(r0, 0x0, 0x0) (async, rerun: 64) getsockopt$ARPT_SO_GET_ENTRIES(r0, 0x0, 0x61, &(0x7f0000000080)={'filter\x00', 0x27, "2a6ddf1283964f8e6d5dd7ea06818a1c0c41fe3cb1802a8c1943cc8d9987b38c6f58bb6dfea7a7"}, &(0x7f0000000100)=0x4b) (async, rerun: 64) r1 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) (async, rerun: 32) r2 = syz_open_dev$usbfs(&(0x7f0000000380), 0x6e665f53, 0x0) (rerun: 32) ioctl$USBDEVFS_CLEAR_HALT(r2, 0x80045515, 0x0) (async) ioctl$USBDEVFS_DISCARDURB(r1, 0x550b, &(0x7f0000000040)=0x2) (async, rerun: 32) ioctl$USBDEVFS_SUBMITURB(r2, 0x802c550a, &(0x7f0000000200)=@urb_type_bulk={0x2, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0}) (rerun: 32) 06:55:53 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) (fail_nth: 71) 06:55:53 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000040), 0x0, 0x0) ioctl$MON_IOCX_GET(r0, 0x40189206, &(0x7f0000000100)={0x0, 0x0}) r1 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r1, 0x802c550a, &(0x7f0000000200)=@urb_type_bulk={0x2, {}, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x25, 0x31, 0x0, 0x0}) [ 2920.412941][T13828] debugfs: out of free dentries, can not create directory '7:0' 06:55:53 executing program 0: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f0000000200)=@urb_type_control={0x2, {0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) (fail_nth: 1) 06:55:53 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040)=@security={'security\x00', 0xe, 0x4, 0x260, 0xffffffff, 0x180, 0xc0, 0xc0, 0xffffffff, 0xffffffff, 0x288, 0x288, 0x288, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x70, 0x98}, @common=@inet=@SET1={0x28}}, {{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@STANDARD={0x28}}, {{@ip={@rand_addr, @broadcast, 0x0, 0x0, 'batadv_slave_0\x00', 'ip_vti0\x00'}, 0x0, 0x70, 0x98}, @common=@unspec=@NFQUEUE0={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x2c0) ioctl$USBDEVFS_RESETEP(r0, 0x80045503, &(0x7f0000000080)) 06:55:53 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_RELEASE_PORT(r0, 0x80045519, &(0x7f0000000040)=0x2c9) ioctl$USBDEVFS_SUBMITURB(r0, 0x802c550a, &(0x7f0000000200)=@urb_type_bulk={0x2, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 06:55:53 executing program 0: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f0000000200)=@urb_type_control={0x2, {0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 06:55:53 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_RELEASE_PORT(r0, 0x80045519, &(0x7f0000000040)=0x2c9) (async) ioctl$USBDEVFS_SUBMITURB(r0, 0x802c550a, &(0x7f0000000200)=@urb_type_bulk={0x2, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 06:55:53 executing program 0: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x2, &(0x7f0000000200)=@urb_type_control={0x2, {0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) [ 2920.532743][T13868] FAULT_INJECTION: forcing a failure. [ 2920.532743][T13868] name failslab, interval 1, probability 0, space 0, times 0 [ 2920.550705][T13868] CPU: 0 PID: 13868 Comm: syz-executor.4 Tainted: G W 5.4.233-syzkaller-00019-gd5ed2ca98e48 #0 [ 2920.562327][T13868] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/14/2023 [ 2920.572376][T13868] Call Trace: [ 2920.575660][T13868] dump_stack+0x1d8/0x241 [ 2920.579979][T13868] ? panic+0x768/0x768 [ 2920.584037][T13868] ? do_vfs_ioctl+0x742/0x1720 [ 2920.588788][T13868] ? nf_ct_l4proto_log_invalid+0x258/0x258 [ 2920.594582][T13868] should_fail+0x71f/0x880 [ 2920.598997][T13868] ? setup_fault_attr+0x3d0/0x3d0 [ 2920.604007][T13868] ? make_kgid+0x1f2/0x6f0 [ 2920.608410][T13868] ? security_inode_alloc+0x24/0x110 [ 2920.613681][T13868] should_failslab+0x5/0x20 [ 2920.618169][T13868] kmem_cache_alloc+0x24/0x220 [ 2920.622917][T13868] security_inode_alloc+0x24/0x110 [ 2920.628016][T13868] inode_init_always+0x62a/0x870 [ 2920.632941][T13868] new_inode_pseudo+0x8f/0x210 [ 2920.637688][T13868] new_inode+0x25/0x1d0 [ 2920.641828][T13868] ? start_creating+0x15d/0x250 [ 2920.646664][T13868] debugfs_create_dir+0x66/0x380 [ 2920.651585][T13868] bdi_register_va+0x22d/0x600 [ 2920.656368][T13868] bdi_register+0xd1/0x120 [ 2920.660775][T13868] ? __device_add_disk+0x551/0x1220 [ 2920.665956][T13868] ? bdi_register_va+0x600/0x600 [ 2920.670974][T13868] ? percpu_ref_resurrect+0x113/0x190 [ 2920.676333][T13868] bdi_register_owner+0x55/0xf0 [ 2920.681171][T13868] __device_add_disk+0x5d1/0x1220 [ 2920.686181][T13868] ? device_add_disk+0x30/0x30 [ 2920.690931][T13868] ? vsprintf+0x30/0x30 [ 2920.695071][T13868] ? __alloc_disk_node+0x459/0x5a0 [ 2920.700169][T13868] loop_add+0x573/0x740 [ 2920.704316][T13868] loop_control_ioctl+0x448/0x620 [ 2920.709326][T13868] ? loop_remove+0xa0/0xa0 [ 2920.713731][T13868] ? memset+0x1f/0x40 [ 2920.717706][T13868] ? fsnotify+0x1280/0x1340 [ 2920.722193][T13868] ? loop_remove+0xa0/0xa0 [ 2920.726598][T13868] do_vfs_ioctl+0x742/0x1720 [ 2920.731172][T13868] ? ioctl_preallocate+0x250/0x250 [ 2920.736277][T13868] ? __fget+0x407/0x490 [ 2920.740422][T13868] ? fget_many+0x20/0x20 [ 2920.744676][T13868] ? debug_smp_processor_id+0x20/0x20 [ 2920.750032][T13868] ? security_file_ioctl+0x7d/0xa0 [ 2920.755125][T13868] __x64_sys_ioctl+0xd4/0x110 [ 2920.759874][T13868] do_syscall_64+0xca/0x1c0 [ 2920.764366][T13868] entry_SYSCALL_64_after_hwframe+0x5c/0xc1 [ 2920.773091][T13868] debugfs: out of free dentries, can not create directory '7:0' 06:55:54 executing program 1: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040)=@security={'security\x00', 0xe, 0x4, 0x260, 0xffffffff, 0x180, 0xc0, 0xc0, 0xffffffff, 0xffffffff, 0x288, 0x288, 0x288, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x70, 0x98}, @common=@inet=@SET1={0x28}}, {{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@STANDARD={0x28}}, {{@ip={@rand_addr, @broadcast, 0x0, 0x0, 'batadv_slave_0\x00', 'ip_vti0\x00'}, 0x0, 0x70, 0x98}, @common=@unspec=@NFQUEUE0={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x2c0) ioctl$USBDEVFS_RESETEP(r0, 0x4008550d, &(0x7f0000000080)) 06:55:54 executing program 0: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x4b47, &(0x7f0000000200)=@urb_type_control={0x2, {0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 06:55:54 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_RELEASE_PORT(r0, 0x80045519, &(0x7f0000000040)=0x2c9) (async) ioctl$USBDEVFS_SUBMITURB(r0, 0x802c550a, &(0x7f0000000200)=@urb_type_bulk={0x2, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 06:55:54 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040)=@security={'security\x00', 0xe, 0x4, 0x260, 0xffffffff, 0x180, 0xc0, 0xc0, 0xffffffff, 0xffffffff, 0x288, 0x288, 0x288, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x70, 0x98}, @common=@inet=@SET1={0x28}}, {{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@STANDARD={0x28}}, {{@ip={@rand_addr, @broadcast, 0x0, 0x0, 'batadv_slave_0\x00', 'ip_vti0\x00'}, 0x0, 0x70, 0x98}, @common=@unspec=@NFQUEUE0={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x2c0) (async, rerun: 64) ioctl$USBDEVFS_RESETEP(r0, 0x80045503, &(0x7f0000000080)) (rerun: 64) 06:55:54 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) (fail_nth: 72) 06:55:54 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_RELEASE_PORT(r0, 0x80045519, &(0x7f0000000040)=0x2c9) ioctl$USBDEVFS_SUBMITURB(r0, 0x802c550a, &(0x7f0000000200)=@urb_type_bulk={0x2, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 06:55:54 executing program 0: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x4b49, &(0x7f0000000200)=@urb_type_control={0x2, {0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 06:55:54 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) (async) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040)=@security={'security\x00', 0xe, 0x4, 0x260, 0xffffffff, 0x180, 0xc0, 0xc0, 0xffffffff, 0xffffffff, 0x288, 0x288, 0x288, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x70, 0x98}, @common=@inet=@SET1={0x28}}, {{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@STANDARD={0x28}}, {{@ip={@rand_addr, @broadcast, 0x0, 0x0, 'batadv_slave_0\x00', 'ip_vti0\x00'}, 0x0, 0x70, 0x98}, @common=@unspec=@NFQUEUE0={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x2c0) ioctl$USBDEVFS_RESETEP(r0, 0x80045503, &(0x7f0000000080)) 06:55:54 executing program 1: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040)=@security={'security\x00', 0xe, 0x4, 0x260, 0xffffffff, 0x180, 0xc0, 0xc0, 0xffffffff, 0xffffffff, 0x288, 0x288, 0x288, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x70, 0x98}, @common=@inet=@SET1={0x28}}, {{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@STANDARD={0x28}}, {{@ip={@rand_addr, @broadcast, 0x0, 0x0, 'batadv_slave_0\x00', 'ip_vti0\x00'}, 0x0, 0x70, 0x98}, @common=@unspec=@NFQUEUE0={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x2c0) ioctl$USBDEVFS_RESETEP(r0, 0x40085511, &(0x7f0000000080)) 06:55:54 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_RESETEP(r0, 0x80045503, &(0x7f0000000040)={0xe}) ioctl$USBDEVFS_SUBMITURB(r0, 0x802c550a, &(0x7f0000000200)=@urb_type_bulk={0x2, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 06:55:54 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040)=@security={'security\x00', 0xe, 0x4, 0x260, 0xffffffff, 0x180, 0xc0, 0xc0, 0xffffffff, 0xffffffff, 0x288, 0x288, 0x288, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x70, 0x98}, @common=@inet=@SET1={0x28}}, {{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@STANDARD={0x28}}, {{@ip={@rand_addr, @broadcast, 0x0, 0x0, 'batadv_slave_0\x00', 'ip_vti0\x00'}, 0x0, 0x70, 0x98}, @common=@unspec=@NFQUEUE0={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x2c0) ioctl$USBDEVFS_RESETEP(r0, 0x80045503, &(0x7f0000000080)) r1 = syz_open_dev$usbfs(&(0x7f0000000300), 0x1, 0x1c1800) ioctl$USBDEVFS_SETINTERFACE(r1, 0x80085504, &(0x7f0000000340)={0x7, 0x6}) 06:55:54 executing program 0: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x541b, &(0x7f0000000200)=@urb_type_control={0x2, {0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) [ 2921.341958][T13890] FAULT_INJECTION: forcing a failure. [ 2921.341958][T13890] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2921.372935][T13890] CPU: 0 PID: 13890 Comm: syz-executor.4 Tainted: G W 5.4.233-syzkaller-00019-gd5ed2ca98e48 #0 [ 2921.384564][T13890] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/14/2023 [ 2921.394605][T13890] Call Trace: [ 2921.397896][T13890] dump_stack+0x1d8/0x241 [ 2921.402213][T13890] ? panic+0x768/0x768 [ 2921.406270][T13890] ? nf_ct_l4proto_log_invalid+0x258/0x258 [ 2921.412059][T13890] ? stack_trace_save+0x118/0x1c0 [ 2921.417072][T13890] ? stack_trace_snprint+0x170/0x170 [ 2921.422345][T13890] should_fail+0x71f/0x880 [ 2921.426749][T13890] ? setup_fault_attr+0x3d0/0x3d0 [ 2921.431761][T13890] ? __kasan_kmalloc+0x199/0x1d0 [ 2921.436692][T13890] ? remove_wait_queue+0x120/0x120 [ 2921.441796][T13890] ? __kasan_kmalloc+0x130/0x1d0 [ 2921.446721][T13890] __alloc_pages_nodemask+0x1b4/0x840 [ 2921.452170][T13890] ? __device_add_disk+0x5d1/0x1220 [ 2921.457356][T13890] ? loop_add+0x573/0x740 [ 2921.461676][T13890] ? loop_control_ioctl+0x448/0x620 [ 2921.466861][T13890] ? do_syscall_64+0xca/0x1c0 [ 2921.471536][T13890] ? gfp_pfmemalloc_allowed+0x120/0x120 [ 2921.477071][T13890] ? lockref_get+0x184/0x220 [ 2921.481648][T13890] __get_free_pages+0xa/0x30 [ 2921.486224][T13890] selinux_genfs_get_sid+0x54/0x260 [ 2921.491411][T13890] inode_doinit_with_dentry+0x892/0x1050 [ 2921.497031][T13890] ? sb_finish_set_opts+0x770/0x770 [ 2921.502218][T13890] ? current_time+0x1af/0x2f0 [ 2921.506883][T13890] ? atime_needs_update+0x590/0x590 [ 2921.512068][T13890] security_d_instantiate+0x97/0xf0 [ 2921.517257][T13890] d_instantiate+0x51/0x90 [ 2921.521657][T13890] debugfs_create_dir+0x1a2/0x380 [ 2921.526669][T13890] bdi_register_va+0x22d/0x600 [ 2921.531422][T13890] bdi_register+0xd1/0x120 [ 2921.535832][T13890] ? __device_add_disk+0x551/0x1220 [ 2921.541013][T13890] ? bdi_register_va+0x600/0x600 [ 2921.545936][T13890] ? percpu_ref_resurrect+0x113/0x190 [ 2921.551290][T13890] bdi_register_owner+0x55/0xf0 [ 2921.556126][T13890] __device_add_disk+0x5d1/0x1220 [ 2921.561138][T13890] ? device_add_disk+0x30/0x30 [ 2921.565895][T13890] ? vsprintf+0x30/0x30 [ 2921.570037][T13890] ? __alloc_disk_node+0x459/0x5a0 [ 2921.575135][T13890] loop_add+0x573/0x740 [ 2921.579277][T13890] loop_control_ioctl+0x448/0x620 [ 2921.584288][T13890] ? loop_remove+0xa0/0xa0 [ 2921.588694][T13890] ? memset+0x1f/0x40 06:55:54 executing program 1: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040)=@security={'security\x00', 0xe, 0x4, 0x260, 0xffffffff, 0x180, 0xc0, 0xc0, 0xffffffff, 0xffffffff, 0x288, 0x288, 0x288, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x70, 0x98}, @common=@inet=@SET1={0x28}}, {{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@STANDARD={0x28}}, {{@ip={@rand_addr, @broadcast, 0x0, 0x0, 'batadv_slave_0\x00', 'ip_vti0\x00'}, 0x0, 0x70, 0x98}, @common=@unspec=@NFQUEUE0={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x2c0) ioctl$USBDEVFS_RESETEP(r0, 0x40086602, &(0x7f0000000080)) 06:55:54 executing program 1: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040)=@security={'security\x00', 0xe, 0x4, 0x260, 0xffffffff, 0x180, 0xc0, 0xc0, 0xffffffff, 0xffffffff, 0x288, 0x288, 0x288, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x70, 0x98}, @common=@inet=@SET1={0x28}}, {{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@STANDARD={0x28}}, {{@ip={@rand_addr, @broadcast, 0x0, 0x0, 'batadv_slave_0\x00', 'ip_vti0\x00'}, 0x0, 0x70, 0x98}, @common=@unspec=@NFQUEUE0={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x2c0) ioctl$USBDEVFS_RESETEP(r0, 0x40087602, &(0x7f0000000080)) [ 2921.592662][T13890] ? fsnotify+0x1280/0x1340 [ 2921.597149][T13890] ? loop_remove+0xa0/0xa0 [ 2921.601550][T13890] do_vfs_ioctl+0x742/0x1720 [ 2921.606133][T13890] ? ioctl_preallocate+0x250/0x250 [ 2921.611233][T13890] ? __fget+0x407/0x490 [ 2921.615377][T13890] ? fget_many+0x20/0x20 [ 2921.619603][T13890] ? debug_smp_processor_id+0x20/0x20 [ 2921.624964][T13890] ? security_file_ioctl+0x7d/0xa0 [ 2921.630060][T13890] __x64_sys_ioctl+0xd4/0x110 [ 2921.634721][T13890] do_syscall_64+0xca/0x1c0 06:55:54 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_RESETEP(r0, 0x80045503, &(0x7f0000000040)={0xe}) (async) ioctl$USBDEVFS_RESETEP(r0, 0x80045503, &(0x7f0000000040)={0xe}) ioctl$USBDEVFS_SUBMITURB(r0, 0x802c550a, &(0x7f0000000200)=@urb_type_bulk={0x2, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 06:55:54 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_RESETEP(r0, 0x80045503, &(0x7f0000000040)={0xe}) ioctl$USBDEVFS_SUBMITURB(r0, 0x802c550a, &(0x7f0000000200)=@urb_type_bulk={0x2, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 06:55:54 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) (fail_nth: 73) 06:55:54 executing program 0: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x5421, &(0x7f0000000200)=@urb_type_control={0x2, {0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 06:55:54 executing program 1: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040)=@security={'security\x00', 0xe, 0x4, 0x260, 0xffffffff, 0x180, 0xc0, 0xc0, 0xffffffff, 0xffffffff, 0x288, 0x288, 0x288, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x70, 0x98}, @common=@inet=@SET1={0x28}}, {{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@STANDARD={0x28}}, {{@ip={@rand_addr, @broadcast, 0x0, 0x0, 'batadv_slave_0\x00', 'ip_vti0\x00'}, 0x0, 0x70, 0x98}, @common=@unspec=@NFQUEUE0={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x2c0) ioctl$USBDEVFS_RESETEP(r0, 0x4020940d, &(0x7f0000000080)) [ 2921.639208][T13890] entry_SYSCALL_64_after_hwframe+0x5c/0xc1 06:55:54 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_RESETEP(r0, 0x80045503, &(0x7f0000000040)={0xe}) (async) ioctl$USBDEVFS_SUBMITURB(r0, 0x802c550a, &(0x7f0000000200)=@urb_type_bulk={0x2, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 06:55:54 executing program 0: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x5450, &(0x7f0000000200)=@urb_type_control={0x2, {0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 06:55:54 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f0000000200)=@urb_type_control={0x2, {0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) (fail_nth: 1) 06:55:54 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040)=@security={'security\x00', 0xe, 0x4, 0x260, 0xffffffff, 0x180, 0xc0, 0xc0, 0xffffffff, 0xffffffff, 0x288, 0x288, 0x288, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x70, 0x98}, @common=@inet=@SET1={0x28}}, {{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@STANDARD={0x28}}, {{@ip={@rand_addr, @broadcast, 0x0, 0x0, 'batadv_slave_0\x00', 'ip_vti0\x00'}, 0x0, 0x70, 0x98}, @common=@unspec=@NFQUEUE0={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x2c0) (async) ioctl$USBDEVFS_RESETEP(r0, 0x80045503, &(0x7f0000000080)) r1 = syz_open_dev$usbfs(&(0x7f0000000300), 0x1, 0x1c1800) ioctl$USBDEVFS_SETINTERFACE(r1, 0x80085504, &(0x7f0000000340)={0x7, 0x6}) 06:55:54 executing program 1: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040)=@security={'security\x00', 0xe, 0x4, 0x260, 0xffffffff, 0x180, 0xc0, 0xc0, 0xffffffff, 0xffffffff, 0x288, 0x288, 0x288, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x70, 0x98}, @common=@inet=@SET1={0x28}}, {{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@STANDARD={0x28}}, {{@ip={@rand_addr, @broadcast, 0x0, 0x0, 'batadv_slave_0\x00', 'ip_vti0\x00'}, 0x0, 0x70, 0x98}, @common=@unspec=@NFQUEUE0={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x2c0) ioctl$USBDEVFS_RESETEP(r0, 0x41045508, &(0x7f0000000080)) 06:55:54 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f0000000200)=@urb_type_control={0x2, {0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 06:55:54 executing program 0: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x5451, &(0x7f0000000200)=@urb_type_control={0x2, {0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 06:55:54 executing program 1: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040)=@security={'security\x00', 0xe, 0x4, 0x260, 0xffffffff, 0x180, 0xc0, 0xc0, 0xffffffff, 0xffffffff, 0x288, 0x288, 0x288, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x70, 0x98}, @common=@inet=@SET1={0x28}}, {{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@STANDARD={0x28}}, {{@ip={@rand_addr, @broadcast, 0x0, 0x0, 'batadv_slave_0\x00', 'ip_vti0\x00'}, 0x0, 0x70, 0x98}, @common=@unspec=@NFQUEUE0={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x2c0) ioctl$USBDEVFS_RESETEP(r0, 0x80045503, &(0x7f0000000080)) 06:55:54 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x4, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x802c550a, &(0x7f0000000200)=@urb_type_bulk={0x2, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 06:55:54 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x2, &(0x7f0000000200)=@urb_type_control={0x2, {0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) [ 2921.732856][T13927] FAULT_INJECTION: forcing a failure. [ 2921.732856][T13927] name failslab, interval 1, probability 0, space 0, times 0 [ 2921.759924][T13927] CPU: 0 PID: 13927 Comm: syz-executor.4 Tainted: G W 5.4.233-syzkaller-00019-gd5ed2ca98e48 #0 [ 2921.771551][T13927] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/14/2023 [ 2921.781590][T13927] Call Trace: [ 2921.784882][T13927] dump_stack+0x1d8/0x241 [ 2921.789200][T13927] ? panic+0x768/0x768 [ 2921.793256][T13927] ? nf_ct_l4proto_log_invalid+0x258/0x258 [ 2921.799046][T13927] ? stack_trace_save+0x1c0/0x1c0 [ 2921.804056][T13927] ? arch_stack_walk+0x105/0x140 [ 2921.808981][T13927] should_fail+0x71f/0x880 [ 2921.813390][T13927] ? setup_fault_attr+0x3d0/0x3d0 [ 2921.818407][T13927] ? stack_trace_snprint+0x170/0x170 [ 2921.823769][T13927] ? __d_alloc+0x2a/0x6a0 [ 2921.828084][T13927] should_failslab+0x5/0x20 [ 2921.832571][T13927] kmem_cache_alloc+0x24/0x220 [ 2921.837317][T13927] __d_alloc+0x2a/0x6a0 [ 2921.841457][T13927] d_alloc_parallel+0xe7/0x1310 [ 2921.846290][T13927] ? security_d_instantiate+0x97/0xf0 [ 2921.851642][T13927] ? d_instantiate+0x51/0x90 [ 2921.856214][T13927] ? debugfs_create_dir+0x1a2/0x380 [ 2921.861395][T13927] ? bdi_register_va+0x22d/0x600 [ 2921.866312][T13927] ? bdi_register+0xd1/0x120 [ 2921.870890][T13927] ? bdi_register_owner+0x55/0xf0 [ 2921.875900][T13927] ? avc_has_perm_noaudit+0x2f1/0x3d0 [ 2921.881267][T13927] ? avc_denied+0x1d0/0x1d0 [ 2921.885766][T13927] ? d_hash_and_lookup+0x1e0/0x1e0 [ 2921.890868][T13927] ? selinux_inode_permission+0x380/0x6a0 [ 2921.896573][T13927] ? selinux_inode_permission+0x454/0x6a0 [ 2921.902281][T13927] __lookup_slow+0x156/0x460 [ 2921.906863][T13927] ? lookup_one_len+0x2c0/0x2c0 [ 2921.911700][T13927] lookup_one_len+0x180/0x2c0 [ 2921.916360][T13927] ? lookup_one_len_common+0x450/0x450 [ 2921.921803][T13927] ? up_write+0xa6/0x270 [ 2921.926029][T13927] start_creating+0xec/0x250 [ 2921.930602][T13927] __debugfs_create_file+0x74/0x400 [ 2921.935782][T13927] ? debugfs_create_dir+0x2e7/0x380 [ 2921.940962][T13927] bdi_register_va+0x26f/0x600 [ 2921.945707][T13927] bdi_register+0xd1/0x120 [ 2921.950111][T13927] ? __device_add_disk+0x551/0x1220 [ 2921.955290][T13927] ? bdi_register_va+0x600/0x600 [ 2921.960214][T13927] ? percpu_ref_resurrect+0x113/0x190 [ 2921.965574][T13927] bdi_register_owner+0x55/0xf0 [ 2921.970412][T13927] __device_add_disk+0x5d1/0x1220 [ 2921.975422][T13927] ? device_add_disk+0x30/0x30 [ 2921.980166][T13927] ? vsprintf+0x30/0x30 [ 2921.984309][T13927] ? __alloc_disk_node+0x459/0x5a0 [ 2921.989407][T13927] loop_add+0x573/0x740 [ 2921.993547][T13927] loop_control_ioctl+0x448/0x620 [ 2921.998556][T13927] ? loop_remove+0xa0/0xa0 [ 2922.002959][T13927] ? memset+0x1f/0x40 [ 2922.006923][T13927] ? fsnotify+0x1280/0x1340 [ 2922.011408][T13927] ? loop_remove+0xa0/0xa0 [ 2922.015812][T13927] do_vfs_ioctl+0x742/0x1720 [ 2922.020390][T13927] ? ioctl_preallocate+0x250/0x250 [ 2922.025486][T13927] ? __fget+0x407/0x490 [ 2922.029625][T13927] ? fget_many+0x20/0x20 06:55:54 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) (fail_nth: 74) 06:55:54 executing program 1: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040)=@security={'security\x00', 0xe, 0x4, 0x260, 0xffffffff, 0x180, 0xc0, 0xc0, 0xffffffff, 0xffffffff, 0x288, 0x288, 0x288, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x70, 0x98}, @common=@inet=@SET1={0x28}}, {{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@STANDARD={0x28}}, {{@ip={@rand_addr, @broadcast, 0x0, 0x0, 'batadv_slave_0\x00', 'ip_vti0\x00'}, 0x0, 0x70, 0x98}, @common=@unspec=@NFQUEUE0={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x2c0) ioctl$USBDEVFS_RESETEP(r0, 0x80045505, &(0x7f0000000080)) 06:55:54 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x4b47, &(0x7f0000000200)=@urb_type_control={0x2, {0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 06:55:54 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x4, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x802c550a, &(0x7f0000000200)=@urb_type_bulk={0x2, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 06:55:54 executing program 0: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x5452, &(0x7f0000000200)=@urb_type_control={0x2, {0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) [ 2922.033847][T13927] ? debug_smp_processor_id+0x20/0x20 [ 2922.039202][T13927] ? security_file_ioctl+0x7d/0xa0 [ 2922.044304][T13927] __x64_sys_ioctl+0xd4/0x110 [ 2922.048965][T13927] do_syscall_64+0xca/0x1c0 [ 2922.053453][T13927] entry_SYSCALL_64_after_hwframe+0x5c/0xc1 06:55:54 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040)=@security={'security\x00', 0xe, 0x4, 0x260, 0xffffffff, 0x180, 0xc0, 0xc0, 0xffffffff, 0xffffffff, 0x288, 0x288, 0x288, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x70, 0x98}, @common=@inet=@SET1={0x28}}, {{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@STANDARD={0x28}}, {{@ip={@rand_addr, @broadcast, 0x0, 0x0, 'batadv_slave_0\x00', 'ip_vti0\x00'}, 0x0, 0x70, 0x98}, @common=@unspec=@NFQUEUE0={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x2c0) (async) ioctl$USBDEVFS_RESETEP(r0, 0x80045503, &(0x7f0000000080)) (async) r1 = syz_open_dev$usbfs(&(0x7f0000000300), 0x1, 0x1c1800) ioctl$USBDEVFS_SETINTERFACE(r1, 0x80085504, &(0x7f0000000340)={0x7, 0x6}) 06:55:54 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x4, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x802c550a, &(0x7f0000000200)=@urb_type_bulk={0x2, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) syz_open_dev$usbfs(&(0x7f0000000000), 0x4, 0x8101) (async) ioctl$USBDEVFS_SUBMITURB(r0, 0x802c550a, &(0x7f0000000200)=@urb_type_bulk={0x2, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) (async) 06:55:54 executing program 1: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040)=@security={'security\x00', 0xe, 0x4, 0x260, 0xffffffff, 0x180, 0xc0, 0xc0, 0xffffffff, 0xffffffff, 0x288, 0x288, 0x288, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x70, 0x98}, @common=@inet=@SET1={0x28}}, {{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@STANDARD={0x28}}, {{@ip={@rand_addr, @broadcast, 0x0, 0x0, 'batadv_slave_0\x00', 'ip_vti0\x00'}, 0x0, 0x70, 0x98}, @common=@unspec=@NFQUEUE0={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x2c0) ioctl$USBDEVFS_RESETEP(r0, 0x8004550f, &(0x7f0000000080)) 06:55:54 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x4b49, &(0x7f0000000200)=@urb_type_control={0x2, {0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 06:55:54 executing program 0: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x5460, &(0x7f0000000200)=@urb_type_control={0x2, {0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 06:55:54 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x541b, &(0x7f0000000200)=@urb_type_control={0x2, {0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) [ 2922.095485][T13958] usb usb8: usbfs: interface 0 claimed by hub while 'syz-executor.1' sets config #-256 [ 2922.132935][T13954] FAULT_INJECTION: forcing a failure. [ 2922.132935][T13954] name failslab, interval 1, probability 0, space 0, times 0 06:55:54 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x802c550a, &(0x7f0000000200)=@urb_type_bulk={0x2, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$USBDEVFS_FORBID_SUSPEND(r0, 0x5521) [ 2922.160898][T13954] CPU: 0 PID: 13954 Comm: syz-executor.4 Tainted: G W 5.4.233-syzkaller-00019-gd5ed2ca98e48 #0 [ 2922.172525][T13954] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/14/2023 [ 2922.182567][T13954] Call Trace: [ 2922.185849][T13954] dump_stack+0x1d8/0x241 [ 2922.190175][T13954] ? panic+0x768/0x768 [ 2922.194233][T13954] ? nf_ct_l4proto_log_invalid+0x258/0x258 [ 2922.200027][T13954] ? simple_lookup+0xba/0xf0 [ 2922.204608][T13954] ? __lookup_slow+0x350/0x460 [ 2922.209360][T13954] should_fail+0x71f/0x880 [ 2922.213766][T13954] ? setup_fault_attr+0x3d0/0x3d0 [ 2922.218772][T13954] ? lookup_one_len+0x180/0x2c0 [ 2922.223622][T13954] ? new_inode_pseudo+0x78/0x210 [ 2922.228552][T13954] should_failslab+0x5/0x20 [ 2922.233046][T13954] kmem_cache_alloc+0x24/0x220 [ 2922.237798][T13954] new_inode_pseudo+0x78/0x210 [ 2922.242548][T13954] new_inode+0x25/0x1d0 [ 2922.246688][T13954] ? start_creating+0x15d/0x250 [ 2922.251525][T13954] __debugfs_create_file+0xb6/0x400 [ 2922.256706][T13954] ? debugfs_create_dir+0x2e7/0x380 [ 2922.261887][T13954] bdi_register_va+0x26f/0x600 [ 2922.266635][T13954] bdi_register+0xd1/0x120 [ 2922.271037][T13954] ? __device_add_disk+0x551/0x1220 [ 2922.276218][T13954] ? bdi_register_va+0x600/0x600 [ 2922.281144][T13954] ? percpu_ref_resurrect+0x113/0x190 [ 2922.286497][T13954] bdi_register_owner+0x55/0xf0 [ 2922.291334][T13954] __device_add_disk+0x5d1/0x1220 [ 2922.296354][T13954] ? device_add_disk+0x30/0x30 [ 2922.301104][T13954] ? vsprintf+0x30/0x30 [ 2922.305245][T13954] ? __alloc_disk_node+0x459/0x5a0 [ 2922.310350][T13954] loop_add+0x573/0x740 [ 2922.314493][T13954] loop_control_ioctl+0x448/0x620 [ 2922.319505][T13954] ? loop_remove+0xa0/0xa0 [ 2922.323911][T13954] ? memset+0x1f/0x40 [ 2922.327876][T13954] ? fsnotify+0x1280/0x1340 [ 2922.332365][T13954] ? loop_remove+0xa0/0xa0 [ 2922.336765][T13954] do_vfs_ioctl+0x742/0x1720 [ 2922.341340][T13954] ? ioctl_preallocate+0x250/0x250 [ 2922.346439][T13954] ? __fget+0x407/0x490 [ 2922.350578][T13954] ? fget_many+0x20/0x20 [ 2922.354805][T13954] ? debug_smp_processor_id+0x20/0x20 06:55:55 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) (fail_nth: 75) 06:55:55 executing program 1: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040)=@security={'security\x00', 0xe, 0x4, 0x260, 0xffffffff, 0x180, 0xc0, 0xc0, 0xffffffff, 0xffffffff, 0x288, 0x288, 0x288, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x70, 0x98}, @common=@inet=@SET1={0x28}}, {{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@STANDARD={0x28}}, {{@ip={@rand_addr, @broadcast, 0x0, 0x0, 'batadv_slave_0\x00', 'ip_vti0\x00'}, 0x0, 0x70, 0x98}, @common=@unspec=@NFQUEUE0={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x2c0) ioctl$USBDEVFS_RESETEP(r0, 0x80045510, &(0x7f0000000080)) 06:55:55 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x5421, &(0x7f0000000200)=@urb_type_control={0x2, {0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 06:55:55 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x802c550a, &(0x7f0000000200)=@urb_type_bulk={0x2, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) (async) ioctl$USBDEVFS_FORBID_SUSPEND(r0, 0x5521) 06:55:55 executing program 0: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x550b, &(0x7f0000000200)=@urb_type_control={0x2, {0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 06:55:55 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040)=@security={'security\x00', 0xe, 0x4, 0x260, 0xffffffff, 0x180, 0xc0, 0xc0, 0xffffffff, 0xffffffff, 0x288, 0x288, 0x288, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x70, 0x98}, @common=@inet=@SET1={0x28}}, {{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@STANDARD={0x28}}, {{@ip={@rand_addr, @broadcast, 0x0, 0x0, 'batadv_slave_0\x00', 'ip_vti0\x00'}, 0x0, 0x70, 0x98}, @common=@unspec=@NFQUEUE0={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x2c0) syz_open_dev$usbfs(&(0x7f0000000340), 0xff, 0xc000) ioctl$USBDEVFS_RESETEP(r0, 0x80045503, &(0x7f0000000080)) 06:55:55 executing program 1: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040)=@security={'security\x00', 0xe, 0x4, 0x260, 0xffffffff, 0x180, 0xc0, 0xc0, 0xffffffff, 0xffffffff, 0x288, 0x288, 0x288, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x70, 0x98}, @common=@inet=@SET1={0x28}}, {{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@STANDARD={0x28}}, {{@ip={@rand_addr, @broadcast, 0x0, 0x0, 'batadv_slave_0\x00', 'ip_vti0\x00'}, 0x0, 0x70, 0x98}, @common=@unspec=@NFQUEUE0={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x2c0) ioctl$USBDEVFS_RESETEP(r0, 0x80045515, &(0x7f0000000080)) [ 2922.360164][T13954] ? security_file_ioctl+0x7d/0xa0 [ 2922.365256][T13954] __x64_sys_ioctl+0xd4/0x110 [ 2922.369917][T13954] do_syscall_64+0xca/0x1c0 [ 2922.374407][T13954] entry_SYSCALL_64_after_hwframe+0x5c/0xc1 [ 2922.386684][T13954] debugfs: out of free dentries, can not create file 'stats' 06:55:55 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x5450, &(0x7f0000000200)=@urb_type_control={0x2, {0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 06:55:55 executing program 0: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x5514, &(0x7f0000000200)=@urb_type_control={0x2, {0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 06:55:55 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x5451, &(0x7f0000000200)=@urb_type_control={0x2, {0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 06:55:55 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x802c550a, &(0x7f0000000200)=@urb_type_bulk={0x2, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) (async) ioctl$USBDEVFS_FORBID_SUSPEND(r0, 0x5521) 06:55:55 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040)=@security={'security\x00', 0xe, 0x4, 0x260, 0xffffffff, 0x180, 0xc0, 0xc0, 0xffffffff, 0xffffffff, 0x288, 0x288, 0x288, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x70, 0x98}, @common=@inet=@SET1={0x28}}, {{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@STANDARD={0x28}}, {{@ip={@rand_addr, @broadcast, 0x0, 0x0, 'batadv_slave_0\x00', 'ip_vti0\x00'}, 0x0, 0x70, 0x98}, @common=@unspec=@NFQUEUE0={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x2c0) (async) syz_open_dev$usbfs(&(0x7f0000000340), 0xff, 0xc000) (async) ioctl$USBDEVFS_RESETEP(r0, 0x80045503, &(0x7f0000000080)) [ 2922.458933][T13985] FAULT_INJECTION: forcing a failure. [ 2922.458933][T13985] name failslab, interval 1, probability 0, space 0, times 0 [ 2922.486888][T13985] CPU: 0 PID: 13985 Comm: syz-executor.4 Tainted: G W 5.4.233-syzkaller-00019-gd5ed2ca98e48 #0 [ 2922.498517][T13985] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/14/2023 [ 2922.508559][T13985] Call Trace: [ 2922.511844][T13985] dump_stack+0x1d8/0x241 [ 2922.516160][T13985] ? panic+0x768/0x768 [ 2922.520217][T13985] ? nf_ct_l4proto_log_invalid+0x258/0x258 [ 2922.526124][T13985] ? simple_lookup+0xba/0xf0 [ 2922.530706][T13985] ? __lookup_slow+0x350/0x460 [ 2922.535461][T13985] should_fail+0x71f/0x880 [ 2922.539869][T13985] ? setup_fault_attr+0x3d0/0x3d0 [ 2922.544885][T13985] ? lookup_one_len+0x180/0x2c0 [ 2922.549723][T13985] ? new_inode_pseudo+0x78/0x210 [ 2922.554647][T13985] should_failslab+0x5/0x20 [ 2922.559139][T13985] kmem_cache_alloc+0x24/0x220 [ 2922.563889][T13985] new_inode_pseudo+0x78/0x210 [ 2922.568639][T13985] new_inode+0x25/0x1d0 [ 2922.572798][T13985] ? start_creating+0x15d/0x250 [ 2922.577639][T13985] __debugfs_create_file+0xb6/0x400 [ 2922.582822][T13985] ? debugfs_create_dir+0x2e7/0x380 [ 2922.588006][T13985] bdi_register_va+0x26f/0x600 [ 2922.592758][T13985] bdi_register+0xd1/0x120 [ 2922.597169][T13985] ? __device_add_disk+0x551/0x1220 [ 2922.602350][T13985] ? bdi_register_va+0x600/0x600 [ 2922.607273][T13985] ? percpu_ref_resurrect+0x113/0x190 [ 2922.612631][T13985] bdi_register_owner+0x55/0xf0 [ 2922.617467][T13985] __device_add_disk+0x5d1/0x1220 [ 2922.622475][T13985] ? device_add_disk+0x30/0x30 [ 2922.627226][T13985] ? vsprintf+0x30/0x30 [ 2922.631368][T13985] ? __alloc_disk_node+0x459/0x5a0 [ 2922.636461][T13985] loop_add+0x573/0x740 [ 2922.640602][T13985] loop_control_ioctl+0x448/0x620 [ 2922.645609][T13985] ? loop_remove+0xa0/0xa0 [ 2922.650013][T13985] ? memset+0x1f/0x40 [ 2922.653979][T13985] ? fsnotify+0x1280/0x1340 [ 2922.658463][T13985] ? loop_remove+0xa0/0xa0 [ 2922.662866][T13985] do_vfs_ioctl+0x742/0x1720 [ 2922.667445][T13985] ? ioctl_preallocate+0x250/0x250 [ 2922.672540][T13985] ? __fget+0x407/0x490 [ 2922.676680][T13985] ? fget_many+0x20/0x20 [ 2922.680901][T13985] ? debug_smp_processor_id+0x20/0x20 [ 2922.686257][T13985] ? security_file_ioctl+0x7d/0xa0 [ 2922.691351][T13985] __x64_sys_ioctl+0xd4/0x110 [ 2922.696010][T13985] do_syscall_64+0xca/0x1c0 [ 2922.700498][T13985] entry_SYSCALL_64_after_hwframe+0x5c/0xc1 06:55:55 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) (fail_nth: 76) 06:55:55 executing program 1: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040)=@security={'security\x00', 0xe, 0x4, 0x260, 0xffffffff, 0x180, 0xc0, 0xc0, 0xffffffff, 0xffffffff, 0x288, 0x288, 0x288, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x70, 0x98}, @common=@inet=@SET1={0x28}}, {{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@STANDARD={0x28}}, {{@ip={@rand_addr, @broadcast, 0x0, 0x0, 'batadv_slave_0\x00', 'ip_vti0\x00'}, 0x0, 0x70, 0x98}, @common=@unspec=@NFQUEUE0={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x2c0) ioctl$USBDEVFS_RESETEP(r0, 0x80045518, &(0x7f0000000080)) 06:55:55 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x5452, &(0x7f0000000200)=@urb_type_control={0x2, {0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 06:55:55 executing program 2: socketpair(0x5, 0xa, 0x800, &(0x7f0000000040)={0xffffffffffffffff}) setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000080)={0x2e, @remote, 0x4e22, 0x4, 'lblc\x00', 0xc, 0x9, 0x47}, 0x2c) r1 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r1, 0x802c550a, &(0x7f0000000200)=@urb_type_bulk={0x2, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 06:55:55 executing program 0: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x551f, &(0x7f0000000200)=@urb_type_control={0x2, {0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 06:55:55 executing program 0: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x5521, &(0x7f0000000200)=@urb_type_control={0x2, {0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 06:55:55 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040)=@security={'security\x00', 0xe, 0x4, 0x260, 0xffffffff, 0x180, 0xc0, 0xc0, 0xffffffff, 0xffffffff, 0x288, 0x288, 0x288, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x70, 0x98}, @common=@inet=@SET1={0x28}}, {{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@STANDARD={0x28}}, {{@ip={@rand_addr, @broadcast, 0x0, 0x0, 'batadv_slave_0\x00', 'ip_vti0\x00'}, 0x0, 0x70, 0x98}, @common=@unspec=@NFQUEUE0={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x2c0) syz_open_dev$usbfs(&(0x7f0000000340), 0xff, 0xc000) ioctl$USBDEVFS_RESETEP(r0, 0x80045503, &(0x7f0000000080)) (async) ioctl$USBDEVFS_RESETEP(r0, 0x80045503, &(0x7f0000000080)) 06:55:55 executing program 1: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040)=@security={'security\x00', 0xe, 0x4, 0x260, 0xffffffff, 0x180, 0xc0, 0xc0, 0xffffffff, 0xffffffff, 0x288, 0x288, 0x288, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x70, 0x98}, @common=@inet=@SET1={0x28}}, {{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@STANDARD={0x28}}, {{@ip={@rand_addr, @broadcast, 0x0, 0x0, 'batadv_slave_0\x00', 'ip_vti0\x00'}, 0x0, 0x70, 0x98}, @common=@unspec=@NFQUEUE0={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x2c0) ioctl$USBDEVFS_RESETEP(r0, 0x80045519, &(0x7f0000000080)) 06:55:55 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x5460, &(0x7f0000000200)=@urb_type_control={0x2, {0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 06:55:55 executing program 2: socketpair(0x5, 0xa, 0x800, &(0x7f0000000040)={0xffffffffffffffff}) setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000080)={0x2e, @remote, 0x4e22, 0x4, 'lblc\x00', 0xc, 0x9, 0x47}, 0x2c) r1 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r1, 0x802c550a, &(0x7f0000000200)=@urb_type_bulk={0x2, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) [ 2922.712964][T13985] debugfs: out of free dentries, can not create file 'stats' 06:55:55 executing program 0: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x5522, &(0x7f0000000200)=@urb_type_control={0x2, {0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 06:55:55 executing program 2: socketpair(0x5, 0xa, 0x800, &(0x7f0000000040)={0xffffffffffffffff}) setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000080)={0x2e, @remote, 0x4e22, 0x4, 'lblc\x00', 0xc, 0x9, 0x47}, 0x2c) r1 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r1, 0x802c550a, &(0x7f0000000200)=@urb_type_bulk={0x2, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) socketpair(0x5, 0xa, 0x800, &(0x7f0000000040)) (async) setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000080)={0x2e, @remote, 0x4e22, 0x4, 'lblc\x00', 0xc, 0x9, 0x47}, 0x2c) (async) syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) (async) ioctl$USBDEVFS_SUBMITURB(r1, 0x802c550a, &(0x7f0000000200)=@urb_type_bulk={0x2, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) (async) [ 2922.776172][T14009] FAULT_INJECTION: forcing a failure. [ 2922.776172][T14009] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2922.816518][T14009] CPU: 1 PID: 14009 Comm: syz-executor.4 Tainted: G W 5.4.233-syzkaller-00019-gd5ed2ca98e48 #0 [ 2922.828189][T14009] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/14/2023 [ 2922.838239][T14009] Call Trace: [ 2922.841529][T14009] dump_stack+0x1d8/0x241 [ 2922.845844][T14009] ? panic+0x768/0x768 [ 2922.849900][T14009] ? nf_ct_l4proto_log_invalid+0x258/0x258 [ 2922.855697][T14009] ? stack_trace_save+0x118/0x1c0 [ 2922.860717][T14009] ? stack_trace_snprint+0x170/0x170 [ 2922.865999][T14009] should_fail+0x71f/0x880 [ 2922.870409][T14009] ? setup_fault_attr+0x3d0/0x3d0 [ 2922.875417][T14009] ? __kasan_kmalloc+0x199/0x1d0 [ 2922.880338][T14009] ? remove_wait_queue+0x120/0x120 [ 2922.885433][T14009] ? __kasan_kmalloc+0x130/0x1d0 [ 2922.890367][T14009] __alloc_pages_nodemask+0x1b4/0x840 [ 2922.895729][T14009] ? __device_add_disk+0x5d1/0x1220 [ 2922.900912][T14009] ? loop_add+0x573/0x740 [ 2922.905238][T14009] ? loop_control_ioctl+0x448/0x620 [ 2922.910427][T14009] ? do_syscall_64+0xca/0x1c0 [ 2922.915095][T14009] ? gfp_pfmemalloc_allowed+0x120/0x120 [ 2922.920623][T14009] ? lockref_get+0x184/0x220 [ 2922.925209][T14009] __get_free_pages+0xa/0x30 [ 2922.929789][T14009] selinux_genfs_get_sid+0x54/0x260 [ 2922.934973][T14009] inode_doinit_with_dentry+0x892/0x1050 [ 2922.940597][T14009] ? sb_finish_set_opts+0x770/0x770 [ 2922.945781][T14009] ? current_time+0x1af/0x2f0 [ 2922.950445][T14009] ? atime_needs_update+0x590/0x590 [ 2922.955630][T14009] security_d_instantiate+0x97/0xf0 [ 2922.960825][T14009] d_instantiate+0x51/0x90 [ 2922.965243][T14009] __debugfs_create_file+0x257/0x400 [ 2922.970524][T14009] bdi_register_va+0x26f/0x600 [ 2922.975279][T14009] bdi_register+0xd1/0x120 [ 2922.979685][T14009] ? __device_add_disk+0x551/0x1220 [ 2922.984872][T14009] ? bdi_register_va+0x600/0x600 [ 2922.989797][T14009] ? percpu_ref_resurrect+0x113/0x190 [ 2922.995153][T14009] bdi_register_owner+0x55/0xf0 [ 2923.000009][T14009] __device_add_disk+0x5d1/0x1220 [ 2923.005021][T14009] ? device_add_disk+0x30/0x30 [ 2923.009783][T14009] ? vsprintf+0x30/0x30 [ 2923.013923][T14009] ? __alloc_disk_node+0x459/0x5a0 [ 2923.019108][T14009] loop_add+0x573/0x740 [ 2923.023261][T14009] loop_control_ioctl+0x448/0x620 [ 2923.028272][T14009] ? loop_remove+0xa0/0xa0 [ 2923.032676][T14009] ? memset+0x1f/0x40 [ 2923.036644][T14009] ? fsnotify+0x1280/0x1340 [ 2923.041219][T14009] ? loop_remove+0xa0/0xa0 [ 2923.045622][T14009] do_vfs_ioctl+0x742/0x1720 [ 2923.050201][T14009] ? ioctl_preallocate+0x250/0x250 [ 2923.055299][T14009] ? __fget+0x407/0x490 [ 2923.059438][T14009] ? fget_many+0x20/0x20 06:55:55 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) (fail_nth: 77) 06:55:55 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x800, 0x40300) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040)=@security={'security\x00', 0xe, 0x4, 0x260, 0xffffffff, 0x180, 0xc0, 0xc0, 0xffffffff, 0xffffffff, 0x288, 0x288, 0x288, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x70, 0x98}, @common=@inet=@SET1={0x28}}, {{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@STANDARD={0x28}}, {{@ip={@rand_addr, @broadcast, 0x0, 0x0, 'batadv_slave_0\x00', 'ip_vti0\x00'}, 0x0, 0x70, 0x98}, @common=@unspec=@NFQUEUE0={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x2c0) ioctl$USBDEVFS_RESETEP(r0, 0x80045503, &(0x7f0000000080)) 06:55:55 executing program 1: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040)=@security={'security\x00', 0xe, 0x4, 0x260, 0xffffffff, 0x180, 0xc0, 0xc0, 0xffffffff, 0xffffffff, 0x288, 0x288, 0x288, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x70, 0x98}, @common=@inet=@SET1={0x28}}, {{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@STANDARD={0x28}}, {{@ip={@rand_addr, @broadcast, 0x0, 0x0, 'batadv_slave_0\x00', 'ip_vti0\x00'}, 0x0, 0x70, 0x98}, @common=@unspec=@NFQUEUE0={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x2c0) ioctl$USBDEVFS_RESETEP(r0, 0x8004551a, &(0x7f0000000080)) 06:55:55 executing program 0: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x5523, &(0x7f0000000200)=@urb_type_control={0x2, {0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 06:55:55 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x550b, &(0x7f0000000200)=@urb_type_control={0x2, {0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 06:55:55 executing program 2: setsockopt$MRT6_FLUSH(0xffffffffffffffff, 0x29, 0xd4, &(0x7f00000000c0), 0x4) r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_CLAIMINTERFACE(r0, 0x8004550f, &(0x7f0000000340)=0x6) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0xfffff7fffffffff7, 0x222002) r2 = syz_open_dev$loop(&(0x7f0000000400), 0x2, 0x0) ioctl$IOC_PR_REGISTER(r2, 0x401870c8, &(0x7f0000000480)={0x100, 0x3, 0x1}) ioctl$USBDEVFS_RELEASEINTERFACE(r0, 0x80045510, &(0x7f0000000380)=0xff) ioctl$USBDEVFS_RESETEP(r1, 0x80045503, &(0x7f0000000080)={0xa}) ioctl$IOC_PR_PREEMPT_ABORT(r2, 0x401870cc, &(0x7f00000004c0)={0x1ff, 0x9, 0x3, 0xfffff608}) ioctl$USBDEVFS_SUBMITURB(r0, 0x802c550a, &(0x7f0000000200)=@urb_type_bulk={0x2, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r3 = syz_open_dev$usbfs(&(0x7f0000000100), 0x200, 0x80) ioctl$IOC_PR_REGISTER(0xffffffffffffffff, 0x401870c8, &(0x7f0000000440)={0x202, 0x8de8, 0x1}) r4 = syz_open_dev$usbfs(&(0x7f00000003c0), 0x4, 0x80) ioctl$USBDEVFS_CLEAR_HALT(r4, 0x80045515, 0x0) read$usbfs(r4, &(0x7f0000000280)=""/140, 0x8c) ioctl$USBDEVFS_CONTROL(r3, 0xc0185500, &(0x7f0000000240)={0x60, 0x30, 0x8af1, 0x81, 0xa5, 0x8000, &(0x7f0000000140)="3f39ec9d97e3b4dfe0779abae790a217dfa1b5b484b36275e06d1846fdeb7d98e97fe5dca32adf9fba691cb4e748599a2d2a6b0c52b6b6df2bd8a44f3ee5316f352d340197ea8d84c6f9296cdce6cfd08b64803c1960fdeb643460f34801e2569158bb65e4706a9c33867507e8aa118babc9cb6a3c2803092df5a7187c3861a0f901197f79dd6e3989dbc4a99aa524bc58c5b21308d88fcc94ddf6e374869ed8124a14f5b7"}) 06:55:55 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x800, 0x40300) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040)=@security={'security\x00', 0xe, 0x4, 0x260, 0xffffffff, 0x180, 0xc0, 0xc0, 0xffffffff, 0xffffffff, 0x288, 0x288, 0x288, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x70, 0x98}, @common=@inet=@SET1={0x28}}, {{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@STANDARD={0x28}}, {{@ip={@rand_addr, @broadcast, 0x0, 0x0, 'batadv_slave_0\x00', 'ip_vti0\x00'}, 0x0, 0x70, 0x98}, @common=@unspec=@NFQUEUE0={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x2c0) (async) ioctl$USBDEVFS_RESETEP(r0, 0x80045503, &(0x7f0000000080)) 06:55:55 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x5514, &(0x7f0000000200)=@urb_type_control={0x2, {0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 06:55:55 executing program 1: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040)=@security={'security\x00', 0xe, 0x4, 0x260, 0xffffffff, 0x180, 0xc0, 0xc0, 0xffffffff, 0xffffffff, 0x288, 0x288, 0x288, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x70, 0x98}, @common=@inet=@SET1={0x28}}, {{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@STANDARD={0x28}}, {{@ip={@rand_addr, @broadcast, 0x0, 0x0, 'batadv_slave_0\x00', 'ip_vti0\x00'}, 0x0, 0x70, 0x98}, @common=@unspec=@NFQUEUE0={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x2c0) ioctl$USBDEVFS_RESETEP(r0, 0x80085504, &(0x7f0000000080)) [ 2923.063663][T14009] ? debug_smp_processor_id+0x20/0x20 [ 2923.069020][T14009] ? security_file_ioctl+0x7d/0xa0 [ 2923.074114][T14009] __x64_sys_ioctl+0xd4/0x110 [ 2923.078777][T14009] do_syscall_64+0xca/0x1c0 [ 2923.083263][T14009] entry_SYSCALL_64_after_hwframe+0x5c/0xc1 06:55:55 executing program 0: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x4004550c, &(0x7f0000000200)=@urb_type_control={0x2, {0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 06:55:55 executing program 2: setsockopt$MRT6_FLUSH(0xffffffffffffffff, 0x29, 0xd4, &(0x7f00000000c0), 0x4) (async) r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_CLAIMINTERFACE(r0, 0x8004550f, &(0x7f0000000340)=0x6) (async) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0xfffff7fffffffff7, 0x222002) (async, rerun: 32) r2 = syz_open_dev$loop(&(0x7f0000000400), 0x2, 0x0) (rerun: 32) ioctl$IOC_PR_REGISTER(r2, 0x401870c8, &(0x7f0000000480)={0x100, 0x3, 0x1}) ioctl$USBDEVFS_RELEASEINTERFACE(r0, 0x80045510, &(0x7f0000000380)=0xff) ioctl$USBDEVFS_RESETEP(r1, 0x80045503, &(0x7f0000000080)={0xa}) (async) ioctl$IOC_PR_PREEMPT_ABORT(r2, 0x401870cc, &(0x7f00000004c0)={0x1ff, 0x9, 0x3, 0xfffff608}) (async) ioctl$USBDEVFS_SUBMITURB(r0, 0x802c550a, &(0x7f0000000200)=@urb_type_bulk={0x2, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) (async) r3 = syz_open_dev$usbfs(&(0x7f0000000100), 0x200, 0x80) (async) ioctl$IOC_PR_REGISTER(0xffffffffffffffff, 0x401870c8, &(0x7f0000000440)={0x202, 0x8de8, 0x1}) r4 = syz_open_dev$usbfs(&(0x7f00000003c0), 0x4, 0x80) ioctl$USBDEVFS_CLEAR_HALT(r4, 0x80045515, 0x0) (async, rerun: 64) read$usbfs(r4, &(0x7f0000000280)=""/140, 0x8c) (rerun: 64) ioctl$USBDEVFS_CONTROL(r3, 0xc0185500, &(0x7f0000000240)={0x60, 0x30, 0x8af1, 0x81, 0xa5, 0x8000, &(0x7f0000000140)="3f39ec9d97e3b4dfe0779abae790a217dfa1b5b484b36275e06d1846fdeb7d98e97fe5dca32adf9fba691cb4e748599a2d2a6b0c52b6b6df2bd8a44f3ee5316f352d340197ea8d84c6f9296cdce6cfd08b64803c1960fdeb643460f34801e2569158bb65e4706a9c33867507e8aa118babc9cb6a3c2803092df5a7187c3861a0f901197f79dd6e3989dbc4a99aa524bc58c5b21308d88fcc94ddf6e374869ed8124a14f5b7"}) 06:55:55 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x551f, &(0x7f0000000200)=@urb_type_control={0x2, {0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) [ 2923.155957][T14040] FAULT_INJECTION: forcing a failure. [ 2923.155957][T14040] name failslab, interval 1, probability 0, space 0, times 0 [ 2923.187274][T14040] CPU: 0 PID: 14040 Comm: syz-executor.4 Tainted: G W 5.4.233-syzkaller-00019-gd5ed2ca98e48 #0 [ 2923.198904][T14040] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/14/2023 [ 2923.208946][T14040] Call Trace: [ 2923.212230][T14040] dump_stack+0x1d8/0x241 [ 2923.216558][T14040] ? panic+0x768/0x768 [ 2923.220613][T14040] ? check_preemption_disabled+0x9f/0x320 [ 2923.226316][T14040] ? nf_ct_l4proto_log_invalid+0x258/0x258 [ 2923.232115][T14040] ? _raw_spin_lock_bh+0xa4/0x1b0 [ 2923.237129][T14040] ? debug_smp_processor_id+0x20/0x20 [ 2923.242496][T14040] ? __debugfs_create_file+0x367/0x400 [ 2923.247947][T14040] should_fail+0x71f/0x880 [ 2923.252349][T14040] ? bdi_register_va+0x465/0x600 [ 2923.257281][T14040] ? setup_fault_attr+0x3d0/0x3d0 [ 2923.262287][T14040] ? bdi_register+0xd1/0x120 [ 2923.266866][T14040] ? __device_add_disk+0x551/0x1220 [ 2923.272049][T14040] ? kobj_map+0x65/0x5a0 [ 2923.276286][T14040] should_failslab+0x5/0x20 [ 2923.280772][T14040] __kmalloc+0x51/0x2b0 [ 2923.284914][T14040] kobj_map+0x65/0x5a0 [ 2923.288969][T14040] ? disk_check_events+0x600/0x600 [ 2923.294064][T14040] ? exact_match+0x20/0x20 [ 2923.298469][T14040] __device_add_disk+0x65a/0x1220 [ 2923.303483][T14040] ? device_add_disk+0x30/0x30 [ 2923.308231][T14040] ? vsprintf+0x30/0x30 [ 2923.312373][T14040] ? __alloc_disk_node+0x459/0x5a0 [ 2923.317466][T14040] loop_add+0x573/0x740 [ 2923.321607][T14040] loop_control_ioctl+0x448/0x620 [ 2923.326612][T14040] ? loop_remove+0xa0/0xa0 [ 2923.331014][T14040] ? memset+0x1f/0x40 [ 2923.334990][T14040] ? fsnotify+0x1280/0x1340 [ 2923.339477][T14040] ? loop_remove+0xa0/0xa0 [ 2923.343879][T14040] do_vfs_ioctl+0x742/0x1720 [ 2923.348459][T14040] ? ioctl_preallocate+0x250/0x250 06:55:56 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) (fail_nth: 78) 06:55:56 executing program 1: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040)=@security={'security\x00', 0xe, 0x4, 0x260, 0xffffffff, 0x180, 0xc0, 0xc0, 0xffffffff, 0xffffffff, 0x288, 0x288, 0x288, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x70, 0x98}, @common=@inet=@SET1={0x28}}, {{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@STANDARD={0x28}}, {{@ip={@rand_addr, @broadcast, 0x0, 0x0, 'batadv_slave_0\x00', 'ip_vti0\x00'}, 0x0, 0x70, 0x98}, @common=@unspec=@NFQUEUE0={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x2c0) ioctl$USBDEVFS_RESETEP(r0, 0x8008550e, &(0x7f0000000080)) 06:55:56 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x800, 0x40300) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040)=@security={'security\x00', 0xe, 0x4, 0x260, 0xffffffff, 0x180, 0xc0, 0xc0, 0xffffffff, 0xffffffff, 0x288, 0x288, 0x288, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x70, 0x98}, @common=@inet=@SET1={0x28}}, {{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@STANDARD={0x28}}, {{@ip={@rand_addr, @broadcast, 0x0, 0x0, 'batadv_slave_0\x00', 'ip_vti0\x00'}, 0x0, 0x70, 0x98}, @common=@unspec=@NFQUEUE0={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x2c0) ioctl$USBDEVFS_RESETEP(r0, 0x80045503, &(0x7f0000000080)) syz_open_dev$usbfs(&(0x7f0000000000), 0x800, 0x40300) (async) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040)=@security={'security\x00', 0xe, 0x4, 0x260, 0xffffffff, 0x180, 0xc0, 0xc0, 0xffffffff, 0xffffffff, 0x288, 0x288, 0x288, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x70, 0x98}, @common=@inet=@SET1={0x28}}, {{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@STANDARD={0x28}}, {{@ip={@rand_addr, @broadcast, 0x0, 0x0, 'batadv_slave_0\x00', 'ip_vti0\x00'}, 0x0, 0x70, 0x98}, @common=@unspec=@NFQUEUE0={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x2c0) (async) ioctl$USBDEVFS_RESETEP(r0, 0x80045503, &(0x7f0000000080)) (async) 06:55:56 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x5521, &(0x7f0000000200)=@urb_type_control={0x2, {0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 06:55:56 executing program 2: setsockopt$MRT6_FLUSH(0xffffffffffffffff, 0x29, 0xd4, &(0x7f00000000c0), 0x4) r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_CLAIMINTERFACE(r0, 0x8004550f, &(0x7f0000000340)=0x6) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0xfffff7fffffffff7, 0x222002) r2 = syz_open_dev$loop(&(0x7f0000000400), 0x2, 0x0) ioctl$IOC_PR_REGISTER(r2, 0x401870c8, &(0x7f0000000480)={0x100, 0x3, 0x1}) ioctl$USBDEVFS_RELEASEINTERFACE(r0, 0x80045510, &(0x7f0000000380)=0xff) ioctl$USBDEVFS_RESETEP(r1, 0x80045503, &(0x7f0000000080)={0xa}) ioctl$IOC_PR_PREEMPT_ABORT(r2, 0x401870cc, &(0x7f00000004c0)={0x1ff, 0x9, 0x3, 0xfffff608}) ioctl$USBDEVFS_SUBMITURB(r0, 0x802c550a, &(0x7f0000000200)=@urb_type_bulk={0x2, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r3 = syz_open_dev$usbfs(&(0x7f0000000100), 0x200, 0x80) ioctl$IOC_PR_REGISTER(0xffffffffffffffff, 0x401870c8, &(0x7f0000000440)={0x202, 0x8de8, 0x1}) r4 = syz_open_dev$usbfs(&(0x7f00000003c0), 0x4, 0x80) ioctl$USBDEVFS_CLEAR_HALT(r4, 0x80045515, 0x0) read$usbfs(r4, &(0x7f0000000280)=""/140, 0x8c) ioctl$USBDEVFS_CONTROL(r3, 0xc0185500, &(0x7f0000000240)={0x60, 0x30, 0x8af1, 0x81, 0xa5, 0x8000, &(0x7f0000000140)="3f39ec9d97e3b4dfe0779abae790a217dfa1b5b484b36275e06d1846fdeb7d98e97fe5dca32adf9fba691cb4e748599a2d2a6b0c52b6b6df2bd8a44f3ee5316f352d340197ea8d84c6f9296cdce6cfd08b64803c1960fdeb643460f34801e2569158bb65e4706a9c33867507e8aa118babc9cb6a3c2803092df5a7187c3861a0f901197f79dd6e3989dbc4a99aa524bc58c5b21308d88fcc94ddf6e374869ed8124a14f5b7"}) setsockopt$MRT6_FLUSH(0xffffffffffffffff, 0x29, 0xd4, &(0x7f00000000c0), 0x4) (async) syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) (async) ioctl$USBDEVFS_CLAIMINTERFACE(r0, 0x8004550f, &(0x7f0000000340)=0x6) (async) syz_open_dev$usbfs(&(0x7f0000000040), 0xfffff7fffffffff7, 0x222002) (async) syz_open_dev$loop(&(0x7f0000000400), 0x2, 0x0) (async) ioctl$IOC_PR_REGISTER(r2, 0x401870c8, &(0x7f0000000480)={0x100, 0x3, 0x1}) (async) ioctl$USBDEVFS_RELEASEINTERFACE(r0, 0x80045510, &(0x7f0000000380)=0xff) (async) ioctl$USBDEVFS_RESETEP(r1, 0x80045503, &(0x7f0000000080)={0xa}) (async) ioctl$IOC_PR_PREEMPT_ABORT(r2, 0x401870cc, &(0x7f00000004c0)={0x1ff, 0x9, 0x3, 0xfffff608}) (async) ioctl$USBDEVFS_SUBMITURB(r0, 0x802c550a, &(0x7f0000000200)=@urb_type_bulk={0x2, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) (async) syz_open_dev$usbfs(&(0x7f0000000100), 0x200, 0x80) (async) ioctl$IOC_PR_REGISTER(0xffffffffffffffff, 0x401870c8, &(0x7f0000000440)={0x202, 0x8de8, 0x1}) (async) syz_open_dev$usbfs(&(0x7f00000003c0), 0x4, 0x80) (async) ioctl$USBDEVFS_CLEAR_HALT(r4, 0x80045515, 0x0) (async) read$usbfs(r4, &(0x7f0000000280)=""/140, 0x8c) (async) ioctl$USBDEVFS_CONTROL(r3, 0xc0185500, &(0x7f0000000240)={0x60, 0x30, 0x8af1, 0x81, 0xa5, 0x8000, &(0x7f0000000140)="3f39ec9d97e3b4dfe0779abae790a217dfa1b5b484b36275e06d1846fdeb7d98e97fe5dca32adf9fba691cb4e748599a2d2a6b0c52b6b6df2bd8a44f3ee5316f352d340197ea8d84c6f9296cdce6cfd08b64803c1960fdeb643460f34801e2569158bb65e4706a9c33867507e8aa118babc9cb6a3c2803092df5a7187c3861a0f901197f79dd6e3989dbc4a99aa524bc58c5b21308d88fcc94ddf6e374869ed8124a14f5b7"}) (async) 06:55:56 executing program 1: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040)=@security={'security\x00', 0xe, 0x4, 0x260, 0xffffffff, 0x180, 0xc0, 0xc0, 0xffffffff, 0xffffffff, 0x288, 0x288, 0x288, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x70, 0x98}, @common=@inet=@SET1={0x28}}, {{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@STANDARD={0x28}}, {{@ip={@rand_addr, @broadcast, 0x0, 0x0, 'batadv_slave_0\x00', 'ip_vti0\x00'}, 0x0, 0x70, 0x98}, @common=@unspec=@NFQUEUE0={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x2c0) ioctl$USBDEVFS_RESETEP(r0, 0x8008551c, &(0x7f0000000080)) [ 2923.353558][T14040] ? __fget+0x407/0x490 [ 2923.357697][T14040] ? fget_many+0x20/0x20 [ 2923.361922][T14040] ? debug_smp_processor_id+0x20/0x20 [ 2923.367279][T14040] ? security_file_ioctl+0x7d/0xa0 [ 2923.372370][T14040] __x64_sys_ioctl+0xd4/0x110 [ 2923.377030][T14040] do_syscall_64+0xca/0x1c0 [ 2923.381517][T14040] entry_SYSCALL_64_after_hwframe+0x5c/0xc1 06:55:56 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x5522, &(0x7f0000000200)=@urb_type_control={0x2, {0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 06:55:56 executing program 1: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040)=@security={'security\x00', 0xe, 0x4, 0x260, 0xffffffff, 0x180, 0xc0, 0xc0, 0xffffffff, 0xffffffff, 0x288, 0x288, 0x288, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x70, 0x98}, @common=@inet=@SET1={0x28}}, {{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@STANDARD={0x28}}, {{@ip={@rand_addr, @broadcast, 0x0, 0x0, 'batadv_slave_0\x00', 'ip_vti0\x00'}, 0x0, 0x70, 0x98}, @common=@unspec=@NFQUEUE0={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x2c0) ioctl$USBDEVFS_RESETEP(r0, 0x8008551d, &(0x7f0000000080)) 06:55:56 executing program 2: socketpair(0xf, 0x2, 0xff, &(0x7f0000000040)={0xffffffffffffffff}) setsockopt$MRT6_TABLE(r0, 0x29, 0xcf, &(0x7f0000000080)=0xfe, 0x4) r1 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r1, 0x802c550a, &(0x7f0000000200)=@urb_type_bulk={0x2, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) [ 2923.492682][T14095] FAULT_INJECTION: forcing a failure. [ 2923.492682][T14095] name failslab, interval 1, probability 0, space 0, times 0 [ 2923.508216][T14095] CPU: 0 PID: 14095 Comm: syz-executor.4 Tainted: G W 5.4.233-syzkaller-00019-gd5ed2ca98e48 #0 [ 2923.519832][T14095] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/14/2023 [ 2923.529875][T14095] Call Trace: [ 2923.533157][T14095] dump_stack+0x1d8/0x241 [ 2923.537473][T14095] ? panic+0x768/0x768 [ 2923.541529][T14095] ? nf_ct_l4proto_log_invalid+0x258/0x258 [ 2923.547321][T14095] ? __kasan_kmalloc+0x199/0x1d0 [ 2923.552245][T14095] ? loop_add+0x573/0x740 [ 2923.556563][T14095] ? __kasan_kmalloc+0x130/0x1d0 [ 2923.561485][T14095] ? kobj_map+0x65/0x5a0 [ 2923.565714][T14095] ? __device_add_disk+0x65a/0x1220 [ 2923.570901][T14095] should_fail+0x71f/0x880 [ 2923.575305][T14095] ? setup_fault_attr+0x3d0/0x3d0 [ 2923.580315][T14095] ? kobject_set_name_vargs+0x5d/0x110 [ 2923.585756][T14095] should_failslab+0x5/0x20 [ 2923.590243][T14095] __kmalloc_track_caller+0x4f/0x290 [ 2923.595519][T14095] kstrdup_const+0x51/0x90 [ 2923.599925][T14095] kobject_set_name_vargs+0x5d/0x110 [ 2923.605202][T14095] dev_set_name+0xd1/0x120 [ 2923.609605][T14095] ? get_device+0x30/0x30 [ 2923.613920][T14095] ? kobj_map+0x567/0x5a0 [ 2923.618252][T14095] __device_add_disk+0x6de/0x1220 [ 2923.623263][T14095] ? device_add_disk+0x30/0x30 [ 2923.628015][T14095] ? __alloc_disk_node+0x459/0x5a0 [ 2923.633122][T14095] loop_add+0x573/0x740 [ 2923.637264][T14095] loop_control_ioctl+0x448/0x620 [ 2923.642277][T14095] ? loop_remove+0xa0/0xa0 [ 2923.646684][T14095] ? memset+0x1f/0x40 [ 2923.650651][T14095] ? fsnotify+0x1280/0x1340 [ 2923.655156][T14095] ? loop_remove+0xa0/0xa0 [ 2923.659561][T14095] do_vfs_ioctl+0x742/0x1720 [ 2923.664137][T14095] ? ioctl_preallocate+0x250/0x250 [ 2923.669234][T14095] ? __fget+0x407/0x490 [ 2923.673376][T14095] ? fget_many+0x20/0x20 [ 2923.677605][T14095] ? debug_smp_processor_id+0x20/0x20 [ 2923.682963][T14095] ? security_file_ioctl+0x7d/0xa0 [ 2923.688065][T14095] __x64_sys_ioctl+0xd4/0x110 [ 2923.692727][T14095] do_syscall_64+0xca/0x1c0 [ 2923.697217][T14095] entry_SYSCALL_64_after_hwframe+0x5c/0xc1 [ 2923.705689][T14095] kobject_add_internal failed for queue (error: -2 parent: (null)) [ 2923.713693][T14095] ------------[ cut here ]------------ [ 2923.719153][T14095] WARNING: CPU: 0 PID: 14095 at fs/sysfs/file.c:328 sysfs_create_files+0x325/0x470 [ 2923.728408][T14095] Modules linked in: [ 2923.732296][T14095] CPU: 0 PID: 14095 Comm: syz-executor.4 Tainted: G W 5.4.233-syzkaller-00019-gd5ed2ca98e48 #0 [ 2923.743899][T14095] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/14/2023 [ 2923.753952][T14095] RIP: 0010:sysfs_create_files+0x325/0x470 [ 2923.759746][T14095] Code: c1 03 38 c1 0f 8c b7 fe ff ff 48 8d 7c 24 70 e8 d1 50 da ff e9 a8 fe ff ff e8 e7 cc ac ff 31 db e9 ef 00 00 00 e8 db cc ac ff <0f> 0b bb ea ff ff ff 4c 8b 74 24 08 eb 17 85 db 0f 84 cf 00 00 00 [ 2923.779336][T14095] RSP: 0018:ffff8881ed0d7940 EFLAGS: 00010246 [ 2923.785391][T14095] RAX: ffffffff81b672b8 RBX: ffff8881e51640a0 RCX: 0000000000040000 [ 2923.793355][T14095] RDX: ffffc90001950000 RSI: 000000000003ffff RDI: 0000000000040000 [ 2923.801315][T14095] RBP: ffff8881ed0d7a10 R08: ffffffff84308010 R09: ffffed103dee0796 [ 2923.809281][T14095] R10: 0000000000000000 R11: dffffc0000000001 R12: 0000000000000000 [ 2923.817235][T14095] R13: ffffffff84d90cc0 R14: dffffc0000000000 R15: ffff8881e5164070 [ 2923.825197][T14095] FS: 00007f9c67de7700(0000) GS:ffff8881f6e00000(0000) knlGS:0000000000000000 [ 2923.834111][T14095] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 2923.840683][T14095] CR2: 0000001b2e021000 CR3: 00000001ea0b2000 CR4: 00000000003406f0 [ 2923.848643][T14095] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 2923.856599][T14095] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 2923.864551][T14095] Call Trace: [ 2923.867832][T14095] ? sysfs_create_file_ns+0x2a0/0x2a0 [ 2923.873193][T14095] ? kobject_get+0xc9/0x110 [ 2923.877687][T14095] __device_add_disk+0x949/0x1220 [ 2923.882697][T14095] ? device_add_disk+0x30/0x30 [ 2923.887448][T14095] ? __alloc_disk_node+0x459/0x5a0 [ 2923.892549][T14095] loop_add+0x573/0x740 [ 2923.896694][T14095] loop_control_ioctl+0x448/0x620 [ 2923.901701][T14095] ? loop_remove+0xa0/0xa0 [ 2923.906104][T14095] ? memset+0x1f/0x40 [ 2923.910070][T14095] ? fsnotify+0x1280/0x1340 [ 2923.914561][T14095] ? loop_remove+0xa0/0xa0 [ 2923.918965][T14095] do_vfs_ioctl+0x742/0x1720 [ 2923.923547][T14095] ? ioctl_preallocate+0x250/0x250 [ 2923.928642][T14095] ? __fget+0x407/0x490 [ 2923.932786][T14095] ? fget_many+0x20/0x20 [ 2923.937014][T14095] ? debug_smp_processor_id+0x20/0x20 06:55:56 executing program 0: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x4004550d, &(0x7f0000000200)=@urb_type_control={0x2, {0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 06:55:56 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x109941) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040)=@security={'security\x00', 0xe, 0x4, 0x260, 0xffffffff, 0x180, 0xc0, 0xc0, 0xffffffff, 0xffffffff, 0x288, 0x288, 0x288, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x70, 0x98}, @common=@inet=@SET1={0x28}}, {{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@STANDARD={0x28}}, {{@ip={@rand_addr, @broadcast, 0x0, 0x0, 'batadv_slave_0\x00', 'ip_vti0\x00'}, 0x0, 0x70, 0x98}, @common=@unspec=@NFQUEUE0={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x2c0) ioctl$USBDEVFS_RESETEP(r0, 0x80045503, &(0x7f0000000080)) 06:55:56 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x5523, &(0x7f0000000200)=@urb_type_control={0x2, {0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) [ 2923.942371][T14095] ? security_file_ioctl+0x7d/0xa0 [ 2923.947465][T14095] __x64_sys_ioctl+0xd4/0x110 [ 2923.952130][T14095] do_syscall_64+0xca/0x1c0 [ 2923.956621][T14095] entry_SYSCALL_64_after_hwframe+0x5c/0xc1 [ 2923.962495][T14095] ---[ end trace a19802151b528c00 ]--- [ 2923.970229][T14095] ------------[ cut here ]------------ [ 2923.975718][T14095] kernfs: can not remove 'events', no directory [ 2923.982254][T14095] WARNING: CPU: 0 PID: 14095 at fs/kernfs/dir.c:1511 kernfs_remove_by_name_ns+0xb1/0x100 [ 2923.992035][T14095] Modules linked in: [ 2923.995917][T14095] CPU: 0 PID: 14095 Comm: syz-executor.4 Tainted: G W 5.4.233-syzkaller-00019-gd5ed2ca98e48 #0 [ 2924.007519][T14095] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/14/2023 [ 2924.017572][T14095] RIP: 0010:kernfs_remove_by_name_ns+0xb1/0x100 [ 2924.023798][T14095] Code: ff 03 48 89 df e8 ff ef ff ff 48 89 df e8 67 ae ff ff 31 db eb 27 e8 7e 2a ad ff 48 c7 c7 c0 31 c5 84 4c 89 fe e8 ef 06 85 ff <0f> 0b bb fe ff ff ff eb 16 e8 61 2a ad ff bb fe ff ff ff 48 c7 c7 [ 2924.043391][T14095] RSP: 0018:ffff8881ed0d7918 EFLAGS: 00010246 [ 2924.049444][T14095] RAX: 5c0785740d1ecf00 RBX: 0000000000000000 RCX: 0000000000040000 [ 2924.057402][T14095] RDX: ffffc90001950000 RSI: 000000000003ffff RDI: 0000000000040000 [ 2924.065361][T14095] RBP: ffff8881ed0d7a10 R08: ffffffff814ca536 R09: ffffed103edcaa08 [ 2924.073324][T14095] R10: 0000000000000000 R11: dffffc0000000001 R12: 0000000000000000 [ 2924.081282][T14095] R13: 0000000000000000 R14: 0000000000000000 R15: ffffffff84d90d80 [ 2924.089241][T14095] FS: 00007f9c67de7700(0000) GS:ffff8881f6e00000(0000) knlGS:0000000000000000 [ 2924.098156][T14095] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 2924.104730][T14095] CR2: 0000001b2e021000 CR3: 00000001ea0b2000 CR4: 00000000003406f0 [ 2924.112690][T14095] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 2924.120645][T14095] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 2924.128599][T14095] Call Trace: [ 2924.131879][T14095] sysfs_create_files+0x3de/0x470 [ 2924.136895][T14095] ? sysfs_create_file_ns+0x2a0/0x2a0 [ 2924.142258][T14095] ? kobject_get+0xc9/0x110 [ 2924.146750][T14095] __device_add_disk+0x949/0x1220 [ 2924.151766][T14095] ? device_add_disk+0x30/0x30 [ 2924.156517][T14095] ? __alloc_disk_node+0x459/0x5a0 [ 2924.161622][T14095] loop_add+0x573/0x740 [ 2924.165764][T14095] loop_control_ioctl+0x448/0x620 [ 2924.170779][T14095] ? loop_remove+0xa0/0xa0 [ 2924.175184][T14095] ? memset+0x1f/0x40 [ 2924.179152][T14095] ? fsnotify+0x1280/0x1340 [ 2924.183640][T14095] ? loop_remove+0xa0/0xa0 [ 2924.188047][T14095] do_vfs_ioctl+0x742/0x1720 06:55:57 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) 06:55:57 executing program 2: socketpair(0xf, 0x2, 0xff, &(0x7f0000000040)={0xffffffffffffffff}) setsockopt$MRT6_TABLE(r0, 0x29, 0xcf, &(0x7f0000000080)=0xfe, 0x4) (async, rerun: 32) r1 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) (rerun: 32) ioctl$USBDEVFS_SUBMITURB(r1, 0x802c550a, &(0x7f0000000200)=@urb_type_bulk={0x2, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 06:55:57 executing program 1: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040)=@security={'security\x00', 0xe, 0x4, 0x260, 0xffffffff, 0x180, 0xc0, 0xc0, 0xffffffff, 0xffffffff, 0x288, 0x288, 0x288, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x70, 0x98}, @common=@inet=@SET1={0x28}}, {{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@STANDARD={0x28}}, {{@ip={@rand_addr, @broadcast, 0x0, 0x0, 'batadv_slave_0\x00', 'ip_vti0\x00'}, 0x0, 0x70, 0x98}, @common=@unspec=@NFQUEUE0={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x2c0) ioctl$USBDEVFS_RESETEP(r0, 0x80086601, &(0x7f0000000080)) 06:55:57 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x4004550c, &(0x7f0000000200)=@urb_type_control={0x2, {0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 06:55:57 executing program 0: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x4004551e, &(0x7f0000000200)=@urb_type_control={0x2, {0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) [ 2924.192626][T14095] ? ioctl_preallocate+0x250/0x250 [ 2924.197725][T14095] ? __fget+0x407/0x490 [ 2924.201866][T14095] ? fget_many+0x20/0x20 [ 2924.206092][T14095] ? debug_smp_processor_id+0x20/0x20 [ 2924.211446][T14095] ? security_file_ioctl+0x7d/0xa0 [ 2924.216539][T14095] __x64_sys_ioctl+0xd4/0x110 [ 2924.221204][T14095] do_syscall_64+0xca/0x1c0 [ 2924.225695][T14095] entry_SYSCALL_64_after_hwframe+0x5c/0xc1 [ 2924.231569][T14095] ---[ end trace a19802151b528c01 ]--- [ 2924.239597][T14095] loop0: failed to create sysfs files for events 06:55:57 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x109941) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040)=@security={'security\x00', 0xe, 0x4, 0x260, 0xffffffff, 0x180, 0xc0, 0xc0, 0xffffffff, 0xffffffff, 0x288, 0x288, 0x288, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x70, 0x98}, @common=@inet=@SET1={0x28}}, {{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@STANDARD={0x28}}, {{@ip={@rand_addr, @broadcast, 0x0, 0x0, 'batadv_slave_0\x00', 'ip_vti0\x00'}, 0x0, 0x70, 0x98}, @common=@unspec=@NFQUEUE0={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x2c0) (async) ioctl$USBDEVFS_RESETEP(r0, 0x80045503, &(0x7f0000000080)) 06:55:57 executing program 2: socketpair(0xf, 0x2, 0xff, &(0x7f0000000040)={0xffffffffffffffff}) setsockopt$MRT6_TABLE(r0, 0x29, 0xcf, &(0x7f0000000080)=0xfe, 0x4) r1 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r1, 0x802c550a, &(0x7f0000000200)=@urb_type_bulk={0x2, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) socketpair(0xf, 0x2, 0xff, &(0x7f0000000040)) (async) setsockopt$MRT6_TABLE(r0, 0x29, 0xcf, &(0x7f0000000080)=0xfe, 0x4) (async) syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) (async) ioctl$USBDEVFS_SUBMITURB(r1, 0x802c550a, &(0x7f0000000200)=@urb_type_bulk={0x2, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) (async) 06:55:57 executing program 0: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x40049409, &(0x7f0000000200)=@urb_type_control={0x2, {0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 06:55:57 executing program 1: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040)=@security={'security\x00', 0xe, 0x4, 0x260, 0xffffffff, 0x180, 0xc0, 0xc0, 0xffffffff, 0xffffffff, 0x288, 0x288, 0x288, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x70, 0x98}, @common=@inet=@SET1={0x28}}, {{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@STANDARD={0x28}}, {{@ip={@rand_addr, @broadcast, 0x0, 0x0, 'batadv_slave_0\x00', 'ip_vti0\x00'}, 0x0, 0x70, 0x98}, @common=@unspec=@NFQUEUE0={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x2c0) ioctl$USBDEVFS_RESETEP(r0, 0x80087601, &(0x7f0000000080)) 06:55:57 executing program 2: r0 = socket$inet(0x2, 0x4, 0xfffffffe) setsockopt$inet_MCAST_LEAVE_GROUP(r0, 0x0, 0x2d, &(0x7f0000000040)={0x9, {{0x2, 0x4e24, @private=0xa010102}}}, 0x88) r1 = socket$inet(0x2, 0xa, 0x0) accept$inet(r1, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(r1, 0x0, 0x487, &(0x7f00000015c0)={{0x6c, @rand_addr=0x64010101, 0x4e22, 0x3, 'dh\x00', 0x5, 0x9, 0x18}, {@loopback, 0x4e23, 0x0, 0x80, 0x8, 0x9}}, 0x44) syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) r2 = socket$inet(0x2, 0xa, 0x2000058) getsockopt$EBT_SO_GET_ENTRIES(r2, 0x0, 0x81, &(0x7f00000013c0)={'broute\x00', 0x0, 0x4, 0x1000, [0x0, 0x0, 0x8000, 0x8000, 0xd9, 0x4], 0x4, &(0x7f0000000180)=[{}, {}, {}, {}], &(0x7f00000003c0)=""/4096}, &(0x7f0000000240)=0x78) r3 = syz_open_dev$usbfs(&(0x7f0000000380), 0x100000002, 0x80002) ioctl$USBDEVFS_CLEAR_HALT(r3, 0x80045515, 0x0) ioctl$USBDEVFS_IOCTL(r3, 0xc0105512, &(0x7f0000000280)=@usbdevfs_disconnect={0xf7a}) r4 = accept4$inet(r0, &(0x7f0000000140)={0x2, 0x0, @remote}, &(0x7f00000001c0)=0x10, 0x800) getsockopt$inet_pktinfo(r4, 0x0, 0x8, &(0x7f00000002c0)={0x0, @rand_addr, @multicast2}, &(0x7f0000001640)=0xc) setsockopt$IP_VS_SO_SET_TIMEOUT(r0, 0x0, 0x48a, &(0x7f0000000100)={0x4, 0x0, 0xf4f}, 0xc) socketpair(0x5, 0xa, 0x3, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$IP_VS_SO_SET_EDIT(r5, 0x0, 0x483, &(0x7f0000001440)={0x4, @initdev={0xac, 0x1e, 0x1, 0x0}, 0x4e23, 0x2, 'none\x00', 0x13, 0x5, 0x5}, 0x2c) ioctl$USBDEVFS_SUBMITURB(r3, 0x802c550a, &(0x7f0000000200)=@urb_type_bulk={0x2, {}, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0}) getsockopt$inet_IP_IPSEC_POLICY(r5, 0x0, 0x10, &(0x7f0000001480)={{{@in6=@private1, @in=@multicast2}}, {{@in6=@ipv4={""/10, ""/2, @empty}}, 0x0, @in=@broadcast}}, &(0x7f0000001580)=0xe8) [ 2924.260237][T14106] ------------[ cut here ]------------ [ 2924.291859][T14106] kernfs: can not remove 'events', no directory [ 2924.324499][T14106] WARNING: CPU: 0 PID: 14106 at fs/kernfs/dir.c:1511 kernfs_remove_by_name_ns+0xb1/0x100 [ 2924.334308][T14106] Modules linked in: [ 2924.338203][T14106] CPU: 0 PID: 14106 Comm: syz-executor.4 Tainted: G W 5.4.233-syzkaller-00019-gd5ed2ca98e48 #0 [ 2924.349806][T14106] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/14/2023 [ 2924.359858][T14106] RIP: 0010:kernfs_remove_by_name_ns+0xb1/0x100 [ 2924.366096][T14106] Code: ff 03 48 89 df e8 ff ef ff ff 48 89 df e8 67 ae ff ff 31 db eb 27 e8 7e 2a ad ff 48 c7 c7 c0 31 c5 84 4c 89 fe e8 ef 06 85 ff <0f> 0b bb fe ff ff ff eb 16 e8 61 2a ad ff bb fe ff ff ff 48 c7 c7 [ 2924.385689][T14106] RSP: 0018:ffff8881ed0d7a38 EFLAGS: 00010246 [ 2924.391742][T14106] RAX: a4d1943835dd4300 RBX: 0000000000000000 RCX: ffff8881ec5e8fc0 [ 2924.399875][T14106] RDX: 0000000000000003 RSI: 0000000080000000 RDI: 0000000000000000 [ 2924.407835][T14106] RBP: ffffffff85c46160 R08: ffffffff814ca536 R09: 00000000000068c7 [ 2924.415795][T14106] R10: 0000000000200000 R11: dffffc0000000001 R12: 0000000000000000 06:55:57 executing program 1: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040)=@security={'security\x00', 0xe, 0x4, 0x260, 0xffffffff, 0x180, 0xc0, 0xc0, 0xffffffff, 0xffffffff, 0x288, 0x288, 0x288, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x70, 0x98}, @common=@inet=@SET1={0x28}}, {{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@STANDARD={0x28}}, {{@ip={@rand_addr, @broadcast, 0x0, 0x0, 'batadv_slave_0\x00', 'ip_vti0\x00'}, 0x0, 0x70, 0x98}, @common=@unspec=@NFQUEUE0={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x2c0) ioctl$USBDEVFS_RESETEP(r0, 0x8010550e, &(0x7f0000000080)) 06:55:57 executing program 0: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x76, 0x8101) ioctl$USBDEVFS_SUBMITURB(r0, 0x4008550c, &(0x7f0000000200)=@urb_type_control={0x2, {0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) [ 2924.423754][T14106] R13: dffffc0000000000 R14: 0000000000000000 R15: ffffffff84d90d80 [ 2924.431717][T14106] FS: 00007f9c67e08700(0000) GS:ffff8881f6e00000(0000) knlGS:0000000000000000 [ 2924.440631][T14106] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 2924.447199][T14106] CR2: 00007ffe57add898 CR3: 00000001ea0b2000 CR4: 00000000003406f0 [ 2924.455165][T14106] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 2924.463210][T14106] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 2924.471161][T14106] Call Trace: [ 2924.474447][T14106] sysfs_remove_files+0x91/0xe0 [ 2924.479292][T14106] del_gendisk+0x26f/0xbf0 [ 2924.483694][T14106] ? avc_flush+0x1f0/0x1f0 [ 2924.488100][T14106] ? device_add_disk_no_queue_reg+0x20/0x20 [ 2924.493986][T14106] loop_remove+0x42/0xa0 [ 2924.498215][T14106] loop_control_ioctl+0x564/0x620 [ 2924.503224][T14106] ? loop_remove+0xa0/0xa0 [ 2924.507631][T14106] ? loop_remove+0xa0/0xa0 [ 2924.512038][T14106] do_vfs_ioctl+0x742/0x1720 [ 2924.516612][T14106] ? ioctl_preallocate+0x250/0x250 [ 2924.521709][T14106] ? __fget+0x407/0x490 [ 2924.525850][T14106] ? fget_many+0x20/0x20 [ 2924.530085][T14106] ? switch_fpu_return+0x1d4/0x410 [ 2924.535183][T14106] ? security_file_ioctl+0x7d/0xa0 [ 2924.540287][T14106] __x64_sys_ioctl+0xd4/0x110 [ 2924.544953][T14106] do_syscall_64+0xca/0x1c0 [ 2924.549447][T14106] entry_SYSCALL_64_after_hwframe+0x5c/0xc1 [ 2924.555327][T14106] ---[ end trace a19802151b528c02 ]--- [ 2924.566882][T14106] ------------[ cut here ]------------ [ 2924.572657][T14106] kernfs: can not remove 'events_async', no directory [ 2924.582994][T14106] WARNING: CPU: 0 PID: 14106 at fs/kernfs/dir.c:1511 kernfs_remove_by_name_ns+0xb1/0x100 [ 2924.592784][T14106] Modules linked in: [ 2924.596669][T14106] CPU: 0 PID: 14106 Comm: syz-executor.4 Tainted: G W 5.4.233-syzkaller-00019-gd5ed2ca98e48 #0 [ 2924.608280][T14106] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/14/2023 [ 2924.618338][T14106] RIP: 0010:kernfs_remove_by_name_ns+0xb1/0x100 [ 2924.624567][T14106] Code: ff 03 48 89 df e8 ff ef ff ff 48 89 df e8 67 ae ff ff 31 db eb 27 e8 7e 2a ad ff 48 c7 c7 c0 31 c5 84 4c 89 fe e8 ef 06 85 ff <0f> 0b bb fe ff ff ff eb 16 e8 61 2a ad ff bb fe ff ff ff 48 c7 c7 [ 2924.644159][T14106] RSP: 0018:ffff8881ed0d7a38 EFLAGS: 00010246 [ 2924.650211][T14106] RAX: a4d1943835dd4300 RBX: 0000000000000000 RCX: ffff8881ec5e8fc0 [ 2924.658168][T14106] RDX: 0000000000000003 RSI: 0000000080000000 RDI: 0000000000000000 [ 2924.666127][T14106] RBP: ffffffff85c46160 R08: ffffffff814ca536 R09: 000000000000ffff [ 2924.674090][T14106] R10: 0000000000200000 R11: dffffc0000000001 R12: 0000000000000000 [ 2924.682047][T14106] R13: dffffc0000000000 R14: 0000000000000000 R15: ffffffff84d90e20 [ 2924.690009][T14106] FS: 00007f9c67e08700(0000) GS:ffff8881f6e00000(0000) knlGS:0000000000000000 [ 2924.698923][T14106] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 2924.705490][T14106] CR2: 00007f15d198059c CR3: 00000001ea0b2000 CR4: 00000000003406f0 [ 2924.713448][T14106] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 2924.721407][T14106] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 2924.729361][T14106] Call Trace: [ 2924.732642][T14106] sysfs_remove_files+0x91/0xe0 [ 2924.737481][T14106] del_gendisk+0x26f/0xbf0 [ 2924.741887][T14106] ? avc_flush+0x1f0/0x1f0 [ 2924.746297][T14106] ? device_add_disk_no_queue_reg+0x20/0x20 [ 2924.752178][T14106] loop_remove+0x42/0xa0 [ 2924.756406][T14106] loop_control_ioctl+0x564/0x620 [ 2924.761417][T14106] ? loop_remove+0xa0/0xa0 [ 2924.765819][T14106] ? loop_remove+0xa0/0xa0 [ 2924.770223][T14106] do_vfs_ioctl+0x742/0x1720 [ 2924.774798][T14106] ? ioctl_preallocate+0x250/0x250 [ 2924.779898][T14106] ? __fget+0x407/0x490 [ 2924.784041][T14106] ? fget_many+0x20/0x20 [ 2924.788275][T14106] ? switch_fpu_return+0x1d4/0x410 [ 2924.793372][T14106] ? security_file_ioctl+0x7d/0xa0 [ 2924.798470][T14106] __x64_sys_ioctl+0xd4/0x110 [ 2924.803134][T14106] do_syscall_64+0xca/0x1c0 [ 2924.807624][T14106] entry_SYSCALL_64_after_hwframe+0x5c/0xc1 [ 2924.813500][T14106] ---[ end trace a19802151b528c03 ]--- [ 2924.821250][T14106] ------------[ cut here ]------------ [ 2924.826778][T14106] kernfs: can not remove 'events_poll_msecs', no directory [ 2924.834321][T14106] WARNING: CPU: 0 PID: 14106 at fs/kernfs/dir.c:1511 kernfs_remove_by_name_ns+0xb1/0x100 [ 2924.844103][T14106] Modules linked in: [ 2924.847992][T14106] CPU: 0 PID: 14106 Comm: syz-executor.4 Tainted: G W 5.4.233-syzkaller-00019-gd5ed2ca98e48 #0 [ 2924.859593][T14106] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/14/2023 [ 2924.869650][T14106] RIP: 0010:kernfs_remove_by_name_ns+0xb1/0x100 [ 2924.875874][T14106] Code: ff 03 48 89 df e8 ff ef ff ff 48 89 df e8 67 ae ff ff 31 db eb 27 e8 7e 2a ad ff 48 c7 c7 c0 31 c5 84 4c 89 fe e8 ef 06 85 ff <0f> 0b bb fe ff ff ff eb 16 e8 61 2a ad ff bb fe ff ff ff 48 c7 c7 [ 2924.895470][T14106] RSP: 0018:ffff8881ed0d7a38 EFLAGS: 00010246 [ 2924.901521][T14106] RAX: a4d1943835dd4300 RBX: 0000000000000000 RCX: ffff8881ec5e8fc0 [ 2924.909479][T14106] RDX: 0000000000000003 RSI: 0000000080000000 RDI: 0000000000000000 [ 2924.917438][T14106] RBP: ffffffff85c46160 R08: ffffffff814ca536 R09: 000000000000ffff [ 2924.925394][T14106] R10: 0000000000200000 R11: dffffc0000000001 R12: 0000000000000000 [ 2924.933353][T14106] R13: dffffc0000000000 R14: 0000000000000000 R15: ffffffff84d90e40 [ 2924.941312][T14106] FS: 00007f9c67e08700(0000) GS:ffff8881f6e00000(0000) knlGS:0000000000000000 [ 2924.950225][T14106] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 2924.956798][T14106] CR2: 00007f15d198059c CR3: 00000001ea0b2000 CR4: 00000000003406f0 [ 2924.964757][T14106] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 2924.972712][T14106] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 2924.980664][T14106] Call Trace: [ 2924.983947][T14106] sysfs_remove_files+0x91/0xe0 [ 2924.988787][T14106] del_gendisk+0x26f/0xbf0 [ 2924.993198][T14106] ? avc_flush+0x1f0/0x1f0 [ 2924.997605][T14106] ? device_add_disk_no_queue_reg+0x20/0x20 [ 2925.003573][T14106] loop_remove+0x42/0xa0 [ 2925.007805][T14106] loop_control_ioctl+0x564/0x620 [ 2925.012814][T14106] ? loop_remove+0xa0/0xa0 [ 2925.017218][T14106] ? loop_remove+0xa0/0xa0 [ 2925.021629][T14106] do_vfs_ioctl+0x742/0x1720 [ 2925.026208][T14106] ? ioctl_preallocate+0x250/0x250 [ 2925.031304][T14106] ? __fget+0x407/0x490 [ 2925.035450][T14106] ? fget_many+0x20/0x20 [ 2925.039681][T14106] ? switch_fpu_return+0x1d4/0x410 [ 2925.044780][T14106] ? security_file_ioctl+0x7d/0xa0 [ 2925.049877][T14106] __x64_sys_ioctl+0xd4/0x110 [ 2925.054542][T14106] do_syscall_64+0xca/0x1c0 [ 2925.059033][T14106] entry_SYSCALL_64_after_hwframe+0x5c/0xc1 [ 2925.064906][T14106] ---[ end trace a19802151b528c04 ]--- [ 2925.072506][T14106] ------------[ cut here ]------------ [ 2925.078045][T14106] kernfs: can not remove 'bdi', no directory [ 2925.084136][T14106] WARNING: CPU: 0 PID: 14106 at fs/kernfs/dir.c:1511 kernfs_remove_by_name_ns+0xb1/0x100 [ 2925.093910][T14106] Modules linked in: [ 2925.097793][T14106] CPU: 0 PID: 14106 Comm: syz-executor.4 Tainted: G W 5.4.233-syzkaller-00019-gd5ed2ca98e48 #0 [ 2925.109392][T14106] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/14/2023 [ 2925.119442][T14106] RIP: 0010:kernfs_remove_by_name_ns+0xb1/0x100 [ 2925.125664][T14106] Code: ff 03 48 89 df e8 ff ef ff ff 48 89 df e8 67 ae ff ff 31 db eb 27 e8 7e 2a ad ff 48 c7 c7 c0 31 c5 84 4c 89 fe e8 ef 06 85 ff <0f> 0b bb fe ff ff ff eb 16 e8 61 2a ad ff bb fe ff ff ff 48 c7 c7 [ 2925.145269][T14106] RSP: 0018:ffff8881ed0d7a78 EFLAGS: 00010246 [ 2925.151326][T14106] RAX: a4d1943835dd4300 RBX: 0000000000000000 RCX: ffff8881ec5e8fc0 [ 2925.159283][T14106] RDX: 0000000000000003 RSI: 0000000080000000 RDI: 0000000000000000 [ 2925.167241][T14106] RBP: ffff8881ed0d7b88 R08: ffffffff814ca536 R09: 000000000000ffff [ 2925.175196][T14106] R10: 0000000000200000 R11: dffffc0000000001 R12: ffff8881e5164000 [ 2925.183154][T14106] R13: ffff8881e51644e8 R14: 0000000000000000 R15: ffffffff84d908e0 [ 2925.191113][T14106] FS: 00007f9c67e08700(0000) GS:ffff8881f6e00000(0000) knlGS:0000000000000000 [ 2925.200027][T14106] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 2925.206597][T14106] CR2: 00007f15d198059c CR3: 00000001ea0b2000 CR4: 00000000003406f0 [ 2925.214563][T14106] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 2925.222526][T14106] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 2925.230482][T14106] Call Trace: [ 2925.233767][T14106] del_gendisk+0x59a/0xbf0 [ 2925.238174][T14106] ? device_add_disk_no_queue_reg+0x20/0x20 [ 2925.244065][T14106] loop_remove+0x42/0xa0 [ 2925.248301][T14106] loop_control_ioctl+0x564/0x620 [ 2925.253310][T14106] ? loop_remove+0xa0/0xa0 [ 2925.257710][T14106] ? loop_remove+0xa0/0xa0 [ 2925.262130][T14106] do_vfs_ioctl+0x742/0x1720 [ 2925.266711][T14106] ? ioctl_preallocate+0x250/0x250 [ 2925.271809][T14106] ? __fget+0x407/0x490 [ 2925.275992][T14106] ? fget_many+0x20/0x20 [ 2925.280220][T14106] ? switch_fpu_return+0x1d4/0x410 [ 2925.285315][T14106] ? security_file_ioctl+0x7d/0xa0 [ 2925.290413][T14106] __x64_sys_ioctl+0xd4/0x110 [ 2925.295082][T14106] do_syscall_64+0xca/0x1c0 [ 2925.299571][T14106] entry_SYSCALL_64_after_hwframe+0x5c/0xc1 [ 2925.305444][T14106] ---[ end trace a19802151b528c05 ]--- [ 2925.321171][T14106] kasan: CONFIG_KASAN_INLINE enabled [ 2925.326499][T14106] kasan: GPF could be caused by NULL-ptr deref or user memory access [ 2925.335223][T14106] general protection fault: 0000 [#1] PREEMPT SMP KASAN [ 2925.342149][T14106] CPU: 0 PID: 14106 Comm: syz-executor.4 Tainted: G W 5.4.233-syzkaller-00019-gd5ed2ca98e48 #0 [ 2925.353747][T14106] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/14/2023 [ 2925.363797][T14106] RIP: 0010:strlen+0x28/0x60 [ 2925.368458][T14106] Code: 40 00 41 57 41 56 41 54 53 49 89 fe 48 c7 c0 ff ff ff ff 49 bf 00 00 00 00 00 fc ff df 48 89 fb 49 89 c4 48 89 d8 48 c1 e8 03 <42> 0f b6 04 38 84 c0 75 12 48 ff c3 49 8d 44 24 01 43 80 7c 26 01 [ 2925.388047][T14106] RSP: 0018:ffff8881ed0d7a00 EFLAGS: 00010246 [ 2925.394099][T14106] RAX: 0000000000000000 RBX: 0000000000000000 RCX: ffffc9000174f001 [ 2925.402069][T14106] RDX: 00000000001fffe0 RSI: 0000000000000000 RDI: 0000000000000000 [ 2925.410031][T14106] RBP: 0000000000000000 R08: ffffffff81b5e37c R09: 000000000000ffff [ 2925.417986][T14106] R10: 0000000000200000 R11: dffffc0000000001 R12: ffffffffffffffff [ 2925.425945][T14106] R13: dffffc0000000000 R14: 0000000000000000 R15: dffffc0000000000 [ 2925.433903][T14106] FS: 00007f9c67e08700(0000) GS:ffff8881f6e00000(0000) knlGS:0000000000000000 [ 2925.442822][T14106] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 2925.449389][T14106] CR2: 0000001b2e033000 CR3: 00000001ea0b2000 CR4: 00000000003406f0 [ 2925.457354][T14106] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 2925.465314][T14106] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 2925.473269][T14106] Call Trace: [ 2925.476555][T14106] kernfs_find_ns+0x83/0x440 [ 2925.481138][T14106] kernfs_remove_by_name_ns+0x37/0x100 [ 2925.486592][T14106] del_gendisk+0x98a/0xbf0 [ 2925.490995][T14106] ? device_add_disk_no_queue_reg+0x20/0x20 [ 2925.496877][T14106] loop_remove+0x42/0xa0 [ 2925.501104][T14106] loop_control_ioctl+0x564/0x620 [ 2925.506107][T14106] ? loop_remove+0xa0/0xa0 [ 2925.510511][T14106] ? loop_remove+0xa0/0xa0 [ 2925.514914][T14106] do_vfs_ioctl+0x742/0x1720 [ 2925.519493][T14106] ? ioctl_preallocate+0x250/0x250 [ 2925.524588][T14106] ? __fget+0x407/0x490 [ 2925.528727][T14106] ? fget_many+0x20/0x20 [ 2925.532957][T14106] ? switch_fpu_return+0x1d4/0x410 [ 2925.538052][T14106] ? security_file_ioctl+0x7d/0xa0 [ 2925.543149][T14106] __x64_sys_ioctl+0xd4/0x110 [ 2925.547811][T14106] do_syscall_64+0xca/0x1c0 [ 2925.552301][T14106] entry_SYSCALL_64_after_hwframe+0x5c/0xc1 [ 2925.558172][T14106] Modules linked in: [ 2925.564337][T14106] ---[ end trace a19802151b528c06 ]--- [ 2925.569856][T14106] RIP: 0010:strlen+0x28/0x60 [ 2925.574460][T14106] Code: 40 00 41 57 41 56 41 54 53 49 89 fe 48 c7 c0 ff ff ff ff 49 bf 00 00 00 00 00 fc ff df 48 89 fb 49 89 c4 48 89 d8 48 c1 e8 03 <42> 0f b6 04 38 84 c0 75 12 48 ff c3 49 8d 44 24 01 43 80 7c 26 01 [ 2925.594363][T14106] RSP: 0018:ffff8881ed0d7a00 EFLAGS: 00010246 [ 2925.600763][T14106] RAX: 0000000000000000 RBX: 0000000000000000 RCX: ffffc9000174f001 [ 2925.608893][T14106] RDX: 00000000001fffe0 RSI: 0000000000000000 RDI: 0000000000000000 [ 2925.616894][T14106] RBP: 0000000000000000 R08: ffffffff81b5e37c R09: 000000000000ffff [ 2925.625097][T14106] R10: 0000000000200000 R11: dffffc0000000001 R12: ffffffffffffffff [ 2925.633417][T14106] R13: dffffc0000000000 R14: 0000000000000000 R15: dffffc0000000000 [ 2925.641561][T14106] FS: 00007f9c67e08700(0000) GS:ffff8881f6e00000(0000) knlGS:0000000000000000 [ 2925.650653][T14106] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 2925.657261][T14106] CR2: 0000001b2e033000 CR3: 00000001ea0b2000 CR4: 00000000003406f0 [ 2925.665485][T14106] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 2925.673621][T14106] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 2925.681725][T14106] Kernel panic - not syncing: Fatal exception [ 2925.687981][T14106] Kernel Offset: disabled [ 2925.692281][T14106] Rebooting in 86400 seconds..